<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T07:23:12</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:248321" version="1" class="patch">
	<metadata>
		<title>kdirstat-2.4.4-277.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>
These are all security issues fixed in the kdirstat-2.4.4-277.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2528">CVE-2014-2528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905610" comment="kdirstat-2.4.4-277.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248322" version="1" class="patch">
	<metadata>
		<title>dstat-0.7.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the dstat-0.7.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3894">CVE-2009-3894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905611" comment="dstat-0.7.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248323" version="1" class="patch">
	<metadata>
		<title>libXxf86vm-devel-1.1.4-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm-devel-1.1.4-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905612" comment="libXxf86vm-devel-1.1.4-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905613" comment="libXxf86vm-devel-32bit-1.1.4-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905614" comment="libXxf86vm1-1.1.4-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905615" comment="libXxf86vm1-32bit-1.1.4-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248324" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.20-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.20-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7976">CVE-2016-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7978">CVE-2016-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905616" comment="ghostscript-9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905617" comment="ghostscript-devel-9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905618" comment="ghostscript-x11-9.20-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248325" version="1" class="patch">
	<metadata>
		<title>krb5-1.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3295">CVE-2009-3295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0283">CVE-2010-0283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0628">CVE-2010-0628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1320">CVE-2010-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1322">CVE-2010-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1324">CVE-2010-1324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4020">CVE-2010-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4021">CVE-2010-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4022">CVE-2010-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0284">CVE-2011-0284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0285">CVE-2011-0285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1527">CVE-2011-1527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1528">CVE-2011-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1529">CVE-2011-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1530">CVE-2011-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1012">CVE-2012-1012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1013">CVE-2012-1013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1016">CVE-2012-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1417">CVE-2013-1417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2696">CVE-2015-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2698">CVE-2015-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905619" comment="krb5-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905620" comment="krb5-32bit-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905621" comment="krb5-client-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905622" comment="krb5-devel-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905623" comment="krb5-devel-32bit-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905624" comment="krb5-doc-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905625" comment="krb5-mini-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905626" comment="krb5-mini-devel-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905627" comment="krb5-plugin-kdb-ldap-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905628" comment="krb5-plugin-preauth-otp-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905629" comment="krb5-plugin-preauth-pkinit-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905630" comment="krb5-server-1.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248326" version="1" class="patch">
	<metadata>
		<title>libHX-devel-3.22-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX-devel-3.22-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2947">CVE-2010-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905631" comment="libHX-devel-3.22-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905632" comment="libHX-devel-32bit-3.22-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905633" comment="libHX28-3.22-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905634" comment="libHX28-32bit-3.22-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248327" version="1" class="patch">
	<metadata>
		<title>libreoffice-5.2.3.3-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-5.2.3.3-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2935">CVE-2010-2935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2936">CVE-2010-2936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0247">CVE-2014-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3524">CVE-2014-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3575">CVE-2014-3575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3693">CVE-2014-3693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8146">CVE-2014-8146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8147">CVE-2014-8147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9093">CVE-2014-9093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4551">CVE-2015-4551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5212">CVE-2015-5212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5213">CVE-2015-5213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5214">CVE-2015-5214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0794">CVE-2016-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0795">CVE-2016-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4324">CVE-2016-4324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905635" comment="libreoffice-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905636" comment="libreoffice-base-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905637" comment="libreoffice-base-drivers-firebird-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905638" comment="libreoffice-base-drivers-mysql-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905639" comment="libreoffice-base-drivers-postgresql-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905640" comment="libreoffice-branding-upstream-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905641" comment="libreoffice-calc-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905642" comment="libreoffice-calc-extensions-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905643" comment="libreoffice-draw-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905644" comment="libreoffice-filters-optional-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905645" comment="libreoffice-gdb-pretty-printers-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905646" comment="libreoffice-glade-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905647" comment="libreoffice-gnome-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905648" comment="libreoffice-gtk3-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905649" comment="libreoffice-icon-theme-breeze-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905650" comment="libreoffice-icon-theme-galaxy-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905651" comment="libreoffice-icon-theme-hicontrast-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905652" comment="libreoffice-icon-theme-oxygen-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905653" comment="libreoffice-icon-theme-sifr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905654" comment="libreoffice-icon-theme-tango-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905655" comment="libreoffice-impress-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905656" comment="libreoffice-kde4-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905657" comment="libreoffice-l10n-af-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905658" comment="libreoffice-l10n-ar-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905659" comment="libreoffice-l10n-as-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905660" comment="libreoffice-l10n-bg-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905661" comment="libreoffice-l10n-bn-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905662" comment="libreoffice-l10n-br-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905663" comment="libreoffice-l10n-ca-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905664" comment="libreoffice-l10n-cs-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905665" comment="libreoffice-l10n-cy-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905666" comment="libreoffice-l10n-da-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905667" comment="libreoffice-l10n-de-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905668" comment="libreoffice-l10n-dz-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905669" comment="libreoffice-l10n-el-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905670" comment="libreoffice-l10n-en-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905671" comment="libreoffice-l10n-es-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905672" comment="libreoffice-l10n-et-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905673" comment="libreoffice-l10n-eu-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905674" comment="libreoffice-l10n-fa-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905675" comment="libreoffice-l10n-fi-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905676" comment="libreoffice-l10n-fr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905677" comment="libreoffice-l10n-ga-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905678" comment="libreoffice-l10n-gl-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905679" comment="libreoffice-l10n-gu-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905680" comment="libreoffice-l10n-he-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905681" comment="libreoffice-l10n-hi-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905682" comment="libreoffice-l10n-hr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905683" comment="libreoffice-l10n-hu-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905684" comment="libreoffice-l10n-it-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905685" comment="libreoffice-l10n-ja-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905686" comment="libreoffice-l10n-kk-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905687" comment="libreoffice-l10n-kn-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905688" comment="libreoffice-l10n-ko-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905689" comment="libreoffice-l10n-lt-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905690" comment="libreoffice-l10n-lv-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905691" comment="libreoffice-l10n-mai-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905692" comment="libreoffice-l10n-ml-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905693" comment="libreoffice-l10n-mr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905694" comment="libreoffice-l10n-nb-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905695" comment="libreoffice-l10n-nl-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905696" comment="libreoffice-l10n-nn-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905697" comment="libreoffice-l10n-nr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905698" comment="libreoffice-l10n-nso-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905699" comment="libreoffice-l10n-or-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905700" comment="libreoffice-l10n-pa-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905701" comment="libreoffice-l10n-pl-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905702" comment="libreoffice-l10n-pt_BR-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905703" comment="libreoffice-l10n-pt_PT-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905704" comment="libreoffice-l10n-ro-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905705" comment="libreoffice-l10n-ru-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905706" comment="libreoffice-l10n-si-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905707" comment="libreoffice-l10n-sk-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905708" comment="libreoffice-l10n-sl-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905709" comment="libreoffice-l10n-sr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905710" comment="libreoffice-l10n-ss-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905711" comment="libreoffice-l10n-st-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905712" comment="libreoffice-l10n-sv-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905713" comment="libreoffice-l10n-ta-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905714" comment="libreoffice-l10n-te-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905715" comment="libreoffice-l10n-th-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905716" comment="libreoffice-l10n-tn-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905717" comment="libreoffice-l10n-tr-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905718" comment="libreoffice-l10n-ts-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905719" comment="libreoffice-l10n-uk-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905720" comment="libreoffice-l10n-ve-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905721" comment="libreoffice-l10n-xh-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905722" comment="libreoffice-l10n-zh_CN-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905723" comment="libreoffice-l10n-zh_TW-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905724" comment="libreoffice-l10n-zu-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905725" comment="libreoffice-mailmerge-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905726" comment="libreoffice-math-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905727" comment="libreoffice-officebean-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905728" comment="libreoffice-pyuno-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905729" comment="libreoffice-sdk-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905730" comment="libreoffice-sdk-doc-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905731" comment="libreoffice-writer-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905732" comment="libreoffice-writer-extensions-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905733" comment="libreofficekit-5.2.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905734" comment="libreofficekit-devel-5.2.3.3-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248328" version="1" class="patch">
	<metadata>
		<title>mcabber-1.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8688" ref_url="https://www.suse.com/security/cve/CVE-2015-8688/" source="CVE"/>
		<description>
These are all security issues fixed in the mcabber-1.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8688/">CVE-2015-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8688">CVE-2015-8688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905735" comment="mcabber-1.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905736" comment="mcabber-devel-1.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248329" version="1" class="patch">
	<metadata>
		<title>kbd-2.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-2.0.3-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905737" comment="kbd-2.0.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905738" comment="kbd-legacy-2.0.3-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248330" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.7.3-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.7.3-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905739" comment="libupsclient1-2.7.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905740" comment="nut-2.7.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905741" comment="nut-cgi-2.7.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905742" comment="nut-devel-2.7.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905743" comment="nut-drivers-net-2.7.3-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248331" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.18-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.18-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905744" comment="libnewt0_52-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905745" comment="libnewt0_52-32bit-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905746" comment="newt-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905747" comment="newt-devel-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905748" comment="newt-doc-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905749" comment="newt-static-0.52.18-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905750" comment="python-newt-0.52.18-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248332" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.14.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3494" ref_url="https://www.suse.com/security/cve/CVE-2014-3494/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.14.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3494/">CVE-2014-3494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3494">CVE-2014-3494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905751" comment="kdelibs4-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905752" comment="kdelibs4-apidocs-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905753" comment="kdelibs4-branding-upstream-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905754" comment="kdelibs4-core-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905755" comment="kdelibs4-doc-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905756" comment="libkde4-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905757" comment="libkde4-32bit-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905758" comment="libkde4-devel-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905759" comment="libkdecore4-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905760" comment="libkdecore4-32bit-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905761" comment="libkdecore4-devel-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905762" comment="libksuseinstall-devel-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905763" comment="libksuseinstall1-4.14.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905764" comment="libksuseinstall1-32bit-4.14.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248333" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.44-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.44-22.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905765" comment="libldap-2_4-2-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905766" comment="libldap-2_4-2-32bit-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905767" comment="libldap-data-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905768" comment="openldap2-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905769" comment="openldap2-back-meta-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905770" comment="openldap2-back-perl-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905771" comment="openldap2-back-sock-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905772" comment="openldap2-back-sql-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905773" comment="openldap2-client-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905774" comment="openldap2-contrib-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905775" comment="openldap2-devel-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905776" comment="openldap2-devel-32bit-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905777" comment="openldap2-devel-static-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905778" comment="openldap2-doc-2.4.44-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905779" comment="openldap2-ppolicy-check-password-1.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248334" version="1" class="patch">
	<metadata>
		<title>libjson-c-devel-0.12.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c-devel-0.12.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905780" comment="libjson-c-devel-0.12.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905781" comment="libjson-c-doc-0.12.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905782" comment="libjson-c2-0.12.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905783" comment="libjson-c2-32bit-0.12.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248335" version="1" class="patch">
	<metadata>
		<title>ack-2.15_02-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7069" ref_url="https://www.suse.com/security/cve/CVE-2013-7069/" source="CVE"/>
		<description>
These are all security issues fixed in the ack-2.15_02-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7069/">CVE-2013-7069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7069">CVE-2013-7069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905784" comment="ack-2.15_02-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905785" comment="perl-App-Ack-2.15_02-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248336" version="1" class="patch">
	<metadata>
		<title>cyradm-2.4.18-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<description>
These are all security issues fixed in the cyradm-2.4.18-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3235">CVE-2009-3235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3372">CVE-2011-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8077">CVE-2015-8077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8078">CVE-2015-8078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905786" comment="cyradm-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905787" comment="cyrus-imapd-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905788" comment="cyrus-imapd-devel-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905789" comment="cyrus-imapd-snmp-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905790" comment="cyrus-imapd-snmp-mibs-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905791" comment="cyrus-imapd-utils-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905792" comment="perl-Cyrus-IMAP-2.4.18-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905793" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248337" version="1" class="patch">
	<metadata>
		<title>giflib-devel-32bit-5.1.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-32bit-5.1.4-1.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905794" comment="giflib-devel-5.1.4-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905795" comment="giflib-devel-32bit-5.1.4-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905796" comment="giflib-progs-5.1.4-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905797" comment="libgif7-5.1.4-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905798" comment="libgif7-32bit-5.1.4-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248338" version="1" class="patch">
	<metadata>
		<title>exim-4.86.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2023" ref_url="https://www.suse.com/security/cve/CVE-2010-2023/" source="CVE"/>
		<reference ref_id="CVE-2010-2024" ref_url="https://www.suse.com/security/cve/CVE-2010-2024/" source="CVE"/>
		<reference ref_id="CVE-2010-4344" ref_url="https://www.suse.com/security/cve/CVE-2010-4344/" source="CVE"/>
		<reference ref_id="CVE-2010-4345" ref_url="https://www.suse.com/security/cve/CVE-2010-4345/" source="CVE"/>
		<reference ref_id="CVE-2011-0017" ref_url="https://www.suse.com/security/cve/CVE-2011-0017/" source="CVE"/>
		<reference ref_id="CVE-2011-1407" ref_url="https://www.suse.com/security/cve/CVE-2011-1407/" source="CVE"/>
		<reference ref_id="CVE-2011-1764" ref_url="https://www.suse.com/security/cve/CVE-2011-1764/" source="CVE"/>
		<reference ref_id="CVE-2012-5671" ref_url="https://www.suse.com/security/cve/CVE-2012-5671/" source="CVE"/>
		<reference ref_id="CVE-2014-2957" ref_url="https://www.suse.com/security/cve/CVE-2014-2957/" source="CVE"/>
		<reference ref_id="CVE-2014-2972" ref_url="https://www.suse.com/security/cve/CVE-2014-2972/" source="CVE"/>
		<reference ref_id="CVE-2016-1531" ref_url="https://www.suse.com/security/cve/CVE-2016-1531/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.86.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2023/">CVE-2010-2023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2023">CVE-2010-2023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2024/">CVE-2010-2024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2024">CVE-2010-2024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4344/">CVE-2010-4344 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4344">CVE-2010-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4345/">CVE-2010-4345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4345">CVE-2010-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0017/">CVE-2011-0017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0017">CVE-2011-0017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1407/">CVE-2011-1407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1407">CVE-2011-1407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1764/">CVE-2011-1764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1764">CVE-2011-1764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5671/">CVE-2012-5671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5671">CVE-2012-5671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2957/">CVE-2014-2957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2957">CVE-2014-2957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2972/">CVE-2014-2972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2972">CVE-2014-2972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1531/">CVE-2016-1531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1531">CVE-2016-1531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905799" comment="exim-4.86.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905800" comment="eximon-4.86.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905801" comment="eximstats-html-4.86.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248339" version="1" class="patch">
	<metadata>
		<title>tkman-2.2-157.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5137" ref_url="https://www.suse.com/security/cve/CVE-2008-5137/" source="CVE"/>
		<description>
These are all security issues fixed in the tkman-2.2-157.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5137/">CVE-2008-5137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5137">CVE-2008-5137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905802" comment="tkman-2.2-157.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248340" version="1" class="patch">
	<metadata>
		<title>archivemail-0.9.0-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4245" ref_url="https://www.suse.com/security/cve/CVE-2006-4245/" source="CVE"/>
		<description>
These are all security issues fixed in the archivemail-0.9.0-9.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4245/">CVE-2006-4245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4245">CVE-2006-4245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905803" comment="archivemail-0.9.0-9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248341" version="1" class="patch">
	<metadata>
		<title>python-virtualbox-5.1.10-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-6588" ref_url="https://www.suse.com/security/cve/CVE-2014-6588/" source="CVE"/>
		<reference ref_id="CVE-2014-6589" ref_url="https://www.suse.com/security/cve/CVE-2014-6589/" source="CVE"/>
		<reference ref_id="CVE-2014-6590" ref_url="https://www.suse.com/security/cve/CVE-2014-6590/" source="CVE"/>
		<reference ref_id="CVE-2014-6595" ref_url="https://www.suse.com/security/cve/CVE-2014-6595/" source="CVE"/>
		<reference ref_id="CVE-2015-0377" ref_url="https://www.suse.com/security/cve/CVE-2015-0377/" source="CVE"/>
		<reference ref_id="CVE-2015-0418" ref_url="https://www.suse.com/security/cve/CVE-2015-0418/" source="CVE"/>
		<reference ref_id="CVE-2015-0427" ref_url="https://www.suse.com/security/cve/CVE-2015-0427/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4813" ref_url="https://www.suse.com/security/cve/CVE-2015-4813/" source="CVE"/>
		<reference ref_id="CVE-2015-4896" ref_url="https://www.suse.com/security/cve/CVE-2015-4896/" source="CVE"/>
		<reference ref_id="CVE-2016-0678" ref_url="https://www.suse.com/security/cve/CVE-2016-0678/" source="CVE"/>
		<reference ref_id="CVE-2016-5501" ref_url="https://www.suse.com/security/cve/CVE-2016-5501/" source="CVE"/>
		<reference ref_id="CVE-2016-5538" ref_url="https://www.suse.com/security/cve/CVE-2016-5538/" source="CVE"/>
		<reference ref_id="CVE-2016-5605" ref_url="https://www.suse.com/security/cve/CVE-2016-5605/" source="CVE"/>
		<reference ref_id="CVE-2016-5608" ref_url="https://www.suse.com/security/cve/CVE-2016-5608/" source="CVE"/>
		<reference ref_id="CVE-2016-5610" ref_url="https://www.suse.com/security/cve/CVE-2016-5610/" source="CVE"/>
		<reference ref_id="CVE-2016-5611" ref_url="https://www.suse.com/security/cve/CVE-2016-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the python-virtualbox-5.1.10-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6588/">CVE-2014-6588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6588">CVE-2014-6588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6589/">CVE-2014-6589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6589">CVE-2014-6589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6590/">CVE-2014-6590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6590">CVE-2014-6590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6595/">CVE-2014-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6595">CVE-2014-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0377/">CVE-2015-0377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0377">CVE-2015-0377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0418/">CVE-2015-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0418">CVE-2015-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0427/">CVE-2015-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0427">CVE-2015-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4813/">CVE-2015-4813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4813">CVE-2015-4813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4896/">CVE-2015-4896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4896">CVE-2015-4896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0678/">CVE-2016-0678 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0678">CVE-2016-0678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5501/">CVE-2016-5501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5501">CVE-2016-5501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5538/">CVE-2016-5538 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5538">CVE-2016-5538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5605/">CVE-2016-5605 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5605">CVE-2016-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5608/">CVE-2016-5608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5608">CVE-2016-5608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5610/">CVE-2016-5610 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5610">CVE-2016-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5611/">CVE-2016-5611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5611">CVE-2016-5611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905804" comment="python-virtualbox-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905805" comment="virtualbox-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905806" comment="virtualbox-devel-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905807" comment="virtualbox-guest-desktop-icons-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905808" comment="virtualbox-guest-kmp-default-5.1.10_k4.8.13_1-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905809" comment="virtualbox-guest-kmp-pae-5.1.10_k4.8.13_1-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905810" comment="virtualbox-guest-tools-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905811" comment="virtualbox-guest-x11-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905812" comment="virtualbox-host-kmp-default-5.1.10_k4.8.13_1-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905813" comment="virtualbox-host-kmp-pae-5.1.10_k4.8.13_1-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905814" comment="virtualbox-host-source-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905815" comment="virtualbox-qt-5.1.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905816" comment="virtualbox-websrv-5.1.10-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248342" version="1" class="patch">
	<metadata>
		<title>memcached-1.4.33-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1494" ref_url="https://www.suse.com/security/cve/CVE-2009-1494/" source="CVE"/>
		<reference ref_id="CVE-2011-4971" ref_url="https://www.suse.com/security/cve/CVE-2011-4971/" source="CVE"/>
		<reference ref_id="CVE-2013-0179" ref_url="https://www.suse.com/security/cve/CVE-2013-0179/" source="CVE"/>
		<reference ref_id="CVE-2013-7239" ref_url="https://www.suse.com/security/cve/CVE-2013-7239/" source="CVE"/>
		<reference ref_id="CVE-2013-7290" ref_url="https://www.suse.com/security/cve/CVE-2013-7290/" source="CVE"/>
		<reference ref_id="CVE-2013-7291" ref_url="https://www.suse.com/security/cve/CVE-2013-7291/" source="CVE"/>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.4.33-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1494/">CVE-2009-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1494">CVE-2009-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4971/">CVE-2011-4971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4971">CVE-2011-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0179/">CVE-2013-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0179">CVE-2013-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7239/">CVE-2013-7239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7239">CVE-2013-7239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7290/">CVE-2013-7290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7290">CVE-2013-7290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7291/">CVE-2013-7291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7291">CVE-2013-7291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8704">CVE-2016-8704 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8705">CVE-2016-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8706">CVE-2016-8706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905817" comment="memcached-1.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905818" comment="memcached-devel-1.4.33-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248343" version="1" class="patch">
	<metadata>
		<title>hostapd-2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-5314" ref_url="https://www.suse.com/security/cve/CVE-2015-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<description>
These are all security issues fixed in the hostapd-2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4144">CVE-2015-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4145">CVE-2015-4145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5314/">CVE-2015-5314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5314">CVE-2015-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4476">CVE-2016-4476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905819" comment="hostapd-2.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248344" version="1" class="patch">
	<metadata>
		<title>fileshareset-2.0-73.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the fileshareset-2.0-73.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0436">CVE-2010-0436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905820" comment="fileshareset-2.0-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905821" comment="kde4-kgreeter-plugins-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905822" comment="kdebase3-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905823" comment="kdebase3-32bit-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905824" comment="kdebase3-apps-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905825" comment="kdebase3-devel-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905826" comment="kdebase3-extra-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905827" comment="kdebase3-kdm-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905828" comment="kdebase3-ksysguardd-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905829" comment="kdebase3-nsplugin-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905830" comment="kdebase3-runtime-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905831" comment="kdebase3-runtime-32bit-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905832" comment="kdebase3-samba-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905833" comment="kdebase3-session-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905834" comment="kdebase3-workspace-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905835" comment="kdebase4-workspace-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905836" comment="kdebase4-workspace-addons-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905837" comment="kdebase4-workspace-devel-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905838" comment="kdebase4-workspace-ksysguardd-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905839" comment="kdebase4-workspace-liboxygenstyle-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905840" comment="kdebase4-workspace-liboxygenstyle-32bit-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905841" comment="kdebase4-workspace-libs-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905842" comment="kdebase4-workspace-libs-32bit-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905843" comment="kdm-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905844" comment="kdm-branding-upstream-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905845" comment="krandr-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905846" comment="kwin-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905847" comment="misc-console-font-3.5.10.1-73.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905848" comment="oxygen4-cursors-4.11.22-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905849" comment="python-kdebase4-4.11.22-6.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248345" version="1" class="patch">
	<metadata>
		<title>libvorbis-devel-1.3.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-devel-1.3.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905850" comment="libvorbis-devel-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905851" comment="libvorbis-devel-32bit-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905852" comment="libvorbis-doc-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905853" comment="libvorbis0-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905854" comment="libvorbis0-32bit-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905855" comment="libvorbisenc2-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905856" comment="libvorbisenc2-32bit-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905857" comment="libvorbisfile3-1.3.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905858" comment="libvorbisfile3-32bit-1.3.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248346" version="1" class="patch">
	<metadata>
		<title>libxcb-composite0-1.12-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-composite0-1.12-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905859" comment="libxcb-composite0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905860" comment="libxcb-composite0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905861" comment="libxcb-damage0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905862" comment="libxcb-damage0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905863" comment="libxcb-devel-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905864" comment="libxcb-devel-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905865" comment="libxcb-devel-doc-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905866" comment="libxcb-dpms0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905867" comment="libxcb-dpms0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905868" comment="libxcb-dri2-0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905869" comment="libxcb-dri2-0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905870" comment="libxcb-dri3-0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905871" comment="libxcb-dri3-0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905872" comment="libxcb-glx0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905873" comment="libxcb-glx0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905874" comment="libxcb-present0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905875" comment="libxcb-present0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905876" comment="libxcb-randr0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905877" comment="libxcb-randr0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905878" comment="libxcb-record0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905879" comment="libxcb-record0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905880" comment="libxcb-render0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905881" comment="libxcb-render0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905882" comment="libxcb-res0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905883" comment="libxcb-res0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905884" comment="libxcb-screensaver0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905885" comment="libxcb-screensaver0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905886" comment="libxcb-shape0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905887" comment="libxcb-shape0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905888" comment="libxcb-shm0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905889" comment="libxcb-shm0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905890" comment="libxcb-sync1-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905891" comment="libxcb-sync1-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905892" comment="libxcb-xf86dri0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905893" comment="libxcb-xf86dri0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905894" comment="libxcb-xfixes0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905895" comment="libxcb-xfixes0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905896" comment="libxcb-xinerama0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905897" comment="libxcb-xinerama0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905898" comment="libxcb-xkb1-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905899" comment="libxcb-xkb1-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905900" comment="libxcb-xtest0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905901" comment="libxcb-xtest0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905902" comment="libxcb-xv0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905903" comment="libxcb-xv0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905904" comment="libxcb-xvmc0-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905905" comment="libxcb-xvmc0-32bit-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905906" comment="libxcb1-1.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905907" comment="libxcb1-32bit-1.12-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248347" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.9.2-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.9.2-4.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3540">CVE-2014-3540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905908" comment="apache-commons-beanutils-1.9.2-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905909" comment="apache-commons-beanutils-javadoc-1.9.2-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248348" version="1" class="patch">
	<metadata>
		<title>automake-1.15-4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.15-4.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4029">CVE-2009-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905910" comment="automake-1.15-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905911" comment="m4-1.4.17-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248349" version="1" class="patch">
	<metadata>
		<title>go-1.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<description>
These are all security issues fixed in the go-1.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905912" comment="go-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905913" comment="go-doc-1.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248350" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-4.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-4.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905914" comment="libyaml-0-2-0.1.6-4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905915" comment="libyaml-devel-0.1.6-4.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248351" version="1" class="patch">
	<metadata>
		<title>postgresql94-9.4.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql94-9.4.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0867">CVE-2012-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0067">CVE-2014-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905916" comment="postgresql94-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905917" comment="postgresql94-contrib-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905918" comment="postgresql94-devel-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905919" comment="postgresql94-docs-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905920" comment="postgresql94-plperl-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905921" comment="postgresql94-plpython-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905922" comment="postgresql94-pltcl-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905923" comment="postgresql94-server-9.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905924" comment="postgresql94-test-9.4.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248352" version="1" class="patch">
	<metadata>
		<title>groff-1.22.3-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.3-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5044">CVE-2009-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5080">CVE-2009-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5081">CVE-2009-5081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905925" comment="groff-1.22.3-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905926" comment="groff-doc-1.22.3-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905927" comment="groff-full-1.22.3-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905928" comment="gxditview-1.22.3-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248353" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.32.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.32.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2124">CVE-2013-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4419">CVE-2013-4419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905929" comment="guestfs-data-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905930" comment="guestfs-tools-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905931" comment="guestfsd-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905932" comment="libguestfs-devel-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905933" comment="libguestfs-test-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905934" comment="libguestfs0-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905935" comment="lua-libguestfs-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905936" comment="ocaml-libguestfs-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905937" comment="ocaml-libguestfs-devel-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905938" comment="perl-Sys-Guestfs-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905939" comment="python-libguestfs-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905940" comment="rubygem-libguestfs-1.32.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905941" comment="virt-p2v-1.32.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248354" version="1" class="patch">
	<metadata>
		<title>liblightdm-gobject-1-0-1.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3153" ref_url="https://www.suse.com/security/cve/CVE-2011-3153/" source="CVE"/>
		<reference ref_id="CVE-2011-3349" ref_url="https://www.suse.com/security/cve/CVE-2011-3349/" source="CVE"/>
		<reference ref_id="CVE-2011-4105" ref_url="https://www.suse.com/security/cve/CVE-2011-4105/" source="CVE"/>
		<reference ref_id="CVE-2012-1111" ref_url="https://www.suse.com/security/cve/CVE-2012-1111/" source="CVE"/>
		<description>
These are all security issues fixed in the liblightdm-gobject-1-0-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3153/">CVE-2011-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3153">CVE-2011-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3349/">CVE-2011-3349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3349">CVE-2011-3349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4105/">CVE-2011-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4105">CVE-2011-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1111/">CVE-2012-1111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1111">CVE-2012-1111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905942" comment="liblightdm-gobject-1-0-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905943" comment="liblightdm-qt-3-0-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905944" comment="liblightdm-qt5-3-0-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905945" comment="lightdm-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905946" comment="lightdm-gobject-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905947" comment="lightdm-lang-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905948" comment="lightdm-qt-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905949" comment="lightdm-qt5-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905950" comment="typelib-1_0-LightDM-1-1.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248355" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.0-5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.0-5.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5031">CVE-2009-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2751">CVE-2012-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4528">CVE-2012-4528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1915">CVE-2013-1915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2765">CVE-2013-2765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905951" comment="apache2-mod_security2-2.9.0-5.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248356" version="1" class="patch">
	<metadata>
		<title>phpPgAdmin-5.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5587" ref_url="https://www.suse.com/security/cve/CVE-2008-5587/" source="CVE"/>
		<reference ref_id="CVE-2011-3598" ref_url="https://www.suse.com/security/cve/CVE-2011-3598/" source="CVE"/>
		<reference ref_id="CVE-2012-1600" ref_url="https://www.suse.com/security/cve/CVE-2012-1600/" source="CVE"/>
		<description>
These are all security issues fixed in the phpPgAdmin-5.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5587/">CVE-2008-5587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5587">CVE-2008-5587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3598/">CVE-2011-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3598">CVE-2011-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1600/">CVE-2012-1600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1600">CVE-2012-1600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905952" comment="phpPgAdmin-5.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248357" version="1" class="patch">
	<metadata>
		<title>libssh-devel-0.7.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-devel-0.7.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4559">CVE-2012-4559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4560">CVE-2012-4560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4561">CVE-2012-4561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0176">CVE-2013-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0017">CVE-2014-0017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8132">CVE-2014-8132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3146">CVE-2015-3146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905953" comment="libssh-devel-0.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905954" comment="libssh-devel-doc-0.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905955" comment="libssh4-0.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905956" comment="libssh4-32bit-0.7.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248358" version="1" class="patch">
	<metadata>
		<title>libgcrypt-cavs-1.7.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-cavs-1.7.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5738">CVE-2015-5738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511 at SUSE</cve>
	<cve impact="low" cvss3="2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7511">CVE-2015-7511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905957" comment="libgcrypt-cavs-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905958" comment="libgcrypt-devel-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905959" comment="libgcrypt-devel-32bit-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905960" comment="libgcrypt20-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905961" comment="libgcrypt20-32bit-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905962" comment="libgcrypt20-hmac-1.7.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905963" comment="libgcrypt20-hmac-32bit-1.7.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248359" version="1" class="patch">
	<metadata>
		<title>libzmq5-4.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq5-4.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7202">CVE-2014-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7203">CVE-2014-7203 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9721">CVE-2014-9721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905964" comment="libzmq5-4.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905965" comment="zeromq-devel-4.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905966" comment="zeromq-tools-4.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248360" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1885">CVE-2009-1885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0729">CVE-2016-0729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2099">CVE-2016-2099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4463">CVE-2016-4463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905967" comment="libxerces-c-3_1-3.1.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905968" comment="libxerces-c-3_1-32bit-3.1.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905969" comment="libxerces-c-devel-3.1.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905970" comment="xerces-c-3.1.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905971" comment="xerces-c-doc-3.1.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248361" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.9.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.9.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905972" comment="ImageMagick-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905973" comment="ImageMagick-devel-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905974" comment="ImageMagick-devel-32bit-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905975" comment="ImageMagick-doc-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905976" comment="ImageMagick-extra-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905977" comment="libMagick++-6_Q16-6-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905978" comment="libMagick++-6_Q16-6-32bit-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905979" comment="libMagick++-devel-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905980" comment="libMagick++-devel-32bit-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905981" comment="libMagickCore-6_Q16-2-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905982" comment="libMagickCore-6_Q16-2-32bit-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905983" comment="libMagickWand-6_Q16-2-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905984" comment="libMagickWand-6_Q16-2-32bit-6.9.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905985" comment="perl-PerlMagick-6.9.6.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248362" version="1" class="patch">
	<metadata>
		<title>evince-3.22.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.22.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905986" comment="evince-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905987" comment="evince-browser-plugin-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905988" comment="evince-devel-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905989" comment="evince-lang-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905990" comment="evince-plugin-comicsdocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905991" comment="evince-plugin-djvudocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905992" comment="evince-plugin-dvidocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905993" comment="evince-plugin-pdfdocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905994" comment="evince-plugin-psdocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905995" comment="evince-plugin-tiffdocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905996" comment="evince-plugin-xpsdocument-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905997" comment="libevdocument3-4-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905998" comment="libevview3-3-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905999" comment="nautilus-evince-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906000" comment="typelib-1_0-EvinceDocument-3_0-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906001" comment="typelib-1_0-EvinceView-3_0-3.22.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248363" version="1" class="patch">
	<metadata>
		<title>libndp-1.6-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp-1.6-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3698">CVE-2016-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906002" comment="libndp-1.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906003" comment="libndp-devel-1.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906004" comment="libndp0-1.6-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248364" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-27.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-27.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3172">CVE-2011-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906005" comment="pam-modules-12.1-27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906006" comment="pam-modules-32bit-12.1-27.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248365" version="1" class="patch">
	<metadata>
		<title>nginx-1.11.4-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4315" ref_url="https://www.suse.com/security/cve/CVE-2011-4315/" source="CVE"/>
		<reference ref_id="CVE-2012-2089" ref_url="https://www.suse.com/security/cve/CVE-2012-2089/" source="CVE"/>
		<reference ref_id="CVE-2013-2070" ref_url="https://www.suse.com/security/cve/CVE-2013-2070/" source="CVE"/>
		<reference ref_id="CVE-2013-4547" ref_url="https://www.suse.com/security/cve/CVE-2013-4547/" source="CVE"/>
		<reference ref_id="CVE-2014-0133" ref_url="https://www.suse.com/security/cve/CVE-2014-0133/" source="CVE"/>
		<reference ref_id="CVE-2014-3556" ref_url="https://www.suse.com/security/cve/CVE-2014-3556/" source="CVE"/>
		<reference ref_id="CVE-2014-3616" ref_url="https://www.suse.com/security/cve/CVE-2014-3616/" source="CVE"/>
		<reference ref_id="CVE-2016-0742" ref_url="https://www.suse.com/security/cve/CVE-2016-0742/" source="CVE"/>
		<reference ref_id="CVE-2016-0746" ref_url="https://www.suse.com/security/cve/CVE-2016-0746/" source="CVE"/>
		<reference ref_id="CVE-2016-0747" ref_url="https://www.suse.com/security/cve/CVE-2016-0747/" source="CVE"/>
		<reference ref_id="CVE-2016-4450" ref_url="https://www.suse.com/security/cve/CVE-2016-4450/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4315/">CVE-2011-4315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4315">CVE-2011-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2089/">CVE-2012-2089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2089">CVE-2012-2089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2070/">CVE-2013-2070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2070">CVE-2013-2070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4547/">CVE-2013-4547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4547">CVE-2013-4547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0133/">CVE-2014-0133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0133">CVE-2014-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3556/">CVE-2014-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3556">CVE-2014-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3616/">CVE-2014-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3616">CVE-2014-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0742/">CVE-2016-0742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0742">CVE-2016-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0746/">CVE-2016-0746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0746">CVE-2016-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0747/">CVE-2016-0747 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0747">CVE-2016-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4450/">CVE-2016-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4450">CVE-2016-4450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906007" comment="nginx-1.11.4-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906008" comment="vim-plugin-nginx-1.11.4-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248366" version="1" class="patch">
	<metadata>
		<title>bsdiff-4.3-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9862" ref_url="https://www.suse.com/security/cve/CVE-2014-9862/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdiff-4.3-5.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9862/">CVE-2014-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9862">CVE-2014-9862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906009" comment="bsdiff-4.3-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248367" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.56.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.56.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2054">CVE-2011-2054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906010" comment="libsoup-2_4-1-2.56.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906011" comment="libsoup-2_4-1-32bit-2.56.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906012" comment="libsoup-devel-2.56.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906013" comment="libsoup-devel-32bit-2.56.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906014" comment="libsoup-lang-2.56.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906015" comment="typelib-1_0-Soup-2_4-2.56.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248368" version="1" class="patch">
	<metadata>
		<title>vino-3.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0904">CVE-2011-0904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0905">CVE-2011-0905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1164">CVE-2011-1164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906016" comment="vino-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906017" comment="vino-lang-3.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248369" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.5b-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0542" ref_url="https://www.suse.com/security/cve/CVE-2009-0542/" source="CVE"/>
		<reference ref_id="CVE-2009-0543" ref_url="https://www.suse.com/security/cve/CVE-2009-0543/" source="CVE"/>
		<reference ref_id="CVE-2009-3639" ref_url="https://www.suse.com/security/cve/CVE-2009-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-1137" ref_url="https://www.suse.com/security/cve/CVE-2011-1137/" source="CVE"/>
		<reference ref_id="CVE-2011-4130" ref_url="https://www.suse.com/security/cve/CVE-2011-4130/" source="CVE"/>
		<reference ref_id="CVE-2013-4359" ref_url="https://www.suse.com/security/cve/CVE-2013-4359/" source="CVE"/>
		<reference ref_id="CVE-2015-3306" ref_url="https://www.suse.com/security/cve/CVE-2015-3306/" source="CVE"/>
		<reference ref_id="CVE-2016-3125" ref_url="https://www.suse.com/security/cve/CVE-2016-3125/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.5b-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0542/">CVE-2009-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0542">CVE-2009-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0543/">CVE-2009-0543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0543">CVE-2009-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3639/">CVE-2009-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3639">CVE-2009-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1137/">CVE-2011-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1137">CVE-2011-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4130/">CVE-2011-4130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4130">CVE-2011-4130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4359/">CVE-2013-4359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4359">CVE-2013-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3306/">CVE-2015-3306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3306">CVE-2015-3306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3125/">CVE-2016-3125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3125">CVE-2016-3125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906018" comment="proftpd-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906019" comment="proftpd-devel-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906020" comment="proftpd-doc-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906021" comment="proftpd-lang-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906022" comment="proftpd-ldap-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906023" comment="proftpd-mysql-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906024" comment="proftpd-pgsql-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906025" comment="proftpd-radius-1.3.5b-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906026" comment="proftpd-sqlite-1.3.5b-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248370" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906027" comment="ppp-2.4.7-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906028" comment="ppp-devel-2.4.7-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248371" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3328">CVE-2011-3328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0333">CVE-2014-0333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906029" comment="libpng16-16-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906030" comment="libpng16-16-32bit-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906031" comment="libpng16-compat-devel-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906032" comment="libpng16-compat-devel-32bit-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906033" comment="libpng16-devel-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906034" comment="libpng16-devel-32bit-1.6.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906035" comment="libpng16-tools-1.6.26-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248372" version="1" class="patch">
	<metadata>
		<title>ant-1.9.6-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.9.6-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906036" comment="ant-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906037" comment="ant-antlr-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906038" comment="ant-apache-bcel-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906039" comment="ant-apache-bsf-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906040" comment="ant-apache-log4j-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906041" comment="ant-apache-oro-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906042" comment="ant-apache-regexp-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906043" comment="ant-apache-resolver-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906044" comment="ant-apache-xalan2-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906045" comment="ant-commons-logging-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906046" comment="ant-commons-net-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906047" comment="ant-javadoc-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906048" comment="ant-javamail-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906049" comment="ant-jdepend-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906050" comment="ant-jmf-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906051" comment="ant-jsch-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906052" comment="ant-junit-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906053" comment="ant-manual-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906054" comment="ant-scripts-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906055" comment="ant-swing-1.9.6-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906056" comment="ant-testutil-1.9.6-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248373" version="1" class="patch">
	<metadata>
		<title>python-rope-0.10.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3539" ref_url="https://www.suse.com/security/cve/CVE-2014-3539/" source="CVE"/>
		<description>
These are all security issues fixed in the python-rope-0.10.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3539/">CVE-2014-3539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3539">CVE-2014-3539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906057" comment="python-rope-0.10.2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248374" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3547" ref_url="https://www.suse.com/security/cve/CVE-2012-3547/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3547/">CVE-2012-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3547">CVE-2012-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906058" comment="freeradius-server-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906059" comment="freeradius-server-devel-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906060" comment="freeradius-server-doc-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906061" comment="freeradius-server-krb5-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906062" comment="freeradius-server-ldap-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906063" comment="freeradius-server-libs-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906064" comment="freeradius-server-mysql-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906065" comment="freeradius-server-perl-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906066" comment="freeradius-server-postgresql-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906067" comment="freeradius-server-python-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906068" comment="freeradius-server-sqlite-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906069" comment="freeradius-server-utils-3.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248375" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-4.6.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4107" ref_url="https://www.suse.com/security/cve/CVE-2011-4107/" source="CVE"/>
		<reference ref_id="CVE-2011-4634" ref_url="https://www.suse.com/security/cve/CVE-2011-4634/" source="CVE"/>
		<reference ref_id="CVE-2011-4780" ref_url="https://www.suse.com/security/cve/CVE-2011-4780/" source="CVE"/>
		<reference ref_id="CVE-2011-4782" ref_url="https://www.suse.com/security/cve/CVE-2011-4782/" source="CVE"/>
		<reference ref_id="CVE-2012-4219" ref_url="https://www.suse.com/security/cve/CVE-2012-4219/" source="CVE"/>
		<reference ref_id="CVE-2012-4345" ref_url="https://www.suse.com/security/cve/CVE-2012-4345/" source="CVE"/>
		<reference ref_id="CVE-2012-5339" ref_url="https://www.suse.com/security/cve/CVE-2012-5339/" source="CVE"/>
		<reference ref_id="CVE-2012-5368" ref_url="https://www.suse.com/security/cve/CVE-2012-5368/" source="CVE"/>
		<reference ref_id="CVE-2013-1937" ref_url="https://www.suse.com/security/cve/CVE-2013-1937/" source="CVE"/>
		<reference ref_id="CVE-2013-3238" ref_url="https://www.suse.com/security/cve/CVE-2013-3238/" source="CVE"/>
		<reference ref_id="CVE-2013-3239" ref_url="https://www.suse.com/security/cve/CVE-2013-3239/" source="CVE"/>
		<reference ref_id="CVE-2013-3240" ref_url="https://www.suse.com/security/cve/CVE-2013-3240/" source="CVE"/>
		<reference ref_id="CVE-2013-3241" ref_url="https://www.suse.com/security/cve/CVE-2013-3241/" source="CVE"/>
		<reference ref_id="CVE-2013-3242" ref_url="https://www.suse.com/security/cve/CVE-2013-3242/" source="CVE"/>
		<reference ref_id="CVE-2013-4729" ref_url="https://www.suse.com/security/cve/CVE-2013-4729/" source="CVE"/>
		<reference ref_id="CVE-2013-4995" ref_url="https://www.suse.com/security/cve/CVE-2013-4995/" source="CVE"/>
		<reference ref_id="CVE-2013-4996" ref_url="https://www.suse.com/security/cve/CVE-2013-4996/" source="CVE"/>
		<reference ref_id="CVE-2013-4997" ref_url="https://www.suse.com/security/cve/CVE-2013-4997/" source="CVE"/>
		<reference ref_id="CVE-2013-4998" ref_url="https://www.suse.com/security/cve/CVE-2013-4998/" source="CVE"/>
		<reference ref_id="CVE-2013-4999" ref_url="https://www.suse.com/security/cve/CVE-2013-4999/" source="CVE"/>
		<reference ref_id="CVE-2013-5000" ref_url="https://www.suse.com/security/cve/CVE-2013-5000/" source="CVE"/>
		<reference ref_id="CVE-2013-5001" ref_url="https://www.suse.com/security/cve/CVE-2013-5001/" source="CVE"/>
		<reference ref_id="CVE-2013-5002" ref_url="https://www.suse.com/security/cve/CVE-2013-5002/" source="CVE"/>
		<reference ref_id="CVE-2013-5003" ref_url="https://www.suse.com/security/cve/CVE-2013-5003/" source="CVE"/>
		<reference ref_id="CVE-2013-5029" ref_url="https://www.suse.com/security/cve/CVE-2013-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-1879" ref_url="https://www.suse.com/security/cve/CVE-2014-1879/" source="CVE"/>
		<reference ref_id="CVE-2014-4348" ref_url="https://www.suse.com/security/cve/CVE-2014-4348/" source="CVE"/>
		<reference ref_id="CVE-2014-4349" ref_url="https://www.suse.com/security/cve/CVE-2014-4349/" source="CVE"/>
		<reference ref_id="CVE-2014-4954" ref_url="https://www.suse.com/security/cve/CVE-2014-4954/" source="CVE"/>
		<reference ref_id="CVE-2014-4955" ref_url="https://www.suse.com/security/cve/CVE-2014-4955/" source="CVE"/>
		<reference ref_id="CVE-2014-4986" ref_url="https://www.suse.com/security/cve/CVE-2014-4986/" source="CVE"/>
		<reference ref_id="CVE-2014-4987" ref_url="https://www.suse.com/security/cve/CVE-2014-4987/" source="CVE"/>
		<reference ref_id="CVE-2014-5273" ref_url="https://www.suse.com/security/cve/CVE-2014-5273/" source="CVE"/>
		<reference ref_id="CVE-2014-5274" ref_url="https://www.suse.com/security/cve/CVE-2014-5274/" source="CVE"/>
		<reference ref_id="CVE-2014-6300" ref_url="https://www.suse.com/security/cve/CVE-2014-6300/" source="CVE"/>
		<reference ref_id="CVE-2014-7217" ref_url="https://www.suse.com/security/cve/CVE-2014-7217/" source="CVE"/>
		<reference ref_id="CVE-2014-8326" ref_url="https://www.suse.com/security/cve/CVE-2014-8326/" source="CVE"/>
		<reference ref_id="CVE-2014-8958" ref_url="https://www.suse.com/security/cve/CVE-2014-8958/" source="CVE"/>
		<reference ref_id="CVE-2014-8959" ref_url="https://www.suse.com/security/cve/CVE-2014-8959/" source="CVE"/>
		<reference ref_id="CVE-2014-8960" ref_url="https://www.suse.com/security/cve/CVE-2014-8960/" source="CVE"/>
		<reference ref_id="CVE-2014-8961" ref_url="https://www.suse.com/security/cve/CVE-2014-8961/" source="CVE"/>
		<reference ref_id="CVE-2014-9218" ref_url="https://www.suse.com/security/cve/CVE-2014-9218/" source="CVE"/>
		<reference ref_id="CVE-2014-9219" ref_url="https://www.suse.com/security/cve/CVE-2014-9219/" source="CVE"/>
		<reference ref_id="CVE-2015-2206" ref_url="https://www.suse.com/security/cve/CVE-2015-2206/" source="CVE"/>
		<reference ref_id="CVE-2015-3902" ref_url="https://www.suse.com/security/cve/CVE-2015-3902/" source="CVE"/>
		<reference ref_id="CVE-2015-3903" ref_url="https://www.suse.com/security/cve/CVE-2015-3903/" source="CVE"/>
		<reference ref_id="CVE-2015-6830" ref_url="https://www.suse.com/security/cve/CVE-2015-6830/" source="CVE"/>
		<reference ref_id="CVE-2015-7873" ref_url="https://www.suse.com/security/cve/CVE-2015-7873/" source="CVE"/>
		<reference ref_id="CVE-2015-8669" ref_url="https://www.suse.com/security/cve/CVE-2015-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-1927" ref_url="https://www.suse.com/security/cve/CVE-2016-1927/" source="CVE"/>
		<reference ref_id="CVE-2016-2038" ref_url="https://www.suse.com/security/cve/CVE-2016-2038/" source="CVE"/>
		<reference ref_id="CVE-2016-2039" ref_url="https://www.suse.com/security/cve/CVE-2016-2039/" source="CVE"/>
		<reference ref_id="CVE-2016-2040" ref_url="https://www.suse.com/security/cve/CVE-2016-2040/" source="CVE"/>
		<reference ref_id="CVE-2016-2041" ref_url="https://www.suse.com/security/cve/CVE-2016-2041/" source="CVE"/>
		<reference ref_id="CVE-2016-2042" ref_url="https://www.suse.com/security/cve/CVE-2016-2042/" source="CVE"/>
		<reference ref_id="CVE-2016-2043" ref_url="https://www.suse.com/security/cve/CVE-2016-2043/" source="CVE"/>
		<reference ref_id="CVE-2016-2044" ref_url="https://www.suse.com/security/cve/CVE-2016-2044/" source="CVE"/>
		<reference ref_id="CVE-2016-2045" ref_url="https://www.suse.com/security/cve/CVE-2016-2045/" source="CVE"/>
		<reference ref_id="CVE-2016-2559" ref_url="https://www.suse.com/security/cve/CVE-2016-2559/" source="CVE"/>
		<reference ref_id="CVE-2016-2560" ref_url="https://www.suse.com/security/cve/CVE-2016-2560/" source="CVE"/>
		<reference ref_id="CVE-2016-2561" ref_url="https://www.suse.com/security/cve/CVE-2016-2561/" source="CVE"/>
		<reference ref_id="CVE-2016-2562" ref_url="https://www.suse.com/security/cve/CVE-2016-2562/" source="CVE"/>
		<reference ref_id="CVE-2016-5097" ref_url="https://www.suse.com/security/cve/CVE-2016-5097/" source="CVE"/>
		<reference ref_id="CVE-2016-5099" ref_url="https://www.suse.com/security/cve/CVE-2016-5099/" source="CVE"/>
		<reference ref_id="CVE-2016-5701" ref_url="https://www.suse.com/security/cve/CVE-2016-5701/" source="CVE"/>
		<reference ref_id="CVE-2016-5702" ref_url="https://www.suse.com/security/cve/CVE-2016-5702/" source="CVE"/>
		<reference ref_id="CVE-2016-5703" ref_url="https://www.suse.com/security/cve/CVE-2016-5703/" source="CVE"/>
		<reference ref_id="CVE-2016-5704" ref_url="https://www.suse.com/security/cve/CVE-2016-5704/" source="CVE"/>
		<reference ref_id="CVE-2016-5705" ref_url="https://www.suse.com/security/cve/CVE-2016-5705/" source="CVE"/>
		<reference ref_id="CVE-2016-5706" ref_url="https://www.suse.com/security/cve/CVE-2016-5706/" source="CVE"/>
		<reference ref_id="CVE-2016-5730" ref_url="https://www.suse.com/security/cve/CVE-2016-5730/" source="CVE"/>
		<reference ref_id="CVE-2016-5731" ref_url="https://www.suse.com/security/cve/CVE-2016-5731/" source="CVE"/>
		<reference ref_id="CVE-2016-5732" ref_url="https://www.suse.com/security/cve/CVE-2016-5732/" source="CVE"/>
		<reference ref_id="CVE-2016-5733" ref_url="https://www.suse.com/security/cve/CVE-2016-5733/" source="CVE"/>
		<reference ref_id="CVE-2016-5734" ref_url="https://www.suse.com/security/cve/CVE-2016-5734/" source="CVE"/>
		<reference ref_id="CVE-2016-5739" ref_url="https://www.suse.com/security/cve/CVE-2016-5739/" source="CVE"/>
		<reference ref_id="CVE-2016-6606" ref_url="https://www.suse.com/security/cve/CVE-2016-6606/" source="CVE"/>
		<reference ref_id="CVE-2016-6607" ref_url="https://www.suse.com/security/cve/CVE-2016-6607/" source="CVE"/>
		<reference ref_id="CVE-2016-6608" ref_url="https://www.suse.com/security/cve/CVE-2016-6608/" source="CVE"/>
		<reference ref_id="CVE-2016-6609" ref_url="https://www.suse.com/security/cve/CVE-2016-6609/" source="CVE"/>
		<reference ref_id="CVE-2016-6610" ref_url="https://www.suse.com/security/cve/CVE-2016-6610/" source="CVE"/>
		<reference ref_id="CVE-2016-6611" ref_url="https://www.suse.com/security/cve/CVE-2016-6611/" source="CVE"/>
		<reference ref_id="CVE-2016-6612" ref_url="https://www.suse.com/security/cve/CVE-2016-6612/" source="CVE"/>
		<reference ref_id="CVE-2016-6613" ref_url="https://www.suse.com/security/cve/CVE-2016-6613/" source="CVE"/>
		<reference ref_id="CVE-2016-6614" ref_url="https://www.suse.com/security/cve/CVE-2016-6614/" source="CVE"/>
		<reference ref_id="CVE-2016-6615" ref_url="https://www.suse.com/security/cve/CVE-2016-6615/" source="CVE"/>
		<reference ref_id="CVE-2016-6616" ref_url="https://www.suse.com/security/cve/CVE-2016-6616/" source="CVE"/>
		<reference ref_id="CVE-2016-6617" ref_url="https://www.suse.com/security/cve/CVE-2016-6617/" source="CVE"/>
		<reference ref_id="CVE-2016-6618" ref_url="https://www.suse.com/security/cve/CVE-2016-6618/" source="CVE"/>
		<reference ref_id="CVE-2016-6619" ref_url="https://www.suse.com/security/cve/CVE-2016-6619/" source="CVE"/>
		<reference ref_id="CVE-2016-6620" ref_url="https://www.suse.com/security/cve/CVE-2016-6620/" source="CVE"/>
		<reference ref_id="CVE-2016-6621" ref_url="https://www.suse.com/security/cve/CVE-2016-6621/" source="CVE"/>
		<reference ref_id="CVE-2016-6622" ref_url="https://www.suse.com/security/cve/CVE-2016-6622/" source="CVE"/>
		<reference ref_id="CVE-2016-6623" ref_url="https://www.suse.com/security/cve/CVE-2016-6623/" source="CVE"/>
		<reference ref_id="CVE-2016-6624" ref_url="https://www.suse.com/security/cve/CVE-2016-6624/" source="CVE"/>
		<reference ref_id="CVE-2016-6625" ref_url="https://www.suse.com/security/cve/CVE-2016-6625/" source="CVE"/>
		<reference ref_id="CVE-2016-6626" ref_url="https://www.suse.com/security/cve/CVE-2016-6626/" source="CVE"/>
		<reference ref_id="CVE-2016-6627" ref_url="https://www.suse.com/security/cve/CVE-2016-6627/" source="CVE"/>
		<reference ref_id="CVE-2016-6628" ref_url="https://www.suse.com/security/cve/CVE-2016-6628/" source="CVE"/>
		<reference ref_id="CVE-2016-6629" ref_url="https://www.suse.com/security/cve/CVE-2016-6629/" source="CVE"/>
		<reference ref_id="CVE-2016-6630" ref_url="https://www.suse.com/security/cve/CVE-2016-6630/" source="CVE"/>
		<reference ref_id="CVE-2016-6631" ref_url="https://www.suse.com/security/cve/CVE-2016-6631/" source="CVE"/>
		<reference ref_id="CVE-2016-6632" ref_url="https://www.suse.com/security/cve/CVE-2016-6632/" source="CVE"/>
		<reference ref_id="CVE-2016-6633" ref_url="https://www.suse.com/security/cve/CVE-2016-6633/" source="CVE"/>
		<reference ref_id="CVE-2016-9847" ref_url="https://www.suse.com/security/cve/CVE-2016-9847/" source="CVE"/>
		<reference ref_id="CVE-2016-9848" ref_url="https://www.suse.com/security/cve/CVE-2016-9848/" source="CVE"/>
		<reference ref_id="CVE-2016-9849" ref_url="https://www.suse.com/security/cve/CVE-2016-9849/" source="CVE"/>
		<reference ref_id="CVE-2016-9850" ref_url="https://www.suse.com/security/cve/CVE-2016-9850/" source="CVE"/>
		<reference ref_id="CVE-2016-9851" ref_url="https://www.suse.com/security/cve/CVE-2016-9851/" source="CVE"/>
		<reference ref_id="CVE-2016-9852" ref_url="https://www.suse.com/security/cve/CVE-2016-9852/" source="CVE"/>
		<reference ref_id="CVE-2016-9853" ref_url="https://www.suse.com/security/cve/CVE-2016-9853/" source="CVE"/>
		<reference ref_id="CVE-2016-9854" ref_url="https://www.suse.com/security/cve/CVE-2016-9854/" source="CVE"/>
		<reference ref_id="CVE-2016-9855" ref_url="https://www.suse.com/security/cve/CVE-2016-9855/" source="CVE"/>
		<reference ref_id="CVE-2016-9856" ref_url="https://www.suse.com/security/cve/CVE-2016-9856/" source="CVE"/>
		<reference ref_id="CVE-2016-9857" ref_url="https://www.suse.com/security/cve/CVE-2016-9857/" source="CVE"/>
		<reference ref_id="CVE-2016-9858" ref_url="https://www.suse.com/security/cve/CVE-2016-9858/" source="CVE"/>
		<reference ref_id="CVE-2016-9859" ref_url="https://www.suse.com/security/cve/CVE-2016-9859/" source="CVE"/>
		<reference ref_id="CVE-2016-9860" ref_url="https://www.suse.com/security/cve/CVE-2016-9860/" source="CVE"/>
		<reference ref_id="CVE-2016-9861" ref_url="https://www.suse.com/security/cve/CVE-2016-9861/" source="CVE"/>
		<reference ref_id="CVE-2016-9862" ref_url="https://www.suse.com/security/cve/CVE-2016-9862/" source="CVE"/>
		<reference ref_id="CVE-2016-9863" ref_url="https://www.suse.com/security/cve/CVE-2016-9863/" source="CVE"/>
		<reference ref_id="CVE-2016-9864" ref_url="https://www.suse.com/security/cve/CVE-2016-9864/" source="CVE"/>
		<reference ref_id="CVE-2016-9865" ref_url="https://www.suse.com/security/cve/CVE-2016-9865/" source="CVE"/>
		<reference ref_id="CVE-2016-9866" ref_url="https://www.suse.com/security/cve/CVE-2016-9866/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-4.6.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4107/">CVE-2011-4107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4107">CVE-2011-4107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4634/">CVE-2011-4634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4634">CVE-2011-4634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4780/">CVE-2011-4780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4780">CVE-2011-4780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4782/">CVE-2011-4782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4782">CVE-2011-4782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4219/">CVE-2012-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4219">CVE-2012-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4345/">CVE-2012-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4345">CVE-2012-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5339/">CVE-2012-5339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5339">CVE-2012-5339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5368/">CVE-2012-5368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5368">CVE-2012-5368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1937/">CVE-2013-1937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1937">CVE-2013-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3238/">CVE-2013-3238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3238">CVE-2013-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3239/">CVE-2013-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3239">CVE-2013-3239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3240/">CVE-2013-3240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3240">CVE-2013-3240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3241/">CVE-2013-3241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3241">CVE-2013-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3242/">CVE-2013-3242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3242">CVE-2013-3242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4729/">CVE-2013-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4729">CVE-2013-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4995/">CVE-2013-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4995">CVE-2013-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4996/">CVE-2013-4996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4996">CVE-2013-4996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4997/">CVE-2013-4997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4997">CVE-2013-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4998/">CVE-2013-4998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4998">CVE-2013-4998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4999/">CVE-2013-4999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4999">CVE-2013-4999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5000/">CVE-2013-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5000">CVE-2013-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5001/">CVE-2013-5001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5001">CVE-2013-5001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5002/">CVE-2013-5002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5002">CVE-2013-5002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5003/">CVE-2013-5003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5003">CVE-2013-5003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5029/">CVE-2013-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5029">CVE-2013-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1879/">CVE-2014-1879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1879">CVE-2014-1879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4348/">CVE-2014-4348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4348">CVE-2014-4348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4349/">CVE-2014-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4349">CVE-2014-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4954/">CVE-2014-4954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4954">CVE-2014-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4955/">CVE-2014-4955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4955">CVE-2014-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4986/">CVE-2014-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4986">CVE-2014-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4987/">CVE-2014-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4987">CVE-2014-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5273/">CVE-2014-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5273">CVE-2014-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5274/">CVE-2014-5274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5274">CVE-2014-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6300/">CVE-2014-6300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6300">CVE-2014-6300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7217/">CVE-2014-7217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7217">CVE-2014-7217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8326/">CVE-2014-8326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8326">CVE-2014-8326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8958/">CVE-2014-8958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8958">CVE-2014-8958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8959/">CVE-2014-8959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8959">CVE-2014-8959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8960/">CVE-2014-8960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8960">CVE-2014-8960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8961/">CVE-2014-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8961">CVE-2014-8961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9218/">CVE-2014-9218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9218">CVE-2014-9218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9219/">CVE-2014-9219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9219">CVE-2014-9219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2206/">CVE-2015-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2206">CVE-2015-2206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3902/">CVE-2015-3902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3902">CVE-2015-3902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3903/">CVE-2015-3903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3903">CVE-2015-3903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6830/">CVE-2015-6830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6830">CVE-2015-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7873/">CVE-2015-7873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7873">CVE-2015-7873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8669/">CVE-2015-8669 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8669">CVE-2015-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1927/">CVE-2016-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1927">CVE-2016-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2038/">CVE-2016-2038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2038">CVE-2016-2038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2039/">CVE-2016-2039 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2039">CVE-2016-2039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2040/">CVE-2016-2040 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2040">CVE-2016-2040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2041/">CVE-2016-2041 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2041">CVE-2016-2041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2042/">CVE-2016-2042 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2042">CVE-2016-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2043/">CVE-2016-2043 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2043">CVE-2016-2043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2044/">CVE-2016-2044 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2044">CVE-2016-2044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2045/">CVE-2016-2045 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2045">CVE-2016-2045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2559/">CVE-2016-2559 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2559">CVE-2016-2559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2560/">CVE-2016-2560 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2560">CVE-2016-2560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2561/">CVE-2016-2561 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2561">CVE-2016-2561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2562/">CVE-2016-2562 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2562">CVE-2016-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5097/">CVE-2016-5097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5097">CVE-2016-5097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5099/">CVE-2016-5099 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5099">CVE-2016-5099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5701/">CVE-2016-5701 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5701">CVE-2016-5701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5702/">CVE-2016-5702 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5702">CVE-2016-5702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5703/">CVE-2016-5703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5703">CVE-2016-5703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5704/">CVE-2016-5704 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5704">CVE-2016-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5705/">CVE-2016-5705 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5705">CVE-2016-5705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5706/">CVE-2016-5706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5706">CVE-2016-5706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5730/">CVE-2016-5730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5730">CVE-2016-5730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5731/">CVE-2016-5731 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5731">CVE-2016-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5732/">CVE-2016-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5732">CVE-2016-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5733/">CVE-2016-5733 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5733">CVE-2016-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5734/">CVE-2016-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5734">CVE-2016-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5739/">CVE-2016-5739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5739">CVE-2016-5739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6606/">CVE-2016-6606 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6606">CVE-2016-6606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6607/">CVE-2016-6607 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6607">CVE-2016-6607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6608/">CVE-2016-6608 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6608">CVE-2016-6608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6609/">CVE-2016-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6609">CVE-2016-6609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6610/">CVE-2016-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6610">CVE-2016-6610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6611/">CVE-2016-6611 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6611">CVE-2016-6611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6612/">CVE-2016-6612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6612">CVE-2016-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6613/">CVE-2016-6613 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6613">CVE-2016-6613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6614/">CVE-2016-6614 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6614">CVE-2016-6614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6615/">CVE-2016-6615 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6615">CVE-2016-6615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6616/">CVE-2016-6616 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6616">CVE-2016-6616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6617/">CVE-2016-6617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6617">CVE-2016-6617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6618/">CVE-2016-6618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6618">CVE-2016-6618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6619/">CVE-2016-6619 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6619">CVE-2016-6619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6620/">CVE-2016-6620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6620">CVE-2016-6620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6621/">CVE-2016-6621 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6621">CVE-2016-6621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6622/">CVE-2016-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6622">CVE-2016-6622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6623/">CVE-2016-6623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6623">CVE-2016-6623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6624/">CVE-2016-6624 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6624">CVE-2016-6624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6625/">CVE-2016-6625 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6625">CVE-2016-6625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6626/">CVE-2016-6626 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6626">CVE-2016-6626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6627/">CVE-2016-6627 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6627">CVE-2016-6627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6628/">CVE-2016-6628 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6628">CVE-2016-6628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6629/">CVE-2016-6629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6629">CVE-2016-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6630/">CVE-2016-6630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6630">CVE-2016-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6631/">CVE-2016-6631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6631">CVE-2016-6631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6632/">CVE-2016-6632 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6632">CVE-2016-6632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6633/">CVE-2016-6633 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6633">CVE-2016-6633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9847/">CVE-2016-9847 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9847">CVE-2016-9847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9848/">CVE-2016-9848 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9848">CVE-2016-9848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9849/">CVE-2016-9849 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9849">CVE-2016-9849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9850/">CVE-2016-9850 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9850">CVE-2016-9850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9851/">CVE-2016-9851 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9851">CVE-2016-9851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9852/">CVE-2016-9852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9852">CVE-2016-9852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9853/">CVE-2016-9853 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9853">CVE-2016-9853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9854/">CVE-2016-9854 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9854">CVE-2016-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9855/">CVE-2016-9855 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9855">CVE-2016-9855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9856/">CVE-2016-9856 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9856">CVE-2016-9856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9857/">CVE-2016-9857 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9857">CVE-2016-9857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9858/">CVE-2016-9858 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9858">CVE-2016-9858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9859/">CVE-2016-9859 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9859">CVE-2016-9859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9860/">CVE-2016-9860 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9860">CVE-2016-9860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9861/">CVE-2016-9861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9861">CVE-2016-9861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9862/">CVE-2016-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9862">CVE-2016-9862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9863/">CVE-2016-9863 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9863">CVE-2016-9863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9864/">CVE-2016-9864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9864">CVE-2016-9864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9865/">CVE-2016-9865 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9865">CVE-2016-9865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9866/">CVE-2016-9866 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9866">CVE-2016-9866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906070" comment="phpMyAdmin-4.6.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248376" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0.g50-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0.g50-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3630">CVE-2011-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3631">CVE-2011-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3632">CVE-2011-3632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906071" comment="hardlink-1.0.g50-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248377" version="1" class="patch">
	<metadata>
		<title>libXvnc-devel-1.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc-devel-1.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0011">CVE-2014-0011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240">CVE-2014-8240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906072" comment="libXvnc-devel-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906073" comment="libXvnc1-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906074" comment="tigervnc-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906075" comment="xorg-x11-Xvnc-1.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248378" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-actionview-4_2-4.2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2098" ref_url="https://www.suse.com/security/cve/CVE-2016-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-actionview-4_2-4.2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2098/">CVE-2016-2098 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2098">CVE-2016-2098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906076" comment="ruby2.2-rubygem-actionview-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906077" comment="ruby2.2-rubygem-actionview-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906078" comment="ruby2.2-rubygem-actionview-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906079" comment="ruby2.2-rubygem-actionview-doc-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906080" comment="ruby2.3-rubygem-actionview-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906081" comment="ruby2.3-rubygem-actionview-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906082" comment="ruby2.3-rubygem-actionview-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906083" comment="ruby2.3-rubygem-actionview-doc-5_0-5.0.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248379" version="1" class="patch">
	<metadata>
		<title>python-bugzilla-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2191" ref_url="https://www.suse.com/security/cve/CVE-2013-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the python-bugzilla-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2191/">CVE-2013-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2191">CVE-2013-2191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906084" comment="python-bugzilla-1.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248380" version="1" class="patch">
	<metadata>
		<title>gzip-1.8-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.8-1.29 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906085" comment="gzip-1.8-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248381" version="1" class="patch">
	<metadata>
		<title>aria2-1.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3617" ref_url="https://www.suse.com/security/cve/CVE-2009-3617/" source="CVE"/>
		<description>
These are all security issues fixed in the aria2-1.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3617/">CVE-2009-3617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3617">CVE-2009-3617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906086" comment="aria2-1.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906087" comment="aria2-devel-1.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906088" comment="aria2-lang-1.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906089" comment="libaria2-0-1.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248382" version="1" class="patch">
	<metadata>
		<title>libXp-devel-1.0.3-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp-devel-1.0.3-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906090" comment="libXp-devel-1.0.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906091" comment="libXp-devel-32bit-1.0.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906092" comment="libXp6-1.0.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906093" comment="libXp6-32bit-1.0.3-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248383" version="1" class="patch">
	<metadata>
		<title>gd-2.2.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.2.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5116">CVE-2016-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6128">CVE-2016-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6132">CVE-2016-6132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6207">CVE-2016-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6214">CVE-2016-6214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6905">CVE-2016-6905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906094" comment="gd-2.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906095" comment="gd-devel-2.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906096" comment="libgd3-2.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906097" comment="libgd3-32bit-2.2.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248384" version="1" class="patch">
	<metadata>
		<title>libapr1-1.5.2-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.5.2-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906098" comment="libapr1-1.5.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906099" comment="libapr1-devel-1.5.2-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248385" version="1" class="patch">
	<metadata>
		<title>libvlc5-2.2.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2937" ref_url="https://www.suse.com/security/cve/CVE-2010-2937/" source="CVE"/>
		<reference ref_id="CVE-2010-3907" ref_url="https://www.suse.com/security/cve/CVE-2010-3907/" source="CVE"/>
		<reference ref_id="CVE-2011-2587" ref_url="https://www.suse.com/security/cve/CVE-2011-2587/" source="CVE"/>
		<reference ref_id="CVE-2011-2588" ref_url="https://www.suse.com/security/cve/CVE-2011-2588/" source="CVE"/>
		<reference ref_id="CVE-2014-9625" ref_url="https://www.suse.com/security/cve/CVE-2014-9625/" source="CVE"/>
		<reference ref_id="CVE-2015-5949" ref_url="https://www.suse.com/security/cve/CVE-2015-5949/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-5108" ref_url="https://www.suse.com/security/cve/CVE-2016-5108/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-2.2.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2937/">CVE-2010-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2937">CVE-2010-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3907/">CVE-2010-3907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3907">CVE-2010-3907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2587/">CVE-2011-2587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2587">CVE-2011-2587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2588/">CVE-2011-2588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2588">CVE-2011-2588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9625/">CVE-2014-9625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9625">CVE-2014-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5949/">CVE-2015-5949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5949">CVE-2015-5949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5108/">CVE-2016-5108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5108">CVE-2016-5108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906100" comment="libvlc5-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906101" comment="libvlccore8-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906102" comment="vlc-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906103" comment="vlc-codec-gstreamer-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906104" comment="vlc-devel-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906105" comment="vlc-lang-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906106" comment="vlc-noX-2.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906107" comment="vlc-qt-2.2.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248386" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4912">CVE-2016-4912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7567">CVE-2016-7567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906108" comment="openslp-2.0.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906109" comment="openslp-32bit-2.0.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906110" comment="openslp-devel-2.0.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906111" comment="openslp-server-2.0.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248387" version="1" class="patch">
	<metadata>
		<title>python-Django-1.9.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3982" ref_url="https://www.suse.com/security/cve/CVE-2015-3982/" source="CVE"/>
		<reference ref_id="CVE-2015-5145" ref_url="https://www.suse.com/security/cve/CVE-2015-5145/" source="CVE"/>
		<reference ref_id="CVE-2015-5963" ref_url="https://www.suse.com/security/cve/CVE-2015-5963/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Django-1.9.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3982/">CVE-2015-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3982">CVE-2015-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5145/">CVE-2015-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5145">CVE-2015-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5963/">CVE-2015-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5963">CVE-2015-5963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906112" comment="python-Django-1.9.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248388" version="1" class="patch">
	<metadata>
		<title>icecast-2.4.2-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4612" ref_url="https://www.suse.com/security/cve/CVE-2011-4612/" source="CVE"/>
		<reference ref_id="CVE-2014-9018" ref_url="https://www.suse.com/security/cve/CVE-2014-9018/" source="CVE"/>
		<description>
These are all security issues fixed in the icecast-2.4.2-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4612/">CVE-2011-4612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4612">CVE-2011-4612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9018/">CVE-2014-9018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9018">CVE-2014-9018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906113" comment="icecast-2.4.2-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906114" comment="icecast-doc-2.4.2-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248389" version="1" class="patch">
	<metadata>
		<title>libFS-devel-1.0.7-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the libFS-devel-1.0.7-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1996">CVE-2013-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906115" comment="libFS-devel-1.0.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906116" comment="libFS-devel-32bit-1.0.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906117" comment="libFS6-1.0.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906118" comment="libFS6-32bit-1.0.7-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248390" version="1" class="patch">
	<metadata>
		<title>ctdb-4.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0172">CVE-2013-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1863">CVE-2013-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4476">CVE-2013-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6442">CVE-2013-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0239">CVE-2014-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3560">CVE-2014-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8143">CVE-2014-8143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8467">CVE-2015-8467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0771">CVE-2016-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906119" comment="ctdb-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906120" comment="ctdb-pcp-pmda-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906121" comment="ctdb-tests-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906122" comment="libdcerpc-binding0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906123" comment="libdcerpc-binding0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906124" comment="libdcerpc-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906125" comment="libdcerpc-samr-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906126" comment="libdcerpc-samr0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906127" comment="libdcerpc-samr0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906128" comment="libdcerpc0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906129" comment="libdcerpc0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906130" comment="libndr-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906131" comment="libndr-krb5pac-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906132" comment="libndr-krb5pac0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906133" comment="libndr-krb5pac0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906134" comment="libndr-nbt-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906135" comment="libndr-nbt0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906136" comment="libndr-nbt0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906137" comment="libndr-standard-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906138" comment="libndr-standard0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906139" comment="libndr-standard0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906140" comment="libndr0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906141" comment="libndr0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906142" comment="libnetapi-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906143" comment="libnetapi0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906144" comment="libnetapi0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906145" comment="libsamba-credentials-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906146" comment="libsamba-credentials0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906147" comment="libsamba-credentials0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906148" comment="libsamba-errors-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906149" comment="libsamba-errors0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906150" comment="libsamba-errors0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906151" comment="libsamba-hostconfig-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906152" comment="libsamba-hostconfig0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906153" comment="libsamba-hostconfig0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906154" comment="libsamba-passdb-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906155" comment="libsamba-passdb0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906156" comment="libsamba-passdb0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906157" comment="libsamba-policy-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906158" comment="libsamba-policy0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906159" comment="libsamba-policy0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906160" comment="libsamba-util-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906161" comment="libsamba-util0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906162" comment="libsamba-util0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906163" comment="libsamdb-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906164" comment="libsamdb0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906165" comment="libsamdb0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906166" comment="libsmbclient-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906167" comment="libsmbclient0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906168" comment="libsmbclient0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906169" comment="libsmbconf-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906170" comment="libsmbconf0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906171" comment="libsmbconf0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906172" comment="libsmbldap-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906173" comment="libsmbldap0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906174" comment="libsmbldap0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906175" comment="libtevent-util-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906176" comment="libtevent-util0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906177" comment="libtevent-util0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906178" comment="libwbclient-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906179" comment="libwbclient0-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906180" comment="libwbclient0-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906181" comment="samba-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906182" comment="samba-ceph-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906183" comment="samba-client-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906184" comment="samba-client-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906185" comment="samba-core-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906186" comment="samba-doc-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906187" comment="samba-libs-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906188" comment="samba-libs-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906189" comment="samba-pidl-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906190" comment="samba-python-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906191" comment="samba-test-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906192" comment="samba-winbind-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906193" comment="samba-winbind-32bit-4.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248391" version="1" class="patch">
	<metadata>
		<title>mercurial-4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7545" ref_url="https://www.suse.com/security/cve/CVE-2015-7545/" source="CVE"/>
		<reference ref_id="CVE-2016-3068" ref_url="https://www.suse.com/security/cve/CVE-2016-3068/" source="CVE"/>
		<reference ref_id="CVE-2016-3069" ref_url="https://www.suse.com/security/cve/CVE-2016-3069/" source="CVE"/>
		<reference ref_id="CVE-2016-3105" ref_url="https://www.suse.com/security/cve/CVE-2016-3105/" source="CVE"/>
		<reference ref_id="CVE-2016-3630" ref_url="https://www.suse.com/security/cve/CVE-2016-3630/" source="CVE"/>
		<description>
These are all security issues fixed in the mercurial-4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7545/">CVE-2015-7545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7545">CVE-2015-7545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3068/">CVE-2016-3068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3068">CVE-2016-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3069/">CVE-2016-3069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3069">CVE-2016-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3105/">CVE-2016-3105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3105">CVE-2016-3105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3630/">CVE-2016-3630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3630">CVE-2016-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906194" comment="mercurial-4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906195" comment="mercurial-lang-4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248392" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-50.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-2808" ref_url="https://www.suse.com/security/cve/CVE-2012-2808/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1519" ref_url="https://www.suse.com/security/cve/CVE-2014-1519/" source="CVE"/>
		<reference ref_id="CVE-2014-1522" ref_url="https://www.suse.com/security/cve/CVE-2014-1522/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1525" ref_url="https://www.suse.com/security/cve/CVE-2014-1525/" source="CVE"/>
		<reference ref_id="CVE-2014-1526" ref_url="https://www.suse.com/security/cve/CVE-2014-1526/" source="CVE"/>
		<reference ref_id="CVE-2014-1528" ref_url="https://www.suse.com/security/cve/CVE-2014-1528/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1539" ref_url="https://www.suse.com/security/cve/CVE-2014-1539/" source="CVE"/>
		<reference ref_id="CVE-2014-1540" ref_url="https://www.suse.com/security/cve/CVE-2014-1540/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1542" ref_url="https://www.suse.com/security/cve/CVE-2014-1542/" source="CVE"/>
		<reference ref_id="CVE-2014-1543" ref_url="https://www.suse.com/security/cve/CVE-2014-1543/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1549" ref_url="https://www.suse.com/security/cve/CVE-2014-1549/" source="CVE"/>
		<reference ref_id="CVE-2014-1550" ref_url="https://www.suse.com/security/cve/CVE-2014-1550/" source="CVE"/>
		<reference ref_id="CVE-2014-1552" ref_url="https://www.suse.com/security/cve/CVE-2014-1552/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1558" ref_url="https://www.suse.com/security/cve/CVE-2014-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-1559" ref_url="https://www.suse.com/security/cve/CVE-2014-1559/" source="CVE"/>
		<reference ref_id="CVE-2014-1560" ref_url="https://www.suse.com/security/cve/CVE-2014-1560/" source="CVE"/>
		<reference ref_id="CVE-2014-1561" ref_url="https://www.suse.com/security/cve/CVE-2014-1561/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1580" ref_url="https://www.suse.com/security/cve/CVE-2014-1580/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1582" ref_url="https://www.suse.com/security/cve/CVE-2014-1582/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1584" ref_url="https://www.suse.com/security/cve/CVE-2014-1584/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0798" ref_url="https://www.suse.com/security/cve/CVE-2015-0798/" source="CVE"/>
		<reference ref_id="CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799/" source="CVE"/>
		<reference ref_id="CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802/" source="CVE"/>
		<reference ref_id="CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803/" source="CVE"/>
		<reference ref_id="CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804/" source="CVE"/>
		<reference ref_id="CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805/" source="CVE"/>
		<reference ref_id="CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808/" source="CVE"/>
		<reference ref_id="CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810/" source="CVE"/>
		<reference ref_id="CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811/" source="CVE"/>
		<reference ref_id="CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2711" ref_url="https://www.suse.com/security/cve/CVE-2015-2711/" source="CVE"/>
		<reference ref_id="CVE-2015-2712" ref_url="https://www.suse.com/security/cve/CVE-2015-2712/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2715" ref_url="https://www.suse.com/security/cve/CVE-2015-2715/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2717" ref_url="https://www.suse.com/security/cve/CVE-2015-2717/" source="CVE"/>
		<reference ref_id="CVE-2015-2718" ref_url="https://www.suse.com/security/cve/CVE-2015-2718/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2742" ref_url="https://www.suse.com/security/cve/CVE-2015-2742/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4476" ref_url="https://www.suse.com/security/cve/CVE-2015-4476/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4483" ref_url="https://www.suse.com/security/cve/CVE-2015-4483/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4490" ref_url="https://www.suse.com/security/cve/CVE-2015-4490/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4508" ref_url="https://www.suse.com/security/cve/CVE-2015-4508/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7217" ref_url="https://www.suse.com/security/cve/CVE-2015-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7219" ref_url="https://www.suse.com/security/cve/CVE-2015-7219/" source="CVE"/>
		<reference ref_id="CVE-2015-7220" ref_url="https://www.suse.com/security/cve/CVE-2015-7220/" source="CVE"/>
		<reference ref_id="CVE-2015-7221" ref_url="https://www.suse.com/security/cve/CVE-2015-7221/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1933" ref_url="https://www.suse.com/security/cve/CVE-2016-1933/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1939" ref_url="https://www.suse.com/security/cve/CVE-2016-1939/" source="CVE"/>
		<reference ref_id="CVE-2016-1942" ref_url="https://www.suse.com/security/cve/CVE-2016-1942/" source="CVE"/>
		<reference ref_id="CVE-2016-1943" ref_url="https://www.suse.com/security/cve/CVE-2016-1943/" source="CVE"/>
		<reference ref_id="CVE-2016-1944" ref_url="https://www.suse.com/security/cve/CVE-2016-1944/" source="CVE"/>
		<reference ref_id="CVE-2016-1945" ref_url="https://www.suse.com/security/cve/CVE-2016-1945/" source="CVE"/>
		<reference ref_id="CVE-2016-1946" ref_url="https://www.suse.com/security/cve/CVE-2016-1946/" source="CVE"/>
		<reference ref_id="CVE-2016-1947" ref_url="https://www.suse.com/security/cve/CVE-2016-1947/" source="CVE"/>
		<reference ref_id="CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1959" ref_url="https://www.suse.com/security/cve/CVE-2016-1959/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1963" ref_url="https://www.suse.com/security/cve/CVE-2016-1963/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1967" ref_url="https://www.suse.com/security/cve/CVE-2016-1967/" source="CVE"/>
		<reference ref_id="CVE-2016-1968" ref_url="https://www.suse.com/security/cve/CVE-2016-1968/" source="CVE"/>
		<reference ref_id="CVE-2016-1970" ref_url="https://www.suse.com/security/cve/CVE-2016-1970/" source="CVE"/>
		<reference ref_id="CVE-2016-1971" ref_url="https://www.suse.com/security/cve/CVE-2016-1971/" source="CVE"/>
		<reference ref_id="CVE-2016-1972" ref_url="https://www.suse.com/security/cve/CVE-2016-1972/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1975" ref_url="https://www.suse.com/security/cve/CVE-2016-1975/" source="CVE"/>
		<reference ref_id="CVE-2016-1976" ref_url="https://www.suse.com/security/cve/CVE-2016-1976/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809/" source="CVE"/>
		<reference ref_id="CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810/" source="CVE"/>
		<reference ref_id="CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811/" source="CVE"/>
		<reference ref_id="CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812/" source="CVE"/>
		<reference ref_id="CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816/" source="CVE"/>
		<reference ref_id="CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825/" source="CVE"/>
		<reference ref_id="CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832/" source="CVE"/>
		<reference ref_id="CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5253" ref_url="https://www.suse.com/security/cve/CVE-2016-5253/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255/" source="CVE"/>
		<reference ref_id="CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5260" ref_url="https://www.suse.com/security/cve/CVE-2016-5260/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266/" source="CVE"/>
		<reference ref_id="CVE-2016-5267" ref_url="https://www.suse.com/security/cve/CVE-2016-5267/" source="CVE"/>
		<reference ref_id="CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282/" source="CVE"/>
		<reference ref_id="CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287/" source="CVE"/>
		<reference ref_id="CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293/" source="CVE"/>
		<reference ref_id="CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294/" source="CVE"/>
		<reference ref_id="CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298/" source="CVE"/>
		<reference ref_id="CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061/" source="CVE"/>
		<reference ref_id="CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9070" ref_url="https://www.suse.com/security/cve/CVE-2016-9070/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9080" ref_url="https://www.suse.com/security/cve/CVE-2016-9080/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9894" ref_url="https://www.suse.com/security/cve/CVE-2016-9894/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9896" ref_url="https://www.suse.com/security/cve/CVE-2016-9896/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9903" ref_url="https://www.suse.com/security/cve/CVE-2016-9903/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-50.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0068">CVE-2011-0068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0079">CVE-2011-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2366">CVE-2011-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2367">CVE-2011-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2368">CVE-2011-2368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2369">CVE-2011-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2370">CVE-2011-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2375">CVE-2011-2375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2985">CVE-2011-2985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2990">CVE-2011-2990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2991">CVE-2011-2991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2992">CVE-2011-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2993">CVE-2011-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3652">CVE-2011-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3654">CVE-2011-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2808/">CVE-2012-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2808">CVE-2012-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0777">CVE-2013-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0778">CVE-2013-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0779">CVE-2013-0779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0781">CVE-2013-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1669">CVE-2013-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1671">CVE-2013-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1677">CVE-2013-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1678">CVE-2013-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1680">CVE-2013-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1681">CVE-2013-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1683">CVE-2013-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1688">CVE-2013-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1695">CVE-2013-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1696">CVE-2013-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1698">CVE-2013-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1699">CVE-2013-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1704">CVE-2013-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1708">CVE-2013-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1711">CVE-2013-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1719">CVE-2013-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1721">CVE-2013-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5598">CVE-2013-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1519/">CVE-2014-1519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1519">CVE-2014-1519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1522/">CVE-2014-1522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1522">CVE-2014-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1525/">CVE-2014-1525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1525">CVE-2014-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1526/">CVE-2014-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1526">CVE-2014-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1528/">CVE-2014-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1528">CVE-2014-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1539/">CVE-2014-1539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1539">CVE-2014-1539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1540/">CVE-2014-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1540">CVE-2014-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1542/">CVE-2014-1542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1542">CVE-2014-1542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1543/">CVE-2014-1543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1543">CVE-2014-1543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1549/">CVE-2014-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1549">CVE-2014-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1550/">CVE-2014-1550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1550">CVE-2014-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1552/">CVE-2014-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1552">CVE-2014-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1554">CVE-2014-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1558/">CVE-2014-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1558">CVE-2014-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1559/">CVE-2014-1559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1559">CVE-2014-1559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1560/">CVE-2014-1560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1560">CVE-2014-1560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1561/">CVE-2014-1561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1561">CVE-2014-1561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1563">CVE-2014-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1564">CVE-2014-1564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1565">CVE-2014-1565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1580/">CVE-2014-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1580">CVE-2014-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1582/">CVE-2014-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1582">CVE-2014-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1584/">CVE-2014-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1584">CVE-2014-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8642">CVE-2014-8642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8643">CVE-2014-8643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0798/">CVE-2015-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0798">CVE-2015-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0799">CVE-2015-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0800">CVE-2015-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0802">CVE-2015-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0803">CVE-2015-0803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0804">CVE-2015-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0805">CVE-2015-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0806">CVE-2015-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0808">CVE-2015-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0810">CVE-2015-0810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0811">CVE-2015-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0812">CVE-2015-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0819">CVE-2015-0819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0820">CVE-2015-0820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0821">CVE-2015-0821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0823">CVE-2015-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0824">CVE-2015-0824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0825">CVE-2015-0825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0826">CVE-2015-0826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0828">CVE-2015-0828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0829">CVE-2015-0829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0830">CVE-2015-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0832">CVE-2015-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0833">CVE-2015-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0834">CVE-2015-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2706">CVE-2015-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2711/">CVE-2015-2711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2711">CVE-2015-2711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2712/">CVE-2015-2712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2712">CVE-2015-2712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2715/">CVE-2015-2715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2715">CVE-2015-2715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2717/">CVE-2015-2717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2717">CVE-2015-2717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2718/">CVE-2015-2718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2718">CVE-2015-2718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2742/">CVE-2015-2742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2742">CVE-2015-2742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4476/">CVE-2015-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4476">CVE-2015-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4477">CVE-2015-4477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4480">CVE-2015-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4481">CVE-2015-4481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4482">CVE-2015-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4483/">CVE-2015-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4483">CVE-2015-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4490/">CVE-2015-4490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4490">CVE-2015-4490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4493">CVE-2015-4493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4502">CVE-2015-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4503">CVE-2015-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4504">CVE-2015-4504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4505">CVE-2015-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4507">CVE-2015-4507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4508/">CVE-2015-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4508">CVE-2015-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4512">CVE-2015-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4514">CVE-2015-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4515">CVE-2015-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4516">CVE-2015-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4518">CVE-2015-4518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7178">CVE-2015-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7179">CVE-2015-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7184">CVE-2015-7184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7185">CVE-2015-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7186">CVE-2015-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7187">CVE-2015-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7190">CVE-2015-7190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7191">CVE-2015-7191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7192">CVE-2015-7192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7195">CVE-2015-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7203">CVE-2015-7203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7204">CVE-2015-7204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7207">CVE-2015-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7208">CVE-2015-7208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7211">CVE-2015-7211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7215">CVE-2015-7215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7216">CVE-2015-7216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7217/">CVE-2015-7217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7217">CVE-2015-7217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7218">CVE-2015-7218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7219/">CVE-2015-7219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7219">CVE-2015-7219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7220/">CVE-2015-7220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7220">CVE-2015-7220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7221/">CVE-2015-7221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7221">CVE-2015-7221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7223">CVE-2015-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1931">CVE-2016-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1933/">CVE-2016-1933 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1933">CVE-2016-1933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1937">CVE-2016-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1939/">CVE-2016-1939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1939">CVE-2016-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1942/">CVE-2016-1942 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1942">CVE-2016-1942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1943/">CVE-2016-1943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1943">CVE-2016-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1944/">CVE-2016-1944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1944">CVE-2016-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1945/">CVE-2016-1945 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1945">CVE-2016-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1946/">CVE-2016-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1946">CVE-2016-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1947/">CVE-2016-1947 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1947">CVE-2016-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1949">CVE-2016-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1955">CVE-2016-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1956">CVE-2016-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1959/">CVE-2016-1959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1959">CVE-2016-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1963/">CVE-2016-1963 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1963">CVE-2016-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1967/">CVE-2016-1967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1967">CVE-2016-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1968/">CVE-2016-1968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1968">CVE-2016-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1970/">CVE-2016-1970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1970">CVE-2016-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1971/">CVE-2016-1971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1971">CVE-2016-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1972/">CVE-2016-1972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1972">CVE-2016-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1973">CVE-2016-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1975/">CVE-2016-1975 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1975">CVE-2016-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1976/">CVE-2016-1976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1976">CVE-2016-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2804">CVE-2016-2804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2806">CVE-2016-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2809">CVE-2016-2809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2810">CVE-2016-2810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2811">CVE-2016-2811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2812">CVE-2016-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2813">CVE-2016-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2816">CVE-2016-2816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2817">CVE-2016-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2820">CVE-2016-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2825">CVE-2016-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2827">CVE-2016-2827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2829">CVE-2016-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2832">CVE-2016-2832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2833">CVE-2016-2833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5251">CVE-2016-5251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5253/">CVE-2016-5253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5253">CVE-2016-5253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5255">CVE-2016-5255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5256">CVE-2016-5256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5260/">CVE-2016-5260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5260">CVE-2016-5260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5266">CVE-2016-5266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5267/">CVE-2016-5267 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5267">CVE-2016-5267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5268">CVE-2016-5268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5271">CVE-2016-5271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5273">CVE-2016-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5275">CVE-2016-5275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5279">CVE-2016-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5282">CVE-2016-5282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5283">CVE-2016-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5287">CVE-2016-5287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5288">CVE-2016-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5293">CVE-2016-5293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5294">CVE-2016-5294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5295">CVE-2016-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5298">CVE-2016-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5299">CVE-2016-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9061">CVE-2016-9061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9062">CVE-2016-9062 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9065">CVE-2016-9065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9070/">CVE-2016-9070 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9070">CVE-2016-9070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9072">CVE-2016-9072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9078">CVE-2016-9078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9080/">CVE-2016-9080 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9080">CVE-2016-9080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9894/">CVE-2016-9894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9894">CVE-2016-9894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9896/">CVE-2016-9896 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9896">CVE-2016-9896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9903/">CVE-2016-9903 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9903">CVE-2016-9903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906196" comment="MozillaFirefox-50.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906197" comment="MozillaFirefox-branding-upstream-50.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906198" comment="MozillaFirefox-buildsymbols-50.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906199" comment="MozillaFirefox-devel-50.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906200" comment="MozillaFirefox-translations-common-50.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906201" comment="MozillaFirefox-translations-other-50.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248393" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-75.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-75.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0743">CVE-2006-0743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906202" comment="log4net-1.2.10-75.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248394" version="1" class="patch">
	<metadata>
		<title>otrs-3.3.16-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2582" ref_url="https://www.suse.com/security/cve/CVE-2012-2582/" source="CVE"/>
		<reference ref_id="CVE-2012-4600" ref_url="https://www.suse.com/security/cve/CVE-2012-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-4751" ref_url="https://www.suse.com/security/cve/CVE-2012-4751/" source="CVE"/>
		<reference ref_id="CVE-2013-2625" ref_url="https://www.suse.com/security/cve/CVE-2013-2625/" source="CVE"/>
		<reference ref_id="CVE-2013-2637" ref_url="https://www.suse.com/security/cve/CVE-2013-2637/" source="CVE"/>
		<reference ref_id="CVE-2013-3551" ref_url="https://www.suse.com/security/cve/CVE-2013-3551/" source="CVE"/>
		<reference ref_id="CVE-2013-4088" ref_url="https://www.suse.com/security/cve/CVE-2013-4088/" source="CVE"/>
		<reference ref_id="CVE-2013-4717" ref_url="https://www.suse.com/security/cve/CVE-2013-4717/" source="CVE"/>
		<reference ref_id="CVE-2013-4718" ref_url="https://www.suse.com/security/cve/CVE-2013-4718/" source="CVE"/>
		<reference ref_id="CVE-2014-1695" ref_url="https://www.suse.com/security/cve/CVE-2014-1695/" source="CVE"/>
		<reference ref_id="CVE-2014-2553" ref_url="https://www.suse.com/security/cve/CVE-2014-2553/" source="CVE"/>
		<reference ref_id="CVE-2014-2554" ref_url="https://www.suse.com/security/cve/CVE-2014-2554/" source="CVE"/>
		<reference ref_id="CVE-2014-9324" ref_url="https://www.suse.com/security/cve/CVE-2014-9324/" source="CVE"/>
		<reference ref_id="CVE-2016-9139" ref_url="https://www.suse.com/security/cve/CVE-2016-9139/" source="CVE"/>
		<description>
These are all security issues fixed in the otrs-3.3.16-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2582/">CVE-2012-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2582">CVE-2012-2582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4600/">CVE-2012-4600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4600">CVE-2012-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4751/">CVE-2012-4751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4751">CVE-2012-4751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2625/">CVE-2013-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2625">CVE-2013-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2637/">CVE-2013-2637 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2637">CVE-2013-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3551/">CVE-2013-3551 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-3551">CVE-2013-3551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4088/">CVE-2013-4088 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4088">CVE-2013-4088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4717/">CVE-2013-4717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4717">CVE-2013-4717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4718/">CVE-2013-4718 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4718">CVE-2013-4718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1695/">CVE-2014-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1695">CVE-2014-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2553/">CVE-2014-2553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2553">CVE-2014-2553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2554/">CVE-2014-2554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2554">CVE-2014-2554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9324/">CVE-2014-9324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9324">CVE-2014-9324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9139/">CVE-2016-9139 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9139">CVE-2016-9139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906203" comment="otrs-3.3.16-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906204" comment="otrs-doc-3.3.16-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906205" comment="otrs-itsm-3.3.14-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248395" version="1" class="patch">
	<metadata>
		<title>ldb-tools-1.1.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-1.1.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906206" comment="ldb-tools-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906207" comment="libldb-devel-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906208" comment="libldb1-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906209" comment="libldb1-32bit-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906210" comment="python-ldb-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906211" comment="python-ldb-32bit-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906212" comment="python-ldb-devel-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906213" comment="python3-ldb-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906214" comment="python3-ldb-32bit-1.1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906215" comment="python3-ldb-devel-1.1.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248396" version="1" class="patch">
	<metadata>
		<title>cups-2.1.3-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.1.3-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6094">CVE-2012-6094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2856">CVE-2014-2856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906216" comment="cups-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906217" comment="cups-client-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906218" comment="cups-ddk-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906219" comment="cups-devel-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906220" comment="cups-devel-32bit-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906221" comment="cups-libs-2.1.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906222" comment="cups-libs-32bit-2.1.3-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248397" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906223" comment="libgnomesu-2.0.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906224" comment="libgnomesu-devel-2.0.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906225" comment="libgnomesu-lang-2.0.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906226" comment="libgnomesu0-2.0.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248398" version="1" class="patch">
	<metadata>
		<title>expat-2.2.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.2.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906227" comment="expat-2.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906228" comment="libexpat-devel-2.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906229" comment="libexpat-devel-32bit-2.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906230" comment="libexpat1-2.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906231" comment="libexpat1-32bit-2.2.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248399" version="1" class="patch">
	<metadata>
		<title>grub2-2.02~beta3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02~beta3-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906232" comment="grub2-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906233" comment="grub2-branding-upstream-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906234" comment="grub2-i386-efi-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906235" comment="grub2-i386-pc-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906236" comment="grub2-i386-xen-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906237" comment="grub2-snapper-plugin-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906238" comment="grub2-systemd-sleep-plugin-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906239" comment="grub2-x86_64-efi-2.02~beta3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906240" comment="grub2-x86_64-xen-2.02~beta3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248400" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.3-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.3-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1000">CVE-2011-1000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1431">CVE-2013-1431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906241" comment="telepathy-gabble-0.18.3-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906242" comment="telepathy-gabble-xmpp-console-0.18.3-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248401" version="1" class="patch">
	<metadata>
		<title>mumble-1.2.17-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2490" ref_url="https://www.suse.com/security/cve/CVE-2010-2490/" source="CVE"/>
		<reference ref_id="CVE-2012-0863" ref_url="https://www.suse.com/security/cve/CVE-2012-0863/" source="CVE"/>
		<reference ref_id="CVE-2014-0044" ref_url="https://www.suse.com/security/cve/CVE-2014-0044/" source="CVE"/>
		<reference ref_id="CVE-2014-0045" ref_url="https://www.suse.com/security/cve/CVE-2014-0045/" source="CVE"/>
		<reference ref_id="CVE-2014-3755" ref_url="https://www.suse.com/security/cve/CVE-2014-3755/" source="CVE"/>
		<reference ref_id="CVE-2014-3756" ref_url="https://www.suse.com/security/cve/CVE-2014-3756/" source="CVE"/>
		<description>
These are all security issues fixed in the mumble-1.2.17-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2490/">CVE-2010-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2490">CVE-2010-2490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0863/">CVE-2012-0863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0863">CVE-2012-0863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0044/">CVE-2014-0044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0044">CVE-2014-0044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0045/">CVE-2014-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0045">CVE-2014-0045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3755/">CVE-2014-3755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3755">CVE-2014-3755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3756/">CVE-2014-3756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3756">CVE-2014-3756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906243" comment="mumble-1.2.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906244" comment="mumble-32bit-1.2.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906245" comment="mumble-server-1.2.17-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248402" version="1" class="patch">
	<metadata>
		<title>kscreenlocker-5.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2312" ref_url="https://www.suse.com/security/cve/CVE-2016-2312/" source="CVE"/>
		<description>
These are all security issues fixed in the kscreenlocker-5.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2312/">CVE-2016-2312 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2312">CVE-2016-2312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906246" comment="kscreenlocker-5.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906247" comment="kscreenlocker-devel-5.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906248" comment="kscreenlocker-lang-5.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906249" comment="libKScreenLocker5-5.8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248403" version="1" class="patch">
	<metadata>
		<title>id3lib-3.8.3-266.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4460" ref_url="https://www.suse.com/security/cve/CVE-2007-4460/" source="CVE"/>
		<description>
These are all security issues fixed in the id3lib-3.8.3-266.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4460/">CVE-2007-4460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4460">CVE-2007-4460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906250" comment="id3lib-3.8.3-266.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906251" comment="id3lib-32bit-3.8.3-266.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906252" comment="id3lib-devel-3.8.3-266.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906253" comment="id3lib-examples-3.8.3-266.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248404" version="1" class="patch">
	<metadata>
		<title>hplip-3.16.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.16.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6427">CVE-2013-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0839">CVE-2015-0839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906254" comment="hplip-3.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906255" comment="hplip-devel-3.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906256" comment="hplip-hpijs-3.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906257" comment="hplip-sane-3.16.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248405" version="1" class="patch">
	<metadata>
		<title>cacti-0.8.8h-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5588" ref_url="https://www.suse.com/security/cve/CVE-2013-5588/" source="CVE"/>
		<reference ref_id="CVE-2013-5589" ref_url="https://www.suse.com/security/cve/CVE-2013-5589/" source="CVE"/>
		<reference ref_id="CVE-2014-2326" ref_url="https://www.suse.com/security/cve/CVE-2014-2326/" source="CVE"/>
		<reference ref_id="CVE-2014-2327" ref_url="https://www.suse.com/security/cve/CVE-2014-2327/" source="CVE"/>
		<reference ref_id="CVE-2014-2328" ref_url="https://www.suse.com/security/cve/CVE-2014-2328/" source="CVE"/>
		<reference ref_id="CVE-2014-2708" ref_url="https://www.suse.com/security/cve/CVE-2014-2708/" source="CVE"/>
		<reference ref_id="CVE-2014-2709" ref_url="https://www.suse.com/security/cve/CVE-2014-2709/" source="CVE"/>
		<reference ref_id="CVE-2014-4002" ref_url="https://www.suse.com/security/cve/CVE-2014-4002/" source="CVE"/>
		<reference ref_id="CVE-2014-5025" ref_url="https://www.suse.com/security/cve/CVE-2014-5025/" source="CVE"/>
		<reference ref_id="CVE-2014-5026" ref_url="https://www.suse.com/security/cve/CVE-2014-5026/" source="CVE"/>
		<reference ref_id="CVE-2015-4342" ref_url="https://www.suse.com/security/cve/CVE-2015-4342/" source="CVE"/>
		<reference ref_id="CVE-2015-4634" ref_url="https://www.suse.com/security/cve/CVE-2015-4634/" source="CVE"/>
		<reference ref_id="CVE-2015-8369" ref_url="https://www.suse.com/security/cve/CVE-2015-8369/" source="CVE"/>
		<reference ref_id="CVE-2015-8377" ref_url="https://www.suse.com/security/cve/CVE-2015-8377/" source="CVE"/>
		<reference ref_id="CVE-2015-8604" ref_url="https://www.suse.com/security/cve/CVE-2015-8604/" source="CVE"/>
		<reference ref_id="CVE-2016-2313" ref_url="https://www.suse.com/security/cve/CVE-2016-2313/" source="CVE"/>
		<reference ref_id="CVE-2016-3172" ref_url="https://www.suse.com/security/cve/CVE-2016-3172/" source="CVE"/>
		<reference ref_id="CVE-2016-3659" ref_url="https://www.suse.com/security/cve/CVE-2016-3659/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-0.8.8h-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5588/">CVE-2013-5588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5588">CVE-2013-5588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5589/">CVE-2013-5589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5589">CVE-2013-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2326/">CVE-2014-2326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2326">CVE-2014-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2327/">CVE-2014-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2327">CVE-2014-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2328/">CVE-2014-2328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2328">CVE-2014-2328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2708/">CVE-2014-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2708">CVE-2014-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2709/">CVE-2014-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2709">CVE-2014-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4002/">CVE-2014-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4002">CVE-2014-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5025/">CVE-2014-5025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5025">CVE-2014-5025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5026/">CVE-2014-5026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5026">CVE-2014-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4342/">CVE-2015-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4342">CVE-2015-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4634/">CVE-2015-4634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4634">CVE-2015-4634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8369/">CVE-2015-8369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8369">CVE-2015-8369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8377/">CVE-2015-8377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8377">CVE-2015-8377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8604/">CVE-2015-8604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8604">CVE-2015-8604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2313/">CVE-2016-2313 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2313">CVE-2016-2313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3172/">CVE-2016-3172 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3172">CVE-2016-3172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3659/">CVE-2016-3659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3659">CVE-2016-3659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906258" comment="cacti-0.8.8h-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906259" comment="cacti-doc-0.8.8h-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248406" version="1" class="patch">
	<metadata>
		<title>libgssglue-devel-0.4-5.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue-devel-0.4-5.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2709">CVE-2011-2709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906260" comment="libgssglue-devel-0.4-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906261" comment="libgssglue1-0.4-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906262" comment="libgssglue1-32bit-0.4-5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248407" version="1" class="patch">
	<metadata>
		<title>a2ps-4.14-6.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-1377" ref_url="https://www.suse.com/security/cve/CVE-2004-1377/" source="CVE"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the a2ps-4.14-6.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-1377/">CVE-2004-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-1377">CVE-2004-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0466">CVE-2014-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906263" comment="a2ps-4.14-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906264" comment="a2ps-devel-4.14-6.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248408" version="1" class="patch">
	<metadata>
		<title>libtag-devel-1.11-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag-devel-1.11-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2396">CVE-2012-2396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906265" comment="libtag-devel-1.11-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906266" comment="libtag1-1.11-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906267" comment="libtag1-32bit-1.11-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906268" comment="libtag_c0-1.11-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906269" comment="libtag_c0-32bit-1.11-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906270" comment="taglib-1.11-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248409" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto0-2.4.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8627" ref_url="https://www.suse.com/security/cve/CVE-2014-8627/" source="CVE"/>
		<reference ref_id="CVE-2014-8628" ref_url="https://www.suse.com/security/cve/CVE-2014-8628/" source="CVE"/>
		<reference ref_id="CVE-2015-1182" ref_url="https://www.suse.com/security/cve/CVE-2015-1182/" source="CVE"/>
		<reference ref_id="CVE-2015-5291" ref_url="https://www.suse.com/security/cve/CVE-2015-5291/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto0-2.4.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8627/">CVE-2014-8627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8627">CVE-2014-8627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8628/">CVE-2014-8628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8628">CVE-2014-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1182/">CVE-2015-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1182">CVE-2015-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5291/">CVE-2015-5291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5291">CVE-2015-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906271" comment="libmbedcrypto0-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906272" comment="libmbedcrypto0-32bit-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906273" comment="libmbedtls10-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906274" comment="libmbedtls10-32bit-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906275" comment="libmbedx509-0-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906276" comment="libmbedx509-0-32bit-2.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906277" comment="mbedtls-devel-2.4.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248410" version="1" class="patch">
	<metadata>
		<title>remind-3.1.15-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5957" ref_url="https://www.suse.com/security/cve/CVE-2015-5957/" source="CVE"/>
		<description>
These are all security issues fixed in the remind-3.1.15-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5957/">CVE-2015-5957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5957">CVE-2015-5957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906278" comment="remind-3.1.15-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248411" version="1" class="patch">
	<metadata>
		<title>libruby2_3-2_3-2.3.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_3-2_3-2.3.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3900">CVE-2015-3900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906279" comment="libruby2_3-2_3-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906280" comment="ruby2.3-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906281" comment="ruby2.3-devel-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906282" comment="ruby2.3-devel-extra-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906283" comment="ruby2.3-doc-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906284" comment="ruby2.3-doc-ri-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906285" comment="ruby2.3-stdlib-2.3.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906286" comment="ruby2.3-tk-2.3.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248412" version="1" class="patch">
	<metadata>
		<title>shim-0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906287" comment="shim-0.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248413" version="1" class="patch">
	<metadata>
		<title>derby-10.11.1.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4849" ref_url="https://www.suse.com/security/cve/CVE-2005-4849/" source="CVE"/>
		<reference ref_id="CVE-2006-7216" ref_url="https://www.suse.com/security/cve/CVE-2006-7216/" source="CVE"/>
		<reference ref_id="CVE-2006-7217" ref_url="https://www.suse.com/security/cve/CVE-2006-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-1832" ref_url="https://www.suse.com/security/cve/CVE-2015-1832/" source="CVE"/>
		<description>
These are all security issues fixed in the derby-10.11.1.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4849/">CVE-2005-4849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4849">CVE-2005-4849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7216/">CVE-2006-7216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7216">CVE-2006-7216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7217/">CVE-2006-7217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7217">CVE-2006-7217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1832/">CVE-2015-1832 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1832">CVE-2015-1832 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906288" comment="derby-10.11.1.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906289" comment="derby-javadoc-10.11.1.1-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248414" version="1" class="patch">
	<metadata>
		<title>conky-1.10.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3616" ref_url="https://www.suse.com/security/cve/CVE-2011-3616/" source="CVE"/>
		<description>
These are all security issues fixed in the conky-1.10.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3616/">CVE-2011-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3616">CVE-2011-3616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906290" comment="conky-1.10.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906291" comment="conky-doc-1.10.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906292" comment="nano-plugin-conky-1.10.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906293" comment="vim-plugin-conky-1.10.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248415" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20160915.106a00d-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20160915.106a00d-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906294" comment="aaa_base-13.2+git20160915.106a00d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906295" comment="aaa_base-extras-13.2+git20160915.106a00d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906296" comment="aaa_base-malloccheck-13.2+git20160915.106a00d-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248416" version="1" class="patch">
	<metadata>
		<title>percona-toolkit-2.2.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2029" ref_url="https://www.suse.com/security/cve/CVE-2014-2029/" source="CVE"/>
		<reference ref_id="CVE-2015-1027" ref_url="https://www.suse.com/security/cve/CVE-2015-1027/" source="CVE"/>
		<description>
These are all security issues fixed in the percona-toolkit-2.2.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2029/">CVE-2014-2029 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2029">CVE-2014-2029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1027/">CVE-2015-1027 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1027">CVE-2015-1027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906297" comment="percona-toolkit-2.2.18-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248417" version="1" class="patch">
	<metadata>
		<title>jhead-3.00-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4575" ref_url="https://www.suse.com/security/cve/CVE-2008-4575/" source="CVE"/>
		<reference ref_id="CVE-2008-4641" ref_url="https://www.suse.com/security/cve/CVE-2008-4641/" source="CVE"/>
		<description>
These are all security issues fixed in the jhead-3.00-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4575/">CVE-2008-4575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4575">CVE-2008-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4641/">CVE-2008-4641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4641">CVE-2008-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906298" comment="jhead-3.00-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248418" version="1" class="patch">
	<metadata>
		<title>logwatch-7.4.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.4.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906299" comment="logwatch-7.4.3-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248419" version="1" class="patch">
	<metadata>
		<title>python-pip-8.1.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pip-8.1.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906300" comment="python-pip-8.1.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906301" comment="python3-pip-9.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248420" version="1" class="patch">
	<metadata>
		<title>git-2.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2186" ref_url="https://www.suse.com/security/cve/CVE-2011-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2186/">CVE-2011-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2186">CVE-2011-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9390">CVE-2014-9390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906302" comment="git-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906303" comment="git-arch-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906304" comment="git-core-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906305" comment="git-credential-gnome-keyring-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906306" comment="git-cvs-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906307" comment="git-daemon-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906308" comment="git-doc-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906309" comment="git-email-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906310" comment="git-gui-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906311" comment="git-svn-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906312" comment="git-web-2.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906313" comment="gitk-2.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248421" version="1" class="patch">
	<metadata>
		<title>python3-3.5.1-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-3.5.1-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906314" comment="python3-3.5.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906315" comment="python3-32bit-3.5.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906316" comment="python3-curses-3.5.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906317" comment="python3-dbm-3.5.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906318" comment="python3-tk-3.5.1-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248422" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906319" comment="pcsc-ccid-1.4.25-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248423" version="1" class="patch">
	<metadata>
		<title>gpg2-2.1.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.1.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906320" comment="gpg2-2.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906321" comment="gpg2-lang-2.1.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248424" version="1" class="patch">
	<metadata>
		<title>colord-1.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4349">CVE-2011-4349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906322" comment="colord-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906323" comment="colord-gtk-0.1.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906324" comment="colord-gtk-lang-0.1.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906325" comment="colord-lang-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906326" comment="libcolord-devel-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906327" comment="libcolord-gtk-devel-0.1.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906328" comment="libcolord-gtk1-0.1.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906329" comment="libcolord-gtk1-32bit-0.1.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906330" comment="libcolord2-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906331" comment="libcolord2-32bit-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906332" comment="libcolorhug2-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906333" comment="typelib-1_0-ColorHug-1_0-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906334" comment="typelib-1_0-Colord-1_0-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906335" comment="typelib-1_0-ColordGtk-1_0-0.1.26-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248425" version="1" class="patch">
	<metadata>
		<title>znc-1.6.3-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0033" ref_url="https://www.suse.com/security/cve/CVE-2012-0033/" source="CVE"/>
		<reference ref_id="CVE-2014-9043" ref_url="https://www.suse.com/security/cve/CVE-2014-9043/" source="CVE"/>
		<description>
These are all security issues fixed in the znc-1.6.3-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0033/">CVE-2012-0033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0033">CVE-2012-0033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9043/">CVE-2014-9043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9043">CVE-2014-9043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906336" comment="znc-1.6.3-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906337" comment="znc-devel-1.6.3-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906338" comment="znc-perl-1.6.3-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906339" comment="znc-python3-1.6.3-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906340" comment="znc-tcl-1.6.3-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248426" version="1" class="patch">
	<metadata>
		<title>gnutls-3.4.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.4.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1569">CVE-2012-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1573">CVE-2012-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1959">CVE-2014-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6251">CVE-2015-6251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906341" comment="gnutls-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906342" comment="gnutls-guile-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906343" comment="libgnutls-dane-devel-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906344" comment="libgnutls-dane0-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906345" comment="libgnutls-devel-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906346" comment="libgnutls-devel-32bit-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906347" comment="libgnutls-openssl-devel-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906348" comment="libgnutls-openssl27-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906349" comment="libgnutls30-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906350" comment="libgnutls30-32bit-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906351" comment="libgnutlsxx-devel-3.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906352" comment="libgnutlsxx28-3.4.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248427" version="1" class="patch">
	<metadata>
		<title>bash-4.4-92.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.4-92.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6277">CVE-2014-6277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278">CVE-2014-6278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906353" comment="bash-4.4-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906354" comment="bash-devel-4.4-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906355" comment="bash-doc-4.4-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906356" comment="bash-lang-4.4-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906357" comment="bash-loadables-4.4-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906358" comment="libreadline7-7.0-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906359" comment="libreadline7-32bit-7.0-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906360" comment="readline-devel-7.0-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906361" comment="readline-devel-32bit-7.0-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906362" comment="readline-doc-7.0-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248428" version="1" class="patch">
	<metadata>
		<title>gummi-0.7.4.3-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7758" ref_url="https://www.suse.com/security/cve/CVE-2015-7758/" source="CVE"/>
		<description>
These are all security issues fixed in the gummi-0.7.4.3-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7758/">CVE-2015-7758 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7758">CVE-2015-7758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906363" comment="gummi-0.7.4.3-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906364" comment="gummi-lang-0.7.4.3-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248429" version="1" class="patch">
	<metadata>
		<title>obs-service-set_version-0.5.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0593" ref_url="https://www.suse.com/security/cve/CVE-2014-0593/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-set_version-0.5.3-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0593/">CVE-2014-0593 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0593">CVE-2014-0593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906365" comment="obs-service-set_version-0.5.3-4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248430" version="1" class="patch">
	<metadata>
		<title>libmms-devel-0.6.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms-devel-0.6.4-4.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2892">CVE-2014-2892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906366" comment="libmms-devel-0.6.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906367" comment="libmms0-0.6.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906368" comment="libmms0-32bit-0.6.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248431" version="1" class="patch">
	<metadata>
		<title>freerdp-2.0.0~git.1463131968.4e66df7-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.0.0~git.1463131968.4e66df7-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0250">CVE-2014-0250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0791">CVE-2014-0791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906369" comment="freerdp-2.0.0~git.1463131968.4e66df7-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906370" comment="freerdp-devel-2.0.0~git.1463131968.4e66df7-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906371" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248432" version="1" class="patch">
	<metadata>
		<title>crash-7.1.5-3.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the crash-7.1.5-3.51 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906372" comment="crash-7.1.5-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906373" comment="crash-devel-7.1.5-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906374" comment="crash-doc-7.1.5-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906375" comment="crash-eppic-7.1.5-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906376" comment="crash-gcore-7.1.5-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906377" comment="crash-kmp-default-7.1.5_k4.8.13_1-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906378" comment="crash-kmp-pae-7.1.5_k4.8.13_1-3.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248433" version="1" class="patch">
	<metadata>
		<title>systemd-ui-3-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<description>
These are all security issues fixed in the systemd-ui-3-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1174">CVE-2012-1174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906379" comment="systemd-ui-3-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248434" version="1" class="patch">
	<metadata>
		<title>libzip-devel-1.1.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip-devel-1.1.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1162">CVE-2012-1162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1163">CVE-2012-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906380" comment="libzip-devel-1.1.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906381" comment="libzip-tools-1.1.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906382" comment="libzip4-1.1.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906383" comment="libzip4-32bit-1.1.3-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248435" version="1" class="patch">
	<metadata>
		<title>haproxy-1.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2391" ref_url="https://www.suse.com/security/cve/CVE-2012-2391/" source="CVE"/>
		<reference ref_id="CVE-2013-1912" ref_url="https://www.suse.com/security/cve/CVE-2013-1912/" source="CVE"/>
		<reference ref_id="CVE-2013-2175" ref_url="https://www.suse.com/security/cve/CVE-2013-2175/" source="CVE"/>
		<reference ref_id="CVE-2014-6269" ref_url="https://www.suse.com/security/cve/CVE-2014-6269/" source="CVE"/>
		<reference ref_id="CVE-2015-3281" ref_url="https://www.suse.com/security/cve/CVE-2015-3281/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-1.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2391/">CVE-2012-2391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2391">CVE-2012-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1912/">CVE-2013-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1912">CVE-2013-1912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2175/">CVE-2013-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2175">CVE-2013-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6269/">CVE-2014-6269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6269">CVE-2014-6269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3281/">CVE-2015-3281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3281">CVE-2015-3281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906384" comment="haproxy-1.7.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248436" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-rack-1_4-1.4.7-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-rack-1_4-1.4.7-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906385" comment="ruby2.2-rubygem-rack-1_4-1.4.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906386" comment="ruby2.2-rubygem-rack-doc-1_4-1.4.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906387" comment="ruby2.2-rubygem-rack-testsuite-1_4-1.4.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906388" comment="ruby2.3-rubygem-rack-1_4-1.4.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906389" comment="ruby2.3-rubygem-rack-doc-1_4-1.4.7-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906390" comment="ruby2.3-rubygem-rack-testsuite-1_4-1.4.7-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248437" version="1" class="patch">
	<metadata>
		<title>libvarnishapi1-5.0.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4484" ref_url="https://www.suse.com/security/cve/CVE-2013-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi1-5.0.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4484/">CVE-2013-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4484">CVE-2013-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906391" comment="libvarnishapi1-5.0.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906392" comment="varnish-5.0.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906393" comment="varnish-devel-5.0.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248438" version="1" class="patch">
	<metadata>
		<title>libXinerama-devel-1.1.3-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama-devel-1.1.3-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906394" comment="libXinerama-devel-1.1.3-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906395" comment="libXinerama-devel-32bit-1.1.3-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906396" comment="libXinerama1-1.1.3-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906397" comment="libXinerama1-32bit-1.1.3-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248439" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-108-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-108-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1835">CVE-2011-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1836">CVE-2011-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1837">CVE-2011-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9687">CVE-2014-9687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1572">CVE-2016-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906398" comment="ecryptfs-utils-108-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906399" comment="ecryptfs-utils-32bit-108-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906400" comment="ecryptfs-utils-devel-108-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906401" comment="ecryptfs-utils-devel-32bit-108-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906402" comment="libecryptfs1-108-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906403" comment="libecryptfs1-32bit-108-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248440" version="1" class="patch">
	<metadata>
		<title>quassel-base-0.12.4-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4422" ref_url="https://www.suse.com/security/cve/CVE-2013-4422/" source="CVE"/>
		<reference ref_id="CVE-2015-8547" ref_url="https://www.suse.com/security/cve/CVE-2015-8547/" source="CVE"/>
		<reference ref_id="CVE-2016-4414" ref_url="https://www.suse.com/security/cve/CVE-2016-4414/" source="CVE"/>
		<description>
These are all security issues fixed in the quassel-base-0.12.4-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4422/">CVE-2013-4422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4422">CVE-2013-4422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8547/">CVE-2015-8547 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8547">CVE-2015-8547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4414/">CVE-2016-4414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4414">CVE-2016-4414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906404" comment="quassel-base-0.12.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906405" comment="quassel-client-0.12.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906406" comment="quassel-client-qt5-0.12.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906407" comment="quassel-core-0.12.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906408" comment="quassel-mono-0.12.4-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248441" version="1" class="patch">
	<metadata>
		<title>xtrabackup-2.3.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6394" ref_url="https://www.suse.com/security/cve/CVE-2013-6394/" source="CVE"/>
		<reference ref_id="CVE-2014-2029" ref_url="https://www.suse.com/security/cve/CVE-2014-2029/" source="CVE"/>
		<reference ref_id="CVE-2015-1027" ref_url="https://www.suse.com/security/cve/CVE-2015-1027/" source="CVE"/>
		<description>
These are all security issues fixed in the xtrabackup-2.3.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6394/">CVE-2013-6394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6394">CVE-2013-6394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2029/">CVE-2014-2029 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2029">CVE-2014-2029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1027/">CVE-2015-1027 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1027">CVE-2015-1027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906409" comment="xtrabackup-2.3.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906410" comment="xtrabackup-test-2.3.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248442" version="1" class="patch">
	<metadata>
		<title>libunbound-devel-mini-1.5.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8602" ref_url="https://www.suse.com/security/cve/CVE-2014-8602/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound-devel-mini-1.5.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8602/">CVE-2014-8602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8602">CVE-2014-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906411" comment="libunbound-devel-mini-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906412" comment="libunbound2-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906413" comment="unbound-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906414" comment="unbound-anchor-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906415" comment="unbound-devel-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906416" comment="unbound-munin-1.5.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906417" comment="unbound-python-1.5.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248443" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906418" comment="rpcbind-0.2.3-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248444" version="1" class="patch">
	<metadata>
		<title>iputils-s20160308-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20160308-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2529">CVE-2010-2529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906419" comment="iputils-s20160308-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248445" version="1" class="patch">
	<metadata>
		<title>python-dulwich-0.12.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0838" ref_url="https://www.suse.com/security/cve/CVE-2015-0838/" source="CVE"/>
		<description>
These are all security issues fixed in the python-dulwich-0.12.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0838/">CVE-2015-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0838">CVE-2015-0838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906420" comment="python-dulwich-0.12.0-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248446" version="1" class="patch">
	<metadata>
		<title>python-requests-2.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1830">CVE-2014-1830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906421" comment="python-requests-2.11.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248447" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.3.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.3.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906422" comment="libksba-devel-1.3.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906423" comment="libksba8-1.3.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248448" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0211">CVE-2013-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8917">CVE-2015-8917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8933">CVE-2015-8933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4301">CVE-2016-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8688">CVE-2016-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8689">CVE-2016-8689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906424" comment="bsdtar-3.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906425" comment="libarchive-devel-3.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906426" comment="libarchive13-3.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906427" comment="libarchive13-32bit-3.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248449" version="1" class="patch">
	<metadata>
		<title>kernel-debug-4.8.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1581" ref_url="https://www.suse.com/security/cve/CVE-2011-1581/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3520" ref_url="https://www.suse.com/security/cve/CVE-2012-3520/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6187" ref_url="https://www.suse.com/security/cve/CVE-2016-6187/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6516" ref_url="https://www.suse.com/security/cve/CVE-2016-6516/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1436">CVE-2010-1436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1180">CVE-2011-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1581/">CVE-2011-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1581">CVE-2011-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4604">CVE-2011-4604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3520/">CVE-2012-3520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3520">CVE-2012-3520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2850">CVE-2013-2850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0038">CVE-2014-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0691">CVE-2014-0691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1333">CVE-2015-1333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7550">CVE-2015-7550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7884">CVE-2015-7884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7885">CVE-2015-7885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8660">CVE-2015-8660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0728">CVE-2016-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1237">CVE-2016-1237 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3135">CVE-2016-3135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3136">CVE-2016-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3689">CVE-2016-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3713">CVE-2016-3713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4557">CVE-2016-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4558">CVE-2016-4558 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4951">CVE-2016-4951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4998">CVE-2016-4998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6187/">CVE-2016-6187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6187">CVE-2016-6187 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6516/">CVE-2016-6516 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6516">CVE-2016-6516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7039">CVE-2016-7039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7913">CVE-2016-7913 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906428" comment="kernel-debug-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906429" comment="kernel-debug-base-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906431" comment="kernel-default-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906432" comment="kernel-default-base-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906435" comment="kernel-docs-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906436" comment="kernel-docs-html-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906437" comment="kernel-docs-pdf-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906438" comment="kernel-macros-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906439" comment="kernel-obs-build-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906440" comment="kernel-obs-qa-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906441" comment="kernel-pae-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906442" comment="kernel-pae-base-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906444" comment="kernel-source-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906445" comment="kernel-source-vanilla-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906446" comment="kernel-syms-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906447" comment="kernel-syzkaller-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906448" comment="kernel-syzkaller-base-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906450" comment="kernel-vanilla-4.8.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906451" comment="kernel-vanilla-base-4.8.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248450" version="1" class="patch">
	<metadata>
		<title>python-Jinja2-2.8-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Jinja2-2.8-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0012">CVE-2014-0012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906453" comment="python-Jinja2-2.8-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906454" comment="python-Jinja2-emacs-2.8-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906455" comment="python-Jinja2-vim-2.8-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248451" version="1" class="patch">
	<metadata>
		<title>flac-1.3.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-1.3.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906456" comment="flac-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906457" comment="flac-devel-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906458" comment="flac-devel-32bit-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906459" comment="flac-doc-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906460" comment="libFLAC++6-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906461" comment="libFLAC++6-32bit-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906462" comment="libFLAC8-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906463" comment="libFLAC8-32bit-1.3.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248452" version="1" class="patch">
	<metadata>
		<title>libXrender-devel-0.9.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender-devel-0.9.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906464" comment="libXrender-devel-0.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906465" comment="libXrender-devel-32bit-0.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906466" comment="libXrender1-0.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906467" comment="libXrender1-32bit-0.9.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248453" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-37.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-37.82 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906468" comment="bzip2-1.0.6-37.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906469" comment="bzip2-doc-1.0.6-37.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906470" comment="libbz2-1-1.0.6-37.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906471" comment="libbz2-1-32bit-1.0.6-37.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906472" comment="libbz2-devel-1.0.6-37.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906473" comment="libbz2-devel-32bit-1.0.6-37.82 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248454" version="1" class="patch">
	<metadata>
		<title>osc-0.155.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1095" ref_url="https://www.suse.com/security/cve/CVE-2012-1095/" source="CVE"/>
		<reference ref_id="CVE-2015-0778" ref_url="https://www.suse.com/security/cve/CVE-2015-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the osc-0.155.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1095/">CVE-2012-1095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1095">CVE-2012-1095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0778/">CVE-2015-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0778">CVE-2015-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906474" comment="osc-0.155.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248455" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.45-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.45-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4143">CVE-2013-4143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906475" comment="xlockmore-5.45-3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248456" version="1" class="patch">
	<metadata>
		<title>sddm-0.14.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7271" ref_url="https://www.suse.com/security/cve/CVE-2014-7271/" source="CVE"/>
		<reference ref_id="CVE-2014-7272" ref_url="https://www.suse.com/security/cve/CVE-2014-7272/" source="CVE"/>
		<reference ref_id="CVE-2015-0856" ref_url="https://www.suse.com/security/cve/CVE-2015-0856/" source="CVE"/>
		<description>
These are all security issues fixed in the sddm-0.14.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7271/">CVE-2014-7271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7271">CVE-2014-7271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7272/">CVE-2014-7272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7272">CVE-2014-7272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0856/">CVE-2015-0856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0856">CVE-2015-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906476" comment="sddm-0.14.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906477" comment="sddm-branding-openSUSE-0.14.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906478" comment="sddm-branding-upstream-0.14.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248457" version="1" class="patch">
	<metadata>
		<title>pdns-4.0.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0206" ref_url="https://www.suse.com/security/cve/CVE-2012-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-1868" ref_url="https://www.suse.com/security/cve/CVE-2015-1868/" source="CVE"/>
		<reference ref_id="CVE-2015-5230" ref_url="https://www.suse.com/security/cve/CVE-2015-5230/" source="CVE"/>
		<reference ref_id="CVE-2016-6172" ref_url="https://www.suse.com/security/cve/CVE-2016-6172/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-4.0.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0206/">CVE-2012-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0206">CVE-2012-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1868/">CVE-2015-1868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1868">CVE-2015-1868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5230/">CVE-2015-5230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5230">CVE-2015-5230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6172/">CVE-2016-6172 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6172">CVE-2016-6172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906479" comment="pdns-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906480" comment="pdns-backend-geoip-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906481" comment="pdns-backend-godbc-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906482" comment="pdns-backend-ldap-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906483" comment="pdns-backend-lua-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906484" comment="pdns-backend-mydns-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906485" comment="pdns-backend-mysql-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906486" comment="pdns-backend-postgresql-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906487" comment="pdns-backend-remote-4.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906488" comment="pdns-backend-sqlite3-4.0.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248458" version="1" class="patch">
	<metadata>
		<title>cgit-1.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2711" ref_url="https://www.suse.com/security/cve/CVE-2011-2711/" source="CVE"/>
		<reference ref_id="CVE-2012-4465" ref_url="https://www.suse.com/security/cve/CVE-2012-4465/" source="CVE"/>
		<reference ref_id="CVE-2012-4548" ref_url="https://www.suse.com/security/cve/CVE-2012-4548/" source="CVE"/>
		<reference ref_id="CVE-2013-2117" ref_url="https://www.suse.com/security/cve/CVE-2013-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-1899" ref_url="https://www.suse.com/security/cve/CVE-2016-1899/" source="CVE"/>
		<reference ref_id="CVE-2016-1900" ref_url="https://www.suse.com/security/cve/CVE-2016-1900/" source="CVE"/>
		<reference ref_id="CVE-2016-1901" ref_url="https://www.suse.com/security/cve/CVE-2016-1901/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<description>
These are all security issues fixed in the cgit-1.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2711/">CVE-2011-2711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2711">CVE-2011-2711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4465/">CVE-2012-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4465">CVE-2012-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4548/">CVE-2012-4548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4548">CVE-2012-4548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2117/">CVE-2013-2117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2117">CVE-2013-2117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1899/">CVE-2016-1899 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1899">CVE-2016-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1900/">CVE-2016-1900 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1900">CVE-2016-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1901/">CVE-2016-1901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1901">CVE-2016-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906489" comment="cgit-1.0-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248459" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906490" comment="yast2-core-3.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906491" comment="yast2-core-debugger-3.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906492" comment="yast2-core-devel-3.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248460" version="1" class="patch">
	<metadata>
		<title>cron-4.2-65.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-65.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906493" comment="cron-4.2-65.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906494" comment="cronie-1.5.0-65.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906495" comment="cronie-anacron-1.5.0-65.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248461" version="1" class="patch">
	<metadata>
		<title>optipng-0.7.6-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2191" ref_url="https://www.suse.com/security/cve/CVE-2016-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the optipng-0.7.6-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2191/">CVE-2016-2191 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2191">CVE-2016-2191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906496" comment="optipng-0.7.6-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248462" version="1" class="patch">
	<metadata>
		<title>enigmail-1.9.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-5369" ref_url="https://www.suse.com/security/cve/CVE-2014-5369/" source="CVE"/>
		<description>
These are all security issues fixed in the enigmail-1.9.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5369/">CVE-2014-5369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5369">CVE-2014-5369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906497" comment="enigmail-1.9.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248463" version="1" class="patch">
	<metadata>
		<title>gnugk-4.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3534" ref_url="https://www.suse.com/security/cve/CVE-2012-3534/" source="CVE"/>
		<description>
These are all security issues fixed in the gnugk-4.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3534/">CVE-2012-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3534">CVE-2012-3534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906498" comment="gnugk-4.2-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248464" version="1" class="patch">
	<metadata>
		<title>cpio-2.12-3.90 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.12-3.90 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906499" comment="cpio-2.12-3.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906500" comment="cpio-lang-2.12-3.90 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248465" version="1" class="patch">
	<metadata>
		<title>python-suds-jurko-0.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python-suds-jurko-0.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906501" comment="python-suds-jurko-0.6-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248466" version="1" class="patch">
	<metadata>
		<title>iperf-3.1.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-4303" ref_url="https://www.suse.com/security/cve/CVE-2016-4303/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.1.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4303/">CVE-2016-4303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4303">CVE-2016-4303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906502" comment="iperf-3.1.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906503" comment="iperf-devel-3.1.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906504" comment="libiperf0-3.1.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248467" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.94-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.94-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2451">CVE-2012-2451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906505" comment="perl-Config-IniFiles-2.94-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248468" version="1" class="patch">
	<metadata>
		<title>libcares-devel-1.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares-devel-1.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906506" comment="libcares-devel-1.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906507" comment="libcares2-1.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906508" comment="libcares2-32bit-1.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248469" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.0.26-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.0.26-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8075">CVE-2015-8075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906509" comment="libsndfile-devel-1.0.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906510" comment="libsndfile1-1.0.26-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906511" comment="libsndfile1-32bit-1.0.26-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248470" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1601">CVE-2016-1601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906512" comment="yast2-users-3.2.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248471" version="1" class="patch">
	<metadata>
		<title>openvswitch-2.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the openvswitch-2.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3449">CVE-2012-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906513" comment="openvswitch-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906514" comment="openvswitch-devel-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906515" comment="openvswitch-dpdk-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906516" comment="openvswitch-dpdk-devel-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906517" comment="openvswitch-dpdk-ovn-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906518" comment="openvswitch-dpdk-pki-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906519" comment="openvswitch-dpdk-switch-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906520" comment="openvswitch-dpdk-test-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906521" comment="openvswitch-dpdk-vtep-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906522" comment="openvswitch-ovn-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906523" comment="openvswitch-pki-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906524" comment="openvswitch-switch-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906525" comment="openvswitch-test-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906526" comment="openvswitch-vtep-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906527" comment="python-openvswitch-2.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906528" comment="python-openvswitch-test-2.6.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248472" version="1" class="patch">
	<metadata>
		<title>xzgv-0.9.1-27.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1060" ref_url="https://www.suse.com/security/cve/CVE-2006-1060/" source="CVE"/>
		<description>
These are all security issues fixed in the xzgv-0.9.1-27.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1060/">CVE-2006-1060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1060">CVE-2006-1060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906529" comment="xzgv-0.9.1-27.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248473" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.4.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906530" comment="NetworkManager-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906531" comment="NetworkManager-branding-upstream-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906532" comment="NetworkManager-devel-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906533" comment="NetworkManager-devel-32bit-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906534" comment="NetworkManager-lang-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906535" comment="libnm-glib-vpn1-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906536" comment="libnm-glib-vpn1-32bit-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906537" comment="libnm-glib4-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906538" comment="libnm-glib4-32bit-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906539" comment="libnm-util2-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906540" comment="libnm-util2-32bit-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906541" comment="libnm0-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906542" comment="typelib-1_0-NM-1_0-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906543" comment="typelib-1_0-NMClient-1_0-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906544" comment="typelib-1_0-NetworkManager-1_0-1.4.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248474" version="1" class="patch">
	<metadata>
		<title>libmysqlclient-devel-10.0.22-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2012-4414" ref_url="https://www.suse.com/security/cve/CVE-2012-4414/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2012-5627" ref_url="https://www.suse.com/security/cve/CVE-2012-5627/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient-devel-10.0.22-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5970">CVE-2007-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4414/">CVE-2012-4414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4414">CVE-2012-4414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5612">CVE-2012-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5627/">CVE-2012-5627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5627">CVE-2012-5627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4807">CVE-2015-4807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5969">CVE-2015-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906545" comment="libmysqlclient-devel-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906546" comment="libmysqlclient18-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906547" comment="libmysqlclient18-32bit-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906548" comment="libmysqlclient_r18-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906549" comment="libmysqlclient_r18-32bit-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906550" comment="libmysqld-devel-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906551" comment="libmysqld18-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906552" comment="mariadb-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906553" comment="mariadb-bench-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906554" comment="mariadb-client-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906555" comment="mariadb-errormessages-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906556" comment="mariadb-test-10.0.22-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906557" comment="mariadb-tools-10.0.22-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248475" version="1" class="patch">
	<metadata>
		<title>glibc-2.24-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.24-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5417">CVE-2016-5417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906558" comment="glibc-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906559" comment="glibc-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906560" comment="glibc-devel-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906561" comment="glibc-devel-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906562" comment="glibc-devel-static-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906563" comment="glibc-devel-static-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906564" comment="glibc-extra-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906565" comment="glibc-html-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906566" comment="glibc-i18ndata-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906567" comment="glibc-info-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906568" comment="glibc-locale-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906569" comment="glibc-locale-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906570" comment="glibc-obsolete-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906571" comment="glibc-profile-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906572" comment="glibc-profile-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906573" comment="glibc-utils-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906574" comment="glibc-utils-32bit-2.24-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906575" comment="nscd-2.24-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248476" version="1" class="patch">
	<metadata>
		<title>klogd-1.4.1-786.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the klogd-1.4.1-786.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906576" comment="klogd-1.4.1-786.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906577" comment="syslog-service-2.0-786.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906578" comment="syslogd-1.4.1-786.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248477" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.17.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.17.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2126">CVE-2013-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2127">CVE-2013-2127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8367">CVE-2015-8367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906579" comment="libraw-devel-0.17.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906580" comment="libraw-devel-static-0.17.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906581" comment="libraw-tools-0.17.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906582" comment="libraw15-0.17.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248478" version="1" class="patch">
	<metadata>
		<title>389-ds-1.3.4.14-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8105" ref_url="https://www.suse.com/security/cve/CVE-2014-8105/" source="CVE"/>
		<reference ref_id="CVE-2014-8112" ref_url="https://www.suse.com/security/cve/CVE-2014-8112/" source="CVE"/>
		<reference ref_id="CVE-2015-1854" ref_url="https://www.suse.com/security/cve/CVE-2015-1854/" source="CVE"/>
		<reference ref_id="CVE-2015-3230" ref_url="https://www.suse.com/security/cve/CVE-2015-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-1.3.4.14-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8105/">CVE-2014-8105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8105">CVE-2014-8105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8112/">CVE-2014-8112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8112">CVE-2014-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1854/">CVE-2015-1854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1854">CVE-2015-1854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3230/">CVE-2015-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3230">CVE-2015-3230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906583" comment="389-ds-1.3.4.14-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906584" comment="389-ds-devel-1.3.4.14-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248479" version="1" class="patch">
	<metadata>
		<title>dovecot22-2.2.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3430" ref_url="https://www.suse.com/security/cve/CVE-2014-3430/" source="CVE"/>
		<reference ref_id="CVE-2016-4983" ref_url="https://www.suse.com/security/cve/CVE-2016-4983/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot22-2.2.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3430/">CVE-2014-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3430">CVE-2014-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4983/">CVE-2016-4983 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4983">CVE-2016-4983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906585" comment="dovecot22-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906586" comment="dovecot22-backend-mysql-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906587" comment="dovecot22-backend-pgsql-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906588" comment="dovecot22-backend-sqlite-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906589" comment="dovecot22-devel-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906590" comment="dovecot22-fts-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906591" comment="dovecot22-fts-lucene-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906592" comment="dovecot22-fts-solr-2.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906593" comment="dovecot22-fts-squat-2.2.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248480" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6746">CVE-2007-6746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906594" comment="telepathy-idle-0.2.0-3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248481" version="1" class="patch">
	<metadata>
		<title>libIlmImf-2_2-22-2.2.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-2_2-22-2.2.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906595" comment="libIlmImf-2_2-22-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906596" comment="libIlmImf-2_2-22-32bit-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906597" comment="libIlmImfUtil-2_2-22-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906598" comment="libIlmImfUtil-2_2-22-32bit-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906599" comment="openexr-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906600" comment="openexr-devel-2.2.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906601" comment="openexr-doc-2.2.0-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248482" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.9-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.9-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906602" comment="apache2-mod_perl-2.0.9-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906603" comment="apache2-mod_perl-devel-2.0.9-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248483" version="1" class="patch">
	<metadata>
		<title>python3-Twisted-16.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1000111" ref_url="https://www.suse.com/security/cve/CVE-2016-1000111/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Twisted-16.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000111/">CVE-2016-1000111 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000111">CVE-2016-1000111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906604" comment="python3-Twisted-16.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906605" comment="python3-Twisted-doc-16.4.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248484" version="1" class="patch">
	<metadata>
		<title>lua-rrdtool-1.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the lua-rrdtool-1.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2131">CVE-2013-2131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906606" comment="lua-rrdtool-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906607" comment="perl-rrdtool-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906608" comment="python-rrdtool-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906609" comment="rrdtool-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906610" comment="rrdtool-cached-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906611" comment="rrdtool-devel-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906612" comment="rrdtool-doc-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906613" comment="ruby-rrdtool-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906614" comment="tcl-rrdtool-1.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248485" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906615" comment="libnghttp2-14-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906616" comment="libnghttp2-14-32bit-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906617" comment="libnghttp2-devel-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906618" comment="libnghttp2_asio-devel-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906619" comment="libnghttp2_asio1-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906620" comment="libnghttp2_asio1-32bit-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906621" comment="nghttp2-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906622" comment="nghttp2-doc-1.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906623" comment="python-nghttp2-1.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248486" version="1" class="patch">
	<metadata>
		<title>libpcp-devel-3.10.4-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<reference ref_id="CVE-2012-5530" ref_url="https://www.suse.com/security/cve/CVE-2012-5530/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcp-devel-3.10.4-1.23 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3418">CVE-2012-3418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3419">CVE-2012-3419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3420">CVE-2012-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3421">CVE-2012-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5530/">CVE-2012-5530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5530">CVE-2012-5530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906624" comment="libpcp-devel-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906625" comment="libpcp3-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906626" comment="pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906627" comment="pcp-conf-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906628" comment="pcp-doc-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906629" comment="pcp-gui-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906630" comment="pcp-import-collectl2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906631" comment="pcp-import-ganglia2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906632" comment="pcp-import-iostat2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906633" comment="pcp-import-mrtg2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906634" comment="pcp-import-sar2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906635" comment="pcp-import-sheet2pcp-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906636" comment="pcp-manager-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906637" comment="pcp-pmda-infiniband-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906638" comment="pcp-testsuite-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906639" comment="pcp-webapi-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906640" comment="pcp-webjs-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906641" comment="perl-PCP-LogImport-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906642" comment="perl-PCP-LogSummary-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906643" comment="perl-PCP-MMV-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906644" comment="perl-PCP-PMDA-3.10.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906645" comment="python-pcp-3.10.4-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248487" version="1" class="patch">
	<metadata>
		<title>net6-1.3.14-12.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4091" ref_url="https://www.suse.com/security/cve/CVE-2011-4091/" source="CVE"/>
		<reference ref_id="CVE-2011-4093" ref_url="https://www.suse.com/security/cve/CVE-2011-4093/" source="CVE"/>
		<description>
These are all security issues fixed in the net6-1.3.14-12.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4091/">CVE-2011-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4091">CVE-2011-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4093/">CVE-2011-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4093">CVE-2011-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906646" comment="net6-1.3.14-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906647" comment="net6-devel-1.3.14-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906648" comment="net6-lang-1.3.14-12.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248488" version="1" class="patch">
	<metadata>
		<title>apache-commons-daemon-1.0.15-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2729" ref_url="https://www.suse.com/security/cve/CVE-2011-2729/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-daemon-1.0.15-7.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2729/">CVE-2011-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2729">CVE-2011-2729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906649" comment="apache-commons-daemon-1.0.15-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906650" comment="apache-commons-daemon-javadoc-1.0.15-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906651" comment="apache-commons-daemon-jsvc-1.0.15-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248489" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.6-4.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.6-4.71 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906652" comment="libltdl7-2.4.6-4.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906653" comment="libltdl7-32bit-2.4.6-4.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906654" comment="libtool-2.4.6-4.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906655" comment="libtool-32bit-2.4.6-4.71 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248490" version="1" class="patch">
	<metadata>
		<title>xorg-x11-devel-7.6-47.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-devel-7.6-47.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906656" comment="xorg-x11-devel-7.6-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906657" comment="xorg-x11-libs-7.6-47.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248491" version="1" class="patch">
	<metadata>
		<title>eog-3.20.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6855">CVE-2016-6855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906658" comment="eog-3.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906659" comment="eog-devel-3.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906660" comment="eog-lang-3.20.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248492" version="1" class="patch">
	<metadata>
		<title>chromedriver-55.0.2883.75-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3015" ref_url="https://www.suse.com/security/cve/CVE-2011-3015/" source="CVE"/>
		<reference ref_id="CVE-2011-3016" ref_url="https://www.suse.com/security/cve/CVE-2011-3016/" source="CVE"/>
		<reference ref_id="CVE-2011-3017" ref_url="https://www.suse.com/security/cve/CVE-2011-3017/" source="CVE"/>
		<reference ref_id="CVE-2011-3018" ref_url="https://www.suse.com/security/cve/CVE-2011-3018/" source="CVE"/>
		<reference ref_id="CVE-2011-3019" ref_url="https://www.suse.com/security/cve/CVE-2011-3019/" source="CVE"/>
		<reference ref_id="CVE-2011-3020" ref_url="https://www.suse.com/security/cve/CVE-2011-3020/" source="CVE"/>
		<reference ref_id="CVE-2011-3021" ref_url="https://www.suse.com/security/cve/CVE-2011-3021/" source="CVE"/>
		<reference ref_id="CVE-2011-3022" ref_url="https://www.suse.com/security/cve/CVE-2011-3022/" source="CVE"/>
		<reference ref_id="CVE-2011-3023" ref_url="https://www.suse.com/security/cve/CVE-2011-3023/" source="CVE"/>
		<reference ref_id="CVE-2011-3024" ref_url="https://www.suse.com/security/cve/CVE-2011-3024/" source="CVE"/>
		<reference ref_id="CVE-2011-3025" ref_url="https://www.suse.com/security/cve/CVE-2011-3025/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3027" ref_url="https://www.suse.com/security/cve/CVE-2011-3027/" source="CVE"/>
		<reference ref_id="CVE-2011-3031" ref_url="https://www.suse.com/security/cve/CVE-2011-3031/" source="CVE"/>
		<reference ref_id="CVE-2011-3032" ref_url="https://www.suse.com/security/cve/CVE-2011-3032/" source="CVE"/>
		<reference ref_id="CVE-2011-3033" ref_url="https://www.suse.com/security/cve/CVE-2011-3033/" source="CVE"/>
		<reference ref_id="CVE-2011-3034" ref_url="https://www.suse.com/security/cve/CVE-2011-3034/" source="CVE"/>
		<reference ref_id="CVE-2011-3035" ref_url="https://www.suse.com/security/cve/CVE-2011-3035/" source="CVE"/>
		<reference ref_id="CVE-2011-3036" ref_url="https://www.suse.com/security/cve/CVE-2011-3036/" source="CVE"/>
		<reference ref_id="CVE-2011-3037" ref_url="https://www.suse.com/security/cve/CVE-2011-3037/" source="CVE"/>
		<reference ref_id="CVE-2011-3038" ref_url="https://www.suse.com/security/cve/CVE-2011-3038/" source="CVE"/>
		<reference ref_id="CVE-2011-3039" ref_url="https://www.suse.com/security/cve/CVE-2011-3039/" source="CVE"/>
		<reference ref_id="CVE-2011-3040" ref_url="https://www.suse.com/security/cve/CVE-2011-3040/" source="CVE"/>
		<reference ref_id="CVE-2011-3041" ref_url="https://www.suse.com/security/cve/CVE-2011-3041/" source="CVE"/>
		<reference ref_id="CVE-2011-3042" ref_url="https://www.suse.com/security/cve/CVE-2011-3042/" source="CVE"/>
		<reference ref_id="CVE-2011-3043" ref_url="https://www.suse.com/security/cve/CVE-2011-3043/" source="CVE"/>
		<reference ref_id="CVE-2011-3044" ref_url="https://www.suse.com/security/cve/CVE-2011-3044/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3046" ref_url="https://www.suse.com/security/cve/CVE-2011-3046/" source="CVE"/>
		<reference ref_id="CVE-2011-3047" ref_url="https://www.suse.com/security/cve/CVE-2011-3047/" source="CVE"/>
		<reference ref_id="CVE-2011-3049" ref_url="https://www.suse.com/security/cve/CVE-2011-3049/" source="CVE"/>
		<reference ref_id="CVE-2011-3050" ref_url="https://www.suse.com/security/cve/CVE-2011-3050/" source="CVE"/>
		<reference ref_id="CVE-2011-3051" ref_url="https://www.suse.com/security/cve/CVE-2011-3051/" source="CVE"/>
		<reference ref_id="CVE-2011-3052" ref_url="https://www.suse.com/security/cve/CVE-2011-3052/" source="CVE"/>
		<reference ref_id="CVE-2011-3053" ref_url="https://www.suse.com/security/cve/CVE-2011-3053/" source="CVE"/>
		<reference ref_id="CVE-2011-3054" ref_url="https://www.suse.com/security/cve/CVE-2011-3054/" source="CVE"/>
		<reference ref_id="CVE-2011-3055" ref_url="https://www.suse.com/security/cve/CVE-2011-3055/" source="CVE"/>
		<reference ref_id="CVE-2011-3056" ref_url="https://www.suse.com/security/cve/CVE-2011-3056/" source="CVE"/>
		<reference ref_id="CVE-2011-3057" ref_url="https://www.suse.com/security/cve/CVE-2011-3057/" source="CVE"/>
		<reference ref_id="CVE-2011-3058" ref_url="https://www.suse.com/security/cve/CVE-2011-3058/" source="CVE"/>
		<reference ref_id="CVE-2011-3059" ref_url="https://www.suse.com/security/cve/CVE-2011-3059/" source="CVE"/>
		<reference ref_id="CVE-2011-3060" ref_url="https://www.suse.com/security/cve/CVE-2011-3060/" source="CVE"/>
		<reference ref_id="CVE-2011-3061" ref_url="https://www.suse.com/security/cve/CVE-2011-3061/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3063" ref_url="https://www.suse.com/security/cve/CVE-2011-3063/" source="CVE"/>
		<reference ref_id="CVE-2011-3064" ref_url="https://www.suse.com/security/cve/CVE-2011-3064/" source="CVE"/>
		<reference ref_id="CVE-2011-3065" ref_url="https://www.suse.com/security/cve/CVE-2011-3065/" source="CVE"/>
		<reference ref_id="CVE-2011-3066" ref_url="https://www.suse.com/security/cve/CVE-2011-3066/" source="CVE"/>
		<reference ref_id="CVE-2011-3067" ref_url="https://www.suse.com/security/cve/CVE-2011-3067/" source="CVE"/>
		<reference ref_id="CVE-2011-3068" ref_url="https://www.suse.com/security/cve/CVE-2011-3068/" source="CVE"/>
		<reference ref_id="CVE-2011-3069" ref_url="https://www.suse.com/security/cve/CVE-2011-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-3070" ref_url="https://www.suse.com/security/cve/CVE-2011-3070/" source="CVE"/>
		<reference ref_id="CVE-2011-3071" ref_url="https://www.suse.com/security/cve/CVE-2011-3071/" source="CVE"/>
		<reference ref_id="CVE-2011-3072" ref_url="https://www.suse.com/security/cve/CVE-2011-3072/" source="CVE"/>
		<reference ref_id="CVE-2011-3073" ref_url="https://www.suse.com/security/cve/CVE-2011-3073/" source="CVE"/>
		<reference ref_id="CVE-2011-3074" ref_url="https://www.suse.com/security/cve/CVE-2011-3074/" source="CVE"/>
		<reference ref_id="CVE-2011-3075" ref_url="https://www.suse.com/security/cve/CVE-2011-3075/" source="CVE"/>
		<reference ref_id="CVE-2011-3076" ref_url="https://www.suse.com/security/cve/CVE-2011-3076/" source="CVE"/>
		<reference ref_id="CVE-2011-3077" ref_url="https://www.suse.com/security/cve/CVE-2011-3077/" source="CVE"/>
		<reference ref_id="CVE-2011-3078" ref_url="https://www.suse.com/security/cve/CVE-2011-3078/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3080" ref_url="https://www.suse.com/security/cve/CVE-2011-3080/" source="CVE"/>
		<reference ref_id="CVE-2011-3081" ref_url="https://www.suse.com/security/cve/CVE-2011-3081/" source="CVE"/>
		<reference ref_id="CVE-2011-3083" ref_url="https://www.suse.com/security/cve/CVE-2011-3083/" source="CVE"/>
		<reference ref_id="CVE-2011-3084" ref_url="https://www.suse.com/security/cve/CVE-2011-3084/" source="CVE"/>
		<reference ref_id="CVE-2011-3085" ref_url="https://www.suse.com/security/cve/CVE-2011-3085/" source="CVE"/>
		<reference ref_id="CVE-2011-3086" ref_url="https://www.suse.com/security/cve/CVE-2011-3086/" source="CVE"/>
		<reference ref_id="CVE-2011-3087" ref_url="https://www.suse.com/security/cve/CVE-2011-3087/" source="CVE"/>
		<reference ref_id="CVE-2011-3088" ref_url="https://www.suse.com/security/cve/CVE-2011-3088/" source="CVE"/>
		<reference ref_id="CVE-2011-3089" ref_url="https://www.suse.com/security/cve/CVE-2011-3089/" source="CVE"/>
		<reference ref_id="CVE-2011-3090" ref_url="https://www.suse.com/security/cve/CVE-2011-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-3091" ref_url="https://www.suse.com/security/cve/CVE-2011-3091/" source="CVE"/>
		<reference ref_id="CVE-2011-3092" ref_url="https://www.suse.com/security/cve/CVE-2011-3092/" source="CVE"/>
		<reference ref_id="CVE-2011-3093" ref_url="https://www.suse.com/security/cve/CVE-2011-3093/" source="CVE"/>
		<reference ref_id="CVE-2011-3094" ref_url="https://www.suse.com/security/cve/CVE-2011-3094/" source="CVE"/>
		<reference ref_id="CVE-2011-3095" ref_url="https://www.suse.com/security/cve/CVE-2011-3095/" source="CVE"/>
		<reference ref_id="CVE-2011-3096" ref_url="https://www.suse.com/security/cve/CVE-2011-3096/" source="CVE"/>
		<reference ref_id="CVE-2011-3098" ref_url="https://www.suse.com/security/cve/CVE-2011-3098/" source="CVE"/>
		<reference ref_id="CVE-2011-3100" ref_url="https://www.suse.com/security/cve/CVE-2011-3100/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3903" ref_url="https://www.suse.com/security/cve/CVE-2011-3903/" source="CVE"/>
		<reference ref_id="CVE-2011-3904" ref_url="https://www.suse.com/security/cve/CVE-2011-3904/" source="CVE"/>
		<reference ref_id="CVE-2011-3905" ref_url="https://www.suse.com/security/cve/CVE-2011-3905/" source="CVE"/>
		<reference ref_id="CVE-2011-3906" ref_url="https://www.suse.com/security/cve/CVE-2011-3906/" source="CVE"/>
		<reference ref_id="CVE-2011-3907" ref_url="https://www.suse.com/security/cve/CVE-2011-3907/" source="CVE"/>
		<reference ref_id="CVE-2011-3908" ref_url="https://www.suse.com/security/cve/CVE-2011-3908/" source="CVE"/>
		<reference ref_id="CVE-2011-3909" ref_url="https://www.suse.com/security/cve/CVE-2011-3909/" source="CVE"/>
		<reference ref_id="CVE-2011-3910" ref_url="https://www.suse.com/security/cve/CVE-2011-3910/" source="CVE"/>
		<reference ref_id="CVE-2011-3911" ref_url="https://www.suse.com/security/cve/CVE-2011-3911/" source="CVE"/>
		<reference ref_id="CVE-2011-3912" ref_url="https://www.suse.com/security/cve/CVE-2011-3912/" source="CVE"/>
		<reference ref_id="CVE-2011-3914" ref_url="https://www.suse.com/security/cve/CVE-2011-3914/" source="CVE"/>
		<reference ref_id="CVE-2011-3915" ref_url="https://www.suse.com/security/cve/CVE-2011-3915/" source="CVE"/>
		<reference ref_id="CVE-2011-3916" ref_url="https://www.suse.com/security/cve/CVE-2011-3916/" source="CVE"/>
		<reference ref_id="CVE-2011-3917" ref_url="https://www.suse.com/security/cve/CVE-2011-3917/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-3921" ref_url="https://www.suse.com/security/cve/CVE-2011-3921/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2011-3924" ref_url="https://www.suse.com/security/cve/CVE-2011-3924/" source="CVE"/>
		<reference ref_id="CVE-2011-3925" ref_url="https://www.suse.com/security/cve/CVE-2011-3925/" source="CVE"/>
		<reference ref_id="CVE-2011-3926" ref_url="https://www.suse.com/security/cve/CVE-2011-3926/" source="CVE"/>
		<reference ref_id="CVE-2011-3927" ref_url="https://www.suse.com/security/cve/CVE-2011-3927/" source="CVE"/>
		<reference ref_id="CVE-2011-3928" ref_url="https://www.suse.com/security/cve/CVE-2011-3928/" source="CVE"/>
		<reference ref_id="CVE-2011-3953" ref_url="https://www.suse.com/security/cve/CVE-2011-3953/" source="CVE"/>
		<reference ref_id="CVE-2011-3954" ref_url="https://www.suse.com/security/cve/CVE-2011-3954/" source="CVE"/>
		<reference ref_id="CVE-2011-3955" ref_url="https://www.suse.com/security/cve/CVE-2011-3955/" source="CVE"/>
		<reference ref_id="CVE-2011-3956" ref_url="https://www.suse.com/security/cve/CVE-2011-3956/" source="CVE"/>
		<reference ref_id="CVE-2011-3957" ref_url="https://www.suse.com/security/cve/CVE-2011-3957/" source="CVE"/>
		<reference ref_id="CVE-2011-3958" ref_url="https://www.suse.com/security/cve/CVE-2011-3958/" source="CVE"/>
		<reference ref_id="CVE-2011-3959" ref_url="https://www.suse.com/security/cve/CVE-2011-3959/" source="CVE"/>
		<reference ref_id="CVE-2011-3960" ref_url="https://www.suse.com/security/cve/CVE-2011-3960/" source="CVE"/>
		<reference ref_id="CVE-2011-3961" ref_url="https://www.suse.com/security/cve/CVE-2011-3961/" source="CVE"/>
		<reference ref_id="CVE-2011-3962" ref_url="https://www.suse.com/security/cve/CVE-2011-3962/" source="CVE"/>
		<reference ref_id="CVE-2011-3963" ref_url="https://www.suse.com/security/cve/CVE-2011-3963/" source="CVE"/>
		<reference ref_id="CVE-2011-3964" ref_url="https://www.suse.com/security/cve/CVE-2011-3964/" source="CVE"/>
		<reference ref_id="CVE-2011-3965" ref_url="https://www.suse.com/security/cve/CVE-2011-3965/" source="CVE"/>
		<reference ref_id="CVE-2011-3966" ref_url="https://www.suse.com/security/cve/CVE-2011-3966/" source="CVE"/>
		<reference ref_id="CVE-2011-3967" ref_url="https://www.suse.com/security/cve/CVE-2011-3967/" source="CVE"/>
		<reference ref_id="CVE-2011-3968" ref_url="https://www.suse.com/security/cve/CVE-2011-3968/" source="CVE"/>
		<reference ref_id="CVE-2011-3969" ref_url="https://www.suse.com/security/cve/CVE-2011-3969/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2011-3971" ref_url="https://www.suse.com/security/cve/CVE-2011-3971/" source="CVE"/>
		<reference ref_id="CVE-2011-3972" ref_url="https://www.suse.com/security/cve/CVE-2011-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-1521" ref_url="https://www.suse.com/security/cve/CVE-2012-1521/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-2815" ref_url="https://www.suse.com/security/cve/CVE-2012-2815/" source="CVE"/>
		<reference ref_id="CVE-2012-2816" ref_url="https://www.suse.com/security/cve/CVE-2012-2816/" source="CVE"/>
		<reference ref_id="CVE-2012-2817" ref_url="https://www.suse.com/security/cve/CVE-2012-2817/" source="CVE"/>
		<reference ref_id="CVE-2012-2818" ref_url="https://www.suse.com/security/cve/CVE-2012-2818/" source="CVE"/>
		<reference ref_id="CVE-2012-2819" ref_url="https://www.suse.com/security/cve/CVE-2012-2819/" source="CVE"/>
		<reference ref_id="CVE-2012-2820" ref_url="https://www.suse.com/security/cve/CVE-2012-2820/" source="CVE"/>
		<reference ref_id="CVE-2012-2821" ref_url="https://www.suse.com/security/cve/CVE-2012-2821/" source="CVE"/>
		<reference ref_id="CVE-2012-2823" ref_url="https://www.suse.com/security/cve/CVE-2012-2823/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-2826" ref_url="https://www.suse.com/security/cve/CVE-2012-2826/" source="CVE"/>
		<reference ref_id="CVE-2012-2829" ref_url="https://www.suse.com/security/cve/CVE-2012-2829/" source="CVE"/>
		<reference ref_id="CVE-2012-2830" ref_url="https://www.suse.com/security/cve/CVE-2012-2830/" source="CVE"/>
		<reference ref_id="CVE-2012-2831" ref_url="https://www.suse.com/security/cve/CVE-2012-2831/" source="CVE"/>
		<reference ref_id="CVE-2012-2834" ref_url="https://www.suse.com/security/cve/CVE-2012-2834/" source="CVE"/>
		<reference ref_id="CVE-2012-2842" ref_url="https://www.suse.com/security/cve/CVE-2012-2842/" source="CVE"/>
		<reference ref_id="CVE-2012-2843" ref_url="https://www.suse.com/security/cve/CVE-2012-2843/" source="CVE"/>
		<reference ref_id="CVE-2012-2865" ref_url="https://www.suse.com/security/cve/CVE-2012-2865/" source="CVE"/>
		<reference ref_id="CVE-2012-2866" ref_url="https://www.suse.com/security/cve/CVE-2012-2866/" source="CVE"/>
		<reference ref_id="CVE-2012-2867" ref_url="https://www.suse.com/security/cve/CVE-2012-2867/" source="CVE"/>
		<reference ref_id="CVE-2012-2868" ref_url="https://www.suse.com/security/cve/CVE-2012-2868/" source="CVE"/>
		<reference ref_id="CVE-2012-2869" ref_url="https://www.suse.com/security/cve/CVE-2012-2869/" source="CVE"/>
		<reference ref_id="CVE-2012-2870" ref_url="https://www.suse.com/security/cve/CVE-2012-2870/" source="CVE"/>
		<reference ref_id="CVE-2012-2871" ref_url="https://www.suse.com/security/cve/CVE-2012-2871/" source="CVE"/>
		<reference ref_id="CVE-2012-2872" ref_url="https://www.suse.com/security/cve/CVE-2012-2872/" source="CVE"/>
		<reference ref_id="CVE-2012-2874" ref_url="https://www.suse.com/security/cve/CVE-2012-2874/" source="CVE"/>
		<reference ref_id="CVE-2012-2876" ref_url="https://www.suse.com/security/cve/CVE-2012-2876/" source="CVE"/>
		<reference ref_id="CVE-2012-2877" ref_url="https://www.suse.com/security/cve/CVE-2012-2877/" source="CVE"/>
		<reference ref_id="CVE-2012-2878" ref_url="https://www.suse.com/security/cve/CVE-2012-2878/" source="CVE"/>
		<reference ref_id="CVE-2012-2879" ref_url="https://www.suse.com/security/cve/CVE-2012-2879/" source="CVE"/>
		<reference ref_id="CVE-2012-2880" ref_url="https://www.suse.com/security/cve/CVE-2012-2880/" source="CVE"/>
		<reference ref_id="CVE-2012-2881" ref_url="https://www.suse.com/security/cve/CVE-2012-2881/" source="CVE"/>
		<reference ref_id="CVE-2012-2882" ref_url="https://www.suse.com/security/cve/CVE-2012-2882/" source="CVE"/>
		<reference ref_id="CVE-2012-2883" ref_url="https://www.suse.com/security/cve/CVE-2012-2883/" source="CVE"/>
		<reference ref_id="CVE-2012-2884" ref_url="https://www.suse.com/security/cve/CVE-2012-2884/" source="CVE"/>
		<reference ref_id="CVE-2012-2885" ref_url="https://www.suse.com/security/cve/CVE-2012-2885/" source="CVE"/>
		<reference ref_id="CVE-2012-2886" ref_url="https://www.suse.com/security/cve/CVE-2012-2886/" source="CVE"/>
		<reference ref_id="CVE-2012-2887" ref_url="https://www.suse.com/security/cve/CVE-2012-2887/" source="CVE"/>
		<reference ref_id="CVE-2012-2888" ref_url="https://www.suse.com/security/cve/CVE-2012-2888/" source="CVE"/>
		<reference ref_id="CVE-2012-2889" ref_url="https://www.suse.com/security/cve/CVE-2012-2889/" source="CVE"/>
		<reference ref_id="CVE-2012-2891" ref_url="https://www.suse.com/security/cve/CVE-2012-2891/" source="CVE"/>
		<reference ref_id="CVE-2012-2892" ref_url="https://www.suse.com/security/cve/CVE-2012-2892/" source="CVE"/>
		<reference ref_id="CVE-2012-2893" ref_url="https://www.suse.com/security/cve/CVE-2012-2893/" source="CVE"/>
		<reference ref_id="CVE-2012-2894" ref_url="https://www.suse.com/security/cve/CVE-2012-2894/" source="CVE"/>
		<reference ref_id="CVE-2012-2896" ref_url="https://www.suse.com/security/cve/CVE-2012-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-5130" ref_url="https://www.suse.com/security/cve/CVE-2012-5130/" source="CVE"/>
		<reference ref_id="CVE-2012-5131" ref_url="https://www.suse.com/security/cve/CVE-2012-5131/" source="CVE"/>
		<reference ref_id="CVE-2012-5132" ref_url="https://www.suse.com/security/cve/CVE-2012-5132/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2012-5135" ref_url="https://www.suse.com/security/cve/CVE-2012-5135/" source="CVE"/>
		<reference ref_id="CVE-2012-5136" ref_url="https://www.suse.com/security/cve/CVE-2012-5136/" source="CVE"/>
		<reference ref_id="CVE-2012-5137" ref_url="https://www.suse.com/security/cve/CVE-2012-5137/" source="CVE"/>
		<reference ref_id="CVE-2012-5138" ref_url="https://www.suse.com/security/cve/CVE-2012-5138/" source="CVE"/>
		<reference ref_id="CVE-2012-5139" ref_url="https://www.suse.com/security/cve/CVE-2012-5139/" source="CVE"/>
		<reference ref_id="CVE-2012-5140" ref_url="https://www.suse.com/security/cve/CVE-2012-5140/" source="CVE"/>
		<reference ref_id="CVE-2012-5141" ref_url="https://www.suse.com/security/cve/CVE-2012-5141/" source="CVE"/>
		<reference ref_id="CVE-2012-5142" ref_url="https://www.suse.com/security/cve/CVE-2012-5142/" source="CVE"/>
		<reference ref_id="CVE-2012-5143" ref_url="https://www.suse.com/security/cve/CVE-2012-5143/" source="CVE"/>
		<reference ref_id="CVE-2012-5144" ref_url="https://www.suse.com/security/cve/CVE-2012-5144/" source="CVE"/>
		<reference ref_id="CVE-2012-5145" ref_url="https://www.suse.com/security/cve/CVE-2012-5145/" source="CVE"/>
		<reference ref_id="CVE-2012-5146" ref_url="https://www.suse.com/security/cve/CVE-2012-5146/" source="CVE"/>
		<reference ref_id="CVE-2012-5147" ref_url="https://www.suse.com/security/cve/CVE-2012-5147/" source="CVE"/>
		<reference ref_id="CVE-2012-5148" ref_url="https://www.suse.com/security/cve/CVE-2012-5148/" source="CVE"/>
		<reference ref_id="CVE-2012-5149" ref_url="https://www.suse.com/security/cve/CVE-2012-5149/" source="CVE"/>
		<reference ref_id="CVE-2012-5150" ref_url="https://www.suse.com/security/cve/CVE-2012-5150/" source="CVE"/>
		<reference ref_id="CVE-2012-5152" ref_url="https://www.suse.com/security/cve/CVE-2012-5152/" source="CVE"/>
		<reference ref_id="CVE-2012-5153" ref_url="https://www.suse.com/security/cve/CVE-2012-5153/" source="CVE"/>
		<reference ref_id="CVE-2012-5154" ref_url="https://www.suse.com/security/cve/CVE-2012-5154/" source="CVE"/>
		<reference ref_id="CVE-2013-0830" ref_url="https://www.suse.com/security/cve/CVE-2013-0830/" source="CVE"/>
		<reference ref_id="CVE-2013-0831" ref_url="https://www.suse.com/security/cve/CVE-2013-0831/" source="CVE"/>
		<reference ref_id="CVE-2013-0832" ref_url="https://www.suse.com/security/cve/CVE-2013-0832/" source="CVE"/>
		<reference ref_id="CVE-2013-0833" ref_url="https://www.suse.com/security/cve/CVE-2013-0833/" source="CVE"/>
		<reference ref_id="CVE-2013-0834" ref_url="https://www.suse.com/security/cve/CVE-2013-0834/" source="CVE"/>
		<reference ref_id="CVE-2013-0835" ref_url="https://www.suse.com/security/cve/CVE-2013-0835/" source="CVE"/>
		<reference ref_id="CVE-2013-0836" ref_url="https://www.suse.com/security/cve/CVE-2013-0836/" source="CVE"/>
		<reference ref_id="CVE-2013-0837" ref_url="https://www.suse.com/security/cve/CVE-2013-0837/" source="CVE"/>
		<reference ref_id="CVE-2013-0838" ref_url="https://www.suse.com/security/cve/CVE-2013-0838/" source="CVE"/>
		<reference ref_id="CVE-2013-0879" ref_url="https://www.suse.com/security/cve/CVE-2013-0879/" source="CVE"/>
		<reference ref_id="CVE-2013-0880" ref_url="https://www.suse.com/security/cve/CVE-2013-0880/" source="CVE"/>
		<reference ref_id="CVE-2013-0881" ref_url="https://www.suse.com/security/cve/CVE-2013-0881/" source="CVE"/>
		<reference ref_id="CVE-2013-0882" ref_url="https://www.suse.com/security/cve/CVE-2013-0882/" source="CVE"/>
		<reference ref_id="CVE-2013-0883" ref_url="https://www.suse.com/security/cve/CVE-2013-0883/" source="CVE"/>
		<reference ref_id="CVE-2013-0884" ref_url="https://www.suse.com/security/cve/CVE-2013-0884/" source="CVE"/>
		<reference ref_id="CVE-2013-0885" ref_url="https://www.suse.com/security/cve/CVE-2013-0885/" source="CVE"/>
		<reference ref_id="CVE-2013-0886" ref_url="https://www.suse.com/security/cve/CVE-2013-0886/" source="CVE"/>
		<reference ref_id="CVE-2013-0887" ref_url="https://www.suse.com/security/cve/CVE-2013-0887/" source="CVE"/>
		<reference ref_id="CVE-2013-0888" ref_url="https://www.suse.com/security/cve/CVE-2013-0888/" source="CVE"/>
		<reference ref_id="CVE-2013-0889" ref_url="https://www.suse.com/security/cve/CVE-2013-0889/" source="CVE"/>
		<reference ref_id="CVE-2013-0890" ref_url="https://www.suse.com/security/cve/CVE-2013-0890/" source="CVE"/>
		<reference ref_id="CVE-2013-0891" ref_url="https://www.suse.com/security/cve/CVE-2013-0891/" source="CVE"/>
		<reference ref_id="CVE-2013-0892" ref_url="https://www.suse.com/security/cve/CVE-2013-0892/" source="CVE"/>
		<reference ref_id="CVE-2013-0893" ref_url="https://www.suse.com/security/cve/CVE-2013-0893/" source="CVE"/>
		<reference ref_id="CVE-2013-0894" ref_url="https://www.suse.com/security/cve/CVE-2013-0894/" source="CVE"/>
		<reference ref_id="CVE-2013-0895" ref_url="https://www.suse.com/security/cve/CVE-2013-0895/" source="CVE"/>
		<reference ref_id="CVE-2013-0896" ref_url="https://www.suse.com/security/cve/CVE-2013-0896/" source="CVE"/>
		<reference ref_id="CVE-2013-0897" ref_url="https://www.suse.com/security/cve/CVE-2013-0897/" source="CVE"/>
		<reference ref_id="CVE-2013-0898" ref_url="https://www.suse.com/security/cve/CVE-2013-0898/" source="CVE"/>
		<reference ref_id="CVE-2013-0899" ref_url="https://www.suse.com/security/cve/CVE-2013-0899/" source="CVE"/>
		<reference ref_id="CVE-2013-0900" ref_url="https://www.suse.com/security/cve/CVE-2013-0900/" source="CVE"/>
		<reference ref_id="CVE-2013-2838" ref_url="https://www.suse.com/security/cve/CVE-2013-2838/" source="CVE"/>
		<reference ref_id="CVE-2013-2906" ref_url="https://www.suse.com/security/cve/CVE-2013-2906/" source="CVE"/>
		<reference ref_id="CVE-2013-2907" ref_url="https://www.suse.com/security/cve/CVE-2013-2907/" source="CVE"/>
		<reference ref_id="CVE-2013-2908" ref_url="https://www.suse.com/security/cve/CVE-2013-2908/" source="CVE"/>
		<reference ref_id="CVE-2013-2909" ref_url="https://www.suse.com/security/cve/CVE-2013-2909/" source="CVE"/>
		<reference ref_id="CVE-2013-2910" ref_url="https://www.suse.com/security/cve/CVE-2013-2910/" source="CVE"/>
		<reference ref_id="CVE-2013-2911" ref_url="https://www.suse.com/security/cve/CVE-2013-2911/" source="CVE"/>
		<reference ref_id="CVE-2013-2912" ref_url="https://www.suse.com/security/cve/CVE-2013-2912/" source="CVE"/>
		<reference ref_id="CVE-2013-2913" ref_url="https://www.suse.com/security/cve/CVE-2013-2913/" source="CVE"/>
		<reference ref_id="CVE-2013-2914" ref_url="https://www.suse.com/security/cve/CVE-2013-2914/" source="CVE"/>
		<reference ref_id="CVE-2013-2915" ref_url="https://www.suse.com/security/cve/CVE-2013-2915/" source="CVE"/>
		<reference ref_id="CVE-2013-2916" ref_url="https://www.suse.com/security/cve/CVE-2013-2916/" source="CVE"/>
		<reference ref_id="CVE-2013-2917" ref_url="https://www.suse.com/security/cve/CVE-2013-2917/" source="CVE"/>
		<reference ref_id="CVE-2013-2918" ref_url="https://www.suse.com/security/cve/CVE-2013-2918/" source="CVE"/>
		<reference ref_id="CVE-2013-2919" ref_url="https://www.suse.com/security/cve/CVE-2013-2919/" source="CVE"/>
		<reference ref_id="CVE-2013-2920" ref_url="https://www.suse.com/security/cve/CVE-2013-2920/" source="CVE"/>
		<reference ref_id="CVE-2013-2921" ref_url="https://www.suse.com/security/cve/CVE-2013-2921/" source="CVE"/>
		<reference ref_id="CVE-2013-2922" ref_url="https://www.suse.com/security/cve/CVE-2013-2922/" source="CVE"/>
		<reference ref_id="CVE-2013-2923" ref_url="https://www.suse.com/security/cve/CVE-2013-2923/" source="CVE"/>
		<reference ref_id="CVE-2013-2924" ref_url="https://www.suse.com/security/cve/CVE-2013-2924/" source="CVE"/>
		<reference ref_id="CVE-2013-2925" ref_url="https://www.suse.com/security/cve/CVE-2013-2925/" source="CVE"/>
		<reference ref_id="CVE-2013-2926" ref_url="https://www.suse.com/security/cve/CVE-2013-2926/" source="CVE"/>
		<reference ref_id="CVE-2013-2927" ref_url="https://www.suse.com/security/cve/CVE-2013-2927/" source="CVE"/>
		<reference ref_id="CVE-2013-2928" ref_url="https://www.suse.com/security/cve/CVE-2013-2928/" source="CVE"/>
		<reference ref_id="CVE-2013-2931" ref_url="https://www.suse.com/security/cve/CVE-2013-2931/" source="CVE"/>
		<reference ref_id="CVE-2013-6621" ref_url="https://www.suse.com/security/cve/CVE-2013-6621/" source="CVE"/>
		<reference ref_id="CVE-2013-6622" ref_url="https://www.suse.com/security/cve/CVE-2013-6622/" source="CVE"/>
		<reference ref_id="CVE-2013-6623" ref_url="https://www.suse.com/security/cve/CVE-2013-6623/" source="CVE"/>
		<reference ref_id="CVE-2013-6624" ref_url="https://www.suse.com/security/cve/CVE-2013-6624/" source="CVE"/>
		<reference ref_id="CVE-2013-6625" ref_url="https://www.suse.com/security/cve/CVE-2013-6625/" source="CVE"/>
		<reference ref_id="CVE-2013-6626" ref_url="https://www.suse.com/security/cve/CVE-2013-6626/" source="CVE"/>
		<reference ref_id="CVE-2013-6627" ref_url="https://www.suse.com/security/cve/CVE-2013-6627/" source="CVE"/>
		<reference ref_id="CVE-2013-6628" ref_url="https://www.suse.com/security/cve/CVE-2013-6628/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6631" ref_url="https://www.suse.com/security/cve/CVE-2013-6631/" source="CVE"/>
		<reference ref_id="CVE-2013-6632" ref_url="https://www.suse.com/security/cve/CVE-2013-6632/" source="CVE"/>
		<reference ref_id="CVE-2013-6634" ref_url="https://www.suse.com/security/cve/CVE-2013-6634/" source="CVE"/>
		<reference ref_id="CVE-2013-6635" ref_url="https://www.suse.com/security/cve/CVE-2013-6635/" source="CVE"/>
		<reference ref_id="CVE-2013-6636" ref_url="https://www.suse.com/security/cve/CVE-2013-6636/" source="CVE"/>
		<reference ref_id="CVE-2013-6637" ref_url="https://www.suse.com/security/cve/CVE-2013-6637/" source="CVE"/>
		<reference ref_id="CVE-2013-6638" ref_url="https://www.suse.com/security/cve/CVE-2013-6638/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6641" ref_url="https://www.suse.com/security/cve/CVE-2013-6641/" source="CVE"/>
		<reference ref_id="CVE-2013-6643" ref_url="https://www.suse.com/security/cve/CVE-2013-6643/" source="CVE"/>
		<reference ref_id="CVE-2013-6644" ref_url="https://www.suse.com/security/cve/CVE-2013-6644/" source="CVE"/>
		<reference ref_id="CVE-2013-6645" ref_url="https://www.suse.com/security/cve/CVE-2013-6645/" source="CVE"/>
		<reference ref_id="CVE-2013-6646" ref_url="https://www.suse.com/security/cve/CVE-2013-6646/" source="CVE"/>
		<reference ref_id="CVE-2013-6649" ref_url="https://www.suse.com/security/cve/CVE-2013-6649/" source="CVE"/>
		<reference ref_id="CVE-2013-6650" ref_url="https://www.suse.com/security/cve/CVE-2013-6650/" source="CVE"/>
		<reference ref_id="CVE-2013-6653" ref_url="https://www.suse.com/security/cve/CVE-2013-6653/" source="CVE"/>
		<reference ref_id="CVE-2013-6654" ref_url="https://www.suse.com/security/cve/CVE-2013-6654/" source="CVE"/>
		<reference ref_id="CVE-2013-6655" ref_url="https://www.suse.com/security/cve/CVE-2013-6655/" source="CVE"/>
		<reference ref_id="CVE-2013-6656" ref_url="https://www.suse.com/security/cve/CVE-2013-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-6657" ref_url="https://www.suse.com/security/cve/CVE-2013-6657/" source="CVE"/>
		<reference ref_id="CVE-2013-6658" ref_url="https://www.suse.com/security/cve/CVE-2013-6658/" source="CVE"/>
		<reference ref_id="CVE-2013-6659" ref_url="https://www.suse.com/security/cve/CVE-2013-6659/" source="CVE"/>
		<reference ref_id="CVE-2013-6660" ref_url="https://www.suse.com/security/cve/CVE-2013-6660/" source="CVE"/>
		<reference ref_id="CVE-2013-6661" ref_url="https://www.suse.com/security/cve/CVE-2013-6661/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-1700" ref_url="https://www.suse.com/security/cve/CVE-2014-1700/" source="CVE"/>
		<reference ref_id="CVE-2014-1701" ref_url="https://www.suse.com/security/cve/CVE-2014-1701/" source="CVE"/>
		<reference ref_id="CVE-2014-1702" ref_url="https://www.suse.com/security/cve/CVE-2014-1702/" source="CVE"/>
		<reference ref_id="CVE-2014-1703" ref_url="https://www.suse.com/security/cve/CVE-2014-1703/" source="CVE"/>
		<reference ref_id="CVE-2014-1704" ref_url="https://www.suse.com/security/cve/CVE-2014-1704/" source="CVE"/>
		<reference ref_id="CVE-2014-1705" ref_url="https://www.suse.com/security/cve/CVE-2014-1705/" source="CVE"/>
		<reference ref_id="CVE-2014-1713" ref_url="https://www.suse.com/security/cve/CVE-2014-1713/" source="CVE"/>
		<reference ref_id="CVE-2014-1714" ref_url="https://www.suse.com/security/cve/CVE-2014-1714/" source="CVE"/>
		<reference ref_id="CVE-2014-1715" ref_url="https://www.suse.com/security/cve/CVE-2014-1715/" source="CVE"/>
		<reference ref_id="CVE-2014-1716" ref_url="https://www.suse.com/security/cve/CVE-2014-1716/" source="CVE"/>
		<reference ref_id="CVE-2014-1717" ref_url="https://www.suse.com/security/cve/CVE-2014-1717/" source="CVE"/>
		<reference ref_id="CVE-2014-1718" ref_url="https://www.suse.com/security/cve/CVE-2014-1718/" source="CVE"/>
		<reference ref_id="CVE-2014-1719" ref_url="https://www.suse.com/security/cve/CVE-2014-1719/" source="CVE"/>
		<reference ref_id="CVE-2014-1720" ref_url="https://www.suse.com/security/cve/CVE-2014-1720/" source="CVE"/>
		<reference ref_id="CVE-2014-1721" ref_url="https://www.suse.com/security/cve/CVE-2014-1721/" source="CVE"/>
		<reference ref_id="CVE-2014-1722" ref_url="https://www.suse.com/security/cve/CVE-2014-1722/" source="CVE"/>
		<reference ref_id="CVE-2014-1723" ref_url="https://www.suse.com/security/cve/CVE-2014-1723/" source="CVE"/>
		<reference ref_id="CVE-2014-1724" ref_url="https://www.suse.com/security/cve/CVE-2014-1724/" source="CVE"/>
		<reference ref_id="CVE-2014-1725" ref_url="https://www.suse.com/security/cve/CVE-2014-1725/" source="CVE"/>
		<reference ref_id="CVE-2014-1726" ref_url="https://www.suse.com/security/cve/CVE-2014-1726/" source="CVE"/>
		<reference ref_id="CVE-2014-1727" ref_url="https://www.suse.com/security/cve/CVE-2014-1727/" source="CVE"/>
		<reference ref_id="CVE-2014-1728" ref_url="https://www.suse.com/security/cve/CVE-2014-1728/" source="CVE"/>
		<reference ref_id="CVE-2014-1729" ref_url="https://www.suse.com/security/cve/CVE-2014-1729/" source="CVE"/>
		<reference ref_id="CVE-2014-1730" ref_url="https://www.suse.com/security/cve/CVE-2014-1730/" source="CVE"/>
		<reference ref_id="CVE-2014-1731" ref_url="https://www.suse.com/security/cve/CVE-2014-1731/" source="CVE"/>
		<reference ref_id="CVE-2014-1732" ref_url="https://www.suse.com/security/cve/CVE-2014-1732/" source="CVE"/>
		<reference ref_id="CVE-2014-1733" ref_url="https://www.suse.com/security/cve/CVE-2014-1733/" source="CVE"/>
		<reference ref_id="CVE-2014-1734" ref_url="https://www.suse.com/security/cve/CVE-2014-1734/" source="CVE"/>
		<reference ref_id="CVE-2014-1735" ref_url="https://www.suse.com/security/cve/CVE-2014-1735/" source="CVE"/>
		<reference ref_id="CVE-2014-1740" ref_url="https://www.suse.com/security/cve/CVE-2014-1740/" source="CVE"/>
		<reference ref_id="CVE-2014-1741" ref_url="https://www.suse.com/security/cve/CVE-2014-1741/" source="CVE"/>
		<reference ref_id="CVE-2014-1742" ref_url="https://www.suse.com/security/cve/CVE-2014-1742/" source="CVE"/>
		<reference ref_id="CVE-2014-1743" ref_url="https://www.suse.com/security/cve/CVE-2014-1743/" source="CVE"/>
		<reference ref_id="CVE-2014-1744" ref_url="https://www.suse.com/security/cve/CVE-2014-1744/" source="CVE"/>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2014-1746" ref_url="https://www.suse.com/security/cve/CVE-2014-1746/" source="CVE"/>
		<reference ref_id="CVE-2014-1747" ref_url="https://www.suse.com/security/cve/CVE-2014-1747/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2014-1749" ref_url="https://www.suse.com/security/cve/CVE-2014-1749/" source="CVE"/>
		<reference ref_id="CVE-2014-3152" ref_url="https://www.suse.com/security/cve/CVE-2014-3152/" source="CVE"/>
		<reference ref_id="CVE-2014-3154" ref_url="https://www.suse.com/security/cve/CVE-2014-3154/" source="CVE"/>
		<reference ref_id="CVE-2014-3155" ref_url="https://www.suse.com/security/cve/CVE-2014-3155/" source="CVE"/>
		<reference ref_id="CVE-2014-3156" ref_url="https://www.suse.com/security/cve/CVE-2014-3156/" source="CVE"/>
		<reference ref_id="CVE-2014-3157" ref_url="https://www.suse.com/security/cve/CVE-2014-3157/" source="CVE"/>
		<reference ref_id="CVE-2014-3160" ref_url="https://www.suse.com/security/cve/CVE-2014-3160/" source="CVE"/>
		<reference ref_id="CVE-2014-3162" ref_url="https://www.suse.com/security/cve/CVE-2014-3162/" source="CVE"/>
		<reference ref_id="CVE-2014-3165" ref_url="https://www.suse.com/security/cve/CVE-2014-3165/" source="CVE"/>
		<reference ref_id="CVE-2014-3166" ref_url="https://www.suse.com/security/cve/CVE-2014-3166/" source="CVE"/>
		<reference ref_id="CVE-2014-3167" ref_url="https://www.suse.com/security/cve/CVE-2014-3167/" source="CVE"/>
		<reference ref_id="CVE-2014-3168" ref_url="https://www.suse.com/security/cve/CVE-2014-3168/" source="CVE"/>
		<reference ref_id="CVE-2014-3169" ref_url="https://www.suse.com/security/cve/CVE-2014-3169/" source="CVE"/>
		<reference ref_id="CVE-2014-3170" ref_url="https://www.suse.com/security/cve/CVE-2014-3170/" source="CVE"/>
		<reference ref_id="CVE-2014-3171" ref_url="https://www.suse.com/security/cve/CVE-2014-3171/" source="CVE"/>
		<reference ref_id="CVE-2014-3172" ref_url="https://www.suse.com/security/cve/CVE-2014-3172/" source="CVE"/>
		<reference ref_id="CVE-2014-3173" ref_url="https://www.suse.com/security/cve/CVE-2014-3173/" source="CVE"/>
		<reference ref_id="CVE-2014-3174" ref_url="https://www.suse.com/security/cve/CVE-2014-3174/" source="CVE"/>
		<reference ref_id="CVE-2014-3175" ref_url="https://www.suse.com/security/cve/CVE-2014-3175/" source="CVE"/>
		<reference ref_id="CVE-2014-3176" ref_url="https://www.suse.com/security/cve/CVE-2014-3176/" source="CVE"/>
		<reference ref_id="CVE-2014-3177" ref_url="https://www.suse.com/security/cve/CVE-2014-3177/" source="CVE"/>
		<reference ref_id="CVE-2014-3178" ref_url="https://www.suse.com/security/cve/CVE-2014-3178/" source="CVE"/>
		<reference ref_id="CVE-2014-3188" ref_url="https://www.suse.com/security/cve/CVE-2014-3188/" source="CVE"/>
		<reference ref_id="CVE-2014-3189" ref_url="https://www.suse.com/security/cve/CVE-2014-3189/" source="CVE"/>
		<reference ref_id="CVE-2014-3190" ref_url="https://www.suse.com/security/cve/CVE-2014-3190/" source="CVE"/>
		<reference ref_id="CVE-2014-3191" ref_url="https://www.suse.com/security/cve/CVE-2014-3191/" source="CVE"/>
		<reference ref_id="CVE-2014-3192" ref_url="https://www.suse.com/security/cve/CVE-2014-3192/" source="CVE"/>
		<reference ref_id="CVE-2014-3193" ref_url="https://www.suse.com/security/cve/CVE-2014-3193/" source="CVE"/>
		<reference ref_id="CVE-2014-3194" ref_url="https://www.suse.com/security/cve/CVE-2014-3194/" source="CVE"/>
		<reference ref_id="CVE-2014-3195" ref_url="https://www.suse.com/security/cve/CVE-2014-3195/" source="CVE"/>
		<reference ref_id="CVE-2014-3196" ref_url="https://www.suse.com/security/cve/CVE-2014-3196/" source="CVE"/>
		<reference ref_id="CVE-2014-3197" ref_url="https://www.suse.com/security/cve/CVE-2014-3197/" source="CVE"/>
		<reference ref_id="CVE-2014-3198" ref_url="https://www.suse.com/security/cve/CVE-2014-3198/" source="CVE"/>
		<reference ref_id="CVE-2014-3199" ref_url="https://www.suse.com/security/cve/CVE-2014-3199/" source="CVE"/>
		<reference ref_id="CVE-2014-3200" ref_url="https://www.suse.com/security/cve/CVE-2014-3200/" source="CVE"/>
		<reference ref_id="CVE-2014-7899" ref_url="https://www.suse.com/security/cve/CVE-2014-7899/" source="CVE"/>
		<reference ref_id="CVE-2014-7900" ref_url="https://www.suse.com/security/cve/CVE-2014-7900/" source="CVE"/>
		<reference ref_id="CVE-2014-7901" ref_url="https://www.suse.com/security/cve/CVE-2014-7901/" source="CVE"/>
		<reference ref_id="CVE-2014-7902" ref_url="https://www.suse.com/security/cve/CVE-2014-7902/" source="CVE"/>
		<reference ref_id="CVE-2014-7903" ref_url="https://www.suse.com/security/cve/CVE-2014-7903/" source="CVE"/>
		<reference ref_id="CVE-2014-7904" ref_url="https://www.suse.com/security/cve/CVE-2014-7904/" source="CVE"/>
		<reference ref_id="CVE-2014-7905" ref_url="https://www.suse.com/security/cve/CVE-2014-7905/" source="CVE"/>
		<reference ref_id="CVE-2014-7906" ref_url="https://www.suse.com/security/cve/CVE-2014-7906/" source="CVE"/>
		<reference ref_id="CVE-2014-7907" ref_url="https://www.suse.com/security/cve/CVE-2014-7907/" source="CVE"/>
		<reference ref_id="CVE-2014-7908" ref_url="https://www.suse.com/security/cve/CVE-2014-7908/" source="CVE"/>
		<reference ref_id="CVE-2014-7909" ref_url="https://www.suse.com/security/cve/CVE-2014-7909/" source="CVE"/>
		<reference ref_id="CVE-2014-7910" ref_url="https://www.suse.com/security/cve/CVE-2014-7910/" source="CVE"/>
		<reference ref_id="CVE-2014-7923" ref_url="https://www.suse.com/security/cve/CVE-2014-7923/" source="CVE"/>
		<reference ref_id="CVE-2014-7924" ref_url="https://www.suse.com/security/cve/CVE-2014-7924/" source="CVE"/>
		<reference ref_id="CVE-2014-7925" ref_url="https://www.suse.com/security/cve/CVE-2014-7925/" source="CVE"/>
		<reference ref_id="CVE-2014-7926" ref_url="https://www.suse.com/security/cve/CVE-2014-7926/" source="CVE"/>
		<reference ref_id="CVE-2014-7927" ref_url="https://www.suse.com/security/cve/CVE-2014-7927/" source="CVE"/>
		<reference ref_id="CVE-2014-7928" ref_url="https://www.suse.com/security/cve/CVE-2014-7928/" source="CVE"/>
		<reference ref_id="CVE-2014-7929" ref_url="https://www.suse.com/security/cve/CVE-2014-7929/" source="CVE"/>
		<reference ref_id="CVE-2014-7930" ref_url="https://www.suse.com/security/cve/CVE-2014-7930/" source="CVE"/>
		<reference ref_id="CVE-2014-7932" ref_url="https://www.suse.com/security/cve/CVE-2014-7932/" source="CVE"/>
		<reference ref_id="CVE-2014-7933" ref_url="https://www.suse.com/security/cve/CVE-2014-7933/" source="CVE"/>
		<reference ref_id="CVE-2014-7934" ref_url="https://www.suse.com/security/cve/CVE-2014-7934/" source="CVE"/>
		<reference ref_id="CVE-2014-7935" ref_url="https://www.suse.com/security/cve/CVE-2014-7935/" source="CVE"/>
		<reference ref_id="CVE-2014-7936" ref_url="https://www.suse.com/security/cve/CVE-2014-7936/" source="CVE"/>
		<reference ref_id="CVE-2014-7937" ref_url="https://www.suse.com/security/cve/CVE-2014-7937/" source="CVE"/>
		<reference ref_id="CVE-2014-7938" ref_url="https://www.suse.com/security/cve/CVE-2014-7938/" source="CVE"/>
		<reference ref_id="CVE-2014-7939" ref_url="https://www.suse.com/security/cve/CVE-2014-7939/" source="CVE"/>
		<reference ref_id="CVE-2014-7940" ref_url="https://www.suse.com/security/cve/CVE-2014-7940/" source="CVE"/>
		<reference ref_id="CVE-2014-7941" ref_url="https://www.suse.com/security/cve/CVE-2014-7941/" source="CVE"/>
		<reference ref_id="CVE-2014-7942" ref_url="https://www.suse.com/security/cve/CVE-2014-7942/" source="CVE"/>
		<reference ref_id="CVE-2014-7943" ref_url="https://www.suse.com/security/cve/CVE-2014-7943/" source="CVE"/>
		<reference ref_id="CVE-2014-7944" ref_url="https://www.suse.com/security/cve/CVE-2014-7944/" source="CVE"/>
		<reference ref_id="CVE-2014-7945" ref_url="https://www.suse.com/security/cve/CVE-2014-7945/" source="CVE"/>
		<reference ref_id="CVE-2014-7946" ref_url="https://www.suse.com/security/cve/CVE-2014-7946/" source="CVE"/>
		<reference ref_id="CVE-2014-7947" ref_url="https://www.suse.com/security/cve/CVE-2014-7947/" source="CVE"/>
		<reference ref_id="CVE-2014-7948" ref_url="https://www.suse.com/security/cve/CVE-2014-7948/" source="CVE"/>
		<reference ref_id="CVE-2015-1205" ref_url="https://www.suse.com/security/cve/CVE-2015-1205/" source="CVE"/>
		<reference ref_id="CVE-2015-1209" ref_url="https://www.suse.com/security/cve/CVE-2015-1209/" source="CVE"/>
		<reference ref_id="CVE-2015-1210" ref_url="https://www.suse.com/security/cve/CVE-2015-1210/" source="CVE"/>
		<reference ref_id="CVE-2015-1211" ref_url="https://www.suse.com/security/cve/CVE-2015-1211/" source="CVE"/>
		<reference ref_id="CVE-2015-1212" ref_url="https://www.suse.com/security/cve/CVE-2015-1212/" source="CVE"/>
		<reference ref_id="CVE-2015-1213" ref_url="https://www.suse.com/security/cve/CVE-2015-1213/" source="CVE"/>
		<reference ref_id="CVE-2015-1214" ref_url="https://www.suse.com/security/cve/CVE-2015-1214/" source="CVE"/>
		<reference ref_id="CVE-2015-1215" ref_url="https://www.suse.com/security/cve/CVE-2015-1215/" source="CVE"/>
		<reference ref_id="CVE-2015-1216" ref_url="https://www.suse.com/security/cve/CVE-2015-1216/" source="CVE"/>
		<reference ref_id="CVE-2015-1217" ref_url="https://www.suse.com/security/cve/CVE-2015-1217/" source="CVE"/>
		<reference ref_id="CVE-2015-1218" ref_url="https://www.suse.com/security/cve/CVE-2015-1218/" source="CVE"/>
		<reference ref_id="CVE-2015-1219" ref_url="https://www.suse.com/security/cve/CVE-2015-1219/" source="CVE"/>
		<reference ref_id="CVE-2015-1220" ref_url="https://www.suse.com/security/cve/CVE-2015-1220/" source="CVE"/>
		<reference ref_id="CVE-2015-1221" ref_url="https://www.suse.com/security/cve/CVE-2015-1221/" source="CVE"/>
		<reference ref_id="CVE-2015-1222" ref_url="https://www.suse.com/security/cve/CVE-2015-1222/" source="CVE"/>
		<reference ref_id="CVE-2015-1223" ref_url="https://www.suse.com/security/cve/CVE-2015-1223/" source="CVE"/>
		<reference ref_id="CVE-2015-1224" ref_url="https://www.suse.com/security/cve/CVE-2015-1224/" source="CVE"/>
		<reference ref_id="CVE-2015-1225" ref_url="https://www.suse.com/security/cve/CVE-2015-1225/" source="CVE"/>
		<reference ref_id="CVE-2015-1226" ref_url="https://www.suse.com/security/cve/CVE-2015-1226/" source="CVE"/>
		<reference ref_id="CVE-2015-1227" ref_url="https://www.suse.com/security/cve/CVE-2015-1227/" source="CVE"/>
		<reference ref_id="CVE-2015-1228" ref_url="https://www.suse.com/security/cve/CVE-2015-1228/" source="CVE"/>
		<reference ref_id="CVE-2015-1229" ref_url="https://www.suse.com/security/cve/CVE-2015-1229/" source="CVE"/>
		<reference ref_id="CVE-2015-1230" ref_url="https://www.suse.com/security/cve/CVE-2015-1230/" source="CVE"/>
		<reference ref_id="CVE-2015-1231" ref_url="https://www.suse.com/security/cve/CVE-2015-1231/" source="CVE"/>
		<reference ref_id="CVE-2015-1233" ref_url="https://www.suse.com/security/cve/CVE-2015-1233/" source="CVE"/>
		<reference ref_id="CVE-2015-1234" ref_url="https://www.suse.com/security/cve/CVE-2015-1234/" source="CVE"/>
		<reference ref_id="CVE-2015-1235" ref_url="https://www.suse.com/security/cve/CVE-2015-1235/" source="CVE"/>
		<reference ref_id="CVE-2015-1236" ref_url="https://www.suse.com/security/cve/CVE-2015-1236/" source="CVE"/>
		<reference ref_id="CVE-2015-1237" ref_url="https://www.suse.com/security/cve/CVE-2015-1237/" source="CVE"/>
		<reference ref_id="CVE-2015-1238" ref_url="https://www.suse.com/security/cve/CVE-2015-1238/" source="CVE"/>
		<reference ref_id="CVE-2015-1240" ref_url="https://www.suse.com/security/cve/CVE-2015-1240/" source="CVE"/>
		<reference ref_id="CVE-2015-1241" ref_url="https://www.suse.com/security/cve/CVE-2015-1241/" source="CVE"/>
		<reference ref_id="CVE-2015-1242" ref_url="https://www.suse.com/security/cve/CVE-2015-1242/" source="CVE"/>
		<reference ref_id="CVE-2015-1243" ref_url="https://www.suse.com/security/cve/CVE-2015-1243/" source="CVE"/>
		<reference ref_id="CVE-2015-1244" ref_url="https://www.suse.com/security/cve/CVE-2015-1244/" source="CVE"/>
		<reference ref_id="CVE-2015-1245" ref_url="https://www.suse.com/security/cve/CVE-2015-1245/" source="CVE"/>
		<reference ref_id="CVE-2015-1246" ref_url="https://www.suse.com/security/cve/CVE-2015-1246/" source="CVE"/>
		<reference ref_id="CVE-2015-1247" ref_url="https://www.suse.com/security/cve/CVE-2015-1247/" source="CVE"/>
		<reference ref_id="CVE-2015-1248" ref_url="https://www.suse.com/security/cve/CVE-2015-1248/" source="CVE"/>
		<reference ref_id="CVE-2015-1249" ref_url="https://www.suse.com/security/cve/CVE-2015-1249/" source="CVE"/>
		<reference ref_id="CVE-2015-1250" ref_url="https://www.suse.com/security/cve/CVE-2015-1250/" source="CVE"/>
		<reference ref_id="CVE-2015-1251" ref_url="https://www.suse.com/security/cve/CVE-2015-1251/" source="CVE"/>
		<reference ref_id="CVE-2015-1252" ref_url="https://www.suse.com/security/cve/CVE-2015-1252/" source="CVE"/>
		<reference ref_id="CVE-2015-1253" ref_url="https://www.suse.com/security/cve/CVE-2015-1253/" source="CVE"/>
		<reference ref_id="CVE-2015-1254" ref_url="https://www.suse.com/security/cve/CVE-2015-1254/" source="CVE"/>
		<reference ref_id="CVE-2015-1255" ref_url="https://www.suse.com/security/cve/CVE-2015-1255/" source="CVE"/>
		<reference ref_id="CVE-2015-1256" ref_url="https://www.suse.com/security/cve/CVE-2015-1256/" source="CVE"/>
		<reference ref_id="CVE-2015-1257" ref_url="https://www.suse.com/security/cve/CVE-2015-1257/" source="CVE"/>
		<reference ref_id="CVE-2015-1258" ref_url="https://www.suse.com/security/cve/CVE-2015-1258/" source="CVE"/>
		<reference ref_id="CVE-2015-1259" ref_url="https://www.suse.com/security/cve/CVE-2015-1259/" source="CVE"/>
		<reference ref_id="CVE-2015-1260" ref_url="https://www.suse.com/security/cve/CVE-2015-1260/" source="CVE"/>
		<reference ref_id="CVE-2015-1261" ref_url="https://www.suse.com/security/cve/CVE-2015-1261/" source="CVE"/>
		<reference ref_id="CVE-2015-1262" ref_url="https://www.suse.com/security/cve/CVE-2015-1262/" source="CVE"/>
		<reference ref_id="CVE-2015-1263" ref_url="https://www.suse.com/security/cve/CVE-2015-1263/" source="CVE"/>
		<reference ref_id="CVE-2015-1264" ref_url="https://www.suse.com/security/cve/CVE-2015-1264/" source="CVE"/>
		<reference ref_id="CVE-2015-1265" ref_url="https://www.suse.com/security/cve/CVE-2015-1265/" source="CVE"/>
		<reference ref_id="CVE-2015-1266" ref_url="https://www.suse.com/security/cve/CVE-2015-1266/" source="CVE"/>
		<reference ref_id="CVE-2015-1267" ref_url="https://www.suse.com/security/cve/CVE-2015-1267/" source="CVE"/>
		<reference ref_id="CVE-2015-1268" ref_url="https://www.suse.com/security/cve/CVE-2015-1268/" source="CVE"/>
		<reference ref_id="CVE-2015-1269" ref_url="https://www.suse.com/security/cve/CVE-2015-1269/" source="CVE"/>
		<reference ref_id="CVE-2015-1270" ref_url="https://www.suse.com/security/cve/CVE-2015-1270/" source="CVE"/>
		<reference ref_id="CVE-2015-1271" ref_url="https://www.suse.com/security/cve/CVE-2015-1271/" source="CVE"/>
		<reference ref_id="CVE-2015-1272" ref_url="https://www.suse.com/security/cve/CVE-2015-1272/" source="CVE"/>
		<reference ref_id="CVE-2015-1273" ref_url="https://www.suse.com/security/cve/CVE-2015-1273/" source="CVE"/>
		<reference ref_id="CVE-2015-1274" ref_url="https://www.suse.com/security/cve/CVE-2015-1274/" source="CVE"/>
		<reference ref_id="CVE-2015-1275" ref_url="https://www.suse.com/security/cve/CVE-2015-1275/" source="CVE"/>
		<reference ref_id="CVE-2015-1276" ref_url="https://www.suse.com/security/cve/CVE-2015-1276/" source="CVE"/>
		<reference ref_id="CVE-2015-1277" ref_url="https://www.suse.com/security/cve/CVE-2015-1277/" source="CVE"/>
		<reference ref_id="CVE-2015-1278" ref_url="https://www.suse.com/security/cve/CVE-2015-1278/" source="CVE"/>
		<reference ref_id="CVE-2015-1279" ref_url="https://www.suse.com/security/cve/CVE-2015-1279/" source="CVE"/>
		<reference ref_id="CVE-2015-1280" ref_url="https://www.suse.com/security/cve/CVE-2015-1280/" source="CVE"/>
		<reference ref_id="CVE-2015-1281" ref_url="https://www.suse.com/security/cve/CVE-2015-1281/" source="CVE"/>
		<reference ref_id="CVE-2015-1282" ref_url="https://www.suse.com/security/cve/CVE-2015-1282/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2015-1284" ref_url="https://www.suse.com/security/cve/CVE-2015-1284/" source="CVE"/>
		<reference ref_id="CVE-2015-1285" ref_url="https://www.suse.com/security/cve/CVE-2015-1285/" source="CVE"/>
		<reference ref_id="CVE-2015-1286" ref_url="https://www.suse.com/security/cve/CVE-2015-1286/" source="CVE"/>
		<reference ref_id="CVE-2015-1287" ref_url="https://www.suse.com/security/cve/CVE-2015-1287/" source="CVE"/>
		<reference ref_id="CVE-2015-1288" ref_url="https://www.suse.com/security/cve/CVE-2015-1288/" source="CVE"/>
		<reference ref_id="CVE-2015-1289" ref_url="https://www.suse.com/security/cve/CVE-2015-1289/" source="CVE"/>
		<reference ref_id="CVE-2015-1291" ref_url="https://www.suse.com/security/cve/CVE-2015-1291/" source="CVE"/>
		<reference ref_id="CVE-2015-1292" ref_url="https://www.suse.com/security/cve/CVE-2015-1292/" source="CVE"/>
		<reference ref_id="CVE-2015-1293" ref_url="https://www.suse.com/security/cve/CVE-2015-1293/" source="CVE"/>
		<reference ref_id="CVE-2015-1294" ref_url="https://www.suse.com/security/cve/CVE-2015-1294/" source="CVE"/>
		<reference ref_id="CVE-2015-1295" ref_url="https://www.suse.com/security/cve/CVE-2015-1295/" source="CVE"/>
		<reference ref_id="CVE-2015-1296" ref_url="https://www.suse.com/security/cve/CVE-2015-1296/" source="CVE"/>
		<reference ref_id="CVE-2015-1297" ref_url="https://www.suse.com/security/cve/CVE-2015-1297/" source="CVE"/>
		<reference ref_id="CVE-2015-1298" ref_url="https://www.suse.com/security/cve/CVE-2015-1298/" source="CVE"/>
		<reference ref_id="CVE-2015-1299" ref_url="https://www.suse.com/security/cve/CVE-2015-1299/" source="CVE"/>
		<reference ref_id="CVE-2015-1300" ref_url="https://www.suse.com/security/cve/CVE-2015-1300/" source="CVE"/>
		<reference ref_id="CVE-2015-1301" ref_url="https://www.suse.com/security/cve/CVE-2015-1301/" source="CVE"/>
		<reference ref_id="CVE-2015-1302" ref_url="https://www.suse.com/security/cve/CVE-2015-1302/" source="CVE"/>
		<reference ref_id="CVE-2015-1303" ref_url="https://www.suse.com/security/cve/CVE-2015-1303/" source="CVE"/>
		<reference ref_id="CVE-2015-1304" ref_url="https://www.suse.com/security/cve/CVE-2015-1304/" source="CVE"/>
		<reference ref_id="CVE-2015-6755" ref_url="https://www.suse.com/security/cve/CVE-2015-6755/" source="CVE"/>
		<reference ref_id="CVE-2015-6756" ref_url="https://www.suse.com/security/cve/CVE-2015-6756/" source="CVE"/>
		<reference ref_id="CVE-2015-6757" ref_url="https://www.suse.com/security/cve/CVE-2015-6757/" source="CVE"/>
		<reference ref_id="CVE-2015-6758" ref_url="https://www.suse.com/security/cve/CVE-2015-6758/" source="CVE"/>
		<reference ref_id="CVE-2015-6759" ref_url="https://www.suse.com/security/cve/CVE-2015-6759/" source="CVE"/>
		<reference ref_id="CVE-2015-6760" ref_url="https://www.suse.com/security/cve/CVE-2015-6760/" source="CVE"/>
		<reference ref_id="CVE-2015-6761" ref_url="https://www.suse.com/security/cve/CVE-2015-6761/" source="CVE"/>
		<reference ref_id="CVE-2015-6762" ref_url="https://www.suse.com/security/cve/CVE-2015-6762/" source="CVE"/>
		<reference ref_id="CVE-2015-6763" ref_url="https://www.suse.com/security/cve/CVE-2015-6763/" source="CVE"/>
		<reference ref_id="CVE-2015-6764" ref_url="https://www.suse.com/security/cve/CVE-2015-6764/" source="CVE"/>
		<reference ref_id="CVE-2015-6765" ref_url="https://www.suse.com/security/cve/CVE-2015-6765/" source="CVE"/>
		<reference ref_id="CVE-2015-6766" ref_url="https://www.suse.com/security/cve/CVE-2015-6766/" source="CVE"/>
		<reference ref_id="CVE-2015-6767" ref_url="https://www.suse.com/security/cve/CVE-2015-6767/" source="CVE"/>
		<reference ref_id="CVE-2015-6768" ref_url="https://www.suse.com/security/cve/CVE-2015-6768/" source="CVE"/>
		<reference ref_id="CVE-2015-6769" ref_url="https://www.suse.com/security/cve/CVE-2015-6769/" source="CVE"/>
		<reference ref_id="CVE-2015-6770" ref_url="https://www.suse.com/security/cve/CVE-2015-6770/" source="CVE"/>
		<reference ref_id="CVE-2015-6771" ref_url="https://www.suse.com/security/cve/CVE-2015-6771/" source="CVE"/>
		<reference ref_id="CVE-2015-6772" ref_url="https://www.suse.com/security/cve/CVE-2015-6772/" source="CVE"/>
		<reference ref_id="CVE-2015-6773" ref_url="https://www.suse.com/security/cve/CVE-2015-6773/" source="CVE"/>
		<reference ref_id="CVE-2015-6774" ref_url="https://www.suse.com/security/cve/CVE-2015-6774/" source="CVE"/>
		<reference ref_id="CVE-2015-6775" ref_url="https://www.suse.com/security/cve/CVE-2015-6775/" source="CVE"/>
		<reference ref_id="CVE-2015-6776" ref_url="https://www.suse.com/security/cve/CVE-2015-6776/" source="CVE"/>
		<reference ref_id="CVE-2015-6777" ref_url="https://www.suse.com/security/cve/CVE-2015-6777/" source="CVE"/>
		<reference ref_id="CVE-2015-6778" ref_url="https://www.suse.com/security/cve/CVE-2015-6778/" source="CVE"/>
		<reference ref_id="CVE-2015-6779" ref_url="https://www.suse.com/security/cve/CVE-2015-6779/" source="CVE"/>
		<reference ref_id="CVE-2015-6780" ref_url="https://www.suse.com/security/cve/CVE-2015-6780/" source="CVE"/>
		<reference ref_id="CVE-2015-6781" ref_url="https://www.suse.com/security/cve/CVE-2015-6781/" source="CVE"/>
		<reference ref_id="CVE-2015-6782" ref_url="https://www.suse.com/security/cve/CVE-2015-6782/" source="CVE"/>
		<reference ref_id="CVE-2015-6783" ref_url="https://www.suse.com/security/cve/CVE-2015-6783/" source="CVE"/>
		<reference ref_id="CVE-2015-6784" ref_url="https://www.suse.com/security/cve/CVE-2015-6784/" source="CVE"/>
		<reference ref_id="CVE-2015-6785" ref_url="https://www.suse.com/security/cve/CVE-2015-6785/" source="CVE"/>
		<reference ref_id="CVE-2015-6786" ref_url="https://www.suse.com/security/cve/CVE-2015-6786/" source="CVE"/>
		<reference ref_id="CVE-2015-6787" ref_url="https://www.suse.com/security/cve/CVE-2015-6787/" source="CVE"/>
		<reference ref_id="CVE-2015-6788" ref_url="https://www.suse.com/security/cve/CVE-2015-6788/" source="CVE"/>
		<reference ref_id="CVE-2015-6789" ref_url="https://www.suse.com/security/cve/CVE-2015-6789/" source="CVE"/>
		<reference ref_id="CVE-2015-6790" ref_url="https://www.suse.com/security/cve/CVE-2015-6790/" source="CVE"/>
		<reference ref_id="CVE-2015-6791" ref_url="https://www.suse.com/security/cve/CVE-2015-6791/" source="CVE"/>
		<reference ref_id="CVE-2015-6792" ref_url="https://www.suse.com/security/cve/CVE-2015-6792/" source="CVE"/>
		<reference ref_id="CVE-2015-7834" ref_url="https://www.suse.com/security/cve/CVE-2015-7834/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-1612" ref_url="https://www.suse.com/security/cve/CVE-2016-1612/" source="CVE"/>
		<reference ref_id="CVE-2016-1613" ref_url="https://www.suse.com/security/cve/CVE-2016-1613/" source="CVE"/>
		<reference ref_id="CVE-2016-1614" ref_url="https://www.suse.com/security/cve/CVE-2016-1614/" source="CVE"/>
		<reference ref_id="CVE-2016-1615" ref_url="https://www.suse.com/security/cve/CVE-2016-1615/" source="CVE"/>
		<reference ref_id="CVE-2016-1616" ref_url="https://www.suse.com/security/cve/CVE-2016-1616/" source="CVE"/>
		<reference ref_id="CVE-2016-1617" ref_url="https://www.suse.com/security/cve/CVE-2016-1617/" source="CVE"/>
		<reference ref_id="CVE-2016-1618" ref_url="https://www.suse.com/security/cve/CVE-2016-1618/" source="CVE"/>
		<reference ref_id="CVE-2016-1619" ref_url="https://www.suse.com/security/cve/CVE-2016-1619/" source="CVE"/>
		<reference ref_id="CVE-2016-1620" ref_url="https://www.suse.com/security/cve/CVE-2016-1620/" source="CVE"/>
		<reference ref_id="CVE-2016-1622" ref_url="https://www.suse.com/security/cve/CVE-2016-1622/" source="CVE"/>
		<reference ref_id="CVE-2016-1623" ref_url="https://www.suse.com/security/cve/CVE-2016-1623/" source="CVE"/>
		<reference ref_id="CVE-2016-1624" ref_url="https://www.suse.com/security/cve/CVE-2016-1624/" source="CVE"/>
		<reference ref_id="CVE-2016-1625" ref_url="https://www.suse.com/security/cve/CVE-2016-1625/" source="CVE"/>
		<reference ref_id="CVE-2016-1626" ref_url="https://www.suse.com/security/cve/CVE-2016-1626/" source="CVE"/>
		<reference ref_id="CVE-2016-1627" ref_url="https://www.suse.com/security/cve/CVE-2016-1627/" source="CVE"/>
		<reference ref_id="CVE-2016-1629" ref_url="https://www.suse.com/security/cve/CVE-2016-1629/" source="CVE"/>
		<reference ref_id="CVE-2016-1630" ref_url="https://www.suse.com/security/cve/CVE-2016-1630/" source="CVE"/>
		<reference ref_id="CVE-2016-1631" ref_url="https://www.suse.com/security/cve/CVE-2016-1631/" source="CVE"/>
		<reference ref_id="CVE-2016-1632" ref_url="https://www.suse.com/security/cve/CVE-2016-1632/" source="CVE"/>
		<reference ref_id="CVE-2016-1633" ref_url="https://www.suse.com/security/cve/CVE-2016-1633/" source="CVE"/>
		<reference ref_id="CVE-2016-1634" ref_url="https://www.suse.com/security/cve/CVE-2016-1634/" source="CVE"/>
		<reference ref_id="CVE-2016-1635" ref_url="https://www.suse.com/security/cve/CVE-2016-1635/" source="CVE"/>
		<reference ref_id="CVE-2016-1636" ref_url="https://www.suse.com/security/cve/CVE-2016-1636/" source="CVE"/>
		<reference ref_id="CVE-2016-1637" ref_url="https://www.suse.com/security/cve/CVE-2016-1637/" source="CVE"/>
		<reference ref_id="CVE-2016-1638" ref_url="https://www.suse.com/security/cve/CVE-2016-1638/" source="CVE"/>
		<reference ref_id="CVE-2016-1639" ref_url="https://www.suse.com/security/cve/CVE-2016-1639/" source="CVE"/>
		<reference ref_id="CVE-2016-1640" ref_url="https://www.suse.com/security/cve/CVE-2016-1640/" source="CVE"/>
		<reference ref_id="CVE-2016-1641" ref_url="https://www.suse.com/security/cve/CVE-2016-1641/" source="CVE"/>
		<reference ref_id="CVE-2016-1642" ref_url="https://www.suse.com/security/cve/CVE-2016-1642/" source="CVE"/>
		<reference ref_id="CVE-2016-1643" ref_url="https://www.suse.com/security/cve/CVE-2016-1643/" source="CVE"/>
		<reference ref_id="CVE-2016-1644" ref_url="https://www.suse.com/security/cve/CVE-2016-1644/" source="CVE"/>
		<reference ref_id="CVE-2016-1645" ref_url="https://www.suse.com/security/cve/CVE-2016-1645/" source="CVE"/>
		<reference ref_id="CVE-2016-1646" ref_url="https://www.suse.com/security/cve/CVE-2016-1646/" source="CVE"/>
		<reference ref_id="CVE-2016-1647" ref_url="https://www.suse.com/security/cve/CVE-2016-1647/" source="CVE"/>
		<reference ref_id="CVE-2016-1648" ref_url="https://www.suse.com/security/cve/CVE-2016-1648/" source="CVE"/>
		<reference ref_id="CVE-2016-1649" ref_url="https://www.suse.com/security/cve/CVE-2016-1649/" source="CVE"/>
		<reference ref_id="CVE-2016-1650" ref_url="https://www.suse.com/security/cve/CVE-2016-1650/" source="CVE"/>
		<reference ref_id="CVE-2016-1651" ref_url="https://www.suse.com/security/cve/CVE-2016-1651/" source="CVE"/>
		<reference ref_id="CVE-2016-1652" ref_url="https://www.suse.com/security/cve/CVE-2016-1652/" source="CVE"/>
		<reference ref_id="CVE-2016-1653" ref_url="https://www.suse.com/security/cve/CVE-2016-1653/" source="CVE"/>
		<reference ref_id="CVE-2016-1654" ref_url="https://www.suse.com/security/cve/CVE-2016-1654/" source="CVE"/>
		<reference ref_id="CVE-2016-1655" ref_url="https://www.suse.com/security/cve/CVE-2016-1655/" source="CVE"/>
		<reference ref_id="CVE-2016-1656" ref_url="https://www.suse.com/security/cve/CVE-2016-1656/" source="CVE"/>
		<reference ref_id="CVE-2016-1657" ref_url="https://www.suse.com/security/cve/CVE-2016-1657/" source="CVE"/>
		<reference ref_id="CVE-2016-1658" ref_url="https://www.suse.com/security/cve/CVE-2016-1658/" source="CVE"/>
		<reference ref_id="CVE-2016-1659" ref_url="https://www.suse.com/security/cve/CVE-2016-1659/" source="CVE"/>
		<reference ref_id="CVE-2016-1660" ref_url="https://www.suse.com/security/cve/CVE-2016-1660/" source="CVE"/>
		<reference ref_id="CVE-2016-1661" ref_url="https://www.suse.com/security/cve/CVE-2016-1661/" source="CVE"/>
		<reference ref_id="CVE-2016-1662" ref_url="https://www.suse.com/security/cve/CVE-2016-1662/" source="CVE"/>
		<reference ref_id="CVE-2016-1663" ref_url="https://www.suse.com/security/cve/CVE-2016-1663/" source="CVE"/>
		<reference ref_id="CVE-2016-1664" ref_url="https://www.suse.com/security/cve/CVE-2016-1664/" source="CVE"/>
		<reference ref_id="CVE-2016-1665" ref_url="https://www.suse.com/security/cve/CVE-2016-1665/" source="CVE"/>
		<reference ref_id="CVE-2016-1666" ref_url="https://www.suse.com/security/cve/CVE-2016-1666/" source="CVE"/>
		<reference ref_id="CVE-2016-1667" ref_url="https://www.suse.com/security/cve/CVE-2016-1667/" source="CVE"/>
		<reference ref_id="CVE-2016-1668" ref_url="https://www.suse.com/security/cve/CVE-2016-1668/" source="CVE"/>
		<reference ref_id="CVE-2016-1669" ref_url="https://www.suse.com/security/cve/CVE-2016-1669/" source="CVE"/>
		<reference ref_id="CVE-2016-1670" ref_url="https://www.suse.com/security/cve/CVE-2016-1670/" source="CVE"/>
		<reference ref_id="CVE-2016-1672" ref_url="https://www.suse.com/security/cve/CVE-2016-1672/" source="CVE"/>
		<reference ref_id="CVE-2016-1673" ref_url="https://www.suse.com/security/cve/CVE-2016-1673/" source="CVE"/>
		<reference ref_id="CVE-2016-1674" ref_url="https://www.suse.com/security/cve/CVE-2016-1674/" source="CVE"/>
		<reference ref_id="CVE-2016-1675" ref_url="https://www.suse.com/security/cve/CVE-2016-1675/" source="CVE"/>
		<reference ref_id="CVE-2016-1676" ref_url="https://www.suse.com/security/cve/CVE-2016-1676/" source="CVE"/>
		<reference ref_id="CVE-2016-1677" ref_url="https://www.suse.com/security/cve/CVE-2016-1677/" source="CVE"/>
		<reference ref_id="CVE-2016-1678" ref_url="https://www.suse.com/security/cve/CVE-2016-1678/" source="CVE"/>
		<reference ref_id="CVE-2016-1679" ref_url="https://www.suse.com/security/cve/CVE-2016-1679/" source="CVE"/>
		<reference ref_id="CVE-2016-1680" ref_url="https://www.suse.com/security/cve/CVE-2016-1680/" source="CVE"/>
		<reference ref_id="CVE-2016-1681" ref_url="https://www.suse.com/security/cve/CVE-2016-1681/" source="CVE"/>
		<reference ref_id="CVE-2016-1682" ref_url="https://www.suse.com/security/cve/CVE-2016-1682/" source="CVE"/>
		<reference ref_id="CVE-2016-1683" ref_url="https://www.suse.com/security/cve/CVE-2016-1683/" source="CVE"/>
		<reference ref_id="CVE-2016-1684" ref_url="https://www.suse.com/security/cve/CVE-2016-1684/" source="CVE"/>
		<reference ref_id="CVE-2016-1685" ref_url="https://www.suse.com/security/cve/CVE-2016-1685/" source="CVE"/>
		<reference ref_id="CVE-2016-1686" ref_url="https://www.suse.com/security/cve/CVE-2016-1686/" source="CVE"/>
		<reference ref_id="CVE-2016-1687" ref_url="https://www.suse.com/security/cve/CVE-2016-1687/" source="CVE"/>
		<reference ref_id="CVE-2016-1688" ref_url="https://www.suse.com/security/cve/CVE-2016-1688/" source="CVE"/>
		<reference ref_id="CVE-2016-1689" ref_url="https://www.suse.com/security/cve/CVE-2016-1689/" source="CVE"/>
		<reference ref_id="CVE-2016-1690" ref_url="https://www.suse.com/security/cve/CVE-2016-1690/" source="CVE"/>
		<reference ref_id="CVE-2016-1691" ref_url="https://www.suse.com/security/cve/CVE-2016-1691/" source="CVE"/>
		<reference ref_id="CVE-2016-1692" ref_url="https://www.suse.com/security/cve/CVE-2016-1692/" source="CVE"/>
		<reference ref_id="CVE-2016-1693" ref_url="https://www.suse.com/security/cve/CVE-2016-1693/" source="CVE"/>
		<reference ref_id="CVE-2016-1694" ref_url="https://www.suse.com/security/cve/CVE-2016-1694/" source="CVE"/>
		<reference ref_id="CVE-2016-1695" ref_url="https://www.suse.com/security/cve/CVE-2016-1695/" source="CVE"/>
		<reference ref_id="CVE-2016-1696" ref_url="https://www.suse.com/security/cve/CVE-2016-1696/" source="CVE"/>
		<reference ref_id="CVE-2016-1697" ref_url="https://www.suse.com/security/cve/CVE-2016-1697/" source="CVE"/>
		<reference ref_id="CVE-2016-1698" ref_url="https://www.suse.com/security/cve/CVE-2016-1698/" source="CVE"/>
		<reference ref_id="CVE-2016-1699" ref_url="https://www.suse.com/security/cve/CVE-2016-1699/" source="CVE"/>
		<reference ref_id="CVE-2016-1700" ref_url="https://www.suse.com/security/cve/CVE-2016-1700/" source="CVE"/>
		<reference ref_id="CVE-2016-1701" ref_url="https://www.suse.com/security/cve/CVE-2016-1701/" source="CVE"/>
		<reference ref_id="CVE-2016-1702" ref_url="https://www.suse.com/security/cve/CVE-2016-1702/" source="CVE"/>
		<reference ref_id="CVE-2016-1703" ref_url="https://www.suse.com/security/cve/CVE-2016-1703/" source="CVE"/>
		<reference ref_id="CVE-2016-1704" ref_url="https://www.suse.com/security/cve/CVE-2016-1704/" source="CVE"/>
		<reference ref_id="CVE-2016-1705" ref_url="https://www.suse.com/security/cve/CVE-2016-1705/" source="CVE"/>
		<reference ref_id="CVE-2016-1706" ref_url="https://www.suse.com/security/cve/CVE-2016-1706/" source="CVE"/>
		<reference ref_id="CVE-2016-1707" ref_url="https://www.suse.com/security/cve/CVE-2016-1707/" source="CVE"/>
		<reference ref_id="CVE-2016-1708" ref_url="https://www.suse.com/security/cve/CVE-2016-1708/" source="CVE"/>
		<reference ref_id="CVE-2016-1709" ref_url="https://www.suse.com/security/cve/CVE-2016-1709/" source="CVE"/>
		<reference ref_id="CVE-2016-1710" ref_url="https://www.suse.com/security/cve/CVE-2016-1710/" source="CVE"/>
		<reference ref_id="CVE-2016-1711" ref_url="https://www.suse.com/security/cve/CVE-2016-1711/" source="CVE"/>
		<reference ref_id="CVE-2016-3679" ref_url="https://www.suse.com/security/cve/CVE-2016-3679/" source="CVE"/>
		<reference ref_id="CVE-2016-5127" ref_url="https://www.suse.com/security/cve/CVE-2016-5127/" source="CVE"/>
		<reference ref_id="CVE-2016-5128" ref_url="https://www.suse.com/security/cve/CVE-2016-5128/" source="CVE"/>
		<reference ref_id="CVE-2016-5129" ref_url="https://www.suse.com/security/cve/CVE-2016-5129/" source="CVE"/>
		<reference ref_id="CVE-2016-5130" ref_url="https://www.suse.com/security/cve/CVE-2016-5130/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2016-5132" ref_url="https://www.suse.com/security/cve/CVE-2016-5132/" source="CVE"/>
		<reference ref_id="CVE-2016-5133" ref_url="https://www.suse.com/security/cve/CVE-2016-5133/" source="CVE"/>
		<reference ref_id="CVE-2016-5134" ref_url="https://www.suse.com/security/cve/CVE-2016-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-5135" ref_url="https://www.suse.com/security/cve/CVE-2016-5135/" source="CVE"/>
		<reference ref_id="CVE-2016-5136" ref_url="https://www.suse.com/security/cve/CVE-2016-5136/" source="CVE"/>
		<reference ref_id="CVE-2016-5137" ref_url="https://www.suse.com/security/cve/CVE-2016-5137/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5140" ref_url="https://www.suse.com/security/cve/CVE-2016-5140/" source="CVE"/>
		<reference ref_id="CVE-2016-5141" ref_url="https://www.suse.com/security/cve/CVE-2016-5141/" source="CVE"/>
		<reference ref_id="CVE-2016-5142" ref_url="https://www.suse.com/security/cve/CVE-2016-5142/" source="CVE"/>
		<reference ref_id="CVE-2016-5143" ref_url="https://www.suse.com/security/cve/CVE-2016-5143/" source="CVE"/>
		<reference ref_id="CVE-2016-5144" ref_url="https://www.suse.com/security/cve/CVE-2016-5144/" source="CVE"/>
		<reference ref_id="CVE-2016-5145" ref_url="https://www.suse.com/security/cve/CVE-2016-5145/" source="CVE"/>
		<reference ref_id="CVE-2016-5146" ref_url="https://www.suse.com/security/cve/CVE-2016-5146/" source="CVE"/>
		<reference ref_id="CVE-2016-5147" ref_url="https://www.suse.com/security/cve/CVE-2016-5147/" source="CVE"/>
		<reference ref_id="CVE-2016-5148" ref_url="https://www.suse.com/security/cve/CVE-2016-5148/" source="CVE"/>
		<reference ref_id="CVE-2016-5149" ref_url="https://www.suse.com/security/cve/CVE-2016-5149/" source="CVE"/>
		<reference ref_id="CVE-2016-5150" ref_url="https://www.suse.com/security/cve/CVE-2016-5150/" source="CVE"/>
		<reference ref_id="CVE-2016-5151" ref_url="https://www.suse.com/security/cve/CVE-2016-5151/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5153" ref_url="https://www.suse.com/security/cve/CVE-2016-5153/" source="CVE"/>
		<reference ref_id="CVE-2016-5154" ref_url="https://www.suse.com/security/cve/CVE-2016-5154/" source="CVE"/>
		<reference ref_id="CVE-2016-5155" ref_url="https://www.suse.com/security/cve/CVE-2016-5155/" source="CVE"/>
		<reference ref_id="CVE-2016-5156" ref_url="https://www.suse.com/security/cve/CVE-2016-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-5157" ref_url="https://www.suse.com/security/cve/CVE-2016-5157/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-5160" ref_url="https://www.suse.com/security/cve/CVE-2016-5160/" source="CVE"/>
		<reference ref_id="CVE-2016-5161" ref_url="https://www.suse.com/security/cve/CVE-2016-5161/" source="CVE"/>
		<reference ref_id="CVE-2016-5162" ref_url="https://www.suse.com/security/cve/CVE-2016-5162/" source="CVE"/>
		<reference ref_id="CVE-2016-5163" ref_url="https://www.suse.com/security/cve/CVE-2016-5163/" source="CVE"/>
		<reference ref_id="CVE-2016-5164" ref_url="https://www.suse.com/security/cve/CVE-2016-5164/" source="CVE"/>
		<reference ref_id="CVE-2016-5165" ref_url="https://www.suse.com/security/cve/CVE-2016-5165/" source="CVE"/>
		<reference ref_id="CVE-2016-5166" ref_url="https://www.suse.com/security/cve/CVE-2016-5166/" source="CVE"/>
		<reference ref_id="CVE-2016-5170" ref_url="https://www.suse.com/security/cve/CVE-2016-5170/" source="CVE"/>
		<reference ref_id="CVE-2016-5171" ref_url="https://www.suse.com/security/cve/CVE-2016-5171/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5173" ref_url="https://www.suse.com/security/cve/CVE-2016-5173/" source="CVE"/>
		<reference ref_id="CVE-2016-5174" ref_url="https://www.suse.com/security/cve/CVE-2016-5174/" source="CVE"/>
		<reference ref_id="CVE-2016-5175" ref_url="https://www.suse.com/security/cve/CVE-2016-5175/" source="CVE"/>
		<reference ref_id="CVE-2016-5177" ref_url="https://www.suse.com/security/cve/CVE-2016-5177/" source="CVE"/>
		<reference ref_id="CVE-2016-5178" ref_url="https://www.suse.com/security/cve/CVE-2016-5178/" source="CVE"/>
		<reference ref_id="CVE-2016-5181" ref_url="https://www.suse.com/security/cve/CVE-2016-5181/" source="CVE"/>
		<reference ref_id="CVE-2016-5182" ref_url="https://www.suse.com/security/cve/CVE-2016-5182/" source="CVE"/>
		<reference ref_id="CVE-2016-5183" ref_url="https://www.suse.com/security/cve/CVE-2016-5183/" source="CVE"/>
		<reference ref_id="CVE-2016-5184" ref_url="https://www.suse.com/security/cve/CVE-2016-5184/" source="CVE"/>
		<reference ref_id="CVE-2016-5185" ref_url="https://www.suse.com/security/cve/CVE-2016-5185/" source="CVE"/>
		<reference ref_id="CVE-2016-5186" ref_url="https://www.suse.com/security/cve/CVE-2016-5186/" source="CVE"/>
		<reference ref_id="CVE-2016-5187" ref_url="https://www.suse.com/security/cve/CVE-2016-5187/" source="CVE"/>
		<reference ref_id="CVE-2016-5188" ref_url="https://www.suse.com/security/cve/CVE-2016-5188/" source="CVE"/>
		<reference ref_id="CVE-2016-5189" ref_url="https://www.suse.com/security/cve/CVE-2016-5189/" source="CVE"/>
		<reference ref_id="CVE-2016-5190" ref_url="https://www.suse.com/security/cve/CVE-2016-5190/" source="CVE"/>
		<reference ref_id="CVE-2016-5191" ref_url="https://www.suse.com/security/cve/CVE-2016-5191/" source="CVE"/>
		<reference ref_id="CVE-2016-5192" ref_url="https://www.suse.com/security/cve/CVE-2016-5192/" source="CVE"/>
		<reference ref_id="CVE-2016-5193" ref_url="https://www.suse.com/security/cve/CVE-2016-5193/" source="CVE"/>
		<reference ref_id="CVE-2016-5198" ref_url="https://www.suse.com/security/cve/CVE-2016-5198/" source="CVE"/>
		<reference ref_id="CVE-2016-5199" ref_url="https://www.suse.com/security/cve/CVE-2016-5199/" source="CVE"/>
		<reference ref_id="CVE-2016-5200" ref_url="https://www.suse.com/security/cve/CVE-2016-5200/" source="CVE"/>
		<reference ref_id="CVE-2016-5201" ref_url="https://www.suse.com/security/cve/CVE-2016-5201/" source="CVE"/>
		<reference ref_id="CVE-2016-5202" ref_url="https://www.suse.com/security/cve/CVE-2016-5202/" source="CVE"/>
		<reference ref_id="CVE-2016-5203" ref_url="https://www.suse.com/security/cve/CVE-2016-5203/" source="CVE"/>
		<reference ref_id="CVE-2016-5204" ref_url="https://www.suse.com/security/cve/CVE-2016-5204/" source="CVE"/>
		<reference ref_id="CVE-2016-5205" ref_url="https://www.suse.com/security/cve/CVE-2016-5205/" source="CVE"/>
		<reference ref_id="CVE-2016-5206" ref_url="https://www.suse.com/security/cve/CVE-2016-5206/" source="CVE"/>
		<reference ref_id="CVE-2016-5207" ref_url="https://www.suse.com/security/cve/CVE-2016-5207/" source="CVE"/>
		<reference ref_id="CVE-2016-5208" ref_url="https://www.suse.com/security/cve/CVE-2016-5208/" source="CVE"/>
		<reference ref_id="CVE-2016-5209" ref_url="https://www.suse.com/security/cve/CVE-2016-5209/" source="CVE"/>
		<reference ref_id="CVE-2016-5210" ref_url="https://www.suse.com/security/cve/CVE-2016-5210/" source="CVE"/>
		<reference ref_id="CVE-2016-5211" ref_url="https://www.suse.com/security/cve/CVE-2016-5211/" source="CVE"/>
		<reference ref_id="CVE-2016-5212" ref_url="https://www.suse.com/security/cve/CVE-2016-5212/" source="CVE"/>
		<reference ref_id="CVE-2016-5213" ref_url="https://www.suse.com/security/cve/CVE-2016-5213/" source="CVE"/>
		<reference ref_id="CVE-2016-5214" ref_url="https://www.suse.com/security/cve/CVE-2016-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-5215" ref_url="https://www.suse.com/security/cve/CVE-2016-5215/" source="CVE"/>
		<reference ref_id="CVE-2016-5216" ref_url="https://www.suse.com/security/cve/CVE-2016-5216/" source="CVE"/>
		<reference ref_id="CVE-2016-5217" ref_url="https://www.suse.com/security/cve/CVE-2016-5217/" source="CVE"/>
		<reference ref_id="CVE-2016-5218" ref_url="https://www.suse.com/security/cve/CVE-2016-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5219" ref_url="https://www.suse.com/security/cve/CVE-2016-5219/" source="CVE"/>
		<reference ref_id="CVE-2016-5220" ref_url="https://www.suse.com/security/cve/CVE-2016-5220/" source="CVE"/>
		<reference ref_id="CVE-2016-5221" ref_url="https://www.suse.com/security/cve/CVE-2016-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-5222" ref_url="https://www.suse.com/security/cve/CVE-2016-5222/" source="CVE"/>
		<reference ref_id="CVE-2016-5223" ref_url="https://www.suse.com/security/cve/CVE-2016-5223/" source="CVE"/>
		<reference ref_id="CVE-2016-5224" ref_url="https://www.suse.com/security/cve/CVE-2016-5224/" source="CVE"/>
		<reference ref_id="CVE-2016-5225" ref_url="https://www.suse.com/security/cve/CVE-2016-5225/" source="CVE"/>
		<reference ref_id="CVE-2016-5226" ref_url="https://www.suse.com/security/cve/CVE-2016-5226/" source="CVE"/>
		<reference ref_id="CVE-2016-9650" ref_url="https://www.suse.com/security/cve/CVE-2016-9650/" source="CVE"/>
		<reference ref_id="CVE-2016-9651" ref_url="https://www.suse.com/security/cve/CVE-2016-9651/" source="CVE"/>
		<reference ref_id="CVE-2016-9652" ref_url="https://www.suse.com/security/cve/CVE-2016-9652/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-55.0.2883.75-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3015/">CVE-2011-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3015">CVE-2011-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3016/">CVE-2011-3016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3016">CVE-2011-3016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3017/">CVE-2011-3017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3017">CVE-2011-3017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3018/">CVE-2011-3018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3018">CVE-2011-3018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3019/">CVE-2011-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3019">CVE-2011-3019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3020/">CVE-2011-3020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3020">CVE-2011-3020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3021/">CVE-2011-3021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3021">CVE-2011-3021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3022/">CVE-2011-3022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3022">CVE-2011-3022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3023/">CVE-2011-3023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3023">CVE-2011-3023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3024/">CVE-2011-3024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3024">CVE-2011-3024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3025/">CVE-2011-3025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3025">CVE-2011-3025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3027/">CVE-2011-3027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3027">CVE-2011-3027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3031/">CVE-2011-3031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3031">CVE-2011-3031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3032/">CVE-2011-3032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3032">CVE-2011-3032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3033/">CVE-2011-3033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3033">CVE-2011-3033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3034/">CVE-2011-3034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3034">CVE-2011-3034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3035/">CVE-2011-3035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3035">CVE-2011-3035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3036/">CVE-2011-3036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3036">CVE-2011-3036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3037/">CVE-2011-3037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3037">CVE-2011-3037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3038/">CVE-2011-3038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3038">CVE-2011-3038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3039/">CVE-2011-3039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3039">CVE-2011-3039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3040/">CVE-2011-3040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3040">CVE-2011-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3041/">CVE-2011-3041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3041">CVE-2011-3041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3042/">CVE-2011-3042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3042">CVE-2011-3042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3043/">CVE-2011-3043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3043">CVE-2011-3043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3044/">CVE-2011-3044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3044">CVE-2011-3044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3045">CVE-2011-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3046/">CVE-2011-3046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3046">CVE-2011-3046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3047/">CVE-2011-3047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3047">CVE-2011-3047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3049/">CVE-2011-3049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3049">CVE-2011-3049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3050/">CVE-2011-3050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3050">CVE-2011-3050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3051/">CVE-2011-3051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3051">CVE-2011-3051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3052/">CVE-2011-3052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3052">CVE-2011-3052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3053/">CVE-2011-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3053">CVE-2011-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3054/">CVE-2011-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3054">CVE-2011-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3055/">CVE-2011-3055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3055">CVE-2011-3055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3056/">CVE-2011-3056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3056">CVE-2011-3056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3057/">CVE-2011-3057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3057">CVE-2011-3057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3058/">CVE-2011-3058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3058">CVE-2011-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3059/">CVE-2011-3059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3059">CVE-2011-3059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3060/">CVE-2011-3060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3060">CVE-2011-3060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3061/">CVE-2011-3061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3061">CVE-2011-3061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3063/">CVE-2011-3063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3063">CVE-2011-3063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3064/">CVE-2011-3064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3064">CVE-2011-3064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3065/">CVE-2011-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3065">CVE-2011-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3066/">CVE-2011-3066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3066">CVE-2011-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3067/">CVE-2011-3067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3067">CVE-2011-3067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3068/">CVE-2011-3068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3068">CVE-2011-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3069/">CVE-2011-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3069">CVE-2011-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3070/">CVE-2011-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3070">CVE-2011-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3071/">CVE-2011-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3071">CVE-2011-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3072/">CVE-2011-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3072">CVE-2011-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3073/">CVE-2011-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3073">CVE-2011-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3074/">CVE-2011-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3074">CVE-2011-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3075/">CVE-2011-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3075">CVE-2011-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3076/">CVE-2011-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3076">CVE-2011-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3077/">CVE-2011-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3077">CVE-2011-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3078/">CVE-2011-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3078">CVE-2011-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3080/">CVE-2011-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3080">CVE-2011-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3081/">CVE-2011-3081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3081">CVE-2011-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3083/">CVE-2011-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3083">CVE-2011-3083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3084/">CVE-2011-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3084">CVE-2011-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3085/">CVE-2011-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3085">CVE-2011-3085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3086/">CVE-2011-3086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3086">CVE-2011-3086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3087/">CVE-2011-3087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3087">CVE-2011-3087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3088/">CVE-2011-3088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3088">CVE-2011-3088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3089/">CVE-2011-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3089">CVE-2011-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3090/">CVE-2011-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3090">CVE-2011-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3091/">CVE-2011-3091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3091">CVE-2011-3091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3092/">CVE-2011-3092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3092">CVE-2011-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3093/">CVE-2011-3093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3093">CVE-2011-3093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3094/">CVE-2011-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3094">CVE-2011-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3095/">CVE-2011-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3095">CVE-2011-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3096/">CVE-2011-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3096">CVE-2011-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3098/">CVE-2011-3098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3098">CVE-2011-3098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3100/">CVE-2011-3100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3100">CVE-2011-3100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3102">CVE-2011-3102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3903/">CVE-2011-3903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3903">CVE-2011-3903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3904/">CVE-2011-3904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3904">CVE-2011-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3905/">CVE-2011-3905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3905">CVE-2011-3905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3906/">CVE-2011-3906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3906">CVE-2011-3906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3907/">CVE-2011-3907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3907">CVE-2011-3907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3908/">CVE-2011-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3908">CVE-2011-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3909/">CVE-2011-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3909">CVE-2011-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3910/">CVE-2011-3910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3910">CVE-2011-3910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3911/">CVE-2011-3911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3911">CVE-2011-3911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3912/">CVE-2011-3912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3912">CVE-2011-3912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3914/">CVE-2011-3914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3914">CVE-2011-3914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3915/">CVE-2011-3915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3915">CVE-2011-3915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3916/">CVE-2011-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3916">CVE-2011-3916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3917/">CVE-2011-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3917">CVE-2011-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3921/">CVE-2011-3921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3921">CVE-2011-3921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3924/">CVE-2011-3924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3924">CVE-2011-3924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3925/">CVE-2011-3925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3925">CVE-2011-3925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3926/">CVE-2011-3926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3926">CVE-2011-3926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3927/">CVE-2011-3927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3927">CVE-2011-3927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3928/">CVE-2011-3928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3928">CVE-2011-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3953/">CVE-2011-3953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3953">CVE-2011-3953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3954/">CVE-2011-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3954">CVE-2011-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3955/">CVE-2011-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3955">CVE-2011-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3956/">CVE-2011-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3956">CVE-2011-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3957/">CVE-2011-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3957">CVE-2011-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3958/">CVE-2011-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3958">CVE-2011-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3959/">CVE-2011-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3959">CVE-2011-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3960/">CVE-2011-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3960">CVE-2011-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3961/">CVE-2011-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3961">CVE-2011-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3962/">CVE-2011-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3962">CVE-2011-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3963/">CVE-2011-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3963">CVE-2011-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3964/">CVE-2011-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3964">CVE-2011-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3965/">CVE-2011-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3965">CVE-2011-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3966/">CVE-2011-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3966">CVE-2011-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3967/">CVE-2011-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3967">CVE-2011-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3968/">CVE-2011-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3968">CVE-2011-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3969/">CVE-2011-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3969">CVE-2011-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3971/">CVE-2011-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3971">CVE-2011-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3972/">CVE-2011-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3972">CVE-2011-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1521/">CVE-2012-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1521">CVE-2012-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2807">CVE-2012-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2815/">CVE-2012-2815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2815">CVE-2012-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2816/">CVE-2012-2816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2816">CVE-2012-2816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2817/">CVE-2012-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2817">CVE-2012-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2818/">CVE-2012-2818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2818">CVE-2012-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2819/">CVE-2012-2819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2819">CVE-2012-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2820/">CVE-2012-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2820">CVE-2012-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2821/">CVE-2012-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2821">CVE-2012-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2823/">CVE-2012-2823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2823">CVE-2012-2823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2826/">CVE-2012-2826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2826">CVE-2012-2826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2829/">CVE-2012-2829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2829">CVE-2012-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2830/">CVE-2012-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2830">CVE-2012-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2831/">CVE-2012-2831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2831">CVE-2012-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2834/">CVE-2012-2834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2834">CVE-2012-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2842/">CVE-2012-2842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2842">CVE-2012-2842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2843/">CVE-2012-2843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2843">CVE-2012-2843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2865/">CVE-2012-2865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2865">CVE-2012-2865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2866/">CVE-2012-2866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2866">CVE-2012-2866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2867/">CVE-2012-2867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2867">CVE-2012-2867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2868/">CVE-2012-2868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2868">CVE-2012-2868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2869/">CVE-2012-2869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2869">CVE-2012-2869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2870/">CVE-2012-2870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2870">CVE-2012-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2871/">CVE-2012-2871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2871">CVE-2012-2871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2872/">CVE-2012-2872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2872">CVE-2012-2872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2874/">CVE-2012-2874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2874">CVE-2012-2874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2876/">CVE-2012-2876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2876">CVE-2012-2876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2877/">CVE-2012-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2877">CVE-2012-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2878/">CVE-2012-2878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2878">CVE-2012-2878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2879/">CVE-2012-2879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2879">CVE-2012-2879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2880/">CVE-2012-2880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2880">CVE-2012-2880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2881/">CVE-2012-2881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2881">CVE-2012-2881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2882/">CVE-2012-2882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2882">CVE-2012-2882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2883/">CVE-2012-2883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2883">CVE-2012-2883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2884/">CVE-2012-2884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2884">CVE-2012-2884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2885/">CVE-2012-2885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2885">CVE-2012-2885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2886/">CVE-2012-2886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2886">CVE-2012-2886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2887/">CVE-2012-2887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2887">CVE-2012-2887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2888/">CVE-2012-2888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2888">CVE-2012-2888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2889/">CVE-2012-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2889">CVE-2012-2889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2891/">CVE-2012-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2891">CVE-2012-2891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2892/">CVE-2012-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2892">CVE-2012-2892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2893/">CVE-2012-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2893">CVE-2012-2893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2894/">CVE-2012-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2894">CVE-2012-2894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2896/">CVE-2012-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2896">CVE-2012-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5130/">CVE-2012-5130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5130">CVE-2012-5130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5131/">CVE-2012-5131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5131">CVE-2012-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5132/">CVE-2012-5132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5132">CVE-2012-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5133">CVE-2012-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5135/">CVE-2012-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5135">CVE-2012-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5136/">CVE-2012-5136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5136">CVE-2012-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5137/">CVE-2012-5137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5137">CVE-2012-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5138/">CVE-2012-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5138">CVE-2012-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5139/">CVE-2012-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5139">CVE-2012-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5140/">CVE-2012-5140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5140">CVE-2012-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5141/">CVE-2012-5141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5141">CVE-2012-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5142/">CVE-2012-5142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5142">CVE-2012-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5143/">CVE-2012-5143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5143">CVE-2012-5143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5144/">CVE-2012-5144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5144">CVE-2012-5144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5145/">CVE-2012-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5145">CVE-2012-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5146/">CVE-2012-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5146">CVE-2012-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5147/">CVE-2012-5147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5147">CVE-2012-5147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5148/">CVE-2012-5148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5148">CVE-2012-5148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5149/">CVE-2012-5149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5149">CVE-2012-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5150/">CVE-2012-5150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5150">CVE-2012-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5152/">CVE-2012-5152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5152">CVE-2012-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5153/">CVE-2012-5153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5153">CVE-2012-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5154/">CVE-2012-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5154">CVE-2012-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0830/">CVE-2013-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0830">CVE-2013-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0831/">CVE-2013-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0831">CVE-2013-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0832/">CVE-2013-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0832">CVE-2013-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0833/">CVE-2013-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0833">CVE-2013-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0834/">CVE-2013-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0834">CVE-2013-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0835/">CVE-2013-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0835">CVE-2013-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0836/">CVE-2013-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0836">CVE-2013-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0837/">CVE-2013-0837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0837">CVE-2013-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0838/">CVE-2013-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0838">CVE-2013-0838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0879/">CVE-2013-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0879">CVE-2013-0879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0880/">CVE-2013-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0880">CVE-2013-0880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0881/">CVE-2013-0881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0881">CVE-2013-0881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0882/">CVE-2013-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0882">CVE-2013-0882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0883/">CVE-2013-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0883">CVE-2013-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0884/">CVE-2013-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0884">CVE-2013-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0885/">CVE-2013-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0885">CVE-2013-0885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0886/">CVE-2013-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0886">CVE-2013-0886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0887/">CVE-2013-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0887">CVE-2013-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0888/">CVE-2013-0888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0888">CVE-2013-0888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0889/">CVE-2013-0889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0889">CVE-2013-0889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0890/">CVE-2013-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0890">CVE-2013-0890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0891/">CVE-2013-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0891">CVE-2013-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0892/">CVE-2013-0892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0892">CVE-2013-0892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0893/">CVE-2013-0893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0893">CVE-2013-0893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0894/">CVE-2013-0894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0894">CVE-2013-0894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0895/">CVE-2013-0895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0895">CVE-2013-0895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0896/">CVE-2013-0896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0896">CVE-2013-0896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0897/">CVE-2013-0897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0897">CVE-2013-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0898/">CVE-2013-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0898">CVE-2013-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0899/">CVE-2013-0899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0899">CVE-2013-0899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0900/">CVE-2013-0900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0900">CVE-2013-0900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2838/">CVE-2013-2838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2838">CVE-2013-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2906/">CVE-2013-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2906">CVE-2013-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2907/">CVE-2013-2907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2907">CVE-2013-2907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2908/">CVE-2013-2908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2908">CVE-2013-2908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2909/">CVE-2013-2909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2909">CVE-2013-2909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2910/">CVE-2013-2910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2910">CVE-2013-2910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2911/">CVE-2013-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2911">CVE-2013-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2912/">CVE-2013-2912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2912">CVE-2013-2912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2913/">CVE-2013-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2913">CVE-2013-2913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2914/">CVE-2013-2914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2914">CVE-2013-2914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2915/">CVE-2013-2915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2915">CVE-2013-2915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2916/">CVE-2013-2916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2916">CVE-2013-2916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2917/">CVE-2013-2917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2917">CVE-2013-2917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2918/">CVE-2013-2918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2918">CVE-2013-2918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2919/">CVE-2013-2919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2919">CVE-2013-2919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2920/">CVE-2013-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2920">CVE-2013-2920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2921/">CVE-2013-2921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2921">CVE-2013-2921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2922/">CVE-2013-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2922">CVE-2013-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2923/">CVE-2013-2923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2923">CVE-2013-2923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2924/">CVE-2013-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2924">CVE-2013-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2925/">CVE-2013-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2925">CVE-2013-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2926/">CVE-2013-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2926">CVE-2013-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2927/">CVE-2013-2927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2927">CVE-2013-2927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2928/">CVE-2013-2928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2928">CVE-2013-2928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2931/">CVE-2013-2931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2931">CVE-2013-2931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6621/">CVE-2013-6621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6621">CVE-2013-6621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6622/">CVE-2013-6622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6622">CVE-2013-6622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6623/">CVE-2013-6623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6623">CVE-2013-6623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6624/">CVE-2013-6624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6624">CVE-2013-6624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6625/">CVE-2013-6625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6625">CVE-2013-6625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6626/">CVE-2013-6626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6626">CVE-2013-6626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6627/">CVE-2013-6627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6627">CVE-2013-6627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6628/">CVE-2013-6628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6628">CVE-2013-6628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6631/">CVE-2013-6631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6631">CVE-2013-6631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6632/">CVE-2013-6632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6632">CVE-2013-6632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6634/">CVE-2013-6634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6634">CVE-2013-6634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6635/">CVE-2013-6635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6635">CVE-2013-6635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6636/">CVE-2013-6636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6636">CVE-2013-6636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6637/">CVE-2013-6637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6637">CVE-2013-6637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6638/">CVE-2013-6638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6638">CVE-2013-6638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6641/">CVE-2013-6641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6641">CVE-2013-6641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6643/">CVE-2013-6643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6643">CVE-2013-6643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6644/">CVE-2013-6644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6644">CVE-2013-6644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6645/">CVE-2013-6645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6645">CVE-2013-6645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6646/">CVE-2013-6646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6646">CVE-2013-6646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6649/">CVE-2013-6649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6649">CVE-2013-6649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6650/">CVE-2013-6650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6650">CVE-2013-6650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6653/">CVE-2013-6653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6653">CVE-2013-6653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6654/">CVE-2013-6654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6654">CVE-2013-6654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6655/">CVE-2013-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6655">CVE-2013-6655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6656/">CVE-2013-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6656">CVE-2013-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6657/">CVE-2013-6657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6657">CVE-2013-6657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6658/">CVE-2013-6658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6658">CVE-2013-6658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6659/">CVE-2013-6659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6659">CVE-2013-6659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6660/">CVE-2013-6660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6660">CVE-2013-6660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6661/">CVE-2013-6661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6661">CVE-2013-6661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0574">CVE-2014-0574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1700/">CVE-2014-1700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1700">CVE-2014-1700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1701/">CVE-2014-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1701">CVE-2014-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1702/">CVE-2014-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1702">CVE-2014-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1703/">CVE-2014-1703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1703">CVE-2014-1703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1704/">CVE-2014-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1704">CVE-2014-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1705/">CVE-2014-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1705">CVE-2014-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1713/">CVE-2014-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1713">CVE-2014-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1714/">CVE-2014-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1714">CVE-2014-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1715/">CVE-2014-1715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1715">CVE-2014-1715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1716/">CVE-2014-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1716">CVE-2014-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1717/">CVE-2014-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1717">CVE-2014-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1718/">CVE-2014-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1718">CVE-2014-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1719/">CVE-2014-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1719">CVE-2014-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1720/">CVE-2014-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1720">CVE-2014-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1721/">CVE-2014-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1721">CVE-2014-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1722/">CVE-2014-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1722">CVE-2014-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1723/">CVE-2014-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1723">CVE-2014-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1724/">CVE-2014-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1724">CVE-2014-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1725/">CVE-2014-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1725">CVE-2014-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1726/">CVE-2014-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1726">CVE-2014-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1727/">CVE-2014-1727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1727">CVE-2014-1727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1728/">CVE-2014-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1728">CVE-2014-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1729/">CVE-2014-1729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1729">CVE-2014-1729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1730/">CVE-2014-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1730">CVE-2014-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1731/">CVE-2014-1731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1731">CVE-2014-1731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1732/">CVE-2014-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1732">CVE-2014-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1733/">CVE-2014-1733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1733">CVE-2014-1733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1734/">CVE-2014-1734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1734">CVE-2014-1734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1735/">CVE-2014-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1735">CVE-2014-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1740/">CVE-2014-1740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1740">CVE-2014-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1741/">CVE-2014-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1741">CVE-2014-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1742/">CVE-2014-1742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1742">CVE-2014-1742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1743/">CVE-2014-1743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1743">CVE-2014-1743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1744/">CVE-2014-1744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1744">CVE-2014-1744 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1746/">CVE-2014-1746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1746">CVE-2014-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1747/">CVE-2014-1747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1747">CVE-2014-1747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1748">CVE-2014-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1749/">CVE-2014-1749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1749">CVE-2014-1749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3152/">CVE-2014-3152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3152">CVE-2014-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3154/">CVE-2014-3154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3154">CVE-2014-3154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3155/">CVE-2014-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3155">CVE-2014-3155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3156/">CVE-2014-3156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3156">CVE-2014-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3157/">CVE-2014-3157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3157">CVE-2014-3157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3160/">CVE-2014-3160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3160">CVE-2014-3160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3162/">CVE-2014-3162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3162">CVE-2014-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3165/">CVE-2014-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3165">CVE-2014-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3166/">CVE-2014-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3166">CVE-2014-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3167/">CVE-2014-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3167">CVE-2014-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3168/">CVE-2014-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3168">CVE-2014-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3169/">CVE-2014-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3169">CVE-2014-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3170/">CVE-2014-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3170">CVE-2014-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3171/">CVE-2014-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3171">CVE-2014-3171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3172/">CVE-2014-3172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3172">CVE-2014-3172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3173/">CVE-2014-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3173">CVE-2014-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3174/">CVE-2014-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3174">CVE-2014-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3175/">CVE-2014-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3175">CVE-2014-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3176/">CVE-2014-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3176">CVE-2014-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3177/">CVE-2014-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3177">CVE-2014-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3178/">CVE-2014-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3178">CVE-2014-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3188/">CVE-2014-3188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3188">CVE-2014-3188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3189/">CVE-2014-3189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3189">CVE-2014-3189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3190/">CVE-2014-3190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3190">CVE-2014-3190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3191/">CVE-2014-3191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3191">CVE-2014-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3192/">CVE-2014-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3192">CVE-2014-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3193/">CVE-2014-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3193">CVE-2014-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3194/">CVE-2014-3194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3194">CVE-2014-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3195/">CVE-2014-3195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3195">CVE-2014-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3196/">CVE-2014-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3196">CVE-2014-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3197/">CVE-2014-3197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3197">CVE-2014-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3198/">CVE-2014-3198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3198">CVE-2014-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3199/">CVE-2014-3199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3199">CVE-2014-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3200/">CVE-2014-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3200">CVE-2014-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7899/">CVE-2014-7899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7899">CVE-2014-7899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7900/">CVE-2014-7900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7900">CVE-2014-7900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7901/">CVE-2014-7901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7901">CVE-2014-7901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7902/">CVE-2014-7902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7902">CVE-2014-7902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7903/">CVE-2014-7903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7903">CVE-2014-7903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7904/">CVE-2014-7904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7904">CVE-2014-7904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7905/">CVE-2014-7905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7905">CVE-2014-7905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7906/">CVE-2014-7906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7906">CVE-2014-7906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7907/">CVE-2014-7907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7907">CVE-2014-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7908/">CVE-2014-7908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7908">CVE-2014-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7909/">CVE-2014-7909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7909">CVE-2014-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7910/">CVE-2014-7910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7910">CVE-2014-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7923/">CVE-2014-7923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7923">CVE-2014-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7924/">CVE-2014-7924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7924">CVE-2014-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7925/">CVE-2014-7925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7925">CVE-2014-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7926/">CVE-2014-7926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7926">CVE-2014-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7927/">CVE-2014-7927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7927">CVE-2014-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7928/">CVE-2014-7928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7928">CVE-2014-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7929/">CVE-2014-7929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7929">CVE-2014-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7930/">CVE-2014-7930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7930">CVE-2014-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7932/">CVE-2014-7932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7932">CVE-2014-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7933/">CVE-2014-7933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7933">CVE-2014-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7934/">CVE-2014-7934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7934">CVE-2014-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7935/">CVE-2014-7935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7935">CVE-2014-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7936/">CVE-2014-7936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7936">CVE-2014-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7937/">CVE-2014-7937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7937">CVE-2014-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7938/">CVE-2014-7938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7938">CVE-2014-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7939/">CVE-2014-7939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7939">CVE-2014-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7940/">CVE-2014-7940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7940">CVE-2014-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7941/">CVE-2014-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7941">CVE-2014-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7942/">CVE-2014-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7942">CVE-2014-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7943/">CVE-2014-7943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7943">CVE-2014-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7944/">CVE-2014-7944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7944">CVE-2014-7944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7945/">CVE-2014-7945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7945">CVE-2014-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7946/">CVE-2014-7946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7946">CVE-2014-7946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7947/">CVE-2014-7947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7947">CVE-2014-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7948/">CVE-2014-7948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7948">CVE-2014-7948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1205/">CVE-2015-1205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1205">CVE-2015-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1209/">CVE-2015-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1209">CVE-2015-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1210/">CVE-2015-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1210">CVE-2015-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1211/">CVE-2015-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1211">CVE-2015-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1212/">CVE-2015-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1212">CVE-2015-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1213/">CVE-2015-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1213">CVE-2015-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1214/">CVE-2015-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1214">CVE-2015-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1215/">CVE-2015-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1215">CVE-2015-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1216/">CVE-2015-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1216">CVE-2015-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1217/">CVE-2015-1217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1217">CVE-2015-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1218/">CVE-2015-1218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1218">CVE-2015-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1219/">CVE-2015-1219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1219">CVE-2015-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1220/">CVE-2015-1220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1220">CVE-2015-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1221/">CVE-2015-1221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1221">CVE-2015-1221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1222/">CVE-2015-1222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1222">CVE-2015-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1223/">CVE-2015-1223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1223">CVE-2015-1223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1224/">CVE-2015-1224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1224">CVE-2015-1224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1225/">CVE-2015-1225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1225">CVE-2015-1225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1226/">CVE-2015-1226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1226">CVE-2015-1226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1227/">CVE-2015-1227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1227">CVE-2015-1227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1228/">CVE-2015-1228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1228">CVE-2015-1228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1229/">CVE-2015-1229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1229">CVE-2015-1229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1230/">CVE-2015-1230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1230">CVE-2015-1230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1231/">CVE-2015-1231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1231">CVE-2015-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1233/">CVE-2015-1233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1233">CVE-2015-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1234/">CVE-2015-1234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1234">CVE-2015-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1235/">CVE-2015-1235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1235">CVE-2015-1235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1236/">CVE-2015-1236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1236">CVE-2015-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1237/">CVE-2015-1237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1237">CVE-2015-1237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1238/">CVE-2015-1238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1238">CVE-2015-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1240/">CVE-2015-1240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1240">CVE-2015-1240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1241/">CVE-2015-1241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1241">CVE-2015-1241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1242/">CVE-2015-1242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1242">CVE-2015-1242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1243/">CVE-2015-1243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1243">CVE-2015-1243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1244/">CVE-2015-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1244">CVE-2015-1244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1245/">CVE-2015-1245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1245">CVE-2015-1245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1246/">CVE-2015-1246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1246">CVE-2015-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1247/">CVE-2015-1247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1247">CVE-2015-1247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1248/">CVE-2015-1248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1248">CVE-2015-1248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1249/">CVE-2015-1249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1249">CVE-2015-1249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1250/">CVE-2015-1250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1250">CVE-2015-1250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1251/">CVE-2015-1251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1251">CVE-2015-1251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1252/">CVE-2015-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1252">CVE-2015-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1253/">CVE-2015-1253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1253">CVE-2015-1253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1254/">CVE-2015-1254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1254">CVE-2015-1254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1255/">CVE-2015-1255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1255">CVE-2015-1255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1256/">CVE-2015-1256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1256">CVE-2015-1256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1257/">CVE-2015-1257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1257">CVE-2015-1257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1258/">CVE-2015-1258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1258">CVE-2015-1258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1259/">CVE-2015-1259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1259">CVE-2015-1259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1260/">CVE-2015-1260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1260">CVE-2015-1260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1261/">CVE-2015-1261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1261">CVE-2015-1261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1262/">CVE-2015-1262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1262">CVE-2015-1262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1263/">CVE-2015-1263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1263">CVE-2015-1263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1264/">CVE-2015-1264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1264">CVE-2015-1264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1265/">CVE-2015-1265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1265">CVE-2015-1265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1266/">CVE-2015-1266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1266">CVE-2015-1266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1267/">CVE-2015-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1267">CVE-2015-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1268/">CVE-2015-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1268">CVE-2015-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1269/">CVE-2015-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1269">CVE-2015-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1270/">CVE-2015-1270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1270">CVE-2015-1270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1271/">CVE-2015-1271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1271">CVE-2015-1271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1272/">CVE-2015-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1272">CVE-2015-1272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1273/">CVE-2015-1273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1273">CVE-2015-1273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1274/">CVE-2015-1274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1274">CVE-2015-1274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1275/">CVE-2015-1275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1275">CVE-2015-1275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1276/">CVE-2015-1276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1276">CVE-2015-1276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1277/">CVE-2015-1277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1277">CVE-2015-1277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1278/">CVE-2015-1278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1278">CVE-2015-1278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1279/">CVE-2015-1279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1279">CVE-2015-1279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1280/">CVE-2015-1280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1280">CVE-2015-1280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1281/">CVE-2015-1281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1281">CVE-2015-1281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1282/">CVE-2015-1282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1282">CVE-2015-1282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1284/">CVE-2015-1284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1284">CVE-2015-1284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1285/">CVE-2015-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1285">CVE-2015-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1286/">CVE-2015-1286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1286">CVE-2015-1286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1287/">CVE-2015-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1287">CVE-2015-1287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1288/">CVE-2015-1288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1288">CVE-2015-1288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1289/">CVE-2015-1289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1289">CVE-2015-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1291/">CVE-2015-1291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1291">CVE-2015-1291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1292/">CVE-2015-1292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1292">CVE-2015-1292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1293/">CVE-2015-1293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1293">CVE-2015-1293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1294/">CVE-2015-1294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1294">CVE-2015-1294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1295/">CVE-2015-1295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1295">CVE-2015-1295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1296/">CVE-2015-1296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1296">CVE-2015-1296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1297/">CVE-2015-1297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1297">CVE-2015-1297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1298/">CVE-2015-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1298">CVE-2015-1298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1299/">CVE-2015-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1299">CVE-2015-1299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1300/">CVE-2015-1300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1300">CVE-2015-1300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1301/">CVE-2015-1301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1301">CVE-2015-1301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1302/">CVE-2015-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1302">CVE-2015-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1303/">CVE-2015-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1303">CVE-2015-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1304/">CVE-2015-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1304">CVE-2015-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6755/">CVE-2015-6755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6755">CVE-2015-6755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6756/">CVE-2015-6756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6756">CVE-2015-6756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6757/">CVE-2015-6757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6757">CVE-2015-6757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6758/">CVE-2015-6758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6758">CVE-2015-6758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6759/">CVE-2015-6759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6759">CVE-2015-6759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6760/">CVE-2015-6760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6760">CVE-2015-6760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6761/">CVE-2015-6761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6761">CVE-2015-6761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6762/">CVE-2015-6762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6762">CVE-2015-6762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6763/">CVE-2015-6763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6763">CVE-2015-6763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6764/">CVE-2015-6764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6764">CVE-2015-6764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6765/">CVE-2015-6765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6765">CVE-2015-6765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6766/">CVE-2015-6766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6766">CVE-2015-6766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6767/">CVE-2015-6767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6767">CVE-2015-6767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6768/">CVE-2015-6768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6768">CVE-2015-6768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6769/">CVE-2015-6769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6769">CVE-2015-6769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6770/">CVE-2015-6770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6770">CVE-2015-6770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6771/">CVE-2015-6771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6771">CVE-2015-6771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6772/">CVE-2015-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6772">CVE-2015-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6773/">CVE-2015-6773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6773">CVE-2015-6773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6774/">CVE-2015-6774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6774">CVE-2015-6774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6775/">CVE-2015-6775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6775">CVE-2015-6775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6776/">CVE-2015-6776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6776">CVE-2015-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6777/">CVE-2015-6777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6777">CVE-2015-6777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6778/">CVE-2015-6778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6778">CVE-2015-6778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6779/">CVE-2015-6779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6779">CVE-2015-6779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6780/">CVE-2015-6780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6780">CVE-2015-6780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6781/">CVE-2015-6781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6781">CVE-2015-6781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6782/">CVE-2015-6782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6782">CVE-2015-6782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6783/">CVE-2015-6783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6783">CVE-2015-6783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6784/">CVE-2015-6784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6784">CVE-2015-6784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6785/">CVE-2015-6785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6785">CVE-2015-6785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6786/">CVE-2015-6786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6786">CVE-2015-6786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6787/">CVE-2015-6787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6787">CVE-2015-6787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6788/">CVE-2015-6788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6788">CVE-2015-6788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6789/">CVE-2015-6789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6789">CVE-2015-6789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6790/">CVE-2015-6790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6790">CVE-2015-6790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6791/">CVE-2015-6791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6791">CVE-2015-6791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6792/">CVE-2015-6792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6792">CVE-2015-6792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7834/">CVE-2015-7834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7834">CVE-2015-7834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1612/">CVE-2016-1612 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1612">CVE-2016-1612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1613/">CVE-2016-1613 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1613">CVE-2016-1613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1614/">CVE-2016-1614 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1614">CVE-2016-1614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1615/">CVE-2016-1615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1615">CVE-2016-1615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1616/">CVE-2016-1616 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1616">CVE-2016-1616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1617/">CVE-2016-1617 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1617">CVE-2016-1617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1618/">CVE-2016-1618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1618">CVE-2016-1618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1619/">CVE-2016-1619 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1619">CVE-2016-1619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1620/">CVE-2016-1620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1620">CVE-2016-1620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1622/">CVE-2016-1622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1622">CVE-2016-1622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1623/">CVE-2016-1623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1623">CVE-2016-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1624/">CVE-2016-1624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1624">CVE-2016-1624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1625/">CVE-2016-1625 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1625">CVE-2016-1625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1626/">CVE-2016-1626 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1626">CVE-2016-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1627/">CVE-2016-1627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1627">CVE-2016-1627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1629/">CVE-2016-1629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1629">CVE-2016-1629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1630/">CVE-2016-1630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1630">CVE-2016-1630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1631/">CVE-2016-1631 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1631">CVE-2016-1631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1632/">CVE-2016-1632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1632">CVE-2016-1632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1633/">CVE-2016-1633 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1633">CVE-2016-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1634/">CVE-2016-1634 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1634">CVE-2016-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1635/">CVE-2016-1635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1635">CVE-2016-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1636/">CVE-2016-1636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1636">CVE-2016-1636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1637/">CVE-2016-1637 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1637">CVE-2016-1637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1638/">CVE-2016-1638 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1638">CVE-2016-1638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1639/">CVE-2016-1639 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1639">CVE-2016-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1640/">CVE-2016-1640 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1640">CVE-2016-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1641/">CVE-2016-1641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1641">CVE-2016-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1642/">CVE-2016-1642 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1642">CVE-2016-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1643/">CVE-2016-1643 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1643">CVE-2016-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1644/">CVE-2016-1644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1644">CVE-2016-1644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1645/">CVE-2016-1645 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1645">CVE-2016-1645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1646/">CVE-2016-1646 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1646">CVE-2016-1646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1647/">CVE-2016-1647 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1647">CVE-2016-1647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1648/">CVE-2016-1648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1648">CVE-2016-1648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1649/">CVE-2016-1649 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1649">CVE-2016-1649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1650/">CVE-2016-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1650">CVE-2016-1650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1651/">CVE-2016-1651 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1651">CVE-2016-1651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1652/">CVE-2016-1652 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1652">CVE-2016-1652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1653/">CVE-2016-1653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1653">CVE-2016-1653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1654/">CVE-2016-1654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1654">CVE-2016-1654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1655/">CVE-2016-1655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1655">CVE-2016-1655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1656/">CVE-2016-1656 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1656">CVE-2016-1656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1657/">CVE-2016-1657 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1657">CVE-2016-1657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1658/">CVE-2016-1658 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1658">CVE-2016-1658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1659/">CVE-2016-1659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1659">CVE-2016-1659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1660/">CVE-2016-1660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1660">CVE-2016-1660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1661/">CVE-2016-1661 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1661">CVE-2016-1661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1662/">CVE-2016-1662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1662">CVE-2016-1662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1663/">CVE-2016-1663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1663">CVE-2016-1663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1664/">CVE-2016-1664 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1664">CVE-2016-1664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1665/">CVE-2016-1665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1665">CVE-2016-1665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1666/">CVE-2016-1666 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1666">CVE-2016-1666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1667/">CVE-2016-1667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1667">CVE-2016-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1668/">CVE-2016-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1668">CVE-2016-1668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1669/">CVE-2016-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1669">CVE-2016-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1670/">CVE-2016-1670 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1670">CVE-2016-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1672/">CVE-2016-1672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1672">CVE-2016-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1673/">CVE-2016-1673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1673">CVE-2016-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1674/">CVE-2016-1674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1674">CVE-2016-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1675/">CVE-2016-1675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1675">CVE-2016-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1676/">CVE-2016-1676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1676">CVE-2016-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1677/">CVE-2016-1677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1677">CVE-2016-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1678/">CVE-2016-1678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1678">CVE-2016-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1679/">CVE-2016-1679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1679">CVE-2016-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1680/">CVE-2016-1680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1680">CVE-2016-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1681/">CVE-2016-1681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1681">CVE-2016-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1682/">CVE-2016-1682 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1682">CVE-2016-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1683/">CVE-2016-1683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1683">CVE-2016-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1684/">CVE-2016-1684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1684">CVE-2016-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1685/">CVE-2016-1685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1685">CVE-2016-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1686/">CVE-2016-1686 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1686">CVE-2016-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1687/">CVE-2016-1687 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1687">CVE-2016-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1688/">CVE-2016-1688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1688">CVE-2016-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1689/">CVE-2016-1689 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1689">CVE-2016-1689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1690/">CVE-2016-1690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1690">CVE-2016-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1691/">CVE-2016-1691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1691">CVE-2016-1691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1692/">CVE-2016-1692 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1692">CVE-2016-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1693/">CVE-2016-1693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1693">CVE-2016-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1694/">CVE-2016-1694 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1694">CVE-2016-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1695/">CVE-2016-1695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1695">CVE-2016-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1696/">CVE-2016-1696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1696">CVE-2016-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1697/">CVE-2016-1697 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1697">CVE-2016-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1698/">CVE-2016-1698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1698">CVE-2016-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1699/">CVE-2016-1699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1699">CVE-2016-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1700/">CVE-2016-1700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1700">CVE-2016-1700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1701/">CVE-2016-1701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1701">CVE-2016-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1702/">CVE-2016-1702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1702">CVE-2016-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1703/">CVE-2016-1703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1703">CVE-2016-1703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1704/">CVE-2016-1704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1704">CVE-2016-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1705/">CVE-2016-1705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1705">CVE-2016-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1706/">CVE-2016-1706 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1706">CVE-2016-1706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1707/">CVE-2016-1707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1707">CVE-2016-1707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1708/">CVE-2016-1708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1708">CVE-2016-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1709/">CVE-2016-1709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1709">CVE-2016-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1710/">CVE-2016-1710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1710">CVE-2016-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1711/">CVE-2016-1711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1711">CVE-2016-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3679/">CVE-2016-3679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3679">CVE-2016-3679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5127/">CVE-2016-5127 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5127">CVE-2016-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5128/">CVE-2016-5128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5128">CVE-2016-5128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5129/">CVE-2016-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5129">CVE-2016-5129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5130/">CVE-2016-5130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5130">CVE-2016-5130 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5132/">CVE-2016-5132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5132">CVE-2016-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5133/">CVE-2016-5133 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5133">CVE-2016-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5134/">CVE-2016-5134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5134">CVE-2016-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5135/">CVE-2016-5135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5135">CVE-2016-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5136/">CVE-2016-5136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5136">CVE-2016-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5137/">CVE-2016-5137 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5137">CVE-2016-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5140/">CVE-2016-5140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5140">CVE-2016-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5141/">CVE-2016-5141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5141">CVE-2016-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5142/">CVE-2016-5142 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5142">CVE-2016-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5143/">CVE-2016-5143 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5143">CVE-2016-5143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5144/">CVE-2016-5144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5144">CVE-2016-5144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5145/">CVE-2016-5145 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5145">CVE-2016-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5146/">CVE-2016-5146 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5146">CVE-2016-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5147/">CVE-2016-5147 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5147">CVE-2016-5147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5148/">CVE-2016-5148 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5148">CVE-2016-5148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5149/">CVE-2016-5149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5149">CVE-2016-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5150/">CVE-2016-5150 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5150">CVE-2016-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5151/">CVE-2016-5151 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5151">CVE-2016-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5152">CVE-2016-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5153/">CVE-2016-5153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5153">CVE-2016-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5154/">CVE-2016-5154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5154">CVE-2016-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5155/">CVE-2016-5155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5155">CVE-2016-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5156/">CVE-2016-5156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5156">CVE-2016-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5157/">CVE-2016-5157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5157">CVE-2016-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5159">CVE-2016-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5160/">CVE-2016-5160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5160">CVE-2016-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5161/">CVE-2016-5161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5161">CVE-2016-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5162/">CVE-2016-5162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5162">CVE-2016-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5163/">CVE-2016-5163 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5163">CVE-2016-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5164/">CVE-2016-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5164">CVE-2016-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5165/">CVE-2016-5165 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5165">CVE-2016-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5166/">CVE-2016-5166 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5166">CVE-2016-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5170/">CVE-2016-5170 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5170">CVE-2016-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5171/">CVE-2016-5171 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5171">CVE-2016-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5172">CVE-2016-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5173/">CVE-2016-5173 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5173">CVE-2016-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5174/">CVE-2016-5174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5174">CVE-2016-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5175/">CVE-2016-5175 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5175">CVE-2016-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5177/">CVE-2016-5177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5177">CVE-2016-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5178/">CVE-2016-5178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5178">CVE-2016-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5181/">CVE-2016-5181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5181">CVE-2016-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5182/">CVE-2016-5182 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5182">CVE-2016-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5183/">CVE-2016-5183 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5183">CVE-2016-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5184/">CVE-2016-5184 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5184">CVE-2016-5184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5185/">CVE-2016-5185 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5185">CVE-2016-5185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5186/">CVE-2016-5186 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5186">CVE-2016-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5187/">CVE-2016-5187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5187">CVE-2016-5187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5188/">CVE-2016-5188 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5188">CVE-2016-5188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5189/">CVE-2016-5189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5189">CVE-2016-5189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5190/">CVE-2016-5190 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5190">CVE-2016-5190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5191/">CVE-2016-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5191">CVE-2016-5191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5192/">CVE-2016-5192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5192">CVE-2016-5192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5193/">CVE-2016-5193 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5193">CVE-2016-5193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5198/">CVE-2016-5198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5198">CVE-2016-5198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5199/">CVE-2016-5199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5199">CVE-2016-5199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5200/">CVE-2016-5200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5200">CVE-2016-5200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5201/">CVE-2016-5201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5201">CVE-2016-5201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5202/">CVE-2016-5202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5202">CVE-2016-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5203/">CVE-2016-5203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5203">CVE-2016-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5204/">CVE-2016-5204 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5204">CVE-2016-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5205/">CVE-2016-5205 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5205">CVE-2016-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5206/">CVE-2016-5206 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5206">CVE-2016-5206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5207/">CVE-2016-5207 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5207">CVE-2016-5207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5208/">CVE-2016-5208 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5208">CVE-2016-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5209/">CVE-2016-5209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5209">CVE-2016-5209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5210/">CVE-2016-5210 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5210">CVE-2016-5210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5211/">CVE-2016-5211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5211">CVE-2016-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5212/">CVE-2016-5212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5212">CVE-2016-5212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5213/">CVE-2016-5213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5213">CVE-2016-5213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5214/">CVE-2016-5214 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5214">CVE-2016-5214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5215/">CVE-2016-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5215">CVE-2016-5215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5216/">CVE-2016-5216 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5216">CVE-2016-5216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5217/">CVE-2016-5217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5217">CVE-2016-5217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5218/">CVE-2016-5218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5218">CVE-2016-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5219/">CVE-2016-5219 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5219">CVE-2016-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5220/">CVE-2016-5220 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5220">CVE-2016-5220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5221/">CVE-2016-5221 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5221">CVE-2016-5221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5222/">CVE-2016-5222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5222">CVE-2016-5222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5223/">CVE-2016-5223 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5223">CVE-2016-5223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5224/">CVE-2016-5224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5224">CVE-2016-5224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5225/">CVE-2016-5225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5225">CVE-2016-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5226/">CVE-2016-5226 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5226">CVE-2016-5226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9650/">CVE-2016-9650 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9650">CVE-2016-9650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9651/">CVE-2016-9651 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9651">CVE-2016-9651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9652/">CVE-2016-9652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9652">CVE-2016-9652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906661" comment="chromedriver-55.0.2883.75-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906662" comment="chromium-55.0.2883.75-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248493" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906663" comment="ft2demos-2.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248494" version="1" class="patch">
	<metadata>
		<title>libxmp-devel-4.4.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1980" ref_url="https://www.suse.com/security/cve/CVE-2013-1980/" source="CVE"/>
		<description>
These are all security issues fixed in the libxmp-devel-4.4.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1980/">CVE-2013-1980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1980">CVE-2013-1980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906664" comment="libxmp-devel-4.4.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906665" comment="libxmp4-4.4.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248495" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906666" comment="openssh-7.2p2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906667" comment="openssh-cavs-7.2p2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906668" comment="openssh-fips-7.2p2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906669" comment="openssh-helpers-7.2p2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248496" version="1" class="patch">
	<metadata>
		<title>viewvc-1.1.24-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3356" ref_url="https://www.suse.com/security/cve/CVE-2012-3356/" source="CVE"/>
		<reference ref_id="CVE-2012-3357" ref_url="https://www.suse.com/security/cve/CVE-2012-3357/" source="CVE"/>
		<description>
These are all security issues fixed in the viewvc-1.1.24-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3356/">CVE-2012-3356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3356">CVE-2012-3356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3357/">CVE-2012-3357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3357">CVE-2012-3357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906670" comment="viewvc-1.1.24-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248497" version="1" class="patch">
	<metadata>
		<title>libXcursor-devel-1.1.14-6.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor-devel-1.1.14-6.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906671" comment="libXcursor-devel-1.1.14-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906672" comment="libXcursor-devel-32bit-1.1.14-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906673" comment="libXcursor1-1.1.14-6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906674" comment="libXcursor1-32bit-1.1.14-6.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248498" version="1" class="patch">
	<metadata>
		<title>perl-Module-Metadata-1.000033-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1437" ref_url="https://www.suse.com/security/cve/CVE-2013-1437/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Module-Metadata-1.000033-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1437/">CVE-2013-1437 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1437">CVE-2013-1437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906675" comment="perl-Module-Metadata-1.000033-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248499" version="1" class="patch">
	<metadata>
		<title>libraptor-devel-2.0.15-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor-devel-2.0.15-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0037">CVE-2012-0037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906676" comment="libraptor-devel-2.0.15-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906677" comment="libraptor2-0-2.0.15-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906678" comment="libraptor2-0-32bit-2.0.15-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906679" comment="raptor-2.0.15-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248500" version="1" class="patch">
	<metadata>
		<title>mupdf-1.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6265" ref_url="https://www.suse.com/security/cve/CVE-2016-6265/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6265/">CVE-2016-6265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6265">CVE-2016-6265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906680" comment="mupdf-1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906681" comment="mupdf-devel-static-1.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248501" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.7-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.7-5.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6093">CVE-2012-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0190">CVE-2014-0190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1858">CVE-2015-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1859">CVE-2015-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906682" comment="libqt4-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906683" comment="libqt4-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906684" comment="libqt4-devel-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906685" comment="libqt4-devel-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906686" comment="libqt4-devel-doc-4.8.7-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906687" comment="libqt4-devel-doc-data-4.8.7-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906688" comment="libqt4-linguist-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906689" comment="libqt4-private-headers-devel-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906690" comment="libqt4-qt3support-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906691" comment="libqt4-qt3support-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906692" comment="libqt4-sql-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906693" comment="libqt4-sql-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906694" comment="libqt4-sql-mysql-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906695" comment="libqt4-sql-mysql-32bit-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906696" comment="libqt4-sql-postgresql-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906697" comment="libqt4-sql-postgresql-32bit-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906698" comment="libqt4-sql-sqlite-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906699" comment="libqt4-sql-sqlite-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906700" comment="libqt4-sql-unixODBC-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906701" comment="libqt4-sql-unixODBC-32bit-4.8.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906702" comment="libqt4-x11-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906703" comment="libqt4-x11-32bit-4.8.7-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906704" comment="qt4-x11-tools-4.8.7-5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248502" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5211">CVE-2013-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9296">CVE-2014-9296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1798">CVE-2015-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906705" comment="ntp-4.2.8p9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906706" comment="ntp-doc-4.2.8p9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248503" version="1" class="patch">
	<metadata>
		<title>icinga-1.13.3-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7107" ref_url="https://www.suse.com/security/cve/CVE-2013-7107/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-2386" ref_url="https://www.suse.com/security/cve/CVE-2014-2386/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga-1.13.3-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6096">CVE-2012-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7107/">CVE-2013-7107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7107">CVE-2013-7107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2386/">CVE-2014-2386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2386">CVE-2014-2386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906707" comment="icinga-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906708" comment="icinga-devel-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906709" comment="icinga-doc-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906710" comment="icinga-idoutils-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906711" comment="icinga-idoutils-mysql-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906712" comment="icinga-idoutils-oracle-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906713" comment="icinga-idoutils-pgsql-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906714" comment="icinga-plugins-downtimes-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906715" comment="icinga-plugins-eventhandlers-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906716" comment="icinga-www-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906717" comment="icinga-www-config-1.13.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906718" comment="monitoring-tools-1.13.3-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248504" version="1" class="patch">
	<metadata>
		<title>less-481-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
These are all security issues fixed in the less-481-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906719" comment="less-481-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248505" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.56-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.56-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3045">CVE-2011-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7353">CVE-2013-7353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7354">CVE-2013-7354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9495">CVE-2014-9495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0973">CVE-2015-0973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906720" comment="libpng12-0-1.2.56-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906721" comment="libpng12-0-32bit-1.2.56-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906722" comment="libpng12-compat-devel-1.2.56-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906723" comment="libpng12-compat-devel-32bit-1.2.56-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906724" comment="libpng12-devel-1.2.56-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906725" comment="libpng12-devel-32bit-1.2.56-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248506" version="1" class="patch">
	<metadata>
		<title>libxslt-devel-1.1.29-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-devel-1.1.29-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906726" comment="libxslt-devel-1.1.29-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906727" comment="libxslt-devel-32bit-1.1.29-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906728" comment="libxslt-python-1.1.29-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906729" comment="libxslt-tools-1.1.29-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906730" comment="libxslt1-1.1.29-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906731" comment="libxslt1-32bit-1.1.29-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248507" version="1" class="patch">
	<metadata>
		<title>perl-DBD-mysql-4.041-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-mysql-4.041-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906732" comment="perl-DBD-mysql-4.041-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248508" version="1" class="patch">
	<metadata>
		<title>thttpd-2.26-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5640" ref_url="https://www.suse.com/security/cve/CVE-2012-5640/" source="CVE"/>
		<reference ref_id="CVE-2013-0348" ref_url="https://www.suse.com/security/cve/CVE-2013-0348/" source="CVE"/>
		<description>
These are all security issues fixed in the thttpd-2.26-4.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5640/">CVE-2012-5640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5640">CVE-2012-5640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0348/">CVE-2013-0348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0348">CVE-2013-0348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906733" comment="thttpd-2.26-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248509" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-extlib-0.9.16-7.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0156" ref_url="https://www.suse.com/security/cve/CVE-2013-0156/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-extlib-0.9.16-7.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0156/">CVE-2013-0156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0156">CVE-2013-0156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906734" comment="ruby2.2-rubygem-extlib-0.9.16-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906735" comment="ruby2.2-rubygem-extlib-doc-0.9.16-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906736" comment="ruby2.2-rubygem-extlib-testsuite-0.9.16-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906737" comment="ruby2.3-rubygem-extlib-0.9.16-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906738" comment="ruby2.3-rubygem-extlib-doc-0.9.16-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906739" comment="ruby2.3-rubygem-extlib-testsuite-0.9.16-7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248510" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906740" comment="ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906741" comment="ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906742" comment="ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906743" comment="ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906744" comment="ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906745" comment="ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248511" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.7.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.7.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906746" comment="libssh2-1-1.7.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906747" comment="libssh2-1-32bit-1.7.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906748" comment="libssh2-devel-1.7.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248512" version="1" class="patch">
	<metadata>
		<title>horde5-imp-6.2.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0791" ref_url="https://www.suse.com/security/cve/CVE-2012-0791/" source="CVE"/>
		<reference ref_id="CVE-2012-0909" ref_url="https://www.suse.com/security/cve/CVE-2012-0909/" source="CVE"/>
		<description>
These are all security issues fixed in the horde5-imp-6.2.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0791/">CVE-2012-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0791">CVE-2012-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0909/">CVE-2012-0909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0909">CVE-2012-0909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906749" comment="horde5-imp-6.2.5-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248513" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-1.22 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1969">CVE-2013-1969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906750" comment="libxml2-2-2.9.4-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906751" comment="libxml2-2-32bit-2.9.4-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906752" comment="libxml2-devel-2.9.4-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906753" comment="libxml2-devel-32bit-2.9.4-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906754" comment="libxml2-doc-2.9.4-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906755" comment="libxml2-tools-2.9.4-1.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248514" version="1" class="patch">
	<metadata>
		<title>python-doc-2.7.12-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python-doc-2.7.12-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906756" comment="python-doc-2.7.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906757" comment="python-doc-pdf-2.7.12-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248515" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-13.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-13.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1167">CVE-2010-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906758" comment="fetchmail-6.3.26-13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906759" comment="fetchmailconf-6.3.26-13.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248516" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.76-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.76-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906760" comment="dnsmasq-2.76-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906761" comment="dnsmasq-utils-2.76-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248517" version="1" class="patch">
	<metadata>
		<title>xen-4.7.0_12-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.7.0_12-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2625">CVE-2012-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3433">CVE-2012-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5525">CVE-2012-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0151">CVE-2013-0151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0152">CVE-2013-0152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4356">CVE-2013-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4375">CVE-2013-4375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4551">CVE-2013-4551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3124">CVE-2014-3124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5146">CVE-2014-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5149">CVE-2014-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6268">CVE-2014-6268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7188">CVE-2014-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8615">CVE-2015-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6259">CVE-2016-6259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7093">CVE-2016-7093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906762" comment="xen-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906763" comment="xen-devel-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906764" comment="xen-doc-html-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906765" comment="xen-libs-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906766" comment="xen-libs-32bit-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906767" comment="xen-tools-4.7.0_12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906768" comment="xen-tools-domU-4.7.0_12-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248518" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.111-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.111-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2597">CVE-2015-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2627">CVE-2015-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2659">CVE-2015-2659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4736">CVE-2015-4736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4868">CVE-2015-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4901">CVE-2015-4901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4906">CVE-2015-4906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4908">CVE-2015-4908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4916">CVE-2015-4916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0475">CVE-2016-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3498">CVE-2016-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3503">CVE-2016-3503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3552">CVE-2016-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3587">CVE-2016-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906769" comment="java-1_8_0-openjdk-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906770" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906771" comment="java-1_8_0-openjdk-demo-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906772" comment="java-1_8_0-openjdk-devel-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906773" comment="java-1_8_0-openjdk-headless-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906774" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906775" comment="java-1_8_0-openjdk-src-1.8.0.111-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248519" version="1" class="patch">
	<metadata>
		<title>mutt-1.6.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.6.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906776" comment="mutt-1.6.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248520" version="1" class="patch">
	<metadata>
		<title>wireshark-2.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6425" ref_url="https://www.suse.com/security/cve/CVE-2014-6425/" source="CVE"/>
		<reference ref_id="CVE-2014-6426" ref_url="https://www.suse.com/security/cve/CVE-2014-6426/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192/" source="CVE"/>
		<reference ref_id="CVE-2015-3808" ref_url="https://www.suse.com/security/cve/CVE-2015-3808/" source="CVE"/>
		<reference ref_id="CVE-2015-3809" ref_url="https://www.suse.com/security/cve/CVE-2015-3809/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-3815" ref_url="https://www.suse.com/security/cve/CVE-2015-3815/" source="CVE"/>
		<reference ref_id="CVE-2015-4651" ref_url="https://www.suse.com/security/cve/CVE-2015-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2015-8734" ref_url="https://www.suse.com/security/cve/CVE-2015-8734/" source="CVE"/>
		<reference ref_id="CVE-2015-8735" ref_url="https://www.suse.com/security/cve/CVE-2015-8735/" source="CVE"/>
		<reference ref_id="CVE-2015-8736" ref_url="https://www.suse.com/security/cve/CVE-2015-8736/" source="CVE"/>
		<reference ref_id="CVE-2015-8737" ref_url="https://www.suse.com/security/cve/CVE-2015-8737/" source="CVE"/>
		<reference ref_id="CVE-2015-8738" ref_url="https://www.suse.com/security/cve/CVE-2015-8738/" source="CVE"/>
		<reference ref_id="CVE-2015-8739" ref_url="https://www.suse.com/security/cve/CVE-2015-8739/" source="CVE"/>
		<reference ref_id="CVE-2015-8740" ref_url="https://www.suse.com/security/cve/CVE-2015-8740/" source="CVE"/>
		<reference ref_id="CVE-2015-8741" ref_url="https://www.suse.com/security/cve/CVE-2015-8741/" source="CVE"/>
		<reference ref_id="CVE-2015-8742" ref_url="https://www.suse.com/security/cve/CVE-2015-8742/" source="CVE"/>
		<reference ref_id="CVE-2016-2522" ref_url="https://www.suse.com/security/cve/CVE-2016-2522/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2524" ref_url="https://www.suse.com/security/cve/CVE-2016-2524/" source="CVE"/>
		<reference ref_id="CVE-2016-2525" ref_url="https://www.suse.com/security/cve/CVE-2016-2525/" source="CVE"/>
		<reference ref_id="CVE-2016-2526" ref_url="https://www.suse.com/security/cve/CVE-2016-2526/" source="CVE"/>
		<reference ref_id="CVE-2016-2527" ref_url="https://www.suse.com/security/cve/CVE-2016-2527/" source="CVE"/>
		<reference ref_id="CVE-2016-2528" ref_url="https://www.suse.com/security/cve/CVE-2016-2528/" source="CVE"/>
		<reference ref_id="CVE-2016-2529" ref_url="https://www.suse.com/security/cve/CVE-2016-2529/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512/" source="CVE"/>
		<reference ref_id="CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9372" ref_url="https://www.suse.com/security/cve/CVE-2016-9372/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-2.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3241">CVE-2009-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3242">CVE-2009-3242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3243">CVE-2009-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3548">CVE-2012-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4286">CVE-2012-4286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4287">CVE-2012-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4294">CVE-2012-4294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4295">CVE-2012-4295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4297">CVE-2012-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4298">CVE-2012-4298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5237">CVE-2012-5237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5238">CVE-2012-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5239">CVE-2012-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5240">CVE-2012-5240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4920">CVE-2013-4920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4921">CVE-2013-4921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4922">CVE-2013-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4923">CVE-2013-4923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4924">CVE-2013-4924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4925">CVE-2013-4925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4926">CVE-2013-4926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4927">CVE-2013-4927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4928">CVE-2013-4928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4936">CVE-2013-4936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5717">CVE-2013-5717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5718">CVE-2013-5718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5719">CVE-2013-5719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5720">CVE-2013-5720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5721">CVE-2013-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5722">CVE-2013-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2282">CVE-2014-2282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2907">CVE-2014-2907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4020">CVE-2014-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5161">CVE-2014-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5162">CVE-2014-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5163">CVE-2014-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5164">CVE-2014-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5165">CVE-2014-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6425/">CVE-2014-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6425">CVE-2014-6425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6426/">CVE-2014-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6426">CVE-2014-6426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2187">CVE-2015-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2190">CVE-2015-2190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2192">CVE-2015-2192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3808/">CVE-2015-3808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3808">CVE-2015-3808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3809/">CVE-2015-3809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3809">CVE-2015-3809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3810">CVE-2015-3810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3814">CVE-2015-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3815/">CVE-2015-3815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3815">CVE-2015-3815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4651/">CVE-2015-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4651">CVE-2015-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4652">CVE-2015-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6241">CVE-2015-6241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6242">CVE-2015-6242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6247">CVE-2015-6247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6249">CVE-2015-6249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8734/">CVE-2015-8734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8734">CVE-2015-8734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8735/">CVE-2015-8735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8735">CVE-2015-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8736/">CVE-2015-8736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8736">CVE-2015-8736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8737/">CVE-2015-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8737">CVE-2015-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8738/">CVE-2015-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8738">CVE-2015-8738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8739/">CVE-2015-8739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8739">CVE-2015-8739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8740/">CVE-2015-8740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8740">CVE-2015-8740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8741/">CVE-2015-8741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8741">CVE-2015-8741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8742/">CVE-2015-8742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8742">CVE-2015-8742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2522/">CVE-2016-2522 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2522">CVE-2016-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2524/">CVE-2016-2524 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2524">CVE-2016-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2525/">CVE-2016-2525 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2525">CVE-2016-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2526/">CVE-2016-2526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2526">CVE-2016-2526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2527/">CVE-2016-2527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2527">CVE-2016-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2528/">CVE-2016-2528 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2528">CVE-2016-2528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2529/">CVE-2016-2529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2529">CVE-2016-2529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6512">CVE-2016-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6513">CVE-2016-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9372/">CVE-2016-9372 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9372">CVE-2016-9372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906777" comment="wireshark-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906778" comment="wireshark-devel-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906779" comment="wireshark-ui-gtk-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906780" comment="wireshark-ui-qt-2.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248521" version="1" class="patch">
	<metadata>
		<title>libmysql56client18-32bit-5.6.34-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0503" ref_url="https://www.suse.com/security/cve/CVE-2016-0503/" source="CVE"/>
		<reference ref_id="CVE-2016-0504" ref_url="https://www.suse.com/security/cve/CVE-2016-0504/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0594" ref_url="https://www.suse.com/security/cve/CVE-2016-0594/" source="CVE"/>
		<reference ref_id="CVE-2016-0595" ref_url="https://www.suse.com/security/cve/CVE-2016-0595/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0605" ref_url="https://www.suse.com/security/cve/CVE-2016-0605/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0607" ref_url="https://www.suse.com/security/cve/CVE-2016-0607/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610/" source="CVE"/>
		<reference ref_id="CVE-2016-0611" ref_url="https://www.suse.com/security/cve/CVE-2016-0611/" source="CVE"/>
		<reference ref_id="CVE-2016-0639" ref_url="https://www.suse.com/security/cve/CVE-2016-0639/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0661" ref_url="https://www.suse.com/security/cve/CVE-2016-0661/" source="CVE"/>
		<reference ref_id="CVE-2016-0665" ref_url="https://www.suse.com/security/cve/CVE-2016-0665/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-3459" ref_url="https://www.suse.com/security/cve/CVE-2016-3459/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3486" ref_url="https://www.suse.com/security/cve/CVE-2016-3486/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3501" ref_url="https://www.suse.com/security/cve/CVE-2016-3501/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3614" ref_url="https://www.suse.com/security/cve/CVE-2016-3614/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5439" ref_url="https://www.suse.com/security/cve/CVE-2016-5439/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5507" ref_url="https://www.suse.com/security/cve/CVE-2016-5507/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5609" ref_url="https://www.suse.com/security/cve/CVE-2016-5609/" source="CVE"/>
		<reference ref_id="CVE-2016-5612" ref_url="https://www.suse.com/security/cve/CVE-2016-5612/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5627" ref_url="https://www.suse.com/security/cve/CVE-2016-5627/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-5630" ref_url="https://www.suse.com/security/cve/CVE-2016-5630/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2016-8284" ref_url="https://www.suse.com/security/cve/CVE-2016-8284/" source="CVE"/>
		<reference ref_id="CVE-2016-8288" ref_url="https://www.suse.com/security/cve/CVE-2016-8288/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysql56client18-32bit-5.6.34-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5970">CVE-2007-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2582">CVE-2015-2582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2611">CVE-2015-2611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2617">CVE-2015-2617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2620">CVE-2015-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2639">CVE-2015-2639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2641">CVE-2015-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2643">CVE-2015-2643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2648">CVE-2015-2648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2661">CVE-2015-2661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4730">CVE-2015-4730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4737">CVE-2015-4737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4752">CVE-2015-4752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4756">CVE-2015-4756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4757">CVE-2015-4757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4761">CVE-2015-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4766">CVE-2015-4766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4767">CVE-2015-4767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4769">CVE-2015-4769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4771">CVE-2015-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4772">CVE-2015-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4800">CVE-2015-4800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4833">CVE-2015-4833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4862">CVE-2015-4862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4864">CVE-2015-4864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4866">CVE-2015-4866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4890">CVE-2015-4890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4895">CVE-2015-4895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4904">CVE-2015-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4905">CVE-2015-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4910">CVE-2015-4910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5969">CVE-2015-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7744">CVE-2015-7744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0502">CVE-2016-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0503/">CVE-2016-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0503">CVE-2016-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0504/">CVE-2016-0504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0504">CVE-2016-0504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0594/">CVE-2016-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0594">CVE-2016-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0595/">CVE-2016-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0595">CVE-2016-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0605/">CVE-2016-0605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0605">CVE-2016-0605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0607/">CVE-2016-0607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0607">CVE-2016-0607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0610">CVE-2016-0610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0611/">CVE-2016-0611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0611">CVE-2016-0611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0639/">CVE-2016-0639 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0639">CVE-2016-0639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0642">CVE-2016-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0655">CVE-2016-0655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0661/">CVE-2016-0661 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0661">CVE-2016-0661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0665/">CVE-2016-0665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0665">CVE-2016-0665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0668">CVE-2016-0668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3459/">CVE-2016-3459 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3459">CVE-2016-3459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3486/">CVE-2016-3486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3486">CVE-2016-3486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3492">CVE-2016-3492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3501/">CVE-2016-3501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3501">CVE-2016-3501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3614/">CVE-2016-3614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3614">CVE-2016-3614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5439/">CVE-2016-5439 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5439">CVE-2016-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5507/">CVE-2016-5507 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5507">CVE-2016-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5609/">CVE-2016-5609 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5609">CVE-2016-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5612/">CVE-2016-5612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5612">CVE-2016-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5626">CVE-2016-5626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5627/">CVE-2016-5627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5627">CVE-2016-5627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5629">CVE-2016-5629 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5630/">CVE-2016-5630 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5630">CVE-2016-5630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8284/">CVE-2016-8284 at SUSE</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8284">CVE-2016-8284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8288/">CVE-2016-8288 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8288">CVE-2016-8288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906781" comment="libmysql56client18-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906782" comment="libmysql56client18-32bit-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906783" comment="libmysql56client_r18-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906784" comment="libmysql56client_r18-32bit-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906785" comment="mysql-community-server-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906786" comment="mysql-community-server-bench-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906787" comment="mysql-community-server-client-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906788" comment="mysql-community-server-errormessages-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906789" comment="mysql-community-server-test-5.6.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906790" comment="mysql-community-server-tools-5.6.34-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248522" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-9.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-9.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4024">CVE-2012-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4025">CVE-2012-4025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906791" comment="squashfs-4.3-9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248523" version="1" class="patch">
	<metadata>
		<title>libpotrace0-1.13-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7437" ref_url="https://www.suse.com/security/cve/CVE-2013-7437/" source="CVE"/>
		<description>
These are all security issues fixed in the libpotrace0-1.13-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7437/">CVE-2013-7437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7437">CVE-2013-7437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906792" comment="libpotrace0-1.13-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906793" comment="potrace-1.13-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906794" comment="potrace-devel-1.13-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248524" version="1" class="patch">
	<metadata>
		<title>exiv2-0.25-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9449" ref_url="https://www.suse.com/security/cve/CVE-2014-9449/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.25-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9449/">CVE-2014-9449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9449">CVE-2014-9449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906795" comment="exiv2-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906796" comment="exiv2-lang-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906797" comment="libexiv2-14-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906798" comment="libexiv2-14-32bit-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906799" comment="libexiv2-devel-0.25-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248525" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-8.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-8.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2285">CVE-2014-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906800" comment="libsnmp30-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906801" comment="libsnmp30-32bit-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906802" comment="net-snmp-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906803" comment="net-snmp-devel-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906804" comment="net-snmp-devel-32bit-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906805" comment="net-snmp-python-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906806" comment="perl-SNMP-5.7.3-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906807" comment="snmp-mibs-5.7.3-8.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248526" version="1" class="patch">
	<metadata>
		<title>firewall-applet-0.4.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewall-applet-0.4.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906808" comment="firewall-applet-0.4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906809" comment="firewall-config-0.4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906810" comment="firewalld-0.4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906811" comment="firewalld-lang-0.4.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248527" version="1" class="patch">
	<metadata>
		<title>python-bjoern-1.4.2-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0219" ref_url="https://www.suse.com/security/cve/CVE-2015-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the python-bjoern-1.4.2-1.23 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0219/">CVE-2015-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0219">CVE-2015-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906812" comment="python-bjoern-1.4.2-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248528" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-railties-4_2-4.2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3514" ref_url="https://www.suse.com/security/cve/CVE-2014-3514/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-railties-4_2-4.2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3514/">CVE-2014-3514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3514">CVE-2014-3514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906813" comment="ruby2.2-rubygem-railties-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906814" comment="ruby2.2-rubygem-railties-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906815" comment="ruby2.2-rubygem-railties-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906816" comment="ruby2.2-rubygem-railties-doc-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906817" comment="ruby2.3-rubygem-railties-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906818" comment="ruby2.3-rubygem-railties-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906819" comment="ruby2.3-rubygem-railties-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906820" comment="ruby2.3-rubygem-railties-doc-5_0-5.0.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248529" version="1" class="patch">
	<metadata>
		<title>apache-pdfbox-1.8.12-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2175" ref_url="https://www.suse.com/security/cve/CVE-2016-2175/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-pdfbox-1.8.12-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2175/">CVE-2016-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2175">CVE-2016-2175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906821" comment="apache-pdfbox-1.8.12-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906822" comment="apache-pdfbox-javadoc-1.8.12-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248530" version="1" class="patch">
	<metadata>
		<title>libvirt-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3445">CVE-2012-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0170">CVE-2013-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1962">CVE-2013-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2218">CVE-2013-2218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2230">CVE-2013-2230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4153">CVE-2013-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4154">CVE-2013-4154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4239">CVE-2013-4239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4297">CVE-2013-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4311">CVE-2013-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4399">CVE-2013-4399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4400">CVE-2013-4400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4401">CVE-2013-4401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6436">CVE-2013-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6456">CVE-2013-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6457">CVE-2013-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6458">CVE-2013-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0028">CVE-2014-0028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1447">CVE-2014-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8131">CVE-2014-8131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5247">CVE-2015-5247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906823" comment="libvirt-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906824" comment="libvirt-admin-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906825" comment="libvirt-client-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906826" comment="libvirt-daemon-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906827" comment="libvirt-daemon-config-network-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906828" comment="libvirt-daemon-config-nwfilter-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906829" comment="libvirt-daemon-driver-interface-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906830" comment="libvirt-daemon-driver-libxl-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906831" comment="libvirt-daemon-driver-lxc-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906832" comment="libvirt-daemon-driver-network-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906833" comment="libvirt-daemon-driver-nodedev-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906834" comment="libvirt-daemon-driver-nwfilter-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906835" comment="libvirt-daemon-driver-qemu-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906836" comment="libvirt-daemon-driver-secret-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906837" comment="libvirt-daemon-driver-storage-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906838" comment="libvirt-daemon-driver-uml-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906839" comment="libvirt-daemon-driver-vbox-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906840" comment="libvirt-daemon-lxc-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906841" comment="libvirt-daemon-qemu-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906842" comment="libvirt-daemon-uml-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906843" comment="libvirt-daemon-vbox-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906844" comment="libvirt-daemon-xen-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906845" comment="libvirt-devel-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906846" comment="libvirt-devel-32bit-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906847" comment="libvirt-doc-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906848" comment="libvirt-libs-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906849" comment="libvirt-lock-sanlock-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906850" comment="libvirt-nss-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248531" version="1" class="patch">
	<metadata>
		<title>libtidy-devel-5.2.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="CVE-2016-6583" ref_url="https://www.suse.com/security/cve/CVE-2016-6583/" source="CVE"/>
		<description>
These are all security issues fixed in the libtidy-devel-5.2.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5522">CVE-2015-5522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5523">CVE-2015-5523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6583/">CVE-2016-6583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-6583">CVE-2016-6583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906851" comment="libtidy-devel-5.2.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906852" comment="libtidy5-5.2.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906853" comment="tidy-5.2.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906854" comment="tidy-doc-5.2.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248532" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.11-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.11-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906855" comment="openvpn-2.3.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906856" comment="openvpn-auth-pam-plugin-2.3.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906857" comment="openvpn-devel-2.3.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906858" comment="openvpn-down-root-plugin-2.3.11-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248533" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.6-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.6-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906859" comment="cups-pk-helper-0.2.6-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906860" comment="cups-pk-helper-lang-0.2.6-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248534" version="1" class="patch">
	<metadata>
		<title>ceph-deploy-1.5.34+git.1470736983.963ba71-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-4053" ref_url="https://www.suse.com/security/cve/CVE-2015-4053/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-deploy-1.5.34+git.1470736983.963ba71-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4053/">CVE-2015-4053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4053">CVE-2015-4053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906861" comment="ceph-deploy-1.5.34+git.1470736983.963ba71-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248535" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.2.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.2.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906862" comment="python-pyOpenSSL-16.2.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906863" comment="python-pyOpenSSL-doc-16.2.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248536" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.23-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.23-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906864" comment="mailman-2.1.23-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248537" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.34-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.34-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8025">CVE-2015-8025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906865" comment="xscreensaver-5.34-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906866" comment="xscreensaver-data-5.34-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906867" comment="xscreensaver-data-extra-5.34-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248538" version="1" class="patch">
	<metadata>
		<title>libqpid-proton-cpp6-0.12.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2166" ref_url="https://www.suse.com/security/cve/CVE-2016-2166/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpid-proton-cpp6-0.12.2-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2166/">CVE-2016-2166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2166">CVE-2016-2166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906868" comment="libqpid-proton-cpp6-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906869" comment="libqpid-proton6-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906870" comment="perl-qpid-proton-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906871" comment="python-qpid-proton-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906872" comment="python-qpid-proton-doc-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906873" comment="qpid-proton-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906874" comment="qpid-proton-devel-0.12.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906875" comment="qpid-proton-devel-doc-0.12.2-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248539" version="1" class="patch">
	<metadata>
		<title>seamonkey-2.40-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2763" ref_url="https://www.suse.com/security/cve/CVE-2010-2763/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1519" ref_url="https://www.suse.com/security/cve/CVE-2014-1519/" source="CVE"/>
		<reference ref_id="CVE-2014-1522" ref_url="https://www.suse.com/security/cve/CVE-2014-1522/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1525" ref_url="https://www.suse.com/security/cve/CVE-2014-1525/" source="CVE"/>
		<reference ref_id="CVE-2014-1526" ref_url="https://www.suse.com/security/cve/CVE-2014-1526/" source="CVE"/>
		<reference ref_id="CVE-2014-1528" ref_url="https://www.suse.com/security/cve/CVE-2014-1528/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1539" ref_url="https://www.suse.com/security/cve/CVE-2014-1539/" source="CVE"/>
		<reference ref_id="CVE-2014-1540" ref_url="https://www.suse.com/security/cve/CVE-2014-1540/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1542" ref_url="https://www.suse.com/security/cve/CVE-2014-1542/" source="CVE"/>
		<reference ref_id="CVE-2014-1543" ref_url="https://www.suse.com/security/cve/CVE-2014-1543/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1580" ref_url="https://www.suse.com/security/cve/CVE-2014-1580/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1582" ref_url="https://www.suse.com/security/cve/CVE-2014-1582/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1584" ref_url="https://www.suse.com/security/cve/CVE-2014-1584/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7217" ref_url="https://www.suse.com/security/cve/CVE-2015-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7219" ref_url="https://www.suse.com/security/cve/CVE-2015-7219/" source="CVE"/>
		<reference ref_id="CVE-2015-7220" ref_url="https://www.suse.com/security/cve/CVE-2015-7220/" source="CVE"/>
		<reference ref_id="CVE-2015-7221" ref_url="https://www.suse.com/security/cve/CVE-2015-7221/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the seamonkey-2.40-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3988">CVE-2009-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0160">CVE-2010-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0162">CVE-2010-0162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0179">CVE-2010-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0183">CVE-2010-0183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2763/">CVE-2010-2763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2763">CVE-2010-2763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3766">CVE-2010-3766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3767">CVE-2010-3767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3770">CVE-2010-3770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3771">CVE-2010-3771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3772">CVE-2010-3772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3773">CVE-2010-3773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3775">CVE-2010-3775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0051">CVE-2011-0051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0054">CVE-2011-0054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0055">CVE-2011-0055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0056">CVE-2011-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0057">CVE-2011-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0059">CVE-2011-0059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2366">CVE-2011-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2367">CVE-2011-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2368">CVE-2011-2368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2369">CVE-2011-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2370">CVE-2011-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2375">CVE-2011-2375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2985">CVE-2011-2985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2990">CVE-2011-2990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2991">CVE-2011-2991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2992">CVE-2011-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2993">CVE-2011-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3652">CVE-2011-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3654">CVE-2011-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0777">CVE-2013-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0778">CVE-2013-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0779">CVE-2013-0779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0781">CVE-2013-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1683">CVE-2013-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1688">CVE-2013-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1695">CVE-2013-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1696">CVE-2013-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1698">CVE-2013-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1699">CVE-2013-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1704">CVE-2013-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1708">CVE-2013-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1711">CVE-2013-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1719">CVE-2013-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1721">CVE-2013-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5598">CVE-2013-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1519/">CVE-2014-1519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1519">CVE-2014-1519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1522/">CVE-2014-1522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1522">CVE-2014-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1525/">CVE-2014-1525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1525">CVE-2014-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1526/">CVE-2014-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1526">CVE-2014-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1528/">CVE-2014-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1528">CVE-2014-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1539/">CVE-2014-1539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1539">CVE-2014-1539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1540/">CVE-2014-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1540">CVE-2014-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1542/">CVE-2014-1542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1542">CVE-2014-1542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1543/">CVE-2014-1543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1543">CVE-2014-1543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1580/">CVE-2014-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1580">CVE-2014-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1582/">CVE-2014-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1582">CVE-2014-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1584/">CVE-2014-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1584">CVE-2014-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8642">CVE-2014-8642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8643">CVE-2014-8643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0819">CVE-2015-0819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0820">CVE-2015-0820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0821">CVE-2015-0821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0823">CVE-2015-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0824">CVE-2015-0824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0825">CVE-2015-0825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0826">CVE-2015-0826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0828">CVE-2015-0828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0829">CVE-2015-0829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0830">CVE-2015-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0832">CVE-2015-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0833">CVE-2015-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0834">CVE-2015-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4502">CVE-2015-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4503">CVE-2015-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4504">CVE-2015-4504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4505">CVE-2015-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4507">CVE-2015-4507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4512">CVE-2015-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4514">CVE-2015-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4515">CVE-2015-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4516">CVE-2015-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4518">CVE-2015-4518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7178">CVE-2015-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7179">CVE-2015-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7185">CVE-2015-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7186">CVE-2015-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7187">CVE-2015-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7190">CVE-2015-7190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7191">CVE-2015-7191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7192">CVE-2015-7192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7195">CVE-2015-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7203">CVE-2015-7203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7204">CVE-2015-7204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7207">CVE-2015-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7208">CVE-2015-7208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7211">CVE-2015-7211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7215">CVE-2015-7215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7216">CVE-2015-7216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7217/">CVE-2015-7217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7217">CVE-2015-7217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7218">CVE-2015-7218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7219/">CVE-2015-7219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7219">CVE-2015-7219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7220/">CVE-2015-7220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7220">CVE-2015-7220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7221/">CVE-2015-7221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7221">CVE-2015-7221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7223">CVE-2015-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906876" comment="seamonkey-2.40-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906877" comment="seamonkey-dom-inspector-2.40-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906878" comment="seamonkey-irc-2.40-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906879" comment="seamonkey-translations-common-2.40-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906880" comment="seamonkey-translations-other-2.40-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248540" version="1" class="patch">
	<metadata>
		<title>jakarta-taglibs-standard-1.1.1-257.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-taglibs-standard-1.1.1-257.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906881" comment="jakarta-taglibs-standard-1.1.1-257.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906882" comment="jakarta-taglibs-standard-javadoc-1.1.1-257.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248541" version="1" class="patch">
	<metadata>
		<title>charybdis-3.5.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7143" ref_url="https://www.suse.com/security/cve/CVE-2016-7143/" source="CVE"/>
		<description>
These are all security issues fixed in the charybdis-3.5.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7143/">CVE-2016-7143 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7143">CVE-2016-7143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906883" comment="charybdis-3.5.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248542" version="1" class="patch">
	<metadata>
		<title>file-5.29-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.29-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1571">CVE-2012-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906884" comment="file-5.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906885" comment="file-devel-5.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906886" comment="file-devel-32bit-5.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906887" comment="file-magic-5.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906888" comment="libmagic1-5.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906889" comment="libmagic1-32bit-5.29-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248543" version="1" class="patch">
	<metadata>
		<title>ocaml-4.03.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869/" source="CVE"/>
		<description>
These are all security issues fixed in the ocaml-4.03.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8869">CVE-2015-8869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906890" comment="ocaml-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906891" comment="ocaml-compiler-libs-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906892" comment="ocaml-compiler-libs-devel-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906893" comment="ocaml-docs-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906894" comment="ocaml-emacs-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906895" comment="ocaml-ocamldoc-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906896" comment="ocaml-rpm-macros-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906897" comment="ocaml-runtime-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906898" comment="ocaml-source-4.03.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906899" comment="ocaml-x11-4.03.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248544" version="1" class="patch">
	<metadata>
		<title>python-pyramid-1.6-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyramid-1.6-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4671">CVE-2014-4671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906900" comment="python-pyramid-1.6-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906901" comment="python-pyramid-doc-1.6-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248545" version="1" class="patch">
	<metadata>
		<title>libvdpau-devel-1.1.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau-devel-1.1.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5198">CVE-2015-5198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5199">CVE-2015-5199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5200">CVE-2015-5200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906902" comment="libvdpau-devel-1.1.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906903" comment="libvdpau-devel-32bit-1.1.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906904" comment="libvdpau1-1.1.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906905" comment="libvdpau1-32bit-1.1.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906906" comment="libvdpau_trace1-1.1.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906907" comment="libvdpau_trace1-32bit-1.1.1-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248546" version="1" class="patch">
	<metadata>
		<title>dracut-044-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4453">CVE-2012-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8637">CVE-2016-8637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906908" comment="dracut-044-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906909" comment="dracut-fips-044-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906910" comment="dracut-tools-044-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248547" version="1" class="patch">
	<metadata>
		<title>python-pymongo-3.1.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2132" ref_url="https://www.suse.com/security/cve/CVE-2013-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pymongo-3.1.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2132/">CVE-2013-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2132">CVE-2013-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906911" comment="python-pymongo-3.1.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906912" comment="python3-pymongo-3.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248548" version="1" class="patch">
	<metadata>
		<title>libopenjpeg1-1.5.2-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5030" ref_url="https://www.suse.com/security/cve/CVE-2009-5030/" source="CVE"/>
		<reference ref_id="CVE-2012-3358" ref_url="https://www.suse.com/security/cve/CVE-2012-3358/" source="CVE"/>
		<reference ref_id="CVE-2012-3535" ref_url="https://www.suse.com/security/cve/CVE-2012-3535/" source="CVE"/>
		<reference ref_id="CVE-2013-1447" ref_url="https://www.suse.com/security/cve/CVE-2013-1447/" source="CVE"/>
		<reference ref_id="CVE-2013-4289" ref_url="https://www.suse.com/security/cve/CVE-2013-4289/" source="CVE"/>
		<reference ref_id="CVE-2013-4290" ref_url="https://www.suse.com/security/cve/CVE-2013-4290/" source="CVE"/>
		<reference ref_id="CVE-2013-6045" ref_url="https://www.suse.com/security/cve/CVE-2013-6045/" source="CVE"/>
		<reference ref_id="CVE-2013-6052" ref_url="https://www.suse.com/security/cve/CVE-2013-6052/" source="CVE"/>
		<reference ref_id="CVE-2013-6053" ref_url="https://www.suse.com/security/cve/CVE-2013-6053/" source="CVE"/>
		<reference ref_id="CVE-2013-6054" ref_url="https://www.suse.com/security/cve/CVE-2013-6054/" source="CVE"/>
		<reference ref_id="CVE-2013-6887" ref_url="https://www.suse.com/security/cve/CVE-2013-6887/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjpeg1-1.5.2-4.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5030/">CVE-2009-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5030">CVE-2009-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3358/">CVE-2012-3358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3358">CVE-2012-3358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3535/">CVE-2012-3535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3535">CVE-2012-3535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1447/">CVE-2013-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1447">CVE-2013-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4289/">CVE-2013-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4289">CVE-2013-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4290/">CVE-2013-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4290">CVE-2013-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6045/">CVE-2013-6045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6045">CVE-2013-6045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6052/">CVE-2013-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6052">CVE-2013-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6053/">CVE-2013-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6053">CVE-2013-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6054/">CVE-2013-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6054">CVE-2013-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6887/">CVE-2013-6887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6887">CVE-2013-6887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906913" comment="libopenjpeg1-1.5.2-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906914" comment="libopenjpeg1-32bit-1.5.2-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906915" comment="openjpeg-1.5.2-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906916" comment="openjpeg-devel-1.5.2-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906917" comment="openjpeg-devel-32bit-1.5.2-4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248549" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906918" comment="python-libxml2-2.9.4-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248550" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.16-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.16-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906919" comment="gdk-pixbuf-loader-rsvg-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906920" comment="gdk-pixbuf-loader-rsvg-32bit-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906921" comment="librsvg-2-2-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906922" comment="librsvg-2-2-32bit-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906923" comment="librsvg-devel-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906924" comment="rsvg-view-2.40.16-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906925" comment="typelib-1_0-Rsvg-2_0-2.40.16-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248551" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-45.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2987" ref_url="https://www.suse.com/security/cve/CVE-2011-2987/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-45.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1571">CVE-2009-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0159">CVE-2010-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0175">CVE-2010-0175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1585">CVE-2010-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3768">CVE-2010-3768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3769">CVE-2010-3769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3776">CVE-2010-3776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3777">CVE-2010-3777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3778">CVE-2010-3778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0053">CVE-2011-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0061">CVE-2011-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0062">CVE-2011-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0072">CVE-2011-0072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0074">CVE-2011-0074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0075">CVE-2011-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0077">CVE-2011-0077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0078">CVE-2011-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0083">CVE-2011-0083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0085">CVE-2011-0085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2362">CVE-2011-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2363">CVE-2011-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2364">CVE-2011-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2365">CVE-2011-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2376">CVE-2011-2376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2985">CVE-2011-2985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2987/">CVE-2011-2987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2987">CVE-2011-2987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2991">CVE-2011-2991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2992">CVE-2011-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3652">CVE-2011-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3654">CVE-2011-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1669">CVE-2013-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1677">CVE-2013-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1678">CVE-2013-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1680">CVE-2013-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1681">CVE-2013-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1719">CVE-2013-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1563">CVE-2014-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1564">CVE-2014-1564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1565">CVE-2014-1565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0833">CVE-2015-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4477">CVE-2015-4477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4480">CVE-2015-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4481">CVE-2015-4481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4482">CVE-2015-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4493">CVE-2015-4493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4505">CVE-2015-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4514">CVE-2015-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7178">CVE-2015-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7179">CVE-2015-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7207">CVE-2015-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1955">CVE-2016-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1956">CVE-2016-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2806">CVE-2016-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906926" comment="MozillaThunderbird-45.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906927" comment="MozillaThunderbird-buildsymbols-45.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906928" comment="MozillaThunderbird-devel-45.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906929" comment="MozillaThunderbird-translations-common-45.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906930" comment="MozillaThunderbird-translations-other-45.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248552" version="1" class="patch">
	<metadata>
		<title>logrotate-3.10.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.10.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906931" comment="logrotate-3.10.0-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248553" version="1" class="patch">
	<metadata>
		<title>perl-PAR-1.011-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4114" ref_url="https://www.suse.com/security/cve/CVE-2011-4114/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-PAR-1.011-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4114/">CVE-2011-4114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4114">CVE-2011-4114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906932" comment="perl-PAR-1.011-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248554" version="1" class="patch">
	<metadata>
		<title>qemu-2.6.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.6.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0928">CVE-2008-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1945">CVE-2008-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4539">CVE-2008-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4526">CVE-2013-4526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4531">CVE-2013-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4544">CVE-2013-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0142">CVE-2014-0142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0143">CVE-2014-0143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0144">CVE-2014-0144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0145">CVE-2014-0145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0146">CVE-2014-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0147">CVE-2014-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0150">CVE-2014-0150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906933" comment="qemu-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906934" comment="qemu-arm-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906935" comment="qemu-block-curl-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906936" comment="qemu-block-dmg-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906937" comment="qemu-block-gluster-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906938" comment="qemu-block-iscsi-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906939" comment="qemu-block-ssh-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906940" comment="qemu-extra-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906941" comment="qemu-guest-agent-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906942" comment="qemu-ipxe-1.0.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906943" comment="qemu-ksm-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906944" comment="qemu-kvm-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906945" comment="qemu-lang-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906946" comment="qemu-ppc-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906947" comment="qemu-s390-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906948" comment="qemu-seabios-1.9.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906949" comment="qemu-sgabios-8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906950" comment="qemu-testsuite-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906951" comment="qemu-tools-2.6.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906952" comment="qemu-vgabios-1.9.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906953" comment="qemu-x86-2.6.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248555" version="1" class="patch">
	<metadata>
		<title>gvim-8.0.130-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.0.130-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906954" comment="gvim-8.0.130-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906955" comment="vim-8.0.130-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906956" comment="vim-data-8.0.130-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248556" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3.git20161120-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3.git20161120-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906957" comment="w3m-0.5.3.git20161120-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906958" comment="w3m-inline-image-0.5.3.git20161120-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248557" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.22-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.22-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906959" comment="libevent-2_0-5-2.0.22-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906960" comment="libevent-2_0-5-32bit-2.0.22-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906961" comment="libevent-devel-2.0.22-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248558" version="1" class="patch">
	<metadata>
		<title>fence-agents-4.0.24+git.1480563949.e67fcd4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0104" ref_url="https://www.suse.com/security/cve/CVE-2014-0104/" source="CVE"/>
		<description>
These are all security issues fixed in the fence-agents-4.0.24+git.1480563949.e67fcd4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0104/">CVE-2014-0104 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0104">CVE-2014-0104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906962" comment="fence-agents-4.0.24+git.1480563949.e67fcd4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906963" comment="fence-agents-devel-4.0.24+git.1480563949.e67fcd4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248559" version="1" class="patch">
	<metadata>
		<title>konversation-1.6.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8483" ref_url="https://www.suse.com/security/cve/CVE-2014-8483/" source="CVE"/>
		<description>
These are all security issues fixed in the konversation-1.6.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8483/">CVE-2014-8483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8483">CVE-2014-8483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906964" comment="konversation-1.6.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906965" comment="konversation-lang-1.6.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248560" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.06-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.06-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3230">CVE-2014-3230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906966" comment="perl-LWP-Protocol-https-6.06-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248561" version="1" class="patch">
	<metadata>
		<title>exif-0.6.21-8.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2845" ref_url="https://www.suse.com/security/cve/CVE-2012-2845/" source="CVE"/>
		<description>
These are all security issues fixed in the exif-0.6.21-8.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2845/">CVE-2012-2845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2845">CVE-2012-2845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906967" comment="exif-0.6.21-8.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248562" version="1" class="patch">
	<metadata>
		<title>libpulse-devel-32bit-9.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-devel-32bit-9.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906968" comment="libpulse-devel-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906969" comment="libpulse-devel-32bit-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906970" comment="libpulse-mainloop-glib0-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906971" comment="libpulse-mainloop-glib0-32bit-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906972" comment="libpulse0-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906973" comment="libpulse0-32bit-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906974" comment="pulseaudio-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906975" comment="pulseaudio-bash-completion-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906976" comment="pulseaudio-esound-compat-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906977" comment="pulseaudio-gdm-hooks-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906978" comment="pulseaudio-lang-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906979" comment="pulseaudio-module-bluetooth-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906980" comment="pulseaudio-module-gconf-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906981" comment="pulseaudio-module-jack-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906982" comment="pulseaudio-module-lirc-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906983" comment="pulseaudio-module-x11-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906984" comment="pulseaudio-module-zeroconf-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906985" comment="pulseaudio-system-wide-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906986" comment="pulseaudio-utils-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906987" comment="pulseaudio-utils-32bit-9.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906988" comment="pulseaudio-zsh-completion-9.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248563" version="1" class="patch">
	<metadata>
		<title>graphite2-1.3.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<description>
These are all security issues fixed in the graphite2-1.3.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906989" comment="graphite2-1.3.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906990" comment="graphite2-devel-1.3.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906991" comment="libgraphite2-3-1.3.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906992" comment="libgraphite2-3-32bit-1.3.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248564" version="1" class="patch">
	<metadata>
		<title>ffmpeg-3.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8364" ref_url="https://www.suse.com/security/cve/CVE-2015-8364/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8662" ref_url="https://www.suse.com/security/cve/CVE-2015-8662/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2016-1898" ref_url="https://www.suse.com/security/cve/CVE-2016-1898/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-3.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8216">CVE-2015-8216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8217">CVE-2015-8217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8218">CVE-2015-8218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8219">CVE-2015-8219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8363">CVE-2015-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8364/">CVE-2015-8364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8364">CVE-2015-8364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8365">CVE-2015-8365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8661">CVE-2015-8661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8662/">CVE-2015-8662 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8662">CVE-2015-8662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8663">CVE-2015-8663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1897">CVE-2016-1897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1898/">CVE-2016-1898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1898">CVE-2016-1898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009906993" comment="ffmpeg-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906994" comment="ffmpeg2-devel-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906995" comment="libavcodec-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906996" comment="libavcodec56-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906997" comment="libavcodec56-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906998" comment="libavcodec57-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009906999" comment="libavcodec57-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907000" comment="libavdevice-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907001" comment="libavdevice56-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907002" comment="libavdevice56-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907003" comment="libavdevice57-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907004" comment="libavdevice57-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907005" comment="libavfilter-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907006" comment="libavfilter5-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907007" comment="libavfilter5-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907008" comment="libavfilter6-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907009" comment="libavfilter6-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907010" comment="libavformat-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907011" comment="libavformat56-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907012" comment="libavformat56-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907013" comment="libavformat57-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907014" comment="libavformat57-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907015" comment="libavresample-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907016" comment="libavresample2-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907017" comment="libavresample2-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907018" comment="libavresample3-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907019" comment="libavresample3-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907020" comment="libavutil-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907021" comment="libavutil54-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907022" comment="libavutil54-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907023" comment="libavutil55-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907024" comment="libavutil55-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907025" comment="libpostproc-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907026" comment="libpostproc53-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907027" comment="libpostproc53-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907028" comment="libpostproc54-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907029" comment="libpostproc54-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907030" comment="libswresample-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907031" comment="libswresample1-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907032" comment="libswresample1-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907033" comment="libswresample2-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907034" comment="libswresample2-32bit-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907035" comment="libswscale-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907036" comment="libswscale3-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907037" comment="libswscale3-32bit-2.8.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907038" comment="libswscale4-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907039" comment="libswscale4-32bit-3.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248565" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.43-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.43-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2737">CVE-2012-2737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907040" comment="accountsservice-0.6.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907041" comment="accountsservice-devel-0.6.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907042" comment="accountsservice-lang-0.6.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907043" comment="libaccountsservice0-0.6.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907044" comment="typelib-1_0-AccountsService-1_0-0.6.43-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248566" version="1" class="patch">
	<metadata>
		<title>kvirc-4.2.0-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2785" ref_url="https://www.suse.com/security/cve/CVE-2010-2785/" source="CVE"/>
		<description>
These are all security issues fixed in the kvirc-4.2.0-6.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2785/">CVE-2010-2785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2785">CVE-2010-2785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907045" comment="kvirc-4.2.0-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907046" comment="kvirc-devel-4.2.0-6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248567" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907047" comment="libpcsclite1-1.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907048" comment="libpcsclite1-32bit-1.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907049" comment="libpcscspy0-1.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907050" comment="libpcscspy0-32bit-1.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907051" comment="pcsc-lite-1.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907052" comment="pcsc-lite-devel-1.8.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248568" version="1" class="patch">
	<metadata>
		<title>nodejs4-4.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1669" ref_url="https://www.suse.com/security/cve/CVE-2016-1669/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs4-4.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1669/">CVE-2016-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1669">CVE-2016-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5325">CVE-2016-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7099">CVE-2016-7099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907053" comment="nodejs4-4.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907054" comment="nodejs4-devel-4.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907055" comment="nodejs4-docs-4.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907056" comment="npm4-4.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248569" version="1" class="patch">
	<metadata>
		<title>grep-2.27-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
These are all security issues fixed in the grep-2.27-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907057" comment="grep-2.27-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248570" version="1" class="patch">
	<metadata>
		<title>libgit2-24-0.24.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8568" ref_url="https://www.suse.com/security/cve/CVE-2016-8568/" source="CVE"/>
		<reference ref_id="CVE-2016-8569" ref_url="https://www.suse.com/security/cve/CVE-2016-8569/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-24-0.24.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8568/">CVE-2016-8568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8568">CVE-2016-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8569/">CVE-2016-8569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8569">CVE-2016-8569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907058" comment="libgit2-24-0.24.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907059" comment="libgit2-24-32bit-0.24.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907060" comment="libgit2-devel-0.24.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248571" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907061" comment="libXRes1-1.0.7-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907062" comment="libXRes1-32bit-1.0.7-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907063" comment="libXres-devel-1.0.7-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907064" comment="libXres-devel-32bit-1.0.7-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248572" version="1" class="patch">
	<metadata>
		<title>tcpreplay-4.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6160" ref_url="https://www.suse.com/security/cve/CVE-2016-6160/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpreplay-4.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6160/">CVE-2016-6160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6160">CVE-2016-6160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907065" comment="tcpreplay-4.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248573" version="1" class="patch">
	<metadata>
		<title>audit-devel-2.5-1.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>
These are all security issues fixed in the audit-devel-2.5-1.82 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907066" comment="audit-devel-2.5-1.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907067" comment="audit-devel-32bit-2.5-1.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907068" comment="libaudit1-2.5-1.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907069" comment="libaudit1-32bit-2.5-1.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907070" comment="libauparse0-2.5-1.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907071" comment="libauparse0-32bit-2.5-1.82 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248574" version="1" class="patch">
	<metadata>
		<title>dpkg-1.18.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the dpkg-1.18.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0840">CVE-2015-0840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907072" comment="dpkg-1.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907073" comment="dpkg-devel-1.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907074" comment="dpkg-lang-1.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907075" comment="update-alternatives-1.18.10-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248575" version="1" class="patch">
	<metadata>
		<title>gcab-0.7-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0552" ref_url="https://www.suse.com/security/cve/CVE-2015-0552/" source="CVE"/>
		<description>
These are all security issues fixed in the gcab-0.7-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0552/">CVE-2015-0552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0552">CVE-2015-0552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907076" comment="gcab-0.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907077" comment="gcab-devel-0.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907078" comment="gcab-lang-0.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907079" comment="libgcab-1_0-0-0.7-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248576" version="1" class="patch">
	<metadata>
		<title>libXvMC-devel-1.0.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC-devel-1.0.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907080" comment="libXvMC-devel-1.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907081" comment="libXvMC-devel-32bit-1.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907082" comment="libXvMC1-1.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907083" comment="libXvMC1-32bit-1.0.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248577" version="1" class="patch">
	<metadata>
		<title>postgresql93-9.3.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0242" ref_url="https://www.suse.com/security/cve/CVE-2015-0242/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql93-9.3.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0867">CVE-2012-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0067">CVE-2014-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8161">CVE-2014-8161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0242/">CVE-2015-0242 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0242">CVE-2015-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907084" comment="postgresql93-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907085" comment="postgresql93-contrib-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907086" comment="postgresql93-devel-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907087" comment="postgresql93-docs-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907088" comment="postgresql93-plperl-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907089" comment="postgresql93-plpython-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907090" comment="postgresql93-pltcl-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907091" comment="postgresql93-server-9.3.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907092" comment="postgresql93-test-9.3.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248578" version="1" class="patch">
	<metadata>
		<title>librsync-devel-1.0.0-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<description>
These are all security issues fixed in the librsync-devel-1.0.0-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907093" comment="librsync-devel-1.0.0-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907094" comment="librsync2-1.0.0-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907095" comment="rdiff-1.0.0-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248579" version="1" class="patch">
	<metadata>
		<title>pidgin-otr-4.0.2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-otr-4.0.2-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2369">CVE-2012-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8833">CVE-2015-8833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907096" comment="pidgin-otr-4.0.2-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248580" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-22.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-22.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9638">CVE-2014-9638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9639">CVE-2014-9639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9640">CVE-2014-9640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6749">CVE-2015-6749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907097" comment="vorbis-tools-1.4.0-22.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907098" comment="vorbis-tools-lang-1.4.0-22.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248581" version="1" class="patch">
	<metadata>
		<title>apache2-mod_mono-3.12-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4225" ref_url="https://www.suse.com/security/cve/CVE-2010-4225/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_mono-3.12-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4225/">CVE-2010-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4225">CVE-2010-4225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907099" comment="apache2-mod_mono-3.12-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907100" comment="xsp-3.0.11-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248582" version="1" class="patch">
	<metadata>
		<title>wesnoth-1.12.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0844" ref_url="https://www.suse.com/security/cve/CVE-2015-0844/" source="CVE"/>
		<description>
These are all security issues fixed in the wesnoth-1.12.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0844/">CVE-2015-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0844">CVE-2015-0844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907101" comment="wesnoth-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907102" comment="wesnoth-campaign-server-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907103" comment="wesnoth-data-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907104" comment="wesnoth-fslayout-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907105" comment="wesnoth-server-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907106" comment="wesnoth-tools-1.12.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248583" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-fileupload-1.1.1-125.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-125.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907107" comment="jakarta-commons-fileupload-1.1.1-125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907108" comment="jakarta-commons-fileupload-javadoc-1.1.1-125.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248584" version="1" class="patch">
	<metadata>
		<title>wget-1.18-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-7665" ref_url="https://www.suse.com/security/cve/CVE-2015-7665/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.18-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2252">CVE-2010-2252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7665/">CVE-2015-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7665">CVE-2015-7665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907109" comment="wget-1.18-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248585" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.3-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907110" comment="vsftpd-3.0.3-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248586" version="1" class="patch">
	<metadata>
		<title>libsrtp-devel-1.5.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp-devel-1.5.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6360">CVE-2015-6360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907111" comment="libsrtp-devel-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907112" comment="libsrtp1-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907113" comment="libsrtp1-32bit-1.5.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248587" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-24.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-24.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2891">CVE-2010-2891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907114" comment="libsmi-0.4.8-24.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907115" comment="libsmi-devel-0.4.8-24.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907116" comment="libsmi2-0.4.8-24.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248588" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-9.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7747">CVE-2015-7747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907117" comment="audiofile-0.3.6-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907118" comment="audiofile-devel-0.3.6-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907119" comment="audiofile-devel-32bit-0.3.6-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907120" comment="audiofile-doc-0.3.6-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907121" comment="libaudiofile1-0.3.6-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907122" comment="libaudiofile1-32bit-0.3.6-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248589" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.23-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-1176" ref_url="https://www.suse.com/security/cve/CVE-2011-1176/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-3502" ref_url="https://www.suse.com/security/cve/CVE-2012-3502/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-2249" ref_url="https://www.suse.com/security/cve/CVE-2013-2249/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3523" ref_url="https://www.suse.com/security/cve/CVE-2014-3523/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.23-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1955">CVE-2009-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1956">CVE-2009-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1176/">CVE-2011-1176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1176">CVE-2011-1176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3502/">CVE-2012-3502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3502">CVE-2012-3502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2249/">CVE-2013-2249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2249">CVE-2013-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0117">CVE-2014-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3523/">CVE-2014-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3523">CVE-2014-3523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3583">CVE-2014-3583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8109">CVE-2014-8109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0228">CVE-2015-0228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0253">CVE-2015-0253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4979">CVE-2016-4979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907123" comment="apache2-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907124" comment="apache2-devel-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907125" comment="apache2-doc-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907126" comment="apache2-event-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907127" comment="apache2-example-pages-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907128" comment="apache2-prefork-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907129" comment="apache2-utils-2.4.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907130" comment="apache2-worker-2.4.23-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248590" version="1" class="patch">
	<metadata>
		<title>opensc-0.16.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.16.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4523">CVE-2010-4523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907131" comment="opensc-0.16.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907132" comment="opensc-32bit-0.16.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248591" version="1" class="patch">
	<metadata>
		<title>nspluginwrapper-1.4.4-16.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2486" ref_url="https://www.suse.com/security/cve/CVE-2011-2486/" source="CVE"/>
		<description>
These are all security issues fixed in the nspluginwrapper-1.4.4-16.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2486/">CVE-2011-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2486">CVE-2011-2486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907133" comment="nspluginwrapper-1.4.4-16.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248592" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2j-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2j-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907134" comment="libopenssl-devel-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907135" comment="libopenssl-devel-32bit-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907136" comment="libopenssl1_0_0-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907137" comment="libopenssl1_0_0-32bit-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907138" comment="libopenssl1_0_0-hmac-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907139" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907140" comment="openssl-1.0.2j-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907141" comment="openssl-doc-1.0.2j-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248593" version="1" class="patch">
	<metadata>
		<title>transmission-2.92-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4909" ref_url="https://www.suse.com/security/cve/CVE-2014-4909/" source="CVE"/>
		<description>
These are all security issues fixed in the transmission-2.92-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4909/">CVE-2014-4909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4909">CVE-2014-4909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907142" comment="transmission-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907143" comment="transmission-common-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907144" comment="transmission-daemon-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907145" comment="transmission-gtk-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907146" comment="transmission-gtk-lang-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907147" comment="transmission-qt-2.92-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907148" comment="transmission-qt-lang-2.92-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248594" version="1" class="patch">
	<metadata>
		<title>libecpg6-32bit-9.5.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-2193" ref_url="https://www.suse.com/security/cve/CVE-2016-2193/" source="CVE"/>
		<reference ref_id="CVE-2016-3065" ref_url="https://www.suse.com/security/cve/CVE-2016-3065/" source="CVE"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-32bit-9.5.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0867">CVE-2012-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0067">CVE-2014-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2193/">CVE-2016-2193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2193">CVE-2016-2193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3065/">CVE-2016-3065 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3065">CVE-2016-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907149" comment="libecpg6-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907150" comment="libecpg6-32bit-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907151" comment="libpq5-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907152" comment="libpq5-32bit-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907153" comment="postgresql95-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907154" comment="postgresql95-contrib-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907155" comment="postgresql95-devel-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907156" comment="postgresql95-docs-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907157" comment="postgresql95-plperl-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907158" comment="postgresql95-plpython-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907159" comment="postgresql95-pltcl-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907160" comment="postgresql95-server-9.5.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907161" comment="postgresql95-test-9.5.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248595" version="1" class="patch">
	<metadata>
		<title>libXv-devel-1.0.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv-devel-1.0.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907162" comment="libXv-devel-1.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907163" comment="libXv-devel-32bit-1.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907164" comment="libXv1-1.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907165" comment="libXv1-32bit-1.0.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248596" version="1" class="patch">
	<metadata>
		<title>monit-5.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2016-7067" ref_url="https://www.suse.com/security/cve/CVE-2016-7067/" source="CVE"/>
		<description>
These are all security issues fixed in the monit-5.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7067/">CVE-2016-7067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7067">CVE-2016-7067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907166" comment="monit-5.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907167" comment="monit-doc-5.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248597" version="1" class="patch">
	<metadata>
		<title>python3-cupshelpers-1.5.7-9.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-cupshelpers-1.5.7-9.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907168" comment="python3-cupshelpers-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907169" comment="system-config-printer-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907170" comment="system-config-printer-applet-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907171" comment="system-config-printer-common-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907172" comment="system-config-printer-common-lang-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907173" comment="system-config-printer-dbus-service-1.5.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907174" comment="udev-configure-printer-1.5.7-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248598" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.39-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.39-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1283">CVE-2016-1283 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907175" comment="libpcre1-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907176" comment="libpcre1-32bit-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907177" comment="libpcre16-0-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907178" comment="libpcre16-0-32bit-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907179" comment="libpcrecpp0-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907180" comment="libpcrecpp0-32bit-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907181" comment="libpcreposix0-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907182" comment="libpcreposix0-32bit-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907183" comment="pcre-devel-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907184" comment="pcre-devel-static-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907185" comment="pcre-doc-8.39-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907186" comment="pcre-tools-8.39-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248599" version="1" class="patch">
	<metadata>
		<title>criu-2.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5228" ref_url="https://www.suse.com/security/cve/CVE-2015-5228/" source="CVE"/>
		<reference ref_id="CVE-2015-5231" ref_url="https://www.suse.com/security/cve/CVE-2015-5231/" source="CVE"/>
		<description>
These are all security issues fixed in the criu-2.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5228/">CVE-2015-5228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5228">CVE-2015-5228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5231/">CVE-2015-5231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5231">CVE-2015-5231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907187" comment="criu-2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907188" comment="criu-devel-2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907189" comment="libcriu1-2.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248600" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.28.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.28.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0157">CVE-2013-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2779">CVE-2016-2779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907190" comment="libblkid-devel-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907191" comment="libblkid-devel-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907192" comment="libblkid-devel-static-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907193" comment="libblkid1-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907194" comment="libblkid1-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907195" comment="libfdisk-devel-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907196" comment="libfdisk-devel-static-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907197" comment="libfdisk1-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907198" comment="libmount-devel-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907199" comment="libmount-devel-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907200" comment="libmount-devel-static-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907201" comment="libmount1-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907202" comment="libmount1-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907203" comment="libsmartcols-devel-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907204" comment="libsmartcols-devel-static-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907205" comment="libsmartcols1-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907206" comment="libuuid-devel-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907207" comment="libuuid-devel-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907208" comment="libuuid-devel-static-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907209" comment="libuuid1-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907210" comment="libuuid1-32bit-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907211" comment="python-libmount-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907212" comment="util-linux-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907213" comment="util-linux-lang-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907214" comment="util-linux-systemd-2.28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907215" comment="uuidd-2.28.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248601" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.108-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.108-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0292">CVE-2013-0292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907216" comment="dbus-1-glib-0.108-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907217" comment="dbus-1-glib-32bit-0.108-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907218" comment="dbus-1-glib-devel-0.108-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907219" comment="dbus-1-glib-devel-32bit-0.108-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907220" comment="dbus-1-glib-doc-0.108-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907221" comment="dbus-1-glib-tool-0.108-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248602" version="1" class="patch">
	<metadata>
		<title>jasper-1.900.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-1.900.14-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4516">CVE-2011-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4517">CVE-2011-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907222" comment="jasper-1.900.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907223" comment="libjasper-devel-1.900.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907224" comment="libjasper1-1.900.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907225" comment="libjasper1-32bit-1.900.14-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248603" version="1" class="patch">
	<metadata>
		<title>cobbler-2.6.6-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2395" ref_url="https://www.suse.com/security/cve/CVE-2012-2395/" source="CVE"/>
		<reference ref_id="CVE-2014-3225" ref_url="https://www.suse.com/security/cve/CVE-2014-3225/" source="CVE"/>
		<description>
These are all security issues fixed in the cobbler-2.6.6-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2395/">CVE-2012-2395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2395">CVE-2012-2395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3225/">CVE-2014-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3225">CVE-2014-3225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907226" comment="cobbler-2.6.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907227" comment="cobbler-tests-2.6.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907228" comment="cobbler-web-2.6.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907229" comment="koan-2.6.6-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248604" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.8-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.8-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907230" comment="libminizip1-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907231" comment="libz1-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907232" comment="libz1-32bit-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907233" comment="minizip-devel-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907234" comment="zlib-devel-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907235" comment="zlib-devel-32bit-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907236" comment="zlib-devel-static-1.2.8-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907237" comment="zlib-devel-static-32bit-1.2.8-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248605" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.8.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.8.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1616">CVE-2012-1616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907238" comment="argyllcms-1.8.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907239" comment="argyllcms-doc-1.8.3-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248606" version="1" class="patch">
	<metadata>
		<title>qemu-linux-user-2.6.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-linux-user-2.6.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0928">CVE-2008-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1945">CVE-2008-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4539">CVE-2008-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907240" comment="qemu-linux-user-2.6.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248607" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-5.1.35-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-2575" ref_url="https://www.suse.com/security/cve/CVE-2015-2575/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-5.1.35-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2575/">CVE-2015-2575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2575">CVE-2015-2575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907241" comment="mysql-connector-java-5.1.35-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248608" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8c-140.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8c-140.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907242" comment="qt3-3.3.8c-140.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907243" comment="qt3-32bit-3.3.8c-140.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907244" comment="qt3-devel-3.3.8c-140.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907245" comment="qt3-devel-32bit-3.3.8c-140.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248609" version="1" class="patch">
	<metadata>
		<title>libunwind-1.2~rc1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
These are all security issues fixed in the libunwind-1.2~rc1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907246" comment="libunwind-1.2~rc1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907247" comment="libunwind-32bit-1.2~rc1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907248" comment="libunwind-devel-1.2~rc1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248610" version="1" class="patch">
	<metadata>
		<title>stunnel-5.38-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2011-2940" ref_url="https://www.suse.com/security/cve/CVE-2011-2940/" source="CVE"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-5.38-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2940/">CVE-2011-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2940">CVE-2011-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0016">CVE-2014-0016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907249" comment="stunnel-5.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907250" comment="stunnel-doc-5.38-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248611" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php7-7.0.14-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4718" ref_url="https://www.suse.com/security/cve/CVE-2011-4718/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-1824" ref_url="https://www.suse.com/security/cve/CVE-2013-1824/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2013-7327" ref_url="https://www.suse.com/security/cve/CVE-2013-7327/" source="CVE"/>
		<reference ref_id="CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345/" source="CVE"/>
		<reference ref_id="CVE-2014-0185" ref_url="https://www.suse.com/security/cve/CVE-2014-0185/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-1943" ref_url="https://www.suse.com/security/cve/CVE-2014-1943/" source="CVE"/>
		<reference ref_id="CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-5120" ref_url="https://www.suse.com/security/cve/CVE-2014-5120/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php7-7.0.14-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4718/">CVE-2011-4718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4718">CVE-2011-4718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1824/">CVE-2013-1824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1824">CVE-2013-1824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7327/">CVE-2013-7327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7327">CVE-2013-7327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0185/">CVE-2014-0185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0185">CVE-2014-0185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1943/">CVE-2014-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1943">CVE-2014-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2270">CVE-2014-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3622">CVE-2014-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5120/">CVE-2014-5120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5120">CVE-2014-5120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9426">CVE-2014-9426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9427">CVE-2014-9427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1351">CVE-2015-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1352">CVE-2015-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907251" comment="apache2-mod_php7-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907252" comment="php7-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907253" comment="php7-bcmath-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907254" comment="php7-bz2-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907255" comment="php7-calendar-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907256" comment="php7-ctype-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907257" comment="php7-curl-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907258" comment="php7-dba-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907259" comment="php7-devel-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907260" comment="php7-dom-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907261" comment="php7-enchant-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907262" comment="php7-exif-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907263" comment="php7-fastcgi-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907264" comment="php7-fileinfo-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907265" comment="php7-firebird-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907266" comment="php7-fpm-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907267" comment="php7-ftp-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907268" comment="php7-gd-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907269" comment="php7-gettext-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907270" comment="php7-gmp-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907271" comment="php7-iconv-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907272" comment="php7-imap-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907273" comment="php7-intl-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907274" comment="php7-json-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907275" comment="php7-ldap-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907276" comment="php7-mbstring-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907277" comment="php7-mcrypt-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907278" comment="php7-mysql-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907279" comment="php7-odbc-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907280" comment="php7-opcache-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907281" comment="php7-openssl-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907282" comment="php7-pcntl-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907283" comment="php7-pdo-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907284" comment="php7-pear-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907285" comment="php7-pear-Archive_Tar-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907286" comment="php7-pgsql-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907287" comment="php7-phar-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907288" comment="php7-posix-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907289" comment="php7-pspell-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907290" comment="php7-readline-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907291" comment="php7-shmop-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907292" comment="php7-snmp-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907293" comment="php7-soap-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907294" comment="php7-sockets-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907295" comment="php7-sqlite-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907296" comment="php7-sysvmsg-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907297" comment="php7-sysvsem-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907298" comment="php7-sysvshm-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907299" comment="php7-tidy-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907300" comment="php7-tokenizer-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907301" comment="php7-wddx-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907302" comment="php7-xmlreader-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907303" comment="php7-xmlrpc-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907304" comment="php7-xmlwriter-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907305" comment="php7-xsl-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907306" comment="php7-zip-7.0.14-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907307" comment="php7-zlib-7.0.14-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248612" version="1" class="patch">
	<metadata>
		<title>salt-2016.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1866" ref_url="https://www.suse.com/security/cve/CVE-2016-1866/" source="CVE"/>
		<description>
These are all security issues fixed in the salt-2016.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1866/">CVE-2016-1866 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1866">CVE-2016-1866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907308" comment="salt-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907309" comment="salt-api-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907310" comment="salt-bash-completion-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907311" comment="salt-cloud-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907312" comment="salt-doc-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907313" comment="salt-fish-completion-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907314" comment="salt-master-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907315" comment="salt-minion-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907316" comment="salt-proxy-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907317" comment="salt-raet-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907318" comment="salt-ssh-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907319" comment="salt-syndic-2016.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907320" comment="salt-zsh-completion-2016.3.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248613" version="1" class="patch">
	<metadata>
		<title>uudeview-0.5.20-257.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2266" ref_url="https://www.suse.com/security/cve/CVE-2008-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the uudeview-0.5.20-257.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2266/">CVE-2008-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2266">CVE-2008-2266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907321" comment="uudeview-0.5.20-257.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248614" version="1" class="patch">
	<metadata>
		<title>cppi-1.18-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the cppi-1.18-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4029">CVE-2009-4029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907322" comment="cppi-1.18-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907323" comment="cppi-lang-1.18-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248615" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.18-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.18-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4540">CVE-2010-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4541">CVE-2010-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4542">CVE-2010-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4543">CVE-2010-4543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2896">CVE-2011-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3236">CVE-2012-3236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5576">CVE-2012-5576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4994">CVE-2016-4994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907324" comment="gimp-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907325" comment="gimp-devel-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907326" comment="gimp-help-browser-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907327" comment="gimp-lang-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907328" comment="gimp-plugin-aa-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907329" comment="gimp-plugins-python-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907330" comment="libgimp-2_0-0-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907331" comment="libgimp-2_0-0-32bit-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907332" comment="libgimpui-2_0-0-2.8.18-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907333" comment="libgimpui-2_0-0-32bit-2.8.18-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248616" version="1" class="patch">
	<metadata>
		<title>libXrandr-devel-1.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr-devel-1.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907334" comment="libXrandr-devel-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907335" comment="libXrandr-devel-32bit-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907336" comment="libXrandr2-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907337" comment="libXrandr2-32bit-1.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248617" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7204">CVE-2014-7204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907338" comment="ctags-5.8-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248618" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907339" comment="mozilla-nspr-4.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907340" comment="mozilla-nspr-32bit-4.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907341" comment="mozilla-nspr-devel-4.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248619" version="1" class="patch">
	<metadata>
		<title>libpgf-devel-6.14.12-4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-6673" ref_url="https://www.suse.com/security/cve/CVE-2015-6673/" source="CVE"/>
		<description>
These are all security issues fixed in the libpgf-devel-6.14.12-4.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6673/">CVE-2015-6673 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6673">CVE-2015-6673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907342" comment="libpgf-devel-6.14.12-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907343" comment="libpgf6-6.14.12-4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248620" version="1" class="patch">
	<metadata>
		<title>libXfont-devel-1.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont-devel-1.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907344" comment="libXfont-devel-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907345" comment="libXfont-devel-32bit-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907346" comment="libXfont1-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907347" comment="libXfont1-32bit-1.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248621" version="1" class="patch">
	<metadata>
		<title>libupnp-devel-1.6.19-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5958" ref_url="https://www.suse.com/security/cve/CVE-2012-5958/" source="CVE"/>
		<reference ref_id="CVE-2012-5959" ref_url="https://www.suse.com/security/cve/CVE-2012-5959/" source="CVE"/>
		<reference ref_id="CVE-2012-5960" ref_url="https://www.suse.com/security/cve/CVE-2012-5960/" source="CVE"/>
		<reference ref_id="CVE-2012-5961" ref_url="https://www.suse.com/security/cve/CVE-2012-5961/" source="CVE"/>
		<reference ref_id="CVE-2012-5962" ref_url="https://www.suse.com/security/cve/CVE-2012-5962/" source="CVE"/>
		<reference ref_id="CVE-2012-5963" ref_url="https://www.suse.com/security/cve/CVE-2012-5963/" source="CVE"/>
		<reference ref_id="CVE-2012-5964" ref_url="https://www.suse.com/security/cve/CVE-2012-5964/" source="CVE"/>
		<reference ref_id="CVE-2012-5965" ref_url="https://www.suse.com/security/cve/CVE-2012-5965/" source="CVE"/>
		<description>
These are all security issues fixed in the libupnp-devel-1.6.19-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5958/">CVE-2012-5958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5958">CVE-2012-5958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5959/">CVE-2012-5959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5959">CVE-2012-5959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5960/">CVE-2012-5960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5960">CVE-2012-5960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5961/">CVE-2012-5961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5961">CVE-2012-5961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5962/">CVE-2012-5962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5962">CVE-2012-5962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5963/">CVE-2012-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5963">CVE-2012-5963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5964/">CVE-2012-5964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5964">CVE-2012-5964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5965/">CVE-2012-5965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5965">CVE-2012-5965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907348" comment="libupnp-devel-1.6.19-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907349" comment="libupnp6-1.6.19-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907350" comment="libupnp6-32bit-1.6.19-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248622" version="1" class="patch">
	<metadata>
		<title>lib3ds-1-3-1.3.0-29.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0280" ref_url="https://www.suse.com/security/cve/CVE-2010-0280/" source="CVE"/>
		<description>
These are all security issues fixed in the lib3ds-1-3-1.3.0-29.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0280/">CVE-2010-0280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0280">CVE-2010-0280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907351" comment="lib3ds-1-3-1.3.0-29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907352" comment="lib3ds-devel-1.3.0-29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248623" version="1" class="patch">
	<metadata>
		<title>gc-devel-7.4.2-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the gc-devel-7.4.2-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2673">CVE-2012-2673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907353" comment="gc-devel-7.4.2-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907354" comment="libgc1-7.4.2-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248624" version="1" class="patch">
	<metadata>
		<title>curl-7.51.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.51.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0249">CVE-2013-0249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3620">CVE-2014-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3144">CVE-2015-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3145">CVE-2015-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3236">CVE-2015-3236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3237">CVE-2015-3237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8625">CVE-2016-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907355" comment="curl-7.51.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907356" comment="libcurl-devel-7.51.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907357" comment="libcurl-devel-32bit-7.51.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907358" comment="libcurl4-7.51.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907359" comment="libcurl4-32bit-7.51.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248625" version="1" class="patch">
	<metadata>
		<title>libzrtpcpp-devel-4.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2221" ref_url="https://www.suse.com/security/cve/CVE-2013-2221/" source="CVE"/>
		<reference ref_id="CVE-2013-2222" ref_url="https://www.suse.com/security/cve/CVE-2013-2222/" source="CVE"/>
		<reference ref_id="CVE-2013-2223" ref_url="https://www.suse.com/security/cve/CVE-2013-2223/" source="CVE"/>
		<description>
These are all security issues fixed in the libzrtpcpp-devel-4.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2221/">CVE-2013-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2221">CVE-2013-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2222/">CVE-2013-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2222">CVE-2013-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2223/">CVE-2013-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2223">CVE-2013-2223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907360" comment="libzrtpcpp-devel-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907361" comment="libzrtpcpp4-4.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248626" version="1" class="patch">
	<metadata>
		<title>libmikmod-devel-3.3.7-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod-devel-3.3.7-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6720">CVE-2007-6720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0179">CVE-2009-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3995">CVE-2009-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3996">CVE-2009-3996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2546">CVE-2010-2546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907362" comment="libmikmod-devel-3.3.7-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907363" comment="libmikmod3-3.3.7-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907364" comment="libmikmod3-32bit-3.3.7-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248627" version="1" class="patch">
	<metadata>
		<title>tnftp-20151004-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8517" ref_url="https://www.suse.com/security/cve/CVE-2014-8517/" source="CVE"/>
		<description>
These are all security issues fixed in the tnftp-20151004-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8517/">CVE-2014-8517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8517">CVE-2014-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907365" comment="tnftp-20151004-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248628" version="1" class="patch">
	<metadata>
		<title>squid-3.5.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-3.5.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907366" comment="squid-3.5.22-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248629" version="1" class="patch">
	<metadata>
		<title>libplib0-1.8.5+svn.2173-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4620" ref_url="https://www.suse.com/security/cve/CVE-2011-4620/" source="CVE"/>
		<reference ref_id="CVE-2012-4552" ref_url="https://www.suse.com/security/cve/CVE-2012-4552/" source="CVE"/>
		<description>
These are all security issues fixed in the libplib0-1.8.5+svn.2173-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4620/">CVE-2011-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4620">CVE-2011-4620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4552/">CVE-2012-4552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4552">CVE-2012-4552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907367" comment="libplib0-1.8.5+svn.2173-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907368" comment="plib-devel-1.8.5+svn.2173-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248630" version="1" class="patch">
	<metadata>
		<title>libcrypto38-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3502" ref_url="https://www.suse.com/security/cve/CVE-2014-3502/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8176" ref_url="https://www.suse.com/security/cve/CVE-2014-8176/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5333" ref_url="https://www.suse.com/security/cve/CVE-2015-5333/" source="CVE"/>
		<reference ref_id="CVE-2015-5334" ref_url="https://www.suse.com/security/cve/CVE-2015-5334/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<description>
These are all security issues fixed in the libcrypto38-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3502/">CVE-2014-3502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3502">CVE-2014-3502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8176/">CVE-2014-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8176">CVE-2014-8176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5333/">CVE-2015-5333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5333">CVE-2015-5333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5334/">CVE-2015-5334 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5334">CVE-2015-5334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907369" comment="libcrypto38-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907370" comment="libcrypto38-32bit-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907371" comment="libressl-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907372" comment="libressl-devel-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907373" comment="libressl-devel-32bit-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907374" comment="libressl-devel-doc-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907375" comment="libssl39-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907376" comment="libssl39-32bit-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907377" comment="libtls11-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907378" comment="libtls11-32bit-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248631" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907379" comment="sysconfig-0.84.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907380" comment="sysconfig-netconfig-0.84.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248632" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.14-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-5244" ref_url="https://www.suse.com/security/cve/CVE-2015-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.14-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5244/">CVE-2015-5244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5244">CVE-2015-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3099">CVE-2016-3099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907381" comment="apache2-mod_nss-1.0.14-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248633" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-103.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-103.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907382" comment="sysvinit-tools-2.88+-103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907383" comment="whois-5.2.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248634" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.8.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.8.2-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6473">CVE-2013-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6474">CVE-2013-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6475">CVE-2013-6475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6476">CVE-2013-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2707">CVE-2014-2707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4336">CVE-2014-4336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4337">CVE-2014-4337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4338">CVE-2014-4338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2265">CVE-2015-2265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3258">CVE-2015-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3279">CVE-2015-3279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8327">CVE-2015-8327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8560">CVE-2015-8560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907384" comment="cups-filters-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907385" comment="cups-filters-cups-browsed-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907386" comment="cups-filters-devel-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907387" comment="cups-filters-foomatic-rip-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907388" comment="cups-filters-ghostscript-1.8.2-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248635" version="1" class="patch">
	<metadata>
		<title>DevIL-devel-1.7.8-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3994" ref_url="https://www.suse.com/security/cve/CVE-2009-3994/" source="CVE"/>
		<description>
These are all security issues fixed in the DevIL-devel-1.7.8-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3994/">CVE-2009-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3994">CVE-2009-3994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907389" comment="DevIL-devel-1.7.8-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907390" comment="libIL1-1.7.8-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907391" comment="libdevil-tools-1.7.8-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248636" version="1" class="patch">
	<metadata>
		<title>firebird-3.0.1.32609-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<description>
These are all security issues fixed in the firebird-3.0.1.32609-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2492">CVE-2013-2492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907392" comment="firebird-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907393" comment="firebird-doc-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907394" comment="firebird-examples-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907395" comment="firebird-server-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907396" comment="firebird-utils-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907397" comment="libfbclient-devel-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907398" comment="libfbclient2-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907399" comment="libfbclient2-32bit-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907400" comment="libib_util-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907401" comment="libib_util-32bit-3.0.1.32609-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907402" comment="libib_util-devel-3.0.1.32609-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248637" version="1" class="patch">
	<metadata>
		<title>icedtea-web-javadoc-1.6.2-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the icedtea-web-javadoc-1.6.2-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2513">CVE-2011-2513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2514">CVE-2011-2514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3377">CVE-2011-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3422">CVE-2012-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3423">CVE-2012-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4540">CVE-2012-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1926">CVE-2013-1926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1927">CVE-2013-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4349">CVE-2013-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5234">CVE-2015-5234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5235">CVE-2015-5235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907403" comment="icedtea-web-javadoc-1.6.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907404" comment="java-1_7_0-openjdk-plugin-1.6.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907405" comment="java-1_8_0-openjdk-plugin-1.6.2-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248638" version="1" class="patch">
	<metadata>
		<title>python-Beaker-1.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3458" ref_url="https://www.suse.com/security/cve/CVE-2012-3458/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Beaker-1.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3458/">CVE-2012-3458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3458">CVE-2012-3458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907406" comment="python-Beaker-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907407" comment="python3-Beaker-1.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248639" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.43-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-0418" ref_url="https://www.suse.com/security/cve/CVE-2011-0418/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.43-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0411">CVE-2011-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0418/">CVE-2011-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0418">CVE-2011-0418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907408" comment="pure-ftpd-1.0.43-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248640" version="1" class="patch">
	<metadata>
		<title>autofs-5.1.1-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.1.1-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8169">CVE-2014-8169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907409" comment="autofs-5.1.1-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248641" version="1" class="patch">
	<metadata>
		<title>imlib2-1.4.9-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0991" ref_url="https://www.suse.com/security/cve/CVE-2010-0991/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-1.4.9-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0991/">CVE-2010-0991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0991">CVE-2010-0991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907410" comment="imlib2-1.4.9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907411" comment="imlib2-devel-1.4.9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907412" comment="imlib2-filters-1.4.9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907413" comment="imlib2-loaders-1.4.9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907414" comment="libImlib2-1-1.4.9-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248642" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3355">CVE-2012-3355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907415" comment="rhythmbox-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907416" comment="rhythmbox-devel-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907417" comment="rhythmbox-lang-3.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248643" version="1" class="patch">
	<metadata>
		<title>p7zip-16.02-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2334" ref_url="https://www.suse.com/security/cve/CVE-2016-2334/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="CVE-2016-9296" ref_url="https://www.suse.com/security/cve/CVE-2016-9296/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-16.02-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1038">CVE-2015-1038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2334/">CVE-2016-2334 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2334">CVE-2016-2334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2335">CVE-2016-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9296/">CVE-2016-9296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9296">CVE-2016-9296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907418" comment="p7zip-16.02-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248644" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-11.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907419" comment="xinetd-2.3.15-11.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248645" version="1" class="patch">
	<metadata>
		<title>android-tools-5.1.1_r8-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1909" ref_url="https://www.suse.com/security/cve/CVE-2014-1909/" source="CVE"/>
		<description>
These are all security issues fixed in the android-tools-5.1.1_r8-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1909/">CVE-2014-1909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1909">CVE-2014-1909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907420" comment="android-tools-5.1.1_r8-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907421" comment="android-tools-udev-5.1.1_r8-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248646" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-16.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-16.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907422" comment="kdenetwork4-filesharing-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907423" comment="kdnssd-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907424" comment="kget-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907425" comment="kopete-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907426" comment="kopete-devel-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907427" comment="kppp-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907428" comment="krdc-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907429" comment="krdc-devel-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907430" comment="krfb-16.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248647" version="1" class="patch">
	<metadata>
		<title>ansible-2.2.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-2.2.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907431" comment="ansible-2.2.0.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248648" version="1" class="patch">
	<metadata>
		<title>libproxy-devel-0.4.13-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy-devel-0.4.13-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4504">CVE-2012-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907432" comment="libproxy-devel-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907433" comment="libproxy-sharp-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907434" comment="libproxy-tools-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907435" comment="libproxy1-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907436" comment="libproxy1-32bit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907437" comment="libproxy1-config-gnome3-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907438" comment="libproxy1-config-gnome3-32bit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907439" comment="libproxy1-config-kde-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907440" comment="libproxy1-config-kde-32bit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907441" comment="libproxy1-networkmanager-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907442" comment="libproxy1-networkmanager-32bit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907443" comment="libproxy1-pacrunner-webkit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907444" comment="libproxy1-pacrunner-webkit-32bit-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907445" comment="perl-Net-Libproxy-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907446" comment="python-libproxy-0.4.13-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907447" comment="python3-libproxy-0.4.13-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248649" version="1" class="patch">
	<metadata>
		<title>plasma5-desktop-5.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<description>
These are all security issues fixed in the plasma5-desktop-5.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8651">CVE-2014-8651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907448" comment="plasma5-desktop-5.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907449" comment="plasma5-desktop-lang-5.8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248650" version="1" class="patch">
	<metadata>
		<title>lynx-2.8.8rel.2-4.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4690" ref_url="https://www.suse.com/security/cve/CVE-2008-4690/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the lynx-2.8.8rel.2-4.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4690/">CVE-2008-4690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4690">CVE-2008-4690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907450" comment="lynx-2.8.8rel.2-4.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248651" version="1" class="patch">
	<metadata>
		<title>munin-2.0.25-4.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2147" ref_url="https://www.suse.com/security/cve/CVE-2012-2147/" source="CVE"/>
		<reference ref_id="CVE-2013-6048" ref_url="https://www.suse.com/security/cve/CVE-2013-6048/" source="CVE"/>
		<reference ref_id="CVE-2013-6359" ref_url="https://www.suse.com/security/cve/CVE-2013-6359/" source="CVE"/>
		<description>
These are all security issues fixed in the munin-2.0.25-4.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2147/">CVE-2012-2147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2147">CVE-2012-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6048/">CVE-2013-6048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6048">CVE-2013-6048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6359/">CVE-2013-6359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6359">CVE-2013-6359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907451" comment="munin-2.0.25-4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907452" comment="munin-node-2.0.25-4.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248652" version="1" class="patch">
	<metadata>
		<title>libjansson-devel-2.7-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson-devel-2.7-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6401">CVE-2013-6401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907453" comment="libjansson-devel-2.7-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907454" comment="libjansson4-2.7-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907455" comment="libjansson4-32bit-2.7-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248653" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<reference ref_id="CVE-2014-7818" ref_url="https://www.suse.com/security/cve/CVE-2014-7818/" source="CVE"/>
		<reference ref_id="CVE-2014-7829" ref_url="https://www.suse.com/security/cve/CVE-2014-7829/" source="CVE"/>
		<reference ref_id="CVE-2016-2098" ref_url="https://www.suse.com/security/cve/CVE-2016-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4671">CVE-2014-4671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7818/">CVE-2014-7818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7818">CVE-2014-7818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7829/">CVE-2014-7829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7829">CVE-2014-7829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2098/">CVE-2016-2098 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2098">CVE-2016-2098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907456" comment="ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907457" comment="ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907458" comment="ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907459" comment="ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907460" comment="ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907461" comment="ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907462" comment="ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907463" comment="ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248654" version="1" class="patch">
	<metadata>
		<title>pwgen-2.07-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4440" ref_url="https://www.suse.com/security/cve/CVE-2013-4440/" source="CVE"/>
		<reference ref_id="CVE-2013-4442" ref_url="https://www.suse.com/security/cve/CVE-2013-4442/" source="CVE"/>
		<description>
These are all security issues fixed in the pwgen-2.07-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4440/">CVE-2013-4440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4440">CVE-2013-4440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4442/">CVE-2013-4442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4442">CVE-2013-4442 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907464" comment="pwgen-2.07-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248655" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907465" comment="cifs-utils-6.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907466" comment="cifs-utils-devel-6.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907467" comment="pam_cifscreds-6.5-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248656" version="1" class="patch">
	<metadata>
		<title>libXxf86dga-devel-1.1.4-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga-devel-1.1.4-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907468" comment="libXxf86dga-devel-1.1.4-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907469" comment="libXxf86dga-devel-32bit-1.1.4-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907470" comment="libXxf86dga1-1.1.4-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907471" comment="libXxf86dga1-32bit-1.1.4-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248657" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-5.6.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-2141" ref_url="https://www.suse.com/security/cve/CVE-2015-2141/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-5.6.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2141/">CVE-2015-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2141">CVE-2015-2141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907472" comment="libcryptopp-devel-5.6.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907473" comment="libcryptopp-devel-static-5.6.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907474" comment="libcryptopp5_6-5.6.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907475" comment="libcryptopp5_6-32bit-5.6.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248658" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-243.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-243.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0848">CVE-2015-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4588">CVE-2015-4588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4695">CVE-2015-4695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4696">CVE-2015-4696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907476" comment="libwmf-0_2-7-0.2.8.4-243.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907477" comment="libwmf-0_2-7-32bit-0.2.8.4-243.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907478" comment="libwmf-devel-0.2.8.4-243.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907479" comment="libwmf-gnome-0.2.8.4-243.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907480" comment="libwmf-gnome-32bit-0.2.8.4-243.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907481" comment="libwmf-tools-0.2.8.4-243.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248659" version="1" class="patch">
	<metadata>
		<title>gnuchess-6.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8972" ref_url="https://www.suse.com/security/cve/CVE-2015-8972/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuchess-6.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8972/">CVE-2015-8972 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8972">CVE-2015-8972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907482" comment="gnuchess-6.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248660" version="1" class="patch">
	<metadata>
		<title>libhogweed4-3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed4-3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907483" comment="libhogweed4-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907484" comment="libhogweed4-32bit-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907485" comment="libnettle-devel-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907486" comment="libnettle-devel-32bit-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907487" comment="libnettle6-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907488" comment="libnettle6-32bit-3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907489" comment="nettle-3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248661" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-19.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-19.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907490" comment="lcms-1.19-19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907491" comment="liblcms-devel-1.19-19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907492" comment="liblcms-devel-32bit-1.19-19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907493" comment="liblcms1-1.19-19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907494" comment="liblcms1-32bit-1.19-19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907495" comment="python-lcms-1.19-19.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248662" version="1" class="patch">
	<metadata>
		<title>mosh-1.2.5-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2385" ref_url="https://www.suse.com/security/cve/CVE-2012-2385/" source="CVE"/>
		<description>
These are all security issues fixed in the mosh-1.2.5-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2385/">CVE-2012-2385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2385">CVE-2012-2385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907496" comment="mosh-1.2.5-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248663" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-devel-0.9.10-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-devel-0.9.10-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907497" comment="LibVNCServer-devel-0.9.10-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907498" comment="liblzo2-2-2.09-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907499" comment="liblzo2-2-32bit-2.09-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907500" comment="libvncclient0-0.9.10-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907501" comment="libvncserver0-0.9.10-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907502" comment="lzo-devel-2.09-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907503" comment="lzo-devel-32bit-2.09-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907504" comment="lzo-devel-static-2.09-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248664" version="1" class="patch">
	<metadata>
		<title>libgadu-devel-1.12.1-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu-devel-1.12.1-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6487">CVE-2013-6487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3775">CVE-2014-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907505" comment="libgadu-devel-1.12.1-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907506" comment="libgadu3-1.12.1-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248665" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php5-5.6.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4718" ref_url="https://www.suse.com/security/cve/CVE-2011-4718/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-1824" ref_url="https://www.suse.com/security/cve/CVE-2013-1824/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2013-7327" ref_url="https://www.suse.com/security/cve/CVE-2013-7327/" source="CVE"/>
		<reference ref_id="CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345/" source="CVE"/>
		<reference ref_id="CVE-2014-0185" ref_url="https://www.suse.com/security/cve/CVE-2014-0185/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-1943" ref_url="https://www.suse.com/security/cve/CVE-2014-1943/" source="CVE"/>
		<reference ref_id="CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-5120" ref_url="https://www.suse.com/security/cve/CVE-2014-5120/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php5-5.6.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4718/">CVE-2011-4718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4718">CVE-2011-4718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1824/">CVE-2013-1824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1824">CVE-2013-1824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7327/">CVE-2013-7327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7327">CVE-2013-7327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0185/">CVE-2014-0185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0185">CVE-2014-0185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1943/">CVE-2014-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1943">CVE-2014-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2270">CVE-2014-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3622">CVE-2014-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5120/">CVE-2014-5120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5120">CVE-2014-5120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9426">CVE-2014-9426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9427">CVE-2014-9427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1351">CVE-2015-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1352">CVE-2015-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907507" comment="apache2-mod_php5-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907508" comment="php5-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907509" comment="php5-bcmath-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907510" comment="php5-bz2-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907511" comment="php5-calendar-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907512" comment="php5-ctype-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907513" comment="php5-curl-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907514" comment="php5-dba-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907515" comment="php5-devel-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907516" comment="php5-dom-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907517" comment="php5-enchant-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907518" comment="php5-exif-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907519" comment="php5-fastcgi-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907520" comment="php5-fileinfo-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907521" comment="php5-firebird-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907522" comment="php5-fpm-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907523" comment="php5-ftp-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907524" comment="php5-gd-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907525" comment="php5-gettext-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907526" comment="php5-gmp-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907527" comment="php5-iconv-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907528" comment="php5-imap-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907529" comment="php5-intl-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907530" comment="php5-json-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907531" comment="php5-ldap-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907532" comment="php5-mbstring-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907533" comment="php5-mcrypt-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907534" comment="php5-mssql-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907535" comment="php5-mysql-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907536" comment="php5-odbc-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907537" comment="php5-opcache-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907538" comment="php5-openssl-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907539" comment="php5-pcntl-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907540" comment="php5-pdo-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907541" comment="php5-pear-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907542" comment="php5-pear-Archive_Tar-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907543" comment="php5-pgsql-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907544" comment="php5-phar-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907545" comment="php5-posix-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907546" comment="php5-pspell-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907547" comment="php5-readline-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907548" comment="php5-shmop-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907549" comment="php5-snmp-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907550" comment="php5-soap-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907551" comment="php5-sockets-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907552" comment="php5-sqlite-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907553" comment="php5-suhosin-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907554" comment="php5-sysvmsg-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907555" comment="php5-sysvsem-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907556" comment="php5-sysvshm-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907557" comment="php5-tidy-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907558" comment="php5-tokenizer-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907559" comment="php5-wddx-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907560" comment="php5-xmlreader-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907561" comment="php5-xmlrpc-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907562" comment="php5-xmlwriter-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907563" comment="php5-xsl-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907564" comment="php5-zip-5.6.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907565" comment="php5-zlib-5.6.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248666" version="1" class="patch">
	<metadata>
		<title>chrony-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4502" ref_url="https://www.suse.com/security/cve/CVE-2012-4502/" source="CVE"/>
		<reference ref_id="CVE-2012-4503" ref_url="https://www.suse.com/security/cve/CVE-2012-4503/" source="CVE"/>
		<reference ref_id="CVE-2014-0021" ref_url="https://www.suse.com/security/cve/CVE-2014-0021/" source="CVE"/>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4502/">CVE-2012-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4502">CVE-2012-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4503/">CVE-2012-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4503">CVE-2012-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0021/">CVE-2014-0021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0021">CVE-2014-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1567">CVE-2016-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907566" comment="chrony-2.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248667" version="1" class="patch">
	<metadata>
		<title>python-pycrypto-2.6.1-4.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2417" ref_url="https://www.suse.com/security/cve/CVE-2012-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-1445" ref_url="https://www.suse.com/security/cve/CVE-2013-1445/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pycrypto-2.6.1-4.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2417/">CVE-2012-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2417">CVE-2012-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1445/">CVE-2013-1445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1445">CVE-2013-1445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907567" comment="python-pycrypto-2.6.1-4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907568" comment="python3-pycrypto-2.6.1-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248668" version="1" class="patch">
	<metadata>
		<title>SuSEfirewall2-fail2ban-0.9.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5023" ref_url="https://www.suse.com/security/cve/CVE-2009-5023/" source="CVE"/>
		<reference ref_id="CVE-2013-2178" ref_url="https://www.suse.com/security/cve/CVE-2013-2178/" source="CVE"/>
		<reference ref_id="CVE-2013-7176" ref_url="https://www.suse.com/security/cve/CVE-2013-7176/" source="CVE"/>
		<reference ref_id="CVE-2013-7177" ref_url="https://www.suse.com/security/cve/CVE-2013-7177/" source="CVE"/>
		<description>
These are all security issues fixed in the SuSEfirewall2-fail2ban-0.9.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5023/">CVE-2009-5023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5023">CVE-2009-5023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2178/">CVE-2013-2178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2178">CVE-2013-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7176/">CVE-2013-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7176">CVE-2013-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7177/">CVE-2013-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7177">CVE-2013-7177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907569" comment="SuSEfirewall2-fail2ban-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907570" comment="fail2ban-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907571" comment="nagios-plugins-fail2ban-0.9.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248669" version="1" class="patch">
	<metadata>
		<title>fish-2.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2905" ref_url="https://www.suse.com/security/cve/CVE-2014-2905/" source="CVE"/>
		<reference ref_id="CVE-2014-2906" ref_url="https://www.suse.com/security/cve/CVE-2014-2906/" source="CVE"/>
		<reference ref_id="CVE-2014-2914" ref_url="https://www.suse.com/security/cve/CVE-2014-2914/" source="CVE"/>
		<reference ref_id="CVE-2014-3219" ref_url="https://www.suse.com/security/cve/CVE-2014-3219/" source="CVE"/>
		<reference ref_id="CVE-2014-3856" ref_url="https://www.suse.com/security/cve/CVE-2014-3856/" source="CVE"/>
		<description>
These are all security issues fixed in the fish-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2905/">CVE-2014-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2905">CVE-2014-2905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2906/">CVE-2014-2906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2906">CVE-2014-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2914/">CVE-2014-2914 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2914">CVE-2014-2914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3219/">CVE-2014-3219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3219">CVE-2014-3219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3856/">CVE-2014-3856 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3856">CVE-2014-3856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907572" comment="fish-2.4.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248670" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-13.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-13.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907573" comment="tftp-5.2-13.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248671" version="1" class="patch">
	<metadata>
		<title>trojita-0.7-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2567" ref_url="https://www.suse.com/security/cve/CVE-2014-2567/" source="CVE"/>
		<description>
These are all security issues fixed in the trojita-0.7-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2567/">CVE-2014-2567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2567">CVE-2014-2567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907574" comment="trojita-0.7-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248672" version="1" class="patch">
	<metadata>
		<title>pngcrush-1.7.92-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7700" ref_url="https://www.suse.com/security/cve/CVE-2015-7700/" source="CVE"/>
		<description>
These are all security issues fixed in the pngcrush-1.7.92-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7700/">CVE-2015-7700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7700">CVE-2015-7700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907575" comment="pngcrush-1.7.92-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248673" version="1" class="patch">
	<metadata>
		<title>kdegraphics3-3.5.10-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0146" ref_url="https://www.suse.com/security/cve/CVE-2009-0146/" source="CVE"/>
		<reference ref_id="CVE-2009-3603" ref_url="https://www.suse.com/security/cve/CVE-2009-3603/" source="CVE"/>
		<description>
These are all security issues fixed in the kdegraphics3-3.5.10-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0146/">CVE-2009-0146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0146">CVE-2009-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3603/">CVE-2009-3603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3603">CVE-2009-3603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907576" comment="kdegraphics3-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907577" comment="kdegraphics3-3D-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907578" comment="kdegraphics3-devel-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907579" comment="kdegraphics3-extra-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907580" comment="kdegraphics3-fax-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907581" comment="kdegraphics3-imaging-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907582" comment="kdegraphics3-kamera-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907583" comment="kdegraphics3-pdf-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907584" comment="kdegraphics3-postscript-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907585" comment="kdegraphics3-scan-3.5.10-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907586" comment="kdegraphics3-tex-3.5.10-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248674" version="1" class="patch">
	<metadata>
		<title>gnump3d-3.0-103.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6130" ref_url="https://www.suse.com/security/cve/CVE-2007-6130/" source="CVE"/>
		<description>
These are all security issues fixed in the gnump3d-3.0-103.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6130/">CVE-2007-6130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6130">CVE-2007-6130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907587" comment="gnump3d-3.0-103.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248675" version="1" class="patch">
	<metadata>
		<title>libthunarx-2-0-1.6.10-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1588" ref_url="https://www.suse.com/security/cve/CVE-2011-1588/" source="CVE"/>
		<description>
These are all security issues fixed in the libthunarx-2-0-1.6.10-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1588/">CVE-2011-1588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1588">CVE-2011-1588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907588" comment="libthunarx-2-0-1.6.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907589" comment="thunar-1.6.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907590" comment="thunar-devel-1.6.10-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907591" comment="thunar-lang-1.6.10-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248676" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4012">CVE-2009-4012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907592" comment="libthai-data-0.1.25-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907593" comment="libthai-devel-0.1.25-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907594" comment="libthai0-0.1.25-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907595" comment="libthai0-32bit-0.1.25-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248677" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1174">CVE-2012-1174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7510">CVE-2015-7510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907596" comment="libsystemd0-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907597" comment="libsystemd0-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907598" comment="libsystemd0-mini-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907599" comment="libudev-devel-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907600" comment="libudev-devel-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907601" comment="libudev1-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907602" comment="libudev1-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907603" comment="nss-myhostname-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907604" comment="nss-myhostname-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907605" comment="nss-mymachines-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907606" comment="nss-mymachines-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907607" comment="systemd-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907608" comment="systemd-32bit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907609" comment="systemd-bash-completion-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907610" comment="systemd-devel-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907611" comment="systemd-journal-remote-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907612" comment="systemd-logger-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907613" comment="systemd-mini-bash-completion-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907614" comment="systemd-sysvinit-228-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907615" comment="udev-228-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248678" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.5.1-40.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.5.1-40.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9092">CVE-2014-9092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907616" comment="libjpeg-turbo-1.5.1-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907617" comment="libjpeg62-62.2.0-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907618" comment="libjpeg62-32bit-62.2.0-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907619" comment="libjpeg62-devel-62.2.0-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907620" comment="libjpeg62-devel-32bit-62.2.0-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907621" comment="libjpeg62-turbo-1.5.1-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907622" comment="libjpeg8-8.1.2-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907623" comment="libjpeg8-32bit-8.1.2-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907624" comment="libjpeg8-devel-8.1.2-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907625" comment="libjpeg8-devel-32bit-8.1.2-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907626" comment="libturbojpeg0-8.1.2-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907627" comment="libturbojpeg0-32bit-8.1.2-40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248679" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3.P1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2156">CVE-2010-2156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3611">CVE-2010-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3616">CVE-2010-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0413">CVE-2011-0413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907628" comment="dhcp-4.3.3.P1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907629" comment="dhcp-client-4.3.3.P1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907630" comment="dhcp-devel-4.3.3.P1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907631" comment="dhcp-doc-4.3.3.P1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907632" comment="dhcp-relay-4.3.3.P1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907633" comment="dhcp-server-4.3.3.P1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248680" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.5-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.5-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907634" comment="cracklib-2.9.5-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907635" comment="cracklib-devel-2.9.5-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907636" comment="cracklib-devel-32bit-2.9.5-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907637" comment="cracklib-dict-small-2.9.5-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907638" comment="libcrack2-2.9.5-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907639" comment="libcrack2-32bit-2.9.5-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248681" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp0-0.49.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp0-0.49.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1788">CVE-2013-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1789">CVE-2013-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4473">CVE-2013-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4474">CVE-2013-4474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907640" comment="libpoppler-cpp0-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907641" comment="libpoppler-cpp0-32bit-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907642" comment="libpoppler-devel-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907643" comment="libpoppler-glib-devel-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907644" comment="libpoppler-glib8-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907645" comment="libpoppler-glib8-32bit-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907646" comment="libpoppler-qt4-4-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907647" comment="libpoppler-qt4-4-32bit-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907648" comment="libpoppler-qt4-devel-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907649" comment="libpoppler-qt5-1-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907650" comment="libpoppler-qt5-1-32bit-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907651" comment="libpoppler-qt5-devel-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907652" comment="libpoppler65-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907653" comment="libpoppler65-32bit-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907654" comment="poppler-tools-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907655" comment="typelib-1_0-Poppler-0_18-0.49.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248682" version="1" class="patch">
	<metadata>
		<title>python3-Django-1.10.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2512" ref_url="https://www.suse.com/security/cve/CVE-2016-2512/" source="CVE"/>
		<reference ref_id="CVE-2016-2513" ref_url="https://www.suse.com/security/cve/CVE-2016-2513/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Django-1.10.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2512/">CVE-2016-2512 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2512">CVE-2016-2512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2513/">CVE-2016-2513 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2513">CVE-2016-2513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907656" comment="python3-Django-1.10.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248683" version="1" class="patch">
	<metadata>
		<title>libospf0-1.0.20160315-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>
These are all security issues fixed in the libospf0-1.0.20160315-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2236">CVE-2013-2236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2342">CVE-2016-2342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4049">CVE-2016-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907657" comment="libospf0-1.0.20160315-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907658" comment="libospfapiclient0-1.0.20160315-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907659" comment="libzebra0-1.0.20160315-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907660" comment="quagga-1.0.20160315-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907661" comment="quagga-devel-1.0.20160315-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248684" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2244">CVE-2010-2244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1002">CVE-2011-1002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907662" comment="avahi-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907663" comment="avahi-autoipd-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907664" comment="avahi-compat-howl-devel-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907665" comment="avahi-compat-mDNSResponder-devel-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907666" comment="avahi-lang-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907667" comment="avahi-utils-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907668" comment="libavahi-client3-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907669" comment="libavahi-client3-32bit-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907670" comment="libavahi-common3-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907671" comment="libavahi-common3-32bit-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907672" comment="libavahi-core7-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907673" comment="libavahi-devel-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907674" comment="libdns_sd-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907675" comment="libdns_sd-32bit-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907676" comment="libhowl0-0.6.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907677" comment="python-avahi-0.6.32-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248685" version="1" class="patch">
	<metadata>
		<title>cecilia-2.0.5-282.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1832" ref_url="https://www.suse.com/security/cve/CVE-2008-1832/" source="CVE"/>
		<description>
These are all security issues fixed in the cecilia-2.0.5-282.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1832/">CVE-2008-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1832">CVE-2008-1832 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907678" comment="cecilia-2.0.5-282.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248686" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.5-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.5-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2800">CVE-2010-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2801">CVE-2010-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907679" comment="libmspack-devel-0.5-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907680" comment="libmspack0-0.5-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907681" comment="libmspack0-32bit-0.5-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248687" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.22.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.22.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4000">CVE-2010-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907682" comment="gnome-shell-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907683" comment="gnome-shell-browser-plugin-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907684" comment="gnome-shell-calendar-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907685" comment="gnome-shell-devel-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907686" comment="gnome-shell-lang-3.22.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248688" version="1" class="patch">
	<metadata>
		<title>augeas-1.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907687" comment="augeas-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907688" comment="augeas-devel-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907689" comment="augeas-devel-32bit-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907690" comment="augeas-lense-tests-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907691" comment="augeas-lenses-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907692" comment="libaugeas0-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907693" comment="libaugeas0-32bit-1.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248689" version="1" class="patch">
	<metadata>
		<title>libuser-0.60-5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5630" ref_url="https://www.suse.com/security/cve/CVE-2012-5630/" source="CVE"/>
		<reference ref_id="CVE-2012-5644" ref_url="https://www.suse.com/security/cve/CVE-2012-5644/" source="CVE"/>
		<description>
These are all security issues fixed in the libuser-0.60-5.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5630/">CVE-2012-5630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5630">CVE-2012-5630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5644/">CVE-2012-5644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5644">CVE-2012-5644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907694" comment="libuser-0.60-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907695" comment="libuser-devel-0.60-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907696" comment="libuser-lang-0.60-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907697" comment="libuser-python-0.60-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907698" comment="libuser1-0.60-5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248690" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.72-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.72-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907699" comment="perl-HTML-Parser-3.72-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248691" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.5.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9494" ref_url="https://www.suse.com/security/cve/CVE-2014-9494/" source="CVE"/>
		<reference ref_id="CVE-2015-0862" ref_url="https://www.suse.com/security/cve/CVE-2015-0862/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.5.4-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9494/">CVE-2014-9494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9494">CVE-2014-9494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0862/">CVE-2015-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0862">CVE-2015-0862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907700" comment="erlang-rabbitmq-client-3.5.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907701" comment="rabbitmq-server-3.5.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907702" comment="rabbitmq-server-plugins-3.5.4-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248692" version="1" class="patch">
	<metadata>
		<title>socat-1.7.3.1-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.3.1-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907703" comment="socat-1.7.3.1-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248693" version="1" class="patch">
	<metadata>
		<title>checkbashisms-2.15.1-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2240" ref_url="https://www.suse.com/security/cve/CVE-2012-2240/" source="CVE"/>
		<reference ref_id="CVE-2012-2241" ref_url="https://www.suse.com/security/cve/CVE-2012-2241/" source="CVE"/>
		<reference ref_id="CVE-2012-3500" ref_url="https://www.suse.com/security/cve/CVE-2012-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the checkbashisms-2.15.1-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2240/">CVE-2012-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2240">CVE-2012-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2241/">CVE-2012-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2241">CVE-2012-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3500/">CVE-2012-3500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3500">CVE-2012-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907704" comment="checkbashisms-2.15.1-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907705" comment="devscripts-2.15.1-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248694" version="1" class="patch">
	<metadata>
		<title>iproxy-1.0.10-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the iproxy-1.0.10-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907706" comment="iproxy-1.0.10-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907707" comment="libusbmuxd-devel-1.0.10-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907708" comment="libusbmuxd4-1.0.10-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907709" comment="libusbmuxd4-32bit-1.0.10-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248695" version="1" class="patch">
	<metadata>
		<title>putty-0.67-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4852" ref_url="https://www.suse.com/security/cve/CVE-2013-4852/" source="CVE"/>
		<reference ref_id="CVE-2015-2157" ref_url="https://www.suse.com/security/cve/CVE-2015-2157/" source="CVE"/>
		<reference ref_id="CVE-2015-5309" ref_url="https://www.suse.com/security/cve/CVE-2015-5309/" source="CVE"/>
		<description>
These are all security issues fixed in the putty-0.67-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4852/">CVE-2013-4852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4852">CVE-2013-4852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2157/">CVE-2015-2157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2157">CVE-2015-2157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5309/">CVE-2015-5309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5309">CVE-2015-5309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907710" comment="putty-0.67-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248696" version="1" class="patch">
	<metadata>
		<title>almanah-0.11.1-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1853" ref_url="https://www.suse.com/security/cve/CVE-2013-1853/" source="CVE"/>
		<description>
These are all security issues fixed in the almanah-0.11.1-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1853/">CVE-2013-1853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1853">CVE-2013-1853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907711" comment="almanah-0.11.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907712" comment="almanah-lang-0.11.1-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248697" version="1" class="patch">
	<metadata>
		<title>libXi-devel-1.7.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi-devel-1.7.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907713" comment="libXi-devel-1.7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907714" comment="libXi-devel-32bit-1.7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907715" comment="libXi6-1.7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907716" comment="libXi6-32bit-1.7.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248698" version="1" class="patch">
	<metadata>
		<title>python3-jupyter_notebook-4.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6524" ref_url="https://www.suse.com/security/cve/CVE-2016-6524/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-jupyter_notebook-4.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6524/">CVE-2016-6524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-6524">CVE-2016-6524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907717" comment="python3-jupyter_notebook-4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907718" comment="python3-jupyter_notebook-doc-4.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248699" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.5-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.5-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907719" comment="fuse-2.9.5-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907720" comment="fuse-devel-2.9.5-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907721" comment="fuse-devel-static-2.9.5-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907722" comment="libfuse2-2.9.5-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907723" comment="libfuse2-32bit-2.9.5-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907724" comment="libulockmgr1-2.9.5-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248700" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-1.112 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-1.112 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1196">CVE-2015-1196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907725" comment="patch-2.7.5-1.112 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248701" version="1" class="patch">
	<metadata>
		<title>lftp-4.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907726" comment="lftp-4.7.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248702" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-8.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-8.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907727" comment="apache-commons-httpclient-3.1-8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907728" comment="apache-commons-httpclient-demo-3.1-8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907729" comment="apache-commons-httpclient-javadoc-3.1-8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907730" comment="apache-commons-httpclient-manual-3.1-8.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248703" version="1" class="patch">
	<metadata>
		<title>tar-1.29-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.29-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907731" comment="tar-1.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907732" comment="tar-backup-scripts-1.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907733" comment="tar-lang-1.29-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907734" comment="tar-tests-1.29-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248704" version="1" class="patch">
	<metadata>
		<title>empathy-3.12.12-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.12.12-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3635">CVE-2011-3635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907735" comment="empathy-3.12.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907736" comment="empathy-lang-3.12.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907737" comment="telepathy-mission-control-plugin-goa-3.12.12-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248705" version="1" class="patch">
	<metadata>
		<title>cronic-3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3992" ref_url="https://www.suse.com/security/cve/CVE-2016-3992/" source="CVE"/>
		<description>
These are all security issues fixed in the cronic-3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3992/">CVE-2016-3992 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3992">CVE-2016-3992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907738" comment="cronic-3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248706" version="1" class="patch">
	<metadata>
		<title>ncompress-4.2.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1168" ref_url="https://www.suse.com/security/cve/CVE-2006-1168/" source="CVE"/>
		<description>
These are all security issues fixed in the ncompress-4.2.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1168/">CVE-2006-1168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1168">CVE-2006-1168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907739" comment="ncompress-4.2.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248707" version="1" class="patch">
	<metadata>
		<title>flatpak-0.6.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8659" ref_url="https://www.suse.com/security/cve/CVE-2016-8659/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-0.6.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8659/">CVE-2016-8659 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8659">CVE-2016-8659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907740" comment="flatpak-0.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907741" comment="flatpak-builder-0.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907742" comment="flatpak-devel-0.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907743" comment="libflatpak0-0.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907744" comment="typelib-1_0-Flatpak-1_0-0.6.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248708" version="1" class="patch">
	<metadata>
		<title>FastCGI-2.4.0-171.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2766" ref_url="https://www.suse.com/security/cve/CVE-2011-2766/" source="CVE"/>
		<description>
These are all security issues fixed in the FastCGI-2.4.0-171.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2766/">CVE-2011-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2766">CVE-2011-2766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907745" comment="FastCGI-2.4.0-171.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907746" comment="FastCGI-devel-2.4.0-171.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907747" comment="libfcgi0-2.4.0-171.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907748" comment="perl-CGI-4.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907749" comment="perl-FastCGI-2.4.0-171.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248709" version="1" class="patch">
	<metadata>
		<title>postfixadmin-3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0811" ref_url="https://www.suse.com/security/cve/CVE-2012-0811/" source="CVE"/>
		<reference ref_id="CVE-2012-0812" ref_url="https://www.suse.com/security/cve/CVE-2012-0812/" source="CVE"/>
		<reference ref_id="CVE-2014-2655" ref_url="https://www.suse.com/security/cve/CVE-2014-2655/" source="CVE"/>
		<description>
These are all security issues fixed in the postfixadmin-3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0811/">CVE-2012-0811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0811">CVE-2012-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0812/">CVE-2012-0812 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0812">CVE-2012-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2655/">CVE-2014-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2655">CVE-2014-2655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907750" comment="postfixadmin-3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248710" version="1" class="patch">
	<metadata>
		<title>guile-2.0.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="CVE-2016-8606" ref_url="https://www.suse.com/security/cve/CVE-2016-8606/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-2.0.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8606/">CVE-2016-8606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8606">CVE-2016-8606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907751" comment="guile-2.0.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907752" comment="guile-devel-2.0.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907753" comment="guile-modules-2_0-2.0.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907754" comment="libguile-2_0-22-2.0.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907755" comment="libguilereadline-v-18-18-2.0.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248711" version="1" class="patch">
	<metadata>
		<title>coreutils-8.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907756" comment="coreutils-8.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907757" comment="coreutils-lang-8.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907758" comment="coreutils-testsuite-8.26-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248712" version="1" class="patch">
	<metadata>
		<title>libcgroup-devel-0.41-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup-devel-0.41-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907759" comment="libcgroup-devel-0.41-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907760" comment="libcgroup-tools-0.41-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907761" comment="libcgroup1-0.41-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907762" comment="libcgroup1-32bit-0.41-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248713" version="1" class="patch">
	<metadata>
		<title>tkimg-1.4-5.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0553" ref_url="https://www.suse.com/security/cve/CVE-2008-0553/" source="CVE"/>
		<description>
These are all security issues fixed in the tkimg-1.4-5.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0553/">CVE-2008-0553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0553">CVE-2008-0553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907763" comment="tkimg-1.4-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907764" comment="tkimg-devel-1.4-5.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248714" version="1" class="patch">
	<metadata>
		<title>libspice-server-devel-0.12.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server-devel-0.12.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907765" comment="libspice-server-devel-0.12.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907766" comment="libspice-server1-0.12.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907767" comment="spice-client-0.12.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248715" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-89.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-3365" ref_url="https://www.suse.com/security/cve/CVE-2011-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-2074" ref_url="https://www.suse.com/security/cve/CVE-2013-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-89.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0689">CVE-2009-0689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3365/">CVE-2011-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3365">CVE-2011-3365 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-2074/">CVE-2013-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2074">CVE-2013-2074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907768" comment="kdelibs3-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907769" comment="kdelibs3-32bit-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907770" comment="kdelibs3-arts-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907771" comment="kdelibs3-arts-32bit-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907772" comment="kdelibs3-default-style-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907773" comment="kdelibs3-default-style-32bit-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907774" comment="kdelibs3-devel-3.5.10-89.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907775" comment="kdelibs3-doc-3.5.10-89.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248716" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907776" comment="libX11-6-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907777" comment="libX11-6-32bit-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907778" comment="libX11-data-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907779" comment="libX11-devel-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907780" comment="libX11-devel-32bit-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907781" comment="libX11-xcb1-1.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907782" comment="libX11-xcb1-32bit-1.6.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248717" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.7.4-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.7.4-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8768">CVE-2014-8768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2155">CVE-2015-2155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3138">CVE-2015-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907783" comment="tcpdump-4.7.4-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248718" version="1" class="patch">
	<metadata>
		<title>nagstamon-2.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4114" ref_url="https://www.suse.com/security/cve/CVE-2013-4114/" source="CVE"/>
		<description>
These are all security issues fixed in the nagstamon-2.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4114/">CVE-2013-4114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4114">CVE-2013-4114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907784" comment="nagstamon-2.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248719" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.22.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.22.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0240">CVE-2013-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1799">CVE-2013-1799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907785" comment="gnome-online-accounts-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907786" comment="gnome-online-accounts-devel-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907787" comment="gnome-online-accounts-lang-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907788" comment="libgoa-1_0-0-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907789" comment="libgoa-1_0-0-32bit-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907790" comment="libgoa-backend-1_0-1-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907791" comment="libgoa-backend-1_0-1-32bit-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907792" comment="typelib-1_0-Goa-1_0-3.22.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248720" version="1" class="patch">
	<metadata>
		<title>filezilla-3.23.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4206" ref_url="https://www.suse.com/security/cve/CVE-2013-4206/" source="CVE"/>
		<reference ref_id="CVE-2013-4207" ref_url="https://www.suse.com/security/cve/CVE-2013-4207/" source="CVE"/>
		<reference ref_id="CVE-2013-4208" ref_url="https://www.suse.com/security/cve/CVE-2013-4208/" source="CVE"/>
		<reference ref_id="CVE-2013-4852" ref_url="https://www.suse.com/security/cve/CVE-2013-4852/" source="CVE"/>
		<description>
These are all security issues fixed in the filezilla-3.23.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4206/">CVE-2013-4206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4206">CVE-2013-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4207/">CVE-2013-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4207">CVE-2013-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4208/">CVE-2013-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4208">CVE-2013-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4852/">CVE-2013-4852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4852">CVE-2013-4852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907793" comment="filezilla-3.23.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907794" comment="filezilla-lang-3.23.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248721" version="1" class="patch">
	<metadata>
		<title>python-logilab-common-1.0.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1838" ref_url="https://www.suse.com/security/cve/CVE-2014-1838/" source="CVE"/>
		<reference ref_id="CVE-2014-1839" ref_url="https://www.suse.com/security/cve/CVE-2014-1839/" source="CVE"/>
		<description>
These are all security issues fixed in the python-logilab-common-1.0.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1838/">CVE-2014-1838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1838">CVE-2014-1838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1839/">CVE-2014-1839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1839">CVE-2014-1839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907795" comment="python-logilab-common-1.0.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907796" comment="python3-logilab-common-1.2.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248722" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-RedCloth-4.3.2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-6684" ref_url="https://www.suse.com/security/cve/CVE-2012-6684/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-RedCloth-4.3.2-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6684/">CVE-2012-6684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6684">CVE-2012-6684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907797" comment="ruby2.2-rubygem-RedCloth-4.3.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907798" comment="ruby2.2-rubygem-RedCloth-doc-4.3.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907799" comment="ruby2.2-rubygem-RedCloth-testsuite-4.3.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907800" comment="ruby2.3-rubygem-RedCloth-4.3.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907801" comment="ruby2.3-rubygem-RedCloth-doc-4.3.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907802" comment="ruby2.3-rubygem-RedCloth-testsuite-4.3.2-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248723" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.37-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0295" ref_url="https://www.suse.com/security/cve/CVE-2010-0295/" source="CVE"/>
		<reference ref_id="CVE-2011-4362" ref_url="https://www.suse.com/security/cve/CVE-2011-4362/" source="CVE"/>
		<reference ref_id="CVE-2012-5533" ref_url="https://www.suse.com/security/cve/CVE-2012-5533/" source="CVE"/>
		<reference ref_id="CVE-2013-4508" ref_url="https://www.suse.com/security/cve/CVE-2013-4508/" source="CVE"/>
		<reference ref_id="CVE-2013-4559" ref_url="https://www.suse.com/security/cve/CVE-2013-4559/" source="CVE"/>
		<reference ref_id="CVE-2013-4560" ref_url="https://www.suse.com/security/cve/CVE-2013-4560/" source="CVE"/>
		<reference ref_id="CVE-2014-2323" ref_url="https://www.suse.com/security/cve/CVE-2014-2323/" source="CVE"/>
		<reference ref_id="CVE-2014-2324" ref_url="https://www.suse.com/security/cve/CVE-2014-2324/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.37-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0295/">CVE-2010-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0295">CVE-2010-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4362/">CVE-2011-4362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4362">CVE-2011-4362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5533/">CVE-2012-5533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5533">CVE-2012-5533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4508/">CVE-2013-4508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4508">CVE-2013-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4559/">CVE-2013-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4559">CVE-2013-4559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4560/">CVE-2013-4560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4560">CVE-2013-4560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2323/">CVE-2014-2323 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2323">CVE-2014-2323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2324/">CVE-2014-2324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2324">CVE-2014-2324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907803" comment="lighttpd-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907804" comment="lighttpd-mod_cml-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907805" comment="lighttpd-mod_geoip-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907806" comment="lighttpd-mod_magnet-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907807" comment="lighttpd-mod_mysql_vhost-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907808" comment="lighttpd-mod_rrdtool-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907809" comment="lighttpd-mod_trigger_b4_dl-1.4.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907810" comment="lighttpd-mod_webdav-1.4.37-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248724" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-12.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-12.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0688">CVE-2009-0688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907811" comment="cyrus-sasl-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907812" comment="cyrus-sasl-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907813" comment="cyrus-sasl-crammd5-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907814" comment="cyrus-sasl-crammd5-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907815" comment="cyrus-sasl-devel-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907816" comment="cyrus-sasl-devel-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907817" comment="cyrus-sasl-digestmd5-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907818" comment="cyrus-sasl-digestmd5-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907819" comment="cyrus-sasl-gs2-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907820" comment="cyrus-sasl-gssapi-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907821" comment="cyrus-sasl-gssapi-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907822" comment="cyrus-sasl-ldap-auxprop-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907823" comment="cyrus-sasl-ldap-auxprop-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907824" comment="cyrus-sasl-ntlm-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907825" comment="cyrus-sasl-otp-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907826" comment="cyrus-sasl-otp-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907827" comment="cyrus-sasl-plain-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907828" comment="cyrus-sasl-plain-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907829" comment="cyrus-sasl-saslauthd-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907830" comment="cyrus-sasl-scram-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907831" comment="cyrus-sasl-sqlauxprop-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907832" comment="cyrus-sasl-sqlauxprop-32bit-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907833" comment="libsasl2-3-2.1.26-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907834" comment="libsasl2-3-32bit-2.1.26-12.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248725" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.2-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.2-5.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907835" comment="xalan-j2-2.7.2-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907836" comment="xalan-j2-demo-2.7.2-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907837" comment="xalan-j2-manual-2.7.2-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907838" comment="xalan-j2-xsltc-2.7.2-5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248726" version="1" class="patch">
	<metadata>
		<title>pam-1.3.0-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.3.0-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3430">CVE-2010-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3431">CVE-2010-3431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3853">CVE-2010-3853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2583">CVE-2014-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907839" comment="pam-1.3.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907840" comment="pam-32bit-1.3.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907841" comment="pam-devel-1.3.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907842" comment="pam-devel-32bit-1.3.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907843" comment="pam-doc-1.3.0-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248727" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-rack-1_6-1.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-rack-1_6-1.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907844" comment="ruby2.2-rubygem-rack-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907845" comment="ruby2.2-rubygem-rack-1_6-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907846" comment="ruby2.2-rubygem-rack-doc-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907847" comment="ruby2.2-rubygem-rack-doc-1_6-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907848" comment="ruby2.2-rubygem-rack-testsuite-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907849" comment="ruby2.2-rubygem-rack-testsuite-1_6-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907850" comment="ruby2.3-rubygem-rack-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907851" comment="ruby2.3-rubygem-rack-1_6-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907852" comment="ruby2.3-rubygem-rack-doc-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907853" comment="ruby2.3-rubygem-rack-doc-1_6-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907854" comment="ruby2.3-rubygem-rack-testsuite-2.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907855" comment="ruby2.3-rubygem-rack-testsuite-1_6-1.6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248728" version="1" class="patch">
	<metadata>
		<title>glade3-catalog-vte-0.28.2-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the glade3-catalog-vte-0.28.2-22.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2738">CVE-2012-2738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907856" comment="glade3-catalog-vte-0.28.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907857" comment="libvte9-0.28.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907858" comment="python-vte-0.28.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907859" comment="vte2-devel-0.28.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907860" comment="vte2-lang-0.28.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907861" comment="vte2-tools-0.28.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248729" version="1" class="patch">
	<metadata>
		<title>udisks-1.0.5-5.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1149" ref_url="https://www.suse.com/security/cve/CVE-2010-1149/" source="CVE"/>
		<reference ref_id="CVE-2010-4661" ref_url="https://www.suse.com/security/cve/CVE-2010-4661/" source="CVE"/>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the udisks-1.0.5-5.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1149/">CVE-2010-1149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1149">CVE-2010-1149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4661/">CVE-2010-4661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4661">CVE-2010-4661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0004">CVE-2014-0004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907862" comment="udisks-1.0.5-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907863" comment="udisks-devel-1.0.5-5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248730" version="1" class="patch">
	<metadata>
		<title>jq-1.5-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8863" ref_url="https://www.suse.com/security/cve/CVE-2015-8863/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.5-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8863/">CVE-2015-8863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8863">CVE-2015-8863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907864" comment="jq-1.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907865" comment="libjq-devel-1.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907866" comment="libjq1-1.5-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248731" version="1" class="patch">
	<metadata>
		<title>yast2-3.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907867" comment="yast2-3.2.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248732" version="1" class="patch">
	<metadata>
		<title>python-keystonemiddleware-4.9.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1852" ref_url="https://www.suse.com/security/cve/CVE-2015-1852/" source="CVE"/>
		<description>
These are all security issues fixed in the python-keystonemiddleware-4.9.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1852/">CVE-2015-1852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1852">CVE-2015-1852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907868" comment="python-keystonemiddleware-4.9.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907869" comment="python-keystonemiddleware-doc-4.9.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248733" version="1" class="patch">
	<metadata>
		<title>gdm-3.22.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<reference ref_id="CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.22.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1709">CVE-2011-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7496">CVE-2015-7496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907870" comment="gdm-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907871" comment="gdm-branding-upstream-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907872" comment="gdm-devel-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907873" comment="gdm-lang-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907874" comment="gdmflexiserver-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907875" comment="libgdm1-3.22.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907876" comment="typelib-1_0-Gdm-1_0-3.22.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248734" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.4-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.4-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1145">CVE-2011-1145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907877" comment="unixODBC-2.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907878" comment="unixODBC-32bit-2.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907879" comment="unixODBC-devel-2.3.4-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248735" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.9-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.9-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907880" comment="libtasn1-4.9-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907881" comment="libtasn1-6-4.9-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907882" comment="libtasn1-6-32bit-4.9-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907883" comment="libtasn1-devel-4.9-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907884" comment="libtasn1-devel-32bit-4.9-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248736" version="1" class="patch">
	<metadata>
		<title>guile1-1.8.8-19.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the guile1-1.8.8-19.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907885" comment="guile1-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907886" comment="libguile-srfi-srfi-1-v-3-3-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907887" comment="libguile-srfi-srfi-13-14-v-3-3-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907888" comment="libguile-srfi-srfi-4-v-3-3-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907889" comment="libguile-srfi-srfi-60-v-2-2-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907890" comment="libguile1-devel-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907891" comment="libguile17-1.8.8-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907892" comment="libguilereadline-v-17-17-1.8.8-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248737" version="1" class="patch">
	<metadata>
		<title>liblxc-devel-2.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1331" ref_url="https://www.suse.com/security/cve/CVE-2015-1331/" source="CVE"/>
		<reference ref_id="CVE-2015-1334" ref_url="https://www.suse.com/security/cve/CVE-2015-1334/" source="CVE"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="CVE-2016-8649" ref_url="https://www.suse.com/security/cve/CVE-2016-8649/" source="CVE"/>
		<description>
These are all security issues fixed in the liblxc-devel-2.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1331/">CVE-2015-1331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1331">CVE-2015-1331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1334/">CVE-2015-1334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1334">CVE-2015-1334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1335">CVE-2015-1335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8649/">CVE-2016-8649 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8649">CVE-2016-8649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907893" comment="liblxc-devel-2.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907894" comment="liblxc1-2.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907895" comment="lxc-2.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248738" version="1" class="patch">
	<metadata>
		<title>libdmx-devel-1.1.3-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx-devel-1.1.3-5.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907896" comment="libdmx-devel-1.1.3-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907897" comment="libdmx-devel-32bit-1.1.3-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907898" comment="libdmx1-1.1.3-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907899" comment="libdmx1-32bit-1.1.3-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248739" version="1" class="patch">
	<metadata>
		<title>rocksndiamonds-3.3.1.2-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4606" ref_url="https://www.suse.com/security/cve/CVE-2011-4606/" source="CVE"/>
		<description>
These are all security issues fixed in the rocksndiamonds-3.3.1.2-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4606/">CVE-2011-4606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4606">CVE-2011-4606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907900" comment="rocksndiamonds-3.3.1.2-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248740" version="1" class="patch">
	<metadata>
		<title>libXt-devel-1.1.5-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt-devel-1.1.5-1.19 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907901" comment="libXt-devel-1.1.5-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907902" comment="libXt-devel-32bit-1.1.5-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907903" comment="libXt6-1.1.5-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907904" comment="libXt6-32bit-1.1.5-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248741" version="1" class="patch">
	<metadata>
		<title>bsh2-2.0.0.b6-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2510" ref_url="https://www.suse.com/security/cve/CVE-2016-2510/" source="CVE"/>
		<description>
These are all security issues fixed in the bsh2-2.0.0.b6-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2510/">CVE-2016-2510 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">CVE-2016-2510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907905" comment="bsh2-2.0.0.b6-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907906" comment="bsh2-bsf-2.0.0.b6-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907907" comment="bsh2-classgen-2.0.0.b6-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907908" comment="bsh2-demo-2.0.0.b6-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907909" comment="bsh2-javadoc-2.0.0.b6-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907910" comment="bsh2-manual-2.0.0.b6-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248742" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.33-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.33-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4425">CVE-2012-4425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907911" comment="libspice-client-glib-2_0-8-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907912" comment="libspice-client-glib-helper-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907913" comment="libspice-client-gtk-3_0-5-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907914" comment="libspice-controller0-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907915" comment="spice-gtk-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907916" comment="spice-gtk-devel-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907917" comment="spice-gtk-lang-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907918" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907919" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248743" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621/" source="CVE"/>
		<reference ref_id="CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1621">CVE-2016-1621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2464">CVE-2016-2464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907920" comment="libvpx-devel-1.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907921" comment="libvpx4-1.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907922" comment="libvpx4-32bit-1.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907923" comment="vpx-tools-1.6.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248744" version="1" class="patch">
	<metadata>
		<title>tor-0.2.8.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0427" ref_url="https://www.suse.com/security/cve/CVE-2011-0427/" source="CVE"/>
		<reference ref_id="CVE-2011-2768" ref_url="https://www.suse.com/security/cve/CVE-2011-2768/" source="CVE"/>
		<reference ref_id="CVE-2011-2769" ref_url="https://www.suse.com/security/cve/CVE-2011-2769/" source="CVE"/>
		<reference ref_id="CVE-2011-2778" ref_url="https://www.suse.com/security/cve/CVE-2011-2778/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4894" ref_url="https://www.suse.com/security/cve/CVE-2011-4894/" source="CVE"/>
		<reference ref_id="CVE-2011-4895" ref_url="https://www.suse.com/security/cve/CVE-2011-4895/" source="CVE"/>
		<reference ref_id="CVE-2011-4896" ref_url="https://www.suse.com/security/cve/CVE-2011-4896/" source="CVE"/>
		<reference ref_id="CVE-2011-4897" ref_url="https://www.suse.com/security/cve/CVE-2011-4897/" source="CVE"/>
		<reference ref_id="CVE-2012-3517" ref_url="https://www.suse.com/security/cve/CVE-2012-3517/" source="CVE"/>
		<reference ref_id="CVE-2012-3518" ref_url="https://www.suse.com/security/cve/CVE-2012-3518/" source="CVE"/>
		<reference ref_id="CVE-2012-3519" ref_url="https://www.suse.com/security/cve/CVE-2012-3519/" source="CVE"/>
		<reference ref_id="CVE-2012-4419" ref_url="https://www.suse.com/security/cve/CVE-2012-4419/" source="CVE"/>
		<reference ref_id="CVE-2012-4922" ref_url="https://www.suse.com/security/cve/CVE-2012-4922/" source="CVE"/>
		<reference ref_id="CVE-2012-5573" ref_url="https://www.suse.com/security/cve/CVE-2012-5573/" source="CVE"/>
		<reference ref_id="CVE-2013-7295" ref_url="https://www.suse.com/security/cve/CVE-2013-7295/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-5117" ref_url="https://www.suse.com/security/cve/CVE-2014-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-2688" ref_url="https://www.suse.com/security/cve/CVE-2015-2688/" source="CVE"/>
		<reference ref_id="CVE-2015-2689" ref_url="https://www.suse.com/security/cve/CVE-2015-2689/" source="CVE"/>
		<reference ref_id="CVE-2015-2928" ref_url="https://www.suse.com/security/cve/CVE-2015-2928/" source="CVE"/>
		<reference ref_id="CVE-2015-2929" ref_url="https://www.suse.com/security/cve/CVE-2015-2929/" source="CVE"/>
		<description>
These are all security issues fixed in the tor-0.2.8.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0427/">CVE-2011-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0427">CVE-2011-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2768/">CVE-2011-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2768">CVE-2011-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2769/">CVE-2011-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2769">CVE-2011-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2778/">CVE-2011-2778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2778">CVE-2011-2778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4894/">CVE-2011-4894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4894">CVE-2011-4894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4895/">CVE-2011-4895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4895">CVE-2011-4895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4896/">CVE-2011-4896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4896">CVE-2011-4896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4897/">CVE-2011-4897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4897">CVE-2011-4897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3517/">CVE-2012-3517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3517">CVE-2012-3517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3518/">CVE-2012-3518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3518">CVE-2012-3518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3519/">CVE-2012-3519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3519">CVE-2012-3519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4419/">CVE-2012-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4419">CVE-2012-4419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4922/">CVE-2012-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4922">CVE-2012-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5573/">CVE-2012-5573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5573">CVE-2012-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7295/">CVE-2013-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7295">CVE-2013-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5117/">CVE-2014-5117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5117">CVE-2014-5117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2688/">CVE-2015-2688 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2688">CVE-2015-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2689/">CVE-2015-2689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2689">CVE-2015-2689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2928/">CVE-2015-2928 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2928">CVE-2015-2928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2929/">CVE-2015-2929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2929">CVE-2015-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907924" comment="tor-0.2.8.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248745" version="1" class="patch">
	<metadata>
		<title>libXtst-devel-1.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst-devel-1.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907925" comment="libXtst-devel-1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907926" comment="libXtst-devel-32bit-1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907927" comment="libXtst6-1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907928" comment="libXtst6-32bit-1.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248746" version="1" class="patch">
	<metadata>
		<title>edje-1.18.2-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4611" ref_url="https://www.suse.com/security/cve/CVE-2014-4611/" source="CVE"/>
		<reference ref_id="CVE-2014-9762" ref_url="https://www.suse.com/security/cve/CVE-2014-9762/" source="CVE"/>
		<description>
These are all security issues fixed in the edje-1.18.2-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4611/">CVE-2014-4611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4611">CVE-2014-4611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9762/">CVE-2014-9762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9762">CVE-2014-9762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907929" comment="edje-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907930" comment="efl-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907931" comment="efl-devel-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907932" comment="efl-examples-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907933" comment="efl-testsuite-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907934" comment="elementary-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907935" comment="elementary-examples-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907936" comment="elua-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907937" comment="embryo-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907938" comment="enlightenment-theme-dark-0.21.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907939" comment="enlightenment-theme-upstream-0.21.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907940" comment="enlightenment-x-dark-icon-theme-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907941" comment="evas-generic-loaders-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907942" comment="libecore1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907943" comment="libector1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907944" comment="libedje1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907945" comment="libeet1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907946" comment="libeeze1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907947" comment="libefl1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907948" comment="libefreet1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907949" comment="libefreet_mime1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907950" comment="libefreet_trash1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907951" comment="libeina1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907952" comment="libeio1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907953" comment="libeldbus1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907954" comment="libelocation1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907955" comment="libelput1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907956" comment="libelua1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907957" comment="libembryo1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907958" comment="libemile1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907959" comment="libemotion1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907960" comment="libeo1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907961" comment="libeolian1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907962" comment="libephysics1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907963" comment="libethumb1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907964" comment="libethumb_client1-1.18.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907965" comment="libevas1-1.18.2-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248747" version="1" class="patch">
	<metadata>
		<title>libpython3_5m1_0-3.5.1-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_5m1_0-3.5.1-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907966" comment="libpython3_5m1_0-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907967" comment="libpython3_5m1_0-32bit-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907968" comment="python3-base-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907969" comment="python3-base-32bit-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907970" comment="python3-devel-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907971" comment="python3-idle-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907972" comment="python3-testsuite-3.5.1-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907973" comment="python3-tools-3.5.1-3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248748" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-1.14.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<reference ref_id="CVE-2014-0249" ref_url="https://www.suse.com/security/cve/CVE-2014-0249/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-1.14.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0219">CVE-2013-0219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0220">CVE-2013-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0287">CVE-2013-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0249/">CVE-2014-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0249">CVE-2014-0249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009907974" comment="libipa_hbac-devel-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907975" comment="libipa_hbac0-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907976" comment="libnfsidmap-sss-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907977" comment="libsss_idmap-devel-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907978" comment="libsss_idmap0-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907979" comment="libsss_nss_idmap-devel-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907980" comment="libsss_nss_idmap0-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907981" comment="libsss_simpleifp-devel-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907982" comment="libsss_simpleifp0-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907983" comment="python-ipa_hbac-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907984" comment="python-sss-murmur-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907985" comment="python-sss_nss_idmap-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907986" comment="python-sssd-config-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907987" comment="python3-ipa_hbac-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907988" comment="python3-sss-murmur-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907989" comment="python3-sss_nss_idmap-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907990" comment="python3-sssd-config-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907991" comment="sssd-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907992" comment="sssd-32bit-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907993" comment="sssd-ad-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907994" comment="sssd-dbus-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907995" comment="sssd-ipa-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907996" comment="sssd-krb5-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907997" comment="sssd-krb5-common-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907998" comment="sssd-ldap-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009907999" comment="sssd-proxy-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908000" comment="sssd-tools-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908001" comment="sssd-wbclient-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908002" comment="sssd-wbclient-devel-1.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908003" comment="sssd-winbind-idmap-1.14.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248749" version="1" class="patch">
	<metadata>
		<title>claws-mail-3.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4507" ref_url="https://www.suse.com/security/cve/CVE-2012-4507/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8614" ref_url="https://www.suse.com/security/cve/CVE-2015-8614/" source="CVE"/>
		<reference ref_id="CVE-2015-8708" ref_url="https://www.suse.com/security/cve/CVE-2015-8708/" source="CVE"/>
		<description>
These are all security issues fixed in the claws-mail-3.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4507/">CVE-2012-4507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4507">CVE-2012-4507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8614/">CVE-2015-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8614">CVE-2015-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8708/">CVE-2015-8708 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8708">CVE-2015-8708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908004" comment="claws-mail-3.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908005" comment="claws-mail-devel-3.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908006" comment="claws-mail-lang-3.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248750" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-bad-0.10.23-22.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-bad-0.10.23-22.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908007" comment="gstreamer-0_10-plugins-bad-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908008" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908009" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908010" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908011" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908012" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908013" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908014" comment="libgstbasevideo-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908015" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908016" comment="libgstcodecparsers-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908017" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908018" comment="libgstphotography-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908019" comment="libgstphotography-0_10-23-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908020" comment="libgstsignalprocessor-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908021" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908022" comment="libgstvdp-0_10-23-0.10.23-22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908023" comment="libgstvdp-0_10-23-32bit-0.10.23-22.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248751" version="1" class="patch">
	<metadata>
		<title>conntrack-tools-1.4.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<description>
These are all security issues fixed in the conntrack-tools-1.4.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6496">CVE-2015-6496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908024" comment="conntrack-tools-1.4.4-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248752" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-16.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908025" comment="xorg-x11-7.6_1-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908026" comment="xorg-x11-essentials-7.6_1-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908027" comment="xrdb-1.1.0-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248753" version="1" class="patch">
	<metadata>
		<title>finch-2.11.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.11.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2694">CVE-2009-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2703">CVE-2009-2703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3026">CVE-2009-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3083">CVE-2009-3083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3084">CVE-2009-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3085">CVE-2009-3085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3615">CVE-2009-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-0013">CVE-2010-0013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0277">CVE-2010-0277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0420">CVE-2010-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0423">CVE-2010-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1624">CVE-2010-1624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2528">CVE-2010-2528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3711">CVE-2010-3711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1091">CVE-2011-1091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3594">CVE-2011-3594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2214">CVE-2012-2214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3374">CVE-2012-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6152">CVE-2012-6152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0271">CVE-2013-0271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0272">CVE-2013-0272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0273">CVE-2013-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0274">CVE-2013-0274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6477">CVE-2013-6477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6478">CVE-2013-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6479">CVE-2013-6479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6481">CVE-2013-6481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6482">CVE-2013-6482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6483">CVE-2013-6483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6484">CVE-2013-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6485">CVE-2013-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6486">CVE-2013-6486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6487">CVE-2013-6487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0020">CVE-2014-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3694">CVE-2014-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3695">CVE-2014-3695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3696">CVE-2014-3696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3697">CVE-2014-3697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3698">CVE-2014-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908028" comment="finch-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908029" comment="finch-devel-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908030" comment="libpurple-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908031" comment="libpurple-branding-upstream-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908032" comment="libpurple-devel-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908033" comment="libpurple-lang-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908034" comment="libpurple-plugin-sametime-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908035" comment="libpurple-tcl-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908036" comment="pidgin-2.11.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908037" comment="pidgin-devel-2.11.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248754" version="1" class="patch">
	<metadata>
		<title>libv8-5-5.3.171-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-5037" ref_url="https://www.suse.com/security/cve/CVE-2011-5037/" source="CVE"/>
		<reference ref_id="CVE-2013-6638" ref_url="https://www.suse.com/security/cve/CVE-2013-6638/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2014-1705" ref_url="https://www.suse.com/security/cve/CVE-2014-1705/" source="CVE"/>
		<reference ref_id="CVE-2014-1730" ref_url="https://www.suse.com/security/cve/CVE-2014-1730/" source="CVE"/>
		<reference ref_id="CVE-2014-1735" ref_url="https://www.suse.com/security/cve/CVE-2014-1735/" source="CVE"/>
		<description>
These are all security issues fixed in the libv8-5-5.3.171-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5037/">CVE-2011-5037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5037">CVE-2011-5037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6638/">CVE-2013-6638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6638">CVE-2013-6638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1705/">CVE-2014-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1705">CVE-2014-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1730/">CVE-2014-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1730">CVE-2014-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1735/">CVE-2014-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1735">CVE-2014-1735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908038" comment="libv8-5-5.3.171-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908039" comment="v8-5.3.171-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908040" comment="v8-devel-5.3.171-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908041" comment="v8-private-headers-devel-5.3.171-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248755" version="1" class="patch">
	<metadata>
		<title>libminiupnpc-devel-2.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3985" ref_url="https://www.suse.com/security/cve/CVE-2014-3985/" source="CVE"/>
		<description>
These are all security issues fixed in the libminiupnpc-devel-2.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3985/">CVE-2014-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3985">CVE-2014-3985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908042" comment="libminiupnpc-devel-2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908043" comment="libminiupnpc16-2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908044" comment="libminiupnpc16-32bit-2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908045" comment="miniupnpc-2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908046" comment="python-miniupnpc-2.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248756" version="1" class="patch">
	<metadata>
		<title>nano-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1160" ref_url="https://www.suse.com/security/cve/CVE-2010-1160/" source="CVE"/>
		<reference ref_id="CVE-2010-1161" ref_url="https://www.suse.com/security/cve/CVE-2010-1161/" source="CVE"/>
		<description>
These are all security issues fixed in the nano-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1160/">CVE-2010-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1160">CVE-2010-1160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1161/">CVE-2010-1161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1161">CVE-2010-1161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908047" comment="nano-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908048" comment="nano-lang-2.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248757" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0750">CVE-2010-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1485">CVE-2011-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3218">CVE-2015-3218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3255">CVE-2015-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4625">CVE-2015-4625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908049" comment="libpolkit0-0.113-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908050" comment="libpolkit0-32bit-0.113-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908051" comment="polkit-0.113-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908052" comment="polkit-devel-0.113-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908053" comment="polkit-doc-0.113-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908054" comment="typelib-1_0-Polkit-1_0-0.113-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248758" version="1" class="patch">
	<metadata>
		<title>tomboy-1.15.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4005" ref_url="https://www.suse.com/security/cve/CVE-2010-4005/" source="CVE"/>
		<description>
These are all security issues fixed in the tomboy-1.15.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4005/">CVE-2010-4005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4005">CVE-2010-4005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908055" comment="tomboy-1.15.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908056" comment="tomboy-lang-1.15.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248759" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2241">CVE-2014-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908057" comment="freetype2-devel-2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908058" comment="freetype2-devel-32bit-2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908059" comment="libfreetype6-2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908060" comment="libfreetype6-32bit-2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248760" version="1" class="patch">
	<metadata>
		<title>castor-0.9.5-326.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-3004" ref_url="https://www.suse.com/security/cve/CVE-2013-3004/" source="CVE"/>
		<reference ref_id="CVE-2014-3004" ref_url="https://www.suse.com/security/cve/CVE-2014-3004/" source="CVE"/>
		<description>
These are all security issues fixed in the castor-0.9.5-326.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3004/">CVE-2013-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3004">CVE-2013-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3004/">CVE-2014-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3004">CVE-2014-3004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908061" comment="castor-0.9.5-326.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908062" comment="castor-demo-0.9.5-326.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908063" comment="castor-doc-0.9.5-326.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908064" comment="castor-test-0.9.5-326.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908065" comment="castor-xml-0.9.5-326.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248761" version="1" class="patch">
	<metadata>
		<title>timidity-2.14.0-3.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4335" ref_url="https://www.suse.com/security/cve/CVE-2006-4335/" source="CVE"/>
		<reference ref_id="CVE-2006-4337" ref_url="https://www.suse.com/security/cve/CVE-2006-4337/" source="CVE"/>
		<reference ref_id="CVE-2006-4338" ref_url="https://www.suse.com/security/cve/CVE-2006-4338/" source="CVE"/>
		<description>
These are all security issues fixed in the timidity-2.14.0-3.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4335/">CVE-2006-4335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4335">CVE-2006-4335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4337/">CVE-2006-4337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4337">CVE-2006-4337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4338/">CVE-2006-4338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4338">CVE-2006-4338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908066" comment="timidity-2.14.0-3.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248762" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.22.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.22.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7300">CVE-2014-7300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908067" comment="gnome-settings-daemon-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908068" comment="gnome-settings-daemon-devel-3.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908069" comment="gnome-settings-daemon-lang-3.22.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248763" version="1" class="patch">
	<metadata>
		<title>libXfixes-devel-32bit-5.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes-devel-32bit-5.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908070" comment="libXfixes-devel-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908071" comment="libXfixes-devel-32bit-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908072" comment="libXfixes3-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908073" comment="libXfixes3-32bit-5.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248764" version="1" class="patch">
	<metadata>
		<title>jython-2.2.1-16.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2027" ref_url="https://www.suse.com/security/cve/CVE-2013-2027/" source="CVE"/>
		<description>
These are all security issues fixed in the jython-2.2.1-16.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2027/">CVE-2013-2027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2027">CVE-2013-2027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908074" comment="jython-2.2.1-16.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908075" comment="jython-demo-2.2.1-16.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908076" comment="jython-javadoc-2.2.1-16.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908077" comment="jython-manual-2.2.1-16.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248765" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-4.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-4.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5984">CVE-2008-5984 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908078" comment="dia-0.97.3-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908079" comment="dia-lang-0.97.3-4.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248766" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1025.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1025.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908080" comment="zoo-2.10-1025.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248767" version="1" class="patch">
	<metadata>
		<title>tomcat-8.0.36-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-8.0.36-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908081" comment="tomcat-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908082" comment="tomcat-admin-webapps-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908083" comment="tomcat-docs-webapp-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908084" comment="tomcat-el-3_0-api-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908085" comment="tomcat-embed-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908086" comment="tomcat-javadoc-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908087" comment="tomcat-jsp-2_3-api-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908088" comment="tomcat-jsvc-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908089" comment="tomcat-lib-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908090" comment="tomcat-servlet-3_1-api-8.0.36-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908091" comment="tomcat-webapps-8.0.36-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248768" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.22-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.22-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908092" comment="libpcre2-16-0-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908093" comment="libpcre2-16-0-32bit-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908094" comment="libpcre2-32-0-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908095" comment="libpcre2-32-0-32bit-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908096" comment="libpcre2-8-0-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908097" comment="libpcre2-8-0-32bit-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908098" comment="libpcre2-posix1-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908099" comment="libpcre2-posix1-32bit-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908100" comment="pcre2-devel-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908101" comment="pcre2-devel-static-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908102" comment="pcre2-doc-10.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908103" comment="pcre2-tools-10.22-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248769" version="1" class="patch">
	<metadata>
		<title>tkdiff-4.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4434" ref_url="https://www.suse.com/security/cve/CVE-2005-4434/" source="CVE"/>
		<description>
These are all security issues fixed in the tkdiff-4.2-10.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4434/">CVE-2005-4434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4434">CVE-2005-4434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908104" comment="tkdiff-4.2-10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248770" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.24.0-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.24.0-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908105" comment="perl-5.24.0-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908106" comment="perl-32bit-5.24.0-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908107" comment="perl-base-5.24.0-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908108" comment="perl-base-32bit-5.24.0-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908109" comment="perl-doc-5.24.0-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248771" version="1" class="patch">
	<metadata>
		<title>python-2.7.12-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.12-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908110" comment="python-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908111" comment="python-32bit-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908112" comment="python-curses-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908113" comment="python-demo-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908114" comment="python-gdbm-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908115" comment="python-idle-2.7.12-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908116" comment="python-tk-2.7.12-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248772" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3640">CVE-2011-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1620">CVE-2013-1620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1740">CVE-2013-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908117" comment="libfreebl3-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908118" comment="libfreebl3-32bit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908119" comment="libsoftokn3-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908120" comment="libsoftokn3-32bit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908121" comment="mozilla-nss-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908122" comment="mozilla-nss-32bit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908123" comment="mozilla-nss-certs-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908124" comment="mozilla-nss-certs-32bit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908125" comment="mozilla-nss-devel-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908126" comment="mozilla-nss-sysinit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908127" comment="mozilla-nss-sysinit-32bit-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908128" comment="mozilla-nss-tools-3.26.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248773" version="1" class="patch">
	<metadata>
		<title>perl-Email-Address-1.908-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0477" ref_url="https://www.suse.com/security/cve/CVE-2014-0477/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Email-Address-1.908-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0477/">CVE-2014-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0477">CVE-2014-0477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908129" comment="perl-Email-Address-1.908-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248774" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.36.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.36.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7673">CVE-2015-7673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908130" comment="gdk-pixbuf-devel-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908131" comment="gdk-pixbuf-devel-32bit-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908132" comment="gdk-pixbuf-lang-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908133" comment="gdk-pixbuf-query-loaders-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908134" comment="gdk-pixbuf-query-loaders-32bit-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908135" comment="libgdk_pixbuf-2_0-0-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908136" comment="libgdk_pixbuf-2_0-0-32bit-2.36.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908137" comment="typelib-1_0-GdkPixbuf-2_0-2.36.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248775" version="1" class="patch">
	<metadata>
		<title>libid3tag-devel-0.15.1b-185.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag-devel-0.15.1b-185.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2109">CVE-2008-2109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908138" comment="libid3tag-devel-0.15.1b-185.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908139" comment="libid3tag0-0.15.1b-185.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908140" comment="libid3tag0-32bit-0.15.1b-185.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248776" version="1" class="patch">
	<metadata>
		<title>irssi-0.8.20-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1959" ref_url="https://www.suse.com/security/cve/CVE-2009-1959/" source="CVE"/>
		<reference ref_id="CVE-2010-1154" ref_url="https://www.suse.com/security/cve/CVE-2010-1154/" source="CVE"/>
		<reference ref_id="CVE-2010-1155" ref_url="https://www.suse.com/security/cve/CVE-2010-1155/" source="CVE"/>
		<reference ref_id="CVE-2016-7044" ref_url="https://www.suse.com/security/cve/CVE-2016-7044/" source="CVE"/>
		<reference ref_id="CVE-2016-7045" ref_url="https://www.suse.com/security/cve/CVE-2016-7045/" source="CVE"/>
		<reference ref_id="CVE-2016-7553" ref_url="https://www.suse.com/security/cve/CVE-2016-7553/" source="CVE"/>
		<description>
These are all security issues fixed in the irssi-0.8.20-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1959/">CVE-2009-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1959">CVE-2009-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1154/">CVE-2010-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1154">CVE-2010-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1155/">CVE-2010-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1155">CVE-2010-1155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7044/">CVE-2016-7044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7044">CVE-2016-7044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7045/">CVE-2016-7045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7045">CVE-2016-7045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7553/">CVE-2016-7553 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7553">CVE-2016-7553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908141" comment="irssi-0.8.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908142" comment="irssi-devel-0.8.20-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248777" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.7.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.7.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908143" comment="libQt5Bootstrap-devel-static-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908144" comment="libQt5Bootstrap-devel-static-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908145" comment="libQt5Concurrent-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908146" comment="libQt5Concurrent-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908147" comment="libQt5Concurrent5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908148" comment="libQt5Concurrent5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908149" comment="libQt5Core-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908150" comment="libQt5Core-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908151" comment="libQt5Core-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908152" comment="libQt5Core5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908153" comment="libQt5Core5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908154" comment="libQt5DBus-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908155" comment="libQt5DBus-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908156" comment="libQt5DBus-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908157" comment="libQt5DBus5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908158" comment="libQt5DBus5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908159" comment="libQt5Gui-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908160" comment="libQt5Gui-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908161" comment="libQt5Gui-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908162" comment="libQt5Gui5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908163" comment="libQt5Gui5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908164" comment="libQt5Network-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908165" comment="libQt5Network-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908166" comment="libQt5Network-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908167" comment="libQt5Network5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908168" comment="libQt5Network5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908169" comment="libQt5OpenGL-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908170" comment="libQt5OpenGL-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908171" comment="libQt5OpenGL-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908172" comment="libQt5OpenGL5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908173" comment="libQt5OpenGL5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908174" comment="libQt5OpenGLExtensions-devel-static-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908175" comment="libQt5OpenGLExtensions-devel-static-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908176" comment="libQt5PlatformHeaders-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908177" comment="libQt5PlatformSupport-devel-static-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908178" comment="libQt5PlatformSupport-devel-static-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908179" comment="libQt5PlatformSupport-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908180" comment="libQt5PrintSupport-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908181" comment="libQt5PrintSupport-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908182" comment="libQt5PrintSupport-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908183" comment="libQt5PrintSupport5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908184" comment="libQt5PrintSupport5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908185" comment="libQt5Sql-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908186" comment="libQt5Sql-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908187" comment="libQt5Sql-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908188" comment="libQt5Sql5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908189" comment="libQt5Sql5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908190" comment="libQt5Sql5-mysql-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908191" comment="libQt5Sql5-mysql-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908192" comment="libQt5Sql5-postgresql-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908193" comment="libQt5Sql5-postgresql-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908194" comment="libQt5Sql5-sqlite-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908195" comment="libQt5Sql5-sqlite-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908196" comment="libQt5Sql5-unixODBC-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908197" comment="libQt5Sql5-unixODBC-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908198" comment="libQt5Test-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908199" comment="libQt5Test-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908200" comment="libQt5Test-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908201" comment="libQt5Test5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908202" comment="libQt5Test5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908203" comment="libQt5Widgets-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908204" comment="libQt5Widgets-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908205" comment="libQt5Widgets-private-headers-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908206" comment="libQt5Widgets5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908207" comment="libQt5Widgets5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908208" comment="libQt5Xml-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908209" comment="libQt5Xml-devel-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908210" comment="libQt5Xml5-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908211" comment="libQt5Xml5-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908212" comment="libqt5-qtbase-common-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908213" comment="libqt5-qtbase-devel-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908214" comment="libqt5-qtbase-examples-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908215" comment="libqt5-qtbase-examples-32bit-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908216" comment="libqt5-qtbase-platformtheme-gtk3-5.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908217" comment="libqt5-qtbase-private-headers-devel-5.7.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248778" version="1" class="patch">
	<metadata>
		<title>apache2-mod_wsgi-4.5.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0240" ref_url="https://www.suse.com/security/cve/CVE-2014-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_wsgi-4.5.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0240/">CVE-2014-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0240">CVE-2014-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908218" comment="apache2-mod_wsgi-4.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908219" comment="apache2-mod_wsgi-python3-4.5.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248779" version="1" class="patch">
	<metadata>
		<title>perl-Module-Signature-0.81-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2145" ref_url="https://www.suse.com/security/cve/CVE-2013-2145/" source="CVE"/>
		<reference ref_id="CVE-2015-3406" ref_url="https://www.suse.com/security/cve/CVE-2015-3406/" source="CVE"/>
		<reference ref_id="CVE-2015-3407" ref_url="https://www.suse.com/security/cve/CVE-2015-3407/" source="CVE"/>
		<reference ref_id="CVE-2015-3408" ref_url="https://www.suse.com/security/cve/CVE-2015-3408/" source="CVE"/>
		<reference ref_id="CVE-2015-3409" ref_url="https://www.suse.com/security/cve/CVE-2015-3409/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Module-Signature-0.81-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2145/">CVE-2013-2145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2145">CVE-2013-2145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3406/">CVE-2015-3406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3406">CVE-2015-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3407/">CVE-2015-3407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3407">CVE-2015-3407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3408/">CVE-2015-3408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3408">CVE-2015-3408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3409/">CVE-2015-3409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3409">CVE-2015-3409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908220" comment="perl-Module-Signature-0.81-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248780" version="1" class="patch">
	<metadata>
		<title>imobiledevice-tools-1.2.0-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the imobiledevice-tools-1.2.0-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2142">CVE-2013-2142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908221" comment="imobiledevice-tools-1.2.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908222" comment="libimobiledevice-devel-1.2.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908223" comment="libimobiledevice-doc-1.2.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908224" comment="libimobiledevice6-1.2.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908225" comment="libimobiledevice6-32bit-1.2.0-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908226" comment="python-imobiledevice-1.2.0-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248781" version="1" class="patch">
	<metadata>
		<title>tinyproxy-1.8.4-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3505" ref_url="https://www.suse.com/security/cve/CVE-2012-3505/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyproxy-1.8.4-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3505/">CVE-2012-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3505">CVE-2012-3505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908227" comment="tinyproxy-1.8.4-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248782" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.4.11-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.11-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5112">CVE-2012-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5133">CVE-2012-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1344">CVE-2014-1344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1384">CVE-2014-1384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1385">CVE-2014-1385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1386">CVE-2014-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1387">CVE-2014-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1388">CVE-2014-1388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1389">CVE-2014-1389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1390">CVE-2014-1390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1748">CVE-2014-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1071">CVE-2015-1071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1076">CVE-2015-1076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1081">CVE-2015-1081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1083">CVE-2015-1083 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1120">CVE-2015-1120 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1122">CVE-2015-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1127">CVE-2015-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1153">CVE-2015-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1155">CVE-2015-1155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2330">CVE-2015-2330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3658">CVE-2015-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3659">CVE-2015-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3727">CVE-2015-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3731">CVE-2015-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3741">CVE-2015-3741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3743">CVE-2015-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3745">CVE-2015-3745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3747">CVE-2015-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3748">CVE-2015-3748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3749">CVE-2015-3749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3752">CVE-2015-3752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5788">CVE-2015-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5794">CVE-2015-5794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5801">CVE-2015-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5809">CVE-2015-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5822">CVE-2015-5822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5928">CVE-2015-5928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908228" comment="libjavascriptcoregtk-1_0-0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908229" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908230" comment="libjavascriptcoregtk-3_0-0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908231" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908232" comment="libwebkitgtk-1_0-0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908233" comment="libwebkitgtk-1_0-0-32bit-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908234" comment="libwebkitgtk-3_0-0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908235" comment="libwebkitgtk-3_0-0-32bit-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908236" comment="libwebkitgtk-devel-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908237" comment="libwebkitgtk2-lang-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908238" comment="libwebkitgtk3-devel-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908239" comment="libwebkitgtk3-lang-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908240" comment="typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908241" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908242" comment="typelib-1_0-WebKit-1_0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908243" comment="typelib-1_0-WebKit-3_0-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908244" comment="webkit-jsc-1-2.4.11-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908245" comment="webkit-jsc-3-2.4.11-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248783" version="1" class="patch">
	<metadata>
		<title>collectd-5.5.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6254" ref_url="https://www.suse.com/security/cve/CVE-2016-6254/" source="CVE"/>
		<description>
These are all security issues fixed in the collectd-5.5.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6254/">CVE-2016-6254 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6254">CVE-2016-6254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908246" comment="collectd-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908247" comment="collectd-plugin-dbi-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908248" comment="collectd-plugin-ipmi-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908249" comment="collectd-plugin-java-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908250" comment="collectd-plugin-memcachec-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908251" comment="collectd-plugin-mysql-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908252" comment="collectd-plugin-notify-desktop-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908253" comment="collectd-plugin-pinba-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908254" comment="collectd-plugin-postgresql-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908255" comment="collectd-plugin-python-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908256" comment="collectd-plugin-smart-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908257" comment="collectd-plugin-snmp-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908258" comment="collectd-plugin-virt-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908259" comment="collectd-plugins-all-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908260" comment="collectd-spamassassin-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908261" comment="collectd-web-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908262" comment="collectd-web-js-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908263" comment="libcollectdclient-devel-5.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908264" comment="libcollectdclient1-5.5.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248784" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.8.28-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3050" ref_url="https://www.suse.com/security/cve/CVE-2009-3050/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.8.28-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3050/">CVE-2009-3050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3050">CVE-2009-3050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908265" comment="htmldoc-1.8.28-2.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248785" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1273">CVE-2009-1273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908266" comment="pam_ssh-2.1-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908267" comment="pam_ssh-32bit-2.1-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248786" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-23.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-23.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908268" comment="mipv6d-2.0.2.umip.0.4-23.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248787" version="1" class="patch">
	<metadata>
		<title>gpgme-1.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908269" comment="gpgme-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908270" comment="libgpgme-devel-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908271" comment="libgpgme11-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908272" comment="libgpgme11-32bit-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908273" comment="libgpgmepp-devel-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908274" comment="libgpgmepp6-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908275" comment="libgpgmepp6-32bit-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908276" comment="libqgpgme-devel-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908277" comment="libqgpgme7-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908278" comment="libqgpgme7-32bit-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908279" comment="python-gpg-1.8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248788" version="1" class="patch">
	<metadata>
		<title>bind-9.10.3P4-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-3214" ref_url="https://www.suse.com/security/cve/CVE-2014-3214/" source="CVE"/>
		<reference ref_id="CVE-2014-3859" ref_url="https://www.suse.com/security/cve/CVE-2014-3859/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-5986" ref_url="https://www.suse.com/security/cve/CVE-2015-5986/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.10.3P4-21.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3613">CVE-2010-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3614">CVE-2010-3614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3615">CVE-2010-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0414">CVE-2011-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1907">CVE-2011-1907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3868">CVE-2012-3868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5688">CVE-2012-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5689">CVE-2012-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3214/">CVE-2014-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3214">CVE-2014-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3859/">CVE-2014-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3859">CVE-2014-3859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8680">CVE-2014-8680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5986/">CVE-2015-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5986">CVE-2015-5986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8705">CVE-2015-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2088">CVE-2016-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908280" comment="bind-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908281" comment="bind-chrootenv-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908282" comment="bind-devel-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908283" comment="bind-devel-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908284" comment="bind-doc-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908285" comment="bind-lwresd-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908286" comment="bind-utils-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908287" comment="idnkit-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908288" comment="idnkit-devel-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908289" comment="idnkit-devel-32bit-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908290" comment="libbind9-140-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908291" comment="libbind9-140-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908292" comment="libdns162-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908293" comment="libdns162-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908294" comment="libidnkit1-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908295" comment="libidnkit1-32bit-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908296" comment="libidnkitlite1-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908297" comment="libidnkitlite1-32bit-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908298" comment="libidnkitres1-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908299" comment="libidnkitres1-32bit-1.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908300" comment="libirs-devel-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908301" comment="libirs141-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908302" comment="libirs141-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908303" comment="libisc160-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908304" comment="libisc160-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908305" comment="libisccc140-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908306" comment="libisccc140-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908307" comment="libisccfg140-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908308" comment="libisccfg140-32bit-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908309" comment="liblwres141-9.10.3P4-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908310" comment="liblwres141-32bit-9.10.3P4-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248789" version="1" class="patch">
	<metadata>
		<title>proxychains-ng-4.11-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3887" ref_url="https://www.suse.com/security/cve/CVE-2015-3887/" source="CVE"/>
		<description>
These are all security issues fixed in the proxychains-ng-4.11-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3887/">CVE-2015-3887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3887">CVE-2015-3887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908311" comment="proxychains-ng-4.11-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248790" version="1" class="patch">
	<metadata>
		<title>emacs-25.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="CVE-2014-9483" ref_url="https://www.suse.com/security/cve/CVE-2014-9483/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-25.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0035">CVE-2012-0035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9483/">CVE-2014-9483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9483">CVE-2014-9483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908312" comment="emacs-25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908313" comment="emacs-el-25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908314" comment="emacs-info-25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908315" comment="emacs-nox-25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908316" comment="emacs-x11-25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908317" comment="etags-25.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248791" version="1" class="patch">
	<metadata>
		<title>libsndfile-progs-1.0.26-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-progs-1.0.26-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908318" comment="libsndfile-progs-1.0.26-2.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248792" version="1" class="patch">
	<metadata>
		<title>python-keystoneclient-3.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0105" ref_url="https://www.suse.com/security/cve/CVE-2014-0105/" source="CVE"/>
		<reference ref_id="CVE-2014-7144" ref_url="https://www.suse.com/security/cve/CVE-2014-7144/" source="CVE"/>
		<reference ref_id="CVE-2015-1852" ref_url="https://www.suse.com/security/cve/CVE-2015-1852/" source="CVE"/>
		<description>
These are all security issues fixed in the python-keystoneclient-3.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0105/">CVE-2014-0105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0105">CVE-2014-0105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7144/">CVE-2014-7144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7144">CVE-2014-7144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1852/">CVE-2015-1852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1852">CVE-2015-1852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908319" comment="python-keystoneclient-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908320" comment="python-keystoneclient-doc-3.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248793" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908321" comment="libmpfr4-3.1.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908322" comment="libmpfr4-32bit-3.1.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908323" comment="mpfr-devel-3.1.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908324" comment="mpfr-devel-32bit-3.1.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248794" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.50.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.50.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908325" comment="gio-branding-upstream-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908326" comment="glib2-devel-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908327" comment="glib2-devel-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908328" comment="glib2-devel-static-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908329" comment="glib2-lang-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908330" comment="glib2-tools-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908331" comment="glib2-tools-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908332" comment="libgio-2_0-0-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908333" comment="libgio-2_0-0-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908334" comment="libgio-fam-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908335" comment="libgio-fam-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908336" comment="libglib-2_0-0-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908337" comment="libglib-2_0-0-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908338" comment="libgmodule-2_0-0-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908339" comment="libgmodule-2_0-0-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908340" comment="libgobject-2_0-0-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908341" comment="libgobject-2_0-0-32bit-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908342" comment="libgthread-2_0-0-2.50.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908343" comment="libgthread-2_0-0-32bit-2.50.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248795" version="1" class="patch">
	<metadata>
		<title>python-eyeD3-0.7.4-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1934" ref_url="https://www.suse.com/security/cve/CVE-2014-1934/" source="CVE"/>
		<description>
These are all security issues fixed in the python-eyeD3-0.7.4-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1934/">CVE-2014-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1934">CVE-2014-1934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908344" comment="python-eyeD3-0.7.4-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248796" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-10.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-10.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908345" comment="libvmtools-devel-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908346" comment="libvmtools0-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908347" comment="open-vm-tools-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908348" comment="open-vm-tools-desktop-10.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248797" version="1" class="patch">
	<metadata>
		<title>ibm-data-db2-4.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4225" ref_url="https://www.suse.com/security/cve/CVE-2010-4225/" source="CVE"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<description>
These are all security issues fixed in the ibm-data-db2-4.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4225/">CVE-2010-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4225">CVE-2010-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2318">CVE-2015-2318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2319">CVE-2015-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2320">CVE-2015-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908349" comment="ibm-data-db2-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908350" comment="libmono-2_0-1-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908351" comment="libmono-2_0-devel-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908352" comment="libmonoboehm-2_0-1-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908353" comment="libmonoboehm-2_0-devel-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908354" comment="libmonosgen-2_0-1-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908355" comment="libmonosgen-2_0-devel-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908356" comment="mono-complete-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908357" comment="mono-core-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908358" comment="mono-data-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908359" comment="mono-data-oracle-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908360" comment="mono-data-sqlite-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908361" comment="mono-devel-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908362" comment="mono-extras-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908363" comment="mono-locale-extras-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908364" comment="mono-mvc-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908365" comment="mono-nunit-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908366" comment="mono-reactive-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908367" comment="mono-wcf-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908368" comment="mono-web-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908369" comment="mono-winforms-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908370" comment="mono-winfxcore-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908371" comment="monodoc-core-4.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248798" version="1" class="patch">
	<metadata>
		<title>libbotan-1_10-1-1.10.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5726" ref_url="https://www.suse.com/security/cve/CVE-2015-5726/" source="CVE"/>
		<reference ref_id="CVE-2015-5727" ref_url="https://www.suse.com/security/cve/CVE-2015-5727/" source="CVE"/>
		<reference ref_id="CVE-2015-7827" ref_url="https://www.suse.com/security/cve/CVE-2015-7827/" source="CVE"/>
		<reference ref_id="CVE-2016-2194" ref_url="https://www.suse.com/security/cve/CVE-2016-2194/" source="CVE"/>
		<reference ref_id="CVE-2016-2195" ref_url="https://www.suse.com/security/cve/CVE-2016-2195/" source="CVE"/>
		<reference ref_id="CVE-2016-2849" ref_url="https://www.suse.com/security/cve/CVE-2016-2849/" source="CVE"/>
		<reference ref_id="CVE-2016-2915" ref_url="https://www.suse.com/security/cve/CVE-2016-2915/" source="CVE"/>
		<description>
These are all security issues fixed in the libbotan-1_10-1-1.10.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5726/">CVE-2015-5726 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5726">CVE-2015-5726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5727/">CVE-2015-5727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5727">CVE-2015-5727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7827/">CVE-2015-7827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7827">CVE-2015-7827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2194/">CVE-2016-2194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2194">CVE-2016-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2195/">CVE-2016-2195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2195">CVE-2016-2195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2849/">CVE-2016-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2849">CVE-2016-2849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2915/">CVE-2016-2915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-2915">CVE-2016-2915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908372" comment="libbotan-1_10-1-1.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908373" comment="libbotan-1_10-1-32bit-1.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908374" comment="libbotan-devel-1.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908375" comment="libbotan-devel-32bit-1.10.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248799" version="1" class="patch">
	<metadata>
		<title>darktable-2.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885/" source="CVE"/>
		<description>
These are all security issues fixed in the darktable-2.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3885">CVE-2015-3885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908376" comment="darktable-2.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908377" comment="darktable-doc-2.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248800" version="1" class="patch">
	<metadata>
		<title>fossil-1.35-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the fossil-1.35-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908378" comment="fossil-1.35-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248801" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-31.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908379" comment="unzip-6.00-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908380" comment="unzip-doc-6.00-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908381" comment="unzip-rcc-6.00-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248802" version="1" class="patch">
	<metadata>
		<title>libruby2_2-2_2-2.2.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_2-2_2-2.2.5-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3900">CVE-2015-3900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7551">CVE-2015-7551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908382" comment="libruby2_2-2_2-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908383" comment="ruby2.2-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908384" comment="ruby2.2-devel-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908385" comment="ruby2.2-devel-extra-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908386" comment="ruby2.2-doc-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908387" comment="ruby2.2-doc-ri-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908388" comment="ruby2.2-stdlib-2.2.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908389" comment="ruby2.2-tk-2.2.5-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248803" version="1" class="patch">
	<metadata>
		<title>python3-requests-2.11.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-requests-2.11.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1830">CVE-2014-1830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908390" comment="python3-requests-2.11.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248804" version="1" class="patch">
	<metadata>
		<title>xfig-3.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1962" ref_url="https://www.suse.com/security/cve/CVE-2009-1962/" source="CVE"/>
		<reference ref_id="CVE-2009-4227" ref_url="https://www.suse.com/security/cve/CVE-2009-4227/" source="CVE"/>
		<description>
These are all security issues fixed in the xfig-3.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1962/">CVE-2009-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1962">CVE-2009-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4227/">CVE-2009-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4227">CVE-2009-4227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908391" comment="xfig-3.2.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248805" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.033-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.033-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908392" comment="perl-Tk-804.033-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908393" comment="perl-Tk-devel-804.033-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248806" version="1" class="patch">
	<metadata>
		<title>freeimage-devel-3.17.0-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0852" ref_url="https://www.suse.com/security/cve/CVE-2015-0852/" source="CVE"/>
		<description>
These are all security issues fixed in the freeimage-devel-3.17.0-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0852/">CVE-2015-0852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0852">CVE-2015-0852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908394" comment="freeimage-devel-3.17.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908395" comment="libfreeimage3-3.17.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908396" comment="libfreeimageplus3-3.17.0-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248807" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.54-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7940" ref_url="https://www.suse.com/security/cve/CVE-2015-7940/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.54-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7940/">CVE-2015-7940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7940">CVE-2015-7940 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908397" comment="bouncycastle-1.54-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908398" comment="bouncycastle-javadoc-1.54-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248808" version="1" class="patch">
	<metadata>
		<title>froxlor-0.9.38.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0185" ref_url="https://www.suse.com/security/cve/CVE-2014-0185/" source="CVE"/>
		<description>
These are all security issues fixed in the froxlor-0.9.38.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0185/">CVE-2014-0185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0185">CVE-2014-0185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908399" comment="froxlor-0.9.38.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248809" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.41-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.41-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5519">CVE-2008-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8111">CVE-2014-8111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908400" comment="apache2-mod_jk-1.2.41-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248810" version="1" class="patch">
	<metadata>
		<title>prosody-0.9.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-0756" ref_url="https://www.suse.com/security/cve/CVE-2016-0756/" source="CVE"/>
		<reference ref_id="CVE-2016-1231" ref_url="https://www.suse.com/security/cve/CVE-2016-1231/" source="CVE"/>
		<reference ref_id="CVE-2016-1232" ref_url="https://www.suse.com/security/cve/CVE-2016-1232/" source="CVE"/>
		<description>
These are all security issues fixed in the prosody-0.9.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0756/">CVE-2016-0756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0756">CVE-2016-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1231/">CVE-2016-1231 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1231">CVE-2016-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1232/">CVE-2016-1232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1232">CVE-2016-1232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908401" comment="prosody-0.9.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248811" version="1" class="patch">
	<metadata>
		<title>lhasa-0.3.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the lhasa-0.3.1-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2347">CVE-2016-2347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908402" comment="lhasa-0.3.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908403" comment="lhasa-devel-0.3.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908404" comment="liblhasa0-0.3.1-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248812" version="1" class="patch">
	<metadata>
		<title>roundcubemail-1.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3507" ref_url="https://www.suse.com/security/cve/CVE-2012-3507/" source="CVE"/>
		<reference ref_id="CVE-2012-3508" ref_url="https://www.suse.com/security/cve/CVE-2012-3508/" source="CVE"/>
		<reference ref_id="CVE-2013-5645" ref_url="https://www.suse.com/security/cve/CVE-2013-5645/" source="CVE"/>
		<reference ref_id="CVE-2013-6172" ref_url="https://www.suse.com/security/cve/CVE-2013-6172/" source="CVE"/>
		<reference ref_id="CVE-2015-2181" ref_url="https://www.suse.com/security/cve/CVE-2015-2181/" source="CVE"/>
		<reference ref_id="CVE-2015-8770" ref_url="https://www.suse.com/security/cve/CVE-2015-8770/" source="CVE"/>
		<reference ref_id="CVE-2016-5103" ref_url="https://www.suse.com/security/cve/CVE-2016-5103/" source="CVE"/>
		<description>
These are all security issues fixed in the roundcubemail-1.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3507/">CVE-2012-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3507">CVE-2012-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3508/">CVE-2012-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3508">CVE-2012-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5645/">CVE-2013-5645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5645">CVE-2013-5645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6172/">CVE-2013-6172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6172">CVE-2013-6172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2181/">CVE-2015-2181 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2181">CVE-2015-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8770/">CVE-2015-8770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8770">CVE-2015-8770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5103/">CVE-2016-5103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5103">CVE-2016-5103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908405" comment="roundcubemail-1.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248813" version="1" class="patch">
	<metadata>
		<title>perl-HTTP-Body-1.22-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4407" ref_url="https://www.suse.com/security/cve/CVE-2013-4407/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTTP-Body-1.22-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4407/">CVE-2013-4407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4407">CVE-2013-4407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908406" comment="perl-HTTP-Body-1.22-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248814" version="1" class="patch">
	<metadata>
		<title>syslog-ng-3.8.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0343" ref_url="https://www.suse.com/security/cve/CVE-2011-0343/" source="CVE"/>
		<reference ref_id="CVE-2011-1951" ref_url="https://www.suse.com/security/cve/CVE-2011-1951/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-3.8.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0343/">CVE-2011-0343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0343">CVE-2011-0343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1951/">CVE-2011-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1951">CVE-2011-1951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908407" comment="syslog-ng-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908408" comment="syslog-ng-curl-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908409" comment="syslog-ng-devel-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908410" comment="syslog-ng-geoip-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908411" comment="syslog-ng-java-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908412" comment="syslog-ng-python-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908413" comment="syslog-ng-redis-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908414" comment="syslog-ng-smtp-3.8.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908415" comment="syslog-ng-sql-3.8.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248815" version="1" class="patch">
	<metadata>
		<title>privoxy-3.0.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1030" ref_url="https://www.suse.com/security/cve/CVE-2015-1030/" source="CVE"/>
		<reference ref_id="CVE-2015-1031" ref_url="https://www.suse.com/security/cve/CVE-2015-1031/" source="CVE"/>
		<reference ref_id="CVE-2015-1201" ref_url="https://www.suse.com/security/cve/CVE-2015-1201/" source="CVE"/>
		<reference ref_id="CVE-2015-1380" ref_url="https://www.suse.com/security/cve/CVE-2015-1380/" source="CVE"/>
		<reference ref_id="CVE-2015-1381" ref_url="https://www.suse.com/security/cve/CVE-2015-1381/" source="CVE"/>
		<reference ref_id="CVE-2015-1382" ref_url="https://www.suse.com/security/cve/CVE-2015-1382/" source="CVE"/>
		<reference ref_id="CVE-2016-1982" ref_url="https://www.suse.com/security/cve/CVE-2016-1982/" source="CVE"/>
		<reference ref_id="CVE-2016-1983" ref_url="https://www.suse.com/security/cve/CVE-2016-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the privoxy-3.0.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1030/">CVE-2015-1030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1030">CVE-2015-1030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1031/">CVE-2015-1031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1031">CVE-2015-1031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1201/">CVE-2015-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1201">CVE-2015-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1380/">CVE-2015-1380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1380">CVE-2015-1380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1381/">CVE-2015-1381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1381">CVE-2015-1381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1382/">CVE-2015-1382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1382">CVE-2015-1382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1982/">CVE-2016-1982 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1982">CVE-2016-1982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1983/">CVE-2016-1983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1983">CVE-2016-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908416" comment="privoxy-3.0.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908417" comment="privoxy-doc-3.0.26-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248816" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0004">CVE-2014-0004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908418" comment="libudisks2-0-2.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908419" comment="typelib-1_0-UDisks-2_0-2.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908420" comment="udisks2-2.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908421" comment="udisks2-devel-2.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908422" comment="udisks2-lang-2.1.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248817" version="1" class="patch">
	<metadata>
		<title>libneon-devel-0.30.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon-devel-0.30.1-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908423" comment="libneon-devel-0.30.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908424" comment="libneon27-0.30.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908425" comment="libneon27-32bit-0.30.1-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248818" version="1" class="patch">
	<metadata>
		<title>kio-extras5-16.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8600" ref_url="https://www.suse.com/security/cve/CVE-2014-8600/" source="CVE"/>
		<description>
These are all security issues fixed in the kio-extras5-16.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8600/">CVE-2014-8600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8600">CVE-2014-8600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908426" comment="kio-extras5-16.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908427" comment="kwebkitpart-1.3.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908428" comment="kwebkitpart-lang-1.3.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248819" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.23.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.23.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4758">CVE-2013-4758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908429" comment="rsyslog-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908430" comment="rsyslog-diag-tools-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908431" comment="rsyslog-doc-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908432" comment="rsyslog-module-dbi-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908433" comment="rsyslog-module-elasticsearch-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908434" comment="rsyslog-module-gcrypt-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908435" comment="rsyslog-module-gssapi-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908436" comment="rsyslog-module-gtls-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908437" comment="rsyslog-module-guardtime-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908438" comment="rsyslog-module-mmnormalize-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908439" comment="rsyslog-module-mysql-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908440" comment="rsyslog-module-omamqp1-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908441" comment="rsyslog-module-omhttpfs-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908442" comment="rsyslog-module-omtcl-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908443" comment="rsyslog-module-pgsql-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908444" comment="rsyslog-module-relp-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908445" comment="rsyslog-module-snmp-8.23.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908446" comment="rsyslog-module-udpspoof-8.23.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248820" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315/" source="CVE"/>
		<reference ref_id="CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<reference ref_id="CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4144">CVE-2015-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4145">CVE-2015-4145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4146">CVE-2015-4146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5310">CVE-2015-5310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5315">CVE-2015-5315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5316">CVE-2015-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4476">CVE-2016-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4477">CVE-2016-4477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908447" comment="wpa_supplicant-2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908448" comment="wpa_supplicant-gui-2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248821" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4509">CVE-2013-4509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908449" comment="ibus-chewing-1.4.14-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908450" comment="ibus-pinyin-1.5.0-12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248822" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-hub-1.12.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0177" ref_url="https://www.suse.com/security/cve/CVE-2014-0177/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-hub-1.12.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0177/">CVE-2014-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0177">CVE-2014-0177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908451" comment="ruby2.2-rubygem-hub-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908452" comment="ruby2.2-rubygem-hub-doc-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908453" comment="ruby2.3-rubygem-hub-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908454" comment="ruby2.3-rubygem-hub-doc-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908455" comment="rubygem-hub-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908456" comment="rubygem-hub-bash-completion-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908457" comment="rubygem-hub-zsh-completion-1.12.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248823" version="1" class="patch">
	<metadata>
		<title>bogofilter-common-1.2.4-9.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-common-1.2.4-9.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2494">CVE-2010-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5468">CVE-2012-5468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908458" comment="bogofilter-common-1.2.4-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908459" comment="bogofilter-db-1.2.4-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908460" comment="bogofilter-doc-1.2.4-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908461" comment="bogofilter-kyotocabinet-1.2.4-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908462" comment="bogofilter-sqlite3-1.2.4-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248824" version="1" class="patch">
	<metadata>
		<title>obex-data-server-0.4.6-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2374" ref_url="https://www.suse.com/security/cve/CVE-2008-2374/" source="CVE"/>
		<description>
These are all security issues fixed in the obex-data-server-0.4.6-15.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2374/">CVE-2008-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2374">CVE-2008-2374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908463" comment="obex-data-server-0.4.6-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248825" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-183.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-183.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0804">CVE-2012-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908464" comment="cvs-1.12.12-183.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908465" comment="cvs-doc-1.12.12-183.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248826" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-1882" ref_url="https://www.suse.com/security/cve/CVE-2009-1882/" source="CVE"/>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<reference ref_id="CVE-2016-2317" ref_url="https://www.suse.com/security/cve/CVE-2016-2317/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1882/">CVE-2009-1882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1882">CVE-2009-1882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3438">CVE-2012-3438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2317/">CVE-2016-2317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2317">CVE-2016-2317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908466" comment="GraphicsMagick-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908467" comment="GraphicsMagick-devel-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908468" comment="libGraphicsMagick++-Q16-12-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908469" comment="libGraphicsMagick++-devel-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908470" comment="libGraphicsMagick-Q16-3-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908471" comment="libGraphicsMagick3-config-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908472" comment="libGraphicsMagickWand-Q16-2-1.3.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908473" comment="perl-GraphicsMagick-1.3.25-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248827" version="1" class="patch">
	<metadata>
		<title>systemtap-3.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2010-0411" ref_url="https://www.suse.com/security/cve/CVE-2010-0411/" source="CVE"/>
		<reference ref_id="CVE-2010-0412" ref_url="https://www.suse.com/security/cve/CVE-2010-0412/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-3.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0411/">CVE-2010-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0411">CVE-2010-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0412/">CVE-2010-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0412">CVE-2010-0412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908474" comment="systemtap-3.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908475" comment="systemtap-runtime-3.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908476" comment="systemtap-sdt-devel-3.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908477" comment="systemtap-server-3.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248828" version="1" class="patch">
	<metadata>
		<title>libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2496" ref_url="https://www.suse.com/security/cve/CVE-2010-2496/" source="CVE"/>
		<reference ref_id="CVE-2015-1867" ref_url="https://www.suse.com/security/cve/CVE-2015-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-7035" ref_url="https://www.suse.com/security/cve/CVE-2016-7035/" source="CVE"/>
		<reference ref_id="CVE-2016-7797" ref_url="https://www.suse.com/security/cve/CVE-2016-7797/" source="CVE"/>
		<description>
These are all security issues fixed in the libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2496/">CVE-2010-2496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2496">CVE-2010-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1867/">CVE-2015-1867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1867">CVE-2015-1867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7035/">CVE-2016-7035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7035">CVE-2016-7035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7797/">CVE-2016-7797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7797">CVE-2016-7797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908478" comment="libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908479" comment="libpacemaker3-1.1.15+git20161104.b6f251a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908480" comment="pacemaker-1.1.15+git20161104.b6f251a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908481" comment="pacemaker-cli-1.1.15+git20161104.b6f251a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908482" comment="pacemaker-cts-1.1.15+git20161104.b6f251a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908483" comment="pacemaker-remote-1.1.15+git20161104.b6f251a-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248829" version="1" class="patch">
	<metadata>
		<title>libass-devel-0.13.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass-devel-0.13.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7969">CVE-2016-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7970">CVE-2016-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7972">CVE-2016-7972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908484" comment="libass-devel-0.13.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908485" comment="libass5-0.13.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908486" comment="libass5-32bit-0.13.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248830" version="1" class="patch">
	<metadata>
		<title>kcoreaddons-5.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7966" ref_url="https://www.suse.com/security/cve/CVE-2016-7966/" source="CVE"/>
		<description>
These are all security issues fixed in the kcoreaddons-5.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7966/">CVE-2016-7966 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7966">CVE-2016-7966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908487" comment="kcoreaddons-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908488" comment="kcoreaddons-devel-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908489" comment="kcoreaddons-devel-32bit-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908490" comment="kcoreaddons-lang-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908491" comment="libKF5CoreAddons5-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908492" comment="libKF5CoreAddons5-32bit-5.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248831" version="1" class="patch">
	<metadata>
		<title>libexif-devel-0.6.21-10.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-devel-0.6.21-10.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908493" comment="libexif-devel-0.6.21-10.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908494" comment="libexif12-0.6.21-10.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908495" comment="libexif12-32bit-0.6.21-10.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248832" version="1" class="patch">
	<metadata>
		<title>python3-Pillow-3.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3589" ref_url="https://www.suse.com/security/cve/CVE-2014-3589/" source="CVE"/>
		<reference ref_id="CVE-2014-3598" ref_url="https://www.suse.com/security/cve/CVE-2014-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-0740" ref_url="https://www.suse.com/security/cve/CVE-2016-0740/" source="CVE"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<reference ref_id="CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Pillow-3.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3589/">CVE-2014-3589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3589">CVE-2014-3589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3598/">CVE-2014-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3598">CVE-2014-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0740/">CVE-2016-0740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0740">CVE-2016-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0775">CVE-2016-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3076">CVE-2016-3076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908496" comment="python3-Pillow-3.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908497" comment="python3-Pillow-tk-3.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248833" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-jquery-rails-4.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-jquery-rails-4.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908498" comment="ruby2.2-rubygem-jquery-rails-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908499" comment="ruby2.2-rubygem-jquery-rails-doc-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908500" comment="ruby2.2-rubygem-jquery-rails-testsuite-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908501" comment="ruby2.3-rubygem-jquery-rails-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908502" comment="ruby2.3-rubygem-jquery-rails-doc-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908503" comment="ruby2.3-rubygem-jquery-rails-testsuite-4.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248834" version="1" class="patch">
	<metadata>
		<title>hyper-v-6-17.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-6-17.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908504" comment="hyper-v-6-17.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248835" version="1" class="patch">
	<metadata>
		<title>libmodplug-devel-0.8.8.5-4.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug-devel-0.8.8.5-4.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1761">CVE-2011-1761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4233">CVE-2013-4233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4234">CVE-2013-4234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908505" comment="libmodplug-devel-0.8.8.5-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908506" comment="libmodplug1-0.8.8.5-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908507" comment="libmodplug1-32bit-0.8.8.5-4.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248836" version="1" class="patch">
	<metadata>
		<title>atheme-7.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9773" ref_url="https://www.suse.com/security/cve/CVE-2014-9773/" source="CVE"/>
		<reference ref_id="CVE-2016-4478" ref_url="https://www.suse.com/security/cve/CVE-2016-4478/" source="CVE"/>
		<description>
These are all security issues fixed in the atheme-7.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9773/">CVE-2014-9773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9773">CVE-2014-9773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4478/">CVE-2016-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-4478">CVE-2016-4478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908508" comment="atheme-7.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908509" comment="atheme-devel-7.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908510" comment="libathemecore1-7.2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248837" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0128-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0128-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3451">CVE-2015-3451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908511" comment="perl-XML-LibXML-2.0128-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248838" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.10.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.10.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2168">CVE-2013-2168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3532">CVE-2014-3532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3533">CVE-2014-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3635">CVE-2014-3635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908512" comment="dbus-1-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908513" comment="dbus-1-devel-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908514" comment="dbus-1-devel-32bit-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908515" comment="dbus-1-devel-doc-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908516" comment="dbus-1-x11-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908517" comment="libdbus-1-3-1.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908518" comment="libdbus-1-3-32bit-1.10.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248839" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.18.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.18.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3164">CVE-2015-3164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908519" comment="xorg-x11-server-7.6_1.18.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908520" comment="xorg-x11-server-extra-7.6_1.18.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908521" comment="xorg-x11-server-sdk-7.6_1.18.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908522" comment="xorg-x11-server-source-7.6_1.18.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908523" comment="xorg-x11-server-wayland-7.6_1.18.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248840" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917.703_b45dbdb-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917.703_b45dbdb-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4910">CVE-2014-4910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908524" comment="xf86-video-intel-2.99.917.703_b45dbdb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908525" comment="xf86-video-intel-32bit-2.99.917.703_b45dbdb-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248841" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.59-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.59-2.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1152">CVE-2012-1152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908526" comment="perl-YAML-LibYAML-0.59-2.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248842" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-6.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-6.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1384">CVE-2009-1384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908527" comment="pam_krb5-2.4.4-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908528" comment="pam_krb5-32bit-2.4.4-6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248843" version="1" class="patch">
	<metadata>
		<title>gnome-photos-3.22.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-photos-3.22.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908529" comment="gnome-photos-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908530" comment="gnome-photos-lang-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908531" comment="gnome-shell-search-provider-gnome-photos-3.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908532" comment="gtk2-branding-upstream-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908533" comment="gtk2-data-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908534" comment="gtk2-devel-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908535" comment="gtk2-devel-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908536" comment="gtk2-immodule-amharic-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908537" comment="gtk2-immodule-amharic-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908538" comment="gtk2-immodule-inuktitut-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908539" comment="gtk2-immodule-inuktitut-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908540" comment="gtk2-immodule-multipress-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908541" comment="gtk2-immodule-multipress-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908542" comment="gtk2-immodule-thai-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908543" comment="gtk2-immodule-thai-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908544" comment="gtk2-immodule-vietnamese-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908545" comment="gtk2-immodule-vietnamese-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908546" comment="gtk2-immodule-xim-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908547" comment="gtk2-immodule-xim-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908548" comment="gtk2-immodules-tigrigna-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908549" comment="gtk2-immodules-tigrigna-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908550" comment="gtk2-lang-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908551" comment="gtk2-tools-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908552" comment="gtk2-tools-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908553" comment="libgtk-2_0-0-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908554" comment="libgtk-2_0-0-32bit-2.24.31-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908555" comment="typelib-1_0-Gtk-2_0-2.24.31-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248844" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Extract-0.78-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Extract-0.78-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908556" comment="perl-Archive-Extract-0.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908557" comment="perl-HTTP-Tiny-0.070-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908558" comment="perl-Module-Load-Conditional-0.68-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248845" version="1" class="patch">
	<metadata>
		<title>gypsy-0.9-10.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the gypsy-0.9-10.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0523">CVE-2011-0523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0524">CVE-2011-0524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908559" comment="gypsy-0.9-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908560" comment="libgypsy-devel-0.9-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908561" comment="libgypsy0-0.9-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908562" comment="libgypsy0-32bit-0.9-10.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248846" version="1" class="patch">
	<metadata>
		<title>getmail-4.46.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7273" ref_url="https://www.suse.com/security/cve/CVE-2014-7273/" source="CVE"/>
		<reference ref_id="CVE-2014-7274" ref_url="https://www.suse.com/security/cve/CVE-2014-7274/" source="CVE"/>
		<reference ref_id="CVE-2014-7275" ref_url="https://www.suse.com/security/cve/CVE-2014-7275/" source="CVE"/>
		<description>
These are all security issues fixed in the getmail-4.46.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7273/">CVE-2014-7273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7273">CVE-2014-7273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7274/">CVE-2014-7274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7274">CVE-2014-7274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7275/">CVE-2014-7275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7275">CVE-2014-7275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908563" comment="getmail-4.46.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908564" comment="getmail-doc-4.46.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248847" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode-9.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1142" ref_url="https://www.suse.com/security/cve/CVE-2008-1142/" source="CVE"/>
		<reference ref_id="CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the rxvt-unicode-9.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1142/">CVE-2008-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1142">CVE-2008-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3121">CVE-2014-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908565" comment="rxvt-unicode-9.22-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248848" version="1" class="patch">
	<metadata>
		<title>kinit-32bit-5.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3100" ref_url="https://www.suse.com/security/cve/CVE-2016-3100/" source="CVE"/>
		<description>
These are all security issues fixed in the kinit-32bit-5.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3100/">CVE-2016-3100 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3100">CVE-2016-3100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908566" comment="kinit-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908567" comment="kinit-32bit-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908568" comment="kinit-devel-5.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908569" comment="kinit-lang-5.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248849" version="1" class="patch">
	<metadata>
		<title>bitcoin-qt5-0.13.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<description>
These are all security issues fixed in the bitcoin-qt5-0.13.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908570" comment="bitcoin-qt5-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908571" comment="bitcoin-test-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908572" comment="bitcoin-utils-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908573" comment="bitcoind-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908574" comment="libbitcoinconsensus-devel-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908575" comment="libbitcoinconsensus0-0.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908576" comment="sslscan-1.11.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248850" version="1" class="patch">
	<metadata>
		<title>libopenssl1_0_0-steam-1.0.2h-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1_0_0-steam-1.0.2h-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908577" comment="libopenssl1_0_0-steam-1.0.2h-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908578" comment="libopenssl1_0_0-steam-32bit-1.0.2h-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248851" version="1" class="patch">
	<metadata>
		<title>libmxml1-2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-4570" ref_url="https://www.suse.com/security/cve/CVE-2016-4570/" source="CVE"/>
		<reference ref_id="CVE-2016-4571" ref_url="https://www.suse.com/security/cve/CVE-2016-4571/" source="CVE"/>
		<description>
These are all security issues fixed in the libmxml1-2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4570/">CVE-2016-4570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4570">CVE-2016-4570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4571/">CVE-2016-4571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4571">CVE-2016-4571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908579" comment="libmxml1-2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908580" comment="libmxml1-32bit-2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908581" comment="mxml-2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908582" comment="mxml-devel-2.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248852" version="1" class="patch">
	<metadata>
		<title>links-2.13-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the links-2.13-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908583" comment="links-2.13-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248853" version="1" class="patch">
	<metadata>
		<title>docker-1.12.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3499" ref_url="https://www.suse.com/security/cve/CVE-2014-3499/" source="CVE"/>
		<reference ref_id="CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277/" source="CVE"/>
		<reference ref_id="CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407/" source="CVE"/>
		<reference ref_id="CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408/" source="CVE"/>
		<reference ref_id="CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178/" source="CVE"/>
		<reference ref_id="CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179/" source="CVE"/>
		<reference ref_id="CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356/" source="CVE"/>
		<reference ref_id="CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357/" source="CVE"/>
		<reference ref_id="CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358/" source="CVE"/>
		<reference ref_id="CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627/" source="CVE"/>
		<reference ref_id="CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629/" source="CVE"/>
		<reference ref_id="CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630/" source="CVE"/>
		<reference ref_id="CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631/" source="CVE"/>
		<reference ref_id="CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697/" source="CVE"/>
		<reference ref_id="CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-1.12.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3499/">CVE-2014-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3499">CVE-2014-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5277">CVE-2014-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6407">CVE-2014-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6408">CVE-2014-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8178">CVE-2014-8178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8179">CVE-2014-8179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9356">CVE-2014-9356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9357">CVE-2014-9357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9358">CVE-2014-9358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3627">CVE-2015-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3629">CVE-2015-3629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3630">CVE-2015-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3631">CVE-2015-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3697">CVE-2016-3697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8867">CVE-2016-8867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908584" comment="docker-1.12.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908585" comment="docker-bash-completion-1.12.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908586" comment="docker-test-1.12.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908587" comment="docker-zsh-completion-1.12.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248854" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-270.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-270.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908588" comment="procmail-3.22-270.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248855" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.121-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.121-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3571">CVE-2011-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5035">CVE-2011-5035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0497">CVE-2012-0497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0501">CVE-2012-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0547">CVE-2012-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1682">CVE-2012-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1711">CVE-2012-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1723">CVE-2012-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1724">CVE-2012-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1726">CVE-2012-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3136">CVE-2012-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3174">CVE-2012-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4416">CVE-2012-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4681">CVE-2012-4681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5068">CVE-2012-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5070">CVE-2012-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5074">CVE-2012-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5076">CVE-2012-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5077">CVE-2012-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5085">CVE-2012-5085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5086">CVE-2012-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5087">CVE-2012-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5088">CVE-2012-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0422">CVE-2013-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0429">CVE-2013-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0431">CVE-2013-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0444">CVE-2013-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1475">CVE-2013-1475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1484">CVE-2013-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1485">CVE-2013-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1488">CVE-2013-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1518">CVE-2013-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2415">CVE-2013-2415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2421">CVE-2013-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2423">CVE-2013-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2426">CVE-2013-2426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2431">CVE-2013-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2436">CVE-2013-2436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2445">CVE-2013-2445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2449">CVE-2013-2449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2458">CVE-2013-2458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2460">CVE-2013-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2461">CVE-2013-2461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5805">CVE-2013-5805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5806">CVE-2013-5806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5893">CVE-2013-5893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0408">CVE-2014-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0456">CVE-2014-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2397">CVE-2014-2397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2403">CVE-2014-2403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2413">CVE-2014-2413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2483">CVE-2014-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2490">CVE-2014-2490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4209">CVE-2014-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4216">CVE-2014-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4218">CVE-2014-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4219">CVE-2014-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4221">CVE-2014-4221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4223">CVE-2014-4223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4244">CVE-2014-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4252">CVE-2014-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4262">CVE-2014-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4263">CVE-2014-4263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4264">CVE-2014-4264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4266">CVE-2014-4266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4268">CVE-2014-4268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6504">CVE-2014-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6517">CVE-2014-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6519">CVE-2014-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6585">CVE-2014-6585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6587">CVE-2014-6587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6591">CVE-2014-6591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6593">CVE-2014-6593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6601">CVE-2014-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0383">CVE-2015-0383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0395">CVE-2015-0395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0400">CVE-2015-0400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0407">CVE-2015-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0408">CVE-2015-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0410">CVE-2015-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0412">CVE-2015-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3498">CVE-2016-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3503">CVE-2016-3503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908589" comment="java-1_7_0-openjdk-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908590" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908591" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908592" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908593" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908594" comment="java-1_7_0-openjdk-demo-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908595" comment="java-1_7_0-openjdk-devel-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908596" comment="java-1_7_0-openjdk-headless-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908597" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908598" comment="java-1_7_0-openjdk-src-1.7.0.121-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248856" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.7-5.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.7-5.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2977">CVE-2014-2977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2978">CVE-2014-2978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908599" comment="DirectFB-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908600" comment="DirectFB-Mesa-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908601" comment="DirectFB-devel-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908602" comment="DirectFB-devel-32bit-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908603" comment="DirectFB-doc-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908604" comment="DirectFB-libSDL-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908605" comment="DirectFB-libvncclient-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908606" comment="lib++dfb-1_7-7-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908607" comment="lib++dfb-devel-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908608" comment="libdirectfb-1_7-7-1.7.7-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908609" comment="libdirectfb-1_7-7-32bit-1.7.7-5.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248857" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.12-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.12-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1753">CVE-2013-1753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908610" comment="libpython2_7-1_0-2.7.12-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908611" comment="libpython2_7-1_0-32bit-2.7.12-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908612" comment="python-base-2.7.12-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908613" comment="python-base-32bit-2.7.12-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908614" comment="python-devel-2.7.12-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908615" comment="python-xml-2.7.12-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248858" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.0.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-4009" ref_url="https://www.suse.com/security/cve/CVE-2009-4009/" source="CVE"/>
		<reference ref_id="CVE-2014-8601" ref_url="https://www.suse.com/security/cve/CVE-2014-8601/" source="CVE"/>
		<reference ref_id="CVE-2015-1868" ref_url="https://www.suse.com/security/cve/CVE-2015-1868/" source="CVE"/>
		<reference ref_id="CVE-2016-6172" ref_url="https://www.suse.com/security/cve/CVE-2016-6172/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.0.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4009/">CVE-2009-4009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4009">CVE-2009-4009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8601/">CVE-2014-8601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8601">CVE-2014-8601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1868/">CVE-2015-1868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1868">CVE-2015-1868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6172/">CVE-2016-6172 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6172">CVE-2016-6172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908616" comment="pdns-recursor-4.0.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248859" version="1" class="patch">
	<metadata>
		<title>libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2411" ref_url="https://www.suse.com/security/cve/CVE-2009-2411/" source="CVE"/>
		<reference ref_id="CVE-2010-3315" ref_url="https://www.suse.com/security/cve/CVE-2010-3315/" source="CVE"/>
		<reference ref_id="CVE-2010-4539" ref_url="https://www.suse.com/security/cve/CVE-2010-4539/" source="CVE"/>
		<reference ref_id="CVE-2010-4644" ref_url="https://www.suse.com/security/cve/CVE-2010-4644/" source="CVE"/>
		<reference ref_id="CVE-2011-0715" ref_url="https://www.suse.com/security/cve/CVE-2011-0715/" source="CVE"/>
		<reference ref_id="CVE-2011-1752" ref_url="https://www.suse.com/security/cve/CVE-2011-1752/" source="CVE"/>
		<reference ref_id="CVE-2011-1783" ref_url="https://www.suse.com/security/cve/CVE-2011-1783/" source="CVE"/>
		<reference ref_id="CVE-2011-1921" ref_url="https://www.suse.com/security/cve/CVE-2011-1921/" source="CVE"/>
		<reference ref_id="CVE-2013-1845" ref_url="https://www.suse.com/security/cve/CVE-2013-1845/" source="CVE"/>
		<reference ref_id="CVE-2013-1846" ref_url="https://www.suse.com/security/cve/CVE-2013-1846/" source="CVE"/>
		<reference ref_id="CVE-2013-1847" ref_url="https://www.suse.com/security/cve/CVE-2013-1847/" source="CVE"/>
		<reference ref_id="CVE-2013-1849" ref_url="https://www.suse.com/security/cve/CVE-2013-1849/" source="CVE"/>
		<reference ref_id="CVE-2013-1884" ref_url="https://www.suse.com/security/cve/CVE-2013-1884/" source="CVE"/>
		<reference ref_id="CVE-2013-1968" ref_url="https://www.suse.com/security/cve/CVE-2013-1968/" source="CVE"/>
		<reference ref_id="CVE-2013-2088" ref_url="https://www.suse.com/security/cve/CVE-2013-2088/" source="CVE"/>
		<reference ref_id="CVE-2013-2112" ref_url="https://www.suse.com/security/cve/CVE-2013-2112/" source="CVE"/>
		<reference ref_id="CVE-2013-4131" ref_url="https://www.suse.com/security/cve/CVE-2013-4131/" source="CVE"/>
		<reference ref_id="CVE-2013-4246" ref_url="https://www.suse.com/security/cve/CVE-2013-4246/" source="CVE"/>
		<reference ref_id="CVE-2013-4262" ref_url="https://www.suse.com/security/cve/CVE-2013-4262/" source="CVE"/>
		<reference ref_id="CVE-2013-4277" ref_url="https://www.suse.com/security/cve/CVE-2013-4277/" source="CVE"/>
		<reference ref_id="CVE-2013-4505" ref_url="https://www.suse.com/security/cve/CVE-2013-4505/" source="CVE"/>
		<reference ref_id="CVE-2013-4558" ref_url="https://www.suse.com/security/cve/CVE-2013-4558/" source="CVE"/>
		<reference ref_id="CVE-2014-0032" ref_url="https://www.suse.com/security/cve/CVE-2014-0032/" source="CVE"/>
		<reference ref_id="CVE-2014-3522" ref_url="https://www.suse.com/security/cve/CVE-2014-3522/" source="CVE"/>
		<reference ref_id="CVE-2014-3528" ref_url="https://www.suse.com/security/cve/CVE-2014-3528/" source="CVE"/>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<reference ref_id="CVE-2015-0202" ref_url="https://www.suse.com/security/cve/CVE-2015-0202/" source="CVE"/>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<reference ref_id="CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184/" source="CVE"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<reference ref_id="CVE-2015-5259" ref_url="https://www.suse.com/security/cve/CVE-2015-5259/" source="CVE"/>
		<reference ref_id="CVE-2015-5343" ref_url="https://www.suse.com/security/cve/CVE-2015-5343/" source="CVE"/>
		<reference ref_id="CVE-2016-2167" ref_url="https://www.suse.com/security/cve/CVE-2016-2167/" source="CVE"/>
		<reference ref_id="CVE-2016-2168" ref_url="https://www.suse.com/security/cve/CVE-2016-2168/" source="CVE"/>
		<reference ref_id="CVE-2016-8734" ref_url="https://www.suse.com/security/cve/CVE-2016-8734/" source="CVE"/>
		<description>
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2411/">CVE-2009-2411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2411">CVE-2009-2411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3315/">CVE-2010-3315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3315">CVE-2010-3315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4539/">CVE-2010-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4539">CVE-2010-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4644/">CVE-2010-4644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4644">CVE-2010-4644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0715/">CVE-2011-0715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0715">CVE-2011-0715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1752/">CVE-2011-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1752">CVE-2011-1752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1783/">CVE-2011-1783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1783">CVE-2011-1783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1921/">CVE-2011-1921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1921">CVE-2011-1921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1845/">CVE-2013-1845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1845">CVE-2013-1845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1846/">CVE-2013-1846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1846">CVE-2013-1846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1847/">CVE-2013-1847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1847">CVE-2013-1847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1849/">CVE-2013-1849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1849">CVE-2013-1849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1884/">CVE-2013-1884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1884">CVE-2013-1884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1968/">CVE-2013-1968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1968">CVE-2013-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2088/">CVE-2013-2088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2088">CVE-2013-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2112/">CVE-2013-2112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2112">CVE-2013-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4131/">CVE-2013-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4131">CVE-2013-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4246/">CVE-2013-4246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4246">CVE-2013-4246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4262/">CVE-2013-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4262">CVE-2013-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4277/">CVE-2013-4277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4277">CVE-2013-4277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4505/">CVE-2013-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4505">CVE-2013-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4558/">CVE-2013-4558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4558">CVE-2013-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0032/">CVE-2014-0032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0032">CVE-2014-0032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3522/">CVE-2014-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3522">CVE-2014-3522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3528/">CVE-2014-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3528">CVE-2014-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3580">CVE-2014-3580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8108">CVE-2014-8108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0202/">CVE-2015-0202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0202">CVE-2015-0202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0248">CVE-2015-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0251">CVE-2015-0251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3184">CVE-2015-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3187">CVE-2015-3187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5259/">CVE-2015-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5259">CVE-2015-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5343/">CVE-2015-5343 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5343">CVE-2015-5343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2167/">CVE-2016-2167 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2167">CVE-2016-2167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2168/">CVE-2016-2168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2168">CVE-2016-2168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8734/">CVE-2016-8734 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8734">CVE-2016-8734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908617" comment="libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908618" comment="libsvn_auth_kwallet-1-0-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908619" comment="subversion-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908620" comment="subversion-bash-completion-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908621" comment="subversion-devel-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908622" comment="subversion-perl-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908623" comment="subversion-python-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908624" comment="subversion-python-ctypes-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908625" comment="subversion-ruby-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908626" comment="subversion-server-1.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908627" comment="subversion-tools-1.9.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248860" version="1" class="patch">
	<metadata>
		<title>freexl-devel-1.0.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-2753" ref_url="https://www.suse.com/security/cve/CVE-2015-2753/" source="CVE"/>
		<reference ref_id="CVE-2015-2754" ref_url="https://www.suse.com/security/cve/CVE-2015-2754/" source="CVE"/>
		<reference ref_id="CVE-2015-2776" ref_url="https://www.suse.com/security/cve/CVE-2015-2776/" source="CVE"/>
		<description>
These are all security issues fixed in the freexl-devel-1.0.2-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2753/">CVE-2015-2753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2753">CVE-2015-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2754/">CVE-2015-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2754">CVE-2015-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2776/">CVE-2015-2776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2776">CVE-2015-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908628" comment="freexl-devel-1.0.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908629" comment="libfreexl1-1.0.2-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248861" version="1" class="patch">
	<metadata>
		<title>python3-urllib3-1.18.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-urllib3-1.18.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908630" comment="python3-urllib3-1.18.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248862" version="1" class="patch">
	<metadata>
		<title>jbigkit-2.1-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the jbigkit-2.1-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6369">CVE-2013-6369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908631" comment="jbigkit-2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908632" comment="libjbig-devel-2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908633" comment="libjbig-devel-32bit-2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908634" comment="libjbig2-2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908635" comment="libjbig2-32bit-2.1-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248863" version="1" class="patch">
	<metadata>
		<title>cpp5-5.4.1+r240125-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp5-5.4.1+r240125-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908636" comment="cpp5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908637" comment="cross-aarch64-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908638" comment="cross-aarch64-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908639" comment="cross-armv6hl-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908640" comment="cross-armv6hl-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908641" comment="cross-armv7hl-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908642" comment="cross-armv7hl-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908643" comment="cross-avr-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908644" comment="cross-avr-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908645" comment="cross-i386-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908646" comment="cross-i386-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908647" comment="cross-m68k-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908648" comment="cross-m68k-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908649" comment="cross-ppc64-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908650" comment="cross-ppc64-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908651" comment="cross-ppc64le-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908652" comment="cross-ppc64le-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908653" comment="cross-s390-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908654" comment="cross-s390-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908655" comment="cross-s390x-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908656" comment="cross-s390x-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908657" comment="cross-sparc-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908658" comment="cross-sparc64-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908659" comment="cross-sparc64-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908660" comment="cross-sparcv9-gcc5-icecream-backend-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908661" comment="gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908662" comment="gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908663" comment="gcc5-ada-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908664" comment="gcc5-ada-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908665" comment="gcc5-c++-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908666" comment="gcc5-c++-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908667" comment="gcc5-fortran-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908668" comment="gcc5-fortran-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908669" comment="gcc5-gij-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908670" comment="gcc5-gij-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908671" comment="gcc5-go-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908672" comment="gcc5-go-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908673" comment="gcc5-info-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908674" comment="gcc5-java-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908675" comment="gcc5-locale-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908676" comment="gcc5-obj-c++-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908677" comment="gcc5-obj-c++-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908678" comment="gcc5-objc-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908679" comment="gcc5-objc-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908680" comment="gcc5-testresults-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908681" comment="libada5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908682" comment="libada5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908683" comment="libasan2-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908684" comment="libasan2-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908685" comment="libatomic1-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908686" comment="libatomic1-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908687" comment="libcilkrts5-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908688" comment="libcilkrts5-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908689" comment="libffi-devel-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908690" comment="libffi-devel-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908691" comment="libffi4-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908692" comment="libffi4-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908693" comment="libgcc_s1-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908694" comment="libgcc_s1-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908695" comment="libgcj-devel-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908696" comment="libgcj-devel-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908697" comment="libgcj-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908698" comment="libgcj-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908699" comment="libgcj-jar-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908700" comment="libgcj_bc1-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908701" comment="libgfortran3-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908702" comment="libgfortran3-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908703" comment="libgo7-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908704" comment="libgo7-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908705" comment="libgomp1-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908706" comment="libgomp1-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908707" comment="libitm1-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908708" comment="libitm1-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908709" comment="liblsan0-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908710" comment="libmpx0-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908711" comment="libmpx0-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908712" comment="libmpxwrappers0-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908713" comment="libmpxwrappers0-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908714" comment="libobjc4-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908715" comment="libobjc4-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908716" comment="libquadmath0-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908717" comment="libquadmath0-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908718" comment="libstdc++6-devel-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908719" comment="libstdc++6-devel-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908720" comment="libstdc++6-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908721" comment="libstdc++6-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908722" comment="libstdc++6-gcc5-doc-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908723" comment="libstdc++6-gcc5-locale-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908724" comment="libtsan0-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908725" comment="libubsan0-gcc5-5.4.1+r240125-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908726" comment="libubsan0-gcc5-32bit-5.4.1+r240125-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248864" version="1" class="patch">
	<metadata>
		<title>python-mysql-connector-python-2.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5598" ref_url="https://www.suse.com/security/cve/CVE-2016-5598/" source="CVE"/>
		<description>
These are all security issues fixed in the python-mysql-connector-python-2.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5598/">CVE-2016-5598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5598">CVE-2016-5598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908727" comment="python-mysql-connector-python-2.1.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248865" version="1" class="patch">
	<metadata>
		<title>alsa-1.1.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.1.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0035">CVE-2009-0035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908728" comment="alsa-1.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908729" comment="alsa-devel-1.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908730" comment="alsa-devel-32bit-1.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908731" comment="alsa-docs-1.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908732" comment="libasound2-1.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908733" comment="libasound2-32bit-1.1.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248866" version="1" class="patch">
	<metadata>
		<title>perl-CGI-Simple-1.115-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-CGI-Simple-1.115-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908734" comment="perl-CGI-Simple-1.115-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248867" version="1" class="patch">
	<metadata>
		<title>libotr-devel-4.1.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr-devel-4.1.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2851">CVE-2016-2851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908735" comment="libotr-devel-4.1.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908736" comment="libotr-tools-4.1.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908737" comment="libotr5-4.1.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248868" version="1" class="patch">
	<metadata>
		<title>gajim-0.16.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2093" ref_url="https://www.suse.com/security/cve/CVE-2012-2093/" source="CVE"/>
		<reference ref_id="CVE-2015-8688" ref_url="https://www.suse.com/security/cve/CVE-2015-8688/" source="CVE"/>
		<description>
These are all security issues fixed in the gajim-0.16.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2093/">CVE-2012-2093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2093">CVE-2012-2093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8688/">CVE-2015-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8688">CVE-2015-8688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908738" comment="gajim-0.16.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908739" comment="gajim-lang-0.16.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248869" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.2-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2855">CVE-2014-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908740" comment="rsync-3.1.2-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248870" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908741" comment="ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908742" comment="ruby2.2-rubygem-nokogiri-doc-1.6.8.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908743" comment="ruby2.2-rubygem-nokogiri-testsuite-1.6.8.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908744" comment="ruby2.3-rubygem-nokogiri-1.6.8.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908745" comment="ruby2.3-rubygem-nokogiri-doc-1.6.8.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908746" comment="ruby2.3-rubygem-nokogiri-testsuite-1.6.8.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248871" version="1" class="patch">
	<metadata>
		<title>opie-2.4-726.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-726.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908747" comment="opie-2.4-726.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908748" comment="opie-32bit-2.4-726.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248872" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.18p1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.18p1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1163">CVE-2010-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1646">CVE-2010-1646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0010">CVE-2011-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908749" comment="sudo-1.8.18p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908750" comment="sudo-devel-1.8.18p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908751" comment="sudo-test-1.8.18p1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248873" version="1" class="patch">
	<metadata>
		<title>redis-3.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7458" ref_url="https://www.suse.com/security/cve/CVE-2013-7458/" source="CVE"/>
		<reference ref_id="CVE-2016-8339" ref_url="https://www.suse.com/security/cve/CVE-2016-8339/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-3.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7458/">CVE-2013-7458 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7458">CVE-2013-7458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8339/">CVE-2016-8339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8339">CVE-2016-8339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908752" comment="redis-3.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248874" version="1" class="patch">
	<metadata>
		<title>openconnect-7.07-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3291" ref_url="https://www.suse.com/security/cve/CVE-2012-3291/" source="CVE"/>
		<reference ref_id="CVE-2012-6128" ref_url="https://www.suse.com/security/cve/CVE-2012-6128/" source="CVE"/>
		<reference ref_id="CVE-2013-7098" ref_url="https://www.suse.com/security/cve/CVE-2013-7098/" source="CVE"/>
		<description>
These are all security issues fixed in the openconnect-7.07-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3291/">CVE-2012-3291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3291">CVE-2012-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6128/">CVE-2012-6128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6128">CVE-2012-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7098/">CVE-2013-7098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7098">CVE-2013-7098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908753" comment="openconnect-7.07-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908754" comment="openconnect-devel-7.07-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908755" comment="openconnect-doc-7.07-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908756" comment="openconnect-lang-7.07-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248875" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2065">CVE-2010-2065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2067">CVE-2010-2067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2233">CVE-2010-2233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3658">CVE-2016-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5321">CVE-2016-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5323">CVE-2016-5323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9297">CVE-2016-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9448">CVE-2016-9448 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908757" comment="libtiff-devel-4.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908758" comment="libtiff-devel-32bit-4.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908759" comment="libtiff5-4.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908760" comment="libtiff5-32bit-4.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908761" comment="tiff-4.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248876" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-150.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-150.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908762" comment="coolkey-1.1.0-150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908763" comment="coolkey-32bit-1.1.0-150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908764" comment="coolkey-devel-1.1.0-150.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248877" version="1" class="patch">
	<metadata>
		<title>ldns-1.6.17-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3581" ref_url="https://www.suse.com/security/cve/CVE-2011-3581/" source="CVE"/>
		<description>
These are all security issues fixed in the ldns-1.6.17-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3581/">CVE-2011-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3581">CVE-2011-3581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908765" comment="ldns-1.6.17-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908766" comment="ldns-devel-1.6.17-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908767" comment="libldns1-1.6.17-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908768" comment="perl-DNS-LDNS-1.6.17-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908769" comment="python-ldns-1.6.17-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248878" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11+git.20130926-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11+git.20130926-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4326">CVE-2013-4326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908770" comment="rtkit-0.11+git.20130926-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248879" version="1" class="patch">
	<metadata>
		<title>radvd-2.11-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-2.11-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908771" comment="radvd-2.11-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248880" version="1" class="patch">
	<metadata>
		<title>libXext-devel-1.3.3-3.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext-devel-1.3.3-3.19 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908772" comment="libXext-devel-1.3.3-3.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908773" comment="libXext-devel-32bit-1.3.3-3.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908774" comment="libXext6-1.3.3-3.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908775" comment="libXext6-32bit-1.3.3-3.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248881" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3466">CVE-2012-3466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908776" comment="gnome-keyring-3.20.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908777" comment="gnome-keyring-32bit-3.20.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908778" comment="gnome-keyring-lang-3.20.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908779" comment="gnome-keyring-pam-3.20.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908780" comment="gnome-keyring-pam-32bit-3.20.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908781" comment="libgck-modules-gnome-keyring-3.20.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248882" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-24.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-24.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908782" comment="mailx-12.5-24.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248883" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-27.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-27.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3700">CVE-2009-3700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3826">CVE-2009-3826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908783" comment="squidGuard-1.4-27.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908784" comment="squidGuard-doc-1.4-27.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248884" version="1" class="patch">
	<metadata>
		<title>openttd-1.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4168" ref_url="https://www.suse.com/security/cve/CVE-2010-4168/" source="CVE"/>
		<reference ref_id="CVE-2012-0049" ref_url="https://www.suse.com/security/cve/CVE-2012-0049/" source="CVE"/>
		<reference ref_id="CVE-2012-3436" ref_url="https://www.suse.com/security/cve/CVE-2012-3436/" source="CVE"/>
		<reference ref_id="CVE-2013-6411" ref_url="https://www.suse.com/security/cve/CVE-2013-6411/" source="CVE"/>
		<description>
These are all security issues fixed in the openttd-1.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4168/">CVE-2010-4168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4168">CVE-2010-4168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0049/">CVE-2012-0049 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0049">CVE-2012-0049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3436/">CVE-2012-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3436">CVE-2012-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6411/">CVE-2013-6411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6411">CVE-2013-6411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908785" comment="openttd-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908786" comment="openttd-data-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908787" comment="openttd-dedicated-1.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248885" version="1" class="patch">
	<metadata>
		<title>apache2-mod_fcgid-2.3.9-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-3872" ref_url="https://www.suse.com/security/cve/CVE-2010-3872/" source="CVE"/>
		<reference ref_id="CVE-2013-4365" ref_url="https://www.suse.com/security/cve/CVE-2013-4365/" source="CVE"/>
		<reference ref_id="CVE-2016-1000104" ref_url="https://www.suse.com/security/cve/CVE-2016-1000104/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_fcgid-2.3.9-7.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3872/">CVE-2010-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3872">CVE-2010-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4365/">CVE-2013-4365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4365">CVE-2013-4365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000104/">CVE-2016-1000104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000104">CVE-2016-1000104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908788" comment="apache2-mod_fcgid-2.3.9-7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248886" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-facter-2.4.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-facter-2.4.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3248">CVE-2014-3248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908789" comment="ruby2.2-rubygem-facter-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908790" comment="ruby2.2-rubygem-facter-doc-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908791" comment="ruby2.2-rubygem-facter-testsuite-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908792" comment="ruby2.2-rubygem-hiera-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908793" comment="ruby2.2-rubygem-hiera-doc-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908794" comment="ruby2.2-rubygem-hiera-testsuite-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908795" comment="ruby2.3-rubygem-facter-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908796" comment="ruby2.3-rubygem-facter-doc-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908797" comment="ruby2.3-rubygem-facter-testsuite-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908798" comment="ruby2.3-rubygem-hiera-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908799" comment="ruby2.3-rubygem-hiera-doc-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908800" comment="ruby2.3-rubygem-hiera-testsuite-1.3.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908801" comment="rubygem-facter-2.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908802" comment="rubygem-hiera-1.3.4-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248887" version="1" class="patch">
	<metadata>
		<title>libidn-devel-1.33-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-devel-1.33-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908803" comment="libidn-devel-1.33-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908804" comment="libidn-tools-1.33-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908805" comment="libidn11-1.33-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908806" comment="libidn11-32bit-1.33-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908807" comment="libidn2-0-0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908808" comment="libidn2-0-32bit-0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908809" comment="libidn2-devel-0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908810" comment="libidn2-tools-0.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248888" version="1" class="patch">
	<metadata>
		<title>python-Pillow-3.1.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3589" ref_url="https://www.suse.com/security/cve/CVE-2014-3589/" source="CVE"/>
		<reference ref_id="CVE-2014-3598" ref_url="https://www.suse.com/security/cve/CVE-2014-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-0740" ref_url="https://www.suse.com/security/cve/CVE-2016-0740/" source="CVE"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Pillow-3.1.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3589/">CVE-2014-3589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3589">CVE-2014-3589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3598/">CVE-2014-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3598">CVE-2014-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0740/">CVE-2016-0740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0740">CVE-2016-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0775">CVE-2016-0775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908811" comment="python-Pillow-3.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908812" comment="python-Pillow-tk-3.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248889" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.5.4-4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.5.4-4.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908813" comment="libapr-util1-1.5.4-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908814" comment="libapr-util1-dbd-mysql-1.5.4-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908815" comment="libapr-util1-dbd-pgsql-1.5.4-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908816" comment="libapr-util1-dbd-sqlite3-1.5.4-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908817" comment="libapr-util1-devel-1.5.4-4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248890" version="1" class="patch">
	<metadata>
		<title>libserf-1-1-1.3.9-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3504" ref_url="https://www.suse.com/security/cve/CVE-2014-3504/" source="CVE"/>
		<description>
These are all security issues fixed in the libserf-1-1-1.3.9-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3504/">CVE-2014-3504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3504">CVE-2014-3504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908818" comment="libserf-1-1-1.3.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908819" comment="libserf-devel-1.3.9-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248891" version="1" class="patch">
	<metadata>
		<title>elfutils-0.167-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.167-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0172">CVE-2014-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908820" comment="elfutils-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908821" comment="elfutils-lang-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908822" comment="libasm-devel-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908823" comment="libasm1-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908824" comment="libasm1-32bit-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908825" comment="libdw-devel-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908826" comment="libdw1-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908827" comment="libdw1-32bit-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908828" comment="libebl-devel-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908829" comment="libebl1-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908830" comment="libebl1-32bit-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908831" comment="libelf-devel-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908832" comment="libelf-devel-32bit-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908833" comment="libelf1-0.167-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908834" comment="libelf1-32bit-0.167-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248892" version="1" class="patch">
	<metadata>
		<title>clamav-0.99.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.99.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908835" comment="clamav-0.99.2-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248893" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.14.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.14.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1856">CVE-2016-1856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1857">CVE-2016-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4590">CVE-2016-4590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4591">CVE-2016-4591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4622">CVE-2016-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4624">CVE-2016-4624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908836" comment="libjavascriptcoregtk-4_0-18-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908837" comment="libjavascriptcoregtk-4_0-18-32bit-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908838" comment="libwebkit2gtk-4_0-37-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908839" comment="libwebkit2gtk-4_0-37-32bit-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908840" comment="libwebkit2gtk3-lang-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908841" comment="typelib-1_0-JavaScriptCore-4_0-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908842" comment="typelib-1_0-WebKit2-4_0-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908843" comment="typelib-1_0-WebKit2WebExtension-4_0-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908844" comment="webkit-jsc-4-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908845" comment="webkit2gtk-4_0-injected-bundles-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908846" comment="webkit2gtk3-devel-2.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908847" comment="webkit2gtk3-plugin-process-gtk2-2.14.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248894" version="1" class="patch">
	<metadata>
		<title>nbd-3.13-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0847" ref_url="https://www.suse.com/security/cve/CVE-2015-0847/" source="CVE"/>
		<description>
These are all security issues fixed in the nbd-3.13-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0847/">CVE-2015-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0847">CVE-2015-0847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908848" comment="nbd-3.13-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908849" comment="nbd-doc-3.13-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248895" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-activesupport-4_2-4.2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3226" ref_url="https://www.suse.com/security/cve/CVE-2015-3226/" source="CVE"/>
		<reference ref_id="CVE-2015-3227" ref_url="https://www.suse.com/security/cve/CVE-2015-3227/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-activesupport-4_2-4.2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3226/">CVE-2015-3226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3226">CVE-2015-3226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3227/">CVE-2015-3227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3227">CVE-2015-3227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908850" comment="ruby2.2-rubygem-activesupport-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908851" comment="ruby2.2-rubygem-activesupport-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908852" comment="ruby2.2-rubygem-activesupport-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908853" comment="ruby2.2-rubygem-activesupport-doc-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908854" comment="ruby2.3-rubygem-activesupport-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908855" comment="ruby2.3-rubygem-activesupport-5_0-5.0.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908856" comment="ruby2.3-rubygem-activesupport-doc-4_2-4.2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908857" comment="ruby2.3-rubygem-activesupport-doc-5_0-5.0.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248896" version="1" class="patch">
	<metadata>
		<title>csound-5.18.02-7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-0270" ref_url="https://www.suse.com/security/cve/CVE-2012-0270/" source="CVE"/>
		<reference ref_id="CVE-2012-2106" ref_url="https://www.suse.com/security/cve/CVE-2012-2106/" source="CVE"/>
		<reference ref_id="CVE-2012-2107" ref_url="https://www.suse.com/security/cve/CVE-2012-2107/" source="CVE"/>
		<reference ref_id="CVE-2012-2108" ref_url="https://www.suse.com/security/cve/CVE-2012-2108/" source="CVE"/>
		<description>
These are all security issues fixed in the csound-5.18.02-7.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0270/">CVE-2012-0270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0270">CVE-2012-0270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2106/">CVE-2012-2106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2106">CVE-2012-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2107/">CVE-2012-2107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2107">CVE-2012-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2108/">CVE-2012-2108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2108">CVE-2012-2108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908858" comment="csound-5.18.02-7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908859" comment="csound-devel-5.18.02-7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248897" version="1" class="patch">
	<metadata>
		<title>gv-3.7.4-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the gv-3.7.4-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908860" comment="gv-3.7.4-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908861" comment="wdiff-1.2.2-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908862" comment="wdiff-lang-1.2.2-5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248898" version="1" class="patch">
	<metadata>
		<title>gromacs-2016.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4001" ref_url="https://www.suse.com/security/cve/CVE-2010-4001/" source="CVE"/>
		<description>
These are all security issues fixed in the gromacs-2016.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4001/">CVE-2010-4001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4001">CVE-2010-4001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908863" comment="gromacs-2016.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908864" comment="gromacs-bash-2016.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908865" comment="gromacs-devel-2016.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908866" comment="gromacs-doc-2016.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908867" comment="gromacs-openmpi-2016.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908868" comment="libgromacs2-2016.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248899" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908869" comment="libpango-1_0-0-1.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908870" comment="libpango-1_0-0-32bit-1.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908871" comment="pango-devel-1.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908872" comment="pango-devel-32bit-1.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908873" comment="pango-tools-1.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908874" comment="typelib-1_0-Pango-1_0-1.40.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248900" version="1" class="patch">
	<metadata>
		<title>strongswan-5.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0790">CVE-2009-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2388">CVE-2012-2388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6075">CVE-2013-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6076">CVE-2013-6076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9221">CVE-2014-9221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3991">CVE-2015-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908875" comment="strongswan-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908876" comment="strongswan-doc-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908877" comment="strongswan-hmac-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908878" comment="strongswan-ipsec-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908879" comment="strongswan-libs0-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908880" comment="strongswan-mysql-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908881" comment="strongswan-nm-5.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908882" comment="strongswan-sqlite-5.3.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248901" version="1" class="patch">
	<metadata>
		<title>httrack-3.48.22-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-0797" ref_url="https://www.suse.com/security/cve/CVE-2004-0797/" source="CVE"/>
		<reference ref_id="CVE-2005-2096" ref_url="https://www.suse.com/security/cve/CVE-2005-2096/" source="CVE"/>
		<reference ref_id="CVE-2010-5252" ref_url="https://www.suse.com/security/cve/CVE-2010-5252/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<description>
These are all security issues fixed in the httrack-3.48.22-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0797/">CVE-2004-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0797">CVE-2004-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2096/">CVE-2005-2096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2096">CVE-2005-2096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5252/">CVE-2010-5252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5252">CVE-2010-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908883" comment="httrack-3.48.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908884" comment="httrack-devel-3.48.22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908885" comment="libhttrack2-3.48.22-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248902" version="1" class="patch">
	<metadata>
		<title>ruby2.2-rubygem-puppet-3.8.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.2-rubygem-puppet-3.8.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3848">CVE-2011-3848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3872">CVE-2011-3872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3864">CVE-2012-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3865">CVE-2012-3865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3866">CVE-2012-3866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3867">CVE-2012-3867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3567">CVE-2013-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4761">CVE-2013-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4956">CVE-2013-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3248">CVE-2014-3248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3253">CVE-2014-3253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908886" comment="ruby2.2-rubygem-puppet-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908887" comment="ruby2.2-rubygem-puppet-doc-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908888" comment="ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908889" comment="ruby2.3-rubygem-puppet-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908890" comment="ruby2.3-rubygem-puppet-doc-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908891" comment="ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908892" comment="rubygem-puppet-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908893" comment="rubygem-puppet-emacs-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908894" comment="rubygem-puppet-master-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908895" comment="rubygem-puppet-master-unicorn-3.8.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908896" comment="rubygem-puppet-vim-3.8.7-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248903" version="1" class="patch">
	<metadata>
		<title>curl-7.79.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1061" ref_url="https://www.suse.com/security/cve/CVE-2006-1061/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-15601" ref_url="https://www.suse.com/security/cve/CVE-2019-15601/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435/" source="CVE"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169/" source="CVE"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<reference ref_id="CVE-2021-22297" ref_url="https://www.suse.com/security/cve/CVE-2021-22297/" source="CVE"/>
		<reference ref_id="CVE-2021-22298" ref_url="https://www.suse.com/security/cve/CVE-2021-22298/" source="CVE"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890/" source="CVE"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="CVE-2021-22901" ref_url="https://www.suse.com/security/cve/CVE-2021-22901/" source="CVE"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22945" ref_url="https://www.suse.com/security/cve/CVE-2021-22945/" source="CVE"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.79.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1061/">CVE-2006-1061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1061">CVE-2006-1061 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9594">CVE-2016-9594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000099">CVE-2017-1000099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000101">CVE-2017-1000101 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2629">CVE-2017-2629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7468">CVE-2017-7468 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8816">CVE-2017-8816 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8817">CVE-2017-8817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8818">CVE-2017-8818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9502">CVE-2017-9502 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0500">CVE-2018-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000005">CVE-2018-1000005 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000300">CVE-2018-1000300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15601/">CVE-2019-15601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15601">CVE-2019-15601 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5435">CVE-2019-5435 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5481">CVE-2019-5481 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">CVE-2020-8169 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8286">CVE-2020-8286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22297/">CVE-2021-22297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-22297">CVE-2021-22297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22298/">CVE-2021-22298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22298">CVE-2021-22298 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890">CVE-2021-22890 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22901/">CVE-2021-22901 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901">CVE-2021-22901 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22945/">CVE-2021-22945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908897" comment="curl-7.79.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908898" comment="libcurl-devel-7.79.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908899" comment="libcurl-devel-32bit-7.79.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908900" comment="libcurl4-7.79.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908901" comment="libcurl4-32bit-7.79.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248904" version="1" class="patch">
	<metadata>
		<title>frr-7.5.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12831" ref_url="https://www.suse.com/security/cve/CVE-2020-12831/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-7.5.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12831/">CVE-2020-12831 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12831">CVE-2020-12831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908902" comment="frr-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908903" comment="frr-devel-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908904" comment="libfrr0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908905" comment="libfrr_pb0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908906" comment="libfrrcares0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908907" comment="libfrrfpm_pb0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908908" comment="libfrrospfapiclient0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908909" comment="libfrrsnmp0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908910" comment="libfrrzmq0-7.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908911" comment="libmlag_pb0-7.5.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248905" version="1" class="patch">
	<metadata>
		<title>icecast-2.4.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-0837" ref_url="https://www.suse.com/security/cve/CVE-2005-0837/" source="CVE"/>
		<reference ref_id="CVE-2018-18820" ref_url="https://www.suse.com/security/cve/CVE-2018-18820/" source="CVE"/>
		<description>
These are all security issues fixed in the icecast-2.4.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0837/">CVE-2005-0837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0837">CVE-2005-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18820/">CVE-2018-18820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18820">CVE-2018-18820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908912" comment="icecast-2.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908913" comment="icecast-doc-2.4.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248906" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.59-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1869" ref_url="https://www.suse.com/security/cve/CVE-2007-1869/" source="CVE"/>
		<reference ref_id="CVE-2007-1870" ref_url="https://www.suse.com/security/cve/CVE-2007-1870/" source="CVE"/>
		<reference ref_id="CVE-2008-0983" ref_url="https://www.suse.com/security/cve/CVE-2008-0983/" source="CVE"/>
		<reference ref_id="CVE-2008-1111" ref_url="https://www.suse.com/security/cve/CVE-2008-1111/" source="CVE"/>
		<reference ref_id="CVE-2008-1270" ref_url="https://www.suse.com/security/cve/CVE-2008-1270/" source="CVE"/>
		<reference ref_id="CVE-2008-1531" ref_url="https://www.suse.com/security/cve/CVE-2008-1531/" source="CVE"/>
		<reference ref_id="CVE-2008-4359" ref_url="https://www.suse.com/security/cve/CVE-2008-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-19052" ref_url="https://www.suse.com/security/cve/CVE-2018-19052/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.59-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1869/">CVE-2007-1869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1869">CVE-2007-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1870/">CVE-2007-1870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1870">CVE-2007-1870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0983/">CVE-2008-0983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0983">CVE-2008-0983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1111/">CVE-2008-1111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1111">CVE-2008-1111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1270/">CVE-2008-1270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1270">CVE-2008-1270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1531/">CVE-2008-1531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1531">CVE-2008-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4359/">CVE-2008-4359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4359">CVE-2008-4359 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19052/">CVE-2018-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19052">CVE-2018-19052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908914" comment="lighttpd-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908915" comment="lighttpd-mod_authn_gssapi-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908916" comment="lighttpd-mod_authn_ldap-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908917" comment="lighttpd-mod_authn_mysql-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908918" comment="lighttpd-mod_authn_pam-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908919" comment="lighttpd-mod_authn_sasl-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908920" comment="lighttpd-mod_cml-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908921" comment="lighttpd-mod_magnet-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908922" comment="lighttpd-mod_maxminddb-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908923" comment="lighttpd-mod_mysql_vhost-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908924" comment="lighttpd-mod_rrdtool-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908925" comment="lighttpd-mod_trigger_b4_dl-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908926" comment="lighttpd-mod_vhostdb_dbi-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908927" comment="lighttpd-mod_vhostdb_ldap-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908928" comment="lighttpd-mod_vhostdb_mysql-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908929" comment="lighttpd-mod_vhostdb_pgsql-1.4.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908930" comment="lighttpd-mod_webdav-1.4.59-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248907" version="1" class="patch">
	<metadata>
		<title>mercurial-5.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2942" ref_url="https://www.suse.com/security/cve/CVE-2008-2942/" source="CVE"/>
		<reference ref_id="CVE-2017-1000115" ref_url="https://www.suse.com/security/cve/CVE-2017-1000115/" source="CVE"/>
		<reference ref_id="CVE-2017-1000116" ref_url="https://www.suse.com/security/cve/CVE-2017-1000116/" source="CVE"/>
		<reference ref_id="CVE-2017-17458" ref_url="https://www.suse.com/security/cve/CVE-2017-17458/" source="CVE"/>
		<reference ref_id="CVE-2018-1000132" ref_url="https://www.suse.com/security/cve/CVE-2018-1000132/" source="CVE"/>
		<reference ref_id="CVE-2018-13346" ref_url="https://www.suse.com/security/cve/CVE-2018-13346/" source="CVE"/>
		<reference ref_id="CVE-2018-13348" ref_url="https://www.suse.com/security/cve/CVE-2018-13348/" source="CVE"/>
		<reference ref_id="CVE-2018-17983" ref_url="https://www.suse.com/security/cve/CVE-2018-17983/" source="CVE"/>
		<reference ref_id="CVE-2019-3902" ref_url="https://www.suse.com/security/cve/CVE-2019-3902/" source="CVE"/>
		<description>
These are all security issues fixed in the mercurial-5.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2942/">CVE-2008-2942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2942">CVE-2008-2942 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000115/">CVE-2017-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000115">CVE-2017-1000115 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000116/">CVE-2017-1000116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000116">CVE-2017-1000116 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17458/">CVE-2017-17458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17458">CVE-2017-17458 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000132/">CVE-2018-1000132 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000132">CVE-2018-1000132 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13346/">CVE-2018-13346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13346">CVE-2018-13346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13348/">CVE-2018-13348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13348">CVE-2018-13348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17983/">CVE-2018-17983 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17983">CVE-2018-17983 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3902/">CVE-2019-3902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3902">CVE-2019-3902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908931" comment="mercurial-5.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908932" comment="mercurial-lang-5.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908933" comment="mercurial-tests-5.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248908" version="1" class="patch">
	<metadata>
		<title>ocaml-4.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9772" ref_url="https://www.suse.com/security/cve/CVE-2017-9772/" source="CVE"/>
		<reference ref_id="CVE-2018-9838" ref_url="https://www.suse.com/security/cve/CVE-2018-9838/" source="CVE"/>
		<description>
These are all security issues fixed in the ocaml-4.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9772/">CVE-2017-9772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9772">CVE-2017-9772 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9838/">CVE-2018-9838 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9838">CVE-2018-9838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908934" comment="ocaml-4.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908935" comment="ocaml-compiler-libs-4.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908936" comment="ocaml-compiler-libs-devel-4.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908937" comment="ocaml-ocamldoc-4.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908938" comment="ocaml-runtime-4.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908939" comment="ocaml-source-4.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248909" version="1" class="patch">
	<metadata>
		<title>rawtherapee-5.8-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885/" source="CVE"/>
		<description>
These are all security issues fixed in the rawtherapee-5.8-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3885">CVE-2015-3885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908940" comment="rawtherapee-5.8-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248910" version="1" class="patch">
	<metadata>
		<title>rmt-server-2.6.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-16470" ref_url="https://www.suse.com/security/cve/CVE-2018-16470/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2019-18904" ref_url="https://www.suse.com/security/cve/CVE-2019-18904/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<reference ref_id="CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<description>
These are all security issues fixed in the rmt-server-2.6.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16470/">CVE-2018-16470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16470">CVE-2018-16470 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18904/">CVE-2019-18904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18904">CVE-2019-18904 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5419">CVE-2019-5419 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5420">CVE-2019-5420 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15169">CVE-2020-15169 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8164">CVE-2020-8164 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8166">CVE-2020-8166 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8167">CVE-2020-8167 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8185">CVE-2020-8185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908941" comment="rmt-server-2.6.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908942" comment="rmt-server-config-2.6.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908943" comment="rmt-server-pubcloud-2.6.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248911" version="1" class="patch">
	<metadata>
		<title>seamonkey-2.53.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4879" ref_url="https://www.suse.com/security/cve/CVE-2007-4879/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1233" ref_url="https://www.suse.com/security/cve/CVE-2008-1233/" source="CVE"/>
		<reference ref_id="CVE-2008-1236" ref_url="https://www.suse.com/security/cve/CVE-2008-1236/" source="CVE"/>
		<reference ref_id="CVE-2008-1238" ref_url="https://www.suse.com/security/cve/CVE-2008-1238/" source="CVE"/>
		<reference ref_id="CVE-2008-1241" ref_url="https://www.suse.com/security/cve/CVE-2008-1241/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4879/">CVE-2007-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4879">CVE-2007-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1195">CVE-2008-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1233/">CVE-2008-1233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1233">CVE-2008-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1236/">CVE-2008-1236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1236">CVE-2008-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1238/">CVE-2008-1238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1238">CVE-2008-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1241/">CVE-2008-1241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1241">CVE-2008-1241 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908944" comment="seamonkey-2.53.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908945" comment="seamonkey-dom-inspector-2.53.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908946" comment="seamonkey-irc-2.53.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248912" version="1" class="patch">
	<metadata>
		<title>libXvnc-devel-1.10.1-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc-devel-1.10.1-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908947" comment="libXvnc-devel-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908948" comment="libXvnc1-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908949" comment="tigervnc-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908950" comment="tigervnc-x11vnc-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908951" comment="xorg-x11-Xvnc-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908952" comment="xorg-x11-Xvnc-java-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908953" comment="xorg-x11-Xvnc-module-1.10.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908954" comment="xorg-x11-Xvnc-novnc-1.10.1-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248913" version="1" class="patch">
	<metadata>
		<title>xstream-1.4.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3674" ref_url="https://www.suse.com/security/cve/CVE-2016-3674/" source="CVE"/>
		<reference ref_id="CVE-2017-7957" ref_url="https://www.suse.com/security/cve/CVE-2017-7957/" source="CVE"/>
		<reference ref_id="CVE-2020-26217" ref_url="https://www.suse.com/security/cve/CVE-2020-26217/" source="CVE"/>
		<reference ref_id="CVE-2020-26258" ref_url="https://www.suse.com/security/cve/CVE-2020-26258/" source="CVE"/>
		<reference ref_id="CVE-2020-26259" ref_url="https://www.suse.com/security/cve/CVE-2020-26259/" source="CVE"/>
		<reference ref_id="CVE-2021-21341" ref_url="https://www.suse.com/security/cve/CVE-2021-21341/" source="CVE"/>
		<reference ref_id="CVE-2021-21342" ref_url="https://www.suse.com/security/cve/CVE-2021-21342/" source="CVE"/>
		<reference ref_id="CVE-2021-21343" ref_url="https://www.suse.com/security/cve/CVE-2021-21343/" source="CVE"/>
		<reference ref_id="CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344/" source="CVE"/>
		<reference ref_id="CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345/" source="CVE"/>
		<reference ref_id="CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346/" source="CVE"/>
		<reference ref_id="CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347/" source="CVE"/>
		<reference ref_id="CVE-2021-21348" ref_url="https://www.suse.com/security/cve/CVE-2021-21348/" source="CVE"/>
		<reference ref_id="CVE-2021-21349" ref_url="https://www.suse.com/security/cve/CVE-2021-21349/" source="CVE"/>
		<reference ref_id="CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350/" source="CVE"/>
		<reference ref_id="CVE-2021-21351" ref_url="https://www.suse.com/security/cve/CVE-2021-21351/" source="CVE"/>
		<reference ref_id="CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505/" source="CVE"/>
		<reference ref_id="CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139/" source="CVE"/>
		<reference ref_id="CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144/" source="CVE"/>
		<reference ref_id="CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147/" source="CVE"/>
		<reference ref_id="CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150/" source="CVE"/>
		<reference ref_id="CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153/" source="CVE"/>
		<description>
These are all security issues fixed in the xstream-1.4.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3674/">CVE-2016-3674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3674">CVE-2016-3674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7957/">CVE-2017-7957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7957">CVE-2017-7957 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26217/">CVE-2020-26217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26217">CVE-2020-26217 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26258/">CVE-2020-26258 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26258">CVE-2020-26258 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26259/">CVE-2020-26259 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26259">CVE-2020-26259 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21341/">CVE-2021-21341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21341">CVE-2021-21341 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21342/">CVE-2021-21342 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21342">CVE-2021-21342 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21343/">CVE-2021-21343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21343">CVE-2021-21343 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21344">CVE-2021-21344 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21345">CVE-2021-21345 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21346">CVE-2021-21346 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21347">CVE-2021-21347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21348/">CVE-2021-21348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21348">CVE-2021-21348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21349/">CVE-2021-21349 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21349">CVE-2021-21349 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21350">CVE-2021-21350 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21351/">CVE-2021-21351 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21351">CVE-2021-21351 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29505">CVE-2021-29505 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39139">CVE-2021-39139 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39144">CVE-2021-39144 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39147">CVE-2021-39147 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39150">CVE-2021-39150 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39153">CVE-2021-39153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908955" comment="xstream-1.4.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908956" comment="xstream-benchmark-1.4.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908957" comment="xstream-javadoc-1.4.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908958" comment="xstream-parent-1.4.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248914" version="1" class="patch">
	<metadata>
		<title>389-ds-2.0.10~git0.21dd2802c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-4992" ref_url="https://www.suse.com/security/cve/CVE-2016-4992/" source="CVE"/>
		<reference ref_id="CVE-2017-15134" ref_url="https://www.suse.com/security/cve/CVE-2017-15134/" source="CVE"/>
		<reference ref_id="CVE-2018-1054" ref_url="https://www.suse.com/security/cve/CVE-2018-1054/" source="CVE"/>
		<reference ref_id="CVE-2018-10850" ref_url="https://www.suse.com/security/cve/CVE-2018-10850/" source="CVE"/>
		<reference ref_id="CVE-2018-10871" ref_url="https://www.suse.com/security/cve/CVE-2018-10871/" source="CVE"/>
		<reference ref_id="CVE-2018-1089" ref_url="https://www.suse.com/security/cve/CVE-2018-1089/" source="CVE"/>
		<reference ref_id="CVE-2018-10935" ref_url="https://www.suse.com/security/cve/CVE-2018-10935/" source="CVE"/>
		<reference ref_id="CVE-2018-14624" ref_url="https://www.suse.com/security/cve/CVE-2018-14624/" source="CVE"/>
		<reference ref_id="CVE-2018-14638" ref_url="https://www.suse.com/security/cve/CVE-2018-14638/" source="CVE"/>
		<reference ref_id="CVE-2018-14648" ref_url="https://www.suse.com/security/cve/CVE-2018-14648/" source="CVE"/>
		<reference ref_id="CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-2.0.10~git0.21dd2802c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4992/">CVE-2016-4992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4992">CVE-2016-4992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15134/">CVE-2017-15134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15134">CVE-2017-15134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1054/">CVE-2018-1054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1054">CVE-2018-1054 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10850/">CVE-2018-10850 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10850">CVE-2018-10850 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10871/">CVE-2018-10871 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10871">CVE-2018-10871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1089/">CVE-2018-1089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1089">CVE-2018-1089 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10935/">CVE-2018-10935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10935">CVE-2018-10935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14624/">CVE-2018-14624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14624">CVE-2018-14624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14638/">CVE-2018-14638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14638">CVE-2018-14638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14648/">CVE-2018-14648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14648">CVE-2018-14648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14824">CVE-2019-14824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908959" comment="389-ds-2.0.10~git0.21dd2802c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908960" comment="389-ds-devel-2.0.10~git0.21dd2802c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908961" comment="389-ds-snmp-2.0.10~git0.21dd2802c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908962" comment="lib389-2.0.10~git0.21dd2802c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908963" comment="libsvrcore0-2.0.10~git0.21dd2802c-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248915" version="1" class="patch">
	<metadata>
		<title>Botan-2.18.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9132" ref_url="https://www.suse.com/security/cve/CVE-2016-9132/" source="CVE"/>
		<reference ref_id="CVE-2017-14737" ref_url="https://www.suse.com/security/cve/CVE-2017-14737/" source="CVE"/>
		<reference ref_id="CVE-2017-2801" ref_url="https://www.suse.com/security/cve/CVE-2017-2801/" source="CVE"/>
		<reference ref_id="CVE-2018-12435" ref_url="https://www.suse.com/security/cve/CVE-2018-12435/" source="CVE"/>
		<reference ref_id="CVE-2018-20187" ref_url="https://www.suse.com/security/cve/CVE-2018-20187/" source="CVE"/>
		<reference ref_id="CVE-2018-9127" ref_url="https://www.suse.com/security/cve/CVE-2018-9127/" source="CVE"/>
		<reference ref_id="CVE-2018-9860" ref_url="https://www.suse.com/security/cve/CVE-2018-9860/" source="CVE"/>
		<description>
These are all security issues fixed in the Botan-2.18.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9132/">CVE-2016-9132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9132">CVE-2016-9132 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14737/">CVE-2017-14737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14737">CVE-2017-14737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2801/">CVE-2017-2801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2801">CVE-2017-2801 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12435/">CVE-2018-12435 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12435">CVE-2018-12435 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20187/">CVE-2018-20187 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20187">CVE-2018-20187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9127/">CVE-2018-9127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9127">CVE-2018-9127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9860/">CVE-2018-9860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9860">CVE-2018-9860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908964" comment="Botan-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908965" comment="Botan-doc-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908966" comment="libbotan-2-18-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908967" comment="libbotan-2-18-32bit-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908968" comment="libbotan-devel-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908969" comment="libbotan-devel-32bit-2.18.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908970" comment="python3-botan-2.18.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248916" version="1" class="patch">
	<metadata>
		<title>FlightGear-2020.3.11-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9956" ref_url="https://www.suse.com/security/cve/CVE-2016-9956/" source="CVE"/>
		<description>
These are all security issues fixed in the FlightGear-2020.3.11-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9956/">CVE-2016-9956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9956">CVE-2016-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908971" comment="FlightGear-2020.3.11-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248917" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.36-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-3744" ref_url="https://www.suse.com/security/cve/CVE-2006-3744/" source="CVE"/>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2008-1096" ref_url="https://www.suse.com/security/cve/CVE-2008-1096/" source="CVE"/>
		<reference ref_id="CVE-2008-1097" ref_url="https://www.suse.com/security/cve/CVE-2008-1097/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-9830" ref_url="https://www.suse.com/security/cve/CVE-2016-9830/" source="CVE"/>
		<reference ref_id="CVE-2017-10794" ref_url="https://www.suse.com/security/cve/CVE-2017-10794/" source="CVE"/>
		<reference ref_id="CVE-2017-10799" ref_url="https://www.suse.com/security/cve/CVE-2017-10799/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-6335" ref_url="https://www.suse.com/security/cve/CVE-2017-6335/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2020-12672" ref_url="https://www.suse.com/security/cve/CVE-2020-12672/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.36-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3744/">CVE-2006-3744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3744">CVE-2006-3744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1096/">CVE-2008-1096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1096">CVE-2008-1096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1097/">CVE-2008-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1097">CVE-2008-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7800">CVE-2016-7800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7996">CVE-2016-7996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7997">CVE-2016-7997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9830/">CVE-2016-9830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9830">CVE-2016-9830 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-10794/">CVE-2017-10794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10794">CVE-2017-10794 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10799/">CVE-2017-10799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10799">CVE-2017-10799 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10800">CVE-2017-10800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6335/">CVE-2017-6335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6335">CVE-2017-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8350">CVE-2017-8350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12672/">CVE-2020-12672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12672">CVE-2020-12672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908972" comment="GraphicsMagick-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908973" comment="GraphicsMagick-devel-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908974" comment="libGraphicsMagick++-Q16-12-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908975" comment="libGraphicsMagick++-devel-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908976" comment="libGraphicsMagick-Q16-3-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908977" comment="libGraphicsMagick3-config-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908978" comment="libGraphicsMagickWand-Q16-2-1.3.36-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908979" comment="perl-GraphicsMagick-1.3.36-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248918" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.0.8-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4601" ref_url="https://www.suse.com/security/cve/CVE-2005-4601/" source="CVE"/>
		<reference ref_id="CVE-2006-0082" ref_url="https://www.suse.com/security/cve/CVE-2006-0082/" source="CVE"/>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.0.8-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4601/">CVE-2005-4601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4601">CVE-2005-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0082/">CVE-2006-0082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0082">CVE-2006-0082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9135">CVE-2018-9135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908980" comment="ImageMagick-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908981" comment="ImageMagick-config-7-SUSE-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908982" comment="ImageMagick-config-7-upstream-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908983" comment="ImageMagick-devel-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908984" comment="ImageMagick-devel-32bit-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908985" comment="ImageMagick-doc-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908986" comment="ImageMagick-extra-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908987" comment="libMagick++-7_Q16HDRI5-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908988" comment="libMagick++-7_Q16HDRI5-32bit-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908989" comment="libMagick++-devel-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908990" comment="libMagick++-devel-32bit-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908991" comment="libMagickCore-7_Q16HDRI10-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908992" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908993" comment="libMagickWand-7_Q16HDRI10-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908994" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908995" comment="perl-PerlMagick-7.1.0.8-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248919" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-devel-0.9.13-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-devel-0.9.13-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20023">CVE-2018-20023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908996" comment="LibVNCServer-devel-0.9.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908997" comment="libvncclient1-0.9.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009908998" comment="libvncserver1-0.9.13-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248920" version="1" class="patch">
	<metadata>
		<title>Mesa-21.2.2-287.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-21.2.2-287.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009908999" comment="Mesa-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909000" comment="Mesa-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909001" comment="Mesa-KHR-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909002" comment="Mesa-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909003" comment="Mesa-dri-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909004" comment="Mesa-libEGL-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909005" comment="Mesa-libEGL-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909006" comment="Mesa-libEGL1-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909007" comment="Mesa-libEGL1-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909008" comment="Mesa-libGL-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909009" comment="Mesa-libGL-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909010" comment="Mesa-libGL1-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909011" comment="Mesa-libGL1-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909012" comment="Mesa-libGLESv1_CM-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909013" comment="Mesa-libGLESv1_CM-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909014" comment="Mesa-libGLESv2-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909015" comment="Mesa-libGLESv2-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909016" comment="Mesa-libGLESv3-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909017" comment="Mesa-libglapi-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909018" comment="Mesa-libglapi-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909019" comment="Mesa-libglapi0-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909020" comment="Mesa-libglapi0-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909021" comment="libOSMesa-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909022" comment="libOSMesa-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909023" comment="libOSMesa8-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909024" comment="libOSMesa8-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909025" comment="libgbm-devel-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909026" comment="libgbm-devel-32bit-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909027" comment="libgbm1-21.2.2-287.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909028" comment="libgbm1-32bit-21.2.2-287.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248921" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-92.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381/" source="CVE"/>
		<reference ref_id="CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384/" source="CVE"/>
		<reference ref_id="CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387/" source="CVE"/>
		<reference ref_id="CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388/" source="CVE"/>
		<reference ref_id="CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391/" source="CVE"/>
		<reference ref_id="CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392/" source="CVE"/>
		<reference ref_id="CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393/" source="CVE"/>
		<reference ref_id="CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394/" source="CVE"/>
		<reference ref_id="CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5415" ref_url="https://www.suse.com/security/cve/CVE-2017-5415/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5417" ref_url="https://www.suse.com/security/cve/CVE-2017-5417/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5420" ref_url="https://www.suse.com/security/cve/CVE-2017-5420/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5427" ref_url="https://www.suse.com/security/cve/CVE-2017-5427/" source="CVE"/>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5453" ref_url="https://www.suse.com/security/cve/CVE-2017-5453/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5458" ref_url="https://www.suse.com/security/cve/CVE-2017-5458/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5468" ref_url="https://www.suse.com/security/cve/CVE-2017-5468/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7780" ref_url="https://www.suse.com/security/cve/CVE-2017-7780/" source="CVE"/>
		<reference ref_id="CVE-2017-7781" ref_url="https://www.suse.com/security/cve/CVE-2017-7781/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7783" ref_url="https://www.suse.com/security/cve/CVE-2017-7783/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7788" ref_url="https://www.suse.com/security/cve/CVE-2017-7788/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2017-7790" ref_url="https://www.suse.com/security/cve/CVE-2017-7790/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7794" ref_url="https://www.suse.com/security/cve/CVE-2017-7794/" source="CVE"/>
		<reference ref_id="CVE-2017-7796" ref_url="https://www.suse.com/security/cve/CVE-2017-7796/" source="CVE"/>
		<reference ref_id="CVE-2017-7797" ref_url="https://www.suse.com/security/cve/CVE-2017-7797/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7799" ref_url="https://www.suse.com/security/cve/CVE-2017-7799/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7806" ref_url="https://www.suse.com/security/cve/CVE-2017-7806/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7808" ref_url="https://www.suse.com/security/cve/CVE-2017-7808/" source="CVE"/>
		<reference ref_id="CVE-2017-7809" ref_url="https://www.suse.com/security/cve/CVE-2017-7809/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7811" ref_url="https://www.suse.com/security/cve/CVE-2017-7811/" source="CVE"/>
		<reference ref_id="CVE-2017-7812" ref_url="https://www.suse.com/security/cve/CVE-2017-7812/" source="CVE"/>
		<reference ref_id="CVE-2017-7813" ref_url="https://www.suse.com/security/cve/CVE-2017-7813/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7815" ref_url="https://www.suse.com/security/cve/CVE-2017-7815/" source="CVE"/>
		<reference ref_id="CVE-2017-7816" ref_url="https://www.suse.com/security/cve/CVE-2017-7816/" source="CVE"/>
		<reference ref_id="CVE-2017-7817" ref_url="https://www.suse.com/security/cve/CVE-2017-7817/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7820" ref_url="https://www.suse.com/security/cve/CVE-2017-7820/" source="CVE"/>
		<reference ref_id="CVE-2017-7821" ref_url="https://www.suse.com/security/cve/CVE-2017-7821/" source="CVE"/>
		<reference ref_id="CVE-2017-7822" ref_url="https://www.suse.com/security/cve/CVE-2017-7822/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7827" ref_url="https://www.suse.com/security/cve/CVE-2017-7827/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7831" ref_url="https://www.suse.com/security/cve/CVE-2017-7831/" source="CVE"/>
		<reference ref_id="CVE-2017-7832" ref_url="https://www.suse.com/security/cve/CVE-2017-7832/" source="CVE"/>
		<reference ref_id="CVE-2017-7833" ref_url="https://www.suse.com/security/cve/CVE-2017-7833/" source="CVE"/>
		<reference ref_id="CVE-2017-7834" ref_url="https://www.suse.com/security/cve/CVE-2017-7834/" source="CVE"/>
		<reference ref_id="CVE-2017-7835" ref_url="https://www.suse.com/security/cve/CVE-2017-7835/" source="CVE"/>
		<reference ref_id="CVE-2017-7836" ref_url="https://www.suse.com/security/cve/CVE-2017-7836/" source="CVE"/>
		<reference ref_id="CVE-2017-7837" ref_url="https://www.suse.com/security/cve/CVE-2017-7837/" source="CVE"/>
		<reference ref_id="CVE-2017-7838" ref_url="https://www.suse.com/security/cve/CVE-2017-7838/" source="CVE"/>
		<reference ref_id="CVE-2017-7839" ref_url="https://www.suse.com/security/cve/CVE-2017-7839/" source="CVE"/>
		<reference ref_id="CVE-2017-7840" ref_url="https://www.suse.com/security/cve/CVE-2017-7840/" source="CVE"/>
		<reference ref_id="CVE-2017-7842" ref_url="https://www.suse.com/security/cve/CVE-2017-7842/" source="CVE"/>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<reference ref_id="CVE-2017-7844" ref_url="https://www.suse.com/security/cve/CVE-2017-7844/" source="CVE"/>
		<reference ref_id="CVE-2018-12358" ref_url="https://www.suse.com/security/cve/CVE-2018-12358/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12361" ref_url="https://www.suse.com/security/cve/CVE-2018-12361/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12367" ref_url="https://www.suse.com/security/cve/CVE-2018-12367/" source="CVE"/>
		<reference ref_id="CVE-2018-12369" ref_url="https://www.suse.com/security/cve/CVE-2018-12369/" source="CVE"/>
		<reference ref_id="CVE-2018-12370" ref_url="https://www.suse.com/security/cve/CVE-2018-12370/" source="CVE"/>
		<reference ref_id="CVE-2018-12371" ref_url="https://www.suse.com/security/cve/CVE-2018-12371/" source="CVE"/>
		<reference ref_id="CVE-2018-12375" ref_url="https://www.suse.com/security/cve/CVE-2018-12375/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12382" ref_url="https://www.suse.com/security/cve/CVE-2018-12382/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="CVE-2018-12388" ref_url="https://www.suse.com/security/cve/CVE-2018-12388/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12391" ref_url="https://www.suse.com/security/cve/CVE-2018-12391/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="CVE-2018-12398" ref_url="https://www.suse.com/security/cve/CVE-2018-12398/" source="CVE"/>
		<reference ref_id="CVE-2018-12399" ref_url="https://www.suse.com/security/cve/CVE-2018-12399/" source="CVE"/>
		<reference ref_id="CVE-2018-12400" ref_url="https://www.suse.com/security/cve/CVE-2018-12400/" source="CVE"/>
		<reference ref_id="CVE-2018-12401" ref_url="https://www.suse.com/security/cve/CVE-2018-12401/" source="CVE"/>
		<reference ref_id="CVE-2018-12402" ref_url="https://www.suse.com/security/cve/CVE-2018-12402/" source="CVE"/>
		<reference ref_id="CVE-2018-12403" ref_url="https://www.suse.com/security/cve/CVE-2018-12403/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-12406" ref_url="https://www.suse.com/security/cve/CVE-2018-12406/" source="CVE"/>
		<reference ref_id="CVE-2018-12407" ref_url="https://www.suse.com/security/cve/CVE-2018-12407/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18495" ref_url="https://www.suse.com/security/cve/CVE-2018-18495/" source="CVE"/>
		<reference ref_id="CVE-2018-18496" ref_url="https://www.suse.com/security/cve/CVE-2018-18496/" source="CVE"/>
		<reference ref_id="CVE-2018-18497" ref_url="https://www.suse.com/security/cve/CVE-2018-18497/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18502" ref_url="https://www.suse.com/security/cve/CVE-2018-18502/" source="CVE"/>
		<reference ref_id="CVE-2018-18503" ref_url="https://www.suse.com/security/cve/CVE-2018-18503/" source="CVE"/>
		<reference ref_id="CVE-2018-18504" ref_url="https://www.suse.com/security/cve/CVE-2018-18504/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5090" ref_url="https://www.suse.com/security/cve/CVE-2018-5090/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5092" ref_url="https://www.suse.com/security/cve/CVE-2018-5092/" source="CVE"/>
		<reference ref_id="CVE-2018-5093" ref_url="https://www.suse.com/security/cve/CVE-2018-5093/" source="CVE"/>
		<reference ref_id="CVE-2018-5094" ref_url="https://www.suse.com/security/cve/CVE-2018-5094/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5100" ref_url="https://www.suse.com/security/cve/CVE-2018-5100/" source="CVE"/>
		<reference ref_id="CVE-2018-5101" ref_url="https://www.suse.com/security/cve/CVE-2018-5101/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5105" ref_url="https://www.suse.com/security/cve/CVE-2018-5105/" source="CVE"/>
		<reference ref_id="CVE-2018-5106" ref_url="https://www.suse.com/security/cve/CVE-2018-5106/" source="CVE"/>
		<reference ref_id="CVE-2018-5107" ref_url="https://www.suse.com/security/cve/CVE-2018-5107/" source="CVE"/>
		<reference ref_id="CVE-2018-5108" ref_url="https://www.suse.com/security/cve/CVE-2018-5108/" source="CVE"/>
		<reference ref_id="CVE-2018-5109" ref_url="https://www.suse.com/security/cve/CVE-2018-5109/" source="CVE"/>
		<reference ref_id="CVE-2018-5110" ref_url="https://www.suse.com/security/cve/CVE-2018-5110/" source="CVE"/>
		<reference ref_id="CVE-2018-5111" ref_url="https://www.suse.com/security/cve/CVE-2018-5111/" source="CVE"/>
		<reference ref_id="CVE-2018-5112" ref_url="https://www.suse.com/security/cve/CVE-2018-5112/" source="CVE"/>
		<reference ref_id="CVE-2018-5113" ref_url="https://www.suse.com/security/cve/CVE-2018-5113/" source="CVE"/>
		<reference ref_id="CVE-2018-5114" ref_url="https://www.suse.com/security/cve/CVE-2018-5114/" source="CVE"/>
		<reference ref_id="CVE-2018-5115" ref_url="https://www.suse.com/security/cve/CVE-2018-5115/" source="CVE"/>
		<reference ref_id="CVE-2018-5116" ref_url="https://www.suse.com/security/cve/CVE-2018-5116/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5118" ref_url="https://www.suse.com/security/cve/CVE-2018-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-5119" ref_url="https://www.suse.com/security/cve/CVE-2018-5119/" source="CVE"/>
		<reference ref_id="CVE-2018-5121" ref_url="https://www.suse.com/security/cve/CVE-2018-5121/" source="CVE"/>
		<reference ref_id="CVE-2018-5122" ref_url="https://www.suse.com/security/cve/CVE-2018-5122/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5126" ref_url="https://www.suse.com/security/cve/CVE-2018-5126/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5128" ref_url="https://www.suse.com/security/cve/CVE-2018-5128/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5132" ref_url="https://www.suse.com/security/cve/CVE-2018-5132/" source="CVE"/>
		<reference ref_id="CVE-2018-5133" ref_url="https://www.suse.com/security/cve/CVE-2018-5133/" source="CVE"/>
		<reference ref_id="CVE-2018-5134" ref_url="https://www.suse.com/security/cve/CVE-2018-5134/" source="CVE"/>
		<reference ref_id="CVE-2018-5135" ref_url="https://www.suse.com/security/cve/CVE-2018-5135/" source="CVE"/>
		<reference ref_id="CVE-2018-5136" ref_url="https://www.suse.com/security/cve/CVE-2018-5136/" source="CVE"/>
		<reference ref_id="CVE-2018-5137" ref_url="https://www.suse.com/security/cve/CVE-2018-5137/" source="CVE"/>
		<reference ref_id="CVE-2018-5138" ref_url="https://www.suse.com/security/cve/CVE-2018-5138/" source="CVE"/>
		<reference ref_id="CVE-2018-5140" ref_url="https://www.suse.com/security/cve/CVE-2018-5140/" source="CVE"/>
		<reference ref_id="CVE-2018-5141" ref_url="https://www.suse.com/security/cve/CVE-2018-5141/" source="CVE"/>
		<reference ref_id="CVE-2018-5142" ref_url="https://www.suse.com/security/cve/CVE-2018-5142/" source="CVE"/>
		<reference ref_id="CVE-2018-5143" ref_url="https://www.suse.com/security/cve/CVE-2018-5143/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5186" ref_url="https://www.suse.com/security/cve/CVE-2018-5186/" source="CVE"/>
		<reference ref_id="CVE-2018-5187" ref_url="https://www.suse.com/security/cve/CVE-2018-5187/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2018-6156" ref_url="https://www.suse.com/security/cve/CVE-2018-6156/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11695" ref_url="https://www.suse.com/security/cve/CVE-2019-11695/" source="CVE"/>
		<reference ref_id="CVE-2019-11696" ref_url="https://www.suse.com/security/cve/CVE-2019-11696/" source="CVE"/>
		<reference ref_id="CVE-2019-11697" ref_url="https://www.suse.com/security/cve/CVE-2019-11697/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11699" ref_url="https://www.suse.com/security/cve/CVE-2019-11699/" source="CVE"/>
		<reference ref_id="CVE-2019-11700" ref_url="https://www.suse.com/security/cve/CVE-2019-11700/" source="CVE"/>
		<reference ref_id="CVE-2019-11701" ref_url="https://www.suse.com/security/cve/CVE-2019-11701/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11734" ref_url="https://www.suse.com/security/cve/CVE-2019-11734/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11737" ref_url="https://www.suse.com/security/cve/CVE-2019-11737/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11741" ref_url="https://www.suse.com/security/cve/CVE-2019-11741/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11754" ref_url="https://www.suse.com/security/cve/CVE-2019-11754/" source="CVE"/>
		<reference ref_id="CVE-2019-11756" ref_url="https://www.suse.com/security/cve/CVE-2019-11756/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-11765" ref_url="https://www.suse.com/security/cve/CVE-2019-11765/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17000" ref_url="https://www.suse.com/security/cve/CVE-2019-17000/" source="CVE"/>
		<reference ref_id="CVE-2019-17001" ref_url="https://www.suse.com/security/cve/CVE-2019-17001/" source="CVE"/>
		<reference ref_id="CVE-2019-17002" ref_url="https://www.suse.com/security/cve/CVE-2019-17002/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17013" ref_url="https://www.suse.com/security/cve/CVE-2019-17013/" source="CVE"/>
		<reference ref_id="CVE-2019-17014" ref_url="https://www.suse.com/security/cve/CVE-2019-17014/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17020" ref_url="https://www.suse.com/security/cve/CVE-2019-17020/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17023" ref_url="https://www.suse.com/security/cve/CVE-2019-17023/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17025" ref_url="https://www.suse.com/security/cve/CVE-2019-17025/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-5849" ref_url="https://www.suse.com/security/cve/CVE-2019-5849/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9789" ref_url="https://www.suse.com/security/cve/CVE-2019-9789/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9798" ref_url="https://www.suse.com/security/cve/CVE-2019-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-9799" ref_url="https://www.suse.com/security/cve/CVE-2019-9799/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9802" ref_url="https://www.suse.com/security/cve/CVE-2019-9802/" source="CVE"/>
		<reference ref_id="CVE-2019-9803" ref_url="https://www.suse.com/security/cve/CVE-2019-9803/" source="CVE"/>
		<reference ref_id="CVE-2019-9804" ref_url="https://www.suse.com/security/cve/CVE-2019-9804/" source="CVE"/>
		<reference ref_id="CVE-2019-9805" ref_url="https://www.suse.com/security/cve/CVE-2019-9805/" source="CVE"/>
		<reference ref_id="CVE-2019-9806" ref_url="https://www.suse.com/security/cve/CVE-2019-9806/" source="CVE"/>
		<reference ref_id="CVE-2019-9807" ref_url="https://www.suse.com/security/cve/CVE-2019-9807/" source="CVE"/>
		<reference ref_id="CVE-2019-9808" ref_url="https://www.suse.com/security/cve/CVE-2019-9808/" source="CVE"/>
		<reference ref_id="CVE-2019-9809" ref_url="https://www.suse.com/security/cve/CVE-2019-9809/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9814" ref_url="https://www.suse.com/security/cve/CVE-2019-9814/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2019-9821" ref_url="https://www.suse.com/security/cve/CVE-2019-9821/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12390" ref_url="https://www.suse.com/security/cve/CVE-2020-12390/" source="CVE"/>
		<reference ref_id="CVE-2020-12391" ref_url="https://www.suse.com/security/cve/CVE-2020-12391/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12394" ref_url="https://www.suse.com/security/cve/CVE-2020-12394/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12396" ref_url="https://www.suse.com/security/cve/CVE-2020-12396/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12407" ref_url="https://www.suse.com/security/cve/CVE-2020-12407/" source="CVE"/>
		<reference ref_id="CVE-2020-12408" ref_url="https://www.suse.com/security/cve/CVE-2020-12408/" source="CVE"/>
		<reference ref_id="CVE-2020-12409" ref_url="https://www.suse.com/security/cve/CVE-2020-12409/" source="CVE"/>
		<reference ref_id="CVE-2020-12411" ref_url="https://www.suse.com/security/cve/CVE-2020-12411/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-15254" ref_url="https://www.suse.com/security/cve/CVE-2020-15254/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15665" ref_url="https://www.suse.com/security/cve/CVE-2020-15665/" source="CVE"/>
		<reference ref_id="CVE-2020-15666" ref_url="https://www.suse.com/security/cve/CVE-2020-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-15667" ref_url="https://www.suse.com/security/cve/CVE-2020-15667/" source="CVE"/>
		<reference ref_id="CVE-2020-15668" ref_url="https://www.suse.com/security/cve/CVE-2020-15668/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15674" ref_url="https://www.suse.com/security/cve/CVE-2020-15674/" source="CVE"/>
		<reference ref_id="CVE-2020-15675" ref_url="https://www.suse.com/security/cve/CVE-2020-15675/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15680" ref_url="https://www.suse.com/security/cve/CVE-2020-15680/" source="CVE"/>
		<reference ref_id="CVE-2020-15681" ref_url="https://www.suse.com/security/cve/CVE-2020-15681/" source="CVE"/>
		<reference ref_id="CVE-2020-15682" ref_url="https://www.suse.com/security/cve/CVE-2020-15682/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15684" ref_url="https://www.suse.com/security/cve/CVE-2020-15684/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26952" ref_url="https://www.suse.com/security/cve/CVE-2020-26952/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26954" ref_url="https://www.suse.com/security/cve/CVE-2020-26954/" source="CVE"/>
		<reference ref_id="CVE-2020-26955" ref_url="https://www.suse.com/security/cve/CVE-2020-26955/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26957" ref_url="https://www.suse.com/security/cve/CVE-2020-26957/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26962" ref_url="https://www.suse.com/security/cve/CVE-2020-26962/" source="CVE"/>
		<reference ref_id="CVE-2020-26963" ref_url="https://www.suse.com/security/cve/CVE-2020-26963/" source="CVE"/>
		<reference ref_id="CVE-2020-26964" ref_url="https://www.suse.com/security/cve/CVE-2020-26964/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26967" ref_url="https://www.suse.com/security/cve/CVE-2020-26967/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26969" ref_url="https://www.suse.com/security/cve/CVE-2020-26969/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26972" ref_url="https://www.suse.com/security/cve/CVE-2020-26972/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26975" ref_url="https://www.suse.com/security/cve/CVE-2020-26975/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26977" ref_url="https://www.suse.com/security/cve/CVE-2020-26977/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-26979" ref_url="https://www.suse.com/security/cve/CVE-2020-26979/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-35114" ref_url="https://www.suse.com/security/cve/CVE-2020-35114/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6801" ref_url="https://www.suse.com/security/cve/CVE-2020-6801/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6808" ref_url="https://www.suse.com/security/cve/CVE-2020-6808/" source="CVE"/>
		<reference ref_id="CVE-2020-6809" ref_url="https://www.suse.com/security/cve/CVE-2020-6809/" source="CVE"/>
		<reference ref_id="CVE-2020-6810" ref_url="https://www.suse.com/security/cve/CVE-2020-6810/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6815" ref_url="https://www.suse.com/security/cve/CVE-2020-6815/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6823" ref_url="https://www.suse.com/security/cve/CVE-2020-6823/" source="CVE"/>
		<reference ref_id="CVE-2020-6824" ref_url="https://www.suse.com/security/cve/CVE-2020-6824/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6826" ref_url="https://www.suse.com/security/cve/CVE-2020-6826/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23955" ref_url="https://www.suse.com/security/cve/CVE-2021-23955/" source="CVE"/>
		<reference ref_id="CVE-2021-23956" ref_url="https://www.suse.com/security/cve/CVE-2021-23956/" source="CVE"/>
		<reference ref_id="CVE-2021-23957" ref_url="https://www.suse.com/security/cve/CVE-2021-23957/" source="CVE"/>
		<reference ref_id="CVE-2021-23958" ref_url="https://www.suse.com/security/cve/CVE-2021-23958/" source="CVE"/>
		<reference ref_id="CVE-2021-23959" ref_url="https://www.suse.com/security/cve/CVE-2021-23959/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23962" ref_url="https://www.suse.com/security/cve/CVE-2021-23962/" source="CVE"/>
		<reference ref_id="CVE-2021-23963" ref_url="https://www.suse.com/security/cve/CVE-2021-23963/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23965" ref_url="https://www.suse.com/security/cve/CVE-2021-23965/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23970" ref_url="https://www.suse.com/security/cve/CVE-2021-23970/" source="CVE"/>
		<reference ref_id="CVE-2021-23971" ref_url="https://www.suse.com/security/cve/CVE-2021-23971/" source="CVE"/>
		<reference ref_id="CVE-2021-23972" ref_url="https://www.suse.com/security/cve/CVE-2021-23972/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23974" ref_url="https://www.suse.com/security/cve/CVE-2021-23974/" source="CVE"/>
		<reference ref_id="CVE-2021-23975" ref_url="https://www.suse.com/security/cve/CVE-2021-23975/" source="CVE"/>
		<reference ref_id="CVE-2021-23976" ref_url="https://www.suse.com/security/cve/CVE-2021-23976/" source="CVE"/>
		<reference ref_id="CVE-2021-23977" ref_url="https://www.suse.com/security/cve/CVE-2021-23977/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23979" ref_url="https://www.suse.com/security/cve/CVE-2021-23979/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23983" ref_url="https://www.suse.com/security/cve/CVE-2021-23983/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23985" ref_url="https://www.suse.com/security/cve/CVE-2021-23985/" source="CVE"/>
		<reference ref_id="CVE-2021-23986" ref_url="https://www.suse.com/security/cve/CVE-2021-23986/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23988" ref_url="https://www.suse.com/security/cve/CVE-2021-23988/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23996" ref_url="https://www.suse.com/security/cve/CVE-2021-23996/" source="CVE"/>
		<reference ref_id="CVE-2021-23997" ref_url="https://www.suse.com/security/cve/CVE-2021-23997/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24000" ref_url="https://www.suse.com/security/cve/CVE-2021-24000/" source="CVE"/>
		<reference ref_id="CVE-2021-24001" ref_url="https://www.suse.com/security/cve/CVE-2021-24001/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29944" ref_url="https://www.suse.com/security/cve/CVE-2021-29944/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29947" ref_url="https://www.suse.com/security/cve/CVE-2021-29947/" source="CVE"/>
		<reference ref_id="CVE-2021-29952" ref_url="https://www.suse.com/security/cve/CVE-2021-29952/" source="CVE"/>
		<reference ref_id="CVE-2021-29959" ref_url="https://www.suse.com/security/cve/CVE-2021-29959/" source="CVE"/>
		<reference ref_id="CVE-2021-29960" ref_url="https://www.suse.com/security/cve/CVE-2021-29960/" source="CVE"/>
		<reference ref_id="CVE-2021-29961" ref_url="https://www.suse.com/security/cve/CVE-2021-29961/" source="CVE"/>
		<reference ref_id="CVE-2021-29962" ref_url="https://www.suse.com/security/cve/CVE-2021-29962/" source="CVE"/>
		<reference ref_id="CVE-2021-29963" ref_url="https://www.suse.com/security/cve/CVE-2021-29963/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29965" ref_url="https://www.suse.com/security/cve/CVE-2021-29965/" source="CVE"/>
		<reference ref_id="CVE-2021-29966" ref_url="https://www.suse.com/security/cve/CVE-2021-29966/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29971" ref_url="https://www.suse.com/security/cve/CVE-2021-29971/" source="CVE"/>
		<reference ref_id="CVE-2021-29972" ref_url="https://www.suse.com/security/cve/CVE-2021-29972/" source="CVE"/>
		<reference ref_id="CVE-2021-29973" ref_url="https://www.suse.com/security/cve/CVE-2021-29973/" source="CVE"/>
		<reference ref_id="CVE-2021-29974" ref_url="https://www.suse.com/security/cve/CVE-2021-29974/" source="CVE"/>
		<reference ref_id="CVE-2021-29975" ref_url="https://www.suse.com/security/cve/CVE-2021-29975/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-29977" ref_url="https://www.suse.com/security/cve/CVE-2021-29977/" source="CVE"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-29993" ref_url="https://www.suse.com/security/cve/CVE-2021-29993/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-38491" ref_url="https://www.suse.com/security/cve/CVE-2021-38491/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<reference ref_id="CVE-2021-38494" ref_url="https://www.suse.com/security/cve/CVE-2021-38494/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-92.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5374">CVE-2017-5374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5377">CVE-2017-5377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5379">CVE-2017-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5381">CVE-2017-5381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5382">CVE-2017-5382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5384">CVE-2017-5384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5385">CVE-2017-5385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5387">CVE-2017-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5388">CVE-2017-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5389">CVE-2017-5389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5391">CVE-2017-5391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5392">CVE-2017-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5393">CVE-2017-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5394">CVE-2017-5394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5395">CVE-2017-5395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5399">CVE-2017-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5403">CVE-2017-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5406">CVE-2017-5406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5412">CVE-2017-5412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5413">CVE-2017-5413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5414">CVE-2017-5414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5415/">CVE-2017-5415 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5415">CVE-2017-5415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5416">CVE-2017-5416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5417/">CVE-2017-5417 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5417">CVE-2017-5417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5418">CVE-2017-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5419">CVE-2017-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5420/">CVE-2017-5420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5420">CVE-2017-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5421">CVE-2017-5421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5422">CVE-2017-5422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5426">CVE-2017-5426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5427/">CVE-2017-5427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5427">CVE-2017-5427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5428">CVE-2017-5428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5453/">CVE-2017-5453 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5453">CVE-2017-5453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5458/">CVE-2017-5458 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5458">CVE-2017-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5468/">CVE-2017-5468 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5468">CVE-2017-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7780/">CVE-2017-7780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7780">CVE-2017-7780 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7781/">CVE-2017-7781 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7781">CVE-2017-7781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7783/">CVE-2017-7783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7783">CVE-2017-7783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7788/">CVE-2017-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7788">CVE-2017-7788 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7790/">CVE-2017-7790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7790">CVE-2017-7790 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7794/">CVE-2017-7794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7794">CVE-2017-7794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7796/">CVE-2017-7796 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7796">CVE-2017-7796 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7797/">CVE-2017-7797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7797">CVE-2017-7797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7799/">CVE-2017-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7799">CVE-2017-7799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7806/">CVE-2017-7806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7806">CVE-2017-7806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7808/">CVE-2017-7808 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7808">CVE-2017-7808 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7809/">CVE-2017-7809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7809">CVE-2017-7809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7811/">CVE-2017-7811 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7811">CVE-2017-7811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7812/">CVE-2017-7812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7812">CVE-2017-7812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7813/">CVE-2017-7813 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7813">CVE-2017-7813 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7815/">CVE-2017-7815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7815">CVE-2017-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7816/">CVE-2017-7816 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7816">CVE-2017-7816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7817/">CVE-2017-7817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7817">CVE-2017-7817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7820/">CVE-2017-7820 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7820">CVE-2017-7820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7821/">CVE-2017-7821 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7821">CVE-2017-7821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7822/">CVE-2017-7822 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7822">CVE-2017-7822 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7827/">CVE-2017-7827 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7827">CVE-2017-7827 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7831/">CVE-2017-7831 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7831">CVE-2017-7831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7832/">CVE-2017-7832 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7832">CVE-2017-7832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7833/">CVE-2017-7833 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7833">CVE-2017-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7834/">CVE-2017-7834 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7834">CVE-2017-7834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7835/">CVE-2017-7835 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7835">CVE-2017-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7836/">CVE-2017-7836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7836">CVE-2017-7836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7837/">CVE-2017-7837 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7837">CVE-2017-7837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7838/">CVE-2017-7838 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7838">CVE-2017-7838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7839/">CVE-2017-7839 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7839">CVE-2017-7839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7840/">CVE-2017-7840 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7840">CVE-2017-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7842/">CVE-2017-7842 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7842">CVE-2017-7842 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7843">CVE-2017-7843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7844/">CVE-2017-7844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7844">CVE-2017-7844 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12358/">CVE-2018-12358 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12358">CVE-2018-12358 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12361/">CVE-2018-12361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12361">CVE-2018-12361 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12367/">CVE-2018-12367 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12367">CVE-2018-12367 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12369/">CVE-2018-12369 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12369">CVE-2018-12369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12370/">CVE-2018-12370 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12370">CVE-2018-12370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12371/">CVE-2018-12371 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12371">CVE-2018-12371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12375/">CVE-2018-12375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12375">CVE-2018-12375 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12381">CVE-2018-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12382/">CVE-2018-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12382">CVE-2018-12382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12388/">CVE-2018-12388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12388">CVE-2018-12388 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12391/">CVE-2018-12391 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12391">CVE-2018-12391 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12398/">CVE-2018-12398 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12398">CVE-2018-12398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12399/">CVE-2018-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12399">CVE-2018-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12400/">CVE-2018-12400 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12400">CVE-2018-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12401/">CVE-2018-12401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12401">CVE-2018-12401 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12402/">CVE-2018-12402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12402">CVE-2018-12402 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12403/">CVE-2018-12403 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12403">CVE-2018-12403 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12406/">CVE-2018-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12406">CVE-2018-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12407/">CVE-2018-12407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12407">CVE-2018-12407 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18495/">CVE-2018-18495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18495">CVE-2018-18495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18496/">CVE-2018-18496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18496">CVE-2018-18496 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18497/">CVE-2018-18497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18497">CVE-2018-18497 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18502/">CVE-2018-18502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18502">CVE-2018-18502 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18503/">CVE-2018-18503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18503">CVE-2018-18503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18504/">CVE-2018-18504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18504">CVE-2018-18504 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5090/">CVE-2018-5090 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5090">CVE-2018-5090 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5092/">CVE-2018-5092 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5092">CVE-2018-5092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5093/">CVE-2018-5093 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5093">CVE-2018-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5094/">CVE-2018-5094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5094">CVE-2018-5094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5100/">CVE-2018-5100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5100">CVE-2018-5100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5101/">CVE-2018-5101 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5101">CVE-2018-5101 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5105/">CVE-2018-5105 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5105">CVE-2018-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5106/">CVE-2018-5106 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5106">CVE-2018-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5107/">CVE-2018-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5107">CVE-2018-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5108/">CVE-2018-5108 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5108">CVE-2018-5108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5109/">CVE-2018-5109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5109">CVE-2018-5109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5110/">CVE-2018-5110 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5110">CVE-2018-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5111/">CVE-2018-5111 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5111">CVE-2018-5111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5112/">CVE-2018-5112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5112">CVE-2018-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5113/">CVE-2018-5113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5113">CVE-2018-5113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5114/">CVE-2018-5114 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5114">CVE-2018-5114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5115/">CVE-2018-5115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5115">CVE-2018-5115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5116/">CVE-2018-5116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5116">CVE-2018-5116 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5118/">CVE-2018-5118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5118">CVE-2018-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5119/">CVE-2018-5119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5119">CVE-2018-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5121/">CVE-2018-5121 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5121">CVE-2018-5121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5122/">CVE-2018-5122 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5122">CVE-2018-5122 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5126/">CVE-2018-5126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5126">CVE-2018-5126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5128/">CVE-2018-5128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5128">CVE-2018-5128 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5132/">CVE-2018-5132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5132">CVE-2018-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5133/">CVE-2018-5133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5133">CVE-2018-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5134/">CVE-2018-5134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5134">CVE-2018-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5135/">CVE-2018-5135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5135">CVE-2018-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5136/">CVE-2018-5136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5136">CVE-2018-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5137/">CVE-2018-5137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5137">CVE-2018-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5138/">CVE-2018-5138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5138">CVE-2018-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5140/">CVE-2018-5140 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5140">CVE-2018-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5141/">CVE-2018-5141 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5141">CVE-2018-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5142/">CVE-2018-5142 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5142">CVE-2018-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5143/">CVE-2018-5143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5143">CVE-2018-5143 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5186/">CVE-2018-5186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5186">CVE-2018-5186 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5187/">CVE-2018-5187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5187">CVE-2018-5187 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6156/">CVE-2018-6156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6156">CVE-2018-6156 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11695/">CVE-2019-11695 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11695">CVE-2019-11695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11696/">CVE-2019-11696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11696">CVE-2019-11696 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11697/">CVE-2019-11697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11697">CVE-2019-11697 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11699/">CVE-2019-11699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11699">CVE-2019-11699 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11700/">CVE-2019-11700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11700">CVE-2019-11700 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11701/">CVE-2019-11701 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11701">CVE-2019-11701 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11734/">CVE-2019-11734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11734">CVE-2019-11734 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11737/">CVE-2019-11737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11737">CVE-2019-11737 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11741/">CVE-2019-11741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11741">CVE-2019-11741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11754/">CVE-2019-11754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11754">CVE-2019-11754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11756/">CVE-2019-11756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11756">CVE-2019-11756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11765/">CVE-2019-11765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11765">CVE-2019-11765 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17000/">CVE-2019-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17000">CVE-2019-17000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17001/">CVE-2019-17001 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17001">CVE-2019-17001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17002/">CVE-2019-17002 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17002">CVE-2019-17002 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17013/">CVE-2019-17013 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17013">CVE-2019-17013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17014/">CVE-2019-17014 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17014">CVE-2019-17014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17020/">CVE-2019-17020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17020">CVE-2019-17020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17023/">CVE-2019-17023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17023">CVE-2019-17023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17025/">CVE-2019-17025 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17025">CVE-2019-17025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5849/">CVE-2019-5849 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5849">CVE-2019-5849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9789/">CVE-2019-9789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9789">CVE-2019-9789 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9794">CVE-2019-9794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9798/">CVE-2019-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9798">CVE-2019-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9799/">CVE-2019-9799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9799">CVE-2019-9799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9801">CVE-2019-9801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9802/">CVE-2019-9802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9802">CVE-2019-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9803/">CVE-2019-9803 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9803">CVE-2019-9803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9804/">CVE-2019-9804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9804">CVE-2019-9804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9805/">CVE-2019-9805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9805">CVE-2019-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9806/">CVE-2019-9806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9806">CVE-2019-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9807/">CVE-2019-9807 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9807">CVE-2019-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9808/">CVE-2019-9808 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9808">CVE-2019-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9809/">CVE-2019-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9809">CVE-2019-9809 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9814/">CVE-2019-9814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9814">CVE-2019-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9821/">CVE-2019-9821 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9821">CVE-2019-9821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12390/">CVE-2020-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12390">CVE-2020-12390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12391/">CVE-2020-12391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12391">CVE-2020-12391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12394/">CVE-2020-12394 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12394">CVE-2020-12394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12396/">CVE-2020-12396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12396">CVE-2020-12396 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12407/">CVE-2020-12407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12407">CVE-2020-12407 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12408/">CVE-2020-12408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12408">CVE-2020-12408 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12409/">CVE-2020-12409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12409">CVE-2020-12409 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12411/">CVE-2020-12411 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12411">CVE-2020-12411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15254/">CVE-2020-15254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15254">CVE-2020-15254 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15665/">CVE-2020-15665 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15665">CVE-2020-15665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15666/">CVE-2020-15666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15666">CVE-2020-15666 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15667/">CVE-2020-15667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15667">CVE-2020-15667 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15668/">CVE-2020-15668 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15668">CVE-2020-15668 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15674/">CVE-2020-15674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15674">CVE-2020-15674 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15675/">CVE-2020-15675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15675">CVE-2020-15675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15680/">CVE-2020-15680 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15680">CVE-2020-15680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15681/">CVE-2020-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15681">CVE-2020-15681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15682/">CVE-2020-15682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15682">CVE-2020-15682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15684/">CVE-2020-15684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15684">CVE-2020-15684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26952/">CVE-2020-26952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26952">CVE-2020-26952 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26954/">CVE-2020-26954 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26954">CVE-2020-26954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26955/">CVE-2020-26955 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26955">CVE-2020-26955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26957/">CVE-2020-26957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26957">CVE-2020-26957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26962/">CVE-2020-26962 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26962">CVE-2020-26962 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26963/">CVE-2020-26963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26963">CVE-2020-26963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26964/">CVE-2020-26964 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26964">CVE-2020-26964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26967/">CVE-2020-26967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26967">CVE-2020-26967 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26969/">CVE-2020-26969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26969">CVE-2020-26969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26972/">CVE-2020-26972 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26972">CVE-2020-26972 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26975/">CVE-2020-26975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26975">CVE-2020-26975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26977/">CVE-2020-26977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26977">CVE-2020-26977 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26979/">CVE-2020-26979 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26979">CVE-2020-26979 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35114/">CVE-2020-35114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35114">CVE-2020-35114 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6801/">CVE-2020-6801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6801">CVE-2020-6801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6808/">CVE-2020-6808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6808">CVE-2020-6808 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6809/">CVE-2020-6809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6809">CVE-2020-6809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6810/">CVE-2020-6810 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6810">CVE-2020-6810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6815/">CVE-2020-6815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6815">CVE-2020-6815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6823/">CVE-2020-6823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6823">CVE-2020-6823 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6824/">CVE-2020-6824 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6824">CVE-2020-6824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6826/">CVE-2020-6826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6826">CVE-2020-6826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23955/">CVE-2021-23955 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23955">CVE-2021-23955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23956/">CVE-2021-23956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23956">CVE-2021-23956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23957/">CVE-2021-23957 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23957">CVE-2021-23957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23958/">CVE-2021-23958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23958">CVE-2021-23958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23959/">CVE-2021-23959 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23959">CVE-2021-23959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23962/">CVE-2021-23962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23962">CVE-2021-23962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23963/">CVE-2021-23963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23963">CVE-2021-23963 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23965/">CVE-2021-23965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23965">CVE-2021-23965 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23970/">CVE-2021-23970 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23970">CVE-2021-23970 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23971/">CVE-2021-23971 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23971">CVE-2021-23971 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23972/">CVE-2021-23972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23972">CVE-2021-23972 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23974/">CVE-2021-23974 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23974">CVE-2021-23974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-23975/">CVE-2021-23975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23975">CVE-2021-23975 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-23976/">CVE-2021-23976 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23976">CVE-2021-23976 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23977/">CVE-2021-23977 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23977">CVE-2021-23977 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23979/">CVE-2021-23979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23979">CVE-2021-23979 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23983/">CVE-2021-23983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23983">CVE-2021-23983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23985/">CVE-2021-23985 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23985">CVE-2021-23985 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23986/">CVE-2021-23986 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23986">CVE-2021-23986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23988/">CVE-2021-23988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23988">CVE-2021-23988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23996/">CVE-2021-23996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23996">CVE-2021-23996 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23997/">CVE-2021-23997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23997">CVE-2021-23997 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24000/">CVE-2021-24000 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24000">CVE-2021-24000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-24001/">CVE-2021-24001 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24001">CVE-2021-24001 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29944/">CVE-2021-29944 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29944">CVE-2021-29944 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29947/">CVE-2021-29947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29947">CVE-2021-29947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29952/">CVE-2021-29952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29952">CVE-2021-29952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29959/">CVE-2021-29959 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29959">CVE-2021-29959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29960/">CVE-2021-29960 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29960">CVE-2021-29960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29961/">CVE-2021-29961 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29961">CVE-2021-29961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29962/">CVE-2021-29962 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29962">CVE-2021-29962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29963/">CVE-2021-29963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29963">CVE-2021-29963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29965/">CVE-2021-29965 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29965">CVE-2021-29965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29966/">CVE-2021-29966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29966">CVE-2021-29966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29971/">CVE-2021-29971 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29971">CVE-2021-29971 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29972/">CVE-2021-29972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29972">CVE-2021-29972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29973/">CVE-2021-29973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29973">CVE-2021-29973 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29974/">CVE-2021-29974 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29974">CVE-2021-29974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29975/">CVE-2021-29975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29975">CVE-2021-29975 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29977/">CVE-2021-29977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29977">CVE-2021-29977 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29993/">CVE-2021-29993 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29993">CVE-2021-29993 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38491/">CVE-2021-38491 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38491">CVE-2021-38491 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38494/">CVE-2021-38494 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38494">CVE-2021-38494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909029" comment="MozillaFirefox-92.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909030" comment="MozillaFirefox-branding-upstream-92.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909031" comment="MozillaFirefox-devel-92.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909032" comment="MozillaFirefox-translations-common-92.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909033" comment="MozillaFirefox-translations-other-92.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248922" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0016" ref_url="https://www.suse.com/security/cve/CVE-2008-0016/" source="CVE"/>
		<reference ref_id="CVE-2008-1233" ref_url="https://www.suse.com/security/cve/CVE-2008-1233/" source="CVE"/>
		<reference ref_id="CVE-2008-1236" ref_url="https://www.suse.com/security/cve/CVE-2008-1236/" source="CVE"/>
		<reference ref_id="CVE-2008-3835" ref_url="https://www.suse.com/security/cve/CVE-2008-3835/" source="CVE"/>
		<reference ref_id="CVE-2008-4058" ref_url="https://www.suse.com/security/cve/CVE-2008-4058/" source="CVE"/>
		<reference ref_id="CVE-2008-4061" ref_url="https://www.suse.com/security/cve/CVE-2008-4061/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4065" ref_url="https://www.suse.com/security/cve/CVE-2008-4065/" source="CVE"/>
		<reference ref_id="CVE-2008-4067" ref_url="https://www.suse.com/security/cve/CVE-2008-4067/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5012" ref_url="https://www.suse.com/security/cve/CVE-2008-5012/" source="CVE"/>
		<reference ref_id="CVE-2008-5014" ref_url="https://www.suse.com/security/cve/CVE-2008-5014/" source="CVE"/>
		<reference ref_id="CVE-2008-5016" ref_url="https://www.suse.com/security/cve/CVE-2008-5016/" source="CVE"/>
		<reference ref_id="CVE-2008-5021" ref_url="https://www.suse.com/security/cve/CVE-2008-5021/" source="CVE"/>
		<reference ref_id="CVE-2008-5022" ref_url="https://www.suse.com/security/cve/CVE-2008-5022/" source="CVE"/>
		<reference ref_id="CVE-2008-5024" ref_url="https://www.suse.com/security/cve/CVE-2008-5024/" source="CVE"/>
		<reference ref_id="CVE-2008-5500" ref_url="https://www.suse.com/security/cve/CVE-2008-5500/" source="CVE"/>
		<reference ref_id="CVE-2008-5503" ref_url="https://www.suse.com/security/cve/CVE-2008-5503/" source="CVE"/>
		<reference ref_id="CVE-2008-5506" ref_url="https://www.suse.com/security/cve/CVE-2008-5506/" source="CVE"/>
		<reference ref_id="CVE-2008-5507" ref_url="https://www.suse.com/security/cve/CVE-2008-5507/" source="CVE"/>
		<reference ref_id="CVE-2008-5508" ref_url="https://www.suse.com/security/cve/CVE-2008-5508/" source="CVE"/>
		<reference ref_id="CVE-2008-5510" ref_url="https://www.suse.com/security/cve/CVE-2008-5510/" source="CVE"/>
		<reference ref_id="CVE-2008-5511" ref_url="https://www.suse.com/security/cve/CVE-2008-5511/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7829" ref_url="https://www.suse.com/security/cve/CVE-2017-7829/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7845" ref_url="https://www.suse.com/security/cve/CVE-2017-7845/" source="CVE"/>
		<reference ref_id="CVE-2017-7846" ref_url="https://www.suse.com/security/cve/CVE-2017-7846/" source="CVE"/>
		<reference ref_id="CVE-2017-7847" ref_url="https://www.suse.com/security/cve/CVE-2017-7847/" source="CVE"/>
		<reference ref_id="CVE-2017-7848" ref_url="https://www.suse.com/security/cve/CVE-2017-7848/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12361" ref_url="https://www.suse.com/security/cve/CVE-2018-12361/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12367" ref_url="https://www.suse.com/security/cve/CVE-2018-12367/" source="CVE"/>
		<reference ref_id="CVE-2018-12371" ref_url="https://www.suse.com/security/cve/CVE-2018-12371/" source="CVE"/>
		<reference ref_id="CVE-2018-12372" ref_url="https://www.suse.com/security/cve/CVE-2018-12372/" source="CVE"/>
		<reference ref_id="CVE-2018-12373" ref_url="https://www.suse.com/security/cve/CVE-2018-12373/" source="CVE"/>
		<reference ref_id="CVE-2018-12374" ref_url="https://www.suse.com/security/cve/CVE-2018-12374/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12391" ref_url="https://www.suse.com/security/cve/CVE-2018-12391/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18509" ref_url="https://www.suse.com/security/cve/CVE-2018-18509/" source="CVE"/>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161/" source="CVE"/>
		<reference ref_id="CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184/" source="CVE"/>
		<reference ref_id="CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185/" source="CVE"/>
		<reference ref_id="CVE-2018-5187" ref_url="https://www.suse.com/security/cve/CVE-2018-5187/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703/" source="CVE"/>
		<reference ref_id="CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704/" source="CVE"/>
		<reference ref_id="CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705/" source="CVE"/>
		<reference ref_id="CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11755" ref_url="https://www.suse.com/security/cve/CVE-2019-11755/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397/" source="CVE"/>
		<reference ref_id="CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792/" source="CVE"/>
		<reference ref_id="CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793/" source="CVE"/>
		<reference ref_id="CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794/" source="CVE"/>
		<reference ref_id="CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991/" source="CVE"/>
		<reference ref_id="CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948/" source="CVE"/>
		<reference ref_id="CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956/" source="CVE"/>
		<reference ref_id="CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0016/">CVE-2008-0016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0016">CVE-2008-0016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1233/">CVE-2008-1233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1233">CVE-2008-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1236/">CVE-2008-1236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1236">CVE-2008-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3835/">CVE-2008-3835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3835">CVE-2008-3835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4058/">CVE-2008-4058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4058">CVE-2008-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4061/">CVE-2008-4061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4061">CVE-2008-4061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4065/">CVE-2008-4065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4065">CVE-2008-4065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4067/">CVE-2008-4067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4067">CVE-2008-4067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5012/">CVE-2008-5012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5012">CVE-2008-5012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5014/">CVE-2008-5014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5014">CVE-2008-5014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5016/">CVE-2008-5016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5016">CVE-2008-5016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5021/">CVE-2008-5021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5021">CVE-2008-5021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5022/">CVE-2008-5022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5022">CVE-2008-5022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5024/">CVE-2008-5024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5024">CVE-2008-5024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5500/">CVE-2008-5500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5500">CVE-2008-5500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5503/">CVE-2008-5503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5503">CVE-2008-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5506/">CVE-2008-5506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5506">CVE-2008-5506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5507/">CVE-2008-5507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5507">CVE-2008-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5508/">CVE-2008-5508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5508">CVE-2008-5508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5510/">CVE-2008-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5510">CVE-2008-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5511/">CVE-2008-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5511">CVE-2008-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5399">CVE-2017-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5403">CVE-2017-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5406">CVE-2017-5406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5412">CVE-2017-5412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5413">CVE-2017-5413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5414">CVE-2017-5414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5416">CVE-2017-5416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5418">CVE-2017-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5419">CVE-2017-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5421">CVE-2017-5421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5422">CVE-2017-5422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5426">CVE-2017-5426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7763">CVE-2017-7763 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7765">CVE-2017-7765 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7829/">CVE-2017-7829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7829">CVE-2017-7829 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7845/">CVE-2017-7845 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7845">CVE-2017-7845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7846/">CVE-2017-7846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7846">CVE-2017-7846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7847/">CVE-2017-7847 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7847">CVE-2017-7847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7848/">CVE-2017-7848 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7848">CVE-2017-7848 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12361/">CVE-2018-12361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12361">CVE-2018-12361 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12367/">CVE-2018-12367 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12367">CVE-2018-12367 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12371/">CVE-2018-12371 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12371">CVE-2018-12371 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12372/">CVE-2018-12372 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12372">CVE-2018-12372 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12373/">CVE-2018-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12373">CVE-2018-12373 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12374/">CVE-2018-12374 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12374">CVE-2018-12374 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12391/">CVE-2018-12391 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12391">CVE-2018-12391 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18509/">CVE-2018-18509 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18509">CVE-2018-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5161">CVE-2018-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5162">CVE-2018-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5170">CVE-2018-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5184">CVE-2018-5184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5185">CVE-2018-5185 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5187/">CVE-2018-5187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5187">CVE-2018-5187 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11703">CVE-2019-11703 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11704">CVE-2019-11704 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11705">CVE-2019-11705 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11706">CVE-2019-11706 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11739">CVE-2019-11739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11755/">CVE-2019-11755 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11755">CVE-2019-11755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12397">CVE-2020-12397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12398">CVE-2020-12398 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15685">CVE-2020-15685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26970">CVE-2020-26970 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6792">CVE-2020-6792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6793">CVE-2020-6793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6794">CVE-2020-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6795">CVE-2020-6795 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23991">CVE-2021-23991 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23993">CVE-2021-23993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29948">CVE-2021-29948 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29956">CVE-2021-29956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29957">CVE-2021-29957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29969">CVE-2021-29969 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909034" comment="MozillaThunderbird-91.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909035" comment="MozillaThunderbird-translations-common-91.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909036" comment="MozillaThunderbird-translations-other-91.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248923" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.32.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2021-20297" ref_url="https://www.suse.com/security/cve/CVE-2021-20297/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.32.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000135">CVE-2018-1000135 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20297/">CVE-2021-20297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20297">CVE-2021-20297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909037" comment="NetworkManager-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909038" comment="NetworkManager-branding-upstream-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909039" comment="NetworkManager-devel-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909040" comment="NetworkManager-devel-32bit-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909041" comment="NetworkManager-lang-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909042" comment="libnm0-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909043" comment="libnm0-32bit-1.32.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909044" comment="typelib-1_0-NM-1_0-1.32.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248924" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-1.24.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6590" ref_url="https://www.suse.com/security/cve/CVE-2017-6590/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-1.24.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6590/">CVE-2017-6590 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6590">CVE-2017-6590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909045" comment="NetworkManager-applet-1.24.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909046" comment="NetworkManager-applet-lang-1.24.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909047" comment="NetworkManager-connection-editor-1.24.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248925" version="1" class="patch">
	<metadata>
		<title>NetworkManager-vpnc-1.2.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10900" ref_url="https://www.suse.com/security/cve/CVE-2018-10900/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-vpnc-1.2.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10900/">CVE-2018-10900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10900">CVE-2018-10900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909048" comment="NetworkManager-vpnc-1.2.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909049" comment="NetworkManager-vpnc-gnome-1.2.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909050" comment="NetworkManager-vpnc-lang-1.2.6-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248926" version="1" class="patch">
	<metadata>
		<title>PackageKit-1.2.2-13.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-1.2.2-13.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1106">CVE-2018-1106 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16121">CVE-2020-16121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909051" comment="PackageKit-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909052" comment="PackageKit-backend-dnf-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909053" comment="PackageKit-backend-zypp-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909054" comment="PackageKit-branding-upstream-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909055" comment="PackageKit-devel-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909056" comment="PackageKit-gstreamer-plugin-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909057" comment="PackageKit-gtk3-module-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909058" comment="PackageKit-lang-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909059" comment="libpackagekit-glib2-18-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909060" comment="libpackagekit-glib2-18-32bit-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909061" comment="libpackagekit-glib2-devel-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909062" comment="libpackagekit-glib2-devel-32bit-1.2.2-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909063" comment="typelib-1_0-PackageKitGlib-1_0-1.2.2-13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248927" version="1" class="patch">
	<metadata>
		<title>libSDL-1_2-0-1.2.15-22.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL-1_2-0-1.2.15-22.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909064" comment="libSDL-1_2-0-1.2.15-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909065" comment="libSDL-1_2-0-32bit-1.2.15-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909066" comment="libSDL-devel-1.2.15-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909067" comment="libSDL-devel-32bit-1.2.15-22.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248928" version="1" class="patch">
	<metadata>
		<title>libSDL2-2_0-0-2.0.16-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2-2_0-0-2.0.16-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2888">CVE-2017-2888 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13626">CVE-2019-13626 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909068" comment="libSDL2-2_0-0-2.0.16-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909069" comment="libSDL2-2_0-0-32bit-2.0.16-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909070" comment="libSDL2-devel-2.0.16-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909071" comment="libSDL2-devel-32bit-2.0.16-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248929" version="1" class="patch">
	<metadata>
		<title>libSDL2_image-2_0-0-2.0.5-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12122" ref_url="https://www.suse.com/security/cve/CVE-2017-12122/" source="CVE"/>
		<reference ref_id="CVE-2017-14440" ref_url="https://www.suse.com/security/cve/CVE-2017-14440/" source="CVE"/>
		<reference ref_id="CVE-2017-14441" ref_url="https://www.suse.com/security/cve/CVE-2017-14441/" source="CVE"/>
		<reference ref_id="CVE-2017-14442" ref_url="https://www.suse.com/security/cve/CVE-2017-14442/" source="CVE"/>
		<reference ref_id="CVE-2017-14448" ref_url="https://www.suse.com/security/cve/CVE-2017-14448/" source="CVE"/>
		<reference ref_id="CVE-2017-14449" ref_url="https://www.suse.com/security/cve/CVE-2017-14449/" source="CVE"/>
		<reference ref_id="CVE-2017-14450" ref_url="https://www.suse.com/security/cve/CVE-2017-14450/" source="CVE"/>
		<reference ref_id="CVE-2017-2887" ref_url="https://www.suse.com/security/cve/CVE-2017-2887/" source="CVE"/>
		<reference ref_id="CVE-2018-3839" ref_url="https://www.suse.com/security/cve/CVE-2018-3839/" source="CVE"/>
		<reference ref_id="CVE-2018-3977" ref_url="https://www.suse.com/security/cve/CVE-2018-3977/" source="CVE"/>
		<reference ref_id="CVE-2019-12217" ref_url="https://www.suse.com/security/cve/CVE-2019-12217/" source="CVE"/>
		<reference ref_id="CVE-2019-12218" ref_url="https://www.suse.com/security/cve/CVE-2019-12218/" source="CVE"/>
		<reference ref_id="CVE-2019-12220" ref_url="https://www.suse.com/security/cve/CVE-2019-12220/" source="CVE"/>
		<reference ref_id="CVE-2019-12221" ref_url="https://www.suse.com/security/cve/CVE-2019-12221/" source="CVE"/>
		<reference ref_id="CVE-2019-12222" ref_url="https://www.suse.com/security/cve/CVE-2019-12222/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-5051" ref_url="https://www.suse.com/security/cve/CVE-2019-5051/" source="CVE"/>
		<reference ref_id="CVE-2019-5052" ref_url="https://www.suse.com/security/cve/CVE-2019-5052/" source="CVE"/>
		<reference ref_id="CVE-2019-5057" ref_url="https://www.suse.com/security/cve/CVE-2019-5057/" source="CVE"/>
		<reference ref_id="CVE-2019-5058" ref_url="https://www.suse.com/security/cve/CVE-2019-5058/" source="CVE"/>
		<reference ref_id="CVE-2019-5059" ref_url="https://www.suse.com/security/cve/CVE-2019-5059/" source="CVE"/>
		<reference ref_id="CVE-2019-5060" ref_url="https://www.suse.com/security/cve/CVE-2019-5060/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2_image-2_0-0-2.0.5-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12122/">CVE-2017-12122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12122">CVE-2017-12122 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14440/">CVE-2017-14440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14440">CVE-2017-14440 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14441/">CVE-2017-14441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14441">CVE-2017-14441 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14442/">CVE-2017-14442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14442">CVE-2017-14442 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14448/">CVE-2017-14448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14448">CVE-2017-14448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14449/">CVE-2017-14449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14449">CVE-2017-14449 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14450/">CVE-2017-14450 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14450">CVE-2017-14450 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2887/">CVE-2017-2887 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2887">CVE-2017-2887 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3839/">CVE-2018-3839 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3839">CVE-2018-3839 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3977/">CVE-2018-3977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3977">CVE-2018-3977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12217/">CVE-2019-12217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12217">CVE-2019-12217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12218/">CVE-2019-12218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12218">CVE-2019-12218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12220/">CVE-2019-12220 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12220">CVE-2019-12220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12221/">CVE-2019-12221 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12221">CVE-2019-12221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12222/">CVE-2019-12222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12222">CVE-2019-12222 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5051/">CVE-2019-5051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5051">CVE-2019-5051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5052/">CVE-2019-5052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5052">CVE-2019-5052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5057/">CVE-2019-5057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5057">CVE-2019-5057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5058/">CVE-2019-5058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5058">CVE-2019-5058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5059/">CVE-2019-5059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5059">CVE-2019-5059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5060/">CVE-2019-5060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5060">CVE-2019-5060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909072" comment="libSDL2_image-2_0-0-2.0.5-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909073" comment="libSDL2_image-2_0-0-32bit-2.0.5-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909074" comment="libSDL2_image-devel-2.0.5-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909075" comment="libSDL2_image-devel-32bit-2.0.5-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248930" version="1" class="patch">
	<metadata>
		<title>libSDL_image-1_2-0-1.2.12+hg695-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-5052" ref_url="https://www.suse.com/security/cve/CVE-2019-5052/" source="CVE"/>
		<reference ref_id="CVE-2019-5057" ref_url="https://www.suse.com/security/cve/CVE-2019-5057/" source="CVE"/>
		<reference ref_id="CVE-2019-5058" ref_url="https://www.suse.com/security/cve/CVE-2019-5058/" source="CVE"/>
		<reference ref_id="CVE-2019-5059" ref_url="https://www.suse.com/security/cve/CVE-2019-5059/" source="CVE"/>
		<reference ref_id="CVE-2019-5060" ref_url="https://www.suse.com/security/cve/CVE-2019-5060/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL_image-1_2-0-1.2.12+hg695-1.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5052/">CVE-2019-5052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5052">CVE-2019-5052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5057/">CVE-2019-5057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5057">CVE-2019-5057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5058/">CVE-2019-5058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5058">CVE-2019-5058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5059/">CVE-2019-5059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5059">CVE-2019-5059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5060/">CVE-2019-5060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5060">CVE-2019-5060 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909076" comment="libSDL_image-1_2-0-1.2.12+hg695-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909077" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909078" comment="libSDL_image-devel-1.2.12+hg695-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909079" comment="libSDL_image-devel-32bit-1.2.12+hg695-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248931" version="1" class="patch">
	<metadata>
		<title>libSDL_sound-1_0-1-1.0.3-94.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL_sound-1_0-1-1.0.3-94.20 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909080" comment="libSDL_sound-1_0-1-1.0.3-94.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909081" comment="libSDL_sound-1_0-1-32bit-1.0.3-94.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909082" comment="libSDL_sound-devel-1.0.3-94.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909083" comment="libSDL_sound-devel-32bit-1.0.3-94.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248932" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.55-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.55-8.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14036">CVE-2018-14036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909084" comment="accountsservice-0.6.55-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909085" comment="accountsservice-devel-0.6.55-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909086" comment="accountsservice-lang-0.6.55-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909087" comment="libaccountsservice0-0.6.55-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909088" comment="typelib-1_0-AccountsService-1_0-0.6.55-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248933" version="1" class="patch">
	<metadata>
		<title>adns-1.6.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<description>
These are all security issues fixed in the adns-1.6.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-1447">CVE-2008-1447 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909089" comment="adns-1.6.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909090" comment="libadns-devel-1.6.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909091" comment="libadns-devel-32bit-1.6.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909092" comment="libadns1-1.6.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909093" comment="libadns1-32bit-1.6.0-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248934" version="1" class="patch">
	<metadata>
		<title>alpine-2.25-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14929" ref_url="https://www.suse.com/security/cve/CVE-2020-14929/" source="CVE"/>
		<description>
These are all security issues fixed in the alpine-2.25-24.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14929/">CVE-2020-14929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14929">CVE-2020-14929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909094" comment="alpine-2.25-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909095" comment="pico-5.07-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909096" comment="pilot-2.99-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248935" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.12.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.12.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1349">CVE-2005-1349 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909097" comment="amavisd-new-2.12.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909098" comment="amavisd-new-docs-2.12.1-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248936" version="1" class="patch">
	<metadata>
		<title>ansible-2.9.24-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-2.9.24-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909099" comment="ansible-2.9.24-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909100" comment="ansible-doc-2.9.24-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909101" comment="ansible-test-2.9.24-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248937" version="1" class="patch">
	<metadata>
		<title>ant-1.10.10-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="CVE-2020-11979" ref_url="https://www.suse.com/security/cve/CVE-2020-11979/" source="CVE"/>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.10.10-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11979/">CVE-2020-11979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11979">CVE-2020-11979 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1945">CVE-2020-1945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909102" comment="ant-1.10.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909103" comment="ant-jmf-1.10.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909104" comment="ant-scripts-1.10.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909105" comment="ant-swing-1.10.10-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248938" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.9.4-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114/" source="CVE"/>
		<reference ref_id="CVE-2015-4852" ref_url="https://www.suse.com/security/cve/CVE-2015-4852/" source="CVE"/>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.9.4-3.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0114">CVE-2014-0114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4852/">CVE-2015-4852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4852">CVE-2015-4852 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909106" comment="apache-commons-beanutils-1.9.4-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909107" comment="apache-commons-beanutils-javadoc-1.9.4-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248939" version="1" class="patch">
	<metadata>
		<title>apache-commons-compress-1.21-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12402" ref_url="https://www.suse.com/security/cve/CVE-2019-12402/" source="CVE"/>
		<reference ref_id="CVE-2021-35515" ref_url="https://www.suse.com/security/cve/CVE-2021-35515/" source="CVE"/>
		<reference ref_id="CVE-2021-35516" ref_url="https://www.suse.com/security/cve/CVE-2021-35516/" source="CVE"/>
		<reference ref_id="CVE-2021-35517" ref_url="https://www.suse.com/security/cve/CVE-2021-35517/" source="CVE"/>
		<reference ref_id="CVE-2021-36090" ref_url="https://www.suse.com/security/cve/CVE-2021-36090/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-compress-1.21-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12402/">CVE-2019-12402 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12402">CVE-2019-12402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35515/">CVE-2021-35515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35515">CVE-2021-35515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35516/">CVE-2021-35516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35516">CVE-2021-35516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35517/">CVE-2021-35517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35517">CVE-2021-35517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36090/">CVE-2021-36090 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36090">CVE-2021-36090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909108" comment="apache-commons-compress-1.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909109" comment="apache-commons-compress-javadoc-1.21-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248940" version="1" class="patch">
	<metadata>
		<title>apache-commons-email-1.5-3.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9801" ref_url="https://www.suse.com/security/cve/CVE-2017-9801/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-email-1.5-3.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9801/">CVE-2017-9801 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9801">CVE-2017-9801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909110" comment="apache-commons-email-1.5-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909111" comment="apache-commons-email-javadoc-1.5-3.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248941" version="1" class="patch">
	<metadata>
		<title>apache-commons-fileupload-1.4-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-fileupload-1.4-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909112" comment="apache-commons-fileupload-1.4-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909113" comment="apache-commons-fileupload-javadoc-1.4-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248942" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-13.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-13.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909114" comment="apache-commons-httpclient-3.1-13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909115" comment="apache-commons-httpclient-demo-3.1-13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909116" comment="apache-commons-httpclient-javadoc-3.1-13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909117" comment="apache-commons-httpclient-manual-3.1-13.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248943" version="1" class="patch">
	<metadata>
		<title>apache-pdfbox-2.0.23-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11797" ref_url="https://www.suse.com/security/cve/CVE-2018-11797/" source="CVE"/>
		<reference ref_id="CVE-2018-8036" ref_url="https://www.suse.com/security/cve/CVE-2018-8036/" source="CVE"/>
		<reference ref_id="CVE-2021-27807" ref_url="https://www.suse.com/security/cve/CVE-2021-27807/" source="CVE"/>
		<reference ref_id="CVE-2021-27906" ref_url="https://www.suse.com/security/cve/CVE-2021-27906/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-pdfbox-2.0.23-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11797/">CVE-2018-11797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11797">CVE-2018-11797 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8036/">CVE-2018-8036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8036">CVE-2018-8036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27807/">CVE-2021-27807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27807">CVE-2021-27807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27906/">CVE-2021-27906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27906">CVE-2021-27906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909118" comment="apache-pdfbox-2.0.23-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909119" comment="apache-pdfbox-javadoc-2.0.23-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248944" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.49-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3352" ref_url="https://www.suse.com/security/cve/CVE-2005-3352/" source="CVE"/>
		<reference ref_id="CVE-2005-3357" ref_url="https://www.suse.com/security/cve/CVE-2005-3357/" source="CVE"/>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.49-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3352/">CVE-2005-3352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3352">CVE-2005-3352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3357/">CVE-2005-3357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3357">CVE-2005-3357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8740">CVE-2016-8740 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10081">CVE-2019-10081 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10082">CVE-2019-10082 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10097">CVE-2019-10097 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909120" comment="apache2-2.4.49-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248945" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.4.9.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857/" source="CVE"/>
		<reference ref_id="CVE-2021-32785" ref_url="https://www.suse.com/security/cve/CVE-2021-32785/" source="CVE"/>
		<reference ref_id="CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.4.9.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14857">CVE-2019-14857 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32785/">CVE-2021-32785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32785">CVE-2021-32785 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32786">CVE-2021-32786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909121" comment="apache2-mod_auth_openidc-2.4.9.4-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248946" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.48-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<reference ref_id="CVE-2018-1323" ref_url="https://www.suse.com/security/cve/CVE-2018-1323/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.48-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0774">CVE-2007-0774 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1323/">CVE-2018-1323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1323">CVE-2018-1323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909122" comment="apache2-mod_jk-1.2.48-2.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248947" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.11-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.11-2.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1349">CVE-2007-1349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">CVE-2011-2767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909123" comment="apache2-mod_perl-2.0.11-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909124" comment="apache2-mod_perl-devel-2.0.11-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248948" version="1" class="patch">
	<metadata>
		<title>apache2-mod_apparmor-3.0.3-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_apparmor-3.0.3-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6507">CVE-2017-6507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909125" comment="apache2-mod_apparmor-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909126" comment="apparmor-abstractions-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909127" comment="apparmor-docs-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909128" comment="apparmor-parser-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909129" comment="apparmor-parser-lang-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909130" comment="apparmor-profiles-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909131" comment="apparmor-utils-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909132" comment="apparmor-utils-lang-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909133" comment="pam_apparmor-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909134" comment="pam_apparmor-32bit-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909135" comment="perl-apparmor-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909136" comment="python3-apparmor-3.0.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909137" comment="ruby-apparmor-3.0.3-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248949" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909138" comment="apr-devel-1.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909139" comment="libapr1-1.7.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248950" version="1" class="patch">
	<metadata>
		<title>apr-util-devel-1.6.1-7.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-util-devel-1.6.1-7.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909140" comment="apr-util-devel-1.6.1-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909141" comment="libapr-util1-1.6.1-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909142" comment="libapr-util1-dbd-mysql-1.6.1-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909143" comment="libapr-util1-dbd-pgsql-1.6.1-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909144" comment="libapr-util1-dbd-sqlite3-1.6.1-7.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248951" version="1" class="patch">
	<metadata>
		<title>arc-5.21q-6.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-9275" ref_url="https://www.suse.com/security/cve/CVE-2015-9275/" source="CVE"/>
		<description>
These are all security issues fixed in the arc-5.21q-6.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9275/">CVE-2015-9275 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9275">CVE-2015-9275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909145" comment="arc-5.21q-6.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248952" version="1" class="patch">
	<metadata>
		<title>aria2-1.36.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3500" ref_url="https://www.suse.com/security/cve/CVE-2019-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the aria2-1.36.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3500/">CVE-2019-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3500">CVE-2019-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909146" comment="aria2-1.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909147" comment="aria2-devel-1.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909148" comment="aria2-lang-1.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909149" comment="libaria2-0-1.36.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248953" version="1" class="patch">
	<metadata>
		<title>ark-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-16116" ref_url="https://www.suse.com/security/cve/CVE-2020-16116/" source="CVE"/>
		<reference ref_id="CVE-2020-24654" ref_url="https://www.suse.com/security/cve/CVE-2020-24654/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16116/">CVE-2020-16116 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16116">CVE-2020-16116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24654/">CVE-2020-24654 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24654">CVE-2020-24654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909150" comment="ark-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909151" comment="ark-lang-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909152" comment="libkerfuffle21-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248954" version="1" class="patch">
	<metadata>
		<title>arm-trusted-firmware-2.5-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the arm-trusted-firmware-2.5-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909153" comment="arm-trusted-firmware-2.5-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909154" comment="arm-trusted-firmware-tools-2.5-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248955" version="1" class="patch">
	<metadata>
		<title>arpwatch-3.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
These are all security issues fixed in the arpwatch-3.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909155" comment="arpwatch-3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909156" comment="arpwatch-ethercodes-build-3.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248956" version="1" class="patch">
	<metadata>
		<title>aspell-0.60.8-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
These are all security issues fixed in the aspell-0.60.8-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909157" comment="aspell-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909158" comment="aspell-devel-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909159" comment="aspell-ispell-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909160" comment="aspell-spell-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909161" comment="libaspell15-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909162" comment="libaspell15-32bit-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909163" comment="libpspell15-0.60.8-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909164" comment="libpspell15-32bit-0.60.8-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248957" version="1" class="patch">
	<metadata>
		<title>atftp-0.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2020-6097" ref_url="https://www.suse.com/security/cve/CVE-2020-6097/" source="CVE"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
These are all security issues fixed in the atftp-0.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6097/">CVE-2020-6097 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6097">CVE-2020-6097 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41054">CVE-2021-41054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909165" comment="atftp-0.7.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248958" version="1" class="patch">
	<metadata>
		<title>atheme-7.2.11-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6384" ref_url="https://www.suse.com/security/cve/CVE-2017-6384/" source="CVE"/>
		<description>
These are all security issues fixed in the atheme-7.2.11-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6384/">CVE-2017-6384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6384">CVE-2017-6384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909166" comment="atheme-7.2.11-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909167" comment="atheme-devel-7.2.11-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909168" comment="libathemecore1-7.2.11-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248959" version="1" class="patch">
	<metadata>
		<title>aubio-tools-0.4.9-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17054" ref_url="https://www.suse.com/security/cve/CVE-2017-17054/" source="CVE"/>
		<reference ref_id="CVE-2017-17554" ref_url="https://www.suse.com/security/cve/CVE-2017-17554/" source="CVE"/>
		<reference ref_id="CVE-2018-14522" ref_url="https://www.suse.com/security/cve/CVE-2018-14522/" source="CVE"/>
		<description>
These are all security issues fixed in the aubio-tools-0.4.9-5.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17054/">CVE-2017-17054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17054">CVE-2017-17054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17554/">CVE-2017-17554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17554">CVE-2017-17554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14522/">CVE-2018-14522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14522">CVE-2018-14522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909169" comment="aubio-tools-0.4.9-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909170" comment="libaubio-devel-0.4.9-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909171" comment="libaubio5-0.4.9-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909172" comment="libaubio5-32bit-0.4.9-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248960" version="1" class="patch">
	<metadata>
		<title>audacity-3.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6061" ref_url="https://www.suse.com/security/cve/CVE-2007-6061/" source="CVE"/>
		<description>
These are all security issues fixed in the audacity-3.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6061/">CVE-2007-6061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6061">CVE-2007-6061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909173" comment="audacity-3.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909174" comment="audacity-lang-3.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248961" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-11.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-11.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6828">CVE-2017-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6830">CVE-2017-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6832">CVE-2017-6832 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6834">CVE-2017-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6835">CVE-2017-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6837">CVE-2017-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6839">CVE-2017-6839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17095">CVE-2018-17095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909175" comment="audiofile-0.3.6-11.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909176" comment="audiofile-devel-0.3.6-11.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909177" comment="audiofile-devel-32bit-0.3.6-11.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909178" comment="audiofile-doc-0.3.6-11.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909179" comment="libaudiofile1-0.3.6-11.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909180" comment="libaudiofile1-32bit-0.3.6-11.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248962" version="1" class="patch">
	<metadata>
		<title>augeas-1.12.0-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.12.0-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909181" comment="augeas-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909182" comment="augeas-devel-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909183" comment="augeas-devel-32bit-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909184" comment="augeas-lense-tests-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909185" comment="augeas-lenses-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909186" comment="libaugeas0-1.12.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909187" comment="libaugeas0-32bit-1.12.0-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248963" version="1" class="patch">
	<metadata>
		<title>autoyast2-4.4.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18905" ref_url="https://www.suse.com/security/cve/CVE-2019-18905/" source="CVE"/>
		<description>
These are all security issues fixed in the autoyast2-4.4.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18905/">CVE-2019-18905 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18905">CVE-2019-18905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909188" comment="autoyast2-4.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909189" comment="autoyast2-installation-4.4.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248964" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519/" source="CVE"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="CVE-2021-3502" ref_url="https://www.suse.com/security/cve/CVE-2021-3502/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">CVE-2017-6519 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">CVE-2021-26720 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3502/">CVE-2021-3502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3502">CVE-2021-3502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909190" comment="avahi-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909191" comment="avahi-autoipd-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909192" comment="avahi-compat-howl-devel-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909193" comment="avahi-compat-mDNSResponder-devel-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909194" comment="avahi-lang-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909195" comment="avahi-utils-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909196" comment="libavahi-client3-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909197" comment="libavahi-client3-32bit-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909198" comment="libavahi-common3-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909199" comment="libavahi-common3-32bit-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909200" comment="libavahi-core7-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909201" comment="libavahi-devel-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909202" comment="libavahi-libevent1-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909203" comment="libdns_sd-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909204" comment="libdns_sd-32bit-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909205" comment="libhowl0-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909206" comment="python36-avahi-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909207" comment="python38-avahi-0.8-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909208" comment="python39-avahi-0.8-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248965" version="1" class="patch">
	<metadata>
		<title>aws-cli-1.20.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-cli-1.20.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15869">CVE-2018-15869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909209" comment="aws-cli-1.20.7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248966" version="1" class="patch">
	<metadata>
		<title>axel-2.17.10-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13614" ref_url="https://www.suse.com/security/cve/CVE-2020-13614/" source="CVE"/>
		<description>
These are all security issues fixed in the axel-2.17.10-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13614/">CVE-2020-13614 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13614">CVE-2020-13614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909210" comment="axel-2.17.10-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248967" version="1" class="patch">
	<metadata>
		<title>axis-1.4-302.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
These are all security issues fixed in the axis-1.4-302.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5784">CVE-2012-5784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3596">CVE-2014-3596 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909211" comment="axis-1.4-302.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909212" comment="axis-manual-1.4-302.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248968" version="1" class="patch">
	<metadata>
		<title>backintime-1.3.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7572" ref_url="https://www.suse.com/security/cve/CVE-2017-7572/" source="CVE"/>
		<description>
These are all security issues fixed in the backintime-1.3.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7572/">CVE-2017-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7572">CVE-2017-7572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909213" comment="backintime-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909214" comment="backintime-lang-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909215" comment="backintime-qt-1.3.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248969" version="1" class="patch">
	<metadata>
		<title>bchunk-1.2.2-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15953" ref_url="https://www.suse.com/security/cve/CVE-2017-15953/" source="CVE"/>
		<reference ref_id="CVE-2017-15955" ref_url="https://www.suse.com/security/cve/CVE-2017-15955/" source="CVE"/>
		<description>
These are all security issues fixed in the bchunk-1.2.2-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15953/">CVE-2017-15953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15953">CVE-2017-15953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15955/">CVE-2017-15955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15955">CVE-2017-15955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909216" comment="bchunk-1.2.2-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248970" version="1" class="patch">
	<metadata>
		<title>benji-0.15.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288/" source="CVE"/>
		<description>
These are all security issues fixed in the benji-0.15.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20288">CVE-2021-20288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909217" comment="benji-0.15.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248971" version="1" class="patch">
	<metadata>
		<title>bind-9.16.20-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2015-8461" ref_url="https://www.suse.com/security/cve/CVE-2015-8461/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="CVE-2018-5737" ref_url="https://www.suse.com/security/cve/CVE-2018-5737/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<reference ref_id="CVE-2019-6476" ref_url="https://www.suse.com/security/cve/CVE-2019-6476/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="CVE-2021-25218" ref_url="https://www.suse.com/security/cve/CVE-2021-25218/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.16.20-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8461/">CVE-2015-8461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8461">CVE-2015-8461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9778">CVE-2016-9778 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3141">CVE-2017-3141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5737/">CVE-2018-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5737">CVE-2018-5737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6471">CVE-2019-6471 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6476/">CVE-2019-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-6476">CVE-2019-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6477">CVE-2019-6477 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8618">CVE-2020-8618 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8619">CVE-2020-8619 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8620">CVE-2020-8620 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8621">CVE-2020-8621 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25218/">CVE-2021-25218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25218">CVE-2021-25218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909218" comment="bind-9.16.20-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909219" comment="bind-doc-9.16.20-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909220" comment="bind-utils-9.16.20-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909221" comment="python3-bind-9.16.20-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248972" version="1" class="patch">
	<metadata>
		<title>binutils-2.37-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9939">CVE-2014-9939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12448">CVE-2017-12448 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12450">CVE-2017-12450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12452">CVE-2017-12452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12453">CVE-2017-12453 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12454">CVE-2017-12454 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12456">CVE-2017-12456 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12799">CVE-2017-12799 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13757">CVE-2017-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14128">CVE-2017-14128 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14129">CVE-2017-14129 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14130">CVE-2017-14130 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14333">CVE-2017-14333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14529">CVE-2017-14529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14729">CVE-2017-14729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14745">CVE-2017-14745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14974">CVE-2017-14974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15938">CVE-2017-15938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15939">CVE-2017-15939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15996">CVE-2017-15996 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16826">CVE-2017-16826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16827">CVE-2017-16827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16828">CVE-2017-16828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16830">CVE-2017-16830 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16831">CVE-2017-16831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16832">CVE-2017-16832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6965">CVE-2017-6965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6966">CVE-2017-6966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6969">CVE-2017-6969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7209">CVE-2017-7209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7210">CVE-2017-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7223">CVE-2017-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7224">CVE-2017-7224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7225">CVE-2017-7225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7226">CVE-2017-7226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7299">CVE-2017-7299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7300">CVE-2017-7300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7301">CVE-2017-7301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7302">CVE-2017-7302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7303">CVE-2017-7303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7304">CVE-2017-7304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8392">CVE-2017-8392 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8393">CVE-2017-8393 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8394">CVE-2017-8394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8396">CVE-2017-8396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8421">CVE-2017-8421 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9746">CVE-2017-9746 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9747">CVE-2017-9747 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9748">CVE-2017-9748 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9750">CVE-2017-9750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9755">CVE-2017-9755 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9756">CVE-2017-9756 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6323">CVE-2018-6323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6543">CVE-2018-6543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6759">CVE-2018-6759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6872">CVE-2018-6872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7570">CVE-2018-7570 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909222" comment="binutils-2.37-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909223" comment="binutils-devel-2.37-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909224" comment="binutils-devel-32bit-2.37-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909225" comment="binutils-gold-2.37-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909226" comment="libctf-nobfd0-2.37-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909227" comment="libctf0-2.37-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248973" version="1" class="patch">
	<metadata>
		<title>bird-2.0.8-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16159" ref_url="https://www.suse.com/security/cve/CVE-2019-16159/" source="CVE"/>
		<description>
These are all security issues fixed in the bird-2.0.8-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16159/">CVE-2019-16159 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16159">CVE-2019-16159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909228" comment="bird-2.0.8-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909229" comment="bird-doc-2.0.8-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248974" version="1" class="patch">
	<metadata>
		<title>bison-3.7.6-3.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-24979" ref_url="https://www.suse.com/security/cve/CVE-2020-24979/" source="CVE"/>
		<description>
These are all security issues fixed in the bison-3.7.6-3.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24979/">CVE-2020-24979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-24979">CVE-2020-24979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909230" comment="bison-3.7.6-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909231" comment="bison-32bit-3.7.6-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909232" comment="bison-lang-3.7.6-3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248975" version="1" class="patch">
	<metadata>
		<title>bitcoin-qt5-0.21.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17144" ref_url="https://www.suse.com/security/cve/CVE-2018-17144/" source="CVE"/>
		<reference ref_id="CVE-2021-3195" ref_url="https://www.suse.com/security/cve/CVE-2021-3195/" source="CVE"/>
		<description>
These are all security issues fixed in the bitcoin-qt5-0.21.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17144/">CVE-2018-17144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17144">CVE-2018-17144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3195/">CVE-2021-3195 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3195">CVE-2021-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909233" comment="bitcoin-qt5-0.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909234" comment="bitcoin-test-0.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909235" comment="bitcoin-utils-0.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909236" comment="bitcoind-0.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909237" comment="libbitcoinconsensus-devel-0.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909238" comment="libbitcoinconsensus0-0.21.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248976" version="1" class="patch">
	<metadata>
		<title>blosc-devel-1.21.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29367" ref_url="https://www.suse.com/security/cve/CVE-2020-29367/" source="CVE"/>
		<description>
These are all security issues fixed in the blosc-devel-1.21.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-29367/">CVE-2020-29367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29367">CVE-2020-29367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909239" comment="blosc-devel-1.21.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909240" comment="libblosc1-1.21.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248977" version="1" class="patch">
	<metadata>
		<title>blueman-2.2.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15238" ref_url="https://www.suse.com/security/cve/CVE-2020-15238/" source="CVE"/>
		<description>
These are all security issues fixed in the blueman-2.2.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15238/">CVE-2020-15238 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15238">CVE-2020-15238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909241" comment="blueman-2.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909242" comment="blueman-lang-2.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909243" comment="caja-extension-sendto-blueman-2.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909244" comment="nautilus-extension-sendto-blueman-2.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909245" comment="nemo-extension-sendto-blueman-2.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909246" comment="thunar-sendto-blueman-2.2.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248978" version="1" class="patch">
	<metadata>
		<title>bluez-5.61-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.61-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9804">CVE-2016-9804 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909247" comment="bluez-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909248" comment="bluez-auto-enable-devices-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909249" comment="bluez-cups-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909250" comment="bluez-deprecated-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909251" comment="bluez-devel-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909252" comment="bluez-devel-32bit-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909253" comment="bluez-test-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909254" comment="libbluetooth3-5.61-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909255" comment="libbluetooth3-32bit-5.61-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248979" version="1" class="patch">
	<metadata>
		<title>boinc-client-7.18.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0126" ref_url="https://www.suse.com/security/cve/CVE-2009-0126/" source="CVE"/>
		<description>
These are all security issues fixed in the boinc-client-7.18.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0126/">CVE-2009-0126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0126">CVE-2009-0126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909256" comment="boinc-client-7.18.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909257" comment="boinc-client-lang-7.18.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909258" comment="boinc-manager-7.18.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909259" comment="boinc-manager-lang-7.18.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909260" comment="libboinc-devel-7.18.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909261" comment="libboinc7-7.18.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248980" version="1" class="patch">
	<metadata>
		<title>borgbackup-1.1.17-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10099" ref_url="https://www.suse.com/security/cve/CVE-2016-10099/" source="CVE"/>
		<reference ref_id="CVE-2016-10100" ref_url="https://www.suse.com/security/cve/CVE-2016-10100/" source="CVE"/>
		<reference ref_id="CVE-2017-15914" ref_url="https://www.suse.com/security/cve/CVE-2017-15914/" source="CVE"/>
		<description>
These are all security issues fixed in the borgbackup-1.1.17-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10099/">CVE-2016-10099 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10099">CVE-2016-10099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10100/">CVE-2016-10100 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10100">CVE-2016-10100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15914/">CVE-2017-15914 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15914">CVE-2017-15914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909262" comment="borgbackup-1.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909263" comment="borgbackup-bash-completion-1.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909264" comment="borgbackup-doc-1.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909265" comment="borgbackup-fish-completion-1.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909266" comment="borgbackup-zsh-completion-1.1.17-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248981" version="1" class="patch">
	<metadata>
		<title>boringssl-devel-20200921-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<description>
These are all security issues fixed in the boringssl-devel-20200921-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909267" comment="boringssl-devel-20200921-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909268" comment="boringssl-source-20200921-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909269" comment="libboringssl1-20200921-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248982" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.68-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1000338" ref_url="https://www.suse.com/security/cve/CVE-2016-1000338/" source="CVE"/>
		<reference ref_id="CVE-2016-1000339" ref_url="https://www.suse.com/security/cve/CVE-2016-1000339/" source="CVE"/>
		<reference ref_id="CVE-2016-1000340" ref_url="https://www.suse.com/security/cve/CVE-2016-1000340/" source="CVE"/>
		<reference ref_id="CVE-2016-1000341" ref_url="https://www.suse.com/security/cve/CVE-2016-1000341/" source="CVE"/>
		<reference ref_id="CVE-2016-1000342" ref_url="https://www.suse.com/security/cve/CVE-2016-1000342/" source="CVE"/>
		<reference ref_id="CVE-2016-1000343" ref_url="https://www.suse.com/security/cve/CVE-2016-1000343/" source="CVE"/>
		<reference ref_id="CVE-2016-1000344" ref_url="https://www.suse.com/security/cve/CVE-2016-1000344/" source="CVE"/>
		<reference ref_id="CVE-2016-1000345" ref_url="https://www.suse.com/security/cve/CVE-2016-1000345/" source="CVE"/>
		<reference ref_id="CVE-2016-1000346" ref_url="https://www.suse.com/security/cve/CVE-2016-1000346/" source="CVE"/>
		<reference ref_id="CVE-2016-1000352" ref_url="https://www.suse.com/security/cve/CVE-2016-1000352/" source="CVE"/>
		<reference ref_id="CVE-2017-13098" ref_url="https://www.suse.com/security/cve/CVE-2017-13098/" source="CVE"/>
		<reference ref_id="CVE-2018-1000180" ref_url="https://www.suse.com/security/cve/CVE-2018-1000180/" source="CVE"/>
		<reference ref_id="CVE-2018-1000613" ref_url="https://www.suse.com/security/cve/CVE-2018-1000613/" source="CVE"/>
		<reference ref_id="CVE-2019-17359" ref_url="https://www.suse.com/security/cve/CVE-2019-17359/" source="CVE"/>
		<reference ref_id="CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522/" source="CVE"/>
		<reference ref_id="CVE-2020-28052" ref_url="https://www.suse.com/security/cve/CVE-2020-28052/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.68-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000338/">CVE-2016-1000338 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000338">CVE-2016-1000338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000339/">CVE-2016-1000339 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000339">CVE-2016-1000339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000340/">CVE-2016-1000340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000340">CVE-2016-1000340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000341/">CVE-2016-1000341 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000341">CVE-2016-1000341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000342/">CVE-2016-1000342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000342">CVE-2016-1000342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000343/">CVE-2016-1000343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000343">CVE-2016-1000343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000344/">CVE-2016-1000344 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000344">CVE-2016-1000344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000345/">CVE-2016-1000345 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000345">CVE-2016-1000345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000346/">CVE-2016-1000346 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000346">CVE-2016-1000346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000352/">CVE-2016-1000352 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000352">CVE-2016-1000352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13098/">CVE-2017-13098 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13098">CVE-2017-13098 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000180/">CVE-2018-1000180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000180">CVE-2018-1000180 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000613/">CVE-2018-1000613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000613">CVE-2018-1000613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17359/">CVE-2019-17359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17359">CVE-2019-17359 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15522">CVE-2020-15522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28052/">CVE-2020-28052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28052">CVE-2020-28052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909270" comment="bouncycastle-1.68-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909271" comment="bouncycastle-javadoc-1.68-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909272" comment="bouncycastle-mail-1.68-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909273" comment="bouncycastle-pg-1.68-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909274" comment="bouncycastle-pkix-1.68-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909275" comment="bouncycastle-tls-1.68-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248983" version="1" class="patch">
	<metadata>
		<title>btrfsmaintenance-0.5-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722/" source="CVE"/>
		<description>
These are all security issues fixed in the btrfsmaintenance-0.5-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14722">CVE-2018-14722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909276" comment="btrfsmaintenance-0.5-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248984" version="1" class="patch">
	<metadata>
		<title>bubblewrap-0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-12439" ref_url="https://www.suse.com/security/cve/CVE-2019-12439/" source="CVE"/>
		<reference ref_id="CVE-2020-5291" ref_url="https://www.suse.com/security/cve/CVE-2020-5291/" source="CVE"/>
		<description>
These are all security issues fixed in the bubblewrap-0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5226">CVE-2017-5226 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12439/">CVE-2019-12439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12439">CVE-2019-12439 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5291/">CVE-2020-5291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5291">CVE-2020-5291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909277" comment="bubblewrap-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909278" comment="bubblewrap-zsh-completion-0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248985" version="1" class="patch">
	<metadata>
		<title>bugzilla-5.0.6-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1517" ref_url="https://www.suse.com/security/cve/CVE-2014-1517/" source="CVE"/>
		<reference ref_id="CVE-2014-1571" ref_url="https://www.suse.com/security/cve/CVE-2014-1571/" source="CVE"/>
		<reference ref_id="CVE-2015-4499" ref_url="https://www.suse.com/security/cve/CVE-2015-4499/" source="CVE"/>
		<reference ref_id="CVE-2015-8508" ref_url="https://www.suse.com/security/cve/CVE-2015-8508/" source="CVE"/>
		<reference ref_id="CVE-2015-8509" ref_url="https://www.suse.com/security/cve/CVE-2015-8509/" source="CVE"/>
		<reference ref_id="CVE-2016-2803" ref_url="https://www.suse.com/security/cve/CVE-2016-2803/" source="CVE"/>
		<description>
These are all security issues fixed in the bugzilla-5.0.6-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1517/">CVE-2014-1517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1517">CVE-2014-1517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1571/">CVE-2014-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1571">CVE-2014-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4499/">CVE-2015-4499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4499">CVE-2015-4499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8508/">CVE-2015-8508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8508">CVE-2015-8508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8509/">CVE-2015-8509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8509">CVE-2015-8509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2803/">CVE-2016-2803 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2803">CVE-2016-2803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909279" comment="bugzilla-5.0.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909280" comment="bugzilla-apache-5.0.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909281" comment="bugzilla-lang-de-5.0.6-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248986" version="1" class="patch">
	<metadata>
		<title>build-20210902-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-4226" ref_url="https://www.suse.com/security/cve/CVE-2010-4226/" source="CVE"/>
		<reference ref_id="CVE-2017-14804" ref_url="https://www.suse.com/security/cve/CVE-2017-14804/" source="CVE"/>
		<description>
These are all security issues fixed in the build-20210902-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4226/">CVE-2010-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4226">CVE-2010-4226 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14804/">CVE-2017-14804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14804">CVE-2017-14804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909282" comment="build-20210902-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909283" comment="build-initvm-x86_64-20210902-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909284" comment="build-mkbaselibs-20210902-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909285" comment="build-mkdrpms-20210902-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248987" version="1" class="patch">
	<metadata>
		<title>buildah-1.23.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.23.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909286" comment="buildah-1.23.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248988" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.8-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.8-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909287" comment="bzip2-1.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909288" comment="bzip2-doc-1.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909289" comment="libbz2-1-1.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909290" comment="libbz2-1-32bit-1.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909291" comment="libbz2-devel-1.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909292" comment="libbz2-devel-32bit-1.0.8-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248989" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.17.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.17.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909293" comment="c-ares-devel-1.17.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909294" comment="c-ares-utils-1.17.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909295" comment="libcares2-1.17.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909296" comment="libcares2-32bit-1.17.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248990" version="1" class="patch">
	<metadata>
		<title>c3p0-0.9.5.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20433" ref_url="https://www.suse.com/security/cve/CVE-2018-20433/" source="CVE"/>
		<description>
These are all security issues fixed in the c3p0-0.9.5.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20433/">CVE-2018-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20433">CVE-2018-20433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909297" comment="c3p0-0.9.5.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909298" comment="c3p0-javadoc-0.9.5.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248991" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.18-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6799" ref_url="https://www.suse.com/security/cve/CVE-2006-6799/" source="CVE"/>
		<reference ref_id="CVE-2007-3112" ref_url="https://www.suse.com/security/cve/CVE-2007-3112/" source="CVE"/>
		<reference ref_id="CVE-2009-4112" ref_url="https://www.suse.com/security/cve/CVE-2009-4112/" source="CVE"/>
		<reference ref_id="CVE-2014-4000" ref_url="https://www.suse.com/security/cve/CVE-2014-4000/" source="CVE"/>
		<reference ref_id="CVE-2017-10970" ref_url="https://www.suse.com/security/cve/CVE-2017-10970/" source="CVE"/>
		<reference ref_id="CVE-2017-11163" ref_url="https://www.suse.com/security/cve/CVE-2017-11163/" source="CVE"/>
		<reference ref_id="CVE-2017-11691" ref_url="https://www.suse.com/security/cve/CVE-2017-11691/" source="CVE"/>
		<reference ref_id="CVE-2017-12065" ref_url="https://www.suse.com/security/cve/CVE-2017-12065/" source="CVE"/>
		<reference ref_id="CVE-2017-12927" ref_url="https://www.suse.com/security/cve/CVE-2017-12927/" source="CVE"/>
		<reference ref_id="CVE-2017-12978" ref_url="https://www.suse.com/security/cve/CVE-2017-12978/" source="CVE"/>
		<reference ref_id="CVE-2017-15194" ref_url="https://www.suse.com/security/cve/CVE-2017-15194/" source="CVE"/>
		<reference ref_id="CVE-2017-16641" ref_url="https://www.suse.com/security/cve/CVE-2017-16641/" source="CVE"/>
		<reference ref_id="CVE-2017-16660" ref_url="https://www.suse.com/security/cve/CVE-2017-16660/" source="CVE"/>
		<reference ref_id="CVE-2017-16661" ref_url="https://www.suse.com/security/cve/CVE-2017-16661/" source="CVE"/>
		<reference ref_id="CVE-2017-16785" ref_url="https://www.suse.com/security/cve/CVE-2017-16785/" source="CVE"/>
		<reference ref_id="CVE-2018-20723" ref_url="https://www.suse.com/security/cve/CVE-2018-20723/" source="CVE"/>
		<reference ref_id="CVE-2018-20724" ref_url="https://www.suse.com/security/cve/CVE-2018-20724/" source="CVE"/>
		<reference ref_id="CVE-2018-20725" ref_url="https://www.suse.com/security/cve/CVE-2018-20725/" source="CVE"/>
		<reference ref_id="CVE-2018-20726" ref_url="https://www.suse.com/security/cve/CVE-2018-20726/" source="CVE"/>
		<reference ref_id="CVE-2019-16723" ref_url="https://www.suse.com/security/cve/CVE-2019-16723/" source="CVE"/>
		<reference ref_id="CVE-2019-17357" ref_url="https://www.suse.com/security/cve/CVE-2019-17357/" source="CVE"/>
		<reference ref_id="CVE-2019-17358" ref_url="https://www.suse.com/security/cve/CVE-2019-17358/" source="CVE"/>
		<reference ref_id="CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022/" source="CVE"/>
		<reference ref_id="CVE-2020-13625" ref_url="https://www.suse.com/security/cve/CVE-2020-13625/" source="CVE"/>
		<reference ref_id="CVE-2020-14295" ref_url="https://www.suse.com/security/cve/CVE-2020-14295/" source="CVE"/>
		<reference ref_id="CVE-2020-14424" ref_url="https://www.suse.com/security/cve/CVE-2020-14424/" source="CVE"/>
		<reference ref_id="CVE-2020-25706" ref_url="https://www.suse.com/security/cve/CVE-2020-25706/" source="CVE"/>
		<reference ref_id="CVE-2020-35701" ref_url="https://www.suse.com/security/cve/CVE-2020-35701/" source="CVE"/>
		<reference ref_id="CVE-2020-7106" ref_url="https://www.suse.com/security/cve/CVE-2020-7106/" source="CVE"/>
		<reference ref_id="CVE-2020-7237" ref_url="https://www.suse.com/security/cve/CVE-2020-7237/" source="CVE"/>
		<reference ref_id="CVE-2020-8813" ref_url="https://www.suse.com/security/cve/CVE-2020-8813/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.18-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6799/">CVE-2006-6799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6799">CVE-2006-6799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3112/">CVE-2007-3112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3112">CVE-2007-3112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4112/">CVE-2009-4112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4112">CVE-2009-4112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4000/">CVE-2014-4000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4000">CVE-2014-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10970/">CVE-2017-10970 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10970">CVE-2017-10970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11163/">CVE-2017-11163 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11163">CVE-2017-11163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11691/">CVE-2017-11691 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11691">CVE-2017-11691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12065/">CVE-2017-12065 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12065">CVE-2017-12065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12927/">CVE-2017-12927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12927">CVE-2017-12927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12978/">CVE-2017-12978 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12978">CVE-2017-12978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15194/">CVE-2017-15194 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15194">CVE-2017-15194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16641/">CVE-2017-16641 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16641">CVE-2017-16641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16660/">CVE-2017-16660 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16660">CVE-2017-16660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16661/">CVE-2017-16661 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16661">CVE-2017-16661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16785/">CVE-2017-16785 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16785">CVE-2017-16785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20723/">CVE-2018-20723 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20723">CVE-2018-20723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20724/">CVE-2018-20724 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20724">CVE-2018-20724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20725/">CVE-2018-20725 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20725">CVE-2018-20725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20726/">CVE-2018-20726 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20726">CVE-2018-20726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16723/">CVE-2019-16723 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16723">CVE-2019-16723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17357/">CVE-2019-17357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17357">CVE-2019-17357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17358/">CVE-2019-17358 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17358">CVE-2019-17358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13625/">CVE-2020-13625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13625">CVE-2020-13625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14295/">CVE-2020-14295 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14295">CVE-2020-14295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14424/">CVE-2020-14424 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14424">CVE-2020-14424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25706/">CVE-2020-25706 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25706">CVE-2020-25706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35701/">CVE-2020-35701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35701">CVE-2020-35701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7106/">CVE-2020-7106 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7106">CVE-2020-7106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7237/">CVE-2020-7237 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7237">CVE-2020-7237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8813/">CVE-2020-8813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8813">CVE-2020-8813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909299" comment="cacti-1.2.18-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248992" version="1" class="patch">
	<metadata>
		<title>cairo-devel-1.16.0-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0528" ref_url="https://www.suse.com/security/cve/CVE-2006-0528/" source="CVE"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the cairo-devel-1.16.0-3.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0528/">CVE-2006-0528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0528">CVE-2006-0528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909300" comment="cairo-devel-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909301" comment="cairo-devel-32bit-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909302" comment="cairo-tools-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909303" comment="libcairo-gobject2-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909304" comment="libcairo-gobject2-32bit-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909305" comment="libcairo-script-interpreter2-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909306" comment="libcairo-script-interpreter2-32bit-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909307" comment="libcairo2-1.16.0-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909308" comment="libcairo2-32bit-1.16.0-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248993" version="1" class="patch">
	<metadata>
		<title>calamares-3.2.36-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13178" ref_url="https://www.suse.com/security/cve/CVE-2019-13178/" source="CVE"/>
		<description>
These are all security issues fixed in the calamares-3.2.36-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13178/">CVE-2019-13178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13178">CVE-2019-13178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909309" comment="calamares-3.2.36-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909310" comment="calamares-branding-upstream-3.2.36-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909311" comment="calamares-lang-3.2.36-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909312" comment="calamares-webview-3.2.36-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248994" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20210802-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32629" ref_url="https://www.suse.com/security/cve/CVE-2021-32629/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20210802-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32629/">CVE-2021-32629 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32629">CVE-2021-32629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909313" comment="cargo-audit-advisory-db-20210802-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248995" version="1" class="patch">
	<metadata>
		<title>caribou-0.4.21-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<description>
These are all security issues fixed in the caribou-0.4.21-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909314" comment="caribou-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909315" comment="caribou-common-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909316" comment="caribou-devel-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909317" comment="caribou-gtk-module-common-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909318" comment="caribou-gtk2-module-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909319" comment="caribou-gtk3-module-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909320" comment="caribou-lang-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909321" comment="libcaribou0-0.4.21-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909322" comment="typelib-1_0-Caribou-1_0-0.4.21-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248996" version="1" class="patch">
	<metadata>
		<title>libcdio++0-2.1.0-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18198" ref_url="https://www.suse.com/security/cve/CVE-2017-18198/" source="CVE"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio++0-2.1.0-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18198/">CVE-2017-18198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18198">CVE-2017-18198 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18201">CVE-2017-18201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909323" comment="libcdio++0-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909324" comment="libcdio++0-32bit-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909325" comment="libcdio-devel-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909326" comment="libcdio19-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909327" comment="libcdio19-32bit-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909328" comment="libiso9660-11-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909329" comment="libiso9660-11-32bit-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909330" comment="libudf0-2.1.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909331" comment="libudf0-32bit-2.1.0-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248997" version="1" class="patch">
	<metadata>
		<title>ceph-16.2.6.45+g8fda9838398-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="CVE-2019-10222" ref_url="https://www.suse.com/security/cve/CVE-2019-10222/" source="CVE"/>
		<reference ref_id="CVE-2019-3821" ref_url="https://www.suse.com/security/cve/CVE-2019-3821/" source="CVE"/>
		<reference ref_id="CVE-2020-10736" ref_url="https://www.suse.com/security/cve/CVE-2020-10736/" source="CVE"/>
		<reference ref_id="CVE-2020-1759" ref_url="https://www.suse.com/security/cve/CVE-2020-1759/" source="CVE"/>
		<reference ref_id="CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760/" source="CVE"/>
		<reference ref_id="CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288/" source="CVE"/>
		<reference ref_id="CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509/" source="CVE"/>
		<reference ref_id="CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524/" source="CVE"/>
		<reference ref_id="CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-16.2.6.45+g8fda9838398-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16818">CVE-2017-16818 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10861">CVE-2018-10861 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10222/">CVE-2019-10222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10222">CVE-2019-10222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3821/">CVE-2019-3821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3821">CVE-2019-3821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10736/">CVE-2020-10736 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10736">CVE-2020-10736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-1759/">CVE-2020-1759 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1759">CVE-2020-1759 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1760">CVE-2020-1760 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20288">CVE-2021-20288 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3509">CVE-2021-3509 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3524">CVE-2021-3524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3531">CVE-2021-3531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909332" comment="ceph-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909333" comment="ceph-base-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909334" comment="ceph-common-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909335" comment="ceph-fuse-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909336" comment="ceph-grafana-dashboards-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909337" comment="ceph-immutable-object-cache-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909338" comment="ceph-mds-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909339" comment="ceph-mgr-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909340" comment="ceph-mgr-cephadm-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909341" comment="ceph-mgr-dashboard-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909342" comment="ceph-mgr-diskprediction-local-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909343" comment="ceph-mgr-k8sevents-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909344" comment="ceph-mgr-modules-core-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909345" comment="ceph-mgr-rook-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909346" comment="ceph-mon-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909347" comment="ceph-osd-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909348" comment="ceph-prometheus-alerts-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909349" comment="ceph-radosgw-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909350" comment="cephadm-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909351" comment="cephfs-mirror-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909352" comment="cephfs-shell-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909353" comment="cephfs-top-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909354" comment="libcephfs-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909355" comment="libcephfs2-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909356" comment="libcephsqlite-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909357" comment="libcephsqlite-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909358" comment="librados-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909359" comment="librados2-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909360" comment="libradospp-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909361" comment="librbd-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909362" comment="librbd1-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909363" comment="librgw-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909364" comment="librgw2-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909365" comment="python3-ceph-argparse-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909366" comment="python3-ceph-common-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909367" comment="python3-cephfs-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909368" comment="python3-rados-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909369" comment="python3-rbd-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909370" comment="python3-rgw-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909371" comment="rados-objclass-devel-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909372" comment="rbd-fuse-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909373" comment="rbd-mirror-16.2.6.45+g8fda9838398-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909374" comment="rbd-nbd-16.2.6.45+g8fda9838398-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248998" version="1" class="patch">
	<metadata>
		<title>cfitsio-4.0.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000166" ref_url="https://www.suse.com/security/cve/CVE-2018-1000166/" source="CVE"/>
		<description>
These are all security issues fixed in the cfitsio-4.0.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000166/">CVE-2018-1000166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000166">CVE-2018-1000166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909375" comment="cfitsio-4.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909376" comment="cfitsio-devel-4.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909377" comment="cfitsio-devel-doc-4.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909378" comment="libcfitsio9-4.0.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248999" version="1" class="patch">
	<metadata>
		<title>cgal-demo-examples-devel-5.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28601" ref_url="https://www.suse.com/security/cve/CVE-2020-28601/" source="CVE"/>
		<reference ref_id="CVE-2020-35636" ref_url="https://www.suse.com/security/cve/CVE-2020-35636/" source="CVE"/>
		<description>
These are all security issues fixed in the cgal-demo-examples-devel-5.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28601/">CVE-2020-28601 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28601">CVE-2020-28601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35636/">CVE-2020-35636 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35636">CVE-2020-35636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909379" comment="cgal-demo-examples-devel-5.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909380" comment="cgal-devel-5.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909381" comment="cgal-doc-5.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249000" version="1" class="patch">
	<metadata>
		<title>cgit-1.2.3-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14912" ref_url="https://www.suse.com/security/cve/CVE-2018-14912/" source="CVE"/>
		<description>
These are all security issues fixed in the cgit-1.2.3-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14912/">CVE-2018-14912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14912">CVE-2018-14912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909382" comment="cgit-1.2.3-1.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249001" version="1" class="patch">
	<metadata>
		<title>chocolate-doom-3.0.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14983" ref_url="https://www.suse.com/security/cve/CVE-2020-14983/" source="CVE"/>
		<description>
These are all security issues fixed in the chocolate-doom-3.0.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14983/">CVE-2020-14983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14983">CVE-2020-14983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909383" comment="chocolate-doom-3.0.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909384" comment="chocolate-doom-bash-completion-3.0.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249002" version="1" class="patch">
	<metadata>
		<title>chromedriver-93.0.4577.82-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11215" ref_url="https://www.suse.com/security/cve/CVE-2017-11215/" source="CVE"/>
		<reference ref_id="CVE-2017-11225" ref_url="https://www.suse.com/security/cve/CVE-2017-11225/" source="CVE"/>
		<reference ref_id="CVE-2017-15386" ref_url="https://www.suse.com/security/cve/CVE-2017-15386/" source="CVE"/>
		<reference ref_id="CVE-2017-15387" ref_url="https://www.suse.com/security/cve/CVE-2017-15387/" source="CVE"/>
		<reference ref_id="CVE-2017-15388" ref_url="https://www.suse.com/security/cve/CVE-2017-15388/" source="CVE"/>
		<reference ref_id="CVE-2017-15389" ref_url="https://www.suse.com/security/cve/CVE-2017-15389/" source="CVE"/>
		<reference ref_id="CVE-2017-15390" ref_url="https://www.suse.com/security/cve/CVE-2017-15390/" source="CVE"/>
		<reference ref_id="CVE-2017-15391" ref_url="https://www.suse.com/security/cve/CVE-2017-15391/" source="CVE"/>
		<reference ref_id="CVE-2017-15392" ref_url="https://www.suse.com/security/cve/CVE-2017-15392/" source="CVE"/>
		<reference ref_id="CVE-2017-15393" ref_url="https://www.suse.com/security/cve/CVE-2017-15393/" source="CVE"/>
		<reference ref_id="CVE-2017-15394" ref_url="https://www.suse.com/security/cve/CVE-2017-15394/" source="CVE"/>
		<reference ref_id="CVE-2017-15395" ref_url="https://www.suse.com/security/cve/CVE-2017-15395/" source="CVE"/>
		<reference ref_id="CVE-2017-15396" ref_url="https://www.suse.com/security/cve/CVE-2017-15396/" source="CVE"/>
		<reference ref_id="CVE-2017-15398" ref_url="https://www.suse.com/security/cve/CVE-2017-15398/" source="CVE"/>
		<reference ref_id="CVE-2017-15399" ref_url="https://www.suse.com/security/cve/CVE-2017-15399/" source="CVE"/>
		<reference ref_id="CVE-2017-15407" ref_url="https://www.suse.com/security/cve/CVE-2017-15407/" source="CVE"/>
		<reference ref_id="CVE-2017-15408" ref_url="https://www.suse.com/security/cve/CVE-2017-15408/" source="CVE"/>
		<reference ref_id="CVE-2017-15409" ref_url="https://www.suse.com/security/cve/CVE-2017-15409/" source="CVE"/>
		<reference ref_id="CVE-2017-15410" ref_url="https://www.suse.com/security/cve/CVE-2017-15410/" source="CVE"/>
		<reference ref_id="CVE-2017-15411" ref_url="https://www.suse.com/security/cve/CVE-2017-15411/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-15413" ref_url="https://www.suse.com/security/cve/CVE-2017-15413/" source="CVE"/>
		<reference ref_id="CVE-2017-15415" ref_url="https://www.suse.com/security/cve/CVE-2017-15415/" source="CVE"/>
		<reference ref_id="CVE-2017-15416" ref_url="https://www.suse.com/security/cve/CVE-2017-15416/" source="CVE"/>
		<reference ref_id="CVE-2017-15417" ref_url="https://www.suse.com/security/cve/CVE-2017-15417/" source="CVE"/>
		<reference ref_id="CVE-2017-15418" ref_url="https://www.suse.com/security/cve/CVE-2017-15418/" source="CVE"/>
		<reference ref_id="CVE-2017-15419" ref_url="https://www.suse.com/security/cve/CVE-2017-15419/" source="CVE"/>
		<reference ref_id="CVE-2017-15420" ref_url="https://www.suse.com/security/cve/CVE-2017-15420/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-15423" ref_url="https://www.suse.com/security/cve/CVE-2017-15423/" source="CVE"/>
		<reference ref_id="CVE-2017-15424" ref_url="https://www.suse.com/security/cve/CVE-2017-15424/" source="CVE"/>
		<reference ref_id="CVE-2017-15425" ref_url="https://www.suse.com/security/cve/CVE-2017-15425/" source="CVE"/>
		<reference ref_id="CVE-2017-15426" ref_url="https://www.suse.com/security/cve/CVE-2017-15426/" source="CVE"/>
		<reference ref_id="CVE-2017-15427" ref_url="https://www.suse.com/security/cve/CVE-2017-15427/" source="CVE"/>
		<reference ref_id="CVE-2017-15429" ref_url="https://www.suse.com/security/cve/CVE-2017-15429/" source="CVE"/>
		<reference ref_id="CVE-2017-15430" ref_url="https://www.suse.com/security/cve/CVE-2017-15430/" source="CVE"/>
		<reference ref_id="CVE-2017-5006" ref_url="https://www.suse.com/security/cve/CVE-2017-5006/" source="CVE"/>
		<reference ref_id="CVE-2017-5007" ref_url="https://www.suse.com/security/cve/CVE-2017-5007/" source="CVE"/>
		<reference ref_id="CVE-2017-5008" ref_url="https://www.suse.com/security/cve/CVE-2017-5008/" source="CVE"/>
		<reference ref_id="CVE-2017-5009" ref_url="https://www.suse.com/security/cve/CVE-2017-5009/" source="CVE"/>
		<reference ref_id="CVE-2017-5010" ref_url="https://www.suse.com/security/cve/CVE-2017-5010/" source="CVE"/>
		<reference ref_id="CVE-2017-5011" ref_url="https://www.suse.com/security/cve/CVE-2017-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-5012" ref_url="https://www.suse.com/security/cve/CVE-2017-5012/" source="CVE"/>
		<reference ref_id="CVE-2017-5013" ref_url="https://www.suse.com/security/cve/CVE-2017-5013/" source="CVE"/>
		<reference ref_id="CVE-2017-5014" ref_url="https://www.suse.com/security/cve/CVE-2017-5014/" source="CVE"/>
		<reference ref_id="CVE-2017-5015" ref_url="https://www.suse.com/security/cve/CVE-2017-5015/" source="CVE"/>
		<reference ref_id="CVE-2017-5016" ref_url="https://www.suse.com/security/cve/CVE-2017-5016/" source="CVE"/>
		<reference ref_id="CVE-2017-5017" ref_url="https://www.suse.com/security/cve/CVE-2017-5017/" source="CVE"/>
		<reference ref_id="CVE-2017-5018" ref_url="https://www.suse.com/security/cve/CVE-2017-5018/" source="CVE"/>
		<reference ref_id="CVE-2017-5019" ref_url="https://www.suse.com/security/cve/CVE-2017-5019/" source="CVE"/>
		<reference ref_id="CVE-2017-5020" ref_url="https://www.suse.com/security/cve/CVE-2017-5020/" source="CVE"/>
		<reference ref_id="CVE-2017-5021" ref_url="https://www.suse.com/security/cve/CVE-2017-5021/" source="CVE"/>
		<reference ref_id="CVE-2017-5022" ref_url="https://www.suse.com/security/cve/CVE-2017-5022/" source="CVE"/>
		<reference ref_id="CVE-2017-5023" ref_url="https://www.suse.com/security/cve/CVE-2017-5023/" source="CVE"/>
		<reference ref_id="CVE-2017-5024" ref_url="https://www.suse.com/security/cve/CVE-2017-5024/" source="CVE"/>
		<reference ref_id="CVE-2017-5025" ref_url="https://www.suse.com/security/cve/CVE-2017-5025/" source="CVE"/>
		<reference ref_id="CVE-2017-5026" ref_url="https://www.suse.com/security/cve/CVE-2017-5026/" source="CVE"/>
		<reference ref_id="CVE-2017-5030" ref_url="https://www.suse.com/security/cve/CVE-2017-5030/" source="CVE"/>
		<reference ref_id="CVE-2017-5035" ref_url="https://www.suse.com/security/cve/CVE-2017-5035/" source="CVE"/>
		<reference ref_id="CVE-2017-5041" ref_url="https://www.suse.com/security/cve/CVE-2017-5041/" source="CVE"/>
		<reference ref_id="CVE-2017-5044" ref_url="https://www.suse.com/security/cve/CVE-2017-5044/" source="CVE"/>
		<reference ref_id="CVE-2017-5052" ref_url="https://www.suse.com/security/cve/CVE-2017-5052/" source="CVE"/>
		<reference ref_id="CVE-2017-5053" ref_url="https://www.suse.com/security/cve/CVE-2017-5053/" source="CVE"/>
		<reference ref_id="CVE-2017-5054" ref_url="https://www.suse.com/security/cve/CVE-2017-5054/" source="CVE"/>
		<reference ref_id="CVE-2017-5055" ref_url="https://www.suse.com/security/cve/CVE-2017-5055/" source="CVE"/>
		<reference ref_id="CVE-2017-5056" ref_url="https://www.suse.com/security/cve/CVE-2017-5056/" source="CVE"/>
		<reference ref_id="CVE-2017-5057" ref_url="https://www.suse.com/security/cve/CVE-2017-5057/" source="CVE"/>
		<reference ref_id="CVE-2017-5058" ref_url="https://www.suse.com/security/cve/CVE-2017-5058/" source="CVE"/>
		<reference ref_id="CVE-2017-5059" ref_url="https://www.suse.com/security/cve/CVE-2017-5059/" source="CVE"/>
		<reference ref_id="CVE-2017-5060" ref_url="https://www.suse.com/security/cve/CVE-2017-5060/" source="CVE"/>
		<reference ref_id="CVE-2017-5061" ref_url="https://www.suse.com/security/cve/CVE-2017-5061/" source="CVE"/>
		<reference ref_id="CVE-2017-5062" ref_url="https://www.suse.com/security/cve/CVE-2017-5062/" source="CVE"/>
		<reference ref_id="CVE-2017-5063" ref_url="https://www.suse.com/security/cve/CVE-2017-5063/" source="CVE"/>
		<reference ref_id="CVE-2017-5064" ref_url="https://www.suse.com/security/cve/CVE-2017-5064/" source="CVE"/>
		<reference ref_id="CVE-2017-5065" ref_url="https://www.suse.com/security/cve/CVE-2017-5065/" source="CVE"/>
		<reference ref_id="CVE-2017-5066" ref_url="https://www.suse.com/security/cve/CVE-2017-5066/" source="CVE"/>
		<reference ref_id="CVE-2017-5067" ref_url="https://www.suse.com/security/cve/CVE-2017-5067/" source="CVE"/>
		<reference ref_id="CVE-2017-5068" ref_url="https://www.suse.com/security/cve/CVE-2017-5068/" source="CVE"/>
		<reference ref_id="CVE-2017-5069" ref_url="https://www.suse.com/security/cve/CVE-2017-5069/" source="CVE"/>
		<reference ref_id="CVE-2017-5070" ref_url="https://www.suse.com/security/cve/CVE-2017-5070/" source="CVE"/>
		<reference ref_id="CVE-2017-5071" ref_url="https://www.suse.com/security/cve/CVE-2017-5071/" source="CVE"/>
		<reference ref_id="CVE-2017-5072" ref_url="https://www.suse.com/security/cve/CVE-2017-5072/" source="CVE"/>
		<reference ref_id="CVE-2017-5073" ref_url="https://www.suse.com/security/cve/CVE-2017-5073/" source="CVE"/>
		<reference ref_id="CVE-2017-5074" ref_url="https://www.suse.com/security/cve/CVE-2017-5074/" source="CVE"/>
		<reference ref_id="CVE-2017-5075" ref_url="https://www.suse.com/security/cve/CVE-2017-5075/" source="CVE"/>
		<reference ref_id="CVE-2017-5076" ref_url="https://www.suse.com/security/cve/CVE-2017-5076/" source="CVE"/>
		<reference ref_id="CVE-2017-5077" ref_url="https://www.suse.com/security/cve/CVE-2017-5077/" source="CVE"/>
		<reference ref_id="CVE-2017-5078" ref_url="https://www.suse.com/security/cve/CVE-2017-5078/" source="CVE"/>
		<reference ref_id="CVE-2017-5079" ref_url="https://www.suse.com/security/cve/CVE-2017-5079/" source="CVE"/>
		<reference ref_id="CVE-2017-5080" ref_url="https://www.suse.com/security/cve/CVE-2017-5080/" source="CVE"/>
		<reference ref_id="CVE-2017-5081" ref_url="https://www.suse.com/security/cve/CVE-2017-5081/" source="CVE"/>
		<reference ref_id="CVE-2017-5082" ref_url="https://www.suse.com/security/cve/CVE-2017-5082/" source="CVE"/>
		<reference ref_id="CVE-2017-5083" ref_url="https://www.suse.com/security/cve/CVE-2017-5083/" source="CVE"/>
		<reference ref_id="CVE-2017-5085" ref_url="https://www.suse.com/security/cve/CVE-2017-5085/" source="CVE"/>
		<reference ref_id="CVE-2017-5086" ref_url="https://www.suse.com/security/cve/CVE-2017-5086/" source="CVE"/>
		<reference ref_id="CVE-2017-5087" ref_url="https://www.suse.com/security/cve/CVE-2017-5087/" source="CVE"/>
		<reference ref_id="CVE-2017-5088" ref_url="https://www.suse.com/security/cve/CVE-2017-5088/" source="CVE"/>
		<reference ref_id="CVE-2017-5089" ref_url="https://www.suse.com/security/cve/CVE-2017-5089/" source="CVE"/>
		<reference ref_id="CVE-2017-5091" ref_url="https://www.suse.com/security/cve/CVE-2017-5091/" source="CVE"/>
		<reference ref_id="CVE-2017-5092" ref_url="https://www.suse.com/security/cve/CVE-2017-5092/" source="CVE"/>
		<reference ref_id="CVE-2017-5093" ref_url="https://www.suse.com/security/cve/CVE-2017-5093/" source="CVE"/>
		<reference ref_id="CVE-2017-5094" ref_url="https://www.suse.com/security/cve/CVE-2017-5094/" source="CVE"/>
		<reference ref_id="CVE-2017-5095" ref_url="https://www.suse.com/security/cve/CVE-2017-5095/" source="CVE"/>
		<reference ref_id="CVE-2017-5096" ref_url="https://www.suse.com/security/cve/CVE-2017-5096/" source="CVE"/>
		<reference ref_id="CVE-2017-5097" ref_url="https://www.suse.com/security/cve/CVE-2017-5097/" source="CVE"/>
		<reference ref_id="CVE-2017-5098" ref_url="https://www.suse.com/security/cve/CVE-2017-5098/" source="CVE"/>
		<reference ref_id="CVE-2017-5099" ref_url="https://www.suse.com/security/cve/CVE-2017-5099/" source="CVE"/>
		<reference ref_id="CVE-2017-5100" ref_url="https://www.suse.com/security/cve/CVE-2017-5100/" source="CVE"/>
		<reference ref_id="CVE-2017-5101" ref_url="https://www.suse.com/security/cve/CVE-2017-5101/" source="CVE"/>
		<reference ref_id="CVE-2017-5102" ref_url="https://www.suse.com/security/cve/CVE-2017-5102/" source="CVE"/>
		<reference ref_id="CVE-2017-5103" ref_url="https://www.suse.com/security/cve/CVE-2017-5103/" source="CVE"/>
		<reference ref_id="CVE-2017-5104" ref_url="https://www.suse.com/security/cve/CVE-2017-5104/" source="CVE"/>
		<reference ref_id="CVE-2017-5105" ref_url="https://www.suse.com/security/cve/CVE-2017-5105/" source="CVE"/>
		<reference ref_id="CVE-2017-5106" ref_url="https://www.suse.com/security/cve/CVE-2017-5106/" source="CVE"/>
		<reference ref_id="CVE-2017-5107" ref_url="https://www.suse.com/security/cve/CVE-2017-5107/" source="CVE"/>
		<reference ref_id="CVE-2017-5108" ref_url="https://www.suse.com/security/cve/CVE-2017-5108/" source="CVE"/>
		<reference ref_id="CVE-2017-5109" ref_url="https://www.suse.com/security/cve/CVE-2017-5109/" source="CVE"/>
		<reference ref_id="CVE-2017-5110" ref_url="https://www.suse.com/security/cve/CVE-2017-5110/" source="CVE"/>
		<reference ref_id="CVE-2017-5111" ref_url="https://www.suse.com/security/cve/CVE-2017-5111/" source="CVE"/>
		<reference ref_id="CVE-2017-5112" ref_url="https://www.suse.com/security/cve/CVE-2017-5112/" source="CVE"/>
		<reference ref_id="CVE-2017-5113" ref_url="https://www.suse.com/security/cve/CVE-2017-5113/" source="CVE"/>
		<reference ref_id="CVE-2017-5114" ref_url="https://www.suse.com/security/cve/CVE-2017-5114/" source="CVE"/>
		<reference ref_id="CVE-2017-5115" ref_url="https://www.suse.com/security/cve/CVE-2017-5115/" source="CVE"/>
		<reference ref_id="CVE-2017-5116" ref_url="https://www.suse.com/security/cve/CVE-2017-5116/" source="CVE"/>
		<reference ref_id="CVE-2017-5117" ref_url="https://www.suse.com/security/cve/CVE-2017-5117/" source="CVE"/>
		<reference ref_id="CVE-2017-5118" ref_url="https://www.suse.com/security/cve/CVE-2017-5118/" source="CVE"/>
		<reference ref_id="CVE-2017-5119" ref_url="https://www.suse.com/security/cve/CVE-2017-5119/" source="CVE"/>
		<reference ref_id="CVE-2017-5120" ref_url="https://www.suse.com/security/cve/CVE-2017-5120/" source="CVE"/>
		<reference ref_id="CVE-2017-5121" ref_url="https://www.suse.com/security/cve/CVE-2017-5121/" source="CVE"/>
		<reference ref_id="CVE-2017-5122" ref_url="https://www.suse.com/security/cve/CVE-2017-5122/" source="CVE"/>
		<reference ref_id="CVE-2017-5124" ref_url="https://www.suse.com/security/cve/CVE-2017-5124/" source="CVE"/>
		<reference ref_id="CVE-2017-5125" ref_url="https://www.suse.com/security/cve/CVE-2017-5125/" source="CVE"/>
		<reference ref_id="CVE-2017-5126" ref_url="https://www.suse.com/security/cve/CVE-2017-5126/" source="CVE"/>
		<reference ref_id="CVE-2017-5127" ref_url="https://www.suse.com/security/cve/CVE-2017-5127/" source="CVE"/>
		<reference ref_id="CVE-2017-5128" ref_url="https://www.suse.com/security/cve/CVE-2017-5128/" source="CVE"/>
		<reference ref_id="CVE-2017-5129" ref_url="https://www.suse.com/security/cve/CVE-2017-5129/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="CVE-2017-5131" ref_url="https://www.suse.com/security/cve/CVE-2017-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-5132" ref_url="https://www.suse.com/security/cve/CVE-2017-5132/" source="CVE"/>
		<reference ref_id="CVE-2017-5133" ref_url="https://www.suse.com/security/cve/CVE-2017-5133/" source="CVE"/>
		<reference ref_id="CVE-2017-7000" ref_url="https://www.suse.com/security/cve/CVE-2017-7000/" source="CVE"/>
		<reference ref_id="CVE-2018-16065" ref_url="https://www.suse.com/security/cve/CVE-2018-16065/" source="CVE"/>
		<reference ref_id="CVE-2018-16066" ref_url="https://www.suse.com/security/cve/CVE-2018-16066/" source="CVE"/>
		<reference ref_id="CVE-2018-16067" ref_url="https://www.suse.com/security/cve/CVE-2018-16067/" source="CVE"/>
		<reference ref_id="CVE-2018-16068" ref_url="https://www.suse.com/security/cve/CVE-2018-16068/" source="CVE"/>
		<reference ref_id="CVE-2018-16069" ref_url="https://www.suse.com/security/cve/CVE-2018-16069/" source="CVE"/>
		<reference ref_id="CVE-2018-16070" ref_url="https://www.suse.com/security/cve/CVE-2018-16070/" source="CVE"/>
		<reference ref_id="CVE-2018-16071" ref_url="https://www.suse.com/security/cve/CVE-2018-16071/" source="CVE"/>
		<reference ref_id="CVE-2018-16073" ref_url="https://www.suse.com/security/cve/CVE-2018-16073/" source="CVE"/>
		<reference ref_id="CVE-2018-16074" ref_url="https://www.suse.com/security/cve/CVE-2018-16074/" source="CVE"/>
		<reference ref_id="CVE-2018-16075" ref_url="https://www.suse.com/security/cve/CVE-2018-16075/" source="CVE"/>
		<reference ref_id="CVE-2018-16076" ref_url="https://www.suse.com/security/cve/CVE-2018-16076/" source="CVE"/>
		<reference ref_id="CVE-2018-16077" ref_url="https://www.suse.com/security/cve/CVE-2018-16077/" source="CVE"/>
		<reference ref_id="CVE-2018-16078" ref_url="https://www.suse.com/security/cve/CVE-2018-16078/" source="CVE"/>
		<reference ref_id="CVE-2018-16079" ref_url="https://www.suse.com/security/cve/CVE-2018-16079/" source="CVE"/>
		<reference ref_id="CVE-2018-16080" ref_url="https://www.suse.com/security/cve/CVE-2018-16080/" source="CVE"/>
		<reference ref_id="CVE-2018-16081" ref_url="https://www.suse.com/security/cve/CVE-2018-16081/" source="CVE"/>
		<reference ref_id="CVE-2018-16082" ref_url="https://www.suse.com/security/cve/CVE-2018-16082/" source="CVE"/>
		<reference ref_id="CVE-2018-16083" ref_url="https://www.suse.com/security/cve/CVE-2018-16083/" source="CVE"/>
		<reference ref_id="CVE-2018-16084" ref_url="https://www.suse.com/security/cve/CVE-2018-16084/" source="CVE"/>
		<reference ref_id="CVE-2018-16085" ref_url="https://www.suse.com/security/cve/CVE-2018-16085/" source="CVE"/>
		<reference ref_id="CVE-2018-16086" ref_url="https://www.suse.com/security/cve/CVE-2018-16086/" source="CVE"/>
		<reference ref_id="CVE-2018-16087" ref_url="https://www.suse.com/security/cve/CVE-2018-16087/" source="CVE"/>
		<reference ref_id="CVE-2018-16088" ref_url="https://www.suse.com/security/cve/CVE-2018-16088/" source="CVE"/>
		<reference ref_id="CVE-2018-17462" ref_url="https://www.suse.com/security/cve/CVE-2018-17462/" source="CVE"/>
		<reference ref_id="CVE-2018-17463" ref_url="https://www.suse.com/security/cve/CVE-2018-17463/" source="CVE"/>
		<reference ref_id="CVE-2018-17464" ref_url="https://www.suse.com/security/cve/CVE-2018-17464/" source="CVE"/>
		<reference ref_id="CVE-2018-17465" ref_url="https://www.suse.com/security/cve/CVE-2018-17465/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-17467" ref_url="https://www.suse.com/security/cve/CVE-2018-17467/" source="CVE"/>
		<reference ref_id="CVE-2018-17468" ref_url="https://www.suse.com/security/cve/CVE-2018-17468/" source="CVE"/>
		<reference ref_id="CVE-2018-17469" ref_url="https://www.suse.com/security/cve/CVE-2018-17469/" source="CVE"/>
		<reference ref_id="CVE-2018-17470" ref_url="https://www.suse.com/security/cve/CVE-2018-17470/" source="CVE"/>
		<reference ref_id="CVE-2018-17471" ref_url="https://www.suse.com/security/cve/CVE-2018-17471/" source="CVE"/>
		<reference ref_id="CVE-2018-17472" ref_url="https://www.suse.com/security/cve/CVE-2018-17472/" source="CVE"/>
		<reference ref_id="CVE-2018-17473" ref_url="https://www.suse.com/security/cve/CVE-2018-17473/" source="CVE"/>
		<reference ref_id="CVE-2018-17474" ref_url="https://www.suse.com/security/cve/CVE-2018-17474/" source="CVE"/>
		<reference ref_id="CVE-2018-17475" ref_url="https://www.suse.com/security/cve/CVE-2018-17475/" source="CVE"/>
		<reference ref_id="CVE-2018-17476" ref_url="https://www.suse.com/security/cve/CVE-2018-17476/" source="CVE"/>
		<reference ref_id="CVE-2018-17477" ref_url="https://www.suse.com/security/cve/CVE-2018-17477/" source="CVE"/>
		<reference ref_id="CVE-2018-17478" ref_url="https://www.suse.com/security/cve/CVE-2018-17478/" source="CVE"/>
		<reference ref_id="CVE-2018-17479" ref_url="https://www.suse.com/security/cve/CVE-2018-17479/" source="CVE"/>
		<reference ref_id="CVE-2018-17480" ref_url="https://www.suse.com/security/cve/CVE-2018-17480/" source="CVE"/>
		<reference ref_id="CVE-2018-17481" ref_url="https://www.suse.com/security/cve/CVE-2018-17481/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18336" ref_url="https://www.suse.com/security/cve/CVE-2018-18336/" source="CVE"/>
		<reference ref_id="CVE-2018-18337" ref_url="https://www.suse.com/security/cve/CVE-2018-18337/" source="CVE"/>
		<reference ref_id="CVE-2018-18338" ref_url="https://www.suse.com/security/cve/CVE-2018-18338/" source="CVE"/>
		<reference ref_id="CVE-2018-18339" ref_url="https://www.suse.com/security/cve/CVE-2018-18339/" source="CVE"/>
		<reference ref_id="CVE-2018-18340" ref_url="https://www.suse.com/security/cve/CVE-2018-18340/" source="CVE"/>
		<reference ref_id="CVE-2018-18341" ref_url="https://www.suse.com/security/cve/CVE-2018-18341/" source="CVE"/>
		<reference ref_id="CVE-2018-18342" ref_url="https://www.suse.com/security/cve/CVE-2018-18342/" source="CVE"/>
		<reference ref_id="CVE-2018-18343" ref_url="https://www.suse.com/security/cve/CVE-2018-18343/" source="CVE"/>
		<reference ref_id="CVE-2018-18344" ref_url="https://www.suse.com/security/cve/CVE-2018-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-18345" ref_url="https://www.suse.com/security/cve/CVE-2018-18345/" source="CVE"/>
		<reference ref_id="CVE-2018-18346" ref_url="https://www.suse.com/security/cve/CVE-2018-18346/" source="CVE"/>
		<reference ref_id="CVE-2018-18347" ref_url="https://www.suse.com/security/cve/CVE-2018-18347/" source="CVE"/>
		<reference ref_id="CVE-2018-18348" ref_url="https://www.suse.com/security/cve/CVE-2018-18348/" source="CVE"/>
		<reference ref_id="CVE-2018-18349" ref_url="https://www.suse.com/security/cve/CVE-2018-18349/" source="CVE"/>
		<reference ref_id="CVE-2018-18350" ref_url="https://www.suse.com/security/cve/CVE-2018-18350/" source="CVE"/>
		<reference ref_id="CVE-2018-18351" ref_url="https://www.suse.com/security/cve/CVE-2018-18351/" source="CVE"/>
		<reference ref_id="CVE-2018-18352" ref_url="https://www.suse.com/security/cve/CVE-2018-18352/" source="CVE"/>
		<reference ref_id="CVE-2018-18353" ref_url="https://www.suse.com/security/cve/CVE-2018-18353/" source="CVE"/>
		<reference ref_id="CVE-2018-18354" ref_url="https://www.suse.com/security/cve/CVE-2018-18354/" source="CVE"/>
		<reference ref_id="CVE-2018-18355" ref_url="https://www.suse.com/security/cve/CVE-2018-18355/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18357" ref_url="https://www.suse.com/security/cve/CVE-2018-18357/" source="CVE"/>
		<reference ref_id="CVE-2018-18358" ref_url="https://www.suse.com/security/cve/CVE-2018-18358/" source="CVE"/>
		<reference ref_id="CVE-2018-18359" ref_url="https://www.suse.com/security/cve/CVE-2018-18359/" source="CVE"/>
		<reference ref_id="CVE-2018-20073" ref_url="https://www.suse.com/security/cve/CVE-2018-20073/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-6031" ref_url="https://www.suse.com/security/cve/CVE-2018-6031/" source="CVE"/>
		<reference ref_id="CVE-2018-6032" ref_url="https://www.suse.com/security/cve/CVE-2018-6032/" source="CVE"/>
		<reference ref_id="CVE-2018-6033" ref_url="https://www.suse.com/security/cve/CVE-2018-6033/" source="CVE"/>
		<reference ref_id="CVE-2018-6034" ref_url="https://www.suse.com/security/cve/CVE-2018-6034/" source="CVE"/>
		<reference ref_id="CVE-2018-6035" ref_url="https://www.suse.com/security/cve/CVE-2018-6035/" source="CVE"/>
		<reference ref_id="CVE-2018-6036" ref_url="https://www.suse.com/security/cve/CVE-2018-6036/" source="CVE"/>
		<reference ref_id="CVE-2018-6037" ref_url="https://www.suse.com/security/cve/CVE-2018-6037/" source="CVE"/>
		<reference ref_id="CVE-2018-6038" ref_url="https://www.suse.com/security/cve/CVE-2018-6038/" source="CVE"/>
		<reference ref_id="CVE-2018-6039" ref_url="https://www.suse.com/security/cve/CVE-2018-6039/" source="CVE"/>
		<reference ref_id="CVE-2018-6040" ref_url="https://www.suse.com/security/cve/CVE-2018-6040/" source="CVE"/>
		<reference ref_id="CVE-2018-6041" ref_url="https://www.suse.com/security/cve/CVE-2018-6041/" source="CVE"/>
		<reference ref_id="CVE-2018-6042" ref_url="https://www.suse.com/security/cve/CVE-2018-6042/" source="CVE"/>
		<reference ref_id="CVE-2018-6043" ref_url="https://www.suse.com/security/cve/CVE-2018-6043/" source="CVE"/>
		<reference ref_id="CVE-2018-6044" ref_url="https://www.suse.com/security/cve/CVE-2018-6044/" source="CVE"/>
		<reference ref_id="CVE-2018-6045" ref_url="https://www.suse.com/security/cve/CVE-2018-6045/" source="CVE"/>
		<reference ref_id="CVE-2018-6046" ref_url="https://www.suse.com/security/cve/CVE-2018-6046/" source="CVE"/>
		<reference ref_id="CVE-2018-6047" ref_url="https://www.suse.com/security/cve/CVE-2018-6047/" source="CVE"/>
		<reference ref_id="CVE-2018-6048" ref_url="https://www.suse.com/security/cve/CVE-2018-6048/" source="CVE"/>
		<reference ref_id="CVE-2018-6049" ref_url="https://www.suse.com/security/cve/CVE-2018-6049/" source="CVE"/>
		<reference ref_id="CVE-2018-6050" ref_url="https://www.suse.com/security/cve/CVE-2018-6050/" source="CVE"/>
		<reference ref_id="CVE-2018-6051" ref_url="https://www.suse.com/security/cve/CVE-2018-6051/" source="CVE"/>
		<reference ref_id="CVE-2018-6052" ref_url="https://www.suse.com/security/cve/CVE-2018-6052/" source="CVE"/>
		<reference ref_id="CVE-2018-6053" ref_url="https://www.suse.com/security/cve/CVE-2018-6053/" source="CVE"/>
		<reference ref_id="CVE-2018-6054" ref_url="https://www.suse.com/security/cve/CVE-2018-6054/" source="CVE"/>
		<reference ref_id="CVE-2018-6056" ref_url="https://www.suse.com/security/cve/CVE-2018-6056/" source="CVE"/>
		<reference ref_id="CVE-2018-6057" ref_url="https://www.suse.com/security/cve/CVE-2018-6057/" source="CVE"/>
		<reference ref_id="CVE-2018-6060" ref_url="https://www.suse.com/security/cve/CVE-2018-6060/" source="CVE"/>
		<reference ref_id="CVE-2018-6061" ref_url="https://www.suse.com/security/cve/CVE-2018-6061/" source="CVE"/>
		<reference ref_id="CVE-2018-6062" ref_url="https://www.suse.com/security/cve/CVE-2018-6062/" source="CVE"/>
		<reference ref_id="CVE-2018-6063" ref_url="https://www.suse.com/security/cve/CVE-2018-6063/" source="CVE"/>
		<reference ref_id="CVE-2018-6064" ref_url="https://www.suse.com/security/cve/CVE-2018-6064/" source="CVE"/>
		<reference ref_id="CVE-2018-6065" ref_url="https://www.suse.com/security/cve/CVE-2018-6065/" source="CVE"/>
		<reference ref_id="CVE-2018-6066" ref_url="https://www.suse.com/security/cve/CVE-2018-6066/" source="CVE"/>
		<reference ref_id="CVE-2018-6067" ref_url="https://www.suse.com/security/cve/CVE-2018-6067/" source="CVE"/>
		<reference ref_id="CVE-2018-6068" ref_url="https://www.suse.com/security/cve/CVE-2018-6068/" source="CVE"/>
		<reference ref_id="CVE-2018-6069" ref_url="https://www.suse.com/security/cve/CVE-2018-6069/" source="CVE"/>
		<reference ref_id="CVE-2018-6070" ref_url="https://www.suse.com/security/cve/CVE-2018-6070/" source="CVE"/>
		<reference ref_id="CVE-2018-6071" ref_url="https://www.suse.com/security/cve/CVE-2018-6071/" source="CVE"/>
		<reference ref_id="CVE-2018-6072" ref_url="https://www.suse.com/security/cve/CVE-2018-6072/" source="CVE"/>
		<reference ref_id="CVE-2018-6073" ref_url="https://www.suse.com/security/cve/CVE-2018-6073/" source="CVE"/>
		<reference ref_id="CVE-2018-6074" ref_url="https://www.suse.com/security/cve/CVE-2018-6074/" source="CVE"/>
		<reference ref_id="CVE-2018-6075" ref_url="https://www.suse.com/security/cve/CVE-2018-6075/" source="CVE"/>
		<reference ref_id="CVE-2018-6076" ref_url="https://www.suse.com/security/cve/CVE-2018-6076/" source="CVE"/>
		<reference ref_id="CVE-2018-6077" ref_url="https://www.suse.com/security/cve/CVE-2018-6077/" source="CVE"/>
		<reference ref_id="CVE-2018-6078" ref_url="https://www.suse.com/security/cve/CVE-2018-6078/" source="CVE"/>
		<reference ref_id="CVE-2018-6079" ref_url="https://www.suse.com/security/cve/CVE-2018-6079/" source="CVE"/>
		<reference ref_id="CVE-2018-6080" ref_url="https://www.suse.com/security/cve/CVE-2018-6080/" source="CVE"/>
		<reference ref_id="CVE-2018-6081" ref_url="https://www.suse.com/security/cve/CVE-2018-6081/" source="CVE"/>
		<reference ref_id="CVE-2018-6082" ref_url="https://www.suse.com/security/cve/CVE-2018-6082/" source="CVE"/>
		<reference ref_id="CVE-2018-6083" ref_url="https://www.suse.com/security/cve/CVE-2018-6083/" source="CVE"/>
		<reference ref_id="CVE-2018-6085" ref_url="https://www.suse.com/security/cve/CVE-2018-6085/" source="CVE"/>
		<reference ref_id="CVE-2018-6086" ref_url="https://www.suse.com/security/cve/CVE-2018-6086/" source="CVE"/>
		<reference ref_id="CVE-2018-6087" ref_url="https://www.suse.com/security/cve/CVE-2018-6087/" source="CVE"/>
		<reference ref_id="CVE-2018-6088" ref_url="https://www.suse.com/security/cve/CVE-2018-6088/" source="CVE"/>
		<reference ref_id="CVE-2018-6089" ref_url="https://www.suse.com/security/cve/CVE-2018-6089/" source="CVE"/>
		<reference ref_id="CVE-2018-6090" ref_url="https://www.suse.com/security/cve/CVE-2018-6090/" source="CVE"/>
		<reference ref_id="CVE-2018-6091" ref_url="https://www.suse.com/security/cve/CVE-2018-6091/" source="CVE"/>
		<reference ref_id="CVE-2018-6092" ref_url="https://www.suse.com/security/cve/CVE-2018-6092/" source="CVE"/>
		<reference ref_id="CVE-2018-6093" ref_url="https://www.suse.com/security/cve/CVE-2018-6093/" source="CVE"/>
		<reference ref_id="CVE-2018-6094" ref_url="https://www.suse.com/security/cve/CVE-2018-6094/" source="CVE"/>
		<reference ref_id="CVE-2018-6095" ref_url="https://www.suse.com/security/cve/CVE-2018-6095/" source="CVE"/>
		<reference ref_id="CVE-2018-6096" ref_url="https://www.suse.com/security/cve/CVE-2018-6096/" source="CVE"/>
		<reference ref_id="CVE-2018-6097" ref_url="https://www.suse.com/security/cve/CVE-2018-6097/" source="CVE"/>
		<reference ref_id="CVE-2018-6098" ref_url="https://www.suse.com/security/cve/CVE-2018-6098/" source="CVE"/>
		<reference ref_id="CVE-2018-6099" ref_url="https://www.suse.com/security/cve/CVE-2018-6099/" source="CVE"/>
		<reference ref_id="CVE-2018-6100" ref_url="https://www.suse.com/security/cve/CVE-2018-6100/" source="CVE"/>
		<reference ref_id="CVE-2018-6101" ref_url="https://www.suse.com/security/cve/CVE-2018-6101/" source="CVE"/>
		<reference ref_id="CVE-2018-6102" ref_url="https://www.suse.com/security/cve/CVE-2018-6102/" source="CVE"/>
		<reference ref_id="CVE-2018-6103" ref_url="https://www.suse.com/security/cve/CVE-2018-6103/" source="CVE"/>
		<reference ref_id="CVE-2018-6104" ref_url="https://www.suse.com/security/cve/CVE-2018-6104/" source="CVE"/>
		<reference ref_id="CVE-2018-6105" ref_url="https://www.suse.com/security/cve/CVE-2018-6105/" source="CVE"/>
		<reference ref_id="CVE-2018-6106" ref_url="https://www.suse.com/security/cve/CVE-2018-6106/" source="CVE"/>
		<reference ref_id="CVE-2018-6107" ref_url="https://www.suse.com/security/cve/CVE-2018-6107/" source="CVE"/>
		<reference ref_id="CVE-2018-6108" ref_url="https://www.suse.com/security/cve/CVE-2018-6108/" source="CVE"/>
		<reference ref_id="CVE-2018-6109" ref_url="https://www.suse.com/security/cve/CVE-2018-6109/" source="CVE"/>
		<reference ref_id="CVE-2018-6110" ref_url="https://www.suse.com/security/cve/CVE-2018-6110/" source="CVE"/>
		<reference ref_id="CVE-2018-6111" ref_url="https://www.suse.com/security/cve/CVE-2018-6111/" source="CVE"/>
		<reference ref_id="CVE-2018-6112" ref_url="https://www.suse.com/security/cve/CVE-2018-6112/" source="CVE"/>
		<reference ref_id="CVE-2018-6113" ref_url="https://www.suse.com/security/cve/CVE-2018-6113/" source="CVE"/>
		<reference ref_id="CVE-2018-6114" ref_url="https://www.suse.com/security/cve/CVE-2018-6114/" source="CVE"/>
		<reference ref_id="CVE-2018-6115" ref_url="https://www.suse.com/security/cve/CVE-2018-6115/" source="CVE"/>
		<reference ref_id="CVE-2018-6116" ref_url="https://www.suse.com/security/cve/CVE-2018-6116/" source="CVE"/>
		<reference ref_id="CVE-2018-6117" ref_url="https://www.suse.com/security/cve/CVE-2018-6117/" source="CVE"/>
		<reference ref_id="CVE-2018-6118" ref_url="https://www.suse.com/security/cve/CVE-2018-6118/" source="CVE"/>
		<reference ref_id="CVE-2018-6120" ref_url="https://www.suse.com/security/cve/CVE-2018-6120/" source="CVE"/>
		<reference ref_id="CVE-2018-6121" ref_url="https://www.suse.com/security/cve/CVE-2018-6121/" source="CVE"/>
		<reference ref_id="CVE-2018-6122" ref_url="https://www.suse.com/security/cve/CVE-2018-6122/" source="CVE"/>
		<reference ref_id="CVE-2018-6123" ref_url="https://www.suse.com/security/cve/CVE-2018-6123/" source="CVE"/>
		<reference ref_id="CVE-2018-6124" ref_url="https://www.suse.com/security/cve/CVE-2018-6124/" source="CVE"/>
		<reference ref_id="CVE-2018-6125" ref_url="https://www.suse.com/security/cve/CVE-2018-6125/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2018-6127" ref_url="https://www.suse.com/security/cve/CVE-2018-6127/" source="CVE"/>
		<reference ref_id="CVE-2018-6128" ref_url="https://www.suse.com/security/cve/CVE-2018-6128/" source="CVE"/>
		<reference ref_id="CVE-2018-6129" ref_url="https://www.suse.com/security/cve/CVE-2018-6129/" source="CVE"/>
		<reference ref_id="CVE-2018-6130" ref_url="https://www.suse.com/security/cve/CVE-2018-6130/" source="CVE"/>
		<reference ref_id="CVE-2018-6131" ref_url="https://www.suse.com/security/cve/CVE-2018-6131/" source="CVE"/>
		<reference ref_id="CVE-2018-6132" ref_url="https://www.suse.com/security/cve/CVE-2018-6132/" source="CVE"/>
		<reference ref_id="CVE-2018-6133" ref_url="https://www.suse.com/security/cve/CVE-2018-6133/" source="CVE"/>
		<reference ref_id="CVE-2018-6134" ref_url="https://www.suse.com/security/cve/CVE-2018-6134/" source="CVE"/>
		<reference ref_id="CVE-2018-6135" ref_url="https://www.suse.com/security/cve/CVE-2018-6135/" source="CVE"/>
		<reference ref_id="CVE-2018-6136" ref_url="https://www.suse.com/security/cve/CVE-2018-6136/" source="CVE"/>
		<reference ref_id="CVE-2018-6137" ref_url="https://www.suse.com/security/cve/CVE-2018-6137/" source="CVE"/>
		<reference ref_id="CVE-2018-6138" ref_url="https://www.suse.com/security/cve/CVE-2018-6138/" source="CVE"/>
		<reference ref_id="CVE-2018-6139" ref_url="https://www.suse.com/security/cve/CVE-2018-6139/" source="CVE"/>
		<reference ref_id="CVE-2018-6140" ref_url="https://www.suse.com/security/cve/CVE-2018-6140/" source="CVE"/>
		<reference ref_id="CVE-2018-6141" ref_url="https://www.suse.com/security/cve/CVE-2018-6141/" source="CVE"/>
		<reference ref_id="CVE-2018-6142" ref_url="https://www.suse.com/security/cve/CVE-2018-6142/" source="CVE"/>
		<reference ref_id="CVE-2018-6143" ref_url="https://www.suse.com/security/cve/CVE-2018-6143/" source="CVE"/>
		<reference ref_id="CVE-2018-6144" ref_url="https://www.suse.com/security/cve/CVE-2018-6144/" source="CVE"/>
		<reference ref_id="CVE-2018-6145" ref_url="https://www.suse.com/security/cve/CVE-2018-6145/" source="CVE"/>
		<reference ref_id="CVE-2018-6147" ref_url="https://www.suse.com/security/cve/CVE-2018-6147/" source="CVE"/>
		<reference ref_id="CVE-2018-6148" ref_url="https://www.suse.com/security/cve/CVE-2018-6148/" source="CVE"/>
		<reference ref_id="CVE-2018-6149" ref_url="https://www.suse.com/security/cve/CVE-2018-6149/" source="CVE"/>
		<reference ref_id="CVE-2018-6153" ref_url="https://www.suse.com/security/cve/CVE-2018-6153/" source="CVE"/>
		<reference ref_id="CVE-2018-6154" ref_url="https://www.suse.com/security/cve/CVE-2018-6154/" source="CVE"/>
		<reference ref_id="CVE-2018-6155" ref_url="https://www.suse.com/security/cve/CVE-2018-6155/" source="CVE"/>
		<reference ref_id="CVE-2018-6156" ref_url="https://www.suse.com/security/cve/CVE-2018-6156/" source="CVE"/>
		<reference ref_id="CVE-2018-6157" ref_url="https://www.suse.com/security/cve/CVE-2018-6157/" source="CVE"/>
		<reference ref_id="CVE-2018-6158" ref_url="https://www.suse.com/security/cve/CVE-2018-6158/" source="CVE"/>
		<reference ref_id="CVE-2018-6159" ref_url="https://www.suse.com/security/cve/CVE-2018-6159/" source="CVE"/>
		<reference ref_id="CVE-2018-6160" ref_url="https://www.suse.com/security/cve/CVE-2018-6160/" source="CVE"/>
		<reference ref_id="CVE-2018-6161" ref_url="https://www.suse.com/security/cve/CVE-2018-6161/" source="CVE"/>
		<reference ref_id="CVE-2018-6162" ref_url="https://www.suse.com/security/cve/CVE-2018-6162/" source="CVE"/>
		<reference ref_id="CVE-2018-6163" ref_url="https://www.suse.com/security/cve/CVE-2018-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-6164" ref_url="https://www.suse.com/security/cve/CVE-2018-6164/" source="CVE"/>
		<reference ref_id="CVE-2018-6165" ref_url="https://www.suse.com/security/cve/CVE-2018-6165/" source="CVE"/>
		<reference ref_id="CVE-2018-6166" ref_url="https://www.suse.com/security/cve/CVE-2018-6166/" source="CVE"/>
		<reference ref_id="CVE-2018-6167" ref_url="https://www.suse.com/security/cve/CVE-2018-6167/" source="CVE"/>
		<reference ref_id="CVE-2018-6168" ref_url="https://www.suse.com/security/cve/CVE-2018-6168/" source="CVE"/>
		<reference ref_id="CVE-2018-6169" ref_url="https://www.suse.com/security/cve/CVE-2018-6169/" source="CVE"/>
		<reference ref_id="CVE-2018-6170" ref_url="https://www.suse.com/security/cve/CVE-2018-6170/" source="CVE"/>
		<reference ref_id="CVE-2018-6171" ref_url="https://www.suse.com/security/cve/CVE-2018-6171/" source="CVE"/>
		<reference ref_id="CVE-2018-6172" ref_url="https://www.suse.com/security/cve/CVE-2018-6172/" source="CVE"/>
		<reference ref_id="CVE-2018-6173" ref_url="https://www.suse.com/security/cve/CVE-2018-6173/" source="CVE"/>
		<reference ref_id="CVE-2018-6174" ref_url="https://www.suse.com/security/cve/CVE-2018-6174/" source="CVE"/>
		<reference ref_id="CVE-2018-6175" ref_url="https://www.suse.com/security/cve/CVE-2018-6175/" source="CVE"/>
		<reference ref_id="CVE-2018-6176" ref_url="https://www.suse.com/security/cve/CVE-2018-6176/" source="CVE"/>
		<reference ref_id="CVE-2018-6177" ref_url="https://www.suse.com/security/cve/CVE-2018-6177/" source="CVE"/>
		<reference ref_id="CVE-2018-6178" ref_url="https://www.suse.com/security/cve/CVE-2018-6178/" source="CVE"/>
		<reference ref_id="CVE-2018-6179" ref_url="https://www.suse.com/security/cve/CVE-2018-6179/" source="CVE"/>
		<reference ref_id="CVE-2018-6406" ref_url="https://www.suse.com/security/cve/CVE-2018-6406/" source="CVE"/>
		<reference ref_id="CVE-2019-13659" ref_url="https://www.suse.com/security/cve/CVE-2019-13659/" source="CVE"/>
		<reference ref_id="CVE-2019-13660" ref_url="https://www.suse.com/security/cve/CVE-2019-13660/" source="CVE"/>
		<reference ref_id="CVE-2019-13661" ref_url="https://www.suse.com/security/cve/CVE-2019-13661/" source="CVE"/>
		<reference ref_id="CVE-2019-13662" ref_url="https://www.suse.com/security/cve/CVE-2019-13662/" source="CVE"/>
		<reference ref_id="CVE-2019-13663" ref_url="https://www.suse.com/security/cve/CVE-2019-13663/" source="CVE"/>
		<reference ref_id="CVE-2019-13664" ref_url="https://www.suse.com/security/cve/CVE-2019-13664/" source="CVE"/>
		<reference ref_id="CVE-2019-13665" ref_url="https://www.suse.com/security/cve/CVE-2019-13665/" source="CVE"/>
		<reference ref_id="CVE-2019-13666" ref_url="https://www.suse.com/security/cve/CVE-2019-13666/" source="CVE"/>
		<reference ref_id="CVE-2019-13667" ref_url="https://www.suse.com/security/cve/CVE-2019-13667/" source="CVE"/>
		<reference ref_id="CVE-2019-13668" ref_url="https://www.suse.com/security/cve/CVE-2019-13668/" source="CVE"/>
		<reference ref_id="CVE-2019-13669" ref_url="https://www.suse.com/security/cve/CVE-2019-13669/" source="CVE"/>
		<reference ref_id="CVE-2019-13670" ref_url="https://www.suse.com/security/cve/CVE-2019-13670/" source="CVE"/>
		<reference ref_id="CVE-2019-13671" ref_url="https://www.suse.com/security/cve/CVE-2019-13671/" source="CVE"/>
		<reference ref_id="CVE-2019-13673" ref_url="https://www.suse.com/security/cve/CVE-2019-13673/" source="CVE"/>
		<reference ref_id="CVE-2019-13674" ref_url="https://www.suse.com/security/cve/CVE-2019-13674/" source="CVE"/>
		<reference ref_id="CVE-2019-13675" ref_url="https://www.suse.com/security/cve/CVE-2019-13675/" source="CVE"/>
		<reference ref_id="CVE-2019-13676" ref_url="https://www.suse.com/security/cve/CVE-2019-13676/" source="CVE"/>
		<reference ref_id="CVE-2019-13677" ref_url="https://www.suse.com/security/cve/CVE-2019-13677/" source="CVE"/>
		<reference ref_id="CVE-2019-13678" ref_url="https://www.suse.com/security/cve/CVE-2019-13678/" source="CVE"/>
		<reference ref_id="CVE-2019-13679" ref_url="https://www.suse.com/security/cve/CVE-2019-13679/" source="CVE"/>
		<reference ref_id="CVE-2019-13680" ref_url="https://www.suse.com/security/cve/CVE-2019-13680/" source="CVE"/>
		<reference ref_id="CVE-2019-13681" ref_url="https://www.suse.com/security/cve/CVE-2019-13681/" source="CVE"/>
		<reference ref_id="CVE-2019-13682" ref_url="https://www.suse.com/security/cve/CVE-2019-13682/" source="CVE"/>
		<reference ref_id="CVE-2019-13683" ref_url="https://www.suse.com/security/cve/CVE-2019-13683/" source="CVE"/>
		<reference ref_id="CVE-2019-13685" ref_url="https://www.suse.com/security/cve/CVE-2019-13685/" source="CVE"/>
		<reference ref_id="CVE-2019-13686" ref_url="https://www.suse.com/security/cve/CVE-2019-13686/" source="CVE"/>
		<reference ref_id="CVE-2019-13687" ref_url="https://www.suse.com/security/cve/CVE-2019-13687/" source="CVE"/>
		<reference ref_id="CVE-2019-13688" ref_url="https://www.suse.com/security/cve/CVE-2019-13688/" source="CVE"/>
		<reference ref_id="CVE-2019-13693" ref_url="https://www.suse.com/security/cve/CVE-2019-13693/" source="CVE"/>
		<reference ref_id="CVE-2019-13694" ref_url="https://www.suse.com/security/cve/CVE-2019-13694/" source="CVE"/>
		<reference ref_id="CVE-2019-13695" ref_url="https://www.suse.com/security/cve/CVE-2019-13695/" source="CVE"/>
		<reference ref_id="CVE-2019-13696" ref_url="https://www.suse.com/security/cve/CVE-2019-13696/" source="CVE"/>
		<reference ref_id="CVE-2019-13697" ref_url="https://www.suse.com/security/cve/CVE-2019-13697/" source="CVE"/>
		<reference ref_id="CVE-2019-13699" ref_url="https://www.suse.com/security/cve/CVE-2019-13699/" source="CVE"/>
		<reference ref_id="CVE-2019-13700" ref_url="https://www.suse.com/security/cve/CVE-2019-13700/" source="CVE"/>
		<reference ref_id="CVE-2019-13701" ref_url="https://www.suse.com/security/cve/CVE-2019-13701/" source="CVE"/>
		<reference ref_id="CVE-2019-13702" ref_url="https://www.suse.com/security/cve/CVE-2019-13702/" source="CVE"/>
		<reference ref_id="CVE-2019-13703" ref_url="https://www.suse.com/security/cve/CVE-2019-13703/" source="CVE"/>
		<reference ref_id="CVE-2019-13704" ref_url="https://www.suse.com/security/cve/CVE-2019-13704/" source="CVE"/>
		<reference ref_id="CVE-2019-13705" ref_url="https://www.suse.com/security/cve/CVE-2019-13705/" source="CVE"/>
		<reference ref_id="CVE-2019-13706" ref_url="https://www.suse.com/security/cve/CVE-2019-13706/" source="CVE"/>
		<reference ref_id="CVE-2019-13707" ref_url="https://www.suse.com/security/cve/CVE-2019-13707/" source="CVE"/>
		<reference ref_id="CVE-2019-13708" ref_url="https://www.suse.com/security/cve/CVE-2019-13708/" source="CVE"/>
		<reference ref_id="CVE-2019-13709" ref_url="https://www.suse.com/security/cve/CVE-2019-13709/" source="CVE"/>
		<reference ref_id="CVE-2019-13710" ref_url="https://www.suse.com/security/cve/CVE-2019-13710/" source="CVE"/>
		<reference ref_id="CVE-2019-13711" ref_url="https://www.suse.com/security/cve/CVE-2019-13711/" source="CVE"/>
		<reference ref_id="CVE-2019-13713" ref_url="https://www.suse.com/security/cve/CVE-2019-13713/" source="CVE"/>
		<reference ref_id="CVE-2019-13714" ref_url="https://www.suse.com/security/cve/CVE-2019-13714/" source="CVE"/>
		<reference ref_id="CVE-2019-13715" ref_url="https://www.suse.com/security/cve/CVE-2019-13715/" source="CVE"/>
		<reference ref_id="CVE-2019-13716" ref_url="https://www.suse.com/security/cve/CVE-2019-13716/" source="CVE"/>
		<reference ref_id="CVE-2019-13717" ref_url="https://www.suse.com/security/cve/CVE-2019-13717/" source="CVE"/>
		<reference ref_id="CVE-2019-13718" ref_url="https://www.suse.com/security/cve/CVE-2019-13718/" source="CVE"/>
		<reference ref_id="CVE-2019-13719" ref_url="https://www.suse.com/security/cve/CVE-2019-13719/" source="CVE"/>
		<reference ref_id="CVE-2019-13720" ref_url="https://www.suse.com/security/cve/CVE-2019-13720/" source="CVE"/>
		<reference ref_id="CVE-2019-13721" ref_url="https://www.suse.com/security/cve/CVE-2019-13721/" source="CVE"/>
		<reference ref_id="CVE-2019-13723" ref_url="https://www.suse.com/security/cve/CVE-2019-13723/" source="CVE"/>
		<reference ref_id="CVE-2019-13724" ref_url="https://www.suse.com/security/cve/CVE-2019-13724/" source="CVE"/>
		<reference ref_id="CVE-2019-13725" ref_url="https://www.suse.com/security/cve/CVE-2019-13725/" source="CVE"/>
		<reference ref_id="CVE-2019-13726" ref_url="https://www.suse.com/security/cve/CVE-2019-13726/" source="CVE"/>
		<reference ref_id="CVE-2019-13727" ref_url="https://www.suse.com/security/cve/CVE-2019-13727/" source="CVE"/>
		<reference ref_id="CVE-2019-13728" ref_url="https://www.suse.com/security/cve/CVE-2019-13728/" source="CVE"/>
		<reference ref_id="CVE-2019-13729" ref_url="https://www.suse.com/security/cve/CVE-2019-13729/" source="CVE"/>
		<reference ref_id="CVE-2019-13730" ref_url="https://www.suse.com/security/cve/CVE-2019-13730/" source="CVE"/>
		<reference ref_id="CVE-2019-13732" ref_url="https://www.suse.com/security/cve/CVE-2019-13732/" source="CVE"/>
		<reference ref_id="CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734/" source="CVE"/>
		<reference ref_id="CVE-2019-13735" ref_url="https://www.suse.com/security/cve/CVE-2019-13735/" source="CVE"/>
		<reference ref_id="CVE-2019-13736" ref_url="https://www.suse.com/security/cve/CVE-2019-13736/" source="CVE"/>
		<reference ref_id="CVE-2019-13737" ref_url="https://www.suse.com/security/cve/CVE-2019-13737/" source="CVE"/>
		<reference ref_id="CVE-2019-13738" ref_url="https://www.suse.com/security/cve/CVE-2019-13738/" source="CVE"/>
		<reference ref_id="CVE-2019-13739" ref_url="https://www.suse.com/security/cve/CVE-2019-13739/" source="CVE"/>
		<reference ref_id="CVE-2019-13740" ref_url="https://www.suse.com/security/cve/CVE-2019-13740/" source="CVE"/>
		<reference ref_id="CVE-2019-13741" ref_url="https://www.suse.com/security/cve/CVE-2019-13741/" source="CVE"/>
		<reference ref_id="CVE-2019-13742" ref_url="https://www.suse.com/security/cve/CVE-2019-13742/" source="CVE"/>
		<reference ref_id="CVE-2019-13743" ref_url="https://www.suse.com/security/cve/CVE-2019-13743/" source="CVE"/>
		<reference ref_id="CVE-2019-13744" ref_url="https://www.suse.com/security/cve/CVE-2019-13744/" source="CVE"/>
		<reference ref_id="CVE-2019-13745" ref_url="https://www.suse.com/security/cve/CVE-2019-13745/" source="CVE"/>
		<reference ref_id="CVE-2019-13746" ref_url="https://www.suse.com/security/cve/CVE-2019-13746/" source="CVE"/>
		<reference ref_id="CVE-2019-13747" ref_url="https://www.suse.com/security/cve/CVE-2019-13747/" source="CVE"/>
		<reference ref_id="CVE-2019-13748" ref_url="https://www.suse.com/security/cve/CVE-2019-13748/" source="CVE"/>
		<reference ref_id="CVE-2019-13749" ref_url="https://www.suse.com/security/cve/CVE-2019-13749/" source="CVE"/>
		<reference ref_id="CVE-2019-13750" ref_url="https://www.suse.com/security/cve/CVE-2019-13750/" source="CVE"/>
		<reference ref_id="CVE-2019-13751" ref_url="https://www.suse.com/security/cve/CVE-2019-13751/" source="CVE"/>
		<reference ref_id="CVE-2019-13752" ref_url="https://www.suse.com/security/cve/CVE-2019-13752/" source="CVE"/>
		<reference ref_id="CVE-2019-13753" ref_url="https://www.suse.com/security/cve/CVE-2019-13753/" source="CVE"/>
		<reference ref_id="CVE-2019-13754" ref_url="https://www.suse.com/security/cve/CVE-2019-13754/" source="CVE"/>
		<reference ref_id="CVE-2019-13755" ref_url="https://www.suse.com/security/cve/CVE-2019-13755/" source="CVE"/>
		<reference ref_id="CVE-2019-13756" ref_url="https://www.suse.com/security/cve/CVE-2019-13756/" source="CVE"/>
		<reference ref_id="CVE-2019-13757" ref_url="https://www.suse.com/security/cve/CVE-2019-13757/" source="CVE"/>
		<reference ref_id="CVE-2019-13758" ref_url="https://www.suse.com/security/cve/CVE-2019-13758/" source="CVE"/>
		<reference ref_id="CVE-2019-13759" ref_url="https://www.suse.com/security/cve/CVE-2019-13759/" source="CVE"/>
		<reference ref_id="CVE-2019-13761" ref_url="https://www.suse.com/security/cve/CVE-2019-13761/" source="CVE"/>
		<reference ref_id="CVE-2019-13762" ref_url="https://www.suse.com/security/cve/CVE-2019-13762/" source="CVE"/>
		<reference ref_id="CVE-2019-13763" ref_url="https://www.suse.com/security/cve/CVE-2019-13763/" source="CVE"/>
		<reference ref_id="CVE-2019-13764" ref_url="https://www.suse.com/security/cve/CVE-2019-13764/" source="CVE"/>
		<reference ref_id="CVE-2019-13767" ref_url="https://www.suse.com/security/cve/CVE-2019-13767/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5754" ref_url="https://www.suse.com/security/cve/CVE-2019-5754/" source="CVE"/>
		<reference ref_id="CVE-2019-5755" ref_url="https://www.suse.com/security/cve/CVE-2019-5755/" source="CVE"/>
		<reference ref_id="CVE-2019-5756" ref_url="https://www.suse.com/security/cve/CVE-2019-5756/" source="CVE"/>
		<reference ref_id="CVE-2019-5757" ref_url="https://www.suse.com/security/cve/CVE-2019-5757/" source="CVE"/>
		<reference ref_id="CVE-2019-5758" ref_url="https://www.suse.com/security/cve/CVE-2019-5758/" source="CVE"/>
		<reference ref_id="CVE-2019-5759" ref_url="https://www.suse.com/security/cve/CVE-2019-5759/" source="CVE"/>
		<reference ref_id="CVE-2019-5760" ref_url="https://www.suse.com/security/cve/CVE-2019-5760/" source="CVE"/>
		<reference ref_id="CVE-2019-5761" ref_url="https://www.suse.com/security/cve/CVE-2019-5761/" source="CVE"/>
		<reference ref_id="CVE-2019-5762" ref_url="https://www.suse.com/security/cve/CVE-2019-5762/" source="CVE"/>
		<reference ref_id="CVE-2019-5763" ref_url="https://www.suse.com/security/cve/CVE-2019-5763/" source="CVE"/>
		<reference ref_id="CVE-2019-5764" ref_url="https://www.suse.com/security/cve/CVE-2019-5764/" source="CVE"/>
		<reference ref_id="CVE-2019-5765" ref_url="https://www.suse.com/security/cve/CVE-2019-5765/" source="CVE"/>
		<reference ref_id="CVE-2019-5766" ref_url="https://www.suse.com/security/cve/CVE-2019-5766/" source="CVE"/>
		<reference ref_id="CVE-2019-5767" ref_url="https://www.suse.com/security/cve/CVE-2019-5767/" source="CVE"/>
		<reference ref_id="CVE-2019-5768" ref_url="https://www.suse.com/security/cve/CVE-2019-5768/" source="CVE"/>
		<reference ref_id="CVE-2019-5769" ref_url="https://www.suse.com/security/cve/CVE-2019-5769/" source="CVE"/>
		<reference ref_id="CVE-2019-5770" ref_url="https://www.suse.com/security/cve/CVE-2019-5770/" source="CVE"/>
		<reference ref_id="CVE-2019-5771" ref_url="https://www.suse.com/security/cve/CVE-2019-5771/" source="CVE"/>
		<reference ref_id="CVE-2019-5772" ref_url="https://www.suse.com/security/cve/CVE-2019-5772/" source="CVE"/>
		<reference ref_id="CVE-2019-5773" ref_url="https://www.suse.com/security/cve/CVE-2019-5773/" source="CVE"/>
		<reference ref_id="CVE-2019-5774" ref_url="https://www.suse.com/security/cve/CVE-2019-5774/" source="CVE"/>
		<reference ref_id="CVE-2019-5775" ref_url="https://www.suse.com/security/cve/CVE-2019-5775/" source="CVE"/>
		<reference ref_id="CVE-2019-5776" ref_url="https://www.suse.com/security/cve/CVE-2019-5776/" source="CVE"/>
		<reference ref_id="CVE-2019-5777" ref_url="https://www.suse.com/security/cve/CVE-2019-5777/" source="CVE"/>
		<reference ref_id="CVE-2019-5778" ref_url="https://www.suse.com/security/cve/CVE-2019-5778/" source="CVE"/>
		<reference ref_id="CVE-2019-5779" ref_url="https://www.suse.com/security/cve/CVE-2019-5779/" source="CVE"/>
		<reference ref_id="CVE-2019-5780" ref_url="https://www.suse.com/security/cve/CVE-2019-5780/" source="CVE"/>
		<reference ref_id="CVE-2019-5781" ref_url="https://www.suse.com/security/cve/CVE-2019-5781/" source="CVE"/>
		<reference ref_id="CVE-2019-5782" ref_url="https://www.suse.com/security/cve/CVE-2019-5782/" source="CVE"/>
		<reference ref_id="CVE-2019-5784" ref_url="https://www.suse.com/security/cve/CVE-2019-5784/" source="CVE"/>
		<reference ref_id="CVE-2019-5786" ref_url="https://www.suse.com/security/cve/CVE-2019-5786/" source="CVE"/>
		<reference ref_id="CVE-2019-5787" ref_url="https://www.suse.com/security/cve/CVE-2019-5787/" source="CVE"/>
		<reference ref_id="CVE-2019-5788" ref_url="https://www.suse.com/security/cve/CVE-2019-5788/" source="CVE"/>
		<reference ref_id="CVE-2019-5789" ref_url="https://www.suse.com/security/cve/CVE-2019-5789/" source="CVE"/>
		<reference ref_id="CVE-2019-5790" ref_url="https://www.suse.com/security/cve/CVE-2019-5790/" source="CVE"/>
		<reference ref_id="CVE-2019-5791" ref_url="https://www.suse.com/security/cve/CVE-2019-5791/" source="CVE"/>
		<reference ref_id="CVE-2019-5792" ref_url="https://www.suse.com/security/cve/CVE-2019-5792/" source="CVE"/>
		<reference ref_id="CVE-2019-5793" ref_url="https://www.suse.com/security/cve/CVE-2019-5793/" source="CVE"/>
		<reference ref_id="CVE-2019-5794" ref_url="https://www.suse.com/security/cve/CVE-2019-5794/" source="CVE"/>
		<reference ref_id="CVE-2019-5795" ref_url="https://www.suse.com/security/cve/CVE-2019-5795/" source="CVE"/>
		<reference ref_id="CVE-2019-5796" ref_url="https://www.suse.com/security/cve/CVE-2019-5796/" source="CVE"/>
		<reference ref_id="CVE-2019-5797" ref_url="https://www.suse.com/security/cve/CVE-2019-5797/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-5799" ref_url="https://www.suse.com/security/cve/CVE-2019-5799/" source="CVE"/>
		<reference ref_id="CVE-2019-5800" ref_url="https://www.suse.com/security/cve/CVE-2019-5800/" source="CVE"/>
		<reference ref_id="CVE-2019-5801" ref_url="https://www.suse.com/security/cve/CVE-2019-5801/" source="CVE"/>
		<reference ref_id="CVE-2019-5802" ref_url="https://www.suse.com/security/cve/CVE-2019-5802/" source="CVE"/>
		<reference ref_id="CVE-2019-5803" ref_url="https://www.suse.com/security/cve/CVE-2019-5803/" source="CVE"/>
		<reference ref_id="CVE-2019-5804" ref_url="https://www.suse.com/security/cve/CVE-2019-5804/" source="CVE"/>
		<reference ref_id="CVE-2019-5805" ref_url="https://www.suse.com/security/cve/CVE-2019-5805/" source="CVE"/>
		<reference ref_id="CVE-2019-5806" ref_url="https://www.suse.com/security/cve/CVE-2019-5806/" source="CVE"/>
		<reference ref_id="CVE-2019-5807" ref_url="https://www.suse.com/security/cve/CVE-2019-5807/" source="CVE"/>
		<reference ref_id="CVE-2019-5808" ref_url="https://www.suse.com/security/cve/CVE-2019-5808/" source="CVE"/>
		<reference ref_id="CVE-2019-5809" ref_url="https://www.suse.com/security/cve/CVE-2019-5809/" source="CVE"/>
		<reference ref_id="CVE-2019-5810" ref_url="https://www.suse.com/security/cve/CVE-2019-5810/" source="CVE"/>
		<reference ref_id="CVE-2019-5811" ref_url="https://www.suse.com/security/cve/CVE-2019-5811/" source="CVE"/>
		<reference ref_id="CVE-2019-5812" ref_url="https://www.suse.com/security/cve/CVE-2019-5812/" source="CVE"/>
		<reference ref_id="CVE-2019-5813" ref_url="https://www.suse.com/security/cve/CVE-2019-5813/" source="CVE"/>
		<reference ref_id="CVE-2019-5814" ref_url="https://www.suse.com/security/cve/CVE-2019-5814/" source="CVE"/>
		<reference ref_id="CVE-2019-5815" ref_url="https://www.suse.com/security/cve/CVE-2019-5815/" source="CVE"/>
		<reference ref_id="CVE-2019-5816" ref_url="https://www.suse.com/security/cve/CVE-2019-5816/" source="CVE"/>
		<reference ref_id="CVE-2019-5817" ref_url="https://www.suse.com/security/cve/CVE-2019-5817/" source="CVE"/>
		<reference ref_id="CVE-2019-5818" ref_url="https://www.suse.com/security/cve/CVE-2019-5818/" source="CVE"/>
		<reference ref_id="CVE-2019-5819" ref_url="https://www.suse.com/security/cve/CVE-2019-5819/" source="CVE"/>
		<reference ref_id="CVE-2019-5820" ref_url="https://www.suse.com/security/cve/CVE-2019-5820/" source="CVE"/>
		<reference ref_id="CVE-2019-5821" ref_url="https://www.suse.com/security/cve/CVE-2019-5821/" source="CVE"/>
		<reference ref_id="CVE-2019-5822" ref_url="https://www.suse.com/security/cve/CVE-2019-5822/" source="CVE"/>
		<reference ref_id="CVE-2019-5823" ref_url="https://www.suse.com/security/cve/CVE-2019-5823/" source="CVE"/>
		<reference ref_id="CVE-2019-5824" ref_url="https://www.suse.com/security/cve/CVE-2019-5824/" source="CVE"/>
		<reference ref_id="CVE-2019-5827" ref_url="https://www.suse.com/security/cve/CVE-2019-5827/" source="CVE"/>
		<reference ref_id="CVE-2019-5828" ref_url="https://www.suse.com/security/cve/CVE-2019-5828/" source="CVE"/>
		<reference ref_id="CVE-2019-5829" ref_url="https://www.suse.com/security/cve/CVE-2019-5829/" source="CVE"/>
		<reference ref_id="CVE-2019-5830" ref_url="https://www.suse.com/security/cve/CVE-2019-5830/" source="CVE"/>
		<reference ref_id="CVE-2019-5831" ref_url="https://www.suse.com/security/cve/CVE-2019-5831/" source="CVE"/>
		<reference ref_id="CVE-2019-5832" ref_url="https://www.suse.com/security/cve/CVE-2019-5832/" source="CVE"/>
		<reference ref_id="CVE-2019-5833" ref_url="https://www.suse.com/security/cve/CVE-2019-5833/" source="CVE"/>
		<reference ref_id="CVE-2019-5834" ref_url="https://www.suse.com/security/cve/CVE-2019-5834/" source="CVE"/>
		<reference ref_id="CVE-2019-5835" ref_url="https://www.suse.com/security/cve/CVE-2019-5835/" source="CVE"/>
		<reference ref_id="CVE-2019-5836" ref_url="https://www.suse.com/security/cve/CVE-2019-5836/" source="CVE"/>
		<reference ref_id="CVE-2019-5837" ref_url="https://www.suse.com/security/cve/CVE-2019-5837/" source="CVE"/>
		<reference ref_id="CVE-2019-5838" ref_url="https://www.suse.com/security/cve/CVE-2019-5838/" source="CVE"/>
		<reference ref_id="CVE-2019-5839" ref_url="https://www.suse.com/security/cve/CVE-2019-5839/" source="CVE"/>
		<reference ref_id="CVE-2019-5840" ref_url="https://www.suse.com/security/cve/CVE-2019-5840/" source="CVE"/>
		<reference ref_id="CVE-2019-5842" ref_url="https://www.suse.com/security/cve/CVE-2019-5842/" source="CVE"/>
		<reference ref_id="CVE-2019-5844" ref_url="https://www.suse.com/security/cve/CVE-2019-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-5847" ref_url="https://www.suse.com/security/cve/CVE-2019-5847/" source="CVE"/>
		<reference ref_id="CVE-2019-5848" ref_url="https://www.suse.com/security/cve/CVE-2019-5848/" source="CVE"/>
		<reference ref_id="CVE-2019-5850" ref_url="https://www.suse.com/security/cve/CVE-2019-5850/" source="CVE"/>
		<reference ref_id="CVE-2019-5851" ref_url="https://www.suse.com/security/cve/CVE-2019-5851/" source="CVE"/>
		<reference ref_id="CVE-2019-5852" ref_url="https://www.suse.com/security/cve/CVE-2019-5852/" source="CVE"/>
		<reference ref_id="CVE-2019-5853" ref_url="https://www.suse.com/security/cve/CVE-2019-5853/" source="CVE"/>
		<reference ref_id="CVE-2019-5854" ref_url="https://www.suse.com/security/cve/CVE-2019-5854/" source="CVE"/>
		<reference ref_id="CVE-2019-5855" ref_url="https://www.suse.com/security/cve/CVE-2019-5855/" source="CVE"/>
		<reference ref_id="CVE-2019-5856" ref_url="https://www.suse.com/security/cve/CVE-2019-5856/" source="CVE"/>
		<reference ref_id="CVE-2019-5857" ref_url="https://www.suse.com/security/cve/CVE-2019-5857/" source="CVE"/>
		<reference ref_id="CVE-2019-5858" ref_url="https://www.suse.com/security/cve/CVE-2019-5858/" source="CVE"/>
		<reference ref_id="CVE-2019-5859" ref_url="https://www.suse.com/security/cve/CVE-2019-5859/" source="CVE"/>
		<reference ref_id="CVE-2019-5860" ref_url="https://www.suse.com/security/cve/CVE-2019-5860/" source="CVE"/>
		<reference ref_id="CVE-2019-5861" ref_url="https://www.suse.com/security/cve/CVE-2019-5861/" source="CVE"/>
		<reference ref_id="CVE-2019-5862" ref_url="https://www.suse.com/security/cve/CVE-2019-5862/" source="CVE"/>
		<reference ref_id="CVE-2019-5863" ref_url="https://www.suse.com/security/cve/CVE-2019-5863/" source="CVE"/>
		<reference ref_id="CVE-2019-5864" ref_url="https://www.suse.com/security/cve/CVE-2019-5864/" source="CVE"/>
		<reference ref_id="CVE-2019-5865" ref_url="https://www.suse.com/security/cve/CVE-2019-5865/" source="CVE"/>
		<reference ref_id="CVE-2019-5867" ref_url="https://www.suse.com/security/cve/CVE-2019-5867/" source="CVE"/>
		<reference ref_id="CVE-2019-5868" ref_url="https://www.suse.com/security/cve/CVE-2019-5868/" source="CVE"/>
		<reference ref_id="CVE-2019-5869" ref_url="https://www.suse.com/security/cve/CVE-2019-5869/" source="CVE"/>
		<reference ref_id="CVE-2019-5870" ref_url="https://www.suse.com/security/cve/CVE-2019-5870/" source="CVE"/>
		<reference ref_id="CVE-2019-5871" ref_url="https://www.suse.com/security/cve/CVE-2019-5871/" source="CVE"/>
		<reference ref_id="CVE-2019-5872" ref_url="https://www.suse.com/security/cve/CVE-2019-5872/" source="CVE"/>
		<reference ref_id="CVE-2019-5874" ref_url="https://www.suse.com/security/cve/CVE-2019-5874/" source="CVE"/>
		<reference ref_id="CVE-2019-5875" ref_url="https://www.suse.com/security/cve/CVE-2019-5875/" source="CVE"/>
		<reference ref_id="CVE-2019-5876" ref_url="https://www.suse.com/security/cve/CVE-2019-5876/" source="CVE"/>
		<reference ref_id="CVE-2019-5877" ref_url="https://www.suse.com/security/cve/CVE-2019-5877/" source="CVE"/>
		<reference ref_id="CVE-2019-5878" ref_url="https://www.suse.com/security/cve/CVE-2019-5878/" source="CVE"/>
		<reference ref_id="CVE-2019-5879" ref_url="https://www.suse.com/security/cve/CVE-2019-5879/" source="CVE"/>
		<reference ref_id="CVE-2019-5880" ref_url="https://www.suse.com/security/cve/CVE-2019-5880/" source="CVE"/>
		<reference ref_id="CVE-2019-5881" ref_url="https://www.suse.com/security/cve/CVE-2019-5881/" source="CVE"/>
		<reference ref_id="CVE-2019-8075" ref_url="https://www.suse.com/security/cve/CVE-2019-8075/" source="CVE"/>
		<reference ref_id="CVE-2020-0561" ref_url="https://www.suse.com/security/cve/CVE-2020-0561/" source="CVE"/>
		<reference ref_id="CVE-2020-15959" ref_url="https://www.suse.com/security/cve/CVE-2020-15959/" source="CVE"/>
		<reference ref_id="CVE-2020-15960" ref_url="https://www.suse.com/security/cve/CVE-2020-15960/" source="CVE"/>
		<reference ref_id="CVE-2020-15961" ref_url="https://www.suse.com/security/cve/CVE-2020-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-15962" ref_url="https://www.suse.com/security/cve/CVE-2020-15962/" source="CVE"/>
		<reference ref_id="CVE-2020-15963" ref_url="https://www.suse.com/security/cve/CVE-2020-15963/" source="CVE"/>
		<reference ref_id="CVE-2020-15964" ref_url="https://www.suse.com/security/cve/CVE-2020-15964/" source="CVE"/>
		<reference ref_id="CVE-2020-15965" ref_url="https://www.suse.com/security/cve/CVE-2020-15965/" source="CVE"/>
		<reference ref_id="CVE-2020-15966" ref_url="https://www.suse.com/security/cve/CVE-2020-15966/" source="CVE"/>
		<reference ref_id="CVE-2020-15967" ref_url="https://www.suse.com/security/cve/CVE-2020-15967/" source="CVE"/>
		<reference ref_id="CVE-2020-15968" ref_url="https://www.suse.com/security/cve/CVE-2020-15968/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15970" ref_url="https://www.suse.com/security/cve/CVE-2020-15970/" source="CVE"/>
		<reference ref_id="CVE-2020-15971" ref_url="https://www.suse.com/security/cve/CVE-2020-15971/" source="CVE"/>
		<reference ref_id="CVE-2020-15972" ref_url="https://www.suse.com/security/cve/CVE-2020-15972/" source="CVE"/>
		<reference ref_id="CVE-2020-15973" ref_url="https://www.suse.com/security/cve/CVE-2020-15973/" source="CVE"/>
		<reference ref_id="CVE-2020-15974" ref_url="https://www.suse.com/security/cve/CVE-2020-15974/" source="CVE"/>
		<reference ref_id="CVE-2020-15975" ref_url="https://www.suse.com/security/cve/CVE-2020-15975/" source="CVE"/>
		<reference ref_id="CVE-2020-15976" ref_url="https://www.suse.com/security/cve/CVE-2020-15976/" source="CVE"/>
		<reference ref_id="CVE-2020-15977" ref_url="https://www.suse.com/security/cve/CVE-2020-15977/" source="CVE"/>
		<reference ref_id="CVE-2020-15978" ref_url="https://www.suse.com/security/cve/CVE-2020-15978/" source="CVE"/>
		<reference ref_id="CVE-2020-15979" ref_url="https://www.suse.com/security/cve/CVE-2020-15979/" source="CVE"/>
		<reference ref_id="CVE-2020-15980" ref_url="https://www.suse.com/security/cve/CVE-2020-15980/" source="CVE"/>
		<reference ref_id="CVE-2020-15981" ref_url="https://www.suse.com/security/cve/CVE-2020-15981/" source="CVE"/>
		<reference ref_id="CVE-2020-15982" ref_url="https://www.suse.com/security/cve/CVE-2020-15982/" source="CVE"/>
		<reference ref_id="CVE-2020-15983" ref_url="https://www.suse.com/security/cve/CVE-2020-15983/" source="CVE"/>
		<reference ref_id="CVE-2020-15984" ref_url="https://www.suse.com/security/cve/CVE-2020-15984/" source="CVE"/>
		<reference ref_id="CVE-2020-15985" ref_url="https://www.suse.com/security/cve/CVE-2020-15985/" source="CVE"/>
		<reference ref_id="CVE-2020-15986" ref_url="https://www.suse.com/security/cve/CVE-2020-15986/" source="CVE"/>
		<reference ref_id="CVE-2020-15987" ref_url="https://www.suse.com/security/cve/CVE-2020-15987/" source="CVE"/>
		<reference ref_id="CVE-2020-15988" ref_url="https://www.suse.com/security/cve/CVE-2020-15988/" source="CVE"/>
		<reference ref_id="CVE-2020-15989" ref_url="https://www.suse.com/security/cve/CVE-2020-15989/" source="CVE"/>
		<reference ref_id="CVE-2020-15990" ref_url="https://www.suse.com/security/cve/CVE-2020-15990/" source="CVE"/>
		<reference ref_id="CVE-2020-15991" ref_url="https://www.suse.com/security/cve/CVE-2020-15991/" source="CVE"/>
		<reference ref_id="CVE-2020-15992" ref_url="https://www.suse.com/security/cve/CVE-2020-15992/" source="CVE"/>
		<reference ref_id="CVE-2020-15995" ref_url="https://www.suse.com/security/cve/CVE-2020-15995/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16000" ref_url="https://www.suse.com/security/cve/CVE-2020-16000/" source="CVE"/>
		<reference ref_id="CVE-2020-16001" ref_url="https://www.suse.com/security/cve/CVE-2020-16001/" source="CVE"/>
		<reference ref_id="CVE-2020-16002" ref_url="https://www.suse.com/security/cve/CVE-2020-16002/" source="CVE"/>
		<reference ref_id="CVE-2020-16003" ref_url="https://www.suse.com/security/cve/CVE-2020-16003/" source="CVE"/>
		<reference ref_id="CVE-2020-16004" ref_url="https://www.suse.com/security/cve/CVE-2020-16004/" source="CVE"/>
		<reference ref_id="CVE-2020-16005" ref_url="https://www.suse.com/security/cve/CVE-2020-16005/" source="CVE"/>
		<reference ref_id="CVE-2020-16006" ref_url="https://www.suse.com/security/cve/CVE-2020-16006/" source="CVE"/>
		<reference ref_id="CVE-2020-16007" ref_url="https://www.suse.com/security/cve/CVE-2020-16007/" source="CVE"/>
		<reference ref_id="CVE-2020-16008" ref_url="https://www.suse.com/security/cve/CVE-2020-16008/" source="CVE"/>
		<reference ref_id="CVE-2020-16009" ref_url="https://www.suse.com/security/cve/CVE-2020-16009/" source="CVE"/>
		<reference ref_id="CVE-2020-16011" ref_url="https://www.suse.com/security/cve/CVE-2020-16011/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16013" ref_url="https://www.suse.com/security/cve/CVE-2020-16013/" source="CVE"/>
		<reference ref_id="CVE-2020-16014" ref_url="https://www.suse.com/security/cve/CVE-2020-16014/" source="CVE"/>
		<reference ref_id="CVE-2020-16015" ref_url="https://www.suse.com/security/cve/CVE-2020-16015/" source="CVE"/>
		<reference ref_id="CVE-2020-16016" ref_url="https://www.suse.com/security/cve/CVE-2020-16016/" source="CVE"/>
		<reference ref_id="CVE-2020-16017" ref_url="https://www.suse.com/security/cve/CVE-2020-16017/" source="CVE"/>
		<reference ref_id="CVE-2020-16018" ref_url="https://www.suse.com/security/cve/CVE-2020-16018/" source="CVE"/>
		<reference ref_id="CVE-2020-16019" ref_url="https://www.suse.com/security/cve/CVE-2020-16019/" source="CVE"/>
		<reference ref_id="CVE-2020-16020" ref_url="https://www.suse.com/security/cve/CVE-2020-16020/" source="CVE"/>
		<reference ref_id="CVE-2020-16021" ref_url="https://www.suse.com/security/cve/CVE-2020-16021/" source="CVE"/>
		<reference ref_id="CVE-2020-16022" ref_url="https://www.suse.com/security/cve/CVE-2020-16022/" source="CVE"/>
		<reference ref_id="CVE-2020-16023" ref_url="https://www.suse.com/security/cve/CVE-2020-16023/" source="CVE"/>
		<reference ref_id="CVE-2020-16024" ref_url="https://www.suse.com/security/cve/CVE-2020-16024/" source="CVE"/>
		<reference ref_id="CVE-2020-16025" ref_url="https://www.suse.com/security/cve/CVE-2020-16025/" source="CVE"/>
		<reference ref_id="CVE-2020-16026" ref_url="https://www.suse.com/security/cve/CVE-2020-16026/" source="CVE"/>
		<reference ref_id="CVE-2020-16027" ref_url="https://www.suse.com/security/cve/CVE-2020-16027/" source="CVE"/>
		<reference ref_id="CVE-2020-16028" ref_url="https://www.suse.com/security/cve/CVE-2020-16028/" source="CVE"/>
		<reference ref_id="CVE-2020-16029" ref_url="https://www.suse.com/security/cve/CVE-2020-16029/" source="CVE"/>
		<reference ref_id="CVE-2020-16030" ref_url="https://www.suse.com/security/cve/CVE-2020-16030/" source="CVE"/>
		<reference ref_id="CVE-2020-16031" ref_url="https://www.suse.com/security/cve/CVE-2020-16031/" source="CVE"/>
		<reference ref_id="CVE-2020-16032" ref_url="https://www.suse.com/security/cve/CVE-2020-16032/" source="CVE"/>
		<reference ref_id="CVE-2020-16033" ref_url="https://www.suse.com/security/cve/CVE-2020-16033/" source="CVE"/>
		<reference ref_id="CVE-2020-16034" ref_url="https://www.suse.com/security/cve/CVE-2020-16034/" source="CVE"/>
		<reference ref_id="CVE-2020-16035" ref_url="https://www.suse.com/security/cve/CVE-2020-16035/" source="CVE"/>
		<reference ref_id="CVE-2020-16036" ref_url="https://www.suse.com/security/cve/CVE-2020-16036/" source="CVE"/>
		<reference ref_id="CVE-2020-16037" ref_url="https://www.suse.com/security/cve/CVE-2020-16037/" source="CVE"/>
		<reference ref_id="CVE-2020-16038" ref_url="https://www.suse.com/security/cve/CVE-2020-16038/" source="CVE"/>
		<reference ref_id="CVE-2020-16039" ref_url="https://www.suse.com/security/cve/CVE-2020-16039/" source="CVE"/>
		<reference ref_id="CVE-2020-16040" ref_url="https://www.suse.com/security/cve/CVE-2020-16040/" source="CVE"/>
		<reference ref_id="CVE-2020-16041" ref_url="https://www.suse.com/security/cve/CVE-2020-16041/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16043" ref_url="https://www.suse.com/security/cve/CVE-2020-16043/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-27844" ref_url="https://www.suse.com/security/cve/CVE-2020-27844/" source="CVE"/>
		<reference ref_id="CVE-2020-6377" ref_url="https://www.suse.com/security/cve/CVE-2020-6377/" source="CVE"/>
		<reference ref_id="CVE-2020-6378" ref_url="https://www.suse.com/security/cve/CVE-2020-6378/" source="CVE"/>
		<reference ref_id="CVE-2020-6379" ref_url="https://www.suse.com/security/cve/CVE-2020-6379/" source="CVE"/>
		<reference ref_id="CVE-2020-6380" ref_url="https://www.suse.com/security/cve/CVE-2020-6380/" source="CVE"/>
		<reference ref_id="CVE-2020-6381" ref_url="https://www.suse.com/security/cve/CVE-2020-6381/" source="CVE"/>
		<reference ref_id="CVE-2020-6382" ref_url="https://www.suse.com/security/cve/CVE-2020-6382/" source="CVE"/>
		<reference ref_id="CVE-2020-6385" ref_url="https://www.suse.com/security/cve/CVE-2020-6385/" source="CVE"/>
		<reference ref_id="CVE-2020-6387" ref_url="https://www.suse.com/security/cve/CVE-2020-6387/" source="CVE"/>
		<reference ref_id="CVE-2020-6388" ref_url="https://www.suse.com/security/cve/CVE-2020-6388/" source="CVE"/>
		<reference ref_id="CVE-2020-6389" ref_url="https://www.suse.com/security/cve/CVE-2020-6389/" source="CVE"/>
		<reference ref_id="CVE-2020-6390" ref_url="https://www.suse.com/security/cve/CVE-2020-6390/" source="CVE"/>
		<reference ref_id="CVE-2020-6391" ref_url="https://www.suse.com/security/cve/CVE-2020-6391/" source="CVE"/>
		<reference ref_id="CVE-2020-6392" ref_url="https://www.suse.com/security/cve/CVE-2020-6392/" source="CVE"/>
		<reference ref_id="CVE-2020-6393" ref_url="https://www.suse.com/security/cve/CVE-2020-6393/" source="CVE"/>
		<reference ref_id="CVE-2020-6394" ref_url="https://www.suse.com/security/cve/CVE-2020-6394/" source="CVE"/>
		<reference ref_id="CVE-2020-6395" ref_url="https://www.suse.com/security/cve/CVE-2020-6395/" source="CVE"/>
		<reference ref_id="CVE-2020-6396" ref_url="https://www.suse.com/security/cve/CVE-2020-6396/" source="CVE"/>
		<reference ref_id="CVE-2020-6397" ref_url="https://www.suse.com/security/cve/CVE-2020-6397/" source="CVE"/>
		<reference ref_id="CVE-2020-6398" ref_url="https://www.suse.com/security/cve/CVE-2020-6398/" source="CVE"/>
		<reference ref_id="CVE-2020-6399" ref_url="https://www.suse.com/security/cve/CVE-2020-6399/" source="CVE"/>
		<reference ref_id="CVE-2020-6400" ref_url="https://www.suse.com/security/cve/CVE-2020-6400/" source="CVE"/>
		<reference ref_id="CVE-2020-6401" ref_url="https://www.suse.com/security/cve/CVE-2020-6401/" source="CVE"/>
		<reference ref_id="CVE-2020-6402" ref_url="https://www.suse.com/security/cve/CVE-2020-6402/" source="CVE"/>
		<reference ref_id="CVE-2020-6403" ref_url="https://www.suse.com/security/cve/CVE-2020-6403/" source="CVE"/>
		<reference ref_id="CVE-2020-6404" ref_url="https://www.suse.com/security/cve/CVE-2020-6404/" source="CVE"/>
		<reference ref_id="CVE-2020-6405" ref_url="https://www.suse.com/security/cve/CVE-2020-6405/" source="CVE"/>
		<reference ref_id="CVE-2020-6406" ref_url="https://www.suse.com/security/cve/CVE-2020-6406/" source="CVE"/>
		<reference ref_id="CVE-2020-6407" ref_url="https://www.suse.com/security/cve/CVE-2020-6407/" source="CVE"/>
		<reference ref_id="CVE-2020-6408" ref_url="https://www.suse.com/security/cve/CVE-2020-6408/" source="CVE"/>
		<reference ref_id="CVE-2020-6409" ref_url="https://www.suse.com/security/cve/CVE-2020-6409/" source="CVE"/>
		<reference ref_id="CVE-2020-6410" ref_url="https://www.suse.com/security/cve/CVE-2020-6410/" source="CVE"/>
		<reference ref_id="CVE-2020-6411" ref_url="https://www.suse.com/security/cve/CVE-2020-6411/" source="CVE"/>
		<reference ref_id="CVE-2020-6412" ref_url="https://www.suse.com/security/cve/CVE-2020-6412/" source="CVE"/>
		<reference ref_id="CVE-2020-6413" ref_url="https://www.suse.com/security/cve/CVE-2020-6413/" source="CVE"/>
		<reference ref_id="CVE-2020-6414" ref_url="https://www.suse.com/security/cve/CVE-2020-6414/" source="CVE"/>
		<reference ref_id="CVE-2020-6415" ref_url="https://www.suse.com/security/cve/CVE-2020-6415/" source="CVE"/>
		<reference ref_id="CVE-2020-6416" ref_url="https://www.suse.com/security/cve/CVE-2020-6416/" source="CVE"/>
		<reference ref_id="CVE-2020-6417" ref_url="https://www.suse.com/security/cve/CVE-2020-6417/" source="CVE"/>
		<reference ref_id="CVE-2020-6418" ref_url="https://www.suse.com/security/cve/CVE-2020-6418/" source="CVE"/>
		<reference ref_id="CVE-2020-6420" ref_url="https://www.suse.com/security/cve/CVE-2020-6420/" source="CVE"/>
		<reference ref_id="CVE-2020-6422" ref_url="https://www.suse.com/security/cve/CVE-2020-6422/" source="CVE"/>
		<reference ref_id="CVE-2020-6423" ref_url="https://www.suse.com/security/cve/CVE-2020-6423/" source="CVE"/>
		<reference ref_id="CVE-2020-6424" ref_url="https://www.suse.com/security/cve/CVE-2020-6424/" source="CVE"/>
		<reference ref_id="CVE-2020-6425" ref_url="https://www.suse.com/security/cve/CVE-2020-6425/" source="CVE"/>
		<reference ref_id="CVE-2020-6426" ref_url="https://www.suse.com/security/cve/CVE-2020-6426/" source="CVE"/>
		<reference ref_id="CVE-2020-6427" ref_url="https://www.suse.com/security/cve/CVE-2020-6427/" source="CVE"/>
		<reference ref_id="CVE-2020-6428" ref_url="https://www.suse.com/security/cve/CVE-2020-6428/" source="CVE"/>
		<reference ref_id="CVE-2020-6429" ref_url="https://www.suse.com/security/cve/CVE-2020-6429/" source="CVE"/>
		<reference ref_id="CVE-2020-6430" ref_url="https://www.suse.com/security/cve/CVE-2020-6430/" source="CVE"/>
		<reference ref_id="CVE-2020-6431" ref_url="https://www.suse.com/security/cve/CVE-2020-6431/" source="CVE"/>
		<reference ref_id="CVE-2020-6432" ref_url="https://www.suse.com/security/cve/CVE-2020-6432/" source="CVE"/>
		<reference ref_id="CVE-2020-6433" ref_url="https://www.suse.com/security/cve/CVE-2020-6433/" source="CVE"/>
		<reference ref_id="CVE-2020-6434" ref_url="https://www.suse.com/security/cve/CVE-2020-6434/" source="CVE"/>
		<reference ref_id="CVE-2020-6435" ref_url="https://www.suse.com/security/cve/CVE-2020-6435/" source="CVE"/>
		<reference ref_id="CVE-2020-6436" ref_url="https://www.suse.com/security/cve/CVE-2020-6436/" source="CVE"/>
		<reference ref_id="CVE-2020-6437" ref_url="https://www.suse.com/security/cve/CVE-2020-6437/" source="CVE"/>
		<reference ref_id="CVE-2020-6438" ref_url="https://www.suse.com/security/cve/CVE-2020-6438/" source="CVE"/>
		<reference ref_id="CVE-2020-6439" ref_url="https://www.suse.com/security/cve/CVE-2020-6439/" source="CVE"/>
		<reference ref_id="CVE-2020-6440" ref_url="https://www.suse.com/security/cve/CVE-2020-6440/" source="CVE"/>
		<reference ref_id="CVE-2020-6441" ref_url="https://www.suse.com/security/cve/CVE-2020-6441/" source="CVE"/>
		<reference ref_id="CVE-2020-6442" ref_url="https://www.suse.com/security/cve/CVE-2020-6442/" source="CVE"/>
		<reference ref_id="CVE-2020-6443" ref_url="https://www.suse.com/security/cve/CVE-2020-6443/" source="CVE"/>
		<reference ref_id="CVE-2020-6444" ref_url="https://www.suse.com/security/cve/CVE-2020-6444/" source="CVE"/>
		<reference ref_id="CVE-2020-6445" ref_url="https://www.suse.com/security/cve/CVE-2020-6445/" source="CVE"/>
		<reference ref_id="CVE-2020-6446" ref_url="https://www.suse.com/security/cve/CVE-2020-6446/" source="CVE"/>
		<reference ref_id="CVE-2020-6447" ref_url="https://www.suse.com/security/cve/CVE-2020-6447/" source="CVE"/>
		<reference ref_id="CVE-2020-6448" ref_url="https://www.suse.com/security/cve/CVE-2020-6448/" source="CVE"/>
		<reference ref_id="CVE-2020-6449" ref_url="https://www.suse.com/security/cve/CVE-2020-6449/" source="CVE"/>
		<reference ref_id="CVE-2020-6450" ref_url="https://www.suse.com/security/cve/CVE-2020-6450/" source="CVE"/>
		<reference ref_id="CVE-2020-6451" ref_url="https://www.suse.com/security/cve/CVE-2020-6451/" source="CVE"/>
		<reference ref_id="CVE-2020-6452" ref_url="https://www.suse.com/security/cve/CVE-2020-6452/" source="CVE"/>
		<reference ref_id="CVE-2020-6454" ref_url="https://www.suse.com/security/cve/CVE-2020-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-6455" ref_url="https://www.suse.com/security/cve/CVE-2020-6455/" source="CVE"/>
		<reference ref_id="CVE-2020-6456" ref_url="https://www.suse.com/security/cve/CVE-2020-6456/" source="CVE"/>
		<reference ref_id="CVE-2020-6457" ref_url="https://www.suse.com/security/cve/CVE-2020-6457/" source="CVE"/>
		<reference ref_id="CVE-2020-6458" ref_url="https://www.suse.com/security/cve/CVE-2020-6458/" source="CVE"/>
		<reference ref_id="CVE-2020-6459" ref_url="https://www.suse.com/security/cve/CVE-2020-6459/" source="CVE"/>
		<reference ref_id="CVE-2020-6460" ref_url="https://www.suse.com/security/cve/CVE-2020-6460/" source="CVE"/>
		<reference ref_id="CVE-2020-6462" ref_url="https://www.suse.com/security/cve/CVE-2020-6462/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6464" ref_url="https://www.suse.com/security/cve/CVE-2020-6464/" source="CVE"/>
		<reference ref_id="CVE-2020-6465" ref_url="https://www.suse.com/security/cve/CVE-2020-6465/" source="CVE"/>
		<reference ref_id="CVE-2020-6466" ref_url="https://www.suse.com/security/cve/CVE-2020-6466/" source="CVE"/>
		<reference ref_id="CVE-2020-6467" ref_url="https://www.suse.com/security/cve/CVE-2020-6467/" source="CVE"/>
		<reference ref_id="CVE-2020-6468" ref_url="https://www.suse.com/security/cve/CVE-2020-6468/" source="CVE"/>
		<reference ref_id="CVE-2020-6469" ref_url="https://www.suse.com/security/cve/CVE-2020-6469/" source="CVE"/>
		<reference ref_id="CVE-2020-6470" ref_url="https://www.suse.com/security/cve/CVE-2020-6470/" source="CVE"/>
		<reference ref_id="CVE-2020-6471" ref_url="https://www.suse.com/security/cve/CVE-2020-6471/" source="CVE"/>
		<reference ref_id="CVE-2020-6472" ref_url="https://www.suse.com/security/cve/CVE-2020-6472/" source="CVE"/>
		<reference ref_id="CVE-2020-6473" ref_url="https://www.suse.com/security/cve/CVE-2020-6473/" source="CVE"/>
		<reference ref_id="CVE-2020-6474" ref_url="https://www.suse.com/security/cve/CVE-2020-6474/" source="CVE"/>
		<reference ref_id="CVE-2020-6475" ref_url="https://www.suse.com/security/cve/CVE-2020-6475/" source="CVE"/>
		<reference ref_id="CVE-2020-6476" ref_url="https://www.suse.com/security/cve/CVE-2020-6476/" source="CVE"/>
		<reference ref_id="CVE-2020-6477" ref_url="https://www.suse.com/security/cve/CVE-2020-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-6478" ref_url="https://www.suse.com/security/cve/CVE-2020-6478/" source="CVE"/>
		<reference ref_id="CVE-2020-6479" ref_url="https://www.suse.com/security/cve/CVE-2020-6479/" source="CVE"/>
		<reference ref_id="CVE-2020-6480" ref_url="https://www.suse.com/security/cve/CVE-2020-6480/" source="CVE"/>
		<reference ref_id="CVE-2020-6481" ref_url="https://www.suse.com/security/cve/CVE-2020-6481/" source="CVE"/>
		<reference ref_id="CVE-2020-6482" ref_url="https://www.suse.com/security/cve/CVE-2020-6482/" source="CVE"/>
		<reference ref_id="CVE-2020-6483" ref_url="https://www.suse.com/security/cve/CVE-2020-6483/" source="CVE"/>
		<reference ref_id="CVE-2020-6484" ref_url="https://www.suse.com/security/cve/CVE-2020-6484/" source="CVE"/>
		<reference ref_id="CVE-2020-6485" ref_url="https://www.suse.com/security/cve/CVE-2020-6485/" source="CVE"/>
		<reference ref_id="CVE-2020-6486" ref_url="https://www.suse.com/security/cve/CVE-2020-6486/" source="CVE"/>
		<reference ref_id="CVE-2020-6487" ref_url="https://www.suse.com/security/cve/CVE-2020-6487/" source="CVE"/>
		<reference ref_id="CVE-2020-6488" ref_url="https://www.suse.com/security/cve/CVE-2020-6488/" source="CVE"/>
		<reference ref_id="CVE-2020-6489" ref_url="https://www.suse.com/security/cve/CVE-2020-6489/" source="CVE"/>
		<reference ref_id="CVE-2020-6490" ref_url="https://www.suse.com/security/cve/CVE-2020-6490/" source="CVE"/>
		<reference ref_id="CVE-2020-6491" ref_url="https://www.suse.com/security/cve/CVE-2020-6491/" source="CVE"/>
		<reference ref_id="CVE-2020-6493" ref_url="https://www.suse.com/security/cve/CVE-2020-6493/" source="CVE"/>
		<reference ref_id="CVE-2020-6494" ref_url="https://www.suse.com/security/cve/CVE-2020-6494/" source="CVE"/>
		<reference ref_id="CVE-2020-6495" ref_url="https://www.suse.com/security/cve/CVE-2020-6495/" source="CVE"/>
		<reference ref_id="CVE-2020-6496" ref_url="https://www.suse.com/security/cve/CVE-2020-6496/" source="CVE"/>
		<reference ref_id="CVE-2020-6505" ref_url="https://www.suse.com/security/cve/CVE-2020-6505/" source="CVE"/>
		<reference ref_id="CVE-2020-6506" ref_url="https://www.suse.com/security/cve/CVE-2020-6506/" source="CVE"/>
		<reference ref_id="CVE-2020-6507" ref_url="https://www.suse.com/security/cve/CVE-2020-6507/" source="CVE"/>
		<reference ref_id="CVE-2020-6509" ref_url="https://www.suse.com/security/cve/CVE-2020-6509/" source="CVE"/>
		<reference ref_id="CVE-2020-6510" ref_url="https://www.suse.com/security/cve/CVE-2020-6510/" source="CVE"/>
		<reference ref_id="CVE-2020-6511" ref_url="https://www.suse.com/security/cve/CVE-2020-6511/" source="CVE"/>
		<reference ref_id="CVE-2020-6512" ref_url="https://www.suse.com/security/cve/CVE-2020-6512/" source="CVE"/>
		<reference ref_id="CVE-2020-6513" ref_url="https://www.suse.com/security/cve/CVE-2020-6513/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6515" ref_url="https://www.suse.com/security/cve/CVE-2020-6515/" source="CVE"/>
		<reference ref_id="CVE-2020-6516" ref_url="https://www.suse.com/security/cve/CVE-2020-6516/" source="CVE"/>
		<reference ref_id="CVE-2020-6517" ref_url="https://www.suse.com/security/cve/CVE-2020-6517/" source="CVE"/>
		<reference ref_id="CVE-2020-6518" ref_url="https://www.suse.com/security/cve/CVE-2020-6518/" source="CVE"/>
		<reference ref_id="CVE-2020-6519" ref_url="https://www.suse.com/security/cve/CVE-2020-6519/" source="CVE"/>
		<reference ref_id="CVE-2020-6520" ref_url="https://www.suse.com/security/cve/CVE-2020-6520/" source="CVE"/>
		<reference ref_id="CVE-2020-6521" ref_url="https://www.suse.com/security/cve/CVE-2020-6521/" source="CVE"/>
		<reference ref_id="CVE-2020-6522" ref_url="https://www.suse.com/security/cve/CVE-2020-6522/" source="CVE"/>
		<reference ref_id="CVE-2020-6523" ref_url="https://www.suse.com/security/cve/CVE-2020-6523/" source="CVE"/>
		<reference ref_id="CVE-2020-6524" ref_url="https://www.suse.com/security/cve/CVE-2020-6524/" source="CVE"/>
		<reference ref_id="CVE-2020-6525" ref_url="https://www.suse.com/security/cve/CVE-2020-6525/" source="CVE"/>
		<reference ref_id="CVE-2020-6526" ref_url="https://www.suse.com/security/cve/CVE-2020-6526/" source="CVE"/>
		<reference ref_id="CVE-2020-6527" ref_url="https://www.suse.com/security/cve/CVE-2020-6527/" source="CVE"/>
		<reference ref_id="CVE-2020-6528" ref_url="https://www.suse.com/security/cve/CVE-2020-6528/" source="CVE"/>
		<reference ref_id="CVE-2020-6529" ref_url="https://www.suse.com/security/cve/CVE-2020-6529/" source="CVE"/>
		<reference ref_id="CVE-2020-6530" ref_url="https://www.suse.com/security/cve/CVE-2020-6530/" source="CVE"/>
		<reference ref_id="CVE-2020-6531" ref_url="https://www.suse.com/security/cve/CVE-2020-6531/" source="CVE"/>
		<reference ref_id="CVE-2020-6532" ref_url="https://www.suse.com/security/cve/CVE-2020-6532/" source="CVE"/>
		<reference ref_id="CVE-2020-6533" ref_url="https://www.suse.com/security/cve/CVE-2020-6533/" source="CVE"/>
		<reference ref_id="CVE-2020-6534" ref_url="https://www.suse.com/security/cve/CVE-2020-6534/" source="CVE"/>
		<reference ref_id="CVE-2020-6535" ref_url="https://www.suse.com/security/cve/CVE-2020-6535/" source="CVE"/>
		<reference ref_id="CVE-2020-6536" ref_url="https://www.suse.com/security/cve/CVE-2020-6536/" source="CVE"/>
		<reference ref_id="CVE-2020-6537" ref_url="https://www.suse.com/security/cve/CVE-2020-6537/" source="CVE"/>
		<reference ref_id="CVE-2020-6538" ref_url="https://www.suse.com/security/cve/CVE-2020-6538/" source="CVE"/>
		<reference ref_id="CVE-2020-6539" ref_url="https://www.suse.com/security/cve/CVE-2020-6539/" source="CVE"/>
		<reference ref_id="CVE-2020-6540" ref_url="https://www.suse.com/security/cve/CVE-2020-6540/" source="CVE"/>
		<reference ref_id="CVE-2020-6541" ref_url="https://www.suse.com/security/cve/CVE-2020-6541/" source="CVE"/>
		<reference ref_id="CVE-2020-6542" ref_url="https://www.suse.com/security/cve/CVE-2020-6542/" source="CVE"/>
		<reference ref_id="CVE-2020-6543" ref_url="https://www.suse.com/security/cve/CVE-2020-6543/" source="CVE"/>
		<reference ref_id="CVE-2020-6544" ref_url="https://www.suse.com/security/cve/CVE-2020-6544/" source="CVE"/>
		<reference ref_id="CVE-2020-6545" ref_url="https://www.suse.com/security/cve/CVE-2020-6545/" source="CVE"/>
		<reference ref_id="CVE-2020-6546" ref_url="https://www.suse.com/security/cve/CVE-2020-6546/" source="CVE"/>
		<reference ref_id="CVE-2020-6547" ref_url="https://www.suse.com/security/cve/CVE-2020-6547/" source="CVE"/>
		<reference ref_id="CVE-2020-6548" ref_url="https://www.suse.com/security/cve/CVE-2020-6548/" source="CVE"/>
		<reference ref_id="CVE-2020-6549" ref_url="https://www.suse.com/security/cve/CVE-2020-6549/" source="CVE"/>
		<reference ref_id="CVE-2020-6550" ref_url="https://www.suse.com/security/cve/CVE-2020-6550/" source="CVE"/>
		<reference ref_id="CVE-2020-6551" ref_url="https://www.suse.com/security/cve/CVE-2020-6551/" source="CVE"/>
		<reference ref_id="CVE-2020-6552" ref_url="https://www.suse.com/security/cve/CVE-2020-6552/" source="CVE"/>
		<reference ref_id="CVE-2020-6553" ref_url="https://www.suse.com/security/cve/CVE-2020-6553/" source="CVE"/>
		<reference ref_id="CVE-2020-6554" ref_url="https://www.suse.com/security/cve/CVE-2020-6554/" source="CVE"/>
		<reference ref_id="CVE-2020-6555" ref_url="https://www.suse.com/security/cve/CVE-2020-6555/" source="CVE"/>
		<reference ref_id="CVE-2020-6556" ref_url="https://www.suse.com/security/cve/CVE-2020-6556/" source="CVE"/>
		<reference ref_id="CVE-2020-6557" ref_url="https://www.suse.com/security/cve/CVE-2020-6557/" source="CVE"/>
		<reference ref_id="CVE-2020-6558" ref_url="https://www.suse.com/security/cve/CVE-2020-6558/" source="CVE"/>
		<reference ref_id="CVE-2020-6559" ref_url="https://www.suse.com/security/cve/CVE-2020-6559/" source="CVE"/>
		<reference ref_id="CVE-2020-6560" ref_url="https://www.suse.com/security/cve/CVE-2020-6560/" source="CVE"/>
		<reference ref_id="CVE-2020-6561" ref_url="https://www.suse.com/security/cve/CVE-2020-6561/" source="CVE"/>
		<reference ref_id="CVE-2020-6562" ref_url="https://www.suse.com/security/cve/CVE-2020-6562/" source="CVE"/>
		<reference ref_id="CVE-2020-6563" ref_url="https://www.suse.com/security/cve/CVE-2020-6563/" source="CVE"/>
		<reference ref_id="CVE-2020-6564" ref_url="https://www.suse.com/security/cve/CVE-2020-6564/" source="CVE"/>
		<reference ref_id="CVE-2020-6565" ref_url="https://www.suse.com/security/cve/CVE-2020-6565/" source="CVE"/>
		<reference ref_id="CVE-2020-6566" ref_url="https://www.suse.com/security/cve/CVE-2020-6566/" source="CVE"/>
		<reference ref_id="CVE-2020-6567" ref_url="https://www.suse.com/security/cve/CVE-2020-6567/" source="CVE"/>
		<reference ref_id="CVE-2020-6568" ref_url="https://www.suse.com/security/cve/CVE-2020-6568/" source="CVE"/>
		<reference ref_id="CVE-2020-6569" ref_url="https://www.suse.com/security/cve/CVE-2020-6569/" source="CVE"/>
		<reference ref_id="CVE-2020-6570" ref_url="https://www.suse.com/security/cve/CVE-2020-6570/" source="CVE"/>
		<reference ref_id="CVE-2020-6571" ref_url="https://www.suse.com/security/cve/CVE-2020-6571/" source="CVE"/>
		<reference ref_id="CVE-2020-6573" ref_url="https://www.suse.com/security/cve/CVE-2020-6573/" source="CVE"/>
		<reference ref_id="CVE-2020-6574" ref_url="https://www.suse.com/security/cve/CVE-2020-6574/" source="CVE"/>
		<reference ref_id="CVE-2020-6575" ref_url="https://www.suse.com/security/cve/CVE-2020-6575/" source="CVE"/>
		<reference ref_id="CVE-2020-6576" ref_url="https://www.suse.com/security/cve/CVE-2020-6576/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-21106" ref_url="https://www.suse.com/security/cve/CVE-2021-21106/" source="CVE"/>
		<reference ref_id="CVE-2021-21107" ref_url="https://www.suse.com/security/cve/CVE-2021-21107/" source="CVE"/>
		<reference ref_id="CVE-2021-21108" ref_url="https://www.suse.com/security/cve/CVE-2021-21108/" source="CVE"/>
		<reference ref_id="CVE-2021-21109" ref_url="https://www.suse.com/security/cve/CVE-2021-21109/" source="CVE"/>
		<reference ref_id="CVE-2021-21110" ref_url="https://www.suse.com/security/cve/CVE-2021-21110/" source="CVE"/>
		<reference ref_id="CVE-2021-21111" ref_url="https://www.suse.com/security/cve/CVE-2021-21111/" source="CVE"/>
		<reference ref_id="CVE-2021-21112" ref_url="https://www.suse.com/security/cve/CVE-2021-21112/" source="CVE"/>
		<reference ref_id="CVE-2021-21113" ref_url="https://www.suse.com/security/cve/CVE-2021-21113/" source="CVE"/>
		<reference ref_id="CVE-2021-21114" ref_url="https://www.suse.com/security/cve/CVE-2021-21114/" source="CVE"/>
		<reference ref_id="CVE-2021-21115" ref_url="https://www.suse.com/security/cve/CVE-2021-21115/" source="CVE"/>
		<reference ref_id="CVE-2021-21116" ref_url="https://www.suse.com/security/cve/CVE-2021-21116/" source="CVE"/>
		<reference ref_id="CVE-2021-21117" ref_url="https://www.suse.com/security/cve/CVE-2021-21117/" source="CVE"/>
		<reference ref_id="CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118/" source="CVE"/>
		<reference ref_id="CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119/" source="CVE"/>
		<reference ref_id="CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120/" source="CVE"/>
		<reference ref_id="CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121/" source="CVE"/>
		<reference ref_id="CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122/" source="CVE"/>
		<reference ref_id="CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123/" source="CVE"/>
		<reference ref_id="CVE-2021-21124" ref_url="https://www.suse.com/security/cve/CVE-2021-21124/" source="CVE"/>
		<reference ref_id="CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125/" source="CVE"/>
		<reference ref_id="CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126/" source="CVE"/>
		<reference ref_id="CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127/" source="CVE"/>
		<reference ref_id="CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128/" source="CVE"/>
		<reference ref_id="CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129/" source="CVE"/>
		<reference ref_id="CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130/" source="CVE"/>
		<reference ref_id="CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131/" source="CVE"/>
		<reference ref_id="CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132/" source="CVE"/>
		<reference ref_id="CVE-2021-21133" ref_url="https://www.suse.com/security/cve/CVE-2021-21133/" source="CVE"/>
		<reference ref_id="CVE-2021-21134" ref_url="https://www.suse.com/security/cve/CVE-2021-21134/" source="CVE"/>
		<reference ref_id="CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135/" source="CVE"/>
		<reference ref_id="CVE-2021-21136" ref_url="https://www.suse.com/security/cve/CVE-2021-21136/" source="CVE"/>
		<reference ref_id="CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137/" source="CVE"/>
		<reference ref_id="CVE-2021-21138" ref_url="https://www.suse.com/security/cve/CVE-2021-21138/" source="CVE"/>
		<reference ref_id="CVE-2021-21139" ref_url="https://www.suse.com/security/cve/CVE-2021-21139/" source="CVE"/>
		<reference ref_id="CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140/" source="CVE"/>
		<reference ref_id="CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141/" source="CVE"/>
		<reference ref_id="CVE-2021-21142" ref_url="https://www.suse.com/security/cve/CVE-2021-21142/" source="CVE"/>
		<reference ref_id="CVE-2021-21143" ref_url="https://www.suse.com/security/cve/CVE-2021-21143/" source="CVE"/>
		<reference ref_id="CVE-2021-21144" ref_url="https://www.suse.com/security/cve/CVE-2021-21144/" source="CVE"/>
		<reference ref_id="CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145/" source="CVE"/>
		<reference ref_id="CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146/" source="CVE"/>
		<reference ref_id="CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149/" source="CVE"/>
		<reference ref_id="CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150/" source="CVE"/>
		<reference ref_id="CVE-2021-21151" ref_url="https://www.suse.com/security/cve/CVE-2021-21151/" source="CVE"/>
		<reference ref_id="CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152/" source="CVE"/>
		<reference ref_id="CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153/" source="CVE"/>
		<reference ref_id="CVE-2021-21154" ref_url="https://www.suse.com/security/cve/CVE-2021-21154/" source="CVE"/>
		<reference ref_id="CVE-2021-21155" ref_url="https://www.suse.com/security/cve/CVE-2021-21155/" source="CVE"/>
		<reference ref_id="CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156/" source="CVE"/>
		<reference ref_id="CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157/" source="CVE"/>
		<reference ref_id="CVE-2021-21159" ref_url="https://www.suse.com/security/cve/CVE-2021-21159/" source="CVE"/>
		<reference ref_id="CVE-2021-21160" ref_url="https://www.suse.com/security/cve/CVE-2021-21160/" source="CVE"/>
		<reference ref_id="CVE-2021-21161" ref_url="https://www.suse.com/security/cve/CVE-2021-21161/" source="CVE"/>
		<reference ref_id="CVE-2021-21162" ref_url="https://www.suse.com/security/cve/CVE-2021-21162/" source="CVE"/>
		<reference ref_id="CVE-2021-21163" ref_url="https://www.suse.com/security/cve/CVE-2021-21163/" source="CVE"/>
		<reference ref_id="CVE-2021-21164" ref_url="https://www.suse.com/security/cve/CVE-2021-21164/" source="CVE"/>
		<reference ref_id="CVE-2021-21165" ref_url="https://www.suse.com/security/cve/CVE-2021-21165/" source="CVE"/>
		<reference ref_id="CVE-2021-21166" ref_url="https://www.suse.com/security/cve/CVE-2021-21166/" source="CVE"/>
		<reference ref_id="CVE-2021-21167" ref_url="https://www.suse.com/security/cve/CVE-2021-21167/" source="CVE"/>
		<reference ref_id="CVE-2021-21168" ref_url="https://www.suse.com/security/cve/CVE-2021-21168/" source="CVE"/>
		<reference ref_id="CVE-2021-21169" ref_url="https://www.suse.com/security/cve/CVE-2021-21169/" source="CVE"/>
		<reference ref_id="CVE-2021-21170" ref_url="https://www.suse.com/security/cve/CVE-2021-21170/" source="CVE"/>
		<reference ref_id="CVE-2021-21171" ref_url="https://www.suse.com/security/cve/CVE-2021-21171/" source="CVE"/>
		<reference ref_id="CVE-2021-21172" ref_url="https://www.suse.com/security/cve/CVE-2021-21172/" source="CVE"/>
		<reference ref_id="CVE-2021-21173" ref_url="https://www.suse.com/security/cve/CVE-2021-21173/" source="CVE"/>
		<reference ref_id="CVE-2021-21174" ref_url="https://www.suse.com/security/cve/CVE-2021-21174/" source="CVE"/>
		<reference ref_id="CVE-2021-21175" ref_url="https://www.suse.com/security/cve/CVE-2021-21175/" source="CVE"/>
		<reference ref_id="CVE-2021-21176" ref_url="https://www.suse.com/security/cve/CVE-2021-21176/" source="CVE"/>
		<reference ref_id="CVE-2021-21177" ref_url="https://www.suse.com/security/cve/CVE-2021-21177/" source="CVE"/>
		<reference ref_id="CVE-2021-21178" ref_url="https://www.suse.com/security/cve/CVE-2021-21178/" source="CVE"/>
		<reference ref_id="CVE-2021-21179" ref_url="https://www.suse.com/security/cve/CVE-2021-21179/" source="CVE"/>
		<reference ref_id="CVE-2021-21180" ref_url="https://www.suse.com/security/cve/CVE-2021-21180/" source="CVE"/>
		<reference ref_id="CVE-2021-21181" ref_url="https://www.suse.com/security/cve/CVE-2021-21181/" source="CVE"/>
		<reference ref_id="CVE-2021-21182" ref_url="https://www.suse.com/security/cve/CVE-2021-21182/" source="CVE"/>
		<reference ref_id="CVE-2021-21183" ref_url="https://www.suse.com/security/cve/CVE-2021-21183/" source="CVE"/>
		<reference ref_id="CVE-2021-21184" ref_url="https://www.suse.com/security/cve/CVE-2021-21184/" source="CVE"/>
		<reference ref_id="CVE-2021-21185" ref_url="https://www.suse.com/security/cve/CVE-2021-21185/" source="CVE"/>
		<reference ref_id="CVE-2021-21186" ref_url="https://www.suse.com/security/cve/CVE-2021-21186/" source="CVE"/>
		<reference ref_id="CVE-2021-21187" ref_url="https://www.suse.com/security/cve/CVE-2021-21187/" source="CVE"/>
		<reference ref_id="CVE-2021-21188" ref_url="https://www.suse.com/security/cve/CVE-2021-21188/" source="CVE"/>
		<reference ref_id="CVE-2021-21189" ref_url="https://www.suse.com/security/cve/CVE-2021-21189/" source="CVE"/>
		<reference ref_id="CVE-2021-21190" ref_url="https://www.suse.com/security/cve/CVE-2021-21190/" source="CVE"/>
		<reference ref_id="CVE-2021-21191" ref_url="https://www.suse.com/security/cve/CVE-2021-21191/" source="CVE"/>
		<reference ref_id="CVE-2021-21192" ref_url="https://www.suse.com/security/cve/CVE-2021-21192/" source="CVE"/>
		<reference ref_id="CVE-2021-21193" ref_url="https://www.suse.com/security/cve/CVE-2021-21193/" source="CVE"/>
		<reference ref_id="CVE-2021-21194" ref_url="https://www.suse.com/security/cve/CVE-2021-21194/" source="CVE"/>
		<reference ref_id="CVE-2021-21195" ref_url="https://www.suse.com/security/cve/CVE-2021-21195/" source="CVE"/>
		<reference ref_id="CVE-2021-21196" ref_url="https://www.suse.com/security/cve/CVE-2021-21196/" source="CVE"/>
		<reference ref_id="CVE-2021-21197" ref_url="https://www.suse.com/security/cve/CVE-2021-21197/" source="CVE"/>
		<reference ref_id="CVE-2021-21198" ref_url="https://www.suse.com/security/cve/CVE-2021-21198/" source="CVE"/>
		<reference ref_id="CVE-2021-21199" ref_url="https://www.suse.com/security/cve/CVE-2021-21199/" source="CVE"/>
		<reference ref_id="CVE-2021-21201" ref_url="https://www.suse.com/security/cve/CVE-2021-21201/" source="CVE"/>
		<reference ref_id="CVE-2021-21202" ref_url="https://www.suse.com/security/cve/CVE-2021-21202/" source="CVE"/>
		<reference ref_id="CVE-2021-21203" ref_url="https://www.suse.com/security/cve/CVE-2021-21203/" source="CVE"/>
		<reference ref_id="CVE-2021-21204" ref_url="https://www.suse.com/security/cve/CVE-2021-21204/" source="CVE"/>
		<reference ref_id="CVE-2021-21205" ref_url="https://www.suse.com/security/cve/CVE-2021-21205/" source="CVE"/>
		<reference ref_id="CVE-2021-21206" ref_url="https://www.suse.com/security/cve/CVE-2021-21206/" source="CVE"/>
		<reference ref_id="CVE-2021-21207" ref_url="https://www.suse.com/security/cve/CVE-2021-21207/" source="CVE"/>
		<reference ref_id="CVE-2021-21208" ref_url="https://www.suse.com/security/cve/CVE-2021-21208/" source="CVE"/>
		<reference ref_id="CVE-2021-21209" ref_url="https://www.suse.com/security/cve/CVE-2021-21209/" source="CVE"/>
		<reference ref_id="CVE-2021-21210" ref_url="https://www.suse.com/security/cve/CVE-2021-21210/" source="CVE"/>
		<reference ref_id="CVE-2021-21211" ref_url="https://www.suse.com/security/cve/CVE-2021-21211/" source="CVE"/>
		<reference ref_id="CVE-2021-21212" ref_url="https://www.suse.com/security/cve/CVE-2021-21212/" source="CVE"/>
		<reference ref_id="CVE-2021-21213" ref_url="https://www.suse.com/security/cve/CVE-2021-21213/" source="CVE"/>
		<reference ref_id="CVE-2021-21214" ref_url="https://www.suse.com/security/cve/CVE-2021-21214/" source="CVE"/>
		<reference ref_id="CVE-2021-21215" ref_url="https://www.suse.com/security/cve/CVE-2021-21215/" source="CVE"/>
		<reference ref_id="CVE-2021-21216" ref_url="https://www.suse.com/security/cve/CVE-2021-21216/" source="CVE"/>
		<reference ref_id="CVE-2021-21217" ref_url="https://www.suse.com/security/cve/CVE-2021-21217/" source="CVE"/>
		<reference ref_id="CVE-2021-21218" ref_url="https://www.suse.com/security/cve/CVE-2021-21218/" source="CVE"/>
		<reference ref_id="CVE-2021-21219" ref_url="https://www.suse.com/security/cve/CVE-2021-21219/" source="CVE"/>
		<reference ref_id="CVE-2021-21220" ref_url="https://www.suse.com/security/cve/CVE-2021-21220/" source="CVE"/>
		<reference ref_id="CVE-2021-21221" ref_url="https://www.suse.com/security/cve/CVE-2021-21221/" source="CVE"/>
		<reference ref_id="CVE-2021-21222" ref_url="https://www.suse.com/security/cve/CVE-2021-21222/" source="CVE"/>
		<reference ref_id="CVE-2021-21223" ref_url="https://www.suse.com/security/cve/CVE-2021-21223/" source="CVE"/>
		<reference ref_id="CVE-2021-21224" ref_url="https://www.suse.com/security/cve/CVE-2021-21224/" source="CVE"/>
		<reference ref_id="CVE-2021-21225" ref_url="https://www.suse.com/security/cve/CVE-2021-21225/" source="CVE"/>
		<reference ref_id="CVE-2021-21226" ref_url="https://www.suse.com/security/cve/CVE-2021-21226/" source="CVE"/>
		<reference ref_id="CVE-2021-21227" ref_url="https://www.suse.com/security/cve/CVE-2021-21227/" source="CVE"/>
		<reference ref_id="CVE-2021-21228" ref_url="https://www.suse.com/security/cve/CVE-2021-21228/" source="CVE"/>
		<reference ref_id="CVE-2021-21229" ref_url="https://www.suse.com/security/cve/CVE-2021-21229/" source="CVE"/>
		<reference ref_id="CVE-2021-21230" ref_url="https://www.suse.com/security/cve/CVE-2021-21230/" source="CVE"/>
		<reference ref_id="CVE-2021-21231" ref_url="https://www.suse.com/security/cve/CVE-2021-21231/" source="CVE"/>
		<reference ref_id="CVE-2021-21232" ref_url="https://www.suse.com/security/cve/CVE-2021-21232/" source="CVE"/>
		<reference ref_id="CVE-2021-21233" ref_url="https://www.suse.com/security/cve/CVE-2021-21233/" source="CVE"/>
		<reference ref_id="CVE-2021-30506" ref_url="https://www.suse.com/security/cve/CVE-2021-30506/" source="CVE"/>
		<reference ref_id="CVE-2021-30507" ref_url="https://www.suse.com/security/cve/CVE-2021-30507/" source="CVE"/>
		<reference ref_id="CVE-2021-30508" ref_url="https://www.suse.com/security/cve/CVE-2021-30508/" source="CVE"/>
		<reference ref_id="CVE-2021-30509" ref_url="https://www.suse.com/security/cve/CVE-2021-30509/" source="CVE"/>
		<reference ref_id="CVE-2021-30510" ref_url="https://www.suse.com/security/cve/CVE-2021-30510/" source="CVE"/>
		<reference ref_id="CVE-2021-30511" ref_url="https://www.suse.com/security/cve/CVE-2021-30511/" source="CVE"/>
		<reference ref_id="CVE-2021-30512" ref_url="https://www.suse.com/security/cve/CVE-2021-30512/" source="CVE"/>
		<reference ref_id="CVE-2021-30513" ref_url="https://www.suse.com/security/cve/CVE-2021-30513/" source="CVE"/>
		<reference ref_id="CVE-2021-30514" ref_url="https://www.suse.com/security/cve/CVE-2021-30514/" source="CVE"/>
		<reference ref_id="CVE-2021-30515" ref_url="https://www.suse.com/security/cve/CVE-2021-30515/" source="CVE"/>
		<reference ref_id="CVE-2021-30516" ref_url="https://www.suse.com/security/cve/CVE-2021-30516/" source="CVE"/>
		<reference ref_id="CVE-2021-30517" ref_url="https://www.suse.com/security/cve/CVE-2021-30517/" source="CVE"/>
		<reference ref_id="CVE-2021-30518" ref_url="https://www.suse.com/security/cve/CVE-2021-30518/" source="CVE"/>
		<reference ref_id="CVE-2021-30519" ref_url="https://www.suse.com/security/cve/CVE-2021-30519/" source="CVE"/>
		<reference ref_id="CVE-2021-30520" ref_url="https://www.suse.com/security/cve/CVE-2021-30520/" source="CVE"/>
		<reference ref_id="CVE-2021-30521" ref_url="https://www.suse.com/security/cve/CVE-2021-30521/" source="CVE"/>
		<reference ref_id="CVE-2021-30522" ref_url="https://www.suse.com/security/cve/CVE-2021-30522/" source="CVE"/>
		<reference ref_id="CVE-2021-30523" ref_url="https://www.suse.com/security/cve/CVE-2021-30523/" source="CVE"/>
		<reference ref_id="CVE-2021-30524" ref_url="https://www.suse.com/security/cve/CVE-2021-30524/" source="CVE"/>
		<reference ref_id="CVE-2021-30525" ref_url="https://www.suse.com/security/cve/CVE-2021-30525/" source="CVE"/>
		<reference ref_id="CVE-2021-30526" ref_url="https://www.suse.com/security/cve/CVE-2021-30526/" source="CVE"/>
		<reference ref_id="CVE-2021-30527" ref_url="https://www.suse.com/security/cve/CVE-2021-30527/" source="CVE"/>
		<reference ref_id="CVE-2021-30528" ref_url="https://www.suse.com/security/cve/CVE-2021-30528/" source="CVE"/>
		<reference ref_id="CVE-2021-30529" ref_url="https://www.suse.com/security/cve/CVE-2021-30529/" source="CVE"/>
		<reference ref_id="CVE-2021-30530" ref_url="https://www.suse.com/security/cve/CVE-2021-30530/" source="CVE"/>
		<reference ref_id="CVE-2021-30531" ref_url="https://www.suse.com/security/cve/CVE-2021-30531/" source="CVE"/>
		<reference ref_id="CVE-2021-30532" ref_url="https://www.suse.com/security/cve/CVE-2021-30532/" source="CVE"/>
		<reference ref_id="CVE-2021-30533" ref_url="https://www.suse.com/security/cve/CVE-2021-30533/" source="CVE"/>
		<reference ref_id="CVE-2021-30534" ref_url="https://www.suse.com/security/cve/CVE-2021-30534/" source="CVE"/>
		<reference ref_id="CVE-2021-30535" ref_url="https://www.suse.com/security/cve/CVE-2021-30535/" source="CVE"/>
		<reference ref_id="CVE-2021-30536" ref_url="https://www.suse.com/security/cve/CVE-2021-30536/" source="CVE"/>
		<reference ref_id="CVE-2021-30537" ref_url="https://www.suse.com/security/cve/CVE-2021-30537/" source="CVE"/>
		<reference ref_id="CVE-2021-30538" ref_url="https://www.suse.com/security/cve/CVE-2021-30538/" source="CVE"/>
		<reference ref_id="CVE-2021-30539" ref_url="https://www.suse.com/security/cve/CVE-2021-30539/" source="CVE"/>
		<reference ref_id="CVE-2021-30540" ref_url="https://www.suse.com/security/cve/CVE-2021-30540/" source="CVE"/>
		<reference ref_id="CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541/" source="CVE"/>
		<reference ref_id="CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544/" source="CVE"/>
		<reference ref_id="CVE-2021-30545" ref_url="https://www.suse.com/security/cve/CVE-2021-30545/" source="CVE"/>
		<reference ref_id="CVE-2021-30546" ref_url="https://www.suse.com/security/cve/CVE-2021-30546/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548/" source="CVE"/>
		<reference ref_id="CVE-2021-30549" ref_url="https://www.suse.com/security/cve/CVE-2021-30549/" source="CVE"/>
		<reference ref_id="CVE-2021-30550" ref_url="https://www.suse.com/security/cve/CVE-2021-30550/" source="CVE"/>
		<reference ref_id="CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551/" source="CVE"/>
		<reference ref_id="CVE-2021-30552" ref_url="https://www.suse.com/security/cve/CVE-2021-30552/" source="CVE"/>
		<reference ref_id="CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553/" source="CVE"/>
		<reference ref_id="CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554/" source="CVE"/>
		<reference ref_id="CVE-2021-30555" ref_url="https://www.suse.com/security/cve/CVE-2021-30555/" source="CVE"/>
		<reference ref_id="CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556/" source="CVE"/>
		<reference ref_id="CVE-2021-30557" ref_url="https://www.suse.com/security/cve/CVE-2021-30557/" source="CVE"/>
		<reference ref_id="CVE-2021-30559" ref_url="https://www.suse.com/security/cve/CVE-2021-30559/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-30561" ref_url="https://www.suse.com/security/cve/CVE-2021-30561/" source="CVE"/>
		<reference ref_id="CVE-2021-30562" ref_url="https://www.suse.com/security/cve/CVE-2021-30562/" source="CVE"/>
		<reference ref_id="CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563/" source="CVE"/>
		<reference ref_id="CVE-2021-30564" ref_url="https://www.suse.com/security/cve/CVE-2021-30564/" source="CVE"/>
		<reference ref_id="CVE-2021-30565" ref_url="https://www.suse.com/security/cve/CVE-2021-30565/" source="CVE"/>
		<reference ref_id="CVE-2021-30566" ref_url="https://www.suse.com/security/cve/CVE-2021-30566/" source="CVE"/>
		<reference ref_id="CVE-2021-30567" ref_url="https://www.suse.com/security/cve/CVE-2021-30567/" source="CVE"/>
		<reference ref_id="CVE-2021-30568" ref_url="https://www.suse.com/security/cve/CVE-2021-30568/" source="CVE"/>
		<reference ref_id="CVE-2021-30569" ref_url="https://www.suse.com/security/cve/CVE-2021-30569/" source="CVE"/>
		<reference ref_id="CVE-2021-30571" ref_url="https://www.suse.com/security/cve/CVE-2021-30571/" source="CVE"/>
		<reference ref_id="CVE-2021-30572" ref_url="https://www.suse.com/security/cve/CVE-2021-30572/" source="CVE"/>
		<reference ref_id="CVE-2021-30573" ref_url="https://www.suse.com/security/cve/CVE-2021-30573/" source="CVE"/>
		<reference ref_id="CVE-2021-30574" ref_url="https://www.suse.com/security/cve/CVE-2021-30574/" source="CVE"/>
		<reference ref_id="CVE-2021-30575" ref_url="https://www.suse.com/security/cve/CVE-2021-30575/" source="CVE"/>
		<reference ref_id="CVE-2021-30576" ref_url="https://www.suse.com/security/cve/CVE-2021-30576/" source="CVE"/>
		<reference ref_id="CVE-2021-30577" ref_url="https://www.suse.com/security/cve/CVE-2021-30577/" source="CVE"/>
		<reference ref_id="CVE-2021-30578" ref_url="https://www.suse.com/security/cve/CVE-2021-30578/" source="CVE"/>
		<reference ref_id="CVE-2021-30579" ref_url="https://www.suse.com/security/cve/CVE-2021-30579/" source="CVE"/>
		<reference ref_id="CVE-2021-30581" ref_url="https://www.suse.com/security/cve/CVE-2021-30581/" source="CVE"/>
		<reference ref_id="CVE-2021-30582" ref_url="https://www.suse.com/security/cve/CVE-2021-30582/" source="CVE"/>
		<reference ref_id="CVE-2021-30584" ref_url="https://www.suse.com/security/cve/CVE-2021-30584/" source="CVE"/>
		<reference ref_id="CVE-2021-30585" ref_url="https://www.suse.com/security/cve/CVE-2021-30585/" source="CVE"/>
		<reference ref_id="CVE-2021-30588" ref_url="https://www.suse.com/security/cve/CVE-2021-30588/" source="CVE"/>
		<reference ref_id="CVE-2021-30589" ref_url="https://www.suse.com/security/cve/CVE-2021-30589/" source="CVE"/>
		<reference ref_id="CVE-2021-30590" ref_url="https://www.suse.com/security/cve/CVE-2021-30590/" source="CVE"/>
		<reference ref_id="CVE-2021-30591" ref_url="https://www.suse.com/security/cve/CVE-2021-30591/" source="CVE"/>
		<reference ref_id="CVE-2021-30592" ref_url="https://www.suse.com/security/cve/CVE-2021-30592/" source="CVE"/>
		<reference ref_id="CVE-2021-30593" ref_url="https://www.suse.com/security/cve/CVE-2021-30593/" source="CVE"/>
		<reference ref_id="CVE-2021-30594" ref_url="https://www.suse.com/security/cve/CVE-2021-30594/" source="CVE"/>
		<reference ref_id="CVE-2021-30596" ref_url="https://www.suse.com/security/cve/CVE-2021-30596/" source="CVE"/>
		<reference ref_id="CVE-2021-30597" ref_url="https://www.suse.com/security/cve/CVE-2021-30597/" source="CVE"/>
		<reference ref_id="CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598/" source="CVE"/>
		<reference ref_id="CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599/" source="CVE"/>
		<reference ref_id="CVE-2021-30600" ref_url="https://www.suse.com/security/cve/CVE-2021-30600/" source="CVE"/>
		<reference ref_id="CVE-2021-30601" ref_url="https://www.suse.com/security/cve/CVE-2021-30601/" source="CVE"/>
		<reference ref_id="CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602/" source="CVE"/>
		<reference ref_id="CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603/" source="CVE"/>
		<reference ref_id="CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604/" source="CVE"/>
		<reference ref_id="CVE-2021-30606" ref_url="https://www.suse.com/security/cve/CVE-2021-30606/" source="CVE"/>
		<reference ref_id="CVE-2021-30607" ref_url="https://www.suse.com/security/cve/CVE-2021-30607/" source="CVE"/>
		<reference ref_id="CVE-2021-30608" ref_url="https://www.suse.com/security/cve/CVE-2021-30608/" source="CVE"/>
		<reference ref_id="CVE-2021-30609" ref_url="https://www.suse.com/security/cve/CVE-2021-30609/" source="CVE"/>
		<reference ref_id="CVE-2021-30610" ref_url="https://www.suse.com/security/cve/CVE-2021-30610/" source="CVE"/>
		<reference ref_id="CVE-2021-30611" ref_url="https://www.suse.com/security/cve/CVE-2021-30611/" source="CVE"/>
		<reference ref_id="CVE-2021-30612" ref_url="https://www.suse.com/security/cve/CVE-2021-30612/" source="CVE"/>
		<reference ref_id="CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613/" source="CVE"/>
		<reference ref_id="CVE-2021-30614" ref_url="https://www.suse.com/security/cve/CVE-2021-30614/" source="CVE"/>
		<reference ref_id="CVE-2021-30615" ref_url="https://www.suse.com/security/cve/CVE-2021-30615/" source="CVE"/>
		<reference ref_id="CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616/" source="CVE"/>
		<reference ref_id="CVE-2021-30617" ref_url="https://www.suse.com/security/cve/CVE-2021-30617/" source="CVE"/>
		<reference ref_id="CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618/" source="CVE"/>
		<reference ref_id="CVE-2021-30619" ref_url="https://www.suse.com/security/cve/CVE-2021-30619/" source="CVE"/>
		<reference ref_id="CVE-2021-30620" ref_url="https://www.suse.com/security/cve/CVE-2021-30620/" source="CVE"/>
		<reference ref_id="CVE-2021-30621" ref_url="https://www.suse.com/security/cve/CVE-2021-30621/" source="CVE"/>
		<reference ref_id="CVE-2021-30622" ref_url="https://www.suse.com/security/cve/CVE-2021-30622/" source="CVE"/>
		<reference ref_id="CVE-2021-30623" ref_url="https://www.suse.com/security/cve/CVE-2021-30623/" source="CVE"/>
		<reference ref_id="CVE-2021-30624" ref_url="https://www.suse.com/security/cve/CVE-2021-30624/" source="CVE"/>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-93.0.4577.82-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11215/">CVE-2017-11215 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11215">CVE-2017-11215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11225/">CVE-2017-11225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11225">CVE-2017-11225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15386/">CVE-2017-15386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15386">CVE-2017-15386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15387/">CVE-2017-15387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15387">CVE-2017-15387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15388/">CVE-2017-15388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15388">CVE-2017-15388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15389/">CVE-2017-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15389">CVE-2017-15389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15390/">CVE-2017-15390 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15390">CVE-2017-15390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15391/">CVE-2017-15391 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15391">CVE-2017-15391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15392/">CVE-2017-15392 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15392">CVE-2017-15392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15393/">CVE-2017-15393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15393">CVE-2017-15393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15394/">CVE-2017-15394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15394">CVE-2017-15394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15395/">CVE-2017-15395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15395">CVE-2017-15395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15396/">CVE-2017-15396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15396">CVE-2017-15396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15398/">CVE-2017-15398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15398">CVE-2017-15398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15399/">CVE-2017-15399 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15399">CVE-2017-15399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15407/">CVE-2017-15407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15407">CVE-2017-15407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15408/">CVE-2017-15408 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15408">CVE-2017-15408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15409/">CVE-2017-15409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15409">CVE-2017-15409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15410/">CVE-2017-15410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15410">CVE-2017-15410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15411/">CVE-2017-15411 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15411">CVE-2017-15411 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15413/">CVE-2017-15413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15413">CVE-2017-15413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15415/">CVE-2017-15415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15415">CVE-2017-15415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15416/">CVE-2017-15416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15416">CVE-2017-15416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15417/">CVE-2017-15417 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15417">CVE-2017-15417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15418/">CVE-2017-15418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15418">CVE-2017-15418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15419/">CVE-2017-15419 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15419">CVE-2017-15419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15420/">CVE-2017-15420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15420">CVE-2017-15420 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15423/">CVE-2017-15423 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15423">CVE-2017-15423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15424/">CVE-2017-15424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15424">CVE-2017-15424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15425/">CVE-2017-15425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15425">CVE-2017-15425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15426/">CVE-2017-15426 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15426">CVE-2017-15426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15427/">CVE-2017-15427 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15427">CVE-2017-15427 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15429/">CVE-2017-15429 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15429">CVE-2017-15429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15430/">CVE-2017-15430 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15430">CVE-2017-15430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5006/">CVE-2017-5006 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5006">CVE-2017-5006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5007/">CVE-2017-5007 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5007">CVE-2017-5007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5008/">CVE-2017-5008 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5008">CVE-2017-5008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5009/">CVE-2017-5009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5009">CVE-2017-5009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5010/">CVE-2017-5010 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5010">CVE-2017-5010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5011/">CVE-2017-5011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5011">CVE-2017-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5012/">CVE-2017-5012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5012">CVE-2017-5012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5013/">CVE-2017-5013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5013">CVE-2017-5013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5014/">CVE-2017-5014 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5014">CVE-2017-5014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5015/">CVE-2017-5015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5015">CVE-2017-5015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5016/">CVE-2017-5016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5016">CVE-2017-5016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5017/">CVE-2017-5017 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5017">CVE-2017-5017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5018/">CVE-2017-5018 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5018">CVE-2017-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5019/">CVE-2017-5019 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5019">CVE-2017-5019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5020/">CVE-2017-5020 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5020">CVE-2017-5020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5021/">CVE-2017-5021 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5021">CVE-2017-5021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5022/">CVE-2017-5022 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5022">CVE-2017-5022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5023/">CVE-2017-5023 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5023">CVE-2017-5023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5024/">CVE-2017-5024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5024">CVE-2017-5024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5025/">CVE-2017-5025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5025">CVE-2017-5025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5026/">CVE-2017-5026 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5026">CVE-2017-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5030/">CVE-2017-5030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5030">CVE-2017-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5035/">CVE-2017-5035 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5035">CVE-2017-5035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5041/">CVE-2017-5041 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5041">CVE-2017-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5044/">CVE-2017-5044 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5044">CVE-2017-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5052/">CVE-2017-5052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5052">CVE-2017-5052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5053/">CVE-2017-5053 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5053">CVE-2017-5053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5054/">CVE-2017-5054 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5054">CVE-2017-5054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5055/">CVE-2017-5055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5055">CVE-2017-5055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5056/">CVE-2017-5056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5056">CVE-2017-5056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5057/">CVE-2017-5057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5057">CVE-2017-5057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5058/">CVE-2017-5058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5058">CVE-2017-5058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5059/">CVE-2017-5059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5059">CVE-2017-5059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5060/">CVE-2017-5060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5060">CVE-2017-5060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5061/">CVE-2017-5061 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5061">CVE-2017-5061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5062/">CVE-2017-5062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5062">CVE-2017-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5063/">CVE-2017-5063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5063">CVE-2017-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5064/">CVE-2017-5064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5064">CVE-2017-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5065/">CVE-2017-5065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5065">CVE-2017-5065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5066/">CVE-2017-5066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5066">CVE-2017-5066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5067/">CVE-2017-5067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5067">CVE-2017-5067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5068/">CVE-2017-5068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5068">CVE-2017-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5069/">CVE-2017-5069 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5069">CVE-2017-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5070/">CVE-2017-5070 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5070">CVE-2017-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5071/">CVE-2017-5071 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5071">CVE-2017-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5072/">CVE-2017-5072 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5072">CVE-2017-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5073/">CVE-2017-5073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5073">CVE-2017-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5074/">CVE-2017-5074 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5074">CVE-2017-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5075/">CVE-2017-5075 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5075">CVE-2017-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5076/">CVE-2017-5076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5076">CVE-2017-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5077/">CVE-2017-5077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5077">CVE-2017-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5078/">CVE-2017-5078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5078">CVE-2017-5078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5079/">CVE-2017-5079 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5079">CVE-2017-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5080/">CVE-2017-5080 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5080">CVE-2017-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5081/">CVE-2017-5081 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5081">CVE-2017-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5082/">CVE-2017-5082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5082">CVE-2017-5082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5083/">CVE-2017-5083 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5083">CVE-2017-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5085/">CVE-2017-5085 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5085">CVE-2017-5085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5086/">CVE-2017-5086 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5086">CVE-2017-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5087/">CVE-2017-5087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5087">CVE-2017-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5088/">CVE-2017-5088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5088">CVE-2017-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5089/">CVE-2017-5089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5089">CVE-2017-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5091/">CVE-2017-5091 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5091">CVE-2017-5091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5092/">CVE-2017-5092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5092">CVE-2017-5092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5093/">CVE-2017-5093 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5093">CVE-2017-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5094/">CVE-2017-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5094">CVE-2017-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5095/">CVE-2017-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5095">CVE-2017-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5096/">CVE-2017-5096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5096">CVE-2017-5096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5097/">CVE-2017-5097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5097">CVE-2017-5097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5098/">CVE-2017-5098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5098">CVE-2017-5098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5099/">CVE-2017-5099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5099">CVE-2017-5099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5100/">CVE-2017-5100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5100">CVE-2017-5100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5101/">CVE-2017-5101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5101">CVE-2017-5101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5102/">CVE-2017-5102 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5102">CVE-2017-5102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5103/">CVE-2017-5103 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5103">CVE-2017-5103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5104/">CVE-2017-5104 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5104">CVE-2017-5104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5105/">CVE-2017-5105 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5105">CVE-2017-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5106/">CVE-2017-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5106">CVE-2017-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5107/">CVE-2017-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5107">CVE-2017-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5108/">CVE-2017-5108 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5108">CVE-2017-5108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5109/">CVE-2017-5109 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5109">CVE-2017-5109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5110/">CVE-2017-5110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5110">CVE-2017-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5111/">CVE-2017-5111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5111">CVE-2017-5111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5112/">CVE-2017-5112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5112">CVE-2017-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5113/">CVE-2017-5113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5113">CVE-2017-5113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5114/">CVE-2017-5114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5114">CVE-2017-5114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5115/">CVE-2017-5115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5115">CVE-2017-5115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5116/">CVE-2017-5116 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5116">CVE-2017-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5117/">CVE-2017-5117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5117">CVE-2017-5117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5118/">CVE-2017-5118 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5118">CVE-2017-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5119/">CVE-2017-5119 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5119">CVE-2017-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5120/">CVE-2017-5120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5120">CVE-2017-5120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5121/">CVE-2017-5121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5121">CVE-2017-5121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5122/">CVE-2017-5122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5122">CVE-2017-5122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5124/">CVE-2017-5124 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5124">CVE-2017-5124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5125/">CVE-2017-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5125">CVE-2017-5125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5126/">CVE-2017-5126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5126">CVE-2017-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5127/">CVE-2017-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5127">CVE-2017-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5128/">CVE-2017-5128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5128">CVE-2017-5128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5129/">CVE-2017-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5129">CVE-2017-5129 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5131/">CVE-2017-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5131">CVE-2017-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5132/">CVE-2017-5132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5132">CVE-2017-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5133/">CVE-2017-5133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5133">CVE-2017-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7000/">CVE-2017-7000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7000">CVE-2017-7000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16065/">CVE-2018-16065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16065">CVE-2018-16065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16066/">CVE-2018-16066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16066">CVE-2018-16066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16067/">CVE-2018-16067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16067">CVE-2018-16067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16068/">CVE-2018-16068 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16068">CVE-2018-16068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16069/">CVE-2018-16069 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16069">CVE-2018-16069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16070/">CVE-2018-16070 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16070">CVE-2018-16070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16071/">CVE-2018-16071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16071">CVE-2018-16071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16073/">CVE-2018-16073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16073">CVE-2018-16073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16074/">CVE-2018-16074 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16074">CVE-2018-16074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16075/">CVE-2018-16075 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16075">CVE-2018-16075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16076/">CVE-2018-16076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16076">CVE-2018-16076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16077/">CVE-2018-16077 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16077">CVE-2018-16077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16078/">CVE-2018-16078 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16078">CVE-2018-16078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16079/">CVE-2018-16079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16079">CVE-2018-16079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16080/">CVE-2018-16080 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16080">CVE-2018-16080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16081/">CVE-2018-16081 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16081">CVE-2018-16081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16082/">CVE-2018-16082 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16082">CVE-2018-16082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16083/">CVE-2018-16083 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16083">CVE-2018-16083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16084/">CVE-2018-16084 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16084">CVE-2018-16084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16085/">CVE-2018-16085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16085">CVE-2018-16085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16086/">CVE-2018-16086 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16086">CVE-2018-16086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16087/">CVE-2018-16087 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16087">CVE-2018-16087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16088/">CVE-2018-16088 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16088">CVE-2018-16088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17462/">CVE-2018-17462 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17462">CVE-2018-17462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17463/">CVE-2018-17463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17463">CVE-2018-17463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17464/">CVE-2018-17464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17464">CVE-2018-17464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17465/">CVE-2018-17465 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17465">CVE-2018-17465 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17467/">CVE-2018-17467 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17467">CVE-2018-17467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17468/">CVE-2018-17468 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17468">CVE-2018-17468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17469/">CVE-2018-17469 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17469">CVE-2018-17469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17470/">CVE-2018-17470 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17470">CVE-2018-17470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17471/">CVE-2018-17471 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17471">CVE-2018-17471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17472/">CVE-2018-17472 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17472">CVE-2018-17472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17473/">CVE-2018-17473 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17473">CVE-2018-17473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17474/">CVE-2018-17474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17474">CVE-2018-17474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17475/">CVE-2018-17475 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17475">CVE-2018-17475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17476/">CVE-2018-17476 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17476">CVE-2018-17476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17477/">CVE-2018-17477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17477">CVE-2018-17477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17478/">CVE-2018-17478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17478">CVE-2018-17478 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17479/">CVE-2018-17479 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17479">CVE-2018-17479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17480/">CVE-2018-17480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17480">CVE-2018-17480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17481/">CVE-2018-17481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17481">CVE-2018-17481 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18336/">CVE-2018-18336 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18336">CVE-2018-18336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18337/">CVE-2018-18337 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18337">CVE-2018-18337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18338/">CVE-2018-18338 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18338">CVE-2018-18338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18339/">CVE-2018-18339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18339">CVE-2018-18339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18340/">CVE-2018-18340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18340">CVE-2018-18340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18341/">CVE-2018-18341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18341">CVE-2018-18341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18342/">CVE-2018-18342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18342">CVE-2018-18342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18343/">CVE-2018-18343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18343">CVE-2018-18343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18344/">CVE-2018-18344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18344">CVE-2018-18344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18345/">CVE-2018-18345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18345">CVE-2018-18345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18346/">CVE-2018-18346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18346">CVE-2018-18346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18347/">CVE-2018-18347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18347">CVE-2018-18347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18348/">CVE-2018-18348 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18348">CVE-2018-18348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18349/">CVE-2018-18349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18349">CVE-2018-18349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18350/">CVE-2018-18350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18350">CVE-2018-18350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18351/">CVE-2018-18351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18351">CVE-2018-18351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18352/">CVE-2018-18352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18352">CVE-2018-18352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18353/">CVE-2018-18353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18353">CVE-2018-18353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18354/">CVE-2018-18354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18354">CVE-2018-18354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18355/">CVE-2018-18355 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18355">CVE-2018-18355 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18357/">CVE-2018-18357 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18357">CVE-2018-18357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18358/">CVE-2018-18358 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18358">CVE-2018-18358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18359/">CVE-2018-18359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18359">CVE-2018-18359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20073/">CVE-2018-20073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20073">CVE-2018-20073 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6031/">CVE-2018-6031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6031">CVE-2018-6031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6032/">CVE-2018-6032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6032">CVE-2018-6032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6033/">CVE-2018-6033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6033">CVE-2018-6033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6034/">CVE-2018-6034 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6034">CVE-2018-6034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6035/">CVE-2018-6035 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6035">CVE-2018-6035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6036/">CVE-2018-6036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6036">CVE-2018-6036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6037/">CVE-2018-6037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6037">CVE-2018-6037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6038/">CVE-2018-6038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6038">CVE-2018-6038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6039/">CVE-2018-6039 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6039">CVE-2018-6039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6040/">CVE-2018-6040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6040">CVE-2018-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6041/">CVE-2018-6041 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6041">CVE-2018-6041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6042/">CVE-2018-6042 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6042">CVE-2018-6042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6043/">CVE-2018-6043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6043">CVE-2018-6043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6044/">CVE-2018-6044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-6044">CVE-2018-6044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6045/">CVE-2018-6045 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6045">CVE-2018-6045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6046/">CVE-2018-6046 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6046">CVE-2018-6046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6047/">CVE-2018-6047 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6047">CVE-2018-6047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6048/">CVE-2018-6048 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6048">CVE-2018-6048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6049/">CVE-2018-6049 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6049">CVE-2018-6049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6050/">CVE-2018-6050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6050">CVE-2018-6050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6051/">CVE-2018-6051 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6051">CVE-2018-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6052/">CVE-2018-6052 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6052">CVE-2018-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6053/">CVE-2018-6053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6053">CVE-2018-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6054/">CVE-2018-6054 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6054">CVE-2018-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6056/">CVE-2018-6056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6056">CVE-2018-6056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6057/">CVE-2018-6057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6057">CVE-2018-6057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6060/">CVE-2018-6060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6060">CVE-2018-6060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6061/">CVE-2018-6061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6061">CVE-2018-6061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6062/">CVE-2018-6062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6062">CVE-2018-6062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6063/">CVE-2018-6063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6063">CVE-2018-6063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6064/">CVE-2018-6064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6064">CVE-2018-6064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6065/">CVE-2018-6065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6065">CVE-2018-6065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6066/">CVE-2018-6066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6066">CVE-2018-6066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6067/">CVE-2018-6067 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6067">CVE-2018-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6068/">CVE-2018-6068 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6068">CVE-2018-6068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6069/">CVE-2018-6069 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6069">CVE-2018-6069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6070/">CVE-2018-6070 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6070">CVE-2018-6070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6071/">CVE-2018-6071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6071">CVE-2018-6071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6072/">CVE-2018-6072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6072">CVE-2018-6072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6073/">CVE-2018-6073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6073">CVE-2018-6073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6074/">CVE-2018-6074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6074">CVE-2018-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6075/">CVE-2018-6075 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6075">CVE-2018-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6076/">CVE-2018-6076 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6076">CVE-2018-6076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6077/">CVE-2018-6077 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6077">CVE-2018-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6078/">CVE-2018-6078 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6078">CVE-2018-6078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6079/">CVE-2018-6079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6079">CVE-2018-6079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6080/">CVE-2018-6080 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6080">CVE-2018-6080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6081/">CVE-2018-6081 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6081">CVE-2018-6081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6082/">CVE-2018-6082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6082">CVE-2018-6082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6083/">CVE-2018-6083 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6083">CVE-2018-6083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6085/">CVE-2018-6085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6085">CVE-2018-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6086/">CVE-2018-6086 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6086">CVE-2018-6086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6087/">CVE-2018-6087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6087">CVE-2018-6087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6088/">CVE-2018-6088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6088">CVE-2018-6088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6089/">CVE-2018-6089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6089">CVE-2018-6089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6090/">CVE-2018-6090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6090">CVE-2018-6090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6091/">CVE-2018-6091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6091">CVE-2018-6091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6092/">CVE-2018-6092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6092">CVE-2018-6092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6093/">CVE-2018-6093 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6093">CVE-2018-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6094/">CVE-2018-6094 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6094">CVE-2018-6094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6095/">CVE-2018-6095 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6095">CVE-2018-6095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6096/">CVE-2018-6096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6096">CVE-2018-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6097/">CVE-2018-6097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6097">CVE-2018-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6098/">CVE-2018-6098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6098">CVE-2018-6098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6099/">CVE-2018-6099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6099">CVE-2018-6099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6100/">CVE-2018-6100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6100">CVE-2018-6100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6101/">CVE-2018-6101 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6101">CVE-2018-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6102/">CVE-2018-6102 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6102">CVE-2018-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6103/">CVE-2018-6103 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6103">CVE-2018-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6104/">CVE-2018-6104 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6104">CVE-2018-6104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6105/">CVE-2018-6105 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6105">CVE-2018-6105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6106/">CVE-2018-6106 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6106">CVE-2018-6106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6107/">CVE-2018-6107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6107">CVE-2018-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6108/">CVE-2018-6108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6108">CVE-2018-6108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6109/">CVE-2018-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6109">CVE-2018-6109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6110/">CVE-2018-6110 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6110">CVE-2018-6110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6111/">CVE-2018-6111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6111">CVE-2018-6111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6112/">CVE-2018-6112 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6112">CVE-2018-6112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6113/">CVE-2018-6113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6113">CVE-2018-6113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6114/">CVE-2018-6114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6114">CVE-2018-6114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6115/">CVE-2018-6115 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6115">CVE-2018-6115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6116/">CVE-2018-6116 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6116">CVE-2018-6116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6117/">CVE-2018-6117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6117">CVE-2018-6117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6118/">CVE-2018-6118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6118">CVE-2018-6118 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6120/">CVE-2018-6120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6120">CVE-2018-6120 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6121/">CVE-2018-6121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6121">CVE-2018-6121 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6122/">CVE-2018-6122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6122">CVE-2018-6122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6123/">CVE-2018-6123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6123">CVE-2018-6123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6124/">CVE-2018-6124 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6124">CVE-2018-6124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6125/">CVE-2018-6125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6125">CVE-2018-6125 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6127/">CVE-2018-6127 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6127">CVE-2018-6127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6128/">CVE-2018-6128 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6128">CVE-2018-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6129/">CVE-2018-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6129">CVE-2018-6129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6130/">CVE-2018-6130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6130">CVE-2018-6130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6131/">CVE-2018-6131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6131">CVE-2018-6131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6132/">CVE-2018-6132 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6132">CVE-2018-6132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6133/">CVE-2018-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6133">CVE-2018-6133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6134/">CVE-2018-6134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6134">CVE-2018-6134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6135/">CVE-2018-6135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6135">CVE-2018-6135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6136/">CVE-2018-6136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6136">CVE-2018-6136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6137/">CVE-2018-6137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6137">CVE-2018-6137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6138/">CVE-2018-6138 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6138">CVE-2018-6138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6139/">CVE-2018-6139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6139">CVE-2018-6139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6140/">CVE-2018-6140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6140">CVE-2018-6140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6141/">CVE-2018-6141 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6141">CVE-2018-6141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6142/">CVE-2018-6142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6142">CVE-2018-6142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6143/">CVE-2018-6143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6143">CVE-2018-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6144/">CVE-2018-6144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6144">CVE-2018-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6145/">CVE-2018-6145 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6145">CVE-2018-6145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6147/">CVE-2018-6147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6147">CVE-2018-6147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6148/">CVE-2018-6148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6148">CVE-2018-6148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6149/">CVE-2018-6149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6149">CVE-2018-6149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6153/">CVE-2018-6153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6153">CVE-2018-6153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6154/">CVE-2018-6154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6154">CVE-2018-6154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6155/">CVE-2018-6155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6155">CVE-2018-6155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6156/">CVE-2018-6156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6156">CVE-2018-6156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6157/">CVE-2018-6157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6157">CVE-2018-6157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6158/">CVE-2018-6158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6158">CVE-2018-6158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6159/">CVE-2018-6159 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6159">CVE-2018-6159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6160/">CVE-2018-6160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6160">CVE-2018-6160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6161/">CVE-2018-6161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6161">CVE-2018-6161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6162/">CVE-2018-6162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6162">CVE-2018-6162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6163/">CVE-2018-6163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6163">CVE-2018-6163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6164/">CVE-2018-6164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6164">CVE-2018-6164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6165/">CVE-2018-6165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6165">CVE-2018-6165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6166/">CVE-2018-6166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6166">CVE-2018-6166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6167/">CVE-2018-6167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6167">CVE-2018-6167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6168/">CVE-2018-6168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6168">CVE-2018-6168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6169/">CVE-2018-6169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6169">CVE-2018-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6170/">CVE-2018-6170 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6170">CVE-2018-6170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6171/">CVE-2018-6171 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6171">CVE-2018-6171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6172/">CVE-2018-6172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6172">CVE-2018-6172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6173/">CVE-2018-6173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6173">CVE-2018-6173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6174/">CVE-2018-6174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6174">CVE-2018-6174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6175/">CVE-2018-6175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6175">CVE-2018-6175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6176/">CVE-2018-6176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6176">CVE-2018-6176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6177/">CVE-2018-6177 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6177">CVE-2018-6177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6178/">CVE-2018-6178 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6178">CVE-2018-6178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6179/">CVE-2018-6179 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6179">CVE-2018-6179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6406/">CVE-2018-6406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6406">CVE-2018-6406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13659/">CVE-2019-13659 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13659">CVE-2019-13659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13660/">CVE-2019-13660 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13660">CVE-2019-13660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13661/">CVE-2019-13661 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13661">CVE-2019-13661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13662/">CVE-2019-13662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13662">CVE-2019-13662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13663/">CVE-2019-13663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13663">CVE-2019-13663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13664/">CVE-2019-13664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13664">CVE-2019-13664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13665/">CVE-2019-13665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13665">CVE-2019-13665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13666/">CVE-2019-13666 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13666">CVE-2019-13666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13667/">CVE-2019-13667 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13667">CVE-2019-13667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13668/">CVE-2019-13668 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13668">CVE-2019-13668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13669/">CVE-2019-13669 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13669">CVE-2019-13669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13670/">CVE-2019-13670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13670">CVE-2019-13670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13671/">CVE-2019-13671 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13671">CVE-2019-13671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13673/">CVE-2019-13673 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13673">CVE-2019-13673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13674/">CVE-2019-13674 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13674">CVE-2019-13674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13675/">CVE-2019-13675 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13675">CVE-2019-13675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13676/">CVE-2019-13676 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13676">CVE-2019-13676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13677/">CVE-2019-13677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13677">CVE-2019-13677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13678/">CVE-2019-13678 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13678">CVE-2019-13678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13679/">CVE-2019-13679 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13679">CVE-2019-13679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13680/">CVE-2019-13680 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13680">CVE-2019-13680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13681/">CVE-2019-13681 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13681">CVE-2019-13681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13682/">CVE-2019-13682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13682">CVE-2019-13682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13683/">CVE-2019-13683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13683">CVE-2019-13683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13685/">CVE-2019-13685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13685">CVE-2019-13685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13686/">CVE-2019-13686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13686">CVE-2019-13686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13687/">CVE-2019-13687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13687">CVE-2019-13687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13688/">CVE-2019-13688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13688">CVE-2019-13688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13693/">CVE-2019-13693 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13693">CVE-2019-13693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13694/">CVE-2019-13694 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13694">CVE-2019-13694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13695/">CVE-2019-13695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13695">CVE-2019-13695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13696/">CVE-2019-13696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13696">CVE-2019-13696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13697/">CVE-2019-13697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13697">CVE-2019-13697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13699/">CVE-2019-13699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13699">CVE-2019-13699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13700/">CVE-2019-13700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13700">CVE-2019-13700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13701/">CVE-2019-13701 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13701">CVE-2019-13701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13702/">CVE-2019-13702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13702">CVE-2019-13702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13703/">CVE-2019-13703 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13703">CVE-2019-13703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13704/">CVE-2019-13704 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13704">CVE-2019-13704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13705/">CVE-2019-13705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13705">CVE-2019-13705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13706/">CVE-2019-13706 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13706">CVE-2019-13706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13707/">CVE-2019-13707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13707">CVE-2019-13707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13708/">CVE-2019-13708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13708">CVE-2019-13708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13709/">CVE-2019-13709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13709">CVE-2019-13709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13710/">CVE-2019-13710 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13710">CVE-2019-13710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13711/">CVE-2019-13711 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13711">CVE-2019-13711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13713/">CVE-2019-13713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13713">CVE-2019-13713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13714/">CVE-2019-13714 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13714">CVE-2019-13714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13715/">CVE-2019-13715 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13715">CVE-2019-13715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13716/">CVE-2019-13716 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13716">CVE-2019-13716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13717/">CVE-2019-13717 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13717">CVE-2019-13717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13718/">CVE-2019-13718 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13718">CVE-2019-13718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13719/">CVE-2019-13719 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13719">CVE-2019-13719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13720/">CVE-2019-13720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13720">CVE-2019-13720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13721/">CVE-2019-13721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13721">CVE-2019-13721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13723/">CVE-2019-13723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13723">CVE-2019-13723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13724/">CVE-2019-13724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13724">CVE-2019-13724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13725/">CVE-2019-13725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13725">CVE-2019-13725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13726/">CVE-2019-13726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13726">CVE-2019-13726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13727/">CVE-2019-13727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13727">CVE-2019-13727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13728/">CVE-2019-13728 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13728">CVE-2019-13728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13729/">CVE-2019-13729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13729">CVE-2019-13729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13730/">CVE-2019-13730 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13730">CVE-2019-13730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13732/">CVE-2019-13732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13732">CVE-2019-13732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13734">CVE-2019-13734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13735/">CVE-2019-13735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13735">CVE-2019-13735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13736/">CVE-2019-13736 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13736">CVE-2019-13736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13737/">CVE-2019-13737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13737">CVE-2019-13737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13738/">CVE-2019-13738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13738">CVE-2019-13738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13739/">CVE-2019-13739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13739">CVE-2019-13739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13740/">CVE-2019-13740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13740">CVE-2019-13740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13741/">CVE-2019-13741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13741">CVE-2019-13741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13742/">CVE-2019-13742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13742">CVE-2019-13742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13743/">CVE-2019-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13743">CVE-2019-13743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13744/">CVE-2019-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13744">CVE-2019-13744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13745/">CVE-2019-13745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13745">CVE-2019-13745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13746/">CVE-2019-13746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13746">CVE-2019-13746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13747/">CVE-2019-13747 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13747">CVE-2019-13747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13748/">CVE-2019-13748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13748">CVE-2019-13748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13749/">CVE-2019-13749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13749">CVE-2019-13749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13750/">CVE-2019-13750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13750">CVE-2019-13750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13751/">CVE-2019-13751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13751">CVE-2019-13751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13752/">CVE-2019-13752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13752">CVE-2019-13752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13753/">CVE-2019-13753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13753">CVE-2019-13753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13754/">CVE-2019-13754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13754">CVE-2019-13754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13755/">CVE-2019-13755 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13755">CVE-2019-13755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13756/">CVE-2019-13756 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13756">CVE-2019-13756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13757/">CVE-2019-13757 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13757">CVE-2019-13757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13758/">CVE-2019-13758 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13758">CVE-2019-13758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13759/">CVE-2019-13759 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13759">CVE-2019-13759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13761/">CVE-2019-13761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13761">CVE-2019-13761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13762/">CVE-2019-13762 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13762">CVE-2019-13762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13763/">CVE-2019-13763 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13763">CVE-2019-13763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13764/">CVE-2019-13764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13764">CVE-2019-13764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13767/">CVE-2019-13767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13767">CVE-2019-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5754/">CVE-2019-5754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5754">CVE-2019-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5755/">CVE-2019-5755 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5755">CVE-2019-5755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5756/">CVE-2019-5756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5756">CVE-2019-5756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5757/">CVE-2019-5757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5757">CVE-2019-5757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5758/">CVE-2019-5758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5758">CVE-2019-5758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5759/">CVE-2019-5759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5759">CVE-2019-5759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5760/">CVE-2019-5760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5760">CVE-2019-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5761/">CVE-2019-5761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5761">CVE-2019-5761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5762/">CVE-2019-5762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5762">CVE-2019-5762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5763/">CVE-2019-5763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5763">CVE-2019-5763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5764/">CVE-2019-5764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5764">CVE-2019-5764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5765/">CVE-2019-5765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5765">CVE-2019-5765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5766/">CVE-2019-5766 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5766">CVE-2019-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5767/">CVE-2019-5767 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5767">CVE-2019-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5768/">CVE-2019-5768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5768">CVE-2019-5768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5769/">CVE-2019-5769 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5769">CVE-2019-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5770/">CVE-2019-5770 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5770">CVE-2019-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5771/">CVE-2019-5771 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5771">CVE-2019-5771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5772/">CVE-2019-5772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5772">CVE-2019-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5773/">CVE-2019-5773 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5773">CVE-2019-5773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5774/">CVE-2019-5774 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5774">CVE-2019-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5775/">CVE-2019-5775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5775">CVE-2019-5775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5776/">CVE-2019-5776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5776">CVE-2019-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5777/">CVE-2019-5777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5777">CVE-2019-5777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5778/">CVE-2019-5778 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5778">CVE-2019-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5779/">CVE-2019-5779 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5779">CVE-2019-5779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5780/">CVE-2019-5780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5780">CVE-2019-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5781/">CVE-2019-5781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5781">CVE-2019-5781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5782/">CVE-2019-5782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5782">CVE-2019-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5784/">CVE-2019-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5784">CVE-2019-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5786/">CVE-2019-5786 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5786">CVE-2019-5786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5787/">CVE-2019-5787 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5787">CVE-2019-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5788/">CVE-2019-5788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5788">CVE-2019-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5789/">CVE-2019-5789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5789">CVE-2019-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5790/">CVE-2019-5790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5790">CVE-2019-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5791/">CVE-2019-5791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5791">CVE-2019-5791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5792/">CVE-2019-5792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5792">CVE-2019-5792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5793/">CVE-2019-5793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5793">CVE-2019-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5794/">CVE-2019-5794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5794">CVE-2019-5794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5795/">CVE-2019-5795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5795">CVE-2019-5795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5796/">CVE-2019-5796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5796">CVE-2019-5796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5797/">CVE-2019-5797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5797">CVE-2019-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5799/">CVE-2019-5799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5799">CVE-2019-5799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5800/">CVE-2019-5800 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5800">CVE-2019-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5801/">CVE-2019-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5801">CVE-2019-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5802/">CVE-2019-5802 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5802">CVE-2019-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5803/">CVE-2019-5803 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5803">CVE-2019-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5804/">CVE-2019-5804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5804">CVE-2019-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5805/">CVE-2019-5805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5805">CVE-2019-5805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5806/">CVE-2019-5806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5806">CVE-2019-5806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5807/">CVE-2019-5807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5807">CVE-2019-5807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5808/">CVE-2019-5808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5808">CVE-2019-5808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5809/">CVE-2019-5809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5809">CVE-2019-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5810/">CVE-2019-5810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5810">CVE-2019-5810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5811/">CVE-2019-5811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5811">CVE-2019-5811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5812/">CVE-2019-5812 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5812">CVE-2019-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5813/">CVE-2019-5813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5813">CVE-2019-5813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5814/">CVE-2019-5814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5814">CVE-2019-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5815/">CVE-2019-5815 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5815">CVE-2019-5815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5816/">CVE-2019-5816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5816">CVE-2019-5816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5817/">CVE-2019-5817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5817">CVE-2019-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5818/">CVE-2019-5818 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5818">CVE-2019-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5819/">CVE-2019-5819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5819">CVE-2019-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5820/">CVE-2019-5820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5820">CVE-2019-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5821/">CVE-2019-5821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5821">CVE-2019-5821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5822/">CVE-2019-5822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5822">CVE-2019-5822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5823/">CVE-2019-5823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5823">CVE-2019-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5824/">CVE-2019-5824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5824">CVE-2019-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5827/">CVE-2019-5827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5827">CVE-2019-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5828/">CVE-2019-5828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5828">CVE-2019-5828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5829/">CVE-2019-5829 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5829">CVE-2019-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5830/">CVE-2019-5830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5830">CVE-2019-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5831/">CVE-2019-5831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5831">CVE-2019-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5832/">CVE-2019-5832 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5832">CVE-2019-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5833/">CVE-2019-5833 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5833">CVE-2019-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5834/">CVE-2019-5834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5834">CVE-2019-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5835/">CVE-2019-5835 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5835">CVE-2019-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5836/">CVE-2019-5836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5836">CVE-2019-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5837/">CVE-2019-5837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5837">CVE-2019-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5838/">CVE-2019-5838 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5838">CVE-2019-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5839/">CVE-2019-5839 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5839">CVE-2019-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5840/">CVE-2019-5840 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5840">CVE-2019-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5842/">CVE-2019-5842 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5842">CVE-2019-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5844/">CVE-2019-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5844">CVE-2019-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5847/">CVE-2019-5847 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5847">CVE-2019-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5848/">CVE-2019-5848 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5848">CVE-2019-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5850/">CVE-2019-5850 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5850">CVE-2019-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5851/">CVE-2019-5851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5851">CVE-2019-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5852/">CVE-2019-5852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5852">CVE-2019-5852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5853/">CVE-2019-5853 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5853">CVE-2019-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5854/">CVE-2019-5854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5854">CVE-2019-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5855/">CVE-2019-5855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5855">CVE-2019-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5856/">CVE-2019-5856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5856">CVE-2019-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5857/">CVE-2019-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5857">CVE-2019-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5858/">CVE-2019-5858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5858">CVE-2019-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5859/">CVE-2019-5859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5859">CVE-2019-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5860/">CVE-2019-5860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5860">CVE-2019-5860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5861/">CVE-2019-5861 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5861">CVE-2019-5861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5862/">CVE-2019-5862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5862">CVE-2019-5862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5863/">CVE-2019-5863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-5863">CVE-2019-5863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5864/">CVE-2019-5864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5864">CVE-2019-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5865/">CVE-2019-5865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5865">CVE-2019-5865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5867/">CVE-2019-5867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5867">CVE-2019-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5868/">CVE-2019-5868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5868">CVE-2019-5868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5869/">CVE-2019-5869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5869">CVE-2019-5869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5870/">CVE-2019-5870 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5870">CVE-2019-5870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5871/">CVE-2019-5871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5871">CVE-2019-5871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5872/">CVE-2019-5872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5872">CVE-2019-5872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5874/">CVE-2019-5874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5874">CVE-2019-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5875/">CVE-2019-5875 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5875">CVE-2019-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5876/">CVE-2019-5876 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5876">CVE-2019-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5877/">CVE-2019-5877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5877">CVE-2019-5877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5878/">CVE-2019-5878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5878">CVE-2019-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5879/">CVE-2019-5879 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5879">CVE-2019-5879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5880/">CVE-2019-5880 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5880">CVE-2019-5880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5881/">CVE-2019-5881 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5881">CVE-2019-5881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8075/">CVE-2019-8075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8075">CVE-2019-8075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0561/">CVE-2020-0561 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0561">CVE-2020-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15959/">CVE-2020-15959 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15959">CVE-2020-15959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15960/">CVE-2020-15960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15960">CVE-2020-15960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15961/">CVE-2020-15961 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15961">CVE-2020-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15962/">CVE-2020-15962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15962">CVE-2020-15962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15963/">CVE-2020-15963 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15963">CVE-2020-15963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15964/">CVE-2020-15964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15964">CVE-2020-15964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15965/">CVE-2020-15965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15965">CVE-2020-15965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15966/">CVE-2020-15966 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15966">CVE-2020-15966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15967/">CVE-2020-15967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15967">CVE-2020-15967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15968/">CVE-2020-15968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15968">CVE-2020-15968 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15970/">CVE-2020-15970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15970">CVE-2020-15970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15971/">CVE-2020-15971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15971">CVE-2020-15971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15972/">CVE-2020-15972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15972">CVE-2020-15972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15973/">CVE-2020-15973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15973">CVE-2020-15973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15974/">CVE-2020-15974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15974">CVE-2020-15974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15975/">CVE-2020-15975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15975">CVE-2020-15975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15976/">CVE-2020-15976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15976">CVE-2020-15976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15977/">CVE-2020-15977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15977">CVE-2020-15977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15978/">CVE-2020-15978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15978">CVE-2020-15978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15979/">CVE-2020-15979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15979">CVE-2020-15979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15980/">CVE-2020-15980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15980">CVE-2020-15980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15981/">CVE-2020-15981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15981">CVE-2020-15981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15982/">CVE-2020-15982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15982">CVE-2020-15982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15983/">CVE-2020-15983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15983">CVE-2020-15983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15984/">CVE-2020-15984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15984">CVE-2020-15984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15985/">CVE-2020-15985 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15985">CVE-2020-15985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15986/">CVE-2020-15986 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15986">CVE-2020-15986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15987/">CVE-2020-15987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15987">CVE-2020-15987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15988/">CVE-2020-15988 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15988">CVE-2020-15988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15989/">CVE-2020-15989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15989">CVE-2020-15989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15990/">CVE-2020-15990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15990">CVE-2020-15990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15991/">CVE-2020-15991 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15991">CVE-2020-15991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15992/">CVE-2020-15992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15992">CVE-2020-15992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15995/">CVE-2020-15995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15995">CVE-2020-15995 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16000/">CVE-2020-16000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16000">CVE-2020-16000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16001/">CVE-2020-16001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16001">CVE-2020-16001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16002/">CVE-2020-16002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16002">CVE-2020-16002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16003/">CVE-2020-16003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16003">CVE-2020-16003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16004/">CVE-2020-16004 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16004">CVE-2020-16004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16005/">CVE-2020-16005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16005">CVE-2020-16005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16006/">CVE-2020-16006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16006">CVE-2020-16006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16007/">CVE-2020-16007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16007">CVE-2020-16007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16008/">CVE-2020-16008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16008">CVE-2020-16008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16009/">CVE-2020-16009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16009">CVE-2020-16009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16011/">CVE-2020-16011 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16011">CVE-2020-16011 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16013/">CVE-2020-16013 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16013">CVE-2020-16013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16014/">CVE-2020-16014 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16014">CVE-2020-16014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16015/">CVE-2020-16015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16015">CVE-2020-16015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16016/">CVE-2020-16016 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16016">CVE-2020-16016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16017/">CVE-2020-16017 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16017">CVE-2020-16017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16018/">CVE-2020-16018 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16018">CVE-2020-16018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16019/">CVE-2020-16019 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16019">CVE-2020-16019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16020/">CVE-2020-16020 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16020">CVE-2020-16020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16021/">CVE-2020-16021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16021">CVE-2020-16021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16022/">CVE-2020-16022 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16022">CVE-2020-16022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16023/">CVE-2020-16023 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16023">CVE-2020-16023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16024/">CVE-2020-16024 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16024">CVE-2020-16024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16025/">CVE-2020-16025 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16025">CVE-2020-16025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16026/">CVE-2020-16026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16026">CVE-2020-16026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16027/">CVE-2020-16027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16027">CVE-2020-16027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16028/">CVE-2020-16028 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16028">CVE-2020-16028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16029/">CVE-2020-16029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16029">CVE-2020-16029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16030/">CVE-2020-16030 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16030">CVE-2020-16030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16031/">CVE-2020-16031 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16031">CVE-2020-16031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16032/">CVE-2020-16032 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16032">CVE-2020-16032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16033/">CVE-2020-16033 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16033">CVE-2020-16033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16034/">CVE-2020-16034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16034">CVE-2020-16034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16035/">CVE-2020-16035 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16035">CVE-2020-16035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16036/">CVE-2020-16036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16036">CVE-2020-16036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16037/">CVE-2020-16037 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16037">CVE-2020-16037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16038/">CVE-2020-16038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16038">CVE-2020-16038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16039/">CVE-2020-16039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16039">CVE-2020-16039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16040/">CVE-2020-16040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16040">CVE-2020-16040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16041/">CVE-2020-16041 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16041">CVE-2020-16041 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16043/">CVE-2020-16043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16043">CVE-2020-16043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27844/">CVE-2020-27844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27844">CVE-2020-27844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6377/">CVE-2020-6377 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6377">CVE-2020-6377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6378/">CVE-2020-6378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6378">CVE-2020-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6379/">CVE-2020-6379 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6379">CVE-2020-6379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6380/">CVE-2020-6380 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6380">CVE-2020-6380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6381/">CVE-2020-6381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6381">CVE-2020-6381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6382/">CVE-2020-6382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6382">CVE-2020-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6385/">CVE-2020-6385 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6385">CVE-2020-6385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6387/">CVE-2020-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6387">CVE-2020-6387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6388/">CVE-2020-6388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6388">CVE-2020-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6389/">CVE-2020-6389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6389">CVE-2020-6389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6390/">CVE-2020-6390 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6390">CVE-2020-6390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6391/">CVE-2020-6391 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6391">CVE-2020-6391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6392/">CVE-2020-6392 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6392">CVE-2020-6392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6393/">CVE-2020-6393 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6393">CVE-2020-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6394/">CVE-2020-6394 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6394">CVE-2020-6394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6395/">CVE-2020-6395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6395">CVE-2020-6395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6396/">CVE-2020-6396 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6396">CVE-2020-6396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6397/">CVE-2020-6397 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6397">CVE-2020-6397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6398/">CVE-2020-6398 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6398">CVE-2020-6398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6399/">CVE-2020-6399 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6399">CVE-2020-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6400/">CVE-2020-6400 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6400">CVE-2020-6400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6401/">CVE-2020-6401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6401">CVE-2020-6401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6402/">CVE-2020-6402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6402">CVE-2020-6402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6403/">CVE-2020-6403 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6403">CVE-2020-6403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6404/">CVE-2020-6404 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6404">CVE-2020-6404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6405/">CVE-2020-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6405">CVE-2020-6405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6406/">CVE-2020-6406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6406">CVE-2020-6406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6407/">CVE-2020-6407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6407">CVE-2020-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6408/">CVE-2020-6408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6408">CVE-2020-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6409/">CVE-2020-6409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6409">CVE-2020-6409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6410/">CVE-2020-6410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6410">CVE-2020-6410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6411/">CVE-2020-6411 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6411">CVE-2020-6411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6412/">CVE-2020-6412 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6412">CVE-2020-6412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6413/">CVE-2020-6413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6413">CVE-2020-6413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6414/">CVE-2020-6414 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6414">CVE-2020-6414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6415/">CVE-2020-6415 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6415">CVE-2020-6415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6416/">CVE-2020-6416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6416">CVE-2020-6416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6417/">CVE-2020-6417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6417">CVE-2020-6417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6418/">CVE-2020-6418 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6418">CVE-2020-6418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6420/">CVE-2020-6420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6420">CVE-2020-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6422/">CVE-2020-6422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6422">CVE-2020-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6423/">CVE-2020-6423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6423">CVE-2020-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6424/">CVE-2020-6424 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6424">CVE-2020-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6425/">CVE-2020-6425 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6425">CVE-2020-6425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6426/">CVE-2020-6426 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6426">CVE-2020-6426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6427/">CVE-2020-6427 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6427">CVE-2020-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6428/">CVE-2020-6428 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6428">CVE-2020-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6429/">CVE-2020-6429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6429">CVE-2020-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6430/">CVE-2020-6430 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6430">CVE-2020-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6431/">CVE-2020-6431 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6431">CVE-2020-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6432/">CVE-2020-6432 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6432">CVE-2020-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6433/">CVE-2020-6433 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6433">CVE-2020-6433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6434/">CVE-2020-6434 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6434">CVE-2020-6434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6435/">CVE-2020-6435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6435">CVE-2020-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6436/">CVE-2020-6436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6436">CVE-2020-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6437/">CVE-2020-6437 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6437">CVE-2020-6437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6438/">CVE-2020-6438 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6438">CVE-2020-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6439/">CVE-2020-6439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6439">CVE-2020-6439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6440/">CVE-2020-6440 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6440">CVE-2020-6440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6441/">CVE-2020-6441 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6441">CVE-2020-6441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6442/">CVE-2020-6442 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6442">CVE-2020-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6443/">CVE-2020-6443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6443">CVE-2020-6443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6444/">CVE-2020-6444 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6444">CVE-2020-6444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6445/">CVE-2020-6445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6445">CVE-2020-6445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6446/">CVE-2020-6446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6446">CVE-2020-6446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6447/">CVE-2020-6447 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6447">CVE-2020-6447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6448/">CVE-2020-6448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6448">CVE-2020-6448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6449/">CVE-2020-6449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6449">CVE-2020-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6450/">CVE-2020-6450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6450">CVE-2020-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6451/">CVE-2020-6451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6451">CVE-2020-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6452/">CVE-2020-6452 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6452">CVE-2020-6452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6454/">CVE-2020-6454 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6454">CVE-2020-6454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6455/">CVE-2020-6455 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6455">CVE-2020-6455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6456/">CVE-2020-6456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6456">CVE-2020-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6457/">CVE-2020-6457 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6457">CVE-2020-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6458/">CVE-2020-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6458">CVE-2020-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6459/">CVE-2020-6459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6459">CVE-2020-6459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6460/">CVE-2020-6460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6460">CVE-2020-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6462/">CVE-2020-6462 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6462">CVE-2020-6462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6464/">CVE-2020-6464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6464">CVE-2020-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6465/">CVE-2020-6465 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6465">CVE-2020-6465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6466/">CVE-2020-6466 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6466">CVE-2020-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6467/">CVE-2020-6467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6467">CVE-2020-6467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6468/">CVE-2020-6468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6468">CVE-2020-6468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6469/">CVE-2020-6469 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6469">CVE-2020-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6470/">CVE-2020-6470 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6470">CVE-2020-6470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6471/">CVE-2020-6471 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6471">CVE-2020-6471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6472/">CVE-2020-6472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6472">CVE-2020-6472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6473/">CVE-2020-6473 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6473">CVE-2020-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6474/">CVE-2020-6474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6474">CVE-2020-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6475/">CVE-2020-6475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6475">CVE-2020-6475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6476/">CVE-2020-6476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6476">CVE-2020-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6477/">CVE-2020-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6477">CVE-2020-6477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6478/">CVE-2020-6478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6478">CVE-2020-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6479/">CVE-2020-6479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6479">CVE-2020-6479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6480/">CVE-2020-6480 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6480">CVE-2020-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6481/">CVE-2020-6481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6481">CVE-2020-6481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6482/">CVE-2020-6482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6482">CVE-2020-6482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6483/">CVE-2020-6483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6483">CVE-2020-6483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6484/">CVE-2020-6484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6484">CVE-2020-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6485/">CVE-2020-6485 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6485">CVE-2020-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6486/">CVE-2020-6486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6486">CVE-2020-6486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6487/">CVE-2020-6487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6487">CVE-2020-6487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6488/">CVE-2020-6488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6488">CVE-2020-6488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6489/">CVE-2020-6489 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6489">CVE-2020-6489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6490/">CVE-2020-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6490">CVE-2020-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6491/">CVE-2020-6491 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6491">CVE-2020-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6493/">CVE-2020-6493 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6493">CVE-2020-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6494/">CVE-2020-6494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6494">CVE-2020-6494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6495/">CVE-2020-6495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6495">CVE-2020-6495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6496/">CVE-2020-6496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6496">CVE-2020-6496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6505/">CVE-2020-6505 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6505">CVE-2020-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6506/">CVE-2020-6506 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6506">CVE-2020-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6507/">CVE-2020-6507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6507">CVE-2020-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6509/">CVE-2020-6509 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6509">CVE-2020-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6510/">CVE-2020-6510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6510">CVE-2020-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6511/">CVE-2020-6511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6511">CVE-2020-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6512/">CVE-2020-6512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6512">CVE-2020-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6513/">CVE-2020-6513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6513">CVE-2020-6513 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6515/">CVE-2020-6515 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6515">CVE-2020-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6516/">CVE-2020-6516 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6516">CVE-2020-6516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6517/">CVE-2020-6517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6517">CVE-2020-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6518/">CVE-2020-6518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6518">CVE-2020-6518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6519/">CVE-2020-6519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6519">CVE-2020-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6520/">CVE-2020-6520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6520">CVE-2020-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6521/">CVE-2020-6521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6521">CVE-2020-6521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6522/">CVE-2020-6522 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6522">CVE-2020-6522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6523/">CVE-2020-6523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6523">CVE-2020-6523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6524/">CVE-2020-6524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6524">CVE-2020-6524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6525/">CVE-2020-6525 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6525">CVE-2020-6525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6526/">CVE-2020-6526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6526">CVE-2020-6526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6527/">CVE-2020-6527 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6527">CVE-2020-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6528/">CVE-2020-6528 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6528">CVE-2020-6528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6529/">CVE-2020-6529 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6529">CVE-2020-6529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6530/">CVE-2020-6530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6530">CVE-2020-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6531/">CVE-2020-6531 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6531">CVE-2020-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6532/">CVE-2020-6532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6532">CVE-2020-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6533/">CVE-2020-6533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6533">CVE-2020-6533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6534/">CVE-2020-6534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6534">CVE-2020-6534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6535/">CVE-2020-6535 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6535">CVE-2020-6535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6536/">CVE-2020-6536 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6536">CVE-2020-6536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6537/">CVE-2020-6537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6537">CVE-2020-6537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6538/">CVE-2020-6538 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6538">CVE-2020-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6539/">CVE-2020-6539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6539">CVE-2020-6539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6540/">CVE-2020-6540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6540">CVE-2020-6540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6541/">CVE-2020-6541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6541">CVE-2020-6541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6542/">CVE-2020-6542 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6542">CVE-2020-6542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6543/">CVE-2020-6543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6543">CVE-2020-6543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6544/">CVE-2020-6544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6544">CVE-2020-6544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6545/">CVE-2020-6545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6545">CVE-2020-6545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6546/">CVE-2020-6546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6546">CVE-2020-6546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6547/">CVE-2020-6547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6547">CVE-2020-6547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6548/">CVE-2020-6548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6548">CVE-2020-6548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6549/">CVE-2020-6549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6549">CVE-2020-6549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6550/">CVE-2020-6550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6550">CVE-2020-6550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6551/">CVE-2020-6551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6551">CVE-2020-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6552/">CVE-2020-6552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6552">CVE-2020-6552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6553/">CVE-2020-6553 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6553">CVE-2020-6553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6554/">CVE-2020-6554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6554">CVE-2020-6554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6555/">CVE-2020-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6555">CVE-2020-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6556/">CVE-2020-6556 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6556">CVE-2020-6556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6557/">CVE-2020-6557 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6557">CVE-2020-6557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6558/">CVE-2020-6558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6558">CVE-2020-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6559/">CVE-2020-6559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6559">CVE-2020-6559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6560/">CVE-2020-6560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6560">CVE-2020-6560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6561/">CVE-2020-6561 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6561">CVE-2020-6561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6562/">CVE-2020-6562 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6562">CVE-2020-6562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6563/">CVE-2020-6563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6563">CVE-2020-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6564/">CVE-2020-6564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6564">CVE-2020-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6565/">CVE-2020-6565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6565">CVE-2020-6565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6566/">CVE-2020-6566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6566">CVE-2020-6566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6567/">CVE-2020-6567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6567">CVE-2020-6567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6568/">CVE-2020-6568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6568">CVE-2020-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6569/">CVE-2020-6569 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6569">CVE-2020-6569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6570/">CVE-2020-6570 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6570">CVE-2020-6570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6571/">CVE-2020-6571 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6571">CVE-2020-6571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6573/">CVE-2020-6573 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6573">CVE-2020-6573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6574/">CVE-2020-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6574">CVE-2020-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6575/">CVE-2020-6575 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6575">CVE-2020-6575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6576/">CVE-2020-6576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6576">CVE-2020-6576 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21106/">CVE-2021-21106 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21106">CVE-2021-21106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21107/">CVE-2021-21107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21107">CVE-2021-21107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21108/">CVE-2021-21108 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21108">CVE-2021-21108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21109/">CVE-2021-21109 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21109">CVE-2021-21109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21110/">CVE-2021-21110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21110">CVE-2021-21110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21111/">CVE-2021-21111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21111">CVE-2021-21111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21112/">CVE-2021-21112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21112">CVE-2021-21112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21113/">CVE-2021-21113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21113">CVE-2021-21113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21114/">CVE-2021-21114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21114">CVE-2021-21114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21115/">CVE-2021-21115 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21115">CVE-2021-21115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21116/">CVE-2021-21116 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21116">CVE-2021-21116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21117/">CVE-2021-21117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21117">CVE-2021-21117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21118">CVE-2021-21118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21119">CVE-2021-21119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21120">CVE-2021-21120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21121">CVE-2021-21121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21122">CVE-2021-21122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21123">CVE-2021-21123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21124/">CVE-2021-21124 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21124">CVE-2021-21124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21125">CVE-2021-21125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21126">CVE-2021-21126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21127">CVE-2021-21127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21128">CVE-2021-21128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21129">CVE-2021-21129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21130">CVE-2021-21130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21131">CVE-2021-21131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21132">CVE-2021-21132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21133/">CVE-2021-21133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21133">CVE-2021-21133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21134/">CVE-2021-21134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21134">CVE-2021-21134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21135">CVE-2021-21135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21136/">CVE-2021-21136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21136">CVE-2021-21136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21137">CVE-2021-21137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21138/">CVE-2021-21138 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21138">CVE-2021-21138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21139/">CVE-2021-21139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21139">CVE-2021-21139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21140">CVE-2021-21140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21141">CVE-2021-21141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21142/">CVE-2021-21142 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21142">CVE-2021-21142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21143/">CVE-2021-21143 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21143">CVE-2021-21143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21144/">CVE-2021-21144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21144">CVE-2021-21144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21145">CVE-2021-21145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21146">CVE-2021-21146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21147">CVE-2021-21147 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21148">CVE-2021-21148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21149">CVE-2021-21149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21150">CVE-2021-21150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21151/">CVE-2021-21151 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21151">CVE-2021-21151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21152">CVE-2021-21152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21153">CVE-2021-21153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21154/">CVE-2021-21154 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21154">CVE-2021-21154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21155/">CVE-2021-21155 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21155">CVE-2021-21155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21156">CVE-2021-21156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21157">CVE-2021-21157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21159/">CVE-2021-21159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21159">CVE-2021-21159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21160/">CVE-2021-21160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21160">CVE-2021-21160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21161/">CVE-2021-21161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21161">CVE-2021-21161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21162/">CVE-2021-21162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21162">CVE-2021-21162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21163/">CVE-2021-21163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21163">CVE-2021-21163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21164/">CVE-2021-21164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21164">CVE-2021-21164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21165/">CVE-2021-21165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21165">CVE-2021-21165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21166/">CVE-2021-21166 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21166">CVE-2021-21166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21167/">CVE-2021-21167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21167">CVE-2021-21167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21168/">CVE-2021-21168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21168">CVE-2021-21168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21169/">CVE-2021-21169 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21169">CVE-2021-21169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21170/">CVE-2021-21170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21170">CVE-2021-21170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21171/">CVE-2021-21171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21171">CVE-2021-21171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21172/">CVE-2021-21172 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21172">CVE-2021-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21173/">CVE-2021-21173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21173">CVE-2021-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21174/">CVE-2021-21174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21174">CVE-2021-21174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21175/">CVE-2021-21175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21175">CVE-2021-21175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21176/">CVE-2021-21176 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21176">CVE-2021-21176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21177/">CVE-2021-21177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21177">CVE-2021-21177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21178/">CVE-2021-21178 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21178">CVE-2021-21178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21179/">CVE-2021-21179 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21179">CVE-2021-21179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21180/">CVE-2021-21180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21180">CVE-2021-21180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21181/">CVE-2021-21181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21181">CVE-2021-21181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21182/">CVE-2021-21182 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21182">CVE-2021-21182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21183/">CVE-2021-21183 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21183">CVE-2021-21183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21184/">CVE-2021-21184 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21184">CVE-2021-21184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21185/">CVE-2021-21185 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21185">CVE-2021-21185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21186/">CVE-2021-21186 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21186">CVE-2021-21186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21187/">CVE-2021-21187 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21187">CVE-2021-21187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21188/">CVE-2021-21188 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21188">CVE-2021-21188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21189/">CVE-2021-21189 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21189">CVE-2021-21189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21190/">CVE-2021-21190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21190">CVE-2021-21190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21191/">CVE-2021-21191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21191">CVE-2021-21191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21192/">CVE-2021-21192 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21192">CVE-2021-21192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21193/">CVE-2021-21193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21193">CVE-2021-21193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21194/">CVE-2021-21194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21194">CVE-2021-21194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21195/">CVE-2021-21195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21195">CVE-2021-21195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21196/">CVE-2021-21196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21196">CVE-2021-21196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21197/">CVE-2021-21197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21197">CVE-2021-21197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21198/">CVE-2021-21198 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21198">CVE-2021-21198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21199/">CVE-2021-21199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21199">CVE-2021-21199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21201/">CVE-2021-21201 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21201">CVE-2021-21201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21202/">CVE-2021-21202 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21202">CVE-2021-21202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21203/">CVE-2021-21203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21203">CVE-2021-21203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21204/">CVE-2021-21204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21204">CVE-2021-21204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21205/">CVE-2021-21205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21205">CVE-2021-21205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21206/">CVE-2021-21206 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21206">CVE-2021-21206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21207/">CVE-2021-21207 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21207">CVE-2021-21207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21208/">CVE-2021-21208 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21208">CVE-2021-21208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21209/">CVE-2021-21209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21209">CVE-2021-21209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21210/">CVE-2021-21210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21210">CVE-2021-21210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21211/">CVE-2021-21211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21211">CVE-2021-21211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21212/">CVE-2021-21212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21212">CVE-2021-21212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21213/">CVE-2021-21213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21213">CVE-2021-21213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21214/">CVE-2021-21214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21214">CVE-2021-21214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21215/">CVE-2021-21215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21215">CVE-2021-21215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21216/">CVE-2021-21216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21216">CVE-2021-21216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21217/">CVE-2021-21217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21217">CVE-2021-21217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21218/">CVE-2021-21218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21218">CVE-2021-21218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21219/">CVE-2021-21219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21219">CVE-2021-21219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21220/">CVE-2021-21220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21220">CVE-2021-21220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21221/">CVE-2021-21221 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21221">CVE-2021-21221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21222/">CVE-2021-21222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21222">CVE-2021-21222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21223/">CVE-2021-21223 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21223">CVE-2021-21223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21224/">CVE-2021-21224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21224">CVE-2021-21224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21225/">CVE-2021-21225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21225">CVE-2021-21225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21226/">CVE-2021-21226 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21226">CVE-2021-21226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21227/">CVE-2021-21227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21227">CVE-2021-21227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21228/">CVE-2021-21228 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21228">CVE-2021-21228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21229/">CVE-2021-21229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21229">CVE-2021-21229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21230/">CVE-2021-21230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21230">CVE-2021-21230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21231/">CVE-2021-21231 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21231">CVE-2021-21231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21232/">CVE-2021-21232 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21232">CVE-2021-21232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21233/">CVE-2021-21233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21233">CVE-2021-21233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30506/">CVE-2021-30506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30506">CVE-2021-30506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30507/">CVE-2021-30507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30507">CVE-2021-30507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30508/">CVE-2021-30508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30508">CVE-2021-30508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30509/">CVE-2021-30509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30509">CVE-2021-30509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30510/">CVE-2021-30510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30510">CVE-2021-30510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30511/">CVE-2021-30511 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30511">CVE-2021-30511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30512/">CVE-2021-30512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30512">CVE-2021-30512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30513/">CVE-2021-30513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30513">CVE-2021-30513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30514/">CVE-2021-30514 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30514">CVE-2021-30514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30515/">CVE-2021-30515 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30515">CVE-2021-30515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30516/">CVE-2021-30516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30516">CVE-2021-30516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30517/">CVE-2021-30517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30517">CVE-2021-30517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30518/">CVE-2021-30518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30518">CVE-2021-30518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30519/">CVE-2021-30519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30519">CVE-2021-30519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30520/">CVE-2021-30520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30520">CVE-2021-30520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30521/">CVE-2021-30521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30521">CVE-2021-30521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30522/">CVE-2021-30522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30522">CVE-2021-30522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30523/">CVE-2021-30523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30523">CVE-2021-30523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30524/">CVE-2021-30524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30524">CVE-2021-30524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30525/">CVE-2021-30525 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30525">CVE-2021-30525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30526/">CVE-2021-30526 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30526">CVE-2021-30526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30527/">CVE-2021-30527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30527">CVE-2021-30527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30528/">CVE-2021-30528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30528">CVE-2021-30528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30529/">CVE-2021-30529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30529">CVE-2021-30529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30530/">CVE-2021-30530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30530">CVE-2021-30530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30531/">CVE-2021-30531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30531">CVE-2021-30531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30532/">CVE-2021-30532 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30532">CVE-2021-30532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30533/">CVE-2021-30533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30533">CVE-2021-30533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30534/">CVE-2021-30534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30534">CVE-2021-30534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30535/">CVE-2021-30535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30535">CVE-2021-30535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30536/">CVE-2021-30536 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30536">CVE-2021-30536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30537/">CVE-2021-30537 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30537">CVE-2021-30537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30538/">CVE-2021-30538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30538">CVE-2021-30538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30539/">CVE-2021-30539 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30539">CVE-2021-30539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30540/">CVE-2021-30540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30540">CVE-2021-30540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30541">CVE-2021-30541 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30544">CVE-2021-30544 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30545/">CVE-2021-30545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30545">CVE-2021-30545 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30546/">CVE-2021-30546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30546">CVE-2021-30546 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30548">CVE-2021-30548 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30549/">CVE-2021-30549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30549">CVE-2021-30549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30550/">CVE-2021-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30550">CVE-2021-30550 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30551">CVE-2021-30551 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30552/">CVE-2021-30552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30552">CVE-2021-30552 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30553">CVE-2021-30553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30554">CVE-2021-30554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30555/">CVE-2021-30555 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30555">CVE-2021-30555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30556">CVE-2021-30556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30557/">CVE-2021-30557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30557">CVE-2021-30557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30559/">CVE-2021-30559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30559">CVE-2021-30559 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30561/">CVE-2021-30561 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30561">CVE-2021-30561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30562/">CVE-2021-30562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30562">CVE-2021-30562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30563">CVE-2021-30563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30564/">CVE-2021-30564 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30564">CVE-2021-30564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30565/">CVE-2021-30565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30565">CVE-2021-30565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30566/">CVE-2021-30566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30566">CVE-2021-30566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30567/">CVE-2021-30567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30567">CVE-2021-30567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30568/">CVE-2021-30568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30568">CVE-2021-30568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30569/">CVE-2021-30569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30569">CVE-2021-30569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30571/">CVE-2021-30571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30571">CVE-2021-30571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30572/">CVE-2021-30572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30572">CVE-2021-30572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30573/">CVE-2021-30573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30573">CVE-2021-30573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30574/">CVE-2021-30574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30574">CVE-2021-30574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30575/">CVE-2021-30575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30575">CVE-2021-30575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30576/">CVE-2021-30576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30576">CVE-2021-30576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30577/">CVE-2021-30577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30577">CVE-2021-30577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30578/">CVE-2021-30578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30578">CVE-2021-30578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30579/">CVE-2021-30579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30579">CVE-2021-30579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30581/">CVE-2021-30581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30581">CVE-2021-30581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30582/">CVE-2021-30582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30582">CVE-2021-30582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30584/">CVE-2021-30584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30584">CVE-2021-30584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30585/">CVE-2021-30585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30585">CVE-2021-30585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30588/">CVE-2021-30588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30588">CVE-2021-30588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30589/">CVE-2021-30589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30589">CVE-2021-30589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30590/">CVE-2021-30590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30590">CVE-2021-30590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30591/">CVE-2021-30591 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30591">CVE-2021-30591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30592/">CVE-2021-30592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30592">CVE-2021-30592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30593/">CVE-2021-30593 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30593">CVE-2021-30593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30594/">CVE-2021-30594 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30594">CVE-2021-30594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30596/">CVE-2021-30596 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30596">CVE-2021-30596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30597/">CVE-2021-30597 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30597">CVE-2021-30597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30598">CVE-2021-30598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30599">CVE-2021-30599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30600/">CVE-2021-30600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30600">CVE-2021-30600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30601/">CVE-2021-30601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30601">CVE-2021-30601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30602">CVE-2021-30602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30603">CVE-2021-30603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30604">CVE-2021-30604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30606/">CVE-2021-30606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30606">CVE-2021-30606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30607/">CVE-2021-30607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30607">CVE-2021-30607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30608/">CVE-2021-30608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30608">CVE-2021-30608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30609/">CVE-2021-30609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30609">CVE-2021-30609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30610/">CVE-2021-30610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30610">CVE-2021-30610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30611/">CVE-2021-30611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30611">CVE-2021-30611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30612/">CVE-2021-30612 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30612">CVE-2021-30612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30613">CVE-2021-30613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30614/">CVE-2021-30614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30614">CVE-2021-30614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30615/">CVE-2021-30615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30615">CVE-2021-30615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30616">CVE-2021-30616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30617/">CVE-2021-30617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30617">CVE-2021-30617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30618">CVE-2021-30618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30619/">CVE-2021-30619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30619">CVE-2021-30619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30620/">CVE-2021-30620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30620">CVE-2021-30620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30621/">CVE-2021-30621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30621">CVE-2021-30621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30622/">CVE-2021-30622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30622">CVE-2021-30622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30623/">CVE-2021-30623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30623">CVE-2021-30623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30624/">CVE-2021-30624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30624">CVE-2021-30624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30625">CVE-2021-30625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30626">CVE-2021-30626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30627">CVE-2021-30627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30628">CVE-2021-30628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30629">CVE-2021-30629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30630">CVE-2021-30630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30631">CVE-2021-30631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30632">CVE-2021-30632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30633">CVE-2021-30633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909385" comment="chromedriver-93.0.4577.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909386" comment="chromium-93.0.4577.82-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249003" version="1" class="patch">
	<metadata>
		<title>chrony-4.1-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-4.1-5.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909387" comment="chrony-4.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909388" comment="chrony-pool-empty-4.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909389" comment="chrony-pool-openSUSE-4.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909390" comment="chrony-pool-suse-4.1-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249004" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.13-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1059" ref_url="https://www.suse.com/security/cve/CVE-2006-1059/" source="CVE"/>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.13-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1059/">CVE-2006-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1059">CVE-2006-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909391" comment="cifs-utils-6.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909392" comment="cifs-utils-devel-6.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909393" comment="pam_cifscreds-6.13-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249005" version="1" class="patch">
	<metadata>
		<title>cinnamon-5.0.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
These are all security issues fixed in the cinnamon-5.0.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909394" comment="cinnamon-5.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909395" comment="cinnamon-gschemas-5.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909396" comment="cinnamon-gschemas-branding-upstream-5.0.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249006" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3239" ref_url="https://www.suse.com/security/cve/CVE-2005-3239/" source="CVE"/>
		<reference ref_id="CVE-2005-3303" ref_url="https://www.suse.com/security/cve/CVE-2005-3303/" source="CVE"/>
		<reference ref_id="CVE-2006-1614" ref_url="https://www.suse.com/security/cve/CVE-2006-1614/" source="CVE"/>
		<reference ref_id="CVE-2006-1989" ref_url="https://www.suse.com/security/cve/CVE-2006-1989/" source="CVE"/>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785/" source="CVE"/>
		<reference ref_id="CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786/" source="CVE"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3239/">CVE-2005-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3239">CVE-2005-3239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3303/">CVE-2005-3303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3303">CVE-2005-3303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1614/">CVE-2006-1614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1614">CVE-2006-1614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1989/">CVE-2006-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1989">CVE-2006-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1785">CVE-2019-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1786">CVE-2019-1786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1798">CVE-2019-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909397" comment="clamav-0.103.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909398" comment="clamav-devel-0.103.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909399" comment="clamav-milter-0.103.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909400" comment="libclamav9-0.103.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909401" comment="libfreshclam2-0.103.3-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249007" version="1" class="patch">
	<metadata>
		<title>claws-mail-4.0.0-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2020-15917" ref_url="https://www.suse.com/security/cve/CVE-2020-15917/" source="CVE"/>
		<description>
These are all security issues fixed in the claws-mail-4.0.0-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15917/">CVE-2020-15917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15917">CVE-2020-15917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909402" comment="claws-mail-4.0.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909403" comment="claws-mail-devel-4.0.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909404" comment="claws-mail-lang-4.0.0-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249008" version="1" class="patch">
	<metadata>
		<title>clojure-1.10.3.855-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<reference ref_id="CVE-2021-26291" ref_url="https://www.suse.com/security/cve/CVE-2021-26291/" source="CVE"/>
		<description>
These are all security issues fixed in the clojure-1.10.3.855-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-26291/">CVE-2021-26291 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26291">CVE-2021-26291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909405" comment="clojure-1.10.3.855-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249009" version="1" class="patch">
	<metadata>
		<title>cloud-init-21.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-21.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0816">CVE-2019-0816 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909406" comment="cloud-init-21.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909407" comment="cloud-init-config-suse-21.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909408" comment="cloud-init-doc-21.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249010" version="1" class="patch">
	<metadata>
		<title>cni-plugins-0.9.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-plugins-0.9.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10749">CVE-2020-10749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909409" comment="cni-plugins-0.9.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249011" version="1" class="patch">
	<metadata>
		<title>cobbler-3.2.1.336+git.5639a3af-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4953" ref_url="https://www.suse.com/security/cve/CVE-2011-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-9605" ref_url="https://www.suse.com/security/cve/CVE-2016-9605/" source="CVE"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="CVE-2018-1000225" ref_url="https://www.suse.com/security/cve/CVE-2018-1000225/" source="CVE"/>
		<reference ref_id="CVE-2018-1000226" ref_url="https://www.suse.com/security/cve/CVE-2018-1000226/" source="CVE"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<description>
These are all security issues fixed in the cobbler-3.2.1.336+git.5639a3af-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4953/">CVE-2011-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4953">CVE-2011-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9605/">CVE-2016-9605 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9605">CVE-2016-9605 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000469">CVE-2017-1000469 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000225/">CVE-2018-1000225 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000225">CVE-2018-1000225 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000226/">CVE-2018-1000226 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000226">CVE-2018-1000226 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10931">CVE-2018-10931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909410" comment="cobbler-3.2.1.336+git.5639a3af-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909411" comment="cobbler-tests-3.2.1.336+git.5639a3af-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249012" version="1" class="patch">
	<metadata>
		<title>collectd-5.12.0-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7401" ref_url="https://www.suse.com/security/cve/CVE-2017-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the collectd-5.12.0-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7401/">CVE-2017-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7401">CVE-2017-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909412" comment="collectd-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909413" comment="collectd-plugin-amqp-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909414" comment="collectd-plugin-buddyinfo-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909415" comment="collectd-plugin-connectivity-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909416" comment="collectd-plugin-dbi-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909417" comment="collectd-plugin-gps-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909418" comment="collectd-plugin-ipmi-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909419" comment="collectd-plugin-java-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909420" comment="collectd-plugin-logparser-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909421" comment="collectd-plugin-lua-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909422" comment="collectd-plugin-mcelog-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909423" comment="collectd-plugin-memcachec-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909424" comment="collectd-plugin-modbus-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909425" comment="collectd-plugin-mqtt-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909426" comment="collectd-plugin-mysql-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909427" comment="collectd-plugin-notify-desktop-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909428" comment="collectd-plugin-nut-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909429" comment="collectd-plugin-openldap-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909430" comment="collectd-plugin-ovs-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909431" comment="collectd-plugin-pcie-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909432" comment="collectd-plugin-pinba-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909433" comment="collectd-plugin-postgresql-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909434" comment="collectd-plugin-procevent-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909435" comment="collectd-plugin-python3-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909436" comment="collectd-plugin-sigrok-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909437" comment="collectd-plugin-smart-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909438" comment="collectd-plugin-snmp-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909439" comment="collectd-plugin-synproxy-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909440" comment="collectd-plugin-sysevent-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909441" comment="collectd-plugin-ubi-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909442" comment="collectd-plugin-uptime-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909443" comment="collectd-plugin-virt-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909444" comment="collectd-plugin-write_influxdb_udp-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909445" comment="collectd-plugin-write_stackdriver-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909446" comment="collectd-plugin-write_syslog-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909447" comment="collectd-plugins-all-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909448" comment="collectd-spamassassin-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909449" comment="collectd-web-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909450" comment="collectd-web-js-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909451" comment="libcollectdclient-devel-5.12.0-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909452" comment="libcollectdclient1-5.12.0-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249013" version="1" class="patch">
	<metadata>
		<title>connman-1.40-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12865" ref_url="https://www.suse.com/security/cve/CVE-2017-12865/" source="CVE"/>
		<reference ref_id="CVE-2021-26675" ref_url="https://www.suse.com/security/cve/CVE-2021-26675/" source="CVE"/>
		<reference ref_id="CVE-2021-26676" ref_url="https://www.suse.com/security/cve/CVE-2021-26676/" source="CVE"/>
		<reference ref_id="CVE-2021-33833" ref_url="https://www.suse.com/security/cve/CVE-2021-33833/" source="CVE"/>
		<description>
These are all security issues fixed in the connman-1.40-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12865/">CVE-2017-12865 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12865">CVE-2017-12865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26675/">CVE-2021-26675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26675">CVE-2021-26675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26676/">CVE-2021-26676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26676">CVE-2021-26676 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33833/">CVE-2021-33833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33833">CVE-2021-33833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909453" comment="connman-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909454" comment="connman-client-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909455" comment="connman-devel-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909456" comment="connman-doc-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909457" comment="connman-nmcompat-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909458" comment="connman-plugin-hh2serial-gps-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909459" comment="connman-plugin-iospm-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909460" comment="connman-plugin-l2tp-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909461" comment="connman-plugin-openconnect-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909462" comment="connman-plugin-openvpn-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909463" comment="connman-plugin-polkit-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909464" comment="connman-plugin-pptp-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909465" comment="connman-plugin-tist-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909466" comment="connman-plugin-vpnc-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909467" comment="connman-plugin-wireguard-1.40-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909468" comment="connman-test-1.40-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249014" version="1" class="patch">
	<metadata>
		<title>containerd-1.4.8-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334/" source="CVE"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.4.8-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21334">CVE-2021-21334 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909469" comment="containerd-1.4.8-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909470" comment="containerd-ctr-1.4.8-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249015" version="1" class="patch">
	<metadata>
		<title>coreutils-8.32-8.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.32-8.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909471" comment="coreutils-8.32-8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909472" comment="coreutils-doc-8.32-8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909473" comment="coreutils-lang-8.32-8.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249016" version="1" class="patch">
	<metadata>
		<title>corosync-2.4.5+git70.64010f57-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1084" ref_url="https://www.suse.com/security/cve/CVE-2018-1084/" source="CVE"/>
		<description>
These are all security issues fixed in the corosync-2.4.5+git70.64010f57-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1084/">CVE-2018-1084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1084">CVE-2018-1084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909474" comment="corosync-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909475" comment="corosync-qdevice-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909476" comment="corosync-qnetd-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909477" comment="corosync-testagents-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909478" comment="libcfg6-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909479" comment="libcfg6-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909480" comment="libcmap4-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909481" comment="libcmap4-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909482" comment="libcorosync-devel-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909483" comment="libcorosync_common4-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909484" comment="libcorosync_common4-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909485" comment="libcpg4-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909486" comment="libcpg4-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909487" comment="libquorum5-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909488" comment="libquorum5-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909489" comment="libsam4-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909490" comment="libsam4-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909491" comment="libtotem_pg5-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909492" comment="libtotem_pg5-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909493" comment="libvotequorum8-2.4.5+git70.64010f57-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909494" comment="libvotequorum8-32bit-2.4.5+git70.64010f57-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249017" version="1" class="patch">
	<metadata>
		<title>coturn-4.5.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26262" ref_url="https://www.suse.com/security/cve/CVE-2020-26262/" source="CVE"/>
		<reference ref_id="CVE-2020-4067" ref_url="https://www.suse.com/security/cve/CVE-2020-4067/" source="CVE"/>
		<reference ref_id="CVE-2020-6061" ref_url="https://www.suse.com/security/cve/CVE-2020-6061/" source="CVE"/>
		<description>
These are all security issues fixed in the coturn-4.5.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26262/">CVE-2020-26262 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26262">CVE-2020-26262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-4067/">CVE-2020-4067 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4067">CVE-2020-4067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6061/">CVE-2020-6061 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6061">CVE-2020-6061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909495" comment="coturn-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909496" comment="coturn-devel-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909497" comment="coturn-utils-4.5.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249018" version="1" class="patch">
	<metadata>
		<title>cpio-2.13-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1197" ref_url="https://www.suse.com/security/cve/CVE-2015-1197/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.13-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1197/">CVE-2015-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1197">CVE-2015-1197 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909498" comment="cpio-2.13-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909499" comment="cpio-lang-2.13-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909500" comment="cpio-mt-2.13-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249019" version="1" class="patch">
	<metadata>
		<title>crawl-0.26.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11722" ref_url="https://www.suse.com/security/cve/CVE-2020-11722/" source="CVE"/>
		<description>
These are all security issues fixed in the crawl-0.26.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11722/">CVE-2020-11722 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11722">CVE-2020-11722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909501" comment="crawl-0.26.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909502" comment="crawl-data-0.26.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909503" comment="crawl-sdl-0.26.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249020" version="1" class="patch">
	<metadata>
		<title>cri-o-1.22.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<description>
These are all security issues fixed in the cri-o-1.22.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909504" comment="cri-o-1.22.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909505" comment="cri-o-kubeadm-criconfig-1.22.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249021" version="1" class="patch">
	<metadata>
		<title>crmsh-4.3.1+20210913.d7356663-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<description>
These are all security issues fixed in the crmsh-4.3.1+20210913.d7356663-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35459">CVE-2020-35459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909506" comment="crmsh-4.3.1+20210913.d7356663-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909507" comment="crmsh-scripts-4.3.1+20210913.d7356663-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909508" comment="crmsh-test-4.3.1+20210913.d7356663-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249022" version="1" class="patch">
	<metadata>
		<title>cron-4.2-86.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-86.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9704">CVE-2019-9704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909509" comment="cron-4.2-86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909510" comment="cronie-1.5.7-86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909511" comment="cronie-anacron-1.5.7-86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249023" version="1" class="patch">
	<metadata>
		<title>cpp10-10.3.1+git1893-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp10-10.3.1+git1893-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909512" comment="cpp10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909513" comment="gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909514" comment="gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909515" comment="gcc10-ada-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909516" comment="gcc10-ada-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909517" comment="gcc10-c++-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909518" comment="gcc10-c++-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909519" comment="gcc10-d-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909520" comment="gcc10-d-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909521" comment="gcc10-devel-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909522" comment="gcc10-fortran-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909523" comment="gcc10-fortran-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909524" comment="gcc10-go-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909525" comment="gcc10-go-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909526" comment="gcc10-info-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909527" comment="gcc10-locale-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909528" comment="gcc10-obj-c++-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909529" comment="gcc10-obj-c++-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909530" comment="gcc10-objc-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909531" comment="gcc10-objc-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909532" comment="libada10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909533" comment="libada10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909534" comment="libasan6-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909535" comment="libasan6-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909536" comment="libatomic1-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909537" comment="libatomic1-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909538" comment="libgcc_s1-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909539" comment="libgcc_s1-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909540" comment="libgdruntime1-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909541" comment="libgdruntime1-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909542" comment="libgfortran5-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909543" comment="libgfortran5-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909544" comment="libgo16-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909545" comment="libgo16-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909546" comment="libgomp1-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909547" comment="libgomp1-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909548" comment="libgphobos1-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909549" comment="libgphobos1-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909550" comment="libitm1-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909551" comment="libitm1-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909552" comment="liblsan0-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909553" comment="libobjc4-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909554" comment="libobjc4-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909555" comment="libquadmath0-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909556" comment="libquadmath0-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909557" comment="libstdc++6-devel-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909558" comment="libstdc++6-devel-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909559" comment="libstdc++6-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909560" comment="libstdc++6-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909561" comment="libstdc++6-gcc10-locale-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909562" comment="libstdc++6-pp-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909563" comment="libstdc++6-pp-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909564" comment="libtsan0-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909565" comment="libubsan1-gcc10-10.3.1+git1893-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909566" comment="libubsan1-gcc10-32bit-10.3.1+git1893-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249024" version="1" class="patch">
	<metadata>
		<title>cpp7-7.5.0+r278197-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp7-7.5.0+r278197-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909567" comment="cpp7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909568" comment="gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909569" comment="gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909570" comment="gcc7-ada-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909571" comment="gcc7-ada-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909572" comment="gcc7-c++-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909573" comment="gcc7-c++-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909574" comment="gcc7-devel-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909575" comment="gcc7-fortran-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909576" comment="gcc7-fortran-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909577" comment="gcc7-go-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909578" comment="gcc7-go-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909579" comment="gcc7-info-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909580" comment="gcc7-locale-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909581" comment="gcc7-obj-c++-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909582" comment="gcc7-obj-c++-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909583" comment="gcc7-objc-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909584" comment="gcc7-objc-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909585" comment="libada7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909586" comment="libada7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909587" comment="libasan4-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909588" comment="libasan4-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909589" comment="libatomic1-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909590" comment="libatomic1-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909591" comment="libcilkrts5-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909592" comment="libcilkrts5-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909593" comment="libgcc_s1-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909594" comment="libgcc_s1-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909595" comment="libgfortran4-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909596" comment="libgfortran4-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909597" comment="libgo11-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909598" comment="libgo11-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909599" comment="libgomp1-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909600" comment="libgomp1-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909601" comment="libitm1-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909602" comment="libitm1-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909603" comment="liblsan0-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909604" comment="libmpx2-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909605" comment="libmpx2-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909606" comment="libmpxwrappers2-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909607" comment="libmpxwrappers2-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909608" comment="libobjc4-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909609" comment="libobjc4-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909610" comment="libquadmath0-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909611" comment="libquadmath0-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909612" comment="libstdc++6-devel-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909613" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909614" comment="libstdc++6-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909615" comment="libstdc++6-gcc7-32bit-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909616" comment="libstdc++6-gcc7-locale-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909617" comment="libtsan0-gcc7-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909618" comment="libubsan0-7.5.0+r278197-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909619" comment="libubsan0-32bit-7.5.0+r278197-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249025" version="1" class="patch">
	<metadata>
		<title>cryptsetup-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14382" ref_url="https://www.suse.com/security/cve/CVE-2020-14382/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptsetup-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14382/">CVE-2020-14382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14382">CVE-2020-14382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909620" comment="cryptsetup-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909621" comment="cryptsetup-lang-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909622" comment="cryptsetup-ssh-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909623" comment="libcryptsetup-devel-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909624" comment="libcryptsetup12-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909625" comment="libcryptsetup12-32bit-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909626" comment="libcryptsetup12-hmac-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909627" comment="libcryptsetup12-hmac-32bit-2.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249026" version="1" class="patch">
	<metadata>
		<title>cscope-15.9-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-2541" ref_url="https://www.suse.com/security/cve/CVE-2004-2541/" source="CVE"/>
		<reference ref_id="CVE-2006-4262" ref_url="https://www.suse.com/security/cve/CVE-2006-4262/" source="CVE"/>
		<description>
These are all security issues fixed in the cscope-15.9-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2541/">CVE-2004-2541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2541">CVE-2004-2541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4262/">CVE-2006-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4262">CVE-2006-4262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909628" comment="cscope-15.9-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249027" version="1" class="patch">
	<metadata>
		<title>csync2-2.0+git.1600444747.83b3644-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15522" ref_url="https://www.suse.com/security/cve/CVE-2019-15522/" source="CVE"/>
		<reference ref_id="CVE-2019-15523" ref_url="https://www.suse.com/security/cve/CVE-2019-15523/" source="CVE"/>
		<description>
These are all security issues fixed in the csync2-2.0+git.1600444747.83b3644-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-15522/">CVE-2019-15522 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15522">CVE-2019-15522 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15523/">CVE-2019-15523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15523">CVE-2019-15523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909629" comment="csync2-2.0+git.1600444747.83b3644-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249028" version="1" class="patch">
	<metadata>
		<title>cups-2.3.3op2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3193" ref_url="https://www.suse.com/security/cve/CVE-2005-3193/" source="CVE"/>
		<reference ref_id="CVE-2005-3624" ref_url="https://www.suse.com/security/cve/CVE-2005-3624/" source="CVE"/>
		<reference ref_id="CVE-2005-3628" ref_url="https://www.suse.com/security/cve/CVE-2005-3628/" source="CVE"/>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-2228" ref_url="https://www.suse.com/security/cve/CVE-2019-2228/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.3.3op2-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3193/">CVE-2005-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3193">CVE-2005-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3624/">CVE-2005-3624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3624">CVE-2005-3624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3628/">CVE-2005-3628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3628">CVE-2005-3628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18248">CVE-2017-18248 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2228/">CVE-2019-2228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2228">CVE-2019-2228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8842">CVE-2019-8842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909630" comment="cups-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909631" comment="cups-client-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909632" comment="cups-config-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909633" comment="cups-ddk-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909634" comment="cups-devel-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909635" comment="cups-devel-32bit-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909636" comment="libcups2-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909637" comment="libcups2-32bit-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909638" comment="libcupsimage2-2.3.3op2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909639" comment="libcupsimage2-32bit-2.3.3op2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249029" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.13-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.13-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12836">CVE-2017-12836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909640" comment="cvs-1.12.13-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909641" comment="cvs-doc-1.12.13-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249030" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.27-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="CVE-2020-8032" ref_url="https://www.suse.com/security/cve/CVE-2020-8032/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.27-5.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8032/">CVE-2020-8032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8032">CVE-2020-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909642" comment="cyrus-sasl-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909643" comment="cyrus-sasl-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909644" comment="cyrus-sasl-crammd5-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909645" comment="cyrus-sasl-crammd5-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909646" comment="cyrus-sasl-devel-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909647" comment="cyrus-sasl-devel-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909648" comment="cyrus-sasl-digestmd5-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909649" comment="cyrus-sasl-digestmd5-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909650" comment="cyrus-sasl-gs2-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909651" comment="cyrus-sasl-gssapi-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909652" comment="cyrus-sasl-gssapi-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909653" comment="cyrus-sasl-ntlm-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909654" comment="cyrus-sasl-otp-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909655" comment="cyrus-sasl-otp-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909656" comment="cyrus-sasl-plain-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909657" comment="cyrus-sasl-plain-32bit-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909658" comment="cyrus-sasl-scram-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909659" comment="libsasl2-3-2.1.27-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909660" comment="libsasl2-3-32bit-2.1.27-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249031" version="1" class="patch">
	<metadata>
		<title>davfs2-1.6.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.6.0-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4362">CVE-2014-4362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909661" comment="davfs2-1.6.0-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249032" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.12.20-5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.12.20-5.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909662" comment="dbus-1-1.12.20-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909663" comment="dbus-1-devel-1.12.20-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909664" comment="dbus-1-devel-32bit-1.12.20-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909665" comment="libdbus-1-3-1.12.20-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909666" comment="libdbus-1-3-32bit-1.12.20-5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249033" version="1" class="patch">
	<metadata>
		<title>dcraw-9.28.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2018-19655" ref_url="https://www.suse.com/security/cve/CVE-2018-19655/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<description>
These are all security issues fixed in the dcraw-9.28.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13735">CVE-2017-13735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14608">CVE-2017-14608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19655/">CVE-2018-19655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19655">CVE-2018-19655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5801">CVE-2018-5801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909667" comment="dcraw-9.28.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909668" comment="dcraw-lang-9.28.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249034" version="1" class="patch">
	<metadata>
		<title>deluge-2.0.3-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9031" ref_url="https://www.suse.com/security/cve/CVE-2017-9031/" source="CVE"/>
		<description>
These are all security issues fixed in the deluge-2.0.3-4.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9031/">CVE-2017-9031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9031">CVE-2017-9031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909669" comment="deluge-2.0.3-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909670" comment="deluge-lang-2.0.3-4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249035" version="1" class="patch">
	<metadata>
		<title>dex-oidc-2.28.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26290" ref_url="https://www.suse.com/security/cve/CVE-2020-26290/" source="CVE"/>
		<description>
These are all security issues fixed in the dex-oidc-2.28.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26290/">CVE-2020-26290 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26290">CVE-2020-26290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909671" comment="dex-oidc-2.28.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249036" version="1" class="patch">
	<metadata>
		<title>dhcp-4.4.2.P1-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.4.2.P1-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909672" comment="dhcp-4.4.2.P1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909673" comment="dhcp-client-4.4.2.P1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909674" comment="dhcp-devel-4.4.2.P1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909675" comment="dhcp-doc-4.4.2.P1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909676" comment="dhcp-relay-4.4.2.P1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909677" comment="dhcp-server-4.4.2.P1-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249037" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2453" ref_url="https://www.suse.com/security/cve/CVE-2006-2453/" source="CVE"/>
		<reference ref_id="CVE-2006-2480" ref_url="https://www.suse.com/security/cve/CVE-2006-2480/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2453/">CVE-2006-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2453">CVE-2006-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2480/">CVE-2006-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2480">CVE-2006-2480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909678" comment="dia-0.97.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909679" comment="dia-lang-0.97.3-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249038" version="1" class="patch">
	<metadata>
		<title>diffoscope-183-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-0359" ref_url="https://www.suse.com/security/cve/CVE-2017-0359/" source="CVE"/>
		<description>
These are all security issues fixed in the diffoscope-183-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0359/">CVE-2017-0359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0359">CVE-2017-0359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909680" comment="diffoscope-183-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249039" version="1" class="patch">
	<metadata>
		<title>discount-2.2.7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11468" ref_url="https://www.suse.com/security/cve/CVE-2018-11468/" source="CVE"/>
		<reference ref_id="CVE-2018-12495" ref_url="https://www.suse.com/security/cve/CVE-2018-12495/" source="CVE"/>
		<description>
These are all security issues fixed in the discount-2.2.7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11468/">CVE-2018-11468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11468">CVE-2018-11468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12495/">CVE-2018-12495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12495">CVE-2018-12495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909681" comment="discount-2.2.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909682" comment="libmarkdown-devel-2.2.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909683" comment="libmarkdown2-2.2.7-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249040" version="1" class="patch">
	<metadata>
		<title>djvulibre-3.5.28-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the djvulibre-3.5.28-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15142">CVE-2019-15142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15143">CVE-2019-15143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15144">CVE-2019-15144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15145">CVE-2019-15145 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32490">CVE-2021-32490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909684" comment="djvulibre-3.5.28-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909685" comment="djvulibre-doc-3.5.28-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909686" comment="libdjvulibre-devel-3.5.28-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909687" comment="libdjvulibre21-3.5.28-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249041" version="1" class="patch">
	<metadata>
		<title>dnscrypt-proxy-2.1.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the dnscrypt-proxy-2.1.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909688" comment="dnscrypt-proxy-2.1.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249042" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.86-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.86-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909689" comment="dnsmasq-2.86-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909690" comment="dnsmasq-utils-2.86-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249043" version="1" class="patch">
	<metadata>
		<title>docker-20.10.6_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892/" source="CVE"/>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699/" source="CVE"/>
		<reference ref_id="CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509/" source="CVE"/>
		<reference ref_id="CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271/" source="CVE"/>
		<reference ref_id="CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.6_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16539">CVE-2017-16539 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10892">CVE-2018-10892 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20699">CVE-2018-20699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13509">CVE-2019-13509 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14271">CVE-2019-14271 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13401">CVE-2020-13401 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909691" comment="docker-20.10.6_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909692" comment="docker-bash-completion-20.10.6_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909693" comment="docker-fish-completion-20.10.6_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909694" comment="docker-zsh-completion-20.10.6_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249044" version="1" class="patch">
	<metadata>
		<title>docker-distribution-registry-2.7.1-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11468" ref_url="https://www.suse.com/security/cve/CVE-2017-11468/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-distribution-registry-2.7.1-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11468/">CVE-2017-11468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11468">CVE-2017-11468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909695" comment="docker-distribution-registry-2.7.1-7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249045" version="1" class="patch">
	<metadata>
		<title>dom4j-1.6.1-33.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000632" ref_url="https://www.suse.com/security/cve/CVE-2018-1000632/" source="CVE"/>
		<reference ref_id="CVE-2020-10683" ref_url="https://www.suse.com/security/cve/CVE-2020-10683/" source="CVE"/>
		<description>
These are all security issues fixed in the dom4j-1.6.1-33.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000632/">CVE-2018-1000632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000632">CVE-2018-1000632 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10683/">CVE-2020-10683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10683">CVE-2020-10683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909696" comment="dom4j-1.6.1-33.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909697" comment="dom4j-demo-1.6.1-33.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909698" comment="dom4j-javadoc-1.6.1-33.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909699" comment="dom4j-manual-1.6.1-33.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249046" version="1" class="patch">
	<metadata>
		<title>dosbox-0.74.3-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12594" ref_url="https://www.suse.com/security/cve/CVE-2019-12594/" source="CVE"/>
		<reference ref_id="CVE-2019-7165" ref_url="https://www.suse.com/security/cve/CVE-2019-7165/" source="CVE"/>
		<description>
These are all security issues fixed in the dosbox-0.74.3-5.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12594/">CVE-2019-12594 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12594">CVE-2019-12594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7165/">CVE-2019-7165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7165">CVE-2019-7165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909700" comment="dosbox-0.74.3-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249047" version="1" class="patch">
	<metadata>
		<title>dovecot23-2.3.16-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461/" source="CVE"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="CVE-2019-10691" ref_url="https://www.suse.com/security/cve/CVE-2019-10691/" source="CVE"/>
		<reference ref_id="CVE-2019-11494" ref_url="https://www.suse.com/security/cve/CVE-2019-11494/" source="CVE"/>
		<reference ref_id="CVE-2019-11499" ref_url="https://www.suse.com/security/cve/CVE-2019-11499/" source="CVE"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="CVE-2019-19722" ref_url="https://www.suse.com/security/cve/CVE-2019-19722/" source="CVE"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957/" source="CVE"/>
		<reference ref_id="CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958/" source="CVE"/>
		<reference ref_id="CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967/" source="CVE"/>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200/" source="CVE"/>
		<reference ref_id="CVE-2020-7046" ref_url="https://www.suse.com/security/cve/CVE-2020-7046/" source="CVE"/>
		<reference ref_id="CVE-2020-7957" ref_url="https://www.suse.com/security/cve/CVE-2020-7957/" source="CVE"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot23-2.3.16-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14461">CVE-2017-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15130">CVE-2017-15130 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15132">CVE-2017-15132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10691/">CVE-2019-10691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10691">CVE-2019-10691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11494/">CVE-2019-11494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11494">CVE-2019-11494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11499/">CVE-2019-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11499">CVE-2019-11499 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19722/">CVE-2019-19722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19722">CVE-2019-19722 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10957">CVE-2020-10957 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10958">CVE-2020-10958 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10967">CVE-2020-10967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28200">CVE-2020-28200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7046/">CVE-2020-7046 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7046">CVE-2020-7046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7957/">CVE-2020-7957 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7957">CVE-2020-7957 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29157">CVE-2021-29157 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">CVE-2021-33515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909701" comment="dovecot23-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909702" comment="dovecot23-backend-mysql-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909703" comment="dovecot23-backend-pgsql-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909704" comment="dovecot23-backend-sqlite-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909705" comment="dovecot23-devel-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909706" comment="dovecot23-fts-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909707" comment="dovecot23-fts-lucene-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909708" comment="dovecot23-fts-solr-2.3.16-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909709" comment="dovecot23-fts-squat-2.3.16-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249048" version="1" class="patch">
	<metadata>
		<title>dpdk-19.11.8-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="CVE-2020-10725" ref_url="https://www.suse.com/security/cve/CVE-2020-10725/" source="CVE"/>
		<reference ref_id="CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374/" source="CVE"/>
		<reference ref_id="CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375/" source="CVE"/>
		<reference ref_id="CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376/" source="CVE"/>
		<reference ref_id="CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378/" source="CVE"/>
		<description>
These are all security issues fixed in the dpdk-19.11.8-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10725/">CVE-2020-10725 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10725">CVE-2020-10725 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14374">CVE-2020-14374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14375">CVE-2020-14375 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14376">CVE-2020-14376 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14378">CVE-2020-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909710" comment="dpdk-19.11.8-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909711" comment="dpdk-devel-19.11.8-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909712" comment="dpdk-doc-19.11.8-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909713" comment="dpdk-examples-19.11.8-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909714" comment="dpdk-kmp-default-19.11.8_k5.13.13_1-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909715" comment="dpdk-tools-19.11.8-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909716" comment="libdpdk-20_0-19.11.8-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249049" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.14.6-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-5123" ref_url="https://www.suse.com/security/cve/CVE-2017-5123/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-12714" ref_url="https://www.suse.com/security/cve/CVE-2018-12714/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-3887" ref_url="https://www.suse.com/security/cve/CVE-2019-3887/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="CVE-2021-26708" ref_url="https://www.suse.com/security/cve/CVE-2021-26708/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-32606" ref_url="https://www.suse.com/security/cve/CVE-2021-32606/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15129">CVE-2017-15129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16645">CVE-2017-16645 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16647">CVE-2017-16647 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16648">CVE-2017-16648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16995">CVE-2017-16995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16996">CVE-2017-16996 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17448">CVE-2017-17448 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17449">CVE-2017-17449 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17852">CVE-2017-17852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17853">CVE-2017-17853 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17854">CVE-2017-17854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17855">CVE-2017-17855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17856">CVE-2017-17856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17857">CVE-2017-17857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5123/">CVE-2017-5123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5123">CVE-2017-5123 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7541">CVE-2017-7541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10322">CVE-2018-10322 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10323">CVE-2018-10323 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1118">CVE-2018-1118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12232">CVE-2018-12232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12714/">CVE-2018-12714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12714">CVE-2018-12714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8043">CVE-2018-8043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8087">CVE-2018-8087 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15504">CVE-2019-15504 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18812">CVE-2019-18812 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18813">CVE-2019-18813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19252">CVE-2019-19252 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3887/">CVE-2019-3887 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3887">CVE-2019-3887 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8564">CVE-2019-8564 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8912">CVE-2019-8912 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9500">CVE-2019-9500 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26708/">CVE-2021-26708 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32606/">CVE-2021-32606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32606">CVE-2021-32606 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909718" comment="kernel-macros-5.14.6-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909719" comment="kernel-source-5.14.6-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909720" comment="kernel-source-vanilla-5.14.6-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249050" version="1" class="patch">
	<metadata>
		<title>dumb-2.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-3668" ref_url="https://www.suse.com/security/cve/CVE-2006-3668/" source="CVE"/>
		<description>
These are all security issues fixed in the dumb-2.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3668/">CVE-2006-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3668">CVE-2006-3668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909721" comment="dumb-2.0.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909722" comment="dumb-devel-2.0.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909723" comment="dumb-devel-doc-2.0.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909724" comment="libdumb2-2.0.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249051" version="1" class="patch">
	<metadata>
		<title>dxflib-devel-3.26.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21897" ref_url="https://www.suse.com/security/cve/CVE-2021-21897/" source="CVE"/>
		<description>
These are all security issues fixed in the dxflib-devel-3.26.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21897/">CVE-2021-21897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21897">CVE-2021-21897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909725" comment="dxflib-devel-3.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909726" comment="libdxflib-3_26_4-1-3.26.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249052" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.46.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.46.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909727" comment="e2fsprogs-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909728" comment="e2fsprogs-devel-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909729" comment="e2fsprogs-scrub-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909730" comment="libcom_err-devel-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909731" comment="libcom_err-devel-32bit-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909732" comment="libcom_err-devel-static-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909733" comment="libcom_err2-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909734" comment="libcom_err2-32bit-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909735" comment="libext2fs-devel-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909736" comment="libext2fs-devel-32bit-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909737" comment="libext2fs-devel-static-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909738" comment="libext2fs2-1.46.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909739" comment="libext2fs2-32bit-1.46.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249053" version="1" class="patch">
	<metadata>
		<title>eclipse-contributor-tools-4.15-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27225" ref_url="https://www.suse.com/security/cve/CVE-2020-27225/" source="CVE"/>
		<description>
These are all security issues fixed in the eclipse-contributor-tools-4.15-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27225/">CVE-2020-27225 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27225">CVE-2020-27225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909740" comment="eclipse-contributor-tools-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909741" comment="eclipse-equinox-osgi-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909742" comment="eclipse-jdt-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909743" comment="eclipse-p2-discovery-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909744" comment="eclipse-pde-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909745" comment="eclipse-platform-4.15-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909746" comment="eclipse-swt-4.15-3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249054" version="1" class="patch">
	<metadata>
		<title>debuginfod-dummy-client-0.185-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<description>
These are all security issues fixed in the debuginfod-dummy-client-0.185-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7146">CVE-2019-7146 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909747" comment="elfutils-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909748" comment="elfutils-lang-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909749" comment="libasm-devel-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909750" comment="libasm1-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909751" comment="libasm1-32bit-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909752" comment="libdw-devel-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909753" comment="libdw1-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909754" comment="libdw1-32bit-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909755" comment="libelf-devel-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909756" comment="libelf-devel-32bit-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909757" comment="libelf1-0.185-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909758" comment="libelf1-32bit-0.185-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249055" version="1" class="patch">
	<metadata>
		<title>elinks-0.13~0.20190723-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5925" ref_url="https://www.suse.com/security/cve/CVE-2006-5925/" source="CVE"/>
		<description>
These are all security issues fixed in the elinks-0.13~0.20190723-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5925/">CVE-2006-5925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5925">CVE-2006-5925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909759" comment="elinks-0.13~0.20190723-1.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249056" version="1" class="patch">
	<metadata>
		<title>emacs-27.2-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-27.2-6.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909760" comment="emacs-27.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909761" comment="emacs-el-27.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909762" comment="emacs-info-27.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909763" comment="emacs-nox-27.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909764" comment="emacs-x11-27.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909765" comment="etags-27.2-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249057" version="1" class="patch">
	<metadata>
		<title>enigmail-2.2.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17688" ref_url="https://www.suse.com/security/cve/CVE-2017-17688/" source="CVE"/>
		<reference ref_id="CVE-2017-17689" ref_url="https://www.suse.com/security/cve/CVE-2017-17689/" source="CVE"/>
		<reference ref_id="CVE-2018-12019" ref_url="https://www.suse.com/security/cve/CVE-2018-12019/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2019-12269" ref_url="https://www.suse.com/security/cve/CVE-2019-12269/" source="CVE"/>
		<description>
These are all security issues fixed in the enigmail-2.2.4-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17688/">CVE-2017-17688 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17688">CVE-2017-17688 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17689/">CVE-2017-17689 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17689">CVE-2017-17689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12019/">CVE-2018-12019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12019">CVE-2018-12019 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12269/">CVE-2019-12269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12269">CVE-2019-12269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909766" comment="enigmail-2.2.4-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249058" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.6-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.6-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3863">CVE-2008-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909767" comment="enscript-1.6.6-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249059" version="1" class="patch">
	<metadata>
		<title>eog-40.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5978" ref_url="https://www.suse.com/security/cve/CVE-2008-5978/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-40.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5978/">CVE-2008-5978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5978">CVE-2008-5978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909768" comment="eog-40.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909769" comment="eog-devel-40.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909770" comment="eog-lang-40.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249060" version="1" class="patch">
	<metadata>
		<title>epiphany-40.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11396" ref_url="https://www.suse.com/security/cve/CVE-2018-11396/" source="CVE"/>
		<description>
These are all security issues fixed in the epiphany-40.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11396/">CVE-2018-11396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11396">CVE-2018-11396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909771" comment="epiphany-40.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909772" comment="epiphany-branding-upstream-40.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909773" comment="epiphany-lang-40.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909774" comment="gnome-shell-search-provider-epiphany-40.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249061" version="1" class="patch">
	<metadata>
		<title>erlang-24.0.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25623" ref_url="https://www.suse.com/security/cve/CVE-2020-25623/" source="CVE"/>
		<reference ref_id="CVE-2020-35733" ref_url="https://www.suse.com/security/cve/CVE-2020-35733/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-24.0.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25623/">CVE-2020-25623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25623">CVE-2020-25623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35733/">CVE-2020-35733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35733">CVE-2020-35733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909775" comment="erlang-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909776" comment="erlang-debugger-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909777" comment="erlang-debugger-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909778" comment="erlang-dialyzer-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909779" comment="erlang-dialyzer-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909780" comment="erlang-diameter-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909781" comment="erlang-diameter-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909782" comment="erlang-doc-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909783" comment="erlang-epmd-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909784" comment="erlang-et-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909785" comment="erlang-et-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909786" comment="erlang-jinterface-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909787" comment="erlang-jinterface-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909788" comment="erlang-observer-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909789" comment="erlang-observer-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909790" comment="erlang-reltool-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909791" comment="erlang-reltool-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909792" comment="erlang-src-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909793" comment="erlang-wx-24.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909794" comment="erlang-wx-src-24.0.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249062" version="1" class="patch">
	<metadata>
		<title>etcd-3.4.16-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-16886" ref_url="https://www.suse.com/security/cve/CVE-2018-16886/" source="CVE"/>
		<reference ref_id="CVE-2020-15106" ref_url="https://www.suse.com/security/cve/CVE-2020-15106/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.4.16-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16886/">CVE-2018-16886 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16886">CVE-2018-16886 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15106/">CVE-2020-15106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15106">CVE-2020-15106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909795" comment="etcd-3.4.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909796" comment="etcdctl-3.4.16-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249063" version="1" class="patch">
	<metadata>
		<title>evince-40.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-40.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5864">CVE-2006-5864 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000083">CVE-2017-1000083 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909797" comment="evince-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909798" comment="evince-devel-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909799" comment="evince-lang-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909800" comment="evince-plugin-comicsdocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909801" comment="evince-plugin-djvudocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909802" comment="evince-plugin-dvidocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909803" comment="evince-plugin-pdfdocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909804" comment="evince-plugin-psdocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909805" comment="evince-plugin-tiffdocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909806" comment="evince-plugin-xpsdocument-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909807" comment="libevdocument3-4-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909808" comment="libevview3-3-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909809" comment="nautilus-evince-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909810" comment="typelib-1_0-EvinceDocument-3_0-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909811" comment="typelib-1_0-EvinceView-3_0-40.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249064" version="1" class="patch">
	<metadata>
		<title>evolution-3.40.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1108" ref_url="https://www.suse.com/security/cve/CVE-2008-1108/" source="CVE"/>
		<reference ref_id="CVE-2008-1109" ref_url="https://www.suse.com/security/cve/CVE-2008-1109/" source="CVE"/>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-3.40.4-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1108/">CVE-2008-1108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1108">CVE-2008-1108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1109/">CVE-2008-1109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1109">CVE-2008-1109 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15587">CVE-2018-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909812" comment="evolution-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909813" comment="evolution-devel-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909814" comment="evolution-lang-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909815" comment="evolution-plugin-bogofilter-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909816" comment="evolution-plugin-pst-import-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909817" comment="evolution-plugin-spamassassin-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909818" comment="evolution-plugin-text-highlight-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909819" comment="glade-catalog-evolution-3.40.4-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249065" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-3.40.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<reference ref_id="CVE-2020-14928" ref_url="https://www.suse.com/security/cve/CVE-2020-14928/" source="CVE"/>
		<reference ref_id="CVE-2020-16117" ref_url="https://www.suse.com/security/cve/CVE-2020-16117/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-3.40.4-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3257">CVE-2007-3257 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14928/">CVE-2020-14928 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14928">CVE-2020-14928 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16117/">CVE-2020-16117 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16117">CVE-2020-16117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909820" comment="evolution-data-server-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909821" comment="evolution-data-server-devel-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909822" comment="evolution-data-server-lang-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909823" comment="libcamel-1_2-62-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909824" comment="libebackend-1_2-10-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909825" comment="libebook-1_2-20-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909826" comment="libebook-contacts-1_2-3-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909827" comment="libecal-2_0-1-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909828" comment="libedata-book-1_2-26-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909829" comment="libedata-cal-2_0-1-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909830" comment="libedataserver-1_2-26-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909831" comment="libedataserverui-1_2-3-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909832" comment="typelib-1_0-Camel-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909833" comment="typelib-1_0-EBackend-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909834" comment="typelib-1_0-EBook-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909835" comment="typelib-1_0-EBookContacts-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909836" comment="typelib-1_0-ECal-2_0-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909837" comment="typelib-1_0-EDataBook-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909838" comment="typelib-1_0-EDataCal-2_0-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909839" comment="typelib-1_0-EDataServer-1_2-3.40.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909840" comment="typelib-1_0-EDataServerUI-1_2-3.40.4-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249066" version="1" class="patch">
	<metadata>
		<title>exempi-tools-2.5.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731/" source="CVE"/>
		<description>
These are all security issues fixed in the exempi-tools-2.5.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12648">CVE-2018-12648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7728">CVE-2018-7728 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7729">CVE-2018-7729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7731">CVE-2018-7731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909841" comment="exempi-tools-2.5.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909842" comment="libexempi-devel-2.5.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909843" comment="libexempi8-2.5.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909844" comment="libexempi8-32bit-2.5.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249067" version="1" class="patch">
	<metadata>
		<title>exim-4.94.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9963" ref_url="https://www.suse.com/security/cve/CVE-2016-9963/" source="CVE"/>
		<reference ref_id="CVE-2017-1000369" ref_url="https://www.suse.com/security/cve/CVE-2017-1000369/" source="CVE"/>
		<reference ref_id="CVE-2017-16943" ref_url="https://www.suse.com/security/cve/CVE-2017-16943/" source="CVE"/>
		<reference ref_id="CVE-2017-16944" ref_url="https://www.suse.com/security/cve/CVE-2017-16944/" source="CVE"/>
		<reference ref_id="CVE-2018-6789" ref_url="https://www.suse.com/security/cve/CVE-2018-6789/" source="CVE"/>
		<reference ref_id="CVE-2019-10149" ref_url="https://www.suse.com/security/cve/CVE-2019-10149/" source="CVE"/>
		<reference ref_id="CVE-2019-13917" ref_url="https://www.suse.com/security/cve/CVE-2019-13917/" source="CVE"/>
		<reference ref_id="CVE-2019-15846" ref_url="https://www.suse.com/security/cve/CVE-2019-15846/" source="CVE"/>
		<reference ref_id="CVE-2019-16928" ref_url="https://www.suse.com/security/cve/CVE-2019-16928/" source="CVE"/>
		<reference ref_id="CVE-2020-12783" ref_url="https://www.suse.com/security/cve/CVE-2020-12783/" source="CVE"/>
		<reference ref_id="CVE-2020-28007" ref_url="https://www.suse.com/security/cve/CVE-2020-28007/" source="CVE"/>
		<reference ref_id="CVE-2020-28008" ref_url="https://www.suse.com/security/cve/CVE-2020-28008/" source="CVE"/>
		<reference ref_id="CVE-2020-28009" ref_url="https://www.suse.com/security/cve/CVE-2020-28009/" source="CVE"/>
		<reference ref_id="CVE-2020-28010" ref_url="https://www.suse.com/security/cve/CVE-2020-28010/" source="CVE"/>
		<reference ref_id="CVE-2020-28011" ref_url="https://www.suse.com/security/cve/CVE-2020-28011/" source="CVE"/>
		<reference ref_id="CVE-2020-28012" ref_url="https://www.suse.com/security/cve/CVE-2020-28012/" source="CVE"/>
		<reference ref_id="CVE-2020-28013" ref_url="https://www.suse.com/security/cve/CVE-2020-28013/" source="CVE"/>
		<reference ref_id="CVE-2020-28014" ref_url="https://www.suse.com/security/cve/CVE-2020-28014/" source="CVE"/>
		<reference ref_id="CVE-2020-28015" ref_url="https://www.suse.com/security/cve/CVE-2020-28015/" source="CVE"/>
		<reference ref_id="CVE-2020-28016" ref_url="https://www.suse.com/security/cve/CVE-2020-28016/" source="CVE"/>
		<reference ref_id="CVE-2020-28017" ref_url="https://www.suse.com/security/cve/CVE-2020-28017/" source="CVE"/>
		<reference ref_id="CVE-2020-28018" ref_url="https://www.suse.com/security/cve/CVE-2020-28018/" source="CVE"/>
		<reference ref_id="CVE-2020-28019" ref_url="https://www.suse.com/security/cve/CVE-2020-28019/" source="CVE"/>
		<reference ref_id="CVE-2020-28020" ref_url="https://www.suse.com/security/cve/CVE-2020-28020/" source="CVE"/>
		<reference ref_id="CVE-2020-28021" ref_url="https://www.suse.com/security/cve/CVE-2020-28021/" source="CVE"/>
		<reference ref_id="CVE-2020-28022" ref_url="https://www.suse.com/security/cve/CVE-2020-28022/" source="CVE"/>
		<reference ref_id="CVE-2020-28023" ref_url="https://www.suse.com/security/cve/CVE-2020-28023/" source="CVE"/>
		<reference ref_id="CVE-2020-28024" ref_url="https://www.suse.com/security/cve/CVE-2020-28024/" source="CVE"/>
		<reference ref_id="CVE-2020-28025" ref_url="https://www.suse.com/security/cve/CVE-2020-28025/" source="CVE"/>
		<reference ref_id="CVE-2020-28026" ref_url="https://www.suse.com/security/cve/CVE-2020-28026/" source="CVE"/>
		<reference ref_id="CVE-2020-8015" ref_url="https://www.suse.com/security/cve/CVE-2020-8015/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.94.2-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9963/">CVE-2016-9963 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9963">CVE-2016-9963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000369/">CVE-2017-1000369 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000369">CVE-2017-1000369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16943/">CVE-2017-16943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16943">CVE-2017-16943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16944/">CVE-2017-16944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16944">CVE-2017-16944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6789/">CVE-2018-6789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6789">CVE-2018-6789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10149/">CVE-2019-10149 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10149">CVE-2019-10149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13917/">CVE-2019-13917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13917">CVE-2019-13917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15846/">CVE-2019-15846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15846">CVE-2019-15846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16928/">CVE-2019-16928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16928">CVE-2019-16928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12783/">CVE-2020-12783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12783">CVE-2020-12783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28007/">CVE-2020-28007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28007">CVE-2020-28007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28008/">CVE-2020-28008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28008">CVE-2020-28008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28009/">CVE-2020-28009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28009">CVE-2020-28009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28010/">CVE-2020-28010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28010">CVE-2020-28010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28011/">CVE-2020-28011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28011">CVE-2020-28011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28012/">CVE-2020-28012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28012">CVE-2020-28012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28013/">CVE-2020-28013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28013">CVE-2020-28013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28014/">CVE-2020-28014 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28014">CVE-2020-28014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28015/">CVE-2020-28015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28015">CVE-2020-28015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28016/">CVE-2020-28016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28016">CVE-2020-28016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28017/">CVE-2020-28017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28017">CVE-2020-28017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28018/">CVE-2020-28018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28018">CVE-2020-28018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28019/">CVE-2020-28019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28019">CVE-2020-28019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28020/">CVE-2020-28020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28020">CVE-2020-28020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28021/">CVE-2020-28021 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28021">CVE-2020-28021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28022/">CVE-2020-28022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28022">CVE-2020-28022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28023/">CVE-2020-28023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28023">CVE-2020-28023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28024/">CVE-2020-28024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28024">CVE-2020-28024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28025/">CVE-2020-28025 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28025">CVE-2020-28025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28026/">CVE-2020-28026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28026">CVE-2020-28026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8015/">CVE-2020-8015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8015">CVE-2020-8015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909845" comment="exim-4.94.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909846" comment="eximon-4.94.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909847" comment="eximstats-html-4.94.2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249068" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-1000128" ref_url="https://www.suse.com/security/cve/CVE-2017-1000128/" source="CVE"/>
		<reference ref_id="CVE-2017-11338" ref_url="https://www.suse.com/security/cve/CVE-2017-11338/" source="CVE"/>
		<reference ref_id="CVE-2017-11340" ref_url="https://www.suse.com/security/cve/CVE-2017-11340/" source="CVE"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955/" source="CVE"/>
		<reference ref_id="CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000128/">CVE-2017-1000128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000128">CVE-2017-1000128 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11338/">CVE-2017-11338 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11338">CVE-2017-11338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11340/">CVE-2017-11340 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11340">CVE-2017-11340 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11591">CVE-2017-11591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12955">CVE-2017-12955 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12957">CVE-2017-12957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14859">CVE-2017-14859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14860">CVE-2017-14860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14862">CVE-2017-14862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14864">CVE-2017-14864 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12264">CVE-2018-12264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909848" comment="exiv2-0.27.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909849" comment="exiv2-lang-0.27.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909850" comment="libexiv2-27-0.27.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909851" comment="libexiv2-27-32bit-0.27.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909852" comment="libexiv2-devel-0.27.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909853" comment="libexiv2-xmp-static-0.27.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249069" version="1" class="patch">
	<metadata>
		<title>expat-2.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909854" comment="expat-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909855" comment="libexpat-devel-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909856" comment="libexpat-devel-32bit-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909857" comment="libexpat1-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909858" comment="libexpat1-32bit-2.4.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249070" version="1" class="patch">
	<metadata>
		<title>fail2ban-0.11.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32749" ref_url="https://www.suse.com/security/cve/CVE-2021-32749/" source="CVE"/>
		<description>
These are all security issues fixed in the fail2ban-0.11.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32749/">CVE-2021-32749 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32749">CVE-2021-32749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909859" comment="fail2ban-0.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909860" comment="monitoring-plugins-fail2ban-0.11.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249071" version="1" class="patch">
	<metadata>
		<title>fastjar-0.98-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-2322" ref_url="https://www.suse.com/security/cve/CVE-2010-2322/" source="CVE"/>
		<description>
These are all security issues fixed in the fastjar-0.98-26.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2010-2322/">CVE-2010-2322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2322">CVE-2010-2322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909861" comment="fastjar-0.98-26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249072" version="1" class="patch">
	<metadata>
		<title>feh-3.7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7875" ref_url="https://www.suse.com/security/cve/CVE-2017-7875/" source="CVE"/>
		<description>
These are all security issues fixed in the feh-3.7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7875/">CVE-2017-7875 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7875">CVE-2017-7875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909862" comment="feh-3.7-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249073" version="1" class="patch">
	<metadata>
		<title>fence-agents-4.10.0+git.1627556580.31443c15-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10153" ref_url="https://www.suse.com/security/cve/CVE-2019-10153/" source="CVE"/>
		<description>
These are all security issues fixed in the fence-agents-4.10.0+git.1627556580.31443c15-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10153/">CVE-2019-10153 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10153">CVE-2019-10153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909863" comment="fence-agents-4.10.0+git.1627556580.31443c15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909864" comment="fence-agents-amt_ws-4.10.0+git.1627556580.31443c15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909865" comment="fence-agents-devel-4.10.0+git.1627556580.31443c15-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249074" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.4.21-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0321" ref_url="https://www.suse.com/security/cve/CVE-2006-0321/" source="CVE"/>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.4.21-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0321/">CVE-2006-0321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0321">CVE-2006-0321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909866" comment="fetchmail-6.4.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909867" comment="fetchmailconf-6.4.21-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249075" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-10190" ref_url="https://www.suse.com/security/cve/CVE-2016-10190/" source="CVE"/>
		<reference ref_id="CVE-2016-10191" ref_url="https://www.suse.com/security/cve/CVE-2016-10191/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2017-11399" ref_url="https://www.suse.com/security/cve/CVE-2017-11399/" source="CVE"/>
		<reference ref_id="CVE-2017-11665" ref_url="https://www.suse.com/security/cve/CVE-2017-11665/" source="CVE"/>
		<reference ref_id="CVE-2017-14054" ref_url="https://www.suse.com/security/cve/CVE-2017-14054/" source="CVE"/>
		<reference ref_id="CVE-2017-14055" ref_url="https://www.suse.com/security/cve/CVE-2017-14055/" source="CVE"/>
		<reference ref_id="CVE-2017-14056" ref_url="https://www.suse.com/security/cve/CVE-2017-14056/" source="CVE"/>
		<reference ref_id="CVE-2017-14057" ref_url="https://www.suse.com/security/cve/CVE-2017-14057/" source="CVE"/>
		<reference ref_id="CVE-2017-14058" ref_url="https://www.suse.com/security/cve/CVE-2017-14058/" source="CVE"/>
		<reference ref_id="CVE-2017-14059" ref_url="https://www.suse.com/security/cve/CVE-2017-14059/" source="CVE"/>
		<reference ref_id="CVE-2017-14169" ref_url="https://www.suse.com/security/cve/CVE-2017-14169/" source="CVE"/>
		<reference ref_id="CVE-2017-14170" ref_url="https://www.suse.com/security/cve/CVE-2017-14170/" source="CVE"/>
		<reference ref_id="CVE-2017-14171" ref_url="https://www.suse.com/security/cve/CVE-2017-14171/" source="CVE"/>
		<reference ref_id="CVE-2017-14222" ref_url="https://www.suse.com/security/cve/CVE-2017-14222/" source="CVE"/>
		<reference ref_id="CVE-2017-14223" ref_url="https://www.suse.com/security/cve/CVE-2017-14223/" source="CVE"/>
		<reference ref_id="CVE-2017-14225" ref_url="https://www.suse.com/security/cve/CVE-2017-14225/" source="CVE"/>
		<reference ref_id="CVE-2017-15186" ref_url="https://www.suse.com/security/cve/CVE-2017-15186/" source="CVE"/>
		<reference ref_id="CVE-2017-15672" ref_url="https://www.suse.com/security/cve/CVE-2017-15672/" source="CVE"/>
		<reference ref_id="CVE-2017-16840" ref_url="https://www.suse.com/security/cve/CVE-2017-16840/" source="CVE"/>
		<reference ref_id="CVE-2017-17081" ref_url="https://www.suse.com/security/cve/CVE-2017-17081/" source="CVE"/>
		<reference ref_id="CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555/" source="CVE"/>
		<reference ref_id="CVE-2017-7859" ref_url="https://www.suse.com/security/cve/CVE-2017-7859/" source="CVE"/>
		<reference ref_id="CVE-2017-7863" ref_url="https://www.suse.com/security/cve/CVE-2017-7863/" source="CVE"/>
		<reference ref_id="CVE-2017-7866" ref_url="https://www.suse.com/security/cve/CVE-2017-7866/" source="CVE"/>
		<reference ref_id="CVE-2018-13300" ref_url="https://www.suse.com/security/cve/CVE-2018-13300/" source="CVE"/>
		<reference ref_id="CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-15822" ref_url="https://www.suse.com/security/cve/CVE-2018-15822/" source="CVE"/>
		<reference ref_id="CVE-2018-6392" ref_url="https://www.suse.com/security/cve/CVE-2018-6392/" source="CVE"/>
		<reference ref_id="CVE-2018-6621" ref_url="https://www.suse.com/security/cve/CVE-2018-6621/" source="CVE"/>
		<reference ref_id="CVE-2018-7751" ref_url="https://www.suse.com/security/cve/CVE-2018-7751/" source="CVE"/>
		<reference ref_id="CVE-2019-11338" ref_url="https://www.suse.com/security/cve/CVE-2019-11338/" source="CVE"/>
		<reference ref_id="CVE-2019-15942" ref_url="https://www.suse.com/security/cve/CVE-2019-15942/" source="CVE"/>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2020-35964" ref_url="https://www.suse.com/security/cve/CVE-2020-35964/" source="CVE"/>
		<reference ref_id="CVE-2021-33815" ref_url="https://www.suse.com/security/cve/CVE-2021-33815/" source="CVE"/>
		<reference ref_id="CVE-2021-38114" ref_url="https://www.suse.com/security/cve/CVE-2021-38114/" source="CVE"/>
		<reference ref_id="CVE-2021-38171" ref_url="https://www.suse.com/security/cve/CVE-2021-38171/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4-5.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8216">CVE-2015-8216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8217">CVE-2015-8217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8218">CVE-2015-8218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8219">CVE-2015-8219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8363">CVE-2015-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8365">CVE-2015-8365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8661">CVE-2015-8661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8663">CVE-2015-8663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10190/">CVE-2016-10190 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10190">CVE-2016-10190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10191/">CVE-2016-10191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10191">CVE-2016-10191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1897">CVE-2016-1897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11399/">CVE-2017-11399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11399">CVE-2017-11399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11665/">CVE-2017-11665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11665">CVE-2017-11665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14054/">CVE-2017-14054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14054">CVE-2017-14054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14055/">CVE-2017-14055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14055">CVE-2017-14055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14056/">CVE-2017-14056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14056">CVE-2017-14056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14057/">CVE-2017-14057 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14057">CVE-2017-14057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14058/">CVE-2017-14058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14058">CVE-2017-14058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14059/">CVE-2017-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14059">CVE-2017-14059 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14169/">CVE-2017-14169 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14169">CVE-2017-14169 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14170/">CVE-2017-14170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14170">CVE-2017-14170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14171/">CVE-2017-14171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14171">CVE-2017-14171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14222/">CVE-2017-14222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14222">CVE-2017-14222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14223/">CVE-2017-14223 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14223">CVE-2017-14223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14225/">CVE-2017-14225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14225">CVE-2017-14225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15186/">CVE-2017-15186 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15186">CVE-2017-15186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15672/">CVE-2017-15672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15672">CVE-2017-15672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16840/">CVE-2017-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16840">CVE-2017-16840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17081/">CVE-2017-17081 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17081">CVE-2017-17081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17555">CVE-2017-17555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7859/">CVE-2017-7859 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7859">CVE-2017-7859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7863/">CVE-2017-7863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7863">CVE-2017-7863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7866/">CVE-2017-7866 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7866">CVE-2017-7866 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13300/">CVE-2018-13300 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13300">CVE-2018-13300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13305">CVE-2018-13305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15822/">CVE-2018-15822 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15822">CVE-2018-15822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6392/">CVE-2018-6392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6392">CVE-2018-6392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6621/">CVE-2018-6621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6621">CVE-2018-6621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7751/">CVE-2018-7751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7751">CVE-2018-7751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11338/">CVE-2019-11338 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11338">CVE-2019-11338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15942/">CVE-2019-15942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15942">CVE-2019-15942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22046">CVE-2020-22046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35964/">CVE-2020-35964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35964">CVE-2020-35964 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33815/">CVE-2021-33815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33815">CVE-2021-33815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38114/">CVE-2021-38114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38114">CVE-2021-38114 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38171/">CVE-2021-38171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38171">CVE-2021-38171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909868" comment="ffmpeg-4-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909869" comment="ffmpeg-4-libavcodec-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909870" comment="ffmpeg-4-libavdevice-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909871" comment="ffmpeg-4-libavfilter-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909872" comment="ffmpeg-4-libavformat-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909873" comment="ffmpeg-4-libavresample-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909874" comment="ffmpeg-4-libavutil-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909875" comment="ffmpeg-4-libpostproc-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909876" comment="ffmpeg-4-libswresample-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909877" comment="ffmpeg-4-libswscale-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909878" comment="ffmpeg-4-private-devel-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909879" comment="libavcodec58_134-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909880" comment="libavcodec58_134-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909881" comment="libavdevice58_13-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909882" comment="libavdevice58_13-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909883" comment="libavfilter7_110-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909884" comment="libavfilter7_110-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909885" comment="libavformat58_76-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909886" comment="libavformat58_76-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909887" comment="libavresample4_0-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909888" comment="libavresample4_0-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909889" comment="libavutil56_70-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909890" comment="libavutil56_70-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909891" comment="libpostproc55_9-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909892" comment="libpostproc55_9-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909893" comment="libswresample3_9-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909894" comment="libswresample3_9-32bit-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909895" comment="libswscale5_9-4.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909896" comment="libswscale5_9-32bit-4.4-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249076" version="1" class="patch">
	<metadata>
		<title>file-5.40-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<reference ref_id="CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249/" source="CVE"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="CVE-2019-8904" ref_url="https://www.suse.com/security/cve/CVE-2019-8904/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.40-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000249">CVE-2017-1000249 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8904/">CVE-2019-8904 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8904">CVE-2019-8904 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909897" comment="file-5.40-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909898" comment="file-devel-5.40-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909899" comment="file-devel-32bit-5.40-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909900" comment="file-magic-5.40-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909901" comment="libmagic1-5.40-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909902" comment="libmagic1-32bit-5.40-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249077" version="1" class="patch">
	<metadata>
		<title>file-roller-3.40.0-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736/" source="CVE"/>
		<reference ref_id="CVE-2020-36314" ref_url="https://www.suse.com/security/cve/CVE-2020-36314/" source="CVE"/>
		<description>
These are all security issues fixed in the file-roller-3.40.0-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11736">CVE-2020-11736 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36314/">CVE-2020-36314 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36314">CVE-2020-36314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909903" comment="file-roller-3.40.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909904" comment="file-roller-lang-3.40.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909905" comment="nautilus-file-roller-3.40.0-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249078" version="1" class="patch">
	<metadata>
		<title>filezilla-3.55.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5429" ref_url="https://www.suse.com/security/cve/CVE-2019-5429/" source="CVE"/>
		<description>
These are all security issues fixed in the filezilla-3.55.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5429/">CVE-2019-5429 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5429">CVE-2019-5429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909906" comment="filezilla-3.55.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909907" comment="filezilla-devel-3.55.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909908" comment="filezilla-lang-3.55.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249079" version="1" class="patch">
	<metadata>
		<title>findutils-4.8.0-2.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.8.0-2.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909909" comment="findutils-4.8.0-2.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909910" comment="findutils-lang-4.8.0-2.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249080" version="1" class="patch">
	<metadata>
		<title>firejail-0.9.66-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2017-5180" ref_url="https://www.suse.com/security/cve/CVE-2017-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-5206" ref_url="https://www.suse.com/security/cve/CVE-2017-5206/" source="CVE"/>
		<reference ref_id="CVE-2017-5207" ref_url="https://www.suse.com/security/cve/CVE-2017-5207/" source="CVE"/>
		<reference ref_id="CVE-2019-12589" ref_url="https://www.suse.com/security/cve/CVE-2019-12589/" source="CVE"/>
		<reference ref_id="CVE-2020-17367" ref_url="https://www.suse.com/security/cve/CVE-2020-17367/" source="CVE"/>
		<reference ref_id="CVE-2020-17368" ref_url="https://www.suse.com/security/cve/CVE-2020-17368/" source="CVE"/>
		<description>
These are all security issues fixed in the firejail-0.9.66-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5180/">CVE-2017-5180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5180">CVE-2017-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5206/">CVE-2017-5206 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5206">CVE-2017-5206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5207/">CVE-2017-5207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5207">CVE-2017-5207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12589/">CVE-2019-12589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12589">CVE-2019-12589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17367/">CVE-2020-17367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17367">CVE-2020-17367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17368/">CVE-2020-17368 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17368">CVE-2020-17368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909911" comment="firejail-0.9.66-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909912" comment="firejail-bash-completion-0.9.66-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909913" comment="firejail-zsh-completion-0.9.66-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249081" version="1" class="patch">
	<metadata>
		<title>flac-1.3.3-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6888" ref_url="https://www.suse.com/security/cve/CVE-2017-6888/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-1.3.3-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6888/">CVE-2017-6888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6888">CVE-2017-6888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909914" comment="flac-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909915" comment="flac-devel-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909916" comment="flac-devel-32bit-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909917" comment="libFLAC++6-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909918" comment="libFLAC++6-32bit-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909919" comment="libFLAC8-1.3.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909920" comment="libFLAC8-32bit-1.3.3-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249082" version="1" class="patch">
	<metadata>
		<title>flannel-0.14.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-14697" ref_url="https://www.suse.com/security/cve/CVE-2019-14697/" source="CVE"/>
		<description>
These are all security issues fixed in the flannel-0.14.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14697/">CVE-2019-14697 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14697">CVE-2019-14697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909921" comment="flannel-0.14.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909922" comment="flannel-k8s-yaml-0.14.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249083" version="1" class="patch">
	<metadata>
		<title>flatpak-1.11.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.11.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5226">CVE-2017-5226 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10063">CVE-2019-10063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21261">CVE-2021-21261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909923" comment="flatpak-1.11.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909924" comment="flatpak-devel-1.11.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909925" comment="flatpak-zsh-completion-1.11.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909926" comment="libflatpak0-1.11.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909927" comment="system-user-flatpak-1.11.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909928" comment="typelib-1_0-Flatpak-1_0-1.11.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249084" version="1" class="patch">
	<metadata>
		<title>fontforge-20201107-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20201107-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5395">CVE-2020-5395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909929" comment="fontforge-20201107-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909930" comment="fontforge-devel-20201107-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909931" comment="fontforge-doc-20201107-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249085" version="1" class="patch">
	<metadata>
		<title>fossil-2.16-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17459" ref_url="https://www.suse.com/security/cve/CVE-2017-17459/" source="CVE"/>
		<reference ref_id="CVE-2020-24614" ref_url="https://www.suse.com/security/cve/CVE-2020-24614/" source="CVE"/>
		<description>
These are all security issues fixed in the fossil-2.16-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-17459/">CVE-2017-17459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17459">CVE-2017-17459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24614/">CVE-2020-24614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24614">CVE-2020-24614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909932" comment="fossil-2.16-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249086" version="1" class="patch">
	<metadata>
		<title>freeciv-2.6.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0047" ref_url="https://www.suse.com/security/cve/CVE-2006-0047/" source="CVE"/>
		<description>
These are all security issues fixed in the freeciv-2.6.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0047/">CVE-2006-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0047">CVE-2006-0047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909933" comment="freeciv-2.6.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909934" comment="freeciv-gtk3-2.6.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909935" comment="freeciv-lang-2.6.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909936" comment="freeciv-qt-2.6.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249087" version="1" class="patch">
	<metadata>
		<title>freeimage-devel-3.18.0-4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5684" ref_url="https://www.suse.com/security/cve/CVE-2016-5684/" source="CVE"/>
		<reference ref_id="CVE-2019-12211" ref_url="https://www.suse.com/security/cve/CVE-2019-12211/" source="CVE"/>
		<reference ref_id="CVE-2019-12213" ref_url="https://www.suse.com/security/cve/CVE-2019-12213/" source="CVE"/>
		<description>
These are all security issues fixed in the freeimage-devel-3.18.0-4.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5684/">CVE-2016-5684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5684">CVE-2016-5684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12211/">CVE-2019-12211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12211">CVE-2019-12211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12213/">CVE-2019-12213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12213">CVE-2019-12213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909937" comment="freeimage-devel-3.18.0-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909938" comment="libfreeimage3-3.18.0-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909939" comment="libfreeimageplus3-3.18.0-4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249088" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.0.23-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2015-8763" ref_url="https://www.suse.com/security/cve/CVE-2015-8763/" source="CVE"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<reference ref_id="CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.0.23-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8763/">CVE-2015-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8763">CVE-2015-8763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10984">CVE-2017-10984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10985">CVE-2017-10985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10986">CVE-2017-10986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10987">CVE-2017-10987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-10988">CVE-2017-10988 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909940" comment="freeradius-server-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909941" comment="freeradius-server-devel-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909942" comment="freeradius-server-doc-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909943" comment="freeradius-server-krb5-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909944" comment="freeradius-server-ldap-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909945" comment="freeradius-server-ldap-schemas-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909946" comment="freeradius-server-libs-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909947" comment="freeradius-server-mysql-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909948" comment="freeradius-server-perl-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909949" comment="freeradius-server-postgresql-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909950" comment="freeradius-server-python3-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909951" comment="freeradius-server-sqlite-3.0.23-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909952" comment="freeradius-server-utils-3.0.23-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249089" version="1" class="patch">
	<metadata>
		<title>freerdp-2.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177/" source="CVE"/>
		<reference ref_id="CVE-2020-11017" ref_url="https://www.suse.com/security/cve/CVE-2020-11017/" source="CVE"/>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095/" source="CVE"/>
		<reference ref_id="CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096/" source="CVE"/>
		<reference ref_id="CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097/" source="CVE"/>
		<reference ref_id="CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098/" source="CVE"/>
		<reference ref_id="CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099/" source="CVE"/>
		<reference ref_id="CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523/" source="CVE"/>
		<reference ref_id="CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<reference ref_id="CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103/" source="CVE"/>
		<reference ref_id="CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030/" source="CVE"/>
		<reference ref_id="CVE-2020-4031" ref_url="https://www.suse.com/security/cve/CVE-2020-4031/" source="CVE"/>
		<reference ref_id="CVE-2020-4032" ref_url="https://www.suse.com/security/cve/CVE-2020-4032/" source="CVE"/>
		<reference ref_id="CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2834">CVE-2017-2834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2835">CVE-2017-2835 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2836">CVE-2017-2836 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2837">CVE-2017-2837 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2838">CVE-2017-2838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2839">CVE-2017-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0886">CVE-2018-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000852">CVE-2018-1000852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8784">CVE-2018-8784 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8785">CVE-2018-8785 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8786">CVE-2018-8786 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8787">CVE-2018-8787 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8788">CVE-2018-8788 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8789">CVE-2018-8789 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17177">CVE-2019-17177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11017/">CVE-2020-11017 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11017">CVE-2020-11017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11018">CVE-2020-11018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11019">CVE-2020-11019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11038">CVE-2020-11038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11039">CVE-2020-11039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11040">CVE-2020-11040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11041">CVE-2020-11041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11043">CVE-2020-11043 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11095">CVE-2020-11095 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11096">CVE-2020-11096 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11097">CVE-2020-11097 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11098">CVE-2020-11098 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11099">CVE-2020-11099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11521">CVE-2020-11521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11522">CVE-2020-11522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11523">CVE-2020-11523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11524">CVE-2020-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11525">CVE-2020-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11526">CVE-2020-11526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13396">CVE-2020-13396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13397">CVE-2020-13397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13398">CVE-2020-13398 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15103">CVE-2020-15103 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4030">CVE-2020-4030 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4031/">CVE-2020-4031 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4031">CVE-2020-4031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-4032/">CVE-2020-4032 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4032">CVE-2020-4032 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4033">CVE-2020-4033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909953" comment="freerdp-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909954" comment="freerdp-devel-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909955" comment="freerdp-proxy-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909956" comment="freerdp-server-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909957" comment="freerdp-wayland-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909958" comment="libfreerdp2-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909959" comment="libuwac0-0-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909960" comment="libwinpr2-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909961" comment="uwac0-0-devel-2.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909962" comment="winpr2-devel-2.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249090" version="1" class="patch">
	<metadata>
		<title>freetds-config-1.2.21-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508/" source="CVE"/>
		<description>
These are all security issues fixed in the freetds-config-1.2.21-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-13508">CVE-2019-13508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909963" comment="freetds-config-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909964" comment="freetds-devel-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909965" comment="freetds-doc-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909966" comment="freetds-tools-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909967" comment="libct4-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909968" comment="libsybdb5-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909969" comment="libsybdb5-32bit-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909970" comment="libtdsodbc0-1.2.21-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909971" comment="libtdsodbc0-32bit-1.2.21-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249091" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.11.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.11.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6942">CVE-2018-6942 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909972" comment="freetype2-devel-2.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909973" comment="freetype2-devel-32bit-2.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909974" comment="freetype2-profile-tti35-2.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909975" comment="libfreetype6-2.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909976" comment="libfreetype6-32bit-2.11.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249092" version="1" class="patch">
	<metadata>
		<title>freexl-devel-1.0.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2923" ref_url="https://www.suse.com/security/cve/CVE-2017-2923/" source="CVE"/>
		<reference ref_id="CVE-2017-2924" ref_url="https://www.suse.com/security/cve/CVE-2017-2924/" source="CVE"/>
		<reference ref_id="CVE-2018-7435" ref_url="https://www.suse.com/security/cve/CVE-2018-7435/" source="CVE"/>
		<reference ref_id="CVE-2018-7436" ref_url="https://www.suse.com/security/cve/CVE-2018-7436/" source="CVE"/>
		<reference ref_id="CVE-2018-7437" ref_url="https://www.suse.com/security/cve/CVE-2018-7437/" source="CVE"/>
		<reference ref_id="CVE-2018-7438" ref_url="https://www.suse.com/security/cve/CVE-2018-7438/" source="CVE"/>
		<reference ref_id="CVE-2018-7439" ref_url="https://www.suse.com/security/cve/CVE-2018-7439/" source="CVE"/>
		<description>
These are all security issues fixed in the freexl-devel-1.0.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2923/">CVE-2017-2923 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2923">CVE-2017-2923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2924/">CVE-2017-2924 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2924">CVE-2017-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7435/">CVE-2018-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7435">CVE-2018-7435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7436/">CVE-2018-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7436">CVE-2018-7436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7437/">CVE-2018-7437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7437">CVE-2018-7437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7438/">CVE-2018-7438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7438">CVE-2018-7438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7439/">CVE-2018-7439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7439">CVE-2018-7439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909977" comment="freexl-devel-1.0.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909978" comment="libfreexl1-1.0.6-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249093" version="1" class="patch">
	<metadata>
		<title>fribidi-1.0.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<description>
These are all security issues fixed in the fribidi-1.0.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909979" comment="fribidi-1.0.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909980" comment="fribidi-devel-1.0.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909981" comment="libfribidi0-1.0.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909982" comment="libfribidi0-32bit-1.0.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249094" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.6.9-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.6.9-2.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5969">CVE-2006-5969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909983" comment="fvwm2-2.6.9-2.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249095" version="1" class="patch">
	<metadata>
		<title>dfu-tool-1.5.8-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
These are all security issues fixed in the dfu-tool-1.5.8-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909984" comment="dfu-tool-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909985" comment="fwupd-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909986" comment="fwupd-devel-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909987" comment="fwupd-lang-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909988" comment="fwupdtpmevlog-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909989" comment="libfwupd2-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909990" comment="libfwupdplugin1-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909991" comment="typelib-1_0-Fwupd-2_0-1.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909992" comment="typelib-1_0-FwupdPlugin-1_0-1.5.8-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249096" version="1" class="patch">
	<metadata>
		<title>gajim-1.3.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10376" ref_url="https://www.suse.com/security/cve/CVE-2016-10376/" source="CVE"/>
		<description>
These are all security issues fixed in the gajim-1.3.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10376/">CVE-2016-10376 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10376">CVE-2016-10376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909993" comment="gajim-1.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909994" comment="gajim-lang-1.3.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249097" version="1" class="patch">
	<metadata>
		<title>gcab-1.4-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345/" source="CVE"/>
		<description>
These are all security issues fixed in the gcab-1.4-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5345">CVE-2018-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009909995" comment="gcab-1.4-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909996" comment="gcab-devel-1.4-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909997" comment="gcab-lang-1.4-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909998" comment="libgcab-1_0-0-1.4-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009909999" comment="typelib-1_0-GCab-1_0-1.4-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249098" version="1" class="patch">
	<metadata>
		<title>gd-2.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10166">CVE-2016-10166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6912">CVE-2016-6912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6362">CVE-2017-6362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14553">CVE-2018-14553 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910000" comment="gd-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910001" comment="gd-devel-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910002" comment="gd-devel-32bit-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910003" comment="libgd3-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910004" comment="libgd3-32bit-2.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249099" version="1" class="patch">
	<metadata>
		<title>gdb-10.1-11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-10.1-11.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910005" comment="gdb-10.1-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910006" comment="gdbserver-10.1-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249100" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.6-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.6-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29385">CVE-2020-29385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910007" comment="gdk-pixbuf-devel-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910008" comment="gdk-pixbuf-devel-32bit-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910009" comment="gdk-pixbuf-lang-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910010" comment="gdk-pixbuf-query-loaders-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910011" comment="gdk-pixbuf-query-loaders-32bit-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910012" comment="gdk-pixbuf-thumbnailer-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910013" comment="libgdk_pixbuf-2_0-0-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910014" comment="libgdk_pixbuf-2_0-0-32bit-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910015" comment="typelib-1_0-GdkPixbuf-2_0-2.42.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910016" comment="typelib-1_0-GdkPixdata-2_0-2.42.6-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249101" version="1" class="patch">
	<metadata>
		<title>gdm-3.38.2-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164/" source="CVE"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.38.2-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12164">CVE-2017-12164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14424">CVE-2018-14424 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3825">CVE-2019-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910017" comment="gdm-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910018" comment="gdm-branding-upstream-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910019" comment="gdm-devel-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910020" comment="gdm-lang-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910021" comment="gdm-systemd-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910022" comment="gdmflexiserver-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910023" comment="libgdm1-3.38.2-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910024" comment="typelib-1_0-Gdm-1_0-3.38.2-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249102" version="1" class="patch">
	<metadata>
		<title>geary-40.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-24661" ref_url="https://www.suse.com/security/cve/CVE-2020-24661/" source="CVE"/>
		<description>
These are all security issues fixed in the geary-40.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24661/">CVE-2020-24661 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24661">CVE-2020-24661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910025" comment="geary-40.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910026" comment="geary-lang-40.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249103" version="1" class="patch">
	<metadata>
		<title>gegl-0.4.30-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<reference ref_id="CVE-2018-10114" ref_url="https://www.suse.com/security/cve/CVE-2018-10114/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0.4.30-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4433">CVE-2012-4433 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10114/">CVE-2018-10114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10114">CVE-2018-10114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910027" comment="gegl-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910028" comment="gegl-0_4-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910029" comment="gegl-0_4-lang-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910030" comment="gegl-devel-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910031" comment="gegl-doc-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910032" comment="libgegl-0_4-0-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910033" comment="libgegl-0_4-0-32bit-0.4.30-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910034" comment="typelib-1_0-Gegl-0_4-0.4.30-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249104" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.54.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217/" source="CVE"/>
		<reference ref_id="CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218/" source="CVE"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.54.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10217">CVE-2016-10217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10218">CVE-2016-10218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10220">CVE-2016-10220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10317">CVE-2016-10317 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5951">CVE-2017-5951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16510">CVE-2018-16510 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16543">CVE-2018-16543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16585">CVE-2018-16585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">CVE-2018-6616 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910035" comment="ghostscript-9.54.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910036" comment="ghostscript-devel-9.54.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910037" comment="ghostscript-x11-9.54.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249105" version="1" class="patch">
	<metadata>
		<title>giflib-devel-32bit-5.2.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11490" ref_url="https://www.suse.com/security/cve/CVE-2018-11490/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-32bit-5.2.1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11490/">CVE-2018-11490 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11490">CVE-2018-11490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910038" comment="giflib-devel-5.2.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910039" comment="giflib-devel-32bit-5.2.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910040" comment="giflib-progs-5.2.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910041" comment="libgif7-5.2.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910042" comment="libgif7-32bit-5.2.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249106" version="1" class="patch">
	<metadata>
		<title>gimp-2.10.24-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-3404" ref_url="https://www.suse.com/security/cve/CVE-2006-3404/" source="CVE"/>
		<reference ref_id="CVE-2007-2356" ref_url="https://www.suse.com/security/cve/CVE-2007-2356/" source="CVE"/>
		<reference ref_id="CVE-2007-2949" ref_url="https://www.suse.com/security/cve/CVE-2007-2949/" source="CVE"/>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.10.24-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3404/">CVE-2006-3404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3404">CVE-2006-3404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2356/">CVE-2007-2356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2356">CVE-2007-2356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2949/">CVE-2007-2949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2949">CVE-2007-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3126">CVE-2007-3126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910043" comment="gimp-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910044" comment="gimp-devel-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910045" comment="gimp-lang-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910046" comment="gimp-plugin-aa-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910047" comment="gimp-plugins-python-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910048" comment="libgimp-2_0-0-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910049" comment="libgimp-2_0-0-32bit-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910050" comment="libgimpui-2_0-0-2.10.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910051" comment="libgimpui-2_0-0-32bit-2.10.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249107" version="1" class="patch">
	<metadata>
		<title>git-2.33.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-19486" ref_url="https://www.suse.com/security/cve/CVE-2018-19486/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.33.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000117">CVE-2017-1000117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14867">CVE-2017-14867 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15298">CVE-2017-15298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8386">CVE-2017-8386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11233">CVE-2018-11233 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19486/">CVE-2018-19486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19486">CVE-2018-19486 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910052" comment="git-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910053" comment="git-arch-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910054" comment="git-core-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910055" comment="git-credential-gnome-keyring-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910056" comment="git-credential-libsecret-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910057" comment="git-cvs-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910058" comment="git-daemon-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910059" comment="git-doc-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910060" comment="git-email-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910061" comment="git-gui-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910062" comment="git-p4-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910063" comment="git-svn-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910064" comment="git-web-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910065" comment="gitk-2.33.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910066" comment="perl-Git-2.33.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249108" version="1" class="patch">
	<metadata>
		<title>git-annex-8.20210903-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<description>
These are all security issues fixed in the git-annex-8.20210903-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910067" comment="git-annex-8.20210903-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910068" comment="git-annex-bash-completion-8.20210903-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249109" version="1" class="patch">
	<metadata>
		<title>git-delta-0.8.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36376" ref_url="https://www.suse.com/security/cve/CVE-2021-36376/" source="CVE"/>
		<description>
These are all security issues fixed in the git-delta-0.8.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36376/">CVE-2021-36376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36376">CVE-2021-36376 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910069" comment="git-delta-0.8.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249110" version="1" class="patch">
	<metadata>
		<title>gitolite-3.6.12-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16976" ref_url="https://www.suse.com/security/cve/CVE-2018-16976/" source="CVE"/>
		<reference ref_id="CVE-2018-20683" ref_url="https://www.suse.com/security/cve/CVE-2018-20683/" source="CVE"/>
		<description>
These are all security issues fixed in the gitolite-3.6.12-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16976/">CVE-2018-16976 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16976">CVE-2018-16976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20683/">CVE-2018-20683 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20683">CVE-2018-20683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910070" comment="gitolite-3.6.12-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249111" version="1" class="patch">
	<metadata>
		<title>glib-networking-2.68.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<description>
These are all security issues fixed in the glib-networking-2.68.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910071" comment="glib-networking-2.68.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910072" comment="glib-networking-32bit-2.68.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910073" comment="glib-networking-lang-2.68.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249112" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.68.4-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750/" source="CVE"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.68.4-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6750">CVE-2020-6750 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910074" comment="gio-branding-upstream-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910075" comment="glib2-devel-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910076" comment="glib2-devel-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910077" comment="glib2-devel-static-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910078" comment="glib2-lang-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910079" comment="glib2-tests-devel-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910080" comment="glib2-tools-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910081" comment="glib2-tools-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910082" comment="libgio-2_0-0-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910083" comment="libgio-2_0-0-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910084" comment="libgio-fam-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910085" comment="libgio-fam-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910086" comment="libglib-2_0-0-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910087" comment="libglib-2_0-0-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910088" comment="libgmodule-2_0-0-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910089" comment="libgmodule-2_0-0-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910090" comment="libgobject-2_0-0-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910091" comment="libgobject-2_0-0-32bit-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910092" comment="libgthread-2_0-0-2.68.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910093" comment="libgthread-2_0-0-32bit-2.68.4-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249113" version="1" class="patch">
	<metadata>
		<title>glibc-2.34-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-19591" ref_url="https://www.suse.com/security/cve/CVE-2018-19591/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2019-7309" ref_url="https://www.suse.com/security/cve/CVE-2019-7309/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2020-6096" ref_url="https://www.suse.com/security/cve/CVE-2020-6096/" source="CVE"/>
		<reference ref_id="CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.34-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5064">CVE-2009-5064 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3192">CVE-2010-3192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6323">CVE-2016-6323 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000408">CVE-2017-1000408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17426">CVE-2017-17426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18269">CVE-2017-18269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19591/">CVE-2018-19591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19591">CVE-2018-19591 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7309/">CVE-2019-7309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">CVE-2019-7309 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6096/">CVE-2020-6096 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">CVE-2020-6096 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910094" comment="glibc-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910095" comment="glibc-devel-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910096" comment="glibc-devel-static-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910097" comment="glibc-extra-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910098" comment="glibc-html-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910099" comment="glibc-i18ndata-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910100" comment="glibc-info-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910101" comment="glibc-lang-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910102" comment="glibc-locale-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910103" comment="glibc-locale-base-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910104" comment="glibc-profile-2.34-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910105" comment="nscd-2.34-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249114" version="1" class="patch">
	<metadata>
		<title>global-6.6.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17531" ref_url="https://www.suse.com/security/cve/CVE-2017-17531/" source="CVE"/>
		<description>
These are all security issues fixed in the global-6.6.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17531/">CVE-2017-17531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17531">CVE-2017-17531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910106" comment="global-6.6.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249115" version="1" class="patch">
	<metadata>
		<title>glusterfs-9.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1088" ref_url="https://www.suse.com/security/cve/CVE-2018-1088/" source="CVE"/>
		<reference ref_id="CVE-2018-10904" ref_url="https://www.suse.com/security/cve/CVE-2018-10904/" source="CVE"/>
		<reference ref_id="CVE-2018-10911" ref_url="https://www.suse.com/security/cve/CVE-2018-10911/" source="CVE"/>
		<reference ref_id="CVE-2018-10914" ref_url="https://www.suse.com/security/cve/CVE-2018-10914/" source="CVE"/>
		<reference ref_id="CVE-2018-10924" ref_url="https://www.suse.com/security/cve/CVE-2018-10924/" source="CVE"/>
		<reference ref_id="CVE-2018-10927" ref_url="https://www.suse.com/security/cve/CVE-2018-10927/" source="CVE"/>
		<reference ref_id="CVE-2018-10928" ref_url="https://www.suse.com/security/cve/CVE-2018-10928/" source="CVE"/>
		<reference ref_id="CVE-2018-10930" ref_url="https://www.suse.com/security/cve/CVE-2018-10930/" source="CVE"/>
		<description>
These are all security issues fixed in the glusterfs-9.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1088/">CVE-2018-1088 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1088">CVE-2018-1088 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10904/">CVE-2018-10904 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10904">CVE-2018-10904 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10911/">CVE-2018-10911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10911">CVE-2018-10911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10914/">CVE-2018-10914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10914">CVE-2018-10914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10924/">CVE-2018-10924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10924">CVE-2018-10924 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10927/">CVE-2018-10927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10927">CVE-2018-10927 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10928/">CVE-2018-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10928">CVE-2018-10928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10930/">CVE-2018-10930 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10930">CVE-2018-10930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910107" comment="glusterfs-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910108" comment="glusterfs-devel-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910109" comment="libgfapi0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910110" comment="libgfchangelog0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910111" comment="libgfrpc0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910112" comment="libgfxdr0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910113" comment="libglusterd0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910114" comment="libglusterfs0-9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910115" comment="python3-gluster-9.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249116" version="1" class="patch">
	<metadata>
		<title>gnome-autoar-devel-0.4.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241/" source="CVE"/>
		<reference ref_id="CVE-2021-28650" ref_url="https://www.suse.com/security/cve/CVE-2021-28650/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-autoar-devel-0.4.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36241">CVE-2020-36241 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-28650/">CVE-2021-28650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28650">CVE-2021-28650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910116" comment="gnome-autoar-devel-0.4.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910117" comment="libgnome-autoar-0-0-0.4.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910118" comment="libgnome-autoar-gtk-0-0-0.4.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910119" comment="typelib-1_0-GnomeAutoar-0_1-0.4.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910120" comment="typelib-1_0-GnomeAutoarGtk-0_1-0.4.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249117" version="1" class="patch">
	<metadata>
		<title>gnome-desktop-lang-40.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-desktop-lang-40.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11460">CVE-2019-11460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910121" comment="gnome-desktop-lang-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910122" comment="gnome-version-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910123" comment="libgnome-desktop-3-19-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910124" comment="libgnome-desktop-3-devel-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910125" comment="libgnome-desktop-3_0-common-40.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910126" comment="typelib-1_0-GnomeDesktop-3_0-40.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249118" version="1" class="patch">
	<metadata>
		<title>gnome-extensions-40.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-extensions-40.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8288">CVE-2017-8288 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17489">CVE-2020-17489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910127" comment="gnome-extensions-40.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910128" comment="gnome-shell-40.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910129" comment="gnome-shell-calendar-40.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910130" comment="gnome-shell-devel-40.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910131" comment="gnome-shell-lang-40.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249119" version="1" class="patch">
	<metadata>
		<title>gnucash-4.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0007" ref_url="https://www.suse.com/security/cve/CVE-2007-0007/" source="CVE"/>
		<description>
These are all security issues fixed in the gnucash-4.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0007/">CVE-2007-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0007">CVE-2007-0007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910132" comment="gnucash-4.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910133" comment="gnucash-devel-4.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910134" comment="gnucash-lang-4.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910135" comment="python3-gnucash-4.6-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249120" version="1" class="patch">
	<metadata>
		<title>gnuchess-6.2.9-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15767" ref_url="https://www.suse.com/security/cve/CVE-2019-15767/" source="CVE"/>
		<reference ref_id="CVE-2021-30184" ref_url="https://www.suse.com/security/cve/CVE-2021-30184/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuchess-6.2.9-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15767/">CVE-2019-15767 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15767">CVE-2019-15767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30184/">CVE-2021-30184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30184">CVE-2021-30184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910136" comment="gnuchess-6.2.9-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249121" version="1" class="patch">
	<metadata>
		<title>gnuplot-5.4.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<reference ref_id="CVE-2020-25412" ref_url="https://www.suse.com/security/cve/CVE-2020-25412/" source="CVE"/>
		<reference ref_id="CVE-2020-25559" ref_url="https://www.suse.com/security/cve/CVE-2020-25559/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuplot-5.4.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9670">CVE-2017-9670 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19490">CVE-2018-19490 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19492">CVE-2018-19492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25412/">CVE-2020-25412 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25412">CVE-2020-25412 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25559/">CVE-2020-25559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25559">CVE-2020-25559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910137" comment="gnuplot-5.4.2-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249122" version="1" class="patch">
	<metadata>
		<title>gnutls-3.7.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.7.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3829">CVE-2019-3829 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3836">CVE-2019-3836 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">CVE-2020-13777 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910138" comment="gnutls-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910139" comment="gnutls-guile-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910140" comment="libgnutls-dane-devel-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910141" comment="libgnutls-dane0-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910142" comment="libgnutls-devel-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910143" comment="libgnutls-devel-32bit-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910144" comment="libgnutls30-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910145" comment="libgnutls30-32bit-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910146" comment="libgnutls30-hmac-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910147" comment="libgnutlsxx-devel-3.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910148" comment="libgnutlsxx28-3.7.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249123" version="1" class="patch">
	<metadata>
		<title>go-1.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2018-7187" ref_url="https://www.suse.com/security/cve/CVE-2018-7187/" source="CVE"/>
		<reference ref_id="CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486/" source="CVE"/>
		<description>
These are all security issues fixed in the go-1.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7187/">CVE-2018-7187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7187">CVE-2018-7187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6486">CVE-2019-6486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910149" comment="go-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910150" comment="go-doc-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910151" comment="go-race-1.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249124" version="1" class="patch">
	<metadata>
		<title>go1.10-1.10.8-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.10-1.10.8-8.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6486">CVE-2019-6486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910152" comment="go1.10-1.10.8-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910153" comment="go1.10-doc-1.10.8-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910154" comment="go1.10-race-1.10.8-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249125" version="1" class="patch">
	<metadata>
		<title>go1.11-1.11.13-10.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2019-14809" ref_url="https://www.suse.com/security/cve/CVE-2019-14809/" source="CVE"/>
		<reference ref_id="CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.11-1.11.13-10.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14809/">CVE-2019-14809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14809">CVE-2019-14809 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6486">CVE-2019-6486 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910155" comment="go1.11-1.11.13-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910156" comment="go1.11-doc-1.11.13-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910157" comment="go1.11-race-1.11.13-10.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249126" version="1" class="patch">
	<metadata>
		<title>go1.12-1.12.17-4.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2019-11888" ref_url="https://www.suse.com/security/cve/CVE-2019-11888/" source="CVE"/>
		<reference ref_id="CVE-2019-14809" ref_url="https://www.suse.com/security/cve/CVE-2019-14809/" source="CVE"/>
		<reference ref_id="CVE-2019-16276" ref_url="https://www.suse.com/security/cve/CVE-2019-16276/" source="CVE"/>
		<reference ref_id="CVE-2019-17596" ref_url="https://www.suse.com/security/cve/CVE-2019-17596/" source="CVE"/>
		<reference ref_id="CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.12-1.12.17-4.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11888/">CVE-2019-11888 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11888">CVE-2019-11888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14809/">CVE-2019-14809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14809">CVE-2019-14809 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16276/">CVE-2019-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16276">CVE-2019-16276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17596/">CVE-2019-17596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17596">CVE-2019-17596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6486">CVE-2019-6486 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910158" comment="go1.12-1.12.17-4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910159" comment="go1.12-doc-1.12.17-4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910160" comment="go1.12-race-1.12.17-4.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249127" version="1" class="patch">
	<metadata>
		<title>go1.13-1.13.15-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16276" ref_url="https://www.suse.com/security/cve/CVE-2019-16276/" source="CVE"/>
		<reference ref_id="CVE-2019-17596" ref_url="https://www.suse.com/security/cve/CVE-2019-17596/" source="CVE"/>
		<reference ref_id="CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039/" source="CVE"/>
		<reference ref_id="CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586/" source="CVE"/>
		<reference ref_id="CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.13-1.13.15-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16276/">CVE-2019-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16276">CVE-2019-16276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17596/">CVE-2019-17596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17596">CVE-2019-17596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14039">CVE-2020-14039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15586">CVE-2020-15586 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910161" comment="go1.13-1.13.15-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910162" comment="go1.13-doc-1.13.15-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910163" comment="go1.13-race-1.13.15-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249128" version="1" class="patch">
	<metadata>
		<title>go1.14-1.14.15-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039/" source="CVE"/>
		<reference ref_id="CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586/" source="CVE"/>
		<reference ref_id="CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845/" source="CVE"/>
		<reference ref_id="CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553/" source="CVE"/>
		<reference ref_id="CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362/" source="CVE"/>
		<reference ref_id="CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366/" source="CVE"/>
		<reference ref_id="CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367/" source="CVE"/>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.14-1.14.15-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14039">CVE-2020-14039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15586">CVE-2020-15586 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24553">CVE-2020-24553 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3114">CVE-2021-3114 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3115">CVE-2021-3115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910164" comment="go1.14-1.14.15-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910165" comment="go1.14-doc-1.14.15-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910166" comment="go1.14-race-1.14.15-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249129" version="1" class="patch">
	<metadata>
		<title>go1.15-1.15.15-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553/" source="CVE"/>
		<reference ref_id="CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362/" source="CVE"/>
		<reference ref_id="CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366/" source="CVE"/>
		<reference ref_id="CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367/" source="CVE"/>
		<reference ref_id="CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918/" source="CVE"/>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115/" source="CVE"/>
		<reference ref_id="CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525/" source="CVE"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.15-1.15.15-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24553">CVE-2020-24553 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3114">CVE-2021-3114 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3115">CVE-2021-3115 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31525">CVE-2021-31525 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910167" comment="go1.15-1.15.15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910168" comment="go1.15-doc-1.15.15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910169" comment="go1.15-race-1.15.15-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249130" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918/" source="CVE"/>
		<reference ref_id="CVE-2021-27919" ref_url="https://www.suse.com/security/cve/CVE-2021-27919/" source="CVE"/>
		<reference ref_id="CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525/" source="CVE"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27919/">CVE-2021-27919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27919">CVE-2021-27919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31525">CVE-2021-31525 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910170" comment="go1.16-1.16.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910171" comment="go1.16-doc-1.16.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910172" comment="go1.16-race-1.16.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249131" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910173" comment="go1.17-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910174" comment="go1.17-doc-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910175" comment="go1.17-race-1.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249132" version="1" class="patch">
	<metadata>
		<title>go1.4-1.4.3-12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.4-1.4.3-12.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910176" comment="go1.4-1.4.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910177" comment="go1.4-doc-1.4.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910178" comment="go1.4-race-1.4.3-12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249133" version="1" class="patch">
	<metadata>
		<title>go1.9-1.9.7-11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2018-7187" ref_url="https://www.suse.com/security/cve/CVE-2018-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.9-1.9.7-11.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7187/">CVE-2018-7187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7187">CVE-2018-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910179" comment="go1.9-1.9.7-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910180" comment="go1.9-doc-1.9.7-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910181" comment="go1.9-race-1.9.7-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249134" version="1" class="patch">
	<metadata>
		<title>godot-3.3.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26825" ref_url="https://www.suse.com/security/cve/CVE-2021-26825/" source="CVE"/>
		<reference ref_id="CVE-2021-26826" ref_url="https://www.suse.com/security/cve/CVE-2021-26826/" source="CVE"/>
		<description>
These are all security issues fixed in the godot-3.3.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26825/">CVE-2021-26825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26825">CVE-2021-26825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26826/">CVE-2021-26826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26826">CVE-2021-26826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910182" comment="godot-3.3.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910183" comment="godot-bash-completion-3.3.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910184" comment="godot-headless-3.3.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910185" comment="godot-runner-3.3.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910186" comment="godot-server-3.3.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249135" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.27.1-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2021-29622" ref_url="https://www.suse.com/security/cve/CVE-2021-29622/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.27.1-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29622/">CVE-2021-29622 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29622">CVE-2021-29622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910187" comment="golang-github-prometheus-prometheus-2.27.1-4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249136" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.2.27-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0455" ref_url="https://www.suse.com/security/cve/CVE-2006-0455/" source="CVE"/>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<reference ref_id="CVE-2019-14855" ref_url="https://www.suse.com/security/cve/CVE-2019-14855/" source="CVE"/>
		<reference ref_id="CVE-2020-25125" ref_url="https://www.suse.com/security/cve/CVE-2020-25125/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.2.27-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0455/">CVE-2006-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0455">CVE-2006-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9234">CVE-2018-9234 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14855/">CVE-2019-14855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14855">CVE-2019-14855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25125/">CVE-2020-25125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910188" comment="dirmngr-2.2.27-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910189" comment="gpg2-2.2.27-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910190" comment="gpg2-lang-2.2.27-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249137" version="1" class="patch">
	<metadata>
		<title>gptfdisk-1.0.8-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0256" ref_url="https://www.suse.com/security/cve/CVE-2020-0256/" source="CVE"/>
		<reference ref_id="CVE-2021-0308" ref_url="https://www.suse.com/security/cve/CVE-2021-0308/" source="CVE"/>
		<description>
These are all security issues fixed in the gptfdisk-1.0.8-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0256/">CVE-2020-0256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0256">CVE-2020-0256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0308/">CVE-2021-0308 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0308">CVE-2021-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910191" comment="gptfdisk-1.0.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910192" comment="gptfdisk-fixparts-1.0.8-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249138" version="1" class="patch">
	<metadata>
		<title>gradle-4.4.1-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16370" ref_url="https://www.suse.com/security/cve/CVE-2019-16370/" source="CVE"/>
		<description>
These are all security issues fixed in the gradle-4.4.1-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16370/">CVE-2019-16370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16370">CVE-2019-16370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910193" comment="gradle-4.4.1-7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249139" version="1" class="patch">
	<metadata>
		<title>grafana-7.5.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19039" ref_url="https://www.suse.com/security/cve/CVE-2018-19039/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="CVE-2021-27962" ref_url="https://www.suse.com/security/cve/CVE-2021-27962/" source="CVE"/>
		<reference ref_id="CVE-2021-28146" ref_url="https://www.suse.com/security/cve/CVE-2021-28146/" source="CVE"/>
		<reference ref_id="CVE-2021-28148" ref_url="https://www.suse.com/security/cve/CVE-2021-28148/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-7.5.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19039/">CVE-2018-19039 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19039">CVE-2018-19039 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-27962/">CVE-2021-27962 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27962">CVE-2021-27962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28146/">CVE-2021-28146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28146">CVE-2021-28146 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28148/">CVE-2021-28148 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28148">CVE-2021-28148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910194" comment="grafana-7.5.7-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249140" version="1" class="patch">
	<metadata>
		<title>grafana-piechart-panel-1.6.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13429" ref_url="https://www.suse.com/security/cve/CVE-2020-13429/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-piechart-panel-1.6.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13429/">CVE-2020-13429 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13429">CVE-2020-13429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910195" comment="grafana-piechart-panel-1.6.1-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249141" version="1" class="patch">
	<metadata>
		<title>graphite2-1.3.14-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the graphite2-1.3.14-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7999">CVE-2018-7999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910196" comment="graphite2-1.3.14-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910197" comment="graphite2-devel-1.3.14-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910198" comment="libgraphite2-3-1.3.14-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910199" comment="libgraphite2-3-32bit-1.3.14-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249142" version="1" class="patch">
	<metadata>
		<title>graphviz-2.48.0-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-2.48.0-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10196">CVE-2018-10196 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11023">CVE-2019-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910200" comment="graphviz-2.48.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910201" comment="graphviz-devel-2.48.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910202" comment="graphviz-plugins-core-2.48.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910203" comment="libgraphviz6-2.48.0-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249143" version="1" class="patch">
	<metadata>
		<title>grilo-devel-0.3.13-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<description>
These are all security issues fixed in the grilo-devel-0.3.13-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39365">CVE-2021-39365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910204" comment="grilo-devel-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910205" comment="grilo-lang-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910206" comment="grilo-tools-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910207" comment="libgrilo-0_3-0-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910208" comment="libgrlnet-0_3-0-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910209" comment="libgrlpls-0_3-0-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910210" comment="typelib-1_0-Grl-0_3-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910211" comment="typelib-1_0-GrlNet-0_3-0.3.13-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910212" comment="typelib-1_0-GrlPls-0_3-0.3.13-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249144" version="1" class="patch">
	<metadata>
		<title>groovy-2.4.21-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-17521" ref_url="https://www.suse.com/security/cve/CVE-2020-17521/" source="CVE"/>
		<description>
These are all security issues fixed in the groovy-2.4.21-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17521/">CVE-2020-17521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17521">CVE-2020-17521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910213" comment="groovy-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910214" comment="groovy-ant-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910215" comment="groovy-bsf-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910216" comment="groovy-console-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910217" comment="groovy-docgenerator-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910218" comment="groovy-groovydoc-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910219" comment="groovy-groovysh-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910220" comment="groovy-jmx-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910221" comment="groovy-json-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910222" comment="groovy-jsr223-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910223" comment="groovy-lib-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910224" comment="groovy-nio-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910225" comment="groovy-servlet-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910226" comment="groovy-sql-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910227" comment="groovy-swing-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910228" comment="groovy-templates-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910229" comment="groovy-test-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910230" comment="groovy-testng-2.4.21-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910231" comment="groovy-xml-2.4.21-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249145" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910232" comment="grub2-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910233" comment="grub2-branding-upstream-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910234" comment="grub2-i386-pc-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910235" comment="grub2-i386-pc-debug-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910236" comment="grub2-snapper-plugin-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910237" comment="grub2-systemd-sleep-plugin-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910238" comment="grub2-x86_64-efi-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910239" comment="grub2-x86_64-efi-debug-2.06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910240" comment="grub2-x86_64-xen-2.06-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249146" version="1" class="patch">
	<metadata>
		<title>gsoap-devel-2.8.117-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9765" ref_url="https://www.suse.com/security/cve/CVE-2017-9765/" source="CVE"/>
		<description>
These are all security issues fixed in the gsoap-devel-2.8.117-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9765/">CVE-2017-9765 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9765">CVE-2017-9765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910241" comment="gsoap-devel-2.8.117-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910242" comment="gsoap-doc-2.8.117-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910243" comment="libgsoap-2_8_117-2.8.117-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249147" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.18.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.18.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5846">CVE-2017-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910244" comment="gstreamer-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910245" comment="gstreamer-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910246" comment="gstreamer-devel-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910247" comment="gstreamer-devel-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910248" comment="gstreamer-lang-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910249" comment="gstreamer-utils-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910250" comment="libgstreamer-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910251" comment="libgstreamer-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910252" comment="typelib-1_0-Gst-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910253" comment="typelib-1_0-Gst-1_0-32bit-1.18.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249148" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.18.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.18.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910254" comment="gstreamer-plugins-bad-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910255" comment="gstreamer-plugins-bad-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910256" comment="gstreamer-plugins-bad-chromaprint-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910257" comment="gstreamer-plugins-bad-chromaprint-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910258" comment="gstreamer-plugins-bad-devel-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910259" comment="gstreamer-plugins-bad-fluidsynth-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910260" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910261" comment="gstreamer-plugins-bad-lang-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910262" comment="gstreamer-transcoder-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910263" comment="gstreamer-transcoder-devel-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910264" comment="libgstadaptivedemux-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910265" comment="libgstadaptivedemux-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910266" comment="libgstbadaudio-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910267" comment="libgstbadaudio-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910268" comment="libgstbasecamerabinsrc-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910269" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910270" comment="libgstcodecparsers-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910271" comment="libgstcodecparsers-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910272" comment="libgstcodecs-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910273" comment="libgstcodecs-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910274" comment="libgstinsertbin-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910275" comment="libgstinsertbin-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910276" comment="libgstisoff-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910277" comment="libgstisoff-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910278" comment="libgstmpegts-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910279" comment="libgstmpegts-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910280" comment="libgstphotography-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910281" comment="libgstphotography-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910282" comment="libgstplayer-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910283" comment="libgstplayer-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910284" comment="libgstsctp-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910285" comment="libgstsctp-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910286" comment="libgsttranscoder-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910287" comment="libgsturidownloader-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910288" comment="libgsturidownloader-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910289" comment="libgstvulkan-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910290" comment="libgstvulkan-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910291" comment="libgstwayland-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910292" comment="libgstwayland-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910293" comment="libgstwebrtc-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910294" comment="libgstwebrtc-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910295" comment="typelib-1_0-GstBadAudio-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910296" comment="typelib-1_0-GstCodecs-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910297" comment="typelib-1_0-GstInsertBin-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910298" comment="typelib-1_0-GstMpegts-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910299" comment="typelib-1_0-GstPlayer-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910300" comment="typelib-1_0-GstTranscoder-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910301" comment="typelib-1_0-GstVulkan-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910302" comment="typelib-1_0-GstVulkanWayland-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910303" comment="typelib-1_0-GstVulkanXCB-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910304" comment="typelib-1_0-GstWebRTC-1_0-1.18.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249149" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.18.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.18.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910305" comment="gstreamer-plugins-base-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910306" comment="gstreamer-plugins-base-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910307" comment="gstreamer-plugins-base-devel-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910308" comment="gstreamer-plugins-base-devel-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910309" comment="gstreamer-plugins-base-lang-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910310" comment="libgstallocators-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910311" comment="libgstallocators-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910312" comment="libgstapp-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910313" comment="libgstapp-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910314" comment="libgstaudio-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910315" comment="libgstaudio-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910316" comment="libgstfft-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910317" comment="libgstfft-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910318" comment="libgstgl-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910319" comment="libgstgl-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910320" comment="libgstpbutils-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910321" comment="libgstpbutils-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910322" comment="libgstriff-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910323" comment="libgstriff-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910324" comment="libgstrtp-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910325" comment="libgstrtp-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910326" comment="libgstrtsp-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910327" comment="libgstrtsp-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910328" comment="libgstsdp-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910329" comment="libgstsdp-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910330" comment="libgsttag-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910331" comment="libgsttag-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910332" comment="libgstvideo-1_0-0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910333" comment="libgstvideo-1_0-0-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910334" comment="typelib-1_0-GstAllocators-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910335" comment="typelib-1_0-GstApp-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910336" comment="typelib-1_0-GstAudio-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910337" comment="typelib-1_0-GstGL-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910338" comment="typelib-1_0-GstGLEGL-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910339" comment="typelib-1_0-GstGLWayland-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910340" comment="typelib-1_0-GstGLX11-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910341" comment="typelib-1_0-GstPbutils-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910342" comment="typelib-1_0-GstRtp-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910343" comment="typelib-1_0-GstRtsp-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910344" comment="typelib-1_0-GstSdp-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910345" comment="typelib-1_0-GstTag-1_0-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910346" comment="typelib-1_0-GstVideo-1_0-1.18.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249150" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.18.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.18.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910347" comment="gstreamer-plugins-good-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910348" comment="gstreamer-plugins-good-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910349" comment="gstreamer-plugins-good-extra-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910350" comment="gstreamer-plugins-good-extra-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910351" comment="gstreamer-plugins-good-gtk-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910352" comment="gstreamer-plugins-good-jack-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910353" comment="gstreamer-plugins-good-jack-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910354" comment="gstreamer-plugins-good-lang-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910355" comment="gstreamer-plugins-good-qtqml-1.18.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249151" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-ugly-1.18.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-ugly-1.18.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910356" comment="gstreamer-plugins-ugly-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910357" comment="gstreamer-plugins-ugly-32bit-1.18.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910358" comment="gstreamer-plugins-ugly-lang-1.18.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249152" version="1" class="patch">
	<metadata>
		<title>gstreamer-rtsp-server-devel-1.18.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-6095" ref_url="https://www.suse.com/security/cve/CVE-2020-6095/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-rtsp-server-devel-1.18.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6095/">CVE-2020-6095 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6095">CVE-2020-6095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910359" comment="gstreamer-rtsp-server-devel-1.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910360" comment="libgstrtspserver-1_0-0-1.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910361" comment="typelib-1_0-GstRtspServer-1_0-1.18.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249153" version="1" class="patch">
	<metadata>
		<title>gthumb-3.12.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-18718" ref_url="https://www.suse.com/security/cve/CVE-2018-18718/" source="CVE"/>
		<description>
These are all security issues fixed in the gthumb-3.12.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18718/">CVE-2018-18718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18718">CVE-2018-18718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910362" comment="gthumb-3.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910363" comment="gthumb-devel-3.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910364" comment="gthumb-lang-3.12.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249154" version="1" class="patch">
	<metadata>
		<title>gtk-vnc-devel-1.2.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk-vnc-devel-1.2.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910365" comment="gtk-vnc-devel-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910366" comment="gtk-vnc-lang-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910367" comment="gtk-vnc-tools-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910368" comment="libgtk-vnc-2_0-0-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910369" comment="libgvnc-1_0-0-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910370" comment="libgvncpulse-1_0-0-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910371" comment="typelib-1_0-GVnc-1_0-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910372" comment="typelib-1_0-GVncPulse-1_0-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910373" comment="typelib-1_0-GtkVnc-2_0-1.2.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249155" version="1" class="patch">
	<metadata>
		<title>gtk2-branding-upstream-2.24.33-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-2975" ref_url="https://www.suse.com/security/cve/CVE-2005-2975/" source="CVE"/>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-branding-upstream-2.24.33-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2975/">CVE-2005-2975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2975">CVE-2005-2975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0010">CVE-2007-0010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910374" comment="gtk2-branding-upstream-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910375" comment="gtk2-data-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910376" comment="gtk2-devel-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910377" comment="gtk2-devel-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910378" comment="gtk2-immodule-amharic-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910379" comment="gtk2-immodule-amharic-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910380" comment="gtk2-immodule-inuktitut-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910381" comment="gtk2-immodule-inuktitut-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910382" comment="gtk2-immodule-multipress-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910383" comment="gtk2-immodule-multipress-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910384" comment="gtk2-immodule-thai-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910385" comment="gtk2-immodule-thai-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910386" comment="gtk2-immodule-tigrigna-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910387" comment="gtk2-immodule-tigrigna-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910388" comment="gtk2-immodule-vietnamese-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910389" comment="gtk2-immodule-vietnamese-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910390" comment="gtk2-immodule-xim-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910391" comment="gtk2-immodule-xim-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910392" comment="gtk2-lang-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910393" comment="gtk2-tools-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910394" comment="gtk2-tools-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910395" comment="libgtk-2_0-0-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910396" comment="libgtk-2_0-0-32bit-2.24.33-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910397" comment="typelib-1_0-Gtk-2_0-2.24.33-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249156" version="1" class="patch">
	<metadata>
		<title>guava-30.1.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8908" ref_url="https://www.suse.com/security/cve/CVE-2020-8908/" source="CVE"/>
		<description>
These are all security issues fixed in the guava-30.1.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8908/">CVE-2020-8908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8908">CVE-2020-8908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910398" comment="guava-30.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910399" comment="guava-javadoc-30.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910400" comment="guava-testlib-30.1.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249157" version="1" class="patch">
	<metadata>
		<title>guix-1.3.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-27851" ref_url="https://www.suse.com/security/cve/CVE-2021-27851/" source="CVE"/>
		<description>
These are all security issues fixed in the guix-1.3.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27851/">CVE-2021-27851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27851">CVE-2021-27851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910401" comment="guix-1.3.0-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249158" version="1" class="patch">
	<metadata>
		<title>libgupnp-1_2-0-1.2.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695/" source="CVE"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<description>
These are all security issues fixed in the libgupnp-1_2-0-1.2.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12695">CVE-2020-12695 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33516">CVE-2021-33516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910402" comment="libgupnp-1_2-0-1.2.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910403" comment="libgupnp-1_2-0-32bit-1.2.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910404" comment="libgupnp-devel-1.2.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910405" comment="typelib-1_0-GUPnP-1_0-1.2.7-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249159" version="1" class="patch">
	<metadata>
		<title>gvfs-1.48.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447/" source="CVE"/>
		<reference ref_id="CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448/" source="CVE"/>
		<reference ref_id="CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449/" source="CVE"/>
		<reference ref_id="CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795/" source="CVE"/>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
These are all security issues fixed in the gvfs-1.48.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12447">CVE-2019-12447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12448">CVE-2019-12448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12449">CVE-2019-12449 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12795">CVE-2019-12795 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3827">CVE-2019-3827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910406" comment="gvfs-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910407" comment="gvfs-32bit-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910408" comment="gvfs-backend-afc-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910409" comment="gvfs-backend-samba-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910410" comment="gvfs-backends-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910411" comment="gvfs-devel-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910412" comment="gvfs-fuse-1.48.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910413" comment="gvfs-lang-1.48.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249160" version="1" class="patch">
	<metadata>
		<title>haproxy-2.4.4+git0.acb1d0bea-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11469" ref_url="https://www.suse.com/security/cve/CVE-2018-11469/" source="CVE"/>
		<reference ref_id="CVE-2018-14645" ref_url="https://www.suse.com/security/cve/CVE-2018-14645/" source="CVE"/>
		<reference ref_id="CVE-2018-20103" ref_url="https://www.suse.com/security/cve/CVE-2018-20103/" source="CVE"/>
		<reference ref_id="CVE-2018-20615" ref_url="https://www.suse.com/security/cve/CVE-2018-20615/" source="CVE"/>
		<reference ref_id="CVE-2019-14241" ref_url="https://www.suse.com/security/cve/CVE-2019-14241/" source="CVE"/>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="CVE-2020-11100" ref_url="https://www.suse.com/security/cve/CVE-2020-11100/" source="CVE"/>
		<reference ref_id="CVE-2021-39240" ref_url="https://www.suse.com/security/cve/CVE-2021-39240/" source="CVE"/>
		<reference ref_id="CVE-2021-40346" ref_url="https://www.suse.com/security/cve/CVE-2021-40346/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-2.4.4+git0.acb1d0bea-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11469/">CVE-2018-11469 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11469">CVE-2018-11469 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14645/">CVE-2018-14645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14645">CVE-2018-14645 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20103/">CVE-2018-20103 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20103">CVE-2018-20103 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20615/">CVE-2018-20615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20615">CVE-2018-20615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14241/">CVE-2019-14241 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14241">CVE-2019-14241 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18277">CVE-2019-18277 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11100/">CVE-2020-11100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11100">CVE-2020-11100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39240/">CVE-2021-39240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39240">CVE-2021-39240 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40346/">CVE-2021-40346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40346">CVE-2021-40346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910414" comment="haproxy-2.4.4+git0.acb1d0bea-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249161" version="1" class="patch">
	<metadata>
		<title>haserl-0.9.36-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29133" ref_url="https://www.suse.com/security/cve/CVE-2021-29133/" source="CVE"/>
		<description>
These are all security issues fixed in the haserl-0.9.36-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29133/">CVE-2021-29133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29133">CVE-2021-29133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910415" comment="haserl-0.9.36-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249162" version="1" class="patch">
	<metadata>
		<title>helm-3.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910416" comment="helm-3.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910417" comment="helm-bash-completion-3.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910418" comment="helm-zsh-completion-3.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249163" version="1" class="patch">
	<metadata>
		<title>helm-mirror-0.3.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-18658" ref_url="https://www.suse.com/security/cve/CVE-2019-18658/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-mirror-0.3.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18658/">CVE-2019-18658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18658">CVE-2019-18658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910419" comment="helm-mirror-0.3.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249164" version="1" class="patch">
	<metadata>
		<title>hexchat-2.14.3-4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the hexchat-2.14.3-4.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910420" comment="hexchat-2.14.3-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910421" comment="hexchat-devel-2.14.3-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910422" comment="hexchat-lang-2.14.3-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910423" comment="hexchat-plugins-lua-2.14.3-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910424" comment="hexchat-plugins-perl-2.14.3-4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910425" comment="hexchat-plugins-python3-2.14.3-4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249165" version="1" class="patch">
	<metadata>
		<title>hiredis-1.0.0-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7105" ref_url="https://www.suse.com/security/cve/CVE-2020-7105/" source="CVE"/>
		<description>
These are all security issues fixed in the hiredis-1.0.0-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7105/">CVE-2020-7105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7105">CVE-2020-7105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910426" comment="hiredis-1.0.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910427" comment="hiredis-devel-1.0.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910428" comment="libhiredis1_0_0-1.0.0-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249166" version="1" class="patch">
	<metadata>
		<title>hivex-1.3.21-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<description>
These are all security issues fixed in the hivex-1.3.21-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910429" comment="hivex-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910430" comment="hivex-devel-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910431" comment="hivex-lang-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910432" comment="libhivex0-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910433" comment="ocaml-hivex-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910434" comment="ocaml-hivex-devel-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910435" comment="perl-Win-Hivex-1.3.21-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910436" comment="python3-hivex-1.3.21-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249167" version="1" class="patch">
	<metadata>
		<title>hostapd-2.9-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9496" ref_url="https://www.suse.com/security/cve/CVE-2019-9496/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695/" source="CVE"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<description>
These are all security issues fixed in the hostapd-2.9-6.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9496/">CVE-2019-9496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9496">CVE-2019-9496 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12695">CVE-2020-12695 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910437" comment="hostapd-2.9-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249168" version="1" class="patch">
	<metadata>
		<title>hplip-3.21.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.21.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5208">CVE-2007-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910438" comment="hplip-3.21.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910439" comment="hplip-devel-3.21.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910440" comment="hplip-hpijs-3.21.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910441" comment="hplip-sane-3.21.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910442" comment="hplip-scan-utils-3.21.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249169" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.12-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20308" ref_url="https://www.suse.com/security/cve/CVE-2021-20308/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.12-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20308/">CVE-2021-20308 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20308">CVE-2021-20308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910443" comment="htmldoc-1.9.12-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249170" version="1" class="patch">
	<metadata>
		<title>httpie-2.5.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10751" ref_url="https://www.suse.com/security/cve/CVE-2019-10751/" source="CVE"/>
		<description>
These are all security issues fixed in the httpie-2.5.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10751/">CVE-2019-10751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10751">CVE-2019-10751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910444" comment="httpie-2.5.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249171" version="1" class="patch">
	<metadata>
		<title>hugin-2020.0.0-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5200" ref_url="https://www.suse.com/security/cve/CVE-2007-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the hugin-2020.0.0-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5200/">CVE-2007-5200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5200">CVE-2007-5200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910445" comment="hugin-2020.0.0-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249172" version="1" class="patch">
	<metadata>
		<title>hunspell-1.7.0-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
These are all security issues fixed in the hunspell-1.7.0-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910446" comment="hunspell-1.7.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910447" comment="hunspell-devel-1.7.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910448" comment="hunspell-devel-32bit-1.7.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910449" comment="hunspell-tools-1.7.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910450" comment="libhunspell-1_7-0-1.7.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910451" comment="libhunspell-1_7-0-32bit-1.7.0-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249173" version="1" class="patch">
	<metadata>
		<title>hylafax+-7.0.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17141" ref_url="https://www.suse.com/security/cve/CVE-2018-17141/" source="CVE"/>
		<reference ref_id="CVE-2020-15396" ref_url="https://www.suse.com/security/cve/CVE-2020-15396/" source="CVE"/>
		<reference ref_id="CVE-2020-15397" ref_url="https://www.suse.com/security/cve/CVE-2020-15397/" source="CVE"/>
		<reference ref_id="CVE-2020-8024" ref_url="https://www.suse.com/security/cve/CVE-2020-8024/" source="CVE"/>
		<description>
These are all security issues fixed in the hylafax+-7.0.3-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17141/">CVE-2018-17141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17141">CVE-2018-17141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15396/">CVE-2020-15396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15396">CVE-2020-15396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15397/">CVE-2020-15397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15397">CVE-2020-15397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8024/">CVE-2020-8024 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8024">CVE-2020-8024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910452" comment="hylafax+-7.0.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910453" comment="hylafax+-client-7.0.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910454" comment="libfaxutil7_0_3-7.0.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249174" version="1" class="patch">
	<metadata>
		<title>ibus-1.5.25-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-1.5.25-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910455" comment="ibus-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910456" comment="ibus-devel-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910457" comment="ibus-dict-emoji-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910458" comment="ibus-gtk-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910459" comment="ibus-gtk-32bit-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910460" comment="ibus-gtk3-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910461" comment="ibus-gtk3-32bit-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910462" comment="ibus-lang-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910463" comment="libibus-1_0-5-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910464" comment="libibus-1_0-5-32bit-1.5.25-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910465" comment="typelib-1_0-IBus-1_0-1.5.25-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249175" version="1" class="patch">
	<metadata>
		<title>icecream-1.3.1-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the icecream-1.3.1-3.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910466" comment="icecream-1.3.1-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910467" comment="icecream-clang-wrappers-1.3.1-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910468" comment="libicecream-devel-1.3.1-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249176" version="1" class="patch">
	<metadata>
		<title>icedtea-web-1.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10181" ref_url="https://www.suse.com/security/cve/CVE-2019-10181/" source="CVE"/>
		<reference ref_id="CVE-2019-10182" ref_url="https://www.suse.com/security/cve/CVE-2019-10182/" source="CVE"/>
		<reference ref_id="CVE-2019-10185" ref_url="https://www.suse.com/security/cve/CVE-2019-10185/" source="CVE"/>
		<description>
These are all security issues fixed in the icedtea-web-1.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10181/">CVE-2019-10181 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10181">CVE-2019-10181 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10182/">CVE-2019-10182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10182">CVE-2019-10182 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10185/">CVE-2019-10185 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10185">CVE-2019-10185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910469" comment="icedtea-web-1.8.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910470" comment="icedtea-web-javadoc-1.8.6-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249177" version="1" class="patch">
	<metadata>
		<title>icinga2-2.13.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16933" ref_url="https://www.suse.com/security/cve/CVE-2017-16933/" source="CVE"/>
		<reference ref_id="CVE-2018-6534" ref_url="https://www.suse.com/security/cve/CVE-2018-6534/" source="CVE"/>
		<reference ref_id="CVE-2020-14004" ref_url="https://www.suse.com/security/cve/CVE-2020-14004/" source="CVE"/>
		<reference ref_id="CVE-2020-29663" ref_url="https://www.suse.com/security/cve/CVE-2020-29663/" source="CVE"/>
		<reference ref_id="CVE-2021-32739" ref_url="https://www.suse.com/security/cve/CVE-2021-32739/" source="CVE"/>
		<reference ref_id="CVE-2021-32743" ref_url="https://www.suse.com/security/cve/CVE-2021-32743/" source="CVE"/>
		<reference ref_id="CVE-2021-37698" ref_url="https://www.suse.com/security/cve/CVE-2021-37698/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga2-2.13.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16933/">CVE-2017-16933 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16933">CVE-2017-16933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6534/">CVE-2018-6534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6534">CVE-2018-6534 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14004/">CVE-2020-14004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14004">CVE-2020-14004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29663/">CVE-2020-29663 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29663">CVE-2020-29663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32739/">CVE-2021-32739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32739">CVE-2021-32739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32743/">CVE-2021-32743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32743">CVE-2021-32743 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37698/">CVE-2021-37698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37698">CVE-2021-37698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910471" comment="icinga2-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910472" comment="icinga2-bin-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910473" comment="icinga2-common-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910474" comment="icinga2-doc-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910475" comment="icinga2-ido-mysql-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910476" comment="icinga2-ido-pgsql-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910477" comment="nano-icinga2-2.13.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910478" comment="vim-icinga2-2.13.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249178" version="1" class="patch">
	<metadata>
		<title>icingacli-2.8.4-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-18246" ref_url="https://www.suse.com/security/cve/CVE-2018-18246/" source="CVE"/>
		<reference ref_id="CVE-2018-18247" ref_url="https://www.suse.com/security/cve/CVE-2018-18247/" source="CVE"/>
		<reference ref_id="CVE-2018-18248" ref_url="https://www.suse.com/security/cve/CVE-2018-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-18249" ref_url="https://www.suse.com/security/cve/CVE-2018-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-18250" ref_url="https://www.suse.com/security/cve/CVE-2018-18250/" source="CVE"/>
		<reference ref_id="CVE-2020-24368" ref_url="https://www.suse.com/security/cve/CVE-2020-24368/" source="CVE"/>
		<description>
These are all security issues fixed in the icingacli-2.8.4-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18246/">CVE-2018-18246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18246">CVE-2018-18246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18247/">CVE-2018-18247 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18247">CVE-2018-18247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18248/">CVE-2018-18248 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18248">CVE-2018-18248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18249/">CVE-2018-18249 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18249">CVE-2018-18249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18250/">CVE-2018-18250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18250">CVE-2018-18250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24368/">CVE-2020-24368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24368">CVE-2020-24368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910479" comment="icingacli-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910480" comment="icingaweb2-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910481" comment="icingaweb2-common-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910482" comment="icingaweb2-vendor-HTMLPurifier-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910483" comment="icingaweb2-vendor-JShrink-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910484" comment="icingaweb2-vendor-Parsedown-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910485" comment="icingaweb2-vendor-dompdf-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910486" comment="icingaweb2-vendor-lessphp-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910487" comment="icingaweb2-vendor-zf1-2.8.4-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910488" comment="php-Icinga-2.8.4-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249179" version="1" class="patch">
	<metadata>
		<title>icoutils-0.32.3-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5208" ref_url="https://www.suse.com/security/cve/CVE-2017-5208/" source="CVE"/>
		<reference ref_id="CVE-2017-5333" ref_url="https://www.suse.com/security/cve/CVE-2017-5333/" source="CVE"/>
		<reference ref_id="CVE-2017-6009" ref_url="https://www.suse.com/security/cve/CVE-2017-6009/" source="CVE"/>
		<reference ref_id="CVE-2017-6011" ref_url="https://www.suse.com/security/cve/CVE-2017-6011/" source="CVE"/>
		<description>
These are all security issues fixed in the icoutils-0.32.3-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5208/">CVE-2017-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5208">CVE-2017-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5333/">CVE-2017-5333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5333">CVE-2017-5333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6009/">CVE-2017-6009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6009">CVE-2017-6009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6011/">CVE-2017-6011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6011">CVE-2017-6011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910489" comment="icoutils-0.32.3-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249180" version="1" class="patch">
	<metadata>
		<title>icu-69.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-69.1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910490" comment="icu-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910491" comment="libicu-devel-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910492" comment="libicu-devel-32bit-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910493" comment="libicu-doc-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910494" comment="libicu69-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910495" comment="libicu69-32bit-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910496" comment="libicu69-bedata-69.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910497" comment="libicu69-ledata-69.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249181" version="1" class="patch">
	<metadata>
		<title>ikiwiki-3.20200202.3-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0169" ref_url="https://www.suse.com/security/cve/CVE-2008-0169/" source="CVE"/>
		<reference ref_id="CVE-2009-2944" ref_url="https://www.suse.com/security/cve/CVE-2009-2944/" source="CVE"/>
		<reference ref_id="CVE-2011-0428" ref_url="https://www.suse.com/security/cve/CVE-2011-0428/" source="CVE"/>
		<reference ref_id="CVE-2011-1401" ref_url="https://www.suse.com/security/cve/CVE-2011-1401/" source="CVE"/>
		<reference ref_id="CVE-2012-0220" ref_url="https://www.suse.com/security/cve/CVE-2012-0220/" source="CVE"/>
		<reference ref_id="CVE-2014-1572" ref_url="https://www.suse.com/security/cve/CVE-2014-1572/" source="CVE"/>
		<reference ref_id="CVE-2016-10026" ref_url="https://www.suse.com/security/cve/CVE-2016-10026/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-4561" ref_url="https://www.suse.com/security/cve/CVE-2016-4561/" source="CVE"/>
		<reference ref_id="CVE-2016-9645" ref_url="https://www.suse.com/security/cve/CVE-2016-9645/" source="CVE"/>
		<reference ref_id="CVE-2016-9646" ref_url="https://www.suse.com/security/cve/CVE-2016-9646/" source="CVE"/>
		<reference ref_id="CVE-2017-0356" ref_url="https://www.suse.com/security/cve/CVE-2017-0356/" source="CVE"/>
		<reference ref_id="CVE-2019-9187" ref_url="https://www.suse.com/security/cve/CVE-2019-9187/" source="CVE"/>
		<description>
These are all security issues fixed in the ikiwiki-3.20200202.3-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0169/">CVE-2008-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0169">CVE-2008-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2944/">CVE-2009-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2944">CVE-2009-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0428/">CVE-2011-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0428">CVE-2011-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1401/">CVE-2011-1401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1401">CVE-2011-1401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0220/">CVE-2012-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0220">CVE-2012-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1572/">CVE-2014-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1572">CVE-2014-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10026/">CVE-2016-10026 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10026">CVE-2016-10026 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4561/">CVE-2016-4561 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4561">CVE-2016-4561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9645/">CVE-2016-9645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9645">CVE-2016-9645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9646/">CVE-2016-9646 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9646">CVE-2016-9646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0356/">CVE-2017-0356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0356">CVE-2017-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9187/">CVE-2019-9187 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9187">CVE-2019-9187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910498" comment="ikiwiki-3.20200202.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910499" comment="ikiwiki-w3m-3.20200202.3-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249182" version="1" class="patch">
	<metadata>
		<title>imlib2-1.7.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2426" ref_url="https://www.suse.com/security/cve/CVE-2008-2426/" source="CVE"/>
		<reference ref_id="CVE-2008-5187" ref_url="https://www.suse.com/security/cve/CVE-2008-5187/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-1.7.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2426/">CVE-2008-2426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2426">CVE-2008-2426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5187/">CVE-2008-5187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5187">CVE-2008-5187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910500" comment="imlib2-1.7.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910501" comment="imlib2-devel-1.7.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910502" comment="imlib2-filters-1.7.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910503" comment="imlib2-loaders-1.7.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910504" comment="libImlib2-1-1.7.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249183" version="1" class="patch">
	<metadata>
		<title>inn-2.6.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692/" source="CVE"/>
		<description>
These are all security issues fixed in the inn-2.6.3-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3692">CVE-2019-3692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910505" comment="inn-2.6.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910506" comment="inn-devel-2.6.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910507" comment="mininews-2.6.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249184" version="1" class="patch">
	<metadata>
		<title>ioquake3-1.36+git.20210720-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2082" ref_url="https://www.suse.com/security/cve/CVE-2006-2082/" source="CVE"/>
		<reference ref_id="CVE-2006-2236" ref_url="https://www.suse.com/security/cve/CVE-2006-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the ioquake3-1.36+git.20210720-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2082/">CVE-2006-2082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2082">CVE-2006-2082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2236/">CVE-2006-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2236">CVE-2006-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910508" comment="ioquake3-1.36+git.20210720-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910509" comment="ioquake3-devel-1.36+git.20210720-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249185" version="1" class="patch">
	<metadata>
		<title>ipmitool-1.8.18.238.gb7adc1d-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the ipmitool-1.8.18.238.gb7adc1d-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910510" comment="ipmitool-1.8.18.238.gb7adc1d-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910511" comment="ipmitool-bmc-snmp-proxy-1.8.18.238.gb7adc1d-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249186" version="1" class="patch">
	<metadata>
		<title>irssi-1.2.3-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10965" ref_url="https://www.suse.com/security/cve/CVE-2017-10965/" source="CVE"/>
		<reference ref_id="CVE-2017-10966" ref_url="https://www.suse.com/security/cve/CVE-2017-10966/" source="CVE"/>
		<reference ref_id="CVE-2017-15227" ref_url="https://www.suse.com/security/cve/CVE-2017-15227/" source="CVE"/>
		<reference ref_id="CVE-2017-15228" ref_url="https://www.suse.com/security/cve/CVE-2017-15228/" source="CVE"/>
		<reference ref_id="CVE-2017-15721" ref_url="https://www.suse.com/security/cve/CVE-2017-15721/" source="CVE"/>
		<reference ref_id="CVE-2017-15722" ref_url="https://www.suse.com/security/cve/CVE-2017-15722/" source="CVE"/>
		<reference ref_id="CVE-2017-15723" ref_url="https://www.suse.com/security/cve/CVE-2017-15723/" source="CVE"/>
		<reference ref_id="CVE-2017-5193" ref_url="https://www.suse.com/security/cve/CVE-2017-5193/" source="CVE"/>
		<reference ref_id="CVE-2017-5194" ref_url="https://www.suse.com/security/cve/CVE-2017-5194/" source="CVE"/>
		<reference ref_id="CVE-2017-5195" ref_url="https://www.suse.com/security/cve/CVE-2017-5195/" source="CVE"/>
		<reference ref_id="CVE-2017-5196" ref_url="https://www.suse.com/security/cve/CVE-2017-5196/" source="CVE"/>
		<reference ref_id="CVE-2017-5356" ref_url="https://www.suse.com/security/cve/CVE-2017-5356/" source="CVE"/>
		<reference ref_id="CVE-2017-9468" ref_url="https://www.suse.com/security/cve/CVE-2017-9468/" source="CVE"/>
		<reference ref_id="CVE-2017-9469" ref_url="https://www.suse.com/security/cve/CVE-2017-9469/" source="CVE"/>
		<reference ref_id="CVE-2018-5205" ref_url="https://www.suse.com/security/cve/CVE-2018-5205/" source="CVE"/>
		<reference ref_id="CVE-2018-5206" ref_url="https://www.suse.com/security/cve/CVE-2018-5206/" source="CVE"/>
		<reference ref_id="CVE-2018-5207" ref_url="https://www.suse.com/security/cve/CVE-2018-5207/" source="CVE"/>
		<reference ref_id="CVE-2018-5208" ref_url="https://www.suse.com/security/cve/CVE-2018-5208/" source="CVE"/>
		<reference ref_id="CVE-2018-7050" ref_url="https://www.suse.com/security/cve/CVE-2018-7050/" source="CVE"/>
		<reference ref_id="CVE-2018-7051" ref_url="https://www.suse.com/security/cve/CVE-2018-7051/" source="CVE"/>
		<reference ref_id="CVE-2018-7052" ref_url="https://www.suse.com/security/cve/CVE-2018-7052/" source="CVE"/>
		<reference ref_id="CVE-2018-7053" ref_url="https://www.suse.com/security/cve/CVE-2018-7053/" source="CVE"/>
		<reference ref_id="CVE-2018-7054" ref_url="https://www.suse.com/security/cve/CVE-2018-7054/" source="CVE"/>
		<reference ref_id="CVE-2019-13045" ref_url="https://www.suse.com/security/cve/CVE-2019-13045/" source="CVE"/>
		<reference ref_id="CVE-2019-15717" ref_url="https://www.suse.com/security/cve/CVE-2019-15717/" source="CVE"/>
		<reference ref_id="CVE-2019-5882" ref_url="https://www.suse.com/security/cve/CVE-2019-5882/" source="CVE"/>
		<description>
These are all security issues fixed in the irssi-1.2.3-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10965/">CVE-2017-10965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10965">CVE-2017-10965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10966/">CVE-2017-10966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10966">CVE-2017-10966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15227/">CVE-2017-15227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15227">CVE-2017-15227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15228/">CVE-2017-15228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15228">CVE-2017-15228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15721/">CVE-2017-15721 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15721">CVE-2017-15721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15722/">CVE-2017-15722 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15722">CVE-2017-15722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15723/">CVE-2017-15723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15723">CVE-2017-15723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5193/">CVE-2017-5193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5193">CVE-2017-5193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5194/">CVE-2017-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5194">CVE-2017-5194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5195/">CVE-2017-5195 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5195">CVE-2017-5195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5196/">CVE-2017-5196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5196">CVE-2017-5196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5356/">CVE-2017-5356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5356">CVE-2017-5356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9468/">CVE-2017-9468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9468">CVE-2017-9468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9469/">CVE-2017-9469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9469">CVE-2017-9469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5205/">CVE-2018-5205 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5205">CVE-2018-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5206/">CVE-2018-5206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5206">CVE-2018-5206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5207/">CVE-2018-5207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5207">CVE-2018-5207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5208/">CVE-2018-5208 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5208">CVE-2018-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7050/">CVE-2018-7050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7050">CVE-2018-7050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7051/">CVE-2018-7051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7051">CVE-2018-7051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7052/">CVE-2018-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7052">CVE-2018-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7053/">CVE-2018-7053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7053">CVE-2018-7053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7054/">CVE-2018-7054 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7054">CVE-2018-7054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13045/">CVE-2019-13045 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13045">CVE-2019-13045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15717/">CVE-2019-15717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15717">CVE-2019-15717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5882/">CVE-2019-5882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5882">CVE-2019-5882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910512" comment="irssi-1.2.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910513" comment="irssi-devel-1.2.3-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249187" version="1" class="patch">
	<metadata>
		<title>isync-1.4.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20247" ref_url="https://www.suse.com/security/cve/CVE-2021-20247/" source="CVE"/>
		<reference ref_id="CVE-2021-3578" ref_url="https://www.suse.com/security/cve/CVE-2021-3578/" source="CVE"/>
		<description>
These are all security issues fixed in the isync-1.4.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20247/">CVE-2021-20247 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20247">CVE-2021-20247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3578/">CVE-2021-3578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3578">CVE-2021-3578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910514" comment="isync-1.4.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249188" version="1" class="patch">
	<metadata>
		<title>iucode-tool-2.3.1-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-0357" ref_url="https://www.suse.com/security/cve/CVE-2017-0357/" source="CVE"/>
		<description>
These are all security issues fixed in the iucode-tool-2.3.1-1.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0357/">CVE-2017-0357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0357">CVE-2017-0357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910515" comment="iucode-tool-2.3.1-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249189" version="1" class="patch">
	<metadata>
		<title>jackson-databind-2.10.5.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11307" ref_url="https://www.suse.com/security/cve/CVE-2018-11307/" source="CVE"/>
		<reference ref_id="CVE-2018-12022" ref_url="https://www.suse.com/security/cve/CVE-2018-12022/" source="CVE"/>
		<reference ref_id="CVE-2018-12023" ref_url="https://www.suse.com/security/cve/CVE-2018-12023/" source="CVE"/>
		<reference ref_id="CVE-2018-14718" ref_url="https://www.suse.com/security/cve/CVE-2018-14718/" source="CVE"/>
		<reference ref_id="CVE-2018-14721" ref_url="https://www.suse.com/security/cve/CVE-2018-14721/" source="CVE"/>
		<reference ref_id="CVE-2018-19360" ref_url="https://www.suse.com/security/cve/CVE-2018-19360/" source="CVE"/>
		<reference ref_id="CVE-2018-19361" ref_url="https://www.suse.com/security/cve/CVE-2018-19361/" source="CVE"/>
		<reference ref_id="CVE-2018-7489" ref_url="https://www.suse.com/security/cve/CVE-2018-7489/" source="CVE"/>
		<reference ref_id="CVE-2019-12086" ref_url="https://www.suse.com/security/cve/CVE-2019-12086/" source="CVE"/>
		<reference ref_id="CVE-2019-12384" ref_url="https://www.suse.com/security/cve/CVE-2019-12384/" source="CVE"/>
		<reference ref_id="CVE-2019-12814" ref_url="https://www.suse.com/security/cve/CVE-2019-12814/" source="CVE"/>
		<reference ref_id="CVE-2019-14379" ref_url="https://www.suse.com/security/cve/CVE-2019-14379/" source="CVE"/>
		<reference ref_id="CVE-2019-14439" ref_url="https://www.suse.com/security/cve/CVE-2019-14439/" source="CVE"/>
		<reference ref_id="CVE-2019-14540" ref_url="https://www.suse.com/security/cve/CVE-2019-14540/" source="CVE"/>
		<reference ref_id="CVE-2019-14893" ref_url="https://www.suse.com/security/cve/CVE-2019-14893/" source="CVE"/>
		<reference ref_id="CVE-2019-16942" ref_url="https://www.suse.com/security/cve/CVE-2019-16942/" source="CVE"/>
		<reference ref_id="CVE-2019-17267" ref_url="https://www.suse.com/security/cve/CVE-2019-17267/" source="CVE"/>
		<reference ref_id="CVE-2019-17531" ref_url="https://www.suse.com/security/cve/CVE-2019-17531/" source="CVE"/>
		<reference ref_id="CVE-2019-20330" ref_url="https://www.suse.com/security/cve/CVE-2019-20330/" source="CVE"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-35728" ref_url="https://www.suse.com/security/cve/CVE-2020-35728/" source="CVE"/>
		<reference ref_id="CVE-2021-20190" ref_url="https://www.suse.com/security/cve/CVE-2021-20190/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-databind-2.10.5.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11307/">CVE-2018-11307 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11307">CVE-2018-11307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12022/">CVE-2018-12022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12022">CVE-2018-12022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12023/">CVE-2018-12023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12023">CVE-2018-12023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14718/">CVE-2018-14718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14718">CVE-2018-14718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14721/">CVE-2018-14721 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14721">CVE-2018-14721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19360/">CVE-2018-19360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19360">CVE-2018-19360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19361/">CVE-2018-19361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19361">CVE-2018-19361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7489/">CVE-2018-7489 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7489">CVE-2018-7489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12086/">CVE-2019-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12086">CVE-2019-12086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12384/">CVE-2019-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12384">CVE-2019-12384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12814/">CVE-2019-12814 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12814">CVE-2019-12814 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14379/">CVE-2019-14379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14379">CVE-2019-14379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14439/">CVE-2019-14439 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14439">CVE-2019-14439 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14540/">CVE-2019-14540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14540">CVE-2019-14540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14893/">CVE-2019-14893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14893">CVE-2019-14893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16942/">CVE-2019-16942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16942">CVE-2019-16942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17267/">CVE-2019-17267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17267">CVE-2019-17267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17531/">CVE-2019-17531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17531">CVE-2019-17531 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20330/">CVE-2019-20330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20330">CVE-2019-20330 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35728/">CVE-2020-35728 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20190/">CVE-2021-20190 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910516" comment="jackson-databind-2.10.5.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910517" comment="jackson-databind-javadoc-2.10.5.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249190" version="1" class="patch">
	<metadata>
		<title>jasper-2.0.33-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-13748" ref_url="https://www.suse.com/security/cve/CVE-2017-13748/" source="CVE"/>
		<reference ref_id="CVE-2017-13750" ref_url="https://www.suse.com/security/cve/CVE-2017-13750/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-2.0.33-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9387">CVE-2016-9387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9399">CVE-2016-9399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9557">CVE-2016-9557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13748/">CVE-2017-13748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13748">CVE-2017-13748 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13750/">CVE-2017-13750 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13750">CVE-2017-13750 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14132">CVE-2017-14132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5499">CVE-2017-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5503">CVE-2017-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18873">CVE-2018-18873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19139">CVE-2018-19139 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19539">CVE-2018-19539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19540">CVE-2018-19540 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19541">CVE-2018-19541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19542">CVE-2018-19542 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19543">CVE-2018-19543 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20570">CVE-2018-20570 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20622">CVE-2018-20622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9055">CVE-2018-9055 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9154">CVE-2018-9154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9252">CVE-2018-9252 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910518" comment="jasper-2.0.33-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910519" comment="libjasper-devel-2.0.33-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910520" comment="libjasper4-2.0.33-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910521" comment="libjasper4-32bit-2.0.33-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249191" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.11.0-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.11.0-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910522" comment="java-11-openj9-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910523" comment="java-11-openj9-accessibility-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910524" comment="java-11-openj9-demo-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910525" comment="java-11-openj9-devel-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910526" comment="java-11-openj9-headless-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910527" comment="java-11-openj9-javadoc-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910528" comment="java-11-openj9-jmods-11.0.11.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910529" comment="java-11-openj9-src-11.0.11.0-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249192" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.12.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3157" ref_url="https://www.suse.com/security/cve/CVE-2018-3157/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2825">CVE-2018-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2826">CVE-2018-2826 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2972">CVE-2018-2972 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3150">CVE-2018-3150 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3157/">CVE-2018-3157 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3157">CVE-2018-3157 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2818">CVE-2019-2818 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2821">CVE-2019-2821 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2977">CVE-2019-2977 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2655">CVE-2020-2655 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2767">CVE-2020-2767 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2778">CVE-2020-2778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2816">CVE-2020-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910530" comment="java-11-openjdk-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910531" comment="java-11-openjdk-accessibility-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910532" comment="java-11-openjdk-demo-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910533" comment="java-11-openjdk-devel-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910534" comment="java-11-openjdk-headless-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910535" comment="java-11-openjdk-javadoc-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910536" comment="java-11-openjdk-jmods-11.0.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910537" comment="java-11-openjdk-src-11.0.12.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249193" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.8.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3157" ref_url="https://www.suse.com/security/cve/CVE-2018-3157/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2825">CVE-2018-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2826">CVE-2018-2826 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2972">CVE-2018-2972 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3150">CVE-2018-3150 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3157/">CVE-2018-3157 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3157">CVE-2018-3157 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2818">CVE-2019-2818 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2821">CVE-2019-2821 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2977">CVE-2019-2977 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2655">CVE-2020-2655 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2767">CVE-2020-2767 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2778">CVE-2020-2778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2816">CVE-2020-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910538" comment="java-13-openjdk-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910539" comment="java-13-openjdk-accessibility-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910540" comment="java-13-openjdk-demo-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910541" comment="java-13-openjdk-devel-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910542" comment="java-13-openjdk-headless-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910543" comment="java-13-openjdk-javadoc-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910544" comment="java-13-openjdk-jmods-13.0.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910545" comment="java-13-openjdk-src-13.0.8.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249194" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3157" ref_url="https://www.suse.com/security/cve/CVE-2018-3157/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2825">CVE-2018-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2826">CVE-2018-2826 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2972">CVE-2018-2972 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3150">CVE-2018-3150 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3157/">CVE-2018-3157 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3157">CVE-2018-3157 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910546" comment="java-15-openjdk-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910547" comment="java-15-openjdk-accessibility-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910548" comment="java-15-openjdk-demo-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910549" comment="java-15-openjdk-devel-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910550" comment="java-15-openjdk-headless-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910551" comment="java-15-openjdk-javadoc-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910552" comment="java-15-openjdk-jmods-15.0.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910553" comment="java-15-openjdk-src-15.0.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249195" version="1" class="patch">
	<metadata>
		<title>java-16-openjdk-16.0.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
These are all security issues fixed in the java-16-openjdk-16.0.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910554" comment="java-16-openjdk-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910555" comment="java-16-openjdk-accessibility-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910556" comment="java-16-openjdk-demo-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910557" comment="java-16-openjdk-devel-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910558" comment="java-16-openjdk-headless-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910559" comment="java-16-openjdk-javadoc-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910560" comment="java-16-openjdk-jmods-16.0.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910561" comment="java-16-openjdk-src-16.0.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249196" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.292-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.292-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910562" comment="java-1_8_0-openj9-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910563" comment="java-1_8_0-openj9-accessibility-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910564" comment="java-1_8_0-openj9-demo-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910565" comment="java-1_8_0-openj9-devel-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910566" comment="java-1_8_0-openj9-headless-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910567" comment="java-1_8_0-openj9-javadoc-1.8.0.292-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910568" comment="java-1_8_0-openj9-src-1.8.0.292-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249197" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.302-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5549">CVE-2016-5549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10078">CVE-2017-10078 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10086">CVE-2017-10086 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10114">CVE-2017-10114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10118">CVE-2017-10118 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10176">CVE-2017-10176 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3260">CVE-2017-3260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3512">CVE-2017-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2938">CVE-2018-2938 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910569" comment="java-1_8_0-openjdk-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910570" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910571" comment="java-1_8_0-openjdk-demo-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910572" comment="java-1_8_0-openjdk-devel-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910573" comment="java-1_8_0-openjdk-headless-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910574" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910575" comment="java-1_8_0-openjdk-src-1.8.0.302-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249198" version="1" class="patch">
	<metadata>
		<title>jdom2-2.0.6-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<description>
These are all security issues fixed in the jdom2-2.0.6-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33813">CVE-2021-33813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910576" comment="jdom2-2.0.6-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910577" comment="jdom2-javadoc-2.0.6-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249199" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.43-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27218" ref_url="https://www.suse.com/security/cve/CVE-2020-27218/" source="CVE"/>
		<reference ref_id="CVE-2020-27223" ref_url="https://www.suse.com/security/cve/CVE-2020-27223/" source="CVE"/>
		<reference ref_id="CVE-2021-28163" ref_url="https://www.suse.com/security/cve/CVE-2021-28163/" source="CVE"/>
		<reference ref_id="CVE-2021-28164" ref_url="https://www.suse.com/security/cve/CVE-2021-28164/" source="CVE"/>
		<reference ref_id="CVE-2021-28165" ref_url="https://www.suse.com/security/cve/CVE-2021-28165/" source="CVE"/>
		<reference ref_id="CVE-2021-28169" ref_url="https://www.suse.com/security/cve/CVE-2021-28169/" source="CVE"/>
		<reference ref_id="CVE-2021-34429" ref_url="https://www.suse.com/security/cve/CVE-2021-34429/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.43-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27218/">CVE-2020-27218 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27218">CVE-2020-27218 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27223/">CVE-2020-27223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27223">CVE-2020-27223 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28163/">CVE-2021-28163 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28163">CVE-2021-28163 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28164/">CVE-2021-28164 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28164">CVE-2021-28164 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28165/">CVE-2021-28165 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28165">CVE-2021-28165 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28169/">CVE-2021-28169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28169">CVE-2021-28169 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-34429/">CVE-2021-34429 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34429">CVE-2021-34429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910578" comment="jetty-annotations-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910579" comment="jetty-ant-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910580" comment="jetty-cdi-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910581" comment="jetty-client-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910582" comment="jetty-continuation-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910583" comment="jetty-deploy-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910584" comment="jetty-fcgi-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910585" comment="jetty-http-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910586" comment="jetty-http-spi-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910587" comment="jetty-io-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910588" comment="jetty-jaas-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910589" comment="jetty-jmx-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910590" comment="jetty-jndi-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910591" comment="jetty-jsp-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910592" comment="jetty-minimal-javadoc-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910593" comment="jetty-openid-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910594" comment="jetty-plus-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910595" comment="jetty-proxy-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910596" comment="jetty-quickstart-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910597" comment="jetty-rewrite-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910598" comment="jetty-security-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910599" comment="jetty-server-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910600" comment="jetty-servlet-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910601" comment="jetty-servlets-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910602" comment="jetty-start-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910603" comment="jetty-util-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910604" comment="jetty-util-ajax-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910605" comment="jetty-webapp-9.4.43-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910606" comment="jetty-xml-9.4.43-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249200" version="1" class="patch">
	<metadata>
		<title>jgraphx-3.9.2-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18197" ref_url="https://www.suse.com/security/cve/CVE-2017-18197/" source="CVE"/>
		<description>
These are all security issues fixed in the jgraphx-3.9.2-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18197/">CVE-2017-18197 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18197">CVE-2017-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910607" comment="jgraphx-3.9.2-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249201" version="1" class="patch">
	<metadata>
		<title>jhead-3.06.0.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3822" ref_url="https://www.suse.com/security/cve/CVE-2016-3822/" source="CVE"/>
		<reference ref_id="CVE-2018-16554" ref_url="https://www.suse.com/security/cve/CVE-2018-16554/" source="CVE"/>
		<reference ref_id="CVE-2018-17088" ref_url="https://www.suse.com/security/cve/CVE-2018-17088/" source="CVE"/>
		<reference ref_id="CVE-2018-6612" ref_url="https://www.suse.com/security/cve/CVE-2018-6612/" source="CVE"/>
		<reference ref_id="CVE-2021-3496" ref_url="https://www.suse.com/security/cve/CVE-2021-3496/" source="CVE"/>
		<description>
These are all security issues fixed in the jhead-3.06.0.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3822/">CVE-2016-3822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3822">CVE-2016-3822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16554/">CVE-2018-16554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16554">CVE-2018-16554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17088/">CVE-2018-17088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17088">CVE-2018-17088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6612/">CVE-2018-6612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6612">CVE-2018-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3496/">CVE-2021-3496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3496">CVE-2021-3496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910608" comment="jhead-3.06.0.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249202" version="1" class="patch">
	<metadata>
		<title>jq-1.6-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-4074" ref_url="https://www.suse.com/security/cve/CVE-2016-4074/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.6-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4074/">CVE-2016-4074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4074">CVE-2016-4074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905172" comment="jq-1.6-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910609" comment="libjq-devel-1.6-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905173" comment="libjq1-1.6-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249203" version="1" class="patch">
	<metadata>
		<title>jsoup-1.14.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<description>
These are all security issues fixed in the jsoup-1.14.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37714">CVE-2021-37714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910610" comment="jsoup-1.14.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910611" comment="jsoup-javadoc-1.14.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249204" version="1" class="patch">
	<metadata>
		<title>jsr-305-3.0.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<description>
These are all security issues fixed in the jsr-305-3.0.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37714">CVE-2021-37714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910612" comment="jsr-305-3.0.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910613" comment="jsr-305-javadoc-3.0.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249205" version="1" class="patch">
	<metadata>
		<title>k3s-1.21.3+k3s1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-1002101" ref_url="https://www.suse.com/security/cve/CVE-2019-1002101/" source="CVE"/>
		<reference ref_id="CVE-2019-9946" ref_url="https://www.suse.com/security/cve/CVE-2019-9946/" source="CVE"/>
		<description>
These are all security issues fixed in the k3s-1.21.3+k3s1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-1002101/">CVE-2019-1002101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1002101">CVE-2019-1002101 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9946/">CVE-2019-9946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9946">CVE-2019-9946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910614" comment="k3s-1.21.3+k3s1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249206" version="1" class="patch">
	<metadata>
		<title>kaffeine-2.0.18-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0051" ref_url="https://www.suse.com/security/cve/CVE-2006-0051/" source="CVE"/>
		<description>
These are all security issues fixed in the kaffeine-2.0.18-1.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0051/">CVE-2006-0051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0051">CVE-2006-0051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910615" comment="kaffeine-2.0.18-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910616" comment="kaffeine-lang-2.0.18-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249207" version="1" class="patch">
	<metadata>
		<title>kafka-source-2.1.0-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1288" ref_url="https://www.suse.com/security/cve/CVE-2018-1288/" source="CVE"/>
		<reference ref_id="CVE-2018-7489" ref_url="https://www.suse.com/security/cve/CVE-2018-7489/" source="CVE"/>
		<description>
These are all security issues fixed in the kafka-source-2.1.0-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1288/">CVE-2018-1288 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1288">CVE-2018-1288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7489/">CVE-2018-7489 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7489">CVE-2018-7489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910617" comment="kafka-source-2.1.0-3.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249208" version="1" class="patch">
	<metadata>
		<title>kauth-devel-5.86.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<reference ref_id="CVE-2019-7443" ref_url="https://www.suse.com/security/cve/CVE-2019-7443/" source="CVE"/>
		<description>
These are all security issues fixed in the kauth-devel-5.86.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8422">CVE-2017-8422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7443/">CVE-2019-7443 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7443">CVE-2019-7443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910618" comment="kauth-devel-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910619" comment="libKF5Auth5-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910620" comment="libKF5Auth5-lang-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910621" comment="libKF5AuthCore5-5.86.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249209" version="1" class="patch">
	<metadata>
		<title>kcodecs-devel-5.86.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<description>
These are all security issues fixed in the kcodecs-devel-5.86.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0779">CVE-2013-0779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910622" comment="kcodecs-devel-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910623" comment="libKF5Codecs5-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910624" comment="libKF5Codecs5-lang-5.86.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249210" version="1" class="patch">
	<metadata>
		<title>kconf_update5-5.86.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14744" ref_url="https://www.suse.com/security/cve/CVE-2019-14744/" source="CVE"/>
		<description>
These are all security issues fixed in the kconf_update5-5.86.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14744/">CVE-2019-14744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14744">CVE-2019-14744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910625" comment="kconf_update5-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910626" comment="kconfig-devel-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910627" comment="libKF5ConfigCore5-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910628" comment="libKF5ConfigCore5-lang-5.86.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910629" comment="libKF5ConfigGui5-5.86.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249211" version="1" class="patch">
	<metadata>
		<title>kdeconnect-kde-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26164" ref_url="https://www.suse.com/security/cve/CVE-2020-26164/" source="CVE"/>
		<description>
These are all security issues fixed in the kdeconnect-kde-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26164/">CVE-2020-26164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26164">CVE-2020-26164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910630" comment="kdeconnect-kde-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910631" comment="kdeconnect-kde-lang-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910632" comment="kdeconnect-kde-zsh-completion-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249212" version="1" class="patch">
	<metadata>
		<title>kdenetwork-filesharing-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork-filesharing-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1000">CVE-2010-1000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910633" comment="kdenetwork-filesharing-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910634" comment="kdenetwork-filesharing-lang-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249213" version="1" class="patch">
	<metadata>
		<title>kdump-0.9.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.9.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5759">CVE-2016-5759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910635" comment="kdump-0.9.1-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249214" version="1" class="patch">
	<metadata>
		<title>keepalived-2.2.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19044" ref_url="https://www.suse.com/security/cve/CVE-2018-19044/" source="CVE"/>
		<reference ref_id="CVE-2018-19045" ref_url="https://www.suse.com/security/cve/CVE-2018-19045/" source="CVE"/>
		<reference ref_id="CVE-2018-19046" ref_url="https://www.suse.com/security/cve/CVE-2018-19046/" source="CVE"/>
		<description>
These are all security issues fixed in the keepalived-2.2.2-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19044/">CVE-2018-19044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19044">CVE-2018-19044 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-19045/">CVE-2018-19045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19045">CVE-2018-19045 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-19046/">CVE-2018-19046 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19046">CVE-2018-19046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910636" comment="keepalived-2.2.2-4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249215" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20210901-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20210901-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910637" comment="kernel-firmware-20210901-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910638" comment="ucode-amd-20210901-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249216" version="1" class="patch">
	<metadata>
		<title>kismet-2021_08_R1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2020-9395" ref_url="https://www.suse.com/security/cve/CVE-2020-9395/" source="CVE"/>
		<description>
These are all security issues fixed in the kismet-2021_08_R1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9395/">CVE-2020-9395 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9395">CVE-2020-9395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910639" comment="kismet-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910640" comment="kismet-capture-bt-geiger-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910641" comment="kismet-capture-freaklabs-zigbee-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910642" comment="kismet-capture-linux-bluetooth-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910643" comment="kismet-capture-linux-wifi-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910644" comment="kismet-capture-nrf-51822-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910645" comment="kismet-capture-nrf-52840-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910646" comment="kismet-capture-nrf-mousejack-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910647" comment="kismet-capture-nrf-nxp-kw41z-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910648" comment="kismet-capture-rz-killerbee-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910649" comment="kismet-capture-sdr-rtl433-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910650" comment="kismet-capture-sdr-rtladsb-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910651" comment="kismet-capture-sdr-rtlamr-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910652" comment="kismet-capture-ti-cc-2531-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910653" comment="kismet-capture-ti-cc2540-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910654" comment="kismet-devel-2021_08_R1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910655" comment="kismet-logtools-2021_08_R1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249217" version="1" class="patch">
	<metadata>
		<title>kitty-0.21.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35605" ref_url="https://www.suse.com/security/cve/CVE-2020-35605/" source="CVE"/>
		<description>
These are all security issues fixed in the kitty-0.21.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35605/">CVE-2020-35605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35605">CVE-2020-35605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910656" comment="kitty-0.21.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249218" version="1" class="patch">
	<metadata>
		<title>koan-3.0.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-4953" ref_url="https://www.suse.com/security/cve/CVE-2011-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-9605" ref_url="https://www.suse.com/security/cve/CVE-2016-9605/" source="CVE"/>
		<description>
These are all security issues fixed in the koan-3.0.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4953/">CVE-2011-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4953">CVE-2011-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9605/">CVE-2016-9605 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9605">CVE-2016-9605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910657" comment="koan-3.0.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249219" version="1" class="patch">
	<metadata>
		<title>konversation-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15923" ref_url="https://www.suse.com/security/cve/CVE-2017-15923/" source="CVE"/>
		<description>
These are all security issues fixed in the konversation-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15923/">CVE-2017-15923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15923">CVE-2017-15923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910658" comment="konversation-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910659" comment="konversation-lang-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249220" version="1" class="patch">
	<metadata>
		<title>krb5-1.19.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.19.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910660" comment="krb5-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910661" comment="krb5-32bit-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910662" comment="krb5-client-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910663" comment="krb5-devel-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910664" comment="krb5-devel-32bit-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910665" comment="krb5-plugin-kdb-ldap-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910666" comment="krb5-plugin-preauth-otp-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910667" comment="krb5-plugin-preauth-pkinit-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910668" comment="krb5-plugin-preauth-spake-1.19.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910669" comment="krb5-server-1.19.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249221" version="1" class="patch">
	<metadata>
		<title>ktexteditor-5.86.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10361" ref_url="https://www.suse.com/security/cve/CVE-2018-10361/" source="CVE"/>
		<description>
These are all security issues fixed in the ktexteditor-5.86.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10361/">CVE-2018-10361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10361">CVE-2018-10361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910670" comment="ktexteditor-5.86.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910671" comment="ktexteditor-devel-5.86.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910672" comment="ktexteditor-lang-5.86.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249222" version="1" class="patch">
	<metadata>
		<title>kubernetes-apiserver-1.22.2-21.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-8859" ref_url="https://www.suse.com/security/cve/CVE-2016-8859/" source="CVE"/>
		<reference ref_id="CVE-2017-1002101" ref_url="https://www.suse.com/security/cve/CVE-2017-1002101/" source="CVE"/>
		<reference ref_id="CVE-2018-1002105" ref_url="https://www.suse.com/security/cve/CVE-2018-1002105/" source="CVE"/>
		<reference ref_id="CVE-2019-11247" ref_url="https://www.suse.com/security/cve/CVE-2019-11247/" source="CVE"/>
		<reference ref_id="CVE-2019-11249" ref_url="https://www.suse.com/security/cve/CVE-2019-11249/" source="CVE"/>
		<reference ref_id="CVE-2019-11253" ref_url="https://www.suse.com/security/cve/CVE-2019-11253/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8859/">CVE-2016-8859 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8859">CVE-2016-8859 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1002101/">CVE-2017-1002101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002101">CVE-2017-1002101 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1002105/">CVE-2018-1002105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002105">CVE-2018-1002105 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11247/">CVE-2019-11247 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11247">CVE-2019-11247 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11249/">CVE-2019-11249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11249">CVE-2019-11249 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11253/">CVE-2019-11253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11253">CVE-2019-11253 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910673" comment="kubernetes-apiserver-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910674" comment="kubernetes-apiserver-minus1-1.21.5-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910675" comment="kubernetes-client-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910676" comment="kubernetes-controller-manager-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910677" comment="kubernetes-controller-manager-minus1-1.21.5-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910678" comment="kubernetes-coredns-1.8.4-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910679" comment="kubernetes-coredns-minus1-1.8.0-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910680" comment="kubernetes-etcd-3.5.0-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910681" comment="kubernetes-etcd-minus1-3.4.13-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910682" comment="kubernetes-kubeadm-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910683" comment="kubernetes-kubelet-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910684" comment="kubernetes-proxy-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910685" comment="kubernetes-proxy-minus1-1.21.5-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910686" comment="kubernetes-scheduler-1.22.2-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910687" comment="kubernetes-scheduler-minus1-1.21.5-21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249223" version="1" class="patch">
	<metadata>
		<title>kubernetes1.18-apiserver-1.18.20-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.18-apiserver-1.18.20-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910688" comment="kubernetes1.18-apiserver-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910689" comment="kubernetes1.18-client-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910690" comment="kubernetes1.18-client-common-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910691" comment="kubernetes1.18-controller-manager-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910692" comment="kubernetes1.18-kubeadm-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910693" comment="kubernetes1.18-kubelet-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910694" comment="kubernetes1.18-kubelet-common-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910695" comment="kubernetes1.18-proxy-1.18.20-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910696" comment="kubernetes1.18-scheduler-1.18.20-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249224" version="1" class="patch">
	<metadata>
		<title>kubernetes1.19-apiserver-1.19.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.19-apiserver-1.19.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910697" comment="kubernetes1.19-apiserver-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910698" comment="kubernetes1.19-client-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910699" comment="kubernetes1.19-client-common-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910700" comment="kubernetes1.19-controller-manager-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910701" comment="kubernetes1.19-kubeadm-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910702" comment="kubernetes1.19-kubelet-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910703" comment="kubernetes1.19-kubelet-common-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910704" comment="kubernetes1.19-proxy-1.19.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910705" comment="kubernetes1.19-scheduler-1.19.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249225" version="1" class="patch">
	<metadata>
		<title>kubernetes1.20-apiserver-1.20.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.20-apiserver-1.20.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910706" comment="kubernetes1.20-apiserver-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910707" comment="kubernetes1.20-client-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910708" comment="kubernetes1.20-client-common-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910709" comment="kubernetes1.20-controller-manager-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910710" comment="kubernetes1.20-kubeadm-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910711" comment="kubernetes1.20-kubelet-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910712" comment="kubernetes1.20-kubelet-common-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910713" comment="kubernetes1.20-proxy-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910714" comment="kubernetes1.20-scheduler-1.20.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249226" version="1" class="patch">
	<metadata>
		<title>kubernetes1.21-apiserver-1.21.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.21-apiserver-1.21.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910715" comment="kubernetes1.21-apiserver-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910716" comment="kubernetes1.21-client-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910717" comment="kubernetes1.21-client-common-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910718" comment="kubernetes1.21-controller-manager-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910719" comment="kubernetes1.21-kubeadm-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910720" comment="kubernetes1.21-kubelet-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910721" comment="kubernetes1.21-kubelet-common-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910722" comment="kubernetes1.21-proxy-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910723" comment="kubernetes1.21-scheduler-1.21.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249227" version="1" class="patch">
	<metadata>
		<title>kvirc-5.0.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4748" ref_url="https://www.suse.com/security/cve/CVE-2008-4748/" source="CVE"/>
		<description>
These are all security issues fixed in the kvirc-5.0.0-4.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4748/">CVE-2008-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4748">CVE-2008-4748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910724" comment="kvirc-5.0.0-4.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249228" version="1" class="patch">
	<metadata>
		<title>lame-3.100-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9410" ref_url="https://www.suse.com/security/cve/CVE-2017-9410/" source="CVE"/>
		<reference ref_id="CVE-2017-9411" ref_url="https://www.suse.com/security/cve/CVE-2017-9411/" source="CVE"/>
		<reference ref_id="CVE-2017-9412" ref_url="https://www.suse.com/security/cve/CVE-2017-9412/" source="CVE"/>
		<description>
These are all security issues fixed in the lame-3.100-3.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9410/">CVE-2017-9410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9410">CVE-2017-9410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9411/">CVE-2017-9411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9411">CVE-2017-9411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9412/">CVE-2017-9412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9412">CVE-2017-9412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910725" comment="lame-3.100-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910726" comment="lame-doc-3.100-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910727" comment="lame-mp3rtp-3.100-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910728" comment="libmp3lame-devel-3.100-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910729" comment="libmp3lame0-3.100-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910730" comment="libmp3lame0-32bit-3.100-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249229" version="1" class="patch">
	<metadata>
		<title>lasem-0.4.4-2.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the lasem-0.4.4-2.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910731" comment="lasem-0.4.4-2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910732" comment="lasem-devel-0.4.4-2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910733" comment="liblasem-0_4-4-0.4.4-2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249230" version="1" class="patch">
	<metadata>
		<title>liblasso-devel-2.7.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091/" source="CVE"/>
		<description>
These are all security issues fixed in the liblasso-devel-2.7.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28091">CVE-2021-28091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910734" comment="liblasso-devel-2.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910735" comment="liblasso3-2.7.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910736" comment="python3-lasso-2.7.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249231" version="1" class="patch">
	<metadata>
		<title>lcms2-2.12-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms2-2.12-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910737" comment="lcms2-2.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910738" comment="liblcms2-2-2.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910739" comment="liblcms2-2-32bit-2.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910740" comment="liblcms2-devel-2.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910741" comment="liblcms2-devel-32bit-2.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910742" comment="liblcms2-doc-2.12-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249232" version="1" class="patch">
	<metadata>
		<title>ldb-tools-2.3.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-2.3.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1140">CVE-2018-1140 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3824">CVE-2019-3824 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10700">CVE-2020-10700 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27840">CVE-2020-27840 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910743" comment="ldb-tools-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910744" comment="libldb-devel-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910745" comment="libldb2-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910746" comment="libldb2-32bit-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910747" comment="python3-ldb-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910748" comment="python3-ldb-32bit-2.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910749" comment="python3-ldb-devel-2.3.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249233" version="1" class="patch">
	<metadata>
		<title>ldns-1.7.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-1000231" ref_url="https://www.suse.com/security/cve/CVE-2017-1000231/" source="CVE"/>
		<description>
These are all security issues fixed in the ldns-1.7.1-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000231/">CVE-2017-1000231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000231">CVE-2017-1000231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910750" comment="ldns-1.7.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910751" comment="ldns-devel-1.7.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910752" comment="libldns3-1.7.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910753" comment="perl-DNS-LDNS-1.7.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910754" comment="python3-ldns-1.7.1-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249234" version="1" class="patch">
	<metadata>
		<title>ledger-3.2.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12481" ref_url="https://www.suse.com/security/cve/CVE-2017-12481/" source="CVE"/>
		<reference ref_id="CVE-2017-12482" ref_url="https://www.suse.com/security/cve/CVE-2017-12482/" source="CVE"/>
		<reference ref_id="CVE-2017-2807" ref_url="https://www.suse.com/security/cve/CVE-2017-2807/" source="CVE"/>
		<reference ref_id="CVE-2017-2808" ref_url="https://www.suse.com/security/cve/CVE-2017-2808/" source="CVE"/>
		<description>
These are all security issues fixed in the ledger-3.2.1-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12481/">CVE-2017-12481 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12481">CVE-2017-12481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12482/">CVE-2017-12482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12482">CVE-2017-12482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2807/">CVE-2017-2807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2807">CVE-2017-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2808/">CVE-2017-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2808">CVE-2017-2808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910755" comment="ledger-3.2.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249235" version="1" class="patch">
	<metadata>
		<title>leptonica-devel-1.80.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18196" ref_url="https://www.suse.com/security/cve/CVE-2017-18196/" source="CVE"/>
		<reference ref_id="CVE-2018-3836" ref_url="https://www.suse.com/security/cve/CVE-2018-3836/" source="CVE"/>
		<reference ref_id="CVE-2018-7186" ref_url="https://www.suse.com/security/cve/CVE-2018-7186/" source="CVE"/>
		<reference ref_id="CVE-2018-7247" ref_url="https://www.suse.com/security/cve/CVE-2018-7247/" source="CVE"/>
		<reference ref_id="CVE-2018-7440" ref_url="https://www.suse.com/security/cve/CVE-2018-7440/" source="CVE"/>
		<reference ref_id="CVE-2018-7441" ref_url="https://www.suse.com/security/cve/CVE-2018-7441/" source="CVE"/>
		<reference ref_id="CVE-2018-7442" ref_url="https://www.suse.com/security/cve/CVE-2018-7442/" source="CVE"/>
		<description>
These are all security issues fixed in the leptonica-devel-1.80.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18196/">CVE-2017-18196 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18196">CVE-2017-18196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3836/">CVE-2018-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3836">CVE-2018-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7186/">CVE-2018-7186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7186">CVE-2018-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7247/">CVE-2018-7247 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7247">CVE-2018-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7440/">CVE-2018-7440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7440">CVE-2018-7440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7441/">CVE-2018-7441 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7441">CVE-2018-7441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7442/">CVE-2018-7442 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7442">CVE-2018-7442 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910756" comment="leptonica-devel-1.80.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910757" comment="leptonica-tools-1.80.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910758" comment="liblept5-1.80.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910759" comment="liblept5-32bit-1.80.0-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249236" version="1" class="patch">
	<metadata>
		<title>lftp-4.9.2-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.9.2-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910760" comment="lftp-4.9.2-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249237" version="1" class="patch">
	<metadata>
		<title>libEMF-devel-1.0.13-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11863" ref_url="https://www.suse.com/security/cve/CVE-2020-11863/" source="CVE"/>
		<reference ref_id="CVE-2020-11865" ref_url="https://www.suse.com/security/cve/CVE-2020-11865/" source="CVE"/>
		<reference ref_id="CVE-2020-13999" ref_url="https://www.suse.com/security/cve/CVE-2020-13999/" source="CVE"/>
		<description>
These are all security issues fixed in the libEMF-devel-1.0.13-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11863/">CVE-2020-11863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11863">CVE-2020-11863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11865/">CVE-2020-11865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11865">CVE-2020-11865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13999/">CVE-2020-13999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13999">CVE-2020-13999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910761" comment="libEMF-devel-1.0.13-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910762" comment="libEMF-utils-1.0.13-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910763" comment="libEMF1-1.0.13-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249238" version="1" class="patch">
	<metadata>
		<title>libICE-devel-1.0.10-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE-devel-1.0.10-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910764" comment="libICE-devel-1.0.10-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910765" comment="libICE-devel-32bit-1.0.10-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910766" comment="libICE6-1.0.10-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910767" comment="libICE6-32bit-1.0.10-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249239" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.7.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.7.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910768" comment="libX11-6-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910769" comment="libX11-6-32bit-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910770" comment="libX11-data-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910771" comment="libX11-devel-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910772" comment="libX11-devel-32bit-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910773" comment="libX11-xcb1-1.7.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910774" comment="libX11-xcb1-32bit-1.7.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249240" version="1" class="patch">
	<metadata>
		<title>libXcursor-devel-1.2.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor-devel-1.2.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910775" comment="libXcursor-devel-1.2.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910776" comment="libXcursor-devel-32bit-1.2.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910777" comment="libXcursor1-1.2.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910778" comment="libXcursor1-32bit-1.2.0-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249241" version="1" class="patch">
	<metadata>
		<title>libXdmcp-devel-1.1.3-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libXdmcp-devel-1.1.3-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910779" comment="libXdmcp-devel-1.1.3-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910780" comment="libXdmcp-devel-32bit-1.1.3-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910781" comment="libXdmcp6-1.1.3-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910782" comment="libXdmcp6-32bit-1.1.3-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249242" version="1" class="patch">
	<metadata>
		<title>libXfont-devel-1.5.4-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont-devel-1.5.4-2.18 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13720">CVE-2017-13720 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13722">CVE-2017-13722 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16611">CVE-2017-16611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910783" comment="libXfont-devel-1.5.4-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910784" comment="libXfont-devel-32bit-1.5.4-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910785" comment="libXfont1-1.5.4-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910786" comment="libXfont1-32bit-1.5.4-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249243" version="1" class="patch">
	<metadata>
		<title>libXfont2-2-2.0.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont2-2-2.0.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16611">CVE-2017-16611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910787" comment="libXfont2-2-2.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910788" comment="libXfont2-2-32bit-2.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910789" comment="libXfont2-devel-2.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910790" comment="libXfont2-devel-32bit-2.0.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249244" version="1" class="patch">
	<metadata>
		<title>libXrandr-devel-1.5.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr-devel-1.5.2-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910791" comment="libXrandr-devel-1.5.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910792" comment="libXrandr-devel-32bit-1.5.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910793" comment="libXrandr2-1.5.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910794" comment="libXrandr2-32bit-1.5.2-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249245" version="1" class="patch">
	<metadata>
		<title>aom-tools-3.1.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30475" ref_url="https://www.suse.com/security/cve/CVE-2021-30475/" source="CVE"/>
		<description>
These are all security issues fixed in the aom-tools-3.1.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30475/">CVE-2021-30475 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30475">CVE-2021-30475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910795" comment="aom-tools-3.1.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910796" comment="libaom-devel-3.1.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910797" comment="libaom-devel-doc-3.1.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910798" comment="libaom3-3.1.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910799" comment="libaom3-32bit-3.1.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249246" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.5.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.5.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000879">CVE-2018-1000879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000880">CVE-2018-1000880 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19221">CVE-2019-19221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910800" comment="bsdtar-3.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910801" comment="libarchive-devel-3.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910802" comment="libarchive13-3.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910803" comment="libarchive13-32bit-3.5.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249247" version="1" class="patch">
	<metadata>
		<title>libav-tools-12.3-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3946" ref_url="https://www.suse.com/security/cve/CVE-2011-3946/" source="CVE"/>
		<reference ref_id="CVE-2012-6618" ref_url="https://www.suse.com/security/cve/CVE-2012-6618/" source="CVE"/>
		<reference ref_id="CVE-2013-0851" ref_url="https://www.suse.com/security/cve/CVE-2013-0851/" source="CVE"/>
		<reference ref_id="CVE-2013-0852" ref_url="https://www.suse.com/security/cve/CVE-2013-0852/" source="CVE"/>
		<reference ref_id="CVE-2013-0868" ref_url="https://www.suse.com/security/cve/CVE-2013-0868/" source="CVE"/>
		<reference ref_id="CVE-2013-7010" ref_url="https://www.suse.com/security/cve/CVE-2013-7010/" source="CVE"/>
		<reference ref_id="CVE-2014-8544" ref_url="https://www.suse.com/security/cve/CVE-2014-8544/" source="CVE"/>
		<reference ref_id="CVE-2014-9604" ref_url="https://www.suse.com/security/cve/CVE-2014-9604/" source="CVE"/>
		<reference ref_id="CVE-2015-3395" ref_url="https://www.suse.com/security/cve/CVE-2015-3395/" source="CVE"/>
		<reference ref_id="CVE-2015-3417" ref_url="https://www.suse.com/security/cve/CVE-2015-3417/" source="CVE"/>
		<reference ref_id="CVE-2015-5479" ref_url="https://www.suse.com/security/cve/CVE-2015-5479/" source="CVE"/>
		<reference ref_id="CVE-2016-3062" ref_url="https://www.suse.com/security/cve/CVE-2016-3062/" source="CVE"/>
		<description>
These are all security issues fixed in the libav-tools-12.3-1.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3946/">CVE-2011-3946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3946">CVE-2011-3946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6618/">CVE-2012-6618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6618">CVE-2012-6618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0851/">CVE-2013-0851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0851">CVE-2013-0851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0852/">CVE-2013-0852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0852">CVE-2013-0852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0868/">CVE-2013-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0868">CVE-2013-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7010/">CVE-2013-7010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7010">CVE-2013-7010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8544/">CVE-2014-8544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8544">CVE-2014-8544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9604/">CVE-2014-9604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9604">CVE-2014-9604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3395/">CVE-2015-3395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3395">CVE-2015-3395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3417/">CVE-2015-3417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3417">CVE-2015-3417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5479/">CVE-2015-5479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5479">CVE-2015-5479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3062/">CVE-2016-3062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3062">CVE-2016-3062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910804" comment="libav-tools-12.3-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249248" version="1" class="patch">
	<metadata>
		<title>caca-utils-0.99.beta19.git20171003-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-3410" ref_url="https://www.suse.com/security/cve/CVE-2021-3410/" source="CVE"/>
		<description>
These are all security issues fixed in the caca-utils-0.99.beta19.git20171003-8.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20544">CVE-2018-20544 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20545">CVE-2018-20545 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20546">CVE-2018-20546 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20549">CVE-2018-20549 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3410/">CVE-2021-3410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3410">CVE-2021-3410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910805" comment="caca-utils-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910806" comment="libcaca-devel-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910807" comment="libcaca-ruby-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910808" comment="libcaca0-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910809" comment="libcaca0-32bit-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910810" comment="libcaca0-plugins-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910811" comment="libcaca0-plugins-32bit-0.99.beta19.git20171003-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910812" comment="python3-caca-0.99.beta19.git20171003-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249249" version="1" class="patch">
	<metadata>
		<title>libcacard-devel-2.8.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<description>
These are all security issues fixed in the libcacard-devel-2.8.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910813" comment="libcacard-devel-2.8.0-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910814" comment="libcacard0-2.8.0-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249250" version="1" class="patch">
	<metadata>
		<title>libcomps-devel-0.1.17-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3817" ref_url="https://www.suse.com/security/cve/CVE-2019-3817/" source="CVE"/>
		<description>
These are all security issues fixed in the libcomps-devel-0.1.17-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3817/">CVE-2019-3817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3817">CVE-2019-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910815" comment="libcomps-devel-0.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910816" comment="libcomps-doc-0.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910817" comment="libcomps0-0.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910818" comment="python-libcomps-doc-0.1.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910819" comment="python3-libcomps-0.1.17-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249251" version="1" class="patch">
	<metadata>
		<title>libconfuse-devel-3.3-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14447" ref_url="https://www.suse.com/security/cve/CVE-2018-14447/" source="CVE"/>
		<description>
These are all security issues fixed in the libconfuse-devel-3.3-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14447/">CVE-2018-14447 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14447">CVE-2018-14447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910820" comment="libconfuse-devel-3.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910821" comment="libconfuse-lang-3.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910822" comment="libconfuse2-3.3-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249252" version="1" class="patch">
	<metadata>
		<title>libcontainers-common-20210626-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<description>
These are all security issues fixed in the libcontainers-common-20210626-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910823" comment="libcontainers-common-20210626-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249253" version="1" class="patch">
	<metadata>
		<title>libcroco-0.6.13-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
These are all security issues fixed in the libcroco-0.6.13-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910824" comment="libcroco-0.6.13-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910825" comment="libcroco-0_6-3-0.6.13-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910826" comment="libcroco-0_6-3-32bit-0.6.13-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910827" comment="libcroco-devel-0.6.13-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249254" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-8.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14318" ref_url="https://www.suse.com/security/cve/CVE-2019-14318/" source="CVE"/>
		<reference ref_id="CVE-2021-40530" ref_url="https://www.suse.com/security/cve/CVE-2021-40530/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-8.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14318/">CVE-2019-14318 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14318">CVE-2019-14318 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40530/">CVE-2021-40530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40530">CVE-2021-40530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910828" comment="libcryptopp-devel-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910829" comment="libcryptopp8_6_0-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910830" comment="libcryptopp8_6_0-32bit-8.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249255" version="1" class="patch">
	<metadata>
		<title>hawkey-man-0.63.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3445" ref_url="https://www.suse.com/security/cve/CVE-2021-3445/" source="CVE"/>
		<description>
These are all security issues fixed in the hawkey-man-0.63.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3445/">CVE-2021-3445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3445">CVE-2021-3445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910831" comment="hawkey-man-0.63.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910832" comment="libdnf-devel-0.63.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910833" comment="libdnf-repo-config-zypp-0.63.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910834" comment="libdnf2-0.63.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910835" comment="python3-hawkey-0.63.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910836" comment="python3-libdnf-0.63.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249256" version="1" class="patch">
	<metadata>
		<title>libdrm-devel-2.4.107-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-devel-2.4.107-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910837" comment="libdrm-devel-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910838" comment="libdrm-devel-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910839" comment="libdrm-tools-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910840" comment="libdrm2-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910841" comment="libdrm2-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910842" comment="libdrm_amdgpu1-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910843" comment="libdrm_amdgpu1-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910844" comment="libdrm_intel1-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910845" comment="libdrm_intel1-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910846" comment="libdrm_nouveau2-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910847" comment="libdrm_nouveau2-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910848" comment="libdrm_radeon1-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910849" comment="libdrm_radeon1-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910850" comment="libkms-devel-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910851" comment="libkms-devel-32bit-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910852" comment="libkms1-2.4.107-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910853" comment="libkms1-32bit-2.4.107-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249257" version="1" class="patch">
	<metadata>
		<title>libdwarf-devel-20210528-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5029" ref_url="https://www.suse.com/security/cve/CVE-2016-5029/" source="CVE"/>
		<reference ref_id="CVE-2016-5033" ref_url="https://www.suse.com/security/cve/CVE-2016-5033/" source="CVE"/>
		<reference ref_id="CVE-2016-5037" ref_url="https://www.suse.com/security/cve/CVE-2016-5037/" source="CVE"/>
		<reference ref_id="CVE-2016-5041" ref_url="https://www.suse.com/security/cve/CVE-2016-5041/" source="CVE"/>
		<reference ref_id="CVE-2016-9480" ref_url="https://www.suse.com/security/cve/CVE-2016-9480/" source="CVE"/>
		<reference ref_id="CVE-2019-14249" ref_url="https://www.suse.com/security/cve/CVE-2019-14249/" source="CVE"/>
		<description>
These are all security issues fixed in the libdwarf-devel-20210528-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5029/">CVE-2016-5029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5029">CVE-2016-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5033/">CVE-2016-5033 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5033">CVE-2016-5033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5037/">CVE-2016-5037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5037">CVE-2016-5037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5041/">CVE-2016-5041 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5041">CVE-2016-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9480/">CVE-2016-9480 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9480">CVE-2016-9480 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14249/">CVE-2019-14249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14249">CVE-2019-14249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910854" comment="libdwarf-devel-20210528-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910855" comment="libdwarf-devel-static-20210528-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910856" comment="libdwarf-doc-20210528-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910857" comment="libdwarf-tools-20210528-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910858" comment="libdwarf1-20210528-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249258" version="1" class="patch">
	<metadata>
		<title>libebml-devel-1.4.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3405" ref_url="https://www.suse.com/security/cve/CVE-2021-3405/" source="CVE"/>
		<description>
These are all security issues fixed in the libebml-devel-1.4.2-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3405/">CVE-2021-3405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3405">CVE-2021-3405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910859" comment="libebml-devel-1.4.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910860" comment="libebml5-1.4.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910861" comment="libebml5-32bit-1.4.2-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249259" version="1" class="patch">
	<metadata>
		<title>libetpan-devel-1.9.4-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8825" ref_url="https://www.suse.com/security/cve/CVE-2017-8825/" source="CVE"/>
		<reference ref_id="CVE-2020-15953" ref_url="https://www.suse.com/security/cve/CVE-2020-15953/" source="CVE"/>
		<description>
These are all security issues fixed in the libetpan-devel-1.9.4-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8825/">CVE-2017-8825 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8825">CVE-2017-8825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15953/">CVE-2020-15953 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15953">CVE-2020-15953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910862" comment="libetpan-devel-1.9.4-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910863" comment="libetpan20-1.9.4-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249260" version="1" class="patch">
	<metadata>
		<title>libexif-devel-0.6.23-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-devel-0.6.23-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910864" comment="libexif-devel-0.6.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910865" comment="libexif-devel-32bit-0.6.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910866" comment="libexif12-0.6.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910867" comment="libexif12-32bit-0.6.23-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249261" version="1" class="patch">
	<metadata>
		<title>libgadu-devel-1.12.2-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu-devel-1.12.2-2.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4776">CVE-2008-4776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910868" comment="libgadu-devel-1.12.2-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910869" comment="libgadu3-1.12.2-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249262" version="1" class="patch">
	<metadata>
		<title>libgcrypt-cavs-1.9.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904/" source="CVE"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="CVE-2021-3345" ref_url="https://www.suse.com/security/cve/CVE-2021-3345/" source="CVE"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-cavs-1.9.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0379">CVE-2017-0379 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12904">CVE-2019-12904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3345/">CVE-2021-3345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3345">CVE-2021-3345 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910870" comment="libgcrypt-cavs-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910871" comment="libgcrypt-devel-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910872" comment="libgcrypt-devel-32bit-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910873" comment="libgcrypt20-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910874" comment="libgcrypt20-32bit-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910875" comment="libgcrypt20-hmac-1.9.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910876" comment="libgcrypt20-hmac-32bit-1.9.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249263" version="1" class="patch">
	<metadata>
		<title>libakai0-4.3.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12950" ref_url="https://www.suse.com/security/cve/CVE-2017-12950/" source="CVE"/>
		<reference ref_id="CVE-2017-12954" ref_url="https://www.suse.com/security/cve/CVE-2017-12954/" source="CVE"/>
		<description>
These are all security issues fixed in the libakai0-4.3.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12950/">CVE-2017-12950 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12950">CVE-2017-12950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12954/">CVE-2017-12954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12954">CVE-2017-12954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910877" comment="libakai0-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910878" comment="libgig-devel-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910879" comment="libgig-tools-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910880" comment="libgig10-4.3.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249264" version="1" class="patch">
	<metadata>
		<title>libgit2-1_1-1.1.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2016-10128" ref_url="https://www.suse.com/security/cve/CVE-2016-10128/" source="CVE"/>
		<reference ref_id="CVE-2016-10130" ref_url="https://www.suse.com/security/cve/CVE-2016-10130/" source="CVE"/>
		<reference ref_id="CVE-2018-10887" ref_url="https://www.suse.com/security/cve/CVE-2018-10887/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-8098" ref_url="https://www.suse.com/security/cve/CVE-2018-8098/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_1-1.1.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10128/">CVE-2016-10128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10128">CVE-2016-10128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10130/">CVE-2016-10130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10130">CVE-2016-10130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10887/">CVE-2018-10887 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10887">CVE-2018-10887 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8098/">CVE-2018-8098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8098">CVE-2018-8098 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910881" comment="libgit2-1_1-1.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910882" comment="libgit2-1_1-32bit-1.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910883" comment="libgit2-devel-1.1.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249265" version="1" class="patch">
	<metadata>
		<title>libgme-devel-0.6.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme-devel-0.6.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9957">CVE-2016-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9959">CVE-2016-9959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910884" comment="libgme-devel-0.6.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910885" comment="libgme0-0.6.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910886" comment="libgme0-32bit-0.6.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249266" version="1" class="patch">
	<metadata>
		<title>libgtop-2.40.0-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.40.0-2.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910887" comment="libgtop-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910888" comment="libgtop-2_0-11-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910889" comment="libgtop-2_0-11-32bit-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910890" comment="libgtop-devel-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910891" comment="libgtop-doc-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910892" comment="libgtop-lang-2.40.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910893" comment="typelib-1_0-GTop-2_0-2.40.0-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249267" version="1" class="patch">
	<metadata>
		<title>libheimdal-7.7.0-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-17439" ref_url="https://www.suse.com/security/cve/CVE-2017-17439/" source="CVE"/>
		<reference ref_id="CVE-2017-6594" ref_url="https://www.suse.com/security/cve/CVE-2017-6594/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-12098" ref_url="https://www.suse.com/security/cve/CVE-2019-12098/" source="CVE"/>
		<description>
These are all security issues fixed in the libheimdal-7.7.0-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11103">CVE-2017-11103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17439/">CVE-2017-17439 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17439">CVE-2017-17439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6594/">CVE-2017-6594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6594">CVE-2017-6594 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16860">CVE-2018-16860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12098/">CVE-2019-12098 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12098">CVE-2019-12098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910894" comment="libheimdal-7.7.0-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910895" comment="libheimdal-devel-7.7.0-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249268" version="1" class="patch">
	<metadata>
		<title>libical-devel-3.0.10-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical-devel-3.0.10-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910896" comment="libical-devel-3.0.10-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910897" comment="libical-doc-3.0.10-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910898" comment="libical3-3.0.10-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910899" comment="libical3-32bit-3.0.10-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249269" version="1" class="patch">
	<metadata>
		<title>libid3tag-devel-0.15.1b-188.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag-devel-0.15.1b-188.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2779">CVE-2004-2779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11550">CVE-2017-11550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910900" comment="libid3tag-devel-0.15.1b-188.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910901" comment="libid3tag0-0.15.1b-188.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910902" comment="libid3tag0-32bit-0.15.1b-188.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249270" version="1" class="patch">
	<metadata>
		<title>libidn-devel-1.38-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-devel-1.38-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910903" comment="libidn-devel-1.38-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910904" comment="libidn-tools-1.38-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910905" comment="libidn12-1.38-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910906" comment="libidn12-32bit-1.38-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249271" version="1" class="patch">
	<metadata>
		<title>libidn2-0-2.3.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290/" source="CVE"/>
		<reference ref_id="CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn2-0-2.3.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-12290">CVE-2019-12290 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18224">CVE-2019-18224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910907" comment="libidn2-0-2.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910908" comment="libidn2-0-32bit-2.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910909" comment="libidn2-devel-2.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910910" comment="libidn2-lang-2.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910911" comment="libidn2-tools-2.3.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249272" version="1" class="patch">
	<metadata>
		<title>jcat-tool-0.1.3-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
These are all security issues fixed in the jcat-tool-0.1.3-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910912" comment="jcat-tool-0.1.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910913" comment="libjcat-devel-0.1.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910914" comment="libjcat1-0.1.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910915" comment="typelib-1_0-Jcat-1_0-0.1.3-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249273" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-2.1.1-65.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-19644" ref_url="https://www.suse.com/security/cve/CVE-2018-19644/" source="CVE"/>
		<reference ref_id="CVE-2018-19664" ref_url="https://www.suse.com/security/cve/CVE-2018-19664/" source="CVE"/>
		<reference ref_id="CVE-2018-20330" ref_url="https://www.suse.com/security/cve/CVE-2018-20330/" source="CVE"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-2.1.1-65.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19644/">CVE-2018-19644 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19644">CVE-2018-19644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19664/">CVE-2018-19664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19664">CVE-2018-19664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20330/">CVE-2018-20330 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20330">CVE-2018-20330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910916" comment="libjpeg-turbo-2.1.1-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910917" comment="libjpeg8-8.2.2-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910918" comment="libjpeg8-32bit-8.2.2-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910919" comment="libjpeg8-devel-8.2.2-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910920" comment="libjpeg8-devel-32bit-8.2.2-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910921" comment="libturbojpeg0-8.2.2-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910922" comment="libturbojpeg0-32bit-8.2.2-65.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249274" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.16.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="CVE-2018-11410" ref_url="https://www.suse.com/security/cve/CVE-2018-11410/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.16.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13738">CVE-2017-13738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13744">CVE-2017-13744 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11410/">CVE-2018-11410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11410">CVE-2018-11410 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910923" comment="liblouis-data-3.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910924" comment="liblouis-devel-3.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910925" comment="liblouis-doc-3.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910926" comment="liblouis-tools-3.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910927" comment="liblouis20-3.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910928" comment="python3-louis-3.16.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249275" version="1" class="patch">
	<metadata>
		<title>libmad-devel-0.15.1b-3.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8374" ref_url="https://www.suse.com/security/cve/CVE-2017-8374/" source="CVE"/>
		<description>
These are all security issues fixed in the libmad-devel-0.15.1b-3.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8374/">CVE-2017-8374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8374">CVE-2017-8374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910929" comment="libmad-devel-0.15.1b-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910930" comment="libmad0-0.15.1b-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910931" comment="libmad0-32bit-0.15.1b-3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249276" version="1" class="patch">
	<metadata>
		<title>libmediainfo-devel-21.09-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11372" ref_url="https://www.suse.com/security/cve/CVE-2019-11372/" source="CVE"/>
		<reference ref_id="CVE-2019-11373" ref_url="https://www.suse.com/security/cve/CVE-2019-11373/" source="CVE"/>
		<description>
These are all security issues fixed in the libmediainfo-devel-21.09-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11372/">CVE-2019-11372 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11372">CVE-2019-11372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11373/">CVE-2019-11373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11373">CVE-2019-11373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910932" comment="libmediainfo-devel-21.09-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910933" comment="libmediainfo0-21.09-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910934" comment="libmediainfo0-32bit-21.09-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249277" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd-devel-0.9.73-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd-devel-0.9.73-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7038">CVE-2013-7038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910935" comment="libmicrohttpd-devel-0.9.73-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910936" comment="libmicrohttpd12-0.9.73-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249278" version="1" class="patch">
	<metadata>
		<title>libmirage-3_2-3.2.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15540" ref_url="https://www.suse.com/security/cve/CVE-2019-15540/" source="CVE"/>
		<reference ref_id="CVE-2019-15757" ref_url="https://www.suse.com/security/cve/CVE-2019-15757/" source="CVE"/>
		<description>
These are all security issues fixed in the libmirage-3_2-3.2.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15540/">CVE-2019-15540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15540">CVE-2019-15540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15757/">CVE-2019-15757 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15757">CVE-2019-15757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910937" comment="libmirage-3_2-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910938" comment="libmirage-data-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910939" comment="libmirage-devel-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910940" comment="libmirage-lang-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910941" comment="libmirage-vala-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910942" comment="libmirage11-3.2.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910943" comment="typelib-1_0-libmirage-3_2-3.2.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249279" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.10.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.10.1-1.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910944" comment="libmspack-devel-0.10.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910945" comment="libmspack0-0.10.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910946" comment="libmspack0-32bit-0.10.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910947" comment="mspack-examples-0.10.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249280" version="1" class="patch">
	<metadata>
		<title>libmwaw-0_3-3-0.3.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<description>
These are all security issues fixed in the libmwaw-0_3-3-0.3.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9433">CVE-2017-9433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910948" comment="libmwaw-0_3-3-0.3.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910949" comment="libmwaw-devel-0.3.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910950" comment="libmwaw-devel-doc-0.3.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910951" comment="libmwaw-tools-0.3.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249281" version="1" class="patch">
	<metadata>
		<title>libmysofa-devel-1.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10672" ref_url="https://www.suse.com/security/cve/CVE-2019-10672/" source="CVE"/>
		<reference ref_id="CVE-2019-16091" ref_url="https://www.suse.com/security/cve/CVE-2019-16091/" source="CVE"/>
		<reference ref_id="CVE-2019-16092" ref_url="https://www.suse.com/security/cve/CVE-2019-16092/" source="CVE"/>
		<reference ref_id="CVE-2019-16093" ref_url="https://www.suse.com/security/cve/CVE-2019-16093/" source="CVE"/>
		<reference ref_id="CVE-2019-16094" ref_url="https://www.suse.com/security/cve/CVE-2019-16094/" source="CVE"/>
		<reference ref_id="CVE-2019-16095" ref_url="https://www.suse.com/security/cve/CVE-2019-16095/" source="CVE"/>
		<reference ref_id="CVE-2019-20016" ref_url="https://www.suse.com/security/cve/CVE-2019-20016/" source="CVE"/>
		<reference ref_id="CVE-2019-20063" ref_url="https://www.suse.com/security/cve/CVE-2019-20063/" source="CVE"/>
		<reference ref_id="CVE-2020-36148" ref_url="https://www.suse.com/security/cve/CVE-2020-36148/" source="CVE"/>
		<reference ref_id="CVE-2020-36149" ref_url="https://www.suse.com/security/cve/CVE-2020-36149/" source="CVE"/>
		<reference ref_id="CVE-2020-36150" ref_url="https://www.suse.com/security/cve/CVE-2020-36150/" source="CVE"/>
		<reference ref_id="CVE-2020-36151" ref_url="https://www.suse.com/security/cve/CVE-2020-36151/" source="CVE"/>
		<reference ref_id="CVE-2020-36152" ref_url="https://www.suse.com/security/cve/CVE-2020-36152/" source="CVE"/>
		<reference ref_id="CVE-2020-6860" ref_url="https://www.suse.com/security/cve/CVE-2020-6860/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysofa-devel-1.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10672/">CVE-2019-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10672">CVE-2019-10672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16091/">CVE-2019-16091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16091">CVE-2019-16091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16092/">CVE-2019-16092 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16092">CVE-2019-16092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16093/">CVE-2019-16093 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16093">CVE-2019-16093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16094/">CVE-2019-16094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16094">CVE-2019-16094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16095/">CVE-2019-16095 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16095">CVE-2019-16095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20016/">CVE-2019-20016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20016">CVE-2019-20016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20063/">CVE-2019-20063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20063">CVE-2019-20063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36148/">CVE-2020-36148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36148">CVE-2020-36148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36149/">CVE-2020-36149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36149">CVE-2020-36149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36150/">CVE-2020-36150 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36150">CVE-2020-36150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36151/">CVE-2020-36151 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36151">CVE-2020-36151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36152/">CVE-2020-36152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36152">CVE-2020-36152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6860/">CVE-2020-6860 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6860">CVE-2020-6860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910952" comment="libmysofa-devel-1.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910953" comment="libmysofa1-1.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910954" comment="libmysofa1-32bit-1.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249282" version="1" class="patch">
	<metadata>
		<title>libnbd-1.9.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20286" ref_url="https://www.suse.com/security/cve/CVE-2021-20286/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.9.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20286/">CVE-2021-20286 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20286">CVE-2021-20286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910955" comment="libnbd-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910956" comment="libnbd-bash-completion-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910957" comment="libnbd-devel-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910958" comment="libnbd0-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910959" comment="nbdfuse-1.9.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249283" version="1" class="patch">
	<metadata>
		<title>libhogweed6-3.7.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869/" source="CVE"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed6-3.7.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16869">CVE-2018-16869 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910960" comment="libhogweed6-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910961" comment="libhogweed6-32bit-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910962" comment="libnettle-devel-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910963" comment="libnettle-devel-32bit-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910964" comment="libnettle8-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910965" comment="libnettle8-32bit-3.7.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910966" comment="nettle-3.7.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249284" version="1" class="patch">
	<metadata>
		<title>libntlm-devel-1.6-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17455" ref_url="https://www.suse.com/security/cve/CVE-2019-17455/" source="CVE"/>
		<description>
These are all security issues fixed in the libntlm-devel-1.6-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17455/">CVE-2019-17455 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17455">CVE-2019-17455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910967" comment="libntlm-devel-1.6-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910968" comment="libntlm0-1.6-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249285" version="1" class="patch">
	<metadata>
		<title>libofx-0.10.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14731" ref_url="https://www.suse.com/security/cve/CVE-2017-14731/" source="CVE"/>
		<reference ref_id="CVE-2017-2816" ref_url="https://www.suse.com/security/cve/CVE-2017-2816/" source="CVE"/>
		<description>
These are all security issues fixed in the libofx-0.10.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14731/">CVE-2017-14731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14731">CVE-2017-14731 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2816/">CVE-2017-2816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2816">CVE-2017-2816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910969" comment="libofx-0.10.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910970" comment="libofx-devel-0.10.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910971" comment="libofx7-0.10.1-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249286" version="1" class="patch">
	<metadata>
		<title>libopenmpt-devel-0.5.11-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11311" ref_url="https://www.suse.com/security/cve/CVE-2017-11311/" source="CVE"/>
		<reference ref_id="CVE-2018-10017" ref_url="https://www.suse.com/security/cve/CVE-2018-10017/" source="CVE"/>
		<reference ref_id="CVE-2018-11710" ref_url="https://www.suse.com/security/cve/CVE-2018-11710/" source="CVE"/>
		<reference ref_id="CVE-2018-20860" ref_url="https://www.suse.com/security/cve/CVE-2018-20860/" source="CVE"/>
		<reference ref_id="CVE-2018-20861" ref_url="https://www.suse.com/security/cve/CVE-2018-20861/" source="CVE"/>
		<reference ref_id="CVE-2019-14382" ref_url="https://www.suse.com/security/cve/CVE-2019-14382/" source="CVE"/>
		<reference ref_id="CVE-2019-14383" ref_url="https://www.suse.com/security/cve/CVE-2019-14383/" source="CVE"/>
		<reference ref_id="CVE-2019-17113" ref_url="https://www.suse.com/security/cve/CVE-2019-17113/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenmpt-devel-0.5.11-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11311/">CVE-2017-11311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11311">CVE-2017-11311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10017/">CVE-2018-10017 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10017">CVE-2018-10017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11710/">CVE-2018-11710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11710">CVE-2018-11710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20860/">CVE-2018-20860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20860">CVE-2018-20860 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20861/">CVE-2018-20861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20861">CVE-2018-20861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14382/">CVE-2019-14382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14382">CVE-2019-14382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14383/">CVE-2019-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14383">CVE-2019-14383 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17113/">CVE-2019-17113 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17113">CVE-2019-17113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910972" comment="libopenmpt-devel-0.5.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910973" comment="libopenmpt0-0.5.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910974" comment="libopenmpt0-32bit-0.5.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910975" comment="openmpt123-0.5.11-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249287" version="1" class="patch">
	<metadata>
		<title>libosinfo-1.9.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-1.9.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910976" comment="libosinfo-1.9.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910977" comment="libosinfo-1_0-0-1.9.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910978" comment="libosinfo-devel-1.9.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910979" comment="libosinfo-lang-1.9.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910980" comment="typelib-1_0-Libosinfo-1_0-1.9.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249288" version="1" class="patch">
	<metadata>
		<title>libosip2-12-5.2.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<description>
These are all security issues fixed in the libosip2-12-5.2.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10324">CVE-2016-10324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10325">CVE-2016-10325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10326">CVE-2016-10326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7853">CVE-2017-7853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910981" comment="libosip2-12-5.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910982" comment="libosip2-devel-5.2.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249289" version="1" class="patch">
	<metadata>
		<title>libpano-devel-2.9.20-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20307" ref_url="https://www.suse.com/security/cve/CVE-2021-20307/" source="CVE"/>
		<description>
These are all security issues fixed in the libpano-devel-2.9.20-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20307/">CVE-2021-20307 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20307">CVE-2021-20307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910983" comment="libpano-devel-2.9.20-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910984" comment="libpano-utils-2.9.20-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910985" comment="libpano13-3-2.9.20-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249290" version="1" class="patch">
	<metadata>
		<title>libpcap-devel-1.10.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15161" ref_url="https://www.suse.com/security/cve/CVE-2019-15161/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap-devel-1.10.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15161/">CVE-2019-15161 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15161">CVE-2019-15161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910986" comment="libpcap-devel-1.10.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910987" comment="libpcap-devel-32bit-1.10.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910988" comment="libpcap-devel-static-1.10.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910989" comment="libpcap1-1.10.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910990" comment="libpcap1-32bit-1.10.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249291" version="1" class="patch">
	<metadata>
		<title>libplist++-2_0-3-2.2.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist++-2_0-3-2.2.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5209">CVE-2017-5209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5834">CVE-2017-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6436">CVE-2017-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6440">CVE-2017-6440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910991" comment="libplist++-2_0-3-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910992" comment="libplist++-2_0-3-32bit-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910993" comment="libplist++-2_0-devel-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910994" comment="libplist-2_0-3-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910995" comment="libplist-2_0-3-32bit-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910996" comment="libplist-2_0-devel-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910997" comment="plistutil-2.2.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009910998" comment="python3-plist-2.2.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249292" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.59-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.59-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009910999" comment="libpng12-0-1.2.59-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911000" comment="libpng12-0-32bit-1.2.59-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911001" comment="libpng12-compat-devel-1.2.59-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911002" comment="libpng12-compat-devel-32bit-1.2.59-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911003" comment="libpng12-devel-1.2.59-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911004" comment="libpng12-devel-32bit-1.2.59-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249293" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.37-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-14048" ref_url="https://www.suse.com/security/cve/CVE-2018-14048/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.37-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5735">CVE-2016-5735 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14048/">CVE-2018-14048 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14048">CVE-2018-14048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911005" comment="libpng16-16-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911006" comment="libpng16-16-32bit-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911007" comment="libpng16-compat-devel-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911008" comment="libpng16-compat-devel-32bit-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911009" comment="libpng16-devel-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911010" comment="libpng16-devel-32bit-1.6.37-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911011" comment="libpng16-tools-1.6.37-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249294" version="1" class="patch">
	<metadata>
		<title>libproxy-devel-0.4.17-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy-devel-0.4.17-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911012" comment="libproxy-devel-0.4.17-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911013" comment="libproxy-tools-0.4.17-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911014" comment="libproxy1-0.4.17-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911015" comment="libproxy1-32bit-0.4.17-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249295" version="1" class="patch">
	<metadata>
		<title>doxygen2man-2.0.2+20201203.def947e-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779/" source="CVE"/>
		<description>
These are all security issues fixed in the doxygen2man-2.0.2+20201203.def947e-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12779">CVE-2019-12779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911016" comment="doxygen2man-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911017" comment="libqb-devel-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911018" comment="libqb-devel-32bit-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911019" comment="libqb-tests-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911020" comment="libqb-tools-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911021" comment="libqb100-2.0.2+20201203.def947e-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911022" comment="libqb100-32bit-2.0.2+20201203.def947e-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249296" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.2+kde222-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<reference ref_id="CVE-2020-12267" ref_url="https://www.suse.com/security/cve/CVE-2020-12267/" source="CVE"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.2+kde222-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0570">CVE-2020-0570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12267/">CVE-2020-12267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12267">CVE-2020-12267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911023" comment="libQt5Bootstrap-devel-static-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911024" comment="libQt5Bootstrap-devel-static-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911025" comment="libQt5Concurrent-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911026" comment="libQt5Concurrent-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911027" comment="libQt5Concurrent5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911028" comment="libQt5Concurrent5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911029" comment="libQt5Core-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911030" comment="libQt5Core-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911031" comment="libQt5Core-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911032" comment="libQt5Core5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911033" comment="libQt5Core5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911034" comment="libQt5DBus-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911035" comment="libQt5DBus-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911036" comment="libQt5DBus-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911037" comment="libQt5DBus5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911038" comment="libQt5DBus5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911039" comment="libQt5Gui-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911040" comment="libQt5Gui-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911041" comment="libQt5Gui-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911042" comment="libQt5Gui5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911043" comment="libQt5Gui5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911044" comment="libQt5KmsSupport-devel-static-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911045" comment="libQt5KmsSupport-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911046" comment="libQt5Network-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911047" comment="libQt5Network-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911048" comment="libQt5Network-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911049" comment="libQt5Network5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911050" comment="libQt5Network5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911051" comment="libQt5OpenGL-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911052" comment="libQt5OpenGL-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911053" comment="libQt5OpenGL-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911054" comment="libQt5OpenGL5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911055" comment="libQt5OpenGL5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911056" comment="libQt5OpenGLExtensions-devel-static-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911057" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911058" comment="libQt5PlatformHeaders-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911059" comment="libQt5PlatformSupport-devel-static-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911060" comment="libQt5PlatformSupport-devel-static-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911061" comment="libQt5PlatformSupport-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911062" comment="libQt5PrintSupport-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911063" comment="libQt5PrintSupport-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911064" comment="libQt5PrintSupport-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911065" comment="libQt5PrintSupport5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911066" comment="libQt5PrintSupport5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911067" comment="libQt5Sql-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911068" comment="libQt5Sql-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911069" comment="libQt5Sql-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911070" comment="libQt5Sql5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911071" comment="libQt5Sql5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911072" comment="libQt5Sql5-mysql-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911073" comment="libQt5Sql5-mysql-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911074" comment="libQt5Sql5-postgresql-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911075" comment="libQt5Sql5-postgresql-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911076" comment="libQt5Sql5-sqlite-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911077" comment="libQt5Sql5-sqlite-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911078" comment="libQt5Sql5-unixODBC-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911079" comment="libQt5Sql5-unixODBC-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911080" comment="libQt5Test-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911081" comment="libQt5Test-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911082" comment="libQt5Test-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911083" comment="libQt5Test5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911084" comment="libQt5Test5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911085" comment="libQt5Widgets-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911086" comment="libQt5Widgets-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911087" comment="libQt5Widgets-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911088" comment="libQt5Widgets5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911089" comment="libQt5Widgets5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911090" comment="libQt5Xml-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911091" comment="libQt5Xml-devel-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911092" comment="libQt5Xml5-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911093" comment="libQt5Xml5-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911094" comment="libqt5-qtbase-common-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911095" comment="libqt5-qtbase-devel-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911096" comment="libqt5-qtbase-examples-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911097" comment="libqt5-qtbase-examples-32bit-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911098" comment="libqt5-qtbase-platformtheme-gtk3-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911099" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.2+kde222-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911100" comment="libqt5-qtbase-private-headers-devel-5.15.2+kde222-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249297" version="1" class="patch">
	<metadata>
		<title>libQt5Svg5-32bit-5.15.2+kde7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Svg5-32bit-5.15.2+kde7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3481">CVE-2021-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911101" comment="libQt5Svg5-5.15.2+kde7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911102" comment="libQt5Svg5-32bit-5.15.2+kde7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911103" comment="libqt5-qtsvg-devel-5.15.2+kde7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911104" comment="libqt5-qtsvg-devel-32bit-5.15.2+kde7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911105" comment="libqt5-qtsvg-examples-5.15.2+kde7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911106" comment="libqt5-qtsvg-private-headers-devel-5.15.2+kde7-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249298" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-6033" ref_url="https://www.suse.com/security/cve/CVE-2018-6033/" source="CVE"/>
		<reference ref_id="CVE-2019-5786" ref_url="https://www.suse.com/security/cve/CVE-2019-5786/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118/" source="CVE"/>
		<reference ref_id="CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119/" source="CVE"/>
		<reference ref_id="CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120/" source="CVE"/>
		<reference ref_id="CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121/" source="CVE"/>
		<reference ref_id="CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122/" source="CVE"/>
		<reference ref_id="CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123/" source="CVE"/>
		<reference ref_id="CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125/" source="CVE"/>
		<reference ref_id="CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126/" source="CVE"/>
		<reference ref_id="CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127/" source="CVE"/>
		<reference ref_id="CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128/" source="CVE"/>
		<reference ref_id="CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129/" source="CVE"/>
		<reference ref_id="CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130/" source="CVE"/>
		<reference ref_id="CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131/" source="CVE"/>
		<reference ref_id="CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132/" source="CVE"/>
		<reference ref_id="CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135/" source="CVE"/>
		<reference ref_id="CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137/" source="CVE"/>
		<reference ref_id="CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140/" source="CVE"/>
		<reference ref_id="CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141/" source="CVE"/>
		<reference ref_id="CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145/" source="CVE"/>
		<reference ref_id="CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146/" source="CVE"/>
		<reference ref_id="CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149/" source="CVE"/>
		<reference ref_id="CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150/" source="CVE"/>
		<reference ref_id="CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152/" source="CVE"/>
		<reference ref_id="CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153/" source="CVE"/>
		<reference ref_id="CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156/" source="CVE"/>
		<reference ref_id="CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157/" source="CVE"/>
		<reference ref_id="CVE-2021-30522" ref_url="https://www.suse.com/security/cve/CVE-2021-30522/" source="CVE"/>
		<reference ref_id="CVE-2021-30523" ref_url="https://www.suse.com/security/cve/CVE-2021-30523/" source="CVE"/>
		<reference ref_id="CVE-2021-30530" ref_url="https://www.suse.com/security/cve/CVE-2021-30530/" source="CVE"/>
		<reference ref_id="CVE-2021-30533" ref_url="https://www.suse.com/security/cve/CVE-2021-30533/" source="CVE"/>
		<reference ref_id="CVE-2021-30534" ref_url="https://www.suse.com/security/cve/CVE-2021-30534/" source="CVE"/>
		<reference ref_id="CVE-2021-30535" ref_url="https://www.suse.com/security/cve/CVE-2021-30535/" source="CVE"/>
		<reference ref_id="CVE-2021-30536" ref_url="https://www.suse.com/security/cve/CVE-2021-30536/" source="CVE"/>
		<reference ref_id="CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541/" source="CVE"/>
		<reference ref_id="CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548/" source="CVE"/>
		<reference ref_id="CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551/" source="CVE"/>
		<reference ref_id="CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553/" source="CVE"/>
		<reference ref_id="CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554/" source="CVE"/>
		<reference ref_id="CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556/" source="CVE"/>
		<reference ref_id="CVE-2021-30559" ref_url="https://www.suse.com/security/cve/CVE-2021-30559/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563/" source="CVE"/>
		<reference ref_id="CVE-2021-30566" ref_url="https://www.suse.com/security/cve/CVE-2021-30566/" source="CVE"/>
		<reference ref_id="CVE-2021-30568" ref_url="https://www.suse.com/security/cve/CVE-2021-30568/" source="CVE"/>
		<reference ref_id="CVE-2021-30569" ref_url="https://www.suse.com/security/cve/CVE-2021-30569/" source="CVE"/>
		<reference ref_id="CVE-2021-30573" ref_url="https://www.suse.com/security/cve/CVE-2021-30573/" source="CVE"/>
		<reference ref_id="CVE-2021-30585" ref_url="https://www.suse.com/security/cve/CVE-2021-30585/" source="CVE"/>
		<reference ref_id="CVE-2021-30587" ref_url="https://www.suse.com/security/cve/CVE-2021-30587/" source="CVE"/>
		<reference ref_id="CVE-2021-30588" ref_url="https://www.suse.com/security/cve/CVE-2021-30588/" source="CVE"/>
		<reference ref_id="CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598/" source="CVE"/>
		<reference ref_id="CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599/" source="CVE"/>
		<reference ref_id="CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602/" source="CVE"/>
		<reference ref_id="CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603/" source="CVE"/>
		<reference ref_id="CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6033/">CVE-2018-6033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6033">CVE-2018-6033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5786/">CVE-2019-5786 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5786">CVE-2019-5786 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21118">CVE-2021-21118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21119">CVE-2021-21119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21120">CVE-2021-21120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21121">CVE-2021-21121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21122">CVE-2021-21122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21123">CVE-2021-21123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21125">CVE-2021-21125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21126">CVE-2021-21126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21127">CVE-2021-21127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21128">CVE-2021-21128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21129">CVE-2021-21129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21130">CVE-2021-21130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21131">CVE-2021-21131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21132">CVE-2021-21132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21135">CVE-2021-21135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21137">CVE-2021-21137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21140">CVE-2021-21140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21141">CVE-2021-21141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21145">CVE-2021-21145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21146">CVE-2021-21146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21147">CVE-2021-21147 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21148">CVE-2021-21148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21149">CVE-2021-21149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21150">CVE-2021-21150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21152">CVE-2021-21152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21153">CVE-2021-21153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21156">CVE-2021-21156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21157">CVE-2021-21157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30522/">CVE-2021-30522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30522">CVE-2021-30522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30523/">CVE-2021-30523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30523">CVE-2021-30523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30530/">CVE-2021-30530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30530">CVE-2021-30530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30533/">CVE-2021-30533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30533">CVE-2021-30533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30534/">CVE-2021-30534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30534">CVE-2021-30534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30535/">CVE-2021-30535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30535">CVE-2021-30535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30536/">CVE-2021-30536 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30536">CVE-2021-30536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30541">CVE-2021-30541 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30544">CVE-2021-30544 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30548">CVE-2021-30548 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30551">CVE-2021-30551 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30553">CVE-2021-30553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30554">CVE-2021-30554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30556">CVE-2021-30556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30559/">CVE-2021-30559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30559">CVE-2021-30559 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30563">CVE-2021-30563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30566/">CVE-2021-30566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30566">CVE-2021-30566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30568/">CVE-2021-30568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30568">CVE-2021-30568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30569/">CVE-2021-30569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30569">CVE-2021-30569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30573/">CVE-2021-30573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30573">CVE-2021-30573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30585/">CVE-2021-30585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30585">CVE-2021-30585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30587/">CVE-2021-30587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30587">CVE-2021-30587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30588/">CVE-2021-30588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30588">CVE-2021-30588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30598">CVE-2021-30598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30599">CVE-2021-30599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30602">CVE-2021-30602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30603">CVE-2021-30603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30604">CVE-2021-30604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911107" comment="libQt5Pdf5-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911108" comment="libQt5PdfWidgets5-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911109" comment="libqt5-qtpdf-devel-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911110" comment="libqt5-qtpdf-examples-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911111" comment="libqt5-qtpdf-imports-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911112" comment="libqt5-qtpdf-private-headers-devel-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911113" comment="libqt5-qtwebengine-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911114" comment="libqt5-qtwebengine-devel-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911115" comment="libqt5-qtwebengine-examples-5.15.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911116" comment="libqt5-qtwebengine-private-headers-devel-5.15.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249299" version="1" class="patch">
	<metadata>
		<title>libquicktime-1.2.4+git20180804.fff99cd-2.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime-1.2.4+git20180804.fff99cd-2.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2399">CVE-2016-2399 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9122">CVE-2017-9122 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9123">CVE-2017-9123 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9124">CVE-2017-9124 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9125">CVE-2017-9125 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9126">CVE-2017-9126 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9127">CVE-2017-9127 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9128">CVE-2017-9128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911117" comment="libquicktime-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911118" comment="libquicktime-32bit-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911119" comment="libquicktime-devel-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911120" comment="libquicktime-lang-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911121" comment="libquicktime-tools-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911122" comment="libquicktime0-1.2.4+git20180804.fff99cd-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911123" comment="libquicktime0-32bit-1.2.4+git20180804.fff99cd-2.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249300" version="1" class="patch">
	<metadata>
		<title>libqxmpp-devel-1.4.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9928" ref_url="https://www.suse.com/security/cve/CVE-2016-9928/" source="CVE"/>
		<reference ref_id="CVE-2017-5603" ref_url="https://www.suse.com/security/cve/CVE-2017-5603/" source="CVE"/>
		<description>
These are all security issues fixed in the libqxmpp-devel-1.4.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9928/">CVE-2016-9928 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9928">CVE-2016-9928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5603/">CVE-2017-5603 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5603">CVE-2017-5603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911124" comment="libqxmpp-devel-1.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911125" comment="libqxmpp-doc-1.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911126" comment="libqxmpp3-1.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911127" comment="libqxmpp3-32bit-1.4.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249301" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.20.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14265" ref_url="https://www.suse.com/security/cve/CVE-2017-14265/" source="CVE"/>
		<reference ref_id="CVE-2017-14348" ref_url="https://www.suse.com/security/cve/CVE-2017-14348/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2018-10528" ref_url="https://www.suse.com/security/cve/CVE-2018-10528/" source="CVE"/>
		<reference ref_id="CVE-2018-10529" ref_url="https://www.suse.com/security/cve/CVE-2018-10529/" source="CVE"/>
		<reference ref_id="CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<reference ref_id="CVE-2018-5815" ref_url="https://www.suse.com/security/cve/CVE-2018-5815/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<reference ref_id="CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.20.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13735">CVE-2017-13735 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14265/">CVE-2017-14265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14265">CVE-2017-14265 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14348/">CVE-2017-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14348">CVE-2017-14348 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6886">CVE-2017-6886 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6887">CVE-2017-6887 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6890">CVE-2017-6890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10528/">CVE-2018-10528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10528">CVE-2018-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10529/">CVE-2018-10529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10529">CVE-2018-10529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20337">CVE-2018-20337 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5813">CVE-2018-5813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5815/">CVE-2018-5815 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5815">CVE-2018-5815 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5819">CVE-2018-5819 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15503">CVE-2020-15503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911128" comment="libraw-devel-0.20.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911129" comment="libraw-devel-static-0.20.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911130" comment="libraw-tools-0.20.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911131" comment="libraw20-0.20.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911132" comment="libraw20-32bit-0.20.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249302" version="1" class="patch">
	<metadata>
		<title>libredwg-devel-0.11.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14471" ref_url="https://www.suse.com/security/cve/CVE-2018-14471/" source="CVE"/>
		<reference ref_id="CVE-2018-14524" ref_url="https://www.suse.com/security/cve/CVE-2018-14524/" source="CVE"/>
		<reference ref_id="CVE-2019-20009" ref_url="https://www.suse.com/security/cve/CVE-2019-20009/" source="CVE"/>
		<reference ref_id="CVE-2019-20010" ref_url="https://www.suse.com/security/cve/CVE-2019-20010/" source="CVE"/>
		<reference ref_id="CVE-2019-20012" ref_url="https://www.suse.com/security/cve/CVE-2019-20012/" source="CVE"/>
		<reference ref_id="CVE-2019-20014" ref_url="https://www.suse.com/security/cve/CVE-2019-20014/" source="CVE"/>
		<reference ref_id="CVE-2019-9770" ref_url="https://www.suse.com/security/cve/CVE-2019-9770/" source="CVE"/>
		<reference ref_id="CVE-2019-9771" ref_url="https://www.suse.com/security/cve/CVE-2019-9771/" source="CVE"/>
		<reference ref_id="CVE-2019-9772" ref_url="https://www.suse.com/security/cve/CVE-2019-9772/" source="CVE"/>
		<reference ref_id="CVE-2019-9773" ref_url="https://www.suse.com/security/cve/CVE-2019-9773/" source="CVE"/>
		<reference ref_id="CVE-2019-9774" ref_url="https://www.suse.com/security/cve/CVE-2019-9774/" source="CVE"/>
		<reference ref_id="CVE-2019-9775" ref_url="https://www.suse.com/security/cve/CVE-2019-9775/" source="CVE"/>
		<reference ref_id="CVE-2019-9776" ref_url="https://www.suse.com/security/cve/CVE-2019-9776/" source="CVE"/>
		<reference ref_id="CVE-2019-9777" ref_url="https://www.suse.com/security/cve/CVE-2019-9777/" source="CVE"/>
		<reference ref_id="CVE-2019-9778" ref_url="https://www.suse.com/security/cve/CVE-2019-9778/" source="CVE"/>
		<reference ref_id="CVE-2019-9779" ref_url="https://www.suse.com/security/cve/CVE-2019-9779/" source="CVE"/>
		<reference ref_id="CVE-2020-6609" ref_url="https://www.suse.com/security/cve/CVE-2020-6609/" source="CVE"/>
		<reference ref_id="CVE-2020-6611" ref_url="https://www.suse.com/security/cve/CVE-2020-6611/" source="CVE"/>
		<reference ref_id="CVE-2020-6613" ref_url="https://www.suse.com/security/cve/CVE-2020-6613/" source="CVE"/>
		<reference ref_id="CVE-2020-6615" ref_url="https://www.suse.com/security/cve/CVE-2020-6615/" source="CVE"/>
		<description>
These are all security issues fixed in the libredwg-devel-0.11.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14471/">CVE-2018-14471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14471">CVE-2018-14471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14524/">CVE-2018-14524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14524">CVE-2018-14524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20009/">CVE-2019-20009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20009">CVE-2019-20009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20010/">CVE-2019-20010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20010">CVE-2019-20010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20012/">CVE-2019-20012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20012">CVE-2019-20012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20014/">CVE-2019-20014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20014">CVE-2019-20014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9770/">CVE-2019-9770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9770">CVE-2019-9770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9771/">CVE-2019-9771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9771">CVE-2019-9771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9772/">CVE-2019-9772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9772">CVE-2019-9772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9773/">CVE-2019-9773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9773">CVE-2019-9773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9774/">CVE-2019-9774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9774">CVE-2019-9774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9775/">CVE-2019-9775 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9775">CVE-2019-9775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9776/">CVE-2019-9776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9776">CVE-2019-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9777/">CVE-2019-9777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9777">CVE-2019-9777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9778/">CVE-2019-9778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9778">CVE-2019-9778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9779/">CVE-2019-9779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9779">CVE-2019-9779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6609/">CVE-2020-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6609">CVE-2020-6609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6611/">CVE-2020-6611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6611">CVE-2020-6611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6613/">CVE-2020-6613 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6613">CVE-2020-6613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6615/">CVE-2020-6615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6615">CVE-2020-6615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911133" comment="libredwg-devel-0.11.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911134" comment="libredwg-tools-0.11.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911135" comment="libredwg0-0.11.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249303" version="1" class="patch">
	<metadata>
		<title>librelp-devel-1.10.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
These are all security issues fixed in the librelp-devel-1.10.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911136" comment="librelp-devel-1.10.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911137" comment="librelp0-1.10.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249304" version="1" class="patch">
	<metadata>
		<title>libreoffice-7.1.5.2-3.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2198" ref_url="https://www.suse.com/security/cve/CVE-2006-2198/" source="CVE"/>
		<reference ref_id="CVE-2006-2199" ref_url="https://www.suse.com/security/cve/CVE-2006-2199/" source="CVE"/>
		<reference ref_id="CVE-2006-3117" ref_url="https://www.suse.com/security/cve/CVE-2006-3117/" source="CVE"/>
		<reference ref_id="CVE-2007-0238" ref_url="https://www.suse.com/security/cve/CVE-2007-0238/" source="CVE"/>
		<reference ref_id="CVE-2007-0239" ref_url="https://www.suse.com/security/cve/CVE-2007-0239/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848/" source="CVE"/>
		<reference ref_id="CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850/" source="CVE"/>
		<reference ref_id="CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851/" source="CVE"/>
		<reference ref_id="CVE-2019-9853" ref_url="https://www.suse.com/security/cve/CVE-2019-9853/" source="CVE"/>
		<reference ref_id="CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854/" source="CVE"/>
		<reference ref_id="CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855/" source="CVE"/>
		<reference ref_id="CVE-2020-12801" ref_url="https://www.suse.com/security/cve/CVE-2020-12801/" source="CVE"/>
		<reference ref_id="CVE-2020-12802" ref_url="https://www.suse.com/security/cve/CVE-2020-12802/" source="CVE"/>
		<reference ref_id="CVE-2020-12803" ref_url="https://www.suse.com/security/cve/CVE-2020-12803/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-7.1.5.2-3.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2198/">CVE-2006-2198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2198">CVE-2006-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2199/">CVE-2006-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2199">CVE-2006-2199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3117/">CVE-2006-3117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3117">CVE-2006-3117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0238/">CVE-2007-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0238">CVE-2007-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0239/">CVE-2007-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0239">CVE-2007-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10327">CVE-2016-10327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3157">CVE-2017-3157 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7870">CVE-2017-7870 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7882">CVE-2017-7882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8358">CVE-2017-8358 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10119">CVE-2018-10119 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10120">CVE-2018-10120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1055">CVE-2018-1055 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10583">CVE-2018-10583 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16858">CVE-2018-16858 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9848">CVE-2019-9848 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9850">CVE-2019-9850 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9851">CVE-2019-9851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9853/">CVE-2019-9853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-9853">CVE-2019-9853 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9854">CVE-2019-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9855">CVE-2019-9855 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12801/">CVE-2020-12801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12801">CVE-2020-12801 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12802/">CVE-2020-12802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12802">CVE-2020-12802 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12803/">CVE-2020-12803 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12803">CVE-2020-12803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911138" comment="libreoffice-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911139" comment="libreoffice-base-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911140" comment="libreoffice-base-drivers-postgresql-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911141" comment="libreoffice-branding-upstream-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911142" comment="libreoffice-calc-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911143" comment="libreoffice-calc-extensions-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911144" comment="libreoffice-draw-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911145" comment="libreoffice-filters-optional-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911146" comment="libreoffice-gdb-pretty-printers-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911147" comment="libreoffice-glade-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911148" comment="libreoffice-gnome-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911149" comment="libreoffice-gtk3-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911150" comment="libreoffice-icon-themes-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911151" comment="libreoffice-impress-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911152" comment="libreoffice-l10n-af-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911153" comment="libreoffice-l10n-am-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911154" comment="libreoffice-l10n-ar-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911155" comment="libreoffice-l10n-as-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911156" comment="libreoffice-l10n-ast-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911157" comment="libreoffice-l10n-be-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911158" comment="libreoffice-l10n-bg-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911159" comment="libreoffice-l10n-bn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911160" comment="libreoffice-l10n-bn_IN-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911161" comment="libreoffice-l10n-bo-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911162" comment="libreoffice-l10n-br-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911163" comment="libreoffice-l10n-brx-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911164" comment="libreoffice-l10n-bs-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911165" comment="libreoffice-l10n-ca-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911166" comment="libreoffice-l10n-ca_valencia-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911167" comment="libreoffice-l10n-ckb-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911168" comment="libreoffice-l10n-cs-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911169" comment="libreoffice-l10n-cy-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911170" comment="libreoffice-l10n-da-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911171" comment="libreoffice-l10n-de-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911172" comment="libreoffice-l10n-dgo-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911173" comment="libreoffice-l10n-dsb-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911174" comment="libreoffice-l10n-dz-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911175" comment="libreoffice-l10n-el-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911176" comment="libreoffice-l10n-en-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911177" comment="libreoffice-l10n-en_GB-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911178" comment="libreoffice-l10n-en_ZA-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911179" comment="libreoffice-l10n-eo-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911180" comment="libreoffice-l10n-es-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911181" comment="libreoffice-l10n-et-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911182" comment="libreoffice-l10n-eu-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911183" comment="libreoffice-l10n-fa-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911184" comment="libreoffice-l10n-fi-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911185" comment="libreoffice-l10n-fr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911186" comment="libreoffice-l10n-fur-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911187" comment="libreoffice-l10n-fy-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911188" comment="libreoffice-l10n-ga-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911189" comment="libreoffice-l10n-gd-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911190" comment="libreoffice-l10n-gl-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911191" comment="libreoffice-l10n-gu-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911192" comment="libreoffice-l10n-gug-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911193" comment="libreoffice-l10n-he-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911194" comment="libreoffice-l10n-hi-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911195" comment="libreoffice-l10n-hr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911196" comment="libreoffice-l10n-hsb-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911197" comment="libreoffice-l10n-hu-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911198" comment="libreoffice-l10n-id-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911199" comment="libreoffice-l10n-is-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911200" comment="libreoffice-l10n-it-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911201" comment="libreoffice-l10n-ja-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911202" comment="libreoffice-l10n-ka-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911203" comment="libreoffice-l10n-kab-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911204" comment="libreoffice-l10n-kk-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911205" comment="libreoffice-l10n-km-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911206" comment="libreoffice-l10n-kmr_Latn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911207" comment="libreoffice-l10n-kn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911208" comment="libreoffice-l10n-ko-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911209" comment="libreoffice-l10n-kok-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911210" comment="libreoffice-l10n-ks-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911211" comment="libreoffice-l10n-lb-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911212" comment="libreoffice-l10n-lo-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911213" comment="libreoffice-l10n-lt-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911214" comment="libreoffice-l10n-lv-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911215" comment="libreoffice-l10n-mai-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911216" comment="libreoffice-l10n-mk-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911217" comment="libreoffice-l10n-ml-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911218" comment="libreoffice-l10n-mn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911219" comment="libreoffice-l10n-mni-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911220" comment="libreoffice-l10n-mr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911221" comment="libreoffice-l10n-my-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911222" comment="libreoffice-l10n-nb-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911223" comment="libreoffice-l10n-ne-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911224" comment="libreoffice-l10n-nl-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911225" comment="libreoffice-l10n-nn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911226" comment="libreoffice-l10n-nr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911227" comment="libreoffice-l10n-nso-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911228" comment="libreoffice-l10n-oc-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911229" comment="libreoffice-l10n-om-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911230" comment="libreoffice-l10n-or-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911231" comment="libreoffice-l10n-pa-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911232" comment="libreoffice-l10n-pl-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911233" comment="libreoffice-l10n-pt_BR-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911234" comment="libreoffice-l10n-pt_PT-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911235" comment="libreoffice-l10n-ro-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911236" comment="libreoffice-l10n-ru-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911237" comment="libreoffice-l10n-rw-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911238" comment="libreoffice-l10n-sa_IN-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911239" comment="libreoffice-l10n-sat-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911240" comment="libreoffice-l10n-sd-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911241" comment="libreoffice-l10n-si-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911242" comment="libreoffice-l10n-sid-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911243" comment="libreoffice-l10n-sk-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911244" comment="libreoffice-l10n-sl-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911245" comment="libreoffice-l10n-sq-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911246" comment="libreoffice-l10n-sr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911247" comment="libreoffice-l10n-ss-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911248" comment="libreoffice-l10n-st-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911249" comment="libreoffice-l10n-sv-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911250" comment="libreoffice-l10n-sw_TZ-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911251" comment="libreoffice-l10n-szl-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911252" comment="libreoffice-l10n-ta-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911253" comment="libreoffice-l10n-te-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911254" comment="libreoffice-l10n-tg-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911255" comment="libreoffice-l10n-th-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911256" comment="libreoffice-l10n-tn-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911257" comment="libreoffice-l10n-tr-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911258" comment="libreoffice-l10n-ts-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911259" comment="libreoffice-l10n-tt-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911260" comment="libreoffice-l10n-ug-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911261" comment="libreoffice-l10n-uk-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911262" comment="libreoffice-l10n-uz-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911263" comment="libreoffice-l10n-ve-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911264" comment="libreoffice-l10n-vec-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911265" comment="libreoffice-l10n-vi-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911266" comment="libreoffice-l10n-xh-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911267" comment="libreoffice-l10n-zh_CN-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911268" comment="libreoffice-l10n-zh_TW-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911269" comment="libreoffice-l10n-zu-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911270" comment="libreoffice-librelogo-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911271" comment="libreoffice-mailmerge-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911272" comment="libreoffice-math-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911273" comment="libreoffice-officebean-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911274" comment="libreoffice-pyuno-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911275" comment="libreoffice-qt5-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911276" comment="libreoffice-sdk-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911277" comment="libreoffice-sdk-doc-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911278" comment="libreoffice-writer-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911279" comment="libreoffice-writer-extensions-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911280" comment="libreofficekit-7.1.5.2-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911281" comment="libreofficekit-devel-7.1.5.2-3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249305" version="1" class="patch">
	<metadata>
		<title>librepo-devel-1.14.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352/" source="CVE"/>
		<description>
These are all security issues fixed in the librepo-devel-1.14.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14352">CVE-2020-14352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911282" comment="librepo-devel-1.14.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911283" comment="librepo0-1.14.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911284" comment="python3-librepo-1.14.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249306" version="1" class="patch">
	<metadata>
		<title>libcrypto46-3.3.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12434" ref_url="https://www.suse.com/security/cve/CVE-2018-12434/" source="CVE"/>
		<reference ref_id="CVE-2018-8970" ref_url="https://www.suse.com/security/cve/CVE-2018-8970/" source="CVE"/>
		<description>
These are all security issues fixed in the libcrypto46-3.3.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12434/">CVE-2018-12434 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12434">CVE-2018-12434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8970/">CVE-2018-8970 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8970">CVE-2018-8970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911285" comment="libcrypto46-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911286" comment="libcrypto46-32bit-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911287" comment="libressl-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911288" comment="libressl-devel-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911289" comment="libressl-devel-32bit-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911290" comment="libressl-devel-doc-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911291" comment="libssl48-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911292" comment="libssl48-32bit-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911293" comment="libtls20-3.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911294" comment="libtls20-32bit-3.3.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249307" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.50.7-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.50.7-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11464">CVE-2017-11464 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911295" comment="gdk-pixbuf-loader-rsvg-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911296" comment="gdk-pixbuf-loader-rsvg-32bit-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911297" comment="librsvg-2-2-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911298" comment="librsvg-2-2-32bit-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911299" comment="librsvg-devel-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911300" comment="librsvg-lang-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911301" comment="rsvg-convert-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911302" comment="rsvg-thumbnailer-2.50.7-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911303" comment="typelib-1_0-Rsvg-2_0-2.50.7-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249308" version="1" class="patch">
	<metadata>
		<title>libsamplerate-devel-0.2.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-devel-0.2.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911304" comment="libsamplerate-devel-0.2.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911305" comment="libsamplerate0-0.2.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911306" comment="libsamplerate0-32bit-0.2.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249309" version="1" class="patch">
	<metadata>
		<title>libsass-3_6_5-1-3.6.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11499" ref_url="https://www.suse.com/security/cve/CVE-2018-11499/" source="CVE"/>
		<reference ref_id="CVE-2018-19797" ref_url="https://www.suse.com/security/cve/CVE-2018-19797/" source="CVE"/>
		<reference ref_id="CVE-2018-19827" ref_url="https://www.suse.com/security/cve/CVE-2018-19827/" source="CVE"/>
		<reference ref_id="CVE-2018-19837" ref_url="https://www.suse.com/security/cve/CVE-2018-19837/" source="CVE"/>
		<reference ref_id="CVE-2018-19838" ref_url="https://www.suse.com/security/cve/CVE-2018-19838/" source="CVE"/>
		<reference ref_id="CVE-2018-19839" ref_url="https://www.suse.com/security/cve/CVE-2018-19839/" source="CVE"/>
		<reference ref_id="CVE-2018-20190" ref_url="https://www.suse.com/security/cve/CVE-2018-20190/" source="CVE"/>
		<reference ref_id="CVE-2018-20821" ref_url="https://www.suse.com/security/cve/CVE-2018-20821/" source="CVE"/>
		<reference ref_id="CVE-2018-20822" ref_url="https://www.suse.com/security/cve/CVE-2018-20822/" source="CVE"/>
		<reference ref_id="CVE-2019-6283" ref_url="https://www.suse.com/security/cve/CVE-2019-6283/" source="CVE"/>
		<reference ref_id="CVE-2019-6284" ref_url="https://www.suse.com/security/cve/CVE-2019-6284/" source="CVE"/>
		<reference ref_id="CVE-2019-6286" ref_url="https://www.suse.com/security/cve/CVE-2019-6286/" source="CVE"/>
		<description>
These are all security issues fixed in the libsass-3_6_5-1-3.6.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11499/">CVE-2018-11499 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11499">CVE-2018-11499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19797/">CVE-2018-19797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19797">CVE-2018-19797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19827/">CVE-2018-19827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19827">CVE-2018-19827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19837/">CVE-2018-19837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19837">CVE-2018-19837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19838/">CVE-2018-19838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19838">CVE-2018-19838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19839/">CVE-2018-19839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19839">CVE-2018-19839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20190/">CVE-2018-20190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20190">CVE-2018-20190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20821/">CVE-2018-20821 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20821">CVE-2018-20821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20822/">CVE-2018-20822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20822">CVE-2018-20822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6283/">CVE-2019-6283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6283">CVE-2019-6283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6284/">CVE-2019-6284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6284">CVE-2019-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6286/">CVE-2019-6286 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6286">CVE-2019-6286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911307" comment="libsass-3_6_5-1-3.6.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911308" comment="libsass-devel-3.6.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249310" version="1" class="patch">
	<metadata>
		<title>libseccomp-devel-2.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
These are all security issues fixed in the libseccomp-devel-2.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911309" comment="libseccomp-devel-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911310" comment="libseccomp-tools-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911311" comment="libseccomp2-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911312" comment="libseccomp2-32bit-2.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249311" version="1" class="patch">
	<metadata>
		<title>libsepol-devel-3.2-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36085" ref_url="https://www.suse.com/security/cve/CVE-2021-36085/" source="CVE"/>
		<reference ref_id="CVE-2021-36086" ref_url="https://www.suse.com/security/cve/CVE-2021-36086/" source="CVE"/>
		<reference ref_id="CVE-2021-36087" ref_url="https://www.suse.com/security/cve/CVE-2021-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the libsepol-devel-3.2-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36085/">CVE-2021-36085 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36085">CVE-2021-36085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36086/">CVE-2021-36086 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36086">CVE-2021-36086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36087/">CVE-2021-36087 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36087">CVE-2021-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911313" comment="libsepol-devel-3.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911314" comment="libsepol-devel-static-3.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911315" comment="libsepol-utils-3.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911316" comment="libsepol2-3.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911317" comment="libsepol2-32bit-3.2-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249312" version="1" class="patch">
	<metadata>
		<title>libslirp-devel-4.6.1+7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libslirp-devel-4.6.1+7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911318" comment="libslirp-devel-4.6.1+7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911319" comment="libslirp0-4.6.1+7-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249313" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.0.31-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562/" source="CVE"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.0.31-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12562">CVE-2017-12562 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6892">CVE-2017-6892 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911320" comment="libsndfile-devel-1.0.31-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911321" comment="libsndfile1-1.0.31-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911322" comment="libsndfile1-32bit-1.0.31-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249314" version="1" class="patch">
	<metadata>
		<title>libsolv-demo-0.7.19-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<description>
These are all security issues fixed in the libsolv-demo-0.7.19-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911323" comment="libsolv-demo-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911324" comment="libsolv-devel-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911325" comment="libsolv-tools-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911326" comment="perl-solv-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911327" comment="python-solv-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911328" comment="python3-solv-0.7.19-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911329" comment="ruby-solv-0.7.19-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249315" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.72.0-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.72.0-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911330" comment="libsoup-2_4-1-2.72.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911331" comment="libsoup-2_4-1-32bit-2.72.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911332" comment="libsoup-devel-2.72.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911333" comment="libsoup-devel-32bit-2.72.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911334" comment="libsoup-lang-2.72.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911335" comment="typelib-1_0-Soup-2_4-2.72.0-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249316" version="1" class="patch">
	<metadata>
		<title>libspf2-2-1.2.10-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20314" ref_url="https://www.suse.com/security/cve/CVE-2021-20314/" source="CVE"/>
		<description>
These are all security issues fixed in the libspf2-2-1.2.10-5.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20314/">CVE-2021-20314 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20314">CVE-2021-20314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911336" comment="libspf2-2-1.2.10-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911337" comment="libspf2-apidocs-1.2.10-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911338" comment="libspf2-devel-1.2.10-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911339" comment="libspf2-tools-1.2.10-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911340" comment="perl-Mail-SPF_XS-0.01-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249317" version="1" class="patch">
	<metadata>
		<title>libspiro-devel-20200505-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19847" ref_url="https://www.suse.com/security/cve/CVE-2019-19847/" source="CVE"/>
		<description>
These are all security issues fixed in the libspiro-devel-20200505-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19847/">CVE-2019-19847 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19847">CVE-2019-19847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911341" comment="libspiro-devel-20200505-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911342" comment="libspiro1-20200505-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249318" version="1" class="patch">
	<metadata>
		<title>libsrtp2-1-2.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp2-1-2.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6360">CVE-2015-6360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911343" comment="libsrtp2-1-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911344" comment="libsrtp2-1-32bit-2.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911345" comment="libsrtp2-devel-2.4.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249319" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.9.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-16135" ref_url="https://www.suse.com/security/cve/CVE-2020-16135/" source="CVE"/>
		<reference ref_id="CVE-2021-3634" ref_url="https://www.suse.com/security/cve/CVE-2021-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.9.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10933">CVE-2018-10933 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14889">CVE-2019-14889 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16135/">CVE-2020-16135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16135">CVE-2020-16135 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3634/">CVE-2021-3634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3634">CVE-2021-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911346" comment="libssh-config-0.9.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911347" comment="libssh-devel-0.9.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911348" comment="libssh4-0.9.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911349" comment="libssh4-32bit-0.9.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249320" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.9.0-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.9.0-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911350" comment="libssh2-1-1.9.0-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911351" comment="libssh2-1-32bit-1.9.0-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911352" comment="libssh2-devel-1.9.0-3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249321" version="1" class="patch">
	<metadata>
		<title>libstaroffice-0_0-0-0.0.7-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<description>
These are all security issues fixed in the libstaroffice-0_0-0-0.0.7-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9432">CVE-2017-9432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911353" comment="libstaroffice-0_0-0-0.0.7-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911354" comment="libstaroffice-devel-0.0.7-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911355" comment="libstaroffice-devel-doc-0.0.7-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911356" comment="libstaroffice-tools-0.0.7-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249322" version="1" class="patch">
	<metadata>
		<title>libtasn1-6-32bit-4.17.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-6-32bit-4.17.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6003">CVE-2018-6003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911357" comment="libtasn1-6-4.17.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911358" comment="libtasn1-6-32bit-4.17.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911359" comment="libtasn1-devel-4.17.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911360" comment="libtasn1-devel-32bit-4.17.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911361" comment="libtasn1-tools-4.17.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249323" version="1" class="patch">
	<metadata>
		<title>libtirpc-devel-1.3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-devel-1.3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911362" comment="libtirpc-devel-1.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911363" comment="libtirpc-netconfig-1.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911364" comment="libtirpc3-1.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911365" comment="libtirpc3-32bit-1.3.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249324" version="1" class="patch">
	<metadata>
		<title>libtomcrypt-devel-1.18.2-2.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12437" ref_url="https://www.suse.com/security/cve/CVE-2018-12437/" source="CVE"/>
		<description>
These are all security issues fixed in the libtomcrypt-devel-1.18.2-2.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12437/">CVE-2018-12437 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12437">CVE-2018-12437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911366" comment="libtomcrypt-devel-1.18.2-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911367" comment="libtomcrypt-examples-1.18.2-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911368" comment="libtomcrypt1-1.18.2-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911369" comment="libtomcrypt1-32bit-1.18.2-2.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249325" version="1" class="patch">
	<metadata>
		<title>libtpms-devel-0.8.4-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3446" ref_url="https://www.suse.com/security/cve/CVE-2021-3446/" source="CVE"/>
		<reference ref_id="CVE-2021-3505" ref_url="https://www.suse.com/security/cve/CVE-2021-3505/" source="CVE"/>
		<reference ref_id="CVE-2021-3746" ref_url="https://www.suse.com/security/cve/CVE-2021-3746/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms-devel-0.8.4-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3446/">CVE-2021-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3446">CVE-2021-3446 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3505/">CVE-2021-3505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3505">CVE-2021-3505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3746/">CVE-2021-3746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3746">CVE-2021-3746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911370" comment="libtpms-devel-0.8.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911371" comment="libtpms0-0.8.4-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249326" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.13.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15105" ref_url="https://www.suse.com/security/cve/CVE-2017-15105/" source="CVE"/>
		<reference ref_id="CVE-2019-16866" ref_url="https://www.suse.com/security/cve/CVE-2019-16866/" source="CVE"/>
		<reference ref_id="CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934/" source="CVE"/>
		<reference ref_id="CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662/" source="CVE"/>
		<reference ref_id="CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.13.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15105/">CVE-2017-15105 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15105">CVE-2017-15105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16866/">CVE-2019-16866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16866">CVE-2019-16866 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18934">CVE-2019-18934 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12662">CVE-2020-12662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12663">CVE-2020-12663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28935">CVE-2020-28935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911372" comment="libunbound8-1.13.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911373" comment="python3-unbound-1.13.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911374" comment="unbound-1.13.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911375" comment="unbound-anchor-1.13.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911376" comment="unbound-devel-1.13.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911377" comment="unbound-munin-1.13.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249327" version="1" class="patch">
	<metadata>
		<title>libixml11-1.14.10-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6255" ref_url="https://www.suse.com/security/cve/CVE-2016-6255/" source="CVE"/>
		<reference ref_id="CVE-2016-8863" ref_url="https://www.suse.com/security/cve/CVE-2016-8863/" source="CVE"/>
		<reference ref_id="CVE-2021-28302" ref_url="https://www.suse.com/security/cve/CVE-2021-28302/" source="CVE"/>
		<reference ref_id="CVE-2021-29462" ref_url="https://www.suse.com/security/cve/CVE-2021-29462/" source="CVE"/>
		<description>
These are all security issues fixed in the libixml11-1.14.10-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6255/">CVE-2016-6255 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6255">CVE-2016-6255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8863/">CVE-2016-8863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8863">CVE-2016-8863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28302/">CVE-2021-28302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28302">CVE-2021-28302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29462/">CVE-2021-29462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29462">CVE-2021-29462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911378" comment="libixml11-1.14.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911379" comment="libixml11-32bit-1.14.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911380" comment="libupnp-devel-1.14.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911381" comment="libupnp17-1.14.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911382" comment="libupnp17-32bit-1.14.10-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249328" version="1" class="patch">
	<metadata>
		<title>libuv-devel-1.42.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<description>
These are all security issues fixed in the libuv-devel-1.42.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911383" comment="libuv-devel-1.42.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911384" comment="libuv1-1.42.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911385" comment="libuv1-32bit-1.42.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249329" version="1" class="patch">
	<metadata>
		<title>libvirt-7.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-7.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000256">CVE-2017-1000256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2635">CVE-2017-2635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10701">CVE-2020-10701 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14339">CVE-2020-14339 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3631">CVE-2021-3631 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3667">CVE-2021-3667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911386" comment="libvirt-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911387" comment="libvirt-client-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911388" comment="libvirt-daemon-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911389" comment="libvirt-daemon-config-network-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911390" comment="libvirt-daemon-config-nwfilter-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911391" comment="libvirt-daemon-driver-interface-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911392" comment="libvirt-daemon-driver-libxl-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911393" comment="libvirt-daemon-driver-lxc-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911394" comment="libvirt-daemon-driver-network-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911395" comment="libvirt-daemon-driver-nodedev-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911396" comment="libvirt-daemon-driver-nwfilter-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911397" comment="libvirt-daemon-driver-qemu-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911398" comment="libvirt-daemon-driver-secret-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911399" comment="libvirt-daemon-driver-storage-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911400" comment="libvirt-daemon-driver-storage-core-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911401" comment="libvirt-daemon-driver-storage-disk-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911402" comment="libvirt-daemon-driver-storage-gluster-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911403" comment="libvirt-daemon-driver-storage-iscsi-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911404" comment="libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911405" comment="libvirt-daemon-driver-storage-logical-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911406" comment="libvirt-daemon-driver-storage-mpath-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911407" comment="libvirt-daemon-driver-storage-rbd-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911408" comment="libvirt-daemon-driver-storage-scsi-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911409" comment="libvirt-daemon-hooks-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911410" comment="libvirt-daemon-lxc-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911411" comment="libvirt-daemon-qemu-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911412" comment="libvirt-daemon-xen-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911413" comment="libvirt-devel-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911414" comment="libvirt-devel-32bit-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911415" comment="libvirt-doc-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911416" comment="libvirt-libs-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911417" comment="libvirt-lock-sanlock-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911418" comment="libvirt-nss-7.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911419" comment="wireshark-plugin-libvirt-7.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249330" version="1" class="patch">
	<metadata>
		<title>libvorbis-devel-1.3.7-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-devel-1.3.7-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911420" comment="libvorbis-devel-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911421" comment="libvorbis-devel-32bit-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911422" comment="libvorbis0-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911423" comment="libvorbis0-32bit-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911424" comment="libvorbisenc2-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911425" comment="libvorbisenc2-32bit-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911426" comment="libvorbisfile3-1.3.7-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911427" comment="libvorbisfile3-32bit-1.3.7-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249331" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.10.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641/" source="CVE"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.10.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0641">CVE-2017-0641 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13194">CVE-2017-13194 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2126">CVE-2019-2126 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9325">CVE-2019-9325 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9371">CVE-2019-9371 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911428" comment="libvpx-devel-1.10.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911429" comment="libvpx6-1.10.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911430" comment="libvpx6-32bit-1.10.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911431" comment="vpx-tools-1.10.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249332" version="1" class="patch">
	<metadata>
		<title>libwebp-devel-1.2.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8888" ref_url="https://www.suse.com/security/cve/CVE-2016-8888/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebp-devel-1.2.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8888/">CVE-2016-8888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8888">CVE-2016-8888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911432" comment="libwebp-devel-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911433" comment="libwebp-devel-32bit-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911434" comment="libwebp-tools-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911435" comment="libwebp7-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911436" comment="libwebp7-32bit-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911437" comment="libwebpdecoder3-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911438" comment="libwebpdecoder3-32bit-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911439" comment="libwebpdemux2-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911440" comment="libwebpdemux2-32bit-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911441" comment="libwebpmux3-1.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911442" comment="libwebpmux3-32bit-1.2.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249333" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.12-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-3376" ref_url="https://www.suse.com/security/cve/CVE-2006-3376/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.12-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3376/">CVE-2006-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3376">CVE-2006-3376 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911443" comment="libwmf-0_2-7-0.2.12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911444" comment="libwmf-0_2-7-32bit-0.2.12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911445" comment="libwmf-devel-0.2.12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911446" comment="libwmf-gnome-0.2.12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911447" comment="libwmf-gnome-32bit-0.2.12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911448" comment="libwmf-tools-0.2.12-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249334" version="1" class="patch">
	<metadata>
		<title>libwpd-0_10-10-0.10.3-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0002" ref_url="https://www.suse.com/security/cve/CVE-2007-0002/" source="CVE"/>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<description>
These are all security issues fixed in the libwpd-0_10-10-0.10.3-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0002/">CVE-2007-0002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0002">CVE-2007-0002 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14226">CVE-2017-14226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19208">CVE-2018-19208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911449" comment="libwpd-0_10-10-0.10.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911450" comment="libwpd-devel-0.10.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911451" comment="libwpd-devel-doc-0.10.3-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911452" comment="libwpd-tools-0.10.3-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249335" version="1" class="patch">
	<metadata>
		<title>libxkbcommon-devel-1.3.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbcommon-devel-1.3.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911453" comment="libxkbcommon-devel-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911454" comment="libxkbcommon-devel-32bit-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911455" comment="libxkbcommon-tools-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911456" comment="libxkbcommon-x11-0-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911457" comment="libxkbcommon-x11-0-32bit-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911458" comment="libxkbcommon-x11-devel-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911459" comment="libxkbcommon-x11-devel-32bit-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911460" comment="libxkbcommon0-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911461" comment="libxkbcommon0-32bit-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911462" comment="libxkbregistry-devel-1.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911463" comment="libxkbregistry0-1.3.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249336" version="1" class="patch">
	<metadata>
		<title>libxls-devel-1.6.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27819" ref_url="https://www.suse.com/security/cve/CVE-2020-27819/" source="CVE"/>
		<description>
These are all security issues fixed in the libxls-devel-1.6.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27819/">CVE-2020-27819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27819">CVE-2020-27819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911464" comment="libxls-devel-1.6.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911465" comment="libxls-tools-1.6.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911466" comment="libxlsreader8-1.6.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249337" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.12-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.12-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911467" comment="libxml2-2-2.9.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911468" comment="libxml2-2-32bit-2.9.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911469" comment="libxml2-devel-2.9.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911470" comment="libxml2-devel-32bit-2.9.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911471" comment="libxml2-doc-2.9.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911472" comment="libxml2-tools-2.9.12-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249338" version="1" class="patch">
	<metadata>
		<title>libxslt-devel-1.1.34-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-devel-1.1.34-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911473" comment="libxslt-devel-1.1.34-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911474" comment="libxslt-devel-32bit-1.1.34-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911475" comment="libxslt-tools-1.1.34-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911476" comment="libxslt1-1.1.34-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911477" comment="libxslt1-32bit-1.1.34-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249339" version="1" class="patch">
	<metadata>
		<title>libzip-devel-1.8.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858/" source="CVE"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip-devel-1.8.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12858">CVE-2017-12858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14107">CVE-2017-14107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911478" comment="libzip-devel-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911479" comment="libzip-tools-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911480" comment="libzip5-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911481" comment="libzip5-32bit-1.8.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249340" version="1" class="patch">
	<metadata>
		<title>libzypp-17.28.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-17.28.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7435">CVE-2017-7435 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9271">CVE-2017-9271 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911482" comment="libzypp-17.28.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911483" comment="libzypp-devel-17.28.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911484" comment="libzypp-devel-doc-17.28.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249341" version="1" class="patch">
	<metadata>
		<title>liferea-1.13.6-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4791" ref_url="https://www.suse.com/security/cve/CVE-2005-4791/" source="CVE"/>
		<description>
These are all security issues fixed in the liferea-1.13.6-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4791/">CVE-2005-4791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4791">CVE-2005-4791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911485" comment="liferea-1.13.6-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911486" comment="liferea-lang-1.13.6-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249342" version="1" class="patch">
	<metadata>
		<title>lilypond-2.23.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10992" ref_url="https://www.suse.com/security/cve/CVE-2018-10992/" source="CVE"/>
		<reference ref_id="CVE-2020-17353" ref_url="https://www.suse.com/security/cve/CVE-2020-17353/" source="CVE"/>
		<description>
These are all security issues fixed in the lilypond-2.23.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10992/">CVE-2018-10992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10992">CVE-2018-10992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17353/">CVE-2020-17353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17353">CVE-2020-17353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911487" comment="lilypond-2.23.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911488" comment="lilypond-emmentaler-fonts-2.23.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911489" comment="lilypond-fonts-common-2.23.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911490" comment="lilypond-texgy-fonts-2.23.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249343" version="1" class="patch">
	<metadata>
		<title>links-2.24-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11114" ref_url="https://www.suse.com/security/cve/CVE-2017-11114/" source="CVE"/>
		<description>
These are all security issues fixed in the links-2.24-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11114/">CVE-2017-11114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11114">CVE-2017-11114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911491" comment="links-2.24-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249344" version="1" class="patch">
	<metadata>
		<title>libBasicUsageEnvironment1-2021.08.23-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-4013" ref_url="https://www.suse.com/security/cve/CVE-2018-4013/" source="CVE"/>
		<reference ref_id="CVE-2019-15232" ref_url="https://www.suse.com/security/cve/CVE-2019-15232/" source="CVE"/>
		<reference ref_id="CVE-2019-6256" ref_url="https://www.suse.com/security/cve/CVE-2019-6256/" source="CVE"/>
		<reference ref_id="CVE-2019-7314" ref_url="https://www.suse.com/security/cve/CVE-2019-7314/" source="CVE"/>
		<reference ref_id="CVE-2019-9215" ref_url="https://www.suse.com/security/cve/CVE-2019-9215/" source="CVE"/>
		<reference ref_id="CVE-2021-28899" ref_url="https://www.suse.com/security/cve/CVE-2021-28899/" source="CVE"/>
		<reference ref_id="CVE-2021-38380" ref_url="https://www.suse.com/security/cve/CVE-2021-38380/" source="CVE"/>
		<reference ref_id="CVE-2021-38381" ref_url="https://www.suse.com/security/cve/CVE-2021-38381/" source="CVE"/>
		<reference ref_id="CVE-2021-38382" ref_url="https://www.suse.com/security/cve/CVE-2021-38382/" source="CVE"/>
		<reference ref_id="CVE-2021-39282" ref_url="https://www.suse.com/security/cve/CVE-2021-39282/" source="CVE"/>
		<reference ref_id="CVE-2021-39283" ref_url="https://www.suse.com/security/cve/CVE-2021-39283/" source="CVE"/>
		<description>
These are all security issues fixed in the libBasicUsageEnvironment1-2021.08.23-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4013/">CVE-2018-4013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4013">CVE-2018-4013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15232/">CVE-2019-15232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15232">CVE-2019-15232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6256/">CVE-2019-6256 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6256">CVE-2019-6256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7314/">CVE-2019-7314 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7314">CVE-2019-7314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9215/">CVE-2019-9215 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9215">CVE-2019-9215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28899/">CVE-2021-28899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28899">CVE-2021-28899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38380/">CVE-2021-38380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38380">CVE-2021-38380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38381/">CVE-2021-38381 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38381">CVE-2021-38381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38382/">CVE-2021-38382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38382">CVE-2021-38382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39282/">CVE-2021-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39282">CVE-2021-39282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39283/">CVE-2021-39283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39283">CVE-2021-39283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911492" comment="libBasicUsageEnvironment1-2021.08.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911493" comment="libUsageEnvironment3-2021.08.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911494" comment="libgroupsock30-2021.08.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911495" comment="libliveMedia97-2021.08.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911496" comment="live555-2021.08.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911497" comment="live555-devel-2021.08.23-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249345" version="1" class="patch">
	<metadata>
		<title>liblldpctl4-1.0.12-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<description>
These are all security issues fixed in the liblldpctl4-1.0.12-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911498" comment="liblldpctl4-1.0.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911499" comment="lldpd-1.0.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911500" comment="lldpd-devel-1.0.12-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249346" version="1" class="patch">
	<metadata>
		<title>log4j-2.13.2-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="CVE-2020-9488" ref_url="https://www.suse.com/security/cve/CVE-2020-9488/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.13.2-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9488/">CVE-2020-9488 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9488">CVE-2020-9488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911501" comment="log4j-2.13.2-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911502" comment="log4j-javadoc-2.13.2-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911503" comment="log4j-jcl-2.13.2-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911504" comment="log4j-slf4j-2.13.2-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249347" version="1" class="patch">
	<metadata>
		<title>log4j12-1.2.17-3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645/" source="CVE"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j12-1.2.17-3.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5645">CVE-2017-5645 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911505" comment="log4j12-1.2.17-3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911506" comment="log4j12-javadoc-1.2.17-3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911507" comment="log4j12-manual-1.2.17-3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249348" version="1" class="patch">
	<metadata>
		<title>lout-3.42-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19917" ref_url="https://www.suse.com/security/cve/CVE-2019-19917/" source="CVE"/>
		<reference ref_id="CVE-2019-19918" ref_url="https://www.suse.com/security/cve/CVE-2019-19918/" source="CVE"/>
		<description>
These are all security issues fixed in the lout-3.42-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19917/">CVE-2019-19917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19917">CVE-2019-19917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19918/">CVE-2019-19918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19918">CVE-2019-19918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911508" comment="lout-3.42-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249349" version="1" class="patch">
	<metadata>
		<title>liblua5_3-5-32bit-5.3.6-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_3-5-32bit-5.3.6-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911509" comment="liblua5_3-5-5.3.6-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911510" comment="liblua5_3-5-32bit-5.3.6-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911511" comment="lua53-5.3.6-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911512" comment="lua53-devel-5.3.6-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911513" comment="lua53-doc-5.3.6-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249350" version="1" class="patch">
	<metadata>
		<title>liblua5_4-5-32bit-5.4.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888/" source="CVE"/>
		<reference ref_id="CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945/" source="CVE"/>
		<reference ref_id="CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342/" source="CVE"/>
		<reference ref_id="CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369/" source="CVE"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_4-5-32bit-5.4.3-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15888">CVE-2020-15888 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15945">CVE-2020-15945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24342">CVE-2020-24342 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24369">CVE-2020-24369 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911514" comment="liblua5_4-5-5.4.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911515" comment="liblua5_4-5-32bit-5.4.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911516" comment="lua54-5.4.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911517" comment="lua54-devel-5.4.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911518" comment="lua54-doc-5.4.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249351" version="1" class="patch">
	<metadata>
		<title>liblxc-devel-4.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5985" ref_url="https://www.suse.com/security/cve/CVE-2017-5985/" source="CVE"/>
		<reference ref_id="CVE-2018-6556" ref_url="https://www.suse.com/security/cve/CVE-2018-6556/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
These are all security issues fixed in the liblxc-devel-4.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5985/">CVE-2017-5985 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5985">CVE-2017-5985 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6556/">CVE-2018-6556 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6556">CVE-2018-6556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911519" comment="liblxc-devel-4.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911520" comment="liblxc1-4.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911521" comment="lxc-4.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911522" comment="lxc-bash-completion-4.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911523" comment="pam_cgfs-4.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249352" version="1" class="patch">
	<metadata>
		<title>lxterminal-0.4.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10369" ref_url="https://www.suse.com/security/cve/CVE-2016-10369/" source="CVE"/>
		<description>
These are all security issues fixed in the lxterminal-0.4.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10369/">CVE-2016-10369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10369">CVE-2016-10369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911524" comment="lxterminal-0.4.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911525" comment="lxterminal-lang-0.4.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249353" version="1" class="patch">
	<metadata>
		<title>lynis-3.0.5-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8108" ref_url="https://www.suse.com/security/cve/CVE-2017-8108/" source="CVE"/>
		<reference ref_id="CVE-2019-13033" ref_url="https://www.suse.com/security/cve/CVE-2019-13033/" source="CVE"/>
		<reference ref_id="CVE-2020-13882" ref_url="https://www.suse.com/security/cve/CVE-2020-13882/" source="CVE"/>
		<description>
These are all security issues fixed in the lynis-3.0.5-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8108/">CVE-2017-8108 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8108">CVE-2017-8108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13033/">CVE-2019-13033 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13033">CVE-2019-13033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13882/">CVE-2020-13882 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13882">CVE-2020-13882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911526" comment="lynis-3.0.5-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249354" version="1" class="patch">
	<metadata>
		<title>lynx-2.9.0~dev.9-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-7234" ref_url="https://www.suse.com/security/cve/CVE-2006-7234/" source="CVE"/>
		<reference ref_id="CVE-2016-9179" ref_url="https://www.suse.com/security/cve/CVE-2016-9179/" source="CVE"/>
		<description>
These are all security issues fixed in the lynx-2.9.0~dev.9-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7234/">CVE-2006-7234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7234">CVE-2006-7234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9179/">CVE-2016-9179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9179">CVE-2016-9179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911527" comment="lynx-2.9.0~dev.9-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249355" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.9.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.9.3-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17543">CVE-2019-17543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911528" comment="liblz4-1-1.9.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911529" comment="liblz4-1-32bit-1.9.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911530" comment="liblz4-devel-1.9.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911531" comment="lz4-1.9.3-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249356" version="1" class="patch">
	<metadata>
		<title>libmailutils5-3.8-8.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18862" ref_url="https://www.suse.com/security/cve/CVE-2019-18862/" source="CVE"/>
		<description>
These are all security issues fixed in the libmailutils5-3.8-8.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18862/">CVE-2019-18862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18862">CVE-2019-18862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911532" comment="libmailutils5-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911533" comment="mailutils-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911534" comment="mailutils-devel-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911535" comment="mailutils-imap4d-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911536" comment="mailutils-mh-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911537" comment="mailutils-notify-3.8-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911538" comment="mailutils-pop3d-3.8-8.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249357" version="1" class="patch">
	<metadata>
		<title>man-2.9.4-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.9.4-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911539" comment="man-2.9.4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249358" version="1" class="patch">
	<metadata>
		<title>libjavamapscript-7.6.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4542" ref_url="https://www.suse.com/security/cve/CVE-2007-4542/" source="CVE"/>
		<reference ref_id="CVE-2020-10872" ref_url="https://www.suse.com/security/cve/CVE-2020-10872/" source="CVE"/>
		<reference ref_id="CVE-2021-32062" ref_url="https://www.suse.com/security/cve/CVE-2021-32062/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavamapscript-7.6.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4542/">CVE-2007-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4542">CVE-2007-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10872/">CVE-2020-10872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10872">CVE-2020-10872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32062/">CVE-2021-32062 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32062">CVE-2021-32062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911540" comment="libjavamapscript-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911541" comment="libmapserver2-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911542" comment="mapserver-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911543" comment="mapserver-devel-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911544" comment="perl-mapscript-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911545" comment="php-mapscript-7.6.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911546" comment="python-mapscript-7.6.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249359" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.6.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221/" source="CVE"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.6.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5624">CVE-2016-5624 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6664">CVE-2016-6664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10320">CVE-2017-10320 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3257">CVE-2017-3257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2782">CVE-2018-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2786">CVE-2018-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3060">CVE-2018-3060 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3162">CVE-2018-3162 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3185">CVE-2018-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3200">CVE-2018-3200 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2503">CVE-2019-2503 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14789">CVE-2020-14789 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14812">CVE-2020-14812 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15180">CVE-2020-15180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7221">CVE-2020-7221 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2154">CVE-2021-2154 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2372">CVE-2021-2372 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2389">CVE-2021-2389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911547" comment="libmariadbd-devel-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911548" comment="libmariadbd19-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911549" comment="mariadb-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911550" comment="mariadb-bench-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911551" comment="mariadb-client-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911552" comment="mariadb-errormessages-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911553" comment="mariadb-galera-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911554" comment="mariadb-rpm-macros-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911555" comment="mariadb-test-10.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911556" comment="mariadb-tools-10.6.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249360" version="1" class="patch">
	<metadata>
		<title>libmariadb-devel-3.2.3-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadb-devel-3.2.3-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911557" comment="libmariadb-devel-3.2.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911558" comment="libmariadb3-3.2.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911559" comment="libmariadb3-32bit-3.2.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911560" comment="libmariadb_plugins-3.2.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911561" comment="libmariadbprivate-3.2.3-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249361" version="1" class="patch">
	<metadata>
		<title>libmatio-devel-1.5.21-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17533" ref_url="https://www.suse.com/security/cve/CVE-2019-17533/" source="CVE"/>
		<reference ref_id="CVE-2019-20017" ref_url="https://www.suse.com/security/cve/CVE-2019-20017/" source="CVE"/>
		<reference ref_id="CVE-2019-20052" ref_url="https://www.suse.com/security/cve/CVE-2019-20052/" source="CVE"/>
		<description>
These are all security issues fixed in the libmatio-devel-1.5.21-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17533/">CVE-2019-17533 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17533">CVE-2019-17533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20017/">CVE-2019-20017 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20017">CVE-2019-20017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20052/">CVE-2019-20052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20052">CVE-2019-20052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911562" comment="libmatio-devel-1.5.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911563" comment="libmatio11-1.5.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911564" comment="matio-tools-1.5.21-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249362" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.43.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12291" ref_url="https://www.suse.com/security/cve/CVE-2018-12291/" source="CVE"/>
		<reference ref_id="CVE-2019-5885" ref_url="https://www.suse.com/security/cve/CVE-2019-5885/" source="CVE"/>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109/" source="CVE"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2020-26257" ref_url="https://www.suse.com/security/cve/CVE-2020-26257/" source="CVE"/>
		<reference ref_id="CVE-2020-26891" ref_url="https://www.suse.com/security/cve/CVE-2020-26891/" source="CVE"/>
		<reference ref_id="CVE-2021-29471" ref_url="https://www.suse.com/security/cve/CVE-2021-29471/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-39163" ref_url="https://www.suse.com/security/cve/CVE-2021-39163/" source="CVE"/>
		<reference ref_id="CVE-2021-39164" ref_url="https://www.suse.com/security/cve/CVE-2021-39164/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.43.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12291/">CVE-2018-12291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12291">CVE-2018-12291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5885/">CVE-2019-5885 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5885">CVE-2019-5885 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10109">CVE-2020-10109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26257/">CVE-2020-26257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26257">CVE-2020-26257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26891/">CVE-2020-26891 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26891">CVE-2020-26891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29471/">CVE-2021-29471 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29471">CVE-2021-29471 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39163/">CVE-2021-39163 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39163">CVE-2021-39163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39164/">CVE-2021-39164 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39164">CVE-2021-39164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911565" comment="matrix-synapse-1.43.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249363" version="1" class="patch">
	<metadata>
		<title>maven-3.8.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26291" ref_url="https://www.suse.com/security/cve/CVE-2021-26291/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-3.8.1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-26291/">CVE-2021-26291 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26291">CVE-2021-26291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911566" comment="maven-3.8.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911567" comment="maven-javadoc-3.8.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911568" comment="maven-lib-3.8.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249364" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.27.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14032" ref_url="https://www.suse.com/security/cve/CVE-2017-14032/" source="CVE"/>
		<reference ref_id="CVE-2017-2784" ref_url="https://www.suse.com/security/cve/CVE-2017-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-0487" ref_url="https://www.suse.com/security/cve/CVE-2018-0487/" source="CVE"/>
		<reference ref_id="CVE-2018-0488" ref_url="https://www.suse.com/security/cve/CVE-2018-0488/" source="CVE"/>
		<reference ref_id="CVE-2018-19608" ref_url="https://www.suse.com/security/cve/CVE-2018-19608/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.27.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14032/">CVE-2017-14032 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14032">CVE-2017-14032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2784/">CVE-2017-2784 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2784">CVE-2017-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0487/">CVE-2018-0487 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0487">CVE-2018-0487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0488/">CVE-2018-0488 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0488">CVE-2018-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19608/">CVE-2018-19608 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19608">CVE-2018-19608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911569" comment="libmbedcrypto7-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911570" comment="libmbedcrypto7-32bit-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911571" comment="libmbedtls13-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911572" comment="libmbedtls13-32bit-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911573" comment="libmbedx509-1-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911574" comment="libmbedx509-1-32bit-2.27.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911575" comment="mbedtls-devel-2.27.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249365" version="1" class="patch">
	<metadata>
		<title>libmcpp0-2.7.2-24.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14274" ref_url="https://www.suse.com/security/cve/CVE-2019-14274/" source="CVE"/>
		<description>
These are all security issues fixed in the libmcpp0-2.7.2-24.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14274/">CVE-2019-14274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14274">CVE-2019-14274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911576" comment="libmcpp0-2.7.2-24.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911577" comment="mcpp-2.7.2-24.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911578" comment="mcpp-devel-2.7.2-24.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249366" version="1" class="patch">
	<metadata>
		<title>memcached-1.6.9-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115/" source="CVE"/>
		<reference ref_id="CVE-2018-1000127" ref_url="https://www.suse.com/security/cve/CVE-2018-1000127/" source="CVE"/>
		<reference ref_id="CVE-2020-10931" ref_url="https://www.suse.com/security/cve/CVE-2020-10931/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.6.9-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9951">CVE-2017-9951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000115">CVE-2018-1000115 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000127/">CVE-2018-1000127 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000127">CVE-2018-1000127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10931/">CVE-2020-10931 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10931">CVE-2020-10931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911579" comment="memcached-1.6.9-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911580" comment="memcached-devel-1.6.9-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249367" version="1" class="patch">
	<metadata>
		<title>messagelib-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10732" ref_url="https://www.suse.com/security/cve/CVE-2019-10732/" source="CVE"/>
		<reference ref_id="CVE-2021-31855" ref_url="https://www.suse.com/security/cve/CVE-2021-31855/" source="CVE"/>
		<description>
These are all security issues fixed in the messagelib-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10732/">CVE-2019-10732 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10732">CVE-2019-10732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31855/">CVE-2021-31855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31855">CVE-2021-31855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911581" comment="messagelib-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911582" comment="messagelib-devel-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911583" comment="messagelib-lang-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249368" version="1" class="patch">
	<metadata>
		<title>g3utils-1.2.1-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.2.1-6.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4936">CVE-2008-4936 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911584" comment="g3utils-1.2.1-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911585" comment="mgetty-1.2.1-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911586" comment="sendfax-1.2.1-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249369" version="1" class="patch">
	<metadata>
		<title>miller-5.10.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15167" ref_url="https://www.suse.com/security/cve/CVE-2020-15167/" source="CVE"/>
		<description>
These are all security issues fixed in the miller-5.10.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15167/">CVE-2020-15167 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15167">CVE-2020-15167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911587" comment="miller-5.10.2-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249370" version="1" class="patch">
	<metadata>
		<title>minicom-2.7.1-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>
These are all security issues fixed in the minicom-2.7.1-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7467">CVE-2017-7467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911588" comment="minicom-2.7.1-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911589" comment="minicom-lang-2.7.1-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249371" version="1" class="patch">
	<metadata>
		<title>minidlna-1.3.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695/" source="CVE"/>
		<reference ref_id="CVE-2020-28926" ref_url="https://www.suse.com/security/cve/CVE-2020-28926/" source="CVE"/>
		<description>
These are all security issues fixed in the minidlna-1.3.0-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12695">CVE-2020-12695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28926/">CVE-2020-28926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28926">CVE-2020-28926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911590" comment="minidlna-1.3.0-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249372" version="1" class="patch">
	<metadata>
		<title>docker-machine-driver-kvm2-1.23.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1002103" ref_url="https://www.suse.com/security/cve/CVE-2018-1002103/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-machine-driver-kvm2-1.23.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1002103/">CVE-2018-1002103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002103">CVE-2018-1002103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911591" comment="docker-machine-driver-kvm2-1.23.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911592" comment="minikube-1.23.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911593" comment="minikube-bash-completion-1.23.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249373" version="1" class="patch">
	<metadata>
		<title>libminiupnpc-devel-2.2.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-1000494" ref_url="https://www.suse.com/security/cve/CVE-2017-1000494/" source="CVE"/>
		<reference ref_id="CVE-2017-8798" ref_url="https://www.suse.com/security/cve/CVE-2017-8798/" source="CVE"/>
		<description>
These are all security issues fixed in the libminiupnpc-devel-2.2.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000494/">CVE-2017-1000494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000494">CVE-2017-1000494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8798/">CVE-2017-8798 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8798">CVE-2017-8798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911594" comment="libminiupnpc-devel-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911595" comment="libminiupnpc17-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911596" comment="libminiupnpc17-32bit-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911597" comment="miniupnpc-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911598" comment="python36-miniupnpc-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911599" comment="python38-miniupnpc-2.2.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911600" comment="python39-miniupnpc-2.2.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249374" version="1" class="patch">
	<metadata>
		<title>mkvtoolnix-61.0.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-4022" ref_url="https://www.suse.com/security/cve/CVE-2018-4022/" source="CVE"/>
		<description>
These are all security issues fixed in the mkvtoolnix-61.0.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4022/">CVE-2018-4022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4022">CVE-2018-4022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911601" comment="mkvtoolnix-61.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911602" comment="mkvtoolnix-gui-61.0.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249375" version="1" class="patch">
	<metadata>
		<title>mobidict-1.2-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11724" ref_url="https://www.suse.com/security/cve/CVE-2018-11724/" source="CVE"/>
		<description>
These are all security issues fixed in the mobidict-1.2-1.16 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11724/">CVE-2018-11724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11724">CVE-2018-11724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911603" comment="mobidict-1.2-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249376" version="1" class="patch">
	<metadata>
		<title>monero-devel-0.17.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8798" ref_url="https://www.suse.com/security/cve/CVE-2017-8798/" source="CVE"/>
		<description>
These are all security issues fixed in the monero-devel-0.17.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8798/">CVE-2017-8798 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8798">CVE-2017-8798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911604" comment="monero-devel-0.17.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911605" comment="monero-utils-0.17.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911606" comment="monerod-0.17.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249377" version="1" class="patch">
	<metadata>
		<title>monitoring-plugins-2.3.1-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the monitoring-plugins-2.3.1-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5623">CVE-2007-5623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911607" comment="monitoring-plugins-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911608" comment="monitoring-plugins-all-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911609" comment="monitoring-plugins-breeze-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911610" comment="monitoring-plugins-by_ssh-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911611" comment="monitoring-plugins-cluster-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911612" comment="monitoring-plugins-common-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911613" comment="monitoring-plugins-cups-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911614" comment="monitoring-plugins-dbi-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911615" comment="monitoring-plugins-dbi-mysql-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911616" comment="monitoring-plugins-dbi-pgsql-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911617" comment="monitoring-plugins-dbi-sqlite3-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911618" comment="monitoring-plugins-dhcp-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911619" comment="monitoring-plugins-dig-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911620" comment="monitoring-plugins-disk-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911621" comment="monitoring-plugins-disk_smb-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911622" comment="monitoring-plugins-dns-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911623" comment="monitoring-plugins-dummy-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911624" comment="monitoring-plugins-extras-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911625" comment="monitoring-plugins-file_age-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911626" comment="monitoring-plugins-flexlm-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911627" comment="monitoring-plugins-fping-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911628" comment="monitoring-plugins-hpjd-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911629" comment="monitoring-plugins-http-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911630" comment="monitoring-plugins-icmp-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911631" comment="monitoring-plugins-ide_smart-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911632" comment="monitoring-plugins-ifoperstatus-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911633" comment="monitoring-plugins-ifstatus-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911634" comment="monitoring-plugins-ircd-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911635" comment="monitoring-plugins-ldap-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911636" comment="monitoring-plugins-load-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911637" comment="monitoring-plugins-log-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911638" comment="monitoring-plugins-mailq-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911639" comment="monitoring-plugins-mrtg-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911640" comment="monitoring-plugins-mrtgtraf-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911641" comment="monitoring-plugins-mysql-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911642" comment="monitoring-plugins-nagios-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911643" comment="monitoring-plugins-nt-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911644" comment="monitoring-plugins-ntp_peer-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911645" comment="monitoring-plugins-ntp_time-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911646" comment="monitoring-plugins-nwstat-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911647" comment="monitoring-plugins-oracle-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911648" comment="monitoring-plugins-overcr-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911649" comment="monitoring-plugins-pgsql-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911650" comment="monitoring-plugins-ping-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911651" comment="monitoring-plugins-procs-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911652" comment="monitoring-plugins-radius-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911653" comment="monitoring-plugins-real-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911654" comment="monitoring-plugins-rpc-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911655" comment="monitoring-plugins-sensors-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911656" comment="monitoring-plugins-smtp-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911657" comment="monitoring-plugins-snmp-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911658" comment="monitoring-plugins-ssh-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911659" comment="monitoring-plugins-swap-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911660" comment="monitoring-plugins-tcp-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911661" comment="monitoring-plugins-time-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911662" comment="monitoring-plugins-ups-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911663" comment="monitoring-plugins-uptime-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911664" comment="monitoring-plugins-users-2.3.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911665" comment="monitoring-plugins-wave-2.3.1-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249378" version="1" class="patch">
	<metadata>
		<title>libmosquitto1-2.0.11-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7650" ref_url="https://www.suse.com/security/cve/CVE-2017-7650/" source="CVE"/>
		<reference ref_id="CVE-2017-7651" ref_url="https://www.suse.com/security/cve/CVE-2017-7651/" source="CVE"/>
		<reference ref_id="CVE-2017-7652" ref_url="https://www.suse.com/security/cve/CVE-2017-7652/" source="CVE"/>
		<reference ref_id="CVE-2017-9868" ref_url="https://www.suse.com/security/cve/CVE-2017-9868/" source="CVE"/>
		<reference ref_id="CVE-2018-12543" ref_url="https://www.suse.com/security/cve/CVE-2018-12543/" source="CVE"/>
		<reference ref_id="CVE-2018-12546" ref_url="https://www.suse.com/security/cve/CVE-2018-12546/" source="CVE"/>
		<reference ref_id="CVE-2018-12550" ref_url="https://www.suse.com/security/cve/CVE-2018-12550/" source="CVE"/>
		<reference ref_id="CVE-2018-12551" ref_url="https://www.suse.com/security/cve/CVE-2018-12551/" source="CVE"/>
		<reference ref_id="CVE-2018-20145" ref_url="https://www.suse.com/security/cve/CVE-2018-20145/" source="CVE"/>
		<reference ref_id="CVE-2019-11778" ref_url="https://www.suse.com/security/cve/CVE-2019-11778/" source="CVE"/>
		<reference ref_id="CVE-2019-11779" ref_url="https://www.suse.com/security/cve/CVE-2019-11779/" source="CVE"/>
		<reference ref_id="CVE-2021-28166" ref_url="https://www.suse.com/security/cve/CVE-2021-28166/" source="CVE"/>
		<description>
These are all security issues fixed in the libmosquitto1-2.0.11-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7650/">CVE-2017-7650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7650">CVE-2017-7650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7651/">CVE-2017-7651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7651">CVE-2017-7651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7652/">CVE-2017-7652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7652">CVE-2017-7652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9868/">CVE-2017-9868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9868">CVE-2017-9868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12543/">CVE-2018-12543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12543">CVE-2018-12543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12546/">CVE-2018-12546 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12546">CVE-2018-12546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12550/">CVE-2018-12550 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12550">CVE-2018-12550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12551/">CVE-2018-12551 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12551">CVE-2018-12551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20145/">CVE-2018-20145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20145">CVE-2018-20145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11778/">CVE-2019-11778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11778">CVE-2019-11778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11779/">CVE-2019-11779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11779">CVE-2019-11779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28166/">CVE-2021-28166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28166">CVE-2021-28166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911666" comment="libmosquitto1-2.0.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911667" comment="libmosquittopp1-2.0.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911668" comment="mosquitto-2.0.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911669" comment="mosquitto-clients-2.0.11-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911670" comment="mosquitto-devel-2.0.11-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249379" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.69.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.69.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911671" comment="libfreebl3-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911672" comment="libfreebl3-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911673" comment="libfreebl3-hmac-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911674" comment="libfreebl3-hmac-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911675" comment="libsoftokn3-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911676" comment="libsoftokn3-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911677" comment="libsoftokn3-hmac-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911678" comment="libsoftokn3-hmac-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911679" comment="mozilla-nss-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911680" comment="mozilla-nss-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911681" comment="mozilla-nss-certs-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911682" comment="mozilla-nss-certs-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911683" comment="mozilla-nss-devel-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911684" comment="mozilla-nss-sysinit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911685" comment="mozilla-nss-sysinit-32bit-3.69.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911686" comment="mozilla-nss-tools-3.69.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249380" version="1" class="patch">
	<metadata>
		<title>libmozjs-78-0-78.13.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-78-0-78.13.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911687" comment="libmozjs-78-0-78.13.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911688" comment="mozjs78-78.13.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911689" comment="mozjs78-devel-78.13.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249381" version="1" class="patch">
	<metadata>
		<title>mp3gain-1.6.2-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12911" ref_url="https://www.suse.com/security/cve/CVE-2017-12911/" source="CVE"/>
		<reference ref_id="CVE-2019-18359" ref_url="https://www.suse.com/security/cve/CVE-2019-18359/" source="CVE"/>
		<description>
These are all security issues fixed in the mp3gain-1.6.2-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12911/">CVE-2017-12911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12911">CVE-2017-12911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18359/">CVE-2019-18359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18359">CVE-2019-18359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911690" comment="mp3gain-1.6.2-2.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249382" version="1" class="patch">
	<metadata>
		<title>libmpg123-0-1.29.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10683" ref_url="https://www.suse.com/security/cve/CVE-2017-10683/" source="CVE"/>
		<reference ref_id="CVE-2017-11126" ref_url="https://www.suse.com/security/cve/CVE-2017-11126/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpg123-0-1.29.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10683/">CVE-2017-10683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10683">CVE-2017-10683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11126/">CVE-2017-11126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11126">CVE-2017-11126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911691" comment="libmpg123-0-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911692" comment="libmpg123-0-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911693" comment="libout123-0-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911694" comment="libout123-0-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911695" comment="libsyn123-0-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911696" comment="libsyn123-0-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911697" comment="mpg123-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911698" comment="mpg123-devel-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911699" comment="mpg123-devel-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911700" comment="mpg123-jack-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911701" comment="mpg123-jack-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911702" comment="mpg123-openal-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911703" comment="mpg123-openal-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911704" comment="mpg123-portaudio-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911705" comment="mpg123-portaudio-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911706" comment="mpg123-pulse-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911707" comment="mpg123-pulse-32bit-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911708" comment="mpg123-sdl-1.29.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911709" comment="mpg123-sdl-32bit-1.29.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249383" version="1" class="patch">
	<metadata>
		<title>libmpv1-0.33.1+git.20210630T163736.f2afae55e9-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-6360" ref_url="https://www.suse.com/security/cve/CVE-2018-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpv1-0.33.1+git.20210630T163736.f2afae55e9-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6360/">CVE-2018-6360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6360">CVE-2018-6360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911710" comment="libmpv1-0.33.1+git.20210630T163736.f2afae55e9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911711" comment="mpv-0.33.1+git.20210630T163736.f2afae55e9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911712" comment="mpv-bash-completion-0.33.1+git.20210630T163736.f2afae55e9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911713" comment="mpv-devel-0.33.1+git.20210630T163736.f2afae55e9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911714" comment="mpv-zsh-completion-0.33.1+git.20210630T163736.f2afae55e9-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249384" version="1" class="patch">
	<metadata>
		<title>mr-1.20180726-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7032" ref_url="https://www.suse.com/security/cve/CVE-2018-7032/" source="CVE"/>
		<description>
These are all security issues fixed in the mr-1.20180726-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7032/">CVE-2018-7032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7032">CVE-2018-7032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911715" comment="mr-1.20180726-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249385" version="1" class="patch">
	<metadata>
		<title>msmtp-1.8.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-8337" ref_url="https://www.suse.com/security/cve/CVE-2019-8337/" source="CVE"/>
		<description>
These are all security issues fixed in the msmtp-1.8.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8337/">CVE-2019-8337 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8337">CVE-2019-8337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911716" comment="msmtp-1.8.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911717" comment="msmtp-doc-1.8.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911718" comment="msmtp-lang-1.8.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911719" comment="msmtp-mta-1.8.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249386" version="1" class="patch">
	<metadata>
		<title>mumble-1.3.4-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20743" ref_url="https://www.suse.com/security/cve/CVE-2018-20743/" source="CVE"/>
		<reference ref_id="CVE-2021-27229" ref_url="https://www.suse.com/security/cve/CVE-2021-27229/" source="CVE"/>
		<description>
These are all security issues fixed in the mumble-1.3.4-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20743/">CVE-2018-20743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20743">CVE-2018-20743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27229/">CVE-2021-27229 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27229">CVE-2021-27229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911720" comment="mumble-1.3.4-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911721" comment="mumble-32bit-1.3.4-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911722" comment="mumble-server-1.3.4-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249387" version="1" class="patch">
	<metadata>
		<title>libmunge2-0.5.14-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3691" ref_url="https://www.suse.com/security/cve/CVE-2019-3691/" source="CVE"/>
		<description>
These are all security issues fixed in the libmunge2-0.5.14-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3691/">CVE-2019-3691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3691">CVE-2019-3691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911723" comment="libmunge2-0.5.14-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911724" comment="libmunge2-32bit-0.5.14-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911725" comment="munge-0.5.14-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911726" comment="munge-devel-0.5.14-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911727" comment="munge-devel-32bit-0.5.14-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249388" version="1" class="patch">
	<metadata>
		<title>munin-2.0.66-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6188" ref_url="https://www.suse.com/security/cve/CVE-2017-6188/" source="CVE"/>
		<description>
These are all security issues fixed in the munin-2.0.66-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6188/">CVE-2017-6188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6188">CVE-2017-6188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911728" comment="munin-2.0.66-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911729" comment="munin-node-2.0.66-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249389" version="1" class="patch">
	<metadata>
		<title>mupdf-1.18.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10132" ref_url="https://www.suse.com/security/cve/CVE-2016-10132/" source="CVE"/>
		<reference ref_id="CVE-2016-10141" ref_url="https://www.suse.com/security/cve/CVE-2016-10141/" source="CVE"/>
		<reference ref_id="CVE-2016-10221" ref_url="https://www.suse.com/security/cve/CVE-2016-10221/" source="CVE"/>
		<reference ref_id="CVE-2016-8729" ref_url="https://www.suse.com/security/cve/CVE-2016-8729/" source="CVE"/>
		<reference ref_id="CVE-2017-15369" ref_url="https://www.suse.com/security/cve/CVE-2017-15369/" source="CVE"/>
		<reference ref_id="CVE-2017-17858" ref_url="https://www.suse.com/security/cve/CVE-2017-17858/" source="CVE"/>
		<reference ref_id="CVE-2017-5627" ref_url="https://www.suse.com/security/cve/CVE-2017-5627/" source="CVE"/>
		<reference ref_id="CVE-2017-5628" ref_url="https://www.suse.com/security/cve/CVE-2017-5628/" source="CVE"/>
		<reference ref_id="CVE-2017-5896" ref_url="https://www.suse.com/security/cve/CVE-2017-5896/" source="CVE"/>
		<reference ref_id="CVE-2017-7976" ref_url="https://www.suse.com/security/cve/CVE-2017-7976/" source="CVE"/>
		<reference ref_id="CVE-2018-1000051" ref_url="https://www.suse.com/security/cve/CVE-2018-1000051/" source="CVE"/>
		<reference ref_id="CVE-2018-16647" ref_url="https://www.suse.com/security/cve/CVE-2018-16647/" source="CVE"/>
		<reference ref_id="CVE-2018-16648" ref_url="https://www.suse.com/security/cve/CVE-2018-16648/" source="CVE"/>
		<reference ref_id="CVE-2018-18662" ref_url="https://www.suse.com/security/cve/CVE-2018-18662/" source="CVE"/>
		<reference ref_id="CVE-2018-5686" ref_url="https://www.suse.com/security/cve/CVE-2018-5686/" source="CVE"/>
		<reference ref_id="CVE-2018-6187" ref_url="https://www.suse.com/security/cve/CVE-2018-6187/" source="CVE"/>
		<reference ref_id="CVE-2018-6192" ref_url="https://www.suse.com/security/cve/CVE-2018-6192/" source="CVE"/>
		<reference ref_id="CVE-2018-6544" ref_url="https://www.suse.com/security/cve/CVE-2018-6544/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.18.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10132/">CVE-2016-10132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10132">CVE-2016-10132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10141/">CVE-2016-10141 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10141">CVE-2016-10141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10221/">CVE-2016-10221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10221">CVE-2016-10221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8729/">CVE-2016-8729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8729">CVE-2016-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15369/">CVE-2017-15369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15369">CVE-2017-15369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17858/">CVE-2017-17858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17858">CVE-2017-17858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5627/">CVE-2017-5627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5627">CVE-2017-5627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5628/">CVE-2017-5628 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5628">CVE-2017-5628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5896/">CVE-2017-5896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5896">CVE-2017-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7976/">CVE-2017-7976 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7976">CVE-2017-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000051/">CVE-2018-1000051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000051">CVE-2018-1000051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16647/">CVE-2018-16647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16647">CVE-2018-16647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16648/">CVE-2018-16648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16648">CVE-2018-16648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18662/">CVE-2018-18662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18662">CVE-2018-18662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5686/">CVE-2018-5686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5686">CVE-2018-5686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6187/">CVE-2018-6187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6187">CVE-2018-6187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6192/">CVE-2018-6192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6192">CVE-2018-6192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6544/">CVE-2018-6544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6544">CVE-2018-6544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911730" comment="mupdf-1.18.0-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911731" comment="mupdf-devel-static-1.18.0-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249390" version="1" class="patch">
	<metadata>
		<title>mutt-2.0.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<reference ref_id="CVE-2021-32055" ref_url="https://www.suse.com/security/cve/CVE-2021-32055/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32055/">CVE-2021-32055 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32055">CVE-2021-32055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911732" comment="mutt-2.0.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911733" comment="mutt-doc-2.0.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911734" comment="mutt-lang-2.0.7-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249391" version="1" class="patch">
	<metadata>
		<title>mybatis-3.5.6-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26945" ref_url="https://www.suse.com/security/cve/CVE-2020-26945/" source="CVE"/>
		<description>
These are all security issues fixed in the mybatis-3.5.6-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26945/">CVE-2020-26945 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26945">CVE-2020-26945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911735" comment="mybatis-3.5.6-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911736" comment="mybatis-javadoc-3.5.6-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249392" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-8.0.25-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-3523" ref_url="https://www.suse.com/security/cve/CVE-2017-3523/" source="CVE"/>
		<reference ref_id="CVE-2017-3589" ref_url="https://www.suse.com/security/cve/CVE-2017-3589/" source="CVE"/>
		<reference ref_id="CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-8.0.25-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3523/">CVE-2017-3523 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3523">CVE-2017-3523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3589/">CVE-2017-3589 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3589">CVE-2017-3589 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2875">CVE-2020-2875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911737" comment="mysql-connector-java-8.0.25-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249393" version="1" class="patch">
	<metadata>
		<title>mysql-workbench-8.0.25-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-3469" ref_url="https://www.suse.com/security/cve/CVE-2017-3469/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-workbench-8.0.25-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3469/">CVE-2017-3469 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3469">CVE-2017-3469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911738" comment="mysql-workbench-8.0.25-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249394" version="1" class="patch">
	<metadata>
		<title>nagios-4.4.6-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2162" ref_url="https://www.suse.com/security/cve/CVE-2006-2162/" source="CVE"/>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2008-4796" ref_url="https://www.suse.com/security/cve/CVE-2008-4796/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2013-2214" ref_url="https://www.suse.com/security/cve/CVE-2013-2214/" source="CVE"/>
		<reference ref_id="CVE-2013-4214" ref_url="https://www.suse.com/security/cve/CVE-2013-4214/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<reference ref_id="CVE-2016-0726" ref_url="https://www.suse.com/security/cve/CVE-2016-0726/" source="CVE"/>
		<reference ref_id="CVE-2016-6209" ref_url="https://www.suse.com/security/cve/CVE-2016-6209/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<reference ref_id="CVE-2016-9566" ref_url="https://www.suse.com/security/cve/CVE-2016-9566/" source="CVE"/>
		<reference ref_id="CVE-2017-12847" ref_url="https://www.suse.com/security/cve/CVE-2017-12847/" source="CVE"/>
		<reference ref_id="CVE-2018-13441" ref_url="https://www.suse.com/security/cve/CVE-2018-13441/" source="CVE"/>
		<reference ref_id="CVE-2018-18245" ref_url="https://www.suse.com/security/cve/CVE-2018-18245/" source="CVE"/>
		<reference ref_id="CVE-2019-3698" ref_url="https://www.suse.com/security/cve/CVE-2019-3698/" source="CVE"/>
		<reference ref_id="CVE-2020-13977" ref_url="https://www.suse.com/security/cve/CVE-2020-13977/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-4.4.6-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2162/">CVE-2006-2162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2162">CVE-2006-2162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5803">CVE-2007-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4796/">CVE-2008-4796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4796">CVE-2008-4796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1523">CVE-2011-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2214/">CVE-2013-2214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2214">CVE-2013-2214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4214/">CVE-2013-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4214">CVE-2013-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7108">CVE-2013-7108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1878">CVE-2014-1878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0726/">CVE-2016-0726 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0726">CVE-2016-0726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6209/">CVE-2016-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6209">CVE-2016-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8641">CVE-2016-8641 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9566/">CVE-2016-9566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9566">CVE-2016-9566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12847/">CVE-2017-12847 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12847">CVE-2017-12847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-13441/">CVE-2018-13441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13441">CVE-2018-13441 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18245/">CVE-2018-18245 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18245">CVE-2018-18245 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3698/">CVE-2019-3698 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3698">CVE-2019-3698 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13977/">CVE-2020-13977 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13977">CVE-2020-13977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911739" comment="nagios-4.4.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911740" comment="nagios-contrib-4.4.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911741" comment="nagios-devel-4.4.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911742" comment="nagios-theme-exfoliation-4.4.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911743" comment="nagios-www-4.4.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911744" comment="nagios-www-dch-4.4.6-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249395" version="1" class="patch">
	<metadata>
		<title>libprotobuf-nanopb0-0.4.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26243" ref_url="https://www.suse.com/security/cve/CVE-2020-26243/" source="CVE"/>
		<reference ref_id="CVE-2020-5235" ref_url="https://www.suse.com/security/cve/CVE-2020-5235/" source="CVE"/>
		<reference ref_id="CVE-2021-21401" ref_url="https://www.suse.com/security/cve/CVE-2021-21401/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-nanopb0-0.4.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26243/">CVE-2020-26243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26243">CVE-2020-26243 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-5235/">CVE-2020-5235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5235">CVE-2020-5235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21401/">CVE-2021-21401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21401">CVE-2021-21401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911745" comment="libprotobuf-nanopb0-0.4.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911746" comment="nanopb-devel-0.4.5-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911747" comment="nanopb-source-0.4.5-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249396" version="1" class="patch">
	<metadata>
		<title>nasm-2.15.05-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<description>
These are all security issues fixed in the nasm-2.15.05-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11111">CVE-2017-11111 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14228">CVE-2017-14228 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17810">CVE-2017-17810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17811">CVE-2017-17811 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17812">CVE-2017-17812 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17813">CVE-2017-17813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17814">CVE-2017-17814 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17815">CVE-2017-17815 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17816">CVE-2017-17816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17817">CVE-2017-17817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17818">CVE-2017-17818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17819">CVE-2017-17819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17820">CVE-2017-17820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911748" comment="nasm-2.15.05-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249397" version="1" class="patch">
	<metadata>
		<title>gnome-shell-search-provider-nautilus-40.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11461" ref_url="https://www.suse.com/security/cve/CVE-2019-11461/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-search-provider-nautilus-40.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11461/">CVE-2019-11461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11461">CVE-2019-11461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911749" comment="gnome-shell-search-provider-nautilus-40.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911750" comment="libnautilus-extension1-40.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911751" comment="nautilus-40.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911752" comment="nautilus-devel-40.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911753" comment="nautilus-lang-40.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911754" comment="typelib-1_0-Nautilus-3_0-40.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249398" version="1" class="patch">
	<metadata>
		<title>nbd-3.21-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3534" ref_url="https://www.suse.com/security/cve/CVE-2005-3534/" source="CVE"/>
		<description>
These are all security issues fixed in the nbd-3.21-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3534/">CVE-2005-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3534">CVE-2005-3534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911755" comment="nbd-3.21-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249399" version="1" class="patch">
	<metadata>
		<title>nbdkit-1.27.8-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3716" ref_url="https://www.suse.com/security/cve/CVE-2021-3716/" source="CVE"/>
		<description>
These are all security issues fixed in the nbdkit-1.27.8-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3716/">CVE-2021-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3716">CVE-2021-3716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911756" comment="nbdkit-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911757" comment="nbdkit-bash-completion-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911758" comment="nbdkit-basic-filters-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911759" comment="nbdkit-basic-plugins-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911760" comment="nbdkit-curl-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911761" comment="nbdkit-devel-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911762" comment="nbdkit-example-plugins-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911763" comment="nbdkit-gzip-filter-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911764" comment="nbdkit-nbd-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911765" comment="nbdkit-python-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911766" comment="nbdkit-server-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911767" comment="nbdkit-ssh-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911768" comment="nbdkit-tar-filter-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911769" comment="nbdkit-tmpdisk-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911770" comment="nbdkit-vddk-plugin-1.27.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911771" comment="nbdkit-xz-filter-1.27.8-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249400" version="1" class="patch">
	<metadata>
		<title>neomutt-20210205-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
These are all security issues fixed in the neomutt-20210205-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911772" comment="neomutt-20210205-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911773" comment="neomutt-doc-20210205-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911774" comment="neomutt-lang-20210205-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249401" version="1" class="patch">
	<metadata>
		<title>libneon-devel-0.31.2-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon-devel-0.31.2-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911775" comment="libneon-devel-0.31.2-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911776" comment="libneon27-0.31.2-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911777" comment="libneon27-32bit-0.31.2-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249402" version="1" class="patch">
	<metadata>
		<title>neovim-0.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
These are all security issues fixed in the neovim-0.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911778" comment="neovim-0.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911779" comment="neovim-lang-0.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249403" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.9-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.9-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18065">CVE-2018-18065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911780" comment="libsnmp30-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911781" comment="libsnmp30-32bit-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911782" comment="net-snmp-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911783" comment="net-snmp-devel-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911784" comment="net-snmp-devel-32bit-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911785" comment="perl-SNMP-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911786" comment="python36-net-snmp-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911787" comment="python38-net-snmp-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911788" comment="python39-net-snmp-5.9-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911789" comment="snmp-mibs-5.9-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249404" version="1" class="patch">
	<metadata>
		<title>netdata-1.31.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-18836" ref_url="https://www.suse.com/security/cve/CVE-2018-18836/" source="CVE"/>
		<reference ref_id="CVE-2018-18837" ref_url="https://www.suse.com/security/cve/CVE-2018-18837/" source="CVE"/>
		<reference ref_id="CVE-2018-18838" ref_url="https://www.suse.com/security/cve/CVE-2018-18838/" source="CVE"/>
		<reference ref_id="CVE-2018-18839" ref_url="https://www.suse.com/security/cve/CVE-2018-18839/" source="CVE"/>
		<description>
These are all security issues fixed in the netdata-1.31.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18836/">CVE-2018-18836 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18836">CVE-2018-18836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18837/">CVE-2018-18837 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18837">CVE-2018-18837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18838/">CVE-2018-18838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18838">CVE-2018-18838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18839/">CVE-2018-18839 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18839">CVE-2018-18839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911790" comment="netdata-1.31.0-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249405" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-10.93.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-10.93.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8975">CVE-2018-8975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911791" comment="libnetpbm-devel-10.93.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911792" comment="libnetpbm11-10.93.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911793" comment="libnetpbm11-32bit-10.93.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911794" comment="netpbm-10.93.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249406" version="1" class="patch">
	<metadata>
		<title>netty-4.1.60-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10707" ref_url="https://www.suse.com/security/cve/CVE-2020-10707/" source="CVE"/>
		<reference ref_id="CVE-2020-11612" ref_url="https://www.suse.com/security/cve/CVE-2020-11612/" source="CVE"/>
		<reference ref_id="CVE-2021-21290" ref_url="https://www.suse.com/security/cve/CVE-2021-21290/" source="CVE"/>
		<reference ref_id="CVE-2021-21295" ref_url="https://www.suse.com/security/cve/CVE-2021-21295/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.60-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10707/">CVE-2020-10707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10707">CVE-2020-10707 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11612/">CVE-2020-11612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11612">CVE-2020-11612 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21290/">CVE-2021-21290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21290">CVE-2021-21290 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21295/">CVE-2021-21295 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21295">CVE-2021-21295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911795" comment="netty-4.1.60-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911796" comment="netty-javadoc-4.1.60-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911797" comment="netty-poms-4.1.60-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249407" version="1" class="patch">
	<metadata>
		<title>newlib-4.1.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3420" ref_url="https://www.suse.com/security/cve/CVE-2021-3420/" source="CVE"/>
		<description>
These are all security issues fixed in the newlib-4.1.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3420/">CVE-2021-3420 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3420">CVE-2021-3420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911798" comment="newlib-4.1.0-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249408" version="1" class="patch">
	<metadata>
		<title>nextcloud-22.1.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3762" ref_url="https://www.suse.com/security/cve/CVE-2018-3762/" source="CVE"/>
		<reference ref_id="CVE-2020-8154" ref_url="https://www.suse.com/security/cve/CVE-2020-8154/" source="CVE"/>
		<reference ref_id="CVE-2020-8155" ref_url="https://www.suse.com/security/cve/CVE-2020-8155/" source="CVE"/>
		<reference ref_id="CVE-2020-8183" ref_url="https://www.suse.com/security/cve/CVE-2020-8183/" source="CVE"/>
		<description>
These are all security issues fixed in the nextcloud-22.1.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3762/">CVE-2018-3762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3762">CVE-2018-3762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8154/">CVE-2020-8154 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8154">CVE-2020-8154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8155/">CVE-2020-8155 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8155">CVE-2020-8155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8183/">CVE-2020-8183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8183">CVE-2020-8183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911799" comment="nextcloud-22.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911800" comment="nextcloud-apache-22.1.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249409" version="1" class="patch">
	<metadata>
		<title>caja-extension-nextcloud-3.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22879" ref_url="https://www.suse.com/security/cve/CVE-2021-22879/" source="CVE"/>
		<description>
These are all security issues fixed in the caja-extension-nextcloud-3.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22879/">CVE-2021-22879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22879">CVE-2021-22879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911801" comment="caja-extension-nextcloud-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911802" comment="libnextcloudsync-devel-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911803" comment="libnextcloudsync0-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911804" comment="nautilus-extension-nextcloud-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911805" comment="nemo-extension-nextcloud-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911806" comment="nextcloud-desktop-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911807" comment="nextcloud-desktop-doc-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911808" comment="nextcloud-desktop-dolphin-3.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911809" comment="nextcloud-desktop-lang-3.3.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249410" version="1" class="patch">
	<metadata>
		<title>nfdump-1.6.23-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the nfdump-1.6.23-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911810" comment="nfdump-1.6.23-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249411" version="1" class="patch">
	<metadata>
		<title>libnfsidmap1-1.0-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the libnfsidmap1-1.0-26.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911811" comment="libnfsidmap1-1.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911812" comment="nfs-client-2.5.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911813" comment="nfs-kernel-server-2.5.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911814" comment="nfsidmap-devel-1.0-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249412" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.43.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.43.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911815" comment="libnghttp2-14-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911816" comment="libnghttp2-14-32bit-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911817" comment="libnghttp2-devel-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911818" comment="libnghttp2_asio-devel-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911819" comment="libnghttp2_asio1-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911820" comment="libnghttp2_asio1-32bit-1.43.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911821" comment="nghttp2-1.43.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249413" version="1" class="patch">
	<metadata>
		<title>nginx-1.21.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7529" ref_url="https://www.suse.com/security/cve/CVE-2017-7529/" source="CVE"/>
		<reference ref_id="CVE-2018-16843" ref_url="https://www.suse.com/security/cve/CVE-2018-16843/" source="CVE"/>
		<reference ref_id="CVE-2018-16845" ref_url="https://www.suse.com/security/cve/CVE-2018-16845/" source="CVE"/>
		<reference ref_id="CVE-2019-20372" ref_url="https://www.suse.com/security/cve/CVE-2019-20372/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.21.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7529/">CVE-2017-7529 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7529">CVE-2017-7529 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16843/">CVE-2018-16843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16843">CVE-2018-16843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16845/">CVE-2018-16845 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16845">CVE-2018-16845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20372/">CVE-2019-20372 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20372">CVE-2019-20372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">CVE-2021-23017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911822" comment="nginx-1.21.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911823" comment="nginx-source-1.21.3-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911824" comment="vim-plugin-nginx-1.21.3-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249414" version="1" class="patch">
	<metadata>
		<title>nim-1.2.12-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21372" ref_url="https://www.suse.com/security/cve/CVE-2021-21372/" source="CVE"/>
		<reference ref_id="CVE-2021-21373" ref_url="https://www.suse.com/security/cve/CVE-2021-21373/" source="CVE"/>
		<reference ref_id="CVE-2021-21374" ref_url="https://www.suse.com/security/cve/CVE-2021-21374/" source="CVE"/>
		<description>
These are all security issues fixed in the nim-1.2.12-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21372/">CVE-2021-21372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21372">CVE-2021-21372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21373/">CVE-2021-21373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21373">CVE-2021-21373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21374/">CVE-2021-21374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21374">CVE-2021-21374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911825" comment="nim-1.2.12-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249415" version="1" class="patch">
	<metadata>
		<title>ncat-7.92-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
These are all security issues fixed in the ncat-7.92-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911826" comment="ncat-7.92-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911827" comment="nmap-7.92-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911828" comment="nping-7.92-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249416" version="1" class="patch">
	<metadata>
		<title>nodejs-underscore-1.13.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23358" ref_url="https://www.suse.com/security/cve/CVE-2021-23358/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-underscore-1.13.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23358/">CVE-2021-23358 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23358">CVE-2021-23358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911829" comment="nodejs-underscore-1.13.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249417" version="1" class="patch">
	<metadata>
		<title>nodejs14-14.17.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2020-8172" ref_url="https://www.suse.com/security/cve/CVE-2020-8172/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<reference ref_id="CVE-2020-8201" ref_url="https://www.suse.com/security/cve/CVE-2020-8201/" source="CVE"/>
		<reference ref_id="CVE-2020-8251" ref_url="https://www.suse.com/security/cve/CVE-2020-8251/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs14-14.17.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15095">CVE-2020-15095 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">CVE-2020-7774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8172/">CVE-2020-8172 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8172">CVE-2020-8172 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8174">CVE-2020-8174 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8201/">CVE-2020-8201 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8201">CVE-2020-8201 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8251/">CVE-2020-8251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8251">CVE-2020-8251 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8265">CVE-2020-8265 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8287">CVE-2020-8287 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21148">CVE-2021-21148 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22883">CVE-2021-22883 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22884">CVE-2021-22884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22930">CVE-2021-22930 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22939">CVE-2021-22939 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22940">CVE-2021-22940 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27290">CVE-2021-27290 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911830" comment="nodejs14-14.17.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911831" comment="nodejs14-devel-14.17.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911832" comment="nodejs14-docs-14.17.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911833" comment="npm14-14.17.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249418" version="1" class="patch">
	<metadata>
		<title>nodejs16-16.6.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs16-16.6.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22930">CVE-2021-22930 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22939">CVE-2021-22939 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22940">CVE-2021-22940 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911834" comment="nodejs16-16.6.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911835" comment="nodejs16-devel-16.6.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911836" comment="nodejs16-docs-16.6.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911837" comment="npm16-16.6.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249419" version="1" class="patch">
	<metadata>
		<title>notary-0.7.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17596" ref_url="https://www.suse.com/security/cve/CVE-2019-17596/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the notary-0.7.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17596/">CVE-2019-17596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17596">CVE-2019-17596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911838" comment="notary-0.7.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249420" version="1" class="patch">
	<metadata>
		<title>monitoring-plugins-nrpe-4.0.3-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>
These are all security issues fixed in the monitoring-plugins-nrpe-4.0.3-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2913">CVE-2014-2913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911839" comment="monitoring-plugins-nrpe-4.0.3-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911840" comment="nrpe-4.0.3-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911841" comment="nrpe-doc-4.0.3-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249421" version="1" class="patch">
	<metadata>
		<title>nsd-4.3.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2979" ref_url="https://www.suse.com/security/cve/CVE-2012-2979/" source="CVE"/>
		<reference ref_id="CVE-2016-6173" ref_url="https://www.suse.com/security/cve/CVE-2016-6173/" source="CVE"/>
		<reference ref_id="CVE-2019-13207" ref_url="https://www.suse.com/security/cve/CVE-2019-13207/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<description>
These are all security issues fixed in the nsd-4.3.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2979/">CVE-2012-2979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-2979">CVE-2012-2979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6173/">CVE-2016-6173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6173">CVE-2016-6173 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13207/">CVE-2019-13207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13207">CVE-2019-13207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28935">CVE-2020-28935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911842" comment="nsd-4.3.7-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249422" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2021.8.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33285" ref_url="https://www.suse.com/security/cve/CVE-2021-33285/" source="CVE"/>
		<reference ref_id="CVE-2021-33289" ref_url="https://www.suse.com/security/cve/CVE-2021-33289/" source="CVE"/>
		<reference ref_id="CVE-2021-35269" ref_url="https://www.suse.com/security/cve/CVE-2021-35269/" source="CVE"/>
		<reference ref_id="CVE-2021-39255" ref_url="https://www.suse.com/security/cve/CVE-2021-39255/" source="CVE"/>
		<reference ref_id="CVE-2021-39258" ref_url="https://www.suse.com/security/cve/CVE-2021-39258/" source="CVE"/>
		<reference ref_id="CVE-2021-39262" ref_url="https://www.suse.com/security/cve/CVE-2021-39262/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2021.8.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33285/">CVE-2021-33285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33285">CVE-2021-33285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33289/">CVE-2021-33289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33289">CVE-2021-33289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35269/">CVE-2021-35269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35269">CVE-2021-35269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39255/">CVE-2021-39255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39255">CVE-2021-39255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39258/">CVE-2021-39258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39258">CVE-2021-39258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39262/">CVE-2021-39262 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39262">CVE-2021-39262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911843" comment="libntfs-3g-devel-2021.8.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911844" comment="libntfs-3g89-2021.8.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911845" comment="ntfs-3g-2021.8.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911846" comment="ntfsprogs-2021.8.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911847" comment="ntfsprogs-extra-2021.8.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249423" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p15-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p15-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9042">CVE-2016-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6451">CVE-2017-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6458">CVE-2017-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6460">CVE-2017-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911848" comment="ntp-4.2.8p15-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911849" comment="ntp-dcf77-tools-4.2.8p15-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911850" comment="ntp-doc-4.2.8p15-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249424" version="1" class="patch">
	<metadata>
		<title>libntpc1-1.2.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2019-6442" ref_url="https://www.suse.com/security/cve/CVE-2019-6442/" source="CVE"/>
		<reference ref_id="CVE-2019-6443" ref_url="https://www.suse.com/security/cve/CVE-2019-6443/" source="CVE"/>
		<reference ref_id="CVE-2019-6445" ref_url="https://www.suse.com/security/cve/CVE-2019-6445/" source="CVE"/>
		<reference ref_id="CVE-2021-22212" ref_url="https://www.suse.com/security/cve/CVE-2021-22212/" source="CVE"/>
		<description>
These are all security issues fixed in the libntpc1-1.2.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6442/">CVE-2019-6442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6442">CVE-2019-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6443/">CVE-2019-6443 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6443">CVE-2019-6443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6445/">CVE-2019-6445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6445">CVE-2019-6445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22212/">CVE-2021-22212 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22212">CVE-2021-22212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911851" comment="libntpc1-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911852" comment="ntpsec-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911853" comment="ntpsec-devel-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911854" comment="ntpsec-doc-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911855" comment="ntpsec-utils-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911856" comment="python3-ntp-1.2.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249425" version="1" class="patch">
	<metadata>
		<title>liboath-devel-2.6.7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7322" ref_url="https://www.suse.com/security/cve/CVE-2013-7322/" source="CVE"/>
		<description>
These are all security issues fixed in the liboath-devel-2.6.7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7322/">CVE-2013-7322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7322">CVE-2013-7322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911857" comment="liboath-devel-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911858" comment="liboath0-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911859" comment="libpskc-devel-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911860" comment="libpskc0-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911861" comment="oath-toolkit-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911862" comment="oath-toolkit-xml-2.6.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911863" comment="pam_oath-2.6.7-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249426" version="1" class="patch">
	<metadata>
		<title>obs-service-refresh_patches-0.3.9+git.1625238904.d59f20e-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12477" ref_url="https://www.suse.com/security/cve/CVE-2018-12477/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-refresh_patches-0.3.9+git.1625238904.d59f20e-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12477/">CVE-2018-12477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12477">CVE-2018-12477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911864" comment="obs-service-refresh_patches-0.3.9+git.1625238904.d59f20e-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249427" version="1" class="patch">
	<metadata>
		<title>obs-service-source_validator-0.21-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9274" ref_url="https://www.suse.com/security/cve/CVE-2017-9274/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-source_validator-0.21-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9274/">CVE-2017-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9274">CVE-2017-9274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911865" comment="obs-service-source_validator-0.21-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249428" version="1" class="patch">
	<metadata>
		<title>obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12473" ref_url="https://www.suse.com/security/cve/CVE-2018-12473/" source="CVE"/>
		<reference ref_id="CVE-2018-12474" ref_url="https://www.suse.com/security/cve/CVE-2018-12474/" source="CVE"/>
		<reference ref_id="CVE-2018-12476" ref_url="https://www.suse.com/security/cve/CVE-2018-12476/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12473/">CVE-2018-12473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12473">CVE-2018-12473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12474/">CVE-2018-12474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12474">CVE-2018-12474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12476/">CVE-2018-12476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12476">CVE-2018-12476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911866" comment="obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911867" comment="obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911868" comment="obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911869" comment="obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911870" comment="obs-service-tar-0.10.28.1632141620.a8837d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911871" comment="obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249429" version="1" class="patch">
	<metadata>
		<title>oci-cli-3.0.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<description>
These are all security issues fixed in the oci-cli-3.0.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911872" comment="oci-cli-3.0.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249430" version="1" class="patch">
	<metadata>
		<title>oddjob-0.34.5-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10737" ref_url="https://www.suse.com/security/cve/CVE-2020-10737/" source="CVE"/>
		<description>
These are all security issues fixed in the oddjob-0.34.5-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10737/">CVE-2020-10737 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10737">CVE-2020-10737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911873" comment="oddjob-0.34.5-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911874" comment="oddjob-mkhomedir-0.34.5-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249431" version="1" class="patch">
	<metadata>
		<title>okular-21.08.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000801" ref_url="https://www.suse.com/security/cve/CVE-2018-1000801/" source="CVE"/>
		<reference ref_id="CVE-2020-9359" ref_url="https://www.suse.com/security/cve/CVE-2020-9359/" source="CVE"/>
		<description>
These are all security issues fixed in the okular-21.08.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000801/">CVE-2018-1000801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000801">CVE-2018-1000801 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9359/">CVE-2020-9359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9359">CVE-2020-9359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911875" comment="okular-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911876" comment="okular-devel-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911877" comment="okular-lang-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911878" comment="okular-mobile-21.08.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911879" comment="okular-spectre-21.08.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249432" version="1" class="patch">
	<metadata>
		<title>libonig5-6.9.7.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<reference ref_id="CVE-2019-19012" ref_url="https://www.suse.com/security/cve/CVE-2019-19012/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<reference ref_id="CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246/" source="CVE"/>
		<reference ref_id="CVE-2020-26159" ref_url="https://www.suse.com/security/cve/CVE-2020-26159/" source="CVE"/>
		<description>
These are all security issues fixed in the libonig5-6.9.7.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13224">CVE-2019-13224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19012/">CVE-2019-19012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-19012">CVE-2019-19012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19203">CVE-2019-19203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19204">CVE-2019-19204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19246">CVE-2019-19246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26159/">CVE-2020-26159 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26159">CVE-2020-26159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911880" comment="libonig5-6.9.7.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911881" comment="oniguruma-devel-6.9.7.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249433" version="1" class="patch">
	<metadata>
		<title>iscsiuio-0.7.8.6-80.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<description>
These are all security issues fixed in the iscsiuio-0.7.8.6-80.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911882" comment="iscsiuio-0.7.8.6-80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911883" comment="libopeniscsiusr0_2_0-2.1.5-80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911884" comment="open-iscsi-2.1.5-80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911885" comment="open-iscsi-devel-2.1.5-80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249434" version="1" class="patch">
	<metadata>
		<title>openafs-1.8.8-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16947" ref_url="https://www.suse.com/security/cve/CVE-2018-16947/" source="CVE"/>
		<reference ref_id="CVE-2018-16948" ref_url="https://www.suse.com/security/cve/CVE-2018-16948/" source="CVE"/>
		<reference ref_id="CVE-2018-16949" ref_url="https://www.suse.com/security/cve/CVE-2018-16949/" source="CVE"/>
		<description>
These are all security issues fixed in the openafs-1.8.8-1.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16947/">CVE-2018-16947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16947">CVE-2018-16947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16948/">CVE-2018-16948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16948">CVE-2018-16948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16949/">CVE-2018-16949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16949">CVE-2018-16949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911886" comment="openafs-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911887" comment="openafs-authlibs-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911888" comment="openafs-authlibs-devel-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911889" comment="openafs-client-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911890" comment="openafs-devel-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911891" comment="openafs-fuse_client-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911892" comment="openafs-kernel-source-1.8.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911893" comment="openafs-kmp-default-1.8.8_k5.14.6_1-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911894" comment="openafs-server-1.8.8-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249435" version="1" class="patch">
	<metadata>
		<title>libopenconnect5-8.10-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20319" ref_url="https://www.suse.com/security/cve/CVE-2018-20319/" source="CVE"/>
		<reference ref_id="CVE-2020-12105" ref_url="https://www.suse.com/security/cve/CVE-2020-12105/" source="CVE"/>
		<reference ref_id="CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenconnect5-8.10-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20319/">CVE-2018-20319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-20319">CVE-2018-20319 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12105/">CVE-2020-12105 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12105">CVE-2020-12105 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12823">CVE-2020-12823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911895" comment="libopenconnect5-8.10-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911896" comment="openconnect-8.10-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911897" comment="openconnect-bash-completion-8.10-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911898" comment="openconnect-devel-8.10-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911899" comment="openconnect-doc-8.10-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911900" comment="openconnect-lang-8.10-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249436" version="1" class="patch">
	<metadata>
		<title>libopencv4_5-4.5.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencv4_5-4.5.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14491">CVE-2019-14491 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15939">CVE-2019-15939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911901" comment="libopencv4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911902" comment="libopencv_aruco4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911903" comment="libopencv_face4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911904" comment="libopencv_highgui4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911905" comment="libopencv_imgcodecs4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911906" comment="libopencv_objdetect4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911907" comment="libopencv_superres4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911908" comment="libopencv_videoio4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911909" comment="libopencv_videostab4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911910" comment="libopencv_ximgproc4_5-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911911" comment="opencv-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911912" comment="opencv-devel-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911913" comment="opencv-doc-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911914" comment="opencv4-cascades-data-4.5.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911915" comment="python3-opencv-4.5.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249437" version="1" class="patch">
	<metadata>
		<title>libopencv3_4-3.4.10-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencv3_4-3.4.10-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14491">CVE-2019-14491 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15939">CVE-2019-15939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911916" comment="libopencv3_4-3.4.10-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911917" comment="opencv3-3.4.10-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911918" comment="opencv3-devel-3.4.10-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911919" comment="opencv3-doc-3.4.10-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911920" comment="python3-opencv3-3.4.10-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249438" version="1" class="patch">
	<metadata>
		<title>libIex-3_1-30-3.1.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-18443" ref_url="https://www.suse.com/security/cve/CVE-2018-18443/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_1-30-3.1.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14988">CVE-2017-14988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9111">CVE-2017-9111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9115">CVE-2017-9115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9116">CVE-2017-9116 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18443/">CVE-2018-18443 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18443">CVE-2018-18443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18444">CVE-2018-18444 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911921" comment="libIex-3_1-30-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911922" comment="libIex-3_1-30-32bit-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911923" comment="libIlmThread-3_1-30-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911924" comment="libIlmThread-3_1-30-32bit-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911925" comment="libOpenEXR-3_1-30-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911926" comment="libOpenEXR-3_1-30-32bit-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911927" comment="libOpenEXRCore-3_1-30-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911928" comment="libOpenEXRUtil-3_1-30-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911929" comment="libOpenEXRUtil-3_1-30-32bit-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911930" comment="openexr-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911931" comment="openexr-devel-3.1.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911932" comment="openexr-doc-3.1.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249439" version="1" class="patch">
	<metadata>
		<title>openfortivpn-1.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7041" ref_url="https://www.suse.com/security/cve/CVE-2020-7041/" source="CVE"/>
		<reference ref_id="CVE-2020-7042" ref_url="https://www.suse.com/security/cve/CVE-2020-7042/" source="CVE"/>
		<reference ref_id="CVE-2020-7043" ref_url="https://www.suse.com/security/cve/CVE-2020-7043/" source="CVE"/>
		<description>
These are all security issues fixed in the openfortivpn-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7041/">CVE-2020-7041 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7041">CVE-2020-7041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7042/">CVE-2020-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7042">CVE-2020-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7043/">CVE-2020-7043 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7043">CVE-2020-7043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911933" comment="openfortivpn-1.17.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249440" version="1" class="patch">
	<metadata>
		<title>openjfx-11.0.12-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14664" ref_url="https://www.suse.com/security/cve/CVE-2020-14664/" source="CVE"/>
		<description>
These are all security issues fixed in the openjfx-11.0.12-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14664/">CVE-2020-14664 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14664">CVE-2020-14664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911934" comment="openjfx-11.0.12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911935" comment="openjfx-devel-11.0.12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911936" comment="openjfx-javadoc-11.0.12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911937" comment="openjfx-jmods-11.0.12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911938" comment="openjfx-src-11.0.12-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249441" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.4.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504/" source="CVE"/>
		<reference ref_id="CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505/" source="CVE"/>
		<reference ref_id="CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151/" source="CVE"/>
		<reference ref_id="CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-18088" ref_url="https://www.suse.com/security/cve/CVE-2018-18088/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2018-7648" ref_url="https://www.suse.com/security/cve/CVE-2018-7648/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.4.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10504">CVE-2016-10504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10505">CVE-2016-10505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10506">CVE-2016-10506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5152">CVE-2016-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8332">CVE-2016-8332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12982">CVE-2017-12982 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14039">CVE-2017-14039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14040">CVE-2017-14040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14041">CVE-2017-14041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14151">CVE-2017-14151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14152">CVE-2017-14152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18088/">CVE-2018-18088 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18088">CVE-2018-18088 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5727">CVE-2018-5727 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5785">CVE-2018-5785 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">CVE-2018-6616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7648/">CVE-2018-7648 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7648">CVE-2018-7648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6851">CVE-2020-6851 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911939" comment="libopenjp2-7-2.4.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911940" comment="libopenjp2-7-32bit-2.4.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911941" comment="openjpeg2-2.4.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911942" comment="openjpeg2-devel-2.4.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911943" comment="openjpeg2-devel-doc-2.4.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249442" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.59-69.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.59-69.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8027">CVE-2020-8027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911944" comment="libldap-2_4-2-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911945" comment="libldap-2_4-2-32bit-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911946" comment="libldap-data-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911947" comment="openldap2-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911948" comment="openldap2-back-meta-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911949" comment="openldap2-back-perl-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911950" comment="openldap2-back-sock-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911951" comment="openldap2-back-sql-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911952" comment="openldap2-client-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911953" comment="openldap2-contrib-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911954" comment="openldap2-devel-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911955" comment="openldap2-devel-32bit-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911956" comment="openldap2-devel-static-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911957" comment="openldap2-doc-2.4.59-69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911958" comment="openldap2-ppolicy-check-password-1.2-69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249443" version="1" class="patch">
	<metadata>
		<title>libsaml-devel-3.2.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853/" source="CVE"/>
		<description>
These are all security issues fixed in the libsaml-devel-3.2.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16853">CVE-2017-16853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911959" comment="libsaml-devel-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911960" comment="libsaml12-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911961" comment="opensaml-bin-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911962" comment="opensaml-schemas-3.2.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249444" version="1" class="patch">
	<metadata>
		<title>opensc-0.21.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16424" ref_url="https://www.suse.com/security/cve/CVE-2018-16424/" source="CVE"/>
		<reference ref_id="CVE-2018-16425" ref_url="https://www.suse.com/security/cve/CVE-2018-16425/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480/" source="CVE"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.21.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16421">CVE-2018-16421 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16424/">CVE-2018-16424 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16424">CVE-2018-16424 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16425/">CVE-2018-16425 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16425">CVE-2018-16425 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19480">CVE-2019-19480 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26570">CVE-2020-26570 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911963" comment="opensc-0.21.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911964" comment="opensc-32bit-0.21.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249445" version="1" class="patch">
	<metadata>
		<title>openssh-8.4p1-7.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-8.4p1-7.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10010">CVE-2016-10010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911965" comment="openssh-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911966" comment="openssh-cavs-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911967" comment="openssh-clients-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911968" comment="openssh-common-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911969" comment="openssh-fips-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911970" comment="openssh-helpers-8.4p1-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911971" comment="openssh-server-8.4p1-7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249446" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.1.1l-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911972" comment="libopenssl-devel-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911973" comment="openssl-1.1.1l-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249447" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-6.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3737">CVE-2017-3737 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911974" comment="libopenssl-1_0_0-devel-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911975" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911976" comment="libopenssl10-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911977" comment="libopenssl1_0_0-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911978" comment="libopenssl1_0_0-32bit-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911979" comment="libopenssl1_0_0-hmac-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911980" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911981" comment="libopenssl1_0_0-steam-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911982" comment="libopenssl1_0_0-steam-32bit-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911983" comment="openssl-1_0_0-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911984" comment="openssl-1_0_0-cavs-1.0.2u-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911985" comment="openssl-1_0_0-doc-1.0.2u-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249448" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1l-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0735">CVE-2018-0735 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1543">CVE-2019-1543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1549">CVE-2019-1549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">CVE-2021-3450 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911986" comment="libopenssl-1_1-devel-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911987" comment="libopenssl-1_1-devel-32bit-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911988" comment="libopenssl1_1-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911989" comment="libopenssl1_1-32bit-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911990" comment="libopenssl1_1-hmac-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911991" comment="openssl-1_1-1.1.1l-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911992" comment="openssl-1_1-doc-1.1.1l-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249449" version="1" class="patch">
	<metadata>
		<title>openvpn-2.5.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3393" ref_url="https://www.suse.com/security/cve/CVE-2005-3393/" source="CVE"/>
		<reference ref_id="CVE-2005-3409" ref_url="https://www.suse.com/security/cve/CVE-2005-3409/" source="CVE"/>
		<reference ref_id="CVE-2006-1629" ref_url="https://www.suse.com/security/cve/CVE-2006-1629/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="CVE-2017-7522" ref_url="https://www.suse.com/security/cve/CVE-2017-7522/" source="CVE"/>
		<reference ref_id="CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336/" source="CVE"/>
		<reference ref_id="CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.5.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3393/">CVE-2005-3393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3393">CVE-2005-3393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3409/">CVE-2005-3409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3409">CVE-2005-3409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1629/">CVE-2006-1629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1629">CVE-2006-1629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7522/">CVE-2017-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7522">CVE-2017-7522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9336">CVE-2018-9336 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11810">CVE-2020-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911993" comment="openvpn-2.5.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911994" comment="openvpn-auth-pam-plugin-2.5.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911995" comment="openvpn-devel-2.5.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911996" comment="openvpn-down-root-plugin-2.5.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249450" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-2_14-0-2.14.2-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-2_14-0-2.14.2-11.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009911997" comment="libopenvswitch-2_14-0-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911998" comment="libovn-20_06-0-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009911999" comment="openvswitch-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912000" comment="openvswitch-devel-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912001" comment="openvswitch-doc-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912002" comment="openvswitch-ipsec-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912003" comment="openvswitch-pki-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912004" comment="openvswitch-test-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912005" comment="openvswitch-vtep-2.14.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912006" comment="ovn-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912007" comment="ovn-central-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912008" comment="ovn-devel-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912009" comment="ovn-doc-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912010" comment="ovn-docker-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912011" comment="ovn-host-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912012" comment="ovn-vtep-20.06.2-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912013" comment="python3-ovs-2.14.2-11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249451" version="1" class="patch">
	<metadata>
		<title>libwsman-devel-2.7.0-2.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<description>
These are all security issues fixed in the libwsman-devel-2.7.0-2.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912014" comment="libwsman-devel-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912015" comment="libwsman3-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912016" comment="libwsman_client5-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912017" comment="libwsman_clientpp-devel-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912018" comment="libwsman_clientpp1-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912019" comment="openwsman-java-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912020" comment="openwsman-perl-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912021" comment="openwsman-ruby-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912022" comment="openwsman-ruby-docs-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912023" comment="openwsman-server-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912024" comment="openwsman-server-plugin-ruby-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912025" comment="python3-openwsman-2.7.0-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912026" comment="winrs-2.7.0-2.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249452" version="1" class="patch">
	<metadata>
		<title>optipng-0.7.7-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5101" ref_url="https://www.suse.com/security/cve/CVE-2008-5101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000229" ref_url="https://www.suse.com/security/cve/CVE-2017-1000229/" source="CVE"/>
		<reference ref_id="CVE-2017-16938" ref_url="https://www.suse.com/security/cve/CVE-2017-16938/" source="CVE"/>
		<description>
These are all security issues fixed in the optipng-0.7.7-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5101/">CVE-2008-5101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5101">CVE-2008-5101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000229/">CVE-2017-1000229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000229">CVE-2017-1000229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16938/">CVE-2017-16938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16938">CVE-2017-16938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912027" comment="optipng-0.7.7-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249453" version="1" class="patch">
	<metadata>
		<title>libopus-devel-1.3.1-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus-devel-1.3.1-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0381">CVE-2017-0381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912028" comment="libopus-devel-1.3.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912029" comment="libopus0-1.3.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912030" comment="libopus0-32bit-1.3.1-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249454" version="1" class="patch">
	<metadata>
		<title>osc-0.174.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3681" ref_url="https://www.suse.com/security/cve/CVE-2019-3681/" source="CVE"/>
		<reference ref_id="CVE-2019-3685" ref_url="https://www.suse.com/security/cve/CVE-2019-3685/" source="CVE"/>
		<description>
These are all security issues fixed in the osc-0.174.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3681/">CVE-2019-3681 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3681">CVE-2019-3681 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3685/">CVE-2019-3685 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3685">CVE-2019-3685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912031" comment="osc-0.174.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249455" version="1" class="patch">
	<metadata>
		<title>ovmf-202105-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14558" ref_url="https://www.suse.com/security/cve/CVE-2019-14558/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2019-14586" ref_url="https://www.suse.com/security/cve/CVE-2019-14586/" source="CVE"/>
		<reference ref_id="CVE-2019-14587" ref_url="https://www.suse.com/security/cve/CVE-2019-14587/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202105-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12178">CVE-2018-12178 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-3630">CVE-2018-3630 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14553">CVE-2019-14553 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14558/">CVE-2019-14558 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14558">CVE-2019-14558 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14562">CVE-2019-14562 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14563">CVE-2019-14563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14575">CVE-2019-14575 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14586/">CVE-2019-14586 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14586">CVE-2019-14586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14587/">CVE-2019-14587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14587">CVE-2019-14587 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912032" comment="ovmf-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912033" comment="ovmf-tools-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912034" comment="qemu-ovmf-ia32-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912035" comment="qemu-ovmf-x86_64-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912036" comment="qemu-ovmf-x86_64-debug-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912037" comment="qemu-uefi-aarch32-202105-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912038" comment="qemu-uefi-aarch64-202105-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249456" version="1" class="patch">
	<metadata>
		<title>owntone-28.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38383" ref_url="https://www.suse.com/security/cve/CVE-2021-38383/" source="CVE"/>
		<description>
These are all security issues fixed in the owntone-28.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38383/">CVE-2021-38383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-38383">CVE-2021-38383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912039" comment="owntone-28.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249457" version="1" class="patch">
	<metadata>
		<title>libp11-kit0-0.23.22-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<description>
These are all security issues fixed in the libp11-kit0-0.23.22-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912040" comment="libp11-kit0-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912041" comment="libp11-kit0-32bit-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912042" comment="p11-kit-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912043" comment="p11-kit-32bit-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912044" comment="p11-kit-devel-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912045" comment="p11-kit-nss-trust-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912046" comment="p11-kit-nss-trust-32bit-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912047" comment="p11-kit-server-0.23.22-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912048" comment="p11-kit-tools-0.23.22-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249458" version="1" class="patch">
	<metadata>
		<title>p7zip-16.02-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2021-3465" ref_url="https://www.suse.com/security/cve/CVE-2021-3465/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-16.02-11.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17969">CVE-2017-17969 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3465/">CVE-2021-3465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3465">CVE-2021-3465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912049" comment="p7zip-16.02-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912050" comment="p7zip-doc-16.02-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912051" comment="p7zip-full-16.02-11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249459" version="1" class="patch">
	<metadata>
		<title>libpacemaker-devel-2.1.0+20210816.c6a4f6e6c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16877" ref_url="https://www.suse.com/security/cve/CVE-2018-16877/" source="CVE"/>
		<reference ref_id="CVE-2019-3885" ref_url="https://www.suse.com/security/cve/CVE-2019-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654/" source="CVE"/>
		<description>
These are all security issues fixed in the libpacemaker-devel-2.1.0+20210816.c6a4f6e6c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16877/">CVE-2018-16877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16877">CVE-2018-16877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3885/">CVE-2019-3885 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3885">CVE-2019-3885 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25654">CVE-2020-25654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912052" comment="libpacemaker-devel-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912053" comment="libpacemaker3-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912054" comment="pacemaker-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912055" comment="pacemaker-cli-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912056" comment="pacemaker-cts-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912057" comment="pacemaker-remote-2.1.0+20210816.c6a4f6e6c-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249460" version="1" class="patch">
	<metadata>
		<title>pagure-5.13.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-7628" ref_url="https://www.suse.com/security/cve/CVE-2019-7628/" source="CVE"/>
		<description>
These are all security issues fixed in the pagure-5.13.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7628/">CVE-2019-7628 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7628">CVE-2019-7628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912058" comment="pagure-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912059" comment="pagure-ci-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912060" comment="pagure-ev-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912061" comment="pagure-loadjson-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912062" comment="pagure-logcom-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912063" comment="pagure-milters-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912064" comment="pagure-mirror-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912065" comment="pagure-theme-chameleon-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912066" comment="pagure-theme-default-openSUSE-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912067" comment="pagure-theme-default-upstream-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912068" comment="pagure-theme-pagureio-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912069" comment="pagure-theme-srcfpo-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912070" comment="pagure-theme-upstream-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912071" comment="pagure-web-apache-httpd-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912072" comment="pagure-web-nginx-5.13.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912073" comment="pagure-webhook-5.13.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249461" version="1" class="patch">
	<metadata>
		<title>pam-1.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<reference ref_id="CVE-2020-27780" ref_url="https://www.suse.com/security/cve/CVE-2020-27780/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17953">CVE-2018-17953 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27780/">CVE-2020-27780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27780">CVE-2020-27780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912074" comment="pam-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912075" comment="pam-32bit-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912076" comment="pam-devel-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912077" comment="pam-devel-32bit-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912078" comment="pam-doc-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912079" comment="pam-extra-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912080" comment="pam-extra-32bit-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912081" comment="pam_unix-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912082" comment="pam_unix-32bit-1.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249462" version="1" class="patch">
	<metadata>
		<title>pam_kwallet-32bit-5.22.5-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10380" ref_url="https://www.suse.com/security/cve/CVE-2018-10380/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_kwallet-32bit-5.22.5-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10380/">CVE-2018-10380 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10380">CVE-2018-10380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912083" comment="pam_kwallet-5.22.5-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912084" comment="pam_kwallet-32bit-5.22.5-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912085" comment="pam_kwallet-common-5.22.5-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249463" version="1" class="patch">
	<metadata>
		<title>libcryptmount-devel-2.18-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptmount-devel-2.18-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5138">CVE-2008-5138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912086" comment="libcryptmount-devel-2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912087" comment="libcryptmount0-2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912088" comment="libcryptmount0-32bit-2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912089" comment="pam_mount-2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912090" comment="pam_mount-32bit-2.18-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249464" version="1" class="patch">
	<metadata>
		<title>pam_p11-0.3.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16058" ref_url="https://www.suse.com/security/cve/CVE-2019-16058/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_p11-0.3.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16058/">CVE-2019-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16058">CVE-2019-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912091" comment="pam_p11-0.3.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912092" comment="pam_p11-32bit-0.3.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249465" version="1" class="patch">
	<metadata>
		<title>pam_radius-2.0.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_radius-2.0.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912093" comment="pam_radius-2.0.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912094" comment="pam_radius-32bit-2.0.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249466" version="1" class="patch">
	<metadata>
		<title>pam_u2f-1.1.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209/" source="CVE"/>
		<reference ref_id="CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210/" source="CVE"/>
		<reference ref_id="CVE-2021-31924" ref_url="https://www.suse.com/security/cve/CVE-2021-31924/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_u2f-1.1.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12209">CVE-2019-12209 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12210">CVE-2019-12210 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31924/">CVE-2021-31924 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31924">CVE-2021-31924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912095" comment="pam_u2f-1.1.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249467" version="1" class="patch">
	<metadata>
		<title>pam_yubico-2.27-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-9275" ref_url="https://www.suse.com/security/cve/CVE-2018-9275/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_yubico-2.27-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9275/">CVE-2018-9275 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9275">CVE-2018-9275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912096" comment="pam_yubico-2.27-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249468" version="1" class="patch">
	<metadata>
		<title>pan-0.146-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2363" ref_url="https://www.suse.com/security/cve/CVE-2008-2363/" source="CVE"/>
		<description>
These are all security issues fixed in the pan-0.146-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2363/">CVE-2008-2363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2363">CVE-2008-2363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912097" comment="pan-0.146-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912098" comment="pan-lang-0.146-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249469" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.48.10-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.48.10-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912099" comment="libpango-1_0-0-1.48.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912100" comment="libpango-1_0-0-32bit-1.48.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912101" comment="pango-devel-1.48.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912102" comment="pango-devel-32bit-1.48.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912103" comment="pango-tools-1.48.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912104" comment="typelib-1_0-Pango-1_0-1.48.10-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249470" version="1" class="patch">
	<metadata>
		<title>partclone-0.3.17-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6596" ref_url="https://www.suse.com/security/cve/CVE-2017-6596/" source="CVE"/>
		<description>
These are all security issues fixed in the partclone-0.3.17-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6596/">CVE-2017-6596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6596">CVE-2017-6596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912105" comment="partclone-0.3.17-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912106" comment="partclone-lang-0.3.17-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249471" version="1" class="patch">
	<metadata>
		<title>password-store-1.7.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12356" ref_url="https://www.suse.com/security/cve/CVE-2018-12356/" source="CVE"/>
		<description>
These are all security issues fixed in the password-store-1.7.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12356/">CVE-2018-12356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12356">CVE-2018-12356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912107" comment="password-store-1.7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912108" comment="password-store-dmenu-1.7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249472" version="1" class="patch">
	<metadata>
		<title>patch-2.7.6-3.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.6-3.43 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6951">CVE-2018-6951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912109" comment="patch-2.7.6-3.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249473" version="1" class="patch">
	<metadata>
		<title>libpcp-devel-5.2.2-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695/" source="CVE"/>
		<reference ref_id="CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcp-devel-5.2.2-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3695">CVE-2019-3695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3696">CVE-2019-3696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912110" comment="libpcp-devel-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912111" comment="libpcp3-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912112" comment="libpcp_gui2-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912113" comment="libpcp_import1-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912114" comment="libpcp_mmv1-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912115" comment="libpcp_trace2-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912116" comment="libpcp_web1-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912117" comment="pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912118" comment="pcp-conf-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912119" comment="pcp-devel-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912120" comment="pcp-doc-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912121" comment="pcp-export-pcp2elasticsearch-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912122" comment="pcp-export-pcp2graphite-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912123" comment="pcp-export-pcp2influxdb-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912124" comment="pcp-export-pcp2json-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912125" comment="pcp-export-pcp2spark-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912126" comment="pcp-export-pcp2xml-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912127" comment="pcp-export-pcp2zabbix-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912128" comment="pcp-gui-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912129" comment="pcp-import-collectl2pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912130" comment="pcp-import-ganglia2pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912131" comment="pcp-import-iostat2pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912132" comment="pcp-import-mrtg2pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912133" comment="pcp-import-sar2pcp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912134" comment="pcp-pmda-activemq-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912135" comment="pcp-pmda-apache-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912136" comment="pcp-pmda-bash-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912137" comment="pcp-pmda-bind2-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912138" comment="pcp-pmda-bonding-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912139" comment="pcp-pmda-cifs-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912140" comment="pcp-pmda-cisco-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912141" comment="pcp-pmda-dbping-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912142" comment="pcp-pmda-dm-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912143" comment="pcp-pmda-docker-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912144" comment="pcp-pmda-ds389-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912145" comment="pcp-pmda-ds389log-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912146" comment="pcp-pmda-elasticsearch-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912147" comment="pcp-pmda-gfs2-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912148" comment="pcp-pmda-gluster-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912149" comment="pcp-pmda-gpfs-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912150" comment="pcp-pmda-gpsd-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912151" comment="pcp-pmda-haproxy-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912152" comment="pcp-pmda-infiniband-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912153" comment="pcp-pmda-json-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912154" comment="pcp-pmda-lio-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912155" comment="pcp-pmda-lmsensors-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912156" comment="pcp-pmda-logger-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912157" comment="pcp-pmda-lustre-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912158" comment="pcp-pmda-lustrecomm-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912159" comment="pcp-pmda-mailq-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912160" comment="pcp-pmda-memcache-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912161" comment="pcp-pmda-mic-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912162" comment="pcp-pmda-mounts-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912163" comment="pcp-pmda-mssql-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912164" comment="pcp-pmda-mysql-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912165" comment="pcp-pmda-named-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912166" comment="pcp-pmda-netcheck-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912167" comment="pcp-pmda-netfilter-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912168" comment="pcp-pmda-news-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912169" comment="pcp-pmda-nfsclient-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912170" comment="pcp-pmda-nginx-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912171" comment="pcp-pmda-nutcracker-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912172" comment="pcp-pmda-nvidia-gpu-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912173" comment="pcp-pmda-openmetrics-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912174" comment="pcp-pmda-openvswitch-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912175" comment="pcp-pmda-oracle-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912176" comment="pcp-pmda-pdns-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912177" comment="pcp-pmda-perfevent-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912178" comment="pcp-pmda-postfix-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912179" comment="pcp-pmda-rabbitmq-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912180" comment="pcp-pmda-redis-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912181" comment="pcp-pmda-roomtemp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912182" comment="pcp-pmda-rpm-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912183" comment="pcp-pmda-rsyslog-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912184" comment="pcp-pmda-samba-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912185" comment="pcp-pmda-sendmail-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912186" comment="pcp-pmda-shping-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912187" comment="pcp-pmda-slurm-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912188" comment="pcp-pmda-smart-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912189" comment="pcp-pmda-snmp-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912190" comment="pcp-pmda-summary-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912191" comment="pcp-pmda-systemd-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912192" comment="pcp-pmda-trace-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912193" comment="pcp-pmda-unbound-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912194" comment="pcp-pmda-vmware-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912195" comment="pcp-pmda-weblog-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912196" comment="pcp-pmda-zimbra-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912197" comment="pcp-pmda-zswap-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912198" comment="pcp-system-tools-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912199" comment="pcp-testsuite-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912200" comment="pcp-zeroconf-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912201" comment="perl-PCP-LogImport-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912202" comment="perl-PCP-LogSummary-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912203" comment="perl-PCP-MMV-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912204" comment="perl-PCP-PMDA-5.2.2-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912205" comment="python3-pcp-5.2.2-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249474" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.45-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.45-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912206" comment="libpcre1-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912207" comment="libpcre1-32bit-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912208" comment="libpcre16-0-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912209" comment="libpcre16-0-32bit-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912210" comment="libpcrecpp0-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912211" comment="libpcrecpp0-32bit-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912212" comment="libpcreposix0-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912213" comment="libpcreposix0-32bit-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912214" comment="pcre-devel-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912215" comment="pcre-devel-static-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912216" comment="pcre-doc-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912217" comment="pcre-testsuite-8.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912218" comment="pcre-tools-8.45-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249475" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.37-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.37-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8786">CVE-2017-8786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912219" comment="libpcre2-16-0-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912220" comment="libpcre2-16-0-32bit-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912221" comment="libpcre2-32-0-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912222" comment="libpcre2-32-0-32bit-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912223" comment="libpcre2-8-0-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912224" comment="libpcre2-8-0-32bit-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912225" comment="libpcre2-posix3-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912226" comment="libpcre2-posix3-32bit-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912227" comment="pcre2-devel-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912228" comment="pcre2-devel-static-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912229" comment="pcre2-doc-10.37-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912230" comment="pcre2-tools-10.37-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249476" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.9.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.9.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10109">CVE-2016-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912231" comment="libpcsclite1-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912232" comment="libpcsclite1-32bit-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912233" comment="libpcscspy0-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912234" comment="libpcscspy0-32bit-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912235" comment="pcsc-lite-1.9.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912236" comment="pcsc-lite-devel-1.9.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249477" version="1" class="patch">
	<metadata>
		<title>pdns-4.5.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2069" ref_url="https://www.suse.com/security/cve/CVE-2006-2069/" source="CVE"/>
		<reference ref_id="CVE-2008-3337" ref_url="https://www.suse.com/security/cve/CVE-2008-3337/" source="CVE"/>
		<reference ref_id="CVE-2016-2120" ref_url="https://www.suse.com/security/cve/CVE-2016-2120/" source="CVE"/>
		<reference ref_id="CVE-2016-7068" ref_url="https://www.suse.com/security/cve/CVE-2016-7068/" source="CVE"/>
		<reference ref_id="CVE-2016-7072" ref_url="https://www.suse.com/security/cve/CVE-2016-7072/" source="CVE"/>
		<reference ref_id="CVE-2016-7073" ref_url="https://www.suse.com/security/cve/CVE-2016-7073/" source="CVE"/>
		<reference ref_id="CVE-2017-15091" ref_url="https://www.suse.com/security/cve/CVE-2017-15091/" source="CVE"/>
		<reference ref_id="CVE-2018-1046" ref_url="https://www.suse.com/security/cve/CVE-2018-1046/" source="CVE"/>
		<reference ref_id="CVE-2018-10851" ref_url="https://www.suse.com/security/cve/CVE-2018-10851/" source="CVE"/>
		<reference ref_id="CVE-2018-14626" ref_url="https://www.suse.com/security/cve/CVE-2018-14626/" source="CVE"/>
		<reference ref_id="CVE-2019-10162" ref_url="https://www.suse.com/security/cve/CVE-2019-10162/" source="CVE"/>
		<reference ref_id="CVE-2019-10163" ref_url="https://www.suse.com/security/cve/CVE-2019-10163/" source="CVE"/>
		<reference ref_id="CVE-2019-10203" ref_url="https://www.suse.com/security/cve/CVE-2019-10203/" source="CVE"/>
		<reference ref_id="CVE-2019-3871" ref_url="https://www.suse.com/security/cve/CVE-2019-3871/" source="CVE"/>
		<reference ref_id="CVE-2020-17482" ref_url="https://www.suse.com/security/cve/CVE-2020-17482/" source="CVE"/>
		<reference ref_id="CVE-2021-36754" ref_url="https://www.suse.com/security/cve/CVE-2021-36754/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-4.5.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2069/">CVE-2006-2069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2069">CVE-2006-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3337/">CVE-2008-3337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3337">CVE-2008-3337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2120/">CVE-2016-2120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2120">CVE-2016-2120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7068/">CVE-2016-7068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7068">CVE-2016-7068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7072/">CVE-2016-7072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7072">CVE-2016-7072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7073/">CVE-2016-7073 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7073">CVE-2016-7073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15091/">CVE-2017-15091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15091">CVE-2017-15091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1046/">CVE-2018-1046 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1046">CVE-2018-1046 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10851/">CVE-2018-10851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10851">CVE-2018-10851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14626/">CVE-2018-14626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14626">CVE-2018-14626 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10162/">CVE-2019-10162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10162">CVE-2019-10162 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10163/">CVE-2019-10163 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10163">CVE-2019-10163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10203/">CVE-2019-10203 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10203">CVE-2019-10203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3871/">CVE-2019-3871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3871">CVE-2019-3871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17482/">CVE-2020-17482 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17482">CVE-2020-17482 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36754/">CVE-2021-36754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36754">CVE-2021-36754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912237" comment="pdns-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912238" comment="pdns-backend-geoip-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912239" comment="pdns-backend-godbc-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912240" comment="pdns-backend-ldap-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912241" comment="pdns-backend-lmdb-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912242" comment="pdns-backend-lua-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912243" comment="pdns-backend-mysql-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912244" comment="pdns-backend-postgresql-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912245" comment="pdns-backend-remote-4.5.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912246" comment="pdns-backend-sqlite3-4.5.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249478" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.5.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2120" ref_url="https://www.suse.com/security/cve/CVE-2016-2120/" source="CVE"/>
		<reference ref_id="CVE-2016-7068" ref_url="https://www.suse.com/security/cve/CVE-2016-7068/" source="CVE"/>
		<reference ref_id="CVE-2017-15090" ref_url="https://www.suse.com/security/cve/CVE-2017-15090/" source="CVE"/>
		<reference ref_id="CVE-2017-15092" ref_url="https://www.suse.com/security/cve/CVE-2017-15092/" source="CVE"/>
		<reference ref_id="CVE-2017-15093" ref_url="https://www.suse.com/security/cve/CVE-2017-15093/" source="CVE"/>
		<reference ref_id="CVE-2017-15094" ref_url="https://www.suse.com/security/cve/CVE-2017-15094/" source="CVE"/>
		<reference ref_id="CVE-2018-1000003" ref_url="https://www.suse.com/security/cve/CVE-2018-1000003/" source="CVE"/>
		<reference ref_id="CVE-2018-10851" ref_url="https://www.suse.com/security/cve/CVE-2018-10851/" source="CVE"/>
		<reference ref_id="CVE-2018-14626" ref_url="https://www.suse.com/security/cve/CVE-2018-14626/" source="CVE"/>
		<reference ref_id="CVE-2018-14644" ref_url="https://www.suse.com/security/cve/CVE-2018-14644/" source="CVE"/>
		<reference ref_id="CVE-2018-16855" ref_url="https://www.suse.com/security/cve/CVE-2018-16855/" source="CVE"/>
		<reference ref_id="CVE-2019-3806" ref_url="https://www.suse.com/security/cve/CVE-2019-3806/" source="CVE"/>
		<reference ref_id="CVE-2019-3807" ref_url="https://www.suse.com/security/cve/CVE-2019-3807/" source="CVE"/>
		<reference ref_id="CVE-2020-10030" ref_url="https://www.suse.com/security/cve/CVE-2020-10030/" source="CVE"/>
		<reference ref_id="CVE-2020-10995" ref_url="https://www.suse.com/security/cve/CVE-2020-10995/" source="CVE"/>
		<reference ref_id="CVE-2020-12244" ref_url="https://www.suse.com/security/cve/CVE-2020-12244/" source="CVE"/>
		<reference ref_id="CVE-2020-14196" ref_url="https://www.suse.com/security/cve/CVE-2020-14196/" source="CVE"/>
		<reference ref_id="CVE-2020-25829" ref_url="https://www.suse.com/security/cve/CVE-2020-25829/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.5.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2120/">CVE-2016-2120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2120">CVE-2016-2120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7068/">CVE-2016-7068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7068">CVE-2016-7068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15090/">CVE-2017-15090 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15090">CVE-2017-15090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15092/">CVE-2017-15092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15092">CVE-2017-15092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15093/">CVE-2017-15093 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15093">CVE-2017-15093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15094/">CVE-2017-15094 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15094">CVE-2017-15094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000003/">CVE-2018-1000003 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000003">CVE-2018-1000003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10851/">CVE-2018-10851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10851">CVE-2018-10851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14626/">CVE-2018-14626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14626">CVE-2018-14626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14644/">CVE-2018-14644 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14644">CVE-2018-14644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16855/">CVE-2018-16855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16855">CVE-2018-16855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3806/">CVE-2019-3806 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3806">CVE-2019-3806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3807/">CVE-2019-3807 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3807">CVE-2019-3807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10030/">CVE-2020-10030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10030">CVE-2020-10030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10995/">CVE-2020-10995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10995">CVE-2020-10995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12244/">CVE-2020-12244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12244">CVE-2020-12244 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14196/">CVE-2020-14196 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14196">CVE-2020-14196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25829/">CVE-2020-25829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25829">CVE-2020-25829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912247" comment="pdns-recursor-4.5.5-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249479" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.34.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3962" ref_url="https://www.suse.com/security/cve/CVE-2005-3962/" source="CVE"/>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2017-12814" ref_url="https://www.suse.com/security/cve/CVE-2017-12814/" source="CVE"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.34.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3962/">CVE-2005-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3962">CVE-2005-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12814/">CVE-2017-12814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12814">CVE-2017-12814 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12837">CVE-2017-12837 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12883">CVE-2017-12883 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18312">CVE-2018-18312 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912248" comment="perl-5.34.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912249" comment="perl-32bit-5.34.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912250" comment="perl-base-5.34.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912251" comment="perl-base-32bit-5.34.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912252" comment="perl-doc-5.34.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249480" version="1" class="patch">
	<metadata>
		<title>perl-Convert-ASN1-0.31-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Convert-ASN1-0.31-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912253" comment="perl-Convert-ASN1-0.31-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249481" version="1" class="patch">
	<metadata>
		<title>perl-DBD-mysql-4.050-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-mysql-4.050-2.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912254" comment="perl-DBD-mysql-4.050-2.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249482" version="1" class="patch">
	<metadata>
		<title>perl-DBI-1.643-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-10401" ref_url="https://www.suse.com/security/cve/CVE-2014-10401/" source="CVE"/>
		<reference ref_id="CVE-2014-10402" ref_url="https://www.suse.com/security/cve/CVE-2014-10402/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBI-1.643-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10401/">CVE-2014-10401 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10401">CVE-2014-10401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10402/">CVE-2014-10402 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10402">CVE-2014-10402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912255" comment="perl-DBI-1.643-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249483" version="1" class="patch">
	<metadata>
		<title>perl-MIME-Charset-1.012.2-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-MIME-Charset-1.012.2-1.16 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912256" comment="perl-MIME-Charset-1.012.2-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249484" version="1" class="patch">
	<metadata>
		<title>perl-Test-File-1.448-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Test-File-1.448-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912257" comment="perl-Test-File-1.448-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249485" version="1" class="patch">
	<metadata>
		<title>perl-XML-Twig-3.52-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-Twig-3.52-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912258" comment="perl-XML-Twig-3.52-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249486" version="1" class="patch">
	<metadata>
		<title>chkstat-1550_20210901-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
These are all security issues fixed in the chkstat-1550_20210901-29.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3687">CVE-2019-3687 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912259" comment="chkstat-1550_20210901-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912260" comment="permissions-1550_20210901.1550-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912261" comment="permissions-config-1550_20210901-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912262" comment="permissions-zypp-plugin-1550_20210901.1550-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249487" version="1" class="patch">
	<metadata>
		<title>php-composer-1.10.22-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29472" ref_url="https://www.suse.com/security/cve/CVE-2021-29472/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer-1.10.22-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29472/">CVE-2021-29472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29472">CVE-2021-29472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912263" comment="php-composer-1.10.22-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249488" version="1" class="patch">
	<metadata>
		<title>php7-7.4.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3353" ref_url="https://www.suse.com/security/cve/CVE-2005-3353/" source="CVE"/>
		<reference ref_id="CVE-2005-3388" ref_url="https://www.suse.com/security/cve/CVE-2005-3388/" source="CVE"/>
		<reference ref_id="CVE-2005-3389" ref_url="https://www.suse.com/security/cve/CVE-2005-3389/" source="CVE"/>
		<reference ref_id="CVE-2005-3390" ref_url="https://www.suse.com/security/cve/CVE-2005-3390/" source="CVE"/>
		<reference ref_id="CVE-2005-3391" ref_url="https://www.suse.com/security/cve/CVE-2005-3391/" source="CVE"/>
		<reference ref_id="CVE-2005-3392" ref_url="https://www.suse.com/security/cve/CVE-2005-3392/" source="CVE"/>
		<reference ref_id="CVE-2006-0996" ref_url="https://www.suse.com/security/cve/CVE-2006-0996/" source="CVE"/>
		<reference ref_id="CVE-2006-1017" ref_url="https://www.suse.com/security/cve/CVE-2006-1017/" source="CVE"/>
		<reference ref_id="CVE-2006-1490" ref_url="https://www.suse.com/security/cve/CVE-2006-1490/" source="CVE"/>
		<reference ref_id="CVE-2006-1494" ref_url="https://www.suse.com/security/cve/CVE-2006-1494/" source="CVE"/>
		<reference ref_id="CVE-2006-1991" ref_url="https://www.suse.com/security/cve/CVE-2006-1991/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2017-9120" ref_url="https://www.suse.com/security/cve/CVE-2017-9120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-1000888" ref_url="https://www.suse.com/security/cve/CVE-2018-1000888/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935/" source="CVE"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<reference ref_id="CVE-2021-21706" ref_url="https://www.suse.com/security/cve/CVE-2021-21706/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3353/">CVE-2005-3353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3353">CVE-2005-3353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3388/">CVE-2005-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3388">CVE-2005-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3389/">CVE-2005-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3389">CVE-2005-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3390/">CVE-2005-3390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3390">CVE-2005-3390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3391/">CVE-2005-3391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3391">CVE-2005-3391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3392/">CVE-2005-3392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3392">CVE-2005-3392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0996/">CVE-2006-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0996">CVE-2006-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1017/">CVE-2006-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1017">CVE-2006-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1490/">CVE-2006-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1490">CVE-2006-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1494/">CVE-2006-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1494">CVE-2006-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1991/">CVE-2006-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1991">CVE-2006-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9120/">CVE-2017-9120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9120">CVE-2017-9120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000888/">CVE-2018-1000888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000888">CVE-2018-1000888 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19935">CVE-2018-19935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9675">CVE-2019-9675 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7062">CVE-2020-7062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7063">CVE-2020-7063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21706/">CVE-2021-21706 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21706">CVE-2021-21706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912264" comment="php7-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912265" comment="php7-bcmath-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912266" comment="php7-bz2-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912267" comment="php7-calendar-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912268" comment="php7-cli-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912269" comment="php7-ctype-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912270" comment="php7-curl-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912271" comment="php7-dba-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912272" comment="php7-devel-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912273" comment="php7-dom-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912274" comment="php7-enchant-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912275" comment="php7-exif-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912276" comment="php7-fileinfo-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912277" comment="php7-ftp-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912278" comment="php7-gd-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912279" comment="php7-gettext-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912280" comment="php7-gmp-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912281" comment="php7-iconv-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912282" comment="php7-intl-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912283" comment="php7-json-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912284" comment="php7-ldap-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912285" comment="php7-mbstring-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912286" comment="php7-mysql-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912287" comment="php7-odbc-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912288" comment="php7-opcache-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912289" comment="php7-openssl-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912290" comment="php7-pcntl-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912291" comment="php7-pdo-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912292" comment="php7-pgsql-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912293" comment="php7-phar-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912294" comment="php7-posix-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912295" comment="php7-readline-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912296" comment="php7-shmop-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912297" comment="php7-snmp-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912298" comment="php7-soap-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912299" comment="php7-sockets-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912300" comment="php7-sodium-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912301" comment="php7-sqlite-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912302" comment="php7-sysvmsg-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912303" comment="php7-sysvsem-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912304" comment="php7-sysvshm-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912305" comment="php7-tidy-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912306" comment="php7-tokenizer-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912307" comment="php7-xmlreader-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912308" comment="php7-xmlrpc-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912309" comment="php7-xmlwriter-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912310" comment="php7-xsl-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912311" comment="php7-zip-7.4.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912312" comment="php7-zlib-7.4.24-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249489" version="1" class="patch">
	<metadata>
		<title>php7-pear-1.10.21-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32610" ref_url="https://www.suse.com/security/cve/CVE-2021-32610/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-pear-1.10.21-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32610/">CVE-2021-32610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32610">CVE-2021-32610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912313" comment="php7-pear-1.10.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912314" comment="php7-pecl-1.10.21-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249490" version="1" class="patch">
	<metadata>
		<title>php8-8.0.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-3353" ref_url="https://www.suse.com/security/cve/CVE-2005-3353/" source="CVE"/>
		<reference ref_id="CVE-2005-3388" ref_url="https://www.suse.com/security/cve/CVE-2005-3388/" source="CVE"/>
		<reference ref_id="CVE-2005-3389" ref_url="https://www.suse.com/security/cve/CVE-2005-3389/" source="CVE"/>
		<reference ref_id="CVE-2005-3390" ref_url="https://www.suse.com/security/cve/CVE-2005-3390/" source="CVE"/>
		<reference ref_id="CVE-2005-3391" ref_url="https://www.suse.com/security/cve/CVE-2005-3391/" source="CVE"/>
		<reference ref_id="CVE-2005-3392" ref_url="https://www.suse.com/security/cve/CVE-2005-3392/" source="CVE"/>
		<reference ref_id="CVE-2006-0996" ref_url="https://www.suse.com/security/cve/CVE-2006-0996/" source="CVE"/>
		<reference ref_id="CVE-2006-1017" ref_url="https://www.suse.com/security/cve/CVE-2006-1017/" source="CVE"/>
		<reference ref_id="CVE-2006-1490" ref_url="https://www.suse.com/security/cve/CVE-2006-1490/" source="CVE"/>
		<reference ref_id="CVE-2006-1494" ref_url="https://www.suse.com/security/cve/CVE-2006-1494/" source="CVE"/>
		<reference ref_id="CVE-2006-1991" ref_url="https://www.suse.com/security/cve/CVE-2006-1991/" source="CVE"/>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2013-7327" ref_url="https://www.suse.com/security/cve/CVE-2013-7327/" source="CVE"/>
		<reference ref_id="CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345/" source="CVE"/>
		<reference ref_id="CVE-2014-0185" ref_url="https://www.suse.com/security/cve/CVE-2014-0185/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-1943" ref_url="https://www.suse.com/security/cve/CVE-2014-1943/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2017-9120" ref_url="https://www.suse.com/security/cve/CVE-2017-9120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-1000888" ref_url="https://www.suse.com/security/cve/CVE-2018-1000888/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935/" source="CVE"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<reference ref_id="CVE-2021-21706" ref_url="https://www.suse.com/security/cve/CVE-2021-21706/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.0.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3353/">CVE-2005-3353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3353">CVE-2005-3353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3388/">CVE-2005-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3388">CVE-2005-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3389/">CVE-2005-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3389">CVE-2005-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3390/">CVE-2005-3390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3390">CVE-2005-3390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3391/">CVE-2005-3391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3391">CVE-2005-3391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3392/">CVE-2005-3392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3392">CVE-2005-3392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0996/">CVE-2006-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0996">CVE-2006-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1017/">CVE-2006-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1017">CVE-2006-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1490/">CVE-2006-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1490">CVE-2006-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1494/">CVE-2006-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1494">CVE-2006-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1991/">CVE-2006-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1991">CVE-2006-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7327/">CVE-2013-7327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7327">CVE-2013-7327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0185/">CVE-2014-0185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0185">CVE-2014-0185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1943/">CVE-2014-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1943">CVE-2014-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3622">CVE-2014-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9426">CVE-2014-9426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9427">CVE-2014-9427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1351">CVE-2015-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9120/">CVE-2017-9120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9120">CVE-2017-9120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000888/">CVE-2018-1000888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000888">CVE-2018-1000888 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19935">CVE-2018-19935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9675">CVE-2019-9675 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7062">CVE-2020-7062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7063">CVE-2020-7063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21706/">CVE-2021-21706 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21706">CVE-2021-21706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912315" comment="php8-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912316" comment="php8-bcmath-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912317" comment="php8-bz2-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912318" comment="php8-calendar-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912319" comment="php8-cli-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912320" comment="php8-ctype-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912321" comment="php8-curl-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912322" comment="php8-dba-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912323" comment="php8-devel-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912324" comment="php8-dom-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912325" comment="php8-enchant-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912326" comment="php8-exif-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912327" comment="php8-fileinfo-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912328" comment="php8-ftp-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912329" comment="php8-gd-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912330" comment="php8-gettext-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912331" comment="php8-gmp-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912332" comment="php8-iconv-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912333" comment="php8-intl-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912334" comment="php8-ldap-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912335" comment="php8-mbstring-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912336" comment="php8-mysql-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912337" comment="php8-odbc-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912338" comment="php8-opcache-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912339" comment="php8-openssl-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912340" comment="php8-pcntl-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912341" comment="php8-pdo-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912342" comment="php8-pgsql-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912343" comment="php8-phar-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912344" comment="php8-posix-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912345" comment="php8-readline-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912346" comment="php8-shmop-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912347" comment="php8-snmp-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912348" comment="php8-soap-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912349" comment="php8-sockets-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912350" comment="php8-sodium-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912351" comment="php8-sqlite-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912352" comment="php8-sysvmsg-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912353" comment="php8-sysvsem-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912354" comment="php8-sysvshm-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912355" comment="php8-tidy-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912356" comment="php8-tokenizer-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912357" comment="php8-xmlreader-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912358" comment="php8-xmlwriter-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912359" comment="php8-xsl-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912360" comment="php8-zip-8.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912361" comment="php8-zlib-8.0.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249491" version="1" class="patch">
	<metadata>
		<title>php8-pear-1.10.21-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32610" ref_url="https://www.suse.com/security/cve/CVE-2021-32610/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-pear-1.10.21-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32610/">CVE-2021-32610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32610">CVE-2021-32610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912362" comment="php8-pear-1.10.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912363" comment="php8-pecl-1.10.21-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249492" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.1.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-2869" ref_url="https://www.suse.com/security/cve/CVE-2005-2869/" source="CVE"/>
		<reference ref_id="CVE-2006-1804" ref_url="https://www.suse.com/security/cve/CVE-2006-1804/" source="CVE"/>
		<reference ref_id="CVE-2006-2031" ref_url="https://www.suse.com/security/cve/CVE-2006-2031/" source="CVE"/>
		<reference ref_id="CVE-2015-8980" ref_url="https://www.suse.com/security/cve/CVE-2015-8980/" source="CVE"/>
		<reference ref_id="CVE-2017-1000013" ref_url="https://www.suse.com/security/cve/CVE-2017-1000013/" source="CVE"/>
		<reference ref_id="CVE-2017-1000014" ref_url="https://www.suse.com/security/cve/CVE-2017-1000014/" source="CVE"/>
		<reference ref_id="CVE-2017-1000015" ref_url="https://www.suse.com/security/cve/CVE-2017-1000015/" source="CVE"/>
		<reference ref_id="CVE-2017-1000016" ref_url="https://www.suse.com/security/cve/CVE-2017-1000016/" source="CVE"/>
		<reference ref_id="CVE-2017-1000017" ref_url="https://www.suse.com/security/cve/CVE-2017-1000017/" source="CVE"/>
		<reference ref_id="CVE-2017-1000018" ref_url="https://www.suse.com/security/cve/CVE-2017-1000018/" source="CVE"/>
		<reference ref_id="CVE-2017-1000499" ref_url="https://www.suse.com/security/cve/CVE-2017-1000499/" source="CVE"/>
		<reference ref_id="CVE-2018-10188" ref_url="https://www.suse.com/security/cve/CVE-2018-10188/" source="CVE"/>
		<reference ref_id="CVE-2018-12581" ref_url="https://www.suse.com/security/cve/CVE-2018-12581/" source="CVE"/>
		<reference ref_id="CVE-2018-12613" ref_url="https://www.suse.com/security/cve/CVE-2018-12613/" source="CVE"/>
		<reference ref_id="CVE-2018-15605" ref_url="https://www.suse.com/security/cve/CVE-2018-15605/" source="CVE"/>
		<reference ref_id="CVE-2018-19968" ref_url="https://www.suse.com/security/cve/CVE-2018-19968/" source="CVE"/>
		<reference ref_id="CVE-2018-19969" ref_url="https://www.suse.com/security/cve/CVE-2018-19969/" source="CVE"/>
		<reference ref_id="CVE-2018-19970" ref_url="https://www.suse.com/security/cve/CVE-2018-19970/" source="CVE"/>
		<reference ref_id="CVE-2018-7260" ref_url="https://www.suse.com/security/cve/CVE-2018-7260/" source="CVE"/>
		<reference ref_id="CVE-2019-11768" ref_url="https://www.suse.com/security/cve/CVE-2019-11768/" source="CVE"/>
		<reference ref_id="CVE-2019-12616" ref_url="https://www.suse.com/security/cve/CVE-2019-12616/" source="CVE"/>
		<reference ref_id="CVE-2019-12922" ref_url="https://www.suse.com/security/cve/CVE-2019-12922/" source="CVE"/>
		<reference ref_id="CVE-2019-18622" ref_url="https://www.suse.com/security/cve/CVE-2019-18622/" source="CVE"/>
		<reference ref_id="CVE-2019-6798" ref_url="https://www.suse.com/security/cve/CVE-2019-6798/" source="CVE"/>
		<reference ref_id="CVE-2019-6799" ref_url="https://www.suse.com/security/cve/CVE-2019-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-10802" ref_url="https://www.suse.com/security/cve/CVE-2020-10802/" source="CVE"/>
		<reference ref_id="CVE-2020-10803" ref_url="https://www.suse.com/security/cve/CVE-2020-10803/" source="CVE"/>
		<reference ref_id="CVE-2020-10804" ref_url="https://www.suse.com/security/cve/CVE-2020-10804/" source="CVE"/>
		<reference ref_id="CVE-2020-26934" ref_url="https://www.suse.com/security/cve/CVE-2020-26934/" source="CVE"/>
		<reference ref_id="CVE-2020-26935" ref_url="https://www.suse.com/security/cve/CVE-2020-26935/" source="CVE"/>
		<reference ref_id="CVE-2020-5504" ref_url="https://www.suse.com/security/cve/CVE-2020-5504/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.1.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2869/">CVE-2005-2869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2869">CVE-2005-2869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1804/">CVE-2006-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1804">CVE-2006-1804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2031/">CVE-2006-2031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2031">CVE-2006-2031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8980/">CVE-2015-8980 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8980">CVE-2015-8980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000013/">CVE-2017-1000013 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000013">CVE-2017-1000013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000014/">CVE-2017-1000014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000014">CVE-2017-1000014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000015/">CVE-2017-1000015 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000015">CVE-2017-1000015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000016/">CVE-2017-1000016 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000016">CVE-2017-1000016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000017/">CVE-2017-1000017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000017">CVE-2017-1000017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000018/">CVE-2017-1000018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000018">CVE-2017-1000018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000499/">CVE-2017-1000499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000499">CVE-2017-1000499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10188/">CVE-2018-10188 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10188">CVE-2018-10188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12581/">CVE-2018-12581 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12581">CVE-2018-12581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12613/">CVE-2018-12613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12613">CVE-2018-12613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15605/">CVE-2018-15605 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15605">CVE-2018-15605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19968/">CVE-2018-19968 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19968">CVE-2018-19968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19969/">CVE-2018-19969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19969">CVE-2018-19969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19970/">CVE-2018-19970 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19970">CVE-2018-19970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7260/">CVE-2018-7260 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7260">CVE-2018-7260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11768/">CVE-2019-11768 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11768">CVE-2019-11768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12616/">CVE-2019-12616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12616">CVE-2019-12616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12922/">CVE-2019-12922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12922">CVE-2019-12922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18622/">CVE-2019-18622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18622">CVE-2019-18622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6798/">CVE-2019-6798 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6798">CVE-2019-6798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6799/">CVE-2019-6799 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6799">CVE-2019-6799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10802/">CVE-2020-10802 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10802">CVE-2020-10802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10803/">CVE-2020-10803 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10803">CVE-2020-10803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10804/">CVE-2020-10804 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10804">CVE-2020-10804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26934/">CVE-2020-26934 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26934">CVE-2020-26934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26935/">CVE-2020-26935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26935">CVE-2020-26935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-5504/">CVE-2020-5504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5504">CVE-2020-5504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912364" comment="phpMyAdmin-5.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912365" comment="phpMyAdmin-apache-5.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912366" comment="phpMyAdmin-lang-5.1.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249493" version="1" class="patch">
	<metadata>
		<title>finch-2.14.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2927" ref_url="https://www.suse.com/security/cve/CVE-2008-2927/" source="CVE"/>
		<reference ref_id="CVE-2008-2955" ref_url="https://www.suse.com/security/cve/CVE-2008-2955/" source="CVE"/>
		<reference ref_id="CVE-2008-3532" ref_url="https://www.suse.com/security/cve/CVE-2008-3532/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.14.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2927/">CVE-2008-2927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2927">CVE-2008-2927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2955/">CVE-2008-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2955">CVE-2008-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3532/">CVE-2008-3532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3532">CVE-2008-3532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2640">CVE-2017-2640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912367" comment="finch-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912368" comment="finch-devel-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912369" comment="libpurple-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912370" comment="libpurple-branding-upstream-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912371" comment="libpurple-devel-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912372" comment="libpurple-lang-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912373" comment="libpurple-plugin-sametime-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912374" comment="libpurple-tcl-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912375" comment="pidgin-2.14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912376" comment="pidgin-devel-2.14.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249494" version="1" class="patch">
	<metadata>
		<title>pidgin-plugin-otr-4.0.2-3.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-plugin-otr-4.0.2-3.18 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2369">CVE-2012-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8833">CVE-2015-8833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912377" comment="pidgin-plugin-otr-4.0.2-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912378" comment="pidgin-plugin-otr-lang-4.0.2-3.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249495" version="1" class="patch">
	<metadata>
		<title>libpkgconf-devel-1.8.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000221" ref_url="https://www.suse.com/security/cve/CVE-2018-1000221/" source="CVE"/>
		<description>
These are all security issues fixed in the libpkgconf-devel-1.8.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000221/">CVE-2018-1000221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000221">CVE-2018-1000221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912379" comment="libpkgconf-devel-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912380" comment="libpkgconf3-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912381" comment="pkgconf-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912382" comment="pkgconf-m4-1.8.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912383" comment="pkgconf-pkg-config-1.8.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249496" version="1" class="patch">
	<metadata>
		<title>platformsh-cli-3.67.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5385" ref_url="https://www.suse.com/security/cve/CVE-2016-5385/" source="CVE"/>
		<description>
These are all security issues fixed in the platformsh-cli-3.67.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5385/">CVE-2016-5385 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5385">CVE-2016-5385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912384" comment="platformsh-cli-3.67.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249497" version="1" class="patch">
	<metadata>
		<title>pngcheck-3.0.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27818" ref_url="https://www.suse.com/security/cve/CVE-2020-27818/" source="CVE"/>
		<description>
These are all security issues fixed in the pngcheck-3.0.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27818/">CVE-2020-27818 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27818">CVE-2020-27818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912385" comment="pngcheck-3.0.0-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249498" version="1" class="patch">
	<metadata>
		<title>podman-3.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10856" ref_url="https://www.suse.com/security/cve/CVE-2018-10856/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10856/">CVE-2018-10856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10856">CVE-2018-10856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1726">CVE-2020-1726 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912386" comment="podman-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912387" comment="podman-cni-config-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912388" comment="podman-docker-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912389" comment="podman-remote-3.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249499" version="1" class="patch">
	<metadata>
		<title>libpodofo-devel-0.9.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5852" ref_url="https://www.suse.com/security/cve/CVE-2017-5852/" source="CVE"/>
		<reference ref_id="CVE-2017-5853" ref_url="https://www.suse.com/security/cve/CVE-2017-5853/" source="CVE"/>
		<reference ref_id="CVE-2017-5854" ref_url="https://www.suse.com/security/cve/CVE-2017-5854/" source="CVE"/>
		<reference ref_id="CVE-2017-5855" ref_url="https://www.suse.com/security/cve/CVE-2017-5855/" source="CVE"/>
		<reference ref_id="CVE-2017-5886" ref_url="https://www.suse.com/security/cve/CVE-2017-5886/" source="CVE"/>
		<reference ref_id="CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840/" source="CVE"/>
		<reference ref_id="CVE-2017-6844" ref_url="https://www.suse.com/security/cve/CVE-2017-6844/" source="CVE"/>
		<reference ref_id="CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845/" source="CVE"/>
		<reference ref_id="CVE-2017-6847" ref_url="https://www.suse.com/security/cve/CVE-2017-6847/" source="CVE"/>
		<reference ref_id="CVE-2017-7378" ref_url="https://www.suse.com/security/cve/CVE-2017-7378/" source="CVE"/>
		<reference ref_id="CVE-2017-7379" ref_url="https://www.suse.com/security/cve/CVE-2017-7379/" source="CVE"/>
		<reference ref_id="CVE-2017-7380" ref_url="https://www.suse.com/security/cve/CVE-2017-7380/" source="CVE"/>
		<reference ref_id="CVE-2017-7381" ref_url="https://www.suse.com/security/cve/CVE-2017-7381/" source="CVE"/>
		<reference ref_id="CVE-2017-7382" ref_url="https://www.suse.com/security/cve/CVE-2017-7382/" source="CVE"/>
		<reference ref_id="CVE-2017-7383" ref_url="https://www.suse.com/security/cve/CVE-2017-7383/" source="CVE"/>
		<reference ref_id="CVE-2017-7994" ref_url="https://www.suse.com/security/cve/CVE-2017-7994/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2017-8787" ref_url="https://www.suse.com/security/cve/CVE-2017-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-11255" ref_url="https://www.suse.com/security/cve/CVE-2018-11255/" source="CVE"/>
		<reference ref_id="CVE-2018-11256" ref_url="https://www.suse.com/security/cve/CVE-2018-11256/" source="CVE"/>
		<reference ref_id="CVE-2018-12982" ref_url="https://www.suse.com/security/cve/CVE-2018-12982/" source="CVE"/>
		<reference ref_id="CVE-2018-14320" ref_url="https://www.suse.com/security/cve/CVE-2018-14320/" source="CVE"/>
		<reference ref_id="CVE-2018-20751" ref_url="https://www.suse.com/security/cve/CVE-2018-20751/" source="CVE"/>
		<reference ref_id="CVE-2018-5295" ref_url="https://www.suse.com/security/cve/CVE-2018-5295/" source="CVE"/>
		<reference ref_id="CVE-2018-5296" ref_url="https://www.suse.com/security/cve/CVE-2018-5296/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309/" source="CVE"/>
		<reference ref_id="CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783/" source="CVE"/>
		<reference ref_id="CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001/" source="CVE"/>
		<reference ref_id="CVE-2019-9687" ref_url="https://www.suse.com/security/cve/CVE-2019-9687/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo-devel-0.9.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5852/">CVE-2017-5852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5852">CVE-2017-5852 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5853/">CVE-2017-5853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5853">CVE-2017-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5854/">CVE-2017-5854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5854">CVE-2017-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5855/">CVE-2017-5855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5855">CVE-2017-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5886/">CVE-2017-5886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5886">CVE-2017-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6840">CVE-2017-6840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6844/">CVE-2017-6844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6844">CVE-2017-6844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6845">CVE-2017-6845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6847/">CVE-2017-6847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6847">CVE-2017-6847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7378/">CVE-2017-7378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7378">CVE-2017-7378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7379/">CVE-2017-7379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7379">CVE-2017-7379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7380/">CVE-2017-7380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7380">CVE-2017-7380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7381/">CVE-2017-7381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7381">CVE-2017-7381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7382/">CVE-2017-7382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7382">CVE-2017-7382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7383/">CVE-2017-7383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7383">CVE-2017-7383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7994/">CVE-2017-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7994">CVE-2017-7994 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8054">CVE-2017-8054 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8787/">CVE-2017-8787 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8787">CVE-2017-8787 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11255/">CVE-2018-11255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11255">CVE-2018-11255 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11256/">CVE-2018-11256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11256">CVE-2018-11256 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12982/">CVE-2018-12982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12982">CVE-2018-12982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14320/">CVE-2018-14320 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14320">CVE-2018-14320 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20751/">CVE-2018-20751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20751">CVE-2018-20751 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5295/">CVE-2018-5295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5295">CVE-2018-5295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5296/">CVE-2018-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5296">CVE-2018-5296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5308">CVE-2018-5308 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5309">CVE-2018-5309 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5783">CVE-2018-5783 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8001">CVE-2018-8001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9687/">CVE-2019-9687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9687">CVE-2019-9687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912390" comment="libpodofo-devel-0.9.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912391" comment="libpodofo0_9_7-0.9.7-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912392" comment="podofo-0.9.7-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249500" version="1" class="patch">
	<metadata>
		<title>policycoreutils-3.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-3.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912393" comment="policycoreutils-3.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912394" comment="policycoreutils-devel-3.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912395" comment="policycoreutils-lang-3.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912396" comment="policycoreutils-newrole-3.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912397" comment="policycoreutils-python-utils-3.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912398" comment="python3-policycoreutils-3.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249501" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.118-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.118-7.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912399" comment="libpolkit0-0.118-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912400" comment="libpolkit0-32bit-0.118-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912401" comment="polkit-0.118-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912402" comment="polkit-devel-0.118-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912403" comment="polkit-doc-0.118-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912404" comment="typelib-1_0-Polkit-1_0-0.118-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249502" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp0-21.08.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0301" ref_url="https://www.suse.com/security/cve/CVE-2006-0301/" source="CVE"/>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp0-21.08.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0301/">CVE-2006-0301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0301">CVE-2006-0301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14517">CVE-2017-14517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14518">CVE-2017-14518 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7515">CVE-2017-7515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912405" comment="libpoppler-cpp0-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912406" comment="libpoppler-cpp0-32bit-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912407" comment="libpoppler-devel-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912408" comment="libpoppler-glib-devel-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912409" comment="libpoppler-glib8-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912410" comment="libpoppler-glib8-32bit-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912411" comment="libpoppler112-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912412" comment="libpoppler112-32bit-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912413" comment="poppler-tools-21.08.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912414" comment="typelib-1_0-Poppler-0_18-21.08.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249503" version="1" class="patch">
	<metadata>
		<title>postfixadmin-3.3.10-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5930" ref_url="https://www.suse.com/security/cve/CVE-2017-5930/" source="CVE"/>
		<description>
These are all security issues fixed in the postfixadmin-3.3.10-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5930/">CVE-2017-5930 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5930">CVE-2017-5930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912415" comment="postfixadmin-3.3.10-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912416" comment="postfixadmin-apache-3.3.10-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249504" version="1" class="patch">
	<metadata>
		<title>postgresql-13-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-13-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912417" comment="postgresql-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912418" comment="postgresql-contrib-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912419" comment="postgresql-devel-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912420" comment="postgresql-docs-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912421" comment="postgresql-llvmjit-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912422" comment="postgresql-plperl-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912423" comment="postgresql-plpython-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912424" comment="postgresql-pltcl-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912425" comment="postgresql-server-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912426" comment="postgresql-server-devel-13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912427" comment="postgresql-test-13-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249505" version="1" class="patch">
	<metadata>
		<title>postgresql10-10.18-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="CVE-2018-1052" ref_url="https://www.suse.com/security/cve/CVE-2018-1052/" source="CVE"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-10.18-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15099">CVE-2017-15099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1052/">CVE-2018-1052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1052">CVE-2018-1052 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10925">CVE-2018-10925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1115">CVE-2018-1115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16850">CVE-2018-16850 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912428" comment="postgresql10-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912429" comment="postgresql10-contrib-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912430" comment="postgresql10-devel-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912431" comment="postgresql10-docs-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912432" comment="postgresql10-plperl-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912433" comment="postgresql10-plpython-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912434" comment="postgresql10-pltcl-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912435" comment="postgresql10-server-10.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912436" comment="postgresql10-test-10.18-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249506" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.13-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="CVE-2019-10129" ref_url="https://www.suse.com/security/cve/CVE-2019-10129/" source="CVE"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2019-10209" ref_url="https://www.suse.com/security/cve/CVE-2019-10209/" source="CVE"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.13-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10925">CVE-2018-10925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16850">CVE-2018-16850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10129/">CVE-2019-10129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10129">CVE-2019-10129 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10209/">CVE-2019-10209 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10209">CVE-2019-10209 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912437" comment="postgresql11-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912438" comment="postgresql11-contrib-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912439" comment="postgresql11-devel-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912440" comment="postgresql11-docs-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912441" comment="postgresql11-llvmjit-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912442" comment="postgresql11-plperl-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912443" comment="postgresql11-plpython-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912444" comment="postgresql11-pltcl-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912445" comment="postgresql11-server-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912446" comment="postgresql11-server-devel-11.13-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912447" comment="postgresql11-test-11.13-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249507" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.8-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.8-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912448" comment="postgresql12-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912449" comment="postgresql12-contrib-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912450" comment="postgresql12-devel-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912451" comment="postgresql12-docs-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912452" comment="postgresql12-llvmjit-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912453" comment="postgresql12-plperl-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912454" comment="postgresql12-plpython-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912455" comment="postgresql12-pltcl-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912456" comment="postgresql12-server-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912457" comment="postgresql12-server-devel-12.8-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912458" comment="postgresql12-test-12.8-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249508" version="1" class="patch">
	<metadata>
		<title>libecpg6-13.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-13.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912459" comment="libecpg6-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912460" comment="libecpg6-32bit-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912461" comment="libpq5-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912462" comment="libpq5-32bit-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912463" comment="postgresql13-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912464" comment="postgresql13-contrib-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912465" comment="postgresql13-devel-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912466" comment="postgresql13-docs-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912467" comment="postgresql13-llvmjit-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912468" comment="postgresql13-plperl-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912469" comment="postgresql13-plpython-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912470" comment="postgresql13-pltcl-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912471" comment="postgresql13-server-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912472" comment="postgresql13-server-devel-13.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912473" comment="postgresql13-test-13.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249509" version="1" class="patch">
	<metadata>
		<title>postsrsd-1.11-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35573" ref_url="https://www.suse.com/security/cve/CVE-2020-35573/" source="CVE"/>
		<description>
These are all security issues fixed in the postsrsd-1.11-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35573/">CVE-2020-35573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35573">CVE-2020-35573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912474" comment="postsrsd-1.11-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249510" version="1" class="patch">
	<metadata>
		<title>libpotrace0-1.16-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8685" ref_url="https://www.suse.com/security/cve/CVE-2016-8685/" source="CVE"/>
		<reference ref_id="CVE-2017-12067" ref_url="https://www.suse.com/security/cve/CVE-2017-12067/" source="CVE"/>
		<description>
These are all security issues fixed in the libpotrace0-1.16-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8685/">CVE-2016-8685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8685">CVE-2016-8685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12067/">CVE-2017-12067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12067">CVE-2017-12067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912475" comment="libpotrace0-1.16-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912476" comment="potrace-1.16-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912477" comment="potrace-devel-1.16-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249511" version="1" class="patch">
	<metadata>
		<title>pound-2.8-3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10711" ref_url="https://www.suse.com/security/cve/CVE-2016-10711/" source="CVE"/>
		<reference ref_id="CVE-2018-21245" ref_url="https://www.suse.com/security/cve/CVE-2018-21245/" source="CVE"/>
		<description>
These are all security issues fixed in the pound-2.8-3.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10711/">CVE-2016-10711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10711">CVE-2016-10711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21245/">CVE-2018-21245 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21245">CVE-2018-21245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912478" comment="pound-2.8-3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912479" comment="pound-doc-2.8-3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249512" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.8-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.8-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912480" comment="ppp-2.4.8-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912481" comment="ppp-devel-2.4.8-3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912482" comment="ppp-modem-2.4.8-3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249513" version="1" class="patch">
	<metadata>
		<title>prboom-plus-2.6.1um-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20797" ref_url="https://www.suse.com/security/cve/CVE-2019-20797/" source="CVE"/>
		<description>
These are all security issues fixed in the prboom-plus-2.6.1um-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20797/">CVE-2019-20797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20797">CVE-2019-20797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912483" comment="prboom-plus-2.6.1um-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249514" version="1" class="patch">
	<metadata>
		<title>privoxy-3.0.32-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20216" ref_url="https://www.suse.com/security/cve/CVE-2021-20216/" source="CVE"/>
		<reference ref_id="CVE-2021-20217" ref_url="https://www.suse.com/security/cve/CVE-2021-20217/" source="CVE"/>
		<reference ref_id="CVE-2021-20272" ref_url="https://www.suse.com/security/cve/CVE-2021-20272/" source="CVE"/>
		<reference ref_id="CVE-2021-20273" ref_url="https://www.suse.com/security/cve/CVE-2021-20273/" source="CVE"/>
		<reference ref_id="CVE-2021-20274" ref_url="https://www.suse.com/security/cve/CVE-2021-20274/" source="CVE"/>
		<reference ref_id="CVE-2021-20275" ref_url="https://www.suse.com/security/cve/CVE-2021-20275/" source="CVE"/>
		<reference ref_id="CVE-2021-20276" ref_url="https://www.suse.com/security/cve/CVE-2021-20276/" source="CVE"/>
		<description>
These are all security issues fixed in the privoxy-3.0.32-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20216/">CVE-2021-20216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20216">CVE-2021-20216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20217/">CVE-2021-20217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20217">CVE-2021-20217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20272/">CVE-2021-20272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20272">CVE-2021-20272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20273/">CVE-2021-20273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20273">CVE-2021-20273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20274/">CVE-2021-20274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20274">CVE-2021-20274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20275/">CVE-2021-20275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20275">CVE-2021-20275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20276/">CVE-2021-20276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20276">CVE-2021-20276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912484" comment="privoxy-3.0.32-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912485" comment="privoxy-doc-3.0.32-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249515" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-277.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-277.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912486" comment="procmail-3.22-277.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249516" version="1" class="patch">
	<metadata>
		<title>libprocps8-3.3.17-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps8-3.3.17-5.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912487" comment="libprocps8-3.3.17-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912488" comment="procps-3.3.17-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912489" comment="procps-devel-3.3.17-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912490" comment="procps-lang-3.3.17-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249517" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.6e-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-5815" ref_url="https://www.suse.com/security/cve/CVE-2006-5815/" source="CVE"/>
		<reference ref_id="CVE-2017-7418" ref_url="https://www.suse.com/security/cve/CVE-2017-7418/" source="CVE"/>
		<reference ref_id="CVE-2019-12815" ref_url="https://www.suse.com/security/cve/CVE-2019-12815/" source="CVE"/>
		<reference ref_id="CVE-2019-18217" ref_url="https://www.suse.com/security/cve/CVE-2019-18217/" source="CVE"/>
		<reference ref_id="CVE-2019-19269" ref_url="https://www.suse.com/security/cve/CVE-2019-19269/" source="CVE"/>
		<reference ref_id="CVE-2020-9272" ref_url="https://www.suse.com/security/cve/CVE-2020-9272/" source="CVE"/>
		<reference ref_id="CVE-2020-9273" ref_url="https://www.suse.com/security/cve/CVE-2020-9273/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.6e-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5815/">CVE-2006-5815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5815">CVE-2006-5815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7418/">CVE-2017-7418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7418">CVE-2017-7418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12815/">CVE-2019-12815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12815">CVE-2019-12815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18217/">CVE-2019-18217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18217">CVE-2019-18217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19269/">CVE-2019-19269 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19269">CVE-2019-19269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9272/">CVE-2020-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9272">CVE-2020-9272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9273/">CVE-2020-9273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9273">CVE-2020-9273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912491" comment="proftpd-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912492" comment="proftpd-devel-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912493" comment="proftpd-doc-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912494" comment="proftpd-lang-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912495" comment="proftpd-ldap-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912496" comment="proftpd-mysql-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912497" comment="proftpd-pgsql-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912498" comment="proftpd-radius-1.3.6e-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912499" comment="proftpd-sqlite-1.3.6e-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249518" version="1" class="patch">
	<metadata>
		<title>prosody-0.11.10-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32917" ref_url="https://www.suse.com/security/cve/CVE-2021-32917/" source="CVE"/>
		<reference ref_id="CVE-2021-32918" ref_url="https://www.suse.com/security/cve/CVE-2021-32918/" source="CVE"/>
		<reference ref_id="CVE-2021-32919" ref_url="https://www.suse.com/security/cve/CVE-2021-32919/" source="CVE"/>
		<reference ref_id="CVE-2021-32920" ref_url="https://www.suse.com/security/cve/CVE-2021-32920/" source="CVE"/>
		<reference ref_id="CVE-2021-37601" ref_url="https://www.suse.com/security/cve/CVE-2021-37601/" source="CVE"/>
		<description>
These are all security issues fixed in the prosody-0.11.10-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32917/">CVE-2021-32917 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32917">CVE-2021-32917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32918/">CVE-2021-32918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32918">CVE-2021-32918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32919/">CVE-2021-32919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32919">CVE-2021-32919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32920/">CVE-2021-32920 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32920">CVE-2021-32920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37601/">CVE-2021-37601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37601">CVE-2021-37601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912500" comment="prosody-0.11.10-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249519" version="1" class="patch">
	<metadata>
		<title>psi+-1.5.1548+0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5593" ref_url="https://www.suse.com/security/cve/CVE-2017-5593/" source="CVE"/>
		<description>
These are all security issues fixed in the psi+-1.5.1548+0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5593/">CVE-2017-5593 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5593">CVE-2017-5593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912501" comment="psi+-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912502" comment="psi+-data-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912503" comment="psi+-plugins-attentionplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912504" comment="psi+-plugins-autoreplyplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912505" comment="psi+-plugins-birthdayreminderplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912506" comment="psi+-plugins-chessplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912507" comment="psi+-plugins-cleanerplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912508" comment="psi+-plugins-clientswitcherplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912509" comment="psi+-plugins-conferenceloggerplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912510" comment="psi+-plugins-contentdownloaderplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912511" comment="psi+-plugins-devel-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912512" comment="psi+-plugins-enummessagesplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912513" comment="psi+-plugins-extendedmenuplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912514" comment="psi+-plugins-extendedoptionsplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912515" comment="psi+-plugins-gomokugameplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912516" comment="psi+-plugins-historykeeperplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912517" comment="psi+-plugins-imageplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912518" comment="psi+-plugins-imagepreviewplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912519" comment="psi+-plugins-jabberdiskplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912520" comment="psi+-plugins-juickplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912521" comment="psi+-plugins-messagefilterplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912522" comment="psi+-plugins-omemoplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912523" comment="psi+-plugins-openpgpplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912524" comment="psi+-plugins-otrplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912525" comment="psi+-plugins-pepchangenotifyplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912526" comment="psi+-plugins-qipxstatusesplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912527" comment="psi+-plugins-screenshotplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912528" comment="psi+-plugins-stopspamplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912529" comment="psi+-plugins-storagenotesplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912530" comment="psi+-plugins-translateplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912531" comment="psi+-plugins-videostatusplugin-1.5.1548+0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912532" comment="psi+-plugins-watcherplugin-1.5.1548+0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249520" version="1" class="patch">
	<metadata>
		<title>pspp-1.4.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10791" ref_url="https://www.suse.com/security/cve/CVE-2017-10791/" source="CVE"/>
		<reference ref_id="CVE-2017-10792" ref_url="https://www.suse.com/security/cve/CVE-2017-10792/" source="CVE"/>
		<reference ref_id="CVE-2017-12958" ref_url="https://www.suse.com/security/cve/CVE-2017-12958/" source="CVE"/>
		<reference ref_id="CVE-2017-12959" ref_url="https://www.suse.com/security/cve/CVE-2017-12959/" source="CVE"/>
		<reference ref_id="CVE-2017-12961" ref_url="https://www.suse.com/security/cve/CVE-2017-12961/" source="CVE"/>
		<reference ref_id="CVE-2018-20230" ref_url="https://www.suse.com/security/cve/CVE-2018-20230/" source="CVE"/>
		<reference ref_id="CVE-2019-9211" ref_url="https://www.suse.com/security/cve/CVE-2019-9211/" source="CVE"/>
		<description>
These are all security issues fixed in the pspp-1.4.1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10791/">CVE-2017-10791 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10791">CVE-2017-10791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10792/">CVE-2017-10792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10792">CVE-2017-10792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12958/">CVE-2017-12958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12958">CVE-2017-12958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12959/">CVE-2017-12959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12959">CVE-2017-12959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12961/">CVE-2017-12961 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12961">CVE-2017-12961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20230/">CVE-2018-20230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20230">CVE-2018-20230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9211/">CVE-2019-9211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9211">CVE-2019-9211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912533" comment="pspp-1.4.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912534" comment="pspp-devel-1.4.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912535" comment="pspp-devel-doc-1.4.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912536" comment="pspp-doc-1.4.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912537" comment="pspp-lang-1.4.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249521" version="1" class="patch">
	<metadata>
		<title>libpulse-devel-15.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-devel-15.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912538" comment="libpulse-devel-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912539" comment="libpulse-devel-32bit-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912540" comment="libpulse-mainloop-glib0-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912541" comment="libpulse-mainloop-glib0-32bit-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912542" comment="libpulse0-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912543" comment="libpulse0-32bit-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912544" comment="pulseaudio-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912545" comment="pulseaudio-bash-completion-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912546" comment="pulseaudio-gdm-hooks-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912547" comment="pulseaudio-lang-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912548" comment="pulseaudio-module-bluetooth-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912549" comment="pulseaudio-module-gsettings-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912550" comment="pulseaudio-module-jack-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912551" comment="pulseaudio-module-lirc-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912552" comment="pulseaudio-module-x11-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912553" comment="pulseaudio-module-zeroconf-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912554" comment="pulseaudio-system-wide-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912555" comment="pulseaudio-utils-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912556" comment="pulseaudio-utils-32bit-15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912557" comment="pulseaudio-zsh-completion-15.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249522" version="1" class="patch">
	<metadata>
		<title>putty-0.76-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6542" ref_url="https://www.suse.com/security/cve/CVE-2017-6542/" source="CVE"/>
		<reference ref_id="CVE-2019-17068" ref_url="https://www.suse.com/security/cve/CVE-2019-17068/" source="CVE"/>
		<reference ref_id="CVE-2019-17069" ref_url="https://www.suse.com/security/cve/CVE-2019-17069/" source="CVE"/>
		<description>
These are all security issues fixed in the putty-0.76-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6542/">CVE-2017-6542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6542">CVE-2017-6542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17068/">CVE-2019-17068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17068">CVE-2019-17068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17069/">CVE-2019-17069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17069">CVE-2019-17069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912558" comment="putty-0.76-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249523" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2052">CVE-2007-2052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1721">CVE-2008-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2315">CVE-2008-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2316">CVE-2008-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3142">CVE-2008-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3143">CVE-2008-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3144">CVE-2008-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1753">CVE-2013-1753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000030">CVE-2018-1000030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912559" comment="python-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912560" comment="python-32bit-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912561" comment="python-curses-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912562" comment="python-demo-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912563" comment="python-gdbm-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912564" comment="python-idle-2.7.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912565" comment="python-tk-2.7.18-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249524" version="1" class="patch">
	<metadata>
		<title>python36-Beaker-1.11.0-5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3458" ref_url="https://www.suse.com/security/cve/CVE-2012-3458/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Beaker-1.11.0-5.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3458/">CVE-2012-3458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3458">CVE-2012-3458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912566" comment="python36-Beaker-1.11.0-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912567" comment="python38-Beaker-1.11.0-5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912568" comment="python39-Beaker-1.11.0-5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249525" version="1" class="patch">
	<metadata>
		<title>python36-CherryPy-18.6.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-CherryPy-18.6.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912569" comment="python36-CherryPy-18.6.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912570" comment="python38-CherryPy-18.6.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912571" comment="python39-CherryPy-18.6.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249526" version="1" class="patch">
	<metadata>
		<title>python36-Django-3.2.7-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3982" ref_url="https://www.suse.com/security/cve/CVE-2015-3982/" source="CVE"/>
		<reference ref_id="CVE-2015-5145" ref_url="https://www.suse.com/security/cve/CVE-2015-5145/" source="CVE"/>
		<reference ref_id="CVE-2015-5963" ref_url="https://www.suse.com/security/cve/CVE-2015-5963/" source="CVE"/>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<reference ref_id="CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794/" source="CVE"/>
		<reference ref_id="CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233/" source="CVE"/>
		<reference ref_id="CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234/" source="CVE"/>
		<reference ref_id="CVE-2018-16984" ref_url="https://www.suse.com/security/cve/CVE-2018-16984/" source="CVE"/>
		<reference ref_id="CVE-2018-6188" ref_url="https://www.suse.com/security/cve/CVE-2018-6188/" source="CVE"/>
		<reference ref_id="CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536/" source="CVE"/>
		<reference ref_id="CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-24583" ref_url="https://www.suse.com/security/cve/CVE-2020-24583/" source="CVE"/>
		<reference ref_id="CVE-2020-24584" ref_url="https://www.suse.com/security/cve/CVE-2020-24584/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-32052" ref_url="https://www.suse.com/security/cve/CVE-2021-32052/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="CVE-2021-35042" ref_url="https://www.suse.com/security/cve/CVE-2021-35042/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Django-3.2.7-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3982/">CVE-2015-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3982">CVE-2015-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5145/">CVE-2015-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5145">CVE-2015-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5963/">CVE-2015-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5963">CVE-2015-5963 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12794">CVE-2017-12794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7233">CVE-2017-7233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7234">CVE-2017-7234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16984/">CVE-2018-16984 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16984">CVE-2018-16984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6188/">CVE-2018-6188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6188">CVE-2018-6188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7536">CVE-2018-7536 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7537">CVE-2018-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19118">CVE-2019-19118 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24583/">CVE-2020-24583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24583">CVE-2020-24583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24584/">CVE-2020-24584 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24584">CVE-2020-24584 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32052/">CVE-2021-32052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32052">CVE-2021-32052 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35042/">CVE-2021-35042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35042">CVE-2021-35042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912572" comment="python36-Django-3.2.7-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912573" comment="python38-Django-3.2.7-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912574" comment="python39-Django-3.2.7-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249527" version="1" class="patch">
	<metadata>
		<title>python36-Flask-Cors-3.0.10-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Flask-Cors-3.0.10-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25032">CVE-2020-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912575" comment="python36-Flask-Cors-3.0.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912576" comment="python38-Flask-Cors-3.0.10-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912577" comment="python39-Flask-Cors-3.0.10-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249528" version="1" class="patch">
	<metadata>
		<title>HyperKitty-web-1.3.4-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25322" ref_url="https://www.suse.com/security/cve/CVE-2021-25322/" source="CVE"/>
		<reference ref_id="CVE-2021-33038" ref_url="https://www.suse.com/security/cve/CVE-2021-33038/" source="CVE"/>
		<description>
These are all security issues fixed in the HyperKitty-web-1.3.4-5.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-25322/">CVE-2021-25322 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25322">CVE-2021-25322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33038/">CVE-2021-33038 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33038">CVE-2021-33038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912578" comment="HyperKitty-web-1.3.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912579" comment="HyperKitty-web-uwsgi-1.3.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912580" comment="python3-HyperKitty-1.3.4-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249529" version="1" class="patch">
	<metadata>
		<title>python36-Jinja2-3.0.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012/" source="CVE"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Jinja2-3.0.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0012">CVE-2014-0012 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912581" comment="python36-Jinja2-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912582" comment="python38-Jinja2-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912583" comment="python39-Jinja2-3.0.1-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249530" version="1" class="patch">
	<metadata>
		<title>python36-Pillow-8.3.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3589" ref_url="https://www.suse.com/security/cve/CVE-2014-3589/" source="CVE"/>
		<reference ref_id="CVE-2014-3598" ref_url="https://www.suse.com/security/cve/CVE-2014-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-0740" ref_url="https://www.suse.com/security/cve/CVE-2016-0740/" source="CVE"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<reference ref_id="CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654/" source="CVE"/>
		<reference ref_id="CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655/" source="CVE"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25291" ref_url="https://www.suse.com/security/cve/CVE-2021-25291/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293/" source="CVE"/>
		<reference ref_id="CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921/" source="CVE"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Pillow-8.3.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3589/">CVE-2014-3589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3589">CVE-2014-3589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3598/">CVE-2014-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3598">CVE-2014-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0740/">CVE-2016-0740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0740">CVE-2016-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0775">CVE-2016-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3076">CVE-2016-3076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35654">CVE-2020-35654 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35655">CVE-2020-35655 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25289">CVE-2021-25289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25291/">CVE-2021-25291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25291">CVE-2021-25291 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25293">CVE-2021-25293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27921">CVE-2021-27921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912584" comment="python36-Pillow-8.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912585" comment="python36-Pillow-tk-8.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912586" comment="python38-Pillow-8.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912587" comment="python38-Pillow-tk-8.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912588" comment="python39-Pillow-8.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912589" comment="python39-Pillow-tk-8.3.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249531" version="1" class="patch">
	<metadata>
		<title>python36-PyYAML-5.4.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-PyYAML-5.4.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912590" comment="python36-PyYAML-5.4.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912591" comment="python38-PyYAML-5.4.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912592" comment="python39-PyYAML-5.4.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249532" version="1" class="patch">
	<metadata>
		<title>python-SQLAlchemy-doc-1.4.22-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<description>
These are all security issues fixed in the python-SQLAlchemy-doc-1.4.22-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912593" comment="python-SQLAlchemy-doc-1.4.22-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912594" comment="python36-SQLAlchemy-1.4.22-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912595" comment="python38-SQLAlchemy-1.4.22-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912596" comment="python39-SQLAlchemy-1.4.22-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249533" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-21.7.0-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-21.7.0-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12855">CVE-2019-12855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912597" comment="python-Twisted-doc-21.7.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912598" comment="python36-Twisted-21.7.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912599" comment="python38-Twisted-21.7.0-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912600" comment="python39-Twisted-21.7.0-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249534" version="1" class="patch">
	<metadata>
		<title>python36-Werkzeug-2.0.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Werkzeug-2.0.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14806">CVE-2019-14806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912601" comment="python36-Werkzeug-2.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912602" comment="python38-Werkzeug-2.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912603" comment="python39-Werkzeug-2.0.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249535" version="1" class="patch">
	<metadata>
		<title>python36-XStatic-jquery-ui-1.12.1.1-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7103" ref_url="https://www.suse.com/security/cve/CVE-2016-7103/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-XStatic-jquery-ui-1.12.1.1-2.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7103/">CVE-2016-7103 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7103">CVE-2016-7103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912604" comment="python36-XStatic-jquery-ui-1.12.1.1-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912605" comment="python38-XStatic-jquery-ui-1.12.1.1-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912606" comment="python39-XStatic-jquery-ui-1.12.1.1-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249536" version="1" class="patch">
	<metadata>
		<title>python38-asyncpg-0.22.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-17446" ref_url="https://www.suse.com/security/cve/CVE-2020-17446/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-asyncpg-0.22.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17446/">CVE-2020-17446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17446">CVE-2020-17446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912607" comment="python38-asyncpg-0.22.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912608" comment="python39-asyncpg-0.22.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249537" version="1" class="patch">
	<metadata>
		<title>python38-autobahn-21.3.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35678" ref_url="https://www.suse.com/security/cve/CVE-2020-35678/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-autobahn-21.3.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35678/">CVE-2020-35678 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35678">CVE-2020-35678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912609" comment="python38-autobahn-21.3.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912610" comment="python39-autobahn-21.3.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249538" version="1" class="patch">
	<metadata>
		<title>python-azure-agent-2.2.49.2-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-0804" ref_url="https://www.suse.com/security/cve/CVE-2019-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the python-azure-agent-2.2.49.2-4.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0804/">CVE-2019-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0804">CVE-2019-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912611" comment="python-azure-agent-2.2.49.2-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912612" comment="python-azure-agent-test-2.2.49.2-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249539" version="1" class="patch">
	<metadata>
		<title>python36-bjoern-3.1.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0219" ref_url="https://www.suse.com/security/cve/CVE-2015-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-bjoern-3.1.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0219/">CVE-2015-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0219">CVE-2015-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912613" comment="python36-bjoern-3.1.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912614" comment="python38-bjoern-3.1.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912615" comment="python39-bjoern-3.1.0-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249540" version="1" class="patch">
	<metadata>
		<title>python36-bleach-3.3.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7753" ref_url="https://www.suse.com/security/cve/CVE-2018-7753/" source="CVE"/>
		<reference ref_id="CVE-2020-6802" ref_url="https://www.suse.com/security/cve/CVE-2020-6802/" source="CVE"/>
		<reference ref_id="CVE-2020-6816" ref_url="https://www.suse.com/security/cve/CVE-2020-6816/" source="CVE"/>
		<reference ref_id="CVE-2020-6817" ref_url="https://www.suse.com/security/cve/CVE-2020-6817/" source="CVE"/>
		<reference ref_id="CVE-2021-23980" ref_url="https://www.suse.com/security/cve/CVE-2021-23980/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-bleach-3.3.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7753/">CVE-2018-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7753">CVE-2018-7753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6802/">CVE-2020-6802 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6802">CVE-2020-6802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6816/">CVE-2020-6816 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6816">CVE-2020-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6817/">CVE-2020-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6817">CVE-2020-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23980/">CVE-2021-23980 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23980">CVE-2021-23980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912616" comment="python36-bleach-3.3.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912617" comment="python38-bleach-3.3.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912618" comment="python39-bleach-3.3.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249541" version="1" class="patch">
	<metadata>
		<title>python-bottle-doc-0.12.19-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9964" ref_url="https://www.suse.com/security/cve/CVE-2016-9964/" source="CVE"/>
		<description>
These are all security issues fixed in the python-bottle-doc-0.12.19-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9964/">CVE-2016-9964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9964">CVE-2016-9964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912619" comment="python-bottle-doc-0.12.19-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912620" comment="python36-bottle-0.12.19-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912621" comment="python38-bottle-0.12.19-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912622" comment="python39-bottle-0.12.19-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249542" version="1" class="patch">
	<metadata>
		<title>python36-bugzilla-3.0.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2191" ref_url="https://www.suse.com/security/cve/CVE-2013-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-bugzilla-3.0.2-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2191/">CVE-2013-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2191">CVE-2013-2191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912623" comment="python36-bugzilla-3.0.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912624" comment="python38-bugzilla-3.0.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912625" comment="python39-bugzilla-3.0.2-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249543" version="1" class="patch">
	<metadata>
		<title>python36-colander-1.7.0-5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18361" ref_url="https://www.suse.com/security/cve/CVE-2017-18361/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-colander-1.7.0-5.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18361/">CVE-2017-18361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18361">CVE-2017-18361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912626" comment="python36-colander-1.7.0-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912627" comment="python38-colander-1.7.0-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912628" comment="python39-colander-1.7.0-5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249544" version="1" class="patch">
	<metadata>
		<title>python36-cryptography-3.3.2-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-cryptography-3.3.2-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912629" comment="python36-cryptography-3.3.2-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912630" comment="python38-cryptography-3.3.2-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912631" comment="python39-cryptography-3.3.2-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249545" version="1" class="patch">
	<metadata>
		<title>python36-django-allauth-0.42.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-django-allauth-0.42.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912632" comment="python36-django-allauth-0.42.0-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912633" comment="python38-django-allauth-0.42.0-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912634" comment="python39-django-allauth-0.42.0-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249546" version="1" class="patch">
	<metadata>
		<title>python36-django-debug-toolbar-3.2.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30459" ref_url="https://www.suse.com/security/cve/CVE-2021-30459/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-django-debug-toolbar-3.2.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30459/">CVE-2021-30459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30459">CVE-2021-30459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912635" comment="python36-django-debug-toolbar-3.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912636" comment="python38-django-debug-toolbar-3.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912637" comment="python39-django-debug-toolbar-3.2.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249547" version="1" class="patch">
	<metadata>
		<title>python36-django-registration-3.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21416" ref_url="https://www.suse.com/security/cve/CVE-2021-21416/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-django-registration-3.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21416/">CVE-2021-21416 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21416">CVE-2021-21416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912638" comment="python36-django-registration-3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912639" comment="python38-django-registration-3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912640" comment="python39-django-registration-3.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249548" version="1" class="patch">
	<metadata>
		<title>python36-djangorestframework-3.12.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25626" ref_url="https://www.suse.com/security/cve/CVE-2020-25626/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-djangorestframework-3.12.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-25626/">CVE-2020-25626 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25626">CVE-2020-25626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912641" comment="python36-djangorestframework-3.12.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912642" comment="python38-djangorestframework-3.12.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912643" comment="python39-djangorestframework-3.12.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249549" version="1" class="patch">
	<metadata>
		<title>python36-dulwich-0.20.24-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0838" ref_url="https://www.suse.com/security/cve/CVE-2015-0838/" source="CVE"/>
		<reference ref_id="CVE-2017-16228" ref_url="https://www.suse.com/security/cve/CVE-2017-16228/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-dulwich-0.20.24-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0838/">CVE-2015-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0838">CVE-2015-0838 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16228/">CVE-2017-16228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16228">CVE-2017-16228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912644" comment="python36-dulwich-0.20.24-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912645" comment="python38-dulwich-0.20.24-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912646" comment="python39-dulwich-0.20.24-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249550" version="1" class="patch">
	<metadata>
		<title>python36-ecdsa-0.16.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-ecdsa-0.16.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912647" comment="python36-ecdsa-0.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912648" comment="python38-ecdsa-0.16.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912649" comment="python39-ecdsa-0.16.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249551" version="1" class="patch">
	<metadata>
		<title>python36-hpack-4.0.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6581" ref_url="https://www.suse.com/security/cve/CVE-2016-6581/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-hpack-4.0.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6581/">CVE-2016-6581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6581">CVE-2016-6581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912650" comment="python36-hpack-4.0.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912651" comment="python38-hpack-4.0.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912652" comment="python39-hpack-4.0.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249552" version="1" class="patch">
	<metadata>
		<title>python36-httplib2-0.19.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-httplib2-0.19.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912653" comment="python36-httplib2-0.19.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912654" comment="python38-httplib2-0.19.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912655" comment="python39-httplib2-0.19.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249553" version="1" class="patch">
	<metadata>
		<title>python36-impacket-0.9.23-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31800" ref_url="https://www.suse.com/security/cve/CVE-2021-31800/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-impacket-0.9.23-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31800/">CVE-2021-31800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31800">CVE-2021-31800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912656" comment="python36-impacket-0.9.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912657" comment="python38-impacket-0.9.23-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912658" comment="python39-impacket-0.9.23-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249554" version="1" class="patch">
	<metadata>
		<title>python36-jupyter-server-1.10.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26232" ref_url="https://www.suse.com/security/cve/CVE-2020-26232/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-jupyter-server-1.10.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26232/">CVE-2020-26232 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26232">CVE-2020-26232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912659" comment="python36-jupyter-server-1.10.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912660" comment="python38-jupyter-server-1.10.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912661" comment="python39-jupyter-server-1.10.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249555" version="1" class="patch">
	<metadata>
		<title>python36-kubernetes-12.0.1-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-kubernetes-12.0.1-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912662" comment="python36-kubernetes-12.0.1-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912663" comment="python38-kubernetes-12.0.1-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912664" comment="python39-kubernetes-12.0.1-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249556" version="1" class="patch">
	<metadata>
		<title>python36-logilab-common-1.8.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1838" ref_url="https://www.suse.com/security/cve/CVE-2014-1838/" source="CVE"/>
		<reference ref_id="CVE-2014-1839" ref_url="https://www.suse.com/security/cve/CVE-2014-1839/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-logilab-common-1.8.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1838/">CVE-2014-1838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1838">CVE-2014-1838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1839/">CVE-2014-1839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1839">CVE-2014-1839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912665" comment="python36-logilab-common-1.8.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912666" comment="python38-logilab-common-1.8.1-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912667" comment="python39-logilab-common-1.8.1-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249557" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-4.6.3-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-4.6.3-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912668" comment="python-lxml-doc-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912669" comment="python36-lxml-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912670" comment="python36-lxml-devel-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912671" comment="python38-lxml-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912672" comment="python38-lxml-devel-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912673" comment="python39-lxml-4.6.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912674" comment="python39-lxml-devel-4.6.3-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249558" version="1" class="patch">
	<metadata>
		<title>python36-markdown2-2.4.0-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-5773" ref_url="https://www.suse.com/security/cve/CVE-2018-5773/" source="CVE"/>
		<reference ref_id="CVE-2021-26813" ref_url="https://www.suse.com/security/cve/CVE-2021-26813/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-markdown2-2.4.0-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5773/">CVE-2018-5773 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5773">CVE-2018-5773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26813/">CVE-2021-26813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26813">CVE-2021-26813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912675" comment="python36-markdown2-2.4.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912676" comment="python38-markdown2-2.4.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912677" comment="python39-markdown2-2.4.0-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249559" version="1" class="patch">
	<metadata>
		<title>python-marshmallow-docs-3.11.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17175" ref_url="https://www.suse.com/security/cve/CVE-2018-17175/" source="CVE"/>
		<description>
These are all security issues fixed in the python-marshmallow-docs-3.11.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17175/">CVE-2018-17175 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17175">CVE-2018-17175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912678" comment="python-marshmallow-docs-3.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912679" comment="python36-marshmallow-3.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912680" comment="python38-marshmallow-3.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912681" comment="python39-marshmallow-3.11.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249560" version="1" class="patch">
	<metadata>
		<title>python36-mistune-0.8.4-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15612" ref_url="https://www.suse.com/security/cve/CVE-2017-15612/" source="CVE"/>
		<reference ref_id="CVE-2017-16876" ref_url="https://www.suse.com/security/cve/CVE-2017-16876/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-mistune-0.8.4-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15612/">CVE-2017-15612 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15612">CVE-2017-15612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16876/">CVE-2017-16876 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16876">CVE-2017-16876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912682" comment="python36-mistune-0.8.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912683" comment="python38-mistune-0.8.4-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912684" comment="python39-mistune-0.8.4-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249561" version="1" class="patch">
	<metadata>
		<title>python36-mysql-connector-python-8.0.19-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5598" ref_url="https://www.suse.com/security/cve/CVE-2016-5598/" source="CVE"/>
		<reference ref_id="CVE-2019-2435" ref_url="https://www.suse.com/security/cve/CVE-2019-2435/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-mysql-connector-python-8.0.19-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5598/">CVE-2016-5598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5598">CVE-2016-5598 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2435/">CVE-2019-2435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2435">CVE-2019-2435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912685" comment="python36-mysql-connector-python-8.0.19-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912686" comment="python38-mysql-connector-python-8.0.19-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912687" comment="python39-mysql-connector-python-8.0.19-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249562" version="1" class="patch">
	<metadata>
		<title>python36-nltk-3.5-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14751" ref_url="https://www.suse.com/security/cve/CVE-2019-14751/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-nltk-3.5-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14751/">CVE-2019-14751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14751">CVE-2019-14751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912688" comment="python36-nltk-3.5-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912689" comment="python38-nltk-3.5-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912690" comment="python39-nltk-3.5-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249563" version="1" class="patch">
	<metadata>
		<title>jupyter-notebook-6.2.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6524" ref_url="https://www.suse.com/security/cve/CVE-2016-6524/" source="CVE"/>
		<reference ref_id="CVE-2016-9971" ref_url="https://www.suse.com/security/cve/CVE-2016-9971/" source="CVE"/>
		<reference ref_id="CVE-2018-14041" ref_url="https://www.suse.com/security/cve/CVE-2018-14041/" source="CVE"/>
		<reference ref_id="CVE-2018-8768" ref_url="https://www.suse.com/security/cve/CVE-2018-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-10255" ref_url="https://www.suse.com/security/cve/CVE-2019-10255/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-notebook-6.2.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6524/">CVE-2016-6524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-6524">CVE-2016-6524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9971/">CVE-2016-9971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9971">CVE-2016-9971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14041/">CVE-2018-14041 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14041">CVE-2018-14041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8768/">CVE-2018-8768 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8768">CVE-2018-8768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10255/">CVE-2019-10255 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10255">CVE-2019-10255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912691" comment="jupyter-notebook-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912692" comment="jupyter-notebook-lang-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912693" comment="jupyter-notebook-latex-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912694" comment="python36-notebook-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912695" comment="python36-notebook-lang-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912696" comment="python38-notebook-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912697" comment="python38-notebook-lang-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912698" comment="python39-notebook-6.2.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912699" comment="python39-notebook-lang-6.2.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249564" version="1" class="patch">
	<metadata>
		<title>python38-numpy-1.21.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-numpy-1.21.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12852">CVE-2017-12852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912700" comment="python38-numpy-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912701" comment="python38-numpy-devel-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912702" comment="python39-numpy-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912703" comment="python39-numpy-devel-1.21.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249565" version="1" class="patch">
	<metadata>
		<title>python36-oic-1.2.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26244" ref_url="https://www.suse.com/security/cve/CVE-2020-26244/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-oic-1.2.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26244/">CVE-2020-26244 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26244">CVE-2020-26244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912704" comment="python36-oic-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912705" comment="python38-oic-1.2.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912706" comment="python39-oic-1.2.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249566" version="1" class="patch">
	<metadata>
		<title>python36-oletools-0.60-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-27058" ref_url="https://www.suse.com/security/cve/CVE-2021-27058/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-oletools-0.60-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27058/">CVE-2021-27058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27058">CVE-2021-27058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912707" comment="python36-oletools-0.60-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912708" comment="python38-oletools-0.60-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912709" comment="python39-oletools-0.60-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249567" version="1" class="patch">
	<metadata>
		<title>python-onionshare-2.3.3-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19960" ref_url="https://www.suse.com/security/cve/CVE-2018-19960/" source="CVE"/>
		<description>
These are all security issues fixed in the python-onionshare-2.3.3-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19960/">CVE-2018-19960 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19960">CVE-2018-19960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912710" comment="python-onionshare-2.3.3-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249568" version="1" class="patch">
	<metadata>
		<title>python36-openapi-spec-validator-0.2.9-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-openapi-spec-validator-0.2.9-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912711" comment="python36-openapi-spec-validator-0.2.9-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912712" comment="python38-openapi-spec-validator-0.2.9-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912713" comment="python39-openapi-spec-validator-0.2.9-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249569" version="1" class="patch">
	<metadata>
		<title>python36-openpyxl-3.0.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5992" ref_url="https://www.suse.com/security/cve/CVE-2017-5992/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-openpyxl-3.0.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5992/">CVE-2017-5992 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5992">CVE-2017-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912714" comment="python36-openpyxl-3.0.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912715" comment="python38-openpyxl-3.0.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912716" comment="python39-openpyxl-3.0.7-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249570" version="1" class="patch">
	<metadata>
		<title>python-paramiko-doc-2.7.2-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<description>
These are all security issues fixed in the python-paramiko-doc-2.7.2-3.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7750">CVE-2018-7750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912717" comment="python-paramiko-doc-2.7.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912718" comment="python36-paramiko-2.7.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912719" comment="python38-paramiko-2.7.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912720" comment="python39-paramiko-2.7.2-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249571" version="1" class="patch">
	<metadata>
		<title>python36-pikepdf-2.12.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29421" ref_url="https://www.suse.com/security/cve/CVE-2021-29421/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pikepdf-2.12.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29421/">CVE-2021-29421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29421">CVE-2021-29421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912721" comment="python36-pikepdf-2.12.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912722" comment="python38-pikepdf-2.12.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912723" comment="python39-pikepdf-2.12.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249572" version="1" class="patch">
	<metadata>
		<title>python36-pip-20.2.4-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pip-20.2.4-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912724" comment="python36-pip-20.2.4-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912725" comment="python38-pip-20.2.4-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912726" comment="python39-pip-20.2.4-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249573" version="1" class="patch">
	<metadata>
		<title>python36-py-1.10.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-py-1.10.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912727" comment="python36-py-1.10.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912728" comment="python38-py-1.10.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912729" comment="python39-py-1.10.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249574" version="1" class="patch">
	<metadata>
		<title>python36-pyOpenSSL-20.0.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pyOpenSSL-20.0.1-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912730" comment="python36-pyOpenSSL-20.0.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912731" comment="python38-pyOpenSSL-20.0.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912732" comment="python39-pyOpenSSL-20.0.1-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249575" version="1" class="patch">
	<metadata>
		<title>python36-pydantic-1.8.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29510" ref_url="https://www.suse.com/security/cve/CVE-2021-29510/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pydantic-1.8.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29510/">CVE-2021-29510 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29510">CVE-2021-29510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912733" comment="python36-pydantic-1.8.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912734" comment="python38-pydantic-1.8.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912735" comment="python39-pydantic-1.8.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249576" version="1" class="patch">
	<metadata>
		<title>python-pymisp-doc-2.4.148-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pymisp-doc-2.4.148-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912736" comment="python-pymisp-doc-2.4.148-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912737" comment="python36-pymisp-2.4.148-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912738" comment="python38-pymisp-2.4.148-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912739" comment="python39-pymisp-2.4.148-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249577" version="1" class="patch">
	<metadata>
		<title>python36-pymongo-3.11.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2132" ref_url="https://www.suse.com/security/cve/CVE-2013-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pymongo-3.11.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2132/">CVE-2013-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2132">CVE-2013-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912740" comment="python36-pymongo-3.11.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912741" comment="python38-pymongo-3.11.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912742" comment="python39-pymongo-3.11.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249578" version="1" class="patch">
	<metadata>
		<title>python36-pyramid-2.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pyramid-2.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4671">CVE-2014-4671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912743" comment="python36-pyramid-2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912744" comment="python38-pyramid-2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912745" comment="python39-pyramid-2.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249579" version="1" class="patch">
	<metadata>
		<title>python36-pysaml2-7.0.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-5390" ref_url="https://www.suse.com/security/cve/CVE-2020-5390/" source="CVE"/>
		<reference ref_id="CVE-2021-21238" ref_url="https://www.suse.com/security/cve/CVE-2021-21238/" source="CVE"/>
		<reference ref_id="CVE-2021-21239" ref_url="https://www.suse.com/security/cve/CVE-2021-21239/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pysaml2-7.0.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5390/">CVE-2020-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5390">CVE-2020-5390 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21238/">CVE-2021-21238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21238">CVE-2021-21238 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21239/">CVE-2021-21239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21239">CVE-2021-21239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912746" comment="python36-pysaml2-7.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912747" comment="python38-pysaml2-7.0.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912748" comment="python39-pysaml2-7.0.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249580" version="1" class="patch">
	<metadata>
		<title>python36-python-cjson-1.2.2-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2010-1666" ref_url="https://www.suse.com/security/cve/CVE-2010-1666/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-python-cjson-1.2.2-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1666/">CVE-2010-1666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1666">CVE-2010-1666 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912749" comment="python36-python-cjson-1.2.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912750" comment="python38-python-cjson-1.2.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912751" comment="python39-python-cjson-1.2.2-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249581" version="1" class="patch">
	<metadata>
		<title>python36-python-engineio-4.2.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13611" ref_url="https://www.suse.com/security/cve/CVE-2019-13611/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-python-engineio-4.2.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13611/">CVE-2019-13611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13611">CVE-2019-13611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912752" comment="python36-python-engineio-4.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912753" comment="python38-python-engineio-4.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912754" comment="python39-python-engineio-4.2.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249582" version="1" class="patch">
	<metadata>
		<title>python36-python-gnupg-0.4.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2019-6690" ref_url="https://www.suse.com/security/cve/CVE-2019-6690/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-python-gnupg-0.4.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6690/">CVE-2019-6690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6690">CVE-2019-6690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912755" comment="python36-python-gnupg-0.4.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912756" comment="python38-python-gnupg-0.4.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912757" comment="python39-python-gnupg-0.4.7-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249583" version="1" class="patch">
	<metadata>
		<title>python36-python3-saml-1.11.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11427" ref_url="https://www.suse.com/security/cve/CVE-2017-11427/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-python3-saml-1.11.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11427/">CVE-2017-11427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11427">CVE-2017-11427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912758" comment="python36-python3-saml-1.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912759" comment="python38-python3-saml-1.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912760" comment="python39-python3-saml-1.11.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249584" version="1" class="patch">
	<metadata>
		<title>python36-pywbem-1.1.1-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pywbem-1.1.1-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912761" comment="python36-pywbem-1.1.1-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912762" comment="python38-pywbem-1.1.1-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912763" comment="python39-pywbem-1.1.1-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249585" version="1" class="patch">
	<metadata>
		<title>python36-pyzmq-22.2.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-pyzmq-22.2.1-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912764" comment="python36-pyzmq-22.2.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912765" comment="python36-pyzmq-devel-22.2.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912766" comment="python38-pyzmq-22.2.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912767" comment="python38-pyzmq-devel-22.2.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912768" comment="python39-pyzmq-22.2.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912769" comment="python39-pyzmq-devel-22.2.1-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249586" version="1" class="patch">
	<metadata>
		<title>python36-reportlab-3.5.59-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-reportlab-3.5.59-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17626">CVE-2019-17626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912770" comment="python36-reportlab-3.5.59-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912771" comment="python38-reportlab-3.5.59-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912772" comment="python39-reportlab-3.5.59-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249587" version="1" class="patch">
	<metadata>
		<title>python36-requests-2.25.1-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-requests-2.25.1-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912773" comment="python36-requests-2.25.1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912774" comment="python38-requests-2.25.1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912775" comment="python39-requests-2.25.1-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249588" version="1" class="patch">
	<metadata>
		<title>python36-rope-0.19.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3539" ref_url="https://www.suse.com/security/cve/CVE-2014-3539/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-rope-0.19.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3539/">CVE-2014-3539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3539">CVE-2014-3539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912776" comment="python36-rope-0.19.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912777" comment="python38-rope-0.19.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912778" comment="python39-rope-0.19.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249589" version="1" class="patch">
	<metadata>
		<title>python36-rpyc-4.1.5-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16328" ref_url="https://www.suse.com/security/cve/CVE-2019-16328/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-rpyc-4.1.5-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16328/">CVE-2019-16328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16328">CVE-2019-16328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912779" comment="python36-rpyc-4.1.5-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912780" comment="python38-rpyc-4.1.5-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912781" comment="python39-rpyc-4.1.5-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249590" version="1" class="patch">
	<metadata>
		<title>python36-rsa-4.7.2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-rsa-4.7.2-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25658">CVE-2020-25658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912782" comment="python36-rsa-4.7.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912783" comment="python38-rsa-4.7.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912784" comment="python39-rsa-4.7.2-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249591" version="1" class="patch">
	<metadata>
		<title>python-rtslib-fb-common-2.1.74-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019/" source="CVE"/>
		<description>
These are all security issues fixed in the python-rtslib-fb-common-2.1.74-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14019">CVE-2020-14019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912785" comment="python-rtslib-fb-common-2.1.74-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912786" comment="python36-rtslib-fb-2.1.74-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912787" comment="python38-rtslib-fb-2.1.74-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912788" comment="python39-rtslib-fb-2.1.74-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249592" version="1" class="patch">
	<metadata>
		<title>python36-ruamel.yaml-0.17.10-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20478" ref_url="https://www.suse.com/security/cve/CVE-2019-20478/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-ruamel.yaml-0.17.10-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20478/">CVE-2019-20478 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20478">CVE-2019-20478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912789" comment="python36-ruamel.yaml-0.17.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912790" comment="python38-ruamel.yaml-0.17.10-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912791" comment="python39-ruamel.yaml-0.17.10-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249593" version="1" class="patch">
	<metadata>
		<title>python36-setuptools-57.4.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-setuptools-57.4.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912792" comment="python36-setuptools-57.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912793" comment="python38-setuptools-57.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912794" comment="python39-setuptools-57.4.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249594" version="1" class="patch">
	<metadata>
		<title>python36-sleekxmpp-1.3.3-4.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8688" ref_url="https://www.suse.com/security/cve/CVE-2015-8688/" source="CVE"/>
		<reference ref_id="CVE-2017-5589" ref_url="https://www.suse.com/security/cve/CVE-2017-5589/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-sleekxmpp-1.3.3-4.18 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8688/">CVE-2015-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8688">CVE-2015-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5589/">CVE-2017-5589 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5589">CVE-2017-5589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912795" comment="python36-sleekxmpp-1.3.3-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912796" comment="python38-sleekxmpp-1.3.3-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912797" comment="python39-sleekxmpp-1.3.3-4.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249595" version="1" class="patch">
	<metadata>
		<title>python36-slixmpp-1.5.2-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5589" ref_url="https://www.suse.com/security/cve/CVE-2017-5589/" source="CVE"/>
		<reference ref_id="CVE-2019-1000021" ref_url="https://www.suse.com/security/cve/CVE-2019-1000021/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-slixmpp-1.5.2-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5589/">CVE-2017-5589 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5589">CVE-2017-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1000021/">CVE-2019-1000021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000021">CVE-2019-1000021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912798" comment="python36-slixmpp-1.5.2-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912799" comment="python38-slixmpp-1.5.2-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912800" comment="python39-slixmpp-1.5.2-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249596" version="1" class="patch">
	<metadata>
		<title>python36-suds-jurko-0.6-6.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-suds-jurko-0.6-6.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912801" comment="python36-suds-jurko-0.6-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912802" comment="python38-suds-jurko-0.6-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912803" comment="python39-suds-jurko-0.6-6.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249597" version="1" class="patch">
	<metadata>
		<title>python-tqdm-bash-completion-4.62.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10075" ref_url="https://www.suse.com/security/cve/CVE-2016-10075/" source="CVE"/>
		<description>
These are all security issues fixed in the python-tqdm-bash-completion-4.62.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10075/">CVE-2016-10075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10075">CVE-2016-10075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912804" comment="python-tqdm-bash-completion-4.62.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912805" comment="python36-tqdm-4.62.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912806" comment="python38-tqdm-4.62.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912807" comment="python39-tqdm-4.62.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249598" version="1" class="patch">
	<metadata>
		<title>python36-urllib3-1.26.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-urllib3-1.26.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912808" comment="python36-urllib3-1.26.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912809" comment="python38-urllib3-1.26.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912810" comment="python39-urllib3-1.26.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249599" version="1" class="patch">
	<metadata>
		<title>python36-validators-0.18.1-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19588" ref_url="https://www.suse.com/security/cve/CVE-2019-19588/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-validators-0.18.1-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19588/">CVE-2019-19588 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19588">CVE-2019-19588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912811" comment="python36-validators-0.18.1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912812" comment="python38-validators-0.18.1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912813" comment="python39-validators-0.18.1-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249600" version="1" class="patch">
	<metadata>
		<title>python36-w3lib-1.22.0-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-w3lib-1.22.0-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912814" comment="python36-w3lib-1.22.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912815" comment="python38-w3lib-1.22.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912816" comment="python39-w3lib-1.22.0-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249601" version="1" class="patch">
	<metadata>
		<title>python36-websockets-9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000518" ref_url="https://www.suse.com/security/cve/CVE-2018-1000518/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-websockets-9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000518/">CVE-2018-1000518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000518">CVE-2018-1000518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912817" comment="python36-websockets-9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912818" comment="python38-websockets-9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912819" comment="python39-websockets-9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249602" version="1" class="patch">
	<metadata>
		<title>python2-pip-20.0.2-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python2-pip-20.0.2-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912820" comment="python2-pip-20.0.2-2.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249603" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.36.2-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.36.2-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912821" comment="libblkid-devel-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912822" comment="libblkid-devel-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912823" comment="libblkid-devel-static-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912824" comment="libblkid1-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912825" comment="libblkid1-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912826" comment="libfdisk-devel-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912827" comment="libfdisk-devel-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912828" comment="libfdisk-devel-static-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912829" comment="libfdisk1-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912830" comment="libfdisk1-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912831" comment="libmount-devel-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912832" comment="libmount-devel-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912833" comment="libmount-devel-static-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912834" comment="libmount1-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912835" comment="libmount1-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912836" comment="libsmartcols-devel-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912837" comment="libsmartcols-devel-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912838" comment="libsmartcols-devel-static-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912839" comment="libsmartcols1-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912840" comment="libsmartcols1-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912841" comment="libuuid-devel-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912842" comment="libuuid-devel-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912843" comment="libuuid-devel-static-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912844" comment="libuuid1-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912845" comment="libuuid1-32bit-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912846" comment="util-linux-2.36.2-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912847" comment="util-linux-lang-2.36.2-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249604" version="1" class="patch">
	<metadata>
		<title>python310-3.10.0rc1-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.0rc1-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912848" comment="python310-3.10.0rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912849" comment="python310-32bit-3.10.0rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912850" comment="python310-curses-3.10.0rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912851" comment="python310-dbm-3.10.0rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912852" comment="python310-idle-3.10.0rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912853" comment="python310-tk-3.10.0rc1-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249605" version="1" class="patch">
	<metadata>
		<title>python36-3.6.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-3.6.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912854" comment="python36-3.6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912855" comment="python36-32bit-3.6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912856" comment="python36-curses-3.6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912857" comment="python36-dbm-3.6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912858" comment="python36-idle-3.6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912859" comment="python36-tk-3.6.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249606" version="1" class="patch">
	<metadata>
		<title>python38-3.8.12-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.12-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912860" comment="python38-3.8.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912861" comment="python38-32bit-3.8.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912862" comment="python38-curses-3.8.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912863" comment="python38-dbm-3.8.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912864" comment="python38-idle-3.8.12-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912865" comment="python38-tk-3.8.12-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249607" version="1" class="patch">
	<metadata>
		<title>python39-3.9.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-29921" ref_url="https://www.suse.com/security/cve/CVE-2021-29921/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-29921/">CVE-2021-29921 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29921">CVE-2021-29921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912866" comment="python39-3.9.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912867" comment="python39-32bit-3.9.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912868" comment="python39-curses-3.9.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912869" comment="python39-dbm-3.9.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912870" comment="python39-idle-3.9.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912871" comment="python39-tk-3.9.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249608" version="1" class="patch">
	<metadata>
		<title>qemu-6.1.0-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717/" source="CVE"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-20263" ref_url="https://www.suse.com/security/cve/CVE-2021-20263/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.1.0-32.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10028">CVE-2016-10028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7156">CVE-2016-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7157">CVE-2016-7157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7421">CVE-2016-7421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7422">CVE-2016-7422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7423">CVE-2016-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7466">CVE-2016-7466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7907">CVE-2016-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7994">CVE-2016-7994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7995">CVE-2016-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8668">CVE-2016-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15118">CVE-2017-15118 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2630">CVE-2017-2630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5525">CVE-2017-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5552">CVE-2017-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5578">CVE-2017-5578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5667">CVE-2017-5667 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5857">CVE-2017-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6058">CVE-2017-6058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8379">CVE-2017-8379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8380">CVE-2017-8380 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20123">CVE-2018-20123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20124">CVE-2018-20124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20125">CVE-2018-20125 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20126">CVE-2018-20126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20191">CVE-2018-20191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20216">CVE-2018-20216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10702">CVE-2020-10702 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10717">CVE-2020-10717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10761">CVE-2020-10761 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11102">CVE-2020-11102 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11869">CVE-2020-11869 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13800">CVE-2020-13800 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17380">CVE-2020-17380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25085">CVE-2020-25085 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27821">CVE-2020-27821 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29129">CVE-2020-29129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20263/">CVE-2021-20263 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912872" comment="qemu-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912873" comment="qemu-accel-qtest-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912874" comment="qemu-accel-tcg-x86-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912875" comment="qemu-arm-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912876" comment="qemu-audio-alsa-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912877" comment="qemu-audio-jack-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912878" comment="qemu-audio-pa-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912879" comment="qemu-audio-spice-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912880" comment="qemu-block-curl-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912881" comment="qemu-block-dmg-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912882" comment="qemu-block-gluster-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912883" comment="qemu-block-iscsi-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912884" comment="qemu-block-nfs-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912885" comment="qemu-block-rbd-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912886" comment="qemu-block-ssh-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912887" comment="qemu-chardev-baum-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912888" comment="qemu-chardev-spice-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912889" comment="qemu-extra-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912890" comment="qemu-guest-agent-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912891" comment="qemu-hw-display-qxl-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912892" comment="qemu-hw-display-virtio-gpu-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912893" comment="qemu-hw-display-virtio-gpu-pci-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912894" comment="qemu-hw-display-virtio-vga-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912895" comment="qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912896" comment="qemu-hw-usb-host-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912897" comment="qemu-hw-usb-redirect-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912898" comment="qemu-hw-usb-smartcard-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912899" comment="qemu-ipxe-1.0.0+-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912900" comment="qemu-ivshmem-tools-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912901" comment="qemu-ksm-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912902" comment="qemu-kvm-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912903" comment="qemu-lang-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912904" comment="qemu-microvm-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912905" comment="qemu-ppc-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912906" comment="qemu-s390x-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912907" comment="qemu-seabios-1.14.0_0_g155821a-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912908" comment="qemu-sgabios-8-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912909" comment="qemu-skiboot-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912910" comment="qemu-tools-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912911" comment="qemu-ui-curses-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912912" comment="qemu-ui-gtk-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912913" comment="qemu-ui-opengl-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912914" comment="qemu-ui-spice-app-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912915" comment="qemu-ui-spice-core-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912916" comment="qemu-vgabios-1.14.0_0_g155821a-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912917" comment="qemu-vhost-user-gpu-6.1.0-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912918" comment="qemu-x86-6.1.0-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249609" version="1" class="patch">
	<metadata>
		<title>libqore6-0.9.15-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13615" ref_url="https://www.suse.com/security/cve/CVE-2020-13615/" source="CVE"/>
		<description>
These are all security issues fixed in the libqore6-0.9.15-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13615/">CVE-2020-13615 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13615">CVE-2020-13615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912919" comment="libqore6-0.9.15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912920" comment="qore-0.9.15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912921" comment="qore-devel-0.9.15-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912922" comment="qore-misc-tools-0.9.15-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249610" version="1" class="patch">
	<metadata>
		<title>libqpdf28-10.3.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpdf28-10.3.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11625">CVE-2017-11625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11627">CVE-2017-11627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12595">CVE-2017-12595 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9209">CVE-2017-9209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912923" comment="libqpdf28-10.3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912924" comment="qpdf-10.3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912925" comment="qpdf-devel-10.3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912926" comment="qpdf-htmldoc-10.3.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249611" version="1" class="patch">
	<metadata>
		<title>libfpm_pb0-1.2.4-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5278" ref_url="https://www.suse.com/security/cve/CVE-2018-5278/" source="CVE"/>
		<reference ref_id="CVE-2018-5279" ref_url="https://www.suse.com/security/cve/CVE-2018-5279/" source="CVE"/>
		<reference ref_id="CVE-2018-5280" ref_url="https://www.suse.com/security/cve/CVE-2018-5280/" source="CVE"/>
		<reference ref_id="CVE-2018-5281" ref_url="https://www.suse.com/security/cve/CVE-2018-5281/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<description>
These are all security issues fixed in the libfpm_pb0-1.2.4-2.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2223">CVE-2006-2223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1995">CVE-2007-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16227">CVE-2017-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5495">CVE-2017-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5278/">CVE-2018-5278 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5278">CVE-2018-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5279/">CVE-2018-5279 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5279">CVE-2018-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5280/">CVE-2018-5280 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5280">CVE-2018-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5281/">CVE-2018-5281 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5281">CVE-2018-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5378">CVE-2018-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5380">CVE-2018-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5381">CVE-2018-5381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912927" comment="libfpm_pb0-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912928" comment="libospf0-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912929" comment="libospfapiclient0-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912930" comment="libquagga_pb0-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912931" comment="libzebra1-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912932" comment="quagga-1.2.4-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912933" comment="quagga-devel-1.2.4-2.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249612" version="1" class="patch">
	<metadata>
		<title>quassel-base-0.13.1-4.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000178" ref_url="https://www.suse.com/security/cve/CVE-2018-1000178/" source="CVE"/>
		<reference ref_id="CVE-2018-1000179" ref_url="https://www.suse.com/security/cve/CVE-2018-1000179/" source="CVE"/>
		<description>
These are all security issues fixed in the quassel-base-0.13.1-4.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000178/">CVE-2018-1000178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000178">CVE-2018-1000178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000179/">CVE-2018-1000179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000179">CVE-2018-1000179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912934" comment="quassel-base-0.13.1-4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912935" comment="quassel-client-0.13.1-4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912936" comment="quassel-client-qt5-0.13.1-4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912937" comment="quassel-core-0.13.1-4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912938" comment="quassel-mono-0.13.1-4.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249613" version="1" class="patch">
	<metadata>
		<title>qutebrowser-2.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000559" ref_url="https://www.suse.com/security/cve/CVE-2018-1000559/" source="CVE"/>
		<reference ref_id="CVE-2018-10895" ref_url="https://www.suse.com/security/cve/CVE-2018-10895/" source="CVE"/>
		<reference ref_id="CVE-2020-11054" ref_url="https://www.suse.com/security/cve/CVE-2020-11054/" source="CVE"/>
		<description>
These are all security issues fixed in the qutebrowser-2.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000559/">CVE-2018-1000559 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000559">CVE-2018-1000559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10895/">CVE-2018-10895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10895">CVE-2018-10895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11054/">CVE-2020-11054 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11054">CVE-2020-11054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912939" comment="qutebrowser-2.3.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249614" version="1" class="patch">
	<metadata>
		<title>librabbitmq-devel-0.11.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18609" ref_url="https://www.suse.com/security/cve/CVE-2019-18609/" source="CVE"/>
		<description>
These are all security issues fixed in the librabbitmq-devel-0.11.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18609/">CVE-2019-18609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18609">CVE-2019-18609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912940" comment="librabbitmq-devel-0.11.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912941" comment="librabbitmq4-0.11.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912942" comment="rabbitmq-c-tools-0.11.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249615" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.9.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9877" ref_url="https://www.suse.com/security/cve/CVE-2016-9877/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.9.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9877/">CVE-2016-9877 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9877">CVE-2016-9877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912943" comment="erlang-rabbitmq-client-3.9.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912944" comment="rabbitmq-server-3.9.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912945" comment="rabbitmq-server-bash-completion-3.9.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912946" comment="rabbitmq-server-plugins-3.9.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912947" comment="rabbitmq-server-zsh-completion-3.9.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249616" version="1" class="patch">
	<metadata>
		<title>radare2-5.3.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10929" ref_url="https://www.suse.com/security/cve/CVE-2017-10929/" source="CVE"/>
		<reference ref_id="CVE-2021-32613" ref_url="https://www.suse.com/security/cve/CVE-2021-32613/" source="CVE"/>
		<reference ref_id="CVE-2021-3673" ref_url="https://www.suse.com/security/cve/CVE-2021-3673/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.3.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10929/">CVE-2017-10929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10929">CVE-2017-10929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32613/">CVE-2021-32613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32613">CVE-2021-32613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3673/">CVE-2021-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3673">CVE-2021-3673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912948" comment="radare2-5.3.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912949" comment="radare2-devel-5.3.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249617" version="1" class="patch">
	<metadata>
		<title>libraptor-devel-2.0.15-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor-devel-2.0.15-3.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912950" comment="libraptor-devel-2.0.15-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912951" comment="libraptor2-0-2.0.15-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912952" comment="libraptor2-0-32bit-2.0.15-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912953" comment="raptor-2.0.15-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249618" version="1" class="patch">
	<metadata>
		<title>rclone-1.55.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28924" ref_url="https://www.suse.com/security/cve/CVE-2020-28924/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.55.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28924/">CVE-2020-28924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28924">CVE-2020-28924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912954" comment="rclone-1.55.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912955" comment="rclone-bash-completion-1.55.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912956" comment="rclone-zsh-completion-1.55.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249619" version="1" class="patch">
	<metadata>
		<title>rdesktop-1.9.0-4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1801" ref_url="https://www.suse.com/security/cve/CVE-2008-1801/" source="CVE"/>
		<reference ref_id="CVE-2008-1802" ref_url="https://www.suse.com/security/cve/CVE-2008-1802/" source="CVE"/>
		<reference ref_id="CVE-2008-1803" ref_url="https://www.suse.com/security/cve/CVE-2008-1803/" source="CVE"/>
		<reference ref_id="CVE-2018-20174" ref_url="https://www.suse.com/security/cve/CVE-2018-20174/" source="CVE"/>
		<reference ref_id="CVE-2018-20175" ref_url="https://www.suse.com/security/cve/CVE-2018-20175/" source="CVE"/>
		<reference ref_id="CVE-2018-20176" ref_url="https://www.suse.com/security/cve/CVE-2018-20176/" source="CVE"/>
		<reference ref_id="CVE-2018-20177" ref_url="https://www.suse.com/security/cve/CVE-2018-20177/" source="CVE"/>
		<reference ref_id="CVE-2018-20178" ref_url="https://www.suse.com/security/cve/CVE-2018-20178/" source="CVE"/>
		<reference ref_id="CVE-2018-20179" ref_url="https://www.suse.com/security/cve/CVE-2018-20179/" source="CVE"/>
		<reference ref_id="CVE-2018-20180" ref_url="https://www.suse.com/security/cve/CVE-2018-20180/" source="CVE"/>
		<reference ref_id="CVE-2018-20181" ref_url="https://www.suse.com/security/cve/CVE-2018-20181/" source="CVE"/>
		<reference ref_id="CVE-2018-20182" ref_url="https://www.suse.com/security/cve/CVE-2018-20182/" source="CVE"/>
		<reference ref_id="CVE-2018-8791" ref_url="https://www.suse.com/security/cve/CVE-2018-8791/" source="CVE"/>
		<reference ref_id="CVE-2018-8792" ref_url="https://www.suse.com/security/cve/CVE-2018-8792/" source="CVE"/>
		<reference ref_id="CVE-2018-8793" ref_url="https://www.suse.com/security/cve/CVE-2018-8793/" source="CVE"/>
		<reference ref_id="CVE-2018-8794" ref_url="https://www.suse.com/security/cve/CVE-2018-8794/" source="CVE"/>
		<reference ref_id="CVE-2018-8795" ref_url="https://www.suse.com/security/cve/CVE-2018-8795/" source="CVE"/>
		<reference ref_id="CVE-2018-8796" ref_url="https://www.suse.com/security/cve/CVE-2018-8796/" source="CVE"/>
		<reference ref_id="CVE-2018-8797" ref_url="https://www.suse.com/security/cve/CVE-2018-8797/" source="CVE"/>
		<reference ref_id="CVE-2018-8798" ref_url="https://www.suse.com/security/cve/CVE-2018-8798/" source="CVE"/>
		<reference ref_id="CVE-2018-8799" ref_url="https://www.suse.com/security/cve/CVE-2018-8799/" source="CVE"/>
		<reference ref_id="CVE-2018-8800" ref_url="https://www.suse.com/security/cve/CVE-2018-8800/" source="CVE"/>
		<description>
These are all security issues fixed in the rdesktop-1.9.0-4.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1801/">CVE-2008-1801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1801">CVE-2008-1801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1802/">CVE-2008-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1802">CVE-2008-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1803/">CVE-2008-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1803">CVE-2008-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20174/">CVE-2018-20174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20174">CVE-2018-20174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20175/">CVE-2018-20175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20175">CVE-2018-20175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20176/">CVE-2018-20176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20176">CVE-2018-20176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20177/">CVE-2018-20177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20177">CVE-2018-20177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20178/">CVE-2018-20178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20178">CVE-2018-20178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20179/">CVE-2018-20179 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20179">CVE-2018-20179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20180/">CVE-2018-20180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20180">CVE-2018-20180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20181/">CVE-2018-20181 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20181">CVE-2018-20181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20182/">CVE-2018-20182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20182">CVE-2018-20182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8791/">CVE-2018-8791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8791">CVE-2018-8791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8792/">CVE-2018-8792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8792">CVE-2018-8792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8793/">CVE-2018-8793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8793">CVE-2018-8793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8794/">CVE-2018-8794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8794">CVE-2018-8794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8795/">CVE-2018-8795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8795">CVE-2018-8795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8796/">CVE-2018-8796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8796">CVE-2018-8796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8797/">CVE-2018-8797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8797">CVE-2018-8797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8798/">CVE-2018-8798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8798">CVE-2018-8798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8799/">CVE-2018-8799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8799">CVE-2018-8799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8800/">CVE-2018-8800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8800">CVE-2018-8800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912957" comment="rdesktop-1.9.0-4.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249620" version="1" class="patch">
	<metadata>
		<title>redis-6.2.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8080" ref_url="https://www.suse.com/security/cve/CVE-2015-8080/" source="CVE"/>
		<reference ref_id="CVE-2016-10517" ref_url="https://www.suse.com/security/cve/CVE-2016-10517/" source="CVE"/>
		<reference ref_id="CVE-2017-15047" ref_url="https://www.suse.com/security/cve/CVE-2017-15047/" source="CVE"/>
		<reference ref_id="CVE-2018-11218" ref_url="https://www.suse.com/security/cve/CVE-2018-11218/" source="CVE"/>
		<reference ref_id="CVE-2021-21309" ref_url="https://www.suse.com/security/cve/CVE-2021-21309/" source="CVE"/>
		<reference ref_id="CVE-2021-29477" ref_url="https://www.suse.com/security/cve/CVE-2021-29477/" source="CVE"/>
		<reference ref_id="CVE-2021-29478" ref_url="https://www.suse.com/security/cve/CVE-2021-29478/" source="CVE"/>
		<reference ref_id="CVE-2021-32625" ref_url="https://www.suse.com/security/cve/CVE-2021-32625/" source="CVE"/>
		<reference ref_id="CVE-2021-32761" ref_url="https://www.suse.com/security/cve/CVE-2021-32761/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-6.2.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8080/">CVE-2015-8080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8080">CVE-2015-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10517/">CVE-2016-10517 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10517">CVE-2016-10517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15047/">CVE-2017-15047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15047">CVE-2017-15047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11218/">CVE-2018-11218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11218">CVE-2018-11218 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21309/">CVE-2021-21309 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21309">CVE-2021-21309 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29477/">CVE-2021-29477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29477">CVE-2021-29477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29478/">CVE-2021-29478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29478">CVE-2021-29478 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32625/">CVE-2021-32625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32625">CVE-2021-32625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32761/">CVE-2021-32761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32761">CVE-2021-32761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912958" comment="redis-6.2.5-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249621" version="1" class="patch">
	<metadata>
		<title>ripgrep-13.0.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3013" ref_url="https://www.suse.com/security/cve/CVE-2021-3013/" source="CVE"/>
		<description>
These are all security issues fixed in the ripgrep-13.0.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3013/">CVE-2021-3013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3013">CVE-2021-3013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912959" comment="ripgrep-13.0.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912960" comment="ripgrep-bash-completion-13.0.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912961" comment="ripgrep-fish-completion-13.0.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912962" comment="ripgrep-zsh-completion-13.0.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249622" version="1" class="patch">
	<metadata>
		<title>rkhunter-1.4.6-5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4982" ref_url="https://www.suse.com/security/cve/CVE-2008-4982/" source="CVE"/>
		<description>
These are all security issues fixed in the rkhunter-1.4.6-5.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4982/">CVE-2008-4982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4982">CVE-2008-4982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912963" comment="rkhunter-1.4.6-5.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249623" version="1" class="patch">
	<metadata>
		<title>librnp0-0.15.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33589" ref_url="https://www.suse.com/security/cve/CVE-2021-33589/" source="CVE"/>
		<description>
These are all security issues fixed in the librnp0-0.15.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33589/">CVE-2021-33589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33589">CVE-2021-33589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912964" comment="librnp0-0.15.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912965" comment="rnp-0.15.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912966" comment="rnp-devel-0.15.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249624" version="1" class="patch">
	<metadata>
		<title>roundcubemail-1.4.11-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16651" ref_url="https://www.suse.com/security/cve/CVE-2017-16651/" source="CVE"/>
		<reference ref_id="CVE-2017-6820" ref_url="https://www.suse.com/security/cve/CVE-2017-6820/" source="CVE"/>
		<reference ref_id="CVE-2017-8114" ref_url="https://www.suse.com/security/cve/CVE-2017-8114/" source="CVE"/>
		<reference ref_id="CVE-2018-9846" ref_url="https://www.suse.com/security/cve/CVE-2018-9846/" source="CVE"/>
		<reference ref_id="CVE-2019-10740" ref_url="https://www.suse.com/security/cve/CVE-2019-10740/" source="CVE"/>
		<reference ref_id="CVE-2020-12641" ref_url="https://www.suse.com/security/cve/CVE-2020-12641/" source="CVE"/>
		<reference ref_id="CVE-2020-16145" ref_url="https://www.suse.com/security/cve/CVE-2020-16145/" source="CVE"/>
		<reference ref_id="CVE-2020-35730" ref_url="https://www.suse.com/security/cve/CVE-2020-35730/" source="CVE"/>
		<description>
These are all security issues fixed in the roundcubemail-1.4.11-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16651/">CVE-2017-16651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16651">CVE-2017-16651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6820/">CVE-2017-6820 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6820">CVE-2017-6820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8114/">CVE-2017-8114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8114">CVE-2017-8114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9846/">CVE-2018-9846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9846">CVE-2018-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10740/">CVE-2019-10740 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10740">CVE-2019-10740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12641/">CVE-2020-12641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641">CVE-2020-12641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16145/">CVE-2020-16145 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16145">CVE-2020-16145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35730/">CVE-2020-35730 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730">CVE-2020-35730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912967" comment="roundcubemail-1.4.11-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249625" version="1" class="patch">
	<metadata>
		<title>rpcbind-1.2.6-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-1.2.6-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912968" comment="rpcbind-1.2.6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249626" version="1" class="patch">
	<metadata>
		<title>librpmbuild9-4.16.1.3-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<description>
These are all security issues fixed in the librpmbuild9-4.16.1.3-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912969" comment="librpmbuild9-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912970" comment="rpm-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912971" comment="rpm-32bit-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912972" comment="rpm-build-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912973" comment="rpm-build-perl-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912974" comment="rpm-build-python-4.16.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912975" comment="rpm-devel-4.16.1.3-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249627" version="1" class="patch">
	<metadata>
		<title>rpmdevtools-8.10-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3500" ref_url="https://www.suse.com/security/cve/CVE-2012-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the rpmdevtools-8.10-7.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3500/">CVE-2012-3500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3500">CVE-2012-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912976" comment="rpmdevtools-8.10-7.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249628" version="1" class="patch">
	<metadata>
		<title>rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the rpmlint-2.1+git20210924.ad0cf53-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912977" comment="rpmlint-2.1+git20210924.ad0cf53-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249629" version="1" class="patch">
	<metadata>
		<title>rsync-3.2.3-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="CVE-2020-14387" ref_url="https://www.suse.com/security/cve/CVE-2020-14387/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.2.3-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14387/">CVE-2020-14387 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14387">CVE-2020-14387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912978" comment="rsync-3.2.3-2.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249630" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.2106.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.2106.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3243">CVE-2015-3243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912979" comment="rsyslog-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912980" comment="rsyslog-diag-tools-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912981" comment="rsyslog-doc-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912982" comment="rsyslog-module-elasticsearch-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912983" comment="rsyslog-module-gcrypt-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912984" comment="rsyslog-module-gssapi-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912985" comment="rsyslog-module-gtls-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912986" comment="rsyslog-module-kafka-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912987" comment="rsyslog-module-mmnormalize-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912988" comment="rsyslog-module-mysql-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912989" comment="rsyslog-module-omamqp1-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912990" comment="rsyslog-module-omhttpfs-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912991" comment="rsyslog-module-omtcl-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912992" comment="rsyslog-module-ossl-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912993" comment="rsyslog-module-pgsql-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912994" comment="rsyslog-module-relp-8.2106.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912995" comment="rsyslog-module-snmp-8.2106.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249631" version="1" class="patch">
	<metadata>
		<title>libruby2_7-2_7-2.7.3-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_7-2_7-2.7.3-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009912996" comment="libruby2_7-2_7-2.7.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912997" comment="ruby2.7-2.7.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912998" comment="ruby2.7-devel-2.7.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009912999" comment="ruby2.7-devel-extra-2.7.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913000" comment="ruby2.7-doc-2.7.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913001" comment="ruby2.7-doc-ri-2.7.3-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249632" version="1" class="patch">
	<metadata>
		<title>libruby3_0-3_0-3.0.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_0-3_0-3.0.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913002" comment="libruby3_0-3_0-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913003" comment="ruby3.0-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913004" comment="ruby3.0-devel-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913005" comment="ruby3.0-devel-extra-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913006" comment="ruby3.0-doc-3.0.1-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913007" comment="ruby3.0-doc-ri-3.0.1-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249633" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actioncable-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actioncable-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913008" comment="ruby2.7-rubygem-actioncable-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913009" comment="ruby3.0-rubygem-actioncable-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249634" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actioncable-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actioncable-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913010" comment="ruby2.7-rubygem-actioncable-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913011" comment="ruby3.0-rubygem-actioncable-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249635" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionmailbox-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionmailbox-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913012" comment="ruby2.7-rubygem-actionmailbox-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913013" comment="ruby3.0-rubygem-actionmailbox-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249636" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionmailer-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionmailer-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913014" comment="ruby2.7-rubygem-actionmailer-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913015" comment="ruby3.0-rubygem-actionmailer-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249637" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionmailer-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionmailer-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913016" comment="ruby2.7-rubygem-actionmailer-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913017" comment="ruby3.0-rubygem-actionmailer-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249638" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionpack-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="CVE-2021-22904" ref_url="https://www.suse.com/security/cve/CVE-2021-22904/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionpack-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8164">CVE-2020-8164 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8166">CVE-2020-8166 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22885">CVE-2021-22885 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22904/">CVE-2021-22904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22904">CVE-2021-22904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913018" comment="ruby2.7-rubygem-actionpack-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913019" comment="ruby3.0-rubygem-actionpack-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249639" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<reference ref_id="CVE-2021-22881" ref_url="https://www.suse.com/security/cve/CVE-2021-22881/" source="CVE"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="CVE-2021-22902" ref_url="https://www.suse.com/security/cve/CVE-2021-22902/" source="CVE"/>
		<reference ref_id="CVE-2021-22904" ref_url="https://www.suse.com/security/cve/CVE-2021-22904/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8164">CVE-2020-8164 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8166">CVE-2020-8166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8185">CVE-2020-8185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22881/">CVE-2021-22881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22881">CVE-2021-22881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22885">CVE-2021-22885 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22902/">CVE-2021-22902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22902">CVE-2021-22902 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22904/">CVE-2021-22904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22904">CVE-2021-22904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913020" comment="ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913021" comment="ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249640" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actiontext-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actiontext-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913022" comment="ruby2.7-rubygem-actiontext-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913023" comment="ruby3.0-rubygem-actiontext-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249641" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionview-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionview-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15169">CVE-2020-15169 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8167">CVE-2020-8167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913024" comment="ruby2.7-rubygem-actionview-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913025" comment="ruby3.0-rubygem-actionview-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249642" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-actionview-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-actionview-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5267">CVE-2020-5267 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8167">CVE-2020-8167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8185">CVE-2020-8185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913026" comment="ruby2.7-rubygem-actionview-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913027" comment="ruby3.0-rubygem-actionview-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249643" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activejob-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16476" ref_url="https://www.suse.com/security/cve/CVE-2018-16476/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activejob-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16476/">CVE-2018-16476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16476">CVE-2018-16476 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913028" comment="ruby2.7-rubygem-activejob-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913029" comment="ruby3.0-rubygem-activejob-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249644" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activejob-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activejob-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913030" comment="ruby2.7-rubygem-activejob-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913031" comment="ruby3.0-rubygem-activejob-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249645" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activemodel-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activemodel-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913032" comment="ruby2.7-rubygem-activemodel-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913033" comment="ruby3.0-rubygem-activemodel-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249646" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activemodel-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activemodel-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913034" comment="ruby2.7-rubygem-activemodel-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913035" comment="ruby3.0-rubygem-activemodel-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249647" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activerecord-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activerecord-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22880">CVE-2021-22880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913036" comment="ruby2.7-rubygem-activerecord-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913037" comment="ruby3.0-rubygem-activerecord-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249648" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activerecord-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activerecord-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22880">CVE-2021-22880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913038" comment="ruby2.7-rubygem-activerecord-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913039" comment="ruby3.0-rubygem-activerecord-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249649" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activestorage-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16477" ref_url="https://www.suse.com/security/cve/CVE-2018-16477/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8162" ref_url="https://www.suse.com/security/cve/CVE-2020-8162/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activestorage-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16477/">CVE-2018-16477 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16477">CVE-2018-16477 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8162/">CVE-2020-8162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8162">CVE-2020-8162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913040" comment="ruby2.7-rubygem-activestorage-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913041" comment="ruby3.0-rubygem-activestorage-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249650" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activestorage-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8162" ref_url="https://www.suse.com/security/cve/CVE-2020-8162/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activestorage-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8162/">CVE-2020-8162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8162">CVE-2020-8162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913042" comment="ruby2.7-rubygem-activestorage-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913043" comment="ruby3.0-rubygem-activestorage-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249651" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activesupport-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activesupport-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913044" comment="ruby2.7-rubygem-activesupport-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913045" comment="ruby3.0-rubygem-activesupport-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249652" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-activesupport-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-activesupport-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913046" comment="ruby2.7-rubygem-activesupport-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913047" comment="ruby3.0-rubygem-activesupport-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249653" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-archive-tar-minitar-0.5.2-9.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-archive-tar-minitar-0.5.2-9.23 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913048" comment="ruby2.7-rubygem-archive-tar-minitar-0.5.2-9.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913049" comment="ruby3.0-rubygem-archive-tar-minitar-0.5.2-9.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249654" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-http-cookie-1.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-http-cookie-1.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913050" comment="ruby2.7-rubygem-http-cookie-1.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913051" comment="ruby3.0-rubygem-http-cookie-1.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249655" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-jquery-rails-4.4.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-jquery-rails-4.4.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913052" comment="ruby2.7-rubygem-jquery-rails-4.4.0-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913053" comment="ruby3.0-rubygem-jquery-rails-4.4.0-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249656" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-json_pure-2.5.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-json_pure-2.5.1-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913054" comment="ruby2.7-rubygem-json_pure-2.5.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913055" comment="ruby3.0-rubygem-json_pure-2.5.1-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249657" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-kramdown-2.3.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-kramdown-2.3.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913056" comment="ruby2.7-rubygem-kramdown-2.3.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913057" comment="ruby3.0-rubygem-kramdown-2.3.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249658" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-loofah-2.12.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-loofah-2.12.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913058" comment="ruby2.7-rubygem-loofah-2.12.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913059" comment="ruby3.0-rubygem-loofah-2.12.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249659" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-minitar-0.9-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-minitar-0.9-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913060" comment="ruby2.7-rubygem-minitar-0.9-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913061" comment="ruby3.0-rubygem-minitar-0.9-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249660" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-multi_xml-0.6.0-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0175" ref_url="https://www.suse.com/security/cve/CVE-2013-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-multi_xml-0.6.0-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0175/">CVE-2013-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0175">CVE-2013-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913062" comment="ruby2.7-rubygem-multi_xml-0.6.0-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913063" comment="ruby3.0-rubygem-multi_xml-0.6.0-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249661" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-nokogiri-1.12.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-nokogiri-1.12.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913064" comment="ruby2.7-rubygem-nokogiri-1.12.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913065" comment="ruby3.0-rubygem-nokogiri-1.12.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249662" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2119" ref_url="https://www.suse.com/security/cve/CVE-2013-2119/" source="CVE"/>
		<reference ref_id="CVE-2013-4547" ref_url="https://www.suse.com/security/cve/CVE-2013-4547/" source="CVE"/>
		<reference ref_id="CVE-2014-1831" ref_url="https://www.suse.com/security/cve/CVE-2014-1831/" source="CVE"/>
		<reference ref_id="CVE-2014-1832" ref_url="https://www.suse.com/security/cve/CVE-2014-1832/" source="CVE"/>
		<reference ref_id="CVE-2015-7519" ref_url="https://www.suse.com/security/cve/CVE-2015-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-1247" ref_url="https://www.suse.com/security/cve/CVE-2016-1247/" source="CVE"/>
		<reference ref_id="CVE-2017-7529" ref_url="https://www.suse.com/security/cve/CVE-2017-7529/" source="CVE"/>
		<reference ref_id="CVE-2018-12026" ref_url="https://www.suse.com/security/cve/CVE-2018-12026/" source="CVE"/>
		<reference ref_id="CVE-2018-12029" ref_url="https://www.suse.com/security/cve/CVE-2018-12029/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-passenger-6.0.8-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2119/">CVE-2013-2119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2119">CVE-2013-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4547/">CVE-2013-4547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4547">CVE-2013-4547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1831/">CVE-2014-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1831">CVE-2014-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1832/">CVE-2014-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1832">CVE-2014-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7519/">CVE-2015-7519 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7519">CVE-2015-7519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1247/">CVE-2016-1247 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1247">CVE-2016-1247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7529/">CVE-2017-7529 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7529">CVE-2017-7529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12026/">CVE-2018-12026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12026">CVE-2018-12026 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12029/">CVE-2018-12029 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12029">CVE-2018-12029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913066" comment="ruby2.7-rubygem-passenger-6.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913067" comment="ruby3.0-rubygem-passenger-6.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913068" comment="rubygem-passenger-6.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913069" comment="rubygem-passenger-apache2-6.0.8-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913070" comment="rubygem-passenger-nginx-6.0.8-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249663" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-puma-5.4.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-puma-5.4.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913071" comment="ruby2.7-rubygem-puma-5.4.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913072" comment="ruby3.0-rubygem-puma-5.4.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249664" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-puma-4-4.3.8-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-puma-4-4.3.8-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913073" comment="ruby2.7-rubygem-puma-4-4.3.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913074" comment="ruby3.0-rubygem-puma-4-4.3.8-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249665" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rack-2.2.3-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rack-2.2.3-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913075" comment="ruby2.7-rubygem-rack-2.2.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913076" comment="ruby3.0-rubygem-rack-2.2.3-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249666" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rack-1_6-1.6.13-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rack-1_6-1.6.13-1.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913077" comment="ruby2.7-rubygem-rack-1_6-1.6.13-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913078" comment="ruby3.0-rubygem-rack-1_6-1.6.13-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249667" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rack-2.0-2.0.9-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rack-2.0-2.0.9-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913079" comment="ruby2.7-rubygem-rack-2.0-2.0.9-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913080" comment="ruby3.0-rubygem-rack-2.0-2.0.9-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249668" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rails-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16476" ref_url="https://www.suse.com/security/cve/CVE-2018-16476/" source="CVE"/>
		<reference ref_id="CVE-2018-16477" ref_url="https://www.suse.com/security/cve/CVE-2018-16477/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rails-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16476/">CVE-2018-16476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16476">CVE-2018-16476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16477/">CVE-2018-16477 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16477">CVE-2018-16477 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913081" comment="ruby2.7-rubygem-rails-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913082" comment="ruby3.0-rubygem-rails-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249669" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rails-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rails-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913083" comment="ruby2.7-rubygem-rails-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913084" comment="ruby3.0-rubygem-rails-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249670" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913085" comment="ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913086" comment="ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249671" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-railties-5.2-5.2.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-railties-5.2-5.2.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913087" comment="ruby2.7-rubygem-railties-5.2-5.2.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913088" comment="ruby3.0-rubygem-railties-5.2-5.2.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249672" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-railties-6.0-6.0.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-railties-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913089" comment="ruby2.7-rubygem-railties-6.0-6.0.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913090" comment="ruby3.0-rubygem-railties-6.0-6.0.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249673" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-rubyzip-2.3.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5946" ref_url="https://www.suse.com/security/cve/CVE-2017-5946/" source="CVE"/>
		<reference ref_id="CVE-2018-1000544" ref_url="https://www.suse.com/security/cve/CVE-2018-1000544/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-rubyzip-2.3.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5946/">CVE-2017-5946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5946">CVE-2017-5946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000544/">CVE-2018-1000544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000544">CVE-2018-1000544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913091" comment="ruby2.7-rubygem-rubyzip-2.3.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913092" comment="ruby3.0-rubygem-rubyzip-2.3.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249674" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-sinatra-2.1.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11627" ref_url="https://www.suse.com/security/cve/CVE-2018-11627/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-sinatra-2.1.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11627/">CVE-2018-11627 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11627">CVE-2018-11627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913093" comment="ruby2.7-rubygem-sinatra-2.1.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913094" comment="ruby3.0-rubygem-sinatra-2.1.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249675" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-sprockets-4.0.2-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-sprockets-4.0.2-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913095" comment="ruby2.7-rubygem-sprockets-4.0.2-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913096" comment="ruby3.0-rubygem-sprockets-4.0.2-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249676" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-sprockets-3.7-3.7.2-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-sprockets-3.7-3.7.2-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913097" comment="ruby2.7-rubygem-sprockets-3.7-3.7.2-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913098" comment="ruby3.0-rubygem-sprockets-3.7-3.7.2-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249677" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-web-console-4.1.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3224" ref_url="https://www.suse.com/security/cve/CVE-2015-3224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-web-console-4.1.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3224/">CVE-2015-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3224">CVE-2015-3224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913099" comment="ruby2.7-rubygem-web-console-4.1.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913100" comment="ruby3.0-rubygem-web-console-4.1.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249678" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-websocket-extensions-0.1.5-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7663" ref_url="https://www.suse.com/security/cve/CVE-2020-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-websocket-extensions-0.1.5-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7663/">CVE-2020-7663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">CVE-2020-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913101" comment="ruby2.7-rubygem-websocket-extensions-0.1.5-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913102" comment="ruby3.0-rubygem-websocket-extensions-0.1.5-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249679" version="1" class="patch">
	<metadata>
		<title>runc-1.0.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.0.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913103" comment="runc-1.0.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249680" version="1" class="patch">
	<metadata>
		<title>cargo-1.54.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000622" ref_url="https://www.suse.com/security/cve/CVE-2018-1000622/" source="CVE"/>
		<reference ref_id="CVE-2019-12083" ref_url="https://www.suse.com/security/cve/CVE-2019-12083/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-1.54.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000622/">CVE-2018-1000622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000622">CVE-2018-1000622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12083/">CVE-2019-12083 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12083">CVE-2019-12083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913104" comment="cargo-1.54.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913105" comment="rls-1.54.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913106" comment="rust-1.54.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913107" comment="rust-gdb-1.54.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249681" version="1" class="patch">
	<metadata>
		<title>cargo1.53-1.53.0-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000622" ref_url="https://www.suse.com/security/cve/CVE-2018-1000622/" source="CVE"/>
		<reference ref_id="CVE-2019-12083" ref_url="https://www.suse.com/security/cve/CVE-2019-12083/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.53-1.53.0-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000622/">CVE-2018-1000622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000622">CVE-2018-1000622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12083/">CVE-2019-12083 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12083">CVE-2019-12083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913108" comment="cargo1.53-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913109" comment="cargo1.53-doc-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913110" comment="rls1.53-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913111" comment="rust1.53-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913112" comment="rust1.53-analysis-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913113" comment="rust1.53-doc-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913114" comment="rust1.53-gdb-1.53.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913115" comment="rust1.53-src-1.53.0-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249682" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode-9.26-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7483" ref_url="https://www.suse.com/security/cve/CVE-2017-7483/" source="CVE"/>
		<description>
These are all security issues fixed in the rxvt-unicode-9.26-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7483/">CVE-2017-7483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7483">CVE-2017-7483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913116" comment="rxvt-unicode-9.26-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249683" version="1" class="patch">
	<metadata>
		<title>rzip-2.1-149.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8364" ref_url="https://www.suse.com/security/cve/CVE-2017-8364/" source="CVE"/>
		<description>
These are all security issues fixed in the rzip-2.1-149.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8364/">CVE-2017-8364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8364">CVE-2017-8364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913117" comment="rzip-2.1-149.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249684" version="1" class="patch">
	<metadata>
		<title>rzsz-0.12.21~rc-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
These are all security issues fixed in the rzsz-0.12.21~rc-4.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10195">CVE-2018-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913118" comment="rzsz-0.12.21~rc-4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249685" version="1" class="patch">
	<metadata>
		<title>python3-salt-3002.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361/" source="CVE"/>
		<reference ref_id="CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3002.2-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9639">CVE-2016-9639 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12791">CVE-2017-12791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14695">CVE-2017-14695 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14696">CVE-2017-14696 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15750">CVE-2018-15750 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15751">CVE-2018-15751 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17361">CVE-2019-17361 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18897">CVE-2019-18897 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11651">CVE-2020-11651 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25592">CVE-2020-25592 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28243">CVE-2020-28243 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21996">CVE-2021-21996 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25281">CVE-2021-25281 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25315">CVE-2021-25315 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31607">CVE-2021-31607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009882467" comment="python3-salt-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882468" comment="salt-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886777" comment="salt-api-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882469" comment="salt-bash-completion-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886778" comment="salt-cloud-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882470" comment="salt-doc-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886779" comment="salt-fish-completion-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886780" comment="salt-master-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882471" comment="salt-minion-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886781" comment="salt-proxy-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886782" comment="salt-ssh-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886783" comment="salt-standalone-formulas-configuration-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009886784" comment="salt-syndic-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913119" comment="salt-transactional-update-3002.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882472" comment="salt-zsh-completion-3002.2-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249686" version="1" class="patch">
	<metadata>
		<title>ctdb-4.14.6+git.182.2205d5224e3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1059" ref_url="https://www.suse.com/security/cve/CVE-2006-1059/" source="CVE"/>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629/" source="CVE"/>
		<reference ref_id="CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841/" source="CVE"/>
		<reference ref_id="CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851/" source="CVE"/>
		<reference ref_id="CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852/" source="CVE"/>
		<reference ref_id="CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853/" source="CVE"/>
		<reference ref_id="CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435/" source="CVE"/>
		<reference ref_id="CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436/" source="CVE"/>
		<reference ref_id="CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833/" source="CVE"/>
		<reference ref_id="CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847/" source="CVE"/>
		<reference ref_id="CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861/" source="CVE"/>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870/" source="CVE"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.14.6+git.182.2205d5224e3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1059/">CVE-2006-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1059">CVE-2006-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2123">CVE-2016-2123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11103">CVE-2017-11103 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1057">CVE-2018-1057 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10918">CVE-2018-10918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10919">CVE-2018-10919 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1139">CVE-2018-1139 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1140">CVE-2018-1140 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14629">CVE-2018-14629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16841">CVE-2018-16841 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16851">CVE-2018-16851 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16852">CVE-2018-16852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16853">CVE-2018-16853 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16857">CVE-2018-16857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16860">CVE-2018-16860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12435">CVE-2019-12435 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12436">CVE-2019-12436 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14833">CVE-2019-14833 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14847">CVE-2019-14847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14861">CVE-2019-14861 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14870">CVE-2019-14870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14902">CVE-2019-14902 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19344">CVE-2019-19344 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3824">CVE-2019-3824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3870">CVE-2019-3870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10700">CVE-2020-10700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10704">CVE-2020-10704 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10760">CVE-2020-10760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14303">CVE-2020-14303 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27840">CVE-2020-27840 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913120" comment="ctdb-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913121" comment="ctdb-pcp-pmda-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913122" comment="libdcerpc-binding0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913123" comment="libdcerpc-binding0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913124" comment="libdcerpc-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913125" comment="libdcerpc-samr-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913126" comment="libdcerpc-samr0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913127" comment="libdcerpc-samr0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913128" comment="libdcerpc0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913129" comment="libdcerpc0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913130" comment="libndr-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913131" comment="libndr-krb5pac-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913132" comment="libndr-krb5pac0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913133" comment="libndr-krb5pac0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913134" comment="libndr-nbt-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913135" comment="libndr-nbt0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913136" comment="libndr-nbt0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913137" comment="libndr-standard-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913138" comment="libndr-standard0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913139" comment="libndr-standard0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913140" comment="libndr1-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913141" comment="libndr1-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913142" comment="libnetapi-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913143" comment="libnetapi-devel-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913144" comment="libnetapi0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913145" comment="libnetapi0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913146" comment="libsamba-credentials-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913147" comment="libsamba-credentials1-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913148" comment="libsamba-credentials1-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913149" comment="libsamba-errors-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913150" comment="libsamba-errors0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913151" comment="libsamba-errors0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913152" comment="libsamba-hostconfig-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913153" comment="libsamba-hostconfig0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913154" comment="libsamba-hostconfig0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913155" comment="libsamba-passdb-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913156" comment="libsamba-passdb0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913157" comment="libsamba-passdb0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913158" comment="libsamba-policy-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913159" comment="libsamba-policy-python3-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913160" comment="libsamba-policy0-python3-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913161" comment="libsamba-policy0-python3-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913162" comment="libsamba-util-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913163" comment="libsamba-util0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913164" comment="libsamba-util0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913165" comment="libsamdb-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913166" comment="libsamdb0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913167" comment="libsamdb0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913168" comment="libsmbclient-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913169" comment="libsmbclient0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913170" comment="libsmbclient0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913171" comment="libsmbconf-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913172" comment="libsmbconf0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913173" comment="libsmbconf0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913174" comment="libsmbldap-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913175" comment="libsmbldap2-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913176" comment="libsmbldap2-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913177" comment="libtevent-util-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913178" comment="libtevent-util0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913179" comment="libtevent-util0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913180" comment="libwbclient-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913181" comment="libwbclient0-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913182" comment="libwbclient0-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913183" comment="samba-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913184" comment="samba-ad-dc-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913185" comment="samba-ad-dc-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913186" comment="samba-ceph-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913187" comment="samba-client-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913188" comment="samba-client-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913189" comment="samba-core-devel-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913190" comment="samba-doc-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913191" comment="samba-dsdb-modules-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913192" comment="samba-gpupdate-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913193" comment="samba-ldb-ldap-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913194" comment="samba-libs-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913195" comment="samba-libs-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913196" comment="samba-libs-python3-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913197" comment="samba-libs-python3-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913198" comment="samba-python3-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913199" comment="samba-test-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913200" comment="samba-winbind-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913201" comment="samba-winbind-32bit-4.14.6+git.182.2205d5224e3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249687" version="1" class="patch">
	<metadata>
		<title>libsane1-1.0.32-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
These are all security issues fixed in the libsane1-1.0.32-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913202" comment="libsane1-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913203" comment="libsane1-32bit-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913204" comment="sane-backends-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913205" comment="sane-backends-32bit-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913206" comment="sane-backends-autoconfig-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913207" comment="sane-backends-devel-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913208" comment="sane-backends-devel-32bit-1.0.32-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913209" comment="sane-saned-1.0.32-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249688" version="1" class="patch">
	<metadata>
		<title>sarg-2.4.0-3.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1922" ref_url="https://www.suse.com/security/cve/CVE-2008-1922/" source="CVE"/>
		<description>
These are all security issues fixed in the sarg-2.4.0-3.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1922/">CVE-2008-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1922">CVE-2008-1922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913210" comment="sarg-2.4.0-3.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249689" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.9-13.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-6644" ref_url="https://www.suse.com/security/cve/CVE-2018-6644/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.9-13.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6644/">CVE-2018-6644 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6644">CVE-2018-6644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913211" comment="sblim-sfcb-1.4.9-13.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249690" version="1" class="patch">
	<metadata>
		<title>sca-patterns-sle11-1.3.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<description>
These are all security issues fixed in the sca-patterns-sle11-1.3.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913212" comment="sca-patterns-sle11-1.3.5-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249691" version="1" class="patch">
	<metadata>
		<title>sca-patterns-sle12-1.0.8-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<description>
These are all security issues fixed in the sca-patterns-sle12-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913213" comment="sca-patterns-sle12-1.0.8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249692" version="1" class="patch">
	<metadata>
		<title>sca-patterns-sle15-1.0.8-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<description>
These are all security issues fixed in the sca-patterns-sle15-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913214" comment="sca-patterns-sle15-1.0.8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249693" version="1" class="patch">
	<metadata>
		<title>bosh-2021.09.01-44.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<description>
These are all security issues fixed in the bosh-2021.09.01-44.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913215" comment="bosh-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913216" comment="btcflash-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913217" comment="cdda2wav-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913218" comment="cdrecord-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913219" comment="libcdrdeflt1_0-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913220" comment="libdeflt1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913221" comment="libedc_ecc1_0-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913222" comment="libedc_ecc_dec1_0-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913223" comment="libfile1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913224" comment="libfind4_0-1.8-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913225" comment="libparanoia1_0-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913226" comment="librmt-devel-doc-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913227" comment="librmt1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913228" comment="librscg1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913229" comment="libscg-devel-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913230" comment="libscg1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913231" comment="libscgcmd1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913232" comment="libschily-devel-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913233" comment="libschily-devel-doc-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913234" comment="libschily2_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913235" comment="libxtermcap1_0-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913236" comment="mkisofs-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913237" comment="readcd-3.02~a10-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913238" comment="rscsi-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913239" comment="sccs-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913240" comment="schily-ctags-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913241" comment="schily-mt-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913242" comment="schily-rmt-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913243" comment="smake-2021.09.01-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913244" comment="spax-1.6.1-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913245" comment="star-1.6.1-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913246" comment="ved-1.8-44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249694" version="1" class="patch">
	<metadata>
		<title>schismtracker-20210525-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14523" ref_url="https://www.suse.com/security/cve/CVE-2019-14523/" source="CVE"/>
		<reference ref_id="CVE-2019-14524" ref_url="https://www.suse.com/security/cve/CVE-2019-14524/" source="CVE"/>
		<description>
These are all security issues fixed in the schismtracker-20210525-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14523/">CVE-2019-14523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14523">CVE-2019-14523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14524/">CVE-2019-14524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14524">CVE-2019-14524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913247" comment="schismtracker-20210525-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249695" version="1" class="patch">
	<metadata>
		<title>screen-4.8.0-3.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.8.0-3.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5618">CVE-2017-5618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913248" comment="screen-4.8.0-3.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249696" version="1" class="patch">
	<metadata>
		<title>scummvm-2.2.0-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17528" ref_url="https://www.suse.com/security/cve/CVE-2017-17528/" source="CVE"/>
		<description>
These are all security issues fixed in the scummvm-2.2.0-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17528/">CVE-2017-17528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17528">CVE-2017-17528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913249" comment="scummvm-2.2.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913250" comment="scummvm-extra-2.2.0-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249697" version="1" class="patch">
	<metadata>
		<title>sddm-0.19.0-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14345" ref_url="https://www.suse.com/security/cve/CVE-2018-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-28049" ref_url="https://www.suse.com/security/cve/CVE-2020-28049/" source="CVE"/>
		<description>
These are all security issues fixed in the sddm-0.19.0-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14345/">CVE-2018-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14345">CVE-2018-14345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28049/">CVE-2020-28049 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28049">CVE-2020-28049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913251" comment="sddm-0.19.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913252" comment="sddm-branding-openSUSE-0.19.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913253" comment="sddm-branding-upstream-0.19.0-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249698" version="1" class="patch">
	<metadata>
		<title>libsha1detectcoll-devel-1.0.3-4.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<description>
These are all security issues fixed in the libsha1detectcoll-devel-1.0.3-4.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913254" comment="libsha1detectcoll-devel-1.0.3-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913255" comment="libsha1detectcoll1-1.0.3-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913256" comment="sha1collisiondetection-1.0.3-4.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249699" version="1" class="patch">
	<metadata>
		<title>libsubid-devel-4.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<description>
These are all security issues fixed in the libsubid-devel-4.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913257" comment="libsubid-devel-4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913258" comment="libsubid3-4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913259" comment="login_defs-4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913260" comment="shadow-4.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249700" version="1" class="patch">
	<metadata>
		<title>libshadowsocks-libev2-3.3.5-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15924" ref_url="https://www.suse.com/security/cve/CVE-2017-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-5163" ref_url="https://www.suse.com/security/cve/CVE-2019-5163/" source="CVE"/>
		<reference ref_id="CVE-2019-5164" ref_url="https://www.suse.com/security/cve/CVE-2019-5164/" source="CVE"/>
		<description>
These are all security issues fixed in the libshadowsocks-libev2-3.3.5-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15924/">CVE-2017-15924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15924">CVE-2017-15924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5163/">CVE-2019-5163 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5163">CVE-2019-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5164/">CVE-2019-5164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5164">CVE-2019-5164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913261" comment="libshadowsocks-libev2-3.3.5-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913262" comment="shadowsocks-libev-3.3.5-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913263" comment="shadowsocks-libev-devel-3.3.5-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913264" comment="shadowsocks-libev-doc-3.3.5-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249701" version="1" class="patch">
	<metadata>
		<title>sharutils-4.15.2-6.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097/" source="CVE"/>
		<description>
These are all security issues fixed in the sharutils-4.15.2-6.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000097">CVE-2018-1000097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913265" comment="sharutils-4.15.2-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913266" comment="sharutils-lang-4.15.2-6.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249702" version="1" class="patch">
	<metadata>
		<title>libshibsp-lite10-3.2.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852/" source="CVE"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
These are all security issues fixed in the libshibsp-lite10-3.2.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16852">CVE-2017-16852 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913267" comment="libshibsp-lite10-3.2.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913268" comment="libshibsp10-3.2.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913269" comment="shibboleth-sp-3.2.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913270" comment="shibboleth-sp-devel-3.2.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249703" version="1" class="patch">
	<metadata>
		<title>shim-15.4-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-15.4-4.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913271" comment="shim-15.4-4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249704" version="1" class="patch">
	<metadata>
		<title>signing-party-2.11-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15599" ref_url="https://www.suse.com/security/cve/CVE-2018-15599/" source="CVE"/>
		<reference ref_id="CVE-2019-11627" ref_url="https://www.suse.com/security/cve/CVE-2019-11627/" source="CVE"/>
		<description>
These are all security issues fixed in the signing-party-2.11-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15599/">CVE-2018-15599 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15599">CVE-2018-15599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11627/">CVE-2019-11627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11627">CVE-2019-11627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913272" comment="signing-party-2.11-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249705" version="1" class="patch">
	<metadata>
		<title>singularity-3.8.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12021" ref_url="https://www.suse.com/security/cve/CVE-2018-12021/" source="CVE"/>
		<reference ref_id="CVE-2018-19295" ref_url="https://www.suse.com/security/cve/CVE-2018-19295/" source="CVE"/>
		<reference ref_id="CVE-2019-11328" ref_url="https://www.suse.com/security/cve/CVE-2019-11328/" source="CVE"/>
		<reference ref_id="CVE-2019-19724" ref_url="https://www.suse.com/security/cve/CVE-2019-19724/" source="CVE"/>
		<reference ref_id="CVE-2020-13845" ref_url="https://www.suse.com/security/cve/CVE-2020-13845/" source="CVE"/>
		<reference ref_id="CVE-2020-13846" ref_url="https://www.suse.com/security/cve/CVE-2020-13846/" source="CVE"/>
		<reference ref_id="CVE-2020-13847" ref_url="https://www.suse.com/security/cve/CVE-2020-13847/" source="CVE"/>
		<reference ref_id="CVE-2020-15229" ref_url="https://www.suse.com/security/cve/CVE-2020-15229/" source="CVE"/>
		<reference ref_id="CVE-2020-25039" ref_url="https://www.suse.com/security/cve/CVE-2020-25039/" source="CVE"/>
		<reference ref_id="CVE-2020-25040" ref_url="https://www.suse.com/security/cve/CVE-2020-25040/" source="CVE"/>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="CVE-2021-32635" ref_url="https://www.suse.com/security/cve/CVE-2021-32635/" source="CVE"/>
		<description>
These are all security issues fixed in the singularity-3.8.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12021/">CVE-2018-12021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12021">CVE-2018-12021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19295/">CVE-2018-19295 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19295">CVE-2018-19295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11328/">CVE-2019-11328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11328">CVE-2019-11328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19724/">CVE-2019-19724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19724">CVE-2019-19724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13845/">CVE-2020-13845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13845">CVE-2020-13845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13846/">CVE-2020-13846 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13846">CVE-2020-13846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13847/">CVE-2020-13847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13847">CVE-2020-13847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15229/">CVE-2020-15229 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15229">CVE-2020-15229 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25039/">CVE-2020-25039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25039">CVE-2020-25039 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25040/">CVE-2020-25040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25040">CVE-2020-25040 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29136">CVE-2021-29136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32635/">CVE-2021-32635 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32635">CVE-2021-32635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913273" comment="singularity-3.8.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249706" version="1" class="patch">
	<metadata>
		<title>skopeo-1.2.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<description>
These are all security issues fixed in the skopeo-1.2.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913274" comment="skopeo-1.2.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913275" comment="skopeo-bash-completion-1.2.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249707" version="1" class="patch">
	<metadata>
		<title>jcl-over-slf4j-1.7.30-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the jcl-over-slf4j-1.7.30-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913276" comment="jcl-over-slf4j-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913277" comment="jul-to-slf4j-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913278" comment="log4j-over-slf4j-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913279" comment="slf4j-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913280" comment="slf4j-ext-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913281" comment="slf4j-javadoc-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913282" comment="slf4j-jcl-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913283" comment="slf4j-jdk14-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913284" comment="slf4j-log4j12-1.7.30-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913285" comment="slf4j-manual-1.7.30-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249708" version="1" class="patch">
	<metadata>
		<title>slirp4netns-1.1.11-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
These are all security issues fixed in the slirp4netns-1.1.11-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913286" comment="slirp4netns-1.1.11-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249709" version="1" class="patch">
	<metadata>
		<title>slrn-1.0.3-3.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the slrn-1.0.3-3.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913287" comment="slrn-1.0.3-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913288" comment="slrn-lang-1.0.3-3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249710" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-21.08.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10030" ref_url="https://www.suse.com/security/cve/CVE-2016-10030/" source="CVE"/>
		<reference ref_id="CVE-2017-15566" ref_url="https://www.suse.com/security/cve/CVE-2017-15566/" source="CVE"/>
		<reference ref_id="CVE-2018-10995" ref_url="https://www.suse.com/security/cve/CVE-2018-10995/" source="CVE"/>
		<reference ref_id="CVE-2018-7033" ref_url="https://www.suse.com/security/cve/CVE-2018-7033/" source="CVE"/>
		<reference ref_id="CVE-2019-12838" ref_url="https://www.suse.com/security/cve/CVE-2019-12838/" source="CVE"/>
		<reference ref_id="CVE-2019-19727" ref_url="https://www.suse.com/security/cve/CVE-2019-19727/" source="CVE"/>
		<reference ref_id="CVE-2019-19728" ref_url="https://www.suse.com/security/cve/CVE-2019-19728/" source="CVE"/>
		<reference ref_id="CVE-2019-6438" ref_url="https://www.suse.com/security/cve/CVE-2019-6438/" source="CVE"/>
		<reference ref_id="CVE-2020-12693" ref_url="https://www.suse.com/security/cve/CVE-2020-12693/" source="CVE"/>
		<reference ref_id="CVE-2020-27745" ref_url="https://www.suse.com/security/cve/CVE-2020-27745/" source="CVE"/>
		<reference ref_id="CVE-2020-27746" ref_url="https://www.suse.com/security/cve/CVE-2020-27746/" source="CVE"/>
		<reference ref_id="CVE-2021-31215" ref_url="https://www.suse.com/security/cve/CVE-2021-31215/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-21.08.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10030/">CVE-2016-10030 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10030">CVE-2016-10030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15566/">CVE-2017-15566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15566">CVE-2017-15566 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10995/">CVE-2018-10995 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10995">CVE-2018-10995 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7033/">CVE-2018-7033 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7033">CVE-2018-7033 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12838/">CVE-2019-12838 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12838">CVE-2019-12838 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19727/">CVE-2019-19727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19727">CVE-2019-19727 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19728/">CVE-2019-19728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19728">CVE-2019-19728 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6438/">CVE-2019-6438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6438">CVE-2019-6438 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12693/">CVE-2020-12693 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12693">CVE-2020-12693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27745/">CVE-2020-27745 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27745">CVE-2020-27745 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27746/">CVE-2020-27746 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27746">CVE-2020-27746 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-31215/">CVE-2021-31215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31215">CVE-2021-31215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913289" comment="libnss_slurm2-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913290" comment="libpmi0-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913291" comment="libslurm37-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913292" comment="perl-slurm-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913293" comment="slurm-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913294" comment="slurm-auth-none-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913295" comment="slurm-config-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913296" comment="slurm-config-man-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913297" comment="slurm-cray-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913298" comment="slurm-devel-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913299" comment="slurm-doc-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913300" comment="slurm-hdf5-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913301" comment="slurm-lua-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913302" comment="slurm-munge-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913303" comment="slurm-node-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913304" comment="slurm-openlava-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913305" comment="slurm-pam_slurm-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913306" comment="slurm-plugins-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913307" comment="slurm-rest-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913308" comment="slurm-seff-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913309" comment="slurm-sjstat-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913310" comment="slurm-slurmdbd-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913311" comment="slurm-sql-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913312" comment="slurm-sview-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913313" comment="slurm-torque-21.08.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913314" comment="slurm-webdoc-21.08.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249711" version="1" class="patch">
	<metadata>
		<title>snack-2.2.10-215.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-6303" ref_url="https://www.suse.com/security/cve/CVE-2012-6303/" source="CVE"/>
		<description>
These are all security issues fixed in the snack-2.2.10-215.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6303/">CVE-2012-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6303">CVE-2012-6303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913315" comment="snack-2.2.10-215.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249712" version="1" class="patch">
	<metadata>
		<title>snakeyaml-1.28-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640/" source="CVE"/>
		<description>
These are all security issues fixed in the snakeyaml-1.28-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913316" comment="snakeyaml-1.28-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913317" comment="snakeyaml-javadoc-1.28-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249713" version="1" class="patch">
	<metadata>
		<title>solanum-0~ch448-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7143" ref_url="https://www.suse.com/security/cve/CVE-2016-7143/" source="CVE"/>
		<description>
These are all security issues fixed in the solanum-0~ch448-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7143/">CVE-2016-7143 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7143">CVE-2016-7143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913318" comment="solanum-0~ch448-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249714" version="1" class="patch">
	<metadata>
		<title>libSoundTouch1-2.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
These are all security issues fixed in the libSoundTouch1-2.2-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000223">CVE-2018-1000223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17096">CVE-2018-17096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913319" comment="libSoundTouch1-2.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913320" comment="libSoundTouch1-32bit-2.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913321" comment="soundtouch-2.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913322" comment="soundtouch-devel-2.2-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249715" version="1" class="patch">
	<metadata>
		<title>libsox3-14.4.2-5.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11332" ref_url="https://www.suse.com/security/cve/CVE-2017-11332/" source="CVE"/>
		<reference ref_id="CVE-2017-11358" ref_url="https://www.suse.com/security/cve/CVE-2017-11358/" source="CVE"/>
		<reference ref_id="CVE-2017-11359" ref_url="https://www.suse.com/security/cve/CVE-2017-11359/" source="CVE"/>
		<reference ref_id="CVE-2017-15370" ref_url="https://www.suse.com/security/cve/CVE-2017-15370/" source="CVE"/>
		<reference ref_id="CVE-2017-15371" ref_url="https://www.suse.com/security/cve/CVE-2017-15371/" source="CVE"/>
		<reference ref_id="CVE-2017-15372" ref_url="https://www.suse.com/security/cve/CVE-2017-15372/" source="CVE"/>
		<reference ref_id="CVE-2017-15642" ref_url="https://www.suse.com/security/cve/CVE-2017-15642/" source="CVE"/>
		<reference ref_id="CVE-2017-18189" ref_url="https://www.suse.com/security/cve/CVE-2017-18189/" source="CVE"/>
		<description>
These are all security issues fixed in the libsox3-14.4.2-5.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11332/">CVE-2017-11332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11332">CVE-2017-11332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11358/">CVE-2017-11358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11358">CVE-2017-11358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11359/">CVE-2017-11359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11359">CVE-2017-11359 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15370/">CVE-2017-15370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15370">CVE-2017-15370 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15371/">CVE-2017-15371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15371">CVE-2017-15371 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15372/">CVE-2017-15372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15372">CVE-2017-15372 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15642/">CVE-2017-15642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15642">CVE-2017-15642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18189/">CVE-2017-18189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18189">CVE-2017-18189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913323" comment="libsox3-14.4.2-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913324" comment="sox-14.4.2-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913325" comment="sox-devel-14.4.2-5.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249716" version="1" class="patch">
	<metadata>
		<title>perl-Mail-SpamAssassin-3.4.6-71.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780/" source="CVE"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Mail-SpamAssassin-3.4.6-71.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0451">CVE-2007-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2873">CVE-2007-2873 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15705">CVE-2017-15705 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11780">CVE-2018-11780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913326" comment="perl-Mail-SpamAssassin-3.4.6-71.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913327" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-71.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913328" comment="spamassassin-3.4.6-71.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913329" comment="spamassassin-spamc-3.4.6-71.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249717" version="1" class="patch">
	<metadata>
		<title>spectre-meltdown-checker-0.44-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<description>
These are all security issues fixed in the spectre-meltdown-checker-0.44-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913330" comment="spectre-meltdown-checker-0.44-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249718" version="1" class="patch">
	<metadata>
		<title>libspice-server-devel-0.15.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server-devel-0.15.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4282">CVE-2013-4282 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913331" comment="libspice-server-devel-0.15.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913332" comment="libspice-server1-0.15.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249719" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.39-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.39-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913333" comment="libspice-client-glib-2_0-8-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913334" comment="libspice-client-glib-helper-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913335" comment="libspice-client-gtk-3_0-5-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913336" comment="spice-gtk-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913337" comment="spice-gtk-devel-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913338" comment="spice-gtk-lang-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913339" comment="typelib-1_0-SpiceClientGlib-2_0-0.39-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913340" comment="typelib-1_0-SpiceClientGtk-3_0-0.39-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249720" version="1" class="patch">
	<metadata>
		<title>spice-vdagent-0.21.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-vdagent-0.21.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15108">CVE-2017-15108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25650">CVE-2020-25650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913341" comment="spice-vdagent-0.21.0-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249721" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.36.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936/" source="CVE"/>
		<reference ref_id="CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-13871" ref_url="https://www.suse.com/security/cve/CVE-2020-13871/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.36.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9936">CVE-2019-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9937">CVE-2019-9937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13871/">CVE-2020-13871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13871">CVE-2020-13871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913342" comment="libsqlite3-0-3.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913343" comment="libsqlite3-0-32bit-3.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913344" comment="sqlite3-3.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913345" comment="sqlite3-devel-3.36.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913346" comment="sqlite3-doc-3.36.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249722" version="1" class="patch">
	<metadata>
		<title>sqliteodbc-0.9998-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12050" ref_url="https://www.suse.com/security/cve/CVE-2020-12050/" source="CVE"/>
		<description>
These are all security issues fixed in the sqliteodbc-0.9998-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12050/">CVE-2020-12050 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12050">CVE-2020-12050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913347" comment="sqliteodbc-0.9998-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913348" comment="sqliteodbc-doc-0.9998-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249723" version="1" class="patch">
	<metadata>
		<title>squashfs-4.4-3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.4-3.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913349" comment="squashfs-4.4-3.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249724" version="1" class="patch">
	<metadata>
		<title>squid-4.16-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="CVE-2018-19132" ref_url="https://www.suse.com/security/cve/CVE-2018-19132/" source="CVE"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12527" ref_url="https://www.suse.com/security/cve/CVE-2019-12527/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-12854" ref_url="https://www.suse.com/security/cve/CVE-2019-12854/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652/" source="CVE"/>
		<reference ref_id="CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662/" source="CVE"/>
		<reference ref_id="CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-4.16-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10003">CVE-2016-10003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19132/">CVE-2018-19132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19132">CVE-2018-19132 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12527/">CVE-2019-12527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12527">CVE-2019-12527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12854/">CVE-2019-12854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12854">CVE-2019-12854 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28652">CVE-2021-28652 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28662">CVE-2021-28662 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31806">CVE-2021-31806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913350" comment="squid-4.16-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249725" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.6.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.6.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8936">CVE-2015-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913351" comment="squidGuard-1.6.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913352" comment="squidGuard-doc-1.6.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249726" version="1" class="patch">
	<metadata>
		<title>libsrt1_4-1.4.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15784" ref_url="https://www.suse.com/security/cve/CVE-2019-15784/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrt1_4-1.4.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15784/">CVE-2019-15784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15784">CVE-2019-15784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913353" comment="libsrt1_4-1.4.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913354" comment="libsrt1_4-32bit-1.4.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913355" comment="srt-1.4.3-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913356" comment="srt-devel-1.4.3-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249727" version="1" class="patch">
	<metadata>
		<title>ssdp-responder-1.7-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14323" ref_url="https://www.suse.com/security/cve/CVE-2019-14323/" source="CVE"/>
		<description>
These are all security issues fixed in the ssdp-responder-1.7-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14323/">CVE-2019-14323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14323">CVE-2019-14323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913357" comment="ssdp-responder-1.7-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249728" version="1" class="patch">
	<metadata>
		<title>ssh-audit-2.5.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
These are all security issues fixed in the ssh-audit-2.5.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913358" comment="ssh-audit-2.5.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249729" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-2.5.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-2.5.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913359" comment="libipa_hbac-devel-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913360" comment="libipa_hbac0-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913361" comment="libnfsidmap-sss-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913362" comment="libsss_certmap-devel-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913363" comment="libsss_certmap0-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913364" comment="libsss_idmap-devel-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913365" comment="libsss_idmap0-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913366" comment="libsss_nss_idmap-devel-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913367" comment="libsss_nss_idmap0-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913368" comment="libsss_simpleifp-devel-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913369" comment="libsss_simpleifp0-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913370" comment="python3-ipa_hbac-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913371" comment="python3-sss-murmur-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913372" comment="python3-sss_nss_idmap-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913373" comment="python3-sssd-config-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913374" comment="sssd-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913375" comment="sssd-32bit-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913376" comment="sssd-ad-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913377" comment="sssd-dbus-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913378" comment="sssd-ipa-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913379" comment="sssd-kcm-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913380" comment="sssd-krb5-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913381" comment="sssd-krb5-common-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913382" comment="sssd-ldap-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913383" comment="sssd-proxy-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913384" comment="sssd-tools-2.5.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913385" comment="sssd-winbind-idmap-2.5.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249730" version="1" class="patch">
	<metadata>
		<title>stb-devel-2.36.1594640766.b42009b-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13217" ref_url="https://www.suse.com/security/cve/CVE-2019-13217/" source="CVE"/>
		<reference ref_id="CVE-2019-13218" ref_url="https://www.suse.com/security/cve/CVE-2019-13218/" source="CVE"/>
		<reference ref_id="CVE-2019-13219" ref_url="https://www.suse.com/security/cve/CVE-2019-13219/" source="CVE"/>
		<reference ref_id="CVE-2019-13220" ref_url="https://www.suse.com/security/cve/CVE-2019-13220/" source="CVE"/>
		<reference ref_id="CVE-2019-13221" ref_url="https://www.suse.com/security/cve/CVE-2019-13221/" source="CVE"/>
		<reference ref_id="CVE-2019-13222" ref_url="https://www.suse.com/security/cve/CVE-2019-13222/" source="CVE"/>
		<reference ref_id="CVE-2019-13223" ref_url="https://www.suse.com/security/cve/CVE-2019-13223/" source="CVE"/>
		<description>
These are all security issues fixed in the stb-devel-2.36.1594640766.b42009b-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13217/">CVE-2019-13217 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13217">CVE-2019-13217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13218/">CVE-2019-13218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13218">CVE-2019-13218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13219/">CVE-2019-13219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13219">CVE-2019-13219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13220/">CVE-2019-13220 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13220">CVE-2019-13220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13221/">CVE-2019-13221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13221">CVE-2019-13221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13222/">CVE-2019-13222 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13222">CVE-2019-13222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13223/">CVE-2019-13223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13223">CVE-2019-13223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913386" comment="stb-devel-2.36.1594640766.b42009b-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249731" version="1" class="patch">
	<metadata>
		<title>storeBackup-3.5-13.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7040" ref_url="https://www.suse.com/security/cve/CVE-2020-7040/" source="CVE"/>
		<description>
These are all security issues fixed in the storeBackup-3.5-13.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7040/">CVE-2020-7040 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7040">CVE-2020-7040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913387" comment="storeBackup-3.5-13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249732" version="1" class="patch">
	<metadata>
		<title>strongswan-5.9.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="CVE-2018-6459" ref_url="https://www.suse.com/security/cve/CVE-2018-6459/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.9.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6459/">CVE-2018-6459 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6459">CVE-2018-6459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913388" comment="strongswan-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913389" comment="strongswan-doc-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913390" comment="strongswan-hmac-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913391" comment="strongswan-ipsec-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913392" comment="strongswan-libs0-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913393" comment="strongswan-mysql-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913394" comment="strongswan-nm-5.9.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913395" comment="strongswan-sqlite-5.9.0-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249733" version="1" class="patch">
	<metadata>
		<title>libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-2448" ref_url="https://www.suse.com/security/cve/CVE-2007-2448/" source="CVE"/>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<reference ref_id="CVE-2018-11803" ref_url="https://www.suse.com/security/cve/CVE-2018-11803/" source="CVE"/>
		<reference ref_id="CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203/" source="CVE"/>
		<reference ref_id="CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525/" source="CVE"/>
		<description>
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2448/">CVE-2007-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2448">CVE-2007-2448 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9800">CVE-2017-9800 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11782">CVE-2018-11782 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11803/">CVE-2018-11803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11803">CVE-2018-11803 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0203">CVE-2019-0203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17525">CVE-2020-17525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913396" comment="libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913397" comment="libsvn_auth_kwallet-1-0-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913398" comment="subversion-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913399" comment="subversion-bash-completion-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913400" comment="subversion-devel-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913401" comment="subversion-perl-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913402" comment="subversion-python-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913403" comment="subversion-ruby-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913404" comment="subversion-server-1.14.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913405" comment="subversion-tools-1.14.1-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249734" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.7p2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-4158" ref_url="https://www.suse.com/security/cve/CVE-2005-4158/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.7p2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4158/">CVE-2005-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4158">CVE-2005-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913406" comment="sudo-1.9.7p2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913407" comment="sudo-devel-1.9.7p2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913408" comment="sudo-plugin-python-1.9.7p2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913409" comment="sudo-test-1.9.7p2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249735" version="1" class="patch">
	<metadata>
		<title>supervisor-4.1.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12105" ref_url="https://www.suse.com/security/cve/CVE-2019-12105/" source="CVE"/>
		<description>
These are all security issues fixed in the supervisor-4.1.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12105/">CVE-2019-12105 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12105">CVE-2019-12105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913410" comment="supervisor-4.1.0-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249736" version="1" class="patch">
	<metadata>
		<title>supportutils-3.1.17-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.1.17-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913411" comment="supportutils-3.1.17-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249737" version="1" class="patch">
	<metadata>
		<title>swtpm-0.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28407" ref_url="https://www.suse.com/security/cve/CVE-2020-28407/" source="CVE"/>
		<description>
These are all security issues fixed in the swtpm-0.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-28407/">CVE-2020-28407 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28407">CVE-2020-28407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913412" comment="swtpm-0.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913413" comment="swtpm-devel-0.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913414" comment="swtpm-selinux-0.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249738" version="1" class="patch">
	<metadata>
		<title>syncthing-1.18.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21404" ref_url="https://www.suse.com/security/cve/CVE-2021-21404/" source="CVE"/>
		<description>
These are all security issues fixed in the syncthing-1.18.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21404/">CVE-2021-21404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21404">CVE-2021-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913415" comment="syncthing-1.18.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913416" comment="syncthing-relaysrv-1.18.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249739" version="1" class="patch">
	<metadata>
		<title>libevtlog-3_33-0-3.33.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the libevtlog-3_33-0-3.33.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5110">CVE-2008-5110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913417" comment="libevtlog-3_33-0-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913418" comment="syslog-ng-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913419" comment="syslog-ng-curl-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913420" comment="syslog-ng-devel-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913421" comment="syslog-ng-geoip-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913422" comment="syslog-ng-java-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913423" comment="syslog-ng-mqtt-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913424" comment="syslog-ng-python-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913425" comment="syslog-ng-redis-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913426" comment="syslog-ng-smtp-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913427" comment="syslog-ng-snmp-3.33.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913428" comment="syslog-ng-sql-3.33.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249740" version="1" class="patch">
	<metadata>
		<title>sysstat-12.4.3-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.4.3-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19416">CVE-2018-19416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19517">CVE-2018-19517 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16167">CVE-2019-16167 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913429" comment="sysstat-12.4.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913430" comment="sysstat-isag-12.4.3-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249741" version="1" class="patch">
	<metadata>
		<title>libsystemd0-249.4-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029/" source="CVE"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-249.4-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10156">CVE-2016-10156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15908">CVE-2017-15908 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18078">CVE-2017-18078 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9445">CVE-2017-9445 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15687">CVE-2018-15687 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21029">CVE-2018-21029 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">CVE-2019-3843 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">CVE-2019-3844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913431" comment="libsystemd0-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913432" comment="libsystemd0-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913433" comment="libudev-devel-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913434" comment="libudev-devel-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913435" comment="libudev1-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913436" comment="libudev1-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913437" comment="nss-myhostname-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913438" comment="nss-myhostname-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913439" comment="nss-mymachines-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913440" comment="nss-mymachines-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913441" comment="nss-resolve-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913442" comment="nss-systemd-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913443" comment="systemd-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913444" comment="systemd-32bit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913445" comment="systemd-container-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913446" comment="systemd-coredump-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913447" comment="systemd-devel-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913448" comment="systemd-doc-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913449" comment="systemd-experimental-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913450" comment="systemd-journal-remote-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913451" comment="systemd-lang-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913452" comment="systemd-logger-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913453" comment="systemd-network-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913454" comment="systemd-portable-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913455" comment="systemd-sysvinit-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913456" comment="systemd-testsuite-249.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913457" comment="udev-249.4-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249742" version="1" class="patch">
	<metadata>
		<title>libtag-devel-1.12-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678/" source="CVE"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag-devel-1.12-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12678">CVE-2017-12678 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11439">CVE-2018-11439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913458" comment="libtag-devel-1.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913459" comment="libtag1-1.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913460" comment="libtag1-32bit-1.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913461" comment="libtag_c0-1.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913462" comment="libtag_c0-32bit-1.12-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913463" comment="taglib-1.12-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249743" version="1" class="patch">
	<metadata>
		<title>tar-1.34-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2005-1918" ref_url="https://www.suse.com/security/cve/CVE-2005-1918/" source="CVE"/>
		<reference ref_id="CVE-2006-0300" ref_url="https://www.suse.com/security/cve/CVE-2006-0300/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.34-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1918/">CVE-2005-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1918">CVE-2005-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0300/">CVE-2006-0300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0300">CVE-2006-0300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913464" comment="tar-1.34-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913465" comment="tar-backup-scripts-1.34-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913466" comment="tar-doc-1.34-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913467" comment="tar-lang-1.34-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913468" comment="tar-rmt-1.34-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913469" comment="tar-tests-1.34-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249744" version="1" class="patch">
	<metadata>
		<title>python36-targetcli-fb-2.1.54-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10699" ref_url="https://www.suse.com/security/cve/CVE-2020-10699/" source="CVE"/>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-targetcli-fb-2.1.54-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10699/">CVE-2020-10699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10699">CVE-2020-10699 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913470" comment="python36-targetcli-fb-2.1.54-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913471" comment="python38-targetcli-fb-2.1.54-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913472" comment="python39-targetcli-fb-2.1.54-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913473" comment="targetcli-fb-common-2.1.54-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249745" version="1" class="patch">
	<metadata>
		<title>tboot-20210614_1.10.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837/" source="CVE"/>
		<description>
These are all security issues fixed in the tboot-20210614_1.10.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16837">CVE-2017-16837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913474" comment="tboot-20210614_1.10.2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249746" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.99.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470/" source="CVE"/>
		<reference ref_id="CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879/" source="CVE"/>
		<reference ref_id="CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="CVE-2019-15167" ref_url="https://www.suse.com/security/cve/CVE-2019-15167/" source="CVE"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.99.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7924">CVE-2016-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7929">CVE-2016-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7930">CVE-2016-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7932">CVE-2016-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7933">CVE-2016-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7938">CVE-2016-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7985">CVE-2016-7985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7986">CVE-2016-7986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8575">CVE-2016-8575 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12895">CVE-2017-12895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12989">CVE-2017-12989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12990">CVE-2017-12990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12994">CVE-2017-12994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12997">CVE-2017-12997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13000">CVE-2017-13000 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13007">CVE-2017-13007 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13015">CVE-2017-13015 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13020">CVE-2017-13020 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13026">CVE-2017-13026 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13033">CVE-2017-13033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13039">CVE-2017-13039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13040">CVE-2017-13040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13042">CVE-2017-13042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13043">CVE-2017-13043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13044">CVE-2017-13044 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13045">CVE-2017-13045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13046">CVE-2017-13046 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13050">CVE-2017-13050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13052">CVE-2017-13052 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13054">CVE-2017-13054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13690">CVE-2017-13690 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16808">CVE-2017-16808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5205">CVE-2017-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5341">CVE-2017-5341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5342">CVE-2017-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5482">CVE-2017-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14470">CVE-2018-14470 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14879">CVE-2018-14879 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14880">CVE-2018-14880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16227">CVE-2018-16227 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16228">CVE-2018-16228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010220">CVE-2019-1010220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15167/">CVE-2019-15167 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15167">CVE-2019-15167 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913475" comment="tcpdump-4.99.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249747" version="1" class="patch">
	<metadata>
		<title>tcpreplay-4.3.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6429" ref_url="https://www.suse.com/security/cve/CVE-2017-6429/" source="CVE"/>
		<reference ref_id="CVE-2018-17580" ref_url="https://www.suse.com/security/cve/CVE-2018-17580/" source="CVE"/>
		<reference ref_id="CVE-2018-17582" ref_url="https://www.suse.com/security/cve/CVE-2018-17582/" source="CVE"/>
		<reference ref_id="CVE-2018-17974" ref_url="https://www.suse.com/security/cve/CVE-2018-17974/" source="CVE"/>
		<reference ref_id="CVE-2018-18407" ref_url="https://www.suse.com/security/cve/CVE-2018-18407/" source="CVE"/>
		<reference ref_id="CVE-2018-18408" ref_url="https://www.suse.com/security/cve/CVE-2018-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-8376" ref_url="https://www.suse.com/security/cve/CVE-2019-8376/" source="CVE"/>
		<reference ref_id="CVE-2019-8377" ref_url="https://www.suse.com/security/cve/CVE-2019-8377/" source="CVE"/>
		<reference ref_id="CVE-2019-8381" ref_url="https://www.suse.com/security/cve/CVE-2019-8381/" source="CVE"/>
		<reference ref_id="CVE-2020-24265" ref_url="https://www.suse.com/security/cve/CVE-2020-24265/" source="CVE"/>
		<reference ref_id="CVE-2020-24266" ref_url="https://www.suse.com/security/cve/CVE-2020-24266/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpreplay-4.3.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6429/">CVE-2017-6429 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6429">CVE-2017-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17580/">CVE-2018-17580 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17580">CVE-2018-17580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17582/">CVE-2018-17582 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17582">CVE-2018-17582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17974/">CVE-2018-17974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17974">CVE-2018-17974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18407/">CVE-2018-18407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18407">CVE-2018-18407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18408/">CVE-2018-18408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18408">CVE-2018-18408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8376/">CVE-2019-8376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8376">CVE-2019-8376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8377/">CVE-2019-8377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8377">CVE-2019-8377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8381/">CVE-2019-8381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8381">CVE-2019-8381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24265/">CVE-2020-24265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24265">CVE-2020-24265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24266/">CVE-2020-24266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24266">CVE-2020-24266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913476" comment="tcpreplay-4.3.4-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249748" version="1" class="patch">
	<metadata>
		<title>teeworlds-0.7.5-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9351" ref_url="https://www.suse.com/security/cve/CVE-2014-9351/" source="CVE"/>
		<reference ref_id="CVE-2019-20787" ref_url="https://www.suse.com/security/cve/CVE-2019-20787/" source="CVE"/>
		<reference ref_id="CVE-2020-12066" ref_url="https://www.suse.com/security/cve/CVE-2020-12066/" source="CVE"/>
		<description>
These are all security issues fixed in the teeworlds-0.7.5-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9351/">CVE-2014-9351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9351">CVE-2014-9351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20787/">CVE-2019-20787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20787">CVE-2019-20787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12066/">CVE-2020-12066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12066">CVE-2020-12066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913477" comment="teeworlds-0.7.5-2.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249749" version="1" class="patch">
	<metadata>
		<title>telegraf-1.19.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26160" ref_url="https://www.suse.com/security/cve/CVE-2020-26160/" source="CVE"/>
		<description>
These are all security issues fixed in the telegraf-1.19.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26160/">CVE-2020-26160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26160">CVE-2020-26160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913478" comment="telegraf-1.19.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249750" version="1" class="patch">
	<metadata>
		<title>terraform-0.14.10-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19316" ref_url="https://www.suse.com/security/cve/CVE-2019-19316/" source="CVE"/>
		<description>
These are all security issues fixed in the terraform-0.14.10-1.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19316/">CVE-2019-19316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19316">CVE-2019-19316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913479" comment="terraform-0.14.10-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249751" version="1" class="patch">
	<metadata>
		<title>terraform-provider-helm-2.0.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039/" source="CVE"/>
		<description>
These are all security issues fixed in the terraform-provider-helm-2.0.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14039">CVE-2020-14039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913480" comment="terraform-provider-helm-2.0.0-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249752" version="1" class="patch">
	<metadata>
		<title>libkpathsea6-6.3.3-76.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="CVE-2019-18604" ref_url="https://www.suse.com/security/cve/CVE-2019-18604/" source="CVE"/>
		<reference ref_id="CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016/" source="CVE"/>
		<description>
These are all security issues fixed in the libkpathsea6-6.3.3-76.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17407">CVE-2018-17407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18604/">CVE-2019-18604 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18604">CVE-2019-18604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8016">CVE-2020-8016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913481" comment="libkpathsea6-6.3.3-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913482" comment="libptexenc1-1.3.9-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913483" comment="libsynctex2-1.21-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913484" comment="libtexlua53-5-5.3.6-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913485" comment="libtexluajit2-2.1.0beta3-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913486" comment="perl-biber-2021.20210325.svn30357-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913487" comment="texlive-2021.20210325-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913488" comment="texlive-a2ping-bin-2021.20210325.svn27321-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913489" comment="texlive-accfonts-bin-2021.20210325.svn12688-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913490" comment="texlive-adhocfilelist-bin-2021.20210325.svn28038-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913491" comment="texlive-afm2pl-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913492" comment="texlive-albatross-bin-2021.20210325.svn57089-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913493" comment="texlive-aleph-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913494" comment="texlive-amstex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913495" comment="texlive-arara-bin-2021.20210325.svn29036-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913496" comment="texlive-asymptote-bin-2021.20210325.svn57890-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913497" comment="texlive-attachfile2-bin-2021.20210325.svn52909-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913498" comment="texlive-authorindex-bin-2021.20210325.svn18790-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913499" comment="texlive-autosp-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913500" comment="texlive-axodraw2-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913501" comment="texlive-bib2gls-bin-2021.20210325.svn45266-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913502" comment="texlive-biber-bin-2021.20210325.svn57273-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913503" comment="texlive-bibexport-bin-2021.20210325.svn16219-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913504" comment="texlive-bibtex-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913505" comment="texlive-bibtex8-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913506" comment="texlive-bibtexu-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913507" comment="texlive-bin-devel-2021.20210325-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913508" comment="texlive-bundledoc-bin-2021.20210325.svn17794-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913509" comment="texlive-cachepic-bin-2021.20210325.svn15543-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913510" comment="texlive-checkcites-bin-2021.20210325.svn25623-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913511" comment="texlive-checklistings-bin-2021.20210325.svn38300-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913512" comment="texlive-chklref-bin-2021.20210325.svn52631-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913513" comment="texlive-chktex-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913514" comment="texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913515" comment="texlive-cjkutils-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913516" comment="texlive-clojure-pamphlet-bin-2021.20210325.svn51944-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913517" comment="texlive-cluttex-bin-2021.20210325.svn48871-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913518" comment="texlive-context-bin-2021.20210325.svn34112-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913519" comment="texlive-convbkmk-bin-2021.20210325.svn30408-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913520" comment="texlive-crossrefware-bin-2021.20210325.svn45927-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913521" comment="texlive-cslatex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913522" comment="texlive-csplain-bin-2021.20210325.svn50528-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913523" comment="texlive-ctan-o-mat-bin-2021.20210325.svn46996-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913524" comment="texlive-ctanbib-bin-2021.20210325.svn48478-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913525" comment="texlive-ctanify-bin-2021.20210325.svn24061-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913526" comment="texlive-ctanupload-bin-2021.20210325.svn23866-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913527" comment="texlive-ctie-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913528" comment="texlive-cweb-bin-2021.20210325.svn58136-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913529" comment="texlive-cyrillic-bin-bin-2021.20210325.svn53554-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913530" comment="texlive-de-macro-bin-2021.20210325.svn17399-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913531" comment="texlive-detex-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913532" comment="texlive-diadia-bin-2021.20210325.svn37645-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913533" comment="texlive-dosepsbin-bin-2021.20210325.svn24759-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913534" comment="texlive-dtl-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913535" comment="texlive-dtxgen-bin-2021.20210325.svn29031-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913536" comment="texlive-dviasm-bin-2021.20210325.svn8329-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913537" comment="texlive-dvicopy-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913538" comment="texlive-dvidvi-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913539" comment="texlive-dviinfox-bin-2021.20210325.svn44515-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913540" comment="texlive-dviljk-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913541" comment="texlive-dviout-util-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913542" comment="texlive-dvipdfmx-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913543" comment="texlive-dvipng-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913544" comment="texlive-dvipos-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913545" comment="texlive-dvips-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913546" comment="texlive-dvisvgm-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913547" comment="texlive-eplain-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913548" comment="texlive-epspdf-bin-2021.20210325.svn29050-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913549" comment="texlive-epstopdf-bin-2021.20210325.svn18336-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913550" comment="texlive-exceltex-bin-2021.20210325.svn25860-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913551" comment="texlive-fig4latex-bin-2021.20210325.svn14752-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913552" comment="texlive-findhyph-bin-2021.20210325.svn14758-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913553" comment="texlive-fontinst-bin-2021.20210325.svn53554-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913554" comment="texlive-fontools-bin-2021.20210325.svn25997-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913555" comment="texlive-fontware-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913556" comment="texlive-fragmaster-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913557" comment="texlive-getmap-bin-2021.20210325.svn34971-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913558" comment="texlive-git-latexdiff-bin-2021.20210325.svn54732-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913559" comment="texlive-glossaries-bin-2021.20210325.svn37813-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913560" comment="texlive-gregoriotex-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913561" comment="texlive-gsftopk-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913562" comment="texlive-hyperxmp-bin-2021.20210325.svn56984-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913563" comment="texlive-jadetex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913564" comment="texlive-jfmutil-bin-2021.20210325.svn44835-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913565" comment="texlive-ketcindy-bin-2021.20210325.svn49033-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913566" comment="texlive-kotex-utils-bin-2021.20210325.svn32101-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913567" comment="texlive-kpathsea-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913568" comment="texlive-kpathsea-devel-6.3.3-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913569" comment="texlive-l3build-bin-2021.20210325.svn46894-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913570" comment="texlive-lacheck-bin-2021.20210325.svn53999-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913571" comment="texlive-latex-bin-bin-2021.20210325.svn54358-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913572" comment="texlive-latex-bin-dev-bin-2021.20210325.svn53999-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913573" comment="texlive-latex-git-log-bin-2021.20210325.svn30983-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913574" comment="texlive-latex-papersize-bin-2021.20210325.svn42296-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913575" comment="texlive-latex2man-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913576" comment="texlive-latex2nemeth-bin-2021.20210325.svn42300-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913577" comment="texlive-latexdiff-bin-2021.20210325.svn16420-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913578" comment="texlive-latexfileversion-bin-2021.20210325.svn25012-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913579" comment="texlive-latexindent-bin-2021.20210325.svn32150-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913580" comment="texlive-latexmk-bin-2021.20210325.svn10937-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913581" comment="texlive-latexpand-bin-2021.20210325.svn27025-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913582" comment="texlive-lcdftypetools-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913583" comment="texlive-light-latex-make-bin-2021.20210325.svn56352-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913584" comment="texlive-lilyglyphs-bin-2021.20210325.svn31696-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913585" comment="texlive-listbib-bin-2021.20210325.svn26126-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913586" comment="texlive-listings-ext-bin-2021.20210325.svn15093-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913587" comment="texlive-lollipop-bin-2021.20210325.svn41465-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913588" comment="texlive-ltxfileinfo-bin-2021.20210325.svn29005-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913589" comment="texlive-ltximg-bin-2021.20210325.svn32346-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913590" comment="texlive-luahbtex-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913591" comment="texlive-luajittex-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913592" comment="texlive-luaotfload-bin-2021.20210325.svn34647-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913593" comment="texlive-luatex-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913594" comment="texlive-lwarp-bin-2021.20210325.svn43292-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913595" comment="texlive-m-tx-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913596" comment="texlive-make4ht-bin-2021.20210325.svn37750-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913597" comment="texlive-makedtx-bin-2021.20210325.svn38769-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913598" comment="texlive-makeindex-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913599" comment="texlive-match_parens-bin-2021.20210325.svn23500-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913600" comment="texlive-mathspic-bin-2021.20210325.svn23661-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913601" comment="texlive-metafont-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913602" comment="texlive-metapost-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913603" comment="texlive-mex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913604" comment="texlive-mf2pt1-bin-2021.20210325.svn23406-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913605" comment="texlive-mflua-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913606" comment="texlive-mfware-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913607" comment="texlive-mkgrkindex-bin-2021.20210325.svn14428-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913608" comment="texlive-mkjobtexmf-bin-2021.20210325.svn8457-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913609" comment="texlive-mkpic-bin-2021.20210325.svn33688-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913610" comment="texlive-mltex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913611" comment="texlive-mptopdf-bin-2021.20210325.svn18674-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913612" comment="texlive-multibibliography-bin-2021.20210325.svn30534-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913613" comment="texlive-musixtex-bin-2021.20210325.svn37026-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913614" comment="texlive-musixtnt-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913615" comment="texlive-omegaware-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913616" comment="texlive-optex-bin-2021.20210325.svn53804-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913617" comment="texlive-patgen-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913618" comment="texlive-pax-bin-2021.20210325.svn10843-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913619" comment="texlive-pdfbook2-bin-2021.20210325.svn37537-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913620" comment="texlive-pdfcrop-bin-2021.20210325.svn14387-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913621" comment="texlive-pdfjam-bin-2021.20210325.svn52858-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913622" comment="texlive-pdflatexpicscale-bin-2021.20210325.svn41779-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913623" comment="texlive-pdftex-bin-2021.20210325.svn58535-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913624" comment="texlive-pdftex-quiet-bin-2021.20210325.svn49140-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913625" comment="texlive-pdftosrc-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913626" comment="texlive-pdfxup-bin-2021.20210325.svn40690-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913627" comment="texlive-pedigree-perl-bin-2021.20210325.svn25962-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913628" comment="texlive-perltex-bin-2021.20210325.svn16181-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913629" comment="texlive-petri-nets-bin-2021.20210325.svn39165-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913630" comment="texlive-pfarrei-bin-2021.20210325.svn29348-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913631" comment="texlive-pkfix-bin-2021.20210325.svn13364-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913632" comment="texlive-pkfix-helper-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913633" comment="texlive-platex-bin-2021.20210325.svn52800-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913634" comment="texlive-pmx-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913635" comment="texlive-pmxchords-bin-2021.20210325.svn32405-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913636" comment="texlive-ps2eps-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913637" comment="texlive-ps2pk-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913638" comment="texlive-pst-pdf-bin-2021.20210325.svn7838-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913639" comment="texlive-pst2pdf-bin-2021.20210325.svn29333-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913640" comment="texlive-ptex-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913641" comment="texlive-ptex-fontmaps-bin-2021.20210325.svn44206-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913642" comment="texlive-ptex2pdf-bin-2021.20210325.svn29335-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913643" comment="texlive-ptexenc-devel-1.3.9-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913644" comment="texlive-purifyeps-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913645" comment="texlive-pygmentex-bin-2021.20210325.svn34996-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913646" comment="texlive-pythontex-bin-2021.20210325.svn31638-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913647" comment="texlive-rubik-bin-2021.20210325.svn32919-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913648" comment="texlive-scripts-bin-2021.20210325.svn55172-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913649" comment="texlive-scripts-extra-bin-2021.20210325.svn53577-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913650" comment="texlive-seetexk-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913651" comment="texlive-spix-bin-2021.20210325.svn55933-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913652" comment="texlive-splitindex-bin-2021.20210325.svn29688-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913653" comment="texlive-srcredact-bin-2021.20210325.svn38710-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913654" comment="texlive-sty2dtx-bin-2021.20210325.svn21215-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913655" comment="texlive-svn-multi-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913656" comment="texlive-synctex-bin-2021.20210325.svn58136-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913657" comment="texlive-synctex-devel-1.21-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913658" comment="texlive-tex-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913659" comment="texlive-tex4ebook-bin-2021.20210325.svn37771-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913660" comment="texlive-tex4ht-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913661" comment="texlive-texcount-bin-2021.20210325.svn13013-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913662" comment="texlive-texdef-bin-2021.20210325.svn45011-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913663" comment="texlive-texdiff-bin-2021.20210325.svn15506-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913664" comment="texlive-texdirflatten-bin-2021.20210325.svn12782-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913665" comment="texlive-texdoc-bin-2021.20210325.svn47948-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913666" comment="texlive-texdoctk-bin-2021.20210325.svn29741-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913667" comment="texlive-texfot-bin-2021.20210325.svn33155-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913668" comment="texlive-texliveonfly-bin-2021.20210325.svn24062-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913669" comment="texlive-texloganalyser-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913670" comment="texlive-texlua-devel-5.3.6-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913671" comment="texlive-texluajit-devel-2.1.0beta3-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913672" comment="texlive-texosquery-bin-2021.20210325.svn43596-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913673" comment="texlive-texplate-bin-2021.20210325.svn53444-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913674" comment="texlive-texsis-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913675" comment="texlive-texware-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913676" comment="texlive-thumbpdf-bin-2021.20210325.svn6898-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913677" comment="texlive-tie-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913678" comment="texlive-tikztosvg-bin-2021.20210325.svn55132-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913679" comment="texlive-tpic2pdftex-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913680" comment="texlive-ttfutils-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913681" comment="texlive-typeoutfileinfo-bin-2021.20210325.svn25648-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913682" comment="texlive-ulqda-bin-2021.20210325.svn13663-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913683" comment="texlive-uplatex-bin-2021.20210325.svn52800-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913684" comment="texlive-uptex-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913685" comment="texlive-urlbst-bin-2021.20210325.svn23262-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913686" comment="texlive-velthuis-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913687" comment="texlive-vlna-bin-2021.20210325.svn50281-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913688" comment="texlive-vpe-bin-2021.20210325.svn6897-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913689" comment="texlive-web-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913690" comment="texlive-webquiz-bin-2021.20210325.svn50419-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913691" comment="texlive-wordcount-bin-2021.20210325.svn46165-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913692" comment="texlive-xdvi-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913693" comment="texlive-xelatex-dev-bin-2021.20210325.svn53999-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913694" comment="texlive-xetex-bin-2021.20210325.svn58378-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913695" comment="texlive-xindex-bin-2021.20210325.svn49312-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913696" comment="texlive-xml2pmx-bin-2021.20210325.svn57878-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913697" comment="texlive-xmltex-bin-2021.20210325.svn3006-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913698" comment="texlive-xpdfopen-bin-2021.20210325.svn52917-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913699" comment="texlive-yplan-bin-2021.20210325.svn34398-76.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249753" version="1" class="patch">
	<metadata>
		<title>texlive-collection-basic-2021.185.svn56569-52.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016/" source="CVE"/>
		<reference ref_id="CVE-2020-8017" ref_url="https://www.suse.com/security/cve/CVE-2020-8017/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-collection-basic-2021.185.svn56569-52.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8016">CVE-2020-8016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8017/">CVE-2020-8017 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8017">CVE-2020-8017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913700" comment="texlive-collection-basic-2021.185.svn56569-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913701" comment="texlive-collection-bibtexextra-2021.185.svn58437-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913702" comment="texlive-collection-binextra-2021.185.svn56352-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913703" comment="texlive-collection-context-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913704" comment="texlive-collection-fontsextra-2021.185.svn58253-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913705" comment="texlive-collection-fontsrecommended-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913706" comment="texlive-collection-fontutils-2021.185.svn57089-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913707" comment="texlive-collection-formatsextra-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913708" comment="texlive-collection-games-2021.185.svn56623-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913709" comment="texlive-collection-humanities-2021.185.svn56575-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913710" comment="texlive-collection-langarabic-2021.185.svn56215-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913711" comment="texlive-collection-langchinese-2021.185.svn56196-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913712" comment="texlive-collection-langcjk-2021.185.svn54191-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913713" comment="texlive-collection-langcyrillic-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913714" comment="texlive-collection-langczechslovak-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913715" comment="texlive-collection-langenglish-2021.185.svn58290-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913716" comment="texlive-collection-langeuropean-2021.185.svn58626-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913717" comment="texlive-collection-langfrench-2021.185.svn57491-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913718" comment="texlive-collection-langgerman-2021.185.svn55706-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913719" comment="texlive-collection-langgreek-2021.185.svn54139-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913720" comment="texlive-collection-langitalian-2021.185.svn55129-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913721" comment="texlive-collection-langjapanese-2021.185.svn58754-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913722" comment="texlive-collection-langkorean-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913723" comment="texlive-collection-langother-2021.185.svn57757-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913724" comment="texlive-collection-langpolish-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913725" comment="texlive-collection-langportuguese-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913726" comment="texlive-collection-langspanish-2021.185.svn54141-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913727" comment="texlive-collection-latex-2021.185.svn57048-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913728" comment="texlive-collection-latexextra-2021.185.svn58593-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913729" comment="texlive-collection-latexrecommended-2021.185.svn57862-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913730" comment="texlive-collection-luatex-2021.185.svn58124-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913731" comment="texlive-collection-mathscience-2021.185.svn57759-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913732" comment="texlive-collection-metapost-2021.185.svn50293-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913733" comment="texlive-collection-music-2021.185.svn57878-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913734" comment="texlive-collection-pictures-2021.185.svn58759-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913735" comment="texlive-collection-plaingeneric-2021.185.svn56496-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913736" comment="texlive-collection-pstricks-2021.185.svn54455-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913737" comment="texlive-collection-publishers-2021.185.svn57312-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913738" comment="texlive-collection-xetex-2021.185.svn58543-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913739" comment="texlive-devel-2021.185-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913740" comment="texlive-extratools-2021.185-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913741" comment="texlive-filesystem-2021.185-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913742" comment="texlive-scheme-basic-2021.185.svn54191-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913743" comment="texlive-scheme-context-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913744" comment="texlive-scheme-full-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913745" comment="texlive-scheme-gust-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913746" comment="texlive-scheme-infraonly-2021.185.svn54191-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913747" comment="texlive-scheme-medium-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913748" comment="texlive-scheme-minimal-2021.185.svn54191-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913749" comment="texlive-scheme-small-2021.185.svn54191-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913750" comment="texlive-scheme-tetex-2021.185.svn54074-52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913751" comment="texlive-updmap-map-2021.185.svn54495-52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249754" version="1" class="patch">
	<metadata>
		<title>texlive-12many-2021.186.0.0.3svn15878-47.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-12many-2021.186.0.0.3svn15878-47.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009913752" comment="texlive-12many-2021.186.0.0.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913753" comment="texlive-12many-doc-2021.186.0.0.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913754" comment="texlive-2up-2021.186.1.3asvn55076-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913755" comment="texlive-2up-doc-2021.186.1.3asvn55076-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913756" comment="texlive-Asana-Math-2021.186.0.000.958svn50999-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913757" comment="texlive-Asana-Math-doc-2021.186.0.000.958svn50999-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913758" comment="texlive-Asana-Math-fonts-2021.186.0.000.958svn50999-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913759" comment="texlive-ESIEEcv-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913760" comment="texlive-ESIEEcv-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913761" comment="texlive-GS1-2021.186.22svn44822-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913762" comment="texlive-GS1-doc-2021.186.22svn44822-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913763" comment="texlive-HA-prosper-2021.186.4.21svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913764" comment="texlive-HA-prosper-doc-2021.186.4.21svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913765" comment="texlive-IEEEconf-2021.186.1.4svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913766" comment="texlive-IEEEconf-doc-2021.186.1.4svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913767" comment="texlive-IEEEtran-2021.186.1.8bsvn51065-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913768" comment="texlive-IEEEtran-doc-2021.186.1.8bsvn51065-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913769" comment="texlive-MemoirChapStyles-2021.186.1.7esvn25918-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913770" comment="texlive-SIstyle-2021.186.2.3asvn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913771" comment="texlive-SIstyle-doc-2021.186.2.3asvn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913772" comment="texlive-SIunits-2021.186.1.36svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913773" comment="texlive-SIunits-doc-2021.186.1.36svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913774" comment="texlive-Tabbing-2021.186.svn17022-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913775" comment="texlive-Tabbing-doc-2021.186.svn17022-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913776" comment="texlive-Type1fonts-2021.186.2.14svn19603-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913777" comment="texlive-a0poster-2021.186.1.22bsvn54071-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913778" comment="texlive-a0poster-doc-2021.186.1.22bsvn54071-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913779" comment="texlive-a2ping-2021.186.2.84psvn52964-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913780" comment="texlive-a2ping-doc-2021.186.2.84psvn52964-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913781" comment="texlive-a4wide-2021.186.svn20943-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913782" comment="texlive-a4wide-doc-2021.186.svn20943-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913783" comment="texlive-a5comb-2021.186.4svn17020-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913784" comment="texlive-a5comb-doc-2021.186.4svn17020-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913785" comment="texlive-aaai-named-2021.186.svn52470-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913786" comment="texlive-aalok-2021.186.0.0.2svn57728-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913787" comment="texlive-aalok-doc-2021.186.0.0.2svn57728-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913788" comment="texlive-aastex-2021.186.6.3.1svn58057-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913789" comment="texlive-aastex-doc-2021.186.6.3.1svn58057-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913790" comment="texlive-abbr-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913791" comment="texlive-abbr-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913792" comment="texlive-abc-2021.186.2.0bsvn41157-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913793" comment="texlive-abc-doc-2021.186.2.0bsvn41157-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913794" comment="texlive-abnt-2021.186.svn55471-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913795" comment="texlive-abnt-doc-2021.186.svn55471-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913796" comment="texlive-abntex2-2021.186.1.9.7svn49248-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913797" comment="texlive-abntex2-doc-2021.186.1.9.7svn49248-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913798" comment="texlive-abraces-2021.186.2.0svn58761-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913799" comment="texlive-abraces-doc-2021.186.2.0svn58761-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913800" comment="texlive-abstract-2021.186.1.2asvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913801" comment="texlive-abstract-doc-2021.186.1.2asvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913802" comment="texlive-abstyles-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913803" comment="texlive-abstyles-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913804" comment="texlive-academicons-2021.186.1.9.0svn56119-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913805" comment="texlive-academicons-doc-2021.186.1.9.0svn56119-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913806" comment="texlive-academicons-fonts-2021.186.1.9.0svn56119-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913807" comment="texlive-accanthis-2021.186.svn32089-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913808" comment="texlive-accanthis-doc-2021.186.svn32089-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913809" comment="texlive-accanthis-fonts-2021.186.svn32089-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913810" comment="texlive-accents-2021.186.1.4svn51497-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913811" comment="texlive-accents-doc-2021.186.1.4svn51497-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913812" comment="texlive-accessibility-2021.186.2.0.3svn55777-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913813" comment="texlive-accessibility-doc-2021.186.2.0.3svn55777-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913814" comment="texlive-accfonts-2021.186.0.0.25svn18835-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913815" comment="texlive-accfonts-doc-2021.186.0.0.25svn18835-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913816" comment="texlive-accsupp-2021.186.0.0.6svn53052-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913817" comment="texlive-accsupp-doc-2021.186.0.0.6svn53052-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913818" comment="texlive-achemso-2021.186.3.13csvn57479-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913819" comment="texlive-achemso-doc-2021.186.3.13csvn57479-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913820" comment="texlive-acmart-2021.186.1.75svn56946-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913821" comment="texlive-acmart-doc-2021.186.1.75svn56946-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913822" comment="texlive-acmconf-2021.186.1.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913823" comment="texlive-acmconf-doc-2021.186.1.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913824" comment="texlive-acro-2021.186.3.5svn57447-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913825" comment="texlive-acro-doc-2021.186.3.5svn57447-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913826" comment="texlive-acronym-2021.186.1.47svn54758-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913827" comment="texlive-acronym-doc-2021.186.1.47svn54758-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913828" comment="texlive-acroterm-2021.186.0.0.1svn20498-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913829" comment="texlive-acroterm-doc-2021.186.0.0.1svn20498-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913830" comment="texlive-active-conf-2021.186.0.0.3asvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913831" comment="texlive-active-conf-doc-2021.186.0.0.3asvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913832" comment="texlive-actuarialangle-2021.186.2.1svn51376-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913833" comment="texlive-actuarialangle-doc-2021.186.2.1svn51376-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913834" comment="texlive-actuarialsymbol-2021.186.1.1svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913835" comment="texlive-actuarialsymbol-doc-2021.186.1.1svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913836" comment="texlive-addfont-2021.186.1.1svn58559-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913837" comment="texlive-addfont-doc-2021.186.1.1svn58559-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913838" comment="texlive-addliga-2021.186.1.0svn50912-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913839" comment="texlive-addliga-doc-2021.186.1.0svn50912-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913840" comment="texlive-addlines-2021.186.0.0.3svn49326-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913841" comment="texlive-addlines-doc-2021.186.0.0.3svn49326-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913842" comment="texlive-adfathesis-2021.186.2.42svn26048-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913843" comment="texlive-adfathesis-doc-2021.186.2.42svn26048-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913844" comment="texlive-adforn-2021.186.1.1bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913845" comment="texlive-adforn-doc-2021.186.1.1bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913846" comment="texlive-adforn-fonts-2021.186.1.1bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913847" comment="texlive-adfsymbols-2021.186.1.2bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913848" comment="texlive-adfsymbols-doc-2021.186.1.2bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913849" comment="texlive-adfsymbols-fonts-2021.186.1.2bsvn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913850" comment="texlive-adhocfilelist-2021.186.svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913851" comment="texlive-adhocfilelist-doc-2021.186.svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913852" comment="texlive-adigraph-2021.186.1.7.1svn49862-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913853" comment="texlive-adigraph-doc-2021.186.1.7.1svn49862-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913854" comment="texlive-adjmulticol-2021.186.1.2svn54157-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913855" comment="texlive-adjmulticol-doc-2021.186.1.2svn54157-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913856" comment="texlive-adjustbox-2021.186.1.3svn56291-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913857" comment="texlive-adjustbox-doc-2021.186.1.3svn56291-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913858" comment="texlive-adobemapping-2021.186.svn51787-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913859" comment="texlive-adrconv-2021.186.1.4svn46817-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913860" comment="texlive-adrconv-doc-2021.186.1.4svn46817-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913861" comment="texlive-adtrees-2021.186.1.1svn51618-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913862" comment="texlive-adtrees-doc-2021.186.1.1svn51618-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913863" comment="texlive-advdate-2021.186.svn20538-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913864" comment="texlive-advdate-doc-2021.186.svn20538-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913865" comment="texlive-ae-2021.186.1.4svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913866" comment="texlive-ae-doc-2021.186.1.4svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913867" comment="texlive-aeguill-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913868" comment="texlive-aeguill-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913869" comment="texlive-aesupp-2021.186.1svn58253-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913870" comment="texlive-aesupp-doc-2021.186.1svn58253-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913871" comment="texlive-aesupp-fonts-2021.186.1svn58253-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913872" comment="texlive-afm2pl-2021.186.svn54074-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913873" comment="texlive-afm2pl-doc-2021.186.svn54074-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913874" comment="texlive-afparticle-2021.186.1.3svn35900-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913875" comment="texlive-afparticle-doc-2021.186.1.3svn35900-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913876" comment="texlive-afthesis-2021.186.2.7svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913877" comment="texlive-afthesis-doc-2021.186.2.7svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913878" comment="texlive-aguplus-2021.186.1.6bsvn17156-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913879" comment="texlive-aguplus-doc-2021.186.1.6bsvn17156-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913880" comment="texlive-aiaa-2021.186.3.6svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913881" comment="texlive-aiaa-doc-2021.186.3.6svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913882" comment="texlive-aichej-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913883" comment="texlive-ajl-2021.186.svn34016-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913884" comment="texlive-akktex-2021.186.0.0.3.2svn26055-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913885" comment="texlive-akktex-doc-2021.186.0.0.3.2svn26055-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913886" comment="texlive-akletter-2021.186.1.5isvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913887" comment="texlive-akletter-doc-2021.186.1.5isvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913888" comment="texlive-akshar-2021.186.0.0.2svn56277-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913889" comment="texlive-akshar-doc-2021.186.0.0.2svn56277-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913890" comment="texlive-albatross-2021.186.0.0.3.0svn57416-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913891" comment="texlive-albatross-doc-2021.186.0.0.3.0svn57416-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913892" comment="texlive-alegreya-2021.186.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913893" comment="texlive-alegreya-doc-2021.186.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913894" comment="texlive-alegreya-fonts-2021.186.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913895" comment="texlive-aleph-2021.186.svn57972-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913896" comment="texlive-alertmessage-2021.186.1.1svn38055-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913897" comment="texlive-alertmessage-doc-2021.186.1.1svn38055-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913898" comment="texlive-alfaslabone-2021.186.0.0.0.1svn57452-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913899" comment="texlive-alfaslabone-doc-2021.186.0.0.0.1svn57452-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913900" comment="texlive-alfaslabone-fonts-2021.186.0.0.0.1svn57452-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913901" comment="texlive-alg-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913902" comment="texlive-alg-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913903" comment="texlive-algobox-2021.186.1.3svn52204-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913904" comment="texlive-algobox-doc-2021.186.1.3svn52204-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913905" comment="texlive-algolrevived-2021.186.1.052svn56864-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913906" comment="texlive-algolrevived-doc-2021.186.1.052svn56864-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913907" comment="texlive-algolrevived-fonts-2021.186.1.052svn56864-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913908" comment="texlive-algorithm2e-2021.186.5.2svn44846-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913909" comment="texlive-algorithm2e-doc-2021.186.5.2svn44846-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913910" comment="texlive-algorithmicx-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913911" comment="texlive-algorithmicx-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913912" comment="texlive-algorithms-2021.186.0.0.1svn42428-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913913" comment="texlive-algorithms-doc-2021.186.0.0.1svn42428-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913914" comment="texlive-algpseudocodex-2021.186.1.0svn56125-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913915" comment="texlive-algpseudocodex-doc-2021.186.1.0svn56125-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913916" comment="texlive-algxpar-2021.186.0.0.91svn56006-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913917" comment="texlive-algxpar-doc-2021.186.0.0.91svn56006-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913918" comment="texlive-aligned-overset-2021.186.0.0.1.0svn47290-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913919" comment="texlive-aligned-overset-doc-2021.186.0.0.1.0svn47290-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913920" comment="texlive-alkalami-2021.186.1.000svn44497-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913921" comment="texlive-alkalami-doc-2021.186.1.000svn44497-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913922" comment="texlive-alkalami-fonts-2021.186.1.000svn44497-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913923" comment="texlive-allrunes-2021.186.2.1.1svn42221-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913924" comment="texlive-allrunes-doc-2021.186.2.1.1svn42221-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913925" comment="texlive-allrunes-fonts-2021.186.2.1.1svn42221-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913926" comment="texlive-almendra-2021.186.svn56035-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913927" comment="texlive-almendra-doc-2021.186.svn56035-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913928" comment="texlive-almendra-fonts-2021.186.svn56035-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913929" comment="texlive-almfixed-2021.186.0.0.92svn35065-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913930" comment="texlive-almfixed-doc-2021.186.0.0.92svn35065-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913931" comment="texlive-almfixed-fonts-2021.186.0.0.92svn35065-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913932" comment="texlive-alnumsec-2021.186.0.0.03svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913933" comment="texlive-alnumsec-doc-2021.186.0.0.03svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913934" comment="texlive-alpha-persian-2021.186.1.3svn50316-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913935" comment="texlive-alpha-persian-doc-2021.186.1.3svn50316-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913936" comment="texlive-alphalph-2021.186.2.6svn53087-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913937" comment="texlive-alphalph-doc-2021.186.2.6svn53087-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913938" comment="texlive-altfont-2021.186.1.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913939" comment="texlive-altfont-doc-2021.186.1.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913940" comment="texlive-ametsoc-2021.186.4.3.2svn36030-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913941" comment="texlive-ametsoc-doc-2021.186.4.3.2svn36030-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913942" comment="texlive-amiri-2021.186.0.0.113svn55403-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913943" comment="texlive-amiri-doc-2021.186.0.0.113svn55403-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913944" comment="texlive-amiri-fonts-2021.186.0.0.113svn55403-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913945" comment="texlive-amiweb2c-guide-2021.186.1.0svn56878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913946" comment="texlive-amsaddr-2021.186.1.1svn29630-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913947" comment="texlive-amsaddr-doc-2021.186.1.1svn29630-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913948" comment="texlive-amscdx-2021.186.2.2xsvn51532-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913949" comment="texlive-amscdx-doc-2021.186.2.2xsvn51532-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913950" comment="texlive-amscls-2021.186.2.20.6svn55378-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913951" comment="texlive-amscls-doc-2021.186.svn46110-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913952" comment="texlive-amsfonts-2021.186.3.04svn29208-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913953" comment="texlive-amsfonts-doc-2021.186.3.04svn29208-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913954" comment="texlive-amsfonts-fonts-2021.186.3.04svn29208-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913955" comment="texlive-amslatex-primer-2021.186.2.3svn28980-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913956" comment="texlive-amsldoc-it-2021.186.svn45662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913957" comment="texlive-amsldoc-vn-2021.186.2.0svn21855-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913958" comment="texlive-amsmath-2021.186.svn56514-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913959" comment="texlive-amsmath-doc-2021.186.svn56514-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913960" comment="texlive-amsmath-it-2021.186.svn22930-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913961" comment="texlive-amsrefs-2021.186.2.14svn30646-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913962" comment="texlive-amsrefs-doc-2021.186.2.14svn30646-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913963" comment="texlive-amstex-2021.186.svn57972-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913964" comment="texlive-amstex-doc-2021.186.svn57972-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913965" comment="texlive-amsthdoc-it-2021.186.svn45662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913966" comment="texlive-animate-2021.186.svn56583-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913967" comment="texlive-animate-doc-2021.186.svn56583-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913968" comment="texlive-annee-scolaire-2021.186.1.6svn55988-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913969" comment="texlive-annee-scolaire-doc-2021.186.1.6svn55988-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913970" comment="texlive-annotate-2021.186.svn52824-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913971" comment="texlive-anonchap-2021.186.1.1asvn17049-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913972" comment="texlive-anonchap-doc-2021.186.1.1asvn17049-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913973" comment="texlive-anonymous-acm-2021.186.1.0svn55121-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913974" comment="texlive-anonymous-acm-doc-2021.186.1.0svn55121-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913975" comment="texlive-anonymouspro-2021.186.2.2svn51631-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913976" comment="texlive-anonymouspro-doc-2021.186.2.2svn51631-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913977" comment="texlive-anonymouspro-fonts-2021.186.2.2svn51631-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913978" comment="texlive-answers-2021.186.2.16svn35032-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913979" comment="texlive-answers-doc-2021.186.2.16svn35032-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913980" comment="texlive-antanilipsum-2021.186.0.0.8.1svn55250-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913981" comment="texlive-antanilipsum-doc-2021.186.0.0.8.1svn55250-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913982" comment="texlive-antiqua-2021.186.001.003svn24266-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913983" comment="texlive-antiqua-doc-2021.186.001.003svn24266-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913984" comment="texlive-antiqua-fonts-2021.186.001.003svn24266-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913985" comment="texlive-antomega-2021.186.0.0.8svn21933-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913986" comment="texlive-antomega-doc-2021.186.0.0.8svn21933-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913987" comment="texlive-antt-2021.186.2.08svn18651-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913988" comment="texlive-antt-doc-2021.186.2.08svn18651-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913989" comment="texlive-antt-fonts-2021.186.2.08svn18651-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913990" comment="texlive-anufinalexam-2021.186.svn26053-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913991" comment="texlive-anyfontsize-2021.186.svn17050-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913992" comment="texlive-anyfontsize-doc-2021.186.svn17050-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913993" comment="texlive-anysize-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913994" comment="texlive-anysize-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913995" comment="texlive-aobs-tikz-2021.186.1.0svn32662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913996" comment="texlive-aobs-tikz-doc-2021.186.1.0svn32662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913997" comment="texlive-aomart-2021.186.1.24svn56102-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913998" comment="texlive-aomart-doc-2021.186.1.24svn56102-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009913999" comment="texlive-apa-2021.186.1.3.4svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914000" comment="texlive-apa-doc-2021.186.1.3.4svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914001" comment="texlive-apa6-2021.186.2.34svn53406-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914002" comment="texlive-apa6-doc-2021.186.2.34svn53406-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914003" comment="texlive-apa6e-2021.186.0.0.3svn23350-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914004" comment="texlive-apa6e-doc-2021.186.0.0.3svn23350-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914005" comment="texlive-apa7-2021.186.2.10svn58121-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914006" comment="texlive-apa7-doc-2021.186.2.10svn58121-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914007" comment="texlive-apacite-2021.186.6.03svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914008" comment="texlive-apacite-doc-2021.186.6.03svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914009" comment="texlive-apalike-german-2021.186.svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914010" comment="texlive-apalike-german-doc-2021.186.svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914011" comment="texlive-apalike2-2021.186.svn54080-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914012" comment="texlive-apnum-2021.186.1.7svn47510-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914013" comment="texlive-apnum-doc-2021.186.1.7svn47510-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914014" comment="texlive-appendix-2021.186.1.2csvn53718-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914015" comment="texlive-appendix-doc-2021.186.1.2csvn53718-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914016" comment="texlive-appendixnumberbeamer-2021.186.1.2svn46317-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914017" comment="texlive-appendixnumberbeamer-doc-2021.186.1.2svn46317-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914018" comment="texlive-apprendre-a-programmer-en-tex-2021.186.svn57179-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914019" comment="texlive-apprends-latex-2021.186.4.02svn19306-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914020" comment="texlive-apptools-2021.186.1.0svn28400-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914021" comment="texlive-apptools-doc-2021.186.1.0svn28400-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914022" comment="texlive-apxproof-2021.186.1.2.1svn56673-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914023" comment="texlive-apxproof-doc-2021.186.1.2.1svn56673-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914024" comment="texlive-arabi-2021.186.1.1svn44662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914025" comment="texlive-arabi-add-2021.186.1.0svn37709-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914026" comment="texlive-arabi-add-doc-2021.186.1.0svn37709-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914027" comment="texlive-arabi-doc-2021.186.1.1svn44662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914028" comment="texlive-arabi-fonts-2021.186.1.1svn44662-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914029" comment="texlive-arabicfront-2021.186.1.1svn51474-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914030" comment="texlive-arabicfront-doc-2021.186.1.1svn51474-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914031" comment="texlive-arabluatex-2021.186.1.20svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914032" comment="texlive-arabluatex-doc-2021.186.1.20svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914033" comment="texlive-arabtex-2021.186.3.17svn25711-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914034" comment="texlive-arabtex-doc-2021.186.3.17svn25711-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914035" comment="texlive-arabtex-fonts-2021.186.3.17svn25711-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914036" comment="texlive-arabxetex-2021.186.1.2.1svn38299-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914037" comment="texlive-arabxetex-doc-2021.186.1.2.1svn38299-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914038" comment="texlive-aramaic-serto-2021.186.1.0svn30042-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914039" comment="texlive-aramaic-serto-doc-2021.186.1.0svn30042-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914040" comment="texlive-aramaic-serto-fonts-2021.186.1.0svn30042-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914041" comment="texlive-arara-2021.186.6.1.0svn58764-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914042" comment="texlive-arara-doc-2021.186.6.1.0svn58764-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914043" comment="texlive-archaeologie-2021.186.2.4.5svn57090-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914044" comment="texlive-archaeologie-doc-2021.186.2.4.5svn57090-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914045" comment="texlive-archaic-2021.186.svn38005-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914046" comment="texlive-archaic-doc-2021.186.svn38005-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914047" comment="texlive-archaic-fonts-2021.186.svn38005-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914048" comment="texlive-archivo-2021.186.0.0.0.2svn57283-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914049" comment="texlive-archivo-doc-2021.186.0.0.0.2svn57283-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914050" comment="texlive-archivo-fonts-2021.186.0.0.0.2svn57283-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914051" comment="texlive-arcs-2021.186.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914052" comment="texlive-arcs-doc-2021.186.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914053" comment="texlive-arev-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914054" comment="texlive-arev-doc-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914055" comment="texlive-arev-fonts-2021.186.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914056" comment="texlive-arimo-2021.186.svn42880-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914057" comment="texlive-arimo-doc-2021.186.svn42880-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914058" comment="texlive-arimo-fonts-2021.186.svn42880-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914059" comment="texlive-armtex-2021.186.3.0_beta3svn33894-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914060" comment="texlive-armtex-doc-2021.186.3.0_beta3svn33894-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914061" comment="texlive-armtex-fonts-2021.186.3.0_beta3svn33894-47.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249755" version="1" class="patch">
	<metadata>
		<title>texlive-around-the-bend-2021.186.svn15878-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-around-the-bend-2021.186.svn15878-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009914062" comment="texlive-around-the-bend-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914063" comment="texlive-arphic-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914064" comment="texlive-arphic-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914065" comment="texlive-arphic-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914066" comment="texlive-arphic-ttf-2021.186.svn42675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914067" comment="texlive-arphic-ttf-doc-2021.186.svn42675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914068" comment="texlive-arphic-ttf-fonts-2021.186.svn42675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914069" comment="texlive-arraycols-2021.186.1.1svn56997-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914070" comment="texlive-arraycols-doc-2021.186.1.1svn56997-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914071" comment="texlive-arrayjobx-2021.186.1.04svn18125-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914072" comment="texlive-arrayjobx-doc-2021.186.1.04svn18125-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914073" comment="texlive-arraysort-2021.186.1.0svn31576-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914074" comment="texlive-arraysort-doc-2021.186.1.0svn31576-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914075" comment="texlive-arsclassica-2021.186.svn45656-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914076" comment="texlive-arsclassica-doc-2021.186.svn45656-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914077" comment="texlive-articleingud-2021.186.0.0.3svn38741-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914078" comment="texlive-articleingud-doc-2021.186.0.0.3svn38741-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914079" comment="texlive-arvo-2021.186.svn57213-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914080" comment="texlive-arvo-doc-2021.186.svn57213-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914081" comment="texlive-arvo-fonts-2021.186.svn57213-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914082" comment="texlive-arydshln-2021.186.1.76svn50084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914083" comment="texlive-arydshln-doc-2021.186.1.76svn50084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914084" comment="texlive-asaetr-2021.186.1.0asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914085" comment="texlive-asaetr-doc-2021.186.1.0asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914086" comment="texlive-asapsym-2021.186.1.0svn40201-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914087" comment="texlive-asapsym-doc-2021.186.1.0svn40201-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914088" comment="texlive-asapsym-fonts-2021.186.1.0svn40201-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914089" comment="texlive-ascelike-2021.186.2.3svn29129-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914090" comment="texlive-ascelike-doc-2021.186.2.3svn29129-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914091" comment="texlive-ascii-chart-2021.186.svn20536-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914092" comment="texlive-ascii-font-2021.186.2.0svn29989-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914093" comment="texlive-ascii-font-doc-2021.186.2.0svn29989-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914094" comment="texlive-ascii-font-fonts-2021.186.2.0svn29989-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914095" comment="texlive-asciilist-2021.186.2.2bsvn49060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914096" comment="texlive-asciilist-doc-2021.186.2.2bsvn49060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914097" comment="texlive-ascmac-2021.186.2.1svn53411-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914098" comment="texlive-ascmac-doc-2021.186.2.1svn53411-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914099" comment="texlive-ascmac-fonts-2021.186.2.1svn53411-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914100" comment="texlive-askinclude-2021.186.2.7svn54725-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914101" comment="texlive-askinclude-doc-2021.186.2.7svn54725-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914102" comment="texlive-askmaps-2021.186.0.0.2svn56730-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914103" comment="texlive-askmaps-doc-2021.186.0.0.2svn56730-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914104" comment="texlive-asmeconf-2021.186.1.26svn57833-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914105" comment="texlive-asmeconf-doc-2021.186.1.26svn57833-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914106" comment="texlive-asmejour-2021.186.1.15svn57598-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914107" comment="texlive-asmejour-doc-2021.186.1.15svn57598-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914108" comment="texlive-aspectratio-2021.186.2.0svn25243-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914109" comment="texlive-aspectratio-doc-2021.186.2.0svn25243-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914110" comment="texlive-aspectratio-fonts-2021.186.2.0svn25243-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914111" comment="texlive-assignment-2021.186.svn20431-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914112" comment="texlive-assignment-doc-2021.186.svn20431-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914113" comment="texlive-assoccnt-2021.186.0.0.8svn38497-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914114" comment="texlive-assoccnt-doc-2021.186.0.0.8svn38497-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914115" comment="texlive-association-matrix-2021.186.1.0svn56759-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914116" comment="texlive-association-matrix-doc-2021.186.1.0svn56759-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914117" comment="texlive-astro-2021.186.2.20svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914118" comment="texlive-astro-doc-2021.186.2.20svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914119" comment="texlive-asyfig-2021.186.0.0.1csvn17512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914120" comment="texlive-asyfig-doc-2021.186.0.0.1csvn17512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914121" comment="texlive-asymptote-2021.186.2.70svn58569-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914122" comment="texlive-asymptote-by-example-zh-cn-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914123" comment="texlive-asymptote-doc-2021.186.2.70svn58569-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914124" comment="texlive-asymptote-faq-zh-cn-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914125" comment="texlive-asymptote-manual-zh-cn-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914126" comment="texlive-asypictureb-2021.186.0.0.3svn33490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914127" comment="texlive-asypictureb-doc-2021.186.0.0.3svn33490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914128" comment="texlive-atbegshi-2021.186.1.19svn53051-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914129" comment="texlive-atbegshi-doc-2021.186.1.19svn53051-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914130" comment="texlive-atenddvi-2021.186.1.5svn56922-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914131" comment="texlive-atenddvi-doc-2021.186.1.5svn56922-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914132" comment="texlive-atkinson-2021.186.svn57624-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914133" comment="texlive-atkinson-doc-2021.186.svn57624-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914134" comment="texlive-atkinson-fonts-2021.186.svn57624-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914135" comment="texlive-attachfile-2021.186.1.9svn42099-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914136" comment="texlive-attachfile-doc-2021.186.1.9svn42099-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914137" comment="texlive-attachfile2-2021.186.2.11svn57959-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914138" comment="texlive-attachfile2-doc-2021.186.2.11svn57959-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914139" comment="texlive-atveryend-2021.186.1.11svn53108-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914140" comment="texlive-atveryend-doc-2021.186.1.11svn53108-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914141" comment="texlive-aucklandthesis-2021.186.svn51323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914142" comment="texlive-aucklandthesis-doc-2021.186.svn51323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914143" comment="texlive-augie-2021.186.svn18948-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914144" comment="texlive-augie-doc-2021.186.svn18948-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914145" comment="texlive-augie-fonts-2021.186.svn18948-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914146" comment="texlive-auncial-new-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914147" comment="texlive-auncial-new-doc-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914148" comment="texlive-auncial-new-fonts-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914149" comment="texlive-aurical-2021.186.1.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914150" comment="texlive-aurical-doc-2021.186.1.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914151" comment="texlive-aurical-fonts-2021.186.1.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914152" comment="texlive-aurl-2021.186.svn41853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914153" comment="texlive-aurl-doc-2021.186.svn41853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914154" comment="texlive-authoraftertitle-2021.186.1.0svn55889-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914155" comment="texlive-authoraftertitle-doc-2021.186.1.0svn55889-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914156" comment="texlive-authorarchive-2021.186.1.1.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914157" comment="texlive-authorarchive-doc-2021.186.1.1.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914158" comment="texlive-authordate-2021.186.svn52564-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914159" comment="texlive-authordate-doc-2021.186.svn52564-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914160" comment="texlive-authorindex-2021.186.svn51757-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914161" comment="texlive-authorindex-doc-2021.186.svn51757-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914162" comment="texlive-auto-pst-pdf-2021.186.0.0.7svn56596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914163" comment="texlive-auto-pst-pdf-doc-2021.186.0.0.7svn56596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914164" comment="texlive-auto-pst-pdf-lua-2021.186.0.0.03svn54779-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914165" comment="texlive-auto-pst-pdf-lua-doc-2021.186.0.0.03svn54779-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914166" comment="texlive-autoaligne-2021.186.1.5svn56966-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914167" comment="texlive-autoaligne-doc-2021.186.1.5svn56966-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914168" comment="texlive-autoarea-2021.186.0.0.3asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914169" comment="texlive-autoarea-doc-2021.186.0.0.3asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914170" comment="texlive-autobreak-2021.186.0.0.3svn43337-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914171" comment="texlive-autobreak-doc-2021.186.0.0.3svn43337-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914172" comment="texlive-autofancyhdr-2021.186.0.0.1svn54049-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914173" comment="texlive-autofancyhdr-doc-2021.186.0.0.1svn54049-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914174" comment="texlive-automata-2021.186.0.0.3svn19717-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914175" comment="texlive-automata-doc-2021.186.0.0.3svn19717-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914176" comment="texlive-autonum-2021.186.0.0.3.11svn36084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914177" comment="texlive-autonum-doc-2021.186.0.0.3.11svn36084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914178" comment="texlive-autopdf-2021.186.1.1svn32377-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914179" comment="texlive-autopdf-doc-2021.186.1.1svn32377-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914180" comment="texlive-autosp-2021.186.svn58211-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914181" comment="texlive-auxhook-2021.186.1.6svn53173-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914182" comment="texlive-auxhook-doc-2021.186.1.6svn53173-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914183" comment="texlive-avantgar-2021.186.svn31835-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914184" comment="texlive-avantgar-fonts-2021.186.svn31835-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914185" comment="texlive-avremu-2021.186.0.0.1svn35373-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914186" comment="texlive-avremu-doc-2021.186.0.0.1svn35373-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914187" comment="texlive-awesomebox-2021.186.0.0.6svn57349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914188" comment="texlive-awesomebox-doc-2021.186.0.0.6svn57349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914189" comment="texlive-axessibility-2021.186.3.0svn57105-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914190" comment="texlive-axessibility-doc-2021.186.3.0svn57105-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914191" comment="texlive-axodraw2-2021.186.2.1.1csvn58155-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914192" comment="texlive-axodraw2-doc-2021.186.2.1.1csvn58155-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914193" comment="texlive-b1encoding-2021.186.1.0svn21271-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914194" comment="texlive-b1encoding-doc-2021.186.1.0svn21271-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914195" comment="texlive-babel-2021.186.3.56svn58684-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914196" comment="texlive-babel-albanian-2021.186.1.0dsvn57005-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914197" comment="texlive-babel-albanian-doc-2021.186.1.0dsvn57005-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914198" comment="texlive-babel-azerbaijani-2021.186.1.0asvn44197-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914199" comment="texlive-babel-azerbaijani-doc-2021.186.1.0asvn44197-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914200" comment="texlive-babel-basque-2021.186.1.0fsvn30256-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914201" comment="texlive-babel-basque-doc-2021.186.1.0fsvn30256-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914202" comment="texlive-babel-belarusian-2021.186.1.5svn49022-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914203" comment="texlive-babel-belarusian-doc-2021.186.1.5svn49022-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914204" comment="texlive-babel-bosnian-2021.186.1.1svn38174-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914205" comment="texlive-babel-bosnian-doc-2021.186.1.1svn38174-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914206" comment="texlive-babel-breton-2021.186.1.0hsvn30257-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914207" comment="texlive-babel-breton-doc-2021.186.1.0hsvn30257-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914208" comment="texlive-babel-bulgarian-2021.186.1.2gsvn31902-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914209" comment="texlive-babel-bulgarian-doc-2021.186.1.2gsvn31902-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914210" comment="texlive-babel-catalan-2021.186.2.2psvn30259-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914211" comment="texlive-babel-catalan-doc-2021.186.2.2psvn30259-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914212" comment="texlive-babel-croatian-2021.186.1.3lsvn35198-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914213" comment="texlive-babel-croatian-doc-2021.186.1.3lsvn35198-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914214" comment="texlive-babel-czech-2021.186.3.1asvn30261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914215" comment="texlive-babel-czech-doc-2021.186.3.1asvn30261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914216" comment="texlive-babel-danish-2021.186.1.3ssvn57642-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914217" comment="texlive-babel-danish-doc-2021.186.1.3ssvn57642-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914218" comment="texlive-babel-doc-2021.186.3.56svn58684-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914219" comment="texlive-babel-dutch-2021.186.3.8jsvn56827-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914220" comment="texlive-babel-dutch-doc-2021.186.3.8jsvn56827-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914221" comment="texlive-babel-english-2021.186.3.3rsvn44495-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914222" comment="texlive-babel-english-doc-2021.186.3.3rsvn44495-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914223" comment="texlive-babel-esperanto-2021.186.1.4tsvn30265-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914224" comment="texlive-babel-esperanto-doc-2021.186.1.4tsvn30265-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914225" comment="texlive-babel-estonian-2021.186.1.1asvn38064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914226" comment="texlive-babel-estonian-doc-2021.186.1.1asvn38064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914227" comment="texlive-babel-finnish-2021.186.1.3ssvn57643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914228" comment="texlive-babel-finnish-doc-2021.186.1.3ssvn57643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914229" comment="texlive-babel-french-2021.186.3.5lsvn56607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914230" comment="texlive-babel-french-doc-2021.186.3.5lsvn56607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914231" comment="texlive-babel-friulan-2021.186.1.3svn39861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914232" comment="texlive-babel-friulan-doc-2021.186.1.3svn39861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914233" comment="texlive-babel-galician-2021.186.4.3csvn30270-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914234" comment="texlive-babel-galician-doc-2021.186.4.3csvn30270-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914235" comment="texlive-babel-georgian-2021.186.2.2svn45864-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914236" comment="texlive-babel-georgian-doc-2021.186.2.2svn45864-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914237" comment="texlive-babel-german-2021.186.2.13svn57978-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914238" comment="texlive-babel-german-doc-2021.186.2.13svn57978-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914239" comment="texlive-babel-greek-2021.186.1.10svn56904-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914240" comment="texlive-babel-greek-doc-2021.186.1.10svn56904-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914241" comment="texlive-babel-hebrew-2021.186.2.3hsvn30273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914242" comment="texlive-babel-hebrew-doc-2021.186.2.3hsvn30273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914243" comment="texlive-babel-hungarian-2021.186.1.5csvn49701-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914244" comment="texlive-babel-hungarian-doc-2021.186.1.5csvn49701-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914245" comment="texlive-babel-icelandic-2021.186.1.3svn51551-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914246" comment="texlive-babel-icelandic-doc-2021.186.1.3svn51551-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914247" comment="texlive-babel-indonesian-2021.186.1.0msvn43235-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914248" comment="texlive-babel-indonesian-doc-2021.186.1.0msvn43235-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914249" comment="texlive-babel-interlingua-2021.186.1.6svn30276-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914250" comment="texlive-babel-interlingua-doc-2021.186.1.6svn30276-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914251" comment="texlive-babel-irish-2021.186.1.0hsvn30277-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914252" comment="texlive-babel-irish-doc-2021.186.1.0hsvn30277-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914253" comment="texlive-babel-italian-2021.186.1.4.04svn55232-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914254" comment="texlive-babel-italian-doc-2021.186.1.4.04svn55232-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914255" comment="texlive-babel-japanese-2021.186.svn57733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914256" comment="texlive-babel-japanese-doc-2021.186.svn57733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914257" comment="texlive-babel-kurmanji-2021.186.1.1svn30279-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914258" comment="texlive-babel-kurmanji-doc-2021.186.1.1svn30279-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914259" comment="texlive-babel-latin-2021.186.3.5svn38173-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914260" comment="texlive-babel-latin-doc-2021.186.3.5svn38173-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914261" comment="texlive-babel-latvian-2021.186.2.0bsvn46681-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914262" comment="texlive-babel-latvian-doc-2021.186.2.0bsvn46681-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914263" comment="texlive-babel-macedonian-2021.186.svn39587-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914264" comment="texlive-babel-macedonian-doc-2021.186.svn39587-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914265" comment="texlive-babel-malay-2021.186.1.0msvn43234-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914266" comment="texlive-babel-malay-doc-2021.186.1.0msvn43234-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914267" comment="texlive-babel-norsk-2021.186.2.0isvn30281-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914268" comment="texlive-babel-norsk-doc-2021.186.2.0isvn30281-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914269" comment="texlive-babel-occitan-2021.186.0.0.2svn39608-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914270" comment="texlive-babel-occitan-doc-2021.186.0.0.2svn39608-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914271" comment="texlive-babel-piedmontese-2021.186.1.0svn30282-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914272" comment="texlive-babel-piedmontese-doc-2021.186.1.0svn30282-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914273" comment="texlive-babel-polish-2021.186.1.2lsvn30283-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914274" comment="texlive-babel-polish-doc-2021.186.1.2lsvn30283-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914275" comment="texlive-babel-portuges-2021.186.1.2ssvn57644-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914276" comment="texlive-babel-portuges-doc-2021.186.1.2ssvn57644-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914277" comment="texlive-babel-romanian-2021.186.1.2lsvn30285-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914278" comment="texlive-babel-romanian-doc-2021.186.1.2lsvn30285-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914279" comment="texlive-babel-romansh-2021.186.svn30286-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914280" comment="texlive-babel-romansh-doc-2021.186.svn30286-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914281" comment="texlive-babel-russian-2021.186.1.3msvn57376-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914282" comment="texlive-babel-russian-doc-2021.186.1.3msvn57376-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914283" comment="texlive-babel-samin-2021.186.1.0csvn30288-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914284" comment="texlive-babel-samin-doc-2021.186.1.0csvn30288-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914285" comment="texlive-babel-scottish-2021.186.1.0gsvn30289-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914286" comment="texlive-babel-scottish-doc-2021.186.1.0gsvn30289-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914287" comment="texlive-babel-serbian-2021.186.2.0asvn53140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914288" comment="texlive-babel-serbian-doc-2021.186.2.0asvn53140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914289" comment="texlive-babel-serbianc-2021.186.3.0asvn53139-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914290" comment="texlive-babel-serbianc-doc-2021.186.3.0asvn53139-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914291" comment="texlive-babel-slovak-2021.186.3.1asvn30292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914292" comment="texlive-babel-slovak-doc-2021.186.3.1asvn30292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914293" comment="texlive-babel-slovenian-2021.186.1.2nsvn57666-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914294" comment="texlive-babel-slovenian-doc-2021.186.1.2nsvn57666-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914295" comment="texlive-babel-sorbian-2021.186.1.0isvn57646-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914296" comment="texlive-babel-sorbian-doc-2021.186.1.0isvn57646-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914297" comment="texlive-babel-spanish-2021.186.5.0psvn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914298" comment="texlive-babel-spanish-doc-2021.186.5.0psvn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914299" comment="texlive-babel-swedish-2021.186.2.3esvn57647-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914300" comment="texlive-babel-swedish-doc-2021.186.2.3esvn57647-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914301" comment="texlive-babel-thai-2021.186.1.0.0svn30564-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914302" comment="texlive-babel-thai-doc-2021.186.1.0.0svn30564-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914303" comment="texlive-babel-turkish-2021.186.1.4svn51560-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914304" comment="texlive-babel-turkish-doc-2021.186.1.4svn51560-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914305" comment="texlive-babel-ukrainian-2021.186.1.4esvn56674-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914306" comment="texlive-babel-ukrainian-doc-2021.186.1.4esvn56674-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914307" comment="texlive-babel-vietnamese-2021.186.1.4svn39246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914308" comment="texlive-babel-vietnamese-doc-2021.186.1.4svn39246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914309" comment="texlive-babel-welsh-2021.186.1.1asvn38372-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914310" comment="texlive-babel-welsh-doc-2021.186.1.1asvn38372-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914311" comment="texlive-babelbib-2021.186.1.34svn57349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914312" comment="texlive-babelbib-doc-2021.186.1.34svn57349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914313" comment="texlive-background-2021.186.2.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914314" comment="texlive-background-doc-2021.186.2.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914315" comment="texlive-backnaur-2021.186.3.1svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914316" comment="texlive-backnaur-doc-2021.186.3.1svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914317" comment="texlive-baekmuk-2021.186.2.2.1svn56915-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914318" comment="texlive-baekmuk-doc-2021.186.2.2.1svn56915-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914319" comment="texlive-baekmuk-fonts-2021.186.2.2.1svn56915-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914320" comment="texlive-bagpipe-2021.186.3.02svn34393-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914321" comment="texlive-bagpipe-doc-2021.186.3.02svn34393-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914322" comment="texlive-bangorcsthesis-2021.186.1.5.3svn48834-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914323" comment="texlive-bangorcsthesis-doc-2021.186.1.5.3svn48834-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914324" comment="texlive-bangorexam-2021.186.1.4.0svn46626-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914325" comment="texlive-bangorexam-doc-2021.186.1.4.0svn46626-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914326" comment="texlive-bangtex-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914327" comment="texlive-bangtex-doc-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914328" comment="texlive-bankstatement-2021.186.0.0.9.2svn38857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914329" comment="texlive-bankstatement-doc-2021.186.0.0.9.2svn38857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914330" comment="texlive-barcodes-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914331" comment="texlive-barcodes-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914332" comment="texlive-bardiag-2021.186.0.0.4asvn22013-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914333" comment="texlive-bardiag-doc-2021.186.0.0.4asvn22013-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914334" comment="texlive-barr-2021.186.svn38479-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914335" comment="texlive-barr-doc-2021.186.svn38479-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914336" comment="texlive-barracuda-2021.186.0.0.0.10svn53683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914337" comment="texlive-barracuda-doc-2021.186.0.0.0.10svn53683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914338" comment="texlive-bartel-chess-fonts-2021.186.svn20619-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914339" comment="texlive-bartel-chess-fonts-doc-2021.186.svn20619-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914340" comment="texlive-bashful-2021.186.0.0.93svn25597-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914341" comment="texlive-bashful-doc-2021.186.0.0.93svn25597-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914342" comment="texlive-basicarith-2021.186.1.1svn35460-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914343" comment="texlive-basicarith-doc-2021.186.1.1svn35460-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914344" comment="texlive-baskervald-2021.186.1.016svn19490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914345" comment="texlive-baskervald-doc-2021.186.1.016svn19490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914346" comment="texlive-baskervald-fonts-2021.186.1.016svn19490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914347" comment="texlive-baskervaldx-2021.186.1.076svn57080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914348" comment="texlive-baskervaldx-doc-2021.186.1.076svn57080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914349" comment="texlive-baskervaldx-fonts-2021.186.1.076svn57080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914350" comment="texlive-baskervillef-2021.186.1.051svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914351" comment="texlive-baskervillef-doc-2021.186.1.051svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914352" comment="texlive-baskervillef-fonts-2021.186.1.051svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914353" comment="texlive-basque-book-2021.186.1.20svn32924-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914354" comment="texlive-basque-book-doc-2021.186.1.20svn32924-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914355" comment="texlive-basque-date-2021.186.1.05svn26477-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914356" comment="texlive-basque-date-doc-2021.186.1.05svn26477-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914357" comment="texlive-bath-bst-2021.186.4.0svn57925-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914358" comment="texlive-bath-bst-doc-2021.186.4.0svn57925-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914359" comment="texlive-bbcard-2021.186.svn19440-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914360" comment="texlive-bbcard-doc-2021.186.svn19440-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249756" version="1" class="patch">
	<metadata>
		<title>texlive-bbding-2021.186.1.01svn17186-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-bbding-2021.186.1.01svn17186-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009914361" comment="texlive-bbding-2021.186.1.01svn17186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914362" comment="texlive-bbding-doc-2021.186.1.01svn17186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914363" comment="texlive-bbm-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914364" comment="texlive-bbm-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914365" comment="texlive-bbm-macros-2021.186.svn17224-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914366" comment="texlive-bbm-macros-doc-2021.186.svn17224-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914367" comment="texlive-bbold-2021.186.1.01svn17187-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914368" comment="texlive-bbold-doc-2021.186.1.01svn17187-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914369" comment="texlive-bbold-type1-2021.186.svn33143-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914370" comment="texlive-bbold-type1-doc-2021.186.svn33143-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914371" comment="texlive-bbold-type1-fonts-2021.186.svn33143-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914372" comment="texlive-bchart-2021.186.0.0.1.3svn43928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914373" comment="texlive-bchart-doc-2021.186.0.0.1.3svn43928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914374" comment="texlive-bclogo-2021.186.3.1svn39364-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914375" comment="texlive-bclogo-doc-2021.186.3.1svn39364-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914376" comment="texlive-beamer-2021.186.3.62svn58537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914377" comment="texlive-beamer-FUBerlin-2021.186.0.0.02bsvn38159-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914378" comment="texlive-beamer-doc-2021.186.3.62svn58537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914379" comment="texlive-beamer-rl-2021.186.1.4bsvn58513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914380" comment="texlive-beamer-rl-doc-2021.186.1.4bsvn58513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914381" comment="texlive-beamer-tut-pt-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914382" comment="texlive-beamer-verona-2021.186.0.0.2svn39180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914383" comment="texlive-beamer-verona-doc-2021.186.0.0.2svn39180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914384" comment="texlive-beamer2thesis-2021.186.2.2svn27539-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914385" comment="texlive-beamer2thesis-doc-2021.186.2.2svn27539-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914386" comment="texlive-beamerappendixnote-2021.186.1.2.0svn55732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914387" comment="texlive-beamerappendixnote-doc-2021.186.1.2.0svn55732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914388" comment="texlive-beameraudience-2021.186.0.0.1svn23427-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914389" comment="texlive-beameraudience-doc-2021.186.0.0.1svn23427-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914390" comment="texlive-beamerauxtheme-2021.186.1.02asvn56087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914391" comment="texlive-beamerauxtheme-doc-2021.186.1.02asvn56087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914392" comment="texlive-beamercolorthemeowl-2021.186.0.0.1.1svn40105-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914393" comment="texlive-beamercolorthemeowl-doc-2021.186.0.0.1.1svn40105-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914394" comment="texlive-beamerdarkthemes-2021.186.0.0.5.1svn55117-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914395" comment="texlive-beamerdarkthemes-doc-2021.186.0.0.5.1svn55117-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914396" comment="texlive-beamerposter-2021.186.1.13svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914397" comment="texlive-beamerposter-doc-2021.186.1.13svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914398" comment="texlive-beamersubframe-2021.186.0.0.2svn23510-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914399" comment="texlive-beamersubframe-doc-2021.186.0.0.2svn23510-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914400" comment="texlive-beamerswitch-2021.186.1.7svn55441-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914401" comment="texlive-beamerswitch-doc-2021.186.1.7svn55441-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914402" comment="texlive-beamertheme-cuerna-2021.186.svn42161-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914403" comment="texlive-beamertheme-cuerna-doc-2021.186.svn42161-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914404" comment="texlive-beamertheme-detlevcm-2021.186.1.02svn39048-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914405" comment="texlive-beamertheme-detlevcm-doc-2021.186.1.02svn39048-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914406" comment="texlive-beamertheme-epyt-2021.186.1.0svn41404-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914407" comment="texlive-beamertheme-epyt-doc-2021.186.1.0svn41404-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914408" comment="texlive-beamertheme-focus-2021.186.2.8.1svn56967-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914409" comment="texlive-beamertheme-focus-doc-2021.186.2.8.1svn56967-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914410" comment="texlive-beamertheme-light-2021.186.1.0svn49867-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914411" comment="texlive-beamertheme-light-doc-2021.186.1.0svn49867-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914412" comment="texlive-beamertheme-metropolis-2021.186.1.2svn43031-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914413" comment="texlive-beamertheme-metropolis-doc-2021.186.1.2svn43031-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914414" comment="texlive-beamertheme-npbt-2021.186.4.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914415" comment="texlive-beamertheme-npbt-doc-2021.186.4.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914416" comment="texlive-beamertheme-phnompenh-2021.186.1.0svn39100-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914417" comment="texlive-beamertheme-phnompenh-doc-2021.186.1.0svn39100-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914418" comment="texlive-beamertheme-pure-minimalistic-2021.186.2.0.0svn56934-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914419" comment="texlive-beamertheme-pure-minimalistic-doc-2021.186.2.0.0svn56934-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914420" comment="texlive-beamertheme-saintpetersburg-2021.186.svn45877-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914421" comment="texlive-beamertheme-saintpetersburg-doc-2021.186.svn45877-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914422" comment="texlive-beamertheme-upenn-bc-2021.186.1.0svn29937-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914423" comment="texlive-beamertheme-upenn-bc-doc-2021.186.1.0svn29937-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914424" comment="texlive-beamerthemejltree-2021.186.1.1svn21977-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914425" comment="texlive-beamerthemenirma-2021.186.0.0.1svn20765-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914426" comment="texlive-beamerthemenirma-doc-2021.186.0.0.1svn20765-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914427" comment="texlive-beamerthemenord-2021.186.0.0.2.0svn56180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914428" comment="texlive-beamerthemenord-doc-2021.186.0.0.2.0svn56180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914429" comment="texlive-bearwear-2021.186.0.0.2svn54826-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914430" comment="texlive-bearwear-doc-2021.186.0.0.2svn54826-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914431" comment="texlive-beaulivre-2021.186.svn58503-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914432" comment="texlive-beaulivre-doc-2021.186.svn58503-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914433" comment="texlive-beebe-2021.186.svn58697-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914434" comment="texlive-begingreek-2021.186.1.5svn36294-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914435" comment="texlive-begingreek-doc-2021.186.1.5svn36294-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914436" comment="texlive-begriff-2021.186.1.6svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914437" comment="texlive-begriff-doc-2021.186.1.6svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914438" comment="texlive-beilstein-2021.186.2.1svn56193-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914439" comment="texlive-beilstein-doc-2021.186.2.1svn56193-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914440" comment="texlive-belleek-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914441" comment="texlive-belleek-doc-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914442" comment="texlive-belleek-fonts-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914443" comment="texlive-bengali-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914444" comment="texlive-bengali-doc-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914445" comment="texlive-bera-2021.186.svn20031-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914446" comment="texlive-bera-doc-2021.186.svn20031-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914447" comment="texlive-bera-fonts-2021.186.svn20031-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914448" comment="texlive-berenisadf-2021.186.1.004svn32215-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914449" comment="texlive-berenisadf-doc-2021.186.1.004svn32215-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914450" comment="texlive-berenisadf-fonts-2021.186.1.004svn32215-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914451" comment="texlive-besjournals-2021.186.svn45662-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914452" comment="texlive-besjournals-doc-2021.186.svn45662-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914453" comment="texlive-bestpapers-2021.186.1.0svn38708-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914454" comment="texlive-bestpapers-doc-2021.186.1.0svn38708-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914455" comment="texlive-betababel-2021.186.0.0.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914456" comment="texlive-betababel-doc-2021.186.0.0.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914457" comment="texlive-beton-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914458" comment="texlive-beton-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914459" comment="texlive-beuron-2021.186.1.3svn46374-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914460" comment="texlive-beuron-doc-2021.186.1.3svn46374-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914461" comment="texlive-beuron-fonts-2021.186.1.3svn46374-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914462" comment="texlive-bewerbung-2021.186.1.2svn56998-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914463" comment="texlive-bewerbung-doc-2021.186.1.2svn56998-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914464" comment="texlive-bez123-2021.186.1.1bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914465" comment="texlive-bez123-doc-2021.186.1.1bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914466" comment="texlive-bezierplot-2021.186.1.4svn51398-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914467" comment="texlive-bezierplot-doc-2021.186.1.4svn51398-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914468" comment="texlive-bgteubner-2021.186.2.11svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914469" comment="texlive-bgteubner-doc-2021.186.2.11svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914470" comment="texlive-bguq-2021.186.0.0.4svn27401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914471" comment="texlive-bguq-doc-2021.186.0.0.4svn27401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914472" comment="texlive-bguq-fonts-2021.186.0.0.4svn27401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914473" comment="texlive-bhcexam-2021.186.0.0.4svn39041-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914474" comment="texlive-bhcexam-doc-2021.186.0.0.4svn39041-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914475" comment="texlive-bib-fr-2021.186.1.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914476" comment="texlive-bib-fr-doc-2021.186.1.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914477" comment="texlive-bib2gls-2021.186.2.7svn55811-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914478" comment="texlive-bib2gls-doc-2021.186.2.7svn55811-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914479" comment="texlive-bibarts-2021.186.2.2svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914480" comment="texlive-bibarts-doc-2021.186.2.2svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914481" comment="texlive-biber-2021.186.2.16svn57273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914482" comment="texlive-bibexport-2021.186.3.03svn50677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914483" comment="texlive-bibexport-doc-2021.186.3.03svn50677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914484" comment="texlive-bibhtml-2021.186.2.0.2svn31607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914485" comment="texlive-bibhtml-doc-2021.186.2.0.2svn31607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914486" comment="texlive-biblatex-2021.186.3.16svn57272-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914487" comment="texlive-biblatex-abnt-2021.186.3.4svn49179-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914488" comment="texlive-biblatex-abnt-doc-2021.186.3.4svn49179-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914489" comment="texlive-biblatex-ajc2020unofficial-2021.186.0.0.2.0svn54401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914490" comment="texlive-biblatex-ajc2020unofficial-doc-2021.186.0.0.2.0svn54401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914491" comment="texlive-biblatex-anonymous-2021.186.2.6.2svn48548-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914492" comment="texlive-biblatex-anonymous-doc-2021.186.2.6.2svn48548-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914493" comment="texlive-biblatex-apa-2021.186.9.14svn56208-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914494" comment="texlive-biblatex-apa-doc-2021.186.9.14svn56208-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914495" comment="texlive-biblatex-apa6-2021.186.8.5svn56209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914496" comment="texlive-biblatex-apa6-doc-2021.186.8.5svn56209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914497" comment="texlive-biblatex-archaeology-2021.186.2.2svn53281-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914498" comment="texlive-biblatex-archaeology-doc-2021.186.2.2svn53281-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914499" comment="texlive-biblatex-arthistory-bonn-2021.186.1.2svn46637-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914500" comment="texlive-biblatex-arthistory-bonn-doc-2021.186.1.2svn46637-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914501" comment="texlive-biblatex-bath-2021.186.4.0svn57924-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914502" comment="texlive-biblatex-bath-doc-2021.186.4.0svn57924-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914503" comment="texlive-biblatex-bookinarticle-2021.186.1.3.1asvn40323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914504" comment="texlive-biblatex-bookinarticle-doc-2021.186.1.3.1asvn40323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914505" comment="texlive-biblatex-bookinother-2021.186.2.3.3svn54015-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914506" comment="texlive-biblatex-bookinother-doc-2021.186.2.3.3svn54015-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914507" comment="texlive-biblatex-bwl-2021.186.0.0.02svn26556-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914508" comment="texlive-biblatex-bwl-doc-2021.186.0.0.02svn26556-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914509" comment="texlive-biblatex-caspervector-2021.186.0.0.3.5svn56837-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914510" comment="texlive-biblatex-caspervector-doc-2021.186.0.0.3.5svn56837-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914511" comment="texlive-biblatex-cheatsheet-2021.186.svn44685-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914512" comment="texlive-biblatex-chem-2021.186.1.1zsvn57904-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914513" comment="texlive-biblatex-chem-doc-2021.186.1.1zsvn57904-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914514" comment="texlive-biblatex-chicago-2021.186.2.1svn58715-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914515" comment="texlive-biblatex-chicago-doc-2021.186.2.1svn58715-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914516" comment="texlive-biblatex-claves-2021.186.1.2.1svn43723-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914517" comment="texlive-biblatex-claves-doc-2021.186.1.2.1svn43723-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914518" comment="texlive-biblatex-doc-2021.186.3.16svn57272-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914519" comment="texlive-biblatex-dw-2021.186.1.7svn42649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914520" comment="texlive-biblatex-dw-doc-2021.186.1.7svn42649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914521" comment="texlive-biblatex-enc-2021.186.1.0svn44627-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914522" comment="texlive-biblatex-enc-doc-2021.186.1.0svn44627-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914523" comment="texlive-biblatex-ext-2021.186.0.0.12svn57979-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914524" comment="texlive-biblatex-ext-doc-2021.186.0.0.12svn57979-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914525" comment="texlive-biblatex-fiwi-2021.186.1.7svn45876-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914526" comment="texlive-biblatex-fiwi-doc-2021.186.1.7svn45876-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914527" comment="texlive-biblatex-gb7714-2015-2021.186.1.0xsvn58753-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914528" comment="texlive-biblatex-gb7714-2015-doc-2021.186.1.0xsvn58753-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914529" comment="texlive-biblatex-german-legal-2021.186.002svn56939-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914530" comment="texlive-biblatex-german-legal-doc-2021.186.002svn56939-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914531" comment="texlive-biblatex-gost-2021.186.1.21svn56790-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914532" comment="texlive-biblatex-gost-doc-2021.186.1.21svn56790-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914533" comment="texlive-biblatex-historian-2021.186.0.0.4svn19787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914534" comment="texlive-biblatex-historian-doc-2021.186.0.0.4svn19787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914535" comment="texlive-biblatex-ieee-2021.186.1.3esvn58716-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914536" comment="texlive-biblatex-ieee-doc-2021.186.1.3esvn58716-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914537" comment="texlive-biblatex-ijsra-2021.186.0.0.1svn41634-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914538" comment="texlive-biblatex-ijsra-doc-2021.186.0.0.1svn41634-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914539" comment="texlive-biblatex-iso690-2021.186.0.0.4svn54561-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914540" comment="texlive-biblatex-iso690-doc-2021.186.0.0.4svn54561-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914541" comment="texlive-biblatex-jura2-2021.186.0.0.4svn56133-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914542" comment="texlive-biblatex-jura2-doc-2021.186.0.0.4svn56133-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914543" comment="texlive-biblatex-juradiss-2021.186.0.0.23svn56502-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914544" comment="texlive-biblatex-juradiss-doc-2021.186.0.0.23svn56502-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914545" comment="texlive-biblatex-license-2021.186.0.0.1svn58437-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914546" comment="texlive-biblatex-license-doc-2021.186.0.0.1svn58437-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914547" comment="texlive-biblatex-lni-2021.186.0.0.5svn49935-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914548" comment="texlive-biblatex-lni-doc-2021.186.0.0.5svn49935-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914549" comment="texlive-biblatex-luh-ipw-2021.186.0.0.3svn32180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914550" comment="texlive-biblatex-luh-ipw-doc-2021.186.0.0.3svn32180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914551" comment="texlive-biblatex-manuscripts-philology-2021.186.2.1.2svn53344-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914552" comment="texlive-biblatex-manuscripts-philology-doc-2021.186.2.1.2svn53344-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914553" comment="texlive-biblatex-mla-2021.186.1.9svn42445-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914554" comment="texlive-biblatex-mla-doc-2021.186.1.9svn42445-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914555" comment="texlive-biblatex-morenames-2021.186.1.3.1svn43049-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914556" comment="texlive-biblatex-morenames-doc-2021.186.1.3.1svn43049-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914557" comment="texlive-biblatex-multiple-dm-2021.186.1.0.1svn37081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914558" comment="texlive-biblatex-multiple-dm-doc-2021.186.1.0.1svn37081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914559" comment="texlive-biblatex-musuos-2021.186.1.0svn24097-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914560" comment="texlive-biblatex-musuos-doc-2021.186.1.0svn24097-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914561" comment="texlive-biblatex-nature-2021.186.1.3dsvn57262-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914562" comment="texlive-biblatex-nature-doc-2021.186.1.3dsvn57262-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914563" comment="texlive-biblatex-nejm-2021.186.0.0.5.0svn49839-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914564" comment="texlive-biblatex-nejm-doc-2021.186.0.0.5.0svn49839-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914565" comment="texlive-biblatex-nottsclassic-2021.186.0.0.1svn41596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914566" comment="texlive-biblatex-nottsclassic-doc-2021.186.0.0.1svn41596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914567" comment="texlive-biblatex-opcit-booktitle-2021.186.1.9.0svn48983-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914568" comment="texlive-biblatex-opcit-booktitle-doc-2021.186.1.9.0svn48983-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914569" comment="texlive-biblatex-oxref-2021.186.2.2svn57513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914570" comment="texlive-biblatex-oxref-doc-2021.186.2.2svn57513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914571" comment="texlive-biblatex-philosophy-2021.186.1.9.8csvn56493-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914572" comment="texlive-biblatex-philosophy-doc-2021.186.1.9.8csvn56493-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914573" comment="texlive-biblatex-phys-2021.186.1.1bsvn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914574" comment="texlive-biblatex-phys-doc-2021.186.1.1bsvn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914575" comment="texlive-biblatex-publist-2021.186.1.21svn56392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914576" comment="texlive-biblatex-publist-doc-2021.186.1.21svn56392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914577" comment="texlive-biblatex-realauthor-2021.186.2.7.1asvn45865-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914578" comment="texlive-biblatex-realauthor-doc-2021.186.2.7.1asvn45865-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914579" comment="texlive-biblatex-sbl-2021.186.0.0.12svn56853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914580" comment="texlive-biblatex-sbl-doc-2021.186.0.0.12svn56853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914581" comment="texlive-biblatex-science-2021.186.1.2svn48945-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914582" comment="texlive-biblatex-science-doc-2021.186.1.2svn48945-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914583" comment="texlive-biblatex-shortfields-2021.186.1.0.1svn45858-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914584" comment="texlive-biblatex-shortfields-doc-2021.186.1.0.1svn45858-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914585" comment="texlive-biblatex-socialscienceshuberlin-2021.186.0.0.0.1svn47839-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914586" comment="texlive-biblatex-socialscienceshuberlin-doc-2021.186.0.0.0.1svn47839-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914587" comment="texlive-biblatex-software-2021.186.1.2_3svn57366-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914588" comment="texlive-biblatex-software-doc-2021.186.1.2_3svn57366-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914589" comment="texlive-biblatex-source-division-2021.186.2.4.2svn45379-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914590" comment="texlive-biblatex-source-division-doc-2021.186.2.4.2svn45379-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914591" comment="texlive-biblatex-subseries-2021.186.1.2.0svn43330-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914592" comment="texlive-biblatex-subseries-doc-2021.186.1.2.0svn43330-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914593" comment="texlive-biblatex-swiss-legal-2021.186.1.1.2asvn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914594" comment="texlive-biblatex-swiss-legal-doc-2021.186.1.1.2asvn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914595" comment="texlive-biblatex-trad-2021.186.0.0.5svn58169-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914596" comment="texlive-biblatex-trad-doc-2021.186.0.0.5svn58169-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914597" comment="texlive-biblatex-true-citepages-omit-2021.186.2.0.0svn44653-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914598" comment="texlive-biblatex-true-citepages-omit-doc-2021.186.2.0.0svn44653-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914599" comment="texlive-biblatex-unified-2021.186.1.00svn55290-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914600" comment="texlive-biblatex-unified-doc-2021.186.1.00svn55290-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914601" comment="texlive-biblatex-vancouver-2021.186.0.0.1svn55339-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914602" comment="texlive-biblatex-vancouver-doc-2021.186.0.0.1svn55339-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914603" comment="texlive-biblatex2bibitem-2021.186.0.0.2.0svn54030-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914604" comment="texlive-biblatex2bibitem-doc-2021.186.0.0.2.0svn54030-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914605" comment="texlive-bibleref-2021.186.1.25svn55626-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914606" comment="texlive-bibleref-doc-2021.186.1.25svn55626-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914607" comment="texlive-bibleref-french-2021.186.2.3.3svn53138-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914608" comment="texlive-bibleref-french-doc-2021.186.2.3.3svn53138-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914609" comment="texlive-bibleref-german-2021.186.1.0asvn21923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914610" comment="texlive-bibleref-german-doc-2021.186.1.0asvn21923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914611" comment="texlive-bibleref-lds-2021.186.1.0svn25526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914612" comment="texlive-bibleref-lds-doc-2021.186.1.0svn25526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914613" comment="texlive-bibleref-mouth-2021.186.1.0svn25527-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914614" comment="texlive-bibleref-mouth-doc-2021.186.1.0svn25527-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914615" comment="texlive-bibleref-parse-2021.186.1.1svn22054-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914616" comment="texlive-bibleref-parse-doc-2021.186.1.1svn22054-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914617" comment="texlive-bibletext-2021.186.0.0.1.2svn45196-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914618" comment="texlive-bibletext-doc-2021.186.0.0.1.2svn45196-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914619" comment="texlive-biblist-2021.186.svn17116-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914620" comment="texlive-biblist-doc-2021.186.svn17116-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914621" comment="texlive-bibtex-2021.186.0.0.99dsvn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914622" comment="texlive-bibtex-doc-2021.186.0.0.99dsvn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914623" comment="texlive-bibtex8-2021.186.3.71svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914624" comment="texlive-bibtex8-doc-2021.186.3.71svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914625" comment="texlive-bibtexperllibs-2021.186.1.6svn57137-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914626" comment="texlive-bibtexu-2021.186.svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914627" comment="texlive-bibtopic-2021.186.1.1asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914628" comment="texlive-bibtopic-doc-2021.186.1.1asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914629" comment="texlive-bibtopicprefix-2021.186.1.10svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914630" comment="texlive-bibtopicprefix-doc-2021.186.1.10svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914631" comment="texlive-bibunits-2021.186.2.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914632" comment="texlive-bibunits-doc-2021.186.2.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914633" comment="texlive-bidi-2021.186.36.3svn55193-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914634" comment="texlive-bidi-atbegshi-2021.186.0.0.1svn35154-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914635" comment="texlive-bidi-atbegshi-doc-2021.186.0.0.1svn35154-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914636" comment="texlive-bidi-doc-2021.186.36.3svn55193-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914637" comment="texlive-bidicontour-2021.186.0.0.2svn34631-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914638" comment="texlive-bidicontour-doc-2021.186.0.0.2svn34631-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914639" comment="texlive-bidihl-2021.186.0.0.1csvn37795-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914640" comment="texlive-bidihl-doc-2021.186.0.0.1csvn37795-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914641" comment="texlive-bidipagegrid-2021.186.0.0.2svn34632-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914642" comment="texlive-bidipagegrid-doc-2021.186.0.0.2svn34632-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914643" comment="texlive-bidipresentation-2021.186.0.0.3svn35267-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914644" comment="texlive-bidipresentation-doc-2021.186.0.0.3svn35267-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914645" comment="texlive-bidishadowtext-2021.186.0.0.1svn34633-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914646" comment="texlive-bidishadowtext-doc-2021.186.0.0.1svn34633-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914647" comment="texlive-bigfoot-2021.186.2.1svn38248-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914648" comment="texlive-bigfoot-doc-2021.186.2.1svn38248-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914649" comment="texlive-bigintcalc-2021.186.1.5svn53172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914650" comment="texlive-bigintcalc-doc-2021.186.1.5svn53172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914651" comment="texlive-bigints-2021.186.svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914652" comment="texlive-bigints-doc-2021.186.svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914653" comment="texlive-binarytree-2021.186.1.01svn41777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914654" comment="texlive-binarytree-doc-2021.186.1.01svn41777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914655" comment="texlive-binomexp-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914656" comment="texlive-binomexp-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914657" comment="texlive-biochemistry-colors-2021.186.1.00svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914658" comment="texlive-biochemistry-colors-doc-2021.186.1.00svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914659" comment="texlive-biocon-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914660" comment="texlive-biocon-doc-2021.186.svn15878-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249757" version="1" class="patch">
	<metadata>
		<title>texlive-biolett-bst-2021.186.svn42217-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-biolett-bst-2021.186.svn42217-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009914661" comment="texlive-biolett-bst-2021.186.svn42217-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914662" comment="texlive-biolett-bst-doc-2021.186.svn42217-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914663" comment="texlive-bitelist-2021.186.0.0.1svn25779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914664" comment="texlive-bitelist-doc-2021.186.0.0.1svn25779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914665" comment="texlive-bithesis-2021.186.1.0.1svn57388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914666" comment="texlive-bithesis-doc-2021.186.1.0.1svn57388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914667" comment="texlive-bitpattern-2021.186.svn39073-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914668" comment="texlive-bitpattern-doc-2021.186.svn39073-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914669" comment="texlive-bitset-2021.186.1.3svn53837-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914670" comment="texlive-bitset-doc-2021.186.1.3svn53837-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914671" comment="texlive-bitter-2021.186.svn56026-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914672" comment="texlive-bitter-doc-2021.186.svn56026-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914673" comment="texlive-bitter-fonts-2021.186.svn56026-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914674" comment="texlive-bizcard-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914675" comment="texlive-bizcard-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914676" comment="texlive-blacklettert1-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914677" comment="texlive-blacklettert1-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914678" comment="texlive-blindtext-2021.186.2.0svn25039-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914679" comment="texlive-blindtext-doc-2021.186.2.0svn25039-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914680" comment="texlive-blkarray-2021.186.0.0.07svn36406-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914681" comment="texlive-blkarray-doc-2021.186.0.0.07svn36406-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914682" comment="texlive-blochsphere-2021.186.1.1svn38388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914683" comment="texlive-blochsphere-doc-2021.186.1.1svn38388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914684" comment="texlive-block-2021.186.svn17209-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914685" comment="texlive-block-doc-2021.186.svn17209-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914686" comment="texlive-blockdraw_mp-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914687" comment="texlive-blockdraw_mp-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914688" comment="texlive-bloques-2021.186.1.0svn22490-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914689" comment="texlive-bloques-doc-2021.186.1.0svn22490-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914690" comment="texlive-blowup-2021.186.1.0svn46213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914691" comment="texlive-blowup-doc-2021.186.1.0svn46213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914692" comment="texlive-blox-2021.186.2.51svn57949-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914693" comment="texlive-blox-doc-2021.186.2.51svn57949-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914694" comment="texlive-bnumexpr-2021.186.1.2dsvn49643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914695" comment="texlive-bnumexpr-doc-2021.186.1.2dsvn49643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914696" comment="texlive-bodegraph-2021.186.1.4svn20047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914697" comment="texlive-bodegraph-doc-2021.186.1.4svn20047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914698" comment="texlive-bohr-2021.186.1.0svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914699" comment="texlive-bohr-doc-2021.186.1.0svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914700" comment="texlive-boisik-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914701" comment="texlive-boisik-doc-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914702" comment="texlive-boites-2021.186.1.1svn32235-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914703" comment="texlive-boites-doc-2021.186.1.1svn32235-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914704" comment="texlive-bold-extra-2021.186.0.0.1svn17076-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914705" comment="texlive-bold-extra-doc-2021.186.0.0.1svn17076-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914706" comment="texlive-boldtensors-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914707" comment="texlive-boldtensors-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914708" comment="texlive-bondgraph-2021.186.1.0svn21670-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914709" comment="texlive-bondgraph-doc-2021.186.1.0svn21670-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914710" comment="texlive-bondgraphs-2021.186.1.0.1svn36605-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914711" comment="texlive-bondgraphs-doc-2021.186.1.0.1svn36605-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914712" comment="texlive-bookcover-2021.186.3.3svn57326-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914713" comment="texlive-bookcover-doc-2021.186.3.3svn57326-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914714" comment="texlive-bookdb-2021.186.0.0.2svn37536-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914715" comment="texlive-bookdb-doc-2021.186.0.0.2svn37536-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914716" comment="texlive-bookest-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914717" comment="texlive-bookest-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914718" comment="texlive-bookhands-2021.186.svn46480-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914719" comment="texlive-bookhands-doc-2021.186.svn46480-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914720" comment="texlive-bookhands-fonts-2021.186.svn46480-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914721" comment="texlive-booklet-2021.186.0.0.7bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914722" comment="texlive-booklet-doc-2021.186.0.0.7bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914723" comment="texlive-bookman-2021.186.svn31835-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914724" comment="texlive-bookman-fonts-2021.186.svn31835-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914725" comment="texlive-bookmark-2021.186.1.29svn56885-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914726" comment="texlive-bookmark-doc-2021.186.1.29svn56885-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914727" comment="texlive-bookshelf-2021.186.0.0.5svn55475-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914728" comment="texlive-bookshelf-doc-2021.186.0.0.5svn55475-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914729" comment="texlive-booktabs-2021.186.1.61803398svn53402-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914730" comment="texlive-booktabs-de-2021.186.1.61803svn21907-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914731" comment="texlive-booktabs-doc-2021.186.1.61803398svn53402-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914732" comment="texlive-booktabs-fr-2021.186.1.00svn21948-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914733" comment="texlive-boolexpr-2021.186.3.14svn17830-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914734" comment="texlive-boolexpr-doc-2021.186.3.14svn17830-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914735" comment="texlive-boondox-2021.186.1.02dsvn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914736" comment="texlive-boondox-doc-2021.186.1.02dsvn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914737" comment="texlive-boondox-fonts-2021.186.1.02dsvn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914738" comment="texlive-bophook-2021.186.0.0.02svn17062-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914739" comment="texlive-bophook-doc-2021.186.0.0.02svn17062-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914740" comment="texlive-borceux-2021.186.svn21047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914741" comment="texlive-borceux-doc-2021.186.svn21047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914742" comment="texlive-bosisio-2021.186.svn16989-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914743" comment="texlive-bosisio-doc-2021.186.svn16989-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914744" comment="texlive-boxedminipage-2021.186.1.1svn54827-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914745" comment="texlive-boxedminipage-doc-2021.186.1.1svn54827-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914746" comment="texlive-boxhandler-2021.186.1.30svn28031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914747" comment="texlive-boxhandler-doc-2021.186.1.30svn28031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914748" comment="texlive-bpchem-2021.186.1.1svn45120-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914749" comment="texlive-bpchem-doc-2021.186.1.1svn45120-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914750" comment="texlive-bpolynomial-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914751" comment="texlive-bpolynomial-doc-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914752" comment="texlive-br-lex-2021.186.svn44939-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914753" comment="texlive-br-lex-doc-2021.186.svn44939-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914754" comment="texlive-bracketkey-2021.186.1.0svn17129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914755" comment="texlive-bracketkey-doc-2021.186.1.0svn17129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914756" comment="texlive-braids-2021.186.2.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914757" comment="texlive-braids-doc-2021.186.2.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914758" comment="texlive-braille-2021.186.svn20655-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914759" comment="texlive-braille-doc-2021.186.svn20655-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914760" comment="texlive-braket-2021.186.svn17127-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914761" comment="texlive-braket-doc-2021.186.svn17127-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914762" comment="texlive-brandeis-dissertation-2021.186.3.11svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914763" comment="texlive-brandeis-dissertation-doc-2021.186.3.11svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914764" comment="texlive-brandeis-problemset-2021.186.0.0.5.5svn50991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914765" comment="texlive-brandeis-problemset-doc-2021.186.0.0.5.5svn50991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914766" comment="texlive-brandeis-thesis-2021.186.3.1svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914767" comment="texlive-brandeis-thesis-doc-2021.186.3.1svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914768" comment="texlive-breakcites-2021.186.svn21014-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914769" comment="texlive-breakcites-doc-2021.186.svn21014-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914770" comment="texlive-breakurl-2021.186.1.40svn29901-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914771" comment="texlive-breakurl-doc-2021.186.1.40svn29901-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914772" comment="texlive-bredzenie-2021.186.1.0svn44371-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914773" comment="texlive-bredzenie-doc-2021.186.1.0svn44371-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914774" comment="texlive-breqn-2021.186.0.0.98ksvn56422-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914775" comment="texlive-breqn-doc-2021.186.0.0.98ksvn56422-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914776" comment="texlive-bropd-2021.186.1.2svn35383-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914777" comment="texlive-bropd-doc-2021.186.1.2svn35383-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914778" comment="texlive-brushscr-2021.186.svn28363-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914779" comment="texlive-brushscr-doc-2021.186.svn28363-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914780" comment="texlive-brushscr-fonts-2021.186.svn28363-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914781" comment="texlive-bubblesort-2021.186.1.0svn56070-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914782" comment="texlive-bubblesort-doc-2021.186.1.0svn56070-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914783" comment="texlive-bullcntr-2021.186.0.0.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914784" comment="texlive-bullcntr-doc-2021.186.0.0.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914785" comment="texlive-bundledoc-2021.186.3.4svn55064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914786" comment="texlive-bundledoc-doc-2021.186.3.4svn55064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914787" comment="texlive-burmese-2021.186.svn25185-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914788" comment="texlive-burmese-doc-2021.186.svn25185-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914789" comment="texlive-burmese-fonts-2021.186.svn25185-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914790" comment="texlive-businesscard-qrcode-2021.186.1.2svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914791" comment="texlive-businesscard-qrcode-doc-2021.186.1.2svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914792" comment="texlive-bussproofs-2021.186.1.1svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914793" comment="texlive-bussproofs-doc-2021.186.1.1svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914794" comment="texlive-bussproofs-extra-2021.186.0.0.4svn51299-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914795" comment="texlive-bussproofs-extra-doc-2021.186.0.0.4svn51299-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914796" comment="texlive-bxbase-2021.186.1.2svn56528-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914797" comment="texlive-bxbase-doc-2021.186.1.2svn56528-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914798" comment="texlive-bxcalc-2021.186.1.1svn56431-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914799" comment="texlive-bxcalc-doc-2021.186.1.1svn56431-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914800" comment="texlive-bxcjkjatype-2021.186.0.0.3svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914801" comment="texlive-bxcjkjatype-doc-2021.186.0.0.3svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914802" comment="texlive-bxdpx-beamer-2021.186.0.0.3svn41813-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914803" comment="texlive-bxdpx-beamer-doc-2021.186.0.0.3svn41813-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914804" comment="texlive-bxdvidriver-2021.186.0.0.2asvn43219-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914805" comment="texlive-bxdvidriver-doc-2021.186.0.0.2asvn43219-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914806" comment="texlive-bxeepic-2021.186.0.0.2svn30559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914807" comment="texlive-bxeepic-doc-2021.186.0.0.2svn30559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914808" comment="texlive-bxenclose-2021.186.0.0.2svn40213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914809" comment="texlive-bxenclose-doc-2021.186.0.0.2svn40213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914810" comment="texlive-bxghost-2021.186.0.0.3.0svn53606-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914811" comment="texlive-bxghost-doc-2021.186.0.0.3.0svn53606-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914812" comment="texlive-bxjaholiday-2021.186.1.1.0svn57025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914813" comment="texlive-bxjaholiday-doc-2021.186.1.1.0svn57025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914814" comment="texlive-bxjalipsum-2021.186.0.0.3asvn43369-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914815" comment="texlive-bxjalipsum-doc-2021.186.0.0.3asvn43369-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914816" comment="texlive-bxjaprnind-2021.186.0.0.3bsvn45291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914817" comment="texlive-bxjaprnind-doc-2021.186.0.0.3bsvn45291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914818" comment="texlive-bxjatoucs-2021.186.0.0.2svn52509-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914819" comment="texlive-bxjatoucs-doc-2021.186.0.0.2svn52509-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914820" comment="texlive-bxjscls-2021.186.2.5svn57625-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914821" comment="texlive-bxjscls-doc-2021.186.2.5svn57625-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914822" comment="texlive-bxnewfont-2021.186.0.0.2bsvn44173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914823" comment="texlive-bxnewfont-doc-2021.186.0.0.2bsvn44173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914824" comment="texlive-bxorigcapt-2021.186.0.0.3svn48606-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914825" comment="texlive-bxorigcapt-doc-2021.186.0.0.3svn48606-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914826" comment="texlive-bxpapersize-2021.186.0.0.5svn56491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914827" comment="texlive-bxpapersize-doc-2021.186.0.0.5svn56491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914828" comment="texlive-bxpdfver-2021.186.0.0.5asvn57755-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914829" comment="texlive-bxpdfver-doc-2021.186.0.0.5asvn57755-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914830" comment="texlive-bxtexlogo-2021.186.0.0.4svn47230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914831" comment="texlive-bxtexlogo-doc-2021.186.0.0.4svn47230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914832" comment="texlive-bxwareki-2021.186.0.0.6svn51286-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914833" comment="texlive-bxwareki-doc-2021.186.0.0.6svn51286-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914834" comment="texlive-bytefield-2021.186.2.6svn56821-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914835" comment="texlive-bytefield-doc-2021.186.2.6svn56821-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914836" comment="texlive-c-pascal-2021.186.1.2svn18337-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914837" comment="texlive-c-pascal-doc-2021.186.1.2svn18337-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914838" comment="texlive-c90-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914839" comment="texlive-c90-doc-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914840" comment="texlive-cabin-2021.186.svn55907-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914841" comment="texlive-cabin-doc-2021.186.svn55907-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914842" comment="texlive-cabin-fonts-2021.186.svn55907-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914843" comment="texlive-cachepic-2021.186.1.0svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914844" comment="texlive-cachepic-doc-2021.186.1.0svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914845" comment="texlive-caladea-2021.186.svn34991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914846" comment="texlive-caladea-doc-2021.186.svn34991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914847" comment="texlive-caladea-fonts-2021.186.svn34991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914848" comment="texlive-calcage-2021.186.0.0.90svn27725-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914849" comment="texlive-calcage-doc-2021.186.0.0.90svn27725-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914850" comment="texlive-calctab-2021.186.0.0.6.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914851" comment="texlive-calctab-doc-2021.186.0.0.6.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914852" comment="texlive-calculation-2021.186.1.0svn35973-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914853" comment="texlive-calculation-doc-2021.186.1.0svn35973-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914854" comment="texlive-calculator-2021.186.2.0svn33041-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914855" comment="texlive-calculator-doc-2021.186.2.0svn33041-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914856" comment="texlive-calligra-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914857" comment="texlive-calligra-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914858" comment="texlive-calligra-type1-2021.186.001.000svn24302-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914859" comment="texlive-calligra-type1-doc-2021.186.001.000svn24302-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914860" comment="texlive-calligra-type1-fonts-2021.186.001.000svn24302-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914861" comment="texlive-callouts-2021.186.svn44899-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914862" comment="texlive-callouts-doc-2021.186.svn44899-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914863" comment="texlive-calrsfs-2021.186.svn17125-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914864" comment="texlive-calrsfs-doc-2021.186.svn17125-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914865" comment="texlive-cals-2021.186.2.4.2svn43003-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914866" comment="texlive-cals-doc-2021.186.2.4.2svn43003-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914867" comment="texlive-calxxxx-yyyy-2021.186.20.21asvn57282-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914868" comment="texlive-calxxxx-yyyy-doc-2021.186.20.21asvn57282-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914869" comment="texlive-cancel-2021.186.2.2svn32508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914870" comment="texlive-cancel-doc-2021.186.2.2svn32508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914871" comment="texlive-canoniclayout-2021.186.0.0.5svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914872" comment="texlive-canoniclayout-doc-2021.186.0.0.5svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914873" comment="texlive-cantarell-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914874" comment="texlive-cantarell-doc-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914875" comment="texlive-cantarell-fonts-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914876" comment="texlive-capt-of-2021.186.svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914877" comment="texlive-capt-of-doc-2021.186.svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914878" comment="texlive-captcont-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914879" comment="texlive-captcont-doc-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914880" comment="texlive-captdef-2021.186.svn17353-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914881" comment="texlive-captdef-doc-2021.186.svn17353-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914882" comment="texlive-caption-2021.186.svn56771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914883" comment="texlive-caption-doc-2021.186.svn56771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914884" comment="texlive-carbohydrates-2021.186.0.0.1svn39000-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914885" comment="texlive-carbohydrates-doc-2021.186.0.0.1svn39000-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914886" comment="texlive-carlisle-2021.186.svn56753-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914887" comment="texlive-carlisle-doc-2021.186.svn56753-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914888" comment="texlive-carlito-2021.186.svn35002-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914889" comment="texlive-carlito-doc-2021.186.svn35002-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914890" comment="texlive-carlito-fonts-2021.186.svn35002-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914891" comment="texlive-carolmin-ps-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914892" comment="texlive-carolmin-ps-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914893" comment="texlive-carolmin-ps-fonts-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914894" comment="texlive-cascade-2021.186.1.1svn55759-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914895" comment="texlive-cascade-doc-2021.186.1.1svn55759-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914896" comment="texlive-cascadia-code-2021.186.0.0.0.1svn57478-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914897" comment="texlive-cascadia-code-doc-2021.186.0.0.0.1svn57478-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914898" comment="texlive-cascadia-code-fonts-2021.186.0.0.0.1svn57478-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914899" comment="texlive-cascadilla-2021.186.1.8.2svn25144-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914900" comment="texlive-cascadilla-doc-2021.186.1.8.2svn25144-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914901" comment="texlive-cases-2021.186.3.2svn54682-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914902" comment="texlive-cases-doc-2021.186.3.2svn54682-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914903" comment="texlive-casyl-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914904" comment="texlive-casyl-doc-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914905" comment="texlive-catchfile-2021.186.1.8svn53084-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914906" comment="texlive-catchfile-doc-2021.186.1.8svn53084-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914907" comment="texlive-catchfilebetweentags-2021.186.1.1svn21476-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914908" comment="texlive-catchfilebetweentags-doc-2021.186.1.1svn21476-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914909" comment="texlive-catcodes-2021.186.r0.2svn38859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914910" comment="texlive-catcodes-doc-2021.186.r0.2svn38859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914911" comment="texlive-catechis-2021.186.2.5svn49061-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914912" comment="texlive-catechis-doc-2021.186.2.5svn49061-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914913" comment="texlive-catoptions-2021.186.0.0.2.7hsvn35069-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914914" comment="texlive-catoptions-doc-2021.186.0.0.2.7hsvn35069-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914915" comment="texlive-causets-2021.186.1.1svn57139-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914916" comment="texlive-causets-doc-2021.186.1.1svn57139-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914917" comment="texlive-cbcoptic-2021.186.0.0.2svn16666-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914918" comment="texlive-cbcoptic-doc-2021.186.0.0.2svn16666-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914919" comment="texlive-cbcoptic-fonts-2021.186.0.0.2svn16666-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914920" comment="texlive-cbfonts-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914921" comment="texlive-cbfonts-doc-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914922" comment="texlive-cbfonts-fd-2021.186.1.2svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914923" comment="texlive-cbfonts-fd-doc-2021.186.1.2svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914924" comment="texlive-cbfonts-fonts-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914925" comment="texlive-cc-pl-2021.186.1.02.3svn58602-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914926" comment="texlive-cc-pl-doc-2021.186.1.02.3svn58602-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914927" comment="texlive-cc-pl-fonts-2021.186.1.02.3svn58602-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914928" comment="texlive-ccaption-2021.186.3.2csvn23443-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914929" comment="texlive-ccaption-doc-2021.186.3.2csvn23443-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914930" comment="texlive-ccfonts-2021.186.1.2svn54686-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914931" comment="texlive-ccfonts-doc-2021.186.1.2svn54686-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914932" comment="texlive-ccicons-2021.186.1.6svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914933" comment="texlive-ccicons-doc-2021.186.1.6svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914934" comment="texlive-ccicons-fonts-2021.186.1.6svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914935" comment="texlive-cclicenses-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914936" comment="texlive-cclicenses-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914937" comment="texlive-ccool-2021.186.3.1svn56636-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914938" comment="texlive-ccool-doc-2021.186.3.1svn56636-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914939" comment="texlive-cd-2021.186.1.4svn34452-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914940" comment="texlive-cd-cover-2021.186.1.0svn17121-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914941" comment="texlive-cd-cover-doc-2021.186.1.0svn17121-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914942" comment="texlive-cd-doc-2021.186.1.4svn34452-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914943" comment="texlive-cdpbundl-2021.186.0.0.36dsvn46613-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914944" comment="texlive-cdpbundl-doc-2021.186.0.0.36dsvn46613-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914945" comment="texlive-cell-2021.186.svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914946" comment="texlive-cell-doc-2021.186.svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914947" comment="texlive-cellprops-2021.186.2.0svn57599-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914948" comment="texlive-cellprops-doc-2021.186.2.0svn57599-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914949" comment="texlive-cellspace-2021.186.1.8.1svn50374-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914950" comment="texlive-cellspace-doc-2021.186.1.8.1svn50374-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914951" comment="texlive-celtic-2021.186.1.1svn39797-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914952" comment="texlive-celtic-doc-2021.186.1.1svn39797-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914953" comment="texlive-censor-2021.186.3.22svn49168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914954" comment="texlive-censor-doc-2021.186.3.22svn49168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914955" comment="texlive-centeredline-2021.186.1.1svn50971-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914956" comment="texlive-centeredline-doc-2021.186.1.1svn50971-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914957" comment="texlive-centerlastline-2021.186.1.0svn56644-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914958" comment="texlive-centerlastline-doc-2021.186.1.0svn56644-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914959" comment="texlive-cesenaexam-2021.186.0.0.2svn44960-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914960" comment="texlive-cesenaexam-doc-2021.186.0.0.2svn44960-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914961" comment="texlive-cfr-initials-2021.186.1.01svn36728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914962" comment="texlive-cfr-initials-doc-2021.186.1.01svn36728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914963" comment="texlive-cfr-lm-2021.186.1.5svn36195-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914964" comment="texlive-cfr-lm-doc-2021.186.1.5svn36195-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914965" comment="texlive-changebar-2021.186.3.6csvn46919-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914966" comment="texlive-changebar-doc-2021.186.3.6csvn46919-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914967" comment="texlive-changelayout-2021.186.1.0svn16094-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914968" comment="texlive-changelayout-doc-2021.186.1.0svn16094-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914969" comment="texlive-changelog-2021.186.2.4.0svn56338-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914970" comment="texlive-changelog-doc-2021.186.2.4.0svn56338-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914971" comment="texlive-changepage-2021.186.1.0csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914972" comment="texlive-changepage-doc-2021.186.1.0csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914973" comment="texlive-changes-2021.186.4.0.1svn57756-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914974" comment="texlive-changes-doc-2021.186.4.0.1svn57756-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914975" comment="texlive-chappg-2021.186.2.1bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914976" comment="texlive-chappg-doc-2021.186.2.1bsvn15878-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249758" version="1" class="patch">
	<metadata>
		<title>texlive-chapterfolder-2021.186.2.0.1svn15878-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-chapterfolder-2021.186.2.0.1svn15878-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009914977" comment="texlive-chapterfolder-2021.186.2.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914978" comment="texlive-chapterfolder-doc-2021.186.2.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914979" comment="texlive-charissil-2021.186.5.0svn55920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914980" comment="texlive-charissil-doc-2021.186.5.0svn55920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914981" comment="texlive-charissil-fonts-2021.186.5.0svn55920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914982" comment="texlive-charter-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914983" comment="texlive-charter-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914984" comment="texlive-charter-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914985" comment="texlive-chbibref-2021.186.1.0svn17120-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914986" comment="texlive-chbibref-doc-2021.186.1.0svn17120-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914987" comment="texlive-cheatsheet-2021.186.0.0.8svn45069-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914988" comment="texlive-cheatsheet-doc-2021.186.0.0.8svn45069-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914989" comment="texlive-checkcites-2021.186.2.4svn52022-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914990" comment="texlive-checkcites-doc-2021.186.2.4svn52022-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914991" comment="texlive-checkend-2021.186.1.0svn51475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914992" comment="texlive-checkend-doc-2021.186.1.0svn51475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914993" comment="texlive-checklistings-2021.186.1.0svn38300-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914994" comment="texlive-checklistings-doc-2021.186.1.0svn38300-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914995" comment="texlive-chem-journal-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914996" comment="texlive-chemarrow-2021.186.0.0.9svn17146-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914997" comment="texlive-chemarrow-doc-2021.186.0.0.9svn17146-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914998" comment="texlive-chemarrow-fonts-2021.186.0.0.9svn17146-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009914999" comment="texlive-chembst-2021.186.0.0.2.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915000" comment="texlive-chembst-doc-2021.186.0.0.2.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915001" comment="texlive-chemcompounds-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915002" comment="texlive-chemcompounds-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915003" comment="texlive-chemcono-2021.186.1.3svn17119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915004" comment="texlive-chemcono-doc-2021.186.1.3svn17119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915005" comment="texlive-chemexec-2021.186.1.0svn21632-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915006" comment="texlive-chemexec-doc-2021.186.1.0svn21632-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915007" comment="texlive-chemfig-2021.186.1.6asvn58014-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915008" comment="texlive-chemfig-doc-2021.186.1.6asvn58014-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915009" comment="texlive-chemformula-2021.186.4.16svn57206-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915010" comment="texlive-chemformula-doc-2021.186.4.16svn57206-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915011" comment="texlive-chemgreek-2021.186.1.1asvn53437-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915012" comment="texlive-chemgreek-doc-2021.186.1.1asvn53437-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915013" comment="texlive-chemmacros-2021.186.5.11asvn56983-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915014" comment="texlive-chemmacros-doc-2021.186.5.11asvn56983-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915015" comment="texlive-chemnum-2021.186.1.3asvn57490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915016" comment="texlive-chemnum-doc-2021.186.1.3asvn57490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915017" comment="texlive-chemplants-2021.186.0.0.9.8svn52863-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915018" comment="texlive-chemplants-doc-2021.186.0.0.9.8svn52863-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915019" comment="texlive-chemschemex-2021.186.1.2svn46723-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915020" comment="texlive-chemschemex-doc-2021.186.1.2svn46723-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915021" comment="texlive-chemsec-2021.186.1.12asvn46972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915022" comment="texlive-chemsec-doc-2021.186.1.12asvn46972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915023" comment="texlive-chemstyle-2021.186.2.0msvn31096-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915024" comment="texlive-chemstyle-doc-2021.186.2.0msvn31096-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915025" comment="texlive-cherokee-2021.186.svn21046-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915026" comment="texlive-cherokee-doc-2021.186.svn21046-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915027" comment="texlive-chess-2021.186.1.2svn20582-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915028" comment="texlive-chess-doc-2021.186.1.2svn20582-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915029" comment="texlive-chess-problem-diagrams-2021.186.1.15svn53302-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915030" comment="texlive-chess-problem-diagrams-doc-2021.186.1.15svn53302-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915031" comment="texlive-chessboard-2021.186.1.9svn56833-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915032" comment="texlive-chessboard-doc-2021.186.1.9svn56833-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915033" comment="texlive-chessfss-2021.186.1.2asvn19440-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915034" comment="texlive-chessfss-doc-2021.186.1.2asvn19440-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915035" comment="texlive-chet-2021.186.2.2svn45081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915036" comment="texlive-chet-doc-2021.186.2.2svn45081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915037" comment="texlive-chextras-2021.186.1.01svn27118-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915038" comment="texlive-chextras-doc-2021.186.1.01svn27118-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915039" comment="texlive-chhaya-2021.186.0.0.2svn57508-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915040" comment="texlive-chhaya-doc-2021.186.0.0.2svn57508-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915041" comment="texlive-chicago-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915042" comment="texlive-chicago-annote-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915043" comment="texlive-chicago-annote-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915044" comment="texlive-chicagoa-2021.186.svn52567-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915045" comment="texlive-chickenize-2021.186.0.0.3svn57325-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915046" comment="texlive-chickenize-doc-2021.186.0.0.3svn57325-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915047" comment="texlive-chifoot-2021.186.1.0svn57312-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915048" comment="texlive-chifoot-doc-2021.186.1.0svn57312-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915049" comment="texlive-childdoc-2021.186.2.0svn49543-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915050" comment="texlive-childdoc-doc-2021.186.2.0svn49543-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915051" comment="texlive-chinese-jfm-2021.186.1.1.1svn57758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915052" comment="texlive-chinese-jfm-doc-2021.186.1.1.1svn57758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915053" comment="texlive-chivo-2021.186.2.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915054" comment="texlive-chivo-doc-2021.186.2.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915055" comment="texlive-chivo-fonts-2021.186.2.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915056" comment="texlive-chkfloat-2021.186.0.0.1svn27473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915057" comment="texlive-chkfloat-doc-2021.186.0.0.1svn27473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915058" comment="texlive-chklref-2021.186.3.1.2svn52649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915059" comment="texlive-chklref-doc-2021.186.3.1.2svn52649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915060" comment="texlive-chktex-2021.186.1.7.6svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915061" comment="texlive-chktex-doc-2021.186.1.7.6svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915062" comment="texlive-chletter-2021.186.2.0svn20060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915063" comment="texlive-chletter-doc-2021.186.2.0svn20060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915064" comment="texlive-chngcntr-2021.186.1.1asvn47577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915065" comment="texlive-chngcntr-doc-2021.186.1.1asvn47577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915066" comment="texlive-chordbars-2021.186.1.1svn49569-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915067" comment="texlive-chordbars-doc-2021.186.1.1svn49569-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915068" comment="texlive-chordbox-2021.186.1.0svn51000-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915069" comment="texlive-chordbox-doc-2021.186.1.0svn51000-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915070" comment="texlive-chronology-2021.186.1.1.1svn37934-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915071" comment="texlive-chronology-doc-2021.186.1.1.1svn37934-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915072" comment="texlive-chronosys-2021.186.1.2svn26700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915073" comment="texlive-chronosys-doc-2021.186.1.2svn26700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915074" comment="texlive-chs-physics-report-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915075" comment="texlive-chs-physics-report-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915076" comment="texlive-chscite-2021.186.2.9999svn28552-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915077" comment="texlive-chscite-doc-2021.186.2.9999svn28552-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915078" comment="texlive-churchslavonic-2021.186.0.0.2.1svn42751-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915079" comment="texlive-churchslavonic-doc-2021.186.0.0.2.1svn42751-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915080" comment="texlive-cinzel-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915081" comment="texlive-cinzel-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915082" comment="texlive-cinzel-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915083" comment="texlive-circ-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915084" comment="texlive-circ-doc-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915085" comment="texlive-circledsteps-2021.186.1.3svn53382-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915086" comment="texlive-circledsteps-doc-2021.186.1.3svn53382-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915087" comment="texlive-circuit-macros-2021.186.9.5svn57308-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915088" comment="texlive-circuit-macros-doc-2021.186.9.5svn57308-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915089" comment="texlive-circuitikz-2021.186.1.3.3svn58757-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915090" comment="texlive-circuitikz-doc-2021.186.1.3.3svn58757-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915091" comment="texlive-cite-2021.186.5.5svn36428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915092" comment="texlive-cite-doc-2021.186.5.5svn36428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915093" comment="texlive-citeall-2021.186.1.4svn45975-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915094" comment="texlive-citeall-doc-2021.186.1.4svn45975-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915095" comment="texlive-citeref-2021.186.1.1svn47407-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915096" comment="texlive-citeref-doc-2021.186.1.1svn47407-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915097" comment="texlive-cje-2021.186.1.06svn46721-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915098" comment="texlive-cje-doc-2021.186.1.06svn46721-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915099" comment="texlive-cjhebrew-2021.186.0.0.2asvn43444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915100" comment="texlive-cjhebrew-doc-2021.186.0.0.2asvn43444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915101" comment="texlive-cjhebrew-fonts-2021.186.0.0.2asvn43444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915102" comment="texlive-cjk-2021.186.4.8.4svn36951-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915103" comment="texlive-cjk-doc-2021.186.4.8.4svn36951-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915104" comment="texlive-cjk-gs-integrate-2021.186.20201206.0svn57081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915105" comment="texlive-cjk-gs-integrate-doc-2021.186.20201206.0svn57081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915106" comment="texlive-cjk-ko-2021.186.1.9svn58081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915107" comment="texlive-cjk-ko-doc-2021.186.1.9svn58081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915108" comment="texlive-cjkpunct-2021.186.4.8.4svn41119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915109" comment="texlive-cjkpunct-doc-2021.186.4.8.4svn41119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915110" comment="texlive-cjkutils-2021.186.4.8.4svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915111" comment="texlive-cjkutils-doc-2021.186.4.8.4svn52851-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915112" comment="texlive-clara-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915113" comment="texlive-clara-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915114" comment="texlive-clara-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915115" comment="texlive-classics-2021.186.0.0.1asvn53671-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915116" comment="texlive-classics-doc-2021.186.0.0.1asvn53671-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915117" comment="texlive-classicthesis-2021.186.4.6svn48041-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915118" comment="texlive-classicthesis-doc-2021.186.4.6svn48041-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915119" comment="texlive-classpack-2021.186.1.19svn55218-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915120" comment="texlive-classpack-doc-2021.186.1.19svn55218-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915121" comment="texlive-cleanthesis-2021.186.0.0.4.0svn51472-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915122" comment="texlive-cleanthesis-doc-2021.186.0.0.4.0svn51472-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915123" comment="texlive-clearsans-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915124" comment="texlive-clearsans-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915125" comment="texlive-clearsans-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915126" comment="texlive-clefval-2021.186.0.0.1svn55985-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915127" comment="texlive-clefval-doc-2021.186.0.0.1svn55985-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915128" comment="texlive-cleveref-2021.186.0.0.21.4svn47525-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915129" comment="texlive-cleveref-doc-2021.186.0.0.21.4svn47525-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915130" comment="texlive-clipboard-2021.186.0.0.3svn47747-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915131" comment="texlive-clipboard-doc-2021.186.0.0.3svn47747-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915132" comment="texlive-clock-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915133" comment="texlive-clock-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915134" comment="texlive-clojure-pamphlet-2021.186.1.3svn52082-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915135" comment="texlive-clojure-pamphlet-doc-2021.186.1.3svn52082-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915136" comment="texlive-cloze-2021.186.1.6svn55763-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915137" comment="texlive-cloze-doc-2021.186.1.6svn55763-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915138" comment="texlive-clrdblpg-2021.186.1.0svn47511-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915139" comment="texlive-clrdblpg-doc-2021.186.1.0svn47511-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915140" comment="texlive-clrscode-2021.186.1.7svn51136-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915141" comment="texlive-clrscode-doc-2021.186.1.7svn51136-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915142" comment="texlive-clrscode3e-2021.186.svn51137-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915143" comment="texlive-clrscode3e-doc-2021.186.svn51137-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915144" comment="texlive-clrstrip-2021.186.svn53537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915145" comment="texlive-clrstrip-doc-2021.186.svn53537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915146" comment="texlive-cluttex-2021.186.0.0.5svn53698-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915147" comment="texlive-cluttex-doc-2021.186.0.0.5svn53698-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915148" comment="texlive-cm-2021.186.svn57963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915149" comment="texlive-cm-doc-2021.186.svn57963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915150" comment="texlive-cm-lgc-2021.186.0.0.5svn28250-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915151" comment="texlive-cm-lgc-doc-2021.186.0.0.5svn28250-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915152" comment="texlive-cm-lgc-fonts-2021.186.0.0.5svn28250-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915153" comment="texlive-cm-mf-extra-bold-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915154" comment="texlive-cm-super-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915155" comment="texlive-cm-super-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915156" comment="texlive-cm-super-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915157" comment="texlive-cm-unicode-2021.186.0.0.7.0svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915158" comment="texlive-cm-unicode-doc-2021.186.0.0.7.0svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915159" comment="texlive-cm-unicode-fonts-2021.186.0.0.7.0svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915160" comment="texlive-cmap-2021.186.1.0jsvn57640-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915161" comment="texlive-cmap-doc-2021.186.1.0jsvn57640-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915162" comment="texlive-cmarrows-2021.186.0.0.9svn24378-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915163" comment="texlive-cmarrows-doc-2021.186.0.0.9svn24378-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915164" comment="texlive-cmathbb-2021.186.1.0svn56414-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915165" comment="texlive-cmathbb-doc-2021.186.1.0svn56414-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915166" comment="texlive-cmathbb-fonts-2021.186.1.0svn56414-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915167" comment="texlive-cmbright-2021.186.8.1svn21107-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915168" comment="texlive-cmbright-doc-2021.186.8.1svn21107-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915169" comment="texlive-cmcyr-2021.186.svn39273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915170" comment="texlive-cmcyr-doc-2021.186.svn39273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915171" comment="texlive-cmcyr-fonts-2021.186.svn39273-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915172" comment="texlive-cmdstring-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915173" comment="texlive-cmdstring-doc-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915174" comment="texlive-cmdtrack-2021.186.svn28910-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915175" comment="texlive-cmdtrack-doc-2021.186.svn28910-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915176" comment="texlive-cmexb-2021.186.svn54074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915177" comment="texlive-cmexb-doc-2021.186.svn54074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915178" comment="texlive-cmexb-fonts-2021.186.svn54074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915179" comment="texlive-cmextra-2021.186.svn57866-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915180" comment="texlive-cmll-2021.186.svn17964-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915181" comment="texlive-cmll-doc-2021.186.svn17964-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915182" comment="texlive-cmll-fonts-2021.186.svn17964-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915183" comment="texlive-cmpica-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915184" comment="texlive-cmpica-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915185" comment="texlive-cmpj-2021.186.3.03svn58506-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915186" comment="texlive-cmpj-doc-2021.186.3.03svn58506-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915187" comment="texlive-cmsd-2021.186.svn18787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915188" comment="texlive-cmsd-doc-2021.186.svn18787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915189" comment="texlive-cmsrb-2021.186.4.0svn54706-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915190" comment="texlive-cmsrb-doc-2021.186.4.0svn54706-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915191" comment="texlive-cmsrb-fonts-2021.186.4.0svn54706-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915192" comment="texlive-cmtiup-2021.186.2.1svn39728-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915193" comment="texlive-cmtiup-doc-2021.186.2.1svn39728-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915194" comment="texlive-cmupint-2021.186.1.1svn54735-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915195" comment="texlive-cmupint-doc-2021.186.1.1svn54735-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915196" comment="texlive-cmupint-fonts-2021.186.1.1svn54735-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915197" comment="texlive-cnbwp-2021.186.svn32550-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915198" comment="texlive-cnbwp-doc-2021.186.svn32550-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915199" comment="texlive-cnltx-2021.186.0.0.15svn55265-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915200" comment="texlive-cnltx-doc-2021.186.0.0.15svn55265-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915201" comment="texlive-cns-2021.186.4.2.0svn45677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915202" comment="texlive-cns-doc-2021.186.4.2.0svn45677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915203" comment="texlive-cntformats-2021.186.0.0.7svn34668-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915204" comment="texlive-cntformats-doc-2021.186.0.0.7svn34668-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915205" comment="texlive-cntperchap-2021.186.0.0.3svn37572-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915206" comment="texlive-cntperchap-doc-2021.186.0.0.3svn37572-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915207" comment="texlive-cochineal-2021.186.1.066svn58717-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915208" comment="texlive-cochineal-doc-2021.186.1.066svn58717-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915209" comment="texlive-cochineal-fonts-2021.186.1.066svn58717-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915210" comment="texlive-codeanatomy-2021.186.0.0.4_alphasvn51627-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915211" comment="texlive-codeanatomy-doc-2021.186.0.0.4_alphasvn51627-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915212" comment="texlive-codedoc-2021.186.0.0.3svn17630-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915213" comment="texlive-codedoc-doc-2021.186.0.0.3svn17630-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915214" comment="texlive-codepage-2021.186.svn51502-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915215" comment="texlive-codepage-doc-2021.186.svn51502-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915216" comment="texlive-codesection-2021.186.0.0.1svn34481-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915217" comment="texlive-codesection-doc-2021.186.0.0.1svn34481-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915218" comment="texlive-codicefiscaleitaliano-2021.186.1.2svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915219" comment="texlive-codicefiscaleitaliano-doc-2021.186.1.2svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915220" comment="texlive-coelacanth-2021.186.0.0.005svn54736-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915221" comment="texlive-coelacanth-doc-2021.186.0.0.005svn54736-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915222" comment="texlive-coelacanth-fonts-2021.186.0.0.005svn54736-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915223" comment="texlive-collcell-2021.186.0.0.5svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915224" comment="texlive-collcell-doc-2021.186.0.0.5svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915225" comment="texlive-collectbox-2021.186.0.0.4bsvn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915226" comment="texlive-collectbox-doc-2021.186.0.0.4bsvn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915227" comment="texlive-collref-2021.186.2.0csvn46358-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915228" comment="texlive-collref-doc-2021.186.2.0csvn46358-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915229" comment="texlive-colophon-2021.186.1.1svn47913-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915230" comment="texlive-colophon-doc-2021.186.1.1svn47913-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915231" comment="texlive-color-edits-2021.186.1.1svn56707-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915232" comment="texlive-color-edits-doc-2021.186.1.1svn56707-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915233" comment="texlive-colordoc-2021.186.svn18270-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915234" comment="texlive-colordoc-doc-2021.186.svn18270-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915235" comment="texlive-colorinfo-2021.186.0.0.3csvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915236" comment="texlive-colorinfo-doc-2021.186.0.0.3csvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915237" comment="texlive-coloring-2021.186.0.0.2svn41042-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915238" comment="texlive-coloring-doc-2021.186.0.0.2svn41042-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915239" comment="texlive-colorist-2021.186.svn58434-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915240" comment="texlive-colorist-doc-2021.186.svn58434-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915241" comment="texlive-colorprofiles-2021.186.20181105svn49086-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915242" comment="texlive-colorprofiles-doc-2021.186.20181105svn49086-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915243" comment="texlive-colorsep-2021.186.svn13293-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915244" comment="texlive-colorspace-2021.186.1.3svn50585-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915245" comment="texlive-colorspace-doc-2021.186.1.3svn50585-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915246" comment="texlive-colortab-2021.186.1.0svn22155-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915247" comment="texlive-colortab-doc-2021.186.1.0svn22155-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915248" comment="texlive-colortbl-2021.186.1.0esvn53545-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915249" comment="texlive-colortbl-doc-2021.186.1.0esvn53545-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915250" comment="texlive-colorwav-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915251" comment="texlive-colorwav-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915252" comment="texlive-colorweb-2021.186.1.3svn31490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915253" comment="texlive-colorweb-doc-2021.186.1.3svn31490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915254" comment="texlive-colourchange-2021.186.1.22svn21741-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915255" comment="texlive-colourchange-doc-2021.186.1.22svn21741-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915256" comment="texlive-combelow-2021.186.0.0.99fsvn18462-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915257" comment="texlive-combelow-doc-2021.186.0.0.99fsvn18462-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915258" comment="texlive-combine-2021.186.0.0.7asvn19361-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915259" comment="texlive-combine-doc-2021.186.0.0.7asvn19361-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915260" comment="texlive-combinedgraphics-2021.186.0.0.2.2svn27198-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915261" comment="texlive-combinedgraphics-doc-2021.186.0.0.2.2svn27198-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915262" comment="texlive-combofont-2021.186.0.0.3svn51348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915263" comment="texlive-combofont-doc-2021.186.0.0.3svn51348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915264" comment="texlive-comfortaa-2021.186.3.2svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915265" comment="texlive-comfortaa-doc-2021.186.3.2svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915266" comment="texlive-comfortaa-fonts-2021.186.3.2svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915267" comment="texlive-comicneue-2021.186.1.2svn54891-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915268" comment="texlive-comicneue-doc-2021.186.1.2svn54891-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915269" comment="texlive-comicneue-fonts-2021.186.1.2svn54891-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915270" comment="texlive-comma-2021.186.1.2svn18259-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915271" comment="texlive-comma-doc-2021.186.1.2svn18259-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915272" comment="texlive-commado-2021.186.r0.11asvn38875-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915273" comment="texlive-commado-doc-2021.186.r0.11asvn38875-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915274" comment="texlive-commath-2021.186.0.0.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915275" comment="texlive-commath-doc-2021.186.0.0.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915276" comment="texlive-commedit-2021.186.1.02svn50116-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915277" comment="texlive-commedit-doc-2021.186.1.02svn50116-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915278" comment="texlive-comment-2021.186.3.8svn41927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915279" comment="texlive-comment-doc-2021.186.3.8svn41927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915280" comment="texlive-commutative-diagrams-2021.186.1.0.1svn55526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915281" comment="texlive-commutative-diagrams-doc-2021.186.1.0.1svn55526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915282" comment="texlive-compactbib-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915283" comment="texlive-compare-2021.186.svn54265-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915284" comment="texlive-competences-2021.186.1.0svn47573-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915285" comment="texlive-competences-doc-2021.186.1.0svn47573-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915286" comment="texlive-complexity-2021.186.0.0.81asvn45322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915287" comment="texlive-complexity-doc-2021.186.0.0.81asvn45322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915288" comment="texlive-components-of-TeX-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915289" comment="texlive-comprehensive-2021.186.13.0svn55667-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915290" comment="texlive-computational-complexity-2021.186.2.25fsvn44847-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915291" comment="texlive-computational-complexity-doc-2021.186.2.25fsvn44847-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915292" comment="texlive-concepts-2021.186.0.0.0.5_r1svn29020-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915293" comment="texlive-concepts-doc-2021.186.0.0.0.5_r1svn29020-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915294" comment="texlive-concmath-2021.186.svn17219-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915295" comment="texlive-concmath-doc-2021.186.svn17219-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915296" comment="texlive-concmath-fonts-2021.186.svn17218-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915297" comment="texlive-concmath-fonts-doc-2021.186.svn17218-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915298" comment="texlive-concprog-2021.186.svn18791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915299" comment="texlive-concprog-doc-2021.186.svn18791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915300" comment="texlive-concrete-2021.186.svn57963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915301" comment="texlive-concrete-doc-2021.186.svn57963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915302" comment="texlive-conditext-2021.186.1.5svn55387-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915303" comment="texlive-conditext-doc-2021.186.1.5svn55387-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249759" version="1" class="patch">
	<metadata>
		<title>texlive-confproc-2021.186.0.0.8svn29349-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-confproc-2021.186.0.0.8svn29349-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009915304" comment="texlive-confproc-2021.186.0.0.8svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915305" comment="texlive-confproc-doc-2021.186.0.0.8svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915306" comment="texlive-constants-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915307" comment="texlive-constants-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915308" comment="texlive-conteq-2021.186.0.0.1.1svn37868-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915309" comment="texlive-conteq-doc-2021.186.0.0.1.1svn37868-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915310" comment="texlive-context-2021.186.svn58167-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915311" comment="texlive-context-account-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915312" comment="texlive-context-account-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915313" comment="texlive-context-algorithmic-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915314" comment="texlive-context-algorithmic-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915315" comment="texlive-context-animation-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915316" comment="texlive-context-animation-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915317" comment="texlive-context-annotation-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915318" comment="texlive-context-annotation-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915319" comment="texlive-context-bnf-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915320" comment="texlive-context-bnf-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915321" comment="texlive-context-chromato-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915322" comment="texlive-context-chromato-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915323" comment="texlive-context-cmscbf-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915324" comment="texlive-context-cmscbf-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915325" comment="texlive-context-cmttbf-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915326" comment="texlive-context-cmttbf-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915327" comment="texlive-context-construction-plan-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915328" comment="texlive-context-construction-plan-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915329" comment="texlive-context-cyrillicnumbers-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915330" comment="texlive-context-cyrillicnumbers-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915331" comment="texlive-context-degrade-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915332" comment="texlive-context-degrade-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915333" comment="texlive-context-doc-2021.186.svn58167-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915334" comment="texlive-context-fancybreak-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915335" comment="texlive-context-fancybreak-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915336" comment="texlive-context-filter-2021.186.svn55718-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915337" comment="texlive-context-filter-doc-2021.186.svn55718-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915338" comment="texlive-context-fonts-2021.186.svn58167-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915339" comment="texlive-context-french-2021.186.svn54215-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915340" comment="texlive-context-french-doc-2021.186.svn54215-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915341" comment="texlive-context-fullpage-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915342" comment="texlive-context-fullpage-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915343" comment="texlive-context-gantt-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915344" comment="texlive-context-gantt-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915345" comment="texlive-context-gnuplot-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915346" comment="texlive-context-gnuplot-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915347" comment="texlive-context-handlecsv-2021.186.svn51306-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915348" comment="texlive-context-handlecsv-doc-2021.186.svn51306-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915349" comment="texlive-context-inifile-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915350" comment="texlive-context-inifile-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915351" comment="texlive-context-layout-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915352" comment="texlive-context-layout-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915353" comment="texlive-context-letter-2021.186.svn56073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915354" comment="texlive-context-letter-doc-2021.186.svn56073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915355" comment="texlive-context-lettrine-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915356" comment="texlive-context-lettrine-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915357" comment="texlive-context-mathsets-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915358" comment="texlive-context-mathsets-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915359" comment="texlive-context-notes-zh-cn-2021.186.svn23171-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915360" comment="texlive-context-rst-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915361" comment="texlive-context-rst-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915362" comment="texlive-context-ruby-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915363" comment="texlive-context-ruby-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915364" comment="texlive-context-simplefonts-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915365" comment="texlive-context-simplefonts-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915366" comment="texlive-context-simpleslides-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915367" comment="texlive-context-simpleslides-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915368" comment="texlive-context-title-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915369" comment="texlive-context-title-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915370" comment="texlive-context-transliterator-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915371" comment="texlive-context-transliterator-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915372" comment="texlive-context-typearea-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915373" comment="texlive-context-typearea-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915374" comment="texlive-context-typescripts-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915375" comment="texlive-context-typescripts-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915376" comment="texlive-context-vim-2021.186.svn58082-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915377" comment="texlive-context-vim-doc-2021.186.svn58082-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915378" comment="texlive-context-visualcounter-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915379" comment="texlive-context-visualcounter-doc-2021.186.svn47085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915380" comment="texlive-continue-2021.186.0.0.2svn49449-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915381" comment="texlive-continue-doc-2021.186.0.0.2svn49449-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915382" comment="texlive-contour-2021.186.2.14svn18950-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915383" comment="texlive-contour-doc-2021.186.2.14svn18950-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915384" comment="texlive-contracard-2021.186.2.0.0svn50217-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915385" comment="texlive-contracard-doc-2021.186.2.0.0svn50217-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915386" comment="texlive-conv-xkv-2021.186.svn43558-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915387" comment="texlive-conv-xkv-doc-2021.186.svn43558-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915388" comment="texlive-convbkmk-2021.186.0.0.30svn49252-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915389" comment="texlive-convbkmk-doc-2021.186.0.0.30svn49252-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915390" comment="texlive-cooking-2021.186.0.0.9bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915391" comment="texlive-cooking-doc-2021.186.0.0.9bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915392" comment="texlive-cooking-units-2021.186.1.46svn53403-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915393" comment="texlive-cooking-units-doc-2021.186.1.46svn53403-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915394" comment="texlive-cookingsymbols-2021.186.1.1svn35929-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915395" comment="texlive-cookingsymbols-doc-2021.186.1.1svn35929-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915396" comment="texlive-cool-2021.186.1.35svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915397" comment="texlive-cool-doc-2021.186.1.35svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915398" comment="texlive-coollist-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915399" comment="texlive-coollist-doc-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915400" comment="texlive-coolstr-2021.186.2.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915401" comment="texlive-coolstr-doc-2021.186.2.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915402" comment="texlive-coolthms-2021.186.1.2svn29062-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915403" comment="texlive-coolthms-doc-2021.186.1.2svn29062-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915404" comment="texlive-cooltooltips-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915405" comment="texlive-cooltooltips-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915406" comment="texlive-coordsys-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915407" comment="texlive-coordsys-doc-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915408" comment="texlive-copyedit-2021.186.1.6svn37928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915409" comment="texlive-copyedit-doc-2021.186.1.6svn37928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915410" comment="texlive-copyrightbox-2021.186.0.0.1svn24829-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915411" comment="texlive-copyrightbox-doc-2021.186.0.0.1svn24829-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915412" comment="texlive-cormorantgaramond-2021.186.3.601svn54696-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915413" comment="texlive-cormorantgaramond-doc-2021.186.3.601svn54696-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915414" comment="texlive-cormorantgaramond-fonts-2021.186.3.601svn54696-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915415" comment="texlive-correctmathalign-2021.186.1.1svn44131-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915416" comment="texlive-correctmathalign-doc-2021.186.1.1svn44131-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915417" comment="texlive-coseoul-2021.186.1.1svn23862-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915418" comment="texlive-coseoul-doc-2021.186.1.1svn23862-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915419" comment="texlive-countriesofeurope-2021.186.0.0.23svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915420" comment="texlive-countriesofeurope-doc-2021.186.0.0.23svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915421" comment="texlive-countriesofeurope-fonts-2021.186.0.0.23svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915422" comment="texlive-counttexruns-2021.186.1.00asvn27576-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915423" comment="texlive-counttexruns-doc-2021.186.1.00asvn27576-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915424" comment="texlive-courier-2021.186.svn35058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915425" comment="texlive-courier-fonts-2021.186.svn35058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915426" comment="texlive-courier-scaled-2021.186.svn24940-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915427" comment="texlive-courier-scaled-doc-2021.186.svn24940-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915428" comment="texlive-courierten-2021.186.svn55436-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915429" comment="texlive-courierten-doc-2021.186.svn55436-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915430" comment="texlive-courierten-fonts-2021.186.svn55436-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915431" comment="texlive-courseoutline-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915432" comment="texlive-courseoutline-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915433" comment="texlive-coursepaper-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915434" comment="texlive-coursepaper-doc-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915435" comment="texlive-coverpage-2021.186.1.01svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915436" comment="texlive-coverpage-doc-2021.186.1.01svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915437" comment="texlive-covington-2021.186.2.5svn58589-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915438" comment="texlive-covington-doc-2021.186.2.5svn58589-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915439" comment="texlive-cprotect-2021.186.1.0esvn21209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915440" comment="texlive-cprotect-doc-2021.186.1.0esvn21209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915441" comment="texlive-cqubeamer-2021.186.1.0svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915442" comment="texlive-cqubeamer-doc-2021.186.1.0svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915443" comment="texlive-cquthesis-2021.186.1.50svn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915444" comment="texlive-cquthesis-doc-2021.186.1.50svn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915445" comment="texlive-crbox-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915446" comment="texlive-crbox-doc-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915447" comment="texlive-crimson-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915448" comment="texlive-crimson-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915449" comment="texlive-crimson-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915450" comment="texlive-crimsonpro-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915451" comment="texlive-crimsonpro-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915452" comment="texlive-crimsonpro-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915453" comment="texlive-crop-2021.186.1.10.2svn55424-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915454" comment="texlive-crop-doc-2021.186.1.10.2svn55424-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915455" comment="texlive-crossreference-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915456" comment="texlive-crossreference-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915457" comment="texlive-crossreftools-2021.186.1.0svn55879-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915458" comment="texlive-crossreftools-doc-2021.186.1.0svn55879-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915459" comment="texlive-crossrefware-2021.186.svn47861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915460" comment="texlive-crossrefware-doc-2021.186.svn47861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915461" comment="texlive-crossword-2021.186.1.10svn55271-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915462" comment="texlive-crossword-doc-2021.186.1.10svn55271-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915463" comment="texlive-crosswrd-2021.186.3.0svn16896-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915464" comment="texlive-crosswrd-doc-2021.186.3.0svn16896-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915465" comment="texlive-cryptocode-2021.186.0.0.40svn55920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915466" comment="texlive-cryptocode-doc-2021.186.0.0.40svn55920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915467" comment="texlive-cryst-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915468" comment="texlive-cryst-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915469" comment="texlive-cryst-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915470" comment="texlive-cs-2021.186.svn41553-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915471" comment="texlive-cs-fonts-2021.186.svn41553-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915472" comment="texlive-csbulletin-2021.186.svn54433-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915473" comment="texlive-csbulletin-doc-2021.186.svn54433-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915474" comment="texlive-cslatex-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915475" comment="texlive-cslatex-doc-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915476" comment="texlive-csplain-2021.186.mar._2021svn58353-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915477" comment="texlive-csquotes-2021.186.5.2lsvn57844-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915478" comment="texlive-csquotes-de-2021.186.1.01svn23371-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915479" comment="texlive-csquotes-doc-2021.186.5.2lsvn57844-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915480" comment="texlive-css-colors-2021.186.1.02svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915481" comment="texlive-css-colors-doc-2021.186.1.02svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915482" comment="texlive-cstex-2021.186.svn58354-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915483" comment="texlive-cstypo-2021.186.0.0.03svn41986-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915484" comment="texlive-cstypo-doc-2021.186.0.0.03svn41986-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915485" comment="texlive-csvmerge-2021.186.1.0svn51857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915486" comment="texlive-csvmerge-doc-2021.186.1.0svn51857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915487" comment="texlive-csvsimple-2021.186.1.21svn51010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915488" comment="texlive-csvsimple-doc-2021.186.1.21svn51010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915489" comment="texlive-ctable-2021.186.1.31svn38672-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915490" comment="texlive-ctable-doc-2021.186.1.31svn38672-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915491" comment="texlive-ctablestack-2021.186.1.0svn38514-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915492" comment="texlive-ctablestack-doc-2021.186.1.0svn38514-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915493" comment="texlive-ctan-o-mat-2021.186.1.2svn51578-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915494" comment="texlive-ctan-o-mat-doc-2021.186.1.2svn51578-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915495" comment="texlive-ctan_chk-2021.186.1.0svn36304-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915496" comment="texlive-ctanbib-2021.186.0.0.1dsvn52145-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915497" comment="texlive-ctanbib-doc-2021.186.0.0.1dsvn52145-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915498" comment="texlive-ctanify-2021.186.1.9.1svn44129-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915499" comment="texlive-ctanify-doc-2021.186.1.9.1svn44129-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915500" comment="texlive-ctanupload-2021.186.1.2csvn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915501" comment="texlive-ctanupload-doc-2021.186.1.2csvn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915502" comment="texlive-ctex-2021.186.2.5.6svn58583-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915503" comment="texlive-ctex-doc-2021.186.2.5.6svn58583-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915504" comment="texlive-ctex-faq-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915505" comment="texlive-ctib-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915506" comment="texlive-ctib-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915507" comment="texlive-ctie-2021.186.1.1svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915508" comment="texlive-cuisine-2021.186.0.0.7svn34453-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915509" comment="texlive-cuisine-doc-2021.186.0.0.7svn34453-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915510" comment="texlive-cuprum-2021.186.svn49909-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915511" comment="texlive-cuprum-doc-2021.186.svn49909-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915512" comment="texlive-cuprum-fonts-2021.186.svn49909-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915513" comment="texlive-currency-2021.186.0.0.4svn48990-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915514" comment="texlive-currency-doc-2021.186.0.0.4svn48990-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915515" comment="texlive-currfile-2021.186.0.0.7dsvn56478-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915516" comment="texlive-currfile-doc-2021.186.0.0.7dsvn56478-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915517" comment="texlive-currvita-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915518" comment="texlive-currvita-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915519" comment="texlive-cursolatex-2021.186.svn24139-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915520" comment="texlive-curve-2021.186.1.16svn20745-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915521" comment="texlive-curve-doc-2021.186.1.16svn20745-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915522" comment="texlive-curve2e-2021.186.2.2.15svn57402-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915523" comment="texlive-curve2e-doc-2021.186.2.2.15svn57402-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915524" comment="texlive-curves-2021.186.1.55svn45255-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915525" comment="texlive-curves-doc-2021.186.1.55svn45255-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915526" comment="texlive-custom-bib-2021.186.4.33svn24729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915527" comment="texlive-custom-bib-doc-2021.186.4.33svn24729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915528" comment="texlive-cutwin-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915529" comment="texlive-cutwin-doc-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915530" comment="texlive-cv-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915531" comment="texlive-cv-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915532" comment="texlive-cv4tw-2021.186.0.0.2svn34577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915533" comment="texlive-cv4tw-doc-2021.186.0.0.2svn34577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915534" comment="texlive-cweb-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915535" comment="texlive-cweb-doc-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915536" comment="texlive-cweb-latex-2021.186.svn28878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915537" comment="texlive-cweb-latex-doc-2021.186.svn28878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915538" comment="texlive-cweb-old-2021.186.svn49271-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915539" comment="texlive-cyber-2021.186.2.2svn46776-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915540" comment="texlive-cyber-doc-2021.186.2.2svn46776-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915541" comment="texlive-cybercic-2021.186.2.1svn37659-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915542" comment="texlive-cybercic-doc-2021.186.2.1svn37659-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915543" comment="texlive-cyklop-2021.186.0.0.915svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915544" comment="texlive-cyklop-doc-2021.186.0.0.915svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915545" comment="texlive-cyklop-fonts-2021.186.0.0.915svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915546" comment="texlive-cyrillic-2021.186.svn47350-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915547" comment="texlive-cyrillic-bin-2021.186.svn53559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915548" comment="texlive-cyrillic-bin-doc-2021.186.svn53559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915549" comment="texlive-cyrillic-doc-2021.186.svn47350-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915550" comment="texlive-cyrplain-2021.186.svn45692-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915551" comment="texlive-dad-2021.186.1.2svn54191-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915552" comment="texlive-dad-doc-2021.186.1.2svn54191-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915553" comment="texlive-dad-fonts-2021.186.1.2svn54191-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915554" comment="texlive-dancers-2021.186.svn13293-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915555" comment="texlive-dantelogo-2021.186.0.0.03svn38599-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915556" comment="texlive-dantelogo-doc-2021.186.0.0.03svn38599-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915557" comment="texlive-dantelogo-fonts-2021.186.0.0.03svn38599-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915558" comment="texlive-dashbox-2021.186.1.14svn23425-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915559" comment="texlive-dashbox-doc-2021.186.1.14svn23425-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915560" comment="texlive-dashrule-2021.186.1.3svn29579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915561" comment="texlive-dashrule-doc-2021.186.1.3svn29579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915562" comment="texlive-dashundergaps-2021.186.2.0hsvn58150-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915563" comment="texlive-dashundergaps-doc-2021.186.2.0hsvn58150-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915564" comment="texlive-dataref-2021.186.0.0.6svn42883-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915565" comment="texlive-dataref-doc-2021.186.0.0.6svn42883-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915566" comment="texlive-datatool-2021.186.2.32svn52663-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915567" comment="texlive-datatool-doc-2021.186.2.32svn52663-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915568" comment="texlive-datax-2021.186.1.1.1svn57033-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915569" comment="texlive-datax-doc-2021.186.1.1.1svn57033-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915570" comment="texlive-dateiliste-2021.186.0.0.6svn27974-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915571" comment="texlive-dateiliste-doc-2021.186.0.0.6svn27974-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915572" comment="texlive-datenumber-2021.186.0.0.02svn18951-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915573" comment="texlive-datenumber-doc-2021.186.0.0.02svn18951-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915574" comment="texlive-datetime-2021.186.2.60svn36650-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915575" comment="texlive-datetime-doc-2021.186.2.60svn36650-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915576" comment="texlive-datetime2-2021.186.1.5.7svn58590-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915577" comment="texlive-datetime2-bahasai-2021.186.1.01svn46287-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915578" comment="texlive-datetime2-bahasai-doc-2021.186.1.01svn46287-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915579" comment="texlive-datetime2-doc-2021.186.1.5.7svn58590-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249760" version="1" class="patch">
	<metadata>
		<title>texlive-datetime2-basque-2021.186.1.2asvn47064-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-datetime2-basque-2021.186.1.2asvn47064-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009915580" comment="texlive-datetime2-basque-2021.186.1.2asvn47064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915581" comment="texlive-datetime2-basque-doc-2021.186.1.2asvn47064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915582" comment="texlive-datetime2-breton-2021.186.1.2svn52647-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915583" comment="texlive-datetime2-breton-doc-2021.186.1.2svn52647-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915584" comment="texlive-datetime2-bulgarian-2021.186.1.1svn47031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915585" comment="texlive-datetime2-bulgarian-doc-2021.186.1.1svn47031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915586" comment="texlive-datetime2-catalan-2021.186.1.1svn47032-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915587" comment="texlive-datetime2-catalan-doc-2021.186.1.1svn47032-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915588" comment="texlive-datetime2-croatian-2021.186.1.0svn36682-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915589" comment="texlive-datetime2-croatian-doc-2021.186.1.0svn36682-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915590" comment="texlive-datetime2-czech-2021.186.1.1svn47033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915591" comment="texlive-datetime2-czech-doc-2021.186.1.1svn47033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915592" comment="texlive-datetime2-danish-2021.186.1.1svn47034-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915593" comment="texlive-datetime2-danish-doc-2021.186.1.1svn47034-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915594" comment="texlive-datetime2-dutch-2021.186.1.1svn47355-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915595" comment="texlive-datetime2-dutch-doc-2021.186.1.1svn47355-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915596" comment="texlive-datetime2-en-fulltext-2021.186.1.0svn36705-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915597" comment="texlive-datetime2-en-fulltext-doc-2021.186.1.0svn36705-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915598" comment="texlive-datetime2-english-2021.186.1.05svn52479-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915599" comment="texlive-datetime2-english-doc-2021.186.1.05svn52479-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915600" comment="texlive-datetime2-esperanto-2021.186.1.1svn47356-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915601" comment="texlive-datetime2-esperanto-doc-2021.186.1.1svn47356-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915602" comment="texlive-datetime2-estonian-2021.186.1.1svn47565-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915603" comment="texlive-datetime2-estonian-doc-2021.186.1.1svn47565-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915604" comment="texlive-datetime2-finnish-2021.186.1.2svn47047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915605" comment="texlive-datetime2-finnish-doc-2021.186.1.2svn47047-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915606" comment="texlive-datetime2-french-2021.186.1.03svn56393-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915607" comment="texlive-datetime2-french-doc-2021.186.1.03svn56393-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915608" comment="texlive-datetime2-galician-2021.186.1.0svn47631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915609" comment="texlive-datetime2-galician-doc-2021.186.1.0svn47631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915610" comment="texlive-datetime2-german-2021.186.3.0svn53125-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915611" comment="texlive-datetime2-german-doc-2021.186.3.0svn53125-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915612" comment="texlive-datetime2-greek-2021.186.1.1svn47533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915613" comment="texlive-datetime2-greek-doc-2021.186.1.1svn47533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915614" comment="texlive-datetime2-hebrew-2021.186.1.1svn47534-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915615" comment="texlive-datetime2-hebrew-doc-2021.186.1.1svn47534-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915616" comment="texlive-datetime2-icelandic-2021.186.1.1svn47501-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915617" comment="texlive-datetime2-icelandic-doc-2021.186.1.1svn47501-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915618" comment="texlive-datetime2-irish-2021.186.1.1svn47632-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915619" comment="texlive-datetime2-irish-doc-2021.186.1.1svn47632-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915620" comment="texlive-datetime2-it-fulltext-2021.186.1.6svn54779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915621" comment="texlive-datetime2-it-fulltext-doc-2021.186.1.6svn54779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915622" comment="texlive-datetime2-italian-2021.186.1.3svn37146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915623" comment="texlive-datetime2-italian-doc-2021.186.1.3svn37146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915624" comment="texlive-datetime2-latin-2021.186.1.0svn47748-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915625" comment="texlive-datetime2-latin-doc-2021.186.1.0svn47748-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915626" comment="texlive-datetime2-lsorbian-2021.186.1.1svn47749-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915627" comment="texlive-datetime2-lsorbian-doc-2021.186.1.1svn47749-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915628" comment="texlive-datetime2-magyar-2021.186.1.1svn48266-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915629" comment="texlive-datetime2-magyar-doc-2021.186.1.1svn48266-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915630" comment="texlive-datetime2-norsk-2021.186.1.1svn48267-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915631" comment="texlive-datetime2-norsk-doc-2021.186.1.1svn48267-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915632" comment="texlive-datetime2-polish-2021.186.1.1svn48456-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915633" comment="texlive-datetime2-polish-doc-2021.186.1.1svn48456-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915634" comment="texlive-datetime2-portuges-2021.186.1.1svn48457-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915635" comment="texlive-datetime2-portuges-doc-2021.186.1.1svn48457-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915636" comment="texlive-datetime2-romanian-2021.186.1.02svn56394-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915637" comment="texlive-datetime2-romanian-doc-2021.186.1.02svn56394-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915638" comment="texlive-datetime2-russian-2021.186.1.1svn49345-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915639" comment="texlive-datetime2-russian-doc-2021.186.1.1svn49345-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915640" comment="texlive-datetime2-samin-2021.186.1.1svn49346-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915641" comment="texlive-datetime2-samin-doc-2021.186.1.1svn49346-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915642" comment="texlive-datetime2-scottish-2021.186.1.1svn52101-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915643" comment="texlive-datetime2-scottish-doc-2021.186.1.1svn52101-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915644" comment="texlive-datetime2-serbian-2021.186.2.1.0svn52893-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915645" comment="texlive-datetime2-serbian-doc-2021.186.2.1.0svn52893-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915646" comment="texlive-datetime2-slovak-2021.186.1.1svn52281-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915647" comment="texlive-datetime2-slovak-doc-2021.186.1.1svn52281-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915648" comment="texlive-datetime2-slovene-2021.186.1.1svn52282-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915649" comment="texlive-datetime2-slovene-doc-2021.186.1.1svn52282-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915650" comment="texlive-datetime2-spanish-2021.186.1.1svn45785-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915651" comment="texlive-datetime2-spanish-doc-2021.186.1.1svn45785-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915652" comment="texlive-datetime2-swedish-2021.186.1.0svn36700-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915653" comment="texlive-datetime2-swedish-doc-2021.186.1.0svn36700-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915654" comment="texlive-datetime2-turkish-2021.186.1.1svn52331-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915655" comment="texlive-datetime2-turkish-doc-2021.186.1.1svn52331-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915656" comment="texlive-datetime2-ukrainian-2021.186.1.2asvn47552-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915657" comment="texlive-datetime2-ukrainian-doc-2021.186.1.2asvn47552-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915658" comment="texlive-datetime2-usorbian-2021.186.1.1svn52375-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915659" comment="texlive-datetime2-usorbian-doc-2021.186.1.1svn52375-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915660" comment="texlive-datetime2-welsh-2021.186.1.1svn52553-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915661" comment="texlive-datetime2-welsh-doc-2021.186.1.1svn52553-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915662" comment="texlive-dblfloatfix-2021.186.1.0asvn28983-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915663" comment="texlive-dblfloatfix-doc-2021.186.1.0asvn28983-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915664" comment="texlive-dccpaper-2021.186.2.1svn57522-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915665" comment="texlive-dccpaper-doc-2021.186.2.1svn57522-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915666" comment="texlive-dcpic-2021.186.5.0.0svn30206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915667" comment="texlive-dcpic-doc-2021.186.5.0.0svn30206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915668" comment="texlive-ddphonism-2021.186.0.0.2svn52009-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915669" comment="texlive-ddphonism-doc-2021.186.0.0.2svn52009-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915670" comment="texlive-de-macro-2021.186.1.4svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915671" comment="texlive-de-macro-doc-2021.186.1.4svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915672" comment="texlive-decimal-2021.186.svn23374-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915673" comment="texlive-decimal-doc-2021.186.svn23374-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915674" comment="texlive-decision-table-2021.186.0.0.0.3svn57094-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915675" comment="texlive-decision-table-doc-2021.186.0.0.0.3svn57094-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915676" comment="texlive-decorule-2021.186.0.0.7svn55230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915677" comment="texlive-decorule-doc-2021.186.0.0.7svn55230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915678" comment="texlive-dehyph-2021.186.svn48599-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915679" comment="texlive-dehyph-exptl-2021.186.0.0.7svn58212-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915680" comment="texlive-dehyph-exptl-doc-2021.186.0.0.7svn58212-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915681" comment="texlive-dejavu-2021.186.2.34svn31771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915682" comment="texlive-dejavu-doc-2021.186.2.34svn31771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915683" comment="texlive-dejavu-fonts-2021.186.2.34svn31771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915684" comment="texlive-dejavu-otf-2021.186.0.0.04svn45991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915685" comment="texlive-dejavu-otf-doc-2021.186.0.0.04svn45991-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915686" comment="texlive-delim-2021.186.1.0svn23974-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915687" comment="texlive-delim-doc-2021.186.1.0svn23974-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915688" comment="texlive-delimseasy-2021.186.2.0svn39589-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915689" comment="texlive-delimseasy-doc-2021.186.2.0svn39589-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915690" comment="texlive-delimset-2021.186.1.1svn49544-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915691" comment="texlive-delimset-doc-2021.186.1.1svn49544-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915692" comment="texlive-delimtxt-2021.186.svn16549-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915693" comment="texlive-delimtxt-doc-2021.186.svn16549-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915694" comment="texlive-denisbdoc-2021.186.0.0.9.1svn56664-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915695" comment="texlive-denisbdoc-doc-2021.186.0.0.9.1svn56664-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915696" comment="texlive-derivative-2021.186.0.0.98svn55890-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915697" comment="texlive-derivative-doc-2021.186.0.0.98svn55890-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915698" comment="texlive-detex-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915699" comment="texlive-dhua-2021.186.0.0.11svn24035-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915700" comment="texlive-dhua-doc-2021.186.0.0.11svn24035-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915701" comment="texlive-diabetes-logbook-2021.186.svn54810-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915702" comment="texlive-diabetes-logbook-doc-2021.186.svn54810-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915703" comment="texlive-diadia-2021.186.1.1svn37656-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915704" comment="texlive-diadia-doc-2021.186.1.1svn37656-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915705" comment="texlive-diagbox-2021.186.2.4svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915706" comment="texlive-diagbox-doc-2021.186.2.4svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915707" comment="texlive-diagmac2-2021.186.2.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915708" comment="texlive-diagmac2-doc-2021.186.2.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915709" comment="texlive-diagnose-2021.186.0.0.2svn19387-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915710" comment="texlive-diagnose-doc-2021.186.0.0.2svn19387-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915711" comment="texlive-dialogl-2021.186.svn28946-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915712" comment="texlive-dialogl-doc-2021.186.svn28946-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915713" comment="texlive-dice-2021.186.svn28501-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915714" comment="texlive-dice-doc-2021.186.svn28501-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915715" comment="texlive-dichokey-2021.186.svn17192-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915716" comment="texlive-dichokey-doc-2021.186.svn17192-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915717" comment="texlive-dickimaw-2021.186.svn32925-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915718" comment="texlive-dictsym-2021.186.svn20031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915719" comment="texlive-dictsym-doc-2021.186.svn20031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915720" comment="texlive-dictsym-fonts-2021.186.svn20031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915721" comment="texlive-diffcoeff-2021.186.3.2svn53244-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915722" comment="texlive-diffcoeff-doc-2021.186.3.2svn53244-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915723" comment="texlive-digiconfigs-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915724" comment="texlive-digiconfigs-doc-2021.186.0.0.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915725" comment="texlive-dijkstra-2021.186.0.0.12svn55661-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915726" comment="texlive-dijkstra-doc-2021.186.0.0.12svn55661-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915727" comment="texlive-din1505-2021.186.svn19441-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915728" comment="texlive-din1505-doc-2021.186.svn19441-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915729" comment="texlive-dinat-2021.186.2.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915730" comment="texlive-dinat-doc-2021.186.2.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915731" comment="texlive-dinbrief-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915732" comment="texlive-dinbrief-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915733" comment="texlive-dingbat-2021.186.1.0svn27918-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915734" comment="texlive-dingbat-doc-2021.186.1.0svn27918-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915735" comment="texlive-directory-2021.186.1.20svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915736" comment="texlive-directory-doc-2021.186.1.20svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915737" comment="texlive-dirtree-2021.186.0.0.32svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915738" comment="texlive-dirtree-doc-2021.186.0.0.32svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915739" comment="texlive-dirtytalk-2021.186.1.0svn20520-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915740" comment="texlive-dirtytalk-doc-2021.186.1.0svn20520-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915741" comment="texlive-disser-2021.186.1.5.0svn43417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915742" comment="texlive-disser-doc-2021.186.1.5.0svn43417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915743" comment="texlive-ditaa-2021.186.0.0.9svn48932-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915744" comment="texlive-ditaa-doc-2021.186.0.0.9svn48932-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915745" comment="texlive-dithesis-2021.186.0.0.2svn34295-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915746" comment="texlive-dithesis-doc-2021.186.0.0.2svn34295-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915747" comment="texlive-dk-bib-2021.186.0.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915748" comment="texlive-dk-bib-doc-2021.186.0.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915749" comment="texlive-dlfltxb-2021.186.svn17337-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915750" comment="texlive-dlfltxb-doc-2021.186.svn17337-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915751" comment="texlive-dnaseq-2021.186.0.0.01svn17194-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915752" comment="texlive-dnaseq-doc-2021.186.0.0.01svn17194-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915753" comment="texlive-dnp-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915754" comment="texlive-doc-pictex-2021.186.svn24927-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915755" comment="texlive-docbytex-2021.186.svn34294-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915756" comment="texlive-docbytex-doc-2021.186.svn34294-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915757" comment="texlive-doclicense-2021.186.2.3.0svn58350-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915758" comment="texlive-doclicense-doc-2021.186.2.3.0svn58350-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915759" comment="texlive-docmfp-2021.186.1.2dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915760" comment="texlive-docmfp-doc-2021.186.1.2dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915761" comment="texlive-docmute-2021.186.1.4svn25741-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915762" comment="texlive-docmute-doc-2021.186.1.4svn25741-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915763" comment="texlive-docsurvey-2021.186.svn57362-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915764" comment="texlive-doctools-2021.186.0.0.1svn34474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915765" comment="texlive-doctools-doc-2021.186.0.0.1svn34474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915766" comment="texlive-documentation-2021.186.0.0.1svn34521-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915767" comment="texlive-documentation-doc-2021.186.0.0.1svn34521-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915768" comment="texlive-docutils-2021.186.svn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915769" comment="texlive-docutils-doc-2021.186.svn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915770" comment="texlive-doi-2021.186.svn48634-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915771" comment="texlive-doi-doc-2021.186.svn48634-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915772" comment="texlive-doipubmed-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915773" comment="texlive-doipubmed-doc-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915774" comment="texlive-domitian-2021.186.1.0.1svn55286-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915775" comment="texlive-domitian-doc-2021.186.1.0.1svn55286-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915776" comment="texlive-domitian-fonts-2021.186.1.0.1svn55286-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915777" comment="texlive-dosepsbin-2021.186.1.2svn29752-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915778" comment="texlive-dosepsbin-doc-2021.186.1.2svn29752-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915779" comment="texlive-dot2texi-2021.186.3.0svn26237-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915780" comment="texlive-dot2texi-doc-2021.186.3.0svn26237-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915781" comment="texlive-dotarrow-2021.186.0.0.01asvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915782" comment="texlive-dotarrow-doc-2021.186.0.0.01asvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915783" comment="texlive-dotlessi-2021.186.1.1svn51476-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915784" comment="texlive-dotlessi-doc-2021.186.1.1svn51476-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915785" comment="texlive-dotseqn-2021.186.1.1svn17195-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915786" comment="texlive-dotseqn-doc-2021.186.1.1svn17195-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915787" comment="texlive-dottex-2021.186.0.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915788" comment="texlive-dottex-doc-2021.186.0.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915789" comment="texlive-doublestroke-2021.186.1.111svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915790" comment="texlive-doublestroke-doc-2021.186.1.111svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915791" comment="texlive-doublestroke-fonts-2021.186.1.111svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915792" comment="texlive-doulossil-2021.186.0.0.1svn56407-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915793" comment="texlive-doulossil-doc-2021.186.0.0.1svn56407-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915794" comment="texlive-doulossil-fonts-2021.186.0.0.1svn56407-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915795" comment="texlive-dowith-2021.186.r0.32svn38860-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915796" comment="texlive-dowith-doc-2021.186.r0.32svn38860-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915797" comment="texlive-download-2021.186.1.2svn52257-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915798" comment="texlive-download-doc-2021.186.1.2svn52257-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915799" comment="texlive-dox-2021.186.2.4svn46011-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915800" comment="texlive-dox-doc-2021.186.2.4svn46011-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915801" comment="texlive-dozenal-2021.186.7.2svn47680-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915802" comment="texlive-dozenal-doc-2021.186.7.2svn47680-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915803" comment="texlive-dozenal-fonts-2021.186.7.2svn47680-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915804" comment="texlive-dpcircling-2021.186.1.0svn54994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915805" comment="texlive-dpcircling-doc-2021.186.1.0svn54994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915806" comment="texlive-dpfloat-2021.186.svn17196-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915807" comment="texlive-dpfloat-doc-2021.186.svn17196-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915808" comment="texlive-dprogress-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915809" comment="texlive-dprogress-doc-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915810" comment="texlive-drac-2021.186.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915811" comment="texlive-drac-doc-2021.186.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915812" comment="texlive-draftcopy-2021.186.2.16svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915813" comment="texlive-draftcopy-doc-2021.186.2.16svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915814" comment="texlive-draftfigure-2021.186.0.0.2svn44854-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915815" comment="texlive-draftfigure-doc-2021.186.0.0.2svn44854-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915816" comment="texlive-draftwatermark-2021.186.3.0svn57099-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915817" comment="texlive-draftwatermark-doc-2021.186.3.0svn57099-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915818" comment="texlive-dramatist-2021.186.1.2esvn35866-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915819" comment="texlive-dramatist-doc-2021.186.1.2esvn35866-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915820" comment="texlive-dratex-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915821" comment="texlive-dratex-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915822" comment="texlive-drawmatrix-2021.186.1.5.0svn44471-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915823" comment="texlive-drawmatrix-doc-2021.186.1.5.0svn44471-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915824" comment="texlive-drawstack-2021.186.svn28582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915825" comment="texlive-drawstack-doc-2021.186.svn28582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915826" comment="texlive-drm-2021.186.4.4svn38157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915827" comment="texlive-drm-doc-2021.186.4.4svn38157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915828" comment="texlive-drm-fonts-2021.186.4.4svn38157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915829" comment="texlive-droid-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915830" comment="texlive-droid-doc-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915831" comment="texlive-droid-fonts-2021.186.3.2svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915832" comment="texlive-droit-fr-2021.186.1.2svn39802-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915833" comment="texlive-droit-fr-doc-2021.186.1.2svn39802-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915834" comment="texlive-drs-2021.186.1.1bsvn19232-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915835" comment="texlive-drs-doc-2021.186.1.1bsvn19232-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915836" comment="texlive-drv-2021.186.0.0.97svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915837" comment="texlive-drv-doc-2021.186.0.0.97svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915838" comment="texlive-dsptricks-2021.186.1.0svn34724-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915839" comment="texlive-dsptricks-doc-2021.186.1.0svn34724-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915840" comment="texlive-dsserif-2021.186.1.01svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915841" comment="texlive-dsserif-doc-2021.186.1.01svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915842" comment="texlive-dsserif-fonts-2021.186.1.01svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915843" comment="texlive-dtk-2021.186.2.08hsvn56696-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915844" comment="texlive-dtk-bibliography-2021.186.2021_01svn58212-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915845" comment="texlive-dtk-doc-2021.186.2.08hsvn56696-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915846" comment="texlive-dtl-2021.186.0.0.6.1svn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915847" comment="texlive-dtxdescribe-2021.186.1.02svn51652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915848" comment="texlive-dtxdescribe-doc-2021.186.1.02svn51652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915849" comment="texlive-dtxgallery-2021.186.1svn49504-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915850" comment="texlive-dtxgen-2021.186.1.08svn51663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915851" comment="texlive-dtxgen-doc-2021.186.1.08svn51663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915852" comment="texlive-dtxtut-2021.186.2.1svn38375-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915853" comment="texlive-ducksay-2021.186.2.5asvn56800-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915854" comment="texlive-ducksay-doc-2021.186.2.5asvn56800-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915855" comment="texlive-duckuments-2021.186.0.0.5svn52271-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915856" comment="texlive-duckuments-doc-2021.186.0.0.5svn52271-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915857" comment="texlive-duerer-2021.186.svn20741-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915858" comment="texlive-duerer-doc-2021.186.svn20741-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915859" comment="texlive-duerer-latex-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915860" comment="texlive-duerer-latex-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915861" comment="texlive-duotenzor-2021.186.1.00svn18728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915862" comment="texlive-duotenzor-doc-2021.186.1.00svn18728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915863" comment="texlive-dutchcal-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915864" comment="texlive-dutchcal-doc-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915865" comment="texlive-dutchcal-fonts-2021.186.1.0svn54080-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249761" version="1" class="patch">
	<metadata>
		<title>texlive-dvdcoll-2021.186.1.1asvn15878-46.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-dvdcoll-2021.186.1.1asvn15878-46.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009915866" comment="texlive-dvdcoll-2021.186.1.1asvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915867" comment="texlive-dvdcoll-doc-2021.186.1.1asvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915868" comment="texlive-dvgloss-2021.186.0.0.1svn29103-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915869" comment="texlive-dvgloss-doc-2021.186.0.0.1svn29103-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915870" comment="texlive-dviasm-2021.186.svn56373-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915871" comment="texlive-dviasm-doc-2021.186.svn56373-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915872" comment="texlive-dvicopy-2021.186.1.5svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915873" comment="texlive-dvidvi-2021.186.svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915874" comment="texlive-dviincl-2021.186.1.00svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915875" comment="texlive-dviincl-doc-2021.186.1.00svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915876" comment="texlive-dviinfox-2021.186.1.04svn44515-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915877" comment="texlive-dviinfox-doc-2021.186.1.04svn44515-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915878" comment="texlive-dviljk-2021.186.svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915879" comment="texlive-dviout-util-2021.186.svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915880" comment="texlive-dvipdfmx-2021.186.svn58645-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915881" comment="texlive-dvipdfmx-doc-2021.186.svn58645-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915882" comment="texlive-dvipng-2021.186.1.17svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915883" comment="texlive-dvipos-2021.186.svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915884" comment="texlive-dvips-2021.186.svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915885" comment="texlive-dvips-doc-2021.186.svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915886" comment="texlive-dvipsconfig-2021.186.1.6svn13293-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915887" comment="texlive-dvisvgm-2021.186.2.11svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915888" comment="texlive-dynamicnumber-2021.186.0.0.1.3svn38726-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915889" comment="texlive-dynamicnumber-doc-2021.186.0.0.1.3svn38726-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915890" comment="texlive-dynblocks-2021.186.0.0.2bsvn35193-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915891" comment="texlive-dynblocks-doc-2021.186.0.0.2bsvn35193-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915892" comment="texlive-dynkin-diagrams-2021.186.3.1415926535897932svn58758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915893" comment="texlive-dynkin-diagrams-doc-2021.186.3.1415926535897932svn58758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915894" comment="texlive-dyntree-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915895" comment="texlive-dyntree-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915896" comment="texlive-e-french-2021.186.6.11svn52027-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915897" comment="texlive-e-french-doc-2021.186.6.11svn52027-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915898" comment="texlive-ean-2021.186.svn20851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915899" comment="texlive-ean-doc-2021.186.svn20851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915900" comment="texlive-ean13isbn-2021.186.svn57514-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915901" comment="texlive-ean13isbn-doc-2021.186.svn57514-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915902" comment="texlive-easy-2021.186.0.0.99svn19440-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915903" comment="texlive-easy-doc-2021.186.0.0.99svn19440-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915904" comment="texlive-easy-todo-2021.186.svn32677-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915905" comment="texlive-easy-todo-doc-2021.186.svn32677-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915906" comment="texlive-easybook-2021.186.1.24esvn58762-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915907" comment="texlive-easybook-doc-2021.186.1.24esvn58762-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915908" comment="texlive-easyfig-2021.186.1.2asvn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915909" comment="texlive-easyfig-doc-2021.186.1.2asvn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915910" comment="texlive-easyfloats-2021.186.1.0.0svn57204-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915911" comment="texlive-easyfloats-doc-2021.186.1.0.0svn57204-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915912" comment="texlive-easyformat-2021.186.1.4.0svn44543-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915913" comment="texlive-easyformat-doc-2021.186.1.4.0svn44543-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915914" comment="texlive-easylist-2021.186.1.3svn32661-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915915" comment="texlive-easylist-doc-2021.186.1.3svn32661-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915916" comment="texlive-easyreview-2021.186.1.0svn38352-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915917" comment="texlive-easyreview-doc-2021.186.1.0svn38352-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915918" comment="texlive-ebezier-2021.186.4svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915919" comment="texlive-ebezier-doc-2021.186.4svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915920" comment="texlive-ebgaramond-2021.186.svn54721-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915921" comment="texlive-ebgaramond-doc-2021.186.svn54721-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915922" comment="texlive-ebgaramond-fonts-2021.186.svn54721-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915923" comment="texlive-ebgaramond-maths-2021.186.1.2svn52168-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915924" comment="texlive-ebgaramond-maths-doc-2021.186.1.2svn52168-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915925" comment="texlive-ebook-2021.186.svn29466-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915926" comment="texlive-ebook-doc-2021.186.svn29466-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915927" comment="texlive-ebproof-2021.186.2.1.1svn57544-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915928" comment="texlive-ebproof-doc-2021.186.2.1.1svn57544-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915929" comment="texlive-ebsthesis-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915930" comment="texlive-ebsthesis-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915931" comment="texlive-ec-2021.186.1.0svn25033-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915932" comment="texlive-ec-doc-2021.186.1.0svn25033-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915933" comment="texlive-ecc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915934" comment="texlive-ecc-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915935" comment="texlive-ecclesiastic-2021.186.0.0.3svn38172-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915936" comment="texlive-ecclesiastic-doc-2021.186.0.0.3svn38172-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915937" comment="texlive-ecgdraw-2021.186.0.0.1svn41617-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915938" comment="texlive-ecgdraw-doc-2021.186.0.0.1svn41617-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915939" comment="texlive-ecltree-2021.186.1.1asvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915940" comment="texlive-ecltree-doc-2021.186.1.1asvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915941" comment="texlive-eco-2021.186.1.3svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915942" comment="texlive-eco-doc-2021.186.1.3svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915943" comment="texlive-ecobiblatex-2021.186.1.0svn39233-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915944" comment="texlive-ecobiblatex-doc-2021.186.1.0svn39233-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915945" comment="texlive-econ-bst-2021.186.2.8svn54191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915946" comment="texlive-econ-bst-doc-2021.186.2.8svn54191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915947" comment="texlive-econlipsum-2021.186.0.0.8.2svn58390-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915948" comment="texlive-econlipsum-doc-2021.186.0.0.8.2svn58390-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915949" comment="texlive-econometrics-2021.186.1.0svn39396-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915950" comment="texlive-econometrics-doc-2021.186.1.0svn39396-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915951" comment="texlive-economic-2021.186.svn32639-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915952" comment="texlive-economic-doc-2021.186.svn32639-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915953" comment="texlive-ecothesis-2021.186.1.2svn48007-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915954" comment="texlive-ecv-2021.186.0.0.3svn24928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915955" comment="texlive-ecv-doc-2021.186.0.0.3svn24928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915956" comment="texlive-eczar-2021.186.0.0.1svn57716-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915957" comment="texlive-eczar-doc-2021.186.0.0.1svn57716-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915958" comment="texlive-eczar-fonts-2021.186.0.0.1svn57716-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915959" comment="texlive-ed-2021.186.1.8svn25231-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915960" comment="texlive-ed-doc-2021.186.1.8svn25231-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915961" comment="texlive-edfnotes-2021.186.0.0.6bsvn21540-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915962" comment="texlive-edfnotes-doc-2021.186.0.0.6bsvn21540-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915963" comment="texlive-edichokey-2021.186.2.01ysvn56223-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915964" comment="texlive-edichokey-doc-2021.186.2.01ysvn56223-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915965" comment="texlive-edmac-2021.186.3.17svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915966" comment="texlive-edmac-doc-2021.186.3.17svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915967" comment="texlive-edmargin-2021.186.1.2svn27599-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915968" comment="texlive-edmargin-doc-2021.186.1.2svn27599-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915969" comment="texlive-ednotes-2021.186.1.3asvn35829-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915970" comment="texlive-ednotes-doc-2021.186.1.3asvn35829-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915971" comment="texlive-eemeir-2021.186.1.1bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915972" comment="texlive-eemeir-doc-2021.186.1.1bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915973" comment="texlive-eepic-2021.186.1.1esvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915974" comment="texlive-eepic-doc-2021.186.1.1esvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915975" comment="texlive-efbox-2021.186.1.0svn33236-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915976" comment="texlive-efbox-doc-2021.186.1.0svn33236-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915977" comment="texlive-egameps-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915978" comment="texlive-egameps-doc-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915979" comment="texlive-egplot-2021.186.1.02asvn20617-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915980" comment="texlive-egplot-doc-2021.186.1.02asvn20617-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915981" comment="texlive-ehhline-2021.186.1.1svn54676-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915982" comment="texlive-ehhline-doc-2021.186.1.1svn54676-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915983" comment="texlive-eiad-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915984" comment="texlive-eiad-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915985" comment="texlive-eiad-ltx-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915986" comment="texlive-eiad-ltx-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915987" comment="texlive-eijkhout-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915988" comment="texlive-einfart-2021.186.svn58414-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915989" comment="texlive-einfart-doc-2021.186.svn58414-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915990" comment="texlive-ejpecp-2021.186.1.9.0svn56728-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915991" comment="texlive-ejpecp-doc-2021.186.1.9.0svn56728-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915992" comment="texlive-ekaia-2021.186.1.06svn49594-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915993" comment="texlive-ekaia-doc-2021.186.1.06svn49594-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915994" comment="texlive-ekdosis-2021.186.1.2svn58721-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915995" comment="texlive-ekdosis-doc-2021.186.1.2svn58721-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915996" comment="texlive-ektype-tanka-2021.186.0.0.2svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915997" comment="texlive-ektype-tanka-doc-2021.186.0.0.2svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915998" comment="texlive-ektype-tanka-fonts-2021.186.0.0.2svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009915999" comment="texlive-elbioimp-2021.186.1.2svn21758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916000" comment="texlive-elbioimp-doc-2021.186.1.2svn21758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916001" comment="texlive-electrum-2021.186.1.005_bsvn19705-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916002" comment="texlive-electrum-doc-2021.186.1.005_bsvn19705-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916003" comment="texlive-electrum-fonts-2021.186.1.005_bsvn19705-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916004" comment="texlive-eledform-2021.186.1.1asvn38114-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916005" comment="texlive-eledform-doc-2021.186.1.1asvn38114-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916006" comment="texlive-eledmac-2021.186.1.24.12svn45418-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916007" comment="texlive-eledmac-doc-2021.186.1.24.12svn45418-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916008" comment="texlive-elegantbook-2021.186.3.11svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916009" comment="texlive-elegantbook-doc-2021.186.3.11svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916010" comment="texlive-elegantnote-2021.186.2.30svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916011" comment="texlive-elegantnote-doc-2021.186.2.30svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916012" comment="texlive-elegantpaper-2021.186.0.0.09svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916013" comment="texlive-elegantpaper-doc-2021.186.0.0.09svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916014" comment="texlive-elements-2021.186.0.0.3svn52398-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916015" comment="texlive-elements-doc-2021.186.0.0.3svn52398-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916016" comment="texlive-ellipse-2021.186.1.0svn39025-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916017" comment="texlive-ellipse-doc-2021.186.1.0svn39025-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916018" comment="texlive-ellipsis-2021.186.1.8svn55418-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916019" comment="texlive-ellipsis-doc-2021.186.1.8svn55418-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916020" comment="texlive-elmath-2021.186.1.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916021" comment="texlive-elmath-doc-2021.186.1.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916022" comment="texlive-elocalloc-2021.186.0.0.03svn42712-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916023" comment="texlive-elocalloc-doc-2021.186.0.0.03svn42712-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916024" comment="texlive-elpres-2021.186.0.0.8svn58015-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916025" comment="texlive-elpres-doc-2021.186.0.0.8svn58015-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916026" comment="texlive-els-cas-templates-2021.186.2.1svn54317-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916027" comment="texlive-els-cas-templates-doc-2021.186.2.1svn54317-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916028" comment="texlive-elsarticle-2021.186.3.3svn56999-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916029" comment="texlive-elsarticle-doc-2021.186.3.3svn56999-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916030" comment="texlive-elteikthesis-2021.186.2.1svn55928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916031" comment="texlive-elteikthesis-doc-2021.186.2.1svn55928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916032" comment="texlive-eltex-2021.186.2.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916033" comment="texlive-eltex-doc-2021.186.2.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916034" comment="texlive-elvish-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916035" comment="texlive-elvish-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916036" comment="texlive-elzcards-2021.186.1.60svn51894-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916037" comment="texlive-elzcards-doc-2021.186.1.60svn51894-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916038" comment="texlive-emarks-2021.186.1.0svn24504-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916039" comment="texlive-emarks-doc-2021.186.1.0svn24504-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916040" comment="texlive-embedall-2021.186.2.0svn51177-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916041" comment="texlive-embedall-doc-2021.186.2.0svn51177-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916042" comment="texlive-embedfile-2021.186.2.11svn54865-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916043" comment="texlive-embedfile-doc-2021.186.2.11svn54865-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916044" comment="texlive-embrac-2021.186.0.0.9asvn57814-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916045" comment="texlive-embrac-doc-2021.186.0.0.9asvn57814-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916046" comment="texlive-emf-2021.186.1svn42023-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916047" comment="texlive-emf-doc-2021.186.1svn42023-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916048" comment="texlive-emisa-2021.186.2.3.0svn57013-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916049" comment="texlive-emisa-doc-2021.186.2.3.0svn57013-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916050" comment="texlive-emoji-2021.186.0.0.2.1svn55678-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916051" comment="texlive-emoji-doc-2021.186.0.0.2.1svn55678-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916052" comment="texlive-emojicite-2021.186.0.0.3svn55131-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916053" comment="texlive-emojicite-doc-2021.186.0.0.3svn55131-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916054" comment="texlive-emp-2021.186.svn23483-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916055" comment="texlive-emp-doc-2021.186.svn23483-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916056" comment="texlive-emptypage-2021.186.1.2svn18064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916057" comment="texlive-emptypage-doc-2021.186.1.2svn18064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916058" comment="texlive-emulateapj-2021.186.svn28469-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916059" comment="texlive-emulateapj-doc-2021.186.svn28469-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916060" comment="texlive-enctex-2021.186.svn34957-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916061" comment="texlive-enctex-doc-2021.186.svn34957-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916062" comment="texlive-encxvlna-2021.186.1.1svn34087-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916063" comment="texlive-encxvlna-doc-2021.186.1.1svn34087-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916064" comment="texlive-endfloat-2021.186.2.7svn57090-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916065" comment="texlive-endfloat-doc-2021.186.2.7svn57090-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916066" comment="texlive-endheads-2021.186.1.6svn43750-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916067" comment="texlive-endheads-doc-2021.186.1.6svn43750-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916068" comment="texlive-endiagram-2021.186.0.0.1dsvn34486-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916069" comment="texlive-endiagram-doc-2021.186.0.0.1dsvn34486-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916070" comment="texlive-endnotes-2021.186.svn53319-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916071" comment="texlive-endnotes-doc-2021.186.svn53319-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916072" comment="texlive-endnotes-hy-2021.186.svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916073" comment="texlive-endnotes-hy-doc-2021.186.svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916074" comment="texlive-endnotesj-2021.186.3.0svn47703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916075" comment="texlive-endnotesj-doc-2021.186.3.0svn47703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916076" comment="texlive-endofproofwd-2021.186.svn55643-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916077" comment="texlive-endofproofwd-doc-2021.186.svn55643-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916078" comment="texlive-engpron-2021.186.2svn16558-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916079" comment="texlive-engpron-doc-2021.186.2svn16558-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916080" comment="texlive-engrec-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916081" comment="texlive-engrec-doc-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916082" comment="texlive-engtlc-2021.186.3.2svn28571-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916083" comment="texlive-engtlc-doc-2021.186.3.2svn28571-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916084" comment="texlive-enigma-2021.186.0.0.1svn29802-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916085" comment="texlive-enigma-doc-2021.186.0.0.1svn29802-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916086" comment="texlive-enotez-2021.186.0.0.10csvn57130-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916087" comment="texlive-enotez-doc-2021.186.0.0.10csvn57130-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916088" comment="texlive-enumitem-2021.186.3.9svn51423-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916089" comment="texlive-enumitem-doc-2021.186.3.9svn51423-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916090" comment="texlive-enumitem-zref-2021.186.1.8svn21472-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916091" comment="texlive-enumitem-zref-doc-2021.186.1.8svn21472-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916092" comment="texlive-envbig-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916093" comment="texlive-envbig-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916094" comment="texlive-environ-2021.186.0.0.3svn56615-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916095" comment="texlive-environ-doc-2021.186.0.0.3svn56615-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916096" comment="texlive-envlab-2021.186.1.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916097" comment="texlive-envlab-doc-2021.186.1.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916098" comment="texlive-epigrafica-2021.186.1.01svn17210-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916099" comment="texlive-epigrafica-doc-2021.186.1.01svn17210-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916100" comment="texlive-epigrafica-fonts-2021.186.1.01svn17210-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916101" comment="texlive-epigram-2021.186.svn20513-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916102" comment="texlive-epigraph-2021.186.1.5esvn54857-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916103" comment="texlive-epigraph-doc-2021.186.1.5esvn54857-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916104" comment="texlive-epigraph-keys-2021.186.1.0svn54851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916105" comment="texlive-epigraph-keys-doc-2021.186.1.0svn54851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916106" comment="texlive-epiolmec-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916107" comment="texlive-epiolmec-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916108" comment="texlive-epiolmec-fonts-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916109" comment="texlive-eplain-2021.186.3.11svn57186-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916110" comment="texlive-eplain-doc-2021.186.3.11svn57186-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916111" comment="texlive-epsdice-2021.186.2.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916112" comment="texlive-epsdice-doc-2021.186.2.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916113" comment="texlive-epsf-2021.186.2.7.4svn21461-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916114" comment="texlive-epsf-doc-2021.186.2.7.4svn21461-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916115" comment="texlive-epsf-dvipdfmx-2021.186.2014svn35575-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916116" comment="texlive-epsf-dvipdfmx-doc-2021.186.2014svn35575-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916117" comment="texlive-epsincl-2021.186.0.0.2svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916118" comment="texlive-epsincl-doc-2021.186.0.0.2svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916119" comment="texlive-epslatex-fr-2021.186.svn19440-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916120" comment="texlive-epspdf-2021.186.0.0.6.5svn53472-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916121" comment="texlive-epspdf-doc-2021.186.0.0.6.5svn53472-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916122" comment="texlive-epspdfconversion-2021.186.0.0.61svn18703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916123" comment="texlive-epspdfconversion-doc-2021.186.0.0.61svn18703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916124" comment="texlive-epstopdf-2021.186.2.28svn48684-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916125" comment="texlive-epstopdf-doc-2021.186.2.28svn48684-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916126" comment="texlive-epstopdf-pkg-2021.186.2.11svn53546-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916127" comment="texlive-epstopdf-pkg-doc-2021.186.2.11svn53546-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916128" comment="texlive-eq-pin2corr-2021.186.1.0svn57815-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916129" comment="texlive-eq-pin2corr-doc-2021.186.1.0svn57815-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916130" comment="texlive-eqell-2021.186.svn22931-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916131" comment="texlive-eqell-doc-2021.186.svn22931-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916132" comment="texlive-eqexpl-2021.186.1.1svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916133" comment="texlive-eqexpl-doc-2021.186.1.1svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916134" comment="texlive-eqlist-2021.186.2.1svn32257-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916135" comment="texlive-eqlist-doc-2021.186.2.1svn32257-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916136" comment="texlive-eqnalign-2021.186.1.0asvn43278-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916137" comment="texlive-eqnalign-doc-2021.186.1.0asvn43278-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916138" comment="texlive-eqname-2021.186.svn20678-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916139" comment="texlive-eqnarray-2021.186.1.3svn20641-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916140" comment="texlive-eqnarray-doc-2021.186.1.3svn20641-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916141" comment="texlive-eqnnumwarn-2021.186.1.0svn45511-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916142" comment="texlive-eqnnumwarn-doc-2021.186.1.0svn45511-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916143" comment="texlive-eqparbox-2021.186.4.1svn45215-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916144" comment="texlive-eqparbox-doc-2021.186.4.1svn45215-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916145" comment="texlive-erdc-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916146" comment="texlive-erdc-doc-2021.186.1.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916147" comment="texlive-erewhon-2021.186.1.115svn58722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916148" comment="texlive-erewhon-doc-2021.186.1.115svn58722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916149" comment="texlive-erewhon-fonts-2021.186.1.115svn58722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916150" comment="texlive-erewhon-math-2021.186.0.0.45svn56703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916151" comment="texlive-erewhon-math-doc-2021.186.0.0.45svn56703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916152" comment="texlive-erewhon-math-fonts-2021.186.0.0.45svn56703-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916153" comment="texlive-errata-2021.186.0.0.3svn42428-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916154" comment="texlive-errata-doc-2021.186.0.0.3svn42428-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916155" comment="texlive-erw-l3-2021.186.3.1svn55414-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916156" comment="texlive-erw-l3-doc-2021.186.3.1svn55414-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916157" comment="texlive-es-tex-faq-2021.186.1.97svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916158" comment="texlive-esami-2021.186.2.5svn47639-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916159" comment="texlive-esami-doc-2021.186.2.5svn47639-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916160" comment="texlive-esdiff-2021.186.1.2svn21385-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916161" comment="texlive-esdiff-doc-2021.186.1.2svn21385-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916162" comment="texlive-esindex-2021.186.1.7svn52342-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916163" comment="texlive-esindex-doc-2021.186.1.7svn52342-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916164" comment="texlive-esint-2021.186.1.2dsvn52240-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916165" comment="texlive-esint-doc-2021.186.1.2dsvn52240-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916166" comment="texlive-esint-type1-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916167" comment="texlive-esint-type1-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916168" comment="texlive-esint-type1-fonts-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916169" comment="texlive-esk-2021.186.1.0svn18115-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916170" comment="texlive-esk-doc-2021.186.1.0svn18115-46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249762" version="1" class="patch">
	<metadata>
		<title>texlive-eskd-2021.186.svn15878-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-eskd-2021.186.svn15878-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009916171" comment="texlive-eskd-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916172" comment="texlive-eskd-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916173" comment="texlive-eskdx-2021.186.0.0.98svn29235-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916174" comment="texlive-eskdx-doc-2021.186.0.0.98svn29235-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916175" comment="texlive-eso-pic-2021.186.3.0asvn56658-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916176" comment="texlive-eso-pic-doc-2021.186.3.0asvn56658-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916177" comment="texlive-esrelation-2021.186.svn37236-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916178" comment="texlive-esrelation-doc-2021.186.svn37236-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916179" comment="texlive-esrelation-fonts-2021.186.svn37236-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916180" comment="texlive-esstix-2021.186.1.0svn22426-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916181" comment="texlive-esstix-doc-2021.186.1.0svn22426-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916182" comment="texlive-esstix-fonts-2021.186.1.0svn22426-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916183" comment="texlive-estcpmm-2021.186.0.0.4svn17335-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916184" comment="texlive-estcpmm-doc-2021.186.0.0.4svn17335-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916185" comment="texlive-esvect-2021.186.1.3svn32098-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916186" comment="texlive-esvect-doc-2021.186.1.3svn32098-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916187" comment="texlive-esvect-fonts-2021.186.1.3svn32098-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916188" comment="texlive-etaremune-2021.186.1.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916189" comment="texlive-etaremune-doc-2021.186.1.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916190" comment="texlive-etbb-2021.186.1.051svn56390-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916191" comment="texlive-etbb-doc-2021.186.1.051svn56390-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916192" comment="texlive-etbb-fonts-2021.186.1.051svn56390-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916193" comment="texlive-etdipa-2021.186.2.6svn36354-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916194" comment="texlive-etex-2021.186.svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916195" comment="texlive-etex-doc-2021.186.svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916196" comment="texlive-etex-pkg-2021.186.2.7svn41784-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916197" comment="texlive-etex-pkg-doc-2021.186.2.7svn41784-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916198" comment="texlive-etexcmds-2021.186.1.7svn53171-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916199" comment="texlive-etexcmds-doc-2021.186.1.7svn53171-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916200" comment="texlive-etextools-2021.186.3.1415926svn20694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916201" comment="texlive-etextools-doc-2021.186.3.1415926svn20694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916202" comment="texlive-ethiop-2021.186.0.0.7svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916203" comment="texlive-ethiop-doc-2021.186.0.0.7svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916204" comment="texlive-ethiop-t1-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916205" comment="texlive-ethiop-t1-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916206" comment="texlive-ethiop-t1-fonts-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916207" comment="texlive-etoc-2021.186.1.09csvn55156-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916208" comment="texlive-etoc-doc-2021.186.1.09csvn55156-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916209" comment="texlive-etoolbox-2021.186.2.5ksvn56554-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916210" comment="texlive-etoolbox-de-2021.186.1svn21906-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916211" comment="texlive-etoolbox-doc-2021.186.2.5ksvn56554-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916212" comment="texlive-etsvthor-2021.186.1.0svn48186-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916213" comment="texlive-etsvthor-doc-2021.186.1.0svn48186-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916214" comment="texlive-euclideangeometry-2021.186.0.0.1.8svn54897-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916215" comment="texlive-euclideangeometry-doc-2021.186.0.0.1.8svn54897-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916216" comment="texlive-euenc-2021.186.0.0.1hsvn19795-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916217" comment="texlive-euenc-doc-2021.186.0.0.1hsvn19795-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916218" comment="texlive-euflag-2021.186.0.0.8svn55265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916219" comment="texlive-euflag-doc-2021.186.0.0.8svn55265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916220" comment="texlive-eukdate-2021.186.1.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916221" comment="texlive-eukdate-doc-2021.186.1.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916222" comment="texlive-euler-2021.186.2.5svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916223" comment="texlive-euler-doc-2021.186.2.5svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916224" comment="texlive-eulerpx-2021.186.0.0.2.1svn43735-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916225" comment="texlive-eulerpx-doc-2021.186.0.0.2.1svn43735-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916226" comment="texlive-eulervm-2021.186.4.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916227" comment="texlive-eulervm-doc-2021.186.4.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916228" comment="texlive-euro-2021.186.1.1svn22191-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916229" comment="texlive-euro-ce-2021.186.3.0bsvn25714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916230" comment="texlive-euro-ce-doc-2021.186.3.0bsvn25714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916231" comment="texlive-euro-doc-2021.186.1.1svn22191-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916232" comment="texlive-europasscv-2021.186.svn56829-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916233" comment="texlive-europasscv-doc-2021.186.svn56829-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916234" comment="texlive-europecv-2021.186.svn57641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916235" comment="texlive-europecv-doc-2021.186.svn57641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916236" comment="texlive-eurosym-2021.186.1.4_subrfixsvn17265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916237" comment="texlive-eurosym-doc-2021.186.1.4_subrfixsvn17265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916238" comment="texlive-eurosym-fonts-2021.186.1.4_subrfixsvn17265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916239" comment="texlive-euxm-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916240" comment="texlive-everyhook-2021.186.1.2svn35675-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916241" comment="texlive-everyhook-doc-2021.186.1.2svn35675-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916242" comment="texlive-everypage-2021.186.2.0bsvn56694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916243" comment="texlive-everypage-doc-2021.186.2.0bsvn56694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916244" comment="texlive-everysel-2021.186.2.1svn57489-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916245" comment="texlive-everysel-doc-2021.186.2.1svn57489-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916246" comment="texlive-everyshi-2021.186.4.00svn57001-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916247" comment="texlive-everyshi-doc-2021.186.4.00svn57001-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916248" comment="texlive-exam-2021.186.2.7svn58023-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916249" comment="texlive-exam-doc-2021.186.2.7svn58023-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916250" comment="texlive-exam-n-2021.186.1.1.4svn42755-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916251" comment="texlive-exam-n-doc-2021.186.1.1.4svn42755-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916252" comment="texlive-exam-randomizechoices-2021.186.0.0.1svn49662-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916253" comment="texlive-exam-randomizechoices-doc-2021.186.0.0.1svn49662-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916254" comment="texlive-examdesign-2021.186.1.101svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916255" comment="texlive-examdesign-doc-2021.186.1.101svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916256" comment="texlive-example-2021.186.svn33398-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916257" comment="texlive-examplep-2021.186.0.0.04svn55265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916258" comment="texlive-examplep-doc-2021.186.0.0.04svn55265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916259" comment="texlive-exceltex-2021.186.0.0.5.1svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916260" comment="texlive-exceltex-doc-2021.186.0.0.5.1svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916261" comment="texlive-excludeonly-2021.186.1.0svn17262-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916262" comment="texlive-excludeonly-doc-2021.186.1.0svn17262-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916263" comment="texlive-exercise-2021.186.1.6svn35417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916264" comment="texlive-exercise-doc-2021.186.1.6svn35417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916265" comment="texlive-exercisebank-2021.186.0.0.3.0svn50448-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916266" comment="texlive-exercisebank-doc-2021.186.0.0.3.0svn50448-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916267" comment="texlive-exercisepoints-2021.186.1.2.3svn49590-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916268" comment="texlive-exercisepoints-doc-2021.186.1.2.3svn49590-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916269" comment="texlive-exercises-2021.186.1.1svn55188-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916270" comment="texlive-exercises-doc-2021.186.1.1svn55188-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916271" comment="texlive-exesheet-2021.186.1.0svn55916-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916272" comment="texlive-exesheet-doc-2021.186.1.0svn55916-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916273" comment="texlive-exframe-2021.186.3.4svn53911-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916274" comment="texlive-exframe-doc-2021.186.3.4svn53911-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916275" comment="texlive-exp-testopt-2021.186.0.0.3svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916276" comment="texlive-exp-testopt-doc-2021.186.0.0.3svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916277" comment="texlive-expdlist-2021.186.2.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916278" comment="texlive-expdlist-doc-2021.186.2.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916279" comment="texlive-expex-2021.186.5.1bsvn44499-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916280" comment="texlive-expex-doc-2021.186.5.1bsvn44499-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916281" comment="texlive-expkv-2021.186.1.6svn57247-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916282" comment="texlive-expkv-cs-2021.186.0.0.6svn56693-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916283" comment="texlive-expkv-cs-doc-2021.186.0.0.6svn56693-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916284" comment="texlive-expkv-def-2021.186.0.0.7svn57246-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916285" comment="texlive-expkv-def-doc-2021.186.0.0.7svn57246-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916286" comment="texlive-expkv-doc-2021.186.1.6svn57247-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916287" comment="texlive-expkv-opt-2021.186.0.0.1bsvn56633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916288" comment="texlive-expkv-opt-doc-2021.186.0.0.1bsvn56633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916289" comment="texlive-export-2021.186.1.8svn27206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916290" comment="texlive-export-doc-2021.186.1.8svn27206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916291" comment="texlive-expose-expl3-dunkerque-2019-2021.186.1.2svn54451-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916292" comment="texlive-expressg-2021.186.1.5svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916293" comment="texlive-expressg-doc-2021.186.1.5svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916294" comment="texlive-exsheets-2021.186.0.0.21ksvn52227-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916295" comment="texlive-exsheets-doc-2021.186.0.0.21ksvn52227-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916296" comment="texlive-exsol-2021.186.1.4svn48977-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916297" comment="texlive-exsol-doc-2021.186.1.4svn48977-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916298" comment="texlive-extarrows-2021.186.1.2.0svn54400-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916299" comment="texlive-extarrows-doc-2021.186.1.2.0svn54400-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916300" comment="texlive-exteps-2021.186.0.0.41svn19859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916301" comment="texlive-exteps-doc-2021.186.0.0.41svn19859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916302" comment="texlive-extpfeil-2021.186.0.0.4svn16243-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916303" comment="texlive-extpfeil-doc-2021.186.0.0.4svn16243-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916304" comment="texlive-extract-2021.186.1.9asvn52117-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916305" comment="texlive-extract-doc-2021.186.1.9asvn52117-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916306" comment="texlive-extsizes-2021.186.1.4asvn17263-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916307" comment="texlive-extsizes-doc-2021.186.1.4asvn17263-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916308" comment="texlive-facsimile-2021.186.1.0svn21328-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916309" comment="texlive-facsimile-doc-2021.186.1.0svn21328-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916310" comment="texlive-factura-2021.186.4.00svn56948-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916311" comment="texlive-factura-doc-2021.186.4.00svn56948-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916312" comment="texlive-facture-2021.186.1.2.2svn43865-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916313" comment="texlive-facture-belge-simple-sans-tva-2021.186.2.1svn49004-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916314" comment="texlive-facture-belge-simple-sans-tva-doc-2021.186.2.1svn49004-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916315" comment="texlive-facture-doc-2021.186.1.2.2svn43865-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916316" comment="texlive-faktor-2021.186.0.0.1bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916317" comment="texlive-faktor-doc-2021.186.0.0.1bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916318" comment="texlive-fancybox-2021.186.1.4svn18304-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916319" comment="texlive-fancybox-doc-2021.186.1.4svn18304-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916320" comment="texlive-fancyhandout-2021.186.svn46411-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916321" comment="texlive-fancyhandout-doc-2021.186.svn46411-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916322" comment="texlive-fancyhdr-2021.186.4.0.1svn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916323" comment="texlive-fancyhdr-doc-2021.186.4.0.1svn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916324" comment="texlive-fancyhdr-it-2021.186.svn21912-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916325" comment="texlive-fancylabel-2021.186.1.1svn46736-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916326" comment="texlive-fancylabel-doc-2021.186.1.1svn46736-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916327" comment="texlive-fancynum-2021.186.0.0.92svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916328" comment="texlive-fancynum-doc-2021.186.0.0.92svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916329" comment="texlive-fancypar-2021.186.1.2svn49801-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916330" comment="texlive-fancypar-doc-2021.186.1.2svn49801-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916331" comment="texlive-fancyref-2021.186.0.0.9csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916332" comment="texlive-fancyref-doc-2021.186.0.0.9csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916333" comment="texlive-fancyslides-2021.186.1.0svn36263-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916334" comment="texlive-fancyslides-doc-2021.186.1.0svn36263-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916335" comment="texlive-fancytabs-2021.186.1.9svn41549-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916336" comment="texlive-fancytabs-doc-2021.186.1.9svn41549-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916337" comment="texlive-fancytooltips-2021.186.1.8svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916338" comment="texlive-fancytooltips-doc-2021.186.1.8svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916339" comment="texlive-fancyvrb-2021.186.3.7svn57488-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916340" comment="texlive-fancyvrb-doc-2021.186.3.7svn57488-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916341" comment="texlive-fandol-2021.186.0.0.3svn37889-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916342" comment="texlive-fandol-doc-2021.186.0.0.3svn37889-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916343" comment="texlive-fandol-fonts-2021.186.0.0.3svn37889-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916344" comment="texlive-fascicules-2021.186.1svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916345" comment="texlive-fascicules-doc-2021.186.1svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916346" comment="texlive-fast-diagram-2021.186.1.1svn29264-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916347" comment="texlive-fast-diagram-doc-2021.186.1.1svn29264-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916348" comment="texlive-fbb-2021.186.1.16svn55728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916349" comment="texlive-fbb-doc-2021.186.1.16svn55728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916350" comment="texlive-fbb-fonts-2021.186.1.16svn55728-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916351" comment="texlive-fbithesis-2021.186.1.2msvn21340-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916352" comment="texlive-fbithesis-doc-2021.186.1.2msvn21340-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916353" comment="texlive-fbox-2021.186.0.0.05svn55627-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916354" comment="texlive-fbox-doc-2021.186.0.0.05svn55627-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916355" comment="texlive-fbs-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916356" comment="texlive-fc-2021.186.1.4svn32796-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916357" comment="texlive-fc-doc-2021.186.1.4svn32796-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916358" comment="texlive-fcavtex-2021.186.1.1svn38074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916359" comment="texlive-fcavtex-doc-2021.186.1.1svn38074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916360" comment="texlive-fcltxdoc-2021.186.1.0svn24500-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916361" comment="texlive-fcltxdoc-doc-2021.186.1.0svn24500-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916362" comment="texlive-fcolumn-2021.186.1.3svn57428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916363" comment="texlive-fcolumn-doc-2021.186.1.3svn57428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916364" comment="texlive-fdsymbol-2021.186.0.0.8svn26722-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916365" comment="texlive-fdsymbol-doc-2021.186.0.0.8svn26722-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916366" comment="texlive-fdsymbol-fonts-2021.186.0.0.8svn26722-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916367" comment="texlive-fduthesis-2021.186.0.0.7esvn56216-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916368" comment="texlive-fduthesis-doc-2021.186.0.0.7esvn56216-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916369" comment="texlive-featpost-2021.186.0.0.8.8svn35346-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916370" comment="texlive-featpost-doc-2021.186.0.0.8.8svn35346-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916371" comment="texlive-fei-2021.186.4.10.1svn55960-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916372" comment="texlive-fei-doc-2021.186.4.10.1svn55960-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916373" comment="texlive-fenixpar-2021.186.0.0.92svn24730-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916374" comment="texlive-fenixpar-doc-2021.186.0.0.92svn24730-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916375" comment="texlive-fetamont-2021.186.svn43812-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916376" comment="texlive-fetamont-doc-2021.186.svn43812-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916377" comment="texlive-fetamont-fonts-2021.186.svn43812-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916378" comment="texlive-fetchcls-2021.186.1.0svn45245-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916379" comment="texlive-fetchcls-doc-2021.186.1.0svn45245-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916380" comment="texlive-feupphdteses-2021.186.4.0svn30962-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916381" comment="texlive-feupphdteses-doc-2021.186.4.0svn30962-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916382" comment="texlive-fewerfloatpages-2021.186.1.0bsvn58058-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916383" comment="texlive-fewerfloatpages-doc-2021.186.1.0bsvn58058-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916384" comment="texlive-feyn-2021.186.0.0.4.1svn55777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916385" comment="texlive-feyn-doc-2021.186.0.0.4.1svn55777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916386" comment="texlive-feynmf-2021.186.1.08svn17259-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916387" comment="texlive-feynmf-doc-2021.186.1.08svn17259-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916388" comment="texlive-feynmp-auto-2021.186.1.1svn30223-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916389" comment="texlive-feynmp-auto-doc-2021.186.1.1svn30223-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916390" comment="texlive-ffslides-2021.186.svn38895-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916391" comment="texlive-ffslides-doc-2021.186.svn38895-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916392" comment="texlive-fge-2021.186.1.25svn37628-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916393" comment="texlive-fge-doc-2021.186.1.25svn37628-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916394" comment="texlive-fge-fonts-2021.186.1.25svn37628-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916395" comment="texlive-fgruler-2021.186.1.3svn56854-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916396" comment="texlive-fgruler-doc-2021.186.1.3svn56854-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916397" comment="texlive-fibeamer-2021.186.1.1.8svn53146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916398" comment="texlive-fibeamer-doc-2021.186.1.1.8svn53146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916399" comment="texlive-fifinddo-info-2021.186.1.1bsvn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916400" comment="texlive-fifinddo-info-doc-2021.186.1.1bsvn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916401" comment="texlive-fifo-stack-2021.186.1.0svn33288-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916402" comment="texlive-fifo-stack-doc-2021.186.1.0svn33288-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916403" comment="texlive-fig4latex-2021.186.0.0.2svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916404" comment="texlive-fig4latex-doc-2021.186.0.0.2svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916405" comment="texlive-figbas-2021.186.1.0.3svn28943-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916406" comment="texlive-figbas-doc-2021.186.1.0.3svn28943-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916407" comment="texlive-figbas-fonts-2021.186.1.0.3svn28943-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916408" comment="texlive-figbib-2021.186.svn19388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916409" comment="texlive-figbib-doc-2021.186.svn19388-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916410" comment="texlive-figchild-2021.186.1.0.0svn58759-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916411" comment="texlive-figchild-doc-2021.186.1.0.0svn58759-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916412" comment="texlive-figflow-2021.186.svn21462-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916413" comment="texlive-figflow-doc-2021.186.svn21462-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916414" comment="texlive-figsize-2021.186.0.0.1svn18784-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916415" comment="texlive-figsize-doc-2021.186.0.0.1svn18784-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916416" comment="texlive-filecontents-2021.186.1.5svn52142-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916417" comment="texlive-filecontents-doc-2021.186.1.5svn52142-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916418" comment="texlive-filecontentsdef-2021.186.1.5svn52208-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916419" comment="texlive-filecontentsdef-doc-2021.186.1.5svn52208-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916420" comment="texlive-filedate-2021.186.svn29529-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916421" comment="texlive-filedate-doc-2021.186.svn29529-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916422" comment="texlive-filehook-2021.186.0.0.8asvn56479-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916423" comment="texlive-filehook-doc-2021.186.0.0.8asvn56479-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916424" comment="texlive-fileinfo-2021.186.0.0.81asvn28421-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916425" comment="texlive-fileinfo-doc-2021.186.0.0.81asvn28421-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916426" comment="texlive-filemod-2021.186.1.2svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916427" comment="texlive-filemod-doc-2021.186.1.2svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916428" comment="texlive-finbib-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916429" comment="texlive-findhyph-2021.186.3.4svn47444-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916430" comment="texlive-findhyph-doc-2021.186.3.4svn47444-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916431" comment="texlive-fink-2021.186.2.2.1svn24329-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916432" comment="texlive-fink-doc-2021.186.2.2.1svn24329-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916433" comment="texlive-finstrut-2021.186.0.0.5svn21719-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916434" comment="texlive-finstrut-doc-2021.186.0.0.5svn21719-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916435" comment="texlive-fira-2021.186.4.3svn55437-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916436" comment="texlive-fira-doc-2021.186.4.3svn55437-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916437" comment="texlive-fira-fonts-2021.186.4.3svn55437-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916438" comment="texlive-firamath-2021.186.0.0.3.4svn56672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916439" comment="texlive-firamath-doc-2021.186.0.0.3.4svn56672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916440" comment="texlive-firamath-fonts-2021.186.0.0.3.4svn56672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916441" comment="texlive-firamath-otf-2021.186.0.0.02asvn50732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916442" comment="texlive-firamath-otf-doc-2021.186.0.0.02asvn50732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916443" comment="texlive-first-latex-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916444" comment="texlive-firstaid-2021.186.1.0jsvn58440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916445" comment="texlive-firstaid-doc-2021.186.1.0jsvn58440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916446" comment="texlive-fitbox-2021.186.1.02svn50088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916447" comment="texlive-fitbox-doc-2021.186.1.02svn50088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916448" comment="texlive-fithesis-2021.186.0.0.3.51svn54483-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916449" comment="texlive-fithesis-doc-2021.186.0.0.3.51svn54483-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916450" comment="texlive-fix2col-2021.186.0.0.04svn38770-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916451" comment="texlive-fix2col-doc-2021.186.0.0.04svn38770-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916452" comment="texlive-fixcmex-2021.186.1.1svn51825-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916453" comment="texlive-fixcmex-doc-2021.186.1.1svn51825-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916454" comment="texlive-fixfoot-2021.186.0.0.3asvn17131-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916455" comment="texlive-fixfoot-doc-2021.186.0.0.3asvn17131-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916456" comment="texlive-fixjfm-2021.186.0.0.8svn47113-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916457" comment="texlive-fixjfm-doc-2021.186.0.0.8svn47113-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916458" comment="texlive-fixlatvian-2021.186.1asvn21631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916459" comment="texlive-fixlatvian-doc-2021.186.1asvn21631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916460" comment="texlive-fixltxhyph-2021.186.0.0.4svn25832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916461" comment="texlive-fixltxhyph-doc-2021.186.0.0.4svn25832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916462" comment="texlive-fixme-2021.186.4.5svn49591-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916463" comment="texlive-fixme-doc-2021.186.4.5svn49591-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916464" comment="texlive-fixmetodonotes-2021.186.0.0.2.2svn30168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916465" comment="texlive-fixmetodonotes-doc-2021.186.0.0.2.2svn30168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916466" comment="texlive-fixpdfmag-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916467" comment="texlive-fiziko-2021.186.0.0.1.3svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916468" comment="texlive-fiziko-doc-2021.186.0.0.1.3svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916469" comment="texlive-fjodor-2021.186.svn53207-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916470" comment="texlive-fjodor-doc-2021.186.svn53207-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916471" comment="texlive-flabels-2021.186.1.0svn17272-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916472" comment="texlive-flabels-doc-2021.186.1.0svn17272-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916473" comment="texlive-flacards-2021.186.0.0.1.1bsvn19440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916474" comment="texlive-flacards-doc-2021.186.0.0.1.1bsvn19440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916475" comment="texlive-flagderiv-2021.186.0.0.10svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916476" comment="texlive-flagderiv-doc-2021.186.0.0.10svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916477" comment="texlive-flashcards-2021.186.1.0.1svn19667-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916478" comment="texlive-flashcards-doc-2021.186.1.0.1svn19667-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916479" comment="texlive-flashmovie-2021.186.0.0.4svn25768-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916480" comment="texlive-flashmovie-doc-2021.186.0.0.4svn25768-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916481" comment="texlive-flipbook-2021.186.0.0.2svn25584-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916482" comment="texlive-flipbook-doc-2021.186.0.0.2svn25584-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916483" comment="texlive-flippdf-2021.186.2.0bsvn56782-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916484" comment="texlive-flippdf-doc-2021.186.2.0bsvn56782-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249763" version="1" class="patch">
	<metadata>
		<title>texlive-float-2021.186.1.3dsvn15878-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-float-2021.186.1.3dsvn15878-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009916485" comment="texlive-float-2021.186.1.3dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916486" comment="texlive-float-doc-2021.186.1.3dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916487" comment="texlive-floatrow-2021.186.0.0.3bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916488" comment="texlive-floatrow-doc-2021.186.0.0.3bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916489" comment="texlive-flowchart-2021.186.3.3svn36572-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916490" comment="texlive-flowchart-doc-2021.186.3.3svn36572-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916491" comment="texlive-flowfram-2021.186.1.17svn35291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916492" comment="texlive-flowfram-doc-2021.186.1.17svn35291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916493" comment="texlive-fltpoint-2021.186.1.1bsvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916494" comment="texlive-fltpoint-doc-2021.186.1.1bsvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916495" comment="texlive-fmp-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916496" comment="texlive-fmp-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916497" comment="texlive-fmtcount-2021.186.3.07svn53912-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916498" comment="texlive-fmtcount-doc-2021.186.3.07svn53912-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916499" comment="texlive-fn2end-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916500" comment="texlive-fn2end-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916501" comment="texlive-fnbreak-2021.186.1.30svn25003-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916502" comment="texlive-fnbreak-doc-2021.186.1.30svn25003-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916503" comment="texlive-fncychap-2021.186.1.34svn20710-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916504" comment="texlive-fncychap-doc-2021.186.1.34svn20710-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916505" comment="texlive-fncylab-2021.186.1.1svn52090-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916506" comment="texlive-fncylab-doc-2021.186.1.1svn52090-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916507" comment="texlive-fnpara-2021.186.svn25607-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916508" comment="texlive-fnpara-doc-2021.186.svn25607-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916509" comment="texlive-fnpct-2021.186.1.0svn57508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916510" comment="texlive-fnpct-doc-2021.186.1.0svn57508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916511" comment="texlive-fnspe-2021.186.1.2asvn45360-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916512" comment="texlive-fnspe-doc-2021.186.1.2asvn45360-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916513" comment="texlive-fntproof-2021.186.svn20638-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916514" comment="texlive-fntproof-doc-2021.186.svn20638-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916515" comment="texlive-fnumprint-2021.186.1.1asvn29173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916516" comment="texlive-fnumprint-doc-2021.186.1.1asvn29173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916517" comment="texlive-foekfont-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916518" comment="texlive-foekfont-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916519" comment="texlive-foekfont-fonts-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916520" comment="texlive-foilhtml-2021.186.1.2svn21855-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916521" comment="texlive-foilhtml-doc-2021.186.1.2svn21855-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916522" comment="texlive-fonetika-2021.186.svn21326-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916523" comment="texlive-fonetika-doc-2021.186.svn21326-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916524" comment="texlive-fonetika-fonts-2021.186.svn21326-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916525" comment="texlive-font-change-2021.186.2015.2svn40403-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916526" comment="texlive-font-change-doc-2021.186.2015.2svn40403-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916527" comment="texlive-font-change-xetex-2021.186.2016.1svn40404-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916528" comment="texlive-font-change-xetex-doc-2021.186.2016.1svn40404-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916529" comment="texlive-fontawesome-2021.186.4.6.3.2svn48145-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916530" comment="texlive-fontawesome-doc-2021.186.4.6.3.2svn48145-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916531" comment="texlive-fontawesome-fonts-2021.186.4.6.3.2svn48145-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916532" comment="texlive-fontawesome5-2021.186.5.13.0svn54517-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916533" comment="texlive-fontawesome5-doc-2021.186.5.13.0svn54517-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916534" comment="texlive-fontawesome5-fonts-2021.186.5.13.0svn54517-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916535" comment="texlive-fontaxes-2021.186.1.0esvn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916536" comment="texlive-fontaxes-doc-2021.186.1.0esvn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916537" comment="texlive-fontbook-2021.186.0.0.2svn23608-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916538" comment="texlive-fontbook-doc-2021.186.0.0.2svn23608-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916539" comment="texlive-fontch-2021.186.2.2svn17859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916540" comment="texlive-fontch-doc-2021.186.2.2svn17859-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916541" comment="texlive-fontinst-2021.186.1.933svn53562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916542" comment="texlive-fontinst-doc-2021.186.1.933svn53562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916543" comment="texlive-fontmfizz-2021.186.svn43546-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916544" comment="texlive-fontmfizz-doc-2021.186.svn43546-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916545" comment="texlive-fontmfizz-fonts-2021.186.svn43546-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916546" comment="texlive-fontname-2021.186.svn53228-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916547" comment="texlive-fontname-doc-2021.186.svn53228-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916548" comment="texlive-fontools-2021.186.svn58747-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916549" comment="texlive-fontools-doc-2021.186.svn58747-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916550" comment="texlive-fonts-churchslavonic-2021.186.2.2svn56350-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916551" comment="texlive-fonts-churchslavonic-doc-2021.186.2.2svn56350-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916552" comment="texlive-fonts-churchslavonic-fonts-2021.186.2.2svn56350-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916553" comment="texlive-fonts-tlwg-2021.186.0.0.7.2svn54994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916554" comment="texlive-fonts-tlwg-doc-2021.186.0.0.7.2svn54994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916555" comment="texlive-fonts-tlwg-fonts-2021.186.0.0.7.2svn54994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916556" comment="texlive-fontsetup-2021.186.1.009svn57553-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916557" comment="texlive-fontsetup-doc-2021.186.1.009svn57553-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916558" comment="texlive-fontsize-2021.186.0.0.8.1svn58508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916559" comment="texlive-fontsize-doc-2021.186.0.0.8.1svn58508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916560" comment="texlive-fontspec-2021.186.2.7isvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916561" comment="texlive-fontspec-doc-2021.186.2.7isvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916562" comment="texlive-fonttable-2021.186.1.6csvn44799-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916563" comment="texlive-fonttable-doc-2021.186.1.6csvn44799-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916564" comment="texlive-fontware-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916565" comment="texlive-fontwrap-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916566" comment="texlive-fontwrap-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916567" comment="texlive-footbib-2021.186.2.0.7svn17115-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916568" comment="texlive-footbib-doc-2021.186.2.0.7svn17115-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916569" comment="texlive-footmisc-2021.186.5.5bsvn23330-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916570" comment="texlive-footmisc-doc-2021.186.5.5bsvn23330-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916571" comment="texlive-footmisx-2021.186.20161201svn42621-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916572" comment="texlive-footmisx-doc-2021.186.20161201svn42621-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916573" comment="texlive-footnotebackref-2021.186.1.0svn27034-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916574" comment="texlive-footnotebackref-doc-2021.186.1.0svn27034-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916575" comment="texlive-footnotehyper-2021.186.1.1dsvn57618-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916576" comment="texlive-footnotehyper-doc-2021.186.1.1dsvn57618-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916577" comment="texlive-footnoterange-2021.186.1.0csvn52910-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916578" comment="texlive-footnoterange-doc-2021.186.1.0csvn52910-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916579" comment="texlive-footnpag-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916580" comment="texlive-footnpag-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916581" comment="texlive-forarray-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916582" comment="texlive-forarray-doc-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916583" comment="texlive-foreign-2021.186.2.7svn27819-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916584" comment="texlive-foreign-doc-2021.186.2.7svn27819-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916585" comment="texlive-forest-2021.186.2.1.5svn57398-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916586" comment="texlive-forest-doc-2021.186.2.1.5svn57398-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916587" comment="texlive-forest-quickstart-2021.186.svn55688-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916588" comment="texlive-forloop-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916589" comment="texlive-forloop-doc-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916590" comment="texlive-formation-latex-ul-2021.186.2020.10svn56714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916591" comment="texlive-formation-latex-ul-doc-2021.186.2020.10svn56714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916592" comment="texlive-formlett-2021.186.2.3svn21480-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916593" comment="texlive-formlett-doc-2021.186.2.3svn21480-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916594" comment="texlive-forms16be-2021.186.1.3svn51305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916595" comment="texlive-forms16be-doc-2021.186.1.3svn51305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916596" comment="texlive-formular-2021.186.1.0asvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916597" comment="texlive-formular-doc-2021.186.1.0asvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916598" comment="texlive-forum-2021.186.svn56025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916599" comment="texlive-forum-doc-2021.186.svn56025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916600" comment="texlive-forum-fonts-2021.186.svn56025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916601" comment="texlive-fouridx-2021.186.2.00svn32214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916602" comment="texlive-fouridx-doc-2021.186.2.00svn32214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916603" comment="texlive-fourier-2021.186.2.2svn54090-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916604" comment="texlive-fourier-doc-2021.186.2.2svn54090-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916605" comment="texlive-fourier-fonts-2021.186.2.2svn54090-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916606" comment="texlive-fouriernc-2021.186.svn29646-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916607" comment="texlive-fouriernc-doc-2021.186.svn29646-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916608" comment="texlive-fp-2021.186.2.1dsvn49719-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916609" comment="texlive-fp-doc-2021.186.2.1dsvn49719-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916610" comment="texlive-fpl-2021.186.1.003svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916611" comment="texlive-fpl-doc-2021.186.1.003svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916612" comment="texlive-fpl-fonts-2021.186.1.003svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916613" comment="texlive-fragmaster-2021.186.1.6svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916614" comment="texlive-fragmaster-doc-2021.186.1.6svn26313-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916615" comment="texlive-fragments-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916616" comment="texlive-fragments-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916617" comment="texlive-frame-2021.186.1.0svn18312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916618" comment="texlive-frame-doc-2021.186.1.0svn18312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916619" comment="texlive-framed-2021.186.0.0.96svn26789-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916620" comment="texlive-framed-doc-2021.186.0.0.96svn26789-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916621" comment="texlive-francais-bst-2021.186.1.1svn38922-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916622" comment="texlive-francais-bst-doc-2021.186.1.1svn38922-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916623" comment="texlive-frankenstein-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916624" comment="texlive-frankenstein-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916625" comment="texlive-frcursive-2021.186.svn24559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916626" comment="texlive-frcursive-doc-2021.186.svn24559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916627" comment="texlive-frcursive-fonts-2021.186.svn24559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916628" comment="texlive-frederika2016-2021.186.1.000_2016_initial_releasesvn42157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916629" comment="texlive-frederika2016-doc-2021.186.1.000_2016_initial_releasesvn42157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916630" comment="texlive-frederika2016-fonts-2021.186.1.000_2016_initial_releasesvn42157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916631" comment="texlive-frege-2021.186.1.3svn27417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916632" comment="texlive-frege-doc-2021.186.1.3svn27417-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916633" comment="texlive-frenchmath-2021.186.1.5svn56847-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916634" comment="texlive-frenchmath-doc-2021.186.1.5svn56847-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916635" comment="texlive-frimurer-2021.186.1svn56704-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916636" comment="texlive-frimurer-doc-2021.186.1svn56704-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916637" comment="texlive-frimurer-fonts-2021.186.1svn56704-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916638" comment="texlive-frletter-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916639" comment="texlive-frletter-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916640" comment="texlive-frontespizio-2021.186.1.4asvn24054-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916641" comment="texlive-frontespizio-doc-2021.186.1.4asvn24054-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916642" comment="texlive-froufrou-2021.186.1.2svn57248-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916643" comment="texlive-froufrou-doc-2021.186.1.2svn57248-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916644" comment="texlive-frpseudocode-2021.186.0.0.3.0svn56088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916645" comment="texlive-frpseudocode-doc-2021.186.0.0.3.0svn56088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916646" comment="texlive-ftc-notebook-2021.186.1.1svn50043-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916647" comment="texlive-ftc-notebook-doc-2021.186.1.1svn50043-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916648" comment="texlive-ftcap-2021.186.1.4svn17275-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916649" comment="texlive-ftcap-doc-2021.186.1.4svn17275-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916650" comment="texlive-ftnxtra-2021.186.0.0.1svn29652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916651" comment="texlive-ftnxtra-doc-2021.186.0.0.1svn29652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916652" comment="texlive-fullblck-2021.186.1.03svn25434-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916653" comment="texlive-fullblck-doc-2021.186.1.03svn25434-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916654" comment="texlive-fullminipage-2021.186.0.0.1.1svn34545-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916655" comment="texlive-fullminipage-doc-2021.186.0.0.1.1svn34545-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916656" comment="texlive-fullwidth-2021.186.0.0.1svn24684-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916657" comment="texlive-fullwidth-doc-2021.186.0.0.1svn24684-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916658" comment="texlive-functan-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916659" comment="texlive-functan-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916660" comment="texlive-fundus-calligra-2021.186.1.2svn26018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916661" comment="texlive-fundus-calligra-doc-2021.186.1.2svn26018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916662" comment="texlive-fundus-cyr-2021.186.svn26019-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916663" comment="texlive-fundus-sueterlin-2021.186.1.2svn26030-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916664" comment="texlive-fundus-sueterlin-doc-2021.186.1.2svn26030-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916665" comment="texlive-fvextra-2021.186.1.4svn49947-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916666" comment="texlive-fvextra-doc-2021.186.1.4svn49947-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916667" comment="texlive-fwlw-2021.186.svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916668" comment="texlive-fwlw-doc-2021.186.svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916669" comment="texlive-g-brief-2021.186.4.0.3svn50415-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916670" comment="texlive-g-brief-doc-2021.186.4.0.3svn50415-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916671" comment="texlive-gaceta-2021.186.1.06svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916672" comment="texlive-gaceta-doc-2021.186.1.06svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916673" comment="texlive-galois-2021.186.1.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916674" comment="texlive-galois-doc-2021.186.1.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916675" comment="texlive-gamebook-2021.186.1.0svn24714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916676" comment="texlive-gamebook-doc-2021.186.1.0svn24714-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916677" comment="texlive-gammas-2021.186.1.1svn56403-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916678" comment="texlive-gammas-doc-2021.186.1.1svn56403-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916679" comment="texlive-garamond-libre-2021.186.1.4svn55166-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916680" comment="texlive-garamond-libre-doc-2021.186.1.4svn55166-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916681" comment="texlive-garamond-libre-fonts-2021.186.1.4svn55166-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916682" comment="texlive-garamond-math-2021.186.svn52820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916683" comment="texlive-garamond-math-doc-2021.186.svn52820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916684" comment="texlive-garamond-math-fonts-2021.186.svn52820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916685" comment="texlive-garrigues-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916686" comment="texlive-garrigues-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916687" comment="texlive-garuda-c90-2021.186.svn37677-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916688" comment="texlive-gastex-2021.186.3.0svn58505-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916689" comment="texlive-gastex-doc-2021.186.3.0svn58505-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916690" comment="texlive-gatech-thesis-2021.186.1.8svn19886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916691" comment="texlive-gatech-thesis-doc-2021.186.1.8svn19886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916692" comment="texlive-gates-2021.186.0.0.2svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916693" comment="texlive-gates-doc-2021.186.0.0.2svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916694" comment="texlive-gatherenum-2021.186.1.8svn52209-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916695" comment="texlive-gatherenum-doc-2021.186.1.8svn52209-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916696" comment="texlive-gauss-2021.186.svn32934-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916697" comment="texlive-gauss-doc-2021.186.svn32934-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916698" comment="texlive-gb4e-2021.186.svn19216-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916699" comment="texlive-gb4e-doc-2021.186.svn19216-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916700" comment="texlive-gbt7714-2021.186.2.1svn57157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916701" comment="texlive-gbt7714-doc-2021.186.2.1svn57157-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916702" comment="texlive-gcard-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916703" comment="texlive-gcard-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916704" comment="texlive-gchords-2021.186.1.20svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916705" comment="texlive-gchords-doc-2021.186.1.20svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916706" comment="texlive-gcite-2021.186.1.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916707" comment="texlive-gcite-doc-2021.186.1.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916708" comment="texlive-gckanbun-2021.186.1.2svn58754-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916709" comment="texlive-gckanbun-doc-2021.186.1.2svn58754-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916710" comment="texlive-gender-2021.186.1.0svn36464-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916711" comment="texlive-gender-doc-2021.186.1.0svn36464-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916712" comment="texlive-gene-logic-2021.186.1.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916713" comment="texlive-gene-logic-doc-2021.186.1.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916714" comment="texlive-genealogy-2021.186.svn25112-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916715" comment="texlive-genealogy-doc-2021.186.svn25112-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916716" comment="texlive-genealogytree-2021.186.2.01svn55978-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916717" comment="texlive-genealogytree-doc-2021.186.2.01svn55978-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916718" comment="texlive-genmpage-2021.186.0.0.3.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916719" comment="texlive-genmpage-doc-2021.186.0.0.3.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916720" comment="texlive-gentium-tug-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916721" comment="texlive-gentium-tug-doc-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916722" comment="texlive-gentium-tug-fonts-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916723" comment="texlive-gentle-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916724" comment="texlive-gentombow-2021.186.svn56665-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916725" comment="texlive-gentombow-doc-2021.186.svn56665-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916726" comment="texlive-geometry-2021.186.5.9svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916727" comment="texlive-geometry-doc-2021.186.5.9svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916728" comment="texlive-german-2021.186.2.5esvn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916729" comment="texlive-german-doc-2021.186.2.5esvn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916730" comment="texlive-germbib-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916731" comment="texlive-germbib-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916732" comment="texlive-germkorr-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916733" comment="texlive-germkorr-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916734" comment="texlive-geschichtsfrkl-2021.186.1.4svn42121-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916735" comment="texlive-geschichtsfrkl-doc-2021.186.1.4svn42121-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916736" comment="texlive-getfiledate-2021.186.1.2svn16189-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916737" comment="texlive-getfiledate-doc-2021.186.1.2svn16189-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916738" comment="texlive-getitems-2021.186.1.0svn39365-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916739" comment="texlive-getitems-doc-2021.186.1.0svn39365-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916740" comment="texlive-getmap-2021.186.1.11svn50589-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916741" comment="texlive-getmap-doc-2021.186.1.11svn50589-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916742" comment="texlive-getoptk-2021.186.1.0svn23567-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916743" comment="texlive-getoptk-doc-2021.186.1.0svn23567-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916744" comment="texlive-gettitlestring-2021.186.1.6svn53170-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916745" comment="texlive-gettitlestring-doc-2021.186.1.6svn53170-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916746" comment="texlive-gfnotation-2021.186.2.9svn37156-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916747" comment="texlive-gfnotation-doc-2021.186.2.9svn37156-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916748" comment="texlive-gfsartemisia-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916749" comment="texlive-gfsartemisia-doc-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916750" comment="texlive-gfsartemisia-fonts-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916751" comment="texlive-gfsbaskerville-2021.186.1.0svn19440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916752" comment="texlive-gfsbaskerville-doc-2021.186.1.0svn19440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916753" comment="texlive-gfsbaskerville-fonts-2021.186.1.0svn19440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916754" comment="texlive-gfsbodoni-2021.186.1.01svn28484-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916755" comment="texlive-gfsbodoni-doc-2021.186.1.01svn28484-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916756" comment="texlive-gfsbodoni-fonts-2021.186.1.01svn28484-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916757" comment="texlive-gfscomplutum-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916758" comment="texlive-gfscomplutum-doc-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916759" comment="texlive-gfscomplutum-fonts-2021.186.1.0svn19469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916760" comment="texlive-gfsdidot-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916761" comment="texlive-gfsdidot-doc-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916762" comment="texlive-gfsdidot-fonts-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916763" comment="texlive-gfsdidotclassic-2021.186.001.001svn52778-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916764" comment="texlive-gfsdidotclassic-doc-2021.186.001.001svn52778-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916765" comment="texlive-gfsdidotclassic-fonts-2021.186.001.001svn52778-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916766" comment="texlive-gfsneohellenic-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916767" comment="texlive-gfsneohellenic-doc-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916768" comment="texlive-gfsneohellenic-fonts-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916769" comment="texlive-gfsneohellenicmath-2021.186.1.0.1svn52570-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916770" comment="texlive-gfsneohellenicmath-doc-2021.186.1.0.1svn52570-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916771" comment="texlive-gfsneohellenicmath-fonts-2021.186.1.0.1svn52570-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916772" comment="texlive-gfsporson-2021.186.1.01svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916773" comment="texlive-gfsporson-doc-2021.186.1.01svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916774" comment="texlive-gfsporson-fonts-2021.186.1.01svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916775" comment="texlive-gfssolomos-2021.186.1.0svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916776" comment="texlive-gfssolomos-doc-2021.186.1.0svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916777" comment="texlive-gfssolomos-fonts-2021.186.1.0svn18651-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916778" comment="texlive-ghab-2021.186.0.0.5svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916779" comment="texlive-ghab-doc-2021.186.0.0.5svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916780" comment="texlive-ghsystem-2021.186.4.8csvn53822-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916781" comment="texlive-ghsystem-doc-2021.186.4.8csvn53822-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916782" comment="texlive-gillcm-2021.186.1.1svn19878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916783" comment="texlive-gillcm-doc-2021.186.1.1svn19878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916784" comment="texlive-gillius-2021.186.svn32068-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916785" comment="texlive-gillius-doc-2021.186.svn32068-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916786" comment="texlive-gillius-fonts-2021.186.svn32068-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916787" comment="texlive-gincltex-2021.186.0.0.3svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916788" comment="texlive-gincltex-doc-2021.186.0.0.3svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916789" comment="texlive-gindex-2021.186.0.0.2svn52311-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916790" comment="texlive-gindex-doc-2021.186.0.0.2svn52311-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916791" comment="texlive-ginpenc-2021.186.1.0svn24980-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916792" comment="texlive-ginpenc-doc-2021.186.1.0svn24980-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916793" comment="texlive-git-latexdiff-2021.186.1.6.0svn54732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916794" comment="texlive-git-latexdiff-doc-2021.186.1.6.0svn54732-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249764" version="1" class="patch">
	<metadata>
		<title>texlive-gitfile-info-2021.186.0.0.5svn51928-46.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-gitfile-info-2021.186.0.0.5svn51928-46.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009916795" comment="texlive-gitfile-info-2021.186.0.0.5svn51928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916796" comment="texlive-gitfile-info-doc-2021.186.0.0.5svn51928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916797" comment="texlive-gitinfo-2021.186.1.0svn34049-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916798" comment="texlive-gitinfo-doc-2021.186.1.0svn34049-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916799" comment="texlive-gitinfo2-2021.186.2.0.7svn38913-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916800" comment="texlive-gitinfo2-doc-2021.186.2.0.7svn38913-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916801" comment="texlive-gitlog-2021.186.0.0.0.betasvn38932-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916802" comment="texlive-gitlog-doc-2021.186.0.0.0.betasvn38932-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916803" comment="texlive-gitver-2021.186.1.3svn56810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916804" comment="texlive-gitver-doc-2021.186.1.3svn56810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916805" comment="texlive-globalvals-2021.186.1.1svn49962-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916806" comment="texlive-globalvals-doc-2021.186.1.1svn49962-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916807" comment="texlive-glosmathtools-2021.186.1.0.0svn55920-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916808" comment="texlive-glosmathtools-doc-2021.186.1.0.0svn55920-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916809" comment="texlive-gloss-2021.186.1.5.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916810" comment="texlive-gloss-doc-2021.186.1.5.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916811" comment="texlive-gloss-occitan-2021.186.0.0.1svn52593-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916812" comment="texlive-gloss-occitan-doc-2021.186.0.0.1svn52593-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916813" comment="texlive-glossaries-2021.186.4.46svn54402-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916814" comment="texlive-glossaries-danish-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916815" comment="texlive-glossaries-danish-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916816" comment="texlive-glossaries-doc-2021.186.4.46svn54402-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916817" comment="texlive-glossaries-dutch-2021.186.1.1svn35685-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916818" comment="texlive-glossaries-dutch-doc-2021.186.1.1svn35685-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916819" comment="texlive-glossaries-english-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916820" comment="texlive-glossaries-english-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916821" comment="texlive-glossaries-estonian-2021.186.1.0svn49928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916822" comment="texlive-glossaries-estonian-doc-2021.186.1.0svn49928-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916823" comment="texlive-glossaries-extra-2021.186.1.45svn54688-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916824" comment="texlive-glossaries-extra-doc-2021.186.1.45svn54688-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916825" comment="texlive-glossaries-finnish-2021.186.1.0svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916826" comment="texlive-glossaries-finnish-doc-2021.186.1.0svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916827" comment="texlive-glossaries-french-2021.186.1.1svn42873-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916828" comment="texlive-glossaries-french-doc-2021.186.1.1svn42873-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916829" comment="texlive-glossaries-german-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916830" comment="texlive-glossaries-german-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916831" comment="texlive-glossaries-irish-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916832" comment="texlive-glossaries-irish-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916833" comment="texlive-glossaries-italian-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916834" comment="texlive-glossaries-italian-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916835" comment="texlive-glossaries-magyar-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916836" comment="texlive-glossaries-magyar-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916837" comment="texlive-glossaries-nynorsk-2021.186.1.0svn55189-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916838" comment="texlive-glossaries-nynorsk-doc-2021.186.1.0svn55189-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916839" comment="texlive-glossaries-polish-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916840" comment="texlive-glossaries-polish-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916841" comment="texlive-glossaries-portuges-2021.186.1.1svn36064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916842" comment="texlive-glossaries-portuges-doc-2021.186.1.1svn36064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916843" comment="texlive-glossaries-serbian-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916844" comment="texlive-glossaries-serbian-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916845" comment="texlive-glossaries-slovene-2021.186.1.0svn51211-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916846" comment="texlive-glossaries-slovene-doc-2021.186.1.0svn51211-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916847" comment="texlive-glossaries-spanish-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916848" comment="texlive-glossaries-spanish-doc-2021.186.1.0svn35665-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916849" comment="texlive-glyphlist-2021.186.svn54074-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916850" comment="texlive-gmdoc-2021.186.0.0.993svn21292-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916851" comment="texlive-gmdoc-doc-2021.186.0.0.993svn21292-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916852" comment="texlive-gmdoc-enhance-2021.186.0.0.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916853" comment="texlive-gmdoc-enhance-doc-2021.186.0.0.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916854" comment="texlive-gmiflink-2021.186.0.0.97svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916855" comment="texlive-gmiflink-doc-2021.186.0.0.97svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916856" comment="texlive-gmp-2021.186.1.0svn21691-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916857" comment="texlive-gmp-doc-2021.186.1.0svn21691-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916858" comment="texlive-gmutils-2021.186.0.0.996svn24287-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916859" comment="texlive-gmutils-doc-2021.186.0.0.996svn24287-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916860" comment="texlive-gmverb-2021.186.0.0.98svn24288-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916861" comment="texlive-gmverb-doc-2021.186.0.0.98svn24288-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916862" comment="texlive-gmverse-2021.186.0.0.73svn29803-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916863" comment="texlive-gmverse-doc-2021.186.0.0.73svn29803-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916864" comment="texlive-gnu-freefont-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916865" comment="texlive-gnu-freefont-doc-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916866" comment="texlive-gnu-freefont-fonts-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916867" comment="texlive-gnuplottex-2021.186.0.0.9.5svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916868" comment="texlive-gnuplottex-doc-2021.186.0.0.9.5svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916869" comment="texlive-go-2021.186.svn28628-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916870" comment="texlive-go-doc-2021.186.svn28628-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916871" comment="texlive-gobble-2021.186.0.0.2svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916872" comment="texlive-gobble-doc-2021.186.0.0.2svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916873" comment="texlive-gofonts-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916874" comment="texlive-gofonts-doc-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916875" comment="texlive-gofonts-fonts-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916876" comment="texlive-gost-2021.186.1.2lsvn57616-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916877" comment="texlive-gost-doc-2021.186.1.2lsvn57616-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916878" comment="texlive-gothic-2021.186.svn49869-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916879" comment="texlive-gothic-doc-2021.186.svn49869-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916880" comment="texlive-gotoh-2021.186.1.1svn44764-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916881" comment="texlive-gotoh-doc-2021.186.1.1svn44764-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916882" comment="texlive-grabbox-2021.186.1.4svn51052-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916883" comment="texlive-grabbox-doc-2021.186.1.4svn51052-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916884" comment="texlive-gradientframe-2021.186.0.0.2svn21387-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916885" comment="texlive-gradientframe-doc-2021.186.0.0.2svn21387-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916886" comment="texlive-gradstudentresume-2021.186.svn38832-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916887" comment="texlive-gradstudentresume-doc-2021.186.svn38832-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916888" comment="texlive-grafcet-2021.186.1.3.5svn22509-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916889" comment="texlive-grafcet-doc-2021.186.1.3.5svn22509-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916890" comment="texlive-grant-2021.186.0.0.0.5svn56852-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916891" comment="texlive-grant-doc-2021.186.0.0.0.5svn56852-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916892" comment="texlive-graph35-2021.186.0.0.1.1svn47522-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916893" comment="texlive-graph35-doc-2021.186.0.0.1.1svn47522-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916894" comment="texlive-graphbox-2021.186.1.1svn46360-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916895" comment="texlive-graphbox-doc-2021.186.1.1svn46360-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916896" comment="texlive-graphics-2021.186.svn56514-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916897" comment="texlive-graphics-cfg-2021.186.svn41448-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916898" comment="texlive-graphics-cfg-doc-2021.186.svn41448-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916899" comment="texlive-graphics-def-2021.186.svn58539-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916900" comment="texlive-graphics-def-doc-2021.186.svn58539-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916901" comment="texlive-graphics-doc-2021.186.svn56514-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916902" comment="texlive-graphics-pln-2021.186.svn56823-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916903" comment="texlive-graphics-pln-doc-2021.186.svn56823-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916904" comment="texlive-graphicx-psmin-2021.186.1.2svn56931-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916905" comment="texlive-graphicx-psmin-doc-2021.186.1.2svn56931-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916906" comment="texlive-graphicxbox-2021.186.1.0svn32630-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916907" comment="texlive-graphicxbox-doc-2021.186.1.0svn32630-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916908" comment="texlive-graphicxpsd-2021.186.1.2svn57341-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916909" comment="texlive-graphicxpsd-doc-2021.186.1.2svn57341-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916910" comment="texlive-graphpaper-2021.186.1.0svn58661-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916911" comment="texlive-graphpaper-doc-2021.186.1.0svn58661-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916912" comment="texlive-graphviz-2021.186.0.0.94svn31517-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916913" comment="texlive-graphviz-doc-2021.186.0.0.94svn31517-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916914" comment="texlive-grayhints-2021.186.svn49052-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916915" comment="texlive-grayhints-doc-2021.186.svn49052-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916916" comment="texlive-greek-fontenc-2021.186.2.0svn56851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916917" comment="texlive-greek-fontenc-doc-2021.186.2.0svn56851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916918" comment="texlive-greek-inputenc-2021.186.1.7svn51612-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916919" comment="texlive-greek-inputenc-doc-2021.186.1.7svn51612-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916920" comment="texlive-greekdates-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916921" comment="texlive-greekdates-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916922" comment="texlive-greektex-2021.186.svn28327-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916923" comment="texlive-greektex-doc-2021.186.svn28327-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916924" comment="texlive-greektonoi-2021.186.svn39419-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916925" comment="texlive-greektonoi-doc-2021.186.svn39419-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916926" comment="texlive-greenpoint-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916927" comment="texlive-greenpoint-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916928" comment="texlive-gregoriotex-2021.186.6.0.0svn58331-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916929" comment="texlive-gregoriotex-doc-2021.186.6.0.0svn58331-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916930" comment="texlive-gregoriotex-fonts-2021.186.6.0.0svn58331-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916931" comment="texlive-grfext-2021.186.1.3svn53024-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916932" comment="texlive-grfext-doc-2021.186.1.3svn53024-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916933" comment="texlive-grffile-2021.186.2.1svn52756-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916934" comment="texlive-grffile-doc-2021.186.2.1svn52756-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916935" comment="texlive-grfpaste-2021.186.0.0.2svn17354-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916936" comment="texlive-grfpaste-doc-2021.186.0.0.2svn17354-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916937" comment="texlive-grid-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916938" comment="texlive-grid-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916939" comment="texlive-grid-system-2021.186.0.0.3.0svn32981-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916940" comment="texlive-grid-system-doc-2021.186.0.0.3.0svn32981-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916941" comment="texlive-gridpapers-2021.186.1.0.2svn58723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916942" comment="texlive-gridpapers-doc-2021.186.1.0.2svn58723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916943" comment="texlive-gridset-2021.186.0.0.3svn53762-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916944" comment="texlive-gridset-doc-2021.186.0.0.3svn53762-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916945" comment="texlive-gridslides-2021.186.0.0.1.1svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916946" comment="texlive-gridslides-doc-2021.186.0.0.1.1svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916947" comment="texlive-grotesq-2021.186.svn35859-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916948" comment="texlive-grotesq-doc-2021.186.svn35859-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916949" comment="texlive-grotesq-fonts-2021.186.svn35859-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916950" comment="texlive-grundgesetze-2021.186.1.02svn34439-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916951" comment="texlive-grundgesetze-doc-2021.186.1.02svn34439-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916952" comment="texlive-gsemthesis-2021.186.0.0.9.4svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916953" comment="texlive-gsemthesis-doc-2021.186.0.0.9.4svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916954" comment="texlive-gsftopk-2021.186.1.19.2svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916955" comment="texlive-gsftopk-doc-2021.186.1.19.2svn52851-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916956" comment="texlive-gtl-2021.186.0.0.5svn49527-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916957" comment="texlive-gtl-doc-2021.186.0.0.5svn49527-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916958" comment="texlive-gtrcrd-2021.186.1.1svn32484-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916959" comment="texlive-gtrcrd-doc-2021.186.1.1svn32484-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916960" comment="texlive-gtrlib-largetrees-2021.186.1.2bsvn49062-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916961" comment="texlive-gtrlib-largetrees-doc-2021.186.1.2bsvn49062-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916962" comment="texlive-gu-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916963" comment="texlive-gu-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916964" comment="texlive-gudea-2021.186.0.0.0.1svn57359-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916965" comment="texlive-gudea-doc-2021.186.0.0.0.1svn57359-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916966" comment="texlive-gudea-fonts-2021.186.0.0.0.1svn57359-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916967" comment="texlive-guide-to-latex-2021.186.svn45712-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916968" comment="texlive-guitar-2021.186.1.6svn32258-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916969" comment="texlive-guitar-doc-2021.186.1.6svn32258-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916970" comment="texlive-guitarchordschemes-2021.186.0.0.7svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916971" comment="texlive-guitarchordschemes-doc-2021.186.0.0.7svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916972" comment="texlive-guitartabs-2021.186.svn48102-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916973" comment="texlive-guitartabs-doc-2021.186.svn48102-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916974" comment="texlive-guitlogo-2021.186.1.0.0_alpha.4svn55741-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916975" comment="texlive-guitlogo-doc-2021.186.1.0.0_alpha.4svn55741-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916976" comment="texlive-gustlib-2021.186.svn54074-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916977" comment="texlive-gustlib-doc-2021.186.svn54074-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916978" comment="texlive-gustprog-2021.186.svn54074-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916979" comment="texlive-gzt-2021.186.1.0.1svn57765-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916980" comment="texlive-gzt-doc-2021.186.1.0.1svn57765-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916981" comment="texlive-h2020proposal-2021.186.1.0svn38428-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916982" comment="texlive-h2020proposal-doc-2021.186.1.0svn38428-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916983" comment="texlive-hackthefootline-2021.186.svn46494-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916984" comment="texlive-hackthefootline-doc-2021.186.svn46494-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916985" comment="texlive-hacm-2021.186.0.0.1svn27671-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916986" comment="texlive-hacm-doc-2021.186.0.0.1svn27671-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916987" comment="texlive-hacm-fonts-2021.186.0.0.1svn27671-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916988" comment="texlive-hagenberg-thesis-2021.186.svn56798-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916989" comment="texlive-hagenberg-thesis-doc-2021.186.svn56798-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916990" comment="texlive-halloweenmath-2021.186.0.0.11svn52602-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916991" comment="texlive-halloweenmath-doc-2021.186.0.0.11svn52602-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916992" comment="texlive-handin-2021.186.0.0.1.1svn48255-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916993" comment="texlive-handin-doc-2021.186.0.0.1.1svn48255-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916994" comment="texlive-handout-2021.186.1.6.0svn43962-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916995" comment="texlive-handout-doc-2021.186.1.6.0svn43962-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916996" comment="texlive-hands-2021.186.svn13293-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916997" comment="texlive-hang-2021.186.2.1svn43280-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916998" comment="texlive-hang-doc-2021.186.2.1svn43280-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009916999" comment="texlive-hanging-2021.186.1.2bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917000" comment="texlive-hanging-doc-2021.186.1.2bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917001" comment="texlive-hanoi-2021.186.20120101svn25019-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917002" comment="texlive-happy4th-2021.186.20120102svn25020-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917003" comment="texlive-har2nat-2021.186.1.0svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917004" comment="texlive-har2nat-doc-2021.186.1.0svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917005" comment="texlive-haranoaji-2021.186.20210130svn57574-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917006" comment="texlive-haranoaji-doc-2021.186.20210130svn57574-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917007" comment="texlive-haranoaji-extra-2021.186.20210130svn57573-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917008" comment="texlive-haranoaji-extra-doc-2021.186.20210130svn57573-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917009" comment="texlive-haranoaji-extra-fonts-2021.186.20210130svn57573-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917010" comment="texlive-haranoaji-fonts-2021.186.20210130svn57574-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917011" comment="texlive-hardwrap-2021.186.0.0.2svn21396-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917012" comment="texlive-hardwrap-doc-2021.186.0.0.2svn21396-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917013" comment="texlive-harmony-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917014" comment="texlive-harmony-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917015" comment="texlive-harnon-cv-2021.186.1.0svn26543-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917016" comment="texlive-harnon-cv-doc-2021.186.1.0svn26543-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917017" comment="texlive-harpoon-2021.186.1.0svn21327-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917018" comment="texlive-harpoon-doc-2021.186.1.0svn21327-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917019" comment="texlive-harvard-2021.186.2.0.5svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917020" comment="texlive-harvard-doc-2021.186.2.0.5svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917021" comment="texlive-harveyballs-2021.186.1.1svn32003-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917022" comment="texlive-harveyballs-doc-2021.186.1.1svn32003-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917023" comment="texlive-harvmac-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917024" comment="texlive-harvmac-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917025" comment="texlive-hatching-2021.186.0.0.11svn23818-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917026" comment="texlive-hatching-doc-2021.186.0.0.11svn23818-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917027" comment="texlive-hausarbeit-jura-2021.186.2.1.0svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917028" comment="texlive-hausarbeit-jura-doc-2021.186.2.1.0svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917029" comment="texlive-havannah-2021.186.svn36348-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917030" comment="texlive-havannah-doc-2021.186.svn36348-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917031" comment="texlive-hc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917032" comment="texlive-hc-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917033" comment="texlive-he-she-2021.186.1.3svn41359-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917034" comment="texlive-he-she-doc-2021.186.1.3svn41359-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917035" comment="texlive-hecthese-2021.186.1.4svn56181-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917036" comment="texlive-hecthese-doc-2021.186.1.4svn56181-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917037" comment="texlive-helmholtz-ellis-ji-notation-2021.186.1.1svn55213-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917038" comment="texlive-helmholtz-ellis-ji-notation-doc-2021.186.1.1svn55213-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917039" comment="texlive-helmholtz-ellis-ji-notation-fonts-2021.186.1.1svn55213-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917040" comment="texlive-helvetic-2021.186.svn31835-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917041" comment="texlive-helvetic-fonts-2021.186.svn31835-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917042" comment="texlive-hep-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917043" comment="texlive-hep-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917044" comment="texlive-hep-paper-2021.186.1.6svn57045-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917045" comment="texlive-hep-paper-doc-2021.186.1.6svn57045-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917046" comment="texlive-hepnames-2021.186.2.0svn35722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917047" comment="texlive-hepnames-doc-2021.186.2.0svn35722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917048" comment="texlive-hepparticles-2021.186.2.0svn35723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917049" comment="texlive-hepparticles-doc-2021.186.2.0svn35723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917050" comment="texlive-hepthesis-2021.186.1.5.2svn46054-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917051" comment="texlive-hepthesis-doc-2021.186.1.5.2svn46054-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917052" comment="texlive-hepunits-2021.186.2.0.0svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917053" comment="texlive-hepunits-doc-2021.186.2.0.0svn54758-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917054" comment="texlive-here-2021.186.svn16135-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917055" comment="texlive-here-doc-2021.186.svn16135-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917056" comment="texlive-heuristica-2021.186.1.092svn51362-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917057" comment="texlive-heuristica-doc-2021.186.1.092svn51362-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917058" comment="texlive-heuristica-fonts-2021.186.1.092svn51362-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917059" comment="texlive-hexgame-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917060" comment="texlive-hexgame-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917061" comment="texlive-hf-tikz-2021.186.0.0.3asvn34733-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917062" comment="texlive-hf-tikz-doc-2021.186.0.0.3asvn34733-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917063" comment="texlive-hfbright-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917064" comment="texlive-hfbright-doc-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917065" comment="texlive-hfbright-fonts-2021.186.svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917066" comment="texlive-hfoldsty-2021.186.1.15svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917067" comment="texlive-hfoldsty-doc-2021.186.1.15svn29349-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917068" comment="texlive-hhtensor-2021.186.0.0.61svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917069" comment="texlive-hhtensor-doc-2021.186.0.0.61svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917070" comment="texlive-highlightlatex-2021.186.svn58392-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917071" comment="texlive-highlightlatex-doc-2021.186.svn58392-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917072" comment="texlive-hindawi-latex-template-2021.186.1.0svn57757-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917073" comment="texlive-hindmadurai-2021.186.0.0.0.1svn57360-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917074" comment="texlive-hindmadurai-doc-2021.186.0.0.0.1svn57360-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917075" comment="texlive-hindmadurai-fonts-2021.186.0.0.0.1svn57360-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917076" comment="texlive-histogr-2021.186.1.01svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917077" comment="texlive-histogr-doc-2021.186.1.01svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917078" comment="texlive-historische-zeitschrift-2021.186.1.2svn42635-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917079" comment="texlive-historische-zeitschrift-doc-2021.186.1.2svn42635-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917080" comment="texlive-hitec-2021.186.0.0.0betasvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917081" comment="texlive-hitec-doc-2021.186.0.0.0betasvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917082" comment="texlive-hithesis-2021.186.2.0.11svn53362-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917083" comment="texlive-hithesis-doc-2021.186.2.0.11svn53362-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917084" comment="texlive-hitreport-2021.186.1.0.0svn58357-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917085" comment="texlive-hitreport-doc-2021.186.1.0.0svn58357-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917086" comment="texlive-hitszbeamer-2021.186.1.0.0svn54381-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917087" comment="texlive-hitszbeamer-doc-2021.186.1.0.0svn54381-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917088" comment="texlive-hitszthesis-2021.186.3.2svn55643-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917089" comment="texlive-hitszthesis-doc-2021.186.3.2svn55643-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917090" comment="texlive-hletter-2021.186.4.2svn30002-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917091" comment="texlive-hletter-doc-2021.186.4.2svn30002-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917092" comment="texlive-hlist-2021.186.0.0.11svn44983-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917093" comment="texlive-hlist-doc-2021.186.0.0.11svn44983-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917094" comment="texlive-hmtrump-2021.186.1.2asvn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917095" comment="texlive-hmtrump-doc-2021.186.1.2asvn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917096" comment="texlive-hmtrump-fonts-2021.186.1.2asvn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917097" comment="texlive-hobby-2021.186.1.8svn44474-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917098" comment="texlive-hobby-doc-2021.186.1.8svn44474-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917099" comment="texlive-hobete-2021.186.svn27036-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917100" comment="texlive-hobete-doc-2021.186.svn27036-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917101" comment="texlive-hobsub-2021.186.svn52810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917102" comment="texlive-hobsub-doc-2021.186.svn52810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917103" comment="texlive-hologo-2021.186.1.14svn53048-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917104" comment="texlive-hologo-doc-2021.186.1.14svn53048-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917105" comment="texlive-hook-pre-commit-pkg-2021.186.1.1.2svn41378-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917106" comment="texlive-hopatch-2021.186.1.4svn56106-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917107" comment="texlive-hopatch-doc-2021.186.1.4svn56106-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917108" comment="texlive-horoscop-2021.186.1.01svn56021-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917109" comment="texlive-horoscop-doc-2021.186.1.01svn56021-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917110" comment="texlive-hpsdiss-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917111" comment="texlive-hpsdiss-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917112" comment="texlive-hrefhide-2021.186.1.0fsvn22255-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917113" comment="texlive-hrefhide-doc-2021.186.1.0fsvn22255-46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249765" version="1" class="patch">
	<metadata>
		<title>texlive-hrlatex-2021.186.0.0.23svn18020-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-hrlatex-2021.186.0.0.23svn18020-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009917114" comment="texlive-hrlatex-2021.186.0.0.23svn18020-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917115" comment="texlive-hrlatex-doc-2021.186.0.0.23svn18020-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917116" comment="texlive-hu-berlin-bundle-2021.186.1.1.1svn57580-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917117" comment="texlive-hu-berlin-bundle-doc-2021.186.1.1.1svn57580-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917118" comment="texlive-hulipsum-2021.186.1.1svn56848-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917119" comment="texlive-hulipsum-doc-2021.186.1.1svn56848-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917120" comment="texlive-hustthesis-2021.186.1.4svn42547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917121" comment="texlive-hustthesis-doc-2021.186.1.4svn42547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917122" comment="texlive-hvarabic-2021.186.0.0.01svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917123" comment="texlive-hvarabic-doc-2021.186.0.0.01svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917124" comment="texlive-hvfloat-2021.186.2.19svn58411-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917125" comment="texlive-hvfloat-doc-2021.186.2.19svn58411-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917126" comment="texlive-hvindex-2021.186.0.0.04svn46051-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917127" comment="texlive-hvindex-doc-2021.186.0.0.04svn46051-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917128" comment="texlive-hvqrurl-2021.186.0.0.01asvn52993-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917129" comment="texlive-hvqrurl-doc-2021.186.0.0.01asvn52993-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917130" comment="texlive-hycolor-2021.186.1.10svn53584-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917131" comment="texlive-hycolor-doc-2021.186.1.10svn53584-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917132" comment="texlive-hypdestopt-2021.186.2.7svn56253-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917133" comment="texlive-hypdestopt-doc-2021.186.2.7svn56253-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917134" comment="texlive-hypdvips-2021.186.3.03svn53197-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917135" comment="texlive-hypdvips-doc-2021.186.3.03svn53197-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917136" comment="texlive-hyper-2021.186.4.2dsvn17357-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917137" comment="texlive-hyper-doc-2021.186.4.2dsvn17357-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917138" comment="texlive-hyperbar-2021.186.0.0.1svn48147-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917139" comment="texlive-hyperbar-doc-2021.186.0.0.1svn48147-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917140" comment="texlive-hypernat-2021.186.1.0bsvn17358-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917141" comment="texlive-hypernat-doc-2021.186.1.0bsvn17358-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917142" comment="texlive-hyperref-2021.186.7.00ksvn58024-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917143" comment="texlive-hyperref-doc-2021.186.7.00ksvn58024-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917144" comment="texlive-hyperxmp-2021.186.5.9svn57004-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917145" comment="texlive-hyperxmp-doc-2021.186.5.9svn57004-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917146" comment="texlive-hyph-utf8-2021.186.svn58619-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917147" comment="texlive-hyph-utf8-doc-2021.186.svn58619-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917148" comment="texlive-hyphen-afrikaans-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917149" comment="texlive-hyphen-ancientgreek-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917150" comment="texlive-hyphen-arabic-2021.186.svn54568-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917151" comment="texlive-hyphen-armenian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917152" comment="texlive-hyphen-base-2021.186.svn58630-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917153" comment="texlive-hyphen-basque-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917154" comment="texlive-hyphen-belarusian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917155" comment="texlive-hyphen-bulgarian-2021.186.svn58685-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917156" comment="texlive-hyphen-catalan-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917157" comment="texlive-hyphen-chinese-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917158" comment="texlive-hyphen-churchslavonic-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917159" comment="texlive-hyphen-coptic-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917160" comment="texlive-hyphen-croatian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917161" comment="texlive-hyphen-czech-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917162" comment="texlive-hyphen-danish-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917163" comment="texlive-hyphen-dutch-2021.186.1.1svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917164" comment="texlive-hyphen-english-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917165" comment="texlive-hyphen-esperanto-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917166" comment="texlive-hyphen-estonian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917167" comment="texlive-hyphen-ethiopic-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917168" comment="texlive-hyphen-farsi-2021.186.svn54568-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917169" comment="texlive-hyphen-finnish-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917170" comment="texlive-hyphen-french-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917171" comment="texlive-hyphen-friulan-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917172" comment="texlive-hyphen-galician-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917173" comment="texlive-hyphen-georgian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917174" comment="texlive-hyphen-german-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917175" comment="texlive-hyphen-greek-2021.186.5svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917176" comment="texlive-hyphen-greek-doc-2021.186.5svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917177" comment="texlive-hyphen-hungarian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917178" comment="texlive-hyphen-hungarian-doc-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917179" comment="texlive-hyphen-icelandic-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917180" comment="texlive-hyphen-indic-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917181" comment="texlive-hyphen-indonesian-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917182" comment="texlive-hyphen-interlingua-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917183" comment="texlive-hyphen-irish-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917184" comment="texlive-hyphen-italian-2021.186.4.8gsvn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917185" comment="texlive-hyphen-kurmanji-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917186" comment="texlive-hyphen-latin-2021.186.3.1svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917187" comment="texlive-hyphen-latvian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917188" comment="texlive-hyphen-lithuanian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917189" comment="texlive-hyphen-macedonian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917190" comment="texlive-hyphen-mongolian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917191" comment="texlive-hyphen-norwegian-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917192" comment="texlive-hyphen-occitan-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917193" comment="texlive-hyphen-piedmontese-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917194" comment="texlive-hyphen-polish-2021.186.3.0bsvn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917195" comment="texlive-hyphen-portuguese-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917196" comment="texlive-hyphen-romanian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917197" comment="texlive-hyphen-romansh-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917198" comment="texlive-hyphen-russian-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917199" comment="texlive-hyphen-sanskrit-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917200" comment="texlive-hyphen-sanskrit-doc-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917201" comment="texlive-hyphen-serbian-2021.186.1.0asvn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917202" comment="texlive-hyphen-slovak-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917203" comment="texlive-hyphen-slovenian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917204" comment="texlive-hyphen-spanish-2021.186.5.0svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917205" comment="texlive-hyphen-spanish-doc-2021.186.5.0svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917206" comment="texlive-hyphen-swedish-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917207" comment="texlive-hyphen-thai-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917208" comment="texlive-hyphen-turkish-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917209" comment="texlive-hyphen-turkmen-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917210" comment="texlive-hyphen-ukrainian-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917211" comment="texlive-hyphen-uppersorbian-2021.186.svn58609-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917212" comment="texlive-hyphen-welsh-2021.186.svn58652-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917213" comment="texlive-hyphenat-2021.186.2.3csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917214" comment="texlive-hyphenat-doc-2021.186.2.3csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917215" comment="texlive-hyphenex-2021.186.svn57387-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917216" comment="texlive-hyplain-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917217" comment="texlive-hyplain-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917218" comment="texlive-ibarra-2021.186.svn55820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917219" comment="texlive-ibarra-doc-2021.186.svn55820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917220" comment="texlive-ibarra-fonts-2021.186.svn55820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917221" comment="texlive-ibycus-babel-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917222" comment="texlive-ibycus-babel-doc-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917223" comment="texlive-ibygrk-2021.186.4.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917224" comment="texlive-ibygrk-doc-2021.186.4.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917225" comment="texlive-ibygrk-fonts-2021.186.4.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917226" comment="texlive-icite-2021.186.1.3asvn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917227" comment="texlive-icite-doc-2021.186.1.3asvn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917228" comment="texlive-icsv-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917229" comment="texlive-icsv-doc-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917230" comment="texlive-identkey-2021.186.0.0.1.0svn49018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917231" comment="texlive-identkey-doc-2021.186.0.0.1.0svn49018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917232" comment="texlive-idxcmds-2021.186.0.0.2csvn54554-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917233" comment="texlive-idxcmds-doc-2021.186.0.0.2csvn54554-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917234" comment="texlive-idxlayout-2021.186.0.0.4dsvn25821-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917235" comment="texlive-idxlayout-doc-2021.186.0.0.4dsvn25821-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917236" comment="texlive-ieeepes-2021.186.4.0svn17359-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917237" comment="texlive-ieeepes-doc-2021.186.4.0svn17359-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917238" comment="texlive-ietfbibs-2021.186.1.0.0svn41332-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917239" comment="texlive-iffont-2021.186.1.0.0svn38823-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917240" comment="texlive-iffont-doc-2021.186.1.0.0svn38823-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917241" comment="texlive-ifmslide-2021.186.0.0.47svn20727-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917242" comment="texlive-ifmslide-doc-2021.186.0.0.47svn20727-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917243" comment="texlive-ifmtarg-2021.186.1.2bsvn47544-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917244" comment="texlive-ifmtarg-doc-2021.186.1.2bsvn47544-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917245" comment="texlive-ifnextok-2021.186.0.0.3svn23379-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917246" comment="texlive-ifnextok-doc-2021.186.0.0.3svn23379-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917247" comment="texlive-ifoddpage-2021.186.1.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917248" comment="texlive-ifoddpage-doc-2021.186.1.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917249" comment="texlive-ifplatform-2021.186.0.0.4asvn45533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917250" comment="texlive-ifplatform-doc-2021.186.0.0.4asvn45533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917251" comment="texlive-ifptex-2021.186.2.0svn52626-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917252" comment="texlive-ifptex-doc-2021.186.2.0svn52626-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917253" comment="texlive-ifsym-2021.186.svn24868-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917254" comment="texlive-ifsym-doc-2021.186.svn24868-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917255" comment="texlive-iftex-2021.186.1.0dsvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917256" comment="texlive-iftex-doc-2021.186.1.0dsvn56594-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917257" comment="texlive-ifthenx-2021.186.0.0.1asvn25819-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917258" comment="texlive-ifthenx-doc-2021.186.0.0.1asvn25819-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917259" comment="texlive-ifxptex-2021.186.0.0.2svn46153-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917260" comment="texlive-ifxptex-doc-2021.186.0.0.2svn46153-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917261" comment="texlive-iitem-2021.186.1.0svn29613-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917262" comment="texlive-iitem-doc-2021.186.1.0svn29613-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917263" comment="texlive-ijmart-2021.186.1.7svn30958-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917264" comment="texlive-ijmart-doc-2021.186.1.7svn30958-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917265" comment="texlive-ijqc-2021.186.1.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917266" comment="texlive-ijqc-doc-2021.186.1.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917267" comment="texlive-ijsra-2021.186.1.1svn44886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917268" comment="texlive-ijsra-doc-2021.186.1.1svn44886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917269" comment="texlive-imac-2021.186.svn17347-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917270" comment="texlive-imac-doc-2021.186.svn17347-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917271" comment="texlive-image-gallery-2021.186.1.0jsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917272" comment="texlive-image-gallery-doc-2021.186.1.0jsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917273" comment="texlive-imakeidx-2021.186.1.3esvn42287-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917274" comment="texlive-imakeidx-doc-2021.186.1.3esvn42287-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917275" comment="texlive-imfellenglish-2021.186.svn38547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917276" comment="texlive-imfellenglish-doc-2021.186.svn38547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917277" comment="texlive-imfellenglish-fonts-2021.186.svn38547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917278" comment="texlive-impatient-2021.186.2020svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917279" comment="texlive-impatient-cn-2021.186.2020svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917280" comment="texlive-impatient-fr-2021.186.2020svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917281" comment="texlive-impnattypo-2021.186.1.5svn50227-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917282" comment="texlive-impnattypo-doc-2021.186.1.5svn50227-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917283" comment="texlive-import-2021.186.6.2svn54683-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917284" comment="texlive-import-doc-2021.186.6.2svn54683-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917285" comment="texlive-imsproc-2021.186.0.0.1svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917286" comment="texlive-imsproc-doc-2021.186.0.0.1svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917287" comment="texlive-imtekda-2021.186.1.7svn17667-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917288" comment="texlive-imtekda-doc-2021.186.1.7svn17667-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917289" comment="texlive-incgraph-2021.186.1.12svn36500-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917290" comment="texlive-incgraph-doc-2021.186.1.12svn36500-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917291" comment="texlive-includernw-2021.186.0.0.1.0svn47557-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917292" comment="texlive-includernw-doc-2021.186.0.0.1.0svn47557-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917293" comment="texlive-inconsolata-2021.186.1.121svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917294" comment="texlive-inconsolata-doc-2021.186.1.121svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917295" comment="texlive-inconsolata-fonts-2021.186.1.121svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917296" comment="texlive-index-2021.186.4.1betasvn24099-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917297" comment="texlive-index-doc-2021.186.4.1betasvn24099-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917298" comment="texlive-indextools-2021.186.1.5.1svn38931-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917299" comment="texlive-indextools-doc-2021.186.1.5.1svn38931-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917300" comment="texlive-infwarerr-2021.186.1.5svn53023-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917301" comment="texlive-infwarerr-doc-2021.186.1.5svn53023-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917302" comment="texlive-initials-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917303" comment="texlive-initials-doc-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917304" comment="texlive-initials-fonts-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917305" comment="texlive-inkpaper-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917306" comment="texlive-inkpaper-doc-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917307" comment="texlive-inline-images-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917308" comment="texlive-inline-images-doc-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917309" comment="texlive-inlinebib-2021.186.svn22018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917310" comment="texlive-inlinebib-doc-2021.186.svn22018-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917311" comment="texlive-inlinedef-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917312" comment="texlive-inlinedef-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917313" comment="texlive-innerscript-2021.186.1.1svn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917314" comment="texlive-innerscript-doc-2021.186.1.1svn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917315" comment="texlive-inputenx-2021.186.1.12svn52986-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917316" comment="texlive-inputenx-doc-2021.186.1.12svn52986-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917317" comment="texlive-inputtrc-2021.186.0.0.3svn28019-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917318" comment="texlive-inputtrc-doc-2021.186.0.0.3svn28019-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917319" comment="texlive-inriafonts-2021.186.1.0svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917320" comment="texlive-inriafonts-doc-2021.186.1.0svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917321" comment="texlive-inriafonts-fonts-2021.186.1.0svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917322" comment="texlive-insbox-2021.186.2.2svn34299-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917323" comment="texlive-insbox-doc-2021.186.2.2svn34299-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917324" comment="texlive-install-latex-guide-zh-cn-2021.186.2021.2.1svn57590-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917325" comment="texlive-intcalc-2021.186.1.3svn53168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917326" comment="texlive-intcalc-doc-2021.186.1.3svn53168-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917327" comment="texlive-inter-2021.186.svn57213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917328" comment="texlive-inter-doc-2021.186.svn57213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917329" comment="texlive-inter-fonts-2021.186.svn57213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917330" comment="texlive-interactiveworkbook-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917331" comment="texlive-interactiveworkbook-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917332" comment="texlive-interchar-2021.186.0.0.2svn36312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917333" comment="texlive-interchar-doc-2021.186.0.0.2svn36312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917334" comment="texlive-interfaces-2021.186.3.1svn21474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917335" comment="texlive-interfaces-doc-2021.186.3.1svn21474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917336" comment="texlive-interpreter-2021.186.1.2svn27232-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917337" comment="texlive-interpreter-doc-2021.186.1.2svn27232-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917338" comment="texlive-interval-2021.186.0.0.4svn50265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917339" comment="texlive-interval-doc-2021.186.0.0.4svn50265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917340" comment="texlive-intopdf-2021.186.0.0.4.0svn58743-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917341" comment="texlive-intopdf-doc-2021.186.0.0.4.0svn58743-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917342" comment="texlive-intro-scientific-2021.186.5th_editionsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917343" comment="texlive-inversepath-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917344" comment="texlive-inversepath-doc-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917345" comment="texlive-invoice-2021.186.svn48359-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917346" comment="texlive-invoice-class-2021.186.1.0svn49749-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917347" comment="texlive-invoice-class-doc-2021.186.1.0svn49749-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917348" comment="texlive-invoice-doc-2021.186.svn48359-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917349" comment="texlive-invoice2-2021.186.svn46364-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917350" comment="texlive-invoice2-doc-2021.186.svn46364-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917351" comment="texlive-iodhbwm-2021.186.1.2.2svn57773-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917352" comment="texlive-iodhbwm-doc-2021.186.1.2.2svn57773-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249766" version="1" class="patch">
	<metadata>
		<title>texlive-ionumbers-2021.186.0.0.3.3svn33457-48.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-ionumbers-2021.186.0.0.3.3svn33457-48.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009917353" comment="texlive-ionumbers-2021.186.0.0.3.3svn33457-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917354" comment="texlive-ionumbers-doc-2021.186.0.0.3.3svn33457-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917355" comment="texlive-iopart-num-2021.186.2.1svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917356" comment="texlive-iopart-num-doc-2021.186.2.1svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917357" comment="texlive-ipaex-2021.186.svn52032-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917358" comment="texlive-ipaex-doc-2021.186.svn52032-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917359" comment="texlive-ipaex-fonts-2021.186.svn52032-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917360" comment="texlive-ipaex-type1-2021.186.0.0.5svn47700-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917361" comment="texlive-ipaex-type1-doc-2021.186.0.0.5svn47700-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917362" comment="texlive-ipaex-type1-fonts-2021.186.0.0.5svn47700-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917363" comment="texlive-is-bst-2021.186.2.03svn52623-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917364" comment="texlive-is-bst-doc-2021.186.2.03svn52623-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917365" comment="texlive-iscram-2021.186.1.1svn45801-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917366" comment="texlive-iscram-doc-2021.186.1.1svn45801-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917367" comment="texlive-iso-2021.186.2.4svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917368" comment="texlive-iso-doc-2021.186.2.4svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917369" comment="texlive-iso10303-2021.186.1.5svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917370" comment="texlive-iso10303-doc-2021.186.1.5svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917371" comment="texlive-isodate-2021.186.2.28svn16613-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917372" comment="texlive-isodate-doc-2021.186.2.28svn16613-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917373" comment="texlive-isodoc-2021.186.1.12svn57811-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917374" comment="texlive-isodoc-doc-2021.186.1.12svn57811-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917375" comment="texlive-isomath-2021.186.0.0.6.1svn27654-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917376" comment="texlive-isomath-doc-2021.186.0.0.6.1svn27654-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917377" comment="texlive-isonums-2021.186.1.0svn17362-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917378" comment="texlive-isonums-doc-2021.186.1.0svn17362-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917379" comment="texlive-isopt-2021.186.0.0.01svn45509-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917380" comment="texlive-isopt-doc-2021.186.0.0.01svn45509-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917381" comment="texlive-isorot-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917382" comment="texlive-isorot-doc-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917383" comment="texlive-isotope-2021.186.0.0.3svn23711-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917384" comment="texlive-isotope-doc-2021.186.0.0.3svn23711-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917385" comment="texlive-issuulinks-2021.186.1.1svn25742-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917386" comment="texlive-issuulinks-doc-2021.186.1.1svn25742-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917387" comment="texlive-istgame-2021.186.2.0svn49848-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917388" comment="texlive-istgame-doc-2021.186.2.0svn49848-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917389" comment="texlive-itnumpar-2021.186.1.0svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917390" comment="texlive-itnumpar-doc-2021.186.1.0svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917391" comment="texlive-iwhdp-2021.186.0.0.50svn37552-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917392" comment="texlive-iwhdp-doc-2021.186.0.0.50svn37552-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917393" comment="texlive-iwona-2021.186.0.0.995bsvn19611-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917394" comment="texlive-iwona-doc-2021.186.0.0.995bsvn19611-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917395" comment="texlive-iwona-fonts-2021.186.0.0.995bsvn19611-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917396" comment="texlive-jablantile-2021.186.svn16364-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917397" comment="texlive-jablantile-doc-2021.186.svn16364-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917398" comment="texlive-jacow-2021.186.2.4svn50870-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917399" comment="texlive-jacow-doc-2021.186.2.4svn50870-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917400" comment="texlive-jadetex-2021.186.3.13svn57186-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917401" comment="texlive-jadetex-doc-2021.186.3.13svn57186-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917402" comment="texlive-jamtimes-2021.186.1.12svn20408-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917403" comment="texlive-jamtimes-doc-2021.186.1.12svn20408-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917404" comment="texlive-japanese-otf-2021.186.1.7b8svn57826-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917405" comment="texlive-japanese-otf-doc-2021.186.1.7b8svn57826-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917406" comment="texlive-japanese-otf-uptex-2021.186.0.0.26svn56932-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917407" comment="texlive-japanese-otf-uptex-doc-2021.186.0.0.26svn56932-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917408" comment="texlive-jbact-2021.186.1.30svn52717-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917409" comment="texlive-jfmutil-2021.186.1.3.1svn55044-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917410" comment="texlive-jfmutil-doc-2021.186.1.3.1svn55044-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917411" comment="texlive-jigsaw-2021.186.0.0.1asvn49111-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917412" comment="texlive-jigsaw-doc-2021.186.0.0.1asvn49111-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917413" comment="texlive-jkmath-2021.186.0.0.1svn47109-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917414" comment="texlive-jkmath-doc-2021.186.0.0.1svn47109-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917415" comment="texlive-jknapltx-2021.186.svn19440-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917416" comment="texlive-jknapltx-doc-2021.186.svn19440-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917417" comment="texlive-jlabels-2021.186.svn24858-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917418" comment="texlive-jlabels-doc-2021.186.svn24858-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917419" comment="texlive-jlreq-2021.186.svn58472-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917420" comment="texlive-jlreq-deluxe-2021.186.0.0.4.0svn58329-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917421" comment="texlive-jlreq-deluxe-doc-2021.186.0.0.4.0svn58329-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917422" comment="texlive-jlreq-doc-2021.186.svn58472-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917423" comment="texlive-jmb-2021.186.1.21svn52718-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917424" comment="texlive-jmlr-2021.186.1.28svn56395-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917425" comment="texlive-jmlr-doc-2021.186.1.28svn56395-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917426" comment="texlive-jmn-2021.186.svn45751-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917427" comment="texlive-jmn-fonts-2021.186.svn45751-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917428" comment="texlive-jneurosci-2021.186.1.00svn17346-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917429" comment="texlive-jneurosci-doc-2021.186.1.00svn17346-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917430" comment="texlive-jnuexam-2021.186.1.0svn56867-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917431" comment="texlive-jnuexam-doc-2021.186.1.0svn56867-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917432" comment="texlive-josefin-2021.186.svn57152-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917433" comment="texlive-josefin-doc-2021.186.svn57152-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917434" comment="texlive-josefin-fonts-2021.186.svn57152-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917435" comment="texlive-jpsj-2021.186.1.2.2svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917436" comment="texlive-jpsj-doc-2021.186.1.2.2svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917437" comment="texlive-js-misc-2021.186.svn16211-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917438" comment="texlive-js-misc-doc-2021.186.svn16211-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917439" comment="texlive-jsclasses-2021.186.svn56608-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917440" comment="texlive-jsclasses-doc-2021.186.svn56608-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917441" comment="texlive-jslectureplanner-2021.186.1.12svn57095-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917442" comment="texlive-jslectureplanner-doc-2021.186.1.12svn57095-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917443" comment="texlive-jumplines-2021.186.0.0.2svn37553-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917444" comment="texlive-jumplines-doc-2021.186.0.0.2svn37553-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917445" comment="texlive-junicode-2021.186.1.0.2svn53954-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917446" comment="texlive-junicode-doc-2021.186.1.0.2svn53954-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917447" comment="texlive-junicode-fonts-2021.186.1.0.2svn53954-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917448" comment="texlive-jupynotex-2021.186.0.0.1svn56715-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917449" comment="texlive-jupynotex-doc-2021.186.0.0.1svn56715-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917450" comment="texlive-jura-2021.186.4.3svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917451" comment="texlive-jura-doc-2021.186.4.3svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917452" comment="texlive-juraabbrev-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917453" comment="texlive-juraabbrev-doc-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917454" comment="texlive-jurabib-2021.186.0.0.6svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917455" comment="texlive-jurabib-doc-2021.186.0.0.6svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917456" comment="texlive-juramisc-2021.186.0.0.91svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917457" comment="texlive-juramisc-doc-2021.186.0.0.91svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917458" comment="texlive-jurarsp-2021.186.0.0.52svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917459" comment="texlive-jurarsp-doc-2021.186.0.0.52svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917460" comment="texlive-jvlisting-2021.186.0.0.7svn24638-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917461" comment="texlive-jvlisting-doc-2021.186.0.0.7svn24638-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917462" comment="texlive-kalendarium-2021.186.1.0svn48744-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917463" comment="texlive-kalendarium-doc-2021.186.1.0svn48744-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917464" comment="texlive-kanaparser-2021.186.1.0svn48052-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917465" comment="texlive-kanaparser-doc-2021.186.1.0svn48052-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917466" comment="texlive-kantlipsum-2021.186.0.0.8asvn51727-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917467" comment="texlive-kantlipsum-doc-2021.186.0.0.8asvn51727-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917468" comment="texlive-karnaugh-2021.186.svn21338-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917469" comment="texlive-karnaugh-doc-2021.186.svn21338-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917470" comment="texlive-karnaugh-map-2021.186.1.1svn44131-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917471" comment="texlive-karnaugh-map-doc-2021.186.1.1svn44131-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917472" comment="texlive-karnaughmap-2021.186.2.0svn36989-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917473" comment="texlive-karnaughmap-doc-2021.186.2.0svn36989-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917474" comment="texlive-kastrup-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917475" comment="texlive-kastrup-doc-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917476" comment="texlive-kblocks-2021.186.2.0svn57617-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917477" comment="texlive-kblocks-doc-2021.186.2.0svn57617-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917478" comment="texlive-kdgdocs-2021.186.1.0svn24498-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917479" comment="texlive-kdgdocs-doc-2021.186.1.0svn24498-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917480" comment="texlive-kerkis-2021.186.1.11svn56271-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917481" comment="texlive-kerkis-doc-2021.186.1.11svn56271-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917482" comment="texlive-kerkis-fonts-2021.186.1.11svn56271-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917483" comment="texlive-kerntest-2021.186.1.32svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917484" comment="texlive-kerntest-doc-2021.186.1.32svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917485" comment="texlive-ketcindy-2021.186.20191225.0svn58661-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917486" comment="texlive-ketcindy-doc-2021.186.20191225.0svn58661-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917487" comment="texlive-keycommand-2021.186.3.1415svn18042-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917488" comment="texlive-keycommand-doc-2021.186.3.1415svn18042-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917489" comment="texlive-keyfloat-2021.186.2.01svn52160-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917490" comment="texlive-keyfloat-doc-2021.186.2.01svn52160-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917491" comment="texlive-keyindex-2021.186.1.0svn50828-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917492" comment="texlive-keyindex-doc-2021.186.1.0svn50828-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917493" comment="texlive-keyreader-2021.186.0.0.5bsvn28195-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917494" comment="texlive-keyreader-doc-2021.186.0.0.5bsvn28195-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917495" comment="texlive-keystroke-2021.186.1.6svn17992-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917496" comment="texlive-keystroke-doc-2021.186.1.6svn17992-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917497" comment="texlive-keyval2e-2021.186.0.0.0.2svn23698-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917498" comment="texlive-keyval2e-doc-2021.186.0.0.0.2svn23698-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917499" comment="texlive-keyvaltable-2021.186.2.2svn54677-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917500" comment="texlive-keyvaltable-doc-2021.186.2.2svn54677-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917501" comment="texlive-kix-2021.186.svn21606-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917502" comment="texlive-kix-doc-2021.186.svn21606-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917503" comment="texlive-kixfont-2021.186.svn18488-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917504" comment="texlive-kixfont-doc-2021.186.svn18488-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917505" comment="texlive-kluwer-2021.186.svn54074-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917506" comment="texlive-kluwer-doc-2021.186.svn54074-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917507" comment="texlive-knitting-2021.186.3.0svn50782-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917508" comment="texlive-knitting-doc-2021.186.3.0svn50782-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917509" comment="texlive-knitting-fonts-2021.186.3.0svn50782-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917510" comment="texlive-knittingpattern-2021.186.svn17205-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917511" comment="texlive-knittingpattern-doc-2021.186.svn17205-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917512" comment="texlive-knowledge-2021.186.1.25svn58724-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917513" comment="texlive-knowledge-doc-2021.186.1.25svn58724-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917514" comment="texlive-knuth-errata-2021.186.svn58682-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917515" comment="texlive-knuth-lib-2021.186.svn57963-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917516" comment="texlive-knuth-local-2021.186.svn57963-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917517" comment="texlive-knuth-pdf-2021.186.1.1svn58470-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917518" comment="texlive-koma-moderncvclassic-2021.186.0.0.5svn25025-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917519" comment="texlive-koma-moderncvclassic-doc-2021.186.0.0.5svn25025-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917520" comment="texlive-koma-script-2021.186.3.33svn58585-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917521" comment="texlive-koma-script-doc-2021.186.3.33svn58585-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917522" comment="texlive-koma-script-examples-2021.186.svn47523-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917523" comment="texlive-koma-script-sfs-2021.186.1.0svn26137-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917524" comment="texlive-koma-script-sfs-doc-2021.186.1.0svn26137-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917525" comment="texlive-komacv-2021.186.1.1.2svn57721-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917526" comment="texlive-komacv-doc-2021.186.1.1.2svn57721-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917527" comment="texlive-komacv-rg-2021.186.0.0.9.2svn49064-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917528" comment="texlive-komacv-rg-doc-2021.186.0.0.9.2svn49064-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917529" comment="texlive-kotex-oblivoir-2021.186.3.0.1svn58436-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917530" comment="texlive-kotex-oblivoir-doc-2021.186.3.0.1svn58436-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917531" comment="texlive-kotex-plain-2021.186.2.1.1asvn38630-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917532" comment="texlive-kotex-plain-doc-2021.186.2.1.1asvn38630-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917533" comment="texlive-kotex-utf-2021.186.2.1.2svn38558-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917534" comment="texlive-kotex-utf-doc-2021.186.2.1.2svn38558-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917535" comment="texlive-kotex-utils-2021.186.2.1.0svn38727-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917536" comment="texlive-kotex-utils-doc-2021.186.2.1.0svn38727-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917537" comment="texlive-kpathsea-2021.186.svn58622-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917538" comment="texlive-kpathsea-doc-2021.186.svn58622-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917539" comment="texlive-kpfonts-2021.186.3.33svn55643-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917540" comment="texlive-kpfonts-doc-2021.186.3.33svn55643-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917541" comment="texlive-kpfonts-fonts-2021.186.3.33svn55643-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917542" comment="texlive-kpfonts-otf-2021.186.0.0.35svn58435-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917543" comment="texlive-kpfonts-otf-doc-2021.186.0.0.35svn58435-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917544" comment="texlive-kpfonts-otf-fonts-2021.186.0.0.35svn58435-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917545" comment="texlive-ksfh_nat-2021.186.1.1svn24825-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917546" comment="texlive-ksp-thesis-2021.186.1.0.2svn39080-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917547" comment="texlive-ksp-thesis-doc-2021.186.1.0.2svn39080-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917548" comment="texlive-ktv-texdata-2021.186.05.34svn27369-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917549" comment="texlive-ktv-texdata-doc-2021.186.05.34svn27369-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917550" comment="texlive-ku-template-2021.186.0.0.02svn45935-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917551" comment="texlive-ku-template-doc-2021.186.0.0.02svn45935-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917552" comment="texlive-kurdishlipsum-2021.186.1.1svn47518-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917553" comment="texlive-kurdishlipsum-doc-2021.186.1.1svn47518-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917554" comment="texlive-kurier-2021.186.0.0.995bsvn19612-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917555" comment="texlive-kurier-doc-2021.186.0.0.995bsvn19612-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917556" comment="texlive-kurier-fonts-2021.186.0.0.995bsvn19612-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917557" comment="texlive-kvdefinekeys-2021.186.1.6svn53193-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917558" comment="texlive-kvdefinekeys-doc-2021.186.1.6svn53193-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917559" comment="texlive-kvmap-2021.186.0.0.3.5svn56361-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917560" comment="texlive-kvmap-doc-2021.186.0.0.3.5svn56361-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917561" comment="texlive-kvoptions-2021.186.3.14svn56609-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917562" comment="texlive-kvoptions-doc-2021.186.3.14svn56609-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917563" comment="texlive-kvsetkeys-2021.186.1.18svn53166-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917564" comment="texlive-kvsetkeys-doc-2021.186.1.18svn53166-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917565" comment="texlive-l2picfaq-2021.186.1.50svn19601-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917566" comment="texlive-l2tabu-2021.186.2.4svn39597-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917567" comment="texlive-l2tabu-english-2021.186.1.8.5.7svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917568" comment="texlive-l2tabu-french-2021.186.2.3svn31315-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917569" comment="texlive-l2tabu-italian-2021.186.2.3svn25218-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917570" comment="texlive-l2tabu-spanish-2021.186.1.1svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917571" comment="texlive-l3backend-2021.186.svn58509-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917572" comment="texlive-l3backend-doc-2021.186.svn58509-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917573" comment="texlive-l3build-2021.186.svn55426-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917574" comment="texlive-l3build-doc-2021.186.svn55426-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917575" comment="texlive-l3experimental-2021.186.svn57789-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917576" comment="texlive-l3experimental-doc-2021.186.svn57789-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917577" comment="texlive-l3kernel-2021.186.svn57789-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917578" comment="texlive-l3kernel-doc-2021.186.svn57789-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917579" comment="texlive-l3packages-2021.186.svn58296-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917580" comment="texlive-l3packages-doc-2021.186.svn58296-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917581" comment="texlive-labbook-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917582" comment="texlive-labbook-doc-2021.186.svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917583" comment="texlive-labels-2021.186.0.0.13svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917584" comment="texlive-labels-doc-2021.186.0.0.13svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917585" comment="texlive-labels4easylist-2021.186.1.0svn51124-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917586" comment="texlive-labels4easylist-doc-2021.186.1.0svn51124-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917587" comment="texlive-labelschanged-2021.186.1.0svn46040-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917588" comment="texlive-labelschanged-doc-2021.186.1.0svn46040-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917589" comment="texlive-labyrinth-2021.186.1.0svn33454-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917590" comment="texlive-labyrinth-doc-2021.186.1.0svn33454-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917591" comment="texlive-lacheck-2021.186.svn54070-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917592" comment="texlive-ladder-2021.186.svn44394-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917593" comment="texlive-ladder-doc-2021.186.svn44394-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917594" comment="texlive-lambda-2021.186.svn45756-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917595" comment="texlive-lambda-lists-2021.186.svn31402-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917596" comment="texlive-lambda-lists-doc-2021.186.svn31402-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917597" comment="texlive-langcode-2021.186.0.0.2svn27764-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917598" comment="texlive-langcode-doc-2021.186.0.0.2svn27764-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917599" comment="texlive-langsci-2021.186.svn58476-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917600" comment="texlive-langsci-avm-2021.186.0.0.2.1svn55846-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917601" comment="texlive-langsci-avm-doc-2021.186.0.0.2.1svn55846-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917602" comment="texlive-langsci-doc-2021.186.svn58476-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917603" comment="texlive-lapdf-2021.186.1.1svn23806-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917604" comment="texlive-lapdf-doc-2021.186.1.1svn23806-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917605" comment="texlive-lastpackage-2021.186.0.0.1svn34481-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917606" comment="texlive-lastpackage-doc-2021.186.0.0.1svn34481-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917607" comment="texlive-lastpage-2021.186.1.2msvn36680-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917608" comment="texlive-lastpage-doc-2021.186.1.2msvn36680-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917609" comment="texlive-latex-2021.186.20201001_pl4svn57354-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917610" comment="texlive-latex-amsmath-dev-2021.186.20210501_pre_release_0svn56791-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917611" comment="texlive-latex-amsmath-dev-doc-2021.186.20210501_pre_release_0svn56791-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917612" comment="texlive-latex-base-dev-2021.186.20210501_pre_release_2svn57982-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917613" comment="texlive-latex-base-dev-doc-2021.186.20210501_pre_release_2svn57982-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917614" comment="texlive-latex-bin-2021.186.svn57972-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917615" comment="texlive-latex-bin-dev-2021.186.svn57981-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917616" comment="texlive-latex-brochure-2021.186.svn40612-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917617" comment="texlive-latex-course-2021.186.2svn25505-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917618" comment="texlive-latex-doc-2021.186.20201001_pl4svn57354-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917619" comment="texlive-latex-doc-ptr-2021.186.svn57311-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917620" comment="texlive-latex-firstaid-dev-2021.186.1.0ksvn57981-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917621" comment="texlive-latex-firstaid-dev-doc-2021.186.1.0ksvn57981-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917622" comment="texlive-latex-fonts-2021.186.svn28888-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917623" comment="texlive-latex-fonts-doc-2021.186.svn28888-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917624" comment="texlive-latex-git-log-2021.186.1.0.0svn54010-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917625" comment="texlive-latex-git-log-doc-2021.186.1.0.0svn54010-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917626" comment="texlive-latex-graphics-companion-2021.186.svn29235-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917627" comment="texlive-latex-graphics-dev-2021.186.20210501_pre_release_0svn56791-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917628" comment="texlive-latex-graphics-dev-doc-2021.186.20210501_pre_release_0svn56791-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917629" comment="texlive-latex-make-2021.186.2.4.2svn57349-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917630" comment="texlive-latex-make-doc-2021.186.2.4.2svn57349-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917631" comment="texlive-latex-mr-2021.186.1.0svn55475-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917632" comment="texlive-latex-notes-zh-cn-2021.186.1.20svn15878-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917633" comment="texlive-latex-papersize-2021.186.1.63svn53131-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917634" comment="texlive-latex-papersize-doc-2021.186.1.63svn53131-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917635" comment="texlive-latex-refsheet-2021.186.1.2svn45076-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917636" comment="texlive-latex-tools-dev-2021.186.20210501_pre_release_1svn57982-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917637" comment="texlive-latex-tools-dev-doc-2021.186.20210501_pre_release_1svn57982-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917638" comment="texlive-latex-uni8-2021.186.0.0.03svn49729-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917639" comment="texlive-latex-uni8-doc-2021.186.0.0.03svn49729-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917640" comment="texlive-latex-veryshortguide-2021.186.0.0.7svn55228-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917641" comment="texlive-latex-via-exemplos-2021.186.0.0.5.6svn53248-48.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249767" version="1" class="patch">
	<metadata>
		<title>texlive-latex-web-companion-2021.187.svn29349-47.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-latex-web-companion-2021.187.svn29349-47.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009917642" comment="texlive-latex-web-companion-2021.187.svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917643" comment="texlive-latex2e-help-texinfo-2021.187.svn57213-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917644" comment="texlive-latex2e-help-texinfo-fr-2021.187.svn57275-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917645" comment="texlive-latex2e-help-texinfo-spanish-2021.187.svn57213-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917646" comment="texlive-latex2man-2021.187.1.29svn49249-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917647" comment="texlive-latex2man-doc-2021.187.1.29svn49249-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917648" comment="texlive-latex2nemeth-2021.187.1.0.2svn54389-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917649" comment="texlive-latex2nemeth-doc-2021.187.1.0.2svn54389-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917650" comment="texlive-latex4musicians-2021.187.1.0.1svn49759-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917651" comment="texlive-latex4wp-2021.187.1.0.10svn35999-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917652" comment="texlive-latex4wp-it-2021.187.1.0.10svn36000-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917653" comment="texlive-latexbangla-2021.187.0.0.2svn55475-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917654" comment="texlive-latexbangla-doc-2021.187.0.0.2svn55475-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917655" comment="texlive-latexbug-2021.187.1.0jsvn58151-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917656" comment="texlive-latexbug-doc-2021.187.1.0jsvn58151-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917657" comment="texlive-latexcheat-2021.187.1.13svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917658" comment="texlive-latexcheat-de-2021.187.svn35702-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917659" comment="texlive-latexcheat-esmx-2021.187.2.00svn36866-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917660" comment="texlive-latexcheat-ptbr-2021.187.1.13svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917661" comment="texlive-latexcolors-2021.187.0.0.1asvn49888-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917662" comment="texlive-latexcolors-doc-2021.187.0.0.1asvn49888-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917663" comment="texlive-latexconfig-2021.187.svn53525-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917664" comment="texlive-latexcourse-rug-2021.187.1.1svn39026-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917665" comment="texlive-latexdemo-2021.187.0.0.1svn55265-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917666" comment="texlive-latexdemo-doc-2021.187.0.0.1svn55265-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917667" comment="texlive-latexdiff-2021.187.1.3.1.1svn55540-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917668" comment="texlive-latexdiff-doc-2021.187.1.3.1.1svn55540-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917669" comment="texlive-latexfileinfo-pkgs-2021.187.0.0.22svn26760-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917670" comment="texlive-latexfileinfo-pkgs-doc-2021.187.0.0.22svn26760-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917671" comment="texlive-latexfileversion-2021.187.0.0.3svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917672" comment="texlive-latexfileversion-doc-2021.187.0.0.3svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917673" comment="texlive-latexgit-2021.187.svn54811-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917674" comment="texlive-latexgit-doc-2021.187.svn54811-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917675" comment="texlive-latexindent-2021.187.3.9.1svn58595-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917676" comment="texlive-latexindent-doc-2021.187.3.9.1svn58595-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917677" comment="texlive-latexmk-2021.187.4.70bsvn57213-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917678" comment="texlive-latexmk-doc-2021.187.4.70bsvn57213-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917679" comment="texlive-latexmp-2021.187.1.2.1svn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917680" comment="texlive-latexmp-doc-2021.187.1.2.1svn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917681" comment="texlive-latexpand-2021.187.1.6svn53109-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917682" comment="texlive-latexpand-doc-2021.187.1.6svn53109-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917683" comment="texlive-latino-sine-flexione-2021.187.1.2svn53485-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917684" comment="texlive-latino-sine-flexione-doc-2021.187.1.2svn53485-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917685" comment="texlive-lato-2021.187.3.3svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917686" comment="texlive-lato-doc-2021.187.3.3svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917687" comment="texlive-lato-fonts-2021.187.3.3svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917688" comment="texlive-layaureo-2021.187.0.0.2svn19087-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917689" comment="texlive-layaureo-doc-2021.187.0.0.2svn19087-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917690" comment="texlive-layouts-2021.187.2.6dsvn42428-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917691" comment="texlive-layouts-doc-2021.187.2.6dsvn42428-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917692" comment="texlive-lazylist-2021.187.1.0asvn17691-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917693" comment="texlive-lazylist-doc-2021.187.1.0asvn17691-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917694" comment="texlive-lccaps-2021.187.1.0svn46432-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917695" comment="texlive-lccaps-doc-2021.187.1.0svn46432-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917696" comment="texlive-lcd-2021.187.0.0.3svn16549-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917697" comment="texlive-lcd-doc-2021.187.0.0.3svn16549-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917698" comment="texlive-lcdftypetools-2021.187.svn52851-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917699" comment="texlive-lcg-2021.187.1.3svn31474-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917700" comment="texlive-lcg-doc-2021.187.1.3svn31474-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917701" comment="texlive-lcyw-2021.187.1.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917702" comment="texlive-lcyw-doc-2021.187.1.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917703" comment="texlive-leading-2021.187.0.0.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917704" comment="texlive-leading-doc-2021.187.0.0.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917705" comment="texlive-leadsheets-2021.187.0.0.6svn52275-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917706" comment="texlive-leadsheets-doc-2021.187.0.0.6svn52275-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917707" comment="texlive-leaflet-2021.187.2.1asvn56878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917708" comment="texlive-leaflet-doc-2021.187.2.1asvn56878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917709" comment="texlive-lebhart-2021.187.svn58503-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917710" comment="texlive-lebhart-doc-2021.187.svn58503-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917711" comment="texlive-lecturer-2021.187.svn23916-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917712" comment="texlive-lecturer-doc-2021.187.svn23916-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917713" comment="texlive-lectures-2021.187.1.0.5svn53642-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917714" comment="texlive-lectures-doc-2021.187.1.0.5svn53642-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917715" comment="texlive-lectureslides-2021.187.0.0.1svn58393-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917716" comment="texlive-lectureslides-doc-2021.187.0.0.1svn58393-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917717" comment="texlive-ledmac-2021.187.0.0.19.4svn41811-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917718" comment="texlive-ledmac-doc-2021.187.0.0.19.4svn41811-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917719" comment="texlive-leftidx-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917720" comment="texlive-leftidx-doc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917721" comment="texlive-leftindex-2021.187.0.0.1betasvn56182-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917722" comment="texlive-leftindex-doc-2021.187.0.0.1betasvn56182-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917723" comment="texlive-leipzig-2021.187.2.3svn52450-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917724" comment="texlive-leipzig-doc-2021.187.2.3svn52450-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917725" comment="texlive-lengthconvert-2021.187.1.0asvn55064-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917726" comment="texlive-lengthconvert-doc-2021.187.1.0asvn55064-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917727" comment="texlive-letltxmacro-2021.187.1.6svn53022-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917728" comment="texlive-letltxmacro-doc-2021.187.1.6svn53022-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917729" comment="texlive-letterspacing-2021.187.svn54266-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917730" comment="texlive-letterswitharrows-2021.187.svn53709-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917731" comment="texlive-letterswitharrows-doc-2021.187.svn53709-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917732" comment="texlive-lettre-2021.187.3.002svn54722-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917733" comment="texlive-lettre-doc-2021.187.3.002svn54722-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917734" comment="texlive-lettrine-2021.187.2.23svn54560-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917735" comment="texlive-lettrine-doc-2021.187.2.23svn54560-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917736" comment="texlive-levy-2021.187.svn21750-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917737" comment="texlive-levy-doc-2021.187.svn21750-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917738" comment="texlive-lewis-2021.187.0.0.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917739" comment="texlive-lewis-doc-2021.187.0.0.1svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917740" comment="texlive-lexend-2021.187.1.1.0.70svn57564-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917741" comment="texlive-lexend-doc-2021.187.1.1.0.70svn57564-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917742" comment="texlive-lexend-fonts-2021.187.1.1.0.70svn57564-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917743" comment="texlive-lexikon-2021.187.1.0csvn17364-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917744" comment="texlive-lexikon-doc-2021.187.1.0csvn17364-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917745" comment="texlive-lexref-2021.187.1.1asvn36026-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917746" comment="texlive-lexref-doc-2021.187.1.1asvn36026-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917747" comment="texlive-lfb-2021.187.1.0svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917748" comment="texlive-lfb-doc-2021.187.1.0svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917749" comment="texlive-lgreek-2021.187.svn21818-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917750" comment="texlive-lgreek-doc-2021.187.svn21818-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917751" comment="texlive-lh-2021.187.3.5gsvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917752" comment="texlive-lh-doc-2021.187.3.5gsvn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917753" comment="texlive-lhcyr-2021.187.svn31795-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917754" comment="texlive-lhelp-2021.187.2.0svn23638-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917755" comment="texlive-lhelp-doc-2021.187.2.0svn23638-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917756" comment="texlive-libertine-2021.187.5.3.0svn54583-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917757" comment="texlive-libertine-doc-2021.187.5.3.0svn54583-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917758" comment="texlive-libertine-fonts-2021.187.5.3.0svn54583-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917759" comment="texlive-libertinegc-2021.187.1.01svn44616-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917760" comment="texlive-libertinegc-doc-2021.187.1.01svn44616-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917761" comment="texlive-libertinus-2021.187.0.0.02svn55064-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917762" comment="texlive-libertinus-doc-2021.187.0.0.02svn55064-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917763" comment="texlive-libertinus-fonts-2021.187.7.040svn57948-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917764" comment="texlive-libertinus-fonts-doc-2021.187.7.040svn57948-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917765" comment="texlive-libertinus-fonts-fonts-2021.187.7.040svn57948-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917766" comment="texlive-libertinus-otf-2021.187.0.0.28svn57398-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917767" comment="texlive-libertinus-otf-doc-2021.187.0.0.28svn57398-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917768" comment="texlive-libertinus-type1-2021.187.svn57754-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917769" comment="texlive-libertinus-type1-doc-2021.187.svn57754-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917770" comment="texlive-libertinus-type1-fonts-2021.187.svn57754-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917771" comment="texlive-libertinust1math-2021.187.1.2.2svn56861-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917772" comment="texlive-libertinust1math-doc-2021.187.1.2.2svn56861-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917773" comment="texlive-libertinust1math-fonts-2021.187.1.2.2svn56861-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917774" comment="texlive-libgreek-2021.187.1.0svn27789-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917775" comment="texlive-libgreek-doc-2021.187.1.0svn27789-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917776" comment="texlive-librarian-2021.187.1.0svn19880-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917777" comment="texlive-librarian-doc-2021.187.1.0svn19880-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917778" comment="texlive-librebaskerville-2021.187.svn56018-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917779" comment="texlive-librebaskerville-doc-2021.187.svn56018-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917780" comment="texlive-librebaskerville-fonts-2021.187.svn56018-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917781" comment="texlive-librebodoni-2021.187.svn39375-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917782" comment="texlive-librebodoni-doc-2021.187.svn39375-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917783" comment="texlive-librebodoni-fonts-2021.187.svn39375-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917784" comment="texlive-librecaslon-2021.187.svn56003-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917785" comment="texlive-librecaslon-doc-2021.187.svn56003-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917786" comment="texlive-librecaslon-fonts-2021.187.svn56003-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917787" comment="texlive-librefranklin-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917788" comment="texlive-librefranklin-doc-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917789" comment="texlive-librefranklin-fonts-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917790" comment="texlive-libris-2021.187.1.007svn19409-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917791" comment="texlive-libris-doc-2021.187.1.007svn19409-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917792" comment="texlive-libris-fonts-2021.187.1.007svn19409-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917793" comment="texlive-lie-hasse-2021.187.1.0svn53653-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917794" comment="texlive-lie-hasse-doc-2021.187.1.0svn53653-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917795" comment="texlive-light-latex-make-2021.187.0.0.2.0svn56513-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917796" comment="texlive-light-latex-make-doc-2021.187.0.0.2.0svn56513-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917797" comment="texlive-lilyglyphs-2021.187.0.0.2.4svn56473-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917798" comment="texlive-lilyglyphs-doc-2021.187.0.0.2.4svn56473-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917799" comment="texlive-lilyglyphs-fonts-2021.187.0.0.2.4svn56473-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917800" comment="texlive-limap-2021.187.2.2svn44863-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917801" comment="texlive-limap-doc-2021.187.2.2svn44863-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917802" comment="texlive-limecv-2021.187.0.0.1.8svn54329-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917803" comment="texlive-limecv-doc-2021.187.0.0.1.8svn54329-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917804" comment="texlive-linearA-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917805" comment="texlive-linearA-doc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917806" comment="texlive-linearA-fonts-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917807" comment="texlive-linegoal-2021.187.2.9svn21523-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917808" comment="texlive-linegoal-doc-2021.187.2.9svn21523-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917809" comment="texlive-lineno-2021.187.4.41svn57866-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917810" comment="texlive-lineno-doc-2021.187.4.41svn57866-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917811" comment="texlive-ling-macros-2021.187.svn42268-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917812" comment="texlive-ling-macros-doc-2021.187.svn42268-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917813" comment="texlive-linguex-2021.187.4.3svn30815-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917814" comment="texlive-linguex-doc-2021.187.4.3svn30815-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917815" comment="texlive-linguisticspro-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917816" comment="texlive-linguisticspro-doc-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917817" comment="texlive-linguisticspro-fonts-2021.187.svn54512-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917818" comment="texlive-linop-2021.187.0.0.1svn41304-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917819" comment="texlive-linop-doc-2021.187.0.0.1svn41304-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917820" comment="texlive-lion-msc-2021.187.0.0.30svn55415-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917821" comment="texlive-lion-msc-doc-2021.187.0.0.30svn55415-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917822" comment="texlive-lipsum-2021.187.2.3svn58123-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917823" comment="texlive-lipsum-doc-2021.187.2.3svn58123-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917824" comment="texlive-lisp-on-tex-2021.187.2.0svn38722-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917825" comment="texlive-lisp-on-tex-doc-2021.187.2.0svn38722-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917826" comment="texlive-listbib-2021.187.2.2svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917827" comment="texlive-listbib-doc-2021.187.2.2svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917828" comment="texlive-listing-2021.187.1.2svn17373-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917829" comment="texlive-listing-doc-2021.187.1.2svn17373-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917830" comment="texlive-listings-2021.187.1.8dsvn55265-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917831" comment="texlive-listings-doc-2021.187.1.8dsvn55265-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917832" comment="texlive-listings-ext-2021.187.67svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917833" comment="texlive-listings-ext-doc-2021.187.67svn29349-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917834" comment="texlive-listingsutf8-2021.187.1.5svn53097-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917835" comment="texlive-listingsutf8-doc-2021.187.1.5svn53097-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917836" comment="texlive-listlbls-2021.187.1.03svn34893-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917837" comment="texlive-listlbls-doc-2021.187.1.03svn34893-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917838" comment="texlive-listliketab-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917839" comment="texlive-listliketab-doc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917840" comment="texlive-listofitems-2021.187.1.63svn51923-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917841" comment="texlive-listofitems-doc-2021.187.1.63svn51923-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917842" comment="texlive-listofsymbols-2021.187.0.0.2svn16134-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917843" comment="texlive-listofsymbols-doc-2021.187.0.0.2svn16134-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917844" comment="texlive-lithuanian-2021.187.svn46039-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917845" comment="texlive-lithuanian-doc-2021.187.svn46039-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917846" comment="texlive-liturg-2021.187.1.0svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917847" comment="texlive-liturg-doc-2021.187.1.0svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917848" comment="texlive-lkproof-2021.187.3.1svn20021-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917849" comment="texlive-lkproof-doc-2021.187.3.1svn20021-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917850" comment="texlive-llncsconf-2021.187.1.1.0svn55117-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917851" comment="texlive-llncsconf-doc-2021.187.1.1.0svn55117-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917852" comment="texlive-lm-2021.187.2.005svn58637-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917853" comment="texlive-lm-doc-2021.187.2.005svn58637-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917854" comment="texlive-lm-fonts-2021.187.2.005svn58637-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917855" comment="texlive-lm-math-2021.187.1.959svn36915-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917856" comment="texlive-lm-math-doc-2021.187.1.959svn36915-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917857" comment="texlive-lm-math-fonts-2021.187.1.959svn36915-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917858" comment="texlive-lmake-2021.187.1.0svn25552-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917859" comment="texlive-lmake-doc-2021.187.1.0svn25552-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917860" comment="texlive-lni-2021.187.1.7svn58061-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917861" comment="texlive-lni-doc-2021.187.1.7svn58061-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917862" comment="texlive-lobster2-2021.187.svn56019-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917863" comment="texlive-lobster2-doc-2021.187.svn56019-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917864" comment="texlive-lobster2-fonts-2021.187.svn56019-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917865" comment="texlive-locality-2021.187.0.0.2svn20422-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917866" comment="texlive-locality-doc-2021.187.0.0.2svn20422-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917867" comment="texlive-localloc-2021.187.svn56496-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917868" comment="texlive-localloc-doc-2021.187.svn56496-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917869" comment="texlive-logbox-2021.187.1.0svn24499-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917870" comment="texlive-logbox-doc-2021.187.1.0svn24499-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917871" comment="texlive-logical-markup-utils-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917872" comment="texlive-logical-markup-utils-doc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917873" comment="texlive-logicproof-2021.187.svn33254-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917874" comment="texlive-logicproof-doc-2021.187.svn33254-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917875" comment="texlive-logicpuzzle-2021.187.2.5svn34491-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917876" comment="texlive-logicpuzzle-doc-2021.187.2.5svn34491-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917877" comment="texlive-logix-2021.187.1.08svn57457-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917878" comment="texlive-logix-doc-2021.187.1.08svn57457-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917879" comment="texlive-logix-fonts-2021.187.1.08svn57457-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917880" comment="texlive-logpap-2021.187.0.0.6svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917881" comment="texlive-logpap-doc-2021.187.0.0.6svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917882" comment="texlive-logreq-2021.187.1.0svn53003-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917883" comment="texlive-logreq-doc-2021.187.1.0svn53003-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917884" comment="texlive-lollipop-2021.187.1.07svn45678-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917885" comment="texlive-lollipop-doc-2021.187.1.07svn45678-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917886" comment="texlive-longdivision-2021.187.1.2.0svn55117-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917887" comment="texlive-longdivision-doc-2021.187.1.2.0svn55117-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917888" comment="texlive-longfbox-2021.187.1.0svn39028-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917889" comment="texlive-longfbox-doc-2021.187.1.0svn39028-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917890" comment="texlive-longfigure-2021.187.1.0svn34302-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917891" comment="texlive-longfigure-doc-2021.187.1.0svn34302-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917892" comment="texlive-longnamefilelist-2021.187.0.0.2svn27889-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917893" comment="texlive-longnamefilelist-doc-2021.187.0.0.2svn27889-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917894" comment="texlive-loops-2021.187.1.3svn30704-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917895" comment="texlive-loops-doc-2021.187.1.3svn30704-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917896" comment="texlive-lpform-2021.187.svn36918-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917897" comment="texlive-lpform-doc-2021.187.svn36918-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917898" comment="texlive-lpic-2021.187.0.0.8svn20843-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917899" comment="texlive-lpic-doc-2021.187.0.0.8svn20843-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917900" comment="texlive-lplfitch-2021.187.0.0.9svn31077-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917901" comment="texlive-lplfitch-doc-2021.187.0.0.9svn31077-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917902" comment="texlive-lps-2021.187.0.0.7svn21322-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917903" comment="texlive-lps-doc-2021.187.0.0.7svn21322-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917904" comment="texlive-lroundrect-2021.187.1.0svn39804-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917905" comment="texlive-lroundrect-doc-2021.187.1.0svn39804-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917906" comment="texlive-lsc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917907" comment="texlive-lsc-doc-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917908" comment="texlive-lshort-bulgarian-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917909" comment="texlive-lshort-chinese-2021.187.6.02svn56036-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917910" comment="texlive-lshort-czech-2021.187.4.27svn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917911" comment="texlive-lshort-dutch-2021.187.1.3svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917912" comment="texlive-lshort-english-2021.187.6.4svn58309-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917913" comment="texlive-lshort-estonian-2021.187.5.05svn39323-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917914" comment="texlive-lshort-finnish-2021.187.svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917915" comment="texlive-lshort-french-2021.187.5.01fr_0svn23332-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917916" comment="texlive-lshort-german-2021.187.3.0csvn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917917" comment="texlive-lshort-italian-2021.187.6.2svn57038-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917918" comment="texlive-lshort-japanese-2021.187.svn36207-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917919" comment="texlive-lshort-korean-2021.187.svn58468-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917920" comment="texlive-lshort-mongol-2021.187.4.26svn15878-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917921" comment="texlive-lshort-persian-2021.187.5.01svn31296-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917922" comment="texlive-lshort-polish-2021.187.svn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917923" comment="texlive-lshort-portuguese-2021.187.5.01.0svn55643-47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917924" comment="texlive-lshort-russian-2021.187.svn55643-47.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249768" version="1" class="patch">
	<metadata>
		<title>texlive-lshort-slovak-2021.186.svn15878-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-lshort-slovak-2021.186.svn15878-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009917925" comment="texlive-lshort-slovak-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917926" comment="texlive-lshort-slovenian-2021.186.4.20svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917927" comment="texlive-lshort-spanish-2021.186.0.0.5svn35050-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917928" comment="texlive-lshort-thai-2021.186.1.32svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917929" comment="texlive-lshort-turkish-2021.186.4.20svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917930" comment="texlive-lshort-ukr-2021.186.4.00svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917931" comment="texlive-lshort-vietnamese-2021.186.4.00svn55643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917932" comment="texlive-lstaddons-2021.186.0.0.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917933" comment="texlive-lstaddons-doc-2021.186.0.0.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917934" comment="texlive-lstbayes-2021.186.svn48160-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917935" comment="texlive-lstbayes-doc-2021.186.svn48160-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917936" comment="texlive-lstfiracode-2021.186.0.0.1csvn49503-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917937" comment="texlive-lstfiracode-doc-2021.186.0.0.1csvn49503-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917938" comment="texlive-lt3graph-2021.186.0.0.1.9svn45913-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917939" comment="texlive-lt3graph-doc-2021.186.0.0.1.9svn45913-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917940" comment="texlive-ltablex-2021.186.1.1svn34923-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917941" comment="texlive-ltablex-doc-2021.186.1.1svn34923-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917942" comment="texlive-ltabptch-2021.186.1.74dsvn17533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917943" comment="texlive-ltabptch-doc-2021.186.1.74dsvn17533-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917944" comment="texlive-ltb2bib-2021.186.0.0.01svn43746-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917945" comment="texlive-ltb2bib-doc-2021.186.0.0.01svn43746-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917946" comment="texlive-ltxcmds-2021.186.1.25svn56421-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917947" comment="texlive-ltxcmds-doc-2021.186.1.25svn56421-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917948" comment="texlive-ltxdockit-2021.186.1.2dsvn21869-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917949" comment="texlive-ltxdockit-doc-2021.186.1.2dsvn21869-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917950" comment="texlive-ltxfileinfo-2021.186.2.04svn38663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917951" comment="texlive-ltxfileinfo-doc-2021.186.2.04svn38663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917952" comment="texlive-ltxguidex-2021.186.0.0.2.0svn50992-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917953" comment="texlive-ltxguidex-doc-2021.186.0.0.2.0svn50992-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917954" comment="texlive-ltximg-2021.186.2.0svn57521-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917955" comment="texlive-ltximg-doc-2021.186.2.0svn57521-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917956" comment="texlive-ltxkeys-2021.186.0.0.0.3csvn28332-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917957" comment="texlive-ltxkeys-doc-2021.186.0.0.0.3csvn28332-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917958" comment="texlive-ltxmisc-2021.186.svn21927-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917959" comment="texlive-ltxnew-2021.186.1.3svn21586-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917960" comment="texlive-ltxnew-doc-2021.186.1.3svn21586-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917961" comment="texlive-ltxtools-2021.186.0.0.0.1asvn24897-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917962" comment="texlive-ltxtools-doc-2021.186.0.0.0.1asvn24897-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917963" comment="texlive-lua-alt-getopt-2021.186.0.0.7.0svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917964" comment="texlive-lua-alt-getopt-doc-2021.186.0.0.7.0svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917965" comment="texlive-lua-check-hyphen-2021.186.0.0.7asvn47527-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917966" comment="texlive-lua-check-hyphen-doc-2021.186.0.0.7asvn47527-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917967" comment="texlive-lua-physical-2021.186.1.0.3svn56306-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917968" comment="texlive-lua-physical-doc-2021.186.1.0.3svn56306-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917969" comment="texlive-lua-typo-2021.186.0.0.32svn58744-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917970" comment="texlive-lua-typo-doc-2021.186.0.0.32svn58744-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917971" comment="texlive-lua-uca-2021.186.0.0.1svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917972" comment="texlive-lua-uca-doc-2021.186.0.0.1svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917973" comment="texlive-lua-ul-2021.186.0.0.1.2svn58745-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917974" comment="texlive-lua-ul-doc-2021.186.0.0.1.2svn58745-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917975" comment="texlive-lua-uni-algos-2021.186.0.0.2svn55206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917976" comment="texlive-lua-uni-algos-doc-2021.186.0.0.2svn55206-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917977" comment="texlive-lua-visual-debug-2021.186.0.0.8svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917978" comment="texlive-lua-visual-debug-doc-2021.186.0.0.8svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917979" comment="texlive-luabibentry-2021.186.0.0.1asvn55777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917980" comment="texlive-luabibentry-doc-2021.186.0.0.1asvn55777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917981" comment="texlive-luabidi-2021.186.0.0.5svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917982" comment="texlive-luabidi-doc-2021.186.0.0.5svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917983" comment="texlive-luacode-2021.186.1.2asvn25193-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917984" comment="texlive-luacode-doc-2021.186.1.2asvn25193-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917985" comment="texlive-luacolor-2021.186.1.17svn57829-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917986" comment="texlive-luacolor-doc-2021.186.1.17svn57829-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917987" comment="texlive-luahbtex-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917988" comment="texlive-luahyphenrules-2021.186.1.1svn56200-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917989" comment="texlive-luahyphenrules-doc-2021.186.1.1svn56200-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917990" comment="texlive-luaimageembed-2021.186.0.0.1svn50788-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917991" comment="texlive-luaimageembed-doc-2021.186.0.0.1svn50788-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917992" comment="texlive-luaindex-2021.186.0.0.1bsvn25882-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917993" comment="texlive-luaindex-doc-2021.186.0.0.1bsvn25882-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917994" comment="texlive-luainputenc-2021.186.0.0.973svn20491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917995" comment="texlive-luainputenc-doc-2021.186.0.0.973svn20491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917996" comment="texlive-luaintro-2021.186.0.0.03svn35490-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917997" comment="texlive-luajittex-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917998" comment="texlive-luakeys-2021.186.0.0.1svn57463-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009917999" comment="texlive-luakeys-doc-2021.186.0.0.1svn57463-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918000" comment="texlive-lualatex-doc-2021.186.svn30473-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918001" comment="texlive-lualatex-doc-de-2021.186.1.0svn30474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918002" comment="texlive-lualatex-math-2021.186.1.9svn56541-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918003" comment="texlive-lualatex-math-doc-2021.186.1.9svn56541-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918004" comment="texlive-lualatex-truncate-2021.186.1.1svn48469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918005" comment="texlive-lualatex-truncate-doc-2021.186.1.1svn48469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918006" comment="texlive-lualibs-2021.186.2.73svn57277-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918007" comment="texlive-lualibs-doc-2021.186.2.73svn57277-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918008" comment="texlive-luamesh-2021.186.0.0.6svn55475-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918009" comment="texlive-luamesh-doc-2021.186.0.0.6svn55475-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918010" comment="texlive-luamplib-2021.186.2.20.7svn58279-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918011" comment="texlive-luamplib-doc-2021.186.2.20.7svn58279-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918012" comment="texlive-luaotfload-2021.186.3.17svn57443-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918013" comment="texlive-luaotfload-doc-2021.186.3.17svn57443-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918014" comment="texlive-luapackageloader-2021.186.0.0.2svn54779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918015" comment="texlive-luapackageloader-doc-2021.186.0.0.2svn54779-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918016" comment="texlive-luaprogtable-2021.186.1.0svn56113-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918017" comment="texlive-luaprogtable-doc-2021.186.1.0svn56113-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918018" comment="texlive-luarandom-2021.186.0.0.01svn49419-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918019" comment="texlive-luarandom-doc-2021.186.0.0.01svn49419-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918020" comment="texlive-luasseq-2021.186.svn37877-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918021" comment="texlive-luasseq-doc-2021.186.svn37877-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918022" comment="texlive-luatex-2021.186.svn58702-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918023" comment="texlive-luatex-doc-2021.186.svn58702-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918024" comment="texlive-luatex85-2021.186.1.4svn41456-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918025" comment="texlive-luatex85-doc-2021.186.1.4svn41456-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918026" comment="texlive-luatexbase-2021.186.1.3svn52663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918027" comment="texlive-luatexbase-doc-2021.186.1.3svn52663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918028" comment="texlive-luatexja-2021.186.20210319.0svn58542-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918029" comment="texlive-luatexja-doc-2021.186.20210319.0svn58542-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918030" comment="texlive-luatexko-2021.186.3.0svn58085-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918031" comment="texlive-luatexko-doc-2021.186.3.0svn58085-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918032" comment="texlive-luatextra-2021.186.1.0.1svn20747-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918033" comment="texlive-luatextra-doc-2021.186.1.0.1svn20747-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918034" comment="texlive-luatodonotes-2021.186.0.0.5svn53825-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918035" comment="texlive-luatodonotes-doc-2021.186.0.0.5svn53825-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918036" comment="texlive-luavlna-2021.186.0.0.1isvn58087-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918037" comment="texlive-luavlna-doc-2021.186.0.0.1isvn58087-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918038" comment="texlive-luaxml-2021.186.0.0.1nsvn57183-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918039" comment="texlive-luaxml-doc-2021.186.0.0.1nsvn57183-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918040" comment="texlive-lwarp-2021.186.0.0.895svn57836-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918041" comment="texlive-lwarp-doc-2021.186.0.0.895svn57836-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918042" comment="texlive-lxfonts-2021.186.2.0bsvn32354-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918043" comment="texlive-lxfonts-doc-2021.186.2.0bsvn32354-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918044" comment="texlive-lxfonts-fonts-2021.186.2.0bsvn32354-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918045" comment="texlive-ly1-2021.186.svn47848-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918046" comment="texlive-ly1-doc-2021.186.svn47848-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918047" comment="texlive-lyluatex-2021.186.1.0fsvn51252-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918048" comment="texlive-lyluatex-doc-2021.186.1.0fsvn51252-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918049" comment="texlive-m-tx-2021.186.0.0.63csvn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918050" comment="texlive-m-tx-doc-2021.186.0.0.63csvn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918051" comment="texlive-macros2e-2021.186.0.0.4asvn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918052" comment="texlive-macros2e-doc-2021.186.0.0.4asvn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918053" comment="texlive-macroswap-2021.186.1.1svn31498-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918054" comment="texlive-macroswap-doc-2021.186.1.1svn31498-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918055" comment="texlive-mafr-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918056" comment="texlive-mafr-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918057" comment="texlive-magaz-2021.186.0.0.4svn24694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918058" comment="texlive-magaz-doc-2021.186.0.0.4svn24694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918059" comment="texlive-magicnum-2021.186.1.7svn52983-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918060" comment="texlive-magicnum-doc-2021.186.1.7svn52983-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918061" comment="texlive-magra-2021.186.0.0.0.1svn57373-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918062" comment="texlive-magra-doc-2021.186.0.0.0.1svn57373-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918063" comment="texlive-magra-fonts-2021.186.0.0.0.1svn57373-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918064" comment="texlive-mailing-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918065" comment="texlive-mailing-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918066" comment="texlive-mailmerge-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918067" comment="texlive-mailmerge-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918068" comment="texlive-make4ht-2021.186.0.0.3gsvn58563-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918069" comment="texlive-make4ht-doc-2021.186.0.0.3gsvn58563-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918070" comment="texlive-makebarcode-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918071" comment="texlive-makebarcode-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918072" comment="texlive-makebase-2021.186.0.0.2svn41012-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918073" comment="texlive-makebase-doc-2021.186.0.0.2svn41012-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918074" comment="texlive-makebox-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918075" comment="texlive-makebox-doc-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918076" comment="texlive-makecell-2021.186.0.0.1esvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918077" comment="texlive-makecell-doc-2021.186.0.0.1esvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918078" comment="texlive-makecirc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918079" comment="texlive-makecirc-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918080" comment="texlive-makecmds-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918081" comment="texlive-makecmds-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918082" comment="texlive-makecookbook-2021.186.0.0.85svn49311-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918083" comment="texlive-makedtx-2021.186.1.2svn46702-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918084" comment="texlive-makedtx-doc-2021.186.1.2svn46702-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918085" comment="texlive-makeglos-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918086" comment="texlive-makeglos-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918087" comment="texlive-makeindex-2021.186.svn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918088" comment="texlive-makeindex-doc-2021.186.svn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918089" comment="texlive-makeplot-2021.186.1.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918090" comment="texlive-makeplot-doc-2021.186.1.0.6svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918091" comment="texlive-maker-2021.186.1.0svn44823-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918092" comment="texlive-maker-doc-2021.186.1.0svn44823-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918093" comment="texlive-makerobust-2021.186.2.0svn52811-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918094" comment="texlive-makerobust-doc-2021.186.2.0svn52811-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918095" comment="texlive-makeshape-2021.186.2.1svn28973-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918096" comment="texlive-makeshape-doc-2021.186.2.1svn28973-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918097" comment="texlive-mandi-2021.186.2.7.5svn49720-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918098" comment="texlive-mandi-doc-2021.186.2.7.5svn49720-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918099" comment="texlive-manfnt-2021.186.svn54684-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918100" comment="texlive-manfnt-doc-2021.186.svn54684-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918101" comment="texlive-manfnt-font-2021.186.svn45777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918102" comment="texlive-manfnt-font-fonts-2021.186.svn45777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918103" comment="texlive-manuscript-2021.186.1.7svn36110-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918104" comment="texlive-manuscript-doc-2021.186.1.7svn36110-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918105" comment="texlive-manyind-2021.186.svn49874-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918106" comment="texlive-manyind-doc-2021.186.svn49874-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918107" comment="texlive-marathi-2021.186.1.6.2svn58760-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918108" comment="texlive-marathi-doc-2021.186.1.6.2svn58760-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918109" comment="texlive-marcellus-2021.186.svn56016-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918110" comment="texlive-marcellus-doc-2021.186.svn56016-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918111" comment="texlive-marcellus-fonts-2021.186.svn56016-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918112" comment="texlive-margbib-2021.186.1.0csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918113" comment="texlive-margbib-doc-2021.186.1.0csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918114" comment="texlive-marginfit-2021.186.1.1svn48281-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918115" comment="texlive-marginfit-doc-2021.186.1.1svn48281-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918116" comment="texlive-marginfix-2021.186.1.2svn55064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918117" comment="texlive-marginfix-doc-2021.186.1.2svn55064-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918118" comment="texlive-marginnote-2021.186.1.4bsvn48383-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918119" comment="texlive-marginnote-doc-2021.186.1.4bsvn48383-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918120" comment="texlive-markdown-2021.186.2.9.0svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918121" comment="texlive-markdown-doc-2021.186.2.9.0svn56414-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918122" comment="texlive-marvosym-2021.186.2.2asvn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918123" comment="texlive-marvosym-doc-2021.186.2.2asvn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918124" comment="texlive-marvosym-fonts-2021.186.2.2asvn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918125" comment="texlive-matapli-2021.186.1.1svn58635-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918126" comment="texlive-matapli-doc-2021.186.1.1svn58635-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918127" comment="texlive-matc3-2021.186.1.0.1svn29845-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918128" comment="texlive-matc3-doc-2021.186.1.0.1svn29845-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918129" comment="texlive-matc3mem-2021.186.1.1svn35773-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918130" comment="texlive-matc3mem-doc-2021.186.1.1svn35773-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918131" comment="texlive-match_parens-2021.186.1.43svn36270-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918132" comment="texlive-match_parens-doc-2021.186.1.43svn36270-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918133" comment="texlive-math-into-latex-4-2021.186.svn44131-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918134" comment="texlive-mathabx-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918135" comment="texlive-mathabx-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918136" comment="texlive-mathabx-type1-2021.186.svn21129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918137" comment="texlive-mathabx-type1-doc-2021.186.svn21129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918138" comment="texlive-mathabx-type1-fonts-2021.186.svn21129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918139" comment="texlive-mathalpha-2021.186.1.13svn52305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918140" comment="texlive-mathalpha-doc-2021.186.1.13svn52305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918141" comment="texlive-mathastext-2021.186.1.3wsvn52840-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918142" comment="texlive-mathastext-doc-2021.186.1.3wsvn52840-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918143" comment="texlive-mathcommand-2021.186.1.03svn53044-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918144" comment="texlive-mathcommand-doc-2021.186.1.03svn53044-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918145" comment="texlive-mathcomp-2021.186.0.0.1fsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918146" comment="texlive-mathcomp-doc-2021.186.0.0.1fsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918147" comment="texlive-mathdesign-2021.186.2.31svn31639-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918148" comment="texlive-mathdesign-doc-2021.186.2.31svn31639-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918149" comment="texlive-mathdesign-fonts-2021.186.2.31svn31639-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918150" comment="texlive-mathdots-2021.186.0.0.9svn34301-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918151" comment="texlive-mathdots-doc-2021.186.0.0.9svn34301-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918152" comment="texlive-mathexam-2021.186.1.00svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918153" comment="texlive-mathexam-doc-2021.186.1.00svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918154" comment="texlive-mathfam256-2021.186.0.0.5svn53519-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918155" comment="texlive-mathfam256-doc-2021.186.0.0.5svn53519-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918156" comment="texlive-mathfixs-2021.186.1.01svn49547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918157" comment="texlive-mathfixs-doc-2021.186.1.01svn49547-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918158" comment="texlive-mathfont-2021.186.1.6svn53035-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918159" comment="texlive-mathfont-doc-2021.186.1.6svn53035-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918160" comment="texlive-mathlig-2021.186.1.0svn54244-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918161" comment="texlive-mathpartir-2021.186.1.3.2svn39864-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918162" comment="texlive-mathpartir-doc-2021.186.1.3.2svn39864-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918163" comment="texlive-mathpazo-2021.186.1.003svn52663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918164" comment="texlive-mathpazo-doc-2021.186.1.003svn52663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918165" comment="texlive-mathpazo-fonts-2021.186.1.003svn52663-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918166" comment="texlive-mathpunctspace-2021.186.1.1svn46754-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918167" comment="texlive-mathpunctspace-doc-2021.186.1.1svn46754-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918168" comment="texlive-maths-symbols-2021.186.3.4svn37763-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918169" comment="texlive-mathspec-2021.186.0.0.2bsvn42773-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918170" comment="texlive-mathspec-doc-2021.186.0.0.2bsvn42773-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918171" comment="texlive-mathspic-2021.186.1.13svn31957-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918172" comment="texlive-mathspic-doc-2021.186.1.13svn31957-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918173" comment="texlive-mathtools-2021.186.1.26svn58725-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918174" comment="texlive-mathtools-doc-2021.186.1.26svn58725-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918175" comment="texlive-matlab-prettifier-2021.186.0.0.3svn34323-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918176" comment="texlive-matlab-prettifier-doc-2021.186.0.0.3svn34323-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918177" comment="texlive-matrix-skeleton-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918178" comment="texlive-matrix-skeleton-doc-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918179" comment="texlive-mattens-2021.186.1.3svn17582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918180" comment="texlive-mattens-doc-2021.186.1.3svn17582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918181" comment="texlive-maybemath-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918182" comment="texlive-maybemath-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918183" comment="texlive-mcaption-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918184" comment="texlive-mcaption-doc-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918185" comment="texlive-mceinleger-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918186" comment="texlive-mceinleger-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918187" comment="texlive-mcexam-2021.186.0.0.4svn46155-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918188" comment="texlive-mcexam-doc-2021.186.0.0.4svn46155-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918189" comment="texlive-mcf2graph-2021.186.4.62svn58756-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918190" comment="texlive-mcf2graph-doc-2021.186.4.62svn58756-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918191" comment="texlive-mcite-2021.186.1.6svn18173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918192" comment="texlive-mcite-doc-2021.186.1.6svn18173-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918193" comment="texlive-mciteplus-2021.186.1.2svn31648-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918194" comment="texlive-mciteplus-doc-2021.186.1.2svn31648-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918195" comment="texlive-mcmthesis-2021.186.6.3.1svn57333-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918196" comment="texlive-mcmthesis-doc-2021.186.6.3.1svn57333-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918197" comment="texlive-mdframed-2021.186.1.9bsvn31075-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918198" comment="texlive-mdframed-doc-2021.186.1.9bsvn31075-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918199" comment="texlive-mdputu-2021.186.1.2svn20298-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918200" comment="texlive-mdputu-doc-2021.186.1.2svn20298-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918201" comment="texlive-mdsymbol-2021.186.0.0.5svn28399-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918202" comment="texlive-mdsymbol-doc-2021.186.0.0.5svn28399-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918203" comment="texlive-mdsymbol-fonts-2021.186.0.0.5svn28399-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918204" comment="texlive-mdwtools-2021.186.1.05.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918205" comment="texlive-mdwtools-doc-2021.186.1.05.4svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918206" comment="texlive-media4svg-2021.186.0.0.5svn57528-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918207" comment="texlive-media4svg-doc-2021.186.0.0.5svn57528-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918208" comment="texlive-media9-2021.186.1.15svn58025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918209" comment="texlive-media9-doc-2021.186.1.15svn58025-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918210" comment="texlive-medstarbeamer-2021.186.svn38828-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918211" comment="texlive-medstarbeamer-doc-2021.186.svn38828-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918212" comment="texlive-meetingmins-2021.186.1.6svn31878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918213" comment="texlive-meetingmins-doc-2021.186.1.6svn31878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918214" comment="texlive-membranecomputing-2021.186.0.0.1svn55918-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918215" comment="texlive-membranecomputing-doc-2021.186.0.0.1svn55918-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918216" comment="texlive-memdesign-2021.186.svn48664-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918217" comment="texlive-memexsupp-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918218" comment="texlive-memexsupp-doc-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918219" comment="texlive-memoir-2021.186.3.7osvn58666-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918220" comment="texlive-memoir-doc-2021.186.3.7osvn58666-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918221" comment="texlive-memory-2021.186.1.2svn30452-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918222" comment="texlive-memory-doc-2021.186.1.2svn30452-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918223" comment="texlive-memorygraphs-2021.186.0.0.1.1svn49631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918224" comment="texlive-memorygraphs-doc-2021.186.0.0.1.1svn49631-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918225" comment="texlive-mendex-doc-2021.186.svn50268-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918226" comment="texlive-mendex-doc-doc-2021.186.svn50268-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918227" comment="texlive-mensa-tex-2021.186.svn45997-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918228" comment="texlive-mensa-tex-doc-2021.186.svn45997-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918229" comment="texlive-mentis-2021.186.1.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918230" comment="texlive-mentis-doc-2021.186.1.5svn15878-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249769" version="1" class="patch">
	<metadata>
		<title>texlive-menu-2021.186.0.0.994svn15878-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-menu-2021.186.0.0.994svn15878-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009918231" comment="texlive-menu-2021.186.0.0.994svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918232" comment="texlive-menu-doc-2021.186.0.0.994svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918233" comment="texlive-menucard-2021.186.0.0.1svn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918234" comment="texlive-menucard-doc-2021.186.0.0.1svn55643-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918235" comment="texlive-menukeys-2021.186.1.6.1svn57172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918236" comment="texlive-menukeys-doc-2021.186.1.6.1svn57172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918237" comment="texlive-mercatormap-2021.186.1.02svn56060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918238" comment="texlive-mercatormap-doc-2021.186.1.02svn56060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918239" comment="texlive-merriweather-2021.186.svn56365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918240" comment="texlive-merriweather-doc-2021.186.svn56365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918241" comment="texlive-merriweather-fonts-2021.186.svn56365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918242" comment="texlive-metafont-2021.186.2.71828182svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918243" comment="texlive-metafont-beginners-2021.186.svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918244" comment="texlive-metafont-doc-2021.186.2.71828182svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918245" comment="texlive-metago-2021.186.0.0.9svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918246" comment="texlive-metago-doc-2021.186.0.0.9svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918247" comment="texlive-metalogo-2021.186.0.0.12svn18611-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918248" comment="texlive-metalogo-doc-2021.186.0.0.12svn18611-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918249" comment="texlive-metalogox-2021.186.1.00svn49774-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918250" comment="texlive-metalogox-doc-2021.186.1.00svn49774-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918251" comment="texlive-metanorma-2021.186.0.0.5.0svn55010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918252" comment="texlive-metanorma-doc-2021.186.0.0.5.0svn55010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918253" comment="texlive-metaobj-2021.186.0.0.93svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918254" comment="texlive-metaobj-doc-2021.186.0.0.93svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918255" comment="texlive-metaplot-2021.186.0.0.91svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918256" comment="texlive-metaplot-doc-2021.186.0.0.91svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918257" comment="texlive-metapost-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918258" comment="texlive-metapost-colorbrewer-2021.186.svn48753-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918259" comment="texlive-metapost-colorbrewer-doc-2021.186.svn48753-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918260" comment="texlive-metapost-doc-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918261" comment="texlive-metapost-examples-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918262" comment="texlive-metapost-fonts-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918263" comment="texlive-metastr-2021.186.1.1.2svn56246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918264" comment="texlive-metastr-doc-2021.186.1.1.2svn56246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918265" comment="texlive-metatex-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918266" comment="texlive-metatex-doc-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918267" comment="texlive-metatype1-2021.186.0.0.56svn37105-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918268" comment="texlive-metauml-2021.186.0.0.2.6svn49923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918269" comment="texlive-metauml-doc-2021.186.0.0.2.6svn49923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918270" comment="texlive-method-2021.186.2.0bsvn17485-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918271" comment="texlive-method-doc-2021.186.2.0bsvn17485-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918272" comment="texlive-metre-2021.186.1.0svn18489-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918273" comment="texlive-metre-doc-2021.186.1.0svn18489-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918274" comment="texlive-metrix-2021.186.1.5svn52323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918275" comment="texlive-metrix-doc-2021.186.1.5svn52323-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918276" comment="texlive-mex-2021.186.1.05asvn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918277" comment="texlive-mex-doc-2021.186.1.05asvn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918278" comment="texlive-mf2pt1-2021.186.2.6svn57018-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918279" comment="texlive-mf2pt1-doc-2021.186.2.6svn57018-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918280" comment="texlive-mfirstuc-2021.186.2.06svn45803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918281" comment="texlive-mfirstuc-doc-2021.186.2.06svn45803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918282" comment="texlive-mflogo-2021.186.2.0svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918283" comment="texlive-mflogo-doc-2021.186.2.0svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918284" comment="texlive-mflogo-font-2021.186.1.002svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918285" comment="texlive-mflogo-font-doc-2021.186.1.002svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918286" comment="texlive-mflogo-font-fonts-2021.186.1.002svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918287" comment="texlive-mflua-2021.186.svn54074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918288" comment="texlive-mfnfss-2021.186.svn46036-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918289" comment="texlive-mfnfss-doc-2021.186.svn46036-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918290" comment="texlive-mfpic-2021.186.1.10svn28444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918291" comment="texlive-mfpic-doc-2021.186.1.10svn28444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918292" comment="texlive-mfpic4ode-2021.186.0.0.4svn17745-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918293" comment="texlive-mfpic4ode-doc-2021.186.0.0.4svn17745-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918294" comment="texlive-mftinc-2021.186.1.0asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918295" comment="texlive-mftinc-doc-2021.186.1.0asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918296" comment="texlive-mfware-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918297" comment="texlive-mfware-doc-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918298" comment="texlive-mgltex-2021.186.4.2svn41676-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918299" comment="texlive-mgltex-doc-2021.186.4.2svn41676-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918300" comment="texlive-mhchem-2021.186.svn52662-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918301" comment="texlive-mhchem-doc-2021.186.svn52662-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918302" comment="texlive-mhequ-2021.186.1.7svn38224-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918303" comment="texlive-mhequ-doc-2021.186.1.7svn38224-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918304" comment="texlive-mi-solns-2021.186.0.0.6svn49651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918305" comment="texlive-mi-solns-doc-2021.186.0.0.6svn49651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918306" comment="texlive-miama-2021.186.1.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918307" comment="texlive-miama-doc-2021.186.1.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918308" comment="texlive-miama-fonts-2021.186.1.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918309" comment="texlive-microtype-2021.186.2.8csvn58394-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918310" comment="texlive-microtype-de-2021.186.2.4svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918311" comment="texlive-microtype-doc-2021.186.2.8csvn58394-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918312" comment="texlive-midnight-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918313" comment="texlive-midnight-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918314" comment="texlive-midpage-2021.186.1.1asvn17484-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918315" comment="texlive-midpage-doc-2021.186.1.1asvn17484-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918316" comment="texlive-miller-2021.186.1.2svn18789-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918317" comment="texlive-miller-doc-2021.186.1.2svn18789-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918318" comment="texlive-milog-2021.186.1.0svn41610-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918319" comment="texlive-milog-doc-2021.186.1.0svn41610-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918320" comment="texlive-milsymb-2021.186.1.02svn54361-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918321" comment="texlive-milsymb-doc-2021.186.1.02svn54361-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918322" comment="texlive-mindflow-2021.186.svn58475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918323" comment="texlive-mindflow-doc-2021.186.svn58475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918324" comment="texlive-minibox-2021.186.0.0.2asvn30914-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918325" comment="texlive-minibox-doc-2021.186.0.0.2asvn30914-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918326" comment="texlive-minidocument-2021.186.1.0svn43752-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918327" comment="texlive-minidocument-doc-2021.186.1.0svn43752-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918328" comment="texlive-minifp-2021.186.0.0.96svn32559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918329" comment="texlive-minifp-doc-2021.186.0.0.96svn32559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918330" comment="texlive-minimalist-2021.186.svn58395-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918331" comment="texlive-minimalist-doc-2021.186.svn58395-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918332" comment="texlive-minipage-marginpar-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918333" comment="texlive-minipage-marginpar-doc-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918334" comment="texlive-miniplot-2021.186.svn17483-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918335" comment="texlive-miniplot-doc-2021.186.svn17483-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918336" comment="texlive-minitoc-2021.186.62svn48196-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918337" comment="texlive-minitoc-doc-2021.186.62svn48196-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918338" comment="texlive-minorrevision-2021.186.1.1svn32165-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918339" comment="texlive-minorrevision-doc-2021.186.1.1svn32165-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918340" comment="texlive-minted-2021.186.2.5svn44855-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918341" comment="texlive-minted-doc-2021.186.2.5svn44855-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918342" comment="texlive-mintspirit-2021.186.svn32069-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918343" comment="texlive-mintspirit-doc-2021.186.svn32069-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918344" comment="texlive-mintspirit-fonts-2021.186.svn32069-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918345" comment="texlive-minutes-2021.186.1.8fsvn42186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918346" comment="texlive-minutes-doc-2021.186.1.8fsvn42186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918347" comment="texlive-mismath-2021.186.1.8svn56949-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918348" comment="texlive-mismath-doc-2021.186.1.8svn56949-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918349" comment="texlive-missaali-2021.186.1.004svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918350" comment="texlive-missaali-doc-2021.186.1.004svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918351" comment="texlive-missaali-fonts-2021.186.1.004svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918352" comment="texlive-mkgrkindex-2021.186.2.0svn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918353" comment="texlive-mkgrkindex-doc-2021.186.2.0svn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918354" comment="texlive-mkjobtexmf-2021.186.0.0.8svn29725-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918355" comment="texlive-mkjobtexmf-doc-2021.186.0.0.8svn29725-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918356" comment="texlive-mkpattern-2021.186.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918357" comment="texlive-mkpattern-doc-2021.186.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918358" comment="texlive-mkpic-2021.186.1.02svn33700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918359" comment="texlive-mkpic-doc-2021.186.1.02svn33700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918360" comment="texlive-mla-paper-2021.186.svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918361" comment="texlive-mla-paper-doc-2021.186.svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918362" comment="texlive-mlacls-2021.186.0.0.9svn56878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918363" comment="texlive-mlacls-doc-2021.186.0.0.9svn56878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918364" comment="texlive-mleftright-2021.186.1.2svn53021-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918365" comment="texlive-mleftright-doc-2021.186.1.2svn53021-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918366" comment="texlive-mlist-2021.186.0.0.6asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918367" comment="texlive-mlist-doc-2021.186.0.0.6asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918368" comment="texlive-mlmodern-2021.186.1.2svn57458-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918369" comment="texlive-mlmodern-doc-2021.186.1.2svn57458-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918370" comment="texlive-mlmodern-fonts-2021.186.1.2svn57458-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918371" comment="texlive-mltex-2021.186.2.2svn57186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918372" comment="texlive-mltex-doc-2021.186.2.2svn57186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918373" comment="texlive-mluexercise-2021.186.2.0svn56927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918374" comment="texlive-mluexercise-doc-2021.186.2.0svn56927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918375" comment="texlive-mmap-2021.186.1.03svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918376" comment="texlive-mmap-doc-2021.186.1.03svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918377" comment="texlive-mnotes-2021.186.0.0.8svn35521-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918378" comment="texlive-mnotes-doc-2021.186.0.0.8svn35521-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918379" comment="texlive-mnras-2021.186.3.1svn55729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918380" comment="texlive-mnras-doc-2021.186.3.1svn55729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918381" comment="texlive-mnsymbol-2021.186.1.4svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918382" comment="texlive-mnsymbol-doc-2021.186.1.4svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918383" comment="texlive-mnsymbol-fonts-2021.186.1.4svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918384" comment="texlive-modeles-factures-belges-assocs-2021.186.1.0.1svn50010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918385" comment="texlive-modeles-factures-belges-assocs-doc-2021.186.1.0.1svn50010-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918386" comment="texlive-moderncv-2021.186.2.1.0svn57496-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918387" comment="texlive-moderncv-doc-2021.186.2.1.0svn57496-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918388" comment="texlive-modernposter-2021.186.1.03.1svn47269-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918389" comment="texlive-modernposter-doc-2021.186.1.03.1svn47269-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918390" comment="texlive-moderntimeline-2021.186.0.0.11svn55518-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918391" comment="texlive-moderntimeline-doc-2021.186.0.0.11svn55518-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918392" comment="texlive-modes-2021.186.4.2svn56303-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918393" comment="texlive-modes-doc-2021.186.4.2svn56303-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918394" comment="texlive-modiagram-2021.186.0.0.3asvn56886-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918395" comment="texlive-modiagram-doc-2021.186.0.0.3asvn56886-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918396" comment="texlive-modref-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918397" comment="texlive-modref-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918398" comment="texlive-modroman-2021.186.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918399" comment="texlive-modroman-doc-2021.186.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918400" comment="texlive-modular-2021.186.svn44142-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918401" comment="texlive-modular-doc-2021.186.svn44142-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918402" comment="texlive-modulus-2021.186.1.0svn47599-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918403" comment="texlive-modulus-doc-2021.186.1.0svn47599-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918404" comment="texlive-mongolian-babel-2021.186.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918405" comment="texlive-mongolian-babel-doc-2021.186.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918406" comment="texlive-monofill-2021.186.0.0.2svn28140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918407" comment="texlive-monofill-doc-2021.186.0.0.2svn28140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918408" comment="texlive-montex-2021.186.ivu.04.092svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918409" comment="texlive-montex-doc-2021.186.ivu.04.092svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918410" comment="texlive-montex-fonts-2021.186.ivu.04.092svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918411" comment="texlive-montserrat-2021.186.1.03svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918412" comment="texlive-montserrat-doc-2021.186.1.03svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918413" comment="texlive-montserrat-fonts-2021.186.1.03svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918414" comment="texlive-moodle-2021.186.0.0.9svn57683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918415" comment="texlive-moodle-doc-2021.186.0.0.9svn57683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918416" comment="texlive-moreenum-2021.186.1.03svn24479-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918417" comment="texlive-moreenum-doc-2021.186.1.03svn24479-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918418" comment="texlive-morefloats-2021.186.1.0hsvn37927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918419" comment="texlive-morefloats-doc-2021.186.1.0hsvn37927-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918420" comment="texlive-morehype-2021.186.r0.83svn38815-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918421" comment="texlive-morehype-doc-2021.186.r0.83svn38815-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918422" comment="texlive-moresize-2021.186.1.9svn17513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918423" comment="texlive-moresize-doc-2021.186.1.9svn17513-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918424" comment="texlive-moreverb-2021.186.2.3asvn22126-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918425" comment="texlive-moreverb-doc-2021.186.2.3asvn22126-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918426" comment="texlive-morewrites-2021.186.svn49531-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918427" comment="texlive-morewrites-doc-2021.186.svn49531-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918428" comment="texlive-morisawa-2021.186.svn46946-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918429" comment="texlive-morisawa-doc-2021.186.svn46946-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918430" comment="texlive-movie15-2021.186.svn26473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918431" comment="texlive-movie15-doc-2021.186.svn26473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918432" comment="texlive-mp3d-2021.186.1.34svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918433" comment="texlive-mp3d-doc-2021.186.1.34svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918434" comment="texlive-mparhack-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918435" comment="texlive-mparhack-doc-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918436" comment="texlive-mparrows-2021.186.0.0.1svn39729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918437" comment="texlive-mparrows-doc-2021.186.0.0.1svn39729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918438" comment="texlive-mpattern-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918439" comment="texlive-mpattern-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918440" comment="texlive-mpcolornames-2021.186.0.0.20svn23252-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918441" comment="texlive-mpcolornames-doc-2021.186.0.0.20svn23252-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918442" comment="texlive-mpfonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918443" comment="texlive-mpfonts-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918444" comment="texlive-mpgraphics-2021.186.0.0.3svn29776-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918445" comment="texlive-mpgraphics-doc-2021.186.0.0.3svn29776-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918446" comment="texlive-mpman-ru-2021.186.1.004svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918447" comment="texlive-mpostinl-2021.186.1.5svn49559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918448" comment="texlive-mpostinl-doc-2021.186.1.5svn49559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918449" comment="texlive-mptopdf-2021.186.svn57347-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918450" comment="texlive-mptopdf-doc-2021.186.svn57347-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918451" comment="texlive-mptrees-2021.186.17.06svn44453-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918452" comment="texlive-mptrees-doc-2021.186.17.06svn44453-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918453" comment="texlive-ms-2021.186.svn57473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918454" comment="texlive-ms-doc-2021.186.svn57473-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918455" comment="texlive-msc-2021.186.1.16svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918456" comment="texlive-msc-doc-2021.186.1.16svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918457" comment="texlive-msg-2021.186.0.0.51svn49578-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918458" comment="texlive-msg-doc-2021.186.0.0.51svn49578-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918459" comment="texlive-mslapa-2021.186.svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918460" comment="texlive-mslapa-doc-2021.186.svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918461" comment="texlive-msu-thesis-2021.186.2.8svn46106-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918462" comment="texlive-msu-thesis-doc-2021.186.2.8svn46106-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918463" comment="texlive-mtgreek-2021.186.1.1+svn17967-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918464" comment="texlive-mtgreek-doc-2021.186.1.1+svn17967-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918465" comment="texlive-mucproc-2021.186.1.02svn43445-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918466" comment="texlive-mucproc-doc-2021.186.1.02svn43445-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918467" comment="texlive-mugsthesis-2021.186.svn34878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918468" comment="texlive-mugsthesis-doc-2021.186.svn34878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918469" comment="texlive-muling-2021.186.0.0.2svn56991-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918470" comment="texlive-muling-doc-2021.186.0.0.2svn56991-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918471" comment="texlive-multenum-2021.186.svn21775-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918472" comment="texlive-multenum-doc-2021.186.svn21775-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918473" comment="texlive-multiaudience-2021.186.1.03svn38035-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918474" comment="texlive-multiaudience-doc-2021.186.1.03svn38035-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918475" comment="texlive-multibbl-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918476" comment="texlive-multibbl-doc-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918477" comment="texlive-multibib-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918478" comment="texlive-multibib-doc-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918479" comment="texlive-multibibliography-2021.186.1.03svn30939-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918480" comment="texlive-multibibliography-doc-2021.186.1.03svn30939-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918481" comment="texlive-multicap-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918482" comment="texlive-multicap-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918483" comment="texlive-multicolrule-2021.186.1.3asvn56366-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918484" comment="texlive-multicolrule-doc-2021.186.1.3asvn56366-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918485" comment="texlive-multidef-2021.186.1.10svn40637-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918486" comment="texlive-multidef-doc-2021.186.1.10svn40637-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918487" comment="texlive-multido-2021.186.1.42svn18302-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918488" comment="texlive-multido-doc-2021.186.1.42svn18302-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918489" comment="texlive-multienv-2021.186.1.0svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918490" comment="texlive-multienv-doc-2021.186.1.0svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918491" comment="texlive-multiexpand-2021.186.1.5svn45943-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918492" comment="texlive-multiexpand-doc-2021.186.1.5svn45943-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918493" comment="texlive-multilang-2021.186.0.0.9bsvn49065-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918494" comment="texlive-multilang-doc-2021.186.0.0.9bsvn49065-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918495" comment="texlive-multiobjective-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918496" comment="texlive-multiobjective-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918497" comment="texlive-multirow-2021.186.2.8svn58396-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918498" comment="texlive-multirow-doc-2021.186.2.8svn58396-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918499" comment="texlive-munich-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918500" comment="texlive-munich-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918501" comment="texlive-musical-2021.186.3.1svn54758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918502" comment="texlive-musical-doc-2021.186.3.1svn54758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918503" comment="texlive-musicography-2021.186.svn53596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918504" comment="texlive-musicography-doc-2021.186.svn53596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918505" comment="texlive-musikui-2021.186.1svn47472-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918506" comment="texlive-musikui-doc-2021.186.1svn47472-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918507" comment="texlive-musixguit-2021.186.1.2.2svn21649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918508" comment="texlive-musixguit-doc-2021.186.1.2.2svn21649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918509" comment="texlive-musixtex-2021.186.1.31svn57353-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918510" comment="texlive-musixtex-doc-2021.186.1.31svn57353-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918511" comment="texlive-musixtex-fonts-2021.186.svn37762-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918512" comment="texlive-musixtex-fonts-doc-2021.186.svn37762-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918513" comment="texlive-musixtex-fonts-fonts-2021.186.svn37762-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918514" comment="texlive-musixtnt-2021.186.svn40307-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918515" comment="texlive-musixtnt-doc-2021.186.svn40307-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918516" comment="texlive-musuos-2021.186.1.1dsvn24857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918517" comment="texlive-musuos-doc-2021.186.1.1dsvn24857-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918518" comment="texlive-muthesis-2021.186.svn23861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918519" comment="texlive-muthesis-doc-2021.186.svn23861-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918520" comment="texlive-mversion-2021.186.1.0.1svn29370-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918521" comment="texlive-mversion-doc-2021.186.1.0.1svn29370-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918522" comment="texlive-mwcls-2021.186.0.0.75svn44352-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918523" comment="texlive-mwcls-doc-2021.186.0.0.75svn44352-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918524" comment="texlive-mwe-2021.186.0.0.5svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918525" comment="texlive-mwe-doc-2021.186.0.0.5svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918526" comment="texlive-mweights-2021.186.svn53520-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918527" comment="texlive-mweights-doc-2021.186.svn53520-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918528" comment="texlive-mxedruli-2021.186.3.3csvn30021-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918529" comment="texlive-mxedruli-doc-2021.186.3.3csvn30021-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918530" comment="texlive-mxedruli-fonts-2021.186.3.3csvn30021-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918531" comment="texlive-mycv-2021.186.1.5.6svn26807-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918532" comment="texlive-mycv-doc-2021.186.1.5.6svn26807-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918533" comment="texlive-mylatex-2021.186.svn56751-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918534" comment="texlive-mylatex-doc-2021.186.svn56751-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918535" comment="texlive-mylatexformat-2021.186.3.4svn21392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918536" comment="texlive-mylatexformat-doc-2021.186.3.4svn21392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918537" comment="texlive-mynsfc-2021.186.1.01svn41996-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918538" comment="texlive-mynsfc-doc-2021.186.1.01svn41996-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249770" version="1" class="patch">
	<metadata>
		<title>texlive-na-box-2021.186.1.0svn45130-47.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-na-box-2021.186.1.0svn45130-47.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009918539" comment="texlive-na-box-2021.186.1.0svn45130-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918540" comment="texlive-na-box-doc-2021.186.1.0svn45130-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918541" comment="texlive-na-position-2021.186.1.2svn55559-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918542" comment="texlive-na-position-doc-2021.186.1.2svn55559-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918543" comment="texlive-nag-2021.186.0.0.7svn24741-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918544" comment="texlive-nag-doc-2021.186.0.0.7svn24741-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918545" comment="texlive-nameauth-2021.186.3.6svn58026-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918546" comment="texlive-nameauth-doc-2021.186.3.6svn58026-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918547" comment="texlive-namedef-2021.186.1.0svn55881-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918548" comment="texlive-namedef-doc-2021.186.1.0svn55881-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918549" comment="texlive-namespc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918550" comment="texlive-namespc-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918551" comment="texlive-nanicolle-2021.186.2.03ysvn56224-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918552" comment="texlive-nanicolle-doc-2021.186.2.03ysvn56224-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918553" comment="texlive-nanumtype1-2021.186.3.0svn29558-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918554" comment="texlive-nanumtype1-doc-2021.186.3.0svn29558-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918555" comment="texlive-nanumtype1-fonts-2021.186.3.0svn29558-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918556" comment="texlive-nar-2021.186.3.19svn38100-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918557" comment="texlive-natbib-2021.186.8.31bsvn20668-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918558" comment="texlive-natbib-doc-2021.186.8.31bsvn20668-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918559" comment="texlive-natded-2021.186.0.0.1svn32693-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918560" comment="texlive-natded-doc-2021.186.0.0.1svn32693-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918561" comment="texlive-nath-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918562" comment="texlive-nath-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918563" comment="texlive-nature-2021.186.1.0svn21819-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918564" comment="texlive-nature-doc-2021.186.1.0svn21819-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918565" comment="texlive-navigator-2021.186.1.1svn41413-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918566" comment="texlive-navigator-doc-2021.186.1.1svn41413-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918567" comment="texlive-navydocs-2021.186.1.1svn41643-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918568" comment="texlive-navydocs-doc-2021.186.1.1svn41643-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918569" comment="texlive-ncclatex-2021.186.1.5svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918570" comment="texlive-ncclatex-doc-2021.186.1.5svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918571" comment="texlive-ncctools-2021.186.3.5.3svn51810-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918572" comment="texlive-ncctools-doc-2021.186.3.5.3svn51810-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918573" comment="texlive-ncntrsbk-2021.186.svn31835-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918574" comment="texlive-ncntrsbk-fonts-2021.186.svn31835-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918575" comment="texlive-nddiss-2021.186.3.2017.2svn45107-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918576" comment="texlive-nddiss-doc-2021.186.3.2017.2svn45107-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918577" comment="texlive-ndsu-thesis-2021.186.svn46639-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918578" comment="texlive-ndsu-thesis-doc-2021.186.svn46639-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918579" comment="texlive-needspace-2021.186.1.3dsvn29601-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918580" comment="texlive-needspace-doc-2021.186.1.3dsvn29601-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918581" comment="texlive-nestquot-2021.186.svn27323-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918582" comment="texlive-neuralnetwork-2021.186.1.0svn31500-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918583" comment="texlive-neuralnetwork-doc-2021.186.1.0svn31500-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918584" comment="texlive-nevelok-2021.186.1.03svn39029-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918585" comment="texlive-nevelok-doc-2021.186.1.03svn39029-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918586" comment="texlive-newcommand-2021.186.2.0svn18704-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918587" comment="texlive-newcomputermodern-2021.186.3.02svn57801-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918588" comment="texlive-newcomputermodern-doc-2021.186.3.02svn57801-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918589" comment="texlive-newcomputermodern-fonts-2021.186.3.02svn57801-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918590" comment="texlive-newenviron-2021.186.1.0svn29331-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918591" comment="texlive-newenviron-doc-2021.186.1.0svn29331-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918592" comment="texlive-newfile-2021.186.1.0csvn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918593" comment="texlive-newfile-doc-2021.186.1.0csvn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918594" comment="texlive-newfloat-2021.186.1.1lsvn52906-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918595" comment="texlive-newfloat-doc-2021.186.1.1lsvn52906-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918596" comment="texlive-newlfm-2021.186.9.4svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918597" comment="texlive-newlfm-doc-2021.186.9.4svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918598" comment="texlive-newpax-2021.186.0.0.51svn58212-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918599" comment="texlive-newpax-doc-2021.186.0.0.51svn58212-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918600" comment="texlive-newpx-2021.186.1.414svn56845-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918601" comment="texlive-newpx-doc-2021.186.1.414svn56845-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918602" comment="texlive-newpx-fonts-2021.186.1.414svn56845-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918603" comment="texlive-newsletr-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918604" comment="texlive-newsletr-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918605" comment="texlive-newspaper-2021.186.1.0svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918606" comment="texlive-newspaper-doc-2021.186.1.0svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918607" comment="texlive-newtx-2021.186.1.642svn58748-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918608" comment="texlive-newtx-doc-2021.186.1.642svn58748-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918609" comment="texlive-newtx-fonts-2021.186.1.642svn58748-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918610" comment="texlive-newtxsf-2021.186.1.053svn56527-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918611" comment="texlive-newtxsf-doc-2021.186.1.053svn56527-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918612" comment="texlive-newtxsf-fonts-2021.186.1.053svn56527-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918613" comment="texlive-newtxtt-2021.186.1.056svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918614" comment="texlive-newtxtt-doc-2021.186.1.056svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918615" comment="texlive-newtxtt-fonts-2021.186.1.056svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918616" comment="texlive-newunicodechar-2021.186.1.2svn47382-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918617" comment="texlive-newunicodechar-doc-2021.186.1.2svn47382-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918618" comment="texlive-newvbtm-2021.186.1.1svn23996-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918619" comment="texlive-newvbtm-doc-2021.186.1.1svn23996-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918620" comment="texlive-newverbs-2021.186.1.6svn58256-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918621" comment="texlive-newverbs-doc-2021.186.1.6svn58256-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918622" comment="texlive-nextpage-2021.186.1.1asvn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918623" comment="texlive-nfssext-cfr-2021.186.svn43640-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918624" comment="texlive-nfssext-cfr-doc-2021.186.svn43640-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918625" comment="texlive-nicefilelist-2021.186.0.0.7asvn28527-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918626" comment="texlive-nicefilelist-doc-2021.186.0.0.7asvn28527-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918627" comment="texlive-niceframe-2021.186.1.1csvn36086-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918628" comment="texlive-niceframe-doc-2021.186.1.1csvn36086-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918629" comment="texlive-niceframe-type1-2021.186.svn44671-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918630" comment="texlive-niceframe-type1-doc-2021.186.svn44671-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918631" comment="texlive-niceframe-type1-fonts-2021.186.svn44671-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918632" comment="texlive-nicematrix-2021.186.5.13svn58667-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918633" comment="texlive-nicematrix-doc-2021.186.5.13svn58667-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918634" comment="texlive-nicetext-2021.186.r0.67svn38914-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918635" comment="texlive-nicetext-doc-2021.186.r0.67svn38914-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918636" comment="texlive-nidanfloat-2021.186.svn48295-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918637" comment="texlive-nidanfloat-doc-2021.186.svn48295-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918638" comment="texlive-nih-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918639" comment="texlive-nih-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918640" comment="texlive-nihbiosketch-2021.186.svn54191-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918641" comment="texlive-nihbiosketch-doc-2021.186.svn54191-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918642" comment="texlive-nimbus15-2021.186.1.013svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918643" comment="texlive-nimbus15-doc-2021.186.1.013svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918644" comment="texlive-nimbus15-fonts-2021.186.1.013svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918645" comment="texlive-nimsticks-2021.186.1.1svn55877-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918646" comment="texlive-nimsticks-doc-2021.186.1.1svn55877-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918647" comment="texlive-njurepo-2021.186.1.1.2svn50492-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918648" comment="texlive-njurepo-doc-2021.186.1.1.2svn50492-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918649" comment="texlive-nkarta-2021.186.0.0.2svn16437-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918650" comment="texlive-nkarta-doc-2021.186.0.0.2svn16437-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918651" comment="texlive-nl-interval-2021.186.1.0svn58328-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918652" comment="texlive-nl-interval-doc-2021.186.1.0svn58328-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918653" comment="texlive-nlctdoc-2021.186.1.07svn53768-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918654" comment="texlive-nlctdoc-doc-2021.186.1.07svn53768-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918655" comment="texlive-nmbib-2021.186.1.04svn37984-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918656" comment="texlive-nmbib-doc-2021.186.1.04svn37984-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918657" comment="texlive-nnext-2021.186.0.0.0svn56575-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918658" comment="texlive-nnext-doc-2021.186.0.0.0svn56575-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918659" comment="texlive-noconflict-2021.186.1.0svn30140-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918660" comment="texlive-noconflict-doc-2021.186.1.0svn30140-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918661" comment="texlive-nodetree-2021.186.2.2svn56742-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918662" comment="texlive-nodetree-doc-2021.186.2.2svn56742-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918663" comment="texlive-noindentafter-2021.186.0.0.2.2svn35709-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918664" comment="texlive-noindentafter-doc-2021.186.0.0.2.2svn35709-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918665" comment="texlive-noitcrul-2021.186.0.0.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918666" comment="texlive-noitcrul-doc-2021.186.0.0.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918667" comment="texlive-nolbreaks-2021.186.1.2svn26786-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918668" comment="texlive-nolbreaks-doc-2021.186.1.2svn26786-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918669" comment="texlive-nomencl-2021.186.5.5svn57263-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918670" comment="texlive-nomencl-doc-2021.186.5.5svn57263-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918671" comment="texlive-nomentbl-2021.186.0.0.4svn16549-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918672" comment="texlive-nomentbl-doc-2021.186.0.0.4svn16549-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918673" comment="texlive-nonfloat-2021.186.1.0svn17598-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918674" comment="texlive-nonfloat-doc-2021.186.1.0svn17598-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918675" comment="texlive-nonumonpart-2021.186.1svn22114-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918676" comment="texlive-nonumonpart-doc-2021.186.1svn22114-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918677" comment="texlive-nopageno-2021.186.svn18128-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918678" comment="texlive-nopageno-doc-2021.186.svn18128-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918679" comment="texlive-norasi-c90-2021.186.svn37675-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918680" comment="texlive-normalcolor-2021.186.r11svn40125-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918681" comment="texlive-normalcolor-doc-2021.186.r11svn40125-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918682" comment="texlive-nostarch-2021.186.1.3svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918683" comment="texlive-nostarch-doc-2021.186.1.3svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918684" comment="texlive-notes-2021.186.1.0.1svn42428-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918685" comment="texlive-notes-doc-2021.186.1.0.1svn42428-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918686" comment="texlive-notes2bib-2021.186.2.0msvn52231-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918687" comment="texlive-notes2bib-doc-2021.186.2.0msvn52231-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918688" comment="texlive-notespages-2021.186.0.0.8.1svn41906-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918689" comment="texlive-notespages-doc-2021.186.0.0.8.1svn41906-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918690" comment="texlive-notestex-2021.186.1.0svn45396-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918691" comment="texlive-notestex-doc-2021.186.1.0svn45396-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918692" comment="texlive-notex-bst-2021.186.svn42361-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918693" comment="texlive-noto-2021.186.svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918694" comment="texlive-noto-doc-2021.186.svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918695" comment="texlive-noto-emoji-2021.186.20191119_unicode12svn53968-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918696" comment="texlive-noto-emoji-doc-2021.186.20191119_unicode12svn53968-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918697" comment="texlive-noto-emoji-fonts-2021.186.20191119_unicode12svn53968-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918698" comment="texlive-noto-fonts-2021.186.svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918699" comment="texlive-notoccite-2021.186.svn18129-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918700" comment="texlive-notoccite-doc-2021.186.svn18129-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918701" comment="texlive-notomath-2021.186.1.02svn58726-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918702" comment="texlive-notomath-doc-2021.186.1.02svn58726-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918703" comment="texlive-notomath-fonts-2021.186.1.02svn58726-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918704" comment="texlive-novel-2021.186.1.52svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918705" comment="texlive-novel-doc-2021.186.1.52svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918706" comment="texlive-novel-fonts-2021.186.1.52svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918707" comment="texlive-nowidow-2021.186.1.0svn24066-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918708" comment="texlive-nowidow-doc-2021.186.1.0svn24066-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918709" comment="texlive-nox-2021.186.1.0svn30991-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918710" comment="texlive-nox-doc-2021.186.1.0svn30991-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918711" comment="texlive-npp-for-context-2021.186.0.0.98svn51389-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918712" comment="texlive-nrc-2021.186.2.01asvn29027-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918713" comment="texlive-nrc-doc-2021.186.2.01asvn29027-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918714" comment="texlive-ntgclass-2021.186.2.1esvn56959-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918715" comment="texlive-ntgclass-doc-2021.186.2.1esvn56959-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918716" comment="texlive-nth-2021.186.svn54252-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918717" comment="texlive-ntheorem-2021.186.1.33svn27609-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918718" comment="texlive-ntheorem-doc-2021.186.1.33svn27609-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918719" comment="texlive-ntheorem-vn-2021.186.1.203svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918720" comment="texlive-nuc-2021.186.0.0.1svn22256-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918721" comment="texlive-nuc-doc-2021.186.0.0.1svn22256-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918722" comment="texlive-nucleardata-2021.186.1.1svn47307-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918723" comment="texlive-nucleardata-doc-2021.186.1.1svn47307-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918724" comment="texlive-numberedblock-2021.186.1.10svn33109-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918725" comment="texlive-numberedblock-doc-2021.186.1.10svn33109-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918726" comment="texlive-numberpt-2021.186.1.0svn51640-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918727" comment="texlive-numberpt-doc-2021.186.1.0svn51640-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918728" comment="texlive-numerica-2021.186.1.0.0svn57759-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918729" comment="texlive-numerica-doc-2021.186.1.0.0svn57759-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918730" comment="texlive-numericplots-2021.186.2.0.2svn31729-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918731" comment="texlive-numericplots-doc-2021.186.2.0.2svn31729-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918732" comment="texlive-numname-2021.186.svn18130-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918733" comment="texlive-numname-doc-2021.186.svn18130-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918734" comment="texlive-numnameru-2021.186.svn44895-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918735" comment="texlive-numnameru-doc-2021.186.svn44895-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918736" comment="texlive-numprint-2021.186.1.39svn27498-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918737" comment="texlive-numprint-doc-2021.186.1.39svn27498-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918738" comment="texlive-numspell-2021.186.1.4svn56912-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918739" comment="texlive-numspell-doc-2021.186.1.4svn56912-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918740" comment="texlive-nunito-2021.186.0.0.0.1svn57429-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918741" comment="texlive-nunito-doc-2021.186.0.0.0.1svn57429-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918742" comment="texlive-nunito-fonts-2021.186.0.0.0.1svn57429-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918743" comment="texlive-nwejm-2021.186.1.0.1svn54392-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918744" comment="texlive-nwejm-doc-2021.186.1.0.1svn54392-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918745" comment="texlive-oberdiek-2021.186.svn56291-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918746" comment="texlive-oberdiek-doc-2021.186.svn56291-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918747" comment="texlive-objectz-2021.186.svn19389-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918748" comment="texlive-objectz-doc-2021.186.svn19389-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918749" comment="texlive-obnov-2021.186.0.0.11svn33355-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918750" comment="texlive-obnov-doc-2021.186.0.0.11svn33355-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918751" comment="texlive-ocg-p-2021.186.0.0.4svn28803-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918752" comment="texlive-ocg-p-doc-2021.186.0.0.4svn28803-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918753" comment="texlive-ocgx-2021.186.0.0.5svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918754" comment="texlive-ocgx-doc-2021.186.0.0.5svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918755" comment="texlive-ocgx2-2021.186.0.0.50svn57531-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918756" comment="texlive-ocgx2-doc-2021.186.0.0.50svn57531-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918757" comment="texlive-ocherokee-2021.186.svn25689-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918758" comment="texlive-ocherokee-doc-2021.186.svn25689-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918759" comment="texlive-ocherokee-fonts-2021.186.svn25689-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918760" comment="texlive-ocr-b-2021.186.svn20852-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918761" comment="texlive-ocr-b-doc-2021.186.svn20852-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918762" comment="texlive-ocr-b-outline-2021.186.svn20969-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918763" comment="texlive-ocr-b-outline-doc-2021.186.svn20969-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918764" comment="texlive-ocr-b-outline-fonts-2021.186.svn20969-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918765" comment="texlive-ocr-latex-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918766" comment="texlive-ocr-latex-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918767" comment="texlive-octave-2021.186.svn45674-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918768" comment="texlive-octave-doc-2021.186.svn45674-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918769" comment="texlive-octavo-2021.186.1.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918770" comment="texlive-octavo-doc-2021.186.1.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918771" comment="texlive-odsfile-2021.186.0.0.6svn38449-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918772" comment="texlive-odsfile-doc-2021.186.0.0.6svn38449-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918773" comment="texlive-ofs-2021.186.svn16991-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918774" comment="texlive-ofs-doc-2021.186.svn16991-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918775" comment="texlive-ogham-2021.186.svn24876-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918776" comment="texlive-ogham-doc-2021.186.svn24876-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918777" comment="texlive-oinuit-2021.186.svn28668-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918778" comment="texlive-oinuit-doc-2021.186.svn28668-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918779" comment="texlive-oinuit-fonts-2021.186.svn28668-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918780" comment="texlive-old-arrows-2021.186.2.0svn42872-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918781" comment="texlive-old-arrows-doc-2021.186.2.0svn42872-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918782" comment="texlive-old-arrows-fonts-2021.186.2.0svn42872-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918783" comment="texlive-oldlatin-2021.186.1.00svn17932-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918784" comment="texlive-oldlatin-doc-2021.186.1.00svn17932-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918785" comment="texlive-oldstandard-2021.186.2.6svn57213-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918786" comment="texlive-oldstandard-doc-2021.186.2.6svn57213-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918787" comment="texlive-oldstandard-fonts-2021.186.2.6svn57213-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918788" comment="texlive-oldstyle-2021.186.0.0.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918789" comment="texlive-oldstyle-doc-2021.186.0.0.2svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918790" comment="texlive-olsak-misc-2021.186.may_2019svn54080-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918791" comment="texlive-olsak-misc-doc-2021.186.may_2019svn54080-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918792" comment="texlive-omega-2021.186.svn33046-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918793" comment="texlive-omega-doc-2021.186.svn33046-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918794" comment="texlive-omega-fonts-2021.186.svn33046-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918795" comment="texlive-omegaware-2021.186.svn57972-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918796" comment="texlive-onedown-2021.186.1.4svn52525-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918797" comment="texlive-onedown-doc-2021.186.1.4svn52525-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918798" comment="texlive-onlyamsmath-2021.186.0.0.20svn42927-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918799" comment="texlive-onlyamsmath-doc-2021.186.0.0.20svn42927-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918800" comment="texlive-onrannual-2021.186.1.1svn17474-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918801" comment="texlive-onrannual-doc-2021.186.1.1svn17474-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918802" comment="texlive-opcit-2021.186.1.1svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918803" comment="texlive-opcit-doc-2021.186.1.1svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918804" comment="texlive-opensans-2021.186.2.2svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918805" comment="texlive-opensans-doc-2021.186.2.2svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918806" comment="texlive-opensans-fonts-2021.186.2.2svn54512-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918807" comment="texlive-oplotsymbl-2021.186.1.4svn44951-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918808" comment="texlive-oplotsymbl-doc-2021.186.1.4svn44951-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918809" comment="texlive-opteng-2021.186.1.0svn27331-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918810" comment="texlive-opteng-doc-2021.186.1.0svn27331-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918811" comment="texlive-optex-2021.186.1.01svn58515-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918812" comment="texlive-optex-doc-2021.186.1.01svn58515-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918813" comment="texlive-optidef-2021.186.3.1svn50941-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918814" comment="texlive-optidef-doc-2021.186.3.1svn50941-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918815" comment="texlive-optional-2021.186.2.2bsvn18131-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918816" comment="texlive-optional-doc-2021.186.2.2bsvn18131-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918817" comment="texlive-options-2021.186.1.0svn39030-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918818" comment="texlive-options-doc-2021.186.1.0svn39030-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918819" comment="texlive-orcidlink-2021.186.1.0.3svn58432-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918820" comment="texlive-orcidlink-doc-2021.186.1.0.3svn58432-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918821" comment="texlive-ordinalpt-2021.186.2.1svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918822" comment="texlive-ordinalpt-doc-2021.186.2.1svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918823" comment="texlive-orientation-2021.186.1.0svn57390-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918824" comment="texlive-orientation-doc-2021.186.1.0svn57390-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918825" comment="texlive-orkhun-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918826" comment="texlive-orkhun-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918827" comment="texlive-oscola-2021.186.1.7svn54328-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918828" comment="texlive-oscola-doc-2021.186.1.7svn54328-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918829" comment="texlive-oswald-2021.186.svn57253-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918830" comment="texlive-oswald-doc-2021.186.svn57253-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918831" comment="texlive-oswald-fonts-2021.186.svn57253-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918832" comment="texlive-ot-tableau-2021.186.svn44889-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918833" comment="texlive-ot-tableau-doc-2021.186.svn44889-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918834" comment="texlive-othello-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918835" comment="texlive-othello-doc-2021.186.svn15878-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918836" comment="texlive-othelloboard-2021.186.1.2svn23714-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918837" comment="texlive-othelloboard-doc-2021.186.1.2svn23714-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918838" comment="texlive-otibet-2021.186.svn45777-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918839" comment="texlive-otibet-doc-2021.186.svn45777-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918840" comment="texlive-oubraces-2021.186.svn21833-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918841" comment="texlive-oubraces-doc-2021.186.svn21833-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918842" comment="texlive-oup-authoring-template-2021.186.1.0svn58661-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918843" comment="texlive-oup-authoring-template-doc-2021.186.1.0svn58661-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918844" comment="texlive-outerhbox-2021.186.1.2svn54254-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918845" comment="texlive-outline-2021.186.svn18360-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918846" comment="texlive-outline-doc-2021.186.svn18360-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918847" comment="texlive-outliner-2021.186.0.0.94svn21095-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918848" comment="texlive-outliner-doc-2021.186.0.0.94svn21095-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918849" comment="texlive-outlines-2021.186.1.1svn25192-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918850" comment="texlive-outlines-doc-2021.186.1.1svn25192-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918851" comment="texlive-outlining-2021.186.0.0.1svn45601-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918852" comment="texlive-outlining-doc-2021.186.0.0.1svn45601-47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249771" version="1" class="patch">
	<metadata>
		<title>texlive-overlays-2021.186.2.12svn57866-44.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-overlays-2021.186.2.12svn57866-44.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009918853" comment="texlive-overlays-2021.186.2.12svn57866-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918854" comment="texlive-overlays-doc-2021.186.2.12svn57866-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918855" comment="texlive-overlock-2021.186.svn56079-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918856" comment="texlive-overlock-doc-2021.186.svn56079-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918857" comment="texlive-overlock-fonts-2021.186.svn56079-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918858" comment="texlive-overpic-2021.186.1.3svn53889-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918859" comment="texlive-overpic-doc-2021.186.1.3svn53889-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918860" comment="texlive-pacioli-2021.186.svn24947-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918861" comment="texlive-pacioli-doc-2021.186.svn24947-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918862" comment="texlive-padauk-2021.186.3.002svn42617-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918863" comment="texlive-padauk-doc-2021.186.3.002svn42617-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918864" comment="texlive-padauk-fonts-2021.186.3.002svn42617-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918865" comment="texlive-padcount-2021.186.1.0svn47621-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918866" comment="texlive-padcount-doc-2021.186.1.0svn47621-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918867" comment="texlive-pagecolor-2021.186.1.0isvn44487-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918868" comment="texlive-pagecolor-doc-2021.186.1.0isvn44487-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918869" comment="texlive-pagecont-2021.186.1.0svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918870" comment="texlive-pagecont-doc-2021.186.1.0svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918871" comment="texlive-pagenote-2021.186.1.1asvn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918872" comment="texlive-pagenote-doc-2021.186.1.1asvn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918873" comment="texlive-pagerange-2021.186.0.0.5svn16915-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918874" comment="texlive-pagerange-doc-2021.186.0.0.5svn16915-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918875" comment="texlive-pagesel-2021.186.1.10svn56105-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918876" comment="texlive-pagesel-doc-2021.186.1.10svn56105-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918877" comment="texlive-pageslts-2021.186.1.2fsvn39164-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918878" comment="texlive-pageslts-doc-2021.186.1.2fsvn39164-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918879" comment="texlive-palatino-2021.186.svn31835-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918880" comment="texlive-palatino-fonts-2021.186.svn31835-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918881" comment="texlive-paper-2021.186.1.0lsvn34521-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918882" comment="texlive-paper-doc-2021.186.1.0lsvn34521-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918883" comment="texlive-papercdcase-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918884" comment="texlive-papercdcase-doc-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918885" comment="texlive-papermas-2021.186.1.0hsvn23667-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918886" comment="texlive-papermas-doc-2021.186.1.0hsvn23667-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918887" comment="texlive-papertex-2021.186.1.2bsvn19230-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918888" comment="texlive-papertex-doc-2021.186.1.2bsvn19230-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918889" comment="texlive-paracol-2021.186.1.35svn49560-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918890" comment="texlive-paracol-doc-2021.186.1.35svn49560-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918891" comment="texlive-parades-2021.186.svn40042-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918892" comment="texlive-parades-doc-2021.186.svn40042-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918893" comment="texlive-paralist-2021.186.2.7svn43021-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918894" comment="texlive-paralist-doc-2021.186.2.7svn43021-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918895" comment="texlive-parallel-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918896" comment="texlive-parallel-doc-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918897" comment="texlive-paratype-2021.186.svn32859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918898" comment="texlive-paratype-doc-2021.186.svn32859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918899" comment="texlive-paratype-fonts-2021.186.svn32859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918900" comment="texlive-paresse-2021.186.5.0.1svn56621-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918901" comment="texlive-paresse-doc-2021.186.5.0.1svn56621-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918902" comment="texlive-parnotes-2021.186.3bsvn51720-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918903" comment="texlive-parnotes-doc-2021.186.3bsvn51720-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918904" comment="texlive-parrun-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918905" comment="texlive-parrun-doc-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918906" comment="texlive-parsa-2021.186.1.3svn54840-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918907" comment="texlive-parsa-doc-2021.186.1.3svn54840-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918908" comment="texlive-parselines-2021.186.1.4svn21475-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918909" comment="texlive-parselines-doc-2021.186.1.4svn21475-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918910" comment="texlive-parskip-2021.186.2.0hsvn58358-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918911" comment="texlive-parskip-doc-2021.186.2.0hsvn58358-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918912" comment="texlive-pas-cours-2021.186.1.9svn55859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918913" comment="texlive-pas-cours-doc-2021.186.1.9svn55859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918914" comment="texlive-pas-crosswords-2021.186.1.03svn32313-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918915" comment="texlive-pas-crosswords-doc-2021.186.1.03svn32313-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918916" comment="texlive-pas-cv-2021.186.2.01svn32263-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918917" comment="texlive-pas-cv-doc-2021.186.2.01svn32263-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918918" comment="texlive-pas-tableur-2021.186.2.01svn39542-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918919" comment="texlive-pas-tableur-doc-2021.186.2.01svn39542-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918920" comment="texlive-passivetex-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918921" comment="texlive-patch-2021.186.svn42428-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918922" comment="texlive-patchcmd-2021.186.1.05svn41379-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918923" comment="texlive-patchcmd-doc-2021.186.1.05svn41379-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918924" comment="texlive-patgen-2021.186.2.4svn57972-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918925" comment="texlive-patgen2-tutorial-2021.186.svn16490-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918926" comment="texlive-path-2021.186.3.05svn22045-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918927" comment="texlive-path-doc-2021.186.3.05svn22045-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918928" comment="texlive-pauldoc-2021.186.0.0.5svn16005-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918929" comment="texlive-pauldoc-doc-2021.186.0.0.5svn16005-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918930" comment="texlive-pawpict-2021.186.1.0svn21629-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918931" comment="texlive-pawpict-doc-2021.186.1.0svn21629-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918932" comment="texlive-pax-2021.186.0.0.1lsvn54512-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918933" comment="texlive-pax-doc-2021.186.0.0.1lsvn54512-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918934" comment="texlive-pb-diagram-2021.186.5.0svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918935" comment="texlive-pb-diagram-doc-2021.186.5.0svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918936" comment="texlive-pbalance-2021.186.1.0.1svn57161-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918937" comment="texlive-pbalance-doc-2021.186.1.0.1svn57161-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918938" comment="texlive-pbibtex-base-2021.186.svn40986-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918939" comment="texlive-pbibtex-base-doc-2021.186.svn40986-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918940" comment="texlive-pbox-2021.186.1.2svn24807-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918941" comment="texlive-pbox-doc-2021.186.1.2svn24807-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918942" comment="texlive-pbsheet-2021.186.0.0.1svn24830-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918943" comment="texlive-pbsheet-doc-2021.186.0.0.1svn24830-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918944" comment="texlive-pdf-trans-2021.186.2.4svn32809-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918945" comment="texlive-pdf-trans-doc-2021.186.2.4svn32809-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918946" comment="texlive-pdf14-2021.186.0.0.1svn17583-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918947" comment="texlive-pdf14-doc-2021.186.0.0.1svn17583-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918948" comment="texlive-pdfarticle-2021.186.1.0svn51127-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918949" comment="texlive-pdfarticle-doc-2021.186.1.0svn51127-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918950" comment="texlive-pdfbook2-2021.186.1.4svn53521-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918951" comment="texlive-pdfbook2-doc-2021.186.1.4svn53521-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918952" comment="texlive-pdfcolmk-2021.186.2.0svn52912-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918953" comment="texlive-pdfcolmk-doc-2021.186.2.0svn52912-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918954" comment="texlive-pdfcomment-2021.186.2.4asvn49047-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918955" comment="texlive-pdfcomment-doc-2021.186.2.4asvn49047-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918956" comment="texlive-pdfcprot-2021.186.1.7asvn18735-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918957" comment="texlive-pdfcprot-doc-2021.186.1.7asvn18735-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918958" comment="texlive-pdfcrop-2021.186.1.40svn55435-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918959" comment="texlive-pdfcrop-doc-2021.186.1.40svn55435-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918960" comment="texlive-pdfescape-2021.186.1.15svn53082-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918961" comment="texlive-pdfescape-doc-2021.186.1.15svn53082-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918962" comment="texlive-pdfjam-2021.186.3.03svn56991-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918963" comment="texlive-pdfjam-doc-2021.186.3.03svn56991-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918964" comment="texlive-pdflatexpicscale-2021.186.0.0.32svn46617-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918965" comment="texlive-pdflatexpicscale-doc-2021.186.0.0.32svn46617-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918966" comment="texlive-pdflscape-2021.186.0.0.12svn53047-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918967" comment="texlive-pdflscape-doc-2021.186.0.0.12svn53047-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918968" comment="texlive-pdfmanagement-testphase-2021.186.0.0.95csvn58511-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918969" comment="texlive-pdfmanagement-testphase-doc-2021.186.0.0.95csvn58511-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918970" comment="texlive-pdfmarginpar-2021.186.0.0.92svn23492-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918971" comment="texlive-pdfmarginpar-doc-2021.186.0.0.92svn23492-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918972" comment="texlive-pdfoverlay-2021.186.1.2asvn57923-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918973" comment="texlive-pdfoverlay-doc-2021.186.1.2asvn57923-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918974" comment="texlive-pdfpagediff-2021.186.1.4svn37946-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918975" comment="texlive-pdfpagediff-doc-2021.186.1.4svn37946-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918976" comment="texlive-pdfpages-2021.186.0.0.5tsvn58212-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918977" comment="texlive-pdfpages-doc-2021.186.0.0.5tsvn58212-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918978" comment="texlive-pdfpc-2021.186.0.0.6.0svn57735-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918979" comment="texlive-pdfpc-doc-2021.186.0.0.6.0svn57735-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918980" comment="texlive-pdfpc-movie-2021.186.1.0svn48245-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918981" comment="texlive-pdfpc-movie-doc-2021.186.1.0svn48245-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918982" comment="texlive-pdfprivacy-2021.186.1.0svn45985-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918983" comment="texlive-pdfprivacy-doc-2021.186.1.0svn45985-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918984" comment="texlive-pdfreview-2021.186.1.2svn50100-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918985" comment="texlive-pdfreview-doc-2021.186.1.2svn50100-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918986" comment="texlive-pdfscreen-2021.186.1.5svn42428-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918987" comment="texlive-pdfscreen-doc-2021.186.1.5svn42428-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918988" comment="texlive-pdfslide-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918989" comment="texlive-pdfslide-doc-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918990" comment="texlive-pdfsync-2021.186.svn20373-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918991" comment="texlive-pdfsync-doc-2021.186.svn20373-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918992" comment="texlive-pdftex-2021.186.svn57973-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918993" comment="texlive-pdftex-doc-2021.186.svn57973-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918994" comment="texlive-pdftex-fonts-2021.186.svn57973-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918995" comment="texlive-pdftex-quiet-2021.186.1.1.0svn49169-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918996" comment="texlive-pdftex-quiet-doc-2021.186.1.1.0svn49169-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918997" comment="texlive-pdftexcmds-2021.186.0.0.33svn55777-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918998" comment="texlive-pdftexcmds-doc-2021.186.0.0.33svn55777-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009918999" comment="texlive-pdftosrc-2021.186.svn57972-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919000" comment="texlive-pdftricks-2021.186.1.16svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919001" comment="texlive-pdftricks-doc-2021.186.1.16svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919002" comment="texlive-pdftricks2-2021.186.1.01svn31016-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919003" comment="texlive-pdftricks2-doc-2021.186.1.01svn31016-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919004" comment="texlive-pdfwin-2021.186.svn54074-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919005" comment="texlive-pdfwin-doc-2021.186.svn54074-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919006" comment="texlive-pdfx-2021.186.1.6.3svn50338-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919007" comment="texlive-pdfx-doc-2021.186.1.6.3svn50338-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919008" comment="texlive-pdfxup-2021.186.2.00svn57166-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919009" comment="texlive-pdfxup-doc-2021.186.2.00svn57166-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919010" comment="texlive-pecha-2021.186.0.0.1svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919011" comment="texlive-pecha-doc-2021.186.0.0.1svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919012" comment="texlive-pedigree-perl-2021.186.1.0svn31990-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919013" comment="texlive-pedigree-perl-doc-2021.186.1.0svn31990-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919014" comment="texlive-penrose-2021.186.1.4svn57508-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919015" comment="texlive-penrose-doc-2021.186.1.4svn57508-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919016" comment="texlive-perception-2021.186.svn48861-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919017" comment="texlive-perception-doc-2021.186.svn48861-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919018" comment="texlive-perfectcut-2021.186.2.3svn54080-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919019" comment="texlive-perfectcut-doc-2021.186.2.3svn54080-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919020" comment="texlive-perltex-2021.186.2.2svn52162-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919021" comment="texlive-perltex-doc-2021.186.2.2svn52162-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919022" comment="texlive-permute-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919023" comment="texlive-permute-doc-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919024" comment="texlive-persian-bib-2021.186.0.0.9svn37297-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919025" comment="texlive-persian-bib-doc-2021.186.0.0.9svn37297-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919026" comment="texlive-petiteannonce-2021.186.1.0001svn25915-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919027" comment="texlive-petiteannonce-doc-2021.186.1.0001svn25915-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919028" comment="texlive-petri-nets-2021.186.svn39165-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919029" comment="texlive-petri-nets-doc-2021.186.svn39165-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919030" comment="texlive-pfarrei-2021.186.r36svn31934-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919031" comment="texlive-pfarrei-doc-2021.186.r36svn31934-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919032" comment="texlive-pgf-2021.186.3.1.8bsvn57240-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919033" comment="texlive-pgf-blur-2021.186.1.02svn54512-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919034" comment="texlive-pgf-blur-doc-2021.186.1.02svn54512-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919035" comment="texlive-pgf-cmykshadings-2021.186.1.2svn52635-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919036" comment="texlive-pgf-cmykshadings-doc-2021.186.1.2svn52635-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919037" comment="texlive-pgf-doc-2021.186.3.1.8bsvn57240-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919038" comment="texlive-pgf-pie-2021.186.0.0.3svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919039" comment="texlive-pgf-pie-doc-2021.186.0.0.3svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919040" comment="texlive-pgf-soroban-2021.186.1.1svn32269-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919041" comment="texlive-pgf-soroban-doc-2021.186.1.1svn32269-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919042" comment="texlive-pgf-spectra-2021.186.2.0.0svn58467-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919043" comment="texlive-pgf-spectra-doc-2021.186.2.0.0svn58467-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919044" comment="texlive-pgf-umlcd-2021.186.0.0.2.1.1svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919045" comment="texlive-pgf-umlcd-doc-2021.186.0.0.2.1.1svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919046" comment="texlive-pgf-umlsd-2021.186.0.0.7svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919047" comment="texlive-pgf-umlsd-doc-2021.186.0.0.7svn55342-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919048" comment="texlive-pgfgantt-2021.186.5.0svn52662-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919049" comment="texlive-pgfgantt-doc-2021.186.5.0svn52662-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919050" comment="texlive-pgfkeyx-2021.186.0.0.0.1svn26093-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919051" comment="texlive-pgfkeyx-doc-2021.186.0.0.0.1svn26093-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919052" comment="texlive-pgfmolbio-2021.186.0.0.21svn35152-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919053" comment="texlive-pgfmolbio-doc-2021.186.0.0.21svn35152-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919054" comment="texlive-pgfmorepages-2021.186.1.20svn54770-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919055" comment="texlive-pgfmorepages-doc-2021.186.1.20svn54770-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919056" comment="texlive-pgfopts-2021.186.2.1asvn56615-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919057" comment="texlive-pgfopts-doc-2021.186.2.1asvn56615-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919058" comment="texlive-pgfornament-2021.186.1.2svn55326-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919059" comment="texlive-pgfornament-doc-2021.186.1.2svn55326-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919060" comment="texlive-pgfornament-han-2021.186.svn54191-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919061" comment="texlive-pgfornament-han-doc-2021.186.svn54191-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919062" comment="texlive-pgfplots-2021.186.1.17svn54080-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919063" comment="texlive-pgfplots-doc-2021.186.1.17svn54080-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919064" comment="texlive-phaistos-2021.186.1.0svn18651-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919065" comment="texlive-phaistos-doc-2021.186.1.0svn18651-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919066" comment="texlive-phaistos-fonts-2021.186.1.0svn18651-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919067" comment="texlive-phffullpagefigure-2021.186.1.0svn41857-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919068" comment="texlive-phffullpagefigure-doc-2021.186.1.0svn41857-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919069" comment="texlive-phfnote-2021.186.1.0svn41858-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919070" comment="texlive-phfnote-doc-2021.186.1.0svn41858-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919071" comment="texlive-phfparen-2021.186.1.0svn41859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919072" comment="texlive-phfparen-doc-2021.186.1.0svn41859-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919073" comment="texlive-phfqit-2021.186.2.0svn45084-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919074" comment="texlive-phfqit-doc-2021.186.2.0svn45084-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919075" comment="texlive-phfquotetext-2021.186.1.0svn41869-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919076" comment="texlive-phfquotetext-doc-2021.186.1.0svn41869-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919077" comment="texlive-phfsvnwatermark-2021.186.1.0svn41870-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919078" comment="texlive-phfsvnwatermark-doc-2021.186.1.0svn41870-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919079" comment="texlive-phfthm-2021.186.1.0svn41871-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919080" comment="texlive-phfthm-doc-2021.186.1.0svn41871-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919081" comment="texlive-philex-2021.186.1.3svn36396-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919082" comment="texlive-philex-doc-2021.186.1.3svn36396-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919083" comment="texlive-philokalia-2021.186.1.2svn45356-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919084" comment="texlive-philokalia-doc-2021.186.1.2svn45356-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919085" comment="texlive-philokalia-fonts-2021.186.1.2svn45356-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919086" comment="texlive-philosophersimprint-2021.186.1.5svn56954-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919087" comment="texlive-philosophersimprint-doc-2021.186.1.5svn56954-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919088" comment="texlive-phonenumbers-2021.186.2.2svn51933-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919089" comment="texlive-phonenumbers-doc-2021.186.2.2svn51933-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919090" comment="texlive-phonetic-2021.186.svn56468-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919091" comment="texlive-phonetic-doc-2021.186.svn56468-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919092" comment="texlive-phonrule-2021.186.1.3.2svn43963-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919093" comment="texlive-phonrule-doc-2021.186.1.3.2svn43963-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919094" comment="texlive-photo-2021.186.svn18739-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919095" comment="texlive-photo-doc-2021.186.svn18739-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919096" comment="texlive-physconst-2021.186.1.1.2svn58727-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919097" comment="texlive-physconst-doc-2021.186.1.1.2svn58727-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919098" comment="texlive-physics-2021.186.1.3svn28590-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919099" comment="texlive-physics-doc-2021.186.1.3svn28590-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919100" comment="texlive-physunits-2021.186.1.2.0svn58728-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919101" comment="texlive-physunits-doc-2021.186.1.2.0svn58728-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919102" comment="texlive-piano-2021.186.1.0svn21574-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919103" comment="texlive-piano-doc-2021.186.1.0svn21574-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919104" comment="texlive-picinpar-2021.186.1.2asvn57349-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919105" comment="texlive-picinpar-doc-2021.186.1.2asvn57349-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919106" comment="texlive-pict2e-2021.186.0.0.4bsvn56504-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919107" comment="texlive-pict2e-doc-2021.186.0.0.4bsvn56504-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919108" comment="texlive-pictex-2021.186.1.1svn21943-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919109" comment="texlive-pictex-doc-2021.186.1.1svn21943-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919110" comment="texlive-pictex2-2021.186.svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919111" comment="texlive-pictexsum-2021.186.svn24965-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919112" comment="texlive-picture-2021.186.1.6svn54867-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919113" comment="texlive-picture-doc-2021.186.1.6svn54867-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919114" comment="texlive-piechartmp-2021.186.0.0.3.0svn19440-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919115" comment="texlive-piechartmp-doc-2021.186.0.0.3.0svn19440-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919116" comment="texlive-piff-2021.186.svn21894-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919117" comment="texlive-piff-doc-2021.186.svn21894-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919118" comment="texlive-pigpen-2021.186.0.0.2svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919119" comment="texlive-pigpen-doc-2021.186.0.0.2svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919120" comment="texlive-pigpen-fonts-2021.186.0.0.2svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919121" comment="texlive-pinlabel-2021.186.1.2svn24769-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919122" comment="texlive-pinlabel-doc-2021.186.1.2svn24769-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919123" comment="texlive-pinoutikz-2021.186.1.1.2svn55966-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919124" comment="texlive-pinoutikz-doc-2021.186.1.1.2svn55966-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919125" comment="texlive-pitex-2021.186.svn24731-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919126" comment="texlive-pitex-doc-2021.186.svn24731-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919127" comment="texlive-pittetd-2021.186.1.618svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919128" comment="texlive-pittetd-doc-2021.186.1.618svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919129" comment="texlive-pixelart-2021.186.0.0.2.0svn57508-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919130" comment="texlive-pixelart-doc-2021.186.0.0.2.0svn57508-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919131" comment="texlive-pkfix-2021.186.1.7svn26032-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919132" comment="texlive-pkfix-doc-2021.186.1.7svn26032-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919133" comment="texlive-pkfix-helper-2021.186.1.6svn56061-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919134" comment="texlive-pkfix-helper-doc-2021.186.1.6svn56061-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919135" comment="texlive-pkgloader-2021.186.0.0.7.0svn47486-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919136" comment="texlive-pkgloader-doc-2021.186.0.0.7.0svn47486-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919137" comment="texlive-pkuthss-2021.186.1.9.0svn58729-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919138" comment="texlive-pkuthss-doc-2021.186.1.9.0svn58729-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919139" comment="texlive-pl-2021.186.1.09asvn58661-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919140" comment="texlive-pl-doc-2021.186.1.09asvn58661-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919141" comment="texlive-pl-fonts-2021.186.1.09asvn58661-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919142" comment="texlive-placeat-2021.186.0.0.1d1svn45145-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919143" comment="texlive-placeat-doc-2021.186.0.0.1d1svn45145-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919144" comment="texlive-placeins-2021.186.2.2svn19848-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919145" comment="texlive-placeins-doc-2021.186.2.2svn19848-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919146" comment="texlive-placeins-plain-2021.186.2.0svn15878-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919147" comment="texlive-plain-2021.186.3.141592653svn57963-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919148" comment="texlive-plain-doc-2021.186.svn28424-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919149" comment="texlive-plainpkg-2021.186.0.0.4asvn27765-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919150" comment="texlive-plainpkg-doc-2021.186.0.0.4asvn27765-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919151" comment="texlive-plainyr-2021.186.svn52783-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919152" comment="texlive-plantslabels-2021.186.1.0svn29803-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919153" comment="texlive-plantslabels-doc-2021.186.1.0svn29803-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919154" comment="texlive-plantuml-2021.186.0.0.3.1svn55214-44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919155" comment="texlive-plantuml-doc-2021.186.0.0.3.1svn55214-44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249772" version="1" class="patch">
	<metadata>
		<title>texlive-plari-2021.186.svn15878-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-plari-2021.186.svn15878-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009919156" comment="texlive-plari-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919157" comment="texlive-plari-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919158" comment="texlive-plates-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919159" comment="texlive-plates-doc-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919160" comment="texlive-platex-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919161" comment="texlive-platex-doc-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919162" comment="texlive-platex-tools-2021.186.svn57729-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919163" comment="texlive-platex-tools-doc-2021.186.svn57729-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919164" comment="texlive-platexcheat-2021.186.3.1svn49557-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919165" comment="texlive-plautopatch-2021.186.0.0.9nsvn57731-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919166" comment="texlive-plautopatch-doc-2021.186.0.0.9nsvn57731-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919167" comment="texlive-play-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919168" comment="texlive-play-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919169" comment="texlive-playfair-2021.186.svn56005-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919170" comment="texlive-playfair-doc-2021.186.svn56005-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919171" comment="texlive-playfair-fonts-2021.186.svn56005-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919172" comment="texlive-plex-2021.186.svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919173" comment="texlive-plex-doc-2021.186.svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919174" comment="texlive-plex-fonts-2021.186.svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919175" comment="texlive-plex-otf-2021.186.0.0.07asvn47562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919176" comment="texlive-plex-otf-doc-2021.186.0.0.07asvn47562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919177" comment="texlive-plimsoll-2021.186.1svn56605-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919178" comment="texlive-plimsoll-doc-2021.186.1svn56605-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919179" comment="texlive-plimsoll-fonts-2021.186.1svn56605-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919180" comment="texlive-plipsum-2021.186.4.3svn30353-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919181" comment="texlive-plipsum-doc-2021.186.4.3svn30353-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919182" comment="texlive-plnfss-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919183" comment="texlive-plnfss-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919184" comment="texlive-plstmary-2021.186.0.0.5csvn31088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919185" comment="texlive-plstmary-doc-2021.186.0.0.5csvn31088-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919186" comment="texlive-plweb-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919187" comment="texlive-plweb-doc-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919188" comment="texlive-pm-isomath-2021.186.1.0.07svn56868-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919189" comment="texlive-pm-isomath-doc-2021.186.1.0.07svn56868-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919190" comment="texlive-pmboxdraw-2021.186.1.4svn53046-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919191" comment="texlive-pmboxdraw-doc-2021.186.1.4svn53046-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919192" comment="texlive-pmgraph-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919193" comment="texlive-pmgraph-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919194" comment="texlive-pmhanguljamo-2021.186.0.0.3.4svn54378-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919195" comment="texlive-pmhanguljamo-doc-2021.186.0.0.3.4svn54378-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919196" comment="texlive-pmx-2021.186.2.94asvn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919197" comment="texlive-pmx-doc-2021.186.2.94asvn57672-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919198" comment="texlive-pmxchords-2021.186.2.0.2svn39249-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919199" comment="texlive-pmxchords-doc-2021.186.2.0.2svn39249-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919200" comment="texlive-pnas2009-2021.186.1.0svn16287-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919201" comment="texlive-poemscol-2021.186.3.1415926svn56082-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919202" comment="texlive-poemscol-doc-2021.186.3.1415926svn56082-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919203" comment="texlive-poetry-2021.186.2.2svn53129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919204" comment="texlive-poetry-doc-2021.186.2.2svn53129-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919205" comment="texlive-poetrytex-2021.186.3.0.1svn39921-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919206" comment="texlive-poetrytex-doc-2021.186.3.0.1svn39921-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919207" comment="texlive-poiretone-2021.186.svn56070-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919208" comment="texlive-poiretone-doc-2021.186.svn56070-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919209" comment="texlive-poiretone-fonts-2021.186.svn56070-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919210" comment="texlive-polexpr-2021.186.0.0.7.5svn53633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919211" comment="texlive-polexpr-doc-2021.186.0.0.7.5svn53633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919212" comment="texlive-polski-2021.186.1.3.4svn44213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919213" comment="texlive-polski-doc-2021.186.1.3.4svn44213-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919214" comment="texlive-poltawski-2021.186.1.101svn20075-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919215" comment="texlive-poltawski-doc-2021.186.1.101svn20075-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919216" comment="texlive-poltawski-fonts-2021.186.1.101svn20075-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919217" comment="texlive-polyglossia-2021.186.1.52svn58444-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919218" comment="texlive-polyglossia-doc-2021.186.1.52svn58444-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919219" comment="texlive-polynom-2021.186.0.0.19svn44832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919220" comment="texlive-polynom-doc-2021.186.0.0.19svn44832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919221" comment="texlive-polynomial-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919222" comment="texlive-polynomial-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919223" comment="texlive-polytable-2021.186.0.0.8.6svn55837-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919224" comment="texlive-polytable-doc-2021.186.0.0.8.6svn55837-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919225" comment="texlive-poormanlog-2021.186.0.0.05svn52080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919226" comment="texlive-poormanlog-doc-2021.186.0.0.05svn52080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919227" comment="texlive-postage-2021.186.1.0svn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919228" comment="texlive-postage-doc-2021.186.1.0svn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919229" comment="texlive-postcards-2021.186.svn21641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919230" comment="texlive-postcards-doc-2021.186.svn21641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919231" comment="texlive-poster-mac-2021.186.1.1svn18305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919232" comment="texlive-poster-mac-doc-2021.186.1.1svn18305-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919233" comment="texlive-powerdot-2021.186.1.6svn58730-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919234" comment="texlive-powerdot-doc-2021.186.1.6svn58730-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919235" comment="texlive-powerdot-fuberlin-2021.186.0.0.02asvn52922-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919236" comment="texlive-powerdot-fuberlin-doc-2021.186.0.0.02asvn52922-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919237" comment="texlive-powerdot-tuliplab-2021.186.1.0.0svn47963-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919238" comment="texlive-powerdot-tuliplab-doc-2021.186.1.0.0svn47963-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919239" comment="texlive-ppr-prv-2021.186.0.0.13csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919240" comment="texlive-ppr-prv-doc-2021.186.0.0.13csvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919241" comment="texlive-pracjourn-2021.186.0.0.4nsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919242" comment="texlive-pracjourn-doc-2021.186.0.0.4nsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919243" comment="texlive-practicalreports-2021.186.2.0.3svn52312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919244" comment="texlive-practicalreports-doc-2021.186.2.0.3svn52312-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919245" comment="texlive-prelim2e-2021.186.2.00svn57000-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919246" comment="texlive-prelim2e-doc-2021.186.2.00svn57000-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919247" comment="texlive-preprint-2021.186.2011svn30447-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919248" comment="texlive-preprint-doc-2021.186.2011svn30447-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919249" comment="texlive-prerex-2021.186.svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919250" comment="texlive-prerex-doc-2021.186.svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919251" comment="texlive-present-2021.186.2.2.1svn50048-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919252" comment="texlive-present-doc-2021.186.2.2.1svn50048-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919253" comment="texlive-pressrelease-2021.186.1.0svn35147-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919254" comment="texlive-pressrelease-doc-2021.186.1.0svn35147-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919255" comment="texlive-prettyref-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919256" comment="texlive-prettyref-doc-2021.186.3.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919257" comment="texlive-preview-2021.186.12.3svn56708-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919258" comment="texlive-preview-doc-2021.186.12.3svn56708-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919259" comment="texlive-prftree-2021.186.1.6svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919260" comment="texlive-prftree-doc-2021.186.1.6svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919261" comment="texlive-principia-2021.186.1.2svn57902-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919262" comment="texlive-principia-doc-2021.186.1.2svn57902-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919263" comment="texlive-printlen-2021.186.1.1asvn19847-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919264" comment="texlive-printlen-doc-2021.186.1.1asvn19847-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919265" comment="texlive-proba-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919266" comment="texlive-proba-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919267" comment="texlive-probsoln-2021.186.3.05svn44783-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919268" comment="texlive-probsoln-doc-2021.186.3.05svn44783-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919269" comment="texlive-procIAGssymp-2021.186.svn51771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919270" comment="texlive-procIAGssymp-doc-2021.186.svn51771-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919271" comment="texlive-prodint-2021.186.svn21893-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919272" comment="texlive-prodint-doc-2021.186.svn21893-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919273" comment="texlive-prodint-fonts-2021.186.svn21893-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919274" comment="texlive-productbox-2021.186.1.1svn20886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919275" comment="texlive-productbox-doc-2021.186.1.1svn20886-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919276" comment="texlive-profcollege-2021.186.0.0.98svn58710-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919277" comment="texlive-profcollege-doc-2021.186.0.0.98svn58710-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919278" comment="texlive-program-2021.186.3.3.14svn44214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919279" comment="texlive-program-doc-2021.186.3.3.14svn44214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919280" comment="texlive-progress-2021.186.1.10svn19519-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919281" comment="texlive-progress-doc-2021.186.1.10svn19519-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919282" comment="texlive-progressbar-2021.186.1.0b_4svn33822-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919283" comment="texlive-progressbar-doc-2021.186.1.0b_4svn33822-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919284" comment="texlive-proof-at-the-end-2021.186.svn51194-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919285" comment="texlive-proof-at-the-end-doc-2021.186.svn51194-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919286" comment="texlive-proofread-2021.186.1.04svn50938-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919287" comment="texlive-proofread-doc-2021.186.1.04svn50938-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919288" comment="texlive-prooftrees-2021.186.0.0.7_svn_8641svn52221-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919289" comment="texlive-prooftrees-doc-2021.186.0.0.7_svn_8641svn52221-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919290" comment="texlive-properties-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919291" comment="texlive-properties-doc-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919292" comment="texlive-proposal-2021.186.svn40538-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919293" comment="texlive-proposal-doc-2021.186.svn40538-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919294" comment="texlive-prosper-2021.186.1.0hsvn33033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919295" comment="texlive-prosper-doc-2021.186.1.0hsvn33033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919296" comment="texlive-protex-2021.186.svn41633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919297" comment="texlive-protex-doc-2021.186.svn41633-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919298" comment="texlive-protocol-2021.186.1.13svn25562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919299" comment="texlive-protocol-doc-2021.186.1.13svn25562-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919300" comment="texlive-prtec-2021.186.1.06svn51919-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919301" comment="texlive-prtec-doc-2021.186.1.06svn51919-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919302" comment="texlive-przechlewski-book-2021.186.svn23552-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919303" comment="texlive-przechlewski-book-doc-2021.186.svn23552-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919304" comment="texlive-ps2eps-2021.186.1.68svn53559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919305" comment="texlive-ps2eps-doc-2021.186.1.68svn53559-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919306" comment="texlive-ps2pk-2021.186.svn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919307" comment="texlive-psbao-2021.186.1.0svn55013-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919308" comment="texlive-psbao-doc-2021.186.1.0svn55013-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919309" comment="texlive-pseudo-2021.186.1.1.3svn52582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919310" comment="texlive-pseudo-doc-2021.186.1.1.3svn52582-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919311" comment="texlive-pseudocode-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919312" comment="texlive-pseudocode-doc-2021.186.svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919313" comment="texlive-psfrag-2021.186.3.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919314" comment="texlive-psfrag-doc-2021.186.3.04svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919315" comment="texlive-psfrag-italian-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919316" comment="texlive-psfragx-2021.186.1.1svn26243-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919317" comment="texlive-psfragx-doc-2021.186.1.1svn26243-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919318" comment="texlive-psgo-2021.186.0.0.17svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919319" comment="texlive-psgo-doc-2021.186.0.0.17svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919320" comment="texlive-psizzl-2021.186.0.0.35svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919321" comment="texlive-psizzl-doc-2021.186.0.0.35svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919322" comment="texlive-pslatex-2021.186.1.3svn57434-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919323" comment="texlive-psnfss-2021.186.9.3svn54694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919324" comment="texlive-psnfss-doc-2021.186.9.3svn54694-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919325" comment="texlive-pspicture-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919326" comment="texlive-pspicture-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919327" comment="texlive-pst-2dplot-2021.186.1.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919328" comment="texlive-pst-2dplot-doc-2021.186.1.5svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919329" comment="texlive-pst-3d-2021.186.1.10svn17257-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919330" comment="texlive-pst-3d-doc-2021.186.1.10svn17257-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919331" comment="texlive-pst-3dplot-2021.186.2.06svn56758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919332" comment="texlive-pst-3dplot-doc-2021.186.2.06svn56758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919333" comment="texlive-pst-abspos-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919334" comment="texlive-pst-abspos-doc-2021.186.0.0.2svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919335" comment="texlive-pst-am-2021.186.1.02svn19591-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919336" comment="texlive-pst-am-doc-2021.186.1.02svn19591-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919337" comment="texlive-pst-antiprism-2021.186.0.0.02svn46643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919338" comment="texlive-pst-antiprism-doc-2021.186.0.0.02svn46643-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919339" comment="texlive-pst-arrow-2021.186.0.0.01svn41980-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919340" comment="texlive-pst-arrow-doc-2021.186.0.0.01svn41980-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919341" comment="texlive-pst-asr-2021.186.1.3svn22138-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919342" comment="texlive-pst-asr-doc-2021.186.1.3svn22138-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919343" comment="texlive-pst-bar-2021.186.0.0.92svn18734-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919344" comment="texlive-pst-bar-doc-2021.186.0.0.92svn18734-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919345" comment="texlive-pst-barcode-2021.186.0.0.18svn45096-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919346" comment="texlive-pst-barcode-doc-2021.186.0.0.18svn45096-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919347" comment="texlive-pst-bezier-2021.186.0.0.03svn41981-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919348" comment="texlive-pst-bezier-doc-2021.186.0.0.03svn41981-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919349" comment="texlive-pst-blur-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919350" comment="texlive-pst-blur-doc-2021.186.2.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919351" comment="texlive-pst-bspline-2021.186.1.62svn40685-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919352" comment="texlive-pst-bspline-doc-2021.186.1.62svn40685-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919353" comment="texlive-pst-calculate-2021.186.0.0.02svn49817-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919354" comment="texlive-pst-calculate-doc-2021.186.0.0.02svn49817-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919355" comment="texlive-pst-calendar-2021.186.0.0.47svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919356" comment="texlive-pst-calendar-doc-2021.186.0.0.47svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919357" comment="texlive-pst-cie-2021.186.1.06asvn49422-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919358" comment="texlive-pst-cie-doc-2021.186.1.06asvn49422-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919359" comment="texlive-pst-circ-2021.186.2.17svn55289-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919360" comment="texlive-pst-circ-doc-2021.186.2.17svn55289-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919361" comment="texlive-pst-coil-2021.186.1.07svn37377-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919362" comment="texlive-pst-coil-doc-2021.186.1.07svn37377-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919363" comment="texlive-pst-contourplot-2021.186.0.0.6svn48230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919364" comment="texlive-pst-contourplot-doc-2021.186.0.0.6svn48230-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919365" comment="texlive-pst-cox-2021.186.0.0.98_betasvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919366" comment="texlive-pst-cox-doc-2021.186.0.0.98_betasvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919367" comment="texlive-pst-dart-2021.186.0.0.02svn46579-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919368" comment="texlive-pst-dart-doc-2021.186.0.0.02svn46579-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919369" comment="texlive-pst-dbicons-2021.186.0.0.16svn17556-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919370" comment="texlive-pst-dbicons-doc-2021.186.0.0.16svn17556-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919371" comment="texlive-pst-diffraction-2021.186.2.03svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919372" comment="texlive-pst-diffraction-doc-2021.186.2.03svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919373" comment="texlive-pst-electricfield-2021.186.0.0.14svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919374" comment="texlive-pst-electricfield-doc-2021.186.0.0.14svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919375" comment="texlive-pst-eps-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919376" comment="texlive-pst-eps-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919377" comment="texlive-pst-eucl-2021.186.1.75svn56474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919378" comment="texlive-pst-eucl-doc-2021.186.1.75svn56474-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919379" comment="texlive-pst-eucl-translation-bg-2021.186.1.3.2svn19296-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919380" comment="texlive-pst-exa-2021.186.0.0.06svn45289-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919381" comment="texlive-pst-exa-doc-2021.186.0.0.06svn45289-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919382" comment="texlive-pst-feyn-2021.186.0.0.01svn48781-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919383" comment="texlive-pst-feyn-doc-2021.186.0.0.01svn48781-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919384" comment="texlive-pst-fill-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919385" comment="texlive-pst-fill-doc-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919386" comment="texlive-pst-fit-2021.186.0.0.02svn45109-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919387" comment="texlive-pst-fit-doc-2021.186.0.0.02svn45109-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919388" comment="texlive-pst-fr3d-2021.186.1.10svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919389" comment="texlive-pst-fr3d-doc-2021.186.1.10svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919390" comment="texlive-pst-fractal-2021.186.0.0.11asvn54376-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919391" comment="texlive-pst-fractal-doc-2021.186.0.0.11asvn54376-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919392" comment="texlive-pst-fun-2021.186.0.0.04svn17909-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919393" comment="texlive-pst-fun-doc-2021.186.0.0.04svn17909-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919394" comment="texlive-pst-func-2021.186.0.0.95svn55439-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919395" comment="texlive-pst-func-doc-2021.186.0.0.95svn55439-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919396" comment="texlive-pst-gantt-2021.186.0.0.22asvn35832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919397" comment="texlive-pst-gantt-doc-2021.186.0.0.22asvn35832-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919398" comment="texlive-pst-geo-2021.186.0.0.06svn46273-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919399" comment="texlive-pst-geo-doc-2021.186.0.0.06svn46273-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919400" comment="texlive-pst-geometrictools-2021.186.1.1svn45319-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919401" comment="texlive-pst-geometrictools-doc-2021.186.1.1svn45319-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919402" comment="texlive-pst-ghsb-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919403" comment="texlive-pst-ghsb-doc-2021.186.svn54074-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919404" comment="texlive-pst-gr3d-2021.186.1.34svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919405" comment="texlive-pst-gr3d-doc-2021.186.1.34svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919406" comment="texlive-pst-grad-2021.186.1.06svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919407" comment="texlive-pst-grad-doc-2021.186.1.06svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919408" comment="texlive-pst-graphicx-2021.186.0.0.02svn21717-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919409" comment="texlive-pst-graphicx-doc-2021.186.0.0.02svn21717-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919410" comment="texlive-pst-infixplot-2021.186.0.0.11svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919411" comment="texlive-pst-infixplot-doc-2021.186.0.0.11svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919412" comment="texlive-pst-intersect-2021.186.0.0.4svn33210-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919413" comment="texlive-pst-intersect-doc-2021.186.0.0.4svn33210-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919414" comment="texlive-pst-jtree-2021.186.2.6svn20946-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919415" comment="texlive-pst-jtree-doc-2021.186.2.6svn20946-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919416" comment="texlive-pst-knot-2021.186.0.0.2svn16033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919417" comment="texlive-pst-knot-doc-2021.186.0.0.2svn16033-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919418" comment="texlive-pst-labo-2021.186.2.04svn39077-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919419" comment="texlive-pst-labo-doc-2021.186.2.04svn39077-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919420" comment="texlive-pst-layout-2021.186.0.0.95svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919421" comment="texlive-pst-layout-doc-2021.186.0.0.95svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919422" comment="texlive-pst-lens-2021.186.1.02svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919423" comment="texlive-pst-lens-doc-2021.186.1.02svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919424" comment="texlive-pst-light3d-2021.186.0.0.12svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919425" comment="texlive-pst-light3d-doc-2021.186.0.0.12svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919426" comment="texlive-pst-lsystem-2021.186.0.0.02svn49556-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919427" comment="texlive-pst-lsystem-doc-2021.186.0.0.02svn49556-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919428" comment="texlive-pst-magneticfield-2021.186.1.16svn49780-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919429" comment="texlive-pst-magneticfield-doc-2021.186.1.16svn49780-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919430" comment="texlive-pst-marble-2021.186.1.6svn50925-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919431" comment="texlive-pst-marble-doc-2021.186.1.6svn50925-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919432" comment="texlive-pst-math-2021.186.0.0.65svn49425-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919433" comment="texlive-pst-math-doc-2021.186.0.0.65svn49425-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919434" comment="texlive-pst-mirror-2021.186.1.01svn32997-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919435" comment="texlive-pst-mirror-doc-2021.186.1.01svn32997-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919436" comment="texlive-pst-moire-2021.186.2.1svn49223-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919437" comment="texlive-pst-moire-doc-2021.186.2.1svn49223-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919438" comment="texlive-pst-node-2021.186.1.42asvn54687-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919439" comment="texlive-pst-node-doc-2021.186.1.42asvn54687-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919440" comment="texlive-pst-ob3d-2021.186.0.0.22svn54514-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919441" comment="texlive-pst-ob3d-doc-2021.186.0.0.22svn54514-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919442" comment="texlive-pst-ode-2021.186.0.0.15svn58293-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919443" comment="texlive-pst-ode-doc-2021.186.0.0.15svn58293-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919444" comment="texlive-pst-optexp-2021.186.6.0svn57977-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919445" comment="texlive-pst-optexp-doc-2021.186.6.0svn57977-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919446" comment="texlive-pst-optic-2021.186.1.02svn41999-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919447" comment="texlive-pst-optic-doc-2021.186.1.02svn41999-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919448" comment="texlive-pst-osci-2021.186.2.82svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919449" comment="texlive-pst-osci-doc-2021.186.2.82svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919450" comment="texlive-pst-ovl-2021.186.0.0.07bsvn54963-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919451" comment="texlive-pst-ovl-doc-2021.186.0.0.07bsvn54963-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919452" comment="texlive-pst-pad-2021.186.0.0.3bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919453" comment="texlive-pst-pad-doc-2021.186.0.0.3bsvn15878-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249773" version="1" class="patch">
	<metadata>
		<title>texlive-pst-pdf-2021.186.1.2fsvn56622-46.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-pst-pdf-2021.186.1.2fsvn56622-46.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009919454" comment="texlive-pst-pdf-2021.186.1.2fsvn56622-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919455" comment="texlive-pst-pdf-doc-2021.186.1.2fsvn56622-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919456" comment="texlive-pst-pdgr-2021.186.0.0.4svn45875-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919457" comment="texlive-pst-pdgr-doc-2021.186.0.0.4svn45875-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919458" comment="texlive-pst-perspective-2021.186.1.05svn39585-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919459" comment="texlive-pst-perspective-doc-2021.186.1.05svn39585-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919460" comment="texlive-pst-platon-2021.186.0.0.01svn16538-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919461" comment="texlive-pst-platon-doc-2021.186.0.0.01svn16538-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919462" comment="texlive-pst-plot-2021.186.1.92svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919463" comment="texlive-pst-plot-doc-2021.186.1.92svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919464" comment="texlive-pst-poker-2021.186.0.0.03asvn53482-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919465" comment="texlive-pst-poker-doc-2021.186.0.0.03asvn53482-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919466" comment="texlive-pst-poly-2021.186.1.63svn35062-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919467" comment="texlive-pst-poly-doc-2021.186.1.63svn35062-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919468" comment="texlive-pst-pulley-2021.186.0.0.02svn45316-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919469" comment="texlive-pst-pulley-doc-2021.186.0.0.02svn45316-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919470" comment="texlive-pst-qtree-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919471" comment="texlive-pst-qtree-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919472" comment="texlive-pst-rputover-2021.186.1.0svn44724-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919473" comment="texlive-pst-rputover-doc-2021.186.1.0svn44724-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919474" comment="texlive-pst-rubans-2021.186.1.2svn23464-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919475" comment="texlive-pst-rubans-doc-2021.186.1.2svn23464-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919476" comment="texlive-pst-shell-2021.186.0.0.03svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919477" comment="texlive-pst-shell-doc-2021.186.0.0.03svn56070-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919478" comment="texlive-pst-sigsys-2021.186.1.4svn21667-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919479" comment="texlive-pst-sigsys-doc-2021.186.1.4svn21667-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919480" comment="texlive-pst-slpe-2021.186.1.31svn24391-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919481" comment="texlive-pst-slpe-doc-2021.186.1.31svn24391-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919482" comment="texlive-pst-solarsystem-2021.186.0.0.13svn45097-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919483" comment="texlive-pst-solarsystem-doc-2021.186.0.0.13svn45097-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919484" comment="texlive-pst-solides3d-2021.186.4.34asvn49520-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919485" comment="texlive-pst-solides3d-doc-2021.186.4.34asvn49520-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919486" comment="texlive-pst-soroban-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919487" comment="texlive-pst-soroban-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919488" comment="texlive-pst-spectra-2021.186.0.0.91svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919489" comment="texlive-pst-spectra-doc-2021.186.0.0.91svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919490" comment="texlive-pst-spinner-2021.186.1.02svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919491" comment="texlive-pst-spinner-doc-2021.186.1.02svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919492" comment="texlive-pst-stru-2021.186.0.0.13svn38613-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919493" comment="texlive-pst-stru-doc-2021.186.0.0.13svn38613-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919494" comment="texlive-pst-support-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919495" comment="texlive-pst-text-2021.186.1.02svn49542-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919496" comment="texlive-pst-text-doc-2021.186.1.02svn49542-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919497" comment="texlive-pst-thick-2021.186.1.0svn16369-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919498" comment="texlive-pst-thick-doc-2021.186.1.0svn16369-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919499" comment="texlive-pst-tools-2021.186.0.0.10svn54518-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919500" comment="texlive-pst-tools-doc-2021.186.0.0.10svn54518-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919501" comment="texlive-pst-tree-2021.186.1.13svn43272-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919502" comment="texlive-pst-tree-doc-2021.186.1.13svn43272-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919503" comment="texlive-pst-turtle-2021.186.0.0.02svn52261-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919504" comment="texlive-pst-turtle-doc-2021.186.0.0.02svn52261-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919505" comment="texlive-pst-tvz-2021.186.1.01svn23451-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919506" comment="texlive-pst-tvz-doc-2021.186.1.01svn23451-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919507" comment="texlive-pst-uml-2021.186.0.0.83svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919508" comment="texlive-pst-uml-doc-2021.186.0.0.83svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919509" comment="texlive-pst-vectorian-2021.186.0.0.4svn28801-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919510" comment="texlive-pst-vectorian-doc-2021.186.0.0.4svn28801-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919511" comment="texlive-pst-vehicle-2021.186.1.2svn45320-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919512" comment="texlive-pst-vehicle-doc-2021.186.1.2svn45320-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919513" comment="texlive-pst-venn-2021.186.0.0.01svn49316-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919514" comment="texlive-pst-venn-doc-2021.186.0.0.01svn49316-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919515" comment="texlive-pst-vowel-2021.186.1.0svn25228-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919516" comment="texlive-pst-vowel-doc-2021.186.1.0svn25228-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919517" comment="texlive-pst2pdf-2021.186.0.0.20svn56172-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919518" comment="texlive-pst2pdf-doc-2021.186.0.0.20svn56172-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919519" comment="texlive-pstool-2021.186.1.5esvn46393-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919520" comment="texlive-pstool-doc-2021.186.1.5esvn46393-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919521" comment="texlive-pstricks-2021.186.3.01asvn58731-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919522" comment="texlive-pstricks-add-2021.186.3.89asvn53763-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919523" comment="texlive-pstricks-add-doc-2021.186.3.89asvn53763-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919524" comment="texlive-pstricks-doc-2021.186.3.01asvn58731-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919525" comment="texlive-pstricks_calcnotes-2021.186.1.2svn34363-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919526" comment="texlive-pstring-2021.186.svn42857-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919527" comment="texlive-pstring-doc-2021.186.svn42857-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919528" comment="texlive-ptex-2021.186.svn57972-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919529" comment="texlive-ptex-base-2021.186.svn56487-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919530" comment="texlive-ptex-base-doc-2021.186.svn56487-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919531" comment="texlive-ptex-fontmaps-2021.186.20201227.0svn57239-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919532" comment="texlive-ptex-fontmaps-doc-2021.186.20201227.0svn57239-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919533" comment="texlive-ptex-fonts-2021.186.svn46940-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919534" comment="texlive-ptex-fonts-doc-2021.186.svn46940-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919535" comment="texlive-ptex-manual-2021.186.svn57128-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919536" comment="texlive-ptex2pdf-2021.186.20200520.0svn58632-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919537" comment="texlive-ptex2pdf-doc-2021.186.20200520.0svn58632-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919538" comment="texlive-ptext-2021.186.1.1svn30171-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919539" comment="texlive-ptext-doc-2021.186.1.1svn30171-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919540" comment="texlive-ptolemaicastronomy-2021.186.1.0svn50810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919541" comment="texlive-ptolemaicastronomy-doc-2021.186.1.0svn50810-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919542" comment="texlive-ptptex-2021.186.0.0.91svn19440-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919543" comment="texlive-ptptex-doc-2021.186.0.0.91svn19440-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919544" comment="texlive-punk-2021.186.svn27388-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919545" comment="texlive-punk-doc-2021.186.svn27388-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919546" comment="texlive-punk-latex-2021.186.1.1svn27389-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919547" comment="texlive-punk-latex-doc-2021.186.1.1svn27389-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919548" comment="texlive-punknova-2021.186.1.003svn24649-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919549" comment="texlive-punknova-doc-2021.186.1.003svn24649-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919550" comment="texlive-punknova-fonts-2021.186.1.003svn24649-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919551" comment="texlive-purifyeps-2021.186.1.1svn29725-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919552" comment="texlive-purifyeps-doc-2021.186.1.1svn29725-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919553" comment="texlive-puyotikz-2021.186.1.0.1svn57254-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919554" comment="texlive-puyotikz-doc-2021.186.1.0.1svn57254-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919555" comment="texlive-pwebmac-2021.186.4.6.2svn58478-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919556" comment="texlive-pwebmac-doc-2021.186.4.6.2svn58478-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919557" comment="texlive-pxbase-2021.186.1.1bsvn44756-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919558" comment="texlive-pxbase-doc-2021.186.1.1bsvn44756-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919559" comment="texlive-pxchfon-2021.186.1.7esvn56537-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919560" comment="texlive-pxchfon-doc-2021.186.1.7esvn56537-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919561" comment="texlive-pxcjkcat-2021.186.1.1svn47266-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919562" comment="texlive-pxcjkcat-doc-2021.186.1.1svn47266-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919563" comment="texlive-pxfonts-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919564" comment="texlive-pxfonts-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919565" comment="texlive-pxfonts-fonts-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919566" comment="texlive-pxgreeks-2021.186.1.0svn21838-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919567" comment="texlive-pxgreeks-doc-2021.186.1.0svn21838-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919568" comment="texlive-pxjahyper-2021.186.0.0.7bsvn57950-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919569" comment="texlive-pxjahyper-doc-2021.186.0.0.7bsvn57950-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919570" comment="texlive-pxjodel-2021.186.0.0.3svn55006-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919571" comment="texlive-pxjodel-doc-2021.186.0.0.3svn55006-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919572" comment="texlive-pxpgfmark-2021.186.0.0.2svn30212-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919573" comment="texlive-pxpgfmark-doc-2021.186.0.0.2svn30212-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919574" comment="texlive-pxpic-2021.186.1.2svn57445-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919575" comment="texlive-pxpic-doc-2021.186.1.2svn57445-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919576" comment="texlive-pxrubrica-2021.186.1.3dsvn58168-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919577" comment="texlive-pxrubrica-doc-2021.186.1.3dsvn58168-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919578" comment="texlive-pxtatescale-2021.186.0.0.4svn43009-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919579" comment="texlive-pxtatescale-doc-2021.186.0.0.4svn43009-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919580" comment="texlive-pxtxalfa-2021.186.1svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919581" comment="texlive-pxtxalfa-doc-2021.186.1svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919582" comment="texlive-pxufont-2021.186.0.0.6svn53733-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919583" comment="texlive-pxufont-doc-2021.186.0.0.6svn53733-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919584" comment="texlive-pygmentex-2021.186.0.0.10svn57190-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919585" comment="texlive-pygmentex-doc-2021.186.0.0.10svn57190-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919586" comment="texlive-python-2021.186.0.0.21svn27064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919587" comment="texlive-python-doc-2021.186.0.0.21svn27064-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919588" comment="texlive-pythonhighlight-2021.186.svn43191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919589" comment="texlive-pythonhighlight-doc-2021.186.svn43191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919590" comment="texlive-pythontex-2021.186.0.0.17svn52174-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919591" comment="texlive-pythontex-doc-2021.186.0.0.17svn52174-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919592" comment="texlive-qcircuit-2021.186.2.6.0svn48400-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919593" comment="texlive-qcircuit-doc-2021.186.2.6.0svn48400-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919594" comment="texlive-qcm-2021.186.2.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919595" comment="texlive-qcm-doc-2021.186.2.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919596" comment="texlive-qobitree-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919597" comment="texlive-qobitree-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919598" comment="texlive-qpxqtx-2021.186.svn45797-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919599" comment="texlive-qpxqtx-doc-2021.186.svn45797-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919600" comment="texlive-qrbill-2021.186.1.02svn56190-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919601" comment="texlive-qrbill-doc-2021.186.1.02svn56190-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919602" comment="texlive-qrcode-2021.186.1.51svn36065-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919603" comment="texlive-qrcode-doc-2021.186.1.51svn36065-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919604" comment="texlive-qsharp-2021.186.0.0.3.1901.1401svn49722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919605" comment="texlive-qsharp-doc-2021.186.0.0.3.1901.1401svn49722-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919606" comment="texlive-qstest-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919607" comment="texlive-qstest-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919608" comment="texlive-qsymbols-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919609" comment="texlive-qsymbols-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919610" comment="texlive-qtree-2021.186.3.1bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919611" comment="texlive-qtree-doc-2021.186.3.1bsvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919612" comment="texlive-qualitype-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919613" comment="texlive-qualitype-doc-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919614" comment="texlive-qualitype-fonts-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919615" comment="texlive-quantikz-2021.186.0.0.9.6svn54911-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919616" comment="texlive-quantikz-doc-2021.186.0.0.9.6svn54911-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919617" comment="texlive-quantumarticle-2021.186.5.1svn56862-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919618" comment="texlive-quantumarticle-doc-2021.186.5.1svn56862-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919619" comment="texlive-quattrocento-2021.186.svn56020-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919620" comment="texlive-quattrocento-doc-2021.186.svn56020-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919621" comment="texlive-quattrocento-fonts-2021.186.svn56020-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919622" comment="texlive-quicktype-2021.186.0.0.1svn42183-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919623" comment="texlive-quicktype-doc-2021.186.0.0.1svn42183-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919624" comment="texlive-quiz2socrative-2021.186.1.0svn52276-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919625" comment="texlive-quiz2socrative-doc-2021.186.1.0svn52276-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919626" comment="texlive-quotchap-2021.186.1.3svn56926-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919627" comment="texlive-quotchap-doc-2021.186.1.3svn56926-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919628" comment="texlive-quoting-2021.186.0.0.1csvn32818-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919629" comment="texlive-quoting-doc-2021.186.0.0.1csvn32818-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919630" comment="texlive-quotmark-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919631" comment="texlive-quotmark-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919632" comment="texlive-quran-2021.186.1.81svn57601-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919633" comment="texlive-quran-bn-2021.186.0.0.1svn57602-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919634" comment="texlive-quran-bn-doc-2021.186.0.0.1svn57602-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919635" comment="texlive-quran-de-2021.186.0.0.2svn54191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919636" comment="texlive-quran-de-doc-2021.186.0.0.2svn54191-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919637" comment="texlive-quran-doc-2021.186.1.81svn57601-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919638" comment="texlive-quran-ur-2021.186.0.0.21svn57597-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919639" comment="texlive-quran-ur-doc-2021.186.0.0.21svn57597-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919640" comment="texlive-qyxf-book-2021.186.3.1.0svn56319-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919641" comment="texlive-qyxf-book-doc-2021.186.3.1.0svn56319-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919642" comment="texlive-r_und_s-2021.186.1.3isvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919643" comment="texlive-r_und_s-doc-2021.186.1.3isvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919644" comment="texlive-ragged2e-2021.186.3.0svn57638-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919645" comment="texlive-ragged2e-doc-2021.186.3.0svn57638-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919646" comment="texlive-raleway-2021.186.1.4svn42629-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919647" comment="texlive-raleway-doc-2021.186.1.4svn42629-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919648" comment="texlive-raleway-fonts-2021.186.1.4svn42629-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919649" comment="texlive-ran_toks-2021.186.svn57520-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919650" comment="texlive-ran_toks-doc-2021.186.svn57520-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919651" comment="texlive-randbild-2021.186.0.0.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919652" comment="texlive-randbild-doc-2021.186.0.0.2svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919653" comment="texlive-random-2021.186.0.0.2svn54723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919654" comment="texlive-random-doc-2021.186.0.0.2svn54723-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919655" comment="texlive-randomlist-2021.186.1.3svn45281-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919656" comment="texlive-randomlist-doc-2021.186.1.3svn45281-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919657" comment="texlive-randomwalk-2021.186.0.0.6svn49513-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919658" comment="texlive-randomwalk-doc-2021.186.0.0.6svn49513-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919659" comment="texlive-randtext-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919660" comment="texlive-randtext-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919661" comment="texlive-rank-2-roots-2021.186.1.0svn48515-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919662" comment="texlive-rank-2-roots-doc-2021.186.1.0svn48515-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919663" comment="texlive-rccol-2021.186.1.2csvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919664" comment="texlive-rccol-doc-2021.186.1.2csvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919665" comment="texlive-rcs-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919666" comment="texlive-rcs-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919667" comment="texlive-rcs-multi-2021.186.0.0.1asvn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919668" comment="texlive-rcs-multi-doc-2021.186.0.0.1asvn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919669" comment="texlive-rcsinfo-2021.186.1.11svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919670" comment="texlive-rcsinfo-doc-2021.186.1.11svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919671" comment="texlive-readablecv-2021.186.3.0svn57433-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919672" comment="texlive-readablecv-doc-2021.186.3.0svn57433-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919673" comment="texlive-readarray-2021.186.2.0svn42467-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919674" comment="texlive-readarray-doc-2021.186.2.0svn42467-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919675" comment="texlive-realboxes-2021.186.0.0.2svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919676" comment="texlive-realboxes-doc-2021.186.0.0.2svn56291-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919677" comment="texlive-realhats-2021.186.5.0svn52865-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919678" comment="texlive-realhats-doc-2021.186.5.0svn52865-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919679" comment="texlive-realscripts-2021.186.0.0.3dsvn56594-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919680" comment="texlive-realscripts-doc-2021.186.0.0.3dsvn56594-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919681" comment="texlive-realtranspose-2021.186.1.1svn56623-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919682" comment="texlive-realtranspose-doc-2021.186.1.1svn56623-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919683" comment="texlive-rec-thy-2021.186.3.7svn58732-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919684" comment="texlive-rec-thy-doc-2021.186.3.7svn58732-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919685" comment="texlive-recipe-2021.186.0.0.9svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919686" comment="texlive-recipe-doc-2021.186.0.0.9svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919687" comment="texlive-recipebook-2021.186.svn37026-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919688" comment="texlive-recipebook-doc-2021.186.svn37026-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919689" comment="texlive-recipecard-2021.186.2.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919690" comment="texlive-recipecard-doc-2021.186.2.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919691" comment="texlive-rectopma-2021.186.svn19980-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919692" comment="texlive-rectopma-doc-2021.186.svn19980-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919693" comment="texlive-recycle-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919694" comment="texlive-recycle-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919695" comment="texlive-recycle-fonts-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919696" comment="texlive-refcheck-2021.186.1.9.1svn29128-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919697" comment="texlive-refcheck-doc-2021.186.1.9.1svn29128-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919698" comment="texlive-refcount-2021.186.3.6svn53164-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919699" comment="texlive-refcount-doc-2021.186.3.6svn53164-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919700" comment="texlive-refenums-2021.186.1.1.2svn44131-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919701" comment="texlive-refenums-doc-2021.186.1.1.2svn44131-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919702" comment="texlive-reflectgraphics-2021.186.0.0.2csvn40612-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919703" comment="texlive-reflectgraphics-doc-2021.186.0.0.2csvn40612-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919704" comment="texlive-refman-2021.186.2.0esvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919705" comment="texlive-refman-doc-2021.186.2.0esvn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919706" comment="texlive-refstyle-2021.186.0.0.5svn20318-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919707" comment="texlive-refstyle-doc-2021.186.0.0.5svn20318-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919708" comment="texlive-regcount-2021.186.1.0svn19979-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919709" comment="texlive-regcount-doc-2021.186.1.0svn19979-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919710" comment="texlive-regexpatch-2021.186.0.0.2fsvn58668-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919711" comment="texlive-regexpatch-doc-2021.186.0.0.2fsvn58668-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919712" comment="texlive-register-2021.186.2.0svn54485-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919713" comment="texlive-register-doc-2021.186.2.0svn54485-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919714" comment="texlive-regstats-2021.186.1.0hsvn25050-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919715" comment="texlive-regstats-doc-2021.186.1.0hsvn25050-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919716" comment="texlive-reledmac-2021.186.2.37.2svn58763-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919717" comment="texlive-reledmac-doc-2021.186.2.37.2svn58763-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919718" comment="texlive-relenc-2021.186.svn22050-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919719" comment="texlive-relenc-doc-2021.186.svn22050-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919720" comment="texlive-relsize-2021.186.4.1svn30707-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919721" comment="texlive-relsize-doc-2021.186.4.1svn30707-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919722" comment="texlive-reotex-2021.186.1.1svn34924-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919723" comment="texlive-reotex-doc-2021.186.1.1svn34924-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919724" comment="texlive-repeatindex-2021.186.0.0.01svn24305-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919725" comment="texlive-repeatindex-doc-2021.186.0.0.01svn24305-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919726" comment="texlive-repere-2021.186.19.06svn51363-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919727" comment="texlive-repere-doc-2021.186.19.06svn51363-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919728" comment="texlive-repltext-2021.186.1.1svn56433-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919729" comment="texlive-repltext-doc-2021.186.1.1svn56433-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919730" comment="texlive-rerunfilecheck-2021.186.1.9svn54841-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919731" comment="texlive-rerunfilecheck-doc-2021.186.1.9svn54841-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919732" comment="texlive-resphilosophica-2021.186.1.35svn50935-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919733" comment="texlive-resphilosophica-doc-2021.186.1.35svn50935-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919734" comment="texlive-rest-api-2021.186.1.4svn57068-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919735" comment="texlive-rest-api-doc-2021.186.1.4svn57068-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919736" comment="texlive-resumecls-2021.186.0.0.4.1svn54815-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919737" comment="texlive-resumecls-doc-2021.186.0.0.4.1svn54815-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919738" comment="texlive-resumemac-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919739" comment="texlive-resumemac-doc-2021.186.svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919740" comment="texlive-returntogrid-2021.186.0.0.2svn48485-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919741" comment="texlive-returntogrid-doc-2021.186.0.0.2svn48485-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919742" comment="texlive-reverxii-2021.186.svn24976-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919743" comment="texlive-revquantum-2021.186.0.0.11svn43505-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919744" comment="texlive-revquantum-doc-2021.186.0.0.11svn43505-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919745" comment="texlive-revtex-2021.186.4.2esvn56591-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919746" comment="texlive-revtex-doc-2021.186.4.2esvn56591-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919747" comment="texlive-revtex4-2021.186.4.0asvn56589-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919748" comment="texlive-revtex4-1-2021.186.4.1ssvn56590-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919749" comment="texlive-revtex4-1-doc-2021.186.4.1ssvn56590-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919750" comment="texlive-revtex4-doc-2021.186.4.0asvn56589-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919751" comment="texlive-rgltxdoc-2021.186.1.3svn53858-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919752" comment="texlive-rgltxdoc-doc-2021.186.1.3svn53858-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919753" comment="texlive-ribbonproofs-2021.186.1.0svn31137-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919754" comment="texlive-ribbonproofs-doc-2021.186.1.0svn31137-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919755" comment="texlive-rjlparshap-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919756" comment="texlive-rjlparshap-doc-2021.186.1.0svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919757" comment="texlive-rlepsf-2021.186.svn19082-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919758" comment="texlive-rlepsf-doc-2021.186.svn19082-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919759" comment="texlive-rmathbr-2021.186.1.1.1svn57173-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919760" comment="texlive-rmathbr-doc-2021.186.1.1.1svn57173-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919761" comment="texlive-rmpage-2021.186.0.0.92svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919762" comment="texlive-rmpage-doc-2021.186.0.0.92svn54080-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919763" comment="texlive-roboto-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919764" comment="texlive-roboto-doc-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919765" comment="texlive-roboto-fonts-2021.186.svn54512-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919766" comment="texlive-robustcommand-2021.186.0.0.1svn15878-46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919767" comment="texlive-robustcommand-doc-2021.186.0.0.1svn15878-46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249774" version="1" class="patch">
	<metadata>
		<title>texlive-robustindex-2021.186.svn49877-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-robustindex-2021.186.svn49877-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009919768" comment="texlive-robustindex-2021.186.svn49877-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919769" comment="texlive-robustindex-doc-2021.186.svn49877-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919770" comment="texlive-roex-2021.186.svn45818-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919771" comment="texlive-rojud-2021.186.1.2svn56895-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919772" comment="texlive-rojud-doc-2021.186.1.2svn56895-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919773" comment="texlive-rojud-fonts-2021.186.1.2svn56895-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919774" comment="texlive-romanbar-2021.186.1.0fsvn25005-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919775" comment="texlive-romanbar-doc-2021.186.1.0fsvn25005-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919776" comment="texlive-romanbarpagenumber-2021.186.1.0svn36236-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919777" comment="texlive-romanbarpagenumber-doc-2021.186.1.0svn36236-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919778" comment="texlive-romande-2021.186.1.008_v7_scsvn19537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919779" comment="texlive-romande-doc-2021.186.1.008_v7_scsvn19537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919780" comment="texlive-romande-fonts-2021.186.1.008_v7_scsvn19537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919781" comment="texlive-romanneg-2021.186.svn20087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919782" comment="texlive-romanneg-doc-2021.186.svn20087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919783" comment="texlive-romannum-2021.186.1.0bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919784" comment="texlive-romannum-doc-2021.186.1.0bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919785" comment="texlive-rosario-2021.186.2.1svn51688-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919786" comment="texlive-rosario-doc-2021.186.2.1svn51688-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919787" comment="texlive-rosario-fonts-2021.186.2.1svn51688-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919788" comment="texlive-rotfloat-2021.186.1.2svn18292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919789" comment="texlive-rotfloat-doc-2021.186.1.2svn18292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919790" comment="texlive-rotpages-2021.186.3.0svn18740-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919791" comment="texlive-rotpages-doc-2021.186.3.0svn18740-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919792" comment="texlive-roundbox-2021.186.0.0.2svn29675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919793" comment="texlive-roundbox-doc-2021.186.0.0.2svn29675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919794" comment="texlive-roundrect-2021.186.2.2svn39796-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919795" comment="texlive-roundrect-doc-2021.186.2.2svn39796-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919796" comment="texlive-rrgtrees-2021.186.1.1svn27322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919797" comment="texlive-rrgtrees-doc-2021.186.1.1svn27322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919798" comment="texlive-rsc-2021.186.3.1fsvn41923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919799" comment="texlive-rsc-doc-2021.186.3.1fsvn41923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919800" comment="texlive-rsfs-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919801" comment="texlive-rsfs-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919802" comment="texlive-rsfs-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919803" comment="texlive-rsfso-2021.186.1.02svn37965-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919804" comment="texlive-rsfso-doc-2021.186.1.02svn37965-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919805" comment="texlive-rterface-2021.186.svn30084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919806" comment="texlive-rterface-doc-2021.186.svn30084-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919807" comment="texlive-rtkinenc-2021.186.1.0svn20003-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919808" comment="texlive-rtkinenc-doc-2021.186.1.0svn20003-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919809" comment="texlive-rtklage-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919810" comment="texlive-rtklage-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919811" comment="texlive-rubik-2021.186.5.0svn46791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919812" comment="texlive-rubik-doc-2021.186.5.0svn46791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919813" comment="texlive-ruhyphen-2021.186.1.6svn21081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919814" comment="texlive-ruler-2021.186.1.1svn54251-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919815" comment="texlive-rulerbox-2021.186.1.01svn50984-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919816" comment="texlive-rulerbox-doc-2021.186.1.01svn50984-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919817" comment="texlive-rulercompass-2021.186.1svn32392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919818" comment="texlive-rulercompass-doc-2021.186.1svn32392-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919819" comment="texlive-runcode-2021.186.1.0svn56594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919820" comment="texlive-runcode-doc-2021.186.1.0svn56594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919821" comment="texlive-russ-2021.186.svn25209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919822" comment="texlive-russ-doc-2021.186.svn25209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919823" comment="texlive-rutitlepage-2021.186.2.3svn51073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919824" comment="texlive-rutitlepage-doc-2021.186.2.3svn51073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919825" comment="texlive-rviewport-2021.186.1.0svn23739-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919826" comment="texlive-rviewport-doc-2021.186.1.0svn23739-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919827" comment="texlive-rvwrite-2021.186.1.2svn19614-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919828" comment="texlive-rvwrite-doc-2021.186.1.2svn19614-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919829" comment="texlive-ryersonsgsthesis-2021.186.1.0.3svn50119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919830" comment="texlive-ryersonsgsthesis-doc-2021.186.1.0.3svn50119-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919831" comment="texlive-ryethesis-2021.186.1.36svn33945-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919832" comment="texlive-ryethesis-doc-2021.186.1.36svn33945-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919833" comment="texlive-sa-tikz-2021.186.0.0.7asvn32815-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919834" comment="texlive-sa-tikz-doc-2021.186.0.0.7asvn32815-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919835" comment="texlive-sageep-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919836" comment="texlive-sageep-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919837" comment="texlive-sanitize-umlaut-2021.186.1.10svn53292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919838" comment="texlive-sanitize-umlaut-doc-2021.186.1.10svn53292-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919839" comment="texlive-sankey-2021.186.3.0svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919840" comment="texlive-sankey-doc-2021.186.3.0svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919841" comment="texlive-sanskrit-2021.186.2.2.1svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919842" comment="texlive-sanskrit-doc-2021.186.2.2.1svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919843" comment="texlive-sanskrit-t1-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919844" comment="texlive-sanskrit-t1-doc-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919845" comment="texlive-sanskrit-t1-fonts-2021.186.svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919846" comment="texlive-sansmath-2021.186.1.1svn17997-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919847" comment="texlive-sansmath-doc-2021.186.1.1svn17997-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919848" comment="texlive-sansmathaccent-2021.186.svn53628-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919849" comment="texlive-sansmathaccent-doc-2021.186.svn53628-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919850" comment="texlive-sansmathfonts-2021.186.svn51356-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919851" comment="texlive-sansmathfonts-doc-2021.186.svn51356-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919852" comment="texlive-sansmathfonts-fonts-2021.186.svn51356-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919853" comment="texlive-sapthesis-2021.186.4.1svn48365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919854" comment="texlive-sapthesis-doc-2021.186.4.1svn48365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919855" comment="texlive-sasnrdisplay-2021.186.0.0.95svn45963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919856" comment="texlive-sasnrdisplay-doc-2021.186.0.0.95svn45963-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919857" comment="texlive-sauerj-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919858" comment="texlive-sauerj-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919859" comment="texlive-sauter-2021.186.2.4svn13293-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919860" comment="texlive-sauterfonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919861" comment="texlive-sauterfonts-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919862" comment="texlive-savefnmark-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919863" comment="texlive-savefnmark-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919864" comment="texlive-savesym-2021.186.1.2svn31565-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919865" comment="texlive-savetrees-2021.186.2.4svn40525-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919866" comment="texlive-savetrees-doc-2021.186.2.4svn40525-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919867" comment="texlive-scale-2021.186.1.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919868" comment="texlive-scale-doc-2021.186.1.1.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919869" comment="texlive-scalebar-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919870" comment="texlive-scalebar-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919871" comment="texlive-scalerel-2021.186.1.8svn42809-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919872" comment="texlive-scalerel-doc-2021.186.1.8svn42809-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919873" comment="texlive-scanpages-2021.186.1.05asvn42633-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919874" comment="texlive-scanpages-doc-2021.186.1.05asvn42633-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919875" comment="texlive-scanpages-fonts-2021.186.1.05asvn42633-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919876" comment="texlive-schedule-2021.186.1.20svn51805-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919877" comment="texlive-schedule-doc-2021.186.1.20svn51805-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919878" comment="texlive-schemabloc-2021.186.1.5svn58212-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919879" comment="texlive-schemabloc-doc-2021.186.1.5svn58212-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919880" comment="texlive-schemata-2021.186.1.4svn58020-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919881" comment="texlive-schemata-doc-2021.186.1.4svn58020-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919882" comment="texlive-scholax-2021.186.1.030svn58733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919883" comment="texlive-scholax-doc-2021.186.1.030svn58733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919884" comment="texlive-scholax-fonts-2021.186.1.030svn58733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919885" comment="texlive-schooldocs-2021.186.1.0svn55838-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919886" comment="texlive-schooldocs-doc-2021.186.1.0svn55838-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919887" comment="texlive-schule-2021.186.0.0.8.2svn56683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919888" comment="texlive-schule-doc-2021.186.0.0.8.2svn56683-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919889" comment="texlive-schulmathematik-2021.186.1.1svn58359-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919890" comment="texlive-schulmathematik-doc-2021.186.1.1svn58359-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919891" comment="texlive-schulschriften-2021.186.4svn35730-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919892" comment="texlive-schulschriften-doc-2021.186.4svn35730-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919893" comment="texlive-schwalbe-chess-2021.186.2.7svn53305-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919894" comment="texlive-schwalbe-chess-doc-2021.186.2.7svn53305-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919895" comment="texlive-scientific-thesis-cover-2021.186.4.0.2svn47923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919896" comment="texlive-scientific-thesis-cover-doc-2021.186.4.0.2svn47923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919897" comment="texlive-sciposter-2021.186.1.18svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919898" comment="texlive-sciposter-doc-2021.186.1.18svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919899" comment="texlive-sclang-prettifier-2021.186.0.0.1svn35087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919900" comment="texlive-sclang-prettifier-doc-2021.186.0.0.1svn35087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919901" comment="texlive-scontents-2021.186.1.9svn53504-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919902" comment="texlive-scontents-doc-2021.186.1.9svn53504-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919903" comment="texlive-scratch-2021.186.0.0.41svn50073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919904" comment="texlive-scratch-doc-2021.186.0.0.41svn50073-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919905" comment="texlive-scratch3-2021.186.0.0.18svn56258-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919906" comment="texlive-scratch3-doc-2021.186.0.0.18svn56258-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919907" comment="texlive-scratchx-2021.186.1.1svn44906-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919908" comment="texlive-scratchx-doc-2021.186.1.1svn44906-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919909" comment="texlive-screenplay-2021.186.1.6svn27223-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919910" comment="texlive-screenplay-doc-2021.186.1.6svn27223-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919911" comment="texlive-screenplay-pkg-2021.186.1.1svn44965-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919912" comment="texlive-screenplay-pkg-doc-2021.186.1.1svn44965-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919913" comment="texlive-scrjrnl-2021.186.0.0.1svn27810-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919914" comment="texlive-scrjrnl-doc-2021.186.0.0.1svn27810-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919915" comment="texlive-scrlayer-fancyhdr-2021.186.0.0.2.1svn58746-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919916" comment="texlive-scrlayer-fancyhdr-doc-2021.186.0.0.2.1svn58746-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919917" comment="texlive-scrlttr2copy-2021.186.0.0.3asvn56733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919918" comment="texlive-scrlttr2copy-doc-2021.186.0.0.3asvn56733-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919919" comment="texlive-scsnowman-2021.186.1.2dsvn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919920" comment="texlive-scsnowman-doc-2021.186.1.2dsvn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919921" comment="texlive-sdaps-2021.186.1.9.8svn54678-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919922" comment="texlive-sdaps-doc-2021.186.1.9.8svn54678-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919923" comment="texlive-sdrt-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919924" comment="texlive-sdrt-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919925" comment="texlive-sduthesis-2021.186.1.2.1svn41401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919926" comment="texlive-sduthesis-doc-2021.186.1.2.1svn41401-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919927" comment="texlive-secdot-2021.186.1.0svn20208-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919928" comment="texlive-secdot-doc-2021.186.1.0svn20208-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919929" comment="texlive-secnum-2021.186.svn53657-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919930" comment="texlive-secnum-doc-2021.186.svn53657-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919931" comment="texlive-section-2021.186.svn20180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919932" comment="texlive-section-doc-2021.186.svn20180-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919933" comment="texlive-sectionbox-2021.186.1.01svn37749-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919934" comment="texlive-sectionbox-doc-2021.186.1.01svn37749-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919935" comment="texlive-sectionbreak-2021.186.0.0.1dsvn50339-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919936" comment="texlive-sectionbreak-doc-2021.186.0.0.1dsvn50339-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919937" comment="texlive-sectsty-2021.186.2.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919938" comment="texlive-sectsty-doc-2021.186.2.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919939" comment="texlive-seealso-2021.186.1.2svn43595-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919940" comment="texlive-seealso-doc-2021.186.1.2svn43595-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919941" comment="texlive-seetexk-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919942" comment="texlive-selectp-2021.186.1.0svn20185-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919943" comment="texlive-selectp-doc-2021.186.1.0svn20185-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919944" comment="texlive-selinput-2021.186.1.6svn53098-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919945" comment="texlive-selinput-doc-2021.186.1.6svn53098-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919946" comment="texlive-selnolig-2021.186.0.0.302svn38721-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919947" comment="texlive-selnolig-doc-2021.186.0.0.302svn38721-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919948" comment="texlive-semantex-2021.186.0.0.463svn56863-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919949" comment="texlive-semantex-doc-2021.186.0.0.463svn56863-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919950" comment="texlive-semantic-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919951" comment="texlive-semantic-doc-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919952" comment="texlive-semantic-markup-2021.186.svn53607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919953" comment="texlive-semantic-markup-doc-2021.186.svn53607-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919954" comment="texlive-semaphor-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919955" comment="texlive-semaphor-doc-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919956" comment="texlive-semaphor-fonts-2021.186.svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919957" comment="texlive-semesterplanner-2021.186.1.0svn56841-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919958" comment="texlive-semesterplanner-doc-2021.186.1.0svn56841-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919959" comment="texlive-seminar-2021.186.1.62svn34011-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919960" comment="texlive-seminar-doc-2021.186.1.62svn34011-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919961" comment="texlive-semioneside-2021.186.0.0.41svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919962" comment="texlive-semioneside-doc-2021.186.0.0.41svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919963" comment="texlive-semproc-2021.186.0.0.1svn37568-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919964" comment="texlive-semproc-doc-2021.186.0.0.1svn37568-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919965" comment="texlive-semtex-2021.186.0.0.45svn56530-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919966" comment="texlive-semtex-doc-2021.186.0.0.45svn56530-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919967" comment="texlive-sepfootnotes-2021.186.0.0.3csvn41732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919968" comment="texlive-sepfootnotes-doc-2021.186.0.0.3csvn41732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919969" comment="texlive-sepnum-2021.186.2.0svn20186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919970" comment="texlive-sepnum-doc-2021.186.2.0svn20186-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919971" comment="texlive-seqsplit-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919972" comment="texlive-seqsplit-doc-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919973" comment="texlive-serbian-apostrophe-2021.186.svn23799-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919974" comment="texlive-serbian-apostrophe-doc-2021.186.svn23799-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919975" comment="texlive-serbian-date-lat-2021.186.svn23446-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919976" comment="texlive-serbian-date-lat-doc-2021.186.svn23446-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919977" comment="texlive-serbian-def-cyr-2021.186.svn23734-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919978" comment="texlive-serbian-def-cyr-doc-2021.186.svn23734-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919979" comment="texlive-serbian-lig-2021.186.svn53127-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919980" comment="texlive-serbian-lig-doc-2021.186.svn53127-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919981" comment="texlive-sesamanuel-2021.186.0.0.6svn36613-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919982" comment="texlive-sesamanuel-doc-2021.186.0.0.6svn36613-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919983" comment="texlive-sesstime-2021.186.1.12svn49750-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919984" comment="texlive-sesstime-doc-2021.186.1.12svn49750-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919985" comment="texlive-setdeck-2021.186.0.0.1svn40613-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919986" comment="texlive-setdeck-doc-2021.186.0.0.1svn40613-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919987" comment="texlive-setspace-2021.186.6.7asvn24881-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919988" comment="texlive-setspace-doc-2021.186.6.7asvn24881-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919989" comment="texlive-seuthesis-2021.186.2.1.2svn33042-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919990" comment="texlive-seuthesis-doc-2021.186.2.1.2svn33042-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919991" comment="texlive-seuthesix-2021.186.1.0.1svn40088-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919992" comment="texlive-seuthesix-doc-2021.186.1.0.1svn40088-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919993" comment="texlive-sexam-2021.186.1svn46628-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919994" comment="texlive-sexam-doc-2021.186.1svn46628-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919995" comment="texlive-sf298-2021.186.1.3svn41653-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919996" comment="texlive-sf298-doc-2021.186.1.3svn41653-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919997" comment="texlive-sffms-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919998" comment="texlive-sffms-doc-2021.186.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009919999" comment="texlive-sfg-2021.186.0.0.91svn20209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920000" comment="texlive-sfg-doc-2021.186.0.0.91svn20209-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920001" comment="texlive-sfmath-2021.186.0.0.8svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920002" comment="texlive-sgame-2021.186.2.15svn30959-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920003" comment="texlive-sgame-doc-2021.186.2.15svn30959-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920004" comment="texlive-shade-2021.186.1svn22212-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920005" comment="texlive-shade-doc-2021.186.1svn22212-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920006" comment="texlive-shadethm-2021.186.svn53350-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920007" comment="texlive-shadethm-doc-2021.186.svn53350-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920008" comment="texlive-shadow-2021.186.svn20312-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920009" comment="texlive-shadow-doc-2021.186.svn20312-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920010" comment="texlive-shadowtext-2021.186.0.0.3svn26522-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920011" comment="texlive-shadowtext-doc-2021.186.0.0.3svn26522-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920012" comment="texlive-shapepar-2021.186.2.2svn30708-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920013" comment="texlive-shapepar-doc-2021.186.2.2svn30708-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920014" comment="texlive-shapes-2021.186.1.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920015" comment="texlive-shapes-doc-2021.186.1.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920016" comment="texlive-shdoc-2021.186.2.1bsvn41991-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920017" comment="texlive-shdoc-doc-2021.186.2.1bsvn41991-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920018" comment="texlive-shipunov-2021.186.1.2svn52334-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920019" comment="texlive-shipunov-doc-2021.186.1.2svn52334-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920020" comment="texlive-shobhika-2021.186.1.05svn50555-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920021" comment="texlive-shobhika-doc-2021.186.1.05svn50555-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920022" comment="texlive-shobhika-fonts-2021.186.1.05svn50555-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920023" comment="texlive-short-math-guide-2021.186.2.0svn46126-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920024" comment="texlive-shortmathj-2021.186.0.0.5.0svn54407-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920025" comment="texlive-shortmathj-doc-2021.186.0.0.5.0svn54407-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920026" comment="texlive-shorttoc-2021.186.1.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920027" comment="texlive-shorttoc-doc-2021.186.1.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920028" comment="texlive-show2e-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920029" comment="texlive-show2e-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920030" comment="texlive-showcharinbox-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920031" comment="texlive-showcharinbox-doc-2021.186.0.0.1svn29803-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920032" comment="texlive-showdim-2021.186.1.2svn28918-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920033" comment="texlive-showdim-doc-2021.186.1.2svn28918-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920034" comment="texlive-showexpl-2021.186.0.0.3ssvn57414-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920035" comment="texlive-showexpl-doc-2021.186.0.0.3ssvn57414-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920036" comment="texlive-showhyphens-2021.186.0.0.5csvn39787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920037" comment="texlive-showhyphens-doc-2021.186.0.0.5csvn39787-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920038" comment="texlive-showlabels-2021.186.1.8svn41322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920039" comment="texlive-showlabels-doc-2021.186.1.8svn41322-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920040" comment="texlive-showtags-2021.186.1.05svn20336-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920041" comment="texlive-showtags-doc-2021.186.1.05svn20336-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920042" comment="texlive-shtthesis-2021.186.0.0.3.2svn57740-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920043" comment="texlive-shtthesis-doc-2021.186.0.0.3.2svn57740-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920044" comment="texlive-shuffle-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920045" comment="texlive-shuffle-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920046" comment="texlive-sidecap-2021.186.1.6fsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920047" comment="texlive-sidecap-doc-2021.186.1.6fsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920048" comment="texlive-sidenotes-2021.186.1.00asvn54524-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920049" comment="texlive-sidenotes-doc-2021.186.1.00asvn54524-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920050" comment="texlive-sides-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920051" comment="texlive-sides-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920052" comment="texlive-signchart-2021.186.1.01svn39707-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920053" comment="texlive-signchart-doc-2021.186.1.01svn39707-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920054" comment="texlive-silence-2021.186.1.5bsvn27028-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920055" comment="texlive-silence-doc-2021.186.1.5bsvn27028-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920056" comment="texlive-simple-resume-cv-2021.186.svn43057-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920057" comment="texlive-simple-resume-cv-doc-2021.186.svn43057-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920058" comment="texlive-simple-thesis-dissertation-2021.186.svn43058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920059" comment="texlive-simple-thesis-dissertation-doc-2021.186.svn43058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920060" comment="texlive-simplebnf-2021.186.0.0.2.0svn56761-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920061" comment="texlive-simplebnf-doc-2021.186.0.0.2.0svn56761-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920062" comment="texlive-simplecd-2021.186.1.4svn29260-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920063" comment="texlive-simplecd-doc-2021.186.1.4svn29260-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920064" comment="texlive-simplecv-2021.186.1.6asvn35537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920065" comment="texlive-simplecv-doc-2021.186.1.6asvn35537-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920066" comment="texlive-simpleinvoice-2021.186.svn45673-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920067" comment="texlive-simpleinvoice-doc-2021.186.svn45673-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920068" comment="texlive-simplekv-2021.186.0.0.2svn54915-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920069" comment="texlive-simplekv-doc-2021.186.0.0.2svn54915-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920070" comment="texlive-simpleoptics-2021.186.1.1.1svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920071" comment="texlive-simpleoptics-doc-2021.186.1.1.1svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920072" comment="texlive-simpler-wick-2021.186.1.0.0svn39074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920073" comment="texlive-simpler-wick-doc-2021.186.1.0.0svn39074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920074" comment="texlive-simplewick-2021.186.1.2asvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920075" comment="texlive-simplewick-doc-2021.186.1.2asvn15878-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249775" version="1" class="patch">
	<metadata>
		<title>texlive-simplified-latex-2021.186.svn20620-50.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-simplified-latex-2021.186.svn20620-50.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009920076" comment="texlive-simplified-latex-2021.186.svn20620-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920077" comment="texlive-simplivre-2021.186.svn58414-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920078" comment="texlive-simplivre-doc-2021.186.svn58414-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920079" comment="texlive-simurgh-2021.186.0.0.01bsvn31719-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920080" comment="texlive-simurgh-doc-2021.186.0.0.01bsvn31719-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920081" comment="texlive-sitem-2021.186.1.0svn22136-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920082" comment="texlive-sitem-doc-2021.186.1.0svn22136-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920083" comment="texlive-siunitx-2021.186.2.8csvn58714-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920084" comment="texlive-siunitx-doc-2021.186.2.8csvn58714-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920085" comment="texlive-skak-2021.186.1.5.3svn46259-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920086" comment="texlive-skak-doc-2021.186.1.5.3svn46259-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920087" comment="texlive-skaknew-2021.186.svn20031-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920088" comment="texlive-skaknew-doc-2021.186.svn20031-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920089" comment="texlive-skaknew-fonts-2021.186.svn20031-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920090" comment="texlive-skb-2021.186.0.0.52svn22781-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920091" comment="texlive-skb-doc-2021.186.0.0.52svn22781-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920092" comment="texlive-skdoc-2021.186.1.5dsvn56950-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920093" comment="texlive-skdoc-doc-2021.186.1.5dsvn56950-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920094" comment="texlive-skeldoc-2021.186.0.0.1.2svn57922-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920095" comment="texlive-skeldoc-doc-2021.186.0.0.1.2svn57922-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920096" comment="texlive-skeycommand-2021.186.0.0.4svn24652-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920097" comment="texlive-skeycommand-doc-2021.186.0.0.4svn24652-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920098" comment="texlive-skeyval-2021.186.1.3svn30560-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920099" comment="texlive-skeyval-doc-2021.186.1.3svn30560-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920100" comment="texlive-skills-2021.186.1.0.0svn56734-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920101" comment="texlive-skills-doc-2021.186.1.0.0svn56734-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920102" comment="texlive-skmath-2021.186.0.0.5asvn52411-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920103" comment="texlive-skmath-doc-2021.186.0.0.5asvn52411-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920104" comment="texlive-skrapport-2021.186.0.0.12ksvn52412-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920105" comment="texlive-skrapport-doc-2021.186.0.0.12ksvn52412-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920106" comment="texlive-skull-2021.186.0.0.1svn51907-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920107" comment="texlive-slantsc-2021.186.2.11svn25007-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920108" comment="texlive-slantsc-doc-2021.186.2.11svn25007-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920109" comment="texlive-slideshow-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920110" comment="texlive-slideshow-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920111" comment="texlive-smalltableof-2021.186.svn20333-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920112" comment="texlive-smalltableof-doc-2021.186.svn20333-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920113" comment="texlive-smartdiagram-2021.186.0.0.3bsvn42781-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920114" comment="texlive-smartdiagram-doc-2021.186.0.0.3bsvn42781-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920115" comment="texlive-smartref-2021.186.1.9svn20311-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920116" comment="texlive-smartref-doc-2021.186.1.9svn20311-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920117" comment="texlive-smartunits-2021.186.1.2svn39592-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920118" comment="texlive-smartunits-doc-2021.186.1.2svn39592-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920119" comment="texlive-snapshot-2021.186.2.14svn56735-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920120" comment="texlive-snapshot-doc-2021.186.2.14svn56735-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920121" comment="texlive-snotez-2021.186.0.0.5asvn57147-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920122" comment="texlive-snotez-doc-2021.186.0.0.5asvn57147-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920123" comment="texlive-songbook-2021.186.4.5svn18136-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920124" comment="texlive-songbook-doc-2021.186.4.5svn18136-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920125" comment="texlive-songs-2021.186.3.1svn51494-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920126" comment="texlive-songs-doc-2021.186.3.1svn51494-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920127" comment="texlive-sort-by-letters-2021.186.svn27128-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920128" comment="texlive-sort-by-letters-doc-2021.186.svn27128-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920129" comment="texlive-soton-2021.186.0.0.1svn16215-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920130" comment="texlive-soton-doc-2021.186.0.0.1svn16215-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920131" comment="texlive-soul-2021.186.2.4svn56495-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920132" comment="texlive-soul-doc-2021.186.2.4svn56495-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920133" comment="texlive-soulpos-2021.186.1.1svn52663-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920134" comment="texlive-soulpos-doc-2021.186.1.1svn52663-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920135" comment="texlive-soulutf8-2021.186.1.2svn53163-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920136" comment="texlive-soulutf8-doc-2021.186.1.2svn53163-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920137" comment="texlive-soup-2021.186.1.0.2svn50815-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920138" comment="texlive-soup-doc-2021.186.1.0.2svn50815-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920139" comment="texlive-sourcecodepro-2021.186.2.7svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920140" comment="texlive-sourcecodepro-doc-2021.186.2.7svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920141" comment="texlive-sourcecodepro-fonts-2021.186.2.7svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920142" comment="texlive-sourcesanspro-2021.186.2.8svn54892-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920143" comment="texlive-sourcesanspro-doc-2021.186.2.8svn54892-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920144" comment="texlive-sourcesanspro-fonts-2021.186.2.8svn54892-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920145" comment="texlive-sourceserifpro-2021.186.1.4svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920146" comment="texlive-sourceserifpro-doc-2021.186.1.4svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920147" comment="texlive-sourceserifpro-fonts-2021.186.1.4svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920148" comment="texlive-spacingtricks-2021.186.1.3svn56840-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920149" comment="texlive-spacingtricks-doc-2021.186.1.3svn56840-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920150" comment="texlive-spalign-2021.186.svn42225-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920151" comment="texlive-spalign-doc-2021.186.svn42225-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920152" comment="texlive-spark-otf-2021.186.0.0.05svn51005-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920153" comment="texlive-spark-otf-doc-2021.186.0.0.05svn51005-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920154" comment="texlive-sparklines-2021.186.1.7svn42821-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920155" comment="texlive-sparklines-doc-2021.186.1.7svn42821-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920156" comment="texlive-spath3-2021.186.2.4svn57842-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920157" comment="texlive-spath3-doc-2021.186.2.4svn57842-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920158" comment="texlive-spectral-2021.186.svn57296-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920159" comment="texlive-spectral-doc-2021.186.svn57296-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920160" comment="texlive-spectral-fonts-2021.186.svn57296-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920161" comment="texlive-spectralsequences-2021.186.1.2.2svn50072-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920162" comment="texlive-spectralsequences-doc-2021.186.1.2.2svn50072-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920163" comment="texlive-spelling-2021.186.0.0.41svn30715-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920164" comment="texlive-spelling-doc-2021.186.0.0.41svn30715-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920165" comment="texlive-sphdthesis-2021.186.1.0svn34374-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920166" comment="texlive-sphdthesis-doc-2021.186.1.0svn34374-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920167" comment="texlive-spie-2021.186.3.25svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920168" comment="texlive-spie-doc-2021.186.3.25svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920169" comment="texlive-spix-2021.186.1.1.0svn55933-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920170" comment="texlive-spix-doc-2021.186.1.1.0svn55933-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920171" comment="texlive-splines-2021.186.0.0.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920172" comment="texlive-splines-doc-2021.186.0.0.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920173" comment="texlive-splitbib-2021.186.1.17svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920174" comment="texlive-splitbib-doc-2021.186.1.17svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920175" comment="texlive-splitindex-2021.186.1.2csvn39766-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920176" comment="texlive-splitindex-doc-2021.186.1.2csvn39766-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920177" comment="texlive-spot-2021.186.1.1svn22408-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920178" comment="texlive-spot-doc-2021.186.1.1svn22408-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920179" comment="texlive-spotcolor-2021.186.1.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920180" comment="texlive-spotcolor-doc-2021.186.1.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920181" comment="texlive-spreadtab-2021.186.0.0.5svn50147-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920182" comment="texlive-spreadtab-doc-2021.186.0.0.5svn50147-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920183" comment="texlive-spverbatim-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920184" comment="texlive-spverbatim-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920185" comment="texlive-sr-vorl-2021.186.1.1svn39529-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920186" comment="texlive-sr-vorl-doc-2021.186.1.1svn39529-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920187" comment="texlive-srbook-mem-2021.186.svn45818-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920188" comment="texlive-srbook-mem-doc-2021.186.svn45818-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920189" comment="texlive-srcltx-2021.186.1.6svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920190" comment="texlive-srcltx-doc-2021.186.1.6svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920191" comment="texlive-srcredact-2021.186.1.0svn38710-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920192" comment="texlive-srcredact-doc-2021.186.1.0svn38710-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920193" comment="texlive-srdp-mathematik-2021.186.1.9.0svn58734-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920194" comment="texlive-srdp-mathematik-doc-2021.186.1.9.0svn58734-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920195" comment="texlive-sseq-2021.186.2.01svn31585-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920196" comment="texlive-sseq-doc-2021.186.2.01svn31585-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920197" comment="texlive-sslides-2021.186.svn32293-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920198" comment="texlive-sslides-doc-2021.186.svn32293-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920199" comment="texlive-stack-2021.186.1.00svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920200" comment="texlive-stackengine-2021.186.4.01svn53843-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920201" comment="texlive-stackengine-doc-2021.186.4.01svn53843-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920202" comment="texlive-stage-2021.186.1.01svn53915-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920203" comment="texlive-stage-doc-2021.186.1.01svn53915-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920204" comment="texlive-standalone-2021.186.1.3asvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920205" comment="texlive-standalone-doc-2021.186.1.3asvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920206" comment="texlive-stanli-2021.186.3.0svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920207" comment="texlive-stanli-doc-2021.186.3.0svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920208" comment="texlive-starfont-2021.186.1.2svn19982-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920209" comment="texlive-starfont-doc-2021.186.1.2svn19982-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920210" comment="texlive-starfont-fonts-2021.186.1.2svn19982-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920211" comment="texlive-startex-2021.186.1.04svn35718-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920212" comment="texlive-startex-doc-2021.186.1.04svn35718-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920213" comment="texlive-startlatex2e-2021.186.svn56809-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920214" comment="texlive-statex-2021.186.1.6svn20306-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920215" comment="texlive-statex-doc-2021.186.1.6svn20306-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920216" comment="texlive-statex2-2021.186.2.1svn23961-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920217" comment="texlive-statex2-doc-2021.186.2.1svn23961-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920218" comment="texlive-statistics-2021.186.2.2svn52212-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920219" comment="texlive-statistics-doc-2021.186.2.2svn52212-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920220" comment="texlive-statistik-2021.186.0.0.03svn20334-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920221" comment="texlive-statistik-doc-2021.186.0.0.03svn20334-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920222" comment="texlive-statmath-2021.186.0.0.1svn46925-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920223" comment="texlive-statmath-doc-2021.186.0.0.1svn46925-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920224" comment="texlive-staves-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920225" comment="texlive-staves-doc-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920226" comment="texlive-staves-fonts-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920227" comment="texlive-stdclsdv-2021.186.1.1asvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920228" comment="texlive-stdclsdv-doc-2021.186.1.1asvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920229" comment="texlive-stdpage-2021.186.0.0.6svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920230" comment="texlive-stdpage-doc-2021.186.0.0.6svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920231" comment="texlive-stealcaps-2021.186.1.0svn46434-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920232" comment="texlive-stealcaps-doc-2021.186.1.0svn46434-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920233" comment="texlive-steinmetz-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920234" comment="texlive-steinmetz-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920235" comment="texlive-stellenbosch-2021.186.11asvn36696-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920236" comment="texlive-stellenbosch-doc-2021.186.11asvn36696-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920237" comment="texlive-step-2021.186.2.0.5svn57307-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920238" comment="texlive-step-doc-2021.186.2.0.5svn57307-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920239" comment="texlive-step-fonts-2021.186.2.0.5svn57307-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920240" comment="texlive-stepgreek-2021.186.3.0b1svn57074-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920241" comment="texlive-stepgreek-doc-2021.186.3.0b1svn57074-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920242" comment="texlive-stepgreek-fonts-2021.186.3.0b1svn57074-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920243" comment="texlive-stex-2021.186.svn50489-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920244" comment="texlive-stex-doc-2021.186.svn50489-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920245" comment="texlive-stickstoo-2021.186.1.034svn57193-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920246" comment="texlive-stickstoo-doc-2021.186.1.034svn57193-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920247" comment="texlive-stickstoo-fonts-2021.186.1.034svn57193-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920248" comment="texlive-stix-2021.186.1.1.3svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920249" comment="texlive-stix-doc-2021.186.1.1.3svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920250" comment="texlive-stix-fonts-2021.186.1.1.3svn54512-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920251" comment="texlive-stix2-otf-2021.186.2.12svn58735-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920252" comment="texlive-stix2-otf-doc-2021.186.2.12svn58735-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920253" comment="texlive-stix2-otf-fonts-2021.186.2.12svn58735-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920254" comment="texlive-stix2-type1-2021.186.2.0.2svn57448-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920255" comment="texlive-stix2-type1-doc-2021.186.2.0.2svn57448-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920256" comment="texlive-stix2-type1-fonts-2021.186.2.0.2svn57448-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920257" comment="texlive-stmaryrd-2021.186.svn22027-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920258" comment="texlive-stmaryrd-doc-2021.186.svn22027-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920259" comment="texlive-stmaryrd-fonts-2021.186.svn22027-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920260" comment="texlive-storebox-2021.186.1.3asvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920261" comment="texlive-storebox-doc-2021.186.1.3asvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920262" comment="texlive-storecmd-2021.186.0.0.0.2svn24431-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920263" comment="texlive-storecmd-doc-2021.186.0.0.0.2svn24431-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920264" comment="texlive-stricttex-2021.186.0.0.2betasvn56320-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920265" comment="texlive-stricttex-doc-2021.186.0.0.2betasvn56320-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920266" comment="texlive-stringenc-2021.186.1.12svn52982-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920267" comment="texlive-stringenc-doc-2021.186.1.12svn52982-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920268" comment="texlive-stringstrings-2021.186.1.24svn57097-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920269" comment="texlive-stringstrings-doc-2021.186.1.24svn57097-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920270" comment="texlive-structmech-2021.186.1.0svn47859-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920271" comment="texlive-struktex-2021.186.2.3c_0_g7d3fc5bsvn47931-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920272" comment="texlive-struktex-doc-2021.186.2.3c_0_g7d3fc5bsvn47931-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920273" comment="texlive-sttools-2021.186.2.1svn56774-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920274" comment="texlive-sttools-doc-2021.186.2.1svn56774-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920275" comment="texlive-stubs-2021.186.0.0.1.1svn19440-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920276" comment="texlive-stubs-doc-2021.186.0.0.1.1svn19440-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920277" comment="texlive-studenthandouts-2021.186.1.0svn43516-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920278" comment="texlive-studenthandouts-doc-2021.186.1.0svn43516-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920279" comment="texlive-sty2dtx-2021.186.2.3svn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920280" comment="texlive-sty2dtx-doc-2021.186.2.3svn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920281" comment="texlive-suanpan-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920282" comment="texlive-suanpan-doc-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920283" comment="texlive-subdepth-2021.186.0.0.1svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920284" comment="texlive-subdepth-doc-2021.186.0.0.1svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920285" comment="texlive-subdocs-2021.186.0.0.1svn51480-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920286" comment="texlive-subdocs-doc-2021.186.0.0.1svn51480-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920287" comment="texlive-subeqn-2021.186.2.0bsvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920288" comment="texlive-subeqn-doc-2021.186.2.0bsvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920289" comment="texlive-subeqnarray-2021.186.2.1csvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920290" comment="texlive-subeqnarray-doc-2021.186.2.1csvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920291" comment="texlive-subfig-2021.186.1.3svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920292" comment="texlive-subfig-doc-2021.186.1.3svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920293" comment="texlive-subfigmat-2021.186.1.0svn20308-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920294" comment="texlive-subfigmat-doc-2021.186.1.0svn20308-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920295" comment="texlive-subfigure-2021.186.2.1.5svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920296" comment="texlive-subfigure-doc-2021.186.2.1.5svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920297" comment="texlive-subfiles-2021.186.2.2svn56977-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920298" comment="texlive-subfiles-doc-2021.186.2.2svn56977-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920299" comment="texlive-subfloat-2021.186.2.14svn29349-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920300" comment="texlive-subfloat-doc-2021.186.2.14svn29349-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920301" comment="texlive-substances-2021.186.0.0.2asvn40989-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920302" comment="texlive-substances-doc-2021.186.0.0.2asvn40989-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920303" comment="texlive-substitutefont-2021.186.0.0.1.4svn32066-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920304" comment="texlive-substitutefont-doc-2021.186.0.0.1.4svn32066-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920305" comment="texlive-substr-2021.186.1.2svn16117-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920306" comment="texlive-substr-doc-2021.186.1.2svn16117-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920307" comment="texlive-subsupscripts-2021.186.1.0svn16080-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920308" comment="texlive-subsupscripts-doc-2021.186.1.0svn16080-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920309" comment="texlive-subtext-2021.186.1.1svn51273-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920310" comment="texlive-subtext-doc-2021.186.1.1svn51273-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920311" comment="texlive-sudoku-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920312" comment="texlive-sudoku-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920313" comment="texlive-sudokubundle-2021.186.1.0asvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920314" comment="texlive-sudokubundle-doc-2021.186.1.0asvn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920315" comment="texlive-suftesi-2021.186.3.0.2svn57650-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920316" comment="texlive-suftesi-doc-2021.186.3.0.2svn57650-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920317" comment="texlive-sugconf-2021.186.svn58752-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920318" comment="texlive-sugconf-doc-2021.186.svn58752-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920319" comment="texlive-superiors-2021.186.1.06svn51909-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920320" comment="texlive-superiors-doc-2021.186.1.06svn51909-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920321" comment="texlive-superiors-fonts-2021.186.1.06svn51909-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920322" comment="texlive-supertabular-2021.186.4.1gsvn53658-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920323" comment="texlive-supertabular-doc-2021.186.4.1gsvn53658-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920324" comment="texlive-suppose-2021.186.1.2svn58736-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920325" comment="texlive-suppose-doc-2021.186.1.2svn58736-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920326" comment="texlive-susy-2021.186.svn19440-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920327" comment="texlive-susy-doc-2021.186.svn19440-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920328" comment="texlive-svg-2021.186.2.02ksvn57010-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920329" comment="texlive-svg-doc-2021.186.2.02ksvn57010-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920330" comment="texlive-svg-inkscape-2021.186.svn32199-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920331" comment="texlive-svgcolor-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920332" comment="texlive-svgcolor-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920333" comment="texlive-svn-2021.186.43svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920334" comment="texlive-svn-doc-2021.186.43svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920335" comment="texlive-svn-multi-2021.186.2.4dsvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920336" comment="texlive-svn-multi-doc-2021.186.2.4dsvn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920337" comment="texlive-svn-prov-2021.186.3.1862svn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920338" comment="texlive-svn-prov-doc-2021.186.3.1862svn56291-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920339" comment="texlive-svninfo-2021.186.0.0.7.4svn17554-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920340" comment="texlive-svninfo-doc-2021.186.0.0.7.4svn17554-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920341" comment="texlive-svrsymbols-2021.186.2.0bsvn50019-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920342" comment="texlive-svrsymbols-doc-2021.186.2.0bsvn50019-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920343" comment="texlive-svrsymbols-fonts-2021.186.2.0bsvn50019-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920344" comment="texlive-swebib-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920345" comment="texlive-swebib-doc-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920346" comment="texlive-swfigure-2021.186.0.0.9.18svn57213-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920347" comment="texlive-swfigure-doc-2021.186.0.0.9.18svn57213-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920348" comment="texlive-swimgraf-2021.186.svn25446-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920349" comment="texlive-swimgraf-doc-2021.186.svn25446-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920350" comment="texlive-swrule-2021.186.svn54267-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920351" comment="texlive-syllogism-2021.186.1.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920352" comment="texlive-syllogism-doc-2021.186.1.2svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920353" comment="texlive-symbol-2021.186.svn31835-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920354" comment="texlive-symbol-fonts-2021.186.svn31835-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920355" comment="texlive-synctex-2021.186.svn54074-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920356" comment="texlive-synproof-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920357" comment="texlive-synproof-doc-2021.186.1.0svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920358" comment="texlive-syntax-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920359" comment="texlive-syntax-doc-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920360" comment="texlive-syntaxdi-2021.186.0.0.8.2svn56685-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920361" comment="texlive-syntaxdi-doc-2021.186.0.0.8.2svn56685-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920362" comment="texlive-syntrace-2021.186.1.1svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920363" comment="texlive-syntrace-doc-2021.186.1.1svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920364" comment="texlive-synttree-2021.186.1.4.2svn16252-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920365" comment="texlive-synttree-doc-2021.186.1.4.2svn16252-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920366" comment="texlive-systeme-2021.186.0.0.34svn55015-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920367" comment="texlive-systeme-doc-2021.186.0.0.34svn55015-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920368" comment="texlive-t-angles-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920369" comment="texlive-t-angles-doc-2021.186.svn15878-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920370" comment="texlive-t2-2021.186.svn47870-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920371" comment="texlive-t2-doc-2021.186.svn47870-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920372" comment="texlive-tabfigures-2021.186.1.1svn25202-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920373" comment="texlive-tabfigures-doc-2021.186.1.1svn25202-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920374" comment="texlive-table-fct-2021.186.1.1svn41849-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920375" comment="texlive-table-fct-doc-2021.186.1.1svn41849-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920376" comment="texlive-tableaux-2021.186.svn42413-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920377" comment="texlive-tableaux-doc-2021.186.svn42413-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920378" comment="texlive-tablefootnote-2021.186.1.1csvn32804-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920379" comment="texlive-tablefootnote-doc-2021.186.1.1csvn32804-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920380" comment="texlive-tableof-2021.186.1.4bsvn48815-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920381" comment="texlive-tableof-doc-2021.186.1.4bsvn48815-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920382" comment="texlive-tablestyles-2021.186.0.0.1svn34495-50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920383" comment="texlive-tablestyles-doc-2021.186.0.0.1svn34495-50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249776" version="1" class="patch">
	<metadata>
		<title>texlive-scripts-2021.186.svn58742-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-scripts-2021.186.svn58742-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009920384" comment="texlive-scripts-2021.186.svn58742-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920385" comment="texlive-scripts-doc-2021.186.svn58742-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920386" comment="texlive-scripts-extra-2021.186.svn54744-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920387" comment="texlive-scripts-extra-doc-2021.186.svn54744-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920388" comment="texlive-tablists-2021.186.0.0.0esvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920389" comment="texlive-tablists-doc-2021.186.0.0.0esvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920390" comment="texlive-tablor-2021.186.4.07_gsvn31855-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920391" comment="texlive-tablor-doc-2021.186.4.07_gsvn31855-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920392" comment="texlive-tabls-2021.186.3.5svn17255-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920393" comment="texlive-tabls-doc-2021.186.3.5svn17255-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920394" comment="texlive-tablvar-2021.186.1.2svn51543-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920395" comment="texlive-tablvar-doc-2021.186.1.2svn51543-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920396" comment="texlive-tabriz-thesis-2021.186.1.1svn51729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920397" comment="texlive-tabriz-thesis-doc-2021.186.1.1svn51729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920398" comment="texlive-tabstackengine-2021.186.2.10svn46848-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920399" comment="texlive-tabstackengine-doc-2021.186.2.10svn46848-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920400" comment="texlive-tabto-generic-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920401" comment="texlive-tabto-ltx-2021.186.1.4svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920402" comment="texlive-tabto-ltx-doc-2021.186.1.4svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920403" comment="texlive-tabu-2021.186.2.9svn56615-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920404" comment="texlive-tabu-doc-2021.186.2.9svn56615-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920405" comment="texlive-tabularborder-2021.186.1.0asvn17885-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920406" comment="texlive-tabularborder-doc-2021.186.1.0asvn17885-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920407" comment="texlive-tabularcalc-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920408" comment="texlive-tabularcalc-doc-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920409" comment="texlive-tabularew-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920410" comment="texlive-tabularew-doc-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920411" comment="texlive-tabulary-2021.186.0.0.10svn34368-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920412" comment="texlive-tabulary-doc-2021.186.0.0.10svn34368-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920413" comment="texlive-tabvar-2021.186.1.7svn28908-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920414" comment="texlive-tabvar-doc-2021.186.1.7svn28908-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920415" comment="texlive-tabvar-fonts-2021.186.1.7svn28908-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920416" comment="texlive-tagging-2021.186.1.1.0.1svn52064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920417" comment="texlive-tagging-doc-2021.186.1.1.0.1svn52064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920418" comment="texlive-tagpair-2021.186.1.1svn42138-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920419" comment="texlive-tagpair-doc-2021.186.1.1svn42138-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920420" comment="texlive-tagpdf-2021.186.0.0.80svn57954-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920421" comment="texlive-tagpdf-doc-2021.186.0.0.80svn57954-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920422" comment="texlive-talk-2021.186.1.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920423" comment="texlive-talk-doc-2021.186.1.1svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920424" comment="texlive-tamefloats-2021.186.0.0.42svn27345-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920425" comment="texlive-tamefloats-doc-2021.186.0.0.42svn27345-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920426" comment="texlive-tamethebeast-2021.186.1.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920427" comment="texlive-tap-2021.186.0.0.77svn31731-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920428" comment="texlive-tap-doc-2021.186.0.0.77svn31731-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920429" comment="texlive-tapir-2021.186.0.0.2svn20484-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920430" comment="texlive-tapir-doc-2021.186.0.0.2svn20484-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920431" comment="texlive-tapir-fonts-2021.186.0.0.2svn20484-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920432" comment="texlive-tasks-2021.186.1.3asvn57835-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920433" comment="texlive-tasks-doc-2021.186.1.3asvn57835-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920434" comment="texlive-tcldoc-2021.186.2.40svn22018-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920435" comment="texlive-tcldoc-doc-2021.186.2.40svn22018-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920436" comment="texlive-tcolorbox-2021.186.4.42svn56610-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920437" comment="texlive-tcolorbox-doc-2021.186.4.42svn56610-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920438" comment="texlive-tdclock-2021.186.2.5svn33043-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920439" comment="texlive-tdclock-doc-2021.186.2.5svn33043-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920440" comment="texlive-tds-2021.186.1.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920441" comment="texlive-tdsfrmath-2021.186.1.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920442" comment="texlive-tdsfrmath-doc-2021.186.1.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920443" comment="texlive-technics-2021.186.1.0svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920444" comment="texlive-technics-doc-2021.186.1.0svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920445" comment="texlive-technion-thesis-template-2021.186.1.0svn49889-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920446" comment="texlive-technion-thesis-template-doc-2021.186.1.0svn49889-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920447" comment="texlive-ted-2021.186.1.06svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920448" comment="texlive-ted-doc-2021.186.1.06svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920449" comment="texlive-templates-fenn-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920450" comment="texlive-templates-sommer-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920451" comment="texlive-templatetools-2021.186.svn34495-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920452" comment="texlive-templatetools-doc-2021.186.svn34495-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920453" comment="texlive-tempora-2021.186.1.05svn39596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920454" comment="texlive-tempora-doc-2021.186.1.05svn39596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920455" comment="texlive-tempora-fonts-2021.186.1.05svn39596-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920456" comment="texlive-tengwarscript-2021.186.1.3.1svn34594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920457" comment="texlive-tengwarscript-doc-2021.186.1.3.1svn34594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920458" comment="texlive-tensind-2021.186.1.1svn51481-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920459" comment="texlive-tensind-doc-2021.186.1.1svn51481-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920460" comment="texlive-tensor-2021.186.2.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920461" comment="texlive-tensor-doc-2021.186.2.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920462" comment="texlive-termcal-2021.186.1.8svn22514-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920463" comment="texlive-termcal-de-2021.186.2.0svn47111-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920464" comment="texlive-termcal-de-doc-2021.186.2.0svn47111-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920465" comment="texlive-termcal-doc-2021.186.1.8svn22514-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920466" comment="texlive-termlist-2021.186.1.1svn18923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920467" comment="texlive-termlist-doc-2021.186.1.1svn18923-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920468" comment="texlive-termmenu-2021.186.svn37700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920469" comment="texlive-termmenu-doc-2021.186.svn37700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920470" comment="texlive-testhyphens-2021.186.0.0.7svn38928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920471" comment="texlive-testhyphens-doc-2021.186.0.0.7svn38928-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920472" comment="texlive-testidx-2021.186.1.2svn52213-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920473" comment="texlive-testidx-doc-2021.186.1.2svn52213-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920474" comment="texlive-tetragonos-2021.186.1svn49732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920475" comment="texlive-tetragonos-doc-2021.186.1svn49732-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920476" comment="texlive-teubner-2021.186.5.4svn57684-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920477" comment="texlive-teubner-doc-2021.186.5.4svn57684-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920478" comment="texlive-tex-2021.186.3.141592653svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920479" comment="texlive-tex-ewd-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920480" comment="texlive-tex-ewd-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920481" comment="texlive-tex-font-errors-cheatsheet-2021.186.0.0.1svn18314-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920482" comment="texlive-tex-gyre-2021.186.2.501svn48058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920483" comment="texlive-tex-gyre-doc-2021.186.2.501svn48058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920484" comment="texlive-tex-gyre-fonts-2021.186.2.501svn48058-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920485" comment="texlive-tex-gyre-math-2021.186.svn41264-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920486" comment="texlive-tex-gyre-math-doc-2021.186.svn41264-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920487" comment="texlive-tex-gyre-math-fonts-2021.186.svn41264-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920488" comment="texlive-tex-ini-files-2021.186.svn40533-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920489" comment="texlive-tex-ini-files-doc-2021.186.svn40533-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920490" comment="texlive-tex-label-2021.186.svn16372-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920491" comment="texlive-tex-label-doc-2021.186.svn16372-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920492" comment="texlive-tex-locale-2021.186.1.0svn48500-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920493" comment="texlive-tex-locale-doc-2021.186.1.0svn48500-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920494" comment="texlive-tex-nutshell-2021.186.0.0.6svn58471-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920495" comment="texlive-tex-overview-2021.186.0.0.2svn41403-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920496" comment="texlive-tex-ps-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920497" comment="texlive-tex-ps-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920498" comment="texlive-tex-refs-2021.186.0.0.4.8svn57349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920499" comment="texlive-tex-virtual-academy-pl-2021.186.svn34177-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920500" comment="texlive-tex4ebook-2021.186.0.0.3csvn56878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920501" comment="texlive-tex4ebook-doc-2021.186.0.0.3csvn56878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920502" comment="texlive-tex4ht-2021.186.svn58348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920503" comment="texlive-tex4ht-doc-2021.186.svn58348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920504" comment="texlive-texapi-2021.186.1.04svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920505" comment="texlive-texapi-doc-2021.186.1.04svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920506" comment="texlive-texbytopic-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920507" comment="texlive-texcount-2021.186.3.1.1svn49013-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920508" comment="texlive-texcount-doc-2021.186.3.1.1svn49013-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920509" comment="texlive-texdate-2021.186.2.0svn49362-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920510" comment="texlive-texdate-doc-2021.186.2.0svn49362-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920511" comment="texlive-texdef-2021.186.1.9svn56466-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920512" comment="texlive-texdef-doc-2021.186.1.9svn56466-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920513" comment="texlive-texdiff-2021.186.0.0.4svn29752-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920514" comment="texlive-texdiff-doc-2021.186.0.0.4svn29752-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920515" comment="texlive-texdirflatten-2021.186.1.3svn55064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920516" comment="texlive-texdirflatten-doc-2021.186.1.3svn55064-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920517" comment="texlive-texdoc-2021.186.3.3svn58477-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920518" comment="texlive-texdoc-doc-2021.186.3.3svn58477-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920519" comment="texlive-texdoctk-2021.186.0.0.6.0svn54557-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920520" comment="texlive-texdoctk-doc-2021.186.0.0.6.0svn54557-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920521" comment="texlive-texdraw-2021.186.v2r3svn51030-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920522" comment="texlive-texdraw-doc-2021.186.v2r3svn51030-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920523" comment="texlive-texfot-2021.186.1.40svn54246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920524" comment="texlive-texfot-doc-2021.186.1.40svn54246-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920525" comment="texlive-texilikechaps-2021.186.1.0asvn28553-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920526" comment="texlive-texilikecover-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920527" comment="texlive-texinfo-2021.186.5.1svn57911-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920528" comment="texlive-texlive-common-2021.186.svn58055-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920529" comment="texlive-texlive-cz-2021.186.svn54496-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920530" comment="texlive-texlive-de-2021.186.svn58648-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920531" comment="texlive-texlive-en-2021.186.svn58572-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920532" comment="texlive-texlive-es-2021.186.svn58221-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920533" comment="texlive-texlive-fr-2021.186.svn58579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920534" comment="texlive-texlive-it-2021.186.svn58653-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920535" comment="texlive-texlive-ja-2021.186.svn58581-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920536" comment="texlive-texlive-pl-2021.186.svn58649-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920537" comment="texlive-texlive-ru-2021.186.svn58426-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920538" comment="texlive-texlive-sr-2021.186.svn54594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920539" comment="texlive-texlive-zh-cn-2021.186.svn54490-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920540" comment="texlive-texlive.infra-2021.186.svn58646-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920541" comment="texlive-texlive.infra-doc-2021.186.svn58646-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920542" comment="texlive-texliveonfly-2021.186.svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920543" comment="texlive-texliveonfly-doc-2021.186.svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920544" comment="texlive-texloganalyser-2021.186.0.0.11svn54526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920545" comment="texlive-texloganalyser-doc-2021.186.0.0.11svn54526-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920546" comment="texlive-texlogos-2021.186.1.3.1svn19083-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920547" comment="texlive-texmate-2021.186.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920548" comment="texlive-texmate-doc-2021.186.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920549" comment="texlive-texments-2021.186.0.0.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920550" comment="texlive-texments-doc-2021.186.0.0.2.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920551" comment="texlive-texnegar-2021.186.0.0.1esvn57692-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920552" comment="texlive-texnegar-doc-2021.186.0.0.1esvn57692-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920553" comment="texlive-texonly-2021.186.2svn50985-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920554" comment="texlive-texosquery-2021.186.1.7svn53676-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920555" comment="texlive-texosquery-doc-2021.186.1.7svn53676-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920556" comment="texlive-texplate-2021.186.1.0.3svn56083-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920557" comment="texlive-texplate-doc-2021.186.1.0.3svn56083-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920558" comment="texlive-texpower-2021.186.0.0.2svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920559" comment="texlive-texpower-doc-2021.186.0.0.2svn29349-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920560" comment="texlive-texproposal-2021.186.1.4svn43151-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920561" comment="texlive-texshade-2021.186.1.25svn46559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920562" comment="texlive-texshade-doc-2021.186.1.25svn46559-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920563" comment="texlive-texsis-2021.186.2.18svn45678-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920564" comment="texlive-texsis-doc-2021.186.2.18svn45678-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920565" comment="texlive-textcase-2021.186.1.00svn52092-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920566" comment="texlive-textcase-doc-2021.186.1.00svn52092-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920567" comment="texlive-textfit-2021.186.5svn20591-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920568" comment="texlive-textfit-doc-2021.186.5svn20591-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920569" comment="texlive-textglos-2021.186.1.0svn30788-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920570" comment="texlive-textglos-doc-2021.186.1.0svn30788-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920571" comment="texlive-textgreek-2021.186.0.0.7svn44192-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920572" comment="texlive-textgreek-doc-2021.186.0.0.7svn44192-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920573" comment="texlive-textmerg-2021.186.2.01svn20677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920574" comment="texlive-textmerg-doc-2021.186.2.01svn20677-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920575" comment="texlive-textopo-2021.186.1.5svn23796-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920576" comment="texlive-textopo-doc-2021.186.1.5svn23796-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920577" comment="texlive-textpath-2021.186.1.6svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920578" comment="texlive-textpath-doc-2021.186.1.6svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920579" comment="texlive-textpos-2021.186.1.10svn56441-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920580" comment="texlive-textpos-doc-2021.186.1.10svn56441-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920581" comment="texlive-textualicomma-2021.186.1.1svn48474-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920582" comment="texlive-textualicomma-doc-2021.186.1.1svn48474-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920583" comment="texlive-texvc-2021.186.1.1svn46844-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920584" comment="texlive-texvc-doc-2021.186.1.1svn46844-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920585" comment="texlive-texware-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920586" comment="texlive-tfrupee-2021.186.1.02svn20770-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920587" comment="texlive-tfrupee-doc-2021.186.1.02svn20770-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920588" comment="texlive-tfrupee-fonts-2021.186.1.02svn20770-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920589" comment="texlive-thaienum-2021.186.0.0.2svn44140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920590" comment="texlive-thaienum-doc-2021.186.0.0.2svn44140-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920591" comment="texlive-thaispec-2021.186.2021.03.01svn58019-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920592" comment="texlive-thaispec-doc-2021.186.2021.03.01svn58019-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920593" comment="texlive-thalie-2021.186.0.0.10bsvn51789-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920594" comment="texlive-thalie-doc-2021.186.0.0.10bsvn51789-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920595" comment="texlive-theanodidot-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920596" comment="texlive-theanodidot-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920597" comment="texlive-theanodidot-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920598" comment="texlive-theanomodern-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920599" comment="texlive-theanomodern-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920600" comment="texlive-theanomodern-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920601" comment="texlive-theanooldstyle-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920602" comment="texlive-theanooldstyle-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920603" comment="texlive-theanooldstyle-fonts-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920604" comment="texlive-theatre-2021.186.0.0.1svn45363-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920605" comment="texlive-theoremref-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920606" comment="texlive-theoremref-doc-2021.186.svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920607" comment="texlive-thesis-ekf-2021.186.4.1svn57207-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920608" comment="texlive-thesis-ekf-doc-2021.186.4.1svn57207-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920609" comment="texlive-thesis-gwu-2021.186.1.7.0svn54287-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920610" comment="texlive-thesis-gwu-doc-2021.186.1.7.0svn54287-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920611" comment="texlive-thesis-qom-2021.186.0.0.42svn49124-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920612" comment="texlive-thesis-qom-doc-2021.186.0.0.42svn49124-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920613" comment="texlive-thesis-titlepage-fhac-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920614" comment="texlive-thesis-titlepage-fhac-doc-2021.186.0.0.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920615" comment="texlive-thinsp-2021.186.0.0.2svn39669-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920616" comment="texlive-thinsp-doc-2021.186.0.0.2svn39669-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920617" comment="texlive-thmbox-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920618" comment="texlive-thmbox-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920619" comment="texlive-thmtools-2021.186.72svn56070-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920620" comment="texlive-thmtools-doc-2021.186.72svn56070-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920621" comment="texlive-threadcol-2021.186.1.0svn28754-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920622" comment="texlive-threadcol-doc-2021.186.1.0svn28754-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920623" comment="texlive-threeddice-2021.186.1.0svn20675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920624" comment="texlive-threeddice-doc-2021.186.1.0svn20675-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920625" comment="texlive-threeparttable-2021.186.svn17383-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920626" comment="texlive-threeparttable-doc-2021.186.svn17383-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920627" comment="texlive-threeparttablex-2021.186.0.0.3svn34206-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920628" comment="texlive-threeparttablex-doc-2021.186.0.0.3svn34206-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920629" comment="texlive-thuaslogos-2021.186.1.2svn51347-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920630" comment="texlive-thuaslogos-doc-2021.186.1.2svn51347-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920631" comment="texlive-thucoursework-2021.186.2.6svn56435-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920632" comment="texlive-thucoursework-doc-2021.186.2.6svn56435-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920633" comment="texlive-thumb-2021.186.1.0svn16549-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920634" comment="texlive-thumb-doc-2021.186.1.0svn16549-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920635" comment="texlive-thumbpdf-2021.186.3.17svn48625-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920636" comment="texlive-thumbpdf-doc-2021.186.3.17svn48625-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920637" comment="texlive-thumbs-2021.186.1.0qsvn33134-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920638" comment="texlive-thumbs-doc-2021.186.1.0qsvn33134-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920639" comment="texlive-thumby-2021.186.0.0.1svn16736-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920640" comment="texlive-thumby-doc-2021.186.0.0.1svn16736-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920641" comment="texlive-thuthesis-2021.186.7.2.2svn58750-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920642" comment="texlive-thuthesis-doc-2021.186.7.2.2svn58750-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920643" comment="texlive-ticket-2021.186.0.0.4dsvn42280-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920644" comment="texlive-ticket-doc-2021.186.0.0.4dsvn42280-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920645" comment="texlive-ticollege-2021.186.1.0svn36306-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920646" comment="texlive-ticollege-doc-2021.186.1.0svn36306-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920647" comment="texlive-tie-2021.186.2.4svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920648" comment="texlive-tikz-3dplot-2021.186.svn25087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920649" comment="texlive-tikz-3dplot-doc-2021.186.svn25087-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920650" comment="texlive-tikz-among-us-2021.186.1.1.0svn56820-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920651" comment="texlive-tikz-among-us-doc-2021.186.1.1.0svn56820-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920652" comment="texlive-tikz-bayesnet-2021.186.0.0.1svn38295-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920653" comment="texlive-tikz-bayesnet-doc-2021.186.0.0.1svn38295-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920654" comment="texlive-tikz-bbox-2021.186.0.0.1svn57444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920655" comment="texlive-tikz-bbox-doc-2021.186.0.0.1svn57444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920656" comment="texlive-tikz-cd-2021.186.0.0.9fsvn49201-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920657" comment="texlive-tikz-cd-doc-2021.186.0.0.9fsvn49201-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920658" comment="texlive-tikz-dependency-2021.186.1.2svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920659" comment="texlive-tikz-dependency-doc-2021.186.1.2svn54512-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249777" version="1" class="patch">
	<metadata>
		<title>texlive-tikz-dimline-2021.186.1.0svn35805-45.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-tikz-dimline-2021.186.1.0svn35805-45.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009920660" comment="texlive-tikz-dimline-2021.186.1.0svn35805-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920661" comment="texlive-tikz-dimline-doc-2021.186.1.0svn35805-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920662" comment="texlive-tikz-feynhand-2021.186.1.1.0svn51915-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920663" comment="texlive-tikz-feynhand-doc-2021.186.1.1.0svn51915-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920664" comment="texlive-tikz-feynman-2021.186.1.1.0svn56615-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920665" comment="texlive-tikz-feynman-doc-2021.186.1.1.0svn56615-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920666" comment="texlive-tikz-imagelabels-2021.186.0.0.2svn51490-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920667" comment="texlive-tikz-imagelabels-doc-2021.186.0.0.2svn51490-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920668" comment="texlive-tikz-inet-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920669" comment="texlive-tikz-inet-doc-2021.186.0.0.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920670" comment="texlive-tikz-kalender-2021.186.0.0.4fsvn52890-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920671" comment="texlive-tikz-kalender-doc-2021.186.0.0.4fsvn52890-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920672" comment="texlive-tikz-karnaugh-2021.186.1.2svn47026-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920673" comment="texlive-tikz-karnaugh-doc-2021.186.1.2svn47026-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920674" comment="texlive-tikz-ladder-2021.186.1.1svn46555-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920675" comment="texlive-tikz-ladder-doc-2021.186.1.1svn46555-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920676" comment="texlive-tikz-lake-fig-2021.186.1.0svn55288-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920677" comment="texlive-tikz-lake-fig-doc-2021.186.1.0svn55288-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920678" comment="texlive-tikz-layers-2021.186.0.0.9svn46660-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920679" comment="texlive-tikz-layers-doc-2021.186.0.0.9svn46660-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920680" comment="texlive-tikz-nef-2021.186.0.0.1svn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920681" comment="texlive-tikz-nef-doc-2021.186.0.0.1svn55920-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920682" comment="texlive-tikz-network-2021.186.1.1svn51884-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920683" comment="texlive-tikz-network-doc-2021.186.1.1svn51884-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920684" comment="texlive-tikz-opm-2021.186.0.0.1.1svn32769-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920685" comment="texlive-tikz-opm-doc-2021.186.0.0.1.1svn32769-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920686" comment="texlive-tikz-optics-2021.186.0.0.2.3svn43466-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920687" comment="texlive-tikz-optics-doc-2021.186.0.0.2.3svn43466-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920688" comment="texlive-tikz-page-2021.186.1.0svn42039-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920689" comment="texlive-tikz-page-doc-2021.186.1.0svn42039-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920690" comment="texlive-tikz-palattice-2021.186.2.3svn43442-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920691" comment="texlive-tikz-palattice-doc-2021.186.2.3svn43442-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920692" comment="texlive-tikz-planets-2021.186.1.0.2svn55002-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920693" comment="texlive-tikz-planets-doc-2021.186.1.0.2svn55002-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920694" comment="texlive-tikz-qtree-2021.186.1.2svn26108-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920695" comment="texlive-tikz-qtree-doc-2021.186.1.2svn26108-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920696" comment="texlive-tikz-relay-2021.186.1.2svn51355-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920697" comment="texlive-tikz-relay-doc-2021.186.1.2svn51355-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920698" comment="texlive-tikz-sfc-2021.186.1.0.1svn49424-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920699" comment="texlive-tikz-sfc-doc-2021.186.1.0.1svn49424-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920700" comment="texlive-tikz-timing-2021.186.0.0.7fsvn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920701" comment="texlive-tikz-timing-doc-2021.186.0.0.7fsvn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920702" comment="texlive-tikz-trackschematic-2021.186.0.0.6svn57300-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920703" comment="texlive-tikz-trackschematic-doc-2021.186.0.0.6svn57300-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920704" comment="texlive-tikz-truchet-2021.186.svn50020-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920705" comment="texlive-tikz-truchet-doc-2021.186.svn50020-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920706" comment="texlive-tikzcodeblocks-2021.186.0.0.13svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920707" comment="texlive-tikzcodeblocks-doc-2021.186.0.0.13svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920708" comment="texlive-tikzducks-2021.186.1.5svn55713-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920709" comment="texlive-tikzducks-doc-2021.186.1.5svn55713-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920710" comment="texlive-tikzinclude-2021.186.1.0svn28715-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920711" comment="texlive-tikzinclude-doc-2021.186.1.0svn28715-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920712" comment="texlive-tikzlings-2021.186.0.0.5svn58469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920713" comment="texlive-tikzlings-doc-2021.186.0.0.5svn58469-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920714" comment="texlive-tikzmark-2021.186.1.10svn57843-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920715" comment="texlive-tikzmark-doc-2021.186.1.10svn57843-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920716" comment="texlive-tikzmarmots-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920717" comment="texlive-tikzmarmots-doc-2021.186.1.0svn54080-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920718" comment="texlive-tikzorbital-2021.186.svn36439-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920719" comment="texlive-tikzorbital-doc-2021.186.svn36439-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920720" comment="texlive-tikzpackets-2021.186.1.0svn55827-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920721" comment="texlive-tikzpackets-doc-2021.186.1.0svn55827-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920722" comment="texlive-tikzpagenodes-2021.186.1.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920723" comment="texlive-tikzpagenodes-doc-2021.186.1.1svn56291-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920724" comment="texlive-tikzpeople-2021.186.0.0.4svn43978-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920725" comment="texlive-tikzpeople-doc-2021.186.0.0.4svn43978-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920726" comment="texlive-tikzpfeile-2021.186.1.0svn25777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920727" comment="texlive-tikzpfeile-doc-2021.186.1.0svn25777-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920728" comment="texlive-tikzposter-2021.186.2.0svn32732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920729" comment="texlive-tikzposter-doc-2021.186.2.0svn32732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920730" comment="texlive-tikzscale-2021.186.0.0.2.6svn30637-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920731" comment="texlive-tikzscale-doc-2021.186.0.0.2.6svn30637-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920732" comment="texlive-tikzsymbols-2021.186.4.10csvn49975-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920733" comment="texlive-tikzsymbols-doc-2021.186.4.10csvn49975-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920734" comment="texlive-tikztosvg-2021.186.0.0.2.0svn58737-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920735" comment="texlive-tikztosvg-doc-2021.186.0.0.2.0svn58737-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920736" comment="texlive-tile-graphic-2021.186.svn55325-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920737" comment="texlive-tile-graphic-doc-2021.186.svn55325-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920738" comment="texlive-timbreicmc-2021.186.2.0svn49740-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920739" comment="texlive-timbreicmc-doc-2021.186.2.0svn49740-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920740" comment="texlive-times-2021.186.svn35058-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920741" comment="texlive-times-fonts-2021.186.svn35058-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920742" comment="texlive-timetable-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920743" comment="texlive-timing-diagrams-2021.186.svn31491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920744" comment="texlive-timing-diagrams-doc-2021.186.svn31491-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920745" comment="texlive-tinos-2021.186.svn42882-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920746" comment="texlive-tinos-doc-2021.186.svn42882-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920747" comment="texlive-tinos-fonts-2021.186.svn42882-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920748" comment="texlive-tipa-2021.186.1.3svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920749" comment="texlive-tipa-de-2021.186.1.3svn22005-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920750" comment="texlive-tipa-doc-2021.186.1.3svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920751" comment="texlive-tipa-fonts-2021.186.1.3svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920752" comment="texlive-tipfr-2021.186.1.5svn38646-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920753" comment="texlive-tipfr-doc-2021.186.1.5svn38646-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920754" comment="texlive-titlecaps-2021.186.1.2svn36170-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920755" comment="texlive-titlecaps-doc-2021.186.1.2svn36170-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920756" comment="texlive-titlefoot-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920757" comment="texlive-titlepages-2021.186.svn19457-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920758" comment="texlive-titlepic-2021.186.1.2svn43497-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920759" comment="texlive-titlepic-doc-2021.186.1.2svn43497-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920760" comment="texlive-titleref-2021.186.3.1svn18729-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920761" comment="texlive-titleref-doc-2021.186.3.1svn18729-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920762" comment="texlive-titlesec-2021.186.2.13svn52413-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920763" comment="texlive-titlesec-doc-2021.186.2.13svn52413-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920764" comment="texlive-titling-2021.186.2.1dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920765" comment="texlive-titling-doc-2021.186.2.1dsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920766" comment="texlive-tkz-base-2021.186.3.06csvn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920767" comment="texlive-tkz-base-doc-2021.186.3.06csvn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920768" comment="texlive-tkz-berge-2021.186.2.0svn57485-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920769" comment="texlive-tkz-berge-doc-2021.186.2.0svn57485-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920770" comment="texlive-tkz-doc-2021.186.1.43csvn55265-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920771" comment="texlive-tkz-euclide-2021.186.3.06csvn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920772" comment="texlive-tkz-euclide-doc-2021.186.3.06csvn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920773" comment="texlive-tkz-fct-2021.186.1.3csvn55031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920774" comment="texlive-tkz-fct-doc-2021.186.1.3csvn55031-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920775" comment="texlive-tkz-graph-2021.186.2.0svn57484-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920776" comment="texlive-tkz-graph-doc-2021.186.2.0svn57484-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920777" comment="texlive-tkz-orm-2021.186.0.0.1.4svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920778" comment="texlive-tkz-orm-doc-2021.186.0.0.1.4svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920779" comment="texlive-tkz-tab-2021.186.2.12csvn54940-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920780" comment="texlive-tkz-tab-doc-2021.186.2.12csvn54940-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920781" comment="texlive-tlc-article-2021.186.1.0.17svn51431-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920782" comment="texlive-tlc-article-doc-2021.186.1.0.17svn51431-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920783" comment="texlive-tlc2-2021.186.svn26096-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920784" comment="texlive-tlmgrbasics-2021.186.svn56221-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920785" comment="texlive-tocbibind-2021.186.1.5ksvn20085-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920786" comment="texlive-tocbibind-doc-2021.186.1.5ksvn20085-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920787" comment="texlive-tocdata-2021.186.2.04svn55852-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920788" comment="texlive-tocdata-doc-2021.186.2.04svn55852-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920789" comment="texlive-tocloft-2021.186.2.3jsvn53364-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920790" comment="texlive-tocloft-doc-2021.186.2.3jsvn53364-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920791" comment="texlive-tocvsec2-2021.186.1.3asvn33146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920792" comment="texlive-tocvsec2-doc-2021.186.1.3asvn33146-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920793" comment="texlive-todo-2021.186.2.142svn17746-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920794" comment="texlive-todo-doc-2021.186.2.142svn17746-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920795" comment="texlive-todonotes-2021.186.1.1.3svn56166-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920796" comment="texlive-todonotes-doc-2021.186.1.1.3svn56166-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920797" comment="texlive-tokcycle-2021.186.1.3svn58254-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920798" comment="texlive-tokcycle-doc-2021.186.1.3svn58254-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920799" comment="texlive-tokenizer-2021.186.1.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920800" comment="texlive-tokenizer-doc-2021.186.1.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920801" comment="texlive-toolbox-2021.186.5.1svn32260-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920802" comment="texlive-toolbox-doc-2021.186.5.1svn32260-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920803" comment="texlive-tools-2021.186.svn56514-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920804" comment="texlive-tools-doc-2021.186.svn56514-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920805" comment="texlive-topfloat-2021.186.svn19084-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920806" comment="texlive-topfloat-doc-2021.186.svn19084-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920807" comment="texlive-topiclongtable-2021.186.1.3.2svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920808" comment="texlive-topiclongtable-doc-2021.186.1.3.2svn54758-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920809" comment="texlive-topletter-2021.186.0.0.3.0svn48182-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920810" comment="texlive-topletter-doc-2021.186.0.0.3.0svn48182-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920811" comment="texlive-toptesi-2021.186.6.4.06svn56276-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920812" comment="texlive-toptesi-doc-2021.186.6.4.06svn56276-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920813" comment="texlive-totalcount-2021.186.1.0asvn56214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920814" comment="texlive-totalcount-doc-2021.186.1.0asvn56214-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920815" comment="texlive-totcount-2021.186.1.2svn21178-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920816" comment="texlive-totcount-doc-2021.186.1.2svn21178-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920817" comment="texlive-totpages-2021.186.2.00svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920818" comment="texlive-totpages-doc-2021.186.2.00svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920819" comment="texlive-tpic2pdftex-2021.186.svn52851-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920820" comment="texlive-tpslifonts-2021.186.0.0.6svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920821" comment="texlive-tpslifonts-doc-2021.186.0.0.6svn42428-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920822" comment="texlive-tqft-2021.186.2.1svn44455-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920823" comment="texlive-tqft-doc-2021.186.2.1svn44455-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920824" comment="texlive-tracklang-2021.186.1.4svn55707-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920825" comment="texlive-tracklang-doc-2021.186.1.4svn55707-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920826" comment="texlive-trajan-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920827" comment="texlive-trajan-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920828" comment="texlive-trajan-fonts-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920829" comment="texlive-tram-2021.186.0.0.2svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920830" comment="texlive-tram-doc-2021.186.0.0.2svn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920831" comment="texlive-translation-array-fr-2021.186.svn24344-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920832" comment="texlive-translation-arsclassica-de-2021.186.svn23803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920833" comment="texlive-translation-biblatex-de-2021.186.3.15asvn57508-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920834" comment="texlive-translation-chemsym-de-2021.186.svn23804-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920835" comment="texlive-translation-dcolumn-fr-2021.186.svn24345-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920836" comment="texlive-translation-ecv-de-2021.186.svn24754-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920837" comment="texlive-translation-enumitem-de-2021.186.svn24196-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920838" comment="texlive-translation-europecv-de-2021.186.svn23840-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920839" comment="texlive-translation-filecontents-de-2021.186.svn24010-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920840" comment="texlive-translation-moreverb-de-2021.186.svn23957-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920841" comment="texlive-translation-natbib-fr-2021.186.svn25105-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920842" comment="texlive-translation-tabbing-fr-2021.186.svn24228-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920843" comment="texlive-translations-2021.186.1.10asvn57461-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920844" comment="texlive-translations-doc-2021.186.1.10asvn57461-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920845" comment="texlive-translator-2021.186.1.12csvn56052-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920846" comment="texlive-translator-doc-2021.186.1.12csvn56052-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920847" comment="texlive-transparent-2021.186.1.4svn52981-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920848" comment="texlive-transparent-doc-2021.186.1.4svn52981-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920849" comment="texlive-tree-dvips-2021.186.0.0.91svn21751-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920850" comment="texlive-tree-dvips-doc-2021.186.0.0.91svn21751-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920851" comment="texlive-treetex-2021.186.svn28176-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920852" comment="texlive-treetex-doc-2021.186.svn28176-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920853" comment="texlive-trfsigns-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920854" comment="texlive-trfsigns-doc-2021.186.1.01svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920855" comment="texlive-trigonometry-2021.186.svn43006-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920856" comment="texlive-trigonometry-doc-2021.186.svn43006-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920857" comment="texlive-trimspaces-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920858" comment="texlive-trimspaces-doc-2021.186.1.1svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920859" comment="texlive-trivfloat-2021.186.1.3bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920860" comment="texlive-trivfloat-doc-2021.186.1.3bsvn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920861" comment="texlive-trsym-2021.186.1.0svn18732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920862" comment="texlive-trsym-doc-2021.186.1.0svn18732-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920863" comment="texlive-truncate-2021.186.3.6svn18921-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920864" comment="texlive-truncate-doc-2021.186.3.6svn18921-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920865" comment="texlive-tsemlines-2021.186.1.0svn23440-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920866" comment="texlive-ttfutils-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920867" comment="texlive-ttfutils-doc-2021.186.svn57972-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920868" comment="texlive-tucv-2021.186.1.0svn20680-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920869" comment="texlive-tucv-doc-2021.186.1.0svn20680-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920870" comment="texlive-tuda-ci-2021.186.3.13asvn58661-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920871" comment="texlive-tuda-ci-doc-2021.186.3.13asvn58661-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920872" comment="texlive-tudscr-2021.186.2.06lsvn58713-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920873" comment="texlive-tudscr-doc-2021.186.2.06lsvn58713-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920874" comment="texlive-tufte-latex-2021.186.3.5.2svn37649-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920875" comment="texlive-tufte-latex-doc-2021.186.3.5.2svn37649-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920876" comment="texlive-tugboat-2021.186.2.24svn56942-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920877" comment="texlive-tugboat-doc-2021.186.2.24svn56942-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920878" comment="texlive-tugboat-plain-2021.186.1.25svn51373-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920879" comment="texlive-tugboat-plain-doc-2021.186.1.25svn51373-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920880" comment="texlive-tui-2021.186.1.9svn27253-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920881" comment="texlive-tui-doc-2021.186.1.9svn27253-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920882" comment="texlive-turabian-2021.186.0.0.1.0svn36298-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920883" comment="texlive-turabian-doc-2021.186.0.0.1.0svn36298-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920884" comment="texlive-turabian-formatting-2021.186.svn58561-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920885" comment="texlive-turabian-formatting-doc-2021.186.svn58561-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920886" comment="texlive-turkmen-2021.186.0.0.2svn17748-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920887" comment="texlive-turkmen-doc-2021.186.0.0.2svn17748-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920888" comment="texlive-turnstile-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920889" comment="texlive-turnstile-doc-2021.186.1.0svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920890" comment="texlive-turnthepage-2021.186.1.3asvn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920891" comment="texlive-turnthepage-doc-2021.186.1.3asvn29803-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920892" comment="texlive-twemoji-colr-2021.186.0.0.5.1svn55675-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920893" comment="texlive-twemoji-colr-doc-2021.186.0.0.5.1svn55675-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920894" comment="texlive-twemoji-colr-fonts-2021.186.0.0.5.1svn55675-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920895" comment="texlive-twoinone-2021.186.svn17024-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920896" comment="texlive-twoinone-doc-2021.186.svn17024-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920897" comment="texlive-twoup-2021.186.1.3svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920898" comment="texlive-twoup-doc-2021.186.1.3svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920899" comment="texlive-txfonts-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920900" comment="texlive-txfonts-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920901" comment="texlive-txfonts-fonts-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920902" comment="texlive-txfontsb-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920903" comment="texlive-txfontsb-doc-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920904" comment="texlive-txfontsb-fonts-2021.186.1.1.1svn54512-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920905" comment="texlive-txgreeks-2021.186.1.0svn21839-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920906" comment="texlive-txgreeks-doc-2021.186.1.0svn21839-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920907" comment="texlive-txuprcal-2021.186.1.00svn43327-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920908" comment="texlive-txuprcal-doc-2021.186.1.00svn43327-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920909" comment="texlive-txuprcal-fonts-2021.186.1.00svn43327-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920910" comment="texlive-type1cm-2021.186.svn21820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920911" comment="texlive-type1cm-doc-2021.186.svn21820-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920912" comment="texlive-typed-checklist-2021.186.2.0svn49731-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920913" comment="texlive-typed-checklist-doc-2021.186.2.0svn49731-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920914" comment="texlive-typeface-2021.186.0.0.1svn27046-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920915" comment="texlive-typeface-doc-2021.186.0.0.1svn27046-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920916" comment="texlive-typehtml-2021.186.svn17134-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920917" comment="texlive-typehtml-doc-2021.186.svn17134-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920918" comment="texlive-typeoutfileinfo-2021.186.0.0.31svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920919" comment="texlive-typeoutfileinfo-doc-2021.186.0.0.31svn29349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920920" comment="texlive-typewriter-2021.186.1.1svn46641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920921" comment="texlive-typewriter-doc-2021.186.1.1svn46641-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920922" comment="texlive-typicons-2021.186.2.0.7svn37623-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920923" comment="texlive-typicons-doc-2021.186.2.0.7svn37623-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920924" comment="texlive-typicons-fonts-2021.186.2.0.7svn37623-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920925" comment="texlive-typoaid-2021.186.0.0.4.7svn44238-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920926" comment="texlive-typoaid-doc-2021.186.0.0.4.7svn44238-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920927" comment="texlive-typogrid-2021.186.0.0.21svn24994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920928" comment="texlive-typogrid-doc-2021.186.0.0.21svn24994-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920929" comment="texlive-tzplot-2021.186.1.0.1svn58558-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920930" comment="texlive-tzplot-doc-2021.186.1.0.1svn58558-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920931" comment="texlive-uaclasses-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920932" comment="texlive-uaclasses-doc-2021.186.svn15878-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920933" comment="texlive-uafthesis-2021.186.12.12svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920934" comment="texlive-uafthesis-doc-2021.186.12.12svn57349-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920935" comment="texlive-uantwerpendocs-2021.186.3.2svn58669-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920936" comment="texlive-uantwerpendocs-doc-2021.186.3.2svn58669-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920937" comment="texlive-uassign-2021.186.1.01svn38459-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920938" comment="texlive-uassign-doc-2021.186.1.01svn38459-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920939" comment="texlive-ucalgmthesis-2021.186.svn52527-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920940" comment="texlive-ucalgmthesis-doc-2021.186.svn52527-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920941" comment="texlive-ucbthesis-2021.186.3.6svn51690-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920942" comment="texlive-ucbthesis-doc-2021.186.3.6svn51690-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920943" comment="texlive-ucdavisthesis-2021.186.1.3svn40772-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920944" comment="texlive-ucdavisthesis-doc-2021.186.1.3svn40772-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249778" version="1" class="patch">
	<metadata>
		<title>texlive-ucharcat-2021.186.0.0.03svn38907-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-ucharcat-2021.186.0.0.03svn38907-46.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009920945" comment="texlive-ucharcat-2021.186.0.0.03svn38907-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920946" comment="texlive-ucharcat-doc-2021.186.0.0.03svn38907-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920947" comment="texlive-ucharclasses-2021.186.2.4svn58029-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920948" comment="texlive-ucharclasses-doc-2021.186.2.4svn58029-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920949" comment="texlive-ucs-2021.186.2.2svn35853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920950" comment="texlive-ucs-doc-2021.186.2.2svn35853-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920951" comment="texlive-ucsmonograph-2021.186.1.3.0svn52698-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920952" comment="texlive-ucsmonograph-doc-2021.186.1.3.0svn52698-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920953" comment="texlive-ucthesis-2021.186.3.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920954" comment="texlive-ucthesis-doc-2021.186.3.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920955" comment="texlive-udesoftec-2021.186.1.7.1svn57866-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920956" comment="texlive-udesoftec-doc-2021.186.1.7.1svn57866-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920957" comment="texlive-uebungsblatt-2021.186.1.5.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920958" comment="texlive-uebungsblatt-doc-2021.186.1.5.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920959" comment="texlive-uestcthesis-2021.186.1.1.0svn36371-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920960" comment="texlive-uestcthesis-doc-2021.186.1.1.0svn36371-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920961" comment="texlive-uhc-2021.186.svn16791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920962" comment="texlive-uhc-doc-2021.186.svn16791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920963" comment="texlive-uhc-fonts-2021.186.svn16791-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920964" comment="texlive-uhhassignment-2021.186.1.0svn44026-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920965" comment="texlive-uhhassignment-doc-2021.186.1.0svn44026-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920966" comment="texlive-uhrzeit-2021.186.0.0.2csvn39570-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920967" comment="texlive-uhrzeit-doc-2021.186.0.0.2csvn39570-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920968" comment="texlive-uiucredborder-2021.186.1.00svn29974-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920969" comment="texlive-uiucredborder-doc-2021.186.1.00svn29974-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920970" comment="texlive-uiucthesis-2021.186.2.25svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920971" comment="texlive-uiucthesis-doc-2021.186.2.25svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920972" comment="texlive-ukrhyph-2021.186.svn21081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920973" comment="texlive-ukrhyph-doc-2021.186.svn21081-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920974" comment="texlive-ulem-2021.186.svn53365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920975" comment="texlive-ulem-doc-2021.186.svn53365-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920976" comment="texlive-ulqda-2021.186.1.1svn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920977" comment="texlive-ulqda-doc-2021.186.1.1svn26313-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920978" comment="texlive-ulthese-2021.186.5.3svn52972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920979" comment="texlive-ulthese-doc-2021.186.5.3svn52972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920980" comment="texlive-umbclegislation-2021.186.2016_6_8svn41348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920981" comment="texlive-umbclegislation-doc-2021.186.2016_6_8svn41348-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920982" comment="texlive-umich-thesis-2021.186.1.20svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920983" comment="texlive-umich-thesis-doc-2021.186.1.20svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920984" comment="texlive-uml-2021.186.0.0.11svn17476-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920985" comment="texlive-uml-doc-2021.186.0.0.11svn17476-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920986" comment="texlive-umlaute-2021.186.2.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920987" comment="texlive-umlaute-doc-2021.186.2.1svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920988" comment="texlive-umoline-2021.186.svn19085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920989" comment="texlive-umoline-doc-2021.186.svn19085-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920990" comment="texlive-umthesis-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920991" comment="texlive-umthesis-doc-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920992" comment="texlive-umtypewriter-2021.186.001.002svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920993" comment="texlive-umtypewriter-fonts-2021.186.001.002svn18651-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920994" comment="texlive-unam-thesis-2021.186.0.0.5svn51207-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920995" comment="texlive-unam-thesis-doc-2021.186.0.0.5svn51207-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920996" comment="texlive-unamth-template-2021.186.2.0svn33625-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920997" comment="texlive-unamthesis-2021.186.2.1svn43639-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920998" comment="texlive-unamthesis-doc-2021.186.2.1svn43639-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009920999" comment="texlive-undergradmath-2021.186.svn57286-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921000" comment="texlive-underlin-2021.186.1.01svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921001" comment="texlive-underlin-doc-2021.186.1.01svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921002" comment="texlive-underoverlap-2021.186.0.0.0.1_r1svn29019-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921003" comment="texlive-underoverlap-doc-2021.186.0.0.0.1_r1svn29019-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921004" comment="texlive-underscore-2021.186.svn18261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921005" comment="texlive-underscore-doc-2021.186.svn18261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921006" comment="texlive-undolabl-2021.186.1.0lsvn36681-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921007" comment="texlive-undolabl-doc-2021.186.1.0lsvn36681-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921008" comment="texlive-unfonts-core-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921009" comment="texlive-unfonts-core-doc-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921010" comment="texlive-unfonts-core-fonts-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921011" comment="texlive-unfonts-extra-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921012" comment="texlive-unfonts-extra-doc-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921013" comment="texlive-unfonts-extra-fonts-2021.186.svn56291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921014" comment="texlive-uni-wtal-ger-2021.186.0.0.2svn31541-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921015" comment="texlive-uni-wtal-ger-doc-2021.186.0.0.2svn31541-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921016" comment="texlive-uni-wtal-lin-2021.186.0.0.2svn31409-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921017" comment="texlive-uni-wtal-lin-doc-2021.186.0.0.2svn31409-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921018" comment="texlive-unicode-alphabets-2021.186.svn54236-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921019" comment="texlive-unicode-alphabets-doc-2021.186.svn54236-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921020" comment="texlive-unicode-bidi-2021.186.0.0.01svn42482-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921021" comment="texlive-unicode-bidi-doc-2021.186.0.0.01svn42482-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921022" comment="texlive-unicode-data-2021.186.1.14svn56768-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921023" comment="texlive-unicode-data-doc-2021.186.1.14svn56768-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921024" comment="texlive-unicode-math-2021.186.0.0.8qsvn56594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921025" comment="texlive-unicode-math-doc-2021.186.0.0.8qsvn56594-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921026" comment="texlive-unifith-2021.186.1.2svn51968-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921027" comment="texlive-unifith-doc-2021.186.1.2svn51968-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921028" comment="texlive-uninormalize-2021.186.0.0.1svn57257-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921029" comment="texlive-uninormalize-doc-2021.186.0.0.1svn57257-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921030" comment="texlive-uniquecounter-2021.186.1.4svn53162-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921031" comment="texlive-uniquecounter-doc-2021.186.1.4svn53162-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921032" comment="texlive-unisugar-2021.186.0.0.92svn22357-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921033" comment="texlive-unisugar-doc-2021.186.0.0.92svn22357-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921034" comment="texlive-unitconv-2021.186.0.0.01svn55060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921035" comment="texlive-unitconv-doc-2021.186.0.0.01svn55060-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921036" comment="texlive-unitipa-2021.186.0.0.3svn58749-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921037" comment="texlive-unitipa-doc-2021.186.0.0.3svn58749-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921038" comment="texlive-unitn-bimrep-2021.186.svn45581-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921039" comment="texlive-unitn-bimrep-doc-2021.186.svn45581-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921040" comment="texlive-units-2021.186.0.0.9bsvn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921041" comment="texlive-units-doc-2021.186.0.0.9bsvn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921042" comment="texlive-unitsdef-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921043" comment="texlive-unitsdef-doc-2021.186.0.0.2svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921044" comment="texlive-universa-2021.186.2.1svn51984-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921045" comment="texlive-universa-doc-2021.186.2.1svn51984-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921046" comment="texlive-universalis-2021.186.svn33860-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921047" comment="texlive-universalis-doc-2021.186.svn33860-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921048" comment="texlive-universalis-fonts-2021.186.svn33860-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921049" comment="texlive-univie-ling-2021.186.1.13svn56913-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921050" comment="texlive-univie-ling-doc-2021.186.1.13svn56913-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921051" comment="texlive-unizgklasa-2021.186.1.0svn51647-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921052" comment="texlive-unizgklasa-doc-2021.186.1.0svn51647-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921053" comment="texlive-unravel-2021.186.0.0.2hsvn52822-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921054" comment="texlive-unravel-doc-2021.186.0.0.2hsvn52822-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921055" comment="texlive-unswcover-2021.186.1.0svn29476-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921056" comment="texlive-unswcover-doc-2021.186.1.0svn29476-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921057" comment="texlive-uothesis-2021.186.2.5.6svn25355-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921058" comment="texlive-uothesis-doc-2021.186.2.5.6svn25355-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921059" comment="texlive-uowthesis-2021.186.1.0asvn19700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921060" comment="texlive-uowthesis-doc-2021.186.1.0asvn19700-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921061" comment="texlive-uowthesistitlepage-2021.186.3.0.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921062" comment="texlive-uowthesistitlepage-doc-2021.186.3.0.1svn54512-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921063" comment="texlive-upca-2021.186.svn22511-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921064" comment="texlive-upca-doc-2021.186.svn22511-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921065" comment="texlive-uplatex-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921066" comment="texlive-uplatex-doc-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921067" comment="texlive-upmethodology-2021.186.20200406svn54758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921068" comment="texlive-upmethodology-doc-2021.186.20200406svn54758-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921069" comment="texlive-uppunctlm-2021.186.0.0.1svn42334-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921070" comment="texlive-uppunctlm-doc-2021.186.0.0.1svn42334-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921071" comment="texlive-upquote-2021.186.1.3svn26059-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921072" comment="texlive-upquote-doc-2021.186.1.3svn26059-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921073" comment="texlive-uptex-2021.186.svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921074" comment="texlive-uptex-base-2021.186.svn56832-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921075" comment="texlive-uptex-base-doc-2021.186.svn56832-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921076" comment="texlive-uptex-fonts-2021.186.svn54045-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921077" comment="texlive-uptex-fonts-doc-2021.186.svn54045-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921078" comment="texlive-upzhkinsoku-2021.186.0.0.5svn47354-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921079" comment="texlive-upzhkinsoku-doc-2021.186.0.0.5svn47354-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921080" comment="texlive-urcls-2021.186.2.1svn49903-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921081" comment="texlive-urcls-doc-2021.186.2.1svn49903-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921082" comment="texlive-uri-2021.186.2.0bsvn48602-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921083" comment="texlive-uri-doc-2021.186.2.0bsvn48602-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921084" comment="texlive-url-2021.186.3.4svn32528-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921085" comment="texlive-url-doc-2021.186.3.4svn32528-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921086" comment="texlive-urlbst-2021.186.0.0.8svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921087" comment="texlive-urlbst-doc-2021.186.0.0.8svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921088" comment="texlive-urwchancal-2021.186.1svn21701-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921089" comment="texlive-urwchancal-doc-2021.186.1svn21701-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921090" comment="texlive-usebib-2021.186.1.0asvn25969-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921091" comment="texlive-usebib-doc-2021.186.1.0asvn25969-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921092" comment="texlive-ushort-2021.186.2.2svn32261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921093" comment="texlive-ushort-doc-2021.186.2.2svn32261-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921094" comment="texlive-uspace-2021.186.0.0.04svn42456-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921095" comment="texlive-uspace-doc-2021.186.0.0.04svn42456-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921096" comment="texlive-uspatent-2021.186.1.0svn27744-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921097" comment="texlive-uspatent-doc-2021.186.1.0svn27744-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921098" comment="texlive-ut-thesis-2021.186.3.0.1svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921099" comment="texlive-ut-thesis-doc-2021.186.3.0.1svn58661-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921100" comment="texlive-utexasthesis-2021.186.1.0svn48648-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921101" comment="texlive-utexasthesis-doc-2021.186.1.0svn48648-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921102" comment="texlive-utf8add-2021.186.svn55291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921103" comment="texlive-utf8add-doc-2021.186.svn55291-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921104" comment="texlive-utf8mex-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921105" comment="texlive-utf8mex-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921106" comment="texlive-utfsym-2021.186.0.0.8.3svn56729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921107" comment="texlive-utfsym-doc-2021.186.0.0.8.3svn56729-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921108" comment="texlive-utopia-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921109" comment="texlive-utopia-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921110" comment="texlive-utopia-fonts-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921111" comment="texlive-uwmslide-2021.186.svn27354-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921112" comment="texlive-uwmslide-doc-2021.186.svn27354-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921113" comment="texlive-uwthesis-2021.186.6.13svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921114" comment="texlive-uwthesis-doc-2021.186.6.13svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921115" comment="texlive-vak-2021.186.svn23431-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921116" comment="texlive-vak-doc-2021.186.svn23431-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921117" comment="texlive-vancouver-2021.186.0.0.8svn55423-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921118" comment="texlive-vancouver-doc-2021.186.0.0.8svn55423-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921119" comment="texlive-variablelm-2021.186.1.1.2svn46611-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921120" comment="texlive-variablelm-doc-2021.186.1.1.2svn46611-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921121" comment="texlive-variations-2021.186.0.0.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921122" comment="texlive-variations-doc-2021.186.0.0.3svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921123" comment="texlive-varindex-2021.186.2.3svn32262-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921124" comment="texlive-varindex-doc-2021.186.2.3svn32262-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921125" comment="texlive-varisize-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921126" comment="texlive-varisize-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921127" comment="texlive-varsfromjobname-2021.186.1.0svn44154-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921128" comment="texlive-varsfromjobname-doc-2021.186.1.0svn44154-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921129" comment="texlive-varwidth-2021.186.0.0.92svn24104-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921130" comment="texlive-varwidth-doc-2021.186.0.0.92svn24104-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921131" comment="texlive-vaucanson-g-2021.186.0.0.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921132" comment="texlive-vaucanson-g-doc-2021.186.0.0.4svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921133" comment="texlive-vcell-2021.186.1.0.1svn55191-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921134" comment="texlive-vcell-doc-2021.186.1.0.1svn55191-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921135" comment="texlive-vdmlisting-2021.186.1.1svn56905-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921136" comment="texlive-vdmlisting-doc-2021.186.1.1svn56905-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921137" comment="texlive-velthuis-2021.186.2.17.1svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921138" comment="texlive-velthuis-doc-2021.186.2.17.1svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921139" comment="texlive-velthuis-fonts-2021.186.2.17.1svn55475-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921140" comment="texlive-venn-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921141" comment="texlive-venn-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921142" comment="texlive-venndiagram-2021.186.1.2svn47952-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921143" comment="texlive-venndiagram-doc-2021.186.1.2svn47952-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921144" comment="texlive-venturisadf-2021.186.1.005svn19444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921145" comment="texlive-venturisadf-doc-2021.186.1.005svn19444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921146" comment="texlive-venturisadf-fonts-2021.186.1.005svn19444-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921147" comment="texlive-verbasef-2021.186.1.1svn21922-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921148" comment="texlive-verbasef-doc-2021.186.1.1svn21922-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921149" comment="texlive-verbatimbox-2021.186.3.13svn33197-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921150" comment="texlive-verbatimbox-doc-2021.186.3.13svn33197-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921151" comment="texlive-verbatimcopy-2021.186.0.0.06svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921152" comment="texlive-verbatimcopy-doc-2021.186.0.0.06svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921153" comment="texlive-verbdef-2021.186.0.0.2svn17177-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921154" comment="texlive-verbdef-doc-2021.186.0.0.2svn17177-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921155" comment="texlive-verbments-2021.186.1.2svn23670-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921156" comment="texlive-verbments-doc-2021.186.1.2svn23670-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921157" comment="texlive-verifica-2021.186.1.3svn56625-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921158" comment="texlive-verifica-doc-2021.186.1.3svn56625-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921159" comment="texlive-verifiche-2021.186.4.1svn57766-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921160" comment="texlive-verifiche-doc-2021.186.4.1svn57766-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921161" comment="texlive-verse-2021.186.2.4bsvn34017-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921162" comment="texlive-verse-doc-2021.186.2.4bsvn34017-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921163" comment="texlive-version-2021.186.2.0svn21920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921164" comment="texlive-version-doc-2021.186.2.0svn21920-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921165" comment="texlive-versions-2021.186.0.0.55svn21921-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921166" comment="texlive-versions-doc-2021.186.0.0.55svn21921-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921167" comment="texlive-versonotes-2021.186.0.0.4svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921168" comment="texlive-versonotes-doc-2021.186.0.0.4svn55777-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921169" comment="texlive-vertbars-2021.186.1.0csvn49429-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921170" comment="texlive-vertbars-doc-2021.186.1.0csvn49429-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921171" comment="texlive-vgrid-2021.186.0.0.1svn32457-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921172" comment="texlive-vgrid-doc-2021.186.0.0.1svn32457-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921173" comment="texlive-vhistory-2021.186.1.6.1svn30080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921174" comment="texlive-vhistory-doc-2021.186.1.6.1svn30080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921175" comment="texlive-visualfaq-2021.186.svn38647-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921176" comment="texlive-visualpstricks-2021.186.2.3svn39799-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921177" comment="texlive-visualtikz-2021.186.0.0.65svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921178" comment="texlive-vlna-2021.186.svn54074-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921179" comment="texlive-vmargin-2021.186.2.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921180" comment="texlive-vmargin-doc-2021.186.2.5svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921181" comment="texlive-vntex-2021.186.3.2svn30579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921182" comment="texlive-vntex-doc-2021.186.3.2svn30579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921183" comment="texlive-vntex-fonts-2021.186.3.2svn30579-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921184" comment="texlive-vocaltract-2021.186.1svn25629-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921185" comment="texlive-vocaltract-doc-2021.186.1svn25629-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921186" comment="texlive-volumes-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921187" comment="texlive-volumes-doc-2021.186.1.0svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921188" comment="texlive-voss-mathcol-2021.186.0.0.1svn32954-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921189" comment="texlive-vpe-2021.186.0.0.2svn26039-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921190" comment="texlive-vpe-doc-2021.186.0.0.2svn26039-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921191" comment="texlive-vruler-2021.186.2.3svn21598-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921192" comment="texlive-vruler-doc-2021.186.2.3svn21598-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921193" comment="texlive-vtable-2021.186.1.0svn51126-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921194" comment="texlive-vtable-doc-2021.186.1.0svn51126-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921195" comment="texlive-vwcol-2021.186.0.0.2svn36254-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921196" comment="texlive-vwcol-doc-2021.186.0.0.2svn36254-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921197" comment="texlive-wadalab-2021.186.svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921198" comment="texlive-wadalab-doc-2021.186.svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921199" comment="texlive-wadalab-fonts-2021.186.svn42428-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921200" comment="texlive-wallcalendar-2021.186.1.3.1svn45568-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921201" comment="texlive-wallcalendar-doc-2021.186.1.3.1svn45568-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921202" comment="texlive-wallpaper-2021.186.1.10svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921203" comment="texlive-wallpaper-doc-2021.186.1.10svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921204" comment="texlive-warning-2021.186.0.0.01svn22028-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921205" comment="texlive-warning-doc-2021.186.0.0.01svn22028-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921206" comment="texlive-warpcol-2021.186.1.0csvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921207" comment="texlive-warpcol-doc-2021.186.1.0csvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921208" comment="texlive-was-2021.186.svn21439-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921209" comment="texlive-was-doc-2021.186.svn21439-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921210" comment="texlive-wasy-2021.186.2.5svn53533-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921211" comment="texlive-wasy-doc-2021.186.2.5svn53533-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921212" comment="texlive-wasy-type1-2021.186.001.002svn53534-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921213" comment="texlive-wasy-type1-doc-2021.186.001.002svn53534-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921214" comment="texlive-wasy-type1-fonts-2021.186.001.002svn53534-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921215" comment="texlive-wasysym-2021.186.2.4svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921216" comment="texlive-wasysym-doc-2021.186.2.4svn54080-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921217" comment="texlive-web-2021.186.4.5svn57972-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921218" comment="texlive-webguide-2021.186.svn25813-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921219" comment="texlive-webquiz-2021.186.5.2svn50694-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921220" comment="texlive-webquiz-doc-2021.186.5.2svn50694-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921221" comment="texlive-widetable-2021.186.2.1svn53409-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921222" comment="texlive-widetable-doc-2021.186.2.1svn53409-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921223" comment="texlive-widows-and-orphans-2021.186.1.0dsvn58172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921224" comment="texlive-widows-and-orphans-doc-2021.186.1.0dsvn58172-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921225" comment="texlive-williams-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921226" comment="texlive-williams-doc-2021.186.svn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921227" comment="texlive-willowtreebook-2021.186.1.01svn54866-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921228" comment="texlive-willowtreebook-doc-2021.186.1.01svn54866-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921229" comment="texlive-windycity-2021.186.svn57577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921230" comment="texlive-windycity-doc-2021.186.svn57577-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921231" comment="texlive-withargs-2021.186.0.0.3.1svn52641-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921232" comment="texlive-withargs-doc-2021.186.0.0.3.1svn52641-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921233" comment="texlive-witharrows-2021.186.2.6csvn58120-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921234" comment="texlive-witharrows-doc-2021.186.2.6csvn58120-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921235" comment="texlive-wnri-2021.186.svn22459-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921236" comment="texlive-wnri-doc-2021.186.svn22459-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921237" comment="texlive-wnri-latex-2021.186.1.0bsvn22338-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921238" comment="texlive-wnri-latex-doc-2021.186.1.0bsvn22338-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921239" comment="texlive-wordcount-2021.186.1.7svn46165-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921240" comment="texlive-wordcount-doc-2021.186.1.7svn46165-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921241" comment="texlive-wordlike-2021.186.1.2bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921242" comment="texlive-wordlike-doc-2021.186.1.2bsvn15878-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921243" comment="texlive-worksheet-2021.186.1.1svn48423-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921244" comment="texlive-worksheet-doc-2021.186.1.1svn48423-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249779" version="1" class="patch">
	<metadata>
		<title>texlive-wrapfig-2021.186.3.6svn22048-45.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-wrapfig-2021.186.3.6svn22048-45.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10243">CVE-2016-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921245" comment="texlive-wrapfig-2021.186.3.6svn22048-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921246" comment="texlive-wrapfig-doc-2021.186.3.6svn22048-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921247" comment="texlive-wsemclassic-2021.186.1.0.1svn31532-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921248" comment="texlive-wsemclassic-doc-2021.186.1.0.1svn31532-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921249" comment="texlive-wsuipa-2021.186.svn25469-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921250" comment="texlive-wsuipa-doc-2021.186.svn25469-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921251" comment="texlive-wtref-2021.186.0.0.4.0svn55558-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921252" comment="texlive-wtref-doc-2021.186.0.0.4.0svn55558-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921253" comment="texlive-xargs-2021.186.1.1svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921254" comment="texlive-xargs-doc-2021.186.1.1svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921255" comment="texlive-xassoccnt-2021.186.1.8svn55876-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921256" comment="texlive-xassoccnt-doc-2021.186.1.8svn55876-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921257" comment="texlive-xbmks-2021.186.svn53448-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921258" comment="texlive-xbmks-doc-2021.186.svn53448-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921259" comment="texlive-xcharter-2021.186.1.216svn58755-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921260" comment="texlive-xcharter-doc-2021.186.1.216svn58755-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921261" comment="texlive-xcharter-fonts-2021.186.1.216svn58755-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921262" comment="texlive-xcite-2021.186.16383.99998svn53486-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921263" comment="texlive-xcite-doc-2021.186.16383.99998svn53486-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921264" comment="texlive-xcjk2uni-2021.186.1.0svn54958-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921265" comment="texlive-xcjk2uni-doc-2021.186.1.0svn54958-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921266" comment="texlive-xcntperchap-2021.186.0.0.5svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921267" comment="texlive-xcntperchap-doc-2021.186.0.0.5svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921268" comment="texlive-xcolor-2021.186.2.12svn41044-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921269" comment="texlive-xcolor-doc-2021.186.2.12svn41044-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921270" comment="texlive-xcolor-material-2021.186.0.0.1svn42289-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921271" comment="texlive-xcolor-material-doc-2021.186.0.0.1svn42289-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921272" comment="texlive-xcolor-solarized-2021.186.0.0.4svn41809-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921273" comment="texlive-xcolor-solarized-doc-2021.186.0.0.4svn41809-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921274" comment="texlive-xcomment-2021.186.1.3svn20031-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921275" comment="texlive-xcomment-doc-2021.186.1.3svn20031-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921276" comment="texlive-xcookybooky-2021.186.1.5svn36435-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921277" comment="texlive-xcookybooky-doc-2021.186.1.5svn36435-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921278" comment="texlive-xcpdftips-2021.186.1.1svn50449-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921279" comment="texlive-xcpdftips-doc-2021.186.1.1svn50449-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921280" comment="texlive-xdoc-2021.186.prot2.5svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921281" comment="texlive-xdoc-doc-2021.186.prot2.5svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921282" comment="texlive-xduthesis-2021.186.1.00svn39694-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921283" comment="texlive-xduthesis-doc-2021.186.1.00svn39694-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921284" comment="texlive-xdvi-2021.186.svn54338-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921285" comment="texlive-xdvi-doc-2021.186.svn54338-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921286" comment="texlive-xebaposter-2021.186.2.51svn42046-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921287" comment="texlive-xebaposter-doc-2021.186.2.51svn42046-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921288" comment="texlive-xechangebar-2021.186.1.0svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921289" comment="texlive-xechangebar-doc-2021.186.1.0svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921290" comment="texlive-xecjk-2021.186.3.8.6svn56711-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921291" comment="texlive-xecjk-doc-2021.186.3.8.6svn56711-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921292" comment="texlive-xecolor-2021.186.0.0.1svn29660-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921293" comment="texlive-xecolor-doc-2021.186.0.0.1svn29660-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921294" comment="texlive-xecyr-2021.186.1.2svn54308-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921295" comment="texlive-xecyr-doc-2021.186.1.2svn54308-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921296" comment="texlive-xecyrmongolian-2021.186.1.0svn53160-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921297" comment="texlive-xecyrmongolian-doc-2021.186.1.0svn53160-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921298" comment="texlive-xeindex-2021.186.0.0.3svn35756-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921299" comment="texlive-xeindex-doc-2021.186.0.0.3svn35756-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921300" comment="texlive-xelatex-dev-2021.186.svn57186-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921301" comment="texlive-xellipsis-2021.186.2.0svn47546-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921302" comment="texlive-xellipsis-doc-2021.186.2.0svn47546-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921303" comment="texlive-xepersian-2021.186.23.1svn55194-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921304" comment="texlive-xepersian-doc-2021.186.23.1svn55194-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921305" comment="texlive-xepersian-hm-2021.186.1.1asvn56272-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921306" comment="texlive-xepersian-hm-doc-2021.186.1.1asvn56272-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921307" comment="texlive-xesearch-2021.186.0.0.2svn51908-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921308" comment="texlive-xesearch-doc-2021.186.0.0.2svn51908-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921309" comment="texlive-xespotcolor-2021.186.2.1svn58212-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921310" comment="texlive-xespotcolor-doc-2021.186.2.1svn58212-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921311" comment="texlive-xetex-2021.186.svn57972-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921312" comment="texlive-xetex-devanagari-2021.186.0.0.5svn34296-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921313" comment="texlive-xetex-devanagari-doc-2021.186.0.0.5svn34296-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921314" comment="texlive-xetex-doc-2021.186.svn57972-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921315" comment="texlive-xetex-itrans-2021.186.4.2svn55475-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921316" comment="texlive-xetex-itrans-doc-2021.186.4.2svn55475-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921317" comment="texlive-xetex-pstricks-2021.186.svn17055-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921318" comment="texlive-xetex-pstricks-doc-2021.186.svn17055-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921319" comment="texlive-xetex-tibetan-2021.186.0.0.1svn28847-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921320" comment="texlive-xetex-tibetan-doc-2021.186.0.0.1svn28847-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921321" comment="texlive-xetexconfig-2021.186.svn45845-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921322" comment="texlive-xetexfontinfo-2021.186.svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921323" comment="texlive-xetexfontinfo-doc-2021.186.svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921324" comment="texlive-xetexko-2021.186.3.1svn58633-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921325" comment="texlive-xetexko-doc-2021.186.3.1svn58633-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921326" comment="texlive-xetexref-2021.186.svn56291-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921327" comment="texlive-xevlna-2021.186.1.1svn43864-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921328" comment="texlive-xevlna-doc-2021.186.1.1svn43864-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921329" comment="texlive-xfakebold-2021.186.0.0.08svn55654-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921330" comment="texlive-xfakebold-doc-2021.186.0.0.08svn55654-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921331" comment="texlive-xfor-2021.186.1.05svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921332" comment="texlive-xfor-doc-2021.186.1.05svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921333" comment="texlive-xgreek-2021.186.3.0.1svn46662-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921334" comment="texlive-xgreek-doc-2021.186.3.0.1svn46662-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921335" comment="texlive-xhfill-2021.186.1.01svn22575-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921336" comment="texlive-xhfill-doc-2021.186.1.01svn22575-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921337" comment="texlive-xifthen-2021.186.1.4.0svn38929-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921338" comment="texlive-xifthen-doc-2021.186.1.4.0svn38929-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921339" comment="texlive-xii-2021.186.svn45804-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921340" comment="texlive-xii-lat-2021.186.svn45805-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921341" comment="texlive-xindex-2021.186.0.0.28svn56295-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921342" comment="texlive-xindex-doc-2021.186.0.0.28svn56295-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921343" comment="texlive-xint-2021.186.1.4dsvn58738-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921344" comment="texlive-xint-doc-2021.186.1.4dsvn58738-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921345" comment="texlive-xits-2021.186.1.302svn55730-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921346" comment="texlive-xits-doc-2021.186.1.302svn55730-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921347" comment="texlive-xits-fonts-2021.186.1.302svn55730-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921348" comment="texlive-xkcdcolors-2021.186.1.0.1svn54512-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921349" comment="texlive-xkcdcolors-doc-2021.186.1.0.1svn54512-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921350" comment="texlive-xkeyval-2021.186.2.8svn57006-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921351" comment="texlive-xkeyval-doc-2021.186.2.8svn57006-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921352" comment="texlive-xlop-2021.186.0.0.28svn56910-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921353" comment="texlive-xlop-doc-2021.186.0.0.28svn56910-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921354" comment="texlive-xltabular-2021.186.0.0.2esvn56855-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921355" comment="texlive-xltabular-doc-2021.186.0.0.2esvn56855-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921356" comment="texlive-xltxtra-2021.186.0.0.7svn56594-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921357" comment="texlive-xltxtra-doc-2021.186.0.0.7svn56594-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921358" comment="texlive-xml2pmx-2021.186.svn57972-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921359" comment="texlive-xmltex-2021.186.0.0.8svn57186-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921360" comment="texlive-xmltex-doc-2021.186.0.0.8svn57186-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921361" comment="texlive-xmltexconfig-2021.186.svn45845-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921362" comment="texlive-xmpincl-2021.186.2.2svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921363" comment="texlive-xmpincl-doc-2021.186.2.2svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921364" comment="texlive-xmuthesis-2021.186.0.0.4.1svn56614-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921365" comment="texlive-xmuthesis-doc-2021.186.0.0.4.1svn56614-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921366" comment="texlive-xnewcommand-2021.186.1.2svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921367" comment="texlive-xnewcommand-doc-2021.186.1.2svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921368" comment="texlive-xoptarg-2021.186.1.0svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921369" comment="texlive-xoptarg-doc-2021.186.1.0svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921370" comment="texlive-xpatch-2021.186.0.0.3svn54563-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921371" comment="texlive-xpatch-doc-2021.186.0.0.3svn54563-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921372" comment="texlive-xpdfopen-2021.186.0.0.86svn53998-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921373" comment="texlive-xpeek-2021.186.0.0.2svn27442-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921374" comment="texlive-xpeek-doc-2021.186.0.0.2svn27442-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921375" comment="texlive-xpiano-2021.186.1.0svn37604-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921376" comment="texlive-xpiano-doc-2021.186.1.0svn37604-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921377" comment="texlive-xpicture-2021.186.1.2asvn28770-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921378" comment="texlive-xpicture-doc-2021.186.1.2asvn28770-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921379" comment="texlive-xpinyin-2021.186.2.9svn56709-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921380" comment="texlive-xpinyin-doc-2021.186.2.9svn56709-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921381" comment="texlive-xprintlen-2021.186.1.0svn35928-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921382" comment="texlive-xprintlen-doc-2021.186.1.0svn35928-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921383" comment="texlive-xpunctuate-2021.186.1.0svn26641-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921384" comment="texlive-xpunctuate-doc-2021.186.1.0svn26641-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921385" comment="texlive-xq-2021.186.0.0.4svn35211-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921386" comment="texlive-xq-doc-2021.186.0.0.4svn35211-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921387" comment="texlive-xsavebox-2021.186.0.0.16svn54097-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921388" comment="texlive-xsavebox-doc-2021.186.0.0.16svn54097-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921389" comment="texlive-xsim-2021.186.0.0.20csvn57619-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921390" comment="texlive-xsim-doc-2021.186.0.0.20csvn57619-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921391" comment="texlive-xskak-2021.186.1.5svn51432-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921392" comment="texlive-xskak-doc-2021.186.1.5svn51432-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921393" comment="texlive-xstring-2021.186.1.83svn49946-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921394" comment="texlive-xstring-doc-2021.186.1.83svn49946-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921395" comment="texlive-xtab-2021.186.2.3fsvn23347-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921396" comment="texlive-xtab-doc-2021.186.2.3fsvn23347-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921397" comment="texlive-xtuthesis-2021.186.1.0svn47049-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921398" comment="texlive-xtuthesis-doc-2021.186.1.0svn47049-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921399" comment="texlive-xunicode-2021.186.0.0.981svn30466-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921400" comment="texlive-xunicode-doc-2021.186.0.0.981svn30466-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921401" comment="texlive-xurl-2021.186.0.0.09asvn57265-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921402" comment="texlive-xurl-doc-2021.186.0.0.09asvn57265-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921403" comment="texlive-xwatermark-2021.186.1.5.2dsvn28090-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921404" comment="texlive-xwatermark-doc-2021.186.1.5.2dsvn28090-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921405" comment="texlive-xyling-2021.186.1.1svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921406" comment="texlive-xyling-doc-2021.186.1.1svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921407" comment="texlive-xymtex-2021.186.5.06svn32182-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921408" comment="texlive-xymtex-doc-2021.186.5.06svn32182-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921409" comment="texlive-xypic-2021.186.3.8.9svn31859-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921410" comment="texlive-xypic-doc-2021.186.3.8.9svn31859-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921411" comment="texlive-xypic-fonts-2021.186.3.8.9svn31859-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921412" comment="texlive-xypic-tut-pt-2021.186.svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921413" comment="texlive-xytree-2021.186.1.5svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921414" comment="texlive-xytree-doc-2021.186.1.5svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921415" comment="texlive-yafoot-2021.186.1.1svn48568-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921416" comment="texlive-yafoot-doc-2021.186.1.1svn48568-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921417" comment="texlive-yagusylo-2021.186.1.2svn29803-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921418" comment="texlive-yagusylo-doc-2021.186.1.2svn29803-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921419" comment="texlive-yaletter-2021.186.1.1svn42830-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921420" comment="texlive-yaletter-doc-2021.186.1.1svn42830-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921421" comment="texlive-yannisgr-2021.186.svn22613-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921422" comment="texlive-yannisgr-doc-2021.186.svn22613-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921423" comment="texlive-yathesis-2021.186.1.0.7svn58683-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921424" comment="texlive-yathesis-doc-2021.186.1.0.7svn58683-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921425" comment="texlive-yax-2021.186.1.03svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921426" comment="texlive-yax-doc-2021.186.1.03svn54080-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921427" comment="texlive-yazd-thesis-2021.186.0.0.3svn51725-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921428" comment="texlive-yazd-thesis-doc-2021.186.0.0.3svn51725-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921429" comment="texlive-ycbook-2021.186.svn46201-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921430" comment="texlive-ycbook-doc-2021.186.svn46201-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921431" comment="texlive-ydoc-2021.186.0.0.6alphasvn56291-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921432" comment="texlive-ydoc-doc-2021.186.0.0.6alphasvn56291-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921433" comment="texlive-yfonts-2021.186.1.4svn50755-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921434" comment="texlive-yfonts-doc-2021.186.1.4svn50755-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921435" comment="texlive-yfonts-t1-2021.186.1.0svn36013-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921436" comment="texlive-yfonts-t1-doc-2021.186.1.0svn36013-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921437" comment="texlive-yfonts-t1-fonts-2021.186.1.0svn36013-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921438" comment="texlive-yhmath-2021.186.1.6svn54377-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921439" comment="texlive-yhmath-doc-2021.186.1.6svn54377-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921440" comment="texlive-yhmath-fonts-2021.186.1.6svn54377-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921441" comment="texlive-yinit-otf-2021.186.1.0svn40207-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921442" comment="texlive-yinit-otf-doc-2021.186.1.0svn40207-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921443" comment="texlive-yinit-otf-fonts-2021.186.1.0svn40207-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921444" comment="texlive-york-thesis-2021.186.3.6svn23348-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921445" comment="texlive-york-thesis-doc-2021.186.3.6svn23348-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921446" comment="texlive-youngtab-2021.186.1.1svn56500-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921447" comment="texlive-youngtab-doc-2021.186.1.1svn56500-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921448" comment="texlive-yplan-2021.186.svn34398-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921449" comment="texlive-yplan-doc-2021.186.svn34398-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921450" comment="texlive-yquant-2021.186.0.0.4svn58712-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921451" comment="texlive-yquant-doc-2021.186.0.0.4svn58712-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921452" comment="texlive-ytableau-2021.186.1.3svn27430-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921453" comment="texlive-ytableau-doc-2021.186.1.3svn27430-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921454" comment="texlive-zapfchan-2021.186.svn31835-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921455" comment="texlive-zapfchan-fonts-2021.186.svn31835-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921456" comment="texlive-zapfding-2021.186.svn31835-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921457" comment="texlive-zapfding-fonts-2021.186.svn31835-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921458" comment="texlive-zbmath-review-template-2021.186.1.0svn58543-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921459" comment="texlive-zbmath-review-template-doc-2021.186.1.0svn58543-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921460" comment="texlive-zebra-goodies-2021.186.0.0.8.0svn51554-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921461" comment="texlive-zebra-goodies-doc-2021.186.0.0.8.0svn51554-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921462" comment="texlive-zed-csp-2021.186.svn17258-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921463" comment="texlive-zed-csp-doc-2021.186.svn17258-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921464" comment="texlive-zhlineskip-2021.186.1.0esvn51142-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921465" comment="texlive-zhlineskip-doc-2021.186.1.0esvn51142-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921466" comment="texlive-zhlipsum-2021.186.1.2.0svn54994-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921467" comment="texlive-zhlipsum-doc-2021.186.1.2.0svn54994-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921468" comment="texlive-zhmetrics-2021.186.r206svn22207-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921469" comment="texlive-zhmetrics-doc-2021.186.r206svn22207-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921470" comment="texlive-zhmetrics-uptex-2021.186.1.0svn40728-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921471" comment="texlive-zhmetrics-uptex-doc-2021.186.1.0svn40728-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921472" comment="texlive-zhnumber-2021.186.2.8svn54960-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921473" comment="texlive-zhnumber-doc-2021.186.2.8svn54960-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921474" comment="texlive-zhspacing-2021.186.svn41145-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921475" comment="texlive-zhspacing-doc-2021.186.svn41145-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921476" comment="texlive-ziffer-2021.186.2.1svn32279-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921477" comment="texlive-ziffer-doc-2021.186.2.1svn32279-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921478" comment="texlive-zlmtt-2021.186.1.02svn51368-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921479" comment="texlive-zlmtt-doc-2021.186.1.02svn51368-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921480" comment="texlive-zootaxa-bst-2021.186.1.0svn50619-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921481" comment="texlive-zootaxa-bst-doc-2021.186.1.0svn50619-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921482" comment="texlive-zref-2021.186.2.32svn56611-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921483" comment="texlive-zref-doc-2021.186.2.32svn56611-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921484" comment="texlive-zwgetfdate-2021.186.svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921485" comment="texlive-zwgetfdate-doc-2021.186.svn15878-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921486" comment="texlive-zwpagelayout-2021.186.1.4dsvn53965-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921487" comment="texlive-zwpagelayout-doc-2021.186.1.4dsvn53965-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921488" comment="texlive-zxjafbfont-2021.186.0.0.2svn28539-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921489" comment="texlive-zxjafbfont-doc-2021.186.0.0.2svn28539-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921490" comment="texlive-zxjafont-2021.186.1.2svn53884-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921491" comment="texlive-zxjafont-doc-2021.186.1.2svn53884-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921492" comment="texlive-zxjatype-2021.186.0.0.7svn53500-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921493" comment="texlive-zxjatype-doc-2021.186.0.0.7svn53500-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921494" comment="texlive-zztex-2021.186.17.7svn55862-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921495" comment="texlive-zztex-doc-2021.186.17.7svn55862-45.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249780" version="1" class="patch">
	<metadata>
		<title>libthrift-0_14_1-0.14.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13949" ref_url="https://www.suse.com/security/cve/CVE-2020-13949/" source="CVE"/>
		<description>
These are all security issues fixed in the libthrift-0_14_1-0.14.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13949/">CVE-2020-13949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13949">CVE-2020-13949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921496" comment="libthrift-0_14_1-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921497" comment="libthrift-devel-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921498" comment="libthrift_c_glib0-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921499" comment="libthriftnb-0_14_1-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921500" comment="libthriftz-0_14_1-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921501" comment="perl-thrift-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921502" comment="python36-thrift-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921503" comment="python38-thrift-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921504" comment="python39-thrift-0.14.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921505" comment="thrift-0.14.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249781" version="1" class="patch">
	<metadata>
		<title>thttpd-2.29-3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17663" ref_url="https://www.suse.com/security/cve/CVE-2017-17663/" source="CVE"/>
		<description>
These are all security issues fixed in the thttpd-2.29-3.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17663/">CVE-2017-17663 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17663">CVE-2017-17663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921506" comment="thttpd-2.29-3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249782" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.3.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-0405" ref_url="https://www.suse.com/security/cve/CVE-2006-0405/" source="CVE"/>
		<reference ref_id="CVE-2006-2656" ref_url="https://www.suse.com/security/cve/CVE-2006-2656/" source="CVE"/>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.3.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0405/">CVE-2006-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0405">CVE-2006-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2656/">CVE-2006-2656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2656">CVE-2006-2656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10271">CVE-2016-10271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10272">CVE-2016-10272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10371">CVE-2016-10371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9538">CVE-2016-9538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16232">CVE-2017-16232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7592">CVE-2017-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7594">CVE-2017-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7598">CVE-2017-7598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9403">CVE-2017-9403 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9404">CVE-2017-9404 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9936">CVE-2017-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17000">CVE-2018-17000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19210">CVE-2018-19210 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5784">CVE-2018-5784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7663">CVE-2019-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921507" comment="libtiff-devel-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921508" comment="libtiff-devel-32bit-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921509" comment="libtiff5-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921510" comment="libtiff5-32bit-4.3.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921511" comment="tiff-4.3.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249783" version="1" class="patch">
	<metadata>
		<title>timidity-2.15.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-2971" ref_url="https://www.suse.com/security/cve/CVE-2010-2971/" source="CVE"/>
		<reference ref_id="CVE-2017-11546" ref_url="https://www.suse.com/security/cve/CVE-2017-11546/" source="CVE"/>
		<reference ref_id="CVE-2017-11547" ref_url="https://www.suse.com/security/cve/CVE-2017-11547/" source="CVE"/>
		<description>
These are all security issues fixed in the timidity-2.15.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0179">CVE-2009-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2971/">CVE-2010-2971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2971">CVE-2010-2971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11546/">CVE-2017-11546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11546">CVE-2017-11546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11547/">CVE-2017-11547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11547">CVE-2017-11547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921512" comment="timidity-2.15.0-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249784" version="1" class="patch">
	<metadata>
		<title>tinc-1.0.36-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16737" ref_url="https://www.suse.com/security/cve/CVE-2018-16737/" source="CVE"/>
		<reference ref_id="CVE-2018-16758" ref_url="https://www.suse.com/security/cve/CVE-2018-16758/" source="CVE"/>
		<description>
These are all security issues fixed in the tinc-1.0.36-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16737/">CVE-2018-16737 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16737">CVE-2018-16737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16758/">CVE-2018-16758 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16758">CVE-2018-16758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921513" comment="tinc-1.0.36-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249785" version="1" class="patch">
	<metadata>
		<title>libtinyobjloader2-2.0.0rc8+git.20210821-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28589" ref_url="https://www.suse.com/security/cve/CVE-2020-28589/" source="CVE"/>
		<description>
These are all security issues fixed in the libtinyobjloader2-2.0.0rc8+git.20210821-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28589/">CVE-2020-28589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28589">CVE-2020-28589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921514" comment="libtinyobjloader2-2.0.0rc8+git.20210821-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921515" comment="tinyobjloader-devel-2.0.0rc8+git.20210821-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249786" version="1" class="patch">
	<metadata>
		<title>tinyproxy-1.11.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11747" ref_url="https://www.suse.com/security/cve/CVE-2017-11747/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyproxy-1.11.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11747/">CVE-2017-11747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11747">CVE-2017-11747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921516" comment="tinyproxy-1.11.0-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249787" version="1" class="patch">
	<metadata>
		<title>tmux-3.2a-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19387" ref_url="https://www.suse.com/security/cve/CVE-2018-19387/" source="CVE"/>
		<reference ref_id="CVE-2020-27347" ref_url="https://www.suse.com/security/cve/CVE-2020-27347/" source="CVE"/>
		<description>
These are all security issues fixed in the tmux-3.2a-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19387/">CVE-2018-19387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-19387">CVE-2018-19387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27347/">CVE-2020-27347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27347">CVE-2020-27347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921517" comment="tmux-3.2a-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249788" version="1" class="patch">
	<metadata>
		<title>tnef-1.4.18-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8911" ref_url="https://www.suse.com/security/cve/CVE-2017-8911/" source="CVE"/>
		<description>
These are all security issues fixed in the tnef-1.4.18-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8911/">CVE-2017-8911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8911">CVE-2017-8911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921518" comment="tnef-1.4.18-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249789" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.36-8.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199/" source="CVE"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996/" source="CVE"/>
		<reference ref_id="CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943/" source="CVE"/>
		<reference ref_id="CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.36-8.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0199">CVE-2019-0199 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10072">CVE-2019-10072 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11996">CVE-2020-11996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13943">CVE-2020-13943 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17527">CVE-2020-17527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25122">CVE-2021-25122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921519" comment="tomcat-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921520" comment="tomcat-admin-webapps-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921521" comment="tomcat-docs-webapp-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921522" comment="tomcat-el-3_0-api-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921523" comment="tomcat-embed-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921524" comment="tomcat-javadoc-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921525" comment="tomcat-jsp-2_3-api-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921526" comment="tomcat-jsvc-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921527" comment="tomcat-lib-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921528" comment="tomcat-servlet-4_0-api-9.0.36-8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921529" comment="tomcat-webapps-9.0.36-8.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249790" version="1" class="patch">
	<metadata>
		<title>tor-0.4.6.7-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1254" ref_url="https://www.suse.com/security/cve/CVE-2016-1254/" source="CVE"/>
		<reference ref_id="CVE-2017-0375" ref_url="https://www.suse.com/security/cve/CVE-2017-0375/" source="CVE"/>
		<reference ref_id="CVE-2017-0376" ref_url="https://www.suse.com/security/cve/CVE-2017-0376/" source="CVE"/>
		<reference ref_id="CVE-2017-0377" ref_url="https://www.suse.com/security/cve/CVE-2017-0377/" source="CVE"/>
		<reference ref_id="CVE-2017-0380" ref_url="https://www.suse.com/security/cve/CVE-2017-0380/" source="CVE"/>
		<reference ref_id="CVE-2017-8819" ref_url="https://www.suse.com/security/cve/CVE-2017-8819/" source="CVE"/>
		<reference ref_id="CVE-2017-8820" ref_url="https://www.suse.com/security/cve/CVE-2017-8820/" source="CVE"/>
		<reference ref_id="CVE-2017-8821" ref_url="https://www.suse.com/security/cve/CVE-2017-8821/" source="CVE"/>
		<reference ref_id="CVE-2017-8822" ref_url="https://www.suse.com/security/cve/CVE-2017-8822/" source="CVE"/>
		<reference ref_id="CVE-2017-8823" ref_url="https://www.suse.com/security/cve/CVE-2017-8823/" source="CVE"/>
		<reference ref_id="CVE-2018-0490" ref_url="https://www.suse.com/security/cve/CVE-2018-0490/" source="CVE"/>
		<reference ref_id="CVE-2018-0491" ref_url="https://www.suse.com/security/cve/CVE-2018-0491/" source="CVE"/>
		<reference ref_id="CVE-2019-8955" ref_url="https://www.suse.com/security/cve/CVE-2019-8955/" source="CVE"/>
		<reference ref_id="CVE-2020-10592" ref_url="https://www.suse.com/security/cve/CVE-2020-10592/" source="CVE"/>
		<reference ref_id="CVE-2020-10593" ref_url="https://www.suse.com/security/cve/CVE-2020-10593/" source="CVE"/>
		<reference ref_id="CVE-2020-15572" ref_url="https://www.suse.com/security/cve/CVE-2020-15572/" source="CVE"/>
		<reference ref_id="CVE-2021-28089" ref_url="https://www.suse.com/security/cve/CVE-2021-28089/" source="CVE"/>
		<reference ref_id="CVE-2021-28090" ref_url="https://www.suse.com/security/cve/CVE-2021-28090/" source="CVE"/>
		<reference ref_id="CVE-2021-34548" ref_url="https://www.suse.com/security/cve/CVE-2021-34548/" source="CVE"/>
		<reference ref_id="CVE-2021-34549" ref_url="https://www.suse.com/security/cve/CVE-2021-34549/" source="CVE"/>
		<reference ref_id="CVE-2021-34550" ref_url="https://www.suse.com/security/cve/CVE-2021-34550/" source="CVE"/>
		<reference ref_id="CVE-2021-38385" ref_url="https://www.suse.com/security/cve/CVE-2021-38385/" source="CVE"/>
		<description>
These are all security issues fixed in the tor-0.4.6.7-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1254/">CVE-2016-1254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1254">CVE-2016-1254 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0375/">CVE-2017-0375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0375">CVE-2017-0375 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0376/">CVE-2017-0376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0376">CVE-2017-0376 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0377/">CVE-2017-0377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0377">CVE-2017-0377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0380/">CVE-2017-0380 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0380">CVE-2017-0380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8819/">CVE-2017-8819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8819">CVE-2017-8819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8820/">CVE-2017-8820 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8820">CVE-2017-8820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8821/">CVE-2017-8821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8821">CVE-2017-8821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8822/">CVE-2017-8822 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8822">CVE-2017-8822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8823/">CVE-2017-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8823">CVE-2017-8823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0490/">CVE-2018-0490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0490">CVE-2018-0490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0491/">CVE-2018-0491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0491">CVE-2018-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8955/">CVE-2019-8955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8955">CVE-2019-8955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10592/">CVE-2020-10592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10592">CVE-2020-10592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10593/">CVE-2020-10593 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10593">CVE-2020-10593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15572/">CVE-2020-15572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15572">CVE-2020-15572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28089/">CVE-2021-28089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28089">CVE-2021-28089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28090/">CVE-2021-28090 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28090">CVE-2021-28090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34548/">CVE-2021-34548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34548">CVE-2021-34548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34549/">CVE-2021-34549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34549">CVE-2021-34549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34550/">CVE-2021-34550 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34550">CVE-2021-34550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38385/">CVE-2021-38385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38385">CVE-2021-38385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921530" comment="tor-0.4.6.7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249791" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-3.1.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-24455" ref_url="https://www.suse.com/security/cve/CVE-2020-24455/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-3.1.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24455/">CVE-2020-24455 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24455">CVE-2020-24455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921531" comment="libtss2-esys0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921532" comment="libtss2-esys0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921533" comment="libtss2-fapi1-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921534" comment="libtss2-fapi1-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921535" comment="libtss2-mu0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921536" comment="libtss2-mu0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921537" comment="libtss2-rc0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921538" comment="libtss2-rc0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921539" comment="libtss2-sys1-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921540" comment="libtss2-sys1-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921541" comment="libtss2-tcti-cmd0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921542" comment="libtss2-tcti-cmd0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921543" comment="libtss2-tcti-device0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921544" comment="libtss2-tcti-device0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921545" comment="libtss2-tcti-mssim0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921546" comment="libtss2-tcti-mssim0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921547" comment="libtss2-tcti-pcap0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921548" comment="libtss2-tcti-swtpm0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921549" comment="libtss2-tcti-swtpm0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921550" comment="libtss2-tctildr0-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921551" comment="libtss2-tctildr0-32bit-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921552" comment="tpm2-0-tss-3.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921553" comment="tpm2-0-tss-devel-3.1.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249792" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-5.1.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7524" ref_url="https://www.suse.com/security/cve/CVE-2017-7524/" source="CVE"/>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-5.1.1-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7524/">CVE-2017-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7524">CVE-2017-7524 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3565">CVE-2021-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921554" comment="tpm2.0-tools-5.1.1-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249793" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.8a-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.8a-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16899">CVE-2017-16899 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16140">CVE-2018-16140 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14275">CVE-2019-14275 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921555" comment="transfig-3.2.8a-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249794" version="1" class="patch">
	<metadata>
		<title>python36-translate-toolkit-3.3.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-translate-toolkit-3.3.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921556" comment="python36-translate-toolkit-3.3.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921557" comment="python38-translate-toolkit-3.3.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921558" comment="python39-translate-toolkit-3.3.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921559" comment="translate-toolkit-devel-doc-3.3.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921560" comment="translate-toolkit-doc-3.3.6-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249795" version="1" class="patch">
	<metadata>
		<title>transmission-3.00-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-5072" ref_url="https://www.suse.com/security/cve/CVE-2018-5072/" source="CVE"/>
		<reference ref_id="CVE-2018-5702" ref_url="https://www.suse.com/security/cve/CVE-2018-5702/" source="CVE"/>
		<description>
These are all security issues fixed in the transmission-3.00-2.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5072/">CVE-2018-5072 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5072">CVE-2018-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5702/">CVE-2018-5702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5702">CVE-2018-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921561" comment="transmission-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921562" comment="transmission-common-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921563" comment="transmission-daemon-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921564" comment="transmission-gtk-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921565" comment="transmission-gtk-lang-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921566" comment="transmission-qt-3.00-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921567" comment="transmission-qt-lang-3.00-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249796" version="1" class="patch">
	<metadata>
		<title>agrep-0.8.0_git201402282055-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-8859" ref_url="https://www.suse.com/security/cve/CVE-2016-8859/" source="CVE"/>
		<description>
These are all security issues fixed in the agrep-0.8.0_git201402282055-5.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8859/">CVE-2016-8859 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8859">CVE-2016-8859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921568" comment="agrep-0.8.0_git201402282055-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921569" comment="libtre5-0.8.0_git201402282055-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921570" comment="tre-0.8.0_git201402282055-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921571" comment="tre-devel-0.8.0_git201402282055-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921572" comment="tre-lang-0.8.0_git201402282055-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249797" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.15-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898/" source="CVE"/>
		<reference ref_id="CVE-2020-24332" ref_url="https://www.suse.com/security/cve/CVE-2020-24332/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.15-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18898">CVE-2019-18898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24332/">CVE-2020-24332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24332">CVE-2020-24332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921573" comment="libtspi1-0.3.15-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921574" comment="libtspi1-32bit-0.3.15-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921575" comment="trousers-0.3.15-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921576" comment="trousers-devel-0.3.15-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249798" version="1" class="patch">
	<metadata>
		<title>libucl1-1.03-4.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11243" ref_url="https://www.suse.com/security/cve/CVE-2018-11243/" source="CVE"/>
		<description>
These are all security issues fixed in the libucl1-1.03-4.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11243/">CVE-2018-11243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11243">CVE-2018-11243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921577" comment="libucl1-1.03-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921578" comment="ucl-devel-1.03-4.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249799" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20210608-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20210608-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921579" comment="ucode-intel-20210608-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249800" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.9.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.9.2-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17336">CVE-2018-17336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921580" comment="libudisks2-0-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921581" comment="libudisks2-0-devel-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921582" comment="libudisks2-0_bcache-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921583" comment="libudisks2-0_btrfs-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921584" comment="libudisks2-0_lsm-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921585" comment="libudisks2-0_lvm2-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921586" comment="libudisks2-0_vdo-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921587" comment="libudisks2-0_zram-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921588" comment="typelib-1_0-UDisks-2_0-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921589" comment="udisks2-2.9.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921590" comment="udisks2-lang-2.9.2-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249801" version="1" class="patch">
	<metadata>
		<title>gimp-ufraw-0.22-9.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8366" ref_url="https://www.suse.com/security/cve/CVE-2015-8366/" source="CVE"/>
		<reference ref_id="CVE-2018-19655" ref_url="https://www.suse.com/security/cve/CVE-2018-19655/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-ufraw-0.22-9.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8366/">CVE-2015-8366 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8366">CVE-2015-8366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19655/">CVE-2018-19655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19655">CVE-2018-19655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921591" comment="gimp-ufraw-0.22-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921592" comment="ufraw-0.22-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921593" comment="ufraw-lang-0.22-9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249802" version="1" class="patch">
	<metadata>
		<title>libulfius2_7-2.7.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40540" ref_url="https://www.suse.com/security/cve/CVE-2021-40540/" source="CVE"/>
		<description>
These are all security issues fixed in the libulfius2_7-2.7.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40540/">CVE-2021-40540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40540">CVE-2021-40540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921594" comment="libulfius2_7-2.7.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921595" comment="ulfius-devel-2.7.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921596" comment="uwsc-2.7.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249803" version="1" class="patch">
	<metadata>
		<title>umoci-0.4.7-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<description>
These are all security issues fixed in the umoci-0.4.7-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29136">CVE-2021-29136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921597" comment="umoci-0.4.7-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249804" version="1" class="patch">
	<metadata>
		<title>libodbc2-2.3.9-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
These are all security issues fixed in the libodbc2-2.3.9-3.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7409">CVE-2018-7409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7485">CVE-2018-7485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921598" comment="libodbc2-2.3.9-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921599" comment="libodbc2-32bit-2.3.9-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921600" comment="unixODBC-2.3.9-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921601" comment="unixODBC-32bit-2.3.9-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921602" comment="unixODBC-devel-2.3.9-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921603" comment="unixODBC-devel-32bit-2.3.9-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249805" version="1" class="patch">
	<metadata>
		<title>libunshield0-1.4.3-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1386" ref_url="https://www.suse.com/security/cve/CVE-2015-1386/" source="CVE"/>
		<description>
These are all security issues fixed in the libunshield0-1.4.3-2.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1386/">CVE-2015-1386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1386">CVE-2015-1386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921604" comment="libunshield0-1.4.3-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921605" comment="unshield-1.4.3-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921606" comment="unshield-devel-1.4.3-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249806" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-39.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921607" comment="unzip-6.00-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921608" comment="unzip-doc-6.00-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249807" version="1" class="patch">
	<metadata>
		<title>upx-3.96-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16869" ref_url="https://www.suse.com/security/cve/CVE-2017-16869/" source="CVE"/>
		<reference ref_id="CVE-2018-11243" ref_url="https://www.suse.com/security/cve/CVE-2018-11243/" source="CVE"/>
		<reference ref_id="CVE-2019-1010048" ref_url="https://www.suse.com/security/cve/CVE-2019-1010048/" source="CVE"/>
		<reference ref_id="CVE-2019-14296" ref_url="https://www.suse.com/security/cve/CVE-2019-14296/" source="CVE"/>
		<reference ref_id="CVE-2019-20021" ref_url="https://www.suse.com/security/cve/CVE-2019-20021/" source="CVE"/>
		<reference ref_id="CVE-2019-20053" ref_url="https://www.suse.com/security/cve/CVE-2019-20053/" source="CVE"/>
		<reference ref_id="CVE-2020-24119" ref_url="https://www.suse.com/security/cve/CVE-2020-24119/" source="CVE"/>
		<description>
These are all security issues fixed in the upx-3.96-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16869/">CVE-2017-16869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16869">CVE-2017-16869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11243/">CVE-2018-11243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11243">CVE-2018-11243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010048/">CVE-2019-1010048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010048">CVE-2019-1010048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14296/">CVE-2019-14296 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14296">CVE-2019-14296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20021/">CVE-2019-20021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20021">CVE-2019-20021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20053/">CVE-2019-20053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20053">CVE-2019-20053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24119/">CVE-2020-24119 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24119">CVE-2020-24119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921609" comment="upx-3.96-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249808" version="1" class="patch">
	<metadata>
		<title>uranium-firmware-lulzbot-1.1.9.34_5f9c029d1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000537" ref_url="https://www.suse.com/security/cve/CVE-2018-1000537/" source="CVE"/>
		<description>
These are all security issues fixed in the uranium-firmware-lulzbot-1.1.9.34_5f9c029d1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000537/">CVE-2018-1000537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000537">CVE-2018-1000537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921610" comment="uranium-firmware-lulzbot-1.1.9.34_5f9c029d1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249809" version="1" class="patch">
	<metadata>
		<title>liburiparser1-0.9.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19198" ref_url="https://www.suse.com/security/cve/CVE-2018-19198/" source="CVE"/>
		<reference ref_id="CVE-2018-19199" ref_url="https://www.suse.com/security/cve/CVE-2018-19199/" source="CVE"/>
		<reference ref_id="CVE-2018-19200" ref_url="https://www.suse.com/security/cve/CVE-2018-19200/" source="CVE"/>
		<reference ref_id="CVE-2018-20721" ref_url="https://www.suse.com/security/cve/CVE-2018-20721/" source="CVE"/>
		<description>
These are all security issues fixed in the liburiparser1-0.9.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19198/">CVE-2018-19198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19198">CVE-2018-19198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19199/">CVE-2018-19199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19199">CVE-2018-19199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19200/">CVE-2018-19200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19200">CVE-2018-19200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20721/">CVE-2018-20721 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20721">CVE-2018-20721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921611" comment="liburiparser1-0.9.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921612" comment="liburiparser1-32bit-0.9.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921613" comment="uriparser-0.9.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921614" comment="uriparser-devel-0.9.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921615" comment="uriparser-doc-0.9.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249810" version="1" class="patch">
	<metadata>
		<title>libusbredirhost1-0.11.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3700" ref_url="https://www.suse.com/security/cve/CVE-2021-3700/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbredirhost1-0.11.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3700/">CVE-2021-3700 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3700">CVE-2021-3700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921616" comment="libusbredirhost1-0.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921617" comment="libusbredirparser1-0.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921618" comment="usbredir-0.11.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921619" comment="usbredir-devel-0.11.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249811" version="1" class="patch">
	<metadata>
		<title>apache2-mod_uwsgi-2.0.19.1-3.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-6758" ref_url="https://www.suse.com/security/cve/CVE-2018-6758/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_uwsgi-2.0.19.1-3.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6758/">CVE-2018-6758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6758">CVE-2018-6758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921620" comment="apache2-mod_uwsgi-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921621" comment="uwsgi-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921622" comment="uwsgi-emperor_pg-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921623" comment="uwsgi-emperor_zeromq-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921624" comment="uwsgi-gevent-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921625" comment="uwsgi-glusterfs-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921626" comment="uwsgi-greenlet-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921627" comment="uwsgi-jvm-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921628" comment="uwsgi-ldap-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921629" comment="uwsgi-libffi-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921630" comment="uwsgi-logzmq-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921631" comment="uwsgi-lua-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921632" comment="uwsgi-pam-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921633" comment="uwsgi-php7-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921634" comment="uwsgi-psgi-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921635" comment="uwsgi-pypy-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921636" comment="uwsgi-python-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921637" comment="uwsgi-python3-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921638" comment="uwsgi-sqlite3-2.0.19.1-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921639" comment="uwsgi-xslt-2.0.19.1-3.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249812" version="1" class="patch">
	<metadata>
		<title>vagrant-2.2.18-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16892" ref_url="https://www.suse.com/security/cve/CVE-2019-16892/" source="CVE"/>
		<description>
These are all security issues fixed in the vagrant-2.2.18-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16892/">CVE-2019-16892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16892">CVE-2019-16892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921640" comment="vagrant-2.2.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921641" comment="vagrant-bash-completion-2.2.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921642" comment="vagrant-doc-2.2.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921643" comment="vagrant-emacs-2.2.18-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921644" comment="vagrant-vim-2.2.18-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249813" version="1" class="patch">
	<metadata>
		<title>valgrind-3.17.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4865" ref_url="https://www.suse.com/security/cve/CVE-2008-4865/" source="CVE"/>
		<description>
These are all security issues fixed in the valgrind-3.17.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4865/">CVE-2008-4865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4865">CVE-2008-4865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921645" comment="valgrind-3.17.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921646" comment="valgrind-32bit-3.17.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921647" comment="valgrind-devel-3.17.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249814" version="1" class="patch">
	<metadata>
		<title>libvarnishapi2-6.6.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15892" ref_url="https://www.suse.com/security/cve/CVE-2019-15892/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi2-6.6.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15892/">CVE-2019-15892 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15892">CVE-2019-15892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921648" comment="libvarnishapi2-6.6.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921649" comment="varnish-6.6.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921650" comment="varnish-devel-6.6.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249815" version="1" class="patch">
	<metadata>
		<title>velero-1.6.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-3996" ref_url="https://www.suse.com/security/cve/CVE-2020-3996/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.6.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3996/">CVE-2020-3996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3996">CVE-2020-3996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921651" comment="velero-1.6.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249816" version="1" class="patch">
	<metadata>
		<title>velocity-1.7-9.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<description>
These are all security issues fixed in the velocity-1.7-9.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13936">CVE-2020-13936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921652" comment="velocity-1.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921653" comment="velocity-demo-1.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921654" comment="velocity-javadoc-1.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921655" comment="velocity-manual-1.7-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249817" version="1" class="patch">
	<metadata>
		<title>veyon-4.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29074" ref_url="https://www.suse.com/security/cve/CVE-2020-29074/" source="CVE"/>
		<description>
These are all security issues fixed in the veyon-4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-29074/">CVE-2020-29074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29074">CVE-2020-29074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921656" comment="veyon-4.6.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249818" version="1" class="patch">
	<metadata>
		<title>gvim-8.2.3408-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.2.3408-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000382">CVE-2017-1000382 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921657" comment="gvim-8.2.3408-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921658" comment="vim-8.2.3408-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921659" comment="vim-data-8.2.3408-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921660" comment="vim-data-common-8.2.3408-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921661" comment="vim-small-8.2.3408-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249819" version="1" class="patch">
	<metadata>
		<title>vino-3.22.0-7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.22.0-7.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921662" comment="vino-3.22.0-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921663" comment="vino-lang-3.22.0-7.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249820" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer1-0.9.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="CVE-2019-18392" ref_url="https://www.suse.com/security/cve/CVE-2019-18392/" source="CVE"/>
		<reference ref_id="CVE-2020-8002" ref_url="https://www.suse.com/security/cve/CVE-2020-8002/" source="CVE"/>
		<reference ref_id="CVE-2020-8003" ref_url="https://www.suse.com/security/cve/CVE-2020-8003/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer1-0.9.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10214">CVE-2016-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5937">CVE-2017-5937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5957">CVE-2017-5957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5993">CVE-2017-5993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5994">CVE-2017-5994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6386">CVE-2017-6386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18392/">CVE-2019-18392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18392">CVE-2019-18392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8002/">CVE-2020-8002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8002">CVE-2020-8002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8003/">CVE-2020-8003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8003">CVE-2020-8003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921664" comment="libvirglrenderer1-0.9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921665" comment="virglrenderer-devel-0.9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921666" comment="virglrenderer-test-server-0.9.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249821" version="1" class="patch">
	<metadata>
		<title>virt-install-3.2.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-install-3.2.0-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10183">CVE-2019-10183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921667" comment="virt-install-3.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921668" comment="virt-manager-3.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921669" comment="virt-manager-common-3.2.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249822" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-6.1.26-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10392" ref_url="https://www.suse.com/security/cve/CVE-2017-10392/" source="CVE"/>
		<reference ref_id="CVE-2017-3316" ref_url="https://www.suse.com/security/cve/CVE-2017-3316/" source="CVE"/>
		<reference ref_id="CVE-2017-3559" ref_url="https://www.suse.com/security/cve/CVE-2017-3559/" source="CVE"/>
		<reference ref_id="CVE-2017-3561" ref_url="https://www.suse.com/security/cve/CVE-2017-3561/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-2689" ref_url="https://www.suse.com/security/cve/CVE-2018-2689/" source="CVE"/>
		<reference ref_id="CVE-2018-2694" ref_url="https://www.suse.com/security/cve/CVE-2018-2694/" source="CVE"/>
		<reference ref_id="CVE-2018-2842" ref_url="https://www.suse.com/security/cve/CVE-2018-2842/" source="CVE"/>
		<reference ref_id="CVE-2018-3005" ref_url="https://www.suse.com/security/cve/CVE-2018-3005/" source="CVE"/>
		<reference ref_id="CVE-2018-3087" ref_url="https://www.suse.com/security/cve/CVE-2018-3087/" source="CVE"/>
		<reference ref_id="CVE-2018-3288" ref_url="https://www.suse.com/security/cve/CVE-2018-3288/" source="CVE"/>
		<reference ref_id="CVE-2018-3294" ref_url="https://www.suse.com/security/cve/CVE-2018-3294/" source="CVE"/>
		<reference ref_id="CVE-2019-2450" ref_url="https://www.suse.com/security/cve/CVE-2019-2450/" source="CVE"/>
		<reference ref_id="CVE-2019-2500" ref_url="https://www.suse.com/security/cve/CVE-2019-2500/" source="CVE"/>
		<reference ref_id="CVE-2019-2501" ref_url="https://www.suse.com/security/cve/CVE-2019-2501/" source="CVE"/>
		<reference ref_id="CVE-2019-2521" ref_url="https://www.suse.com/security/cve/CVE-2019-2521/" source="CVE"/>
		<reference ref_id="CVE-2019-2656" ref_url="https://www.suse.com/security/cve/CVE-2019-2656/" source="CVE"/>
		<reference ref_id="CVE-2019-2678" ref_url="https://www.suse.com/security/cve/CVE-2019-2678/" source="CVE"/>
		<reference ref_id="CVE-2019-2722" ref_url="https://www.suse.com/security/cve/CVE-2019-2722/" source="CVE"/>
		<reference ref_id="CVE-2019-2848" ref_url="https://www.suse.com/security/cve/CVE-2019-2848/" source="CVE"/>
		<reference ref_id="CVE-2019-2859" ref_url="https://www.suse.com/security/cve/CVE-2019-2859/" source="CVE"/>
		<reference ref_id="CVE-2019-2926" ref_url="https://www.suse.com/security/cve/CVE-2019-2926/" source="CVE"/>
		<reference ref_id="CVE-2019-2984" ref_url="https://www.suse.com/security/cve/CVE-2019-2984/" source="CVE"/>
		<reference ref_id="CVE-2019-3028" ref_url="https://www.suse.com/security/cve/CVE-2019-3028/" source="CVE"/>
		<reference ref_id="CVE-2020-14628" ref_url="https://www.suse.com/security/cve/CVE-2020-14628/" source="CVE"/>
		<reference ref_id="CVE-2020-14673" ref_url="https://www.suse.com/security/cve/CVE-2020-14673/" source="CVE"/>
		<reference ref_id="CVE-2020-14677" ref_url="https://www.suse.com/security/cve/CVE-2020-14677/" source="CVE"/>
		<reference ref_id="CVE-2020-14700" ref_url="https://www.suse.com/security/cve/CVE-2020-14700/" source="CVE"/>
		<reference ref_id="CVE-2020-14703" ref_url="https://www.suse.com/security/cve/CVE-2020-14703/" source="CVE"/>
		<reference ref_id="CVE-2020-14713" ref_url="https://www.suse.com/security/cve/CVE-2020-14713/" source="CVE"/>
		<reference ref_id="CVE-2020-14715" ref_url="https://www.suse.com/security/cve/CVE-2020-14715/" source="CVE"/>
		<reference ref_id="CVE-2020-2674" ref_url="https://www.suse.com/security/cve/CVE-2020-2674/" source="CVE"/>
		<reference ref_id="CVE-2020-2681" ref_url="https://www.suse.com/security/cve/CVE-2020-2681/" source="CVE"/>
		<reference ref_id="CVE-2020-2704" ref_url="https://www.suse.com/security/cve/CVE-2020-2704/" source="CVE"/>
		<reference ref_id="CVE-2021-2074" ref_url="https://www.suse.com/security/cve/CVE-2021-2074/" source="CVE"/>
		<reference ref_id="CVE-2021-2145" ref_url="https://www.suse.com/security/cve/CVE-2021-2145/" source="CVE"/>
		<reference ref_id="CVE-2021-2264" ref_url="https://www.suse.com/security/cve/CVE-2021-2264/" source="CVE"/>
		<reference ref_id="CVE-2021-2281" ref_url="https://www.suse.com/security/cve/CVE-2021-2281/" source="CVE"/>
		<reference ref_id="CVE-2021-2287" ref_url="https://www.suse.com/security/cve/CVE-2021-2287/" source="CVE"/>
		<reference ref_id="CVE-2021-2310" ref_url="https://www.suse.com/security/cve/CVE-2021-2310/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-6.1.26-3.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10392/">CVE-2017-10392 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10392">CVE-2017-10392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3316/">CVE-2017-3316 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3316">CVE-2017-3316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3559/">CVE-2017-3559 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3559">CVE-2017-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3561/">CVE-2017-3561 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3561">CVE-2017-3561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11763">CVE-2018-11763 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2689/">CVE-2018-2689 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2689">CVE-2018-2689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2694/">CVE-2018-2694 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2694">CVE-2018-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2842/">CVE-2018-2842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2842">CVE-2018-2842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3005/">CVE-2018-3005 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3005">CVE-2018-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3087/">CVE-2018-3087 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3087">CVE-2018-3087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3288/">CVE-2018-3288 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3288">CVE-2018-3288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3294/">CVE-2018-3294 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3294">CVE-2018-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2450/">CVE-2019-2450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2450">CVE-2019-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2500/">CVE-2019-2500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2500">CVE-2019-2500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2501/">CVE-2019-2501 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2501">CVE-2019-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2521/">CVE-2019-2521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2521">CVE-2019-2521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2656/">CVE-2019-2656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2656">CVE-2019-2656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2678/">CVE-2019-2678 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2678">CVE-2019-2678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2722/">CVE-2019-2722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2722">CVE-2019-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2848/">CVE-2019-2848 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2848">CVE-2019-2848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2859/">CVE-2019-2859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2859">CVE-2019-2859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2926/">CVE-2019-2926 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2926">CVE-2019-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2984/">CVE-2019-2984 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2984">CVE-2019-2984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3028/">CVE-2019-3028 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3028">CVE-2019-3028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14628/">CVE-2020-14628 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14628">CVE-2020-14628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14673/">CVE-2020-14673 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14673">CVE-2020-14673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14677/">CVE-2020-14677 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14677">CVE-2020-14677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14700/">CVE-2020-14700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14700">CVE-2020-14700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14703/">CVE-2020-14703 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14703">CVE-2020-14703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14713/">CVE-2020-14713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14713">CVE-2020-14713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14715/">CVE-2020-14715 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14715">CVE-2020-14715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2674/">CVE-2020-2674 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2674">CVE-2020-2674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2681/">CVE-2020-2681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2681">CVE-2020-2681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2704/">CVE-2020-2704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2704">CVE-2020-2704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2074/">CVE-2021-2074 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2074">CVE-2021-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2145/">CVE-2021-2145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2145">CVE-2021-2145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2264/">CVE-2021-2264 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2264">CVE-2021-2264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2281/">CVE-2021-2281 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2281">CVE-2021-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2287/">CVE-2021-2287 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2287">CVE-2021-2287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2310/">CVE-2021-2310 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2310">CVE-2021-2310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921670" comment="python3-virtualbox-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921671" comment="virtualbox-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921672" comment="virtualbox-devel-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921673" comment="virtualbox-guest-desktop-icons-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921674" comment="virtualbox-guest-source-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921675" comment="virtualbox-guest-tools-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921676" comment="virtualbox-guest-x11-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921677" comment="virtualbox-host-source-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921678" comment="virtualbox-qt-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921679" comment="virtualbox-vnc-6.1.26-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921680" comment="virtualbox-websrv-6.1.26-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249823" version="1" class="patch">
	<metadata>
		<title>libvlc5-3.0.16-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-10699" ref_url="https://www.suse.com/security/cve/CVE-2017-10699/" source="CVE"/>
		<reference ref_id="CVE-2017-9300" ref_url="https://www.suse.com/security/cve/CVE-2017-9300/" source="CVE"/>
		<reference ref_id="CVE-2018-19857" ref_url="https://www.suse.com/security/cve/CVE-2018-19857/" source="CVE"/>
		<reference ref_id="CVE-2019-13602" ref_url="https://www.suse.com/security/cve/CVE-2019-13602/" source="CVE"/>
		<reference ref_id="CVE-2019-13962" ref_url="https://www.suse.com/security/cve/CVE-2019-13962/" source="CVE"/>
		<reference ref_id="CVE-2019-14437" ref_url="https://www.suse.com/security/cve/CVE-2019-14437/" source="CVE"/>
		<reference ref_id="CVE-2019-14498" ref_url="https://www.suse.com/security/cve/CVE-2019-14498/" source="CVE"/>
		<reference ref_id="CVE-2019-14533" ref_url="https://www.suse.com/security/cve/CVE-2019-14533/" source="CVE"/>
		<reference ref_id="CVE-2019-14534" ref_url="https://www.suse.com/security/cve/CVE-2019-14534/" source="CVE"/>
		<reference ref_id="CVE-2019-14535" ref_url="https://www.suse.com/security/cve/CVE-2019-14535/" source="CVE"/>
		<reference ref_id="CVE-2019-14776" ref_url="https://www.suse.com/security/cve/CVE-2019-14776/" source="CVE"/>
		<reference ref_id="CVE-2019-14777" ref_url="https://www.suse.com/security/cve/CVE-2019-14777/" source="CVE"/>
		<reference ref_id="CVE-2019-14970" ref_url="https://www.suse.com/security/cve/CVE-2019-14970/" source="CVE"/>
		<reference ref_id="CVE-2019-5439" ref_url="https://www.suse.com/security/cve/CVE-2019-5439/" source="CVE"/>
		<reference ref_id="CVE-2019-5460" ref_url="https://www.suse.com/security/cve/CVE-2019-5460/" source="CVE"/>
		<reference ref_id="CVE-2020-13428" ref_url="https://www.suse.com/security/cve/CVE-2020-13428/" source="CVE"/>
		<reference ref_id="CVE-2020-26664" ref_url="https://www.suse.com/security/cve/CVE-2020-26664/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-3.0.16-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10699/">CVE-2017-10699 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10699">CVE-2017-10699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9300/">CVE-2017-9300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9300">CVE-2017-9300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19857/">CVE-2018-19857 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19857">CVE-2018-19857 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13602/">CVE-2019-13602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13602">CVE-2019-13602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13962/">CVE-2019-13962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13962">CVE-2019-13962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14437/">CVE-2019-14437 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14437">CVE-2019-14437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14498/">CVE-2019-14498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14498">CVE-2019-14498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14533/">CVE-2019-14533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14533">CVE-2019-14533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14534/">CVE-2019-14534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14534">CVE-2019-14534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14535/">CVE-2019-14535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14535">CVE-2019-14535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14776/">CVE-2019-14776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14776">CVE-2019-14776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14777/">CVE-2019-14777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14777">CVE-2019-14777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14970/">CVE-2019-14970 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14970">CVE-2019-14970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5439/">CVE-2019-5439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5439">CVE-2019-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5460/">CVE-2019-5460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5460">CVE-2019-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13428/">CVE-2020-13428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13428">CVE-2020-13428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26664/">CVE-2020-26664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26664">CVE-2020-26664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921681" comment="libvlc5-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921682" comment="libvlccore9-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921683" comment="vlc-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921684" comment="vlc-codec-gstreamer-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921685" comment="vlc-devel-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921686" comment="vlc-jack-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921687" comment="vlc-lang-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921688" comment="vlc-noX-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921689" comment="vlc-opencv-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921690" comment="vlc-qt-3.0.16-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921691" comment="vlc-vdpau-3.0.16-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249824" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.2-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921692" comment="vorbis-tools-1.4.2-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921693" comment="vorbis-tools-lang-1.4.2-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249825" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20180125-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20180125-1.14 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921694" comment="w3m-0.5.3+git20180125-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921695" comment="w3m-inline-image-0.5.3+git20180125-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249826" version="1" class="patch">
	<metadata>
		<title>libwavpack1-32bit-5.4.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010315" ref_url="https://www.suse.com/security/cve/CVE-2019-1010315/" source="CVE"/>
		<reference ref_id="CVE-2019-1010317" ref_url="https://www.suse.com/security/cve/CVE-2019-1010317/" source="CVE"/>
		<reference ref_id="CVE-2019-1010318" ref_url="https://www.suse.com/security/cve/CVE-2019-1010318/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-32bit-5.4.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19841">CVE-2018-19841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6767">CVE-2018-6767 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7253">CVE-2018-7253 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7254">CVE-2018-7254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010315/">CVE-2019-1010315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010315">CVE-2019-1010315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1010317/">CVE-2019-1010317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010317">CVE-2019-1010317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1010318/">CVE-2019-1010318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010318">CVE-2019-1010318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010319">CVE-2019-1010319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11498">CVE-2019-11498 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921696" comment="libwavpack1-5.4.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921697" comment="libwavpack1-32bit-5.4.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921698" comment="wavpack-5.4.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921699" comment="wavpack-devel-5.4.0-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249827" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4692">CVE-2016-4692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4743">CVE-2016-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7589">CVE-2016-7589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7598">CVE-2016-7598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7641">CVE-2016-7641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7654">CVE-2016-7654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7656">CVE-2016-7656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000121">CVE-2017-1000121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13798">CVE-2017-13798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13803">CVE-2017-13803 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13866">CVE-2017-13866 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13884">CVE-2017-13884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2350">CVE-2017-2350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2365">CVE-2017-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2371">CVE-2017-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2373">CVE-2017-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2496">CVE-2017-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2510">CVE-2017-2510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2538">CVE-2017-2538 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7006">CVE-2017-7006 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7019">CVE-2017-7019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7020">CVE-2017-7020 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7030">CVE-2017-7030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7039">CVE-2017-7039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7043">CVE-2017-7043 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7046">CVE-2017-7046 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7052">CVE-2017-7052 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7056">CVE-2017-7056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7081">CVE-2017-7081 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7089">CVE-2017-7089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7093">CVE-2017-7093 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7098">CVE-2017-7098 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7104">CVE-2017-7104 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7117">CVE-2017-7117 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7156">CVE-2017-7156 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7157">CVE-2017-7157 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7161">CVE-2017-7161 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11646">CVE-2018-11646 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12911">CVE-2018-12911 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4088">CVE-2018-4088 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4101">CVE-2018-4101 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4120">CVE-2018-4120 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4127">CVE-2018-4127 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4133">CVE-2018-4133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4162">CVE-2018-4162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4190">CVE-2018-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4191">CVE-2018-4191 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4207">CVE-2018-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4212">CVE-2018-4212 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4222">CVE-2018-4222 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4261">CVE-2018-4261 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4264">CVE-2018-4264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4270">CVE-2018-4270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4284">CVE-2018-4284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4306">CVE-2018-4306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4315">CVE-2018-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4319">CVE-2018-4319 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4345">CVE-2018-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4359">CVE-2018-4359 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4372">CVE-2018-4372 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4375">CVE-2018-4375 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4382">CVE-2018-4382 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4437">CVE-2018-4437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4441">CVE-2018-4441 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4443">CVE-2018-4443 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6212">CVE-2019-6212 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6216">CVE-2019-6216 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6229">CVE-2019-6229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7285">CVE-2019-7285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8375">CVE-2019-8375 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8518">CVE-2019-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921700" comment="libjavascriptcoregtk-4_0-18-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921701" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921702" comment="libwebkit2gtk-4_0-37-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921703" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921704" comment="libwebkit2gtk3-lang-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921705" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921706" comment="typelib-1_0-WebKit2-4_0-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921707" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921708" comment="webkit-jsc-4-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921709" comment="webkit2gtk-4_0-injected-bundles-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921710" comment="webkit2gtk3-devel-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921711" comment="webkit2gtk3-minibrowser-2.32.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249828" version="1" class="patch">
	<metadata>
		<title>weblate-4.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-6802" ref_url="https://www.suse.com/security/cve/CVE-2020-6802/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-4.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6802/">CVE-2020-6802 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6802">CVE-2020-6802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921712" comment="weblate-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921713" comment="weblate-doc-4.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249829" version="1" class="patch">
	<metadata>
		<title>weechat-3.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14727" ref_url="https://www.suse.com/security/cve/CVE-2017-14727/" source="CVE"/>
		<reference ref_id="CVE-2017-8073" ref_url="https://www.suse.com/security/cve/CVE-2017-8073/" source="CVE"/>
		<reference ref_id="CVE-2020-8955" ref_url="https://www.suse.com/security/cve/CVE-2020-8955/" source="CVE"/>
		<description>
These are all security issues fixed in the weechat-3.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14727/">CVE-2017-14727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14727">CVE-2017-14727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8073/">CVE-2017-8073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8073">CVE-2017-8073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8955/">CVE-2020-8955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8955">CVE-2020-8955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921714" comment="weechat-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921715" comment="weechat-devel-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921716" comment="weechat-lang-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921717" comment="weechat-lua-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921718" comment="weechat-perl-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921719" comment="weechat-python-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921720" comment="weechat-ruby-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921721" comment="weechat-spell-3.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921722" comment="weechat-tcl-3.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249830" version="1" class="patch">
	<metadata>
		<title>wesnoth-1.15.17-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1999023" ref_url="https://www.suse.com/security/cve/CVE-2018-1999023/" source="CVE"/>
		<description>
These are all security issues fixed in the wesnoth-1.15.17-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1999023/">CVE-2018-1999023 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1999023">CVE-2018-1999023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921723" comment="wesnoth-1.15.17-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921724" comment="wesnoth-campaign-server-1.15.17-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921725" comment="wesnoth-data-1.15.17-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921726" comment="wesnoth-fslayout-1.15.17-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921727" comment="wesnoth-server-1.15.17-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249831" version="1" class="patch">
	<metadata>
		<title>wget-1.21.1-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483/" source="CVE"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.21.1-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13089">CVE-2017-13089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13090">CVE-2017-13090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20483">CVE-2018-20483 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921728" comment="wget-1.21.1-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921729" comment="wget-lang-1.21.1-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249832" version="1" class="patch">
	<metadata>
		<title>wicked-0.6.66-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902/" source="CVE"/>
		<reference ref_id="CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903/" source="CVE"/>
		<reference ref_id="CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216/" source="CVE"/>
		<reference ref_id="CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked-0.6.66-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18902">CVE-2019-18902 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18903">CVE-2019-18903 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7216">CVE-2020-7216 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7217">CVE-2020-7217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921730" comment="wicked-0.6.66-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921731" comment="wicked-service-0.6.66-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249833" version="1" class="patch">
	<metadata>
		<title>libWildMidi2-0.4.4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11661" ref_url="https://www.suse.com/security/cve/CVE-2017-11661/" source="CVE"/>
		<reference ref_id="CVE-2017-11664" ref_url="https://www.suse.com/security/cve/CVE-2017-11664/" source="CVE"/>
		<description>
These are all security issues fixed in the libWildMidi2-0.4.4-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11661/">CVE-2017-11661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11661">CVE-2017-11661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11664/">CVE-2017-11664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11664">CVE-2017-11664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921732" comment="libWildMidi2-0.4.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921733" comment="wildmidi-0.4.4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921734" comment="wildmidi-devel-0.4.4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249834" version="1" class="patch">
	<metadata>
		<title>libwireshark14-3.4.8-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15189" ref_url="https://www.suse.com/security/cve/CVE-2017-15189/" source="CVE"/>
		<reference ref_id="CVE-2017-15190" ref_url="https://www.suse.com/security/cve/CVE-2017-15190/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6467" ref_url="https://www.suse.com/security/cve/CVE-2017-6467/" source="CVE"/>
		<reference ref_id="CVE-2017-6468" ref_url="https://www.suse.com/security/cve/CVE-2017-6468/" source="CVE"/>
		<reference ref_id="CVE-2017-6469" ref_url="https://www.suse.com/security/cve/CVE-2017-6469/" source="CVE"/>
		<reference ref_id="CVE-2017-6470" ref_url="https://www.suse.com/security/cve/CVE-2017-6470/" source="CVE"/>
		<reference ref_id="CVE-2017-6471" ref_url="https://www.suse.com/security/cve/CVE-2017-6471/" source="CVE"/>
		<reference ref_id="CVE-2017-6472" ref_url="https://www.suse.com/security/cve/CVE-2017-6472/" source="CVE"/>
		<reference ref_id="CVE-2017-6473" ref_url="https://www.suse.com/security/cve/CVE-2017-6473/" source="CVE"/>
		<reference ref_id="CVE-2017-6474" ref_url="https://www.suse.com/security/cve/CVE-2017-6474/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-18225" ref_url="https://www.suse.com/security/cve/CVE-2018-18225/" source="CVE"/>
		<reference ref_id="CVE-2018-18226" ref_url="https://www.suse.com/security/cve/CVE-2018-18226/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9257" ref_url="https://www.suse.com/security/cve/CVE-2018-9257/" source="CVE"/>
		<reference ref_id="CVE-2018-9258" ref_url="https://www.suse.com/security/cve/CVE-2018-9258/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10897" ref_url="https://www.suse.com/security/cve/CVE-2019-10897/" source="CVE"/>
		<reference ref_id="CVE-2019-10898" ref_url="https://www.suse.com/security/cve/CVE-2019-10898/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10900" ref_url="https://www.suse.com/security/cve/CVE-2019-10900/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10902" ref_url="https://www.suse.com/security/cve/CVE-2019-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319/" source="CVE"/>
		<reference ref_id="CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553/" source="CVE"/>
		<reference ref_id="CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716/" source="CVE"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647/" source="CVE"/>
		<reference ref_id="CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164/" source="CVE"/>
		<reference ref_id="CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466/" source="CVE"/>
		<reference ref_id="CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498/" source="CVE"/>
		<reference ref_id="CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862/" source="CVE"/>
		<reference ref_id="CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863/" source="CVE"/>
		<reference ref_id="CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866/" source="CVE"/>
		<reference ref_id="CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418/" source="CVE"/>
		<reference ref_id="CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419/" source="CVE"/>
		<reference ref_id="CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420/" source="CVE"/>
		<reference ref_id="CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421/" source="CVE"/>
		<reference ref_id="CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422/" source="CVE"/>
		<reference ref_id="CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575/" source="CVE"/>
		<reference ref_id="CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030/" source="CVE"/>
		<reference ref_id="CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044/" source="CVE"/>
		<reference ref_id="CVE-2020-9428" ref_url="https://www.suse.com/security/cve/CVE-2020-9428/" source="CVE"/>
		<reference ref_id="CVE-2020-9429" ref_url="https://www.suse.com/security/cve/CVE-2020-9429/" source="CVE"/>
		<reference ref_id="CVE-2020-9430" ref_url="https://www.suse.com/security/cve/CVE-2020-9430/" source="CVE"/>
		<reference ref_id="CVE-2020-9431" ref_url="https://www.suse.com/security/cve/CVE-2020-9431/" source="CVE"/>
		<reference ref_id="CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173/" source="CVE"/>
		<reference ref_id="CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174/" source="CVE"/>
		<reference ref_id="CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191/" source="CVE"/>
		<reference ref_id="CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207/" source="CVE"/>
		<reference ref_id="CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark14-3.4.8-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13764">CVE-2017-13764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15189/">CVE-2017-15189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15189">CVE-2017-15189 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15190/">CVE-2017-15190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15190">CVE-2017-15190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6467/">CVE-2017-6467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6467">CVE-2017-6467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6468/">CVE-2017-6468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6468">CVE-2017-6468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6469/">CVE-2017-6469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6469">CVE-2017-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6470/">CVE-2017-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6470">CVE-2017-6470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6471/">CVE-2017-6471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6471">CVE-2017-6471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6472/">CVE-2017-6472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6472">CVE-2017-6472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6473/">CVE-2017-6473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6473">CVE-2017-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6474/">CVE-2017-6474 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6474">CVE-2017-6474 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12086">CVE-2018-12086 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18225/">CVE-2018-18225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18225">CVE-2018-18225 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18226/">CVE-2018-18226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18226">CVE-2018-18226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18227">CVE-2018-18227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19623">CVE-2018-19623 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19624">CVE-2018-19624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19625">CVE-2018-19625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19626">CVE-2018-19626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19627">CVE-2018-19627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19628">CVE-2018-19628 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9257/">CVE-2018-9257 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9257">CVE-2018-9257 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9258/">CVE-2018-9258 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9258">CVE-2018-9258 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10894">CVE-2019-10894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10895">CVE-2019-10895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10896">CVE-2019-10896 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10897/">CVE-2019-10897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10897">CVE-2019-10897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10898/">CVE-2019-10898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10898">CVE-2019-10898 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10899">CVE-2019-10899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10900/">CVE-2019-10900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10900">CVE-2019-10900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10901">CVE-2019-10901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10902/">CVE-2019-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10902">CVE-2019-10902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10903">CVE-2019-10903 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13619">CVE-2019-13619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16319">CVE-2019-16319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19553">CVE-2019-19553 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5716">CVE-2019-5716 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5717">CVE-2019-5717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5718">CVE-2019-5718 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5719">CVE-2019-5719 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5721">CVE-2019-5721 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9208">CVE-2019-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9209">CVE-2019-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9214">CVE-2019-9214 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11647">CVE-2020-11647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13164">CVE-2020-13164 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15466">CVE-2020-15466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17498">CVE-2020-17498 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25862">CVE-2020-25862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25863">CVE-2020-25863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25866">CVE-2020-25866 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26418">CVE-2020-26418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26419">CVE-2020-26419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26420">CVE-2020-26420 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26421">CVE-2020-26421 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26422">CVE-2020-26422 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26575">CVE-2020-26575 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28030">CVE-2020-28030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7044">CVE-2020-7044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9428/">CVE-2020-9428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9428">CVE-2020-9428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9429/">CVE-2020-9429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9429">CVE-2020-9429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9430/">CVE-2020-9430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9430">CVE-2020-9430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9431/">CVE-2020-9431 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9431">CVE-2020-9431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22173">CVE-2021-22173 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22174">CVE-2021-22174 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22191">CVE-2021-22191 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22207">CVE-2021-22207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22235">CVE-2021-22235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921735" comment="libwireshark14-3.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921736" comment="libwiretap11-3.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921737" comment="libwsutil12-3.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921738" comment="wireshark-3.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921739" comment="wireshark-devel-3.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921740" comment="wireshark-ui-qt-3.4.8-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249835" version="1" class="patch">
	<metadata>
		<title>wp-cli-2.5.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29504" ref_url="https://www.suse.com/security/cve/CVE-2021-29504/" source="CVE"/>
		<description>
These are all security issues fixed in the wp-cli-2.5.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29504/">CVE-2021-29504 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29504">CVE-2021-29504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921741" comment="wp-cli-2.5.0-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249836" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.9-13.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.9-13.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921742" comment="wpa_supplicant-2.9-13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921743" comment="wpa_supplicant-gui-2.9-13.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249837" version="1" class="patch">
	<metadata>
		<title>libxapian-devel-1.4.18-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0499" ref_url="https://www.suse.com/security/cve/CVE-2018-0499/" source="CVE"/>
		<description>
These are all security issues fixed in the libxapian-devel-1.4.18-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0499/">CVE-2018-0499 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0499">CVE-2018-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921744" comment="libxapian-devel-1.4.18-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921745" comment="libxapian30-1.4.18-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921746" comment="libxapian30-32bit-1.4.18-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921747" comment="xapian-core-1.4.18-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921748" comment="xapian-core-doc-1.4.18-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921749" comment="xapian-core-examples-1.4.18-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249838" version="1" class="patch">
	<metadata>
		<title>alevtd-3.107-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13696" ref_url="https://www.suse.com/security/cve/CVE-2020-13696/" source="CVE"/>
		<description>
These are all security issues fixed in the alevtd-3.107-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13696/">CVE-2020-13696 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13696">CVE-2020-13696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921750" comment="alevtd-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921751" comment="motv-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921752" comment="pia-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921753" comment="tv-common-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921754" comment="v4l-conf-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921755" comment="v4l-tools-3.107-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921756" comment="xawtv-3.107-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249839" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.1.3+20201113-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.1.3+20201113-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18266">CVE-2017-18266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921757" comment="xdg-utils-1.1.3+20201113-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249840" version="1" class="patch">
	<metadata>
		<title>xdm-1.1.12-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2179" ref_url="https://www.suse.com/security/cve/CVE-2013-2179/" source="CVE"/>
		<description>
These are all security issues fixed in the xdm-1.1.12-16.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2179/">CVE-2013-2179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2179">CVE-2013-2179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921758" comment="xdm-1.1.12-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921759" comment="xdm-xsession-1.1.12-16.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249841" version="1" class="patch">
	<metadata>
		<title>xen-4.15.1_01-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743/" source="CVE"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-29040" ref_url="https://www.suse.com/security/cve/CVE-2020-29040/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29567" ref_url="https://www.suse.com/security/cve/CVE-2020-29567/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1320">CVE-2007-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1366">CVE-2007-1366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3919">CVE-2007-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10025">CVE-2016-10025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9377">CVE-2016-9377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9384">CVE-2016-9384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9385">CVE-2016-9385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12136">CVE-2017-12136 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12892">CVE-2018-12892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15468">CVE-2018-15468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15469">CVE-2018-15469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15470">CVE-2018-15470 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18883">CVE-2018-18883 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19963">CVE-2018-19963 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19964">CVE-2018-19964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5244">CVE-2018-5244 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7540">CVE-2018-7540 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7541">CVE-2018-7541 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7542">CVE-2018-7542 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17349">CVE-2019-17349 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11743">CVE-2020-11743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15566">CVE-2020-15566 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25598">CVE-2020-25598 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25602">CVE-2020-25602 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-29040/">CVE-2020-29040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29040">CVE-2020-29040 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29567/">CVE-2020-29567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29567">CVE-2020-29567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28687">CVE-2021-28687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921760" comment="xen-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921761" comment="xen-devel-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921762" comment="xen-doc-html-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921763" comment="xen-libs-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921764" comment="xen-libs-32bit-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921765" comment="xen-tools-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921766" comment="xen-tools-domU-4.15.1_01-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921767" comment="xen-tools-xendomains-wait-disk-4.15.1_01-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249842" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_2-3.2.3-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_2-3.2.3-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921768" comment="libxerces-c-3_2-3.2.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921769" comment="libxerces-c-3_2-32bit-3.2.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921770" comment="libxerces-c-devel-3.2.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921771" comment="xerces-c-3.2.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921772" comment="xerces-c-doc-3.2.3-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249843" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-batik-1.14-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17566" ref_url="https://www.suse.com/security/cve/CVE-2019-17566/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-batik-1.14-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17566/">CVE-2019-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17566">CVE-2019-17566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921773" comment="xmlgraphics-batik-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921774" comment="xmlgraphics-batik-css-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921775" comment="xmlgraphics-batik-demo-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921776" comment="xmlgraphics-batik-javadoc-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921777" comment="xmlgraphics-batik-rasterizer-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921778" comment="xmlgraphics-batik-slideshow-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921779" comment="xmlgraphics-batik-squiggle-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921780" comment="xmlgraphics-batik-svgpp-1.14-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921781" comment="xmlgraphics-batik-ttf2svg-1.14-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249844" version="1" class="patch">
	<metadata>
		<title>libxmltooling-devel-3.2.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489/" source="CVE"/>
		<reference ref_id="CVE-2019-9628" ref_url="https://www.suse.com/security/cve/CVE-2019-9628/" source="CVE"/>
		<description>
These are all security issues fixed in the libxmltooling-devel-3.2.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0486">CVE-2018-0486 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0489">CVE-2018-0489 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9628/">CVE-2019-9628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9628">CVE-2019-9628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921782" comment="libxmltooling-devel-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921783" comment="libxmltooling-lite10-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921784" comment="libxmltooling10-3.2.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921785" comment="xmltooling-schemas-3.2.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249845" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-16.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-16.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4568">CVE-2007-4568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921786" comment="xorg-x11-7.6_1-16.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921787" comment="xorg-x11-essentials-7.6_1-16.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249846" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-1.20.13-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-1.20.13-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6101">CVE-2006-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6102">CVE-2006-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6103">CVE-2006-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1003">CVE-2007-1003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5760">CVE-2007-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6427">CVE-2007-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6428">CVE-2007-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6429">CVE-2007-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0006">CVE-2008-0006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1377">CVE-2008-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1379">CVE-2008-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2360">CVE-2008-2360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2361">CVE-2008-2361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2362">CVE-2008-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10971">CVE-2017-10971 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12176">CVE-2017-12176 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12187">CVE-2017-12187 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13721">CVE-2017-13721 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2624">CVE-2017-2624 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921788" comment="xorg-x11-server-1.20.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921789" comment="xorg-x11-server-Xvfb-1.20.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921790" comment="xorg-x11-server-extra-1.20.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921791" comment="xorg-x11-server-sdk-1.20.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921792" comment="xorg-x11-server-source-1.20.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921793" comment="xorg-x11-server-wrapper-1.20.13-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249847" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.15-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.15-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1430">CVE-2013-1430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16927">CVE-2017-16927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6967">CVE-2017-6967 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921794" comment="libpainter0-0.9.15-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921795" comment="librfxencode0-0.9.15-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921796" comment="xrdp-0.9.15-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921797" comment="xrdp-devel-0.9.15-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249848" version="1" class="patch">
	<metadata>
		<title>xterm-368-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-368-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921798" comment="xterm-368-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921799" comment="xterm-bin-368-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249849" version="1" class="patch">
	<metadata>
		<title>xwayland-21.1.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-21.1.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921800" comment="xwayland-21.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921801" comment="xwayland-devel-21.1.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249850" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_6-0.6.3-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_6-0.6.3-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5950">CVE-2017-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921802" comment="libyaml-cpp0_6-0.6.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921803" comment="yaml-cpp-devel-0.6.3-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249851" version="1" class="patch">
	<metadata>
		<title>libyara-devel-4.1.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10210" ref_url="https://www.suse.com/security/cve/CVE-2016-10210/" source="CVE"/>
		<reference ref_id="CVE-2017-8294" ref_url="https://www.suse.com/security/cve/CVE-2017-8294/" source="CVE"/>
		<reference ref_id="CVE-2017-9304" ref_url="https://www.suse.com/security/cve/CVE-2017-9304/" source="CVE"/>
		<description>
These are all security issues fixed in the libyara-devel-4.1.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10210/">CVE-2016-10210 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10210">CVE-2016-10210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8294/">CVE-2017-8294 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8294">CVE-2017-8294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9304/">CVE-2017-9304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9304">CVE-2017-9304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921804" comment="libyara-devel-4.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921805" comment="libyara8-4.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921806" comment="yara-4.1.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921807" comment="yara-doc-4.1.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249852" version="1" class="patch">
	<metadata>
		<title>yast2-core-4.4.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-4.4.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921808" comment="yast2-core-4.4.0-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921809" comment="yast2-core-devel-4.4.0-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249853" version="1" class="patch">
	<metadata>
		<title>yast2-buildtools-4.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17042" ref_url="https://www.suse.com/security/cve/CVE-2017-17042/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-buildtools-4.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17042/">CVE-2017-17042 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17042">CVE-2017-17042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921810" comment="yast2-buildtools-4.4.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921811" comment="yast2-devtools-4.4.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249854" version="1" class="patch">
	<metadata>
		<title>yast2-multipath-4.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17955" ref_url="https://www.suse.com/security/cve/CVE-2018-17955/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-multipath-4.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17955/">CVE-2018-17955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17955">CVE-2018-17955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921812" comment="yast2-multipath-4.4.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249855" version="1" class="patch">
	<metadata>
		<title>yast2-rmt-1.3.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17957" ref_url="https://www.suse.com/security/cve/CVE-2018-17957/" source="CVE"/>
		<reference ref_id="CVE-2018-20105" ref_url="https://www.suse.com/security/cve/CVE-2018-20105/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-rmt-1.3.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17957/">CVE-2018-17957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17957">CVE-2018-17957 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20105/">CVE-2018-20105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20105">CVE-2018-20105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921813" comment="yast2-rmt-1.3.3-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249856" version="1" class="patch">
	<metadata>
		<title>yast2-samba-provision-1.0.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17956" ref_url="https://www.suse.com/security/cve/CVE-2018-17956/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-samba-provision-1.0.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17956/">CVE-2018-17956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17956">CVE-2018-17956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921814" comment="yast2-samba-provision-1.0.5-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249857" version="1" class="patch">
	<metadata>
		<title>yast2-security-4.4.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-3700" ref_url="https://www.suse.com/security/cve/CVE-2019-3700/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-security-4.4.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3700/">CVE-2019-3700 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3700">CVE-2019-3700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921815" comment="yast2-security-4.4.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249858" version="1" class="patch">
	<metadata>
		<title>libykcs11-2-2.2.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14779" ref_url="https://www.suse.com/security/cve/CVE-2018-14779/" source="CVE"/>
		<reference ref_id="CVE-2018-14780" ref_url="https://www.suse.com/security/cve/CVE-2018-14780/" source="CVE"/>
		<description>
These are all security issues fixed in the libykcs11-2-2.2.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14779/">CVE-2018-14779 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14779">CVE-2018-14779 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14780/">CVE-2018-14780 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14780">CVE-2018-14780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921816" comment="libykcs11-2-2.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921817" comment="libykcs11-devel-2.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921818" comment="libykpiv-devel-2.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921819" comment="libykpiv2-2.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921820" comment="yubico-piv-tool-2.2.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249859" version="1" class="patch">
	<metadata>
		<title>yubikey-manager-4.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15631" ref_url="https://www.suse.com/security/cve/CVE-2017-15631/" source="CVE"/>
		<description>
These are all security issues fixed in the yubikey-manager-4.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15631/">CVE-2017-15631 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15631">CVE-2017-15631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921821" comment="yubikey-manager-4.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249860" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-4.0.32-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803/" source="CVE"/>
		<reference ref_id="CVE-2021-27927" ref_url="https://www.suse.com/security/cve/CVE-2021-27927/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-4.0.32-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15803">CVE-2020-15803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27927/">CVE-2021-27927 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27927">CVE-2021-27927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921822" comment="zabbix-agent-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921823" comment="zabbix-java-gateway-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921824" comment="zabbix-phpfrontend-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921825" comment="zabbix-proxy-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921826" comment="zabbix-proxy-mysql-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921827" comment="zabbix-proxy-postgresql-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921828" comment="zabbix-proxy-sqlite-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921829" comment="zabbix-server-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921830" comment="zabbix-server-mysql-4.0.32-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921831" comment="zabbix-server-postgresql-4.0.32-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249861" version="1" class="patch">
	<metadata>
		<title>libzmq5-32bit-4.3.4-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<reference ref_id="CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq5-32bit-4.3.4-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15166">CVE-2020-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921832" comment="libzmq5-4.3.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921833" comment="libzmq5-32bit-4.3.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921834" comment="zeromq-devel-4.3.4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921835" comment="zeromq-tools-4.3.4-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249862" version="1" class="patch">
	<metadata>
		<title>zim-0.73.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10870" ref_url="https://www.suse.com/security/cve/CVE-2020-10870/" source="CVE"/>
		<description>
These are all security issues fixed in the zim-0.73.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10870/">CVE-2020-10870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10870">CVE-2020-10870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921836" comment="zim-0.73.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921837" comment="zim-lang-0.73.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249863" version="1" class="patch">
	<metadata>
		<title>znc-1.8.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14055" ref_url="https://www.suse.com/security/cve/CVE-2018-14055/" source="CVE"/>
		<reference ref_id="CVE-2018-14056" ref_url="https://www.suse.com/security/cve/CVE-2018-14056/" source="CVE"/>
		<reference ref_id="CVE-2019-12816" ref_url="https://www.suse.com/security/cve/CVE-2019-12816/" source="CVE"/>
		<reference ref_id="CVE-2019-9917" ref_url="https://www.suse.com/security/cve/CVE-2019-9917/" source="CVE"/>
		<reference ref_id="CVE-2020-1377" ref_url="https://www.suse.com/security/cve/CVE-2020-1377/" source="CVE"/>
		<description>
These are all security issues fixed in the znc-1.8.2-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14055/">CVE-2018-14055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14055">CVE-2018-14055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14056/">CVE-2018-14056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14056">CVE-2018-14056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12816/">CVE-2019-12816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12816">CVE-2019-12816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9917/">CVE-2019-9917 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9917">CVE-2019-9917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1377/">CVE-2020-1377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1377">CVE-2020-1377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921838" comment="znc-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921839" comment="znc-devel-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921840" comment="znc-lang-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921841" comment="znc-perl-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921842" comment="znc-python3-1.8.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921843" comment="znc-tcl-1.8.2-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249864" version="1" class="patch">
	<metadata>
		<title>zsh-5.8-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
These are all security issues fixed in the zsh-5.8-7.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921844" comment="zsh-5.8-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921845" comment="zsh-htmldoc-5.8-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249865" version="1" class="patch">
	<metadata>
		<title>libzstd-devel-1.5.0-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd-devel-1.5.0-1.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11922">CVE-2019-11922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921846" comment="libzstd-devel-1.5.0-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921847" comment="libzstd-devel-32bit-1.5.0-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921848" comment="libzstd-devel-static-1.5.0-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921849" comment="libzstd1-1.5.0-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921850" comment="libzstd1-32bit-1.5.0-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921851" comment="zstd-1.5.0-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249866" version="1" class="patch">
	<metadata>
		<title>zypper-1.14.49-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.14.49-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921852" comment="zypper-1.14.49-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921853" comment="zypper-aptitude-1.14.49-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921854" comment="zypper-log-1.14.49-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921855" comment="zypper-needs-restarting-1.14.49-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249867" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.72-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<reference ref_id="CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<reference ref_id="CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381/" source="CVE"/>
		<reference ref_id="CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484/" source="CVE"/>
		<reference ref_id="CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540/" source="CVE"/>
		<reference ref_id="CVE-2018-6542" ref_url="https://www.suse.com/security/cve/CVE-2018-6542/" source="CVE"/>
		<reference ref_id="CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725/" source="CVE"/>
		<reference ref_id="CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.72-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5974">CVE-2017-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5975">CVE-2017-5975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5976">CVE-2017-5976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5978">CVE-2017-5978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5979">CVE-2017-5979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5981">CVE-2017-5981 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16548">CVE-2018-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6381">CVE-2018-6381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6484">CVE-2018-6484 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6540">CVE-2018-6540 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6542/">CVE-2018-6542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6542">CVE-2018-6542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7725">CVE-2018-7725 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7726">CVE-2018-7726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921856" comment="libzzip-0-13-0.13.72-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921857" comment="libzzip-0-13-32bit-0.13.72-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921858" comment="zziplib-devel-0.13.72-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921859" comment="zziplib-devel-32bit-0.13.72-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249868" version="1" class="patch">
	<metadata>
		<title>gdm-41.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="CVE-2020-27837" ref_url="https://www.suse.com/security/cve/CVE-2020-27837/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-41.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27837/">CVE-2020-27837 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27837">CVE-2020-27837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921860" comment="gdm-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921861" comment="gdm-branding-upstream-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921862" comment="gdm-devel-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921863" comment="gdm-lang-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921864" comment="gdm-systemd-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921865" comment="gdmflexiserver-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921866" comment="libgdm1-41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921867" comment="typelib-1_0-Gdm-1_0-41.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249869" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-22037" ref_url="https://www.suse.com/security/cve/CVE-2020-22037/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22037/">CVE-2020-22037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22037">CVE-2020-22037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921868" comment="ffmpeg-4-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921869" comment="ffmpeg-4-libavcodec-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921870" comment="ffmpeg-4-libavdevice-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921871" comment="ffmpeg-4-libavfilter-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921872" comment="ffmpeg-4-libavformat-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921873" comment="ffmpeg-4-libavresample-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921874" comment="ffmpeg-4-libavutil-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921875" comment="ffmpeg-4-libpostproc-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921876" comment="ffmpeg-4-libswresample-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921877" comment="ffmpeg-4-libswscale-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921878" comment="ffmpeg-4-private-devel-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921879" comment="libavcodec58_134-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921880" comment="libavcodec58_134-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921881" comment="libavdevice58_13-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921882" comment="libavdevice58_13-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921883" comment="libavfilter7_110-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921884" comment="libavfilter7_110-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921885" comment="libavformat58_76-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921886" comment="libavformat58_76-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921887" comment="libavresample4_0-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921888" comment="libavresample4_0-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921889" comment="libavutil56_70-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921890" comment="libavutil56_70-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921891" comment="libpostproc55_9-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921892" comment="libpostproc55_9-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921893" comment="libswresample3_9-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921894" comment="libswresample3_9-32bit-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921895" comment="libswscale5_9-4.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921896" comment="libswscale5_9-32bit-4.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249870" version="1" class="patch">
	<metadata>
		<title>krb5-1.19.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.19.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921897" comment="krb5-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921898" comment="krb5-32bit-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921899" comment="krb5-client-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921900" comment="krb5-devel-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921901" comment="krb5-devel-32bit-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921902" comment="krb5-plugin-kdb-ldap-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921903" comment="krb5-plugin-preauth-otp-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921904" comment="krb5-plugin-preauth-pkinit-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921905" comment="krb5-plugin-preauth-spake-1.19.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921906" comment="krb5-server-1.19.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249871" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-13.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-13.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30625">CVE-2021-30625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30626">CVE-2021-30626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30627">CVE-2021-30627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30628">CVE-2021-30628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30630">CVE-2021-30630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30631">CVE-2021-30631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30632">CVE-2021-30632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30633">CVE-2021-30633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921907" comment="nodejs-electron-13.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249872" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921908" comment="python-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921909" comment="python-32bit-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921910" comment="python-curses-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921911" comment="python-demo-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921912" comment="python-gdbm-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921913" comment="python-idle-2.7.18-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921914" comment="python-tk-2.7.18-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249873" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.27.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-24119" ref_url="https://www.suse.com/security/cve/CVE-2021-24119/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.27.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-24119/">CVE-2021-24119 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24119">CVE-2021-24119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921915" comment="libmbedcrypto7-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921916" comment="libmbedcrypto7-32bit-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921917" comment="libmbedtls13-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921918" comment="libmbedtls13-32bit-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921919" comment="libmbedx509-1-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921920" comment="libmbedx509-1-32bit-2.27.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921921" comment="mbedtls-devel-2.27.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249874" version="1" class="patch">
	<metadata>
		<title>velero-1.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921922" comment="velero-1.7.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249875" version="1" class="patch">
	<metadata>
		<title>velero-plugin-for-aws-1.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-plugin-for-aws-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921923" comment="velero-plugin-for-aws-1.3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249876" version="1" class="patch">
	<metadata>
		<title>chromedriver-94.0.4606.71-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37956" ref_url="https://www.suse.com/security/cve/CVE-2021-37956/" source="CVE"/>
		<reference ref_id="CVE-2021-37957" ref_url="https://www.suse.com/security/cve/CVE-2021-37957/" source="CVE"/>
		<reference ref_id="CVE-2021-37958" ref_url="https://www.suse.com/security/cve/CVE-2021-37958/" source="CVE"/>
		<reference ref_id="CVE-2021-37959" ref_url="https://www.suse.com/security/cve/CVE-2021-37959/" source="CVE"/>
		<reference ref_id="CVE-2021-37960" ref_url="https://www.suse.com/security/cve/CVE-2021-37960/" source="CVE"/>
		<reference ref_id="CVE-2021-37961" ref_url="https://www.suse.com/security/cve/CVE-2021-37961/" source="CVE"/>
		<reference ref_id="CVE-2021-37962" ref_url="https://www.suse.com/security/cve/CVE-2021-37962/" source="CVE"/>
		<reference ref_id="CVE-2021-37963" ref_url="https://www.suse.com/security/cve/CVE-2021-37963/" source="CVE"/>
		<reference ref_id="CVE-2021-37964" ref_url="https://www.suse.com/security/cve/CVE-2021-37964/" source="CVE"/>
		<reference ref_id="CVE-2021-37965" ref_url="https://www.suse.com/security/cve/CVE-2021-37965/" source="CVE"/>
		<reference ref_id="CVE-2021-37966" ref_url="https://www.suse.com/security/cve/CVE-2021-37966/" source="CVE"/>
		<reference ref_id="CVE-2021-37967" ref_url="https://www.suse.com/security/cve/CVE-2021-37967/" source="CVE"/>
		<reference ref_id="CVE-2021-37968" ref_url="https://www.suse.com/security/cve/CVE-2021-37968/" source="CVE"/>
		<reference ref_id="CVE-2021-37969" ref_url="https://www.suse.com/security/cve/CVE-2021-37969/" source="CVE"/>
		<reference ref_id="CVE-2021-37970" ref_url="https://www.suse.com/security/cve/CVE-2021-37970/" source="CVE"/>
		<reference ref_id="CVE-2021-37971" ref_url="https://www.suse.com/security/cve/CVE-2021-37971/" source="CVE"/>
		<reference ref_id="CVE-2021-37972" ref_url="https://www.suse.com/security/cve/CVE-2021-37972/" source="CVE"/>
		<reference ref_id="CVE-2021-37973" ref_url="https://www.suse.com/security/cve/CVE-2021-37973/" source="CVE"/>
		<reference ref_id="CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-94.0.4606.71-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37956/">CVE-2021-37956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37956">CVE-2021-37956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37957/">CVE-2021-37957 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37957">CVE-2021-37957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37958/">CVE-2021-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37958">CVE-2021-37958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37959/">CVE-2021-37959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37959">CVE-2021-37959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37960/">CVE-2021-37960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-37960">CVE-2021-37960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37961/">CVE-2021-37961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37961">CVE-2021-37961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37962/">CVE-2021-37962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37962">CVE-2021-37962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37963/">CVE-2021-37963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37963">CVE-2021-37963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37964/">CVE-2021-37964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37964">CVE-2021-37964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37965/">CVE-2021-37965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37965">CVE-2021-37965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37966/">CVE-2021-37966 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37966">CVE-2021-37966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37967/">CVE-2021-37967 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37967">CVE-2021-37967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37968/">CVE-2021-37968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37968">CVE-2021-37968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37969/">CVE-2021-37969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37969">CVE-2021-37969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37970/">CVE-2021-37970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37970">CVE-2021-37970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37971/">CVE-2021-37971 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37971">CVE-2021-37971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37972/">CVE-2021-37972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37972">CVE-2021-37972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37973/">CVE-2021-37973 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37973">CVE-2021-37973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37974">CVE-2021-37974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37975">CVE-2021-37975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37976">CVE-2021-37976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921924" comment="chromedriver-94.0.4606.71-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921925" comment="chromium-94.0.4606.71-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249877" version="1" class="patch">
	<metadata>
		<title>ibm-data-db2-6.12.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-24112" ref_url="https://www.suse.com/security/cve/CVE-2021-24112/" source="CVE"/>
		<description>
These are all security issues fixed in the ibm-data-db2-6.12.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-24112/">CVE-2021-24112 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24112">CVE-2021-24112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921926" comment="ibm-data-db2-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921927" comment="libmono-2_0-1-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921928" comment="libmono-2_0-devel-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921929" comment="libmonoboehm-2_0-1-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921930" comment="libmonoboehm-2_0-devel-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921931" comment="libmonosgen-2_0-1-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921932" comment="libmonosgen-2_0-devel-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921933" comment="mono-complete-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921934" comment="mono-core-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921935" comment="mono-data-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921936" comment="mono-data-oracle-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921937" comment="mono-data-sqlite-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921938" comment="mono-devel-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921939" comment="mono-extras-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921940" comment="mono-locale-extras-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921941" comment="mono-mvc-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921942" comment="mono-reactive-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921943" comment="mono-wcf-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921944" comment="mono-web-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921945" comment="mono-winforms-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921946" comment="mono-winfxcore-6.12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921947" comment="monodoc-core-6.12.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249878" version="1" class="patch">
	<metadata>
		<title>python-onionshare-2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41867" ref_url="https://www.suse.com/security/cve/CVE-2021-41867/" source="CVE"/>
		<reference ref_id="CVE-2021-41868" ref_url="https://www.suse.com/security/cve/CVE-2021-41868/" source="CVE"/>
		<description>
These are all security issues fixed in the python-onionshare-2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41867/">CVE-2021-41867 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41867">CVE-2021-41867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41868/">CVE-2021-41868 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41868">CVE-2021-41868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921948" comment="python-onionshare-2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249879" version="1" class="patch">
	<metadata>
		<title>python-Scrapy-doc-2.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41125" ref_url="https://www.suse.com/security/cve/CVE-2021-41125/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Scrapy-doc-2.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41125/">CVE-2021-41125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41125">CVE-2021-41125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921949" comment="python-Scrapy-doc-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921950" comment="python38-Scrapy-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921951" comment="python39-Scrapy-2.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249880" version="1" class="patch">
	<metadata>
		<title>squid-5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28116">CVE-2021-28116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921952" comment="squid-5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249881" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.51-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41773" ref_url="https://www.suse.com/security/cve/CVE-2021-41773/" source="CVE"/>
		<reference ref_id="CVE-2021-42013" ref_url="https://www.suse.com/security/cve/CVE-2021-42013/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.51-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41773/">CVE-2021-41773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41773">CVE-2021-41773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42013/">CVE-2021-42013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42013">CVE-2021-42013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921953" comment="apache2-2.4.51-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249882" version="1" class="patch">
	<metadata>
		<title>hiredis-1.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32765" ref_url="https://www.suse.com/security/cve/CVE-2021-32765/" source="CVE"/>
		<description>
These are all security issues fixed in the hiredis-1.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32765/">CVE-2021-32765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32765">CVE-2021-32765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921954" comment="hiredis-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921955" comment="hiredis-devel-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921956" comment="libhiredis1_0_0-1.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249883" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.9.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.9.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921957" comment="liblz4-1-1.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921958" comment="liblz4-1-32bit-1.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921959" comment="liblz4-devel-1.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921960" comment="lz4-1.9.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249884" version="1" class="patch">
	<metadata>
		<title>redis-6.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32626" ref_url="https://www.suse.com/security/cve/CVE-2021-32626/" source="CVE"/>
		<reference ref_id="CVE-2021-32627" ref_url="https://www.suse.com/security/cve/CVE-2021-32627/" source="CVE"/>
		<reference ref_id="CVE-2021-32628" ref_url="https://www.suse.com/security/cve/CVE-2021-32628/" source="CVE"/>
		<reference ref_id="CVE-2021-32672" ref_url="https://www.suse.com/security/cve/CVE-2021-32672/" source="CVE"/>
		<reference ref_id="CVE-2021-32675" ref_url="https://www.suse.com/security/cve/CVE-2021-32675/" source="CVE"/>
		<reference ref_id="CVE-2021-32687" ref_url="https://www.suse.com/security/cve/CVE-2021-32687/" source="CVE"/>
		<reference ref_id="CVE-2021-32762" ref_url="https://www.suse.com/security/cve/CVE-2021-32762/" source="CVE"/>
		<reference ref_id="CVE-2021-41099" ref_url="https://www.suse.com/security/cve/CVE-2021-41099/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-6.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32626/">CVE-2021-32626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">CVE-2021-32626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32627/">CVE-2021-32627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">CVE-2021-32627 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32628/">CVE-2021-32628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">CVE-2021-32628 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32672/">CVE-2021-32672 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">CVE-2021-32672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32675/">CVE-2021-32675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">CVE-2021-32675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32687/">CVE-2021-32687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">CVE-2021-32687 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32762/">CVE-2021-32762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32762">CVE-2021-32762 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41099/">CVE-2021-41099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">CVE-2021-41099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921961" comment="redis-6.2.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249885" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16328">CVE-2018-16328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16641">CVE-2018-16641 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13296">CVE-2019-13296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13306">CVE-2019-13306 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20246">CVE-2021-20246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20312">CVE-2021-20312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921962" comment="ImageMagick-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921963" comment="ImageMagick-config-7-SUSE-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921964" comment="ImageMagick-config-7-upstream-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921965" comment="ImageMagick-devel-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921966" comment="ImageMagick-devel-32bit-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921967" comment="ImageMagick-doc-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921968" comment="ImageMagick-extra-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921969" comment="libMagick++-7_Q16HDRI5-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921970" comment="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921971" comment="libMagick++-devel-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921972" comment="libMagick++-devel-32bit-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921973" comment="libMagickCore-7_Q16HDRI10-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921974" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921975" comment="libMagickWand-7_Q16HDRI10-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921976" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921977" comment="perl-PerlMagick-7.1.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249886" version="1" class="patch">
	<metadata>
		<title>containerd-1.4.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.4.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921978" comment="containerd-1.4.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921979" comment="containerd-ctr-1.4.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249887" version="1" class="patch">
	<metadata>
		<title>docker-20.10.9_ce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.9_ce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921980" comment="docker-20.10.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921981" comment="docker-bash-completion-20.10.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921982" comment="docker-fish-completion-20.10.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921983" comment="docker-zsh-completion-20.10.9_ce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249888" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921984" comment="go1.16-1.16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921985" comment="go1.16-doc-1.16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921986" comment="go1.16-race-1.16.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249889" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921987" comment="go1.17-1.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921988" comment="go1.17-doc-1.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921989" comment="go1.17-race-1.17.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249890" version="1" class="patch">
	<metadata>
		<title>php7-7.4.24-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.24-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7068">CVE-2020-7068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21702">CVE-2021-21702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009921990" comment="php7-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921991" comment="php7-bcmath-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921992" comment="php7-bz2-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921993" comment="php7-calendar-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921994" comment="php7-cli-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921995" comment="php7-ctype-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921996" comment="php7-curl-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921997" comment="php7-dba-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921998" comment="php7-devel-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009921999" comment="php7-dom-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922000" comment="php7-enchant-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922001" comment="php7-exif-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922002" comment="php7-fileinfo-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922003" comment="php7-ftp-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922004" comment="php7-gd-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922005" comment="php7-gettext-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922006" comment="php7-gmp-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922007" comment="php7-iconv-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922008" comment="php7-intl-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922009" comment="php7-json-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922010" comment="php7-ldap-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922011" comment="php7-mbstring-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922012" comment="php7-mysql-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922013" comment="php7-odbc-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922014" comment="php7-opcache-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922015" comment="php7-openssl-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922016" comment="php7-pcntl-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922017" comment="php7-pdo-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922018" comment="php7-pgsql-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922019" comment="php7-phar-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922020" comment="php7-posix-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922021" comment="php7-readline-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922022" comment="php7-shmop-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922023" comment="php7-snmp-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922024" comment="php7-soap-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922025" comment="php7-sockets-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922026" comment="php7-sodium-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922027" comment="php7-sqlite-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922028" comment="php7-sysvmsg-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922029" comment="php7-sysvsem-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922030" comment="php7-sysvshm-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922031" comment="php7-tidy-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922032" comment="php7-tokenizer-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922033" comment="php7-xmlreader-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922034" comment="php7-xmlrpc-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922035" comment="php7-xmlwriter-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922036" comment="php7-xsl-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922037" comment="php7-zip-7.4.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922038" comment="php7-zlib-7.4.24-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249891" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-93.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38499" ref_url="https://www.suse.com/security/cve/CVE-2021-38499/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-93.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38499/">CVE-2021-38499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38499">CVE-2021-38499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922039" comment="MozillaFirefox-93.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922040" comment="MozillaFirefox-branding-upstream-93.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922041" comment="MozillaFirefox-devel-93.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922042" comment="MozillaFirefox-translations-common-93.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922043" comment="MozillaFirefox-translations-other-93.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249892" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922044" comment="MozillaThunderbird-91.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922045" comment="MozillaThunderbird-translations-common-91.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922046" comment="MozillaThunderbird-translations-other-91.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249893" version="1" class="patch">
	<metadata>
		<title>chromedriver-94.0.4606.81-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37977" ref_url="https://www.suse.com/security/cve/CVE-2021-37977/" source="CVE"/>
		<reference ref_id="CVE-2021-37978" ref_url="https://www.suse.com/security/cve/CVE-2021-37978/" source="CVE"/>
		<reference ref_id="CVE-2021-37979" ref_url="https://www.suse.com/security/cve/CVE-2021-37979/" source="CVE"/>
		<reference ref_id="CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-94.0.4606.81-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37977/">CVE-2021-37977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37977">CVE-2021-37977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37978/">CVE-2021-37978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37978">CVE-2021-37978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37979/">CVE-2021-37979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37979">CVE-2021-37979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37980">CVE-2021-37980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922047" comment="chromedriver-94.0.4606.81-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922048" comment="chromium-94.0.4606.81-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249894" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.4.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.4.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39272">CVE-2021-39272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922049" comment="fetchmail-6.4.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922050" comment="fetchmailconf-6.4.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249895" version="1" class="patch">
	<metadata>
		<title>flatpak-1.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41133">CVE-2021-41133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922051" comment="flatpak-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922052" comment="flatpak-devel-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922053" comment="flatpak-zsh-completion-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922054" comment="libflatpak0-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922055" comment="system-user-flatpak-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922056" comment="typelib-1_0-Flatpak-1_0-1.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249896" version="1" class="patch">
	<metadata>
		<title>libmosquitto1-2.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13849" ref_url="https://www.suse.com/security/cve/CVE-2020-13849/" source="CVE"/>
		<reference ref_id="CVE-2021-34434" ref_url="https://www.suse.com/security/cve/CVE-2021-34434/" source="CVE"/>
		<description>
These are all security issues fixed in the libmosquitto1-2.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13849/">CVE-2020-13849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13849">CVE-2020-13849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34434/">CVE-2021-34434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34434">CVE-2021-34434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922057" comment="libmosquitto1-2.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922058" comment="libmosquittopp1-2.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922059" comment="mosquitto-2.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922060" comment="mosquitto-clients-2.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922061" comment="mosquitto-devel-2.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249897" version="1" class="patch">
	<metadata>
		<title>autobuild-2.11.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12272" ref_url="https://www.suse.com/security/cve/CVE-2020-12272/" source="CVE"/>
		<description>
These are all security issues fixed in the autobuild-2.11.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12272/">CVE-2020-12272 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12272">CVE-2020-12272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922062" comment="autobuild-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922063" comment="libopendkim11-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922064" comment="librbl1-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922065" comment="librepute1-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922066" comment="libut1-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922067" comment="libvbr2-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922068" comment="miltertest-1.6.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922069" comment="opendkim-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922070" comment="opendkim-devel-2.11.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249898" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-nokogiri-1.12.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-nokogiri-1.12.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922071" comment="ruby2.7-rubygem-nokogiri-1.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922072" comment="ruby3.0-rubygem-nokogiri-1.12.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249899" version="1" class="patch">
	<metadata>
		<title>python36-suds-community-0.8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-suds-community-0.8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922073" comment="python36-suds-community-0.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922074" comment="python38-suds-community-0.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922075" comment="python39-suds-community-0.8.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249900" version="1" class="patch">
	<metadata>
		<title>docker-20.10.9_ce-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.9_ce-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922076" comment="docker-20.10.9_ce-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922077" comment="docker-bash-completion-20.10.9_ce-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922078" comment="docker-fish-completion-20.10.9_ce-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922079" comment="docker-zsh-completion-20.10.9_ce-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249901" version="1" class="patch">
	<metadata>
		<title>mc-4.8.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36370" ref_url="https://www.suse.com/security/cve/CVE-2021-36370/" source="CVE"/>
		<description>
These are all security issues fixed in the mc-4.8.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-36370/">CVE-2021-36370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36370">CVE-2021-36370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922080" comment="mc-4.8.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922081" comment="mc-lang-4.8.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249902" version="1" class="patch">
	<metadata>
		<title>python36-sqlparse-0.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32839" ref_url="https://www.suse.com/security/cve/CVE-2021-32839/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-sqlparse-0.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32839/">CVE-2021-32839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32839">CVE-2021-32839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922082" comment="python36-sqlparse-0.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922083" comment="python38-sqlparse-0.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922084" comment="python39-sqlparse-0.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249903" version="1" class="patch">
	<metadata>
		<title>jackson-dataformat-cbor-2.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-dataformat-cbor-2.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28491">CVE-2020-28491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922085" comment="jackson-dataformat-cbor-2.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922086" comment="jackson-dataformat-smile-2.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922087" comment="jackson-dataformats-binary-2.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922088" comment="jackson-dataformats-binary-javadoc-2.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249904" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922089" comment="java-13-openjdk-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922090" comment="java-13-openjdk-accessibility-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922091" comment="java-13-openjdk-demo-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922092" comment="java-13-openjdk-devel-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922093" comment="java-13-openjdk-headless-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922094" comment="java-13-openjdk-javadoc-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922095" comment="java-13-openjdk-jmods-13.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922096" comment="java-13-openjdk-src-13.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249905" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922097" comment="java-15-openjdk-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922098" comment="java-15-openjdk-accessibility-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922099" comment="java-15-openjdk-demo-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922100" comment="java-15-openjdk-devel-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922101" comment="java-15-openjdk-headless-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922102" comment="java-15-openjdk-javadoc-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922103" comment="java-15-openjdk-jmods-15.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922104" comment="java-15-openjdk-src-15.0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249906" version="1" class="patch">
	<metadata>
		<title>php8-8.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">CVE-2021-21703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922105" comment="php8-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922106" comment="php8-bcmath-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922107" comment="php8-bz2-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922108" comment="php8-calendar-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922109" comment="php8-cli-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922110" comment="php8-ctype-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922111" comment="php8-curl-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922112" comment="php8-dba-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922113" comment="php8-devel-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922114" comment="php8-dom-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922115" comment="php8-enchant-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922116" comment="php8-exif-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922117" comment="php8-fileinfo-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922118" comment="php8-ftp-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922119" comment="php8-gd-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922120" comment="php8-gettext-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922121" comment="php8-gmp-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922122" comment="php8-iconv-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922123" comment="php8-intl-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922124" comment="php8-ldap-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922125" comment="php8-mbstring-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922126" comment="php8-mysql-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922127" comment="php8-odbc-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922128" comment="php8-opcache-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922129" comment="php8-openssl-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922130" comment="php8-pcntl-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922131" comment="php8-pdo-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922132" comment="php8-pgsql-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922133" comment="php8-phar-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922134" comment="php8-posix-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922135" comment="php8-readline-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922136" comment="php8-shmop-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922137" comment="php8-snmp-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922138" comment="php8-soap-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922139" comment="php8-sockets-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922140" comment="php8-sodium-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922141" comment="php8-sqlite-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922142" comment="php8-sysvmsg-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922143" comment="php8-sysvsem-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922144" comment="php8-sysvshm-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922145" comment="php8-tidy-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922146" comment="php8-tokenizer-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922147" comment="php8-xmlreader-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922148" comment="php8-xmlwriter-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922149" comment="php8-xsl-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922150" comment="php8-zip-8.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922151" comment="php8-zlib-8.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249907" version="1" class="patch">
	<metadata>
		<title>apr-util-devel-1.6.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-util-devel-1.6.1-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922152" comment="apr-util-devel-1.6.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922153" comment="libapr-util1-0-1.6.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922154" comment="libapr-util1-0-dbd-mysql-1.6.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922155" comment="libapr-util1-0-dbd-pgsql-1.6.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922156" comment="libapr-util1-0-dbd-sqlite3-1.6.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249908" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922157" comment="java-17-openjdk-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922158" comment="java-17-openjdk-accessibility-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922159" comment="java-17-openjdk-demo-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922160" comment="java-17-openjdk-devel-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922161" comment="java-17-openjdk-headless-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922162" comment="java-17-openjdk-javadoc-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922163" comment="java-17-openjdk-jmods-17.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922164" comment="java-17-openjdk-src-17.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249909" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922165" comment="java-11-openjdk-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922166" comment="java-11-openjdk-accessibility-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922167" comment="java-11-openjdk-demo-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922168" comment="java-11-openjdk-devel-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922169" comment="java-11-openjdk-headless-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922170" comment="java-11-openjdk-javadoc-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922171" comment="java-11-openjdk-jmods-11.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922172" comment="java-11-openjdk-src-11.0.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249910" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-6.1.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35538" ref_url="https://www.suse.com/security/cve/CVE-2021-35538/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-6.1.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35538/">CVE-2021-35538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35538">CVE-2021-35538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922173" comment="python3-virtualbox-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922174" comment="virtualbox-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922175" comment="virtualbox-devel-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922176" comment="virtualbox-guest-desktop-icons-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922177" comment="virtualbox-guest-source-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922178" comment="virtualbox-guest-tools-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922179" comment="virtualbox-guest-x11-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922180" comment="virtualbox-host-source-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922181" comment="virtualbox-qt-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922182" comment="virtualbox-vnc-6.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922183" comment="virtualbox-websrv-6.1.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249911" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.14.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.14.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922185" comment="kernel-macros-5.14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922186" comment="kernel-source-5.14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922187" comment="kernel-source-vanilla-5.14.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249912" version="1" class="patch">
	<metadata>
		<title>freerdp-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159/" source="CVE"/>
		<reference ref_id="CVE-2021-41160" ref_url="https://www.suse.com/security/cve/CVE-2021-41160/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41159">CVE-2021-41159 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41160/">CVE-2021-41160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41160">CVE-2021-41160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922188" comment="freerdp-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922189" comment="freerdp-devel-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922190" comment="freerdp-proxy-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922191" comment="freerdp-server-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922192" comment="freerdp-wayland-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922193" comment="libfreerdp2-2-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922194" comment="libuwac0-0-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922195" comment="libwinpr2-2-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922196" comment="uwac0-0-devel-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922197" comment="winpr-devel-2.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249913" version="1" class="patch">
	<metadata>
		<title>ruby2.7-rubygem-http-5.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32740" ref_url="https://www.suse.com/security/cve/CVE-2021-32740/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.7-rubygem-http-5.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32740/">CVE-2021-32740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922198" comment="ruby2.7-rubygem-http-5.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922199" comment="ruby3.0-rubygem-http-5.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249914" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.52.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.52.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25900">CVE-2021-25900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922200" comment="gdk-pixbuf-loader-rsvg-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922201" comment="gdk-pixbuf-loader-rsvg-32bit-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922202" comment="librsvg-2-2-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922203" comment="librsvg-2-2-32bit-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922204" comment="librsvg-devel-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922205" comment="rsvg-convert-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922206" comment="rsvg-thumbnailer-2.52.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922207" comment="typelib-1_0-Rsvg-2_0-2.52.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249915" version="1" class="patch">
	<metadata>
		<title>php7-7.4.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">CVE-2021-21703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922208" comment="php7-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922209" comment="php7-bcmath-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922210" comment="php7-bz2-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922211" comment="php7-calendar-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922212" comment="php7-cli-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922213" comment="php7-ctype-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922214" comment="php7-curl-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922215" comment="php7-dba-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922216" comment="php7-devel-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922217" comment="php7-dom-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922218" comment="php7-enchant-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922219" comment="php7-exif-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922220" comment="php7-fileinfo-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922221" comment="php7-ftp-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922222" comment="php7-gd-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922223" comment="php7-gettext-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922224" comment="php7-gmp-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922225" comment="php7-iconv-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922226" comment="php7-intl-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922227" comment="php7-json-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922228" comment="php7-ldap-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922229" comment="php7-mbstring-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922230" comment="php7-mysql-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922231" comment="php7-odbc-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922232" comment="php7-opcache-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922233" comment="php7-openssl-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922234" comment="php7-pcntl-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922235" comment="php7-pdo-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922236" comment="php7-pgsql-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922237" comment="php7-phar-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922238" comment="php7-posix-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922239" comment="php7-readline-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922240" comment="php7-shmop-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922241" comment="php7-snmp-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922242" comment="php7-soap-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922243" comment="php7-sockets-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922244" comment="php7-sodium-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922245" comment="php7-sqlite-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922246" comment="php7-sysvmsg-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922247" comment="php7-sysvsem-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922248" comment="php7-sysvshm-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922249" comment="php7-tidy-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922250" comment="php7-tokenizer-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922251" comment="php7-xmlreader-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922252" comment="php7-xmlrpc-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922253" comment="php7-xmlwriter-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922254" comment="php7-xsl-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922255" comment="php7-zip-7.4.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922256" comment="php7-zlib-7.4.25-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249916" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.8b-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.8b-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922257" comment="transfig-3.2.8b-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249917" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922258" comment="apr-devel-1.7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922259" comment="libapr1-0-1.7.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249918" version="1" class="patch">
	<metadata>
		<title>qemu-6.1.0-34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.1.0-34.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922260" comment="qemu-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922261" comment="qemu-accel-qtest-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922262" comment="qemu-accel-tcg-x86-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922263" comment="qemu-arm-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922264" comment="qemu-audio-alsa-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922265" comment="qemu-audio-jack-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922266" comment="qemu-audio-pa-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922267" comment="qemu-audio-spice-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922268" comment="qemu-block-curl-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922269" comment="qemu-block-dmg-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922270" comment="qemu-block-gluster-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922271" comment="qemu-block-iscsi-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922272" comment="qemu-block-nfs-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922273" comment="qemu-block-rbd-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922274" comment="qemu-block-ssh-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922275" comment="qemu-chardev-baum-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922276" comment="qemu-chardev-spice-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922277" comment="qemu-extra-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922278" comment="qemu-guest-agent-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922279" comment="qemu-hw-display-qxl-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922280" comment="qemu-hw-display-virtio-gpu-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922281" comment="qemu-hw-display-virtio-gpu-pci-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922282" comment="qemu-hw-display-virtio-vga-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922283" comment="qemu-hw-s390x-virtio-gpu-ccw-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922284" comment="qemu-hw-usb-host-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922285" comment="qemu-hw-usb-redirect-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922286" comment="qemu-hw-usb-smartcard-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922287" comment="qemu-ipxe-1.0.0+-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922288" comment="qemu-ivshmem-tools-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922289" comment="qemu-ksm-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922290" comment="qemu-kvm-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922291" comment="qemu-lang-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922292" comment="qemu-microvm-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922293" comment="qemu-ppc-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922294" comment="qemu-s390x-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922295" comment="qemu-seabios-1.14.0_0_g155821a-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922296" comment="qemu-sgabios-8-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922297" comment="qemu-skiboot-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922298" comment="qemu-tools-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922299" comment="qemu-ui-curses-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922300" comment="qemu-ui-gtk-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922301" comment="qemu-ui-opengl-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922302" comment="qemu-ui-spice-app-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922303" comment="qemu-ui-spice-core-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922304" comment="qemu-vgabios-1.14.0_0_g155821a-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922305" comment="qemu-vhost-user-gpu-6.1.0-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922306" comment="qemu-x86-6.1.0-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249919" version="1" class="patch">
	<metadata>
		<title>chromedriver-95.0.4638.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37982" ref_url="https://www.suse.com/security/cve/CVE-2021-37982/" source="CVE"/>
		<reference ref_id="CVE-2021-37983" ref_url="https://www.suse.com/security/cve/CVE-2021-37983/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37985" ref_url="https://www.suse.com/security/cve/CVE-2021-37985/" source="CVE"/>
		<reference ref_id="CVE-2021-37986" ref_url="https://www.suse.com/security/cve/CVE-2021-37986/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37988" ref_url="https://www.suse.com/security/cve/CVE-2021-37988/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37990" ref_url="https://www.suse.com/security/cve/CVE-2021-37990/" source="CVE"/>
		<reference ref_id="CVE-2021-37991" ref_url="https://www.suse.com/security/cve/CVE-2021-37991/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993/" source="CVE"/>
		<reference ref_id="CVE-2021-37994" ref_url="https://www.suse.com/security/cve/CVE-2021-37994/" source="CVE"/>
		<reference ref_id="CVE-2021-37995" ref_url="https://www.suse.com/security/cve/CVE-2021-37995/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-95.0.4638.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37981">CVE-2021-37981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37982/">CVE-2021-37982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37982">CVE-2021-37982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37983/">CVE-2021-37983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37983">CVE-2021-37983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37984">CVE-2021-37984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37985/">CVE-2021-37985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37985">CVE-2021-37985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37986/">CVE-2021-37986 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37986">CVE-2021-37986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37987">CVE-2021-37987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37988/">CVE-2021-37988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37988">CVE-2021-37988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37989">CVE-2021-37989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37990/">CVE-2021-37990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37990">CVE-2021-37990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37991/">CVE-2021-37991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37991">CVE-2021-37991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37992">CVE-2021-37992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37993">CVE-2021-37993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37994/">CVE-2021-37994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37994">CVE-2021-37994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37995/">CVE-2021-37995 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37995">CVE-2021-37995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37996">CVE-2021-37996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922307" comment="chromedriver-95.0.4638.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922308" comment="chromium-95.0.4638.54-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249920" version="1" class="patch">
	<metadata>
		<title>librdkafka-devel-1.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<description>
These are all security issues fixed in the librdkafka-devel-1.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922309" comment="librdkafka-devel-1.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922310" comment="librdkafka1-1.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249921" version="1" class="patch">
	<metadata>
		<title>libplib0-1.8.5+svn.2173-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38714" ref_url="https://www.suse.com/security/cve/CVE-2021-38714/" source="CVE"/>
		<description>
These are all security issues fixed in the libplib0-1.8.5+svn.2173-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38714/">CVE-2021-38714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38714">CVE-2021-38714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922311" comment="libplib0-1.8.5+svn.2173-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922312" comment="plib-devel-1.8.5+svn.2173-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249922" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.312-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.312-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922313" comment="java-1_8_0-openj9-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922314" comment="java-1_8_0-openj9-accessibility-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922315" comment="java-1_8_0-openj9-demo-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922316" comment="java-1_8_0-openj9-devel-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922317" comment="java-1_8_0-openj9-headless-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922318" comment="java-1_8_0-openj9-javadoc-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922319" comment="java-1_8_0-openj9-src-1.8.0.312-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249923" version="1" class="patch">
	<metadata>
		<title>python36-Babel-2.9.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-Babel-2.9.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922320" comment="python36-Babel-2.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922321" comment="python38-Babel-2.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922322" comment="python39-Babel-2.9.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249924" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.9.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.9.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1730">CVE-2020-1730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922323" comment="libssh-config-0.9.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922324" comment="libssh-devel-0.9.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922325" comment="libssh4-0.9.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922326" comment="libssh4-32bit-0.9.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249925" version="1" class="patch">
	<metadata>
		<title>chromedriver-95.0.4638.69-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37997" ref_url="https://www.suse.com/security/cve/CVE-2021-37997/" source="CVE"/>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-37999" ref_url="https://www.suse.com/security/cve/CVE-2021-37999/" source="CVE"/>
		<reference ref_id="CVE-2021-38000" ref_url="https://www.suse.com/security/cve/CVE-2021-38000/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-95.0.4638.69-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37997/">CVE-2021-37997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37997">CVE-2021-37997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37998">CVE-2021-37998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37999/">CVE-2021-37999 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37999">CVE-2021-37999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38000/">CVE-2021-38000 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38000">CVE-2021-38000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38001">CVE-2021-38001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38002">CVE-2021-38002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38003">CVE-2021-38003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922327" comment="chromedriver-95.0.4638.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922328" comment="chromium-95.0.4638.69-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249926" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613/" source="CVE"/>
		<reference ref_id="CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616/" source="CVE"/>
		<reference ref_id="CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618/" source="CVE"/>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<reference ref_id="CVE-2021-37962" ref_url="https://www.suse.com/security/cve/CVE-2021-37962/" source="CVE"/>
		<reference ref_id="CVE-2021-37967" ref_url="https://www.suse.com/security/cve/CVE-2021-37967/" source="CVE"/>
		<reference ref_id="CVE-2021-37968" ref_url="https://www.suse.com/security/cve/CVE-2021-37968/" source="CVE"/>
		<reference ref_id="CVE-2021-37971" ref_url="https://www.suse.com/security/cve/CVE-2021-37971/" source="CVE"/>
		<reference ref_id="CVE-2021-37973" ref_url="https://www.suse.com/security/cve/CVE-2021-37973/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37978" ref_url="https://www.suse.com/security/cve/CVE-2021-37978/" source="CVE"/>
		<reference ref_id="CVE-2021-37979" ref_url="https://www.suse.com/security/cve/CVE-2021-37979/" source="CVE"/>
		<reference ref_id="CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30613">CVE-2021-30613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30616">CVE-2021-30616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30618">CVE-2021-30618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30625">CVE-2021-30625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30626">CVE-2021-30626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30627">CVE-2021-30627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30628">CVE-2021-30628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30629">CVE-2021-30629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30630">CVE-2021-30630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30633">CVE-2021-30633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37962/">CVE-2021-37962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37962">CVE-2021-37962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37967/">CVE-2021-37967 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37967">CVE-2021-37967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37968/">CVE-2021-37968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37968">CVE-2021-37968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37971/">CVE-2021-37971 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37971">CVE-2021-37971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37973/">CVE-2021-37973 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37973">CVE-2021-37973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37975">CVE-2021-37975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37978/">CVE-2021-37978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37978">CVE-2021-37978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37979/">CVE-2021-37979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37979">CVE-2021-37979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37980">CVE-2021-37980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922329" comment="libQt5Pdf5-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922330" comment="libQt5PdfWidgets5-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922331" comment="libqt5-qtpdf-devel-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922332" comment="libqt5-qtpdf-examples-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922333" comment="libqt5-qtpdf-imports-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922334" comment="libqt5-qtpdf-private-headers-devel-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922335" comment="libqt5-qtwebengine-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922336" comment="libqt5-qtwebengine-devel-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922337" comment="libqt5-qtwebengine-examples-5.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922338" comment="libqt5-qtwebengine-private-headers-devel-5.15.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249927" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-13.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-13.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37981">CVE-2021-37981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37984">CVE-2021-37984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37987">CVE-2021-37987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37989">CVE-2021-37989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37992">CVE-2021-37992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37996">CVE-2021-37996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922339" comment="nodejs-electron-13.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249928" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922340" comment="MozillaThunderbird-91.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922341" comment="MozillaThunderbird-translations-common-91.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922342" comment="MozillaThunderbird-translations-other-91.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249929" version="1" class="patch">
	<metadata>
		<title>gfbgraph-devel-0.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39358" ref_url="https://www.suse.com/security/cve/CVE-2021-39358/" source="CVE"/>
		<description>
These are all security issues fixed in the gfbgraph-devel-0.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39358/">CVE-2021-39358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39358">CVE-2021-39358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922343" comment="gfbgraph-devel-0.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922344" comment="gfbgraph-doc-0.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922345" comment="libgfbgraph-0_2-0-0.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922346" comment="typelib-1_0-GFBGraph-0_2-0.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249930" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922347" comment="go1.16-1.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922348" comment="go1.16-doc-1.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922349" comment="go1.16-race-1.16.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249931" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922350" comment="go1.17-1.17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922351" comment="go1.17-doc-1.17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922352" comment="go1.17-race-1.17.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249932" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40985" ref_url="https://www.suse.com/security/cve/CVE-2021-40985/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40985/">CVE-2021-40985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40985">CVE-2021-40985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922353" comment="htmldoc-1.9.12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249933" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.312-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.312-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922354" comment="java-1_8_0-openjdk-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922355" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922356" comment="java-1_8_0-openjdk-demo-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922357" comment="java-1_8_0-openjdk-devel-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922358" comment="java-1_8_0-openjdk-headless-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922359" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922360" comment="java-1_8_0-openjdk-src-1.8.0.312-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249934" version="1" class="patch">
	<metadata>
		<title>opensc-0.22.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.22.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922361" comment="opensc-0.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922362" comment="opensc-32bit-0.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249935" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-94.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-94.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922363" comment="MozillaFirefox-94.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922364" comment="MozillaFirefox-branding-upstream-94.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922365" comment="MozillaFirefox-devel-94.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922366" comment="MozillaFirefox-translations-common-94.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922367" comment="MozillaFirefox-translations-other-94.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249936" version="1" class="patch">
	<metadata>
		<title>mpop-1.4.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mpop-1.4.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922368" comment="mpop-1.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922369" comment="mpop-doc-1.4.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249937" version="1" class="patch">
	<metadata>
		<title>nodejs14-14.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713/" source="CVE"/>
		<reference ref_id="CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs14-14.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">CVE-2021-37701 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37713">CVE-2021-37713 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39135">CVE-2021-39135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922370" comment="nodejs14-14.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922371" comment="nodejs14-devel-14.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922372" comment="nodejs14-docs-14.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922373" comment="npm14-14.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249938" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41116" ref_url="https://www.suse.com/security/cve/CVE-2021-41116/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41116/">CVE-2021-41116 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41116">CVE-2021-41116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922374" comment="php-composer2-2.1.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249939" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33037">CVE-2021-33037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41079">CVE-2021-41079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922375" comment="tomcat-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922376" comment="tomcat-admin-webapps-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922377" comment="tomcat-docs-webapp-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922378" comment="tomcat-el-3_0-api-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922379" comment="tomcat-embed-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922380" comment="tomcat-javadoc-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922381" comment="tomcat-jsp-2_3-api-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922382" comment="tomcat-jsvc-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922383" comment="tomcat-lib-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922384" comment="tomcat-servlet-4_0-api-9.0.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922385" comment="tomcat-webapps-9.0.43-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249940" version="1" class="patch">
	<metadata>
		<title>trivy-0.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922386" comment="trivy-0.20.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249941" version="1" class="patch">
	<metadata>
		<title>tar-1.34-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.34-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922387" comment="tar-1.34-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922388" comment="tar-backup-scripts-1.34-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922389" comment="tar-doc-1.34-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922390" comment="tar-lang-1.34-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922391" comment="tar-rmt-1.34-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922392" comment="tar-tests-1.34-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249942" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35604">CVE-2021-35604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922393" comment="libmariadbd-devel-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922394" comment="libmariadbd19-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922395" comment="mariadb-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922396" comment="mariadb-bench-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922397" comment="mariadb-client-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922398" comment="mariadb-errormessages-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922399" comment="mariadb-galera-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922400" comment="mariadb-rpm-macros-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922401" comment="mariadb-test-10.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922402" comment="mariadb-tools-10.6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249943" version="1" class="patch">
	<metadata>
		<title>libruby2_7-2_7-2.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_7-2_7-2.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922403" comment="libruby2_7-2_7-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922404" comment="ruby2.7-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922405" comment="ruby2.7-devel-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922406" comment="ruby2.7-devel-extra-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922407" comment="ruby2.7-doc-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922408" comment="ruby2.7-doc-ri-2.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249944" version="1" class="patch">
	<metadata>
		<title>libruby3_0-3_0-3.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_0-3_0-3.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922409" comment="libruby3_0-3_0-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922410" comment="ruby3.0-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922411" comment="ruby3.0-devel-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922412" comment="ruby3.0-devel-extra-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922413" comment="ruby3.0-doc-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922414" comment="ruby3.0-doc-ri-3.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249945" version="1" class="patch">
	<metadata>
		<title>xen-4.16.0_01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.16.0_01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28702">CVE-2021-28702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922415" comment="xen-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922416" comment="xen-devel-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922417" comment="xen-doc-html-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922418" comment="xen-libs-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922419" comment="xen-libs-32bit-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922420" comment="xen-tools-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922421" comment="xen-tools-domU-4.16.0_01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922422" comment="xen-tools-xendomains-wait-disk-4.16.0_01-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249946" version="1" class="patch">
	<metadata>
		<title>postgresql10-10.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-10.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922423" comment="postgresql10-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922424" comment="postgresql10-contrib-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922425" comment="postgresql10-devel-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922426" comment="postgresql10-docs-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922427" comment="postgresql10-plperl-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922428" comment="postgresql10-plpython-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922429" comment="postgresql10-pltcl-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922430" comment="postgresql10-server-10.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922431" comment="postgresql10-test-10.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249947" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922432" comment="postgresql11-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922433" comment="postgresql11-contrib-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922434" comment="postgresql11-devel-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922435" comment="postgresql11-docs-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922436" comment="postgresql11-llvmjit-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922437" comment="postgresql11-plperl-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922438" comment="postgresql11-plpython-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922439" comment="postgresql11-pltcl-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922440" comment="postgresql11-server-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922441" comment="postgresql11-server-devel-11.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922442" comment="postgresql11-test-11.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249948" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922443" comment="postgresql12-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922444" comment="postgresql12-contrib-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922445" comment="postgresql12-devel-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922446" comment="postgresql12-docs-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922447" comment="postgresql12-llvmjit-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922448" comment="postgresql12-plperl-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922449" comment="postgresql12-plpython-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922450" comment="postgresql12-pltcl-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922451" comment="postgresql12-server-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922452" comment="postgresql12-server-devel-12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922453" comment="postgresql12-test-12.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249949" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922454" comment="postgresql13-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922455" comment="postgresql13-contrib-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922456" comment="postgresql13-devel-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922457" comment="postgresql13-docs-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922458" comment="postgresql13-llvmjit-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922459" comment="postgresql13-plperl-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922460" comment="postgresql13-plpython-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922461" comment="postgresql13-pltcl-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922462" comment="postgresql13-server-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922463" comment="postgresql13-server-devel-13.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922464" comment="postgresql13-test-13.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249950" version="1" class="patch">
	<metadata>
		<title>libecpg6-14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922465" comment="libecpg6-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922466" comment="libecpg6-32bit-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922467" comment="libpq5-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922468" comment="libpq5-32bit-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922469" comment="postgresql14-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922470" comment="postgresql14-contrib-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922471" comment="postgresql14-devel-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922472" comment="postgresql14-docs-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922473" comment="postgresql14-llvmjit-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922474" comment="postgresql14-plperl-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922475" comment="postgresql14-plpython-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922476" comment="postgresql14-pltcl-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922477" comment="postgresql14-server-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922478" comment="postgresql14-server-devel-14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922479" comment="postgresql14-test-14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249951" version="1" class="patch">
	<metadata>
		<title>jupyter-nbdime-6.1.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41134" ref_url="https://www.suse.com/security/cve/CVE-2021-41134/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbdime-6.1.2-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41134/">CVE-2021-41134 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41134">CVE-2021-41134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922480" comment="jupyter-nbdime-6.1.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922481" comment="jupyter-nbdime-git-6.1.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922482" comment="jupyter-nbdime-hg-6.1.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922483" comment="jupyter-nbdime-jupyterlab-2.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922484" comment="python36-nbdime-3.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922485" comment="python38-nbdime-3.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922486" comment="python39-nbdime-3.1.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249952" version="1" class="patch">
	<metadata>
		<title>ctdb-4.15.2+git.193.a4d6307f1fd-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2020-25718" ref_url="https://www.suse.com/security/cve/CVE-2020-25718/" source="CVE"/>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<reference ref_id="CVE-2020-25721" ref_url="https://www.suse.com/security/cve/CVE-2020-25721/" source="CVE"/>
		<reference ref_id="CVE-2020-25722" ref_url="https://www.suse.com/security/cve/CVE-2020-25722/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="CVE-2021-3738" ref_url="https://www.suse.com/security/cve/CVE-2021-3738/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.15.2+git.193.a4d6307f1fd-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25718/">CVE-2020-25718 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25718">CVE-2020-25718 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25721/">CVE-2020-25721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25721">CVE-2020-25721 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25722/">CVE-2020-25722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25722">CVE-2020-25722 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23192">CVE-2021-23192 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3738/">CVE-2021-3738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3738">CVE-2021-3738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922487" comment="ctdb-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922488" comment="ctdb-pcp-pmda-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922489" comment="libdcerpc-binding0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922490" comment="libdcerpc-binding0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922491" comment="libdcerpc-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922492" comment="libdcerpc-samr-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922493" comment="libdcerpc-samr0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922494" comment="libdcerpc-samr0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922495" comment="libdcerpc0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922496" comment="libdcerpc0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922497" comment="libndr-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922498" comment="libndr-krb5pac-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922499" comment="libndr-krb5pac0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922500" comment="libndr-krb5pac0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922501" comment="libndr-nbt-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922502" comment="libndr-nbt0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922503" comment="libndr-nbt0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922504" comment="libndr-standard-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922505" comment="libndr-standard0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922506" comment="libndr-standard0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922507" comment="libndr2-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922508" comment="libndr2-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922509" comment="libnetapi-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922510" comment="libnetapi-devel-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922511" comment="libnetapi0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922512" comment="libnetapi0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922513" comment="libsamba-credentials-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922514" comment="libsamba-credentials1-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922515" comment="libsamba-credentials1-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922516" comment="libsamba-errors-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922517" comment="libsamba-errors0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922518" comment="libsamba-errors0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922519" comment="libsamba-hostconfig-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922520" comment="libsamba-hostconfig0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922521" comment="libsamba-hostconfig0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922522" comment="libsamba-passdb-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922523" comment="libsamba-passdb0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922524" comment="libsamba-passdb0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922525" comment="libsamba-policy-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922526" comment="libsamba-policy-python3-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922527" comment="libsamba-policy0-python3-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922528" comment="libsamba-policy0-python3-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922529" comment="libsamba-util-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922530" comment="libsamba-util0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922531" comment="libsamba-util0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922532" comment="libsamdb-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922533" comment="libsamdb0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922534" comment="libsamdb0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922535" comment="libsmbclient-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922536" comment="libsmbclient0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922537" comment="libsmbclient0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922538" comment="libsmbconf-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922539" comment="libsmbconf0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922540" comment="libsmbconf0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922541" comment="libsmbldap-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922542" comment="libsmbldap2-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922543" comment="libsmbldap2-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922544" comment="libtevent-util-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922545" comment="libtevent-util0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922546" comment="libtevent-util0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922547" comment="libwbclient-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922548" comment="libwbclient0-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922549" comment="libwbclient0-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922550" comment="samba-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922551" comment="samba-ad-dc-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922552" comment="samba-ad-dc-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922553" comment="samba-ceph-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922554" comment="samba-client-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922555" comment="samba-client-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922556" comment="samba-core-devel-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922557" comment="samba-doc-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922558" comment="samba-dsdb-modules-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922559" comment="samba-gpupdate-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922560" comment="samba-ldb-ldap-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922561" comment="samba-libs-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922562" comment="samba-libs-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922563" comment="samba-libs-python3-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922564" comment="samba-libs-python3-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922565" comment="samba-python3-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922566" comment="samba-test-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922567" comment="samba-tool-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922568" comment="samba-winbind-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922569" comment="samba-winbind-32bit-4.15.2+git.193.a4d6307f1fd-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249953" version="1" class="patch">
	<metadata>
		<title>libspeex1-1.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
These are all security issues fixed in the libspeex1-1.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922570" comment="libspeex1-1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922571" comment="libspeex1-32bit-1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922572" comment="speex-1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922573" comment="speex-devel-1.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249954" version="1" class="patch">
	<metadata>
		<title>barrier-2.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42072" ref_url="https://www.suse.com/security/cve/CVE-2021-42072/" source="CVE"/>
		<reference ref_id="CVE-2021-42073" ref_url="https://www.suse.com/security/cve/CVE-2021-42073/" source="CVE"/>
		<description>
These are all security issues fixed in the barrier-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42072/">CVE-2021-42072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42072">CVE-2021-42072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42073/">CVE-2021-42073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-42073">CVE-2021-42073 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922574" comment="barrier-2.4.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249955" version="1" class="patch">
	<metadata>
		<title>binutils-2.37-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.37-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922575" comment="binutils-2.37-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922576" comment="binutils-devel-2.37-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922577" comment="binutils-devel-32bit-2.37-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922578" comment="binutils-gold-2.37-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922579" comment="libctf-nobfd0-2.37-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922580" comment="libctf0-2.37-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249956" version="1" class="patch">
	<metadata>
		<title>liblldpctl4-1.0.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43612" ref_url="https://www.suse.com/security/cve/CVE-2021-43612/" source="CVE"/>
		<description>
These are all security issues fixed in the liblldpctl4-1.0.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43612/">CVE-2021-43612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43612">CVE-2021-43612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922581" comment="liblldpctl4-1.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922582" comment="lldpd-1.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922583" comment="lldpd-devel-1.0.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249957" version="1" class="patch">
	<metadata>
		<title>gmp-devel-32bit-6.2.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
These are all security issues fixed in the gmp-devel-32bit-6.2.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922584" comment="gmp-devel-6.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922585" comment="gmp-devel-32bit-6.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922586" comment="libgmp10-6.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922587" comment="libgmp10-32bit-6.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922588" comment="libgmpxx4-6.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922589" comment="libgmpxx4-32bit-6.2.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249958" version="1" class="patch">
	<metadata>
		<title>corepack16-16.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922590" comment="corepack16-16.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922591" comment="nodejs16-16.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922592" comment="nodejs16-devel-16.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922593" comment="nodejs16-docs-16.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922594" comment="npm16-16.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249959" version="1" class="patch">
	<metadata>
		<title>php8-8.0.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.0.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">CVE-2021-21707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922595" comment="php8-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922596" comment="php8-bcmath-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922597" comment="php8-bz2-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922598" comment="php8-calendar-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922599" comment="php8-cli-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922600" comment="php8-ctype-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922601" comment="php8-curl-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922602" comment="php8-dba-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922603" comment="php8-devel-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922604" comment="php8-dom-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922605" comment="php8-enchant-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922606" comment="php8-exif-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922607" comment="php8-fileinfo-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922608" comment="php8-ftp-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922609" comment="php8-gd-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922610" comment="php8-gettext-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922611" comment="php8-gmp-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922612" comment="php8-iconv-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922613" comment="php8-intl-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922614" comment="php8-ldap-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922615" comment="php8-mbstring-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922616" comment="php8-mysql-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922617" comment="php8-odbc-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922618" comment="php8-opcache-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922619" comment="php8-openssl-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922620" comment="php8-pcntl-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922621" comment="php8-pdo-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922622" comment="php8-pgsql-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922623" comment="php8-phar-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922624" comment="php8-posix-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922625" comment="php8-readline-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922626" comment="php8-shmop-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922627" comment="php8-snmp-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922628" comment="php8-soap-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922629" comment="php8-sockets-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922630" comment="php8-sodium-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922631" comment="php8-sqlite-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922632" comment="php8-sysvmsg-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922633" comment="php8-sysvsem-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922634" comment="php8-sysvshm-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922635" comment="php8-tidy-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922636" comment="php8-tokenizer-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922637" comment="php8-xmlreader-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922638" comment="php8-xmlwriter-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922639" comment="php8-xsl-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922640" comment="php8-zip-8.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922641" comment="php8-zlib-8.0.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249960" version="1" class="patch">
	<metadata>
		<title>tor-0.4.6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22929" ref_url="https://www.suse.com/security/cve/CVE-2021-22929/" source="CVE"/>
		<description>
These are all security issues fixed in the tor-0.4.6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22929/">CVE-2021-22929 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22929">CVE-2021-22929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922642" comment="tor-0.4.6.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249961" version="1" class="patch">
	<metadata>
		<title>php7-7.4.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">CVE-2021-21707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922643" comment="php7-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922644" comment="php7-bcmath-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922645" comment="php7-bz2-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922646" comment="php7-calendar-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922647" comment="php7-cli-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922648" comment="php7-ctype-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922649" comment="php7-curl-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922650" comment="php7-dba-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922651" comment="php7-devel-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922652" comment="php7-dom-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922653" comment="php7-enchant-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922654" comment="php7-exif-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922655" comment="php7-fileinfo-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922656" comment="php7-ftp-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922657" comment="php7-gd-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922658" comment="php7-gettext-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922659" comment="php7-gmp-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922660" comment="php7-iconv-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922661" comment="php7-intl-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922662" comment="php7-json-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922663" comment="php7-ldap-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922664" comment="php7-mbstring-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922665" comment="php7-mysql-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922666" comment="php7-odbc-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922667" comment="php7-opcache-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922668" comment="php7-openssl-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922669" comment="php7-pcntl-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922670" comment="php7-pdo-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922671" comment="php7-pgsql-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922672" comment="php7-phar-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922673" comment="php7-posix-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922674" comment="php7-readline-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922675" comment="php7-shmop-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922676" comment="php7-snmp-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922677" comment="php7-soap-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922678" comment="php7-sockets-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922679" comment="php7-sodium-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922680" comment="php7-sqlite-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922681" comment="php7-sysvmsg-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922682" comment="php7-sysvsem-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922683" comment="php7-sysvshm-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922684" comment="php7-tidy-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922685" comment="php7-tokenizer-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922686" comment="php7-xmlreader-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922687" comment="php7-xmlrpc-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922688" comment="php7-xmlwriter-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922689" comment="php7-xsl-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922690" comment="php7-zip-7.4.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922691" comment="php7-zlib-7.4.26-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249962" version="1" class="patch">
	<metadata>
		<title>libwireshark14-3.4.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920/" source="CVE"/>
		<reference ref_id="CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921/" source="CVE"/>
		<reference ref_id="CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922/" source="CVE"/>
		<reference ref_id="CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924/" source="CVE"/>
		<reference ref_id="CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925/" source="CVE"/>
		<reference ref_id="CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926/" source="CVE"/>
		<reference ref_id="CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928/" source="CVE"/>
		<reference ref_id="CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark14-3.4.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39920">CVE-2021-39920 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39921">CVE-2021-39921 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39922">CVE-2021-39922 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39924">CVE-2021-39924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39925">CVE-2021-39925 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39926">CVE-2021-39926 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39928">CVE-2021-39928 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39929">CVE-2021-39929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922692" comment="libwireshark14-3.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922693" comment="libwiretap11-3.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922694" comment="libwsutil12-3.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922695" comment="wireshark-3.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922696" comment="wireshark-devel-3.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922697" comment="wireshark-ui-qt-3.4.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249963" version="1" class="patch">
	<metadata>
		<title>aom-tools-3.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30474" ref_url="https://www.suse.com/security/cve/CVE-2021-30474/" source="CVE"/>
		<description>
These are all security issues fixed in the aom-tools-3.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30474/">CVE-2021-30474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30474">CVE-2021-30474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922698" comment="aom-tools-3.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922699" comment="libaom-devel-3.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922700" comment="libaom-devel-doc-3.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922701" comment="libaom3-3.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922702" comment="libaom3-32bit-3.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249964" version="1" class="patch">
	<metadata>
		<title>opensc-0.22.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.22.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20792">CVE-2019-20792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922703" comment="opensc-0.22.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922704" comment="opensc-32bit-0.22.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249965" version="1" class="patch">
	<metadata>
		<title>python3-mailman-3.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-34337" ref_url="https://www.suse.com/security/cve/CVE-2021-34337/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-mailman-3.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34337/">CVE-2021-34337 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34337">CVE-2021-34337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922705" comment="python3-mailman-3.3.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249966" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-21.08.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43337" ref_url="https://www.suse.com/security/cve/CVE-2021-43337/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-21.08.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43337/">CVE-2021-43337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43337">CVE-2021-43337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922706" comment="libnss_slurm2-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922707" comment="libpmi0-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922708" comment="libslurm37-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922709" comment="perl-slurm-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922710" comment="slurm-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922711" comment="slurm-auth-none-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922712" comment="slurm-config-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922713" comment="slurm-config-man-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922714" comment="slurm-cray-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922715" comment="slurm-devel-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922716" comment="slurm-doc-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922717" comment="slurm-hdf5-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922718" comment="slurm-lua-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922719" comment="slurm-munge-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922720" comment="slurm-node-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922721" comment="slurm-openlava-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922722" comment="slurm-pam_slurm-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922723" comment="slurm-plugins-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922724" comment="slurm-rest-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922725" comment="slurm-seff-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922726" comment="slurm-sjstat-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922727" comment="slurm-slurmdbd-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922728" comment="slurm-sql-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922729" comment="slurm-sview-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922730" comment="slurm-torque-21.08.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922731" comment="slurm-webdoc-21.08.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249967" version="1" class="patch">
	<metadata>
		<title>containerd-1.4.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.4.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922732" comment="containerd-1.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922733" comment="containerd-ctr-1.4.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249968" version="1" class="patch">
	<metadata>
		<title>docker-20.10.11_ce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.11_ce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922734" comment="docker-20.10.11_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922735" comment="docker-bash-completion-20.10.11_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922736" comment="docker-fish-completion-20.10.11_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922737" comment="docker-zsh-completion-20.10.11_ce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249969" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.6.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.6.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2154">CVE-2021-2154 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2166">CVE-2021-2166 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">CVE-2021-27928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922738" comment="libmariadbd-devel-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922739" comment="libmariadbd19-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922740" comment="mariadb-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922741" comment="mariadb-bench-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922742" comment="mariadb-client-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922743" comment="mariadb-errormessages-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922744" comment="mariadb-galera-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922745" comment="mariadb-rpm-macros-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922746" comment="mariadb-test-10.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922747" comment="mariadb-tools-10.6.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249970" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.47.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41281" ref_url="https://www.suse.com/security/cve/CVE-2021-41281/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.47.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41281/">CVE-2021-41281 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41281">CVE-2021-41281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922748" comment="matrix-synapse-1.47.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249971" version="1" class="patch">
	<metadata>
		<title>cargo1.56-1.56.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.56-1.56.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922749" comment="cargo1.56-1.56.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922750" comment="rust1.56-1.56.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249972" version="1" class="patch">
	<metadata>
		<title>grafana-7.5.11-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-7.5.11-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922751" comment="grafana-7.5.11-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249973" version="1" class="patch">
	<metadata>
		<title>ceph-16.2.6.463+g22e7612f9ad-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660/" source="CVE"/>
		<reference ref_id="CVE-2020-25678" ref_url="https://www.suse.com/security/cve/CVE-2020-25678/" source="CVE"/>
		<reference ref_id="CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781/" source="CVE"/>
		<reference ref_id="CVE-2020-27839" ref_url="https://www.suse.com/security/cve/CVE-2020-27839/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-16.2.6.463+g22e7612f9ad-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25660">CVE-2020-25660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25678/">CVE-2020-25678 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25678">CVE-2020-25678 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27781">CVE-2020-27781 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27839/">CVE-2020-27839 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27839">CVE-2020-27839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922752" comment="ceph-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922753" comment="ceph-base-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922754" comment="ceph-common-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922755" comment="ceph-fuse-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922756" comment="ceph-grafana-dashboards-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922757" comment="ceph-immutable-object-cache-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922758" comment="ceph-mds-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922759" comment="ceph-mgr-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922760" comment="ceph-mgr-cephadm-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922761" comment="ceph-mgr-dashboard-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922762" comment="ceph-mgr-diskprediction-local-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922763" comment="ceph-mgr-k8sevents-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922764" comment="ceph-mgr-modules-core-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922765" comment="ceph-mgr-rook-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922766" comment="ceph-mon-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922767" comment="ceph-osd-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922768" comment="ceph-prometheus-alerts-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922769" comment="ceph-radosgw-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922770" comment="cephadm-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922771" comment="cephfs-mirror-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922772" comment="cephfs-shell-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922773" comment="cephfs-top-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922774" comment="libcephfs-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922775" comment="libcephfs2-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922776" comment="libcephsqlite-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922777" comment="libcephsqlite-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922778" comment="librados-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922779" comment="librados2-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922780" comment="libradospp-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922781" comment="librbd-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922782" comment="librbd1-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922783" comment="librgw-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922784" comment="librgw2-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922785" comment="python3-ceph-argparse-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922786" comment="python3-ceph-common-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922787" comment="python3-cephfs-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922788" comment="python3-rados-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922789" comment="python3-rbd-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922790" comment="python3-rgw-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922791" comment="rados-objclass-devel-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922792" comment="rbd-fuse-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922793" comment="rbd-mirror-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922794" comment="rbd-nbd-16.2.6.463+g22e7612f9ad-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249974" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.86-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.86-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14312">CVE-2020-14312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922795" comment="dnsmasq-2.86-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922796" comment="dnsmasq-utils-2.86-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249975" version="1" class="patch">
	<metadata>
		<title>libzapojit-0_0-0-0.0.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39360" ref_url="https://www.suse.com/security/cve/CVE-2021-39360/" source="CVE"/>
		<description>
These are all security issues fixed in the libzapojit-0_0-0-0.0.3-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39360/">CVE-2021-39360 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39360">CVE-2021-39360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922797" comment="libzapojit-0_0-0-0.0.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922798" comment="libzapojit-devel-0.0.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922799" comment="typelib-1_0-Zpj-0_0-0.0.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249976" version="1" class="patch">
	<metadata>
		<title>strongswan-5.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41990">CVE-2021-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922800" comment="strongswan-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922801" comment="strongswan-doc-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922802" comment="strongswan-hmac-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922803" comment="strongswan-ipsec-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922804" comment="strongswan-libs0-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922805" comment="strongswan-mysql-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922806" comment="strongswan-nm-5.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922807" comment="strongswan-sqlite-5.9.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249977" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-13.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-13.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37998">CVE-2021-37998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38001">CVE-2021-38001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38002">CVE-2021-38002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38003">CVE-2021-38003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922808" comment="nodejs-electron-13.6.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249978" version="1" class="patch">
	<metadata>
		<title>libruby2_7-2_7-2.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_7-2_7-2.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922809" comment="libruby2_7-2_7-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922810" comment="ruby2.7-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922811" comment="ruby2.7-devel-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922812" comment="ruby2.7-devel-extra-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922813" comment="ruby2.7-doc-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922814" comment="ruby2.7-doc-ri-2.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249979" version="1" class="patch">
	<metadata>
		<title>libruby3_0-3_0-3.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_0-3_0-3.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922815" comment="libruby3_0-3_0-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922816" comment="ruby3.0-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922817" comment="ruby3.0-devel-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922818" comment="ruby3.0-devel-extra-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922819" comment="ruby3.0-doc-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922820" comment="ruby3.0-doc-ri-3.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249980" version="1" class="patch">
	<metadata>
		<title>singularity-3.8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the singularity-3.8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922821" comment="singularity-3.8.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249981" version="1" class="patch">
	<metadata>
		<title>bind-9.16.20-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.16.20-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922822" comment="bind-9.16.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922823" comment="bind-doc-9.16.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922824" comment="bind-utils-9.16.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922825" comment="python3-bind-9.16.20-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249982" version="1" class="patch">
	<metadata>
		<title>Botan-2.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40529" ref_url="https://www.suse.com/security/cve/CVE-2021-40529/" source="CVE"/>
		<description>
These are all security issues fixed in the Botan-2.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40529/">CVE-2021-40529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40529">CVE-2021-40529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922826" comment="Botan-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922827" comment="Botan-doc-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922828" comment="libbotan-2-18-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922829" comment="libbotan-2-18-32bit-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922830" comment="libbotan-devel-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922831" comment="libbotan-devel-32bit-2.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922832" comment="python3-botan-2.18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249983" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.15.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.15.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922834" comment="kernel-macros-5.15.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922835" comment="kernel-source-5.15.6-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922836" comment="kernel-source-vanilla-5.15.6-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249984" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.73-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.73-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922837" comment="libfreebl3-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922838" comment="libfreebl3-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922839" comment="libfreebl3-hmac-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922840" comment="libfreebl3-hmac-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922841" comment="libsoftokn3-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922842" comment="libsoftokn3-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922843" comment="libsoftokn3-hmac-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922844" comment="libsoftokn3-hmac-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922845" comment="mozilla-nss-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922846" comment="mozilla-nss-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922847" comment="mozilla-nss-certs-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922848" comment="mozilla-nss-certs-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922849" comment="mozilla-nss-devel-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922850" comment="mozilla-nss-sysinit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922851" comment="mozilla-nss-sysinit-32bit-3.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922852" comment="mozilla-nss-tools-3.73-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249985" version="1" class="patch">
	<metadata>
		<title>runc-1.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922853" comment="runc-1.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249986" version="1" class="patch">
	<metadata>
		<title>parsec-0.8.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36781" ref_url="https://www.suse.com/security/cve/CVE-2021-36781/" source="CVE"/>
		<description>
These are all security issues fixed in the parsec-0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36781/">CVE-2021-36781 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36781">CVE-2021-36781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922854" comment="parsec-0.8.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249987" version="1" class="patch">
	<metadata>
		<title>log4j-2.13.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.13.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922855" comment="log4j-2.13.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922856" comment="log4j-javadoc-2.13.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922857" comment="log4j-jcl-2.13.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922858" comment="log4j-slf4j-2.13.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249988" version="1" class="patch">
	<metadata>
		<title>velero-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29652" ref_url="https://www.suse.com/security/cve/CVE-2020-29652/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-29652/">CVE-2020-29652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29652">CVE-2020-29652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922859" comment="velero-1.7.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249989" version="1" class="patch">
	<metadata>
		<title>velero-plugin-for-microsoft-azure-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26160" ref_url="https://www.suse.com/security/cve/CVE-2020-26160/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-plugin-for-microsoft-azure-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26160/">CVE-2020-26160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26160">CVE-2020-26160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922860" comment="velero-plugin-for-microsoft-azure-1.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249990" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-95.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43540" ref_url="https://www.suse.com/security/cve/CVE-2021-43540/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43544" ref_url="https://www.suse.com/security/cve/CVE-2021-43544/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-95.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43540/">CVE-2021-43540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43540">CVE-2021-43540 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43544/">CVE-2021-43544 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43544">CVE-2021-43544 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922861" comment="MozillaFirefox-95.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922862" comment="MozillaFirefox-branding-upstream-95.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922863" comment="MozillaFirefox-devel-95.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922864" comment="MozillaFirefox-translations-common-95.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922865" comment="MozillaFirefox-translations-other-95.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249991" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40529" ref_url="https://www.suse.com/security/cve/CVE-2021-40529/" source="CVE"/>
		<reference ref_id="CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40529/">CVE-2021-40529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40529">CVE-2021-40529 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43528">CVE-2021-43528 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922866" comment="MozillaThunderbird-91.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922867" comment="MozillaThunderbird-translations-common-91.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922868" comment="MozillaThunderbird-translations-other-91.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249992" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922869" comment="go1.16-1.16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922870" comment="go1.16-doc-1.16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922871" comment="go1.16-race-1.16.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249993" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922872" comment="go1.17-1.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922873" comment="go1.17-doc-1.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922874" comment="go1.17-race-1.17.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249994" version="1" class="patch">
	<metadata>
		<title>libmysofa-devel-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3756" ref_url="https://www.suse.com/security/cve/CVE-2021-3756/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysofa-devel-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3756/">CVE-2021-3756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3756">CVE-2021-3756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922875" comment="libmysofa-devel-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922876" comment="libmysofa1-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922877" comment="libmysofa1-32bit-1.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249995" version="1" class="patch">
	<metadata>
		<title>podman-3.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-3.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922878" comment="podman-3.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922879" comment="podman-cni-config-3.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922880" comment="podman-docker-3.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922881" comment="podman-remote-3.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249996" version="1" class="patch">
	<metadata>
		<title>janus-gateway-0.11.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4020" ref_url="https://www.suse.com/security/cve/CVE-2021-4020/" source="CVE"/>
		<description>
These are all security issues fixed in the janus-gateway-0.11.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4020/">CVE-2021-4020 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4020">CVE-2021-4020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922882" comment="janus-gateway-0.11.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922883" comment="janus-gateway-devel-0.11.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249997" version="1" class="patch">
	<metadata>
		<title>junit-4.13.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<description>
These are all security issues fixed in the junit-4.13.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1945">CVE-2020-1945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922884" comment="junit-4.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922885" comment="junit-javadoc-4.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922886" comment="junit-manual-4.13.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249998" version="1" class="patch">
	<metadata>
		<title>privoxy-3.0.33-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44540" ref_url="https://www.suse.com/security/cve/CVE-2021-44540/" source="CVE"/>
		<reference ref_id="CVE-2021-44541" ref_url="https://www.suse.com/security/cve/CVE-2021-44541/" source="CVE"/>
		<reference ref_id="CVE-2021-44542" ref_url="https://www.suse.com/security/cve/CVE-2021-44542/" source="CVE"/>
		<reference ref_id="CVE-2021-44543" ref_url="https://www.suse.com/security/cve/CVE-2021-44543/" source="CVE"/>
		<description>
These are all security issues fixed in the privoxy-3.0.33-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44540/">CVE-2021-44540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44540">CVE-2021-44540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44541/">CVE-2021-44541 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44541">CVE-2021-44541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44542/">CVE-2021-44542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44542">CVE-2021-44542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44543/">CVE-2021-44543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44543">CVE-2021-44543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922887" comment="privoxy-3.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922888" comment="privoxy-doc-3.0.33-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249999" version="1" class="patch">
	<metadata>
		<title>velocity-custom-parser-example-2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<description>
These are all security issues fixed in the velocity-custom-parser-example-2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13936">CVE-2020-13936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922889" comment="velocity-custom-parser-example-2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922890" comment="velocity-engine-core-2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922891" comment="velocity-engine-examples-2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922892" comment="velocity-engine-javadoc-2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922893" comment="velocity-engine-parent-2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922894" comment="velocity-engine-scripting-2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250000" version="1" class="patch">
	<metadata>
		<title>kubernetes1.22-apiserver-1.22.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.22-apiserver-1.22.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922895" comment="kubernetes1.22-apiserver-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922896" comment="kubernetes1.22-client-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922897" comment="kubernetes1.22-client-common-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922898" comment="kubernetes1.22-controller-manager-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922899" comment="kubernetes1.22-kubeadm-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922900" comment="kubernetes1.22-kubelet-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922901" comment="kubernetes1.22-kubelet-common-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922902" comment="kubernetes1.22-proxy-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922903" comment="kubernetes1.22-scheduler-1.22.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250001" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.11.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.11.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0034">CVE-2020-0034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922904" comment="libvpx-devel-1.11.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922905" comment="libvpx7-1.11.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922906" comment="libvpx7-32bit-1.11.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922907" comment="vpx-tools-1.11.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250002" version="1" class="patch">
	<metadata>
		<title>log4j-2.16.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2021-45046" ref_url="https://www.suse.com/security/cve/CVE-2021-45046/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.16.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45046/">CVE-2021-45046 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046">CVE-2021-45046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922908" comment="log4j-2.16.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922909" comment="log4j-javadoc-2.16.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922910" comment="log4j-jcl-2.16.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922911" comment="log4j-slf4j-2.16.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250003" version="1" class="patch">
	<metadata>
		<title>chainsaw-1.2.17-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
These are all security issues fixed in the chainsaw-1.2.17-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922912" comment="chainsaw-1.2.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922913" comment="log4j12-1.2.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922914" comment="log4j12-javadoc-1.2.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922915" comment="log4j12-manual-1.2.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922916" comment="logfactor5-1.2.17-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250004" version="1" class="patch">
	<metadata>
		<title>logback-1.2.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<description>
These are all security issues fixed in the logback-1.2.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922917" comment="logback-1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922918" comment="logback-access-1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922919" comment="logback-examples-1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922920" comment="logback-javadoc-1.2.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250005" version="1" class="patch">
	<metadata>
		<title>libmruby3-3.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4110" ref_url="https://www.suse.com/security/cve/CVE-2021-4110/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3-3.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4110/">CVE-2021-4110 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4110">CVE-2021-4110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922921" comment="libmruby3-3.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922922" comment="mruby-3.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922923" comment="mruby-devel-3.0.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250006" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922924" comment="xorg-x11-server-21.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922925" comment="xorg-x11-server-Xvfb-21.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922926" comment="xorg-x11-server-extra-21.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922927" comment="xorg-x11-server-sdk-21.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922928" comment="xorg-x11-server-source-21.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922929" comment="xorg-x11-server-wrapper-21.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250007" version="1" class="patch">
	<metadata>
		<title>libZXing1-1.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28021" ref_url="https://www.suse.com/security/cve/CVE-2021-28021/" source="CVE"/>
		<reference ref_id="CVE-2021-42715" ref_url="https://www.suse.com/security/cve/CVE-2021-42715/" source="CVE"/>
		<reference ref_id="CVE-2021-42716" ref_url="https://www.suse.com/security/cve/CVE-2021-42716/" source="CVE"/>
		<description>
These are all security issues fixed in the libZXing1-1.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28021/">CVE-2021-28021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28021">CVE-2021-28021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42715/">CVE-2021-42715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42715">CVE-2021-42715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42716/">CVE-2021-42716 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42716">CVE-2021-42716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922930" comment="libZXing1-1.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922931" comment="libZXing1-32bit-1.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922932" comment="zxing-cpp-devel-1.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250008" version="1" class="patch">
	<metadata>
		<title>chromedriver-96.0.4664.110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005/" source="CVE"/>
		<reference ref_id="CVE-2021-38006" ref_url="https://www.suse.com/security/cve/CVE-2021-38006/" source="CVE"/>
		<reference ref_id="CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007/" source="CVE"/>
		<reference ref_id="CVE-2021-38008" ref_url="https://www.suse.com/security/cve/CVE-2021-38008/" source="CVE"/>
		<reference ref_id="CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009/" source="CVE"/>
		<reference ref_id="CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010/" source="CVE"/>
		<reference ref_id="CVE-2021-38011" ref_url="https://www.suse.com/security/cve/CVE-2021-38011/" source="CVE"/>
		<reference ref_id="CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012/" source="CVE"/>
		<reference ref_id="CVE-2021-38013" ref_url="https://www.suse.com/security/cve/CVE-2021-38013/" source="CVE"/>
		<reference ref_id="CVE-2021-38014" ref_url="https://www.suse.com/security/cve/CVE-2021-38014/" source="CVE"/>
		<reference ref_id="CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015/" source="CVE"/>
		<reference ref_id="CVE-2021-38016" ref_url="https://www.suse.com/security/cve/CVE-2021-38016/" source="CVE"/>
		<reference ref_id="CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017/" source="CVE"/>
		<reference ref_id="CVE-2021-38018" ref_url="https://www.suse.com/security/cve/CVE-2021-38018/" source="CVE"/>
		<reference ref_id="CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019/" source="CVE"/>
		<reference ref_id="CVE-2021-38020" ref_url="https://www.suse.com/security/cve/CVE-2021-38020/" source="CVE"/>
		<reference ref_id="CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021/" source="CVE"/>
		<reference ref_id="CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022/" source="CVE"/>
		<reference ref_id="CVE-2021-4052" ref_url="https://www.suse.com/security/cve/CVE-2021-4052/" source="CVE"/>
		<reference ref_id="CVE-2021-4053" ref_url="https://www.suse.com/security/cve/CVE-2021-4053/" source="CVE"/>
		<reference ref_id="CVE-2021-4054" ref_url="https://www.suse.com/security/cve/CVE-2021-4054/" source="CVE"/>
		<reference ref_id="CVE-2021-4055" ref_url="https://www.suse.com/security/cve/CVE-2021-4055/" source="CVE"/>
		<reference ref_id="CVE-2021-4056" ref_url="https://www.suse.com/security/cve/CVE-2021-4056/" source="CVE"/>
		<reference ref_id="CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057/" source="CVE"/>
		<reference ref_id="CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058/" source="CVE"/>
		<reference ref_id="CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059/" source="CVE"/>
		<reference ref_id="CVE-2021-4061" ref_url="https://www.suse.com/security/cve/CVE-2021-4061/" source="CVE"/>
		<reference ref_id="CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062/" source="CVE"/>
		<reference ref_id="CVE-2021-4063" ref_url="https://www.suse.com/security/cve/CVE-2021-4063/" source="CVE"/>
		<reference ref_id="CVE-2021-4064" ref_url="https://www.suse.com/security/cve/CVE-2021-4064/" source="CVE"/>
		<reference ref_id="CVE-2021-4065" ref_url="https://www.suse.com/security/cve/CVE-2021-4065/" source="CVE"/>
		<reference ref_id="CVE-2021-4066" ref_url="https://www.suse.com/security/cve/CVE-2021-4066/" source="CVE"/>
		<reference ref_id="CVE-2021-4067" ref_url="https://www.suse.com/security/cve/CVE-2021-4067/" source="CVE"/>
		<reference ref_id="CVE-2021-4068" ref_url="https://www.suse.com/security/cve/CVE-2021-4068/" source="CVE"/>
		<reference ref_id="CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078/" source="CVE"/>
		<reference ref_id="CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079/" source="CVE"/>
		<reference ref_id="CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098/" source="CVE"/>
		<reference ref_id="CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099/" source="CVE"/>
		<reference ref_id="CVE-2021-4100" ref_url="https://www.suse.com/security/cve/CVE-2021-4100/" source="CVE"/>
		<reference ref_id="CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101/" source="CVE"/>
		<reference ref_id="CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-96.0.4664.110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38005">CVE-2021-38005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38006/">CVE-2021-38006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38006">CVE-2021-38006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38007">CVE-2021-38007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38008/">CVE-2021-38008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38008">CVE-2021-38008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38009">CVE-2021-38009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38010">CVE-2021-38010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38011/">CVE-2021-38011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38011">CVE-2021-38011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38012">CVE-2021-38012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38013/">CVE-2021-38013 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38013">CVE-2021-38013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38014/">CVE-2021-38014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38014">CVE-2021-38014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38015">CVE-2021-38015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38016/">CVE-2021-38016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38016">CVE-2021-38016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38017">CVE-2021-38017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38018/">CVE-2021-38018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38018">CVE-2021-38018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38019">CVE-2021-38019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38020/">CVE-2021-38020 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38020">CVE-2021-38020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38021">CVE-2021-38021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38022">CVE-2021-38022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4052/">CVE-2021-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4052">CVE-2021-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4053/">CVE-2021-4053 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4053">CVE-2021-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4054/">CVE-2021-4054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4054">CVE-2021-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4055/">CVE-2021-4055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4055">CVE-2021-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4056/">CVE-2021-4056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4056">CVE-2021-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4057">CVE-2021-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4058">CVE-2021-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4059">CVE-2021-4059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4061/">CVE-2021-4061 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4061">CVE-2021-4061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4062">CVE-2021-4062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4063/">CVE-2021-4063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4063">CVE-2021-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4064/">CVE-2021-4064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4064">CVE-2021-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4065/">CVE-2021-4065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4065">CVE-2021-4065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4066/">CVE-2021-4066 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4066">CVE-2021-4066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4067/">CVE-2021-4067 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4067">CVE-2021-4067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4068/">CVE-2021-4068 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4068">CVE-2021-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4078">CVE-2021-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4079">CVE-2021-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4098">CVE-2021-4098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4099">CVE-2021-4099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4100/">CVE-2021-4100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4100">CVE-2021-4100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4101">CVE-2021-4101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4102">CVE-2021-4102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922933" comment="chromedriver-96.0.4664.110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922934" comment="chromium-96.0.4664.110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250009" version="1" class="patch">
	<metadata>
		<title>ant-1.10.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36373" ref_url="https://www.suse.com/security/cve/CVE-2021-36373/" source="CVE"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.10.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36373/">CVE-2021-36373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36373">CVE-2021-36373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36374">CVE-2021-36374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922935" comment="ant-1.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922936" comment="ant-jmf-1.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922937" comment="ant-scripts-1.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922938" comment="ant-swing-1.10.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250010" version="1" class="patch">
	<metadata>
		<title>bcm43xx-firmware-20180314-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10370" ref_url="https://www.suse.com/security/cve/CVE-2020-10370/" source="CVE"/>
		<description>
These are all security issues fixed in the bcm43xx-firmware-20180314-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10370/">CVE-2020-10370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10370">CVE-2020-10370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922939" comment="bcm43xx-firmware-20180314-14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250011" version="1" class="patch">
	<metadata>
		<title>epiphany-41.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45085" ref_url="https://www.suse.com/security/cve/CVE-2021-45085/" source="CVE"/>
		<reference ref_id="CVE-2021-45088" ref_url="https://www.suse.com/security/cve/CVE-2021-45088/" source="CVE"/>
		<description>
These are all security issues fixed in the epiphany-41.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45085/">CVE-2021-45085 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45085">CVE-2021-45085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45088/">CVE-2021-45088 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45088">CVE-2021-45088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922940" comment="epiphany-41.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922941" comment="epiphany-branding-upstream-41.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922942" comment="epiphany-lang-41.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922943" comment="gnome-shell-search-provider-epiphany-41.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250012" version="1" class="patch">
	<metadata>
		<title>log4j-2.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45105" ref_url="https://www.suse.com/security/cve/CVE-2021-45105/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45105/">CVE-2021-45105 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105">CVE-2021-45105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922944" comment="log4j-2.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922945" comment="log4j-javadoc-2.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922946" comment="log4j-jcl-2.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922947" comment="log4j-slf4j-2.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250013" version="1" class="patch">
	<metadata>
		<title>openvpn-2.5.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.5.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7544">CVE-2018-7544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922948" comment="openvpn-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922949" comment="openvpn-auth-pam-plugin-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922950" comment="openvpn-devel-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922951" comment="openvpn-down-root-plugin-2.5.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250014" version="1" class="patch">
	<metadata>
		<title>xml-security-2.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-12400" ref_url="https://www.suse.com/security/cve/CVE-2019-12400/" source="CVE"/>
		<reference ref_id="CVE-2021-40690" ref_url="https://www.suse.com/security/cve/CVE-2021-40690/" source="CVE"/>
		<description>
These are all security issues fixed in the xml-security-2.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12400/">CVE-2019-12400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12400">CVE-2019-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40690/">CVE-2021-40690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40690">CVE-2021-40690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922952" comment="xml-security-2.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922953" comment="xml-security-javadoc-2.1.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250015" version="1" class="patch">
	<metadata>
		<title>grafana-7.5.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-7.5.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922954" comment="grafana-7.5.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250016" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.52-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.52-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922955" comment="apache2-2.4.52-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250017" version="1" class="patch">
	<metadata>
		<title>kafka-kit-2.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
These are all security issues fixed in the kafka-kit-2.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922956" comment="kafka-kit-2.1.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250018" version="1" class="patch">
	<metadata>
		<title>libdxfrw-devel-1.0.1+git.20211110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21898" ref_url="https://www.suse.com/security/cve/CVE-2021-21898/" source="CVE"/>
		<reference ref_id="CVE-2021-21899" ref_url="https://www.suse.com/security/cve/CVE-2021-21899/" source="CVE"/>
		<reference ref_id="CVE-2021-21900" ref_url="https://www.suse.com/security/cve/CVE-2021-21900/" source="CVE"/>
		<description>
These are all security issues fixed in the libdxfrw-devel-1.0.1+git.20211110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21898/">CVE-2021-21898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21898">CVE-2021-21898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21899/">CVE-2021-21899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21899">CVE-2021-21899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21900/">CVE-2021-21900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21900">CVE-2021-21900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922957" comment="libdxfrw-devel-1.0.1+git.20211110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922958" comment="libdxfrw-tools-1.0.1+git.20211110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922959" comment="libdxfrw1-1.0.1+git.20211110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250019" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4126" ref_url="https://www.suse.com/security/cve/CVE-2021-4126/" source="CVE"/>
		<reference ref_id="CVE-2021-44538" ref_url="https://www.suse.com/security/cve/CVE-2021-44538/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4126/">CVE-2021-4126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4126">CVE-2021-4126 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44538/">CVE-2021-44538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44538">CVE-2021-44538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922960" comment="MozillaThunderbird-91.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922961" comment="MozillaThunderbird-translations-common-91.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922962" comment="MozillaThunderbird-translations-other-91.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250020" version="1" class="patch">
	<metadata>
		<title>xwayland-21.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-21.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922963" comment="xwayland-21.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922964" comment="xwayland-devel-21.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250021" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3981" ref_url="https://www.suse.com/security/cve/CVE-2021-3981/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3981/">CVE-2021-3981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922965" comment="grub2-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922966" comment="grub2-branding-upstream-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922967" comment="grub2-i386-pc-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922968" comment="grub2-i386-pc-debug-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922969" comment="grub2-snapper-plugin-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922970" comment="grub2-systemd-sleep-plugin-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922971" comment="grub2-x86_64-efi-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922972" comment="grub2-x86_64-efi-debug-2.06-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922973" comment="grub2-x86_64-xen-2.06-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250022" version="1" class="patch">
	<metadata>
		<title>HyperKitty-web-1.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35057" ref_url="https://www.suse.com/security/cve/CVE-2021-35057/" source="CVE"/>
		<description>
These are all security issues fixed in the HyperKitty-web-1.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35057/">CVE-2021-35057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-35057">CVE-2021-35057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922974" comment="HyperKitty-web-1.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922975" comment="HyperKitty-web-uwsgi-1.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922976" comment="python3-HyperKitty-1.3.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250023" version="1" class="patch">
	<metadata>
		<title>log4j-2.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44832" ref_url="https://www.suse.com/security/cve/CVE-2021-44832/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44832/">CVE-2021-44832 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832">CVE-2021-44832 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922977" comment="log4j-2.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922978" comment="log4j-javadoc-2.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922979" comment="log4j-jcl-2.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922980" comment="log4j-slf4j-2.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250024" version="1" class="patch">
	<metadata>
		<title>libwireshark15-3.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark15-3.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4181">CVE-2021-4181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4182">CVE-2021-4182 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4183">CVE-2021-4183 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4184">CVE-2021-4184 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4185">CVE-2021-4185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922981" comment="libwireshark15-3.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922982" comment="libwiretap12-3.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922983" comment="libwsutil13-3.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922984" comment="wireshark-3.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922985" comment="wireshark-devel-3.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922986" comment="wireshark-ui-qt-3.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250025" version="1" class="patch">
	<metadata>
		<title>blas-devel-3.9.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<description>
These are all security issues fixed in the blas-devel-3.9.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4048">CVE-2021-4048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009922987" comment="blas-devel-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922988" comment="blas-devel-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922989" comment="blas-devel-static-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922990" comment="cblas-devel-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922991" comment="cblas-devel-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922992" comment="cblas-devel-static-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922993" comment="lapack-devel-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922994" comment="lapack-devel-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922995" comment="lapack-devel-static-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922996" comment="lapacke-devel-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922997" comment="lapacke-devel-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922998" comment="lapacke-devel-static-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009922999" comment="libblas3-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923000" comment="libblas3-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923001" comment="libcblas3-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923002" comment="libcblas3-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923003" comment="liblapack3-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923004" comment="liblapack3-32bit-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923005" comment="liblapacke3-3.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923006" comment="liblapacke3-32bit-3.9.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250026" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.0.31-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.0.31-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923007" comment="libsndfile-devel-1.0.31-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923008" comment="libsndfile1-1.0.31-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923009" comment="libsndfile1-32bit-1.0.31-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250027" version="1" class="patch">
	<metadata>
		<title>perl-ExtUtils-MakeMaker-7.64-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-ExtUtils-MakeMaker-7.64-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923010" comment="perl-ExtUtils-MakeMaker-7.64-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250028" version="1" class="patch">
	<metadata>
		<title>libwireshark15-3.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark15-3.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4190">CVE-2021-4190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923011" comment="libwireshark15-3.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923012" comment="libwiretap12-3.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923013" comment="libwsutil13-3.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923014" comment="wireshark-3.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923015" comment="wireshark-devel-3.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923016" comment="wireshark-ui-qt-3.6.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250029" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20220105-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20220105-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923017" comment="cargo-audit-advisory-db-20220105-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250030" version="1" class="patch">
	<metadata>
		<title>cflow-1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16165" ref_url="https://www.suse.com/security/cve/CVE-2019-16165/" source="CVE"/>
		<reference ref_id="CVE-2019-16166" ref_url="https://www.suse.com/security/cve/CVE-2019-16166/" source="CVE"/>
		<description>
These are all security issues fixed in the cflow-1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16165/">CVE-2019-16165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16165">CVE-2019-16165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16166/">CVE-2019-16166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16166">CVE-2019-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923018" comment="cflow-1.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250031" version="1" class="patch">
	<metadata>
		<title>greetd-0.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the greetd-0.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923019" comment="greetd-0.8.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250032" version="1" class="patch">
	<metadata>
		<title>kanidm-1.1.0~alpha7~git0.c8468199-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the kanidm-1.1.0~alpha7~git0.c8468199-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923020" comment="kanidm-1.1.0~alpha7~git0.c8468199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923021" comment="kanidm-clients-1.1.0~alpha7~git0.c8468199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923022" comment="kanidm-docs-1.1.0~alpha7~git0.c8468199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923023" comment="kanidm-server-1.1.0~alpha7~git0.c8468199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923024" comment="kanidm-unixd-clients-1.1.0~alpha7~git0.c8468199-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250033" version="1" class="patch">
	<metadata>
		<title>libIex-3_1-30-3.1.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45942" ref_url="https://www.suse.com/security/cve/CVE-2021-45942/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_1-30-3.1.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45942/">CVE-2021-45942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45942">CVE-2021-45942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923025" comment="libIex-3_1-30-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923026" comment="libIex-3_1-30-32bit-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923027" comment="libIlmThread-3_1-30-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923028" comment="libIlmThread-3_1-30-32bit-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923029" comment="libOpenEXR-3_1-30-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923030" comment="libOpenEXR-3_1-30-32bit-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923031" comment="libOpenEXRCore-3_1-30-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923032" comment="libOpenEXRCore-3_1-30-32bit-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923033" comment="libOpenEXRUtil-3_1-30-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923034" comment="libOpenEXRUtil-3_1-30-32bit-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923035" comment="openexr-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923036" comment="openexr-devel-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923037" comment="openexr-doc-3.1.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250034" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-4.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-4.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923038" comment="python-lxml-doc-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923039" comment="python310-lxml-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923040" comment="python310-lxml-devel-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923041" comment="python38-lxml-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923042" comment="python38-lxml-devel-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923043" comment="python39-lxml-4.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923044" comment="python39-lxml-devel-4.6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250035" version="1" class="patch">
	<metadata>
		<title>rustscan-2.0.1+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the rustscan-2.0.1+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923045" comment="rustscan-2.0.1+0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250036" version="1" class="patch">
	<metadata>
		<title>rustup-1.24.3~git1.0a74fef5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.24.3~git1.0a74fef5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923046" comment="rustup-1.24.3~git1.0a74fef5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250037" version="1" class="patch">
	<metadata>
		<title>sccache-0.2.15~git0.6b6d2f7-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.2.15~git0.6b6d2f7-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923047" comment="sccache-0.2.15~git0.6b6d2f7-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250038" version="1" class="patch">
	<metadata>
		<title>tuigreet-0.7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the tuigreet-0.7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923048" comment="tuigreet-0.7.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250039" version="1" class="patch">
	<metadata>
		<title>jawn-ast-0.14.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21653" ref_url="https://www.suse.com/security/cve/CVE-2022-21653/" source="CVE"/>
		<description>
These are all security issues fixed in the jawn-ast-0.14.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21653/">CVE-2022-21653 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21653">CVE-2022-21653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923049" comment="jawn-ast-0.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923050" comment="jawn-json4s-0.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923051" comment="jawn-parser-0.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923052" comment="jawn-util-0.14.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250040" version="1" class="patch">
	<metadata>
		<title>neomutt-20211029-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32055" ref_url="https://www.suse.com/security/cve/CVE-2021-32055/" source="CVE"/>
		<description>
These are all security issues fixed in the neomutt-20211029-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32055/">CVE-2021-32055 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32055">CVE-2021-32055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923053" comment="neomutt-20211029-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923054" comment="neomutt-doc-20211029-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923055" comment="neomutt-lang-20211029-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250041" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.8.1~git0.cce1b08-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25023" ref_url="https://www.suse.com/security/cve/CVE-2018-25023/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.8.1~git0.cce1b08-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25023/">CVE-2018-25023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25023">CVE-2018-25023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923056" comment="cargo-c-0.8.1~git0.cce1b08-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250042" version="1" class="patch">
	<metadata>
		<title>librav1e0-0.5.1+0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25023" ref_url="https://www.suse.com/security/cve/CVE-2018-25023/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the librav1e0-0.5.1+0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25023/">CVE-2018-25023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25023">CVE-2018-25023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923057" comment="librav1e0-0.5.1+0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923058" comment="librav1e0-32bit-0.5.1+0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923059" comment="rav1e-0.5.1+0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923060" comment="rav1e-devel-0.5.1+0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250043" version="1" class="patch">
	<metadata>
		<title>spotifyd-0.3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the spotifyd-0.3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923061" comment="spotifyd-0.3.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250044" version="1" class="patch">
	<metadata>
		<title>gnuplot-5.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44917" ref_url="https://www.suse.com/security/cve/CVE-2021-44917/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuplot-5.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44917/">CVE-2021-44917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44917">CVE-2021-44917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923062" comment="gnuplot-5.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250045" version="1" class="patch">
	<metadata>
		<title>pcmanfm-1.3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8934" ref_url="https://www.suse.com/security/cve/CVE-2017-8934/" source="CVE"/>
		<description>
These are all security issues fixed in the pcmanfm-1.3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8934/">CVE-2017-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8934">CVE-2017-8934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923063" comment="pcmanfm-1.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923064" comment="pcmanfm-devel-1.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923065" comment="pcmanfm-lang-1.3.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250046" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923066" comment="python310-Django-4.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923067" comment="python38-Django-4.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923068" comment="python39-Django-4.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250047" version="1" class="patch">
	<metadata>
		<title>rke-1.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25742" ref_url="https://www.suse.com/security/cve/CVE-2021-25742/" source="CVE"/>
		<description>
These are all security issues fixed in the rke-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-25742/">CVE-2021-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-25742">CVE-2021-25742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923069" comment="rke-1.3.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250048" version="1" class="patch">
	<metadata>
		<title>liburiparser1-0.9.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46141" ref_url="https://www.suse.com/security/cve/CVE-2021-46141/" source="CVE"/>
		<reference ref_id="CVE-2021-46142" ref_url="https://www.suse.com/security/cve/CVE-2021-46142/" source="CVE"/>
		<description>
These are all security issues fixed in the liburiparser1-0.9.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46141/">CVE-2021-46141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46141">CVE-2021-46141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46142/">CVE-2021-46142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46142">CVE-2021-46142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923070" comment="liburiparser1-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923071" comment="liburiparser1-32bit-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923072" comment="uriparser-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923073" comment="uriparser-devel-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923074" comment="uriparser-doc-0.9.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250049" version="1" class="patch">
	<metadata>
		<title>python3-watchman-1.4.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21944" ref_url="https://www.suse.com/security/cve/CVE-2022-21944/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-watchman-1.4.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21944/">CVE-2022-21944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21944">CVE-2022-21944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923075" comment="python3-watchman-1.4.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923076" comment="watchman-4.9.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250050" version="1" class="patch">
	<metadata>
		<title>zram-generator-1.1.1~git5.8612dbb-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25023" ref_url="https://www.suse.com/security/cve/CVE-2018-25023/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the zram-generator-1.1.1~git5.8612dbb-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25023/">CVE-2018-25023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25023">CVE-2018-25023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923077" comment="zram-generator-1.1.1~git5.8612dbb-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250051" version="1" class="patch">
	<metadata>
		<title>corepack17-17.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack17-17.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44531">CVE-2021-44531 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44532">CVE-2021-44532 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44533">CVE-2021-44533 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21824">CVE-2022-21824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923078" comment="corepack17-17.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923079" comment="nodejs17-17.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923080" comment="nodejs17-devel-17.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923081" comment="nodejs17-docs-17.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923082" comment="npm17-17.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250052" version="1" class="patch">
	<metadata>
		<title>libsystemd0-249.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-249.7-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923083" comment="libsystemd0-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923084" comment="libsystemd0-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923085" comment="libudev-devel-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923086" comment="libudev-devel-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923087" comment="libudev1-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923088" comment="libudev1-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923089" comment="nss-myhostname-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923090" comment="nss-myhostname-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923091" comment="nss-mymachines-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923092" comment="nss-mymachines-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923093" comment="nss-resolve-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923094" comment="nss-systemd-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923095" comment="systemd-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923096" comment="systemd-32bit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923097" comment="systemd-container-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923098" comment="systemd-coredump-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923099" comment="systemd-devel-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923100" comment="systemd-doc-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923101" comment="systemd-experimental-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923102" comment="systemd-journal-remote-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923103" comment="systemd-lang-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923104" comment="systemd-network-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923105" comment="systemd-portable-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923106" comment="systemd-sysvinit-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923107" comment="systemd-testsuite-249.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923108" comment="udev-249.7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250053" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-96.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22736" ref_url="https://www.suse.com/security/cve/CVE-2022-22736/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22749" ref_url="https://www.suse.com/security/cve/CVE-2022-22749/" source="CVE"/>
		<reference ref_id="CVE-2022-22750" ref_url="https://www.suse.com/security/cve/CVE-2022-22750/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="CVE-2022-22752" ref_url="https://www.suse.com/security/cve/CVE-2022-22752/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-96.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22736/">CVE-2022-22736 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22736">CVE-2022-22736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22749/">CVE-2022-22749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22749">CVE-2022-22749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22750/">CVE-2022-22750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22750">CVE-2022-22750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22752/">CVE-2022-22752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22752">CVE-2022-22752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923109" comment="MozillaFirefox-96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923110" comment="MozillaFirefox-branding-upstream-96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923111" comment="MozillaFirefox-devel-96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923112" comment="MozillaFirefox-translations-common-96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923113" comment="MozillaFirefox-translations-other-96.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250054" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923114" comment="MozillaThunderbird-91.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923115" comment="MozillaThunderbird-translations-common-91.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923116" comment="MozillaThunderbird-translations-other-91.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250055" version="1" class="patch">
	<metadata>
		<title>gajim-1.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41055" ref_url="https://www.suse.com/security/cve/CVE-2021-41055/" source="CVE"/>
		<description>
These are all security issues fixed in the gajim-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41055/">CVE-2021-41055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41055">CVE-2021-41055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923117" comment="gajim-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923118" comment="gajim-lang-1.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250056" version="1" class="patch">
	<metadata>
		<title>kubevirt-container-disk-0.49.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-container-disk-0.49.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923119" comment="kubevirt-container-disk-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923120" comment="kubevirt-manifests-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923121" comment="kubevirt-tests-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923122" comment="kubevirt-virt-api-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923123" comment="kubevirt-virt-controller-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923124" comment="kubevirt-virt-handler-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923125" comment="kubevirt-virt-launcher-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923126" comment="kubevirt-virt-operator-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923127" comment="kubevirt-virtctl-0.49.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923128" comment="obs-service-kubevirt_containers_meta-0.49.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250057" version="1" class="patch">
	<metadata>
		<title>prosody-0.11.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0217" ref_url="https://www.suse.com/security/cve/CVE-2022-0217/" source="CVE"/>
		<description>
These are all security issues fixed in the prosody-0.11.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0217/">CVE-2022-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0217">CVE-2022-0217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923129" comment="prosody-0.11.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250058" version="1" class="patch">
	<metadata>
		<title>gvim-8.2.4063-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0156" ref_url="https://www.suse.com/security/cve/CVE-2022-0156/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.2.4063-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0156/">CVE-2022-0156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923130" comment="gvim-8.2.4063-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923131" comment="vim-8.2.4063-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923132" comment="vim-data-8.2.4063-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923133" comment="vim-data-common-8.2.4063-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923134" comment="vim-small-8.2.4063-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250059" version="1" class="patch">
	<metadata>
		<title>busybox-1.35.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.35.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5325">CVE-2011-5325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9261">CVE-2015-9261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2147">CVE-2016-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2148">CVE-2016-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6301">CVE-2016-6301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15873">CVE-2017-15873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15874">CVE-2017-15874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16544">CVE-2017-16544 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000500">CVE-2018-1000500 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000517">CVE-2018-1000517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20679">CVE-2018-20679 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5747">CVE-2019-5747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28831">CVE-2021-28831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42373">CVE-2021-42373 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42377">CVE-2021-42377 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">CVE-2021-42381 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">CVE-2021-42385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923135" comment="busybox-1.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923136" comment="busybox-static-1.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923137" comment="busybox-testsuite-1.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923138" comment="busybox-warewulf3-1.35.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250060" version="1" class="patch">
	<metadata>
		<title>chromedriver-97.0.4692.71-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0096" ref_url="https://www.suse.com/security/cve/CVE-2022-0096/" source="CVE"/>
		<reference ref_id="CVE-2022-0097" ref_url="https://www.suse.com/security/cve/CVE-2022-0097/" source="CVE"/>
		<reference ref_id="CVE-2022-0098" ref_url="https://www.suse.com/security/cve/CVE-2022-0098/" source="CVE"/>
		<reference ref_id="CVE-2022-0099" ref_url="https://www.suse.com/security/cve/CVE-2022-0099/" source="CVE"/>
		<reference ref_id="CVE-2022-0100" ref_url="https://www.suse.com/security/cve/CVE-2022-0100/" source="CVE"/>
		<reference ref_id="CVE-2022-0101" ref_url="https://www.suse.com/security/cve/CVE-2022-0101/" source="CVE"/>
		<reference ref_id="CVE-2022-0102" ref_url="https://www.suse.com/security/cve/CVE-2022-0102/" source="CVE"/>
		<reference ref_id="CVE-2022-0103" ref_url="https://www.suse.com/security/cve/CVE-2022-0103/" source="CVE"/>
		<reference ref_id="CVE-2022-0104" ref_url="https://www.suse.com/security/cve/CVE-2022-0104/" source="CVE"/>
		<reference ref_id="CVE-2022-0105" ref_url="https://www.suse.com/security/cve/CVE-2022-0105/" source="CVE"/>
		<reference ref_id="CVE-2022-0106" ref_url="https://www.suse.com/security/cve/CVE-2022-0106/" source="CVE"/>
		<reference ref_id="CVE-2022-0107" ref_url="https://www.suse.com/security/cve/CVE-2022-0107/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-0109" ref_url="https://www.suse.com/security/cve/CVE-2022-0109/" source="CVE"/>
		<reference ref_id="CVE-2022-0110" ref_url="https://www.suse.com/security/cve/CVE-2022-0110/" source="CVE"/>
		<reference ref_id="CVE-2022-0111" ref_url="https://www.suse.com/security/cve/CVE-2022-0111/" source="CVE"/>
		<reference ref_id="CVE-2022-0112" ref_url="https://www.suse.com/security/cve/CVE-2022-0112/" source="CVE"/>
		<reference ref_id="CVE-2022-0113" ref_url="https://www.suse.com/security/cve/CVE-2022-0113/" source="CVE"/>
		<reference ref_id="CVE-2022-0114" ref_url="https://www.suse.com/security/cve/CVE-2022-0114/" source="CVE"/>
		<reference ref_id="CVE-2022-0115" ref_url="https://www.suse.com/security/cve/CVE-2022-0115/" source="CVE"/>
		<reference ref_id="CVE-2022-0116" ref_url="https://www.suse.com/security/cve/CVE-2022-0116/" source="CVE"/>
		<reference ref_id="CVE-2022-0117" ref_url="https://www.suse.com/security/cve/CVE-2022-0117/" source="CVE"/>
		<reference ref_id="CVE-2022-0118" ref_url="https://www.suse.com/security/cve/CVE-2022-0118/" source="CVE"/>
		<reference ref_id="CVE-2022-0120" ref_url="https://www.suse.com/security/cve/CVE-2022-0120/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-97.0.4692.71-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0096/">CVE-2022-0096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0096">CVE-2022-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0097/">CVE-2022-0097 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0097">CVE-2022-0097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0098/">CVE-2022-0098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0098">CVE-2022-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0099/">CVE-2022-0099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0099">CVE-2022-0099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0100/">CVE-2022-0100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0100">CVE-2022-0100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0101/">CVE-2022-0101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0101">CVE-2022-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0102/">CVE-2022-0102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0102">CVE-2022-0102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0103/">CVE-2022-0103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0103">CVE-2022-0103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0104/">CVE-2022-0104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0104">CVE-2022-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0105/">CVE-2022-0105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0105">CVE-2022-0105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0106/">CVE-2022-0106 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0106">CVE-2022-0106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0107/">CVE-2022-0107 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0107">CVE-2022-0107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0108">CVE-2022-0108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0109/">CVE-2022-0109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0109">CVE-2022-0109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0110/">CVE-2022-0110 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0110">CVE-2022-0110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0111/">CVE-2022-0111 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0111">CVE-2022-0111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0112/">CVE-2022-0112 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0112">CVE-2022-0112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0113/">CVE-2022-0113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0113">CVE-2022-0113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0114/">CVE-2022-0114 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0114">CVE-2022-0114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0115/">CVE-2022-0115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0115">CVE-2022-0115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0116/">CVE-2022-0116 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0116">CVE-2022-0116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0117/">CVE-2022-0117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0117">CVE-2022-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0118/">CVE-2022-0118 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0118">CVE-2022-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0120/">CVE-2022-0120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0120">CVE-2022-0120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923139" comment="chromedriver-97.0.4692.71-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923140" comment="chromium-97.0.4692.71-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250061" version="1" class="patch">
	<metadata>
		<title>flatpak-1.12.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.12.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43860">CVE-2021-43860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923141" comment="flatpak-1.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923142" comment="flatpak-devel-1.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923143" comment="flatpak-zsh-completion-1.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923144" comment="libflatpak0-1.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923145" comment="system-user-flatpak-1.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923146" comment="typelib-1_0-Flatpak-1_0-1.12.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250062" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43579" ref_url="https://www.suse.com/security/cve/CVE-2021-43579/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43579/">CVE-2021-43579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43579">CVE-2021-43579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923147" comment="htmldoc-1.9.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250063" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.2+kde268-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.2+kde268-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13962">CVE-2020-13962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923148" comment="libQt5Bootstrap-devel-static-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923149" comment="libQt5Bootstrap-devel-static-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923150" comment="libQt5Concurrent-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923151" comment="libQt5Concurrent-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923152" comment="libQt5Concurrent5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923153" comment="libQt5Concurrent5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923154" comment="libQt5Core-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923155" comment="libQt5Core-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923156" comment="libQt5Core-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923157" comment="libQt5Core5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923158" comment="libQt5Core5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923159" comment="libQt5DBus-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923160" comment="libQt5DBus-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923161" comment="libQt5DBus-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923162" comment="libQt5DBus5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923163" comment="libQt5DBus5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923164" comment="libQt5Gui-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923165" comment="libQt5Gui-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923166" comment="libQt5Gui-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923167" comment="libQt5Gui5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923168" comment="libQt5Gui5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923169" comment="libQt5KmsSupport-devel-static-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923170" comment="libQt5KmsSupport-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923171" comment="libQt5Network-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923172" comment="libQt5Network-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923173" comment="libQt5Network-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923174" comment="libQt5Network5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923175" comment="libQt5Network5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923176" comment="libQt5OpenGL-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923177" comment="libQt5OpenGL-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923178" comment="libQt5OpenGL-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923179" comment="libQt5OpenGL5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923180" comment="libQt5OpenGL5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923181" comment="libQt5OpenGLExtensions-devel-static-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923182" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923183" comment="libQt5PlatformHeaders-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923184" comment="libQt5PlatformSupport-devel-static-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923185" comment="libQt5PlatformSupport-devel-static-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923186" comment="libQt5PlatformSupport-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923187" comment="libQt5PrintSupport-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923188" comment="libQt5PrintSupport-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923189" comment="libQt5PrintSupport-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923190" comment="libQt5PrintSupport5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923191" comment="libQt5PrintSupport5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923192" comment="libQt5Sql-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923193" comment="libQt5Sql-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923194" comment="libQt5Sql-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923195" comment="libQt5Sql5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923196" comment="libQt5Sql5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923197" comment="libQt5Sql5-mysql-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923198" comment="libQt5Sql5-mysql-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923199" comment="libQt5Sql5-postgresql-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923200" comment="libQt5Sql5-postgresql-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923201" comment="libQt5Sql5-sqlite-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923202" comment="libQt5Sql5-sqlite-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923203" comment="libQt5Sql5-unixODBC-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923204" comment="libQt5Sql5-unixODBC-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923205" comment="libQt5Test-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923206" comment="libQt5Test-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923207" comment="libQt5Test-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923208" comment="libQt5Test5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923209" comment="libQt5Test5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923210" comment="libQt5Widgets-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923211" comment="libQt5Widgets-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923212" comment="libQt5Widgets-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923213" comment="libQt5Widgets5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923214" comment="libQt5Widgets5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923215" comment="libQt5Xml-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923216" comment="libQt5Xml-devel-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923217" comment="libQt5Xml5-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923218" comment="libQt5Xml5-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923219" comment="libqt5-qtbase-common-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923220" comment="libqt5-qtbase-devel-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923221" comment="libqt5-qtbase-examples-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923222" comment="libqt5-qtbase-examples-32bit-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923223" comment="libqt5-qtbase-platformtheme-gtk3-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923224" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.2+kde268-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923225" comment="libqt5-qtbase-private-headers-devel-5.15.2+kde268-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250064" version="1" class="patch">
	<metadata>
		<title>netty-4.1.72-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43797" ref_url="https://www.suse.com/security/cve/CVE-2021-43797/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.72-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43797/">CVE-2021-43797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43797">CVE-2021-43797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923226" comment="netty-4.1.72-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923227" comment="netty-javadoc-4.1.72-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923228" comment="netty-poms-4.1.72-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250065" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.54.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45944" ref_url="https://www.suse.com/security/cve/CVE-2021-45944/" source="CVE"/>
		<reference ref_id="CVE-2021-45949" ref_url="https://www.suse.com/security/cve/CVE-2021-45949/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.54.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45944/">CVE-2021-45944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45944">CVE-2021-45944 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45949/">CVE-2021-45949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45949">CVE-2021-45949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923229" comment="ghostscript-9.54.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923230" comment="ghostscript-devel-9.54.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923231" comment="ghostscript-x11-9.54.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250066" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<reference ref_id="CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005/" source="CVE"/>
		<reference ref_id="CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007/" source="CVE"/>
		<reference ref_id="CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009/" source="CVE"/>
		<reference ref_id="CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010/" source="CVE"/>
		<reference ref_id="CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012/" source="CVE"/>
		<reference ref_id="CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015/" source="CVE"/>
		<reference ref_id="CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017/" source="CVE"/>
		<reference ref_id="CVE-2021-38018" ref_url="https://www.suse.com/security/cve/CVE-2021-38018/" source="CVE"/>
		<reference ref_id="CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019/" source="CVE"/>
		<reference ref_id="CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021/" source="CVE"/>
		<reference ref_id="CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022/" source="CVE"/>
		<reference ref_id="CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057/" source="CVE"/>
		<reference ref_id="CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058/" source="CVE"/>
		<reference ref_id="CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059/" source="CVE"/>
		<reference ref_id="CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062/" source="CVE"/>
		<reference ref_id="CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078/" source="CVE"/>
		<reference ref_id="CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079/" source="CVE"/>
		<reference ref_id="CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098/" source="CVE"/>
		<reference ref_id="CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099/" source="CVE"/>
		<reference ref_id="CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101/" source="CVE"/>
		<reference ref_id="CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37984">CVE-2021-37984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37987">CVE-2021-37987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37989">CVE-2021-37989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37992">CVE-2021-37992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37993">CVE-2021-37993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37996">CVE-2021-37996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38001">CVE-2021-38001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38003">CVE-2021-38003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38005">CVE-2021-38005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38007">CVE-2021-38007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38009">CVE-2021-38009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38010">CVE-2021-38010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38012">CVE-2021-38012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38015">CVE-2021-38015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38017">CVE-2021-38017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38018/">CVE-2021-38018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38018">CVE-2021-38018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38019">CVE-2021-38019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38021">CVE-2021-38021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38022">CVE-2021-38022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4057">CVE-2021-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4058">CVE-2021-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4059">CVE-2021-4059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4062">CVE-2021-4062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4078">CVE-2021-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4079">CVE-2021-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4098">CVE-2021-4098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4099">CVE-2021-4099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4101">CVE-2021-4101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4102">CVE-2021-4102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923232" comment="libQt5Pdf5-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923233" comment="libQt5PdfWidgets5-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923234" comment="libqt5-qtpdf-devel-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923235" comment="libqt5-qtpdf-examples-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923236" comment="libqt5-qtpdf-imports-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923237" comment="libqt5-qtpdf-private-headers-devel-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923238" comment="libqt5-qtwebengine-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923239" comment="libqt5-qtwebengine-devel-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923240" comment="libqt5-qtwebengine-examples-5.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923241" comment="libqt5-qtwebengine-private-headers-devel-5.15.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250067" version="1" class="patch">
	<metadata>
		<title>corepack16-16.13.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.13.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44531">CVE-2021-44531 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44532">CVE-2021-44532 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44533">CVE-2021-44533 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21824">CVE-2022-21824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923242" comment="corepack16-16.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923243" comment="nodejs16-16.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923244" comment="nodejs16-devel-16.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923245" comment="nodejs16-docs-16.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923246" comment="npm16-16.13.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250068" version="1" class="patch">
	<metadata>
		<title>python310-numba-0.55.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-numba-0.55.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923247" comment="python310-numba-0.55.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923248" comment="python310-numba-devel-0.55.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923249" comment="python38-numba-0.55.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923250" comment="python38-numba-devel-0.55.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923251" comment="python39-numba-0.55.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923252" comment="python39-numba-devel-0.55.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250069" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923253" comment="clamav-0.103.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923254" comment="clamav-devel-0.103.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923255" comment="clamav-milter-0.103.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923256" comment="libclamav9-0.103.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923257" comment="libfreshclam2-0.103.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250070" version="1" class="patch">
	<metadata>
		<title>libsubid-devel-4.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<description>
These are all security issues fixed in the libsubid-devel-4.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923258" comment="libsubid-devel-4.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923259" comment="libsubid4-4.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923260" comment="login_defs-4.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923261" comment="shadow-4.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250071" version="1" class="patch">
	<metadata>
		<title>ncat-7.92-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594/" source="CVE"/>
		<description>
These are all security issues fixed in the ncat-7.92-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18594">CVE-2017-18594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923262" comment="ncat-7.92-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923263" comment="nmap-7.92-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923264" comment="nping-7.92-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250072" version="1" class="patch">
	<metadata>
		<title>afterburn-5.0.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35905" ref_url="https://www.suse.com/security/cve/CVE-2020-35905/" source="CVE"/>
		<reference ref_id="CVE-2020-36465" ref_url="https://www.suse.com/security/cve/CVE-2020-36465/" source="CVE"/>
		<reference ref_id="CVE-2021-27378" ref_url="https://www.suse.com/security/cve/CVE-2021-27378/" source="CVE"/>
		<reference ref_id="CVE-2021-32714" ref_url="https://www.suse.com/security/cve/CVE-2021-32714/" source="CVE"/>
		<reference ref_id="CVE-2021-32715" ref_url="https://www.suse.com/security/cve/CVE-2021-32715/" source="CVE"/>
		<reference ref_id="CVE-2021-38191" ref_url="https://www.suse.com/security/cve/CVE-2021-38191/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.0.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35905/">CVE-2020-35905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35905">CVE-2020-35905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36465/">CVE-2020-36465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36465">CVE-2020-36465 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27378/">CVE-2021-27378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27378">CVE-2021-27378 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32714/">CVE-2021-32714 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32714">CVE-2021-32714 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32715/">CVE-2021-32715 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32715">CVE-2021-32715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38191/">CVE-2021-38191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-38191">CVE-2021-38191 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923265" comment="afterburn-5.0.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923266" comment="afterburn-dracut-5.0.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250073" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45450" ref_url="https://www.suse.com/security/cve/CVE-2021-45450/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45450/">CVE-2021-45450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45450">CVE-2021-45450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923267" comment="libmbedcrypto7-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923268" comment="libmbedcrypto7-32bit-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923269" comment="libmbedtls14-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923270" comment="libmbedtls14-32bit-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923271" comment="libmbedx509-1-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923272" comment="libmbedx509-1-32bit-2.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923273" comment="mbedtls-devel-2.28.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250074" version="1" class="patch">
	<metadata>
		<title>libmruby3-3.0.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0080" ref_url="https://www.suse.com/security/cve/CVE-2022-0080/" source="CVE"/>
		<reference ref_id="CVE-2022-0240" ref_url="https://www.suse.com/security/cve/CVE-2022-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3-3.0.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0080/">CVE-2022-0080 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0080">CVE-2022-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0240/">CVE-2022-0240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0240">CVE-2022-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923274" comment="libmruby3-3.0.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923275" comment="mruby-3.0.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923276" comment="mruby-devel-3.0.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250075" version="1" class="patch">
	<metadata>
		<title>cryptsetup-2.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptsetup-2.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923277" comment="cryptsetup-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923278" comment="cryptsetup-lang-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923279" comment="cryptsetup-ssh-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923280" comment="libcryptsetup-devel-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923281" comment="libcryptsetup12-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923282" comment="libcryptsetup12-32bit-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923283" comment="libcryptsetup12-hmac-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923284" comment="libcryptsetup12-hmac-32bit-2.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250076" version="1" class="patch">
	<metadata>
		<title>flatpak-builder-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-builder-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21682">CVE-2022-21682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923285" comment="flatpak-builder-1.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250077" version="1" class="patch">
	<metadata>
		<title>flatpak-1.12.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.12.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21682">CVE-2022-21682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923286" comment="flatpak-1.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923287" comment="flatpak-devel-1.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923288" comment="flatpak-zsh-completion-1.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923289" comment="libflatpak0-1.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923290" comment="system-user-flatpak-1.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923291" comment="typelib-1_0-Flatpak-1_0-1.12.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250078" version="1" class="patch">
	<metadata>
		<title>libcontainers-common-20210626-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the libcontainers-common-20210626-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923292" comment="libcontainers-common-20210626-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250079" version="1" class="patch">
	<metadata>
		<title>libvirt-8.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-8.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923293" comment="libvirt-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923294" comment="libvirt-client-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923295" comment="libvirt-daemon-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923296" comment="libvirt-daemon-config-network-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923297" comment="libvirt-daemon-config-nwfilter-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923298" comment="libvirt-daemon-driver-interface-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923299" comment="libvirt-daemon-driver-libxl-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923300" comment="libvirt-daemon-driver-lxc-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923301" comment="libvirt-daemon-driver-network-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923302" comment="libvirt-daemon-driver-nodedev-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923303" comment="libvirt-daemon-driver-nwfilter-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923304" comment="libvirt-daemon-driver-qemu-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923305" comment="libvirt-daemon-driver-secret-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923306" comment="libvirt-daemon-driver-storage-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923307" comment="libvirt-daemon-driver-storage-core-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923308" comment="libvirt-daemon-driver-storage-disk-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923309" comment="libvirt-daemon-driver-storage-gluster-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923310" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923311" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923312" comment="libvirt-daemon-driver-storage-logical-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923313" comment="libvirt-daemon-driver-storage-mpath-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923314" comment="libvirt-daemon-driver-storage-rbd-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923315" comment="libvirt-daemon-driver-storage-scsi-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923316" comment="libvirt-daemon-hooks-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923317" comment="libvirt-daemon-lxc-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923318" comment="libvirt-daemon-qemu-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923319" comment="libvirt-daemon-xen-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923320" comment="libvirt-devel-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923321" comment="libvirt-devel-32bit-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923322" comment="libvirt-doc-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923323" comment="libvirt-libs-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923324" comment="libvirt-lock-sanlock-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923325" comment="libvirt-nss-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923326" comment="wireshark-plugin-libvirt-8.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250080" version="1" class="patch">
	<metadata>
		<title>log4j12-1.2.17-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j12-1.2.17-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923327" comment="log4j12-1.2.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923328" comment="log4j12-javadoc-1.2.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923329" comment="log4j12-manual-1.2.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923330" comment="logfactor5-1.2.17-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250081" version="1" class="patch">
	<metadata>
		<title>mailman3-3.3.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-34337" ref_url="https://www.suse.com/security/cve/CVE-2021-34337/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman3-3.3.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34337/">CVE-2021-34337 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34337">CVE-2021-34337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923331" comment="mailman3-3.3.5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250082" version="1" class="patch">
	<metadata>
		<title>chromedriver-97.0.4692.99-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0289" ref_url="https://www.suse.com/security/cve/CVE-2022-0289/" source="CVE"/>
		<reference ref_id="CVE-2022-0290" ref_url="https://www.suse.com/security/cve/CVE-2022-0290/" source="CVE"/>
		<reference ref_id="CVE-2022-0291" ref_url="https://www.suse.com/security/cve/CVE-2022-0291/" source="CVE"/>
		<reference ref_id="CVE-2022-0292" ref_url="https://www.suse.com/security/cve/CVE-2022-0292/" source="CVE"/>
		<reference ref_id="CVE-2022-0293" ref_url="https://www.suse.com/security/cve/CVE-2022-0293/" source="CVE"/>
		<reference ref_id="CVE-2022-0294" ref_url="https://www.suse.com/security/cve/CVE-2022-0294/" source="CVE"/>
		<reference ref_id="CVE-2022-0295" ref_url="https://www.suse.com/security/cve/CVE-2022-0295/" source="CVE"/>
		<reference ref_id="CVE-2022-0296" ref_url="https://www.suse.com/security/cve/CVE-2022-0296/" source="CVE"/>
		<reference ref_id="CVE-2022-0297" ref_url="https://www.suse.com/security/cve/CVE-2022-0297/" source="CVE"/>
		<reference ref_id="CVE-2022-0298" ref_url="https://www.suse.com/security/cve/CVE-2022-0298/" source="CVE"/>
		<reference ref_id="CVE-2022-0300" ref_url="https://www.suse.com/security/cve/CVE-2022-0300/" source="CVE"/>
		<reference ref_id="CVE-2022-0301" ref_url="https://www.suse.com/security/cve/CVE-2022-0301/" source="CVE"/>
		<reference ref_id="CVE-2022-0302" ref_url="https://www.suse.com/security/cve/CVE-2022-0302/" source="CVE"/>
		<reference ref_id="CVE-2022-0303" ref_url="https://www.suse.com/security/cve/CVE-2022-0303/" source="CVE"/>
		<reference ref_id="CVE-2022-0304" ref_url="https://www.suse.com/security/cve/CVE-2022-0304/" source="CVE"/>
		<reference ref_id="CVE-2022-0305" ref_url="https://www.suse.com/security/cve/CVE-2022-0305/" source="CVE"/>
		<reference ref_id="CVE-2022-0306" ref_url="https://www.suse.com/security/cve/CVE-2022-0306/" source="CVE"/>
		<reference ref_id="CVE-2022-0307" ref_url="https://www.suse.com/security/cve/CVE-2022-0307/" source="CVE"/>
		<reference ref_id="CVE-2022-0308" ref_url="https://www.suse.com/security/cve/CVE-2022-0308/" source="CVE"/>
		<reference ref_id="CVE-2022-0309" ref_url="https://www.suse.com/security/cve/CVE-2022-0309/" source="CVE"/>
		<reference ref_id="CVE-2022-0310" ref_url="https://www.suse.com/security/cve/CVE-2022-0310/" source="CVE"/>
		<reference ref_id="CVE-2022-0311" ref_url="https://www.suse.com/security/cve/CVE-2022-0311/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-97.0.4692.99-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0289/">CVE-2022-0289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0289">CVE-2022-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0290/">CVE-2022-0290 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0290">CVE-2022-0290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0291/">CVE-2022-0291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0291">CVE-2022-0291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0292/">CVE-2022-0292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0292">CVE-2022-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0293/">CVE-2022-0293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0293">CVE-2022-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0294/">CVE-2022-0294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0294">CVE-2022-0294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0295/">CVE-2022-0295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0295">CVE-2022-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0296/">CVE-2022-0296 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0296">CVE-2022-0296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0297/">CVE-2022-0297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0297">CVE-2022-0297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0298/">CVE-2022-0298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0298">CVE-2022-0298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0300/">CVE-2022-0300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0300">CVE-2022-0300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0301/">CVE-2022-0301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0301">CVE-2022-0301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0302/">CVE-2022-0302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0302">CVE-2022-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0303/">CVE-2022-0303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0303">CVE-2022-0303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0304/">CVE-2022-0304 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0304">CVE-2022-0304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0305/">CVE-2022-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0305">CVE-2022-0305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0306/">CVE-2022-0306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0306">CVE-2022-0306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0307/">CVE-2022-0307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0307">CVE-2022-0307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0308/">CVE-2022-0308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0308">CVE-2022-0308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0309/">CVE-2022-0309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0309">CVE-2022-0309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0310/">CVE-2022-0310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0310">CVE-2022-0310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0311/">CVE-2022-0311 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0311">CVE-2022-0311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923332" comment="chromedriver-97.0.4692.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923333" comment="chromium-97.0.4692.99-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250083" version="1" class="patch">
	<metadata>
		<title>expat-2.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923334" comment="expat-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923335" comment="libexpat-devel-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923336" comment="libexpat-devel-32bit-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923337" comment="libexpat1-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923338" comment="libexpat1-32bit-2.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250084" version="1" class="patch">
	<metadata>
		<title>python310-ipython-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21699" ref_url="https://www.suse.com/security/cve/CVE-2022-21699/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ipython-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21699/">CVE-2022-21699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21699">CVE-2022-21699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923339" comment="python310-ipython-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923340" comment="python38-ipython-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923341" comment="python39-ipython-8.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250085" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.64-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22707" ref_url="https://www.suse.com/security/cve/CVE-2022-22707/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.64-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22707/">CVE-2022-22707 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22707">CVE-2022-22707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923342" comment="lighttpd-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923343" comment="lighttpd-mod_authn_gssapi-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923344" comment="lighttpd-mod_authn_ldap-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923345" comment="lighttpd-mod_authn_pam-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923346" comment="lighttpd-mod_authn_sasl-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923347" comment="lighttpd-mod_magnet-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923348" comment="lighttpd-mod_maxminddb-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923349" comment="lighttpd-mod_rrdtool-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923350" comment="lighttpd-mod_vhostdb_dbi-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923351" comment="lighttpd-mod_vhostdb_ldap-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923352" comment="lighttpd-mod_vhostdb_mysql-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923353" comment="lighttpd-mod_vhostdb_pgsql-1.4.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923354" comment="lighttpd-mod_webdav-1.4.64-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250086" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23807" ref_url="https://www.suse.com/security/cve/CVE-2022-23807/" source="CVE"/>
		<reference ref_id="CVE-2022-23808" ref_url="https://www.suse.com/security/cve/CVE-2022-23808/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23807/">CVE-2022-23807 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23807">CVE-2022-23807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23808/">CVE-2022-23808 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23808">CVE-2022-23808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923355" comment="phpMyAdmin-5.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923356" comment="phpMyAdmin-apache-5.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923357" comment="phpMyAdmin-lang-5.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250087" version="1" class="patch">
	<metadata>
		<title>python38-distributed-2022.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42343" ref_url="https://www.suse.com/security/cve/CVE-2021-42343/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-distributed-2022.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42343/">CVE-2021-42343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42343">CVE-2021-42343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923358" comment="python38-distributed-2022.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923359" comment="python39-distributed-2022.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250088" version="1" class="patch">
	<metadata>
		<title>cargo1.56-1.56.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.56-1.56.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923360" comment="cargo1.56-1.56.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923361" comment="rust1.56-1.56.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250089" version="1" class="patch">
	<metadata>
		<title>cargo1.57-1.57.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.57-1.57.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923362" comment="cargo1.57-1.57.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923363" comment="rust1.57-1.57.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250090" version="1" class="patch">
	<metadata>
		<title>cargo1.58-1.58.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.58-1.58.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923364" comment="cargo1.58-1.58.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923365" comment="rust1.58-1.58.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250091" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer1-0.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer1-0.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0175">CVE-2022-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923366" comment="libvirglrenderer1-0.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923367" comment="virglrenderer-devel-0.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923368" comment="virglrenderer-test-server-0.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250092" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-6.1.32-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21394" ref_url="https://www.suse.com/security/cve/CVE-2022-21394/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-6.1.32-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21394/">CVE-2022-21394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21394">CVE-2022-21394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923369" comment="python3-virtualbox-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923370" comment="virtualbox-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923371" comment="virtualbox-devel-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923372" comment="virtualbox-guest-desktop-icons-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923373" comment="virtualbox-guest-source-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923374" comment="virtualbox-guest-tools-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923375" comment="virtualbox-guest-x11-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923376" comment="virtualbox-host-source-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923377" comment="virtualbox-qt-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923378" comment="virtualbox-vnc-6.1.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923379" comment="virtualbox-websrv-6.1.32-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250093" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-4.0.37-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23134" ref_url="https://www.suse.com/security/cve/CVE-2022-23134/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-4.0.37-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23134/">CVE-2022-23134 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23134">CVE-2022-23134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923380" comment="zabbix-agent-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923381" comment="zabbix-java-gateway-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923382" comment="zabbix-phpfrontend-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923383" comment="zabbix-proxy-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923384" comment="zabbix-proxy-mysql-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923385" comment="zabbix-proxy-postgresql-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923386" comment="zabbix-proxy-sqlite-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923387" comment="zabbix-server-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923388" comment="zabbix-server-mysql-4.0.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923389" comment="zabbix-server-postgresql-4.0.37-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250094" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.50-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20176" ref_url="https://www.suse.com/security/cve/CVE-2019-20176/" source="CVE"/>
		<reference ref_id="CVE-2020-9274" ref_url="https://www.suse.com/security/cve/CVE-2020-9274/" source="CVE"/>
		<reference ref_id="CVE-2020-9365" ref_url="https://www.suse.com/security/cve/CVE-2020-9365/" source="CVE"/>
		<reference ref_id="CVE-2021-40524" ref_url="https://www.suse.com/security/cve/CVE-2021-40524/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.50-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-20176/">CVE-2019-20176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20176">CVE-2019-20176 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9274/">CVE-2020-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9274">CVE-2020-9274 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9365/">CVE-2020-9365 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9365">CVE-2020-9365 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-40524/">CVE-2021-40524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40524">CVE-2021-40524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923390" comment="pure-ftpd-1.0.50-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250095" version="1" class="patch">
	<metadata>
		<title>usbview-3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23220" ref_url="https://www.suse.com/security/cve/CVE-2022-23220/" source="CVE"/>
		<description>
These are all security issues fixed in the usbview-3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23220/">CVE-2022-23220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23220">CVE-2022-23220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923391" comment="usbview-3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250096" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.16.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.16.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923393" comment="kernel-macros-5.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923394" comment="kernel-source-5.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923395" comment="kernel-source-vanilla-5.16.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250097" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.18.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.18.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923396" comment="gstreamer-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923397" comment="gstreamer-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923398" comment="gstreamer-devel-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923399" comment="gstreamer-devel-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923400" comment="gstreamer-lang-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923401" comment="gstreamer-utils-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923402" comment="libgstreamer-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923403" comment="libgstreamer-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923404" comment="typelib-1_0-Gst-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923405" comment="typelib-1_0-Gst-1_0-32bit-1.18.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250098" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.18.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.18.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923406" comment="gstreamer-plugins-base-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923407" comment="gstreamer-plugins-base-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923408" comment="gstreamer-plugins-base-devel-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923409" comment="gstreamer-plugins-base-devel-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923410" comment="gstreamer-plugins-base-lang-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923411" comment="libgstallocators-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923412" comment="libgstallocators-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923413" comment="libgstapp-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923414" comment="libgstapp-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923415" comment="libgstaudio-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923416" comment="libgstaudio-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923417" comment="libgstfft-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923418" comment="libgstfft-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923419" comment="libgstgl-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923420" comment="libgstgl-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923421" comment="libgstpbutils-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923422" comment="libgstpbutils-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923423" comment="libgstriff-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923424" comment="libgstriff-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923425" comment="libgstrtp-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923426" comment="libgstrtp-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923427" comment="libgstrtsp-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923428" comment="libgstrtsp-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923429" comment="libgstsdp-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923430" comment="libgstsdp-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923431" comment="libgsttag-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923432" comment="libgsttag-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923433" comment="libgstvideo-1_0-0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923434" comment="libgstvideo-1_0-0-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923435" comment="typelib-1_0-GstAllocators-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923436" comment="typelib-1_0-GstApp-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923437" comment="typelib-1_0-GstAudio-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923438" comment="typelib-1_0-GstGL-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923439" comment="typelib-1_0-GstGLEGL-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923440" comment="typelib-1_0-GstGLWayland-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923441" comment="typelib-1_0-GstGLX11-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923442" comment="typelib-1_0-GstPbutils-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923443" comment="typelib-1_0-GstRtp-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923444" comment="typelib-1_0-GstRtsp-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923445" comment="typelib-1_0-GstSdp-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923446" comment="typelib-1_0-GstTag-1_0-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923447" comment="typelib-1_0-GstVideo-1_0-1.18.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250099" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.18.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<reference ref_id="CVE-2021-3498" ref_url="https://www.suse.com/security/cve/CVE-2021-3498/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.18.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3497">CVE-2021-3497 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3498/">CVE-2021-3498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3498">CVE-2021-3498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923448" comment="gstreamer-plugins-good-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923449" comment="gstreamer-plugins-good-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923450" comment="gstreamer-plugins-good-extra-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923451" comment="gstreamer-plugins-good-extra-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923452" comment="gstreamer-plugins-good-gtk-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923453" comment="gstreamer-plugins-good-jack-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923454" comment="gstreamer-plugins-good-jack-32bit-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923455" comment="gstreamer-plugins-good-lang-1.18.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923456" comment="gstreamer-plugins-good-qtqml-1.18.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250100" version="1" class="patch">
	<metadata>
		<title>isync-1.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3657" ref_url="https://www.suse.com/security/cve/CVE-2021-3657/" source="CVE"/>
		<reference ref_id="CVE-2021-44143" ref_url="https://www.suse.com/security/cve/CVE-2021-44143/" source="CVE"/>
		<description>
These are all security issues fixed in the isync-1.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3657/">CVE-2021-3657 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3657">CVE-2021-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44143/">CVE-2021-44143 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44143">CVE-2021-44143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923457" comment="isync-1.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250101" version="1" class="patch">
	<metadata>
		<title>libpolkit-agent-1-0-0.120-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit-agent-1-0-0.120-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923458" comment="libpolkit-agent-1-0-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923459" comment="libpolkit-agent-1-0-32bit-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923460" comment="libpolkit-gobject-1-0-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923461" comment="libpolkit-gobject-1-0-32bit-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923462" comment="polkit-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923463" comment="polkit-devel-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923464" comment="polkit-doc-0.120-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923465" comment="typelib-1_0-Polkit-1_0-0.120-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250102" version="1" class="patch">
	<metadata>
		<title>xen-4.16.0_04-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.16.0_04-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23033">CVE-2022-23033 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923466" comment="xen-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923467" comment="xen-devel-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923468" comment="xen-doc-html-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923469" comment="xen-libs-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923470" comment="xen-libs-32bit-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923471" comment="xen-tools-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923472" comment="xen-tools-domU-4.16.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923473" comment="xen-tools-xendomains-wait-disk-4.16.0_04-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250103" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.18.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.18.5-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923474" comment="gstreamer-plugins-bad-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923475" comment="gstreamer-plugins-bad-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923476" comment="gstreamer-plugins-bad-chromaprint-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923477" comment="gstreamer-plugins-bad-chromaprint-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923478" comment="gstreamer-plugins-bad-devel-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923479" comment="gstreamer-plugins-bad-fluidsynth-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923480" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923481" comment="gstreamer-plugins-bad-lang-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923482" comment="gstreamer-transcoder-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923483" comment="gstreamer-transcoder-devel-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923484" comment="libgstadaptivedemux-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923485" comment="libgstadaptivedemux-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923486" comment="libgstbadaudio-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923487" comment="libgstbadaudio-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923488" comment="libgstbasecamerabinsrc-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923489" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923490" comment="libgstcodecparsers-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923491" comment="libgstcodecparsers-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923492" comment="libgstcodecs-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923493" comment="libgstcodecs-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923494" comment="libgstinsertbin-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923495" comment="libgstinsertbin-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923496" comment="libgstisoff-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923497" comment="libgstisoff-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923498" comment="libgstmpegts-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923499" comment="libgstmpegts-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923500" comment="libgstphotography-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923501" comment="libgstphotography-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923502" comment="libgstplayer-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923503" comment="libgstplayer-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923504" comment="libgstsctp-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923505" comment="libgstsctp-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923506" comment="libgsttranscoder-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923507" comment="libgsturidownloader-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923508" comment="libgsturidownloader-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923509" comment="libgstvulkan-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923510" comment="libgstvulkan-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923511" comment="libgstwayland-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923512" comment="libgstwayland-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923513" comment="libgstwebrtc-1_0-0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923514" comment="libgstwebrtc-1_0-0-32bit-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923515" comment="typelib-1_0-GstBadAudio-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923516" comment="typelib-1_0-GstCodecs-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923517" comment="typelib-1_0-GstInsertBin-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923518" comment="typelib-1_0-GstMpegts-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923519" comment="typelib-1_0-GstPlayer-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923520" comment="typelib-1_0-GstTranscoder-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923521" comment="typelib-1_0-GstVulkan-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923522" comment="typelib-1_0-GstVulkanWayland-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923523" comment="typelib-1_0-GstVulkanXCB-1_0-1.18.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923524" comment="typelib-1_0-GstWebRTC-1_0-1.18.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250104" version="1" class="patch">
	<metadata>
		<title>perl-App-cpanminus-1.7045-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-16154" ref_url="https://www.suse.com/security/cve/CVE-2020-16154/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-App-cpanminus-1.7045-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16154/">CVE-2020-16154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16154">CVE-2020-16154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923525" comment="perl-App-cpanminus-1.7045-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250105" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.37.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3995" ref_url="https://www.suse.com/security/cve/CVE-2021-3995/" source="CVE"/>
		<reference ref_id="CVE-2021-3996" ref_url="https://www.suse.com/security/cve/CVE-2021-3996/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.37.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3995/">CVE-2021-3995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3996/">CVE-2021-3996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923526" comment="libblkid-devel-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923527" comment="libblkid-devel-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923528" comment="libblkid-devel-static-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923529" comment="libblkid1-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923530" comment="libblkid1-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923531" comment="libfdisk-devel-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923532" comment="libfdisk-devel-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923533" comment="libfdisk-devel-static-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923534" comment="libfdisk1-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923535" comment="libfdisk1-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923536" comment="libmount-devel-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923537" comment="libmount-devel-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923538" comment="libmount-devel-static-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923539" comment="libmount1-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923540" comment="libmount1-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923541" comment="libsmartcols-devel-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923542" comment="libsmartcols-devel-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923543" comment="libsmartcols-devel-static-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923544" comment="libsmartcols1-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923545" comment="libsmartcols1-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923546" comment="libuuid-devel-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923547" comment="libuuid-devel-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923548" comment="libuuid-devel-static-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923549" comment="libuuid1-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923550" comment="libuuid1-32bit-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923551" comment="util-linux-2.37.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923552" comment="util-linux-lang-2.37.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250106" version="1" class="patch">
	<metadata>
		<title>keylime-agent-6.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43310" ref_url="https://www.suse.com/security/cve/CVE-2021-43310/" source="CVE"/>
		<reference ref_id="CVE-2022-23948" ref_url="https://www.suse.com/security/cve/CVE-2022-23948/" source="CVE"/>
		<reference ref_id="CVE-2022-23949" ref_url="https://www.suse.com/security/cve/CVE-2022-23949/" source="CVE"/>
		<reference ref_id="CVE-2022-23950" ref_url="https://www.suse.com/security/cve/CVE-2022-23950/" source="CVE"/>
		<reference ref_id="CVE-2022-23951" ref_url="https://www.suse.com/security/cve/CVE-2022-23951/" source="CVE"/>
		<reference ref_id="CVE-2022-23952" ref_url="https://www.suse.com/security/cve/CVE-2022-23952/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-agent-6.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43310/">CVE-2021-43310 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43310">CVE-2021-43310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23948/">CVE-2022-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23948">CVE-2022-23948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23949/">CVE-2022-23949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23949">CVE-2022-23949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23950/">CVE-2022-23950 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23950">CVE-2022-23950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23951/">CVE-2022-23951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23951">CVE-2022-23951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23952/">CVE-2022-23952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23952">CVE-2022-23952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923553" comment="keylime-agent-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923554" comment="keylime-config-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923555" comment="keylime-firewalld-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923556" comment="keylime-registrar-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923557" comment="keylime-tpm_cert_store-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923558" comment="keylime-verifier-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923559" comment="python310-keylime-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923560" comment="python38-keylime-6.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923561" comment="python39-keylime-6.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250107" version="1" class="patch">
	<metadata>
		<title>libruby3_1-3_1-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_1-3_1-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923562" comment="libruby3_1-3_1-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923563" comment="ruby3.1-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923564" comment="ruby3.1-devel-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923565" comment="ruby3.1-devel-extra-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923566" comment="ruby3.1-doc-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923567" comment="ruby3.1-doc-ri-3.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250108" version="1" class="patch">
	<metadata>
		<title>libsphinxclient-0_0_1-2.2.11-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29050" ref_url="https://www.suse.com/security/cve/CVE-2020-29050/" source="CVE"/>
		<description>
These are all security issues fixed in the libsphinxclient-0_0_1-2.2.11-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-29050/">CVE-2020-29050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29050">CVE-2020-29050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923568" comment="libsphinxclient-0_0_1-2.2.11-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923569" comment="libsphinxclient-devel-2.2.11-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923570" comment="sphinx-2.2.11-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250109" version="1" class="patch">
	<metadata>
		<title>gegl-0.4.34-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0.4.34-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45463">CVE-2021-45463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923571" comment="gegl-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923572" comment="gegl-0_4-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923573" comment="gegl-0_4-lang-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923574" comment="gegl-devel-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923575" comment="gegl-doc-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923576" comment="libgegl-0_4-0-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923577" comment="libgegl-0_4-0-32bit-0.4.34-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923578" comment="typelib-1_0-Gegl-0_4-0.4.34-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250110" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.9.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23597" ref_url="https://www.suse.com/security/cve/CVE-2022-23597/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.9.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23597/">CVE-2022-23597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23597">CVE-2022-23597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923579" comment="element-desktop-1.9.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250111" version="1" class="patch">
	<metadata>
		<title>element-web-1.9.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23597" ref_url="https://www.suse.com/security/cve/CVE-2022-23597/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.9.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23597/">CVE-2022-23597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23597">CVE-2022-23597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923580" comment="element-web-1.9.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250112" version="1" class="patch">
	<metadata>
		<title>python310-sentry-sdk-1.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44420" ref_url="https://www.suse.com/security/cve/CVE-2021-44420/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-sentry-sdk-1.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44420/">CVE-2021-44420 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44420">CVE-2021-44420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923581" comment="python310-sentry-sdk-1.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923582" comment="python38-sentry-sdk-1.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923583" comment="python39-sentry-sdk-1.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250113" version="1" class="patch">
	<metadata>
		<title>connman-1.41-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23097" ref_url="https://www.suse.com/security/cve/CVE-2022-23097/" source="CVE"/>
		<reference ref_id="CVE-2022-23098" ref_url="https://www.suse.com/security/cve/CVE-2022-23098/" source="CVE"/>
		<description>
These are all security issues fixed in the connman-1.41-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23097/">CVE-2022-23097 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23097">CVE-2022-23097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23098/">CVE-2022-23098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23098">CVE-2022-23098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923584" comment="connman-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923585" comment="connman-client-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923586" comment="connman-devel-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923587" comment="connman-doc-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923588" comment="connman-nmcompat-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923589" comment="connman-plugin-hh2serial-gps-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923590" comment="connman-plugin-iospm-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923591" comment="connman-plugin-l2tp-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923592" comment="connman-plugin-openconnect-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923593" comment="connman-plugin-openvpn-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923594" comment="connman-plugin-polkit-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923595" comment="connman-plugin-pptp-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923596" comment="connman-plugin-tist-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923597" comment="connman-plugin-vpnc-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923598" comment="connman-plugin-wireguard-1.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923599" comment="connman-test-1.41-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250114" version="1" class="patch">
	<metadata>
		<title>expat-2.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923600" comment="expat-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923601" comment="libexpat-devel-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923602" comment="libexpat-devel-32bit-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923603" comment="libexpat1-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923604" comment="libexpat1-32bit-2.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250115" version="1" class="patch">
	<metadata>
		<title>exiftool-12.39-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23935" ref_url="https://www.suse.com/security/cve/CVE-2022-23935/" source="CVE"/>
		<description>
These are all security issues fixed in the exiftool-12.39-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23935/">CVE-2022-23935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23935">CVE-2022-23935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923605" comment="exiftool-12.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923606" comment="perl-File-RandomAccess-12.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923607" comment="perl-Image-ExifTool-12.39-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250116" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-fluentd-1.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41186" ref_url="https://www.suse.com/security/cve/CVE-2021-41186/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-fluentd-1.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41186/">CVE-2021-41186 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41186">CVE-2021-41186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923608" comment="ruby3.1-rubygem-fluentd-1.14.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250117" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.16.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.16.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923610" comment="kernel-macros-5.16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923611" comment="kernel-source-5.16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923612" comment="kernel-source-vanilla-5.16.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250118" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2021-4044" ref_url="https://www.suse.com/security/cve/CVE-2021-4044/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4044/">CVE-2021-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923613" comment="libopenssl-3-devel-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923614" comment="libopenssl-3-devel-32bit-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923615" comment="libopenssl3-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923616" comment="libopenssl3-32bit-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923617" comment="openssl-3-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923618" comment="openssl-3-doc-3.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250119" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923619" comment="java-11-openjdk-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923620" comment="java-11-openjdk-accessibility-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923621" comment="java-11-openjdk-demo-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923622" comment="java-11-openjdk-devel-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923623" comment="java-11-openjdk-headless-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923624" comment="java-11-openjdk-javadoc-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923625" comment="java-11-openjdk-jmods-11.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923626" comment="java-11-openjdk-src-11.0.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250120" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923627" comment="java-15-openjdk-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923628" comment="java-15-openjdk-accessibility-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923629" comment="java-15-openjdk-demo-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923630" comment="java-15-openjdk-devel-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923631" comment="java-15-openjdk-headless-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923632" comment="java-15-openjdk-javadoc-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923633" comment="java-15-openjdk-jmods-15.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923634" comment="java-15-openjdk-src-15.0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250121" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923635" comment="java-17-openjdk-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923636" comment="java-17-openjdk-accessibility-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923637" comment="java-17-openjdk-demo-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923638" comment="java-17-openjdk-devel-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923639" comment="java-17-openjdk-headless-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923640" comment="java-17-openjdk-javadoc-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923641" comment="java-17-openjdk-jmods-17.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923642" comment="java-17-openjdk-src-17.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250122" version="1" class="patch">
	<metadata>
		<title>kate-21.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<description>
These are all security issues fixed in the kate-21.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23853">CVE-2022-23853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923643" comment="kate-21.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923644" comment="kate-lang-21.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923645" comment="kate-plugins-21.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923646" comment="kwrite-21.12.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250123" version="1" class="patch">
	<metadata>
		<title>ldns-1.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-19860" ref_url="https://www.suse.com/security/cve/CVE-2020-19860/" source="CVE"/>
		<reference ref_id="CVE-2020-19861" ref_url="https://www.suse.com/security/cve/CVE-2020-19861/" source="CVE"/>
		<description>
These are all security issues fixed in the ldns-1.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19860/">CVE-2020-19860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19860">CVE-2020-19860 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-19861/">CVE-2020-19861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19861">CVE-2020-19861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923647" comment="ldns-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923648" comment="ldns-devel-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923649" comment="libldns3-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923650" comment="perl-DNS-LDNS-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923651" comment="python3-ldns-1.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250124" version="1" class="patch">
	<metadata>
		<title>glade-catalog-libgda-6.0.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-39359" ref_url="https://www.suse.com/security/cve/CVE-2021-39359/" source="CVE"/>
		<description>
These are all security issues fixed in the glade-catalog-libgda-6.0.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39359/">CVE-2021-39359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39359">CVE-2021-39359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923652" comment="glade-catalog-libgda-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923653" comment="libgda-6_0-6_0_0-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923654" comment="libgda-6_0-6_0_0-lang-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923655" comment="libgda-6_0-devel-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923656" comment="libgda-6_0-doc-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923657" comment="libgda-6_0-ldap-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923658" comment="libgda-6_0-mysql-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923659" comment="libgda-6_0-postgres-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923660" comment="libgda-6_0-sqlcipher-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923661" comment="libgda-6_0-sqlite-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923662" comment="libgda-6_0-tools-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923663" comment="libgda-report-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923664" comment="libgda-report-6_0-6_0_0-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923665" comment="libgda-ui-6_0-6_0_0-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923666" comment="libgda-ui-6_0-plugins-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923667" comment="libgda-ui-6_0-tools-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923668" comment="libgda-xslt-6_0-6_0_0-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923669" comment="typelib-1_0-Gda-6_0-6.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923670" comment="typelib-1_0-Gdaui-6_0-6.0.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250125" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923671" comment="python310-Django-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923672" comment="python38-Django-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923673" comment="python39-Django-4.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250126" version="1" class="patch">
	<metadata>
		<title>python310-scikit-learn-1.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28975" ref_url="https://www.suse.com/security/cve/CVE-2020-28975/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-scikit-learn-1.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28975/">CVE-2020-28975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28975">CVE-2020-28975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923674" comment="python310-scikit-learn-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923675" comment="python38-scikit-learn-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923676" comment="python39-scikit-learn-1.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250127" version="1" class="patch">
	<metadata>
		<title>python310-treq-22.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23607" ref_url="https://www.suse.com/security/cve/CVE-2022-23607/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-treq-22.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23607/">CVE-2022-23607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23607">CVE-2022-23607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923677" comment="python310-treq-22.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923678" comment="python38-treq-22.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923679" comment="python39-treq-22.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250128" version="1" class="patch">
	<metadata>
		<title>ctdb-4.15.5+git.328.f1f29505d84-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44141" ref_url="https://www.suse.com/security/cve/CVE-2021-44141/" source="CVE"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="CVE-2022-0336" ref_url="https://www.suse.com/security/cve/CVE-2022-0336/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.15.5+git.328.f1f29505d84-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44141/">CVE-2021-44141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44141">CVE-2021-44141 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0336/">CVE-2022-0336 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0336">CVE-2022-0336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923680" comment="ctdb-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923681" comment="ctdb-pcp-pmda-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923682" comment="libsamba-policy-devel-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923683" comment="libsamba-policy-python3-devel-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923684" comment="libsamba-policy0-python3-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923685" comment="libsamba-policy0-python3-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923686" comment="samba-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923687" comment="samba-ad-dc-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923688" comment="samba-ad-dc-libs-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923689" comment="samba-ad-dc-libs-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923690" comment="samba-ceph-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923691" comment="samba-client-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923692" comment="samba-client-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923693" comment="samba-client-libs-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923694" comment="samba-client-libs-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923695" comment="samba-devel-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923696" comment="samba-devel-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923697" comment="samba-doc-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923698" comment="samba-dsdb-modules-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923699" comment="samba-gpupdate-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923700" comment="samba-ldb-ldap-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923701" comment="samba-libs-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923702" comment="samba-libs-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923703" comment="samba-libs-python3-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923704" comment="samba-libs-python3-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923705" comment="samba-python3-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923706" comment="samba-test-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923707" comment="samba-tool-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923708" comment="samba-winbind-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923709" comment="samba-winbind-libs-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923710" comment="samba-winbind-libs-32bit-4.15.5+git.328.f1f29505d84-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250129" version="1" class="patch">
	<metadata>
		<title>strongswan-5.9.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.9.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923711" comment="strongswan-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923712" comment="strongswan-doc-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923713" comment="strongswan-hmac-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923714" comment="strongswan-ipsec-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923715" comment="strongswan-libs0-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923716" comment="strongswan-mysql-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923717" comment="strongswan-nm-5.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923718" comment="strongswan-sqlite-5.9.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250130" version="1" class="patch">
	<metadata>
		<title>xstream-1.4.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43859" ref_url="https://www.suse.com/security/cve/CVE-2021-43859/" source="CVE"/>
		<description>
These are all security issues fixed in the xstream-1.4.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43859/">CVE-2021-43859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43859">CVE-2021-43859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923719" comment="xstream-1.4.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923720" comment="xstream-benchmark-1.4.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923721" comment="xstream-javadoc-1.4.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923722" comment="xstream-parent-1.4.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250131" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923723" comment="java-13-openjdk-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923724" comment="java-13-openjdk-accessibility-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923725" comment="java-13-openjdk-demo-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923726" comment="java-13-openjdk-devel-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923727" comment="java-13-openjdk-headless-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923728" comment="java-13-openjdk-javadoc-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923729" comment="java-13-openjdk-jmods-13.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923730" comment="java-13-openjdk-src-13.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250132" version="1" class="patch">
	<metadata>
		<title>chromedriver-98.0.4758.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0452" ref_url="https://www.suse.com/security/cve/CVE-2022-0452/" source="CVE"/>
		<reference ref_id="CVE-2022-0453" ref_url="https://www.suse.com/security/cve/CVE-2022-0453/" source="CVE"/>
		<reference ref_id="CVE-2022-0454" ref_url="https://www.suse.com/security/cve/CVE-2022-0454/" source="CVE"/>
		<reference ref_id="CVE-2022-0455" ref_url="https://www.suse.com/security/cve/CVE-2022-0455/" source="CVE"/>
		<reference ref_id="CVE-2022-0456" ref_url="https://www.suse.com/security/cve/CVE-2022-0456/" source="CVE"/>
		<reference ref_id="CVE-2022-0457" ref_url="https://www.suse.com/security/cve/CVE-2022-0457/" source="CVE"/>
		<reference ref_id="CVE-2022-0459" ref_url="https://www.suse.com/security/cve/CVE-2022-0459/" source="CVE"/>
		<reference ref_id="CVE-2022-0460" ref_url="https://www.suse.com/security/cve/CVE-2022-0460/" source="CVE"/>
		<reference ref_id="CVE-2022-0461" ref_url="https://www.suse.com/security/cve/CVE-2022-0461/" source="CVE"/>
		<reference ref_id="CVE-2022-0462" ref_url="https://www.suse.com/security/cve/CVE-2022-0462/" source="CVE"/>
		<reference ref_id="CVE-2022-0463" ref_url="https://www.suse.com/security/cve/CVE-2022-0463/" source="CVE"/>
		<reference ref_id="CVE-2022-0464" ref_url="https://www.suse.com/security/cve/CVE-2022-0464/" source="CVE"/>
		<reference ref_id="CVE-2022-0465" ref_url="https://www.suse.com/security/cve/CVE-2022-0465/" source="CVE"/>
		<reference ref_id="CVE-2022-0466" ref_url="https://www.suse.com/security/cve/CVE-2022-0466/" source="CVE"/>
		<reference ref_id="CVE-2022-0467" ref_url="https://www.suse.com/security/cve/CVE-2022-0467/" source="CVE"/>
		<reference ref_id="CVE-2022-0468" ref_url="https://www.suse.com/security/cve/CVE-2022-0468/" source="CVE"/>
		<reference ref_id="CVE-2022-0469" ref_url="https://www.suse.com/security/cve/CVE-2022-0469/" source="CVE"/>
		<reference ref_id="CVE-2022-0470" ref_url="https://www.suse.com/security/cve/CVE-2022-0470/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-98.0.4758.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0452/">CVE-2022-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0452">CVE-2022-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0453/">CVE-2022-0453 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0453">CVE-2022-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0454/">CVE-2022-0454 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0454">CVE-2022-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0455/">CVE-2022-0455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0455">CVE-2022-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0456/">CVE-2022-0456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0456">CVE-2022-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0457/">CVE-2022-0457 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0457">CVE-2022-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0459/">CVE-2022-0459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0459">CVE-2022-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0460/">CVE-2022-0460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0460">CVE-2022-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0461/">CVE-2022-0461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0461">CVE-2022-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0462/">CVE-2022-0462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0462">CVE-2022-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0463/">CVE-2022-0463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0463">CVE-2022-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0464/">CVE-2022-0464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0464">CVE-2022-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0465/">CVE-2022-0465 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0465">CVE-2022-0465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0466/">CVE-2022-0466 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0466">CVE-2022-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0467/">CVE-2022-0467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0467">CVE-2022-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0468/">CVE-2022-0468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0468">CVE-2022-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0469/">CVE-2022-0469 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0469">CVE-2022-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0470/">CVE-2022-0470 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0470">CVE-2022-0470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923731" comment="chromedriver-98.0.4758.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923732" comment="chromium-98.0.4758.80-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250133" version="1" class="patch">
	<metadata>
		<title>gvim-8.2.4286-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0393" ref_url="https://www.suse.com/security/cve/CVE-2022-0393/" source="CVE"/>
		<reference ref_id="CVE-2022-0417" ref_url="https://www.suse.com/security/cve/CVE-2022-0417/" source="CVE"/>
		<reference ref_id="CVE-2022-0443" ref_url="https://www.suse.com/security/cve/CVE-2022-0443/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.2.4286-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0393/">CVE-2022-0393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0417/">CVE-2022-0417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0443/">CVE-2022-0443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923733" comment="gvim-8.2.4286-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923734" comment="vim-8.2.4286-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923735" comment="vim-data-8.2.4286-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923736" comment="vim-data-common-8.2.4286-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923737" comment="vim-small-8.2.4286-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250134" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23853">CVE-2022-23853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923738" comment="libQt5Bootstrap-devel-static-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923739" comment="libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923740" comment="libQt5Concurrent-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923741" comment="libQt5Concurrent-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923742" comment="libQt5Concurrent5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923743" comment="libQt5Concurrent5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923744" comment="libQt5Core-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923745" comment="libQt5Core-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923746" comment="libQt5Core-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923747" comment="libQt5Core5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923748" comment="libQt5Core5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923749" comment="libQt5DBus-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923750" comment="libQt5DBus-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923751" comment="libQt5DBus-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923752" comment="libQt5DBus5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923753" comment="libQt5DBus5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923754" comment="libQt5Gui-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923755" comment="libQt5Gui-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923756" comment="libQt5Gui-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923757" comment="libQt5Gui5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923758" comment="libQt5Gui5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923759" comment="libQt5KmsSupport-devel-static-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923760" comment="libQt5KmsSupport-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923761" comment="libQt5Network-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923762" comment="libQt5Network-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923763" comment="libQt5Network-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923764" comment="libQt5Network5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923765" comment="libQt5Network5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923766" comment="libQt5OpenGL-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923767" comment="libQt5OpenGL-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923768" comment="libQt5OpenGL-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923769" comment="libQt5OpenGL5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923770" comment="libQt5OpenGL5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923771" comment="libQt5OpenGLExtensions-devel-static-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923772" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923773" comment="libQt5PlatformHeaders-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923774" comment="libQt5PlatformSupport-devel-static-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923775" comment="libQt5PlatformSupport-devel-static-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923776" comment="libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923777" comment="libQt5PrintSupport-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923778" comment="libQt5PrintSupport-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923779" comment="libQt5PrintSupport-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923780" comment="libQt5PrintSupport5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923781" comment="libQt5PrintSupport5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923782" comment="libQt5Sql-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923783" comment="libQt5Sql-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923784" comment="libQt5Sql-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923785" comment="libQt5Sql5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923786" comment="libQt5Sql5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923787" comment="libQt5Sql5-mysql-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923788" comment="libQt5Sql5-mysql-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923789" comment="libQt5Sql5-postgresql-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923790" comment="libQt5Sql5-postgresql-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923791" comment="libQt5Sql5-sqlite-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923792" comment="libQt5Sql5-sqlite-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923793" comment="libQt5Sql5-unixODBC-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923794" comment="libQt5Sql5-unixODBC-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923795" comment="libQt5Test-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923796" comment="libQt5Test-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923797" comment="libQt5Test-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923798" comment="libQt5Test5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923799" comment="libQt5Test5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923800" comment="libQt5Widgets-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923801" comment="libQt5Widgets-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923802" comment="libQt5Widgets-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923803" comment="libQt5Widgets5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923804" comment="libQt5Widgets5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923805" comment="libQt5Xml-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923806" comment="libQt5Xml-devel-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923807" comment="libQt5Xml5-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923808" comment="libQt5Xml5-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923809" comment="libqt5-qtbase-common-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923810" comment="libqt5-qtbase-devel-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923811" comment="libqt5-qtbase-examples-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923812" comment="libqt5-qtbase-examples-32bit-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923813" comment="libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923814" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.2+kde294-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923815" comment="libqt5-qtbase-private-headers-devel-5.15.2+kde294-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250135" version="1" class="patch">
	<metadata>
		<title>python310-Pillow-9.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<reference ref_id="CVE-2022-24303" ref_url="https://www.suse.com/security/cve/CVE-2022-24303/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pillow-9.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24303/">CVE-2022-24303 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24303">CVE-2022-24303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923816" comment="python310-Pillow-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923817" comment="python310-Pillow-tk-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923818" comment="python38-Pillow-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923819" comment="python38-Pillow-tk-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923820" comment="python39-Pillow-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923821" comment="python39-Pillow-tk-9.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250136" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer1-0.9.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer1-0.9.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923822" comment="libvirglrenderer1-0.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923823" comment="virglrenderer-devel-0.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923824" comment="virglrenderer-test-server-0.9.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250137" version="1" class="patch">
	<metadata>
		<title>grafana-8.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923825" comment="grafana-8.3.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250138" version="1" class="patch">
	<metadata>
		<title>openscad-2021.01-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0496" ref_url="https://www.suse.com/security/cve/CVE-2022-0496/" source="CVE"/>
		<reference ref_id="CVE-2022-0497" ref_url="https://www.suse.com/security/cve/CVE-2022-0497/" source="CVE"/>
		<description>
These are all security issues fixed in the openscad-2021.01-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0496/">CVE-2022-0496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0496">CVE-2022-0496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0497/">CVE-2022-0497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0497">CVE-2022-0497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923826" comment="openscad-2021.01-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250139" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actioncable-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actioncable-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923827" comment="ruby3.1-rubygem-actioncable-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250140" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionmailbox-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionmailbox-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923828" comment="ruby3.1-rubygem-actionmailbox-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250141" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionmailer-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionmailer-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923829" comment="ruby3.1-rubygem-actionmailer-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250142" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<reference ref_id="CVE-2021-22881" ref_url="https://www.suse.com/security/cve/CVE-2021-22881/" source="CVE"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="CVE-2021-22902" ref_url="https://www.suse.com/security/cve/CVE-2021-22902/" source="CVE"/>
		<reference ref_id="CVE-2021-22904" ref_url="https://www.suse.com/security/cve/CVE-2021-22904/" source="CVE"/>
		<reference ref_id="CVE-2021-22942" ref_url="https://www.suse.com/security/cve/CVE-2021-22942/" source="CVE"/>
		<reference ref_id="CVE-2021-44528" ref_url="https://www.suse.com/security/cve/CVE-2021-44528/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8164">CVE-2020-8164 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8166">CVE-2020-8166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8185">CVE-2020-8185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22881/">CVE-2021-22881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22881">CVE-2021-22881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22885">CVE-2021-22885 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22902/">CVE-2021-22902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22902">CVE-2021-22902 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22904/">CVE-2021-22904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22904">CVE-2021-22904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22942/">CVE-2021-22942 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22942">CVE-2021-22942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44528/">CVE-2021-44528 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44528">CVE-2021-44528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923830" comment="ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250143" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actiontext-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actiontext-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923831" comment="ruby3.1-rubygem-actiontext-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250144" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionview-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionview-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5267">CVE-2020-5267 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8167">CVE-2020-8167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8185">CVE-2020-8185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923832" comment="ruby3.1-rubygem-actionview-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250145" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activejob-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activejob-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923833" comment="ruby3.1-rubygem-activejob-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250146" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activemodel-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activemodel-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923834" comment="ruby3.1-rubygem-activemodel-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250147" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activerecord-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activerecord-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22880">CVE-2021-22880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923835" comment="ruby3.1-rubygem-activerecord-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250148" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activestorage-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8162" ref_url="https://www.suse.com/security/cve/CVE-2020-8162/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activestorage-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8162/">CVE-2020-8162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8162">CVE-2020-8162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923836" comment="ruby3.1-rubygem-activestorage-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250149" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activesupport-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activesupport-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923837" comment="ruby3.1-rubygem-activesupport-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250150" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-json_pure-2.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-json_pure-2.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923838" comment="ruby3.1-rubygem-json_pure-2.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250151" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-puma-4-4.3.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-puma-4-4.3.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923839" comment="ruby3.1-rubygem-puma-4-4.3.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250152" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rails-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rails-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923840" comment="ruby3.1-rubygem-rails-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250153" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-railties-6.0-6.0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-railties-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8264">CVE-2020-8264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923841" comment="ruby3.1-rubygem-railties-6.0-6.0.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250154" version="1" class="patch">
	<metadata>
		<title>libnbd-1.10.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0485" ref_url="https://www.suse.com/security/cve/CVE-2022-0485/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.10.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0485/">CVE-2022-0485 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0485">CVE-2022-0485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923842" comment="libnbd-1.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923843" comment="libnbd-bash-completion-1.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923844" comment="libnbd-devel-1.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923845" comment="libnbd0-1.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923846" comment="nbdfuse-1.10.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250155" version="1" class="patch">
	<metadata>
		<title>libmruby3-3.0.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0481" ref_url="https://www.suse.com/security/cve/CVE-2022-0481/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3-3.0.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0481/">CVE-2022-0481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0481">CVE-2022-0481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923847" comment="libmruby3-3.0.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923848" comment="mruby-3.0.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923849" comment="mruby-devel-3.0.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250156" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923850" comment="python-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923851" comment="python-32bit-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923852" comment="python-curses-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923853" comment="python-demo-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923854" comment="python-gdbm-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923855" comment="python-idle-2.7.18-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923856" comment="python-tk-2.7.18-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250157" version="1" class="patch">
	<metadata>
		<title>grafana-8.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923857" comment="grafana-8.3.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250158" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-97.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0511" ref_url="https://www.suse.com/security/cve/CVE-2022-0511/" source="CVE"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22755" ref_url="https://www.suse.com/security/cve/CVE-2022-22755/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22757" ref_url="https://www.suse.com/security/cve/CVE-2022-22757/" source="CVE"/>
		<reference ref_id="CVE-2022-22758" ref_url="https://www.suse.com/security/cve/CVE-2022-22758/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22762" ref_url="https://www.suse.com/security/cve/CVE-2022-22762/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-97.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0511/">CVE-2022-0511 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0511">CVE-2022-0511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22755/">CVE-2022-22755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22755">CVE-2022-22755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22757/">CVE-2022-22757 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22757">CVE-2022-22757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22758/">CVE-2022-22758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22758">CVE-2022-22758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22762/">CVE-2022-22762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22762">CVE-2022-22762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923858" comment="MozillaFirefox-97.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923859" comment="MozillaFirefox-branding-upstream-97.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923860" comment="MozillaFirefox-devel-97.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923861" comment="MozillaFirefox-translations-common-97.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923862" comment="MozillaFirefox-translations-other-97.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250159" version="1" class="patch">
	<metadata>
		<title>kafka-kit-2.1.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
These are all security issues fixed in the kafka-kit-2.1.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923863" comment="kafka-kit-2.1.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250160" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923864" comment="python-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923865" comment="python-32bit-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923866" comment="python-curses-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923867" comment="python-demo-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923868" comment="python-gdbm-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923869" comment="python-idle-2.7.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923870" comment="python-tk-2.7.18-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250161" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20220207-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20220207-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923871" comment="ucode-intel-20220207-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250162" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-22.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-22.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923872" comment="python-Twisted-doc-22.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923873" comment="python310-Twisted-22.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923874" comment="python38-Twisted-22.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923875" comment="python39-Twisted-22.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250163" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923876" comment="MozillaThunderbird-91.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923877" comment="MozillaThunderbird-translations-common-91.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923878" comment="MozillaThunderbird-translations-other-91.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250164" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923879" comment="go1.16-1.16.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923880" comment="go1.16-doc-1.16.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923881" comment="go1.16-race-1.16.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250165" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923882" comment="go1.17-1.17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923883" comment="go1.17-doc-1.17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923884" comment="go1.17-race-1.17.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250166" version="1" class="patch">
	<metadata>
		<title>xerces-j2-2.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
These are all security issues fixed in the xerces-j2-2.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923885" comment="xerces-j2-2.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923886" comment="xerces-j2-demo-2.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923887" comment="xerces-j2-javadoc-2.12.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250167" version="1" class="patch">
	<metadata>
		<title>qtox-1.17.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44847" ref_url="https://www.suse.com/security/cve/CVE-2021-44847/" source="CVE"/>
		<description>
These are all security issues fixed in the qtox-1.17.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44847/">CVE-2021-44847 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44847">CVE-2021-44847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923888" comment="qtox-1.17.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250168" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-puma-5.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-puma-5.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23634">CVE-2022-23634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923889" comment="ruby3.1-rubygem-puma-5.6.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250169" version="1" class="patch">
	<metadata>
		<title>atheme-7.2.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24976" ref_url="https://www.suse.com/security/cve/CVE-2022-24976/" source="CVE"/>
		<description>
These are all security issues fixed in the atheme-7.2.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24976/">CVE-2022-24976 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24976">CVE-2022-24976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923890" comment="atheme-7.2.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923891" comment="atheme-devel-7.2.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923892" comment="libathemecore1-7.2.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250170" version="1" class="patch">
	<metadata>
		<title>chromedriver-98.0.4758.102-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0603" ref_url="https://www.suse.com/security/cve/CVE-2022-0603/" source="CVE"/>
		<reference ref_id="CVE-2022-0604" ref_url="https://www.suse.com/security/cve/CVE-2022-0604/" source="CVE"/>
		<reference ref_id="CVE-2022-0605" ref_url="https://www.suse.com/security/cve/CVE-2022-0605/" source="CVE"/>
		<reference ref_id="CVE-2022-0606" ref_url="https://www.suse.com/security/cve/CVE-2022-0606/" source="CVE"/>
		<reference ref_id="CVE-2022-0607" ref_url="https://www.suse.com/security/cve/CVE-2022-0607/" source="CVE"/>
		<reference ref_id="CVE-2022-0608" ref_url="https://www.suse.com/security/cve/CVE-2022-0608/" source="CVE"/>
		<reference ref_id="CVE-2022-0609" ref_url="https://www.suse.com/security/cve/CVE-2022-0609/" source="CVE"/>
		<reference ref_id="CVE-2022-0610" ref_url="https://www.suse.com/security/cve/CVE-2022-0610/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-98.0.4758.102-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0603/">CVE-2022-0603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0603">CVE-2022-0603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0604/">CVE-2022-0604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0604">CVE-2022-0604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0605/">CVE-2022-0605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0605">CVE-2022-0605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0606/">CVE-2022-0606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0606">CVE-2022-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0607/">CVE-2022-0607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0607">CVE-2022-0607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0608/">CVE-2022-0608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0608">CVE-2022-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0609/">CVE-2022-0609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0609">CVE-2022-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0610/">CVE-2022-0610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0610">CVE-2022-0610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923893" comment="chromedriver-98.0.4758.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923894" comment="chromium-98.0.4758.102-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250171" version="1" class="patch">
	<metadata>
		<title>glibc-2.35-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3998" ref_url="https://www.suse.com/security/cve/CVE-2021-3998/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.35-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3998/">CVE-2021-3998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923895" comment="glibc-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923896" comment="glibc-devel-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923897" comment="glibc-devel-static-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923898" comment="glibc-extra-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923899" comment="glibc-html-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923900" comment="glibc-i18ndata-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923901" comment="glibc-info-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923902" comment="glibc-lang-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923903" comment="glibc-locale-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923904" comment="glibc-locale-base-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923905" comment="glibc-profile-2.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923906" comment="nscd-2.35-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250172" version="1" class="patch">
	<metadata>
		<title>mujs-1.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45005" ref_url="https://www.suse.com/security/cve/CVE-2021-45005/" source="CVE"/>
		<description>
These are all security issues fixed in the mujs-1.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45005/">CVE-2021-45005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45005">CVE-2021-45005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923907" comment="mujs-1.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923908" comment="mujs-devel-1.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250173" version="1" class="patch">
	<metadata>
		<title>perl-GD-2.76-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-GD-2.76-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923909" comment="perl-GD-2.76-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250174" version="1" class="patch">
	<metadata>
		<title>cobbler-3.3.1.0+git.f5b0599a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45082" ref_url="https://www.suse.com/security/cve/CVE-2021-45082/" source="CVE"/>
		<description>
These are all security issues fixed in the cobbler-3.3.1.0+git.f5b0599a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45082/">CVE-2021-45082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45082">CVE-2021-45082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923910" comment="cobbler-3.3.1.0+git.f5b0599a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923911" comment="cobbler-tests-3.3.1.0+git.f5b0599a-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250175" version="1" class="patch">
	<metadata>
		<title>php8-8.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923912" comment="php8-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923913" comment="php8-bcmath-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923914" comment="php8-bz2-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923915" comment="php8-calendar-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923916" comment="php8-cli-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923917" comment="php8-ctype-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923918" comment="php8-curl-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923919" comment="php8-dba-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923920" comment="php8-devel-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923921" comment="php8-dom-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923922" comment="php8-enchant-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923923" comment="php8-exif-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923924" comment="php8-ffi-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923925" comment="php8-fileinfo-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923926" comment="php8-ftp-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923927" comment="php8-gd-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923928" comment="php8-gettext-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923929" comment="php8-gmp-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923930" comment="php8-iconv-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923931" comment="php8-intl-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923932" comment="php8-ldap-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923933" comment="php8-mbstring-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923934" comment="php8-mysql-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923935" comment="php8-odbc-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923936" comment="php8-opcache-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923937" comment="php8-openssl-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923938" comment="php8-pcntl-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923939" comment="php8-pdo-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923940" comment="php8-pgsql-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923941" comment="php8-phar-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923942" comment="php8-posix-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923943" comment="php8-readline-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923944" comment="php8-shmop-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923945" comment="php8-snmp-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923946" comment="php8-soap-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923947" comment="php8-sockets-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923948" comment="php8-sodium-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923949" comment="php8-sqlite-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923950" comment="php8-sysvmsg-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923951" comment="php8-sysvsem-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923952" comment="php8-sysvshm-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923953" comment="php8-tidy-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923954" comment="php8-tokenizer-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923955" comment="php8-xmlreader-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923956" comment="php8-xmlwriter-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923957" comment="php8-xsl-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923958" comment="php8-zip-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923959" comment="php8-zlib-8.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250176" version="1" class="patch">
	<metadata>
		<title>libpodofo-devel-0.9.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12983" ref_url="https://www.suse.com/security/cve/CVE-2018-12983/" source="CVE"/>
		<reference ref_id="CVE-2019-10723" ref_url="https://www.suse.com/security/cve/CVE-2019-10723/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo-devel-0.9.7-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12983/">CVE-2018-12983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12983">CVE-2018-12983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10723/">CVE-2019-10723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10723">CVE-2019-10723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923960" comment="libpodofo-devel-0.9.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923961" comment="libpodofo0_9_7-0.9.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923962" comment="podofo-0.9.7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250177" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0566" ref_url="https://www.suse.com/security/cve/CVE-2022-0566/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0566/">CVE-2022-0566 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0566">CVE-2022-0566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923963" comment="MozillaThunderbird-91.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923964" comment="MozillaThunderbird-translations-common-91.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923965" comment="MozillaThunderbird-translations-other-91.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250178" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.16.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.16.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923967" comment="kernel-macros-5.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923968" comment="kernel-source-5.16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923969" comment="kernel-source-vanilla-5.16.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250179" version="1" class="patch">
	<metadata>
		<title>libwireshark15-3.6.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark15-3.6.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0581">CVE-2022-0581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0582">CVE-2022-0582 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0583">CVE-2022-0583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0585">CVE-2022-0585 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0586">CVE-2022-0586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923970" comment="libwireshark15-3.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923971" comment="libwiretap12-3.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923972" comment="libwsutil13-3.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923973" comment="wireshark-3.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923974" comment="wireshark-devel-3.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923975" comment="wireshark-ui-qt-3.6.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250180" version="1" class="patch">
	<metadata>
		<title>blender-3.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0544" ref_url="https://www.suse.com/security/cve/CVE-2022-0544/" source="CVE"/>
		<reference ref_id="CVE-2022-0545" ref_url="https://www.suse.com/security/cve/CVE-2022-0545/" source="CVE"/>
		<reference ref_id="CVE-2022-0546" ref_url="https://www.suse.com/security/cve/CVE-2022-0546/" source="CVE"/>
		<description>
These are all security issues fixed in the blender-3.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0544/">CVE-2022-0544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0544">CVE-2022-0544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0545/">CVE-2022-0545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0545">CVE-2022-0545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0546/">CVE-2022-0546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0546">CVE-2022-0546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923976" comment="blender-3.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923977" comment="blender-cycles-devel-3.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923978" comment="blender-demo-3.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923979" comment="blender-lang-3.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250181" version="1" class="patch">
	<metadata>
		<title>cosign-1.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23649" ref_url="https://www.suse.com/security/cve/CVE-2022-23649/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-1.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23649/">CVE-2022-23649 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23649">CVE-2022-23649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923980" comment="cosign-1.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250182" version="1" class="patch">
	<metadata>
		<title>php7-7.4.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009923981" comment="php7-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923982" comment="php7-bcmath-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923983" comment="php7-bz2-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923984" comment="php7-calendar-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923985" comment="php7-cli-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923986" comment="php7-ctype-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923987" comment="php7-curl-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923988" comment="php7-dba-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923989" comment="php7-devel-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923990" comment="php7-dom-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923991" comment="php7-enchant-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923992" comment="php7-exif-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923993" comment="php7-fileinfo-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923994" comment="php7-ftp-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923995" comment="php7-gd-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923996" comment="php7-gettext-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923997" comment="php7-gmp-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923998" comment="php7-iconv-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009923999" comment="php7-intl-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924000" comment="php7-json-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924001" comment="php7-ldap-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924002" comment="php7-mbstring-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924003" comment="php7-mysql-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924004" comment="php7-odbc-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924005" comment="php7-opcache-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924006" comment="php7-openssl-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924007" comment="php7-pcntl-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924008" comment="php7-pdo-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924009" comment="php7-pgsql-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924010" comment="php7-phar-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924011" comment="php7-posix-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924012" comment="php7-readline-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924013" comment="php7-shmop-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924014" comment="php7-snmp-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924015" comment="php7-soap-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924016" comment="php7-sockets-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924017" comment="php7-sodium-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924018" comment="php7-sqlite-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924019" comment="php7-sysvmsg-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924020" comment="php7-sysvsem-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924021" comment="php7-sysvshm-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924022" comment="php7-tidy-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924023" comment="php7-tokenizer-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924024" comment="php7-xmlreader-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924025" comment="php7-xmlrpc-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924026" comment="php7-xmlwriter-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924027" comment="php7-xsl-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924028" comment="php7-zip-7.4.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924029" comment="php7-zlib-7.4.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250183" version="1" class="patch">
	<metadata>
		<title>qemu-6.2.0-40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.2.0-40.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924030" comment="qemu-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924031" comment="qemu-accel-qtest-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924032" comment="qemu-accel-tcg-x86-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924033" comment="qemu-arm-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924034" comment="qemu-audio-alsa-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924035" comment="qemu-audio-jack-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924036" comment="qemu-audio-oss-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924037" comment="qemu-audio-pa-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924038" comment="qemu-audio-spice-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924039" comment="qemu-block-curl-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924040" comment="qemu-block-dmg-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924041" comment="qemu-block-gluster-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924042" comment="qemu-block-iscsi-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924043" comment="qemu-block-nfs-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924044" comment="qemu-block-rbd-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924045" comment="qemu-block-ssh-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924046" comment="qemu-chardev-baum-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924047" comment="qemu-chardev-spice-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924048" comment="qemu-extra-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924049" comment="qemu-guest-agent-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924050" comment="qemu-hw-display-qxl-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924051" comment="qemu-hw-display-virtio-gpu-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924052" comment="qemu-hw-display-virtio-gpu-pci-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924053" comment="qemu-hw-display-virtio-vga-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924054" comment="qemu-hw-s390x-virtio-gpu-ccw-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924055" comment="qemu-hw-usb-host-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924056" comment="qemu-hw-usb-redirect-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924057" comment="qemu-hw-usb-smartcard-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924058" comment="qemu-ipxe-1.0.0+-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924059" comment="qemu-ivshmem-tools-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924060" comment="qemu-ksm-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924061" comment="qemu-kvm-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924062" comment="qemu-lang-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924063" comment="qemu-microvm-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924064" comment="qemu-ppc-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924065" comment="qemu-s390x-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924066" comment="qemu-seabios-1.15.0_0_g2dd4b9b-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924067" comment="qemu-sgabios-8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924068" comment="qemu-skiboot-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924069" comment="qemu-tools-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924070" comment="qemu-ui-curses-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924071" comment="qemu-ui-gtk-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924072" comment="qemu-ui-opengl-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924073" comment="qemu-ui-spice-app-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924074" comment="qemu-ui-spice-core-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924075" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924076" comment="qemu-vhost-user-gpu-6.2.0-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924077" comment="qemu-x86-6.2.0-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250184" version="1" class="patch">
	<metadata>
		<title>libshp-devel-1.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0699" ref_url="https://www.suse.com/security/cve/CVE-2022-0699/" source="CVE"/>
		<description>
These are all security issues fixed in the libshp-devel-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0699/">CVE-2022-0699 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0699">CVE-2022-0699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924078" comment="libshp-devel-1.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924079" comment="libshp2-1.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924080" comment="shapelib-1.5.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250185" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924081" comment="tomcat-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924082" comment="tomcat-admin-webapps-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924083" comment="tomcat-docs-webapp-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924084" comment="tomcat-el-3_0-api-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924085" comment="tomcat-embed-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924086" comment="tomcat-javadoc-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924087" comment="tomcat-jsp-2_3-api-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924088" comment="tomcat-jsvc-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924089" comment="tomcat-lib-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924090" comment="tomcat-servlet-4_0-api-9.0.43-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924091" comment="tomcat-webapps-9.0.43-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250186" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35940" ref_url="https://www.suse.com/security/cve/CVE-2021-35940/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35940/">CVE-2021-35940 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35940">CVE-2021-35940 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924092" comment="apr-devel-1.7.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924093" comment="libapr1-0-1.7.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250187" version="1" class="patch">
	<metadata>
		<title>expat-2.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924094" comment="expat-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924095" comment="libexpat-devel-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924096" comment="libexpat-devel-32bit-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924097" comment="libexpat1-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924098" comment="libexpat1-32bit-2.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250188" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46657">CVE-2021-46657 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46658">CVE-2021-46658 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924099" comment="libmariadbd-devel-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924100" comment="libmariadbd19-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924101" comment="mariadb-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924102" comment="mariadb-bench-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924103" comment="mariadb-client-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924104" comment="mariadb-errormessages-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924105" comment="mariadb-galera-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924106" comment="mariadb-rpm-macros-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924107" comment="mariadb-test-10.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924108" comment="mariadb-tools-10.7.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250189" version="1" class="patch">
	<metadata>
		<title>libpolkit-agent-1-0-0.120-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit-agent-1-0-0.120-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924109" comment="libpolkit-agent-1-0-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924110" comment="libpolkit-agent-1-0-32bit-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924111" comment="libpolkit-gobject-1-0-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924112" comment="libpolkit-gobject-1-0-32bit-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924113" comment="polkit-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924114" comment="polkit-devel-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924115" comment="polkit-doc-0.120-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924116" comment="typelib-1_0-Polkit-1_0-0.120-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250190" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionpack-6.0-6.0.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionpack-6.0-6.0.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23633">CVE-2022-23633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924117" comment="ruby3.1-rubygem-actionpack-6.0-6.0.4.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250191" version="1" class="patch">
	<metadata>
		<title>swtpm-0.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<description>
These are all security issues fixed in the swtpm-0.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924118" comment="swtpm-0.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924119" comment="swtpm-devel-0.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924120" comment="swtpm-selinux-0.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250192" version="1" class="patch">
	<metadata>
		<title>libusbguard1-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-25058" ref_url="https://www.suse.com/security/cve/CVE-2019-25058/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbguard1-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25058/">CVE-2019-25058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25058">CVE-2019-25058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924121" comment="libusbguard1-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924122" comment="usbguard-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924123" comment="usbguard-devel-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924124" comment="usbguard-tools-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250193" version="1" class="patch">
	<metadata>
		<title>gvim-8.2.4456-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-0714" ref_url="https://www.suse.com/security/cve/CVE-2022-0714/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.2.4456-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0714/">CVE-2022-0714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924125" comment="gvim-8.2.4456-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924126" comment="vim-8.2.4456-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924127" comment="vim-data-8.2.4456-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924128" comment="vim-data-common-8.2.4456-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924129" comment="vim-small-8.2.4456-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250194" version="1" class="patch">
	<metadata>
		<title>cfengine-3.19.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36756" ref_url="https://www.suse.com/security/cve/CVE-2021-36756/" source="CVE"/>
		<reference ref_id="CVE-2021-38379" ref_url="https://www.suse.com/security/cve/CVE-2021-38379/" source="CVE"/>
		<description>
These are all security issues fixed in the cfengine-3.19.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36756/">CVE-2021-36756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-36756">CVE-2021-36756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38379/">CVE-2021-38379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-38379">CVE-2021-38379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924130" comment="cfengine-3.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924131" comment="cfengine-examples-3.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924132" comment="libpromises-devel-3.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924133" comment="libpromises3-3.19.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250195" version="1" class="patch">
	<metadata>
		<title>php-composer-1.10.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41116" ref_url="https://www.suse.com/security/cve/CVE-2021-41116/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer-1.10.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41116/">CVE-2021-41116 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41116">CVE-2021-41116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924134" comment="php-composer-1.10.25-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250196" version="1" class="patch">
	<metadata>
		<title>libseat1-0.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25643" ref_url="https://www.suse.com/security/cve/CVE-2022-25643/" source="CVE"/>
		<description>
These are all security issues fixed in the libseat1-0.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25643/">CVE-2022-25643 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25643">CVE-2022-25643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924135" comment="libseat1-0.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924136" comment="seatd-0.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924137" comment="seatd-devel-0.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250197" version="1" class="patch">
	<metadata>
		<title>haproxy-2.5.4+git0.e55ab4208-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0711" ref_url="https://www.suse.com/security/cve/CVE-2022-0711/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-2.5.4+git0.e55ab4208-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0711/">CVE-2022-0711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0711">CVE-2022-0711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924138" comment="haproxy-2.5.4+git0.e55ab4208-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250198" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-18.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924139" comment="python-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924140" comment="python-32bit-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924141" comment="python-curses-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924142" comment="python-demo-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924143" comment="python-gdbm-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924144" comment="python-idle-2.7.18-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924145" comment="python-tk-2.7.18-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250199" version="1" class="patch">
	<metadata>
		<title>python36-3.6.15-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
These are all security issues fixed in the python36-3.6.15-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924146" comment="python36-3.6.15-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924147" comment="python36-32bit-3.6.15-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924148" comment="python36-curses-3.6.15-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924149" comment="python36-dbm-3.6.15-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924150" comment="python36-idle-3.6.15-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924151" comment="python36-tk-3.6.15-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250200" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924152" comment="libQt5Bootstrap-devel-static-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924153" comment="libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924154" comment="libQt5Concurrent-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924155" comment="libQt5Concurrent-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924156" comment="libQt5Concurrent5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924157" comment="libQt5Concurrent5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924158" comment="libQt5Core-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924159" comment="libQt5Core-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924160" comment="libQt5Core-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924161" comment="libQt5Core5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924162" comment="libQt5Core5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924163" comment="libQt5DBus-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924164" comment="libQt5DBus-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924165" comment="libQt5DBus-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924166" comment="libQt5DBus5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924167" comment="libQt5DBus5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924168" comment="libQt5Gui-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924169" comment="libQt5Gui-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924170" comment="libQt5Gui-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924171" comment="libQt5Gui5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924172" comment="libQt5Gui5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924173" comment="libQt5KmsSupport-devel-static-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924174" comment="libQt5KmsSupport-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924175" comment="libQt5Network-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924176" comment="libQt5Network-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924177" comment="libQt5Network-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924178" comment="libQt5Network5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924179" comment="libQt5Network5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924180" comment="libQt5OpenGL-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924181" comment="libQt5OpenGL-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924182" comment="libQt5OpenGL-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924183" comment="libQt5OpenGL5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924184" comment="libQt5OpenGL5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924185" comment="libQt5OpenGLExtensions-devel-static-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924186" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924187" comment="libQt5PlatformHeaders-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924188" comment="libQt5PlatformSupport-devel-static-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924189" comment="libQt5PlatformSupport-devel-static-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924190" comment="libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924191" comment="libQt5PrintSupport-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924192" comment="libQt5PrintSupport-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924193" comment="libQt5PrintSupport-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924194" comment="libQt5PrintSupport5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924195" comment="libQt5PrintSupport5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924196" comment="libQt5Sql-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924197" comment="libQt5Sql-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924198" comment="libQt5Sql-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924199" comment="libQt5Sql5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924200" comment="libQt5Sql5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924201" comment="libQt5Sql5-mysql-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924202" comment="libQt5Sql5-mysql-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924203" comment="libQt5Sql5-postgresql-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924204" comment="libQt5Sql5-postgresql-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924205" comment="libQt5Sql5-sqlite-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924206" comment="libQt5Sql5-sqlite-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924207" comment="libQt5Sql5-unixODBC-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924208" comment="libQt5Sql5-unixODBC-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924209" comment="libQt5Test-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924210" comment="libQt5Test-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924211" comment="libQt5Test-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924212" comment="libQt5Test5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924213" comment="libQt5Test5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924214" comment="libQt5Widgets-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924215" comment="libQt5Widgets-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924216" comment="libQt5Widgets-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924217" comment="libQt5Widgets5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924218" comment="libQt5Widgets5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924219" comment="libQt5Xml-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924220" comment="libQt5Xml-devel-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924221" comment="libQt5Xml5-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924222" comment="libQt5Xml5-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924223" comment="libqt5-qtbase-common-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924224" comment="libqt5-qtbase-devel-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924225" comment="libqt5-qtbase-examples-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924226" comment="libqt5-qtbase-examples-32bit-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924227" comment="libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924228" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.2+kde294-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924229" comment="libqt5-qtbase-private-headers-devel-5.15.2+kde294-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250201" version="1" class="patch">
	<metadata>
		<title>frr-8.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26125" ref_url="https://www.suse.com/security/cve/CVE-2022-26125/" source="CVE"/>
		<reference ref_id="CVE-2022-26126" ref_url="https://www.suse.com/security/cve/CVE-2022-26126/" source="CVE"/>
		<reference ref_id="CVE-2022-26127" ref_url="https://www.suse.com/security/cve/CVE-2022-26127/" source="CVE"/>
		<reference ref_id="CVE-2022-26128" ref_url="https://www.suse.com/security/cve/CVE-2022-26128/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26125/">CVE-2022-26125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26125">CVE-2022-26125 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26126/">CVE-2022-26126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26126">CVE-2022-26126 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26127/">CVE-2022-26127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26127">CVE-2022-26127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26128/">CVE-2022-26128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26128">CVE-2022-26128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924230" comment="frr-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924231" comment="frr-devel-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924232" comment="libfrr0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924233" comment="libfrr_pb0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924234" comment="libfrrcares0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924235" comment="libfrrfpm_pb0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924236" comment="libfrrospfapiclient0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924237" comment="libfrrsnmp0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924238" comment="libfrrzmq0-8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924239" comment="libmlag_pb0-8.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250202" version="1" class="patch">
	<metadata>
		<title>kcron-21.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24986" ref_url="https://www.suse.com/security/cve/CVE-2022-24986/" source="CVE"/>
		<description>
These are all security issues fixed in the kcron-21.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24986/">CVE-2022-24986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24986">CVE-2022-24986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924240" comment="kcron-21.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924241" comment="kcron-lang-21.12.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250203" version="1" class="patch">
	<metadata>
		<title>ldb-tools-2.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3670" ref_url="https://www.suse.com/security/cve/CVE-2021-3670/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-2.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3670/">CVE-2021-3670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3670">CVE-2021-3670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924242" comment="ldb-tools-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924243" comment="libldb-devel-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924244" comment="libldb2-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924245" comment="libldb2-32bit-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924246" comment="python3-ldb-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924247" comment="python3-ldb-32bit-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924248" comment="python3-ldb-devel-2.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250204" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-8.0.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-2471" ref_url="https://www.suse.com/security/cve/CVE-2021-2471/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-8.0.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2471/">CVE-2021-2471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2471">CVE-2021-2471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924249" comment="mysql-connector-java-8.0.28-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250205" version="1" class="patch">
	<metadata>
		<title>screen-4.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924250" comment="screen-4.9.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250206" version="1" class="patch">
	<metadata>
		<title>flac-1.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-1.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924251" comment="flac-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924252" comment="flac-devel-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924253" comment="flac-devel-32bit-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924254" comment="libFLAC++6-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924255" comment="libFLAC++6-32bit-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924256" comment="libFLAC8-1.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924257" comment="libFLAC8-32bit-1.3.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250207" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.2.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.2.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924258" comment="libQt6Concurrent6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924259" comment="libQt6Core6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924260" comment="libQt6DBus6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924261" comment="libQt6Gui6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924262" comment="libQt6Network6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924263" comment="libQt6OpenGL6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924264" comment="libQt6OpenGLWidgets6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924265" comment="libQt6PrintSupport6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924266" comment="libQt6Sql6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924267" comment="libQt6Test6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924268" comment="libQt6Widgets6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924269" comment="libQt6Xml6-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924270" comment="qt6-base-common-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924271" comment="qt6-base-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924272" comment="qt6-base-examples-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924273" comment="qt6-base-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924274" comment="qt6-concurrent-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924275" comment="qt6-core-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924276" comment="qt6-core-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924277" comment="qt6-dbus-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924278" comment="qt6-dbus-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924279" comment="qt6-docs-common-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924280" comment="qt6-gui-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924281" comment="qt6-gui-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924282" comment="qt6-kmssupport-devel-static-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924283" comment="qt6-kmssupport-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924284" comment="qt6-network-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924285" comment="qt6-network-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924286" comment="qt6-network-tls-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924287" comment="qt6-networkinformation-nm-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924288" comment="qt6-opengl-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924289" comment="qt6-opengl-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924290" comment="qt6-openglwidgets-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924291" comment="qt6-platformsupport-devel-static-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924292" comment="qt6-platformsupport-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924293" comment="qt6-platformtheme-gtk3-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924294" comment="qt6-platformtheme-xdgdesktopportal-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924295" comment="qt6-printsupport-cups-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924296" comment="qt6-printsupport-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924297" comment="qt6-printsupport-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924298" comment="qt6-sql-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924299" comment="qt6-sql-mysql-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924300" comment="qt6-sql-postgresql-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924301" comment="qt6-sql-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924302" comment="qt6-sql-sqlite-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924303" comment="qt6-sql-unixODBC-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924304" comment="qt6-test-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924305" comment="qt6-test-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924306" comment="qt6-widgets-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924307" comment="qt6-widgets-private-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924308" comment="qt6-xml-devel-6.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924309" comment="qt6-xml-private-devel-6.2.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250208" version="1" class="patch">
	<metadata>
		<title>weblate-4.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24710" ref_url="https://www.suse.com/security/cve/CVE-2022-24710/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-4.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24710/">CVE-2022-24710 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24710">CVE-2022-24710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924310" comment="weblate-4.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924311" comment="weblate-doc-4.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250209" version="1" class="patch">
	<metadata>
		<title>keepalived-2.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<description>
These are all security issues fixed in the keepalived-2.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44225">CVE-2021-44225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924312" comment="keepalived-2.2.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250210" version="1" class="patch">
	<metadata>
		<title>python-Scrapy-doc-2.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0577" ref_url="https://www.suse.com/security/cve/CVE-2022-0577/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Scrapy-doc-2.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0577/">CVE-2022-0577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0577">CVE-2022-0577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924313" comment="python-Scrapy-doc-2.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924314" comment="python310-Scrapy-2.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924315" comment="python38-Scrapy-2.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924316" comment="python39-Scrapy-2.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250211" version="1" class="patch">
	<metadata>
		<title>chromedriver-99.0.4844.51-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0789" ref_url="https://www.suse.com/security/cve/CVE-2022-0789/" source="CVE"/>
		<reference ref_id="CVE-2022-0790" ref_url="https://www.suse.com/security/cve/CVE-2022-0790/" source="CVE"/>
		<reference ref_id="CVE-2022-0791" ref_url="https://www.suse.com/security/cve/CVE-2022-0791/" source="CVE"/>
		<reference ref_id="CVE-2022-0792" ref_url="https://www.suse.com/security/cve/CVE-2022-0792/" source="CVE"/>
		<reference ref_id="CVE-2022-0793" ref_url="https://www.suse.com/security/cve/CVE-2022-0793/" source="CVE"/>
		<reference ref_id="CVE-2022-0794" ref_url="https://www.suse.com/security/cve/CVE-2022-0794/" source="CVE"/>
		<reference ref_id="CVE-2022-0795" ref_url="https://www.suse.com/security/cve/CVE-2022-0795/" source="CVE"/>
		<reference ref_id="CVE-2022-0796" ref_url="https://www.suse.com/security/cve/CVE-2022-0796/" source="CVE"/>
		<reference ref_id="CVE-2022-0797" ref_url="https://www.suse.com/security/cve/CVE-2022-0797/" source="CVE"/>
		<reference ref_id="CVE-2022-0798" ref_url="https://www.suse.com/security/cve/CVE-2022-0798/" source="CVE"/>
		<reference ref_id="CVE-2022-0799" ref_url="https://www.suse.com/security/cve/CVE-2022-0799/" source="CVE"/>
		<reference ref_id="CVE-2022-0800" ref_url="https://www.suse.com/security/cve/CVE-2022-0800/" source="CVE"/>
		<reference ref_id="CVE-2022-0801" ref_url="https://www.suse.com/security/cve/CVE-2022-0801/" source="CVE"/>
		<reference ref_id="CVE-2022-0802" ref_url="https://www.suse.com/security/cve/CVE-2022-0802/" source="CVE"/>
		<reference ref_id="CVE-2022-0803" ref_url="https://www.suse.com/security/cve/CVE-2022-0803/" source="CVE"/>
		<reference ref_id="CVE-2022-0804" ref_url="https://www.suse.com/security/cve/CVE-2022-0804/" source="CVE"/>
		<reference ref_id="CVE-2022-0805" ref_url="https://www.suse.com/security/cve/CVE-2022-0805/" source="CVE"/>
		<reference ref_id="CVE-2022-0806" ref_url="https://www.suse.com/security/cve/CVE-2022-0806/" source="CVE"/>
		<reference ref_id="CVE-2022-0807" ref_url="https://www.suse.com/security/cve/CVE-2022-0807/" source="CVE"/>
		<reference ref_id="CVE-2022-0808" ref_url="https://www.suse.com/security/cve/CVE-2022-0808/" source="CVE"/>
		<reference ref_id="CVE-2022-0809" ref_url="https://www.suse.com/security/cve/CVE-2022-0809/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-99.0.4844.51-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0789/">CVE-2022-0789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0789">CVE-2022-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0790/">CVE-2022-0790 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0790">CVE-2022-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0791/">CVE-2022-0791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0791">CVE-2022-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0792/">CVE-2022-0792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0792">CVE-2022-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0793/">CVE-2022-0793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0793">CVE-2022-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0794/">CVE-2022-0794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0794">CVE-2022-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0795/">CVE-2022-0795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0795">CVE-2022-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0796/">CVE-2022-0796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0796">CVE-2022-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0797/">CVE-2022-0797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0797">CVE-2022-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0798/">CVE-2022-0798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0798">CVE-2022-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0799/">CVE-2022-0799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0799">CVE-2022-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0800/">CVE-2022-0800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0800">CVE-2022-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0801/">CVE-2022-0801 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0801">CVE-2022-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0802/">CVE-2022-0802 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0802">CVE-2022-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0803/">CVE-2022-0803 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0803">CVE-2022-0803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0804/">CVE-2022-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0804">CVE-2022-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0805/">CVE-2022-0805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0805">CVE-2022-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0806/">CVE-2022-0806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0806">CVE-2022-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0807/">CVE-2022-0807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0807">CVE-2022-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0808/">CVE-2022-0808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0808">CVE-2022-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0809/">CVE-2022-0809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0809">CVE-2022-0809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924317" comment="chromedriver-99.0.4844.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924318" comment="chromium-99.0.4844.51-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250212" version="1" class="patch">
	<metadata>
		<title>containerd-1.4.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.4.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924319" comment="containerd-1.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924320" comment="containerd-ctr-1.4.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250213" version="1" class="patch">
	<metadata>
		<title>go1.16-1.16.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.16-1.16.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924321" comment="go1.16-1.16.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924322" comment="go1.16-doc-1.16.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924323" comment="go1.16-race-1.16.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250214" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924324" comment="go1.17-1.17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924325" comment="go1.17-doc-1.17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924326" comment="go1.17-race-1.17.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250215" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<reference ref_id="CVE-2021-36976" ref_url="https://www.suse.com/security/cve/CVE-2021-36976/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36976/">CVE-2021-36976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924327" comment="bsdtar-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924328" comment="libarchive-devel-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924329" comment="libarchive13-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924330" comment="libarchive13-32bit-3.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250216" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.322-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.322-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924331" comment="java-1_8_0-openjdk-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924332" comment="java-1_8_0-openjdk-accessibility-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924333" comment="java-1_8_0-openjdk-demo-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924334" comment="java-1_8_0-openjdk-devel-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924335" comment="java-1_8_0-openjdk-headless-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924336" comment="java-1_8_0-openjdk-javadoc-1.8.0.322-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924337" comment="java-1_8_0-openjdk-src-1.8.0.322-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250217" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.322-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.322-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924338" comment="java-1_8_0-openj9-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924339" comment="java-1_8_0-openj9-accessibility-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924340" comment="java-1_8_0-openj9-demo-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924341" comment="java-1_8_0-openj9-devel-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924342" comment="java-1_8_0-openj9-headless-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924343" comment="java-1_8_0-openj9-javadoc-1.8.0.322-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924344" comment="java-1_8_0-openj9-src-1.8.0.322-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250218" version="1" class="patch">
	<metadata>
		<title>minidlna-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26505" ref_url="https://www.suse.com/security/cve/CVE-2022-26505/" source="CVE"/>
		<description>
These are all security issues fixed in the minidlna-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26505/">CVE-2022-26505 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26505">CVE-2022-26505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924345" comment="minidlna-1.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250219" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-2_17-0-2.17.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36980" ref_url="https://www.suse.com/security/cve/CVE-2021-36980/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-2_17-0-2.17.0-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36980/">CVE-2021-36980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36980">CVE-2021-36980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924346" comment="libopenvswitch-2_17-0-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924347" comment="openvswitch-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924348" comment="openvswitch-devel-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924349" comment="openvswitch-doc-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924350" comment="openvswitch-ipsec-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924351" comment="openvswitch-pki-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924352" comment="openvswitch-test-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924353" comment="openvswitch-vtep-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924354" comment="python310-ovs-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924355" comment="python38-ovs-2.17.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924356" comment="python39-ovs-2.17.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250220" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionpack-7.0-7.0.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionpack-7.0-7.0.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23633">CVE-2022-23633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924357" comment="ruby3.1-rubygem-actionpack-7.0-7.0.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250221" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-loofah-2.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-loofah-2.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924358" comment="ruby3.1-rubygem-loofah-2.14.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250222" version="1" class="patch">
	<metadata>
		<title>cyradm-2.4.22-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
These are all security issues fixed in the cyradm-2.4.22-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33582">CVE-2021-33582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924359" comment="cyradm-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924360" comment="cyrus-imapd-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924361" comment="cyrus-imapd-devel-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924362" comment="cyrus-imapd-snmp-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924363" comment="cyrus-imapd-snmp-mibs-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924364" comment="cyrus-imapd-utils-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924365" comment="perl-Cyrus-IMAP-2.4.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924366" comment="perl-Cyrus-SIEVE-managesieve-2.4.22-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250223" version="1" class="patch">
	<metadata>
		<title>fscrypt-0.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25326" ref_url="https://www.suse.com/security/cve/CVE-2022-25326/" source="CVE"/>
		<reference ref_id="CVE-2022-25327" ref_url="https://www.suse.com/security/cve/CVE-2022-25327/" source="CVE"/>
		<reference ref_id="CVE-2022-25328" ref_url="https://www.suse.com/security/cve/CVE-2022-25328/" source="CVE"/>
		<description>
These are all security issues fixed in the fscrypt-0.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25326/">CVE-2022-25326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25326">CVE-2022-25326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25327/">CVE-2022-25327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25327">CVE-2022-25327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25328/">CVE-2022-25328 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25328">CVE-2022-25328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924367" comment="fscrypt-0.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924368" comment="pam-fscrypt-0.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250224" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activestorage-7.0-7.0.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21831" ref_url="https://www.suse.com/security/cve/CVE-2022-21831/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activestorage-7.0-7.0.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21831/">CVE-2022-21831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21831">CVE-2022-21831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924369" comment="ruby3.1-rubygem-activestorage-7.0-7.0.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250225" version="1" class="patch">
	<metadata>
		<title>cobbler-3.3.2.0+git.9044aa99-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0860" ref_url="https://www.suse.com/security/cve/CVE-2022-0860/" source="CVE"/>
		<description>
These are all security issues fixed in the cobbler-3.3.2.0+git.9044aa99-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0860/">CVE-2022-0860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0860">CVE-2022-0860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924370" comment="cobbler-3.3.2.0+git.9044aa99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924371" comment="cobbler-tests-3.3.2.0+git.9044aa99-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250226" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1m-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2002-20001" ref_url="https://www.suse.com/security/cve/CVE-2002-20001/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1m-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2002-20001/">CVE-2002-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2002-20001">CVE-2002-20001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924372" comment="libopenssl-1_1-devel-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924373" comment="libopenssl-1_1-devel-32bit-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924374" comment="libopenssl1_1-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924375" comment="libopenssl1_1-32bit-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924376" comment="libopenssl1_1-hmac-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924377" comment="libopenssl1_1-hmac-32bit-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924378" comment="openssl-1_1-1.1.1m-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924379" comment="openssl-1_1-doc-1.1.1m-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250227" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-sprockets-4.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-sprockets-4.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924380" comment="ruby3.1-rubygem-sprockets-4.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250228" version="1" class="patch">
	<metadata>
		<title>qemu-6.2.0-41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2022-0358" ref_url="https://www.suse.com/security/cve/CVE-2022-0358/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.2.0-41.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0358/">CVE-2022-0358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0358">CVE-2022-0358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924381" comment="qemu-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924382" comment="qemu-SLOF-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924383" comment="qemu-accel-qtest-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924384" comment="qemu-accel-tcg-x86-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924385" comment="qemu-arm-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924386" comment="qemu-audio-alsa-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924387" comment="qemu-audio-jack-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924388" comment="qemu-audio-oss-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924389" comment="qemu-audio-pa-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924390" comment="qemu-audio-spice-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924391" comment="qemu-block-curl-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924392" comment="qemu-block-dmg-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924393" comment="qemu-block-gluster-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924394" comment="qemu-block-iscsi-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924395" comment="qemu-block-nfs-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924396" comment="qemu-block-rbd-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924397" comment="qemu-block-ssh-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924398" comment="qemu-chardev-baum-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924399" comment="qemu-chardev-spice-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924400" comment="qemu-extra-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924401" comment="qemu-guest-agent-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924402" comment="qemu-hw-display-qxl-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924403" comment="qemu-hw-display-virtio-gpu-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924404" comment="qemu-hw-display-virtio-gpu-pci-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924405" comment="qemu-hw-display-virtio-vga-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924406" comment="qemu-hw-s390x-virtio-gpu-ccw-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924407" comment="qemu-hw-usb-host-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924408" comment="qemu-hw-usb-redirect-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924409" comment="qemu-hw-usb-smartcard-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924410" comment="qemu-ipxe-1.0.0+-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924411" comment="qemu-ivshmem-tools-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924412" comment="qemu-ksm-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924413" comment="qemu-kvm-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924414" comment="qemu-lang-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924415" comment="qemu-microvm-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924416" comment="qemu-ppc-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924417" comment="qemu-s390x-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924418" comment="qemu-seabios-1.15.0_0_g2dd4b9b-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924419" comment="qemu-sgabios-8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924420" comment="qemu-skiboot-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924421" comment="qemu-tools-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924422" comment="qemu-ui-curses-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924423" comment="qemu-ui-gtk-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924424" comment="qemu-ui-opengl-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924425" comment="qemu-ui-spice-app-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924426" comment="qemu-ui-spice-core-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924427" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924428" comment="qemu-vhost-user-gpu-6.2.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924429" comment="qemu-x86-6.2.0-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250229" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-98.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0843" ref_url="https://www.suse.com/security/cve/CVE-2022-0843/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26382" ref_url="https://www.suse.com/security/cve/CVE-2022-26382/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26385" ref_url="https://www.suse.com/security/cve/CVE-2022-26385/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-98.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0843/">CVE-2022-0843 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0843">CVE-2022-0843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26382/">CVE-2022-26382 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26382">CVE-2022-26382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26385/">CVE-2022-26385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26385">CVE-2022-26385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924430" comment="MozillaFirefox-98.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924431" comment="MozillaFirefox-branding-upstream-98.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924432" comment="MozillaFirefox-devel-98.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924433" comment="MozillaFirefox-translations-common-98.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924434" comment="MozillaFirefox-translations-other-98.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250230" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924435" comment="MozillaThunderbird-91.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924436" comment="MozillaThunderbird-translations-common-91.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924437" comment="MozillaThunderbird-translations-other-91.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250231" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.16.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.16.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924439" comment="kernel-macros-5.16.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924440" comment="kernel-source-5.16.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924441" comment="kernel-source-vanilla-5.16.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250232" version="1" class="patch">
	<metadata>
		<title>etcd-3.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11254" ref_url="https://www.suse.com/security/cve/CVE-2019-11254/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11254/">CVE-2019-11254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11254">CVE-2019-11254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924442" comment="etcd-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924443" comment="etcdctl-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924444" comment="etcdutl-3.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250233" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-nokogiri-1.13.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-nokogiri-1.13.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924445" comment="ruby3.1-rubygem-nokogiri-1.13.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250234" version="1" class="patch">
	<metadata>
		<title>juliaup-1.5.37-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the juliaup-1.5.37-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924446" comment="juliaup-1.5.37-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250235" version="1" class="patch">
	<metadata>
		<title>macchina-6.0.6~git0.c21ce78-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the macchina-6.0.6~git0.c21ce78-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924447" comment="macchina-6.0.6~git0.c21ce78-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250236" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.37.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0563" ref_url="https://www.suse.com/security/cve/CVE-2022-0563/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.37.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0563/">CVE-2022-0563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924448" comment="libblkid-devel-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924449" comment="libblkid-devel-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924450" comment="libblkid-devel-static-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924451" comment="libblkid1-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924452" comment="libblkid1-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924453" comment="libfdisk-devel-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924454" comment="libfdisk-devel-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924455" comment="libfdisk-devel-static-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924456" comment="libfdisk1-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924457" comment="libfdisk1-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924458" comment="libmount-devel-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924459" comment="libmount-devel-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924460" comment="libmount-devel-static-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924461" comment="libmount1-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924462" comment="libmount1-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924463" comment="libsmartcols-devel-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924464" comment="libsmartcols-devel-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924465" comment="libsmartcols-devel-static-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924466" comment="libsmartcols1-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924467" comment="libsmartcols1-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924468" comment="libuuid-devel-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924469" comment="libuuid-devel-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924470" comment="libuuid-devel-static-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924471" comment="libuuid1-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924472" comment="libuuid1-32bit-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924473" comment="util-linux-2.37.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924474" comment="util-linux-lang-2.37.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250237" version="1" class="patch">
	<metadata>
		<title>tealdeer-1.5.0+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the tealdeer-1.5.0+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924475" comment="tealdeer-1.5.0+0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250238" version="1" class="patch">
	<metadata>
		<title>treefetch-2.0.0~git0.5b3eac1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the treefetch-2.0.0~git0.5b3eac1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924476" comment="treefetch-2.0.0~git0.5b3eac1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250239" version="1" class="patch">
	<metadata>
		<title>tuigreet-0.7.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the tuigreet-0.7.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924477" comment="tuigreet-0.7.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250240" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.53-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.53-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924478" comment="apache2-2.4.53-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250241" version="1" class="patch">
	<metadata>
		<title>cargo-audit-0.16.0~git0.625c965-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-0.16.0~git0.625c965-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924479" comment="cargo-audit-0.16.0~git0.625c965-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250242" version="1" class="patch">
	<metadata>
		<title>rage-encryption-0.7.1+0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the rage-encryption-0.7.1+0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924480" comment="rage-encryption-0.7.1+0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924481" comment="rage-encryption-bash-completion-0.7.1+0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250243" version="1" class="patch">
	<metadata>
		<title>rustup-1.24.3~0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.24.3~0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924482" comment="rustup-1.24.3~0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250244" version="1" class="patch">
	<metadata>
		<title>sccache-0.2.15~git0.6b6d2f7-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.2.15~git0.6b6d2f7-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924483" comment="sccache-0.2.15~git0.6b6d2f7-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250245" version="1" class="patch">
	<metadata>
		<title>cscreen-1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21945" ref_url="https://www.suse.com/security/cve/CVE-2022-21945/" source="CVE"/>
		<reference ref_id="CVE-2022-21946" ref_url="https://www.suse.com/security/cve/CVE-2022-21946/" source="CVE"/>
		<description>
These are all security issues fixed in the cscreen-1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21945/">CVE-2022-21945 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21945">CVE-2022-21945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21946/">CVE-2022-21946 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21946">CVE-2022-21946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924484" comment="cscreen-1.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250246" version="1" class="patch">
	<metadata>
		<title>firecracker-1.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the firecracker-1.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924485" comment="firecracker-1.0.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250247" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46705" ref_url="https://www.suse.com/security/cve/CVE-2021-46705/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-18.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46705/">CVE-2021-46705 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46705">CVE-2021-46705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924486" comment="grub2-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924487" comment="grub2-branding-upstream-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924488" comment="grub2-i386-pc-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924489" comment="grub2-i386-pc-debug-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924490" comment="grub2-snapper-plugin-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924491" comment="grub2-systemd-sleep-plugin-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924492" comment="grub2-x86_64-efi-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924493" comment="grub2-x86_64-efi-debug-2.06-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924494" comment="grub2-x86_64-xen-2.06-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250248" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924495" comment="libopenssl-3-devel-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924496" comment="libopenssl-3-devel-32bit-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924497" comment="libopenssl3-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924498" comment="libopenssl3-32bit-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924499" comment="openssl-3-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924500" comment="openssl-3-doc-3.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250249" version="1" class="patch">
	<metadata>
		<title>pleaser-0.5.1~git0.ce9627c-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the pleaser-0.5.1~git0.ce9627c-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924501" comment="pleaser-0.5.1~git0.ce9627c-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250250" version="1" class="patch">
	<metadata>
		<title>squid-5.4.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33620" ref_url="https://www.suse.com/security/cve/CVE-2021-33620/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-5.4.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33620/">CVE-2021-33620 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33620">CVE-2021-33620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924502" comment="squid-5.4.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250251" version="1" class="patch">
	<metadata>
		<title>xen-4.16.0_06-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.16.0_06-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924503" comment="xen-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924504" comment="xen-devel-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924505" comment="xen-doc-html-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924506" comment="xen-libs-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924507" comment="xen-libs-32bit-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924508" comment="xen-tools-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924509" comment="xen-tools-domU-4.16.0_06-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924510" comment="xen-tools-xendomains-wait-disk-4.16.0_06-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250252" version="1" class="patch">
	<metadata>
		<title>aws-nitro-enclaves-binaryblobs-upstream-1.2.0~git2.841ef94-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-nitro-enclaves-binaryblobs-upstream-1.2.0~git2.841ef94-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924511" comment="aws-nitro-enclaves-binaryblobs-upstream-1.2.0~git2.841ef94-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924512" comment="aws-nitro-enclaves-cli-1.2.0~git2.841ef94-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924513" comment="system-group-ne-1.2.0~git2.841ef94-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250253" version="1" class="patch">
	<metadata>
		<title>chromedriver-99.0.4844.74-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0971" ref_url="https://www.suse.com/security/cve/CVE-2022-0971/" source="CVE"/>
		<reference ref_id="CVE-2022-0972" ref_url="https://www.suse.com/security/cve/CVE-2022-0972/" source="CVE"/>
		<reference ref_id="CVE-2022-0973" ref_url="https://www.suse.com/security/cve/CVE-2022-0973/" source="CVE"/>
		<reference ref_id="CVE-2022-0974" ref_url="https://www.suse.com/security/cve/CVE-2022-0974/" source="CVE"/>
		<reference ref_id="CVE-2022-0975" ref_url="https://www.suse.com/security/cve/CVE-2022-0975/" source="CVE"/>
		<reference ref_id="CVE-2022-0976" ref_url="https://www.suse.com/security/cve/CVE-2022-0976/" source="CVE"/>
		<reference ref_id="CVE-2022-0977" ref_url="https://www.suse.com/security/cve/CVE-2022-0977/" source="CVE"/>
		<reference ref_id="CVE-2022-0978" ref_url="https://www.suse.com/security/cve/CVE-2022-0978/" source="CVE"/>
		<reference ref_id="CVE-2022-0979" ref_url="https://www.suse.com/security/cve/CVE-2022-0979/" source="CVE"/>
		<reference ref_id="CVE-2022-0980" ref_url="https://www.suse.com/security/cve/CVE-2022-0980/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-99.0.4844.74-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0971/">CVE-2022-0971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0971">CVE-2022-0971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0972/">CVE-2022-0972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0972">CVE-2022-0972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0973/">CVE-2022-0973 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0973">CVE-2022-0973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0974/">CVE-2022-0974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0974">CVE-2022-0974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0975/">CVE-2022-0975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0975">CVE-2022-0975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0976/">CVE-2022-0976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0976">CVE-2022-0976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0977/">CVE-2022-0977 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0977">CVE-2022-0977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0978/">CVE-2022-0978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0978">CVE-2022-0978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0979/">CVE-2022-0979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0979">CVE-2022-0979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0980/">CVE-2022-0980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0980">CVE-2022-0980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924514" comment="chromedriver-99.0.4844.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924515" comment="chromium-99.0.4844.74-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250254" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1n-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1n-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924516" comment="libopenssl-1_1-devel-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924517" comment="libopenssl-1_1-devel-32bit-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924518" comment="libopenssl1_1-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924519" comment="libopenssl1_1-32bit-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924520" comment="libopenssl1_1-hmac-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924521" comment="libopenssl1_1-hmac-32bit-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924522" comment="openssl-1_1-1.1.1n-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924523" comment="openssl-1_1-doc-1.1.1n-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250255" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-4.0.39-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24349" ref_url="https://www.suse.com/security/cve/CVE-2022-24349/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-4.0.39-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24349/">CVE-2022-24349 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24349">CVE-2022-24349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924524" comment="zabbix-agent-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924525" comment="zabbix-java-gateway-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924526" comment="zabbix-phpfrontend-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924527" comment="zabbix-proxy-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924528" comment="zabbix-proxy-mysql-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924529" comment="zabbix-proxy-postgresql-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924530" comment="zabbix-proxy-sqlite-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924531" comment="zabbix-server-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924532" comment="zabbix-server-mysql-4.0.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924533" comment="zabbix-server-postgresql-4.0.39-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250256" version="1" class="patch">
	<metadata>
		<title>arm-trusted-firmware-2.6-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23960" ref_url="https://www.suse.com/security/cve/CVE-2022-23960/" source="CVE"/>
		<description>
These are all security issues fixed in the arm-trusted-firmware-2.6-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23960/">CVE-2022-23960 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924534" comment="arm-trusted-firmware-2.6-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924535" comment="arm-trusted-firmware-tools-2.6-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250257" version="1" class="patch">
	<metadata>
		<title>fish-3.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-20001" ref_url="https://www.suse.com/security/cve/CVE-2022-20001/" source="CVE"/>
		<description>
These are all security issues fixed in the fish-3.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20001/">CVE-2022-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20001">CVE-2022-20001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924536" comment="fish-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924537" comment="fish-devel-3.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250258" version="1" class="patch">
	<metadata>
		<title>git-delta-0.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the git-delta-0.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924538" comment="git-delta-0.12.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250259" version="1" class="patch">
	<metadata>
		<title>libwavpack1-32bit-5.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-32bit-5.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44269">CVE-2021-44269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924539" comment="libwavpack1-5.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924540" comment="libwavpack1-32bit-5.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924541" comment="wavpack-5.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924542" comment="wavpack-devel-5.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250260" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.16.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0886" ref_url="https://www.suse.com/security/cve/CVE-2022-0886/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.16.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0886/">CVE-2022-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0886">CVE-2022-0886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924544" comment="kernel-macros-5.16.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924545" comment="kernel-source-5.16.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924546" comment="kernel-source-vanilla-5.16.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250261" version="1" class="patch">
	<metadata>
		<title>libtcmu2-1.5.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<description>
These are all security issues fixed in the libtcmu2-1.5.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924547" comment="libtcmu2-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924548" comment="tcmu-runner-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924549" comment="tcmu-runner-handler-glusterfs-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924550" comment="tcmu-runner-handler-rbd-1.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924551" comment="tcmu-runner-handler-zbc-1.5.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250262" version="1" class="patch">
	<metadata>
		<title>kanidm-1.1.0~alpha7~git0.c8468199-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the kanidm-1.1.0~alpha7~git0.c8468199-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924552" comment="kanidm-1.1.0~alpha7~git0.c8468199-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924553" comment="kanidm-clients-1.1.0~alpha7~git0.c8468199-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924554" comment="kanidm-docs-1.1.0~alpha7~git0.c8468199-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924555" comment="kanidm-server-1.1.0~alpha7~git0.c8468199-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924556" comment="kanidm-unixd-clients-1.1.0~alpha7~git0.c8468199-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250263" version="1" class="patch">
	<metadata>
		<title>python310-waitress-2.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-waitress-2.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24761">CVE-2022-24761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924557" comment="python310-waitress-2.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924558" comment="python38-waitress-2.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924559" comment="python39-waitress-2.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250264" version="1" class="patch">
	<metadata>
		<title>abcm2ps-8.14.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32434" ref_url="https://www.suse.com/security/cve/CVE-2021-32434/" source="CVE"/>
		<reference ref_id="CVE-2021-32435" ref_url="https://www.suse.com/security/cve/CVE-2021-32435/" source="CVE"/>
		<description>
These are all security issues fixed in the abcm2ps-8.14.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32434/">CVE-2021-32434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32434">CVE-2021-32434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32435/">CVE-2021-32435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32435">CVE-2021-32435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924560" comment="abcm2ps-8.14.13-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250265" version="1" class="patch">
	<metadata>
		<title>libcrypto47-3.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the libcrypto47-3.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924561" comment="libcrypto47-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924562" comment="libcrypto47-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924563" comment="libressl-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924564" comment="libressl-devel-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924565" comment="libressl-devel-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924566" comment="libressl-devel-doc-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924567" comment="libssl50-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924568" comment="libssl50-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924569" comment="libtls22-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924570" comment="libtls22-32bit-3.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250266" version="1" class="patch">
	<metadata>
		<title>parsec-1.0.0~rc3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the parsec-1.0.0~rc3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924571" comment="parsec-1.0.0~rc3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250267" version="1" class="patch">
	<metadata>
		<title>parsec-tool-0.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the parsec-tool-0.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924572" comment="parsec-tool-0.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250268" version="1" class="patch">
	<metadata>
		<title>apptainer-1.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924573" comment="apptainer-1.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250269" version="1" class="patch">
	<metadata>
		<title>spotifyd-0.3.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the spotifyd-0.3.3-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924574" comment="spotifyd-0.3.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250270" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924575" comment="cyrus-sasl-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924576" comment="cyrus-sasl-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924577" comment="cyrus-sasl-crammd5-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924578" comment="cyrus-sasl-crammd5-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924579" comment="cyrus-sasl-devel-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924580" comment="cyrus-sasl-devel-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924581" comment="cyrus-sasl-digestmd5-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924582" comment="cyrus-sasl-digestmd5-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924583" comment="cyrus-sasl-gs2-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924584" comment="cyrus-sasl-gssapi-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924585" comment="cyrus-sasl-gssapi-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924586" comment="cyrus-sasl-ntlm-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924587" comment="cyrus-sasl-otp-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924588" comment="cyrus-sasl-otp-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924589" comment="cyrus-sasl-plain-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924590" comment="cyrus-sasl-plain-32bit-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924591" comment="cyrus-sasl-scram-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924592" comment="libsasl2-3-2.1.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924593" comment="libsasl2-3-32bit-2.1.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250271" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924594" comment="libxml2-2-2.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924595" comment="libxml2-2-32bit-2.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924596" comment="libxml2-devel-2.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924597" comment="libxml2-devel-32bit-2.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924598" comment="libxml2-doc-2.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924599" comment="libxml2-tools-2.9.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250272" version="1" class="patch">
	<metadata>
		<title>libvlc5-3.0.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-3.0.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924600" comment="libvlc5-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924601" comment="libvlccore9-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924602" comment="vlc-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924603" comment="vlc-codec-gstreamer-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924604" comment="vlc-devel-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924605" comment="vlc-jack-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924606" comment="vlc-lang-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924607" comment="vlc-noX-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924608" comment="vlc-opencv-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924609" comment="vlc-qt-3.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924610" comment="vlc-vdpau-3.0.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250273" version="1" class="patch">
	<metadata>
		<title>389-ds-2.0.14~git25.e6431d959-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-2.0.14~git25.e6431d959-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924611" comment="389-ds-2.0.14~git25.e6431d959-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924612" comment="389-ds-devel-2.0.14~git25.e6431d959-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924613" comment="389-ds-snmp-2.0.14~git25.e6431d959-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924614" comment="lib389-2.0.14~git25.e6431d959-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924615" comment="libsvrcore0-2.0.14~git25.e6431d959-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250274" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20220323-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20220323-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924616" comment="cargo-audit-advisory-db-20220323-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250275" version="1" class="patch">
	<metadata>
		<title>pdns-4.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27227" ref_url="https://www.suse.com/security/cve/CVE-2022-27227/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-4.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27227/">CVE-2022-27227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27227">CVE-2022-27227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924617" comment="pdns-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924618" comment="pdns-backend-geoip-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924619" comment="pdns-backend-godbc-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924620" comment="pdns-backend-ldap-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924621" comment="pdns-backend-lmdb-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924622" comment="pdns-backend-lua-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924623" comment="pdns-backend-mysql-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924624" comment="pdns-backend-postgresql-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924625" comment="pdns-backend-remote-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924626" comment="pdns-backend-sqlite3-4.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250276" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27227" ref_url="https://www.suse.com/security/cve/CVE-2022-27227/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27227/">CVE-2022-27227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27227">CVE-2022-27227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924627" comment="pdns-recursor-4.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250277" version="1" class="patch">
	<metadata>
		<title>python310-mitmproxy-8.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24766" ref_url="https://www.suse.com/security/cve/CVE-2022-24766/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mitmproxy-8.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24766/">CVE-2022-24766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24766">CVE-2022-24766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924628" comment="python310-mitmproxy-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924629" comment="python38-mitmproxy-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924630" comment="python39-mitmproxy-8.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250278" version="1" class="patch">
	<metadata>
		<title>chromedriver-99.0.4844.84-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-99.0.4844.84-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1096">CVE-2022-1096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924631" comment="chromedriver-99.0.4844.84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924632" comment="chromium-99.0.4844.84-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250279" version="1" class="patch">
	<metadata>
		<title>python310-nltk-3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3828" ref_url="https://www.suse.com/security/cve/CVE-2021-3828/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-nltk-3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3828/">CVE-2021-3828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3828">CVE-2021-3828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924633" comment="python310-nltk-3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924634" comment="python38-nltk-3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924635" comment="python39-nltk-3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250280" version="1" class="patch">
	<metadata>
		<title>zsh-5.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<description>
These are all security issues fixed in the zsh-5.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924636" comment="zsh-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924637" comment="zsh-htmldoc-5.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250281" version="1" class="patch">
	<metadata>
		<title>aide-0.17.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
These are all security issues fixed in the aide-0.17.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924638" comment="aide-0.17.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924639" comment="aide-test-0.17.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250282" version="1" class="patch">
	<metadata>
		<title>c3p0-0.9.5.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-5427" ref_url="https://www.suse.com/security/cve/CVE-2019-5427/" source="CVE"/>
		<description>
These are all security issues fixed in the c3p0-0.9.5.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5427/">CVE-2019-5427 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5427">CVE-2019-5427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924640" comment="c3p0-0.9.5.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924641" comment="c3p0-javadoc-0.9.5.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250283" version="1" class="patch">
	<metadata>
		<title>newsboat-2.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the newsboat-2.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924642" comment="newsboat-2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924643" comment="newsboat-lang-2.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250284" version="1" class="patch">
	<metadata>
		<title>389-ds-2.1.1~git4.b7f891097-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-2.1.1~git4.b7f891097-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924644" comment="389-ds-2.1.1~git4.b7f891097-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924645" comment="389-ds-devel-2.1.1~git4.b7f891097-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924646" comment="389-ds-snmp-2.1.1~git4.b7f891097-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924647" comment="lib389-2.1.1~git4.b7f891097-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924648" comment="libsvrcore0-2.1.1~git4.b7f891097-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250285" version="1" class="patch">
	<metadata>
		<title>buildah-1.25.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.25.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27651">CVE-2022-27651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924649" comment="buildah-1.25.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250286" version="1" class="patch">
	<metadata>
		<title>kubeseal-0.17.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<description>
These are all security issues fixed in the kubeseal-0.17.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924650" comment="kubeseal-0.17.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250287" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.11-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.11-19.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924651" comment="libminizip1-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924652" comment="libminizip1-32bit-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924653" comment="libz1-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924654" comment="libz1-32bit-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924655" comment="minizip-devel-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924656" comment="zlib-devel-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924657" comment="zlib-devel-32bit-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924658" comment="zlib-devel-static-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924659" comment="zlib-devel-static-32bit-1.2.11-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924660" comment="zlib-testsuite-1.2.11-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250288" version="1" class="patch">
	<metadata>
		<title>chromedriver-100.0.4896.60-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1125" ref_url="https://www.suse.com/security/cve/CVE-2022-1125/" source="CVE"/>
		<reference ref_id="CVE-2022-1127" ref_url="https://www.suse.com/security/cve/CVE-2022-1127/" source="CVE"/>
		<reference ref_id="CVE-2022-1128" ref_url="https://www.suse.com/security/cve/CVE-2022-1128/" source="CVE"/>
		<reference ref_id="CVE-2022-1129" ref_url="https://www.suse.com/security/cve/CVE-2022-1129/" source="CVE"/>
		<reference ref_id="CVE-2022-1130" ref_url="https://www.suse.com/security/cve/CVE-2022-1130/" source="CVE"/>
		<reference ref_id="CVE-2022-1131" ref_url="https://www.suse.com/security/cve/CVE-2022-1131/" source="CVE"/>
		<reference ref_id="CVE-2022-1132" ref_url="https://www.suse.com/security/cve/CVE-2022-1132/" source="CVE"/>
		<reference ref_id="CVE-2022-1133" ref_url="https://www.suse.com/security/cve/CVE-2022-1133/" source="CVE"/>
		<reference ref_id="CVE-2022-1134" ref_url="https://www.suse.com/security/cve/CVE-2022-1134/" source="CVE"/>
		<reference ref_id="CVE-2022-1135" ref_url="https://www.suse.com/security/cve/CVE-2022-1135/" source="CVE"/>
		<reference ref_id="CVE-2022-1136" ref_url="https://www.suse.com/security/cve/CVE-2022-1136/" source="CVE"/>
		<reference ref_id="CVE-2022-1137" ref_url="https://www.suse.com/security/cve/CVE-2022-1137/" source="CVE"/>
		<reference ref_id="CVE-2022-1138" ref_url="https://www.suse.com/security/cve/CVE-2022-1138/" source="CVE"/>
		<reference ref_id="CVE-2022-1139" ref_url="https://www.suse.com/security/cve/CVE-2022-1139/" source="CVE"/>
		<reference ref_id="CVE-2022-1141" ref_url="https://www.suse.com/security/cve/CVE-2022-1141/" source="CVE"/>
		<reference ref_id="CVE-2022-1142" ref_url="https://www.suse.com/security/cve/CVE-2022-1142/" source="CVE"/>
		<reference ref_id="CVE-2022-1143" ref_url="https://www.suse.com/security/cve/CVE-2022-1143/" source="CVE"/>
		<reference ref_id="CVE-2022-1144" ref_url="https://www.suse.com/security/cve/CVE-2022-1144/" source="CVE"/>
		<reference ref_id="CVE-2022-1145" ref_url="https://www.suse.com/security/cve/CVE-2022-1145/" source="CVE"/>
		<reference ref_id="CVE-2022-1146" ref_url="https://www.suse.com/security/cve/CVE-2022-1146/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-100.0.4896.60-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1125/">CVE-2022-1125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1125">CVE-2022-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1127/">CVE-2022-1127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1127">CVE-2022-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1128/">CVE-2022-1128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1128">CVE-2022-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1129/">CVE-2022-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1129">CVE-2022-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1130/">CVE-2022-1130 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1130">CVE-2022-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1131/">CVE-2022-1131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1131">CVE-2022-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1132/">CVE-2022-1132 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1132">CVE-2022-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1133/">CVE-2022-1133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1133">CVE-2022-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1134/">CVE-2022-1134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1134">CVE-2022-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1135/">CVE-2022-1135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1135">CVE-2022-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1136/">CVE-2022-1136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1136">CVE-2022-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1137/">CVE-2022-1137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1137">CVE-2022-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1138/">CVE-2022-1138 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1138">CVE-2022-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1139/">CVE-2022-1139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1139">CVE-2022-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1141/">CVE-2022-1141 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1141">CVE-2022-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1142/">CVE-2022-1142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1142">CVE-2022-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1143/">CVE-2022-1143 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1143">CVE-2022-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1144/">CVE-2022-1144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1144">CVE-2022-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1145/">CVE-2022-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1145">CVE-2022-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1146/">CVE-2022-1146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1146">CVE-2022-1146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924661" comment="chromedriver-100.0.4896.60-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924662" comment="chromium-100.0.4896.60-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250289" version="1" class="patch">
	<metadata>
		<title>openvpn-2.5.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.5.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924663" comment="openvpn-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924664" comment="openvpn-auth-pam-plugin-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924665" comment="openvpn-devel-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924666" comment="openvpn-down-root-plugin-2.5.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250290" version="1" class="patch">
	<metadata>
		<title>qemu-6.2.0-44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3929" ref_url="https://www.suse.com/security/cve/CVE-2021-3929/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.2.0-44.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3929/">CVE-2021-3929 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3929">CVE-2021-3929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924667" comment="qemu-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924668" comment="qemu-SLOF-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924669" comment="qemu-accel-qtest-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924670" comment="qemu-accel-tcg-x86-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924671" comment="qemu-arm-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924672" comment="qemu-audio-alsa-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924673" comment="qemu-audio-jack-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924674" comment="qemu-audio-oss-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924675" comment="qemu-audio-pa-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924676" comment="qemu-audio-spice-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924677" comment="qemu-block-curl-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924678" comment="qemu-block-dmg-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924679" comment="qemu-block-gluster-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924680" comment="qemu-block-iscsi-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924681" comment="qemu-block-nfs-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924682" comment="qemu-block-rbd-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924683" comment="qemu-block-ssh-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924684" comment="qemu-chardev-baum-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924685" comment="qemu-chardev-spice-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924686" comment="qemu-extra-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924687" comment="qemu-guest-agent-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924688" comment="qemu-hw-display-qxl-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924689" comment="qemu-hw-display-virtio-gpu-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924690" comment="qemu-hw-display-virtio-gpu-pci-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924691" comment="qemu-hw-display-virtio-vga-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924692" comment="qemu-hw-s390x-virtio-gpu-ccw-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924693" comment="qemu-hw-usb-host-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924694" comment="qemu-hw-usb-redirect-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924695" comment="qemu-hw-usb-smartcard-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924696" comment="qemu-ipxe-1.0.0+-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924697" comment="qemu-ivshmem-tools-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924698" comment="qemu-ksm-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924699" comment="qemu-kvm-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924700" comment="qemu-lang-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924701" comment="qemu-microvm-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924702" comment="qemu-ppc-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924703" comment="qemu-s390x-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924704" comment="qemu-seabios-1.15.0_0_g2dd4b9b-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924705" comment="qemu-sgabios-8-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924706" comment="qemu-skiboot-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924707" comment="qemu-tools-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924708" comment="qemu-ui-curses-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924709" comment="qemu-ui-gtk-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924710" comment="qemu-ui-opengl-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924711" comment="qemu-ui-spice-app-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924712" comment="qemu-ui-spice-core-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924713" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924714" comment="qemu-vhost-user-gpu-6.2.0-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924715" comment="qemu-x86-6.2.0-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250291" version="1" class="patch">
	<metadata>
		<title>python3-salt-3004-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3004-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22934">CVE-2022-22934 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22935">CVE-2022-22935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22936">CVE-2022-22936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22941">CVE-2022-22941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924716" comment="python3-salt-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924717" comment="salt-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924718" comment="salt-api-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924719" comment="salt-bash-completion-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924720" comment="salt-cloud-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924721" comment="salt-doc-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924722" comment="salt-fish-completion-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924723" comment="salt-master-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924724" comment="salt-minion-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924725" comment="salt-proxy-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924726" comment="salt-ssh-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924727" comment="salt-standalone-formulas-configuration-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924728" comment="salt-syndic-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924729" comment="salt-transactional-update-3004-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924730" comment="salt-zsh-completion-3004-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250292" version="1" class="patch">
	<metadata>
		<title>chromedriver-100.0.4896.75-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1232" ref_url="https://www.suse.com/security/cve/CVE-2022-1232/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-100.0.4896.75-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1232/">CVE-2022-1232 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1232">CVE-2022-1232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924731" comment="chromedriver-100.0.4896.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924732" comment="chromium-100.0.4896.75-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250293" version="1" class="patch">
	<metadata>
		<title>libvirt-8.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-8.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924733" comment="libvirt-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924734" comment="libvirt-client-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924735" comment="libvirt-daemon-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924736" comment="libvirt-daemon-config-network-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924737" comment="libvirt-daemon-config-nwfilter-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924738" comment="libvirt-daemon-driver-interface-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924739" comment="libvirt-daemon-driver-libxl-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924740" comment="libvirt-daemon-driver-lxc-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924741" comment="libvirt-daemon-driver-network-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924742" comment="libvirt-daemon-driver-nodedev-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924743" comment="libvirt-daemon-driver-nwfilter-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924744" comment="libvirt-daemon-driver-qemu-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924745" comment="libvirt-daemon-driver-secret-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924746" comment="libvirt-daemon-driver-storage-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924747" comment="libvirt-daemon-driver-storage-core-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924748" comment="libvirt-daemon-driver-storage-disk-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924749" comment="libvirt-daemon-driver-storage-gluster-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924750" comment="libvirt-daemon-driver-storage-iscsi-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924751" comment="libvirt-daemon-driver-storage-iscsi-direct-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924752" comment="libvirt-daemon-driver-storage-logical-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924753" comment="libvirt-daemon-driver-storage-mpath-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924754" comment="libvirt-daemon-driver-storage-rbd-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924755" comment="libvirt-daemon-driver-storage-scsi-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924756" comment="libvirt-daemon-hooks-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924757" comment="libvirt-daemon-lxc-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924758" comment="libvirt-daemon-qemu-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924759" comment="libvirt-daemon-xen-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924760" comment="libvirt-devel-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924761" comment="libvirt-devel-32bit-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924762" comment="libvirt-doc-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924763" comment="libvirt-libs-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924764" comment="libvirt-lock-sanlock-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924765" comment="libvirt-nss-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924766" comment="wireshark-plugin-libvirt-8.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250294" version="1" class="patch">
	<metadata>
		<title>libQt6Pdf6-6.2.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0971" ref_url="https://www.suse.com/security/cve/CVE-2022-0971/" source="CVE"/>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Pdf6-6.2.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0971/">CVE-2022-0971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0971">CVE-2022-0971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1096">CVE-2022-1096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924767" comment="libQt6Pdf6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924768" comment="libQt6PdfQuick6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924769" comment="libQt6PdfWidgets6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924770" comment="libQt6WebEngineCore6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924771" comment="libQt6WebEngineQuick6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924772" comment="libQt6WebEngineWidgets6-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924773" comment="qt6-pdf-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924774" comment="qt6-pdf-imports-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924775" comment="qt6-pdf-private-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924776" comment="qt6-pdfquick-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924777" comment="qt6-pdfquick-private-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924778" comment="qt6-pdfwidgets-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924779" comment="qt6-pdfwidgets-private-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924780" comment="qt6-webengine-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924781" comment="qt6-webengine-examples-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924782" comment="qt6-webengine-imports-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924783" comment="qt6-webenginecore-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924784" comment="qt6-webenginecore-private-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924785" comment="qt6-webenginequick-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924786" comment="qt6-webenginequick-private-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924787" comment="qt6-webenginewidgets-devel-6.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924788" comment="qt6-webenginewidgets-private-devel-6.2.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250295" version="1" class="patch">
	<metadata>
		<title>qutebrowser-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<description>
These are all security issues fixed in the qutebrowser-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924789" comment="qutebrowser-2.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250296" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-99.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28283" ref_url="https://www.suse.com/security/cve/CVE-2022-28283/" source="CVE"/>
		<reference ref_id="CVE-2022-28284" ref_url="https://www.suse.com/security/cve/CVE-2022-28284/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28287" ref_url="https://www.suse.com/security/cve/CVE-2022-28287/" source="CVE"/>
		<reference ref_id="CVE-2022-28288" ref_url="https://www.suse.com/security/cve/CVE-2022-28288/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-99.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28283/">CVE-2022-28283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28283">CVE-2022-28283 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28284/">CVE-2022-28284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28284">CVE-2022-28284 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-28287/">CVE-2022-28287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28287">CVE-2022-28287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28288/">CVE-2022-28288 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28288">CVE-2022-28288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924790" comment="MozillaFirefox-99.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924791" comment="MozillaFirefox-branding-upstream-99.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924792" comment="MozillaFirefox-devel-99.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924793" comment="MozillaFirefox-translations-common-99.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924794" comment="MozillaFirefox-translations-other-99.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250297" version="1" class="patch">
	<metadata>
		<title>htcondor-9.0.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45103" ref_url="https://www.suse.com/security/cve/CVE-2021-45103/" source="CVE"/>
		<reference ref_id="CVE-2021-45104" ref_url="https://www.suse.com/security/cve/CVE-2021-45104/" source="CVE"/>
		<reference ref_id="CVE-2022-26110" ref_url="https://www.suse.com/security/cve/CVE-2022-26110/" source="CVE"/>
		<description>
These are all security issues fixed in the htcondor-9.0.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45103/">CVE-2021-45103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45103">CVE-2021-45103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45104/">CVE-2021-45104 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45104">CVE-2021-45104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26110/">CVE-2022-26110 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26110">CVE-2022-26110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924795" comment="htcondor-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924796" comment="htcondor-bosco-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924797" comment="htcondor-classads-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924798" comment="htcondor-classads-devel-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924799" comment="htcondor-credmon-oauth-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924800" comment="htcondor-credmon-vault-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924801" comment="htcondor-devel-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924802" comment="htcondor-doc-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924803" comment="htcondor-kbdd-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924804" comment="htcondor-procd-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924805" comment="htcondor-vm-gahp-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924806" comment="minicondor-9.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924807" comment="python3-condor-9.0.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250298" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0971" ref_url="https://www.suse.com/security/cve/CVE-2022-0971/" source="CVE"/>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0971/">CVE-2022-0971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0971">CVE-2022-0971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1096">CVE-2022-1096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924808" comment="libQt5Pdf5-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924809" comment="libQt5PdfWidgets5-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924810" comment="libqt5-qtpdf-devel-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924811" comment="libqt5-qtpdf-examples-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924812" comment="libqt5-qtpdf-imports-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924813" comment="libqt5-qtpdf-private-headers-devel-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924814" comment="libqt5-qtwebengine-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924815" comment="libqt5-qtwebengine-devel-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924816" comment="libqt5-qtwebengine-examples-5.15.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924817" comment="libqt5-qtwebengine-private-headers-devel-5.15.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250299" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-22.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21716" ref_url="https://www.suse.com/security/cve/CVE-2022-21716/" source="CVE"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-22.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21716/">CVE-2022-21716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21716">CVE-2022-21716 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924818" comment="python-Twisted-doc-22.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924819" comment="python310-Twisted-22.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924820" comment="python38-Twisted-22.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924821" comment="python39-Twisted-22.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250300" version="1" class="patch">
	<metadata>
		<title>xen-4.16.0_08-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.16.0_08-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924822" comment="xen-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924823" comment="xen-devel-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924824" comment="xen-doc-html-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924825" comment="xen-libs-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924826" comment="xen-libs-32bit-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924827" comment="xen-tools-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924828" comment="xen-tools-domU-4.16.0_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924829" comment="xen-tools-xendomains-wait-disk-4.16.0_08-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250301" version="1" class="patch">
	<metadata>
		<title>itextpdf-5.5.13.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43113" ref_url="https://www.suse.com/security/cve/CVE-2021-43113/" source="CVE"/>
		<description>
These are all security issues fixed in the itextpdf-5.5.13.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43113/">CVE-2021-43113 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43113">CVE-2021-43113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924830" comment="itextpdf-5.5.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924831" comment="itextpdf-javadoc-5.5.13.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250302" version="1" class="patch">
	<metadata>
		<title>netty3-3.10.6-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43797" ref_url="https://www.suse.com/security/cve/CVE-2021-43797/" source="CVE"/>
		<description>
These are all security issues fixed in the netty3-3.10.6-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43797/">CVE-2021-43797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43797">CVE-2021-43797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924832" comment="netty3-3.10.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924833" comment="netty3-javadoc-3.10.6-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250303" version="1" class="patch">
	<metadata>
		<title>podman-4.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924834" comment="podman-4.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924835" comment="podman-cni-config-4.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924836" comment="podman-docker-4.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924837" comment="podman-remote-4.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250304" version="1" class="patch">
	<metadata>
		<title>python-onionshare-2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21688" ref_url="https://www.suse.com/security/cve/CVE-2022-21688/" source="CVE"/>
		<reference ref_id="CVE-2022-21690" ref_url="https://www.suse.com/security/cve/CVE-2022-21690/" source="CVE"/>
		<reference ref_id="CVE-2022-21691" ref_url="https://www.suse.com/security/cve/CVE-2022-21691/" source="CVE"/>
		<reference ref_id="CVE-2022-21692" ref_url="https://www.suse.com/security/cve/CVE-2022-21692/" source="CVE"/>
		<reference ref_id="CVE-2022-21693" ref_url="https://www.suse.com/security/cve/CVE-2022-21693/" source="CVE"/>
		<reference ref_id="CVE-2022-21694" ref_url="https://www.suse.com/security/cve/CVE-2022-21694/" source="CVE"/>
		<reference ref_id="CVE-2022-21695" ref_url="https://www.suse.com/security/cve/CVE-2022-21695/" source="CVE"/>
		<reference ref_id="CVE-2022-21696" ref_url="https://www.suse.com/security/cve/CVE-2022-21696/" source="CVE"/>
		<description>
These are all security issues fixed in the python-onionshare-2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21688/">CVE-2022-21688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21688">CVE-2022-21688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21690/">CVE-2022-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21690">CVE-2022-21690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21691/">CVE-2022-21691 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21691">CVE-2022-21691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21692/">CVE-2022-21692 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21692">CVE-2022-21692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21693/">CVE-2022-21693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21693">CVE-2022-21693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21694/">CVE-2022-21694 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21694">CVE-2022-21694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21695/">CVE-2022-21695 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21695">CVE-2022-21695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21696/">CVE-2022-21696 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21696">CVE-2022-21696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924838" comment="python-onionshare-2.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250305" version="1" class="patch">
	<metadata>
		<title>SDL-devel-1.2.15-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL-devel-1.2.15-24.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924839" comment="SDL-devel-1.2.15-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924840" comment="SDL-devel-32bit-1.2.15-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924841" comment="SDL-devel-doc-1.2.15-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924842" comment="libSDL-1_2-0-1.2.15-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924843" comment="libSDL-1_2-0-32bit-1.2.15-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250306" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0100" ref_url="https://www.suse.com/security/cve/CVE-2022-0100/" source="CVE"/>
		<reference ref_id="CVE-2022-0102" ref_url="https://www.suse.com/security/cve/CVE-2022-0102/" source="CVE"/>
		<reference ref_id="CVE-2022-0103" ref_url="https://www.suse.com/security/cve/CVE-2022-0103/" source="CVE"/>
		<reference ref_id="CVE-2022-0104" ref_url="https://www.suse.com/security/cve/CVE-2022-0104/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-0109" ref_url="https://www.suse.com/security/cve/CVE-2022-0109/" source="CVE"/>
		<reference ref_id="CVE-2022-0111" ref_url="https://www.suse.com/security/cve/CVE-2022-0111/" source="CVE"/>
		<reference ref_id="CVE-2022-0113" ref_url="https://www.suse.com/security/cve/CVE-2022-0113/" source="CVE"/>
		<reference ref_id="CVE-2022-0116" ref_url="https://www.suse.com/security/cve/CVE-2022-0116/" source="CVE"/>
		<reference ref_id="CVE-2022-0289" ref_url="https://www.suse.com/security/cve/CVE-2022-0289/" source="CVE"/>
		<reference ref_id="CVE-2022-0291" ref_url="https://www.suse.com/security/cve/CVE-2022-0291/" source="CVE"/>
		<reference ref_id="CVE-2022-0293" ref_url="https://www.suse.com/security/cve/CVE-2022-0293/" source="CVE"/>
		<reference ref_id="CVE-2022-0298" ref_url="https://www.suse.com/security/cve/CVE-2022-0298/" source="CVE"/>
		<reference ref_id="CVE-2022-0305" ref_url="https://www.suse.com/security/cve/CVE-2022-0305/" source="CVE"/>
		<reference ref_id="CVE-2022-0306" ref_url="https://www.suse.com/security/cve/CVE-2022-0306/" source="CVE"/>
		<reference ref_id="CVE-2022-0310" ref_url="https://www.suse.com/security/cve/CVE-2022-0310/" source="CVE"/>
		<reference ref_id="CVE-2022-0456" ref_url="https://www.suse.com/security/cve/CVE-2022-0456/" source="CVE"/>
		<reference ref_id="CVE-2022-0459" ref_url="https://www.suse.com/security/cve/CVE-2022-0459/" source="CVE"/>
		<reference ref_id="CVE-2022-0460" ref_url="https://www.suse.com/security/cve/CVE-2022-0460/" source="CVE"/>
		<reference ref_id="CVE-2022-0461" ref_url="https://www.suse.com/security/cve/CVE-2022-0461/" source="CVE"/>
		<reference ref_id="CVE-2022-0606" ref_url="https://www.suse.com/security/cve/CVE-2022-0606/" source="CVE"/>
		<reference ref_id="CVE-2022-0607" ref_url="https://www.suse.com/security/cve/CVE-2022-0607/" source="CVE"/>
		<reference ref_id="CVE-2022-0608" ref_url="https://www.suse.com/security/cve/CVE-2022-0608/" source="CVE"/>
		<reference ref_id="CVE-2022-0609" ref_url="https://www.suse.com/security/cve/CVE-2022-0609/" source="CVE"/>
		<reference ref_id="CVE-2022-0610" ref_url="https://www.suse.com/security/cve/CVE-2022-0610/" source="CVE"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0100/">CVE-2022-0100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0100">CVE-2022-0100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0102/">CVE-2022-0102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0102">CVE-2022-0102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0103/">CVE-2022-0103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0103">CVE-2022-0103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0104/">CVE-2022-0104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0104">CVE-2022-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0108">CVE-2022-0108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0109/">CVE-2022-0109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0109">CVE-2022-0109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0111/">CVE-2022-0111 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0111">CVE-2022-0111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0113/">CVE-2022-0113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0113">CVE-2022-0113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0116/">CVE-2022-0116 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0116">CVE-2022-0116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0289/">CVE-2022-0289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0289">CVE-2022-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0291/">CVE-2022-0291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0291">CVE-2022-0291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0293/">CVE-2022-0293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0293">CVE-2022-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0298/">CVE-2022-0298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0298">CVE-2022-0298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0305/">CVE-2022-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0305">CVE-2022-0305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0306/">CVE-2022-0306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0306">CVE-2022-0306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0310/">CVE-2022-0310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0310">CVE-2022-0310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0456/">CVE-2022-0456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0456">CVE-2022-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0459/">CVE-2022-0459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0459">CVE-2022-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0460/">CVE-2022-0460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0460">CVE-2022-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0461/">CVE-2022-0461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0461">CVE-2022-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0606/">CVE-2022-0606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0606">CVE-2022-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0607/">CVE-2022-0607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0607">CVE-2022-0607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0608/">CVE-2022-0608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0608">CVE-2022-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0609/">CVE-2022-0609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0609">CVE-2022-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0610/">CVE-2022-0610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0610">CVE-2022-0610 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924844" comment="libQt5Pdf5-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924845" comment="libQt5PdfWidgets5-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924846" comment="libqt5-qtpdf-devel-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924847" comment="libqt5-qtpdf-examples-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924848" comment="libqt5-qtpdf-imports-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924849" comment="libqt5-qtpdf-private-headers-devel-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924850" comment="libqt5-qtwebengine-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924851" comment="libqt5-qtwebengine-devel-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924852" comment="libqt5-qtwebengine-examples-5.15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924853" comment="libqt5-qtwebengine-private-headers-devel-5.15.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250307" version="1" class="patch">
	<metadata>
		<title>squashfs-4.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924854" comment="squashfs-4.5.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250308" version="1" class="patch">
	<metadata>
		<title>apache2-mod_apparmor-3.0.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_apparmor-3.0.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924855" comment="apache2-mod_apparmor-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924856" comment="apparmor-abstractions-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924857" comment="apparmor-docs-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924858" comment="apparmor-parser-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924859" comment="apparmor-parser-lang-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924860" comment="apparmor-profiles-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924861" comment="apparmor-utils-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924862" comment="apparmor-utils-lang-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924863" comment="pam_apparmor-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924864" comment="pam_apparmor-32bit-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924865" comment="perl-apparmor-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924866" comment="python3-apparmor-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924867" comment="ruby-apparmor-3.0.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250309" version="1" class="patch">
	<metadata>
		<title>chromedriver-100.0.4896.88-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1305" ref_url="https://www.suse.com/security/cve/CVE-2022-1305/" source="CVE"/>
		<reference ref_id="CVE-2022-1306" ref_url="https://www.suse.com/security/cve/CVE-2022-1306/" source="CVE"/>
		<reference ref_id="CVE-2022-1307" ref_url="https://www.suse.com/security/cve/CVE-2022-1307/" source="CVE"/>
		<reference ref_id="CVE-2022-1308" ref_url="https://www.suse.com/security/cve/CVE-2022-1308/" source="CVE"/>
		<reference ref_id="CVE-2022-1309" ref_url="https://www.suse.com/security/cve/CVE-2022-1309/" source="CVE"/>
		<reference ref_id="CVE-2022-1310" ref_url="https://www.suse.com/security/cve/CVE-2022-1310/" source="CVE"/>
		<reference ref_id="CVE-2022-1311" ref_url="https://www.suse.com/security/cve/CVE-2022-1311/" source="CVE"/>
		<reference ref_id="CVE-2022-1312" ref_url="https://www.suse.com/security/cve/CVE-2022-1312/" source="CVE"/>
		<reference ref_id="CVE-2022-1313" ref_url="https://www.suse.com/security/cve/CVE-2022-1313/" source="CVE"/>
		<reference ref_id="CVE-2022-1314" ref_url="https://www.suse.com/security/cve/CVE-2022-1314/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-100.0.4896.88-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1305/">CVE-2022-1305 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1305">CVE-2022-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1306/">CVE-2022-1306 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1306">CVE-2022-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1307/">CVE-2022-1307 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1307">CVE-2022-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1308/">CVE-2022-1308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1308">CVE-2022-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1309/">CVE-2022-1309 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1309">CVE-2022-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1310/">CVE-2022-1310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1310">CVE-2022-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1311/">CVE-2022-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1311">CVE-2022-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1312/">CVE-2022-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1312">CVE-2022-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1313/">CVE-2022-1313 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1313">CVE-2022-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1314/">CVE-2022-1314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1314">CVE-2022-1314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924868" comment="chromedriver-100.0.4896.88-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924869" comment="chromium-100.0.4896.88-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250310" version="1" class="patch">
	<metadata>
		<title>crun-1.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27650" ref_url="https://www.suse.com/security/cve/CVE-2022-27650/" source="CVE"/>
		<description>
These are all security issues fixed in the crun-1.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27650/">CVE-2022-27650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27650">CVE-2022-27650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924870" comment="crun-1.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250311" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.17.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.17.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924872" comment="kernel-macros-5.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924873" comment="kernel-source-5.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924874" comment="kernel-source-vanilla-5.17.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250312" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-27536" ref_url="https://www.suse.com/security/cve/CVE-2022-27536/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27536/">CVE-2022-27536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27536">CVE-2022-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924875" comment="go1.18-1.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924876" comment="go1.18-doc-1.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924877" comment="go1.18-race-1.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250313" version="1" class="patch">
	<metadata>
		<title>gzip-1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924878" comment="gzip-1.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250314" version="1" class="patch">
	<metadata>
		<title>nbd-3.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26495" ref_url="https://www.suse.com/security/cve/CVE-2022-26495/" source="CVE"/>
		<description>
These are all security issues fixed in the nbd-3.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26495/">CVE-2022-26495 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26495">CVE-2022-26495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924879" comment="nbd-3.24-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250315" version="1" class="patch">
	<metadata>
		<title>rtl_433-21.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27419" ref_url="https://www.suse.com/security/cve/CVE-2022-27419/" source="CVE"/>
		<description>
These are all security issues fixed in the rtl_433-21.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27419/">CVE-2022-27419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27419">CVE-2022-27419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924880" comment="rtl_433-21.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924881" comment="rtl_433-devel-21.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250316" version="1" class="patch">
	<metadata>
		<title>spyder-5.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21699" ref_url="https://www.suse.com/security/cve/CVE-2022-21699/" source="CVE"/>
		<description>
These are all security issues fixed in the spyder-5.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21699/">CVE-2022-21699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21699">CVE-2022-21699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924882" comment="spyder-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924883" comment="spyder-dicom-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924884" comment="spyder-hdf5-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924885" comment="spyder-lang-5.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250317" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.38-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.38-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924886" comment="GraphicsMagick-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924887" comment="GraphicsMagick-devel-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924888" comment="libGraphicsMagick++-Q16-12-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924889" comment="libGraphicsMagick++-devel-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924890" comment="libGraphicsMagick-Q16-3-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924891" comment="libGraphicsMagick3-config-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924892" comment="libGraphicsMagickWand-Q16-2-1.3.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924893" comment="perl-GraphicsMagick-1.3.38-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250318" version="1" class="patch">
	<metadata>
		<title>dcraw-9.28.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19566" ref_url="https://www.suse.com/security/cve/CVE-2018-19566/" source="CVE"/>
		<reference ref_id="CVE-2018-19568" ref_url="https://www.suse.com/security/cve/CVE-2018-19568/" source="CVE"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<reference ref_id="CVE-2021-3624" ref_url="https://www.suse.com/security/cve/CVE-2021-3624/" source="CVE"/>
		<description>
These are all security issues fixed in the dcraw-9.28.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19566/">CVE-2018-19566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19566">CVE-2018-19566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19568/">CVE-2018-19568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19568">CVE-2018-19568 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5805">CVE-2018-5805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5806">CVE-2018-5806 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3624/">CVE-2021-3624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3624">CVE-2021-3624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924894" comment="dcraw-9.28.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924895" comment="dcraw-lang-9.28.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250319" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.86-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.86-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924896" comment="dnsmasq-2.86-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924897" comment="dnsmasq-utils-2.86-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250320" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-nokogiri-1.13.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-24839" ref_url="https://www.suse.com/security/cve/CVE-2022-24839/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-nokogiri-1.13.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24839/">CVE-2022-24839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924898" comment="ruby3.1-rubygem-nokogiri-1.13.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250321" version="1" class="patch">
	<metadata>
		<title>chromedriver-100.0.4896.127-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1364" ref_url="https://www.suse.com/security/cve/CVE-2022-1364/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-100.0.4896.127-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1364/">CVE-2022-1364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1364">CVE-2022-1364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924899" comment="chromedriver-100.0.4896.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924900" comment="chromium-100.0.4896.127-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250322" version="1" class="patch">
	<metadata>
		<title>containerd-1.5.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.5.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924901" comment="containerd-1.5.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924902" comment="containerd-ctr-1.5.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250323" version="1" class="patch">
	<metadata>
		<title>docker-20.10.14_ce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.14_ce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924903" comment="docker-20.10.14_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924904" comment="docker-bash-completion-20.10.14_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924905" comment="docker-fish-completion-20.10.14_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924906" comment="docker-zsh-completion-20.10.14_ce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250324" version="1" class="patch">
	<metadata>
		<title>git-2.35.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.35.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924907" comment="git-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924908" comment="git-arch-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924909" comment="git-core-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924910" comment="git-credential-gnome-keyring-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924911" comment="git-credential-libsecret-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924912" comment="git-cvs-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924913" comment="git-daemon-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924914" comment="git-doc-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924915" comment="git-email-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924916" comment="git-gui-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924917" comment="git-p4-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924918" comment="git-svn-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924919" comment="git-web-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924920" comment="gitk-2.35.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924921" comment="perl-Git-2.35.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250325" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924922" comment="go1.17-1.17.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924923" comment="go1.17-doc-1.17.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924924" comment="go1.17-race-1.17.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250326" version="1" class="patch">
	<metadata>
		<title>libgit2-1_4-1.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_4-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924925" comment="libgit2-1_4-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924926" comment="libgit2-1_4-32bit-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924927" comment="libgit2-devel-1.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250327" version="1" class="patch">
	<metadata>
		<title>libruby3_1-3_1-3.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_1-3_1-3.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924928" comment="libruby3_1-3_1-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924929" comment="ruby3.1-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924930" comment="ruby3.1-devel-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924931" comment="ruby3.1-devel-extra-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924932" comment="ruby3.1-doc-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924933" comment="ruby3.1-doc-ri-3.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250328" version="1" class="patch">
	<metadata>
		<title>libsvn_auth_gnome_keyring-1-0-1.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<description>
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28544">CVE-2021-28544 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24070">CVE-2022-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924934" comment="libsvn_auth_gnome_keyring-1-0-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924935" comment="libsvn_auth_kwallet-1-0-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924936" comment="subversion-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924937" comment="subversion-bash-completion-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924938" comment="subversion-devel-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924939" comment="subversion-perl-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924940" comment="subversion-python-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924941" comment="subversion-ruby-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924942" comment="subversion-server-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924943" comment="subversion-tools-1.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250329" version="1" class="patch">
	<metadata>
		<title>trivy-0.26.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.26.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924944" comment="trivy-0.26.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250330" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20220420-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24791" ref_url="https://www.suse.com/security/cve/CVE-2022-24791/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20220420-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24791/">CVE-2022-24791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24791">CVE-2022-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924945" comment="cargo-audit-advisory-db-20220420-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250331" version="1" class="patch">
	<metadata>
		<title>mutt-2.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-2.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924946" comment="mutt-2.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924947" comment="mutt-doc-2.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924948" comment="mutt-lang-2.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250332" version="1" class="patch">
	<metadata>
		<title>plantuml-1.2022.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1231" ref_url="https://www.suse.com/security/cve/CVE-2022-1231/" source="CVE"/>
		<description>
These are all security issues fixed in the plantuml-1.2022.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1231/">CVE-2022-1231 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1231">CVE-2022-1231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924949" comment="plantuml-1.2022.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924950" comment="plantuml-javadoc-1.2022.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250333" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.1.1260.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29527" ref_url="https://www.suse.com/security/cve/CVE-2022-29527/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.1.1260.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29527/">CVE-2022-29527 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29527">CVE-2022-29527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924951" comment="amazon-ssm-agent-3.1.1260.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250334" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924952" comment="java-13-openjdk-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924953" comment="java-13-openjdk-accessibility-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924954" comment="java-13-openjdk-demo-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924955" comment="java-13-openjdk-devel-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924956" comment="java-13-openjdk-headless-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924957" comment="java-13-openjdk-javadoc-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924958" comment="java-13-openjdk-jmods-13.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924959" comment="java-13-openjdk-src-13.0.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250335" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924960" comment="java-15-openjdk-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924961" comment="java-15-openjdk-accessibility-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924962" comment="java-15-openjdk-demo-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924963" comment="java-15-openjdk-devel-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924964" comment="java-15-openjdk-headless-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924965" comment="java-15-openjdk-javadoc-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924966" comment="java-15-openjdk-jmods-15.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924967" comment="java-15-openjdk-src-15.0.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250336" version="1" class="patch">
	<metadata>
		<title>java-18-openjdk-18.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-18-openjdk-18.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924968" comment="java-18-openjdk-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924969" comment="java-18-openjdk-accessibility-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924970" comment="java-18-openjdk-demo-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924971" comment="java-18-openjdk-devel-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924972" comment="java-18-openjdk-headless-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924973" comment="java-18-openjdk-javadoc-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924974" comment="java-18-openjdk-jmods-18.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924975" comment="java-18-openjdk-src-18.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250337" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0730" ref_url="https://www.suse.com/security/cve/CVE-2022-0730/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0730/">CVE-2022-0730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0730">CVE-2022-0730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924976" comment="cacti-1.2.20-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250338" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.17.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.17.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924978" comment="kernel-macros-5.17.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924979" comment="kernel-source-5.17.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924980" comment="kernel-source-vanilla-5.17.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250339" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924981" comment="java-11-openjdk-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924982" comment="java-11-openjdk-accessibility-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924983" comment="java-11-openjdk-demo-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924984" comment="java-11-openjdk-devel-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924985" comment="java-11-openjdk-headless-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924986" comment="java-11-openjdk-javadoc-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924987" comment="java-11-openjdk-jmods-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924988" comment="java-11-openjdk-src-11.0.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250340" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924989" comment="java-17-openjdk-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924990" comment="java-17-openjdk-accessibility-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924991" comment="java-17-openjdk-demo-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924992" comment="java-17-openjdk-devel-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924993" comment="java-17-openjdk-headless-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924994" comment="java-17-openjdk-javadoc-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924995" comment="java-17-openjdk-jmods-17.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924996" comment="java-17-openjdk-src-17.0.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250341" version="1" class="patch">
	<metadata>
		<title>libncurses5-32bit-6.3.20220416-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses5-32bit-6.3.20220416-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009924997" comment="libncurses5-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924998" comment="libncurses5-32bit-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009924999" comment="libncurses6-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925000" comment="libncurses6-32bit-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925001" comment="ncurses-devel-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925002" comment="ncurses-devel-32bit-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925003" comment="ncurses-devel-static-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925004" comment="ncurses-examples-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925005" comment="ncurses-utils-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925006" comment="ncurses5-devel-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925007" comment="ncurses5-devel-32bit-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925008" comment="ncurses5-devel-static-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925009" comment="tack-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925010" comment="terminfo-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925011" comment="terminfo-base-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925012" comment="terminfo-iterm-6.3.20220416-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925013" comment="terminfo-screen-6.3.20220416-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250342" version="1" class="patch">
	<metadata>
		<title>mupdf-1.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925014" comment="mupdf-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925015" comment="mupdf-devel-static-1.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250343" version="1" class="patch">
	<metadata>
		<title>nekohtml-1.9.22.noko2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28366" ref_url="https://www.suse.com/security/cve/CVE-2022-28366/" source="CVE"/>
		<description>
These are all security issues fixed in the nekohtml-1.9.22.noko2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28366/">CVE-2022-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28366">CVE-2022-28366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925016" comment="nekohtml-1.9.22.noko2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925017" comment="nekohtml-demo-1.9.22.noko2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925018" comment="nekohtml-javadoc-1.9.22.noko2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250344" version="1" class="patch">
	<metadata>
		<title>libinput-devel-1.20.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<description>
These are all security issues fixed in the libinput-devel-1.20.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1215">CVE-2022-1215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925019" comment="libinput-devel-1.20.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925020" comment="libinput-tools-1.20.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925021" comment="libinput-udev-1.20.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925022" comment="libinput10-1.20.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925023" comment="libinput10-32bit-1.20.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250345" version="1" class="patch">
	<metadata>
		<title>libmruby3_0_0-3.0.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1212" ref_url="https://www.suse.com/security/cve/CVE-2022-1212/" source="CVE"/>
		<reference ref_id="CVE-2022-1286" ref_url="https://www.suse.com/security/cve/CVE-2022-1286/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3_0_0-3.0.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1212/">CVE-2022-1212 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1212">CVE-2022-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1286/">CVE-2022-1286 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1286">CVE-2022-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925024" comment="libmruby3_0_0-3.0.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925025" comment="libmruby_core3_0_0-3.0.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925026" comment="mruby-3.0.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925027" comment="mruby-devel-3.0.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250346" version="1" class="patch">
	<metadata>
		<title>epiphany-42.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29536" ref_url="https://www.suse.com/security/cve/CVE-2022-29536/" source="CVE"/>
		<description>
These are all security issues fixed in the epiphany-42.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29536/">CVE-2022-29536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29536">CVE-2022-29536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925028" comment="epiphany-42.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925029" comment="epiphany-branding-upstream-42.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925030" comment="epiphany-lang-42.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925031" comment="gnome-shell-search-provider-epiphany-42.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250347" version="1" class="patch">
	<metadata>
		<title>logback-1.2.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42550" ref_url="https://www.suse.com/security/cve/CVE-2021-42550/" source="CVE"/>
		<description>
These are all security issues fixed in the logback-1.2.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42550/">CVE-2021-42550 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42550">CVE-2021-42550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925032" comment="logback-1.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925033" comment="logback-access-1.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925034" comment="logback-examples-1.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925035" comment="logback-javadoc-1.2.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250348" version="1" class="patch">
	<metadata>
		<title>maven-shared-utils-3.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29599" ref_url="https://www.suse.com/security/cve/CVE-2022-29599/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-shared-utils-3.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29599/">CVE-2022-29599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29599">CVE-2022-29599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925036" comment="maven-shared-utils-3.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925037" comment="maven-shared-utils-javadoc-3.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250349" version="1" class="patch">
	<metadata>
		<title>curl-7.83.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774/" source="CVE"/>
		<reference ref_id="CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.83.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925038" comment="curl-7.83.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925039" comment="libcurl-devel-7.83.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925040" comment="libcurl-devel-32bit-7.83.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925041" comment="libcurl4-7.83.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925042" comment="libcurl4-32bit-7.83.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250350" version="1" class="patch">
	<metadata>
		<title>caca-utils-0.99.beta19.git20171003-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
These are all security issues fixed in the caca-utils-0.99.beta19.git20171003-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0856">CVE-2022-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925043" comment="caca-utils-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925044" comment="libcaca-devel-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925045" comment="libcaca-ruby-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925046" comment="libcaca0-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925047" comment="libcaca0-32bit-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925048" comment="libcaca0-plugins-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925049" comment="libcaca0-plugins-32bit-0.99.beta19.git20171003-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925050" comment="python3-caca-0.99.beta19.git20171003-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250351" version="1" class="patch">
	<metadata>
		<title>redis-6.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24735" ref_url="https://www.suse.com/security/cve/CVE-2022-24735/" source="CVE"/>
		<reference ref_id="CVE-2022-24736" ref_url="https://www.suse.com/security/cve/CVE-2022-24736/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-6.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24735/">CVE-2022-24735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24736/">CVE-2022-24736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24736">CVE-2022-24736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925051" comment="redis-6.2.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250352" version="1" class="patch">
	<metadata>
		<title>rke-1.3.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25745" ref_url="https://www.suse.com/security/cve/CVE-2021-25745/" source="CVE"/>
		<description>
These are all security issues fixed in the rke-1.3.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25745/">CVE-2021-25745 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25745">CVE-2021-25745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925052" comment="rke-1.3.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250353" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-puma-4-4.3.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-puma-4-4.3.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925053" comment="ruby3.1-rubygem-puma-4-4.3.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250354" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-sinatra-2.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-11627" ref_url="https://www.suse.com/security/cve/CVE-2018-11627/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-sinatra-2.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11627/">CVE-2018-11627 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11627">CVE-2018-11627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925054" comment="ruby3.1-rubygem-sinatra-2.2.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250355" version="1" class="patch">
	<metadata>
		<title>docker-20.10.14_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.14_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925055" comment="docker-20.10.14_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925056" comment="docker-bash-completion-20.10.14_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925057" comment="docker-fish-completion-20.10.14_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925058" comment="docker-zsh-completion-20.10.14_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250356" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28085" ref_url="https://www.suse.com/security/cve/CVE-2022-28085/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-28085/">CVE-2022-28085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28085">CVE-2022-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925059" comment="htmldoc-1.9.15-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250357" version="1" class="patch">
	<metadata>
		<title>finch-2.14.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26491" ref_url="https://www.suse.com/security/cve/CVE-2022-26491/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.14.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26491/">CVE-2022-26491 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26491">CVE-2022-26491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925060" comment="finch-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925061" comment="finch-devel-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925062" comment="libpurple-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925063" comment="libpurple-branding-upstream-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925064" comment="libpurple-client0-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925065" comment="libpurple-devel-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925066" comment="libpurple-lang-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925067" comment="libpurple-plugin-sametime-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925068" comment="libpurple-tcl-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925069" comment="libpurple0-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925070" comment="pidgin-2.14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925071" comment="pidgin-devel-2.14.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250358" version="1" class="patch">
	<metadata>
		<title>libovn-21_09-0-21.09.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the libovn-21_09-0-21.09.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3449">CVE-2012-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925072" comment="libovn-21_09-0-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925073" comment="ovn-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925074" comment="ovn-central-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925075" comment="ovn-devel-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925076" comment="ovn-doc-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925077" comment="ovn-docker-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925078" comment="ovn-host-21.09.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925079" comment="ovn-vtep-21.09.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250359" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-kramdown-2.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-kramdown-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925080" comment="ruby3.1-rubygem-kramdown-2.4.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250360" version="1" class="patch">
	<metadata>
		<title>dpdk-21.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0669" ref_url="https://www.suse.com/security/cve/CVE-2022-0669/" source="CVE"/>
		<description>
These are all security issues fixed in the dpdk-21.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0669/">CVE-2022-0669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0669">CVE-2022-0669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925081" comment="dpdk-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925082" comment="dpdk-devel-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925083" comment="dpdk-devel-static-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925084" comment="dpdk-doc-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925085" comment="dpdk-examples-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925086" comment="dpdk-kmp-default-21.11.1_k5.17.4_1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925087" comment="dpdk-tools-21.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925088" comment="libdpdk-22-21.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250361" version="1" class="patch">
	<metadata>
		<title>google-gson-2.8.9-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25647" ref_url="https://www.suse.com/security/cve/CVE-2022-25647/" source="CVE"/>
		<description>
These are all security issues fixed in the google-gson-2.8.9-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25647/">CVE-2022-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25647">CVE-2022-25647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925089" comment="google-gson-2.8.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925090" comment="google-gson-javadoc-2.8.9-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250362" version="1" class="patch">
	<metadata>
		<title>python310-httpx-0.22.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41945" ref_url="https://www.suse.com/security/cve/CVE-2021-41945/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-httpx-0.22.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41945/">CVE-2021-41945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41945">CVE-2021-41945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925091" comment="python310-httpx-0.22.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925092" comment="python38-httpx-0.22.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925093" comment="python39-httpx-0.22.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250363" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925094" comment="freetype2-devel-2.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925095" comment="freetype2-devel-32bit-2.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925096" comment="freetype2-profile-tti35-2.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925097" comment="libfreetype6-2.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925098" comment="libfreetype6-32bit-2.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250364" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925099" comment="libxml2-2-2.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925100" comment="libxml2-2-32bit-2.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925101" comment="libxml2-devel-2.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925102" comment="libxml2-devel-32bit-2.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925103" comment="libxml2-doc-2.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925104" comment="libxml2-tools-2.9.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250365" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-100.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29910" ref_url="https://www.suse.com/security/cve/CVE-2022-29910/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29915" ref_url="https://www.suse.com/security/cve/CVE-2022-29915/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="CVE-2022-29918" ref_url="https://www.suse.com/security/cve/CVE-2022-29918/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-100.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29910/">CVE-2022-29910 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29910">CVE-2022-29910 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29915/">CVE-2022-29915 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29915">CVE-2022-29915 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29918/">CVE-2022-29918 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29918">CVE-2022-29918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925105" comment="MozillaFirefox-100.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925106" comment="MozillaFirefox-branding-upstream-100.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925107" comment="MozillaFirefox-devel-100.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925108" comment="MozillaFirefox-translations-common-100.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925109" comment="MozillaFirefox-translations-other-100.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250366" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925110" comment="MozillaThunderbird-91.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925111" comment="MozillaThunderbird-translations-common-91.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925112" comment="MozillaThunderbird-translations-other-91.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250367" version="1" class="patch">
	<metadata>
		<title>chromedriver-101.0.4951.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1477" ref_url="https://www.suse.com/security/cve/CVE-2022-1477/" source="CVE"/>
		<reference ref_id="CVE-2022-1478" ref_url="https://www.suse.com/security/cve/CVE-2022-1478/" source="CVE"/>
		<reference ref_id="CVE-2022-1479" ref_url="https://www.suse.com/security/cve/CVE-2022-1479/" source="CVE"/>
		<reference ref_id="CVE-2022-1480" ref_url="https://www.suse.com/security/cve/CVE-2022-1480/" source="CVE"/>
		<reference ref_id="CVE-2022-1481" ref_url="https://www.suse.com/security/cve/CVE-2022-1481/" source="CVE"/>
		<reference ref_id="CVE-2022-1482" ref_url="https://www.suse.com/security/cve/CVE-2022-1482/" source="CVE"/>
		<reference ref_id="CVE-2022-1483" ref_url="https://www.suse.com/security/cve/CVE-2022-1483/" source="CVE"/>
		<reference ref_id="CVE-2022-1484" ref_url="https://www.suse.com/security/cve/CVE-2022-1484/" source="CVE"/>
		<reference ref_id="CVE-2022-1485" ref_url="https://www.suse.com/security/cve/CVE-2022-1485/" source="CVE"/>
		<reference ref_id="CVE-2022-1486" ref_url="https://www.suse.com/security/cve/CVE-2022-1486/" source="CVE"/>
		<reference ref_id="CVE-2022-1487" ref_url="https://www.suse.com/security/cve/CVE-2022-1487/" source="CVE"/>
		<reference ref_id="CVE-2022-1488" ref_url="https://www.suse.com/security/cve/CVE-2022-1488/" source="CVE"/>
		<reference ref_id="CVE-2022-1489" ref_url="https://www.suse.com/security/cve/CVE-2022-1489/" source="CVE"/>
		<reference ref_id="CVE-2022-1490" ref_url="https://www.suse.com/security/cve/CVE-2022-1490/" source="CVE"/>
		<reference ref_id="CVE-2022-1491" ref_url="https://www.suse.com/security/cve/CVE-2022-1491/" source="CVE"/>
		<reference ref_id="CVE-2022-1492" ref_url="https://www.suse.com/security/cve/CVE-2022-1492/" source="CVE"/>
		<reference ref_id="CVE-2022-1493" ref_url="https://www.suse.com/security/cve/CVE-2022-1493/" source="CVE"/>
		<reference ref_id="CVE-2022-1494" ref_url="https://www.suse.com/security/cve/CVE-2022-1494/" source="CVE"/>
		<reference ref_id="CVE-2022-1495" ref_url="https://www.suse.com/security/cve/CVE-2022-1495/" source="CVE"/>
		<reference ref_id="CVE-2022-1496" ref_url="https://www.suse.com/security/cve/CVE-2022-1496/" source="CVE"/>
		<reference ref_id="CVE-2022-1497" ref_url="https://www.suse.com/security/cve/CVE-2022-1497/" source="CVE"/>
		<reference ref_id="CVE-2022-1498" ref_url="https://www.suse.com/security/cve/CVE-2022-1498/" source="CVE"/>
		<reference ref_id="CVE-2022-1499" ref_url="https://www.suse.com/security/cve/CVE-2022-1499/" source="CVE"/>
		<reference ref_id="CVE-2022-1500" ref_url="https://www.suse.com/security/cve/CVE-2022-1500/" source="CVE"/>
		<reference ref_id="CVE-2022-1501" ref_url="https://www.suse.com/security/cve/CVE-2022-1501/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-101.0.4951.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1477/">CVE-2022-1477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1477">CVE-2022-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1478/">CVE-2022-1478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1478">CVE-2022-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1479/">CVE-2022-1479 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1479">CVE-2022-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1480/">CVE-2022-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1480">CVE-2022-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1481/">CVE-2022-1481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1481">CVE-2022-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1482/">CVE-2022-1482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1482">CVE-2022-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1483/">CVE-2022-1483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1483">CVE-2022-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1484/">CVE-2022-1484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1484">CVE-2022-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1485/">CVE-2022-1485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1485">CVE-2022-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1486/">CVE-2022-1486 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1486">CVE-2022-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1487/">CVE-2022-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1487">CVE-2022-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1488/">CVE-2022-1488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1488">CVE-2022-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1489/">CVE-2022-1489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1489">CVE-2022-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1490/">CVE-2022-1490 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1490">CVE-2022-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1491/">CVE-2022-1491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1491">CVE-2022-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1492/">CVE-2022-1492 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1492">CVE-2022-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1493/">CVE-2022-1493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1493">CVE-2022-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1494/">CVE-2022-1494 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1494">CVE-2022-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1495/">CVE-2022-1495 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1495">CVE-2022-1495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1496/">CVE-2022-1496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1496">CVE-2022-1496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1497/">CVE-2022-1497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1497">CVE-2022-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1498/">CVE-2022-1498 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1498">CVE-2022-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1499/">CVE-2022-1499 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1499">CVE-2022-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1500/">CVE-2022-1500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1500">CVE-2022-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1501/">CVE-2022-1501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1501">CVE-2022-1501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925113" comment="chromedriver-101.0.4951.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925114" comment="chromium-101.0.4951.54-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250368" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20770">CVE-2022-20770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20771">CVE-2022-20771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20785">CVE-2022-20785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20792">CVE-2022-20792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20796">CVE-2022-20796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925115" comment="clamav-0.103.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925116" comment="clamav-devel-0.103.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925117" comment="clamav-milter-0.103.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925118" comment="libclamav9-0.103.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925119" comment="libfreshclam2-0.103.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250369" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24828" ref_url="https://www.suse.com/security/cve/CVE-2022-24828/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24828/">CVE-2022-24828 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24828">CVE-2022-24828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925120" comment="php-composer2-2.3.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250370" version="1" class="patch">
	<metadata>
		<title>libpodofo-devel-0.9.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20797" ref_url="https://www.suse.com/security/cve/CVE-2018-20797/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo-devel-0.9.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20797/">CVE-2018-20797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20797">CVE-2018-20797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925121" comment="libpodofo-devel-0.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925122" comment="libpodofo0_9_8-0.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925123" comment="podofo-0.9.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250371" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-21.08.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29502" ref_url="https://www.suse.com/security/cve/CVE-2022-29502/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-21.08.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29500">CVE-2022-29500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29502/">CVE-2022-29502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29502">CVE-2022-29502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925124" comment="libnss_slurm2-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925125" comment="libpmi0-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925126" comment="libslurm37-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925127" comment="perl-slurm-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925128" comment="slurm-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925129" comment="slurm-auth-none-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925130" comment="slurm-config-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925131" comment="slurm-config-man-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925132" comment="slurm-cray-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925133" comment="slurm-devel-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925134" comment="slurm-doc-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925135" comment="slurm-hdf5-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925136" comment="slurm-lua-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925137" comment="slurm-munge-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925138" comment="slurm-node-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925139" comment="slurm-openlava-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925140" comment="slurm-pam_slurm-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925141" comment="slurm-plugins-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925142" comment="slurm-rest-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925143" comment="slurm-seff-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925144" comment="slurm-sjstat-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925145" comment="slurm-slurmdbd-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925146" comment="slurm-sql-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925147" comment="slurm-sview-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925148" comment="slurm-torque-21.08.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925149" comment="slurm-webdoc-21.08.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250372" version="1" class="patch">
	<metadata>
		<title>gvim-8.2.4877-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.2.4877-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925150" comment="gvim-8.2.4877-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925151" comment="vim-8.2.4877-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925152" comment="vim-data-8.2.4877-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925153" comment="vim-data-common-8.2.4877-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925154" comment="vim-small-8.2.4877-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250373" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-6.1.34-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21465" ref_url="https://www.suse.com/security/cve/CVE-2022-21465/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-6.1.34-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-21465/">CVE-2022-21465 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21465">CVE-2022-21465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925155" comment="python3-virtualbox-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925156" comment="virtualbox-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925157" comment="virtualbox-devel-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925158" comment="virtualbox-guest-desktop-icons-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925159" comment="virtualbox-guest-source-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925160" comment="virtualbox-guest-tools-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925161" comment="virtualbox-guest-x11-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925162" comment="virtualbox-host-source-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925163" comment="virtualbox-qt-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925164" comment="virtualbox-vnc-6.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925165" comment="virtualbox-websrv-6.1.34-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250374" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.17.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-29968" ref_url="https://www.suse.com/security/cve/CVE-2022-29968/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.17.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29968/">CVE-2022-29968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29968">CVE-2022-29968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925167" comment="kernel-macros-5.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925168" comment="kernel-source-5.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925169" comment="kernel-source-vanilla-5.17.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250375" version="1" class="patch">
	<metadata>
		<title>php-composer-1.10.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24828" ref_url="https://www.suse.com/security/cve/CVE-2022-24828/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer-1.10.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24828/">CVE-2022-24828 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24828">CVE-2022-24828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925170" comment="php-composer-1.10.26-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250376" version="1" class="patch">
	<metadata>
		<title>pijul-1.0.0~beta.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the pijul-1.0.0~beta.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925171" comment="pijul-1.0.0~beta.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250377" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-17.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1138" ref_url="https://www.suse.com/security/cve/CVE-2022-1138/" source="CVE"/>
		<reference ref_id="CVE-2022-1314" ref_url="https://www.suse.com/security/cve/CVE-2022-1314/" source="CVE"/>
		<reference ref_id="CVE-2022-1478" ref_url="https://www.suse.com/security/cve/CVE-2022-1478/" source="CVE"/>
		<reference ref_id="CVE-2022-1480" ref_url="https://www.suse.com/security/cve/CVE-2022-1480/" source="CVE"/>
		<reference ref_id="CVE-2022-1492" ref_url="https://www.suse.com/security/cve/CVE-2022-1492/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-17.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1138/">CVE-2022-1138 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1138">CVE-2022-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1314/">CVE-2022-1314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1314">CVE-2022-1314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1478/">CVE-2022-1478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1478">CVE-2022-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1480/">CVE-2022-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1480">CVE-2022-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1492/">CVE-2022-1492 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1492">CVE-2022-1492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925172" comment="nodejs-electron-17.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925173" comment="nodejs-electron-devel-17.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250378" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.3.0-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0907" ref_url="https://www.suse.com/security/cve/CVE-2022-0907/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1056" ref_url="https://www.suse.com/security/cve/CVE-2022-1056/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.3.0-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0907/">CVE-2022-0907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907">CVE-2022-0907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1056/">CVE-2022-1056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1056">CVE-2022-1056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925174" comment="libtiff-devel-4.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925175" comment="libtiff-devel-32bit-4.3.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925176" comment="libtiff5-4.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925177" comment="libtiff5-32bit-4.3.0-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925178" comment="tiff-4.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250379" version="1" class="patch">
	<metadata>
		<title>valgrind-3.19.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6131" ref_url="https://www.suse.com/security/cve/CVE-2016-6131/" source="CVE"/>
		<description>
These are all security issues fixed in the valgrind-3.19.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6131/">CVE-2016-6131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6131">CVE-2016-6131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925179" comment="valgrind-3.19.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925180" comment="valgrind-32bit-3.19.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925181" comment="valgrind-devel-3.19.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250380" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.2204.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.2204.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925182" comment="rsyslog-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925183" comment="rsyslog-diag-tools-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925184" comment="rsyslog-doc-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925185" comment="rsyslog-module-elasticsearch-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925186" comment="rsyslog-module-gcrypt-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925187" comment="rsyslog-module-gssapi-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925188" comment="rsyslog-module-gtls-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925189" comment="rsyslog-module-kafka-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925190" comment="rsyslog-module-mmnormalize-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925191" comment="rsyslog-module-mysql-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925192" comment="rsyslog-module-omamqp1-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925193" comment="rsyslog-module-omhttpfs-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925194" comment="rsyslog-module-omtcl-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925195" comment="rsyslog-module-ossl-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925196" comment="rsyslog-module-pgsql-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925197" comment="rsyslog-module-relp-8.2204.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925198" comment="rsyslog-module-snmp-8.2204.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250381" version="1" class="patch">
	<metadata>
		<title>patch-2.7.6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952/" source="CVE"/>
		<reference ref_id="CVE-2019-13636" ref_url="https://www.suse.com/security/cve/CVE-2019-13636/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13636/">CVE-2019-13636 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13636">CVE-2019-13636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925199" comment="patch-2.7.6-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250382" version="1" class="patch">
	<metadata>
		<title>chromedriver-101.0.4951.64-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1633" ref_url="https://www.suse.com/security/cve/CVE-2022-1633/" source="CVE"/>
		<reference ref_id="CVE-2022-1634" ref_url="https://www.suse.com/security/cve/CVE-2022-1634/" source="CVE"/>
		<reference ref_id="CVE-2022-1635" ref_url="https://www.suse.com/security/cve/CVE-2022-1635/" source="CVE"/>
		<reference ref_id="CVE-2022-1636" ref_url="https://www.suse.com/security/cve/CVE-2022-1636/" source="CVE"/>
		<reference ref_id="CVE-2022-1637" ref_url="https://www.suse.com/security/cve/CVE-2022-1637/" source="CVE"/>
		<reference ref_id="CVE-2022-1638" ref_url="https://www.suse.com/security/cve/CVE-2022-1638/" source="CVE"/>
		<reference ref_id="CVE-2022-1639" ref_url="https://www.suse.com/security/cve/CVE-2022-1639/" source="CVE"/>
		<reference ref_id="CVE-2022-1640" ref_url="https://www.suse.com/security/cve/CVE-2022-1640/" source="CVE"/>
		<reference ref_id="CVE-2022-1641" ref_url="https://www.suse.com/security/cve/CVE-2022-1641/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-101.0.4951.64-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1633/">CVE-2022-1633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1633">CVE-2022-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1634/">CVE-2022-1634 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1634">CVE-2022-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1635/">CVE-2022-1635 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1635">CVE-2022-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1636/">CVE-2022-1636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1636">CVE-2022-1636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1637/">CVE-2022-1637 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1637">CVE-2022-1637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1638/">CVE-2022-1638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1638">CVE-2022-1638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1639/">CVE-2022-1639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1639">CVE-2022-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1640/">CVE-2022-1640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1640">CVE-2022-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1641/">CVE-2022-1641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1641">CVE-2022-1641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925200" comment="chromedriver-101.0.4951.64-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925201" comment="chromium-101.0.4951.64-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250383" version="1" class="patch">
	<metadata>
		<title>curl-7.83.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27778" ref_url="https://www.suse.com/security/cve/CVE-2022-27778/" source="CVE"/>
		<reference ref_id="CVE-2022-27779" ref_url="https://www.suse.com/security/cve/CVE-2022-27779/" source="CVE"/>
		<reference ref_id="CVE-2022-27780" ref_url="https://www.suse.com/security/cve/CVE-2022-27780/" source="CVE"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="CVE-2022-30115" ref_url="https://www.suse.com/security/cve/CVE-2022-30115/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.83.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-27778/">CVE-2022-27778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27779/">CVE-2022-27779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27780/">CVE-2022-27780 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30115/">CVE-2022-30115 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925202" comment="curl-7.83.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925203" comment="libcurl-devel-7.83.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925204" comment="libcurl-devel-32bit-7.83.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925205" comment="libcurl4-7.83.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925206" comment="libcurl4-32bit-7.83.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250384" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29623" ref_url="https://www.suse.com/security/cve/CVE-2021-29623/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29623/">CVE-2021-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29623">CVE-2021-29623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925207" comment="exiv2-0.27.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925208" comment="exiv2-lang-0.27.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925209" comment="libexiv2-27-0.27.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925210" comment="libexiv2-27-32bit-0.27.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925211" comment="libexiv2-devel-0.27.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925212" comment="libexiv2-xmp-static-0.27.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250385" version="1" class="patch">
	<metadata>
		<title>gerbv-2.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40391" ref_url="https://www.suse.com/security/cve/CVE-2021-40391/" source="CVE"/>
		<reference ref_id="CVE-2021-40393" ref_url="https://www.suse.com/security/cve/CVE-2021-40393/" source="CVE"/>
		<description>
These are all security issues fixed in the gerbv-2.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40391/">CVE-2021-40391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40391">CVE-2021-40391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40393/">CVE-2021-40393 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40393">CVE-2021-40393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925213" comment="gerbv-2.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925214" comment="gerbv-devel-2.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925215" comment="libgerbv1-2.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250386" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925216" comment="go1.17-1.17.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925217" comment="go1.17-doc-1.17.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925218" comment="go1.17-race-1.17.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250387" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925219" comment="go1.18-1.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925220" comment="go1.18-doc-1.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925221" comment="go1.18-race-1.18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250388" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-17.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1477" ref_url="https://www.suse.com/security/cve/CVE-2022-1477/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-17.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1477/">CVE-2022-1477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1477">CVE-2022-1477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925222" comment="nodejs-electron-17.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925223" comment="nodejs-electron-devel-17.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250389" version="1" class="patch">
	<metadata>
		<title>racket-8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the racket-8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925224" comment="racket-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925225" comment="racket-devel-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925226" comment="racket-doc-8.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250390" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-21.08.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-21.08.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29501">CVE-2022-29501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925227" comment="libnss_slurm2-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925228" comment="libpmi0-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925229" comment="libslurm37-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925230" comment="perl-slurm-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925231" comment="slurm-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925232" comment="slurm-auth-none-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925233" comment="slurm-config-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925234" comment="slurm-config-man-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925235" comment="slurm-cray-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925236" comment="slurm-devel-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925237" comment="slurm-doc-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925238" comment="slurm-hdf5-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925239" comment="slurm-lua-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925240" comment="slurm-munge-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925241" comment="slurm-node-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925242" comment="slurm-openlava-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925243" comment="slurm-pam_slurm-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925244" comment="slurm-plugins-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925245" comment="slurm-rest-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925246" comment="slurm-seff-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925247" comment="slurm-sjstat-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925248" comment="slurm-slurmdbd-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925249" comment="slurm-sql-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925250" comment="slurm-sview-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925251" comment="slurm-torque-21.08.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925252" comment="slurm-webdoc-21.08.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250391" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20220510-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20220510-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925253" comment="ucode-intel-20220510-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250392" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27114" ref_url="https://www.suse.com/security/cve/CVE-2022-27114/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27114/">CVE-2022-27114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27114">CVE-2022-27114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925254" comment="htmldoc-1.9.15-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250393" version="1" class="patch">
	<metadata>
		<title>postgresql10-10.19-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-10.19-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925255" comment="postgresql10-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925256" comment="postgresql10-contrib-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925257" comment="postgresql10-devel-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925258" comment="postgresql10-docs-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925259" comment="postgresql10-llvmjit-devel-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925260" comment="postgresql10-plperl-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925261" comment="postgresql10-plpython-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925262" comment="postgresql10-pltcl-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925263" comment="postgresql10-server-10.19-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925264" comment="postgresql10-test-10.19-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250394" version="1" class="patch">
	<metadata>
		<title>libecpg6-14.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-14.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925265" comment="libecpg6-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925266" comment="libecpg6-32bit-14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925267" comment="libpq5-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925268" comment="libpq5-32bit-14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925269" comment="postgresql14-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925270" comment="postgresql14-contrib-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925271" comment="postgresql14-devel-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925272" comment="postgresql14-docs-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925273" comment="postgresql14-llvmjit-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925274" comment="postgresql14-llvmjit-devel-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925275" comment="postgresql14-plperl-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925276" comment="postgresql14-plpython-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925277" comment="postgresql14-pltcl-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925278" comment="postgresql14-server-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925279" comment="postgresql14-server-devel-14.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925280" comment="postgresql14-test-14.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250395" version="1" class="patch">
	<metadata>
		<title>runc-1.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925281" comment="runc-1.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250396" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925282" comment="postgresql11-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925283" comment="postgresql11-contrib-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925284" comment="postgresql11-devel-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925285" comment="postgresql11-docs-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925286" comment="postgresql11-llvmjit-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925287" comment="postgresql11-llvmjit-devel-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925288" comment="postgresql11-plperl-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925289" comment="postgresql11-plpython-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925290" comment="postgresql11-pltcl-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925291" comment="postgresql11-server-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925292" comment="postgresql11-server-devel-11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925293" comment="postgresql11-test-11.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250397" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925294" comment="postgresql12-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925295" comment="postgresql12-contrib-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925296" comment="postgresql12-devel-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925297" comment="postgresql12-docs-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925298" comment="postgresql12-llvmjit-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925299" comment="postgresql12-llvmjit-devel-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925300" comment="postgresql12-plperl-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925301" comment="postgresql12-plpython-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925302" comment="postgresql12-pltcl-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925303" comment="postgresql12-server-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925304" comment="postgresql12-server-devel-12.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925305" comment="postgresql12-test-12.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250398" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925306" comment="postgresql13-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925307" comment="postgresql13-contrib-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925308" comment="postgresql13-devel-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925309" comment="postgresql13-docs-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925310" comment="postgresql13-llvmjit-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925311" comment="postgresql13-llvmjit-devel-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925312" comment="postgresql13-plperl-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925313" comment="postgresql13-plpython-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925314" comment="postgresql13-pltcl-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925315" comment="postgresql13-server-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925316" comment="postgresql13-server-devel-13.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925317" comment="postgresql13-test-13.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250399" version="1" class="patch">
	<metadata>
		<title>cryptctl-2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18906" ref_url="https://www.suse.com/security/cve/CVE-2019-18906/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptctl-2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18906/">CVE-2019-18906 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18906">CVE-2019-18906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925318" comment="cryptctl-2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250400" version="1" class="patch">
	<metadata>
		<title>libmatio-devel-1.5.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36428" ref_url="https://www.suse.com/security/cve/CVE-2020-36428/" source="CVE"/>
		<description>
These are all security issues fixed in the libmatio-devel-1.5.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36428/">CVE-2020-36428 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36428">CVE-2020-36428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925319" comment="libmatio-devel-1.5.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925320" comment="libmatio11-1.5.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925321" comment="matio-tools-1.5.23-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250401" version="1" class="patch">
	<metadata>
		<title>plantuml-1.2022.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1379" ref_url="https://www.suse.com/security/cve/CVE-2022-1379/" source="CVE"/>
		<description>
These are all security issues fixed in the plantuml-1.2022.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1379/">CVE-2022-1379 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1379">CVE-2022-1379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925322" comment="plantuml-1.2022.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925323" comment="plantuml-javadoc-1.2022.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250402" version="1" class="patch">
	<metadata>
		<title>bind-9.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="CVE-2022-0396" ref_url="https://www.suse.com/security/cve/CVE-2022-0396/" source="CVE"/>
		<reference ref_id="CVE-2022-0635" ref_url="https://www.suse.com/security/cve/CVE-2022-0635/" source="CVE"/>
		<reference ref_id="CVE-2022-0667" ref_url="https://www.suse.com/security/cve/CVE-2022-0667/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0396/">CVE-2022-0396 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0396">CVE-2022-0396 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0635/">CVE-2022-0635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0635">CVE-2022-0635 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0667/">CVE-2022-0667 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0667">CVE-2022-0667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925324" comment="bind-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925325" comment="bind-doc-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925326" comment="bind-modules-bdbhpt-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925327" comment="bind-modules-generic-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925328" comment="bind-modules-ldap-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925329" comment="bind-modules-mysql-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925330" comment="bind-modules-perl-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925331" comment="bind-modules-sqlite3-9.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925332" comment="bind-utils-9.18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250403" version="1" class="patch">
	<metadata>
		<title>librecad-2.2.0~rc3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45341" ref_url="https://www.suse.com/security/cve/CVE-2021-45341/" source="CVE"/>
		<reference ref_id="CVE-2021-45342" ref_url="https://www.suse.com/security/cve/CVE-2021-45342/" source="CVE"/>
		<description>
These are all security issues fixed in the librecad-2.2.0~rc3-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45341/">CVE-2021-45341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45341">CVE-2021-45341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45342/">CVE-2021-45342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45342">CVE-2021-45342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925333" comment="librecad-2.2.0~rc3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925334" comment="librecad-parts-2.2.0~rc3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250404" version="1" class="patch">
	<metadata>
		<title>libredwg-devel-0.12.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28237" ref_url="https://www.suse.com/security/cve/CVE-2021-28237/" source="CVE"/>
		<description>
These are all security issues fixed in the libredwg-devel-0.12.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28237/">CVE-2021-28237 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28237">CVE-2021-28237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925335" comment="libredwg-devel-0.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925336" comment="libredwg-tools-0.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925337" comment="libredwg0-0.12.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250405" version="1" class="patch">
	<metadata>
		<title>libxls-devel-1.6.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-27836" ref_url="https://www.suse.com/security/cve/CVE-2021-27836/" source="CVE"/>
		<description>
These are all security issues fixed in the libxls-devel-1.6.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27836/">CVE-2021-27836 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27836">CVE-2021-27836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925338" comment="libxls-devel-1.6.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925339" comment="libxls-tools-1.6.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925340" comment="libxlsreader8-1.6.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250406" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-nokogiri-1.13.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-nokogiri-1.13.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925341" comment="ruby3.1-rubygem-nokogiri-1.13.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250407" version="1" class="patch">
	<metadata>
		<title>libvarnishapi3-7.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23959" ref_url="https://www.suse.com/security/cve/CVE-2022-23959/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi3-7.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23959/">CVE-2022-23959 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23959">CVE-2022-23959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925342" comment="libvarnishapi3-7.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925343" comment="varnish-7.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925344" comment="varnish-devel-7.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250408" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925345" comment="cifs-utils-6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925346" comment="cifs-utils-devel-6.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925347" comment="pam_cifscreds-6.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250409" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20220516-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20220516-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925348" comment="kernel-firmware-20220516-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925349" comment="ucode-amd-20220516-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250410" version="1" class="patch">
	<metadata>
		<title>python311-3.11.0b1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.0b1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925350" comment="python311-3.11.0b1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925351" comment="python311-32bit-3.11.0b1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925352" comment="python311-curses-3.11.0b1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925353" comment="python311-dbm-3.11.0b1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925354" comment="python311-idle-3.11.0b1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925355" comment="python311-tk-3.11.0b1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250411" version="1" class="patch">
	<metadata>
		<title>autotrace-0.31.1-645.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-9182" ref_url="https://www.suse.com/security/cve/CVE-2017-9182/" source="CVE"/>
		<reference ref_id="CVE-2019-19004" ref_url="https://www.suse.com/security/cve/CVE-2019-19004/" source="CVE"/>
		<reference ref_id="CVE-2019-19005" ref_url="https://www.suse.com/security/cve/CVE-2019-19005/" source="CVE"/>
		<description>
These are all security issues fixed in the autotrace-0.31.1-645.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9182/">CVE-2017-9182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9182">CVE-2017-9182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19004/">CVE-2019-19004 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19004">CVE-2019-19004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19005/">CVE-2019-19005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19005">CVE-2019-19005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925356" comment="autotrace-0.31.1-645.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925357" comment="autotrace-devel-0.31.1-645.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925358" comment="libautotrace3-0.31.1-645.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250412" version="1" class="patch">
	<metadata>
		<title>mujs-1.2.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30974" ref_url="https://www.suse.com/security/cve/CVE-2022-30974/" source="CVE"/>
		<description>
These are all security issues fixed in the mujs-1.2.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30974/">CVE-2022-30974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30974">CVE-2022-30974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925359" comment="mujs-1.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925360" comment="mujs-devel-1.2.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250413" version="1" class="patch">
	<metadata>
		<title>gimp-2.10.30-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30067" ref_url="https://www.suse.com/security/cve/CVE-2022-30067/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.10.30-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30067/">CVE-2022-30067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30067">CVE-2022-30067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925361" comment="gimp-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925362" comment="gimp-devel-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925363" comment="gimp-lang-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925364" comment="gimp-plugin-aa-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925365" comment="gimp-plugins-python-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925366" comment="libgimp-2_0-0-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925367" comment="libgimp-2_0-0-32bit-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925368" comment="libgimpui-2_0-0-2.10.30-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925369" comment="libgimpui-2_0-0-32bit-2.10.30-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250414" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-17.4.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1637" ref_url="https://www.suse.com/security/cve/CVE-2022-1637/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-17.4.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1637/">CVE-2022-1637 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1637">CVE-2022-1637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925370" comment="nodejs-electron-17.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925371" comment="nodejs-electron-devel-17.4.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250415" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-28347" ref_url="https://www.suse.com/security/cve/CVE-2022-28347/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28347/">CVE-2022-28347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28347">CVE-2022-28347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925372" comment="python310-Django-4.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925373" comment="python38-Django-4.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925374" comment="python39-Django-4.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250416" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-100.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-100.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925375" comment="MozillaFirefox-100.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925376" comment="MozillaFirefox-branding-upstream-100.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925377" comment="MozillaFirefox-devel-100.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925378" comment="MozillaFirefox-translations-common-100.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925379" comment="MozillaFirefox-translations-other-100.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250417" version="1" class="patch">
	<metadata>
		<title>jackson-databind-2.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-databind-2.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925380" comment="jackson-databind-2.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925381" comment="jackson-databind-javadoc-2.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250418" version="1" class="patch">
	<metadata>
		<title>python39-3.9.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925382" comment="python39-3.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925383" comment="python39-32bit-3.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925384" comment="python39-curses-3.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925385" comment="python39-dbm-3.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925386" comment="python39-idle-3.9.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925387" comment="python39-tk-3.9.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250419" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925388" comment="MozillaThunderbird-91.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925389" comment="MozillaThunderbird-translations-common-91.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925390" comment="MozillaThunderbird-translations-other-91.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250420" version="1" class="patch">
	<metadata>
		<title>apache-commons-io-2.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29425" ref_url="https://www.suse.com/security/cve/CVE-2021-29425/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-io-2.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29425/">CVE-2021-29425 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29425">CVE-2021-29425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925391" comment="apache-commons-io-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925392" comment="apache-commons-io-javadoc-2.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250421" version="1" class="patch">
	<metadata>
		<title>jackson-annotations-2.13.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-annotations-2.13.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925393" comment="jackson-annotations-2.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925394" comment="jackson-annotations-javadoc-2.13.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250422" version="1" class="patch">
	<metadata>
		<title>jackson-core-2.13.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-core-2.13.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925395" comment="jackson-core-2.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925396" comment="jackson-core-javadoc-2.13.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250423" version="1" class="patch">
	<metadata>
		<title>trivy-0.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28946" ref_url="https://www.suse.com/security/cve/CVE-2022-28946/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28946/">CVE-2022-28946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28946">CVE-2022-28946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925397" comment="trivy-0.28.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250424" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13934">CVE-2020-13934 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925398" comment="tomcat-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925399" comment="tomcat-admin-webapps-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925400" comment="tomcat-docs-webapp-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925401" comment="tomcat-el-3_0-api-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925402" comment="tomcat-embed-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925403" comment="tomcat-javadoc-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925404" comment="tomcat-jsp-2_3-api-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925405" comment="tomcat-jsvc-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925406" comment="tomcat-lib-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925407" comment="tomcat-servlet-4_0-api-9.0.43-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925408" comment="tomcat-webapps-9.0.43-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250425" version="1" class="patch">
	<metadata>
		<title>keylime-agent-6.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1053" ref_url="https://www.suse.com/security/cve/CVE-2022-1053/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-agent-6.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1053/">CVE-2022-1053 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1053">CVE-2022-1053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925409" comment="keylime-agent-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925410" comment="keylime-config-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925411" comment="keylime-firewalld-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925412" comment="keylime-registrar-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925413" comment="keylime-tpm_cert_store-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925414" comment="keylime-verifier-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925415" comment="python310-keylime-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925416" comment="python38-keylime-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925417" comment="python39-keylime-6.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250426" version="1" class="patch">
	<metadata>
		<title>neomutt-20220429-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
These are all security issues fixed in the neomutt-20220429-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925418" comment="neomutt-20220429-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925419" comment="neomutt-doc-20220429-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925420" comment="neomutt-lang-20220429-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250427" version="1" class="patch">
	<metadata>
		<title>python310-ujson-5.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45958" ref_url="https://www.suse.com/security/cve/CVE-2021-45958/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ujson-5.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45958/">CVE-2021-45958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45958">CVE-2021-45958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925421" comment="python310-ujson-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925422" comment="python38-ujson-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925423" comment="python39-ujson-5.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250428" version="1" class="patch">
	<metadata>
		<title>testng-7.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022/" source="CVE"/>
		<description>
These are all security issues fixed in the testng-7.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925424" comment="testng-7.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925425" comment="testng-javadoc-7.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250429" version="1" class="patch">
	<metadata>
		<title>logrotate-3.20.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.20.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925426" comment="logrotate-3.20.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250430" version="1" class="patch">
	<metadata>
		<title>chromedriver-102.0.5005.61-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1853" ref_url="https://www.suse.com/security/cve/CVE-2022-1853/" source="CVE"/>
		<reference ref_id="CVE-2022-1854" ref_url="https://www.suse.com/security/cve/CVE-2022-1854/" source="CVE"/>
		<reference ref_id="CVE-2022-1855" ref_url="https://www.suse.com/security/cve/CVE-2022-1855/" source="CVE"/>
		<reference ref_id="CVE-2022-1856" ref_url="https://www.suse.com/security/cve/CVE-2022-1856/" source="CVE"/>
		<reference ref_id="CVE-2022-1857" ref_url="https://www.suse.com/security/cve/CVE-2022-1857/" source="CVE"/>
		<reference ref_id="CVE-2022-1858" ref_url="https://www.suse.com/security/cve/CVE-2022-1858/" source="CVE"/>
		<reference ref_id="CVE-2022-1859" ref_url="https://www.suse.com/security/cve/CVE-2022-1859/" source="CVE"/>
		<reference ref_id="CVE-2022-1860" ref_url="https://www.suse.com/security/cve/CVE-2022-1860/" source="CVE"/>
		<reference ref_id="CVE-2022-1861" ref_url="https://www.suse.com/security/cve/CVE-2022-1861/" source="CVE"/>
		<reference ref_id="CVE-2022-1862" ref_url="https://www.suse.com/security/cve/CVE-2022-1862/" source="CVE"/>
		<reference ref_id="CVE-2022-1863" ref_url="https://www.suse.com/security/cve/CVE-2022-1863/" source="CVE"/>
		<reference ref_id="CVE-2022-1864" ref_url="https://www.suse.com/security/cve/CVE-2022-1864/" source="CVE"/>
		<reference ref_id="CVE-2022-1865" ref_url="https://www.suse.com/security/cve/CVE-2022-1865/" source="CVE"/>
		<reference ref_id="CVE-2022-1866" ref_url="https://www.suse.com/security/cve/CVE-2022-1866/" source="CVE"/>
		<reference ref_id="CVE-2022-1867" ref_url="https://www.suse.com/security/cve/CVE-2022-1867/" source="CVE"/>
		<reference ref_id="CVE-2022-1868" ref_url="https://www.suse.com/security/cve/CVE-2022-1868/" source="CVE"/>
		<reference ref_id="CVE-2022-1869" ref_url="https://www.suse.com/security/cve/CVE-2022-1869/" source="CVE"/>
		<reference ref_id="CVE-2022-1870" ref_url="https://www.suse.com/security/cve/CVE-2022-1870/" source="CVE"/>
		<reference ref_id="CVE-2022-1871" ref_url="https://www.suse.com/security/cve/CVE-2022-1871/" source="CVE"/>
		<reference ref_id="CVE-2022-1872" ref_url="https://www.suse.com/security/cve/CVE-2022-1872/" source="CVE"/>
		<reference ref_id="CVE-2022-1873" ref_url="https://www.suse.com/security/cve/CVE-2022-1873/" source="CVE"/>
		<reference ref_id="CVE-2022-1874" ref_url="https://www.suse.com/security/cve/CVE-2022-1874/" source="CVE"/>
		<reference ref_id="CVE-2022-1875" ref_url="https://www.suse.com/security/cve/CVE-2022-1875/" source="CVE"/>
		<reference ref_id="CVE-2022-1876" ref_url="https://www.suse.com/security/cve/CVE-2022-1876/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-102.0.5005.61-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1853/">CVE-2022-1853 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1853">CVE-2022-1853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1854/">CVE-2022-1854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1854">CVE-2022-1854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1855/">CVE-2022-1855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1855">CVE-2022-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1856/">CVE-2022-1856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1856">CVE-2022-1856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1857/">CVE-2022-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1857">CVE-2022-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1858/">CVE-2022-1858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1858">CVE-2022-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1859/">CVE-2022-1859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1859">CVE-2022-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1860/">CVE-2022-1860 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1860">CVE-2022-1860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1861/">CVE-2022-1861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1861">CVE-2022-1861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1862/">CVE-2022-1862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1862">CVE-2022-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1863/">CVE-2022-1863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1863">CVE-2022-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1864/">CVE-2022-1864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1864">CVE-2022-1864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1865/">CVE-2022-1865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1865">CVE-2022-1865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1866/">CVE-2022-1866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1866">CVE-2022-1866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1867/">CVE-2022-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1867">CVE-2022-1867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1868/">CVE-2022-1868 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1868">CVE-2022-1868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1869/">CVE-2022-1869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1869">CVE-2022-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1870/">CVE-2022-1870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1870">CVE-2022-1870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1871/">CVE-2022-1871 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1871">CVE-2022-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1872/">CVE-2022-1872 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1872">CVE-2022-1872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1873/">CVE-2022-1873 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1873">CVE-2022-1873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1874/">CVE-2022-1874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1874">CVE-2022-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1875/">CVE-2022-1875 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1875">CVE-2022-1875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1876/">CVE-2022-1876 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1876">CVE-2022-1876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925427" comment="chromedriver-102.0.5005.61-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925428" comment="chromium-102.0.5005.61-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250431" version="1" class="patch">
	<metadata>
		<title>dpkg-1.21.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1664" ref_url="https://www.suse.com/security/cve/CVE-2022-1664/" source="CVE"/>
		<description>
These are all security issues fixed in the dpkg-1.21.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1664/">CVE-2022-1664 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1664">CVE-2022-1664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925429" comment="dpkg-1.21.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925430" comment="dpkg-devel-1.21.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925431" comment="dpkg-lang-1.21.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250432" version="1" class="patch">
	<metadata>
		<title>python310-Pillow-9.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30595" ref_url="https://www.suse.com/security/cve/CVE-2022-30595/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pillow-9.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30595/">CVE-2022-30595 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30595">CVE-2022-30595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925432" comment="python310-Pillow-9.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925433" comment="python310-Pillow-tk-9.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925434" comment="python38-Pillow-9.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925435" comment="python38-Pillow-tk-9.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925436" comment="python39-Pillow-9.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925437" comment="python39-Pillow-tk-9.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250433" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23613" ref_url="https://www.suse.com/security/cve/CVE-2022-23613/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23613/">CVE-2022-23613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23613">CVE-2022-23613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925438" comment="libpainter0-0.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925439" comment="librfxencode0-0.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925440" comment="xrdp-0.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925441" comment="xrdp-devel-0.9.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250434" version="1" class="patch">
	<metadata>
		<title>389-ds-2.1.1~git22.faef73366-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1949" ref_url="https://www.suse.com/security/cve/CVE-2022-1949/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-2.1.1~git22.faef73366-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1949/">CVE-2022-1949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1949">CVE-2022-1949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925442" comment="389-ds-2.1.1~git22.faef73366-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925443" comment="389-ds-devel-2.1.1~git22.faef73366-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925444" comment="389-ds-snmp-2.1.1~git22.faef73366-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925445" comment="lib389-2.1.1~git22.faef73366-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925446" comment="libsvrcore0-2.1.1~git22.faef73366-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250435" version="1" class="patch">
	<metadata>
		<title>afterburn-5.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925447" comment="afterburn-5.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925448" comment="afterburn-dracut-5.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250436" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2022.5.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790/" source="CVE"/>
		<reference ref_id="CVE-2022-30783" ref_url="https://www.suse.com/security/cve/CVE-2022-30783/" source="CVE"/>
		<reference ref_id="CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2022.5.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46790">CVE-2021-46790 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30783/">CVE-2022-30783 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30783">CVE-2022-30783 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925449" comment="libntfs-3g-devel-2022.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925450" comment="libntfs-3g89-2022.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925451" comment="ntfs-3g-2022.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925452" comment="ntfsprogs-2022.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925453" comment="ntfsprogs-extra-2022.5.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250437" version="1" class="patch">
	<metadata>
		<title>tensorflow-lite-2.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-15190" ref_url="https://www.suse.com/security/cve/CVE-2020-15190/" source="CVE"/>
		<reference ref_id="CVE-2020-15191" ref_url="https://www.suse.com/security/cve/CVE-2020-15191/" source="CVE"/>
		<reference ref_id="CVE-2020-15194" ref_url="https://www.suse.com/security/cve/CVE-2020-15194/" source="CVE"/>
		<reference ref_id="CVE-2020-15202" ref_url="https://www.suse.com/security/cve/CVE-2020-15202/" source="CVE"/>
		<reference ref_id="CVE-2020-15203" ref_url="https://www.suse.com/security/cve/CVE-2020-15203/" source="CVE"/>
		<reference ref_id="CVE-2020-15204" ref_url="https://www.suse.com/security/cve/CVE-2020-15204/" source="CVE"/>
		<reference ref_id="CVE-2020-15205" ref_url="https://www.suse.com/security/cve/CVE-2020-15205/" source="CVE"/>
		<reference ref_id="CVE-2020-15206" ref_url="https://www.suse.com/security/cve/CVE-2020-15206/" source="CVE"/>
		<reference ref_id="CVE-2020-15207" ref_url="https://www.suse.com/security/cve/CVE-2020-15207/" source="CVE"/>
		<reference ref_id="CVE-2020-15208" ref_url="https://www.suse.com/security/cve/CVE-2020-15208/" source="CVE"/>
		<reference ref_id="CVE-2020-15209" ref_url="https://www.suse.com/security/cve/CVE-2020-15209/" source="CVE"/>
		<reference ref_id="CVE-2020-26266" ref_url="https://www.suse.com/security/cve/CVE-2020-26266/" source="CVE"/>
		<reference ref_id="CVE-2020-26270" ref_url="https://www.suse.com/security/cve/CVE-2020-26270/" source="CVE"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22926" ref_url="https://www.suse.com/security/cve/CVE-2021-22926/" source="CVE"/>
		<reference ref_id="CVE-2021-37635" ref_url="https://www.suse.com/security/cve/CVE-2021-37635/" source="CVE"/>
		<reference ref_id="CVE-2021-37636" ref_url="https://www.suse.com/security/cve/CVE-2021-37636/" source="CVE"/>
		<reference ref_id="CVE-2021-37637" ref_url="https://www.suse.com/security/cve/CVE-2021-37637/" source="CVE"/>
		<reference ref_id="CVE-2021-37638" ref_url="https://www.suse.com/security/cve/CVE-2021-37638/" source="CVE"/>
		<reference ref_id="CVE-2021-37639" ref_url="https://www.suse.com/security/cve/CVE-2021-37639/" source="CVE"/>
		<reference ref_id="CVE-2021-37640" ref_url="https://www.suse.com/security/cve/CVE-2021-37640/" source="CVE"/>
		<reference ref_id="CVE-2021-37641" ref_url="https://www.suse.com/security/cve/CVE-2021-37641/" source="CVE"/>
		<reference ref_id="CVE-2021-37642" ref_url="https://www.suse.com/security/cve/CVE-2021-37642/" source="CVE"/>
		<reference ref_id="CVE-2021-37643" ref_url="https://www.suse.com/security/cve/CVE-2021-37643/" source="CVE"/>
		<reference ref_id="CVE-2021-37644" ref_url="https://www.suse.com/security/cve/CVE-2021-37644/" source="CVE"/>
		<reference ref_id="CVE-2021-37645" ref_url="https://www.suse.com/security/cve/CVE-2021-37645/" source="CVE"/>
		<reference ref_id="CVE-2021-37646" ref_url="https://www.suse.com/security/cve/CVE-2021-37646/" source="CVE"/>
		<reference ref_id="CVE-2021-37647" ref_url="https://www.suse.com/security/cve/CVE-2021-37647/" source="CVE"/>
		<reference ref_id="CVE-2021-37648" ref_url="https://www.suse.com/security/cve/CVE-2021-37648/" source="CVE"/>
		<reference ref_id="CVE-2021-37649" ref_url="https://www.suse.com/security/cve/CVE-2021-37649/" source="CVE"/>
		<reference ref_id="CVE-2021-37650" ref_url="https://www.suse.com/security/cve/CVE-2021-37650/" source="CVE"/>
		<reference ref_id="CVE-2021-37651" ref_url="https://www.suse.com/security/cve/CVE-2021-37651/" source="CVE"/>
		<reference ref_id="CVE-2021-37652" ref_url="https://www.suse.com/security/cve/CVE-2021-37652/" source="CVE"/>
		<reference ref_id="CVE-2021-37653" ref_url="https://www.suse.com/security/cve/CVE-2021-37653/" source="CVE"/>
		<reference ref_id="CVE-2021-37654" ref_url="https://www.suse.com/security/cve/CVE-2021-37654/" source="CVE"/>
		<reference ref_id="CVE-2021-37655" ref_url="https://www.suse.com/security/cve/CVE-2021-37655/" source="CVE"/>
		<reference ref_id="CVE-2021-37656" ref_url="https://www.suse.com/security/cve/CVE-2021-37656/" source="CVE"/>
		<reference ref_id="CVE-2021-37657" ref_url="https://www.suse.com/security/cve/CVE-2021-37657/" source="CVE"/>
		<reference ref_id="CVE-2021-37658" ref_url="https://www.suse.com/security/cve/CVE-2021-37658/" source="CVE"/>
		<reference ref_id="CVE-2021-37659" ref_url="https://www.suse.com/security/cve/CVE-2021-37659/" source="CVE"/>
		<reference ref_id="CVE-2021-37660" ref_url="https://www.suse.com/security/cve/CVE-2021-37660/" source="CVE"/>
		<reference ref_id="CVE-2021-37661" ref_url="https://www.suse.com/security/cve/CVE-2021-37661/" source="CVE"/>
		<reference ref_id="CVE-2021-37662" ref_url="https://www.suse.com/security/cve/CVE-2021-37662/" source="CVE"/>
		<reference ref_id="CVE-2021-37663" ref_url="https://www.suse.com/security/cve/CVE-2021-37663/" source="CVE"/>
		<reference ref_id="CVE-2021-37664" ref_url="https://www.suse.com/security/cve/CVE-2021-37664/" source="CVE"/>
		<reference ref_id="CVE-2021-37665" ref_url="https://www.suse.com/security/cve/CVE-2021-37665/" source="CVE"/>
		<reference ref_id="CVE-2021-37666" ref_url="https://www.suse.com/security/cve/CVE-2021-37666/" source="CVE"/>
		<reference ref_id="CVE-2021-37667" ref_url="https://www.suse.com/security/cve/CVE-2021-37667/" source="CVE"/>
		<reference ref_id="CVE-2021-37668" ref_url="https://www.suse.com/security/cve/CVE-2021-37668/" source="CVE"/>
		<reference ref_id="CVE-2021-37669" ref_url="https://www.suse.com/security/cve/CVE-2021-37669/" source="CVE"/>
		<reference ref_id="CVE-2021-37670" ref_url="https://www.suse.com/security/cve/CVE-2021-37670/" source="CVE"/>
		<reference ref_id="CVE-2021-37671" ref_url="https://www.suse.com/security/cve/CVE-2021-37671/" source="CVE"/>
		<reference ref_id="CVE-2021-37672" ref_url="https://www.suse.com/security/cve/CVE-2021-37672/" source="CVE"/>
		<reference ref_id="CVE-2021-37673" ref_url="https://www.suse.com/security/cve/CVE-2021-37673/" source="CVE"/>
		<reference ref_id="CVE-2021-37674" ref_url="https://www.suse.com/security/cve/CVE-2021-37674/" source="CVE"/>
		<reference ref_id="CVE-2021-37675" ref_url="https://www.suse.com/security/cve/CVE-2021-37675/" source="CVE"/>
		<reference ref_id="CVE-2021-37676" ref_url="https://www.suse.com/security/cve/CVE-2021-37676/" source="CVE"/>
		<reference ref_id="CVE-2021-37677" ref_url="https://www.suse.com/security/cve/CVE-2021-37677/" source="CVE"/>
		<reference ref_id="CVE-2021-37678" ref_url="https://www.suse.com/security/cve/CVE-2021-37678/" source="CVE"/>
		<reference ref_id="CVE-2021-37679" ref_url="https://www.suse.com/security/cve/CVE-2021-37679/" source="CVE"/>
		<reference ref_id="CVE-2021-37680" ref_url="https://www.suse.com/security/cve/CVE-2021-37680/" source="CVE"/>
		<reference ref_id="CVE-2021-37681" ref_url="https://www.suse.com/security/cve/CVE-2021-37681/" source="CVE"/>
		<reference ref_id="CVE-2021-37682" ref_url="https://www.suse.com/security/cve/CVE-2021-37682/" source="CVE"/>
		<reference ref_id="CVE-2021-37683" ref_url="https://www.suse.com/security/cve/CVE-2021-37683/" source="CVE"/>
		<reference ref_id="CVE-2021-37684" ref_url="https://www.suse.com/security/cve/CVE-2021-37684/" source="CVE"/>
		<reference ref_id="CVE-2021-37685" ref_url="https://www.suse.com/security/cve/CVE-2021-37685/" source="CVE"/>
		<reference ref_id="CVE-2021-37686" ref_url="https://www.suse.com/security/cve/CVE-2021-37686/" source="CVE"/>
		<reference ref_id="CVE-2021-37687" ref_url="https://www.suse.com/security/cve/CVE-2021-37687/" source="CVE"/>
		<reference ref_id="CVE-2021-37688" ref_url="https://www.suse.com/security/cve/CVE-2021-37688/" source="CVE"/>
		<reference ref_id="CVE-2021-37689" ref_url="https://www.suse.com/security/cve/CVE-2021-37689/" source="CVE"/>
		<reference ref_id="CVE-2021-37690" ref_url="https://www.suse.com/security/cve/CVE-2021-37690/" source="CVE"/>
		<reference ref_id="CVE-2021-37691" ref_url="https://www.suse.com/security/cve/CVE-2021-37691/" source="CVE"/>
		<reference ref_id="CVE-2021-37692" ref_url="https://www.suse.com/security/cve/CVE-2021-37692/" source="CVE"/>
		<reference ref_id="CVE-2021-41195" ref_url="https://www.suse.com/security/cve/CVE-2021-41195/" source="CVE"/>
		<reference ref_id="CVE-2021-41196" ref_url="https://www.suse.com/security/cve/CVE-2021-41196/" source="CVE"/>
		<reference ref_id="CVE-2021-41197" ref_url="https://www.suse.com/security/cve/CVE-2021-41197/" source="CVE"/>
		<reference ref_id="CVE-2021-41198" ref_url="https://www.suse.com/security/cve/CVE-2021-41198/" source="CVE"/>
		<reference ref_id="CVE-2021-41199" ref_url="https://www.suse.com/security/cve/CVE-2021-41199/" source="CVE"/>
		<reference ref_id="CVE-2021-41200" ref_url="https://www.suse.com/security/cve/CVE-2021-41200/" source="CVE"/>
		<reference ref_id="CVE-2021-41201" ref_url="https://www.suse.com/security/cve/CVE-2021-41201/" source="CVE"/>
		<reference ref_id="CVE-2021-41202" ref_url="https://www.suse.com/security/cve/CVE-2021-41202/" source="CVE"/>
		<reference ref_id="CVE-2021-41203" ref_url="https://www.suse.com/security/cve/CVE-2021-41203/" source="CVE"/>
		<reference ref_id="CVE-2021-41204" ref_url="https://www.suse.com/security/cve/CVE-2021-41204/" source="CVE"/>
		<reference ref_id="CVE-2021-41205" ref_url="https://www.suse.com/security/cve/CVE-2021-41205/" source="CVE"/>
		<reference ref_id="CVE-2021-41206" ref_url="https://www.suse.com/security/cve/CVE-2021-41206/" source="CVE"/>
		<reference ref_id="CVE-2021-41207" ref_url="https://www.suse.com/security/cve/CVE-2021-41207/" source="CVE"/>
		<reference ref_id="CVE-2021-41208" ref_url="https://www.suse.com/security/cve/CVE-2021-41208/" source="CVE"/>
		<reference ref_id="CVE-2021-41209" ref_url="https://www.suse.com/security/cve/CVE-2021-41209/" source="CVE"/>
		<reference ref_id="CVE-2021-41210" ref_url="https://www.suse.com/security/cve/CVE-2021-41210/" source="CVE"/>
		<reference ref_id="CVE-2021-41211" ref_url="https://www.suse.com/security/cve/CVE-2021-41211/" source="CVE"/>
		<reference ref_id="CVE-2021-41212" ref_url="https://www.suse.com/security/cve/CVE-2021-41212/" source="CVE"/>
		<reference ref_id="CVE-2021-41213" ref_url="https://www.suse.com/security/cve/CVE-2021-41213/" source="CVE"/>
		<reference ref_id="CVE-2021-41214" ref_url="https://www.suse.com/security/cve/CVE-2021-41214/" source="CVE"/>
		<reference ref_id="CVE-2021-41215" ref_url="https://www.suse.com/security/cve/CVE-2021-41215/" source="CVE"/>
		<reference ref_id="CVE-2021-41216" ref_url="https://www.suse.com/security/cve/CVE-2021-41216/" source="CVE"/>
		<reference ref_id="CVE-2021-41217" ref_url="https://www.suse.com/security/cve/CVE-2021-41217/" source="CVE"/>
		<reference ref_id="CVE-2021-41218" ref_url="https://www.suse.com/security/cve/CVE-2021-41218/" source="CVE"/>
		<reference ref_id="CVE-2021-41219" ref_url="https://www.suse.com/security/cve/CVE-2021-41219/" source="CVE"/>
		<reference ref_id="CVE-2021-41220" ref_url="https://www.suse.com/security/cve/CVE-2021-41220/" source="CVE"/>
		<reference ref_id="CVE-2021-41221" ref_url="https://www.suse.com/security/cve/CVE-2021-41221/" source="CVE"/>
		<reference ref_id="CVE-2021-41222" ref_url="https://www.suse.com/security/cve/CVE-2021-41222/" source="CVE"/>
		<reference ref_id="CVE-2021-41223" ref_url="https://www.suse.com/security/cve/CVE-2021-41223/" source="CVE"/>
		<reference ref_id="CVE-2021-41224" ref_url="https://www.suse.com/security/cve/CVE-2021-41224/" source="CVE"/>
		<reference ref_id="CVE-2021-41225" ref_url="https://www.suse.com/security/cve/CVE-2021-41225/" source="CVE"/>
		<reference ref_id="CVE-2021-41226" ref_url="https://www.suse.com/security/cve/CVE-2021-41226/" source="CVE"/>
		<reference ref_id="CVE-2021-41227" ref_url="https://www.suse.com/security/cve/CVE-2021-41227/" source="CVE"/>
		<reference ref_id="CVE-2021-41228" ref_url="https://www.suse.com/security/cve/CVE-2021-41228/" source="CVE"/>
		<reference ref_id="CVE-2022-21725" ref_url="https://www.suse.com/security/cve/CVE-2022-21725/" source="CVE"/>
		<reference ref_id="CVE-2022-21726" ref_url="https://www.suse.com/security/cve/CVE-2022-21726/" source="CVE"/>
		<reference ref_id="CVE-2022-21727" ref_url="https://www.suse.com/security/cve/CVE-2022-21727/" source="CVE"/>
		<reference ref_id="CVE-2022-21728" ref_url="https://www.suse.com/security/cve/CVE-2022-21728/" source="CVE"/>
		<reference ref_id="CVE-2022-21729" ref_url="https://www.suse.com/security/cve/CVE-2022-21729/" source="CVE"/>
		<reference ref_id="CVE-2022-21730" ref_url="https://www.suse.com/security/cve/CVE-2022-21730/" source="CVE"/>
		<reference ref_id="CVE-2022-21731" ref_url="https://www.suse.com/security/cve/CVE-2022-21731/" source="CVE"/>
		<reference ref_id="CVE-2022-21732" ref_url="https://www.suse.com/security/cve/CVE-2022-21732/" source="CVE"/>
		<reference ref_id="CVE-2022-21733" ref_url="https://www.suse.com/security/cve/CVE-2022-21733/" source="CVE"/>
		<reference ref_id="CVE-2022-21734" ref_url="https://www.suse.com/security/cve/CVE-2022-21734/" source="CVE"/>
		<reference ref_id="CVE-2022-21735" ref_url="https://www.suse.com/security/cve/CVE-2022-21735/" source="CVE"/>
		<reference ref_id="CVE-2022-21736" ref_url="https://www.suse.com/security/cve/CVE-2022-21736/" source="CVE"/>
		<reference ref_id="CVE-2022-21737" ref_url="https://www.suse.com/security/cve/CVE-2022-21737/" source="CVE"/>
		<reference ref_id="CVE-2022-21738" ref_url="https://www.suse.com/security/cve/CVE-2022-21738/" source="CVE"/>
		<reference ref_id="CVE-2022-21739" ref_url="https://www.suse.com/security/cve/CVE-2022-21739/" source="CVE"/>
		<reference ref_id="CVE-2022-21740" ref_url="https://www.suse.com/security/cve/CVE-2022-21740/" source="CVE"/>
		<reference ref_id="CVE-2022-21741" ref_url="https://www.suse.com/security/cve/CVE-2022-21741/" source="CVE"/>
		<reference ref_id="CVE-2022-23557" ref_url="https://www.suse.com/security/cve/CVE-2022-23557/" source="CVE"/>
		<reference ref_id="CVE-2022-23558" ref_url="https://www.suse.com/security/cve/CVE-2022-23558/" source="CVE"/>
		<reference ref_id="CVE-2022-23559" ref_url="https://www.suse.com/security/cve/CVE-2022-23559/" source="CVE"/>
		<reference ref_id="CVE-2022-23560" ref_url="https://www.suse.com/security/cve/CVE-2022-23560/" source="CVE"/>
		<reference ref_id="CVE-2022-23561" ref_url="https://www.suse.com/security/cve/CVE-2022-23561/" source="CVE"/>
		<reference ref_id="CVE-2022-23562" ref_url="https://www.suse.com/security/cve/CVE-2022-23562/" source="CVE"/>
		<reference ref_id="CVE-2022-23563" ref_url="https://www.suse.com/security/cve/CVE-2022-23563/" source="CVE"/>
		<reference ref_id="CVE-2022-23564" ref_url="https://www.suse.com/security/cve/CVE-2022-23564/" source="CVE"/>
		<reference ref_id="CVE-2022-23565" ref_url="https://www.suse.com/security/cve/CVE-2022-23565/" source="CVE"/>
		<reference ref_id="CVE-2022-23566" ref_url="https://www.suse.com/security/cve/CVE-2022-23566/" source="CVE"/>
		<reference ref_id="CVE-2022-23567" ref_url="https://www.suse.com/security/cve/CVE-2022-23567/" source="CVE"/>
		<reference ref_id="CVE-2022-23568" ref_url="https://www.suse.com/security/cve/CVE-2022-23568/" source="CVE"/>
		<reference ref_id="CVE-2022-23569" ref_url="https://www.suse.com/security/cve/CVE-2022-23569/" source="CVE"/>
		<reference ref_id="CVE-2022-23570" ref_url="https://www.suse.com/security/cve/CVE-2022-23570/" source="CVE"/>
		<reference ref_id="CVE-2022-23571" ref_url="https://www.suse.com/security/cve/CVE-2022-23571/" source="CVE"/>
		<reference ref_id="CVE-2022-23572" ref_url="https://www.suse.com/security/cve/CVE-2022-23572/" source="CVE"/>
		<reference ref_id="CVE-2022-23573" ref_url="https://www.suse.com/security/cve/CVE-2022-23573/" source="CVE"/>
		<reference ref_id="CVE-2022-23574" ref_url="https://www.suse.com/security/cve/CVE-2022-23574/" source="CVE"/>
		<reference ref_id="CVE-2022-23575" ref_url="https://www.suse.com/security/cve/CVE-2022-23575/" source="CVE"/>
		<reference ref_id="CVE-2022-23576" ref_url="https://www.suse.com/security/cve/CVE-2022-23576/" source="CVE"/>
		<reference ref_id="CVE-2022-23577" ref_url="https://www.suse.com/security/cve/CVE-2022-23577/" source="CVE"/>
		<reference ref_id="CVE-2022-23578" ref_url="https://www.suse.com/security/cve/CVE-2022-23578/" source="CVE"/>
		<reference ref_id="CVE-2022-23579" ref_url="https://www.suse.com/security/cve/CVE-2022-23579/" source="CVE"/>
		<reference ref_id="CVE-2022-23580" ref_url="https://www.suse.com/security/cve/CVE-2022-23580/" source="CVE"/>
		<reference ref_id="CVE-2022-23581" ref_url="https://www.suse.com/security/cve/CVE-2022-23581/" source="CVE"/>
		<reference ref_id="CVE-2022-23582" ref_url="https://www.suse.com/security/cve/CVE-2022-23582/" source="CVE"/>
		<reference ref_id="CVE-2022-23583" ref_url="https://www.suse.com/security/cve/CVE-2022-23583/" source="CVE"/>
		<reference ref_id="CVE-2022-23584" ref_url="https://www.suse.com/security/cve/CVE-2022-23584/" source="CVE"/>
		<reference ref_id="CVE-2022-23585" ref_url="https://www.suse.com/security/cve/CVE-2022-23585/" source="CVE"/>
		<reference ref_id="CVE-2022-23586" ref_url="https://www.suse.com/security/cve/CVE-2022-23586/" source="CVE"/>
		<reference ref_id="CVE-2022-23587" ref_url="https://www.suse.com/security/cve/CVE-2022-23587/" source="CVE"/>
		<reference ref_id="CVE-2022-23588" ref_url="https://www.suse.com/security/cve/CVE-2022-23588/" source="CVE"/>
		<reference ref_id="CVE-2022-23589" ref_url="https://www.suse.com/security/cve/CVE-2022-23589/" source="CVE"/>
		<reference ref_id="CVE-2022-23590" ref_url="https://www.suse.com/security/cve/CVE-2022-23590/" source="CVE"/>
		<reference ref_id="CVE-2022-23591" ref_url="https://www.suse.com/security/cve/CVE-2022-23591/" source="CVE"/>
		<reference ref_id="CVE-2022-23594" ref_url="https://www.suse.com/security/cve/CVE-2022-23594/" source="CVE"/>
		<reference ref_id="CVE-2022-23595" ref_url="https://www.suse.com/security/cve/CVE-2022-23595/" source="CVE"/>
		<description>
These are all security issues fixed in the tensorflow-lite-2.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15190/">CVE-2020-15190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15190">CVE-2020-15190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15191/">CVE-2020-15191 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15191">CVE-2020-15191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15194/">CVE-2020-15194 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15194">CVE-2020-15194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15202/">CVE-2020-15202 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15202">CVE-2020-15202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15203/">CVE-2020-15203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15203">CVE-2020-15203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15204/">CVE-2020-15204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15204">CVE-2020-15204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15205/">CVE-2020-15205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15205">CVE-2020-15205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15206/">CVE-2020-15206 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15206">CVE-2020-15206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15207/">CVE-2020-15207 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15207">CVE-2020-15207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15208/">CVE-2020-15208 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15208">CVE-2020-15208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15209/">CVE-2020-15209 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15209">CVE-2020-15209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26266/">CVE-2020-26266 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26266">CVE-2020-26266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26270/">CVE-2020-26270 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26270">CVE-2020-26270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22926/">CVE-2021-22926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22926">CVE-2021-22926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37635/">CVE-2021-37635 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37635">CVE-2021-37635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37636/">CVE-2021-37636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37636">CVE-2021-37636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37637/">CVE-2021-37637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37637">CVE-2021-37637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37638/">CVE-2021-37638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37638">CVE-2021-37638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37639/">CVE-2021-37639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37639">CVE-2021-37639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37640/">CVE-2021-37640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37640">CVE-2021-37640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37641/">CVE-2021-37641 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37641">CVE-2021-37641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37642/">CVE-2021-37642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37642">CVE-2021-37642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37643/">CVE-2021-37643 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37643">CVE-2021-37643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37644/">CVE-2021-37644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37644">CVE-2021-37644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37645/">CVE-2021-37645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37645">CVE-2021-37645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37646/">CVE-2021-37646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37646">CVE-2021-37646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37647/">CVE-2021-37647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37647">CVE-2021-37647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37648/">CVE-2021-37648 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37648">CVE-2021-37648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37649/">CVE-2021-37649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37649">CVE-2021-37649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37650/">CVE-2021-37650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37650">CVE-2021-37650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37651/">CVE-2021-37651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37651">CVE-2021-37651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37652/">CVE-2021-37652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37652">CVE-2021-37652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37653/">CVE-2021-37653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37653">CVE-2021-37653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37654/">CVE-2021-37654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37654">CVE-2021-37654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37655/">CVE-2021-37655 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37655">CVE-2021-37655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37656/">CVE-2021-37656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37656">CVE-2021-37656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37657/">CVE-2021-37657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37657">CVE-2021-37657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37658/">CVE-2021-37658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37658">CVE-2021-37658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37659/">CVE-2021-37659 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37659">CVE-2021-37659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37660/">CVE-2021-37660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37660">CVE-2021-37660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37661/">CVE-2021-37661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37661">CVE-2021-37661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37662/">CVE-2021-37662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37662">CVE-2021-37662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37663/">CVE-2021-37663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37663">CVE-2021-37663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37664/">CVE-2021-37664 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37664">CVE-2021-37664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37665/">CVE-2021-37665 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37665">CVE-2021-37665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37666/">CVE-2021-37666 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37666">CVE-2021-37666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37667/">CVE-2021-37667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37667">CVE-2021-37667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37668/">CVE-2021-37668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37668">CVE-2021-37668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37669/">CVE-2021-37669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37669">CVE-2021-37669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37670/">CVE-2021-37670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37670">CVE-2021-37670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37671/">CVE-2021-37671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37671">CVE-2021-37671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37672/">CVE-2021-37672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37672">CVE-2021-37672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37673/">CVE-2021-37673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37673">CVE-2021-37673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37674/">CVE-2021-37674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37674">CVE-2021-37674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37675/">CVE-2021-37675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37675">CVE-2021-37675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37676/">CVE-2021-37676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37676">CVE-2021-37676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37677/">CVE-2021-37677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37677">CVE-2021-37677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37678/">CVE-2021-37678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37678">CVE-2021-37678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37679/">CVE-2021-37679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37679">CVE-2021-37679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37680/">CVE-2021-37680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37680">CVE-2021-37680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37681/">CVE-2021-37681 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37681">CVE-2021-37681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37682/">CVE-2021-37682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37682">CVE-2021-37682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37683/">CVE-2021-37683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37683">CVE-2021-37683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37684/">CVE-2021-37684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37684">CVE-2021-37684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37685/">CVE-2021-37685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37685">CVE-2021-37685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37686/">CVE-2021-37686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37686">CVE-2021-37686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37687/">CVE-2021-37687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37687">CVE-2021-37687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37688/">CVE-2021-37688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37688">CVE-2021-37688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37689/">CVE-2021-37689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37689">CVE-2021-37689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37690/">CVE-2021-37690 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37690">CVE-2021-37690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37691/">CVE-2021-37691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37691">CVE-2021-37691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37692/">CVE-2021-37692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37692">CVE-2021-37692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41195/">CVE-2021-41195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41195">CVE-2021-41195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41196/">CVE-2021-41196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41196">CVE-2021-41196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41197/">CVE-2021-41197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41197">CVE-2021-41197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41198/">CVE-2021-41198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41198">CVE-2021-41198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41199/">CVE-2021-41199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41199">CVE-2021-41199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41200/">CVE-2021-41200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41200">CVE-2021-41200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41201/">CVE-2021-41201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41201">CVE-2021-41201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41202/">CVE-2021-41202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41202">CVE-2021-41202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41203/">CVE-2021-41203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41203">CVE-2021-41203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41204/">CVE-2021-41204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41204">CVE-2021-41204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41205/">CVE-2021-41205 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41205">CVE-2021-41205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41206/">CVE-2021-41206 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41206">CVE-2021-41206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41207/">CVE-2021-41207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41207">CVE-2021-41207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41208/">CVE-2021-41208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41208">CVE-2021-41208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41209/">CVE-2021-41209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41209">CVE-2021-41209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41210/">CVE-2021-41210 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41210">CVE-2021-41210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41211/">CVE-2021-41211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41211">CVE-2021-41211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41212/">CVE-2021-41212 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41212">CVE-2021-41212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41213/">CVE-2021-41213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41213">CVE-2021-41213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41214/">CVE-2021-41214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41214">CVE-2021-41214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41215/">CVE-2021-41215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41215">CVE-2021-41215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41216/">CVE-2021-41216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41216">CVE-2021-41216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41217/">CVE-2021-41217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41217">CVE-2021-41217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41218/">CVE-2021-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41218">CVE-2021-41218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41219/">CVE-2021-41219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41219">CVE-2021-41219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41220/">CVE-2021-41220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41220">CVE-2021-41220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41221/">CVE-2021-41221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41221">CVE-2021-41221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41222/">CVE-2021-41222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41222">CVE-2021-41222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41223/">CVE-2021-41223 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41223">CVE-2021-41223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41224/">CVE-2021-41224 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41224">CVE-2021-41224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41225/">CVE-2021-41225 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41225">CVE-2021-41225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41226/">CVE-2021-41226 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41226">CVE-2021-41226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41227/">CVE-2021-41227 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41227">CVE-2021-41227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41228/">CVE-2021-41228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41228">CVE-2021-41228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21725/">CVE-2022-21725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21725">CVE-2022-21725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21726/">CVE-2022-21726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21726">CVE-2022-21726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21727/">CVE-2022-21727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21727">CVE-2022-21727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21728/">CVE-2022-21728 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21728">CVE-2022-21728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21729/">CVE-2022-21729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21729">CVE-2022-21729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21730/">CVE-2022-21730 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21730">CVE-2022-21730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21731/">CVE-2022-21731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21731">CVE-2022-21731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21732/">CVE-2022-21732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21732">CVE-2022-21732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21733/">CVE-2022-21733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21733">CVE-2022-21733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21734/">CVE-2022-21734 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21734">CVE-2022-21734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21735/">CVE-2022-21735 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21735">CVE-2022-21735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21736/">CVE-2022-21736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21736">CVE-2022-21736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21737/">CVE-2022-21737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21737">CVE-2022-21737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21738/">CVE-2022-21738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21738">CVE-2022-21738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21739/">CVE-2022-21739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21739">CVE-2022-21739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21740/">CVE-2022-21740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21740">CVE-2022-21740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21741/">CVE-2022-21741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21741">CVE-2022-21741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23557/">CVE-2022-23557 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23557">CVE-2022-23557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23558/">CVE-2022-23558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23558">CVE-2022-23558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23559/">CVE-2022-23559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23559">CVE-2022-23559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23560/">CVE-2022-23560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23560">CVE-2022-23560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23561/">CVE-2022-23561 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23561">CVE-2022-23561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23562/">CVE-2022-23562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23562">CVE-2022-23562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23563/">CVE-2022-23563 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23563">CVE-2022-23563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23564/">CVE-2022-23564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23564">CVE-2022-23564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23565/">CVE-2022-23565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23565">CVE-2022-23565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23566/">CVE-2022-23566 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23566">CVE-2022-23566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23567/">CVE-2022-23567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23567">CVE-2022-23567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23568/">CVE-2022-23568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23568">CVE-2022-23568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23569/">CVE-2022-23569 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23569">CVE-2022-23569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23570/">CVE-2022-23570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23570">CVE-2022-23570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23571/">CVE-2022-23571 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23571">CVE-2022-23571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23572/">CVE-2022-23572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23572">CVE-2022-23572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23573/">CVE-2022-23573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23573">CVE-2022-23573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23574/">CVE-2022-23574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23574">CVE-2022-23574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23575/">CVE-2022-23575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23575">CVE-2022-23575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23576/">CVE-2022-23576 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23576">CVE-2022-23576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23577/">CVE-2022-23577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23577">CVE-2022-23577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23578/">CVE-2022-23578 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23578">CVE-2022-23578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23579/">CVE-2022-23579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23579">CVE-2022-23579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23580/">CVE-2022-23580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23580">CVE-2022-23580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23581/">CVE-2022-23581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23581">CVE-2022-23581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23582/">CVE-2022-23582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23582">CVE-2022-23582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23583/">CVE-2022-23583 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23583">CVE-2022-23583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23584/">CVE-2022-23584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23584">CVE-2022-23584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23585/">CVE-2022-23585 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23585">CVE-2022-23585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23586/">CVE-2022-23586 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23586">CVE-2022-23586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23587/">CVE-2022-23587 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23587">CVE-2022-23587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23588/">CVE-2022-23588 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23588">CVE-2022-23588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23589/">CVE-2022-23589 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23589">CVE-2022-23589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23590/">CVE-2022-23590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23590">CVE-2022-23590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23591/">CVE-2022-23591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23591">CVE-2022-23591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23594/">CVE-2022-23594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23594">CVE-2022-23594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23595/">CVE-2022-23595 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23595">CVE-2022-23595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925454" comment="tensorflow-lite-2.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925455" comment="tensorflow-lite-devel-2.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250438" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925456" comment="MozillaThunderbird-91.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925457" comment="MozillaThunderbird-translations-common-91.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925458" comment="MozillaThunderbird-translations-other-91.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250439" version="1" class="patch">
	<metadata>
		<title>libmodsecurity3-3.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15598" ref_url="https://www.suse.com/security/cve/CVE-2020-15598/" source="CVE"/>
		<reference ref_id="CVE-2021-42717" ref_url="https://www.suse.com/security/cve/CVE-2021-42717/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodsecurity3-3.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15598/">CVE-2020-15598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15598">CVE-2020-15598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42717/">CVE-2021-42717 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42717">CVE-2021-42717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925459" comment="libmodsecurity3-3.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925460" comment="libmodsecurity3-32bit-3.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925461" comment="modsecurity-3.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925462" comment="modsecurity-devel-3.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250440" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-2.2.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-2.2.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925463" comment="ruby3.1-rubygem-rack-2.2.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250441" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925465" comment="kernel-macros-5.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925466" comment="kernel-source-5.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925467" comment="kernel-source-vanilla-5.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250442" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-101.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1919" ref_url="https://www.suse.com/security/cve/CVE-2022-1919/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31743" ref_url="https://www.suse.com/security/cve/CVE-2022-31743/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-31745" ref_url="https://www.suse.com/security/cve/CVE-2022-31745/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="CVE-2022-31748" ref_url="https://www.suse.com/security/cve/CVE-2022-31748/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-101.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1919/">CVE-2022-1919 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1919">CVE-2022-1919 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31743/">CVE-2022-31743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31743">CVE-2022-31743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31745/">CVE-2022-31745 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31745">CVE-2022-31745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31748/">CVE-2022-31748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31748">CVE-2022-31748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925468" comment="MozillaFirefox-101.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925469" comment="MozillaFirefox-branding-upstream-101.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925470" comment="MozillaFirefox-devel-101.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925471" comment="MozillaFirefox-translations-common-101.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925472" comment="MozillaFirefox-translations-other-101.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250443" version="1" class="patch">
	<metadata>
		<title>cups-2.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925473" comment="cups-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925474" comment="cups-client-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925475" comment="cups-config-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925476" comment="cups-ddk-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925477" comment="cups-devel-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925478" comment="cups-devel-32bit-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925479" comment="libcups2-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925480" comment="libcups2-32bit-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925481" comment="libcupsimage2-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925482" comment="libcupsimage2-32bit-2.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250444" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29804" ref_url="https://www.suse.com/security/cve/CVE-2022-29804/" source="CVE"/>
		<reference ref_id="CVE-2022-30580" ref_url="https://www.suse.com/security/cve/CVE-2022-30580/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30634" ref_url="https://www.suse.com/security/cve/CVE-2022-30634/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29804/">CVE-2022-29804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29804">CVE-2022-29804 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30580/">CVE-2022-30580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30634/">CVE-2022-30634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30634">CVE-2022-30634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925483" comment="go1.17-1.17.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925484" comment="go1.17-doc-1.17.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925485" comment="go1.17-race-1.17.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250445" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29804" ref_url="https://www.suse.com/security/cve/CVE-2022-29804/" source="CVE"/>
		<reference ref_id="CVE-2022-30580" ref_url="https://www.suse.com/security/cve/CVE-2022-30580/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30634" ref_url="https://www.suse.com/security/cve/CVE-2022-30634/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29804/">CVE-2022-29804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29804">CVE-2022-29804 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30580/">CVE-2022-30580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30634/">CVE-2022-30634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30634">CVE-2022-30634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925486" comment="go1.18-1.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925487" comment="go1.18-doc-1.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925488" comment="go1.18-race-1.18.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250446" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.21.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26981" ref_url="https://www.suse.com/security/cve/CVE-2022-26981/" source="CVE"/>
		<reference ref_id="CVE-2022-31783" ref_url="https://www.suse.com/security/cve/CVE-2022-31783/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.21.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26981/">CVE-2022-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26981">CVE-2022-26981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-31783/">CVE-2022-31783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31783">CVE-2022-31783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925489" comment="liblouis-data-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925490" comment="liblouis-devel-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925491" comment="liblouis-doc-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925492" comment="liblouis-tools-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925493" comment="liblouis20-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925494" comment="python3-louis-3.21.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250447" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.2.25-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26520" ref_url="https://www.suse.com/security/cve/CVE-2022-26520/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.2.25-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-26520/">CVE-2022-26520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26520">CVE-2022-26520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925495" comment="postgresql-jdbc-42.2.25-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925496" comment="postgresql-jdbc-javadoc-42.2.25-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250448" version="1" class="patch">
	<metadata>
		<title>python310-suds-1.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-suds-1.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925497" comment="python310-suds-1.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925498" comment="python38-suds-1.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925499" comment="python39-suds-1.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250449" version="1" class="patch">
	<metadata>
		<title>starboard-0.15.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28946" ref_url="https://www.suse.com/security/cve/CVE-2022-28946/" source="CVE"/>
		<description>
These are all security issues fixed in the starboard-0.15.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28946/">CVE-2022-28946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28946">CVE-2022-28946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925500" comment="starboard-0.15.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250450" version="1" class="patch">
	<metadata>
		<title>bind-9.18.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1183" ref_url="https://www.suse.com/security/cve/CVE-2022-1183/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1183/">CVE-2022-1183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1183">CVE-2022-1183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925501" comment="bind-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925502" comment="bind-doc-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925503" comment="bind-modules-bdbhpt-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925504" comment="bind-modules-generic-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925505" comment="bind-modules-ldap-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925506" comment="bind-modules-mysql-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925507" comment="bind-modules-perl-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925508" comment="bind-modules-sqlite3-9.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925509" comment="bind-utils-9.18.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250451" version="1" class="patch">
	<metadata>
		<title>containerd-1.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31030" ref_url="https://www.suse.com/security/cve/CVE-2022-31030/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31030/">CVE-2022-31030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925510" comment="containerd-1.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925511" comment="containerd-ctr-1.6.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250452" version="1" class="patch">
	<metadata>
		<title>bat-0.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<description>
These are all security issues fixed in the bat-0.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925512" comment="bat-0.21.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250453" version="1" class="patch">
	<metadata>
		<title>caddy-2.5.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29718" ref_url="https://www.suse.com/security/cve/CVE-2022-29718/" source="CVE"/>
		<description>
These are all security issues fixed in the caddy-2.5.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29718/">CVE-2022-29718 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29718">CVE-2022-29718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925513" comment="caddy-2.5.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250454" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925515" comment="kernel-macros-5.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925516" comment="kernel-source-5.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925517" comment="kernel-source-vanilla-5.18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250455" version="1" class="patch">
	<metadata>
		<title>libdwarf-devel-0.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32200" ref_url="https://www.suse.com/security/cve/CVE-2022-32200/" source="CVE"/>
		<description>
These are all security issues fixed in the libdwarf-devel-0.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32200/">CVE-2022-32200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32200">CVE-2022-32200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925518" comment="libdwarf-devel-0.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925519" comment="libdwarf-devel-static-0.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925520" comment="libdwarf-doc-0.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925521" comment="libdwarf-tools-0.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925522" comment="libdwarf0-0.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250456" version="1" class="patch">
	<metadata>
		<title>distribution-registry-2.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11468" ref_url="https://www.suse.com/security/cve/CVE-2017-11468/" source="CVE"/>
		<description>
These are all security issues fixed in the distribution-registry-2.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11468/">CVE-2017-11468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11468">CVE-2017-11468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925523" comment="distribution-registry-2.8.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250457" version="1" class="patch">
	<metadata>
		<title>firejail-0.9.68-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31214" ref_url="https://www.suse.com/security/cve/CVE-2022-31214/" source="CVE"/>
		<description>
These are all security issues fixed in the firejail-0.9.68-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31214/">CVE-2022-31214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31214">CVE-2022-31214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925524" comment="firejail-0.9.68-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925525" comment="firejail-bash-completion-0.9.68-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925526" comment="firejail-zsh-completion-0.9.68-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250458" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28735" ref_url="https://www.suse.com/security/cve/CVE-2022-28735/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-25.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28735/">CVE-2022-28735 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925527" comment="grub2-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925528" comment="grub2-branding-upstream-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925529" comment="grub2-i386-pc-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925530" comment="grub2-i386-pc-debug-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925531" comment="grub2-snapper-plugin-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925532" comment="grub2-systemd-sleep-plugin-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925533" comment="grub2-x86_64-efi-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925534" comment="grub2-x86_64-efi-debug-2.06-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925535" comment="grub2-x86_64-xen-2.06-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250459" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1o-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1o-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925536" comment="libopenssl-1_1-devel-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925537" comment="libopenssl-1_1-devel-32bit-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925538" comment="libopenssl1_1-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925539" comment="libopenssl1_1-32bit-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925540" comment="libopenssl1_1-hmac-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925541" comment="libopenssl1_1-hmac-32bit-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925542" comment="openssl-1_1-1.1.1o-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925543" comment="openssl-1_1-doc-1.1.1o-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250460" version="1" class="patch">
	<metadata>
		<title>python310-PyJWT-2.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29217" ref_url="https://www.suse.com/security/cve/CVE-2022-29217/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-PyJWT-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29217/">CVE-2022-29217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29217">CVE-2022-29217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925544" comment="python310-PyJWT-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925545" comment="python38-PyJWT-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925546" comment="python39-PyJWT-2.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250461" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0797" ref_url="https://www.suse.com/security/cve/CVE-2022-0797/" source="CVE"/>
		<reference ref_id="CVE-2022-1125" ref_url="https://www.suse.com/security/cve/CVE-2022-1125/" source="CVE"/>
		<reference ref_id="CVE-2022-1138" ref_url="https://www.suse.com/security/cve/CVE-2022-1138/" source="CVE"/>
		<reference ref_id="CVE-2022-1305" ref_url="https://www.suse.com/security/cve/CVE-2022-1305/" source="CVE"/>
		<reference ref_id="CVE-2022-1310" ref_url="https://www.suse.com/security/cve/CVE-2022-1310/" source="CVE"/>
		<reference ref_id="CVE-2022-1314" ref_url="https://www.suse.com/security/cve/CVE-2022-1314/" source="CVE"/>
		<reference ref_id="CVE-2022-1493" ref_url="https://www.suse.com/security/cve/CVE-2022-1493/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0797/">CVE-2022-0797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0797">CVE-2022-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1125/">CVE-2022-1125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1125">CVE-2022-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1138/">CVE-2022-1138 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1138">CVE-2022-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1305/">CVE-2022-1305 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1305">CVE-2022-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1310/">CVE-2022-1310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1310">CVE-2022-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1314/">CVE-2022-1314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1314">CVE-2022-1314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1493/">CVE-2022-1493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1493">CVE-2022-1493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925547" comment="libQt5Pdf5-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925548" comment="libQt5PdfWidgets5-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925549" comment="libqt5-qtpdf-devel-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925550" comment="libqt5-qtpdf-examples-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925551" comment="libqt5-qtpdf-imports-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925552" comment="libqt5-qtpdf-private-headers-devel-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925553" comment="libqt5-qtwebengine-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925554" comment="libqt5-qtwebengine-devel-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925555" comment="libqt5-qtwebengine-examples-5.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925556" comment="libqt5-qtwebengine-private-headers-devel-5.15.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250462" version="1" class="patch">
	<metadata>
		<title>chromedriver-102.0.5005.115-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2007" ref_url="https://www.suse.com/security/cve/CVE-2022-2007/" source="CVE"/>
		<reference ref_id="CVE-2022-2008" ref_url="https://www.suse.com/security/cve/CVE-2022-2008/" source="CVE"/>
		<reference ref_id="CVE-2022-2010" ref_url="https://www.suse.com/security/cve/CVE-2022-2010/" source="CVE"/>
		<reference ref_id="CVE-2022-2011" ref_url="https://www.suse.com/security/cve/CVE-2022-2011/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-102.0.5005.115-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2007/">CVE-2022-2007 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2007">CVE-2022-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2008/">CVE-2022-2008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2008">CVE-2022-2008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2010/">CVE-2022-2010 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2010">CVE-2022-2010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2011/">CVE-2022-2011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2011">CVE-2022-2011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925557" comment="chromedriver-102.0.5005.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925558" comment="chromium-102.0.5005.115-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250463" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28330" ref_url="https://www.suse.com/security/cve/CVE-2022-28330/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28330/">CVE-2022-28330 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28330">CVE-2022-28330 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925559" comment="apache2-2.4.54-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250464" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-22.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925560" comment="python-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925561" comment="python-32bit-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925562" comment="python-curses-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925563" comment="python-demo-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925564" comment="python-gdbm-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925565" comment="python-idle-2.7.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925566" comment="python-tk-2.7.18-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250465" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-jquery-rails-4.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-jquery-rails-4.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925567" comment="ruby3.1-rubygem-jquery-rails-4.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250466" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925568" comment="ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250467" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-1973" ref_url="https://www.suse.com/security/cve/CVE-2022-1973/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1973/">CVE-2022-1973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925570" comment="kernel-macros-5.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925571" comment="kernel-source-5.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925572" comment="kernel-source-vanilla-5.18.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250468" version="1" class="patch">
	<metadata>
		<title>python310-jupyter-server-1.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29241" ref_url="https://www.suse.com/security/cve/CVE-2022-29241/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jupyter-server-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29241/">CVE-2022-29241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29241">CVE-2022-29241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925573" comment="python310-jupyter-server-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925574" comment="python310-jupyter-server-test-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925575" comment="python38-jupyter-server-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925576" comment="python38-jupyter-server-test-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925577" comment="python39-jupyter-server-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925578" comment="python39-jupyter-server-test-1.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250469" version="1" class="patch">
	<metadata>
		<title>jupyter-notebook-6.4.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29238" ref_url="https://www.suse.com/security/cve/CVE-2022-29238/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-notebook-6.4.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29238/">CVE-2022-29238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-29238">CVE-2022-29238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925579" comment="jupyter-notebook-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925580" comment="jupyter-notebook-lang-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925581" comment="jupyter-notebook-latex-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925582" comment="python310-notebook-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925583" comment="python310-notebook-lang-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925584" comment="python38-notebook-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925585" comment="python38-notebook-lang-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925586" comment="python39-notebook-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925587" comment="python39-notebook-lang-6.4.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250470" version="1" class="patch">
	<metadata>
		<title>tor-0.4.7.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33903" ref_url="https://www.suse.com/security/cve/CVE-2022-33903/" source="CVE"/>
		<description>
These are all security issues fixed in the tor-0.4.7.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33903/">CVE-2022-33903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33903">CVE-2022-33903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925588" comment="tor-0.4.7.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250471" version="1" class="patch">
	<metadata>
		<title>python39-3.9.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925589" comment="python39-3.9.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925590" comment="python39-32bit-3.9.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925591" comment="python39-curses-3.9.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925592" comment="python39-dbm-3.9.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925593" comment="python39-idle-3.9.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925594" comment="python39-tk-3.9.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250472" version="1" class="patch">
	<metadata>
		<title>chafa-1.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2061" ref_url="https://www.suse.com/security/cve/CVE-2022-2061/" source="CVE"/>
		<description>
These are all security issues fixed in the chafa-1.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2061/">CVE-2022-2061 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2061">CVE-2022-2061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925595" comment="chafa-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925596" comment="chafa-devel-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925597" comment="chafa-doc-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925598" comment="libchafa0-1.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250473" version="1" class="patch">
	<metadata>
		<title>python310-3.10.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925599" comment="python310-3.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925600" comment="python310-32bit-3.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925601" comment="python310-curses-3.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925602" comment="python310-dbm-3.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925603" comment="python310-idle-3.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925604" comment="python310-tk-3.10.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250474" version="1" class="patch">
	<metadata>
		<title>keylime-agent-6.4.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31250" ref_url="https://www.suse.com/security/cve/CVE-2022-31250/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-agent-6.4.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31250/">CVE-2022-31250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31250">CVE-2022-31250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925605" comment="keylime-agent-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925606" comment="keylime-config-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925607" comment="keylime-firewalld-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925608" comment="keylime-logrotate-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925609" comment="keylime-registrar-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925610" comment="keylime-tpm_cert_store-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925611" comment="keylime-verifier-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925612" comment="python310-keylime-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925613" comment="python38-keylime-6.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925614" comment="python39-keylime-6.4.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250475" version="1" class="patch">
	<metadata>
		<title>python3-salt-3004-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22967" ref_url="https://www.suse.com/security/cve/CVE-2022-22967/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3004-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22967/">CVE-2022-22967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22967">CVE-2022-22967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925615" comment="python3-salt-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925616" comment="salt-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925617" comment="salt-api-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925618" comment="salt-bash-completion-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925619" comment="salt-cloud-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925620" comment="salt-doc-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925621" comment="salt-fish-completion-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925622" comment="salt-master-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925623" comment="salt-minion-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925624" comment="salt-proxy-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925625" comment="salt-ssh-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925626" comment="salt-standalone-formulas-configuration-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925627" comment="salt-syndic-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925628" comment="salt-transactional-update-3004-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925629" comment="salt-zsh-completion-3004-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250476" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925631" comment="kernel-macros-5.18.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925632" comment="kernel-source-5.18.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925633" comment="kernel-source-vanilla-5.18.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250477" version="1" class="patch">
	<metadata>
		<title>liblua5_4-5-32bit-5.4.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519/" source="CVE"/>
		<reference ref_id="CVE-2021-44647" ref_url="https://www.suse.com/security/cve/CVE-2021-44647/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_4-5-32bit-5.4.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44647/">CVE-2021-44647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44647">CVE-2021-44647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925634" comment="liblua5_4-5-5.4.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925635" comment="liblua5_4-5-32bit-5.4.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925636" comment="lua54-5.4.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925637" comment="lua54-devel-5.4.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925638" comment="lua54-doc-5.4.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250478" version="1" class="patch">
	<metadata>
		<title>squid-5.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-5.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925639" comment="squid-5.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250479" version="1" class="patch">
	<metadata>
		<title>chromedriver-103.0.5060.53-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2156" ref_url="https://www.suse.com/security/cve/CVE-2022-2156/" source="CVE"/>
		<reference ref_id="CVE-2022-2157" ref_url="https://www.suse.com/security/cve/CVE-2022-2157/" source="CVE"/>
		<reference ref_id="CVE-2022-2158" ref_url="https://www.suse.com/security/cve/CVE-2022-2158/" source="CVE"/>
		<reference ref_id="CVE-2022-2160" ref_url="https://www.suse.com/security/cve/CVE-2022-2160/" source="CVE"/>
		<reference ref_id="CVE-2022-2161" ref_url="https://www.suse.com/security/cve/CVE-2022-2161/" source="CVE"/>
		<reference ref_id="CVE-2022-2162" ref_url="https://www.suse.com/security/cve/CVE-2022-2162/" source="CVE"/>
		<reference ref_id="CVE-2022-2163" ref_url="https://www.suse.com/security/cve/CVE-2022-2163/" source="CVE"/>
		<reference ref_id="CVE-2022-2164" ref_url="https://www.suse.com/security/cve/CVE-2022-2164/" source="CVE"/>
		<reference ref_id="CVE-2022-2165" ref_url="https://www.suse.com/security/cve/CVE-2022-2165/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-103.0.5060.53-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2156/">CVE-2022-2156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2156">CVE-2022-2156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2157/">CVE-2022-2157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2157">CVE-2022-2157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2158/">CVE-2022-2158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2158">CVE-2022-2158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2160/">CVE-2022-2160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2160">CVE-2022-2160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2161/">CVE-2022-2161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2161">CVE-2022-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2162/">CVE-2022-2162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2162">CVE-2022-2162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2163/">CVE-2022-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2163">CVE-2022-2163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2164/">CVE-2022-2164 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2164">CVE-2022-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2165/">CVE-2022-2165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2165">CVE-2022-2165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925640" comment="chromedriver-103.0.5060.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925641" comment="chromium-103.0.5060.53-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250480" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1p-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1p-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925642" comment="libopenssl-1_1-devel-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925643" comment="libopenssl-1_1-devel-32bit-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925644" comment="libopenssl1_1-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925645" comment="libopenssl1_1-32bit-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925646" comment="libopenssl1_1-hmac-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925647" comment="libopenssl1_1-hmac-32bit-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925648" comment="openssl-1_1-1.1.1p-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925649" comment="openssl-1_1-doc-1.1.1p-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250481" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.61.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31052" ref_url="https://www.suse.com/security/cve/CVE-2022-31052/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.61.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31052/">CVE-2022-31052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31052">CVE-2022-31052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925650" comment="matrix-synapse-1.61.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250482" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-91.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-91.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925651" comment="MozillaThunderbird-91.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925652" comment="MozillaThunderbird-translations-common-91.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925653" comment="MozillaThunderbird-translations-other-91.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250483" version="1" class="patch">
	<metadata>
		<title>conmon-2.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<description>
These are all security issues fixed in the conmon-2.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925654" comment="conmon-2.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250484" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.332-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.332-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925655" comment="java-1_8_0-openjdk-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925656" comment="java-1_8_0-openjdk-accessibility-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925657" comment="java-1_8_0-openjdk-demo-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925658" comment="java-1_8_0-openjdk-devel-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925659" comment="java-1_8_0-openjdk-headless-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925660" comment="java-1_8_0-openjdk-javadoc-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925661" comment="java-1_8_0-openjdk-src-1.8.0.332-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250485" version="1" class="patch">
	<metadata>
		<title>guestfs-tools-1.48.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-tools-1.48.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925662" comment="guestfs-tools-1.48.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925663" comment="guestfs-tools-bash-completion-1.48.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925664" comment="guestfs-tools-man-pages-ja-1.48.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925665" comment="guestfs-tools-man-pages-uk-1.48.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925666" comment="virt-win-reg-1.48.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250486" version="1" class="patch">
	<metadata>
		<title>libguestfs-1.48.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the libguestfs-1.48.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925667" comment="libguestfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925668" comment="libguestfs-appliance-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925669" comment="libguestfs-bash-completion-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925670" comment="libguestfs-devel-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925671" comment="libguestfs-gobject-1_0-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925672" comment="libguestfs-gobject-devel-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925673" comment="libguestfs-inspect-icons-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925674" comment="libguestfs-man-pages-ja-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925675" comment="libguestfs-man-pages-uk-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925676" comment="libguestfs-rescue-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925677" comment="libguestfs-rsync-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925678" comment="libguestfs-typelib-Guestfs-1_0-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925679" comment="libguestfs-winsupport-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925680" comment="libguestfs-xfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925681" comment="libguestfs0-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925682" comment="libguestfsd-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925683" comment="lua-libguestfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925684" comment="ocaml-libguestfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925685" comment="ocaml-libguestfs-devel-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925686" comment="perl-Sys-Guestfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925687" comment="python3-libguestfs-1.48.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925688" comment="rubygem-libguestfs-1.48.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250487" version="1" class="patch">
	<metadata>
		<title>virt-v2v-2.0.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-v2v-2.0.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925689" comment="virt-v2v-2.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925690" comment="virt-v2v-bash-completion-2.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925691" comment="virt-v2v-man-pages-ja-2.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925692" comment="virt-v2v-man-pages-uk-2.0.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250488" version="1" class="patch">
	<metadata>
		<title>liblua5_4-5-32bit-5.4.4-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33099" ref_url="https://www.suse.com/security/cve/CVE-2022-33099/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_4-5-32bit-5.4.4-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33099/">CVE-2022-33099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925693" comment="liblua5_4-5-5.4.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925694" comment="liblua5_4-5-32bit-5.4.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925695" comment="lua54-5.4.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925696" comment="lua54-devel-5.4.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925697" comment="lua54-doc-5.4.4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250489" version="1" class="patch">
	<metadata>
		<title>harfbuzz-devel-4.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<description>
These are all security issues fixed in the harfbuzz-devel-4.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925698" comment="harfbuzz-devel-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925699" comment="harfbuzz-tools-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925700" comment="libharfbuzz-gobject0-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925701" comment="libharfbuzz-gobject0-32bit-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925702" comment="libharfbuzz-icu0-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925703" comment="libharfbuzz-icu0-32bit-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925704" comment="libharfbuzz-subset0-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925705" comment="libharfbuzz-subset0-32bit-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925706" comment="libharfbuzz0-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925707" comment="libharfbuzz0-32bit-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925708" comment="typelib-1_0-HarfBuzz-0_0-4.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250490" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-19.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2162" ref_url="https://www.suse.com/security/cve/CVE-2022-2162/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-19.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2162/">CVE-2022-2162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2162">CVE-2022-2162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925709" comment="nodejs-electron-19.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925710" comment="nodejs-electron-devel-19.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250491" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0032-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0032-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925711" comment="gvim-9.0.0032-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925712" comment="vim-9.0.0032-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925713" comment="vim-data-9.0.0032-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925714" comment="vim-data-common-9.0.0032-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925715" comment="vim-small-9.0.0032-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250492" version="1" class="patch">
	<metadata>
		<title>librttopo-devel-1.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18359" ref_url="https://www.suse.com/security/cve/CVE-2017-18359/" source="CVE"/>
		<description>
These are all security issues fixed in the librttopo-devel-1.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18359/">CVE-2017-18359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18359">CVE-2017-18359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925716" comment="librttopo-devel-1.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925717" comment="librttopo1-1.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250493" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925718" comment="python310-Django-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925719" comment="python38-Django-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925720" comment="python39-Django-4.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250494" version="1" class="patch">
	<metadata>
		<title>radare2-5.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0139" ref_url="https://www.suse.com/security/cve/CVE-2022-0139/" source="CVE"/>
		<reference ref_id="CVE-2022-0173" ref_url="https://www.suse.com/security/cve/CVE-2022-0173/" source="CVE"/>
		<reference ref_id="CVE-2022-0419" ref_url="https://www.suse.com/security/cve/CVE-2022-0419/" source="CVE"/>
		<reference ref_id="CVE-2022-0476" ref_url="https://www.suse.com/security/cve/CVE-2022-0476/" source="CVE"/>
		<reference ref_id="CVE-2022-0518" ref_url="https://www.suse.com/security/cve/CVE-2022-0518/" source="CVE"/>
		<reference ref_id="CVE-2022-0519" ref_url="https://www.suse.com/security/cve/CVE-2022-0519/" source="CVE"/>
		<reference ref_id="CVE-2022-0520" ref_url="https://www.suse.com/security/cve/CVE-2022-0520/" source="CVE"/>
		<reference ref_id="CVE-2022-0521" ref_url="https://www.suse.com/security/cve/CVE-2022-0521/" source="CVE"/>
		<reference ref_id="CVE-2022-0522" ref_url="https://www.suse.com/security/cve/CVE-2022-0522/" source="CVE"/>
		<reference ref_id="CVE-2022-0523" ref_url="https://www.suse.com/security/cve/CVE-2022-0523/" source="CVE"/>
		<reference ref_id="CVE-2022-0559" ref_url="https://www.suse.com/security/cve/CVE-2022-0559/" source="CVE"/>
		<reference ref_id="CVE-2022-0676" ref_url="https://www.suse.com/security/cve/CVE-2022-0676/" source="CVE"/>
		<reference ref_id="CVE-2022-0695" ref_url="https://www.suse.com/security/cve/CVE-2022-0695/" source="CVE"/>
		<reference ref_id="CVE-2022-0712" ref_url="https://www.suse.com/security/cve/CVE-2022-0712/" source="CVE"/>
		<reference ref_id="CVE-2022-0713" ref_url="https://www.suse.com/security/cve/CVE-2022-0713/" source="CVE"/>
		<reference ref_id="CVE-2022-0849" ref_url="https://www.suse.com/security/cve/CVE-2022-0849/" source="CVE"/>
		<reference ref_id="CVE-2022-1031" ref_url="https://www.suse.com/security/cve/CVE-2022-1031/" source="CVE"/>
		<reference ref_id="CVE-2022-1052" ref_url="https://www.suse.com/security/cve/CVE-2022-1052/" source="CVE"/>
		<reference ref_id="CVE-2022-1061" ref_url="https://www.suse.com/security/cve/CVE-2022-1061/" source="CVE"/>
		<reference ref_id="CVE-2022-1207" ref_url="https://www.suse.com/security/cve/CVE-2022-1207/" source="CVE"/>
		<reference ref_id="CVE-2022-1237" ref_url="https://www.suse.com/security/cve/CVE-2022-1237/" source="CVE"/>
		<reference ref_id="CVE-2022-1238" ref_url="https://www.suse.com/security/cve/CVE-2022-1238/" source="CVE"/>
		<reference ref_id="CVE-2022-1240" ref_url="https://www.suse.com/security/cve/CVE-2022-1240/" source="CVE"/>
		<reference ref_id="CVE-2022-1244" ref_url="https://www.suse.com/security/cve/CVE-2022-1244/" source="CVE"/>
		<reference ref_id="CVE-2022-1283" ref_url="https://www.suse.com/security/cve/CVE-2022-1283/" source="CVE"/>
		<reference ref_id="CVE-2022-1284" ref_url="https://www.suse.com/security/cve/CVE-2022-1284/" source="CVE"/>
		<reference ref_id="CVE-2022-1296" ref_url="https://www.suse.com/security/cve/CVE-2022-1296/" source="CVE"/>
		<reference ref_id="CVE-2022-1297" ref_url="https://www.suse.com/security/cve/CVE-2022-1297/" source="CVE"/>
		<reference ref_id="CVE-2022-1382" ref_url="https://www.suse.com/security/cve/CVE-2022-1382/" source="CVE"/>
		<reference ref_id="CVE-2022-1383" ref_url="https://www.suse.com/security/cve/CVE-2022-1383/" source="CVE"/>
		<reference ref_id="CVE-2022-1437" ref_url="https://www.suse.com/security/cve/CVE-2022-1437/" source="CVE"/>
		<reference ref_id="CVE-2022-1444" ref_url="https://www.suse.com/security/cve/CVE-2022-1444/" source="CVE"/>
		<reference ref_id="CVE-2022-1451" ref_url="https://www.suse.com/security/cve/CVE-2022-1451/" source="CVE"/>
		<reference ref_id="CVE-2022-1452" ref_url="https://www.suse.com/security/cve/CVE-2022-1452/" source="CVE"/>
		<reference ref_id="CVE-2022-1649" ref_url="https://www.suse.com/security/cve/CVE-2022-1649/" source="CVE"/>
		<reference ref_id="CVE-2022-1714" ref_url="https://www.suse.com/security/cve/CVE-2022-1714/" source="CVE"/>
		<reference ref_id="CVE-2022-1809" ref_url="https://www.suse.com/security/cve/CVE-2022-1809/" source="CVE"/>
		<reference ref_id="CVE-2022-1899" ref_url="https://www.suse.com/security/cve/CVE-2022-1899/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0139/">CVE-2022-0139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0139">CVE-2022-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0173/">CVE-2022-0173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0173">CVE-2022-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0419/">CVE-2022-0419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0419">CVE-2022-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0476/">CVE-2022-0476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0476">CVE-2022-0476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0518/">CVE-2022-0518 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0518">CVE-2022-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0519/">CVE-2022-0519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0519">CVE-2022-0519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0520/">CVE-2022-0520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0520">CVE-2022-0520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0521/">CVE-2022-0521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0521">CVE-2022-0521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0522/">CVE-2022-0522 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0522">CVE-2022-0522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0523/">CVE-2022-0523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0523">CVE-2022-0523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0559/">CVE-2022-0559 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0559">CVE-2022-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0676/">CVE-2022-0676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0676">CVE-2022-0676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0695/">CVE-2022-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0695">CVE-2022-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0712/">CVE-2022-0712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0712">CVE-2022-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0713/">CVE-2022-0713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0713">CVE-2022-0713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0849/">CVE-2022-0849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0849">CVE-2022-0849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1031/">CVE-2022-1031 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1031">CVE-2022-1031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1052/">CVE-2022-1052 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1052">CVE-2022-1052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1061/">CVE-2022-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1061">CVE-2022-1061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1207/">CVE-2022-1207 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1207">CVE-2022-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1237/">CVE-2022-1237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1237">CVE-2022-1237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1238/">CVE-2022-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1238">CVE-2022-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1240/">CVE-2022-1240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1240">CVE-2022-1240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1244/">CVE-2022-1244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1244">CVE-2022-1244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1283/">CVE-2022-1283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1283">CVE-2022-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1284/">CVE-2022-1284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1284">CVE-2022-1284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1296/">CVE-2022-1296 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1296">CVE-2022-1296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1297/">CVE-2022-1297 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1297">CVE-2022-1297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1382/">CVE-2022-1382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1382">CVE-2022-1382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1383/">CVE-2022-1383 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1383">CVE-2022-1383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1437/">CVE-2022-1437 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1437">CVE-2022-1437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1444/">CVE-2022-1444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1444">CVE-2022-1444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1451/">CVE-2022-1451 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1451">CVE-2022-1451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1452/">CVE-2022-1452 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1452">CVE-2022-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1649/">CVE-2022-1649 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1649">CVE-2022-1649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1714/">CVE-2022-1714 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1714">CVE-2022-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1809/">CVE-2022-1809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1809">CVE-2022-1809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1899/">CVE-2022-1899 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1899">CVE-2022-1899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925721" comment="radare2-5.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925722" comment="radare2-devel-5.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925723" comment="radare2-zsh-completion-5.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250495" version="1" class="patch">
	<metadata>
		<title>libsnmp40-32bit-5.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp40-32bit-5.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925724" comment="libsnmp40-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925725" comment="libsnmp40-32bit-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925726" comment="net-snmp-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925727" comment="net-snmp-devel-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925728" comment="net-snmp-devel-32bit-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925729" comment="perl-SNMP-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925730" comment="python310-net-snmp-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925731" comment="python38-net-snmp-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925732" comment="python39-net-snmp-5.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925733" comment="snmp-mibs-5.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250496" version="1" class="patch">
	<metadata>
		<title>libprotobuf-c-devel-1.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33070" ref_url="https://www.suse.com/security/cve/CVE-2022-33070/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-c-devel-1.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-33070/">CVE-2022-33070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33070">CVE-2022-33070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925734" comment="libprotobuf-c-devel-1.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925735" comment="libprotobuf-c1-1.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250497" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925736" comment="libtiff-devel-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925737" comment="libtiff-devel-32bit-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925738" comment="libtiff5-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925739" comment="libtiff5-32bit-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925740" comment="tiff-4.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250498" version="1" class="patch">
	<metadata>
		<title>libSDL2_ttf-2_0-0-2.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27470" ref_url="https://www.suse.com/security/cve/CVE-2022-27470/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2_ttf-2_0-0-2.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27470/">CVE-2022-27470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27470">CVE-2022-27470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925741" comment="libSDL2_ttf-2_0-0-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925742" comment="libSDL2_ttf-devel-2.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250499" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925743" comment="libopenssl-1_0_0-devel-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925744" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925745" comment="libopenssl10-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925746" comment="libopenssl1_0_0-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925747" comment="libopenssl1_0_0-32bit-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925748" comment="libopenssl1_0_0-hmac-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925749" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925750" comment="libopenssl1_0_0-steam-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925751" comment="libopenssl1_0_0-steam-32bit-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925752" comment="openssl-1_0_0-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925753" comment="openssl-1_0_0-cavs-1.0.2u-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925754" comment="openssl-1_0_0-doc-1.0.2u-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250500" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1q-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1q-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925755" comment="libopenssl-1_1-devel-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925756" comment="libopenssl-1_1-devel-32bit-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925757" comment="libopenssl1_1-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925758" comment="libopenssl1_1-32bit-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925759" comment="libopenssl1_1-hmac-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925760" comment="libopenssl1_1-hmac-32bit-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925761" comment="openssl-1_1-1.1.1q-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925762" comment="openssl-1_1-doc-1.1.1q-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250501" version="1" class="patch">
	<metadata>
		<title>chromedriver-103.0.5060.114-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="CVE-2022-2295" ref_url="https://www.suse.com/security/cve/CVE-2022-2295/" source="CVE"/>
		<reference ref_id="CVE-2022-2296" ref_url="https://www.suse.com/security/cve/CVE-2022-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-103.0.5060.114-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2294">CVE-2022-2294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2295/">CVE-2022-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2295">CVE-2022-2295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2296/">CVE-2022-2296 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2296">CVE-2022-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925763" comment="chromedriver-103.0.5060.114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925764" comment="chromium-103.0.5060.114-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250502" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925766" comment="kernel-macros-5.18.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925767" comment="kernel-source-5.18.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925768" comment="kernel-source-vanilla-5.18.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250503" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.48-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2047" ref_url="https://www.suse.com/security/cve/CVE-2022-2047/" source="CVE"/>
		<reference ref_id="CVE-2022-2048" ref_url="https://www.suse.com/security/cve/CVE-2022-2048/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.48-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2047/">CVE-2022-2047 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2047">CVE-2022-2047 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2048/">CVE-2022-2048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2048">CVE-2022-2048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925769" comment="jetty-annotations-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925770" comment="jetty-ant-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925771" comment="jetty-cdi-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925772" comment="jetty-client-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925773" comment="jetty-continuation-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925774" comment="jetty-deploy-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925775" comment="jetty-fcgi-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925776" comment="jetty-http-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925777" comment="jetty-http-spi-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925778" comment="jetty-io-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925779" comment="jetty-jaas-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925780" comment="jetty-jmx-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925781" comment="jetty-jndi-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925782" comment="jetty-jsp-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925783" comment="jetty-minimal-javadoc-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925784" comment="jetty-openid-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925785" comment="jetty-plus-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925786" comment="jetty-proxy-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925787" comment="jetty-quickstart-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925788" comment="jetty-rewrite-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925789" comment="jetty-security-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925790" comment="jetty-server-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925791" comment="jetty-servlet-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925792" comment="jetty-servlets-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925793" comment="jetty-start-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925794" comment="jetty-util-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925795" comment="jetty-util-ajax-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925796" comment="jetty-webapp-9.4.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925797" comment="jetty-xml-9.4.48-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250504" version="1" class="patch">
	<metadata>
		<title>python310-ujson-5.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31116" ref_url="https://www.suse.com/security/cve/CVE-2022-31116/" source="CVE"/>
		<reference ref_id="CVE-2022-31117" ref_url="https://www.suse.com/security/cve/CVE-2022-31117/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ujson-5.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31116/">CVE-2022-31116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31116">CVE-2022-31116 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31117/">CVE-2022-31117 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31117">CVE-2022-31117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925798" comment="python310-ujson-5.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925799" comment="python38-ujson-5.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925800" comment="python39-ujson-5.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250505" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-102.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-102.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925801" comment="MozillaFirefox-102.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925802" comment="MozillaFirefox-branding-upstream-102.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925803" comment="MozillaFirefox-devel-102.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925804" comment="MozillaFirefox-translations-common-102.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925805" comment="MozillaFirefox-translations-other-102.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250506" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41041" ref_url="https://www.suse.com/security/cve/CVE-2021-41041/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41041/">CVE-2021-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41041">CVE-2021-41041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925806" comment="java-11-openj9-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925807" comment="java-11-openj9-accessibility-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925808" comment="java-11-openj9-demo-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925809" comment="java-11-openj9-devel-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925810" comment="java-11-openj9-headless-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925811" comment="java-11-openj9-javadoc-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925812" comment="java-11-openj9-jmods-11.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925813" comment="java-11-openj9-src-11.0.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250507" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.332-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41041" ref_url="https://www.suse.com/security/cve/CVE-2021-41041/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.332-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41041/">CVE-2021-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41041">CVE-2021-41041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925814" comment="java-1_8_0-openj9-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925815" comment="java-1_8_0-openj9-accessibility-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925816" comment="java-1_8_0-openj9-demo-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925817" comment="java-1_8_0-openj9-devel-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925818" comment="java-1_8_0-openj9-headless-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925819" comment="java-1_8_0-openj9-javadoc-1.8.0.332-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925820" comment="java-1_8_0-openj9-src-1.8.0.332-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250508" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.3-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.3-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925821" comment="xorg-x11-server-21.1.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925822" comment="xorg-x11-server-Xvfb-21.1.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925823" comment="xorg-x11-server-extra-21.1.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925824" comment="xorg-x11-server-sdk-21.1.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925825" comment="xorg-x11-server-source-21.1.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925826" comment="xorg-x11-server-wrapper-21.1.3-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250509" version="1" class="patch">
	<metadata>
		<title>git-2.37.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.37.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925827" comment="git-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925828" comment="git-arch-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925829" comment="git-core-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925830" comment="git-credential-gnome-keyring-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925831" comment="git-credential-libsecret-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925832" comment="git-cvs-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925833" comment="git-daemon-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925834" comment="git-doc-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925835" comment="git-email-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925836" comment="git-gui-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925837" comment="git-p4-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925838" comment="git-svn-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925839" comment="git-web-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925840" comment="gitk-2.37.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925841" comment="perl-Git-2.37.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250510" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925842" comment="go1.17-1.17.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925843" comment="go1.17-doc-1.17.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925844" comment="go1.17-race-1.17.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250511" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925845" comment="go1.18-1.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925846" comment="go1.18-doc-1.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925847" comment="go1.18-race-1.18.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250512" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0813" ref_url="https://www.suse.com/security/cve/CVE-2022-0813/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0813/">CVE-2022-0813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0813">CVE-2022-0813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925848" comment="phpMyAdmin-5.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925849" comment="phpMyAdmin-apache-5.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925850" comment="phpMyAdmin-lang-5.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250513" version="1" class="patch">
	<metadata>
		<title>python-M2Crypto-doc-0.38.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<description>
These are all security issues fixed in the python-M2Crypto-doc-0.38.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925851" comment="python-M2Crypto-doc-0.38.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925852" comment="python310-M2Crypto-0.38.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925853" comment="python38-M2Crypto-0.38.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925854" comment="python39-M2Crypto-0.38.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250514" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.18.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.18.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925856" comment="kernel-macros-5.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925857" comment="kernel-source-5.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925858" comment="kernel-source-vanilla-5.18.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250515" version="1" class="patch">
	<metadata>
		<title>phpPgAdmin-7.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-10784" ref_url="https://www.suse.com/security/cve/CVE-2019-10784/" source="CVE"/>
		<description>
These are all security issues fixed in the phpPgAdmin-7.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10784/">CVE-2019-10784 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10784">CVE-2019-10784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925859" comment="phpPgAdmin-7.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925860" comment="phpPgAdmin-apache-7.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250516" version="1" class="patch">
	<metadata>
		<title>ceph-16.2.9.536+g41a9f9a5573-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3979" ref_url="https://www.suse.com/security/cve/CVE-2021-3979/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-16.2.9.536+g41a9f9a5573-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3979/">CVE-2021-3979 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3979">CVE-2021-3979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925861" comment="ceph-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925862" comment="ceph-base-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925863" comment="ceph-common-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925864" comment="ceph-fuse-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925865" comment="ceph-grafana-dashboards-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925866" comment="ceph-immutable-object-cache-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925867" comment="ceph-mds-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925868" comment="ceph-mgr-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925869" comment="ceph-mgr-cephadm-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925870" comment="ceph-mgr-dashboard-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925871" comment="ceph-mgr-diskprediction-local-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925872" comment="ceph-mgr-k8sevents-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925873" comment="ceph-mgr-modules-core-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925874" comment="ceph-mgr-rook-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925875" comment="ceph-mon-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925876" comment="ceph-osd-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925877" comment="ceph-prometheus-alerts-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925878" comment="ceph-radosgw-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925879" comment="cephadm-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925880" comment="cephfs-mirror-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925881" comment="cephfs-shell-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925882" comment="cephfs-top-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925883" comment="libcephfs-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925884" comment="libcephfs2-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925885" comment="libcephsqlite-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925886" comment="libcephsqlite-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925887" comment="librados-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925888" comment="librados2-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925889" comment="libradospp-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925890" comment="librbd-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925891" comment="librbd1-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925892" comment="librgw-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925893" comment="librgw2-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925894" comment="python3-ceph-argparse-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925895" comment="python3-ceph-common-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925896" comment="python3-cephfs-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925897" comment="python3-rados-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925898" comment="python3-rbd-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925899" comment="python3-rgw-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925900" comment="rados-objclass-devel-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925901" comment="rbd-fuse-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925902" comment="rbd-mirror-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925903" comment="rbd-nbd-16.2.9.536+g41a9f9a5573-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250517" version="1" class="patch">
	<metadata>
		<title>stunnel-5.65-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-5.65-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3644">CVE-2015-3644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925904" comment="stunnel-5.65-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925905" comment="stunnel-doc-5.65-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250518" version="1" class="patch">
	<metadata>
		<title>cereal-devel-1.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11105" ref_url="https://www.suse.com/security/cve/CVE-2020-11105/" source="CVE"/>
		<description>
These are all security issues fixed in the cereal-devel-1.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11105/">CVE-2020-11105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11105">CVE-2020-11105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925906" comment="cereal-devel-1.3.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250519" version="1" class="patch">
	<metadata>
		<title>chromedriver-103.0.5060.134-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2477" ref_url="https://www.suse.com/security/cve/CVE-2022-2477/" source="CVE"/>
		<reference ref_id="CVE-2022-2478" ref_url="https://www.suse.com/security/cve/CVE-2022-2478/" source="CVE"/>
		<reference ref_id="CVE-2022-2479" ref_url="https://www.suse.com/security/cve/CVE-2022-2479/" source="CVE"/>
		<reference ref_id="CVE-2022-2480" ref_url="https://www.suse.com/security/cve/CVE-2022-2480/" source="CVE"/>
		<reference ref_id="CVE-2022-2481" ref_url="https://www.suse.com/security/cve/CVE-2022-2481/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-103.0.5060.134-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2477/">CVE-2022-2477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2477">CVE-2022-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2478/">CVE-2022-2478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2478">CVE-2022-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2479/">CVE-2022-2479 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2479">CVE-2022-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2480/">CVE-2022-2480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2480">CVE-2022-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2481/">CVE-2022-2481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2481">CVE-2022-2481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925907" comment="chromedriver-103.0.5060.134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925908" comment="chromium-103.0.5060.134-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250520" version="1" class="patch">
	<metadata>
		<title>corepack16-16.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925909" comment="corepack16-16.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925910" comment="nodejs16-16.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925911" comment="nodejs16-devel-16.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925912" comment="nodejs16-docs-16.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925913" comment="npm16-16.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250521" version="1" class="patch">
	<metadata>
		<title>pyenv-2.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35861" ref_url="https://www.suse.com/security/cve/CVE-2022-35861/" source="CVE"/>
		<description>
These are all security issues fixed in the pyenv-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35861/">CVE-2022-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35861">CVE-2022-35861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925914" comment="pyenv-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925915" comment="pyenv-bash-completion-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925916" comment="pyenv-fish-completion-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925917" comment="pyenv-zsh-completion-2.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250522" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925918" comment="java-13-openjdk-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925919" comment="java-13-openjdk-accessibility-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925920" comment="java-13-openjdk-demo-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925921" comment="java-13-openjdk-devel-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925922" comment="java-13-openjdk-headless-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925923" comment="java-13-openjdk-javadoc-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925924" comment="java-13-openjdk-jmods-13.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925925" comment="java-13-openjdk-src-13.0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250523" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925926" comment="java-15-openjdk-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925927" comment="java-15-openjdk-accessibility-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925928" comment="java-15-openjdk-demo-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925929" comment="java-15-openjdk-devel-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925930" comment="java-15-openjdk-headless-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925931" comment="java-15-openjdk-javadoc-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925932" comment="java-15-openjdk-jmods-15.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925933" comment="java-15-openjdk-src-15.0.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250524" version="1" class="patch">
	<metadata>
		<title>java-18-openjdk-18.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-18-openjdk-18.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925934" comment="java-18-openjdk-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925935" comment="java-18-openjdk-accessibility-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925936" comment="java-18-openjdk-demo-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925937" comment="java-18-openjdk-devel-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925938" comment="java-18-openjdk-headless-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925939" comment="java-18-openjdk-javadoc-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925940" comment="java-18-openjdk-jmods-18.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925941" comment="java-18-openjdk-src-18.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250525" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-1343" ref_url="https://www.suse.com/security/cve/CVE-2022-1343/" source="CVE"/>
		<reference ref_id="CVE-2022-1434" ref_url="https://www.suse.com/security/cve/CVE-2022-1434/" source="CVE"/>
		<reference ref_id="CVE-2022-1473" ref_url="https://www.suse.com/security/cve/CVE-2022-1473/" source="CVE"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<reference ref_id="CVE-2022-2274" ref_url="https://www.suse.com/security/cve/CVE-2022-2274/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1343/">CVE-2022-1343 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1434/">CVE-2022-1434 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1473/">CVE-2022-1473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2274/">CVE-2022-2274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2274">CVE-2022-2274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925942" comment="libopenssl-3-devel-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925943" comment="libopenssl-3-devel-32bit-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925944" comment="libopenssl3-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925945" comment="libopenssl3-32bit-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925946" comment="openssl-3-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925947" comment="openssl-3-doc-3.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250526" version="1" class="patch">
	<metadata>
		<title>trivy-0.30.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.30.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925948" comment="trivy-0.30.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250527" version="1" class="patch">
	<metadata>
		<title>cri-o-1.24.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<description>
These are all security issues fixed in the cri-o-1.24.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925949" comment="cri-o-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925950" comment="cri-o-kubeadm-criconfig-1.24.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250528" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925951" comment="java-11-openjdk-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925952" comment="java-11-openjdk-accessibility-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925953" comment="java-11-openjdk-demo-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925954" comment="java-11-openjdk-devel-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925955" comment="java-11-openjdk-headless-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925956" comment="java-11-openjdk-javadoc-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925957" comment="java-11-openjdk-jmods-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925958" comment="java-11-openjdk-src-11.0.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250529" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925959" comment="java-17-openjdk-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925960" comment="java-17-openjdk-accessibility-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925961" comment="java-17-openjdk-demo-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925962" comment="java-17-openjdk-devel-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925963" comment="java-17-openjdk-headless-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925964" comment="java-17-openjdk-javadoc-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925965" comment="java-17-openjdk-jmods-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925966" comment="java-17-openjdk-src-17.0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250530" version="1" class="patch">
	<metadata>
		<title>qemu-7.0.0-53.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<reference ref_id="CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-7.0.0-53.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4206">CVE-2021-4206 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4207">CVE-2021-4207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35414">CVE-2022-35414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009925967" comment="qemu-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925968" comment="qemu-SLOF-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925969" comment="qemu-accel-qtest-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925970" comment="qemu-accel-tcg-x86-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925971" comment="qemu-arm-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925972" comment="qemu-audio-alsa-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925973" comment="qemu-audio-dbus-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925974" comment="qemu-audio-jack-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925975" comment="qemu-audio-oss-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925976" comment="qemu-audio-pa-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925977" comment="qemu-audio-spice-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925978" comment="qemu-block-curl-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925979" comment="qemu-block-dmg-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925980" comment="qemu-block-gluster-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925981" comment="qemu-block-iscsi-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925982" comment="qemu-block-nfs-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925983" comment="qemu-block-rbd-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925984" comment="qemu-block-ssh-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925985" comment="qemu-chardev-baum-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925986" comment="qemu-chardev-spice-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925987" comment="qemu-extra-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925988" comment="qemu-guest-agent-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925989" comment="qemu-hw-display-qxl-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925990" comment="qemu-hw-display-virtio-gpu-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925991" comment="qemu-hw-display-virtio-gpu-pci-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925992" comment="qemu-hw-display-virtio-vga-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925993" comment="qemu-hw-s390x-virtio-gpu-ccw-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925994" comment="qemu-hw-usb-host-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925995" comment="qemu-hw-usb-redirect-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925996" comment="qemu-hw-usb-smartcard-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925997" comment="qemu-ipxe-1.0.0+-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925998" comment="qemu-ivshmem-tools-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009925999" comment="qemu-ksm-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926000" comment="qemu-kvm-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926001" comment="qemu-lang-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926002" comment="qemu-microvm-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926003" comment="qemu-ppc-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926004" comment="qemu-s390x-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926005" comment="qemu-seabios-1.16.0_0_gd239552-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926006" comment="qemu-sgabios-8-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926007" comment="qemu-skiboot-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926008" comment="qemu-tools-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926009" comment="qemu-ui-curses-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926010" comment="qemu-ui-dbus-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926011" comment="qemu-ui-gtk-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926012" comment="qemu-ui-opengl-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926013" comment="qemu-ui-spice-app-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926014" comment="qemu-ui-spice-core-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926015" comment="qemu-vgabios-1.16.0_0_gd239552-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926016" comment="qemu-vhost-user-gpu-7.0.0-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926017" comment="qemu-x86-7.0.0-53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250531" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.39.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.39.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926018" comment="libsqlite3-0-3.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926019" comment="libsqlite3-0-32bit-3.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926020" comment="sqlite3-3.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926021" comment="sqlite3-devel-3.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926022" comment="sqlite3-doc-3.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926023" comment="sqlite3-tcl-3.39.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250532" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-6.1.36-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21571" ref_url="https://www.suse.com/security/cve/CVE-2022-21571/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-6.1.36-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21571/">CVE-2022-21571 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21571">CVE-2022-21571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926024" comment="python3-virtualbox-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926025" comment="virtualbox-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926026" comment="virtualbox-devel-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926027" comment="virtualbox-guest-desktop-icons-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926028" comment="virtualbox-guest-source-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926029" comment="virtualbox-guest-tools-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926030" comment="virtualbox-guest-x11-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926031" comment="virtualbox-host-source-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926032" comment="virtualbox-qt-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926033" comment="virtualbox-vnc-6.1.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926034" comment="virtualbox-websrv-6.1.36-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250533" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-4.0.42-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35230" ref_url="https://www.suse.com/security/cve/CVE-2022-35230/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-4.0.42-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-35230/">CVE-2022-35230 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35230">CVE-2022-35230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926035" comment="zabbix-agent-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926036" comment="zabbix-java-gateway-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926037" comment="zabbix-phpfrontend-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926038" comment="zabbix-proxy-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926039" comment="zabbix-proxy-mysql-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926040" comment="zabbix-proxy-postgresql-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926041" comment="zabbix-proxy-sqlite-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926042" comment="zabbix-server-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926043" comment="zabbix-server-mysql-4.0.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926044" comment="zabbix-server-postgresql-4.0.42-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250534" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0032-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0032-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926045" comment="gvim-9.0.0032-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926046" comment="vim-9.0.0032-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926047" comment="vim-data-9.0.0032-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926048" comment="vim-data-common-9.0.0032-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926049" comment="vim-small-9.0.0032-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250535" version="1" class="patch">
	<metadata>
		<title>curl-7.84.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32205" ref_url="https://www.suse.com/security/cve/CVE-2022-32205/" source="CVE"/>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32207" ref_url="https://www.suse.com/security/cve/CVE-2022-32207/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.84.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32205/">CVE-2022-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32207/">CVE-2022-32207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926050" comment="curl-7.84.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926051" comment="libcurl-devel-7.84.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926052" comment="libcurl-devel-32bit-7.84.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926053" comment="libcurl4-7.84.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926054" comment="libcurl4-32bit-7.84.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250536" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926055" comment="dirmngr-2.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926056" comment="gpg2-2.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926057" comment="gpg2-lang-2.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926058" comment="gpg2-tpm-2.3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250537" version="1" class="patch">
	<metadata>
		<title>perl-HTTP-Daemon-6.14-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31081" ref_url="https://www.suse.com/security/cve/CVE-2022-31081/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTTP-Daemon-6.14-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31081/">CVE-2022-31081 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31081">CVE-2022-31081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926059" comment="perl-HTTP-Daemon-6.14-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250538" version="1" class="patch">
	<metadata>
		<title>redis-7.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31144" ref_url="https://www.suse.com/security/cve/CVE-2022-31144/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31144/">CVE-2022-31144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31144">CVE-2022-31144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926060" comment="redis-7.0.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250539" version="1" class="patch">
	<metadata>
		<title>php8-8.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31627" ref_url="https://www.suse.com/security/cve/CVE-2022-31627/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31627/">CVE-2022-31627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31627">CVE-2022-31627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926061" comment="php8-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926062" comment="php8-bcmath-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926063" comment="php8-bz2-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926064" comment="php8-calendar-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926065" comment="php8-cli-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926066" comment="php8-ctype-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926067" comment="php8-curl-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926068" comment="php8-dba-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926069" comment="php8-devel-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926070" comment="php8-dom-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926071" comment="php8-enchant-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926072" comment="php8-exif-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926073" comment="php8-ffi-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926074" comment="php8-fileinfo-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926075" comment="php8-ftp-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926076" comment="php8-gd-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926077" comment="php8-gettext-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926078" comment="php8-gmp-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926079" comment="php8-iconv-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926080" comment="php8-intl-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926081" comment="php8-ldap-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926082" comment="php8-mbstring-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926083" comment="php8-mysql-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926084" comment="php8-odbc-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926085" comment="php8-opcache-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926086" comment="php8-openssl-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926087" comment="php8-pcntl-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926088" comment="php8-pdo-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926089" comment="php8-pgsql-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926090" comment="php8-phar-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926091" comment="php8-posix-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926092" comment="php8-readline-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926093" comment="php8-shmop-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926094" comment="php8-snmp-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926095" comment="php8-soap-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926096" comment="php8-sockets-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926097" comment="php8-sodium-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926098" comment="php8-sqlite-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926099" comment="php8-sysvmsg-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926100" comment="php8-sysvsem-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926101" comment="php8-sysvshm-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926102" comment="php8-tidy-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926103" comment="php8-tokenizer-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926104" comment="php8-xmlreader-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926105" comment="php8-xmlwriter-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926106" comment="php8-xsl-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926107" comment="php8-zip-8.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926108" comment="php8-zlib-8.1.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250540" version="1" class="patch">
	<metadata>
		<title>xen-4.16.1_02-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.16.1_02-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26362">CVE-2022-26362 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26363">CVE-2022-26363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33745">CVE-2022-33745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926109" comment="xen-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926110" comment="xen-devel-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926111" comment="xen-doc-html-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926112" comment="xen-libs-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926113" comment="xen-libs-32bit-4.16.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926114" comment="xen-tools-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926115" comment="xen-tools-domU-4.16.1_02-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926116" comment="xen-tools-xendomains-wait-disk-4.16.1_02-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250541" version="1" class="patch">
	<metadata>
		<title>caddy-2.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34037" ref_url="https://www.suse.com/security/cve/CVE-2022-34037/" source="CVE"/>
		<description>
These are all security issues fixed in the caddy-2.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34037/">CVE-2022-34037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34037">CVE-2022-34037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926117" comment="caddy-2.5.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250542" version="1" class="patch">
	<metadata>
		<title>connman-1.41-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32292" ref_url="https://www.suse.com/security/cve/CVE-2022-32292/" source="CVE"/>
		<reference ref_id="CVE-2022-32293" ref_url="https://www.suse.com/security/cve/CVE-2022-32293/" source="CVE"/>
		<description>
These are all security issues fixed in the connman-1.41-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32292/">CVE-2022-32292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32292">CVE-2022-32292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32293/">CVE-2022-32293 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32293">CVE-2022-32293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926118" comment="connman-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926119" comment="connman-client-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926120" comment="connman-devel-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926121" comment="connman-doc-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926122" comment="connman-nmcompat-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926123" comment="connman-plugin-hh2serial-gps-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926124" comment="connman-plugin-iospm-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926125" comment="connman-plugin-l2tp-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926126" comment="connman-plugin-openconnect-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926127" comment="connman-plugin-openvpn-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926128" comment="connman-plugin-polkit-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926129" comment="connman-plugin-pptp-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926130" comment="connman-plugin-tist-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926131" comment="connman-plugin-vpnc-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926132" comment="connman-plugin-wireguard-1.41-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926133" comment="connman-test-1.41-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250543" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46829">CVE-2021-46829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926134" comment="gdk-pixbuf-devel-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926135" comment="gdk-pixbuf-devel-32bit-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926136" comment="gdk-pixbuf-lang-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926137" comment="gdk-pixbuf-query-loaders-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926138" comment="gdk-pixbuf-query-loaders-32bit-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926139" comment="gdk-pixbuf-thumbnailer-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926140" comment="libgdk_pixbuf-2_0-0-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926141" comment="libgdk_pixbuf-2_0-0-32bit-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926142" comment="typelib-1_0-GdkPixbuf-2_0-2.42.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926143" comment="typelib-1_0-GdkPixdata-2_0-2.42.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250544" version="1" class="patch">
	<metadata>
		<title>git-annex-10.20220624-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<description>
These are all security issues fixed in the git-annex-10.20220624-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926144" comment="git-annex-10.20220624-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926145" comment="git-annex-bash-completion-10.20220624-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250545" version="1" class="patch">
	<metadata>
		<title>maven-3.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42550" ref_url="https://www.suse.com/security/cve/CVE-2021-42550/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-3.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42550/">CVE-2021-42550 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42550">CVE-2021-42550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926146" comment="maven-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926147" comment="maven-javadoc-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926148" comment="maven-lib-3.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250546" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-22.05.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-22.05.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31251">CVE-2022-31251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926149" comment="libnss_slurm2-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926150" comment="libpmi0-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926151" comment="libslurm38-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926152" comment="perl-slurm-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926153" comment="slurm-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926154" comment="slurm-auth-none-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926155" comment="slurm-config-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926156" comment="slurm-config-man-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926157" comment="slurm-cray-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926158" comment="slurm-devel-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926159" comment="slurm-doc-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926160" comment="slurm-hdf5-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926161" comment="slurm-lua-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926162" comment="slurm-munge-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926163" comment="slurm-node-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926164" comment="slurm-openlava-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926165" comment="slurm-pam_slurm-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926166" comment="slurm-plugins-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926167" comment="slurm-rest-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926168" comment="slurm-seff-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926169" comment="slurm-sjstat-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926170" comment="slurm-slurmdbd-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926171" comment="slurm-sql-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926172" comment="slurm-sview-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926173" comment="slurm-testsuite-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926174" comment="slurm-torque-22.05.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926175" comment="slurm-webdoc-22.05.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250547" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926176" comment="libtiff-devel-4.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926177" comment="libtiff-devel-32bit-4.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926178" comment="libtiff5-4.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926179" comment="libtiff5-32bit-4.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926180" comment="tiff-4.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250548" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-103.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36315" ref_url="https://www.suse.com/security/cve/CVE-2022-36315/" source="CVE"/>
		<reference ref_id="CVE-2022-36316" ref_url="https://www.suse.com/security/cve/CVE-2022-36316/" source="CVE"/>
		<reference ref_id="CVE-2022-36317" ref_url="https://www.suse.com/security/cve/CVE-2022-36317/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-36320" ref_url="https://www.suse.com/security/cve/CVE-2022-36320/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-103.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36315/">CVE-2022-36315 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36315">CVE-2022-36315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36316/">CVE-2022-36316 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36316">CVE-2022-36316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36317/">CVE-2022-36317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36317">CVE-2022-36317 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36320/">CVE-2022-36320 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36320">CVE-2022-36320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926181" comment="MozillaFirefox-103.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926182" comment="MozillaFirefox-branding-upstream-103.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926183" comment="MozillaFirefox-devel-103.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926184" comment="MozillaFirefox-translations-common-103.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926185" comment="MozillaFirefox-translations-other-103.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250549" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926186" comment="MozillaThunderbird-102.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926187" comment="MozillaThunderbird-translations-common-102.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926188" comment="MozillaThunderbird-translations-other-102.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250550" version="1" class="patch">
	<metadata>
		<title>go1.17-1.17.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.17-1.17.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926189" comment="go1.17-1.17.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926190" comment="go1.17-doc-1.17.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926191" comment="go1.17-race-1.17.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250551" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926192" comment="go1.18-1.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926193" comment="go1.18-doc-1.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926194" comment="go1.18-race-1.18.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250552" version="1" class="patch">
	<metadata>
		<title>logcli-2.6.1+git.1658128747.6bd05c9a4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<description>
These are all security issues fixed in the logcli-2.6.1+git.1658128747.6bd05c9a4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926195" comment="logcli-2.6.1+git.1658128747.6bd05c9a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926196" comment="loki-2.6.1+git.1658128747.6bd05c9a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926197" comment="promtail-2.6.1+git.1658128747.6bd05c9a4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250553" version="1" class="patch">
	<metadata>
		<title>rsync-3.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.2.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926198" comment="rsync-3.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250554" version="1" class="patch">
	<metadata>
		<title>gnutls-3.7.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.7.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926199" comment="gnutls-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926200" comment="gnutls-guile-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926201" comment="libgnutls-dane-devel-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926202" comment="libgnutls-dane0-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926203" comment="libgnutls-devel-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926204" comment="libgnutls-devel-32bit-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926205" comment="libgnutls30-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926206" comment="libgnutls30-32bit-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926207" comment="libgnutls30-hmac-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926208" comment="libgnutlsxx-devel-3.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926209" comment="libgnutlsxx30-3.7.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250555" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.345-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.345-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926210" comment="java-1_8_0-openjdk-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926211" comment="java-1_8_0-openjdk-accessibility-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926212" comment="java-1_8_0-openjdk-demo-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926213" comment="java-1_8_0-openjdk-devel-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926214" comment="java-1_8_0-openjdk-headless-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926215" comment="java-1_8_0-openjdk-javadoc-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926216" comment="java-1_8_0-openjdk-src-1.8.0.345-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250556" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.16.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.16.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926217" comment="libunbound8-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926218" comment="python3-unbound-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926219" comment="unbound-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926220" comment="unbound-anchor-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926221" comment="unbound-devel-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926222" comment="unbound-munin-1.16.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250557" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36359" ref_url="https://www.suse.com/security/cve/CVE-2022-36359/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-36359/">CVE-2022-36359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36359">CVE-2022-36359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926223" comment="python310-Django-4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926224" comment="python38-Django-4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926225" comment="python39-Django-4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250558" version="1" class="patch">
	<metadata>
		<title>python310-httptools-0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-httptools-0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926226" comment="python310-httptools-0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926227" comment="python38-httptools-0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926228" comment="python39-httptools-0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250559" version="1" class="patch">
	<metadata>
		<title>tuigreet-0.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21299" ref_url="https://www.suse.com/security/cve/CVE-2021-21299/" source="CVE"/>
		<description>
These are all security issues fixed in the tuigreet-0.7.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21299/">CVE-2021-21299 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21299">CVE-2021-21299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926229" comment="tuigreet-0.7.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250560" version="1" class="patch">
	<metadata>
		<title>wayshot-1.1.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21299" ref_url="https://www.suse.com/security/cve/CVE-2021-21299/" source="CVE"/>
		<description>
These are all security issues fixed in the wayshot-1.1.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21299/">CVE-2021-21299 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21299">CVE-2021-21299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926230" comment="wayshot-1.1.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250561" version="1" class="patch">
	<metadata>
		<title>cosign-1.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35929" ref_url="https://www.suse.com/security/cve/CVE-2022-35929/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-1.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35929/">CVE-2022-35929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35929">CVE-2022-35929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926231" comment="cosign-1.10.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250562" version="1" class="patch">
	<metadata>
		<title>ldb-tools-2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926232" comment="ldb-tools-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926233" comment="libldb-devel-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926234" comment="libldb2-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926235" comment="libldb2-32bit-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926236" comment="python3-ldb-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926237" comment="python3-ldb-32bit-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926238" comment="python3-ldb-devel-2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250563" version="1" class="patch">
	<metadata>
		<title>libostree-1-1-2022.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9862" ref_url="https://www.suse.com/security/cve/CVE-2014-9862/" source="CVE"/>
		<description>
These are all security issues fixed in the libostree-1-1-2022.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9862/">CVE-2014-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9862">CVE-2014-9862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926239" comment="libostree-2022.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926240" comment="libostree-1-1-2022.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926241" comment="libostree-devel-2022.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926242" comment="libostree-grub2-2022.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926243" comment="typelib-1_0-OSTree-1_0-2022.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250564" version="1" class="patch">
	<metadata>
		<title>ctdb-4.16.4+git.297.1497eb221ed-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.16.4+git.297.1497eb221ed-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2031">CVE-2022-2031 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32744">CVE-2022-32744 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32745">CVE-2022-32745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926244" comment="ctdb-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926245" comment="ctdb-pcp-pmda-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926246" comment="libsamba-policy-devel-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926247" comment="libsamba-policy-python3-devel-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926248" comment="libsamba-policy0-python3-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926249" comment="libsamba-policy0-python3-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926250" comment="samba-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926251" comment="samba-ad-dc-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926252" comment="samba-ad-dc-libs-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926253" comment="samba-ad-dc-libs-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926254" comment="samba-ceph-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926255" comment="samba-client-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926256" comment="samba-client-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926257" comment="samba-client-libs-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926258" comment="samba-client-libs-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926259" comment="samba-devel-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926260" comment="samba-devel-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926261" comment="samba-doc-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926262" comment="samba-dsdb-modules-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926263" comment="samba-gpupdate-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926264" comment="samba-ldb-ldap-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926265" comment="samba-libs-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926266" comment="samba-libs-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926267" comment="samba-libs-python3-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926268" comment="samba-libs-python3-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926269" comment="samba-python3-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926270" comment="samba-test-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926271" comment="samba-tool-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926272" comment="samba-winbind-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926273" comment="samba-winbind-libs-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926274" comment="samba-winbind-libs-32bit-4.16.4+git.297.1497eb221ed-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250565" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activerecord-7.0-7.0.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32224" ref_url="https://www.suse.com/security/cve/CVE-2022-32224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activerecord-7.0-7.0.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32224/">CVE-2022-32224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32224">CVE-2022-32224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926275" comment="ruby3.1-rubygem-activerecord-7.0-7.0.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250566" version="1" class="patch">
	<metadata>
		<title>librpmbuild9-4.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521/" source="CVE"/>
		<description>
These are all security issues fixed in the librpmbuild9-4.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926276" comment="librpmbuild9-4.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926277" comment="rpm-4.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926278" comment="rpm-32bit-4.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926279" comment="rpm-build-4.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926280" comment="rpm-build-perl-4.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926281" comment="rpm-devel-4.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250567" version="1" class="patch">
	<metadata>
		<title>budgie-control-center-1.1.0+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1736" ref_url="https://www.suse.com/security/cve/CVE-2022-1736/" source="CVE"/>
		<description>
These are all security issues fixed in the budgie-control-center-1.1.0+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1736/">CVE-2022-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1736">CVE-2022-1736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926282" comment="budgie-control-center-1.1.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926283" comment="budgie-control-center-bash-completion-1.1.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926284" comment="budgie-control-center-lang-1.1.0+0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250568" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-http-5.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32740" ref_url="https://www.suse.com/security/cve/CVE-2021-32740/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-http-5.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32740/">CVE-2021-32740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926285" comment="ruby3.1-rubygem-http-5.1.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250569" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-http-cookie-1.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-http-cookie-1.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926286" comment="ruby3.1-rubygem-http-cookie-1.0.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250570" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-tzinfo-1.2-1.2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31163" ref_url="https://www.suse.com/security/cve/CVE-2022-31163/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-tzinfo-1.2-1.2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31163/">CVE-2022-31163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31163">CVE-2022-31163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926287" comment="ruby3.1-rubygem-tzinfo-1.2-1.2.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250571" version="1" class="patch">
	<metadata>
		<title>python310-loguru-0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0329" ref_url="https://www.suse.com/security/cve/CVE-2022-0329/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-loguru-0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0329/">CVE-2022-0329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0329">CVE-2022-0329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926288" comment="python310-loguru-0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926289" comment="python38-loguru-0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926290" comment="python39-loguru-0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250572" version="1" class="patch">
	<metadata>
		<title>chromedriver-104.0.5112.79-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2603" ref_url="https://www.suse.com/security/cve/CVE-2022-2603/" source="CVE"/>
		<reference ref_id="CVE-2022-2604" ref_url="https://www.suse.com/security/cve/CVE-2022-2604/" source="CVE"/>
		<reference ref_id="CVE-2022-2605" ref_url="https://www.suse.com/security/cve/CVE-2022-2605/" source="CVE"/>
		<reference ref_id="CVE-2022-2606" ref_url="https://www.suse.com/security/cve/CVE-2022-2606/" source="CVE"/>
		<reference ref_id="CVE-2022-2607" ref_url="https://www.suse.com/security/cve/CVE-2022-2607/" source="CVE"/>
		<reference ref_id="CVE-2022-2608" ref_url="https://www.suse.com/security/cve/CVE-2022-2608/" source="CVE"/>
		<reference ref_id="CVE-2022-2609" ref_url="https://www.suse.com/security/cve/CVE-2022-2609/" source="CVE"/>
		<reference ref_id="CVE-2022-2610" ref_url="https://www.suse.com/security/cve/CVE-2022-2610/" source="CVE"/>
		<reference ref_id="CVE-2022-2611" ref_url="https://www.suse.com/security/cve/CVE-2022-2611/" source="CVE"/>
		<reference ref_id="CVE-2022-2612" ref_url="https://www.suse.com/security/cve/CVE-2022-2612/" source="CVE"/>
		<reference ref_id="CVE-2022-2613" ref_url="https://www.suse.com/security/cve/CVE-2022-2613/" source="CVE"/>
		<reference ref_id="CVE-2022-2614" ref_url="https://www.suse.com/security/cve/CVE-2022-2614/" source="CVE"/>
		<reference ref_id="CVE-2022-2615" ref_url="https://www.suse.com/security/cve/CVE-2022-2615/" source="CVE"/>
		<reference ref_id="CVE-2022-2616" ref_url="https://www.suse.com/security/cve/CVE-2022-2616/" source="CVE"/>
		<reference ref_id="CVE-2022-2617" ref_url="https://www.suse.com/security/cve/CVE-2022-2617/" source="CVE"/>
		<reference ref_id="CVE-2022-2618" ref_url="https://www.suse.com/security/cve/CVE-2022-2618/" source="CVE"/>
		<reference ref_id="CVE-2022-2619" ref_url="https://www.suse.com/security/cve/CVE-2022-2619/" source="CVE"/>
		<reference ref_id="CVE-2022-2620" ref_url="https://www.suse.com/security/cve/CVE-2022-2620/" source="CVE"/>
		<reference ref_id="CVE-2022-2621" ref_url="https://www.suse.com/security/cve/CVE-2022-2621/" source="CVE"/>
		<reference ref_id="CVE-2022-2622" ref_url="https://www.suse.com/security/cve/CVE-2022-2622/" source="CVE"/>
		<reference ref_id="CVE-2022-2623" ref_url="https://www.suse.com/security/cve/CVE-2022-2623/" source="CVE"/>
		<reference ref_id="CVE-2022-2624" ref_url="https://www.suse.com/security/cve/CVE-2022-2624/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-104.0.5112.79-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2603/">CVE-2022-2603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2603">CVE-2022-2603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2604/">CVE-2022-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2604">CVE-2022-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2605/">CVE-2022-2605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2605">CVE-2022-2605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2606/">CVE-2022-2606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2606">CVE-2022-2606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2607/">CVE-2022-2607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2607">CVE-2022-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2608/">CVE-2022-2608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2608">CVE-2022-2608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2609/">CVE-2022-2609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2609">CVE-2022-2609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2610/">CVE-2022-2610 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2610">CVE-2022-2610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2611/">CVE-2022-2611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2611">CVE-2022-2611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2612/">CVE-2022-2612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2612">CVE-2022-2612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2613/">CVE-2022-2613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2613">CVE-2022-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2614/">CVE-2022-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2614">CVE-2022-2614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2615/">CVE-2022-2615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2615">CVE-2022-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2616/">CVE-2022-2616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2616">CVE-2022-2616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2617/">CVE-2022-2617 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2617">CVE-2022-2617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2618/">CVE-2022-2618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2618">CVE-2022-2618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2619/">CVE-2022-2619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2619">CVE-2022-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2620/">CVE-2022-2620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2620">CVE-2022-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2621/">CVE-2022-2621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2621">CVE-2022-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2622/">CVE-2022-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2622">CVE-2022-2622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2623/">CVE-2022-2623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2623">CVE-2022-2623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2624/">CVE-2022-2624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2624">CVE-2022-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926291" comment="chromedriver-104.0.5112.79-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926292" comment="chromium-104.0.5112.79-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250573" version="1" class="patch">
	<metadata>
		<title>helm-3.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926293" comment="helm-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926294" comment="helm-bash-completion-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926295" comment="helm-fish-completion-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926296" comment="helm-zsh-completion-3.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250574" version="1" class="patch">
	<metadata>
		<title>nim-1.6.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15690" ref_url="https://www.suse.com/security/cve/CVE-2020-15690/" source="CVE"/>
		<reference ref_id="CVE-2020-15692" ref_url="https://www.suse.com/security/cve/CVE-2020-15692/" source="CVE"/>
		<reference ref_id="CVE-2020-15693" ref_url="https://www.suse.com/security/cve/CVE-2020-15693/" source="CVE"/>
		<reference ref_id="CVE-2020-15694" ref_url="https://www.suse.com/security/cve/CVE-2020-15694/" source="CVE"/>
		<reference ref_id="CVE-2021-29495" ref_url="https://www.suse.com/security/cve/CVE-2021-29495/" source="CVE"/>
		<reference ref_id="CVE-2021-41259" ref_url="https://www.suse.com/security/cve/CVE-2021-41259/" source="CVE"/>
		<description>
These are all security issues fixed in the nim-1.6.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15690/">CVE-2020-15690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15690">CVE-2020-15690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15692/">CVE-2020-15692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15692">CVE-2020-15692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15693/">CVE-2020-15693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15693">CVE-2020-15693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15694/">CVE-2020-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15694">CVE-2020-15694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29495/">CVE-2021-29495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29495">CVE-2021-29495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41259/">CVE-2021-41259 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41259">CVE-2021-41259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926297" comment="nim-1.6.6-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250575" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20220809-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20220809-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926298" comment="ucode-intel-20220809-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250576" version="1" class="patch">
	<metadata>
		<title>libvarnishapi3-7.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38150" ref_url="https://www.suse.com/security/cve/CVE-2022-38150/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi3-7.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38150/">CVE-2022-38150 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38150">CVE-2022-38150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926299" comment="libvarnishapi3-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926300" comment="varnish-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926301" comment="varnish-devel-7.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250577" version="1" class="patch">
	<metadata>
		<title>binutils-2.39-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.39-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010204">CVE-2019-1010204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926302" comment="binutils-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926303" comment="binutils-devel-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926304" comment="binutils-devel-32bit-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926305" comment="binutils-gold-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926306" comment="gprofng-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926307" comment="libctf-nobfd0-2.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926308" comment="libctf0-2.39-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250578" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2590" ref_url="https://www.suse.com/security/cve/CVE-2022-2590/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2590/">CVE-2022-2590 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2590">CVE-2022-2590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926310" comment="kernel-macros-5.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926311" comment="kernel-source-5.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926312" comment="kernel-source-vanilla-5.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250579" version="1" class="patch">
	<metadata>
		<title>libyajl-devel-2.1.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>
These are all security issues fixed in the libyajl-devel-2.1.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926313" comment="libyajl-devel-2.1.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926314" comment="libyajl-devel-32bit-2.1.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926315" comment="libyajl-devel-static-2.1.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926316" comment="libyajl2-2.1.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926317" comment="libyajl2-32bit-2.1.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926318" comment="yajl-2.1.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250580" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-node_exporter-1.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-node_exporter-1.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926319" comment="golang-github-prometheus-node_exporter-1.3.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250581" version="1" class="patch">
	<metadata>
		<title>grafana-8.3.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.3.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31097">CVE-2022-31097 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926320" comment="grafana-8.3.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250582" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926321" comment="java-11-openj9-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926322" comment="java-11-openj9-accessibility-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926323" comment="java-11-openj9-demo-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926324" comment="java-11-openj9-devel-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926325" comment="java-11-openj9-headless-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926326" comment="java-11-openj9-javadoc-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926327" comment="java-11-openj9-jmods-11.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926328" comment="java-11-openj9-src-11.0.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250583" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926329" comment="java-17-openj9-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926330" comment="java-17-openj9-accessibility-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926331" comment="java-17-openj9-demo-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926332" comment="java-17-openj9-devel-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926333" comment="java-17-openj9-headless-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926334" comment="java-17-openj9-javadoc-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926335" comment="java-17-openj9-jmods-17.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926336" comment="java-17-openj9-src-17.0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250584" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.345-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.345-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926337" comment="java-1_8_0-openj9-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926338" comment="java-1_8_0-openj9-accessibility-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926339" comment="java-1_8_0-openj9-demo-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926340" comment="java-1_8_0-openj9-devel-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926341" comment="java-1_8_0-openj9-headless-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926342" comment="java-1_8_0-openj9-javadoc-1.8.0.345-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926343" comment="java-1_8_0-openj9-src-1.8.0.345-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250585" version="1" class="patch">
	<metadata>
		<title>postgresql10-10.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-10.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926344" comment="postgresql10-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926345" comment="postgresql10-contrib-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926346" comment="postgresql10-devel-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926347" comment="postgresql10-docs-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926348" comment="postgresql10-llvmjit-devel-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926349" comment="postgresql10-plperl-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926350" comment="postgresql10-plpython-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926351" comment="postgresql10-pltcl-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926352" comment="postgresql10-server-10.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926353" comment="postgresql10-test-10.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250586" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926354" comment="postgresql11-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926355" comment="postgresql11-contrib-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926356" comment="postgresql11-devel-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926357" comment="postgresql11-docs-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926358" comment="postgresql11-llvmjit-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926359" comment="postgresql11-llvmjit-devel-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926360" comment="postgresql11-plperl-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926361" comment="postgresql11-plpython-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926362" comment="postgresql11-pltcl-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926363" comment="postgresql11-server-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926364" comment="postgresql11-server-devel-11.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926365" comment="postgresql11-test-11.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250587" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926366" comment="postgresql12-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926367" comment="postgresql12-contrib-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926368" comment="postgresql12-devel-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926369" comment="postgresql12-docs-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926370" comment="postgresql12-llvmjit-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926371" comment="postgresql12-llvmjit-devel-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926372" comment="postgresql12-plperl-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926373" comment="postgresql12-plpython-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926374" comment="postgresql12-pltcl-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926375" comment="postgresql12-server-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926376" comment="postgresql12-server-devel-12.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926377" comment="postgresql12-test-12.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250588" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926378" comment="postgresql13-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926379" comment="postgresql13-contrib-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926380" comment="postgresql13-devel-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926381" comment="postgresql13-docs-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926382" comment="postgresql13-llvmjit-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926383" comment="postgresql13-llvmjit-devel-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926384" comment="postgresql13-plperl-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926385" comment="postgresql13-plpython-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926386" comment="postgresql13-pltcl-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926387" comment="postgresql13-server-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926388" comment="postgresql13-server-devel-13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926389" comment="postgresql13-test-13.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250589" version="1" class="patch">
	<metadata>
		<title>libecpg6-14.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-14.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926390" comment="libecpg6-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926391" comment="libecpg6-32bit-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926392" comment="libpq5-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926393" comment="libpq5-32bit-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926394" comment="postgresql14-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926395" comment="postgresql14-contrib-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926396" comment="postgresql14-devel-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926397" comment="postgresql14-docs-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926398" comment="postgresql14-llvmjit-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926399" comment="postgresql14-llvmjit-devel-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926400" comment="postgresql14-plperl-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926401" comment="postgresql14-plpython-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926402" comment="postgresql14-pltcl-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926403" comment="postgresql14-server-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926404" comment="postgresql14-server-devel-14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926405" comment="postgresql14-test-14.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250590" version="1" class="patch">
	<metadata>
		<title>EternalTerminal-6.2.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24949" ref_url="https://www.suse.com/security/cve/CVE-2022-24949/" source="CVE"/>
		<reference ref_id="CVE-2022-24950" ref_url="https://www.suse.com/security/cve/CVE-2022-24950/" source="CVE"/>
		<reference ref_id="CVE-2022-24951" ref_url="https://www.suse.com/security/cve/CVE-2022-24951/" source="CVE"/>
		<reference ref_id="CVE-2022-24952" ref_url="https://www.suse.com/security/cve/CVE-2022-24952/" source="CVE"/>
		<description>
These are all security issues fixed in the EternalTerminal-6.2.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24949/">CVE-2022-24949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24949">CVE-2022-24949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24950/">CVE-2022-24950 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24950">CVE-2022-24950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24951/">CVE-2022-24951 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24951">CVE-2022-24951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24952/">CVE-2022-24952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24952">CVE-2022-24952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926406" comment="EternalTerminal-6.2.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250591" version="1" class="patch">
	<metadata>
		<title>rsync-3.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926407" comment="rsync-3.2.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250592" version="1" class="patch">
	<metadata>
		<title>liblzma5-32bit-5.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzma5-32bit-5.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926408" comment="liblzma5-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926409" comment="liblzma5-32bit-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926410" comment="xz-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926411" comment="xz-devel-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926412" comment="xz-devel-32bit-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926413" comment="xz-lang-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926414" comment="xz-static-devel-5.2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250593" version="1" class="patch">
	<metadata>
		<title>freeciv-3.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-6083" ref_url="https://www.suse.com/security/cve/CVE-2022-6083/" source="CVE"/>
		<description>
These are all security issues fixed in the freeciv-3.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-6083/">CVE-2022-6083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-6083">CVE-2022-6083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926415" comment="freeciv-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926416" comment="freeciv-gtk3-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926417" comment="freeciv-lang-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926418" comment="freeciv-qt-3.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250594" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-4.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-4.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926419" comment="python-lxml-doc-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926420" comment="python310-lxml-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926421" comment="python310-lxml-devel-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926422" comment="python38-lxml-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926423" comment="python38-lxml-devel-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926424" comment="python39-lxml-4.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926425" comment="python39-lxml-devel-4.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250595" version="1" class="patch">
	<metadata>
		<title>spotifyd-0.3.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21299" ref_url="https://www.suse.com/security/cve/CVE-2021-21299/" source="CVE"/>
		<description>
These are all security issues fixed in the spotifyd-0.3.3-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21299/">CVE-2021-21299 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21299">CVE-2021-21299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926426" comment="spotifyd-0.3.3-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250596" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0224-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0224-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926427" comment="gvim-9.0.0224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926428" comment="vim-9.0.0224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926429" comment="vim-data-9.0.0224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926430" comment="vim-data-common-9.0.0224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926431" comment="vim-small-9.0.0224-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250597" version="1" class="patch">
	<metadata>
		<title>libredwg-devel-0.12.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35164" ref_url="https://www.suse.com/security/cve/CVE-2022-35164/" source="CVE"/>
		<description>
These are all security issues fixed in the libredwg-devel-0.12.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35164/">CVE-2022-35164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35164">CVE-2022-35164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926432" comment="libredwg-devel-0.12.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926433" comment="libredwg-tools-0.12.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926434" comment="libredwg0-0.12.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250598" version="1" class="patch">
	<metadata>
		<title>chromedriver-104.0.5112.101-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2852" ref_url="https://www.suse.com/security/cve/CVE-2022-2852/" source="CVE"/>
		<reference ref_id="CVE-2022-2853" ref_url="https://www.suse.com/security/cve/CVE-2022-2853/" source="CVE"/>
		<reference ref_id="CVE-2022-2854" ref_url="https://www.suse.com/security/cve/CVE-2022-2854/" source="CVE"/>
		<reference ref_id="CVE-2022-2855" ref_url="https://www.suse.com/security/cve/CVE-2022-2855/" source="CVE"/>
		<reference ref_id="CVE-2022-2856" ref_url="https://www.suse.com/security/cve/CVE-2022-2856/" source="CVE"/>
		<reference ref_id="CVE-2022-2857" ref_url="https://www.suse.com/security/cve/CVE-2022-2857/" source="CVE"/>
		<reference ref_id="CVE-2022-2858" ref_url="https://www.suse.com/security/cve/CVE-2022-2858/" source="CVE"/>
		<reference ref_id="CVE-2022-2859" ref_url="https://www.suse.com/security/cve/CVE-2022-2859/" source="CVE"/>
		<reference ref_id="CVE-2022-2860" ref_url="https://www.suse.com/security/cve/CVE-2022-2860/" source="CVE"/>
		<reference ref_id="CVE-2022-2861" ref_url="https://www.suse.com/security/cve/CVE-2022-2861/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-104.0.5112.101-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2852/">CVE-2022-2852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2852">CVE-2022-2852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2853/">CVE-2022-2853 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2853">CVE-2022-2853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2854/">CVE-2022-2854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2854">CVE-2022-2854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2855/">CVE-2022-2855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2855">CVE-2022-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2856/">CVE-2022-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2856">CVE-2022-2856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2857/">CVE-2022-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2857">CVE-2022-2857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2858/">CVE-2022-2858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2858">CVE-2022-2858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2859/">CVE-2022-2859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2859">CVE-2022-2859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2860/">CVE-2022-2860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2860">CVE-2022-2860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2861/">CVE-2022-2861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2861">CVE-2022-2861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926435" comment="chromedriver-104.0.5112.101-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926436" comment="chromium-104.0.5112.101-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250599" version="1" class="patch">
	<metadata>
		<title>libtirpc-devel-1.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-devel-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926437" comment="libtirpc-devel-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926438" comment="libtirpc-netconfig-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926439" comment="libtirpc3-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926440" comment="libtirpc3-32bit-1.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250600" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.12.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.12.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926441" comment="freetype2-devel-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926442" comment="freetype2-devel-32bit-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926443" comment="freetype2-profile-tti35-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926444" comment="ftdump-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926445" comment="libfreetype6-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926446" comment="libfreetype6-32bit-2.12.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250601" version="1" class="patch">
	<metadata>
		<title>corepack16-16.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29244" ref_url="https://www.suse.com/security/cve/CVE-2022-29244/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29244/">CVE-2022-29244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29244">CVE-2022-29244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926447" comment="corepack16-16.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926448" comment="nodejs16-16.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926449" comment="nodejs16-devel-16.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926450" comment="nodejs16-docs-16.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926451" comment="npm16-16.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250602" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37428" ref_url="https://www.suse.com/security/cve/CVE-2022-37428/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37428/">CVE-2022-37428 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37428">CVE-2022-37428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926452" comment="pdns-recursor-4.7.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250603" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24812" ref_url="https://www.suse.com/security/cve/CVE-2022-24812/" source="CVE"/>
		<reference ref_id="CVE-2022-29170" ref_url="https://www.suse.com/security/cve/CVE-2022-29170/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24812/">CVE-2022-24812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24812">CVE-2022-24812 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-29170/">CVE-2022-29170 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29170">CVE-2022-29170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926453" comment="grafana-8.5.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250604" version="1" class="patch">
	<metadata>
		<title>python310-azure-storage-blob-12.13.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30187" ref_url="https://www.suse.com/security/cve/CVE-2022-30187/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-azure-storage-blob-12.13.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30187/">CVE-2022-30187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30187">CVE-2022-30187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926454" comment="python310-azure-storage-blob-12.13.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926455" comment="python38-azure-storage-blob-12.13.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926456" comment="python39-azure-storage-blob-12.13.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250605" version="1" class="patch">
	<metadata>
		<title>minetest-5.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35978" ref_url="https://www.suse.com/security/cve/CVE-2022-35978/" source="CVE"/>
		<description>
These are all security issues fixed in the minetest-5.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35978/">CVE-2022-35978 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35978">CVE-2022-35978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926457" comment="minetest-5.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926458" comment="minetest-data-5.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926459" comment="minetest-lang-5.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926460" comment="minetestserver-5.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250606" version="1" class="patch">
	<metadata>
		<title>corepack16-16.17.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31150" ref_url="https://www.suse.com/security/cve/CVE-2022-31150/" source="CVE"/>
		<reference ref_id="CVE-2022-35949" ref_url="https://www.suse.com/security/cve/CVE-2022-35949/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.17.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31150/">CVE-2022-31150 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31150">CVE-2022-31150 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35949/">CVE-2022-35949 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35949">CVE-2022-35949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926461" comment="corepack16-16.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926462" comment="nodejs16-16.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926463" comment="nodejs16-devel-16.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926464" comment="nodejs16-docs-16.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926465" comment="npm16-16.17.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250607" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-104.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38474" ref_url="https://www.suse.com/security/cve/CVE-2022-38474/" source="CVE"/>
		<reference ref_id="CVE-2022-38475" ref_url="https://www.suse.com/security/cve/CVE-2022-38475/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-104.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38474/">CVE-2022-38474 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38474">CVE-2022-38474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38475/">CVE-2022-38475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38475">CVE-2022-38475 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926466" comment="MozillaFirefox-104.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926467" comment="MozillaFirefox-branding-upstream-104.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926468" comment="MozillaFirefox-devel-104.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926469" comment="MozillaFirefox-translations-common-104.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926470" comment="MozillaFirefox-translations-other-104.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250608" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926471" comment="MozillaThunderbird-102.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926472" comment="MozillaThunderbird-translations-common-102.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926473" comment="MozillaThunderbird-translations-other-102.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250609" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-12.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-12.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926474" comment="libvmtools-devel-12.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926475" comment="libvmtools0-12.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926476" comment="open-vm-tools-12.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926477" comment="open-vm-tools-desktop-12.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926478" comment="open-vm-tools-salt-minion-12.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926479" comment="open-vm-tools-sdmp-12.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250610" version="1" class="patch">
	<metadata>
		<title>buildah-1.27.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.27.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926480" comment="buildah-1.27.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250611" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926481" comment="libxml2-2-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926482" comment="libxml2-2-32bit-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926483" comment="libxml2-devel-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926484" comment="libxml2-devel-32bit-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926485" comment="libxml2-doc-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926486" comment="libxml2-tools-2.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250612" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-19.0.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2610" ref_url="https://www.suse.com/security/cve/CVE-2022-2610/" source="CVE"/>
		<reference ref_id="CVE-2022-2615" ref_url="https://www.suse.com/security/cve/CVE-2022-2615/" source="CVE"/>
		<reference ref_id="CVE-2022-2618" ref_url="https://www.suse.com/security/cve/CVE-2022-2618/" source="CVE"/>
		<reference ref_id="CVE-2022-2624" ref_url="https://www.suse.com/security/cve/CVE-2022-2624/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-19.0.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2610/">CVE-2022-2610 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2610">CVE-2022-2610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2615/">CVE-2022-2615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2615">CVE-2022-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2618/">CVE-2022-2618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2618">CVE-2022-2618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2624/">CVE-2022-2624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2624">CVE-2022-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926487" comment="nodejs-electron-19.0.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926488" comment="nodejs-electron-devel-19.0.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250613" version="1" class="patch">
	<metadata>
		<title>libmad-devel-0.15.1b-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8373" ref_url="https://www.suse.com/security/cve/CVE-2017-8373/" source="CVE"/>
		<description>
These are all security issues fixed in the libmad-devel-0.15.1b-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8373/">CVE-2017-8373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8373">CVE-2017-8373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926489" comment="libmad-devel-0.15.1b-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926490" comment="libmad0-0.15.1b-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926491" comment="libmad0-32bit-0.15.1b-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250614" version="1" class="patch">
	<metadata>
		<title>curl-7.85.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.85.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926492" comment="curl-7.85.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926493" comment="libcurl-devel-7.85.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926494" comment="libcurl-devel-32bit-7.85.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926495" comment="libcurl4-7.85.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926496" comment="libcurl4-32bit-7.85.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250615" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926497" comment="element-desktop-1.11.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250616" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926498" comment="element-web-1.11.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250617" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.9-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.9-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44648">CVE-2021-44648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926499" comment="gdk-pixbuf-devel-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926500" comment="gdk-pixbuf-devel-32bit-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926501" comment="gdk-pixbuf-lang-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926502" comment="gdk-pixbuf-query-loaders-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926503" comment="gdk-pixbuf-query-loaders-32bit-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926504" comment="gdk-pixbuf-thumbnailer-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926505" comment="libgdk_pixbuf-2_0-0-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926506" comment="libgdk_pixbuf-2_0-0-32bit-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926507" comment="typelib-1_0-GdkPixbuf-2_0-2.42.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926508" comment="typelib-1_0-GdkPixdata-2_0-2.42.9-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250618" version="1" class="patch">
	<metadata>
		<title>python310-3.10.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926509" comment="python310-3.10.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926510" comment="python310-32bit-3.10.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926511" comment="python310-curses-3.10.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926512" comment="python310-dbm-3.10.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926513" comment="python310-idle-3.10.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926514" comment="python310-tk-3.10.6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250619" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926515" comment="libminizip1-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926516" comment="libminizip1-32bit-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926517" comment="libz1-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926518" comment="libz1-32bit-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926519" comment="minizip-devel-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926520" comment="zlib-devel-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926521" comment="zlib-devel-32bit-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926522" comment="zlib-devel-static-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926523" comment="zlib-devel-static-32bit-1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926524" comment="zlib-testsuite-1.2.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250620" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032/" source="CVE"/>
		<reference ref_id="CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033/" source="CVE"/>
		<reference ref_id="CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034/" source="CVE"/>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926525" comment="MozillaThunderbird-102.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926526" comment="MozillaThunderbird-translations-common-102.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926527" comment="MozillaThunderbird-translations-other-102.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250621" version="1" class="patch">
	<metadata>
		<title>python38-3.8.13-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.13-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926528" comment="python38-3.8.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926529" comment="python38-32bit-3.8.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926530" comment="python38-curses-3.8.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926531" comment="python38-dbm-3.8.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926532" comment="python38-idle-3.8.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926533" comment="python38-tk-3.8.13-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250622" version="1" class="patch">
	<metadata>
		<title>python39-3.9.13-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.13-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926534" comment="python39-3.9.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926535" comment="python39-32bit-3.9.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926536" comment="python39-curses-3.9.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926537" comment="python39-dbm-3.9.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926538" comment="python39-idle-3.9.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926539" comment="python39-tk-3.9.13-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250623" version="1" class="patch">
	<metadata>
		<title>ansible-2.9.27-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-2.9.27-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3447">CVE-2021-3447 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3620">CVE-2021-3620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926540" comment="ansible-2.9.27-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926541" comment="ansible-doc-2.9.27-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926542" comment="ansible-test-2.9.27-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250624" version="1" class="patch">
	<metadata>
		<title>ncat-7.93-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
These are all security issues fixed in the ncat-7.93-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926543" comment="ncat-7.93-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926544" comment="nmap-7.93-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926545" comment="nping-7.93-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250625" version="1" class="patch">
	<metadata>
		<title>phoronix-test-suite-10.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0157" ref_url="https://www.suse.com/security/cve/CVE-2022-0157/" source="CVE"/>
		<reference ref_id="CVE-2022-0196" ref_url="https://www.suse.com/security/cve/CVE-2022-0196/" source="CVE"/>
		<reference ref_id="CVE-2022-0571" ref_url="https://www.suse.com/security/cve/CVE-2022-0571/" source="CVE"/>
		<description>
These are all security issues fixed in the phoronix-test-suite-10.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0157/">CVE-2022-0157 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0157">CVE-2022-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0196/">CVE-2022-0196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0196">CVE-2022-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0571/">CVE-2022-0571 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0571">CVE-2022-0571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926546" comment="phoronix-test-suite-10.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250626" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.19.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.19.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926548" comment="kernel-macros-5.19.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926549" comment="kernel-source-5.19.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926550" comment="kernel-source-vanilla-5.19.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250627" version="1" class="patch">
	<metadata>
		<title>postorius-1.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31997" ref_url="https://www.suse.com/security/cve/CVE-2021-31997/" source="CVE"/>
		<reference ref_id="CVE-2021-40347" ref_url="https://www.suse.com/security/cve/CVE-2021-40347/" source="CVE"/>
		<description>
These are all security issues fixed in the postorius-1.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31997/">CVE-2021-31997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31997">CVE-2021-31997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40347/">CVE-2021-40347 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40347">CVE-2021-40347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926551" comment="postorius-1.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926552" comment="postorius-web-1.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926553" comment="postorius-web-uwsgi-1.3.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250628" version="1" class="patch">
	<metadata>
		<title>frr-8.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-25074" ref_url="https://www.suse.com/security/cve/CVE-2019-25074/" source="CVE"/>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25074/">CVE-2019-25074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-25074">CVE-2019-25074 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926554" comment="frr-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926555" comment="frr-devel-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926556" comment="libfrr0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926557" comment="libfrr_pb0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926558" comment="libfrrcares0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926559" comment="libfrrfpm_pb0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926560" comment="libfrrospfapiclient0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926561" comment="libfrrsnmp0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926562" comment="libfrrzmq0-8.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926563" comment="libmlag_pb0-8.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250629" version="1" class="patch">
	<metadata>
		<title>snakeyaml-1.31-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<reference ref_id="CVE-2022-25857" ref_url="https://www.suse.com/security/cve/CVE-2022-25857/" source="CVE"/>
		<reference ref_id="CVE-2022-38749" ref_url="https://www.suse.com/security/cve/CVE-2022-38749/" source="CVE"/>
		<reference ref_id="CVE-2022-38750" ref_url="https://www.suse.com/security/cve/CVE-2022-38750/" source="CVE"/>
		<reference ref_id="CVE-2022-38751" ref_url="https://www.suse.com/security/cve/CVE-2022-38751/" source="CVE"/>
		<reference ref_id="CVE-2022-38752" ref_url="https://www.suse.com/security/cve/CVE-2022-38752/" source="CVE"/>
		<description>
These are all security issues fixed in the snakeyaml-1.31-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13936">CVE-2020-13936 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25857/">CVE-2022-25857 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38749/">CVE-2022-38749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38749">CVE-2022-38749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38750/">CVE-2022-38750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38750">CVE-2022-38750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38751/">CVE-2022-38751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38751">CVE-2022-38751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38752/">CVE-2022-38752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38752">CVE-2022-38752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926564" comment="snakeyaml-1.31-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926565" comment="snakeyaml-javadoc-1.31-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250630" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926566" comment="go1.18-1.18.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926567" comment="go1.18-doc-1.18.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926568" comment="go1.18-race-1.18.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250631" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-32190" ref_url="https://www.suse.com/security/cve/CVE-2022-32190/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32190/">CVE-2022-32190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32190">CVE-2022-32190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926569" comment="go1.19-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926570" comment="go1.19-doc-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926571" comment="go1.19-race-1.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250632" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-78.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1285" ref_url="https://www.suse.com/security/cve/CVE-2018-1285/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-78.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1285/">CVE-2018-1285 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1285">CVE-2018-1285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926572" comment="log4net-1.2.10-78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250633" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-19.0.14-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2854" ref_url="https://www.suse.com/security/cve/CVE-2022-2854/" source="CVE"/>
		<reference ref_id="CVE-2022-2855" ref_url="https://www.suse.com/security/cve/CVE-2022-2855/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-19.0.14-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2854/">CVE-2022-2854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2854">CVE-2022-2854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2855/">CVE-2022-2855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2855">CVE-2022-2855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926573" comment="nodejs-electron-19.0.14-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926574" comment="nodejs-electron-devel-19.0.14-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250634" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-devel-0.9.13-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29260" ref_url="https://www.suse.com/security/cve/CVE-2020-29260/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-devel-0.9.13-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29260/">CVE-2020-29260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29260">CVE-2020-29260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926575" comment="LibVNCServer-devel-0.9.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926576" comment="libvncclient1-0.9.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926577" comment="libvncserver1-0.9.13-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250635" version="1" class="patch">
	<metadata>
		<title>alpine-2.26-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38370" ref_url="https://www.suse.com/security/cve/CVE-2021-38370/" source="CVE"/>
		<description>
These are all security issues fixed in the alpine-2.26-27.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38370/">CVE-2021-38370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38370">CVE-2021-38370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926578" comment="alpine-2.26-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926579" comment="pico-5.09-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926580" comment="pilot-2.99-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250636" version="1" class="patch">
	<metadata>
		<title>booth-1.0+20220724.dce51f9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2553" ref_url="https://www.suse.com/security/cve/CVE-2022-2553/" source="CVE"/>
		<description>
These are all security issues fixed in the booth-1.0+20220724.dce51f9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2553/">CVE-2022-2553 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2553">CVE-2022-2553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926581" comment="booth-1.0+20220724.dce51f9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926582" comment="booth-test-1.0+20220724.dce51f9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250637" version="1" class="patch">
	<metadata>
		<title>glibc-2.36-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39046" ref_url="https://www.suse.com/security/cve/CVE-2022-39046/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.36-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39046/">CVE-2022-39046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39046">CVE-2022-39046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926583" comment="glibc-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926584" comment="glibc-devel-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926585" comment="glibc-devel-static-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926586" comment="glibc-extra-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926587" comment="glibc-html-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926588" comment="glibc-i18ndata-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926589" comment="glibc-info-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926590" comment="glibc-lang-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926591" comment="glibc-locale-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926592" comment="glibc-locale-base-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926593" comment="glibc-profile-2.36-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926594" comment="nscd-2.36-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250638" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-19.0.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3040" ref_url="https://www.suse.com/security/cve/CVE-2022-3040/" source="CVE"/>
		<reference ref_id="CVE-2022-3041" ref_url="https://www.suse.com/security/cve/CVE-2022-3041/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-19.0.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3040/">CVE-2022-3040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3040">CVE-2022-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3041/">CVE-2022-3041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3041">CVE-2022-3041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926595" comment="nodejs-electron-19.0.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926596" comment="nodejs-electron-devel-19.0.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250639" version="1" class="patch">
	<metadata>
		<title>python310-pydantic-1.10.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pydantic-1.10.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926597" comment="python310-pydantic-1.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926598" comment="python38-pydantic-1.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926599" comment="python39-pydantic-1.10.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250640" version="1" class="patch">
	<metadata>
		<title>chromedriver-105.0.5195.102-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3038" ref_url="https://www.suse.com/security/cve/CVE-2022-3038/" source="CVE"/>
		<reference ref_id="CVE-2022-3039" ref_url="https://www.suse.com/security/cve/CVE-2022-3039/" source="CVE"/>
		<reference ref_id="CVE-2022-3040" ref_url="https://www.suse.com/security/cve/CVE-2022-3040/" source="CVE"/>
		<reference ref_id="CVE-2022-3041" ref_url="https://www.suse.com/security/cve/CVE-2022-3041/" source="CVE"/>
		<reference ref_id="CVE-2022-3042" ref_url="https://www.suse.com/security/cve/CVE-2022-3042/" source="CVE"/>
		<reference ref_id="CVE-2022-3043" ref_url="https://www.suse.com/security/cve/CVE-2022-3043/" source="CVE"/>
		<reference ref_id="CVE-2022-3044" ref_url="https://www.suse.com/security/cve/CVE-2022-3044/" source="CVE"/>
		<reference ref_id="CVE-2022-3045" ref_url="https://www.suse.com/security/cve/CVE-2022-3045/" source="CVE"/>
		<reference ref_id="CVE-2022-3046" ref_url="https://www.suse.com/security/cve/CVE-2022-3046/" source="CVE"/>
		<reference ref_id="CVE-2022-3047" ref_url="https://www.suse.com/security/cve/CVE-2022-3047/" source="CVE"/>
		<reference ref_id="CVE-2022-3048" ref_url="https://www.suse.com/security/cve/CVE-2022-3048/" source="CVE"/>
		<reference ref_id="CVE-2022-3049" ref_url="https://www.suse.com/security/cve/CVE-2022-3049/" source="CVE"/>
		<reference ref_id="CVE-2022-3050" ref_url="https://www.suse.com/security/cve/CVE-2022-3050/" source="CVE"/>
		<reference ref_id="CVE-2022-3051" ref_url="https://www.suse.com/security/cve/CVE-2022-3051/" source="CVE"/>
		<reference ref_id="CVE-2022-3052" ref_url="https://www.suse.com/security/cve/CVE-2022-3052/" source="CVE"/>
		<reference ref_id="CVE-2022-3053" ref_url="https://www.suse.com/security/cve/CVE-2022-3053/" source="CVE"/>
		<reference ref_id="CVE-2022-3054" ref_url="https://www.suse.com/security/cve/CVE-2022-3054/" source="CVE"/>
		<reference ref_id="CVE-2022-3055" ref_url="https://www.suse.com/security/cve/CVE-2022-3055/" source="CVE"/>
		<reference ref_id="CVE-2022-3056" ref_url="https://www.suse.com/security/cve/CVE-2022-3056/" source="CVE"/>
		<reference ref_id="CVE-2022-3057" ref_url="https://www.suse.com/security/cve/CVE-2022-3057/" source="CVE"/>
		<reference ref_id="CVE-2022-3058" ref_url="https://www.suse.com/security/cve/CVE-2022-3058/" source="CVE"/>
		<reference ref_id="CVE-2022-3071" ref_url="https://www.suse.com/security/cve/CVE-2022-3071/" source="CVE"/>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-105.0.5195.102-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3038/">CVE-2022-3038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3038">CVE-2022-3038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3039/">CVE-2022-3039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3039">CVE-2022-3039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3040/">CVE-2022-3040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3040">CVE-2022-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3041/">CVE-2022-3041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3041">CVE-2022-3041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3042/">CVE-2022-3042 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3042">CVE-2022-3042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3043/">CVE-2022-3043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3043">CVE-2022-3043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3044/">CVE-2022-3044 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3044">CVE-2022-3044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3045/">CVE-2022-3045 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3045">CVE-2022-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3046/">CVE-2022-3046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3046">CVE-2022-3046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3047/">CVE-2022-3047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3047">CVE-2022-3047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3048/">CVE-2022-3048 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3048">CVE-2022-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3049/">CVE-2022-3049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3049">CVE-2022-3049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3050/">CVE-2022-3050 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3050">CVE-2022-3050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3051/">CVE-2022-3051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3051">CVE-2022-3051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3052/">CVE-2022-3052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3052">CVE-2022-3052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3053/">CVE-2022-3053 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3053">CVE-2022-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3054/">CVE-2022-3054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3054">CVE-2022-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3055/">CVE-2022-3055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3055">CVE-2022-3055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3056/">CVE-2022-3056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3056">CVE-2022-3056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3057/">CVE-2022-3057 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3057">CVE-2022-3057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3058/">CVE-2022-3058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3058">CVE-2022-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3071/">CVE-2022-3071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3071">CVE-2022-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3075">CVE-2022-3075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926600" comment="chromedriver-105.0.5195.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926601" comment="chromium-105.0.5195.102-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250641" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.19.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2308" ref_url="https://www.suse.com/security/cve/CVE-2022-2308/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.19.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2308/">CVE-2022-2308 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926603" comment="kernel-macros-5.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926604" comment="kernel-source-5.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926605" comment="kernel-source-vanilla-5.19.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250642" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-23.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926606" comment="python-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926607" comment="python-32bit-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926608" comment="python-curses-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926609" comment="python-demo-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926610" comment="python-gdbm-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926611" comment="python-idle-2.7.18-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926612" comment="python-tk-2.7.18-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250643" version="1" class="patch">
	<metadata>
		<title>deluge-2.1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3427" ref_url="https://www.suse.com/security/cve/CVE-2021-3427/" source="CVE"/>
		<description>
These are all security issues fixed in the deluge-2.1.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3427/">CVE-2021-3427 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3427">CVE-2021-3427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926613" comment="deluge-2.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926614" comment="deluge-lang-2.1.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250644" version="1" class="patch">
	<metadata>
		<title>helm-3.9.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36055" ref_url="https://www.suse.com/security/cve/CVE-2022-36055/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.9.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36055/">CVE-2022-36055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36055">CVE-2022-36055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926615" comment="helm-3.9.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926616" comment="helm-bash-completion-3.9.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926617" comment="helm-fish-completion-3.9.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926618" comment="helm-zsh-completion-3.9.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250645" version="1" class="patch">
	<metadata>
		<title>libconfuse-devel-3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40320" ref_url="https://www.suse.com/security/cve/CVE-2022-40320/" source="CVE"/>
		<description>
These are all security issues fixed in the libconfuse-devel-3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40320/">CVE-2022-40320 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40320">CVE-2022-40320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926619" comment="libconfuse-devel-3.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926620" comment="libconfuse-lang-3.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926621" comment="libconfuse2-3.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250646" version="1" class="patch">
	<metadata>
		<title>libgsasl-devel-1.10.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2469" ref_url="https://www.suse.com/security/cve/CVE-2022-2469/" source="CVE"/>
		<description>
These are all security issues fixed in the libgsasl-devel-1.10.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2469/">CVE-2022-2469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2469">CVE-2022-2469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926622" comment="libgsasl-devel-1.10.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926623" comment="libgsasl-lang-1.10.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926624" comment="libgsasl7-1.10.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250647" version="1" class="patch">
	<metadata>
		<title>mupdf-1.20.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4216" ref_url="https://www.suse.com/security/cve/CVE-2021-4216/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.20.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4216/">CVE-2021-4216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4216">CVE-2021-4216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926625" comment="mupdf-1.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926626" comment="mupdf-devel-static-1.20.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250648" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.66-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37797" ref_url="https://www.suse.com/security/cve/CVE-2022-37797/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.66-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37797/">CVE-2022-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37797">CVE-2022-37797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926627" comment="lighttpd-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926628" comment="lighttpd-mod_authn_gssapi-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926629" comment="lighttpd-mod_authn_ldap-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926630" comment="lighttpd-mod_authn_pam-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926631" comment="lighttpd-mod_authn_sasl-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926632" comment="lighttpd-mod_magnet-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926633" comment="lighttpd-mod_maxminddb-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926634" comment="lighttpd-mod_rrdtool-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926635" comment="lighttpd-mod_vhostdb_dbi-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926636" comment="lighttpd-mod_vhostdb_ldap-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926637" comment="lighttpd-mod_vhostdb_mysql-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926638" comment="lighttpd-mod_vhostdb_pgsql-1.4.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926639" comment="lighttpd-mod_webdav-1.4.66-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250649" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0453-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0453-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926640" comment="gvim-9.0.0453-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926641" comment="vim-9.0.0453-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926642" comment="vim-data-9.0.0453-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926643" comment="vim-data-common-9.0.0453-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926644" comment="vim-small-9.0.0453-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250650" version="1" class="patch">
	<metadata>
		<title>libwireshark15-3.6.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4186" ref_url="https://www.suse.com/security/cve/CVE-2021-4186/" source="CVE"/>
		<reference ref_id="CVE-2022-3190" ref_url="https://www.suse.com/security/cve/CVE-2022-3190/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark15-3.6.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4186/">CVE-2021-4186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4186">CVE-2021-4186 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3190/">CVE-2022-3190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3190">CVE-2022-3190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926645" comment="libwireshark15-3.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926646" comment="libwiretap12-3.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926647" comment="libwsutil13-3.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926648" comment="wireshark-3.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926649" comment="wireshark-devel-3.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926650" comment="wireshark-ui-qt-3.6.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250651" version="1" class="patch">
	<metadata>
		<title>cherrytree-0.99.49+3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35133" ref_url="https://www.suse.com/security/cve/CVE-2022-35133/" source="CVE"/>
		<description>
These are all security issues fixed in the cherrytree-0.99.49+3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35133/">CVE-2022-35133 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35133">CVE-2022-35133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926651" comment="cherrytree-0.99.49+3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926652" comment="cherrytree-lang-0.99.49+3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250652" version="1" class="patch">
	<metadata>
		<title>cosign-1.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36056" ref_url="https://www.suse.com/security/cve/CVE-2022-36056/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-1.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36056/">CVE-2022-36056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36056">CVE-2022-36056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926653" comment="cosign-1.12.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250653" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2566" ref_url="https://www.suse.com/security/cve/CVE-2022-2566/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2566/">CVE-2022-2566 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2566">CVE-2022-2566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926654" comment="ffmpeg-5-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926655" comment="ffmpeg-5-libavcodec-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926656" comment="ffmpeg-5-libavdevice-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926657" comment="ffmpeg-5-libavfilter-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926658" comment="ffmpeg-5-libavformat-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926659" comment="ffmpeg-5-libavutil-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926660" comment="ffmpeg-5-libpostproc-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926661" comment="ffmpeg-5-libswresample-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926662" comment="ffmpeg-5-libswscale-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926663" comment="ffmpeg-5-private-devel-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926664" comment="libavcodec59-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926665" comment="libavcodec59-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926666" comment="libavdevice59-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926667" comment="libavdevice59-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926668" comment="libavfilter8-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926669" comment="libavfilter8-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926670" comment="libavformat59-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926671" comment="libavformat59-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926672" comment="libavutil57-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926673" comment="libavutil57-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926674" comment="libpostproc56-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926675" comment="libpostproc56-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926676" comment="libswresample4-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926677" comment="libswresample4-32bit-5.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926678" comment="libswscale6-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926679" comment="libswscale6-32bit-5.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250654" version="1" class="patch">
	<metadata>
		<title>chromedriver-105.0.5195.127-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3195" ref_url="https://www.suse.com/security/cve/CVE-2022-3195/" source="CVE"/>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-105.0.5195.127-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3195/">CVE-2022-3195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3195">CVE-2022-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3196">CVE-2022-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3197">CVE-2022-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3198">CVE-2022-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3199">CVE-2022-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3200">CVE-2022-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3201">CVE-2022-3201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926680" comment="chromedriver-105.0.5195.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926681" comment="chromium-105.0.5195.127-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250655" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-19.0.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-19.0.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3075">CVE-2022-3075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926682" comment="nodejs-electron-19.0.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926683" comment="nodejs-electron-devel-19.0.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250656" version="1" class="patch">
	<metadata>
		<title>chkstat-1599_20220912-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<description>
These are all security issues fixed in the chkstat-1599_20220912-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31252">CVE-2022-31252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926684" comment="chkstat-1599_20220912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926685" comment="permissions-1599_20220912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926686" comment="permissions-config-1599_20220912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926687" comment="permissions-zypp-plugin-1599_20220912-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250657" version="1" class="patch">
	<metadata>
		<title>python311-3.11.0rc2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.0rc2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926688" comment="python311-3.11.0rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926689" comment="python311-32bit-3.11.0rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926690" comment="python311-curses-3.11.0rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926691" comment="python311-dbm-3.11.0rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926692" comment="python311-idle-3.11.0rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926693" comment="python311-tk-3.11.0rc2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250658" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0453-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0368" ref_url="https://www.suse.com/security/cve/CVE-2022-0368/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0408" ref_url="https://www.suse.com/security/cve/CVE-2022-0408/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0554" ref_url="https://www.suse.com/security/cve/CVE-2022-0554/" source="CVE"/>
		<reference ref_id="CVE-2022-0572" ref_url="https://www.suse.com/security/cve/CVE-2022-0572/" source="CVE"/>
		<reference ref_id="CVE-2022-0629" ref_url="https://www.suse.com/security/cve/CVE-2022-0629/" source="CVE"/>
		<reference ref_id="CVE-2022-0685" ref_url="https://www.suse.com/security/cve/CVE-2022-0685/" source="CVE"/>
		<reference ref_id="CVE-2022-0729" ref_url="https://www.suse.com/security/cve/CVE-2022-0729/" source="CVE"/>
		<reference ref_id="CVE-2022-0943" ref_url="https://www.suse.com/security/cve/CVE-2022-0943/" source="CVE"/>
		<reference ref_id="CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154/" source="CVE"/>
		<reference ref_id="CVE-2022-1160" ref_url="https://www.suse.com/security/cve/CVE-2022-1160/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621/" source="CVE"/>
		<reference ref_id="CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629/" source="CVE"/>
		<reference ref_id="CVE-2022-1674" ref_url="https://www.suse.com/security/cve/CVE-2022-1674/" source="CVE"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1769" ref_url="https://www.suse.com/security/cve/CVE-2022-1769/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1886" ref_url="https://www.suse.com/security/cve/CVE-2022-1886/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="CVE-2022-1942" ref_url="https://www.suse.com/security/cve/CVE-2022-1942/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2000" ref_url="https://www.suse.com/security/cve/CVE-2022-2000/" source="CVE"/>
		<reference ref_id="CVE-2022-2042" ref_url="https://www.suse.com/security/cve/CVE-2022-2042/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2288" ref_url="https://www.suse.com/security/cve/CVE-2022-2288/" source="CVE"/>
		<reference ref_id="CVE-2022-2289" ref_url="https://www.suse.com/security/cve/CVE-2022-2289/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0368/">CVE-2022-0368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0408/">CVE-2022-0408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0554/">CVE-2022-0554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">CVE-2022-0554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0572/">CVE-2022-0572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">CVE-2022-0572 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0629/">CVE-2022-0629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0685/">CVE-2022-0685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0729/">CVE-2022-0729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0943/">CVE-2022-0943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1160/">CVE-2022-1160 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1674/">CVE-2022-1674 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720">CVE-2022-1720 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1769/">CVE-2022-1769 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1886/">CVE-2022-1886 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1942/">CVE-2022-1942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942">CVE-2022-1942 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2000/">CVE-2022-2000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000">CVE-2022-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2042/">CVE-2022-2042 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042">CVE-2022-2042 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2288/">CVE-2022-2288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2288">CVE-2022-2288 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2289/">CVE-2022-2289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2289">CVE-2022-2289 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2571">CVE-2022-2571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2580">CVE-2022-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2581">CVE-2022-2581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2598">CVE-2022-2598 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3037">CVE-2022-3037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926694" comment="gvim-9.0.0453-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926695" comment="vim-9.0.0453-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926696" comment="vim-data-9.0.0453-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926697" comment="vim-data-common-9.0.0453-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926698" comment="vim-small-9.0.0453-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250659" version="1" class="patch">
	<metadata>
		<title>jasper-3.0.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2963" ref_url="https://www.suse.com/security/cve/CVE-2022-2963/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-3.0.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2963/">CVE-2022-2963 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2963">CVE-2022-2963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926699" comment="jasper-3.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926700" comment="libjasper-devel-3.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926701" comment="libjasper6-3.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926702" comment="libjasper6-32bit-3.0.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250660" version="1" class="patch">
	<metadata>
		<title>python310-oauthlib-3.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36087" ref_url="https://www.suse.com/security/cve/CVE-2022-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-oauthlib-3.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36087/">CVE-2022-36087 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36087">CVE-2022-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926703" comment="python310-oauthlib-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926704" comment="python38-oauthlib-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926705" comment="python39-oauthlib-3.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250661" version="1" class="patch">
	<metadata>
		<title>python310-3.10.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926706" comment="python310-3.10.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926707" comment="python310-32bit-3.10.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926708" comment="python310-curses-3.10.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926709" comment="python310-dbm-3.10.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926710" comment="python310-idle-3.10.7-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926711" comment="python310-tk-3.10.7-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250662" version="1" class="patch">
	<metadata>
		<title>python38-3.8.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926712" comment="python38-3.8.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926713" comment="python38-32bit-3.8.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926714" comment="python38-curses-3.8.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926715" comment="python38-dbm-3.8.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926716" comment="python38-idle-3.8.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926717" comment="python38-tk-3.8.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250663" version="1" class="patch">
	<metadata>
		<title>python39-3.9.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926718" comment="python39-3.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926719" comment="python39-32bit-3.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926720" comment="python39-curses-3.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926721" comment="python39-dbm-3.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926722" comment="python39-idle-3.9.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926723" comment="python39-tk-3.9.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250664" version="1" class="patch">
	<metadata>
		<title>cargo1.62-1.62.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36113" ref_url="https://www.suse.com/security/cve/CVE-2022-36113/" source="CVE"/>
		<reference ref_id="CVE-2022-36114" ref_url="https://www.suse.com/security/cve/CVE-2022-36114/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.62-1.62.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-36113/">CVE-2022-36113 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36113">CVE-2022-36113 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36114/">CVE-2022-36114 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36114">CVE-2022-36114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926724" comment="cargo1.62-1.62.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926725" comment="rust1.62-1.62.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250665" version="1" class="patch">
	<metadata>
		<title>cargo1.63-1.63.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36113" ref_url="https://www.suse.com/security/cve/CVE-2022-36113/" source="CVE"/>
		<reference ref_id="CVE-2022-36114" ref_url="https://www.suse.com/security/cve/CVE-2022-36114/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.63-1.63.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-36113/">CVE-2022-36113 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36113">CVE-2022-36113 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36114/">CVE-2022-36114 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36114">CVE-2022-36114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926726" comment="cargo1.63-1.63.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926727" comment="rust1.63-1.63.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250666" version="1" class="patch">
	<metadata>
		<title>helm-3.9.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21272" ref_url="https://www.suse.com/security/cve/CVE-2021-21272/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.9.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21272/">CVE-2021-21272 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21272">CVE-2021-21272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926728" comment="helm-3.9.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926729" comment="helm-bash-completion-3.9.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926730" comment="helm-fish-completion-3.9.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926731" comment="helm-zsh-completion-3.9.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250667" version="1" class="patch">
	<metadata>
		<title>python310-waitress-2.1.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31015" ref_url="https://www.suse.com/security/cve/CVE-2022-31015/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-waitress-2.1.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31015/">CVE-2022-31015 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31015">CVE-2022-31015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926732" comment="python310-waitress-2.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926733" comment="python38-waitress-2.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926734" comment="python39-waitress-2.1.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250668" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.39.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.39.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">CVE-2021-36690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926735" comment="libsqlite3-0-3.39.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926736" comment="libsqlite3-0-32bit-3.39.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926737" comment="sqlite3-3.39.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926738" comment="sqlite3-devel-3.39.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926739" comment="sqlite3-doc-3.39.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926740" comment="sqlite3-tcl-3.39.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250669" version="1" class="patch">
	<metadata>
		<title>bluez-5.65-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.65-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926741" comment="bluez-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926742" comment="bluez-auto-enable-devices-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926743" comment="bluez-cups-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926744" comment="bluez-deprecated-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926745" comment="bluez-devel-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926746" comment="bluez-devel-32bit-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926747" comment="bluez-obexd-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926748" comment="bluez-test-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926749" comment="bluez-zsh-completion-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926750" comment="libbluetooth3-5.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926751" comment="libbluetooth3-32bit-5.65-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250670" version="1" class="patch">
	<metadata>
		<title>corepack18-18.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack18-18.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926752" comment="corepack18-18.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926753" comment="nodejs18-18.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926754" comment="nodejs18-devel-18.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926755" comment="nodejs18-docs-18.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926756" comment="npm18-18.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250671" version="1" class="patch">
	<metadata>
		<title>python310-mistune-2.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34749" ref_url="https://www.suse.com/security/cve/CVE-2022-34749/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mistune-2.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34749/">CVE-2022-34749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34749">CVE-2022-34749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926757" comment="python310-mistune-2.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926758" comment="python38-mistune-2.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926759" comment="python39-mistune-2.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250672" version="1" class="patch">
	<metadata>
		<title>tinyproxy-1.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40468" ref_url="https://www.suse.com/security/cve/CVE-2022-40468/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyproxy-1.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40468/">CVE-2022-40468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40468">CVE-2022-40468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926760" comment="tinyproxy-1.11.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250673" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0500-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0500-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926761" comment="gvim-9.0.0500-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926762" comment="vim-9.0.0500-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926763" comment="vim-data-9.0.0500-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926764" comment="vim-data-common-9.0.0500-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926765" comment="vim-small-9.0.0500-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250674" version="1" class="patch">
	<metadata>
		<title>colord-1.4.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.4.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42523">CVE-2021-42523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926766" comment="colord-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926767" comment="colord-color-profiles-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926768" comment="colord-lang-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926769" comment="libcolord-devel-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926770" comment="libcolord2-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926771" comment="libcolord2-32bit-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926772" comment="libcolorhug2-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926773" comment="typelib-1_0-Colord-1_0-1.4.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926774" comment="typelib-1_0-Colorhug-1_0-1.4.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250675" version="1" class="patch">
	<metadata>
		<title>gajim-1.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39835" ref_url="https://www.suse.com/security/cve/CVE-2022-39835/" source="CVE"/>
		<description>
These are all security issues fixed in the gajim-1.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39835/">CVE-2022-39835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39835">CVE-2022-39835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926775" comment="gajim-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926776" comment="gajim-lang-1.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250676" version="1" class="patch">
	<metadata>
		<title>tensorflow-lite-2.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35934" ref_url="https://www.suse.com/security/cve/CVE-2022-35934/" source="CVE"/>
		<reference ref_id="CVE-2022-35935" ref_url="https://www.suse.com/security/cve/CVE-2022-35935/" source="CVE"/>
		<reference ref_id="CVE-2022-35937" ref_url="https://www.suse.com/security/cve/CVE-2022-35937/" source="CVE"/>
		<reference ref_id="CVE-2022-35938" ref_url="https://www.suse.com/security/cve/CVE-2022-35938/" source="CVE"/>
		<reference ref_id="CVE-2022-35939" ref_url="https://www.suse.com/security/cve/CVE-2022-35939/" source="CVE"/>
		<reference ref_id="CVE-2022-35940" ref_url="https://www.suse.com/security/cve/CVE-2022-35940/" source="CVE"/>
		<reference ref_id="CVE-2022-35941" ref_url="https://www.suse.com/security/cve/CVE-2022-35941/" source="CVE"/>
		<reference ref_id="CVE-2022-35952" ref_url="https://www.suse.com/security/cve/CVE-2022-35952/" source="CVE"/>
		<reference ref_id="CVE-2022-35959" ref_url="https://www.suse.com/security/cve/CVE-2022-35959/" source="CVE"/>
		<reference ref_id="CVE-2022-35960" ref_url="https://www.suse.com/security/cve/CVE-2022-35960/" source="CVE"/>
		<reference ref_id="CVE-2022-35963" ref_url="https://www.suse.com/security/cve/CVE-2022-35963/" source="CVE"/>
		<reference ref_id="CVE-2022-35964" ref_url="https://www.suse.com/security/cve/CVE-2022-35964/" source="CVE"/>
		<reference ref_id="CVE-2022-35965" ref_url="https://www.suse.com/security/cve/CVE-2022-35965/" source="CVE"/>
		<reference ref_id="CVE-2022-35966" ref_url="https://www.suse.com/security/cve/CVE-2022-35966/" source="CVE"/>
		<reference ref_id="CVE-2022-35967" ref_url="https://www.suse.com/security/cve/CVE-2022-35967/" source="CVE"/>
		<reference ref_id="CVE-2022-35968" ref_url="https://www.suse.com/security/cve/CVE-2022-35968/" source="CVE"/>
		<reference ref_id="CVE-2022-35969" ref_url="https://www.suse.com/security/cve/CVE-2022-35969/" source="CVE"/>
		<reference ref_id="CVE-2022-35970" ref_url="https://www.suse.com/security/cve/CVE-2022-35970/" source="CVE"/>
		<reference ref_id="CVE-2022-35971" ref_url="https://www.suse.com/security/cve/CVE-2022-35971/" source="CVE"/>
		<reference ref_id="CVE-2022-35972" ref_url="https://www.suse.com/security/cve/CVE-2022-35972/" source="CVE"/>
		<reference ref_id="CVE-2022-35973" ref_url="https://www.suse.com/security/cve/CVE-2022-35973/" source="CVE"/>
		<reference ref_id="CVE-2022-35974" ref_url="https://www.suse.com/security/cve/CVE-2022-35974/" source="CVE"/>
		<reference ref_id="CVE-2022-35979" ref_url="https://www.suse.com/security/cve/CVE-2022-35979/" source="CVE"/>
		<reference ref_id="CVE-2022-35981" ref_url="https://www.suse.com/security/cve/CVE-2022-35981/" source="CVE"/>
		<reference ref_id="CVE-2022-35982" ref_url="https://www.suse.com/security/cve/CVE-2022-35982/" source="CVE"/>
		<reference ref_id="CVE-2022-35983" ref_url="https://www.suse.com/security/cve/CVE-2022-35983/" source="CVE"/>
		<reference ref_id="CVE-2022-35984" ref_url="https://www.suse.com/security/cve/CVE-2022-35984/" source="CVE"/>
		<reference ref_id="CVE-2022-35985" ref_url="https://www.suse.com/security/cve/CVE-2022-35985/" source="CVE"/>
		<reference ref_id="CVE-2022-35986" ref_url="https://www.suse.com/security/cve/CVE-2022-35986/" source="CVE"/>
		<reference ref_id="CVE-2022-35987" ref_url="https://www.suse.com/security/cve/CVE-2022-35987/" source="CVE"/>
		<reference ref_id="CVE-2022-35988" ref_url="https://www.suse.com/security/cve/CVE-2022-35988/" source="CVE"/>
		<reference ref_id="CVE-2022-35989" ref_url="https://www.suse.com/security/cve/CVE-2022-35989/" source="CVE"/>
		<reference ref_id="CVE-2022-35990" ref_url="https://www.suse.com/security/cve/CVE-2022-35990/" source="CVE"/>
		<reference ref_id="CVE-2022-35991" ref_url="https://www.suse.com/security/cve/CVE-2022-35991/" source="CVE"/>
		<reference ref_id="CVE-2022-35992" ref_url="https://www.suse.com/security/cve/CVE-2022-35992/" source="CVE"/>
		<reference ref_id="CVE-2022-35993" ref_url="https://www.suse.com/security/cve/CVE-2022-35993/" source="CVE"/>
		<reference ref_id="CVE-2022-35994" ref_url="https://www.suse.com/security/cve/CVE-2022-35994/" source="CVE"/>
		<reference ref_id="CVE-2022-35995" ref_url="https://www.suse.com/security/cve/CVE-2022-35995/" source="CVE"/>
		<reference ref_id="CVE-2022-35996" ref_url="https://www.suse.com/security/cve/CVE-2022-35996/" source="CVE"/>
		<reference ref_id="CVE-2022-35997" ref_url="https://www.suse.com/security/cve/CVE-2022-35997/" source="CVE"/>
		<reference ref_id="CVE-2022-35998" ref_url="https://www.suse.com/security/cve/CVE-2022-35998/" source="CVE"/>
		<reference ref_id="CVE-2022-35999" ref_url="https://www.suse.com/security/cve/CVE-2022-35999/" source="CVE"/>
		<reference ref_id="CVE-2022-36000" ref_url="https://www.suse.com/security/cve/CVE-2022-36000/" source="CVE"/>
		<reference ref_id="CVE-2022-36001" ref_url="https://www.suse.com/security/cve/CVE-2022-36001/" source="CVE"/>
		<reference ref_id="CVE-2022-36002" ref_url="https://www.suse.com/security/cve/CVE-2022-36002/" source="CVE"/>
		<reference ref_id="CVE-2022-36003" ref_url="https://www.suse.com/security/cve/CVE-2022-36003/" source="CVE"/>
		<reference ref_id="CVE-2022-36004" ref_url="https://www.suse.com/security/cve/CVE-2022-36004/" source="CVE"/>
		<reference ref_id="CVE-2022-36005" ref_url="https://www.suse.com/security/cve/CVE-2022-36005/" source="CVE"/>
		<reference ref_id="CVE-2022-36011" ref_url="https://www.suse.com/security/cve/CVE-2022-36011/" source="CVE"/>
		<reference ref_id="CVE-2022-36012" ref_url="https://www.suse.com/security/cve/CVE-2022-36012/" source="CVE"/>
		<reference ref_id="CVE-2022-36013" ref_url="https://www.suse.com/security/cve/CVE-2022-36013/" source="CVE"/>
		<reference ref_id="CVE-2022-36014" ref_url="https://www.suse.com/security/cve/CVE-2022-36014/" source="CVE"/>
		<reference ref_id="CVE-2022-36015" ref_url="https://www.suse.com/security/cve/CVE-2022-36015/" source="CVE"/>
		<reference ref_id="CVE-2022-36016" ref_url="https://www.suse.com/security/cve/CVE-2022-36016/" source="CVE"/>
		<reference ref_id="CVE-2022-36017" ref_url="https://www.suse.com/security/cve/CVE-2022-36017/" source="CVE"/>
		<reference ref_id="CVE-2022-36018" ref_url="https://www.suse.com/security/cve/CVE-2022-36018/" source="CVE"/>
		<reference ref_id="CVE-2022-36019" ref_url="https://www.suse.com/security/cve/CVE-2022-36019/" source="CVE"/>
		<reference ref_id="CVE-2022-36026" ref_url="https://www.suse.com/security/cve/CVE-2022-36026/" source="CVE"/>
		<reference ref_id="CVE-2022-36027" ref_url="https://www.suse.com/security/cve/CVE-2022-36027/" source="CVE"/>
		<description>
These are all security issues fixed in the tensorflow-lite-2.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35934/">CVE-2022-35934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35934">CVE-2022-35934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35935/">CVE-2022-35935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35935">CVE-2022-35935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35937/">CVE-2022-35937 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35937">CVE-2022-35937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35938/">CVE-2022-35938 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35938">CVE-2022-35938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35939/">CVE-2022-35939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35939">CVE-2022-35939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35940/">CVE-2022-35940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35940">CVE-2022-35940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35941/">CVE-2022-35941 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35941">CVE-2022-35941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35952/">CVE-2022-35952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35952">CVE-2022-35952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35959/">CVE-2022-35959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35959">CVE-2022-35959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35960/">CVE-2022-35960 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35960">CVE-2022-35960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35963/">CVE-2022-35963 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35963">CVE-2022-35963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35964/">CVE-2022-35964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35964">CVE-2022-35964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35965/">CVE-2022-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35965">CVE-2022-35965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35966/">CVE-2022-35966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35966">CVE-2022-35966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35967/">CVE-2022-35967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35967">CVE-2022-35967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35968/">CVE-2022-35968 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35968">CVE-2022-35968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35969/">CVE-2022-35969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35969">CVE-2022-35969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35970/">CVE-2022-35970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35970">CVE-2022-35970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35971/">CVE-2022-35971 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35971">CVE-2022-35971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35972/">CVE-2022-35972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35972">CVE-2022-35972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35973/">CVE-2022-35973 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35973">CVE-2022-35973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35974/">CVE-2022-35974 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35974">CVE-2022-35974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35979/">CVE-2022-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35979">CVE-2022-35979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35981/">CVE-2022-35981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35981">CVE-2022-35981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35982/">CVE-2022-35982 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35982">CVE-2022-35982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35983/">CVE-2022-35983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35983">CVE-2022-35983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35984/">CVE-2022-35984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35984">CVE-2022-35984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35985/">CVE-2022-35985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35985">CVE-2022-35985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35986/">CVE-2022-35986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35986">CVE-2022-35986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35987/">CVE-2022-35987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35987">CVE-2022-35987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35988/">CVE-2022-35988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35988">CVE-2022-35988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35989/">CVE-2022-35989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35989">CVE-2022-35989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35990/">CVE-2022-35990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35990">CVE-2022-35990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35991/">CVE-2022-35991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35991">CVE-2022-35991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35992/">CVE-2022-35992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35992">CVE-2022-35992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35993/">CVE-2022-35993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35993">CVE-2022-35993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35994/">CVE-2022-35994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35994">CVE-2022-35994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35995/">CVE-2022-35995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35995">CVE-2022-35995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35996/">CVE-2022-35996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35996">CVE-2022-35996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35997/">CVE-2022-35997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35997">CVE-2022-35997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35998/">CVE-2022-35998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35998">CVE-2022-35998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35999/">CVE-2022-35999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35999">CVE-2022-35999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36000/">CVE-2022-36000 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36000">CVE-2022-36000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36001/">CVE-2022-36001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36001">CVE-2022-36001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36002/">CVE-2022-36002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36002">CVE-2022-36002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36003/">CVE-2022-36003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36003">CVE-2022-36003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36004/">CVE-2022-36004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36004">CVE-2022-36004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36005/">CVE-2022-36005 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36005">CVE-2022-36005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36011/">CVE-2022-36011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36011">CVE-2022-36011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36012/">CVE-2022-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36012">CVE-2022-36012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36013/">CVE-2022-36013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36013">CVE-2022-36013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36014/">CVE-2022-36014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36014">CVE-2022-36014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36015/">CVE-2022-36015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36015">CVE-2022-36015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36016/">CVE-2022-36016 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36016">CVE-2022-36016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36017/">CVE-2022-36017 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36017">CVE-2022-36017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36018/">CVE-2022-36018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36018">CVE-2022-36018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36019/">CVE-2022-36019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36019">CVE-2022-36019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36026/">CVE-2022-36026 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36026">CVE-2022-36026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36027/">CVE-2022-36027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36027">CVE-2022-36027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926777" comment="tensorflow-lite-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926778" comment="tensorflow-lite-devel-2.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250677" version="1" class="patch">
	<metadata>
		<title>bind-9.18.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-2881" ref_url="https://www.suse.com/security/cve/CVE-2022-2881/" source="CVE"/>
		<reference ref_id="CVE-2022-2906" ref_url="https://www.suse.com/security/cve/CVE-2022-2906/" source="CVE"/>
		<reference ref_id="CVE-2022-3080" ref_url="https://www.suse.com/security/cve/CVE-2022-3080/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2881/">CVE-2022-2881 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2881">CVE-2022-2881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2906/">CVE-2022-2906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2906">CVE-2022-2906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3080/">CVE-2022-3080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926779" comment="bind-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926780" comment="bind-doc-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926781" comment="bind-modules-bdbhpt-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926782" comment="bind-modules-generic-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926783" comment="bind-modules-ldap-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926784" comment="bind-modules-mysql-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926785" comment="bind-modules-perl-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926786" comment="bind-modules-sqlite3-9.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926787" comment="bind-utils-9.18.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250678" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0529" ref_url="https://www.suse.com/security/cve/CVE-2022-0529/" source="CVE"/>
		<reference ref_id="CVE-2022-0530" ref_url="https://www.suse.com/security/cve/CVE-2022-0530/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-40.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0529/">CVE-2022-0529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0530/">CVE-2022-0530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926788" comment="unzip-6.00-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926789" comment="unzip-doc-6.00-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250679" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3155" ref_url="https://www.suse.com/security/cve/CVE-2022-3155/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3155/">CVE-2022-3155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3155">CVE-2022-3155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926790" comment="MozillaThunderbird-102.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926791" comment="MozillaThunderbird-translations-common-102.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926792" comment="MozillaThunderbird-translations-other-102.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250680" version="1" class="patch">
	<metadata>
		<title>expat-2.4.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.4.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926793" comment="expat-2.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926794" comment="libexpat-devel-2.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926795" comment="libexpat-devel-32bit-2.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926796" comment="libexpat1-2.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926797" comment="libexpat1-32bit-2.4.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250681" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081/" source="CVE"/>
		<reference ref_id="CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082/" source="CVE"/>
		<reference ref_id="CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084/" source="CVE"/>
		<reference ref_id="CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089/" source="CVE"/>
		<reference ref_id="CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091/" source="CVE"/>
		<reference ref_id="CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32081">CVE-2022-32081 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32082">CVE-2022-32082 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32084">CVE-2022-32084 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32089">CVE-2022-32089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32091">CVE-2022-32091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38791">CVE-2022-38791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926798" comment="libmariadbd-devel-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926799" comment="libmariadbd19-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926800" comment="mariadb-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926801" comment="mariadb-bench-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926802" comment="mariadb-client-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926803" comment="mariadb-errormessages-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926804" comment="mariadb-galera-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926805" comment="mariadb-rpm-macros-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926806" comment="mariadb-test-10.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926807" comment="mariadb-tools-10.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250682" version="1" class="patch">
	<metadata>
		<title>redis-7.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35951" ref_url="https://www.suse.com/security/cve/CVE-2022-35951/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35951/">CVE-2022-35951 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35951">CVE-2022-35951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926808" comment="redis-7.0.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250683" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp0-22.09.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp0-22.09.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926809" comment="libpoppler-cpp0-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926810" comment="libpoppler-cpp0-32bit-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926811" comment="libpoppler-devel-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926812" comment="libpoppler-glib-devel-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926813" comment="libpoppler-glib8-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926814" comment="libpoppler-glib8-32bit-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926815" comment="libpoppler124-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926816" comment="libpoppler124-32bit-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926817" comment="poppler-tools-22.09.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926818" comment="typelib-1_0-Poppler-0_18-22.09.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250684" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-batik-1.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38398" ref_url="https://www.suse.com/security/cve/CVE-2022-38398/" source="CVE"/>
		<reference ref_id="CVE-2022-38648" ref_url="https://www.suse.com/security/cve/CVE-2022-38648/" source="CVE"/>
		<reference ref_id="CVE-2022-40146" ref_url="https://www.suse.com/security/cve/CVE-2022-40146/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-batik-1.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38398/">CVE-2022-38398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38398">CVE-2022-38398 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38648/">CVE-2022-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38648">CVE-2022-38648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40146/">CVE-2022-40146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40146">CVE-2022-40146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926819" comment="xmlgraphics-batik-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926820" comment="xmlgraphics-batik-css-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926821" comment="xmlgraphics-batik-demo-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926822" comment="xmlgraphics-batik-javadoc-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926823" comment="xmlgraphics-batik-rasterizer-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926824" comment="xmlgraphics-batik-slideshow-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926825" comment="xmlgraphics-batik-squiggle-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926826" comment="xmlgraphics-batik-svgpp-1.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926827" comment="xmlgraphics-batik-ttf2svg-1.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250685" version="1" class="patch">
	<metadata>
		<title>squid-5.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41317" ref_url="https://www.suse.com/security/cve/CVE-2022-41317/" source="CVE"/>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-5.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41317/">CVE-2022-41317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41317">CVE-2022-41317 at NVD</cve>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926828" comment="squid-5.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250686" version="1" class="patch">
	<metadata>
		<title>enlightenment-0.25.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37706" ref_url="https://www.suse.com/security/cve/CVE-2022-37706/" source="CVE"/>
		<description>
These are all security issues fixed in the enlightenment-0.25.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-37706/">CVE-2022-37706 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37706">CVE-2022-37706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926829" comment="enlightenment-0.25.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926830" comment="enlightenment-branding-upstream-0.25.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926831" comment="enlightenment-devel-0.25.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250687" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-36062" ref_url="https://www.suse.com/security/cve/CVE-2022-36062/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35957">CVE-2022-35957 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36062/">CVE-2022-36062 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36062">CVE-2022-36062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926832" comment="grafana-8.5.13-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250688" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.6+kde177-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.6+kde177-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926833" comment="libQt5Bootstrap-devel-static-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926834" comment="libQt5Bootstrap-devel-static-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926835" comment="libQt5Concurrent-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926836" comment="libQt5Concurrent-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926837" comment="libQt5Concurrent5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926838" comment="libQt5Concurrent5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926839" comment="libQt5Core-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926840" comment="libQt5Core-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926841" comment="libQt5Core-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926842" comment="libQt5Core5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926843" comment="libQt5Core5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926844" comment="libQt5DBus-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926845" comment="libQt5DBus-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926846" comment="libQt5DBus-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926847" comment="libQt5DBus5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926848" comment="libQt5DBus5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926849" comment="libQt5Gui-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926850" comment="libQt5Gui-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926851" comment="libQt5Gui-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926852" comment="libQt5Gui5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926853" comment="libQt5Gui5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926854" comment="libQt5KmsSupport-devel-static-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926855" comment="libQt5KmsSupport-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926856" comment="libQt5Network-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926857" comment="libQt5Network-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926858" comment="libQt5Network-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926859" comment="libQt5Network5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926860" comment="libQt5Network5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926861" comment="libQt5OpenGL-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926862" comment="libQt5OpenGL-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926863" comment="libQt5OpenGL-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926864" comment="libQt5OpenGL5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926865" comment="libQt5OpenGL5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926866" comment="libQt5OpenGLExtensions-devel-static-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926867" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926868" comment="libQt5PlatformHeaders-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926869" comment="libQt5PlatformSupport-devel-static-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926870" comment="libQt5PlatformSupport-devel-static-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926871" comment="libQt5PlatformSupport-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926872" comment="libQt5PrintSupport-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926873" comment="libQt5PrintSupport-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926874" comment="libQt5PrintSupport-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926875" comment="libQt5PrintSupport5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926876" comment="libQt5PrintSupport5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926877" comment="libQt5Sql-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926878" comment="libQt5Sql-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926879" comment="libQt5Sql-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926880" comment="libQt5Sql5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926881" comment="libQt5Sql5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926882" comment="libQt5Sql5-mysql-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926883" comment="libQt5Sql5-mysql-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926884" comment="libQt5Sql5-postgresql-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926885" comment="libQt5Sql5-postgresql-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926886" comment="libQt5Sql5-sqlite-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926887" comment="libQt5Sql5-sqlite-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926888" comment="libQt5Sql5-unixODBC-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926889" comment="libQt5Sql5-unixODBC-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926890" comment="libQt5Test-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926891" comment="libQt5Test-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926892" comment="libQt5Test-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926893" comment="libQt5Test5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926894" comment="libQt5Test5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926895" comment="libQt5Widgets-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926896" comment="libQt5Widgets-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926897" comment="libQt5Widgets-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926898" comment="libQt5Widgets5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926899" comment="libQt5Widgets5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926900" comment="libQt5Xml-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926901" comment="libQt5Xml-devel-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926902" comment="libQt5Xml5-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926903" comment="libQt5Xml5-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926904" comment="libqt5-qtbase-common-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926905" comment="libqt5-qtbase-devel-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926906" comment="libqt5-qtbase-examples-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926907" comment="libqt5-qtbase-examples-32bit-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926908" comment="libqt5-qtbase-platformtheme-gtk3-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926909" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.6+kde177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926910" comment="libqt5-qtbase-private-headers-devel-5.15.6+kde177-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250689" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.16.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.16.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926911" comment="libunbound8-1.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926912" comment="python3-unbound-1.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926913" comment="unbound-1.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926914" comment="unbound-anchor-1.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926915" comment="unbound-devel-1.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926916" comment="unbound-munin-1.16.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250690" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.2.25-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.2.25-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926917" comment="postgresql-jdbc-42.2.25-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926918" comment="postgresql-jdbc-javadoc-42.2.25-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250691" version="1" class="patch">
	<metadata>
		<title>corepack16-16.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack16-16.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926919" comment="corepack16-16.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926920" comment="nodejs16-16.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926921" comment="nodejs16-devel-16.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926922" comment="nodejs16-docs-16.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926923" comment="npm16-16.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250692" version="1" class="patch">
	<metadata>
		<title>podman-4.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926924" comment="podman-4.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926925" comment="podman-cni-config-4.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926926" comment="podman-docker-4.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926927" comment="podman-remote-4.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250693" version="1" class="patch">
	<metadata>
		<title>v4l2loopback-autoload-0.12.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2652" ref_url="https://www.suse.com/security/cve/CVE-2022-2652/" source="CVE"/>
		<description>
These are all security issues fixed in the v4l2loopback-autoload-0.12.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2652/">CVE-2022-2652 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2652">CVE-2022-2652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926928" comment="v4l2loopback-autoload-0.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926929" comment="v4l2loopback-kmp-default-0.12.7_k5.19.10_1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926930" comment="v4l2loopback-utils-0.12.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250694" version="1" class="patch">
	<metadata>
		<title>kernel-devel-5.19.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-5.19.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926932" comment="kernel-macros-5.19.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926933" comment="kernel-source-5.19.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926934" comment="kernel-source-vanilla-5.19.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250695" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926935" comment="element-desktop-1.11.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250696" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926936" comment="element-web-1.11.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250697" version="1" class="patch">
	<metadata>
		<title>corepack18-18.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack18-18.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926937" comment="corepack18-18.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926938" comment="nodejs18-18.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926939" comment="nodejs18-devel-18.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926940" comment="nodejs18-docs-18.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926941" comment="npm18-18.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250698" version="1" class="patch">
	<metadata>
		<title>php7-7.4.32-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.32-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926942" comment="php7-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926943" comment="php7-bcmath-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926944" comment="php7-bz2-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926945" comment="php7-calendar-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926946" comment="php7-cli-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926947" comment="php7-ctype-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926948" comment="php7-curl-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926949" comment="php7-dba-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926950" comment="php7-devel-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926951" comment="php7-dom-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926952" comment="php7-enchant-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926953" comment="php7-exif-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926954" comment="php7-fileinfo-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926955" comment="php7-ftp-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926956" comment="php7-gd-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926957" comment="php7-gettext-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926958" comment="php7-gmp-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926959" comment="php7-iconv-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926960" comment="php7-intl-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926961" comment="php7-json-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926962" comment="php7-ldap-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926963" comment="php7-mbstring-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926964" comment="php7-mysql-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926965" comment="php7-odbc-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926966" comment="php7-opcache-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926967" comment="php7-openssl-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926968" comment="php7-pcntl-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926969" comment="php7-pdo-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926970" comment="php7-pgsql-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926971" comment="php7-phar-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926972" comment="php7-posix-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926973" comment="php7-readline-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926974" comment="php7-shmop-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926975" comment="php7-snmp-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926976" comment="php7-soap-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926977" comment="php7-sockets-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926978" comment="php7-sodium-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926979" comment="php7-sqlite-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926980" comment="php7-sysvmsg-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926981" comment="php7-sysvsem-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926982" comment="php7-sysvshm-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926983" comment="php7-tidy-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926984" comment="php7-tokenizer-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926985" comment="php7-xmlreader-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926986" comment="php7-xmlrpc-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926987" comment="php7-xmlwriter-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926988" comment="php7-xsl-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926989" comment="php7-zip-7.4.32-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926990" comment="php7-zlib-7.4.32-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250699" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.0626-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.0626-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926991" comment="gvim-9.0.0626-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926992" comment="vim-9.0.0626-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926993" comment="vim-data-9.0.0626-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926994" comment="vim-data-common-9.0.0626-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926995" comment="vim-small-9.0.0626-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250700" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926996" comment="MozillaThunderbird-102.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926997" comment="MozillaThunderbird-translations-common-102.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009926998" comment="MozillaThunderbird-translations-other-102.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250701" version="1" class="patch">
	<metadata>
		<title>chromedriver-106.0.5249.91-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3304" ref_url="https://www.suse.com/security/cve/CVE-2022-3304/" source="CVE"/>
		<reference ref_id="CVE-2022-3305" ref_url="https://www.suse.com/security/cve/CVE-2022-3305/" source="CVE"/>
		<reference ref_id="CVE-2022-3306" ref_url="https://www.suse.com/security/cve/CVE-2022-3306/" source="CVE"/>
		<reference ref_id="CVE-2022-3307" ref_url="https://www.suse.com/security/cve/CVE-2022-3307/" source="CVE"/>
		<reference ref_id="CVE-2022-3308" ref_url="https://www.suse.com/security/cve/CVE-2022-3308/" source="CVE"/>
		<reference ref_id="CVE-2022-3309" ref_url="https://www.suse.com/security/cve/CVE-2022-3309/" source="CVE"/>
		<reference ref_id="CVE-2022-3310" ref_url="https://www.suse.com/security/cve/CVE-2022-3310/" source="CVE"/>
		<reference ref_id="CVE-2022-3311" ref_url="https://www.suse.com/security/cve/CVE-2022-3311/" source="CVE"/>
		<reference ref_id="CVE-2022-3312" ref_url="https://www.suse.com/security/cve/CVE-2022-3312/" source="CVE"/>
		<reference ref_id="CVE-2022-3313" ref_url="https://www.suse.com/security/cve/CVE-2022-3313/" source="CVE"/>
		<reference ref_id="CVE-2022-3314" ref_url="https://www.suse.com/security/cve/CVE-2022-3314/" source="CVE"/>
		<reference ref_id="CVE-2022-3315" ref_url="https://www.suse.com/security/cve/CVE-2022-3315/" source="CVE"/>
		<reference ref_id="CVE-2022-3316" ref_url="https://www.suse.com/security/cve/CVE-2022-3316/" source="CVE"/>
		<reference ref_id="CVE-2022-3317" ref_url="https://www.suse.com/security/cve/CVE-2022-3317/" source="CVE"/>
		<reference ref_id="CVE-2022-3318" ref_url="https://www.suse.com/security/cve/CVE-2022-3318/" source="CVE"/>
		<reference ref_id="CVE-2022-3370" ref_url="https://www.suse.com/security/cve/CVE-2022-3370/" source="CVE"/>
		<reference ref_id="CVE-2022-3373" ref_url="https://www.suse.com/security/cve/CVE-2022-3373/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-106.0.5249.91-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3304/">CVE-2022-3304 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3304">CVE-2022-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3305/">CVE-2022-3305 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3305">CVE-2022-3305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3306/">CVE-2022-3306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3306">CVE-2022-3306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3307/">CVE-2022-3307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3307">CVE-2022-3307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3308/">CVE-2022-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3308">CVE-2022-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3309/">CVE-2022-3309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3309">CVE-2022-3309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3310/">CVE-2022-3310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3310">CVE-2022-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3311/">CVE-2022-3311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3311">CVE-2022-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3312/">CVE-2022-3312 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3312">CVE-2022-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3313/">CVE-2022-3313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3313">CVE-2022-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3314/">CVE-2022-3314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3314">CVE-2022-3314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3315/">CVE-2022-3315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3315">CVE-2022-3315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3316/">CVE-2022-3316 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3316">CVE-2022-3316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3317/">CVE-2022-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3317">CVE-2022-3317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3318/">CVE-2022-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3318">CVE-2022-3318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3370/">CVE-2022-3370 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3370">CVE-2022-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3373/">CVE-2022-3373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3373">CVE-2022-3373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009926999" comment="chromedriver-106.0.5249.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927000" comment="chromium-106.0.5249.91-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250702" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13108" ref_url="https://www.suse.com/security/cve/CVE-2019-13108/" source="CVE"/>
		<reference ref_id="CVE-2020-19716" ref_url="https://www.suse.com/security/cve/CVE-2020-19716/" source="CVE"/>
		<reference ref_id="CVE-2021-29457" ref_url="https://www.suse.com/security/cve/CVE-2021-29457/" source="CVE"/>
		<reference ref_id="CVE-2021-29470" ref_url="https://www.suse.com/security/cve/CVE-2021-29470/" source="CVE"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<reference ref_id="CVE-2021-37620" ref_url="https://www.suse.com/security/cve/CVE-2021-37620/" source="CVE"/>
		<reference ref_id="CVE-2021-37621" ref_url="https://www.suse.com/security/cve/CVE-2021-37621/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13108/">CVE-2019-13108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13108">CVE-2019-13108 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19716/">CVE-2020-19716 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19716">CVE-2020-19716 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29457/">CVE-2021-29457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29457">CVE-2021-29457 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29470/">CVE-2021-29470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29470">CVE-2021-29470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32617">CVE-2021-32617 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37620/">CVE-2021-37620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37620">CVE-2021-37620 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37621/">CVE-2021-37621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37621">CVE-2021-37621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927001" comment="exiv2-0.27.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927002" comment="exiv2-lang-0.27.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927003" comment="libexiv2-27-0.27.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927004" comment="libexiv2-27-32bit-0.27.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927005" comment="libexiv2-devel-0.27.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927006" comment="libexiv2-xmp-static-0.27.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250703" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.67-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41556" ref_url="https://www.suse.com/security/cve/CVE-2022-41556/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.67-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41556/">CVE-2022-41556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41556">CVE-2022-41556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927007" comment="lighttpd-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927008" comment="lighttpd-mod_authn_gssapi-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927009" comment="lighttpd-mod_authn_ldap-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927010" comment="lighttpd-mod_authn_pam-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927011" comment="lighttpd-mod_authn_sasl-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927012" comment="lighttpd-mod_magnet-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927013" comment="lighttpd-mod_maxminddb-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927014" comment="lighttpd-mod_rrdtool-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927015" comment="lighttpd-mod_vhostdb_dbi-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927016" comment="lighttpd-mod_vhostdb_ldap-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927017" comment="lighttpd-mod_vhostdb_mysql-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927018" comment="lighttpd-mod_vhostdb_pgsql-1.4.67-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927019" comment="lighttpd-mod_webdav-1.4.67-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250704" version="1" class="patch">
	<metadata>
		<title>orthanc-1.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2119" ref_url="https://www.suse.com/security/cve/CVE-2022-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the orthanc-1.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2119/">CVE-2022-2119 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2119">CVE-2022-2119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927020" comment="orthanc-1.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927021" comment="orthanc-devel-1.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927022" comment="orthanc-doc-1.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927023" comment="orthanc-source-1.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250705" version="1" class="patch">
	<metadata>
		<title>php8-8.1.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927024" comment="php8-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927025" comment="php8-bcmath-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927026" comment="php8-bz2-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927027" comment="php8-calendar-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927028" comment="php8-cli-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927029" comment="php8-ctype-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927030" comment="php8-curl-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927031" comment="php8-dba-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927032" comment="php8-devel-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927033" comment="php8-dom-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927034" comment="php8-enchant-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927035" comment="php8-exif-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927036" comment="php8-ffi-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927037" comment="php8-fileinfo-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927038" comment="php8-ftp-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927039" comment="php8-gd-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927040" comment="php8-gettext-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927041" comment="php8-gmp-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927042" comment="php8-iconv-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927043" comment="php8-intl-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927044" comment="php8-ldap-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927045" comment="php8-mbstring-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927046" comment="php8-mysql-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927047" comment="php8-odbc-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927048" comment="php8-opcache-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927049" comment="php8-openssl-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927050" comment="php8-pcntl-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927051" comment="php8-pdo-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927052" comment="php8-pgsql-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927053" comment="php8-phar-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927054" comment="php8-posix-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927055" comment="php8-readline-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927056" comment="php8-shmop-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927057" comment="php8-snmp-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927058" comment="php8-soap-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927059" comment="php8-sockets-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927060" comment="php8-sodium-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927061" comment="php8-sqlite-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927062" comment="php8-sysvmsg-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927063" comment="php8-sysvsem-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927064" comment="php8-sysvshm-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927065" comment="php8-tidy-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927066" comment="php8-tokenizer-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927067" comment="php8-xmlreader-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927068" comment="php8-xmlwriter-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927069" comment="php8-xsl-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927070" comment="php8-zip-8.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927071" comment="php8-zlib-8.1.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250706" version="1" class="patch">
	<metadata>
		<title>python310-pyspnego-0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pyspnego-0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0886">CVE-2018-0886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927072" comment="python310-pyspnego-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927073" comment="python38-pyspnego-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927074" comment="python39-pyspnego-0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250707" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode-9.30-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33477" ref_url="https://www.suse.com/security/cve/CVE-2021-33477/" source="CVE"/>
		<description>
These are all security issues fixed in the rxvt-unicode-9.30-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33477/">CVE-2021-33477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33477">CVE-2021-33477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927075" comment="rxvt-unicode-9.30-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250708" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927076" comment="postgresql14-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927077" comment="postgresql14-contrib-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927078" comment="postgresql14-devel-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927079" comment="postgresql14-docs-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927080" comment="postgresql14-llvmjit-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927081" comment="postgresql14-llvmjit-devel-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927082" comment="postgresql14-plperl-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927083" comment="postgresql14-plpython-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927084" comment="postgresql14-pltcl-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927085" comment="postgresql14-server-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927086" comment="postgresql14-server-devel-14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927087" comment="postgresql14-test-14.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250709" version="1" class="patch">
	<metadata>
		<title>jettison-1.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40149" ref_url="https://www.suse.com/security/cve/CVE-2022-40149/" source="CVE"/>
		<reference ref_id="CVE-2022-40150" ref_url="https://www.suse.com/security/cve/CVE-2022-40150/" source="CVE"/>
		<description>
These are all security issues fixed in the jettison-1.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40149/">CVE-2022-40149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40149">CVE-2022-40149 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40150/">CVE-2022-40150 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40150">CVE-2022-40150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927088" comment="jettison-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927089" comment="jettison-javadoc-1.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250710" version="1" class="patch">
	<metadata>
		<title>apptainer-1.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39237" ref_url="https://www.suse.com/security/cve/CVE-2022-39237/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39237/">CVE-2022-39237 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39237">CVE-2022-39237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927090" comment="apptainer-1.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250711" version="1" class="patch">
	<metadata>
		<title>dhcp-4.4.2.P1-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.4.2.P1-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927091" comment="dhcp-4.4.2.P1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927092" comment="dhcp-client-4.4.2.P1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927093" comment="dhcp-devel-4.4.2.P1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927094" comment="dhcp-doc-4.4.2.P1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927095" comment="dhcp-relay-4.4.2.P1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927096" comment="dhcp-server-4.4.2.P1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250712" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927097" comment="go1.18-1.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927098" comment="go1.18-doc-1.18.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927099" comment="go1.18-race-1.18.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250713" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927100" comment="go1.19-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927101" comment="go1.19-doc-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927102" comment="go1.19-race-1.19.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250714" version="1" class="patch">
	<metadata>
		<title>qemu-7.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2962" ref_url="https://www.suse.com/security/cve/CVE-2022-2962/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-7.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2962/">CVE-2022-2962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2962">CVE-2022-2962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927103" comment="qemu-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927104" comment="qemu-SLOF-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927105" comment="qemu-accel-qtest-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927106" comment="qemu-accel-tcg-x86-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927107" comment="qemu-arm-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927108" comment="qemu-audio-alsa-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927109" comment="qemu-audio-dbus-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927110" comment="qemu-audio-jack-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927111" comment="qemu-audio-oss-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927112" comment="qemu-audio-pa-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927113" comment="qemu-audio-spice-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927114" comment="qemu-block-curl-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927115" comment="qemu-block-dmg-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927116" comment="qemu-block-gluster-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927117" comment="qemu-block-iscsi-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927118" comment="qemu-block-nfs-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927119" comment="qemu-block-rbd-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927120" comment="qemu-block-ssh-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927121" comment="qemu-chardev-baum-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927122" comment="qemu-chardev-spice-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927123" comment="qemu-extra-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927124" comment="qemu-guest-agent-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927125" comment="qemu-hw-display-qxl-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927126" comment="qemu-hw-display-virtio-gpu-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927127" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927128" comment="qemu-hw-display-virtio-vga-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927129" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927130" comment="qemu-hw-usb-host-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927131" comment="qemu-hw-usb-redirect-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927132" comment="qemu-hw-usb-smartcard-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927133" comment="qemu-ipxe-1.0.0+-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927134" comment="qemu-ivshmem-tools-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927135" comment="qemu-ksm-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927136" comment="qemu-kvm-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927137" comment="qemu-lang-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927138" comment="qemu-microvm-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927139" comment="qemu-ppc-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927140" comment="qemu-s390x-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927141" comment="qemu-seabios-1.16.0_0_gd239552-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927142" comment="qemu-sgabios-8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927143" comment="qemu-skiboot-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927144" comment="qemu-tools-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927145" comment="qemu-ui-curses-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927146" comment="qemu-ui-dbus-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927147" comment="qemu-ui-gtk-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927148" comment="qemu-ui-opengl-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927149" comment="qemu-ui-spice-app-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927150" comment="qemu-ui-spice-core-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927151" comment="qemu-vgabios-1.16.0_0_gd239552-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927152" comment="qemu-vhost-user-gpu-7.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927153" comment="qemu-x86-7.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250715" version="1" class="patch">
	<metadata>
		<title>bluez-5.65-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0204" ref_url="https://www.suse.com/security/cve/CVE-2022-0204/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.65-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-0204/">CVE-2022-0204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0204">CVE-2022-0204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927154" comment="bluez-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927155" comment="bluez-auto-enable-devices-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927156" comment="bluez-cups-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927157" comment="bluez-deprecated-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927158" comment="bluez-devel-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927159" comment="bluez-devel-32bit-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927160" comment="bluez-obexd-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927161" comment="bluez-test-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927162" comment="bluez-zsh-completion-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927163" comment="libbluetooth3-5.65-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927164" comment="libbluetooth3-32bit-5.65-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250716" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0796" ref_url="https://www.suse.com/security/cve/CVE-2022-0796/" source="CVE"/>
		<reference ref_id="CVE-2022-1855" ref_url="https://www.suse.com/security/cve/CVE-2022-1855/" source="CVE"/>
		<reference ref_id="CVE-2022-1857" ref_url="https://www.suse.com/security/cve/CVE-2022-1857/" source="CVE"/>
		<reference ref_id="CVE-2022-2008" ref_url="https://www.suse.com/security/cve/CVE-2022-2008/" source="CVE"/>
		<reference ref_id="CVE-2022-2010" ref_url="https://www.suse.com/security/cve/CVE-2022-2010/" source="CVE"/>
		<reference ref_id="CVE-2022-2158" ref_url="https://www.suse.com/security/cve/CVE-2022-2158/" source="CVE"/>
		<reference ref_id="CVE-2022-2160" ref_url="https://www.suse.com/security/cve/CVE-2022-2160/" source="CVE"/>
		<reference ref_id="CVE-2022-2162" ref_url="https://www.suse.com/security/cve/CVE-2022-2162/" source="CVE"/>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="CVE-2022-2295" ref_url="https://www.suse.com/security/cve/CVE-2022-2295/" source="CVE"/>
		<reference ref_id="CVE-2022-2477" ref_url="https://www.suse.com/security/cve/CVE-2022-2477/" source="CVE"/>
		<reference ref_id="CVE-2022-2610" ref_url="https://www.suse.com/security/cve/CVE-2022-2610/" source="CVE"/>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0796/">CVE-2022-0796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0796">CVE-2022-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1855/">CVE-2022-1855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1855">CVE-2022-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1857/">CVE-2022-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1857">CVE-2022-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2008/">CVE-2022-2008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2008">CVE-2022-2008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2010/">CVE-2022-2010 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2010">CVE-2022-2010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2158/">CVE-2022-2158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2158">CVE-2022-2158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2160/">CVE-2022-2160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2160">CVE-2022-2160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2162/">CVE-2022-2162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2162">CVE-2022-2162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2294">CVE-2022-2294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2295/">CVE-2022-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2295">CVE-2022-2295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2477/">CVE-2022-2477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2477">CVE-2022-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2610/">CVE-2022-2610 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2610">CVE-2022-2610 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927165" comment="libQt5Pdf5-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927166" comment="libQt5PdfWidgets5-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927167" comment="libqt5-qtpdf-devel-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927168" comment="libqt5-qtpdf-examples-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927169" comment="libqt5-qtpdf-imports-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927170" comment="libqt5-qtpdf-private-headers-devel-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927171" comment="libqt5-qtwebengine-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927172" comment="libqt5-qtwebengine-devel-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927173" comment="libqt5-qtwebengine-examples-5.15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927174" comment="libqt5-qtwebengine-private-headers-devel-5.15.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250717" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41323" ref_url="https://www.suse.com/security/cve/CVE-2022-41323/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41323/">CVE-2022-41323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41323">CVE-2022-41323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927175" comment="python310-Django-4.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927176" comment="python38-Django-4.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927177" comment="python39-Django-4.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250718" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-2.2-2.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-2.2-2.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927178" comment="ruby3.1-rubygem-rack-2.2-2.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250719" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-105.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40961" ref_url="https://www.suse.com/security/cve/CVE-2022-40961/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-105.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40961/">CVE-2022-40961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40961">CVE-2022-40961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927179" comment="MozillaFirefox-105.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927180" comment="MozillaFirefox-branding-upstream-105.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927181" comment="MozillaFirefox-devel-105.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927182" comment="MozillaFirefox-translations-common-105.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927183" comment="MozillaFirefox-translations-other-105.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250720" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126/" source="CVE"/>
		<reference ref_id="CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239/" source="CVE"/>
		<reference ref_id="CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229/" source="CVE"/>
		<reference ref_id="CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<reference ref_id="CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000126">CVE-2017-1000126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9239">CVE-2017-9239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17229">CVE-2018-17229 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17230">CVE-2018-17230 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17282">CVE-2018-17282 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19108">CVE-2018-19108 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19607">CVE-2018-19607 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9305">CVE-2018-9305 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13114">CVE-2019-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927184" comment="exiv2-0.27.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927185" comment="exiv2-lang-0.27.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927186" comment="libexiv2-27-0.27.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927187" comment="libexiv2-27-32bit-0.27.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927188" comment="libexiv2-devel-0.27.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927189" comment="libexiv2-xmp-static-0.27.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250721" version="1" class="patch">
	<metadata>
		<title>podman-4.2.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.2.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1227">CVE-2022-1227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927190" comment="podman-4.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927191" comment="podman-cni-config-4.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927192" comment="podman-docker-4.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927193" comment="podman-remote-4.2.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250722" version="1" class="patch">
	<metadata>
		<title>python310-joblib-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21797" ref_url="https://www.suse.com/security/cve/CVE-2022-21797/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-joblib-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21797/">CVE-2022-21797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21797">CVE-2022-21797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927194" comment="python310-joblib-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927195" comment="python38-joblib-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927196" comment="python39-joblib-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250723" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-batik-1.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11987" ref_url="https://www.suse.com/security/cve/CVE-2020-11987/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-batik-1.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11987/">CVE-2020-11987 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11987">CVE-2020-11987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927197" comment="xmlgraphics-batik-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927198" comment="xmlgraphics-batik-css-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927199" comment="xmlgraphics-batik-demo-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927200" comment="xmlgraphics-batik-javadoc-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927201" comment="xmlgraphics-batik-rasterizer-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927202" comment="xmlgraphics-batik-slideshow-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927203" comment="xmlgraphics-batik-squiggle-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927204" comment="xmlgraphics-batik-svgpp-1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927205" comment="xmlgraphics-batik-ttf2svg-1.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250724" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-commons-2.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11988" ref_url="https://www.suse.com/security/cve/CVE-2020-11988/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-commons-2.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11988/">CVE-2020-11988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11988">CVE-2020-11988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927206" comment="xmlgraphics-commons-2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927207" comment="xmlgraphics-commons-javadoc-2.6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250725" version="1" class="patch">
	<metadata>
		<title>chromedriver-106.0.5249.119-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3447" ref_url="https://www.suse.com/security/cve/CVE-2022-3447/" source="CVE"/>
		<reference ref_id="CVE-2022-3448" ref_url="https://www.suse.com/security/cve/CVE-2022-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-3449" ref_url="https://www.suse.com/security/cve/CVE-2022-3449/" source="CVE"/>
		<reference ref_id="CVE-2022-3450" ref_url="https://www.suse.com/security/cve/CVE-2022-3450/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-106.0.5249.119-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3445">CVE-2022-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3446">CVE-2022-3446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3447/">CVE-2022-3447 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3447">CVE-2022-3447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3448/">CVE-2022-3448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3448">CVE-2022-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3449/">CVE-2022-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3449">CVE-2022-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3450/">CVE-2022-3450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3450">CVE-2022-3450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927208" comment="chromedriver-106.0.5249.119-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927209" comment="chromium-106.0.5249.119-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250726" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<reference ref_id="CVE-2021-37622" ref_url="https://www.suse.com/security/cve/CVE-2021-37622/" source="CVE"/>
		<reference ref_id="CVE-2021-37623" ref_url="https://www.suse.com/security/cve/CVE-2021-37623/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34334">CVE-2021-34334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37622/">CVE-2021-37622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37622">CVE-2021-37622 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37623/">CVE-2021-37623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37623">CVE-2021-37623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927210" comment="exiv2-0.27.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927211" comment="exiv2-lang-0.27.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927212" comment="libexiv2-27-0.27.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927213" comment="libexiv2-27-32bit-0.27.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927214" comment="libexiv2-devel-0.27.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927215" comment="libexiv2-xmp-static-0.27.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250727" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.41-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.41-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927216" comment="libspice-client-glib-2_0-8-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927217" comment="libspice-client-glib-helper-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927218" comment="libspice-client-gtk-3_0-5-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927219" comment="spice-gtk-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927220" comment="spice-gtk-devel-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927221" comment="spice-gtk-lang-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927222" comment="typelib-1_0-SpiceClientGlib-2_0-0.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927223" comment="typelib-1_0-SpiceClientGtk-3_0-0.41-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250728" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927225" comment="kernel-macros-6.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927226" comment="kernel-source-6.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927227" comment="kernel-source-vanilla-6.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250729" version="1" class="patch">
	<metadata>
		<title>python310-httptools-0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-httptools-0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927228" comment="python310-httptools-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927229" comment="python38-httptools-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927230" comment="python39-httptools-0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250730" version="1" class="patch">
	<metadata>
		<title>apache-commons-text-1.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42889" ref_url="https://www.suse.com/security/cve/CVE-2022-42889/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-text-1.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42889/">CVE-2022-42889 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42889">CVE-2022-42889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927231" comment="apache-commons-text-1.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927232" comment="apache-commons-text-javadoc-1.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250731" version="1" class="patch">
	<metadata>
		<title>dex-oidc-2.35.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27665" ref_url="https://www.suse.com/security/cve/CVE-2022-27665/" source="CVE"/>
		<description>
These are all security issues fixed in the dex-oidc-2.35.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27665/">CVE-2022-27665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-27665">CVE-2022-27665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927233" comment="dex-oidc-2.35.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250732" version="1" class="patch">
	<metadata>
		<title>ardour-6.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<description>
These are all security issues fixed in the ardour-6.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927234" comment="ardour-6.9.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250733" version="1" class="patch">
	<metadata>
		<title>jackson-databind-2.13.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42003" ref_url="https://www.suse.com/security/cve/CVE-2022-42003/" source="CVE"/>
		<reference ref_id="CVE-2022-42004" ref_url="https://www.suse.com/security/cve/CVE-2022-42004/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-databind-2.13.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42003/">CVE-2022-42003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42004/">CVE-2022-42004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927235" comment="jackson-databind-2.13.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927236" comment="jackson-databind-javadoc-2.13.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250734" version="1" class="patch">
	<metadata>
		<title>jsoup-1.15.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36033" ref_url="https://www.suse.com/security/cve/CVE-2022-36033/" source="CVE"/>
		<description>
These are all security issues fixed in the jsoup-1.15.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36033/">CVE-2022-36033 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36033">CVE-2022-36033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927237" comment="jsoup-1.15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927238" comment="jsoup-javadoc-1.15.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250735" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-4.9.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-4.9.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927239" comment="python-lxml-doc-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927240" comment="python310-lxml-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927241" comment="python310-lxml-devel-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927242" comment="python38-lxml-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927243" comment="python38-lxml-devel-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927244" comment="python39-lxml-4.9.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927245" comment="python39-lxml-devel-4.9.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250736" version="1" class="patch">
	<metadata>
		<title>busybox-1.35.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.35.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9645">CVE-2014-9645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927246" comment="busybox-1.35.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927247" comment="busybox-static-1.35.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927248" comment="busybox-testsuite-1.35.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927249" comment="busybox-warewulf3-1.35.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250737" version="1" class="patch">
	<metadata>
		<title>erlang-25.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-25.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37026">CVE-2022-37026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927250" comment="erlang-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927251" comment="erlang-debugger-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927252" comment="erlang-debugger-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927253" comment="erlang-dialyzer-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927254" comment="erlang-dialyzer-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927255" comment="erlang-diameter-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927256" comment="erlang-diameter-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927257" comment="erlang-doc-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927258" comment="erlang-epmd-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927259" comment="erlang-et-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927260" comment="erlang-et-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927261" comment="erlang-jinterface-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927262" comment="erlang-jinterface-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927263" comment="erlang-observer-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927264" comment="erlang-observer-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927265" comment="erlang-reltool-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927266" comment="erlang-reltool-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927267" comment="erlang-src-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927268" comment="erlang-wx-25.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927269" comment="erlang-wx-src-25.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250738" version="1" class="patch">
	<metadata>
		<title>git-bug-0.7.2+git.1665512451.0eef939-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28955" ref_url="https://www.suse.com/security/cve/CVE-2021-28955/" source="CVE"/>
		<description>
These are all security issues fixed in the git-bug-0.7.2+git.1665512451.0eef939-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28955/">CVE-2021-28955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28955">CVE-2021-28955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927270" comment="git-bug-0.7.2+git.1665512451.0eef939-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927271" comment="git-bug-bash-completion-0.7.2+git.1665512451.0eef939-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927272" comment="git-bug-fish-completion-0.7.2+git.1665512451.0eef939-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927273" comment="git-bug-zsh-completion-0.7.2+git.1665512451.0eef939-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250739" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927274" comment="libksba-devel-1.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927275" comment="libksba8-1.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250740" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.10.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.10.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927276" comment="libxml2-2-2.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927277" comment="libxml2-2-32bit-2.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927278" comment="libxml2-devel-2.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927279" comment="libxml2-devel-32bit-2.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927280" comment="libxml2-doc-2.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927281" comment="libxml2-tools-2.10.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250741" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.4.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.4.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927282" comment="libtiff-devel-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927283" comment="libtiff-devel-32bit-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927284" comment="libtiff5-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927285" comment="libtiff5-32bit-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927286" comment="tiff-4.4.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250742" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927287" comment="docker-compose-2.12.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250743" version="1" class="patch">
	<metadata>
		<title>exim-4.96-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3559" ref_url="https://www.suse.com/security/cve/CVE-2022-3559/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.96-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3559/">CVE-2022-3559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3559">CVE-2022-3559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927288" comment="exim-4.96-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927289" comment="eximon-4.96-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927290" comment="eximstats-html-4.96-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250744" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.37-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.37-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927291" comment="libexslt0-1.1.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927292" comment="libxslt-devel-1.1.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927293" comment="libxslt-devel-32bit-1.1.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927294" comment="libxslt-tools-1.1.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927295" comment="libxslt1-1.1.37-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927296" comment="libxslt1-32bit-1.1.37-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250745" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3554">CVE-2022-3554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927297" comment="libX11-6-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927298" comment="libX11-6-32bit-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927299" comment="libX11-data-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927300" comment="libX11-devel-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927301" comment="libX11-devel-32bit-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927302" comment="libX11-xcb1-1.8.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927303" comment="libX11-xcb1-32bit-1.8.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250746" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927304" comment="libmozjs-102-0-102.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927305" comment="mozjs102-102.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927306" comment="mozjs102-devel-102.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250747" version="1" class="patch">
	<metadata>
		<title>starboard-0.15.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<description>
These are all security issues fixed in the starboard-0.15.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927307" comment="starboard-0.15.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250748" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927308" comment="xorg-x11-server-21.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927309" comment="xorg-x11-server-Xvfb-21.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927310" comment="xorg-x11-server-extra-21.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927311" comment="xorg-x11-server-sdk-21.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927312" comment="xorg-x11-server-source-21.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927313" comment="xorg-x11-server-wrapper-21.1.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250749" version="1" class="patch">
	<metadata>
		<title>xwayland-22.1.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-22.1.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927314" comment="xwayland-22.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927315" comment="xwayland-devel-22.1.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250750" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-106.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42930" ref_url="https://www.suse.com/security/cve/CVE-2022-42930/" source="CVE"/>
		<reference ref_id="CVE-2022-42931" ref_url="https://www.suse.com/security/cve/CVE-2022-42931/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-106.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42930/">CVE-2022-42930 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42930">CVE-2022-42930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42931/">CVE-2022-42931 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42931">CVE-2022-42931 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927316" comment="MozillaFirefox-106.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927317" comment="MozillaFirefox-branding-upstream-106.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927318" comment="MozillaFirefox-devel-106.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927319" comment="MozillaFirefox-translations-common-106.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927320" comment="MozillaFirefox-translations-other-106.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250751" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927321" comment="docker-compose-2.12.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250752" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927322" comment="java-11-openjdk-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927323" comment="java-11-openjdk-accessibility-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927324" comment="java-11-openjdk-demo-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927325" comment="java-11-openjdk-devel-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927326" comment="java-11-openjdk-headless-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927327" comment="java-11-openjdk-javadoc-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927328" comment="java-11-openjdk-jmods-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927329" comment="java-11-openjdk-src-11.0.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250753" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927330" comment="java-17-openjdk-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927331" comment="java-17-openjdk-accessibility-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927332" comment="java-17-openjdk-demo-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927333" comment="java-17-openjdk-devel-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927334" comment="java-17-openjdk-headless-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927335" comment="java-17-openjdk-javadoc-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927336" comment="java-17-openjdk-jmods-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927337" comment="java-17-openjdk-src-17.0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250754" version="1" class="patch">
	<metadata>
		<title>nginx-1.23.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41741" ref_url="https://www.suse.com/security/cve/CVE-2022-41741/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.23.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41741/">CVE-2022-41741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41741">CVE-2022-41741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927338" comment="nginx-1.23.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927339" comment="nginx-source-1.23.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250755" version="1" class="patch">
	<metadata>
		<title>python38-3.8.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37460" ref_url="https://www.suse.com/security/cve/CVE-2022-37460/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-37460/">CVE-2022-37460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-37460">CVE-2022-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927340" comment="python38-3.8.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927341" comment="python38-32bit-3.8.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927342" comment="python38-curses-3.8.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927343" comment="python38-dbm-3.8.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927344" comment="python38-idle-3.8.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927345" comment="python38-tk-3.8.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250756" version="1" class="patch">
	<metadata>
		<title>ctdb-4.17.1+git.270.17afe7cb6b-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.17.1+git.270.17afe7cb6b-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20251">CVE-2021-20251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927346" comment="ctdb-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927347" comment="ctdb-pcp-pmda-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927348" comment="libsamba-policy-devel-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927349" comment="libsamba-policy-python3-devel-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927350" comment="libsamba-policy0-python3-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927351" comment="libsamba-policy0-python3-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927352" comment="samba-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927353" comment="samba-ad-dc-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927354" comment="samba-ad-dc-libs-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927355" comment="samba-ad-dc-libs-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927356" comment="samba-ceph-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927357" comment="samba-client-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927358" comment="samba-client-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927359" comment="samba-client-libs-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927360" comment="samba-client-libs-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927361" comment="samba-devel-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927362" comment="samba-devel-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927363" comment="samba-doc-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927364" comment="samba-dsdb-modules-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927365" comment="samba-gpupdate-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927366" comment="samba-ldb-ldap-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927367" comment="samba-libs-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927368" comment="samba-libs-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927369" comment="samba-libs-python3-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927370" comment="samba-libs-python3-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927371" comment="samba-python3-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927372" comment="samba-test-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927373" comment="samba-tool-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927374" comment="samba-winbind-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927375" comment="samba-winbind-libs-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927376" comment="samba-winbind-libs-32bit-4.17.1+git.270.17afe7cb6b-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250757" version="1" class="patch">
	<metadata>
		<title>telnet-1.2-176.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<description>
These are all security issues fixed in the telnet-1.2-176.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927377" comment="telnet-1.2-176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927378" comment="telnet-server-1.2-176.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250758" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927380" comment="kernel-macros-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927381" comment="kernel-source-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927382" comment="kernel-source-vanilla-6.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250759" version="1" class="patch">
	<metadata>
		<title>dfu-tool-1.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3287" ref_url="https://www.suse.com/security/cve/CVE-2022-3287/" source="CVE"/>
		<description>
These are all security issues fixed in the dfu-tool-1.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3287/">CVE-2022-3287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3287">CVE-2022-3287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927383" comment="dfu-tool-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927384" comment="fwupd-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927385" comment="fwupd-bash-completion-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927386" comment="fwupd-devel-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927387" comment="fwupd-doc-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927388" comment="fwupd-fish-completion-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927389" comment="fwupd-lang-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927390" comment="libfwupd2-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927391" comment="typelib-1_0-Fwupd-2_0-1.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250760" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927392" comment="MozillaThunderbird-102.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927393" comment="MozillaThunderbird-translations-common-102.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927394" comment="MozillaThunderbird-translations-other-102.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250761" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29463" ref_url="https://www.suse.com/security/cve/CVE-2021-29463/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29463/">CVE-2021-29463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29463">CVE-2021-29463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927395" comment="exiv2-0.27.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927396" comment="exiv2-lang-0.27.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927397" comment="libexiv2-27-0.27.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927398" comment="libexiv2-27-32bit-0.27.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927399" comment="libexiv2-devel-0.27.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927400" comment="libexiv2-xmp-static-0.27.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250762" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927401" comment="java-13-openjdk-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927402" comment="java-13-openjdk-accessibility-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927403" comment="java-13-openjdk-demo-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927404" comment="java-13-openjdk-devel-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927405" comment="java-13-openjdk-headless-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927406" comment="java-13-openjdk-javadoc-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927407" comment="java-13-openjdk-jmods-13.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927408" comment="java-13-openjdk-src-13.0.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250763" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927409" comment="java-15-openjdk-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927410" comment="java-15-openjdk-accessibility-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927411" comment="java-15-openjdk-demo-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927412" comment="java-15-openjdk-devel-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927413" comment="java-15-openjdk-headless-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927414" comment="java-15-openjdk-javadoc-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927415" comment="java-15-openjdk-jmods-15.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927416" comment="java-15-openjdk-src-15.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250764" version="1" class="patch">
	<metadata>
		<title>kpartx-0.9.2+57+suse.cf3c1e9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<description>
These are all security issues fixed in the kpartx-0.9.2+57+suse.cf3c1e9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927417" comment="kpartx-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927418" comment="libdmmp-devel-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927419" comment="libdmmp0_2_0-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927420" comment="libmpath0-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927421" comment="multipath-tools-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927422" comment="multipath-tools-devel-0.9.2+57+suse.cf3c1e9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250765" version="1" class="patch">
	<metadata>
		<title>python310-ecdsa-0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ecdsa-0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927423" comment="python310-ecdsa-0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927424" comment="python38-ecdsa-0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927425" comment="python39-ecdsa-0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250766" version="1" class="patch">
	<metadata>
		<title>libtpms-devel-0.9.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3623" ref_url="https://www.suse.com/security/cve/CVE-2021-3623/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms-devel-0.9.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3623/">CVE-2021-3623 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3623">CVE-2021-3623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927426" comment="libtpms-devel-0.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927427" comment="libtpms0-0.9.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250767" version="1" class="patch">
	<metadata>
		<title>bluez-5.65-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-3588" ref_url="https://www.suse.com/security/cve/CVE-2021-3588/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.65-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3588/">CVE-2021-3588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3588">CVE-2021-3588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927428" comment="bluez-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927429" comment="bluez-auto-enable-devices-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927430" comment="bluez-cups-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927431" comment="bluez-deprecated-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927432" comment="bluez-devel-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927433" comment="bluez-devel-32bit-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927434" comment="bluez-obexd-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927435" comment="bluez-test-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927436" comment="bluez-zsh-completion-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927437" comment="libbluetooth3-5.65-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927438" comment="libbluetooth3-32bit-5.65-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250768" version="1" class="patch">
	<metadata>
		<title>curl-7.86.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="CVE-2022-35260" ref_url="https://www.suse.com/security/cve/CVE-2022-35260/" source="CVE"/>
		<reference ref_id="CVE-2022-42915" ref_url="https://www.suse.com/security/cve/CVE-2022-42915/" source="CVE"/>
		<reference ref_id="CVE-2022-42916" ref_url="https://www.suse.com/security/cve/CVE-2022-42916/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.86.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35260/">CVE-2022-35260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35260">CVE-2022-35260 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42915/">CVE-2022-42915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42915">CVE-2022-42915 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42916/">CVE-2022-42916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42916">CVE-2022-42916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927439" comment="curl-7.86.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927440" comment="libcurl-devel-7.86.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927441" comment="libcurl-devel-32bit-7.86.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927442" comment="libcurl4-7.86.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927443" comment="libcurl4-32bit-7.86.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250769" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927444" comment="dbus-1-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927445" comment="dbus-1-common-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927446" comment="dbus-1-daemon-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927447" comment="dbus-1-devel-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927448" comment="dbus-1-devel-32bit-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927449" comment="dbus-1-tools-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927450" comment="libdbus-1-3-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927451" comment="libdbus-1-3-32bit-1.14.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250770" version="1" class="patch">
	<metadata>
		<title>expat-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927452" comment="expat-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927453" comment="libexpat-devel-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927454" comment="libexpat-devel-32bit-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927455" comment="libexpat1-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927456" comment="libexpat1-32bit-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250771" version="1" class="patch">
	<metadata>
		<title>hsqldb-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41853" ref_url="https://www.suse.com/security/cve/CVE-2022-41853/" source="CVE"/>
		<description>
These are all security issues fixed in the hsqldb-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41853/">CVE-2022-41853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41853">CVE-2022-41853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927457" comment="hsqldb-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927458" comment="hsqldb-demo-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927459" comment="hsqldb-javadoc-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927460" comment="hsqldb-manual-2.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250772" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.12.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-23109" ref_url="https://www.suse.com/security/cve/CVE-2020-23109/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.12.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-23109/">CVE-2020-23109 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23109">CVE-2020-23109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927461" comment="gdk-pixbuf-loader-libheif-1.12.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927462" comment="libheif-devel-1.12.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927463" comment="libheif1-1.12.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927464" comment="libheif1-32bit-1.12.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250773" version="1" class="patch">
	<metadata>
		<title>libreoffice-7.4.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26305" ref_url="https://www.suse.com/security/cve/CVE-2022-26305/" source="CVE"/>
		<reference ref_id="CVE-2022-26307" ref_url="https://www.suse.com/security/cve/CVE-2022-26307/" source="CVE"/>
		<reference ref_id="CVE-2022-3140" ref_url="https://www.suse.com/security/cve/CVE-2022-3140/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-7.4.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26305/">CVE-2022-26305 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26305">CVE-2022-26305 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26307/">CVE-2022-26307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26307">CVE-2022-26307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3140/">CVE-2022-3140 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3140">CVE-2022-3140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927465" comment="libreoffice-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927466" comment="libreoffice-base-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927467" comment="libreoffice-base-drivers-postgresql-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927468" comment="libreoffice-branding-upstream-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927469" comment="libreoffice-calc-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927470" comment="libreoffice-calc-extensions-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927471" comment="libreoffice-draw-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927472" comment="libreoffice-filters-optional-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927473" comment="libreoffice-gdb-pretty-printers-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927474" comment="libreoffice-glade-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927475" comment="libreoffice-gnome-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927476" comment="libreoffice-gtk3-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927477" comment="libreoffice-icon-themes-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927478" comment="libreoffice-impress-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927479" comment="libreoffice-l10n-af-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927480" comment="libreoffice-l10n-am-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927481" comment="libreoffice-l10n-ar-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927482" comment="libreoffice-l10n-as-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927483" comment="libreoffice-l10n-ast-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927484" comment="libreoffice-l10n-be-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927485" comment="libreoffice-l10n-bg-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927486" comment="libreoffice-l10n-bn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927487" comment="libreoffice-l10n-bn_IN-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927488" comment="libreoffice-l10n-bo-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927489" comment="libreoffice-l10n-br-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927490" comment="libreoffice-l10n-brx-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927491" comment="libreoffice-l10n-bs-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927492" comment="libreoffice-l10n-ca-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927493" comment="libreoffice-l10n-ca_valencia-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927494" comment="libreoffice-l10n-ckb-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927495" comment="libreoffice-l10n-cs-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927496" comment="libreoffice-l10n-cy-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927497" comment="libreoffice-l10n-da-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927498" comment="libreoffice-l10n-de-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927499" comment="libreoffice-l10n-dgo-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927500" comment="libreoffice-l10n-dsb-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927501" comment="libreoffice-l10n-dz-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927502" comment="libreoffice-l10n-el-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927503" comment="libreoffice-l10n-en-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927504" comment="libreoffice-l10n-en_GB-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927505" comment="libreoffice-l10n-en_ZA-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927506" comment="libreoffice-l10n-eo-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927507" comment="libreoffice-l10n-es-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927508" comment="libreoffice-l10n-et-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927509" comment="libreoffice-l10n-eu-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927510" comment="libreoffice-l10n-fa-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927511" comment="libreoffice-l10n-fi-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927512" comment="libreoffice-l10n-fr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927513" comment="libreoffice-l10n-fur-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927514" comment="libreoffice-l10n-fy-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927515" comment="libreoffice-l10n-ga-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927516" comment="libreoffice-l10n-gd-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927517" comment="libreoffice-l10n-gl-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927518" comment="libreoffice-l10n-gu-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927519" comment="libreoffice-l10n-gug-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927520" comment="libreoffice-l10n-he-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927521" comment="libreoffice-l10n-hi-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927522" comment="libreoffice-l10n-hr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927523" comment="libreoffice-l10n-hsb-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927524" comment="libreoffice-l10n-hu-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927525" comment="libreoffice-l10n-id-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927526" comment="libreoffice-l10n-is-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927527" comment="libreoffice-l10n-it-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927528" comment="libreoffice-l10n-ja-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927529" comment="libreoffice-l10n-ka-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927530" comment="libreoffice-l10n-kab-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927531" comment="libreoffice-l10n-kk-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927532" comment="libreoffice-l10n-km-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927533" comment="libreoffice-l10n-kmr_Latn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927534" comment="libreoffice-l10n-kn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927535" comment="libreoffice-l10n-ko-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927536" comment="libreoffice-l10n-kok-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927537" comment="libreoffice-l10n-ks-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927538" comment="libreoffice-l10n-lb-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927539" comment="libreoffice-l10n-lo-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927540" comment="libreoffice-l10n-lt-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927541" comment="libreoffice-l10n-lv-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927542" comment="libreoffice-l10n-mai-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927543" comment="libreoffice-l10n-mk-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927544" comment="libreoffice-l10n-ml-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927545" comment="libreoffice-l10n-mn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927546" comment="libreoffice-l10n-mni-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927547" comment="libreoffice-l10n-mr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927548" comment="libreoffice-l10n-my-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927549" comment="libreoffice-l10n-nb-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927550" comment="libreoffice-l10n-ne-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927551" comment="libreoffice-l10n-nl-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927552" comment="libreoffice-l10n-nn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927553" comment="libreoffice-l10n-nr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927554" comment="libreoffice-l10n-nso-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927555" comment="libreoffice-l10n-oc-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927556" comment="libreoffice-l10n-om-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927557" comment="libreoffice-l10n-or-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927558" comment="libreoffice-l10n-pa-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927559" comment="libreoffice-l10n-pl-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927560" comment="libreoffice-l10n-pt_BR-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927561" comment="libreoffice-l10n-pt_PT-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927562" comment="libreoffice-l10n-ro-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927563" comment="libreoffice-l10n-ru-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927564" comment="libreoffice-l10n-rw-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927565" comment="libreoffice-l10n-sa_IN-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927566" comment="libreoffice-l10n-sat-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927567" comment="libreoffice-l10n-sd-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927568" comment="libreoffice-l10n-si-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927569" comment="libreoffice-l10n-sid-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927570" comment="libreoffice-l10n-sk-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927571" comment="libreoffice-l10n-sl-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927572" comment="libreoffice-l10n-sq-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927573" comment="libreoffice-l10n-sr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927574" comment="libreoffice-l10n-ss-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927575" comment="libreoffice-l10n-st-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927576" comment="libreoffice-l10n-sv-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927577" comment="libreoffice-l10n-sw_TZ-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927578" comment="libreoffice-l10n-szl-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927579" comment="libreoffice-l10n-ta-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927580" comment="libreoffice-l10n-te-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927581" comment="libreoffice-l10n-tg-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927582" comment="libreoffice-l10n-th-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927583" comment="libreoffice-l10n-tn-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927584" comment="libreoffice-l10n-tr-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927585" comment="libreoffice-l10n-ts-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927586" comment="libreoffice-l10n-tt-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927587" comment="libreoffice-l10n-ug-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927588" comment="libreoffice-l10n-uk-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927589" comment="libreoffice-l10n-uz-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927590" comment="libreoffice-l10n-ve-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927591" comment="libreoffice-l10n-vec-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927592" comment="libreoffice-l10n-vi-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927593" comment="libreoffice-l10n-xh-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927594" comment="libreoffice-l10n-zh_CN-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927595" comment="libreoffice-l10n-zh_TW-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927596" comment="libreoffice-l10n-zu-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927597" comment="libreoffice-librelogo-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927598" comment="libreoffice-mailmerge-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927599" comment="libreoffice-math-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927600" comment="libreoffice-officebean-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927601" comment="libreoffice-pyuno-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927602" comment="libreoffice-qt5-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927603" comment="libreoffice-sdk-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927604" comment="libreoffice-sdk-doc-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927605" comment="libreoffice-writer-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927606" comment="libreoffice-writer-extensions-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927607" comment="libreofficekit-7.4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927608" comment="libreofficekit-devel-7.4.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250774" version="1" class="patch">
	<metadata>
		<title>python311-3.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927609" comment="python311-3.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927610" comment="python311-32bit-3.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927611" comment="python311-curses-3.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927612" comment="python311-dbm-3.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927613" comment="python311-idle-3.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927614" comment="python311-tk-3.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250775" version="1" class="patch">
	<metadata>
		<title>ctdb-4.17.2+git.273.a55a83528b9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-3592" ref_url="https://www.suse.com/security/cve/CVE-2022-3592/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.17.2+git.273.a55a83528b9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3437">CVE-2022-3437 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3592/">CVE-2022-3592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3592">CVE-2022-3592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927615" comment="ctdb-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927616" comment="ctdb-pcp-pmda-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927617" comment="libsamba-policy-devel-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927618" comment="libsamba-policy-python3-devel-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927619" comment="libsamba-policy0-python3-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927620" comment="libsamba-policy0-python3-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927621" comment="samba-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927622" comment="samba-ad-dc-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927623" comment="samba-ad-dc-libs-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927624" comment="samba-ad-dc-libs-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927625" comment="samba-ceph-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927626" comment="samba-client-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927627" comment="samba-client-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927628" comment="samba-client-libs-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927629" comment="samba-client-libs-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927630" comment="samba-devel-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927631" comment="samba-devel-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927632" comment="samba-doc-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927633" comment="samba-dsdb-modules-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927634" comment="samba-gpupdate-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927635" comment="samba-ldb-ldap-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927636" comment="samba-libs-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927637" comment="samba-libs-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927638" comment="samba-libs-python3-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927639" comment="samba-libs-python3-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927640" comment="samba-python3-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927641" comment="samba-test-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927642" comment="samba-tool-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927643" comment="samba-winbind-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927644" comment="samba-winbind-libs-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927645" comment="samba-winbind-libs-32bit-4.17.2+git.273.a55a83528b9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250776" version="1" class="patch">
	<metadata>
		<title>xmlbeans-2.6.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23926" ref_url="https://www.suse.com/security/cve/CVE-2021-23926/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlbeans-2.6.0-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23926/">CVE-2021-23926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23926">CVE-2021-23926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927646" comment="xmlbeans-2.6.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927647" comment="xmlbeans-scripts-2.6.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250777" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927649" comment="kernel-macros-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927650" comment="kernel-source-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927651" comment="kernel-source-vanilla-6.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250778" version="1" class="patch">
	<metadata>
		<title>libldap-data-2.6.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31253" ref_url="https://www.suse.com/security/cve/CVE-2022-31253/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-data-2.6.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31253/">CVE-2022-31253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31253">CVE-2022-31253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927652" comment="libldap-data-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927653" comment="libldap2-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927654" comment="libldap2-32bit-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927655" comment="openldap2-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927656" comment="openldap2-back-meta-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927657" comment="openldap2-back-perl-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927658" comment="openldap2-back-sock-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927659" comment="openldap2-back-sql-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927660" comment="openldap2-client-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927661" comment="openldap2-contrib-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927662" comment="openldap2-devel-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927663" comment="openldap2-devel-32bit-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927664" comment="openldap2-devel-static-2.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927665" comment="openldap2-doc-2.6.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250779" version="1" class="patch">
	<metadata>
		<title>python310-3.10.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37460" ref_url="https://www.suse.com/security/cve/CVE-2022-37460/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-37460/">CVE-2022-37460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-37460">CVE-2022-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927666" comment="python310-3.10.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927667" comment="python310-32bit-3.10.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927668" comment="python310-curses-3.10.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927669" comment="python310-dbm-3.10.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927670" comment="python310-idle-3.10.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927671" comment="python310-tk-3.10.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250780" version="1" class="patch">
	<metadata>
		<title>python39-3.9.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37460" ref_url="https://www.suse.com/security/cve/CVE-2022-37460/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-37460/">CVE-2022-37460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-37460">CVE-2022-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927672" comment="python39-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927673" comment="python39-32bit-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927674" comment="python39-curses-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927675" comment="python39-dbm-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927676" comment="python39-idle-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927677" comment="python39-tk-3.9.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250781" version="1" class="patch">
	<metadata>
		<title>chromedriver-107.0.5304.87-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3652" ref_url="https://www.suse.com/security/cve/CVE-2022-3652/" source="CVE"/>
		<reference ref_id="CVE-2022-3653" ref_url="https://www.suse.com/security/cve/CVE-2022-3653/" source="CVE"/>
		<reference ref_id="CVE-2022-3654" ref_url="https://www.suse.com/security/cve/CVE-2022-3654/" source="CVE"/>
		<reference ref_id="CVE-2022-3655" ref_url="https://www.suse.com/security/cve/CVE-2022-3655/" source="CVE"/>
		<reference ref_id="CVE-2022-3656" ref_url="https://www.suse.com/security/cve/CVE-2022-3656/" source="CVE"/>
		<reference ref_id="CVE-2022-3657" ref_url="https://www.suse.com/security/cve/CVE-2022-3657/" source="CVE"/>
		<reference ref_id="CVE-2022-3658" ref_url="https://www.suse.com/security/cve/CVE-2022-3658/" source="CVE"/>
		<reference ref_id="CVE-2022-3659" ref_url="https://www.suse.com/security/cve/CVE-2022-3659/" source="CVE"/>
		<reference ref_id="CVE-2022-3660" ref_url="https://www.suse.com/security/cve/CVE-2022-3660/" source="CVE"/>
		<reference ref_id="CVE-2022-3661" ref_url="https://www.suse.com/security/cve/CVE-2022-3661/" source="CVE"/>
		<reference ref_id="CVE-2022-3723" ref_url="https://www.suse.com/security/cve/CVE-2022-3723/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-107.0.5304.87-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3652/">CVE-2022-3652 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3652">CVE-2022-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3653/">CVE-2022-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3653">CVE-2022-3653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3654/">CVE-2022-3654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3654">CVE-2022-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3655/">CVE-2022-3655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3655">CVE-2022-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3656/">CVE-2022-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3656">CVE-2022-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3657/">CVE-2022-3657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3657">CVE-2022-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3658/">CVE-2022-3658 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3658">CVE-2022-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3659/">CVE-2022-3659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3659">CVE-2022-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3660/">CVE-2022-3660 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3660">CVE-2022-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3661/">CVE-2022-3661 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3661">CVE-2022-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3723/">CVE-2022-3723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3723">CVE-2022-3723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927678" comment="chromedriver-107.0.5304.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927679" comment="chromium-107.0.5304.87-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250782" version="1" class="patch">
	<metadata>
		<title>python38-3.8.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927680" comment="python38-3.8.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927681" comment="python38-32bit-3.8.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927682" comment="python38-curses-3.8.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927683" comment="python38-dbm-3.8.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927684" comment="python38-idle-3.8.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927685" comment="python38-tk-3.8.15-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250783" version="1" class="patch">
	<metadata>
		<title>ganglia-web-3.7.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20378" ref_url="https://www.suse.com/security/cve/CVE-2019-20378/" source="CVE"/>
		<description>
These are all security issues fixed in the ganglia-web-3.7.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20378/">CVE-2019-20378 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20378">CVE-2019-20378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927686" comment="ganglia-web-3.7.5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250784" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927687" comment="java-11-openj9-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927688" comment="java-11-openj9-accessibility-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927689" comment="java-11-openj9-demo-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927690" comment="java-11-openj9-devel-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927691" comment="java-11-openj9-headless-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927692" comment="java-11-openj9-javadoc-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927693" comment="java-11-openj9-jmods-11.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927694" comment="java-11-openj9-src-11.0.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250785" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927695" comment="java-17-openj9-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927696" comment="java-17-openj9-accessibility-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927697" comment="java-17-openj9-demo-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927698" comment="java-17-openj9-devel-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927699" comment="java-17-openj9-headless-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927700" comment="java-17-openj9-javadoc-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927701" comment="java-17-openj9-jmods-17.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927702" comment="java-17-openj9-src-17.0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250786" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.352-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.352-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927703" comment="java-1_8_0-openj9-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927704" comment="java-1_8_0-openj9-accessibility-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927705" comment="java-1_8_0-openj9-demo-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927706" comment="java-1_8_0-openj9-devel-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927707" comment="java-1_8_0-openj9-headless-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927708" comment="java-1_8_0-openj9-javadoc-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927709" comment="java-1_8_0-openj9-src-1.8.0.352-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250787" version="1" class="patch">
	<metadata>
		<title>jhead-3.06.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41751" ref_url="https://www.suse.com/security/cve/CVE-2022-41751/" source="CVE"/>
		<description>
These are all security issues fixed in the jhead-3.06.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41751/">CVE-2022-41751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41751">CVE-2022-41751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927710" comment="jhead-3.06.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250788" version="1" class="patch">
	<metadata>
		<title>php8-8.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927711" comment="php8-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927712" comment="php8-bcmath-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927713" comment="php8-bz2-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927714" comment="php8-calendar-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927715" comment="php8-cli-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927716" comment="php8-ctype-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927717" comment="php8-curl-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927718" comment="php8-dba-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927719" comment="php8-devel-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927720" comment="php8-dom-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927721" comment="php8-enchant-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927722" comment="php8-exif-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927723" comment="php8-ffi-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927724" comment="php8-fileinfo-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927725" comment="php8-ftp-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927726" comment="php8-gd-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927727" comment="php8-gettext-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927728" comment="php8-gmp-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927729" comment="php8-iconv-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927730" comment="php8-intl-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927731" comment="php8-ldap-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927732" comment="php8-mbstring-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927733" comment="php8-mysql-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927734" comment="php8-odbc-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927735" comment="php8-opcache-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927736" comment="php8-openssl-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927737" comment="php8-pcntl-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927738" comment="php8-pdo-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927739" comment="php8-pgsql-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927740" comment="php8-phar-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927741" comment="php8-posix-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927742" comment="php8-readline-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927743" comment="php8-shmop-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927744" comment="php8-snmp-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927745" comment="php8-soap-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927746" comment="php8-sockets-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927747" comment="php8-sodium-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927748" comment="php8-sqlite-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927749" comment="php8-sysvmsg-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927750" comment="php8-sysvsem-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927751" comment="php8-sysvshm-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927752" comment="php8-tidy-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927753" comment="php8-tokenizer-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927754" comment="php8-xmlreader-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927755" comment="php8-xmlwriter-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927756" comment="php8-xsl-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927757" comment="php8-zip-8.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927758" comment="php8-zlib-8.1.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250789" version="1" class="patch">
	<metadata>
		<title>redis-7.0.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3647" ref_url="https://www.suse.com/security/cve/CVE-2022-3647/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3647/">CVE-2022-3647 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3647">CVE-2022-3647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927759" comment="redis-7.0.5-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250790" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20221102-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-36086" ref_url="https://www.suse.com/security/cve/CVE-2022-36086/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20221102-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36086/">CVE-2022-36086 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36086">CVE-2022-36086 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927760" comment="cargo-audit-advisory-db-20221102-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250791" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44032" ref_url="https://www.suse.com/security/cve/CVE-2022-44032/" source="CVE"/>
		<reference ref_id="CVE-2022-44033" ref_url="https://www.suse.com/security/cve/CVE-2022-44033/" source="CVE"/>
		<reference ref_id="CVE-2022-44034" ref_url="https://www.suse.com/security/cve/CVE-2022-44034/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44032/">CVE-2022-44032 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44032">CVE-2022-44032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44033/">CVE-2022-44033 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44033">CVE-2022-44033 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44034/">CVE-2022-44034 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44034">CVE-2022-44034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927762" comment="kernel-macros-6.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927763" comment="kernel-source-6.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927764" comment="kernel-source-vanilla-6.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250792" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41716" ref_url="https://www.suse.com/security/cve/CVE-2022-41716/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41716/">CVE-2022-41716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41716">CVE-2022-41716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927765" comment="go1.18-1.18.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927766" comment="go1.18-doc-1.18.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927767" comment="go1.18-race-1.18.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250793" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41716" ref_url="https://www.suse.com/security/cve/CVE-2022-41716/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41716/">CVE-2022-41716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41716">CVE-2022-41716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927768" comment="go1.19-1.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927769" comment="go1.19-doc-1.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927770" comment="go1.19-race-1.19.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250794" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2022.10.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2022.10.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927771" comment="libntfs-3g-devel-2022.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927772" comment="libntfs-3g89-2022.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927773" comment="ntfs-3g-2022.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927774" comment="ntfsprogs-2022.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927775" comment="ntfsprogs-extra-2022.10.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250795" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-22.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39348" ref_url="https://www.suse.com/security/cve/CVE-2022-39348/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-22.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39348/">CVE-2022-39348 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39348">CVE-2022-39348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927776" comment="python-Twisted-doc-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927777" comment="python310-Twisted-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927778" comment="python310-Twisted-all_non_platform-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927779" comment="python310-Twisted-conch-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927780" comment="python310-Twisted-conch_nacl-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927781" comment="python310-Twisted-contextvars-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927782" comment="python310-Twisted-http2-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927783" comment="python310-Twisted-serial-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927784" comment="python310-Twisted-tls-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927785" comment="python38-Twisted-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927786" comment="python38-Twisted-all_non_platform-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927787" comment="python38-Twisted-conch-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927788" comment="python38-Twisted-conch_nacl-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927789" comment="python38-Twisted-contextvars-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927790" comment="python38-Twisted-http2-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927791" comment="python38-Twisted-serial-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927792" comment="python38-Twisted-tls-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927793" comment="python39-Twisted-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927794" comment="python39-Twisted-all_non_platform-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927795" comment="python39-Twisted-conch-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927796" comment="python39-Twisted-conch_nacl-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927797" comment="python39-Twisted-contextvars-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927798" comment="python39-Twisted-http2-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927799" comment="python39-Twisted-serial-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927800" comment="python39-Twisted-tls-22.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250796" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3358" ref_url="https://www.suse.com/security/cve/CVE-2022-3358/" source="CVE"/>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3358/">CVE-2022-3358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3358">CVE-2022-3358 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927801" comment="libopenssl-3-devel-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927802" comment="libopenssl-3-devel-32bit-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927803" comment="libopenssl3-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927804" comment="libopenssl3-32bit-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927805" comment="openssl-3-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927806" comment="openssl-3-doc-3.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250797" version="1" class="patch">
	<metadata>
		<title>php7-7.4.33-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
These are all security issues fixed in the php7-7.4.33-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927807" comment="php7-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927808" comment="php7-bcmath-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927809" comment="php7-bz2-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927810" comment="php7-calendar-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927811" comment="php7-cli-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927812" comment="php7-ctype-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927813" comment="php7-curl-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927814" comment="php7-dba-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927815" comment="php7-devel-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927816" comment="php7-dom-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927817" comment="php7-enchant-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927818" comment="php7-exif-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927819" comment="php7-fileinfo-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927820" comment="php7-ftp-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927821" comment="php7-gd-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927822" comment="php7-gettext-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927823" comment="php7-gmp-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927824" comment="php7-iconv-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927825" comment="php7-intl-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927826" comment="php7-json-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927827" comment="php7-ldap-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927828" comment="php7-mbstring-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927829" comment="php7-mysql-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927830" comment="php7-odbc-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927831" comment="php7-opcache-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927832" comment="php7-openssl-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927833" comment="php7-pcntl-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927834" comment="php7-pdo-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927835" comment="php7-pgsql-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927836" comment="php7-phar-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927837" comment="php7-posix-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927838" comment="php7-readline-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927839" comment="php7-shmop-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927840" comment="php7-snmp-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927841" comment="php7-soap-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927842" comment="php7-sockets-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927843" comment="php7-sodium-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927844" comment="php7-sqlite-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927845" comment="php7-sysvmsg-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927846" comment="php7-sysvsem-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927847" comment="php7-sysvshm-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927848" comment="php7-tidy-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927849" comment="php7-tokenizer-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927850" comment="php7-xmlreader-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927851" comment="php7-xmlrpc-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927852" comment="php7-xmlwriter-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927853" comment="php7-xsl-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927854" comment="php7-zip-7.4.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927855" comment="php7-zlib-7.4.33-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250798" version="1" class="patch">
	<metadata>
		<title>OpenImageIO-2.4.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36354" ref_url="https://www.suse.com/security/cve/CVE-2022-36354/" source="CVE"/>
		<reference ref_id="CVE-2022-38143" ref_url="https://www.suse.com/security/cve/CVE-2022-38143/" source="CVE"/>
		<reference ref_id="CVE-2022-41639" ref_url="https://www.suse.com/security/cve/CVE-2022-41639/" source="CVE"/>
		<reference ref_id="CVE-2022-41684" ref_url="https://www.suse.com/security/cve/CVE-2022-41684/" source="CVE"/>
		<reference ref_id="CVE-2022-41794" ref_url="https://www.suse.com/security/cve/CVE-2022-41794/" source="CVE"/>
		<reference ref_id="CVE-2022-41838" ref_url="https://www.suse.com/security/cve/CVE-2022-41838/" source="CVE"/>
		<reference ref_id="CVE-2022-41977" ref_url="https://www.suse.com/security/cve/CVE-2022-41977/" source="CVE"/>
		<reference ref_id="CVE-2022-4198" ref_url="https://www.suse.com/security/cve/CVE-2022-4198/" source="CVE"/>
		<reference ref_id="CVE-2022-41988" ref_url="https://www.suse.com/security/cve/CVE-2022-41988/" source="CVE"/>
		<reference ref_id="CVE-2022-41999" ref_url="https://www.suse.com/security/cve/CVE-2022-41999/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenImageIO-2.4.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36354/">CVE-2022-36354 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36354">CVE-2022-36354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38143/">CVE-2022-38143 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38143">CVE-2022-38143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41639/">CVE-2022-41639 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41639">CVE-2022-41639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41684/">CVE-2022-41684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41684">CVE-2022-41684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41794/">CVE-2022-41794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41794">CVE-2022-41794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41838/">CVE-2022-41838 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41838">CVE-2022-41838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41977/">CVE-2022-41977 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41977">CVE-2022-41977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4198/">CVE-2022-4198 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4198">CVE-2022-4198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41988/">CVE-2022-41988 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41988">CVE-2022-41988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41999/">CVE-2022-41999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41999">CVE-2022-41999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927856" comment="OpenImageIO-2.4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927857" comment="OpenImageIO-devel-2.4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927858" comment="libOpenImageIO2_4-2.4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927859" comment="libOpenImageIO_Util2_4-2.4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927860" comment="python3-OpenImageIO-2.4.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250799" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35409" ref_url="https://www.suse.com/security/cve/CVE-2022-35409/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35409/">CVE-2022-35409 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35409">CVE-2022-35409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927861" comment="libmbedcrypto7-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927862" comment="libmbedcrypto7-32bit-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927863" comment="libmbedtls14-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927864" comment="libmbedtls14-32bit-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927865" comment="libmbedx509-1-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927866" comment="libmbedx509-1-32bit-2.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927867" comment="mbedtls-devel-2.28.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250800" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-38.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-38.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927868" comment="python310-cryptography-38.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927869" comment="python38-cryptography-38.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927870" comment="python39-cryptography-38.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250801" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-vectors-38.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-vectors-38.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927871" comment="python310-cryptography-vectors-38.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927872" comment="python38-cryptography-vectors-38.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927873" comment="python39-cryptography-vectors-38.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250802" version="1" class="patch">
	<metadata>
		<title>python310-3.10.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927874" comment="python310-3.10.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927875" comment="python310-32bit-3.10.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927876" comment="python310-curses-3.10.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927877" comment="python310-dbm-3.10.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927878" comment="python310-idle-3.10.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927879" comment="python310-tk-3.10.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250803" version="1" class="patch">
	<metadata>
		<title>python39-3.9.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927880" comment="python39-3.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927881" comment="python39-32bit-3.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927882" comment="python39-curses-3.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927883" comment="python39-dbm-3.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927884" comment="python39-idle-3.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927885" comment="python39-tk-3.9.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250804" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.12-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.12-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927886" comment="sudo-1.9.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927887" comment="sudo-devel-1.9.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927888" comment="sudo-plugin-python-1.9.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927889" comment="sudo-test-1.9.12-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250805" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927891" comment="kernel-macros-6.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927892" comment="kernel-source-6.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927893" comment="kernel-source-vanilla-6.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250806" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-21.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3656" ref_url="https://www.suse.com/security/cve/CVE-2022-3656/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-21.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3656/">CVE-2022-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3656">CVE-2022-3656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927894" comment="nodejs-electron-21.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927895" comment="nodejs-electron-devel-21.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927896" comment="nodejs-electron-doc-21.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250807" version="1" class="patch">
	<metadata>
		<title>jasper-4.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40755" ref_url="https://www.suse.com/security/cve/CVE-2022-40755/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40755/">CVE-2022-40755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40755">CVE-2022-40755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927897" comment="jasper-4.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927898" comment="libjasper-devel-4.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927899" comment="libjasper7-4.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927900" comment="libjasper7-32bit-4.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250808" version="1" class="patch">
	<metadata>
		<title>git-2.38.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.38.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927901" comment="git-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927902" comment="git-arch-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927903" comment="git-core-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927904" comment="git-credential-gnome-keyring-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927905" comment="git-credential-libsecret-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927906" comment="git-cvs-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927907" comment="git-daemon-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927908" comment="git-doc-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927909" comment="git-email-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927910" comment="git-gui-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927911" comment="git-p4-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927912" comment="git-svn-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927913" comment="git-web-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927914" comment="gitk-2.38.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927915" comment="perl-Git-2.38.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250809" version="1" class="patch">
	<metadata>
		<title>corepack18-18.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack18-18.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927916" comment="corepack18-18.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927917" comment="nodejs18-18.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927918" comment="nodejs18-devel-18.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927919" comment="nodejs18-docs-18.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927920" comment="npm18-18.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250810" version="1" class="patch">
	<metadata>
		<title>corepack19-19.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack19-19.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927921" comment="corepack19-19.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927922" comment="nodejs19-19.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927923" comment="nodejs19-devel-19.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927924" comment="nodejs19-docs-19.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927925" comment="npm19-19.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250811" version="1" class="patch">
	<metadata>
		<title>coredns-1.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-28948" ref_url="https://www.suse.com/security/cve/CVE-2022-28948/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28948/">CVE-2022-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927926" comment="coredns-1.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927927" comment="coredns-extras-1.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250812" version="1" class="patch">
	<metadata>
		<title>libbpf-devel-1.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45940" ref_url="https://www.suse.com/security/cve/CVE-2021-45940/" source="CVE"/>
		<reference ref_id="CVE-2022-3533" ref_url="https://www.suse.com/security/cve/CVE-2022-3533/" source="CVE"/>
		<reference ref_id="CVE-2022-3534" ref_url="https://www.suse.com/security/cve/CVE-2022-3534/" source="CVE"/>
		<reference ref_id="CVE-2022-3606" ref_url="https://www.suse.com/security/cve/CVE-2022-3606/" source="CVE"/>
		<description>
These are all security issues fixed in the libbpf-devel-1.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-45940/">CVE-2021-45940 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45940">CVE-2021-45940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3533/">CVE-2022-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3533">CVE-2022-3533 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3534/">CVE-2022-3534 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3606/">CVE-2022-3606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3606">CVE-2022-3606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927928" comment="libbpf-devel-1.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927929" comment="libbpf-devel-static-1.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927930" comment="libbpf1-1.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927931" comment="libbpf1-32bit-1.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250813" version="1" class="patch">
	<metadata>
		<title>velero-1.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927932" comment="velero-1.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927933" comment="velero-bash-completion-1.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927934" comment="velero-fish-completion-1.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927935" comment="velero-zsh-completion-1.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250814" version="1" class="patch">
	<metadata>
		<title>autotrace-0.31.1-646.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32323" ref_url="https://www.suse.com/security/cve/CVE-2022-32323/" source="CVE"/>
		<description>
These are all security issues fixed in the autotrace-0.31.1-646.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32323/">CVE-2022-32323 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32323">CVE-2022-32323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927936" comment="autotrace-0.31.1-646.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927937" comment="autotrace-devel-0.31.1-646.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927938" comment="libautotrace3-0.31.1-646.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250815" version="1" class="patch">
	<metadata>
		<title>chromedriver-107.0.5304.110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3885" ref_url="https://www.suse.com/security/cve/CVE-2022-3885/" source="CVE"/>
		<reference ref_id="CVE-2022-3886" ref_url="https://www.suse.com/security/cve/CVE-2022-3886/" source="CVE"/>
		<reference ref_id="CVE-2022-3887" ref_url="https://www.suse.com/security/cve/CVE-2022-3887/" source="CVE"/>
		<reference ref_id="CVE-2022-3888" ref_url="https://www.suse.com/security/cve/CVE-2022-3888/" source="CVE"/>
		<reference ref_id="CVE-2022-3889" ref_url="https://www.suse.com/security/cve/CVE-2022-3889/" source="CVE"/>
		<reference ref_id="CVE-2022-3890" ref_url="https://www.suse.com/security/cve/CVE-2022-3890/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-107.0.5304.110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3885/">CVE-2022-3885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3885">CVE-2022-3885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3886/">CVE-2022-3886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3886">CVE-2022-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3887/">CVE-2022-3887 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3887">CVE-2022-3887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3888/">CVE-2022-3888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3888">CVE-2022-3888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3889/">CVE-2022-3889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3889">CVE-2022-3889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3890/">CVE-2022-3890 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3890">CVE-2022-3890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927939" comment="chromedriver-107.0.5304.110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927940" comment="chromium-107.0.5304.110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250816" version="1" class="patch">
	<metadata>
		<title>python311-3.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927941" comment="python311-3.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927942" comment="python311-32bit-3.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927943" comment="python311-curses-3.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927944" comment="python311-dbm-3.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927945" comment="python311-idle-3.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927946" comment="python311-tk-3.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250817" version="1" class="patch">
	<metadata>
		<title>libvarnishapi3-7.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45059" ref_url="https://www.suse.com/security/cve/CVE-2022-45059/" source="CVE"/>
		<reference ref_id="CVE-2022-45060" ref_url="https://www.suse.com/security/cve/CVE-2022-45060/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi3-7.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45059/">CVE-2022-45059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45059">CVE-2022-45059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45060/">CVE-2022-45060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45060">CVE-2022-45060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927947" comment="libvarnishapi3-7.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927948" comment="varnish-7.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927949" comment="varnish-devel-7.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250818" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-0.42.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-0.42.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927950" comment="libpixman-1-0-0.42.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927951" comment="libpixman-1-0-32bit-0.42.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927952" comment="libpixman-1-0-devel-0.42.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250819" version="1" class="patch">
	<metadata>
		<title>bcel5_3-5.3-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
These are all security issues fixed in the bcel5_3-5.3-21.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927953" comment="bcel5_3-5.3-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927954" comment="bcel5_3-javadoc-5.3-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250820" version="1" class="patch">
	<metadata>
		<title>jhead-3.06.0.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-34055" ref_url="https://www.suse.com/security/cve/CVE-2021-34055/" source="CVE"/>
		<description>
These are all security issues fixed in the jhead-3.06.0.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34055/">CVE-2021-34055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34055">CVE-2021-34055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927955" comment="jhead-3.06.0.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250821" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-25.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927956" comment="python-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927957" comment="python-32bit-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927958" comment="python-curses-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927959" comment="python-demo-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927960" comment="python-gdbm-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927961" comment="python-idle-2.7.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927962" comment="python-tk-2.7.18-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250822" version="1" class="patch">
	<metadata>
		<title>python310-3.10.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927963" comment="python310-3.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927964" comment="python310-32bit-3.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927965" comment="python310-curses-3.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927966" comment="python310-dbm-3.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927967" comment="python310-idle-3.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927968" comment="python310-tk-3.10.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250823" version="1" class="patch">
	<metadata>
		<title>python38-3.8.15-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.15-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927969" comment="python38-3.8.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927970" comment="python38-32bit-3.8.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927971" comment="python38-curses-3.8.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927972" comment="python38-dbm-3.8.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927973" comment="python38-idle-3.8.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927974" comment="python38-tk-3.8.15-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250824" version="1" class="patch">
	<metadata>
		<title>python39-3.9.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927975" comment="python39-3.9.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927976" comment="python39-32bit-3.9.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927977" comment="python39-curses-3.9.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927978" comment="python39-dbm-3.9.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927979" comment="python39-idle-3.9.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927980" comment="python39-tk-3.9.15-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250825" version="1" class="patch">
	<metadata>
		<title>libfpm_pb0-1.2.4-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44038" ref_url="https://www.suse.com/security/cve/CVE-2021-44038/" source="CVE"/>
		<description>
These are all security issues fixed in the libfpm_pb0-1.2.4-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44038/">CVE-2021-44038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44038">CVE-2021-44038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927981" comment="libfpm_pb0-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927982" comment="libospf0-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927983" comment="libospfapiclient0-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927984" comment="libquagga_pb0-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927985" comment="libzebra1-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927986" comment="quagga-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927987" comment="quagga-devel-1.2.4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250826" version="1" class="patch">
	<metadata>
		<title>xterm-375-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-375-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927988" comment="xterm-375-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927989" comment="xterm-bin-375-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927990" comment="xterm-resize-375-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250827" version="1" class="patch">
	<metadata>
		<title>apache-ivy-2.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37865" ref_url="https://www.suse.com/security/cve/CVE-2022-37865/" source="CVE"/>
		<reference ref_id="CVE-2022-37866" ref_url="https://www.suse.com/security/cve/CVE-2022-37866/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-ivy-2.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37865/">CVE-2022-37865 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37865">CVE-2022-37865 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37866/">CVE-2022-37866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37866">CVE-2022-37866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927991" comment="apache-ivy-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927992" comment="apache-ivy-javadoc-2.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250828" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32815" ref_url="https://www.suse.com/security/cve/CVE-2021-32815/" source="CVE"/>
		<reference ref_id="CVE-2021-34335" ref_url="https://www.suse.com/security/cve/CVE-2021-34335/" source="CVE"/>
		<reference ref_id="CVE-2022-3953" ref_url="https://www.suse.com/security/cve/CVE-2022-3953/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32815/">CVE-2021-32815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32815">CVE-2021-32815 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-34335/">CVE-2021-34335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34335">CVE-2021-34335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3953/">CVE-2022-3953 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3953">CVE-2022-3953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009927993" comment="exiv2-0.27.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927994" comment="exiv2-lang-0.27.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927995" comment="libexiv2-27-0.27.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927996" comment="libexiv2-27-32bit-0.27.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927997" comment="libexiv2-devel-0.27.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927998" comment="libexiv2-xmp-static-0.27.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250829" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31123" ref_url="https://www.suse.com/security/cve/CVE-2022-31123/" source="CVE"/>
		<reference ref_id="CVE-2022-31130" ref_url="https://www.suse.com/security/cve/CVE-2022-31130/" source="CVE"/>
		<reference ref_id="CVE-2022-39201" ref_url="https://www.suse.com/security/cve/CVE-2022-39201/" source="CVE"/>
		<reference ref_id="CVE-2022-39229" ref_url="https://www.suse.com/security/cve/CVE-2022-39229/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-31123/">CVE-2022-31123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31123">CVE-2022-31123 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31130/">CVE-2022-31130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31130">CVE-2022-31130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39201/">CVE-2022-39201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39201">CVE-2022-39201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39229/">CVE-2022-39229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39229">CVE-2022-39229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927999" comment="grafana-8.5.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250830" version="1" class="patch">
	<metadata>
		<title>libdwarf-devel-0.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34299" ref_url="https://www.suse.com/security/cve/CVE-2022-34299/" source="CVE"/>
		<description>
These are all security issues fixed in the libdwarf-devel-0.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34299/">CVE-2022-34299 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34299">CVE-2022-34299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928000" comment="libdwarf-devel-0.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928001" comment="libdwarf-devel-static-0.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928002" comment="libdwarf-doc-0.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928003" comment="libdwarf-tools-0.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928004" comment="libdwarf0-0.4.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250831" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.4.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.4.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928005" comment="libtiff-devel-4.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928006" comment="libtiff-devel-32bit-4.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928007" comment="libtiff5-4.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928008" comment="libtiff5-32bit-4.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928009" comment="tiff-4.4.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250832" version="1" class="patch">
	<metadata>
		<title>apache-sshd-2.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45047" ref_url="https://www.suse.com/security/cve/CVE-2022-45047/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-sshd-2.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45047/">CVE-2022-45047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45047">CVE-2022-45047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928010" comment="apache-sshd-2.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928011" comment="apache-sshd-javadoc-2.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250833" version="1" class="patch">
	<metadata>
		<title>cni-1.0.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-1.0.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928012" comment="cni-1.0.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250834" version="1" class="patch">
	<metadata>
		<title>cni-plugins-1.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-plugins-1.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928013" comment="cni-plugins-1.1.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250835" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3964" ref_url="https://www.suse.com/security/cve/CVE-2022-3964/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3964/">CVE-2022-3964 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3964">CVE-2022-3964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928014" comment="ffmpeg-5-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928015" comment="ffmpeg-5-libavcodec-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928016" comment="ffmpeg-5-libavdevice-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928017" comment="ffmpeg-5-libavfilter-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928018" comment="ffmpeg-5-libavformat-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928019" comment="ffmpeg-5-libavutil-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928020" comment="ffmpeg-5-libpostproc-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928021" comment="ffmpeg-5-libswresample-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928022" comment="ffmpeg-5-libswscale-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928023" comment="ffmpeg-5-private-devel-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928024" comment="libavcodec59-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928025" comment="libavcodec59-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928026" comment="libavdevice59-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928027" comment="libavdevice59-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928028" comment="libavfilter8-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928029" comment="libavfilter8-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928030" comment="libavformat59-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928031" comment="libavformat59-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928032" comment="libavutil57-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928033" comment="libavutil57-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928034" comment="libpostproc56-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928035" comment="libpostproc56-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928036" comment="libswresample4-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928037" comment="libswresample4-32bit-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928038" comment="libswscale6-5.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928039" comment="libswscale6-32bit-5.1.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250836" version="1" class="patch">
	<metadata>
		<title>freerdp-2.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282/" source="CVE"/>
		<reference ref_id="CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39282">CVE-2022-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39283">CVE-2022-39283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928040" comment="freerdp-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928041" comment="freerdp-devel-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928042" comment="freerdp-proxy-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928043" comment="freerdp-server-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928044" comment="freerdp-wayland-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928045" comment="libfreerdp2-2-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928046" comment="libuwac0-0-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928047" comment="libwinpr2-2-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928048" comment="uwac0-0-devel-2.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928049" comment="winpr-devel-2.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250837" version="1" class="patch">
	<metadata>
		<title>frr-8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37035" ref_url="https://www.suse.com/security/cve/CVE-2022-37035/" source="CVE"/>
		<reference ref_id="CVE-2022-42917" ref_url="https://www.suse.com/security/cve/CVE-2022-42917/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37035/">CVE-2022-37035 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37035">CVE-2022-37035 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42917/">CVE-2022-42917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-42917">CVE-2022-42917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928050" comment="frr-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928051" comment="frr-devel-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928052" comment="libfrr0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928053" comment="libfrr_pb0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928054" comment="libfrrcares0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928055" comment="libfrrfpm_pb0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928056" comment="libfrrospfapiclient0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928057" comment="libfrrsnmp0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928058" comment="libfrrzmq0-8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928059" comment="libmlag_pb0-8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250838" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-31.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928060" comment="grub2-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928061" comment="grub2-branding-upstream-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928062" comment="grub2-i386-pc-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928063" comment="grub2-i386-pc-debug-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928064" comment="grub2-snapper-plugin-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928065" comment="grub2-systemd-sleep-plugin-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928066" comment="grub2-x86_64-efi-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928067" comment="grub2-x86_64-efi-debug-2.06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928068" comment="grub2-x86_64-xen-2.06-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250839" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-107.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45407" ref_url="https://www.suse.com/security/cve/CVE-2022-45407/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45413" ref_url="https://www.suse.com/security/cve/CVE-2022-45413/" source="CVE"/>
		<reference ref_id="CVE-2022-45415" ref_url="https://www.suse.com/security/cve/CVE-2022-45415/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45417" ref_url="https://www.suse.com/security/cve/CVE-2022-45417/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45419" ref_url="https://www.suse.com/security/cve/CVE-2022-45419/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-107.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45407/">CVE-2022-45407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45407">CVE-2022-45407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45413/">CVE-2022-45413 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45413">CVE-2022-45413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45415/">CVE-2022-45415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45415">CVE-2022-45415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45417/">CVE-2022-45417 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45417">CVE-2022-45417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45419/">CVE-2022-45419 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45419">CVE-2022-45419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928069" comment="MozillaFirefox-107.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928070" comment="MozillaFirefox-branding-upstream-107.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928071" comment="MozillaFirefox-devel-107.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928072" comment="MozillaFirefox-translations-common-107.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928073" comment="MozillaFirefox-translations-other-107.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250840" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928074" comment="MozillaThunderbird-102.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928075" comment="MozillaThunderbird-translations-common-102.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928076" comment="MozillaThunderbird-translations-other-102.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250841" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3964" ref_url="https://www.suse.com/security/cve/CVE-2022-3964/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3964/">CVE-2022-3964 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3964">CVE-2022-3964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928077" comment="ffmpeg-4-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928078" comment="ffmpeg-4-libavcodec-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928079" comment="ffmpeg-4-libavdevice-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928080" comment="ffmpeg-4-libavfilter-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928081" comment="ffmpeg-4-libavformat-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928082" comment="ffmpeg-4-libavresample-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928083" comment="ffmpeg-4-libavutil-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928084" comment="ffmpeg-4-libpostproc-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928085" comment="ffmpeg-4-libswresample-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928086" comment="ffmpeg-4-libswscale-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928087" comment="ffmpeg-4-private-devel-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928088" comment="libavcodec58_134-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928089" comment="libavcodec58_134-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928090" comment="libavdevice58_13-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928091" comment="libavdevice58_13-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928092" comment="libavfilter7_110-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928093" comment="libavfilter7_110-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928094" comment="libavformat58_76-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928095" comment="libavformat58_76-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928096" comment="libavresample4_0-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928097" comment="libavresample4_0-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928098" comment="libavutil56_70-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928099" comment="libavutil56_70-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928100" comment="libpostproc55_9-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928101" comment="libpostproc55_9-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928102" comment="libswresample3_9-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928103" comment="libswresample3_9-32bit-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928104" comment="libswscale5_9-4.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928105" comment="libswscale5_9-32bit-4.4.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250842" version="1" class="patch">
	<metadata>
		<title>radare2-5.7.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34502" ref_url="https://www.suse.com/security/cve/CVE-2022-34502/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.7.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34502/">CVE-2022-34502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34502">CVE-2022-34502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928106" comment="radare2-5.7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928107" comment="radare2-devel-5.7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928108" comment="radare2-zsh-completion-5.7.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250843" version="1" class="patch">
	<metadata>
		<title>Botan-2.19.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43705" ref_url="https://www.suse.com/security/cve/CVE-2022-43705/" source="CVE"/>
		<description>
These are all security issues fixed in the Botan-2.19.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43705/">CVE-2022-43705 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43705">CVE-2022-43705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928109" comment="Botan-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928110" comment="Botan-doc-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928111" comment="libbotan-2-19-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928112" comment="libbotan-2-19-32bit-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928113" comment="libbotan-devel-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928114" comment="libbotan-devel-32bit-2.19.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928115" comment="python3-botan-2.19.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250844" version="1" class="patch">
	<metadata>
		<title>freerdp-2.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39316" ref_url="https://www.suse.com/security/cve/CVE-2022-39316/" source="CVE"/>
		<reference ref_id="CVE-2022-39320" ref_url="https://www.suse.com/security/cve/CVE-2022-39320/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39316/">CVE-2022-39316 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39316">CVE-2022-39316 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39320/">CVE-2022-39320 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39320">CVE-2022-39320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928116" comment="freerdp-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928117" comment="freerdp-devel-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928118" comment="freerdp-proxy-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928119" comment="freerdp-server-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928120" comment="freerdp-wayland-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928121" comment="libfreerdp2-2-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928122" comment="libuwac0-0-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928123" comment="libwinpr2-2-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928124" comment="uwac0-0-devel-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928125" comment="winpr-devel-2.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250845" version="1" class="patch">
	<metadata>
		<title>krb5-1.20.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.20.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928126" comment="krb5-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928127" comment="krb5-32bit-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928128" comment="krb5-client-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928129" comment="krb5-devel-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928130" comment="krb5-devel-32bit-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928131" comment="krb5-plugin-kdb-ldap-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928132" comment="krb5-plugin-preauth-otp-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928133" comment="krb5-plugin-preauth-pkinit-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928134" comment="krb5-plugin-preauth-spake-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928135" comment="krb5-server-1.20.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250846" version="1" class="patch">
	<metadata>
		<title>ctdb-4.17.3+git.279.ff9bb8a298-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.17.3+git.279.ff9bb8a298-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928136" comment="ctdb-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928137" comment="ctdb-pcp-pmda-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928138" comment="libsamba-policy-devel-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928139" comment="libsamba-policy-python3-devel-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928140" comment="libsamba-policy0-python3-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928141" comment="libsamba-policy0-python3-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928142" comment="samba-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928143" comment="samba-ad-dc-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928144" comment="samba-ad-dc-libs-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928145" comment="samba-ad-dc-libs-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928146" comment="samba-ceph-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928147" comment="samba-client-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928148" comment="samba-client-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928149" comment="samba-client-libs-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928150" comment="samba-client-libs-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928151" comment="samba-devel-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928152" comment="samba-devel-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928153" comment="samba-doc-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928154" comment="samba-dsdb-modules-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928155" comment="samba-gpupdate-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928156" comment="samba-ldb-ldap-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928157" comment="samba-libs-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928158" comment="samba-libs-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928159" comment="samba-libs-python3-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928160" comment="samba-libs-python3-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928161" comment="samba-python3-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928162" comment="samba-test-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928163" comment="samba-tool-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928164" comment="samba-winbind-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928165" comment="samba-winbind-libs-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928166" comment="samba-winbind-libs-32bit-4.17.3+git.279.ff9bb8a298-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250847" version="1" class="patch">
	<metadata>
		<title>java-19-openjdk-19.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
These are all security issues fixed in the java-19-openjdk-19.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928167" comment="java-19-openjdk-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928168" comment="java-19-openjdk-accessibility-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928169" comment="java-19-openjdk-demo-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928170" comment="java-19-openjdk-devel-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928171" comment="java-19-openjdk-headless-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928172" comment="java-19-openjdk-javadoc-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928173" comment="java-19-openjdk-jmods-19.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928174" comment="java-19-openjdk-src-19.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250848" version="1" class="patch">
	<metadata>
		<title>gerbv-2.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40400" ref_url="https://www.suse.com/security/cve/CVE-2021-40400/" source="CVE"/>
		<reference ref_id="CVE-2021-40401" ref_url="https://www.suse.com/security/cve/CVE-2021-40401/" source="CVE"/>
		<reference ref_id="CVE-2021-40403" ref_url="https://www.suse.com/security/cve/CVE-2021-40403/" source="CVE"/>
		<description>
These are all security issues fixed in the gerbv-2.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40400/">CVE-2021-40400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40400">CVE-2021-40400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40401/">CVE-2021-40401 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40401">CVE-2021-40401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40403/">CVE-2021-40403 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40403">CVE-2021-40403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928175" comment="gerbv-2.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928176" comment="gerbv-devel-2.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928177" comment="libgerbv1-2.9.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250849" version="1" class="patch">
	<metadata>
		<title>python310-jwcrypto-1.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3102" ref_url="https://www.suse.com/security/cve/CVE-2022-3102/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jwcrypto-1.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3102/">CVE-2022-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-3102">CVE-2022-3102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928178" comment="python310-jwcrypto-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928179" comment="python38-jwcrypto-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928180" comment="python39-jwcrypto-1.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250850" version="1" class="patch">
	<metadata>
		<title>libslirp-devel-4.7.0+44-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
These are all security issues fixed in the libslirp-devel-4.7.0+44-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928181" comment="libslirp-devel-4.7.0+44-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928182" comment="libslirp0-4.7.0+44-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250851" version="1" class="patch">
	<metadata>
		<title>bcel-5.2-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
These are all security issues fixed in the bcel-5.2-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928183" comment="bcel-5.2-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250852" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3930" ref_url="https://www.suse.com/security/cve/CVE-2022-3930/" source="CVE"/>
		<reference ref_id="CVE-2022-39307" ref_url="https://www.suse.com/security/cve/CVE-2022-39307/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3930/">CVE-2022-3930 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3930">CVE-2022-3930 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39307/">CVE-2022-39307 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39307">CVE-2022-39307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928184" comment="grafana-8.5.15-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250853" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928185" comment="libmozjs-102-0-102.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928186" comment="mozjs102-102.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928187" comment="mozjs102-devel-102.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250854" version="1" class="patch">
	<metadata>
		<title>testng-7.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4065" ref_url="https://www.suse.com/security/cve/CVE-2022-4065/" source="CVE"/>
		<description>
These are all security issues fixed in the testng-7.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4065/">CVE-2022-4065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4065">CVE-2022-4065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928188" comment="testng-7.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928189" comment="testng-javadoc-7.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250855" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43980" ref_url="https://www.suse.com/security/cve/CVE-2021-43980/" source="CVE"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43980/">CVE-2021-43980 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43980">CVE-2021-43980 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928190" comment="tomcat-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928191" comment="tomcat-admin-webapps-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928192" comment="tomcat-docs-webapp-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928193" comment="tomcat-el-3_0-api-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928194" comment="tomcat-embed-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928195" comment="tomcat-javadoc-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928196" comment="tomcat-jsp-2_3-api-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928197" comment="tomcat-jsvc-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928198" comment="tomcat-lib-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928199" comment="tomcat-servlet-4_0-api-9.0.43-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928200" comment="tomcat-webapps-9.0.43-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250856" version="1" class="patch">
	<metadata>
		<title>apache2-mod_wsgi-4.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2255" ref_url="https://www.suse.com/security/cve/CVE-2022-2255/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_wsgi-4.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2255/">CVE-2022-2255 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2255">CVE-2022-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928201" comment="apache2-mod_wsgi-4.9.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250857" version="1" class="patch">
	<metadata>
		<title>busybox-1.35.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30065" ref_url="https://www.suse.com/security/cve/CVE-2022-30065/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.35.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30065/">CVE-2022-30065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30065">CVE-2022-30065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928202" comment="busybox-1.35.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928203" comment="busybox-static-1.35.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928204" comment="busybox-testsuite-1.35.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928205" comment="busybox-warewulf3-1.35.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250858" version="1" class="patch">
	<metadata>
		<title>caca-utils-0.99.beta20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
These are all security issues fixed in the caca-utils-0.99.beta20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20547">CVE-2018-20547 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20548">CVE-2018-20548 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928206" comment="caca-utils-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928207" comment="libcaca-devel-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928208" comment="libcaca-ruby-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928209" comment="libcaca0-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928210" comment="libcaca0-32bit-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928211" comment="libcaca0-plugins-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928212" comment="libcaca0-plugins-32bit-0.99.beta20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928213" comment="python3-caca-0.99.beta20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250859" version="1" class="patch">
	<metadata>
		<title>chromedriver-107.0.5304.121-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4135" ref_url="https://www.suse.com/security/cve/CVE-2022-4135/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-107.0.5304.121-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4135/">CVE-2022-4135 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4135">CVE-2022-4135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928214" comment="chromedriver-107.0.5304.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928215" comment="chromium-107.0.5304.121-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250860" version="1" class="patch">
	<metadata>
		<title>libruby3_1-3_1-3.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_1-3_1-3.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928216" comment="libruby3_1-3_1-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928217" comment="ruby3.1-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928218" comment="ruby3.1-devel-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928219" comment="ruby3.1-devel-extra-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928220" comment="ruby3.1-doc-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928221" comment="ruby3.1-doc-ri-3.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250861" version="1" class="patch">
	<metadata>
		<title>libgcrypt-devel-1.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40528" ref_url="https://www.suse.com/security/cve/CVE-2021-40528/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-devel-1.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40528/">CVE-2021-40528 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928222" comment="libgcrypt-devel-1.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928223" comment="libgcrypt-devel-32bit-1.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928224" comment="libgcrypt20-1.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928225" comment="libgcrypt20-32bit-1.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928226" comment="libgcrypt20-hmac-1.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928227" comment="libgcrypt20-hmac-32bit-1.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250862" version="1" class="patch">
	<metadata>
		<title>emacs-28.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-28.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928228" comment="emacs-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928229" comment="emacs-el-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928230" comment="emacs-eln-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928231" comment="emacs-info-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928232" comment="emacs-nox-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928233" comment="emacs-x11-28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928234" comment="etags-28.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250863" version="1" class="patch">
	<metadata>
		<title>ovmf-202211-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202211-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928235" comment="ovmf-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928236" comment="ovmf-tools-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928237" comment="qemu-ovmf-ia32-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928238" comment="qemu-ovmf-x86_64-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928239" comment="qemu-ovmf-x86_64-debug-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928240" comment="qemu-uefi-aarch32-202211-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928241" comment="qemu-uefi-aarch64-202211-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250864" version="1" class="patch">
	<metadata>
		<title>capnproto-0.10.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46149" ref_url="https://www.suse.com/security/cve/CVE-2022-46149/" source="CVE"/>
		<description>
These are all security issues fixed in the capnproto-0.10.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-46149/">CVE-2022-46149 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46149">CVE-2022-46149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928242" comment="capnproto-0.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928243" comment="libcapnp-0_10_3-0.10.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928244" comment="libcapnp-devel-0.10.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250865" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928245" comment="MozillaThunderbird-102.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928246" comment="MozillaThunderbird-translations-common-102.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928247" comment="MozillaThunderbird-translations-other-102.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250866" version="1" class="patch">
	<metadata>
		<title>chromedriver-108.0.5359.71-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4174" ref_url="https://www.suse.com/security/cve/CVE-2022-4174/" source="CVE"/>
		<reference ref_id="CVE-2022-4175" ref_url="https://www.suse.com/security/cve/CVE-2022-4175/" source="CVE"/>
		<reference ref_id="CVE-2022-4176" ref_url="https://www.suse.com/security/cve/CVE-2022-4176/" source="CVE"/>
		<reference ref_id="CVE-2022-4177" ref_url="https://www.suse.com/security/cve/CVE-2022-4177/" source="CVE"/>
		<reference ref_id="CVE-2022-4178" ref_url="https://www.suse.com/security/cve/CVE-2022-4178/" source="CVE"/>
		<reference ref_id="CVE-2022-4179" ref_url="https://www.suse.com/security/cve/CVE-2022-4179/" source="CVE"/>
		<reference ref_id="CVE-2022-4180" ref_url="https://www.suse.com/security/cve/CVE-2022-4180/" source="CVE"/>
		<reference ref_id="CVE-2022-4181" ref_url="https://www.suse.com/security/cve/CVE-2022-4181/" source="CVE"/>
		<reference ref_id="CVE-2022-4182" ref_url="https://www.suse.com/security/cve/CVE-2022-4182/" source="CVE"/>
		<reference ref_id="CVE-2022-4183" ref_url="https://www.suse.com/security/cve/CVE-2022-4183/" source="CVE"/>
		<reference ref_id="CVE-2022-4184" ref_url="https://www.suse.com/security/cve/CVE-2022-4184/" source="CVE"/>
		<reference ref_id="CVE-2022-4185" ref_url="https://www.suse.com/security/cve/CVE-2022-4185/" source="CVE"/>
		<reference ref_id="CVE-2022-4186" ref_url="https://www.suse.com/security/cve/CVE-2022-4186/" source="CVE"/>
		<reference ref_id="CVE-2022-4187" ref_url="https://www.suse.com/security/cve/CVE-2022-4187/" source="CVE"/>
		<reference ref_id="CVE-2022-4188" ref_url="https://www.suse.com/security/cve/CVE-2022-4188/" source="CVE"/>
		<reference ref_id="CVE-2022-4189" ref_url="https://www.suse.com/security/cve/CVE-2022-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-4190" ref_url="https://www.suse.com/security/cve/CVE-2022-4190/" source="CVE"/>
		<reference ref_id="CVE-2022-4191" ref_url="https://www.suse.com/security/cve/CVE-2022-4191/" source="CVE"/>
		<reference ref_id="CVE-2022-4192" ref_url="https://www.suse.com/security/cve/CVE-2022-4192/" source="CVE"/>
		<reference ref_id="CVE-2022-4193" ref_url="https://www.suse.com/security/cve/CVE-2022-4193/" source="CVE"/>
		<reference ref_id="CVE-2022-4194" ref_url="https://www.suse.com/security/cve/CVE-2022-4194/" source="CVE"/>
		<reference ref_id="CVE-2022-4195" ref_url="https://www.suse.com/security/cve/CVE-2022-4195/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-108.0.5359.71-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4174/">CVE-2022-4174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4174">CVE-2022-4174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4175/">CVE-2022-4175 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4175">CVE-2022-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4176/">CVE-2022-4176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4176">CVE-2022-4176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4177/">CVE-2022-4177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4177">CVE-2022-4177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4178/">CVE-2022-4178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4178">CVE-2022-4178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4179/">CVE-2022-4179 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4179">CVE-2022-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4180/">CVE-2022-4180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4180">CVE-2022-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4181/">CVE-2022-4181 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4181">CVE-2022-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4182/">CVE-2022-4182 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4182">CVE-2022-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4183/">CVE-2022-4183 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4183">CVE-2022-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4184/">CVE-2022-4184 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4184">CVE-2022-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4185/">CVE-2022-4185 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4185">CVE-2022-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4186/">CVE-2022-4186 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4186">CVE-2022-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4187/">CVE-2022-4187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4187">CVE-2022-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4188/">CVE-2022-4188 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4188">CVE-2022-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4189/">CVE-2022-4189 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4189">CVE-2022-4189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4190/">CVE-2022-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4190">CVE-2022-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4191/">CVE-2022-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4191">CVE-2022-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4192/">CVE-2022-4192 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4192">CVE-2022-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4193/">CVE-2022-4193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4193">CVE-2022-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4194/">CVE-2022-4194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4194">CVE-2022-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4195/">CVE-2022-4195 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4195">CVE-2022-4195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928248" comment="chromedriver-108.0.5359.71-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928249" comment="chromium-108.0.5359.71-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250867" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.352-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.352-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928250" comment="java-1_8_0-openjdk-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928251" comment="java-1_8_0-openjdk-accessibility-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928252" comment="java-1_8_0-openjdk-demo-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928253" comment="java-1_8_0-openjdk-devel-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928254" comment="java-1_8_0-openjdk-headless-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928255" comment="java-1_8_0-openjdk-javadoc-1.8.0.352-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928256" comment="java-1_8_0-openjdk-src-1.8.0.352-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250868" version="1" class="patch">
	<metadata>
		<title>chromedriver-108.0.5359.94-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-108.0.5359.94-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262">CVE-2022-4262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928257" comment="chromedriver-108.0.5359.94-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928258" comment="chromium-108.0.5359.94-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250869" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17725" ref_url="https://www.suse.com/security/cve/CVE-2017-17725/" source="CVE"/>
		<reference ref_id="CVE-2021-37615" ref_url="https://www.suse.com/security/cve/CVE-2021-37615/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17725/">CVE-2017-17725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17725">CVE-2017-17725 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37615/">CVE-2021-37615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37615">CVE-2021-37615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928259" comment="exiv2-0.27.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928260" comment="exiv2-lang-0.27.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928261" comment="libexiv2-27-0.27.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928262" comment="libexiv2-27-32bit-0.27.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928263" comment="libexiv2-devel-0.27.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928264" comment="libexiv2-xmp-static-0.27.5-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250870" version="1" class="patch">
	<metadata>
		<title>apache-commons-net-3.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-37533" ref_url="https://www.suse.com/security/cve/CVE-2021-37533/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-net-3.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37533/">CVE-2021-37533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37533">CVE-2021-37533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928265" comment="apache-commons-net-3.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928266" comment="apache-commons-net-javadoc-3.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250871" version="1" class="patch">
	<metadata>
		<title>containerd-1.6.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.6.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928267" comment="containerd-1.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928268" comment="containerd-ctr-1.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928269" comment="containerd-devel-1.6.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250872" version="1" class="patch">
	<metadata>
		<title>python310-slixmpp-1.8.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45197" ref_url="https://www.suse.com/security/cve/CVE-2022-45197/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-slixmpp-1.8.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45197/">CVE-2022-45197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45197">CVE-2022-45197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928270" comment="python310-slixmpp-1.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928271" comment="python38-slixmpp-1.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928272" comment="python39-slixmpp-1.8.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250873" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41720" ref_url="https://www.suse.com/security/cve/CVE-2022-41720/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41720/">CVE-2022-41720 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41720">CVE-2022-41720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928273" comment="go1.18-1.18.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928274" comment="go1.18-doc-1.18.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928275" comment="go1.18-race-1.18.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250874" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41720" ref_url="https://www.suse.com/security/cve/CVE-2022-41720/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41720/">CVE-2022-41720 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41720">CVE-2022-41720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928276" comment="go1.19-1.19.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928277" comment="go1.19-doc-1.19.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928278" comment="go1.19-race-1.19.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250875" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-21.3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-21.3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928279" comment="nodejs-electron-21.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928280" comment="nodejs-electron-devel-21.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928281" comment="nodejs-electron-doc-21.3.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250876" version="1" class="patch">
	<metadata>
		<title>phoronix-test-suite-10.8.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40704" ref_url="https://www.suse.com/security/cve/CVE-2022-40704/" source="CVE"/>
		<description>
These are all security issues fixed in the phoronix-test-suite-10.8.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40704/">CVE-2022-40704 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40704">CVE-2022-40704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928282" comment="phoronix-test-suite-10.8.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250877" version="1" class="patch">
	<metadata>
		<title>podman-4.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928283" comment="podman-4.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928284" comment="podman-cni-config-4.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928285" comment="podman-docker-4.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928286" comment="podman-remote-4.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250878" version="1" class="patch">
	<metadata>
		<title>python310-pycapnp-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46149" ref_url="https://www.suse.com/security/cve/CVE-2022-46149/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pycapnp-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-46149/">CVE-2022-46149 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46149">CVE-2022-46149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928287" comment="python310-pycapnp-1.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928288" comment="python38-pycapnp-1.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928289" comment="python39-pycapnp-1.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250879" version="1" class="patch">
	<metadata>
		<title>containerd-1.6.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23471" ref_url="https://www.suse.com/security/cve/CVE-2022-23471/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.6.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23471/">CVE-2022-23471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928290" comment="containerd-1.6.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928291" comment="containerd-ctr-1.6.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928292" comment="containerd-devel-1.6.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250880" version="1" class="patch">
	<metadata>
		<title>python39-3.9.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928293" comment="python39-3.9.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928294" comment="python39-32bit-3.9.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928295" comment="python39-curses-3.9.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928296" comment="python39-dbm-3.9.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928297" comment="python39-idle-3.9.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928298" comment="python39-tk-3.9.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250881" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45888" ref_url="https://www.suse.com/security/cve/CVE-2022-45888/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45888/">CVE-2022-45888 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45888">CVE-2022-45888 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928300" comment="kernel-macros-6.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928301" comment="kernel-source-6.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928302" comment="kernel-source-vanilla-6.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250882" version="1" class="patch">
	<metadata>
		<title>xen-4.17.0_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.0_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33746">CVE-2022-33746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33748">CVE-2022-33748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928303" comment="xen-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928304" comment="xen-devel-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928305" comment="xen-doc-html-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928306" comment="xen-libs-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928307" comment="xen-libs-32bit-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928308" comment="xen-tools-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928309" comment="xen-tools-domU-4.17.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928310" comment="xen-tools-xendomains-wait-disk-4.17.0_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250883" version="1" class="patch">
	<metadata>
		<title>librpmbuild9-4.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-35938" ref_url="https://www.suse.com/security/cve/CVE-2021-35938/" source="CVE"/>
		<reference ref_id="CVE-2021-35939" ref_url="https://www.suse.com/security/cve/CVE-2021-35939/" source="CVE"/>
		<description>
These are all security issues fixed in the librpmbuild9-4.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35938/">CVE-2021-35938 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35938">CVE-2021-35938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35939/">CVE-2021-35939 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35939">CVE-2021-35939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928311" comment="librpmbuild9-4.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928312" comment="rpm-4.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928313" comment="rpm-32bit-4.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928314" comment="rpm-build-4.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928315" comment="rpm-build-perl-4.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928316" comment="rpm-devel-4.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250884" version="1" class="patch">
	<metadata>
		<title>python310-3.10.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928317" comment="python310-3.10.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928318" comment="python310-32bit-3.10.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928319" comment="python310-curses-3.10.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928320" comment="python310-dbm-3.10.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928321" comment="python310-idle-3.10.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928322" comment="python310-tk-3.10.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250885" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39306" ref_url="https://www.suse.com/security/cve/CVE-2022-39306/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39306/">CVE-2022-39306 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39306">CVE-2022-39306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928323" comment="grafana-8.5.15-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250886" version="1" class="patch">
	<metadata>
		<title>libproc2-0-4.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libproc2-0-4.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928324" comment="libproc2-0-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928325" comment="procps4-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928326" comment="procps4-devel-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928327" comment="procps4-lang-4.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250887" version="1" class="patch">
	<metadata>
		<title>chromedriver-108.0.5359.124-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4436" ref_url="https://www.suse.com/security/cve/CVE-2022-4436/" source="CVE"/>
		<reference ref_id="CVE-2022-4437" ref_url="https://www.suse.com/security/cve/CVE-2022-4437/" source="CVE"/>
		<reference ref_id="CVE-2022-4438" ref_url="https://www.suse.com/security/cve/CVE-2022-4438/" source="CVE"/>
		<reference ref_id="CVE-2022-4439" ref_url="https://www.suse.com/security/cve/CVE-2022-4439/" source="CVE"/>
		<reference ref_id="CVE-2022-4440" ref_url="https://www.suse.com/security/cve/CVE-2022-4440/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-108.0.5359.124-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4436/">CVE-2022-4436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4436">CVE-2022-4436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4437/">CVE-2022-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4437">CVE-2022-4437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4438/">CVE-2022-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4438">CVE-2022-4438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4439/">CVE-2022-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4439">CVE-2022-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4440/">CVE-2022-4440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4440">CVE-2022-4440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928328" comment="chromedriver-108.0.5359.124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928329" comment="chromium-108.0.5359.124-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250888" version="1" class="patch">
	<metadata>
		<title>jettison-1.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45685" ref_url="https://www.suse.com/security/cve/CVE-2022-45685/" source="CVE"/>
		<reference ref_id="CVE-2022-45693" ref_url="https://www.suse.com/security/cve/CVE-2022-45693/" source="CVE"/>
		<description>
These are all security issues fixed in the jettison-1.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45685/">CVE-2022-45685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45685">CVE-2022-45685 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45693/">CVE-2022-45693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45693">CVE-2022-45693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928330" comment="jettison-1.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928331" comment="jettison-javadoc-1.5.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250889" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928332" comment="libmozjs-102-0-102.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928333" comment="mozjs102-102.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928334" comment="mozjs102-devel-102.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250890" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.4-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928335" comment="xorg-x11-server-21.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928336" comment="xorg-x11-server-Xvfb-21.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928337" comment="xorg-x11-server-extra-21.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928338" comment="xorg-x11-server-sdk-21.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928339" comment="xorg-x11-server-source-21.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928340" comment="xorg-x11-server-wrapper-21.1.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250891" version="1" class="patch">
	<metadata>
		<title>xwayland-22.1.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-22.1.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928341" comment="xwayland-22.1.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928342" comment="xwayland-devel-22.1.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250892" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928343" comment="MozillaThunderbird-102.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928344" comment="MozillaThunderbird-translations-common-102.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928345" comment="MozillaThunderbird-translations-other-102.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250893" version="1" class="patch">
	<metadata>
		<title>helm-3.10.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23524" ref_url="https://www.suse.com/security/cve/CVE-2022-23524/" source="CVE"/>
		<reference ref_id="CVE-2022-23525" ref_url="https://www.suse.com/security/cve/CVE-2022-23525/" source="CVE"/>
		<reference ref_id="CVE-2022-23526" ref_url="https://www.suse.com/security/cve/CVE-2022-23526/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.10.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23524/">CVE-2022-23524 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23524">CVE-2022-23524 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23525/">CVE-2022-23525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23525">CVE-2022-23525 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23526/">CVE-2022-23526 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23526">CVE-2022-23526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928346" comment="helm-3.10.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928347" comment="helm-bash-completion-3.10.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928348" comment="helm-fish-completion-3.10.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928349" comment="helm-zsh-completion-3.10.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250894" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3996" ref_url="https://www.suse.com/security/cve/CVE-2022-3996/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3996/">CVE-2022-3996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3996">CVE-2022-3996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928350" comment="libopenssl-3-devel-3.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928351" comment="libopenssl-3-devel-32bit-3.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928352" comment="libopenssl3-3.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928353" comment="libopenssl3-32bit-3.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928354" comment="openssl-3-3.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928355" comment="openssl-3-doc-3.0.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250895" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.40.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.40.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46908">CVE-2022-46908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928356" comment="libsqlite3-0-3.40.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928357" comment="libsqlite3-0-32bit-3.40.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928358" comment="sqlite3-3.40.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928359" comment="sqlite3-devel-3.40.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928360" comment="sqlite3-doc-3.40.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928361" comment="sqlite3-tcl-3.40.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250896" version="1" class="patch">
	<metadata>
		<title>python310-mitmproxy-9.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mitmproxy-9.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928362" comment="python310-mitmproxy-9.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928363" comment="python39-mitmproxy-9.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250897" version="1" class="patch">
	<metadata>
		<title>libsystemd0-252.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-252.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928364" comment="libsystemd0-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928365" comment="libsystemd0-32bit-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928366" comment="libudev1-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928367" comment="libudev1-32bit-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928368" comment="systemd-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928369" comment="systemd-32bit-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928370" comment="systemd-container-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928371" comment="systemd-coredump-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928372" comment="systemd-devel-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928373" comment="systemd-doc-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928374" comment="systemd-experimental-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928375" comment="systemd-journal-remote-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928376" comment="systemd-lang-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928377" comment="systemd-network-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928378" comment="systemd-portable-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928379" comment="systemd-sysvcompat-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928380" comment="systemd-testsuite-252.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928381" comment="udev-252.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250898" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-108.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46873" ref_url="https://www.suse.com/security/cve/CVE-2022-46873/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46879" ref_url="https://www.suse.com/security/cve/CVE-2022-46879/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-108.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46873/">CVE-2022-46873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46873">CVE-2022-46873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46879/">CVE-2022-46879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46879">CVE-2022-46879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928382" comment="MozillaFirefox-108.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928383" comment="MozillaFirefox-branding-upstream-108.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928384" comment="MozillaFirefox-devel-108.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928385" comment="MozillaFirefox-translations-common-108.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928386" comment="MozillaFirefox-translations-other-108.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250899" version="1" class="patch">
	<metadata>
		<title>libosip2-15-5.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41550" ref_url="https://www.suse.com/security/cve/CVE-2022-41550/" source="CVE"/>
		<description>
These are all security issues fixed in the libosip2-15-5.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41550/">CVE-2022-41550 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41550">CVE-2022-41550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928387" comment="libosip2-15-5.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928388" comment="libosip2-devel-5.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250900" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928390" comment="kernel-macros-6.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928391" comment="kernel-source-6.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928392" comment="kernel-source-vanilla-6.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250901" version="1" class="patch">
	<metadata>
		<title>libasn1-8-7.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2021-3671" ref_url="https://www.suse.com/security/cve/CVE-2021-3671/" source="CVE"/>
		<reference ref_id="CVE-2021-44758" ref_url="https://www.suse.com/security/cve/CVE-2021-44758/" source="CVE"/>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-41916" ref_url="https://www.suse.com/security/cve/CVE-2022-41916/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="CVE-2022-44640" ref_url="https://www.suse.com/security/cve/CVE-2022-44640/" source="CVE"/>
		<description>
These are all security issues fixed in the libasn1-8-7.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14870">CVE-2019-14870 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3671/">CVE-2021-3671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">CVE-2021-3671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44758/">CVE-2021-44758 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44758">CVE-2021-44758 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3437">CVE-2022-3437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41916/">CVE-2022-41916 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41916">CVE-2022-41916 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44640/">CVE-2022-44640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44640">CVE-2022-44640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928393" comment="libasn1-8-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928394" comment="libgssapi3-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928395" comment="libhcrypto4-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928396" comment="libhdb9-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928397" comment="libheimbase1-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928398" comment="libheimdal-devel-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928399" comment="libheimedit0-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928400" comment="libheimntlm0-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928401" comment="libhx509-5-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928402" comment="libkadm5clnt7-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928403" comment="libkadm5srv8-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928404" comment="libkafs0-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928405" comment="libkdc2-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928406" comment="libkrb5-26-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928407" comment="libotp0-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928408" comment="libroken18-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928409" comment="libsl0-7.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928410" comment="libwind0-7.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250902" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46393" ref_url="https://www.suse.com/security/cve/CVE-2022-46393/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46393/">CVE-2022-46393 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46393">CVE-2022-46393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928411" comment="libmbedcrypto7-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928412" comment="libmbedcrypto7-32bit-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928413" comment="libmbedtls14-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928414" comment="libmbedtls14-32bit-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928415" comment="libmbedx509-1-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928416" comment="libmbedx509-1-32bit-2.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928417" comment="mbedtls-devel-2.28.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250903" version="1" class="patch">
	<metadata>
		<title>libvlc5-3.0.18-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41325" ref_url="https://www.suse.com/security/cve/CVE-2022-41325/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-3.0.18-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41325/">CVE-2022-41325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41325">CVE-2022-41325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928418" comment="libvlc5-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928419" comment="libvlccore9-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928420" comment="vlc-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928421" comment="vlc-codec-gstreamer-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928422" comment="vlc-devel-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928423" comment="vlc-jack-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928424" comment="vlc-lang-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928425" comment="vlc-noX-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928426" comment="vlc-opencv-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928427" comment="vlc-qt-3.0.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928428" comment="vlc-vdpau-3.0.18-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250904" version="1" class="patch">
	<metadata>
		<title>curl-7.87.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43551" ref_url="https://www.suse.com/security/cve/CVE-2022-43551/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.87.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-43551/">CVE-2022-43551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928429" comment="curl-7.87.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928430" comment="libcurl-devel-7.87.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928431" comment="libcurl-devel-32bit-7.87.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928432" comment="libcurl4-7.87.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928433" comment="libcurl4-32bit-7.87.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250905" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.4.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23527" ref_url="https://www.suse.com/security/cve/CVE-2022-23527/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.4.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23527/">CVE-2022-23527 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23527">CVE-2022-23527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928434" comment="apache2-mod_auth_openidc-2.4.12.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250906" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3109" ref_url="https://www.suse.com/security/cve/CVE-2022-3109/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3109/">CVE-2022-3109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3109">CVE-2022-3109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928435" comment="ffmpeg-4-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928436" comment="ffmpeg-4-libavcodec-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928437" comment="ffmpeg-4-libavdevice-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928438" comment="ffmpeg-4-libavfilter-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928439" comment="ffmpeg-4-libavformat-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928440" comment="ffmpeg-4-libavresample-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928441" comment="ffmpeg-4-libavutil-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928442" comment="ffmpeg-4-libpostproc-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928443" comment="ffmpeg-4-libswresample-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928444" comment="ffmpeg-4-libswscale-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928445" comment="ffmpeg-4-private-devel-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928446" comment="libavcodec58_134-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928447" comment="libavcodec58_134-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928448" comment="libavdevice58_13-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928449" comment="libavdevice58_13-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928450" comment="libavfilter7_110-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928451" comment="libavfilter7_110-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928452" comment="libavformat58_76-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928453" comment="libavformat58_76-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928454" comment="libavresample4_0-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928455" comment="libavresample4_0-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928456" comment="libavutil56_70-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928457" comment="libavutil56_70-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928458" comment="libpostproc55_9-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928459" comment="libpostproc55_9-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928460" comment="libswresample3_9-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928461" comment="libswresample3_9-32bit-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928462" comment="libswscale5_9-4.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928463" comment="libswscale5_9-32bit-4.4.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250907" version="1" class="patch">
	<metadata>
		<title>python310-py7zr-0.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44900" ref_url="https://www.suse.com/security/cve/CVE-2022-44900/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-py7zr-0.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44900/">CVE-2022-44900 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44900">CVE-2022-44900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928464" comment="python310-py7zr-0.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928465" comment="python38-py7zr-0.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928466" comment="python39-py7zr-0.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250908" version="1" class="patch">
	<metadata>
		<title>ctdb-4.17.4+git.300.305b22bfce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37966" ref_url="https://www.suse.com/security/cve/CVE-2022-37966/" source="CVE"/>
		<reference ref_id="CVE-2022-37967" ref_url="https://www.suse.com/security/cve/CVE-2022-37967/" source="CVE"/>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<reference ref_id="CVE-2022-44640" ref_url="https://www.suse.com/security/cve/CVE-2022-44640/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.17.4+git.300.305b22bfce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37966/">CVE-2022-37966 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37966">CVE-2022-37966 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37967/">CVE-2022-37967 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37967">CVE-2022-37967 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44640/">CVE-2022-44640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44640">CVE-2022-44640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928467" comment="ctdb-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928468" comment="ctdb-pcp-pmda-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928469" comment="libsamba-policy-devel-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928470" comment="libsamba-policy-python3-devel-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928471" comment="libsamba-policy0-python3-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928472" comment="libsamba-policy0-python3-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928473" comment="samba-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928474" comment="samba-ad-dc-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928475" comment="samba-ad-dc-libs-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928476" comment="samba-ad-dc-libs-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928477" comment="samba-ceph-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928478" comment="samba-client-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928479" comment="samba-client-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928480" comment="samba-client-libs-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928481" comment="samba-client-libs-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928482" comment="samba-devel-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928483" comment="samba-devel-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928484" comment="samba-doc-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928485" comment="samba-dsdb-modules-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928486" comment="samba-gpupdate-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928487" comment="samba-ldb-ldap-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928488" comment="samba-libs-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928489" comment="samba-libs-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928490" comment="samba-libs-python3-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928491" comment="samba-libs-python3-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928492" comment="samba-python3-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928493" comment="samba-test-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928494" comment="samba-tool-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928495" comment="samba-winbind-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928496" comment="samba-winbind-libs-4.17.4+git.300.305b22bfce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928497" comment="samba-winbind-libs-32bit-4.17.4+git.300.305b22bfce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250909" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928498" comment="bsdtar-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928499" comment="libarchive-devel-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928500" comment="libarchive13-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928501" comment="libarchive13-32bit-3.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250910" version="1" class="patch">
	<metadata>
		<title>OpenImageIO-2.4.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-43592" ref_url="https://www.suse.com/security/cve/CVE-2022-43592/" source="CVE"/>
		<reference ref_id="CVE-2022-43593" ref_url="https://www.suse.com/security/cve/CVE-2022-43593/" source="CVE"/>
		<reference ref_id="CVE-2022-43594" ref_url="https://www.suse.com/security/cve/CVE-2022-43594/" source="CVE"/>
		<reference ref_id="CVE-2022-43595" ref_url="https://www.suse.com/security/cve/CVE-2022-43595/" source="CVE"/>
		<reference ref_id="CVE-2022-43596" ref_url="https://www.suse.com/security/cve/CVE-2022-43596/" source="CVE"/>
		<reference ref_id="CVE-2022-43597" ref_url="https://www.suse.com/security/cve/CVE-2022-43597/" source="CVE"/>
		<reference ref_id="CVE-2022-43599" ref_url="https://www.suse.com/security/cve/CVE-2022-43599/" source="CVE"/>
		<reference ref_id="CVE-2022-43603" ref_url="https://www.suse.com/security/cve/CVE-2022-43603/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenImageIO-2.4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43592/">CVE-2022-43592 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43592">CVE-2022-43592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43593/">CVE-2022-43593 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43593">CVE-2022-43593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43594/">CVE-2022-43594 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43594">CVE-2022-43594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43595/">CVE-2022-43595 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43595">CVE-2022-43595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43596/">CVE-2022-43596 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43596">CVE-2022-43596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43597/">CVE-2022-43597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-43597">CVE-2022-43597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43599/">CVE-2022-43599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-43599">CVE-2022-43599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-43603/">CVE-2022-43603 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43603">CVE-2022-43603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928502" comment="OpenImageIO-2.4.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928503" comment="OpenImageIO-devel-2.4.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928504" comment="libOpenImageIO2_4-2.4.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928505" comment="libOpenImageIO_Util2_4-2.4.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928506" comment="python3-OpenImageIO-2.4.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250911" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3038" ref_url="https://www.suse.com/security/cve/CVE-2022-3038/" source="CVE"/>
		<reference ref_id="CVE-2022-3040" ref_url="https://www.suse.com/security/cve/CVE-2022-3040/" source="CVE"/>
		<reference ref_id="CVE-2022-3041" ref_url="https://www.suse.com/security/cve/CVE-2022-3041/" source="CVE"/>
		<reference ref_id="CVE-2022-3046" ref_url="https://www.suse.com/security/cve/CVE-2022-3046/" source="CVE"/>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="CVE-2022-3304" ref_url="https://www.suse.com/security/cve/CVE-2022-3304/" source="CVE"/>
		<reference ref_id="CVE-2022-3370" ref_url="https://www.suse.com/security/cve/CVE-2022-3370/" source="CVE"/>
		<reference ref_id="CVE-2022-3373" ref_url="https://www.suse.com/security/cve/CVE-2022-3373/" source="CVE"/>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3885" ref_url="https://www.suse.com/security/cve/CVE-2022-3885/" source="CVE"/>
		<reference ref_id="CVE-2022-3887" ref_url="https://www.suse.com/security/cve/CVE-2022-3887/" source="CVE"/>
		<reference ref_id="CVE-2022-3889" ref_url="https://www.suse.com/security/cve/CVE-2022-3889/" source="CVE"/>
		<reference ref_id="CVE-2022-3890" ref_url="https://www.suse.com/security/cve/CVE-2022-3890/" source="CVE"/>
		<reference ref_id="CVE-2022-4174" ref_url="https://www.suse.com/security/cve/CVE-2022-4174/" source="CVE"/>
		<reference ref_id="CVE-2022-4180" ref_url="https://www.suse.com/security/cve/CVE-2022-4180/" source="CVE"/>
		<reference ref_id="CVE-2022-4181" ref_url="https://www.suse.com/security/cve/CVE-2022-4181/" source="CVE"/>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3038/">CVE-2022-3038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3038">CVE-2022-3038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3040/">CVE-2022-3040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3040">CVE-2022-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3041/">CVE-2022-3041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3041">CVE-2022-3041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3046/">CVE-2022-3046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3046">CVE-2022-3046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3075">CVE-2022-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3196">CVE-2022-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3197">CVE-2022-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3198">CVE-2022-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3199">CVE-2022-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3200">CVE-2022-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3201">CVE-2022-3201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3304/">CVE-2022-3304 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3304">CVE-2022-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3370/">CVE-2022-3370 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3370">CVE-2022-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3373/">CVE-2022-3373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3373">CVE-2022-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3445">CVE-2022-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3446">CVE-2022-3446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3885/">CVE-2022-3885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3885">CVE-2022-3885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3887/">CVE-2022-3887 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3887">CVE-2022-3887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3889/">CVE-2022-3889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3889">CVE-2022-3889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3890/">CVE-2022-3890 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3890">CVE-2022-3890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4174/">CVE-2022-4174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4174">CVE-2022-4174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4180/">CVE-2022-4180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4180">CVE-2022-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4181/">CVE-2022-4181 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4181">CVE-2022-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262">CVE-2022-4262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928507" comment="libQt5Pdf5-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928508" comment="libQt5PdfWidgets5-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928509" comment="libqt5-qtpdf-devel-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928510" comment="libqt5-qtpdf-examples-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928511" comment="libqt5-qtpdf-imports-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928512" comment="libqt5-qtpdf-private-headers-devel-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928513" comment="libqt5-qtwebengine-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928514" comment="libqt5-qtwebengine-devel-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928515" comment="libqt5-qtwebengine-examples-5.15.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928516" comment="libqt5-qtwebengine-private-headers-devel-5.15.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250912" version="1" class="patch">
	<metadata>
		<title>exiv2-0.27.5-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29458" ref_url="https://www.suse.com/security/cve/CVE-2021-29458/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.27.5-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29458/">CVE-2021-29458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29458">CVE-2021-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928517" comment="exiv2-0.27.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928518" comment="exiv2-lang-0.27.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928519" comment="libexiv2-27-0.27.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928520" comment="libexiv2-27-32bit-0.27.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928521" comment="libexiv2-devel-0.27.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928522" comment="libexiv2-xmp-static-0.27.5-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250913" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-puma-5-5.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-puma-5-5.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29509">CVE-2021-29509 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928523" comment="ruby3.1-rubygem-puma-5-5.6.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250914" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46169" ref_url="https://www.suse.com/security/cve/CVE-2022-46169/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46169/">CVE-2022-46169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46169">CVE-2022-46169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928524" comment="cacti-1.2.23-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250915" version="1" class="patch">
	<metadata>
		<title>libesmtp-devel-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
These are all security issues fixed in the libesmtp-devel-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928525" comment="libesmtp-devel-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928526" comment="libesmtp6_2_0-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250916" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928527" comment="libksba-devel-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928528" comment="libksba8-1.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250917" version="1" class="patch">
	<metadata>
		<title>python310-GitPython-3.1.30.1672298042.141cd65-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24439" ref_url="https://www.suse.com/security/cve/CVE-2022-24439/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-GitPython-3.1.30.1672298042.141cd65-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24439/">CVE-2022-24439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24439">CVE-2022-24439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928529" comment="python310-GitPython-3.1.30.1672298042.141cd65-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928530" comment="python38-GitPython-3.1.30.1672298042.141cd65-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928531" comment="python39-GitPython-3.1.30.1672298042.141cd65-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250918" version="1" class="patch">
	<metadata>
		<title>python310-future-0.18.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-future-0.18.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928532" comment="python310-future-0.18.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928533" comment="python38-future-0.18.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928534" comment="python39-future-0.18.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250919" version="1" class="patch">
	<metadata>
		<title>libsnmp40-32bit-5.9.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp40-32bit-5.9.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928535" comment="libsnmp40-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928536" comment="libsnmp40-32bit-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928537" comment="net-snmp-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928538" comment="net-snmp-devel-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928539" comment="net-snmp-devel-32bit-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928540" comment="perl-SNMP-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928541" comment="python310-net-snmp-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928542" comment="python38-net-snmp-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928543" comment="python39-net-snmp-5.9.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928544" comment="snmp-mibs-5.9.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250920" version="1" class="patch">
	<metadata>
		<title>cni-1.1.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38561" ref_url="https://www.suse.com/security/cve/CVE-2021-38561/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-1.1.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38561/">CVE-2021-38561 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928545" comment="cni-1.1.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250921" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928546" comment="docker-compose-2.15.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250922" version="1" class="patch">
	<metadata>
		<title>php8-8.1.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928547" comment="php8-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928548" comment="php8-bcmath-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928549" comment="php8-bz2-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928550" comment="php8-calendar-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928551" comment="php8-cli-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928552" comment="php8-ctype-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928553" comment="php8-curl-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928554" comment="php8-dba-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928555" comment="php8-devel-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928556" comment="php8-dom-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928557" comment="php8-enchant-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928558" comment="php8-exif-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928559" comment="php8-ffi-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928560" comment="php8-fileinfo-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928561" comment="php8-ftp-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928562" comment="php8-gd-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928563" comment="php8-gettext-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928564" comment="php8-gmp-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928565" comment="php8-iconv-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928566" comment="php8-intl-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928567" comment="php8-ldap-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928568" comment="php8-mbstring-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928569" comment="php8-mysql-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928570" comment="php8-odbc-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928571" comment="php8-opcache-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928572" comment="php8-openssl-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928573" comment="php8-pcntl-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928574" comment="php8-pdo-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928575" comment="php8-pgsql-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928576" comment="php8-phar-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928577" comment="php8-posix-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928578" comment="php8-readline-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928579" comment="php8-shmop-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928580" comment="php8-snmp-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928581" comment="php8-soap-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928582" comment="php8-sockets-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928583" comment="php8-sodium-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928584" comment="php8-sqlite-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928585" comment="php8-sysvmsg-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928586" comment="php8-sysvsem-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928587" comment="php8-sysvshm-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928588" comment="php8-tidy-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928589" comment="php8-tokenizer-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928590" comment="php8-xmlreader-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928591" comment="php8-xmlwriter-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928592" comment="php8-xsl-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928593" comment="php8-zip-8.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928594" comment="php8-zlib-8.1.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250923" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.20-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23468" ref_url="https://www.suse.com/security/cve/CVE-2022-23468/" source="CVE"/>
		<reference ref_id="CVE-2022-23477" ref_url="https://www.suse.com/security/cve/CVE-2022-23477/" source="CVE"/>
		<reference ref_id="CVE-2022-23478" ref_url="https://www.suse.com/security/cve/CVE-2022-23478/" source="CVE"/>
		<reference ref_id="CVE-2022-23479" ref_url="https://www.suse.com/security/cve/CVE-2022-23479/" source="CVE"/>
		<reference ref_id="CVE-2022-23480" ref_url="https://www.suse.com/security/cve/CVE-2022-23480/" source="CVE"/>
		<reference ref_id="CVE-2022-23481" ref_url="https://www.suse.com/security/cve/CVE-2022-23481/" source="CVE"/>
		<reference ref_id="CVE-2022-23482" ref_url="https://www.suse.com/security/cve/CVE-2022-23482/" source="CVE"/>
		<reference ref_id="CVE-2022-23483" ref_url="https://www.suse.com/security/cve/CVE-2022-23483/" source="CVE"/>
		<reference ref_id="CVE-2022-23484" ref_url="https://www.suse.com/security/cve/CVE-2022-23484/" source="CVE"/>
		<reference ref_id="CVE-2022-23493" ref_url="https://www.suse.com/security/cve/CVE-2022-23493/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.20-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23468/">CVE-2022-23468 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23468">CVE-2022-23468 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23477/">CVE-2022-23477 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23477">CVE-2022-23477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23478/">CVE-2022-23478 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23478">CVE-2022-23478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23479/">CVE-2022-23479 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23479">CVE-2022-23479 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23480/">CVE-2022-23480 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23480">CVE-2022-23480 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23481/">CVE-2022-23481 at SUSE</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23481">CVE-2022-23481 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23482/">CVE-2022-23482 at SUSE</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23482">CVE-2022-23482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23483/">CVE-2022-23483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23483">CVE-2022-23483 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23484/">CVE-2022-23484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23484">CVE-2022-23484 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23493/">CVE-2022-23493 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23493">CVE-2022-23493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928595" comment="libpainter0-0.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928596" comment="librfxencode0-0.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928597" comment="xrdp-0.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928598" comment="xrdp-devel-0.9.20-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250924" version="1" class="patch">
	<metadata>
		<title>cmctl-1.10.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23525" ref_url="https://www.suse.com/security/cve/CVE-2022-23525/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-1.10.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23525/">CVE-2022-23525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23525">CVE-2022-23525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928599" comment="cmctl-1.10.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250925" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928600" comment="libtiff-devel-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928601" comment="libtiff-devel-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928602" comment="libtiff6-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928603" comment="libtiff6-32bit-4.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928604" comment="tiff-4.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250926" version="1" class="patch">
	<metadata>
		<title>chromedriver-109.0.5414.74-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0128" ref_url="https://www.suse.com/security/cve/CVE-2023-0128/" source="CVE"/>
		<reference ref_id="CVE-2023-0129" ref_url="https://www.suse.com/security/cve/CVE-2023-0129/" source="CVE"/>
		<reference ref_id="CVE-2023-0130" ref_url="https://www.suse.com/security/cve/CVE-2023-0130/" source="CVE"/>
		<reference ref_id="CVE-2023-0131" ref_url="https://www.suse.com/security/cve/CVE-2023-0131/" source="CVE"/>
		<reference ref_id="CVE-2023-0132" ref_url="https://www.suse.com/security/cve/CVE-2023-0132/" source="CVE"/>
		<reference ref_id="CVE-2023-0133" ref_url="https://www.suse.com/security/cve/CVE-2023-0133/" source="CVE"/>
		<reference ref_id="CVE-2023-0134" ref_url="https://www.suse.com/security/cve/CVE-2023-0134/" source="CVE"/>
		<reference ref_id="CVE-2023-0135" ref_url="https://www.suse.com/security/cve/CVE-2023-0135/" source="CVE"/>
		<reference ref_id="CVE-2023-0136" ref_url="https://www.suse.com/security/cve/CVE-2023-0136/" source="CVE"/>
		<reference ref_id="CVE-2023-0137" ref_url="https://www.suse.com/security/cve/CVE-2023-0137/" source="CVE"/>
		<reference ref_id="CVE-2023-0138" ref_url="https://www.suse.com/security/cve/CVE-2023-0138/" source="CVE"/>
		<reference ref_id="CVE-2023-0139" ref_url="https://www.suse.com/security/cve/CVE-2023-0139/" source="CVE"/>
		<reference ref_id="CVE-2023-0140" ref_url="https://www.suse.com/security/cve/CVE-2023-0140/" source="CVE"/>
		<reference ref_id="CVE-2023-0141" ref_url="https://www.suse.com/security/cve/CVE-2023-0141/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-109.0.5414.74-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0128/">CVE-2023-0128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0128">CVE-2023-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0129/">CVE-2023-0129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0129">CVE-2023-0129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0130/">CVE-2023-0130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0130">CVE-2023-0130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0131/">CVE-2023-0131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0131">CVE-2023-0131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0132/">CVE-2023-0132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0132">CVE-2023-0132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0133/">CVE-2023-0133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0133">CVE-2023-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0134/">CVE-2023-0134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0134">CVE-2023-0134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0135/">CVE-2023-0135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0135">CVE-2023-0135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0136/">CVE-2023-0136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0136">CVE-2023-0136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0137/">CVE-2023-0137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0137">CVE-2023-0137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0138/">CVE-2023-0138 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0138">CVE-2023-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0139/">CVE-2023-0139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0139">CVE-2023-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0140/">CVE-2023-0140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0140">CVE-2023-0140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0141/">CVE-2023-0141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0141">CVE-2023-0141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928605" comment="chromedriver-109.0.5414.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928606" comment="chromium-109.0.5414.74-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250927" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.2.25-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.2.25-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928607" comment="postgresql-jdbc-42.2.25-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928608" comment="postgresql-jdbc-javadoc-42.2.25-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250928" version="1" class="patch">
	<metadata>
		<title>cargo1.65-1.65.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46176" ref_url="https://www.suse.com/security/cve/CVE-2022-46176/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.65-1.65.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46176/">CVE-2022-46176 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46176">CVE-2022-46176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928609" comment="cargo1.65-1.65.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928610" comment="rust1.65-1.65.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250929" version="1" class="patch">
	<metadata>
		<title>cargo1.66-1.66.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46176" ref_url="https://www.suse.com/security/cve/CVE-2022-46176/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.66-1.66.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46176/">CVE-2022-46176 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46176">CVE-2022-46176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928611" comment="cargo1.66-1.66.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928612" comment="rust1.66-1.66.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250930" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-21.3.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4174" ref_url="https://www.suse.com/security/cve/CVE-2022-4174/" source="CVE"/>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<reference ref_id="CVE-2022-4436" ref_url="https://www.suse.com/security/cve/CVE-2022-4436/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-21.3.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4174/">CVE-2022-4174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4174">CVE-2022-4174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262">CVE-2022-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4436/">CVE-2022-4436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4436">CVE-2022-4436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928613" comment="nodejs-electron-21.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928614" comment="nodejs-electron-devel-21.3.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928615" comment="nodejs-electron-doc-21.3.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250931" version="1" class="patch">
	<metadata>
		<title>rage-encryption-0.9.0+0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22895" ref_url="https://www.suse.com/security/cve/CVE-2023-22895/" source="CVE"/>
		<description>
These are all security issues fixed in the rage-encryption-0.9.0+0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22895/">CVE-2023-22895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22895">CVE-2023-22895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928616" comment="rage-encryption-0.9.0+0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928617" comment="rage-encryption-bash-completion-0.9.0+0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250932" version="1" class="patch">
	<metadata>
		<title>squirrel-3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41556" ref_url="https://www.suse.com/security/cve/CVE-2021-41556/" source="CVE"/>
		<description>
These are all security issues fixed in the squirrel-3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41556/">CVE-2021-41556 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41556">CVE-2021-41556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928618" comment="squirrel-3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928619" comment="squirrel-devel-3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928620" comment="squirrel-devel-static-3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928621" comment="squirrel-doc-3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928622" comment="squirrel-examples-3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250933" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20180125-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38223" ref_url="https://www.suse.com/security/cve/CVE-2022-38223/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20180125-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38223/">CVE-2022-38223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38223">CVE-2022-38223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928623" comment="w3m-0.5.3+git20180125-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928624" comment="w3m-inline-image-0.5.3+git20180125-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250934" version="1" class="patch">
	<metadata>
		<title>upx-4.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23457" ref_url="https://www.suse.com/security/cve/CVE-2023-23457/" source="CVE"/>
		<description>
These are all security issues fixed in the upx-4.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23457/">CVE-2023-23457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23457">CVE-2023-23457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928625" comment="upx-4.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250935" version="1" class="patch">
	<metadata>
		<title>python310-cramjam-2.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22895" ref_url="https://www.suse.com/security/cve/CVE-2023-22895/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cramjam-2.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22895/">CVE-2023-22895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22895">CVE-2023-22895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928626" comment="python310-cramjam-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928627" comment="python38-cramjam-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928628" comment="python39-cramjam-2.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250936" version="1" class="patch">
	<metadata>
		<title>traefik-2.9.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23469" ref_url="https://www.suse.com/security/cve/CVE-2022-23469/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-46153" ref_url="https://www.suse.com/security/cve/CVE-2022-46153/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-2.9.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23469/">CVE-2022-23469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23469">CVE-2022-23469 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46153/">CVE-2022-46153 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46153">CVE-2022-46153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928629" comment="traefik-2.9.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250937" version="1" class="patch">
	<metadata>
		<title>wasm-pack-0.10.3~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22895" ref_url="https://www.suse.com/security/cve/CVE-2023-22895/" source="CVE"/>
		<description>
These are all security issues fixed in the wasm-pack-0.10.3~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22895/">CVE-2023-22895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22895">CVE-2023-22895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928630" comment="wasm-pack-0.10.3~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250938" version="1" class="patch">
	<metadata>
		<title>libXpm-devel-3.5.14-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm-devel-3.5.14-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928631" comment="libXpm-devel-3.5.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928632" comment="libXpm-devel-32bit-3.5.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928633" comment="libXpm-tools-3.5.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928634" comment="libXpm4-3.5.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928635" comment="libXpm4-32bit-3.5.14-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250939" version="1" class="patch">
	<metadata>
		<title>mpd-0.23.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46449" ref_url="https://www.suse.com/security/cve/CVE-2022-46449/" source="CVE"/>
		<description>
These are all security issues fixed in the mpd-0.23.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46449/">CVE-2022-46449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46449">CVE-2022-46449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928636" comment="mpd-0.23.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928637" comment="mpd-doc-0.23.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250940" version="1" class="patch">
	<metadata>
		<title>redis-7.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35977" ref_url="https://www.suse.com/security/cve/CVE-2022-35977/" source="CVE"/>
		<reference ref_id="CVE-2023-22458" ref_url="https://www.suse.com/security/cve/CVE-2023-22458/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35977/">CVE-2022-35977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35977">CVE-2022-35977 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22458/">CVE-2023-22458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22458">CVE-2023-22458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928638" comment="redis-7.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250941" version="1" class="patch">
	<metadata>
		<title>libtree-sitter0-0.20.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45299" ref_url="https://www.suse.com/security/cve/CVE-2022-45299/" source="CVE"/>
		<description>
These are all security issues fixed in the libtree-sitter0-0.20.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45299/">CVE-2022-45299 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45299">CVE-2022-45299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928639" comment="libtree-sitter0-0.20.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928640" comment="tree-sitter-0.20.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928641" comment="tree-sitter-devel-0.20.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250942" version="1" class="patch">
	<metadata>
		<title>python310-mechanize-0.4.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32837" ref_url="https://www.suse.com/security/cve/CVE-2021-32837/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mechanize-0.4.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32837/">CVE-2021-32837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32837">CVE-2021-32837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928642" comment="python310-mechanize-0.4.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928643" comment="python38-mechanize-0.4.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928644" comment="python39-mechanize-0.4.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250943" version="1" class="patch">
	<metadata>
		<title>libwbxml2-1-0.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
These are all security issues fixed in the libwbxml2-1-0.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928645" comment="libwbxml2-1-0.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928646" comment="libwbxml2-devel-0.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928647" comment="wbxml2-tools-0.11.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250944" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-109.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23597" ref_url="https://www.suse.com/security/cve/CVE-2023-23597/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23600" ref_url="https://www.suse.com/security/cve/CVE-2023-23600/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23604" ref_url="https://www.suse.com/security/cve/CVE-2023-23604/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<reference ref_id="CVE-2023-23606" ref_url="https://www.suse.com/security/cve/CVE-2023-23606/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-109.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23597/">CVE-2023-23597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23597">CVE-2023-23597 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23600/">CVE-2023-23600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23600">CVE-2023-23600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23604/">CVE-2023-23604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23604">CVE-2023-23604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23606/">CVE-2023-23606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23606">CVE-2023-23606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928648" comment="MozillaFirefox-109.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928649" comment="MozillaFirefox-branding-upstream-109.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928650" comment="MozillaFirefox-devel-109.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928651" comment="MozillaFirefox-translations-common-109.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928652" comment="MozillaFirefox-translations-other-109.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250945" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4515" ref_url="https://www.suse.com/security/cve/CVE-2022-4515/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4515/">CVE-2022-4515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4515">CVE-2022-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928653" comment="ctags-5.8-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250946" version="1" class="patch">
	<metadata>
		<title>git-2.39.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.39.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928654" comment="git-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928655" comment="git-arch-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928656" comment="git-core-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928657" comment="git-credential-gnome-keyring-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928658" comment="git-credential-libsecret-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928659" comment="git-cvs-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928660" comment="git-daemon-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928661" comment="git-doc-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928662" comment="git-email-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928663" comment="git-gui-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928664" comment="git-p4-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928665" comment="git-svn-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928666" comment="git-web-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928667" comment="gitk-2.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928668" comment="perl-Git-2.39.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250947" version="1" class="patch">
	<metadata>
		<title>libzypp-plugin-appdata-1.0.1+git.20220816-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22643" ref_url="https://www.suse.com/security/cve/CVE-2023-22643/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-plugin-appdata-1.0.1+git.20220816-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22643/">CVE-2023-22643 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22643">CVE-2023-22643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928669" comment="libzypp-plugin-appdata-1.0.1+git.20220816-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928670" comment="openSUSE-appdata-extra-1.0.1+git.20220816-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250948" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928671" comment="libmozjs-102-0-102.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928672" comment="mozjs102-102.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928673" comment="mozjs102-devel-102.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250949" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22617" ref_url="https://www.suse.com/security/cve/CVE-2023-22617/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22617/">CVE-2023-22617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22617">CVE-2023-22617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928674" comment="pdns-recursor-4.8.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250950" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-3.2.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-3.2.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928675" comment="libtss2-esys0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928676" comment="libtss2-esys0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928677" comment="libtss2-fapi1-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928678" comment="libtss2-fapi1-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928679" comment="libtss2-mu0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928680" comment="libtss2-mu0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928681" comment="libtss2-rc0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928682" comment="libtss2-rc0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928683" comment="libtss2-sys1-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928684" comment="libtss2-sys1-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928685" comment="libtss2-tcti-cmd0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928686" comment="libtss2-tcti-cmd0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928687" comment="libtss2-tcti-device0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928688" comment="libtss2-tcti-device0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928689" comment="libtss2-tcti-mssim0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928690" comment="libtss2-tcti-mssim0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928691" comment="libtss2-tcti-pcap0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928692" comment="libtss2-tcti-swtpm0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928693" comment="libtss2-tcti-swtpm0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928694" comment="libtss2-tctildr0-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928695" comment="libtss2-tctildr0-32bit-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928696" comment="tpm2-0-tss-3.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928697" comment="tpm2-0-tss-devel-3.2.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250951" version="1" class="patch">
	<metadata>
		<title>EternalTerminal-6.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48257" ref_url="https://www.suse.com/security/cve/CVE-2022-48257/" source="CVE"/>
		<reference ref_id="CVE-2022-48258" ref_url="https://www.suse.com/security/cve/CVE-2022-48258/" source="CVE"/>
		<description>
These are all security issues fixed in the EternalTerminal-6.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48257/">CVE-2022-48257 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48257">CVE-2022-48257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48258/">CVE-2022-48258 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48258">CVE-2022-48258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928698" comment="EternalTerminal-6.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250952" version="1" class="patch">
	<metadata>
		<title>binutils-2.39-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3648" ref_url="https://www.suse.com/security/cve/CVE-2021-3648/" source="CVE"/>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<reference ref_id="CVE-2021-45078" ref_url="https://www.suse.com/security/cve/CVE-2021-45078/" source="CVE"/>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<reference ref_id="CVE-2022-27943" ref_url="https://www.suse.com/security/cve/CVE-2022-27943/" source="CVE"/>
		<reference ref_id="CVE-2022-38126" ref_url="https://www.suse.com/security/cve/CVE-2022-38126/" source="CVE"/>
		<reference ref_id="CVE-2022-38127" ref_url="https://www.suse.com/security/cve/CVE-2022-38127/" source="CVE"/>
		<reference ref_id="CVE-2022-38533" ref_url="https://www.suse.com/security/cve/CVE-2022-38533/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.39-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3648/">CVE-2021-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3648">CVE-2021-3648 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45078/">CVE-2021-45078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27943/">CVE-2022-27943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38126/">CVE-2022-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38126">CVE-2022-38126 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38127/">CVE-2022-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38127">CVE-2022-38127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38533/">CVE-2022-38533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928699" comment="binutils-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928700" comment="binutils-devel-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928701" comment="binutils-devel-32bit-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928702" comment="binutils-gold-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928703" comment="gprofng-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928704" comment="libctf-nobfd0-2.39-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928705" comment="libctf0-2.39-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250953" version="1" class="patch">
	<metadata>
		<title>libgit2-1.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22742" ref_url="https://www.suse.com/security/cve/CVE-2023-22742/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22742/">CVE-2023-22742 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22742">CVE-2023-22742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928706" comment="libgit2-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928707" comment="libgit2-1_5-1.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928708" comment="libgit2-devel-1.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250954" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-3.0.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-3.0.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928709" comment="ruby3.1-rubygem-rack-3.0.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250955" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-2.2-2.2.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-2.2-2.2.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928710" comment="ruby3.1-rubygem-rack-2.2-2.2.6.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250956" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.55-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.55-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928711" comment="apache2-2.4.55-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250957" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3341" ref_url="https://www.suse.com/security/cve/CVE-2022-3341/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3341/">CVE-2022-3341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3341">CVE-2022-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928712" comment="ffmpeg-4-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928713" comment="ffmpeg-4-libavcodec-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928714" comment="ffmpeg-4-libavdevice-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928715" comment="ffmpeg-4-libavfilter-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928716" comment="ffmpeg-4-libavformat-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928717" comment="ffmpeg-4-libavresample-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928718" comment="ffmpeg-4-libavutil-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928719" comment="ffmpeg-4-libpostproc-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928720" comment="ffmpeg-4-libswresample-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928721" comment="ffmpeg-4-libswscale-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928722" comment="ffmpeg-4-private-devel-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928723" comment="libavcodec58_134-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928724" comment="libavcodec58_134-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928725" comment="libavdevice58_13-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928726" comment="libavdevice58_13-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928727" comment="libavfilter7_110-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928728" comment="libavfilter7_110-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928729" comment="libavformat58_76-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928730" comment="libavformat58_76-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928731" comment="libavresample4_0-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928732" comment="libavresample4_0-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928733" comment="libavutil56_70-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928734" comment="libavutil56_70-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928735" comment="libpostproc55_9-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928736" comment="libpostproc55_9-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928737" comment="libswresample3_9-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928738" comment="libswresample3_9-32bit-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928739" comment="libswscale5_9-4.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928740" comment="libswscale5_9-32bit-4.4.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250958" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-node_exporter-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-node_exporter-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928741" comment="golang-github-prometheus-node_exporter-1.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250959" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.12p2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.12p2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928742" comment="sudo-1.9.12p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928743" comment="sudo-devel-1.9.12p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928744" comment="sudo-plugin-python-1.9.12p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928745" comment="sudo-test-1.9.12p2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250960" version="1" class="patch">
	<metadata>
		<title>aws-efs-utils-1.34.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46174" ref_url="https://www.suse.com/security/cve/CVE-2022-46174/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-efs-utils-1.34.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-46174/">CVE-2022-46174 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46174">CVE-2022-46174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928746" comment="aws-efs-utils-1.34.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250961" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-7.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21884" ref_url="https://www.suse.com/security/cve/CVE-2023-21884/" source="CVE"/>
		<reference ref_id="CVE-2023-21885" ref_url="https://www.suse.com/security/cve/CVE-2023-21885/" source="CVE"/>
		<reference ref_id="CVE-2023-21886" ref_url="https://www.suse.com/security/cve/CVE-2023-21886/" source="CVE"/>
		<reference ref_id="CVE-2023-21889" ref_url="https://www.suse.com/security/cve/CVE-2023-21889/" source="CVE"/>
		<reference ref_id="CVE-2023-21898" ref_url="https://www.suse.com/security/cve/CVE-2023-21898/" source="CVE"/>
		<reference ref_id="CVE-2023-21899" ref_url="https://www.suse.com/security/cve/CVE-2023-21899/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-7.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21884/">CVE-2023-21884 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21884">CVE-2023-21884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21885/">CVE-2023-21885 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21885">CVE-2023-21885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21886/">CVE-2023-21886 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21886">CVE-2023-21886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21889/">CVE-2023-21889 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21889">CVE-2023-21889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21898/">CVE-2023-21898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21898">CVE-2023-21898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21899/">CVE-2023-21899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21899">CVE-2023-21899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928747" comment="python3-virtualbox-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928748" comment="virtualbox-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928749" comment="virtualbox-devel-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928750" comment="virtualbox-guest-desktop-icons-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928751" comment="virtualbox-guest-source-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928752" comment="virtualbox-guest-tools-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928753" comment="virtualbox-host-source-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928754" comment="virtualbox-qt-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928755" comment="virtualbox-vnc-7.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928756" comment="virtualbox-websrv-7.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250962" version="1" class="patch">
	<metadata>
		<title>bind-9.18.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094/" source="CVE"/>
		<reference ref_id="CVE-2022-3736" ref_url="https://www.suse.com/security/cve/CVE-2022-3736/" source="CVE"/>
		<reference ref_id="CVE-2022-3924" ref_url="https://www.suse.com/security/cve/CVE-2022-3924/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3736/">CVE-2022-3736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3736">CVE-2022-3736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3924/">CVE-2022-3924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3924">CVE-2022-3924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928757" comment="bind-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928758" comment="bind-doc-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928759" comment="bind-modules-bdbhpt-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928760" comment="bind-modules-generic-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928761" comment="bind-modules-ldap-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928762" comment="bind-modules-mysql-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928763" comment="bind-modules-perl-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928764" comment="bind-modules-sqlite3-9.18.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928765" comment="bind-utils-9.18.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250963" version="1" class="patch">
	<metadata>
		<title>chromedriver-109.0.5414.119-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0471" ref_url="https://www.suse.com/security/cve/CVE-2023-0471/" source="CVE"/>
		<reference ref_id="CVE-2023-0472" ref_url="https://www.suse.com/security/cve/CVE-2023-0472/" source="CVE"/>
		<reference ref_id="CVE-2023-0473" ref_url="https://www.suse.com/security/cve/CVE-2023-0473/" source="CVE"/>
		<reference ref_id="CVE-2023-0474" ref_url="https://www.suse.com/security/cve/CVE-2023-0474/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-109.0.5414.119-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0471/">CVE-2023-0471 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0471">CVE-2023-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0472/">CVE-2023-0472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0472">CVE-2023-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0473/">CVE-2023-0473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0473">CVE-2023-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0474/">CVE-2023-0474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0474">CVE-2023-0474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928766" comment="chromedriver-109.0.5414.119-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928767" comment="chromium-109.0.5414.119-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250964" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928768" comment="libtiff-devel-4.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928769" comment="libtiff-devel-32bit-4.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928770" comment="libtiff6-4.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928771" comment="libtiff6-32bit-4.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928772" comment="tiff-4.5.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250965" version="1" class="patch">
	<metadata>
		<title>xen-4.17.0_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42330" ref_url="https://www.suse.com/security/cve/CVE-2022-42330/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.0_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42330/">CVE-2022-42330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42330">CVE-2022-42330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928773" comment="xen-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928774" comment="xen-devel-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928775" comment="xen-doc-html-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928776" comment="xen-libs-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928777" comment="xen-libs-32bit-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928778" comment="xen-tools-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928779" comment="xen-tools-domU-4.17.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928780" comment="xen-tools-xendomains-wait-disk-4.17.0_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250966" version="1" class="patch">
	<metadata>
		<title>python310-ciscoconfparse-1.7.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40898" ref_url="https://www.suse.com/security/cve/CVE-2022-40898/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ciscoconfparse-1.7.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40898/">CVE-2022-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40898">CVE-2022-40898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928781" comment="python310-ciscoconfparse-1.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928782" comment="python38-ciscoconfparse-1.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928783" comment="python39-ciscoconfparse-1.7.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250967" version="1" class="patch">
	<metadata>
		<title>tmux-3.3a-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47016" ref_url="https://www.suse.com/security/cve/CVE-2022-47016/" source="CVE"/>
		<description>
These are all security issues fixed in the tmux-3.3a-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47016/">CVE-2022-47016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47016">CVE-2022-47016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928784" comment="tmux-3.3a-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250968" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4345" ref_url="https://www.suse.com/security/cve/CVE-2022-4345/" source="CVE"/>
		<reference ref_id="CVE-2023-0411" ref_url="https://www.suse.com/security/cve/CVE-2023-0411/" source="CVE"/>
		<reference ref_id="CVE-2023-0412" ref_url="https://www.suse.com/security/cve/CVE-2023-0412/" source="CVE"/>
		<reference ref_id="CVE-2023-0413" ref_url="https://www.suse.com/security/cve/CVE-2023-0413/" source="CVE"/>
		<reference ref_id="CVE-2023-0414" ref_url="https://www.suse.com/security/cve/CVE-2023-0414/" source="CVE"/>
		<reference ref_id="CVE-2023-0415" ref_url="https://www.suse.com/security/cve/CVE-2023-0415/" source="CVE"/>
		<reference ref_id="CVE-2023-0416" ref_url="https://www.suse.com/security/cve/CVE-2023-0416/" source="CVE"/>
		<reference ref_id="CVE-2023-0417" ref_url="https://www.suse.com/security/cve/CVE-2023-0417/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4345/">CVE-2022-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4345">CVE-2022-4345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0411/">CVE-2023-0411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0411">CVE-2023-0411 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0412/">CVE-2023-0412 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0412">CVE-2023-0412 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0413/">CVE-2023-0413 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0413">CVE-2023-0413 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0414/">CVE-2023-0414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0414">CVE-2023-0414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0415/">CVE-2023-0415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0415">CVE-2023-0415 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0416/">CVE-2023-0416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0416">CVE-2023-0416 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0417/">CVE-2023-0417 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0417">CVE-2023-0417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928785" comment="libwireshark16-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928786" comment="libwiretap13-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928787" comment="libwsutil14-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928788" comment="wireshark-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928789" comment="wireshark-devel-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928790" comment="wireshark-ui-qt-4.0.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250969" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-globalid-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22799" ref_url="https://www.suse.com/security/cve/CVE-2023-22799/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-globalid-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22799/">CVE-2023-22799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22799">CVE-2023-22799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928791" comment="ruby3.1-rubygem-globalid-1.1.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250970" version="1" class="patch">
	<metadata>
		<title>binwalk-2.3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4510" ref_url="https://www.suse.com/security/cve/CVE-2022-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the binwalk-2.3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4510/">CVE-2022-4510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4510">CVE-2022-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928792" comment="binwalk-2.3.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250971" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.41.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.41.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928793" comment="golang-github-prometheus-prometheus-2.41.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250972" version="1" class="patch">
	<metadata>
		<title>perl-Email-Address-1.913-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12558" ref_url="https://www.suse.com/security/cve/CVE-2018-12558/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Email-Address-1.913-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12558/">CVE-2018-12558 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12558">CVE-2018-12558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928794" comment="perl-Email-Address-1.913-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250973" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928795" comment="MozillaThunderbird-102.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928796" comment="MozillaThunderbird-translations-common-102.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928797" comment="MozillaThunderbird-translations-other-102.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250974" version="1" class="patch">
	<metadata>
		<title>libpkgconf-devel-1.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24056" ref_url="https://www.suse.com/security/cve/CVE-2023-24056/" source="CVE"/>
		<description>
These are all security issues fixed in the libpkgconf-devel-1.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24056/">CVE-2023-24056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928798" comment="libpkgconf-devel-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928799" comment="libpkgconf3-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928800" comment="pkgconf-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928801" comment="pkgconf-m4-1.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928802" comment="pkgconf-pkg-config-1.8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250975" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.1.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23969" ref_url="https://www.suse.com/security/cve/CVE-2023-23969/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.1.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23969/">CVE-2023-23969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23969">CVE-2023-23969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928803" comment="python310-Django-4.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928804" comment="python38-Django-4.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928805" comment="python39-Django-4.1.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250976" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24963" ref_url="https://www.suse.com/security/cve/CVE-2022-24963/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24963/">CVE-2022-24963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24963">CVE-2022-24963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928806" comment="apr-devel-1.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928807" comment="libapr1-0-1.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250977" version="1" class="patch">
	<metadata>
		<title>apr-util-devel-1.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-util-devel-1.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928808" comment="apr-util-devel-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928809" comment="libapr-util1-0-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928810" comment="libapr-util1-0-dbd-mysql-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928811" comment="libapr-util1-0-dbd-pgsql-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928812" comment="libapr-util1-0-dbd-sqlite3-1.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250978" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0471" ref_url="https://www.suse.com/security/cve/CVE-2023-0471/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0471/">CVE-2023-0471 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0471">CVE-2023-0471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928813" comment="nodejs-electron-22.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928814" comment="nodejs-electron-devel-22.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928815" comment="nodejs-electron-doc-22.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250979" version="1" class="patch">
	<metadata>
		<title>sysstat-12.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928816" comment="sysstat-12.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928817" comment="sysstat-isag-12.6.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250980" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23552" ref_url="https://www.suse.com/security/cve/CVE-2022-23552/" source="CVE"/>
		<reference ref_id="CVE-2022-39324" ref_url="https://www.suse.com/security/cve/CVE-2022-39324/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23552/">CVE-2022-23552 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23552">CVE-2022-23552 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-39324/">CVE-2022-39324 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39324">CVE-2022-39324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928818" comment="grafana-8.5.20-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250981" version="1" class="patch">
	<metadata>
		<title>harfbuzz-devel-6.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
These are all security issues fixed in the harfbuzz-devel-6.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928819" comment="harfbuzz-devel-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928820" comment="harfbuzz-tools-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928821" comment="libharfbuzz-gobject0-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928822" comment="libharfbuzz-gobject0-32bit-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928823" comment="libharfbuzz-icu0-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928824" comment="libharfbuzz-icu0-32bit-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928825" comment="libharfbuzz-subset0-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928826" comment="libharfbuzz-subset0-32bit-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928827" comment="libharfbuzz0-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928828" comment="libharfbuzz0-32bit-6.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928829" comment="typelib-1_0-HarfBuzz-0_0-6.0.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250982" version="1" class="patch">
	<metadata>
		<title>java-19-openjdk-19.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-19-openjdk-19.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928830" comment="java-19-openjdk-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928831" comment="java-19-openjdk-accessibility-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928832" comment="java-19-openjdk-demo-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928833" comment="java-19-openjdk-devel-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928834" comment="java-19-openjdk-headless-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928835" comment="java-19-openjdk-javadoc-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928836" comment="java-19-openjdk-jmods-19.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928837" comment="java-19-openjdk-src-19.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250983" version="1" class="patch">
	<metadata>
		<title>ceph-16.2.11.58+g38d6afd3b78-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0670" ref_url="https://www.suse.com/security/cve/CVE-2022-0670/" source="CVE"/>
		<reference ref_id="CVE-2022-3650" ref_url="https://www.suse.com/security/cve/CVE-2022-3650/" source="CVE"/>
		<reference ref_id="CVE-2022-3854" ref_url="https://www.suse.com/security/cve/CVE-2022-3854/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-16.2.11.58+g38d6afd3b78-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0670/">CVE-2022-0670 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0670">CVE-2022-0670 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3650/">CVE-2022-3650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3650">CVE-2022-3650 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3854/">CVE-2022-3854 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3854">CVE-2022-3854 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928838" comment="ceph-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928839" comment="ceph-base-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928840" comment="ceph-common-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928841" comment="ceph-fuse-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928842" comment="ceph-grafana-dashboards-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928843" comment="ceph-immutable-object-cache-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928844" comment="ceph-mds-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928845" comment="ceph-mgr-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928846" comment="ceph-mgr-cephadm-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928847" comment="ceph-mgr-dashboard-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928848" comment="ceph-mgr-diskprediction-local-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928849" comment="ceph-mgr-k8sevents-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928850" comment="ceph-mgr-modules-core-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928851" comment="ceph-mgr-rook-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928852" comment="ceph-mon-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928853" comment="ceph-osd-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928854" comment="ceph-prometheus-alerts-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928855" comment="ceph-radosgw-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928856" comment="cephadm-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928857" comment="cephfs-mirror-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928858" comment="cephfs-shell-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928859" comment="cephfs-top-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928860" comment="libcephfs-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928861" comment="libcephfs2-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928862" comment="libcephsqlite-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928863" comment="libcephsqlite-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928864" comment="librados-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928865" comment="librados2-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928866" comment="libradospp-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928867" comment="librbd-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928868" comment="librbd1-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928869" comment="librgw-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928870" comment="librgw2-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928871" comment="python3-ceph-argparse-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928872" comment="python3-ceph-common-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928873" comment="python3-cephfs-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928874" comment="python3-rados-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928875" comment="python3-rbd-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928876" comment="python3-rgw-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928877" comment="rados-objclass-devel-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928878" comment="rbd-fuse-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928879" comment="rbd-mirror-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928880" comment="rbd-nbd-16.2.11.58+g38d6afd3b78-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250984" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928881" comment="java-11-openjdk-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928882" comment="java-11-openjdk-accessibility-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928883" comment="java-11-openjdk-demo-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928884" comment="java-11-openjdk-devel-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928885" comment="java-11-openjdk-headless-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928886" comment="java-11-openjdk-javadoc-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928887" comment="java-11-openjdk-jmods-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928888" comment="java-11-openjdk-src-11.0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250985" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928889" comment="xorg-x11-server-21.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928890" comment="xorg-x11-server-Xvfb-21.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928891" comment="xorg-x11-server-extra-21.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928892" comment="xorg-x11-server-sdk-21.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928893" comment="xorg-x11-server-source-21.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928894" comment="xorg-x11-server-wrapper-21.1.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250986" version="1" class="patch">
	<metadata>
		<title>xwayland-22.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-22.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928895" comment="xwayland-22.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928896" comment="xwayland-devel-22.1.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250987" version="1" class="patch">
	<metadata>
		<title>caddy-2.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41721" ref_url="https://www.suse.com/security/cve/CVE-2022-41721/" source="CVE"/>
		<description>
These are all security issues fixed in the caddy-2.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41721/">CVE-2022-41721 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41721">CVE-2022-41721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928897" comment="caddy-2.6.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250988" version="1" class="patch">
	<metadata>
		<title>helm-3.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928898" comment="helm-3.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928899" comment="helm-bash-completion-3.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928900" comment="helm-fish-completion-3.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928901" comment="helm-zsh-completion-3.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250989" version="1" class="patch">
	<metadata>
		<title>helmfile-0.150.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the helmfile-0.150.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928902" comment="helmfile-0.150.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250990" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928903" comment="java-17-openjdk-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928904" comment="java-17-openjdk-accessibility-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928905" comment="java-17-openjdk-demo-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928906" comment="java-17-openjdk-devel-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928907" comment="java-17-openjdk-headless-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928908" comment="java-17-openjdk-javadoc-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928909" comment="java-17-openjdk-jmods-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928910" comment="java-17-openjdk-src-17.0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250991" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.362-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.362-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928911" comment="java-1_8_0-openjdk-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928912" comment="java-1_8_0-openjdk-accessibility-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928913" comment="java-1_8_0-openjdk-demo-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928914" comment="java-1_8_0-openjdk-devel-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928915" comment="java-1_8_0-openjdk-headless-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928916" comment="java-1_8_0-openjdk-javadoc-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928917" comment="java-1_8_0-openjdk-src-1.8.0.362-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250992" version="1" class="patch">
	<metadata>
		<title>less-608-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46663" ref_url="https://www.suse.com/security/cve/CVE-2022-46663/" source="CVE"/>
		<description>
These are all security issues fixed in the less-608-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46663/">CVE-2022-46663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928918" comment="less-608-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250993" version="1" class="patch">
	<metadata>
		<title>pesign-113-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the pesign-113-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928919" comment="pesign-113-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250994" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928920" comment="libQt6Concurrent6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928921" comment="libQt6Core6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928922" comment="libQt6DBus6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928923" comment="libQt6Gui6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928924" comment="libQt6Network6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928925" comment="libQt6OpenGL6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928926" comment="libQt6OpenGLWidgets6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928927" comment="libQt6PrintSupport6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928928" comment="libQt6Sql6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928929" comment="libQt6Test6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928930" comment="libQt6Widgets6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928931" comment="libQt6Xml6-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928932" comment="qt6-base-common-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928933" comment="qt6-base-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928934" comment="qt6-base-examples-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928935" comment="qt6-base-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928936" comment="qt6-concurrent-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928937" comment="qt6-core-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928938" comment="qt6-core-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928939" comment="qt6-dbus-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928940" comment="qt6-dbus-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928941" comment="qt6-docs-common-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928942" comment="qt6-gui-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928943" comment="qt6-gui-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928944" comment="qt6-kmssupport-devel-static-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928945" comment="qt6-kmssupport-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928946" comment="qt6-network-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928947" comment="qt6-network-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928948" comment="qt6-network-tls-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928949" comment="qt6-networkinformation-glib-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928950" comment="qt6-networkinformation-nm-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928951" comment="qt6-opengl-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928952" comment="qt6-opengl-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928953" comment="qt6-openglwidgets-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928954" comment="qt6-platformsupport-devel-static-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928955" comment="qt6-platformsupport-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928956" comment="qt6-platformtheme-gtk3-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928957" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928958" comment="qt6-printsupport-cups-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928959" comment="qt6-printsupport-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928960" comment="qt6-printsupport-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928961" comment="qt6-sql-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928962" comment="qt6-sql-mysql-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928963" comment="qt6-sql-postgresql-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928964" comment="qt6-sql-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928965" comment="qt6-sql-sqlite-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928966" comment="qt6-sql-unixODBC-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928967" comment="qt6-test-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928968" comment="qt6-test-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928969" comment="qt6-widgets-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928970" comment="qt6-widgets-private-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928971" comment="qt6-xml-devel-6.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928972" comment="qt6-xml-private-devel-6.4.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250995" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.19.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.19.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928973" comment="c-ares-devel-1.19.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928974" comment="c-ares-utils-1.19.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928975" comment="libcares2-1.19.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928976" comment="libcares2-32bit-1.19.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250996" version="1" class="patch">
	<metadata>
		<title>chromedriver-110.0.5481.77-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0696" ref_url="https://www.suse.com/security/cve/CVE-2023-0696/" source="CVE"/>
		<reference ref_id="CVE-2023-0697" ref_url="https://www.suse.com/security/cve/CVE-2023-0697/" source="CVE"/>
		<reference ref_id="CVE-2023-0698" ref_url="https://www.suse.com/security/cve/CVE-2023-0698/" source="CVE"/>
		<reference ref_id="CVE-2023-0699" ref_url="https://www.suse.com/security/cve/CVE-2023-0699/" source="CVE"/>
		<reference ref_id="CVE-2023-0700" ref_url="https://www.suse.com/security/cve/CVE-2023-0700/" source="CVE"/>
		<reference ref_id="CVE-2023-0701" ref_url="https://www.suse.com/security/cve/CVE-2023-0701/" source="CVE"/>
		<reference ref_id="CVE-2023-0702" ref_url="https://www.suse.com/security/cve/CVE-2023-0702/" source="CVE"/>
		<reference ref_id="CVE-2023-0703" ref_url="https://www.suse.com/security/cve/CVE-2023-0703/" source="CVE"/>
		<reference ref_id="CVE-2023-0704" ref_url="https://www.suse.com/security/cve/CVE-2023-0704/" source="CVE"/>
		<reference ref_id="CVE-2023-0705" ref_url="https://www.suse.com/security/cve/CVE-2023-0705/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-110.0.5481.77-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0696/">CVE-2023-0696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0696">CVE-2023-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0697/">CVE-2023-0697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0697">CVE-2023-0697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0698/">CVE-2023-0698 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0698">CVE-2023-0698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0699/">CVE-2023-0699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0699">CVE-2023-0699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0700/">CVE-2023-0700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0700">CVE-2023-0700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0701/">CVE-2023-0701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0701">CVE-2023-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0702/">CVE-2023-0702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0702">CVE-2023-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0703/">CVE-2023-0703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0703">CVE-2023-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0704/">CVE-2023-0704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0704">CVE-2023-0704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0705/">CVE-2023-0705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0705">CVE-2023-0705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928977" comment="chromedriver-110.0.5481.77-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928978" comment="chromium-110.0.5481.77-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250997" version="1" class="patch">
	<metadata>
		<title>nova-3.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the nova-3.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928979" comment="nova-3.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250998" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928980" comment="postgresql12-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928981" comment="postgresql12-contrib-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928982" comment="postgresql12-devel-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928983" comment="postgresql12-docs-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928984" comment="postgresql12-llvmjit-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928985" comment="postgresql12-llvmjit-devel-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928986" comment="postgresql12-plperl-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928987" comment="postgresql12-plpython-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928988" comment="postgresql12-pltcl-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928989" comment="postgresql12-server-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928990" comment="postgresql12-server-devel-12.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928991" comment="postgresql12-test-12.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250999" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009928992" comment="postgresql13-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928993" comment="postgresql13-contrib-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928994" comment="postgresql13-devel-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928995" comment="postgresql13-docs-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928996" comment="postgresql13-llvmjit-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928997" comment="postgresql13-llvmjit-devel-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928998" comment="postgresql13-plperl-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009928999" comment="postgresql13-plpython-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929000" comment="postgresql13-pltcl-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929001" comment="postgresql13-server-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929002" comment="postgresql13-server-devel-13.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929003" comment="postgresql13-test-13.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251000" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929004" comment="postgresql14-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929005" comment="postgresql14-contrib-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929006" comment="postgresql14-devel-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929007" comment="postgresql14-docs-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929008" comment="postgresql14-llvmjit-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929009" comment="postgresql14-llvmjit-devel-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929010" comment="postgresql14-plperl-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929011" comment="postgresql14-plpython-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929012" comment="postgresql14-pltcl-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929013" comment="postgresql14-server-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929014" comment="postgresql14-server-devel-14.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929015" comment="postgresql14-test-14.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251001" version="1" class="patch">
	<metadata>
		<title>libecpg6-15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929016" comment="libecpg6-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929017" comment="libecpg6-32bit-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929018" comment="libpq5-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929019" comment="libpq5-32bit-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929020" comment="postgresql15-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929021" comment="postgresql15-contrib-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929022" comment="postgresql15-devel-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929023" comment="postgresql15-docs-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929024" comment="postgresql15-llvmjit-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929025" comment="postgresql15-llvmjit-devel-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929026" comment="postgresql15-plperl-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929027" comment="postgresql15-plpython-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929028" comment="postgresql15-pltcl-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929029" comment="postgresql15-server-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929030" comment="postgresql15-server-devel-15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929031" comment="postgresql15-test-15.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251002" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-39.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-39.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929032" comment="python310-cryptography-39.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929033" comment="python38-cryptography-39.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929034" comment="python39-cryptography-39.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251003" version="1" class="patch">
	<metadata>
		<title>k9s-0.27.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the k9s-0.27.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929035" comment="k9s-0.27.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251004" version="1" class="patch">
	<metadata>
		<title>pluto-5.13.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the pluto-5.13.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929036" comment="pluto-5.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929037" comment="pluto-bash-completion-5.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929038" comment="pluto-fish-completion-5.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929039" comment="pluto-zsh-completion-5.13.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251005" version="1" class="patch">
	<metadata>
		<title>python310-pywayland-0.4.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pywayland-0.4.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929040" comment="python310-pywayland-0.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929041" comment="python38-pywayland-0.4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929042" comment="python39-pywayland-0.4.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251006" version="1" class="patch">
	<metadata>
		<title>qemu-7.1.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4144" ref_url="https://www.suse.com/security/cve/CVE-2022-4144/" source="CVE"/>
		<reference ref_id="CVE-2022-4172" ref_url="https://www.suse.com/security/cve/CVE-2022-4172/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-7.1.0-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4144/">CVE-2022-4144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4144">CVE-2022-4144 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4172/">CVE-2022-4172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929043" comment="qemu-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929044" comment="qemu-SLOF-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929045" comment="qemu-accel-qtest-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929046" comment="qemu-accel-tcg-x86-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929047" comment="qemu-arm-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929048" comment="qemu-audio-alsa-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929049" comment="qemu-audio-dbus-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929050" comment="qemu-audio-jack-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929051" comment="qemu-audio-oss-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929052" comment="qemu-audio-pa-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929053" comment="qemu-audio-spice-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929054" comment="qemu-block-curl-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929055" comment="qemu-block-dmg-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929056" comment="qemu-block-gluster-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929057" comment="qemu-block-iscsi-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929058" comment="qemu-block-nfs-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929059" comment="qemu-block-rbd-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929060" comment="qemu-block-ssh-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929061" comment="qemu-chardev-baum-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929062" comment="qemu-chardev-spice-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929063" comment="qemu-extra-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929064" comment="qemu-guest-agent-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929065" comment="qemu-hw-display-qxl-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929066" comment="qemu-hw-display-virtio-gpu-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929067" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929068" comment="qemu-hw-display-virtio-vga-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929069" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929070" comment="qemu-hw-usb-host-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929071" comment="qemu-hw-usb-redirect-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929072" comment="qemu-hw-usb-smartcard-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929073" comment="qemu-ipxe-1.0.0+-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929074" comment="qemu-ivshmem-tools-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929075" comment="qemu-ksm-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929076" comment="qemu-kvm-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929077" comment="qemu-lang-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929078" comment="qemu-microvm-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929079" comment="qemu-ppc-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929080" comment="qemu-s390x-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929081" comment="qemu-seabios-1.16.0_0_gd239552-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929082" comment="qemu-sgabios-8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929083" comment="qemu-skiboot-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929084" comment="qemu-tools-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929085" comment="qemu-ui-curses-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929086" comment="qemu-ui-dbus-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929087" comment="qemu-ui-gtk-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929088" comment="qemu-ui-opengl-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929089" comment="qemu-ui-spice-app-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929090" comment="qemu-ui-spice-core-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929091" comment="qemu-vgabios-1.16.0_0_gd239552-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929092" comment="qemu-vhost-user-gpu-7.1.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929093" comment="qemu-x86-7.1.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251007" version="1" class="patch">
	<metadata>
		<title>haproxy-2.7.3+git0.1065b1000-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25725" ref_url="https://www.suse.com/security/cve/CVE-2023-25725/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-2.7.3+git0.1065b1000-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-25725/">CVE-2023-25725 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25725">CVE-2023-25725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929094" comment="haproxy-2.7.3+git0.1065b1000-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251008" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929095" comment="libopenssl-1_0_0-devel-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929096" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929097" comment="libopenssl10-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929098" comment="libopenssl1_0_0-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929099" comment="libopenssl1_0_0-32bit-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929100" comment="libopenssl1_0_0-hmac-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929101" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929102" comment="libopenssl1_0_0-steam-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929103" comment="libopenssl1_0_0-steam-32bit-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929104" comment="openssl-1_0_0-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929105" comment="openssl-1_0_0-cavs-1.0.2u-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929106" comment="openssl-1_0_0-doc-1.0.2u-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251009" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1t-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1t-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929107" comment="libopenssl-1_1-devel-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929108" comment="libopenssl-1_1-devel-32bit-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929109" comment="libopenssl1_1-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929110" comment="libopenssl1_1-32bit-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929111" comment="libopenssl1_1-hmac-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929112" comment="libopenssl1_1-hmac-32bit-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929113" comment="openssl-1_1-1.1.1t-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929114" comment="openssl-1_1-doc-1.1.1t-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251010" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.2.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25727" ref_url="https://www.suse.com/security/cve/CVE-2023-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.2.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25727/">CVE-2023-25727 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25727">CVE-2023-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929115" comment="phpMyAdmin-5.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929116" comment="phpMyAdmin-apache-5.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929117" comment="phpMyAdmin-lang-5.2.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251011" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929118" comment="python310-Django-4.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929119" comment="python38-Django-4.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929120" comment="python39-Django-4.1.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251012" version="1" class="patch">
	<metadata>
		<title>prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929121" comment="prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251013" version="1" class="patch">
	<metadata>
		<title>trivy-0.37.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.37.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929122" comment="trivy-0.37.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251014" version="1" class="patch">
	<metadata>
		<title>OpenImageIO-2.4.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22845" ref_url="https://www.suse.com/security/cve/CVE-2023-22845/" source="CVE"/>
		<reference ref_id="CVE-2023-24472" ref_url="https://www.suse.com/security/cve/CVE-2023-24472/" source="CVE"/>
		<reference ref_id="CVE-2023-24473" ref_url="https://www.suse.com/security/cve/CVE-2023-24473/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenImageIO-2.4.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22845/">CVE-2023-22845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22845">CVE-2023-22845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24472/">CVE-2023-24472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24472">CVE-2023-24472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24473/">CVE-2023-24473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24473">CVE-2023-24473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929123" comment="OpenImageIO-2.4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929124" comment="OpenImageIO-devel-2.4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929125" comment="libOpenImageIO2_4-2.4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929126" comment="libOpenImageIO_Util2_4-2.4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929127" comment="python3-OpenImageIO-2.4.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251015" version="1" class="patch">
	<metadata>
		<title>apptainer-1.1.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23538" ref_url="https://www.suse.com/security/cve/CVE-2022-23538/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.1.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23538/">CVE-2022-23538 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23538">CVE-2022-23538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929128" comment="apptainer-1.1.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251016" version="1" class="patch">
	<metadata>
		<title>cilium-cli-0.12.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the cilium-cli-0.12.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929129" comment="cilium-cli-0.12.13-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251017" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20032" ref_url="https://www.suse.com/security/cve/CVE-2023-20032/" source="CVE"/>
		<reference ref_id="CVE-2023-20052" ref_url="https://www.suse.com/security/cve/CVE-2023-20052/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20032/">CVE-2023-20032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20032">CVE-2023-20032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20052/">CVE-2023-20052 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20052">CVE-2023-20052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929130" comment="clamav-0.103.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929131" comment="clamav-devel-0.103.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929132" comment="clamav-docs-html-0.103.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929133" comment="clamav-milter-0.103.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929134" comment="libclamav9-0.103.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929135" comment="libfreshclam2-0.103.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251018" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929137" comment="kernel-macros-6.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929138" comment="kernel-source-6.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929139" comment="kernel-source-vanilla-6.1.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251019" version="1" class="patch">
	<metadata>
		<title>git-2.39.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.39.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929140" comment="git-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929141" comment="git-arch-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929142" comment="git-core-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929143" comment="git-credential-gnome-keyring-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929144" comment="git-credential-libsecret-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929145" comment="git-cvs-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929146" comment="git-daemon-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929147" comment="git-doc-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929148" comment="git-email-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929149" comment="git-gui-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929150" comment="git-p4-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929151" comment="git-svn-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929152" comment="git-web-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929153" comment="gitk-2.39.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929154" comment="perl-Git-2.39.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251020" version="1" class="patch">
	<metadata>
		<title>gnutls-3.7.9-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.7.9-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929155" comment="gnutls-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929156" comment="gnutls-guile-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929157" comment="libgnutls-dane-devel-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929158" comment="libgnutls-dane0-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929159" comment="libgnutls-devel-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929160" comment="libgnutls-devel-32bit-3.7.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929161" comment="libgnutls30-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929162" comment="libgnutls30-32bit-3.7.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929163" comment="libgnutls30-hmac-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929164" comment="libgnutls30-hmac-32bit-3.7.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929165" comment="libgnutlsxx-devel-3.7.9-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929166" comment="libgnutlsxx30-3.7.9-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251021" version="1" class="patch">
	<metadata>
		<title>grafana-8.5.20-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-8.5.20-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929167" comment="grafana-8.5.20-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251022" version="1" class="patch">
	<metadata>
		<title>gssntlmssp-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25563" ref_url="https://www.suse.com/security/cve/CVE-2023-25563/" source="CVE"/>
		<reference ref_id="CVE-2023-25564" ref_url="https://www.suse.com/security/cve/CVE-2023-25564/" source="CVE"/>
		<reference ref_id="CVE-2023-25565" ref_url="https://www.suse.com/security/cve/CVE-2023-25565/" source="CVE"/>
		<reference ref_id="CVE-2023-25566" ref_url="https://www.suse.com/security/cve/CVE-2023-25566/" source="CVE"/>
		<reference ref_id="CVE-2023-25567" ref_url="https://www.suse.com/security/cve/CVE-2023-25567/" source="CVE"/>
		<description>
These are all security issues fixed in the gssntlmssp-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25563/">CVE-2023-25563 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25563">CVE-2023-25563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25564/">CVE-2023-25564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25564">CVE-2023-25564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25565/">CVE-2023-25565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25565">CVE-2023-25565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25566/">CVE-2023-25566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25566">CVE-2023-25566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25567/">CVE-2023-25567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25567">CVE-2023-25567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929168" comment="gssntlmssp-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929169" comment="gssntlmssp-devel-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251023" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929170" comment="libmozjs-102-0-102.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929171" comment="mozjs102-102.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929172" comment="mozjs102-devel-102.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251024" version="1" class="patch">
	<metadata>
		<title>libmruby3_1_0-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0326" ref_url="https://www.suse.com/security/cve/CVE-2022-0326/" source="CVE"/>
		<reference ref_id="CVE-2022-0890" ref_url="https://www.suse.com/security/cve/CVE-2022-0890/" source="CVE"/>
		<reference ref_id="CVE-2022-1427" ref_url="https://www.suse.com/security/cve/CVE-2022-1427/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3_1_0-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0326/">CVE-2022-0326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0326">CVE-2022-0326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0890/">CVE-2022-0890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0890">CVE-2022-0890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1427/">CVE-2022-1427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1427">CVE-2022-1427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929173" comment="libmruby3_1_0-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929174" comment="libmruby_core3_1_0-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929175" comment="mruby-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929176" comment="mruby-devel-3.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251025" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20230214-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<reference ref_id="CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20230214-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929177" comment="ucode-intel-20230214-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251026" version="1" class="patch">
	<metadata>
		<title>warewulf4-4.4.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<description>
These are all security issues fixed in the warewulf4-4.4.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929178" comment="warewulf4-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929179" comment="warewulf4-api-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929180" comment="warewulf4-ipxe-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929181" comment="warewulf4-overlay-4.4.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929182" comment="warewulf4-slurm-4.4.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251027" version="1" class="patch">
	<metadata>
		<title>amanda-3.5.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37705" ref_url="https://www.suse.com/security/cve/CVE-2022-37705/" source="CVE"/>
		<description>
These are all security issues fixed in the amanda-3.5.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37705/">CVE-2022-37705 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37705">CVE-2022-37705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929183" comment="amanda-3.5.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251028" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41722" ref_url="https://www.suse.com/security/cve/CVE-2022-41722/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41722/">CVE-2022-41722 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41722">CVE-2022-41722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929184" comment="go1.19-1.19.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929185" comment="go1.19-doc-1.19.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929186" comment="go1.19-race-1.19.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251029" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41722" ref_url="https://www.suse.com/security/cve/CVE-2022-41722/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41722/">CVE-2022-41722 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41722">CVE-2022-41722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929187" comment="go1.20-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929188" comment="go1.20-doc-1.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929189" comment="go1.20-race-1.20.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251030" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.22.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.22.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929190" comment="gstreamer-plugins-good-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929191" comment="gstreamer-plugins-good-32bit-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929192" comment="gstreamer-plugins-good-extra-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929193" comment="gstreamer-plugins-good-extra-32bit-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929194" comment="gstreamer-plugins-good-gtk-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929195" comment="gstreamer-plugins-good-jack-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929196" comment="gstreamer-plugins-good-jack-32bit-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929197" comment="gstreamer-plugins-good-lang-1.22.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929198" comment="gstreamer-plugins-good-qtqml-1.22.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251031" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0696" ref_url="https://www.suse.com/security/cve/CVE-2023-0696/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0696/">CVE-2023-0696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0696">CVE-2023-0696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929199" comment="nodejs-electron-22.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929200" comment="nodejs-electron-devel-22.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929201" comment="nodejs-electron-doc-22.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251032" version="1" class="patch">
	<metadata>
		<title>php8-8.1.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.1.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929202" comment="php8-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929203" comment="php8-bcmath-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929204" comment="php8-bz2-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929205" comment="php8-calendar-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929206" comment="php8-cli-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929207" comment="php8-ctype-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929208" comment="php8-curl-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929209" comment="php8-dba-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929210" comment="php8-devel-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929211" comment="php8-dom-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929212" comment="php8-enchant-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929213" comment="php8-exif-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929214" comment="php8-ffi-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929215" comment="php8-fileinfo-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929216" comment="php8-ftp-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929217" comment="php8-gd-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929218" comment="php8-gettext-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929219" comment="php8-gmp-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929220" comment="php8-iconv-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929221" comment="php8-intl-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929222" comment="php8-ldap-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929223" comment="php8-mbstring-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929224" comment="php8-mysql-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929225" comment="php8-odbc-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929226" comment="php8-opcache-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929227" comment="php8-openssl-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929228" comment="php8-pcntl-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929229" comment="php8-pdo-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929230" comment="php8-pgsql-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929231" comment="php8-phar-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929232" comment="php8-posix-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929233" comment="php8-readline-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929234" comment="php8-shmop-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929235" comment="php8-snmp-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929236" comment="php8-soap-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929237" comment="php8-sockets-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929238" comment="php8-sodium-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929239" comment="php8-sqlite-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929240" comment="php8-sysvmsg-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929241" comment="php8-sysvsem-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929242" comment="php8-sysvshm-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929243" comment="php8-tidy-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929244" comment="php8-tokenizer-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929245" comment="php8-xmlreader-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929246" comment="php8-xmlwriter-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929247" comment="php8-xsl-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929248" comment="php8-zip-8.1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929249" comment="php8-zlib-8.1.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251033" version="1" class="patch">
	<metadata>
		<title>libruby3_2-3_2-3.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_2-3_2-3.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929250" comment="libruby3_2-3_2-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929251" comment="ruby3.2-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929252" comment="ruby3.2-devel-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929253" comment="ruby3.2-devel-extra-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929254" comment="ruby3.2-doc-3.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929255" comment="ruby3.2-doc-ri-3.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251034" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929256" comment="MozillaThunderbird-102.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929257" comment="MozillaThunderbird-translations-common-102.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929258" comment="MozillaThunderbird-translations-other-102.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251035" version="1" class="patch">
	<metadata>
		<title>davix-0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<description>
These are all security issues fixed in the davix-0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929259" comment="davix-0.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929260" comment="davix-devel-0.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929261" comment="libdavix0-0.8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251036" version="1" class="patch">
	<metadata>
		<title>xen-4.17.0_04-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27672" ref_url="https://www.suse.com/security/cve/CVE-2022-27672/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.0_04-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27672/">CVE-2022-27672 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929262" comment="xen-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929263" comment="xen-devel-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929264" comment="xen-doc-html-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929265" comment="xen-libs-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929266" comment="xen-libs-32bit-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929267" comment="xen-tools-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929268" comment="xen-tools-domU-4.17.0_04-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929269" comment="xen-tools-xendomains-wait-disk-4.17.0_04-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251037" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4203" ref_url="https://www.suse.com/security/cve/CVE-2022-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0216" ref_url="https://www.suse.com/security/cve/CVE-2023-0216/" source="CVE"/>
		<reference ref_id="CVE-2023-0217" ref_url="https://www.suse.com/security/cve/CVE-2023-0217/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-0401" ref_url="https://www.suse.com/security/cve/CVE-2023-0401/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4203/">CVE-2022-4203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0216/">CVE-2023-0216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0217/">CVE-2023-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0401/">CVE-2023-0401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929270" comment="libopenssl-3-devel-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929271" comment="libopenssl-3-devel-32bit-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929272" comment="libopenssl3-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929273" comment="libopenssl3-32bit-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929274" comment="libopenssl3-hmac-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929275" comment="libopenssl3-hmac-32bit-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929276" comment="openssl-3-3.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929277" comment="openssl-3-doc-3.0.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251038" version="1" class="patch">
	<metadata>
		<title>binutils-2.40-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.40-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929278" comment="binutils-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929279" comment="binutils-devel-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929280" comment="binutils-devel-32bit-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929281" comment="binutils-gold-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929282" comment="gprofng-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929283" comment="libctf-nobfd0-2.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929284" comment="libctf0-2.40-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251039" version="1" class="patch">
	<metadata>
		<title>bitwarden-2023.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0355" ref_url="https://www.suse.com/security/cve/CVE-2022-0355/" source="CVE"/>
		<description>
These are all security issues fixed in the bitwarden-2023.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0355/">CVE-2022-0355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0355">CVE-2022-0355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929285" comment="bitwarden-2023.2.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251040" version="1" class="patch">
	<metadata>
		<title>java-13-openjdk-13.0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-13-openjdk-13.0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929286" comment="java-13-openjdk-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929287" comment="java-13-openjdk-demo-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929288" comment="java-13-openjdk-devel-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929289" comment="java-13-openjdk-headless-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929290" comment="java-13-openjdk-javadoc-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929291" comment="java-13-openjdk-jmods-13.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929292" comment="java-13-openjdk-src-13.0.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251041" version="1" class="patch">
	<metadata>
		<title>java-15-openjdk-15.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-15-openjdk-15.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929293" comment="java-15-openjdk-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929294" comment="java-15-openjdk-demo-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929295" comment="java-15-openjdk-devel-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929296" comment="java-15-openjdk-headless-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929297" comment="java-15-openjdk-javadoc-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929298" comment="java-15-openjdk-jmods-15.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929299" comment="java-15-openjdk-src-15.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251042" version="1" class="patch">
	<metadata>
		<title>emacs-28.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<reference ref_id="CVE-2022-48338" ref_url="https://www.suse.com/security/cve/CVE-2022-48338/" source="CVE"/>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-28.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48338/">CVE-2022-48338 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48338">CVE-2022-48338 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929300" comment="emacs-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929301" comment="emacs-el-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929302" comment="emacs-eln-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929303" comment="emacs-info-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929304" comment="emacs-nox-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929305" comment="emacs-x11-28.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929306" comment="etags-28.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251043" version="1" class="patch">
	<metadata>
		<title>epiphany-43.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26081" ref_url="https://www.suse.com/security/cve/CVE-2023-26081/" source="CVE"/>
		<description>
These are all security issues fixed in the epiphany-43.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26081/">CVE-2023-26081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26081">CVE-2023-26081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929307" comment="epiphany-43.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929308" comment="epiphany-branding-upstream-43.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929309" comment="epiphany-lang-43.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929310" comment="gnome-shell-search-provider-epiphany-43.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251044" version="1" class="patch">
	<metadata>
		<title>grafana-9.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7753" ref_url="https://www.suse.com/security/cve/CVE-2020-7753/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-43138" ref_url="https://www.suse.com/security/cve/CVE-2021-43138/" source="CVE"/>
		<reference ref_id="CVE-2022-0155" ref_url="https://www.suse.com/security/cve/CVE-2022-0155/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-9.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7753/">CVE-2020-7753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7753">CVE-2020-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43138/">CVE-2021-43138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">CVE-2021-43138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0155/">CVE-2022-0155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">CVE-2022-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929311" comment="grafana-9.3.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251045" version="1" class="patch">
	<metadata>
		<title>chromedriver-110.0.5481.177-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0927" ref_url="https://www.suse.com/security/cve/CVE-2023-0927/" source="CVE"/>
		<reference ref_id="CVE-2023-0928" ref_url="https://www.suse.com/security/cve/CVE-2023-0928/" source="CVE"/>
		<reference ref_id="CVE-2023-0929" ref_url="https://www.suse.com/security/cve/CVE-2023-0929/" source="CVE"/>
		<reference ref_id="CVE-2023-0930" ref_url="https://www.suse.com/security/cve/CVE-2023-0930/" source="CVE"/>
		<reference ref_id="CVE-2023-0931" ref_url="https://www.suse.com/security/cve/CVE-2023-0931/" source="CVE"/>
		<reference ref_id="CVE-2023-0932" ref_url="https://www.suse.com/security/cve/CVE-2023-0932/" source="CVE"/>
		<reference ref_id="CVE-2023-0933" ref_url="https://www.suse.com/security/cve/CVE-2023-0933/" source="CVE"/>
		<reference ref_id="CVE-2023-0941" ref_url="https://www.suse.com/security/cve/CVE-2023-0941/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-110.0.5481.177-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0927/">CVE-2023-0927 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0927">CVE-2023-0927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0928/">CVE-2023-0928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0928">CVE-2023-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0929/">CVE-2023-0929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0929">CVE-2023-0929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0930/">CVE-2023-0930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0930">CVE-2023-0930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0931/">CVE-2023-0931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0931">CVE-2023-0931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0932/">CVE-2023-0932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0932">CVE-2023-0932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0933/">CVE-2023-0933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0933">CVE-2023-0933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0941/">CVE-2023-0941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0941">CVE-2023-0941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929312" comment="chromedriver-110.0.5481.177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929313" comment="chromium-110.0.5481.177-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251046" version="1" class="patch">
	<metadata>
		<title>corepack18-18.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack18-18.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929314" comment="corepack18-18.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929315" comment="nodejs18-18.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929316" comment="nodejs18-devel-18.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929317" comment="nodejs18-docs-18.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929318" comment="npm18-18.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251047" version="1" class="patch">
	<metadata>
		<title>corepack19-19.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack19-19.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929319" comment="corepack19-19.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929320" comment="nodejs19-19.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929321" comment="nodejs19-devel-19.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929322" comment="nodejs19-docs-19.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929323" comment="npm19-19.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251048" version="1" class="patch">
	<metadata>
		<title>rustup-1.25.2~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.25.2~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929324" comment="rustup-1.25.2~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251049" version="1" class="patch">
	<metadata>
		<title>sccache-0.4.0pre.7~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.4.0pre.7~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929325" comment="sccache-0.4.0pre.7~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251050" version="1" class="patch">
	<metadata>
		<title>terraform-provider-helm-2.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<description>
These are all security issues fixed in the terraform-provider-helm-2.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929326" comment="terraform-provider-helm-2.9.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251051" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.5.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.5.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929327" comment="libtiff-devel-4.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929328" comment="libtiff-devel-32bit-4.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929329" comment="libtiff6-4.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929330" comment="libtiff6-32bit-4.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929331" comment="tiff-4.5.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251052" version="1" class="patch">
	<metadata>
		<title>dnsdist-1.8.0~rc1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7069" ref_url="https://www.suse.com/security/cve/CVE-2016-7069/" source="CVE"/>
		<reference ref_id="CVE-2018-14663" ref_url="https://www.suse.com/security/cve/CVE-2018-14663/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-1.8.0~rc1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7069/">CVE-2016-7069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7069">CVE-2016-7069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14663/">CVE-2018-14663 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14663">CVE-2018-14663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929332" comment="dnsdist-1.8.0~rc1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251053" version="1" class="patch">
	<metadata>
		<title>grafana-9.3.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-9.3.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929333" comment="grafana-9.3.6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251054" version="1" class="patch">
	<metadata>
		<title>mlterm-3.9.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24130" ref_url="https://www.suse.com/security/cve/CVE-2022-24130/" source="CVE"/>
		<description>
These are all security issues fixed in the mlterm-3.9.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24130/">CVE-2022-24130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24130">CVE-2022-24130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929334" comment="mlterm-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929335" comment="mlterm-common-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929336" comment="mlterm-fcitx-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929337" comment="mlterm-ibus-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929338" comment="mlterm-m17n-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929339" comment="mlterm-scim-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929340" comment="mlterm-sdl2-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929341" comment="mlterm-uim-3.9.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929342" comment="mlterm-wnn-3.9.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251055" version="1" class="patch">
	<metadata>
		<title>peazip-9.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24785" ref_url="https://www.suse.com/security/cve/CVE-2023-24785/" source="CVE"/>
		<description>
These are all security issues fixed in the peazip-9.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24785/">CVE-2023-24785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24785">CVE-2023-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929343" comment="peazip-9.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929344" comment="peazip-kf5-9.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251056" version="1" class="patch">
	<metadata>
		<title>curl-7.88.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23914" ref_url="https://www.suse.com/security/cve/CVE-2023-23914/" source="CVE"/>
		<reference ref_id="CVE-2023-23915" ref_url="https://www.suse.com/security/cve/CVE-2023-23915/" source="CVE"/>
		<reference ref_id="CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.88.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23914/">CVE-2023-23914 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23915/">CVE-2023-23915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929345" comment="curl-7.88.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929346" comment="libcurl-devel-7.88.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929347" comment="libcurl-devel-32bit-7.88.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929348" comment="libcurl4-7.88.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929349" comment="libcurl4-32bit-7.88.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251057" version="1" class="patch">
	<metadata>
		<title>qemu-7.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1050" ref_url="https://www.suse.com/security/cve/CVE-2022-1050/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-7.1.0-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1050/">CVE-2022-1050 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1050">CVE-2022-1050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929350" comment="qemu-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929351" comment="qemu-SLOF-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929352" comment="qemu-accel-qtest-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929353" comment="qemu-accel-tcg-x86-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929354" comment="qemu-arm-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929355" comment="qemu-audio-alsa-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929356" comment="qemu-audio-dbus-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929357" comment="qemu-audio-jack-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929358" comment="qemu-audio-oss-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929359" comment="qemu-audio-pa-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929360" comment="qemu-audio-spice-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929361" comment="qemu-block-curl-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929362" comment="qemu-block-dmg-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929363" comment="qemu-block-gluster-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929364" comment="qemu-block-iscsi-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929365" comment="qemu-block-nfs-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929366" comment="qemu-block-rbd-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929367" comment="qemu-block-ssh-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929368" comment="qemu-chardev-baum-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929369" comment="qemu-chardev-spice-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929370" comment="qemu-extra-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929371" comment="qemu-guest-agent-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929372" comment="qemu-hw-display-qxl-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929373" comment="qemu-hw-display-virtio-gpu-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929374" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929375" comment="qemu-hw-display-virtio-vga-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929376" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929377" comment="qemu-hw-usb-host-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929378" comment="qemu-hw-usb-redirect-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929379" comment="qemu-hw-usb-smartcard-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929380" comment="qemu-ipxe-1.0.0+-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929381" comment="qemu-ivshmem-tools-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929382" comment="qemu-ksm-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929383" comment="qemu-kvm-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929384" comment="qemu-lang-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929385" comment="qemu-microvm-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929386" comment="qemu-ppc-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929387" comment="qemu-s390x-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929388" comment="qemu-seabios-1.16.0_0_gd239552-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929389" comment="qemu-sgabios-8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929390" comment="qemu-skiboot-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929391" comment="qemu-tools-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929392" comment="qemu-ui-curses-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929393" comment="qemu-ui-dbus-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929394" comment="qemu-ui-gtk-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929395" comment="qemu-ui-opengl-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929396" comment="qemu-ui-spice-app-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929397" comment="qemu-ui-spice-core-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929398" comment="qemu-vgabios-1.16.0_0_gd239552-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929399" comment="qemu-vhost-user-gpu-7.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929400" comment="qemu-x86-7.1.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251058" version="1" class="patch">
	<metadata>
		<title>kubernetes1.22-apiserver-1.22.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.22-apiserver-1.22.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929401" comment="kubernetes1.22-apiserver-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929402" comment="kubernetes1.22-client-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929403" comment="kubernetes1.22-client-common-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929404" comment="kubernetes1.22-controller-manager-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929405" comment="kubernetes1.22-kubeadm-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929406" comment="kubernetes1.22-kubelet-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929407" comment="kubernetes1.22-kubelet-common-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929408" comment="kubernetes1.22-proxy-1.22.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929409" comment="kubernetes1.22-scheduler-1.22.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251059" version="1" class="patch">
	<metadata>
		<title>cloud-init-23.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2084" ref_url="https://www.suse.com/security/cve/CVE-2022-2084/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-23.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2084/">CVE-2022-2084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2084">CVE-2022-2084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929410" comment="cloud-init-23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929411" comment="cloud-init-config-suse-23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929412" comment="cloud-init-doc-23.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251060" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd-devel-0.9.76-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd-devel-0.9.76-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929413" comment="libmicrohttpd-devel-0.9.76-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929414" comment="libmicrohttpd12-0.9.76-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251061" version="1" class="patch">
	<metadata>
		<title>obs-service-go_modules-0.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45155" ref_url="https://www.suse.com/security/cve/CVE-2022-45155/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-go_modules-0.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45155/">CVE-2022-45155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45155">CVE-2022-45155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929415" comment="obs-service-go_modules-0.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251062" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-29.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929416" comment="python-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929417" comment="python-32bit-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929418" comment="python-curses-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929419" comment="python-demo-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929420" comment="python-gdbm-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929421" comment="python-idle-2.7.18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929422" comment="python-tk-2.7.18-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251063" version="1" class="patch">
	<metadata>
		<title>python310-yarl-1.8.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-yarl-1.8.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929423" comment="python310-yarl-1.8.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929424" comment="python311-yarl-1.8.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929425" comment="python38-yarl-1.8.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929426" comment="python39-yarl-1.8.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251064" version="1" class="patch">
	<metadata>
		<title>redis-7.0.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36021" ref_url="https://www.suse.com/security/cve/CVE-2022-36021/" source="CVE"/>
		<reference ref_id="CVE-2023-25155" ref_url="https://www.suse.com/security/cve/CVE-2023-25155/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36021/">CVE-2022-36021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36021">CVE-2022-36021 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-25155/">CVE-2023-25155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25155">CVE-2023-25155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929427" comment="redis-7.0.8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251065" version="1" class="patch">
	<metadata>
		<title>tar-1.34-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.34-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929428" comment="tar-1.34-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929429" comment="tar-backup-scripts-1.34-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929430" comment="tar-doc-1.34-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929431" comment="tar-lang-1.34-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929432" comment="tar-rmt-1.34-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929433" comment="tar-tests-1.34-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251066" version="1" class="patch">
	<metadata>
		<title>gdb-12.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-12.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929434" comment="gdb-12.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929435" comment="gdbserver-12.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251067" version="1" class="patch">
	<metadata>
		<title>newsboat-2.30.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26235" ref_url="https://www.suse.com/security/cve/CVE-2020-26235/" source="CVE"/>
		<description>
These are all security issues fixed in the newsboat-2.30.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26235/">CVE-2020-26235 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26235">CVE-2020-26235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929436" comment="newsboat-2.30.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929437" comment="newsboat-lang-2.30.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251068" version="1" class="patch">
	<metadata>
		<title>python38-3.8.16-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.16-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929438" comment="python38-3.8.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929439" comment="python38-32bit-3.8.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929440" comment="python38-curses-3.8.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929441" comment="python38-dbm-3.8.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929442" comment="python38-idle-3.8.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929443" comment="python38-tk-3.8.16-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251069" version="1" class="patch">
	<metadata>
		<title>python39-3.9.16-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.16-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929444" comment="python39-3.9.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929445" comment="python39-32bit-3.9.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929446" comment="python39-curses-3.9.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929447" comment="python39-dbm-3.9.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929448" comment="python39-idle-3.9.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929449" comment="python39-tk-3.9.16-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251070" version="1" class="patch">
	<metadata>
		<title>strongswan-5.9.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26463" ref_url="https://www.suse.com/security/cve/CVE-2023-26463/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.9.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26463/">CVE-2023-26463 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26463">CVE-2023-26463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929450" comment="strongswan-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929451" comment="strongswan-doc-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929452" comment="strongswan-hmac-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929453" comment="strongswan-ipsec-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929454" comment="strongswan-libs0-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929455" comment="strongswan-mysql-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929456" comment="strongswan-nm-5.9.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929457" comment="strongswan-sqlite-5.9.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251071" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929458" comment="tomcat-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929459" comment="tomcat-admin-webapps-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929460" comment="tomcat-docs-webapp-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929461" comment="tomcat-el-3_0-api-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929462" comment="tomcat-embed-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929463" comment="tomcat-javadoc-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929464" comment="tomcat-jsp-2_3-api-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929465" comment="tomcat-jsvc-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929466" comment="tomcat-lib-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929467" comment="tomcat-servlet-4_0-api-9.0.43-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929468" comment="tomcat-webapps-9.0.43-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251072" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1367-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1367-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929469" comment="gvim-9.0.1367-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929470" comment="vim-9.0.1367-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929471" comment="vim-data-9.0.1367-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929472" comment="vim-data-common-9.0.1367-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929473" comment="vim-small-9.0.1367-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251073" version="1" class="patch">
	<metadata>
		<title>python310-3.10.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929474" comment="python310-3.10.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929475" comment="python310-32bit-3.10.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929476" comment="python310-curses-3.10.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929477" comment="python310-dbm-3.10.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929478" comment="python310-idle-3.10.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929479" comment="python310-tk-3.10.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251074" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-110.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25731" ref_url="https://www.suse.com/security/cve/CVE-2023-25731/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25733" ref_url="https://www.suse.com/security/cve/CVE-2023-25733/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25736" ref_url="https://www.suse.com/security/cve/CVE-2023-25736/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25740" ref_url="https://www.suse.com/security/cve/CVE-2023-25740/" source="CVE"/>
		<reference ref_id="CVE-2023-25741" ref_url="https://www.suse.com/security/cve/CVE-2023-25741/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25745" ref_url="https://www.suse.com/security/cve/CVE-2023-25745/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-110.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25731/">CVE-2023-25731 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25731">CVE-2023-25731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25733/">CVE-2023-25733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25733">CVE-2023-25733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25736/">CVE-2023-25736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25736">CVE-2023-25736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25740/">CVE-2023-25740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25740">CVE-2023-25740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25741/">CVE-2023-25741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25741">CVE-2023-25741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25745/">CVE-2023-25745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25745">CVE-2023-25745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929480" comment="MozillaFirefox-110.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929481" comment="MozillaFirefox-branding-upstream-110.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929482" comment="MozillaFirefox-devel-110.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929483" comment="MozillaFirefox-translations-common-110.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929484" comment="MozillaFirefox-translations-other-110.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251075" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929485" comment="java-11-openj9-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929486" comment="java-11-openj9-demo-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929487" comment="java-11-openj9-devel-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929488" comment="java-11-openj9-headless-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929489" comment="java-11-openj9-javadoc-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929490" comment="java-11-openj9-jmods-11.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929491" comment="java-11-openj9-src-11.0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251076" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929492" comment="java-17-openj9-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929493" comment="java-17-openj9-demo-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929494" comment="java-17-openj9-devel-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929495" comment="java-17-openj9-headless-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929496" comment="java-17-openj9-javadoc-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929497" comment="java-17-openj9-jmods-17.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929498" comment="java-17-openj9-src-17.0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251077" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.362-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.362-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929499" comment="java-1_8_0-openj9-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929500" comment="java-1_8_0-openj9-accessibility-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929501" comment="java-1_8_0-openj9-demo-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929502" comment="java-1_8_0-openj9-devel-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929503" comment="java-1_8_0-openj9-headless-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929504" comment="java-1_8_0-openj9-javadoc-1.8.0.362-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929505" comment="java-1_8_0-openj9-src-1.8.0.362-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251078" version="1" class="patch">
	<metadata>
		<title>aws-nitro-enclaves-binaryblobs-upstream-1.2.2~git0.4ccc639-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-nitro-enclaves-binaryblobs-upstream-1.2.2~git0.4ccc639-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929506" comment="aws-nitro-enclaves-binaryblobs-upstream-1.2.2~git0.4ccc639-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929507" comment="aws-nitro-enclaves-cli-1.2.2~git0.4ccc639-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929508" comment="system-group-ne-1.2.2~git0.4ccc639-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251079" version="1" class="patch">
	<metadata>
		<title>google-guest-agent-20230221.00-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<description>
These are all security issues fixed in the google-guest-agent-20230221.00-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929509" comment="google-guest-agent-20230221.00-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251080" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20230222.00-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20230222.00-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929510" comment="google-osconfig-agent-20230222.00-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251081" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24532" ref_url="https://www.suse.com/security/cve/CVE-2023-24532/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24532/">CVE-2023-24532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929511" comment="go1.20-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929512" comment="go1.20-doc-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929513" comment="go1.20-race-1.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251082" version="1" class="patch">
	<metadata>
		<title>godot3-3.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26825" ref_url="https://www.suse.com/security/cve/CVE-2021-26825/" source="CVE"/>
		<reference ref_id="CVE-2021-26826" ref_url="https://www.suse.com/security/cve/CVE-2021-26826/" source="CVE"/>
		<description>
These are all security issues fixed in the godot3-3.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26825/">CVE-2021-26825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26825">CVE-2021-26825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26826/">CVE-2021-26826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26826">CVE-2021-26826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929514" comment="godot3-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929515" comment="godot3-bash-completion-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929516" comment="godot3-headless-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929517" comment="godot3-runner-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929518" comment="godot3-server-3.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251083" version="1" class="patch">
	<metadata>
		<title>adplugdb-2.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14690" ref_url="https://www.suse.com/security/cve/CVE-2019-14690/" source="CVE"/>
		<reference ref_id="CVE-2019-14691" ref_url="https://www.suse.com/security/cve/CVE-2019-14691/" source="CVE"/>
		<reference ref_id="CVE-2019-14692" ref_url="https://www.suse.com/security/cve/CVE-2019-14692/" source="CVE"/>
		<reference ref_id="CVE-2019-14732" ref_url="https://www.suse.com/security/cve/CVE-2019-14732/" source="CVE"/>
		<reference ref_id="CVE-2019-14733" ref_url="https://www.suse.com/security/cve/CVE-2019-14733/" source="CVE"/>
		<reference ref_id="CVE-2019-14734" ref_url="https://www.suse.com/security/cve/CVE-2019-14734/" source="CVE"/>
		<reference ref_id="CVE-2019-15151" ref_url="https://www.suse.com/security/cve/CVE-2019-15151/" source="CVE"/>
		<description>
These are all security issues fixed in the adplugdb-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14690/">CVE-2019-14690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14690">CVE-2019-14690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14691/">CVE-2019-14691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14691">CVE-2019-14691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14692/">CVE-2019-14692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14692">CVE-2019-14692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14732/">CVE-2019-14732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14732">CVE-2019-14732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14733/">CVE-2019-14733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14733">CVE-2019-14733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14734/">CVE-2019-14734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14734">CVE-2019-14734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15151/">CVE-2019-15151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15151">CVE-2019-15151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929519" comment="adplugdb-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929520" comment="libadplug-devel-2.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929521" comment="libadplug2_3_3-0-2.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251084" version="1" class="patch">
	<metadata>
		<title>libtpms-devel-0.9.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017/" source="CVE"/>
		<reference ref_id="CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms-devel-0.9.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929522" comment="libtpms-devel-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929523" comment="libtpms0-0.9.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251085" version="1" class="patch">
	<metadata>
		<title>pijul-1.0.0~beta.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<description>
These are all security issues fixed in the pijul-1.0.0~beta.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929524" comment="pijul-1.0.0~beta.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251086" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-actionpack-7.0-7.0.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22792" ref_url="https://www.suse.com/security/cve/CVE-2023-22792/" source="CVE"/>
		<reference ref_id="CVE-2023-22795" ref_url="https://www.suse.com/security/cve/CVE-2023-22795/" source="CVE"/>
		<reference ref_id="CVE-2023-22797" ref_url="https://www.suse.com/security/cve/CVE-2023-22797/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-actionpack-7.0-7.0.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22792/">CVE-2023-22792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22792">CVE-2023-22792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22795/">CVE-2023-22795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22795">CVE-2023-22795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22797/">CVE-2023-22797 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22797">CVE-2023-22797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929525" comment="ruby3.1-rubygem-actionpack-7.0-7.0.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929526" comment="ruby3.2-rubygem-actionpack-7.0-7.0.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251087" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activerecord-7.0-7.0.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44566" ref_url="https://www.suse.com/security/cve/CVE-2022-44566/" source="CVE"/>
		<reference ref_id="CVE-2023-22794" ref_url="https://www.suse.com/security/cve/CVE-2023-22794/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activerecord-7.0-7.0.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44566/">CVE-2022-44566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44566">CVE-2022-44566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22794/">CVE-2023-22794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22794">CVE-2023-22794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929527" comment="ruby3.1-rubygem-activerecord-7.0-7.0.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929528" comment="ruby3.2-rubygem-activerecord-7.0-7.0.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251088" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activesupport-7.0-7.0.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22796" ref_url="https://www.suse.com/security/cve/CVE-2023-22796/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activesupport-7.0-7.0.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22796/">CVE-2023-22796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22796">CVE-2023-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929529" comment="ruby3.1-rubygem-activesupport-7.0-7.0.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929530" comment="ruby3.2-rubygem-activesupport-7.0-7.0.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251089" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-loofah-2.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23514" ref_url="https://www.suse.com/security/cve/CVE-2022-23514/" source="CVE"/>
		<reference ref_id="CVE-2022-23515" ref_url="https://www.suse.com/security/cve/CVE-2022-23515/" source="CVE"/>
		<reference ref_id="CVE-2022-23516" ref_url="https://www.suse.com/security/cve/CVE-2022-23516/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-loofah-2.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23514/">CVE-2022-23514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23514">CVE-2022-23514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23515/">CVE-2022-23515 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23515">CVE-2022-23515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23516/">CVE-2022-23516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23516">CVE-2022-23516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929531" comment="ruby3.1-rubygem-loofah-2.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929532" comment="ruby3.2-rubygem-loofah-2.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251090" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rails-html-sanitizer-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929533" comment="ruby3.1-rubygem-rails-html-sanitizer-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929534" comment="ruby3.2-rubygem-rails-html-sanitizer-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251091" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24532" ref_url="https://www.suse.com/security/cve/CVE-2023-24532/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24532/">CVE-2023-24532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929535" comment="go1.19-1.19.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929536" comment="go1.19-doc-1.19.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929537" comment="go1.19-race-1.19.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251092" version="1" class="patch">
	<metadata>
		<title>podman-4.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0778">CVE-2023-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929538" comment="podman-4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929539" comment="podman-cni-config-4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929540" comment="podman-docker-4.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929541" comment="podman-remote-4.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251093" version="1" class="patch">
	<metadata>
		<title>python310-markdown-it-py-2.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26303" ref_url="https://www.suse.com/security/cve/CVE-2023-26303/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-markdown-it-py-2.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26303/">CVE-2023-26303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26303">CVE-2023-26303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929542" comment="python310-markdown-it-py-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929543" comment="python311-markdown-it-py-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929544" comment="python38-markdown-it-py-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929545" comment="python39-markdown-it-py-2.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251094" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-3.0.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-3.0.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929546" comment="ruby3.1-rubygem-rack-3.0.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929547" comment="ruby3.2-rubygem-rack-3.0.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251095" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1392-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175/" source="CVE"/>
		<reference ref_id="CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1392-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1264">CVE-2023-1264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929548" comment="gvim-9.0.1392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929549" comment="vim-9.0.1392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929550" comment="vim-data-9.0.1392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929551" comment="vim-data-common-9.0.1392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929552" comment="vim-small-9.0.1392-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251096" version="1" class="patch">
	<metadata>
		<title>chromedriver-111.0.5563.64-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1213" ref_url="https://www.suse.com/security/cve/CVE-2023-1213/" source="CVE"/>
		<reference ref_id="CVE-2023-1214" ref_url="https://www.suse.com/security/cve/CVE-2023-1214/" source="CVE"/>
		<reference ref_id="CVE-2023-1215" ref_url="https://www.suse.com/security/cve/CVE-2023-1215/" source="CVE"/>
		<reference ref_id="CVE-2023-1216" ref_url="https://www.suse.com/security/cve/CVE-2023-1216/" source="CVE"/>
		<reference ref_id="CVE-2023-1217" ref_url="https://www.suse.com/security/cve/CVE-2023-1217/" source="CVE"/>
		<reference ref_id="CVE-2023-1218" ref_url="https://www.suse.com/security/cve/CVE-2023-1218/" source="CVE"/>
		<reference ref_id="CVE-2023-1219" ref_url="https://www.suse.com/security/cve/CVE-2023-1219/" source="CVE"/>
		<reference ref_id="CVE-2023-1220" ref_url="https://www.suse.com/security/cve/CVE-2023-1220/" source="CVE"/>
		<reference ref_id="CVE-2023-1221" ref_url="https://www.suse.com/security/cve/CVE-2023-1221/" source="CVE"/>
		<reference ref_id="CVE-2023-1222" ref_url="https://www.suse.com/security/cve/CVE-2023-1222/" source="CVE"/>
		<reference ref_id="CVE-2023-1223" ref_url="https://www.suse.com/security/cve/CVE-2023-1223/" source="CVE"/>
		<reference ref_id="CVE-2023-1224" ref_url="https://www.suse.com/security/cve/CVE-2023-1224/" source="CVE"/>
		<reference ref_id="CVE-2023-1225" ref_url="https://www.suse.com/security/cve/CVE-2023-1225/" source="CVE"/>
		<reference ref_id="CVE-2023-1226" ref_url="https://www.suse.com/security/cve/CVE-2023-1226/" source="CVE"/>
		<reference ref_id="CVE-2023-1227" ref_url="https://www.suse.com/security/cve/CVE-2023-1227/" source="CVE"/>
		<reference ref_id="CVE-2023-1228" ref_url="https://www.suse.com/security/cve/CVE-2023-1228/" source="CVE"/>
		<reference ref_id="CVE-2023-1229" ref_url="https://www.suse.com/security/cve/CVE-2023-1229/" source="CVE"/>
		<reference ref_id="CVE-2023-1230" ref_url="https://www.suse.com/security/cve/CVE-2023-1230/" source="CVE"/>
		<reference ref_id="CVE-2023-1231" ref_url="https://www.suse.com/security/cve/CVE-2023-1231/" source="CVE"/>
		<reference ref_id="CVE-2023-1232" ref_url="https://www.suse.com/security/cve/CVE-2023-1232/" source="CVE"/>
		<reference ref_id="CVE-2023-1233" ref_url="https://www.suse.com/security/cve/CVE-2023-1233/" source="CVE"/>
		<reference ref_id="CVE-2023-1234" ref_url="https://www.suse.com/security/cve/CVE-2023-1234/" source="CVE"/>
		<reference ref_id="CVE-2023-1235" ref_url="https://www.suse.com/security/cve/CVE-2023-1235/" source="CVE"/>
		<reference ref_id="CVE-2023-1236" ref_url="https://www.suse.com/security/cve/CVE-2023-1236/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-111.0.5563.64-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1213/">CVE-2023-1213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1213">CVE-2023-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1214/">CVE-2023-1214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1214">CVE-2023-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1215/">CVE-2023-1215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1215">CVE-2023-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1216/">CVE-2023-1216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1216">CVE-2023-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1217/">CVE-2023-1217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1217">CVE-2023-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1218/">CVE-2023-1218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1218">CVE-2023-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1219/">CVE-2023-1219 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1219">CVE-2023-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1220/">CVE-2023-1220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1220">CVE-2023-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1221/">CVE-2023-1221 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1221">CVE-2023-1221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1222/">CVE-2023-1222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1222">CVE-2023-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1223/">CVE-2023-1223 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1223">CVE-2023-1223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1224/">CVE-2023-1224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1224">CVE-2023-1224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1225/">CVE-2023-1225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1225">CVE-2023-1225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1226/">CVE-2023-1226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1226">CVE-2023-1226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1227/">CVE-2023-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1227">CVE-2023-1227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1228/">CVE-2023-1228 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1228">CVE-2023-1228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1229/">CVE-2023-1229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1229">CVE-2023-1229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1230/">CVE-2023-1230 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1230">CVE-2023-1230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1231/">CVE-2023-1231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1231">CVE-2023-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1232/">CVE-2023-1232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1232">CVE-2023-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1233/">CVE-2023-1233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1233">CVE-2023-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1234/">CVE-2023-1234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1234">CVE-2023-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1235/">CVE-2023-1235 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1235">CVE-2023-1235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1236/">CVE-2023-1236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1236">CVE-2023-1236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929553" comment="chromedriver-111.0.5563.64-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929554" comment="chromium-111.0.5563.64-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251097" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.56-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<reference ref_id="CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.56-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929555" comment="apache2-2.4.56-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251098" version="1" class="patch">
	<metadata>
		<title>emacs-28.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27985" ref_url="https://www.suse.com/security/cve/CVE-2023-27985/" source="CVE"/>
		<reference ref_id="CVE-2023-27986" ref_url="https://www.suse.com/security/cve/CVE-2023-27986/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-28.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27985/">CVE-2023-27985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27985">CVE-2023-27985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27986/">CVE-2023-27986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27986">CVE-2023-27986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929556" comment="emacs-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929557" comment="emacs-el-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929558" comment="emacs-eln-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929559" comment="emacs-info-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929560" comment="emacs-nox-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929561" comment="emacs-x11-28.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929562" comment="etags-28.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251099" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4179" ref_url="https://www.suse.com/security/cve/CVE-2022-4179/" source="CVE"/>
		<reference ref_id="CVE-2022-4437" ref_url="https://www.suse.com/security/cve/CVE-2022-4437/" source="CVE"/>
		<reference ref_id="CVE-2022-4438" ref_url="https://www.suse.com/security/cve/CVE-2022-4438/" source="CVE"/>
		<reference ref_id="CVE-2023-0129" ref_url="https://www.suse.com/security/cve/CVE-2023-0129/" source="CVE"/>
		<reference ref_id="CVE-2023-0472" ref_url="https://www.suse.com/security/cve/CVE-2023-0472/" source="CVE"/>
		<reference ref_id="CVE-2023-0698" ref_url="https://www.suse.com/security/cve/CVE-2023-0698/" source="CVE"/>
		<reference ref_id="CVE-2023-0931" ref_url="https://www.suse.com/security/cve/CVE-2023-0931/" source="CVE"/>
		<reference ref_id="CVE-2023-0933" ref_url="https://www.suse.com/security/cve/CVE-2023-0933/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4179/">CVE-2022-4179 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4179">CVE-2022-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4437/">CVE-2022-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4437">CVE-2022-4437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4438/">CVE-2022-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4438">CVE-2022-4438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0129/">CVE-2023-0129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0129">CVE-2023-0129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0472/">CVE-2023-0472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0472">CVE-2023-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0698/">CVE-2023-0698 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0698">CVE-2023-0698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0931/">CVE-2023-0931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0931">CVE-2023-0931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0933/">CVE-2023-0933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0933">CVE-2023-0933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929563" comment="libQt5Pdf5-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929564" comment="libQt5PdfWidgets5-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929565" comment="libqt5-qtpdf-devel-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929566" comment="libqt5-qtpdf-examples-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929567" comment="libqt5-qtpdf-imports-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929568" comment="libqt5-qtpdf-private-headers-devel-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929569" comment="libqt5-qtwebengine-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929570" comment="libqt5-qtwebengine-devel-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929571" comment="libqt5-qtwebengine-examples-5.15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929572" comment="libqt5-qtwebengine-private-headers-devel-5.15.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251100" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929574" comment="kernel-macros-6.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929575" comment="kernel-source-6.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929576" comment="kernel-source-vanilla-6.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251101" version="1" class="patch">
	<metadata>
		<title>kubernetes1.23-apiserver-1.23.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25749" ref_url="https://www.suse.com/security/cve/CVE-2021-25749/" source="CVE"/>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.23-apiserver-1.23.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-25749/">CVE-2021-25749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25749">CVE-2021-25749 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929577" comment="kubernetes1.23-apiserver-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929578" comment="kubernetes1.23-client-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929579" comment="kubernetes1.23-client-common-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929580" comment="kubernetes1.23-controller-manager-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929581" comment="kubernetes1.23-kubeadm-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929582" comment="kubernetes1.23-kubelet-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929583" comment="kubernetes1.23-kubelet-common-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929584" comment="kubernetes1.23-proxy-1.23.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929585" comment="kubernetes1.23-scheduler-1.23.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251102" version="1" class="patch">
	<metadata>
		<title>kubernetes1.24-apiserver-1.24.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-3162" ref_url="https://www.suse.com/security/cve/CVE-2022-3162/" source="CVE"/>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.24-apiserver-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3162/">CVE-2022-3162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3162">CVE-2022-3162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929586" comment="kubernetes1.24-apiserver-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929587" comment="kubernetes1.24-client-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929588" comment="kubernetes1.24-client-common-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929589" comment="kubernetes1.24-controller-manager-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929590" comment="kubernetes1.24-kubeadm-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929591" comment="kubernetes1.24-kubelet-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929592" comment="kubernetes1.24-kubelet-common-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929593" comment="kubernetes1.24-proxy-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929594" comment="kubernetes1.24-scheduler-1.24.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251103" version="1" class="patch">
	<metadata>
		<title>hotspot-1.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28144" ref_url="https://www.suse.com/security/cve/CVE-2023-28144/" source="CVE"/>
		<description>
These are all security issues fixed in the hotspot-1.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28144/">CVE-2023-28144 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28144">CVE-2023-28144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929595" comment="hotspot-1.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251104" version="1" class="patch">
	<metadata>
		<title>liferea-1.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1350" ref_url="https://www.suse.com/security/cve/CVE-2023-1350/" source="CVE"/>
		<description>
These are all security issues fixed in the liferea-1.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1350/">CVE-2023-1350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1350">CVE-2023-1350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929596" comment="liferea-1.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929597" comment="liferea-lang-1.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251105" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-2.2-2.2.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-2.2-2.2.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929598" comment="ruby3.1-rubygem-rack-2.2-2.2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929599" comment="ruby3.2-rubygem-rack-2.2-2.2.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251106" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1161" ref_url="https://www.suse.com/security/cve/CVE-2023-1161/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1161/">CVE-2023-1161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1161">CVE-2023-1161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929600" comment="libwireshark16-4.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929601" comment="libwiretap13-4.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929602" comment="libwsutil14-4.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929603" comment="wireshark-4.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929604" comment="wireshark-devel-4.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929605" comment="wireshark-ui-qt-4.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251107" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929606" comment="libmozjs-102-0-102.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929607" comment="mozjs102-102.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929608" comment="mozjs102-devel-102.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251108" version="1" class="patch">
	<metadata>
		<title>oci-cli-3.23.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the oci-cli-3.23.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929609" comment="oci-cli-3.23.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251109" version="1" class="patch">
	<metadata>
		<title>python310-Werkzeug-2.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25577" ref_url="https://www.suse.com/security/cve/CVE-2023-25577/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Werkzeug-2.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25577/">CVE-2023-25577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25577">CVE-2023-25577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929610" comment="python310-Werkzeug-2.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929611" comment="python311-Werkzeug-2.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929612" comment="python38-Werkzeug-2.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929613" comment="python39-Werkzeug-2.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251110" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-2.2-2.2.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-2.2-2.2.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929614" comment="ruby3.1-rubygem-rack-2.2-2.2.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929615" comment="ruby3.2-rubygem-rack-2.2-2.2.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251111" version="1" class="patch">
	<metadata>
		<title>docker-20.10.23_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.23_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929616" comment="docker-20.10.23_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929617" comment="docker-bash-completion-20.10.23_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929618" comment="docker-fish-completion-20.10.23_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929619" comment="docker-zsh-completion-20.10.23_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251112" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929620" comment="MozillaThunderbird-102.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929621" comment="MozillaThunderbird-translations-common-102.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929622" comment="MozillaThunderbird-translations-other-102.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251113" version="1" class="patch">
	<metadata>
		<title>kubevirt-container-disk-0.59.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26484" ref_url="https://www.suse.com/security/cve/CVE-2023-26484/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-container-disk-0.59.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26484/">CVE-2023-26484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26484">CVE-2023-26484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929623" comment="kubevirt-container-disk-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929624" comment="kubevirt-manifests-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929625" comment="kubevirt-tests-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929626" comment="kubevirt-virt-api-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929627" comment="kubevirt-virt-controller-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929628" comment="kubevirt-virt-exportproxy-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929629" comment="kubevirt-virt-exportserver-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929630" comment="kubevirt-virt-handler-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929631" comment="kubevirt-virt-launcher-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929632" comment="kubevirt-virt-operator-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929633" comment="kubevirt-virtctl-0.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929634" comment="obs-service-kubevirt_containers_meta-0.59.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251114" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0928" ref_url="https://www.suse.com/security/cve/CVE-2023-0928/" source="CVE"/>
		<reference ref_id="CVE-2023-0929" ref_url="https://www.suse.com/security/cve/CVE-2023-0929/" source="CVE"/>
		<reference ref_id="CVE-2023-0931" ref_url="https://www.suse.com/security/cve/CVE-2023-0931/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0928/">CVE-2023-0928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0928">CVE-2023-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0929/">CVE-2023-0929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0929">CVE-2023-0929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0931/">CVE-2023-0931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0931">CVE-2023-0931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929635" comment="nodejs-electron-22.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929636" comment="nodejs-electron-devel-22.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929637" comment="nodejs-electron-doc-22.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251115" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-grpc-1.52.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-grpc-1.52.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929638" comment="ruby3.1-rubygem-grpc-1.52.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929639" comment="ruby3.2-rubygem-grpc-1.52.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251116" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.13p3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27320" ref_url="https://www.suse.com/security/cve/CVE-2023-27320/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.13p3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27320/">CVE-2023-27320 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929640" comment="sudo-1.9.13p3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929641" comment="sudo-devel-1.9.13p3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929642" comment="sudo-plugin-python-1.9.13p3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929643" comment="sudo-test-1.9.13p3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251117" version="1" class="patch">
	<metadata>
		<title>xstream-1.4.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40151" ref_url="https://www.suse.com/security/cve/CVE-2022-40151/" source="CVE"/>
		<reference ref_id="CVE-2022-41966" ref_url="https://www.suse.com/security/cve/CVE-2022-41966/" source="CVE"/>
		<description>
These are all security issues fixed in the xstream-1.4.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40151/">CVE-2022-40151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40151">CVE-2022-40151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41966/">CVE-2022-41966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41966">CVE-2022-41966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929644" comment="xstream-1.4.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929645" comment="xstream-benchmark-1.4.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929646" comment="xstream-javadoc-1.4.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929647" comment="xstream-parent-1.4.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251118" version="1" class="patch">
	<metadata>
		<title>a2ps-4.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2001-1593" ref_url="https://www.suse.com/security/cve/CVE-2001-1593/" source="CVE"/>
		<description>
These are all security issues fixed in the a2ps-4.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1593/">CVE-2001-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1593">CVE-2001-1593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929648" comment="a2ps-4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929649" comment="a2ps-devel-4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929650" comment="a2ps-lang-4.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929651" comment="liba2ps1-4.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251119" version="1" class="patch">
	<metadata>
		<title>go1.18-1.18.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.18-1.18.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929652" comment="go1.18-1.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929653" comment="go1.18-doc-1.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929654" comment="go1.18-race-1.18.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251120" version="1" class="patch">
	<metadata>
		<title>libopusfile0-0.12-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47021" ref_url="https://www.suse.com/security/cve/CVE-2022-47021/" source="CVE"/>
		<description>
These are all security issues fixed in the libopusfile0-0.12-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47021/">CVE-2022-47021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47021">CVE-2022-47021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929655" comment="libopusfile0-0.12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929656" comment="opusfile-devel-0.12-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251121" version="1" class="patch">
	<metadata>
		<title>flatpak-1.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28100" ref_url="https://www.suse.com/security/cve/CVE-2023-28100/" source="CVE"/>
		<reference ref_id="CVE-2023-28101" ref_url="https://www.suse.com/security/cve/CVE-2023-28101/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28100/">CVE-2023-28100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28100">CVE-2023-28100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28101/">CVE-2023-28101 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28101">CVE-2023-28101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929657" comment="flatpak-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929658" comment="flatpak-devel-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929659" comment="flatpak-remote-flathub-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929660" comment="flatpak-zsh-completion-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929661" comment="libflatpak0-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929662" comment="system-user-flatpak-1.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929663" comment="typelib-1_0-Flatpak-1_0-1.14.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251122" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.8+kde183-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.8+kde183-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929664" comment="libQt5Bootstrap-devel-static-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929665" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929666" comment="libQt5Concurrent-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929667" comment="libQt5Concurrent-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929668" comment="libQt5Concurrent5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929669" comment="libQt5Concurrent5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929670" comment="libQt5Core-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929671" comment="libQt5Core-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929672" comment="libQt5Core-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929673" comment="libQt5Core5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929674" comment="libQt5Core5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929675" comment="libQt5DBus-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929676" comment="libQt5DBus-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929677" comment="libQt5DBus-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929678" comment="libQt5DBus5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929679" comment="libQt5DBus5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929680" comment="libQt5Gui-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929681" comment="libQt5Gui-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929682" comment="libQt5Gui-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929683" comment="libQt5Gui5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929684" comment="libQt5Gui5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929685" comment="libQt5KmsSupport-devel-static-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929686" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929687" comment="libQt5Network-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929688" comment="libQt5Network-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929689" comment="libQt5Network-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929690" comment="libQt5Network5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929691" comment="libQt5Network5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929692" comment="libQt5OpenGL-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929693" comment="libQt5OpenGL-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929694" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929695" comment="libQt5OpenGL5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929696" comment="libQt5OpenGL5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929697" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929698" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929699" comment="libQt5PlatformHeaders-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929700" comment="libQt5PlatformSupport-devel-static-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929701" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929702" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929703" comment="libQt5PrintSupport-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929704" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929705" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929706" comment="libQt5PrintSupport5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929707" comment="libQt5PrintSupport5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929708" comment="libQt5Sql-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929709" comment="libQt5Sql-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929710" comment="libQt5Sql-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929711" comment="libQt5Sql5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929712" comment="libQt5Sql5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929713" comment="libQt5Sql5-mysql-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929714" comment="libQt5Sql5-mysql-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929715" comment="libQt5Sql5-postgresql-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929716" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929717" comment="libQt5Sql5-sqlite-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929718" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929719" comment="libQt5Sql5-unixODBC-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929720" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929721" comment="libQt5Test-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929722" comment="libQt5Test-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929723" comment="libQt5Test-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929724" comment="libQt5Test5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929725" comment="libQt5Test5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929726" comment="libQt5Widgets-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929727" comment="libQt5Widgets-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929728" comment="libQt5Widgets-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929729" comment="libQt5Widgets5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929730" comment="libQt5Widgets5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929731" comment="libQt5Xml-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929732" comment="libQt5Xml-devel-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929733" comment="libQt5Xml5-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929734" comment="libQt5Xml5-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929735" comment="libqt5-qtbase-common-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929736" comment="libqt5-qtbase-devel-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929737" comment="libqt5-qtbase-examples-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929738" comment="libqt5-qtbase-examples-32bit-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929739" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929740" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929741" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde183-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251123" version="1" class="patch">
	<metadata>
		<title>cmark-0.30.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22484" ref_url="https://www.suse.com/security/cve/CVE-2023-22484/" source="CVE"/>
		<reference ref_id="CVE-2023-22486" ref_url="https://www.suse.com/security/cve/CVE-2023-22486/" source="CVE"/>
		<description>
These are all security issues fixed in the cmark-0.30.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22484/">CVE-2023-22484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22484">CVE-2023-22484 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22486/">CVE-2023-22486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22486">CVE-2023-22486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929742" comment="cmark-0.30.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929743" comment="cmark-devel-0.30.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929744" comment="libcmark0_30_3-0.30.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251124" version="1" class="patch">
	<metadata>
		<title>cockpit-d-installer-0.8.1~1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28154" ref_url="https://www.suse.com/security/cve/CVE-2023-28154/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-d-installer-0.8.1~1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28154/">CVE-2023-28154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28154">CVE-2023-28154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929745" comment="cockpit-d-installer-0.8.1~1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251125" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-activesupport-7.0-7.0.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28120" ref_url="https://www.suse.com/security/cve/CVE-2023-28120/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-activesupport-7.0-7.0.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28120/">CVE-2023-28120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28120">CVE-2023-28120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929746" comment="ruby3.1-rubygem-activesupport-7.0-7.0.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929747" comment="ruby3.2-rubygem-activesupport-7.0-7.0.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251126" version="1" class="patch">
	<metadata>
		<title>ruby3.1-rubygem-rack-3.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.1-rubygem-rack-3.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929748" comment="ruby3.1-rubygem-rack-3.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929749" comment="ruby3.2-rubygem-rack-3.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251127" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20230214-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20230214-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929750" comment="ucode-intel-20230214-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251128" version="1" class="patch">
	<metadata>
		<title>wasm-pack-0.11.0~0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<description>
These are all security issues fixed in the wasm-pack-0.11.0~0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929751" comment="wasm-pack-0.11.0~0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251129" version="1" class="patch">
	<metadata>
		<title>amanda-3.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37703" ref_url="https://www.suse.com/security/cve/CVE-2022-37703/" source="CVE"/>
		<reference ref_id="CVE-2022-37704" ref_url="https://www.suse.com/security/cve/CVE-2022-37704/" source="CVE"/>
		<description>
These are all security issues fixed in the amanda-3.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-37703/">CVE-2022-37703 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37703">CVE-2022-37703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37704/">CVE-2022-37704 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37704">CVE-2022-37704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929752" comment="amanda-3.5.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251130" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929753" comment="docker-compose-2.17.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251131" version="1" class="patch">
	<metadata>
		<title>kubernetes1.25-apiserver-1.25.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-3162" ref_url="https://www.suse.com/security/cve/CVE-2022-3162/" source="CVE"/>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.25-apiserver-1.25.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3162/">CVE-2022-3162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3162">CVE-2022-3162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929754" comment="kubernetes1.25-apiserver-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929755" comment="kubernetes1.25-client-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929756" comment="kubernetes1.25-client-common-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929757" comment="kubernetes1.25-controller-manager-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929758" comment="kubernetes1.25-kubeadm-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929759" comment="kubernetes1.25-kubelet-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929760" comment="kubernetes1.25-kubelet-common-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929761" comment="kubernetes1.25-proxy-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929762" comment="kubernetes1.25-scheduler-1.25.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251132" version="1" class="patch">
	<metadata>
		<title>chromedriver-111.0.5563.110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1528" ref_url="https://www.suse.com/security/cve/CVE-2023-1528/" source="CVE"/>
		<reference ref_id="CVE-2023-1529" ref_url="https://www.suse.com/security/cve/CVE-2023-1529/" source="CVE"/>
		<reference ref_id="CVE-2023-1530" ref_url="https://www.suse.com/security/cve/CVE-2023-1530/" source="CVE"/>
		<reference ref_id="CVE-2023-1531" ref_url="https://www.suse.com/security/cve/CVE-2023-1531/" source="CVE"/>
		<reference ref_id="CVE-2023-1532" ref_url="https://www.suse.com/security/cve/CVE-2023-1532/" source="CVE"/>
		<reference ref_id="CVE-2023-1533" ref_url="https://www.suse.com/security/cve/CVE-2023-1533/" source="CVE"/>
		<reference ref_id="CVE-2023-1534" ref_url="https://www.suse.com/security/cve/CVE-2023-1534/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-111.0.5563.110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1528/">CVE-2023-1528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1528">CVE-2023-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1529/">CVE-2023-1529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1529">CVE-2023-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1530/">CVE-2023-1530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1530">CVE-2023-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1531/">CVE-2023-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1531">CVE-2023-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1532/">CVE-2023-1532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1532">CVE-2023-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1533/">CVE-2023-1533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1533">CVE-2023-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1534/">CVE-2023-1534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1534">CVE-2023-1534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929763" comment="chromedriver-111.0.5563.110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929764" comment="chromium-111.0.5563.110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251133" version="1" class="patch">
	<metadata>
		<title>curl-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533/" source="CVE"/>
		<reference ref_id="CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534/" source="CVE"/>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-27537" ref_url="https://www.suse.com/security/cve/CVE-2023-27537/" source="CVE"/>
		<reference ref_id="CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27537/">CVE-2023-27537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929765" comment="curl-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929766" comment="libcurl-devel-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929767" comment="libcurl-devel-32bit-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929768" comment="libcurl4-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929769" comment="libcurl4-32bit-8.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251134" version="1" class="patch">
	<metadata>
		<title>dino-0.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28686" ref_url="https://www.suse.com/security/cve/CVE-2023-28686/" source="CVE"/>
		<description>
These are all security issues fixed in the dino-0.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28686/">CVE-2023-28686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28686">CVE-2023-28686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929770" comment="dino-0.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929771" comment="dino-devel-0.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251135" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.2.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.2.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929773" comment="kernel-macros-6.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929774" comment="kernel-source-6.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929775" comment="kernel-source-vanilla-6.2.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251136" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.25.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26767" ref_url="https://www.suse.com/security/cve/CVE-2023-26767/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.25.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26767/">CVE-2023-26767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26767">CVE-2023-26767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929776" comment="liblouis-data-3.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929777" comment="liblouis-devel-3.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929778" comment="liblouis-doc-3.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929779" comment="liblouis-tools-3.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929780" comment="liblouis20-3.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929781" comment="python3-louis-3.25.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251137" version="1" class="patch">
	<metadata>
		<title>binutils-2.40-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687/" source="CVE"/>
		<reference ref_id="CVE-2023-25585" ref_url="https://www.suse.com/security/cve/CVE-2023-25585/" source="CVE"/>
		<reference ref_id="CVE-2023-25587" ref_url="https://www.suse.com/security/cve/CVE-2023-25587/" source="CVE"/>
		<reference ref_id="CVE-2023-25588" ref_url="https://www.suse.com/security/cve/CVE-2023-25588/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.40-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25585/">CVE-2023-25585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25585">CVE-2023-25585 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25587/">CVE-2023-25587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25587">CVE-2023-25587 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25588/">CVE-2023-25588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25588">CVE-2023-25588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929782" comment="binutils-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929783" comment="binutils-devel-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929784" comment="binutils-devel-32bit-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929785" comment="binutils-gold-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929786" comment="gprofng-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929787" comment="libctf-nobfd0-2.40-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929788" comment="libctf0-2.40-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251138" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22046">CVE-2020-22046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929789" comment="ffmpeg-6-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929790" comment="ffmpeg-6-libavcodec-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929791" comment="ffmpeg-6-libavdevice-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929792" comment="ffmpeg-6-libavfilter-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929793" comment="ffmpeg-6-libavformat-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929794" comment="ffmpeg-6-libavutil-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929795" comment="ffmpeg-6-libpostproc-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929796" comment="ffmpeg-6-libswresample-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929797" comment="ffmpeg-6-libswscale-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929798" comment="ffmpeg-6-private-devel-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929799" comment="libavcodec60-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929800" comment="libavcodec60-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929801" comment="libavdevice60-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929802" comment="libavdevice60-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929803" comment="libavfilter9-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929804" comment="libavfilter9-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929805" comment="libavformat60-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929806" comment="libavformat60-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929807" comment="libavutil58-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929808" comment="libavutil58-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929809" comment="libpostproc57-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929810" comment="libpostproc57-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929811" comment="libswresample4-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929812" comment="libswresample4-32bit-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929813" comment="libswscale7-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929814" comment="libswscale7-32bit-6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251139" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1213" ref_url="https://www.suse.com/security/cve/CVE-2023-1213/" source="CVE"/>
		<reference ref_id="CVE-2023-1215" ref_url="https://www.suse.com/security/cve/CVE-2023-1215/" source="CVE"/>
		<reference ref_id="CVE-2023-1220" ref_url="https://www.suse.com/security/cve/CVE-2023-1220/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1213/">CVE-2023-1213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1213">CVE-2023-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1215/">CVE-2023-1215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1215">CVE-2023-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1220/">CVE-2023-1220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1220">CVE-2023-1220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929815" comment="nodejs-electron-22.3.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929816" comment="nodejs-electron-devel-22.3.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929817" comment="nodejs-electron-doc-22.3.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251140" version="1" class="patch">
	<metadata>
		<title>stellarium-23.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28371" ref_url="https://www.suse.com/security/cve/CVE-2023-28371/" source="CVE"/>
		<description>
These are all security issues fixed in the stellarium-23.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28371/">CVE-2023-28371 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28371">CVE-2023-28371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929818" comment="stellarium-23.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251141" version="1" class="patch">
	<metadata>
		<title>python310-oci-sdk-2.96.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-oci-sdk-2.96.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929819" comment="python310-oci-sdk-2.96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929820" comment="python311-oci-sdk-2.96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929821" comment="python38-oci-sdk-2.96.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929822" comment="python39-oci-sdk-2.96.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251142" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929823" comment="tomcat-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929824" comment="tomcat-admin-webapps-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929825" comment="tomcat-docs-webapp-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929826" comment="tomcat-el-3_0-api-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929827" comment="tomcat-embed-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929828" comment="tomcat-javadoc-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929829" comment="tomcat-jsp-2_3-api-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929830" comment="tomcat-jsvc-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929831" comment="tomcat-lib-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929832" comment="tomcat-servlet-4_0-api-9.0.43-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929833" comment="tomcat-webapps-9.0.43-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251143" version="1" class="patch">
	<metadata>
		<title>containerd-1.6.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25153" ref_url="https://www.suse.com/security/cve/CVE-2023-25153/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.6.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25153/">CVE-2023-25153 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929834" comment="containerd-1.6.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929835" comment="containerd-ctr-1.6.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929836" comment="containerd-devel-1.6.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251144" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929837" comment="element-web-1.11.26-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251145" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929838" comment="libopenssl-1_0_0-devel-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929839" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929840" comment="libopenssl10-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929841" comment="libopenssl1_0_0-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929842" comment="libopenssl1_0_0-32bit-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929843" comment="libopenssl1_0_0-hmac-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929844" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929845" comment="libopenssl1_0_0-steam-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929846" comment="libopenssl1_0_0-steam-32bit-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929847" comment="openssl-1_0_0-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929848" comment="openssl-1_0_0-cavs-1.0.2u-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929849" comment="openssl-1_0_0-doc-1.0.2u-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251146" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1t-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1t-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929850" comment="libopenssl-1_1-devel-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929851" comment="libopenssl-1_1-devel-32bit-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929852" comment="libopenssl1_1-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929853" comment="libopenssl1_1-32bit-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929854" comment="libopenssl1_1-hmac-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929855" comment="libopenssl1_1-hmac-32bit-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929856" comment="openssl-1_1-1.1.1t-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929857" comment="openssl-1_1-doc-1.1.1t-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251147" version="1" class="patch">
	<metadata>
		<title>runc-1.1.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.1.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929858" comment="runc-1.1.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251148" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929859" comment="xorg-x11-server-21.1.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929860" comment="xorg-x11-server-Xvfb-21.1.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929861" comment="xorg-x11-server-extra-21.1.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929862" comment="xorg-x11-server-sdk-21.1.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929863" comment="xorg-x11-server-source-21.1.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929864" comment="xorg-x11-server-wrapper-21.1.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251149" version="1" class="patch">
	<metadata>
		<title>libruby3_2-3_2-3.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_2-3_2-3.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929865" comment="libruby3_2-3_2-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929866" comment="ruby3.2-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929867" comment="ruby3.2-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929868" comment="ruby3.2-devel-extra-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929869" comment="ruby3.2-doc-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929870" comment="ruby3.2-doc-ri-3.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251150" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1214" ref_url="https://www.suse.com/security/cve/CVE-2023-1214/" source="CVE"/>
		<reference ref_id="CVE-2023-1218" ref_url="https://www.suse.com/security/cve/CVE-2023-1218/" source="CVE"/>
		<reference ref_id="CVE-2023-1219" ref_url="https://www.suse.com/security/cve/CVE-2023-1219/" source="CVE"/>
		<reference ref_id="CVE-2023-1529" ref_url="https://www.suse.com/security/cve/CVE-2023-1529/" source="CVE"/>
		<reference ref_id="CVE-2023-1532" ref_url="https://www.suse.com/security/cve/CVE-2023-1532/" source="CVE"/>
		<reference ref_id="CVE-2023-1534" ref_url="https://www.suse.com/security/cve/CVE-2023-1534/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.4-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1214/">CVE-2023-1214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1214">CVE-2023-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1218/">CVE-2023-1218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1218">CVE-2023-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1219/">CVE-2023-1219 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1219">CVE-2023-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1529/">CVE-2023-1529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1529">CVE-2023-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1532/">CVE-2023-1532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1532">CVE-2023-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1534/">CVE-2023-1534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1534">CVE-2023-1534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929871" comment="nodejs-electron-22.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929872" comment="nodejs-electron-devel-22.3.4-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929873" comment="nodejs-electron-doc-22.3.4-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251151" version="1" class="patch">
	<metadata>
		<title>ldb-tools-2.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0614" ref_url="https://www.suse.com/security/cve/CVE-2023-0614/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-2.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0614/">CVE-2023-0614 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0614">CVE-2023-0614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929874" comment="ldb-tools-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929875" comment="libldb-devel-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929876" comment="libldb2-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929877" comment="libldb2-32bit-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929878" comment="python3-ldb-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929879" comment="python3-ldb-32bit-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929880" comment="python3-ldb-devel-2.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251152" version="1" class="patch">
	<metadata>
		<title>ctdb-4.18.1+git.298.4ccf830b2a4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0225" ref_url="https://www.suse.com/security/cve/CVE-2023-0225/" source="CVE"/>
		<reference ref_id="CVE-2023-0614" ref_url="https://www.suse.com/security/cve/CVE-2023-0614/" source="CVE"/>
		<reference ref_id="CVE-2023-0922" ref_url="https://www.suse.com/security/cve/CVE-2023-0922/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.18.1+git.298.4ccf830b2a4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0225/">CVE-2023-0225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0225">CVE-2023-0225 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0614/">CVE-2023-0614 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0614">CVE-2023-0614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0922/">CVE-2023-0922 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0922">CVE-2023-0922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929881" comment="ctdb-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929882" comment="ctdb-pcp-pmda-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929883" comment="libsamba-policy-devel-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929884" comment="libsamba-policy-python3-devel-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929885" comment="libsamba-policy0-python3-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929886" comment="libsamba-policy0-python3-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929887" comment="samba-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929888" comment="samba-ad-dc-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929889" comment="samba-ad-dc-libs-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929890" comment="samba-ad-dc-libs-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929891" comment="samba-ceph-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929892" comment="samba-client-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929893" comment="samba-client-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929894" comment="samba-client-libs-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929895" comment="samba-client-libs-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929896" comment="samba-devel-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929897" comment="samba-devel-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929898" comment="samba-doc-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929899" comment="samba-dsdb-modules-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929900" comment="samba-gpupdate-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929901" comment="samba-ldb-ldap-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929902" comment="samba-libs-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929903" comment="samba-libs-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929904" comment="samba-libs-python3-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929905" comment="samba-libs-python3-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929906" comment="samba-python3-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929907" comment="samba-test-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929908" comment="samba-tool-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929909" comment="samba-winbind-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929910" comment="samba-winbind-libs-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929911" comment="samba-winbind-libs-32bit-4.18.1+git.298.4ccf830b2a4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251153" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1430-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1430-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1355">CVE-2023-1355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929912" comment="gvim-9.0.1430-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929913" comment="vim-9.0.1430-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929914" comment="vim-data-9.0.1430-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929915" comment="vim-data-common-9.0.1430-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929916" comment="vim-small-9.0.1430-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929917" comment="xxd-9.0.1430-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251154" version="1" class="patch">
	<metadata>
		<title>xen-4.17.0_06-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42331" ref_url="https://www.suse.com/security/cve/CVE-2022-42331/" source="CVE"/>
		<reference ref_id="CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332/" source="CVE"/>
		<reference ref_id="CVE-2022-42333" ref_url="https://www.suse.com/security/cve/CVE-2022-42333/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.0_06-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42331/">CVE-2022-42331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42331">CVE-2022-42331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42332">CVE-2022-42332 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42333/">CVE-2022-42333 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42333">CVE-2022-42333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929918" comment="xen-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929919" comment="xen-devel-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929920" comment="xen-doc-html-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929921" comment="xen-libs-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929922" comment="xen-libs-32bit-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929923" comment="xen-tools-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929924" comment="xen-tools-domU-4.17.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929925" comment="xen-tools-xendomains-wait-disk-4.17.0_06-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251155" version="1" class="patch">
	<metadata>
		<title>xwayland-23.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929926" comment="xwayland-23.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929927" comment="xwayland-devel-23.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251156" version="1" class="patch">
	<metadata>
		<title>melange-0.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<description>
These are all security issues fixed in the melange-0.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5226">CVE-2017-5226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929928" comment="melange-0.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929929" comment="melange-bash-completion-0.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929930" comment="melange-fish-completion-0.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929931" comment="melange-zsh-completion-0.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251157" version="1" class="patch">
	<metadata>
		<title>libyang-devel-2.1.55-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26916" ref_url="https://www.suse.com/security/cve/CVE-2023-26916/" source="CVE"/>
		<description>
These are all security issues fixed in the libyang-devel-2.1.55-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26916/">CVE-2023-26916 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26916">CVE-2023-26916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929932" comment="libyang-devel-2.1.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929933" comment="libyang-doc-2.1.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929934" comment="libyang2-2.1.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929935" comment="yang-tools-2.1.55-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251158" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929936" comment="libopenssl-1_0_0-devel-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929937" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929938" comment="libopenssl10-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929939" comment="libopenssl1_0_0-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929940" comment="libopenssl1_0_0-32bit-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929941" comment="libopenssl1_0_0-hmac-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929942" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929943" comment="libopenssl1_0_0-steam-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929944" comment="libopenssl1_0_0-steam-32bit-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929945" comment="openssl-1_0_0-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929946" comment="openssl-1_0_0-cavs-1.0.2u-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929947" comment="openssl-1_0_0-doc-1.0.2u-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251159" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-4.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26437" ref_url="https://www.suse.com/security/cve/CVE-2023-26437/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-4.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26437/">CVE-2023-26437 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26437">CVE-2023-26437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929948" comment="pdns-recursor-4.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251160" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-111.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25748" ref_url="https://www.suse.com/security/cve/CVE-2023-25748/" source="CVE"/>
		<reference ref_id="CVE-2023-25749" ref_url="https://www.suse.com/security/cve/CVE-2023-25749/" source="CVE"/>
		<reference ref_id="CVE-2023-25750" ref_url="https://www.suse.com/security/cve/CVE-2023-25750/" source="CVE"/>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28159" ref_url="https://www.suse.com/security/cve/CVE-2023-28159/" source="CVE"/>
		<reference ref_id="CVE-2023-28160" ref_url="https://www.suse.com/security/cve/CVE-2023-28160/" source="CVE"/>
		<reference ref_id="CVE-2023-28161" ref_url="https://www.suse.com/security/cve/CVE-2023-28161/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<reference ref_id="CVE-2023-28177" ref_url="https://www.suse.com/security/cve/CVE-2023-28177/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-111.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25748/">CVE-2023-25748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25748">CVE-2023-25748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25749/">CVE-2023-25749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25749">CVE-2023-25749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25750/">CVE-2023-25750 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25750">CVE-2023-25750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28159/">CVE-2023-28159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28159">CVE-2023-28159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28160/">CVE-2023-28160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28160">CVE-2023-28160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28161/">CVE-2023-28161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28161">CVE-2023-28161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28177/">CVE-2023-28177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28177">CVE-2023-28177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929949" comment="MozillaFirefox-111.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929950" comment="MozillaFirefox-branding-upstream-111.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929951" comment="MozillaFirefox-devel-111.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929952" comment="MozillaFirefox-translations-common-111.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929953" comment="MozillaFirefox-translations-other-111.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251161" version="1" class="patch">
	<metadata>
		<title>clone-master-clean-up-1.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32000" ref_url="https://www.suse.com/security/cve/CVE-2021-32000/" source="CVE"/>
		<description>
These are all security issues fixed in the clone-master-clean-up-1.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32000/">CVE-2021-32000 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32000">CVE-2021-32000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929954" comment="clone-master-clean-up-1.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251162" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929955" comment="go1.20-1.20.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929956" comment="go1.20-doc-1.20.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929957" comment="go1.20-libstd-1.20.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929958" comment="go1.20-race-1.20.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251163" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1t-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1t-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929959" comment="libopenssl-1_1-devel-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929960" comment="libopenssl-1_1-devel-32bit-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929961" comment="libopenssl1_1-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929962" comment="libopenssl1_1-32bit-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929963" comment="libopenssl1_1-hmac-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929964" comment="libopenssl1_1-hmac-32bit-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929965" comment="openssl-1_1-1.1.1t-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929966" comment="openssl-1_1-doc-1.1.1t-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251164" version="1" class="patch">
	<metadata>
		<title>libz-ng2-2.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the libz-ng2-2.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929967" comment="libz-ng2-2.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929968" comment="zlib-ng-devel-2.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251165" version="1" class="patch">
	<metadata>
		<title>chromedriver-112.0.5615.49-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1810" ref_url="https://www.suse.com/security/cve/CVE-2023-1810/" source="CVE"/>
		<reference ref_id="CVE-2023-1811" ref_url="https://www.suse.com/security/cve/CVE-2023-1811/" source="CVE"/>
		<reference ref_id="CVE-2023-1812" ref_url="https://www.suse.com/security/cve/CVE-2023-1812/" source="CVE"/>
		<reference ref_id="CVE-2023-1813" ref_url="https://www.suse.com/security/cve/CVE-2023-1813/" source="CVE"/>
		<reference ref_id="CVE-2023-1814" ref_url="https://www.suse.com/security/cve/CVE-2023-1814/" source="CVE"/>
		<reference ref_id="CVE-2023-1815" ref_url="https://www.suse.com/security/cve/CVE-2023-1815/" source="CVE"/>
		<reference ref_id="CVE-2023-1816" ref_url="https://www.suse.com/security/cve/CVE-2023-1816/" source="CVE"/>
		<reference ref_id="CVE-2023-1817" ref_url="https://www.suse.com/security/cve/CVE-2023-1817/" source="CVE"/>
		<reference ref_id="CVE-2023-1818" ref_url="https://www.suse.com/security/cve/CVE-2023-1818/" source="CVE"/>
		<reference ref_id="CVE-2023-1819" ref_url="https://www.suse.com/security/cve/CVE-2023-1819/" source="CVE"/>
		<reference ref_id="CVE-2023-1820" ref_url="https://www.suse.com/security/cve/CVE-2023-1820/" source="CVE"/>
		<reference ref_id="CVE-2023-1821" ref_url="https://www.suse.com/security/cve/CVE-2023-1821/" source="CVE"/>
		<reference ref_id="CVE-2023-1822" ref_url="https://www.suse.com/security/cve/CVE-2023-1822/" source="CVE"/>
		<reference ref_id="CVE-2023-1823" ref_url="https://www.suse.com/security/cve/CVE-2023-1823/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-112.0.5615.49-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1810/">CVE-2023-1810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1810">CVE-2023-1810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1811/">CVE-2023-1811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1811">CVE-2023-1811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1812/">CVE-2023-1812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1812">CVE-2023-1812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1813/">CVE-2023-1813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1813">CVE-2023-1813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1814/">CVE-2023-1814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1814">CVE-2023-1814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1815/">CVE-2023-1815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1815">CVE-2023-1815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1816/">CVE-2023-1816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1816">CVE-2023-1816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1817/">CVE-2023-1817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1817">CVE-2023-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1818/">CVE-2023-1818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1818">CVE-2023-1818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1819/">CVE-2023-1819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1819">CVE-2023-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1820/">CVE-2023-1820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1820">CVE-2023-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1821/">CVE-2023-1821 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1821">CVE-2023-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1822/">CVE-2023-1822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1822">CVE-2023-1822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1823/">CVE-2023-1823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1823">CVE-2023-1823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929969" comment="chromedriver-112.0.5615.49-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929970" comment="chromium-112.0.5615.49-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251166" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929971" comment="go1.19-1.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929972" comment="go1.19-doc-1.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929973" comment="go1.19-race-1.19.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251167" version="1" class="patch">
	<metadata>
		<title>libasn1-8-7.8.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45142" ref_url="https://www.suse.com/security/cve/CVE-2022-45142/" source="CVE"/>
		<description>
These are all security issues fixed in the libasn1-8-7.8.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45142/">CVE-2022-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45142">CVE-2022-45142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929974" comment="libasn1-8-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929975" comment="libgssapi3-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929976" comment="libhcrypto4-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929977" comment="libhdb9-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929978" comment="libheimbase1-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929979" comment="libheimdal-devel-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929980" comment="libheimedit0-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929981" comment="libheimntlm0-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929982" comment="libhx509-5-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929983" comment="libkadm5clnt7-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929984" comment="libkadm5srv8-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929985" comment="libkafs0-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929986" comment="libkdc2-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929987" comment="libkrb5-26-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929988" comment="libotp0-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929989" comment="libroken18-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929990" comment="libsl0-7.8.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929991" comment="libwind0-7.8.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251168" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.43-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45143" ref_url="https://www.suse.com/security/cve/CVE-2022-45143/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.43-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45143/">CVE-2022-45143 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45143">CVE-2022-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009929992" comment="tomcat-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929993" comment="tomcat-admin-webapps-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929994" comment="tomcat-docs-webapp-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929995" comment="tomcat-el-3_0-api-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929996" comment="tomcat-embed-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929997" comment="tomcat-javadoc-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929998" comment="tomcat-jsp-2_3-api-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009929999" comment="tomcat-jsvc-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930000" comment="tomcat-lib-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930001" comment="tomcat-servlet-4_0-api-9.0.43-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930002" comment="tomcat-webapps-9.0.43-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251169" version="1" class="patch">
	<metadata>
		<title>irssi-1.4.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29132" ref_url="https://www.suse.com/security/cve/CVE-2023-29132/" source="CVE"/>
		<description>
These are all security issues fixed in the irssi-1.4.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29132/">CVE-2023-29132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29132">CVE-2023-29132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930003" comment="irssi-1.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930004" comment="irssi-devel-1.4.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251170" version="1" class="patch">
	<metadata>
		<title>libruby3_1-3_1-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_1-3_1-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930005" comment="libruby3_1-3_1-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930006" comment="ruby3.1-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930007" comment="ruby3.1-devel-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930008" comment="ruby3.1-devel-extra-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930009" comment="ruby3.1-doc-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930010" comment="ruby3.1-doc-ri-3.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251171" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.99.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1801" ref_url="https://www.suse.com/security/cve/CVE-2023-1801/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.99.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1801/">CVE-2023-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1801">CVE-2023-1801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930011" comment="tcpdump-4.99.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251172" version="1" class="patch">
	<metadata>
		<title>reuse-1.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<description>
These are all security issues fixed in the reuse-1.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930012" comment="reuse-1.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251173" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547/" source="CVE"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427/" source="CVE"/>
		<reference ref_id="CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479/" source="CVE"/>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930013" comment="MozillaThunderbird-102.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930014" comment="MozillaThunderbird-translations-common-102.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930015" comment="MozillaThunderbird-translations-other-102.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251174" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.56.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.56.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930016" comment="ghostscript-9.56.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930017" comment="ghostscript-devel-9.56.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930018" comment="ghostscript-x11-9.56.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251175" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-23.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930019" comment="avahi-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930020" comment="avahi-autoipd-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930021" comment="avahi-compat-howl-devel-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930022" comment="avahi-compat-mDNSResponder-devel-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930023" comment="avahi-lang-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930024" comment="avahi-utils-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930025" comment="libavahi-client3-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930026" comment="libavahi-client3-32bit-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930027" comment="libavahi-common3-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930028" comment="libavahi-common3-32bit-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930029" comment="libavahi-core7-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930030" comment="libavahi-devel-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930031" comment="libavahi-libevent1-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930032" comment="libdns_sd-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930033" comment="libdns_sd-32bit-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930034" comment="libhowl0-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930035" comment="python310-avahi-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930036" comment="python311-avahi-0.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930037" comment="python39-avahi-0.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251176" version="1" class="patch">
	<metadata>
		<title>grafana-9.4.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1410" ref_url="https://www.suse.com/security/cve/CVE-2023-1410/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-9.4.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-1410/">CVE-2023-1410 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1410">CVE-2023-1410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930038" comment="grafana-9.4.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251177" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930039" comment="libmozjs-102-0-102.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930040" comment="mozjs102-102.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930041" comment="mozjs102-devel-102.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251178" version="1" class="patch">
	<metadata>
		<title>viewvc-1.3.0~dev20230104-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5938" ref_url="https://www.suse.com/security/cve/CVE-2017-5938/" source="CVE"/>
		<reference ref_id="CVE-2020-5283" ref_url="https://www.suse.com/security/cve/CVE-2020-5283/" source="CVE"/>
		<description>
These are all security issues fixed in the viewvc-1.3.0~dev20230104-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5938/">CVE-2017-5938 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5938">CVE-2017-5938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-5283/">CVE-2020-5283 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5283">CVE-2020-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930042" comment="viewvc-1.3.0~dev20230104-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251179" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1906" ref_url="https://www.suse.com/security/cve/CVE-2023-1906/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1906/">CVE-2023-1906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1906">CVE-2023-1906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930043" comment="ImageMagick-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930044" comment="ImageMagick-config-7-SUSE-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930045" comment="ImageMagick-config-7-upstream-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930046" comment="ImageMagick-devel-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930047" comment="ImageMagick-devel-32bit-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930048" comment="ImageMagick-doc-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930049" comment="ImageMagick-extra-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930050" comment="libMagick++-7_Q16HDRI5-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930051" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930052" comment="libMagick++-devel-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930053" comment="libMagick++-devel-32bit-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930054" comment="libMagickCore-7_Q16HDRI10-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930055" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930056" comment="libMagickWand-7_Q16HDRI10-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930057" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930058" comment="perl-PerlMagick-7.1.1.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251180" version="1" class="patch">
	<metadata>
		<title>kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930059" comment="kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930060" comment="kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930061" comment="kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930062" comment="kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930063" comment="kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251181" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_1-0-3.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4338" ref_url="https://www.suse.com/security/cve/CVE-2022-4338/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_1-0-3.1.0-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4338/">CVE-2022-4338 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4338">CVE-2022-4338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930064" comment="libopenvswitch-3_1-0-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930065" comment="libovn-23_03-0-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930066" comment="openvswitch-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930067" comment="openvswitch-devel-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930068" comment="openvswitch-doc-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930069" comment="openvswitch-ipsec-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930070" comment="openvswitch-pki-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930071" comment="openvswitch-test-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930072" comment="openvswitch-vtep-3.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930073" comment="ovn-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930074" comment="ovn-central-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930075" comment="ovn-devel-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930076" comment="ovn-doc-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930077" comment="ovn-docker-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930078" comment="ovn-host-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930079" comment="ovn-vtep-23.03.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930080" comment="python3-ovs-3.1.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251182" version="1" class="patch">
	<metadata>
		<title>rustup-1.25.2~0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.25.2~0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930081" comment="rustup-1.25.2~0-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251183" version="1" class="patch">
	<metadata>
		<title>sccache-0.4.1~18-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.4.1~18-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930082" comment="sccache-0.4.1~18-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251184" version="1" class="patch">
	<metadata>
		<title>tealdeer-1.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the tealdeer-1.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930083" comment="tealdeer-1.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930084" comment="tealdeer-bash-completion-1.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930085" comment="tealdeer-fish-completion-1.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930086" comment="tealdeer-zsh-completion-1.6.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251185" version="1" class="patch">
	<metadata>
		<title>wasm-pack-0.11.0~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the wasm-pack-0.11.0~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930087" comment="wasm-pack-0.11.0~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251186" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1992" ref_url="https://www.suse.com/security/cve/CVE-2023-1992/" source="CVE"/>
		<reference ref_id="CVE-2023-1993" ref_url="https://www.suse.com/security/cve/CVE-2023-1993/" source="CVE"/>
		<reference ref_id="CVE-2023-1994" ref_url="https://www.suse.com/security/cve/CVE-2023-1994/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1992/">CVE-2023-1992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1992">CVE-2023-1992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1993/">CVE-2023-1993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1993">CVE-2023-1993 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1994/">CVE-2023-1994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1994">CVE-2023-1994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930088" comment="libwireshark16-4.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930089" comment="libwiretap13-4.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930090" comment="libwsutil14-4.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930091" comment="wireshark-4.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930092" comment="wireshark-devel-4.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930093" comment="wireshark-ui-qt-4.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251187" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.0+git.1681457715.54484b7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.0+git.1681457715.54484b7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930094" comment="keylime-ima-policy-0.2.0+git.1681457715.54484b7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930095" comment="rust-keylime-0.2.0+git.1681457715.54484b7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251188" version="1" class="patch">
	<metadata>
		<title>chromedriver-112.0.5615.121-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2033" ref_url="https://www.suse.com/security/cve/CVE-2023-2033/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-112.0.5615.121-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2033/">CVE-2023-2033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2033">CVE-2023-2033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930096" comment="chromedriver-112.0.5615.121-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930097" comment="chromium-112.0.5615.121-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251189" version="1" class="patch">
	<metadata>
		<title>jameica-2.10.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522/" source="CVE"/>
		<description>
These are all security issues fixed in the jameica-2.10.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15522">CVE-2020-15522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930098" comment="jameica-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930099" comment="jameica-devel-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930100" comment="jameica-javadoc-2.10.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251190" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1810" ref_url="https://www.suse.com/security/cve/CVE-2023-1810/" source="CVE"/>
		<reference ref_id="CVE-2023-1811" ref_url="https://www.suse.com/security/cve/CVE-2023-1811/" source="CVE"/>
		<reference ref_id="CVE-2023-23623" ref_url="https://www.suse.com/security/cve/CVE-2023-23623/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1810/">CVE-2023-1810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1810">CVE-2023-1810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1811/">CVE-2023-1811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1811">CVE-2023-1811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23623/">CVE-2023-23623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23623">CVE-2023-23623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930101" comment="nodejs-electron-22.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930102" comment="nodejs-electron-devel-22.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930103" comment="nodejs-electron-doc-22.3.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251191" version="1" class="patch">
	<metadata>
		<title>corepack18-18.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack18-18.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930104" comment="corepack18-18.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930105" comment="nodejs18-18.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930106" comment="nodejs18-devel-18.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930107" comment="nodejs18-docs-18.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930108" comment="npm18-18.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251192" version="1" class="patch">
	<metadata>
		<title>jettison-1.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1436" ref_url="https://www.suse.com/security/cve/CVE-2023-1436/" source="CVE"/>
		<description>
These are all security issues fixed in the jettison-1.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1436/">CVE-2023-1436 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1436">CVE-2023-1436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930109" comment="jettison-1.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930110" comment="jettison-javadoc-1.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251193" version="1" class="patch">
	<metadata>
		<title>prometheus-postgres_exporter-0.10.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the prometheus-postgres_exporter-0.10.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930111" comment="prometheus-postgres_exporter-0.10.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251194" version="1" class="patch">
	<metadata>
		<title>python310-redis-4.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28858" ref_url="https://www.suse.com/security/cve/CVE-2023-28858/" source="CVE"/>
		<reference ref_id="CVE-2023-28859" ref_url="https://www.suse.com/security/cve/CVE-2023-28859/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-redis-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28858/">CVE-2023-28858 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28858">CVE-2023-28858 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28859/">CVE-2023-28859 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28859">CVE-2023-28859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930112" comment="python310-redis-4.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930113" comment="python311-redis-4.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930114" comment="python39-redis-4.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251195" version="1" class="patch">
	<metadata>
		<title>redis-7.0.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28425" ref_url="https://www.suse.com/security/cve/CVE-2023-28425/" source="CVE"/>
		<reference ref_id="CVE-2023-28856" ref_url="https://www.suse.com/security/cve/CVE-2023-28856/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28425/">CVE-2023-28425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28425">CVE-2023-28425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28856/">CVE-2023-28856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28856">CVE-2023-28856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930115" comment="redis-7.0.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251196" version="1" class="patch">
	<metadata>
		<title>chromedriver-112.0.5615.165-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2133" ref_url="https://www.suse.com/security/cve/CVE-2023-2133/" source="CVE"/>
		<reference ref_id="CVE-2023-2134" ref_url="https://www.suse.com/security/cve/CVE-2023-2134/" source="CVE"/>
		<reference ref_id="CVE-2023-2135" ref_url="https://www.suse.com/security/cve/CVE-2023-2135/" source="CVE"/>
		<reference ref_id="CVE-2023-2136" ref_url="https://www.suse.com/security/cve/CVE-2023-2136/" source="CVE"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-112.0.5615.165-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2133/">CVE-2023-2133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2133">CVE-2023-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2134/">CVE-2023-2134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2134">CVE-2023-2134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2135/">CVE-2023-2135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2135">CVE-2023-2135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2136/">CVE-2023-2136 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2136">CVE-2023-2136 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930116" comment="chromedriver-112.0.5615.165-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930117" comment="chromium-112.0.5615.165-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251197" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.17.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.17.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930118" comment="docker-compose-2.17.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251198" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.10.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.10.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930119" comment="libxml2-2-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930120" comment="libxml2-2-32bit-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930121" comment="libxml2-devel-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930122" comment="libxml2-devel-32bit-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930123" comment="libxml2-doc-2.10.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930124" comment="libxml2-tools-2.10.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251199" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-actionpack-7.0-7.0.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-actionpack-7.0-7.0.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23633">CVE-2022-23633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930125" comment="ruby3.2-rubygem-actionpack-7.0-7.0.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251200" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-activerecord-7.0-7.0.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32224" ref_url="https://www.suse.com/security/cve/CVE-2022-32224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-activerecord-7.0-7.0.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32224/">CVE-2022-32224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32224">CVE-2022-32224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930126" comment="ruby3.2-rubygem-activerecord-7.0-7.0.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251201" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-activestorage-7.0-7.0.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21831" ref_url="https://www.suse.com/security/cve/CVE-2022-21831/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-activestorage-7.0-7.0.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21831/">CVE-2022-21831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21831">CVE-2022-21831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930127" comment="ruby3.2-rubygem-activestorage-7.0-7.0.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251202" version="1" class="patch">
	<metadata>
		<title>libsubid-devel-4.13-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383/" source="CVE"/>
		<description>
These are all security issues fixed in the libsubid-devel-4.13-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930128" comment="libsubid-devel-4.13-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930129" comment="libsubid4-4.13-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930130" comment="login_defs-4.13-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930131" comment="shadow-4.13-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251203" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-112.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29534" ref_url="https://www.suse.com/security/cve/CVE-2023-29534/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29537" ref_url="https://www.suse.com/security/cve/CVE-2023-29537/" source="CVE"/>
		<reference ref_id="CVE-2023-29538" ref_url="https://www.suse.com/security/cve/CVE-2023-29538/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29540" ref_url="https://www.suse.com/security/cve/CVE-2023-29540/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29543" ref_url="https://www.suse.com/security/cve/CVE-2023-29543/" source="CVE"/>
		<reference ref_id="CVE-2023-29544" ref_url="https://www.suse.com/security/cve/CVE-2023-29544/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29546" ref_url="https://www.suse.com/security/cve/CVE-2023-29546/" source="CVE"/>
		<reference ref_id="CVE-2023-29547" ref_url="https://www.suse.com/security/cve/CVE-2023-29547/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29549" ref_url="https://www.suse.com/security/cve/CVE-2023-29549/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<reference ref_id="CVE-2023-29551" ref_url="https://www.suse.com/security/cve/CVE-2023-29551/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-112.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29534/">CVE-2023-29534 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29534">CVE-2023-29534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29537/">CVE-2023-29537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29537">CVE-2023-29537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29538/">CVE-2023-29538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29538">CVE-2023-29538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29540/">CVE-2023-29540 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29540">CVE-2023-29540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29543/">CVE-2023-29543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29543">CVE-2023-29543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29544/">CVE-2023-29544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29544">CVE-2023-29544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29546/">CVE-2023-29546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29546">CVE-2023-29546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29547/">CVE-2023-29547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29547">CVE-2023-29547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29549/">CVE-2023-29549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29549">CVE-2023-29549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29551/">CVE-2023-29551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29551">CVE-2023-29551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930132" comment="MozillaFirefox-112.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930133" comment="MozillaFirefox-branding-upstream-112.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930134" comment="MozillaFirefox-devel-112.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930135" comment="MozillaFirefox-translations-common-112.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930136" comment="MozillaFirefox-translations-other-112.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251204" version="1" class="patch">
	<metadata>
		<title>arm-trusted-firmware-2.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47630" ref_url="https://www.suse.com/security/cve/CVE-2022-47630/" source="CVE"/>
		<description>
These are all security issues fixed in the arm-trusted-firmware-2.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47630/">CVE-2022-47630 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47630">CVE-2022-47630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930137" comment="arm-trusted-firmware-2.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930138" comment="arm-trusted-firmware-tools-2.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251205" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.30-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30609" ref_url="https://www.suse.com/security/cve/CVE-2023-30609/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.30-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30609/">CVE-2023-30609 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30609">CVE-2023-30609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930139" comment="element-web-1.11.30-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251206" version="1" class="patch">
	<metadata>
		<title>libprotobuf-c-devel-1.4.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-c-devel-1.4.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930140" comment="libprotobuf-c-devel-1.4.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930141" comment="libprotobuf-c1-1.4.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251207" version="1" class="patch">
	<metadata>
		<title>rmt-server-2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31254" ref_url="https://www.suse.com/security/cve/CVE-2022-31254/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-28120" ref_url="https://www.suse.com/security/cve/CVE-2023-28120/" source="CVE"/>
		<description>
These are all security issues fixed in the rmt-server-2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31254/">CVE-2022-31254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31254">CVE-2022-31254 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28120/">CVE-2023-28120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28120">CVE-2023-28120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930142" comment="rmt-server-2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930143" comment="rmt-server-config-2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930144" comment="rmt-server-pubcloud-2.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251208" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.89-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.89-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930145" comment="dnsmasq-2.89-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930146" comment="dnsmasq-utils-2.89-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251209" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.30-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2251" ref_url="https://www.suse.com/security/cve/CVE-2023-2251/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.30-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2251/">CVE-2023-2251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2251">CVE-2023-2251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930147" comment="element-web-1.11.30-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251210" version="1" class="patch">
	<metadata>
		<title>git-2.40.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.40.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930148" comment="git-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930149" comment="git-arch-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930150" comment="git-core-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930151" comment="git-credential-gnome-keyring-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930152" comment="git-credential-libsecret-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930153" comment="git-cvs-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930154" comment="git-daemon-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930155" comment="git-doc-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930156" comment="git-email-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930157" comment="git-gui-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930158" comment="git-p4-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930159" comment="git-svn-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930160" comment="git-web-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930161" comment="gitk-2.40.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930162" comment="perl-Git-2.40.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251211" version="1" class="patch">
	<metadata>
		<title>grafana-9.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1387" ref_url="https://www.suse.com/security/cve/CVE-2023-1387/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-9.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1387/">CVE-2023-1387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1387">CVE-2023-1387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930163" comment="grafana-9.5.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251212" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.19.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.19.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930164" comment="java-11-openjdk-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930165" comment="java-11-openjdk-demo-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930166" comment="java-11-openjdk-devel-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930167" comment="java-11-openjdk-headless-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930168" comment="java-11-openjdk-javadoc-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930169" comment="java-11-openjdk-jmods-11.0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930170" comment="java-11-openjdk-src-11.0.19.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251213" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930171" comment="java-17-openjdk-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930172" comment="java-17-openjdk-demo-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930173" comment="java-17-openjdk-devel-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930174" comment="java-17-openjdk-headless-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930175" comment="java-17-openjdk-javadoc-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930176" comment="java-17-openjdk-jmods-17.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930177" comment="java-17-openjdk-src-17.0.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251214" version="1" class="patch">
	<metadata>
		<title>python310-yarl-1.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-yarl-1.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930178" comment="python310-yarl-1.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930179" comment="python311-yarl-1.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930180" comment="python39-yarl-1.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251215" version="1" class="patch">
	<metadata>
		<title>apptainer-1.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30549" ref_url="https://www.suse.com/security/cve/CVE-2023-30549/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30549/">CVE-2023-30549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30549">CVE-2023-30549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930181" comment="apptainer-1.1.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251216" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.30-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30609" ref_url="https://www.suse.com/security/cve/CVE-2023-30609/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.30-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30609/">CVE-2023-30609 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30609">CVE-2023-30609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930182" comment="element-desktop-1.11.30-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251217" version="1" class="patch">
	<metadata>
		<title>etcd-3.5.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28235" ref_url="https://www.suse.com/security/cve/CVE-2021-28235/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.5.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28235/">CVE-2021-28235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28235">CVE-2021-28235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930183" comment="etcd-3.5.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930184" comment="etcdctl-3.5.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930185" comment="etcdutl-3.5.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251218" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2033" ref_url="https://www.suse.com/security/cve/CVE-2023-2033/" source="CVE"/>
		<reference ref_id="CVE-2023-2133" ref_url="https://www.suse.com/security/cve/CVE-2023-2133/" source="CVE"/>
		<reference ref_id="CVE-2023-2134" ref_url="https://www.suse.com/security/cve/CVE-2023-2134/" source="CVE"/>
		<reference ref_id="CVE-2023-2135" ref_url="https://www.suse.com/security/cve/CVE-2023-2135/" source="CVE"/>
		<reference ref_id="CVE-2023-2136" ref_url="https://www.suse.com/security/cve/CVE-2023-2136/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2033/">CVE-2023-2033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2033">CVE-2023-2033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2133/">CVE-2023-2133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2133">CVE-2023-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2134/">CVE-2023-2134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2134">CVE-2023-2134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2135/">CVE-2023-2135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2135">CVE-2023-2135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2136/">CVE-2023-2136 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2136">CVE-2023-2136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930186" comment="nodejs-electron-22.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930187" comment="nodejs-electron-devel-22.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930188" comment="nodejs-electron-doc-22.3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251219" version="1" class="patch">
	<metadata>
		<title>nemo-extension-warpinator-1.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42725" ref_url="https://www.suse.com/security/cve/CVE-2022-42725/" source="CVE"/>
		<description>
These are all security issues fixed in the nemo-extension-warpinator-1.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42725/">CVE-2022-42725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42725">CVE-2022-42725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930189" comment="nemo-extension-warpinator-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930190" comment="warpinator-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930191" comment="warpinator-lang-1.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251220" version="1" class="patch">
	<metadata>
		<title>restic-0.15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<description>
These are all security issues fixed in the restic-0.15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930192" comment="restic-0.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930193" comment="restic-bash-completion-0.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930194" comment="restic-zsh-completion-0.15.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251221" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-puma-6.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-puma-6.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23634">CVE-2022-23634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930195" comment="ruby3.2-rubygem-puma-6.0.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251222" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.21.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1729" ref_url="https://www.suse.com/security/cve/CVE-2023-1729/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.21.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1729/">CVE-2023-1729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1729">CVE-2023-1729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930196" comment="libraw-devel-0.21.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930197" comment="libraw-devel-static-0.21.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930198" comment="libraw-tools-0.21.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930199" comment="libraw23-0.21.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930200" comment="libraw23-32bit-0.21.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251223" version="1" class="patch">
	<metadata>
		<title>librdkafka-devel-2.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<description>
These are all security issues fixed in the librdkafka-devel-2.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930201" comment="librdkafka-devel-2.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930202" comment="librdkafka1-2.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251224" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-8627" ref_url="https://www.suse.com/security/cve/CVE-2014-8627/" source="CVE"/>
		<reference ref_id="CVE-2014-8628" ref_url="https://www.suse.com/security/cve/CVE-2014-8628/" source="CVE"/>
		<reference ref_id="CVE-2015-1182" ref_url="https://www.suse.com/security/cve/CVE-2015-1182/" source="CVE"/>
		<reference ref_id="CVE-2015-5291" ref_url="https://www.suse.com/security/cve/CVE-2015-5291/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8627/">CVE-2014-8627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8627">CVE-2014-8627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8628/">CVE-2014-8628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8628">CVE-2014-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1182/">CVE-2015-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1182">CVE-2015-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5291/">CVE-2015-5291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5291">CVE-2015-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930203" comment="libmbedcrypto7-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930204" comment="libmbedcrypto7-x86-64-v3-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930205" comment="libmbedtls14-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930206" comment="libmbedtls14-x86-64-v3-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930207" comment="libmbedx509-1-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930208" comment="libmbedx509-1-x86-64-v3-2.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930209" comment="mbedtls-2-devel-2.28.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251225" version="1" class="patch">
	<metadata>
		<title>prometheus-blackbox_exporter-0.19.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the prometheus-blackbox_exporter-0.19.0-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930210" comment="prometheus-blackbox_exporter-0.19.0-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251226" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1504-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1504-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930211" comment="gvim-9.0.1504-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930212" comment="vim-9.0.1504-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930213" comment="vim-data-9.0.1504-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930214" comment="vim-data-common-9.0.1504-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930215" comment="vim-small-9.0.1504-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930216" comment="xxd-9.0.1504-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251227" version="1" class="patch">
	<metadata>
		<title>editorconfig-0.12.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0341" ref_url="https://www.suse.com/security/cve/CVE-2023-0341/" source="CVE"/>
		<description>
These are all security issues fixed in the editorconfig-0.12.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0341/">CVE-2023-0341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0341">CVE-2023-0341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930217" comment="editorconfig-0.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930218" comment="libeditorconfig-devel-0.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930219" comment="libeditorconfig0-0.12.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251228" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930220" comment="go1.19-1.19.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930221" comment="go1.19-doc-1.19.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930222" comment="go1.19-libstd-1.19.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930223" comment="go1.19-race-1.19.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251229" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930224" comment="go1.20-1.20.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930225" comment="go1.20-doc-1.20.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930226" comment="go1.20-libstd-1.20.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930227" comment="go1.20-race-1.20.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251230" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.372-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.372-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930228" comment="java-1_8_0-openjdk-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930229" comment="java-1_8_0-openjdk-accessibility-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930230" comment="java-1_8_0-openjdk-demo-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930231" comment="java-1_8_0-openjdk-devel-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930232" comment="java-1_8_0-openjdk-headless-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930233" comment="java-1_8_0-openjdk-javadoc-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930234" comment="java-1_8_0-openjdk-src-1.8.0.372-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251231" version="1" class="patch">
	<metadata>
		<title>python312-3.12.0a7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.0a7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930235" comment="python312-3.12.0a7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930236" comment="python312-curses-3.12.0a7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930237" comment="python312-dbm-3.12.0a7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930238" comment="python312-idle-3.12.0a7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930239" comment="python312-tk-3.12.0a7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930240" comment="python312-x86-64-v3-3.12.0a7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251232" version="1" class="patch">
	<metadata>
		<title>libfastjson-devel-1.2304.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
These are all security issues fixed in the libfastjson-devel-1.2304.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930241" comment="libfastjson-devel-1.2304.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930242" comment="libfastjson4-1.2304.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251233" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-7.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21987" ref_url="https://www.suse.com/security/cve/CVE-2023-21987/" source="CVE"/>
		<reference ref_id="CVE-2023-21988" ref_url="https://www.suse.com/security/cve/CVE-2023-21988/" source="CVE"/>
		<reference ref_id="CVE-2023-21989" ref_url="https://www.suse.com/security/cve/CVE-2023-21989/" source="CVE"/>
		<reference ref_id="CVE-2023-21990" ref_url="https://www.suse.com/security/cve/CVE-2023-21990/" source="CVE"/>
		<reference ref_id="CVE-2023-21991" ref_url="https://www.suse.com/security/cve/CVE-2023-21991/" source="CVE"/>
		<reference ref_id="CVE-2023-21998" ref_url="https://www.suse.com/security/cve/CVE-2023-21998/" source="CVE"/>
		<reference ref_id="CVE-2023-21999" ref_url="https://www.suse.com/security/cve/CVE-2023-21999/" source="CVE"/>
		<reference ref_id="CVE-2023-22000" ref_url="https://www.suse.com/security/cve/CVE-2023-22000/" source="CVE"/>
		<reference ref_id="CVE-2023-22001" ref_url="https://www.suse.com/security/cve/CVE-2023-22001/" source="CVE"/>
		<reference ref_id="CVE-2023-22002" ref_url="https://www.suse.com/security/cve/CVE-2023-22002/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-7.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21987/">CVE-2023-21987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21987">CVE-2023-21987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21988/">CVE-2023-21988 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21988">CVE-2023-21988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21989/">CVE-2023-21989 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21989">CVE-2023-21989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21990/">CVE-2023-21990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21990">CVE-2023-21990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21991/">CVE-2023-21991 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21991">CVE-2023-21991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21998/">CVE-2023-21998 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21998">CVE-2023-21998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21999/">CVE-2023-21999 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21999">CVE-2023-21999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22000/">CVE-2023-22000 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22000">CVE-2023-22000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22001/">CVE-2023-22001 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22001">CVE-2023-22001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22002/">CVE-2023-22002 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22002">CVE-2023-22002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930243" comment="python3-virtualbox-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930244" comment="virtualbox-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930245" comment="virtualbox-devel-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930246" comment="virtualbox-guest-desktop-icons-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930247" comment="virtualbox-guest-source-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930248" comment="virtualbox-guest-tools-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930249" comment="virtualbox-host-source-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930250" comment="virtualbox-qt-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930251" comment="virtualbox-vnc-7.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930252" comment="virtualbox-websrv-7.0.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251234" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p15-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26551" ref_url="https://www.suse.com/security/cve/CVE-2023-26551/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p15-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26551/">CVE-2023-26551 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26551">CVE-2023-26551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930253" comment="ntp-4.2.8p15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930254" comment="ntp-dcf77-tools-4.2.8p15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930255" comment="ntp-doc-4.2.8p15-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251235" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.10.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.10.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930256" comment="libssh-config-0.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930257" comment="libssh-devel-0.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930258" comment="libssh4-0.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930259" comment="libssh4-32bit-0.10.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251236" version="1" class="patch">
	<metadata>
		<title>python-SQLAlchemy1-doc-1.4.46-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<description>
These are all security issues fixed in the python-SQLAlchemy1-doc-1.4.46-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930260" comment="python-SQLAlchemy1-doc-1.4.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930261" comment="python310-SQLAlchemy1-1.4.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930262" comment="python311-SQLAlchemy1-1.4.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930263" comment="python39-SQLAlchemy1-1.4.46-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251237" version="1" class="patch">
	<metadata>
		<title>system-user-velociraptor-1.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0242" ref_url="https://www.suse.com/security/cve/CVE-2023-0242/" source="CVE"/>
		<reference ref_id="CVE-2023-0290" ref_url="https://www.suse.com/security/cve/CVE-2023-0290/" source="CVE"/>
		<description>
These are all security issues fixed in the system-user-velociraptor-1.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0242/">CVE-2023-0242 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0242">CVE-2023-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0290/">CVE-2023-0290 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0290">CVE-2023-0290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930264" comment="system-user-velociraptor-1.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930265" comment="velociraptor-0.6.7.5~git78.2bef6fc-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930266" comment="velociraptor-kafka-humio-gateway-0.6.7.5~git78.2bef6fc-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251238" version="1" class="patch">
	<metadata>
		<title>xen-4.17.1_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42335" ref_url="https://www.suse.com/security/cve/CVE-2022-42335/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.1_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42335/">CVE-2022-42335 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42335">CVE-2022-42335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930267" comment="xen-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930268" comment="xen-devel-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930269" comment="xen-doc-html-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930270" comment="xen-libs-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930271" comment="xen-tools-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930272" comment="xen-tools-domU-4.17.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930273" comment="xen-tools-xendomains-wait-disk-4.17.1_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251239" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930274" comment="libmozjs-102-0-102.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930275" comment="mozjs102-102.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930276" comment="mozjs102-devel-102.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251240" version="1" class="patch">
	<metadata>
		<title>rekor-1.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30551" ref_url="https://www.suse.com/security/cve/CVE-2023-30551/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30551/">CVE-2023-30551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30551">CVE-2023-30551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930277" comment="rekor-1.1.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251241" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-113.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32208" ref_url="https://www.suse.com/security/cve/CVE-2023-32208/" source="CVE"/>
		<reference ref_id="CVE-2023-32209" ref_url="https://www.suse.com/security/cve/CVE-2023-32209/" source="CVE"/>
		<reference ref_id="CVE-2023-32210" ref_url="https://www.suse.com/security/cve/CVE-2023-32210/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<reference ref_id="CVE-2023-32216" ref_url="https://www.suse.com/security/cve/CVE-2023-32216/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-113.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32208/">CVE-2023-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32208">CVE-2023-32208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32209/">CVE-2023-32209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32209">CVE-2023-32209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32210/">CVE-2023-32210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32210">CVE-2023-32210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32216/">CVE-2023-32216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32216">CVE-2023-32216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930278" comment="MozillaFirefox-113.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930279" comment="MozillaFirefox-branding-upstream-113.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930280" comment="MozillaFirefox-devel-113.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930281" comment="MozillaFirefox-translations-common-113.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930282" comment="MozillaFirefox-translations-other-113.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251242" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930283" comment="MozillaThunderbird-102.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930284" comment="MozillaThunderbird-translations-common-102.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930285" comment="MozillaThunderbird-translations-other-102.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251243" version="1" class="patch">
	<metadata>
		<title>chromedriver-113.0.5672.92-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2459" ref_url="https://www.suse.com/security/cve/CVE-2023-2459/" source="CVE"/>
		<reference ref_id="CVE-2023-2460" ref_url="https://www.suse.com/security/cve/CVE-2023-2460/" source="CVE"/>
		<reference ref_id="CVE-2023-2461" ref_url="https://www.suse.com/security/cve/CVE-2023-2461/" source="CVE"/>
		<reference ref_id="CVE-2023-2462" ref_url="https://www.suse.com/security/cve/CVE-2023-2462/" source="CVE"/>
		<reference ref_id="CVE-2023-2463" ref_url="https://www.suse.com/security/cve/CVE-2023-2463/" source="CVE"/>
		<reference ref_id="CVE-2023-2464" ref_url="https://www.suse.com/security/cve/CVE-2023-2464/" source="CVE"/>
		<reference ref_id="CVE-2023-2465" ref_url="https://www.suse.com/security/cve/CVE-2023-2465/" source="CVE"/>
		<reference ref_id="CVE-2023-2466" ref_url="https://www.suse.com/security/cve/CVE-2023-2466/" source="CVE"/>
		<reference ref_id="CVE-2023-2467" ref_url="https://www.suse.com/security/cve/CVE-2023-2467/" source="CVE"/>
		<reference ref_id="CVE-2023-2468" ref_url="https://www.suse.com/security/cve/CVE-2023-2468/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-113.0.5672.92-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2459/">CVE-2023-2459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2459">CVE-2023-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2460/">CVE-2023-2460 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2460">CVE-2023-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2461/">CVE-2023-2461 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2461">CVE-2023-2461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2462/">CVE-2023-2462 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2462">CVE-2023-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2463/">CVE-2023-2463 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2463">CVE-2023-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2464/">CVE-2023-2464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2464">CVE-2023-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2465/">CVE-2023-2465 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2465">CVE-2023-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2466/">CVE-2023-2466 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2466">CVE-2023-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2467/">CVE-2023-2467 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2467">CVE-2023-2467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2468/">CVE-2023-2468 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2468">CVE-2023-2468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930286" comment="chromedriver-113.0.5672.92-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930287" comment="chromium-113.0.5672.92-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251244" version="1" class="patch">
	<metadata>
		<title>python310-Flask-2.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30861" ref_url="https://www.suse.com/security/cve/CVE-2023-30861/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-2.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30861/">CVE-2023-30861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30861">CVE-2023-30861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930288" comment="python310-Flask-2.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930289" comment="python310-Flask-doc-2.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930290" comment="python311-Flask-2.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930291" comment="python311-Flask-doc-2.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930292" comment="python39-Flask-2.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930293" comment="python39-Flask-doc-2.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251245" version="1" class="patch">
	<metadata>
		<title>libQt6Svg6-6.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Svg6-6.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930294" comment="libQt6Svg6-6.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930295" comment="libQt6SvgWidgets6-6.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930296" comment="qt6-svg-devel-6.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930297" comment="qt6-svg-examples-6.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930298" comment="qt6-svg-private-devel-6.5.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251246" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2121" ref_url="https://www.suse.com/security/cve/CVE-2022-2121/" source="CVE"/>
		<reference ref_id="CVE-2022-43272" ref_url="https://www.suse.com/security/cve/CVE-2022-43272/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2121/">CVE-2022-2121 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2121">CVE-2022-2121 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43272/">CVE-2022-43272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43272">CVE-2022-43272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930299" comment="dcmtk-3.6.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930300" comment="dcmtk-devel-3.6.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930301" comment="libdcmtk17-3.6.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251247" version="1" class="patch">
	<metadata>
		<title>distribution-registry-2.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2253" ref_url="https://www.suse.com/security/cve/CVE-2023-2253/" source="CVE"/>
		<description>
These are all security issues fixed in the distribution-registry-2.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2253/">CVE-2023-2253 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2253">CVE-2023-2253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930302" comment="distribution-registry-2.8.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251248" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-8.0.33-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21971" ref_url="https://www.suse.com/security/cve/CVE-2023-21971/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-8.0.33-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-21971/">CVE-2023-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21971">CVE-2023-21971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930303" comment="mysql-connector-java-8.0.33-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251249" version="1" class="patch">
	<metadata>
		<title>libQt5Svg5-32bit-5.15.9+kde8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Svg5-32bit-5.15.9+kde8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930304" comment="libQt5Svg5-5.15.9+kde8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930305" comment="libQt5Svg5-32bit-5.15.9+kde8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930306" comment="libqt5-qtsvg-devel-5.15.9+kde8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930307" comment="libqt5-qtsvg-devel-32bit-5.15.9+kde8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930308" comment="libqt5-qtsvg-examples-5.15.9+kde8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930309" comment="libqt5-qtsvg-private-headers-devel-5.15.9+kde8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251250" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930310" comment="postgresql11-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930311" comment="postgresql11-contrib-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930312" comment="postgresql11-devel-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930313" comment="postgresql11-docs-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930314" comment="postgresql11-llvmjit-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930315" comment="postgresql11-llvmjit-devel-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930316" comment="postgresql11-plperl-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930317" comment="postgresql11-plpython-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930318" comment="postgresql11-pltcl-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930319" comment="postgresql11-server-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930320" comment="postgresql11-server-devel-11.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930321" comment="postgresql11-test-11.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251251" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930322" comment="postgresql12-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930323" comment="postgresql12-contrib-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930324" comment="postgresql12-devel-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930325" comment="postgresql12-docs-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930326" comment="postgresql12-llvmjit-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930327" comment="postgresql12-llvmjit-devel-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930328" comment="postgresql12-plperl-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930329" comment="postgresql12-plpython-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930330" comment="postgresql12-pltcl-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930331" comment="postgresql12-server-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930332" comment="postgresql12-server-devel-12.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930333" comment="postgresql12-test-12.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251252" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930334" comment="postgresql13-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930335" comment="postgresql13-contrib-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930336" comment="postgresql13-devel-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930337" comment="postgresql13-docs-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930338" comment="postgresql13-llvmjit-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930339" comment="postgresql13-llvmjit-devel-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930340" comment="postgresql13-plperl-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930341" comment="postgresql13-plpython-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930342" comment="postgresql13-pltcl-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930343" comment="postgresql13-server-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930344" comment="postgresql13-server-devel-13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930345" comment="postgresql13-test-13.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251253" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930346" comment="postgresql14-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930347" comment="postgresql14-contrib-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930348" comment="postgresql14-devel-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930349" comment="postgresql14-docs-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930350" comment="postgresql14-llvmjit-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930351" comment="postgresql14-llvmjit-devel-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930352" comment="postgresql14-plperl-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930353" comment="postgresql14-plpython-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930354" comment="postgresql14-pltcl-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930355" comment="postgresql14-server-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930356" comment="postgresql14-server-devel-14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930357" comment="postgresql14-test-14.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251254" version="1" class="patch">
	<metadata>
		<title>libecpg6-15.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-15.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930358" comment="libecpg6-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930359" comment="libecpg6-32bit-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930360" comment="libpq5-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930361" comment="libpq5-32bit-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930362" comment="postgresql15-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930363" comment="postgresql15-contrib-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930364" comment="postgresql15-devel-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930365" comment="postgresql15-docs-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930366" comment="postgresql15-llvmjit-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930367" comment="postgresql15-llvmjit-devel-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930368" comment="postgresql15-plperl-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930369" comment="postgresql15-plpython-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930370" comment="postgresql15-pltcl-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930371" comment="postgresql15-server-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930372" comment="postgresql15-server-devel-15.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930373" comment="postgresql15-test-15.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251255" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1538-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1538-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930374" comment="gvim-9.0.1538-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930375" comment="vim-9.0.1538-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930376" comment="vim-data-9.0.1538-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930377" comment="vim-data-common-9.0.1538-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930378" comment="vim-small-9.0.1538-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930379" comment="xxd-9.0.1538-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251256" version="1" class="patch">
	<metadata>
		<title>liblxc-devel-5.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47952" ref_url="https://www.suse.com/security/cve/CVE-2022-47952/" source="CVE"/>
		<description>
These are all security issues fixed in the liblxc-devel-5.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-47952/">CVE-2022-47952 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47952">CVE-2022-47952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930380" comment="liblxc-devel-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930381" comment="liblxc1-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930382" comment="lxc-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930383" comment="lxc-bash-completion-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930384" comment="lxc-ja-doc-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930385" comment="lxc-ko-doc-5.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930386" comment="pam_cgfs-5.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251257" version="1" class="patch">
	<metadata>
		<title>libkpathsea6-6.3.5-90.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32668" ref_url="https://www.suse.com/security/cve/CVE-2023-32668/" source="CVE"/>
		<reference ref_id="CVE-2023-32700" ref_url="https://www.suse.com/security/cve/CVE-2023-32700/" source="CVE"/>
		<description>
These are all security issues fixed in the libkpathsea6-6.3.5-90.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32668/">CVE-2023-32668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32668">CVE-2023-32668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32700/">CVE-2023-32700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32700">CVE-2023-32700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930387" comment="libkpathsea6-6.3.5-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930388" comment="libptexenc1-1.4.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930389" comment="libsynctex2-1.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930390" comment="libtexlua53-5-5.3.6-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930391" comment="libtexluajit2-2.1.0beta3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930392" comment="perl-biber-2.19-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930393" comment="texlive-2023.20230311-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930394" comment="texlive-a2ping-bin-2023.20230311.svn27321-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930395" comment="texlive-accfonts-bin-2023.20230311.svn12688-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930396" comment="texlive-adhocfilelist-bin-2023.20230311.svn28038-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930397" comment="texlive-afm2pl-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930398" comment="texlive-albatross-bin-2023.20230311.svn57089-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930399" comment="texlive-aleph-bin-2023.20230311.svn66084-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930400" comment="texlive-amstex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930401" comment="texlive-arara-bin-2023.20230311.svn29036-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930402" comment="texlive-asymptote-bin-2023.20230311.svn66003-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930403" comment="texlive-attachfile2-bin-2023.20230311.svn52909-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930404" comment="texlive-authorindex-bin-2023.20230311.svn18790-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930405" comment="texlive-autosp-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930406" comment="texlive-axodraw2-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930407" comment="texlive-bib2gls-bin-2023.20230311.svn45266-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930408" comment="texlive-bibcop-bin-2023.20230311.svn65257-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930409" comment="texlive-biber-bin-2023.20230311.svn66402-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930410" comment="texlive-biber-ms-bin-2023.20230311.svn66478-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930411" comment="texlive-bibexport-bin-2023.20230311.svn16219-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930412" comment="texlive-bibtex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930413" comment="texlive-bibtex8-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930414" comment="texlive-bibtexu-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930415" comment="texlive-bin-devel-2023.20230311-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930416" comment="texlive-bundledoc-bin-2023.20230311.svn17794-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930417" comment="texlive-cachepic-bin-2023.20230311.svn15543-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930418" comment="texlive-checkcites-bin-2023.20230311.svn25623-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930419" comment="texlive-checklistings-bin-2023.20230311.svn38300-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930420" comment="texlive-chklref-bin-2023.20230311.svn52631-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930421" comment="texlive-chktex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930422" comment="texlive-citation-style-language-bin-2023.20230311.svn64151-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930423" comment="texlive-cjk-gs-integrate-bin-2023.20230311.svn37223-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930424" comment="texlive-cjkutils-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930425" comment="texlive-clojure-pamphlet-bin-2023.20230311.svn51944-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930426" comment="texlive-cluttex-bin-2023.20230311.svn48871-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930427" comment="texlive-context-bin-2023.20230311.svn66562-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930428" comment="texlive-convbkmk-bin-2023.20230311.svn30408-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930429" comment="texlive-crossrefware-bin-2023.20230311.svn45927-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930430" comment="texlive-cslatex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930431" comment="texlive-csplain-bin-2023.20230311.svn50528-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930432" comment="texlive-ctan-o-mat-bin-2023.20230311.svn46996-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930433" comment="texlive-ctanbib-bin-2023.20230311.svn48478-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930434" comment="texlive-ctanify-bin-2023.20230311.svn24061-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930435" comment="texlive-ctanupload-bin-2023.20230311.svn23866-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930436" comment="texlive-ctie-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930437" comment="texlive-cweb-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930438" comment="texlive-cyrillic-bin-bin-2023.20230311.svn53554-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930439" comment="texlive-de-macro-bin-2023.20230311.svn17399-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930440" comment="texlive-detex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930441" comment="texlive-diadia-bin-2023.20230311.svn37645-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930442" comment="texlive-digestif-bin-2023.20230311.svn65210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930443" comment="texlive-dosepsbin-bin-2023.20230311.svn24759-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930444" comment="texlive-dtl-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930445" comment="texlive-dtxgen-bin-2023.20230311.svn29031-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930446" comment="texlive-dviasm-bin-2023.20230311.svn8329-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930447" comment="texlive-dvicopy-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930448" comment="texlive-dvidvi-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930449" comment="texlive-dviinfox-bin-2023.20230311.svn44515-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930450" comment="texlive-dviljk-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930451" comment="texlive-dviout-util-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930452" comment="texlive-dvipdfmx-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930453" comment="texlive-dvipng-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930454" comment="texlive-dvipos-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930455" comment="texlive-dvips-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930456" comment="texlive-dvisvgm-bin-2023.20230311.svn66547-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930457" comment="texlive-eplain-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930458" comment="texlive-epspdf-bin-2023.20230311.svn29050-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930459" comment="texlive-epstopdf-bin-2023.20230311.svn18336-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930460" comment="texlive-exceltex-bin-2023.20230311.svn25860-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930461" comment="texlive-fig4latex-bin-2023.20230311.svn14752-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930462" comment="texlive-findhyph-bin-2023.20230311.svn14758-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930463" comment="texlive-fontinst-bin-2023.20230311.svn53554-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930464" comment="texlive-fontools-bin-2023.20230311.svn25997-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930465" comment="texlive-fontware-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930466" comment="texlive-fragmaster-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930467" comment="texlive-getmap-bin-2023.20230311.svn34971-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930468" comment="texlive-git-latexdiff-bin-2023.20230311.svn54732-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930469" comment="texlive-glossaries-bin-2023.20230311.svn37813-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930470" comment="texlive-gregoriotex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930471" comment="texlive-gsftopk-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930472" comment="texlive-hitex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930473" comment="texlive-hyperxmp-bin-2023.20230311.svn56984-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930474" comment="texlive-jadetex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930475" comment="texlive-jfmutil-bin-2023.20230311.svn44835-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930476" comment="texlive-ketcindy-bin-2023.20230311.svn49033-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930477" comment="texlive-kotex-utils-bin-2023.20230311.svn32101-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930478" comment="texlive-kpathsea-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930479" comment="texlive-kpathsea-devel-6.3.5-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930480" comment="texlive-l3build-bin-2023.20230311.svn46894-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930481" comment="texlive-lacheck-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930482" comment="texlive-latex-bin-bin-2023.20230311.svn54358-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930483" comment="texlive-latex-bin-dev-bin-2023.20230311.svn53999-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930484" comment="texlive-latex-git-log-bin-2023.20230311.svn30983-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930485" comment="texlive-latex-papersize-bin-2023.20230311.svn42296-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930486" comment="texlive-latex2man-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930487" comment="texlive-latex2nemeth-bin-2023.20230311.svn42300-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930488" comment="texlive-latexdiff-bin-2023.20230311.svn16420-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930489" comment="texlive-latexfileversion-bin-2023.20230311.svn25012-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930490" comment="texlive-latexindent-bin-2023.20230311.svn32150-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930491" comment="texlive-latexmk-bin-2023.20230311.svn10937-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930492" comment="texlive-latexpand-bin-2023.20230311.svn27025-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930493" comment="texlive-lcdftypetools-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930494" comment="texlive-light-latex-make-bin-2023.20230311.svn56352-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930495" comment="texlive-lilyglyphs-bin-2023.20230311.svn31696-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930496" comment="texlive-listbib-bin-2023.20230311.svn26126-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930497" comment="texlive-listings-ext-bin-2023.20230311.svn15093-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930498" comment="texlive-lollipop-bin-2023.20230311.svn41465-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930499" comment="texlive-ltxfileinfo-bin-2023.20230311.svn29005-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930500" comment="texlive-ltximg-bin-2023.20230311.svn32346-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930501" comment="texlive-luafindfont-bin-2023.20230311.svn61207-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930502" comment="texlive-luahbtex-bin-2023.20230311.svn66511-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930503" comment="texlive-luajittex-bin-2023.20230311.svn66511-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930504" comment="texlive-luaotfload-bin-2023.20230311.svn34647-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930505" comment="texlive-luatex-bin-2023.20230311.svn66511-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930506" comment="texlive-lwarp-bin-2023.20230311.svn43292-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930507" comment="texlive-m-tx-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930508" comment="texlive-make4ht-bin-2023.20230311.svn37750-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930509" comment="texlive-makedtx-bin-2023.20230311.svn38769-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930510" comment="texlive-makeindex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930511" comment="texlive-match_parens-bin-2023.20230311.svn23500-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930512" comment="texlive-mathspic-bin-2023.20230311.svn23661-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930513" comment="texlive-metafont-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930514" comment="texlive-metapost-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930515" comment="texlive-mex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930516" comment="texlive-mf2pt1-bin-2023.20230311.svn23406-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930517" comment="texlive-mflua-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930518" comment="texlive-mfware-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930519" comment="texlive-mkgrkindex-bin-2023.20230311.svn14428-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930520" comment="texlive-mkjobtexmf-bin-2023.20230311.svn8457-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930521" comment="texlive-mkpic-bin-2023.20230311.svn33688-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930522" comment="texlive-mltex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930523" comment="texlive-mptopdf-bin-2023.20230311.svn18674-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930524" comment="texlive-multibibliography-bin-2023.20230311.svn30534-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930525" comment="texlive-musixtex-bin-2023.20230311.svn37026-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930526" comment="texlive-musixtnt-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930527" comment="texlive-omegaware-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930528" comment="texlive-optex-bin-2023.20230311.svn53804-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930529" comment="texlive-optexcount-bin-2023.20230311.svn59817-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930530" comment="texlive-pagelayout-bin-2023.20230311.svn65625-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930531" comment="texlive-patgen-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930532" comment="texlive-pax-bin-2023.20230311.svn10843-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930533" comment="texlive-pdfbook2-bin-2023.20230311.svn37537-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930534" comment="texlive-pdfcrop-bin-2023.20230311.svn14387-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930535" comment="texlive-pdfjam-bin-2023.20230311.svn52858-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930536" comment="texlive-pdflatexpicscale-bin-2023.20230311.svn41779-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930537" comment="texlive-pdftex-bin-2023.20230311.svn66084-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930538" comment="texlive-pdftex-quiet-bin-2023.20230311.svn49140-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930539" comment="texlive-pdftosrc-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930540" comment="texlive-pdfxup-bin-2023.20230311.svn40690-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930541" comment="texlive-pedigree-perl-bin-2023.20230311.svn25962-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930542" comment="texlive-perltex-bin-2023.20230311.svn16181-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930543" comment="texlive-petri-nets-bin-2023.20230311.svn39165-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930544" comment="texlive-pfarrei-bin-2023.20230311.svn29348-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930545" comment="texlive-pkfix-bin-2023.20230311.svn13364-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930546" comment="texlive-pkfix-helper-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930547" comment="texlive-platex-bin-2023.20230311.svn66079-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930548" comment="texlive-pmx-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930549" comment="texlive-pmxchords-bin-2023.20230311.svn32405-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930550" comment="texlive-ps2eps-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930551" comment="texlive-ps2pk-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930552" comment="texlive-pst-pdf-bin-2023.20230311.svn7838-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930553" comment="texlive-pst2pdf-bin-2023.20230311.svn29333-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930554" comment="texlive-ptex-bin-2023.20230311.svn66084-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930555" comment="texlive-ptex-fontmaps-bin-2023.20230311.svn44206-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930556" comment="texlive-ptex2pdf-bin-2023.20230311.svn29335-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930557" comment="texlive-ptexenc-devel-1.4.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930558" comment="texlive-purifyeps-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930559" comment="texlive-pygmentex-bin-2023.20230311.svn34996-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930560" comment="texlive-pythontex-bin-2023.20230311.svn31638-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930561" comment="texlive-rubik-bin-2023.20230311.svn32919-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930562" comment="texlive-scripts-bin-2023.20230311.svn64356-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930563" comment="texlive-scripts-extra-bin-2023.20230311.svn53577-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930564" comment="texlive-seetexk-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930565" comment="texlive-spix-bin-2023.20230311.svn55933-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930566" comment="texlive-splitindex-bin-2023.20230311.svn29688-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930567" comment="texlive-srcredact-bin-2023.20230311.svn38710-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930568" comment="texlive-sty2dtx-bin-2023.20230311.svn21215-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930569" comment="texlive-svn-multi-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930570" comment="texlive-synctex-bin-2023.20230311.svn66084-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930571" comment="texlive-synctex-devel-1.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930572" comment="texlive-tex-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930573" comment="texlive-tex4ebook-bin-2023.20230311.svn37771-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930574" comment="texlive-tex4ht-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930575" comment="texlive-texaccents-bin-2023.20230311.svn64447-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930576" comment="texlive-texcount-bin-2023.20230311.svn13013-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930577" comment="texlive-texdef-bin-2023.20230311.svn45011-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930578" comment="texlive-texdiff-bin-2023.20230311.svn15506-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930579" comment="texlive-texdirflatten-bin-2023.20230311.svn12782-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930580" comment="texlive-texdoc-bin-2023.20230311.svn47948-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930581" comment="texlive-texdoctk-bin-2023.20230311.svn29741-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930582" comment="texlive-texfot-bin-2023.20230311.svn33155-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930583" comment="texlive-texliveonfly-bin-2023.20230311.svn24062-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930584" comment="texlive-texloganalyser-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930585" comment="texlive-texlogfilter-bin-2023.20230311.svn61780-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930586" comment="texlive-texlogsieve-bin-2023.20230311.svn61328-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930587" comment="texlive-texlua-devel-5.3.6-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930588" comment="texlive-texluajit-devel-2.1.0beta3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930589" comment="texlive-texosquery-bin-2023.20230311.svn43596-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930590" comment="texlive-texplate-bin-2023.20230311.svn53444-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930591" comment="texlive-texsis-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930592" comment="texlive-texware-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930593" comment="texlive-thumbpdf-bin-2023.20230311.svn6898-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930594" comment="texlive-tie-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930595" comment="texlive-tikztosvg-bin-2023.20230311.svn55132-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930596" comment="texlive-tpic2pdftex-bin-2023.20230311.svn50281-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930597" comment="texlive-ttfutils-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930598" comment="texlive-typeoutfileinfo-bin-2023.20230311.svn25648-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930599" comment="texlive-ulqda-bin-2023.20230311.svn13663-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930600" comment="texlive-uplatex-bin-2023.20230311.svn52800-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930601" comment="texlive-upmendex-bin-2023.20230311.svn66511-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930602" comment="texlive-uptex-bin-2023.20230311.svn66382-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930603" comment="texlive-urlbst-bin-2023.20230311.svn23262-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930604" comment="texlive-velthuis-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930605" comment="texlive-vlna-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930606" comment="texlive-vpe-bin-2023.20230311.svn6897-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930607" comment="texlive-web-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930608" comment="texlive-webquiz-bin-2023.20230311.svn50419-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930609" comment="texlive-wordcount-bin-2023.20230311.svn46165-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930610" comment="texlive-xdvi-bin-2023.20230311.svn65877-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930611" comment="texlive-xelatex-dev-bin-2023.20230311.svn53999-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930612" comment="texlive-xetex-bin-2023.20230311.svn66084-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930613" comment="texlive-xindex-bin-2023.20230311.svn49312-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930614" comment="texlive-xml2pmx-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930615" comment="texlive-xmltex-bin-2023.20230311.svn3006-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930616" comment="texlive-xpdfopen-bin-2023.20230311.svn62210-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930617" comment="texlive-yplan-bin-2023.20230311.svn34398-90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251258" version="1" class="patch">
	<metadata>
		<title>libmodsecurity3-3.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28882" ref_url="https://www.suse.com/security/cve/CVE-2023-28882/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodsecurity3-3.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28882/">CVE-2023-28882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28882">CVE-2023-28882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930618" comment="libmodsecurity3-3.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930619" comment="modsecurity-3.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930620" comment="modsecurity-devel-3.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251259" version="1" class="patch">
	<metadata>
		<title>chromedriver-113.0.5672.126-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2721" ref_url="https://www.suse.com/security/cve/CVE-2023-2721/" source="CVE"/>
		<reference ref_id="CVE-2023-2722" ref_url="https://www.suse.com/security/cve/CVE-2023-2722/" source="CVE"/>
		<reference ref_id="CVE-2023-2723" ref_url="https://www.suse.com/security/cve/CVE-2023-2723/" source="CVE"/>
		<reference ref_id="CVE-2023-2724" ref_url="https://www.suse.com/security/cve/CVE-2023-2724/" source="CVE"/>
		<reference ref_id="CVE-2023-2725" ref_url="https://www.suse.com/security/cve/CVE-2023-2725/" source="CVE"/>
		<reference ref_id="CVE-2023-2726" ref_url="https://www.suse.com/security/cve/CVE-2023-2726/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-113.0.5672.126-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2721/">CVE-2023-2721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2721">CVE-2023-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2722/">CVE-2023-2722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2722">CVE-2023-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2723/">CVE-2023-2723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2723">CVE-2023-2723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2724/">CVE-2023-2724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2724">CVE-2023-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2725/">CVE-2023-2725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2725">CVE-2023-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2726/">CVE-2023-2726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2726">CVE-2023-2726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930621" comment="chromedriver-113.0.5672.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930622" comment="chromium-113.0.5672.126-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251260" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.28.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24805" ref_url="https://www.suse.com/security/cve/CVE-2023-24805/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.28.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24805/">CVE-2023-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24805">CVE-2023-24805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930623" comment="cups-filters-1.28.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930624" comment="cups-filters-devel-1.28.15-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251261" version="1" class="patch">
	<metadata>
		<title>curl-8.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28319" ref_url="https://www.suse.com/security/cve/CVE-2023-28319/" source="CVE"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28319/">CVE-2023-28319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930625" comment="curl-8.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930626" comment="libcurl-devel-8.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930627" comment="libcurl-devel-32bit-8.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930628" comment="libcurl4-8.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930629" comment="libcurl4-32bit-8.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251262" version="1" class="patch">
	<metadata>
		<title>radare2-5.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1605" ref_url="https://www.suse.com/security/cve/CVE-2023-1605/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1605/">CVE-2023-1605 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1605">CVE-2023-1605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930630" comment="radare2-5.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930631" comment="radare2-devel-5.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930632" comment="radare2-zsh-completion-5.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251263" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_1-0-3.1.0-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1668" ref_url="https://www.suse.com/security/cve/CVE-2023-1668/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_1-0-3.1.0-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1668/">CVE-2023-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1668">CVE-2023-1668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930633" comment="libopenvswitch-3_1-0-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930634" comment="libovn-23_03-0-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930635" comment="openvswitch-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930636" comment="openvswitch-devel-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930637" comment="openvswitch-doc-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930638" comment="openvswitch-ipsec-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930639" comment="openvswitch-pki-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930640" comment="openvswitch-test-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930641" comment="openvswitch-vtep-3.1.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930642" comment="ovn-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930643" comment="ovn-central-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930644" comment="ovn-devel-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930645" comment="ovn-doc-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930646" comment="ovn-docker-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930647" comment="ovn-host-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930648" comment="ovn-vtep-23.03.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930649" comment="python3-ovs-3.1.0-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251264" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31047" ref_url="https://www.suse.com/security/cve/CVE-2023-31047/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-31047/">CVE-2023-31047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31047">CVE-2023-31047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930650" comment="python310-Django-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930651" comment="python311-Django-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930652" comment="python39-Django-4.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251265" version="1" class="patch">
	<metadata>
		<title>python310-urllib3_1-1.26.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3_1-1.26.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930653" comment="python310-urllib3_1-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930654" comment="python311-urllib3_1-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930655" comment="python39-urllib3_1-1.26.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251266" version="1" class="patch">
	<metadata>
		<title>libcap-devel-2.69-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-devel-2.69-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930656" comment="libcap-devel-2.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930657" comment="libcap-progs-2.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930658" comment="libcap2-2.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930659" comment="libcap2-32bit-2.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930660" comment="libpsx2-2.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930661" comment="libpsx2-32bit-2.69-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251267" version="1" class="patch">
	<metadata>
		<title>djvulibre-3.5.28-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
These are all security issues fixed in the djvulibre-3.5.28-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930662" comment="djvulibre-3.5.28-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930663" comment="djvulibre-doc-3.5.28-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930664" comment="libdjvulibre-devel-3.5.28-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930665" comment="libdjvulibre21-3.5.28-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251268" version="1" class="patch">
	<metadata>
		<title>python39-3.9.16-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.16-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930666" comment="python39-3.9.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930667" comment="python39-32bit-3.9.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930668" comment="python39-curses-3.9.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930669" comment="python39-dbm-3.9.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930670" comment="python39-idle-3.9.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930671" comment="python39-tk-3.9.16-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251269" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-113.0.5672.92-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3015" ref_url="https://www.suse.com/security/cve/CVE-2011-3015/" source="CVE"/>
		<reference ref_id="CVE-2011-3016" ref_url="https://www.suse.com/security/cve/CVE-2011-3016/" source="CVE"/>
		<reference ref_id="CVE-2011-3017" ref_url="https://www.suse.com/security/cve/CVE-2011-3017/" source="CVE"/>
		<reference ref_id="CVE-2011-3018" ref_url="https://www.suse.com/security/cve/CVE-2011-3018/" source="CVE"/>
		<reference ref_id="CVE-2011-3019" ref_url="https://www.suse.com/security/cve/CVE-2011-3019/" source="CVE"/>
		<reference ref_id="CVE-2011-3020" ref_url="https://www.suse.com/security/cve/CVE-2011-3020/" source="CVE"/>
		<reference ref_id="CVE-2011-3021" ref_url="https://www.suse.com/security/cve/CVE-2011-3021/" source="CVE"/>
		<reference ref_id="CVE-2011-3022" ref_url="https://www.suse.com/security/cve/CVE-2011-3022/" source="CVE"/>
		<reference ref_id="CVE-2011-3023" ref_url="https://www.suse.com/security/cve/CVE-2011-3023/" source="CVE"/>
		<reference ref_id="CVE-2011-3024" ref_url="https://www.suse.com/security/cve/CVE-2011-3024/" source="CVE"/>
		<reference ref_id="CVE-2011-3025" ref_url="https://www.suse.com/security/cve/CVE-2011-3025/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3027" ref_url="https://www.suse.com/security/cve/CVE-2011-3027/" source="CVE"/>
		<reference ref_id="CVE-2011-3031" ref_url="https://www.suse.com/security/cve/CVE-2011-3031/" source="CVE"/>
		<reference ref_id="CVE-2011-3032" ref_url="https://www.suse.com/security/cve/CVE-2011-3032/" source="CVE"/>
		<reference ref_id="CVE-2011-3033" ref_url="https://www.suse.com/security/cve/CVE-2011-3033/" source="CVE"/>
		<reference ref_id="CVE-2011-3034" ref_url="https://www.suse.com/security/cve/CVE-2011-3034/" source="CVE"/>
		<reference ref_id="CVE-2011-3035" ref_url="https://www.suse.com/security/cve/CVE-2011-3035/" source="CVE"/>
		<reference ref_id="CVE-2011-3036" ref_url="https://www.suse.com/security/cve/CVE-2011-3036/" source="CVE"/>
		<reference ref_id="CVE-2011-3037" ref_url="https://www.suse.com/security/cve/CVE-2011-3037/" source="CVE"/>
		<reference ref_id="CVE-2011-3038" ref_url="https://www.suse.com/security/cve/CVE-2011-3038/" source="CVE"/>
		<reference ref_id="CVE-2011-3039" ref_url="https://www.suse.com/security/cve/CVE-2011-3039/" source="CVE"/>
		<reference ref_id="CVE-2011-3040" ref_url="https://www.suse.com/security/cve/CVE-2011-3040/" source="CVE"/>
		<reference ref_id="CVE-2011-3041" ref_url="https://www.suse.com/security/cve/CVE-2011-3041/" source="CVE"/>
		<reference ref_id="CVE-2011-3042" ref_url="https://www.suse.com/security/cve/CVE-2011-3042/" source="CVE"/>
		<reference ref_id="CVE-2011-3043" ref_url="https://www.suse.com/security/cve/CVE-2011-3043/" source="CVE"/>
		<reference ref_id="CVE-2011-3044" ref_url="https://www.suse.com/security/cve/CVE-2011-3044/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3046" ref_url="https://www.suse.com/security/cve/CVE-2011-3046/" source="CVE"/>
		<reference ref_id="CVE-2011-3047" ref_url="https://www.suse.com/security/cve/CVE-2011-3047/" source="CVE"/>
		<reference ref_id="CVE-2011-3049" ref_url="https://www.suse.com/security/cve/CVE-2011-3049/" source="CVE"/>
		<reference ref_id="CVE-2011-3050" ref_url="https://www.suse.com/security/cve/CVE-2011-3050/" source="CVE"/>
		<reference ref_id="CVE-2011-3051" ref_url="https://www.suse.com/security/cve/CVE-2011-3051/" source="CVE"/>
		<reference ref_id="CVE-2011-3052" ref_url="https://www.suse.com/security/cve/CVE-2011-3052/" source="CVE"/>
		<reference ref_id="CVE-2011-3053" ref_url="https://www.suse.com/security/cve/CVE-2011-3053/" source="CVE"/>
		<reference ref_id="CVE-2011-3054" ref_url="https://www.suse.com/security/cve/CVE-2011-3054/" source="CVE"/>
		<reference ref_id="CVE-2011-3055" ref_url="https://www.suse.com/security/cve/CVE-2011-3055/" source="CVE"/>
		<reference ref_id="CVE-2011-3056" ref_url="https://www.suse.com/security/cve/CVE-2011-3056/" source="CVE"/>
		<reference ref_id="CVE-2011-3057" ref_url="https://www.suse.com/security/cve/CVE-2011-3057/" source="CVE"/>
		<reference ref_id="CVE-2011-3058" ref_url="https://www.suse.com/security/cve/CVE-2011-3058/" source="CVE"/>
		<reference ref_id="CVE-2011-3059" ref_url="https://www.suse.com/security/cve/CVE-2011-3059/" source="CVE"/>
		<reference ref_id="CVE-2011-3060" ref_url="https://www.suse.com/security/cve/CVE-2011-3060/" source="CVE"/>
		<reference ref_id="CVE-2011-3061" ref_url="https://www.suse.com/security/cve/CVE-2011-3061/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3063" ref_url="https://www.suse.com/security/cve/CVE-2011-3063/" source="CVE"/>
		<reference ref_id="CVE-2011-3064" ref_url="https://www.suse.com/security/cve/CVE-2011-3064/" source="CVE"/>
		<reference ref_id="CVE-2011-3065" ref_url="https://www.suse.com/security/cve/CVE-2011-3065/" source="CVE"/>
		<reference ref_id="CVE-2011-3066" ref_url="https://www.suse.com/security/cve/CVE-2011-3066/" source="CVE"/>
		<reference ref_id="CVE-2011-3067" ref_url="https://www.suse.com/security/cve/CVE-2011-3067/" source="CVE"/>
		<reference ref_id="CVE-2011-3068" ref_url="https://www.suse.com/security/cve/CVE-2011-3068/" source="CVE"/>
		<reference ref_id="CVE-2011-3069" ref_url="https://www.suse.com/security/cve/CVE-2011-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-3070" ref_url="https://www.suse.com/security/cve/CVE-2011-3070/" source="CVE"/>
		<reference ref_id="CVE-2011-3071" ref_url="https://www.suse.com/security/cve/CVE-2011-3071/" source="CVE"/>
		<reference ref_id="CVE-2011-3072" ref_url="https://www.suse.com/security/cve/CVE-2011-3072/" source="CVE"/>
		<reference ref_id="CVE-2011-3073" ref_url="https://www.suse.com/security/cve/CVE-2011-3073/" source="CVE"/>
		<reference ref_id="CVE-2011-3074" ref_url="https://www.suse.com/security/cve/CVE-2011-3074/" source="CVE"/>
		<reference ref_id="CVE-2011-3075" ref_url="https://www.suse.com/security/cve/CVE-2011-3075/" source="CVE"/>
		<reference ref_id="CVE-2011-3076" ref_url="https://www.suse.com/security/cve/CVE-2011-3076/" source="CVE"/>
		<reference ref_id="CVE-2011-3077" ref_url="https://www.suse.com/security/cve/CVE-2011-3077/" source="CVE"/>
		<reference ref_id="CVE-2011-3078" ref_url="https://www.suse.com/security/cve/CVE-2011-3078/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3080" ref_url="https://www.suse.com/security/cve/CVE-2011-3080/" source="CVE"/>
		<reference ref_id="CVE-2011-3081" ref_url="https://www.suse.com/security/cve/CVE-2011-3081/" source="CVE"/>
		<reference ref_id="CVE-2011-3083" ref_url="https://www.suse.com/security/cve/CVE-2011-3083/" source="CVE"/>
		<reference ref_id="CVE-2011-3084" ref_url="https://www.suse.com/security/cve/CVE-2011-3084/" source="CVE"/>
		<reference ref_id="CVE-2011-3085" ref_url="https://www.suse.com/security/cve/CVE-2011-3085/" source="CVE"/>
		<reference ref_id="CVE-2011-3086" ref_url="https://www.suse.com/security/cve/CVE-2011-3086/" source="CVE"/>
		<reference ref_id="CVE-2011-3087" ref_url="https://www.suse.com/security/cve/CVE-2011-3087/" source="CVE"/>
		<reference ref_id="CVE-2011-3088" ref_url="https://www.suse.com/security/cve/CVE-2011-3088/" source="CVE"/>
		<reference ref_id="CVE-2011-3089" ref_url="https://www.suse.com/security/cve/CVE-2011-3089/" source="CVE"/>
		<reference ref_id="CVE-2011-3090" ref_url="https://www.suse.com/security/cve/CVE-2011-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-3091" ref_url="https://www.suse.com/security/cve/CVE-2011-3091/" source="CVE"/>
		<reference ref_id="CVE-2011-3092" ref_url="https://www.suse.com/security/cve/CVE-2011-3092/" source="CVE"/>
		<reference ref_id="CVE-2011-3093" ref_url="https://www.suse.com/security/cve/CVE-2011-3093/" source="CVE"/>
		<reference ref_id="CVE-2011-3094" ref_url="https://www.suse.com/security/cve/CVE-2011-3094/" source="CVE"/>
		<reference ref_id="CVE-2011-3095" ref_url="https://www.suse.com/security/cve/CVE-2011-3095/" source="CVE"/>
		<reference ref_id="CVE-2011-3096" ref_url="https://www.suse.com/security/cve/CVE-2011-3096/" source="CVE"/>
		<reference ref_id="CVE-2011-3098" ref_url="https://www.suse.com/security/cve/CVE-2011-3098/" source="CVE"/>
		<reference ref_id="CVE-2011-3100" ref_url="https://www.suse.com/security/cve/CVE-2011-3100/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3903" ref_url="https://www.suse.com/security/cve/CVE-2011-3903/" source="CVE"/>
		<reference ref_id="CVE-2011-3904" ref_url="https://www.suse.com/security/cve/CVE-2011-3904/" source="CVE"/>
		<reference ref_id="CVE-2011-3905" ref_url="https://www.suse.com/security/cve/CVE-2011-3905/" source="CVE"/>
		<reference ref_id="CVE-2011-3906" ref_url="https://www.suse.com/security/cve/CVE-2011-3906/" source="CVE"/>
		<reference ref_id="CVE-2011-3907" ref_url="https://www.suse.com/security/cve/CVE-2011-3907/" source="CVE"/>
		<reference ref_id="CVE-2011-3908" ref_url="https://www.suse.com/security/cve/CVE-2011-3908/" source="CVE"/>
		<reference ref_id="CVE-2011-3909" ref_url="https://www.suse.com/security/cve/CVE-2011-3909/" source="CVE"/>
		<reference ref_id="CVE-2011-3910" ref_url="https://www.suse.com/security/cve/CVE-2011-3910/" source="CVE"/>
		<reference ref_id="CVE-2011-3911" ref_url="https://www.suse.com/security/cve/CVE-2011-3911/" source="CVE"/>
		<reference ref_id="CVE-2011-3912" ref_url="https://www.suse.com/security/cve/CVE-2011-3912/" source="CVE"/>
		<reference ref_id="CVE-2011-3914" ref_url="https://www.suse.com/security/cve/CVE-2011-3914/" source="CVE"/>
		<reference ref_id="CVE-2011-3915" ref_url="https://www.suse.com/security/cve/CVE-2011-3915/" source="CVE"/>
		<reference ref_id="CVE-2011-3916" ref_url="https://www.suse.com/security/cve/CVE-2011-3916/" source="CVE"/>
		<reference ref_id="CVE-2011-3917" ref_url="https://www.suse.com/security/cve/CVE-2011-3917/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-3921" ref_url="https://www.suse.com/security/cve/CVE-2011-3921/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2011-3924" ref_url="https://www.suse.com/security/cve/CVE-2011-3924/" source="CVE"/>
		<reference ref_id="CVE-2011-3925" ref_url="https://www.suse.com/security/cve/CVE-2011-3925/" source="CVE"/>
		<reference ref_id="CVE-2011-3926" ref_url="https://www.suse.com/security/cve/CVE-2011-3926/" source="CVE"/>
		<reference ref_id="CVE-2011-3927" ref_url="https://www.suse.com/security/cve/CVE-2011-3927/" source="CVE"/>
		<reference ref_id="CVE-2011-3928" ref_url="https://www.suse.com/security/cve/CVE-2011-3928/" source="CVE"/>
		<reference ref_id="CVE-2011-3953" ref_url="https://www.suse.com/security/cve/CVE-2011-3953/" source="CVE"/>
		<reference ref_id="CVE-2011-3954" ref_url="https://www.suse.com/security/cve/CVE-2011-3954/" source="CVE"/>
		<reference ref_id="CVE-2011-3955" ref_url="https://www.suse.com/security/cve/CVE-2011-3955/" source="CVE"/>
		<reference ref_id="CVE-2011-3956" ref_url="https://www.suse.com/security/cve/CVE-2011-3956/" source="CVE"/>
		<reference ref_id="CVE-2011-3957" ref_url="https://www.suse.com/security/cve/CVE-2011-3957/" source="CVE"/>
		<reference ref_id="CVE-2011-3958" ref_url="https://www.suse.com/security/cve/CVE-2011-3958/" source="CVE"/>
		<reference ref_id="CVE-2011-3959" ref_url="https://www.suse.com/security/cve/CVE-2011-3959/" source="CVE"/>
		<reference ref_id="CVE-2011-3960" ref_url="https://www.suse.com/security/cve/CVE-2011-3960/" source="CVE"/>
		<reference ref_id="CVE-2011-3961" ref_url="https://www.suse.com/security/cve/CVE-2011-3961/" source="CVE"/>
		<reference ref_id="CVE-2011-3962" ref_url="https://www.suse.com/security/cve/CVE-2011-3962/" source="CVE"/>
		<reference ref_id="CVE-2011-3963" ref_url="https://www.suse.com/security/cve/CVE-2011-3963/" source="CVE"/>
		<reference ref_id="CVE-2011-3964" ref_url="https://www.suse.com/security/cve/CVE-2011-3964/" source="CVE"/>
		<reference ref_id="CVE-2011-3965" ref_url="https://www.suse.com/security/cve/CVE-2011-3965/" source="CVE"/>
		<reference ref_id="CVE-2011-3966" ref_url="https://www.suse.com/security/cve/CVE-2011-3966/" source="CVE"/>
		<reference ref_id="CVE-2011-3967" ref_url="https://www.suse.com/security/cve/CVE-2011-3967/" source="CVE"/>
		<reference ref_id="CVE-2011-3968" ref_url="https://www.suse.com/security/cve/CVE-2011-3968/" source="CVE"/>
		<reference ref_id="CVE-2011-3969" ref_url="https://www.suse.com/security/cve/CVE-2011-3969/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2011-3971" ref_url="https://www.suse.com/security/cve/CVE-2011-3971/" source="CVE"/>
		<reference ref_id="CVE-2011-3972" ref_url="https://www.suse.com/security/cve/CVE-2011-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-1521" ref_url="https://www.suse.com/security/cve/CVE-2012-1521/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-2815" ref_url="https://www.suse.com/security/cve/CVE-2012-2815/" source="CVE"/>
		<reference ref_id="CVE-2012-2816" ref_url="https://www.suse.com/security/cve/CVE-2012-2816/" source="CVE"/>
		<reference ref_id="CVE-2012-2817" ref_url="https://www.suse.com/security/cve/CVE-2012-2817/" source="CVE"/>
		<reference ref_id="CVE-2012-2818" ref_url="https://www.suse.com/security/cve/CVE-2012-2818/" source="CVE"/>
		<reference ref_id="CVE-2012-2819" ref_url="https://www.suse.com/security/cve/CVE-2012-2819/" source="CVE"/>
		<reference ref_id="CVE-2012-2820" ref_url="https://www.suse.com/security/cve/CVE-2012-2820/" source="CVE"/>
		<reference ref_id="CVE-2012-2821" ref_url="https://www.suse.com/security/cve/CVE-2012-2821/" source="CVE"/>
		<reference ref_id="CVE-2012-2823" ref_url="https://www.suse.com/security/cve/CVE-2012-2823/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-2826" ref_url="https://www.suse.com/security/cve/CVE-2012-2826/" source="CVE"/>
		<reference ref_id="CVE-2012-2829" ref_url="https://www.suse.com/security/cve/CVE-2012-2829/" source="CVE"/>
		<reference ref_id="CVE-2012-2830" ref_url="https://www.suse.com/security/cve/CVE-2012-2830/" source="CVE"/>
		<reference ref_id="CVE-2012-2831" ref_url="https://www.suse.com/security/cve/CVE-2012-2831/" source="CVE"/>
		<reference ref_id="CVE-2012-2834" ref_url="https://www.suse.com/security/cve/CVE-2012-2834/" source="CVE"/>
		<reference ref_id="CVE-2012-2842" ref_url="https://www.suse.com/security/cve/CVE-2012-2842/" source="CVE"/>
		<reference ref_id="CVE-2012-2843" ref_url="https://www.suse.com/security/cve/CVE-2012-2843/" source="CVE"/>
		<reference ref_id="CVE-2012-2865" ref_url="https://www.suse.com/security/cve/CVE-2012-2865/" source="CVE"/>
		<reference ref_id="CVE-2012-2866" ref_url="https://www.suse.com/security/cve/CVE-2012-2866/" source="CVE"/>
		<reference ref_id="CVE-2012-2867" ref_url="https://www.suse.com/security/cve/CVE-2012-2867/" source="CVE"/>
		<reference ref_id="CVE-2012-2868" ref_url="https://www.suse.com/security/cve/CVE-2012-2868/" source="CVE"/>
		<reference ref_id="CVE-2012-2869" ref_url="https://www.suse.com/security/cve/CVE-2012-2869/" source="CVE"/>
		<reference ref_id="CVE-2012-2870" ref_url="https://www.suse.com/security/cve/CVE-2012-2870/" source="CVE"/>
		<reference ref_id="CVE-2012-2871" ref_url="https://www.suse.com/security/cve/CVE-2012-2871/" source="CVE"/>
		<reference ref_id="CVE-2012-2872" ref_url="https://www.suse.com/security/cve/CVE-2012-2872/" source="CVE"/>
		<reference ref_id="CVE-2012-2874" ref_url="https://www.suse.com/security/cve/CVE-2012-2874/" source="CVE"/>
		<reference ref_id="CVE-2012-2876" ref_url="https://www.suse.com/security/cve/CVE-2012-2876/" source="CVE"/>
		<reference ref_id="CVE-2012-2877" ref_url="https://www.suse.com/security/cve/CVE-2012-2877/" source="CVE"/>
		<reference ref_id="CVE-2012-2878" ref_url="https://www.suse.com/security/cve/CVE-2012-2878/" source="CVE"/>
		<reference ref_id="CVE-2012-2879" ref_url="https://www.suse.com/security/cve/CVE-2012-2879/" source="CVE"/>
		<reference ref_id="CVE-2012-2880" ref_url="https://www.suse.com/security/cve/CVE-2012-2880/" source="CVE"/>
		<reference ref_id="CVE-2012-2881" ref_url="https://www.suse.com/security/cve/CVE-2012-2881/" source="CVE"/>
		<reference ref_id="CVE-2012-2882" ref_url="https://www.suse.com/security/cve/CVE-2012-2882/" source="CVE"/>
		<reference ref_id="CVE-2012-2883" ref_url="https://www.suse.com/security/cve/CVE-2012-2883/" source="CVE"/>
		<reference ref_id="CVE-2012-2884" ref_url="https://www.suse.com/security/cve/CVE-2012-2884/" source="CVE"/>
		<reference ref_id="CVE-2012-2885" ref_url="https://www.suse.com/security/cve/CVE-2012-2885/" source="CVE"/>
		<reference ref_id="CVE-2012-2886" ref_url="https://www.suse.com/security/cve/CVE-2012-2886/" source="CVE"/>
		<reference ref_id="CVE-2012-2887" ref_url="https://www.suse.com/security/cve/CVE-2012-2887/" source="CVE"/>
		<reference ref_id="CVE-2012-2888" ref_url="https://www.suse.com/security/cve/CVE-2012-2888/" source="CVE"/>
		<reference ref_id="CVE-2012-2889" ref_url="https://www.suse.com/security/cve/CVE-2012-2889/" source="CVE"/>
		<reference ref_id="CVE-2012-2891" ref_url="https://www.suse.com/security/cve/CVE-2012-2891/" source="CVE"/>
		<reference ref_id="CVE-2012-2892" ref_url="https://www.suse.com/security/cve/CVE-2012-2892/" source="CVE"/>
		<reference ref_id="CVE-2012-2893" ref_url="https://www.suse.com/security/cve/CVE-2012-2893/" source="CVE"/>
		<reference ref_id="CVE-2012-2894" ref_url="https://www.suse.com/security/cve/CVE-2012-2894/" source="CVE"/>
		<reference ref_id="CVE-2012-2896" ref_url="https://www.suse.com/security/cve/CVE-2012-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-5130" ref_url="https://www.suse.com/security/cve/CVE-2012-5130/" source="CVE"/>
		<reference ref_id="CVE-2012-5131" ref_url="https://www.suse.com/security/cve/CVE-2012-5131/" source="CVE"/>
		<reference ref_id="CVE-2012-5132" ref_url="https://www.suse.com/security/cve/CVE-2012-5132/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2012-5135" ref_url="https://www.suse.com/security/cve/CVE-2012-5135/" source="CVE"/>
		<reference ref_id="CVE-2012-5136" ref_url="https://www.suse.com/security/cve/CVE-2012-5136/" source="CVE"/>
		<reference ref_id="CVE-2012-5137" ref_url="https://www.suse.com/security/cve/CVE-2012-5137/" source="CVE"/>
		<reference ref_id="CVE-2012-5138" ref_url="https://www.suse.com/security/cve/CVE-2012-5138/" source="CVE"/>
		<reference ref_id="CVE-2012-5139" ref_url="https://www.suse.com/security/cve/CVE-2012-5139/" source="CVE"/>
		<reference ref_id="CVE-2012-5140" ref_url="https://www.suse.com/security/cve/CVE-2012-5140/" source="CVE"/>
		<reference ref_id="CVE-2012-5141" ref_url="https://www.suse.com/security/cve/CVE-2012-5141/" source="CVE"/>
		<reference ref_id="CVE-2012-5142" ref_url="https://www.suse.com/security/cve/CVE-2012-5142/" source="CVE"/>
		<reference ref_id="CVE-2012-5143" ref_url="https://www.suse.com/security/cve/CVE-2012-5143/" source="CVE"/>
		<reference ref_id="CVE-2012-5144" ref_url="https://www.suse.com/security/cve/CVE-2012-5144/" source="CVE"/>
		<reference ref_id="CVE-2012-5145" ref_url="https://www.suse.com/security/cve/CVE-2012-5145/" source="CVE"/>
		<reference ref_id="CVE-2012-5146" ref_url="https://www.suse.com/security/cve/CVE-2012-5146/" source="CVE"/>
		<reference ref_id="CVE-2012-5147" ref_url="https://www.suse.com/security/cve/CVE-2012-5147/" source="CVE"/>
		<reference ref_id="CVE-2012-5148" ref_url="https://www.suse.com/security/cve/CVE-2012-5148/" source="CVE"/>
		<reference ref_id="CVE-2012-5149" ref_url="https://www.suse.com/security/cve/CVE-2012-5149/" source="CVE"/>
		<reference ref_id="CVE-2012-5150" ref_url="https://www.suse.com/security/cve/CVE-2012-5150/" source="CVE"/>
		<reference ref_id="CVE-2012-5152" ref_url="https://www.suse.com/security/cve/CVE-2012-5152/" source="CVE"/>
		<reference ref_id="CVE-2012-5153" ref_url="https://www.suse.com/security/cve/CVE-2012-5153/" source="CVE"/>
		<reference ref_id="CVE-2012-5154" ref_url="https://www.suse.com/security/cve/CVE-2012-5154/" source="CVE"/>
		<reference ref_id="CVE-2013-0830" ref_url="https://www.suse.com/security/cve/CVE-2013-0830/" source="CVE"/>
		<reference ref_id="CVE-2013-0831" ref_url="https://www.suse.com/security/cve/CVE-2013-0831/" source="CVE"/>
		<reference ref_id="CVE-2013-0832" ref_url="https://www.suse.com/security/cve/CVE-2013-0832/" source="CVE"/>
		<reference ref_id="CVE-2013-0833" ref_url="https://www.suse.com/security/cve/CVE-2013-0833/" source="CVE"/>
		<reference ref_id="CVE-2013-0834" ref_url="https://www.suse.com/security/cve/CVE-2013-0834/" source="CVE"/>
		<reference ref_id="CVE-2013-0835" ref_url="https://www.suse.com/security/cve/CVE-2013-0835/" source="CVE"/>
		<reference ref_id="CVE-2013-0836" ref_url="https://www.suse.com/security/cve/CVE-2013-0836/" source="CVE"/>
		<reference ref_id="CVE-2013-0837" ref_url="https://www.suse.com/security/cve/CVE-2013-0837/" source="CVE"/>
		<reference ref_id="CVE-2013-0838" ref_url="https://www.suse.com/security/cve/CVE-2013-0838/" source="CVE"/>
		<reference ref_id="CVE-2013-0879" ref_url="https://www.suse.com/security/cve/CVE-2013-0879/" source="CVE"/>
		<reference ref_id="CVE-2013-0880" ref_url="https://www.suse.com/security/cve/CVE-2013-0880/" source="CVE"/>
		<reference ref_id="CVE-2013-0881" ref_url="https://www.suse.com/security/cve/CVE-2013-0881/" source="CVE"/>
		<reference ref_id="CVE-2013-0882" ref_url="https://www.suse.com/security/cve/CVE-2013-0882/" source="CVE"/>
		<reference ref_id="CVE-2013-0883" ref_url="https://www.suse.com/security/cve/CVE-2013-0883/" source="CVE"/>
		<reference ref_id="CVE-2013-0884" ref_url="https://www.suse.com/security/cve/CVE-2013-0884/" source="CVE"/>
		<reference ref_id="CVE-2013-0885" ref_url="https://www.suse.com/security/cve/CVE-2013-0885/" source="CVE"/>
		<reference ref_id="CVE-2013-0886" ref_url="https://www.suse.com/security/cve/CVE-2013-0886/" source="CVE"/>
		<reference ref_id="CVE-2013-0887" ref_url="https://www.suse.com/security/cve/CVE-2013-0887/" source="CVE"/>
		<reference ref_id="CVE-2013-0888" ref_url="https://www.suse.com/security/cve/CVE-2013-0888/" source="CVE"/>
		<reference ref_id="CVE-2013-0889" ref_url="https://www.suse.com/security/cve/CVE-2013-0889/" source="CVE"/>
		<reference ref_id="CVE-2013-0890" ref_url="https://www.suse.com/security/cve/CVE-2013-0890/" source="CVE"/>
		<reference ref_id="CVE-2013-0891" ref_url="https://www.suse.com/security/cve/CVE-2013-0891/" source="CVE"/>
		<reference ref_id="CVE-2013-0892" ref_url="https://www.suse.com/security/cve/CVE-2013-0892/" source="CVE"/>
		<reference ref_id="CVE-2013-0893" ref_url="https://www.suse.com/security/cve/CVE-2013-0893/" source="CVE"/>
		<reference ref_id="CVE-2013-0894" ref_url="https://www.suse.com/security/cve/CVE-2013-0894/" source="CVE"/>
		<reference ref_id="CVE-2013-0895" ref_url="https://www.suse.com/security/cve/CVE-2013-0895/" source="CVE"/>
		<reference ref_id="CVE-2013-0896" ref_url="https://www.suse.com/security/cve/CVE-2013-0896/" source="CVE"/>
		<reference ref_id="CVE-2013-0897" ref_url="https://www.suse.com/security/cve/CVE-2013-0897/" source="CVE"/>
		<reference ref_id="CVE-2013-0898" ref_url="https://www.suse.com/security/cve/CVE-2013-0898/" source="CVE"/>
		<reference ref_id="CVE-2013-0899" ref_url="https://www.suse.com/security/cve/CVE-2013-0899/" source="CVE"/>
		<reference ref_id="CVE-2013-0900" ref_url="https://www.suse.com/security/cve/CVE-2013-0900/" source="CVE"/>
		<reference ref_id="CVE-2013-2838" ref_url="https://www.suse.com/security/cve/CVE-2013-2838/" source="CVE"/>
		<reference ref_id="CVE-2013-2906" ref_url="https://www.suse.com/security/cve/CVE-2013-2906/" source="CVE"/>
		<reference ref_id="CVE-2013-2907" ref_url="https://www.suse.com/security/cve/CVE-2013-2907/" source="CVE"/>
		<reference ref_id="CVE-2013-2908" ref_url="https://www.suse.com/security/cve/CVE-2013-2908/" source="CVE"/>
		<reference ref_id="CVE-2013-2909" ref_url="https://www.suse.com/security/cve/CVE-2013-2909/" source="CVE"/>
		<reference ref_id="CVE-2013-2910" ref_url="https://www.suse.com/security/cve/CVE-2013-2910/" source="CVE"/>
		<reference ref_id="CVE-2013-2911" ref_url="https://www.suse.com/security/cve/CVE-2013-2911/" source="CVE"/>
		<reference ref_id="CVE-2013-2912" ref_url="https://www.suse.com/security/cve/CVE-2013-2912/" source="CVE"/>
		<reference ref_id="CVE-2013-2913" ref_url="https://www.suse.com/security/cve/CVE-2013-2913/" source="CVE"/>
		<reference ref_id="CVE-2013-2914" ref_url="https://www.suse.com/security/cve/CVE-2013-2914/" source="CVE"/>
		<reference ref_id="CVE-2013-2915" ref_url="https://www.suse.com/security/cve/CVE-2013-2915/" source="CVE"/>
		<reference ref_id="CVE-2013-2916" ref_url="https://www.suse.com/security/cve/CVE-2013-2916/" source="CVE"/>
		<reference ref_id="CVE-2013-2917" ref_url="https://www.suse.com/security/cve/CVE-2013-2917/" source="CVE"/>
		<reference ref_id="CVE-2013-2918" ref_url="https://www.suse.com/security/cve/CVE-2013-2918/" source="CVE"/>
		<reference ref_id="CVE-2013-2919" ref_url="https://www.suse.com/security/cve/CVE-2013-2919/" source="CVE"/>
		<reference ref_id="CVE-2013-2920" ref_url="https://www.suse.com/security/cve/CVE-2013-2920/" source="CVE"/>
		<reference ref_id="CVE-2013-2921" ref_url="https://www.suse.com/security/cve/CVE-2013-2921/" source="CVE"/>
		<reference ref_id="CVE-2013-2922" ref_url="https://www.suse.com/security/cve/CVE-2013-2922/" source="CVE"/>
		<reference ref_id="CVE-2013-2923" ref_url="https://www.suse.com/security/cve/CVE-2013-2923/" source="CVE"/>
		<reference ref_id="CVE-2013-2924" ref_url="https://www.suse.com/security/cve/CVE-2013-2924/" source="CVE"/>
		<reference ref_id="CVE-2013-2925" ref_url="https://www.suse.com/security/cve/CVE-2013-2925/" source="CVE"/>
		<reference ref_id="CVE-2013-2926" ref_url="https://www.suse.com/security/cve/CVE-2013-2926/" source="CVE"/>
		<reference ref_id="CVE-2013-2927" ref_url="https://www.suse.com/security/cve/CVE-2013-2927/" source="CVE"/>
		<reference ref_id="CVE-2013-2928" ref_url="https://www.suse.com/security/cve/CVE-2013-2928/" source="CVE"/>
		<reference ref_id="CVE-2013-2931" ref_url="https://www.suse.com/security/cve/CVE-2013-2931/" source="CVE"/>
		<reference ref_id="CVE-2013-6621" ref_url="https://www.suse.com/security/cve/CVE-2013-6621/" source="CVE"/>
		<reference ref_id="CVE-2013-6622" ref_url="https://www.suse.com/security/cve/CVE-2013-6622/" source="CVE"/>
		<reference ref_id="CVE-2013-6623" ref_url="https://www.suse.com/security/cve/CVE-2013-6623/" source="CVE"/>
		<reference ref_id="CVE-2013-6624" ref_url="https://www.suse.com/security/cve/CVE-2013-6624/" source="CVE"/>
		<reference ref_id="CVE-2013-6625" ref_url="https://www.suse.com/security/cve/CVE-2013-6625/" source="CVE"/>
		<reference ref_id="CVE-2013-6626" ref_url="https://www.suse.com/security/cve/CVE-2013-6626/" source="CVE"/>
		<reference ref_id="CVE-2013-6627" ref_url="https://www.suse.com/security/cve/CVE-2013-6627/" source="CVE"/>
		<reference ref_id="CVE-2013-6628" ref_url="https://www.suse.com/security/cve/CVE-2013-6628/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6631" ref_url="https://www.suse.com/security/cve/CVE-2013-6631/" source="CVE"/>
		<reference ref_id="CVE-2013-6632" ref_url="https://www.suse.com/security/cve/CVE-2013-6632/" source="CVE"/>
		<reference ref_id="CVE-2013-6634" ref_url="https://www.suse.com/security/cve/CVE-2013-6634/" source="CVE"/>
		<reference ref_id="CVE-2013-6635" ref_url="https://www.suse.com/security/cve/CVE-2013-6635/" source="CVE"/>
		<reference ref_id="CVE-2013-6636" ref_url="https://www.suse.com/security/cve/CVE-2013-6636/" source="CVE"/>
		<reference ref_id="CVE-2013-6637" ref_url="https://www.suse.com/security/cve/CVE-2013-6637/" source="CVE"/>
		<reference ref_id="CVE-2013-6638" ref_url="https://www.suse.com/security/cve/CVE-2013-6638/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6641" ref_url="https://www.suse.com/security/cve/CVE-2013-6641/" source="CVE"/>
		<reference ref_id="CVE-2013-6643" ref_url="https://www.suse.com/security/cve/CVE-2013-6643/" source="CVE"/>
		<reference ref_id="CVE-2013-6644" ref_url="https://www.suse.com/security/cve/CVE-2013-6644/" source="CVE"/>
		<reference ref_id="CVE-2013-6645" ref_url="https://www.suse.com/security/cve/CVE-2013-6645/" source="CVE"/>
		<reference ref_id="CVE-2013-6646" ref_url="https://www.suse.com/security/cve/CVE-2013-6646/" source="CVE"/>
		<reference ref_id="CVE-2013-6649" ref_url="https://www.suse.com/security/cve/CVE-2013-6649/" source="CVE"/>
		<reference ref_id="CVE-2013-6650" ref_url="https://www.suse.com/security/cve/CVE-2013-6650/" source="CVE"/>
		<reference ref_id="CVE-2013-6653" ref_url="https://www.suse.com/security/cve/CVE-2013-6653/" source="CVE"/>
		<reference ref_id="CVE-2013-6654" ref_url="https://www.suse.com/security/cve/CVE-2013-6654/" source="CVE"/>
		<reference ref_id="CVE-2013-6655" ref_url="https://www.suse.com/security/cve/CVE-2013-6655/" source="CVE"/>
		<reference ref_id="CVE-2013-6656" ref_url="https://www.suse.com/security/cve/CVE-2013-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-6657" ref_url="https://www.suse.com/security/cve/CVE-2013-6657/" source="CVE"/>
		<reference ref_id="CVE-2013-6658" ref_url="https://www.suse.com/security/cve/CVE-2013-6658/" source="CVE"/>
		<reference ref_id="CVE-2013-6659" ref_url="https://www.suse.com/security/cve/CVE-2013-6659/" source="CVE"/>
		<reference ref_id="CVE-2013-6660" ref_url="https://www.suse.com/security/cve/CVE-2013-6660/" source="CVE"/>
		<reference ref_id="CVE-2013-6661" ref_url="https://www.suse.com/security/cve/CVE-2013-6661/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-1700" ref_url="https://www.suse.com/security/cve/CVE-2014-1700/" source="CVE"/>
		<reference ref_id="CVE-2014-1701" ref_url="https://www.suse.com/security/cve/CVE-2014-1701/" source="CVE"/>
		<reference ref_id="CVE-2014-1702" ref_url="https://www.suse.com/security/cve/CVE-2014-1702/" source="CVE"/>
		<reference ref_id="CVE-2014-1703" ref_url="https://www.suse.com/security/cve/CVE-2014-1703/" source="CVE"/>
		<reference ref_id="CVE-2014-1704" ref_url="https://www.suse.com/security/cve/CVE-2014-1704/" source="CVE"/>
		<reference ref_id="CVE-2014-1705" ref_url="https://www.suse.com/security/cve/CVE-2014-1705/" source="CVE"/>
		<reference ref_id="CVE-2014-1713" ref_url="https://www.suse.com/security/cve/CVE-2014-1713/" source="CVE"/>
		<reference ref_id="CVE-2014-1714" ref_url="https://www.suse.com/security/cve/CVE-2014-1714/" source="CVE"/>
		<reference ref_id="CVE-2014-1715" ref_url="https://www.suse.com/security/cve/CVE-2014-1715/" source="CVE"/>
		<reference ref_id="CVE-2014-1716" ref_url="https://www.suse.com/security/cve/CVE-2014-1716/" source="CVE"/>
		<reference ref_id="CVE-2014-1717" ref_url="https://www.suse.com/security/cve/CVE-2014-1717/" source="CVE"/>
		<reference ref_id="CVE-2014-1718" ref_url="https://www.suse.com/security/cve/CVE-2014-1718/" source="CVE"/>
		<reference ref_id="CVE-2014-1719" ref_url="https://www.suse.com/security/cve/CVE-2014-1719/" source="CVE"/>
		<reference ref_id="CVE-2014-1720" ref_url="https://www.suse.com/security/cve/CVE-2014-1720/" source="CVE"/>
		<reference ref_id="CVE-2014-1721" ref_url="https://www.suse.com/security/cve/CVE-2014-1721/" source="CVE"/>
		<reference ref_id="CVE-2014-1722" ref_url="https://www.suse.com/security/cve/CVE-2014-1722/" source="CVE"/>
		<reference ref_id="CVE-2014-1723" ref_url="https://www.suse.com/security/cve/CVE-2014-1723/" source="CVE"/>
		<reference ref_id="CVE-2014-1724" ref_url="https://www.suse.com/security/cve/CVE-2014-1724/" source="CVE"/>
		<reference ref_id="CVE-2014-1725" ref_url="https://www.suse.com/security/cve/CVE-2014-1725/" source="CVE"/>
		<reference ref_id="CVE-2014-1726" ref_url="https://www.suse.com/security/cve/CVE-2014-1726/" source="CVE"/>
		<reference ref_id="CVE-2014-1727" ref_url="https://www.suse.com/security/cve/CVE-2014-1727/" source="CVE"/>
		<reference ref_id="CVE-2014-1728" ref_url="https://www.suse.com/security/cve/CVE-2014-1728/" source="CVE"/>
		<reference ref_id="CVE-2014-1729" ref_url="https://www.suse.com/security/cve/CVE-2014-1729/" source="CVE"/>
		<reference ref_id="CVE-2014-1730" ref_url="https://www.suse.com/security/cve/CVE-2014-1730/" source="CVE"/>
		<reference ref_id="CVE-2014-1731" ref_url="https://www.suse.com/security/cve/CVE-2014-1731/" source="CVE"/>
		<reference ref_id="CVE-2014-1732" ref_url="https://www.suse.com/security/cve/CVE-2014-1732/" source="CVE"/>
		<reference ref_id="CVE-2014-1733" ref_url="https://www.suse.com/security/cve/CVE-2014-1733/" source="CVE"/>
		<reference ref_id="CVE-2014-1734" ref_url="https://www.suse.com/security/cve/CVE-2014-1734/" source="CVE"/>
		<reference ref_id="CVE-2014-1735" ref_url="https://www.suse.com/security/cve/CVE-2014-1735/" source="CVE"/>
		<reference ref_id="CVE-2014-1740" ref_url="https://www.suse.com/security/cve/CVE-2014-1740/" source="CVE"/>
		<reference ref_id="CVE-2014-1741" ref_url="https://www.suse.com/security/cve/CVE-2014-1741/" source="CVE"/>
		<reference ref_id="CVE-2014-1742" ref_url="https://www.suse.com/security/cve/CVE-2014-1742/" source="CVE"/>
		<reference ref_id="CVE-2014-1743" ref_url="https://www.suse.com/security/cve/CVE-2014-1743/" source="CVE"/>
		<reference ref_id="CVE-2014-1744" ref_url="https://www.suse.com/security/cve/CVE-2014-1744/" source="CVE"/>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2014-1746" ref_url="https://www.suse.com/security/cve/CVE-2014-1746/" source="CVE"/>
		<reference ref_id="CVE-2014-1747" ref_url="https://www.suse.com/security/cve/CVE-2014-1747/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2014-1749" ref_url="https://www.suse.com/security/cve/CVE-2014-1749/" source="CVE"/>
		<reference ref_id="CVE-2014-3152" ref_url="https://www.suse.com/security/cve/CVE-2014-3152/" source="CVE"/>
		<reference ref_id="CVE-2014-3154" ref_url="https://www.suse.com/security/cve/CVE-2014-3154/" source="CVE"/>
		<reference ref_id="CVE-2014-3155" ref_url="https://www.suse.com/security/cve/CVE-2014-3155/" source="CVE"/>
		<reference ref_id="CVE-2014-3156" ref_url="https://www.suse.com/security/cve/CVE-2014-3156/" source="CVE"/>
		<reference ref_id="CVE-2014-3157" ref_url="https://www.suse.com/security/cve/CVE-2014-3157/" source="CVE"/>
		<reference ref_id="CVE-2014-3160" ref_url="https://www.suse.com/security/cve/CVE-2014-3160/" source="CVE"/>
		<reference ref_id="CVE-2014-3162" ref_url="https://www.suse.com/security/cve/CVE-2014-3162/" source="CVE"/>
		<reference ref_id="CVE-2014-3165" ref_url="https://www.suse.com/security/cve/CVE-2014-3165/" source="CVE"/>
		<reference ref_id="CVE-2014-3166" ref_url="https://www.suse.com/security/cve/CVE-2014-3166/" source="CVE"/>
		<reference ref_id="CVE-2014-3167" ref_url="https://www.suse.com/security/cve/CVE-2014-3167/" source="CVE"/>
		<reference ref_id="CVE-2014-3168" ref_url="https://www.suse.com/security/cve/CVE-2014-3168/" source="CVE"/>
		<reference ref_id="CVE-2014-3169" ref_url="https://www.suse.com/security/cve/CVE-2014-3169/" source="CVE"/>
		<reference ref_id="CVE-2014-3170" ref_url="https://www.suse.com/security/cve/CVE-2014-3170/" source="CVE"/>
		<reference ref_id="CVE-2014-3171" ref_url="https://www.suse.com/security/cve/CVE-2014-3171/" source="CVE"/>
		<reference ref_id="CVE-2014-3172" ref_url="https://www.suse.com/security/cve/CVE-2014-3172/" source="CVE"/>
		<reference ref_id="CVE-2014-3173" ref_url="https://www.suse.com/security/cve/CVE-2014-3173/" source="CVE"/>
		<reference ref_id="CVE-2014-3174" ref_url="https://www.suse.com/security/cve/CVE-2014-3174/" source="CVE"/>
		<reference ref_id="CVE-2014-3175" ref_url="https://www.suse.com/security/cve/CVE-2014-3175/" source="CVE"/>
		<reference ref_id="CVE-2014-3176" ref_url="https://www.suse.com/security/cve/CVE-2014-3176/" source="CVE"/>
		<reference ref_id="CVE-2014-3178" ref_url="https://www.suse.com/security/cve/CVE-2014-3178/" source="CVE"/>
		<reference ref_id="CVE-2014-3188" ref_url="https://www.suse.com/security/cve/CVE-2014-3188/" source="CVE"/>
		<reference ref_id="CVE-2014-3189" ref_url="https://www.suse.com/security/cve/CVE-2014-3189/" source="CVE"/>
		<reference ref_id="CVE-2014-3190" ref_url="https://www.suse.com/security/cve/CVE-2014-3190/" source="CVE"/>
		<reference ref_id="CVE-2014-3191" ref_url="https://www.suse.com/security/cve/CVE-2014-3191/" source="CVE"/>
		<reference ref_id="CVE-2014-3192" ref_url="https://www.suse.com/security/cve/CVE-2014-3192/" source="CVE"/>
		<reference ref_id="CVE-2014-3193" ref_url="https://www.suse.com/security/cve/CVE-2014-3193/" source="CVE"/>
		<reference ref_id="CVE-2014-3194" ref_url="https://www.suse.com/security/cve/CVE-2014-3194/" source="CVE"/>
		<reference ref_id="CVE-2014-3195" ref_url="https://www.suse.com/security/cve/CVE-2014-3195/" source="CVE"/>
		<reference ref_id="CVE-2014-3196" ref_url="https://www.suse.com/security/cve/CVE-2014-3196/" source="CVE"/>
		<reference ref_id="CVE-2014-3197" ref_url="https://www.suse.com/security/cve/CVE-2014-3197/" source="CVE"/>
		<reference ref_id="CVE-2014-3198" ref_url="https://www.suse.com/security/cve/CVE-2014-3198/" source="CVE"/>
		<reference ref_id="CVE-2014-3199" ref_url="https://www.suse.com/security/cve/CVE-2014-3199/" source="CVE"/>
		<reference ref_id="CVE-2014-3200" ref_url="https://www.suse.com/security/cve/CVE-2014-3200/" source="CVE"/>
		<reference ref_id="CVE-2014-7899" ref_url="https://www.suse.com/security/cve/CVE-2014-7899/" source="CVE"/>
		<reference ref_id="CVE-2014-7900" ref_url="https://www.suse.com/security/cve/CVE-2014-7900/" source="CVE"/>
		<reference ref_id="CVE-2014-7901" ref_url="https://www.suse.com/security/cve/CVE-2014-7901/" source="CVE"/>
		<reference ref_id="CVE-2014-7902" ref_url="https://www.suse.com/security/cve/CVE-2014-7902/" source="CVE"/>
		<reference ref_id="CVE-2014-7903" ref_url="https://www.suse.com/security/cve/CVE-2014-7903/" source="CVE"/>
		<reference ref_id="CVE-2014-7904" ref_url="https://www.suse.com/security/cve/CVE-2014-7904/" source="CVE"/>
		<reference ref_id="CVE-2014-7905" ref_url="https://www.suse.com/security/cve/CVE-2014-7905/" source="CVE"/>
		<reference ref_id="CVE-2014-7906" ref_url="https://www.suse.com/security/cve/CVE-2014-7906/" source="CVE"/>
		<reference ref_id="CVE-2014-7907" ref_url="https://www.suse.com/security/cve/CVE-2014-7907/" source="CVE"/>
		<reference ref_id="CVE-2014-7908" ref_url="https://www.suse.com/security/cve/CVE-2014-7908/" source="CVE"/>
		<reference ref_id="CVE-2014-7909" ref_url="https://www.suse.com/security/cve/CVE-2014-7909/" source="CVE"/>
		<reference ref_id="CVE-2014-7910" ref_url="https://www.suse.com/security/cve/CVE-2014-7910/" source="CVE"/>
		<reference ref_id="CVE-2014-7923" ref_url="https://www.suse.com/security/cve/CVE-2014-7923/" source="CVE"/>
		<reference ref_id="CVE-2014-7924" ref_url="https://www.suse.com/security/cve/CVE-2014-7924/" source="CVE"/>
		<reference ref_id="CVE-2014-7925" ref_url="https://www.suse.com/security/cve/CVE-2014-7925/" source="CVE"/>
		<reference ref_id="CVE-2014-7926" ref_url="https://www.suse.com/security/cve/CVE-2014-7926/" source="CVE"/>
		<reference ref_id="CVE-2014-7927" ref_url="https://www.suse.com/security/cve/CVE-2014-7927/" source="CVE"/>
		<reference ref_id="CVE-2014-7928" ref_url="https://www.suse.com/security/cve/CVE-2014-7928/" source="CVE"/>
		<reference ref_id="CVE-2014-7929" ref_url="https://www.suse.com/security/cve/CVE-2014-7929/" source="CVE"/>
		<reference ref_id="CVE-2014-7930" ref_url="https://www.suse.com/security/cve/CVE-2014-7930/" source="CVE"/>
		<reference ref_id="CVE-2014-7932" ref_url="https://www.suse.com/security/cve/CVE-2014-7932/" source="CVE"/>
		<reference ref_id="CVE-2014-7933" ref_url="https://www.suse.com/security/cve/CVE-2014-7933/" source="CVE"/>
		<reference ref_id="CVE-2014-7934" ref_url="https://www.suse.com/security/cve/CVE-2014-7934/" source="CVE"/>
		<reference ref_id="CVE-2014-7935" ref_url="https://www.suse.com/security/cve/CVE-2014-7935/" source="CVE"/>
		<reference ref_id="CVE-2014-7936" ref_url="https://www.suse.com/security/cve/CVE-2014-7936/" source="CVE"/>
		<reference ref_id="CVE-2014-7937" ref_url="https://www.suse.com/security/cve/CVE-2014-7937/" source="CVE"/>
		<reference ref_id="CVE-2014-7938" ref_url="https://www.suse.com/security/cve/CVE-2014-7938/" source="CVE"/>
		<reference ref_id="CVE-2014-7939" ref_url="https://www.suse.com/security/cve/CVE-2014-7939/" source="CVE"/>
		<reference ref_id="CVE-2014-7940" ref_url="https://www.suse.com/security/cve/CVE-2014-7940/" source="CVE"/>
		<reference ref_id="CVE-2014-7941" ref_url="https://www.suse.com/security/cve/CVE-2014-7941/" source="CVE"/>
		<reference ref_id="CVE-2014-7942" ref_url="https://www.suse.com/security/cve/CVE-2014-7942/" source="CVE"/>
		<reference ref_id="CVE-2014-7943" ref_url="https://www.suse.com/security/cve/CVE-2014-7943/" source="CVE"/>
		<reference ref_id="CVE-2014-7944" ref_url="https://www.suse.com/security/cve/CVE-2014-7944/" source="CVE"/>
		<reference ref_id="CVE-2014-7945" ref_url="https://www.suse.com/security/cve/CVE-2014-7945/" source="CVE"/>
		<reference ref_id="CVE-2014-7946" ref_url="https://www.suse.com/security/cve/CVE-2014-7946/" source="CVE"/>
		<reference ref_id="CVE-2014-7947" ref_url="https://www.suse.com/security/cve/CVE-2014-7947/" source="CVE"/>
		<reference ref_id="CVE-2014-7948" ref_url="https://www.suse.com/security/cve/CVE-2014-7948/" source="CVE"/>
		<reference ref_id="CVE-2015-1205" ref_url="https://www.suse.com/security/cve/CVE-2015-1205/" source="CVE"/>
		<reference ref_id="CVE-2015-1209" ref_url="https://www.suse.com/security/cve/CVE-2015-1209/" source="CVE"/>
		<reference ref_id="CVE-2015-1210" ref_url="https://www.suse.com/security/cve/CVE-2015-1210/" source="CVE"/>
		<reference ref_id="CVE-2015-1211" ref_url="https://www.suse.com/security/cve/CVE-2015-1211/" source="CVE"/>
		<reference ref_id="CVE-2015-1212" ref_url="https://www.suse.com/security/cve/CVE-2015-1212/" source="CVE"/>
		<reference ref_id="CVE-2015-1213" ref_url="https://www.suse.com/security/cve/CVE-2015-1213/" source="CVE"/>
		<reference ref_id="CVE-2015-1214" ref_url="https://www.suse.com/security/cve/CVE-2015-1214/" source="CVE"/>
		<reference ref_id="CVE-2015-1215" ref_url="https://www.suse.com/security/cve/CVE-2015-1215/" source="CVE"/>
		<reference ref_id="CVE-2015-1216" ref_url="https://www.suse.com/security/cve/CVE-2015-1216/" source="CVE"/>
		<reference ref_id="CVE-2015-1217" ref_url="https://www.suse.com/security/cve/CVE-2015-1217/" source="CVE"/>
		<reference ref_id="CVE-2015-1218" ref_url="https://www.suse.com/security/cve/CVE-2015-1218/" source="CVE"/>
		<reference ref_id="CVE-2015-1219" ref_url="https://www.suse.com/security/cve/CVE-2015-1219/" source="CVE"/>
		<reference ref_id="CVE-2015-1220" ref_url="https://www.suse.com/security/cve/CVE-2015-1220/" source="CVE"/>
		<reference ref_id="CVE-2015-1221" ref_url="https://www.suse.com/security/cve/CVE-2015-1221/" source="CVE"/>
		<reference ref_id="CVE-2015-1222" ref_url="https://www.suse.com/security/cve/CVE-2015-1222/" source="CVE"/>
		<reference ref_id="CVE-2015-1223" ref_url="https://www.suse.com/security/cve/CVE-2015-1223/" source="CVE"/>
		<reference ref_id="CVE-2015-1224" ref_url="https://www.suse.com/security/cve/CVE-2015-1224/" source="CVE"/>
		<reference ref_id="CVE-2015-1225" ref_url="https://www.suse.com/security/cve/CVE-2015-1225/" source="CVE"/>
		<reference ref_id="CVE-2015-1226" ref_url="https://www.suse.com/security/cve/CVE-2015-1226/" source="CVE"/>
		<reference ref_id="CVE-2015-1227" ref_url="https://www.suse.com/security/cve/CVE-2015-1227/" source="CVE"/>
		<reference ref_id="CVE-2015-1228" ref_url="https://www.suse.com/security/cve/CVE-2015-1228/" source="CVE"/>
		<reference ref_id="CVE-2015-1229" ref_url="https://www.suse.com/security/cve/CVE-2015-1229/" source="CVE"/>
		<reference ref_id="CVE-2015-1230" ref_url="https://www.suse.com/security/cve/CVE-2015-1230/" source="CVE"/>
		<reference ref_id="CVE-2015-1231" ref_url="https://www.suse.com/security/cve/CVE-2015-1231/" source="CVE"/>
		<reference ref_id="CVE-2015-1233" ref_url="https://www.suse.com/security/cve/CVE-2015-1233/" source="CVE"/>
		<reference ref_id="CVE-2015-1234" ref_url="https://www.suse.com/security/cve/CVE-2015-1234/" source="CVE"/>
		<reference ref_id="CVE-2015-1235" ref_url="https://www.suse.com/security/cve/CVE-2015-1235/" source="CVE"/>
		<reference ref_id="CVE-2015-1236" ref_url="https://www.suse.com/security/cve/CVE-2015-1236/" source="CVE"/>
		<reference ref_id="CVE-2015-1237" ref_url="https://www.suse.com/security/cve/CVE-2015-1237/" source="CVE"/>
		<reference ref_id="CVE-2015-1238" ref_url="https://www.suse.com/security/cve/CVE-2015-1238/" source="CVE"/>
		<reference ref_id="CVE-2015-1240" ref_url="https://www.suse.com/security/cve/CVE-2015-1240/" source="CVE"/>
		<reference ref_id="CVE-2015-1241" ref_url="https://www.suse.com/security/cve/CVE-2015-1241/" source="CVE"/>
		<reference ref_id="CVE-2015-1242" ref_url="https://www.suse.com/security/cve/CVE-2015-1242/" source="CVE"/>
		<reference ref_id="CVE-2015-1243" ref_url="https://www.suse.com/security/cve/CVE-2015-1243/" source="CVE"/>
		<reference ref_id="CVE-2015-1244" ref_url="https://www.suse.com/security/cve/CVE-2015-1244/" source="CVE"/>
		<reference ref_id="CVE-2015-1245" ref_url="https://www.suse.com/security/cve/CVE-2015-1245/" source="CVE"/>
		<reference ref_id="CVE-2015-1246" ref_url="https://www.suse.com/security/cve/CVE-2015-1246/" source="CVE"/>
		<reference ref_id="CVE-2015-1247" ref_url="https://www.suse.com/security/cve/CVE-2015-1247/" source="CVE"/>
		<reference ref_id="CVE-2015-1248" ref_url="https://www.suse.com/security/cve/CVE-2015-1248/" source="CVE"/>
		<reference ref_id="CVE-2015-1249" ref_url="https://www.suse.com/security/cve/CVE-2015-1249/" source="CVE"/>
		<reference ref_id="CVE-2015-1250" ref_url="https://www.suse.com/security/cve/CVE-2015-1250/" source="CVE"/>
		<reference ref_id="CVE-2015-1251" ref_url="https://www.suse.com/security/cve/CVE-2015-1251/" source="CVE"/>
		<reference ref_id="CVE-2015-1252" ref_url="https://www.suse.com/security/cve/CVE-2015-1252/" source="CVE"/>
		<reference ref_id="CVE-2015-1253" ref_url="https://www.suse.com/security/cve/CVE-2015-1253/" source="CVE"/>
		<reference ref_id="CVE-2015-1254" ref_url="https://www.suse.com/security/cve/CVE-2015-1254/" source="CVE"/>
		<reference ref_id="CVE-2015-1255" ref_url="https://www.suse.com/security/cve/CVE-2015-1255/" source="CVE"/>
		<reference ref_id="CVE-2015-1256" ref_url="https://www.suse.com/security/cve/CVE-2015-1256/" source="CVE"/>
		<reference ref_id="CVE-2015-1257" ref_url="https://www.suse.com/security/cve/CVE-2015-1257/" source="CVE"/>
		<reference ref_id="CVE-2015-1258" ref_url="https://www.suse.com/security/cve/CVE-2015-1258/" source="CVE"/>
		<reference ref_id="CVE-2015-1259" ref_url="https://www.suse.com/security/cve/CVE-2015-1259/" source="CVE"/>
		<reference ref_id="CVE-2015-1260" ref_url="https://www.suse.com/security/cve/CVE-2015-1260/" source="CVE"/>
		<reference ref_id="CVE-2015-1261" ref_url="https://www.suse.com/security/cve/CVE-2015-1261/" source="CVE"/>
		<reference ref_id="CVE-2015-1262" ref_url="https://www.suse.com/security/cve/CVE-2015-1262/" source="CVE"/>
		<reference ref_id="CVE-2015-1263" ref_url="https://www.suse.com/security/cve/CVE-2015-1263/" source="CVE"/>
		<reference ref_id="CVE-2015-1264" ref_url="https://www.suse.com/security/cve/CVE-2015-1264/" source="CVE"/>
		<reference ref_id="CVE-2015-1265" ref_url="https://www.suse.com/security/cve/CVE-2015-1265/" source="CVE"/>
		<reference ref_id="CVE-2015-1266" ref_url="https://www.suse.com/security/cve/CVE-2015-1266/" source="CVE"/>
		<reference ref_id="CVE-2015-1267" ref_url="https://www.suse.com/security/cve/CVE-2015-1267/" source="CVE"/>
		<reference ref_id="CVE-2015-1268" ref_url="https://www.suse.com/security/cve/CVE-2015-1268/" source="CVE"/>
		<reference ref_id="CVE-2015-1269" ref_url="https://www.suse.com/security/cve/CVE-2015-1269/" source="CVE"/>
		<reference ref_id="CVE-2015-1270" ref_url="https://www.suse.com/security/cve/CVE-2015-1270/" source="CVE"/>
		<reference ref_id="CVE-2015-1271" ref_url="https://www.suse.com/security/cve/CVE-2015-1271/" source="CVE"/>
		<reference ref_id="CVE-2015-1272" ref_url="https://www.suse.com/security/cve/CVE-2015-1272/" source="CVE"/>
		<reference ref_id="CVE-2015-1273" ref_url="https://www.suse.com/security/cve/CVE-2015-1273/" source="CVE"/>
		<reference ref_id="CVE-2015-1274" ref_url="https://www.suse.com/security/cve/CVE-2015-1274/" source="CVE"/>
		<reference ref_id="CVE-2015-1275" ref_url="https://www.suse.com/security/cve/CVE-2015-1275/" source="CVE"/>
		<reference ref_id="CVE-2015-1276" ref_url="https://www.suse.com/security/cve/CVE-2015-1276/" source="CVE"/>
		<reference ref_id="CVE-2015-1277" ref_url="https://www.suse.com/security/cve/CVE-2015-1277/" source="CVE"/>
		<reference ref_id="CVE-2015-1278" ref_url="https://www.suse.com/security/cve/CVE-2015-1278/" source="CVE"/>
		<reference ref_id="CVE-2015-1279" ref_url="https://www.suse.com/security/cve/CVE-2015-1279/" source="CVE"/>
		<reference ref_id="CVE-2015-1280" ref_url="https://www.suse.com/security/cve/CVE-2015-1280/" source="CVE"/>
		<reference ref_id="CVE-2015-1281" ref_url="https://www.suse.com/security/cve/CVE-2015-1281/" source="CVE"/>
		<reference ref_id="CVE-2015-1282" ref_url="https://www.suse.com/security/cve/CVE-2015-1282/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2015-1284" ref_url="https://www.suse.com/security/cve/CVE-2015-1284/" source="CVE"/>
		<reference ref_id="CVE-2015-1285" ref_url="https://www.suse.com/security/cve/CVE-2015-1285/" source="CVE"/>
		<reference ref_id="CVE-2015-1286" ref_url="https://www.suse.com/security/cve/CVE-2015-1286/" source="CVE"/>
		<reference ref_id="CVE-2015-1287" ref_url="https://www.suse.com/security/cve/CVE-2015-1287/" source="CVE"/>
		<reference ref_id="CVE-2015-1288" ref_url="https://www.suse.com/security/cve/CVE-2015-1288/" source="CVE"/>
		<reference ref_id="CVE-2015-1289" ref_url="https://www.suse.com/security/cve/CVE-2015-1289/" source="CVE"/>
		<reference ref_id="CVE-2015-1291" ref_url="https://www.suse.com/security/cve/CVE-2015-1291/" source="CVE"/>
		<reference ref_id="CVE-2015-1292" ref_url="https://www.suse.com/security/cve/CVE-2015-1292/" source="CVE"/>
		<reference ref_id="CVE-2015-1293" ref_url="https://www.suse.com/security/cve/CVE-2015-1293/" source="CVE"/>
		<reference ref_id="CVE-2015-1294" ref_url="https://www.suse.com/security/cve/CVE-2015-1294/" source="CVE"/>
		<reference ref_id="CVE-2015-1295" ref_url="https://www.suse.com/security/cve/CVE-2015-1295/" source="CVE"/>
		<reference ref_id="CVE-2015-1296" ref_url="https://www.suse.com/security/cve/CVE-2015-1296/" source="CVE"/>
		<reference ref_id="CVE-2015-1297" ref_url="https://www.suse.com/security/cve/CVE-2015-1297/" source="CVE"/>
		<reference ref_id="CVE-2015-1298" ref_url="https://www.suse.com/security/cve/CVE-2015-1298/" source="CVE"/>
		<reference ref_id="CVE-2015-1299" ref_url="https://www.suse.com/security/cve/CVE-2015-1299/" source="CVE"/>
		<reference ref_id="CVE-2015-1300" ref_url="https://www.suse.com/security/cve/CVE-2015-1300/" source="CVE"/>
		<reference ref_id="CVE-2015-1301" ref_url="https://www.suse.com/security/cve/CVE-2015-1301/" source="CVE"/>
		<reference ref_id="CVE-2015-1302" ref_url="https://www.suse.com/security/cve/CVE-2015-1302/" source="CVE"/>
		<reference ref_id="CVE-2015-1303" ref_url="https://www.suse.com/security/cve/CVE-2015-1303/" source="CVE"/>
		<reference ref_id="CVE-2015-1304" ref_url="https://www.suse.com/security/cve/CVE-2015-1304/" source="CVE"/>
		<reference ref_id="CVE-2015-6755" ref_url="https://www.suse.com/security/cve/CVE-2015-6755/" source="CVE"/>
		<reference ref_id="CVE-2015-6756" ref_url="https://www.suse.com/security/cve/CVE-2015-6756/" source="CVE"/>
		<reference ref_id="CVE-2015-6757" ref_url="https://www.suse.com/security/cve/CVE-2015-6757/" source="CVE"/>
		<reference ref_id="CVE-2015-6758" ref_url="https://www.suse.com/security/cve/CVE-2015-6758/" source="CVE"/>
		<reference ref_id="CVE-2015-6759" ref_url="https://www.suse.com/security/cve/CVE-2015-6759/" source="CVE"/>
		<reference ref_id="CVE-2015-6760" ref_url="https://www.suse.com/security/cve/CVE-2015-6760/" source="CVE"/>
		<reference ref_id="CVE-2015-6761" ref_url="https://www.suse.com/security/cve/CVE-2015-6761/" source="CVE"/>
		<reference ref_id="CVE-2015-6762" ref_url="https://www.suse.com/security/cve/CVE-2015-6762/" source="CVE"/>
		<reference ref_id="CVE-2015-6763" ref_url="https://www.suse.com/security/cve/CVE-2015-6763/" source="CVE"/>
		<reference ref_id="CVE-2015-6764" ref_url="https://www.suse.com/security/cve/CVE-2015-6764/" source="CVE"/>
		<reference ref_id="CVE-2015-6765" ref_url="https://www.suse.com/security/cve/CVE-2015-6765/" source="CVE"/>
		<reference ref_id="CVE-2015-6766" ref_url="https://www.suse.com/security/cve/CVE-2015-6766/" source="CVE"/>
		<reference ref_id="CVE-2015-6767" ref_url="https://www.suse.com/security/cve/CVE-2015-6767/" source="CVE"/>
		<reference ref_id="CVE-2015-6768" ref_url="https://www.suse.com/security/cve/CVE-2015-6768/" source="CVE"/>
		<reference ref_id="CVE-2015-6769" ref_url="https://www.suse.com/security/cve/CVE-2015-6769/" source="CVE"/>
		<reference ref_id="CVE-2015-6770" ref_url="https://www.suse.com/security/cve/CVE-2015-6770/" source="CVE"/>
		<reference ref_id="CVE-2015-6771" ref_url="https://www.suse.com/security/cve/CVE-2015-6771/" source="CVE"/>
		<reference ref_id="CVE-2015-6772" ref_url="https://www.suse.com/security/cve/CVE-2015-6772/" source="CVE"/>
		<reference ref_id="CVE-2015-6773" ref_url="https://www.suse.com/security/cve/CVE-2015-6773/" source="CVE"/>
		<reference ref_id="CVE-2015-6774" ref_url="https://www.suse.com/security/cve/CVE-2015-6774/" source="CVE"/>
		<reference ref_id="CVE-2015-6775" ref_url="https://www.suse.com/security/cve/CVE-2015-6775/" source="CVE"/>
		<reference ref_id="CVE-2015-6776" ref_url="https://www.suse.com/security/cve/CVE-2015-6776/" source="CVE"/>
		<reference ref_id="CVE-2015-6777" ref_url="https://www.suse.com/security/cve/CVE-2015-6777/" source="CVE"/>
		<reference ref_id="CVE-2015-6778" ref_url="https://www.suse.com/security/cve/CVE-2015-6778/" source="CVE"/>
		<reference ref_id="CVE-2015-6779" ref_url="https://www.suse.com/security/cve/CVE-2015-6779/" source="CVE"/>
		<reference ref_id="CVE-2015-6780" ref_url="https://www.suse.com/security/cve/CVE-2015-6780/" source="CVE"/>
		<reference ref_id="CVE-2015-6781" ref_url="https://www.suse.com/security/cve/CVE-2015-6781/" source="CVE"/>
		<reference ref_id="CVE-2015-6782" ref_url="https://www.suse.com/security/cve/CVE-2015-6782/" source="CVE"/>
		<reference ref_id="CVE-2015-6783" ref_url="https://www.suse.com/security/cve/CVE-2015-6783/" source="CVE"/>
		<reference ref_id="CVE-2015-6784" ref_url="https://www.suse.com/security/cve/CVE-2015-6784/" source="CVE"/>
		<reference ref_id="CVE-2015-6785" ref_url="https://www.suse.com/security/cve/CVE-2015-6785/" source="CVE"/>
		<reference ref_id="CVE-2015-6786" ref_url="https://www.suse.com/security/cve/CVE-2015-6786/" source="CVE"/>
		<reference ref_id="CVE-2015-6787" ref_url="https://www.suse.com/security/cve/CVE-2015-6787/" source="CVE"/>
		<reference ref_id="CVE-2015-6788" ref_url="https://www.suse.com/security/cve/CVE-2015-6788/" source="CVE"/>
		<reference ref_id="CVE-2015-6789" ref_url="https://www.suse.com/security/cve/CVE-2015-6789/" source="CVE"/>
		<reference ref_id="CVE-2015-6790" ref_url="https://www.suse.com/security/cve/CVE-2015-6790/" source="CVE"/>
		<reference ref_id="CVE-2015-6791" ref_url="https://www.suse.com/security/cve/CVE-2015-6791/" source="CVE"/>
		<reference ref_id="CVE-2015-6792" ref_url="https://www.suse.com/security/cve/CVE-2015-6792/" source="CVE"/>
		<reference ref_id="CVE-2015-7834" ref_url="https://www.suse.com/security/cve/CVE-2015-7834/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-1612" ref_url="https://www.suse.com/security/cve/CVE-2016-1612/" source="CVE"/>
		<reference ref_id="CVE-2016-1613" ref_url="https://www.suse.com/security/cve/CVE-2016-1613/" source="CVE"/>
		<reference ref_id="CVE-2016-1614" ref_url="https://www.suse.com/security/cve/CVE-2016-1614/" source="CVE"/>
		<reference ref_id="CVE-2016-1615" ref_url="https://www.suse.com/security/cve/CVE-2016-1615/" source="CVE"/>
		<reference ref_id="CVE-2016-1616" ref_url="https://www.suse.com/security/cve/CVE-2016-1616/" source="CVE"/>
		<reference ref_id="CVE-2016-1617" ref_url="https://www.suse.com/security/cve/CVE-2016-1617/" source="CVE"/>
		<reference ref_id="CVE-2016-1618" ref_url="https://www.suse.com/security/cve/CVE-2016-1618/" source="CVE"/>
		<reference ref_id="CVE-2016-1619" ref_url="https://www.suse.com/security/cve/CVE-2016-1619/" source="CVE"/>
		<reference ref_id="CVE-2016-1620" ref_url="https://www.suse.com/security/cve/CVE-2016-1620/" source="CVE"/>
		<reference ref_id="CVE-2016-1622" ref_url="https://www.suse.com/security/cve/CVE-2016-1622/" source="CVE"/>
		<reference ref_id="CVE-2016-1623" ref_url="https://www.suse.com/security/cve/CVE-2016-1623/" source="CVE"/>
		<reference ref_id="CVE-2016-1624" ref_url="https://www.suse.com/security/cve/CVE-2016-1624/" source="CVE"/>
		<reference ref_id="CVE-2016-1625" ref_url="https://www.suse.com/security/cve/CVE-2016-1625/" source="CVE"/>
		<reference ref_id="CVE-2016-1626" ref_url="https://www.suse.com/security/cve/CVE-2016-1626/" source="CVE"/>
		<reference ref_id="CVE-2016-1627" ref_url="https://www.suse.com/security/cve/CVE-2016-1627/" source="CVE"/>
		<reference ref_id="CVE-2016-1629" ref_url="https://www.suse.com/security/cve/CVE-2016-1629/" source="CVE"/>
		<reference ref_id="CVE-2016-1630" ref_url="https://www.suse.com/security/cve/CVE-2016-1630/" source="CVE"/>
		<reference ref_id="CVE-2016-1631" ref_url="https://www.suse.com/security/cve/CVE-2016-1631/" source="CVE"/>
		<reference ref_id="CVE-2016-1632" ref_url="https://www.suse.com/security/cve/CVE-2016-1632/" source="CVE"/>
		<reference ref_id="CVE-2016-1633" ref_url="https://www.suse.com/security/cve/CVE-2016-1633/" source="CVE"/>
		<reference ref_id="CVE-2016-1634" ref_url="https://www.suse.com/security/cve/CVE-2016-1634/" source="CVE"/>
		<reference ref_id="CVE-2016-1635" ref_url="https://www.suse.com/security/cve/CVE-2016-1635/" source="CVE"/>
		<reference ref_id="CVE-2016-1636" ref_url="https://www.suse.com/security/cve/CVE-2016-1636/" source="CVE"/>
		<reference ref_id="CVE-2016-1637" ref_url="https://www.suse.com/security/cve/CVE-2016-1637/" source="CVE"/>
		<reference ref_id="CVE-2016-1638" ref_url="https://www.suse.com/security/cve/CVE-2016-1638/" source="CVE"/>
		<reference ref_id="CVE-2016-1639" ref_url="https://www.suse.com/security/cve/CVE-2016-1639/" source="CVE"/>
		<reference ref_id="CVE-2016-1640" ref_url="https://www.suse.com/security/cve/CVE-2016-1640/" source="CVE"/>
		<reference ref_id="CVE-2016-1641" ref_url="https://www.suse.com/security/cve/CVE-2016-1641/" source="CVE"/>
		<reference ref_id="CVE-2016-1642" ref_url="https://www.suse.com/security/cve/CVE-2016-1642/" source="CVE"/>
		<reference ref_id="CVE-2016-1643" ref_url="https://www.suse.com/security/cve/CVE-2016-1643/" source="CVE"/>
		<reference ref_id="CVE-2016-1644" ref_url="https://www.suse.com/security/cve/CVE-2016-1644/" source="CVE"/>
		<reference ref_id="CVE-2016-1645" ref_url="https://www.suse.com/security/cve/CVE-2016-1645/" source="CVE"/>
		<reference ref_id="CVE-2016-1646" ref_url="https://www.suse.com/security/cve/CVE-2016-1646/" source="CVE"/>
		<reference ref_id="CVE-2016-1647" ref_url="https://www.suse.com/security/cve/CVE-2016-1647/" source="CVE"/>
		<reference ref_id="CVE-2016-1648" ref_url="https://www.suse.com/security/cve/CVE-2016-1648/" source="CVE"/>
		<reference ref_id="CVE-2016-1649" ref_url="https://www.suse.com/security/cve/CVE-2016-1649/" source="CVE"/>
		<reference ref_id="CVE-2016-1650" ref_url="https://www.suse.com/security/cve/CVE-2016-1650/" source="CVE"/>
		<reference ref_id="CVE-2016-1651" ref_url="https://www.suse.com/security/cve/CVE-2016-1651/" source="CVE"/>
		<reference ref_id="CVE-2016-1652" ref_url="https://www.suse.com/security/cve/CVE-2016-1652/" source="CVE"/>
		<reference ref_id="CVE-2016-1653" ref_url="https://www.suse.com/security/cve/CVE-2016-1653/" source="CVE"/>
		<reference ref_id="CVE-2016-1654" ref_url="https://www.suse.com/security/cve/CVE-2016-1654/" source="CVE"/>
		<reference ref_id="CVE-2016-1655" ref_url="https://www.suse.com/security/cve/CVE-2016-1655/" source="CVE"/>
		<reference ref_id="CVE-2016-1656" ref_url="https://www.suse.com/security/cve/CVE-2016-1656/" source="CVE"/>
		<reference ref_id="CVE-2016-1657" ref_url="https://www.suse.com/security/cve/CVE-2016-1657/" source="CVE"/>
		<reference ref_id="CVE-2016-1658" ref_url="https://www.suse.com/security/cve/CVE-2016-1658/" source="CVE"/>
		<reference ref_id="CVE-2016-1659" ref_url="https://www.suse.com/security/cve/CVE-2016-1659/" source="CVE"/>
		<reference ref_id="CVE-2016-1660" ref_url="https://www.suse.com/security/cve/CVE-2016-1660/" source="CVE"/>
		<reference ref_id="CVE-2016-1661" ref_url="https://www.suse.com/security/cve/CVE-2016-1661/" source="CVE"/>
		<reference ref_id="CVE-2016-1662" ref_url="https://www.suse.com/security/cve/CVE-2016-1662/" source="CVE"/>
		<reference ref_id="CVE-2016-1663" ref_url="https://www.suse.com/security/cve/CVE-2016-1663/" source="CVE"/>
		<reference ref_id="CVE-2016-1664" ref_url="https://www.suse.com/security/cve/CVE-2016-1664/" source="CVE"/>
		<reference ref_id="CVE-2016-1665" ref_url="https://www.suse.com/security/cve/CVE-2016-1665/" source="CVE"/>
		<reference ref_id="CVE-2016-1666" ref_url="https://www.suse.com/security/cve/CVE-2016-1666/" source="CVE"/>
		<reference ref_id="CVE-2016-1667" ref_url="https://www.suse.com/security/cve/CVE-2016-1667/" source="CVE"/>
		<reference ref_id="CVE-2016-1668" ref_url="https://www.suse.com/security/cve/CVE-2016-1668/" source="CVE"/>
		<reference ref_id="CVE-2016-1669" ref_url="https://www.suse.com/security/cve/CVE-2016-1669/" source="CVE"/>
		<reference ref_id="CVE-2016-1670" ref_url="https://www.suse.com/security/cve/CVE-2016-1670/" source="CVE"/>
		<reference ref_id="CVE-2016-1672" ref_url="https://www.suse.com/security/cve/CVE-2016-1672/" source="CVE"/>
		<reference ref_id="CVE-2016-1673" ref_url="https://www.suse.com/security/cve/CVE-2016-1673/" source="CVE"/>
		<reference ref_id="CVE-2016-1674" ref_url="https://www.suse.com/security/cve/CVE-2016-1674/" source="CVE"/>
		<reference ref_id="CVE-2016-1675" ref_url="https://www.suse.com/security/cve/CVE-2016-1675/" source="CVE"/>
		<reference ref_id="CVE-2016-1676" ref_url="https://www.suse.com/security/cve/CVE-2016-1676/" source="CVE"/>
		<reference ref_id="CVE-2016-1677" ref_url="https://www.suse.com/security/cve/CVE-2016-1677/" source="CVE"/>
		<reference ref_id="CVE-2016-1678" ref_url="https://www.suse.com/security/cve/CVE-2016-1678/" source="CVE"/>
		<reference ref_id="CVE-2016-1679" ref_url="https://www.suse.com/security/cve/CVE-2016-1679/" source="CVE"/>
		<reference ref_id="CVE-2016-1680" ref_url="https://www.suse.com/security/cve/CVE-2016-1680/" source="CVE"/>
		<reference ref_id="CVE-2016-1681" ref_url="https://www.suse.com/security/cve/CVE-2016-1681/" source="CVE"/>
		<reference ref_id="CVE-2016-1682" ref_url="https://www.suse.com/security/cve/CVE-2016-1682/" source="CVE"/>
		<reference ref_id="CVE-2016-1683" ref_url="https://www.suse.com/security/cve/CVE-2016-1683/" source="CVE"/>
		<reference ref_id="CVE-2016-1684" ref_url="https://www.suse.com/security/cve/CVE-2016-1684/" source="CVE"/>
		<reference ref_id="CVE-2016-1685" ref_url="https://www.suse.com/security/cve/CVE-2016-1685/" source="CVE"/>
		<reference ref_id="CVE-2016-1686" ref_url="https://www.suse.com/security/cve/CVE-2016-1686/" source="CVE"/>
		<reference ref_id="CVE-2016-1687" ref_url="https://www.suse.com/security/cve/CVE-2016-1687/" source="CVE"/>
		<reference ref_id="CVE-2016-1688" ref_url="https://www.suse.com/security/cve/CVE-2016-1688/" source="CVE"/>
		<reference ref_id="CVE-2016-1689" ref_url="https://www.suse.com/security/cve/CVE-2016-1689/" source="CVE"/>
		<reference ref_id="CVE-2016-1690" ref_url="https://www.suse.com/security/cve/CVE-2016-1690/" source="CVE"/>
		<reference ref_id="CVE-2016-1691" ref_url="https://www.suse.com/security/cve/CVE-2016-1691/" source="CVE"/>
		<reference ref_id="CVE-2016-1692" ref_url="https://www.suse.com/security/cve/CVE-2016-1692/" source="CVE"/>
		<reference ref_id="CVE-2016-1693" ref_url="https://www.suse.com/security/cve/CVE-2016-1693/" source="CVE"/>
		<reference ref_id="CVE-2016-1694" ref_url="https://www.suse.com/security/cve/CVE-2016-1694/" source="CVE"/>
		<reference ref_id="CVE-2016-1695" ref_url="https://www.suse.com/security/cve/CVE-2016-1695/" source="CVE"/>
		<reference ref_id="CVE-2016-1696" ref_url="https://www.suse.com/security/cve/CVE-2016-1696/" source="CVE"/>
		<reference ref_id="CVE-2016-1697" ref_url="https://www.suse.com/security/cve/CVE-2016-1697/" source="CVE"/>
		<reference ref_id="CVE-2016-1698" ref_url="https://www.suse.com/security/cve/CVE-2016-1698/" source="CVE"/>
		<reference ref_id="CVE-2016-1699" ref_url="https://www.suse.com/security/cve/CVE-2016-1699/" source="CVE"/>
		<reference ref_id="CVE-2016-1700" ref_url="https://www.suse.com/security/cve/CVE-2016-1700/" source="CVE"/>
		<reference ref_id="CVE-2016-1701" ref_url="https://www.suse.com/security/cve/CVE-2016-1701/" source="CVE"/>
		<reference ref_id="CVE-2016-1702" ref_url="https://www.suse.com/security/cve/CVE-2016-1702/" source="CVE"/>
		<reference ref_id="CVE-2016-1703" ref_url="https://www.suse.com/security/cve/CVE-2016-1703/" source="CVE"/>
		<reference ref_id="CVE-2016-1704" ref_url="https://www.suse.com/security/cve/CVE-2016-1704/" source="CVE"/>
		<reference ref_id="CVE-2016-1705" ref_url="https://www.suse.com/security/cve/CVE-2016-1705/" source="CVE"/>
		<reference ref_id="CVE-2016-1706" ref_url="https://www.suse.com/security/cve/CVE-2016-1706/" source="CVE"/>
		<reference ref_id="CVE-2016-1707" ref_url="https://www.suse.com/security/cve/CVE-2016-1707/" source="CVE"/>
		<reference ref_id="CVE-2016-1708" ref_url="https://www.suse.com/security/cve/CVE-2016-1708/" source="CVE"/>
		<reference ref_id="CVE-2016-1709" ref_url="https://www.suse.com/security/cve/CVE-2016-1709/" source="CVE"/>
		<reference ref_id="CVE-2016-1710" ref_url="https://www.suse.com/security/cve/CVE-2016-1710/" source="CVE"/>
		<reference ref_id="CVE-2016-1711" ref_url="https://www.suse.com/security/cve/CVE-2016-1711/" source="CVE"/>
		<reference ref_id="CVE-2016-3679" ref_url="https://www.suse.com/security/cve/CVE-2016-3679/" source="CVE"/>
		<reference ref_id="CVE-2016-5127" ref_url="https://www.suse.com/security/cve/CVE-2016-5127/" source="CVE"/>
		<reference ref_id="CVE-2016-5128" ref_url="https://www.suse.com/security/cve/CVE-2016-5128/" source="CVE"/>
		<reference ref_id="CVE-2016-5129" ref_url="https://www.suse.com/security/cve/CVE-2016-5129/" source="CVE"/>
		<reference ref_id="CVE-2016-5130" ref_url="https://www.suse.com/security/cve/CVE-2016-5130/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2016-5132" ref_url="https://www.suse.com/security/cve/CVE-2016-5132/" source="CVE"/>
		<reference ref_id="CVE-2016-5133" ref_url="https://www.suse.com/security/cve/CVE-2016-5133/" source="CVE"/>
		<reference ref_id="CVE-2016-5134" ref_url="https://www.suse.com/security/cve/CVE-2016-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-5135" ref_url="https://www.suse.com/security/cve/CVE-2016-5135/" source="CVE"/>
		<reference ref_id="CVE-2016-5136" ref_url="https://www.suse.com/security/cve/CVE-2016-5136/" source="CVE"/>
		<reference ref_id="CVE-2016-5137" ref_url="https://www.suse.com/security/cve/CVE-2016-5137/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5140" ref_url="https://www.suse.com/security/cve/CVE-2016-5140/" source="CVE"/>
		<reference ref_id="CVE-2016-5141" ref_url="https://www.suse.com/security/cve/CVE-2016-5141/" source="CVE"/>
		<reference ref_id="CVE-2016-5142" ref_url="https://www.suse.com/security/cve/CVE-2016-5142/" source="CVE"/>
		<reference ref_id="CVE-2016-5143" ref_url="https://www.suse.com/security/cve/CVE-2016-5143/" source="CVE"/>
		<reference ref_id="CVE-2016-5144" ref_url="https://www.suse.com/security/cve/CVE-2016-5144/" source="CVE"/>
		<reference ref_id="CVE-2016-5145" ref_url="https://www.suse.com/security/cve/CVE-2016-5145/" source="CVE"/>
		<reference ref_id="CVE-2016-5146" ref_url="https://www.suse.com/security/cve/CVE-2016-5146/" source="CVE"/>
		<reference ref_id="CVE-2016-5147" ref_url="https://www.suse.com/security/cve/CVE-2016-5147/" source="CVE"/>
		<reference ref_id="CVE-2016-5148" ref_url="https://www.suse.com/security/cve/CVE-2016-5148/" source="CVE"/>
		<reference ref_id="CVE-2016-5149" ref_url="https://www.suse.com/security/cve/CVE-2016-5149/" source="CVE"/>
		<reference ref_id="CVE-2016-5150" ref_url="https://www.suse.com/security/cve/CVE-2016-5150/" source="CVE"/>
		<reference ref_id="CVE-2016-5151" ref_url="https://www.suse.com/security/cve/CVE-2016-5151/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5153" ref_url="https://www.suse.com/security/cve/CVE-2016-5153/" source="CVE"/>
		<reference ref_id="CVE-2016-5154" ref_url="https://www.suse.com/security/cve/CVE-2016-5154/" source="CVE"/>
		<reference ref_id="CVE-2016-5155" ref_url="https://www.suse.com/security/cve/CVE-2016-5155/" source="CVE"/>
		<reference ref_id="CVE-2016-5156" ref_url="https://www.suse.com/security/cve/CVE-2016-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-5157" ref_url="https://www.suse.com/security/cve/CVE-2016-5157/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-5160" ref_url="https://www.suse.com/security/cve/CVE-2016-5160/" source="CVE"/>
		<reference ref_id="CVE-2016-5161" ref_url="https://www.suse.com/security/cve/CVE-2016-5161/" source="CVE"/>
		<reference ref_id="CVE-2016-5162" ref_url="https://www.suse.com/security/cve/CVE-2016-5162/" source="CVE"/>
		<reference ref_id="CVE-2016-5163" ref_url="https://www.suse.com/security/cve/CVE-2016-5163/" source="CVE"/>
		<reference ref_id="CVE-2016-5164" ref_url="https://www.suse.com/security/cve/CVE-2016-5164/" source="CVE"/>
		<reference ref_id="CVE-2016-5165" ref_url="https://www.suse.com/security/cve/CVE-2016-5165/" source="CVE"/>
		<reference ref_id="CVE-2016-5166" ref_url="https://www.suse.com/security/cve/CVE-2016-5166/" source="CVE"/>
		<reference ref_id="CVE-2016-5170" ref_url="https://www.suse.com/security/cve/CVE-2016-5170/" source="CVE"/>
		<reference ref_id="CVE-2016-5171" ref_url="https://www.suse.com/security/cve/CVE-2016-5171/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5173" ref_url="https://www.suse.com/security/cve/CVE-2016-5173/" source="CVE"/>
		<reference ref_id="CVE-2016-5174" ref_url="https://www.suse.com/security/cve/CVE-2016-5174/" source="CVE"/>
		<reference ref_id="CVE-2016-5175" ref_url="https://www.suse.com/security/cve/CVE-2016-5175/" source="CVE"/>
		<reference ref_id="CVE-2016-5177" ref_url="https://www.suse.com/security/cve/CVE-2016-5177/" source="CVE"/>
		<reference ref_id="CVE-2016-5178" ref_url="https://www.suse.com/security/cve/CVE-2016-5178/" source="CVE"/>
		<reference ref_id="CVE-2016-5181" ref_url="https://www.suse.com/security/cve/CVE-2016-5181/" source="CVE"/>
		<reference ref_id="CVE-2016-5182" ref_url="https://www.suse.com/security/cve/CVE-2016-5182/" source="CVE"/>
		<reference ref_id="CVE-2016-5183" ref_url="https://www.suse.com/security/cve/CVE-2016-5183/" source="CVE"/>
		<reference ref_id="CVE-2016-5184" ref_url="https://www.suse.com/security/cve/CVE-2016-5184/" source="CVE"/>
		<reference ref_id="CVE-2016-5185" ref_url="https://www.suse.com/security/cve/CVE-2016-5185/" source="CVE"/>
		<reference ref_id="CVE-2016-5186" ref_url="https://www.suse.com/security/cve/CVE-2016-5186/" source="CVE"/>
		<reference ref_id="CVE-2016-5187" ref_url="https://www.suse.com/security/cve/CVE-2016-5187/" source="CVE"/>
		<reference ref_id="CVE-2016-5188" ref_url="https://www.suse.com/security/cve/CVE-2016-5188/" source="CVE"/>
		<reference ref_id="CVE-2016-5189" ref_url="https://www.suse.com/security/cve/CVE-2016-5189/" source="CVE"/>
		<reference ref_id="CVE-2016-5190" ref_url="https://www.suse.com/security/cve/CVE-2016-5190/" source="CVE"/>
		<reference ref_id="CVE-2016-5191" ref_url="https://www.suse.com/security/cve/CVE-2016-5191/" source="CVE"/>
		<reference ref_id="CVE-2016-5192" ref_url="https://www.suse.com/security/cve/CVE-2016-5192/" source="CVE"/>
		<reference ref_id="CVE-2016-5193" ref_url="https://www.suse.com/security/cve/CVE-2016-5193/" source="CVE"/>
		<reference ref_id="CVE-2016-5198" ref_url="https://www.suse.com/security/cve/CVE-2016-5198/" source="CVE"/>
		<reference ref_id="CVE-2016-5199" ref_url="https://www.suse.com/security/cve/CVE-2016-5199/" source="CVE"/>
		<reference ref_id="CVE-2016-5200" ref_url="https://www.suse.com/security/cve/CVE-2016-5200/" source="CVE"/>
		<reference ref_id="CVE-2016-5201" ref_url="https://www.suse.com/security/cve/CVE-2016-5201/" source="CVE"/>
		<reference ref_id="CVE-2016-5202" ref_url="https://www.suse.com/security/cve/CVE-2016-5202/" source="CVE"/>
		<reference ref_id="CVE-2016-5204" ref_url="https://www.suse.com/security/cve/CVE-2016-5204/" source="CVE"/>
		<reference ref_id="CVE-2016-5211" ref_url="https://www.suse.com/security/cve/CVE-2016-5211/" source="CVE"/>
		<reference ref_id="CVE-2016-5217" ref_url="https://www.suse.com/security/cve/CVE-2016-5217/" source="CVE"/>
		<reference ref_id="CVE-2016-5222" ref_url="https://www.suse.com/security/cve/CVE-2016-5222/" source="CVE"/>
		<reference ref_id="CVE-2016-5224" ref_url="https://www.suse.com/security/cve/CVE-2016-5224/" source="CVE"/>
		<reference ref_id="CVE-2016-9651" ref_url="https://www.suse.com/security/cve/CVE-2016-9651/" source="CVE"/>
		<reference ref_id="CVE-2017-11215" ref_url="https://www.suse.com/security/cve/CVE-2017-11215/" source="CVE"/>
		<reference ref_id="CVE-2017-11225" ref_url="https://www.suse.com/security/cve/CVE-2017-11225/" source="CVE"/>
		<reference ref_id="CVE-2017-15386" ref_url="https://www.suse.com/security/cve/CVE-2017-15386/" source="CVE"/>
		<reference ref_id="CVE-2017-15387" ref_url="https://www.suse.com/security/cve/CVE-2017-15387/" source="CVE"/>
		<reference ref_id="CVE-2017-15388" ref_url="https://www.suse.com/security/cve/CVE-2017-15388/" source="CVE"/>
		<reference ref_id="CVE-2017-15389" ref_url="https://www.suse.com/security/cve/CVE-2017-15389/" source="CVE"/>
		<reference ref_id="CVE-2017-15390" ref_url="https://www.suse.com/security/cve/CVE-2017-15390/" source="CVE"/>
		<reference ref_id="CVE-2017-15391" ref_url="https://www.suse.com/security/cve/CVE-2017-15391/" source="CVE"/>
		<reference ref_id="CVE-2017-15392" ref_url="https://www.suse.com/security/cve/CVE-2017-15392/" source="CVE"/>
		<reference ref_id="CVE-2017-15393" ref_url="https://www.suse.com/security/cve/CVE-2017-15393/" source="CVE"/>
		<reference ref_id="CVE-2017-15394" ref_url="https://www.suse.com/security/cve/CVE-2017-15394/" source="CVE"/>
		<reference ref_id="CVE-2017-15395" ref_url="https://www.suse.com/security/cve/CVE-2017-15395/" source="CVE"/>
		<reference ref_id="CVE-2017-15396" ref_url="https://www.suse.com/security/cve/CVE-2017-15396/" source="CVE"/>
		<reference ref_id="CVE-2017-15398" ref_url="https://www.suse.com/security/cve/CVE-2017-15398/" source="CVE"/>
		<reference ref_id="CVE-2017-15399" ref_url="https://www.suse.com/security/cve/CVE-2017-15399/" source="CVE"/>
		<reference ref_id="CVE-2017-15407" ref_url="https://www.suse.com/security/cve/CVE-2017-15407/" source="CVE"/>
		<reference ref_id="CVE-2017-15408" ref_url="https://www.suse.com/security/cve/CVE-2017-15408/" source="CVE"/>
		<reference ref_id="CVE-2017-15409" ref_url="https://www.suse.com/security/cve/CVE-2017-15409/" source="CVE"/>
		<reference ref_id="CVE-2017-15410" ref_url="https://www.suse.com/security/cve/CVE-2017-15410/" source="CVE"/>
		<reference ref_id="CVE-2017-15411" ref_url="https://www.suse.com/security/cve/CVE-2017-15411/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-15413" ref_url="https://www.suse.com/security/cve/CVE-2017-15413/" source="CVE"/>
		<reference ref_id="CVE-2017-15415" ref_url="https://www.suse.com/security/cve/CVE-2017-15415/" source="CVE"/>
		<reference ref_id="CVE-2017-15416" ref_url="https://www.suse.com/security/cve/CVE-2017-15416/" source="CVE"/>
		<reference ref_id="CVE-2017-15417" ref_url="https://www.suse.com/security/cve/CVE-2017-15417/" source="CVE"/>
		<reference ref_id="CVE-2017-15418" ref_url="https://www.suse.com/security/cve/CVE-2017-15418/" source="CVE"/>
		<reference ref_id="CVE-2017-15419" ref_url="https://www.suse.com/security/cve/CVE-2017-15419/" source="CVE"/>
		<reference ref_id="CVE-2017-15420" ref_url="https://www.suse.com/security/cve/CVE-2017-15420/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-15423" ref_url="https://www.suse.com/security/cve/CVE-2017-15423/" source="CVE"/>
		<reference ref_id="CVE-2017-15424" ref_url="https://www.suse.com/security/cve/CVE-2017-15424/" source="CVE"/>
		<reference ref_id="CVE-2017-15425" ref_url="https://www.suse.com/security/cve/CVE-2017-15425/" source="CVE"/>
		<reference ref_id="CVE-2017-15426" ref_url="https://www.suse.com/security/cve/CVE-2017-15426/" source="CVE"/>
		<reference ref_id="CVE-2017-15427" ref_url="https://www.suse.com/security/cve/CVE-2017-15427/" source="CVE"/>
		<reference ref_id="CVE-2017-15429" ref_url="https://www.suse.com/security/cve/CVE-2017-15429/" source="CVE"/>
		<reference ref_id="CVE-2017-15430" ref_url="https://www.suse.com/security/cve/CVE-2017-15430/" source="CVE"/>
		<reference ref_id="CVE-2017-5006" ref_url="https://www.suse.com/security/cve/CVE-2017-5006/" source="CVE"/>
		<reference ref_id="CVE-2017-5007" ref_url="https://www.suse.com/security/cve/CVE-2017-5007/" source="CVE"/>
		<reference ref_id="CVE-2017-5008" ref_url="https://www.suse.com/security/cve/CVE-2017-5008/" source="CVE"/>
		<reference ref_id="CVE-2017-5009" ref_url="https://www.suse.com/security/cve/CVE-2017-5009/" source="CVE"/>
		<reference ref_id="CVE-2017-5010" ref_url="https://www.suse.com/security/cve/CVE-2017-5010/" source="CVE"/>
		<reference ref_id="CVE-2017-5011" ref_url="https://www.suse.com/security/cve/CVE-2017-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-5012" ref_url="https://www.suse.com/security/cve/CVE-2017-5012/" source="CVE"/>
		<reference ref_id="CVE-2017-5013" ref_url="https://www.suse.com/security/cve/CVE-2017-5013/" source="CVE"/>
		<reference ref_id="CVE-2017-5014" ref_url="https://www.suse.com/security/cve/CVE-2017-5014/" source="CVE"/>
		<reference ref_id="CVE-2017-5015" ref_url="https://www.suse.com/security/cve/CVE-2017-5015/" source="CVE"/>
		<reference ref_id="CVE-2017-5016" ref_url="https://www.suse.com/security/cve/CVE-2017-5016/" source="CVE"/>
		<reference ref_id="CVE-2017-5017" ref_url="https://www.suse.com/security/cve/CVE-2017-5017/" source="CVE"/>
		<reference ref_id="CVE-2017-5018" ref_url="https://www.suse.com/security/cve/CVE-2017-5018/" source="CVE"/>
		<reference ref_id="CVE-2017-5019" ref_url="https://www.suse.com/security/cve/CVE-2017-5019/" source="CVE"/>
		<reference ref_id="CVE-2017-5020" ref_url="https://www.suse.com/security/cve/CVE-2017-5020/" source="CVE"/>
		<reference ref_id="CVE-2017-5021" ref_url="https://www.suse.com/security/cve/CVE-2017-5021/" source="CVE"/>
		<reference ref_id="CVE-2017-5022" ref_url="https://www.suse.com/security/cve/CVE-2017-5022/" source="CVE"/>
		<reference ref_id="CVE-2017-5023" ref_url="https://www.suse.com/security/cve/CVE-2017-5023/" source="CVE"/>
		<reference ref_id="CVE-2017-5024" ref_url="https://www.suse.com/security/cve/CVE-2017-5024/" source="CVE"/>
		<reference ref_id="CVE-2017-5025" ref_url="https://www.suse.com/security/cve/CVE-2017-5025/" source="CVE"/>
		<reference ref_id="CVE-2017-5026" ref_url="https://www.suse.com/security/cve/CVE-2017-5026/" source="CVE"/>
		<reference ref_id="CVE-2017-5030" ref_url="https://www.suse.com/security/cve/CVE-2017-5030/" source="CVE"/>
		<reference ref_id="CVE-2017-5035" ref_url="https://www.suse.com/security/cve/CVE-2017-5035/" source="CVE"/>
		<reference ref_id="CVE-2017-5041" ref_url="https://www.suse.com/security/cve/CVE-2017-5041/" source="CVE"/>
		<reference ref_id="CVE-2017-5044" ref_url="https://www.suse.com/security/cve/CVE-2017-5044/" source="CVE"/>
		<reference ref_id="CVE-2017-5052" ref_url="https://www.suse.com/security/cve/CVE-2017-5052/" source="CVE"/>
		<reference ref_id="CVE-2017-5053" ref_url="https://www.suse.com/security/cve/CVE-2017-5053/" source="CVE"/>
		<reference ref_id="CVE-2017-5054" ref_url="https://www.suse.com/security/cve/CVE-2017-5054/" source="CVE"/>
		<reference ref_id="CVE-2017-5055" ref_url="https://www.suse.com/security/cve/CVE-2017-5055/" source="CVE"/>
		<reference ref_id="CVE-2017-5056" ref_url="https://www.suse.com/security/cve/CVE-2017-5056/" source="CVE"/>
		<reference ref_id="CVE-2017-5057" ref_url="https://www.suse.com/security/cve/CVE-2017-5057/" source="CVE"/>
		<reference ref_id="CVE-2017-5058" ref_url="https://www.suse.com/security/cve/CVE-2017-5058/" source="CVE"/>
		<reference ref_id="CVE-2017-5059" ref_url="https://www.suse.com/security/cve/CVE-2017-5059/" source="CVE"/>
		<reference ref_id="CVE-2017-5060" ref_url="https://www.suse.com/security/cve/CVE-2017-5060/" source="CVE"/>
		<reference ref_id="CVE-2017-5061" ref_url="https://www.suse.com/security/cve/CVE-2017-5061/" source="CVE"/>
		<reference ref_id="CVE-2017-5062" ref_url="https://www.suse.com/security/cve/CVE-2017-5062/" source="CVE"/>
		<reference ref_id="CVE-2017-5063" ref_url="https://www.suse.com/security/cve/CVE-2017-5063/" source="CVE"/>
		<reference ref_id="CVE-2017-5064" ref_url="https://www.suse.com/security/cve/CVE-2017-5064/" source="CVE"/>
		<reference ref_id="CVE-2017-5065" ref_url="https://www.suse.com/security/cve/CVE-2017-5065/" source="CVE"/>
		<reference ref_id="CVE-2017-5066" ref_url="https://www.suse.com/security/cve/CVE-2017-5066/" source="CVE"/>
		<reference ref_id="CVE-2017-5067" ref_url="https://www.suse.com/security/cve/CVE-2017-5067/" source="CVE"/>
		<reference ref_id="CVE-2017-5068" ref_url="https://www.suse.com/security/cve/CVE-2017-5068/" source="CVE"/>
		<reference ref_id="CVE-2017-5069" ref_url="https://www.suse.com/security/cve/CVE-2017-5069/" source="CVE"/>
		<reference ref_id="CVE-2017-5070" ref_url="https://www.suse.com/security/cve/CVE-2017-5070/" source="CVE"/>
		<reference ref_id="CVE-2017-5071" ref_url="https://www.suse.com/security/cve/CVE-2017-5071/" source="CVE"/>
		<reference ref_id="CVE-2017-5072" ref_url="https://www.suse.com/security/cve/CVE-2017-5072/" source="CVE"/>
		<reference ref_id="CVE-2017-5073" ref_url="https://www.suse.com/security/cve/CVE-2017-5073/" source="CVE"/>
		<reference ref_id="CVE-2017-5074" ref_url="https://www.suse.com/security/cve/CVE-2017-5074/" source="CVE"/>
		<reference ref_id="CVE-2017-5075" ref_url="https://www.suse.com/security/cve/CVE-2017-5075/" source="CVE"/>
		<reference ref_id="CVE-2017-5076" ref_url="https://www.suse.com/security/cve/CVE-2017-5076/" source="CVE"/>
		<reference ref_id="CVE-2017-5077" ref_url="https://www.suse.com/security/cve/CVE-2017-5077/" source="CVE"/>
		<reference ref_id="CVE-2017-5078" ref_url="https://www.suse.com/security/cve/CVE-2017-5078/" source="CVE"/>
		<reference ref_id="CVE-2017-5079" ref_url="https://www.suse.com/security/cve/CVE-2017-5079/" source="CVE"/>
		<reference ref_id="CVE-2017-5080" ref_url="https://www.suse.com/security/cve/CVE-2017-5080/" source="CVE"/>
		<reference ref_id="CVE-2017-5081" ref_url="https://www.suse.com/security/cve/CVE-2017-5081/" source="CVE"/>
		<reference ref_id="CVE-2017-5082" ref_url="https://www.suse.com/security/cve/CVE-2017-5082/" source="CVE"/>
		<reference ref_id="CVE-2017-5083" ref_url="https://www.suse.com/security/cve/CVE-2017-5083/" source="CVE"/>
		<reference ref_id="CVE-2017-5085" ref_url="https://www.suse.com/security/cve/CVE-2017-5085/" source="CVE"/>
		<reference ref_id="CVE-2017-5086" ref_url="https://www.suse.com/security/cve/CVE-2017-5086/" source="CVE"/>
		<reference ref_id="CVE-2017-5087" ref_url="https://www.suse.com/security/cve/CVE-2017-5087/" source="CVE"/>
		<reference ref_id="CVE-2017-5088" ref_url="https://www.suse.com/security/cve/CVE-2017-5088/" source="CVE"/>
		<reference ref_id="CVE-2017-5089" ref_url="https://www.suse.com/security/cve/CVE-2017-5089/" source="CVE"/>
		<reference ref_id="CVE-2017-5091" ref_url="https://www.suse.com/security/cve/CVE-2017-5091/" source="CVE"/>
		<reference ref_id="CVE-2017-5092" ref_url="https://www.suse.com/security/cve/CVE-2017-5092/" source="CVE"/>
		<reference ref_id="CVE-2017-5093" ref_url="https://www.suse.com/security/cve/CVE-2017-5093/" source="CVE"/>
		<reference ref_id="CVE-2017-5094" ref_url="https://www.suse.com/security/cve/CVE-2017-5094/" source="CVE"/>
		<reference ref_id="CVE-2017-5095" ref_url="https://www.suse.com/security/cve/CVE-2017-5095/" source="CVE"/>
		<reference ref_id="CVE-2017-5096" ref_url="https://www.suse.com/security/cve/CVE-2017-5096/" source="CVE"/>
		<reference ref_id="CVE-2017-5097" ref_url="https://www.suse.com/security/cve/CVE-2017-5097/" source="CVE"/>
		<reference ref_id="CVE-2017-5098" ref_url="https://www.suse.com/security/cve/CVE-2017-5098/" source="CVE"/>
		<reference ref_id="CVE-2017-5099" ref_url="https://www.suse.com/security/cve/CVE-2017-5099/" source="CVE"/>
		<reference ref_id="CVE-2017-5100" ref_url="https://www.suse.com/security/cve/CVE-2017-5100/" source="CVE"/>
		<reference ref_id="CVE-2017-5101" ref_url="https://www.suse.com/security/cve/CVE-2017-5101/" source="CVE"/>
		<reference ref_id="CVE-2017-5102" ref_url="https://www.suse.com/security/cve/CVE-2017-5102/" source="CVE"/>
		<reference ref_id="CVE-2017-5103" ref_url="https://www.suse.com/security/cve/CVE-2017-5103/" source="CVE"/>
		<reference ref_id="CVE-2017-5104" ref_url="https://www.suse.com/security/cve/CVE-2017-5104/" source="CVE"/>
		<reference ref_id="CVE-2017-5105" ref_url="https://www.suse.com/security/cve/CVE-2017-5105/" source="CVE"/>
		<reference ref_id="CVE-2017-5106" ref_url="https://www.suse.com/security/cve/CVE-2017-5106/" source="CVE"/>
		<reference ref_id="CVE-2017-5107" ref_url="https://www.suse.com/security/cve/CVE-2017-5107/" source="CVE"/>
		<reference ref_id="CVE-2017-5108" ref_url="https://www.suse.com/security/cve/CVE-2017-5108/" source="CVE"/>
		<reference ref_id="CVE-2017-5109" ref_url="https://www.suse.com/security/cve/CVE-2017-5109/" source="CVE"/>
		<reference ref_id="CVE-2017-5110" ref_url="https://www.suse.com/security/cve/CVE-2017-5110/" source="CVE"/>
		<reference ref_id="CVE-2017-5111" ref_url="https://www.suse.com/security/cve/CVE-2017-5111/" source="CVE"/>
		<reference ref_id="CVE-2017-5112" ref_url="https://www.suse.com/security/cve/CVE-2017-5112/" source="CVE"/>
		<reference ref_id="CVE-2017-5113" ref_url="https://www.suse.com/security/cve/CVE-2017-5113/" source="CVE"/>
		<reference ref_id="CVE-2017-5114" ref_url="https://www.suse.com/security/cve/CVE-2017-5114/" source="CVE"/>
		<reference ref_id="CVE-2017-5115" ref_url="https://www.suse.com/security/cve/CVE-2017-5115/" source="CVE"/>
		<reference ref_id="CVE-2017-5116" ref_url="https://www.suse.com/security/cve/CVE-2017-5116/" source="CVE"/>
		<reference ref_id="CVE-2017-5117" ref_url="https://www.suse.com/security/cve/CVE-2017-5117/" source="CVE"/>
		<reference ref_id="CVE-2017-5118" ref_url="https://www.suse.com/security/cve/CVE-2017-5118/" source="CVE"/>
		<reference ref_id="CVE-2017-5119" ref_url="https://www.suse.com/security/cve/CVE-2017-5119/" source="CVE"/>
		<reference ref_id="CVE-2017-5120" ref_url="https://www.suse.com/security/cve/CVE-2017-5120/" source="CVE"/>
		<reference ref_id="CVE-2017-5121" ref_url="https://www.suse.com/security/cve/CVE-2017-5121/" source="CVE"/>
		<reference ref_id="CVE-2017-5122" ref_url="https://www.suse.com/security/cve/CVE-2017-5122/" source="CVE"/>
		<reference ref_id="CVE-2017-5124" ref_url="https://www.suse.com/security/cve/CVE-2017-5124/" source="CVE"/>
		<reference ref_id="CVE-2017-5125" ref_url="https://www.suse.com/security/cve/CVE-2017-5125/" source="CVE"/>
		<reference ref_id="CVE-2017-5126" ref_url="https://www.suse.com/security/cve/CVE-2017-5126/" source="CVE"/>
		<reference ref_id="CVE-2017-5127" ref_url="https://www.suse.com/security/cve/CVE-2017-5127/" source="CVE"/>
		<reference ref_id="CVE-2017-5128" ref_url="https://www.suse.com/security/cve/CVE-2017-5128/" source="CVE"/>
		<reference ref_id="CVE-2017-5129" ref_url="https://www.suse.com/security/cve/CVE-2017-5129/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="CVE-2017-5131" ref_url="https://www.suse.com/security/cve/CVE-2017-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-5132" ref_url="https://www.suse.com/security/cve/CVE-2017-5132/" source="CVE"/>
		<reference ref_id="CVE-2017-5133" ref_url="https://www.suse.com/security/cve/CVE-2017-5133/" source="CVE"/>
		<reference ref_id="CVE-2017-7000" ref_url="https://www.suse.com/security/cve/CVE-2017-7000/" source="CVE"/>
		<reference ref_id="CVE-2018-16065" ref_url="https://www.suse.com/security/cve/CVE-2018-16065/" source="CVE"/>
		<reference ref_id="CVE-2018-16066" ref_url="https://www.suse.com/security/cve/CVE-2018-16066/" source="CVE"/>
		<reference ref_id="CVE-2018-16067" ref_url="https://www.suse.com/security/cve/CVE-2018-16067/" source="CVE"/>
		<reference ref_id="CVE-2018-16068" ref_url="https://www.suse.com/security/cve/CVE-2018-16068/" source="CVE"/>
		<reference ref_id="CVE-2018-16069" ref_url="https://www.suse.com/security/cve/CVE-2018-16069/" source="CVE"/>
		<reference ref_id="CVE-2018-16070" ref_url="https://www.suse.com/security/cve/CVE-2018-16070/" source="CVE"/>
		<reference ref_id="CVE-2018-16071" ref_url="https://www.suse.com/security/cve/CVE-2018-16071/" source="CVE"/>
		<reference ref_id="CVE-2018-16073" ref_url="https://www.suse.com/security/cve/CVE-2018-16073/" source="CVE"/>
		<reference ref_id="CVE-2018-16074" ref_url="https://www.suse.com/security/cve/CVE-2018-16074/" source="CVE"/>
		<reference ref_id="CVE-2018-16075" ref_url="https://www.suse.com/security/cve/CVE-2018-16075/" source="CVE"/>
		<reference ref_id="CVE-2018-16076" ref_url="https://www.suse.com/security/cve/CVE-2018-16076/" source="CVE"/>
		<reference ref_id="CVE-2018-16077" ref_url="https://www.suse.com/security/cve/CVE-2018-16077/" source="CVE"/>
		<reference ref_id="CVE-2018-16078" ref_url="https://www.suse.com/security/cve/CVE-2018-16078/" source="CVE"/>
		<reference ref_id="CVE-2018-16079" ref_url="https://www.suse.com/security/cve/CVE-2018-16079/" source="CVE"/>
		<reference ref_id="CVE-2018-16080" ref_url="https://www.suse.com/security/cve/CVE-2018-16080/" source="CVE"/>
		<reference ref_id="CVE-2018-16081" ref_url="https://www.suse.com/security/cve/CVE-2018-16081/" source="CVE"/>
		<reference ref_id="CVE-2018-16082" ref_url="https://www.suse.com/security/cve/CVE-2018-16082/" source="CVE"/>
		<reference ref_id="CVE-2018-16083" ref_url="https://www.suse.com/security/cve/CVE-2018-16083/" source="CVE"/>
		<reference ref_id="CVE-2018-16084" ref_url="https://www.suse.com/security/cve/CVE-2018-16084/" source="CVE"/>
		<reference ref_id="CVE-2018-16085" ref_url="https://www.suse.com/security/cve/CVE-2018-16085/" source="CVE"/>
		<reference ref_id="CVE-2018-16086" ref_url="https://www.suse.com/security/cve/CVE-2018-16086/" source="CVE"/>
		<reference ref_id="CVE-2018-16087" ref_url="https://www.suse.com/security/cve/CVE-2018-16087/" source="CVE"/>
		<reference ref_id="CVE-2018-16088" ref_url="https://www.suse.com/security/cve/CVE-2018-16088/" source="CVE"/>
		<reference ref_id="CVE-2018-17462" ref_url="https://www.suse.com/security/cve/CVE-2018-17462/" source="CVE"/>
		<reference ref_id="CVE-2018-17463" ref_url="https://www.suse.com/security/cve/CVE-2018-17463/" source="CVE"/>
		<reference ref_id="CVE-2018-17464" ref_url="https://www.suse.com/security/cve/CVE-2018-17464/" source="CVE"/>
		<reference ref_id="CVE-2018-17465" ref_url="https://www.suse.com/security/cve/CVE-2018-17465/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-17467" ref_url="https://www.suse.com/security/cve/CVE-2018-17467/" source="CVE"/>
		<reference ref_id="CVE-2018-17468" ref_url="https://www.suse.com/security/cve/CVE-2018-17468/" source="CVE"/>
		<reference ref_id="CVE-2018-17469" ref_url="https://www.suse.com/security/cve/CVE-2018-17469/" source="CVE"/>
		<reference ref_id="CVE-2018-17470" ref_url="https://www.suse.com/security/cve/CVE-2018-17470/" source="CVE"/>
		<reference ref_id="CVE-2018-17471" ref_url="https://www.suse.com/security/cve/CVE-2018-17471/" source="CVE"/>
		<reference ref_id="CVE-2018-17472" ref_url="https://www.suse.com/security/cve/CVE-2018-17472/" source="CVE"/>
		<reference ref_id="CVE-2018-17473" ref_url="https://www.suse.com/security/cve/CVE-2018-17473/" source="CVE"/>
		<reference ref_id="CVE-2018-17474" ref_url="https://www.suse.com/security/cve/CVE-2018-17474/" source="CVE"/>
		<reference ref_id="CVE-2018-17475" ref_url="https://www.suse.com/security/cve/CVE-2018-17475/" source="CVE"/>
		<reference ref_id="CVE-2018-17476" ref_url="https://www.suse.com/security/cve/CVE-2018-17476/" source="CVE"/>
		<reference ref_id="CVE-2018-17477" ref_url="https://www.suse.com/security/cve/CVE-2018-17477/" source="CVE"/>
		<reference ref_id="CVE-2018-17478" ref_url="https://www.suse.com/security/cve/CVE-2018-17478/" source="CVE"/>
		<reference ref_id="CVE-2018-17479" ref_url="https://www.suse.com/security/cve/CVE-2018-17479/" source="CVE"/>
		<reference ref_id="CVE-2018-17480" ref_url="https://www.suse.com/security/cve/CVE-2018-17480/" source="CVE"/>
		<reference ref_id="CVE-2018-17481" ref_url="https://www.suse.com/security/cve/CVE-2018-17481/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18336" ref_url="https://www.suse.com/security/cve/CVE-2018-18336/" source="CVE"/>
		<reference ref_id="CVE-2018-18337" ref_url="https://www.suse.com/security/cve/CVE-2018-18337/" source="CVE"/>
		<reference ref_id="CVE-2018-18338" ref_url="https://www.suse.com/security/cve/CVE-2018-18338/" source="CVE"/>
		<reference ref_id="CVE-2018-18339" ref_url="https://www.suse.com/security/cve/CVE-2018-18339/" source="CVE"/>
		<reference ref_id="CVE-2018-18340" ref_url="https://www.suse.com/security/cve/CVE-2018-18340/" source="CVE"/>
		<reference ref_id="CVE-2018-18341" ref_url="https://www.suse.com/security/cve/CVE-2018-18341/" source="CVE"/>
		<reference ref_id="CVE-2018-18342" ref_url="https://www.suse.com/security/cve/CVE-2018-18342/" source="CVE"/>
		<reference ref_id="CVE-2018-18343" ref_url="https://www.suse.com/security/cve/CVE-2018-18343/" source="CVE"/>
		<reference ref_id="CVE-2018-18344" ref_url="https://www.suse.com/security/cve/CVE-2018-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-18345" ref_url="https://www.suse.com/security/cve/CVE-2018-18345/" source="CVE"/>
		<reference ref_id="CVE-2018-18346" ref_url="https://www.suse.com/security/cve/CVE-2018-18346/" source="CVE"/>
		<reference ref_id="CVE-2018-18347" ref_url="https://www.suse.com/security/cve/CVE-2018-18347/" source="CVE"/>
		<reference ref_id="CVE-2018-18348" ref_url="https://www.suse.com/security/cve/CVE-2018-18348/" source="CVE"/>
		<reference ref_id="CVE-2018-18349" ref_url="https://www.suse.com/security/cve/CVE-2018-18349/" source="CVE"/>
		<reference ref_id="CVE-2018-18350" ref_url="https://www.suse.com/security/cve/CVE-2018-18350/" source="CVE"/>
		<reference ref_id="CVE-2018-18351" ref_url="https://www.suse.com/security/cve/CVE-2018-18351/" source="CVE"/>
		<reference ref_id="CVE-2018-18352" ref_url="https://www.suse.com/security/cve/CVE-2018-18352/" source="CVE"/>
		<reference ref_id="CVE-2018-18353" ref_url="https://www.suse.com/security/cve/CVE-2018-18353/" source="CVE"/>
		<reference ref_id="CVE-2018-18354" ref_url="https://www.suse.com/security/cve/CVE-2018-18354/" source="CVE"/>
		<reference ref_id="CVE-2018-18355" ref_url="https://www.suse.com/security/cve/CVE-2018-18355/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18357" ref_url="https://www.suse.com/security/cve/CVE-2018-18357/" source="CVE"/>
		<reference ref_id="CVE-2018-18358" ref_url="https://www.suse.com/security/cve/CVE-2018-18358/" source="CVE"/>
		<reference ref_id="CVE-2018-18359" ref_url="https://www.suse.com/security/cve/CVE-2018-18359/" source="CVE"/>
		<reference ref_id="CVE-2018-20073" ref_url="https://www.suse.com/security/cve/CVE-2018-20073/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-6031" ref_url="https://www.suse.com/security/cve/CVE-2018-6031/" source="CVE"/>
		<reference ref_id="CVE-2018-6032" ref_url="https://www.suse.com/security/cve/CVE-2018-6032/" source="CVE"/>
		<reference ref_id="CVE-2018-6033" ref_url="https://www.suse.com/security/cve/CVE-2018-6033/" source="CVE"/>
		<reference ref_id="CVE-2018-6034" ref_url="https://www.suse.com/security/cve/CVE-2018-6034/" source="CVE"/>
		<reference ref_id="CVE-2018-6035" ref_url="https://www.suse.com/security/cve/CVE-2018-6035/" source="CVE"/>
		<reference ref_id="CVE-2018-6036" ref_url="https://www.suse.com/security/cve/CVE-2018-6036/" source="CVE"/>
		<reference ref_id="CVE-2018-6037" ref_url="https://www.suse.com/security/cve/CVE-2018-6037/" source="CVE"/>
		<reference ref_id="CVE-2018-6038" ref_url="https://www.suse.com/security/cve/CVE-2018-6038/" source="CVE"/>
		<reference ref_id="CVE-2018-6039" ref_url="https://www.suse.com/security/cve/CVE-2018-6039/" source="CVE"/>
		<reference ref_id="CVE-2018-6040" ref_url="https://www.suse.com/security/cve/CVE-2018-6040/" source="CVE"/>
		<reference ref_id="CVE-2018-6041" ref_url="https://www.suse.com/security/cve/CVE-2018-6041/" source="CVE"/>
		<reference ref_id="CVE-2018-6042" ref_url="https://www.suse.com/security/cve/CVE-2018-6042/" source="CVE"/>
		<reference ref_id="CVE-2018-6043" ref_url="https://www.suse.com/security/cve/CVE-2018-6043/" source="CVE"/>
		<reference ref_id="CVE-2018-6044" ref_url="https://www.suse.com/security/cve/CVE-2018-6044/" source="CVE"/>
		<reference ref_id="CVE-2018-6045" ref_url="https://www.suse.com/security/cve/CVE-2018-6045/" source="CVE"/>
		<reference ref_id="CVE-2018-6046" ref_url="https://www.suse.com/security/cve/CVE-2018-6046/" source="CVE"/>
		<reference ref_id="CVE-2018-6047" ref_url="https://www.suse.com/security/cve/CVE-2018-6047/" source="CVE"/>
		<reference ref_id="CVE-2018-6048" ref_url="https://www.suse.com/security/cve/CVE-2018-6048/" source="CVE"/>
		<reference ref_id="CVE-2018-6049" ref_url="https://www.suse.com/security/cve/CVE-2018-6049/" source="CVE"/>
		<reference ref_id="CVE-2018-6050" ref_url="https://www.suse.com/security/cve/CVE-2018-6050/" source="CVE"/>
		<reference ref_id="CVE-2018-6051" ref_url="https://www.suse.com/security/cve/CVE-2018-6051/" source="CVE"/>
		<reference ref_id="CVE-2018-6052" ref_url="https://www.suse.com/security/cve/CVE-2018-6052/" source="CVE"/>
		<reference ref_id="CVE-2018-6053" ref_url="https://www.suse.com/security/cve/CVE-2018-6053/" source="CVE"/>
		<reference ref_id="CVE-2018-6054" ref_url="https://www.suse.com/security/cve/CVE-2018-6054/" source="CVE"/>
		<reference ref_id="CVE-2018-6056" ref_url="https://www.suse.com/security/cve/CVE-2018-6056/" source="CVE"/>
		<reference ref_id="CVE-2018-6057" ref_url="https://www.suse.com/security/cve/CVE-2018-6057/" source="CVE"/>
		<reference ref_id="CVE-2018-6060" ref_url="https://www.suse.com/security/cve/CVE-2018-6060/" source="CVE"/>
		<reference ref_id="CVE-2018-6061" ref_url="https://www.suse.com/security/cve/CVE-2018-6061/" source="CVE"/>
		<reference ref_id="CVE-2018-6062" ref_url="https://www.suse.com/security/cve/CVE-2018-6062/" source="CVE"/>
		<reference ref_id="CVE-2018-6063" ref_url="https://www.suse.com/security/cve/CVE-2018-6063/" source="CVE"/>
		<reference ref_id="CVE-2018-6064" ref_url="https://www.suse.com/security/cve/CVE-2018-6064/" source="CVE"/>
		<reference ref_id="CVE-2018-6065" ref_url="https://www.suse.com/security/cve/CVE-2018-6065/" source="CVE"/>
		<reference ref_id="CVE-2018-6066" ref_url="https://www.suse.com/security/cve/CVE-2018-6066/" source="CVE"/>
		<reference ref_id="CVE-2018-6067" ref_url="https://www.suse.com/security/cve/CVE-2018-6067/" source="CVE"/>
		<reference ref_id="CVE-2018-6068" ref_url="https://www.suse.com/security/cve/CVE-2018-6068/" source="CVE"/>
		<reference ref_id="CVE-2018-6069" ref_url="https://www.suse.com/security/cve/CVE-2018-6069/" source="CVE"/>
		<reference ref_id="CVE-2018-6070" ref_url="https://www.suse.com/security/cve/CVE-2018-6070/" source="CVE"/>
		<reference ref_id="CVE-2018-6071" ref_url="https://www.suse.com/security/cve/CVE-2018-6071/" source="CVE"/>
		<reference ref_id="CVE-2018-6072" ref_url="https://www.suse.com/security/cve/CVE-2018-6072/" source="CVE"/>
		<reference ref_id="CVE-2018-6073" ref_url="https://www.suse.com/security/cve/CVE-2018-6073/" source="CVE"/>
		<reference ref_id="CVE-2018-6074" ref_url="https://www.suse.com/security/cve/CVE-2018-6074/" source="CVE"/>
		<reference ref_id="CVE-2018-6075" ref_url="https://www.suse.com/security/cve/CVE-2018-6075/" source="CVE"/>
		<reference ref_id="CVE-2018-6076" ref_url="https://www.suse.com/security/cve/CVE-2018-6076/" source="CVE"/>
		<reference ref_id="CVE-2018-6077" ref_url="https://www.suse.com/security/cve/CVE-2018-6077/" source="CVE"/>
		<reference ref_id="CVE-2018-6078" ref_url="https://www.suse.com/security/cve/CVE-2018-6078/" source="CVE"/>
		<reference ref_id="CVE-2018-6079" ref_url="https://www.suse.com/security/cve/CVE-2018-6079/" source="CVE"/>
		<reference ref_id="CVE-2018-6080" ref_url="https://www.suse.com/security/cve/CVE-2018-6080/" source="CVE"/>
		<reference ref_id="CVE-2018-6081" ref_url="https://www.suse.com/security/cve/CVE-2018-6081/" source="CVE"/>
		<reference ref_id="CVE-2018-6082" ref_url="https://www.suse.com/security/cve/CVE-2018-6082/" source="CVE"/>
		<reference ref_id="CVE-2018-6083" ref_url="https://www.suse.com/security/cve/CVE-2018-6083/" source="CVE"/>
		<reference ref_id="CVE-2018-6085" ref_url="https://www.suse.com/security/cve/CVE-2018-6085/" source="CVE"/>
		<reference ref_id="CVE-2018-6086" ref_url="https://www.suse.com/security/cve/CVE-2018-6086/" source="CVE"/>
		<reference ref_id="CVE-2018-6087" ref_url="https://www.suse.com/security/cve/CVE-2018-6087/" source="CVE"/>
		<reference ref_id="CVE-2018-6088" ref_url="https://www.suse.com/security/cve/CVE-2018-6088/" source="CVE"/>
		<reference ref_id="CVE-2018-6089" ref_url="https://www.suse.com/security/cve/CVE-2018-6089/" source="CVE"/>
		<reference ref_id="CVE-2018-6090" ref_url="https://www.suse.com/security/cve/CVE-2018-6090/" source="CVE"/>
		<reference ref_id="CVE-2018-6091" ref_url="https://www.suse.com/security/cve/CVE-2018-6091/" source="CVE"/>
		<reference ref_id="CVE-2018-6092" ref_url="https://www.suse.com/security/cve/CVE-2018-6092/" source="CVE"/>
		<reference ref_id="CVE-2018-6093" ref_url="https://www.suse.com/security/cve/CVE-2018-6093/" source="CVE"/>
		<reference ref_id="CVE-2018-6094" ref_url="https://www.suse.com/security/cve/CVE-2018-6094/" source="CVE"/>
		<reference ref_id="CVE-2018-6095" ref_url="https://www.suse.com/security/cve/CVE-2018-6095/" source="CVE"/>
		<reference ref_id="CVE-2018-6096" ref_url="https://www.suse.com/security/cve/CVE-2018-6096/" source="CVE"/>
		<reference ref_id="CVE-2018-6097" ref_url="https://www.suse.com/security/cve/CVE-2018-6097/" source="CVE"/>
		<reference ref_id="CVE-2018-6098" ref_url="https://www.suse.com/security/cve/CVE-2018-6098/" source="CVE"/>
		<reference ref_id="CVE-2018-6099" ref_url="https://www.suse.com/security/cve/CVE-2018-6099/" source="CVE"/>
		<reference ref_id="CVE-2018-6100" ref_url="https://www.suse.com/security/cve/CVE-2018-6100/" source="CVE"/>
		<reference ref_id="CVE-2018-6101" ref_url="https://www.suse.com/security/cve/CVE-2018-6101/" source="CVE"/>
		<reference ref_id="CVE-2018-6102" ref_url="https://www.suse.com/security/cve/CVE-2018-6102/" source="CVE"/>
		<reference ref_id="CVE-2018-6103" ref_url="https://www.suse.com/security/cve/CVE-2018-6103/" source="CVE"/>
		<reference ref_id="CVE-2018-6104" ref_url="https://www.suse.com/security/cve/CVE-2018-6104/" source="CVE"/>
		<reference ref_id="CVE-2018-6105" ref_url="https://www.suse.com/security/cve/CVE-2018-6105/" source="CVE"/>
		<reference ref_id="CVE-2018-6106" ref_url="https://www.suse.com/security/cve/CVE-2018-6106/" source="CVE"/>
		<reference ref_id="CVE-2018-6107" ref_url="https://www.suse.com/security/cve/CVE-2018-6107/" source="CVE"/>
		<reference ref_id="CVE-2018-6108" ref_url="https://www.suse.com/security/cve/CVE-2018-6108/" source="CVE"/>
		<reference ref_id="CVE-2018-6109" ref_url="https://www.suse.com/security/cve/CVE-2018-6109/" source="CVE"/>
		<reference ref_id="CVE-2018-6110" ref_url="https://www.suse.com/security/cve/CVE-2018-6110/" source="CVE"/>
		<reference ref_id="CVE-2018-6111" ref_url="https://www.suse.com/security/cve/CVE-2018-6111/" source="CVE"/>
		<reference ref_id="CVE-2018-6112" ref_url="https://www.suse.com/security/cve/CVE-2018-6112/" source="CVE"/>
		<reference ref_id="CVE-2018-6113" ref_url="https://www.suse.com/security/cve/CVE-2018-6113/" source="CVE"/>
		<reference ref_id="CVE-2018-6114" ref_url="https://www.suse.com/security/cve/CVE-2018-6114/" source="CVE"/>
		<reference ref_id="CVE-2018-6115" ref_url="https://www.suse.com/security/cve/CVE-2018-6115/" source="CVE"/>
		<reference ref_id="CVE-2018-6116" ref_url="https://www.suse.com/security/cve/CVE-2018-6116/" source="CVE"/>
		<reference ref_id="CVE-2018-6117" ref_url="https://www.suse.com/security/cve/CVE-2018-6117/" source="CVE"/>
		<reference ref_id="CVE-2018-6118" ref_url="https://www.suse.com/security/cve/CVE-2018-6118/" source="CVE"/>
		<reference ref_id="CVE-2018-6120" ref_url="https://www.suse.com/security/cve/CVE-2018-6120/" source="CVE"/>
		<reference ref_id="CVE-2018-6121" ref_url="https://www.suse.com/security/cve/CVE-2018-6121/" source="CVE"/>
		<reference ref_id="CVE-2018-6122" ref_url="https://www.suse.com/security/cve/CVE-2018-6122/" source="CVE"/>
		<reference ref_id="CVE-2018-6123" ref_url="https://www.suse.com/security/cve/CVE-2018-6123/" source="CVE"/>
		<reference ref_id="CVE-2018-6124" ref_url="https://www.suse.com/security/cve/CVE-2018-6124/" source="CVE"/>
		<reference ref_id="CVE-2018-6125" ref_url="https://www.suse.com/security/cve/CVE-2018-6125/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2018-6127" ref_url="https://www.suse.com/security/cve/CVE-2018-6127/" source="CVE"/>
		<reference ref_id="CVE-2018-6128" ref_url="https://www.suse.com/security/cve/CVE-2018-6128/" source="CVE"/>
		<reference ref_id="CVE-2018-6129" ref_url="https://www.suse.com/security/cve/CVE-2018-6129/" source="CVE"/>
		<reference ref_id="CVE-2018-6130" ref_url="https://www.suse.com/security/cve/CVE-2018-6130/" source="CVE"/>
		<reference ref_id="CVE-2018-6131" ref_url="https://www.suse.com/security/cve/CVE-2018-6131/" source="CVE"/>
		<reference ref_id="CVE-2018-6132" ref_url="https://www.suse.com/security/cve/CVE-2018-6132/" source="CVE"/>
		<reference ref_id="CVE-2018-6133" ref_url="https://www.suse.com/security/cve/CVE-2018-6133/" source="CVE"/>
		<reference ref_id="CVE-2018-6134" ref_url="https://www.suse.com/security/cve/CVE-2018-6134/" source="CVE"/>
		<reference ref_id="CVE-2018-6135" ref_url="https://www.suse.com/security/cve/CVE-2018-6135/" source="CVE"/>
		<reference ref_id="CVE-2018-6136" ref_url="https://www.suse.com/security/cve/CVE-2018-6136/" source="CVE"/>
		<reference ref_id="CVE-2018-6137" ref_url="https://www.suse.com/security/cve/CVE-2018-6137/" source="CVE"/>
		<reference ref_id="CVE-2018-6138" ref_url="https://www.suse.com/security/cve/CVE-2018-6138/" source="CVE"/>
		<reference ref_id="CVE-2018-6139" ref_url="https://www.suse.com/security/cve/CVE-2018-6139/" source="CVE"/>
		<reference ref_id="CVE-2018-6140" ref_url="https://www.suse.com/security/cve/CVE-2018-6140/" source="CVE"/>
		<reference ref_id="CVE-2018-6141" ref_url="https://www.suse.com/security/cve/CVE-2018-6141/" source="CVE"/>
		<reference ref_id="CVE-2018-6142" ref_url="https://www.suse.com/security/cve/CVE-2018-6142/" source="CVE"/>
		<reference ref_id="CVE-2018-6143" ref_url="https://www.suse.com/security/cve/CVE-2018-6143/" source="CVE"/>
		<reference ref_id="CVE-2018-6144" ref_url="https://www.suse.com/security/cve/CVE-2018-6144/" source="CVE"/>
		<reference ref_id="CVE-2018-6145" ref_url="https://www.suse.com/security/cve/CVE-2018-6145/" source="CVE"/>
		<reference ref_id="CVE-2018-6147" ref_url="https://www.suse.com/security/cve/CVE-2018-6147/" source="CVE"/>
		<reference ref_id="CVE-2018-6148" ref_url="https://www.suse.com/security/cve/CVE-2018-6148/" source="CVE"/>
		<reference ref_id="CVE-2018-6149" ref_url="https://www.suse.com/security/cve/CVE-2018-6149/" source="CVE"/>
		<reference ref_id="CVE-2018-6153" ref_url="https://www.suse.com/security/cve/CVE-2018-6153/" source="CVE"/>
		<reference ref_id="CVE-2018-6154" ref_url="https://www.suse.com/security/cve/CVE-2018-6154/" source="CVE"/>
		<reference ref_id="CVE-2018-6155" ref_url="https://www.suse.com/security/cve/CVE-2018-6155/" source="CVE"/>
		<reference ref_id="CVE-2018-6156" ref_url="https://www.suse.com/security/cve/CVE-2018-6156/" source="CVE"/>
		<reference ref_id="CVE-2018-6157" ref_url="https://www.suse.com/security/cve/CVE-2018-6157/" source="CVE"/>
		<reference ref_id="CVE-2018-6158" ref_url="https://www.suse.com/security/cve/CVE-2018-6158/" source="CVE"/>
		<reference ref_id="CVE-2018-6159" ref_url="https://www.suse.com/security/cve/CVE-2018-6159/" source="CVE"/>
		<reference ref_id="CVE-2018-6160" ref_url="https://www.suse.com/security/cve/CVE-2018-6160/" source="CVE"/>
		<reference ref_id="CVE-2018-6161" ref_url="https://www.suse.com/security/cve/CVE-2018-6161/" source="CVE"/>
		<reference ref_id="CVE-2018-6162" ref_url="https://www.suse.com/security/cve/CVE-2018-6162/" source="CVE"/>
		<reference ref_id="CVE-2018-6163" ref_url="https://www.suse.com/security/cve/CVE-2018-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-6164" ref_url="https://www.suse.com/security/cve/CVE-2018-6164/" source="CVE"/>
		<reference ref_id="CVE-2018-6165" ref_url="https://www.suse.com/security/cve/CVE-2018-6165/" source="CVE"/>
		<reference ref_id="CVE-2018-6166" ref_url="https://www.suse.com/security/cve/CVE-2018-6166/" source="CVE"/>
		<reference ref_id="CVE-2018-6167" ref_url="https://www.suse.com/security/cve/CVE-2018-6167/" source="CVE"/>
		<reference ref_id="CVE-2018-6168" ref_url="https://www.suse.com/security/cve/CVE-2018-6168/" source="CVE"/>
		<reference ref_id="CVE-2018-6169" ref_url="https://www.suse.com/security/cve/CVE-2018-6169/" source="CVE"/>
		<reference ref_id="CVE-2018-6170" ref_url="https://www.suse.com/security/cve/CVE-2018-6170/" source="CVE"/>
		<reference ref_id="CVE-2018-6171" ref_url="https://www.suse.com/security/cve/CVE-2018-6171/" source="CVE"/>
		<reference ref_id="CVE-2018-6172" ref_url="https://www.suse.com/security/cve/CVE-2018-6172/" source="CVE"/>
		<reference ref_id="CVE-2018-6173" ref_url="https://www.suse.com/security/cve/CVE-2018-6173/" source="CVE"/>
		<reference ref_id="CVE-2018-6174" ref_url="https://www.suse.com/security/cve/CVE-2018-6174/" source="CVE"/>
		<reference ref_id="CVE-2018-6175" ref_url="https://www.suse.com/security/cve/CVE-2018-6175/" source="CVE"/>
		<reference ref_id="CVE-2018-6176" ref_url="https://www.suse.com/security/cve/CVE-2018-6176/" source="CVE"/>
		<reference ref_id="CVE-2018-6177" ref_url="https://www.suse.com/security/cve/CVE-2018-6177/" source="CVE"/>
		<reference ref_id="CVE-2018-6178" ref_url="https://www.suse.com/security/cve/CVE-2018-6178/" source="CVE"/>
		<reference ref_id="CVE-2018-6179" ref_url="https://www.suse.com/security/cve/CVE-2018-6179/" source="CVE"/>
		<reference ref_id="CVE-2018-6406" ref_url="https://www.suse.com/security/cve/CVE-2018-6406/" source="CVE"/>
		<reference ref_id="CVE-2019-13659" ref_url="https://www.suse.com/security/cve/CVE-2019-13659/" source="CVE"/>
		<reference ref_id="CVE-2019-13660" ref_url="https://www.suse.com/security/cve/CVE-2019-13660/" source="CVE"/>
		<reference ref_id="CVE-2019-13661" ref_url="https://www.suse.com/security/cve/CVE-2019-13661/" source="CVE"/>
		<reference ref_id="CVE-2019-13662" ref_url="https://www.suse.com/security/cve/CVE-2019-13662/" source="CVE"/>
		<reference ref_id="CVE-2019-13663" ref_url="https://www.suse.com/security/cve/CVE-2019-13663/" source="CVE"/>
		<reference ref_id="CVE-2019-13664" ref_url="https://www.suse.com/security/cve/CVE-2019-13664/" source="CVE"/>
		<reference ref_id="CVE-2019-13665" ref_url="https://www.suse.com/security/cve/CVE-2019-13665/" source="CVE"/>
		<reference ref_id="CVE-2019-13666" ref_url="https://www.suse.com/security/cve/CVE-2019-13666/" source="CVE"/>
		<reference ref_id="CVE-2019-13667" ref_url="https://www.suse.com/security/cve/CVE-2019-13667/" source="CVE"/>
		<reference ref_id="CVE-2019-13668" ref_url="https://www.suse.com/security/cve/CVE-2019-13668/" source="CVE"/>
		<reference ref_id="CVE-2019-13669" ref_url="https://www.suse.com/security/cve/CVE-2019-13669/" source="CVE"/>
		<reference ref_id="CVE-2019-13670" ref_url="https://www.suse.com/security/cve/CVE-2019-13670/" source="CVE"/>
		<reference ref_id="CVE-2019-13671" ref_url="https://www.suse.com/security/cve/CVE-2019-13671/" source="CVE"/>
		<reference ref_id="CVE-2019-13673" ref_url="https://www.suse.com/security/cve/CVE-2019-13673/" source="CVE"/>
		<reference ref_id="CVE-2019-13674" ref_url="https://www.suse.com/security/cve/CVE-2019-13674/" source="CVE"/>
		<reference ref_id="CVE-2019-13675" ref_url="https://www.suse.com/security/cve/CVE-2019-13675/" source="CVE"/>
		<reference ref_id="CVE-2019-13676" ref_url="https://www.suse.com/security/cve/CVE-2019-13676/" source="CVE"/>
		<reference ref_id="CVE-2019-13677" ref_url="https://www.suse.com/security/cve/CVE-2019-13677/" source="CVE"/>
		<reference ref_id="CVE-2019-13678" ref_url="https://www.suse.com/security/cve/CVE-2019-13678/" source="CVE"/>
		<reference ref_id="CVE-2019-13679" ref_url="https://www.suse.com/security/cve/CVE-2019-13679/" source="CVE"/>
		<reference ref_id="CVE-2019-13680" ref_url="https://www.suse.com/security/cve/CVE-2019-13680/" source="CVE"/>
		<reference ref_id="CVE-2019-13681" ref_url="https://www.suse.com/security/cve/CVE-2019-13681/" source="CVE"/>
		<reference ref_id="CVE-2019-13682" ref_url="https://www.suse.com/security/cve/CVE-2019-13682/" source="CVE"/>
		<reference ref_id="CVE-2019-13683" ref_url="https://www.suse.com/security/cve/CVE-2019-13683/" source="CVE"/>
		<reference ref_id="CVE-2019-13685" ref_url="https://www.suse.com/security/cve/CVE-2019-13685/" source="CVE"/>
		<reference ref_id="CVE-2019-13686" ref_url="https://www.suse.com/security/cve/CVE-2019-13686/" source="CVE"/>
		<reference ref_id="CVE-2019-13687" ref_url="https://www.suse.com/security/cve/CVE-2019-13687/" source="CVE"/>
		<reference ref_id="CVE-2019-13688" ref_url="https://www.suse.com/security/cve/CVE-2019-13688/" source="CVE"/>
		<reference ref_id="CVE-2019-13693" ref_url="https://www.suse.com/security/cve/CVE-2019-13693/" source="CVE"/>
		<reference ref_id="CVE-2019-13694" ref_url="https://www.suse.com/security/cve/CVE-2019-13694/" source="CVE"/>
		<reference ref_id="CVE-2019-13695" ref_url="https://www.suse.com/security/cve/CVE-2019-13695/" source="CVE"/>
		<reference ref_id="CVE-2019-13696" ref_url="https://www.suse.com/security/cve/CVE-2019-13696/" source="CVE"/>
		<reference ref_id="CVE-2019-13697" ref_url="https://www.suse.com/security/cve/CVE-2019-13697/" source="CVE"/>
		<reference ref_id="CVE-2019-13699" ref_url="https://www.suse.com/security/cve/CVE-2019-13699/" source="CVE"/>
		<reference ref_id="CVE-2019-13700" ref_url="https://www.suse.com/security/cve/CVE-2019-13700/" source="CVE"/>
		<reference ref_id="CVE-2019-13701" ref_url="https://www.suse.com/security/cve/CVE-2019-13701/" source="CVE"/>
		<reference ref_id="CVE-2019-13702" ref_url="https://www.suse.com/security/cve/CVE-2019-13702/" source="CVE"/>
		<reference ref_id="CVE-2019-13703" ref_url="https://www.suse.com/security/cve/CVE-2019-13703/" source="CVE"/>
		<reference ref_id="CVE-2019-13704" ref_url="https://www.suse.com/security/cve/CVE-2019-13704/" source="CVE"/>
		<reference ref_id="CVE-2019-13705" ref_url="https://www.suse.com/security/cve/CVE-2019-13705/" source="CVE"/>
		<reference ref_id="CVE-2019-13706" ref_url="https://www.suse.com/security/cve/CVE-2019-13706/" source="CVE"/>
		<reference ref_id="CVE-2019-13707" ref_url="https://www.suse.com/security/cve/CVE-2019-13707/" source="CVE"/>
		<reference ref_id="CVE-2019-13708" ref_url="https://www.suse.com/security/cve/CVE-2019-13708/" source="CVE"/>
		<reference ref_id="CVE-2019-13709" ref_url="https://www.suse.com/security/cve/CVE-2019-13709/" source="CVE"/>
		<reference ref_id="CVE-2019-13710" ref_url="https://www.suse.com/security/cve/CVE-2019-13710/" source="CVE"/>
		<reference ref_id="CVE-2019-13711" ref_url="https://www.suse.com/security/cve/CVE-2019-13711/" source="CVE"/>
		<reference ref_id="CVE-2019-13713" ref_url="https://www.suse.com/security/cve/CVE-2019-13713/" source="CVE"/>
		<reference ref_id="CVE-2019-13714" ref_url="https://www.suse.com/security/cve/CVE-2019-13714/" source="CVE"/>
		<reference ref_id="CVE-2019-13715" ref_url="https://www.suse.com/security/cve/CVE-2019-13715/" source="CVE"/>
		<reference ref_id="CVE-2019-13716" ref_url="https://www.suse.com/security/cve/CVE-2019-13716/" source="CVE"/>
		<reference ref_id="CVE-2019-13717" ref_url="https://www.suse.com/security/cve/CVE-2019-13717/" source="CVE"/>
		<reference ref_id="CVE-2019-13718" ref_url="https://www.suse.com/security/cve/CVE-2019-13718/" source="CVE"/>
		<reference ref_id="CVE-2019-13719" ref_url="https://www.suse.com/security/cve/CVE-2019-13719/" source="CVE"/>
		<reference ref_id="CVE-2019-13720" ref_url="https://www.suse.com/security/cve/CVE-2019-13720/" source="CVE"/>
		<reference ref_id="CVE-2019-13721" ref_url="https://www.suse.com/security/cve/CVE-2019-13721/" source="CVE"/>
		<reference ref_id="CVE-2019-13723" ref_url="https://www.suse.com/security/cve/CVE-2019-13723/" source="CVE"/>
		<reference ref_id="CVE-2019-13724" ref_url="https://www.suse.com/security/cve/CVE-2019-13724/" source="CVE"/>
		<reference ref_id="CVE-2019-13725" ref_url="https://www.suse.com/security/cve/CVE-2019-13725/" source="CVE"/>
		<reference ref_id="CVE-2019-13726" ref_url="https://www.suse.com/security/cve/CVE-2019-13726/" source="CVE"/>
		<reference ref_id="CVE-2019-13727" ref_url="https://www.suse.com/security/cve/CVE-2019-13727/" source="CVE"/>
		<reference ref_id="CVE-2019-13728" ref_url="https://www.suse.com/security/cve/CVE-2019-13728/" source="CVE"/>
		<reference ref_id="CVE-2019-13729" ref_url="https://www.suse.com/security/cve/CVE-2019-13729/" source="CVE"/>
		<reference ref_id="CVE-2019-13730" ref_url="https://www.suse.com/security/cve/CVE-2019-13730/" source="CVE"/>
		<reference ref_id="CVE-2019-13732" ref_url="https://www.suse.com/security/cve/CVE-2019-13732/" source="CVE"/>
		<reference ref_id="CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734/" source="CVE"/>
		<reference ref_id="CVE-2019-13735" ref_url="https://www.suse.com/security/cve/CVE-2019-13735/" source="CVE"/>
		<reference ref_id="CVE-2019-13736" ref_url="https://www.suse.com/security/cve/CVE-2019-13736/" source="CVE"/>
		<reference ref_id="CVE-2019-13737" ref_url="https://www.suse.com/security/cve/CVE-2019-13737/" source="CVE"/>
		<reference ref_id="CVE-2019-13738" ref_url="https://www.suse.com/security/cve/CVE-2019-13738/" source="CVE"/>
		<reference ref_id="CVE-2019-13739" ref_url="https://www.suse.com/security/cve/CVE-2019-13739/" source="CVE"/>
		<reference ref_id="CVE-2019-13740" ref_url="https://www.suse.com/security/cve/CVE-2019-13740/" source="CVE"/>
		<reference ref_id="CVE-2019-13741" ref_url="https://www.suse.com/security/cve/CVE-2019-13741/" source="CVE"/>
		<reference ref_id="CVE-2019-13742" ref_url="https://www.suse.com/security/cve/CVE-2019-13742/" source="CVE"/>
		<reference ref_id="CVE-2019-13743" ref_url="https://www.suse.com/security/cve/CVE-2019-13743/" source="CVE"/>
		<reference ref_id="CVE-2019-13744" ref_url="https://www.suse.com/security/cve/CVE-2019-13744/" source="CVE"/>
		<reference ref_id="CVE-2019-13745" ref_url="https://www.suse.com/security/cve/CVE-2019-13745/" source="CVE"/>
		<reference ref_id="CVE-2019-13746" ref_url="https://www.suse.com/security/cve/CVE-2019-13746/" source="CVE"/>
		<reference ref_id="CVE-2019-13747" ref_url="https://www.suse.com/security/cve/CVE-2019-13747/" source="CVE"/>
		<reference ref_id="CVE-2019-13748" ref_url="https://www.suse.com/security/cve/CVE-2019-13748/" source="CVE"/>
		<reference ref_id="CVE-2019-13749" ref_url="https://www.suse.com/security/cve/CVE-2019-13749/" source="CVE"/>
		<reference ref_id="CVE-2019-13750" ref_url="https://www.suse.com/security/cve/CVE-2019-13750/" source="CVE"/>
		<reference ref_id="CVE-2019-13751" ref_url="https://www.suse.com/security/cve/CVE-2019-13751/" source="CVE"/>
		<reference ref_id="CVE-2019-13752" ref_url="https://www.suse.com/security/cve/CVE-2019-13752/" source="CVE"/>
		<reference ref_id="CVE-2019-13753" ref_url="https://www.suse.com/security/cve/CVE-2019-13753/" source="CVE"/>
		<reference ref_id="CVE-2019-13754" ref_url="https://www.suse.com/security/cve/CVE-2019-13754/" source="CVE"/>
		<reference ref_id="CVE-2019-13755" ref_url="https://www.suse.com/security/cve/CVE-2019-13755/" source="CVE"/>
		<reference ref_id="CVE-2019-13756" ref_url="https://www.suse.com/security/cve/CVE-2019-13756/" source="CVE"/>
		<reference ref_id="CVE-2019-13757" ref_url="https://www.suse.com/security/cve/CVE-2019-13757/" source="CVE"/>
		<reference ref_id="CVE-2019-13758" ref_url="https://www.suse.com/security/cve/CVE-2019-13758/" source="CVE"/>
		<reference ref_id="CVE-2019-13759" ref_url="https://www.suse.com/security/cve/CVE-2019-13759/" source="CVE"/>
		<reference ref_id="CVE-2019-13761" ref_url="https://www.suse.com/security/cve/CVE-2019-13761/" source="CVE"/>
		<reference ref_id="CVE-2019-13762" ref_url="https://www.suse.com/security/cve/CVE-2019-13762/" source="CVE"/>
		<reference ref_id="CVE-2019-13763" ref_url="https://www.suse.com/security/cve/CVE-2019-13763/" source="CVE"/>
		<reference ref_id="CVE-2019-13764" ref_url="https://www.suse.com/security/cve/CVE-2019-13764/" source="CVE"/>
		<reference ref_id="CVE-2019-13767" ref_url="https://www.suse.com/security/cve/CVE-2019-13767/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5754" ref_url="https://www.suse.com/security/cve/CVE-2019-5754/" source="CVE"/>
		<reference ref_id="CVE-2019-5755" ref_url="https://www.suse.com/security/cve/CVE-2019-5755/" source="CVE"/>
		<reference ref_id="CVE-2019-5756" ref_url="https://www.suse.com/security/cve/CVE-2019-5756/" source="CVE"/>
		<reference ref_id="CVE-2019-5757" ref_url="https://www.suse.com/security/cve/CVE-2019-5757/" source="CVE"/>
		<reference ref_id="CVE-2019-5758" ref_url="https://www.suse.com/security/cve/CVE-2019-5758/" source="CVE"/>
		<reference ref_id="CVE-2019-5759" ref_url="https://www.suse.com/security/cve/CVE-2019-5759/" source="CVE"/>
		<reference ref_id="CVE-2019-5760" ref_url="https://www.suse.com/security/cve/CVE-2019-5760/" source="CVE"/>
		<reference ref_id="CVE-2019-5761" ref_url="https://www.suse.com/security/cve/CVE-2019-5761/" source="CVE"/>
		<reference ref_id="CVE-2019-5762" ref_url="https://www.suse.com/security/cve/CVE-2019-5762/" source="CVE"/>
		<reference ref_id="CVE-2019-5763" ref_url="https://www.suse.com/security/cve/CVE-2019-5763/" source="CVE"/>
		<reference ref_id="CVE-2019-5764" ref_url="https://www.suse.com/security/cve/CVE-2019-5764/" source="CVE"/>
		<reference ref_id="CVE-2019-5765" ref_url="https://www.suse.com/security/cve/CVE-2019-5765/" source="CVE"/>
		<reference ref_id="CVE-2019-5766" ref_url="https://www.suse.com/security/cve/CVE-2019-5766/" source="CVE"/>
		<reference ref_id="CVE-2019-5767" ref_url="https://www.suse.com/security/cve/CVE-2019-5767/" source="CVE"/>
		<reference ref_id="CVE-2019-5768" ref_url="https://www.suse.com/security/cve/CVE-2019-5768/" source="CVE"/>
		<reference ref_id="CVE-2019-5769" ref_url="https://www.suse.com/security/cve/CVE-2019-5769/" source="CVE"/>
		<reference ref_id="CVE-2019-5770" ref_url="https://www.suse.com/security/cve/CVE-2019-5770/" source="CVE"/>
		<reference ref_id="CVE-2019-5771" ref_url="https://www.suse.com/security/cve/CVE-2019-5771/" source="CVE"/>
		<reference ref_id="CVE-2019-5772" ref_url="https://www.suse.com/security/cve/CVE-2019-5772/" source="CVE"/>
		<reference ref_id="CVE-2019-5773" ref_url="https://www.suse.com/security/cve/CVE-2019-5773/" source="CVE"/>
		<reference ref_id="CVE-2019-5774" ref_url="https://www.suse.com/security/cve/CVE-2019-5774/" source="CVE"/>
		<reference ref_id="CVE-2019-5775" ref_url="https://www.suse.com/security/cve/CVE-2019-5775/" source="CVE"/>
		<reference ref_id="CVE-2019-5776" ref_url="https://www.suse.com/security/cve/CVE-2019-5776/" source="CVE"/>
		<reference ref_id="CVE-2019-5777" ref_url="https://www.suse.com/security/cve/CVE-2019-5777/" source="CVE"/>
		<reference ref_id="CVE-2019-5778" ref_url="https://www.suse.com/security/cve/CVE-2019-5778/" source="CVE"/>
		<reference ref_id="CVE-2019-5779" ref_url="https://www.suse.com/security/cve/CVE-2019-5779/" source="CVE"/>
		<reference ref_id="CVE-2019-5780" ref_url="https://www.suse.com/security/cve/CVE-2019-5780/" source="CVE"/>
		<reference ref_id="CVE-2019-5781" ref_url="https://www.suse.com/security/cve/CVE-2019-5781/" source="CVE"/>
		<reference ref_id="CVE-2019-5782" ref_url="https://www.suse.com/security/cve/CVE-2019-5782/" source="CVE"/>
		<reference ref_id="CVE-2019-5784" ref_url="https://www.suse.com/security/cve/CVE-2019-5784/" source="CVE"/>
		<reference ref_id="CVE-2019-5786" ref_url="https://www.suse.com/security/cve/CVE-2019-5786/" source="CVE"/>
		<reference ref_id="CVE-2019-5787" ref_url="https://www.suse.com/security/cve/CVE-2019-5787/" source="CVE"/>
		<reference ref_id="CVE-2019-5788" ref_url="https://www.suse.com/security/cve/CVE-2019-5788/" source="CVE"/>
		<reference ref_id="CVE-2019-5789" ref_url="https://www.suse.com/security/cve/CVE-2019-5789/" source="CVE"/>
		<reference ref_id="CVE-2019-5790" ref_url="https://www.suse.com/security/cve/CVE-2019-5790/" source="CVE"/>
		<reference ref_id="CVE-2019-5791" ref_url="https://www.suse.com/security/cve/CVE-2019-5791/" source="CVE"/>
		<reference ref_id="CVE-2019-5792" ref_url="https://www.suse.com/security/cve/CVE-2019-5792/" source="CVE"/>
		<reference ref_id="CVE-2019-5793" ref_url="https://www.suse.com/security/cve/CVE-2019-5793/" source="CVE"/>
		<reference ref_id="CVE-2019-5794" ref_url="https://www.suse.com/security/cve/CVE-2019-5794/" source="CVE"/>
		<reference ref_id="CVE-2019-5795" ref_url="https://www.suse.com/security/cve/CVE-2019-5795/" source="CVE"/>
		<reference ref_id="CVE-2019-5796" ref_url="https://www.suse.com/security/cve/CVE-2019-5796/" source="CVE"/>
		<reference ref_id="CVE-2019-5797" ref_url="https://www.suse.com/security/cve/CVE-2019-5797/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-5799" ref_url="https://www.suse.com/security/cve/CVE-2019-5799/" source="CVE"/>
		<reference ref_id="CVE-2019-5800" ref_url="https://www.suse.com/security/cve/CVE-2019-5800/" source="CVE"/>
		<reference ref_id="CVE-2019-5801" ref_url="https://www.suse.com/security/cve/CVE-2019-5801/" source="CVE"/>
		<reference ref_id="CVE-2019-5802" ref_url="https://www.suse.com/security/cve/CVE-2019-5802/" source="CVE"/>
		<reference ref_id="CVE-2019-5803" ref_url="https://www.suse.com/security/cve/CVE-2019-5803/" source="CVE"/>
		<reference ref_id="CVE-2019-5804" ref_url="https://www.suse.com/security/cve/CVE-2019-5804/" source="CVE"/>
		<reference ref_id="CVE-2019-5805" ref_url="https://www.suse.com/security/cve/CVE-2019-5805/" source="CVE"/>
		<reference ref_id="CVE-2019-5806" ref_url="https://www.suse.com/security/cve/CVE-2019-5806/" source="CVE"/>
		<reference ref_id="CVE-2019-5807" ref_url="https://www.suse.com/security/cve/CVE-2019-5807/" source="CVE"/>
		<reference ref_id="CVE-2019-5808" ref_url="https://www.suse.com/security/cve/CVE-2019-5808/" source="CVE"/>
		<reference ref_id="CVE-2019-5809" ref_url="https://www.suse.com/security/cve/CVE-2019-5809/" source="CVE"/>
		<reference ref_id="CVE-2019-5810" ref_url="https://www.suse.com/security/cve/CVE-2019-5810/" source="CVE"/>
		<reference ref_id="CVE-2019-5811" ref_url="https://www.suse.com/security/cve/CVE-2019-5811/" source="CVE"/>
		<reference ref_id="CVE-2019-5812" ref_url="https://www.suse.com/security/cve/CVE-2019-5812/" source="CVE"/>
		<reference ref_id="CVE-2019-5813" ref_url="https://www.suse.com/security/cve/CVE-2019-5813/" source="CVE"/>
		<reference ref_id="CVE-2019-5814" ref_url="https://www.suse.com/security/cve/CVE-2019-5814/" source="CVE"/>
		<reference ref_id="CVE-2019-5815" ref_url="https://www.suse.com/security/cve/CVE-2019-5815/" source="CVE"/>
		<reference ref_id="CVE-2019-5816" ref_url="https://www.suse.com/security/cve/CVE-2019-5816/" source="CVE"/>
		<reference ref_id="CVE-2019-5817" ref_url="https://www.suse.com/security/cve/CVE-2019-5817/" source="CVE"/>
		<reference ref_id="CVE-2019-5818" ref_url="https://www.suse.com/security/cve/CVE-2019-5818/" source="CVE"/>
		<reference ref_id="CVE-2019-5819" ref_url="https://www.suse.com/security/cve/CVE-2019-5819/" source="CVE"/>
		<reference ref_id="CVE-2019-5820" ref_url="https://www.suse.com/security/cve/CVE-2019-5820/" source="CVE"/>
		<reference ref_id="CVE-2019-5821" ref_url="https://www.suse.com/security/cve/CVE-2019-5821/" source="CVE"/>
		<reference ref_id="CVE-2019-5822" ref_url="https://www.suse.com/security/cve/CVE-2019-5822/" source="CVE"/>
		<reference ref_id="CVE-2019-5823" ref_url="https://www.suse.com/security/cve/CVE-2019-5823/" source="CVE"/>
		<reference ref_id="CVE-2019-5824" ref_url="https://www.suse.com/security/cve/CVE-2019-5824/" source="CVE"/>
		<reference ref_id="CVE-2019-5827" ref_url="https://www.suse.com/security/cve/CVE-2019-5827/" source="CVE"/>
		<reference ref_id="CVE-2019-5828" ref_url="https://www.suse.com/security/cve/CVE-2019-5828/" source="CVE"/>
		<reference ref_id="CVE-2019-5829" ref_url="https://www.suse.com/security/cve/CVE-2019-5829/" source="CVE"/>
		<reference ref_id="CVE-2019-5830" ref_url="https://www.suse.com/security/cve/CVE-2019-5830/" source="CVE"/>
		<reference ref_id="CVE-2019-5831" ref_url="https://www.suse.com/security/cve/CVE-2019-5831/" source="CVE"/>
		<reference ref_id="CVE-2019-5832" ref_url="https://www.suse.com/security/cve/CVE-2019-5832/" source="CVE"/>
		<reference ref_id="CVE-2019-5833" ref_url="https://www.suse.com/security/cve/CVE-2019-5833/" source="CVE"/>
		<reference ref_id="CVE-2019-5834" ref_url="https://www.suse.com/security/cve/CVE-2019-5834/" source="CVE"/>
		<reference ref_id="CVE-2019-5835" ref_url="https://www.suse.com/security/cve/CVE-2019-5835/" source="CVE"/>
		<reference ref_id="CVE-2019-5836" ref_url="https://www.suse.com/security/cve/CVE-2019-5836/" source="CVE"/>
		<reference ref_id="CVE-2019-5837" ref_url="https://www.suse.com/security/cve/CVE-2019-5837/" source="CVE"/>
		<reference ref_id="CVE-2019-5838" ref_url="https://www.suse.com/security/cve/CVE-2019-5838/" source="CVE"/>
		<reference ref_id="CVE-2019-5839" ref_url="https://www.suse.com/security/cve/CVE-2019-5839/" source="CVE"/>
		<reference ref_id="CVE-2019-5840" ref_url="https://www.suse.com/security/cve/CVE-2019-5840/" source="CVE"/>
		<reference ref_id="CVE-2019-5842" ref_url="https://www.suse.com/security/cve/CVE-2019-5842/" source="CVE"/>
		<reference ref_id="CVE-2019-5844" ref_url="https://www.suse.com/security/cve/CVE-2019-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-5847" ref_url="https://www.suse.com/security/cve/CVE-2019-5847/" source="CVE"/>
		<reference ref_id="CVE-2019-5848" ref_url="https://www.suse.com/security/cve/CVE-2019-5848/" source="CVE"/>
		<reference ref_id="CVE-2019-5850" ref_url="https://www.suse.com/security/cve/CVE-2019-5850/" source="CVE"/>
		<reference ref_id="CVE-2019-5851" ref_url="https://www.suse.com/security/cve/CVE-2019-5851/" source="CVE"/>
		<reference ref_id="CVE-2019-5852" ref_url="https://www.suse.com/security/cve/CVE-2019-5852/" source="CVE"/>
		<reference ref_id="CVE-2019-5853" ref_url="https://www.suse.com/security/cve/CVE-2019-5853/" source="CVE"/>
		<reference ref_id="CVE-2019-5854" ref_url="https://www.suse.com/security/cve/CVE-2019-5854/" source="CVE"/>
		<reference ref_id="CVE-2019-5855" ref_url="https://www.suse.com/security/cve/CVE-2019-5855/" source="CVE"/>
		<reference ref_id="CVE-2019-5856" ref_url="https://www.suse.com/security/cve/CVE-2019-5856/" source="CVE"/>
		<reference ref_id="CVE-2019-5857" ref_url="https://www.suse.com/security/cve/CVE-2019-5857/" source="CVE"/>
		<reference ref_id="CVE-2019-5858" ref_url="https://www.suse.com/security/cve/CVE-2019-5858/" source="CVE"/>
		<reference ref_id="CVE-2019-5859" ref_url="https://www.suse.com/security/cve/CVE-2019-5859/" source="CVE"/>
		<reference ref_id="CVE-2019-5860" ref_url="https://www.suse.com/security/cve/CVE-2019-5860/" source="CVE"/>
		<reference ref_id="CVE-2019-5861" ref_url="https://www.suse.com/security/cve/CVE-2019-5861/" source="CVE"/>
		<reference ref_id="CVE-2019-5862" ref_url="https://www.suse.com/security/cve/CVE-2019-5862/" source="CVE"/>
		<reference ref_id="CVE-2019-5863" ref_url="https://www.suse.com/security/cve/CVE-2019-5863/" source="CVE"/>
		<reference ref_id="CVE-2019-5864" ref_url="https://www.suse.com/security/cve/CVE-2019-5864/" source="CVE"/>
		<reference ref_id="CVE-2019-5865" ref_url="https://www.suse.com/security/cve/CVE-2019-5865/" source="CVE"/>
		<reference ref_id="CVE-2019-5867" ref_url="https://www.suse.com/security/cve/CVE-2019-5867/" source="CVE"/>
		<reference ref_id="CVE-2019-5868" ref_url="https://www.suse.com/security/cve/CVE-2019-5868/" source="CVE"/>
		<reference ref_id="CVE-2019-5869" ref_url="https://www.suse.com/security/cve/CVE-2019-5869/" source="CVE"/>
		<reference ref_id="CVE-2019-5870" ref_url="https://www.suse.com/security/cve/CVE-2019-5870/" source="CVE"/>
		<reference ref_id="CVE-2019-5871" ref_url="https://www.suse.com/security/cve/CVE-2019-5871/" source="CVE"/>
		<reference ref_id="CVE-2019-5872" ref_url="https://www.suse.com/security/cve/CVE-2019-5872/" source="CVE"/>
		<reference ref_id="CVE-2019-5874" ref_url="https://www.suse.com/security/cve/CVE-2019-5874/" source="CVE"/>
		<reference ref_id="CVE-2019-5875" ref_url="https://www.suse.com/security/cve/CVE-2019-5875/" source="CVE"/>
		<reference ref_id="CVE-2019-5876" ref_url="https://www.suse.com/security/cve/CVE-2019-5876/" source="CVE"/>
		<reference ref_id="CVE-2019-5877" ref_url="https://www.suse.com/security/cve/CVE-2019-5877/" source="CVE"/>
		<reference ref_id="CVE-2019-5878" ref_url="https://www.suse.com/security/cve/CVE-2019-5878/" source="CVE"/>
		<reference ref_id="CVE-2019-5879" ref_url="https://www.suse.com/security/cve/CVE-2019-5879/" source="CVE"/>
		<reference ref_id="CVE-2019-5880" ref_url="https://www.suse.com/security/cve/CVE-2019-5880/" source="CVE"/>
		<reference ref_id="CVE-2019-5881" ref_url="https://www.suse.com/security/cve/CVE-2019-5881/" source="CVE"/>
		<reference ref_id="CVE-2019-8075" ref_url="https://www.suse.com/security/cve/CVE-2019-8075/" source="CVE"/>
		<reference ref_id="CVE-2020-0561" ref_url="https://www.suse.com/security/cve/CVE-2020-0561/" source="CVE"/>
		<reference ref_id="CVE-2020-15959" ref_url="https://www.suse.com/security/cve/CVE-2020-15959/" source="CVE"/>
		<reference ref_id="CVE-2020-15960" ref_url="https://www.suse.com/security/cve/CVE-2020-15960/" source="CVE"/>
		<reference ref_id="CVE-2020-15961" ref_url="https://www.suse.com/security/cve/CVE-2020-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-15962" ref_url="https://www.suse.com/security/cve/CVE-2020-15962/" source="CVE"/>
		<reference ref_id="CVE-2020-15963" ref_url="https://www.suse.com/security/cve/CVE-2020-15963/" source="CVE"/>
		<reference ref_id="CVE-2020-15964" ref_url="https://www.suse.com/security/cve/CVE-2020-15964/" source="CVE"/>
		<reference ref_id="CVE-2020-15965" ref_url="https://www.suse.com/security/cve/CVE-2020-15965/" source="CVE"/>
		<reference ref_id="CVE-2020-15966" ref_url="https://www.suse.com/security/cve/CVE-2020-15966/" source="CVE"/>
		<reference ref_id="CVE-2020-15967" ref_url="https://www.suse.com/security/cve/CVE-2020-15967/" source="CVE"/>
		<reference ref_id="CVE-2020-15968" ref_url="https://www.suse.com/security/cve/CVE-2020-15968/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15970" ref_url="https://www.suse.com/security/cve/CVE-2020-15970/" source="CVE"/>
		<reference ref_id="CVE-2020-15971" ref_url="https://www.suse.com/security/cve/CVE-2020-15971/" source="CVE"/>
		<reference ref_id="CVE-2020-15972" ref_url="https://www.suse.com/security/cve/CVE-2020-15972/" source="CVE"/>
		<reference ref_id="CVE-2020-15973" ref_url="https://www.suse.com/security/cve/CVE-2020-15973/" source="CVE"/>
		<reference ref_id="CVE-2020-15974" ref_url="https://www.suse.com/security/cve/CVE-2020-15974/" source="CVE"/>
		<reference ref_id="CVE-2020-15975" ref_url="https://www.suse.com/security/cve/CVE-2020-15975/" source="CVE"/>
		<reference ref_id="CVE-2020-15976" ref_url="https://www.suse.com/security/cve/CVE-2020-15976/" source="CVE"/>
		<reference ref_id="CVE-2020-15977" ref_url="https://www.suse.com/security/cve/CVE-2020-15977/" source="CVE"/>
		<reference ref_id="CVE-2020-15978" ref_url="https://www.suse.com/security/cve/CVE-2020-15978/" source="CVE"/>
		<reference ref_id="CVE-2020-15979" ref_url="https://www.suse.com/security/cve/CVE-2020-15979/" source="CVE"/>
		<reference ref_id="CVE-2020-15980" ref_url="https://www.suse.com/security/cve/CVE-2020-15980/" source="CVE"/>
		<reference ref_id="CVE-2020-15981" ref_url="https://www.suse.com/security/cve/CVE-2020-15981/" source="CVE"/>
		<reference ref_id="CVE-2020-15982" ref_url="https://www.suse.com/security/cve/CVE-2020-15982/" source="CVE"/>
		<reference ref_id="CVE-2020-15983" ref_url="https://www.suse.com/security/cve/CVE-2020-15983/" source="CVE"/>
		<reference ref_id="CVE-2020-15984" ref_url="https://www.suse.com/security/cve/CVE-2020-15984/" source="CVE"/>
		<reference ref_id="CVE-2020-15985" ref_url="https://www.suse.com/security/cve/CVE-2020-15985/" source="CVE"/>
		<reference ref_id="CVE-2020-15986" ref_url="https://www.suse.com/security/cve/CVE-2020-15986/" source="CVE"/>
		<reference ref_id="CVE-2020-15987" ref_url="https://www.suse.com/security/cve/CVE-2020-15987/" source="CVE"/>
		<reference ref_id="CVE-2020-15988" ref_url="https://www.suse.com/security/cve/CVE-2020-15988/" source="CVE"/>
		<reference ref_id="CVE-2020-15989" ref_url="https://www.suse.com/security/cve/CVE-2020-15989/" source="CVE"/>
		<reference ref_id="CVE-2020-15990" ref_url="https://www.suse.com/security/cve/CVE-2020-15990/" source="CVE"/>
		<reference ref_id="CVE-2020-15991" ref_url="https://www.suse.com/security/cve/CVE-2020-15991/" source="CVE"/>
		<reference ref_id="CVE-2020-15992" ref_url="https://www.suse.com/security/cve/CVE-2020-15992/" source="CVE"/>
		<reference ref_id="CVE-2020-15995" ref_url="https://www.suse.com/security/cve/CVE-2020-15995/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16000" ref_url="https://www.suse.com/security/cve/CVE-2020-16000/" source="CVE"/>
		<reference ref_id="CVE-2020-16001" ref_url="https://www.suse.com/security/cve/CVE-2020-16001/" source="CVE"/>
		<reference ref_id="CVE-2020-16002" ref_url="https://www.suse.com/security/cve/CVE-2020-16002/" source="CVE"/>
		<reference ref_id="CVE-2020-16003" ref_url="https://www.suse.com/security/cve/CVE-2020-16003/" source="CVE"/>
		<reference ref_id="CVE-2020-16004" ref_url="https://www.suse.com/security/cve/CVE-2020-16004/" source="CVE"/>
		<reference ref_id="CVE-2020-16005" ref_url="https://www.suse.com/security/cve/CVE-2020-16005/" source="CVE"/>
		<reference ref_id="CVE-2020-16006" ref_url="https://www.suse.com/security/cve/CVE-2020-16006/" source="CVE"/>
		<reference ref_id="CVE-2020-16007" ref_url="https://www.suse.com/security/cve/CVE-2020-16007/" source="CVE"/>
		<reference ref_id="CVE-2020-16008" ref_url="https://www.suse.com/security/cve/CVE-2020-16008/" source="CVE"/>
		<reference ref_id="CVE-2020-16009" ref_url="https://www.suse.com/security/cve/CVE-2020-16009/" source="CVE"/>
		<reference ref_id="CVE-2020-16011" ref_url="https://www.suse.com/security/cve/CVE-2020-16011/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16013" ref_url="https://www.suse.com/security/cve/CVE-2020-16013/" source="CVE"/>
		<reference ref_id="CVE-2020-16014" ref_url="https://www.suse.com/security/cve/CVE-2020-16014/" source="CVE"/>
		<reference ref_id="CVE-2020-16015" ref_url="https://www.suse.com/security/cve/CVE-2020-16015/" source="CVE"/>
		<reference ref_id="CVE-2020-16016" ref_url="https://www.suse.com/security/cve/CVE-2020-16016/" source="CVE"/>
		<reference ref_id="CVE-2020-16017" ref_url="https://www.suse.com/security/cve/CVE-2020-16017/" source="CVE"/>
		<reference ref_id="CVE-2020-16018" ref_url="https://www.suse.com/security/cve/CVE-2020-16018/" source="CVE"/>
		<reference ref_id="CVE-2020-16019" ref_url="https://www.suse.com/security/cve/CVE-2020-16019/" source="CVE"/>
		<reference ref_id="CVE-2020-16020" ref_url="https://www.suse.com/security/cve/CVE-2020-16020/" source="CVE"/>
		<reference ref_id="CVE-2020-16021" ref_url="https://www.suse.com/security/cve/CVE-2020-16021/" source="CVE"/>
		<reference ref_id="CVE-2020-16022" ref_url="https://www.suse.com/security/cve/CVE-2020-16022/" source="CVE"/>
		<reference ref_id="CVE-2020-16023" ref_url="https://www.suse.com/security/cve/CVE-2020-16023/" source="CVE"/>
		<reference ref_id="CVE-2020-16024" ref_url="https://www.suse.com/security/cve/CVE-2020-16024/" source="CVE"/>
		<reference ref_id="CVE-2020-16025" ref_url="https://www.suse.com/security/cve/CVE-2020-16025/" source="CVE"/>
		<reference ref_id="CVE-2020-16026" ref_url="https://www.suse.com/security/cve/CVE-2020-16026/" source="CVE"/>
		<reference ref_id="CVE-2020-16027" ref_url="https://www.suse.com/security/cve/CVE-2020-16027/" source="CVE"/>
		<reference ref_id="CVE-2020-16028" ref_url="https://www.suse.com/security/cve/CVE-2020-16028/" source="CVE"/>
		<reference ref_id="CVE-2020-16029" ref_url="https://www.suse.com/security/cve/CVE-2020-16029/" source="CVE"/>
		<reference ref_id="CVE-2020-16030" ref_url="https://www.suse.com/security/cve/CVE-2020-16030/" source="CVE"/>
		<reference ref_id="CVE-2020-16031" ref_url="https://www.suse.com/security/cve/CVE-2020-16031/" source="CVE"/>
		<reference ref_id="CVE-2020-16032" ref_url="https://www.suse.com/security/cve/CVE-2020-16032/" source="CVE"/>
		<reference ref_id="CVE-2020-16033" ref_url="https://www.suse.com/security/cve/CVE-2020-16033/" source="CVE"/>
		<reference ref_id="CVE-2020-16034" ref_url="https://www.suse.com/security/cve/CVE-2020-16034/" source="CVE"/>
		<reference ref_id="CVE-2020-16035" ref_url="https://www.suse.com/security/cve/CVE-2020-16035/" source="CVE"/>
		<reference ref_id="CVE-2020-16036" ref_url="https://www.suse.com/security/cve/CVE-2020-16036/" source="CVE"/>
		<reference ref_id="CVE-2020-16037" ref_url="https://www.suse.com/security/cve/CVE-2020-16037/" source="CVE"/>
		<reference ref_id="CVE-2020-16038" ref_url="https://www.suse.com/security/cve/CVE-2020-16038/" source="CVE"/>
		<reference ref_id="CVE-2020-16039" ref_url="https://www.suse.com/security/cve/CVE-2020-16039/" source="CVE"/>
		<reference ref_id="CVE-2020-16040" ref_url="https://www.suse.com/security/cve/CVE-2020-16040/" source="CVE"/>
		<reference ref_id="CVE-2020-16041" ref_url="https://www.suse.com/security/cve/CVE-2020-16041/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16043" ref_url="https://www.suse.com/security/cve/CVE-2020-16043/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-27844" ref_url="https://www.suse.com/security/cve/CVE-2020-27844/" source="CVE"/>
		<reference ref_id="CVE-2020-6377" ref_url="https://www.suse.com/security/cve/CVE-2020-6377/" source="CVE"/>
		<reference ref_id="CVE-2020-6378" ref_url="https://www.suse.com/security/cve/CVE-2020-6378/" source="CVE"/>
		<reference ref_id="CVE-2020-6379" ref_url="https://www.suse.com/security/cve/CVE-2020-6379/" source="CVE"/>
		<reference ref_id="CVE-2020-6380" ref_url="https://www.suse.com/security/cve/CVE-2020-6380/" source="CVE"/>
		<reference ref_id="CVE-2020-6381" ref_url="https://www.suse.com/security/cve/CVE-2020-6381/" source="CVE"/>
		<reference ref_id="CVE-2020-6382" ref_url="https://www.suse.com/security/cve/CVE-2020-6382/" source="CVE"/>
		<reference ref_id="CVE-2020-6385" ref_url="https://www.suse.com/security/cve/CVE-2020-6385/" source="CVE"/>
		<reference ref_id="CVE-2020-6387" ref_url="https://www.suse.com/security/cve/CVE-2020-6387/" source="CVE"/>
		<reference ref_id="CVE-2020-6388" ref_url="https://www.suse.com/security/cve/CVE-2020-6388/" source="CVE"/>
		<reference ref_id="CVE-2020-6389" ref_url="https://www.suse.com/security/cve/CVE-2020-6389/" source="CVE"/>
		<reference ref_id="CVE-2020-6390" ref_url="https://www.suse.com/security/cve/CVE-2020-6390/" source="CVE"/>
		<reference ref_id="CVE-2020-6391" ref_url="https://www.suse.com/security/cve/CVE-2020-6391/" source="CVE"/>
		<reference ref_id="CVE-2020-6392" ref_url="https://www.suse.com/security/cve/CVE-2020-6392/" source="CVE"/>
		<reference ref_id="CVE-2020-6393" ref_url="https://www.suse.com/security/cve/CVE-2020-6393/" source="CVE"/>
		<reference ref_id="CVE-2020-6394" ref_url="https://www.suse.com/security/cve/CVE-2020-6394/" source="CVE"/>
		<reference ref_id="CVE-2020-6395" ref_url="https://www.suse.com/security/cve/CVE-2020-6395/" source="CVE"/>
		<reference ref_id="CVE-2020-6396" ref_url="https://www.suse.com/security/cve/CVE-2020-6396/" source="CVE"/>
		<reference ref_id="CVE-2020-6397" ref_url="https://www.suse.com/security/cve/CVE-2020-6397/" source="CVE"/>
		<reference ref_id="CVE-2020-6398" ref_url="https://www.suse.com/security/cve/CVE-2020-6398/" source="CVE"/>
		<reference ref_id="CVE-2020-6399" ref_url="https://www.suse.com/security/cve/CVE-2020-6399/" source="CVE"/>
		<reference ref_id="CVE-2020-6400" ref_url="https://www.suse.com/security/cve/CVE-2020-6400/" source="CVE"/>
		<reference ref_id="CVE-2020-6401" ref_url="https://www.suse.com/security/cve/CVE-2020-6401/" source="CVE"/>
		<reference ref_id="CVE-2020-6402" ref_url="https://www.suse.com/security/cve/CVE-2020-6402/" source="CVE"/>
		<reference ref_id="CVE-2020-6403" ref_url="https://www.suse.com/security/cve/CVE-2020-6403/" source="CVE"/>
		<reference ref_id="CVE-2020-6404" ref_url="https://www.suse.com/security/cve/CVE-2020-6404/" source="CVE"/>
		<reference ref_id="CVE-2020-6405" ref_url="https://www.suse.com/security/cve/CVE-2020-6405/" source="CVE"/>
		<reference ref_id="CVE-2020-6406" ref_url="https://www.suse.com/security/cve/CVE-2020-6406/" source="CVE"/>
		<reference ref_id="CVE-2020-6407" ref_url="https://www.suse.com/security/cve/CVE-2020-6407/" source="CVE"/>
		<reference ref_id="CVE-2020-6408" ref_url="https://www.suse.com/security/cve/CVE-2020-6408/" source="CVE"/>
		<reference ref_id="CVE-2020-6409" ref_url="https://www.suse.com/security/cve/CVE-2020-6409/" source="CVE"/>
		<reference ref_id="CVE-2020-6410" ref_url="https://www.suse.com/security/cve/CVE-2020-6410/" source="CVE"/>
		<reference ref_id="CVE-2020-6411" ref_url="https://www.suse.com/security/cve/CVE-2020-6411/" source="CVE"/>
		<reference ref_id="CVE-2020-6412" ref_url="https://www.suse.com/security/cve/CVE-2020-6412/" source="CVE"/>
		<reference ref_id="CVE-2020-6413" ref_url="https://www.suse.com/security/cve/CVE-2020-6413/" source="CVE"/>
		<reference ref_id="CVE-2020-6414" ref_url="https://www.suse.com/security/cve/CVE-2020-6414/" source="CVE"/>
		<reference ref_id="CVE-2020-6415" ref_url="https://www.suse.com/security/cve/CVE-2020-6415/" source="CVE"/>
		<reference ref_id="CVE-2020-6416" ref_url="https://www.suse.com/security/cve/CVE-2020-6416/" source="CVE"/>
		<reference ref_id="CVE-2020-6417" ref_url="https://www.suse.com/security/cve/CVE-2020-6417/" source="CVE"/>
		<reference ref_id="CVE-2020-6418" ref_url="https://www.suse.com/security/cve/CVE-2020-6418/" source="CVE"/>
		<reference ref_id="CVE-2020-6420" ref_url="https://www.suse.com/security/cve/CVE-2020-6420/" source="CVE"/>
		<reference ref_id="CVE-2020-6422" ref_url="https://www.suse.com/security/cve/CVE-2020-6422/" source="CVE"/>
		<reference ref_id="CVE-2020-6423" ref_url="https://www.suse.com/security/cve/CVE-2020-6423/" source="CVE"/>
		<reference ref_id="CVE-2020-6424" ref_url="https://www.suse.com/security/cve/CVE-2020-6424/" source="CVE"/>
		<reference ref_id="CVE-2020-6425" ref_url="https://www.suse.com/security/cve/CVE-2020-6425/" source="CVE"/>
		<reference ref_id="CVE-2020-6426" ref_url="https://www.suse.com/security/cve/CVE-2020-6426/" source="CVE"/>
		<reference ref_id="CVE-2020-6427" ref_url="https://www.suse.com/security/cve/CVE-2020-6427/" source="CVE"/>
		<reference ref_id="CVE-2020-6428" ref_url="https://www.suse.com/security/cve/CVE-2020-6428/" source="CVE"/>
		<reference ref_id="CVE-2020-6429" ref_url="https://www.suse.com/security/cve/CVE-2020-6429/" source="CVE"/>
		<reference ref_id="CVE-2020-6430" ref_url="https://www.suse.com/security/cve/CVE-2020-6430/" source="CVE"/>
		<reference ref_id="CVE-2020-6431" ref_url="https://www.suse.com/security/cve/CVE-2020-6431/" source="CVE"/>
		<reference ref_id="CVE-2020-6432" ref_url="https://www.suse.com/security/cve/CVE-2020-6432/" source="CVE"/>
		<reference ref_id="CVE-2020-6433" ref_url="https://www.suse.com/security/cve/CVE-2020-6433/" source="CVE"/>
		<reference ref_id="CVE-2020-6434" ref_url="https://www.suse.com/security/cve/CVE-2020-6434/" source="CVE"/>
		<reference ref_id="CVE-2020-6435" ref_url="https://www.suse.com/security/cve/CVE-2020-6435/" source="CVE"/>
		<reference ref_id="CVE-2020-6436" ref_url="https://www.suse.com/security/cve/CVE-2020-6436/" source="CVE"/>
		<reference ref_id="CVE-2020-6437" ref_url="https://www.suse.com/security/cve/CVE-2020-6437/" source="CVE"/>
		<reference ref_id="CVE-2020-6438" ref_url="https://www.suse.com/security/cve/CVE-2020-6438/" source="CVE"/>
		<reference ref_id="CVE-2020-6439" ref_url="https://www.suse.com/security/cve/CVE-2020-6439/" source="CVE"/>
		<reference ref_id="CVE-2020-6440" ref_url="https://www.suse.com/security/cve/CVE-2020-6440/" source="CVE"/>
		<reference ref_id="CVE-2020-6441" ref_url="https://www.suse.com/security/cve/CVE-2020-6441/" source="CVE"/>
		<reference ref_id="CVE-2020-6442" ref_url="https://www.suse.com/security/cve/CVE-2020-6442/" source="CVE"/>
		<reference ref_id="CVE-2020-6443" ref_url="https://www.suse.com/security/cve/CVE-2020-6443/" source="CVE"/>
		<reference ref_id="CVE-2020-6444" ref_url="https://www.suse.com/security/cve/CVE-2020-6444/" source="CVE"/>
		<reference ref_id="CVE-2020-6445" ref_url="https://www.suse.com/security/cve/CVE-2020-6445/" source="CVE"/>
		<reference ref_id="CVE-2020-6446" ref_url="https://www.suse.com/security/cve/CVE-2020-6446/" source="CVE"/>
		<reference ref_id="CVE-2020-6447" ref_url="https://www.suse.com/security/cve/CVE-2020-6447/" source="CVE"/>
		<reference ref_id="CVE-2020-6448" ref_url="https://www.suse.com/security/cve/CVE-2020-6448/" source="CVE"/>
		<reference ref_id="CVE-2020-6449" ref_url="https://www.suse.com/security/cve/CVE-2020-6449/" source="CVE"/>
		<reference ref_id="CVE-2020-6450" ref_url="https://www.suse.com/security/cve/CVE-2020-6450/" source="CVE"/>
		<reference ref_id="CVE-2020-6451" ref_url="https://www.suse.com/security/cve/CVE-2020-6451/" source="CVE"/>
		<reference ref_id="CVE-2020-6452" ref_url="https://www.suse.com/security/cve/CVE-2020-6452/" source="CVE"/>
		<reference ref_id="CVE-2020-6454" ref_url="https://www.suse.com/security/cve/CVE-2020-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-6455" ref_url="https://www.suse.com/security/cve/CVE-2020-6455/" source="CVE"/>
		<reference ref_id="CVE-2020-6456" ref_url="https://www.suse.com/security/cve/CVE-2020-6456/" source="CVE"/>
		<reference ref_id="CVE-2020-6457" ref_url="https://www.suse.com/security/cve/CVE-2020-6457/" source="CVE"/>
		<reference ref_id="CVE-2020-6458" ref_url="https://www.suse.com/security/cve/CVE-2020-6458/" source="CVE"/>
		<reference ref_id="CVE-2020-6459" ref_url="https://www.suse.com/security/cve/CVE-2020-6459/" source="CVE"/>
		<reference ref_id="CVE-2020-6460" ref_url="https://www.suse.com/security/cve/CVE-2020-6460/" source="CVE"/>
		<reference ref_id="CVE-2020-6462" ref_url="https://www.suse.com/security/cve/CVE-2020-6462/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6464" ref_url="https://www.suse.com/security/cve/CVE-2020-6464/" source="CVE"/>
		<reference ref_id="CVE-2020-6465" ref_url="https://www.suse.com/security/cve/CVE-2020-6465/" source="CVE"/>
		<reference ref_id="CVE-2020-6466" ref_url="https://www.suse.com/security/cve/CVE-2020-6466/" source="CVE"/>
		<reference ref_id="CVE-2020-6467" ref_url="https://www.suse.com/security/cve/CVE-2020-6467/" source="CVE"/>
		<reference ref_id="CVE-2020-6468" ref_url="https://www.suse.com/security/cve/CVE-2020-6468/" source="CVE"/>
		<reference ref_id="CVE-2020-6469" ref_url="https://www.suse.com/security/cve/CVE-2020-6469/" source="CVE"/>
		<reference ref_id="CVE-2020-6470" ref_url="https://www.suse.com/security/cve/CVE-2020-6470/" source="CVE"/>
		<reference ref_id="CVE-2020-6471" ref_url="https://www.suse.com/security/cve/CVE-2020-6471/" source="CVE"/>
		<reference ref_id="CVE-2020-6472" ref_url="https://www.suse.com/security/cve/CVE-2020-6472/" source="CVE"/>
		<reference ref_id="CVE-2020-6473" ref_url="https://www.suse.com/security/cve/CVE-2020-6473/" source="CVE"/>
		<reference ref_id="CVE-2020-6474" ref_url="https://www.suse.com/security/cve/CVE-2020-6474/" source="CVE"/>
		<reference ref_id="CVE-2020-6475" ref_url="https://www.suse.com/security/cve/CVE-2020-6475/" source="CVE"/>
		<reference ref_id="CVE-2020-6476" ref_url="https://www.suse.com/security/cve/CVE-2020-6476/" source="CVE"/>
		<reference ref_id="CVE-2020-6477" ref_url="https://www.suse.com/security/cve/CVE-2020-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-6478" ref_url="https://www.suse.com/security/cve/CVE-2020-6478/" source="CVE"/>
		<reference ref_id="CVE-2020-6479" ref_url="https://www.suse.com/security/cve/CVE-2020-6479/" source="CVE"/>
		<reference ref_id="CVE-2020-6480" ref_url="https://www.suse.com/security/cve/CVE-2020-6480/" source="CVE"/>
		<reference ref_id="CVE-2020-6481" ref_url="https://www.suse.com/security/cve/CVE-2020-6481/" source="CVE"/>
		<reference ref_id="CVE-2020-6482" ref_url="https://www.suse.com/security/cve/CVE-2020-6482/" source="CVE"/>
		<reference ref_id="CVE-2020-6483" ref_url="https://www.suse.com/security/cve/CVE-2020-6483/" source="CVE"/>
		<reference ref_id="CVE-2020-6484" ref_url="https://www.suse.com/security/cve/CVE-2020-6484/" source="CVE"/>
		<reference ref_id="CVE-2020-6485" ref_url="https://www.suse.com/security/cve/CVE-2020-6485/" source="CVE"/>
		<reference ref_id="CVE-2020-6486" ref_url="https://www.suse.com/security/cve/CVE-2020-6486/" source="CVE"/>
		<reference ref_id="CVE-2020-6487" ref_url="https://www.suse.com/security/cve/CVE-2020-6487/" source="CVE"/>
		<reference ref_id="CVE-2020-6488" ref_url="https://www.suse.com/security/cve/CVE-2020-6488/" source="CVE"/>
		<reference ref_id="CVE-2020-6489" ref_url="https://www.suse.com/security/cve/CVE-2020-6489/" source="CVE"/>
		<reference ref_id="CVE-2020-6490" ref_url="https://www.suse.com/security/cve/CVE-2020-6490/" source="CVE"/>
		<reference ref_id="CVE-2020-6491" ref_url="https://www.suse.com/security/cve/CVE-2020-6491/" source="CVE"/>
		<reference ref_id="CVE-2020-6493" ref_url="https://www.suse.com/security/cve/CVE-2020-6493/" source="CVE"/>
		<reference ref_id="CVE-2020-6494" ref_url="https://www.suse.com/security/cve/CVE-2020-6494/" source="CVE"/>
		<reference ref_id="CVE-2020-6495" ref_url="https://www.suse.com/security/cve/CVE-2020-6495/" source="CVE"/>
		<reference ref_id="CVE-2020-6496" ref_url="https://www.suse.com/security/cve/CVE-2020-6496/" source="CVE"/>
		<reference ref_id="CVE-2020-6505" ref_url="https://www.suse.com/security/cve/CVE-2020-6505/" source="CVE"/>
		<reference ref_id="CVE-2020-6506" ref_url="https://www.suse.com/security/cve/CVE-2020-6506/" source="CVE"/>
		<reference ref_id="CVE-2020-6507" ref_url="https://www.suse.com/security/cve/CVE-2020-6507/" source="CVE"/>
		<reference ref_id="CVE-2020-6509" ref_url="https://www.suse.com/security/cve/CVE-2020-6509/" source="CVE"/>
		<reference ref_id="CVE-2020-6510" ref_url="https://www.suse.com/security/cve/CVE-2020-6510/" source="CVE"/>
		<reference ref_id="CVE-2020-6511" ref_url="https://www.suse.com/security/cve/CVE-2020-6511/" source="CVE"/>
		<reference ref_id="CVE-2020-6512" ref_url="https://www.suse.com/security/cve/CVE-2020-6512/" source="CVE"/>
		<reference ref_id="CVE-2020-6513" ref_url="https://www.suse.com/security/cve/CVE-2020-6513/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6515" ref_url="https://www.suse.com/security/cve/CVE-2020-6515/" source="CVE"/>
		<reference ref_id="CVE-2020-6516" ref_url="https://www.suse.com/security/cve/CVE-2020-6516/" source="CVE"/>
		<reference ref_id="CVE-2020-6517" ref_url="https://www.suse.com/security/cve/CVE-2020-6517/" source="CVE"/>
		<reference ref_id="CVE-2020-6518" ref_url="https://www.suse.com/security/cve/CVE-2020-6518/" source="CVE"/>
		<reference ref_id="CVE-2020-6519" ref_url="https://www.suse.com/security/cve/CVE-2020-6519/" source="CVE"/>
		<reference ref_id="CVE-2020-6520" ref_url="https://www.suse.com/security/cve/CVE-2020-6520/" source="CVE"/>
		<reference ref_id="CVE-2020-6521" ref_url="https://www.suse.com/security/cve/CVE-2020-6521/" source="CVE"/>
		<reference ref_id="CVE-2020-6522" ref_url="https://www.suse.com/security/cve/CVE-2020-6522/" source="CVE"/>
		<reference ref_id="CVE-2020-6523" ref_url="https://www.suse.com/security/cve/CVE-2020-6523/" source="CVE"/>
		<reference ref_id="CVE-2020-6524" ref_url="https://www.suse.com/security/cve/CVE-2020-6524/" source="CVE"/>
		<reference ref_id="CVE-2020-6525" ref_url="https://www.suse.com/security/cve/CVE-2020-6525/" source="CVE"/>
		<reference ref_id="CVE-2020-6526" ref_url="https://www.suse.com/security/cve/CVE-2020-6526/" source="CVE"/>
		<reference ref_id="CVE-2020-6527" ref_url="https://www.suse.com/security/cve/CVE-2020-6527/" source="CVE"/>
		<reference ref_id="CVE-2020-6528" ref_url="https://www.suse.com/security/cve/CVE-2020-6528/" source="CVE"/>
		<reference ref_id="CVE-2020-6529" ref_url="https://www.suse.com/security/cve/CVE-2020-6529/" source="CVE"/>
		<reference ref_id="CVE-2020-6530" ref_url="https://www.suse.com/security/cve/CVE-2020-6530/" source="CVE"/>
		<reference ref_id="CVE-2020-6531" ref_url="https://www.suse.com/security/cve/CVE-2020-6531/" source="CVE"/>
		<reference ref_id="CVE-2020-6532" ref_url="https://www.suse.com/security/cve/CVE-2020-6532/" source="CVE"/>
		<reference ref_id="CVE-2020-6533" ref_url="https://www.suse.com/security/cve/CVE-2020-6533/" source="CVE"/>
		<reference ref_id="CVE-2020-6534" ref_url="https://www.suse.com/security/cve/CVE-2020-6534/" source="CVE"/>
		<reference ref_id="CVE-2020-6535" ref_url="https://www.suse.com/security/cve/CVE-2020-6535/" source="CVE"/>
		<reference ref_id="CVE-2020-6536" ref_url="https://www.suse.com/security/cve/CVE-2020-6536/" source="CVE"/>
		<reference ref_id="CVE-2020-6537" ref_url="https://www.suse.com/security/cve/CVE-2020-6537/" source="CVE"/>
		<reference ref_id="CVE-2020-6538" ref_url="https://www.suse.com/security/cve/CVE-2020-6538/" source="CVE"/>
		<reference ref_id="CVE-2020-6539" ref_url="https://www.suse.com/security/cve/CVE-2020-6539/" source="CVE"/>
		<reference ref_id="CVE-2020-6540" ref_url="https://www.suse.com/security/cve/CVE-2020-6540/" source="CVE"/>
		<reference ref_id="CVE-2020-6541" ref_url="https://www.suse.com/security/cve/CVE-2020-6541/" source="CVE"/>
		<reference ref_id="CVE-2020-6542" ref_url="https://www.suse.com/security/cve/CVE-2020-6542/" source="CVE"/>
		<reference ref_id="CVE-2020-6543" ref_url="https://www.suse.com/security/cve/CVE-2020-6543/" source="CVE"/>
		<reference ref_id="CVE-2020-6544" ref_url="https://www.suse.com/security/cve/CVE-2020-6544/" source="CVE"/>
		<reference ref_id="CVE-2020-6545" ref_url="https://www.suse.com/security/cve/CVE-2020-6545/" source="CVE"/>
		<reference ref_id="CVE-2020-6546" ref_url="https://www.suse.com/security/cve/CVE-2020-6546/" source="CVE"/>
		<reference ref_id="CVE-2020-6547" ref_url="https://www.suse.com/security/cve/CVE-2020-6547/" source="CVE"/>
		<reference ref_id="CVE-2020-6548" ref_url="https://www.suse.com/security/cve/CVE-2020-6548/" source="CVE"/>
		<reference ref_id="CVE-2020-6549" ref_url="https://www.suse.com/security/cve/CVE-2020-6549/" source="CVE"/>
		<reference ref_id="CVE-2020-6550" ref_url="https://www.suse.com/security/cve/CVE-2020-6550/" source="CVE"/>
		<reference ref_id="CVE-2020-6551" ref_url="https://www.suse.com/security/cve/CVE-2020-6551/" source="CVE"/>
		<reference ref_id="CVE-2020-6552" ref_url="https://www.suse.com/security/cve/CVE-2020-6552/" source="CVE"/>
		<reference ref_id="CVE-2020-6553" ref_url="https://www.suse.com/security/cve/CVE-2020-6553/" source="CVE"/>
		<reference ref_id="CVE-2020-6554" ref_url="https://www.suse.com/security/cve/CVE-2020-6554/" source="CVE"/>
		<reference ref_id="CVE-2020-6555" ref_url="https://www.suse.com/security/cve/CVE-2020-6555/" source="CVE"/>
		<reference ref_id="CVE-2020-6556" ref_url="https://www.suse.com/security/cve/CVE-2020-6556/" source="CVE"/>
		<reference ref_id="CVE-2020-6557" ref_url="https://www.suse.com/security/cve/CVE-2020-6557/" source="CVE"/>
		<reference ref_id="CVE-2020-6558" ref_url="https://www.suse.com/security/cve/CVE-2020-6558/" source="CVE"/>
		<reference ref_id="CVE-2020-6559" ref_url="https://www.suse.com/security/cve/CVE-2020-6559/" source="CVE"/>
		<reference ref_id="CVE-2020-6560" ref_url="https://www.suse.com/security/cve/CVE-2020-6560/" source="CVE"/>
		<reference ref_id="CVE-2020-6561" ref_url="https://www.suse.com/security/cve/CVE-2020-6561/" source="CVE"/>
		<reference ref_id="CVE-2020-6562" ref_url="https://www.suse.com/security/cve/CVE-2020-6562/" source="CVE"/>
		<reference ref_id="CVE-2020-6563" ref_url="https://www.suse.com/security/cve/CVE-2020-6563/" source="CVE"/>
		<reference ref_id="CVE-2020-6564" ref_url="https://www.suse.com/security/cve/CVE-2020-6564/" source="CVE"/>
		<reference ref_id="CVE-2020-6565" ref_url="https://www.suse.com/security/cve/CVE-2020-6565/" source="CVE"/>
		<reference ref_id="CVE-2020-6566" ref_url="https://www.suse.com/security/cve/CVE-2020-6566/" source="CVE"/>
		<reference ref_id="CVE-2020-6567" ref_url="https://www.suse.com/security/cve/CVE-2020-6567/" source="CVE"/>
		<reference ref_id="CVE-2020-6568" ref_url="https://www.suse.com/security/cve/CVE-2020-6568/" source="CVE"/>
		<reference ref_id="CVE-2020-6569" ref_url="https://www.suse.com/security/cve/CVE-2020-6569/" source="CVE"/>
		<reference ref_id="CVE-2020-6570" ref_url="https://www.suse.com/security/cve/CVE-2020-6570/" source="CVE"/>
		<reference ref_id="CVE-2020-6571" ref_url="https://www.suse.com/security/cve/CVE-2020-6571/" source="CVE"/>
		<reference ref_id="CVE-2020-6573" ref_url="https://www.suse.com/security/cve/CVE-2020-6573/" source="CVE"/>
		<reference ref_id="CVE-2020-6574" ref_url="https://www.suse.com/security/cve/CVE-2020-6574/" source="CVE"/>
		<reference ref_id="CVE-2020-6575" ref_url="https://www.suse.com/security/cve/CVE-2020-6575/" source="CVE"/>
		<reference ref_id="CVE-2020-6576" ref_url="https://www.suse.com/security/cve/CVE-2020-6576/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-21106" ref_url="https://www.suse.com/security/cve/CVE-2021-21106/" source="CVE"/>
		<reference ref_id="CVE-2021-21107" ref_url="https://www.suse.com/security/cve/CVE-2021-21107/" source="CVE"/>
		<reference ref_id="CVE-2021-21108" ref_url="https://www.suse.com/security/cve/CVE-2021-21108/" source="CVE"/>
		<reference ref_id="CVE-2021-21109" ref_url="https://www.suse.com/security/cve/CVE-2021-21109/" source="CVE"/>
		<reference ref_id="CVE-2021-21110" ref_url="https://www.suse.com/security/cve/CVE-2021-21110/" source="CVE"/>
		<reference ref_id="CVE-2021-21111" ref_url="https://www.suse.com/security/cve/CVE-2021-21111/" source="CVE"/>
		<reference ref_id="CVE-2021-21112" ref_url="https://www.suse.com/security/cve/CVE-2021-21112/" source="CVE"/>
		<reference ref_id="CVE-2021-21113" ref_url="https://www.suse.com/security/cve/CVE-2021-21113/" source="CVE"/>
		<reference ref_id="CVE-2021-21114" ref_url="https://www.suse.com/security/cve/CVE-2021-21114/" source="CVE"/>
		<reference ref_id="CVE-2021-21115" ref_url="https://www.suse.com/security/cve/CVE-2021-21115/" source="CVE"/>
		<reference ref_id="CVE-2021-21116" ref_url="https://www.suse.com/security/cve/CVE-2021-21116/" source="CVE"/>
		<reference ref_id="CVE-2021-21117" ref_url="https://www.suse.com/security/cve/CVE-2021-21117/" source="CVE"/>
		<reference ref_id="CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118/" source="CVE"/>
		<reference ref_id="CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119/" source="CVE"/>
		<reference ref_id="CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120/" source="CVE"/>
		<reference ref_id="CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121/" source="CVE"/>
		<reference ref_id="CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122/" source="CVE"/>
		<reference ref_id="CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123/" source="CVE"/>
		<reference ref_id="CVE-2021-21124" ref_url="https://www.suse.com/security/cve/CVE-2021-21124/" source="CVE"/>
		<reference ref_id="CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125/" source="CVE"/>
		<reference ref_id="CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126/" source="CVE"/>
		<reference ref_id="CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127/" source="CVE"/>
		<reference ref_id="CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128/" source="CVE"/>
		<reference ref_id="CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129/" source="CVE"/>
		<reference ref_id="CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130/" source="CVE"/>
		<reference ref_id="CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131/" source="CVE"/>
		<reference ref_id="CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132/" source="CVE"/>
		<reference ref_id="CVE-2021-21133" ref_url="https://www.suse.com/security/cve/CVE-2021-21133/" source="CVE"/>
		<reference ref_id="CVE-2021-21134" ref_url="https://www.suse.com/security/cve/CVE-2021-21134/" source="CVE"/>
		<reference ref_id="CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135/" source="CVE"/>
		<reference ref_id="CVE-2021-21136" ref_url="https://www.suse.com/security/cve/CVE-2021-21136/" source="CVE"/>
		<reference ref_id="CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137/" source="CVE"/>
		<reference ref_id="CVE-2021-21138" ref_url="https://www.suse.com/security/cve/CVE-2021-21138/" source="CVE"/>
		<reference ref_id="CVE-2021-21139" ref_url="https://www.suse.com/security/cve/CVE-2021-21139/" source="CVE"/>
		<reference ref_id="CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140/" source="CVE"/>
		<reference ref_id="CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141/" source="CVE"/>
		<reference ref_id="CVE-2021-21142" ref_url="https://www.suse.com/security/cve/CVE-2021-21142/" source="CVE"/>
		<reference ref_id="CVE-2021-21143" ref_url="https://www.suse.com/security/cve/CVE-2021-21143/" source="CVE"/>
		<reference ref_id="CVE-2021-21144" ref_url="https://www.suse.com/security/cve/CVE-2021-21144/" source="CVE"/>
		<reference ref_id="CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145/" source="CVE"/>
		<reference ref_id="CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146/" source="CVE"/>
		<reference ref_id="CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149/" source="CVE"/>
		<reference ref_id="CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150/" source="CVE"/>
		<reference ref_id="CVE-2021-21151" ref_url="https://www.suse.com/security/cve/CVE-2021-21151/" source="CVE"/>
		<reference ref_id="CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152/" source="CVE"/>
		<reference ref_id="CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153/" source="CVE"/>
		<reference ref_id="CVE-2021-21154" ref_url="https://www.suse.com/security/cve/CVE-2021-21154/" source="CVE"/>
		<reference ref_id="CVE-2021-21155" ref_url="https://www.suse.com/security/cve/CVE-2021-21155/" source="CVE"/>
		<reference ref_id="CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156/" source="CVE"/>
		<reference ref_id="CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157/" source="CVE"/>
		<reference ref_id="CVE-2021-21159" ref_url="https://www.suse.com/security/cve/CVE-2021-21159/" source="CVE"/>
		<reference ref_id="CVE-2021-21160" ref_url="https://www.suse.com/security/cve/CVE-2021-21160/" source="CVE"/>
		<reference ref_id="CVE-2021-21161" ref_url="https://www.suse.com/security/cve/CVE-2021-21161/" source="CVE"/>
		<reference ref_id="CVE-2021-21162" ref_url="https://www.suse.com/security/cve/CVE-2021-21162/" source="CVE"/>
		<reference ref_id="CVE-2021-21163" ref_url="https://www.suse.com/security/cve/CVE-2021-21163/" source="CVE"/>
		<reference ref_id="CVE-2021-21164" ref_url="https://www.suse.com/security/cve/CVE-2021-21164/" source="CVE"/>
		<reference ref_id="CVE-2021-21165" ref_url="https://www.suse.com/security/cve/CVE-2021-21165/" source="CVE"/>
		<reference ref_id="CVE-2021-21166" ref_url="https://www.suse.com/security/cve/CVE-2021-21166/" source="CVE"/>
		<reference ref_id="CVE-2021-21167" ref_url="https://www.suse.com/security/cve/CVE-2021-21167/" source="CVE"/>
		<reference ref_id="CVE-2021-21168" ref_url="https://www.suse.com/security/cve/CVE-2021-21168/" source="CVE"/>
		<reference ref_id="CVE-2021-21169" ref_url="https://www.suse.com/security/cve/CVE-2021-21169/" source="CVE"/>
		<reference ref_id="CVE-2021-21170" ref_url="https://www.suse.com/security/cve/CVE-2021-21170/" source="CVE"/>
		<reference ref_id="CVE-2021-21171" ref_url="https://www.suse.com/security/cve/CVE-2021-21171/" source="CVE"/>
		<reference ref_id="CVE-2021-21172" ref_url="https://www.suse.com/security/cve/CVE-2021-21172/" source="CVE"/>
		<reference ref_id="CVE-2021-21173" ref_url="https://www.suse.com/security/cve/CVE-2021-21173/" source="CVE"/>
		<reference ref_id="CVE-2021-21174" ref_url="https://www.suse.com/security/cve/CVE-2021-21174/" source="CVE"/>
		<reference ref_id="CVE-2021-21175" ref_url="https://www.suse.com/security/cve/CVE-2021-21175/" source="CVE"/>
		<reference ref_id="CVE-2021-21176" ref_url="https://www.suse.com/security/cve/CVE-2021-21176/" source="CVE"/>
		<reference ref_id="CVE-2021-21177" ref_url="https://www.suse.com/security/cve/CVE-2021-21177/" source="CVE"/>
		<reference ref_id="CVE-2021-21178" ref_url="https://www.suse.com/security/cve/CVE-2021-21178/" source="CVE"/>
		<reference ref_id="CVE-2021-21179" ref_url="https://www.suse.com/security/cve/CVE-2021-21179/" source="CVE"/>
		<reference ref_id="CVE-2021-21180" ref_url="https://www.suse.com/security/cve/CVE-2021-21180/" source="CVE"/>
		<reference ref_id="CVE-2021-21181" ref_url="https://www.suse.com/security/cve/CVE-2021-21181/" source="CVE"/>
		<reference ref_id="CVE-2021-21182" ref_url="https://www.suse.com/security/cve/CVE-2021-21182/" source="CVE"/>
		<reference ref_id="CVE-2021-21183" ref_url="https://www.suse.com/security/cve/CVE-2021-21183/" source="CVE"/>
		<reference ref_id="CVE-2021-21184" ref_url="https://www.suse.com/security/cve/CVE-2021-21184/" source="CVE"/>
		<reference ref_id="CVE-2021-21185" ref_url="https://www.suse.com/security/cve/CVE-2021-21185/" source="CVE"/>
		<reference ref_id="CVE-2021-21186" ref_url="https://www.suse.com/security/cve/CVE-2021-21186/" source="CVE"/>
		<reference ref_id="CVE-2021-21187" ref_url="https://www.suse.com/security/cve/CVE-2021-21187/" source="CVE"/>
		<reference ref_id="CVE-2021-21188" ref_url="https://www.suse.com/security/cve/CVE-2021-21188/" source="CVE"/>
		<reference ref_id="CVE-2021-21189" ref_url="https://www.suse.com/security/cve/CVE-2021-21189/" source="CVE"/>
		<reference ref_id="CVE-2021-21190" ref_url="https://www.suse.com/security/cve/CVE-2021-21190/" source="CVE"/>
		<reference ref_id="CVE-2021-21191" ref_url="https://www.suse.com/security/cve/CVE-2021-21191/" source="CVE"/>
		<reference ref_id="CVE-2021-21192" ref_url="https://www.suse.com/security/cve/CVE-2021-21192/" source="CVE"/>
		<reference ref_id="CVE-2021-21193" ref_url="https://www.suse.com/security/cve/CVE-2021-21193/" source="CVE"/>
		<reference ref_id="CVE-2021-21194" ref_url="https://www.suse.com/security/cve/CVE-2021-21194/" source="CVE"/>
		<reference ref_id="CVE-2021-21195" ref_url="https://www.suse.com/security/cve/CVE-2021-21195/" source="CVE"/>
		<reference ref_id="CVE-2021-21196" ref_url="https://www.suse.com/security/cve/CVE-2021-21196/" source="CVE"/>
		<reference ref_id="CVE-2021-21197" ref_url="https://www.suse.com/security/cve/CVE-2021-21197/" source="CVE"/>
		<reference ref_id="CVE-2021-21198" ref_url="https://www.suse.com/security/cve/CVE-2021-21198/" source="CVE"/>
		<reference ref_id="CVE-2021-21199" ref_url="https://www.suse.com/security/cve/CVE-2021-21199/" source="CVE"/>
		<reference ref_id="CVE-2021-21201" ref_url="https://www.suse.com/security/cve/CVE-2021-21201/" source="CVE"/>
		<reference ref_id="CVE-2021-21202" ref_url="https://www.suse.com/security/cve/CVE-2021-21202/" source="CVE"/>
		<reference ref_id="CVE-2021-21203" ref_url="https://www.suse.com/security/cve/CVE-2021-21203/" source="CVE"/>
		<reference ref_id="CVE-2021-21204" ref_url="https://www.suse.com/security/cve/CVE-2021-21204/" source="CVE"/>
		<reference ref_id="CVE-2021-21205" ref_url="https://www.suse.com/security/cve/CVE-2021-21205/" source="CVE"/>
		<reference ref_id="CVE-2021-21206" ref_url="https://www.suse.com/security/cve/CVE-2021-21206/" source="CVE"/>
		<reference ref_id="CVE-2021-21207" ref_url="https://www.suse.com/security/cve/CVE-2021-21207/" source="CVE"/>
		<reference ref_id="CVE-2021-21208" ref_url="https://www.suse.com/security/cve/CVE-2021-21208/" source="CVE"/>
		<reference ref_id="CVE-2021-21209" ref_url="https://www.suse.com/security/cve/CVE-2021-21209/" source="CVE"/>
		<reference ref_id="CVE-2021-21210" ref_url="https://www.suse.com/security/cve/CVE-2021-21210/" source="CVE"/>
		<reference ref_id="CVE-2021-21211" ref_url="https://www.suse.com/security/cve/CVE-2021-21211/" source="CVE"/>
		<reference ref_id="CVE-2021-21212" ref_url="https://www.suse.com/security/cve/CVE-2021-21212/" source="CVE"/>
		<reference ref_id="CVE-2021-21213" ref_url="https://www.suse.com/security/cve/CVE-2021-21213/" source="CVE"/>
		<reference ref_id="CVE-2021-21214" ref_url="https://www.suse.com/security/cve/CVE-2021-21214/" source="CVE"/>
		<reference ref_id="CVE-2021-21215" ref_url="https://www.suse.com/security/cve/CVE-2021-21215/" source="CVE"/>
		<reference ref_id="CVE-2021-21216" ref_url="https://www.suse.com/security/cve/CVE-2021-21216/" source="CVE"/>
		<reference ref_id="CVE-2021-21217" ref_url="https://www.suse.com/security/cve/CVE-2021-21217/" source="CVE"/>
		<reference ref_id="CVE-2021-21218" ref_url="https://www.suse.com/security/cve/CVE-2021-21218/" source="CVE"/>
		<reference ref_id="CVE-2021-21219" ref_url="https://www.suse.com/security/cve/CVE-2021-21219/" source="CVE"/>
		<reference ref_id="CVE-2021-21220" ref_url="https://www.suse.com/security/cve/CVE-2021-21220/" source="CVE"/>
		<reference ref_id="CVE-2021-21221" ref_url="https://www.suse.com/security/cve/CVE-2021-21221/" source="CVE"/>
		<reference ref_id="CVE-2021-21222" ref_url="https://www.suse.com/security/cve/CVE-2021-21222/" source="CVE"/>
		<reference ref_id="CVE-2021-21223" ref_url="https://www.suse.com/security/cve/CVE-2021-21223/" source="CVE"/>
		<reference ref_id="CVE-2021-21224" ref_url="https://www.suse.com/security/cve/CVE-2021-21224/" source="CVE"/>
		<reference ref_id="CVE-2021-21225" ref_url="https://www.suse.com/security/cve/CVE-2021-21225/" source="CVE"/>
		<reference ref_id="CVE-2021-21226" ref_url="https://www.suse.com/security/cve/CVE-2021-21226/" source="CVE"/>
		<reference ref_id="CVE-2021-21227" ref_url="https://www.suse.com/security/cve/CVE-2021-21227/" source="CVE"/>
		<reference ref_id="CVE-2021-21228" ref_url="https://www.suse.com/security/cve/CVE-2021-21228/" source="CVE"/>
		<reference ref_id="CVE-2021-21229" ref_url="https://www.suse.com/security/cve/CVE-2021-21229/" source="CVE"/>
		<reference ref_id="CVE-2021-21230" ref_url="https://www.suse.com/security/cve/CVE-2021-21230/" source="CVE"/>
		<reference ref_id="CVE-2021-21231" ref_url="https://www.suse.com/security/cve/CVE-2021-21231/" source="CVE"/>
		<reference ref_id="CVE-2021-21232" ref_url="https://www.suse.com/security/cve/CVE-2021-21232/" source="CVE"/>
		<reference ref_id="CVE-2021-21233" ref_url="https://www.suse.com/security/cve/CVE-2021-21233/" source="CVE"/>
		<reference ref_id="CVE-2021-30506" ref_url="https://www.suse.com/security/cve/CVE-2021-30506/" source="CVE"/>
		<reference ref_id="CVE-2021-30507" ref_url="https://www.suse.com/security/cve/CVE-2021-30507/" source="CVE"/>
		<reference ref_id="CVE-2021-30508" ref_url="https://www.suse.com/security/cve/CVE-2021-30508/" source="CVE"/>
		<reference ref_id="CVE-2021-30509" ref_url="https://www.suse.com/security/cve/CVE-2021-30509/" source="CVE"/>
		<reference ref_id="CVE-2021-30510" ref_url="https://www.suse.com/security/cve/CVE-2021-30510/" source="CVE"/>
		<reference ref_id="CVE-2021-30511" ref_url="https://www.suse.com/security/cve/CVE-2021-30511/" source="CVE"/>
		<reference ref_id="CVE-2021-30512" ref_url="https://www.suse.com/security/cve/CVE-2021-30512/" source="CVE"/>
		<reference ref_id="CVE-2021-30513" ref_url="https://www.suse.com/security/cve/CVE-2021-30513/" source="CVE"/>
		<reference ref_id="CVE-2021-30514" ref_url="https://www.suse.com/security/cve/CVE-2021-30514/" source="CVE"/>
		<reference ref_id="CVE-2021-30515" ref_url="https://www.suse.com/security/cve/CVE-2021-30515/" source="CVE"/>
		<reference ref_id="CVE-2021-30516" ref_url="https://www.suse.com/security/cve/CVE-2021-30516/" source="CVE"/>
		<reference ref_id="CVE-2021-30517" ref_url="https://www.suse.com/security/cve/CVE-2021-30517/" source="CVE"/>
		<reference ref_id="CVE-2021-30518" ref_url="https://www.suse.com/security/cve/CVE-2021-30518/" source="CVE"/>
		<reference ref_id="CVE-2021-30519" ref_url="https://www.suse.com/security/cve/CVE-2021-30519/" source="CVE"/>
		<reference ref_id="CVE-2021-30520" ref_url="https://www.suse.com/security/cve/CVE-2021-30520/" source="CVE"/>
		<reference ref_id="CVE-2021-30521" ref_url="https://www.suse.com/security/cve/CVE-2021-30521/" source="CVE"/>
		<reference ref_id="CVE-2021-30522" ref_url="https://www.suse.com/security/cve/CVE-2021-30522/" source="CVE"/>
		<reference ref_id="CVE-2021-30523" ref_url="https://www.suse.com/security/cve/CVE-2021-30523/" source="CVE"/>
		<reference ref_id="CVE-2021-30524" ref_url="https://www.suse.com/security/cve/CVE-2021-30524/" source="CVE"/>
		<reference ref_id="CVE-2021-30525" ref_url="https://www.suse.com/security/cve/CVE-2021-30525/" source="CVE"/>
		<reference ref_id="CVE-2021-30526" ref_url="https://www.suse.com/security/cve/CVE-2021-30526/" source="CVE"/>
		<reference ref_id="CVE-2021-30527" ref_url="https://www.suse.com/security/cve/CVE-2021-30527/" source="CVE"/>
		<reference ref_id="CVE-2021-30528" ref_url="https://www.suse.com/security/cve/CVE-2021-30528/" source="CVE"/>
		<reference ref_id="CVE-2021-30529" ref_url="https://www.suse.com/security/cve/CVE-2021-30529/" source="CVE"/>
		<reference ref_id="CVE-2021-30530" ref_url="https://www.suse.com/security/cve/CVE-2021-30530/" source="CVE"/>
		<reference ref_id="CVE-2021-30531" ref_url="https://www.suse.com/security/cve/CVE-2021-30531/" source="CVE"/>
		<reference ref_id="CVE-2021-30532" ref_url="https://www.suse.com/security/cve/CVE-2021-30532/" source="CVE"/>
		<reference ref_id="CVE-2021-30533" ref_url="https://www.suse.com/security/cve/CVE-2021-30533/" source="CVE"/>
		<reference ref_id="CVE-2021-30534" ref_url="https://www.suse.com/security/cve/CVE-2021-30534/" source="CVE"/>
		<reference ref_id="CVE-2021-30535" ref_url="https://www.suse.com/security/cve/CVE-2021-30535/" source="CVE"/>
		<reference ref_id="CVE-2021-30536" ref_url="https://www.suse.com/security/cve/CVE-2021-30536/" source="CVE"/>
		<reference ref_id="CVE-2021-30537" ref_url="https://www.suse.com/security/cve/CVE-2021-30537/" source="CVE"/>
		<reference ref_id="CVE-2021-30538" ref_url="https://www.suse.com/security/cve/CVE-2021-30538/" source="CVE"/>
		<reference ref_id="CVE-2021-30539" ref_url="https://www.suse.com/security/cve/CVE-2021-30539/" source="CVE"/>
		<reference ref_id="CVE-2021-30540" ref_url="https://www.suse.com/security/cve/CVE-2021-30540/" source="CVE"/>
		<reference ref_id="CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541/" source="CVE"/>
		<reference ref_id="CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544/" source="CVE"/>
		<reference ref_id="CVE-2021-30545" ref_url="https://www.suse.com/security/cve/CVE-2021-30545/" source="CVE"/>
		<reference ref_id="CVE-2021-30546" ref_url="https://www.suse.com/security/cve/CVE-2021-30546/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548/" source="CVE"/>
		<reference ref_id="CVE-2021-30549" ref_url="https://www.suse.com/security/cve/CVE-2021-30549/" source="CVE"/>
		<reference ref_id="CVE-2021-30550" ref_url="https://www.suse.com/security/cve/CVE-2021-30550/" source="CVE"/>
		<reference ref_id="CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551/" source="CVE"/>
		<reference ref_id="CVE-2021-30552" ref_url="https://www.suse.com/security/cve/CVE-2021-30552/" source="CVE"/>
		<reference ref_id="CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553/" source="CVE"/>
		<reference ref_id="CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554/" source="CVE"/>
		<reference ref_id="CVE-2021-30555" ref_url="https://www.suse.com/security/cve/CVE-2021-30555/" source="CVE"/>
		<reference ref_id="CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556/" source="CVE"/>
		<reference ref_id="CVE-2021-30557" ref_url="https://www.suse.com/security/cve/CVE-2021-30557/" source="CVE"/>
		<reference ref_id="CVE-2021-30559" ref_url="https://www.suse.com/security/cve/CVE-2021-30559/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-30561" ref_url="https://www.suse.com/security/cve/CVE-2021-30561/" source="CVE"/>
		<reference ref_id="CVE-2021-30562" ref_url="https://www.suse.com/security/cve/CVE-2021-30562/" source="CVE"/>
		<reference ref_id="CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563/" source="CVE"/>
		<reference ref_id="CVE-2021-30564" ref_url="https://www.suse.com/security/cve/CVE-2021-30564/" source="CVE"/>
		<reference ref_id="CVE-2021-30565" ref_url="https://www.suse.com/security/cve/CVE-2021-30565/" source="CVE"/>
		<reference ref_id="CVE-2021-30566" ref_url="https://www.suse.com/security/cve/CVE-2021-30566/" source="CVE"/>
		<reference ref_id="CVE-2021-30567" ref_url="https://www.suse.com/security/cve/CVE-2021-30567/" source="CVE"/>
		<reference ref_id="CVE-2021-30568" ref_url="https://www.suse.com/security/cve/CVE-2021-30568/" source="CVE"/>
		<reference ref_id="CVE-2021-30569" ref_url="https://www.suse.com/security/cve/CVE-2021-30569/" source="CVE"/>
		<reference ref_id="CVE-2021-30571" ref_url="https://www.suse.com/security/cve/CVE-2021-30571/" source="CVE"/>
		<reference ref_id="CVE-2021-30572" ref_url="https://www.suse.com/security/cve/CVE-2021-30572/" source="CVE"/>
		<reference ref_id="CVE-2021-30573" ref_url="https://www.suse.com/security/cve/CVE-2021-30573/" source="CVE"/>
		<reference ref_id="CVE-2021-30574" ref_url="https://www.suse.com/security/cve/CVE-2021-30574/" source="CVE"/>
		<reference ref_id="CVE-2021-30575" ref_url="https://www.suse.com/security/cve/CVE-2021-30575/" source="CVE"/>
		<reference ref_id="CVE-2021-30576" ref_url="https://www.suse.com/security/cve/CVE-2021-30576/" source="CVE"/>
		<reference ref_id="CVE-2021-30577" ref_url="https://www.suse.com/security/cve/CVE-2021-30577/" source="CVE"/>
		<reference ref_id="CVE-2021-30578" ref_url="https://www.suse.com/security/cve/CVE-2021-30578/" source="CVE"/>
		<reference ref_id="CVE-2021-30579" ref_url="https://www.suse.com/security/cve/CVE-2021-30579/" source="CVE"/>
		<reference ref_id="CVE-2021-30581" ref_url="https://www.suse.com/security/cve/CVE-2021-30581/" source="CVE"/>
		<reference ref_id="CVE-2021-30582" ref_url="https://www.suse.com/security/cve/CVE-2021-30582/" source="CVE"/>
		<reference ref_id="CVE-2021-30584" ref_url="https://www.suse.com/security/cve/CVE-2021-30584/" source="CVE"/>
		<reference ref_id="CVE-2021-30585" ref_url="https://www.suse.com/security/cve/CVE-2021-30585/" source="CVE"/>
		<reference ref_id="CVE-2021-30588" ref_url="https://www.suse.com/security/cve/CVE-2021-30588/" source="CVE"/>
		<reference ref_id="CVE-2021-30589" ref_url="https://www.suse.com/security/cve/CVE-2021-30589/" source="CVE"/>
		<reference ref_id="CVE-2021-30590" ref_url="https://www.suse.com/security/cve/CVE-2021-30590/" source="CVE"/>
		<reference ref_id="CVE-2021-30591" ref_url="https://www.suse.com/security/cve/CVE-2021-30591/" source="CVE"/>
		<reference ref_id="CVE-2021-30592" ref_url="https://www.suse.com/security/cve/CVE-2021-30592/" source="CVE"/>
		<reference ref_id="CVE-2021-30593" ref_url="https://www.suse.com/security/cve/CVE-2021-30593/" source="CVE"/>
		<reference ref_id="CVE-2021-30594" ref_url="https://www.suse.com/security/cve/CVE-2021-30594/" source="CVE"/>
		<reference ref_id="CVE-2021-30596" ref_url="https://www.suse.com/security/cve/CVE-2021-30596/" source="CVE"/>
		<reference ref_id="CVE-2021-30597" ref_url="https://www.suse.com/security/cve/CVE-2021-30597/" source="CVE"/>
		<reference ref_id="CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598/" source="CVE"/>
		<reference ref_id="CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599/" source="CVE"/>
		<reference ref_id="CVE-2021-30600" ref_url="https://www.suse.com/security/cve/CVE-2021-30600/" source="CVE"/>
		<reference ref_id="CVE-2021-30601" ref_url="https://www.suse.com/security/cve/CVE-2021-30601/" source="CVE"/>
		<reference ref_id="CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602/" source="CVE"/>
		<reference ref_id="CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603/" source="CVE"/>
		<reference ref_id="CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604/" source="CVE"/>
		<reference ref_id="CVE-2021-30606" ref_url="https://www.suse.com/security/cve/CVE-2021-30606/" source="CVE"/>
		<reference ref_id="CVE-2021-30607" ref_url="https://www.suse.com/security/cve/CVE-2021-30607/" source="CVE"/>
		<reference ref_id="CVE-2021-30608" ref_url="https://www.suse.com/security/cve/CVE-2021-30608/" source="CVE"/>
		<reference ref_id="CVE-2021-30609" ref_url="https://www.suse.com/security/cve/CVE-2021-30609/" source="CVE"/>
		<reference ref_id="CVE-2021-30610" ref_url="https://www.suse.com/security/cve/CVE-2021-30610/" source="CVE"/>
		<reference ref_id="CVE-2021-30611" ref_url="https://www.suse.com/security/cve/CVE-2021-30611/" source="CVE"/>
		<reference ref_id="CVE-2021-30612" ref_url="https://www.suse.com/security/cve/CVE-2021-30612/" source="CVE"/>
		<reference ref_id="CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613/" source="CVE"/>
		<reference ref_id="CVE-2021-30614" ref_url="https://www.suse.com/security/cve/CVE-2021-30614/" source="CVE"/>
		<reference ref_id="CVE-2021-30615" ref_url="https://www.suse.com/security/cve/CVE-2021-30615/" source="CVE"/>
		<reference ref_id="CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616/" source="CVE"/>
		<reference ref_id="CVE-2021-30617" ref_url="https://www.suse.com/security/cve/CVE-2021-30617/" source="CVE"/>
		<reference ref_id="CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618/" source="CVE"/>
		<reference ref_id="CVE-2021-30619" ref_url="https://www.suse.com/security/cve/CVE-2021-30619/" source="CVE"/>
		<reference ref_id="CVE-2021-30620" ref_url="https://www.suse.com/security/cve/CVE-2021-30620/" source="CVE"/>
		<reference ref_id="CVE-2021-30621" ref_url="https://www.suse.com/security/cve/CVE-2021-30621/" source="CVE"/>
		<reference ref_id="CVE-2021-30622" ref_url="https://www.suse.com/security/cve/CVE-2021-30622/" source="CVE"/>
		<reference ref_id="CVE-2021-30623" ref_url="https://www.suse.com/security/cve/CVE-2021-30623/" source="CVE"/>
		<reference ref_id="CVE-2021-30624" ref_url="https://www.suse.com/security/cve/CVE-2021-30624/" source="CVE"/>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<reference ref_id="CVE-2021-37956" ref_url="https://www.suse.com/security/cve/CVE-2021-37956/" source="CVE"/>
		<reference ref_id="CVE-2021-37957" ref_url="https://www.suse.com/security/cve/CVE-2021-37957/" source="CVE"/>
		<reference ref_id="CVE-2021-37958" ref_url="https://www.suse.com/security/cve/CVE-2021-37958/" source="CVE"/>
		<reference ref_id="CVE-2021-37959" ref_url="https://www.suse.com/security/cve/CVE-2021-37959/" source="CVE"/>
		<reference ref_id="CVE-2021-37960" ref_url="https://www.suse.com/security/cve/CVE-2021-37960/" source="CVE"/>
		<reference ref_id="CVE-2021-37961" ref_url="https://www.suse.com/security/cve/CVE-2021-37961/" source="CVE"/>
		<reference ref_id="CVE-2021-37962" ref_url="https://www.suse.com/security/cve/CVE-2021-37962/" source="CVE"/>
		<reference ref_id="CVE-2021-37963" ref_url="https://www.suse.com/security/cve/CVE-2021-37963/" source="CVE"/>
		<reference ref_id="CVE-2021-37964" ref_url="https://www.suse.com/security/cve/CVE-2021-37964/" source="CVE"/>
		<reference ref_id="CVE-2021-37965" ref_url="https://www.suse.com/security/cve/CVE-2021-37965/" source="CVE"/>
		<reference ref_id="CVE-2021-37966" ref_url="https://www.suse.com/security/cve/CVE-2021-37966/" source="CVE"/>
		<reference ref_id="CVE-2021-37967" ref_url="https://www.suse.com/security/cve/CVE-2021-37967/" source="CVE"/>
		<reference ref_id="CVE-2021-37968" ref_url="https://www.suse.com/security/cve/CVE-2021-37968/" source="CVE"/>
		<reference ref_id="CVE-2021-37969" ref_url="https://www.suse.com/security/cve/CVE-2021-37969/" source="CVE"/>
		<reference ref_id="CVE-2021-37970" ref_url="https://www.suse.com/security/cve/CVE-2021-37970/" source="CVE"/>
		<reference ref_id="CVE-2021-37971" ref_url="https://www.suse.com/security/cve/CVE-2021-37971/" source="CVE"/>
		<reference ref_id="CVE-2021-37972" ref_url="https://www.suse.com/security/cve/CVE-2021-37972/" source="CVE"/>
		<reference ref_id="CVE-2021-37973" ref_url="https://www.suse.com/security/cve/CVE-2021-37973/" source="CVE"/>
		<reference ref_id="CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976/" source="CVE"/>
		<reference ref_id="CVE-2021-37977" ref_url="https://www.suse.com/security/cve/CVE-2021-37977/" source="CVE"/>
		<reference ref_id="CVE-2021-37978" ref_url="https://www.suse.com/security/cve/CVE-2021-37978/" source="CVE"/>
		<reference ref_id="CVE-2021-37979" ref_url="https://www.suse.com/security/cve/CVE-2021-37979/" source="CVE"/>
		<reference ref_id="CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980/" source="CVE"/>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37982" ref_url="https://www.suse.com/security/cve/CVE-2021-37982/" source="CVE"/>
		<reference ref_id="CVE-2021-37983" ref_url="https://www.suse.com/security/cve/CVE-2021-37983/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37985" ref_url="https://www.suse.com/security/cve/CVE-2021-37985/" source="CVE"/>
		<reference ref_id="CVE-2021-37986" ref_url="https://www.suse.com/security/cve/CVE-2021-37986/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37988" ref_url="https://www.suse.com/security/cve/CVE-2021-37988/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37990" ref_url="https://www.suse.com/security/cve/CVE-2021-37990/" source="CVE"/>
		<reference ref_id="CVE-2021-37991" ref_url="https://www.suse.com/security/cve/CVE-2021-37991/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993/" source="CVE"/>
		<reference ref_id="CVE-2021-37994" ref_url="https://www.suse.com/security/cve/CVE-2021-37994/" source="CVE"/>
		<reference ref_id="CVE-2021-37995" ref_url="https://www.suse.com/security/cve/CVE-2021-37995/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<reference ref_id="CVE-2021-37997" ref_url="https://www.suse.com/security/cve/CVE-2021-37997/" source="CVE"/>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-37999" ref_url="https://www.suse.com/security/cve/CVE-2021-37999/" source="CVE"/>
		<reference ref_id="CVE-2021-38000" ref_url="https://www.suse.com/security/cve/CVE-2021-38000/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<reference ref_id="CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005/" source="CVE"/>
		<reference ref_id="CVE-2021-38006" ref_url="https://www.suse.com/security/cve/CVE-2021-38006/" source="CVE"/>
		<reference ref_id="CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007/" source="CVE"/>
		<reference ref_id="CVE-2021-38008" ref_url="https://www.suse.com/security/cve/CVE-2021-38008/" source="CVE"/>
		<reference ref_id="CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009/" source="CVE"/>
		<reference ref_id="CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010/" source="CVE"/>
		<reference ref_id="CVE-2021-38011" ref_url="https://www.suse.com/security/cve/CVE-2021-38011/" source="CVE"/>
		<reference ref_id="CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012/" source="CVE"/>
		<reference ref_id="CVE-2021-38013" ref_url="https://www.suse.com/security/cve/CVE-2021-38013/" source="CVE"/>
		<reference ref_id="CVE-2021-38014" ref_url="https://www.suse.com/security/cve/CVE-2021-38014/" source="CVE"/>
		<reference ref_id="CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015/" source="CVE"/>
		<reference ref_id="CVE-2021-38016" ref_url="https://www.suse.com/security/cve/CVE-2021-38016/" source="CVE"/>
		<reference ref_id="CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017/" source="CVE"/>
		<reference ref_id="CVE-2021-38018" ref_url="https://www.suse.com/security/cve/CVE-2021-38018/" source="CVE"/>
		<reference ref_id="CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019/" source="CVE"/>
		<reference ref_id="CVE-2021-38020" ref_url="https://www.suse.com/security/cve/CVE-2021-38020/" source="CVE"/>
		<reference ref_id="CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021/" source="CVE"/>
		<reference ref_id="CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022/" source="CVE"/>
		<reference ref_id="CVE-2021-4052" ref_url="https://www.suse.com/security/cve/CVE-2021-4052/" source="CVE"/>
		<reference ref_id="CVE-2021-4053" ref_url="https://www.suse.com/security/cve/CVE-2021-4053/" source="CVE"/>
		<reference ref_id="CVE-2021-4054" ref_url="https://www.suse.com/security/cve/CVE-2021-4054/" source="CVE"/>
		<reference ref_id="CVE-2021-4055" ref_url="https://www.suse.com/security/cve/CVE-2021-4055/" source="CVE"/>
		<reference ref_id="CVE-2021-4056" ref_url="https://www.suse.com/security/cve/CVE-2021-4056/" source="CVE"/>
		<reference ref_id="CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057/" source="CVE"/>
		<reference ref_id="CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058/" source="CVE"/>
		<reference ref_id="CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059/" source="CVE"/>
		<reference ref_id="CVE-2021-4061" ref_url="https://www.suse.com/security/cve/CVE-2021-4061/" source="CVE"/>
		<reference ref_id="CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062/" source="CVE"/>
		<reference ref_id="CVE-2021-4063" ref_url="https://www.suse.com/security/cve/CVE-2021-4063/" source="CVE"/>
		<reference ref_id="CVE-2021-4064" ref_url="https://www.suse.com/security/cve/CVE-2021-4064/" source="CVE"/>
		<reference ref_id="CVE-2021-4065" ref_url="https://www.suse.com/security/cve/CVE-2021-4065/" source="CVE"/>
		<reference ref_id="CVE-2021-4066" ref_url="https://www.suse.com/security/cve/CVE-2021-4066/" source="CVE"/>
		<reference ref_id="CVE-2021-4067" ref_url="https://www.suse.com/security/cve/CVE-2021-4067/" source="CVE"/>
		<reference ref_id="CVE-2021-4068" ref_url="https://www.suse.com/security/cve/CVE-2021-4068/" source="CVE"/>
		<reference ref_id="CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078/" source="CVE"/>
		<reference ref_id="CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079/" source="CVE"/>
		<reference ref_id="CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098/" source="CVE"/>
		<reference ref_id="CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099/" source="CVE"/>
		<reference ref_id="CVE-2021-4100" ref_url="https://www.suse.com/security/cve/CVE-2021-4100/" source="CVE"/>
		<reference ref_id="CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101/" source="CVE"/>
		<reference ref_id="CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102/" source="CVE"/>
		<reference ref_id="CVE-2022-0096" ref_url="https://www.suse.com/security/cve/CVE-2022-0096/" source="CVE"/>
		<reference ref_id="CVE-2022-0097" ref_url="https://www.suse.com/security/cve/CVE-2022-0097/" source="CVE"/>
		<reference ref_id="CVE-2022-0098" ref_url="https://www.suse.com/security/cve/CVE-2022-0098/" source="CVE"/>
		<reference ref_id="CVE-2022-0099" ref_url="https://www.suse.com/security/cve/CVE-2022-0099/" source="CVE"/>
		<reference ref_id="CVE-2022-0100" ref_url="https://www.suse.com/security/cve/CVE-2022-0100/" source="CVE"/>
		<reference ref_id="CVE-2022-0101" ref_url="https://www.suse.com/security/cve/CVE-2022-0101/" source="CVE"/>
		<reference ref_id="CVE-2022-0102" ref_url="https://www.suse.com/security/cve/CVE-2022-0102/" source="CVE"/>
		<reference ref_id="CVE-2022-0103" ref_url="https://www.suse.com/security/cve/CVE-2022-0103/" source="CVE"/>
		<reference ref_id="CVE-2022-0104" ref_url="https://www.suse.com/security/cve/CVE-2022-0104/" source="CVE"/>
		<reference ref_id="CVE-2022-0105" ref_url="https://www.suse.com/security/cve/CVE-2022-0105/" source="CVE"/>
		<reference ref_id="CVE-2022-0106" ref_url="https://www.suse.com/security/cve/CVE-2022-0106/" source="CVE"/>
		<reference ref_id="CVE-2022-0107" ref_url="https://www.suse.com/security/cve/CVE-2022-0107/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-0109" ref_url="https://www.suse.com/security/cve/CVE-2022-0109/" source="CVE"/>
		<reference ref_id="CVE-2022-0110" ref_url="https://www.suse.com/security/cve/CVE-2022-0110/" source="CVE"/>
		<reference ref_id="CVE-2022-0111" ref_url="https://www.suse.com/security/cve/CVE-2022-0111/" source="CVE"/>
		<reference ref_id="CVE-2022-0112" ref_url="https://www.suse.com/security/cve/CVE-2022-0112/" source="CVE"/>
		<reference ref_id="CVE-2022-0113" ref_url="https://www.suse.com/security/cve/CVE-2022-0113/" source="CVE"/>
		<reference ref_id="CVE-2022-0114" ref_url="https://www.suse.com/security/cve/CVE-2022-0114/" source="CVE"/>
		<reference ref_id="CVE-2022-0115" ref_url="https://www.suse.com/security/cve/CVE-2022-0115/" source="CVE"/>
		<reference ref_id="CVE-2022-0116" ref_url="https://www.suse.com/security/cve/CVE-2022-0116/" source="CVE"/>
		<reference ref_id="CVE-2022-0117" ref_url="https://www.suse.com/security/cve/CVE-2022-0117/" source="CVE"/>
		<reference ref_id="CVE-2022-0118" ref_url="https://www.suse.com/security/cve/CVE-2022-0118/" source="CVE"/>
		<reference ref_id="CVE-2022-0120" ref_url="https://www.suse.com/security/cve/CVE-2022-0120/" source="CVE"/>
		<reference ref_id="CVE-2022-0289" ref_url="https://www.suse.com/security/cve/CVE-2022-0289/" source="CVE"/>
		<reference ref_id="CVE-2022-0290" ref_url="https://www.suse.com/security/cve/CVE-2022-0290/" source="CVE"/>
		<reference ref_id="CVE-2022-0291" ref_url="https://www.suse.com/security/cve/CVE-2022-0291/" source="CVE"/>
		<reference ref_id="CVE-2022-0292" ref_url="https://www.suse.com/security/cve/CVE-2022-0292/" source="CVE"/>
		<reference ref_id="CVE-2022-0293" ref_url="https://www.suse.com/security/cve/CVE-2022-0293/" source="CVE"/>
		<reference ref_id="CVE-2022-0294" ref_url="https://www.suse.com/security/cve/CVE-2022-0294/" source="CVE"/>
		<reference ref_id="CVE-2022-0295" ref_url="https://www.suse.com/security/cve/CVE-2022-0295/" source="CVE"/>
		<reference ref_id="CVE-2022-0296" ref_url="https://www.suse.com/security/cve/CVE-2022-0296/" source="CVE"/>
		<reference ref_id="CVE-2022-0297" ref_url="https://www.suse.com/security/cve/CVE-2022-0297/" source="CVE"/>
		<reference ref_id="CVE-2022-0298" ref_url="https://www.suse.com/security/cve/CVE-2022-0298/" source="CVE"/>
		<reference ref_id="CVE-2022-0300" ref_url="https://www.suse.com/security/cve/CVE-2022-0300/" source="CVE"/>
		<reference ref_id="CVE-2022-0301" ref_url="https://www.suse.com/security/cve/CVE-2022-0301/" source="CVE"/>
		<reference ref_id="CVE-2022-0302" ref_url="https://www.suse.com/security/cve/CVE-2022-0302/" source="CVE"/>
		<reference ref_id="CVE-2022-0303" ref_url="https://www.suse.com/security/cve/CVE-2022-0303/" source="CVE"/>
		<reference ref_id="CVE-2022-0304" ref_url="https://www.suse.com/security/cve/CVE-2022-0304/" source="CVE"/>
		<reference ref_id="CVE-2022-0305" ref_url="https://www.suse.com/security/cve/CVE-2022-0305/" source="CVE"/>
		<reference ref_id="CVE-2022-0306" ref_url="https://www.suse.com/security/cve/CVE-2022-0306/" source="CVE"/>
		<reference ref_id="CVE-2022-0307" ref_url="https://www.suse.com/security/cve/CVE-2022-0307/" source="CVE"/>
		<reference ref_id="CVE-2022-0308" ref_url="https://www.suse.com/security/cve/CVE-2022-0308/" source="CVE"/>
		<reference ref_id="CVE-2022-0309" ref_url="https://www.suse.com/security/cve/CVE-2022-0309/" source="CVE"/>
		<reference ref_id="CVE-2022-0310" ref_url="https://www.suse.com/security/cve/CVE-2022-0310/" source="CVE"/>
		<reference ref_id="CVE-2022-0311" ref_url="https://www.suse.com/security/cve/CVE-2022-0311/" source="CVE"/>
		<reference ref_id="CVE-2022-0452" ref_url="https://www.suse.com/security/cve/CVE-2022-0452/" source="CVE"/>
		<reference ref_id="CVE-2022-0453" ref_url="https://www.suse.com/security/cve/CVE-2022-0453/" source="CVE"/>
		<reference ref_id="CVE-2022-0454" ref_url="https://www.suse.com/security/cve/CVE-2022-0454/" source="CVE"/>
		<reference ref_id="CVE-2022-0455" ref_url="https://www.suse.com/security/cve/CVE-2022-0455/" source="CVE"/>
		<reference ref_id="CVE-2022-0456" ref_url="https://www.suse.com/security/cve/CVE-2022-0456/" source="CVE"/>
		<reference ref_id="CVE-2022-0457" ref_url="https://www.suse.com/security/cve/CVE-2022-0457/" source="CVE"/>
		<reference ref_id="CVE-2022-0459" ref_url="https://www.suse.com/security/cve/CVE-2022-0459/" source="CVE"/>
		<reference ref_id="CVE-2022-0460" ref_url="https://www.suse.com/security/cve/CVE-2022-0460/" source="CVE"/>
		<reference ref_id="CVE-2022-0461" ref_url="https://www.suse.com/security/cve/CVE-2022-0461/" source="CVE"/>
		<reference ref_id="CVE-2022-0462" ref_url="https://www.suse.com/security/cve/CVE-2022-0462/" source="CVE"/>
		<reference ref_id="CVE-2022-0463" ref_url="https://www.suse.com/security/cve/CVE-2022-0463/" source="CVE"/>
		<reference ref_id="CVE-2022-0464" ref_url="https://www.suse.com/security/cve/CVE-2022-0464/" source="CVE"/>
		<reference ref_id="CVE-2022-0465" ref_url="https://www.suse.com/security/cve/CVE-2022-0465/" source="CVE"/>
		<reference ref_id="CVE-2022-0466" ref_url="https://www.suse.com/security/cve/CVE-2022-0466/" source="CVE"/>
		<reference ref_id="CVE-2022-0467" ref_url="https://www.suse.com/security/cve/CVE-2022-0467/" source="CVE"/>
		<reference ref_id="CVE-2022-0468" ref_url="https://www.suse.com/security/cve/CVE-2022-0468/" source="CVE"/>
		<reference ref_id="CVE-2022-0469" ref_url="https://www.suse.com/security/cve/CVE-2022-0469/" source="CVE"/>
		<reference ref_id="CVE-2022-0470" ref_url="https://www.suse.com/security/cve/CVE-2022-0470/" source="CVE"/>
		<reference ref_id="CVE-2022-0603" ref_url="https://www.suse.com/security/cve/CVE-2022-0603/" source="CVE"/>
		<reference ref_id="CVE-2022-0604" ref_url="https://www.suse.com/security/cve/CVE-2022-0604/" source="CVE"/>
		<reference ref_id="CVE-2022-0605" ref_url="https://www.suse.com/security/cve/CVE-2022-0605/" source="CVE"/>
		<reference ref_id="CVE-2022-0606" ref_url="https://www.suse.com/security/cve/CVE-2022-0606/" source="CVE"/>
		<reference ref_id="CVE-2022-0607" ref_url="https://www.suse.com/security/cve/CVE-2022-0607/" source="CVE"/>
		<reference ref_id="CVE-2022-0608" ref_url="https://www.suse.com/security/cve/CVE-2022-0608/" source="CVE"/>
		<reference ref_id="CVE-2022-0609" ref_url="https://www.suse.com/security/cve/CVE-2022-0609/" source="CVE"/>
		<reference ref_id="CVE-2022-0610" ref_url="https://www.suse.com/security/cve/CVE-2022-0610/" source="CVE"/>
		<reference ref_id="CVE-2022-0789" ref_url="https://www.suse.com/security/cve/CVE-2022-0789/" source="CVE"/>
		<reference ref_id="CVE-2022-0790" ref_url="https://www.suse.com/security/cve/CVE-2022-0790/" source="CVE"/>
		<reference ref_id="CVE-2022-0791" ref_url="https://www.suse.com/security/cve/CVE-2022-0791/" source="CVE"/>
		<reference ref_id="CVE-2022-0792" ref_url="https://www.suse.com/security/cve/CVE-2022-0792/" source="CVE"/>
		<reference ref_id="CVE-2022-0793" ref_url="https://www.suse.com/security/cve/CVE-2022-0793/" source="CVE"/>
		<reference ref_id="CVE-2022-0794" ref_url="https://www.suse.com/security/cve/CVE-2022-0794/" source="CVE"/>
		<reference ref_id="CVE-2022-0795" ref_url="https://www.suse.com/security/cve/CVE-2022-0795/" source="CVE"/>
		<reference ref_id="CVE-2022-0796" ref_url="https://www.suse.com/security/cve/CVE-2022-0796/" source="CVE"/>
		<reference ref_id="CVE-2022-0797" ref_url="https://www.suse.com/security/cve/CVE-2022-0797/" source="CVE"/>
		<reference ref_id="CVE-2022-0798" ref_url="https://www.suse.com/security/cve/CVE-2022-0798/" source="CVE"/>
		<reference ref_id="CVE-2022-0799" ref_url="https://www.suse.com/security/cve/CVE-2022-0799/" source="CVE"/>
		<reference ref_id="CVE-2022-0800" ref_url="https://www.suse.com/security/cve/CVE-2022-0800/" source="CVE"/>
		<reference ref_id="CVE-2022-0801" ref_url="https://www.suse.com/security/cve/CVE-2022-0801/" source="CVE"/>
		<reference ref_id="CVE-2022-0802" ref_url="https://www.suse.com/security/cve/CVE-2022-0802/" source="CVE"/>
		<reference ref_id="CVE-2022-0803" ref_url="https://www.suse.com/security/cve/CVE-2022-0803/" source="CVE"/>
		<reference ref_id="CVE-2022-0804" ref_url="https://www.suse.com/security/cve/CVE-2022-0804/" source="CVE"/>
		<reference ref_id="CVE-2022-0805" ref_url="https://www.suse.com/security/cve/CVE-2022-0805/" source="CVE"/>
		<reference ref_id="CVE-2022-0806" ref_url="https://www.suse.com/security/cve/CVE-2022-0806/" source="CVE"/>
		<reference ref_id="CVE-2022-0807" ref_url="https://www.suse.com/security/cve/CVE-2022-0807/" source="CVE"/>
		<reference ref_id="CVE-2022-0808" ref_url="https://www.suse.com/security/cve/CVE-2022-0808/" source="CVE"/>
		<reference ref_id="CVE-2022-0809" ref_url="https://www.suse.com/security/cve/CVE-2022-0809/" source="CVE"/>
		<reference ref_id="CVE-2022-0971" ref_url="https://www.suse.com/security/cve/CVE-2022-0971/" source="CVE"/>
		<reference ref_id="CVE-2022-0972" ref_url="https://www.suse.com/security/cve/CVE-2022-0972/" source="CVE"/>
		<reference ref_id="CVE-2022-0973" ref_url="https://www.suse.com/security/cve/CVE-2022-0973/" source="CVE"/>
		<reference ref_id="CVE-2022-0974" ref_url="https://www.suse.com/security/cve/CVE-2022-0974/" source="CVE"/>
		<reference ref_id="CVE-2022-0975" ref_url="https://www.suse.com/security/cve/CVE-2022-0975/" source="CVE"/>
		<reference ref_id="CVE-2022-0976" ref_url="https://www.suse.com/security/cve/CVE-2022-0976/" source="CVE"/>
		<reference ref_id="CVE-2022-0977" ref_url="https://www.suse.com/security/cve/CVE-2022-0977/" source="CVE"/>
		<reference ref_id="CVE-2022-0978" ref_url="https://www.suse.com/security/cve/CVE-2022-0978/" source="CVE"/>
		<reference ref_id="CVE-2022-0979" ref_url="https://www.suse.com/security/cve/CVE-2022-0979/" source="CVE"/>
		<reference ref_id="CVE-2022-0980" ref_url="https://www.suse.com/security/cve/CVE-2022-0980/" source="CVE"/>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<reference ref_id="CVE-2022-1125" ref_url="https://www.suse.com/security/cve/CVE-2022-1125/" source="CVE"/>
		<reference ref_id="CVE-2022-1127" ref_url="https://www.suse.com/security/cve/CVE-2022-1127/" source="CVE"/>
		<reference ref_id="CVE-2022-1128" ref_url="https://www.suse.com/security/cve/CVE-2022-1128/" source="CVE"/>
		<reference ref_id="CVE-2022-1129" ref_url="https://www.suse.com/security/cve/CVE-2022-1129/" source="CVE"/>
		<reference ref_id="CVE-2022-1130" ref_url="https://www.suse.com/security/cve/CVE-2022-1130/" source="CVE"/>
		<reference ref_id="CVE-2022-1131" ref_url="https://www.suse.com/security/cve/CVE-2022-1131/" source="CVE"/>
		<reference ref_id="CVE-2022-1132" ref_url="https://www.suse.com/security/cve/CVE-2022-1132/" source="CVE"/>
		<reference ref_id="CVE-2022-1133" ref_url="https://www.suse.com/security/cve/CVE-2022-1133/" source="CVE"/>
		<reference ref_id="CVE-2022-1134" ref_url="https://www.suse.com/security/cve/CVE-2022-1134/" source="CVE"/>
		<reference ref_id="CVE-2022-1135" ref_url="https://www.suse.com/security/cve/CVE-2022-1135/" source="CVE"/>
		<reference ref_id="CVE-2022-1136" ref_url="https://www.suse.com/security/cve/CVE-2022-1136/" source="CVE"/>
		<reference ref_id="CVE-2022-1137" ref_url="https://www.suse.com/security/cve/CVE-2022-1137/" source="CVE"/>
		<reference ref_id="CVE-2022-1138" ref_url="https://www.suse.com/security/cve/CVE-2022-1138/" source="CVE"/>
		<reference ref_id="CVE-2022-1139" ref_url="https://www.suse.com/security/cve/CVE-2022-1139/" source="CVE"/>
		<reference ref_id="CVE-2022-1141" ref_url="https://www.suse.com/security/cve/CVE-2022-1141/" source="CVE"/>
		<reference ref_id="CVE-2022-1142" ref_url="https://www.suse.com/security/cve/CVE-2022-1142/" source="CVE"/>
		<reference ref_id="CVE-2022-1143" ref_url="https://www.suse.com/security/cve/CVE-2022-1143/" source="CVE"/>
		<reference ref_id="CVE-2022-1144" ref_url="https://www.suse.com/security/cve/CVE-2022-1144/" source="CVE"/>
		<reference ref_id="CVE-2022-1145" ref_url="https://www.suse.com/security/cve/CVE-2022-1145/" source="CVE"/>
		<reference ref_id="CVE-2022-1146" ref_url="https://www.suse.com/security/cve/CVE-2022-1146/" source="CVE"/>
		<reference ref_id="CVE-2022-1232" ref_url="https://www.suse.com/security/cve/CVE-2022-1232/" source="CVE"/>
		<reference ref_id="CVE-2022-1305" ref_url="https://www.suse.com/security/cve/CVE-2022-1305/" source="CVE"/>
		<reference ref_id="CVE-2022-1306" ref_url="https://www.suse.com/security/cve/CVE-2022-1306/" source="CVE"/>
		<reference ref_id="CVE-2022-1307" ref_url="https://www.suse.com/security/cve/CVE-2022-1307/" source="CVE"/>
		<reference ref_id="CVE-2022-1308" ref_url="https://www.suse.com/security/cve/CVE-2022-1308/" source="CVE"/>
		<reference ref_id="CVE-2022-1309" ref_url="https://www.suse.com/security/cve/CVE-2022-1309/" source="CVE"/>
		<reference ref_id="CVE-2022-1310" ref_url="https://www.suse.com/security/cve/CVE-2022-1310/" source="CVE"/>
		<reference ref_id="CVE-2022-1311" ref_url="https://www.suse.com/security/cve/CVE-2022-1311/" source="CVE"/>
		<reference ref_id="CVE-2022-1312" ref_url="https://www.suse.com/security/cve/CVE-2022-1312/" source="CVE"/>
		<reference ref_id="CVE-2022-1313" ref_url="https://www.suse.com/security/cve/CVE-2022-1313/" source="CVE"/>
		<reference ref_id="CVE-2022-1314" ref_url="https://www.suse.com/security/cve/CVE-2022-1314/" source="CVE"/>
		<reference ref_id="CVE-2022-1364" ref_url="https://www.suse.com/security/cve/CVE-2022-1364/" source="CVE"/>
		<reference ref_id="CVE-2022-1477" ref_url="https://www.suse.com/security/cve/CVE-2022-1477/" source="CVE"/>
		<reference ref_id="CVE-2022-1478" ref_url="https://www.suse.com/security/cve/CVE-2022-1478/" source="CVE"/>
		<reference ref_id="CVE-2022-1479" ref_url="https://www.suse.com/security/cve/CVE-2022-1479/" source="CVE"/>
		<reference ref_id="CVE-2022-1480" ref_url="https://www.suse.com/security/cve/CVE-2022-1480/" source="CVE"/>
		<reference ref_id="CVE-2022-1481" ref_url="https://www.suse.com/security/cve/CVE-2022-1481/" source="CVE"/>
		<reference ref_id="CVE-2022-1482" ref_url="https://www.suse.com/security/cve/CVE-2022-1482/" source="CVE"/>
		<reference ref_id="CVE-2022-1483" ref_url="https://www.suse.com/security/cve/CVE-2022-1483/" source="CVE"/>
		<reference ref_id="CVE-2022-1484" ref_url="https://www.suse.com/security/cve/CVE-2022-1484/" source="CVE"/>
		<reference ref_id="CVE-2022-1485" ref_url="https://www.suse.com/security/cve/CVE-2022-1485/" source="CVE"/>
		<reference ref_id="CVE-2022-1486" ref_url="https://www.suse.com/security/cve/CVE-2022-1486/" source="CVE"/>
		<reference ref_id="CVE-2022-1487" ref_url="https://www.suse.com/security/cve/CVE-2022-1487/" source="CVE"/>
		<reference ref_id="CVE-2022-1488" ref_url="https://www.suse.com/security/cve/CVE-2022-1488/" source="CVE"/>
		<reference ref_id="CVE-2022-1489" ref_url="https://www.suse.com/security/cve/CVE-2022-1489/" source="CVE"/>
		<reference ref_id="CVE-2022-1490" ref_url="https://www.suse.com/security/cve/CVE-2022-1490/" source="CVE"/>
		<reference ref_id="CVE-2022-1491" ref_url="https://www.suse.com/security/cve/CVE-2022-1491/" source="CVE"/>
		<reference ref_id="CVE-2022-1492" ref_url="https://www.suse.com/security/cve/CVE-2022-1492/" source="CVE"/>
		<reference ref_id="CVE-2022-1493" ref_url="https://www.suse.com/security/cve/CVE-2022-1493/" source="CVE"/>
		<reference ref_id="CVE-2022-1494" ref_url="https://www.suse.com/security/cve/CVE-2022-1494/" source="CVE"/>
		<reference ref_id="CVE-2022-1495" ref_url="https://www.suse.com/security/cve/CVE-2022-1495/" source="CVE"/>
		<reference ref_id="CVE-2022-1496" ref_url="https://www.suse.com/security/cve/CVE-2022-1496/" source="CVE"/>
		<reference ref_id="CVE-2022-1497" ref_url="https://www.suse.com/security/cve/CVE-2022-1497/" source="CVE"/>
		<reference ref_id="CVE-2022-1498" ref_url="https://www.suse.com/security/cve/CVE-2022-1498/" source="CVE"/>
		<reference ref_id="CVE-2022-1499" ref_url="https://www.suse.com/security/cve/CVE-2022-1499/" source="CVE"/>
		<reference ref_id="CVE-2022-1500" ref_url="https://www.suse.com/security/cve/CVE-2022-1500/" source="CVE"/>
		<reference ref_id="CVE-2022-1501" ref_url="https://www.suse.com/security/cve/CVE-2022-1501/" source="CVE"/>
		<reference ref_id="CVE-2022-1633" ref_url="https://www.suse.com/security/cve/CVE-2022-1633/" source="CVE"/>
		<reference ref_id="CVE-2022-1634" ref_url="https://www.suse.com/security/cve/CVE-2022-1634/" source="CVE"/>
		<reference ref_id="CVE-2022-1635" ref_url="https://www.suse.com/security/cve/CVE-2022-1635/" source="CVE"/>
		<reference ref_id="CVE-2022-1636" ref_url="https://www.suse.com/security/cve/CVE-2022-1636/" source="CVE"/>
		<reference ref_id="CVE-2022-1637" ref_url="https://www.suse.com/security/cve/CVE-2022-1637/" source="CVE"/>
		<reference ref_id="CVE-2022-1638" ref_url="https://www.suse.com/security/cve/CVE-2022-1638/" source="CVE"/>
		<reference ref_id="CVE-2022-1639" ref_url="https://www.suse.com/security/cve/CVE-2022-1639/" source="CVE"/>
		<reference ref_id="CVE-2022-1640" ref_url="https://www.suse.com/security/cve/CVE-2022-1640/" source="CVE"/>
		<reference ref_id="CVE-2022-1641" ref_url="https://www.suse.com/security/cve/CVE-2022-1641/" source="CVE"/>
		<reference ref_id="CVE-2022-1853" ref_url="https://www.suse.com/security/cve/CVE-2022-1853/" source="CVE"/>
		<reference ref_id="CVE-2022-1854" ref_url="https://www.suse.com/security/cve/CVE-2022-1854/" source="CVE"/>
		<reference ref_id="CVE-2022-1855" ref_url="https://www.suse.com/security/cve/CVE-2022-1855/" source="CVE"/>
		<reference ref_id="CVE-2022-1856" ref_url="https://www.suse.com/security/cve/CVE-2022-1856/" source="CVE"/>
		<reference ref_id="CVE-2022-1857" ref_url="https://www.suse.com/security/cve/CVE-2022-1857/" source="CVE"/>
		<reference ref_id="CVE-2022-1858" ref_url="https://www.suse.com/security/cve/CVE-2022-1858/" source="CVE"/>
		<reference ref_id="CVE-2022-1859" ref_url="https://www.suse.com/security/cve/CVE-2022-1859/" source="CVE"/>
		<reference ref_id="CVE-2022-1860" ref_url="https://www.suse.com/security/cve/CVE-2022-1860/" source="CVE"/>
		<reference ref_id="CVE-2022-1861" ref_url="https://www.suse.com/security/cve/CVE-2022-1861/" source="CVE"/>
		<reference ref_id="CVE-2022-1862" ref_url="https://www.suse.com/security/cve/CVE-2022-1862/" source="CVE"/>
		<reference ref_id="CVE-2022-1863" ref_url="https://www.suse.com/security/cve/CVE-2022-1863/" source="CVE"/>
		<reference ref_id="CVE-2022-1864" ref_url="https://www.suse.com/security/cve/CVE-2022-1864/" source="CVE"/>
		<reference ref_id="CVE-2022-1865" ref_url="https://www.suse.com/security/cve/CVE-2022-1865/" source="CVE"/>
		<reference ref_id="CVE-2022-1866" ref_url="https://www.suse.com/security/cve/CVE-2022-1866/" source="CVE"/>
		<reference ref_id="CVE-2022-1867" ref_url="https://www.suse.com/security/cve/CVE-2022-1867/" source="CVE"/>
		<reference ref_id="CVE-2022-1868" ref_url="https://www.suse.com/security/cve/CVE-2022-1868/" source="CVE"/>
		<reference ref_id="CVE-2022-1869" ref_url="https://www.suse.com/security/cve/CVE-2022-1869/" source="CVE"/>
		<reference ref_id="CVE-2022-1870" ref_url="https://www.suse.com/security/cve/CVE-2022-1870/" source="CVE"/>
		<reference ref_id="CVE-2022-1871" ref_url="https://www.suse.com/security/cve/CVE-2022-1871/" source="CVE"/>
		<reference ref_id="CVE-2022-1872" ref_url="https://www.suse.com/security/cve/CVE-2022-1872/" source="CVE"/>
		<reference ref_id="CVE-2022-1873" ref_url="https://www.suse.com/security/cve/CVE-2022-1873/" source="CVE"/>
		<reference ref_id="CVE-2022-1874" ref_url="https://www.suse.com/security/cve/CVE-2022-1874/" source="CVE"/>
		<reference ref_id="CVE-2022-1875" ref_url="https://www.suse.com/security/cve/CVE-2022-1875/" source="CVE"/>
		<reference ref_id="CVE-2022-1876" ref_url="https://www.suse.com/security/cve/CVE-2022-1876/" source="CVE"/>
		<reference ref_id="CVE-2022-2007" ref_url="https://www.suse.com/security/cve/CVE-2022-2007/" source="CVE"/>
		<reference ref_id="CVE-2022-2008" ref_url="https://www.suse.com/security/cve/CVE-2022-2008/" source="CVE"/>
		<reference ref_id="CVE-2022-2010" ref_url="https://www.suse.com/security/cve/CVE-2022-2010/" source="CVE"/>
		<reference ref_id="CVE-2022-2011" ref_url="https://www.suse.com/security/cve/CVE-2022-2011/" source="CVE"/>
		<reference ref_id="CVE-2022-2156" ref_url="https://www.suse.com/security/cve/CVE-2022-2156/" source="CVE"/>
		<reference ref_id="CVE-2022-2157" ref_url="https://www.suse.com/security/cve/CVE-2022-2157/" source="CVE"/>
		<reference ref_id="CVE-2022-2158" ref_url="https://www.suse.com/security/cve/CVE-2022-2158/" source="CVE"/>
		<reference ref_id="CVE-2022-2160" ref_url="https://www.suse.com/security/cve/CVE-2022-2160/" source="CVE"/>
		<reference ref_id="CVE-2022-2161" ref_url="https://www.suse.com/security/cve/CVE-2022-2161/" source="CVE"/>
		<reference ref_id="CVE-2022-2162" ref_url="https://www.suse.com/security/cve/CVE-2022-2162/" source="CVE"/>
		<reference ref_id="CVE-2022-2163" ref_url="https://www.suse.com/security/cve/CVE-2022-2163/" source="CVE"/>
		<reference ref_id="CVE-2022-2164" ref_url="https://www.suse.com/security/cve/CVE-2022-2164/" source="CVE"/>
		<reference ref_id="CVE-2022-2165" ref_url="https://www.suse.com/security/cve/CVE-2022-2165/" source="CVE"/>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="CVE-2022-2295" ref_url="https://www.suse.com/security/cve/CVE-2022-2295/" source="CVE"/>
		<reference ref_id="CVE-2022-2296" ref_url="https://www.suse.com/security/cve/CVE-2022-2296/" source="CVE"/>
		<reference ref_id="CVE-2022-2477" ref_url="https://www.suse.com/security/cve/CVE-2022-2477/" source="CVE"/>
		<reference ref_id="CVE-2022-2478" ref_url="https://www.suse.com/security/cve/CVE-2022-2478/" source="CVE"/>
		<reference ref_id="CVE-2022-2479" ref_url="https://www.suse.com/security/cve/CVE-2022-2479/" source="CVE"/>
		<reference ref_id="CVE-2022-2480" ref_url="https://www.suse.com/security/cve/CVE-2022-2480/" source="CVE"/>
		<reference ref_id="CVE-2022-2481" ref_url="https://www.suse.com/security/cve/CVE-2022-2481/" source="CVE"/>
		<reference ref_id="CVE-2022-2603" ref_url="https://www.suse.com/security/cve/CVE-2022-2603/" source="CVE"/>
		<reference ref_id="CVE-2022-2604" ref_url="https://www.suse.com/security/cve/CVE-2022-2604/" source="CVE"/>
		<reference ref_id="CVE-2022-2605" ref_url="https://www.suse.com/security/cve/CVE-2022-2605/" source="CVE"/>
		<reference ref_id="CVE-2022-2606" ref_url="https://www.suse.com/security/cve/CVE-2022-2606/" source="CVE"/>
		<reference ref_id="CVE-2022-2607" ref_url="https://www.suse.com/security/cve/CVE-2022-2607/" source="CVE"/>
		<reference ref_id="CVE-2022-2608" ref_url="https://www.suse.com/security/cve/CVE-2022-2608/" source="CVE"/>
		<reference ref_id="CVE-2022-2609" ref_url="https://www.suse.com/security/cve/CVE-2022-2609/" source="CVE"/>
		<reference ref_id="CVE-2022-2610" ref_url="https://www.suse.com/security/cve/CVE-2022-2610/" source="CVE"/>
		<reference ref_id="CVE-2022-2611" ref_url="https://www.suse.com/security/cve/CVE-2022-2611/" source="CVE"/>
		<reference ref_id="CVE-2022-2612" ref_url="https://www.suse.com/security/cve/CVE-2022-2612/" source="CVE"/>
		<reference ref_id="CVE-2022-2613" ref_url="https://www.suse.com/security/cve/CVE-2022-2613/" source="CVE"/>
		<reference ref_id="CVE-2022-2614" ref_url="https://www.suse.com/security/cve/CVE-2022-2614/" source="CVE"/>
		<reference ref_id="CVE-2022-2615" ref_url="https://www.suse.com/security/cve/CVE-2022-2615/" source="CVE"/>
		<reference ref_id="CVE-2022-2616" ref_url="https://www.suse.com/security/cve/CVE-2022-2616/" source="CVE"/>
		<reference ref_id="CVE-2022-2617" ref_url="https://www.suse.com/security/cve/CVE-2022-2617/" source="CVE"/>
		<reference ref_id="CVE-2022-2618" ref_url="https://www.suse.com/security/cve/CVE-2022-2618/" source="CVE"/>
		<reference ref_id="CVE-2022-2619" ref_url="https://www.suse.com/security/cve/CVE-2022-2619/" source="CVE"/>
		<reference ref_id="CVE-2022-2620" ref_url="https://www.suse.com/security/cve/CVE-2022-2620/" source="CVE"/>
		<reference ref_id="CVE-2022-2621" ref_url="https://www.suse.com/security/cve/CVE-2022-2621/" source="CVE"/>
		<reference ref_id="CVE-2022-2622" ref_url="https://www.suse.com/security/cve/CVE-2022-2622/" source="CVE"/>
		<reference ref_id="CVE-2022-2623" ref_url="https://www.suse.com/security/cve/CVE-2022-2623/" source="CVE"/>
		<reference ref_id="CVE-2022-2624" ref_url="https://www.suse.com/security/cve/CVE-2022-2624/" source="CVE"/>
		<reference ref_id="CVE-2022-2852" ref_url="https://www.suse.com/security/cve/CVE-2022-2852/" source="CVE"/>
		<reference ref_id="CVE-2022-2853" ref_url="https://www.suse.com/security/cve/CVE-2022-2853/" source="CVE"/>
		<reference ref_id="CVE-2022-2854" ref_url="https://www.suse.com/security/cve/CVE-2022-2854/" source="CVE"/>
		<reference ref_id="CVE-2022-2855" ref_url="https://www.suse.com/security/cve/CVE-2022-2855/" source="CVE"/>
		<reference ref_id="CVE-2022-2856" ref_url="https://www.suse.com/security/cve/CVE-2022-2856/" source="CVE"/>
		<reference ref_id="CVE-2022-2857" ref_url="https://www.suse.com/security/cve/CVE-2022-2857/" source="CVE"/>
		<reference ref_id="CVE-2022-2858" ref_url="https://www.suse.com/security/cve/CVE-2022-2858/" source="CVE"/>
		<reference ref_id="CVE-2022-2859" ref_url="https://www.suse.com/security/cve/CVE-2022-2859/" source="CVE"/>
		<reference ref_id="CVE-2022-2860" ref_url="https://www.suse.com/security/cve/CVE-2022-2860/" source="CVE"/>
		<reference ref_id="CVE-2022-2861" ref_url="https://www.suse.com/security/cve/CVE-2022-2861/" source="CVE"/>
		<reference ref_id="CVE-2022-3038" ref_url="https://www.suse.com/security/cve/CVE-2022-3038/" source="CVE"/>
		<reference ref_id="CVE-2022-3039" ref_url="https://www.suse.com/security/cve/CVE-2022-3039/" source="CVE"/>
		<reference ref_id="CVE-2022-3040" ref_url="https://www.suse.com/security/cve/CVE-2022-3040/" source="CVE"/>
		<reference ref_id="CVE-2022-3041" ref_url="https://www.suse.com/security/cve/CVE-2022-3041/" source="CVE"/>
		<reference ref_id="CVE-2022-3042" ref_url="https://www.suse.com/security/cve/CVE-2022-3042/" source="CVE"/>
		<reference ref_id="CVE-2022-3043" ref_url="https://www.suse.com/security/cve/CVE-2022-3043/" source="CVE"/>
		<reference ref_id="CVE-2022-3044" ref_url="https://www.suse.com/security/cve/CVE-2022-3044/" source="CVE"/>
		<reference ref_id="CVE-2022-3045" ref_url="https://www.suse.com/security/cve/CVE-2022-3045/" source="CVE"/>
		<reference ref_id="CVE-2022-3046" ref_url="https://www.suse.com/security/cve/CVE-2022-3046/" source="CVE"/>
		<reference ref_id="CVE-2022-3047" ref_url="https://www.suse.com/security/cve/CVE-2022-3047/" source="CVE"/>
		<reference ref_id="CVE-2022-3048" ref_url="https://www.suse.com/security/cve/CVE-2022-3048/" source="CVE"/>
		<reference ref_id="CVE-2022-3049" ref_url="https://www.suse.com/security/cve/CVE-2022-3049/" source="CVE"/>
		<reference ref_id="CVE-2022-3050" ref_url="https://www.suse.com/security/cve/CVE-2022-3050/" source="CVE"/>
		<reference ref_id="CVE-2022-3051" ref_url="https://www.suse.com/security/cve/CVE-2022-3051/" source="CVE"/>
		<reference ref_id="CVE-2022-3052" ref_url="https://www.suse.com/security/cve/CVE-2022-3052/" source="CVE"/>
		<reference ref_id="CVE-2022-3053" ref_url="https://www.suse.com/security/cve/CVE-2022-3053/" source="CVE"/>
		<reference ref_id="CVE-2022-3054" ref_url="https://www.suse.com/security/cve/CVE-2022-3054/" source="CVE"/>
		<reference ref_id="CVE-2022-3055" ref_url="https://www.suse.com/security/cve/CVE-2022-3055/" source="CVE"/>
		<reference ref_id="CVE-2022-3056" ref_url="https://www.suse.com/security/cve/CVE-2022-3056/" source="CVE"/>
		<reference ref_id="CVE-2022-3057" ref_url="https://www.suse.com/security/cve/CVE-2022-3057/" source="CVE"/>
		<reference ref_id="CVE-2022-3058" ref_url="https://www.suse.com/security/cve/CVE-2022-3058/" source="CVE"/>
		<reference ref_id="CVE-2022-3071" ref_url="https://www.suse.com/security/cve/CVE-2022-3071/" source="CVE"/>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<reference ref_id="CVE-2022-3195" ref_url="https://www.suse.com/security/cve/CVE-2022-3195/" source="CVE"/>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="CVE-2022-3304" ref_url="https://www.suse.com/security/cve/CVE-2022-3304/" source="CVE"/>
		<reference ref_id="CVE-2022-3305" ref_url="https://www.suse.com/security/cve/CVE-2022-3305/" source="CVE"/>
		<reference ref_id="CVE-2022-3306" ref_url="https://www.suse.com/security/cve/CVE-2022-3306/" source="CVE"/>
		<reference ref_id="CVE-2022-3307" ref_url="https://www.suse.com/security/cve/CVE-2022-3307/" source="CVE"/>
		<reference ref_id="CVE-2022-3308" ref_url="https://www.suse.com/security/cve/CVE-2022-3308/" source="CVE"/>
		<reference ref_id="CVE-2022-3309" ref_url="https://www.suse.com/security/cve/CVE-2022-3309/" source="CVE"/>
		<reference ref_id="CVE-2022-3310" ref_url="https://www.suse.com/security/cve/CVE-2022-3310/" source="CVE"/>
		<reference ref_id="CVE-2022-3311" ref_url="https://www.suse.com/security/cve/CVE-2022-3311/" source="CVE"/>
		<reference ref_id="CVE-2022-3312" ref_url="https://www.suse.com/security/cve/CVE-2022-3312/" source="CVE"/>
		<reference ref_id="CVE-2022-3313" ref_url="https://www.suse.com/security/cve/CVE-2022-3313/" source="CVE"/>
		<reference ref_id="CVE-2022-3314" ref_url="https://www.suse.com/security/cve/CVE-2022-3314/" source="CVE"/>
		<reference ref_id="CVE-2022-3315" ref_url="https://www.suse.com/security/cve/CVE-2022-3315/" source="CVE"/>
		<reference ref_id="CVE-2022-3316" ref_url="https://www.suse.com/security/cve/CVE-2022-3316/" source="CVE"/>
		<reference ref_id="CVE-2022-3317" ref_url="https://www.suse.com/security/cve/CVE-2022-3317/" source="CVE"/>
		<reference ref_id="CVE-2022-3318" ref_url="https://www.suse.com/security/cve/CVE-2022-3318/" source="CVE"/>
		<reference ref_id="CVE-2022-3370" ref_url="https://www.suse.com/security/cve/CVE-2022-3370/" source="CVE"/>
		<reference ref_id="CVE-2022-3373" ref_url="https://www.suse.com/security/cve/CVE-2022-3373/" source="CVE"/>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3447" ref_url="https://www.suse.com/security/cve/CVE-2022-3447/" source="CVE"/>
		<reference ref_id="CVE-2022-3448" ref_url="https://www.suse.com/security/cve/CVE-2022-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-3449" ref_url="https://www.suse.com/security/cve/CVE-2022-3449/" source="CVE"/>
		<reference ref_id="CVE-2022-3450" ref_url="https://www.suse.com/security/cve/CVE-2022-3450/" source="CVE"/>
		<reference ref_id="CVE-2022-3652" ref_url="https://www.suse.com/security/cve/CVE-2022-3652/" source="CVE"/>
		<reference ref_id="CVE-2022-3653" ref_url="https://www.suse.com/security/cve/CVE-2022-3653/" source="CVE"/>
		<reference ref_id="CVE-2022-3654" ref_url="https://www.suse.com/security/cve/CVE-2022-3654/" source="CVE"/>
		<reference ref_id="CVE-2022-3655" ref_url="https://www.suse.com/security/cve/CVE-2022-3655/" source="CVE"/>
		<reference ref_id="CVE-2022-3656" ref_url="https://www.suse.com/security/cve/CVE-2022-3656/" source="CVE"/>
		<reference ref_id="CVE-2022-3657" ref_url="https://www.suse.com/security/cve/CVE-2022-3657/" source="CVE"/>
		<reference ref_id="CVE-2022-3658" ref_url="https://www.suse.com/security/cve/CVE-2022-3658/" source="CVE"/>
		<reference ref_id="CVE-2022-3659" ref_url="https://www.suse.com/security/cve/CVE-2022-3659/" source="CVE"/>
		<reference ref_id="CVE-2022-3660" ref_url="https://www.suse.com/security/cve/CVE-2022-3660/" source="CVE"/>
		<reference ref_id="CVE-2022-3661" ref_url="https://www.suse.com/security/cve/CVE-2022-3661/" source="CVE"/>
		<reference ref_id="CVE-2022-3723" ref_url="https://www.suse.com/security/cve/CVE-2022-3723/" source="CVE"/>
		<reference ref_id="CVE-2022-3885" ref_url="https://www.suse.com/security/cve/CVE-2022-3885/" source="CVE"/>
		<reference ref_id="CVE-2022-3886" ref_url="https://www.suse.com/security/cve/CVE-2022-3886/" source="CVE"/>
		<reference ref_id="CVE-2022-3887" ref_url="https://www.suse.com/security/cve/CVE-2022-3887/" source="CVE"/>
		<reference ref_id="CVE-2022-3888" ref_url="https://www.suse.com/security/cve/CVE-2022-3888/" source="CVE"/>
		<reference ref_id="CVE-2022-3889" ref_url="https://www.suse.com/security/cve/CVE-2022-3889/" source="CVE"/>
		<reference ref_id="CVE-2022-3890" ref_url="https://www.suse.com/security/cve/CVE-2022-3890/" source="CVE"/>
		<reference ref_id="CVE-2022-4135" ref_url="https://www.suse.com/security/cve/CVE-2022-4135/" source="CVE"/>
		<reference ref_id="CVE-2022-4174" ref_url="https://www.suse.com/security/cve/CVE-2022-4174/" source="CVE"/>
		<reference ref_id="CVE-2022-4175" ref_url="https://www.suse.com/security/cve/CVE-2022-4175/" source="CVE"/>
		<reference ref_id="CVE-2022-4176" ref_url="https://www.suse.com/security/cve/CVE-2022-4176/" source="CVE"/>
		<reference ref_id="CVE-2022-4177" ref_url="https://www.suse.com/security/cve/CVE-2022-4177/" source="CVE"/>
		<reference ref_id="CVE-2022-4178" ref_url="https://www.suse.com/security/cve/CVE-2022-4178/" source="CVE"/>
		<reference ref_id="CVE-2022-4179" ref_url="https://www.suse.com/security/cve/CVE-2022-4179/" source="CVE"/>
		<reference ref_id="CVE-2022-4180" ref_url="https://www.suse.com/security/cve/CVE-2022-4180/" source="CVE"/>
		<reference ref_id="CVE-2022-4181" ref_url="https://www.suse.com/security/cve/CVE-2022-4181/" source="CVE"/>
		<reference ref_id="CVE-2022-4182" ref_url="https://www.suse.com/security/cve/CVE-2022-4182/" source="CVE"/>
		<reference ref_id="CVE-2022-4183" ref_url="https://www.suse.com/security/cve/CVE-2022-4183/" source="CVE"/>
		<reference ref_id="CVE-2022-4184" ref_url="https://www.suse.com/security/cve/CVE-2022-4184/" source="CVE"/>
		<reference ref_id="CVE-2022-4185" ref_url="https://www.suse.com/security/cve/CVE-2022-4185/" source="CVE"/>
		<reference ref_id="CVE-2022-4186" ref_url="https://www.suse.com/security/cve/CVE-2022-4186/" source="CVE"/>
		<reference ref_id="CVE-2022-4187" ref_url="https://www.suse.com/security/cve/CVE-2022-4187/" source="CVE"/>
		<reference ref_id="CVE-2022-4188" ref_url="https://www.suse.com/security/cve/CVE-2022-4188/" source="CVE"/>
		<reference ref_id="CVE-2022-4189" ref_url="https://www.suse.com/security/cve/CVE-2022-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-4190" ref_url="https://www.suse.com/security/cve/CVE-2022-4190/" source="CVE"/>
		<reference ref_id="CVE-2022-4191" ref_url="https://www.suse.com/security/cve/CVE-2022-4191/" source="CVE"/>
		<reference ref_id="CVE-2022-4192" ref_url="https://www.suse.com/security/cve/CVE-2022-4192/" source="CVE"/>
		<reference ref_id="CVE-2022-4193" ref_url="https://www.suse.com/security/cve/CVE-2022-4193/" source="CVE"/>
		<reference ref_id="CVE-2022-4194" ref_url="https://www.suse.com/security/cve/CVE-2022-4194/" source="CVE"/>
		<reference ref_id="CVE-2022-4195" ref_url="https://www.suse.com/security/cve/CVE-2022-4195/" source="CVE"/>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<reference ref_id="CVE-2022-4436" ref_url="https://www.suse.com/security/cve/CVE-2022-4436/" source="CVE"/>
		<reference ref_id="CVE-2022-4437" ref_url="https://www.suse.com/security/cve/CVE-2022-4437/" source="CVE"/>
		<reference ref_id="CVE-2022-4438" ref_url="https://www.suse.com/security/cve/CVE-2022-4438/" source="CVE"/>
		<reference ref_id="CVE-2022-4439" ref_url="https://www.suse.com/security/cve/CVE-2022-4439/" source="CVE"/>
		<reference ref_id="CVE-2022-4440" ref_url="https://www.suse.com/security/cve/CVE-2022-4440/" source="CVE"/>
		<reference ref_id="CVE-2023-0128" ref_url="https://www.suse.com/security/cve/CVE-2023-0128/" source="CVE"/>
		<reference ref_id="CVE-2023-0129" ref_url="https://www.suse.com/security/cve/CVE-2023-0129/" source="CVE"/>
		<reference ref_id="CVE-2023-0130" ref_url="https://www.suse.com/security/cve/CVE-2023-0130/" source="CVE"/>
		<reference ref_id="CVE-2023-0131" ref_url="https://www.suse.com/security/cve/CVE-2023-0131/" source="CVE"/>
		<reference ref_id="CVE-2023-0132" ref_url="https://www.suse.com/security/cve/CVE-2023-0132/" source="CVE"/>
		<reference ref_id="CVE-2023-0133" ref_url="https://www.suse.com/security/cve/CVE-2023-0133/" source="CVE"/>
		<reference ref_id="CVE-2023-0134" ref_url="https://www.suse.com/security/cve/CVE-2023-0134/" source="CVE"/>
		<reference ref_id="CVE-2023-0135" ref_url="https://www.suse.com/security/cve/CVE-2023-0135/" source="CVE"/>
		<reference ref_id="CVE-2023-0136" ref_url="https://www.suse.com/security/cve/CVE-2023-0136/" source="CVE"/>
		<reference ref_id="CVE-2023-0137" ref_url="https://www.suse.com/security/cve/CVE-2023-0137/" source="CVE"/>
		<reference ref_id="CVE-2023-0138" ref_url="https://www.suse.com/security/cve/CVE-2023-0138/" source="CVE"/>
		<reference ref_id="CVE-2023-0139" ref_url="https://www.suse.com/security/cve/CVE-2023-0139/" source="CVE"/>
		<reference ref_id="CVE-2023-0140" ref_url="https://www.suse.com/security/cve/CVE-2023-0140/" source="CVE"/>
		<reference ref_id="CVE-2023-0141" ref_url="https://www.suse.com/security/cve/CVE-2023-0141/" source="CVE"/>
		<reference ref_id="CVE-2023-0471" ref_url="https://www.suse.com/security/cve/CVE-2023-0471/" source="CVE"/>
		<reference ref_id="CVE-2023-0472" ref_url="https://www.suse.com/security/cve/CVE-2023-0472/" source="CVE"/>
		<reference ref_id="CVE-2023-0473" ref_url="https://www.suse.com/security/cve/CVE-2023-0473/" source="CVE"/>
		<reference ref_id="CVE-2023-0474" ref_url="https://www.suse.com/security/cve/CVE-2023-0474/" source="CVE"/>
		<reference ref_id="CVE-2023-0696" ref_url="https://www.suse.com/security/cve/CVE-2023-0696/" source="CVE"/>
		<reference ref_id="CVE-2023-0697" ref_url="https://www.suse.com/security/cve/CVE-2023-0697/" source="CVE"/>
		<reference ref_id="CVE-2023-0698" ref_url="https://www.suse.com/security/cve/CVE-2023-0698/" source="CVE"/>
		<reference ref_id="CVE-2023-0699" ref_url="https://www.suse.com/security/cve/CVE-2023-0699/" source="CVE"/>
		<reference ref_id="CVE-2023-0700" ref_url="https://www.suse.com/security/cve/CVE-2023-0700/" source="CVE"/>
		<reference ref_id="CVE-2023-0701" ref_url="https://www.suse.com/security/cve/CVE-2023-0701/" source="CVE"/>
		<reference ref_id="CVE-2023-0702" ref_url="https://www.suse.com/security/cve/CVE-2023-0702/" source="CVE"/>
		<reference ref_id="CVE-2023-0703" ref_url="https://www.suse.com/security/cve/CVE-2023-0703/" source="CVE"/>
		<reference ref_id="CVE-2023-0704" ref_url="https://www.suse.com/security/cve/CVE-2023-0704/" source="CVE"/>
		<reference ref_id="CVE-2023-0705" ref_url="https://www.suse.com/security/cve/CVE-2023-0705/" source="CVE"/>
		<reference ref_id="CVE-2023-0927" ref_url="https://www.suse.com/security/cve/CVE-2023-0927/" source="CVE"/>
		<reference ref_id="CVE-2023-0928" ref_url="https://www.suse.com/security/cve/CVE-2023-0928/" source="CVE"/>
		<reference ref_id="CVE-2023-0929" ref_url="https://www.suse.com/security/cve/CVE-2023-0929/" source="CVE"/>
		<reference ref_id="CVE-2023-0930" ref_url="https://www.suse.com/security/cve/CVE-2023-0930/" source="CVE"/>
		<reference ref_id="CVE-2023-0931" ref_url="https://www.suse.com/security/cve/CVE-2023-0931/" source="CVE"/>
		<reference ref_id="CVE-2023-0932" ref_url="https://www.suse.com/security/cve/CVE-2023-0932/" source="CVE"/>
		<reference ref_id="CVE-2023-0933" ref_url="https://www.suse.com/security/cve/CVE-2023-0933/" source="CVE"/>
		<reference ref_id="CVE-2023-0941" ref_url="https://www.suse.com/security/cve/CVE-2023-0941/" source="CVE"/>
		<reference ref_id="CVE-2023-1213" ref_url="https://www.suse.com/security/cve/CVE-2023-1213/" source="CVE"/>
		<reference ref_id="CVE-2023-1214" ref_url="https://www.suse.com/security/cve/CVE-2023-1214/" source="CVE"/>
		<reference ref_id="CVE-2023-1215" ref_url="https://www.suse.com/security/cve/CVE-2023-1215/" source="CVE"/>
		<reference ref_id="CVE-2023-1216" ref_url="https://www.suse.com/security/cve/CVE-2023-1216/" source="CVE"/>
		<reference ref_id="CVE-2023-1217" ref_url="https://www.suse.com/security/cve/CVE-2023-1217/" source="CVE"/>
		<reference ref_id="CVE-2023-1218" ref_url="https://www.suse.com/security/cve/CVE-2023-1218/" source="CVE"/>
		<reference ref_id="CVE-2023-1219" ref_url="https://www.suse.com/security/cve/CVE-2023-1219/" source="CVE"/>
		<reference ref_id="CVE-2023-1220" ref_url="https://www.suse.com/security/cve/CVE-2023-1220/" source="CVE"/>
		<reference ref_id="CVE-2023-1221" ref_url="https://www.suse.com/security/cve/CVE-2023-1221/" source="CVE"/>
		<reference ref_id="CVE-2023-1222" ref_url="https://www.suse.com/security/cve/CVE-2023-1222/" source="CVE"/>
		<reference ref_id="CVE-2023-1223" ref_url="https://www.suse.com/security/cve/CVE-2023-1223/" source="CVE"/>
		<reference ref_id="CVE-2023-1224" ref_url="https://www.suse.com/security/cve/CVE-2023-1224/" source="CVE"/>
		<reference ref_id="CVE-2023-1225" ref_url="https://www.suse.com/security/cve/CVE-2023-1225/" source="CVE"/>
		<reference ref_id="CVE-2023-1226" ref_url="https://www.suse.com/security/cve/CVE-2023-1226/" source="CVE"/>
		<reference ref_id="CVE-2023-1227" ref_url="https://www.suse.com/security/cve/CVE-2023-1227/" source="CVE"/>
		<reference ref_id="CVE-2023-1228" ref_url="https://www.suse.com/security/cve/CVE-2023-1228/" source="CVE"/>
		<reference ref_id="CVE-2023-1229" ref_url="https://www.suse.com/security/cve/CVE-2023-1229/" source="CVE"/>
		<reference ref_id="CVE-2023-1230" ref_url="https://www.suse.com/security/cve/CVE-2023-1230/" source="CVE"/>
		<reference ref_id="CVE-2023-1231" ref_url="https://www.suse.com/security/cve/CVE-2023-1231/" source="CVE"/>
		<reference ref_id="CVE-2023-1232" ref_url="https://www.suse.com/security/cve/CVE-2023-1232/" source="CVE"/>
		<reference ref_id="CVE-2023-1233" ref_url="https://www.suse.com/security/cve/CVE-2023-1233/" source="CVE"/>
		<reference ref_id="CVE-2023-1234" ref_url="https://www.suse.com/security/cve/CVE-2023-1234/" source="CVE"/>
		<reference ref_id="CVE-2023-1235" ref_url="https://www.suse.com/security/cve/CVE-2023-1235/" source="CVE"/>
		<reference ref_id="CVE-2023-1236" ref_url="https://www.suse.com/security/cve/CVE-2023-1236/" source="CVE"/>
		<reference ref_id="CVE-2023-1528" ref_url="https://www.suse.com/security/cve/CVE-2023-1528/" source="CVE"/>
		<reference ref_id="CVE-2023-1529" ref_url="https://www.suse.com/security/cve/CVE-2023-1529/" source="CVE"/>
		<reference ref_id="CVE-2023-1530" ref_url="https://www.suse.com/security/cve/CVE-2023-1530/" source="CVE"/>
		<reference ref_id="CVE-2023-1531" ref_url="https://www.suse.com/security/cve/CVE-2023-1531/" source="CVE"/>
		<reference ref_id="CVE-2023-1532" ref_url="https://www.suse.com/security/cve/CVE-2023-1532/" source="CVE"/>
		<reference ref_id="CVE-2023-1533" ref_url="https://www.suse.com/security/cve/CVE-2023-1533/" source="CVE"/>
		<reference ref_id="CVE-2023-1534" ref_url="https://www.suse.com/security/cve/CVE-2023-1534/" source="CVE"/>
		<reference ref_id="CVE-2023-1810" ref_url="https://www.suse.com/security/cve/CVE-2023-1810/" source="CVE"/>
		<reference ref_id="CVE-2023-1811" ref_url="https://www.suse.com/security/cve/CVE-2023-1811/" source="CVE"/>
		<reference ref_id="CVE-2023-1812" ref_url="https://www.suse.com/security/cve/CVE-2023-1812/" source="CVE"/>
		<reference ref_id="CVE-2023-1813" ref_url="https://www.suse.com/security/cve/CVE-2023-1813/" source="CVE"/>
		<reference ref_id="CVE-2023-1814" ref_url="https://www.suse.com/security/cve/CVE-2023-1814/" source="CVE"/>
		<reference ref_id="CVE-2023-1815" ref_url="https://www.suse.com/security/cve/CVE-2023-1815/" source="CVE"/>
		<reference ref_id="CVE-2023-1816" ref_url="https://www.suse.com/security/cve/CVE-2023-1816/" source="CVE"/>
		<reference ref_id="CVE-2023-1817" ref_url="https://www.suse.com/security/cve/CVE-2023-1817/" source="CVE"/>
		<reference ref_id="CVE-2023-1818" ref_url="https://www.suse.com/security/cve/CVE-2023-1818/" source="CVE"/>
		<reference ref_id="CVE-2023-1819" ref_url="https://www.suse.com/security/cve/CVE-2023-1819/" source="CVE"/>
		<reference ref_id="CVE-2023-1820" ref_url="https://www.suse.com/security/cve/CVE-2023-1820/" source="CVE"/>
		<reference ref_id="CVE-2023-1821" ref_url="https://www.suse.com/security/cve/CVE-2023-1821/" source="CVE"/>
		<reference ref_id="CVE-2023-1822" ref_url="https://www.suse.com/security/cve/CVE-2023-1822/" source="CVE"/>
		<reference ref_id="CVE-2023-1823" ref_url="https://www.suse.com/security/cve/CVE-2023-1823/" source="CVE"/>
		<reference ref_id="CVE-2023-2033" ref_url="https://www.suse.com/security/cve/CVE-2023-2033/" source="CVE"/>
		<reference ref_id="CVE-2023-2133" ref_url="https://www.suse.com/security/cve/CVE-2023-2133/" source="CVE"/>
		<reference ref_id="CVE-2023-2134" ref_url="https://www.suse.com/security/cve/CVE-2023-2134/" source="CVE"/>
		<reference ref_id="CVE-2023-2135" ref_url="https://www.suse.com/security/cve/CVE-2023-2135/" source="CVE"/>
		<reference ref_id="CVE-2023-2136" ref_url="https://www.suse.com/security/cve/CVE-2023-2136/" source="CVE"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<reference ref_id="CVE-2023-2459" ref_url="https://www.suse.com/security/cve/CVE-2023-2459/" source="CVE"/>
		<reference ref_id="CVE-2023-2460" ref_url="https://www.suse.com/security/cve/CVE-2023-2460/" source="CVE"/>
		<reference ref_id="CVE-2023-2461" ref_url="https://www.suse.com/security/cve/CVE-2023-2461/" source="CVE"/>
		<reference ref_id="CVE-2023-2462" ref_url="https://www.suse.com/security/cve/CVE-2023-2462/" source="CVE"/>
		<reference ref_id="CVE-2023-2463" ref_url="https://www.suse.com/security/cve/CVE-2023-2463/" source="CVE"/>
		<reference ref_id="CVE-2023-2464" ref_url="https://www.suse.com/security/cve/CVE-2023-2464/" source="CVE"/>
		<reference ref_id="CVE-2023-2465" ref_url="https://www.suse.com/security/cve/CVE-2023-2465/" source="CVE"/>
		<reference ref_id="CVE-2023-2466" ref_url="https://www.suse.com/security/cve/CVE-2023-2466/" source="CVE"/>
		<reference ref_id="CVE-2023-2467" ref_url="https://www.suse.com/security/cve/CVE-2023-2467/" source="CVE"/>
		<reference ref_id="CVE-2023-2468" ref_url="https://www.suse.com/security/cve/CVE-2023-2468/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-113.0.5672.92-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3015/">CVE-2011-3015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3015">CVE-2011-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3016/">CVE-2011-3016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3016">CVE-2011-3016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3017/">CVE-2011-3017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3017">CVE-2011-3017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3018/">CVE-2011-3018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3018">CVE-2011-3018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3019/">CVE-2011-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3019">CVE-2011-3019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3020/">CVE-2011-3020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3020">CVE-2011-3020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3021/">CVE-2011-3021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3021">CVE-2011-3021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3022/">CVE-2011-3022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3022">CVE-2011-3022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3023/">CVE-2011-3023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3023">CVE-2011-3023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3024/">CVE-2011-3024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3024">CVE-2011-3024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3025/">CVE-2011-3025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3025">CVE-2011-3025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3027/">CVE-2011-3027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3027">CVE-2011-3027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3031/">CVE-2011-3031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3031">CVE-2011-3031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3032/">CVE-2011-3032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3032">CVE-2011-3032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3033/">CVE-2011-3033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3033">CVE-2011-3033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3034/">CVE-2011-3034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3034">CVE-2011-3034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3035/">CVE-2011-3035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3035">CVE-2011-3035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3036/">CVE-2011-3036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3036">CVE-2011-3036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3037/">CVE-2011-3037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3037">CVE-2011-3037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3038/">CVE-2011-3038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3038">CVE-2011-3038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3039/">CVE-2011-3039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3039">CVE-2011-3039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3040/">CVE-2011-3040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3040">CVE-2011-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3041/">CVE-2011-3041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3041">CVE-2011-3041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3042/">CVE-2011-3042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3042">CVE-2011-3042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3043/">CVE-2011-3043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3043">CVE-2011-3043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3044/">CVE-2011-3044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3044">CVE-2011-3044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3045">CVE-2011-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3046/">CVE-2011-3046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3046">CVE-2011-3046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3047/">CVE-2011-3047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3047">CVE-2011-3047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3049/">CVE-2011-3049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3049">CVE-2011-3049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3050/">CVE-2011-3050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3050">CVE-2011-3050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3051/">CVE-2011-3051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3051">CVE-2011-3051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3052/">CVE-2011-3052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3052">CVE-2011-3052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3053/">CVE-2011-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3053">CVE-2011-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3054/">CVE-2011-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3054">CVE-2011-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3055/">CVE-2011-3055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3055">CVE-2011-3055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3056/">CVE-2011-3056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3056">CVE-2011-3056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3057/">CVE-2011-3057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3057">CVE-2011-3057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3058/">CVE-2011-3058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3058">CVE-2011-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3059/">CVE-2011-3059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3059">CVE-2011-3059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3060/">CVE-2011-3060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3060">CVE-2011-3060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3061/">CVE-2011-3061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3061">CVE-2011-3061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3063/">CVE-2011-3063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3063">CVE-2011-3063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3064/">CVE-2011-3064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3064">CVE-2011-3064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3065/">CVE-2011-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3065">CVE-2011-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3066/">CVE-2011-3066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3066">CVE-2011-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3067/">CVE-2011-3067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3067">CVE-2011-3067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3068/">CVE-2011-3068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3068">CVE-2011-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3069/">CVE-2011-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3069">CVE-2011-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3070/">CVE-2011-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3070">CVE-2011-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3071/">CVE-2011-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3071">CVE-2011-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3072/">CVE-2011-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3072">CVE-2011-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3073/">CVE-2011-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3073">CVE-2011-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3074/">CVE-2011-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3074">CVE-2011-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3075/">CVE-2011-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3075">CVE-2011-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3076/">CVE-2011-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3076">CVE-2011-3076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3077/">CVE-2011-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3077">CVE-2011-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3078/">CVE-2011-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3078">CVE-2011-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3080/">CVE-2011-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3080">CVE-2011-3080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3081/">CVE-2011-3081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3081">CVE-2011-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3083/">CVE-2011-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3083">CVE-2011-3083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3084/">CVE-2011-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3084">CVE-2011-3084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3085/">CVE-2011-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3085">CVE-2011-3085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3086/">CVE-2011-3086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3086">CVE-2011-3086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3087/">CVE-2011-3087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3087">CVE-2011-3087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3088/">CVE-2011-3088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3088">CVE-2011-3088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3089/">CVE-2011-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3089">CVE-2011-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3090/">CVE-2011-3090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3090">CVE-2011-3090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3091/">CVE-2011-3091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3091">CVE-2011-3091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3092/">CVE-2011-3092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3092">CVE-2011-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3093/">CVE-2011-3093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3093">CVE-2011-3093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3094/">CVE-2011-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3094">CVE-2011-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3095/">CVE-2011-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3095">CVE-2011-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3096/">CVE-2011-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3096">CVE-2011-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3098/">CVE-2011-3098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3098">CVE-2011-3098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3100/">CVE-2011-3100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3100">CVE-2011-3100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3102">CVE-2011-3102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3903/">CVE-2011-3903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3903">CVE-2011-3903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3904/">CVE-2011-3904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3904">CVE-2011-3904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3905/">CVE-2011-3905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3905">CVE-2011-3905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3906/">CVE-2011-3906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3906">CVE-2011-3906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3907/">CVE-2011-3907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3907">CVE-2011-3907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3908/">CVE-2011-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3908">CVE-2011-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3909/">CVE-2011-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3909">CVE-2011-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3910/">CVE-2011-3910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3910">CVE-2011-3910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3911/">CVE-2011-3911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3911">CVE-2011-3911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3912/">CVE-2011-3912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3912">CVE-2011-3912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3914/">CVE-2011-3914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3914">CVE-2011-3914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3915/">CVE-2011-3915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3915">CVE-2011-3915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3916/">CVE-2011-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3916">CVE-2011-3916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3917/">CVE-2011-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3917">CVE-2011-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3919">CVE-2011-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3921/">CVE-2011-3921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3921">CVE-2011-3921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3924/">CVE-2011-3924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3924">CVE-2011-3924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3925/">CVE-2011-3925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3925">CVE-2011-3925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3926/">CVE-2011-3926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3926">CVE-2011-3926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3927/">CVE-2011-3927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3927">CVE-2011-3927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3928/">CVE-2011-3928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3928">CVE-2011-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3953/">CVE-2011-3953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3953">CVE-2011-3953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3954/">CVE-2011-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3954">CVE-2011-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3955/">CVE-2011-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3955">CVE-2011-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3956/">CVE-2011-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3956">CVE-2011-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3957/">CVE-2011-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3957">CVE-2011-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3958/">CVE-2011-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3958">CVE-2011-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3959/">CVE-2011-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3959">CVE-2011-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3960/">CVE-2011-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3960">CVE-2011-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3961/">CVE-2011-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3961">CVE-2011-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3962/">CVE-2011-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3962">CVE-2011-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3963/">CVE-2011-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3963">CVE-2011-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3964/">CVE-2011-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3964">CVE-2011-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3965/">CVE-2011-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3965">CVE-2011-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3966/">CVE-2011-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3966">CVE-2011-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3967/">CVE-2011-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3967">CVE-2011-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3968/">CVE-2011-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3968">CVE-2011-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3969/">CVE-2011-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3969">CVE-2011-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3970">CVE-2011-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3971/">CVE-2011-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3971">CVE-2011-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3972/">CVE-2011-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3972">CVE-2011-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1521/">CVE-2012-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1521">CVE-2012-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2807">CVE-2012-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2815/">CVE-2012-2815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2815">CVE-2012-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2816/">CVE-2012-2816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2816">CVE-2012-2816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2817/">CVE-2012-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2817">CVE-2012-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2818/">CVE-2012-2818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2818">CVE-2012-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2819/">CVE-2012-2819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2819">CVE-2012-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2820/">CVE-2012-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2820">CVE-2012-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2821/">CVE-2012-2821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2821">CVE-2012-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2823/">CVE-2012-2823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2823">CVE-2012-2823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2825">CVE-2012-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2826/">CVE-2012-2826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2826">CVE-2012-2826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2829/">CVE-2012-2829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2829">CVE-2012-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2830/">CVE-2012-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2830">CVE-2012-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2831/">CVE-2012-2831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2831">CVE-2012-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2834/">CVE-2012-2834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2834">CVE-2012-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2842/">CVE-2012-2842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2842">CVE-2012-2842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2843/">CVE-2012-2843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2843">CVE-2012-2843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2865/">CVE-2012-2865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2865">CVE-2012-2865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2866/">CVE-2012-2866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2866">CVE-2012-2866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2867/">CVE-2012-2867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2867">CVE-2012-2867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2868/">CVE-2012-2868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2868">CVE-2012-2868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2869/">CVE-2012-2869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2869">CVE-2012-2869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2870/">CVE-2012-2870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2870">CVE-2012-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2871/">CVE-2012-2871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2871">CVE-2012-2871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2872/">CVE-2012-2872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2872">CVE-2012-2872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2874/">CVE-2012-2874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2874">CVE-2012-2874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2876/">CVE-2012-2876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2876">CVE-2012-2876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2877/">CVE-2012-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2877">CVE-2012-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2878/">CVE-2012-2878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2878">CVE-2012-2878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2879/">CVE-2012-2879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2879">CVE-2012-2879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2880/">CVE-2012-2880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2880">CVE-2012-2880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2881/">CVE-2012-2881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2881">CVE-2012-2881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2882/">CVE-2012-2882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2882">CVE-2012-2882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2883/">CVE-2012-2883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2883">CVE-2012-2883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2884/">CVE-2012-2884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2884">CVE-2012-2884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2885/">CVE-2012-2885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2885">CVE-2012-2885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2886/">CVE-2012-2886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2886">CVE-2012-2886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2887/">CVE-2012-2887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2887">CVE-2012-2887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2888/">CVE-2012-2888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2888">CVE-2012-2888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2889/">CVE-2012-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2889">CVE-2012-2889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2891/">CVE-2012-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2891">CVE-2012-2891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2892/">CVE-2012-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2892">CVE-2012-2892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2893/">CVE-2012-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2893">CVE-2012-2893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2894/">CVE-2012-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2894">CVE-2012-2894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2896/">CVE-2012-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2896">CVE-2012-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5130/">CVE-2012-5130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5130">CVE-2012-5130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5131/">CVE-2012-5131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5131">CVE-2012-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5132/">CVE-2012-5132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5132">CVE-2012-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5133">CVE-2012-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5135/">CVE-2012-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5135">CVE-2012-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5136/">CVE-2012-5136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5136">CVE-2012-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5137/">CVE-2012-5137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5137">CVE-2012-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5138/">CVE-2012-5138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5138">CVE-2012-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5139/">CVE-2012-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5139">CVE-2012-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5140/">CVE-2012-5140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5140">CVE-2012-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5141/">CVE-2012-5141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5141">CVE-2012-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5142/">CVE-2012-5142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5142">CVE-2012-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5143/">CVE-2012-5143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5143">CVE-2012-5143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5144/">CVE-2012-5144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5144">CVE-2012-5144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5145/">CVE-2012-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5145">CVE-2012-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5146/">CVE-2012-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5146">CVE-2012-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5147/">CVE-2012-5147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5147">CVE-2012-5147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5148/">CVE-2012-5148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5148">CVE-2012-5148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5149/">CVE-2012-5149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5149">CVE-2012-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5150/">CVE-2012-5150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5150">CVE-2012-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5152/">CVE-2012-5152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5152">CVE-2012-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5153/">CVE-2012-5153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5153">CVE-2012-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5154/">CVE-2012-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5154">CVE-2012-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0830/">CVE-2013-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0830">CVE-2013-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0831/">CVE-2013-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0831">CVE-2013-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0832/">CVE-2013-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0832">CVE-2013-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0833/">CVE-2013-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0833">CVE-2013-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0834/">CVE-2013-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0834">CVE-2013-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0835/">CVE-2013-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0835">CVE-2013-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0836/">CVE-2013-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0836">CVE-2013-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0837/">CVE-2013-0837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0837">CVE-2013-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0838/">CVE-2013-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0838">CVE-2013-0838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0879/">CVE-2013-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0879">CVE-2013-0879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0880/">CVE-2013-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0880">CVE-2013-0880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0881/">CVE-2013-0881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0881">CVE-2013-0881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0882/">CVE-2013-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0882">CVE-2013-0882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0883/">CVE-2013-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0883">CVE-2013-0883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0884/">CVE-2013-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0884">CVE-2013-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0885/">CVE-2013-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0885">CVE-2013-0885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0886/">CVE-2013-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0886">CVE-2013-0886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0887/">CVE-2013-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0887">CVE-2013-0887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0888/">CVE-2013-0888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0888">CVE-2013-0888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0889/">CVE-2013-0889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0889">CVE-2013-0889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0890/">CVE-2013-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0890">CVE-2013-0890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0891/">CVE-2013-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0891">CVE-2013-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0892/">CVE-2013-0892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0892">CVE-2013-0892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0893/">CVE-2013-0893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0893">CVE-2013-0893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0894/">CVE-2013-0894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0894">CVE-2013-0894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0895/">CVE-2013-0895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0895">CVE-2013-0895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0896/">CVE-2013-0896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0896">CVE-2013-0896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0897/">CVE-2013-0897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0897">CVE-2013-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0898/">CVE-2013-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0898">CVE-2013-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0899/">CVE-2013-0899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0899">CVE-2013-0899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0900/">CVE-2013-0900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0900">CVE-2013-0900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2838/">CVE-2013-2838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2838">CVE-2013-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2906/">CVE-2013-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2906">CVE-2013-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2907/">CVE-2013-2907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2907">CVE-2013-2907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2908/">CVE-2013-2908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2908">CVE-2013-2908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2909/">CVE-2013-2909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2909">CVE-2013-2909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2910/">CVE-2013-2910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2910">CVE-2013-2910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2911/">CVE-2013-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2911">CVE-2013-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2912/">CVE-2013-2912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2912">CVE-2013-2912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2913/">CVE-2013-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2913">CVE-2013-2913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2914/">CVE-2013-2914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2914">CVE-2013-2914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2915/">CVE-2013-2915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2915">CVE-2013-2915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2916/">CVE-2013-2916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2916">CVE-2013-2916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2917/">CVE-2013-2917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2917">CVE-2013-2917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2918/">CVE-2013-2918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2918">CVE-2013-2918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2919/">CVE-2013-2919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2919">CVE-2013-2919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2920/">CVE-2013-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2920">CVE-2013-2920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2921/">CVE-2013-2921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2921">CVE-2013-2921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2922/">CVE-2013-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2922">CVE-2013-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2923/">CVE-2013-2923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2923">CVE-2013-2923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2924/">CVE-2013-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2924">CVE-2013-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2925/">CVE-2013-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2925">CVE-2013-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2926/">CVE-2013-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2926">CVE-2013-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2927/">CVE-2013-2927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2927">CVE-2013-2927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2928/">CVE-2013-2928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2928">CVE-2013-2928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2931/">CVE-2013-2931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2931">CVE-2013-2931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6621/">CVE-2013-6621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6621">CVE-2013-6621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6622/">CVE-2013-6622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6622">CVE-2013-6622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6623/">CVE-2013-6623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6623">CVE-2013-6623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6624/">CVE-2013-6624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6624">CVE-2013-6624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6625/">CVE-2013-6625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6625">CVE-2013-6625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6626/">CVE-2013-6626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6626">CVE-2013-6626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6627/">CVE-2013-6627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6627">CVE-2013-6627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6628/">CVE-2013-6628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6628">CVE-2013-6628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6631/">CVE-2013-6631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6631">CVE-2013-6631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6632/">CVE-2013-6632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6632">CVE-2013-6632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6634/">CVE-2013-6634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6634">CVE-2013-6634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6635/">CVE-2013-6635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6635">CVE-2013-6635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6636/">CVE-2013-6636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6636">CVE-2013-6636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6637/">CVE-2013-6637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6637">CVE-2013-6637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6638/">CVE-2013-6638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6638">CVE-2013-6638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6639">CVE-2013-6639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6640">CVE-2013-6640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6641/">CVE-2013-6641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6641">CVE-2013-6641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6643/">CVE-2013-6643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6643">CVE-2013-6643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6644/">CVE-2013-6644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6644">CVE-2013-6644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6645/">CVE-2013-6645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6645">CVE-2013-6645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6646/">CVE-2013-6646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6646">CVE-2013-6646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6649/">CVE-2013-6649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6649">CVE-2013-6649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6650/">CVE-2013-6650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6650">CVE-2013-6650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6653/">CVE-2013-6653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6653">CVE-2013-6653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6654/">CVE-2013-6654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6654">CVE-2013-6654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6655/">CVE-2013-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6655">CVE-2013-6655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6656/">CVE-2013-6656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6656">CVE-2013-6656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6657/">CVE-2013-6657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6657">CVE-2013-6657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6658/">CVE-2013-6658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6658">CVE-2013-6658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6659/">CVE-2013-6659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6659">CVE-2013-6659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6660/">CVE-2013-6660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6660">CVE-2013-6660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6661/">CVE-2013-6661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6661">CVE-2013-6661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0574">CVE-2014-0574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1700/">CVE-2014-1700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1700">CVE-2014-1700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1701/">CVE-2014-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1701">CVE-2014-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1702/">CVE-2014-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1702">CVE-2014-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1703/">CVE-2014-1703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1703">CVE-2014-1703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1704/">CVE-2014-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1704">CVE-2014-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1705/">CVE-2014-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1705">CVE-2014-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1713/">CVE-2014-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1713">CVE-2014-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1714/">CVE-2014-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1714">CVE-2014-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1715/">CVE-2014-1715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1715">CVE-2014-1715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1716/">CVE-2014-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1716">CVE-2014-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1717/">CVE-2014-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1717">CVE-2014-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1718/">CVE-2014-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1718">CVE-2014-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1719/">CVE-2014-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1719">CVE-2014-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1720/">CVE-2014-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1720">CVE-2014-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1721/">CVE-2014-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1721">CVE-2014-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1722/">CVE-2014-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1722">CVE-2014-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1723/">CVE-2014-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1723">CVE-2014-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1724/">CVE-2014-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1724">CVE-2014-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1725/">CVE-2014-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1725">CVE-2014-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1726/">CVE-2014-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1726">CVE-2014-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1727/">CVE-2014-1727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1727">CVE-2014-1727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1728/">CVE-2014-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1728">CVE-2014-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1729/">CVE-2014-1729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1729">CVE-2014-1729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1730/">CVE-2014-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1730">CVE-2014-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1731/">CVE-2014-1731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1731">CVE-2014-1731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1732/">CVE-2014-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1732">CVE-2014-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1733/">CVE-2014-1733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1733">CVE-2014-1733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1734/">CVE-2014-1734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1734">CVE-2014-1734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1735/">CVE-2014-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1735">CVE-2014-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1740/">CVE-2014-1740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1740">CVE-2014-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1741/">CVE-2014-1741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1741">CVE-2014-1741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1742/">CVE-2014-1742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1742">CVE-2014-1742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1743/">CVE-2014-1743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1743">CVE-2014-1743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1744/">CVE-2014-1744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1744">CVE-2014-1744 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1746/">CVE-2014-1746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1746">CVE-2014-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1747/">CVE-2014-1747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1747">CVE-2014-1747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1748">CVE-2014-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1749/">CVE-2014-1749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1749">CVE-2014-1749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3152/">CVE-2014-3152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3152">CVE-2014-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3154/">CVE-2014-3154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3154">CVE-2014-3154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3155/">CVE-2014-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3155">CVE-2014-3155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3156/">CVE-2014-3156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3156">CVE-2014-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3157/">CVE-2014-3157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3157">CVE-2014-3157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3160/">CVE-2014-3160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3160">CVE-2014-3160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3162/">CVE-2014-3162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3162">CVE-2014-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3165/">CVE-2014-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3165">CVE-2014-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3166/">CVE-2014-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3166">CVE-2014-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3167/">CVE-2014-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3167">CVE-2014-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3168/">CVE-2014-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3168">CVE-2014-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3169/">CVE-2014-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3169">CVE-2014-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3170/">CVE-2014-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3170">CVE-2014-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3171/">CVE-2014-3171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3171">CVE-2014-3171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3172/">CVE-2014-3172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3172">CVE-2014-3172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3173/">CVE-2014-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3173">CVE-2014-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3174/">CVE-2014-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3174">CVE-2014-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3175/">CVE-2014-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3175">CVE-2014-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3176/">CVE-2014-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3176">CVE-2014-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3178/">CVE-2014-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3178">CVE-2014-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3188/">CVE-2014-3188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3188">CVE-2014-3188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3189/">CVE-2014-3189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3189">CVE-2014-3189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3190/">CVE-2014-3190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3190">CVE-2014-3190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3191/">CVE-2014-3191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3191">CVE-2014-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3192/">CVE-2014-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3192">CVE-2014-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3193/">CVE-2014-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3193">CVE-2014-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3194/">CVE-2014-3194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3194">CVE-2014-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3195/">CVE-2014-3195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3195">CVE-2014-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3196/">CVE-2014-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3196">CVE-2014-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3197/">CVE-2014-3197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3197">CVE-2014-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3198/">CVE-2014-3198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3198">CVE-2014-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3199/">CVE-2014-3199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3199">CVE-2014-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3200/">CVE-2014-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3200">CVE-2014-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7899/">CVE-2014-7899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7899">CVE-2014-7899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7900/">CVE-2014-7900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7900">CVE-2014-7900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7901/">CVE-2014-7901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7901">CVE-2014-7901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7902/">CVE-2014-7902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7902">CVE-2014-7902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7903/">CVE-2014-7903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7903">CVE-2014-7903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7904/">CVE-2014-7904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7904">CVE-2014-7904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7905/">CVE-2014-7905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7905">CVE-2014-7905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7906/">CVE-2014-7906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7906">CVE-2014-7906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7907/">CVE-2014-7907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7907">CVE-2014-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7908/">CVE-2014-7908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7908">CVE-2014-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7909/">CVE-2014-7909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7909">CVE-2014-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7910/">CVE-2014-7910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7910">CVE-2014-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7923/">CVE-2014-7923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7923">CVE-2014-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7924/">CVE-2014-7924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7924">CVE-2014-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7925/">CVE-2014-7925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7925">CVE-2014-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7926/">CVE-2014-7926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7926">CVE-2014-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7927/">CVE-2014-7927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7927">CVE-2014-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7928/">CVE-2014-7928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7928">CVE-2014-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7929/">CVE-2014-7929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7929">CVE-2014-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7930/">CVE-2014-7930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7930">CVE-2014-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7932/">CVE-2014-7932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7932">CVE-2014-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7933/">CVE-2014-7933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7933">CVE-2014-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7934/">CVE-2014-7934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7934">CVE-2014-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7935/">CVE-2014-7935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7935">CVE-2014-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7936/">CVE-2014-7936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7936">CVE-2014-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7937/">CVE-2014-7937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7937">CVE-2014-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7938/">CVE-2014-7938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7938">CVE-2014-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7939/">CVE-2014-7939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7939">CVE-2014-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7940/">CVE-2014-7940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7940">CVE-2014-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7941/">CVE-2014-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7941">CVE-2014-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7942/">CVE-2014-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7942">CVE-2014-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7943/">CVE-2014-7943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7943">CVE-2014-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7944/">CVE-2014-7944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7944">CVE-2014-7944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7945/">CVE-2014-7945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7945">CVE-2014-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7946/">CVE-2014-7946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7946">CVE-2014-7946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7947/">CVE-2014-7947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7947">CVE-2014-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7948/">CVE-2014-7948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7948">CVE-2014-7948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1205/">CVE-2015-1205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1205">CVE-2015-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1209/">CVE-2015-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1209">CVE-2015-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1210/">CVE-2015-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1210">CVE-2015-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1211/">CVE-2015-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1211">CVE-2015-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1212/">CVE-2015-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1212">CVE-2015-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1213/">CVE-2015-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1213">CVE-2015-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1214/">CVE-2015-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1214">CVE-2015-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1215/">CVE-2015-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1215">CVE-2015-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1216/">CVE-2015-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1216">CVE-2015-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1217/">CVE-2015-1217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1217">CVE-2015-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1218/">CVE-2015-1218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1218">CVE-2015-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1219/">CVE-2015-1219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1219">CVE-2015-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1220/">CVE-2015-1220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1220">CVE-2015-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1221/">CVE-2015-1221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1221">CVE-2015-1221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1222/">CVE-2015-1222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1222">CVE-2015-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1223/">CVE-2015-1223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1223">CVE-2015-1223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1224/">CVE-2015-1224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1224">CVE-2015-1224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1225/">CVE-2015-1225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1225">CVE-2015-1225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1226/">CVE-2015-1226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1226">CVE-2015-1226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1227/">CVE-2015-1227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1227">CVE-2015-1227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1228/">CVE-2015-1228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1228">CVE-2015-1228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1229/">CVE-2015-1229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1229">CVE-2015-1229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1230/">CVE-2015-1230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1230">CVE-2015-1230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1231/">CVE-2015-1231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1231">CVE-2015-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1233/">CVE-2015-1233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1233">CVE-2015-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1234/">CVE-2015-1234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1234">CVE-2015-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1235/">CVE-2015-1235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1235">CVE-2015-1235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1236/">CVE-2015-1236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1236">CVE-2015-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1237/">CVE-2015-1237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1237">CVE-2015-1237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1238/">CVE-2015-1238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1238">CVE-2015-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1240/">CVE-2015-1240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1240">CVE-2015-1240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1241/">CVE-2015-1241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1241">CVE-2015-1241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1242/">CVE-2015-1242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1242">CVE-2015-1242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1243/">CVE-2015-1243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1243">CVE-2015-1243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1244/">CVE-2015-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1244">CVE-2015-1244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1245/">CVE-2015-1245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1245">CVE-2015-1245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1246/">CVE-2015-1246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1246">CVE-2015-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1247/">CVE-2015-1247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1247">CVE-2015-1247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1248/">CVE-2015-1248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1248">CVE-2015-1248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1249/">CVE-2015-1249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1249">CVE-2015-1249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1250/">CVE-2015-1250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1250">CVE-2015-1250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1251/">CVE-2015-1251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1251">CVE-2015-1251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1252/">CVE-2015-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1252">CVE-2015-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1253/">CVE-2015-1253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1253">CVE-2015-1253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1254/">CVE-2015-1254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1254">CVE-2015-1254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1255/">CVE-2015-1255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1255">CVE-2015-1255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1256/">CVE-2015-1256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1256">CVE-2015-1256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1257/">CVE-2015-1257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1257">CVE-2015-1257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1258/">CVE-2015-1258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1258">CVE-2015-1258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1259/">CVE-2015-1259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1259">CVE-2015-1259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1260/">CVE-2015-1260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1260">CVE-2015-1260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1261/">CVE-2015-1261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1261">CVE-2015-1261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1262/">CVE-2015-1262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1262">CVE-2015-1262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1263/">CVE-2015-1263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1263">CVE-2015-1263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1264/">CVE-2015-1264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1264">CVE-2015-1264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1265/">CVE-2015-1265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1265">CVE-2015-1265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1266/">CVE-2015-1266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1266">CVE-2015-1266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1267/">CVE-2015-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1267">CVE-2015-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1268/">CVE-2015-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1268">CVE-2015-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1269/">CVE-2015-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1269">CVE-2015-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1270/">CVE-2015-1270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1270">CVE-2015-1270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1271/">CVE-2015-1271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1271">CVE-2015-1271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1272/">CVE-2015-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1272">CVE-2015-1272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1273/">CVE-2015-1273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1273">CVE-2015-1273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1274/">CVE-2015-1274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1274">CVE-2015-1274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1275/">CVE-2015-1275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1275">CVE-2015-1275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1276/">CVE-2015-1276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1276">CVE-2015-1276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1277/">CVE-2015-1277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1277">CVE-2015-1277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1278/">CVE-2015-1278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1278">CVE-2015-1278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1279/">CVE-2015-1279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1279">CVE-2015-1279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1280/">CVE-2015-1280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1280">CVE-2015-1280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1281/">CVE-2015-1281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1281">CVE-2015-1281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1282/">CVE-2015-1282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1282">CVE-2015-1282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1284/">CVE-2015-1284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1284">CVE-2015-1284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1285/">CVE-2015-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1285">CVE-2015-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1286/">CVE-2015-1286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1286">CVE-2015-1286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1287/">CVE-2015-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1287">CVE-2015-1287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1288/">CVE-2015-1288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1288">CVE-2015-1288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1289/">CVE-2015-1289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1289">CVE-2015-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1291/">CVE-2015-1291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1291">CVE-2015-1291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1292/">CVE-2015-1292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1292">CVE-2015-1292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1293/">CVE-2015-1293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1293">CVE-2015-1293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1294/">CVE-2015-1294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1294">CVE-2015-1294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1295/">CVE-2015-1295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1295">CVE-2015-1295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1296/">CVE-2015-1296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1296">CVE-2015-1296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1297/">CVE-2015-1297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1297">CVE-2015-1297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1298/">CVE-2015-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1298">CVE-2015-1298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1299/">CVE-2015-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1299">CVE-2015-1299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1300/">CVE-2015-1300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1300">CVE-2015-1300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1301/">CVE-2015-1301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1301">CVE-2015-1301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1302/">CVE-2015-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1302">CVE-2015-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1303/">CVE-2015-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1303">CVE-2015-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1304/">CVE-2015-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1304">CVE-2015-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6755/">CVE-2015-6755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6755">CVE-2015-6755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6756/">CVE-2015-6756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6756">CVE-2015-6756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6757/">CVE-2015-6757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6757">CVE-2015-6757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6758/">CVE-2015-6758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6758">CVE-2015-6758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6759/">CVE-2015-6759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6759">CVE-2015-6759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6760/">CVE-2015-6760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6760">CVE-2015-6760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6761/">CVE-2015-6761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6761">CVE-2015-6761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6762/">CVE-2015-6762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6762">CVE-2015-6762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6763/">CVE-2015-6763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6763">CVE-2015-6763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6764/">CVE-2015-6764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6764">CVE-2015-6764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6765/">CVE-2015-6765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6765">CVE-2015-6765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6766/">CVE-2015-6766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6766">CVE-2015-6766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6767/">CVE-2015-6767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6767">CVE-2015-6767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6768/">CVE-2015-6768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6768">CVE-2015-6768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6769/">CVE-2015-6769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6769">CVE-2015-6769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6770/">CVE-2015-6770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6770">CVE-2015-6770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6771/">CVE-2015-6771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6771">CVE-2015-6771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6772/">CVE-2015-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6772">CVE-2015-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6773/">CVE-2015-6773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6773">CVE-2015-6773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6774/">CVE-2015-6774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6774">CVE-2015-6774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6775/">CVE-2015-6775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6775">CVE-2015-6775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6776/">CVE-2015-6776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6776">CVE-2015-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6777/">CVE-2015-6777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6777">CVE-2015-6777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6778/">CVE-2015-6778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6778">CVE-2015-6778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6779/">CVE-2015-6779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6779">CVE-2015-6779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6780/">CVE-2015-6780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6780">CVE-2015-6780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6781/">CVE-2015-6781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6781">CVE-2015-6781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6782/">CVE-2015-6782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6782">CVE-2015-6782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6783/">CVE-2015-6783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6783">CVE-2015-6783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6784/">CVE-2015-6784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6784">CVE-2015-6784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6785/">CVE-2015-6785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6785">CVE-2015-6785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6786/">CVE-2015-6786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6786">CVE-2015-6786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6787/">CVE-2015-6787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6787">CVE-2015-6787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6788/">CVE-2015-6788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6788">CVE-2015-6788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6789/">CVE-2015-6789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6789">CVE-2015-6789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6790/">CVE-2015-6790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6790">CVE-2015-6790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6791/">CVE-2015-6791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6791">CVE-2015-6791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6792/">CVE-2015-6792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6792">CVE-2015-6792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7834/">CVE-2015-7834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7834">CVE-2015-7834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1612/">CVE-2016-1612 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1612">CVE-2016-1612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1613/">CVE-2016-1613 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1613">CVE-2016-1613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1614/">CVE-2016-1614 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1614">CVE-2016-1614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1615/">CVE-2016-1615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1615">CVE-2016-1615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1616/">CVE-2016-1616 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1616">CVE-2016-1616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1617/">CVE-2016-1617 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1617">CVE-2016-1617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1618/">CVE-2016-1618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1618">CVE-2016-1618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1619/">CVE-2016-1619 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1619">CVE-2016-1619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1620/">CVE-2016-1620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1620">CVE-2016-1620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1622/">CVE-2016-1622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1622">CVE-2016-1622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1623/">CVE-2016-1623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1623">CVE-2016-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1624/">CVE-2016-1624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1624">CVE-2016-1624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1625/">CVE-2016-1625 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1625">CVE-2016-1625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1626/">CVE-2016-1626 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1626">CVE-2016-1626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1627/">CVE-2016-1627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1627">CVE-2016-1627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1629/">CVE-2016-1629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1629">CVE-2016-1629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1630/">CVE-2016-1630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1630">CVE-2016-1630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1631/">CVE-2016-1631 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1631">CVE-2016-1631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1632/">CVE-2016-1632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1632">CVE-2016-1632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1633/">CVE-2016-1633 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1633">CVE-2016-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1634/">CVE-2016-1634 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1634">CVE-2016-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1635/">CVE-2016-1635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1635">CVE-2016-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1636/">CVE-2016-1636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1636">CVE-2016-1636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1637/">CVE-2016-1637 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1637">CVE-2016-1637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1638/">CVE-2016-1638 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1638">CVE-2016-1638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1639/">CVE-2016-1639 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1639">CVE-2016-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1640/">CVE-2016-1640 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1640">CVE-2016-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1641/">CVE-2016-1641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1641">CVE-2016-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1642/">CVE-2016-1642 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1642">CVE-2016-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1643/">CVE-2016-1643 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1643">CVE-2016-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1644/">CVE-2016-1644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1644">CVE-2016-1644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1645/">CVE-2016-1645 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1645">CVE-2016-1645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1646/">CVE-2016-1646 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1646">CVE-2016-1646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1647/">CVE-2016-1647 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1647">CVE-2016-1647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1648/">CVE-2016-1648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1648">CVE-2016-1648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1649/">CVE-2016-1649 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1649">CVE-2016-1649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1650/">CVE-2016-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1650">CVE-2016-1650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1651/">CVE-2016-1651 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1651">CVE-2016-1651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1652/">CVE-2016-1652 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1652">CVE-2016-1652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1653/">CVE-2016-1653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1653">CVE-2016-1653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1654/">CVE-2016-1654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1654">CVE-2016-1654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1655/">CVE-2016-1655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1655">CVE-2016-1655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1656/">CVE-2016-1656 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1656">CVE-2016-1656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1657/">CVE-2016-1657 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1657">CVE-2016-1657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1658/">CVE-2016-1658 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1658">CVE-2016-1658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1659/">CVE-2016-1659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1659">CVE-2016-1659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1660/">CVE-2016-1660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1660">CVE-2016-1660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1661/">CVE-2016-1661 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1661">CVE-2016-1661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1662/">CVE-2016-1662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1662">CVE-2016-1662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1663/">CVE-2016-1663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1663">CVE-2016-1663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1664/">CVE-2016-1664 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1664">CVE-2016-1664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1665/">CVE-2016-1665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1665">CVE-2016-1665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1666/">CVE-2016-1666 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1666">CVE-2016-1666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1667/">CVE-2016-1667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1667">CVE-2016-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1668/">CVE-2016-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1668">CVE-2016-1668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1669/">CVE-2016-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1669">CVE-2016-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1670/">CVE-2016-1670 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1670">CVE-2016-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1672/">CVE-2016-1672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1672">CVE-2016-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1673/">CVE-2016-1673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1673">CVE-2016-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1674/">CVE-2016-1674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1674">CVE-2016-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1675/">CVE-2016-1675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1675">CVE-2016-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1676/">CVE-2016-1676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1676">CVE-2016-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1677/">CVE-2016-1677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1677">CVE-2016-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1678/">CVE-2016-1678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1678">CVE-2016-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1679/">CVE-2016-1679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1679">CVE-2016-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1680/">CVE-2016-1680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1680">CVE-2016-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1681/">CVE-2016-1681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1681">CVE-2016-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1682/">CVE-2016-1682 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1682">CVE-2016-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1683/">CVE-2016-1683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1683">CVE-2016-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1684/">CVE-2016-1684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1684">CVE-2016-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1685/">CVE-2016-1685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1685">CVE-2016-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1686/">CVE-2016-1686 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1686">CVE-2016-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1687/">CVE-2016-1687 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1687">CVE-2016-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1688/">CVE-2016-1688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1688">CVE-2016-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1689/">CVE-2016-1689 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1689">CVE-2016-1689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1690/">CVE-2016-1690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1690">CVE-2016-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1691/">CVE-2016-1691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1691">CVE-2016-1691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1692/">CVE-2016-1692 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1692">CVE-2016-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1693/">CVE-2016-1693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1693">CVE-2016-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1694/">CVE-2016-1694 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1694">CVE-2016-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1695/">CVE-2016-1695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1695">CVE-2016-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1696/">CVE-2016-1696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1696">CVE-2016-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1697/">CVE-2016-1697 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1697">CVE-2016-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1698/">CVE-2016-1698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1698">CVE-2016-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1699/">CVE-2016-1699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1699">CVE-2016-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1700/">CVE-2016-1700 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1700">CVE-2016-1700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1701/">CVE-2016-1701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1701">CVE-2016-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1702/">CVE-2016-1702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1702">CVE-2016-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1703/">CVE-2016-1703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1703">CVE-2016-1703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1704/">CVE-2016-1704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1704">CVE-2016-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1705/">CVE-2016-1705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1705">CVE-2016-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1706/">CVE-2016-1706 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1706">CVE-2016-1706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1707/">CVE-2016-1707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1707">CVE-2016-1707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1708/">CVE-2016-1708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1708">CVE-2016-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1709/">CVE-2016-1709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1709">CVE-2016-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1710/">CVE-2016-1710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1710">CVE-2016-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1711/">CVE-2016-1711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1711">CVE-2016-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3679/">CVE-2016-3679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3679">CVE-2016-3679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5127/">CVE-2016-5127 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5127">CVE-2016-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5128/">CVE-2016-5128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5128">CVE-2016-5128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5129/">CVE-2016-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5129">CVE-2016-5129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5130/">CVE-2016-5130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5130">CVE-2016-5130 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5132/">CVE-2016-5132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5132">CVE-2016-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5133/">CVE-2016-5133 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5133">CVE-2016-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5134/">CVE-2016-5134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5134">CVE-2016-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5135/">CVE-2016-5135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5135">CVE-2016-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5136/">CVE-2016-5136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5136">CVE-2016-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5137/">CVE-2016-5137 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5137">CVE-2016-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5140/">CVE-2016-5140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5140">CVE-2016-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5141/">CVE-2016-5141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5141">CVE-2016-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5142/">CVE-2016-5142 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5142">CVE-2016-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5143/">CVE-2016-5143 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5143">CVE-2016-5143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5144/">CVE-2016-5144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5144">CVE-2016-5144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5145/">CVE-2016-5145 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5145">CVE-2016-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5146/">CVE-2016-5146 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5146">CVE-2016-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5147/">CVE-2016-5147 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5147">CVE-2016-5147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5148/">CVE-2016-5148 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5148">CVE-2016-5148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5149/">CVE-2016-5149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5149">CVE-2016-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5150/">CVE-2016-5150 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5150">CVE-2016-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5151/">CVE-2016-5151 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5151">CVE-2016-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5152">CVE-2016-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5153/">CVE-2016-5153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5153">CVE-2016-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5154/">CVE-2016-5154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5154">CVE-2016-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5155/">CVE-2016-5155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5155">CVE-2016-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5156/">CVE-2016-5156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5156">CVE-2016-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5157/">CVE-2016-5157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5157">CVE-2016-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5159">CVE-2016-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5160/">CVE-2016-5160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5160">CVE-2016-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5161/">CVE-2016-5161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5161">CVE-2016-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5162/">CVE-2016-5162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5162">CVE-2016-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5163/">CVE-2016-5163 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5163">CVE-2016-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5164/">CVE-2016-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5164">CVE-2016-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5165/">CVE-2016-5165 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5165">CVE-2016-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5166/">CVE-2016-5166 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5166">CVE-2016-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5170/">CVE-2016-5170 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5170">CVE-2016-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5171/">CVE-2016-5171 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5171">CVE-2016-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5172">CVE-2016-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5173/">CVE-2016-5173 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5173">CVE-2016-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5174/">CVE-2016-5174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5174">CVE-2016-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5175/">CVE-2016-5175 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5175">CVE-2016-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5177/">CVE-2016-5177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5177">CVE-2016-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5178/">CVE-2016-5178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5178">CVE-2016-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5181/">CVE-2016-5181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5181">CVE-2016-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5182/">CVE-2016-5182 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5182">CVE-2016-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5183/">CVE-2016-5183 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5183">CVE-2016-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5184/">CVE-2016-5184 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5184">CVE-2016-5184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5185/">CVE-2016-5185 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5185">CVE-2016-5185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5186/">CVE-2016-5186 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5186">CVE-2016-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5187/">CVE-2016-5187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5187">CVE-2016-5187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5188/">CVE-2016-5188 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5188">CVE-2016-5188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5189/">CVE-2016-5189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5189">CVE-2016-5189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5190/">CVE-2016-5190 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5190">CVE-2016-5190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5191/">CVE-2016-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5191">CVE-2016-5191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5192/">CVE-2016-5192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5192">CVE-2016-5192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5193/">CVE-2016-5193 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5193">CVE-2016-5193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5198/">CVE-2016-5198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5198">CVE-2016-5198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5199/">CVE-2016-5199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5199">CVE-2016-5199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5200/">CVE-2016-5200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5200">CVE-2016-5200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5201/">CVE-2016-5201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5201">CVE-2016-5201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5202/">CVE-2016-5202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5202">CVE-2016-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5204/">CVE-2016-5204 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5204">CVE-2016-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5211/">CVE-2016-5211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5211">CVE-2016-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5217/">CVE-2016-5217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5217">CVE-2016-5217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5222/">CVE-2016-5222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5222">CVE-2016-5222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5224/">CVE-2016-5224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5224">CVE-2016-5224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9651/">CVE-2016-9651 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9651">CVE-2016-9651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11215/">CVE-2017-11215 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11215">CVE-2017-11215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11225/">CVE-2017-11225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11225">CVE-2017-11225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15386/">CVE-2017-15386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15386">CVE-2017-15386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15387/">CVE-2017-15387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15387">CVE-2017-15387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15388/">CVE-2017-15388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15388">CVE-2017-15388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15389/">CVE-2017-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15389">CVE-2017-15389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15390/">CVE-2017-15390 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15390">CVE-2017-15390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15391/">CVE-2017-15391 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15391">CVE-2017-15391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15392/">CVE-2017-15392 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15392">CVE-2017-15392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15393/">CVE-2017-15393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15393">CVE-2017-15393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15394/">CVE-2017-15394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15394">CVE-2017-15394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15395/">CVE-2017-15395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15395">CVE-2017-15395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15396/">CVE-2017-15396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15396">CVE-2017-15396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15398/">CVE-2017-15398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15398">CVE-2017-15398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15399/">CVE-2017-15399 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15399">CVE-2017-15399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15407/">CVE-2017-15407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15407">CVE-2017-15407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15408/">CVE-2017-15408 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15408">CVE-2017-15408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15409/">CVE-2017-15409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15409">CVE-2017-15409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15410/">CVE-2017-15410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15410">CVE-2017-15410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15411/">CVE-2017-15411 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15411">CVE-2017-15411 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15413/">CVE-2017-15413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15413">CVE-2017-15413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15415/">CVE-2017-15415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15415">CVE-2017-15415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15416/">CVE-2017-15416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15416">CVE-2017-15416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15417/">CVE-2017-15417 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15417">CVE-2017-15417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15418/">CVE-2017-15418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15418">CVE-2017-15418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15419/">CVE-2017-15419 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15419">CVE-2017-15419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15420/">CVE-2017-15420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15420">CVE-2017-15420 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15423/">CVE-2017-15423 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15423">CVE-2017-15423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15424/">CVE-2017-15424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15424">CVE-2017-15424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15425/">CVE-2017-15425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15425">CVE-2017-15425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15426/">CVE-2017-15426 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15426">CVE-2017-15426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15427/">CVE-2017-15427 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15427">CVE-2017-15427 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15429/">CVE-2017-15429 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15429">CVE-2017-15429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15430/">CVE-2017-15430 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15430">CVE-2017-15430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5006/">CVE-2017-5006 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5006">CVE-2017-5006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5007/">CVE-2017-5007 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5007">CVE-2017-5007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5008/">CVE-2017-5008 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5008">CVE-2017-5008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5009/">CVE-2017-5009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5009">CVE-2017-5009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5010/">CVE-2017-5010 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5010">CVE-2017-5010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5011/">CVE-2017-5011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5011">CVE-2017-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5012/">CVE-2017-5012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5012">CVE-2017-5012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5013/">CVE-2017-5013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5013">CVE-2017-5013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5014/">CVE-2017-5014 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5014">CVE-2017-5014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5015/">CVE-2017-5015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5015">CVE-2017-5015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5016/">CVE-2017-5016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5016">CVE-2017-5016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5017/">CVE-2017-5017 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5017">CVE-2017-5017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5018/">CVE-2017-5018 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5018">CVE-2017-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5019/">CVE-2017-5019 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5019">CVE-2017-5019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5020/">CVE-2017-5020 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5020">CVE-2017-5020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5021/">CVE-2017-5021 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5021">CVE-2017-5021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5022/">CVE-2017-5022 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5022">CVE-2017-5022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5023/">CVE-2017-5023 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5023">CVE-2017-5023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5024/">CVE-2017-5024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5024">CVE-2017-5024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5025/">CVE-2017-5025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5025">CVE-2017-5025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5026/">CVE-2017-5026 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5026">CVE-2017-5026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5030/">CVE-2017-5030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5030">CVE-2017-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5035/">CVE-2017-5035 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5035">CVE-2017-5035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5041/">CVE-2017-5041 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5041">CVE-2017-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5044/">CVE-2017-5044 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5044">CVE-2017-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5052/">CVE-2017-5052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5052">CVE-2017-5052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5053/">CVE-2017-5053 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5053">CVE-2017-5053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5054/">CVE-2017-5054 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5054">CVE-2017-5054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5055/">CVE-2017-5055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5055">CVE-2017-5055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5056/">CVE-2017-5056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5056">CVE-2017-5056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5057/">CVE-2017-5057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5057">CVE-2017-5057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5058/">CVE-2017-5058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5058">CVE-2017-5058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5059/">CVE-2017-5059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5059">CVE-2017-5059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5060/">CVE-2017-5060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5060">CVE-2017-5060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5061/">CVE-2017-5061 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5061">CVE-2017-5061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5062/">CVE-2017-5062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5062">CVE-2017-5062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5063/">CVE-2017-5063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5063">CVE-2017-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5064/">CVE-2017-5064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5064">CVE-2017-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5065/">CVE-2017-5065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5065">CVE-2017-5065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5066/">CVE-2017-5066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5066">CVE-2017-5066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5067/">CVE-2017-5067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5067">CVE-2017-5067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5068/">CVE-2017-5068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5068">CVE-2017-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5069/">CVE-2017-5069 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5069">CVE-2017-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5070/">CVE-2017-5070 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5070">CVE-2017-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5071/">CVE-2017-5071 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5071">CVE-2017-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5072/">CVE-2017-5072 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5072">CVE-2017-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5073/">CVE-2017-5073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5073">CVE-2017-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5074/">CVE-2017-5074 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5074">CVE-2017-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5075/">CVE-2017-5075 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5075">CVE-2017-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5076/">CVE-2017-5076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5076">CVE-2017-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5077/">CVE-2017-5077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5077">CVE-2017-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5078/">CVE-2017-5078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5078">CVE-2017-5078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5079/">CVE-2017-5079 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5079">CVE-2017-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5080/">CVE-2017-5080 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5080">CVE-2017-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5081/">CVE-2017-5081 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5081">CVE-2017-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5082/">CVE-2017-5082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5082">CVE-2017-5082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5083/">CVE-2017-5083 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5083">CVE-2017-5083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5085/">CVE-2017-5085 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5085">CVE-2017-5085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5086/">CVE-2017-5086 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5086">CVE-2017-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5087/">CVE-2017-5087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5087">CVE-2017-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5088/">CVE-2017-5088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5088">CVE-2017-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5089/">CVE-2017-5089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5089">CVE-2017-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5091/">CVE-2017-5091 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5091">CVE-2017-5091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5092/">CVE-2017-5092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5092">CVE-2017-5092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5093/">CVE-2017-5093 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5093">CVE-2017-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5094/">CVE-2017-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5094">CVE-2017-5094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5095/">CVE-2017-5095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5095">CVE-2017-5095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5096/">CVE-2017-5096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5096">CVE-2017-5096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5097/">CVE-2017-5097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5097">CVE-2017-5097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5098/">CVE-2017-5098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5098">CVE-2017-5098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5099/">CVE-2017-5099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5099">CVE-2017-5099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5100/">CVE-2017-5100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5100">CVE-2017-5100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5101/">CVE-2017-5101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5101">CVE-2017-5101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5102/">CVE-2017-5102 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5102">CVE-2017-5102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5103/">CVE-2017-5103 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5103">CVE-2017-5103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5104/">CVE-2017-5104 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5104">CVE-2017-5104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5105/">CVE-2017-5105 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5105">CVE-2017-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5106/">CVE-2017-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5106">CVE-2017-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5107/">CVE-2017-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5107">CVE-2017-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5108/">CVE-2017-5108 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5108">CVE-2017-5108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5109/">CVE-2017-5109 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5109">CVE-2017-5109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5110/">CVE-2017-5110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5110">CVE-2017-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5111/">CVE-2017-5111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5111">CVE-2017-5111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5112/">CVE-2017-5112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5112">CVE-2017-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5113/">CVE-2017-5113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5113">CVE-2017-5113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5114/">CVE-2017-5114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5114">CVE-2017-5114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5115/">CVE-2017-5115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5115">CVE-2017-5115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5116/">CVE-2017-5116 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5116">CVE-2017-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5117/">CVE-2017-5117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5117">CVE-2017-5117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5118/">CVE-2017-5118 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5118">CVE-2017-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5119/">CVE-2017-5119 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5119">CVE-2017-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5120/">CVE-2017-5120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5120">CVE-2017-5120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5121/">CVE-2017-5121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5121">CVE-2017-5121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5122/">CVE-2017-5122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5122">CVE-2017-5122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5124/">CVE-2017-5124 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5124">CVE-2017-5124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5125/">CVE-2017-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5125">CVE-2017-5125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5126/">CVE-2017-5126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5126">CVE-2017-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5127/">CVE-2017-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5127">CVE-2017-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5128/">CVE-2017-5128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5128">CVE-2017-5128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5129/">CVE-2017-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5129">CVE-2017-5129 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5131/">CVE-2017-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5131">CVE-2017-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5132/">CVE-2017-5132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5132">CVE-2017-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5133/">CVE-2017-5133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5133">CVE-2017-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7000/">CVE-2017-7000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7000">CVE-2017-7000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16065/">CVE-2018-16065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16065">CVE-2018-16065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16066/">CVE-2018-16066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16066">CVE-2018-16066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16067/">CVE-2018-16067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16067">CVE-2018-16067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16068/">CVE-2018-16068 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16068">CVE-2018-16068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16069/">CVE-2018-16069 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16069">CVE-2018-16069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16070/">CVE-2018-16070 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16070">CVE-2018-16070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16071/">CVE-2018-16071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16071">CVE-2018-16071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16073/">CVE-2018-16073 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16073">CVE-2018-16073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16074/">CVE-2018-16074 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16074">CVE-2018-16074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16075/">CVE-2018-16075 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16075">CVE-2018-16075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16076/">CVE-2018-16076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16076">CVE-2018-16076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16077/">CVE-2018-16077 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16077">CVE-2018-16077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16078/">CVE-2018-16078 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16078">CVE-2018-16078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16079/">CVE-2018-16079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16079">CVE-2018-16079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16080/">CVE-2018-16080 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16080">CVE-2018-16080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16081/">CVE-2018-16081 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16081">CVE-2018-16081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16082/">CVE-2018-16082 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16082">CVE-2018-16082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16083/">CVE-2018-16083 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16083">CVE-2018-16083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16084/">CVE-2018-16084 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16084">CVE-2018-16084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16085/">CVE-2018-16085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16085">CVE-2018-16085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16086/">CVE-2018-16086 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16086">CVE-2018-16086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16087/">CVE-2018-16087 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16087">CVE-2018-16087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16088/">CVE-2018-16088 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16088">CVE-2018-16088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17462/">CVE-2018-17462 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17462">CVE-2018-17462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17463/">CVE-2018-17463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17463">CVE-2018-17463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17464/">CVE-2018-17464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17464">CVE-2018-17464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17465/">CVE-2018-17465 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17465">CVE-2018-17465 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17467/">CVE-2018-17467 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17467">CVE-2018-17467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17468/">CVE-2018-17468 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17468">CVE-2018-17468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17469/">CVE-2018-17469 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17469">CVE-2018-17469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17470/">CVE-2018-17470 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17470">CVE-2018-17470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17471/">CVE-2018-17471 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17471">CVE-2018-17471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17472/">CVE-2018-17472 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17472">CVE-2018-17472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17473/">CVE-2018-17473 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17473">CVE-2018-17473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17474/">CVE-2018-17474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17474">CVE-2018-17474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17475/">CVE-2018-17475 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17475">CVE-2018-17475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17476/">CVE-2018-17476 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17476">CVE-2018-17476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17477/">CVE-2018-17477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17477">CVE-2018-17477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17478/">CVE-2018-17478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17478">CVE-2018-17478 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17479/">CVE-2018-17479 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17479">CVE-2018-17479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17480/">CVE-2018-17480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17480">CVE-2018-17480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17481/">CVE-2018-17481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17481">CVE-2018-17481 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18336/">CVE-2018-18336 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18336">CVE-2018-18336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18337/">CVE-2018-18337 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18337">CVE-2018-18337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18338/">CVE-2018-18338 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18338">CVE-2018-18338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18339/">CVE-2018-18339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18339">CVE-2018-18339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18340/">CVE-2018-18340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18340">CVE-2018-18340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18341/">CVE-2018-18341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18341">CVE-2018-18341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18342/">CVE-2018-18342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18342">CVE-2018-18342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18343/">CVE-2018-18343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18343">CVE-2018-18343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18344/">CVE-2018-18344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18344">CVE-2018-18344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18345/">CVE-2018-18345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18345">CVE-2018-18345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18346/">CVE-2018-18346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18346">CVE-2018-18346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18347/">CVE-2018-18347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18347">CVE-2018-18347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18348/">CVE-2018-18348 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18348">CVE-2018-18348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18349/">CVE-2018-18349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18349">CVE-2018-18349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18350/">CVE-2018-18350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18350">CVE-2018-18350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18351/">CVE-2018-18351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18351">CVE-2018-18351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18352/">CVE-2018-18352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18352">CVE-2018-18352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18353/">CVE-2018-18353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18353">CVE-2018-18353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18354/">CVE-2018-18354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18354">CVE-2018-18354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18355/">CVE-2018-18355 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18355">CVE-2018-18355 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18357/">CVE-2018-18357 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18357">CVE-2018-18357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18358/">CVE-2018-18358 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18358">CVE-2018-18358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18359/">CVE-2018-18359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18359">CVE-2018-18359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20073/">CVE-2018-20073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20073">CVE-2018-20073 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6031/">CVE-2018-6031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6031">CVE-2018-6031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6032/">CVE-2018-6032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6032">CVE-2018-6032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6033/">CVE-2018-6033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6033">CVE-2018-6033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6034/">CVE-2018-6034 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6034">CVE-2018-6034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6035/">CVE-2018-6035 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6035">CVE-2018-6035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6036/">CVE-2018-6036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6036">CVE-2018-6036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6037/">CVE-2018-6037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6037">CVE-2018-6037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6038/">CVE-2018-6038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6038">CVE-2018-6038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6039/">CVE-2018-6039 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6039">CVE-2018-6039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6040/">CVE-2018-6040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6040">CVE-2018-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6041/">CVE-2018-6041 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6041">CVE-2018-6041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6042/">CVE-2018-6042 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6042">CVE-2018-6042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6043/">CVE-2018-6043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6043">CVE-2018-6043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6044/">CVE-2018-6044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-6044">CVE-2018-6044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6045/">CVE-2018-6045 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6045">CVE-2018-6045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6046/">CVE-2018-6046 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6046">CVE-2018-6046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6047/">CVE-2018-6047 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6047">CVE-2018-6047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6048/">CVE-2018-6048 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6048">CVE-2018-6048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6049/">CVE-2018-6049 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6049">CVE-2018-6049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6050/">CVE-2018-6050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6050">CVE-2018-6050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6051/">CVE-2018-6051 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6051">CVE-2018-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6052/">CVE-2018-6052 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6052">CVE-2018-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6053/">CVE-2018-6053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6053">CVE-2018-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6054/">CVE-2018-6054 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6054">CVE-2018-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6056/">CVE-2018-6056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6056">CVE-2018-6056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6057/">CVE-2018-6057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6057">CVE-2018-6057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6060/">CVE-2018-6060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6060">CVE-2018-6060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6061/">CVE-2018-6061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6061">CVE-2018-6061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6062/">CVE-2018-6062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6062">CVE-2018-6062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6063/">CVE-2018-6063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6063">CVE-2018-6063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6064/">CVE-2018-6064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6064">CVE-2018-6064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6065/">CVE-2018-6065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6065">CVE-2018-6065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6066/">CVE-2018-6066 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6066">CVE-2018-6066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6067/">CVE-2018-6067 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6067">CVE-2018-6067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6068/">CVE-2018-6068 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6068">CVE-2018-6068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6069/">CVE-2018-6069 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6069">CVE-2018-6069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6070/">CVE-2018-6070 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6070">CVE-2018-6070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6071/">CVE-2018-6071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6071">CVE-2018-6071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6072/">CVE-2018-6072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6072">CVE-2018-6072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6073/">CVE-2018-6073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6073">CVE-2018-6073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6074/">CVE-2018-6074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6074">CVE-2018-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6075/">CVE-2018-6075 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6075">CVE-2018-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6076/">CVE-2018-6076 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6076">CVE-2018-6076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6077/">CVE-2018-6077 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6077">CVE-2018-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6078/">CVE-2018-6078 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6078">CVE-2018-6078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6079/">CVE-2018-6079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6079">CVE-2018-6079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6080/">CVE-2018-6080 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6080">CVE-2018-6080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6081/">CVE-2018-6081 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6081">CVE-2018-6081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6082/">CVE-2018-6082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6082">CVE-2018-6082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6083/">CVE-2018-6083 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6083">CVE-2018-6083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6085/">CVE-2018-6085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6085">CVE-2018-6085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6086/">CVE-2018-6086 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6086">CVE-2018-6086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6087/">CVE-2018-6087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6087">CVE-2018-6087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6088/">CVE-2018-6088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6088">CVE-2018-6088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6089/">CVE-2018-6089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6089">CVE-2018-6089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6090/">CVE-2018-6090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6090">CVE-2018-6090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6091/">CVE-2018-6091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6091">CVE-2018-6091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6092/">CVE-2018-6092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6092">CVE-2018-6092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6093/">CVE-2018-6093 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6093">CVE-2018-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6094/">CVE-2018-6094 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6094">CVE-2018-6094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6095/">CVE-2018-6095 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6095">CVE-2018-6095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6096/">CVE-2018-6096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6096">CVE-2018-6096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6097/">CVE-2018-6097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6097">CVE-2018-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6098/">CVE-2018-6098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6098">CVE-2018-6098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6099/">CVE-2018-6099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6099">CVE-2018-6099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6100/">CVE-2018-6100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6100">CVE-2018-6100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6101/">CVE-2018-6101 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6101">CVE-2018-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6102/">CVE-2018-6102 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6102">CVE-2018-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6103/">CVE-2018-6103 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6103">CVE-2018-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6104/">CVE-2018-6104 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6104">CVE-2018-6104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6105/">CVE-2018-6105 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6105">CVE-2018-6105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6106/">CVE-2018-6106 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6106">CVE-2018-6106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6107/">CVE-2018-6107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6107">CVE-2018-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6108/">CVE-2018-6108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6108">CVE-2018-6108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6109/">CVE-2018-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6109">CVE-2018-6109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6110/">CVE-2018-6110 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6110">CVE-2018-6110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6111/">CVE-2018-6111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6111">CVE-2018-6111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6112/">CVE-2018-6112 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6112">CVE-2018-6112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6113/">CVE-2018-6113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6113">CVE-2018-6113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6114/">CVE-2018-6114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6114">CVE-2018-6114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6115/">CVE-2018-6115 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6115">CVE-2018-6115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6116/">CVE-2018-6116 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6116">CVE-2018-6116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6117/">CVE-2018-6117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6117">CVE-2018-6117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6118/">CVE-2018-6118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6118">CVE-2018-6118 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6120/">CVE-2018-6120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6120">CVE-2018-6120 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6121/">CVE-2018-6121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6121">CVE-2018-6121 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6122/">CVE-2018-6122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6122">CVE-2018-6122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6123/">CVE-2018-6123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6123">CVE-2018-6123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6124/">CVE-2018-6124 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6124">CVE-2018-6124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6125/">CVE-2018-6125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6125">CVE-2018-6125 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6127/">CVE-2018-6127 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6127">CVE-2018-6127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6128/">CVE-2018-6128 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6128">CVE-2018-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6129/">CVE-2018-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6129">CVE-2018-6129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6130/">CVE-2018-6130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6130">CVE-2018-6130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6131/">CVE-2018-6131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6131">CVE-2018-6131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6132/">CVE-2018-6132 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6132">CVE-2018-6132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6133/">CVE-2018-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6133">CVE-2018-6133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6134/">CVE-2018-6134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6134">CVE-2018-6134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6135/">CVE-2018-6135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6135">CVE-2018-6135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6136/">CVE-2018-6136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6136">CVE-2018-6136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6137/">CVE-2018-6137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6137">CVE-2018-6137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6138/">CVE-2018-6138 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6138">CVE-2018-6138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6139/">CVE-2018-6139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6139">CVE-2018-6139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6140/">CVE-2018-6140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6140">CVE-2018-6140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6141/">CVE-2018-6141 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6141">CVE-2018-6141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6142/">CVE-2018-6142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6142">CVE-2018-6142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6143/">CVE-2018-6143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6143">CVE-2018-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6144/">CVE-2018-6144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6144">CVE-2018-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6145/">CVE-2018-6145 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6145">CVE-2018-6145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6147/">CVE-2018-6147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6147">CVE-2018-6147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6148/">CVE-2018-6148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6148">CVE-2018-6148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6149/">CVE-2018-6149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6149">CVE-2018-6149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6153/">CVE-2018-6153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6153">CVE-2018-6153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6154/">CVE-2018-6154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6154">CVE-2018-6154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6155/">CVE-2018-6155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6155">CVE-2018-6155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6156/">CVE-2018-6156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6156">CVE-2018-6156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6157/">CVE-2018-6157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6157">CVE-2018-6157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6158/">CVE-2018-6158 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6158">CVE-2018-6158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6159/">CVE-2018-6159 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6159">CVE-2018-6159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6160/">CVE-2018-6160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6160">CVE-2018-6160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6161/">CVE-2018-6161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6161">CVE-2018-6161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6162/">CVE-2018-6162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6162">CVE-2018-6162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6163/">CVE-2018-6163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6163">CVE-2018-6163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6164/">CVE-2018-6164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6164">CVE-2018-6164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6165/">CVE-2018-6165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6165">CVE-2018-6165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6166/">CVE-2018-6166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6166">CVE-2018-6166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6167/">CVE-2018-6167 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6167">CVE-2018-6167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6168/">CVE-2018-6168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6168">CVE-2018-6168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6169/">CVE-2018-6169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6169">CVE-2018-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6170/">CVE-2018-6170 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6170">CVE-2018-6170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6171/">CVE-2018-6171 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6171">CVE-2018-6171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6172/">CVE-2018-6172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6172">CVE-2018-6172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6173/">CVE-2018-6173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6173">CVE-2018-6173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6174/">CVE-2018-6174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6174">CVE-2018-6174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6175/">CVE-2018-6175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6175">CVE-2018-6175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6176/">CVE-2018-6176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6176">CVE-2018-6176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6177/">CVE-2018-6177 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6177">CVE-2018-6177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6178/">CVE-2018-6178 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6178">CVE-2018-6178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6179/">CVE-2018-6179 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6179">CVE-2018-6179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6406/">CVE-2018-6406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6406">CVE-2018-6406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13659/">CVE-2019-13659 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13659">CVE-2019-13659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13660/">CVE-2019-13660 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13660">CVE-2019-13660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13661/">CVE-2019-13661 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13661">CVE-2019-13661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13662/">CVE-2019-13662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13662">CVE-2019-13662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13663/">CVE-2019-13663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13663">CVE-2019-13663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13664/">CVE-2019-13664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13664">CVE-2019-13664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13665/">CVE-2019-13665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13665">CVE-2019-13665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13666/">CVE-2019-13666 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13666">CVE-2019-13666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13667/">CVE-2019-13667 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13667">CVE-2019-13667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13668/">CVE-2019-13668 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13668">CVE-2019-13668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13669/">CVE-2019-13669 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13669">CVE-2019-13669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13670/">CVE-2019-13670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13670">CVE-2019-13670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13671/">CVE-2019-13671 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13671">CVE-2019-13671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13673/">CVE-2019-13673 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13673">CVE-2019-13673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13674/">CVE-2019-13674 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13674">CVE-2019-13674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13675/">CVE-2019-13675 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13675">CVE-2019-13675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13676/">CVE-2019-13676 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13676">CVE-2019-13676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13677/">CVE-2019-13677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13677">CVE-2019-13677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13678/">CVE-2019-13678 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13678">CVE-2019-13678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13679/">CVE-2019-13679 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13679">CVE-2019-13679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13680/">CVE-2019-13680 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13680">CVE-2019-13680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13681/">CVE-2019-13681 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13681">CVE-2019-13681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13682/">CVE-2019-13682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13682">CVE-2019-13682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13683/">CVE-2019-13683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13683">CVE-2019-13683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13685/">CVE-2019-13685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13685">CVE-2019-13685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13686/">CVE-2019-13686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13686">CVE-2019-13686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13687/">CVE-2019-13687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13687">CVE-2019-13687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13688/">CVE-2019-13688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13688">CVE-2019-13688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13693/">CVE-2019-13693 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13693">CVE-2019-13693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13694/">CVE-2019-13694 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13694">CVE-2019-13694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13695/">CVE-2019-13695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13695">CVE-2019-13695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13696/">CVE-2019-13696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13696">CVE-2019-13696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13697/">CVE-2019-13697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13697">CVE-2019-13697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13699/">CVE-2019-13699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13699">CVE-2019-13699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13700/">CVE-2019-13700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13700">CVE-2019-13700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13701/">CVE-2019-13701 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13701">CVE-2019-13701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13702/">CVE-2019-13702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13702">CVE-2019-13702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13703/">CVE-2019-13703 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13703">CVE-2019-13703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13704/">CVE-2019-13704 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13704">CVE-2019-13704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13705/">CVE-2019-13705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13705">CVE-2019-13705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13706/">CVE-2019-13706 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13706">CVE-2019-13706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13707/">CVE-2019-13707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13707">CVE-2019-13707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13708/">CVE-2019-13708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13708">CVE-2019-13708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13709/">CVE-2019-13709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13709">CVE-2019-13709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13710/">CVE-2019-13710 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13710">CVE-2019-13710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13711/">CVE-2019-13711 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13711">CVE-2019-13711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13713/">CVE-2019-13713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13713">CVE-2019-13713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13714/">CVE-2019-13714 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13714">CVE-2019-13714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13715/">CVE-2019-13715 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13715">CVE-2019-13715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13716/">CVE-2019-13716 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13716">CVE-2019-13716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13717/">CVE-2019-13717 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13717">CVE-2019-13717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13718/">CVE-2019-13718 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13718">CVE-2019-13718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13719/">CVE-2019-13719 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13719">CVE-2019-13719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13720/">CVE-2019-13720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13720">CVE-2019-13720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13721/">CVE-2019-13721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13721">CVE-2019-13721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13723/">CVE-2019-13723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13723">CVE-2019-13723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13724/">CVE-2019-13724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13724">CVE-2019-13724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13725/">CVE-2019-13725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13725">CVE-2019-13725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13726/">CVE-2019-13726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13726">CVE-2019-13726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13727/">CVE-2019-13727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13727">CVE-2019-13727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13728/">CVE-2019-13728 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13728">CVE-2019-13728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13729/">CVE-2019-13729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13729">CVE-2019-13729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13730/">CVE-2019-13730 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13730">CVE-2019-13730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13732/">CVE-2019-13732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13732">CVE-2019-13732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13734">CVE-2019-13734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13735/">CVE-2019-13735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13735">CVE-2019-13735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13736/">CVE-2019-13736 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13736">CVE-2019-13736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13737/">CVE-2019-13737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13737">CVE-2019-13737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13738/">CVE-2019-13738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13738">CVE-2019-13738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13739/">CVE-2019-13739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13739">CVE-2019-13739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13740/">CVE-2019-13740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13740">CVE-2019-13740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13741/">CVE-2019-13741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13741">CVE-2019-13741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13742/">CVE-2019-13742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13742">CVE-2019-13742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13743/">CVE-2019-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13743">CVE-2019-13743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13744/">CVE-2019-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13744">CVE-2019-13744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13745/">CVE-2019-13745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13745">CVE-2019-13745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13746/">CVE-2019-13746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13746">CVE-2019-13746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13747/">CVE-2019-13747 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13747">CVE-2019-13747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13748/">CVE-2019-13748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13748">CVE-2019-13748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13749/">CVE-2019-13749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13749">CVE-2019-13749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13750/">CVE-2019-13750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13750">CVE-2019-13750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13751/">CVE-2019-13751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13751">CVE-2019-13751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13752/">CVE-2019-13752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13752">CVE-2019-13752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13753/">CVE-2019-13753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13753">CVE-2019-13753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13754/">CVE-2019-13754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13754">CVE-2019-13754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13755/">CVE-2019-13755 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13755">CVE-2019-13755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13756/">CVE-2019-13756 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13756">CVE-2019-13756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13757/">CVE-2019-13757 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13757">CVE-2019-13757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13758/">CVE-2019-13758 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13758">CVE-2019-13758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13759/">CVE-2019-13759 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13759">CVE-2019-13759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13761/">CVE-2019-13761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13761">CVE-2019-13761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13762/">CVE-2019-13762 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13762">CVE-2019-13762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13763/">CVE-2019-13763 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13763">CVE-2019-13763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13764/">CVE-2019-13764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13764">CVE-2019-13764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13767/">CVE-2019-13767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13767">CVE-2019-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5754/">CVE-2019-5754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5754">CVE-2019-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5755/">CVE-2019-5755 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5755">CVE-2019-5755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5756/">CVE-2019-5756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5756">CVE-2019-5756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5757/">CVE-2019-5757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5757">CVE-2019-5757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5758/">CVE-2019-5758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5758">CVE-2019-5758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5759/">CVE-2019-5759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5759">CVE-2019-5759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5760/">CVE-2019-5760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5760">CVE-2019-5760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5761/">CVE-2019-5761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5761">CVE-2019-5761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5762/">CVE-2019-5762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5762">CVE-2019-5762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5763/">CVE-2019-5763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5763">CVE-2019-5763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5764/">CVE-2019-5764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5764">CVE-2019-5764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5765/">CVE-2019-5765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5765">CVE-2019-5765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5766/">CVE-2019-5766 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5766">CVE-2019-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5767/">CVE-2019-5767 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5767">CVE-2019-5767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5768/">CVE-2019-5768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5768">CVE-2019-5768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5769/">CVE-2019-5769 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5769">CVE-2019-5769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5770/">CVE-2019-5770 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5770">CVE-2019-5770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5771/">CVE-2019-5771 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5771">CVE-2019-5771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5772/">CVE-2019-5772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5772">CVE-2019-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5773/">CVE-2019-5773 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5773">CVE-2019-5773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5774/">CVE-2019-5774 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5774">CVE-2019-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5775/">CVE-2019-5775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5775">CVE-2019-5775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5776/">CVE-2019-5776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5776">CVE-2019-5776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5777/">CVE-2019-5777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5777">CVE-2019-5777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5778/">CVE-2019-5778 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5778">CVE-2019-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5779/">CVE-2019-5779 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5779">CVE-2019-5779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5780/">CVE-2019-5780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5780">CVE-2019-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5781/">CVE-2019-5781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5781">CVE-2019-5781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5782/">CVE-2019-5782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5782">CVE-2019-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5784/">CVE-2019-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5784">CVE-2019-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5786/">CVE-2019-5786 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5786">CVE-2019-5786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5787/">CVE-2019-5787 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5787">CVE-2019-5787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5788/">CVE-2019-5788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5788">CVE-2019-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5789/">CVE-2019-5789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5789">CVE-2019-5789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5790/">CVE-2019-5790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5790">CVE-2019-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5791/">CVE-2019-5791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5791">CVE-2019-5791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5792/">CVE-2019-5792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5792">CVE-2019-5792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5793/">CVE-2019-5793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5793">CVE-2019-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5794/">CVE-2019-5794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5794">CVE-2019-5794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5795/">CVE-2019-5795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5795">CVE-2019-5795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5796/">CVE-2019-5796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5796">CVE-2019-5796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5797/">CVE-2019-5797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5797">CVE-2019-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5799/">CVE-2019-5799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5799">CVE-2019-5799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5800/">CVE-2019-5800 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5800">CVE-2019-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5801/">CVE-2019-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5801">CVE-2019-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5802/">CVE-2019-5802 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5802">CVE-2019-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5803/">CVE-2019-5803 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5803">CVE-2019-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5804/">CVE-2019-5804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5804">CVE-2019-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5805/">CVE-2019-5805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5805">CVE-2019-5805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5806/">CVE-2019-5806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5806">CVE-2019-5806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5807/">CVE-2019-5807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5807">CVE-2019-5807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5808/">CVE-2019-5808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5808">CVE-2019-5808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5809/">CVE-2019-5809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5809">CVE-2019-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5810/">CVE-2019-5810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5810">CVE-2019-5810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5811/">CVE-2019-5811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5811">CVE-2019-5811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5812/">CVE-2019-5812 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5812">CVE-2019-5812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5813/">CVE-2019-5813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5813">CVE-2019-5813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5814/">CVE-2019-5814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5814">CVE-2019-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5815/">CVE-2019-5815 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5815">CVE-2019-5815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5816/">CVE-2019-5816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5816">CVE-2019-5816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5817/">CVE-2019-5817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5817">CVE-2019-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5818/">CVE-2019-5818 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5818">CVE-2019-5818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5819/">CVE-2019-5819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5819">CVE-2019-5819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5820/">CVE-2019-5820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5820">CVE-2019-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5821/">CVE-2019-5821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5821">CVE-2019-5821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5822/">CVE-2019-5822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5822">CVE-2019-5822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5823/">CVE-2019-5823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5823">CVE-2019-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5824/">CVE-2019-5824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5824">CVE-2019-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5827/">CVE-2019-5827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5827">CVE-2019-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5828/">CVE-2019-5828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5828">CVE-2019-5828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5829/">CVE-2019-5829 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5829">CVE-2019-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5830/">CVE-2019-5830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5830">CVE-2019-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5831/">CVE-2019-5831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5831">CVE-2019-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5832/">CVE-2019-5832 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5832">CVE-2019-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5833/">CVE-2019-5833 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5833">CVE-2019-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5834/">CVE-2019-5834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5834">CVE-2019-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5835/">CVE-2019-5835 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5835">CVE-2019-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5836/">CVE-2019-5836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5836">CVE-2019-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5837/">CVE-2019-5837 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5837">CVE-2019-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5838/">CVE-2019-5838 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5838">CVE-2019-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5839/">CVE-2019-5839 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5839">CVE-2019-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5840/">CVE-2019-5840 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5840">CVE-2019-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5842/">CVE-2019-5842 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5842">CVE-2019-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5844/">CVE-2019-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5844">CVE-2019-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5847/">CVE-2019-5847 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5847">CVE-2019-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5848/">CVE-2019-5848 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5848">CVE-2019-5848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5850/">CVE-2019-5850 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5850">CVE-2019-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5851/">CVE-2019-5851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5851">CVE-2019-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5852/">CVE-2019-5852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5852">CVE-2019-5852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5853/">CVE-2019-5853 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5853">CVE-2019-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5854/">CVE-2019-5854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5854">CVE-2019-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5855/">CVE-2019-5855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5855">CVE-2019-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5856/">CVE-2019-5856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5856">CVE-2019-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5857/">CVE-2019-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5857">CVE-2019-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5858/">CVE-2019-5858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5858">CVE-2019-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5859/">CVE-2019-5859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5859">CVE-2019-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5860/">CVE-2019-5860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5860">CVE-2019-5860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5861/">CVE-2019-5861 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5861">CVE-2019-5861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5862/">CVE-2019-5862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5862">CVE-2019-5862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5863/">CVE-2019-5863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-5863">CVE-2019-5863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5864/">CVE-2019-5864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5864">CVE-2019-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5865/">CVE-2019-5865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5865">CVE-2019-5865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5867/">CVE-2019-5867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5867">CVE-2019-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5868/">CVE-2019-5868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5868">CVE-2019-5868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5869/">CVE-2019-5869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5869">CVE-2019-5869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5870/">CVE-2019-5870 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5870">CVE-2019-5870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5871/">CVE-2019-5871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5871">CVE-2019-5871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5872/">CVE-2019-5872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5872">CVE-2019-5872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5874/">CVE-2019-5874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5874">CVE-2019-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5875/">CVE-2019-5875 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5875">CVE-2019-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5876/">CVE-2019-5876 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5876">CVE-2019-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5877/">CVE-2019-5877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5877">CVE-2019-5877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5878/">CVE-2019-5878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5878">CVE-2019-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5879/">CVE-2019-5879 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5879">CVE-2019-5879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5880/">CVE-2019-5880 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5880">CVE-2019-5880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5881/">CVE-2019-5881 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5881">CVE-2019-5881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8075/">CVE-2019-8075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8075">CVE-2019-8075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0561/">CVE-2020-0561 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0561">CVE-2020-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15959/">CVE-2020-15959 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15959">CVE-2020-15959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15960/">CVE-2020-15960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15960">CVE-2020-15960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15961/">CVE-2020-15961 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15961">CVE-2020-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15962/">CVE-2020-15962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15962">CVE-2020-15962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15963/">CVE-2020-15963 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15963">CVE-2020-15963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15964/">CVE-2020-15964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15964">CVE-2020-15964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15965/">CVE-2020-15965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15965">CVE-2020-15965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15966/">CVE-2020-15966 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15966">CVE-2020-15966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15967/">CVE-2020-15967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15967">CVE-2020-15967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15968/">CVE-2020-15968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15968">CVE-2020-15968 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15970/">CVE-2020-15970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15970">CVE-2020-15970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15971/">CVE-2020-15971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15971">CVE-2020-15971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15972/">CVE-2020-15972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15972">CVE-2020-15972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15973/">CVE-2020-15973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15973">CVE-2020-15973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15974/">CVE-2020-15974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15974">CVE-2020-15974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15975/">CVE-2020-15975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15975">CVE-2020-15975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15976/">CVE-2020-15976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15976">CVE-2020-15976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15977/">CVE-2020-15977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15977">CVE-2020-15977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15978/">CVE-2020-15978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15978">CVE-2020-15978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15979/">CVE-2020-15979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15979">CVE-2020-15979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15980/">CVE-2020-15980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15980">CVE-2020-15980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15981/">CVE-2020-15981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15981">CVE-2020-15981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15982/">CVE-2020-15982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15982">CVE-2020-15982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15983/">CVE-2020-15983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15983">CVE-2020-15983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15984/">CVE-2020-15984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15984">CVE-2020-15984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15985/">CVE-2020-15985 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15985">CVE-2020-15985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15986/">CVE-2020-15986 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15986">CVE-2020-15986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15987/">CVE-2020-15987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15987">CVE-2020-15987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15988/">CVE-2020-15988 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15988">CVE-2020-15988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15989/">CVE-2020-15989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15989">CVE-2020-15989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15990/">CVE-2020-15990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15990">CVE-2020-15990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15991/">CVE-2020-15991 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15991">CVE-2020-15991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15992/">CVE-2020-15992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15992">CVE-2020-15992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15995/">CVE-2020-15995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15995">CVE-2020-15995 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16000/">CVE-2020-16000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16000">CVE-2020-16000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16001/">CVE-2020-16001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16001">CVE-2020-16001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16002/">CVE-2020-16002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16002">CVE-2020-16002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16003/">CVE-2020-16003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16003">CVE-2020-16003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16004/">CVE-2020-16004 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16004">CVE-2020-16004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16005/">CVE-2020-16005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16005">CVE-2020-16005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16006/">CVE-2020-16006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16006">CVE-2020-16006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16007/">CVE-2020-16007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16007">CVE-2020-16007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16008/">CVE-2020-16008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16008">CVE-2020-16008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16009/">CVE-2020-16009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16009">CVE-2020-16009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16011/">CVE-2020-16011 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16011">CVE-2020-16011 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16013/">CVE-2020-16013 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16013">CVE-2020-16013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16014/">CVE-2020-16014 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16014">CVE-2020-16014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16015/">CVE-2020-16015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16015">CVE-2020-16015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16016/">CVE-2020-16016 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16016">CVE-2020-16016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16017/">CVE-2020-16017 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16017">CVE-2020-16017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16018/">CVE-2020-16018 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16018">CVE-2020-16018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16019/">CVE-2020-16019 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16019">CVE-2020-16019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16020/">CVE-2020-16020 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16020">CVE-2020-16020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16021/">CVE-2020-16021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16021">CVE-2020-16021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16022/">CVE-2020-16022 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16022">CVE-2020-16022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16023/">CVE-2020-16023 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16023">CVE-2020-16023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16024/">CVE-2020-16024 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16024">CVE-2020-16024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16025/">CVE-2020-16025 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16025">CVE-2020-16025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16026/">CVE-2020-16026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16026">CVE-2020-16026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16027/">CVE-2020-16027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16027">CVE-2020-16027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16028/">CVE-2020-16028 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16028">CVE-2020-16028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16029/">CVE-2020-16029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16029">CVE-2020-16029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16030/">CVE-2020-16030 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16030">CVE-2020-16030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16031/">CVE-2020-16031 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16031">CVE-2020-16031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16032/">CVE-2020-16032 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16032">CVE-2020-16032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16033/">CVE-2020-16033 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16033">CVE-2020-16033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16034/">CVE-2020-16034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16034">CVE-2020-16034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16035/">CVE-2020-16035 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16035">CVE-2020-16035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16036/">CVE-2020-16036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16036">CVE-2020-16036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16037/">CVE-2020-16037 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16037">CVE-2020-16037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16038/">CVE-2020-16038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16038">CVE-2020-16038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16039/">CVE-2020-16039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16039">CVE-2020-16039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16040/">CVE-2020-16040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16040">CVE-2020-16040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16041/">CVE-2020-16041 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16041">CVE-2020-16041 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16043/">CVE-2020-16043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16043">CVE-2020-16043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27844/">CVE-2020-27844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27844">CVE-2020-27844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6377/">CVE-2020-6377 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6377">CVE-2020-6377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6378/">CVE-2020-6378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6378">CVE-2020-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6379/">CVE-2020-6379 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6379">CVE-2020-6379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6380/">CVE-2020-6380 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6380">CVE-2020-6380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6381/">CVE-2020-6381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6381">CVE-2020-6381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6382/">CVE-2020-6382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6382">CVE-2020-6382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6385/">CVE-2020-6385 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6385">CVE-2020-6385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6387/">CVE-2020-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6387">CVE-2020-6387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6388/">CVE-2020-6388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6388">CVE-2020-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6389/">CVE-2020-6389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6389">CVE-2020-6389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6390/">CVE-2020-6390 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6390">CVE-2020-6390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6391/">CVE-2020-6391 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6391">CVE-2020-6391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6392/">CVE-2020-6392 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6392">CVE-2020-6392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6393/">CVE-2020-6393 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6393">CVE-2020-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6394/">CVE-2020-6394 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6394">CVE-2020-6394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6395/">CVE-2020-6395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6395">CVE-2020-6395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6396/">CVE-2020-6396 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6396">CVE-2020-6396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6397/">CVE-2020-6397 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6397">CVE-2020-6397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6398/">CVE-2020-6398 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6398">CVE-2020-6398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6399/">CVE-2020-6399 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6399">CVE-2020-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6400/">CVE-2020-6400 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6400">CVE-2020-6400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6401/">CVE-2020-6401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6401">CVE-2020-6401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6402/">CVE-2020-6402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6402">CVE-2020-6402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6403/">CVE-2020-6403 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6403">CVE-2020-6403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6404/">CVE-2020-6404 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6404">CVE-2020-6404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6405/">CVE-2020-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6405">CVE-2020-6405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6406/">CVE-2020-6406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6406">CVE-2020-6406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6407/">CVE-2020-6407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6407">CVE-2020-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6408/">CVE-2020-6408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6408">CVE-2020-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6409/">CVE-2020-6409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6409">CVE-2020-6409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6410/">CVE-2020-6410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6410">CVE-2020-6410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6411/">CVE-2020-6411 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6411">CVE-2020-6411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6412/">CVE-2020-6412 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6412">CVE-2020-6412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6413/">CVE-2020-6413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6413">CVE-2020-6413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6414/">CVE-2020-6414 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6414">CVE-2020-6414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6415/">CVE-2020-6415 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6415">CVE-2020-6415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6416/">CVE-2020-6416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6416">CVE-2020-6416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6417/">CVE-2020-6417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6417">CVE-2020-6417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6418/">CVE-2020-6418 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6418">CVE-2020-6418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6420/">CVE-2020-6420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6420">CVE-2020-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6422/">CVE-2020-6422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6422">CVE-2020-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6423/">CVE-2020-6423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6423">CVE-2020-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6424/">CVE-2020-6424 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6424">CVE-2020-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6425/">CVE-2020-6425 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6425">CVE-2020-6425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6426/">CVE-2020-6426 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6426">CVE-2020-6426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6427/">CVE-2020-6427 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6427">CVE-2020-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6428/">CVE-2020-6428 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6428">CVE-2020-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6429/">CVE-2020-6429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6429">CVE-2020-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6430/">CVE-2020-6430 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6430">CVE-2020-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6431/">CVE-2020-6431 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6431">CVE-2020-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6432/">CVE-2020-6432 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6432">CVE-2020-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6433/">CVE-2020-6433 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6433">CVE-2020-6433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6434/">CVE-2020-6434 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6434">CVE-2020-6434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6435/">CVE-2020-6435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6435">CVE-2020-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6436/">CVE-2020-6436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6436">CVE-2020-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6437/">CVE-2020-6437 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6437">CVE-2020-6437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6438/">CVE-2020-6438 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6438">CVE-2020-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6439/">CVE-2020-6439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6439">CVE-2020-6439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6440/">CVE-2020-6440 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6440">CVE-2020-6440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6441/">CVE-2020-6441 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6441">CVE-2020-6441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6442/">CVE-2020-6442 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6442">CVE-2020-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6443/">CVE-2020-6443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6443">CVE-2020-6443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6444/">CVE-2020-6444 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6444">CVE-2020-6444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6445/">CVE-2020-6445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6445">CVE-2020-6445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6446/">CVE-2020-6446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6446">CVE-2020-6446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6447/">CVE-2020-6447 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6447">CVE-2020-6447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6448/">CVE-2020-6448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6448">CVE-2020-6448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6449/">CVE-2020-6449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6449">CVE-2020-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6450/">CVE-2020-6450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6450">CVE-2020-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6451/">CVE-2020-6451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6451">CVE-2020-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6452/">CVE-2020-6452 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6452">CVE-2020-6452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6454/">CVE-2020-6454 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6454">CVE-2020-6454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6455/">CVE-2020-6455 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6455">CVE-2020-6455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6456/">CVE-2020-6456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6456">CVE-2020-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6457/">CVE-2020-6457 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6457">CVE-2020-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6458/">CVE-2020-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6458">CVE-2020-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6459/">CVE-2020-6459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6459">CVE-2020-6459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6460/">CVE-2020-6460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6460">CVE-2020-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6462/">CVE-2020-6462 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6462">CVE-2020-6462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6464/">CVE-2020-6464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6464">CVE-2020-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6465/">CVE-2020-6465 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6465">CVE-2020-6465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6466/">CVE-2020-6466 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6466">CVE-2020-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6467/">CVE-2020-6467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6467">CVE-2020-6467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6468/">CVE-2020-6468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6468">CVE-2020-6468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6469/">CVE-2020-6469 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6469">CVE-2020-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6470/">CVE-2020-6470 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6470">CVE-2020-6470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6471/">CVE-2020-6471 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6471">CVE-2020-6471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6472/">CVE-2020-6472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6472">CVE-2020-6472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6473/">CVE-2020-6473 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6473">CVE-2020-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6474/">CVE-2020-6474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6474">CVE-2020-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6475/">CVE-2020-6475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6475">CVE-2020-6475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6476/">CVE-2020-6476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6476">CVE-2020-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6477/">CVE-2020-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6477">CVE-2020-6477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6478/">CVE-2020-6478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6478">CVE-2020-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6479/">CVE-2020-6479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6479">CVE-2020-6479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6480/">CVE-2020-6480 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6480">CVE-2020-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6481/">CVE-2020-6481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6481">CVE-2020-6481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6482/">CVE-2020-6482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6482">CVE-2020-6482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6483/">CVE-2020-6483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6483">CVE-2020-6483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6484/">CVE-2020-6484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6484">CVE-2020-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6485/">CVE-2020-6485 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6485">CVE-2020-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6486/">CVE-2020-6486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6486">CVE-2020-6486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6487/">CVE-2020-6487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6487">CVE-2020-6487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6488/">CVE-2020-6488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6488">CVE-2020-6488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6489/">CVE-2020-6489 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6489">CVE-2020-6489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6490/">CVE-2020-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6490">CVE-2020-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6491/">CVE-2020-6491 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6491">CVE-2020-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6493/">CVE-2020-6493 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6493">CVE-2020-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6494/">CVE-2020-6494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6494">CVE-2020-6494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6495/">CVE-2020-6495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6495">CVE-2020-6495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6496/">CVE-2020-6496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6496">CVE-2020-6496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6505/">CVE-2020-6505 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6505">CVE-2020-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6506/">CVE-2020-6506 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6506">CVE-2020-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6507/">CVE-2020-6507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6507">CVE-2020-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6509/">CVE-2020-6509 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6509">CVE-2020-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6510/">CVE-2020-6510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6510">CVE-2020-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6511/">CVE-2020-6511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6511">CVE-2020-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6512/">CVE-2020-6512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6512">CVE-2020-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6513/">CVE-2020-6513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6513">CVE-2020-6513 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6515/">CVE-2020-6515 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6515">CVE-2020-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6516/">CVE-2020-6516 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6516">CVE-2020-6516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6517/">CVE-2020-6517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6517">CVE-2020-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6518/">CVE-2020-6518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6518">CVE-2020-6518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6519/">CVE-2020-6519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6519">CVE-2020-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6520/">CVE-2020-6520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6520">CVE-2020-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6521/">CVE-2020-6521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6521">CVE-2020-6521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6522/">CVE-2020-6522 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6522">CVE-2020-6522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6523/">CVE-2020-6523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6523">CVE-2020-6523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6524/">CVE-2020-6524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6524">CVE-2020-6524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6525/">CVE-2020-6525 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6525">CVE-2020-6525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6526/">CVE-2020-6526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6526">CVE-2020-6526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6527/">CVE-2020-6527 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6527">CVE-2020-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6528/">CVE-2020-6528 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6528">CVE-2020-6528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6529/">CVE-2020-6529 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6529">CVE-2020-6529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6530/">CVE-2020-6530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6530">CVE-2020-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6531/">CVE-2020-6531 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6531">CVE-2020-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6532/">CVE-2020-6532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6532">CVE-2020-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6533/">CVE-2020-6533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6533">CVE-2020-6533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6534/">CVE-2020-6534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6534">CVE-2020-6534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6535/">CVE-2020-6535 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6535">CVE-2020-6535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6536/">CVE-2020-6536 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6536">CVE-2020-6536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6537/">CVE-2020-6537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6537">CVE-2020-6537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6538/">CVE-2020-6538 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6538">CVE-2020-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6539/">CVE-2020-6539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6539">CVE-2020-6539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6540/">CVE-2020-6540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6540">CVE-2020-6540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6541/">CVE-2020-6541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6541">CVE-2020-6541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6542/">CVE-2020-6542 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6542">CVE-2020-6542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6543/">CVE-2020-6543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6543">CVE-2020-6543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6544/">CVE-2020-6544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6544">CVE-2020-6544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6545/">CVE-2020-6545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6545">CVE-2020-6545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6546/">CVE-2020-6546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6546">CVE-2020-6546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6547/">CVE-2020-6547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6547">CVE-2020-6547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6548/">CVE-2020-6548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6548">CVE-2020-6548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6549/">CVE-2020-6549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6549">CVE-2020-6549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6550/">CVE-2020-6550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6550">CVE-2020-6550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6551/">CVE-2020-6551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6551">CVE-2020-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6552/">CVE-2020-6552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6552">CVE-2020-6552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6553/">CVE-2020-6553 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6553">CVE-2020-6553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6554/">CVE-2020-6554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6554">CVE-2020-6554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6555/">CVE-2020-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6555">CVE-2020-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6556/">CVE-2020-6556 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6556">CVE-2020-6556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6557/">CVE-2020-6557 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6557">CVE-2020-6557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6558/">CVE-2020-6558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6558">CVE-2020-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6559/">CVE-2020-6559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6559">CVE-2020-6559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6560/">CVE-2020-6560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6560">CVE-2020-6560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6561/">CVE-2020-6561 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6561">CVE-2020-6561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6562/">CVE-2020-6562 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6562">CVE-2020-6562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6563/">CVE-2020-6563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6563">CVE-2020-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6564/">CVE-2020-6564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6564">CVE-2020-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6565/">CVE-2020-6565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6565">CVE-2020-6565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6566/">CVE-2020-6566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6566">CVE-2020-6566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6567/">CVE-2020-6567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6567">CVE-2020-6567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6568/">CVE-2020-6568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6568">CVE-2020-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6569/">CVE-2020-6569 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6569">CVE-2020-6569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6570/">CVE-2020-6570 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6570">CVE-2020-6570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6571/">CVE-2020-6571 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6571">CVE-2020-6571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6573/">CVE-2020-6573 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6573">CVE-2020-6573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6574/">CVE-2020-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6574">CVE-2020-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6575/">CVE-2020-6575 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6575">CVE-2020-6575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6576/">CVE-2020-6576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6576">CVE-2020-6576 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21106/">CVE-2021-21106 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21106">CVE-2021-21106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21107/">CVE-2021-21107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21107">CVE-2021-21107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21108/">CVE-2021-21108 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21108">CVE-2021-21108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21109/">CVE-2021-21109 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21109">CVE-2021-21109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21110/">CVE-2021-21110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21110">CVE-2021-21110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21111/">CVE-2021-21111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21111">CVE-2021-21111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21112/">CVE-2021-21112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21112">CVE-2021-21112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21113/">CVE-2021-21113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21113">CVE-2021-21113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21114/">CVE-2021-21114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21114">CVE-2021-21114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21115/">CVE-2021-21115 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21115">CVE-2021-21115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21116/">CVE-2021-21116 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21116">CVE-2021-21116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21117/">CVE-2021-21117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21117">CVE-2021-21117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21118">CVE-2021-21118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21119">CVE-2021-21119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21120">CVE-2021-21120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21121">CVE-2021-21121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21122">CVE-2021-21122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21123">CVE-2021-21123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21124/">CVE-2021-21124 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21124">CVE-2021-21124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21125">CVE-2021-21125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21126">CVE-2021-21126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21127">CVE-2021-21127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21128">CVE-2021-21128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21129">CVE-2021-21129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21130">CVE-2021-21130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21131">CVE-2021-21131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21132">CVE-2021-21132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21133/">CVE-2021-21133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21133">CVE-2021-21133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21134/">CVE-2021-21134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21134">CVE-2021-21134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21135">CVE-2021-21135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21136/">CVE-2021-21136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21136">CVE-2021-21136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21137">CVE-2021-21137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21138/">CVE-2021-21138 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21138">CVE-2021-21138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21139/">CVE-2021-21139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21139">CVE-2021-21139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21140">CVE-2021-21140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21141">CVE-2021-21141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21142/">CVE-2021-21142 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21142">CVE-2021-21142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21143/">CVE-2021-21143 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21143">CVE-2021-21143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21144/">CVE-2021-21144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21144">CVE-2021-21144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21145">CVE-2021-21145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21146">CVE-2021-21146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21147">CVE-2021-21147 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21148">CVE-2021-21148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21149">CVE-2021-21149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21150">CVE-2021-21150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21151/">CVE-2021-21151 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21151">CVE-2021-21151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21152">CVE-2021-21152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21153">CVE-2021-21153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21154/">CVE-2021-21154 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21154">CVE-2021-21154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21155/">CVE-2021-21155 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21155">CVE-2021-21155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21156">CVE-2021-21156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21157">CVE-2021-21157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21159/">CVE-2021-21159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21159">CVE-2021-21159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21160/">CVE-2021-21160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21160">CVE-2021-21160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21161/">CVE-2021-21161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21161">CVE-2021-21161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21162/">CVE-2021-21162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21162">CVE-2021-21162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21163/">CVE-2021-21163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21163">CVE-2021-21163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21164/">CVE-2021-21164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21164">CVE-2021-21164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21165/">CVE-2021-21165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21165">CVE-2021-21165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21166/">CVE-2021-21166 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21166">CVE-2021-21166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21167/">CVE-2021-21167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21167">CVE-2021-21167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21168/">CVE-2021-21168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21168">CVE-2021-21168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21169/">CVE-2021-21169 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21169">CVE-2021-21169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21170/">CVE-2021-21170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21170">CVE-2021-21170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21171/">CVE-2021-21171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21171">CVE-2021-21171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21172/">CVE-2021-21172 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21172">CVE-2021-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21173/">CVE-2021-21173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21173">CVE-2021-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21174/">CVE-2021-21174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21174">CVE-2021-21174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21175/">CVE-2021-21175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21175">CVE-2021-21175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21176/">CVE-2021-21176 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21176">CVE-2021-21176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21177/">CVE-2021-21177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21177">CVE-2021-21177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21178/">CVE-2021-21178 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21178">CVE-2021-21178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21179/">CVE-2021-21179 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21179">CVE-2021-21179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21180/">CVE-2021-21180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21180">CVE-2021-21180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21181/">CVE-2021-21181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21181">CVE-2021-21181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21182/">CVE-2021-21182 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21182">CVE-2021-21182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21183/">CVE-2021-21183 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21183">CVE-2021-21183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21184/">CVE-2021-21184 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21184">CVE-2021-21184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21185/">CVE-2021-21185 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21185">CVE-2021-21185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21186/">CVE-2021-21186 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21186">CVE-2021-21186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21187/">CVE-2021-21187 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21187">CVE-2021-21187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21188/">CVE-2021-21188 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21188">CVE-2021-21188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21189/">CVE-2021-21189 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21189">CVE-2021-21189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21190/">CVE-2021-21190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21190">CVE-2021-21190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21191/">CVE-2021-21191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21191">CVE-2021-21191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21192/">CVE-2021-21192 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21192">CVE-2021-21192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21193/">CVE-2021-21193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21193">CVE-2021-21193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21194/">CVE-2021-21194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21194">CVE-2021-21194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21195/">CVE-2021-21195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21195">CVE-2021-21195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21196/">CVE-2021-21196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21196">CVE-2021-21196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21197/">CVE-2021-21197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21197">CVE-2021-21197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21198/">CVE-2021-21198 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21198">CVE-2021-21198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21199/">CVE-2021-21199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21199">CVE-2021-21199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21201/">CVE-2021-21201 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21201">CVE-2021-21201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21202/">CVE-2021-21202 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21202">CVE-2021-21202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21203/">CVE-2021-21203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21203">CVE-2021-21203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21204/">CVE-2021-21204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21204">CVE-2021-21204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21205/">CVE-2021-21205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21205">CVE-2021-21205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21206/">CVE-2021-21206 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21206">CVE-2021-21206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21207/">CVE-2021-21207 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21207">CVE-2021-21207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21208/">CVE-2021-21208 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21208">CVE-2021-21208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21209/">CVE-2021-21209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21209">CVE-2021-21209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21210/">CVE-2021-21210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21210">CVE-2021-21210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21211/">CVE-2021-21211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21211">CVE-2021-21211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21212/">CVE-2021-21212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21212">CVE-2021-21212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21213/">CVE-2021-21213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21213">CVE-2021-21213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21214/">CVE-2021-21214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21214">CVE-2021-21214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21215/">CVE-2021-21215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21215">CVE-2021-21215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21216/">CVE-2021-21216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21216">CVE-2021-21216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21217/">CVE-2021-21217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21217">CVE-2021-21217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21218/">CVE-2021-21218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21218">CVE-2021-21218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21219/">CVE-2021-21219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21219">CVE-2021-21219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21220/">CVE-2021-21220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21220">CVE-2021-21220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21221/">CVE-2021-21221 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21221">CVE-2021-21221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21222/">CVE-2021-21222 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21222">CVE-2021-21222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21223/">CVE-2021-21223 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21223">CVE-2021-21223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21224/">CVE-2021-21224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21224">CVE-2021-21224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21225/">CVE-2021-21225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21225">CVE-2021-21225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21226/">CVE-2021-21226 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21226">CVE-2021-21226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21227/">CVE-2021-21227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21227">CVE-2021-21227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21228/">CVE-2021-21228 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21228">CVE-2021-21228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21229/">CVE-2021-21229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21229">CVE-2021-21229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21230/">CVE-2021-21230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21230">CVE-2021-21230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21231/">CVE-2021-21231 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21231">CVE-2021-21231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21232/">CVE-2021-21232 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21232">CVE-2021-21232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21233/">CVE-2021-21233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21233">CVE-2021-21233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30506/">CVE-2021-30506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30506">CVE-2021-30506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30507/">CVE-2021-30507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30507">CVE-2021-30507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30508/">CVE-2021-30508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30508">CVE-2021-30508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30509/">CVE-2021-30509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30509">CVE-2021-30509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30510/">CVE-2021-30510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30510">CVE-2021-30510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30511/">CVE-2021-30511 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30511">CVE-2021-30511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30512/">CVE-2021-30512 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30512">CVE-2021-30512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30513/">CVE-2021-30513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30513">CVE-2021-30513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30514/">CVE-2021-30514 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30514">CVE-2021-30514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30515/">CVE-2021-30515 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30515">CVE-2021-30515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30516/">CVE-2021-30516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30516">CVE-2021-30516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30517/">CVE-2021-30517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30517">CVE-2021-30517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30518/">CVE-2021-30518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30518">CVE-2021-30518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30519/">CVE-2021-30519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30519">CVE-2021-30519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30520/">CVE-2021-30520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30520">CVE-2021-30520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30521/">CVE-2021-30521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30521">CVE-2021-30521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30522/">CVE-2021-30522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30522">CVE-2021-30522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30523/">CVE-2021-30523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30523">CVE-2021-30523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30524/">CVE-2021-30524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30524">CVE-2021-30524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30525/">CVE-2021-30525 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30525">CVE-2021-30525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30526/">CVE-2021-30526 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30526">CVE-2021-30526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30527/">CVE-2021-30527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30527">CVE-2021-30527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30528/">CVE-2021-30528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30528">CVE-2021-30528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30529/">CVE-2021-30529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30529">CVE-2021-30529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30530/">CVE-2021-30530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30530">CVE-2021-30530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30531/">CVE-2021-30531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30531">CVE-2021-30531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30532/">CVE-2021-30532 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30532">CVE-2021-30532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30533/">CVE-2021-30533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30533">CVE-2021-30533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30534/">CVE-2021-30534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30534">CVE-2021-30534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30535/">CVE-2021-30535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30535">CVE-2021-30535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30536/">CVE-2021-30536 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30536">CVE-2021-30536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30537/">CVE-2021-30537 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30537">CVE-2021-30537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30538/">CVE-2021-30538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30538">CVE-2021-30538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30539/">CVE-2021-30539 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30539">CVE-2021-30539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30540/">CVE-2021-30540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30540">CVE-2021-30540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30541">CVE-2021-30541 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30544">CVE-2021-30544 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30545/">CVE-2021-30545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30545">CVE-2021-30545 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30546/">CVE-2021-30546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30546">CVE-2021-30546 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30548">CVE-2021-30548 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30549/">CVE-2021-30549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30549">CVE-2021-30549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30550/">CVE-2021-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30550">CVE-2021-30550 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30551">CVE-2021-30551 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30552/">CVE-2021-30552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30552">CVE-2021-30552 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30553">CVE-2021-30553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30554">CVE-2021-30554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30555/">CVE-2021-30555 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30555">CVE-2021-30555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30556">CVE-2021-30556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30557/">CVE-2021-30557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30557">CVE-2021-30557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30559/">CVE-2021-30559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30559">CVE-2021-30559 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30561/">CVE-2021-30561 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30561">CVE-2021-30561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30562/">CVE-2021-30562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30562">CVE-2021-30562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30563">CVE-2021-30563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30564/">CVE-2021-30564 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30564">CVE-2021-30564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30565/">CVE-2021-30565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30565">CVE-2021-30565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30566/">CVE-2021-30566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30566">CVE-2021-30566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30567/">CVE-2021-30567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30567">CVE-2021-30567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30568/">CVE-2021-30568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30568">CVE-2021-30568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30569/">CVE-2021-30569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30569">CVE-2021-30569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30571/">CVE-2021-30571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30571">CVE-2021-30571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30572/">CVE-2021-30572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30572">CVE-2021-30572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30573/">CVE-2021-30573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30573">CVE-2021-30573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30574/">CVE-2021-30574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30574">CVE-2021-30574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30575/">CVE-2021-30575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30575">CVE-2021-30575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30576/">CVE-2021-30576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30576">CVE-2021-30576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30577/">CVE-2021-30577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30577">CVE-2021-30577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30578/">CVE-2021-30578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30578">CVE-2021-30578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30579/">CVE-2021-30579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30579">CVE-2021-30579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30581/">CVE-2021-30581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30581">CVE-2021-30581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30582/">CVE-2021-30582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30582">CVE-2021-30582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30584/">CVE-2021-30584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30584">CVE-2021-30584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30585/">CVE-2021-30585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30585">CVE-2021-30585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30588/">CVE-2021-30588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30588">CVE-2021-30588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30589/">CVE-2021-30589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30589">CVE-2021-30589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30590/">CVE-2021-30590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30590">CVE-2021-30590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30591/">CVE-2021-30591 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30591">CVE-2021-30591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30592/">CVE-2021-30592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30592">CVE-2021-30592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30593/">CVE-2021-30593 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30593">CVE-2021-30593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30594/">CVE-2021-30594 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30594">CVE-2021-30594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30596/">CVE-2021-30596 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30596">CVE-2021-30596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30597/">CVE-2021-30597 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30597">CVE-2021-30597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30598">CVE-2021-30598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30599">CVE-2021-30599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30600/">CVE-2021-30600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30600">CVE-2021-30600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30601/">CVE-2021-30601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30601">CVE-2021-30601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30602">CVE-2021-30602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30603">CVE-2021-30603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30604">CVE-2021-30604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30606/">CVE-2021-30606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30606">CVE-2021-30606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30607/">CVE-2021-30607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30607">CVE-2021-30607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30608/">CVE-2021-30608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30608">CVE-2021-30608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30609/">CVE-2021-30609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30609">CVE-2021-30609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30610/">CVE-2021-30610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30610">CVE-2021-30610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30611/">CVE-2021-30611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30611">CVE-2021-30611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30612/">CVE-2021-30612 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30612">CVE-2021-30612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30613">CVE-2021-30613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30614/">CVE-2021-30614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30614">CVE-2021-30614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30615/">CVE-2021-30615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30615">CVE-2021-30615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30616">CVE-2021-30616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30617/">CVE-2021-30617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30617">CVE-2021-30617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30618">CVE-2021-30618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30619/">CVE-2021-30619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30619">CVE-2021-30619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30620/">CVE-2021-30620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30620">CVE-2021-30620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30621/">CVE-2021-30621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30621">CVE-2021-30621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30622/">CVE-2021-30622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30622">CVE-2021-30622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30623/">CVE-2021-30623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30623">CVE-2021-30623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30624/">CVE-2021-30624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30624">CVE-2021-30624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30625">CVE-2021-30625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30626">CVE-2021-30626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30627">CVE-2021-30627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30628">CVE-2021-30628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30629">CVE-2021-30629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30630">CVE-2021-30630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-30631">CVE-2021-30631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30632">CVE-2021-30632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30633">CVE-2021-30633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37956/">CVE-2021-37956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37956">CVE-2021-37956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37957/">CVE-2021-37957 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37957">CVE-2021-37957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37958/">CVE-2021-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37958">CVE-2021-37958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37959/">CVE-2021-37959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37959">CVE-2021-37959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37960/">CVE-2021-37960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-37960">CVE-2021-37960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37961/">CVE-2021-37961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37961">CVE-2021-37961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37962/">CVE-2021-37962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37962">CVE-2021-37962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37963/">CVE-2021-37963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37963">CVE-2021-37963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37964/">CVE-2021-37964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37964">CVE-2021-37964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37965/">CVE-2021-37965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37965">CVE-2021-37965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37966/">CVE-2021-37966 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37966">CVE-2021-37966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37967/">CVE-2021-37967 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37967">CVE-2021-37967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37968/">CVE-2021-37968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37968">CVE-2021-37968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37969/">CVE-2021-37969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37969">CVE-2021-37969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37970/">CVE-2021-37970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37970">CVE-2021-37970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37971/">CVE-2021-37971 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37971">CVE-2021-37971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37972/">CVE-2021-37972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37972">CVE-2021-37972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37973/">CVE-2021-37973 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37973">CVE-2021-37973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37974">CVE-2021-37974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37975">CVE-2021-37975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37976">CVE-2021-37976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37977/">CVE-2021-37977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37977">CVE-2021-37977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37978/">CVE-2021-37978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37978">CVE-2021-37978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37979/">CVE-2021-37979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37979">CVE-2021-37979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37980">CVE-2021-37980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37981">CVE-2021-37981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37982/">CVE-2021-37982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37982">CVE-2021-37982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37983/">CVE-2021-37983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37983">CVE-2021-37983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37984">CVE-2021-37984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37985/">CVE-2021-37985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37985">CVE-2021-37985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37986/">CVE-2021-37986 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37986">CVE-2021-37986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37987">CVE-2021-37987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37988/">CVE-2021-37988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37988">CVE-2021-37988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37989">CVE-2021-37989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37990/">CVE-2021-37990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37990">CVE-2021-37990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37991/">CVE-2021-37991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37991">CVE-2021-37991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37992">CVE-2021-37992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37993">CVE-2021-37993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37994/">CVE-2021-37994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37994">CVE-2021-37994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37995/">CVE-2021-37995 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37995">CVE-2021-37995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37996">CVE-2021-37996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37997/">CVE-2021-37997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37997">CVE-2021-37997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37998">CVE-2021-37998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-37999/">CVE-2021-37999 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37999">CVE-2021-37999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38000/">CVE-2021-38000 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38000">CVE-2021-38000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38001">CVE-2021-38001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38002">CVE-2021-38002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38003">CVE-2021-38003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38005">CVE-2021-38005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38006/">CVE-2021-38006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38006">CVE-2021-38006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38007">CVE-2021-38007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38008/">CVE-2021-38008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38008">CVE-2021-38008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38009">CVE-2021-38009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38010">CVE-2021-38010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38011/">CVE-2021-38011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38011">CVE-2021-38011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38012">CVE-2021-38012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38013/">CVE-2021-38013 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38013">CVE-2021-38013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38014/">CVE-2021-38014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38014">CVE-2021-38014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38015">CVE-2021-38015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38016/">CVE-2021-38016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38016">CVE-2021-38016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38017">CVE-2021-38017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38018/">CVE-2021-38018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38018">CVE-2021-38018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38019">CVE-2021-38019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38020/">CVE-2021-38020 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38020">CVE-2021-38020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38021">CVE-2021-38021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38022">CVE-2021-38022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4052/">CVE-2021-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4052">CVE-2021-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4053/">CVE-2021-4053 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4053">CVE-2021-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4054/">CVE-2021-4054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4054">CVE-2021-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4055/">CVE-2021-4055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4055">CVE-2021-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4056/">CVE-2021-4056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4056">CVE-2021-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4057">CVE-2021-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4058">CVE-2021-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4059">CVE-2021-4059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4061/">CVE-2021-4061 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4061">CVE-2021-4061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4062">CVE-2021-4062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4063/">CVE-2021-4063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4063">CVE-2021-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4064/">CVE-2021-4064 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4064">CVE-2021-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4065/">CVE-2021-4065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4065">CVE-2021-4065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4066/">CVE-2021-4066 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4066">CVE-2021-4066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4067/">CVE-2021-4067 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4067">CVE-2021-4067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4068/">CVE-2021-4068 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4068">CVE-2021-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4078">CVE-2021-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4079">CVE-2021-4079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4098">CVE-2021-4098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4099">CVE-2021-4099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4100/">CVE-2021-4100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4100">CVE-2021-4100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4101">CVE-2021-4101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4102">CVE-2021-4102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0096/">CVE-2022-0096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0096">CVE-2022-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0097/">CVE-2022-0097 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0097">CVE-2022-0097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0098/">CVE-2022-0098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0098">CVE-2022-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0099/">CVE-2022-0099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0099">CVE-2022-0099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0100/">CVE-2022-0100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0100">CVE-2022-0100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0101/">CVE-2022-0101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0101">CVE-2022-0101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0102/">CVE-2022-0102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0102">CVE-2022-0102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0103/">CVE-2022-0103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0103">CVE-2022-0103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0104/">CVE-2022-0104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0104">CVE-2022-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0105/">CVE-2022-0105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0105">CVE-2022-0105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0106/">CVE-2022-0106 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0106">CVE-2022-0106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0107/">CVE-2022-0107 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0107">CVE-2022-0107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0108">CVE-2022-0108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0109/">CVE-2022-0109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0109">CVE-2022-0109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0110/">CVE-2022-0110 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0110">CVE-2022-0110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0111/">CVE-2022-0111 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0111">CVE-2022-0111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0112/">CVE-2022-0112 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0112">CVE-2022-0112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0113/">CVE-2022-0113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0113">CVE-2022-0113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0114/">CVE-2022-0114 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0114">CVE-2022-0114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0115/">CVE-2022-0115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0115">CVE-2022-0115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0116/">CVE-2022-0116 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0116">CVE-2022-0116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0117/">CVE-2022-0117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0117">CVE-2022-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0118/">CVE-2022-0118 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0118">CVE-2022-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0120/">CVE-2022-0120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0120">CVE-2022-0120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0289/">CVE-2022-0289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0289">CVE-2022-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0290/">CVE-2022-0290 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0290">CVE-2022-0290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0291/">CVE-2022-0291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0291">CVE-2022-0291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0292/">CVE-2022-0292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0292">CVE-2022-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0293/">CVE-2022-0293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0293">CVE-2022-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0294/">CVE-2022-0294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0294">CVE-2022-0294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0295/">CVE-2022-0295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0295">CVE-2022-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0296/">CVE-2022-0296 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0296">CVE-2022-0296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0297/">CVE-2022-0297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0297">CVE-2022-0297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0298/">CVE-2022-0298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0298">CVE-2022-0298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0300/">CVE-2022-0300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0300">CVE-2022-0300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0301/">CVE-2022-0301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0301">CVE-2022-0301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0302/">CVE-2022-0302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0302">CVE-2022-0302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0303/">CVE-2022-0303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0303">CVE-2022-0303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0304/">CVE-2022-0304 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0304">CVE-2022-0304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0305/">CVE-2022-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0305">CVE-2022-0305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0306/">CVE-2022-0306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0306">CVE-2022-0306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0307/">CVE-2022-0307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0307">CVE-2022-0307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0308/">CVE-2022-0308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0308">CVE-2022-0308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0309/">CVE-2022-0309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0309">CVE-2022-0309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0310/">CVE-2022-0310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0310">CVE-2022-0310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0311/">CVE-2022-0311 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0311">CVE-2022-0311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0452/">CVE-2022-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0452">CVE-2022-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0453/">CVE-2022-0453 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0453">CVE-2022-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0454/">CVE-2022-0454 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0454">CVE-2022-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0455/">CVE-2022-0455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0455">CVE-2022-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0456/">CVE-2022-0456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0456">CVE-2022-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0457/">CVE-2022-0457 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0457">CVE-2022-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0459/">CVE-2022-0459 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0459">CVE-2022-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0460/">CVE-2022-0460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0460">CVE-2022-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0461/">CVE-2022-0461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0461">CVE-2022-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0462/">CVE-2022-0462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0462">CVE-2022-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0463/">CVE-2022-0463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0463">CVE-2022-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0464/">CVE-2022-0464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0464">CVE-2022-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0465/">CVE-2022-0465 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0465">CVE-2022-0465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0466/">CVE-2022-0466 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0466">CVE-2022-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0467/">CVE-2022-0467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0467">CVE-2022-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0468/">CVE-2022-0468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0468">CVE-2022-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0469/">CVE-2022-0469 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0469">CVE-2022-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0470/">CVE-2022-0470 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0470">CVE-2022-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0603/">CVE-2022-0603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0603">CVE-2022-0603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0604/">CVE-2022-0604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0604">CVE-2022-0604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0605/">CVE-2022-0605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0605">CVE-2022-0605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0606/">CVE-2022-0606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0606">CVE-2022-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0607/">CVE-2022-0607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0607">CVE-2022-0607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0608/">CVE-2022-0608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0608">CVE-2022-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0609/">CVE-2022-0609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0609">CVE-2022-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0610/">CVE-2022-0610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0610">CVE-2022-0610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0789/">CVE-2022-0789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0789">CVE-2022-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0790/">CVE-2022-0790 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0790">CVE-2022-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0791/">CVE-2022-0791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0791">CVE-2022-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0792/">CVE-2022-0792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0792">CVE-2022-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0793/">CVE-2022-0793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0793">CVE-2022-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0794/">CVE-2022-0794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0794">CVE-2022-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0795/">CVE-2022-0795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0795">CVE-2022-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0796/">CVE-2022-0796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0796">CVE-2022-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0797/">CVE-2022-0797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0797">CVE-2022-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0798/">CVE-2022-0798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0798">CVE-2022-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0799/">CVE-2022-0799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0799">CVE-2022-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0800/">CVE-2022-0800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0800">CVE-2022-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0801/">CVE-2022-0801 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0801">CVE-2022-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0802/">CVE-2022-0802 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0802">CVE-2022-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0803/">CVE-2022-0803 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0803">CVE-2022-0803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0804/">CVE-2022-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0804">CVE-2022-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0805/">CVE-2022-0805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0805">CVE-2022-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0806/">CVE-2022-0806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0806">CVE-2022-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0807/">CVE-2022-0807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0807">CVE-2022-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0808/">CVE-2022-0808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0808">CVE-2022-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0809/">CVE-2022-0809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0809">CVE-2022-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0971/">CVE-2022-0971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0971">CVE-2022-0971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0972/">CVE-2022-0972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0972">CVE-2022-0972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0973/">CVE-2022-0973 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0973">CVE-2022-0973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0974/">CVE-2022-0974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0974">CVE-2022-0974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0975/">CVE-2022-0975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0975">CVE-2022-0975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0976/">CVE-2022-0976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0976">CVE-2022-0976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0977/">CVE-2022-0977 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0977">CVE-2022-0977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0978/">CVE-2022-0978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0978">CVE-2022-0978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0979/">CVE-2022-0979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0979">CVE-2022-0979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0980/">CVE-2022-0980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0980">CVE-2022-0980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1096">CVE-2022-1096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1125/">CVE-2022-1125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1125">CVE-2022-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1127/">CVE-2022-1127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1127">CVE-2022-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1128/">CVE-2022-1128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1128">CVE-2022-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1129/">CVE-2022-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1129">CVE-2022-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1130/">CVE-2022-1130 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1130">CVE-2022-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1131/">CVE-2022-1131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1131">CVE-2022-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1132/">CVE-2022-1132 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1132">CVE-2022-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1133/">CVE-2022-1133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1133">CVE-2022-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1134/">CVE-2022-1134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1134">CVE-2022-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1135/">CVE-2022-1135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1135">CVE-2022-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1136/">CVE-2022-1136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1136">CVE-2022-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1137/">CVE-2022-1137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1137">CVE-2022-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1138/">CVE-2022-1138 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1138">CVE-2022-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1139/">CVE-2022-1139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1139">CVE-2022-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1141/">CVE-2022-1141 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1141">CVE-2022-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1142/">CVE-2022-1142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1142">CVE-2022-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1143/">CVE-2022-1143 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1143">CVE-2022-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1144/">CVE-2022-1144 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1144">CVE-2022-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1145/">CVE-2022-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1145">CVE-2022-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1146/">CVE-2022-1146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1146">CVE-2022-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1232/">CVE-2022-1232 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1232">CVE-2022-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1305/">CVE-2022-1305 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1305">CVE-2022-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1306/">CVE-2022-1306 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1306">CVE-2022-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1307/">CVE-2022-1307 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1307">CVE-2022-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1308/">CVE-2022-1308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1308">CVE-2022-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1309/">CVE-2022-1309 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1309">CVE-2022-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1310/">CVE-2022-1310 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1310">CVE-2022-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1311/">CVE-2022-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1311">CVE-2022-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1312/">CVE-2022-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1312">CVE-2022-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1313/">CVE-2022-1313 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1313">CVE-2022-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1314/">CVE-2022-1314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1314">CVE-2022-1314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1364/">CVE-2022-1364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1364">CVE-2022-1364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1477/">CVE-2022-1477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1477">CVE-2022-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1478/">CVE-2022-1478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1478">CVE-2022-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1479/">CVE-2022-1479 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1479">CVE-2022-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1480/">CVE-2022-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1480">CVE-2022-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1481/">CVE-2022-1481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1481">CVE-2022-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1482/">CVE-2022-1482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1482">CVE-2022-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1483/">CVE-2022-1483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1483">CVE-2022-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1484/">CVE-2022-1484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1484">CVE-2022-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1485/">CVE-2022-1485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1485">CVE-2022-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1486/">CVE-2022-1486 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1486">CVE-2022-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1487/">CVE-2022-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1487">CVE-2022-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1488/">CVE-2022-1488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1488">CVE-2022-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1489/">CVE-2022-1489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1489">CVE-2022-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1490/">CVE-2022-1490 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1490">CVE-2022-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1491/">CVE-2022-1491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1491">CVE-2022-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1492/">CVE-2022-1492 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1492">CVE-2022-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1493/">CVE-2022-1493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1493">CVE-2022-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1494/">CVE-2022-1494 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1494">CVE-2022-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1495/">CVE-2022-1495 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1495">CVE-2022-1495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1496/">CVE-2022-1496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1496">CVE-2022-1496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1497/">CVE-2022-1497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1497">CVE-2022-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1498/">CVE-2022-1498 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1498">CVE-2022-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1499/">CVE-2022-1499 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1499">CVE-2022-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1500/">CVE-2022-1500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1500">CVE-2022-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1501/">CVE-2022-1501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1501">CVE-2022-1501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1633/">CVE-2022-1633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1633">CVE-2022-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1634/">CVE-2022-1634 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1634">CVE-2022-1634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1635/">CVE-2022-1635 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1635">CVE-2022-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1636/">CVE-2022-1636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1636">CVE-2022-1636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1637/">CVE-2022-1637 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1637">CVE-2022-1637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1638/">CVE-2022-1638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1638">CVE-2022-1638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1639/">CVE-2022-1639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1639">CVE-2022-1639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1640/">CVE-2022-1640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1640">CVE-2022-1640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1641/">CVE-2022-1641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1641">CVE-2022-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1853/">CVE-2022-1853 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1853">CVE-2022-1853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1854/">CVE-2022-1854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1854">CVE-2022-1854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1855/">CVE-2022-1855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1855">CVE-2022-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1856/">CVE-2022-1856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1856">CVE-2022-1856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1857/">CVE-2022-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1857">CVE-2022-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1858/">CVE-2022-1858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1858">CVE-2022-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1859/">CVE-2022-1859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1859">CVE-2022-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1860/">CVE-2022-1860 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1860">CVE-2022-1860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1861/">CVE-2022-1861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1861">CVE-2022-1861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1862/">CVE-2022-1862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1862">CVE-2022-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1863/">CVE-2022-1863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1863">CVE-2022-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1864/">CVE-2022-1864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1864">CVE-2022-1864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1865/">CVE-2022-1865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1865">CVE-2022-1865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1866/">CVE-2022-1866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1866">CVE-2022-1866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1867/">CVE-2022-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1867">CVE-2022-1867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1868/">CVE-2022-1868 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1868">CVE-2022-1868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1869/">CVE-2022-1869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1869">CVE-2022-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1870/">CVE-2022-1870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1870">CVE-2022-1870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1871/">CVE-2022-1871 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1871">CVE-2022-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1872/">CVE-2022-1872 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1872">CVE-2022-1872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1873/">CVE-2022-1873 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1873">CVE-2022-1873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1874/">CVE-2022-1874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1874">CVE-2022-1874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1875/">CVE-2022-1875 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1875">CVE-2022-1875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1876/">CVE-2022-1876 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1876">CVE-2022-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2007/">CVE-2022-2007 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2007">CVE-2022-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2008/">CVE-2022-2008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2008">CVE-2022-2008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2010/">CVE-2022-2010 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2010">CVE-2022-2010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2011/">CVE-2022-2011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2011">CVE-2022-2011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2156/">CVE-2022-2156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2156">CVE-2022-2156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2157/">CVE-2022-2157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2157">CVE-2022-2157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2158/">CVE-2022-2158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2158">CVE-2022-2158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2160/">CVE-2022-2160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2160">CVE-2022-2160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2161/">CVE-2022-2161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2161">CVE-2022-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2162/">CVE-2022-2162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2162">CVE-2022-2162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2163/">CVE-2022-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2163">CVE-2022-2163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2164/">CVE-2022-2164 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2164">CVE-2022-2164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2165/">CVE-2022-2165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2165">CVE-2022-2165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2294">CVE-2022-2294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2295/">CVE-2022-2295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2295">CVE-2022-2295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2296/">CVE-2022-2296 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2296">CVE-2022-2296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2477/">CVE-2022-2477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2477">CVE-2022-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2478/">CVE-2022-2478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2478">CVE-2022-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2479/">CVE-2022-2479 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2479">CVE-2022-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2480/">CVE-2022-2480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2480">CVE-2022-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2481/">CVE-2022-2481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2481">CVE-2022-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2603/">CVE-2022-2603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2603">CVE-2022-2603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2604/">CVE-2022-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2604">CVE-2022-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2605/">CVE-2022-2605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2605">CVE-2022-2605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2606/">CVE-2022-2606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2606">CVE-2022-2606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2607/">CVE-2022-2607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2607">CVE-2022-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2608/">CVE-2022-2608 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2608">CVE-2022-2608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2609/">CVE-2022-2609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2609">CVE-2022-2609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2610/">CVE-2022-2610 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2610">CVE-2022-2610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2611/">CVE-2022-2611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2611">CVE-2022-2611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2612/">CVE-2022-2612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2612">CVE-2022-2612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2613/">CVE-2022-2613 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2613">CVE-2022-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2614/">CVE-2022-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2614">CVE-2022-2614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2615/">CVE-2022-2615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2615">CVE-2022-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2616/">CVE-2022-2616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2616">CVE-2022-2616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2617/">CVE-2022-2617 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2617">CVE-2022-2617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2618/">CVE-2022-2618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2618">CVE-2022-2618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2619/">CVE-2022-2619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2619">CVE-2022-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2620/">CVE-2022-2620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2620">CVE-2022-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2621/">CVE-2022-2621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2621">CVE-2022-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2622/">CVE-2022-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2622">CVE-2022-2622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2623/">CVE-2022-2623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2623">CVE-2022-2623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2624/">CVE-2022-2624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2624">CVE-2022-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2852/">CVE-2022-2852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2852">CVE-2022-2852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2853/">CVE-2022-2853 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2853">CVE-2022-2853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2854/">CVE-2022-2854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2854">CVE-2022-2854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2855/">CVE-2022-2855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2855">CVE-2022-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2856/">CVE-2022-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2856">CVE-2022-2856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2857/">CVE-2022-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2857">CVE-2022-2857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2858/">CVE-2022-2858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2858">CVE-2022-2858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2859/">CVE-2022-2859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2859">CVE-2022-2859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2860/">CVE-2022-2860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2860">CVE-2022-2860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2861/">CVE-2022-2861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2861">CVE-2022-2861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3038/">CVE-2022-3038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3038">CVE-2022-3038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3039/">CVE-2022-3039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3039">CVE-2022-3039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3040/">CVE-2022-3040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3040">CVE-2022-3040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3041/">CVE-2022-3041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3041">CVE-2022-3041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3042/">CVE-2022-3042 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3042">CVE-2022-3042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3043/">CVE-2022-3043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3043">CVE-2022-3043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3044/">CVE-2022-3044 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3044">CVE-2022-3044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3045/">CVE-2022-3045 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3045">CVE-2022-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3046/">CVE-2022-3046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3046">CVE-2022-3046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3047/">CVE-2022-3047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3047">CVE-2022-3047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3048/">CVE-2022-3048 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3048">CVE-2022-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3049/">CVE-2022-3049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3049">CVE-2022-3049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3050/">CVE-2022-3050 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3050">CVE-2022-3050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3051/">CVE-2022-3051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3051">CVE-2022-3051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3052/">CVE-2022-3052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3052">CVE-2022-3052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3053/">CVE-2022-3053 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3053">CVE-2022-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3054/">CVE-2022-3054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3054">CVE-2022-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3055/">CVE-2022-3055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3055">CVE-2022-3055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3056/">CVE-2022-3056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3056">CVE-2022-3056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3057/">CVE-2022-3057 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3057">CVE-2022-3057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3058/">CVE-2022-3058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3058">CVE-2022-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3071/">CVE-2022-3071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3071">CVE-2022-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3075">CVE-2022-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3195/">CVE-2022-3195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3195">CVE-2022-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3196">CVE-2022-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3197">CVE-2022-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3198">CVE-2022-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3199">CVE-2022-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3200">CVE-2022-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3201">CVE-2022-3201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3304/">CVE-2022-3304 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3304">CVE-2022-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3305/">CVE-2022-3305 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3305">CVE-2022-3305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3306/">CVE-2022-3306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3306">CVE-2022-3306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3307/">CVE-2022-3307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3307">CVE-2022-3307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3308/">CVE-2022-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3308">CVE-2022-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3309/">CVE-2022-3309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3309">CVE-2022-3309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3310/">CVE-2022-3310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3310">CVE-2022-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3311/">CVE-2022-3311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3311">CVE-2022-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3312/">CVE-2022-3312 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3312">CVE-2022-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3313/">CVE-2022-3313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3313">CVE-2022-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3314/">CVE-2022-3314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3314">CVE-2022-3314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3315/">CVE-2022-3315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3315">CVE-2022-3315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3316/">CVE-2022-3316 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3316">CVE-2022-3316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3317/">CVE-2022-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3317">CVE-2022-3317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3318/">CVE-2022-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3318">CVE-2022-3318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3370/">CVE-2022-3370 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3370">CVE-2022-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3373/">CVE-2022-3373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3373">CVE-2022-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3445">CVE-2022-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3446">CVE-2022-3446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3447/">CVE-2022-3447 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3447">CVE-2022-3447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3448/">CVE-2022-3448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3448">CVE-2022-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3449/">CVE-2022-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3449">CVE-2022-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3450/">CVE-2022-3450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3450">CVE-2022-3450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3652/">CVE-2022-3652 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3652">CVE-2022-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3653/">CVE-2022-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3653">CVE-2022-3653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3654/">CVE-2022-3654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3654">CVE-2022-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3655/">CVE-2022-3655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3655">CVE-2022-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3656/">CVE-2022-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3656">CVE-2022-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3657/">CVE-2022-3657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3657">CVE-2022-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3658/">CVE-2022-3658 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3658">CVE-2022-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3659/">CVE-2022-3659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3659">CVE-2022-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3660/">CVE-2022-3660 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3660">CVE-2022-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3661/">CVE-2022-3661 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3661">CVE-2022-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3723/">CVE-2022-3723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3723">CVE-2022-3723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3885/">CVE-2022-3885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3885">CVE-2022-3885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3886/">CVE-2022-3886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3886">CVE-2022-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3887/">CVE-2022-3887 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3887">CVE-2022-3887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3888/">CVE-2022-3888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3888">CVE-2022-3888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3889/">CVE-2022-3889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3889">CVE-2022-3889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3890/">CVE-2022-3890 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3890">CVE-2022-3890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4135/">CVE-2022-4135 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4135">CVE-2022-4135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4174/">CVE-2022-4174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4174">CVE-2022-4174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4175/">CVE-2022-4175 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4175">CVE-2022-4175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4176/">CVE-2022-4176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4176">CVE-2022-4176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4177/">CVE-2022-4177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4177">CVE-2022-4177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4178/">CVE-2022-4178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4178">CVE-2022-4178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4179/">CVE-2022-4179 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4179">CVE-2022-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4180/">CVE-2022-4180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4180">CVE-2022-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4181/">CVE-2022-4181 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4181">CVE-2022-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4182/">CVE-2022-4182 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4182">CVE-2022-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4183/">CVE-2022-4183 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4183">CVE-2022-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4184/">CVE-2022-4184 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4184">CVE-2022-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4185/">CVE-2022-4185 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4185">CVE-2022-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4186/">CVE-2022-4186 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4186">CVE-2022-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4187/">CVE-2022-4187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4187">CVE-2022-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4188/">CVE-2022-4188 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4188">CVE-2022-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4189/">CVE-2022-4189 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4189">CVE-2022-4189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4190/">CVE-2022-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4190">CVE-2022-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4191/">CVE-2022-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4191">CVE-2022-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4192/">CVE-2022-4192 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4192">CVE-2022-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4193/">CVE-2022-4193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4193">CVE-2022-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4194/">CVE-2022-4194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4194">CVE-2022-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4195/">CVE-2022-4195 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4195">CVE-2022-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262">CVE-2022-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4436/">CVE-2022-4436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4436">CVE-2022-4436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4437/">CVE-2022-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4437">CVE-2022-4437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4438/">CVE-2022-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4438">CVE-2022-4438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4439/">CVE-2022-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4439">CVE-2022-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4440/">CVE-2022-4440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4440">CVE-2022-4440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0128/">CVE-2023-0128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0128">CVE-2023-0128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0129/">CVE-2023-0129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0129">CVE-2023-0129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0130/">CVE-2023-0130 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0130">CVE-2023-0130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0131/">CVE-2023-0131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0131">CVE-2023-0131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0132/">CVE-2023-0132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0132">CVE-2023-0132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0133/">CVE-2023-0133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0133">CVE-2023-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0134/">CVE-2023-0134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0134">CVE-2023-0134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0135/">CVE-2023-0135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0135">CVE-2023-0135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0136/">CVE-2023-0136 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0136">CVE-2023-0136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0137/">CVE-2023-0137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0137">CVE-2023-0137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0138/">CVE-2023-0138 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0138">CVE-2023-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0139/">CVE-2023-0139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0139">CVE-2023-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0140/">CVE-2023-0140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0140">CVE-2023-0140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0141/">CVE-2023-0141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0141">CVE-2023-0141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0471/">CVE-2023-0471 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0471">CVE-2023-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0472/">CVE-2023-0472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0472">CVE-2023-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0473/">CVE-2023-0473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0473">CVE-2023-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0474/">CVE-2023-0474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0474">CVE-2023-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0696/">CVE-2023-0696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0696">CVE-2023-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0697/">CVE-2023-0697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0697">CVE-2023-0697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0698/">CVE-2023-0698 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0698">CVE-2023-0698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0699/">CVE-2023-0699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0699">CVE-2023-0699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0700/">CVE-2023-0700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0700">CVE-2023-0700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0701/">CVE-2023-0701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0701">CVE-2023-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0702/">CVE-2023-0702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0702">CVE-2023-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0703/">CVE-2023-0703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0703">CVE-2023-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0704/">CVE-2023-0704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0704">CVE-2023-0704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0705/">CVE-2023-0705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0705">CVE-2023-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0927/">CVE-2023-0927 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0927">CVE-2023-0927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0928/">CVE-2023-0928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0928">CVE-2023-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0929/">CVE-2023-0929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0929">CVE-2023-0929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0930/">CVE-2023-0930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0930">CVE-2023-0930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0931/">CVE-2023-0931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0931">CVE-2023-0931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0932/">CVE-2023-0932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0932">CVE-2023-0932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0933/">CVE-2023-0933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0933">CVE-2023-0933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0941/">CVE-2023-0941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0941">CVE-2023-0941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1213/">CVE-2023-1213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1213">CVE-2023-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1214/">CVE-2023-1214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1214">CVE-2023-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1215/">CVE-2023-1215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1215">CVE-2023-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1216/">CVE-2023-1216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1216">CVE-2023-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1217/">CVE-2023-1217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1217">CVE-2023-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1218/">CVE-2023-1218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1218">CVE-2023-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1219/">CVE-2023-1219 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1219">CVE-2023-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1220/">CVE-2023-1220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1220">CVE-2023-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1221/">CVE-2023-1221 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1221">CVE-2023-1221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1222/">CVE-2023-1222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1222">CVE-2023-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1223/">CVE-2023-1223 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1223">CVE-2023-1223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1224/">CVE-2023-1224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1224">CVE-2023-1224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1225/">CVE-2023-1225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1225">CVE-2023-1225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1226/">CVE-2023-1226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1226">CVE-2023-1226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1227/">CVE-2023-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1227">CVE-2023-1227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1228/">CVE-2023-1228 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1228">CVE-2023-1228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1229/">CVE-2023-1229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1229">CVE-2023-1229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1230/">CVE-2023-1230 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1230">CVE-2023-1230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1231/">CVE-2023-1231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1231">CVE-2023-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1232/">CVE-2023-1232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1232">CVE-2023-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1233/">CVE-2023-1233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1233">CVE-2023-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1234/">CVE-2023-1234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1234">CVE-2023-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1235/">CVE-2023-1235 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1235">CVE-2023-1235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1236/">CVE-2023-1236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1236">CVE-2023-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1528/">CVE-2023-1528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1528">CVE-2023-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1529/">CVE-2023-1529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1529">CVE-2023-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1530/">CVE-2023-1530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1530">CVE-2023-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1531/">CVE-2023-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1531">CVE-2023-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1532/">CVE-2023-1532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1532">CVE-2023-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1533/">CVE-2023-1533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1533">CVE-2023-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1534/">CVE-2023-1534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1534">CVE-2023-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1810/">CVE-2023-1810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1810">CVE-2023-1810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1811/">CVE-2023-1811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1811">CVE-2023-1811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1812/">CVE-2023-1812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1812">CVE-2023-1812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1813/">CVE-2023-1813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1813">CVE-2023-1813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1814/">CVE-2023-1814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1814">CVE-2023-1814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1815/">CVE-2023-1815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1815">CVE-2023-1815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1816/">CVE-2023-1816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1816">CVE-2023-1816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1817/">CVE-2023-1817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1817">CVE-2023-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1818/">CVE-2023-1818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1818">CVE-2023-1818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1819/">CVE-2023-1819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1819">CVE-2023-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1820/">CVE-2023-1820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1820">CVE-2023-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1821/">CVE-2023-1821 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1821">CVE-2023-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1822/">CVE-2023-1822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1822">CVE-2023-1822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1823/">CVE-2023-1823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1823">CVE-2023-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2033/">CVE-2023-2033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2033">CVE-2023-2033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2133/">CVE-2023-2133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2133">CVE-2023-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2134/">CVE-2023-2134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2134">CVE-2023-2134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2135/">CVE-2023-2135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2135">CVE-2023-2135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2136/">CVE-2023-2136 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2136">CVE-2023-2136 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2459/">CVE-2023-2459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2459">CVE-2023-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2460/">CVE-2023-2460 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2460">CVE-2023-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2461/">CVE-2023-2461 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2461">CVE-2023-2461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2462/">CVE-2023-2462 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2462">CVE-2023-2462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2463/">CVE-2023-2463 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2463">CVE-2023-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2464/">CVE-2023-2464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2464">CVE-2023-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2465/">CVE-2023-2465 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2465">CVE-2023-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2466/">CVE-2023-2466 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2466">CVE-2023-2466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2467/">CVE-2023-2467 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2467">CVE-2023-2467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2468/">CVE-2023-2468 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2468">CVE-2023-2468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930672" comment="ungoogled-chromium-113.0.5672.92-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930673" comment="ungoogled-chromium-chromedriver-113.0.5672.92-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251270" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.51-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26048" ref_url="https://www.suse.com/security/cve/CVE-2023-26048/" source="CVE"/>
		<reference ref_id="CVE-2023-26049" ref_url="https://www.suse.com/security/cve/CVE-2023-26049/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.51-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26048/">CVE-2023-26048 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26048">CVE-2023-26048 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-26049/">CVE-2023-26049 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26049">CVE-2023-26049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930674" comment="jetty-annotations-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930675" comment="jetty-ant-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930676" comment="jetty-cdi-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930677" comment="jetty-client-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930678" comment="jetty-continuation-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930679" comment="jetty-deploy-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930680" comment="jetty-fcgi-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930681" comment="jetty-http-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930682" comment="jetty-http-spi-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930683" comment="jetty-io-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930684" comment="jetty-jaas-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930685" comment="jetty-jmx-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930686" comment="jetty-jndi-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930687" comment="jetty-jsp-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930688" comment="jetty-minimal-javadoc-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930689" comment="jetty-openid-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930690" comment="jetty-plus-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930691" comment="jetty-proxy-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930692" comment="jetty-quickstart-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930693" comment="jetty-rewrite-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930694" comment="jetty-security-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930695" comment="jetty-server-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930696" comment="jetty-servlet-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930697" comment="jetty-servlets-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930698" comment="jetty-start-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930699" comment="jetty-util-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930700" comment="jetty-util-ajax-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930701" comment="jetty-webapp-9.4.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930702" comment="jetty-xml-9.4.51-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251271" version="1" class="patch">
	<metadata>
		<title>apache-commons-fileupload-1.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-fileupload-1.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930703" comment="apache-commons-fileupload-1.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930704" comment="apache-commons-fileupload-javadoc-1.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251272" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930705" comment="c-ares-devel-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930706" comment="c-ares-utils-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930707" comment="libcares2-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930708" comment="libcares2-32bit-1.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251273" version="1" class="patch">
	<metadata>
		<title>hawk2-2.6.4+git.1682509819.1ff135ea-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35458" ref_url="https://www.suse.com/security/cve/CVE-2020-35458/" source="CVE"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="CVE-2021-25314" ref_url="https://www.suse.com/security/cve/CVE-2021-25314/" source="CVE"/>
		<description>
These are all security issues fixed in the hawk2-2.6.4+git.1682509819.1ff135ea-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35458/">CVE-2020-35458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35458">CVE-2020-35458 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35459">CVE-2020-35459 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25314/">CVE-2021-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25314">CVE-2021-25314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930709" comment="hawk2-2.6.4+git.1682509819.1ff135ea-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251274" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.75-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.75-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930710" comment="tomcat-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930711" comment="tomcat-admin-webapps-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930712" comment="tomcat-docs-webapp-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930713" comment="tomcat-el-3_0-api-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930714" comment="tomcat-embed-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930715" comment="tomcat-javadoc-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930716" comment="tomcat-jsp-2_3-api-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930717" comment="tomcat-jsvc-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930718" comment="tomcat-lib-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930719" comment="tomcat-servlet-4_0-api-9.0.75-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930720" comment="tomcat-webapps-9.0.75-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251275" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2157" ref_url="https://www.suse.com/security/cve/CVE-2023-2157/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2157/">CVE-2023-2157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2157">CVE-2023-2157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930721" comment="ImageMagick-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930722" comment="ImageMagick-config-7-SUSE-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930723" comment="ImageMagick-config-7-upstream-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930724" comment="ImageMagick-devel-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930725" comment="ImageMagick-devel-32bit-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930726" comment="ImageMagick-doc-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930727" comment="ImageMagick-extra-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930728" comment="libMagick++-7_Q16HDRI5-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930729" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930730" comment="libMagick++-devel-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930731" comment="libMagick++-devel-32bit-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930732" comment="libMagickCore-7_Q16HDRI10-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930733" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930734" comment="libMagickWand-7_Q16HDRI10-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930735" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930736" comment="perl-PerlMagick-7.1.1.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251276" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.9+kde154-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32762" ref_url="https://www.suse.com/security/cve/CVE-2023-32762/" source="CVE"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.9+kde154-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32762/">CVE-2023-32762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32762">CVE-2023-32762 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930737" comment="libQt5Bootstrap-devel-static-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930738" comment="libQt5Bootstrap-devel-static-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930739" comment="libQt5Concurrent-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930740" comment="libQt5Concurrent-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930741" comment="libQt5Concurrent5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930742" comment="libQt5Concurrent5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930743" comment="libQt5Core-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930744" comment="libQt5Core-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930745" comment="libQt5Core-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930746" comment="libQt5Core5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930747" comment="libQt5Core5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930748" comment="libQt5DBus-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930749" comment="libQt5DBus-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930750" comment="libQt5DBus-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930751" comment="libQt5DBus5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930752" comment="libQt5DBus5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930753" comment="libQt5Gui-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930754" comment="libQt5Gui-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930755" comment="libQt5Gui-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930756" comment="libQt5Gui5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930757" comment="libQt5Gui5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930758" comment="libQt5KmsSupport-devel-static-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930759" comment="libQt5KmsSupport-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930760" comment="libQt5Network-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930761" comment="libQt5Network-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930762" comment="libQt5Network-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930763" comment="libQt5Network5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930764" comment="libQt5Network5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930765" comment="libQt5OpenGL-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930766" comment="libQt5OpenGL-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930767" comment="libQt5OpenGL-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930768" comment="libQt5OpenGL5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930769" comment="libQt5OpenGL5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930770" comment="libQt5OpenGLExtensions-devel-static-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930771" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930772" comment="libQt5PlatformHeaders-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930773" comment="libQt5PlatformSupport-devel-static-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930774" comment="libQt5PlatformSupport-devel-static-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930775" comment="libQt5PlatformSupport-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930776" comment="libQt5PrintSupport-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930777" comment="libQt5PrintSupport-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930778" comment="libQt5PrintSupport-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930779" comment="libQt5PrintSupport5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930780" comment="libQt5PrintSupport5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930781" comment="libQt5Sql-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930782" comment="libQt5Sql-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930783" comment="libQt5Sql-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930784" comment="libQt5Sql5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930785" comment="libQt5Sql5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930786" comment="libQt5Sql5-mysql-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930787" comment="libQt5Sql5-mysql-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930788" comment="libQt5Sql5-postgresql-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930789" comment="libQt5Sql5-postgresql-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930790" comment="libQt5Sql5-sqlite-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930791" comment="libQt5Sql5-sqlite-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930792" comment="libQt5Sql5-unixODBC-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930793" comment="libQt5Sql5-unixODBC-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930794" comment="libQt5Test-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930795" comment="libQt5Test-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930796" comment="libQt5Test-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930797" comment="libQt5Test5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930798" comment="libQt5Test5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930799" comment="libQt5Widgets-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930800" comment="libQt5Widgets-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930801" comment="libQt5Widgets-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930802" comment="libQt5Widgets5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930803" comment="libQt5Widgets5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930804" comment="libQt5Xml-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930805" comment="libQt5Xml-devel-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930806" comment="libQt5Xml5-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930807" comment="libQt5Xml5-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930808" comment="libqt5-qtbase-common-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930809" comment="libqt5-qtbase-devel-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930810" comment="libqt5-qtbase-examples-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930811" comment="libqt5-qtbase-examples-32bit-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930812" comment="libqt5-qtbase-platformtheme-gtk3-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930813" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.9+kde154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930814" comment="libqt5-qtbase-private-headers-devel-5.15.9+kde154-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251277" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.11.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.11.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930815" comment="libmariadbd-devel-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930816" comment="libmariadbd19-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930817" comment="mariadb-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930818" comment="mariadb-bench-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930819" comment="mariadb-client-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930820" comment="mariadb-errormessages-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930821" comment="mariadb-galera-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930822" comment="mariadb-rpm-macros-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930823" comment="mariadb-test-10.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930824" comment="mariadb-tools-10.11.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251278" version="1" class="patch">
	<metadata>
		<title>python310-sqlparse-0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-sqlparse-0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930825" comment="python310-sqlparse-0.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930826" comment="python311-sqlparse-0.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930827" comment="python39-sqlparse-0.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251279" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0666" ref_url="https://www.suse.com/security/cve/CVE-2023-0666/" source="CVE"/>
		<reference ref_id="CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668/" source="CVE"/>
		<reference ref_id="CVE-2023-2854" ref_url="https://www.suse.com/security/cve/CVE-2023-2854/" source="CVE"/>
		<reference ref_id="CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2857" ref_url="https://www.suse.com/security/cve/CVE-2023-2857/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0666/">CVE-2023-0666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0666">CVE-2023-0666 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2854/">CVE-2023-2854 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2854">CVE-2023-2854 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2857/">CVE-2023-2857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2857">CVE-2023-2857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930828" comment="libwireshark16-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930829" comment="libwiretap13-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930830" comment="libwsutil14-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930831" comment="wireshark-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930832" comment="wireshark-devel-4.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930833" comment="wireshark-ui-qt-4.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251280" version="1" class="patch">
	<metadata>
		<title>xen-4.17.1_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42336" ref_url="https://www.suse.com/security/cve/CVE-2022-42336/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.1_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42336/">CVE-2022-42336 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42336">CVE-2022-42336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930834" comment="xen-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930835" comment="xen-devel-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930836" comment="xen-doc-html-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930837" comment="xen-libs-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930838" comment="xen-tools-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930839" comment="xen-tools-domU-4.17.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930840" comment="xen-tools-xendomains-wait-disk-4.17.1_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251281" version="1" class="patch">
	<metadata>
		<title>watchexec-1.22.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the watchexec-1.22.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930841" comment="watchexec-1.22.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251282" version="1" class="patch">
	<metadata>
		<title>sysstat-12.6.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.6.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930842" comment="sysstat-12.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930843" comment="sysstat-isag-12.6.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251283" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-113.0.5672.126-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2721" ref_url="https://www.suse.com/security/cve/CVE-2023-2721/" source="CVE"/>
		<reference ref_id="CVE-2023-2722" ref_url="https://www.suse.com/security/cve/CVE-2023-2722/" source="CVE"/>
		<reference ref_id="CVE-2023-2723" ref_url="https://www.suse.com/security/cve/CVE-2023-2723/" source="CVE"/>
		<reference ref_id="CVE-2023-2724" ref_url="https://www.suse.com/security/cve/CVE-2023-2724/" source="CVE"/>
		<reference ref_id="CVE-2023-2725" ref_url="https://www.suse.com/security/cve/CVE-2023-2725/" source="CVE"/>
		<reference ref_id="CVE-2023-2726" ref_url="https://www.suse.com/security/cve/CVE-2023-2726/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-113.0.5672.126-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2721/">CVE-2023-2721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2721">CVE-2023-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2722/">CVE-2023-2722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2722">CVE-2023-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2723/">CVE-2023-2723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2723">CVE-2023-2723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2724/">CVE-2023-2724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2724">CVE-2023-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2725/">CVE-2023-2725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2725">CVE-2023-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2726/">CVE-2023-2726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2726">CVE-2023-2726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930844" comment="ungoogled-chromium-113.0.5672.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930845" comment="ungoogled-chromium-chromedriver-113.0.5672.126-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251284" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1215" ref_url="https://www.suse.com/security/cve/CVE-2023-1215/" source="CVE"/>
		<reference ref_id="CVE-2023-1217" ref_url="https://www.suse.com/security/cve/CVE-2023-1217/" source="CVE"/>
		<reference ref_id="CVE-2023-1219" ref_url="https://www.suse.com/security/cve/CVE-2023-1219/" source="CVE"/>
		<reference ref_id="CVE-2023-1220" ref_url="https://www.suse.com/security/cve/CVE-2023-1220/" source="CVE"/>
		<reference ref_id="CVE-2023-1222" ref_url="https://www.suse.com/security/cve/CVE-2023-1222/" source="CVE"/>
		<reference ref_id="CVE-2023-1529" ref_url="https://www.suse.com/security/cve/CVE-2023-1529/" source="CVE"/>
		<reference ref_id="CVE-2023-1530" ref_url="https://www.suse.com/security/cve/CVE-2023-1530/" source="CVE"/>
		<reference ref_id="CVE-2023-1531" ref_url="https://www.suse.com/security/cve/CVE-2023-1531/" source="CVE"/>
		<reference ref_id="CVE-2023-1534" ref_url="https://www.suse.com/security/cve/CVE-2023-1534/" source="CVE"/>
		<reference ref_id="CVE-2023-1810" ref_url="https://www.suse.com/security/cve/CVE-2023-1810/" source="CVE"/>
		<reference ref_id="CVE-2023-1811" ref_url="https://www.suse.com/security/cve/CVE-2023-1811/" source="CVE"/>
		<reference ref_id="CVE-2023-2033" ref_url="https://www.suse.com/security/cve/CVE-2023-2033/" source="CVE"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1215/">CVE-2023-1215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1215">CVE-2023-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1217/">CVE-2023-1217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1217">CVE-2023-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1219/">CVE-2023-1219 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1219">CVE-2023-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1220/">CVE-2023-1220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1220">CVE-2023-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1222/">CVE-2023-1222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1222">CVE-2023-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1529/">CVE-2023-1529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1529">CVE-2023-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1530/">CVE-2023-1530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1530">CVE-2023-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1531/">CVE-2023-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1531">CVE-2023-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1534/">CVE-2023-1534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1534">CVE-2023-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1810/">CVE-2023-1810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1810">CVE-2023-1810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1811/">CVE-2023-1811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1811">CVE-2023-1811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2033/">CVE-2023-2033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2033">CVE-2023-2033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930846" comment="libQt5Pdf5-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930847" comment="libQt5PdfWidgets5-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930848" comment="libqt5-qtpdf-devel-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930849" comment="libqt5-qtpdf-examples-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930850" comment="libqt5-qtpdf-imports-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930851" comment="libqt5-qtpdf-private-headers-devel-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930852" comment="libqt5-qtwebengine-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930853" comment="libqt5-qtwebengine-devel-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930854" comment="libqt5-qtwebengine-examples-5.15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930855" comment="libqt5-qtwebengine-private-headers-devel-5.15.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251285" version="1" class="patch">
	<metadata>
		<title>python310-3.10.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930856" comment="python310-3.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930857" comment="python310-32bit-3.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930858" comment="python310-curses-3.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930859" comment="python310-dbm-3.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930860" comment="python310-idle-3.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930861" comment="python310-tk-3.10.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251286" version="1" class="patch">
	<metadata>
		<title>rekor-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33199" ref_url="https://www.suse.com/security/cve/CVE-2023-33199/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33199/">CVE-2023-33199 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33199">CVE-2023-33199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930862" comment="rekor-1.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251287" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930863" comment="libopenssl-1_0_0-devel-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930864" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930865" comment="libopenssl10-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930866" comment="libopenssl1_0_0-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930867" comment="libopenssl1_0_0-32bit-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930868" comment="libopenssl1_0_0-hmac-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930869" comment="libopenssl1_0_0-hmac-32bit-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930870" comment="libopenssl1_0_0-steam-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930871" comment="libopenssl1_0_0-steam-32bit-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930872" comment="openssl-1_0_0-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930873" comment="openssl-1_0_0-cavs-1.0.2u-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930874" comment="openssl-1_0_0-doc-1.0.2u-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251288" version="1" class="patch">
	<metadata>
		<title>frr-8.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489/" source="CVE"/>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930875" comment="frr-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930876" comment="frr-devel-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930877" comment="libfrr0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930878" comment="libfrr_pb0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930879" comment="libfrrcares0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930880" comment="libfrrfpm_pb0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930881" comment="libfrrospfapiclient0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930882" comment="libfrrsnmp0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930883" comment="libfrrzmq0-8.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930884" comment="libmlag_pb0-8.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251289" version="1" class="patch">
	<metadata>
		<title>opensc-0.23.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.23.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930885" comment="opensc-0.23.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251290" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="CVE-2023-1255" ref_url="https://www.suse.com/security/cve/CVE-2023-1255/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1255/">CVE-2023-1255 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930886" comment="libopenssl-3-devel-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930887" comment="libopenssl-3-devel-32bit-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930888" comment="libopenssl3-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930889" comment="libopenssl3-32bit-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930890" comment="libopenssl3-x86-64-v3-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930891" comment="openssl-3-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930892" comment="openssl-3-doc-3.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251291" version="1" class="patch">
	<metadata>
		<title>supportutils-3.1.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.1.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930893" comment="supportutils-3.1.25-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251292" version="1" class="patch">
	<metadata>
		<title>apache2-mod_apparmor-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1585" ref_url="https://www.suse.com/security/cve/CVE-2016-1585/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_apparmor-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1585/">CVE-2016-1585 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1585">CVE-2016-1585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930894" comment="apache2-mod_apparmor-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930895" comment="apparmor-abstractions-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930896" comment="apparmor-docs-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930897" comment="apparmor-parser-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930898" comment="apparmor-parser-lang-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930899" comment="apparmor-profiles-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930900" comment="apparmor-utils-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930901" comment="apparmor-utils-lang-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930902" comment="pam_apparmor-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930903" comment="pam_apparmor-32bit-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930904" comment="perl-apparmor-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930905" comment="python3-apparmor-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930906" comment="ruby-apparmor-3.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251293" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1u-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1u-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930907" comment="libopenssl-1_1-devel-1.1.1u-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930908" comment="libopenssl-1_1-devel-32bit-1.1.1u-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930909" comment="libopenssl1_1-1.1.1u-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930910" comment="libopenssl1_1-32bit-1.1.1u-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930911" comment="openssl-1_1-1.1.1u-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930912" comment="openssl-1_1-doc-1.1.1u-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251294" version="1" class="patch">
	<metadata>
		<title>pijul-1.0.0~beta.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the pijul-1.0.0~beta.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930913" comment="pijul-1.0.0~beta.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251295" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-rack-2.2-2.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-rack-2.2-2.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930914" comment="ruby3.2-rubygem-rack-2.2-2.2.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251296" version="1" class="patch">
	<metadata>
		<title>cups-2.4.2-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.2-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930915" comment="cups-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930916" comment="cups-client-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930917" comment="cups-config-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930918" comment="cups-ddk-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930919" comment="cups-devel-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930920" comment="cups-devel-32bit-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930921" comment="libcups2-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930922" comment="libcups2-32bit-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930923" comment="libcupsimage2-2.4.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930924" comment="libcupsimage2-32bit-2.4.2-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251297" version="1" class="patch">
	<metadata>
		<title>python311-3.11.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930925" comment="python311-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930926" comment="python311-32bit-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930927" comment="python311-curses-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930928" comment="python311-dbm-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930929" comment="python311-idle-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930930" comment="python311-tk-3.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930931" comment="python311-x86-64-v3-3.11.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251298" version="1" class="patch">
	<metadata>
		<title>python38-3.8.16-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.16-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930932" comment="python38-3.8.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930933" comment="python38-32bit-3.8.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930934" comment="python38-curses-3.8.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930935" comment="python38-dbm-3.8.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930936" comment="python38-idle-3.8.16-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930937" comment="python38-tk-3.8.16-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251299" version="1" class="patch">
	<metadata>
		<title>chromedriver-114.0.5735.90-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2929" ref_url="https://www.suse.com/security/cve/CVE-2023-2929/" source="CVE"/>
		<reference ref_id="CVE-2023-2930" ref_url="https://www.suse.com/security/cve/CVE-2023-2930/" source="CVE"/>
		<reference ref_id="CVE-2023-2931" ref_url="https://www.suse.com/security/cve/CVE-2023-2931/" source="CVE"/>
		<reference ref_id="CVE-2023-2932" ref_url="https://www.suse.com/security/cve/CVE-2023-2932/" source="CVE"/>
		<reference ref_id="CVE-2023-2933" ref_url="https://www.suse.com/security/cve/CVE-2023-2933/" source="CVE"/>
		<reference ref_id="CVE-2023-2934" ref_url="https://www.suse.com/security/cve/CVE-2023-2934/" source="CVE"/>
		<reference ref_id="CVE-2023-2935" ref_url="https://www.suse.com/security/cve/CVE-2023-2935/" source="CVE"/>
		<reference ref_id="CVE-2023-2936" ref_url="https://www.suse.com/security/cve/CVE-2023-2936/" source="CVE"/>
		<reference ref_id="CVE-2023-2937" ref_url="https://www.suse.com/security/cve/CVE-2023-2937/" source="CVE"/>
		<reference ref_id="CVE-2023-2938" ref_url="https://www.suse.com/security/cve/CVE-2023-2938/" source="CVE"/>
		<reference ref_id="CVE-2023-2939" ref_url="https://www.suse.com/security/cve/CVE-2023-2939/" source="CVE"/>
		<reference ref_id="CVE-2023-2940" ref_url="https://www.suse.com/security/cve/CVE-2023-2940/" source="CVE"/>
		<reference ref_id="CVE-2023-2941" ref_url="https://www.suse.com/security/cve/CVE-2023-2941/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-114.0.5735.90-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2929/">CVE-2023-2929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2929">CVE-2023-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2930/">CVE-2023-2930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2930">CVE-2023-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2931/">CVE-2023-2931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2931">CVE-2023-2931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2932/">CVE-2023-2932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2932">CVE-2023-2932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2933/">CVE-2023-2933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2933">CVE-2023-2933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2934/">CVE-2023-2934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2934">CVE-2023-2934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2935/">CVE-2023-2935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2935">CVE-2023-2935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2936/">CVE-2023-2936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2936">CVE-2023-2936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2937/">CVE-2023-2937 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2937">CVE-2023-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2938/">CVE-2023-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2938">CVE-2023-2938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2939/">CVE-2023-2939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2939">CVE-2023-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2940/">CVE-2023-2940 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2940">CVE-2023-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2941/">CVE-2023-2941 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2941">CVE-2023-2941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930938" comment="chromedriver-114.0.5735.90-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930939" comment="chromium-114.0.5735.90-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251300" version="1" class="patch">
	<metadata>
		<title>cockpit-agama-2.1+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28154" ref_url="https://www.suse.com/security/cve/CVE-2023-28154/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-agama-2.1+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28154/">CVE-2023-28154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28154">CVE-2023-28154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930940" comment="cockpit-agama-2.1+0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251301" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.5.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.5.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930941" comment="libQt6Concurrent6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930942" comment="libQt6Core6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930943" comment="libQt6DBus6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930944" comment="libQt6Gui6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930945" comment="libQt6Network6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930946" comment="libQt6OpenGL6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930947" comment="libQt6OpenGLWidgets6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930948" comment="libQt6PrintSupport6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930949" comment="libQt6Sql6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930950" comment="libQt6Test6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930951" comment="libQt6Widgets6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930952" comment="libQt6Xml6-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930953" comment="qt6-base-common-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930954" comment="qt6-base-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930955" comment="qt6-base-examples-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930956" comment="qt6-base-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930957" comment="qt6-concurrent-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930958" comment="qt6-core-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930959" comment="qt6-core-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930960" comment="qt6-dbus-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930961" comment="qt6-dbus-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930962" comment="qt6-docs-common-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930963" comment="qt6-exampleicons-devel-static-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930964" comment="qt6-gui-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930965" comment="qt6-gui-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930966" comment="qt6-kmssupport-devel-static-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930967" comment="qt6-kmssupport-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930968" comment="qt6-network-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930969" comment="qt6-network-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930970" comment="qt6-network-tls-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930971" comment="qt6-networkinformation-glib-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930972" comment="qt6-networkinformation-nm-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930973" comment="qt6-opengl-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930974" comment="qt6-opengl-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930975" comment="qt6-openglwidgets-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930976" comment="qt6-platformsupport-devel-static-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930977" comment="qt6-platformsupport-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930978" comment="qt6-platformtheme-gtk3-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930979" comment="qt6-platformtheme-xdgdesktopportal-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930980" comment="qt6-printsupport-cups-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930981" comment="qt6-printsupport-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930982" comment="qt6-printsupport-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930983" comment="qt6-sql-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930984" comment="qt6-sql-mysql-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930985" comment="qt6-sql-postgresql-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930986" comment="qt6-sql-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930987" comment="qt6-sql-sqlite-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930988" comment="qt6-sql-unixODBC-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930989" comment="qt6-test-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930990" comment="qt6-test-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930991" comment="qt6-widgets-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930992" comment="qt6-widgets-private-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930993" comment="qt6-xml-devel-6.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930994" comment="qt6-xml-private-devel-6.5.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251302" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009930996" comment="kernel-macros-6.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930997" comment="kernel-source-6.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930998" comment="kernel-source-vanilla-6.3.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251303" version="1" class="patch">
	<metadata>
		<title>keepass-2.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32784" ref_url="https://www.suse.com/security/cve/CVE-2023-32784/" source="CVE"/>
		<description>
These are all security issues fixed in the keepass-2.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32784/">CVE-2023-32784 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32784">CVE-2023-32784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009930999" comment="keepass-2.54-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251304" version="1" class="patch">
	<metadata>
		<title>openssh-9.3p1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2274" ref_url="https://www.suse.com/security/cve/CVE-2022-2274/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.3p1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2274/">CVE-2022-2274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2274">CVE-2022-2274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931000" comment="openssh-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931001" comment="openssh-cavs-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931002" comment="openssh-clients-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931003" comment="openssh-common-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931004" comment="openssh-fips-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931005" comment="openssh-helpers-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931006" comment="openssh-server-9.3p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931007" comment="openssh-server-config-rootlogin-9.3p1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251305" version="1" class="patch">
	<metadata>
		<title>syncthing-1.23.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46165" ref_url="https://www.suse.com/security/cve/CVE-2022-46165/" source="CVE"/>
		<description>
These are all security issues fixed in the syncthing-1.23.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46165/">CVE-2022-46165 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46165">CVE-2022-46165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931008" comment="syncthing-1.23.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931009" comment="syncthing-relaysrv-1.23.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251306" version="1" class="patch">
	<metadata>
		<title>chromedriver-114.0.5735.106-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3079" ref_url="https://www.suse.com/security/cve/CVE-2023-3079/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-114.0.5735.106-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3079/">CVE-2023-3079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931010" comment="chromedriver-114.0.5735.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931011" comment="chromium-114.0.5735.106-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251307" version="1" class="patch">
	<metadata>
		<title>renderdoc-1.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33863" ref_url="https://www.suse.com/security/cve/CVE-2023-33863/" source="CVE"/>
		<reference ref_id="CVE-2023-33864" ref_url="https://www.suse.com/security/cve/CVE-2023-33864/" source="CVE"/>
		<reference ref_id="CVE-2023-33865" ref_url="https://www.suse.com/security/cve/CVE-2023-33865/" source="CVE"/>
		<description>
These are all security issues fixed in the renderdoc-1.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33863/">CVE-2023-33863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33863">CVE-2023-33863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33864/">CVE-2023-33864 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33864">CVE-2023-33864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33865/">CVE-2023-33865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33865">CVE-2023-33865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931012" comment="renderdoc-1.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931013" comment="renderdoc-devel-1.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251308" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931014" comment="go1.19-1.19.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931015" comment="go1.19-doc-1.19.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931016" comment="go1.19-libstd-1.19.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931017" comment="go1.19-race-1.19.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251309" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931018" comment="go1.20-1.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931019" comment="go1.20-doc-1.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931020" comment="go1.20-libstd-1.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931021" comment="go1.20-race-1.20.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251310" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2879" ref_url="https://www.suse.com/security/cve/CVE-2023-2879/" source="CVE"/>
		<reference ref_id="CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2879/">CVE-2023-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2879">CVE-2023-2879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931022" comment="libwireshark16-4.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931023" comment="libwiretap13-4.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931024" comment="libwsutil14-4.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931025" comment="wireshark-4.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931026" comment="wireshark-devel-4.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931027" comment="wireshark-ui-qt-4.0.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251311" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931028" comment="MozillaThunderbird-102.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931029" comment="MozillaThunderbird-translations-common-102.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931030" comment="MozillaThunderbird-translations-other-102.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251312" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-114.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34415" ref_url="https://www.suse.com/security/cve/CVE-2023-34415/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<reference ref_id="CVE-2023-34417" ref_url="https://www.suse.com/security/cve/CVE-2023-34417/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-114.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34415/">CVE-2023-34415 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34415">CVE-2023-34415 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34417/">CVE-2023-34417 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34417">CVE-2023-34417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931031" comment="MozillaFirefox-114.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931032" comment="MozillaFirefox-branding-upstream-114.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931033" comment="MozillaFirefox-devel-114.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931034" comment="MozillaFirefox-translations-common-114.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931035" comment="MozillaFirefox-translations-other-114.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251313" version="1" class="patch">
	<metadata>
		<title>kubernetes1.27-apiserver-1.27.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.27-apiserver-1.27.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931036" comment="kubernetes1.27-apiserver-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931037" comment="kubernetes1.27-client-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931038" comment="kubernetes1.27-client-bash-completion-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931039" comment="kubernetes1.27-client-common-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931040" comment="kubernetes1.27-client-fish-completion-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931041" comment="kubernetes1.27-controller-manager-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931042" comment="kubernetes1.27-kubeadm-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931043" comment="kubernetes1.27-kubelet-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931044" comment="kubernetes1.27-kubelet-common-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931045" comment="kubernetes1.27-proxy-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931046" comment="kubernetes1.27-scheduler-1.27.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251314" version="1" class="patch">
	<metadata>
		<title>xtrans-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25697" ref_url="https://www.suse.com/security/cve/CVE-2020-25697/" source="CVE"/>
		<description>
These are all security issues fixed in the xtrans-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25697/">CVE-2020-25697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25697">CVE-2020-25697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931047" comment="xtrans-1.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251315" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931049" comment="kernel-macros-6.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931050" comment="kernel-source-6.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931051" comment="kernel-source-vanilla-6.3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251316" version="1" class="patch">
	<metadata>
		<title>librnp0-0.16.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479/" source="CVE"/>
		<reference ref_id="CVE-2023-29480" ref_url="https://www.suse.com/security/cve/CVE-2023-29480/" source="CVE"/>
		<description>
These are all security issues fixed in the librnp0-0.16.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29480/">CVE-2023-29480 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29480">CVE-2023-29480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931052" comment="librnp0-0.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931053" comment="rnp-0.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931054" comment="rnp-devel-0.16.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251317" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.14.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.14.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931055" comment="dbus-1-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931056" comment="dbus-1-common-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931057" comment="dbus-1-daemon-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931058" comment="dbus-1-devel-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931059" comment="dbus-1-devel-32bit-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931060" comment="dbus-1-tools-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931061" comment="libdbus-1-3-1.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931062" comment="libdbus-1-3-32bit-1.14.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251318" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26555" ref_url="https://www.suse.com/security/cve/CVE-2023-26555/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26555/">CVE-2023-26555 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26555">CVE-2023-26555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931063" comment="ntp-4.2.8p17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931064" comment="ntp-dcf77-tools-4.2.8p17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931065" comment="ntp-doc-4.2.8p17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251319" version="1" class="patch">
	<metadata>
		<title>python310-requests-2.31.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-requests-2.31.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931066" comment="python310-requests-2.31.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931067" comment="python311-requests-2.31.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931068" comment="python39-requests-2.31.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251320" version="1" class="patch">
	<metadata>
		<title>chromedriver-114.0.5735.133-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3214" ref_url="https://www.suse.com/security/cve/CVE-2023-3214/" source="CVE"/>
		<reference ref_id="CVE-2023-3215" ref_url="https://www.suse.com/security/cve/CVE-2023-3215/" source="CVE"/>
		<reference ref_id="CVE-2023-3216" ref_url="https://www.suse.com/security/cve/CVE-2023-3216/" source="CVE"/>
		<reference ref_id="CVE-2023-3217" ref_url="https://www.suse.com/security/cve/CVE-2023-3217/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-114.0.5735.133-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3214/">CVE-2023-3214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3214">CVE-2023-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3215/">CVE-2023-3215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3215">CVE-2023-3215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3216/">CVE-2023-3216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3217/">CVE-2023-3217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3217">CVE-2023-3217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931069" comment="chromedriver-114.0.5735.133-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931070" comment="chromium-114.0.5735.133-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251321" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34474" ref_url="https://www.suse.com/security/cve/CVE-2023-34474/" source="CVE"/>
		<reference ref_id="CVE-2023-34475" ref_url="https://www.suse.com/security/cve/CVE-2023-34475/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34474/">CVE-2023-34474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34474">CVE-2023-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34475/">CVE-2023-34475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34475">CVE-2023-34475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931071" comment="ImageMagick-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931072" comment="ImageMagick-config-7-SUSE-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931073" comment="ImageMagick-config-7-upstream-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931074" comment="ImageMagick-devel-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931075" comment="ImageMagick-devel-32bit-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931076" comment="ImageMagick-doc-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931077" comment="ImageMagick-extra-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931078" comment="libMagick++-7_Q16HDRI5-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931079" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931080" comment="libMagick++-devel-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931081" comment="libMagick++-devel-32bit-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931082" comment="libMagickCore-7_Q16HDRI10-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931083" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931084" comment="libMagickWand-7_Q16HDRI10-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931085" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931086" comment="perl-PerlMagick-7.1.1.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251322" version="1" class="patch">
	<metadata>
		<title>guava-32.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2976" ref_url="https://www.suse.com/security/cve/CVE-2023-2976/" source="CVE"/>
		<description>
These are all security issues fixed in the guava-32.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2976/">CVE-2023-2976 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931087" comment="guava-32.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931088" comment="guava-javadoc-32.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931089" comment="guava-testlib-32.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251323" version="1" class="patch">
	<metadata>
		<title>libiniparser-devel-4.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33461" ref_url="https://www.suse.com/security/cve/CVE-2023-33461/" source="CVE"/>
		<description>
These are all security issues fixed in the libiniparser-devel-4.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33461/">CVE-2023-33461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33461">CVE-2023-33461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931090" comment="libiniparser-devel-4.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931091" comment="libiniparser1-4.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251324" version="1" class="patch">
	<metadata>
		<title>kubernetes1.23-apiserver-1.23.17-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.23-apiserver-1.23.17-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931092" comment="kubernetes1.23-apiserver-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931093" comment="kubernetes1.23-client-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931094" comment="kubernetes1.23-client-bash-completion-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931095" comment="kubernetes1.23-client-common-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931096" comment="kubernetes1.23-client-fish-completion-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931097" comment="kubernetes1.23-controller-manager-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931098" comment="kubernetes1.23-kubeadm-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931099" comment="kubernetes1.23-kubelet-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931100" comment="kubernetes1.23-kubelet-common-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931101" comment="kubernetes1.23-proxy-1.23.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931102" comment="kubernetes1.23-scheduler-1.23.17-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251325" version="1" class="patch">
	<metadata>
		<title>kubernetes1.24-apiserver-1.24.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.24-apiserver-1.24.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931103" comment="kubernetes1.24-apiserver-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931104" comment="kubernetes1.24-client-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931105" comment="kubernetes1.24-client-bash-completion-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931106" comment="kubernetes1.24-client-common-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931107" comment="kubernetes1.24-client-fish-completion-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931108" comment="kubernetes1.24-controller-manager-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931109" comment="kubernetes1.24-kubeadm-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931110" comment="kubernetes1.24-kubelet-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931111" comment="kubernetes1.24-kubelet-common-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931112" comment="kubernetes1.24-proxy-1.24.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931113" comment="kubernetes1.24-scheduler-1.24.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251326" version="1" class="patch">
	<metadata>
		<title>kubescape-2.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<description>
These are all security issues fixed in the kubescape-2.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931114" comment="kubescape-2.3.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251327" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.10+kde129-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.10+kde129-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931115" comment="libQt5Bootstrap-devel-static-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931116" comment="libQt5Bootstrap-devel-static-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931117" comment="libQt5Concurrent-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931118" comment="libQt5Concurrent-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931119" comment="libQt5Concurrent5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931120" comment="libQt5Concurrent5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931121" comment="libQt5Core-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931122" comment="libQt5Core-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931123" comment="libQt5Core-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931124" comment="libQt5Core5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931125" comment="libQt5Core5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931126" comment="libQt5DBus-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931127" comment="libQt5DBus-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931128" comment="libQt5DBus-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931129" comment="libQt5DBus5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931130" comment="libQt5DBus5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931131" comment="libQt5Gui-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931132" comment="libQt5Gui-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931133" comment="libQt5Gui-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931134" comment="libQt5Gui5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931135" comment="libQt5Gui5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931136" comment="libQt5KmsSupport-devel-static-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931137" comment="libQt5KmsSupport-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931138" comment="libQt5Network-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931139" comment="libQt5Network-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931140" comment="libQt5Network-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931141" comment="libQt5Network5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931142" comment="libQt5Network5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931143" comment="libQt5OpenGL-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931144" comment="libQt5OpenGL-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931145" comment="libQt5OpenGL-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931146" comment="libQt5OpenGL5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931147" comment="libQt5OpenGL5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931148" comment="libQt5OpenGLExtensions-devel-static-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931149" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931150" comment="libQt5PlatformHeaders-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931151" comment="libQt5PlatformSupport-devel-static-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931152" comment="libQt5PlatformSupport-devel-static-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931153" comment="libQt5PlatformSupport-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931154" comment="libQt5PrintSupport-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931155" comment="libQt5PrintSupport-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931156" comment="libQt5PrintSupport-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931157" comment="libQt5PrintSupport5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931158" comment="libQt5PrintSupport5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931159" comment="libQt5Sql-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931160" comment="libQt5Sql-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931161" comment="libQt5Sql-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931162" comment="libQt5Sql5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931163" comment="libQt5Sql5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931164" comment="libQt5Sql5-mysql-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931165" comment="libQt5Sql5-mysql-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931166" comment="libQt5Sql5-postgresql-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931167" comment="libQt5Sql5-postgresql-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931168" comment="libQt5Sql5-sqlite-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931169" comment="libQt5Sql5-sqlite-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931170" comment="libQt5Sql5-unixODBC-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931171" comment="libQt5Sql5-unixODBC-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931172" comment="libQt5Test-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931173" comment="libQt5Test-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931174" comment="libQt5Test-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931175" comment="libQt5Test5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931176" comment="libQt5Test5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931177" comment="libQt5Widgets-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931178" comment="libQt5Widgets-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931179" comment="libQt5Widgets-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931180" comment="libQt5Widgets5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931181" comment="libQt5Widgets5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931182" comment="libQt5Xml-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931183" comment="libQt5Xml-devel-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931184" comment="libQt5Xml5-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931185" comment="libQt5Xml5-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931186" comment="libqt5-qtbase-common-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931187" comment="libqt5-qtbase-devel-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931188" comment="libqt5-qtbase-examples-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931189" comment="libqt5-qtbase-examples-32bit-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931190" comment="libqt5-qtbase-platformtheme-gtk3-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931191" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.10+kde129-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931192" comment="libqt5-qtbase-private-headers-devel-5.15.10+kde129-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251328" version="1" class="patch">
	<metadata>
		<title>traefik-2.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-29013" ref_url="https://www.suse.com/security/cve/CVE-2023-29013/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-2.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29013/">CVE-2023-29013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29013">CVE-2023-29013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931193" comment="traefik-2.10.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251329" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931194" comment="libX11-6-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931195" comment="libX11-6-32bit-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931196" comment="libX11-data-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931197" comment="libX11-devel-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931198" comment="libX11-devel-32bit-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931199" comment="libX11-xcb1-1.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931200" comment="libX11-xcb1-32bit-1.8.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251330" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2725" ref_url="https://www.suse.com/security/cve/CVE-2023-2725/" source="CVE"/>
		<reference ref_id="CVE-2023-2930" ref_url="https://www.suse.com/security/cve/CVE-2023-2930/" source="CVE"/>
		<reference ref_id="CVE-2023-3079" ref_url="https://www.suse.com/security/cve/CVE-2023-3079/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2725/">CVE-2023-2725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2725">CVE-2023-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2930/">CVE-2023-2930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2930">CVE-2023-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3079/">CVE-2023-3079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931201" comment="nodejs-electron-22.3.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931202" comment="nodejs-electron-devel-22.3.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931203" comment="nodejs-electron-doc-22.3.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251331" version="1" class="patch">
	<metadata>
		<title>imlib2-1.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12761" ref_url="https://www.suse.com/security/cve/CVE-2020-12761/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-1.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12761/">CVE-2020-12761 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12761">CVE-2020-12761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931204" comment="imlib2-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931205" comment="imlib2-devel-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931206" comment="imlib2-filters-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931207" comment="imlib2-loaders-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931208" comment="libImlib2-1-1.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251332" version="1" class="patch">
	<metadata>
		<title>kubernetes1.24-apiserver-1.24.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.24-apiserver-1.24.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931209" comment="kubernetes1.24-apiserver-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931210" comment="kubernetes1.24-client-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931211" comment="kubernetes1.24-client-bash-completion-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931212" comment="kubernetes1.24-client-common-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931213" comment="kubernetes1.24-client-fish-completion-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931214" comment="kubernetes1.24-controller-manager-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931215" comment="kubernetes1.24-kubeadm-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931216" comment="kubernetes1.24-kubelet-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931217" comment="kubernetes1.24-kubelet-common-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931218" comment="kubernetes1.24-proxy-1.24.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931219" comment="kubernetes1.24-scheduler-1.24.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251333" version="1" class="patch">
	<metadata>
		<title>libldap-data-2.6.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-data-2.6.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931220" comment="libldap-data-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931221" comment="libldap2-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931222" comment="libldap2-32bit-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931223" comment="openldap2-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931224" comment="openldap2-back-meta-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931225" comment="openldap2-back-perl-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931226" comment="openldap2-back-sock-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931227" comment="openldap2-back-sql-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931228" comment="openldap2-client-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931229" comment="openldap2-contrib-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931230" comment="openldap2-devel-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931231" comment="openldap2-devel-32bit-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931232" comment="openldap2-devel-static-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931233" comment="openldap2-doc-2.6.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251334" version="1" class="patch">
	<metadata>
		<title>kubernetes1.23-apiserver-1.23.17-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2431" ref_url="https://www.suse.com/security/cve/CVE-2023-2431/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.23-apiserver-1.23.17-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2431/">CVE-2023-2431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2431">CVE-2023-2431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931234" comment="kubernetes1.23-apiserver-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931235" comment="kubernetes1.23-client-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931236" comment="kubernetes1.23-client-bash-completion-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931237" comment="kubernetes1.23-client-common-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931238" comment="kubernetes1.23-client-fish-completion-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931239" comment="kubernetes1.23-controller-manager-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931240" comment="kubernetes1.23-kubeadm-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931241" comment="kubernetes1.23-kubelet-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931242" comment="kubernetes1.23-kubelet-common-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931243" comment="kubernetes1.23-proxy-1.23.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931244" comment="kubernetes1.23-scheduler-1.23.17-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251335" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0667" ref_url="https://www.suse.com/security/cve/CVE-2023-0667/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0667/">CVE-2023-0667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0667">CVE-2023-0667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931245" comment="libwireshark16-4.0.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931246" comment="libwiretap13-4.0.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931247" comment="libwsutil14-4.0.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931248" comment="wireshark-4.0.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931249" comment="wireshark-devel-4.0.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931250" comment="wireshark-ui-qt-4.0.6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251336" version="1" class="patch">
	<metadata>
		<title>bind-9.18.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<reference ref_id="CVE-2023-2911" ref_url="https://www.suse.com/security/cve/CVE-2023-2911/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2911/">CVE-2023-2911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2911">CVE-2023-2911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931251" comment="bind-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931252" comment="bind-doc-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931253" comment="bind-modules-bdbhpt-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931254" comment="bind-modules-generic-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931255" comment="bind-modules-ldap-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931256" comment="bind-modules-mysql-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931257" comment="bind-modules-perl-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931258" comment="bind-modules-sqlite3-9.18.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931259" comment="bind-utils-9.18.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251337" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.74-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33201" ref_url="https://www.suse.com/security/cve/CVE-2023-33201/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.74-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-33201/">CVE-2023-33201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33201">CVE-2023-33201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931260" comment="bouncycastle-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931261" comment="bouncycastle-javadoc-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931262" comment="bouncycastle-jmail-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931263" comment="bouncycastle-mail-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931264" comment="bouncycastle-pg-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931265" comment="bouncycastle-pkix-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931266" comment="bouncycastle-tls-1.74-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931267" comment="bouncycastle-util-1.74-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251338" version="1" class="patch">
	<metadata>
		<title>cups-2.4.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.2-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931268" comment="cups-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931269" comment="cups-client-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931270" comment="cups-config-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931271" comment="cups-ddk-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931272" comment="cups-devel-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931273" comment="cups-devel-32bit-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931274" comment="libcups2-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931275" comment="libcups2-32bit-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931276" comment="libcupsimage2-2.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931277" comment="libcupsimage2-32bit-2.4.2-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251339" version="1" class="patch">
	<metadata>
		<title>grafana-10.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3128" ref_url="https://www.suse.com/security/cve/CVE-2023-3128/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-10.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-3128/">CVE-2023-3128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3128">CVE-2023-3128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931278" comment="grafana-10.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251340" version="1" class="patch">
	<metadata>
		<title>libsharpyuv0-1.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libsharpyuv0-1.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931279" comment="libsharpyuv0-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931280" comment="libsharpyuv0-32bit-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931281" comment="libwebp-devel-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931282" comment="libwebp-devel-32bit-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931283" comment="libwebp-tools-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931284" comment="libwebp7-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931285" comment="libwebp7-32bit-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931286" comment="libwebpdecoder3-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931287" comment="libwebpdecoder3-32bit-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931288" comment="libwebpdemux2-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931289" comment="libwebpdemux2-32bit-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931290" comment="libwebpmux3-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931291" comment="libwebpmux3-32bit-1.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251341" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3215" ref_url="https://www.suse.com/security/cve/CVE-2023-3215/" source="CVE"/>
		<reference ref_id="CVE-2023-3216" ref_url="https://www.suse.com/security/cve/CVE-2023-3216/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3215/">CVE-2023-3215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3215">CVE-2023-3215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3216/">CVE-2023-3216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931292" comment="nodejs-electron-22.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931293" comment="nodejs-electron-devel-22.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931294" comment="nodejs-electron-doc-22.3.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251342" version="1" class="patch">
	<metadata>
		<title>corepack20-20.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581/" source="CVE"/>
		<reference ref_id="CVE-2023-30582" ref_url="https://www.suse.com/security/cve/CVE-2023-30582/" source="CVE"/>
		<reference ref_id="CVE-2023-30583" ref_url="https://www.suse.com/security/cve/CVE-2023-30583/" source="CVE"/>
		<reference ref_id="CVE-2023-30584" ref_url="https://www.suse.com/security/cve/CVE-2023-30584/" source="CVE"/>
		<reference ref_id="CVE-2023-30585" ref_url="https://www.suse.com/security/cve/CVE-2023-30585/" source="CVE"/>
		<reference ref_id="CVE-2023-30586" ref_url="https://www.suse.com/security/cve/CVE-2023-30586/" source="CVE"/>
		<reference ref_id="CVE-2023-30587" ref_url="https://www.suse.com/security/cve/CVE-2023-30587/" source="CVE"/>
		<reference ref_id="CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<reference ref_id="CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30582/">CVE-2023-30582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-30582">CVE-2023-30582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30583/">CVE-2023-30583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-30583">CVE-2023-30583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30584/">CVE-2023-30584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-30584">CVE-2023-30584 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30585/">CVE-2023-30585 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30585">CVE-2023-30585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30586/">CVE-2023-30586 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30586">CVE-2023-30586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30587/">CVE-2023-30587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-30587">CVE-2023-30587 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931295" comment="corepack20-20.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931296" comment="nodejs20-20.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931297" comment="nodejs20-devel-20.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931298" comment="nodejs20-docs-20.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931299" comment="npm20-20.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251343" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-12.2.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-12.2.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931300" comment="libvmtools-devel-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931301" comment="libvmtools0-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931302" comment="open-vm-tools-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931303" comment="open-vm-tools-containerinfo-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931304" comment="open-vm-tools-desktop-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931305" comment="open-vm-tools-salt-minion-12.2.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931306" comment="open-vm-tools-sdmp-12.2.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251344" version="1" class="patch">
	<metadata>
		<title>gifsicle-1.94-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36193" ref_url="https://www.suse.com/security/cve/CVE-2023-36193/" source="CVE"/>
		<description>
These are all security issues fixed in the gifsicle-1.94-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36193/">CVE-2023-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36193">CVE-2023-36193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931307" comment="gifsicle-1.94-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251345" version="1" class="patch">
	<metadata>
		<title>libhogweed6-3.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36660" ref_url="https://www.suse.com/security/cve/CVE-2023-36660/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed6-3.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-36660/">CVE-2023-36660 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36660">CVE-2023-36660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931308" comment="libhogweed6-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931309" comment="libhogweed6-32bit-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931310" comment="libhogweed6-x86-64-v3-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931311" comment="libnettle-devel-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931312" comment="libnettle-devel-32bit-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931313" comment="libnettle8-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931314" comment="libnettle8-32bit-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931315" comment="libnettle8-x86-64-v3-3.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931316" comment="nettle-3.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251346" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931317" comment="libmozjs-102-0-102.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931318" comment="mozjs102-102.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931319" comment="mozjs102-devel-102.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251347" version="1" class="patch">
	<metadata>
		<title>chromedriver-114.0.5735.198-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3420" ref_url="https://www.suse.com/security/cve/CVE-2023-3420/" source="CVE"/>
		<reference ref_id="CVE-2023-3421" ref_url="https://www.suse.com/security/cve/CVE-2023-3421/" source="CVE"/>
		<reference ref_id="CVE-2023-3422" ref_url="https://www.suse.com/security/cve/CVE-2023-3422/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-114.0.5735.198-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3420/">CVE-2023-3420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3420">CVE-2023-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3421/">CVE-2023-3421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3421">CVE-2023-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3422/">CVE-2023-3422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931320" comment="chromedriver-114.0.5735.198-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931321" comment="chromium-114.0.5735.198-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251348" version="1" class="patch">
	<metadata>
		<title>grafana-10.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2183" ref_url="https://www.suse.com/security/cve/CVE-2023-2183/" source="CVE"/>
		<reference ref_id="CVE-2023-2801" ref_url="https://www.suse.com/security/cve/CVE-2023-2801/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-10.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2183/">CVE-2023-2183 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2183">CVE-2023-2183 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2801/">CVE-2023-2801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2801">CVE-2023-2801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931322" comment="grafana-10.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251349" version="1" class="patch">
	<metadata>
		<title>librabbitmq-devel-0.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-35789" ref_url="https://www.suse.com/security/cve/CVE-2023-35789/" source="CVE"/>
		<description>
These are all security issues fixed in the librabbitmq-devel-0.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35789/">CVE-2023-35789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35789">CVE-2023-35789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931323" comment="librabbitmq-devel-0.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931324" comment="librabbitmq4-0.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931325" comment="rabbitmq-c-tools-0.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251350" version="1" class="patch">
	<metadata>
		<title>python38-3.8.17-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.17-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931326" comment="python38-3.8.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931327" comment="python38-32bit-3.8.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931328" comment="python38-curses-3.8.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931329" comment="python38-dbm-3.8.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931330" comment="python38-idle-3.8.17-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931331" comment="python38-tk-3.8.17-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251351" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3428" ref_url="https://www.suse.com/security/cve/CVE-2023-3428/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3428/">CVE-2023-3428 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3428">CVE-2023-3428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931332" comment="ImageMagick-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931333" comment="ImageMagick-config-7-SUSE-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931334" comment="ImageMagick-config-7-upstream-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931335" comment="ImageMagick-devel-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931336" comment="ImageMagick-devel-32bit-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931337" comment="ImageMagick-doc-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931338" comment="ImageMagick-extra-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931339" comment="libMagick++-7_Q16HDRI5-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931340" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931341" comment="libMagick++-devel-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931342" comment="libMagick++-devel-32bit-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931343" comment="libMagickCore-7_Q16HDRI10-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931344" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931345" comment="libMagickWand-7_Q16HDRI10-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931346" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931347" comment="perl-PerlMagick-7.1.1.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251352" version="1" class="patch">
	<metadata>
		<title>python310-3.10.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931348" comment="python310-3.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931349" comment="python310-32bit-3.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931350" comment="python310-curses-3.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931351" comment="python310-dbm-3.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931352" comment="python310-idle-3.10.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931353" comment="python310-tk-3.10.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251353" version="1" class="patch">
	<metadata>
		<title>python312-3.12.0b3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.0b3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931354" comment="python312-3.12.0b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931355" comment="python312-curses-3.12.0b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931356" comment="python312-dbm-3.12.0b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931357" comment="python312-idle-3.12.0b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931358" comment="python312-tk-3.12.0b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931359" comment="python312-x86-64-v3-3.12.0b3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251354" version="1" class="patch">
	<metadata>
		<title>python39-3.9.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931360" comment="python39-3.9.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931361" comment="python39-32bit-3.9.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931362" comment="python39-curses-3.9.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931363" comment="python39-dbm-3.9.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931364" comment="python39-idle-3.9.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931365" comment="python39-tk-3.9.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251355" version="1" class="patch">
	<metadata>
		<title>perl-HTTP-Tiny-0.086-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31486" ref_url="https://www.suse.com/security/cve/CVE-2023-31486/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTTP-Tiny-0.086-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31486/">CVE-2023-31486 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">CVE-2023-31486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931366" comment="perl-HTTP-Tiny-0.086-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251356" version="1" class="patch">
	<metadata>
		<title>squashfs-4.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931367" comment="squashfs-4.6.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251357" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.56.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.56.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931368" comment="ghostscript-9.56.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931369" comment="ghostscript-devel-9.56.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931370" comment="ghostscript-x11-9.56.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251358" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-115.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3482" ref_url="https://www.suse.com/security/cve/CVE-2023-3482/" source="CVE"/>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37203" ref_url="https://www.suse.com/security/cve/CVE-2023-37203/" source="CVE"/>
		<reference ref_id="CVE-2023-37204" ref_url="https://www.suse.com/security/cve/CVE-2023-37204/" source="CVE"/>
		<reference ref_id="CVE-2023-37205" ref_url="https://www.suse.com/security/cve/CVE-2023-37205/" source="CVE"/>
		<reference ref_id="CVE-2023-37206" ref_url="https://www.suse.com/security/cve/CVE-2023-37206/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37209" ref_url="https://www.suse.com/security/cve/CVE-2023-37209/" source="CVE"/>
		<reference ref_id="CVE-2023-37210" ref_url="https://www.suse.com/security/cve/CVE-2023-37210/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-37212" ref_url="https://www.suse.com/security/cve/CVE-2023-37212/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-115.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3482/">CVE-2023-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3482">CVE-2023-3482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37203/">CVE-2023-37203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37203">CVE-2023-37203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37204/">CVE-2023-37204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37204">CVE-2023-37204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37205/">CVE-2023-37205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37205">CVE-2023-37205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37206/">CVE-2023-37206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37206">CVE-2023-37206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37209/">CVE-2023-37209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37209">CVE-2023-37209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37210/">CVE-2023-37210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37210">CVE-2023-37210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37212/">CVE-2023-37212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37212">CVE-2023-37212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931371" comment="MozillaFirefox-115.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931372" comment="MozillaFirefox-branding-upstream-115.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931373" comment="MozillaFirefox-devel-115.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931374" comment="MozillaFirefox-translations-common-115.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931375" comment="MozillaFirefox-translations-other-115.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251359" version="1" class="patch">
	<metadata>
		<title>python311-3.11.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931376" comment="python311-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931377" comment="python311-32bit-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931378" comment="python311-curses-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931379" comment="python311-dbm-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931380" comment="python311-idle-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931381" comment="python311-tk-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931382" comment="python311-x86-64-v3-3.11.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251360" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.85.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32682" ref_url="https://www.suse.com/security/cve/CVE-2023-32682/" source="CVE"/>
		<reference ref_id="CVE-2023-32683" ref_url="https://www.suse.com/security/cve/CVE-2023-32683/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.85.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32682/">CVE-2023-32682 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32682">CVE-2023-32682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32683/">CVE-2023-32683 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32683">CVE-2023-32683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931383" comment="matrix-synapse-1.85.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251361" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931384" comment="MozillaThunderbird-102.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931385" comment="MozillaThunderbird-translations-common-102.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931386" comment="MozillaThunderbird-translations-other-102.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251362" version="1" class="patch">
	<metadata>
		<title>python310-pipreqs-0.4.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31543" ref_url="https://www.suse.com/security/cve/CVE-2023-31543/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pipreqs-0.4.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31543/">CVE-2023-31543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31543">CVE-2023-31543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931387" comment="python310-pipreqs-0.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931388" comment="python311-pipreqs-0.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931389" comment="python39-pipreqs-0.4.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251363" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3269" ref_url="https://www.suse.com/security/cve/CVE-2023-3269/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3269/">CVE-2023-3269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931391" comment="kernel-macros-6.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931392" comment="kernel-source-6.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931393" comment="kernel-source-vanilla-6.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251364" version="1" class="patch">
	<metadata>
		<title>kitty-0.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the kitty-0.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931394" comment="kitty-0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931395" comment="kitty-shell-integration-0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931396" comment="kitty-terminfo-0.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251365" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931397" comment="python310-Django-4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931398" comment="python311-Django-4.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931399" comment="python39-Django-4.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251366" version="1" class="patch">
	<metadata>
		<title>libspice-server-devel-0.15.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server-devel-0.15.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931400" comment="libspice-server-devel-0.15.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931401" comment="libspice-server1-0.15.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251367" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931402" comment="go1.19-1.19.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931403" comment="go1.19-doc-1.19.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931404" comment="go1.19-libstd-1.19.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931405" comment="go1.19-race-1.19.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251368" version="1" class="patch">
	<metadata>
		<title>redis-7.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834/" source="CVE"/>
		<reference ref_id="CVE-2023-36824" ref_url="https://www.suse.com/security/cve/CVE-2023-36824/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36824/">CVE-2023-36824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36824">CVE-2023-36824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931406" comment="redis-7.0.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251369" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-115.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-115.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931407" comment="MozillaFirefox-115.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931408" comment="MozillaFirefox-branding-upstream-115.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931409" comment="MozillaFirefox-devel-115.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931410" comment="MozillaFirefox-translations-common-115.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931411" comment="MozillaFirefox-translations-other-115.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251370" version="1" class="patch">
	<metadata>
		<title>python312-3.12.0b4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.0b4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931412" comment="python312-3.12.0b4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931413" comment="python312-curses-3.12.0b4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931414" comment="python312-dbm-3.12.0b4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931415" comment="python312-idle-3.12.0b4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931416" comment="python312-tk-3.12.0b4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931417" comment="python312-x86-64-v3-3.12.0b4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251371" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931418" comment="krb5-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931419" comment="krb5-32bit-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931420" comment="krb5-client-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931421" comment="krb5-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931422" comment="krb5-devel-32bit-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931423" comment="krb5-plugin-kdb-ldap-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931424" comment="krb5-plugin-preauth-otp-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931425" comment="krb5-plugin-preauth-pkinit-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931426" comment="krb5-plugin-preauth-spake-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931427" comment="krb5-server-1.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251372" version="1" class="patch">
	<metadata>
		<title>libredwg-devel-0.12.5.5907-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33025" ref_url="https://www.suse.com/security/cve/CVE-2022-33025/" source="CVE"/>
		<reference ref_id="CVE-2023-36271" ref_url="https://www.suse.com/security/cve/CVE-2023-36271/" source="CVE"/>
		<reference ref_id="CVE-2023-36273" ref_url="https://www.suse.com/security/cve/CVE-2023-36273/" source="CVE"/>
		<description>
These are all security issues fixed in the libredwg-devel-0.12.5.5907-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33025/">CVE-2022-33025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33025">CVE-2022-33025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36271/">CVE-2023-36271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36271">CVE-2023-36271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36273/">CVE-2023-36273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36273">CVE-2023-36273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931428" comment="libredwg-devel-0.12.5.5907-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931429" comment="libredwg-tools-0.12.5.5907-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931430" comment="libredwg0-0.12.5.5907-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251373" version="1" class="patch">
	<metadata>
		<title>libcjose-devel-0.6.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464/" source="CVE"/>
		<description>
These are all security issues fixed in the libcjose-devel-0.6.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931431" comment="libcjose-devel-0.6.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931432" comment="libcjose0-0.6.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251374" version="1" class="patch">
	<metadata>
		<title>cloud-init-23.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3429" ref_url="https://www.suse.com/security/cve/CVE-2021-3429/" source="CVE"/>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-23.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3429/">CVE-2021-3429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3429">CVE-2021-3429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931433" comment="cloud-init-23.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931434" comment="cloud-init-config-suse-23.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931435" comment="cloud-init-doc-23.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251375" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.36-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37259" ref_url="https://www.suse.com/security/cve/CVE-2023-37259/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.36-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37259/">CVE-2023-37259 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37259">CVE-2023-37259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931436" comment="element-desktop-1.11.36-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251376" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.36-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37259" ref_url="https://www.suse.com/security/cve/CVE-2023-37259/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.36-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37259/">CVE-2023-37259 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37259">CVE-2023-37259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931437" comment="element-web-1.11.36-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251377" version="1" class="patch">
	<metadata>
		<title>ghc-pandoc-3.1.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-35936" ref_url="https://www.suse.com/security/cve/CVE-2023-35936/" source="CVE"/>
		<description>
These are all security issues fixed in the ghc-pandoc-3.1.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35936/">CVE-2023-35936 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35936">CVE-2023-35936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931438" comment="ghc-pandoc-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931439" comment="ghc-pandoc-devel-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931440" comment="ghc-pandoc-doc-3.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931441" comment="ghc-pandoc-prof-3.1.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251378" version="1" class="patch">
	<metadata>
		<title>libyajl-devel-2.1.0-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<description>
These are all security issues fixed in the libyajl-devel-2.1.0-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931442" comment="libyajl-devel-2.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931443" comment="libyajl-devel-static-2.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931444" comment="libyajl2-2.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931445" comment="yajl-2.1.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251379" version="1" class="patch">
	<metadata>
		<title>qemu-8.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861/" source="CVE"/>
		<reference ref_id="CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931446" comment="qemu-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931447" comment="qemu-SLOF-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931448" comment="qemu-accel-qtest-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931449" comment="qemu-accel-tcg-x86-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931450" comment="qemu-arm-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931451" comment="qemu-audio-alsa-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931452" comment="qemu-audio-dbus-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931453" comment="qemu-audio-jack-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931454" comment="qemu-audio-oss-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931455" comment="qemu-audio-pa-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931456" comment="qemu-audio-spice-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931457" comment="qemu-block-curl-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931458" comment="qemu-block-dmg-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931459" comment="qemu-block-gluster-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931460" comment="qemu-block-iscsi-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931461" comment="qemu-block-nfs-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931462" comment="qemu-block-rbd-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931463" comment="qemu-block-ssh-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931464" comment="qemu-chardev-baum-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931465" comment="qemu-chardev-spice-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931466" comment="qemu-doc-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931467" comment="qemu-extra-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931468" comment="qemu-guest-agent-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931469" comment="qemu-headless-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931470" comment="qemu-hw-display-qxl-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931471" comment="qemu-hw-display-virtio-gpu-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931472" comment="qemu-hw-display-virtio-gpu-pci-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931473" comment="qemu-hw-display-virtio-vga-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931474" comment="qemu-hw-s390x-virtio-gpu-ccw-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931475" comment="qemu-hw-usb-host-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931476" comment="qemu-hw-usb-redirect-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931477" comment="qemu-hw-usb-smartcard-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931478" comment="qemu-img-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009895334" comment="qemu-ipxe-1.0.0+-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931479" comment="qemu-ivshmem-tools-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931480" comment="qemu-ksm-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931481" comment="qemu-kvm-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931482" comment="qemu-lang-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931483" comment="qemu-microvm-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931484" comment="qemu-ppc-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931485" comment="qemu-pr-helper-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931486" comment="qemu-s390x-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931487" comment="qemu-seabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931488" comment="qemu-skiboot-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931489" comment="qemu-tools-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931490" comment="qemu-ui-curses-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931491" comment="qemu-ui-dbus-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931492" comment="qemu-ui-gtk-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931493" comment="qemu-ui-opengl-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931494" comment="qemu-ui-spice-app-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931495" comment="qemu-ui-spice-core-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931496" comment="qemu-vgabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931497" comment="qemu-vhost-user-gpu-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931498" comment="qemu-x86-8.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251380" version="1" class="patch">
	<metadata>
		<title>chromedriver-115.0.5790.98-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3727" ref_url="https://www.suse.com/security/cve/CVE-2023-3727/" source="CVE"/>
		<reference ref_id="CVE-2023-3728" ref_url="https://www.suse.com/security/cve/CVE-2023-3728/" source="CVE"/>
		<reference ref_id="CVE-2023-3730" ref_url="https://www.suse.com/security/cve/CVE-2023-3730/" source="CVE"/>
		<reference ref_id="CVE-2023-3732" ref_url="https://www.suse.com/security/cve/CVE-2023-3732/" source="CVE"/>
		<reference ref_id="CVE-2023-3733" ref_url="https://www.suse.com/security/cve/CVE-2023-3733/" source="CVE"/>
		<reference ref_id="CVE-2023-3734" ref_url="https://www.suse.com/security/cve/CVE-2023-3734/" source="CVE"/>
		<reference ref_id="CVE-2023-3735" ref_url="https://www.suse.com/security/cve/CVE-2023-3735/" source="CVE"/>
		<reference ref_id="CVE-2023-3736" ref_url="https://www.suse.com/security/cve/CVE-2023-3736/" source="CVE"/>
		<reference ref_id="CVE-2023-3737" ref_url="https://www.suse.com/security/cve/CVE-2023-3737/" source="CVE"/>
		<reference ref_id="CVE-2023-3738" ref_url="https://www.suse.com/security/cve/CVE-2023-3738/" source="CVE"/>
		<reference ref_id="CVE-2023-3740" ref_url="https://www.suse.com/security/cve/CVE-2023-3740/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-115.0.5790.98-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3727/">CVE-2023-3727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3727">CVE-2023-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3728/">CVE-2023-3728 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3728">CVE-2023-3728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3730/">CVE-2023-3730 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3730">CVE-2023-3730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3732/">CVE-2023-3732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3732">CVE-2023-3732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3733/">CVE-2023-3733 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3733">CVE-2023-3733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3734/">CVE-2023-3734 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3734">CVE-2023-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3735/">CVE-2023-3735 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3735">CVE-2023-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3736/">CVE-2023-3736 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3736">CVE-2023-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3737/">CVE-2023-3737 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3737">CVE-2023-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3738/">CVE-2023-3738 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3738">CVE-2023-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3740/">CVE-2023-3740 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3740">CVE-2023-3740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931499" comment="chromedriver-115.0.5790.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931500" comment="chromium-115.0.5790.98-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251381" version="1" class="patch">
	<metadata>
		<title>iperf-3.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931501" comment="iperf-3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931502" comment="iperf-devel-3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931503" comment="libiperf0-3.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251382" version="1" class="patch">
	<metadata>
		<title>libvirt-9.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3750" ref_url="https://www.suse.com/security/cve/CVE-2023-3750/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-9.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3750/">CVE-2023-3750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3750">CVE-2023-3750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931504" comment="libvirt-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931505" comment="libvirt-client-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931506" comment="libvirt-client-qemu-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931507" comment="libvirt-daemon-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931508" comment="libvirt-daemon-common-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931509" comment="libvirt-daemon-config-network-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931510" comment="libvirt-daemon-config-nwfilter-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931511" comment="libvirt-daemon-driver-interface-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931512" comment="libvirt-daemon-driver-libxl-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931513" comment="libvirt-daemon-driver-lxc-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931514" comment="libvirt-daemon-driver-network-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931515" comment="libvirt-daemon-driver-nodedev-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931516" comment="libvirt-daemon-driver-nwfilter-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931517" comment="libvirt-daemon-driver-qemu-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931518" comment="libvirt-daemon-driver-secret-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931519" comment="libvirt-daemon-driver-storage-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931520" comment="libvirt-daemon-driver-storage-core-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931521" comment="libvirt-daemon-driver-storage-disk-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931522" comment="libvirt-daemon-driver-storage-gluster-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931523" comment="libvirt-daemon-driver-storage-iscsi-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931524" comment="libvirt-daemon-driver-storage-iscsi-direct-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931525" comment="libvirt-daemon-driver-storage-logical-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931526" comment="libvirt-daemon-driver-storage-mpath-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931527" comment="libvirt-daemon-driver-storage-rbd-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931528" comment="libvirt-daemon-driver-storage-scsi-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931529" comment="libvirt-daemon-hooks-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931530" comment="libvirt-daemon-lock-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931531" comment="libvirt-daemon-log-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931532" comment="libvirt-daemon-lxc-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931533" comment="libvirt-daemon-plugin-lockd-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931534" comment="libvirt-daemon-plugin-sanlock-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931535" comment="libvirt-daemon-proxy-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931536" comment="libvirt-daemon-qemu-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931537" comment="libvirt-daemon-xen-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931538" comment="libvirt-devel-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931539" comment="libvirt-doc-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931540" comment="libvirt-libs-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931541" comment="libvirt-nss-9.5.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931542" comment="wireshark-plugin-libvirt-9.5.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251383" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.55.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.55.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931543" comment="libnghttp2-14-1.55.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931544" comment="libnghttp2-14-32bit-1.55.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931545" comment="libnghttp2-devel-1.55.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931546" comment="nghttp2-1.55.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251384" version="1" class="patch">
	<metadata>
		<title>openssh-9.3p2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.3p2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931547" comment="openssh-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931548" comment="openssh-cavs-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931549" comment="openssh-clients-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931550" comment="openssh-common-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931551" comment="openssh-fips-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931552" comment="openssh-helpers-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931553" comment="openssh-server-9.3p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931554" comment="openssh-server-config-rootlogin-9.3p2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251385" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1u-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1u-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931555" comment="libopenssl-1_1-devel-1.1.1u-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931556" comment="libopenssl-1_1-devel-32bit-1.1.1u-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931557" comment="libopenssl1_1-1.1.1u-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931558" comment="libopenssl1_1-32bit-1.1.1u-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931559" comment="openssl-1_1-1.1.1u-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931560" comment="openssl-1_1-doc-1.1.1u-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251386" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2975" ref_url="https://www.suse.com/security/cve/CVE-2023-2975/" source="CVE"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2975/">CVE-2023-2975 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931561" comment="libopenssl-3-devel-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931562" comment="libopenssl-3-devel-32bit-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931563" comment="libopenssl3-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931564" comment="libopenssl3-32bit-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931565" comment="libopenssl3-x86-64-v3-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931566" comment="openssl-3-3.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931567" comment="openssl-3-doc-3.1.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251387" version="1" class="patch">
	<metadata>
		<title>python310-3.10.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931568" comment="python310-3.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931569" comment="python310-32bit-3.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931570" comment="python310-curses-3.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931571" comment="python310-dbm-3.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931572" comment="python310-idle-3.10.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931573" comment="python310-tk-3.10.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251388" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3648" ref_url="https://www.suse.com/security/cve/CVE-2023-3648/" source="CVE"/>
		<reference ref_id="CVE-2023-3649" ref_url="https://www.suse.com/security/cve/CVE-2023-3649/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3648/">CVE-2023-3648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3648">CVE-2023-3648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3649/">CVE-2023-3649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3649">CVE-2023-3649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931574" comment="libwireshark16-4.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931575" comment="libwiretap13-4.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931576" comment="libwsutil14-4.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931577" comment="wireshark-4.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931578" comment="wireshark-devel-4.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931579" comment="wireshark-ui-qt-4.0.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251389" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-6.0.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29454" ref_url="https://www.suse.com/security/cve/CVE-2023-29454/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-6.0.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29454/">CVE-2023-29454 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29454">CVE-2023-29454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931580" comment="zabbix-agent-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931581" comment="zabbix-java-gateway-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931582" comment="zabbix-proxy-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931583" comment="zabbix-proxy-mysql-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931584" comment="zabbix-proxy-postgresql-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931585" comment="zabbix-proxy-sqlite-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931586" comment="zabbix-server-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931587" comment="zabbix-server-mysql-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931588" comment="zabbix-server-postgresql-6.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931589" comment="zabbix-ui-6.0.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251390" version="1" class="patch">
	<metadata>
		<title>curl-8.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32001" ref_url="https://www.suse.com/security/cve/CVE-2023-32001/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32001/">CVE-2023-32001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931590" comment="curl-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931591" comment="libcurl-devel-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931592" comment="libcurl-devel-32bit-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931593" comment="libcurl4-8.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931594" comment="libcurl4-32bit-8.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251391" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-21.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931595" comment="libopenssl-1_0_0-devel-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931596" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931597" comment="libopenssl10-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931598" comment="libopenssl1_0_0-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931599" comment="libopenssl1_0_0-32bit-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931600" comment="libopenssl1_0_0-steam-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931601" comment="libopenssl1_0_0-steam-32bit-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931602" comment="openssl-1_0_0-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931603" comment="openssl-1_0_0-cavs-1.0.2u-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931604" comment="openssl-1_0_0-doc-1.0.2u-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251392" version="1" class="patch">
	<metadata>
		<title>ctdb-4.18.5+git.313.c8e274c7852-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.18.5+git.313.c8e274c7852-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931605" comment="ctdb-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931606" comment="ctdb-pcp-pmda-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931607" comment="libsamba-policy-devel-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931608" comment="libsamba-policy-python3-devel-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931609" comment="libsamba-policy0-python3-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931610" comment="libsamba-policy0-python3-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931611" comment="samba-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931612" comment="samba-ad-dc-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931613" comment="samba-ad-dc-libs-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931614" comment="samba-ad-dc-libs-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931615" comment="samba-ceph-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931616" comment="samba-client-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931617" comment="samba-client-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931618" comment="samba-client-libs-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931619" comment="samba-client-libs-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931620" comment="samba-devel-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931621" comment="samba-devel-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931622" comment="samba-doc-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931623" comment="samba-dsdb-modules-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931624" comment="samba-gpupdate-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931625" comment="samba-ldb-ldap-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931626" comment="samba-libs-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931627" comment="samba-libs-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931628" comment="samba-libs-python3-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931629" comment="samba-libs-python3-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931630" comment="samba-python3-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931631" comment="samba-test-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931632" comment="samba-tool-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931633" comment="samba-winbind-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931634" comment="samba-winbind-libs-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931635" comment="samba-winbind-libs-32bit-4.18.5+git.313.c8e274c7852-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251393" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.13.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.13.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931636" comment="MozillaThunderbird-102.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931637" comment="MozillaThunderbird-translations-common-102.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931638" comment="MozillaThunderbird-translations-other-102.13.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251394" version="1" class="patch">
	<metadata>
		<title>apptainer-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38496" ref_url="https://www.suse.com/security/cve/CVE-2023-38496/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38496/">CVE-2023-38496 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38496">CVE-2023-38496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931639" comment="apptainer-1.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251395" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931640" comment="go1.20-1.20.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931641" comment="go1.20-doc-1.20.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931642" comment="go1.20-libstd-1.20.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931643" comment="go1.20-race-1.20.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251396" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931644" comment="java-11-openjdk-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931645" comment="java-11-openjdk-demo-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931646" comment="java-11-openjdk-devel-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931647" comment="java-11-openjdk-headless-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931648" comment="java-11-openjdk-javadoc-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931649" comment="java-11-openjdk-jmods-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931650" comment="java-11-openjdk-src-11.0.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251397" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931651" comment="java-17-openjdk-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931652" comment="java-17-openjdk-demo-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931653" comment="java-17-openjdk-devel-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931654" comment="java-17-openjdk-headless-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931655" comment="java-17-openjdk-javadoc-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931656" comment="java-17-openjdk-jmods-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931657" comment="java-17-openjdk-src-17.0.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251398" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3422" ref_url="https://www.suse.com/security/cve/CVE-2023-3422/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3422/">CVE-2023-3422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931658" comment="nodejs-electron-22.3.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931659" comment="nodejs-electron-devel-22.3.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931660" comment="nodejs-electron-doc-22.3.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251399" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-41.0.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38325" ref_url="https://www.suse.com/security/cve/CVE-2023-38325/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-41.0.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38325/">CVE-2023-38325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38325">CVE-2023-38325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931661" comment="python310-cryptography-41.0.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931662" comment="python311-cryptography-41.0.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931663" comment="python39-cryptography-41.0.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251400" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931664" comment="libQt6Concurrent6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931665" comment="libQt6Core6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931666" comment="libQt6DBus6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931667" comment="libQt6Gui6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931668" comment="libQt6Network6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931669" comment="libQt6OpenGL6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931670" comment="libQt6OpenGLWidgets6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931671" comment="libQt6PrintSupport6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931672" comment="libQt6Sql6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931673" comment="libQt6Test6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931674" comment="libQt6Widgets6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931675" comment="libQt6Xml6-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931676" comment="qt6-base-common-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931677" comment="qt6-base-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931678" comment="qt6-base-examples-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931679" comment="qt6-base-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931680" comment="qt6-concurrent-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931681" comment="qt6-core-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931682" comment="qt6-core-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931683" comment="qt6-dbus-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931684" comment="qt6-dbus-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931685" comment="qt6-docs-common-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931686" comment="qt6-exampleicons-devel-static-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931687" comment="qt6-gui-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931688" comment="qt6-gui-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931689" comment="qt6-kmssupport-devel-static-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931690" comment="qt6-kmssupport-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931691" comment="qt6-network-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931692" comment="qt6-network-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931693" comment="qt6-network-tls-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931694" comment="qt6-networkinformation-glib-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931695" comment="qt6-networkinformation-nm-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931696" comment="qt6-opengl-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931697" comment="qt6-opengl-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931698" comment="qt6-openglwidgets-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931699" comment="qt6-platformsupport-devel-static-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931700" comment="qt6-platformsupport-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931701" comment="qt6-platformtheme-gtk3-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931702" comment="qt6-platformtheme-xdgdesktopportal-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931703" comment="qt6-printsupport-cups-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931704" comment="qt6-printsupport-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931705" comment="qt6-printsupport-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931706" comment="qt6-sql-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931707" comment="qt6-sql-mysql-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931708" comment="qt6-sql-postgresql-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931709" comment="qt6-sql-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931710" comment="qt6-sql-sqlite-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931711" comment="qt6-sql-unixODBC-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931712" comment="qt6-test-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931713" comment="qt6-test-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931714" comment="qt6-widgets-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931715" comment="qt6-widgets-private-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931716" comment="qt6-xml-devel-6.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931717" comment="qt6-xml-private-devel-6.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251401" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931719" comment="kernel-macros-6.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931720" comment="kernel-source-6.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931721" comment="kernel-source-vanilla-6.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251402" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.56.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-16305" ref_url="https://www.suse.com/security/cve/CVE-2020-16305/" source="CVE"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.56.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16305/">CVE-2020-16305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16305">CVE-2020-16305 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931722" comment="ghostscript-9.56.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931723" comment="ghostscript-devel-9.56.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931724" comment="ghostscript-x11-9.56.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251403" version="1" class="patch">
	<metadata>
		<title>qemu-8.0.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.0.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931725" comment="qemu-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931726" comment="qemu-SLOF-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931727" comment="qemu-accel-qtest-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931728" comment="qemu-accel-tcg-x86-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931729" comment="qemu-arm-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931730" comment="qemu-audio-alsa-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931731" comment="qemu-audio-dbus-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931732" comment="qemu-audio-jack-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931733" comment="qemu-audio-oss-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931734" comment="qemu-audio-pa-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931735" comment="qemu-audio-spice-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931736" comment="qemu-block-curl-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931737" comment="qemu-block-dmg-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931738" comment="qemu-block-gluster-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931739" comment="qemu-block-iscsi-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931740" comment="qemu-block-nfs-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931741" comment="qemu-block-rbd-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931742" comment="qemu-block-ssh-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931743" comment="qemu-chardev-baum-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931744" comment="qemu-chardev-spice-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931745" comment="qemu-doc-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931746" comment="qemu-extra-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931747" comment="qemu-guest-agent-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931748" comment="qemu-headless-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931749" comment="qemu-hw-display-qxl-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931750" comment="qemu-hw-display-virtio-gpu-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931751" comment="qemu-hw-display-virtio-gpu-pci-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931752" comment="qemu-hw-display-virtio-vga-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931753" comment="qemu-hw-s390x-virtio-gpu-ccw-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931754" comment="qemu-hw-usb-host-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931755" comment="qemu-hw-usb-redirect-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931756" comment="qemu-hw-usb-smartcard-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931757" comment="qemu-img-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009927133" comment="qemu-ipxe-1.0.0+-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931758" comment="qemu-ivshmem-tools-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931759" comment="qemu-ksm-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931760" comment="qemu-kvm-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931761" comment="qemu-lang-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931762" comment="qemu-microvm-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931763" comment="qemu-ppc-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931764" comment="qemu-pr-helper-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931765" comment="qemu-s390x-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931766" comment="qemu-seabios-1.16.2_3_gd478f380-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931767" comment="qemu-skiboot-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931768" comment="qemu-tools-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931769" comment="qemu-ui-curses-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931770" comment="qemu-ui-dbus-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931771" comment="qemu-ui-gtk-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931772" comment="qemu-ui-opengl-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931773" comment="qemu-ui-spice-app-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931774" comment="qemu-ui-spice-core-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931775" comment="qemu-vgabios-1.16.2_3_gd478f380-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931776" comment="qemu-vhost-user-gpu-8.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931777" comment="qemu-x86-8.0.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251404" version="1" class="patch">
	<metadata>
		<title>amanda-3.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30577" ref_url="https://www.suse.com/security/cve/CVE-2023-30577/" source="CVE"/>
		<description>
These are all security issues fixed in the amanda-3.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30577/">CVE-2023-30577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30577">CVE-2023-30577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931778" comment="amanda-3.5.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251405" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.382-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.382-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931779" comment="java-1_8_0-openjdk-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931780" comment="java-1_8_0-openjdk-accessibility-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931781" comment="java-1_8_0-openjdk-demo-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931782" comment="java-1_8_0-openjdk-devel-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931783" comment="java-1_8_0-openjdk-headless-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931784" comment="java-1_8_0-openjdk-javadoc-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931785" comment="java-1_8_0-openjdk-src-1.8.0.382-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251406" version="1" class="patch">
	<metadata>
		<title>python39-3.9.17-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.17-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931786" comment="python39-3.9.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931787" comment="python39-32bit-3.9.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931788" comment="python39-curses-3.9.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931789" comment="python39-dbm-3.9.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931790" comment="python39-idle-3.9.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931791" comment="python39-tk-3.9.17-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251407" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.22.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37329" ref_url="https://www.suse.com/security/cve/CVE-2023-37329/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.22.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37329/">CVE-2023-37329 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37329">CVE-2023-37329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931792" comment="gstreamer-plugins-bad-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931793" comment="gstreamer-plugins-bad-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931794" comment="gstreamer-plugins-bad-chromaprint-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931795" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931796" comment="gstreamer-plugins-bad-devel-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931797" comment="gstreamer-plugins-bad-fluidsynth-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931798" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931799" comment="gstreamer-plugins-bad-lang-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931800" comment="gstreamer-transcoder-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931801" comment="gstreamer-transcoder-devel-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931802" comment="libgstadaptivedemux-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931803" comment="libgstadaptivedemux-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931804" comment="libgstbadaudio-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931805" comment="libgstbadaudio-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931806" comment="libgstbasecamerabinsrc-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931807" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931808" comment="libgstcodecparsers-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931809" comment="libgstcodecparsers-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931810" comment="libgstcodecs-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931811" comment="libgstcodecs-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931812" comment="libgstcuda-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931813" comment="libgstcuda-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931814" comment="libgstinsertbin-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931815" comment="libgstinsertbin-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931816" comment="libgstisoff-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931817" comment="libgstisoff-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931818" comment="libgstmpegts-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931819" comment="libgstmpegts-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931820" comment="libgstphotography-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931821" comment="libgstphotography-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931822" comment="libgstplay-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931823" comment="libgstplay-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931824" comment="libgstplayer-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931825" comment="libgstplayer-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931826" comment="libgstsctp-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931827" comment="libgstsctp-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931828" comment="libgsttranscoder-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931829" comment="libgsttranscoder-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931830" comment="libgsturidownloader-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931831" comment="libgsturidownloader-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931832" comment="libgstva-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931833" comment="libgstva-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931834" comment="libgstvulkan-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931835" comment="libgstvulkan-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931836" comment="libgstwayland-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931837" comment="libgstwayland-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931838" comment="libgstwebrtc-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931839" comment="libgstwebrtc-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931840" comment="libgstwebrtcnice-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931841" comment="libgstwebrtcnice-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931842" comment="typelib-1_0-CudaGst-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931843" comment="typelib-1_0-GstBadAudio-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931844" comment="typelib-1_0-GstCodecs-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931845" comment="typelib-1_0-GstCuda-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931846" comment="typelib-1_0-GstInsertBin-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931847" comment="typelib-1_0-GstMpegts-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931848" comment="typelib-1_0-GstPlay-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931849" comment="typelib-1_0-GstPlayer-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931850" comment="typelib-1_0-GstTranscoder-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931851" comment="typelib-1_0-GstVa-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931852" comment="typelib-1_0-GstVulkan-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931853" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931854" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931855" comment="typelib-1_0-GstWebRTC-1_0-1.22.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251408" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.22.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<reference ref_id="CVE-2023-37329" ref_url="https://www.suse.com/security/cve/CVE-2023-37329/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.22.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37329/">CVE-2023-37329 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37329">CVE-2023-37329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931856" comment="gstreamer-plugins-base-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931857" comment="gstreamer-plugins-base-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931858" comment="gstreamer-plugins-base-devel-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931859" comment="gstreamer-plugins-base-devel-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931860" comment="gstreamer-plugins-base-lang-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931861" comment="libgstallocators-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931862" comment="libgstallocators-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931863" comment="libgstapp-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931864" comment="libgstapp-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931865" comment="libgstaudio-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931866" comment="libgstaudio-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931867" comment="libgstfft-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931868" comment="libgstfft-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931869" comment="libgstgl-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931870" comment="libgstgl-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931871" comment="libgstpbutils-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931872" comment="libgstpbutils-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931873" comment="libgstriff-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931874" comment="libgstriff-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931875" comment="libgstrtp-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931876" comment="libgstrtp-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931877" comment="libgstrtsp-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931878" comment="libgstrtsp-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931879" comment="libgstsdp-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931880" comment="libgstsdp-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931881" comment="libgsttag-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931882" comment="libgsttag-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931883" comment="libgstvideo-1_0-0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931884" comment="libgstvideo-1_0-0-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931885" comment="typelib-1_0-GstAllocators-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931886" comment="typelib-1_0-GstApp-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931887" comment="typelib-1_0-GstAudio-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931888" comment="typelib-1_0-GstGL-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931889" comment="typelib-1_0-GstGLEGL-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931890" comment="typelib-1_0-GstGLWayland-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931891" comment="typelib-1_0-GstGLX11-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931892" comment="typelib-1_0-GstPbutils-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931893" comment="typelib-1_0-GstRtp-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931894" comment="typelib-1_0-GstRtsp-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931895" comment="typelib-1_0-GstSdp-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931896" comment="typelib-1_0-GstTag-1_0-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931897" comment="typelib-1_0-GstVideo-1_0-1.22.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251409" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.22.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.22.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931898" comment="gstreamer-plugins-good-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931899" comment="gstreamer-plugins-good-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931900" comment="gstreamer-plugins-good-extra-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931901" comment="gstreamer-plugins-good-extra-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931902" comment="gstreamer-plugins-good-gtk-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931903" comment="gstreamer-plugins-good-jack-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931904" comment="gstreamer-plugins-good-jack-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931905" comment="gstreamer-plugins-good-lang-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931906" comment="gstreamer-plugins-good-qtqml-1.22.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251410" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-ugly-1.22.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38104" ref_url="https://www.suse.com/security/cve/CVE-2023-38104/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-ugly-1.22.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38104/">CVE-2023-38104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38104">CVE-2023-38104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931907" comment="gstreamer-plugins-ugly-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931908" comment="gstreamer-plugins-ugly-32bit-1.22.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931909" comment="gstreamer-plugins-ugly-lang-1.22.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251411" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1v-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1v-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931910" comment="libopenssl-1_1-devel-1.1.1v-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931911" comment="libopenssl-1_1-devel-32bit-1.1.1v-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931912" comment="libopenssl1_1-1.1.1v-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931913" comment="libopenssl1_1-32bit-1.1.1v-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931914" comment="openssl-1_1-1.1.1v-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931915" comment="openssl-1_1-doc-1.1.1v-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251412" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-102.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-102.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931916" comment="MozillaThunderbird-102.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931917" comment="MozillaThunderbird-translations-common-102.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931918" comment="MozillaThunderbird-translations-other-102.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251413" version="1" class="patch">
	<metadata>
		<title>chromedriver-115.0.5790.170-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4068" ref_url="https://www.suse.com/security/cve/CVE-2023-4068/" source="CVE"/>
		<reference ref_id="CVE-2023-4069" ref_url="https://www.suse.com/security/cve/CVE-2023-4069/" source="CVE"/>
		<reference ref_id="CVE-2023-4070" ref_url="https://www.suse.com/security/cve/CVE-2023-4070/" source="CVE"/>
		<reference ref_id="CVE-2023-4071" ref_url="https://www.suse.com/security/cve/CVE-2023-4071/" source="CVE"/>
		<reference ref_id="CVE-2023-4072" ref_url="https://www.suse.com/security/cve/CVE-2023-4072/" source="CVE"/>
		<reference ref_id="CVE-2023-4073" ref_url="https://www.suse.com/security/cve/CVE-2023-4073/" source="CVE"/>
		<reference ref_id="CVE-2023-4074" ref_url="https://www.suse.com/security/cve/CVE-2023-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-4075" ref_url="https://www.suse.com/security/cve/CVE-2023-4075/" source="CVE"/>
		<reference ref_id="CVE-2023-4076" ref_url="https://www.suse.com/security/cve/CVE-2023-4076/" source="CVE"/>
		<reference ref_id="CVE-2023-4077" ref_url="https://www.suse.com/security/cve/CVE-2023-4077/" source="CVE"/>
		<reference ref_id="CVE-2023-4078" ref_url="https://www.suse.com/security/cve/CVE-2023-4078/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-115.0.5790.170-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4068/">CVE-2023-4068 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4068">CVE-2023-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4069/">CVE-2023-4069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4069">CVE-2023-4069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4070/">CVE-2023-4070 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4070">CVE-2023-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4071/">CVE-2023-4071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4072/">CVE-2023-4072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4072">CVE-2023-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4073/">CVE-2023-4073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4073">CVE-2023-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4074/">CVE-2023-4074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4075/">CVE-2023-4075 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4075">CVE-2023-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4076/">CVE-2023-4076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4077/">CVE-2023-4077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4077">CVE-2023-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4078/">CVE-2023-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4078">CVE-2023-4078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931919" comment="chromedriver-115.0.5790.170-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931920" comment="chromium-115.0.5790.170-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251414" version="1" class="patch">
	<metadata>
		<title>go1.19-1.19.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.19-1.19.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931921" comment="go1.19-1.19.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931922" comment="go1.19-doc-1.19.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931923" comment="go1.19-libstd-1.19.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931924" comment="go1.19-race-1.19.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251415" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931925" comment="go1.20-1.20.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931926" comment="go1.20-doc-1.20.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931927" comment="go1.20-libstd-1.20.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931928" comment="go1.20-race-1.20.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251416" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20230731-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20230731-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931929" comment="kernel-firmware-20230731-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931930" comment="ucode-amd-20230731-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251417" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38200" ref_url="https://www.suse.com/security/cve/CVE-2023-38200/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38200/">CVE-2023-38200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38200">CVE-2023-38200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931931" comment="keylime-config-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931932" comment="keylime-firewalld-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931933" comment="keylime-logrotate-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931934" comment="keylime-registrar-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931935" comment="keylime-tenant-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931936" comment="keylime-tpm_cert_store-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931937" comment="keylime-verifier-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931938" comment="python310-keylime-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931939" comment="python311-keylime-7.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931940" comment="python39-keylime-7.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251418" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931941" comment="libopenssl-3-devel-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931942" comment="libopenssl-3-devel-32bit-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931943" comment="libopenssl3-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931944" comment="libopenssl3-32bit-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931945" comment="libopenssl3-x86-64-v3-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931946" comment="openssl-3-3.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931947" comment="openssl-3-doc-3.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251419" version="1" class="patch">
	<metadata>
		<title>pgadmin4-7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29361" ref_url="https://www.suse.com/security/cve/CVE-2022-29361/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29361/">CVE-2022-29361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29361">CVE-2022-29361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931948" comment="pgadmin4-7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931949" comment="pgadmin4-doc-7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931950" comment="pgadmin4-web-7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931951" comment="pgadmin4-web-uwsgi-7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251420" version="1" class="patch">
	<metadata>
		<title>python38-3.8.17-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.17-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931952" comment="python38-3.8.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931953" comment="python38-curses-3.8.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931954" comment="python38-dbm-3.8.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931955" comment="python38-idle-3.8.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931956" comment="python38-tk-3.8.17-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251421" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-115.0.5790.102-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2929" ref_url="https://www.suse.com/security/cve/CVE-2023-2929/" source="CVE"/>
		<reference ref_id="CVE-2023-2930" ref_url="https://www.suse.com/security/cve/CVE-2023-2930/" source="CVE"/>
		<reference ref_id="CVE-2023-2931" ref_url="https://www.suse.com/security/cve/CVE-2023-2931/" source="CVE"/>
		<reference ref_id="CVE-2023-2932" ref_url="https://www.suse.com/security/cve/CVE-2023-2932/" source="CVE"/>
		<reference ref_id="CVE-2023-2933" ref_url="https://www.suse.com/security/cve/CVE-2023-2933/" source="CVE"/>
		<reference ref_id="CVE-2023-2934" ref_url="https://www.suse.com/security/cve/CVE-2023-2934/" source="CVE"/>
		<reference ref_id="CVE-2023-2935" ref_url="https://www.suse.com/security/cve/CVE-2023-2935/" source="CVE"/>
		<reference ref_id="CVE-2023-2936" ref_url="https://www.suse.com/security/cve/CVE-2023-2936/" source="CVE"/>
		<reference ref_id="CVE-2023-2937" ref_url="https://www.suse.com/security/cve/CVE-2023-2937/" source="CVE"/>
		<reference ref_id="CVE-2023-2938" ref_url="https://www.suse.com/security/cve/CVE-2023-2938/" source="CVE"/>
		<reference ref_id="CVE-2023-2939" ref_url="https://www.suse.com/security/cve/CVE-2023-2939/" source="CVE"/>
		<reference ref_id="CVE-2023-2940" ref_url="https://www.suse.com/security/cve/CVE-2023-2940/" source="CVE"/>
		<reference ref_id="CVE-2023-2941" ref_url="https://www.suse.com/security/cve/CVE-2023-2941/" source="CVE"/>
		<reference ref_id="CVE-2023-3079" ref_url="https://www.suse.com/security/cve/CVE-2023-3079/" source="CVE"/>
		<reference ref_id="CVE-2023-3214" ref_url="https://www.suse.com/security/cve/CVE-2023-3214/" source="CVE"/>
		<reference ref_id="CVE-2023-3215" ref_url="https://www.suse.com/security/cve/CVE-2023-3215/" source="CVE"/>
		<reference ref_id="CVE-2023-3216" ref_url="https://www.suse.com/security/cve/CVE-2023-3216/" source="CVE"/>
		<reference ref_id="CVE-2023-3217" ref_url="https://www.suse.com/security/cve/CVE-2023-3217/" source="CVE"/>
		<reference ref_id="CVE-2023-3420" ref_url="https://www.suse.com/security/cve/CVE-2023-3420/" source="CVE"/>
		<reference ref_id="CVE-2023-3421" ref_url="https://www.suse.com/security/cve/CVE-2023-3421/" source="CVE"/>
		<reference ref_id="CVE-2023-3422" ref_url="https://www.suse.com/security/cve/CVE-2023-3422/" source="CVE"/>
		<reference ref_id="CVE-2023-3727" ref_url="https://www.suse.com/security/cve/CVE-2023-3727/" source="CVE"/>
		<reference ref_id="CVE-2023-3728" ref_url="https://www.suse.com/security/cve/CVE-2023-3728/" source="CVE"/>
		<reference ref_id="CVE-2023-3730" ref_url="https://www.suse.com/security/cve/CVE-2023-3730/" source="CVE"/>
		<reference ref_id="CVE-2023-3732" ref_url="https://www.suse.com/security/cve/CVE-2023-3732/" source="CVE"/>
		<reference ref_id="CVE-2023-3733" ref_url="https://www.suse.com/security/cve/CVE-2023-3733/" source="CVE"/>
		<reference ref_id="CVE-2023-3734" ref_url="https://www.suse.com/security/cve/CVE-2023-3734/" source="CVE"/>
		<reference ref_id="CVE-2023-3735" ref_url="https://www.suse.com/security/cve/CVE-2023-3735/" source="CVE"/>
		<reference ref_id="CVE-2023-3736" ref_url="https://www.suse.com/security/cve/CVE-2023-3736/" source="CVE"/>
		<reference ref_id="CVE-2023-3737" ref_url="https://www.suse.com/security/cve/CVE-2023-3737/" source="CVE"/>
		<reference ref_id="CVE-2023-3738" ref_url="https://www.suse.com/security/cve/CVE-2023-3738/" source="CVE"/>
		<reference ref_id="CVE-2023-3740" ref_url="https://www.suse.com/security/cve/CVE-2023-3740/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-115.0.5790.102-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2929/">CVE-2023-2929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2929">CVE-2023-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2930/">CVE-2023-2930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2930">CVE-2023-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2931/">CVE-2023-2931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2931">CVE-2023-2931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2932/">CVE-2023-2932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2932">CVE-2023-2932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2933/">CVE-2023-2933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2933">CVE-2023-2933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2934/">CVE-2023-2934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2934">CVE-2023-2934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2935/">CVE-2023-2935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2935">CVE-2023-2935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2936/">CVE-2023-2936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2936">CVE-2023-2936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2937/">CVE-2023-2937 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2937">CVE-2023-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2938/">CVE-2023-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2938">CVE-2023-2938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2939/">CVE-2023-2939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2939">CVE-2023-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2940/">CVE-2023-2940 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2940">CVE-2023-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2941/">CVE-2023-2941 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2941">CVE-2023-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3079/">CVE-2023-3079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3214/">CVE-2023-3214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3214">CVE-2023-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3215/">CVE-2023-3215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3215">CVE-2023-3215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3216/">CVE-2023-3216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3217/">CVE-2023-3217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3217">CVE-2023-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3420/">CVE-2023-3420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3420">CVE-2023-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3421/">CVE-2023-3421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3421">CVE-2023-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3422/">CVE-2023-3422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3727/">CVE-2023-3727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3727">CVE-2023-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3728/">CVE-2023-3728 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3728">CVE-2023-3728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3730/">CVE-2023-3730 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3730">CVE-2023-3730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3732/">CVE-2023-3732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3732">CVE-2023-3732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3733/">CVE-2023-3733 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3733">CVE-2023-3733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3734/">CVE-2023-3734 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3734">CVE-2023-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3735/">CVE-2023-3735 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3735">CVE-2023-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3736/">CVE-2023-3736 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3736">CVE-2023-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3737/">CVE-2023-3737 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3737">CVE-2023-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3738/">CVE-2023-3738 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3738">CVE-2023-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3740/">CVE-2023-3740 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3740">CVE-2023-3740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931957" comment="ungoogled-chromium-115.0.5790.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931958" comment="ungoogled-chromium-chromedriver-115.0.5790.102-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251422" version="1" class="patch">
	<metadata>
		<title>cargo1.71-1.71.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38497" ref_url="https://www.suse.com/security/cve/CVE-2023-38497/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.71-1.71.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38497/">CVE-2023-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931959" comment="cargo1.71-1.71.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931960" comment="rust1.71-1.71.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251423" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-115.0.5790.170-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4068" ref_url="https://www.suse.com/security/cve/CVE-2023-4068/" source="CVE"/>
		<reference ref_id="CVE-2023-4069" ref_url="https://www.suse.com/security/cve/CVE-2023-4069/" source="CVE"/>
		<reference ref_id="CVE-2023-4070" ref_url="https://www.suse.com/security/cve/CVE-2023-4070/" source="CVE"/>
		<reference ref_id="CVE-2023-4071" ref_url="https://www.suse.com/security/cve/CVE-2023-4071/" source="CVE"/>
		<reference ref_id="CVE-2023-4072" ref_url="https://www.suse.com/security/cve/CVE-2023-4072/" source="CVE"/>
		<reference ref_id="CVE-2023-4073" ref_url="https://www.suse.com/security/cve/CVE-2023-4073/" source="CVE"/>
		<reference ref_id="CVE-2023-4074" ref_url="https://www.suse.com/security/cve/CVE-2023-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-4075" ref_url="https://www.suse.com/security/cve/CVE-2023-4075/" source="CVE"/>
		<reference ref_id="CVE-2023-4076" ref_url="https://www.suse.com/security/cve/CVE-2023-4076/" source="CVE"/>
		<reference ref_id="CVE-2023-4077" ref_url="https://www.suse.com/security/cve/CVE-2023-4077/" source="CVE"/>
		<reference ref_id="CVE-2023-4078" ref_url="https://www.suse.com/security/cve/CVE-2023-4078/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-115.0.5790.170-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4068/">CVE-2023-4068 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4068">CVE-2023-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4069/">CVE-2023-4069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4069">CVE-2023-4069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4070/">CVE-2023-4070 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4070">CVE-2023-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4071/">CVE-2023-4071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4072/">CVE-2023-4072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4072">CVE-2023-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4073/">CVE-2023-4073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4073">CVE-2023-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4074/">CVE-2023-4074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4075/">CVE-2023-4075 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4075">CVE-2023-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4076/">CVE-2023-4076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4077/">CVE-2023-4077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4077">CVE-2023-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4078/">CVE-2023-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4078">CVE-2023-4078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931961" comment="ungoogled-chromium-115.0.5790.170-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931962" comment="ungoogled-chromium-chromedriver-115.0.5790.170-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251424" version="1" class="patch">
	<metadata>
		<title>kbfs-6.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29408" ref_url="https://www.suse.com/security/cve/CVE-2023-29408/" source="CVE"/>
		<description>
These are all security issues fixed in the kbfs-6.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-29408/">CVE-2023-29408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29408">CVE-2023-29408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931963" comment="kbfs-6.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931964" comment="kbfs-git-6.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931965" comment="kbfs-tool-6.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931966" comment="keybase-client-6.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251425" version="1" class="patch">
	<metadata>
		<title>python311-3.11.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931967" comment="python311-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931968" comment="python311-32bit-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931969" comment="python311-curses-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931970" comment="python311-dbm-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931971" comment="python311-idle-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931972" comment="python311-tk-3.11.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931973" comment="python311-x86-64-v3-3.11.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251426" version="1" class="patch">
	<metadata>
		<title>xen-4.17.1_06-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.1_06-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931974" comment="xen-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931975" comment="xen-devel-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931976" comment="xen-doc-html-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931977" comment="xen-libs-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931978" comment="xen-tools-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931979" comment="xen-tools-domU-4.17.1_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931980" comment="xen-tools-xendomains-wait-disk-4.17.1_06-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251427" version="1" class="patch">
	<metadata>
		<title>hoard-v.1.4.2~0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<description>
These are all security issues fixed in the hoard-v.1.4.2~0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931981" comment="hoard-v.1.4.2~0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251428" version="1" class="patch">
	<metadata>
		<title>python310-tornado6-6.3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-tornado6-6.3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931982" comment="python310-tornado6-6.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931983" comment="python311-tornado6-6.3.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931984" comment="python39-tornado6-6.3.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251429" version="1" class="patch">
	<metadata>
		<title>tcpreplay-4.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27783" ref_url="https://www.suse.com/security/cve/CVE-2023-27783/" source="CVE"/>
		<reference ref_id="CVE-2023-27786" ref_url="https://www.suse.com/security/cve/CVE-2023-27786/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpreplay-4.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27783/">CVE-2023-27783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27783">CVE-2023-27783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27786/">CVE-2023-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27786">CVE-2023-27786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931985" comment="tcpreplay-4.4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251430" version="1" class="patch">
	<metadata>
		<title>golang-github-lusitaniae-apache_exporter-1.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-lusitaniae-apache_exporter-1.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931986" comment="golang-github-lusitaniae-apache_exporter-1.0.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251431" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.372-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.372-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931987" comment="java-1_8_0-openj9-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931988" comment="java-1_8_0-openj9-accessibility-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931989" comment="java-1_8_0-openj9-demo-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931990" comment="java-1_8_0-openj9-devel-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931991" comment="java-1_8_0-openj9-headless-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931992" comment="java-1_8_0-openj9-javadoc-1.8.0.372-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931993" comment="java-1_8_0-openj9-src-1.8.0.372-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251432" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-22.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009931994" comment="libopenssl-1_0_0-devel-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931995" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931996" comment="libopenssl10-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931997" comment="libopenssl1_0_0-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931998" comment="libopenssl1_0_0-32bit-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931999" comment="libopenssl1_0_0-steam-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932000" comment="libopenssl1_0_0-steam-32bit-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932001" comment="openssl-1_0_0-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932002" comment="openssl-1_0_0-cavs-1.0.2u-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932003" comment="openssl-1_0_0-doc-1.0.2u-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251433" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.4.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.4.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932005" comment="kernel-macros-6.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932006" comment="kernel-source-6.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932007" comment="kernel-source-vanilla-6.4.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251434" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20230731-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20230731-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932008" comment="kernel-firmware-20230731-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932009" comment="ucode-amd-20230731-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251435" version="1" class="patch">
	<metadata>
		<title>qemu-8.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330/" source="CVE"/>
		<reference ref_id="CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180/" source="CVE"/>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932010" comment="qemu-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932011" comment="qemu-SLOF-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932012" comment="qemu-accel-qtest-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932013" comment="qemu-accel-tcg-x86-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932014" comment="qemu-arm-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932015" comment="qemu-audio-alsa-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932016" comment="qemu-audio-dbus-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932017" comment="qemu-audio-jack-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932018" comment="qemu-audio-oss-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932019" comment="qemu-audio-pa-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932020" comment="qemu-audio-spice-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932021" comment="qemu-block-curl-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932022" comment="qemu-block-dmg-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932023" comment="qemu-block-gluster-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932024" comment="qemu-block-iscsi-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932025" comment="qemu-block-nfs-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932026" comment="qemu-block-rbd-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932027" comment="qemu-block-ssh-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932028" comment="qemu-chardev-baum-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932029" comment="qemu-chardev-spice-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932030" comment="qemu-doc-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932031" comment="qemu-extra-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932032" comment="qemu-guest-agent-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932033" comment="qemu-headless-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932034" comment="qemu-hw-display-qxl-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932035" comment="qemu-hw-display-virtio-gpu-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932036" comment="qemu-hw-display-virtio-gpu-pci-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932037" comment="qemu-hw-display-virtio-vga-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932038" comment="qemu-hw-s390x-virtio-gpu-ccw-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932039" comment="qemu-hw-usb-host-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932040" comment="qemu-hw-usb-redirect-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932041" comment="qemu-hw-usb-smartcard-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932042" comment="qemu-img-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009895334" comment="qemu-ipxe-1.0.0+-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932043" comment="qemu-ivshmem-tools-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932044" comment="qemu-ksm-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932045" comment="qemu-kvm-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932046" comment="qemu-lang-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932047" comment="qemu-microvm-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932048" comment="qemu-ppc-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932049" comment="qemu-pr-helper-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932050" comment="qemu-s390x-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931487" comment="qemu-seabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932051" comment="qemu-skiboot-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932052" comment="qemu-tools-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932053" comment="qemu-ui-curses-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932054" comment="qemu-ui-dbus-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932055" comment="qemu-ui-gtk-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932056" comment="qemu-ui-opengl-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932057" comment="qemu-ui-spice-app-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932058" comment="qemu-ui-spice-core-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931496" comment="qemu-vgabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932059" comment="qemu-vhost-user-gpu-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932060" comment="qemu-x86-8.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251436" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20230808-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20230808-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932061" comment="ucode-intel-20230808-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251437" version="1" class="patch">
	<metadata>
		<title>haproxy-2.8.2+git0.61a0f576a-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-2.8.2+git0.61a0f576a-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932062" comment="haproxy-2.8.2+git0.61a0f576a-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251438" version="1" class="patch">
	<metadata>
		<title>corepack20-20.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32003" ref_url="https://www.suse.com/security/cve/CVE-2023-32003/" source="CVE"/>
		<reference ref_id="CVE-2023-32004" ref_url="https://www.suse.com/security/cve/CVE-2023-32004/" source="CVE"/>
		<reference ref_id="CVE-2023-32005" ref_url="https://www.suse.com/security/cve/CVE-2023-32005/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32558" ref_url="https://www.suse.com/security/cve/CVE-2023-32558/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-32003/">CVE-2023-32003 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32003">CVE-2023-32003 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-32004/">CVE-2023-32004 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32004">CVE-2023-32004 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32005/">CVE-2023-32005 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32005">CVE-2023-32005 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32558/">CVE-2023-32558 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32558">CVE-2023-32558 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932063" comment="corepack20-20.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932064" comment="nodejs20-20.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932065" comment="nodejs20-devel-20.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932066" comment="nodejs20-docs-20.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932067" comment="npm20-20.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251439" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932068" comment="postgresql11-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932069" comment="postgresql11-contrib-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932070" comment="postgresql11-devel-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932071" comment="postgresql11-docs-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932072" comment="postgresql11-llvmjit-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932073" comment="postgresql11-llvmjit-devel-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932074" comment="postgresql11-plperl-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932075" comment="postgresql11-plpython-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932076" comment="postgresql11-pltcl-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932077" comment="postgresql11-server-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932078" comment="postgresql11-server-devel-11.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932079" comment="postgresql11-test-11.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251440" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932080" comment="postgresql12-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932081" comment="postgresql12-contrib-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932082" comment="postgresql12-devel-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932083" comment="postgresql12-docs-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932084" comment="postgresql12-llvmjit-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932085" comment="postgresql12-llvmjit-devel-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932086" comment="postgresql12-plperl-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932087" comment="postgresql12-plpython-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932088" comment="postgresql12-pltcl-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932089" comment="postgresql12-server-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932090" comment="postgresql12-server-devel-12.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932091" comment="postgresql12-test-12.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251441" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932092" comment="postgresql13-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932093" comment="postgresql13-contrib-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932094" comment="postgresql13-devel-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932095" comment="postgresql13-docs-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932096" comment="postgresql13-llvmjit-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932097" comment="postgresql13-llvmjit-devel-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932098" comment="postgresql13-plperl-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932099" comment="postgresql13-plpython-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932100" comment="postgresql13-pltcl-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932101" comment="postgresql13-server-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932102" comment="postgresql13-server-devel-13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932103" comment="postgresql13-test-13.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251442" version="1" class="patch">
	<metadata>
		<title>python3-salt-3006.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3006.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932104" comment="python3-salt-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932105" comment="salt-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932106" comment="salt-api-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932107" comment="salt-bash-completion-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932108" comment="salt-cloud-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932109" comment="salt-doc-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932110" comment="salt-fish-completion-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932111" comment="salt-master-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932112" comment="salt-minion-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932113" comment="salt-proxy-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932114" comment="salt-ssh-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932115" comment="salt-standalone-formulas-configuration-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932116" comment="salt-syndic-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932117" comment="salt-tests-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932118" comment="salt-transactional-update-3006.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932119" comment="salt-zsh-completion-3006.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251443" version="1" class="patch">
	<metadata>
		<title>xen-4.17.2_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.2_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932120" comment="xen-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932121" comment="xen-devel-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932122" comment="xen-doc-html-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932123" comment="xen-libs-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932124" comment="xen-tools-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932125" comment="xen-tools-domU-4.17.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932126" comment="xen-tools-xendomains-wait-disk-4.17.2_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251444" version="1" class="patch">
	<metadata>
		<title>glibc-2.38-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25139" ref_url="https://www.suse.com/security/cve/CVE-2023-25139/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.38-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25139/">CVE-2023-25139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25139">CVE-2023-25139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932127" comment="glibc-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932128" comment="glibc-devel-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932129" comment="glibc-devel-static-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932130" comment="glibc-extra-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932131" comment="glibc-html-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932132" comment="glibc-i18ndata-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932133" comment="glibc-info-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932134" comment="glibc-lang-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932135" comment="glibc-locale-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932136" comment="glibc-locale-base-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932137" comment="glibc-profile-2.38-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932138" comment="nscd-2.38-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251445" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-116.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<reference ref_id="CVE-2023-4058" ref_url="https://www.suse.com/security/cve/CVE-2023-4058/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-116.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4058/">CVE-2023-4058 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4058">CVE-2023-4058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932139" comment="MozillaFirefox-116.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932140" comment="MozillaFirefox-branding-upstream-116.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932141" comment="MozillaFirefox-devel-116.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932142" comment="MozillaFirefox-translations-common-116.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932143" comment="MozillaFirefox-translations-other-116.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251446" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3732" ref_url="https://www.suse.com/security/cve/CVE-2023-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3732/">CVE-2023-3732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3732">CVE-2023-3732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932144" comment="nodejs-electron-22.3.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932145" comment="nodejs-electron-devel-22.3.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932146" comment="nodejs-electron-doc-22.3.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251447" version="1" class="patch">
	<metadata>
		<title>opensuse-welcome-0.1.9+git.35.4b9444a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32184" ref_url="https://www.suse.com/security/cve/CVE-2023-32184/" source="CVE"/>
		<description>
These are all security issues fixed in the opensuse-welcome-0.1.9+git.35.4b9444a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32184/">CVE-2023-32184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32184">CVE-2023-32184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932147" comment="opensuse-welcome-0.1.9+git.35.4b9444a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932148" comment="opensuse-welcome-lang-0.1.9+git.35.4b9444a-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251448" version="1" class="patch">
	<metadata>
		<title>icu-73.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-73.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932149" comment="icu-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932150" comment="libicu-devel-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932151" comment="libicu-devel-32bit-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932152" comment="libicu-doc-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932153" comment="libicu73-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932154" comment="libicu73-32bit-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932155" comment="libicu73-bedata-73.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932156" comment="libicu73-ledata-73.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251449" version="1" class="patch">
	<metadata>
		<title>bluez-5.68-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.68-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932157" comment="bluez-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932158" comment="bluez-auto-enable-devices-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932159" comment="bluez-cups-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932160" comment="bluez-deprecated-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932161" comment="bluez-devel-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932162" comment="bluez-devel-32bit-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932163" comment="bluez-obexd-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932164" comment="bluez-test-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932165" comment="bluez-zsh-completion-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932166" comment="libbluetooth3-5.68-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932167" comment="libbluetooth3-32bit-5.68-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251450" version="1" class="patch">
	<metadata>
		<title>commons-compiler-3.1.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33546" ref_url="https://www.suse.com/security/cve/CVE-2023-33546/" source="CVE"/>
		<description>
These are all security issues fixed in the commons-compiler-3.1.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33546/">CVE-2023-33546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33546">CVE-2023-33546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932168" comment="commons-compiler-3.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932169" comment="commons-compiler-jdk-3.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932170" comment="janino-3.1.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932171" comment="janino-javadoc-3.1.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251451" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932172" comment="java-11-openj9-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932173" comment="java-11-openj9-demo-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932174" comment="java-11-openj9-devel-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932175" comment="java-11-openj9-headless-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932176" comment="java-11-openj9-javadoc-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932177" comment="java-11-openj9-jmods-11.0.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932178" comment="java-11-openj9-src-11.0.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251452" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932179" comment="java-17-openj9-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932180" comment="java-17-openj9-demo-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932181" comment="java-17-openj9-devel-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932182" comment="java-17-openj9-headless-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932183" comment="java-17-openj9-javadoc-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932184" comment="java-17-openj9-jmods-17.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932185" comment="java-17-openj9-src-17.0.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251453" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.382-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.382-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932186" comment="java-1_8_0-openj9-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932187" comment="java-1_8_0-openj9-accessibility-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932188" comment="java-1_8_0-openj9-demo-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932189" comment="java-1_8_0-openj9-devel-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932190" comment="java-1_8_0-openj9-headless-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932191" comment="java-1_8_0-openj9-javadoc-1.8.0.382-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932192" comment="java-1_8_0-openj9-src-1.8.0.382-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251454" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932193" comment="libmozjs-102-0-102.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932194" comment="mozjs102-102.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932195" comment="mozjs102-devel-102.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251455" version="1" class="patch">
	<metadata>
		<title>libecpg6-15.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-15.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932196" comment="libecpg6-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932197" comment="libecpg6-32bit-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932198" comment="libpq5-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932199" comment="libpq5-32bit-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932200" comment="postgresql15-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932201" comment="postgresql15-contrib-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932202" comment="postgresql15-devel-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932203" comment="postgresql15-docs-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932204" comment="postgresql15-llvmjit-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932205" comment="postgresql15-llvmjit-devel-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932206" comment="postgresql15-plperl-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932207" comment="postgresql15-plpython-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932208" comment="postgresql15-pltcl-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932209" comment="postgresql15-server-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932210" comment="postgresql15-server-devel-15.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932211" comment="postgresql15-test-15.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251456" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932212" comment="python-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932213" comment="python-32bit-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932214" comment="python-curses-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932215" comment="python-demo-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932216" comment="python-gdbm-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932217" comment="python-idle-2.7.18-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932218" comment="python-tk-2.7.18-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251457" version="1" class="patch">
	<metadata>
		<title>python310-cmarkgfm-2022.10.27-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37463" ref_url="https://www.suse.com/security/cve/CVE-2023-37463/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cmarkgfm-2022.10.27-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37463/">CVE-2023-37463 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37463">CVE-2023-37463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932219" comment="python310-cmarkgfm-2022.10.27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932220" comment="python311-cmarkgfm-2022.10.27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932221" comment="python39-cmarkgfm-2022.10.27-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251458" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932222" comment="ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251459" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20230121-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38252" ref_url="https://www.suse.com/security/cve/CVE-2023-38252/" source="CVE"/>
		<reference ref_id="CVE-2023-38253" ref_url="https://www.suse.com/security/cve/CVE-2023-38253/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20230121-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38252/">CVE-2023-38252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38252">CVE-2023-38252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38253/">CVE-2023-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38253">CVE-2023-38253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932223" comment="w3m-0.5.3+git20230121-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932224" comment="w3m-inline-image-0.5.3+git20230121-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251460" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.96-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2312" ref_url="https://www.suse.com/security/cve/CVE-2023-2312/" source="CVE"/>
		<reference ref_id="CVE-2023-4349" ref_url="https://www.suse.com/security/cve/CVE-2023-4349/" source="CVE"/>
		<reference ref_id="CVE-2023-4350" ref_url="https://www.suse.com/security/cve/CVE-2023-4350/" source="CVE"/>
		<reference ref_id="CVE-2023-4351" ref_url="https://www.suse.com/security/cve/CVE-2023-4351/" source="CVE"/>
		<reference ref_id="CVE-2023-4352" ref_url="https://www.suse.com/security/cve/CVE-2023-4352/" source="CVE"/>
		<reference ref_id="CVE-2023-4353" ref_url="https://www.suse.com/security/cve/CVE-2023-4353/" source="CVE"/>
		<reference ref_id="CVE-2023-4354" ref_url="https://www.suse.com/security/cve/CVE-2023-4354/" source="CVE"/>
		<reference ref_id="CVE-2023-4355" ref_url="https://www.suse.com/security/cve/CVE-2023-4355/" source="CVE"/>
		<reference ref_id="CVE-2023-4356" ref_url="https://www.suse.com/security/cve/CVE-2023-4356/" source="CVE"/>
		<reference ref_id="CVE-2023-4357" ref_url="https://www.suse.com/security/cve/CVE-2023-4357/" source="CVE"/>
		<reference ref_id="CVE-2023-4358" ref_url="https://www.suse.com/security/cve/CVE-2023-4358/" source="CVE"/>
		<reference ref_id="CVE-2023-4359" ref_url="https://www.suse.com/security/cve/CVE-2023-4359/" source="CVE"/>
		<reference ref_id="CVE-2023-4360" ref_url="https://www.suse.com/security/cve/CVE-2023-4360/" source="CVE"/>
		<reference ref_id="CVE-2023-4361" ref_url="https://www.suse.com/security/cve/CVE-2023-4361/" source="CVE"/>
		<reference ref_id="CVE-2023-4362" ref_url="https://www.suse.com/security/cve/CVE-2023-4362/" source="CVE"/>
		<reference ref_id="CVE-2023-4363" ref_url="https://www.suse.com/security/cve/CVE-2023-4363/" source="CVE"/>
		<reference ref_id="CVE-2023-4364" ref_url="https://www.suse.com/security/cve/CVE-2023-4364/" source="CVE"/>
		<reference ref_id="CVE-2023-4365" ref_url="https://www.suse.com/security/cve/CVE-2023-4365/" source="CVE"/>
		<reference ref_id="CVE-2023-4366" ref_url="https://www.suse.com/security/cve/CVE-2023-4366/" source="CVE"/>
		<reference ref_id="CVE-2023-4367" ref_url="https://www.suse.com/security/cve/CVE-2023-4367/" source="CVE"/>
		<reference ref_id="CVE-2023-4368" ref_url="https://www.suse.com/security/cve/CVE-2023-4368/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.96-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2312/">CVE-2023-2312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2312">CVE-2023-2312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4349/">CVE-2023-4349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4349">CVE-2023-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4350/">CVE-2023-4350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4350">CVE-2023-4350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4351/">CVE-2023-4351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4352/">CVE-2023-4352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4352">CVE-2023-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4353/">CVE-2023-4353 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4353">CVE-2023-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4354/">CVE-2023-4354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4355/">CVE-2023-4355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4356/">CVE-2023-4356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4356">CVE-2023-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4357/">CVE-2023-4357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4357">CVE-2023-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4358/">CVE-2023-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4358">CVE-2023-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4359/">CVE-2023-4359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4359">CVE-2023-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4360/">CVE-2023-4360 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4360">CVE-2023-4360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4361/">CVE-2023-4361 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4361">CVE-2023-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4362/">CVE-2023-4362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4363/">CVE-2023-4363 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4363">CVE-2023-4363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4364/">CVE-2023-4364 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4364">CVE-2023-4364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4365/">CVE-2023-4365 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4365">CVE-2023-4365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4366/">CVE-2023-4366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4366">CVE-2023-4366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4367/">CVE-2023-4367 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4367">CVE-2023-4367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4368/">CVE-2023-4368 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4368">CVE-2023-4368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932225" comment="chromedriver-116.0.5845.96-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932226" comment="chromium-116.0.5845.96-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251461" version="1" class="patch">
	<metadata>
		<title>libprocps8-3.3.17-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps8-3.3.17-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932227" comment="libprocps8-3.3.17-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932228" comment="procps-3.3.17-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932229" comment="procps-devel-3.3.17-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932230" comment="procps-lang-3.3.17-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251462" version="1" class="patch">
	<metadata>
		<title>libproc2-0-4.0.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
These are all security issues fixed in the libproc2-0-4.0.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932231" comment="libproc2-0-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932232" comment="procps4-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932233" comment="procps4-devel-4.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932234" comment="procps4-lang-4.0.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251463" version="1" class="patch">
	<metadata>
		<title>yt-dlp-2023.07.06-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-35934" ref_url="https://www.suse.com/security/cve/CVE-2023-35934/" source="CVE"/>
		<description>
These are all security issues fixed in the yt-dlp-2023.07.06-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35934/">CVE-2023-35934 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35934">CVE-2023-35934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932235" comment="yt-dlp-2023.07.06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932236" comment="yt-dlp-bash-completion-2023.07.06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932237" comment="yt-dlp-fish-completion-2023.07.06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932238" comment="yt-dlp-zsh-completion-2023.07.06-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251464" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.46.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.46.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932239" comment="golang-github-prometheus-prometheus-2.46.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251465" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-116.0.5845.96-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2312" ref_url="https://www.suse.com/security/cve/CVE-2023-2312/" source="CVE"/>
		<reference ref_id="CVE-2023-4349" ref_url="https://www.suse.com/security/cve/CVE-2023-4349/" source="CVE"/>
		<reference ref_id="CVE-2023-4350" ref_url="https://www.suse.com/security/cve/CVE-2023-4350/" source="CVE"/>
		<reference ref_id="CVE-2023-4351" ref_url="https://www.suse.com/security/cve/CVE-2023-4351/" source="CVE"/>
		<reference ref_id="CVE-2023-4352" ref_url="https://www.suse.com/security/cve/CVE-2023-4352/" source="CVE"/>
		<reference ref_id="CVE-2023-4353" ref_url="https://www.suse.com/security/cve/CVE-2023-4353/" source="CVE"/>
		<reference ref_id="CVE-2023-4354" ref_url="https://www.suse.com/security/cve/CVE-2023-4354/" source="CVE"/>
		<reference ref_id="CVE-2023-4355" ref_url="https://www.suse.com/security/cve/CVE-2023-4355/" source="CVE"/>
		<reference ref_id="CVE-2023-4356" ref_url="https://www.suse.com/security/cve/CVE-2023-4356/" source="CVE"/>
		<reference ref_id="CVE-2023-4357" ref_url="https://www.suse.com/security/cve/CVE-2023-4357/" source="CVE"/>
		<reference ref_id="CVE-2023-4358" ref_url="https://www.suse.com/security/cve/CVE-2023-4358/" source="CVE"/>
		<reference ref_id="CVE-2023-4359" ref_url="https://www.suse.com/security/cve/CVE-2023-4359/" source="CVE"/>
		<reference ref_id="CVE-2023-4360" ref_url="https://www.suse.com/security/cve/CVE-2023-4360/" source="CVE"/>
		<reference ref_id="CVE-2023-4361" ref_url="https://www.suse.com/security/cve/CVE-2023-4361/" source="CVE"/>
		<reference ref_id="CVE-2023-4362" ref_url="https://www.suse.com/security/cve/CVE-2023-4362/" source="CVE"/>
		<reference ref_id="CVE-2023-4363" ref_url="https://www.suse.com/security/cve/CVE-2023-4363/" source="CVE"/>
		<reference ref_id="CVE-2023-4364" ref_url="https://www.suse.com/security/cve/CVE-2023-4364/" source="CVE"/>
		<reference ref_id="CVE-2023-4365" ref_url="https://www.suse.com/security/cve/CVE-2023-4365/" source="CVE"/>
		<reference ref_id="CVE-2023-4366" ref_url="https://www.suse.com/security/cve/CVE-2023-4366/" source="CVE"/>
		<reference ref_id="CVE-2023-4367" ref_url="https://www.suse.com/security/cve/CVE-2023-4367/" source="CVE"/>
		<reference ref_id="CVE-2023-4368" ref_url="https://www.suse.com/security/cve/CVE-2023-4368/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-116.0.5845.96-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2312/">CVE-2023-2312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2312">CVE-2023-2312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4349/">CVE-2023-4349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4349">CVE-2023-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4350/">CVE-2023-4350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4350">CVE-2023-4350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4351/">CVE-2023-4351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4352/">CVE-2023-4352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4352">CVE-2023-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4353/">CVE-2023-4353 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4353">CVE-2023-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4354/">CVE-2023-4354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4355/">CVE-2023-4355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4356/">CVE-2023-4356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4356">CVE-2023-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4357/">CVE-2023-4357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4357">CVE-2023-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4358/">CVE-2023-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4358">CVE-2023-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4359/">CVE-2023-4359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4359">CVE-2023-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4360/">CVE-2023-4360 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4360">CVE-2023-4360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4361/">CVE-2023-4361 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4361">CVE-2023-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4362/">CVE-2023-4362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4363/">CVE-2023-4363 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4363">CVE-2023-4363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4364/">CVE-2023-4364 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4364">CVE-2023-4364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4365/">CVE-2023-4365 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4365">CVE-2023-4365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4366/">CVE-2023-4366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4366">CVE-2023-4366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4367/">CVE-2023-4367 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4367">CVE-2023-4367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4368/">CVE-2023-4368 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4368">CVE-2023-4368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932240" comment="ungoogled-chromium-116.0.5845.96-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932241" comment="ungoogled-chromium-chromedriver-116.0.5845.96-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251466" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.4.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.4.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932243" comment="kernel-macros-6.4.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932244" comment="kernel-source-6.4.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932245" comment="kernel-source-vanilla-6.4.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251467" version="1" class="patch">
	<metadata>
		<title>python310-GitPython-3.1.32.1689011721.5d45ce2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40267" ref_url="https://www.suse.com/security/cve/CVE-2023-40267/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-GitPython-3.1.32.1689011721.5d45ce2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40267/">CVE-2023-40267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40267">CVE-2023-40267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932246" comment="python310-GitPython-3.1.32.1689011721.5d45ce2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932247" comment="python311-GitPython-3.1.32.1689011721.5d45ce2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932248" comment="python39-GitPython-3.1.32.1689011721.5d45ce2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251468" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932249" comment="libQt6Concurrent6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932250" comment="libQt6Core6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932251" comment="libQt6DBus6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932252" comment="libQt6Gui6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932253" comment="libQt6Network6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932254" comment="libQt6OpenGL6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932255" comment="libQt6OpenGLWidgets6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932256" comment="libQt6PrintSupport6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932257" comment="libQt6Sql6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932258" comment="libQt6Test6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932259" comment="libQt6Widgets6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932260" comment="libQt6Xml6-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932261" comment="qt6-base-common-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932262" comment="qt6-base-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932263" comment="qt6-base-examples-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932264" comment="qt6-base-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932265" comment="qt6-concurrent-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932266" comment="qt6-core-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932267" comment="qt6-core-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932268" comment="qt6-dbus-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932269" comment="qt6-dbus-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932270" comment="qt6-docs-common-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932271" comment="qt6-exampleicons-devel-static-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932272" comment="qt6-gui-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932273" comment="qt6-gui-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932274" comment="qt6-kmssupport-devel-static-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932275" comment="qt6-kmssupport-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932276" comment="qt6-network-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932277" comment="qt6-network-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932278" comment="qt6-network-tls-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932279" comment="qt6-networkinformation-glib-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932280" comment="qt6-networkinformation-nm-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932281" comment="qt6-opengl-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932282" comment="qt6-opengl-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932283" comment="qt6-openglwidgets-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932284" comment="qt6-platformsupport-devel-static-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932285" comment="qt6-platformsupport-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932286" comment="qt6-platformtheme-gtk3-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932287" comment="qt6-platformtheme-xdgdesktopportal-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932288" comment="qt6-printsupport-cups-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932289" comment="qt6-printsupport-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932290" comment="qt6-printsupport-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932291" comment="qt6-sql-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932292" comment="qt6-sql-mysql-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932293" comment="qt6-sql-postgresql-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932294" comment="qt6-sql-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932295" comment="qt6-sql-sqlite-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932296" comment="qt6-sql-unixODBC-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932297" comment="qt6-test-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932298" comment="qt6-test-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932299" comment="qt6-widgets-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932300" comment="qt6-widgets-private-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932301" comment="qt6-xml-devel-6.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932302" comment="qt6-xml-private-devel-6.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251469" version="1" class="patch">
	<metadata>
		<title>apache-ivy-2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46751" ref_url="https://www.suse.com/security/cve/CVE-2022-46751/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-ivy-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46751/">CVE-2022-46751 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46751">CVE-2022-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932303" comment="apache-ivy-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932304" comment="apache-ivy-javadoc-2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251470" version="1" class="patch">
	<metadata>
		<title>indent-2.2.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40305" ref_url="https://www.suse.com/security/cve/CVE-2023-40305/" source="CVE"/>
		<description>
These are all security issues fixed in the indent-2.2.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40305/">CVE-2023-40305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40305">CVE-2023-40305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932305" comment="indent-2.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932306" comment="indent-lang-2.2.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251471" version="1" class="patch">
	<metadata>
		<title>jackson-dataformat-xml-2.15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40152" ref_url="https://www.suse.com/security/cve/CVE-2022-40152/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-dataformat-xml-2.15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40152/">CVE-2022-40152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40152">CVE-2022-40152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932307" comment="jackson-dataformat-xml-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932308" comment="jackson-dataformat-xml-javadoc-2.15.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251472" version="1" class="patch">
	<metadata>
		<title>jackson-dataformat-csv-2.15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1471" ref_url="https://www.suse.com/security/cve/CVE-2022-1471/" source="CVE"/>
		<reference ref_id="CVE-2023-3894" ref_url="https://www.suse.com/security/cve/CVE-2023-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-dataformat-csv-2.15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1471/">CVE-2022-1471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3894/">CVE-2023-3894 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3894">CVE-2023-3894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932309" comment="jackson-dataformat-csv-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932310" comment="jackson-dataformat-properties-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932311" comment="jackson-dataformat-toml-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932312" comment="jackson-dataformat-yaml-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932313" comment="jackson-dataformats-text-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932314" comment="jackson-dataformats-text-javadoc-2.15.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251473" version="1" class="patch">
	<metadata>
		<title>jtidy-1.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34623" ref_url="https://www.suse.com/security/cve/CVE-2023-34623/" source="CVE"/>
		<description>
These are all security issues fixed in the jtidy-1.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34623/">CVE-2023-34623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34623">CVE-2023-34623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932315" comment="jtidy-1.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932316" comment="jtidy-javadoc-1.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932317" comment="jtidy-scripts-1.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251474" version="1" class="patch">
	<metadata>
		<title>php8-8.2.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.2.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932318" comment="php8-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932319" comment="php8-bcmath-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932320" comment="php8-bz2-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932321" comment="php8-calendar-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932322" comment="php8-cli-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932323" comment="php8-ctype-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932324" comment="php8-curl-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932325" comment="php8-dba-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932326" comment="php8-devel-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932327" comment="php8-dom-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932328" comment="php8-enchant-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932329" comment="php8-exif-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932330" comment="php8-ffi-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932331" comment="php8-fileinfo-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932332" comment="php8-ftp-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932333" comment="php8-gd-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932334" comment="php8-gettext-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932335" comment="php8-gmp-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932336" comment="php8-iconv-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932337" comment="php8-intl-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932338" comment="php8-ldap-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932339" comment="php8-mbstring-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932340" comment="php8-mysql-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932341" comment="php8-odbc-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932342" comment="php8-opcache-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932343" comment="php8-openssl-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932344" comment="php8-pcntl-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932345" comment="php8-pdo-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932346" comment="php8-pgsql-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932347" comment="php8-phar-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932348" comment="php8-posix-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932349" comment="php8-readline-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932350" comment="php8-shmop-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932351" comment="php8-snmp-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932352" comment="php8-soap-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932353" comment="php8-sockets-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932354" comment="php8-sodium-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932355" comment="php8-sqlite-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932356" comment="php8-sysvmsg-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932357" comment="php8-sysvsem-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932358" comment="php8-sysvshm-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932359" comment="php8-tidy-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932360" comment="php8-tokenizer-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932361" comment="php8-xmlreader-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932362" comment="php8-xmlwriter-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932363" comment="php8-xsl-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932364" comment="php8-zip-8.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932365" comment="php8-zlib-8.2.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251475" version="1" class="patch">
	<metadata>
		<title>perl-File-Path-2.180000-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-File-Path-2.180000-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932366" comment="perl-File-Path-2.180000-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251476" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-fluentd-1.15.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41186" ref_url="https://www.suse.com/security/cve/CVE-2021-41186/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-fluentd-1.15.3-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41186/">CVE-2021-41186 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41186">CVE-2021-41186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932367" comment="ruby3.2-rubygem-fluentd-1.15.3-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251477" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-globalid-1.1.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22799" ref_url="https://www.suse.com/security/cve/CVE-2023-22799/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-globalid-1.1.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22799/">CVE-2023-22799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22799">CVE-2023-22799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932368" comment="ruby3.2-rubygem-globalid-1.1.0-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251478" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-http-5.1.0-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32740" ref_url="https://www.suse.com/security/cve/CVE-2021-32740/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-http-5.1.0-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32740/">CVE-2021-32740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932369" comment="ruby3.2-rubygem-http-5.1.0-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251479" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-http-cookie-1.0.5-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-http-cookie-1.0.5-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932370" comment="ruby3.2-rubygem-http-cookie-1.0.5-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251480" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-jquery-rails-4.5.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-jquery-rails-4.5.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932371" comment="ruby3.2-rubygem-jquery-rails-4.5.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251481" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-json_pure-2.6.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-json_pure-2.6.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932372" comment="ruby3.2-rubygem-json_pure-2.6.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251482" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-kramdown-2.4.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-kramdown-2.4.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932373" comment="ruby3.2-rubygem-kramdown-2.4.0-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251483" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-loofah-2.19.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-loofah-2.19.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932374" comment="ruby3.2-rubygem-loofah-2.19.1-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251484" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-minitar-0.9-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-minitar-0.9-1.13 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932375" comment="ruby3.2-rubygem-minitar-0.9-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251485" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-multi_xml-0.6.0-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0175" ref_url="https://www.suse.com/security/cve/CVE-2013-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-multi_xml-0.6.0-1.23 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0175/">CVE-2013-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0175">CVE-2013-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932376" comment="ruby3.2-rubygem-multi_xml-0.6.0-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251486" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-nokogiri-1.13.9-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-24839" ref_url="https://www.suse.com/security/cve/CVE-2022-24839/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-nokogiri-1.13.9-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24839/">CVE-2022-24839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932377" comment="ruby3.2-rubygem-nokogiri-1.13.9-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251487" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-puma-5-5.6.5-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-puma-5-5.6.5-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29509">CVE-2021-29509 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932378" comment="ruby3.2-rubygem-puma-5-5.6.5-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251488" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-rack-3.0.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-rack-3.0.7-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932379" comment="ruby3.2-rubygem-rack-3.0.7-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251489" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-rubyzip-2.3.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5946" ref_url="https://www.suse.com/security/cve/CVE-2017-5946/" source="CVE"/>
		<reference ref_id="CVE-2018-1000544" ref_url="https://www.suse.com/security/cve/CVE-2018-1000544/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-rubyzip-2.3.2-1.11 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5946/">CVE-2017-5946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5946">CVE-2017-5946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000544/">CVE-2018-1000544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000544">CVE-2018-1000544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932380" comment="ruby3.2-rubygem-rubyzip-2.3.2-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251490" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-sprockets-4.1.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-sprockets-4.1.1-1.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932381" comment="ruby3.2-rubygem-sprockets-4.1.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251491" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-sprockets-3.7-3.7.2-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-sprockets-3.7-3.7.2-1.20 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932382" comment="ruby3.2-rubygem-sprockets-3.7-3.7.2-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251492" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-tzinfo-1.2-1.2.10-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31163" ref_url="https://www.suse.com/security/cve/CVE-2022-31163/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-tzinfo-1.2-1.2.10-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31163/">CVE-2022-31163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31163">CVE-2022-31163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932383" comment="ruby3.2-rubygem-tzinfo-1.2-1.2.10-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251493" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-web-console-4.2.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3224" ref_url="https://www.suse.com/security/cve/CVE-2015-3224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-web-console-4.2.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3224/">CVE-2015-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3224">CVE-2015-3224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932384" comment="ruby3.2-rubygem-web-console-4.2.0-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251494" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-websocket-extensions-0.1.5-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7663" ref_url="https://www.suse.com/security/cve/CVE-2020-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-websocket-extensions-0.1.5-1.16 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7663/">CVE-2020-7663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">CVE-2020-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932385" comment="ruby3.2-rubygem-websocket-extensions-0.1.5-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251495" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20197" ref_url="https://www.suse.com/security/cve/CVE-2023-20197/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-20197/">CVE-2023-20197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20197">CVE-2023-20197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932386" comment="clamav-0.103.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932387" comment="clamav-devel-0.103.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932388" comment="clamav-docs-html-0.103.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932389" comment="clamav-milter-0.103.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932390" comment="libclamav9-0.103.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932391" comment="libfreshclam2-0.103.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251496" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4427" ref_url="https://www.suse.com/security/cve/CVE-2023-4427/" source="CVE"/>
		<reference ref_id="CVE-2023-4428" ref_url="https://www.suse.com/security/cve/CVE-2023-4428/" source="CVE"/>
		<reference ref_id="CVE-2023-4429" ref_url="https://www.suse.com/security/cve/CVE-2023-4429/" source="CVE"/>
		<reference ref_id="CVE-2023-4430" ref_url="https://www.suse.com/security/cve/CVE-2023-4430/" source="CVE"/>
		<reference ref_id="CVE-2023-4431" ref_url="https://www.suse.com/security/cve/CVE-2023-4431/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4427/">CVE-2023-4427 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4427">CVE-2023-4427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4428/">CVE-2023-4428 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4428">CVE-2023-4428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4429/">CVE-2023-4429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4429">CVE-2023-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4430/">CVE-2023-4430 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4430">CVE-2023-4430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4431/">CVE-2023-4431 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4431">CVE-2023-4431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932392" comment="chromedriver-116.0.5845.110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932393" comment="chromium-116.0.5845.110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251497" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-117.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4579" ref_url="https://www.suse.com/security/cve/CVE-2023-4579/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-117.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4579/">CVE-2023-4579 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4579">CVE-2023-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932394" comment="MozillaFirefox-117.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932395" comment="MozillaFirefox-branding-upstream-117.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932396" comment="MozillaFirefox-devel-117.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932397" comment="MozillaFirefox-translations-common-117.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932398" comment="MozillaFirefox-translations-other-117.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251498" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.140-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4572" ref_url="https://www.suse.com/security/cve/CVE-2023-4572/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.140-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4572/">CVE-2023-4572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4572">CVE-2023-4572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932399" comment="chromedriver-116.0.5845.140-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932400" comment="chromium-116.0.5845.140-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251499" version="1" class="patch">
	<metadata>
		<title>djvulibre-3.5.28-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46310" ref_url="https://www.suse.com/security/cve/CVE-2021-46310/" source="CVE"/>
		<reference ref_id="CVE-2021-46312" ref_url="https://www.suse.com/security/cve/CVE-2021-46312/" source="CVE"/>
		<description>
These are all security issues fixed in the djvulibre-3.5.28-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46310/">CVE-2021-46310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46310">CVE-2021-46310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46312/">CVE-2021-46312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46312">CVE-2021-46312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932401" comment="djvulibre-3.5.28-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932402" comment="djvulibre-doc-3.5.28-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932403" comment="libdjvulibre-devel-3.5.28-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932404" comment="libdjvulibre21-3.5.28-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251500" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.4.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.4.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932406" comment="kernel-macros-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932407" comment="kernel-source-6.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932408" comment="kernel-source-vanilla-6.4.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251501" version="1" class="patch">
	<metadata>
		<title>jdom-1.1.3-40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<description>
These are all security issues fixed in the jdom-1.1.3-40.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33813">CVE-2021-33813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932409" comment="jdom-1.1.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932410" comment="jdom-demo-1.1.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932411" comment="jdom-javadoc-1.1.3-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251502" version="1" class="patch">
	<metadata>
		<title>busybox-1.36.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48174" ref_url="https://www.suse.com/security/cve/CVE-2022-48174/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.36.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48174/">CVE-2022-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932412" comment="busybox-1.36.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932413" comment="busybox-static-1.36.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932414" comment="busybox-testsuite-1.36.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932415" comment="busybox-warewulf3-1.36.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251503" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.21-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4355" ref_url="https://www.suse.com/security/cve/CVE-2023-4355/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.21-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4355/">CVE-2023-4355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932416" comment="nodejs-electron-22.3.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932417" comment="nodejs-electron-devel-22.3.21-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932418" comment="nodejs-electron-doc-22.3.21-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251504" version="1" class="patch">
	<metadata>
		<title>spectre-meltdown-checker-0.46-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the spectre-meltdown-checker-0.46-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932419" comment="spectre-meltdown-checker-0.46-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251505" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2906" ref_url="https://www.suse.com/security/cve/CVE-2023-2906/" source="CVE"/>
		<reference ref_id="CVE-2023-4511" ref_url="https://www.suse.com/security/cve/CVE-2023-4511/" source="CVE"/>
		<reference ref_id="CVE-2023-4512" ref_url="https://www.suse.com/security/cve/CVE-2023-4512/" source="CVE"/>
		<reference ref_id="CVE-2023-4513" ref_url="https://www.suse.com/security/cve/CVE-2023-4513/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2906/">CVE-2023-2906 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2906">CVE-2023-2906 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4511/">CVE-2023-4511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4511">CVE-2023-4511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4512/">CVE-2023-4512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4512">CVE-2023-4512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4513/">CVE-2023-4513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4513">CVE-2023-4513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932420" comment="libwireshark16-4.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932421" comment="libwiretap13-4.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932422" comment="libwsutil14-4.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932423" comment="wireshark-4.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932424" comment="wireshark-devel-4.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932425" comment="wireshark-ui-qt-4.0.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251506" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-22.3.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4427" ref_url="https://www.suse.com/security/cve/CVE-2023-4427/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-22.3.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4427/">CVE-2023-4427 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4427">CVE-2023-4427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932426" comment="nodejs-electron-22.3.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932427" comment="nodejs-electron-devel-22.3.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932428" comment="nodejs-electron-doc-22.3.23-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251507" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-12.2.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-12.2.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932429" comment="libvmtools-devel-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932430" comment="libvmtools0-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932431" comment="open-vm-tools-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932432" comment="open-vm-tools-containerinfo-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932433" comment="open-vm-tools-desktop-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932434" comment="open-vm-tools-salt-minion-12.2.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932435" comment="open-vm-tools-sdmp-12.2.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251508" version="1" class="patch">
	<metadata>
		<title>owasp-modsecurity-crs-3.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38199" ref_url="https://www.suse.com/security/cve/CVE-2023-38199/" source="CVE"/>
		<description>
These are all security issues fixed in the owasp-modsecurity-crs-3.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38199/">CVE-2023-38199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38199">CVE-2023-38199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932436" comment="owasp-modsecurity-crs-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932437" comment="owasp-modsecurity-crs-apache2-3.3.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251509" version="1" class="patch">
	<metadata>
		<title>python3-salt-3006.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20897" ref_url="https://www.suse.com/security/cve/CVE-2023-20897/" source="CVE"/>
		<reference ref_id="CVE-2023-20898" ref_url="https://www.suse.com/security/cve/CVE-2023-20898/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3006.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20897/">CVE-2023-20897 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20897">CVE-2023-20897 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20898/">CVE-2023-20898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20898">CVE-2023-20898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932438" comment="python3-salt-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932439" comment="salt-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932440" comment="salt-api-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932441" comment="salt-bash-completion-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932442" comment="salt-cloud-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932443" comment="salt-doc-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932444" comment="salt-fish-completion-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932445" comment="salt-master-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932446" comment="salt-minion-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932447" comment="salt-proxy-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932448" comment="salt-ssh-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932449" comment="salt-standalone-formulas-configuration-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932450" comment="salt-syndic-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932451" comment="salt-tests-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932452" comment="salt-transactional-update-3006.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932453" comment="salt-zsh-completion-3006.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251510" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932454" comment="xalan-j2-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932455" comment="xalan-j2-demo-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932456" comment="xalan-j2-manual-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932457" comment="xalan-j2-xsltc-2.7.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251511" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2721" ref_url="https://www.suse.com/security/cve/CVE-2023-2721/" source="CVE"/>
		<reference ref_id="CVE-2023-2930" ref_url="https://www.suse.com/security/cve/CVE-2023-2930/" source="CVE"/>
		<reference ref_id="CVE-2023-2931" ref_url="https://www.suse.com/security/cve/CVE-2023-2931/" source="CVE"/>
		<reference ref_id="CVE-2023-2932" ref_url="https://www.suse.com/security/cve/CVE-2023-2932/" source="CVE"/>
		<reference ref_id="CVE-2023-2933" ref_url="https://www.suse.com/security/cve/CVE-2023-2933/" source="CVE"/>
		<reference ref_id="CVE-2023-2935" ref_url="https://www.suse.com/security/cve/CVE-2023-2935/" source="CVE"/>
		<reference ref_id="CVE-2023-3079" ref_url="https://www.suse.com/security/cve/CVE-2023-3079/" source="CVE"/>
		<reference ref_id="CVE-2023-3216" ref_url="https://www.suse.com/security/cve/CVE-2023-3216/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2721/">CVE-2023-2721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2721">CVE-2023-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2930/">CVE-2023-2930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2930">CVE-2023-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2931/">CVE-2023-2931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2931">CVE-2023-2931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2932/">CVE-2023-2932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2932">CVE-2023-2932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2933/">CVE-2023-2933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2933">CVE-2023-2933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2935/">CVE-2023-2935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2935">CVE-2023-2935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3079/">CVE-2023-3079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3216/">CVE-2023-3216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932458" comment="libQt5Pdf5-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932459" comment="libQt5PdfWidgets5-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932460" comment="libqt5-qtpdf-devel-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932461" comment="libqt5-qtpdf-examples-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932462" comment="libqt5-qtpdf-imports-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932463" comment="libqt5-qtpdf-private-headers-devel-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932464" comment="libqt5-qtwebengine-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932465" comment="libqt5-qtwebengine-devel-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932466" comment="libqt5-qtwebengine-examples-5.15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932467" comment="libqt5-qtwebengine-private-headers-devel-5.15.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251512" version="1" class="patch">
	<metadata>
		<title>frr-8.4-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3748" ref_url="https://www.suse.com/security/cve/CVE-2023-3748/" source="CVE"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3748/">CVE-2023-3748 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3748">CVE-2023-3748 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932468" comment="frr-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932469" comment="frr-devel-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932470" comment="libfrr0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932471" comment="libfrr_pb0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932472" comment="libfrrcares0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932473" comment="libfrrfpm_pb0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932474" comment="libfrrospfapiclient0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932475" comment="libfrrsnmp0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932476" comment="libfrrzmq0-8.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932477" comment="libmlag_pb0-8.4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251513" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.10.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.10.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932478" comment="libxml2-2-2.10.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932479" comment="libxml2-2-32bit-2.10.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932480" comment="libxml2-devel-2.10.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932481" comment="libxml2-devel-32bit-2.10.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932482" comment="libxml2-doc-2.10.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932483" comment="libxml2-tools-2.10.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251514" version="1" class="patch">
	<metadata>
		<title>python310-3.10.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932484" comment="python310-3.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932485" comment="python310-32bit-3.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932486" comment="python310-curses-3.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932487" comment="python310-dbm-3.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932488" comment="python310-idle-3.10.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932489" comment="python310-tk-3.10.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251515" version="1" class="patch">
	<metadata>
		<title>dpic-2023.02.01-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32420" ref_url="https://www.suse.com/security/cve/CVE-2021-32420/" source="CVE"/>
		<reference ref_id="CVE-2021-32421" ref_url="https://www.suse.com/security/cve/CVE-2021-32421/" source="CVE"/>
		<reference ref_id="CVE-2021-32422" ref_url="https://www.suse.com/security/cve/CVE-2021-32422/" source="CVE"/>
		<reference ref_id="CVE-2021-33388" ref_url="https://www.suse.com/security/cve/CVE-2021-33388/" source="CVE"/>
		<reference ref_id="CVE-2021-33390" ref_url="https://www.suse.com/security/cve/CVE-2021-33390/" source="CVE"/>
		<description>
These are all security issues fixed in the dpic-2023.02.01-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32420/">CVE-2021-32420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32420">CVE-2021-32420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32421/">CVE-2021-32421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32421">CVE-2021-32421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32422/">CVE-2021-32422 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32422">CVE-2021-32422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33388/">CVE-2021-33388 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33388">CVE-2021-33388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33390/">CVE-2021-33390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33390">CVE-2021-33390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932490" comment="dpic-2023.02.01-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932491" comment="dpic-doc-2023.02.01-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251516" version="1" class="patch">
	<metadata>
		<title>libmodsecurity3-3.0.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38285" ref_url="https://www.suse.com/security/cve/CVE-2023-38285/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodsecurity3-3.0.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38285/">CVE-2023-38285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38285">CVE-2023-38285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932492" comment="libmodsecurity3-3.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932493" comment="modsecurity-3.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932494" comment="modsecurity-devel-3.0.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251517" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932495" comment="libmozjs-102-0-102.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932496" comment="mozjs102-102.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932497" comment="mozjs102-devel-102.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251518" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932498" comment="libmozjs-115-0-115.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932499" comment="mozjs115-115.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932500" comment="mozjs115-devel-115.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251519" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41164" ref_url="https://www.suse.com/security/cve/CVE-2023-41164/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41164/">CVE-2023-41164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41164">CVE-2023-41164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932501" comment="python310-Django-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932502" comment="python311-Django-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932503" comment="python39-Django-4.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251520" version="1" class="patch">
	<metadata>
		<title>python310-configobj-5.0.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-configobj-5.0.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932504" comment="python310-configobj-5.0.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932505" comment="python311-configobj-5.0.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932506" comment="python39-configobj-5.0.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251521" version="1" class="patch">
	<metadata>
		<title>python310-impacket-0.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-impacket-0.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932507" comment="python310-impacket-0.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932508" comment="python311-impacket-0.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932509" comment="python39-impacket-0.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251522" version="1" class="patch">
	<metadata>
		<title>python38-3.8.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932510" comment="python38-3.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932511" comment="python38-curses-3.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932512" comment="python38-dbm-3.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932513" comment="python38-idle-3.8.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932514" comment="python38-tk-3.8.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251523" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932515" comment="MozillaThunderbird-115.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932516" comment="MozillaThunderbird-translations-common-115.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932517" comment="MozillaThunderbird-translations-other-115.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251524" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.25-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30534" ref_url="https://www.suse.com/security/cve/CVE-2023-30534/" source="CVE"/>
		<reference ref_id="CVE-2023-39357" ref_url="https://www.suse.com/security/cve/CVE-2023-39357/" source="CVE"/>
		<reference ref_id="CVE-2023-39358" ref_url="https://www.suse.com/security/cve/CVE-2023-39358/" source="CVE"/>
		<reference ref_id="CVE-2023-39359" ref_url="https://www.suse.com/security/cve/CVE-2023-39359/" source="CVE"/>
		<reference ref_id="CVE-2023-39360" ref_url="https://www.suse.com/security/cve/CVE-2023-39360/" source="CVE"/>
		<reference ref_id="CVE-2023-39361" ref_url="https://www.suse.com/security/cve/CVE-2023-39361/" source="CVE"/>
		<reference ref_id="CVE-2023-39362" ref_url="https://www.suse.com/security/cve/CVE-2023-39362/" source="CVE"/>
		<reference ref_id="CVE-2023-39364" ref_url="https://www.suse.com/security/cve/CVE-2023-39364/" source="CVE"/>
		<reference ref_id="CVE-2023-39365" ref_url="https://www.suse.com/security/cve/CVE-2023-39365/" source="CVE"/>
		<reference ref_id="CVE-2023-39366" ref_url="https://www.suse.com/security/cve/CVE-2023-39366/" source="CVE"/>
		<reference ref_id="CVE-2023-39510" ref_url="https://www.suse.com/security/cve/CVE-2023-39510/" source="CVE"/>
		<reference ref_id="CVE-2023-39511" ref_url="https://www.suse.com/security/cve/CVE-2023-39511/" source="CVE"/>
		<reference ref_id="CVE-2023-39512" ref_url="https://www.suse.com/security/cve/CVE-2023-39512/" source="CVE"/>
		<reference ref_id="CVE-2023-39513" ref_url="https://www.suse.com/security/cve/CVE-2023-39513/" source="CVE"/>
		<reference ref_id="CVE-2023-39514" ref_url="https://www.suse.com/security/cve/CVE-2023-39514/" source="CVE"/>
		<reference ref_id="CVE-2023-39515" ref_url="https://www.suse.com/security/cve/CVE-2023-39515/" source="CVE"/>
		<reference ref_id="CVE-2023-39516" ref_url="https://www.suse.com/security/cve/CVE-2023-39516/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.25-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30534/">CVE-2023-30534 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30534">CVE-2023-30534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39357/">CVE-2023-39357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39357">CVE-2023-39357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39358/">CVE-2023-39358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39358">CVE-2023-39358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39359/">CVE-2023-39359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39359">CVE-2023-39359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39360/">CVE-2023-39360 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39360">CVE-2023-39360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39361/">CVE-2023-39361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39361">CVE-2023-39361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39362/">CVE-2023-39362 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39362">CVE-2023-39362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39364/">CVE-2023-39364 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39364">CVE-2023-39364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39365/">CVE-2023-39365 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39365">CVE-2023-39365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39366/">CVE-2023-39366 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39366">CVE-2023-39366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39510/">CVE-2023-39510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39510">CVE-2023-39510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39511/">CVE-2023-39511 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39511">CVE-2023-39511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39512/">CVE-2023-39512 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39512">CVE-2023-39512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39513/">CVE-2023-39513 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39513">CVE-2023-39513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39514/">CVE-2023-39514 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39514">CVE-2023-39514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39515/">CVE-2023-39515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39515">CVE-2023-39515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39516/">CVE-2023-39516 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39516">CVE-2023-39516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932518" comment="cacti-1.2.25-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251525" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.179-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4761" ref_url="https://www.suse.com/security/cve/CVE-2023-4761/" source="CVE"/>
		<reference ref_id="CVE-2023-4762" ref_url="https://www.suse.com/security/cve/CVE-2023-4762/" source="CVE"/>
		<reference ref_id="CVE-2023-4763" ref_url="https://www.suse.com/security/cve/CVE-2023-4763/" source="CVE"/>
		<reference ref_id="CVE-2023-4764" ref_url="https://www.suse.com/security/cve/CVE-2023-4764/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.179-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4761/">CVE-2023-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4761">CVE-2023-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4762/">CVE-2023-4762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4762">CVE-2023-4762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4763/">CVE-2023-4763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4763">CVE-2023-4763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4764/">CVE-2023-4764 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4764">CVE-2023-4764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932519" comment="chromedriver-116.0.5845.179-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932520" comment="chromium-116.0.5845.179-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251526" version="1" class="patch">
	<metadata>
		<title>docker-24.0.5_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<reference ref_id="CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841/" source="CVE"/>
		<reference ref_id="CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-24.0.5_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932521" comment="docker-24.0.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932522" comment="docker-bash-completion-24.0.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932523" comment="docker-fish-completion-24.0.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932524" comment="docker-rootless-extras-24.0.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932525" comment="docker-zsh-completion-24.0.5_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251527" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_1-0-3.1.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3152" ref_url="https://www.suse.com/security/cve/CVE-2023-3152/" source="CVE"/>
		<reference ref_id="CVE-2023-3153" ref_url="https://www.suse.com/security/cve/CVE-2023-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_1-0-3.1.0-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3152/">CVE-2023-3152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3152">CVE-2023-3152 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3153/">CVE-2023-3153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3153">CVE-2023-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932526" comment="libopenvswitch-3_1-0-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932527" comment="libovn-23_03-0-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932528" comment="openvswitch-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932529" comment="openvswitch-devel-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932530" comment="openvswitch-doc-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932531" comment="openvswitch-ipsec-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932532" comment="openvswitch-pki-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932533" comment="openvswitch-test-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932534" comment="openvswitch-vtep-3.1.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932535" comment="ovn-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932536" comment="ovn-central-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932537" comment="ovn-devel-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932538" comment="ovn-doc-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932539" comment="ovn-docker-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932540" comment="ovn-host-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932541" comment="ovn-vtep-23.03.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932542" comment="python3-ovs-3.1.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251528" version="1" class="patch">
	<metadata>
		<title>python310-GitPython-3.1.34.1693646983.2a2ae77-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40590" ref_url="https://www.suse.com/security/cve/CVE-2023-40590/" source="CVE"/>
		<reference ref_id="CVE-2023-41040" ref_url="https://www.suse.com/security/cve/CVE-2023-41040/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-GitPython-3.1.34.1693646983.2a2ae77-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40590/">CVE-2023-40590 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40590">CVE-2023-40590 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41040/">CVE-2023-41040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41040">CVE-2023-41040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932543" comment="python310-GitPython-3.1.34.1693646983.2a2ae77-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932544" comment="python311-GitPython-3.1.34.1693646983.2a2ae77-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932545" comment="python39-GitPython-3.1.34.1693646983.2a2ae77-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251529" version="1" class="patch">
	<metadata>
		<title>python310-Pygments-2.16.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pygments-2.16.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">CVE-2021-20270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932546" comment="python310-Pygments-2.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932547" comment="python311-Pygments-2.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932548" comment="python39-Pygments-2.16.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251530" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.8.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21330" ref_url="https://www.suse.com/security/cve/CVE-2021-21330/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.8.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21330/">CVE-2021-21330 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21330">CVE-2021-21330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932549" comment="python310-aiohttp-3.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932550" comment="python311-aiohttp-3.8.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932551" comment="python39-aiohttp-3.8.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251531" version="1" class="patch">
	<metadata>
		<title>python-bottle-doc-0.12.25-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28473" ref_url="https://www.suse.com/security/cve/CVE-2020-28473/" source="CVE"/>
		<reference ref_id="CVE-2022-31799" ref_url="https://www.suse.com/security/cve/CVE-2022-31799/" source="CVE"/>
		<description>
These are all security issues fixed in the python-bottle-doc-0.12.25-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28473/">CVE-2020-28473 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28473">CVE-2020-28473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31799/">CVE-2022-31799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31799">CVE-2022-31799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932552" comment="python-bottle-doc-0.12.25-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932553" comment="python310-bottle-0.12.25-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932554" comment="python311-bottle-0.12.25-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932555" comment="python39-bottle-0.12.25-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251532" version="1" class="patch">
	<metadata>
		<title>python310-py-1.11.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-py-1.11.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42969">CVE-2022-42969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932556" comment="python310-py-1.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932557" comment="python311-py-1.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932558" comment="python39-py-1.11.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251533" version="1" class="patch">
	<metadata>
		<title>python310-urllib3-2.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3-2.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932559" comment="python310-urllib3-2.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932560" comment="python311-urllib3-2.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932561" comment="python39-urllib3-2.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251534" version="1" class="patch">
	<metadata>
		<title>python310-urllib3_1-1.26.16-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3_1-1.26.16-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932562" comment="python310-urllib3_1-1.26.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932563" comment="python311-urllib3_1-1.26.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932564" comment="python39-urllib3_1-1.26.16-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251535" version="1" class="patch">
	<metadata>
		<title>python310-wheel-0.41.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40898" ref_url="https://www.suse.com/security/cve/CVE-2022-40898/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-wheel-0.41.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40898/">CVE-2022-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40898">CVE-2022-40898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932565" comment="python310-wheel-0.41.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932566" comment="python311-wheel-0.41.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932567" comment="python39-wheel-0.41.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251536" version="1" class="patch">
	<metadata>
		<title>python311-3.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932568" comment="python311-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932569" comment="python311-32bit-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932570" comment="python311-curses-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932571" comment="python311-dbm-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932572" comment="python311-idle-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932573" comment="python311-tk-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932574" comment="python311-x86-64-v3-3.11.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251537" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932575" comment="go1.20-1.20.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932576" comment="go1.20-doc-1.20.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932577" comment="go1.20-libstd-1.20.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932578" comment="go1.20-race-1.20.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251538" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39320" ref_url="https://www.suse.com/security/cve/CVE-2023-39320/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39320/">CVE-2023-39320 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932579" comment="go1.21-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932580" comment="go1.21-doc-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932581" comment="go1.21-libstd-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932582" comment="go1.21-race-1.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251539" version="1" class="patch">
	<metadata>
		<title>python310-CairoSVG-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21236" ref_url="https://www.suse.com/security/cve/CVE-2021-21236/" source="CVE"/>
		<reference ref_id="CVE-2023-27586" ref_url="https://www.suse.com/security/cve/CVE-2023-27586/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-CairoSVG-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21236/">CVE-2021-21236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21236">CVE-2021-21236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27586/">CVE-2023-27586 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27586">CVE-2023-27586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932583" comment="python310-CairoSVG-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932584" comment="python311-CairoSVG-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932585" comment="python39-CairoSVG-2.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251540" version="1" class="patch">
	<metadata>
		<title>python39-3.9.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932586" comment="python39-3.9.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932587" comment="python39-32bit-3.9.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932588" comment="python39-curses-3.9.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932589" comment="python39-dbm-3.9.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932590" comment="python39-idle-3.9.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932591" comment="python39-tk-3.9.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251541" version="1" class="patch">
	<metadata>
		<title>python310-numpy-1.25.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41495" ref_url="https://www.suse.com/security/cve/CVE-2021-41495/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-numpy-1.25.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41495/">CVE-2021-41495 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41495">CVE-2021-41495 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41496">CVE-2021-41496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932592" comment="python310-numpy-1.25.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932593" comment="python310-numpy-devel-1.25.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932594" comment="python311-numpy-1.25.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932595" comment="python311-numpy-devel-1.25.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932596" comment="python39-numpy-1.25.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932597" comment="python39-numpy-devel-1.25.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251542" version="1" class="patch">
	<metadata>
		<title>libeconf-devel-0.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078/" source="CVE"/>
		<reference ref_id="CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079/" source="CVE"/>
		<description>
These are all security issues fixed in the libeconf-devel-0.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932598" comment="libeconf-devel-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932599" comment="libeconf-utils-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932600" comment="libeconf0-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932601" comment="libeconf0-32bit-0.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251543" version="1" class="patch">
	<metadata>
		<title>mutt-2.2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-2.2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932602" comment="mutt-2.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932603" comment="mutt-doc-2.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932604" comment="mutt-lang-2.2.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251544" version="1" class="patch">
	<metadata>
		<title>libmca_common_dstore1-3.2.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41915" ref_url="https://www.suse.com/security/cve/CVE-2023-41915/" source="CVE"/>
		<description>
These are all security issues fixed in the libmca_common_dstore1-3.2.3-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41915/">CVE-2023-41915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41915">CVE-2023-41915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932605" comment="libmca_common_dstore1-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932606" comment="libpmix2-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932607" comment="pmix-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932608" comment="pmix-devel-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932609" comment="pmix-headers-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932610" comment="pmix-mca-params-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932611" comment="pmix-plugin-munge-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932612" comment="pmix-plugins-3.2.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932613" comment="pmix-test-3.2.3-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251545" version="1" class="patch">
	<metadata>
		<title>python310-Brotli-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Brotli-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932614" comment="python310-Brotli-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932615" comment="python311-Brotli-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932616" comment="python39-Brotli-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251546" version="1" class="patch">
	<metadata>
		<title>velero-1.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932617" comment="velero-1.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932618" comment="velero-bash-completion-1.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932619" comment="velero-fish-completion-1.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932620" comment="velero-zsh-completion-1.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251547" version="1" class="patch">
	<metadata>
		<title>gvim-9.0.1894-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734/" source="CVE"/>
		<reference ref_id="CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735/" source="CVE"/>
		<reference ref_id="CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738/" source="CVE"/>
		<reference ref_id="CVE-2023-4751" ref_url="https://www.suse.com/security/cve/CVE-2023-4751/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.0.1894-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4751/">CVE-2023-4751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4751">CVE-2023-4751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932621" comment="gvim-9.0.1894-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932622" comment="vim-9.0.1894-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932623" comment="vim-data-9.0.1894-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932624" comment="vim-data-common-9.0.1894-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932625" comment="vim-small-9.0.1894-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932626" comment="xxd-9.0.1894-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251548" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-117.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-117.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932627" comment="MozillaFirefox-117.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932628" comment="MozillaFirefox-branding-upstream-117.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932629" comment="MozillaFirefox-devel-117.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932630" comment="MozillaFirefox-translations-common-117.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932631" comment="MozillaFirefox-translations-other-117.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251549" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932632" comment="MozillaThunderbird-115.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932633" comment="MozillaThunderbird-translations-common-115.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932634" comment="MozillaThunderbird-translations-other-115.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251550" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.187-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.187-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932635" comment="chromedriver-116.0.5845.187-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932636" comment="chromium-116.0.5845.187-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251551" version="1" class="patch">
	<metadata>
		<title>curl-8.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38039" ref_url="https://www.suse.com/security/cve/CVE-2023-38039/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38039/">CVE-2023-38039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932637" comment="curl-8.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932638" comment="libcurl-devel-8.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932639" comment="libcurl-devel-32bit-8.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932640" comment="libcurl4-8.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932641" comment="libcurl4-32bit-8.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251552" version="1" class="patch">
	<metadata>
		<title>libsharpyuv0-1.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the libsharpyuv0-1.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932642" comment="libsharpyuv0-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932643" comment="libsharpyuv0-32bit-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932644" comment="libwebp-devel-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932645" comment="libwebp-devel-32bit-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932646" comment="libwebp-tools-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932647" comment="libwebp7-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932648" comment="libwebp7-32bit-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932649" comment="libwebpdecoder3-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932650" comment="libwebpdecoder3-32bit-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932651" comment="libwebpdemux2-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932652" comment="libwebpdemux2-32bit-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932653" comment="libwebpmux3-1.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932654" comment="libwebpmux3-32bit-1.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251553" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-116.0.5845.179-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4427" ref_url="https://www.suse.com/security/cve/CVE-2023-4427/" source="CVE"/>
		<reference ref_id="CVE-2023-4428" ref_url="https://www.suse.com/security/cve/CVE-2023-4428/" source="CVE"/>
		<reference ref_id="CVE-2023-4429" ref_url="https://www.suse.com/security/cve/CVE-2023-4429/" source="CVE"/>
		<reference ref_id="CVE-2023-4430" ref_url="https://www.suse.com/security/cve/CVE-2023-4430/" source="CVE"/>
		<reference ref_id="CVE-2023-4431" ref_url="https://www.suse.com/security/cve/CVE-2023-4431/" source="CVE"/>
		<reference ref_id="CVE-2023-4572" ref_url="https://www.suse.com/security/cve/CVE-2023-4572/" source="CVE"/>
		<reference ref_id="CVE-2023-4761" ref_url="https://www.suse.com/security/cve/CVE-2023-4761/" source="CVE"/>
		<reference ref_id="CVE-2023-4762" ref_url="https://www.suse.com/security/cve/CVE-2023-4762/" source="CVE"/>
		<reference ref_id="CVE-2023-4763" ref_url="https://www.suse.com/security/cve/CVE-2023-4763/" source="CVE"/>
		<reference ref_id="CVE-2023-4764" ref_url="https://www.suse.com/security/cve/CVE-2023-4764/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-116.0.5845.179-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4427/">CVE-2023-4427 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4427">CVE-2023-4427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4428/">CVE-2023-4428 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4428">CVE-2023-4428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4429/">CVE-2023-4429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4429">CVE-2023-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4430/">CVE-2023-4430 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4430">CVE-2023-4430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4431/">CVE-2023-4431 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4431">CVE-2023-4431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4572/">CVE-2023-4572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4572">CVE-2023-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4761/">CVE-2023-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4761">CVE-2023-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4762/">CVE-2023-4762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4762">CVE-2023-4762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4763/">CVE-2023-4763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4763">CVE-2023-4763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4764/">CVE-2023-4764 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4764">CVE-2023-4764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932655" comment="ungoogled-chromium-116.0.5845.179-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932656" comment="ungoogled-chromium-chromedriver-116.0.5845.179-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251554" version="1" class="patch">
	<metadata>
		<title>cpp12-12.3.0+git1204-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp12-12.3.0+git1204-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932657" comment="cpp12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932658" comment="gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932659" comment="gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932660" comment="gcc12-PIE-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932661" comment="gcc12-ada-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932662" comment="gcc12-ada-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932663" comment="gcc12-c++-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932664" comment="gcc12-c++-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932665" comment="gcc12-d-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932666" comment="gcc12-d-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932667" comment="gcc12-devel-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932668" comment="gcc12-fortran-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932669" comment="gcc12-fortran-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932670" comment="gcc12-go-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932671" comment="gcc12-go-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932672" comment="gcc12-info-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932673" comment="gcc12-locale-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932674" comment="gcc12-obj-c++-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932675" comment="gcc12-obj-c++-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932676" comment="gcc12-objc-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932677" comment="gcc12-objc-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932678" comment="libada12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932679" comment="libada12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932680" comment="libasan8-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932681" comment="libasan8-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932682" comment="libatomic1-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932683" comment="libatomic1-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932684" comment="libgcc_s1-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932685" comment="libgcc_s1-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932686" comment="libgccjit0-devel-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932687" comment="libgccjit0-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932688" comment="libgdruntime3-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932689" comment="libgdruntime3-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932690" comment="libgfortran5-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932691" comment="libgfortran5-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932692" comment="libgo21-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932693" comment="libgo21-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932694" comment="libgomp1-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932695" comment="libgomp1-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932696" comment="libgphobos3-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932697" comment="libgphobos3-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932698" comment="libitm1-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932699" comment="libitm1-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932700" comment="liblsan0-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932701" comment="libobjc4-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932702" comment="libobjc4-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932703" comment="libquadmath0-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932704" comment="libquadmath0-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932705" comment="libstdc++6-devel-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932706" comment="libstdc++6-devel-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932707" comment="libstdc++6-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932708" comment="libstdc++6-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932709" comment="libstdc++6-gcc12-locale-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932710" comment="libstdc++6-pp-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932711" comment="libstdc++6-pp-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932712" comment="libtsan2-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932713" comment="libubsan1-gcc12-12.3.0+git1204-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932714" comment="libubsan1-gcc12-32bit-12.3.0+git1204-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251555" version="1" class="patch">
	<metadata>
		<title>cpp13-13.2.1+git7813-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp13-13.2.1+git7813-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932715" comment="cpp13-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932716" comment="gcc13-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932717" comment="gcc13-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932718" comment="gcc13-PIE-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932719" comment="gcc13-ada-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932720" comment="gcc13-ada-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932721" comment="gcc13-c++-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932722" comment="gcc13-c++-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932723" comment="gcc13-d-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932724" comment="gcc13-d-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932725" comment="gcc13-devel-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932726" comment="gcc13-fortran-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932727" comment="gcc13-fortran-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932728" comment="gcc13-go-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932729" comment="gcc13-go-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932730" comment="gcc13-info-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932731" comment="gcc13-locale-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932732" comment="gcc13-m2-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932733" comment="gcc13-m2-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932734" comment="gcc13-obj-c++-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932735" comment="gcc13-obj-c++-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932736" comment="gcc13-objc-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932737" comment="gcc13-objc-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932738" comment="libada13-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932739" comment="libada13-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932740" comment="libasan8-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932741" comment="libasan8-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932742" comment="libatomic1-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932743" comment="libatomic1-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932744" comment="libgcc_s1-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932745" comment="libgcc_s1-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932746" comment="libgccjit0-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932747" comment="libgccjit0-devel-gcc13-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932748" comment="libgdruntime4-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932749" comment="libgdruntime4-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932750" comment="libgfortran5-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932751" comment="libgfortran5-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932752" comment="libgo22-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932753" comment="libgo22-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932754" comment="libgomp1-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932755" comment="libgomp1-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932756" comment="libgphobos4-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932757" comment="libgphobos4-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932758" comment="libhwasan0-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932759" comment="libitm1-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932760" comment="libitm1-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932761" comment="liblsan0-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932762" comment="libm2cor18-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932763" comment="libm2cor18-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932764" comment="libm2iso18-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932765" comment="libm2iso18-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932766" comment="libm2log18-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932767" comment="libm2log18-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932768" comment="libm2min18-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932769" comment="libm2min18-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932770" comment="libm2pim18-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932771" comment="libm2pim18-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932772" comment="libobjc4-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932773" comment="libobjc4-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932774" comment="libquadmath0-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932775" comment="libquadmath0-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932776" comment="libstdc++6-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932777" comment="libstdc++6-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932778" comment="libstdc++6-devel-gcc13-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932779" comment="libstdc++6-devel-gcc13-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932780" comment="libstdc++6-locale-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932781" comment="libstdc++6-pp-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932782" comment="libstdc++6-pp-32bit-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932783" comment="libtsan2-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932784" comment="libubsan1-13.2.1+git7813-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932785" comment="libubsan1-32bit-13.2.1+git7813-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251556" version="1" class="patch">
	<metadata>
		<title>cpp7-7.5.0+r278197-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp7-7.5.0+r278197-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932786" comment="cpp7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932787" comment="gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932788" comment="gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932789" comment="gcc7-ada-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932790" comment="gcc7-ada-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932791" comment="gcc7-c++-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932792" comment="gcc7-c++-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932793" comment="gcc7-devel-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932794" comment="gcc7-fortran-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932795" comment="gcc7-fortran-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932796" comment="gcc7-go-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932797" comment="gcc7-go-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932798" comment="gcc7-info-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932799" comment="gcc7-locale-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932800" comment="gcc7-obj-c++-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932801" comment="gcc7-obj-c++-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932802" comment="gcc7-objc-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932803" comment="gcc7-objc-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932804" comment="libada7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932805" comment="libada7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932806" comment="libasan4-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932807" comment="libasan4-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932808" comment="libatomic1-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932809" comment="libatomic1-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932810" comment="libcilkrts5-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932811" comment="libcilkrts5-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932812" comment="libgcc_s1-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932813" comment="libgcc_s1-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932814" comment="libgfortran4-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932815" comment="libgfortran4-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932816" comment="libgo11-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932817" comment="libgo11-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932818" comment="libgomp1-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932819" comment="libgomp1-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932820" comment="libitm1-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932821" comment="libitm1-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932822" comment="liblsan0-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932823" comment="libmpx2-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932824" comment="libmpx2-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932825" comment="libmpxwrappers2-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932826" comment="libmpxwrappers2-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932827" comment="libobjc4-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932828" comment="libobjc4-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932829" comment="libquadmath0-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932830" comment="libquadmath0-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932831" comment="libstdc++6-devel-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932832" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932833" comment="libstdc++6-gcc7-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932834" comment="libstdc++6-gcc7-32bit-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932835" comment="libstdc++6-gcc7-locale-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932836" comment="libtsan0-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932837" comment="libubsan0-7.5.0+r278197-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932838" comment="libubsan0-32bit-7.5.0+r278197-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251557" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-38.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932839" comment="python-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932840" comment="python-32bit-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932841" comment="python-curses-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932842" comment="python-demo-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932843" comment="python-gdbm-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932844" comment="python-idle-2.7.18-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932845" comment="python-tk-2.7.18-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251558" version="1" class="patch">
	<metadata>
		<title>python310-certifi-2023.7.22-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-certifi-2023.7.22-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932846" comment="python310-certifi-2023.7.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932847" comment="python311-certifi-2023.7.22-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932848" comment="python39-certifi-2023.7.22-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251559" version="1" class="patch">
	<metadata>
		<title>frr-8.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932849" comment="frr-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932850" comment="frr-devel-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932851" comment="libfrr0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932852" comment="libfrr_pb0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932853" comment="libfrrcares0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932854" comment="libfrrfpm_pb0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932855" comment="libfrrospfapiclient0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932856" comment="libfrrsnmp0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932857" comment="libfrrzmq0-8.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932858" comment="libmlag_pb0-8.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251560" version="1" class="patch">
	<metadata>
		<title>sonobuoy-0.56.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
These are all security issues fixed in the sonobuoy-0.56.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932859" comment="sonobuoy-0.56.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932860" comment="sonobuoy-bash-completion-0.56.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932861" comment="sonobuoy-fish-completion-0.56.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932862" comment="sonobuoy-zsh-completion-0.56.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251561" version="1" class="patch">
	<metadata>
		<title>xterm-384-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40359" ref_url="https://www.suse.com/security/cve/CVE-2023-40359/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-384-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40359/">CVE-2023-40359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40359">CVE-2023-40359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932863" comment="xterm-384-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932864" comment="xterm-bin-384-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932865" comment="xterm-resize-384-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251562" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1w-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4807" ref_url="https://www.suse.com/security/cve/CVE-2023-4807/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1w-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4807/">CVE-2023-4807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4807">CVE-2023-4807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932866" comment="libopenssl-1_1-devel-1.1.1w-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932867" comment="libopenssl-1_1-devel-32bit-1.1.1w-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932868" comment="libopenssl1_1-1.1.1w-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932869" comment="libopenssl1_1-32bit-1.1.1w-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932870" comment="openssl-1_1-1.1.1w-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932871" comment="openssl-1_1-doc-1.1.1w-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251563" version="1" class="patch">
	<metadata>
		<title>chromedriver-116.0.5845.187-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4900" ref_url="https://www.suse.com/security/cve/CVE-2023-4900/" source="CVE"/>
		<reference ref_id="CVE-2023-4901" ref_url="https://www.suse.com/security/cve/CVE-2023-4901/" source="CVE"/>
		<reference ref_id="CVE-2023-4902" ref_url="https://www.suse.com/security/cve/CVE-2023-4902/" source="CVE"/>
		<reference ref_id="CVE-2023-4903" ref_url="https://www.suse.com/security/cve/CVE-2023-4903/" source="CVE"/>
		<reference ref_id="CVE-2023-4904" ref_url="https://www.suse.com/security/cve/CVE-2023-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-4905" ref_url="https://www.suse.com/security/cve/CVE-2023-4905/" source="CVE"/>
		<reference ref_id="CVE-2023-4906" ref_url="https://www.suse.com/security/cve/CVE-2023-4906/" source="CVE"/>
		<reference ref_id="CVE-2023-4907" ref_url="https://www.suse.com/security/cve/CVE-2023-4907/" source="CVE"/>
		<reference ref_id="CVE-2023-4908" ref_url="https://www.suse.com/security/cve/CVE-2023-4908/" source="CVE"/>
		<reference ref_id="CVE-2023-4909" ref_url="https://www.suse.com/security/cve/CVE-2023-4909/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-116.0.5845.187-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4900/">CVE-2023-4900 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4900">CVE-2023-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4901/">CVE-2023-4901 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4901">CVE-2023-4901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4902/">CVE-2023-4902 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4902">CVE-2023-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4903/">CVE-2023-4903 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4903">CVE-2023-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4904/">CVE-2023-4904 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4904">CVE-2023-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4905/">CVE-2023-4905 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4905">CVE-2023-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4906/">CVE-2023-4906 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4906">CVE-2023-4906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4907/">CVE-2023-4907 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4907">CVE-2023-4907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4908/">CVE-2023-4908 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4908">CVE-2023-4908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4909/">CVE-2023-4909 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4909">CVE-2023-4909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932635" comment="chromedriver-116.0.5845.187-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932636" comment="chromium-116.0.5845.187-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251564" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932872" comment="postgresql15-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932873" comment="postgresql15-contrib-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932874" comment="postgresql15-devel-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932875" comment="postgresql15-docs-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932876" comment="postgresql15-llvmjit-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932877" comment="postgresql15-llvmjit-devel-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932878" comment="postgresql15-plperl-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932879" comment="postgresql15-plpython-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932880" comment="postgresql15-pltcl-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932881" comment="postgresql15-server-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932882" comment="postgresql15-server-devel-15.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932883" comment="postgresql15-test-15.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251565" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-116.0.5845.187-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4900" ref_url="https://www.suse.com/security/cve/CVE-2023-4900/" source="CVE"/>
		<reference ref_id="CVE-2023-4901" ref_url="https://www.suse.com/security/cve/CVE-2023-4901/" source="CVE"/>
		<reference ref_id="CVE-2023-4902" ref_url="https://www.suse.com/security/cve/CVE-2023-4902/" source="CVE"/>
		<reference ref_id="CVE-2023-4903" ref_url="https://www.suse.com/security/cve/CVE-2023-4903/" source="CVE"/>
		<reference ref_id="CVE-2023-4904" ref_url="https://www.suse.com/security/cve/CVE-2023-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-4905" ref_url="https://www.suse.com/security/cve/CVE-2023-4905/" source="CVE"/>
		<reference ref_id="CVE-2023-4906" ref_url="https://www.suse.com/security/cve/CVE-2023-4906/" source="CVE"/>
		<reference ref_id="CVE-2023-4907" ref_url="https://www.suse.com/security/cve/CVE-2023-4907/" source="CVE"/>
		<reference ref_id="CVE-2023-4908" ref_url="https://www.suse.com/security/cve/CVE-2023-4908/" source="CVE"/>
		<reference ref_id="CVE-2023-4909" ref_url="https://www.suse.com/security/cve/CVE-2023-4909/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-116.0.5845.187-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4900/">CVE-2023-4900 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4900">CVE-2023-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4901/">CVE-2023-4901 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4901">CVE-2023-4901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4902/">CVE-2023-4902 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4902">CVE-2023-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4903/">CVE-2023-4903 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4903">CVE-2023-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4904/">CVE-2023-4904 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4904">CVE-2023-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4905/">CVE-2023-4905 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4905">CVE-2023-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4906/">CVE-2023-4906 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4906">CVE-2023-4906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4907/">CVE-2023-4907 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4907">CVE-2023-4907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4908/">CVE-2023-4908 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4908">CVE-2023-4908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4909/">CVE-2023-4909 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4909">CVE-2023-4909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932884" comment="ungoogled-chromium-116.0.5845.187-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932885" comment="ungoogled-chromium-chromedriver-116.0.5845.187-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251566" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932887" comment="kernel-macros-6.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932888" comment="kernel-source-6.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932889" comment="kernel-source-vanilla-6.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251567" version="1" class="patch">
	<metadata>
		<title>ghc-pandoc-3.1.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38745" ref_url="https://www.suse.com/security/cve/CVE-2023-38745/" source="CVE"/>
		<description>
These are all security issues fixed in the ghc-pandoc-3.1.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38745/">CVE-2023-38745 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38745">CVE-2023-38745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932890" comment="ghc-pandoc-3.1.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932891" comment="ghc-pandoc-devel-3.1.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932892" comment="ghc-pandoc-doc-3.1.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932893" comment="ghc-pandoc-prof-3.1.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251568" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.56.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.56.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932894" comment="ghostscript-9.56.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932895" comment="ghostscript-devel-9.56.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932896" comment="ghostscript-x11-9.56.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251569" version="1" class="patch">
	<metadata>
		<title>python312-3.12.0rc3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.0rc3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932897" comment="python312-3.12.0rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932898" comment="python312-curses-3.12.0rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932899" comment="python312-dbm-3.12.0rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932900" comment="python312-idle-3.12.0rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932901" comment="python312-tk-3.12.0rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932902" comment="python312-x86-64-v3-3.12.0rc3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251570" version="1" class="patch">
	<metadata>
		<title>bind-9.18.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<reference ref_id="CVE-2023-4236" ref_url="https://www.suse.com/security/cve/CVE-2023-4236/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4236/">CVE-2023-4236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4236">CVE-2023-4236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932903" comment="bind-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932904" comment="bind-doc-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932905" comment="bind-modules-bdbhpt-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932906" comment="bind-modules-generic-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932907" comment="bind-modules-ldap-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932908" comment="bind-modules-mysql-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932909" comment="bind-modules-perl-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932910" comment="bind-modules-sqlite3-9.18.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932911" comment="bind-utils-9.18.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251571" version="1" class="patch">
	<metadata>
		<title>cups-2.4.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<reference ref_id="CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.2-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932912" comment="cups-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932913" comment="cups-client-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932914" comment="cups-config-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932915" comment="cups-ddk-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932916" comment="cups-devel-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932917" comment="cups-devel-32bit-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932918" comment="libcups2-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932919" comment="libcups2-32bit-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932920" comment="libcupsimage2-2.4.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932921" comment="libcupsimage2-32bit-2.4.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251572" version="1" class="patch">
	<metadata>
		<title>gnome-extensions-45.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43090" ref_url="https://www.suse.com/security/cve/CVE-2023-43090/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-extensions-45.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43090/">CVE-2023-43090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43090">CVE-2023-43090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932922" comment="gnome-extensions-45.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932923" comment="gnome-shell-45.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932924" comment="gnome-shell-calendar-45.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932925" comment="gnome-shell-devel-45.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932926" comment="gnome-shell-lang-45.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251573" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.21.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-22628" ref_url="https://www.suse.com/security/cve/CVE-2020-22628/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.21.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22628/">CVE-2020-22628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22628">CVE-2020-22628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932927" comment="libraw-devel-0.21.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932928" comment="libraw-devel-static-0.21.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932929" comment="libraw-tools-0.21.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932930" comment="libraw23-0.21.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932931" comment="libraw23-32bit-0.21.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251574" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48565" ref_url="https://www.suse.com/security/cve/CVE-2022-48565/" source="CVE"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-39.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48565/">CVE-2022-48565 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932932" comment="python-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932933" comment="python-32bit-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932934" comment="python-curses-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932935" comment="python-demo-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932936" comment="python-gdbm-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932937" comment="python-idle-2.7.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932938" comment="python-tk-2.7.18-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251575" version="1" class="patch">
	<metadata>
		<title>python-gevent-doc-23.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<description>
These are all security issues fixed in the python-gevent-doc-23.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932939" comment="python-gevent-doc-23.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932940" comment="python310-gevent-23.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932941" comment="python311-gevent-23.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932942" comment="python39-gevent-23.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251576" version="1" class="patch">
	<metadata>
		<title>seamonkey-2.53.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the seamonkey-2.53.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932943" comment="seamonkey-2.53.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932944" comment="seamonkey-dom-inspector-2.53.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932945" comment="seamonkey-irc-2.53.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251577" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932946" comment="tomcat-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932947" comment="tomcat-admin-webapps-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932948" comment="tomcat-docs-webapp-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932949" comment="tomcat-el-3_0-api-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932950" comment="tomcat-embed-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932951" comment="tomcat-javadoc-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932952" comment="tomcat-jsp-2_3-api-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932953" comment="tomcat-jsvc-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932954" comment="tomcat-lib-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932955" comment="tomcat-servlet-4_0-api-9.0.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932956" comment="tomcat-webapps-9.0.80-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251578" version="1" class="patch">
	<metadata>
		<title>xen-4.17.2_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.17.2_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932957" comment="xen-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932958" comment="xen-devel-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932959" comment="xen-doc-html-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932960" comment="xen-libs-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932961" comment="xen-tools-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932962" comment="xen-tools-domU-4.17.2_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932963" comment="xen-tools-xendomains-wait-disk-4.17.2_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251579" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-25.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4763" ref_url="https://www.suse.com/security/cve/CVE-2023-4763/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-25.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4763/">CVE-2023-4763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4763">CVE-2023-4763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932964" comment="nodejs-electron-25.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932965" comment="nodejs-electron-devel-25.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932966" comment="nodejs-electron-doc-25.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251580" version="1" class="patch">
	<metadata>
		<title>apache-commons-configuration2-2.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33980" ref_url="https://www.suse.com/security/cve/CVE-2022-33980/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-configuration2-2.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33980/">CVE-2022-33980 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33980">CVE-2022-33980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932967" comment="apache-commons-configuration2-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932968" comment="apache-commons-configuration2-javadoc-2.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251581" version="1" class="patch">
	<metadata>
		<title>python310-jupyter-server-2.7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39968" ref_url="https://www.suse.com/security/cve/CVE-2023-39968/" source="CVE"/>
		<reference ref_id="CVE-2023-40170" ref_url="https://www.suse.com/security/cve/CVE-2023-40170/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jupyter-server-2.7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39968/">CVE-2023-39968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39968">CVE-2023-39968 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40170/">CVE-2023-40170 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40170">CVE-2023-40170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932969" comment="python310-jupyter-server-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932970" comment="python310-jupyter-server-test-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932971" comment="python311-jupyter-server-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932972" comment="python311-jupyter-server-test-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932973" comment="python39-jupyter-server-2.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932974" comment="python39-jupyter-server-test-2.7.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251582" version="1" class="patch">
	<metadata>
		<title>python311-3.11.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932975" comment="python311-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932976" comment="python311-32bit-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932977" comment="python311-curses-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932978" comment="python311-dbm-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932979" comment="python311-idle-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932980" comment="python311-tk-3.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932981" comment="python311-x86-64-v3-3.11.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251583" version="1" class="patch">
	<metadata>
		<title>cargo1.72-1.72.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40030" ref_url="https://www.suse.com/security/cve/CVE-2023-40030/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.72-1.72.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40030/">CVE-2023-40030 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40030">CVE-2023-40030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932982" comment="cargo1.72-1.72.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932983" comment="rust1.72-1.72.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251584" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4219" ref_url="https://www.suse.com/security/cve/CVE-2021-4219/" source="CVE"/>
		<reference ref_id="CVE-2022-0284" ref_url="https://www.suse.com/security/cve/CVE-2022-0284/" source="CVE"/>
		<reference ref_id="CVE-2022-1114" ref_url="https://www.suse.com/security/cve/CVE-2022-1114/" source="CVE"/>
		<reference ref_id="CVE-2022-1115" ref_url="https://www.suse.com/security/cve/CVE-2022-1115/" source="CVE"/>
		<reference ref_id="CVE-2022-2719" ref_url="https://www.suse.com/security/cve/CVE-2022-2719/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="CVE-2022-3213" ref_url="https://www.suse.com/security/cve/CVE-2022-3213/" source="CVE"/>
		<reference ref_id="CVE-2022-32545" ref_url="https://www.suse.com/security/cve/CVE-2022-32545/" source="CVE"/>
		<reference ref_id="CVE-2022-32546" ref_url="https://www.suse.com/security/cve/CVE-2022-32546/" source="CVE"/>
		<reference ref_id="CVE-2022-32547" ref_url="https://www.suse.com/security/cve/CVE-2022-32547/" source="CVE"/>
		<reference ref_id="CVE-2022-44267" ref_url="https://www.suse.com/security/cve/CVE-2022-44267/" source="CVE"/>
		<reference ref_id="CVE-2022-44268" ref_url="https://www.suse.com/security/cve/CVE-2022-44268/" source="CVE"/>
		<reference ref_id="CVE-2023-1289" ref_url="https://www.suse.com/security/cve/CVE-2023-1289/" source="CVE"/>
		<reference ref_id="CVE-2023-34151" ref_url="https://www.suse.com/security/cve/CVE-2023-34151/" source="CVE"/>
		<reference ref_id="CVE-2023-34153" ref_url="https://www.suse.com/security/cve/CVE-2023-34153/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4219/">CVE-2021-4219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4219">CVE-2021-4219 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0284/">CVE-2022-0284 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0284">CVE-2022-0284 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1114/">CVE-2022-1114 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1114">CVE-2022-1114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1115/">CVE-2022-1115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1115">CVE-2022-1115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2719/">CVE-2022-2719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2719">CVE-2022-2719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3213/">CVE-2022-3213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3213">CVE-2022-3213 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32545/">CVE-2022-32545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32545">CVE-2022-32545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32546/">CVE-2022-32546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32546">CVE-2022-32546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32547/">CVE-2022-32547 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32547">CVE-2022-32547 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44267/">CVE-2022-44267 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44267">CVE-2022-44267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-44268/">CVE-2022-44268 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44268">CVE-2022-44268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1289/">CVE-2023-1289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1289">CVE-2023-1289 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34151/">CVE-2023-34151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34151">CVE-2023-34151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34153/">CVE-2023-34153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34153">CVE-2023-34153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009932984" comment="ImageMagick-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932985" comment="ImageMagick-config-7-SUSE-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932986" comment="ImageMagick-config-7-upstream-limited-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932987" comment="ImageMagick-config-7-upstream-open-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932988" comment="ImageMagick-config-7-upstream-secure-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932989" comment="ImageMagick-config-7-upstream-websafe-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932990" comment="ImageMagick-devel-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932991" comment="ImageMagick-devel-32bit-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932992" comment="ImageMagick-doc-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932993" comment="ImageMagick-extra-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932994" comment="libMagick++-7_Q16HDRI5-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932995" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932996" comment="libMagick++-devel-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932997" comment="libMagick++-devel-32bit-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932998" comment="libMagickCore-7_Q16HDRI10-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009932999" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933000" comment="libMagickWand-7_Q16HDRI10-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933001" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933002" comment="perl-PerlMagick-7.1.1.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251585" version="1" class="patch">
	<metadata>
		<title>dlt-daemon-2.18.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26257" ref_url="https://www.suse.com/security/cve/CVE-2023-26257/" source="CVE"/>
		<description>
These are all security issues fixed in the dlt-daemon-2.18.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26257/">CVE-2023-26257 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26257">CVE-2023-26257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933003" comment="dlt-daemon-2.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933004" comment="dlt-daemon-devel-2.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933005" comment="dlt-examples-2.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933006" comment="dlt-tools-2.18.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933007" comment="libdlt2-2.18.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251586" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.43-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.43-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933008" comment="element-desktop-1.11.43-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251587" version="1" class="patch">
	<metadata>
		<title>libmozjs-102-0-102.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-102-0-102.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933009" comment="libmozjs-102-0-102.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933010" comment="mozjs102-102.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933011" comment="mozjs102-devel-102.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251588" version="1" class="patch">
	<metadata>
		<title>php8-8.2.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.2.10-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933012" comment="php8-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933013" comment="php8-bcmath-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933014" comment="php8-bz2-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933015" comment="php8-calendar-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933016" comment="php8-cli-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933017" comment="php8-ctype-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933018" comment="php8-curl-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933019" comment="php8-dba-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933020" comment="php8-devel-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933021" comment="php8-dom-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933022" comment="php8-enchant-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933023" comment="php8-exif-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933024" comment="php8-ffi-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933025" comment="php8-fileinfo-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933026" comment="php8-ftp-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933027" comment="php8-gd-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933028" comment="php8-gettext-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933029" comment="php8-gmp-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933030" comment="php8-iconv-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933031" comment="php8-intl-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933032" comment="php8-ldap-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933033" comment="php8-mbstring-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933034" comment="php8-mysql-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933035" comment="php8-odbc-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933036" comment="php8-opcache-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933037" comment="php8-openssl-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933038" comment="php8-pcntl-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933039" comment="php8-pdo-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933040" comment="php8-pgsql-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933041" comment="php8-phar-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933042" comment="php8-posix-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933043" comment="php8-readline-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933044" comment="php8-shmop-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933045" comment="php8-snmp-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933046" comment="php8-soap-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933047" comment="php8-sockets-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933048" comment="php8-sodium-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933049" comment="php8-sqlite-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933050" comment="php8-sysvmsg-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933051" comment="php8-sysvsem-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933052" comment="php8-sysvshm-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933053" comment="php8-tidy-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933054" comment="php8-tokenizer-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933055" comment="php8-xmlreader-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933056" comment="php8-xmlwriter-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933057" comment="php8-xsl-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933058" comment="php8-zip-8.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933059" comment="php8-zlib-8.2.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251589" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933060" comment="MozillaThunderbird-115.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933061" comment="MozillaThunderbird-translations-common-115.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933062" comment="MozillaThunderbird-translations-other-115.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251590" version="1" class="patch">
	<metadata>
		<title>chromedriver-117.0.5938.132-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5186" ref_url="https://www.suse.com/security/cve/CVE-2023-5186/" source="CVE"/>
		<reference ref_id="CVE-2023-5187" ref_url="https://www.suse.com/security/cve/CVE-2023-5187/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-117.0.5938.132-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5186/">CVE-2023-5186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5186">CVE-2023-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5187/">CVE-2023-5187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5187">CVE-2023-5187 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933063" comment="chromedriver-117.0.5938.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933064" comment="chromium-117.0.5938.132-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251591" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.93.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41335" ref_url="https://www.suse.com/security/cve/CVE-2023-41335/" source="CVE"/>
		<reference ref_id="CVE-2023-42453" ref_url="https://www.suse.com/security/cve/CVE-2023-42453/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.93.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-41335/">CVE-2023-41335 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41335">CVE-2023-41335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42453/">CVE-2023-42453 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42453">CVE-2023-42453 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933065" comment="matrix-synapse-1.93.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251592" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933066" comment="libmozjs-115-0-115.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933067" comment="mozjs115-115.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933068" comment="mozjs115-devel-115.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251593" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-118.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5170" ref_url="https://www.suse.com/security/cve/CVE-2023-5170/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5172" ref_url="https://www.suse.com/security/cve/CVE-2023-5172/" source="CVE"/>
		<reference ref_id="CVE-2023-5173" ref_url="https://www.suse.com/security/cve/CVE-2023-5173/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5175" ref_url="https://www.suse.com/security/cve/CVE-2023-5175/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-118.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5170/">CVE-2023-5170 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5170">CVE-2023-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5172/">CVE-2023-5172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5172">CVE-2023-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5173/">CVE-2023-5173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5173">CVE-2023-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5175/">CVE-2023-5175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5175">CVE-2023-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933069" comment="MozillaFirefox-118.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933070" comment="MozillaFirefox-branding-upstream-118.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933071" comment="MozillaFirefox-devel-118.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933072" comment="MozillaFirefox-translations-common-118.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933073" comment="MozillaFirefox-translations-other-118.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251594" version="1" class="patch">
	<metadata>
		<title>glibc-2.38-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4527" ref_url="https://www.suse.com/security/cve/CVE-2023-4527/" source="CVE"/>
		<reference ref_id="CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.38-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4527/">CVE-2023-4527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933074" comment="glibc-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933075" comment="glibc-devel-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933076" comment="glibc-devel-static-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933077" comment="glibc-extra-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933078" comment="glibc-html-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933079" comment="glibc-i18ndata-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933080" comment="glibc-info-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933081" comment="glibc-lang-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933082" comment="glibc-locale-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933083" comment="glibc-locale-base-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933084" comment="glibc-profile-2.38-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933085" comment="nscd-2.38-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251595" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933086" comment="libvpx-devel-1.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933087" comment="libvpx8-1.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933088" comment="libvpx8-32bit-1.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933089" comment="vpx-tools-1.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251596" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4807" ref_url="https://www.suse.com/security/cve/CVE-2023-4807/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4807/">CVE-2023-4807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4807">CVE-2023-4807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933090" comment="libopenssl-3-devel-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933091" comment="libopenssl-3-devel-32bit-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933092" comment="libopenssl3-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933093" comment="libopenssl3-32bit-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933094" comment="libopenssl3-x86-64-v3-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933095" comment="openssl-3-3.1.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933096" comment="openssl-3-doc-3.1.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251597" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-117.0.5938.132-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5186" ref_url="https://www.suse.com/security/cve/CVE-2023-5186/" source="CVE"/>
		<reference ref_id="CVE-2023-5187" ref_url="https://www.suse.com/security/cve/CVE-2023-5187/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-117.0.5938.132-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5186/">CVE-2023-5186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5186">CVE-2023-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5187/">CVE-2023-5187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5187">CVE-2023-5187 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933097" comment="ungoogled-chromium-117.0.5938.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933098" comment="ungoogled-chromium-chromedriver-117.0.5938.132-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251598" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933099" comment="MozillaThunderbird-115.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933100" comment="MozillaThunderbird-translations-common-115.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933101" comment="MozillaThunderbird-translations-other-115.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251599" version="1" class="patch">
	<metadata>
		<title>libnbd-1.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5215" ref_url="https://www.suse.com/security/cve/CVE-2023-5215/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5215/">CVE-2023-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5215">CVE-2023-5215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933102" comment="libnbd-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933103" comment="libnbd-bash-completion-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933104" comment="libnbd-devel-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933105" comment="libnbd0-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933106" comment="nbdfuse-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933107" comment="python3-libnbd-1.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251600" version="1" class="patch">
	<metadata>
		<title>mutt-2.2.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-2.2.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933108" comment="mutt-2.2.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933109" comment="mutt-doc-2.2.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933110" comment="mutt-lang-2.2.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251601" version="1" class="patch">
	<metadata>
		<title>python310-mpmath-1.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29063" ref_url="https://www.suse.com/security/cve/CVE-2021-29063/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mpmath-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29063/">CVE-2021-29063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29063">CVE-2021-29063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933111" comment="python310-mpmath-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933112" comment="python311-mpmath-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933113" comment="python39-mpmath-1.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251602" version="1" class="patch">
	<metadata>
		<title>suse-module-tools-16.0.36-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<description>
These are all security issues fixed in the suse-module-tools-16.0.36-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933114" comment="suse-module-tools-16.0.36-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933115" comment="suse-module-tools-scriptlets-16.0.36-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251603" version="1" class="patch">
	<metadata>
		<title>exim-4.96.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42114" ref_url="https://www.suse.com/security/cve/CVE-2023-42114/" source="CVE"/>
		<reference ref_id="CVE-2023-42115" ref_url="https://www.suse.com/security/cve/CVE-2023-42115/" source="CVE"/>
		<reference ref_id="CVE-2023-42116" ref_url="https://www.suse.com/security/cve/CVE-2023-42116/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.96.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42114/">CVE-2023-42114 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42114">CVE-2023-42114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42115/">CVE-2023-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42115">CVE-2023-42115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42116/">CVE-2023-42116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42116">CVE-2023-42116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933116" comment="exim-4.96.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933117" comment="eximon-4.96.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933118" comment="eximstats-html-4.96.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251604" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-25.8.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-25.8.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933119" comment="nodejs-electron-25.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933120" comment="nodejs-electron-devel-25.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933121" comment="nodejs-electron-doc-25.8.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251605" version="1" class="patch">
	<metadata>
		<title>libopencv408-4.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencv408-4.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933122" comment="libopencv408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933123" comment="libopencv_aruco408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933124" comment="libopencv_face408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933125" comment="libopencv_gapi408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933126" comment="libopencv_highgui408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933127" comment="libopencv_imgcodecs408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933128" comment="libopencv_objdetect408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933129" comment="libopencv_optflow408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933130" comment="libopencv_superres408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933131" comment="libopencv_videoio408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933132" comment="libopencv_videostab408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933133" comment="libopencv_ximgproc408-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933134" comment="opencv-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933135" comment="opencv-devel-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933136" comment="opencv-doc-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933137" comment="opencv4-cascades-data-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933138" comment="python3-opencv-4.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251606" version="1" class="patch">
	<metadata>
		<title>screen-4.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24626" ref_url="https://www.suse.com/security/cve/CVE-2023-24626/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24626/">CVE-2023-24626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24626">CVE-2023-24626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933139" comment="screen-4.9.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251607" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-38528" ref_url="https://www.suse.com/security/cve/CVE-2022-38528/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38528/">CVE-2022-38528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38528">CVE-2022-38528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933140" comment="assimp-devel-5.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933141" comment="libassimp5-5.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251608" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38201" ref_url="https://www.suse.com/security/cve/CVE-2023-38201/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38201/">CVE-2023-38201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38201">CVE-2023-38201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933142" comment="keylime-config-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933143" comment="keylime-firewalld-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933144" comment="keylime-logrotate-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933145" comment="keylime-registrar-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933146" comment="keylime-tenant-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933147" comment="keylime-tpm_cert_store-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933148" comment="keylime-verifier-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933149" comment="python310-keylime-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933150" comment="python311-keylime-7.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933151" comment="python39-keylime-7.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251609" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933152" comment="libmozjs-115-0-115.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933153" comment="mozjs115-115.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933154" comment="mozjs115-devel-115.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251610" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.5.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32762" ref_url="https://www.suse.com/security/cve/CVE-2023-32762/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.5.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32762/">CVE-2023-32762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32762">CVE-2023-32762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933155" comment="libQt6Concurrent6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933156" comment="libQt6Core6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933157" comment="libQt6DBus6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933158" comment="libQt6Gui6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933159" comment="libQt6Network6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933160" comment="libQt6OpenGL6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933161" comment="libQt6OpenGLWidgets6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933162" comment="libQt6PrintSupport6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933163" comment="libQt6Sql6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933164" comment="libQt6Test6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933165" comment="libQt6Widgets6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933166" comment="libQt6Xml6-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933167" comment="qt6-base-common-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933168" comment="qt6-base-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933169" comment="qt6-base-examples-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933170" comment="qt6-base-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933171" comment="qt6-concurrent-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933172" comment="qt6-core-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933173" comment="qt6-core-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933174" comment="qt6-dbus-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933175" comment="qt6-dbus-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933176" comment="qt6-docs-common-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933177" comment="qt6-exampleicons-devel-static-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933178" comment="qt6-gui-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933179" comment="qt6-gui-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933180" comment="qt6-kmssupport-devel-static-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933181" comment="qt6-kmssupport-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933182" comment="qt6-network-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933183" comment="qt6-network-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933184" comment="qt6-network-tls-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933185" comment="qt6-networkinformation-glib-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933186" comment="qt6-networkinformation-nm-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933187" comment="qt6-opengl-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933188" comment="qt6-opengl-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933189" comment="qt6-openglwidgets-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933190" comment="qt6-platformsupport-devel-static-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933191" comment="qt6-platformsupport-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933192" comment="qt6-platformtheme-gtk3-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933193" comment="qt6-platformtheme-xdgdesktopportal-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933194" comment="qt6-printsupport-cups-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933195" comment="qt6-printsupport-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933196" comment="qt6-printsupport-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933197" comment="qt6-sql-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933198" comment="qt6-sql-mysql-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933199" comment="qt6-sql-postgresql-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933200" comment="qt6-sql-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933201" comment="qt6-sql-sqlite-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933202" comment="qt6-sql-unixODBC-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933203" comment="qt6-test-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933204" comment="qt6-test-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933205" comment="qt6-widgets-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933206" comment="qt6-widgets-private-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933207" comment="qt6-xml-devel-6.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933208" comment="qt6-xml-private-devel-6.5.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251611" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43655" ref_url="https://www.suse.com/security/cve/CVE-2023-43655/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43655/">CVE-2023-43655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43655">CVE-2023-43655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933209" comment="php-composer2-2.6.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251612" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45748" ref_url="https://www.suse.com/security/cve/CVE-2022-45748/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45748/">CVE-2022-45748 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45748">CVE-2022-45748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933210" comment="assimp-devel-5.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933211" comment="libassimp5-5.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251613" version="1" class="patch">
	<metadata>
		<title>chromedriver-117.0.5938.149-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5346" ref_url="https://www.suse.com/security/cve/CVE-2023-5346/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-117.0.5938.149-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5346/">CVE-2023-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5346">CVE-2023-5346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933212" comment="chromedriver-117.0.5938.149-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933213" comment="chromium-117.0.5938.149-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251614" version="1" class="patch">
	<metadata>
		<title>freeimage-devel-3.18.0.1909-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-21428" ref_url="https://www.suse.com/security/cve/CVE-2020-21428/" source="CVE"/>
		<description>
These are all security issues fixed in the freeimage-devel-3.18.0.1909-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-21428/">CVE-2020-21428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21428">CVE-2020-21428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933214" comment="freeimage-devel-3.18.0.1909-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933215" comment="libfreeimage3-3.18.0.1909-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933216" comment="libfreeimageplus3-3.18.0.1909-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251615" version="1" class="patch">
	<metadata>
		<title>glibc-2.38-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4911" ref_url="https://www.suse.com/security/cve/CVE-2023-4911/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.38-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4911/">CVE-2023-4911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933217" comment="glibc-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933218" comment="glibc-devel-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933219" comment="glibc-devel-static-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933220" comment="glibc-extra-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933221" comment="glibc-html-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933222" comment="glibc-i18ndata-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933223" comment="glibc-info-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933224" comment="glibc-lang-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933225" comment="glibc-locale-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933226" comment="glibc-locale-base-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933227" comment="glibc-profile-2.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933228" comment="nscd-2.38-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251616" version="1" class="patch">
	<metadata>
		<title>helm-3.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933229" comment="helm-3.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933230" comment="helm-bash-completion-3.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933231" comment="helm-fish-completion-3.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933232" comment="helm-zsh-completion-3.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251617" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933233" comment="libX11-6-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933234" comment="libX11-6-32bit-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933235" comment="libX11-data-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933236" comment="libX11-devel-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933237" comment="libX11-devel-32bit-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933238" comment="libX11-xcb1-1.8.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933239" comment="libX11-xcb1-32bit-1.8.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251618" version="1" class="patch">
	<metadata>
		<title>libXpm-devel-3.5.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm-devel-3.5.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933240" comment="libXpm-devel-3.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933241" comment="libXpm-devel-32bit-3.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933242" comment="libXpm-tools-3.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933243" comment="libXpm4-3.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933244" comment="libXpm4-32bit-3.5.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251619" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.1.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5341" ref_url="https://www.suse.com/security/cve/CVE-2023-5341/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.1.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5341/">CVE-2023-5341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5341">CVE-2023-5341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933245" comment="ImageMagick-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933246" comment="ImageMagick-config-7-SUSE-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933247" comment="ImageMagick-config-7-upstream-limited-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933248" comment="ImageMagick-config-7-upstream-open-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933249" comment="ImageMagick-config-7-upstream-secure-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933250" comment="ImageMagick-config-7-upstream-websafe-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933251" comment="ImageMagick-devel-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933252" comment="ImageMagick-devel-32bit-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933253" comment="ImageMagick-doc-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933254" comment="ImageMagick-extra-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933255" comment="libMagick++-7_Q16HDRI5-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933256" comment="libMagick++-7_Q16HDRI5-32bit-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933257" comment="libMagick++-devel-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933258" comment="libMagick++-devel-32bit-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933259" comment="libMagickCore-7_Q16HDRI10-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933260" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933261" comment="libMagickWand-7_Q16HDRI10-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933262" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933263" comment="perl-PerlMagick-7.1.1.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251620" version="1" class="patch">
	<metadata>
		<title>kustomize-5.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
These are all security issues fixed in the kustomize-5.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933264" comment="kustomize-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933265" comment="kustomize-bash-completion-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933266" comment="kustomize-fish-completion-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933267" comment="kustomize-zsh-completion-5.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251621" version="1" class="patch">
	<metadata>
		<title>python-paramiko-doc-3.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24302" ref_url="https://www.suse.com/security/cve/CVE-2022-24302/" source="CVE"/>
		<description>
These are all security issues fixed in the python-paramiko-doc-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24302/">CVE-2022-24302 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24302">CVE-2022-24302 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933268" comment="python-paramiko-doc-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933269" comment="python310-paramiko-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933270" comment="python311-paramiko-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933271" comment="python39-paramiko-3.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251622" version="1" class="patch">
	<metadata>
		<title>python310-urllib3-2.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3-2.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933272" comment="python310-urllib3-2.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933273" comment="python311-urllib3-2.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933274" comment="python39-urllib3-2.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251623" version="1" class="patch">
	<metadata>
		<title>python310-urllib3_1-1.26.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3_1-1.26.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933275" comment="python310-urllib3_1-1.26.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933276" comment="python311-urllib3_1-1.26.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933277" comment="python39-urllib3_1-1.26.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251624" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-117.0.5938.149-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5346" ref_url="https://www.suse.com/security/cve/CVE-2023-5346/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-117.0.5938.149-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5346/">CVE-2023-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5346">CVE-2023-5346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933278" comment="ungoogled-chromium-117.0.5938.149-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933279" comment="ungoogled-chromium-chromedriver-117.0.5938.149-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251625" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20231007-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20231007-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933280" comment="cargo-audit-advisory-db-20231007-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251626" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.5.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.5.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933282" comment="kernel-macros-6.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933283" comment="kernel-source-6.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933284" comment="kernel-source-vanilla-6.5.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251627" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933285" comment="go1.20-1.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933286" comment="go1.20-doc-1.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933287" comment="go1.20-libstd-1.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933288" comment="go1.20-race-1.20.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251628" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933289" comment="go1.21-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933290" comment="go1.21-doc-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933291" comment="go1.21-libstd-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933292" comment="go1.21-race-1.21.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251629" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.11+kde134-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43114" ref_url="https://www.suse.com/security/cve/CVE-2023-43114/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.11+kde134-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43114/">CVE-2023-43114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43114">CVE-2023-43114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933293" comment="libQt5Bootstrap-devel-static-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933294" comment="libQt5Bootstrap-devel-static-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933295" comment="libQt5Concurrent-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933296" comment="libQt5Concurrent-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933297" comment="libQt5Concurrent5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933298" comment="libQt5Concurrent5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933299" comment="libQt5Core-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933300" comment="libQt5Core-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933301" comment="libQt5Core-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933302" comment="libQt5Core5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933303" comment="libQt5Core5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933304" comment="libQt5DBus-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933305" comment="libQt5DBus-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933306" comment="libQt5DBus-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933307" comment="libQt5DBus5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933308" comment="libQt5DBus5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933309" comment="libQt5Gui-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933310" comment="libQt5Gui-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933311" comment="libQt5Gui-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933312" comment="libQt5Gui5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933313" comment="libQt5Gui5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933314" comment="libQt5KmsSupport-devel-static-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933315" comment="libQt5KmsSupport-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933316" comment="libQt5Network-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933317" comment="libQt5Network-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933318" comment="libQt5Network-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933319" comment="libQt5Network5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933320" comment="libQt5Network5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933321" comment="libQt5OpenGL-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933322" comment="libQt5OpenGL-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933323" comment="libQt5OpenGL-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933324" comment="libQt5OpenGL5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933325" comment="libQt5OpenGL5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933326" comment="libQt5OpenGLExtensions-devel-static-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933327" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933328" comment="libQt5PlatformHeaders-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933329" comment="libQt5PlatformSupport-devel-static-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933330" comment="libQt5PlatformSupport-devel-static-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933331" comment="libQt5PlatformSupport-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933332" comment="libQt5PrintSupport-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933333" comment="libQt5PrintSupport-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933334" comment="libQt5PrintSupport-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933335" comment="libQt5PrintSupport5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933336" comment="libQt5PrintSupport5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933337" comment="libQt5Sql-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933338" comment="libQt5Sql-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933339" comment="libQt5Sql-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933340" comment="libQt5Sql5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933341" comment="libQt5Sql5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933342" comment="libQt5Sql5-mysql-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933343" comment="libQt5Sql5-mysql-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933344" comment="libQt5Sql5-postgresql-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933345" comment="libQt5Sql5-postgresql-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933346" comment="libQt5Sql5-sqlite-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933347" comment="libQt5Sql5-sqlite-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933348" comment="libQt5Sql5-unixODBC-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933349" comment="libQt5Sql5-unixODBC-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933350" comment="libQt5Test-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933351" comment="libQt5Test-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933352" comment="libQt5Test-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933353" comment="libQt5Test5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933354" comment="libQt5Test5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933355" comment="libQt5Widgets-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933356" comment="libQt5Widgets-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933357" comment="libQt5Widgets-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933358" comment="libQt5Widgets5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933359" comment="libQt5Widgets5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933360" comment="libQt5Xml-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933361" comment="libQt5Xml-devel-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933362" comment="libQt5Xml5-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933363" comment="libQt5Xml5-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933364" comment="libqt5-qtbase-common-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933365" comment="libqt5-qtbase-devel-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933366" comment="libqt5-qtbase-examples-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933367" comment="libqt5-qtbase-examples-32bit-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933368" comment="libqt5-qtbase-platformtheme-gtk3-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933369" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.11+kde134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933370" comment="libqt5-qtbase-private-headers-devel-5.15.11+kde134-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251630" version="1" class="patch">
	<metadata>
		<title>plexus-archiver-4.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37460" ref_url="https://www.suse.com/security/cve/CVE-2023-37460/" source="CVE"/>
		<description>
These are all security issues fixed in the plexus-archiver-4.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37460/">CVE-2023-37460 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37460">CVE-2023-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933371" comment="plexus-archiver-4.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933372" comment="plexus-archiver-javadoc-4.8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251631" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5371" ref_url="https://www.suse.com/security/cve/CVE-2023-5371/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5371/">CVE-2023-5371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5371">CVE-2023-5371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933373" comment="libwireshark16-4.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933374" comment="libwiretap13-4.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933375" comment="libwsutil14-4.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933376" comment="wireshark-4.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933377" comment="wireshark-devel-4.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933378" comment="wireshark-ui-qt-4.0.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251632" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.15.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.15.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933379" comment="ansible-core-2.15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933380" comment="ansible-test-2.15.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251633" version="1" class="patch">
	<metadata>
		<title>eclipse-jgit-5.11.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4759" ref_url="https://www.suse.com/security/cve/CVE-2023-4759/" source="CVE"/>
		<description>
These are all security issues fixed in the eclipse-jgit-5.11.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4759/">CVE-2023-4759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4759">CVE-2023-4759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933381" comment="eclipse-jgit-5.11.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251634" version="1" class="patch">
	<metadata>
		<title>gpp-2.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17076" ref_url="https://www.suse.com/security/cve/CVE-2018-17076/" source="CVE"/>
		<description>
These are all security issues fixed in the gpp-2.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17076/">CVE-2018-17076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17076">CVE-2018-17076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933382" comment="gpp-2.28-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251635" version="1" class="patch">
	<metadata>
		<title>opensc-0.23.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<reference ref_id="CVE-2023-4535" ref_url="https://www.suse.com/security/cve/CVE-2023-4535/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.23.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4535/">CVE-2023-4535 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4535">CVE-2023-4535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933383" comment="opensc-0.23.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251636" version="1" class="patch">
	<metadata>
		<title>shadowsocks-rust-1.16.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42811" ref_url="https://www.suse.com/security/cve/CVE-2023-42811/" source="CVE"/>
		<description>
These are all security issues fixed in the shadowsocks-rust-1.16.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42811/">CVE-2023-42811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42811">CVE-2023-42811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933384" comment="shadowsocks-rust-1.16.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251637" version="1" class="patch">
	<metadata>
		<title>borgbackup-1.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36811" ref_url="https://www.suse.com/security/cve/CVE-2023-36811/" source="CVE"/>
		<description>
These are all security issues fixed in the borgbackup-1.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36811/">CVE-2023-36811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36811">CVE-2023-36811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933385" comment="borgbackup-1.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933386" comment="borgbackup-bash-completion-1.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933387" comment="borgbackup-doc-1.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933388" comment="borgbackup-fish-completion-1.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933389" comment="borgbackup-zsh-completion-1.2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251638" version="1" class="patch">
	<metadata>
		<title>chromedriver-118.0.5993.70-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5218" ref_url="https://www.suse.com/security/cve/CVE-2023-5218/" source="CVE"/>
		<reference ref_id="CVE-2023-5473" ref_url="https://www.suse.com/security/cve/CVE-2023-5473/" source="CVE"/>
		<reference ref_id="CVE-2023-5474" ref_url="https://www.suse.com/security/cve/CVE-2023-5474/" source="CVE"/>
		<reference ref_id="CVE-2023-5475" ref_url="https://www.suse.com/security/cve/CVE-2023-5475/" source="CVE"/>
		<reference ref_id="CVE-2023-5476" ref_url="https://www.suse.com/security/cve/CVE-2023-5476/" source="CVE"/>
		<reference ref_id="CVE-2023-5477" ref_url="https://www.suse.com/security/cve/CVE-2023-5477/" source="CVE"/>
		<reference ref_id="CVE-2023-5478" ref_url="https://www.suse.com/security/cve/CVE-2023-5478/" source="CVE"/>
		<reference ref_id="CVE-2023-5479" ref_url="https://www.suse.com/security/cve/CVE-2023-5479/" source="CVE"/>
		<reference ref_id="CVE-2023-5481" ref_url="https://www.suse.com/security/cve/CVE-2023-5481/" source="CVE"/>
		<reference ref_id="CVE-2023-5483" ref_url="https://www.suse.com/security/cve/CVE-2023-5483/" source="CVE"/>
		<reference ref_id="CVE-2023-5484" ref_url="https://www.suse.com/security/cve/CVE-2023-5484/" source="CVE"/>
		<reference ref_id="CVE-2023-5485" ref_url="https://www.suse.com/security/cve/CVE-2023-5485/" source="CVE"/>
		<reference ref_id="CVE-2023-5486" ref_url="https://www.suse.com/security/cve/CVE-2023-5486/" source="CVE"/>
		<reference ref_id="CVE-2023-5487" ref_url="https://www.suse.com/security/cve/CVE-2023-5487/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-118.0.5993.70-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5218/">CVE-2023-5218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5473/">CVE-2023-5473 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5473">CVE-2023-5473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5474/">CVE-2023-5474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5474">CVE-2023-5474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5475/">CVE-2023-5475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5475">CVE-2023-5475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5476/">CVE-2023-5476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5476">CVE-2023-5476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5477/">CVE-2023-5477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5477">CVE-2023-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5478/">CVE-2023-5478 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5478">CVE-2023-5478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5479/">CVE-2023-5479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5479">CVE-2023-5479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5481/">CVE-2023-5481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5481">CVE-2023-5481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5483/">CVE-2023-5483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5483">CVE-2023-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5484/">CVE-2023-5484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5484">CVE-2023-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5485/">CVE-2023-5485 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5485">CVE-2023-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5486/">CVE-2023-5486 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5486">CVE-2023-5486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5487/">CVE-2023-5487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5487">CVE-2023-5487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933390" comment="chromedriver-118.0.5993.70-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933391" comment="chromium-118.0.5993.70-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251639" version="1" class="patch">
	<metadata>
		<title>erofs-utils-1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33551" ref_url="https://www.suse.com/security/cve/CVE-2023-33551/" source="CVE"/>
		<description>
These are all security issues fixed in the erofs-utils-1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33551/">CVE-2023-33551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33551">CVE-2023-33551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933392" comment="erofs-utils-1.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251640" version="1" class="patch">
	<metadata>
		<title>libcue-devel-2.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43641" ref_url="https://www.suse.com/security/cve/CVE-2023-43641/" source="CVE"/>
		<description>
These are all security issues fixed in the libcue-devel-2.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43641/">CVE-2023-43641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43641">CVE-2023-43641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933393" comment="libcue-devel-2.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933394" comment="libcue2-2.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251641" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.94.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45129" ref_url="https://www.suse.com/security/cve/CVE-2023-45129/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.94.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45129/">CVE-2023-45129 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45129">CVE-2023-45129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933395" comment="matrix-synapse-1.94.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251642" version="1" class="patch">
	<metadata>
		<title>libeverest-3.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45199" ref_url="https://www.suse.com/security/cve/CVE-2023-45199/" source="CVE"/>
		<description>
These are all security issues fixed in the libeverest-3.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45199/">CVE-2023-45199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45199">CVE-2023-45199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933396" comment="libeverest-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933397" comment="libeverest-x86-64-v3-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933398" comment="libmbedcrypto15-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933399" comment="libmbedcrypto15-x86-64-v3-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933400" comment="libmbedtls20-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933401" comment="libmbedtls20-x86-64-v3-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933402" comment="libmbedx509-6-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933403" comment="libmbedx509-6-x86-64-v3-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933404" comment="libp256m-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933405" comment="libp256m-x86-64-v3-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933406" comment="mbedtls-devel-3.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251643" version="1" class="patch">
	<metadata>
		<title>libopenconnect5-9.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenconnect5-9.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16239">CVE-2019-16239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933407" comment="libopenconnect5-9.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933408" comment="openconnect-9.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933409" comment="openconnect-bash-completion-9.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933410" comment="openconnect-devel-9.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933411" comment="openconnect-doc-9.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933412" comment="openconnect-lang-9.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251644" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode-9.31-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4170" ref_url="https://www.suse.com/security/cve/CVE-2022-4170/" source="CVE"/>
		<description>
These are all security issues fixed in the rxvt-unicode-9.31-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4170/">CVE-2022-4170 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4170">CVE-2022-4170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933413" comment="rxvt-unicode-9.31-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251645" version="1" class="patch">
	<metadata>
		<title>tuxguitar-1.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13940" ref_url="https://www.suse.com/security/cve/CVE-2020-13940/" source="CVE"/>
		<reference ref_id="CVE-2020-14940" ref_url="https://www.suse.com/security/cve/CVE-2020-14940/" source="CVE"/>
		<description>
These are all security issues fixed in the tuxguitar-1.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13940/">CVE-2020-13940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13940">CVE-2020-13940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14940/">CVE-2020-14940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14940">CVE-2020-14940 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933414" comment="tuxguitar-1.6.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251646" version="1" class="patch">
	<metadata>
		<title>curl-8.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933415" comment="curl-8.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933416" comment="libcurl-devel-8.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933417" comment="libcurl-devel-32bit-8.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933418" comment="libcurl4-8.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933419" comment="libcurl4-32bit-8.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251647" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933420" comment="go1.20-1.20.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933421" comment="go1.20-doc-1.20.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933422" comment="go1.20-libstd-1.20.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933423" comment="go1.20-race-1.20.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251648" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933424" comment="go1.21-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933425" comment="go1.21-doc-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933426" comment="go1.21-libstd-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933427" comment="go1.21-race-1.21.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251649" version="1" class="patch">
	<metadata>
		<title>grub2-2.12~rc1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12~rc1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933428" comment="grub2-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933429" comment="grub2-branding-upstream-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933430" comment="grub2-i386-efi-2.12~rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933431" comment="grub2-i386-efi-debug-2.12~rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933432" comment="grub2-i386-efi-extras-2.12~rc1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933433" comment="grub2-i386-pc-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933434" comment="grub2-i386-pc-debug-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933435" comment="grub2-i386-pc-extras-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933436" comment="grub2-snapper-plugin-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933437" comment="grub2-systemd-sleep-plugin-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933438" comment="grub2-x86_64-efi-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933439" comment="grub2-x86_64-efi-debug-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933440" comment="grub2-x86_64-efi-extras-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933441" comment="grub2-x86_64-xen-2.12~rc1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933442" comment="grub2-x86_64-xen-extras-2.12~rc1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251650" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.53-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36478" ref_url="https://www.suse.com/security/cve/CVE-2023-36478/" source="CVE"/>
		<reference ref_id="CVE-2023-36479" ref_url="https://www.suse.com/security/cve/CVE-2023-36479/" source="CVE"/>
		<reference ref_id="CVE-2023-40167" ref_url="https://www.suse.com/security/cve/CVE-2023-40167/" source="CVE"/>
		<reference ref_id="CVE-2023-41900" ref_url="https://www.suse.com/security/cve/CVE-2023-41900/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.53-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36478/">CVE-2023-36478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-36479/">CVE-2023-36479 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36479">CVE-2023-36479 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40167/">CVE-2023-40167 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40167">CVE-2023-40167 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41900/">CVE-2023-41900 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41900">CVE-2023-41900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933443" comment="jetty-annotations-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933444" comment="jetty-ant-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933445" comment="jetty-cdi-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933446" comment="jetty-client-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933447" comment="jetty-continuation-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933448" comment="jetty-deploy-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933449" comment="jetty-fcgi-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933450" comment="jetty-http-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933451" comment="jetty-http-spi-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933452" comment="jetty-io-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933453" comment="jetty-jaas-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933454" comment="jetty-jmx-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933455" comment="jetty-jndi-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933456" comment="jetty-jsp-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933457" comment="jetty-minimal-javadoc-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933458" comment="jetty-openid-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933459" comment="jetty-plus-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933460" comment="jetty-proxy-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933461" comment="jetty-quickstart-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933462" comment="jetty-rewrite-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933463" comment="jetty-security-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933464" comment="jetty-server-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933465" comment="jetty-servlet-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933466" comment="jetty-servlets-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933467" comment="jetty-start-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933468" comment="jetty-util-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933469" comment="jetty-util-ajax-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933470" comment="jetty-webapp-9.4.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933471" comment="jetty-xml-9.4.53-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251651" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-23.02.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-23.02.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933472" comment="libnss_slurm2-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933473" comment="libpmi0-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933474" comment="libslurm39-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933475" comment="perl-slurm-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933476" comment="slurm-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933477" comment="slurm-auth-none-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933478" comment="slurm-config-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933479" comment="slurm-config-man-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933480" comment="slurm-cray-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933481" comment="slurm-devel-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933482" comment="slurm-doc-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933483" comment="slurm-hdf5-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933484" comment="slurm-lua-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933485" comment="slurm-munge-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933486" comment="slurm-node-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933487" comment="slurm-openlava-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933488" comment="slurm-pam_slurm-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933489" comment="slurm-plugin-ext-sensors-rrd-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933490" comment="slurm-plugins-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933491" comment="slurm-rest-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933492" comment="slurm-seff-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933493" comment="slurm-sjstat-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933494" comment="slurm-slurmdbd-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933495" comment="slurm-sql-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933496" comment="slurm-sview-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933497" comment="slurm-testsuite-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933498" comment="slurm-torque-23.02.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933499" comment="slurm-webdoc-23.02.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251652" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.82-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.82-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933500" comment="tomcat-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933501" comment="tomcat-admin-webapps-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933502" comment="tomcat-docs-webapp-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933503" comment="tomcat-el-3_0-api-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933504" comment="tomcat-embed-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933505" comment="tomcat-javadoc-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933506" comment="tomcat-jsp-2_3-api-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933507" comment="tomcat-jsvc-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933508" comment="tomcat-lib-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933509" comment="tomcat-servlet-4_0-api-9.0.82-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933510" comment="tomcat-webapps-9.0.82-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251653" version="1" class="patch">
	<metadata>
		<title>ctdb-4.19.1+git.312.c912b3d2ef6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961/" source="CVE"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<reference ref_id="CVE-2023-42670" ref_url="https://www.suse.com/security/cve/CVE-2023-42670/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.19.1+git.312.c912b3d2ef6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42670/">CVE-2023-42670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42670">CVE-2023-42670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933511" comment="ctdb-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933512" comment="ctdb-pcp-pmda-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933513" comment="libsamba-policy-devel-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933514" comment="libsamba-policy-python3-devel-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933515" comment="libsamba-policy0-python3-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933516" comment="libsamba-policy0-python3-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933517" comment="samba-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933518" comment="samba-ad-dc-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933519" comment="samba-ad-dc-libs-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933520" comment="samba-ad-dc-libs-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933521" comment="samba-ceph-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933522" comment="samba-client-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933523" comment="samba-client-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933524" comment="samba-client-libs-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933525" comment="samba-client-libs-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933526" comment="samba-devel-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933527" comment="samba-devel-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933528" comment="samba-doc-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933529" comment="samba-dsdb-modules-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933530" comment="samba-gpupdate-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933531" comment="samba-ldb-ldap-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933532" comment="samba-libs-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933533" comment="samba-libs-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933534" comment="samba-libs-python3-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933535" comment="samba-libs-python3-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933536" comment="samba-python3-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933537" comment="samba-test-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933538" comment="samba-tool-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933539" comment="samba-winbind-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933540" comment="samba-winbind-libs-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933541" comment="samba-winbind-libs-32bit-4.19.1+git.312.c912b3d2ef6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251654" version="1" class="patch">
	<metadata>
		<title>exim-4.96.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42117" ref_url="https://www.suse.com/security/cve/CVE-2023-42117/" source="CVE"/>
		<reference ref_id="CVE-2023-42119" ref_url="https://www.suse.com/security/cve/CVE-2023-42119/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.96.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42117/">CVE-2023-42117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42117">CVE-2023-42117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42119/">CVE-2023-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42119">CVE-2023-42119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933542" comment="exim-4.96.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933543" comment="eximon-4.96.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933544" comment="eximstats-html-4.96.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251655" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933545" comment="python310-Django-4.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933546" comment="python311-Django-4.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933547" comment="python39-Django-4.2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251656" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-118.0.5993.70-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5218" ref_url="https://www.suse.com/security/cve/CVE-2023-5218/" source="CVE"/>
		<reference ref_id="CVE-2023-5473" ref_url="https://www.suse.com/security/cve/CVE-2023-5473/" source="CVE"/>
		<reference ref_id="CVE-2023-5474" ref_url="https://www.suse.com/security/cve/CVE-2023-5474/" source="CVE"/>
		<reference ref_id="CVE-2023-5475" ref_url="https://www.suse.com/security/cve/CVE-2023-5475/" source="CVE"/>
		<reference ref_id="CVE-2023-5476" ref_url="https://www.suse.com/security/cve/CVE-2023-5476/" source="CVE"/>
		<reference ref_id="CVE-2023-5477" ref_url="https://www.suse.com/security/cve/CVE-2023-5477/" source="CVE"/>
		<reference ref_id="CVE-2023-5478" ref_url="https://www.suse.com/security/cve/CVE-2023-5478/" source="CVE"/>
		<reference ref_id="CVE-2023-5479" ref_url="https://www.suse.com/security/cve/CVE-2023-5479/" source="CVE"/>
		<reference ref_id="CVE-2023-5481" ref_url="https://www.suse.com/security/cve/CVE-2023-5481/" source="CVE"/>
		<reference ref_id="CVE-2023-5483" ref_url="https://www.suse.com/security/cve/CVE-2023-5483/" source="CVE"/>
		<reference ref_id="CVE-2023-5484" ref_url="https://www.suse.com/security/cve/CVE-2023-5484/" source="CVE"/>
		<reference ref_id="CVE-2023-5485" ref_url="https://www.suse.com/security/cve/CVE-2023-5485/" source="CVE"/>
		<reference ref_id="CVE-2023-5486" ref_url="https://www.suse.com/security/cve/CVE-2023-5486/" source="CVE"/>
		<reference ref_id="CVE-2023-5487" ref_url="https://www.suse.com/security/cve/CVE-2023-5487/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-118.0.5993.70-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5218/">CVE-2023-5218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5473/">CVE-2023-5473 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5473">CVE-2023-5473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5474/">CVE-2023-5474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5474">CVE-2023-5474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5475/">CVE-2023-5475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5475">CVE-2023-5475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5476/">CVE-2023-5476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5476">CVE-2023-5476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5477/">CVE-2023-5477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5477">CVE-2023-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5478/">CVE-2023-5478 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5478">CVE-2023-5478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5479/">CVE-2023-5479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5479">CVE-2023-5479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5481/">CVE-2023-5481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5481">CVE-2023-5481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5483/">CVE-2023-5483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5483">CVE-2023-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5484/">CVE-2023-5484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5484">CVE-2023-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5485/">CVE-2023-5485 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5485">CVE-2023-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5486/">CVE-2023-5486 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5486">CVE-2023-5486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5487/">CVE-2023-5487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5487">CVE-2023-5487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933548" comment="ungoogled-chromium-118.0.5993.70-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933549" comment="ungoogled-chromium-chromedriver-118.0.5993.70-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251657" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.57.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.57.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933550" comment="libnghttp2-14-1.57.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933551" comment="libnghttp2-14-32bit-1.57.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933552" comment="libnghttp2-devel-1.57.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933553" comment="nghttp2-1.57.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251658" version="1" class="patch">
	<metadata>
		<title>corepack20-20.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39331" ref_url="https://www.suse.com/security/cve/CVE-2023-39331/" source="CVE"/>
		<reference ref_id="CVE-2023-39332" ref_url="https://www.suse.com/security/cve/CVE-2023-39332/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39331/">CVE-2023-39331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39331">CVE-2023-39331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39332/">CVE-2023-39332 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39332">CVE-2023-39332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933554" comment="corepack20-20.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933555" comment="nodejs20-20.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933556" comment="nodejs20-devel-20.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933557" comment="nodejs20-docs-20.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933558" comment="npm20-20.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251659" version="1" class="patch">
	<metadata>
		<title>picard-2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the picard-2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933559" comment="picard-2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933560" comment="picard-lang-2.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251660" version="1" class="patch">
	<metadata>
		<title>suse-module-tools-16.0.36-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<description>
These are all security issues fixed in the suse-module-tools-16.0.36-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933561" comment="suse-module-tools-16.0.36-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933562" comment="suse-module-tools-scriptlets-16.0.36-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251661" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-25.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-25.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933563" comment="nodejs-electron-25.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933564" comment="nodejs-electron-devel-25.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933565" comment="nodejs-electron-doc-25.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251662" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-6.0.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32722" ref_url="https://www.suse.com/security/cve/CVE-2023-32722/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-6.0.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32722/">CVE-2023-32722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32722">CVE-2023-32722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933566" comment="zabbix-agent-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933567" comment="zabbix-java-gateway-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933568" comment="zabbix-proxy-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933569" comment="zabbix-proxy-mysql-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933570" comment="zabbix-proxy-postgresql-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933571" comment="zabbix-proxy-sqlite-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933572" comment="zabbix-server-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933573" comment="zabbix-server-mysql-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933574" comment="zabbix-server-postgresql-6.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933575" comment="zabbix-ui-6.0.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251663" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933576" comment="java-11-openjdk-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933577" comment="java-11-openjdk-demo-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933578" comment="java-11-openjdk-devel-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933579" comment="java-11-openjdk-headless-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933580" comment="java-11-openjdk-javadoc-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933581" comment="java-11-openjdk-jmods-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933582" comment="java-11-openjdk-src-11.0.21.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251664" version="1" class="patch">
	<metadata>
		<title>python310-urllib3-2.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3-2.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933583" comment="python310-urllib3-2.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933584" comment="python311-urllib3-2.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933585" comment="python39-urllib3-2.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251665" version="1" class="patch">
	<metadata>
		<title>python310-urllib3_1-1.26.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3_1-1.26.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933586" comment="python310-urllib3_1-1.26.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933587" comment="python311-urllib3_1-1.26.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933588" comment="python39-urllib3_1-1.26.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251666" version="1" class="patch">
	<metadata>
		<title>ctdb-4.19.2+git.322.7e9201cef5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5568" ref_url="https://www.suse.com/security/cve/CVE-2023-5568/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.19.2+git.322.7e9201cef5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5568/">CVE-2023-5568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5568">CVE-2023-5568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933589" comment="ctdb-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933590" comment="ctdb-pcp-pmda-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933591" comment="libsamba-policy-devel-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933592" comment="libsamba-policy-python3-devel-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933593" comment="libsamba-policy0-python3-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933594" comment="libsamba-policy0-python3-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933595" comment="samba-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933596" comment="samba-ad-dc-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933597" comment="samba-ad-dc-libs-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933598" comment="samba-ad-dc-libs-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933599" comment="samba-ceph-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933600" comment="samba-client-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933601" comment="samba-client-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933602" comment="samba-client-libs-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933603" comment="samba-client-libs-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933604" comment="samba-devel-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933605" comment="samba-devel-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933606" comment="samba-doc-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933607" comment="samba-dsdb-modules-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933608" comment="samba-gpupdate-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933609" comment="samba-ldb-ldap-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933610" comment="samba-libs-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933611" comment="samba-libs-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933612" comment="samba-libs-python3-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933613" comment="samba-libs-python3-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933614" comment="samba-python3-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933615" comment="samba-test-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933616" comment="samba-tool-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933617" comment="samba-winbind-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933618" comment="samba-winbind-libs-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933619" comment="samba-winbind-libs-32bit-4.19.2+git.322.7e9201cef5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251667" version="1" class="patch">
	<metadata>
		<title>apache2-mod_uwsgi-2.0.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_uwsgi-2.0.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933620" comment="apache2-mod_uwsgi-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933621" comment="python310-uwsgi-python3-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933622" comment="python311-uwsgi-python3-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933623" comment="python39-uwsgi-python3-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933624" comment="uwsgi-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933625" comment="uwsgi-emperor_pg-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933626" comment="uwsgi-emperor_zeromq-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933627" comment="uwsgi-gevent-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933628" comment="uwsgi-glusterfs-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933629" comment="uwsgi-greenlet-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933630" comment="uwsgi-jvm-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933631" comment="uwsgi-ldap-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933632" comment="uwsgi-libffi-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933633" comment="uwsgi-logzmq-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933634" comment="uwsgi-lua-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933635" comment="uwsgi-pam-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933636" comment="uwsgi-php8-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933637" comment="uwsgi-psgi-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933638" comment="uwsgi-pypy-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933639" comment="uwsgi-sqlite3-2.0.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933640" comment="uwsgi-xslt-2.0.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251668" version="1" class="patch">
	<metadata>
		<title>hwloc-2.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47022" ref_url="https://www.suse.com/security/cve/CVE-2022-47022/" source="CVE"/>
		<description>
These are all security issues fixed in the hwloc-2.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47022/">CVE-2022-47022 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47022">CVE-2022-47022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933641" comment="hwloc-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933642" comment="hwloc-data-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933643" comment="hwloc-devel-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933644" comment="hwloc-doc-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933645" comment="hwloc-gl-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933646" comment="hwloc-gui-2.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933647" comment="libhwloc15-2.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251669" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933648" comment="libsndfile-devel-1.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933649" comment="libsndfile1-1.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933650" comment="libsndfile1-32bit-1.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251670" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43361" ref_url="https://www.suse.com/security/cve/CVE-2023-43361/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-43361/">CVE-2023-43361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43361">CVE-2023-43361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933651" comment="vorbis-tools-1.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933652" comment="vorbis-tools-lang-1.4.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251671" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.58-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<reference ref_id="CVE-2023-43622" ref_url="https://www.suse.com/security/cve/CVE-2023-43622/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.58-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43622/">CVE-2023-43622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43622">CVE-2023-43622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933653" comment="apache2-2.4.58-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251672" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933654" comment="java-17-openjdk-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933655" comment="java-17-openjdk-demo-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933656" comment="java-17-openjdk-devel-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933657" comment="java-17-openjdk-headless-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933658" comment="java-17-openjdk-javadoc-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933659" comment="java-17-openjdk-jmods-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933660" comment="java-17-openjdk-src-17.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251673" version="1" class="patch">
	<metadata>
		<title>python310-unearth-0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45805" ref_url="https://www.suse.com/security/cve/CVE-2023-45805/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-unearth-0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45805/">CVE-2023-45805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45805">CVE-2023-45805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933661" comment="python310-unearth-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933662" comment="python311-unearth-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933663" comment="python39-unearth-0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251674" version="1" class="patch">
	<metadata>
		<title>qutebrowser-3.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the qutebrowser-3.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933664" comment="qutebrowser-3.0.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251675" version="1" class="patch">
	<metadata>
		<title>redis-7.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41053" ref_url="https://www.suse.com/security/cve/CVE-2023-41053/" source="CVE"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41053/">CVE-2023-41053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41053">CVE-2023-41053 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933665" comment="redis-7.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251676" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-7.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22098" ref_url="https://www.suse.com/security/cve/CVE-2023-22098/" source="CVE"/>
		<reference ref_id="CVE-2023-22099" ref_url="https://www.suse.com/security/cve/CVE-2023-22099/" source="CVE"/>
		<reference ref_id="CVE-2023-22100" ref_url="https://www.suse.com/security/cve/CVE-2023-22100/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-7.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-22098/">CVE-2023-22098 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22098">CVE-2023-22098 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-22099/">CVE-2023-22099 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22099">CVE-2023-22099 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22100/">CVE-2023-22100 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22100">CVE-2023-22100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933666" comment="python3-virtualbox-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933667" comment="virtualbox-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933668" comment="virtualbox-devel-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933669" comment="virtualbox-guest-desktop-icons-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933670" comment="virtualbox-guest-source-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933671" comment="virtualbox-guest-tools-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933672" comment="virtualbox-host-source-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933673" comment="virtualbox-qt-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933674" comment="virtualbox-vnc-7.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933675" comment="virtualbox-websrv-7.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251677" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933676" comment="MozillaThunderbird-115.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933677" comment="MozillaThunderbird-translations-common-115.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933678" comment="MozillaThunderbird-translations-other-115.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251678" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933679" comment="java-21-openjdk-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933680" comment="java-21-openjdk-demo-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933681" comment="java-21-openjdk-devel-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933682" comment="java-21-openjdk-headless-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933683" comment="java-21-openjdk-javadoc-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933684" comment="java-21-openjdk-jmods-21.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933685" comment="java-21-openjdk-src-21.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251679" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933686" comment="postgresql14-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933687" comment="postgresql14-contrib-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933688" comment="postgresql14-devel-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933689" comment="postgresql14-docs-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933690" comment="postgresql14-llvmjit-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933691" comment="postgresql14-llvmjit-devel-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933692" comment="postgresql14-plperl-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933693" comment="postgresql14-plpython-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933694" comment="postgresql14-pltcl-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933695" comment="postgresql14-server-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933696" comment="postgresql14-server-devel-14.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933697" comment="postgresql14-test-14.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251680" version="1" class="patch">
	<metadata>
		<title>libsox3-14.4.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13590" ref_url="https://www.suse.com/security/cve/CVE-2019-13590/" source="CVE"/>
		<reference ref_id="CVE-2021-23159" ref_url="https://www.suse.com/security/cve/CVE-2021-23159/" source="CVE"/>
		<reference ref_id="CVE-2021-33844" ref_url="https://www.suse.com/security/cve/CVE-2021-33844/" source="CVE"/>
		<reference ref_id="CVE-2021-3643" ref_url="https://www.suse.com/security/cve/CVE-2021-3643/" source="CVE"/>
		<reference ref_id="CVE-2021-40426" ref_url="https://www.suse.com/security/cve/CVE-2021-40426/" source="CVE"/>
		<reference ref_id="CVE-2022-31650" ref_url="https://www.suse.com/security/cve/CVE-2022-31650/" source="CVE"/>
		<reference ref_id="CVE-2022-31651" ref_url="https://www.suse.com/security/cve/CVE-2022-31651/" source="CVE"/>
		<reference ref_id="CVE-2023-32627" ref_url="https://www.suse.com/security/cve/CVE-2023-32627/" source="CVE"/>
		<reference ref_id="CVE-2023-34318" ref_url="https://www.suse.com/security/cve/CVE-2023-34318/" source="CVE"/>
		<description>
These are all security issues fixed in the libsox3-14.4.2-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13590/">CVE-2019-13590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13590">CVE-2019-13590 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23159/">CVE-2021-23159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23159">CVE-2021-23159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33844/">CVE-2021-33844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33844">CVE-2021-33844 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3643/">CVE-2021-3643 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3643">CVE-2021-3643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40426/">CVE-2021-40426 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40426">CVE-2021-40426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31650/">CVE-2022-31650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31650">CVE-2022-31650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31651/">CVE-2022-31651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31651">CVE-2022-31651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32627/">CVE-2023-32627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32627">CVE-2023-32627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34318/">CVE-2023-34318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34318">CVE-2023-34318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933698" comment="libsox3-14.4.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933699" comment="sox-14.4.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933700" comment="sox-devel-14.4.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251681" version="1" class="patch">
	<metadata>
		<title>teleport-14.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45133" ref_url="https://www.suse.com/security/cve/CVE-2023-45133/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-14.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45133/">CVE-2023-45133 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45133">CVE-2023-45133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933701" comment="teleport-14.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933702" comment="teleport-tbot-14.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933703" comment="teleport-tctl-14.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933704" comment="teleport-tsh-14.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251682" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933705" comment="xorg-x11-server-21.1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933706" comment="xorg-x11-server-Xvfb-21.1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933707" comment="xorg-x11-server-extra-21.1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933708" comment="xorg-x11-server-sdk-21.1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933709" comment="xorg-x11-server-source-21.1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933710" comment="xorg-x11-server-wrapper-21.1.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251683" version="1" class="patch">
	<metadata>
		<title>xwayland-23.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933711" comment="xwayland-23.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933712" comment="xwayland-devel-23.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251684" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933713" comment="libminizip1-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933714" comment="libminizip1-32bit-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933715" comment="libminizip1-x86-64-v3-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933716" comment="libz1-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933717" comment="libz1-32bit-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933718" comment="libz1-x86-64-v3-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933719" comment="minizip-devel-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933720" comment="zlib-devel-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933721" comment="zlib-devel-32bit-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933722" comment="zlib-devel-static-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933723" comment="zlib-devel-static-32bit-1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933724" comment="zlib-testsuite-1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251685" version="1" class="patch">
	<metadata>
		<title>qemu-8.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42467" ref_url="https://www.suse.com/security/cve/CVE-2023-42467/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42467/">CVE-2023-42467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42467">CVE-2023-42467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933725" comment="qemu-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933726" comment="qemu-SLOF-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933727" comment="qemu-accel-qtest-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933728" comment="qemu-accel-tcg-x86-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933729" comment="qemu-arm-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933730" comment="qemu-audio-alsa-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933731" comment="qemu-audio-dbus-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933732" comment="qemu-audio-jack-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933733" comment="qemu-audio-oss-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933734" comment="qemu-audio-pa-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933735" comment="qemu-audio-pipewire-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933736" comment="qemu-audio-spice-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933737" comment="qemu-block-curl-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933738" comment="qemu-block-dmg-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933739" comment="qemu-block-gluster-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933740" comment="qemu-block-iscsi-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933741" comment="qemu-block-nfs-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933742" comment="qemu-block-rbd-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933743" comment="qemu-block-ssh-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933744" comment="qemu-chardev-baum-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933745" comment="qemu-chardev-spice-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933746" comment="qemu-doc-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933747" comment="qemu-extra-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933748" comment="qemu-guest-agent-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933749" comment="qemu-headless-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933750" comment="qemu-hw-display-qxl-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933751" comment="qemu-hw-display-virtio-gpu-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933752" comment="qemu-hw-display-virtio-gpu-pci-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933753" comment="qemu-hw-display-virtio-vga-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933754" comment="qemu-hw-s390x-virtio-gpu-ccw-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933755" comment="qemu-hw-usb-host-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933756" comment="qemu-hw-usb-redirect-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933757" comment="qemu-hw-usb-smartcard-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933758" comment="qemu-img-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009895334" comment="qemu-ipxe-1.0.0+-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933759" comment="qemu-ivshmem-tools-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933760" comment="qemu-ksm-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933761" comment="qemu-kvm-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933762" comment="qemu-lang-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933763" comment="qemu-microvm-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933764" comment="qemu-ppc-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933765" comment="qemu-pr-helper-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933766" comment="qemu-s390x-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931487" comment="qemu-seabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933767" comment="qemu-skiboot-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933768" comment="qemu-tools-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933769" comment="qemu-ui-curses-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933770" comment="qemu-ui-dbus-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933771" comment="qemu-ui-gtk-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933772" comment="qemu-ui-opengl-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933773" comment="qemu-ui-spice-app-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933774" comment="qemu-ui-spice-core-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009931496" comment="qemu-vgabios-1.16.2_3_gd478f380-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933775" comment="qemu-vhost-user-gpu-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933776" comment="qemu-x86-8.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251686" version="1" class="patch">
	<metadata>
		<title>roundcubemail-1.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5631" ref_url="https://www.suse.com/security/cve/CVE-2023-5631/" source="CVE"/>
		<description>
These are all security issues fixed in the roundcubemail-1.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5631/">CVE-2023-5631 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5631">CVE-2023-5631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933777" comment="roundcubemail-1.6.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251687" version="1" class="patch">
	<metadata>
		<title>libsystemd0-254.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-254.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933778" comment="libsystemd0-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933779" comment="libsystemd0-32bit-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933780" comment="libudev1-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933781" comment="libudev1-32bit-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933782" comment="systemd-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933783" comment="systemd-32bit-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933784" comment="systemd-boot-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933785" comment="systemd-container-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933786" comment="systemd-coredump-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933787" comment="systemd-devel-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933788" comment="systemd-doc-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933789" comment="systemd-experimental-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933790" comment="systemd-homed-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933791" comment="systemd-journal-remote-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933792" comment="systemd-lang-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933793" comment="systemd-network-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933794" comment="systemd-portable-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933795" comment="systemd-sysvcompat-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933796" comment="systemd-testsuite-254.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933797" comment="udev-254.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251688" version="1" class="patch">
	<metadata>
		<title>libvlc5-3.0.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-3.0.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933798" comment="libvlc5-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933799" comment="libvlccore9-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933800" comment="vlc-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933801" comment="vlc-codec-gstreamer-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933802" comment="vlc-devel-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933803" comment="vlc-jack-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933804" comment="vlc-lang-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933805" comment="vlc-noX-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933806" comment="vlc-opencv-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933807" comment="vlc-qt-3.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933808" comment="vlc-vdpau-3.0.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251689" version="1" class="patch">
	<metadata>
		<title>chromedriver-118.0.5993.117-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5472" ref_url="https://www.suse.com/security/cve/CVE-2023-5472/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-118.0.5993.117-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5472/">CVE-2023-5472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5472">CVE-2023-5472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933809" comment="chromedriver-118.0.5993.117-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933810" comment="chromium-118.0.5993.117-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251690" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.25-3.5.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28235" ref_url="https://www.suse.com/security/cve/CVE-2021-28235/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.25-3.5.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28235/">CVE-2021-28235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28235">CVE-2021-28235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933811" comment="etcd-for-k8s1.25-3.5.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251691" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.26-3.5.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28235" ref_url="https://www.suse.com/security/cve/CVE-2021-28235/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.26-3.5.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28235/">CVE-2021-28235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28235">CVE-2021-28235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933812" comment="etcd-for-k8s1.26-3.5.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251692" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.27-3.5.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28235" ref_url="https://www.suse.com/security/cve/CVE-2021-28235/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.27-3.5.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28235/">CVE-2021-28235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28235">CVE-2021-28235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933813" comment="etcd-for-k8s1.27-3.5.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251693" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933814" comment="libopenssl-3-devel-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933815" comment="libopenssl-3-devel-32bit-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933816" comment="libopenssl3-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933817" comment="libopenssl3-32bit-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933818" comment="libopenssl3-x86-64-v3-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933819" comment="openssl-3-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933820" comment="openssl-3-doc-3.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251694" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-26.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933821" comment="avahi-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933822" comment="avahi-autoipd-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933823" comment="avahi-compat-howl-devel-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933824" comment="avahi-compat-mDNSResponder-devel-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933825" comment="avahi-lang-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933826" comment="avahi-utils-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933827" comment="libavahi-client3-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933828" comment="libavahi-client3-32bit-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933829" comment="libavahi-common3-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933830" comment="libavahi-common3-32bit-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933831" comment="libavahi-core7-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933832" comment="libavahi-devel-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933833" comment="libavahi-libevent1-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933834" comment="libdns_sd-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933835" comment="libdns_sd-32bit-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933836" comment="libhowl0-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933837" comment="python310-avahi-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933838" comment="python311-avahi-0.8-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933839" comment="python39-avahi-0.8-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251695" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-12.3.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-12.3.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933840" comment="libvmtools-devel-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933841" comment="libvmtools0-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933842" comment="open-vm-tools-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933843" comment="open-vm-tools-containerinfo-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933844" comment="open-vm-tools-desktop-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933845" comment="open-vm-tools-salt-minion-12.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933846" comment="open-vm-tools-sdmp-12.3.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251696" version="1" class="patch">
	<metadata>
		<title>python310-Werkzeug-3.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46136" ref_url="https://www.suse.com/security/cve/CVE-2023-46136/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Werkzeug-3.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46136/">CVE-2023-46136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46136">CVE-2023-46136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933847" comment="python310-Werkzeug-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933848" comment="python311-Werkzeug-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933849" comment="python39-Werkzeug-3.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251697" version="1" class="patch">
	<metadata>
		<title>cmctl-1.13.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-1.13.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933850" comment="cmctl-1.13.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251698" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933851" comment="libQt5Bootstrap-devel-static-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933852" comment="libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933853" comment="libQt5Concurrent-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933854" comment="libQt5Concurrent-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933855" comment="libQt5Concurrent5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933856" comment="libQt5Concurrent5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933857" comment="libQt5Core-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933858" comment="libQt5Core-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933859" comment="libQt5Core-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933860" comment="libQt5Core5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933861" comment="libQt5Core5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933862" comment="libQt5DBus-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933863" comment="libQt5DBus-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933864" comment="libQt5DBus-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933865" comment="libQt5DBus5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933866" comment="libQt5DBus5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933867" comment="libQt5Gui-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933868" comment="libQt5Gui-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933869" comment="libQt5Gui-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933870" comment="libQt5Gui5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933871" comment="libQt5Gui5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933872" comment="libQt5KmsSupport-devel-static-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933873" comment="libQt5KmsSupport-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933874" comment="libQt5Network-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933875" comment="libQt5Network-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933876" comment="libQt5Network-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933877" comment="libQt5Network5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933878" comment="libQt5Network5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933879" comment="libQt5OpenGL-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933880" comment="libQt5OpenGL-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933881" comment="libQt5OpenGL-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933882" comment="libQt5OpenGL5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933883" comment="libQt5OpenGL5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933884" comment="libQt5OpenGLExtensions-devel-static-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933885" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933886" comment="libQt5PlatformHeaders-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933887" comment="libQt5PlatformSupport-devel-static-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933888" comment="libQt5PlatformSupport-devel-static-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933889" comment="libQt5PlatformSupport-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933890" comment="libQt5PrintSupport-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933891" comment="libQt5PrintSupport-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933892" comment="libQt5PrintSupport-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933893" comment="libQt5PrintSupport5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933894" comment="libQt5PrintSupport5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933895" comment="libQt5Sql-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933896" comment="libQt5Sql-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933897" comment="libQt5Sql-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933898" comment="libQt5Sql5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933899" comment="libQt5Sql5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933900" comment="libQt5Sql5-mysql-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933901" comment="libQt5Sql5-mysql-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933902" comment="libQt5Sql5-postgresql-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933903" comment="libQt5Sql5-postgresql-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933904" comment="libQt5Sql5-sqlite-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933905" comment="libQt5Sql5-sqlite-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933906" comment="libQt5Sql5-unixODBC-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933907" comment="libQt5Sql5-unixODBC-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933908" comment="libQt5Test-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933909" comment="libQt5Test-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933910" comment="libQt5Test-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933911" comment="libQt5Test5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933912" comment="libQt5Test5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933913" comment="libQt5Widgets-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933914" comment="libQt5Widgets-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933915" comment="libQt5Widgets-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933916" comment="libQt5Widgets5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933917" comment="libQt5Widgets5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933918" comment="libQt5Xml-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933919" comment="libQt5Xml-devel-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933920" comment="libQt5Xml5-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933921" comment="libQt5Xml5-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933922" comment="libqt5-qtbase-common-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933923" comment="libqt5-qtbase-devel-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933924" comment="libqt5-qtbase-examples-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933925" comment="libqt5-qtbase-examples-32bit-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933926" comment="libqt5-qtbase-platformtheme-gtk3-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933927" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.11+kde138-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933928" comment="libqt5-qtbase-private-headers-devel-5.15.11+kde138-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251699" version="1" class="patch">
	<metadata>
		<title>libQt5Svg5-32bit-5.15.11+kde6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45930" ref_url="https://www.suse.com/security/cve/CVE-2021-45930/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Svg5-32bit-5.15.11+kde6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45930/">CVE-2021-45930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45930">CVE-2021-45930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933929" comment="libQt5Svg5-5.15.11+kde6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933930" comment="libQt5Svg5-32bit-5.15.11+kde6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933931" comment="libqt5-qtsvg-devel-5.15.11+kde6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933932" comment="libqt5-qtsvg-devel-32bit-5.15.11+kde6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933933" comment="libqt5-qtsvg-examples-5.15.11+kde6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933934" comment="libqt5-qtsvg-private-headers-devel-5.15.11+kde6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251700" version="1" class="patch">
	<metadata>
		<title>pgadmin4-7.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5002" ref_url="https://www.suse.com/security/cve/CVE-2023-5002/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-7.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5002/">CVE-2023-5002 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5002">CVE-2023-5002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933935" comment="pgadmin4-7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933936" comment="pgadmin4-desktop-7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933937" comment="pgadmin4-doc-7.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933938" comment="pgadmin4-web-uwsgi-7.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251701" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.6.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.6.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933939" comment="libQt6Concurrent6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933940" comment="libQt6Core6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933941" comment="libQt6DBus6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933942" comment="libQt6Gui6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933943" comment="libQt6Network6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933944" comment="libQt6OpenGL6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933945" comment="libQt6OpenGLWidgets6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933946" comment="libQt6PrintSupport6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933947" comment="libQt6Sql6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933948" comment="libQt6Test6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933949" comment="libQt6Widgets6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933950" comment="libQt6Xml6-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933951" comment="qt6-base-common-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933952" comment="qt6-base-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933953" comment="qt6-base-examples-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933954" comment="qt6-base-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933955" comment="qt6-concurrent-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933956" comment="qt6-core-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933957" comment="qt6-core-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933958" comment="qt6-dbus-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933959" comment="qt6-dbus-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933960" comment="qt6-docs-common-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933961" comment="qt6-exampleicons-devel-static-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933962" comment="qt6-gui-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933963" comment="qt6-gui-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933964" comment="qt6-kmssupport-devel-static-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933965" comment="qt6-kmssupport-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933966" comment="qt6-network-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933967" comment="qt6-network-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933968" comment="qt6-network-tls-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933969" comment="qt6-networkinformation-glib-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933970" comment="qt6-networkinformation-nm-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933971" comment="qt6-opengl-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933972" comment="qt6-opengl-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933973" comment="qt6-openglwidgets-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933974" comment="qt6-platformsupport-devel-static-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933975" comment="qt6-platformsupport-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933976" comment="qt6-platformtheme-gtk3-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933977" comment="qt6-platformtheme-xdgdesktopportal-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933978" comment="qt6-printsupport-cups-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933979" comment="qt6-printsupport-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933980" comment="qt6-printsupport-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933981" comment="qt6-sql-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933982" comment="qt6-sql-mysql-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933983" comment="qt6-sql-postgresql-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933984" comment="qt6-sql-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933985" comment="qt6-sql-sqlite-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933986" comment="qt6-sql-unixODBC-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933987" comment="qt6-test-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933988" comment="qt6-test-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933989" comment="qt6-widgets-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933990" comment="qt6-widgets-private-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933991" comment="qt6-xml-devel-6.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933992" comment="qt6-xml-private-devel-6.6.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251702" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6223">CVE-2016-6223 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12944">CVE-2017-12944 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34266">CVE-2022-34266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933993" comment="libtiff-devel-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933994" comment="libtiff-devel-32bit-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933995" comment="libtiff6-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933996" comment="libtiff6-32bit-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933997" comment="tiff-4.6.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251703" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.82-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42794" ref_url="https://www.suse.com/security/cve/CVE-2023-42794/" source="CVE"/>
		<reference ref_id="CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795/" source="CVE"/>
		<reference ref_id="CVE-2023-45648" ref_url="https://www.suse.com/security/cve/CVE-2023-45648/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.82-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42794/">CVE-2023-42794 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42794">CVE-2023-42794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45648/">CVE-2023-45648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45648">CVE-2023-45648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009933998" comment="tomcat-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009933999" comment="tomcat-admin-webapps-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934000" comment="tomcat-docs-webapp-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934001" comment="tomcat-el-3_0-api-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934002" comment="tomcat-embed-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934003" comment="tomcat-javadoc-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934004" comment="tomcat-jsp-2_3-api-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934005" comment="tomcat-jsvc-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934006" comment="tomcat-lib-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934007" comment="tomcat-servlet-4_0-api-9.0.82-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934008" comment="tomcat-webapps-9.0.82-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251704" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-118.0.5993.117-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5472" ref_url="https://www.suse.com/security/cve/CVE-2023-5472/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-118.0.5993.117-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5472/">CVE-2023-5472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5472">CVE-2023-5472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934009" comment="ungoogled-chromium-118.0.5993.117-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934010" comment="ungoogled-chromium-chromedriver-118.0.5993.117-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251705" version="1" class="patch">
	<metadata>
		<title>velero-1.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934011" comment="velero-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934012" comment="velero-bash-completion-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934013" comment="velero-fish-completion-1.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934014" comment="velero-zsh-completion-1.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251706" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-119.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5722" ref_url="https://www.suse.com/security/cve/CVE-2023-5722/" source="CVE"/>
		<reference ref_id="CVE-2023-5723" ref_url="https://www.suse.com/security/cve/CVE-2023-5723/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5729" ref_url="https://www.suse.com/security/cve/CVE-2023-5729/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5731" ref_url="https://www.suse.com/security/cve/CVE-2023-5731/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-119.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5722/">CVE-2023-5722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5722">CVE-2023-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5723/">CVE-2023-5723 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5723">CVE-2023-5723 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5729/">CVE-2023-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5729">CVE-2023-5729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5731/">CVE-2023-5731 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5731">CVE-2023-5731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934015" comment="MozillaFirefox-119.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934016" comment="MozillaFirefox-branding-upstream-119.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934017" comment="MozillaFirefox-devel-119.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934018" comment="MozillaFirefox-translations-common-119.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934019" comment="MozillaFirefox-translations-other-119.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251707" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.2.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.2.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934020" comment="freeradius-server-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934021" comment="freeradius-server-devel-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934022" comment="freeradius-server-doc-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934023" comment="freeradius-server-krb5-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934024" comment="freeradius-server-ldap-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934025" comment="freeradius-server-ldap-schemas-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934026" comment="freeradius-server-libs-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934027" comment="freeradius-server-mysql-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934028" comment="freeradius-server-perl-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934029" comment="freeradius-server-postgresql-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934030" comment="freeradius-server-python3-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934031" comment="freeradius-server-sqlite-3.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934032" comment="freeradius-server-utils-3.2.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251708" version="1" class="patch">
	<metadata>
		<title>frr-8.4-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934033" comment="frr-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934034" comment="frr-devel-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934035" comment="libfrr0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934036" comment="libfrr_pb0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934037" comment="libfrrcares0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934038" comment="libfrrfpm_pb0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934039" comment="libfrrospfapiclient0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934040" comment="libfrrsnmp0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934041" comment="libfrrzmq0-8.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934042" comment="libmlag_pb0-8.4-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251709" version="1" class="patch">
	<metadata>
		<title>glibc-2.38-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.38-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">CVE-2020-1751 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934043" comment="glibc-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934044" comment="glibc-devel-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934045" comment="glibc-devel-static-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934046" comment="glibc-extra-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934047" comment="glibc-html-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934048" comment="glibc-i18ndata-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934049" comment="glibc-info-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934050" comment="glibc-lang-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934051" comment="glibc-locale-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934052" comment="glibc-locale-base-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934053" comment="glibc-profile-2.38-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934054" comment="nscd-2.38-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251710" version="1" class="patch">
	<metadata>
		<title>jasper-4.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26926">CVE-2021-26926 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26927">CVE-2021-26927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27845">CVE-2021-27845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3443">CVE-2021-3443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3467">CVE-2021-3467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934055" comment="jasper-4.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934056" comment="libjasper-devel-4.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934057" comment="libjasper7-4.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934058" comment="libjasper7-32bit-4.0.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251711" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.73-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.73-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934059" comment="lighttpd-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934060" comment="lighttpd-mod_authn_gssapi-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934061" comment="lighttpd-mod_authn_ldap-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934062" comment="lighttpd-mod_authn_pam-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934063" comment="lighttpd-mod_authn_sasl-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934064" comment="lighttpd-mod_magnet-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934065" comment="lighttpd-mod_maxminddb-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934066" comment="lighttpd-mod_rrdtool-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934067" comment="lighttpd-mod_vhostdb_dbi-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934068" comment="lighttpd-mod_vhostdb_ldap-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934069" comment="lighttpd-mod_vhostdb_mysql-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934070" comment="lighttpd-mod_vhostdb_pgsql-1.4.73-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934071" comment="lighttpd-mod_webdav-1.4.73-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251712" version="1" class="patch">
	<metadata>
		<title>grpc-devel-1.59.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the grpc-devel-1.59.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934072" comment="grpc-devel-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934073" comment="grpc-source-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934074" comment="libgrpc++1_59-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934075" comment="libgrpc1_59-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934076" comment="libgrpc36-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934077" comment="libupb36-1.59.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934078" comment="upb-devel-1.59.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251713" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.95.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43796" ref_url="https://www.suse.com/security/cve/CVE-2023-43796/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.95.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43796/">CVE-2023-43796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43796">CVE-2023-43796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934079" comment="matrix-synapse-1.95.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251714" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-27.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934080" comment="avahi-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934081" comment="avahi-autoipd-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934082" comment="avahi-compat-howl-devel-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934083" comment="avahi-compat-mDNSResponder-devel-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934084" comment="avahi-lang-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934085" comment="avahi-utils-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934086" comment="libavahi-client3-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934087" comment="libavahi-client3-32bit-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934088" comment="libavahi-common3-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934089" comment="libavahi-common3-32bit-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934090" comment="libavahi-core7-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934091" comment="libavahi-devel-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934092" comment="libavahi-libevent1-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934093" comment="libdns_sd-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934094" comment="libdns_sd-32bit-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934095" comment="libhowl0-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934096" comment="python310-avahi-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934097" comment="python311-avahi-0.8-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934098" comment="python39-avahi-0.8-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251715" version="1" class="patch">
	<metadata>
		<title>clamav-0.103.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40477" ref_url="https://www.suse.com/security/cve/CVE-2023-40477/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.103.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40477/">CVE-2023-40477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40477">CVE-2023-40477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934099" comment="clamav-0.103.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934100" comment="clamav-devel-0.103.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934101" comment="clamav-docs-html-0.103.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934102" comment="clamav-milter-0.103.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934103" comment="libclamav9-0.103.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934104" comment="libfreshclam2-0.103.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251716" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.47-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.47-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934105" comment="element-desktop-1.11.47-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251717" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.22.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.22.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934106" comment="gstreamer-plugins-bad-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934107" comment="gstreamer-plugins-bad-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934108" comment="gstreamer-plugins-bad-chromaprint-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934109" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934110" comment="gstreamer-plugins-bad-devel-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934111" comment="gstreamer-plugins-bad-fluidsynth-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934112" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934113" comment="gstreamer-plugins-bad-lang-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934114" comment="gstreamer-transcoder-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934115" comment="gstreamer-transcoder-devel-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934116" comment="libgstadaptivedemux-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934117" comment="libgstadaptivedemux-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934118" comment="libgstbadaudio-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934119" comment="libgstbadaudio-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934120" comment="libgstbasecamerabinsrc-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934121" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934122" comment="libgstcodecparsers-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934123" comment="libgstcodecparsers-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934124" comment="libgstcodecs-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934125" comment="libgstcodecs-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934126" comment="libgstcuda-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934127" comment="libgstcuda-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934128" comment="libgstinsertbin-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934129" comment="libgstinsertbin-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934130" comment="libgstisoff-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934131" comment="libgstisoff-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934132" comment="libgstmpegts-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934133" comment="libgstmpegts-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934134" comment="libgstphotography-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934135" comment="libgstphotography-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934136" comment="libgstplay-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934137" comment="libgstplay-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934138" comment="libgstplayer-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934139" comment="libgstplayer-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934140" comment="libgstsctp-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934141" comment="libgstsctp-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934142" comment="libgsttranscoder-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934143" comment="libgsttranscoder-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934144" comment="libgsturidownloader-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934145" comment="libgsturidownloader-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934146" comment="libgstva-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934147" comment="libgstva-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934148" comment="libgstvulkan-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934149" comment="libgstvulkan-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934150" comment="libgstwayland-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934151" comment="libgstwayland-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934152" comment="libgstwebrtc-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934153" comment="libgstwebrtc-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934154" comment="libgstwebrtcnice-1_0-0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934155" comment="libgstwebrtcnice-1_0-0-32bit-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934156" comment="typelib-1_0-CudaGst-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934157" comment="typelib-1_0-GstBadAudio-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934158" comment="typelib-1_0-GstCodecs-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934159" comment="typelib-1_0-GstCuda-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934160" comment="typelib-1_0-GstInsertBin-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934161" comment="typelib-1_0-GstMpegts-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934162" comment="typelib-1_0-GstPlay-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934163" comment="typelib-1_0-GstPlayer-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934164" comment="typelib-1_0-GstTranscoder-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934165" comment="typelib-1_0-GstVa-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934166" comment="typelib-1_0-GstVulkan-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934167" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934168" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934169" comment="typelib-1_0-GstWebRTC-1_0-1.22.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251718" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-activesupport-7.0-7.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-activesupport-7.0-7.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934170" comment="ruby3.2-rubygem-activesupport-7.0-7.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251719" version="1" class="patch">
	<metadata>
		<title>squid-6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<reference ref_id="CVE-2023-5824" ref_url="https://www.suse.com/security/cve/CVE-2023-5824/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5824/">CVE-2023-5824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5824">CVE-2023-5824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934171" comment="squid-6.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251720" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.23.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40184" ref_url="https://www.suse.com/security/cve/CVE-2023-40184/" source="CVE"/>
		<reference ref_id="CVE-2023-42822" ref_url="https://www.suse.com/security/cve/CVE-2023-42822/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.23.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40184/">CVE-2023-40184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40184">CVE-2023-40184 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42822/">CVE-2023-42822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42822">CVE-2023-42822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934172" comment="libpainter0-0.9.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934173" comment="librfxencode0-0.9.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934174" comment="xrdp-0.9.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934175" comment="xrdp-devel-0.9.23.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251721" version="1" class="patch">
	<metadata>
		<title>phpPgAdmin-7.14.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40619" ref_url="https://www.suse.com/security/cve/CVE-2023-40619/" source="CVE"/>
		<description>
These are all security issues fixed in the phpPgAdmin-7.14.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-40619/">CVE-2023-40619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40619">CVE-2023-40619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934176" comment="phpPgAdmin-7.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934177" comment="phpPgAdmin-apache-7.14.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251722" version="1" class="patch">
	<metadata>
		<title>roundcubemail-1.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47272" ref_url="https://www.suse.com/security/cve/CVE-2023-47272/" source="CVE"/>
		<description>
These are all security issues fixed in the roundcubemail-1.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47272/">CVE-2023-47272 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47272">CVE-2023-47272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934178" comment="roundcubemail-1.6.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251723" version="1" class="patch">
	<metadata>
		<title>cosign-2.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46737" ref_url="https://www.suse.com/security/cve/CVE-2023-46737/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46737/">CVE-2023-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46737">CVE-2023-46737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934179" comment="cosign-2.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251724" version="1" class="patch">
	<metadata>
		<title>exiv2-0.28.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44398" ref_url="https://www.suse.com/security/cve/CVE-2023-44398/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.28.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44398/">CVE-2023-44398 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44398">CVE-2023-44398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934180" comment="exiv2-0.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934181" comment="exiv2-lang-0.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934182" comment="libexiv2-28-0.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934183" comment="libexiv2-28-x86-64-v3-0.28.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934184" comment="libexiv2-devel-0.28.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251725" version="1" class="patch">
	<metadata>
		<title>mupdf-1.23.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31794" ref_url="https://www.suse.com/security/cve/CVE-2023-31794/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.23.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31794/">CVE-2023-31794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31794">CVE-2023-31794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934185" comment="mupdf-1.23.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934186" comment="mupdf-devel-static-1.23.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251726" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934188" comment="kernel-macros-6.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934189" comment="kernel-source-6.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934190" comment="kernel-source-vanilla-6.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251727" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934191" comment="go1.20-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934192" comment="go1.20-doc-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934193" comment="go1.20-libstd-1.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934194" comment="go1.20-race-1.20.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251728" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934195" comment="go1.21-1.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934196" comment="go1.21-doc-1.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934197" comment="go1.21-libstd-1.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934198" comment="go1.21-race-1.21.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251729" version="1" class="patch">
	<metadata>
		<title>postgresql11-11.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql11-11.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934199" comment="postgresql11-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934200" comment="postgresql11-contrib-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934201" comment="postgresql11-devel-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934202" comment="postgresql11-docs-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934203" comment="postgresql11-llvmjit-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934204" comment="postgresql11-llvmjit-devel-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934205" comment="postgresql11-plperl-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934206" comment="postgresql11-plpython-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934207" comment="postgresql11-pltcl-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934208" comment="postgresql11-server-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934209" comment="postgresql11-server-devel-11.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934210" comment="postgresql11-test-11.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251730" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934211" comment="postgresql13-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934212" comment="postgresql13-contrib-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934213" comment="postgresql13-devel-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934214" comment="postgresql13-docs-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934215" comment="postgresql13-llvmjit-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934216" comment="postgresql13-llvmjit-devel-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934217" comment="postgresql13-plperl-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934218" comment="postgresql13-plpython-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934219" comment="postgresql13-pltcl-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934220" comment="postgresql13-server-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934221" comment="postgresql13-server-devel-13.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934222" comment="postgresql13-test-13.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251731" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934223" comment="postgresql14-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934224" comment="postgresql14-contrib-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934225" comment="postgresql14-devel-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934226" comment="postgresql14-docs-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934227" comment="postgresql14-llvmjit-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934228" comment="postgresql14-llvmjit-devel-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934229" comment="postgresql14-plperl-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934230" comment="postgresql14-plpython-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934231" comment="postgresql14-pltcl-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934232" comment="postgresql14-server-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934233" comment="postgresql14-server-devel-14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934234" comment="postgresql14-test-14.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251732" version="1" class="patch">
	<metadata>
		<title>binutils-2.41-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-19726" ref_url="https://www.suse.com/security/cve/CVE-2020-19726/" source="CVE"/>
		<reference ref_id="CVE-2021-32256" ref_url="https://www.suse.com/security/cve/CVE-2021-32256/" source="CVE"/>
		<reference ref_id="CVE-2022-35205" ref_url="https://www.suse.com/security/cve/CVE-2022-35205/" source="CVE"/>
		<reference ref_id="CVE-2022-35206" ref_url="https://www.suse.com/security/cve/CVE-2022-35206/" source="CVE"/>
		<reference ref_id="CVE-2022-44840" ref_url="https://www.suse.com/security/cve/CVE-2022-44840/" source="CVE"/>
		<reference ref_id="CVE-2022-45703" ref_url="https://www.suse.com/security/cve/CVE-2022-45703/" source="CVE"/>
		<reference ref_id="CVE-2022-47673" ref_url="https://www.suse.com/security/cve/CVE-2022-47673/" source="CVE"/>
		<reference ref_id="CVE-2022-47695" ref_url="https://www.suse.com/security/cve/CVE-2022-47695/" source="CVE"/>
		<reference ref_id="CVE-2022-47696" ref_url="https://www.suse.com/security/cve/CVE-2022-47696/" source="CVE"/>
		<reference ref_id="CVE-2022-48063" ref_url="https://www.suse.com/security/cve/CVE-2022-48063/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="CVE-2022-48065" ref_url="https://www.suse.com/security/cve/CVE-2022-48065/" source="CVE"/>
		<reference ref_id="CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579/" source="CVE"/>
		<reference ref_id="CVE-2023-1972" ref_url="https://www.suse.com/security/cve/CVE-2023-1972/" source="CVE"/>
		<reference ref_id="CVE-2023-2222" ref_url="https://www.suse.com/security/cve/CVE-2023-2222/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.41-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-19726/">CVE-2020-19726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19726">CVE-2020-19726 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32256/">CVE-2021-32256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32256">CVE-2021-32256 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35205/">CVE-2022-35205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35205">CVE-2022-35205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35206/">CVE-2022-35206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35206">CVE-2022-35206 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44840/">CVE-2022-44840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44840">CVE-2022-44840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45703/">CVE-2022-45703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45703">CVE-2022-45703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47673/">CVE-2022-47673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47673">CVE-2022-47673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47695/">CVE-2022-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47695">CVE-2022-47695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47696/">CVE-2022-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47696">CVE-2022-47696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48063/">CVE-2022-48063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48063">CVE-2022-48063 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48065/">CVE-2022-48065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48065">CVE-2022-48065 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1972/">CVE-2023-1972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2222/">CVE-2023-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934235" comment="binutils-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934236" comment="binutils-devel-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934237" comment="binutils-devel-32bit-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934238" comment="binutils-gold-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934239" comment="gprofng-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934240" comment="libctf-nobfd0-2.41-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934241" comment="libctf0-2.41-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251733" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934242" comment="libmozjs-115-0-115.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934243" comment="mozjs115-115.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934244" comment="mozjs115-devel-115.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251734" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934245" comment="postgresql15-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934246" comment="postgresql15-contrib-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934247" comment="postgresql15-devel-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934248" comment="postgresql15-docs-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934249" comment="postgresql15-llvmjit-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934250" comment="postgresql15-llvmjit-devel-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934251" comment="postgresql15-plperl-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934252" comment="postgresql15-plpython-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934253" comment="postgresql15-pltcl-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934254" comment="postgresql15-server-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934255" comment="postgresql15-server-devel-15.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934256" comment="postgresql15-test-15.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251735" version="1" class="patch">
	<metadata>
		<title>libecpg6-16.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-16.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934257" comment="libecpg6-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934258" comment="libecpg6-32bit-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934259" comment="libpq5-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934260" comment="libpq5-32bit-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934261" comment="postgresql16-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934262" comment="postgresql16-contrib-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934263" comment="postgresql16-devel-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934264" comment="postgresql16-docs-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934265" comment="postgresql16-llvmjit-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934266" comment="postgresql16-llvmjit-devel-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934267" comment="postgresql16-plperl-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934268" comment="postgresql16-plpython-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934269" comment="postgresql16-pltcl-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934270" comment="postgresql16-server-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934271" comment="postgresql16-server-devel-16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934272" comment="postgresql16-test-16.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251736" version="1" class="patch">
	<metadata>
		<title>optipng-0.7.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43907" ref_url="https://www.suse.com/security/cve/CVE-2023-43907/" source="CVE"/>
		<description>
These are all security issues fixed in the optipng-0.7.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43907/">CVE-2023-43907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43907">CVE-2023-43907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934273" comment="optipng-0.7.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251737" version="1" class="patch">
	<metadata>
		<title>postfix-3.8.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32182" ref_url="https://www.suse.com/security/cve/CVE-2023-32182/" source="CVE"/>
		<description>
These are all security issues fixed in the postfix-3.8.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32182/">CVE-2023-32182 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32182">CVE-2023-32182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934274" comment="postfix-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934275" comment="postfix-devel-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934276" comment="postfix-doc-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934277" comment="postfix-ldap-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934278" comment="postfix-mysql-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934279" comment="postfix-postgresql-3.8.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251738" version="1" class="patch">
	<metadata>
		<title>python310-asyncssh-2.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46445" ref_url="https://www.suse.com/security/cve/CVE-2023-46445/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-asyncssh-2.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46445/">CVE-2023-46445 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46445">CVE-2023-46445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934280" comment="python310-asyncssh-2.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934281" comment="python311-asyncssh-2.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934282" comment="python39-asyncssh-2.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251739" version="1" class="patch">
	<metadata>
		<title>traceroute-2.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<description>
These are all security issues fixed in the traceroute-2.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934283" comment="traceroute-2.1.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251740" version="1" class="patch">
	<metadata>
		<title>chromedriver-119.0.6045.123-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5480" ref_url="https://www.suse.com/security/cve/CVE-2023-5480/" source="CVE"/>
		<reference ref_id="CVE-2023-5482" ref_url="https://www.suse.com/security/cve/CVE-2023-5482/" source="CVE"/>
		<reference ref_id="CVE-2023-5849" ref_url="https://www.suse.com/security/cve/CVE-2023-5849/" source="CVE"/>
		<reference ref_id="CVE-2023-5850" ref_url="https://www.suse.com/security/cve/CVE-2023-5850/" source="CVE"/>
		<reference ref_id="CVE-2023-5851" ref_url="https://www.suse.com/security/cve/CVE-2023-5851/" source="CVE"/>
		<reference ref_id="CVE-2023-5852" ref_url="https://www.suse.com/security/cve/CVE-2023-5852/" source="CVE"/>
		<reference ref_id="CVE-2023-5853" ref_url="https://www.suse.com/security/cve/CVE-2023-5853/" source="CVE"/>
		<reference ref_id="CVE-2023-5854" ref_url="https://www.suse.com/security/cve/CVE-2023-5854/" source="CVE"/>
		<reference ref_id="CVE-2023-5855" ref_url="https://www.suse.com/security/cve/CVE-2023-5855/" source="CVE"/>
		<reference ref_id="CVE-2023-5856" ref_url="https://www.suse.com/security/cve/CVE-2023-5856/" source="CVE"/>
		<reference ref_id="CVE-2023-5857" ref_url="https://www.suse.com/security/cve/CVE-2023-5857/" source="CVE"/>
		<reference ref_id="CVE-2023-5858" ref_url="https://www.suse.com/security/cve/CVE-2023-5858/" source="CVE"/>
		<reference ref_id="CVE-2023-5859" ref_url="https://www.suse.com/security/cve/CVE-2023-5859/" source="CVE"/>
		<reference ref_id="CVE-2023-5996" ref_url="https://www.suse.com/security/cve/CVE-2023-5996/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-119.0.6045.123-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5480/">CVE-2023-5480 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5480">CVE-2023-5480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5482/">CVE-2023-5482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5482">CVE-2023-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5849/">CVE-2023-5849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5849">CVE-2023-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5850/">CVE-2023-5850 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5850">CVE-2023-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5851/">CVE-2023-5851 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5851">CVE-2023-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5852/">CVE-2023-5852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5852">CVE-2023-5852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5853/">CVE-2023-5853 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5853">CVE-2023-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5854/">CVE-2023-5854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5854">CVE-2023-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5855/">CVE-2023-5855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5855">CVE-2023-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5856/">CVE-2023-5856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5856">CVE-2023-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5857/">CVE-2023-5857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5857">CVE-2023-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5858/">CVE-2023-5858 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5858">CVE-2023-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5859/">CVE-2023-5859 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5859">CVE-2023-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5996/">CVE-2023-5996 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5996">CVE-2023-5996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934284" comment="chromedriver-119.0.6045.123-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934285" comment="chromium-119.0.6045.123-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251741" version="1" class="patch">
	<metadata>
		<title>connman-1.42-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28488" ref_url="https://www.suse.com/security/cve/CVE-2023-28488/" source="CVE"/>
		<description>
These are all security issues fixed in the connman-1.42-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28488/">CVE-2023-28488 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28488">CVE-2023-28488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934286" comment="connman-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934287" comment="connman-client-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934288" comment="connman-devel-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934289" comment="connman-doc-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934290" comment="connman-nmcompat-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934291" comment="connman-plugin-hh2serial-gps-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934292" comment="connman-plugin-iospm-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934293" comment="connman-plugin-l2tp-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934294" comment="connman-plugin-openconnect-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934295" comment="connman-plugin-openvpn-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934296" comment="connman-plugin-polkit-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934297" comment="connman-plugin-pptp-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934298" comment="connman-plugin-tist-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934299" comment="connman-plugin-vpnc-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934300" comment="connman-plugin-wireguard-1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934301" comment="connman-test-1.42-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251742" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.392-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.392-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934302" comment="java-1_8_0-openjdk-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934303" comment="java-1_8_0-openjdk-accessibility-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934304" comment="java-1_8_0-openjdk-demo-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934305" comment="java-1_8_0-openjdk-devel-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934306" comment="java-1_8_0-openjdk-headless-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934307" comment="java-1_8_0-openjdk-javadoc-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934308" comment="java-1_8_0-openjdk-src-1.8.0.392-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251743" version="1" class="patch">
	<metadata>
		<title>libnbd-1.18.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5871" ref_url="https://www.suse.com/security/cve/CVE-2023-5871/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.18.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5871/">CVE-2023-5871 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5871">CVE-2023-5871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934309" comment="libnbd-1.18.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934310" comment="libnbd-bash-completion-1.18.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934311" comment="libnbd-devel-1.18.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934312" comment="libnbd0-1.18.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934313" comment="nbdfuse-1.18.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934314" comment="python3-libnbd-1.18.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251744" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-119.0.6045.123-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5480" ref_url="https://www.suse.com/security/cve/CVE-2023-5480/" source="CVE"/>
		<reference ref_id="CVE-2023-5482" ref_url="https://www.suse.com/security/cve/CVE-2023-5482/" source="CVE"/>
		<reference ref_id="CVE-2023-5849" ref_url="https://www.suse.com/security/cve/CVE-2023-5849/" source="CVE"/>
		<reference ref_id="CVE-2023-5850" ref_url="https://www.suse.com/security/cve/CVE-2023-5850/" source="CVE"/>
		<reference ref_id="CVE-2023-5851" ref_url="https://www.suse.com/security/cve/CVE-2023-5851/" source="CVE"/>
		<reference ref_id="CVE-2023-5852" ref_url="https://www.suse.com/security/cve/CVE-2023-5852/" source="CVE"/>
		<reference ref_id="CVE-2023-5853" ref_url="https://www.suse.com/security/cve/CVE-2023-5853/" source="CVE"/>
		<reference ref_id="CVE-2023-5854" ref_url="https://www.suse.com/security/cve/CVE-2023-5854/" source="CVE"/>
		<reference ref_id="CVE-2023-5855" ref_url="https://www.suse.com/security/cve/CVE-2023-5855/" source="CVE"/>
		<reference ref_id="CVE-2023-5856" ref_url="https://www.suse.com/security/cve/CVE-2023-5856/" source="CVE"/>
		<reference ref_id="CVE-2023-5857" ref_url="https://www.suse.com/security/cve/CVE-2023-5857/" source="CVE"/>
		<reference ref_id="CVE-2023-5858" ref_url="https://www.suse.com/security/cve/CVE-2023-5858/" source="CVE"/>
		<reference ref_id="CVE-2023-5859" ref_url="https://www.suse.com/security/cve/CVE-2023-5859/" source="CVE"/>
		<reference ref_id="CVE-2023-5996" ref_url="https://www.suse.com/security/cve/CVE-2023-5996/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-119.0.6045.123-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5480/">CVE-2023-5480 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5480">CVE-2023-5480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5482/">CVE-2023-5482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5482">CVE-2023-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5849/">CVE-2023-5849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5849">CVE-2023-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5850/">CVE-2023-5850 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5850">CVE-2023-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5851/">CVE-2023-5851 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5851">CVE-2023-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5852/">CVE-2023-5852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5852">CVE-2023-5852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5853/">CVE-2023-5853 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5853">CVE-2023-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5854/">CVE-2023-5854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5854">CVE-2023-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5855/">CVE-2023-5855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5855">CVE-2023-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5856/">CVE-2023-5856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5856">CVE-2023-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5857/">CVE-2023-5857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5857">CVE-2023-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5858/">CVE-2023-5858 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5858">CVE-2023-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5859/">CVE-2023-5859 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5859">CVE-2023-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5996/">CVE-2023-5996 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5996">CVE-2023-5996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934315" comment="ungoogled-chromium-119.0.6045.123-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934316" comment="ungoogled-chromium-chromedriver-119.0.6045.123-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251745" version="1" class="patch">
	<metadata>
		<title>chromedriver-119.0.6045.159-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5997" ref_url="https://www.suse.com/security/cve/CVE-2023-5997/" source="CVE"/>
		<reference ref_id="CVE-2023-6112" ref_url="https://www.suse.com/security/cve/CVE-2023-6112/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-119.0.6045.159-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5997/">CVE-2023-5997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6112/">CVE-2023-6112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934317" comment="chromedriver-119.0.6045.159-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934318" comment="chromium-119.0.6045.159-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251746" version="1" class="patch">
	<metadata>
		<title>libtommath-devel-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-36328" ref_url="https://www.suse.com/security/cve/CVE-2023-36328/" source="CVE"/>
		<description>
These are all security issues fixed in the libtommath-devel-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36328/">CVE-2023-36328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36328">CVE-2023-36328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934319" comment="libtommath-devel-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934320" comment="libtommath-examples-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934321" comment="libtommath1-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934322" comment="libtommath1-x86-64-v3-1.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251747" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.11.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.11.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934323" comment="libxml2-2-2.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934324" comment="libxml2-2-32bit-2.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934325" comment="libxml2-devel-2.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934326" comment="libxml2-devel-32bit-2.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934327" comment="libxml2-doc-2.11.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934328" comment="libxml2-tools-2.11.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251748" version="1" class="patch">
	<metadata>
		<title>memcached-1.6.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46852" ref_url="https://www.suse.com/security/cve/CVE-2023-46852/" source="CVE"/>
		<reference ref_id="CVE-2023-46853" ref_url="https://www.suse.com/security/cve/CVE-2023-46853/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.6.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46852/">CVE-2023-46852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46852">CVE-2023-46852 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46853/">CVE-2023-46853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46853">CVE-2023-46853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934329" comment="memcached-1.6.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934330" comment="memcached-devel-1.6.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251749" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-23.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934331" comment="libopenssl-1_0_0-devel-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934332" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934333" comment="libopenssl10-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934334" comment="libopenssl1_0_0-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934335" comment="libopenssl1_0_0-32bit-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934336" comment="libopenssl1_0_0-steam-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934337" comment="libopenssl1_0_0-steam-32bit-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934338" comment="openssl-1_0_0-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934339" comment="openssl-1_0_0-cavs-1.0.2u-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934340" comment="openssl-1_0_0-doc-1.0.2u-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251750" version="1" class="patch">
	<metadata>
		<title>openvpn-2.6.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46849" ref_url="https://www.suse.com/security/cve/CVE-2023-46849/" source="CVE"/>
		<reference ref_id="CVE-2023-46850" ref_url="https://www.suse.com/security/cve/CVE-2023-46850/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.6.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46849/">CVE-2023-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46849">CVE-2023-46849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46850/">CVE-2023-46850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46850">CVE-2023-46850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934341" comment="openvpn-2.6.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934342" comment="openvpn-auth-pam-plugin-2.6.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934343" comment="openvpn-devel-2.6.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934344" comment="openvpn-down-root-plugin-2.6.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251751" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-22.10.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46137" ref_url="https://www.suse.com/security/cve/CVE-2023-46137/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-22.10.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46137/">CVE-2023-46137 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46137">CVE-2023-46137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934345" comment="python-Twisted-doc-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934346" comment="python310-Twisted-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934347" comment="python310-Twisted-all_non_platform-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934348" comment="python310-Twisted-conch-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934349" comment="python310-Twisted-conch_nacl-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934350" comment="python310-Twisted-contextvars-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934351" comment="python310-Twisted-http2-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934352" comment="python310-Twisted-serial-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934353" comment="python310-Twisted-tls-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934354" comment="python311-Twisted-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934355" comment="python311-Twisted-all_non_platform-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934356" comment="python311-Twisted-conch-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934357" comment="python311-Twisted-conch_nacl-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934358" comment="python311-Twisted-contextvars-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934359" comment="python311-Twisted-http2-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934360" comment="python311-Twisted-serial-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934361" comment="python311-Twisted-tls-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934362" comment="python39-Twisted-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934363" comment="python39-Twisted-all_non_platform-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934364" comment="python39-Twisted-conch-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934365" comment="python39-Twisted-conch_nacl-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934366" comment="python39-Twisted-contextvars-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934367" comment="python39-Twisted-http2-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934368" comment="python39-Twisted-serial-22.10.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934369" comment="python39-Twisted-tls-22.10.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251752" version="1" class="patch">
	<metadata>
		<title>python310-pyarrow-14.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47248" ref_url="https://www.suse.com/security/cve/CVE-2023-47248/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pyarrow-14.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-47248/">CVE-2023-47248 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47248">CVE-2023-47248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934370" comment="python310-pyarrow-14.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934371" comment="python310-pyarrow-devel-14.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934372" comment="python311-pyarrow-14.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934373" comment="python311-pyarrow-devel-14.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934374" comment="python39-pyarrow-14.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934375" comment="python39-pyarrow-devel-14.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251753" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-activerecord-7.0-7.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-activerecord-7.0-7.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934376" comment="ruby3.2-rubygem-activerecord-7.0-7.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251754" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-rails-7.0-7.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-rails-7.0-7.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934377" comment="ruby3.2-rubygem-rails-7.0-7.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251755" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20231114-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20231114-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934378" comment="ucode-intel-20231114-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251756" version="1" class="patch">
	<metadata>
		<title>python310-yt-dlp-2023.11.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46121" ref_url="https://www.suse.com/security/cve/CVE-2023-46121/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-yt-dlp-2023.11.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46121/">CVE-2023-46121 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46121">CVE-2023-46121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934379" comment="python310-yt-dlp-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934380" comment="python311-yt-dlp-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934381" comment="python39-yt-dlp-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934382" comment="yt-dlp-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934383" comment="yt-dlp-bash-completion-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934384" comment="yt-dlp-fish-completion-2023.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934385" comment="yt-dlp-zsh-completion-2023.11.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251757" version="1" class="patch">
	<metadata>
		<title>gdb-13.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4806" ref_url="https://www.suse.com/security/cve/CVE-2022-4806/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-13.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4806/">CVE-2022-4806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4806">CVE-2022-4806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934386" comment="gdb-13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934387" comment="gdbserver-13.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251758" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1w-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1w-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934388" comment="libopenssl-1_1-devel-1.1.1w-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934389" comment="libopenssl-1_1-devel-32bit-1.1.1w-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934390" comment="libopenssl1_1-1.1.1w-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934391" comment="libopenssl1_1-32bit-1.1.1w-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934392" comment="openssl-1_1-1.1.1w-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934393" comment="openssl-1_1-doc-1.1.1w-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251759" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934394" comment="libopenssl-3-devel-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934395" comment="libopenssl-3-devel-32bit-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934396" comment="libopenssl3-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934397" comment="libopenssl3-32bit-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934398" comment="libopenssl3-x86-64-v3-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934399" comment="openssl-3-3.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934400" comment="openssl-3-doc-3.1.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251760" version="1" class="patch">
	<metadata>
		<title>python310-Pillow-10.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pillow-10.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934401" comment="python310-Pillow-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934402" comment="python310-Pillow-tk-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934403" comment="python311-Pillow-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934404" comment="python311-Pillow-tk-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934405" comment="python39-Pillow-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934406" comment="python39-Pillow-tk-10.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251761" version="1" class="patch">
	<metadata>
		<title>ruby3.2-rubygem-nokogiri-1.15.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23476" ref_url="https://www.suse.com/security/cve/CVE-2022-23476/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.2-rubygem-nokogiri-1.15.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23476/">CVE-2022-23476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23476">CVE-2022-23476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934407" comment="ruby3.2-rubygem-nokogiri-1.15.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251762" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199/" source="CVE"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996/" source="CVE"/>
		<reference ref_id="CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943/" source="CVE"/>
		<reference ref_id="CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<reference ref_id="CVE-2021-43980" ref_url="https://www.suse.com/security/cve/CVE-2021-43980/" source="CVE"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<reference ref_id="CVE-2022-45143" ref_url="https://www.suse.com/security/cve/CVE-2022-45143/" source="CVE"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0199">CVE-2019-0199 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10072">CVE-2019-10072 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11996">CVE-2020-11996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13934">CVE-2020-13934 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13943">CVE-2020-13943 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17527">CVE-2020-17527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25122">CVE-2021-25122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33037">CVE-2021-33037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41079">CVE-2021-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43980/">CVE-2021-43980 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43980">CVE-2021-43980 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45143/">CVE-2022-45143 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45143">CVE-2022-45143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934408" comment="tomcat10-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934409" comment="tomcat10-admin-webapps-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934410" comment="tomcat10-doc-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934411" comment="tomcat10-docs-webapp-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934412" comment="tomcat10-el-5_0-api-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934413" comment="tomcat10-embed-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934414" comment="tomcat10-jsp-3_1-api-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934415" comment="tomcat10-jsvc-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934416" comment="tomcat10-lib-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934417" comment="tomcat10-servlet-6_0-api-10.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934418" comment="tomcat10-webapps-10.1.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251763" version="1" class="patch">
	<metadata>
		<title>xen-4.18.0_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835/" source="CVE"/>
		<reference ref_id="CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.0_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934419" comment="xen-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934420" comment="xen-devel-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934421" comment="xen-doc-html-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934422" comment="xen-libs-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934423" comment="xen-tools-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934424" comment="xen-tools-domU-4.18.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934425" comment="xen-tools-xendomains-wait-disk-4.18.0_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251764" version="1" class="patch">
	<metadata>
		<title>kubevirt-container-disk-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-container-disk-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934426" comment="kubevirt-container-disk-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934427" comment="kubevirt-manifests-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934428" comment="kubevirt-pr-helper-conf-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934429" comment="kubevirt-tests-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934430" comment="kubevirt-virt-api-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934431" comment="kubevirt-virt-controller-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934432" comment="kubevirt-virt-exportproxy-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934433" comment="kubevirt-virt-exportserver-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934434" comment="kubevirt-virt-handler-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934435" comment="kubevirt-virt-launcher-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934436" comment="kubevirt-virt-operator-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934437" comment="kubevirt-virtctl-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934438" comment="obs-service-kubevirt_containers_meta-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251765" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934439" comment="gnutls-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934440" comment="libgnutls-dane-devel-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934441" comment="libgnutls-dane0-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934442" comment="libgnutls-devel-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934443" comment="libgnutls-devel-32bit-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934444" comment="libgnutls30-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934445" comment="libgnutls30-32bit-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934446" comment="libgnutlsxx-devel-3.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934447" comment="libgnutlsxx30-3.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251766" version="1" class="patch">
	<metadata>
		<title>jbig2dec-0.20-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46361" ref_url="https://www.suse.com/security/cve/CVE-2023-46361/" source="CVE"/>
		<description>
These are all security issues fixed in the jbig2dec-0.20-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-46361/">CVE-2023-46361 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46361">CVE-2023-46361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934448" comment="jbig2dec-0.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934449" comment="jbig2dec-devel-0.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934450" comment="libjbig2dec0-0.20-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251767" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-2.9.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-2.9.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934451" comment="libipa_hbac-devel-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934452" comment="libipa_hbac0-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934453" comment="libnfsidmap-sss-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934454" comment="libsss_certmap-devel-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934455" comment="libsss_certmap0-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934456" comment="libsss_idmap-devel-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934457" comment="libsss_idmap0-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934458" comment="libsss_nss_idmap-devel-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934459" comment="libsss_nss_idmap0-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934460" comment="python3-ipa_hbac-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934461" comment="python3-sss-murmur-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934462" comment="python3-sss_nss_idmap-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934463" comment="python3-sssd-config-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934464" comment="sssd-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934465" comment="sssd-ad-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934466" comment="sssd-dbus-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934467" comment="sssd-ipa-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934468" comment="sssd-kcm-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934469" comment="sssd-krb5-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934470" comment="sssd-krb5-common-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934471" comment="sssd-ldap-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934472" comment="sssd-proxy-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934473" comment="sssd-tools-2.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934474" comment="sssd-winbind-idmap-2.9.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251768" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-119.0.6045.159-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5997" ref_url="https://www.suse.com/security/cve/CVE-2023-5997/" source="CVE"/>
		<reference ref_id="CVE-2023-6112" ref_url="https://www.suse.com/security/cve/CVE-2023-6112/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-119.0.6045.159-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5997/">CVE-2023-5997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6112/">CVE-2023-6112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934475" comment="ungoogled-chromium-119.0.6045.159-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934476" comment="ungoogled-chromium-chromedriver-119.0.6045.159-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251769" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934477" comment="libX11-6-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934478" comment="libX11-6-32bit-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934479" comment="libX11-data-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934480" comment="libX11-devel-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934481" comment="libX11-devel-32bit-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934482" comment="libX11-xcb1-1.8.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934483" comment="libX11-xcb1-32bit-1.8.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251770" version="1" class="patch">
	<metadata>
		<title>libgit2-1_7-1.7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_7-1.7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934484" comment="libgit2-1_7-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934485" comment="libgit2-devel-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934486" comment="libgit2-tools-1.7.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251771" version="1" class="patch">
	<metadata>
		<title>doxygen2man-2.0.8+20230721.002171b-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39976" ref_url="https://www.suse.com/security/cve/CVE-2023-39976/" source="CVE"/>
		<description>
These are all security issues fixed in the doxygen2man-2.0.8+20230721.002171b-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39976/">CVE-2023-39976 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39976">CVE-2023-39976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934487" comment="doxygen2man-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934488" comment="libqb-devel-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934489" comment="libqb-devel-32bit-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934490" comment="libqb-tests-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934491" comment="libqb-tools-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934492" comment="libqb100-2.0.8+20230721.002171b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934493" comment="libqb100-32bit-2.0.8+20230721.002171b-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251772" version="1" class="patch">
	<metadata>
		<title>ovmf-202308-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202308-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934494" comment="ovmf-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934495" comment="ovmf-tools-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934496" comment="qemu-ovmf-ia32-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934497" comment="qemu-ovmf-x86_64-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934498" comment="qemu-ovmf-x86_64-debug-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934499" comment="qemu-uefi-aarch32-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934500" comment="qemu-uefi-aarch64-202308-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934501" comment="qemu-uefi-riscv64-202308-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251773" version="1" class="patch">
	<metadata>
		<title>python310-azure-storage-queue-12.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30187" ref_url="https://www.suse.com/security/cve/CVE-2022-30187/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-azure-storage-queue-12.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30187/">CVE-2022-30187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30187">CVE-2022-30187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934502" comment="python310-azure-storage-queue-12.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934503" comment="python311-azure-storage-queue-12.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934504" comment="python39-azure-storage-queue-12.8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251774" version="1" class="patch">
	<metadata>
		<title>python310-mistune2-2.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15612" ref_url="https://www.suse.com/security/cve/CVE-2017-15612/" source="CVE"/>
		<reference ref_id="CVE-2017-16876" ref_url="https://www.suse.com/security/cve/CVE-2017-16876/" source="CVE"/>
		<reference ref_id="CVE-2022-34749" ref_url="https://www.suse.com/security/cve/CVE-2022-34749/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mistune2-2.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15612/">CVE-2017-15612 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15612">CVE-2017-15612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16876/">CVE-2017-16876 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16876">CVE-2017-16876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34749/">CVE-2022-34749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34749">CVE-2022-34749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934505" comment="python310-mistune2-2.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934506" comment="python311-mistune2-2.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934507" comment="python39-mistune2-2.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251775" version="1" class="patch">
	<metadata>
		<title>python310-pip-23.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5752" ref_url="https://www.suse.com/security/cve/CVE-2023-5752/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pip-23.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5752/">CVE-2023-5752 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5752">CVE-2023-5752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934508" comment="python310-pip-23.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934509" comment="python311-pip-23.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934510" comment="python39-pip-23.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251776" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934511" comment="java-11-openj9-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934512" comment="java-11-openj9-demo-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934513" comment="java-11-openj9-devel-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934514" comment="java-11-openj9-headless-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934515" comment="java-11-openj9-javadoc-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934516" comment="java-11-openj9-jmods-11.0.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934517" comment="java-11-openj9-src-11.0.21.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251777" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934518" comment="java-17-openj9-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934519" comment="java-17-openj9-demo-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934520" comment="java-17-openj9-devel-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934521" comment="java-17-openj9-headless-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934522" comment="java-17-openj9-javadoc-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934523" comment="java-17-openj9-jmods-17.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934524" comment="java-17-openj9-src-17.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251778" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.392-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.392-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934525" comment="java-1_8_0-openj9-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934526" comment="java-1_8_0-openj9-accessibility-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934527" comment="java-1_8_0-openj9-demo-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934528" comment="java-1_8_0-openj9-devel-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934529" comment="java-1_8_0-openj9-headless-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934530" comment="java-1_8_0-openj9-javadoc-1.8.0.392-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934531" comment="java-1_8_0-openj9-src-1.8.0.392-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251779" version="1" class="patch">
	<metadata>
		<title>libwireshark16-4.0.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6174" ref_url="https://www.suse.com/security/cve/CVE-2023-6174/" source="CVE"/>
		<reference ref_id="CVE-2023-6175" ref_url="https://www.suse.com/security/cve/CVE-2023-6175/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark16-4.0.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6174/">CVE-2023-6174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6174">CVE-2023-6174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6175/">CVE-2023-6175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6175">CVE-2023-6175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934532" comment="libwireshark16-4.0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934533" comment="libwiretap13-4.0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934534" comment="libwsutil14-4.0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934535" comment="wireshark-4.0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934536" comment="wireshark-devel-4.0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934537" comment="wireshark-ui-qt-4.0.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251780" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934538" comment="MozillaThunderbird-115.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934539" comment="MozillaThunderbird-translations-common-115.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934540" comment="MozillaThunderbird-translations-other-115.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251781" version="1" class="patch">
	<metadata>
		<title>python310-geopandas-0.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47248" ref_url="https://www.suse.com/security/cve/CVE-2023-47248/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-geopandas-0.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-47248/">CVE-2023-47248 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47248">CVE-2023-47248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934541" comment="python310-geopandas-0.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934542" comment="python311-geopandas-0.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934543" comment="python39-geopandas-0.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251782" version="1" class="patch">
	<metadata>
		<title>davix-0.8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<description>
These are all security issues fixed in the davix-0.8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934544" comment="davix-0.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934545" comment="davix-devel-0.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934546" comment="libdavix0-0.8.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251783" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4071" ref_url="https://www.suse.com/security/cve/CVE-2023-4071/" source="CVE"/>
		<reference ref_id="CVE-2023-4074" ref_url="https://www.suse.com/security/cve/CVE-2023-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-4076" ref_url="https://www.suse.com/security/cve/CVE-2023-4076/" source="CVE"/>
		<reference ref_id="CVE-2023-4351" ref_url="https://www.suse.com/security/cve/CVE-2023-4351/" source="CVE"/>
		<reference ref_id="CVE-2023-4354" ref_url="https://www.suse.com/security/cve/CVE-2023-4354/" source="CVE"/>
		<reference ref_id="CVE-2023-4362" ref_url="https://www.suse.com/security/cve/CVE-2023-4362/" source="CVE"/>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<reference ref_id="CVE-2023-4762" ref_url="https://www.suse.com/security/cve/CVE-2023-4762/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="CVE-2023-5218" ref_url="https://www.suse.com/security/cve/CVE-2023-5218/" source="CVE"/>
		<reference ref_id="CVE-2023-5482" ref_url="https://www.suse.com/security/cve/CVE-2023-5482/" source="CVE"/>
		<reference ref_id="CVE-2023-5996" ref_url="https://www.suse.com/security/cve/CVE-2023-5996/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4071/">CVE-2023-4071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4074/">CVE-2023-4074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4076/">CVE-2023-4076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4351/">CVE-2023-4351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4354/">CVE-2023-4354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4362/">CVE-2023-4362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4762/">CVE-2023-4762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4762">CVE-2023-4762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5218/">CVE-2023-5218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5482/">CVE-2023-5482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5482">CVE-2023-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5996/">CVE-2023-5996 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5996">CVE-2023-5996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934547" comment="libQt5Pdf5-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934548" comment="libQt5PdfWidgets5-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934549" comment="libqt5-qtpdf-devel-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934550" comment="libqt5-qtpdf-examples-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934551" comment="libqt5-qtpdf-imports-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934552" comment="libqt5-qtpdf-private-headers-devel-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934553" comment="libqt5-qtwebengine-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934554" comment="libqt5-qtwebengine-devel-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934555" comment="libqt5-qtwebengine-examples-5.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934556" comment="libqt5-qtwebengine-private-headers-devel-5.15.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251784" version="1" class="patch">
	<metadata>
		<title>libntpc1-1.2.2a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4012" ref_url="https://www.suse.com/security/cve/CVE-2023-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libntpc1-1.2.2a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4012/">CVE-2023-4012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4012">CVE-2023-4012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934557" comment="libntpc1-1.2.2a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934558" comment="ntpsec-1.2.2a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934559" comment="ntpsec-devel-1.2.2a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934560" comment="ntpsec-doc-1.2.2a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934561" comment="ntpsec-utils-1.2.2a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934562" comment="python3-ntp-1.2.2a-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251785" version="1" class="patch">
	<metadata>
		<title>cmake-3.27.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<description>
These are all security issues fixed in the cmake-3.27.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934563" comment="cmake-3.27.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251786" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47627" ref_url="https://www.suse.com/security/cve/CVE-2023-47627/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47627/">CVE-2023-47627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47627">CVE-2023-47627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934564" comment="python310-aiohttp-3.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934565" comment="python311-aiohttp-3.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934566" comment="python39-aiohttp-3.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251787" version="1" class="patch">
	<metadata>
		<title>velero-1.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934567" comment="velero-1.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934568" comment="velero-bash-completion-1.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934569" comment="velero-fish-completion-1.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934570" comment="velero-zsh-completion-1.12.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251788" version="1" class="patch">
	<metadata>
		<title>xwayland-23.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934571" comment="xwayland-23.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934572" comment="xwayland-devel-23.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251789" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-120.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6210" ref_url="https://www.suse.com/security/cve/CVE-2023-6210/" source="CVE"/>
		<reference ref_id="CVE-2023-6211" ref_url="https://www.suse.com/security/cve/CVE-2023-6211/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="CVE-2023-6213" ref_url="https://www.suse.com/security/cve/CVE-2023-6213/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-120.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6210/">CVE-2023-6210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6210">CVE-2023-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6211/">CVE-2023-6211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6211">CVE-2023-6211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6213/">CVE-2023-6213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6213">CVE-2023-6213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934573" comment="MozillaFirefox-120.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934574" comment="MozillaFirefox-branding-upstream-120.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934575" comment="MozillaFirefox-devel-120.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934576" comment="MozillaFirefox-translations-common-120.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934577" comment="MozillaFirefox-translations-other-120.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251790" version="1" class="patch">
	<metadata>
		<title>docker-24.0.7_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-24.0.7_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934578" comment="docker-24.0.7_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934579" comment="docker-bash-completion-24.0.7_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934580" comment="docker-fish-completion-24.0.7_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934581" comment="docker-rootless-extras-24.0.7_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934582" comment="docker-zsh-completion-24.0.7_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251791" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934583" comment="libQt5Bootstrap-devel-static-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934584" comment="libQt5Bootstrap-devel-static-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934585" comment="libQt5Concurrent-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934586" comment="libQt5Concurrent-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934587" comment="libQt5Concurrent5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934588" comment="libQt5Concurrent5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934589" comment="libQt5Core-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934590" comment="libQt5Core-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934591" comment="libQt5Core-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934592" comment="libQt5Core5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934593" comment="libQt5Core5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934594" comment="libQt5DBus-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934595" comment="libQt5DBus-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934596" comment="libQt5DBus-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934597" comment="libQt5DBus5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934598" comment="libQt5DBus5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934599" comment="libQt5Gui-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934600" comment="libQt5Gui-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934601" comment="libQt5Gui-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934602" comment="libQt5Gui5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934603" comment="libQt5Gui5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934604" comment="libQt5KmsSupport-devel-static-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934605" comment="libQt5KmsSupport-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934606" comment="libQt5Network-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934607" comment="libQt5Network-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934608" comment="libQt5Network-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934609" comment="libQt5Network5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934610" comment="libQt5Network5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934611" comment="libQt5OpenGL-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934612" comment="libQt5OpenGL-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934613" comment="libQt5OpenGL-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934614" comment="libQt5OpenGL5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934615" comment="libQt5OpenGL5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934616" comment="libQt5OpenGLExtensions-devel-static-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934617" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934618" comment="libQt5PlatformHeaders-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934619" comment="libQt5PlatformSupport-devel-static-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934620" comment="libQt5PlatformSupport-devel-static-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934621" comment="libQt5PlatformSupport-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934622" comment="libQt5PrintSupport-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934623" comment="libQt5PrintSupport-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934624" comment="libQt5PrintSupport-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934625" comment="libQt5PrintSupport5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934626" comment="libQt5PrintSupport5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934627" comment="libQt5Sql-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934628" comment="libQt5Sql-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934629" comment="libQt5Sql-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934630" comment="libQt5Sql5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934631" comment="libQt5Sql5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934632" comment="libQt5Sql5-mysql-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934633" comment="libQt5Sql5-mysql-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934634" comment="libQt5Sql5-postgresql-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934635" comment="libQt5Sql5-postgresql-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934636" comment="libQt5Sql5-sqlite-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934637" comment="libQt5Sql5-sqlite-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934638" comment="libQt5Sql5-unixODBC-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934639" comment="libQt5Sql5-unixODBC-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934640" comment="libQt5Test-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934641" comment="libQt5Test-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934642" comment="libQt5Test-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934643" comment="libQt5Test5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934644" comment="libQt5Test5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934645" comment="libQt5Widgets-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934646" comment="libQt5Widgets-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934647" comment="libQt5Widgets-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934648" comment="libQt5Widgets5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934649" comment="libQt5Widgets5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934650" comment="libQt5Xml-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934651" comment="libQt5Xml-devel-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934652" comment="libQt5Xml5-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934653" comment="libQt5Xml5-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934654" comment="libqt5-qtbase-common-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934655" comment="libqt5-qtbase-devel-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934656" comment="libqt5-qtbase-examples-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934657" comment="libqt5-qtbase-examples-32bit-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934658" comment="libqt5-qtbase-platformtheme-gtk3-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934659" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.11+kde138-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934660" comment="libqt5-qtbase-private-headers-devel-5.15.11+kde138-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251792" version="1" class="patch">
	<metadata>
		<title>jcasgen-maven-plugin-3.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39913" ref_url="https://www.suse.com/security/cve/CVE-2023-39913/" source="CVE"/>
		<description>
These are all security issues fixed in the jcasgen-maven-plugin-3.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39913/">CVE-2023-39913 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39913">CVE-2023-39913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934661" comment="jcasgen-maven-plugin-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934662" comment="uima-pear-maven-plugin-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934663" comment="uimaj-3.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934664" comment="uimaj-javadoc-3.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251793" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-41.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-41.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934665" comment="python310-cryptography-41.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934666" comment="python311-cryptography-41.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934667" comment="python39-cryptography-41.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251794" version="1" class="patch">
	<metadata>
		<title>chromedriver-119.0.6045.199-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6346" ref_url="https://www.suse.com/security/cve/CVE-2023-6346/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6348" ref_url="https://www.suse.com/security/cve/CVE-2023-6348/" source="CVE"/>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-119.0.6045.199-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6346/">CVE-2023-6346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6348/">CVE-2023-6348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6348">CVE-2023-6348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934668" comment="chromedriver-119.0.6045.199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934669" comment="chromium-119.0.6045.199-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251795" version="1" class="patch">
	<metadata>
		<title>gerbv-2.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4508" ref_url="https://www.suse.com/security/cve/CVE-2023-4508/" source="CVE"/>
		<description>
These are all security issues fixed in the gerbv-2.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4508/">CVE-2023-4508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4508">CVE-2023-4508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934670" comment="gerbv-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934671" comment="gerbv-devel-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934672" comment="libgerbv1-2.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251796" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20231128-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345/" source="CVE"/>
		<reference ref_id="CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820/" source="CVE"/>
		<reference ref_id="CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20231128-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934673" comment="kernel-firmware-all-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934674" comment="kernel-firmware-amdgpu-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934675" comment="kernel-firmware-ath10k-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934676" comment="kernel-firmware-ath11k-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934677" comment="kernel-firmware-atheros-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934678" comment="kernel-firmware-bluetooth-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934679" comment="kernel-firmware-bnx2-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934680" comment="kernel-firmware-brcm-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934681" comment="kernel-firmware-chelsio-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934682" comment="kernel-firmware-dpaa2-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934683" comment="kernel-firmware-i915-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934684" comment="kernel-firmware-intel-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934685" comment="kernel-firmware-iwlwifi-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934686" comment="kernel-firmware-liquidio-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934687" comment="kernel-firmware-marvell-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934688" comment="kernel-firmware-media-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934689" comment="kernel-firmware-mediatek-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934690" comment="kernel-firmware-mellanox-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934691" comment="kernel-firmware-mwifiex-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934692" comment="kernel-firmware-network-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934693" comment="kernel-firmware-nfp-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934694" comment="kernel-firmware-nvidia-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934695" comment="kernel-firmware-platform-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934696" comment="kernel-firmware-prestera-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934697" comment="kernel-firmware-qcom-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934698" comment="kernel-firmware-qlogic-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934699" comment="kernel-firmware-radeon-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934700" comment="kernel-firmware-realtek-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934701" comment="kernel-firmware-serial-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934702" comment="kernel-firmware-sound-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934703" comment="kernel-firmware-ti-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934704" comment="kernel-firmware-ueagle-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934705" comment="kernel-firmware-usb-network-20231128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934706" comment="ucode-amd-20231128-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251797" version="1" class="patch">
	<metadata>
		<title>avif-tools-1.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<description>
These are all security issues fixed in the avif-tools-1.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934707" comment="avif-tools-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934708" comment="gdk-pixbuf-loader-libavif-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934709" comment="libavif-devel-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934710" comment="libavif16-1.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934711" comment="libavif16-32bit-1.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251798" version="1" class="patch">
	<metadata>
		<title>qbittorrent-4.6.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30801" ref_url="https://www.suse.com/security/cve/CVE-2023-30801/" source="CVE"/>
		<description>
These are all security issues fixed in the qbittorrent-4.6.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30801/">CVE-2023-30801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30801">CVE-2023-30801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934712" comment="qbittorrent-4.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934713" comment="qbittorrent-nox-4.6.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251799" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-31.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934714" comment="avahi-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934715" comment="avahi-autoipd-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934716" comment="avahi-compat-howl-devel-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934717" comment="avahi-compat-mDNSResponder-devel-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934718" comment="avahi-lang-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934719" comment="avahi-utils-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934720" comment="libavahi-client3-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934721" comment="libavahi-client3-32bit-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934722" comment="libavahi-common3-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934723" comment="libavahi-common3-32bit-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934724" comment="libavahi-core7-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934725" comment="libavahi-devel-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934726" comment="libavahi-libevent1-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934727" comment="libdns_sd-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934728" comment="libdns_sd-32bit-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934729" comment="libhowl0-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934730" comment="python310-avahi-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934731" comment="python311-avahi-0.8-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934732" comment="python39-avahi-0.8-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251800" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.38.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47038" ref_url="https://www.suse.com/security/cve/CVE-2023-47038/" source="CVE"/>
		<reference ref_id="CVE-2023-47039" ref_url="https://www.suse.com/security/cve/CVE-2023-47039/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.38.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47038/">CVE-2023-47038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47039/">CVE-2023-47039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47039">CVE-2023-47039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934733" comment="perl-5.38.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934734" comment="perl-32bit-5.38.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934735" comment="perl-base-5.38.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934736" comment="perl-base-32bit-5.38.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934737" comment="perl-doc-5.38.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251801" version="1" class="patch">
	<metadata>
		<title>python310-pandas-2.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47248" ref_url="https://www.suse.com/security/cve/CVE-2023-47248/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pandas-2.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-47248/">CVE-2023-47248 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47248">CVE-2023-47248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934738" comment="python310-pandas-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934739" comment="python310-pandas-all-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934740" comment="python310-pandas-clipboard-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934741" comment="python310-pandas-compression-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934742" comment="python310-pandas-computation-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934743" comment="python310-pandas-excel-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934744" comment="python310-pandas-feather-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934745" comment="python310-pandas-fss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934746" comment="python310-pandas-hdf5-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934747" comment="python310-pandas-html-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934748" comment="python310-pandas-mysql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934749" comment="python310-pandas-output_formatting-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934750" comment="python310-pandas-parquet-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934751" comment="python310-pandas-performance-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934752" comment="python310-pandas-plot-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934753" comment="python310-pandas-postgresql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934754" comment="python310-pandas-spss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934755" comment="python310-pandas-sql-other-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934756" comment="python310-pandas-test-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934757" comment="python310-pandas-xml-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934758" comment="python311-pandas-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934759" comment="python311-pandas-all-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934760" comment="python311-pandas-clipboard-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934761" comment="python311-pandas-compression-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934762" comment="python311-pandas-computation-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934763" comment="python311-pandas-excel-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934764" comment="python311-pandas-feather-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934765" comment="python311-pandas-fss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934766" comment="python311-pandas-hdf5-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934767" comment="python311-pandas-html-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934768" comment="python311-pandas-mysql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934769" comment="python311-pandas-output_formatting-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934770" comment="python311-pandas-parquet-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934771" comment="python311-pandas-performance-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934772" comment="python311-pandas-plot-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934773" comment="python311-pandas-postgresql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934774" comment="python311-pandas-spss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934775" comment="python311-pandas-sql-other-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934776" comment="python311-pandas-test-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934777" comment="python311-pandas-xml-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934778" comment="python39-pandas-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934779" comment="python39-pandas-all-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934780" comment="python39-pandas-clipboard-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934781" comment="python39-pandas-compression-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934782" comment="python39-pandas-computation-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934783" comment="python39-pandas-excel-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934784" comment="python39-pandas-feather-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934785" comment="python39-pandas-fss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934786" comment="python39-pandas-hdf5-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934787" comment="python39-pandas-html-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934788" comment="python39-pandas-mysql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934789" comment="python39-pandas-output_formatting-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934790" comment="python39-pandas-parquet-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934791" comment="python39-pandas-performance-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934792" comment="python39-pandas-plot-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934793" comment="python39-pandas-postgresql-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934794" comment="python39-pandas-spss-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934795" comment="python39-pandas-sql-other-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934796" comment="python39-pandas-test-2.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934797" comment="python39-pandas-xml-2.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251802" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-119.0.6045.199-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6346" ref_url="https://www.suse.com/security/cve/CVE-2023-6346/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6348" ref_url="https://www.suse.com/security/cve/CVE-2023-6348/" source="CVE"/>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-119.0.6045.199-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6346/">CVE-2023-6346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6348/">CVE-2023-6348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6348">CVE-2023-6348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934798" comment="ungoogled-chromium-119.0.6045.199-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934799" comment="ungoogled-chromium-chromedriver-119.0.6045.199-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251803" version="1" class="patch">
	<metadata>
		<title>libvarnishapi3-7.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi3-7.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934800" comment="libvarnishapi3-7.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934801" comment="varnish-7.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934802" comment="varnish-devel-7.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251804" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6346" ref_url="https://www.suse.com/security/cve/CVE-2023-6346/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6346/">CVE-2023-6346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934803" comment="nodejs-electron-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934804" comment="nodejs-electron-devel-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934805" comment="nodejs-electron-doc-27.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251805" version="1" class="patch">
	<metadata>
		<title>shotcut-23.11.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
These are all security issues fixed in the shotcut-23.11.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934806" comment="shotcut-23.11.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934807" comment="shotcut-lang-23.11.29-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251806" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.15.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.15.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934808" comment="ansible-core-2.15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934809" comment="ansible-test-2.15.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251807" version="1" class="patch">
	<metadata>
		<title>ansible-documentation-2.15.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-documentation-2.15.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934810" comment="ansible-documentation-2.15.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251808" version="1" class="patch">
	<metadata>
		<title>frr-8.4-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934811" comment="frr-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934812" comment="frr-devel-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934813" comment="libfrr0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934814" comment="libfrr_pb0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934815" comment="libfrrcares0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934816" comment="libfrrfpm_pb0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934817" comment="libfrrospfapiclient0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934818" comment="libfrrsnmp0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934819" comment="libfrrzmq0-8.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934820" comment="libmlag_pb0-8.4-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251809" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48560" ref_url="https://www.suse.com/security/cve/CVE-2022-48560/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-41.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48560/">CVE-2022-48560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934821" comment="python-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934822" comment="python-32bit-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934823" comment="python-curses-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934824" comment="python-demo-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934825" comment="python-gdbm-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934826" comment="python-idle-2.7.18-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934827" comment="python-tk-2.7.18-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251810" version="1" class="patch">
	<metadata>
		<title>python310-jupyter-server-2.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49080" ref_url="https://www.suse.com/security/cve/CVE-2023-49080/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jupyter-server-2.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49080/">CVE-2023-49080 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49080">CVE-2023-49080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934828" comment="python310-jupyter-server-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934829" comment="python310-jupyter-server-test-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934830" comment="python311-jupyter-server-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934831" comment="python311-jupyter-server-test-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934832" comment="python39-jupyter-server-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934833" comment="python39-jupyter-server-test-2.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251811" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.15p2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42456" ref_url="https://www.suse.com/security/cve/CVE-2023-42456/" source="CVE"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.15p2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-42456/">CVE-2023-42456 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42456">CVE-2023-42456 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934834" comment="sudo-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934835" comment="sudo-devel-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934836" comment="sudo-plugin-python-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934837" comment="sudo-policy-sudo-auth-self-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934838" comment="sudo-policy-wheel-auth-self-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934839" comment="sudo-test-1.9.15p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934840" comment="system-group-sudo-1.9.15p2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251812" version="1" class="patch">
	<metadata>
		<title>go1.20-1.20.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.20-1.20.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934841" comment="go1.20-1.20.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934842" comment="go1.20-doc-1.20.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934843" comment="go1.20-libstd-1.20.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934844" comment="go1.20-race-1.20.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251813" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934845" comment="go1.21-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934846" comment="go1.21-doc-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934847" comment="go1.21-libstd-1.21.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934848" comment="go1.21-race-1.21.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251814" version="1" class="patch">
	<metadata>
		<title>python310-pydrive2-1.16.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49297" ref_url="https://www.suse.com/security/cve/CVE-2023-49297/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pydrive2-1.16.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49297/">CVE-2023-49297 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49297">CVE-2023-49297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934849" comment="python310-pydrive2-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934850" comment="python311-pydrive2-1.16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934851" comment="python39-pydrive2-1.16.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251815" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.6.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-25435" ref_url="https://www.suse.com/security/cve/CVE-2023-25435/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.6.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25435/">CVE-2023-25435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25435">CVE-2023-25435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934852" comment="libtiff-devel-4.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934853" comment="libtiff-devel-32bit-4.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934854" comment="libtiff6-4.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934855" comment="libtiff6-32bit-4.6.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934856" comment="tiff-4.6.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251816" version="1" class="patch">
	<metadata>
		<title>caddy-2.7.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<description>
These are all security issues fixed in the caddy-2.7.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934857" comment="caddy-2.7.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251817" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.78.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.78.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-24593">CVE-2023-24593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934858" comment="gio-branding-upstream-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934859" comment="glib2-devel-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934860" comment="glib2-devel-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934861" comment="glib2-devel-static-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934862" comment="glib2-lang-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934863" comment="glib2-tests-devel-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934864" comment="glib2-tools-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934865" comment="glib2-tools-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934866" comment="libgio-2_0-0-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934867" comment="libgio-2_0-0-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934868" comment="libglib-2_0-0-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934869" comment="libglib-2_0-0-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934870" comment="libgmodule-2_0-0-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934871" comment="libgmodule-2_0-0-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934872" comment="libgobject-2_0-0-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934873" comment="libgobject-2_0-0-32bit-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934874" comment="libgthread-2_0-0-2.78.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934875" comment="libgthread-2_0-0-32bit-2.78.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251818" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934876" comment="krb5-appl-clients-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934877" comment="krb5-appl-servers-1.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251819" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.25.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26768" ref_url="https://www.suse.com/security/cve/CVE-2023-26768/" source="CVE"/>
		<reference ref_id="CVE-2023-26769" ref_url="https://www.suse.com/security/cve/CVE-2023-26769/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.25.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26768/">CVE-2023-26768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26768">CVE-2023-26768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26769/">CVE-2023-26769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26769">CVE-2023-26769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934878" comment="liblouis-data-3.25.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934879" comment="liblouis-devel-3.25.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934880" comment="liblouis-doc-3.25.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934881" comment="liblouis-tools-3.25.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934882" comment="liblouis20-3.25.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934883" comment="python3-louis-3.25.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251820" version="1" class="patch">
	<metadata>
		<title>python310-MechanicalSoup-1.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34457" ref_url="https://www.suse.com/security/cve/CVE-2023-34457/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-MechanicalSoup-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34457/">CVE-2023-34457 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34457">CVE-2023-34457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934884" comment="python310-MechanicalSoup-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934885" comment="python311-MechanicalSoup-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934886" comment="python39-MechanicalSoup-1.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251821" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.57.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.57.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934887" comment="gdk-pixbuf-loader-rsvg-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934888" comment="gdk-pixbuf-loader-rsvg-32bit-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934889" comment="librsvg-2-2-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934890" comment="librsvg-2-2-32bit-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934891" comment="librsvg-devel-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934892" comment="rsvg-convert-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934893" comment="rsvg-thumbnailer-2.57.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934894" comment="typelib-1_0-Rsvg-2_0-2.57.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251822" version="1" class="patch">
	<metadata>
		<title>fish-3.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49284" ref_url="https://www.suse.com/security/cve/CVE-2023-49284/" source="CVE"/>
		<description>
These are all security issues fixed in the fish-3.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-49284/">CVE-2023-49284 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49284">CVE-2023-49284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934895" comment="fish-3.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934896" comment="fish-devel-3.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251823" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.17.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49462" ref_url="https://www.suse.com/security/cve/CVE-2023-49462/" source="CVE"/>
		<reference ref_id="CVE-2023-49464" ref_url="https://www.suse.com/security/cve/CVE-2023-49464/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.17.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49462/">CVE-2023-49462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49462">CVE-2023-49462 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49464/">CVE-2023-49464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49464">CVE-2023-49464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934897" comment="gdk-pixbuf-loader-libheif-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934898" comment="libheif-aom-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934899" comment="libheif-dav1d-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934900" comment="libheif-devel-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934901" comment="libheif-ffmpeg-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934902" comment="libheif-jpeg-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934903" comment="libheif-openjpeg-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934904" comment="libheif-rav1e-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934905" comment="libheif-svtenc-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934906" comment="libheif1-1.17.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934907" comment="libheif1-32bit-1.17.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251824" version="1" class="patch">
	<metadata>
		<title>gnome-shell-search-provider-nautilus-45.2.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37290" ref_url="https://www.suse.com/security/cve/CVE-2022-37290/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-search-provider-nautilus-45.2.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37290/">CVE-2022-37290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37290">CVE-2022-37290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934908" comment="gnome-shell-search-provider-nautilus-45.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934909" comment="libnautilus-extension4-45.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934910" comment="nautilus-45.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934911" comment="nautilus-devel-45.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934912" comment="nautilus-lang-45.2.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934913" comment="typelib-1_0-Nautilus-4_0-45.2.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251825" version="1" class="patch">
	<metadata>
		<title>freerdp-2.11.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24882" ref_url="https://www.suse.com/security/cve/CVE-2022-24882/" source="CVE"/>
		<reference ref_id="CVE-2022-24883" ref_url="https://www.suse.com/security/cve/CVE-2022-24883/" source="CVE"/>
		<reference ref_id="CVE-2023-39350" ref_url="https://www.suse.com/security/cve/CVE-2023-39350/" source="CVE"/>
		<reference ref_id="CVE-2023-39351" ref_url="https://www.suse.com/security/cve/CVE-2023-39351/" source="CVE"/>
		<reference ref_id="CVE-2023-39352" ref_url="https://www.suse.com/security/cve/CVE-2023-39352/" source="CVE"/>
		<reference ref_id="CVE-2023-39353" ref_url="https://www.suse.com/security/cve/CVE-2023-39353/" source="CVE"/>
		<reference ref_id="CVE-2023-39354" ref_url="https://www.suse.com/security/cve/CVE-2023-39354/" source="CVE"/>
		<reference ref_id="CVE-2023-39356" ref_url="https://www.suse.com/security/cve/CVE-2023-39356/" source="CVE"/>
		<reference ref_id="CVE-2023-40181" ref_url="https://www.suse.com/security/cve/CVE-2023-40181/" source="CVE"/>
		<reference ref_id="CVE-2023-40186" ref_url="https://www.suse.com/security/cve/CVE-2023-40186/" source="CVE"/>
		<reference ref_id="CVE-2023-40188" ref_url="https://www.suse.com/security/cve/CVE-2023-40188/" source="CVE"/>
		<reference ref_id="CVE-2023-40567" ref_url="https://www.suse.com/security/cve/CVE-2023-40567/" source="CVE"/>
		<reference ref_id="CVE-2023-40569" ref_url="https://www.suse.com/security/cve/CVE-2023-40569/" source="CVE"/>
		<reference ref_id="CVE-2023-40589" ref_url="https://www.suse.com/security/cve/CVE-2023-40589/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.11.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24882/">CVE-2022-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24882">CVE-2022-24882 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24883/">CVE-2022-24883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24883">CVE-2022-24883 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39350/">CVE-2023-39350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39350">CVE-2023-39350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39351/">CVE-2023-39351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39351">CVE-2023-39351 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39352/">CVE-2023-39352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39352">CVE-2023-39352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39353/">CVE-2023-39353 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39353">CVE-2023-39353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39354/">CVE-2023-39354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39354">CVE-2023-39354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39356/">CVE-2023-39356 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39356">CVE-2023-39356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40181/">CVE-2023-40181 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40181">CVE-2023-40181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40186/">CVE-2023-40186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40186">CVE-2023-40186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40188/">CVE-2023-40188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40188">CVE-2023-40188 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40567/">CVE-2023-40567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40567">CVE-2023-40567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40569/">CVE-2023-40569 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40569">CVE-2023-40569 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40589/">CVE-2023-40589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40589">CVE-2023-40589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934914" comment="freerdp-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934915" comment="freerdp-devel-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934916" comment="freerdp-proxy-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934917" comment="freerdp-server-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934918" comment="freerdp-wayland-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934919" comment="libfreerdp2-2-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934920" comment="libuwac0-0-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934921" comment="libwinpr2-2-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934922" comment="uwac0-0-devel-2.11.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934923" comment="winpr-devel-2.11.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251826" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.22.7-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44429" ref_url="https://www.suse.com/security/cve/CVE-2023-44429/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.22.7-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44429/">CVE-2023-44429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44429">CVE-2023-44429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934924" comment="gstreamer-plugins-bad-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934925" comment="gstreamer-plugins-bad-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934926" comment="gstreamer-plugins-bad-chromaprint-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934927" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934928" comment="gstreamer-plugins-bad-devel-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934929" comment="gstreamer-plugins-bad-fluidsynth-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934930" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934931" comment="gstreamer-plugins-bad-lang-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934932" comment="gstreamer-transcoder-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934933" comment="gstreamer-transcoder-devel-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934934" comment="libgstadaptivedemux-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934935" comment="libgstadaptivedemux-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934936" comment="libgstbadaudio-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934937" comment="libgstbadaudio-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934938" comment="libgstbasecamerabinsrc-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934939" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934940" comment="libgstcodecparsers-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934941" comment="libgstcodecparsers-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934942" comment="libgstcodecs-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934943" comment="libgstcodecs-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934944" comment="libgstcuda-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934945" comment="libgstcuda-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934946" comment="libgstinsertbin-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934947" comment="libgstinsertbin-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934948" comment="libgstisoff-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934949" comment="libgstisoff-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934950" comment="libgstmpegts-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934951" comment="libgstmpegts-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934952" comment="libgstphotography-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934953" comment="libgstphotography-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934954" comment="libgstplay-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934955" comment="libgstplay-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934956" comment="libgstplayer-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934957" comment="libgstplayer-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934958" comment="libgstsctp-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934959" comment="libgstsctp-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934960" comment="libgsttranscoder-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934961" comment="libgsttranscoder-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934962" comment="libgsturidownloader-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934963" comment="libgsturidownloader-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934964" comment="libgstva-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934965" comment="libgstva-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934966" comment="libgstvulkan-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934967" comment="libgstvulkan-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934968" comment="libgstwayland-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934969" comment="libgstwayland-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934970" comment="libgstwebrtc-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934971" comment="libgstwebrtc-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934972" comment="libgstwebrtcnice-1_0-0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934973" comment="libgstwebrtcnice-1_0-0-32bit-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934974" comment="typelib-1_0-CudaGst-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934975" comment="typelib-1_0-GstBadAudio-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934976" comment="typelib-1_0-GstCodecs-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934977" comment="typelib-1_0-GstCuda-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934978" comment="typelib-1_0-GstInsertBin-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934979" comment="typelib-1_0-GstMpegts-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934980" comment="typelib-1_0-GstPlay-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934981" comment="typelib-1_0-GstPlayer-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934982" comment="typelib-1_0-GstTranscoder-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934983" comment="typelib-1_0-GstVa-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934984" comment="typelib-1_0-GstVulkan-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934985" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934986" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934987" comment="typelib-1_0-GstWebRTC-1_0-1.22.7-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251827" version="1" class="patch">
	<metadata>
		<title>traefik-2.10.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-47106" ref_url="https://www.suse.com/security/cve/CVE-2023-47106/" source="CVE"/>
		<reference ref_id="CVE-2023-47124" ref_url="https://www.suse.com/security/cve/CVE-2023-47124/" source="CVE"/>
		<reference ref_id="CVE-2023-47633" ref_url="https://www.suse.com/security/cve/CVE-2023-47633/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-2.10.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47106/">CVE-2023-47106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47106">CVE-2023-47106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47124/">CVE-2023-47124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47124">CVE-2023-47124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47633/">CVE-2023-47633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47633">CVE-2023-47633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934988" comment="traefik-2.10.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251828" version="1" class="patch">
	<metadata>
		<title>bluez-5.70-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.70-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009934989" comment="bluez-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934990" comment="bluez-auto-enable-devices-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934991" comment="bluez-cups-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934992" comment="bluez-deprecated-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934993" comment="bluez-devel-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934994" comment="bluez-devel-32bit-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934995" comment="bluez-obexd-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934996" comment="bluez-test-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934997" comment="bluez-zsh-completion-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934998" comment="libbluetooth3-5.70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009934999" comment="libbluetooth3-32bit-5.70-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251829" version="1" class="patch">
	<metadata>
		<title>budgie-app-launcher-applet-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49342" ref_url="https://www.suse.com/security/cve/CVE-2023-49342/" source="CVE"/>
		<reference ref_id="CVE-2023-49343" ref_url="https://www.suse.com/security/cve/CVE-2023-49343/" source="CVE"/>
		<reference ref_id="CVE-2023-49344" ref_url="https://www.suse.com/security/cve/CVE-2023-49344/" source="CVE"/>
		<reference ref_id="CVE-2023-49345" ref_url="https://www.suse.com/security/cve/CVE-2023-49345/" source="CVE"/>
		<reference ref_id="CVE-2023-49346" ref_url="https://www.suse.com/security/cve/CVE-2023-49346/" source="CVE"/>
		<reference ref_id="CVE-2023-49347" ref_url="https://www.suse.com/security/cve/CVE-2023-49347/" source="CVE"/>
		<description>
These are all security issues fixed in the budgie-app-launcher-applet-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49342/">CVE-2023-49342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49342">CVE-2023-49342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49343/">CVE-2023-49343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49343">CVE-2023-49343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49344/">CVE-2023-49344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49344">CVE-2023-49344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49345/">CVE-2023-49345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49345">CVE-2023-49345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49346/">CVE-2023-49346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49346">CVE-2023-49346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49347/">CVE-2023-49347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49347">CVE-2023-49347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935000" comment="budgie-app-launcher-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935001" comment="budgie-applications-menu-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935002" comment="budgie-brightness-controller-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935003" comment="budgie-clockworks-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935004" comment="budgie-countdown-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935005" comment="budgie-dropby-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935006" comment="budgie-extras-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935007" comment="budgie-extras-daemon-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935008" comment="budgie-extras-lang-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935009" comment="budgie-fuzzyclock-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935010" comment="budgie-hotcorners-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935011" comment="budgie-kangaroo-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935012" comment="budgie-keyboard-autoswitch-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935013" comment="budgie-network-manager-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935014" comment="budgie-previews-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935015" comment="budgie-quickchar-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935016" comment="budgie-quicknote-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935017" comment="budgie-recentlyused-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935018" comment="budgie-rotation-lock-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935019" comment="budgie-showtime-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935020" comment="budgie-takeabreak-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935021" comment="budgie-visualspace-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935022" comment="budgie-wallstreet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935023" comment="budgie-weathershow-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935024" comment="budgie-window-shuffler-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935025" comment="budgie-workspace-stopwatch-applet-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935026" comment="budgie-workspace-wallpaper-applet-1.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251830" version="1" class="patch">
	<metadata>
		<title>curl-8.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<reference ref_id="CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935027" comment="curl-8.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935028" comment="libcurl-devel-8.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935029" comment="libcurl-devel-32bit-8.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935030" comment="libcurl4-8.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935031" comment="libcurl4-32bit-8.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251831" version="1" class="patch">
	<metadata>
		<title>python3-bandit-1.7.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24439" ref_url="https://www.suse.com/security/cve/CVE-2022-24439/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-bandit-1.7.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24439/">CVE-2022-24439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24439">CVE-2022-24439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935032" comment="python3-bandit-1.7.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251832" version="1" class="patch">
	<metadata>
		<title>python312-3.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6507" ref_url="https://www.suse.com/security/cve/CVE-2023-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6507/">CVE-2023-6507 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6507">CVE-2023-6507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935033" comment="python312-3.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935034" comment="python312-curses-3.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935035" comment="python312-dbm-3.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935036" comment="python312-idle-3.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935037" comment="python312-tk-3.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935038" comment="python312-x86-64-v3-3.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251833" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935039" comment="xorg-x11-server-21.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935040" comment="xorg-x11-server-Xvfb-21.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935041" comment="xorg-x11-server-extra-21.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935042" comment="xorg-x11-server-sdk-21.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935043" comment="xorg-x11-server-source-21.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935044" comment="xorg-x11-server-wrapper-21.1.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251834" version="1" class="patch">
	<metadata>
		<title>xwayland-23.2.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.2.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935045" comment="xwayland-23.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935046" comment="xwayland-devel-23.2.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251835" version="1" class="patch">
	<metadata>
		<title>s390-tools-2.30.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-25316" ref_url="https://www.suse.com/security/cve/CVE-2021-25316/" source="CVE"/>
		<description>
These are all security issues fixed in the s390-tools-2.30.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25316/">CVE-2021-25316 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25316">CVE-2021-25316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935047" comment="s390-tools-2.30.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251836" version="1" class="patch">
	<metadata>
		<title>python310-asyncssh-2.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-asyncssh-2.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935048" comment="python310-asyncssh-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935049" comment="python311-asyncssh-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935050" comment="python39-asyncssh-2.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251837" version="1" class="patch">
	<metadata>
		<title>libsass-3_6_5-1-3.6.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-26592" ref_url="https://www.suse.com/security/cve/CVE-2022-26592/" source="CVE"/>
		<reference ref_id="CVE-2022-43357" ref_url="https://www.suse.com/security/cve/CVE-2022-43357/" source="CVE"/>
		<reference ref_id="CVE-2022-43358" ref_url="https://www.suse.com/security/cve/CVE-2022-43358/" source="CVE"/>
		<description>
These are all security issues fixed in the libsass-3_6_5-1-3.6.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26592/">CVE-2022-26592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26592">CVE-2022-26592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-43357/">CVE-2022-43357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43357">CVE-2022-43357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-43358/">CVE-2022-43358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43358">CVE-2022-43358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935051" comment="libsass-3_6_5-1-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935052" comment="libsass-devel-3.6.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251838" version="1" class="patch">
	<metadata>
		<title>openssh-9.3p2-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.3p2-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935053" comment="openssh-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935054" comment="openssh-cavs-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935055" comment="openssh-clients-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935056" comment="openssh-common-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935057" comment="openssh-fips-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935058" comment="openssh-helpers-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935059" comment="openssh-server-9.3p2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935060" comment="openssh-server-config-rootlogin-9.3p2-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251839" version="1" class="patch">
	<metadata>
		<title>putty-0.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the putty-0.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935061" comment="putty-0.80-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251840" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761/" source="CVE"/>
		<reference ref_id="CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935062" comment="MozillaThunderbird-115.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935063" comment="MozillaThunderbird-translations-common-115.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935064" comment="MozillaThunderbird-translations-other-115.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251841" version="1" class="patch">
	<metadata>
		<title>jbigkit-2.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210/" source="CVE"/>
		<description>
These are all security issues fixed in the jbigkit-2.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935065" comment="jbigkit-2.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935066" comment="libjbig-devel-2.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935067" comment="libjbig-devel-32bit-2.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935068" comment="libjbig2-2.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935069" comment="libjbig2-32bit-2.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251842" version="1" class="patch">
	<metadata>
		<title>jq-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50246" ref_url="https://www.suse.com/security/cve/CVE-2023-50246/" source="CVE"/>
		<reference ref_id="CVE-2023-50268" ref_url="https://www.suse.com/security/cve/CVE-2023-50268/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50246/">CVE-2023-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50246">CVE-2023-50246 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50268/">CVE-2023-50268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50268">CVE-2023-50268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935070" comment="jq-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935071" comment="libjq-devel-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935072" comment="libjq1-1.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251843" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935073" comment="libssh2-1-1.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935074" comment="libssh2-1-32bit-1.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935075" comment="libssh2-devel-1.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251844" version="1" class="patch">
	<metadata>
		<title>python-paramiko-doc-3.3.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the python-paramiko-doc-3.3.1-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935076" comment="python-paramiko-doc-3.3.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935077" comment="python310-paramiko-3.3.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935078" comment="python311-paramiko-3.3.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935079" comment="python39-paramiko-3.3.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251845" version="1" class="patch">
	<metadata>
		<title>libtinyxml0-2.6.2-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42260" ref_url="https://www.suse.com/security/cve/CVE-2021-42260/" source="CVE"/>
		<reference ref_id="CVE-2023-34194" ref_url="https://www.suse.com/security/cve/CVE-2023-34194/" source="CVE"/>
		<description>
These are all security issues fixed in the libtinyxml0-2.6.2-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42260/">CVE-2021-42260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42260">CVE-2021-42260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34194/">CVE-2023-34194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34194">CVE-2023-34194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935080" comment="libtinyxml0-2.6.2-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935081" comment="tinyxml-devel-2.6.2-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935082" comment="tinyxml-docs-2.6.2-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251846" version="1" class="patch">
	<metadata>
		<title>libzbar-devel-0.23.90-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40889" ref_url="https://www.suse.com/security/cve/CVE-2023-40889/" source="CVE"/>
		<reference ref_id="CVE-2023-40890" ref_url="https://www.suse.com/security/cve/CVE-2023-40890/" source="CVE"/>
		<description>
These are all security issues fixed in the libzbar-devel-0.23.90-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40889/">CVE-2023-40889 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40889">CVE-2023-40889 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40890/">CVE-2023-40890 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40890">CVE-2023-40890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935083" comment="libzbar-devel-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935084" comment="libzbar0-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935085" comment="libzbar0-32bit-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935086" comment="libzbarqt-devel-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935087" comment="libzbarqt0-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935088" comment="libzbarqt0-32bit-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935089" comment="python3-zbar-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935090" comment="zbar-0.23.90-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935091" comment="zbar-lang-0.23.90-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251847" version="1" class="patch">
	<metadata>
		<title>cppcheck-2.12.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39070" ref_url="https://www.suse.com/security/cve/CVE-2023-39070/" source="CVE"/>
		<description>
These are all security issues fixed in the cppcheck-2.12.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39070/">CVE-2023-39070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39070">CVE-2023-39070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935092" comment="cppcheck-2.12.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935093" comment="cppcheck-gui-2.12.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251848" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39975" ref_url="https://www.suse.com/security/cve/CVE-2023-39975/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39975/">CVE-2023-39975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39975">CVE-2023-39975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935094" comment="krb5-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935095" comment="krb5-32bit-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935096" comment="krb5-client-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935097" comment="krb5-devel-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935098" comment="krb5-devel-32bit-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935099" comment="krb5-plugin-kdb-ldap-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935100" comment="krb5-plugin-preauth-otp-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935101" comment="krb5-plugin-preauth-pkinit-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935102" comment="krb5-plugin-preauth-spake-1.21.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935103" comment="krb5-server-1.21.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251849" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-8.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50980" ref_url="https://www.suse.com/security/cve/CVE-2023-50980/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-8.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-50980/">CVE-2023-50980 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50980">CVE-2023-50980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935104" comment="libcryptopp-devel-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935105" comment="libcryptopp8_9_0-8.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251850" version="1" class="patch">
	<metadata>
		<title>ppp-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935106" comment="ppp-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935107" comment="ppp-devel-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935108" comment="ppp-modem-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251851" version="1" class="patch">
	<metadata>
		<title>ssh-audit-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the ssh-audit-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935109" comment="ssh-audit-3.1.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251852" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-121.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6135" ref_url="https://www.suse.com/security/cve/CVE-2023-6135/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6866" ref_url="https://www.suse.com/security/cve/CVE-2023-6866/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<reference ref_id="CVE-2023-6868" ref_url="https://www.suse.com/security/cve/CVE-2023-6868/" source="CVE"/>
		<reference ref_id="CVE-2023-6869" ref_url="https://www.suse.com/security/cve/CVE-2023-6869/" source="CVE"/>
		<reference ref_id="CVE-2023-6870" ref_url="https://www.suse.com/security/cve/CVE-2023-6870/" source="CVE"/>
		<reference ref_id="CVE-2023-6871" ref_url="https://www.suse.com/security/cve/CVE-2023-6871/" source="CVE"/>
		<reference ref_id="CVE-2023-6872" ref_url="https://www.suse.com/security/cve/CVE-2023-6872/" source="CVE"/>
		<reference ref_id="CVE-2023-6873" ref_url="https://www.suse.com/security/cve/CVE-2023-6873/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-121.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6135/">CVE-2023-6135 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6135">CVE-2023-6135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6866/">CVE-2023-6866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6866">CVE-2023-6866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6868/">CVE-2023-6868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6868">CVE-2023-6868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6869/">CVE-2023-6869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6869">CVE-2023-6869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6870/">CVE-2023-6870 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6870">CVE-2023-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6871/">CVE-2023-6871 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6871">CVE-2023-6871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6872/">CVE-2023-6872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6872">CVE-2023-6872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6873/">CVE-2023-6873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6873">CVE-2023-6873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935110" comment="MozillaFirefox-121.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935111" comment="MozillaFirefox-branding-upstream-121.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935112" comment="MozillaFirefox-devel-121.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935113" comment="MozillaFirefox-translations-common-121.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935114" comment="MozillaFirefox-translations-other-121.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251853" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6508" ref_url="https://www.suse.com/security/cve/CVE-2023-6508/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6508/">CVE-2023-6508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6508">CVE-2023-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935115" comment="nodejs-electron-27.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935116" comment="nodejs-electron-devel-27.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935117" comment="nodejs-electron-doc-27.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251854" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49084" ref_url="https://www.suse.com/security/cve/CVE-2023-49084/" source="CVE"/>
		<reference ref_id="CVE-2023-49085" ref_url="https://www.suse.com/security/cve/CVE-2023-49085/" source="CVE"/>
		<reference ref_id="CVE-2023-49086" ref_url="https://www.suse.com/security/cve/CVE-2023-49086/" source="CVE"/>
		<reference ref_id="CVE-2023-49088" ref_url="https://www.suse.com/security/cve/CVE-2023-49088/" source="CVE"/>
		<reference ref_id="CVE-2023-50250" ref_url="https://www.suse.com/security/cve/CVE-2023-50250/" source="CVE"/>
		<reference ref_id="CVE-2023-51448" ref_url="https://www.suse.com/security/cve/CVE-2023-51448/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49084/">CVE-2023-49084 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49084">CVE-2023-49084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49085/">CVE-2023-49085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49085">CVE-2023-49085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49086/">CVE-2023-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49086">CVE-2023-49086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49088/">CVE-2023-49088 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49088">CVE-2023-49088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50250/">CVE-2023-50250 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50250">CVE-2023-50250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51448/">CVE-2023-51448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51448">CVE-2023-51448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935118" comment="cacti-1.2.26-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251855" version="1" class="patch">
	<metadata>
		<title>avif-tools-1.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<description>
These are all security issues fixed in the avif-tools-1.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935119" comment="avif-tools-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935120" comment="gdk-pixbuf-loader-libavif-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935121" comment="libavif-devel-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935122" comment="libavif16-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935123" comment="libavif16-32bit-1.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251856" version="1" class="patch">
	<metadata>
		<title>zabbix-agent-6.0.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32727" ref_url="https://www.suse.com/security/cve/CVE-2023-32727/" source="CVE"/>
		<description>
These are all security issues fixed in the zabbix-agent-6.0.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32727/">CVE-2023-32727 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32727">CVE-2023-32727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935124" comment="zabbix-agent-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935125" comment="zabbix-java-gateway-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935126" comment="zabbix-proxy-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935127" comment="zabbix-proxy-mysql-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935128" comment="zabbix-proxy-postgresql-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935129" comment="zabbix-proxy-sqlite-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935130" comment="zabbix-server-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935131" comment="zabbix-server-mysql-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935132" comment="zabbix-server-postgresql-6.0.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935133" comment="zabbix-ui-6.0.25-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251857" version="1" class="patch">
	<metadata>
		<title>deepin-reader-5.10.23-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50254" ref_url="https://www.suse.com/security/cve/CVE-2023-50254/" source="CVE"/>
		<description>
These are all security issues fixed in the deepin-reader-5.10.23-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50254/">CVE-2023-50254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50254">CVE-2023-50254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935134" comment="deepin-reader-5.10.23-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935135" comment="deepin-reader-lang-5.10.23-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935136" comment="libdeepin-pdfium1-5.10.23-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251858" version="1" class="patch">
	<metadata>
		<title>cJSON-devel-1.7.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50471" ref_url="https://www.suse.com/security/cve/CVE-2023-50471/" source="CVE"/>
		<reference ref_id="CVE-2023-50472" ref_url="https://www.suse.com/security/cve/CVE-2023-50472/" source="CVE"/>
		<description>
These are all security issues fixed in the cJSON-devel-1.7.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50471/">CVE-2023-50471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50471">CVE-2023-50471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50472/">CVE-2023-50472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50472">CVE-2023-50472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935137" comment="cJSON-devel-1.7.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935138" comment="libcjson1-1.7.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251859" version="1" class="patch">
	<metadata>
		<title>postfix-3.8.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764/" source="CVE"/>
		<description>
These are all security issues fixed in the postfix-3.8.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935139" comment="postfix-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935140" comment="postfix-devel-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935141" comment="postfix-doc-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935142" comment="postfix-ldap-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935143" comment="postfix-mysql-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935144" comment="postfix-postgresql-3.8.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251860" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.8b-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.8b-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935145" comment="proftpd-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935146" comment="proftpd-devel-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935147" comment="proftpd-doc-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935148" comment="proftpd-lang-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935149" comment="proftpd-ldap-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935150" comment="proftpd-mysql-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935151" comment="proftpd-pgsql-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935152" comment="proftpd-radius-1.3.8b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935153" comment="proftpd-sqlite-1.3.8b-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251861" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_2-3.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_2-3.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935154" comment="libxerces-c-3_2-3.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935155" comment="libxerces-c-devel-3.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935156" comment="xerces-c-3.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935157" comment="xerces-c-doc-3.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251862" version="1" class="patch">
	<metadata>
		<title>deepin-compressor-5.12.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50255" ref_url="https://www.suse.com/security/cve/CVE-2023-50255/" source="CVE"/>
		<description>
These are all security issues fixed in the deepin-compressor-5.12.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50255/">CVE-2023-50255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50255">CVE-2023-50255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935158" comment="deepin-compressor-5.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935159" comment="deepin-compressor-lang-5.12.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251863" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20231219-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49092" ref_url="https://www.suse.com/security/cve/CVE-2023-49092/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20231219-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49092/">CVE-2023-49092 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49092">CVE-2023-49092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935160" comment="cargo-audit-advisory-db-20231219-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251864" version="1" class="patch">
	<metadata>
		<title>exim-4.97.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51766" ref_url="https://www.suse.com/security/cve/CVE-2023-51766/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.97.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51766/">CVE-2023-51766 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51766">CVE-2023-51766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935161" comment="exim-4.97.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935162" comment="eximon-4.97.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935163" comment="eximstats-html-4.97.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251865" version="1" class="patch">
	<metadata>
		<title>libredwg-devel-0.12.5.6924-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26157" ref_url="https://www.suse.com/security/cve/CVE-2023-26157/" source="CVE"/>
		<description>
These are all security issues fixed in the libredwg-devel-0.12.5.6924-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26157/">CVE-2023-26157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26157">CVE-2023-26157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935164" comment="libredwg-devel-0.12.5.6924-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935165" comment="libredwg-tools-0.12.5.6924-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935166" comment="libredwg0-0.12.5.6924-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251866" version="1" class="patch">
	<metadata>
		<title>liblog4cxx-devel-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31038" ref_url="https://www.suse.com/security/cve/CVE-2023-31038/" source="CVE"/>
		<description>
These are all security issues fixed in the liblog4cxx-devel-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31038/">CVE-2023-31038 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31038">CVE-2023-31038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935167" comment="liblog4cxx-devel-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935168" comment="liblog4cxx15-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251867" version="1" class="patch">
	<metadata>
		<title>libmosquitto1-2.0.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0809" ref_url="https://www.suse.com/security/cve/CVE-2023-0809/" source="CVE"/>
		<reference ref_id="CVE-2023-28366" ref_url="https://www.suse.com/security/cve/CVE-2023-28366/" source="CVE"/>
		<reference ref_id="CVE-2023-3592" ref_url="https://www.suse.com/security/cve/CVE-2023-3592/" source="CVE"/>
		<description>
These are all security issues fixed in the libmosquitto1-2.0.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0809/">CVE-2023-0809 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0809">CVE-2023-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28366/">CVE-2023-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28366">CVE-2023-28366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3592/">CVE-2023-3592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3592">CVE-2023-3592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935169" comment="libmosquitto1-2.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935170" comment="libmosquittopp1-2.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935171" comment="mosquitto-2.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935172" comment="mosquitto-clients-2.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935173" comment="mosquitto-devel-2.0.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251868" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.6.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.6.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935175" comment="kernel-macros-6.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935176" comment="kernel-source-6.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935177" comment="kernel-source-vanilla-6.6.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251869" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.56.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.56.1-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935178" comment="ghostscript-9.56.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935179" comment="ghostscript-devel-9.56.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935180" comment="ghostscript-x11-9.56.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251870" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601/" source="CVE"/>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<reference ref_id="CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5601">CVE-2017-5601 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23177">CVE-2021-23177 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935181" comment="bsdtar-3.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935182" comment="libarchive-devel-3.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935183" comment="libarchive13-3.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935184" comment="libarchive13-32bit-3.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251871" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-8.9.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50981" ref_url="https://www.suse.com/security/cve/CVE-2023-50981/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-8.9.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-50981/">CVE-2023-50981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50981">CVE-2023-50981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935185" comment="libcryptopp-devel-8.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935186" comment="libcryptopp8_9_0-8.9.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251872" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.17.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49460" ref_url="https://www.suse.com/security/cve/CVE-2023-49460/" source="CVE"/>
		<reference ref_id="CVE-2023-49463" ref_url="https://www.suse.com/security/cve/CVE-2023-49463/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.17.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49460/">CVE-2023-49460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49460">CVE-2023-49460 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49463/">CVE-2023-49463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49463">CVE-2023-49463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935187" comment="gdk-pixbuf-loader-libheif-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935188" comment="libheif-aom-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935189" comment="libheif-dav1d-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935190" comment="libheif-devel-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935191" comment="libheif-ffmpeg-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935192" comment="libheif-jpeg-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935193" comment="libheif-openjpeg-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935194" comment="libheif-rav1e-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935195" comment="libheif-svtenc-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935196" comment="libheif1-1.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935197" comment="libheif1-32bit-1.17.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251873" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-3.0.1-77.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-2804" ref_url="https://www.suse.com/security/cve/CVE-2023-2804/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-3.0.1-77.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2804/">CVE-2023-2804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2804">CVE-2023-2804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935198" comment="libjpeg-turbo-3.0.1-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935199" comment="libjpeg8-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935200" comment="libjpeg8-32bit-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935201" comment="libjpeg8-devel-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935202" comment="libjpeg8-devel-32bit-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935203" comment="libjpeg8-x86-64-v3-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935204" comment="libturbojpeg0-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935205" comment="libturbojpeg0-32bit-8.3.2-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935206" comment="libturbojpeg0-x86-64-v3-8.3.2-77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251874" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.12+kde147-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.12+kde147-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935207" comment="libQt5Bootstrap-devel-static-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935208" comment="libQt5Bootstrap-devel-static-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935209" comment="libQt5Concurrent-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935210" comment="libQt5Concurrent-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935211" comment="libQt5Concurrent5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935212" comment="libQt5Concurrent5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935213" comment="libQt5Core-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935214" comment="libQt5Core-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935215" comment="libQt5Core-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935216" comment="libQt5Core5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935217" comment="libQt5Core5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935218" comment="libQt5DBus-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935219" comment="libQt5DBus-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935220" comment="libQt5DBus-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935221" comment="libQt5DBus5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935222" comment="libQt5DBus5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935223" comment="libQt5Gui-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935224" comment="libQt5Gui-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935225" comment="libQt5Gui-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935226" comment="libQt5Gui5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935227" comment="libQt5Gui5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935228" comment="libQt5KmsSupport-devel-static-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935229" comment="libQt5KmsSupport-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935230" comment="libQt5Network-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935231" comment="libQt5Network-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935232" comment="libQt5Network-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935233" comment="libQt5Network5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935234" comment="libQt5Network5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935235" comment="libQt5OpenGL-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935236" comment="libQt5OpenGL-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935237" comment="libQt5OpenGL-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935238" comment="libQt5OpenGL5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935239" comment="libQt5OpenGL5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935240" comment="libQt5OpenGLExtensions-devel-static-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935241" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935242" comment="libQt5PlatformHeaders-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935243" comment="libQt5PlatformSupport-devel-static-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935244" comment="libQt5PlatformSupport-devel-static-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935245" comment="libQt5PlatformSupport-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935246" comment="libQt5PrintSupport-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935247" comment="libQt5PrintSupport-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935248" comment="libQt5PrintSupport-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935249" comment="libQt5PrintSupport5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935250" comment="libQt5PrintSupport5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935251" comment="libQt5Sql-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935252" comment="libQt5Sql-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935253" comment="libQt5Sql-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935254" comment="libQt5Sql5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935255" comment="libQt5Sql5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935256" comment="libQt5Sql5-mysql-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935257" comment="libQt5Sql5-mysql-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935258" comment="libQt5Sql5-postgresql-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935259" comment="libQt5Sql5-postgresql-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935260" comment="libQt5Sql5-sqlite-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935261" comment="libQt5Sql5-sqlite-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935262" comment="libQt5Sql5-unixODBC-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935263" comment="libQt5Sql5-unixODBC-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935264" comment="libQt5Test-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935265" comment="libQt5Test-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935266" comment="libQt5Test-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935267" comment="libQt5Test5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935268" comment="libQt5Test5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935269" comment="libQt5Widgets-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935270" comment="libQt5Widgets-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935271" comment="libQt5Widgets-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935272" comment="libQt5Widgets5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935273" comment="libQt5Widgets5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935274" comment="libQt5Xml-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935275" comment="libQt5Xml-devel-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935276" comment="libQt5Xml5-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935277" comment="libQt5Xml5-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935278" comment="libqt5-qtbase-common-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935279" comment="libqt5-qtbase-devel-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935280" comment="libqt5-qtbase-examples-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935281" comment="libqt5-qtbase-examples-32bit-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935282" comment="libqt5-qtbase-platformtheme-gtk3-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935283" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.12+kde147-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935284" comment="libqt5-qtbase-private-headers-devel-5.15.12+kde147-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251875" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.8b-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51713" ref_url="https://www.suse.com/security/cve/CVE-2023-51713/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.8b-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51713/">CVE-2023-51713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51713">CVE-2023-51713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935285" comment="proftpd-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935286" comment="proftpd-devel-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935287" comment="proftpd-doc-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935288" comment="proftpd-lang-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935289" comment="proftpd-ldap-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935290" comment="proftpd-mysql-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935291" comment="proftpd-pgsql-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935292" comment="proftpd-radius-1.3.8b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935293" comment="proftpd-sqlite-1.3.8b-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251876" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.6.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.6.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935294" comment="libQt6Concurrent6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935295" comment="libQt6Core6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935296" comment="libQt6DBus6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935297" comment="libQt6Gui6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935298" comment="libQt6Network6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935299" comment="libQt6OpenGL6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935300" comment="libQt6OpenGLWidgets6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935301" comment="libQt6PrintSupport6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935302" comment="libQt6Sql6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935303" comment="libQt6Test6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935304" comment="libQt6Widgets6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935305" comment="libQt6Xml6-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935306" comment="qt6-base-common-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935307" comment="qt6-base-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935308" comment="qt6-base-examples-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935309" comment="qt6-base-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935310" comment="qt6-concurrent-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935311" comment="qt6-core-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935312" comment="qt6-core-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935313" comment="qt6-dbus-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935314" comment="qt6-dbus-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935315" comment="qt6-docs-common-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935316" comment="qt6-exampleicons-devel-static-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935317" comment="qt6-gui-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935318" comment="qt6-gui-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935319" comment="qt6-kmssupport-devel-static-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935320" comment="qt6-kmssupport-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935321" comment="qt6-network-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935322" comment="qt6-network-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935323" comment="qt6-network-tls-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935324" comment="qt6-networkinformation-glib-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935325" comment="qt6-networkinformation-nm-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935326" comment="qt6-opengl-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935327" comment="qt6-opengl-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935328" comment="qt6-openglwidgets-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935329" comment="qt6-platformsupport-devel-static-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935330" comment="qt6-platformsupport-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935331" comment="qt6-platformtheme-gtk3-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935332" comment="qt6-platformtheme-xdgdesktopportal-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935333" comment="qt6-printsupport-cups-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935334" comment="qt6-printsupport-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935335" comment="qt6-printsupport-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935336" comment="qt6-sql-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935337" comment="qt6-sql-mysql-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935338" comment="qt6-sql-postgresql-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935339" comment="qt6-sql-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935340" comment="qt6-sql-sqlite-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935341" comment="qt6-sql-unixODBC-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935342" comment="qt6-test-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935343" comment="qt6-test-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935344" comment="qt6-widgets-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935345" comment="qt6-widgets-private-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935346" comment="qt6-xml-devel-6.6.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935347" comment="qt6-xml-private-devel-6.6.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251877" version="1" class="patch">
	<metadata>
		<title>libwireshark17-4.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0207" ref_url="https://www.suse.com/security/cve/CVE-2024-0207/" source="CVE"/>
		<reference ref_id="CVE-2024-0208" ref_url="https://www.suse.com/security/cve/CVE-2024-0208/" source="CVE"/>
		<reference ref_id="CVE-2024-0209" ref_url="https://www.suse.com/security/cve/CVE-2024-0209/" source="CVE"/>
		<reference ref_id="CVE-2024-0210" ref_url="https://www.suse.com/security/cve/CVE-2024-0210/" source="CVE"/>
		<reference ref_id="CVE-2024-0211" ref_url="https://www.suse.com/security/cve/CVE-2024-0211/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark17-4.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0207/">CVE-2024-0207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0207">CVE-2024-0207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0208/">CVE-2024-0208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0208">CVE-2024-0208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0209/">CVE-2024-0209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0209">CVE-2024-0209 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0210/">CVE-2024-0210 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0210">CVE-2024-0210 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0211/">CVE-2024-0211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0211">CVE-2024-0211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935348" comment="libwireshark17-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935349" comment="libwiretap14-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935350" comment="libwsutil15-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935351" comment="wireshark-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935352" comment="wireshark-devel-4.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935353" comment="wireshark-ui-qt-4.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251878" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.22.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.22.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935354" comment="gstreamer-plugins-bad-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935355" comment="gstreamer-plugins-bad-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935356" comment="gstreamer-plugins-bad-chromaprint-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935357" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935358" comment="gstreamer-plugins-bad-devel-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935359" comment="gstreamer-plugins-bad-fluidsynth-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935360" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935361" comment="gstreamer-plugins-bad-lang-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935362" comment="gstreamer-transcoder-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935363" comment="gstreamer-transcoder-devel-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935364" comment="libgstadaptivedemux-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935365" comment="libgstadaptivedemux-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935366" comment="libgstbadaudio-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935367" comment="libgstbadaudio-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935368" comment="libgstbasecamerabinsrc-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935369" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935370" comment="libgstcodecparsers-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935371" comment="libgstcodecparsers-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935372" comment="libgstcodecs-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935373" comment="libgstcodecs-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935374" comment="libgstcuda-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935375" comment="libgstcuda-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935376" comment="libgstinsertbin-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935377" comment="libgstinsertbin-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935378" comment="libgstisoff-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935379" comment="libgstisoff-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935380" comment="libgstmpegts-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935381" comment="libgstmpegts-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935382" comment="libgstphotography-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935383" comment="libgstphotography-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935384" comment="libgstplay-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935385" comment="libgstplay-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935386" comment="libgstplayer-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935387" comment="libgstplayer-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935388" comment="libgstsctp-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935389" comment="libgstsctp-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935390" comment="libgsttranscoder-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935391" comment="libgsttranscoder-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935392" comment="libgsturidownloader-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935393" comment="libgsturidownloader-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935394" comment="libgstva-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935395" comment="libgstva-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935396" comment="libgstvulkan-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935397" comment="libgstvulkan-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935398" comment="libgstwayland-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935399" comment="libgstwayland-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935400" comment="libgstwebrtc-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935401" comment="libgstwebrtc-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935402" comment="libgstwebrtcnice-1_0-0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935403" comment="libgstwebrtcnice-1_0-0-32bit-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935404" comment="typelib-1_0-CudaGst-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935405" comment="typelib-1_0-GstBadAudio-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935406" comment="typelib-1_0-GstCodecs-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935407" comment="typelib-1_0-GstCuda-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935408" comment="typelib-1_0-GstInsertBin-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935409" comment="typelib-1_0-GstMpegts-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935410" comment="typelib-1_0-GstPlay-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935411" comment="typelib-1_0-GstPlayer-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935412" comment="typelib-1_0-GstTranscoder-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935413" comment="typelib-1_0-GstVa-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935414" comment="typelib-1_0-GstVulkan-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935415" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935416" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935417" comment="typelib-1_0-GstWebRTC-1_0-1.22.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251879" version="1" class="patch">
	<metadata>
		<title>perl-Spreadsheet-ParseExcel-0.660.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-7101" ref_url="https://www.suse.com/security/cve/CVE-2023-7101/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Spreadsheet-ParseExcel-0.660.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7101/">CVE-2023-7101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7101">CVE-2023-7101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935418" comment="perl-Spreadsheet-ParseExcel-0.660.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251880" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-23.02.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49933" ref_url="https://www.suse.com/security/cve/CVE-2023-49933/" source="CVE"/>
		<reference ref_id="CVE-2023-49935" ref_url="https://www.suse.com/security/cve/CVE-2023-49935/" source="CVE"/>
		<reference ref_id="CVE-2023-49936" ref_url="https://www.suse.com/security/cve/CVE-2023-49936/" source="CVE"/>
		<reference ref_id="CVE-2023-49937" ref_url="https://www.suse.com/security/cve/CVE-2023-49937/" source="CVE"/>
		<reference ref_id="CVE-2023-49938" ref_url="https://www.suse.com/security/cve/CVE-2023-49938/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-23.02.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49933/">CVE-2023-49933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49933">CVE-2023-49933 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49935/">CVE-2023-49935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49935">CVE-2023-49935 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49936/">CVE-2023-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49936">CVE-2023-49936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49937/">CVE-2023-49937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49937">CVE-2023-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49938/">CVE-2023-49938 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49938">CVE-2023-49938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935419" comment="libnss_slurm2-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935420" comment="libpmi0-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935421" comment="libslurm39-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935422" comment="perl-slurm-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935423" comment="slurm-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935424" comment="slurm-auth-none-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935425" comment="slurm-config-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935426" comment="slurm-config-man-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935427" comment="slurm-cray-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935428" comment="slurm-devel-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935429" comment="slurm-doc-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935430" comment="slurm-hdf5-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935431" comment="slurm-lua-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935432" comment="slurm-munge-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935433" comment="slurm-node-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935434" comment="slurm-openlava-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935435" comment="slurm-pam_slurm-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935436" comment="slurm-plugin-ext-sensors-rrd-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935437" comment="slurm-plugins-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935438" comment="slurm-rest-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935439" comment="slurm-seff-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935440" comment="slurm-sjstat-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935441" comment="slurm-slurmdbd-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935442" comment="slurm-sql-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935443" comment="slurm-sview-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935444" comment="slurm-testsuite-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935445" comment="slurm-torque-23.02.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935446" comment="slurm-webdoc-23.02.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251881" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935447" comment="nodejs-electron-27.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935448" comment="nodejs-electron-devel-27.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935449" comment="nodejs-electron-doc-27.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251882" version="1" class="patch">
	<metadata>
		<title>python310-Flask-Security-Too-5.3.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21241" ref_url="https://www.suse.com/security/cve/CVE-2021-21241/" source="CVE"/>
		<reference ref_id="CVE-2021-23385" ref_url="https://www.suse.com/security/cve/CVE-2021-23385/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-Security-Too-5.3.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21241/">CVE-2021-21241 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21241">CVE-2021-21241 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23385/">CVE-2021-23385 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23385">CVE-2021-23385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935450" comment="python310-Flask-Security-Too-5.3.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935451" comment="python311-Flask-Security-Too-5.3.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935452" comment="python39-Flask-Security-Too-5.3.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251883" version="1" class="patch">
	<metadata>
		<title>libzipios2-2.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13453" ref_url="https://www.suse.com/security/cve/CVE-2019-13453/" source="CVE"/>
		<description>
These are all security issues fixed in the libzipios2-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13453/">CVE-2019-13453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13453">CVE-2019-13453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935453" comment="libzipios2-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935454" comment="zipios-devel-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935455" comment="zipios-devel-doc-2.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251884" version="1" class="patch">
	<metadata>
		<title>python310-Flask-Security-Too-5.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49438" ref_url="https://www.suse.com/security/cve/CVE-2023-49438/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-Security-Too-5.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49438/">CVE-2023-49438 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49438">CVE-2023-49438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935456" comment="python310-Flask-Security-Too-5.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935457" comment="python311-Flask-Security-Too-5.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935458" comment="python39-Flask-Security-Too-5.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251885" version="1" class="patch">
	<metadata>
		<title>python310-httptools-0.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-httptools-0.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935459" comment="python310-httptools-0.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935460" comment="python311-httptools-0.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935461" comment="python39-httptools-0.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251886" version="1" class="patch">
	<metadata>
		<title>teleport-14.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-14.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935462" comment="teleport-14.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935463" comment="teleport-tbot-14.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935464" comment="teleport-tctl-14.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935465" comment="teleport-tsh-14.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251887" version="1" class="patch">
	<metadata>
		<title>micropython-1.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-7158" ref_url="https://www.suse.com/security/cve/CVE-2023-7158/" source="CVE"/>
		<description>
These are all security issues fixed in the micropython-1.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7158/">CVE-2023-7158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7158">CVE-2023-7158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935466" comment="micropython-1.22.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251888" version="1" class="patch">
	<metadata>
		<title>python310-pycryptodome-3.19.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pycryptodome-3.19.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935467" comment="python310-pycryptodome-3.19.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935468" comment="python311-pycryptodome-3.19.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935469" comment="python39-pycryptodome-3.19.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251889" version="1" class="patch">
	<metadata>
		<title>python310-pycryptodomex-3.19.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pycryptodomex-3.19.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935470" comment="python310-pycryptodomex-3.19.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935471" comment="python311-pycryptodomex-3.19.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935472" comment="python39-pycryptodomex-3.19.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251890" version="1" class="patch">
	<metadata>
		<title>rclone-1.65.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45286" ref_url="https://www.suse.com/security/cve/CVE-2023-45286/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.65.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45286/">CVE-2023-45286 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45286">CVE-2023-45286 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935473" comment="rclone-1.65.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935474" comment="rclone-bash-completion-1.65.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935475" comment="rclone-zsh-completion-1.65.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251891" version="1" class="patch">
	<metadata>
		<title>syncthing-1.27.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49295" ref_url="https://www.suse.com/security/cve/CVE-2023-49295/" source="CVE"/>
		<description>
These are all security issues fixed in the syncthing-1.27.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49295/">CVE-2023-49295 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49295">CVE-2023-49295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935476" comment="syncthing-1.27.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935477" comment="syncthing-relaysrv-1.27.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251892" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.5.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27814" ref_url="https://www.suse.com/security/cve/CVE-2020-27814/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27841" ref_url="https://www.suse.com/security/cve/CVE-2020-27841/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.5.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21010">CVE-2018-21010 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27814/">CVE-2020-27814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27814">CVE-2020-27814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27824">CVE-2020-27824 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27841/">CVE-2020-27841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27841">CVE-2020-27841 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27842">CVE-2020-27842 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27843">CVE-2020-27843 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27845">CVE-2020-27845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935478" comment="libopenjp2-7-2.5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935479" comment="libopenjp2-7-32bit-2.5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935480" comment="libopenjp2-7-x86-64-v3-2.5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935481" comment="openjpeg2-2.5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935482" comment="openjpeg2-devel-2.5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935483" comment="openjpeg2-devel-doc-2.5.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251893" version="1" class="patch">
	<metadata>
		<title>redis-7.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41056" ref_url="https://www.suse.com/security/cve/CVE-2023-41056/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-7.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41056/">CVE-2023-41056 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41056">CVE-2023-41056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935484" comment="redis-7.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251894" version="1" class="patch">
	<metadata>
		<title>tracker-miner-files-3.6.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5557" ref_url="https://www.suse.com/security/cve/CVE-2023-5557/" source="CVE"/>
		<description>
These are all security issues fixed in the tracker-miner-files-3.6.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5557/">CVE-2023-5557 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5557">CVE-2023-5557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935485" comment="tracker-miner-files-3.6.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935486" comment="tracker-miners-3.6.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935487" comment="tracker-miners-lang-3.6.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251895" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935488" comment="nodejs-electron-27.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935489" comment="nodejs-electron-devel-27.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935490" comment="nodejs-electron-doc-27.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251896" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.6.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.6.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935492" comment="kernel-macros-6.6.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935493" comment="kernel-source-6.6.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935494" comment="kernel-source-vanilla-6.6.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251897" version="1" class="patch">
	<metadata>
		<title>jasper-4.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51257" ref_url="https://www.suse.com/security/cve/CVE-2023-51257/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-51257/">CVE-2023-51257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51257">CVE-2023-51257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935495" comment="jasper-4.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935496" comment="libjasper-devel-4.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935497" comment="libjasper7-4.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935498" comment="libjasper7-32bit-4.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251898" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.40-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-6129" ref_url="https://www.suse.com/security/cve/CVE-2019-6129/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.40-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6129/">CVE-2019-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6129">CVE-2019-6129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935499" comment="libpng16-16-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935500" comment="libpng16-16-32bit-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935501" comment="libpng16-16-x86-64-v3-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935502" comment="libpng16-compat-devel-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935503" comment="libpng16-compat-devel-32bit-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935504" comment="libpng16-compat-devel-x86-64-v3-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935505" comment="libpng16-devel-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935506" comment="libpng16-devel-32bit-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935507" comment="libpng16-devel-x86-64-v3-1.6.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935508" comment="libpng16-tools-1.6.40-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251899" version="1" class="patch">
	<metadata>
		<title>libuev-devel-2.4.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48620" ref_url="https://www.suse.com/security/cve/CVE-2022-48620/" source="CVE"/>
		<description>
These are all security issues fixed in the libuev-devel-2.4.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48620/">CVE-2022-48620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48620">CVE-2022-48620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935509" comment="libuev-devel-2.4.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935510" comment="libuev3-2.4.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251900" version="1" class="patch">
	<metadata>
		<title>ctdb-4.19.4+git.339.acf1ccaa020-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-14628" ref_url="https://www.suse.com/security/cve/CVE-2018-14628/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.19.4+git.339.acf1ccaa020-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14628/">CVE-2018-14628 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14628">CVE-2018-14628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935511" comment="ctdb-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935512" comment="ctdb-pcp-pmda-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935513" comment="libsamba-policy-devel-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935514" comment="libsamba-policy-python3-devel-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935515" comment="libsamba-policy0-python3-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935516" comment="libsamba-policy0-python3-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935517" comment="samba-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935518" comment="samba-ad-dc-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935519" comment="samba-ad-dc-libs-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935520" comment="samba-ad-dc-libs-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935521" comment="samba-ceph-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935522" comment="samba-client-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935523" comment="samba-client-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935524" comment="samba-client-libs-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935525" comment="samba-client-libs-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935526" comment="samba-devel-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935527" comment="samba-devel-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935528" comment="samba-doc-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935529" comment="samba-dsdb-modules-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935530" comment="samba-gpupdate-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935531" comment="samba-ldb-ldap-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935532" comment="samba-libs-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935533" comment="samba-libs-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935534" comment="samba-libs-python3-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935535" comment="samba-libs-python3-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935536" comment="samba-python3-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935537" comment="samba-test-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935538" comment="samba-tool-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935539" comment="samba-winbind-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935540" comment="samba-winbind-libs-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935541" comment="samba-winbind-libs-32bit-4.19.4+git.339.acf1ccaa020-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251901" version="1" class="patch">
	<metadata>
		<title>jsch-0.2.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the jsch-0.2.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935542" comment="jsch-0.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935543" comment="jsch-demo-0.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935544" comment="jsch-javadoc-0.2.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251902" version="1" class="patch">
	<metadata>
		<title>python310-Jinja2-3.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Jinja2-3.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935545" comment="python310-Jinja2-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935546" comment="python311-Jinja2-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935547" comment="python39-Jinja2-3.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251903" version="1" class="patch">
	<metadata>
		<title>SDL2-devel-2.28.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="CVE-2022-4743" ref_url="https://www.suse.com/security/cve/CVE-2022-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL2-devel-2.28.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4743/">CVE-2022-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4743">CVE-2022-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935548" comment="SDL2-devel-2.28.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935549" comment="SDL2-devel-32bit-2.28.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935550" comment="libSDL2-2_0-0-2.28.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935551" comment="libSDL2-2_0-0-32bit-2.28.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251904" version="1" class="patch">
	<metadata>
		<title>chromedriver-120.0.6099.216-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6508" ref_url="https://www.suse.com/security/cve/CVE-2023-6508/" source="CVE"/>
		<reference ref_id="CVE-2023-6509" ref_url="https://www.suse.com/security/cve/CVE-2023-6509/" source="CVE"/>
		<reference ref_id="CVE-2023-6510" ref_url="https://www.suse.com/security/cve/CVE-2023-6510/" source="CVE"/>
		<reference ref_id="CVE-2023-6511" ref_url="https://www.suse.com/security/cve/CVE-2023-6511/" source="CVE"/>
		<reference ref_id="CVE-2023-6512" ref_url="https://www.suse.com/security/cve/CVE-2023-6512/" source="CVE"/>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-6703" ref_url="https://www.suse.com/security/cve/CVE-2023-6703/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="CVE-2023-6705" ref_url="https://www.suse.com/security/cve/CVE-2023-6705/" source="CVE"/>
		<reference ref_id="CVE-2023-6706" ref_url="https://www.suse.com/security/cve/CVE-2023-6706/" source="CVE"/>
		<reference ref_id="CVE-2023-6707" ref_url="https://www.suse.com/security/cve/CVE-2023-6707/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<reference ref_id="CVE-2024-0223" ref_url="https://www.suse.com/security/cve/CVE-2024-0223/" source="CVE"/>
		<reference ref_id="CVE-2024-0224" ref_url="https://www.suse.com/security/cve/CVE-2024-0224/" source="CVE"/>
		<reference ref_id="CVE-2024-0225" ref_url="https://www.suse.com/security/cve/CVE-2024-0225/" source="CVE"/>
		<reference ref_id="CVE-2024-0333" ref_url="https://www.suse.com/security/cve/CVE-2024-0333/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-120.0.6099.216-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6508/">CVE-2023-6508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6508">CVE-2023-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6509/">CVE-2023-6509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6509">CVE-2023-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6510/">CVE-2023-6510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6510">CVE-2023-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6511/">CVE-2023-6511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6511">CVE-2023-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6512/">CVE-2023-6512 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6512">CVE-2023-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6703/">CVE-2023-6703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6703">CVE-2023-6703 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6705/">CVE-2023-6705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6705">CVE-2023-6705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6706/">CVE-2023-6706 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6706">CVE-2023-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6707/">CVE-2023-6707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6707">CVE-2023-6707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0223/">CVE-2024-0223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0223">CVE-2024-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0224/">CVE-2024-0224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0225/">CVE-2024-0225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0225">CVE-2024-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0333/">CVE-2024-0333 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0333">CVE-2024-0333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935552" comment="chromedriver-120.0.6099.216-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935553" comment="chromium-120.0.6099.216-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251905" version="1" class="patch">
	<metadata>
		<title>perl-Spreadsheet-ParseXLSX-0.290.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22368" ref_url="https://www.suse.com/security/cve/CVE-2024-22368/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Spreadsheet-ParseXLSX-0.290.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22368/">CVE-2024-22368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22368">CVE-2024-22368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935554" comment="perl-Spreadsheet-ParseXLSX-0.290.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251906" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-120.0.6099.216-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6508" ref_url="https://www.suse.com/security/cve/CVE-2023-6508/" source="CVE"/>
		<reference ref_id="CVE-2023-6509" ref_url="https://www.suse.com/security/cve/CVE-2023-6509/" source="CVE"/>
		<reference ref_id="CVE-2023-6510" ref_url="https://www.suse.com/security/cve/CVE-2023-6510/" source="CVE"/>
		<reference ref_id="CVE-2023-6511" ref_url="https://www.suse.com/security/cve/CVE-2023-6511/" source="CVE"/>
		<reference ref_id="CVE-2023-6512" ref_url="https://www.suse.com/security/cve/CVE-2023-6512/" source="CVE"/>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-6703" ref_url="https://www.suse.com/security/cve/CVE-2023-6703/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="CVE-2023-6705" ref_url="https://www.suse.com/security/cve/CVE-2023-6705/" source="CVE"/>
		<reference ref_id="CVE-2023-6706" ref_url="https://www.suse.com/security/cve/CVE-2023-6706/" source="CVE"/>
		<reference ref_id="CVE-2023-6707" ref_url="https://www.suse.com/security/cve/CVE-2023-6707/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<reference ref_id="CVE-2024-0223" ref_url="https://www.suse.com/security/cve/CVE-2024-0223/" source="CVE"/>
		<reference ref_id="CVE-2024-0224" ref_url="https://www.suse.com/security/cve/CVE-2024-0224/" source="CVE"/>
		<reference ref_id="CVE-2024-0225" ref_url="https://www.suse.com/security/cve/CVE-2024-0225/" source="CVE"/>
		<reference ref_id="CVE-2024-0333" ref_url="https://www.suse.com/security/cve/CVE-2024-0333/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-120.0.6099.216-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6508/">CVE-2023-6508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6508">CVE-2023-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6509/">CVE-2023-6509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6509">CVE-2023-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6510/">CVE-2023-6510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6510">CVE-2023-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6511/">CVE-2023-6511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6511">CVE-2023-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6512/">CVE-2023-6512 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6512">CVE-2023-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6703/">CVE-2023-6703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6703">CVE-2023-6703 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6705/">CVE-2023-6705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6705">CVE-2023-6705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6706/">CVE-2023-6706 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6706">CVE-2023-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6707/">CVE-2023-6707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6707">CVE-2023-6707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0223/">CVE-2024-0223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0223">CVE-2024-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0224/">CVE-2024-0224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0225/">CVE-2024-0225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0225">CVE-2024-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0333/">CVE-2024-0333 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0333">CVE-2024-0333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935555" comment="ungoogled-chromium-120.0.6099.216-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935556" comment="ungoogled-chromium-chromedriver-120.0.6099.216-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251907" version="1" class="patch">
	<metadata>
		<title>grafana-10.1.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-10.1.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935557" comment="grafana-10.1.5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251908" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935558" comment="java-17-openjdk-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935559" comment="java-17-openjdk-demo-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935560" comment="java-17-openjdk-devel-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935561" comment="java-17-openjdk-headless-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935562" comment="java-17-openjdk-javadoc-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935563" comment="java-17-openjdk-jmods-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935564" comment="java-17-openjdk-src-17.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251909" version="1" class="patch">
	<metadata>
		<title>libebml-devel-1.4.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52339" ref_url="https://www.suse.com/security/cve/CVE-2023-52339/" source="CVE"/>
		<description>
These are all security issues fixed in the libebml-devel-1.4.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52339/">CVE-2023-52339 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52339">CVE-2023-52339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935565" comment="libebml-devel-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935566" comment="libebml5-1.4.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251910" version="1" class="patch">
	<metadata>
		<title>libBasicUsageEnvironment2-2023.11.30-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-20573" ref_url="https://www.suse.com/security/cve/CVE-2023-20573/" source="CVE"/>
		<description>
These are all security issues fixed in the libBasicUsageEnvironment2-2023.11.30-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-20573/">CVE-2023-20573 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20573">CVE-2023-20573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935567" comment="libBasicUsageEnvironment2-2023.11.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935568" comment="libUsageEnvironment3-2023.11.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935569" comment="libgroupsock30-2023.11.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935570" comment="libliveMedia112-2023.11.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935571" comment="live555-2023.11.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935572" comment="live555-devel-2023.11.30-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251911" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.85-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.85-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935573" comment="tomcat-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935574" comment="tomcat-admin-webapps-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935575" comment="tomcat-docs-webapp-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935576" comment="tomcat-el-3_0-api-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935577" comment="tomcat-embed-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935578" comment="tomcat-javadoc-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935579" comment="tomcat-jsp-2_3-api-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935580" comment="tomcat-jsvc-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935581" comment="tomcat-lib-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935582" comment="tomcat-servlet-4_0-api-9.0.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935583" comment="tomcat-webapps-9.0.85-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251912" version="1" class="patch">
	<metadata>
		<title>chromedriver-120.0.6099.224-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0517" ref_url="https://www.suse.com/security/cve/CVE-2024-0517/" source="CVE"/>
		<reference ref_id="CVE-2024-0518" ref_url="https://www.suse.com/security/cve/CVE-2024-0518/" source="CVE"/>
		<reference ref_id="CVE-2024-0519" ref_url="https://www.suse.com/security/cve/CVE-2024-0519/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-120.0.6099.224-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0517/">CVE-2024-0517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0517">CVE-2024-0517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0518/">CVE-2024-0518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0518">CVE-2024-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0519/">CVE-2024-0519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0519">CVE-2024-0519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935584" comment="chromedriver-120.0.6099.224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935585" comment="chromium-120.0.6099.224-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251913" version="1" class="patch">
	<metadata>
		<title>erlang-26.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-26.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935586" comment="erlang-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935587" comment="erlang-debugger-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935588" comment="erlang-debugger-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935589" comment="erlang-dialyzer-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935590" comment="erlang-dialyzer-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935591" comment="erlang-diameter-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935592" comment="erlang-diameter-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935593" comment="erlang-doc-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935594" comment="erlang-epmd-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935595" comment="erlang-et-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935596" comment="erlang-et-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935597" comment="erlang-jinterface-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935598" comment="erlang-jinterface-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935599" comment="erlang-observer-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935600" comment="erlang-observer-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935601" comment="erlang-reltool-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935602" comment="erlang-reltool-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935603" comment="erlang-src-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935604" comment="erlang-wx-26.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935605" comment="erlang-wx-src-26.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251914" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<reference ref_id="CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935606" comment="gnutls-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935607" comment="libgnutls-dane-devel-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935608" comment="libgnutls-dane0-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935609" comment="libgnutls-devel-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935610" comment="libgnutls-devel-32bit-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935611" comment="libgnutls30-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935612" comment="libgnutls30-32bit-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935613" comment="libgnutlsxx-devel-3.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935614" comment="libgnutlsxx30-3.8.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251915" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935615" comment="java-21-openjdk-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935616" comment="java-21-openjdk-demo-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935617" comment="java-21-openjdk-devel-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935618" comment="java-21-openjdk-headless-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935619" comment="java-21-openjdk-javadoc-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935620" comment="java-21-openjdk-jmods-21.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935621" comment="java-21-openjdk-src-21.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251916" version="1" class="patch">
	<metadata>
		<title>python310-imagecodecs-2024.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-imagecodecs-2024.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935622" comment="python310-imagecodecs-2024.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935623" comment="python311-imagecodecs-2024.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935624" comment="python39-imagecodecs-2024.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251917" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935625" comment="tomcat10-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935626" comment="tomcat10-admin-webapps-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935627" comment="tomcat10-doc-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935628" comment="tomcat10-docs-webapp-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935629" comment="tomcat10-el-5_0-api-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935630" comment="tomcat10-embed-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935631" comment="tomcat10-jsp-3_1-api-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935632" comment="tomcat10-jsvc-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935633" comment="tomcat10-lib-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935634" comment="tomcat10-servlet-6_0-api-10.1.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935635" comment="tomcat10-webapps-10.1.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251918" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935636" comment="xorg-x11-server-21.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935637" comment="xorg-x11-server-Xvfb-21.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935638" comment="xorg-x11-server-extra-21.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935639" comment="xorg-x11-server-sdk-21.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935640" comment="xorg-x11-server-source-21.1.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935641" comment="xorg-x11-server-wrapper-21.1.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251919" version="1" class="patch">
	<metadata>
		<title>xwayland-23.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935642" comment="xwayland-23.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935643" comment="xwayland-devel-23.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251920" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-alertmanager-0.26.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40577" ref_url="https://www.suse.com/security/cve/CVE-2023-40577/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-alertmanager-0.26.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40577/">CVE-2023-40577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40577">CVE-2023-40577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935644" comment="golang-github-prometheus-alertmanager-0.26.0-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251921" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0517" ref_url="https://www.suse.com/security/cve/CVE-2024-0517/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0517/">CVE-2024-0517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0517">CVE-2024-0517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935645" comment="nodejs-electron-27.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935646" comment="nodejs-electron-devel-27.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935647" comment="nodejs-electron-doc-27.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251922" version="1" class="patch">
	<metadata>
		<title>jupyter-lsp-2.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22415" ref_url="https://www.suse.com/security/cve/CVE-2024-22415/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-lsp-2.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22415/">CVE-2024-22415 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22415">CVE-2024-22415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935648" comment="jupyter-lsp-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935649" comment="python310-jupyter-lsp-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935650" comment="python311-jupyter-lsp-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935651" comment="python39-jupyter-lsp-2.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251923" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935652" comment="java-11-openjdk-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935653" comment="java-11-openjdk-demo-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935654" comment="java-11-openjdk-devel-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935655" comment="java-11-openjdk-headless-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935656" comment="java-11-openjdk-javadoc-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935657" comment="java-11-openjdk-jmods-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935658" comment="java-11-openjdk-src-11.0.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251924" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-120.0.6099.224-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0517" ref_url="https://www.suse.com/security/cve/CVE-2024-0517/" source="CVE"/>
		<reference ref_id="CVE-2024-0518" ref_url="https://www.suse.com/security/cve/CVE-2024-0518/" source="CVE"/>
		<reference ref_id="CVE-2024-0519" ref_url="https://www.suse.com/security/cve/CVE-2024-0519/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-120.0.6099.224-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0517/">CVE-2024-0517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0517">CVE-2024-0517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0518/">CVE-2024-0518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0518">CVE-2024-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0519/">CVE-2024-0519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0519">CVE-2024-0519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935659" comment="ungoogled-chromium-120.0.6099.224-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935660" comment="ungoogled-chromium-chromedriver-120.0.6099.224-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251925" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.48.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.48.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935661" comment="golang-github-prometheus-prometheus-2.48.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251926" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-4.0.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22420" ref_url="https://www.suse.com/security/cve/CVE-2024-22420/" source="CVE"/>
		<reference ref_id="CVE-2024-22421" ref_url="https://www.suse.com/security/cve/CVE-2024-22421/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-4.0.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22420/">CVE-2024-22420 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22420">CVE-2024-22420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22421/">CVE-2024-22421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22421">CVE-2024-22421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935662" comment="jupyter-jupyterlab-4.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935663" comment="python310-jupyterlab-4.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935664" comment="python311-jupyterlab-4.0.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935665" comment="python39-jupyterlab-4.0.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251927" version="1" class="patch">
	<metadata>
		<title>jupyter-notebook-7.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22420" ref_url="https://www.suse.com/security/cve/CVE-2024-22420/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-notebook-7.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22420/">CVE-2024-22420 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22420">CVE-2024-22420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935666" comment="jupyter-notebook-7.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935667" comment="python310-notebook-7.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935668" comment="python311-notebook-7.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935669" comment="python39-notebook-7.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251928" version="1" class="patch">
	<metadata>
		<title>jupyter-panel-1.3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46308" ref_url="https://www.suse.com/security/cve/CVE-2023-46308/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-panel-1.3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46308/">CVE-2023-46308 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46308">CVE-2023-46308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935670" comment="jupyter-panel-1.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935671" comment="python310-panel-1.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935672" comment="python311-panel-1.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935673" comment="python39-panel-1.3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251929" version="1" class="patch">
	<metadata>
		<title>apache-sshd-2.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-sshd-2.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935674" comment="apache-sshd-2.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935675" comment="apache-sshd-javadoc-2.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251930" version="1" class="patch">
	<metadata>
		<title>openjfx-17.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20922" ref_url="https://www.suse.com/security/cve/CVE-2024-20922/" source="CVE"/>
		<reference ref_id="CVE-2024-20923" ref_url="https://www.suse.com/security/cve/CVE-2024-20923/" source="CVE"/>
		<reference ref_id="CVE-2024-20925" ref_url="https://www.suse.com/security/cve/CVE-2024-20925/" source="CVE"/>
		<description>
These are all security issues fixed in the openjfx-17.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20922/">CVE-2024-20922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20922">CVE-2024-20922 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20923/">CVE-2024-20923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20923">CVE-2024-20923 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-20925/">CVE-2024-20925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20925">CVE-2024-20925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935676" comment="openjfx-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935677" comment="openjfx-devel-17.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251931" version="1" class="patch">
	<metadata>
		<title>python310-Mako-1.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Mako-1.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935678" comment="python310-Mako-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935679" comment="python311-Mako-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935680" comment="python39-Mako-1.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251932" version="1" class="patch">
	<metadata>
		<title>python310-Pillow-10.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pillow-10.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935681" comment="python310-Pillow-10.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935682" comment="python310-Pillow-tk-10.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935683" comment="python311-Pillow-10.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935684" comment="python311-Pillow-tk-10.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935685" comment="python39-Pillow-10.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935686" comment="python39-Pillow-tk-10.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251933" version="1" class="patch">
	<metadata>
		<title>rear-2.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301/" source="CVE"/>
		<description>
These are all security issues fixed in the rear-2.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935687" comment="rear-2.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251934" version="1" class="patch">
	<metadata>
		<title>libzstd-devel-1.5.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-4899" ref_url="https://www.suse.com/security/cve/CVE-2022-4899/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd-devel-1.5.5-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4899/">CVE-2022-4899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4899">CVE-2022-4899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935688" comment="libzstd-devel-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935689" comment="libzstd-devel-32bit-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935690" comment="libzstd-devel-static-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935691" comment="libzstd1-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935692" comment="libzstd1-32bit-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935693" comment="libzstd1-x86-64-v3-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935694" comment="zstd-1.5.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935695" comment="zstd-gzip-1.5.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251935" version="1" class="patch">
	<metadata>
		<title>atril-1.26.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51698" ref_url="https://www.suse.com/security/cve/CVE-2023-51698/" source="CVE"/>
		<description>
These are all security issues fixed in the atril-1.26.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51698/">CVE-2023-51698 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51698">CVE-2023-51698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935696" comment="atril-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935697" comment="atril-backends-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935698" comment="atril-devel-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935699" comment="atril-doc-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935700" comment="atril-lang-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935701" comment="atril-thumbnailer-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935702" comment="caja-extension-atril-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935703" comment="libatrildocument3-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935704" comment="libatrilview3-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935705" comment="typelib-1_0-AtrilDocument-1_5_0-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935706" comment="typelib-1_0-AtrilView-1_5_0-1.26.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251936" version="1" class="patch">
	<metadata>
		<title>etcd-3.5.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.5.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935707" comment="etcd-3.5.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935708" comment="etcdctl-3.5.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935709" comment="etcdutl-3.5.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251937" version="1" class="patch">
	<metadata>
		<title>pam-1.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935710" comment="pam-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935711" comment="pam-32bit-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935712" comment="pam-devel-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935713" comment="pam-devel-32bit-1.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251938" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935714" comment="MozillaThunderbird-115.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935715" comment="MozillaThunderbird-translations-common-115.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935716" comment="MozillaThunderbird-translations-other-115.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251939" version="1" class="patch">
	<metadata>
		<title>coreutils-9.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0684" ref_url="https://www.suse.com/security/cve/CVE-2024-0684/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-9.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0684/">CVE-2024-0684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935717" comment="coreutils-9.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935718" comment="coreutils-doc-9.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935719" comment="coreutils-lang-9.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251940" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586/" source="CVE"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18586">CVE-2018-18586 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935720" comment="libmspack-devel-0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935721" comment="libmspack0-0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935722" comment="libmspack0-32bit-0.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935723" comment="mspack-examples-0.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251941" version="1" class="patch">
	<metadata>
		<title>coredns-1.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0874" ref_url="https://www.suse.com/security/cve/CVE-2024-0874/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0874/">CVE-2024-0874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0874">CVE-2024-0874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935724" comment="coredns-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935725" comment="coredns-extras-1.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251942" version="1" class="patch">
	<metadata>
		<title>grpc-devel-1.60.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731/" source="CVE"/>
		<reference ref_id="CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732/" source="CVE"/>
		<reference ref_id="CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785/" source="CVE"/>
		<description>
These are all security issues fixed in the grpc-devel-1.60.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935726" comment="grpc-devel-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935727" comment="grpc-source-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935728" comment="libgrpc++1_60-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935729" comment="libgrpc1_60-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935730" comment="libgrpc37-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935731" comment="libupb37-1.60.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935732" comment="upb-devel-1.60.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251943" version="1" class="patch">
	<metadata>
		<title>mlocate-0.26-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32190" ref_url="https://www.suse.com/security/cve/CVE-2023-32190/" source="CVE"/>
		<description>
These are all security issues fixed in the mlocate-0.26-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-32190/">CVE-2023-32190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32190">CVE-2023-32190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935733" comment="mlocate-0.26-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935734" comment="mlocate-lang-0.26-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251944" version="1" class="patch">
	<metadata>
		<title>libruby3_3-3_3-3.3.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_3-3_3-3.3.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935735" comment="libruby3_3-3_3-3.3.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935736" comment="ruby3.3-3.3.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935737" comment="ruby3.3-devel-3.3.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935738" comment="ruby3.3-devel-extra-3.3.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935739" comment="ruby3.3-doc-3.3.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935740" comment="ruby3.3-doc-ri-3.3.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251945" version="1" class="patch">
	<metadata>
		<title>sevctl-0.4.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<description>
These are all security issues fixed in the sevctl-0.4.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935741" comment="sevctl-0.4.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251946" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-23.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49934" ref_url="https://www.suse.com/security/cve/CVE-2023-49934/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-23.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49934/">CVE-2023-49934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49934">CVE-2023-49934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935742" comment="libnss_slurm2-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935743" comment="libpmi0-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935744" comment="libslurm40-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935745" comment="perl-slurm-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935746" comment="slurm-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935747" comment="slurm-auth-none-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935748" comment="slurm-config-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935749" comment="slurm-config-man-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935750" comment="slurm-cray-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935751" comment="slurm-devel-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935752" comment="slurm-doc-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935753" comment="slurm-lua-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935754" comment="slurm-munge-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935755" comment="slurm-node-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935756" comment="slurm-openlava-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935757" comment="slurm-pam_slurm-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935758" comment="slurm-plugin-ext-sensors-rrd-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935759" comment="slurm-plugins-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935760" comment="slurm-rest-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935761" comment="slurm-seff-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935762" comment="slurm-sjstat-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935763" comment="slurm-slurmdbd-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935764" comment="slurm-sql-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935765" comment="slurm-sview-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935766" comment="slurm-testsuite-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935767" comment="slurm-torque-23.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935768" comment="slurm-webdoc-23.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251947" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-122.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-0744" ref_url="https://www.suse.com/security/cve/CVE-2024-0744/" source="CVE"/>
		<reference ref_id="CVE-2024-0745" ref_url="https://www.suse.com/security/cve/CVE-2024-0745/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0748" ref_url="https://www.suse.com/security/cve/CVE-2024-0748/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0752" ref_url="https://www.suse.com/security/cve/CVE-2024-0752/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0754" ref_url="https://www.suse.com/security/cve/CVE-2024-0754/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-122.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0744/">CVE-2024-0744 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0744">CVE-2024-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0745/">CVE-2024-0745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0745">CVE-2024-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0748/">CVE-2024-0748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0748">CVE-2024-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0752/">CVE-2024-0752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0752">CVE-2024-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0754/">CVE-2024-0754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0754">CVE-2024-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935769" comment="MozillaFirefox-122.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935770" comment="MozillaFirefox-branding-upstream-122.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935771" comment="MozillaFirefox-devel-122.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935772" comment="MozillaFirefox-translations-common-122.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935773" comment="MozillaFirefox-translations-other-122.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251948" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.6.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.6.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935774" comment="libtiff-devel-4.6.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935775" comment="libtiff-devel-32bit-4.6.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935776" comment="libtiff6-4.6.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935777" comment="libtiff6-32bit-4.6.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935778" comment="tiff-4.6.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251949" version="1" class="patch">
	<metadata>
		<title>tinyssh-20240101-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyssh-20240101-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935779" comment="tinyssh-20240101-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251950" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.02.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.02.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935780" comment="ghostscript-10.02.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935781" comment="ghostscript-devel-10.02.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935782" comment="ghostscript-x11-10.02.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251951" version="1" class="patch">
	<metadata>
		<title>python3-salt-3006.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3006.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935783" comment="python3-salt-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935784" comment="salt-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935785" comment="salt-api-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935786" comment="salt-bash-completion-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935787" comment="salt-cloud-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935788" comment="salt-doc-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935789" comment="salt-fish-completion-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935790" comment="salt-master-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935791" comment="salt-minion-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935792" comment="salt-proxy-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935793" comment="salt-ssh-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935794" comment="salt-standalone-formulas-configuration-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935795" comment="salt-syndic-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935796" comment="salt-tests-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935797" comment="salt-transactional-update-3006.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935798" comment="salt-zsh-completion-3006.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251952" version="1" class="patch">
	<metadata>
		<title>squid-6.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<reference ref_id="CVE-2023-49288" ref_url="https://www.suse.com/security/cve/CVE-2023-49288/" source="CVE"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49288/">CVE-2023-49288 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49288">CVE-2023-49288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935799" comment="squid-6.6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251953" version="1" class="patch">
	<metadata>
		<title>libxreaderdocument3-4.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44451" ref_url="https://www.suse.com/security/cve/CVE-2023-44451/" source="CVE"/>
		<reference ref_id="CVE-2023-44452" ref_url="https://www.suse.com/security/cve/CVE-2023-44452/" source="CVE"/>
		<description>
These are all security issues fixed in the libxreaderdocument3-4.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44451/">CVE-2023-44451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44451">CVE-2023-44451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44452/">CVE-2023-44452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44452">CVE-2023-44452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935800" comment="libxreaderdocument3-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935801" comment="libxreaderview3-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935802" comment="typelib-1_0-XreaderDocument-1_5-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935803" comment="typelib-1_0-XreaderView-1_5-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935804" comment="xreader-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935805" comment="xreader-devel-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935806" comment="xreader-lang-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935807" comment="xreader-plugin-comicsdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935808" comment="xreader-plugin-djvudocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935809" comment="xreader-plugin-dvidocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935810" comment="xreader-plugin-epubdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935811" comment="xreader-plugin-pdfdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935812" comment="xreader-plugin-pixbufdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935813" comment="xreader-plugin-psdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935814" comment="xreader-plugin-tiffdocument-4.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935815" comment="xreader-plugin-xpsdocument-4.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251954" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935816" comment="libopenssl-3-devel-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935817" comment="libopenssl-3-devel-32bit-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935818" comment="libopenssl-3-fips-provider-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935819" comment="libopenssl3-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935820" comment="libopenssl3-32bit-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935821" comment="libopenssl3-x86-64-v3-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935822" comment="openssl-3-3.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935823" comment="openssl-3-doc-3.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251955" version="1" class="patch">
	<metadata>
		<title>python310-grpcio-1.60.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731/" source="CVE"/>
		<reference ref_id="CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732/" source="CVE"/>
		<reference ref_id="CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-grpcio-1.60.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935824" comment="python310-grpcio-1.60.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935825" comment="python311-grpcio-1.60.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935826" comment="python39-grpcio-1.60.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251956" version="1" class="patch">
	<metadata>
		<title>python3-onionshare-2.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19960" ref_url="https://www.suse.com/security/cve/CVE-2018-19960/" source="CVE"/>
		<reference ref_id="CVE-2021-41867" ref_url="https://www.suse.com/security/cve/CVE-2021-41867/" source="CVE"/>
		<reference ref_id="CVE-2021-41868" ref_url="https://www.suse.com/security/cve/CVE-2021-41868/" source="CVE"/>
		<reference ref_id="CVE-2022-21688" ref_url="https://www.suse.com/security/cve/CVE-2022-21688/" source="CVE"/>
		<reference ref_id="CVE-2022-21690" ref_url="https://www.suse.com/security/cve/CVE-2022-21690/" source="CVE"/>
		<reference ref_id="CVE-2022-21691" ref_url="https://www.suse.com/security/cve/CVE-2022-21691/" source="CVE"/>
		<reference ref_id="CVE-2022-21692" ref_url="https://www.suse.com/security/cve/CVE-2022-21692/" source="CVE"/>
		<reference ref_id="CVE-2022-21693" ref_url="https://www.suse.com/security/cve/CVE-2022-21693/" source="CVE"/>
		<reference ref_id="CVE-2022-21694" ref_url="https://www.suse.com/security/cve/CVE-2022-21694/" source="CVE"/>
		<reference ref_id="CVE-2022-21695" ref_url="https://www.suse.com/security/cve/CVE-2022-21695/" source="CVE"/>
		<reference ref_id="CVE-2022-21696" ref_url="https://www.suse.com/security/cve/CVE-2022-21696/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-onionshare-2.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19960/">CVE-2018-19960 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19960">CVE-2018-19960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41867/">CVE-2021-41867 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41867">CVE-2021-41867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41868/">CVE-2021-41868 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41868">CVE-2021-41868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21688/">CVE-2022-21688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21688">CVE-2022-21688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21690/">CVE-2022-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21690">CVE-2022-21690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21691/">CVE-2022-21691 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21691">CVE-2022-21691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21692/">CVE-2022-21692 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21692">CVE-2022-21692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21693/">CVE-2022-21693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21693">CVE-2022-21693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21694/">CVE-2022-21694 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21694">CVE-2022-21694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21695/">CVE-2022-21695 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21695">CVE-2022-21695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21696/">CVE-2022-21696 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21696">CVE-2022-21696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935827" comment="python3-onionshare-2.6-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251957" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.16.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.16.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935828" comment="ansible-core-2.16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935829" comment="ansible-test-2.16.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251958" version="1" class="patch">
	<metadata>
		<title>curl-8.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0853" ref_url="https://www.suse.com/security/cve/CVE-2024-0853/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-0853/">CVE-2024-0853 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0853">CVE-2024-0853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935830" comment="curl-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935831" comment="libcurl-devel-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935832" comment="libcurl-devel-32bit-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935833" comment="libcurl4-8.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935834" comment="libcurl4-32bit-8.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251959" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.10.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.10.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935835" comment="libssh-config-0.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935836" comment="libssh-devel-0.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935837" comment="libssh4-0.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935838" comment="libssh4-32bit-0.10.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251960" version="1" class="patch">
	<metadata>
		<title>libeverest-3.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23170" ref_url="https://www.suse.com/security/cve/CVE-2024-23170/" source="CVE"/>
		<description>
These are all security issues fixed in the libeverest-3.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23170/">CVE-2024-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23170">CVE-2024-23170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935839" comment="libeverest-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935840" comment="libeverest-x86-64-v3-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935841" comment="libmbedcrypto15-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935842" comment="libmbedcrypto15-x86-64-v3-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935843" comment="libmbedtls20-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935844" comment="libmbedtls20-x86-64-v3-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935845" comment="libmbedx509-6-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935846" comment="libmbedx509-6-x86-64-v3-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935847" comment="libp256m-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935848" comment="libp256m-x86-64-v3-3.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935849" comment="mbedtls-devel-3.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251961" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23170" ref_url="https://www.suse.com/security/cve/CVE-2024-23170/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23170/">CVE-2024-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23170">CVE-2024-23170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935850" comment="libmbedcrypto7-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935851" comment="libmbedcrypto7-x86-64-v3-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935852" comment="libmbedtls14-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935853" comment="libmbedtls14-x86-64-v3-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935854" comment="libmbedx509-1-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935855" comment="libmbedx509-1-x86-64-v3-2.28.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935856" comment="mbedtls-2-devel-2.28.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251962" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0807" ref_url="https://www.suse.com/security/cve/CVE-2024-0807/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0807/">CVE-2024-0807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0807">CVE-2024-0807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935857" comment="nodejs-electron-27.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935858" comment="nodejs-electron-devel-27.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935859" comment="nodejs-electron-doc-27.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251963" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23334" ref_url="https://www.suse.com/security/cve/CVE-2024-23334/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23334/">CVE-2024-23334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23334">CVE-2024-23334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935860" comment="python310-aiohttp-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935861" comment="python311-aiohttp-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935862" comment="python39-aiohttp-3.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251964" version="1" class="patch">
	<metadata>
		<title>python310-uamqp-1.6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21646" ref_url="https://www.suse.com/security/cve/CVE-2024-21646/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-uamqp-1.6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21646/">CVE-2024-21646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21646">CVE-2024-21646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935863" comment="python310-uamqp-1.6.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935864" comment="python311-uamqp-1.6.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935865" comment="python39-uamqp-1.6.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251965" version="1" class="patch">
	<metadata>
		<title>runc-1.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935866" comment="runc-1.1.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251966" version="1" class="patch">
	<metadata>
		<title>virtiofsd-1.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<description>
These are all security issues fixed in the virtiofsd-1.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905604" comment="virtiofsd-1.10.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251967" version="1" class="patch">
	<metadata>
		<title>cosign-2.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935867" comment="cosign-2.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251968" version="1" class="patch">
	<metadata>
		<title>glibc-2.39-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6246" ref_url="https://www.suse.com/security/cve/CVE-2023-6246/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.39-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6246/">CVE-2023-6246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935868" comment="glibc-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935869" comment="glibc-devel-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935870" comment="glibc-devel-static-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935871" comment="glibc-extra-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935872" comment="glibc-html-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935873" comment="glibc-i18ndata-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935874" comment="glibc-info-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935875" comment="glibc-lang-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935876" comment="glibc-locale-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935877" comment="glibc-locale-base-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935878" comment="glibc-profile-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935879" comment="libnsl1-2.39-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935880" comment="nscd-2.39-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251969" version="1" class="patch">
	<metadata>
		<title>xen-4.18.0_06-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839/" source="CVE"/>
		<reference ref_id="CVE-2023-46840" ref_url="https://www.suse.com/security/cve/CVE-2023-46840/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.0_06-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46840/">CVE-2023-46840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46840">CVE-2023-46840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935881" comment="xen-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935882" comment="xen-devel-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935883" comment="xen-doc-html-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935884" comment="xen-libs-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935885" comment="xen-tools-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935886" comment="xen-tools-domU-4.18.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935887" comment="xen-tools-xendomains-wait-disk-4.18.0_06-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251970" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.22.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0444" ref_url="https://www.suse.com/security/cve/CVE-2024-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.22.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0444/">CVE-2024-0444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0444">CVE-2024-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935888" comment="gstreamer-plugins-bad-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935889" comment="gstreamer-plugins-bad-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935890" comment="gstreamer-plugins-bad-chromaprint-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935891" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935892" comment="gstreamer-plugins-bad-devel-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935893" comment="gstreamer-plugins-bad-fluidsynth-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935894" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935895" comment="gstreamer-plugins-bad-lang-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935896" comment="gstreamer-transcoder-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935897" comment="gstreamer-transcoder-devel-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935898" comment="libgstadaptivedemux-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935899" comment="libgstadaptivedemux-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935900" comment="libgstbadaudio-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935901" comment="libgstbadaudio-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935902" comment="libgstbasecamerabinsrc-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935903" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935904" comment="libgstcodecparsers-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935905" comment="libgstcodecparsers-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935906" comment="libgstcodecs-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935907" comment="libgstcodecs-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935908" comment="libgstcuda-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935909" comment="libgstcuda-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935910" comment="libgstinsertbin-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935911" comment="libgstinsertbin-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935912" comment="libgstisoff-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935913" comment="libgstisoff-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935914" comment="libgstmpegts-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935915" comment="libgstmpegts-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935916" comment="libgstphotography-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935917" comment="libgstphotography-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935918" comment="libgstplay-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935919" comment="libgstplay-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935920" comment="libgstplayer-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935921" comment="libgstplayer-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935922" comment="libgstsctp-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935923" comment="libgstsctp-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935924" comment="libgsttranscoder-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935925" comment="libgsttranscoder-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935926" comment="libgsturidownloader-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935927" comment="libgsturidownloader-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935928" comment="libgstva-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935929" comment="libgstva-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935930" comment="libgstvulkan-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935931" comment="libgstvulkan-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935932" comment="libgstwayland-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935933" comment="libgstwayland-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935934" comment="libgstwebrtc-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935935" comment="libgstwebrtc-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935936" comment="libgstwebrtcnice-1_0-0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935937" comment="libgstwebrtcnice-1_0-0-32bit-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935938" comment="typelib-1_0-CudaGst-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935939" comment="typelib-1_0-GstBadAudio-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935940" comment="typelib-1_0-GstCodecs-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935941" comment="typelib-1_0-GstCuda-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935942" comment="typelib-1_0-GstInsertBin-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935943" comment="typelib-1_0-GstMpegts-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935944" comment="typelib-1_0-GstPlay-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935945" comment="typelib-1_0-GstPlayer-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935946" comment="typelib-1_0-GstTranscoder-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935947" comment="typelib-1_0-GstVa-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935948" comment="typelib-1_0-GstVulkan-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935949" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935950" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935951" comment="typelib-1_0-GstWebRTC-1_0-1.22.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251971" version="1" class="patch">
	<metadata>
		<title>python3-salt-3006.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22231" ref_url="https://www.suse.com/security/cve/CVE-2024-22231/" source="CVE"/>
		<reference ref_id="CVE-2024-22232" ref_url="https://www.suse.com/security/cve/CVE-2024-22232/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3006.0-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22231/">CVE-2024-22231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22231">CVE-2024-22231 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22232/">CVE-2024-22232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22232">CVE-2024-22232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935952" comment="python3-salt-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935953" comment="salt-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935954" comment="salt-api-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935955" comment="salt-bash-completion-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935956" comment="salt-cloud-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935957" comment="salt-doc-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935958" comment="salt-fish-completion-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935959" comment="salt-master-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935960" comment="salt-minion-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935961" comment="salt-proxy-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935962" comment="salt-ssh-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935963" comment="salt-standalone-formulas-configuration-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935964" comment="salt-syndic-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935965" comment="salt-tests-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935966" comment="salt-transactional-update-3006.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935967" comment="salt-zsh-completion-3006.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251972" version="1" class="patch">
	<metadata>
		<title>buildkit-0.12.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<description>
These are all security issues fixed in the buildkit-0.12.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935968" comment="buildkit-0.12.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251973" version="1" class="patch">
	<metadata>
		<title>rekor-1.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935969" comment="rekor-1.3.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251974" version="1" class="patch">
	<metadata>
		<title>cpio-2.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935970" comment="cpio-2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935971" comment="cpio-lang-2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935972" comment="cpio-mt-2.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251975" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.402-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.402-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935973" comment="java-1_8_0-openjdk-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935974" comment="java-1_8_0-openjdk-accessibility-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935975" comment="java-1_8_0-openjdk-demo-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935976" comment="java-1_8_0-openjdk-devel-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935977" comment="java-1_8_0-openjdk-headless-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935978" comment="java-1_8_0-openjdk-javadoc-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935979" comment="java-1_8_0-openjdk-src-1.8.0.402-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251976" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-11.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5849" ref_url="https://www.suse.com/security/cve/CVE-2017-5849/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-11.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5849/">CVE-2017-5849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5849">CVE-2017-5849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935980" comment="libnetpbm-devel-11.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935981" comment="libnetpbm11-11.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935982" comment="libnetpbm11-32bit-11.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935983" comment="netpbm-11.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251977" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2u-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2u-24.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935984" comment="libopenssl-1_0_0-devel-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935985" comment="libopenssl-1_0_0-devel-32bit-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935986" comment="libopenssl10-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935987" comment="libopenssl1_0_0-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935988" comment="libopenssl1_0_0-32bit-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935989" comment="libopenssl1_0_0-steam-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935990" comment="libopenssl1_0_0-steam-32bit-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935991" comment="openssl-1_0_0-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935992" comment="openssl-1_0_0-cavs-1.0.2u-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935993" comment="openssl-1_0_0-doc-1.0.2u-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251978" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_1-0-3.1.0-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5366" ref_url="https://www.suse.com/security/cve/CVE-2023-5366/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_1-0-3.1.0-18.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5366/">CVE-2023-5366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5366">CVE-2023-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009935994" comment="libopenvswitch-3_1-0-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935995" comment="libovn-23_03-0-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935996" comment="openvswitch-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935997" comment="openvswitch-devel-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935998" comment="openvswitch-doc-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009935999" comment="openvswitch-ipsec-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936000" comment="openvswitch-pki-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936001" comment="openvswitch-test-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936002" comment="openvswitch-vtep-3.1.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936003" comment="ovn-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936004" comment="ovn-central-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936005" comment="ovn-devel-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936006" comment="ovn-doc-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936007" comment="ovn-docker-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936008" comment="ovn-host-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936009" comment="ovn-vtep-23.03.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936010" comment="python3-ovs-3.1.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251979" version="1" class="patch">
	<metadata>
		<title>libmilter-doc-8.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51765" ref_url="https://www.suse.com/security/cve/CVE-2023-51765/" source="CVE"/>
		<description>
These are all security issues fixed in the libmilter-doc-8.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51765/">CVE-2023-51765 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51765">CVE-2023-51765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936011" comment="libmilter-doc-8.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936012" comment="libmilter1_0-8.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936013" comment="rmail-8.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936014" comment="sendmail-8.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936015" comment="sendmail-devel-8.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936016" comment="sendmail-starttls-8.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251980" version="1" class="patch">
	<metadata>
		<title>axis-1.4-307.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51441" ref_url="https://www.suse.com/security/cve/CVE-2023-51441/" source="CVE"/>
		<description>
These are all security issues fixed in the axis-1.4-307.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-51441/">CVE-2023-51441 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51441">CVE-2023-51441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936017" comment="axis-1.4-307.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936018" comment="axis-manual-1.4-307.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251981" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936020" comment="kernel-macros-6.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936021" comment="kernel-source-6.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936022" comment="kernel-source-vanilla-6.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251982" version="1" class="patch">
	<metadata>
		<title>libgit2-1_7-1.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24574" ref_url="https://www.suse.com/security/cve/CVE-2024-24574/" source="CVE"/>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_7-1.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24574/">CVE-2024-24574 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24574">CVE-2024-24574 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936023" comment="libgit2-1_7-1.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936024" comment="libgit2-devel-1.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936025" comment="libgit2-tools-1.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251983" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1w-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1w-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936026" comment="libopenssl-1_1-devel-1.1.1w-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936027" comment="libopenssl-1_1-devel-32bit-1.1.1w-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936028" comment="libopenssl1_1-1.1.1w-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936029" comment="libopenssl1_1-32bit-1.1.1w-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936030" comment="openssl-1_1-1.1.1w-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936031" comment="openssl-1_1-doc-1.1.1w-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251984" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936032" comment="libopenssl-3-devel-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936033" comment="libopenssl-3-devel-32bit-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936034" comment="libopenssl-3-fips-provider-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936035" comment="libopenssl3-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936036" comment="libopenssl3-32bit-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936037" comment="libopenssl3-x86-64-v3-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936038" comment="openssl-3-3.1.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936039" comment="openssl-3-doc-3.1.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251985" version="1" class="patch">
	<metadata>
		<title>python310-python-multipart-0.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24762" ref_url="https://www.suse.com/security/cve/CVE-2024-24762/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-multipart-0.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24762/">CVE-2024-24762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24762">CVE-2024-24762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936040" comment="python310-python-multipart-0.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936041" comment="python311-python-multipart-0.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936042" comment="python312-python-multipart-0.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936043" comment="python39-python-multipart-0.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251986" version="1" class="patch">
	<metadata>
		<title>libsystemd0-254.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-254.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936044" comment="libsystemd0-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936045" comment="libsystemd0-32bit-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936046" comment="libudev1-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936047" comment="libudev1-32bit-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936048" comment="systemd-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936049" comment="systemd-32bit-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936050" comment="systemd-boot-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936051" comment="systemd-container-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936052" comment="systemd-coredump-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936053" comment="systemd-devel-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936054" comment="systemd-doc-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936055" comment="systemd-experimental-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936056" comment="systemd-homed-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936057" comment="systemd-journal-remote-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936058" comment="systemd-lang-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936059" comment="systemd-network-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936060" comment="systemd-portable-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936061" comment="systemd-sysvcompat-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936062" comment="systemd-testsuite-254.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936063" comment="udev-254.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251987" version="1" class="patch">
	<metadata>
		<title>gsasl-2.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-2469" ref_url="https://www.suse.com/security/cve/CVE-2022-2469/" source="CVE"/>
		<description>
These are all security issues fixed in the gsasl-2.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2469/">CVE-2022-2469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2469">CVE-2022-2469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936064" comment="gsasl-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936065" comment="gsasl-devel-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936066" comment="gsasl-lang-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936067" comment="libgsasl18-2.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251988" version="1" class="patch">
	<metadata>
		<title>pgadmin4-8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0959" ref_url="https://www.suse.com/security/cve/CVE-2022-0959/" source="CVE"/>
		<reference ref_id="CVE-2023-0241" ref_url="https://www.suse.com/security/cve/CVE-2023-0241/" source="CVE"/>
		<reference ref_id="CVE-2023-22298" ref_url="https://www.suse.com/security/cve/CVE-2023-22298/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0959/">CVE-2022-0959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0959">CVE-2022-0959 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0241/">CVE-2023-0241 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0241">CVE-2023-0241 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22298/">CVE-2023-22298 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22298">CVE-2023-22298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936068" comment="pgadmin4-8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936069" comment="pgadmin4-cloud-8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936070" comment="pgadmin4-desktop-8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936071" comment="pgadmin4-doc-8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936072" comment="pgadmin4-web-uwsgi-8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936073" comment="system-user-pgadmin-8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251989" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936074" comment="postgresql12-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936075" comment="postgresql12-contrib-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936076" comment="postgresql12-devel-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936077" comment="postgresql12-docs-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936078" comment="postgresql12-llvmjit-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936079" comment="postgresql12-llvmjit-devel-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936080" comment="postgresql12-plperl-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936081" comment="postgresql12-plpython-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936082" comment="postgresql12-pltcl-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936083" comment="postgresql12-server-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936084" comment="postgresql12-server-devel-12.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936085" comment="postgresql12-test-12.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251990" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936086" comment="postgresql13-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936087" comment="postgresql13-contrib-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936088" comment="postgresql13-devel-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936089" comment="postgresql13-docs-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936090" comment="postgresql13-llvmjit-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936091" comment="postgresql13-llvmjit-devel-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936092" comment="postgresql13-plperl-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936093" comment="postgresql13-plpython-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936094" comment="postgresql13-pltcl-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936095" comment="postgresql13-server-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936096" comment="postgresql13-server-devel-13.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936097" comment="postgresql13-test-13.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251991" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936098" comment="postgresql14-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936099" comment="postgresql14-contrib-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936100" comment="postgresql14-devel-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936101" comment="postgresql14-docs-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936102" comment="postgresql14-llvmjit-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936103" comment="postgresql14-llvmjit-devel-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936104" comment="postgresql14-plperl-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936105" comment="postgresql14-plpython-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936106" comment="postgresql14-pltcl-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936107" comment="postgresql14-server-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936108" comment="postgresql14-server-devel-14.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936109" comment="postgresql14-test-14.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251992" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936110" comment="postgresql15-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936111" comment="postgresql15-contrib-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936112" comment="postgresql15-devel-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936113" comment="postgresql15-docs-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936114" comment="postgresql15-llvmjit-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936115" comment="postgresql15-llvmjit-devel-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936116" comment="postgresql15-plperl-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936117" comment="postgresql15-plpython-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936118" comment="postgresql15-pltcl-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936119" comment="postgresql15-server-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936120" comment="postgresql15-server-devel-15.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936121" comment="postgresql15-test-15.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251993" version="1" class="patch">
	<metadata>
		<title>libecpg6-16.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-16.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936122" comment="libecpg6-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936123" comment="libecpg6-32bit-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936124" comment="libpq5-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936125" comment="libpq5-32bit-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936126" comment="postgresql16-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936127" comment="postgresql16-contrib-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936128" comment="postgresql16-devel-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936129" comment="postgresql16-docs-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936130" comment="postgresql16-llvmjit-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936131" comment="postgresql16-llvmjit-devel-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936132" comment="postgresql16-plperl-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936133" comment="postgresql16-plpython-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936134" comment="postgresql16-pltcl-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936135" comment="postgresql16-server-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936136" comment="postgresql16-server-devel-16.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936137" comment="postgresql16-test-16.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251994" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24680" ref_url="https://www.suse.com/security/cve/CVE-2024-24680/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24680/">CVE-2024-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24680">CVE-2024-24680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936138" comment="python310-Django-4.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936139" comment="python311-Django-4.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936140" comment="python312-Django-4.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936141" comment="python39-Django-4.2.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251995" version="1" class="patch">
	<metadata>
		<title>python310-oletools-0.60.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40444" ref_url="https://www.suse.com/security/cve/CVE-2021-40444/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-oletools-0.60.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40444/">CVE-2021-40444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40444">CVE-2021-40444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936142" comment="python310-oletools-0.60.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936143" comment="python311-oletools-0.60.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936144" comment="python312-oletools-0.60.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936145" comment="python39-oletools-0.60.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251996" version="1" class="patch">
	<metadata>
		<title>libgit2-1_7-1.7.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24575" ref_url="https://www.suse.com/security/cve/CVE-2024-24575/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_7-1.7.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24575/">CVE-2024-24575 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24575">CVE-2024-24575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936146" comment="libgit2-1_7-1.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936147" comment="libgit2-devel-1.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936148" comment="libgit2-tools-1.7.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251997" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.11.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.11.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905480" comment="libxml2-2-2.11.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936149" comment="libxml2-2-32bit-2.11.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936150" comment="libxml2-devel-2.11.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936151" comment="libxml2-devel-32bit-2.11.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936152" comment="libxml2-doc-2.11.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905481" comment="libxml2-tools-2.11.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251998" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936153" comment="java-11-openj9-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936154" comment="java-11-openj9-demo-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936155" comment="java-11-openj9-devel-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936156" comment="java-11-openj9-headless-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936157" comment="java-11-openj9-javadoc-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936158" comment="java-11-openj9-jmods-11.0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936159" comment="java-11-openj9-src-11.0.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251999" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936160" comment="java-17-openj9-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936161" comment="java-17-openj9-demo-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936162" comment="java-17-openj9-devel-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936163" comment="java-17-openj9-headless-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936164" comment="java-17-openj9-javadoc-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936165" comment="java-17-openj9-jmods-17.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936166" comment="java-17-openj9-src-17.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252000" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.402-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.402-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936167" comment="java-1_8_0-openj9-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936168" comment="java-1_8_0-openj9-accessibility-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936169" comment="java-1_8_0-openj9-demo-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936170" comment="java-1_8_0-openj9-devel-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936171" comment="java-1_8_0-openj9-headless-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936172" comment="java-1_8_0-openj9-javadoc-1.8.0.402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936173" comment="java-1_8_0-openj9-src-1.8.0.402-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252001" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-5.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-5.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936174" comment="pdns-recursor-5.0.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252002" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24821" ref_url="https://www.suse.com/security/cve/CVE-2024-24821/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24821/">CVE-2024-24821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24821">CVE-2024-24821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936175" comment="php-composer2-2.7.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252003" version="1" class="patch">
	<metadata>
		<title>python310-uamqp-1.6.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25110" ref_url="https://www.suse.com/security/cve/CVE-2024-25110/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-uamqp-1.6.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25110/">CVE-2024-25110 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25110">CVE-2024-25110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936176" comment="python310-uamqp-1.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936177" comment="python311-uamqp-1.6.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936178" comment="python39-uamqp-1.6.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252004" version="1" class="patch">
	<metadata>
		<title>libIex-3_1-30-32bit-3.1.11-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5841" ref_url="https://www.suse.com/security/cve/CVE-2023-5841/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_1-30-32bit-3.1.11-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5841/">CVE-2023-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5841">CVE-2023-5841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936179" comment="libIex-3_1-30-32bit-3.1.11-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936180" comment="libIex-3_2-31-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936181" comment="libIlmThread-3_1-30-32bit-3.1.11-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936182" comment="libIlmThread-3_2-31-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936183" comment="libOpenEXR-3_1-30-32bit-3.1.11-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936184" comment="libOpenEXR-3_2-31-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936185" comment="libOpenEXRCore-3_1-30-32bit-3.1.11-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936186" comment="libOpenEXRCore-3_2-31-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936187" comment="libOpenEXRUtil-3_1-30-32bit-3.1.11-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936188" comment="libOpenEXRUtil-3_2-31-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936189" comment="openexr-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936190" comment="openexr-devel-3.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936191" comment="openexr-doc-3.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252005" version="1" class="patch">
	<metadata>
		<title>python310-fastapi-0.109.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24762" ref_url="https://www.suse.com/security/cve/CVE-2024-24762/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-fastapi-0.109.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24762/">CVE-2024-24762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24762">CVE-2024-24762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936192" comment="python310-fastapi-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936193" comment="python311-fastapi-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936194" comment="python312-fastapi-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936195" comment="python39-fastapi-0.109.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252006" version="1" class="patch">
	<metadata>
		<title>hugin-2023.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25442" ref_url="https://www.suse.com/security/cve/CVE-2024-25442/" source="CVE"/>
		<reference ref_id="CVE-2024-25445" ref_url="https://www.suse.com/security/cve/CVE-2024-25445/" source="CVE"/>
		<description>
These are all security issues fixed in the hugin-2023.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25442/">CVE-2024-25442 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25442">CVE-2024-25442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25445/">CVE-2024-25445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25445">CVE-2024-25445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936196" comment="hugin-2023.0.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252007" version="1" class="patch">
	<metadata>
		<title>python310-FontTools-4.47.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45139" ref_url="https://www.suse.com/security/cve/CVE-2023-45139/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-FontTools-4.47.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45139/">CVE-2023-45139 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45139">CVE-2023-45139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936197" comment="python310-FontTools-4.47.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936198" comment="python311-FontTools-4.47.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936199" comment="python312-FontTools-4.47.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936200" comment="python39-FontTools-4.47.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252008" version="1" class="patch">
	<metadata>
		<title>bind-9.18.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.18.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936201" comment="bind-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936202" comment="bind-doc-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936203" comment="bind-modules-bdbhpt-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936204" comment="bind-modules-generic-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936205" comment="bind-modules-ldap-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936206" comment="bind-modules-mysql-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936207" comment="bind-modules-perl-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936208" comment="bind-modules-sqlite3-9.18.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936209" comment="bind-utils-9.18.24-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252009" version="1" class="patch">
	<metadata>
		<title>buildkit-0.12.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<description>
These are all security issues fixed in the buildkit-0.12.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936210" comment="buildkit-0.12.5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252010" version="1" class="patch">
	<metadata>
		<title>docker-24.0.7_ce-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-24.0.7_ce-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936211" comment="docker-24.0.7_ce-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936212" comment="docker-bash-completion-24.0.7_ce-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936213" comment="docker-fish-completion-24.0.7_ce-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936214" comment="docker-rootless-extras-24.0.7_ce-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936215" comment="docker-zsh-completion-24.0.7_ce-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252011" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.12+kde151-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.12+kde151-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936216" comment="libQt5Bootstrap-devel-static-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936217" comment="libQt5Bootstrap-devel-static-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936218" comment="libQt5Concurrent-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936219" comment="libQt5Concurrent-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936220" comment="libQt5Concurrent5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936221" comment="libQt5Concurrent5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936222" comment="libQt5Core-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936223" comment="libQt5Core-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936224" comment="libQt5Core-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936225" comment="libQt5Core5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936226" comment="libQt5Core5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936227" comment="libQt5DBus-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936228" comment="libQt5DBus-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936229" comment="libQt5DBus-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936230" comment="libQt5DBus5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936231" comment="libQt5DBus5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936232" comment="libQt5Gui-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936233" comment="libQt5Gui-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936234" comment="libQt5Gui-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936235" comment="libQt5Gui5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936236" comment="libQt5Gui5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936237" comment="libQt5KmsSupport-devel-static-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936238" comment="libQt5KmsSupport-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936239" comment="libQt5Network-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936240" comment="libQt5Network-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936241" comment="libQt5Network-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936242" comment="libQt5Network5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936243" comment="libQt5Network5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936244" comment="libQt5OpenGL-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936245" comment="libQt5OpenGL-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936246" comment="libQt5OpenGL-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936247" comment="libQt5OpenGL5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936248" comment="libQt5OpenGL5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936249" comment="libQt5OpenGLExtensions-devel-static-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936250" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936251" comment="libQt5PlatformHeaders-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936252" comment="libQt5PlatformSupport-devel-static-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936253" comment="libQt5PlatformSupport-devel-static-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936254" comment="libQt5PlatformSupport-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936255" comment="libQt5PrintSupport-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936256" comment="libQt5PrintSupport-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936257" comment="libQt5PrintSupport-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936258" comment="libQt5PrintSupport5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936259" comment="libQt5PrintSupport5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936260" comment="libQt5Sql-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936261" comment="libQt5Sql-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936262" comment="libQt5Sql-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936263" comment="libQt5Sql5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936264" comment="libQt5Sql5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936265" comment="libQt5Sql5-mysql-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936266" comment="libQt5Sql5-mysql-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936267" comment="libQt5Sql5-postgresql-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936268" comment="libQt5Sql5-postgresql-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936269" comment="libQt5Sql5-sqlite-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936270" comment="libQt5Sql5-sqlite-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936271" comment="libQt5Sql5-unixODBC-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936272" comment="libQt5Sql5-unixODBC-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936273" comment="libQt5Test-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936274" comment="libQt5Test-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936275" comment="libQt5Test-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936276" comment="libQt5Test5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936277" comment="libQt5Test5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936278" comment="libQt5Widgets-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936279" comment="libQt5Widgets-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936280" comment="libQt5Widgets-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936281" comment="libQt5Widgets5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936282" comment="libQt5Widgets5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936283" comment="libQt5Xml-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936284" comment="libQt5Xml-devel-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936285" comment="libQt5Xml5-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936286" comment="libQt5Xml5-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936287" comment="libqt5-qtbase-common-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936288" comment="libqt5-qtbase-devel-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936289" comment="libqt5-qtbase-examples-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936290" comment="libqt5-qtbase-examples-32bit-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936291" comment="libqt5-qtbase-platformtheme-gtk3-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936292" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.12+kde151-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936293" comment="libqt5-qtbase-private-headers-devel-5.15.12+kde151-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252012" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.9.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47641" ref_url="https://www.suse.com/security/cve/CVE-2023-47641/" source="CVE"/>
		<reference ref_id="CVE-2023-49081" ref_url="https://www.suse.com/security/cve/CVE-2023-49081/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.9.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47641/">CVE-2023-47641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47641">CVE-2023-47641 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-49081/">CVE-2023-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49081">CVE-2023-49081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936294" comment="python310-aiohttp-3.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936295" comment="python311-aiohttp-3.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936296" comment="python312-aiohttp-3.9.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936297" comment="python39-aiohttp-3.9.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252013" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.85-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.85-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936298" comment="tomcat-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936299" comment="tomcat-admin-webapps-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936300" comment="tomcat-docs-webapp-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936301" comment="tomcat-el-3_0-api-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936302" comment="tomcat-embed-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936303" comment="tomcat-javadoc-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936304" comment="tomcat-jsp-2_3-api-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936305" comment="tomcat-jsvc-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936306" comment="tomcat-lib-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936307" comment="tomcat-servlet-4_0-api-9.0.85-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936308" comment="tomcat-webapps-9.0.85-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252014" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.18-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.18-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936309" comment="tomcat10-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936310" comment="tomcat10-admin-webapps-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936311" comment="tomcat10-doc-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936312" comment="tomcat10-docs-webapp-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936313" comment="tomcat10-el-5_0-api-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936314" comment="tomcat10-embed-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936315" comment="tomcat10-jsp-3_1-api-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936316" comment="tomcat10-jsvc-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936317" comment="tomcat10-lib-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936318" comment="tomcat10-servlet-6_0-api-10.1.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936319" comment="tomcat10-webapps-10.1.18-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252015" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.10-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.10-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936320" comment="wpa_supplicant-2.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936321" comment="wpa_supplicant-gui-2.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252016" version="1" class="patch">
	<metadata>
		<title>expat-2.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2023-52426" ref_url="https://www.suse.com/security/cve/CVE-2023-52426/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52426/">CVE-2023-52426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52426">CVE-2023-52426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936322" comment="expat-2.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936323" comment="libexpat-devel-2.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936324" comment="libexpat-devel-32bit-2.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936325" comment="libexpat1-2.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936326" comment="libexpat1-32bit-2.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252017" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936328" comment="kernel-macros-6.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936329" comment="kernel-source-6.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936330" comment="kernel-source-vanilla-6.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252018" version="1" class="patch">
	<metadata>
		<title>corepack20-20.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890/" source="CVE"/>
		<reference ref_id="CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896/" source="CVE"/>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-24758" ref_url="https://www.suse.com/security/cve/CVE-2024-24758/" source="CVE"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24758/">CVE-2024-24758 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24758">CVE-2024-24758 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936331" comment="corepack20-20.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936332" comment="nodejs20-20.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936333" comment="nodejs20-devel-20.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936334" comment="nodejs20-docs-20.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936335" comment="npm20-20.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252019" version="1" class="patch">
	<metadata>
		<title>corepack21-21.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890/" source="CVE"/>
		<reference ref_id="CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896/" source="CVE"/>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-24758" ref_url="https://www.suse.com/security/cve/CVE-2024-24758/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack21-21.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24758/">CVE-2024-24758 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24758">CVE-2024-24758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936336" comment="corepack21-21.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936337" comment="nodejs21-21.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936338" comment="nodejs21-devel-21.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936339" comment="nodejs21-docs-21.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936340" comment="npm21-21.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252020" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.4.15.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.4.15.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936341" comment="apache2-mod_auth_openidc-2.4.15.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252021" version="1" class="patch">
	<metadata>
		<title>indent-2.2.13-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0911" ref_url="https://www.suse.com/security/cve/CVE-2024-0911/" source="CVE"/>
		<description>
These are all security issues fixed in the indent-2.2.13-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0911/">CVE-2024-0911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0911">CVE-2024-0911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936342" comment="indent-2.2.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936343" comment="indent-lang-2.2.13-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252022" version="1" class="patch">
	<metadata>
		<title>nginx-1.25.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24989" ref_url="https://www.suse.com/security/cve/CVE-2024-24989/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.25.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24989/">CVE-2024-24989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24989">CVE-2024-24989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936344" comment="nginx-1.25.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936345" comment="nginx-source-1.25.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252023" version="1" class="patch">
	<metadata>
		<title>apache-commons-compress-1.26.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25710" ref_url="https://www.suse.com/security/cve/CVE-2024-25710/" source="CVE"/>
		<reference ref_id="CVE-2024-26308" ref_url="https://www.suse.com/security/cve/CVE-2024-26308/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-compress-1.26.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25710/">CVE-2024-25710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25710">CVE-2024-25710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26308/">CVE-2024-26308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26308">CVE-2024-26308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936346" comment="apache-commons-compress-1.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936347" comment="apache-commons-compress-javadoc-1.26.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252024" version="1" class="patch">
	<metadata>
		<title>dav1d-1.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1580" ref_url="https://www.suse.com/security/cve/CVE-2024-1580/" source="CVE"/>
		<description>
These are all security issues fixed in the dav1d-1.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-1580/">CVE-2024-1580 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1580">CVE-2024-1580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936348" comment="dav1d-1.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936349" comment="dav1d-devel-1.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936350" comment="libdav1d7-1.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936351" comment="libdav1d7-32bit-1.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252025" version="1" class="patch">
	<metadata>
		<title>kernel-devel-longterm-6.6.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-5123" ref_url="https://www.suse.com/security/cve/CVE-2017-5123/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-12714" ref_url="https://www.suse.com/security/cve/CVE-2018-12714/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-3887" ref_url="https://www.suse.com/security/cve/CVE-2019-3887/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="CVE-2021-26708" ref_url="https://www.suse.com/security/cve/CVE-2021-26708/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-32606" ref_url="https://www.suse.com/security/cve/CVE-2021-32606/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-0886" ref_url="https://www.suse.com/security/cve/CVE-2022-0886/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-1973" ref_url="https://www.suse.com/security/cve/CVE-2022-1973/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-2308" ref_url="https://www.suse.com/security/cve/CVE-2022-2308/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-2590" ref_url="https://www.suse.com/security/cve/CVE-2022-2590/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-29968" ref_url="https://www.suse.com/security/cve/CVE-2022-29968/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379/" source="CVE"/>
		<reference ref_id="CVE-2022-44032" ref_url="https://www.suse.com/security/cve/CVE-2022-44032/" source="CVE"/>
		<reference ref_id="CVE-2022-44033" ref_url="https://www.suse.com/security/cve/CVE-2022-44033/" source="CVE"/>
		<reference ref_id="CVE-2022-44034" ref_url="https://www.suse.com/security/cve/CVE-2022-44034/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45888" ref_url="https://www.suse.com/security/cve/CVE-2022-45888/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-3269" ref_url="https://www.suse.com/security/cve/CVE-2023-3269/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15129">CVE-2017-15129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16645">CVE-2017-16645 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16647">CVE-2017-16647 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16648">CVE-2017-16648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16995">CVE-2017-16995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16996">CVE-2017-16996 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17448">CVE-2017-17448 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17449">CVE-2017-17449 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17852">CVE-2017-17852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17853">CVE-2017-17853 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17854">CVE-2017-17854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17855">CVE-2017-17855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17856">CVE-2017-17856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17857">CVE-2017-17857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5123/">CVE-2017-5123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5123">CVE-2017-5123 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7541">CVE-2017-7541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10322">CVE-2018-10322 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10323">CVE-2018-10323 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1118">CVE-2018-1118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12232">CVE-2018-12232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12714/">CVE-2018-12714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12714">CVE-2018-12714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8043">CVE-2018-8043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8087">CVE-2018-8087 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15504">CVE-2019-15504 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18812">CVE-2019-18812 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18813">CVE-2019-18813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19252">CVE-2019-19252 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3887/">CVE-2019-3887 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3887">CVE-2019-3887 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8564">CVE-2019-8564 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8912">CVE-2019-8912 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9500">CVE-2019-9500 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26708/">CVE-2021-26708 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32606/">CVE-2021-32606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32606">CVE-2021-32606 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0886/">CVE-2022-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0886">CVE-2022-0886 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1973/">CVE-2022-1973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2308/">CVE-2022-2308 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2590/">CVE-2022-2590 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2590">CVE-2022-2590 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29968/">CVE-2022-29968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29968">CVE-2022-29968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44032/">CVE-2022-44032 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44032">CVE-2022-44032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44033/">CVE-2022-44033 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44033">CVE-2022-44033 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44034/">CVE-2022-44034 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44034">CVE-2022-44034 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45888/">CVE-2022-45888 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45888">CVE-2022-45888 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3269/">CVE-2023-3269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936353" comment="kernel-source-longterm-6.6.17-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252026" version="1" class="patch">
	<metadata>
		<title>qemu-8.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936354" comment="qemu-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936355" comment="qemu-SLOF-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936356" comment="qemu-accel-qtest-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936357" comment="qemu-accel-tcg-x86-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936358" comment="qemu-arm-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936359" comment="qemu-audio-alsa-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936360" comment="qemu-audio-dbus-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936361" comment="qemu-audio-jack-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936362" comment="qemu-audio-oss-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936363" comment="qemu-audio-pa-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936364" comment="qemu-audio-pipewire-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936365" comment="qemu-audio-spice-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936366" comment="qemu-block-curl-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936367" comment="qemu-block-dmg-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936368" comment="qemu-block-gluster-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936369" comment="qemu-block-iscsi-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936370" comment="qemu-block-nfs-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936371" comment="qemu-block-rbd-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936372" comment="qemu-block-ssh-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936373" comment="qemu-chardev-baum-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936374" comment="qemu-chardev-spice-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936375" comment="qemu-doc-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936376" comment="qemu-extra-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936377" comment="qemu-guest-agent-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936378" comment="qemu-headless-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936379" comment="qemu-hw-display-qxl-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936380" comment="qemu-hw-display-virtio-gpu-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936381" comment="qemu-hw-display-virtio-gpu-pci-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936382" comment="qemu-hw-display-virtio-vga-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936383" comment="qemu-hw-s390x-virtio-gpu-ccw-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936384" comment="qemu-hw-usb-host-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936385" comment="qemu-hw-usb-redirect-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936386" comment="qemu-hw-usb-smartcard-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936387" comment="qemu-img-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936388" comment="qemu-ipxe-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936389" comment="qemu-ivshmem-tools-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936390" comment="qemu-ksm-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936391" comment="qemu-lang-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936392" comment="qemu-microvm-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936393" comment="qemu-ppc-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936394" comment="qemu-pr-helper-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936395" comment="qemu-s390x-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936396" comment="qemu-seabios-8.2.11.16.3_3_ga95067eb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936397" comment="qemu-skiboot-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936398" comment="qemu-spice-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936399" comment="qemu-tools-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936400" comment="qemu-ui-curses-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936401" comment="qemu-ui-dbus-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936402" comment="qemu-ui-gtk-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936403" comment="qemu-ui-opengl-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936404" comment="qemu-ui-spice-app-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936405" comment="qemu-ui-spice-core-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936406" comment="qemu-vgabios-8.2.11.16.3_3_ga95067eb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936407" comment="qemu-vhost-user-gpu-8.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936408" comment="qemu-x86-8.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252027" version="1" class="patch">
	<metadata>
		<title>libhtp-devel-0.5.46-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23837" ref_url="https://www.suse.com/security/cve/CVE-2024-23837/" source="CVE"/>
		<description>
These are all security issues fixed in the libhtp-devel-0.5.46-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23837/">CVE-2024-23837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23837">CVE-2024-23837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936409" comment="libhtp-devel-0.5.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936410" comment="libhtp2-0.5.46-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252028" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.90-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.90-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936411" comment="dnsmasq-2.90-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936412" comment="dnsmasq-utils-2.90-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252029" version="1" class="patch">
	<metadata>
		<title>helm-3.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936413" comment="helm-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936414" comment="helm-bash-completion-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936415" comment="helm-fish-completion-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936416" comment="helm-zsh-completion-3.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252030" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-27.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1283" ref_url="https://www.suse.com/security/cve/CVE-2024-1283/" source="CVE"/>
		<reference ref_id="CVE-2024-1284" ref_url="https://www.suse.com/security/cve/CVE-2024-1284/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-27.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1283/">CVE-2024-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1283">CVE-2024-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1284/">CVE-2024-1284 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1284">CVE-2024-1284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936417" comment="nodejs-electron-27.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936418" comment="nodejs-electron-devel-27.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936419" comment="nodejs-electron-doc-27.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252031" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-42.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26130" ref_url="https://www.suse.com/security/cve/CVE-2024-26130/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-42.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26130/">CVE-2024-26130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26130">CVE-2024-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936420" comment="python310-cryptography-42.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936421" comment="python311-cryptography-42.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936422" comment="python312-cryptography-42.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936423" comment="python39-cryptography-42.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252032" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936424" comment="MozillaThunderbird-115.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936425" comment="MozillaThunderbird-translations-common-115.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936426" comment="MozillaThunderbird-translations-other-115.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252033" version="1" class="patch">
	<metadata>
		<title>gifsicle-1.95-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46009" ref_url="https://www.suse.com/security/cve/CVE-2023-46009/" source="CVE"/>
		<description>
These are all security issues fixed in the gifsicle-1.95-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46009/">CVE-2023-46009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46009">CVE-2023-46009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936427" comment="gifsicle-1.95-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252034" version="1" class="patch">
	<metadata>
		<title>grafana-10.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6152" ref_url="https://www.suse.com/security/cve/CVE-2023-6152/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-10.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6152/">CVE-2023-6152 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6152">CVE-2023-6152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936428" comment="grafana-10.1.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252035" version="1" class="patch">
	<metadata>
		<title>helm-3.14.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.14.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936429" comment="helm-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936430" comment="helm-bash-completion-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936431" comment="helm-fish-completion-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936432" comment="helm-zsh-completion-3.14.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252036" version="1" class="patch">
	<metadata>
		<title>kubernetes1.23-apiserver-1.23.17-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.23-apiserver-1.23.17-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936433" comment="kubernetes1.23-apiserver-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936434" comment="kubernetes1.23-client-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936435" comment="kubernetes1.23-client-bash-completion-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936436" comment="kubernetes1.23-client-common-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936437" comment="kubernetes1.23-client-fish-completion-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936438" comment="kubernetes1.23-controller-manager-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936439" comment="kubernetes1.23-kubeadm-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936440" comment="kubernetes1.23-kubelet-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936441" comment="kubernetes1.23-kubelet-common-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936442" comment="kubernetes1.23-proxy-1.23.17-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936443" comment="kubernetes1.23-scheduler-1.23.17-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252037" version="1" class="patch">
	<metadata>
		<title>kubernetes1.24-apiserver-1.24.17-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.24-apiserver-1.24.17-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936444" comment="kubernetes1.24-apiserver-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936445" comment="kubernetes1.24-client-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936446" comment="kubernetes1.24-client-bash-completion-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936447" comment="kubernetes1.24-client-common-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936448" comment="kubernetes1.24-client-fish-completion-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936449" comment="kubernetes1.24-controller-manager-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936450" comment="kubernetes1.24-kubeadm-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936451" comment="kubernetes1.24-kubelet-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936452" comment="kubernetes1.24-kubelet-common-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936453" comment="kubernetes1.24-proxy-1.24.17-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936454" comment="kubernetes1.24-scheduler-1.24.17-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252038" version="1" class="patch">
	<metadata>
		<title>kubernetes1.25-apiserver-1.25.16-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.25-apiserver-1.25.16-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936455" comment="kubernetes1.25-apiserver-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936456" comment="kubernetes1.25-client-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936457" comment="kubernetes1.25-client-bash-completion-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936458" comment="kubernetes1.25-client-common-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936459" comment="kubernetes1.25-client-fish-completion-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936460" comment="kubernetes1.25-controller-manager-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936461" comment="kubernetes1.25-kubeadm-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936462" comment="kubernetes1.25-kubelet-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936463" comment="kubernetes1.25-kubelet-common-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936464" comment="kubernetes1.25-proxy-1.25.16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936465" comment="kubernetes1.25-scheduler-1.25.16-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252039" version="1" class="patch">
	<metadata>
		<title>kubernetes1.26-apiserver-1.26.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.26-apiserver-1.26.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936466" comment="kubernetes1.26-apiserver-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936467" comment="kubernetes1.26-client-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936468" comment="kubernetes1.26-client-bash-completion-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936469" comment="kubernetes1.26-client-common-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936470" comment="kubernetes1.26-client-fish-completion-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936471" comment="kubernetes1.26-controller-manager-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936472" comment="kubernetes1.26-kubeadm-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936473" comment="kubernetes1.26-kubelet-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936474" comment="kubernetes1.26-kubelet-common-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936475" comment="kubernetes1.26-proxy-1.26.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936476" comment="kubernetes1.26-scheduler-1.26.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252040" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-json_pure-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-json_pure-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936477" comment="ruby3.3-rubygem-json_pure-2.7.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252041" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-puma-6.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-puma-6.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23634">CVE-2022-23634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936478" comment="ruby3.3-rubygem-puma-6.4.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252042" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-puma-5-5.6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-puma-5-5.6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29509">CVE-2021-29509 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936479" comment="ruby3.3-rubygem-puma-5-5.6.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252043" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.27.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.27.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936480" comment="c-ares-devel-1.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936481" comment="c-ares-utils-1.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936482" comment="libcares2-1.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936483" comment="libcares2-32bit-1.27.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252044" version="1" class="patch">
	<metadata>
		<title>giflib-devel-32bit-5.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15133" ref_url="https://www.suse.com/security/cve/CVE-2019-15133/" source="CVE"/>
		<reference ref_id="CVE-2021-40633" ref_url="https://www.suse.com/security/cve/CVE-2021-40633/" source="CVE"/>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-32bit-5.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15133/">CVE-2019-15133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15133">CVE-2019-15133 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40633/">CVE-2021-40633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40633">CVE-2021-40633 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936484" comment="giflib-devel-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936485" comment="giflib-devel-32bit-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936486" comment="giflib-progs-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936487" comment="libgif7-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936488" comment="libgif7-32bit-5.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252045" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22201" ref_url="https://www.suse.com/security/cve/CVE-2024-22201/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22201/">CVE-2024-22201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22201">CVE-2024-22201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936489" comment="jetty-annotations-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936490" comment="jetty-ant-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936491" comment="jetty-cdi-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936492" comment="jetty-client-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936493" comment="jetty-continuation-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936494" comment="jetty-deploy-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936495" comment="jetty-fcgi-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936496" comment="jetty-http-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936497" comment="jetty-http-spi-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936498" comment="jetty-io-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936499" comment="jetty-jaas-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936500" comment="jetty-jmx-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936501" comment="jetty-jndi-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936502" comment="jetty-jsp-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936503" comment="jetty-minimal-javadoc-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936504" comment="jetty-openid-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936505" comment="jetty-plus-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936506" comment="jetty-proxy-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936507" comment="jetty-quickstart-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936508" comment="jetty-rewrite-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936509" comment="jetty-security-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936510" comment="jetty-server-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936511" comment="jetty-servlet-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936512" comment="jetty-servlets-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936513" comment="jetty-start-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936514" comment="jetty-util-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936515" comment="jetty-util-ajax-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936516" comment="jetty-webapp-9.4.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936517" comment="jetty-xml-9.4.54-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252046" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_1-0-3.1.0-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3966" ref_url="https://www.suse.com/security/cve/CVE-2023-3966/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_1-0-3.1.0-19.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3966/">CVE-2023-3966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3966">CVE-2023-3966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936518" comment="libopenvswitch-3_1-0-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936519" comment="libovn-23_03-0-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936520" comment="openvswitch-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936521" comment="openvswitch-devel-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936522" comment="openvswitch-doc-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936523" comment="openvswitch-ipsec-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936524" comment="openvswitch-pki-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936525" comment="openvswitch-test-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936526" comment="openvswitch-vtep-3.1.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936527" comment="ovn-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936528" comment="ovn-central-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936529" comment="ovn-devel-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936530" comment="ovn-doc-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936531" comment="ovn-docker-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936532" comment="ovn-host-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936533" comment="ovn-vtep-23.03.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936534" comment="python3-ovs-3.1.0-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252047" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rack-3.0.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rack-3.0.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936535" comment="ruby3.3-rubygem-rack-3.0.9.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252048" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rack-2.2-2.2.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rack-2.2-2.2.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936536" comment="ruby3.3-rubygem-rack-2.2-2.2.8.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252049" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-123.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="CVE-2024-1554" ref_url="https://www.suse.com/security/cve/CVE-2024-1554/" source="CVE"/>
		<reference ref_id="CVE-2024-1555" ref_url="https://www.suse.com/security/cve/CVE-2024-1555/" source="CVE"/>
		<reference ref_id="CVE-2024-1556" ref_url="https://www.suse.com/security/cve/CVE-2024-1556/" source="CVE"/>
		<reference ref_id="CVE-2024-1557" ref_url="https://www.suse.com/security/cve/CVE-2024-1557/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-123.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1554/">CVE-2024-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1554">CVE-2024-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1555/">CVE-2024-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1555">CVE-2024-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1556/">CVE-2024-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1556">CVE-2024-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1557/">CVE-2024-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1557">CVE-2024-1557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936537" comment="MozillaFirefox-123.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936538" comment="MozillaFirefox-branding-upstream-123.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936539" comment="MozillaFirefox-devel-123.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936540" comment="MozillaFirefox-translations-common-123.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936541" comment="MozillaFirefox-translations-other-123.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252050" version="1" class="patch">
	<metadata>
		<title>python310-uamqp-1.6.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27099" ref_url="https://www.suse.com/security/cve/CVE-2024-27099/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-uamqp-1.6.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27099/">CVE-2024-27099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27099">CVE-2024-27099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936542" comment="python310-uamqp-1.6.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936543" comment="python311-uamqp-1.6.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936544" comment="python39-uamqp-1.6.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252051" version="1" class="patch">
	<metadata>
		<title>dav1d-1.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32570" ref_url="https://www.suse.com/security/cve/CVE-2023-32570/" source="CVE"/>
		<description>
These are all security issues fixed in the dav1d-1.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32570/">CVE-2023-32570 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32570">CVE-2023-32570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936545" comment="dav1d-1.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936546" comment="dav1d-devel-1.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936547" comment="libdav1d7-1.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936548" comment="libdav1d7-32bit-1.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252052" version="1" class="patch">
	<metadata>
		<title>exiv2-0.28.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24826" ref_url="https://www.suse.com/security/cve/CVE-2024-24826/" source="CVE"/>
		<reference ref_id="CVE-2024-25112" ref_url="https://www.suse.com/security/cve/CVE-2024-25112/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.28.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24826/">CVE-2024-24826 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24826">CVE-2024-24826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25112/">CVE-2024-25112 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25112">CVE-2024-25112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936549" comment="exiv2-0.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936550" comment="exiv2-lang-0.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936551" comment="libexiv2-28-0.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936552" comment="libexiv2-28-x86-64-v3-0.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936553" comment="libexiv2-devel-0.28.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252053" version="1" class="patch">
	<metadata>
		<title>libmodsecurity3-3.0.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1019" ref_url="https://www.suse.com/security/cve/CVE-2024-1019/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodsecurity3-3.0.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1019/">CVE-2024-1019 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1019">CVE-2024-1019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936554" comment="libmodsecurity3-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936555" comment="modsecurity-3.0.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936556" comment="modsecurity-devel-3.0.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252054" version="1" class="patch">
	<metadata>
		<title>opensc-0.24.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1454" ref_url="https://www.suse.com/security/cve/CVE-2024-1454/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.24.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-1454/">CVE-2024-1454 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1454">CVE-2024-1454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905497" comment="opensc-0.24.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252055" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936557" comment="postgresql-jdbc-42.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936558" comment="postgresql-jdbc-javadoc-42.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252056" version="1" class="patch">
	<metadata>
		<title>python310-orjson-3.9.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27454" ref_url="https://www.suse.com/security/cve/CVE-2024-27454/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-orjson-3.9.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27454/">CVE-2024-27454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27454">CVE-2024-27454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936559" comment="python310-orjson-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936560" comment="python311-orjson-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936561" comment="python312-orjson-3.9.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936562" comment="python39-orjson-3.9.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252057" version="1" class="patch">
	<metadata>
		<title>python38-3.8.18-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.18-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936563" comment="python38-3.8.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936564" comment="python38-curses-3.8.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936565" comment="python38-dbm-3.8.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936566" comment="python38-idle-3.8.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936567" comment="python38-tk-3.8.18-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252058" version="1" class="patch">
	<metadata>
		<title>glade-3.40.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36774" ref_url="https://www.suse.com/security/cve/CVE-2020-36774/" source="CVE"/>
		<description>
These are all security issues fixed in the glade-3.40.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36774/">CVE-2020-36774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36774">CVE-2020-36774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936568" comment="glade-3.40.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936569" comment="glade-docs-3.40.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936570" comment="glade-lang-3.40.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936571" comment="libgladeui-2-13-3.40.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936572" comment="libgladeui-2-devel-3.40.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936573" comment="typelib-1_0-Gladeui-2_0-3.40.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252059" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1670" ref_url="https://www.suse.com/security/cve/CVE-2024-1670/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1670/">CVE-2024-1670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1670">CVE-2024-1670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936574" comment="nodejs-electron-28.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936575" comment="nodejs-electron-devel-28.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936576" comment="nodejs-electron-doc-28.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252060" version="1" class="patch">
	<metadata>
		<title>python310-3.10.13-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.13-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936577" comment="python310-3.10.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936578" comment="python310-32bit-3.10.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936579" comment="python310-curses-3.10.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936580" comment="python310-dbm-3.10.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936581" comment="python310-idle-3.10.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936582" comment="python310-tk-3.10.13-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252061" version="1" class="patch">
	<metadata>
		<title>python311-3.11.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936583" comment="python311-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936584" comment="python311-32bit-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936585" comment="python311-curses-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936586" comment="python311-dbm-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936587" comment="python311-idle-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936588" comment="python311-tk-3.11.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936589" comment="python311-x86-64-v3-3.11.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252062" version="1" class="patch">
	<metadata>
		<title>python39-3.9.18-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.18-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936590" comment="python39-3.9.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936591" comment="python39-32bit-3.9.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936592" comment="python39-curses-3.9.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936593" comment="python39-dbm-3.9.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936594" comment="python39-idle-3.9.18-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936595" comment="python39-tk-3.9.18-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252063" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936596" comment="libunbound8-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936597" comment="python3-unbound-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936598" comment="unbound-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936599" comment="unbound-anchor-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936600" comment="unbound-devel-1.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936601" comment="unbound-munin-1.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252064" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-batik-1.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41704" ref_url="https://www.suse.com/security/cve/CVE-2022-41704/" source="CVE"/>
		<reference ref_id="CVE-2022-42890" ref_url="https://www.suse.com/security/cve/CVE-2022-42890/" source="CVE"/>
		<reference ref_id="CVE-2022-44729" ref_url="https://www.suse.com/security/cve/CVE-2022-44729/" source="CVE"/>
		<reference ref_id="CVE-2022-44730" ref_url="https://www.suse.com/security/cve/CVE-2022-44730/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-batik-1.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41704/">CVE-2022-41704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41704">CVE-2022-41704 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42890/">CVE-2022-42890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42890">CVE-2022-42890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44729/">CVE-2022-44729 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44729">CVE-2022-44729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44730/">CVE-2022-44730 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44730">CVE-2022-44730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936602" comment="xmlgraphics-batik-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936603" comment="xmlgraphics-batik-css-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936604" comment="xmlgraphics-batik-demo-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936605" comment="xmlgraphics-batik-javadoc-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936606" comment="xmlgraphics-batik-rasterizer-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936607" comment="xmlgraphics-batik-slideshow-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936608" comment="xmlgraphics-batik-squiggle-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936609" comment="xmlgraphics-batik-svgpp-1.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936610" comment="xmlgraphics-batik-ttf2svg-1.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252065" version="1" class="patch">
	<metadata>
		<title>python312-3.12.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936611" comment="python312-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936612" comment="python312-32bit-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936613" comment="python312-curses-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936614" comment="python312-dbm-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936615" comment="python312-idle-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936616" comment="python312-tk-3.12.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936617" comment="python312-x86-64-v3-3.12.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252066" version="1" class="patch">
	<metadata>
		<title>xen-4.18.0_06-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.0_06-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936618" comment="xen-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936619" comment="xen-devel-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936620" comment="xen-doc-html-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936621" comment="xen-libs-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936622" comment="xen-tools-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936623" comment="xen-tools-domU-4.18.0_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936624" comment="xen-tools-xendomains-wait-disk-4.18.0_06-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252067" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.72-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-18770" ref_url="https://www.suse.com/security/cve/CVE-2020-18770/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.72-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18770/">CVE-2020-18770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18770">CVE-2020-18770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936625" comment="libzzip-0-13-0.13.72-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936626" comment="libzzip-0-13-32bit-0.13.72-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936627" comment="zziplib-devel-0.13.72-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936628" comment="zziplib-devel-32bit-0.13.72-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252068" version="1" class="patch">
	<metadata>
		<title>caja-engrampa-1.26.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52138" ref_url="https://www.suse.com/security/cve/CVE-2023-52138/" source="CVE"/>
		<description>
These are all security issues fixed in the caja-engrampa-1.26.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52138/">CVE-2023-52138 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52138">CVE-2023-52138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936629" comment="caja-engrampa-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936630" comment="engrampa-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936631" comment="engrampa-lang-1.26.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252069" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3575" ref_url="https://www.suse.com/security/cve/CVE-2021-3575/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3575/">CVE-2021-3575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3575">CVE-2021-3575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936632" comment="libopenjp2-7-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936633" comment="libopenjp2-7-32bit-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936634" comment="libopenjp2-7-x86-64-v3-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936635" comment="openjpeg2-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936636" comment="openjpeg2-devel-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936637" comment="openjpeg2-devel-doc-2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252070" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936638" comment="python310-Django-4.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936639" comment="python311-Django-4.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936640" comment="python312-Django-4.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936641" comment="python39-Django-4.2.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252071" version="1" class="patch">
	<metadata>
		<title>rabbitmq-java-client-5.20.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46120" ref_url="https://www.suse.com/security/cve/CVE-2023-46120/" source="CVE"/>
		<description>
These are all security issues fixed in the rabbitmq-java-client-5.20.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46120/">CVE-2023-46120 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46120">CVE-2023-46120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936642" comment="rabbitmq-java-client-5.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936643" comment="rabbitmq-java-client-javadoc-5.20.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252072" version="1" class="patch">
	<metadata>
		<title>tar-1.35-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.35-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936644" comment="tar-1.35-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936645" comment="tar-backup-scripts-1.35-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936646" comment="tar-doc-1.35-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936647" comment="tar-lang-1.35-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936648" comment="tar-rmt-1.35-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936649" comment="tar-tests-1.35-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252073" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936650" comment="go1.22-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936651" comment="go1.22-doc-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936652" comment="go1.22-libstd-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936653" comment="go1.22-race-1.22.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252074" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936654" comment="MozillaThunderbird-115.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936655" comment="MozillaThunderbird-translations-common-115.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936656" comment="MozillaThunderbird-translations-other-115.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252075" version="1" class="patch">
	<metadata>
		<title>crun-1.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
These are all security issues fixed in the crun-1.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936657" comment="crun-1.14.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252076" version="1" class="patch">
	<metadata>
		<title>fontforge-20230101-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20230101-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936658" comment="fontforge-20230101-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936659" comment="fontforge-devel-20230101-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936660" comment="fontforge-doc-20230101-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252077" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936661" comment="go1.21-1.21.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936662" comment="go1.21-doc-1.21.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936663" comment="go1.21-libstd-1.21.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936664" comment="go1.21-race-1.21.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252078" version="1" class="patch">
	<metadata>
		<title>squid-6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936665" comment="squid-6.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252079" version="1" class="patch">
	<metadata>
		<title>chromedriver-121.0.6167.184-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0804" ref_url="https://www.suse.com/security/cve/CVE-2024-0804/" source="CVE"/>
		<reference ref_id="CVE-2024-0805" ref_url="https://www.suse.com/security/cve/CVE-2024-0805/" source="CVE"/>
		<reference ref_id="CVE-2024-0806" ref_url="https://www.suse.com/security/cve/CVE-2024-0806/" source="CVE"/>
		<reference ref_id="CVE-2024-0807" ref_url="https://www.suse.com/security/cve/CVE-2024-0807/" source="CVE"/>
		<reference ref_id="CVE-2024-0808" ref_url="https://www.suse.com/security/cve/CVE-2024-0808/" source="CVE"/>
		<reference ref_id="CVE-2024-0809" ref_url="https://www.suse.com/security/cve/CVE-2024-0809/" source="CVE"/>
		<reference ref_id="CVE-2024-0810" ref_url="https://www.suse.com/security/cve/CVE-2024-0810/" source="CVE"/>
		<reference ref_id="CVE-2024-0811" ref_url="https://www.suse.com/security/cve/CVE-2024-0811/" source="CVE"/>
		<reference ref_id="CVE-2024-0812" ref_url="https://www.suse.com/security/cve/CVE-2024-0812/" source="CVE"/>
		<reference ref_id="CVE-2024-0813" ref_url="https://www.suse.com/security/cve/CVE-2024-0813/" source="CVE"/>
		<reference ref_id="CVE-2024-0814" ref_url="https://www.suse.com/security/cve/CVE-2024-0814/" source="CVE"/>
		<reference ref_id="CVE-2024-1059" ref_url="https://www.suse.com/security/cve/CVE-2024-1059/" source="CVE"/>
		<reference ref_id="CVE-2024-1060" ref_url="https://www.suse.com/security/cve/CVE-2024-1060/" source="CVE"/>
		<reference ref_id="CVE-2024-1077" ref_url="https://www.suse.com/security/cve/CVE-2024-1077/" source="CVE"/>
		<reference ref_id="CVE-2024-1283" ref_url="https://www.suse.com/security/cve/CVE-2024-1283/" source="CVE"/>
		<reference ref_id="CVE-2024-1284" ref_url="https://www.suse.com/security/cve/CVE-2024-1284/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-121.0.6167.184-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0804/">CVE-2024-0804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0804">CVE-2024-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0805/">CVE-2024-0805 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0805">CVE-2024-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0806/">CVE-2024-0806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0806">CVE-2024-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0807/">CVE-2024-0807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0807">CVE-2024-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0808/">CVE-2024-0808 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0808">CVE-2024-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0809/">CVE-2024-0809 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0809">CVE-2024-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0810/">CVE-2024-0810 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0810">CVE-2024-0810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0811/">CVE-2024-0811 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0811">CVE-2024-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0812/">CVE-2024-0812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0812">CVE-2024-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0813/">CVE-2024-0813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0813">CVE-2024-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0814/">CVE-2024-0814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0814">CVE-2024-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1059/">CVE-2024-1059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1059">CVE-2024-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1060/">CVE-2024-1060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1060">CVE-2024-1060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1077/">CVE-2024-1077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1077">CVE-2024-1077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1283/">CVE-2024-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1283">CVE-2024-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1284/">CVE-2024-1284 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1284">CVE-2024-1284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936666" comment="chromedriver-121.0.6167.184-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936667" comment="chromium-121.0.6167.184-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252080" version="1" class="patch">
	<metadata>
		<title>libvirt-10.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-10.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936668" comment="libvirt-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936669" comment="libvirt-client-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936670" comment="libvirt-client-qemu-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936671" comment="libvirt-daemon-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936672" comment="libvirt-daemon-common-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936673" comment="libvirt-daemon-config-network-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936674" comment="libvirt-daemon-config-nwfilter-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936675" comment="libvirt-daemon-driver-interface-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936676" comment="libvirt-daemon-driver-libxl-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936677" comment="libvirt-daemon-driver-lxc-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936678" comment="libvirt-daemon-driver-network-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936679" comment="libvirt-daemon-driver-nodedev-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936680" comment="libvirt-daemon-driver-nwfilter-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936681" comment="libvirt-daemon-driver-qemu-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936682" comment="libvirt-daemon-driver-secret-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936683" comment="libvirt-daemon-driver-storage-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936684" comment="libvirt-daemon-driver-storage-core-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936685" comment="libvirt-daemon-driver-storage-disk-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936686" comment="libvirt-daemon-driver-storage-gluster-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936687" comment="libvirt-daemon-driver-storage-iscsi-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936688" comment="libvirt-daemon-driver-storage-iscsi-direct-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936689" comment="libvirt-daemon-driver-storage-logical-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936690" comment="libvirt-daemon-driver-storage-mpath-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936691" comment="libvirt-daemon-driver-storage-rbd-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936692" comment="libvirt-daemon-driver-storage-scsi-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936693" comment="libvirt-daemon-hooks-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936694" comment="libvirt-daemon-lock-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936695" comment="libvirt-daemon-log-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936696" comment="libvirt-daemon-lxc-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936697" comment="libvirt-daemon-plugin-lockd-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936698" comment="libvirt-daemon-plugin-sanlock-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936699" comment="libvirt-daemon-proxy-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936700" comment="libvirt-daemon-qemu-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936701" comment="libvirt-daemon-xen-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936702" comment="libvirt-devel-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936703" comment="libvirt-doc-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936704" comment="libvirt-libs-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936705" comment="libvirt-nss-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936706" comment="wireshark-plugin-libvirt-10.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252081" version="1" class="patch">
	<metadata>
		<title>perl-Spreadsheet-ParseXLSX-0.310.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23525" ref_url="https://www.suse.com/security/cve/CVE-2024-23525/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Spreadsheet-ParseXLSX-0.310.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23525/">CVE-2024-23525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23525">CVE-2024-23525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936707" comment="perl-Spreadsheet-ParseXLSX-0.310.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252082" version="1" class="patch">
	<metadata>
		<title>graphviz-2.49.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46045" ref_url="https://www.suse.com/security/cve/CVE-2023-46045/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-2.49.3-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46045/">CVE-2023-46045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46045">CVE-2023-46045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936708" comment="graphviz-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936709" comment="graphviz-devel-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936710" comment="graphviz-plugins-core-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936711" comment="libcdt5-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936712" comment="libcgraph6-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936713" comment="libgvc6-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936714" comment="libgvpr2-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936715" comment="liblab_gamut1-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936716" comment="libpathplan4-2.49.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936717" comment="libxdot4-2.49.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252083" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.19.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1931" ref_url="https://www.suse.com/security/cve/CVE-2024-1931/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.19.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1931/">CVE-2024-1931 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1931">CVE-2024-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936718" comment="libunbound8-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936719" comment="python3-unbound-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936720" comment="unbound-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936721" comment="unbound-anchor-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936722" comment="unbound-devel-1.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936723" comment="unbound-munin-1.19.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252084" version="1" class="patch">
	<metadata>
		<title>clojure-1.11.2.1446-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22871" ref_url="https://www.suse.com/security/cve/CVE-2024-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the clojure-1.11.2.1446-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22871/">CVE-2024-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22871">CVE-2024-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936724" comment="clojure-1.11.2.1446-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252085" version="1" class="patch">
	<metadata>
		<title>chromedriver-122.0.6261.111-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1669" ref_url="https://www.suse.com/security/cve/CVE-2024-1669/" source="CVE"/>
		<reference ref_id="CVE-2024-1670" ref_url="https://www.suse.com/security/cve/CVE-2024-1670/" source="CVE"/>
		<reference ref_id="CVE-2024-1671" ref_url="https://www.suse.com/security/cve/CVE-2024-1671/" source="CVE"/>
		<reference ref_id="CVE-2024-1672" ref_url="https://www.suse.com/security/cve/CVE-2024-1672/" source="CVE"/>
		<reference ref_id="CVE-2024-1673" ref_url="https://www.suse.com/security/cve/CVE-2024-1673/" source="CVE"/>
		<reference ref_id="CVE-2024-1674" ref_url="https://www.suse.com/security/cve/CVE-2024-1674/" source="CVE"/>
		<reference ref_id="CVE-2024-1675" ref_url="https://www.suse.com/security/cve/CVE-2024-1675/" source="CVE"/>
		<reference ref_id="CVE-2024-1676" ref_url="https://www.suse.com/security/cve/CVE-2024-1676/" source="CVE"/>
		<reference ref_id="CVE-2024-2173" ref_url="https://www.suse.com/security/cve/CVE-2024-2173/" source="CVE"/>
		<reference ref_id="CVE-2024-2174" ref_url="https://www.suse.com/security/cve/CVE-2024-2174/" source="CVE"/>
		<reference ref_id="CVE-2024-2176" ref_url="https://www.suse.com/security/cve/CVE-2024-2176/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-122.0.6261.111-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1669/">CVE-2024-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1669">CVE-2024-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1670/">CVE-2024-1670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1670">CVE-2024-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1671/">CVE-2024-1671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1671">CVE-2024-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1672/">CVE-2024-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1672">CVE-2024-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1673/">CVE-2024-1673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1673">CVE-2024-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1674/">CVE-2024-1674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1674">CVE-2024-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1675/">CVE-2024-1675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1675">CVE-2024-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1676/">CVE-2024-1676 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1676">CVE-2024-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2173/">CVE-2024-2173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2173">CVE-2024-2173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2174/">CVE-2024-2174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2174">CVE-2024-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2176/">CVE-2024-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2176">CVE-2024-2176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936725" comment="chromedriver-122.0.6261.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936726" comment="chromium-122.0.6261.111-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252086" version="1" class="patch">
	<metadata>
		<title>opensc-0.25.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.25.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936727" comment="opensc-0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936728" comment="opensc-bash-completion-0.25.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252087" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-122.0.6261.111-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0804" ref_url="https://www.suse.com/security/cve/CVE-2024-0804/" source="CVE"/>
		<reference ref_id="CVE-2024-0805" ref_url="https://www.suse.com/security/cve/CVE-2024-0805/" source="CVE"/>
		<reference ref_id="CVE-2024-0806" ref_url="https://www.suse.com/security/cve/CVE-2024-0806/" source="CVE"/>
		<reference ref_id="CVE-2024-0807" ref_url="https://www.suse.com/security/cve/CVE-2024-0807/" source="CVE"/>
		<reference ref_id="CVE-2024-0808" ref_url="https://www.suse.com/security/cve/CVE-2024-0808/" source="CVE"/>
		<reference ref_id="CVE-2024-0809" ref_url="https://www.suse.com/security/cve/CVE-2024-0809/" source="CVE"/>
		<reference ref_id="CVE-2024-0810" ref_url="https://www.suse.com/security/cve/CVE-2024-0810/" source="CVE"/>
		<reference ref_id="CVE-2024-0811" ref_url="https://www.suse.com/security/cve/CVE-2024-0811/" source="CVE"/>
		<reference ref_id="CVE-2024-0812" ref_url="https://www.suse.com/security/cve/CVE-2024-0812/" source="CVE"/>
		<reference ref_id="CVE-2024-0813" ref_url="https://www.suse.com/security/cve/CVE-2024-0813/" source="CVE"/>
		<reference ref_id="CVE-2024-0814" ref_url="https://www.suse.com/security/cve/CVE-2024-0814/" source="CVE"/>
		<reference ref_id="CVE-2024-1059" ref_url="https://www.suse.com/security/cve/CVE-2024-1059/" source="CVE"/>
		<reference ref_id="CVE-2024-1060" ref_url="https://www.suse.com/security/cve/CVE-2024-1060/" source="CVE"/>
		<reference ref_id="CVE-2024-1077" ref_url="https://www.suse.com/security/cve/CVE-2024-1077/" source="CVE"/>
		<reference ref_id="CVE-2024-1283" ref_url="https://www.suse.com/security/cve/CVE-2024-1283/" source="CVE"/>
		<reference ref_id="CVE-2024-1284" ref_url="https://www.suse.com/security/cve/CVE-2024-1284/" source="CVE"/>
		<reference ref_id="CVE-2024-1669" ref_url="https://www.suse.com/security/cve/CVE-2024-1669/" source="CVE"/>
		<reference ref_id="CVE-2024-1670" ref_url="https://www.suse.com/security/cve/CVE-2024-1670/" source="CVE"/>
		<reference ref_id="CVE-2024-1671" ref_url="https://www.suse.com/security/cve/CVE-2024-1671/" source="CVE"/>
		<reference ref_id="CVE-2024-1672" ref_url="https://www.suse.com/security/cve/CVE-2024-1672/" source="CVE"/>
		<reference ref_id="CVE-2024-1673" ref_url="https://www.suse.com/security/cve/CVE-2024-1673/" source="CVE"/>
		<reference ref_id="CVE-2024-1674" ref_url="https://www.suse.com/security/cve/CVE-2024-1674/" source="CVE"/>
		<reference ref_id="CVE-2024-1675" ref_url="https://www.suse.com/security/cve/CVE-2024-1675/" source="CVE"/>
		<reference ref_id="CVE-2024-1676" ref_url="https://www.suse.com/security/cve/CVE-2024-1676/" source="CVE"/>
		<reference ref_id="CVE-2024-2173" ref_url="https://www.suse.com/security/cve/CVE-2024-2173/" source="CVE"/>
		<reference ref_id="CVE-2024-2174" ref_url="https://www.suse.com/security/cve/CVE-2024-2174/" source="CVE"/>
		<reference ref_id="CVE-2024-2176" ref_url="https://www.suse.com/security/cve/CVE-2024-2176/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-122.0.6261.111-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0804/">CVE-2024-0804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0804">CVE-2024-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0805/">CVE-2024-0805 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0805">CVE-2024-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0806/">CVE-2024-0806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0806">CVE-2024-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0807/">CVE-2024-0807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0807">CVE-2024-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0808/">CVE-2024-0808 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0808">CVE-2024-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0809/">CVE-2024-0809 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0809">CVE-2024-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0810/">CVE-2024-0810 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0810">CVE-2024-0810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0811/">CVE-2024-0811 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0811">CVE-2024-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0812/">CVE-2024-0812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0812">CVE-2024-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0813/">CVE-2024-0813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0813">CVE-2024-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0814/">CVE-2024-0814 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0814">CVE-2024-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1059/">CVE-2024-1059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1059">CVE-2024-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1060/">CVE-2024-1060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1060">CVE-2024-1060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1077/">CVE-2024-1077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1077">CVE-2024-1077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1283/">CVE-2024-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1283">CVE-2024-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1284/">CVE-2024-1284 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1284">CVE-2024-1284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1669/">CVE-2024-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1669">CVE-2024-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1670/">CVE-2024-1670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1670">CVE-2024-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1671/">CVE-2024-1671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1671">CVE-2024-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1672/">CVE-2024-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1672">CVE-2024-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1673/">CVE-2024-1673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1673">CVE-2024-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1674/">CVE-2024-1674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1674">CVE-2024-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1675/">CVE-2024-1675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1675">CVE-2024-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1676/">CVE-2024-1676 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1676">CVE-2024-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2173/">CVE-2024-2173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2173">CVE-2024-2173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2174/">CVE-2024-2174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2174">CVE-2024-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2176/">CVE-2024-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2176">CVE-2024-2176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936729" comment="ungoogled-chromium-122.0.6261.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936730" comment="ungoogled-chromium-chromedriver-122.0.6261.111-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252088" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.7.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52459" ref_url="https://www.suse.com/security/cve/CVE-2023-52459/" source="CVE"/>
		<reference ref_id="CVE-2023-52461" ref_url="https://www.suse.com/security/cve/CVE-2023-52461/" source="CVE"/>
		<reference ref_id="CVE-2024-26605" ref_url="https://www.suse.com/security/cve/CVE-2024-26605/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.7.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52459/">CVE-2023-52459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52459">CVE-2023-52459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52461/">CVE-2023-52461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52461">CVE-2023-52461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26605/">CVE-2024-26605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26605">CVE-2024-26605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936732" comment="kernel-macros-6.7.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936733" comment="kernel-source-6.7.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936734" comment="kernel-source-vanilla-6.7.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252089" version="1" class="patch">
	<metadata>
		<title>python310-rpyc-6.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27758" ref_url="https://www.suse.com/security/cve/CVE-2024-27758/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-rpyc-6.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27758/">CVE-2024-27758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27758">CVE-2024-27758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936735" comment="python310-rpyc-6.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936736" comment="python311-rpyc-6.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936737" comment="python312-rpyc-6.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936738" comment="python39-rpyc-6.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252090" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20240312-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20240312-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936739" comment="ucode-intel-20240312-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252091" version="1" class="patch">
	<metadata>
		<title>Bottles-51.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the Bottles-51.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936740" comment="Bottles-51.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936741" comment="Bottles-lang-51.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252092" version="1" class="patch">
	<metadata>
		<title>chromedriver-122.0.6261.128-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2400" ref_url="https://www.suse.com/security/cve/CVE-2024-2400/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-122.0.6261.128-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2400/">CVE-2024-2400 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2400">CVE-2024-2400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936742" comment="chromedriver-122.0.6261.128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936743" comment="chromium-122.0.6261.128-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252093" version="1" class="patch">
	<metadata>
		<title>jsch-agent-proxy-connector-factory-0.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the jsch-agent-proxy-connector-factory-0.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936744" comment="jsch-agent-proxy-connector-factory-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936745" comment="jsch-agent-proxy-core-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936746" comment="jsch-agent-proxy-javadoc-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936747" comment="jsch-agent-proxy-jsch-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936748" comment="jsch-agent-proxy-pageant-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936749" comment="jsch-agent-proxy-sshagent-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936750" comment="jsch-agent-proxy-usocket-jna-0.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936751" comment="jsch-agent-proxy-usocket-nc-0.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252094" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2173" ref_url="https://www.suse.com/security/cve/CVE-2024-2173/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2173/">CVE-2024-2173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2173">CVE-2024-2173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936752" comment="nodejs-electron-28.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936753" comment="nodejs-electron-devel-28.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936754" comment="nodejs-electron-doc-28.2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252095" version="1" class="patch">
	<metadata>
		<title>python310-aiosmtpd-1.4.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27305" ref_url="https://www.suse.com/security/cve/CVE-2024-27305/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiosmtpd-1.4.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27305/">CVE-2024-27305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27305">CVE-2024-27305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936755" comment="python310-aiosmtpd-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936756" comment="python311-aiosmtpd-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936757" comment="python312-aiosmtpd-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936758" comment="python39-aiosmtpd-1.4.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252096" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.6.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.6.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936759" comment="libQt6Concurrent6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936760" comment="libQt6Core6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936761" comment="libQt6DBus6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936762" comment="libQt6Gui6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936763" comment="libQt6Network6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936764" comment="libQt6OpenGL6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936765" comment="libQt6OpenGLWidgets6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936766" comment="libQt6PrintSupport6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936767" comment="libQt6Sql6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936768" comment="libQt6Test6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936769" comment="libQt6Widgets6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936770" comment="libQt6Xml6-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936771" comment="qt6-base-common-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936772" comment="qt6-base-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936773" comment="qt6-base-examples-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936774" comment="qt6-base-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936775" comment="qt6-concurrent-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936776" comment="qt6-core-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936777" comment="qt6-core-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936778" comment="qt6-dbus-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936779" comment="qt6-dbus-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936780" comment="qt6-docs-common-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936781" comment="qt6-exampleicons-devel-static-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936782" comment="qt6-gui-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936783" comment="qt6-gui-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936784" comment="qt6-kmssupport-devel-static-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936785" comment="qt6-kmssupport-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936786" comment="qt6-network-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936787" comment="qt6-network-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936788" comment="qt6-network-tls-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936789" comment="qt6-networkinformation-glib-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936790" comment="qt6-networkinformation-nm-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936791" comment="qt6-opengl-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936792" comment="qt6-opengl-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936793" comment="qt6-openglwidgets-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936794" comment="qt6-platformsupport-devel-static-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936795" comment="qt6-platformsupport-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936796" comment="qt6-platformtheme-gtk3-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936797" comment="qt6-platformtheme-xdgdesktopportal-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936798" comment="qt6-printsupport-cups-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936799" comment="qt6-printsupport-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936800" comment="qt6-printsupport-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936801" comment="qt6-sql-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936802" comment="qt6-sql-mysql-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936803" comment="qt6-sql-postgresql-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936804" comment="qt6-sql-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936805" comment="qt6-sql-sqlite-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936806" comment="qt6-sql-unixODBC-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936807" comment="qt6-test-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936808" comment="qt6-test-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936809" comment="qt6-widgets-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936810" comment="qt6-widgets-private-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936811" comment="qt6-xml-devel-6.6.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936812" comment="qt6-xml-private-devel-6.6.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252097" version="1" class="patch">
	<metadata>
		<title>trilead-ssh2-217.293.v56de4d4d3515-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the trilead-ssh2-217.293.v56de4d4d3515-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936813" comment="trilead-ssh2-217.293.v56de4d4d3515-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936814" comment="trilead-ssh2-javadoc-217.293.v56de4d4d3515-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252098" version="1" class="patch">
	<metadata>
		<title>ungoogled-chromium-122.0.6261.128-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2400" ref_url="https://www.suse.com/security/cve/CVE-2024-2400/" source="CVE"/>
		<description>
These are all security issues fixed in the ungoogled-chromium-122.0.6261.128-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2400/">CVE-2024-2400 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2400">CVE-2024-2400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936815" comment="ungoogled-chromium-122.0.6261.128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936816" comment="ungoogled-chromium-chromedriver-122.0.6261.128-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252099" version="1" class="patch">
	<metadata>
		<title>cmctl-1.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-1.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936817" comment="cmctl-1.14.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252100" version="1" class="patch">
	<metadata>
		<title>expat-2.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936818" comment="expat-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936819" comment="libexpat-devel-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936820" comment="libexpat-devel-32bit-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936821" comment="libexpat1-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936822" comment="libexpat1-32bit-2.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252101" version="1" class="patch">
	<metadata>
		<title>python310-python-rapidjson-1.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27454" ref_url="https://www.suse.com/security/cve/CVE-2024-27454/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-rapidjson-1.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27454/">CVE-2024-27454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27454">CVE-2024-27454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936823" comment="python310-python-rapidjson-1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936824" comment="python311-python-rapidjson-1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936825" comment="python312-python-rapidjson-1.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936826" comment="python39-python-rapidjson-1.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252102" version="1" class="patch">
	<metadata>
		<title>rclone-1.66.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.66.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936827" comment="rclone-1.66.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936828" comment="rclone-bash-completion-1.66.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936829" comment="rclone-zsh-completion-1.66.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252103" version="1" class="patch">
	<metadata>
		<title>teleport-15.1.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27303" ref_url="https://www.suse.com/security/cve/CVE-2024-27303/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-15.1.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27303/">CVE-2024-27303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27303">CVE-2024-27303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936830" comment="teleport-15.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936831" comment="teleport-tbot-15.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936832" comment="teleport-tctl-15.1.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936833" comment="teleport-tsh-15.1.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252104" version="1" class="patch">
	<metadata>
		<title>python310-black-24.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21503" ref_url="https://www.suse.com/security/cve/CVE-2024-21503/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-black-24.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-21503/">CVE-2024-21503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21503">CVE-2024-21503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936834" comment="python310-black-24.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936835" comment="python311-black-24.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936836" comment="python312-black-24.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936837" comment="python39-black-24.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252105" version="1" class="patch">
	<metadata>
		<title>buildah-1.35.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.35.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936838" comment="buildah-1.35.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252106" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936840" comment="kernel-macros-6.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936841" comment="kernel-source-6.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936842" comment="kernel-source-vanilla-6.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252107" version="1" class="patch">
	<metadata>
		<title>eclipse-contributor-tools-4.15-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4218" ref_url="https://www.suse.com/security/cve/CVE-2023-4218/" source="CVE"/>
		<description>
These are all security issues fixed in the eclipse-contributor-tools-4.15-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4218/">CVE-2023-4218 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4218">CVE-2023-4218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936843" comment="eclipse-contributor-tools-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936844" comment="eclipse-equinox-osgi-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936845" comment="eclipse-jdt-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936846" comment="eclipse-p2-discovery-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936847" comment="eclipse-pde-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936848" comment="eclipse-platform-4.15-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936849" comment="eclipse-swt-4.15-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252108" version="1" class="patch">
	<metadata>
		<title>eclipse-emf-core-2.22.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4218" ref_url="https://www.suse.com/security/cve/CVE-2023-4218/" source="CVE"/>
		<description>
These are all security issues fixed in the eclipse-emf-core-2.22.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4218/">CVE-2023-4218 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4218">CVE-2023-4218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936850" comment="eclipse-emf-core-2.22.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936851" comment="eclipse-emf-runtime-2.22.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936852" comment="eclipse-emf-sdk-2.22.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936853" comment="eclipse-emf-xsd-2.22.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252109" version="1" class="patch">
	<metadata>
		<title>ini4j-0.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-41404" ref_url="https://www.suse.com/security/cve/CVE-2022-41404/" source="CVE"/>
		<description>
These are all security issues fixed in the ini4j-0.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41404/">CVE-2022-41404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41404">CVE-2022-41404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936854" comment="ini4j-0.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936855" comment="ini4j-javadoc-0.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252110" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936856" comment="MozillaThunderbird-115.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936857" comment="MozillaThunderbird-openpgp-librnp-115.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936858" comment="MozillaThunderbird-translations-common-115.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936859" comment="MozillaThunderbird-translations-other-115.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252111" version="1" class="patch">
	<metadata>
		<title>python38-3.8.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936860" comment="python38-3.8.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936861" comment="python38-curses-3.8.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936862" comment="python38-dbm-3.8.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936863" comment="python38-idle-3.8.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936864" comment="python38-tk-3.8.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252112" version="1" class="patch">
	<metadata>
		<title>apache-commons-configuration2-2.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29131" ref_url="https://www.suse.com/security/cve/CVE-2024-29131/" source="CVE"/>
		<reference ref_id="CVE-2024-29133" ref_url="https://www.suse.com/security/cve/CVE-2024-29133/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-configuration2-2.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29131/">CVE-2024-29131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29131">CVE-2024-29131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29133/">CVE-2024-29133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29133">CVE-2024-29133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936865" comment="apache-commons-configuration2-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936866" comment="apache-commons-configuration2-javadoc-2.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252113" version="1" class="patch">
	<metadata>
		<title>diffoscope-261-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25711" ref_url="https://www.suse.com/security/cve/CVE-2024-25711/" source="CVE"/>
		<description>
These are all security issues fixed in the diffoscope-261-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25711/">CVE-2024-25711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25711">CVE-2024-25711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936867" comment="diffoscope-261-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252114" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.98-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.98-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936868" comment="libfreebl3-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936869" comment="libfreebl3-32bit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936870" comment="libsoftokn3-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936871" comment="libsoftokn3-32bit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936872" comment="mozilla-nss-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936873" comment="mozilla-nss-32bit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936874" comment="mozilla-nss-certs-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936875" comment="mozilla-nss-certs-32bit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936876" comment="mozilla-nss-devel-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936877" comment="mozilla-nss-sysinit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936878" comment="mozilla-nss-sysinit-32bit-3.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936879" comment="mozilla-nss-tools-3.98-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252115" version="1" class="patch">
	<metadata>
		<title>python311-3.11.8-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.8-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936880" comment="python311-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936881" comment="python311-32bit-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936882" comment="python311-curses-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936883" comment="python311-dbm-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936884" comment="python311-idle-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936885" comment="python311-tk-3.11.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936886" comment="python311-x86-64-v3-3.11.8-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252116" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-124.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2606" ref_url="https://www.suse.com/security/cve/CVE-2024-2606/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2613" ref_url="https://www.suse.com/security/cve/CVE-2024-2613/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2615" ref_url="https://www.suse.com/security/cve/CVE-2024-2615/" source="CVE"/>
		<reference ref_id="CVE-2024-29943" ref_url="https://www.suse.com/security/cve/CVE-2024-29943/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-124.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2606/">CVE-2024-2606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2606">CVE-2024-2606 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2613/">CVE-2024-2613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2613">CVE-2024-2613 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2615/">CVE-2024-2615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2615">CVE-2024-2615 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29943/">CVE-2024-29943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29943">CVE-2024-29943 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936887" comment="MozillaFirefox-124.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936888" comment="MozillaFirefox-branding-upstream-124.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936889" comment="MozillaFirefox-devel-124.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936890" comment="MozillaFirefox-translations-common-124.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936891" comment="MozillaFirefox-translations-other-124.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252117" version="1" class="patch">
	<metadata>
		<title>libvirt-10.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-10.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936892" comment="libvirt-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936893" comment="libvirt-client-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936894" comment="libvirt-client-qemu-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936895" comment="libvirt-daemon-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936896" comment="libvirt-daemon-common-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936897" comment="libvirt-daemon-config-network-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936898" comment="libvirt-daemon-config-nwfilter-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936899" comment="libvirt-daemon-driver-interface-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936900" comment="libvirt-daemon-driver-libxl-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936901" comment="libvirt-daemon-driver-lxc-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936902" comment="libvirt-daemon-driver-network-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936903" comment="libvirt-daemon-driver-nodedev-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936904" comment="libvirt-daemon-driver-nwfilter-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936905" comment="libvirt-daemon-driver-qemu-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936906" comment="libvirt-daemon-driver-secret-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936907" comment="libvirt-daemon-driver-storage-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936908" comment="libvirt-daemon-driver-storage-core-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936909" comment="libvirt-daemon-driver-storage-disk-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936910" comment="libvirt-daemon-driver-storage-gluster-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936911" comment="libvirt-daemon-driver-storage-iscsi-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936912" comment="libvirt-daemon-driver-storage-iscsi-direct-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936913" comment="libvirt-daemon-driver-storage-logical-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936914" comment="libvirt-daemon-driver-storage-mpath-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936915" comment="libvirt-daemon-driver-storage-rbd-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936916" comment="libvirt-daemon-driver-storage-scsi-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936917" comment="libvirt-daemon-hooks-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936918" comment="libvirt-daemon-lock-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936919" comment="libvirt-daemon-log-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936920" comment="libvirt-daemon-lxc-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936921" comment="libvirt-daemon-plugin-lockd-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936922" comment="libvirt-daemon-plugin-sanlock-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936923" comment="libvirt-daemon-proxy-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936924" comment="libvirt-daemon-qemu-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936925" comment="libvirt-daemon-xen-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936926" comment="libvirt-devel-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936927" comment="libvirt-doc-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936928" comment="libvirt-libs-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936929" comment="libvirt-nss-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936930" comment="wireshark-plugin-libvirt-10.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252118" version="1" class="patch">
	<metadata>
		<title>python310-astropy-6.0.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-41334" ref_url="https://www.suse.com/security/cve/CVE-2023-41334/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-astropy-6.0.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-41334/">CVE-2023-41334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-41334">CVE-2023-41334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936931" comment="python310-astropy-6.0.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936932" comment="python311-astropy-6.0.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936933" comment="python312-astropy-6.0.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936934" comment="python39-astropy-6.0.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252119" version="1" class="patch">
	<metadata>
		<title>python310-jwcrypto-1.5.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28102" ref_url="https://www.suse.com/security/cve/CVE-2024-28102/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jwcrypto-1.5.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28102/">CVE-2024-28102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28102">CVE-2024-28102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936935" comment="python310-jwcrypto-1.5.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936936" comment="python311-jwcrypto-1.5.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936937" comment="python312-jwcrypto-1.5.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936938" comment="python39-jwcrypto-1.5.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252120" version="1" class="patch">
	<metadata>
		<title>python310-3.10.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936939" comment="python310-3.10.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936940" comment="python310-32bit-3.10.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936941" comment="python310-curses-3.10.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936942" comment="python310-dbm-3.10.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936943" comment="python310-idle-3.10.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936944" comment="python310-tk-3.10.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252121" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936945" comment="python39-3.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936946" comment="python39-32bit-3.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936947" comment="python39-curses-3.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936948" comment="python39-dbm-3.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936949" comment="python39-idle-3.9.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936950" comment="python39-tk-3.9.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252122" version="1" class="patch">
	<metadata>
		<title>xen-4.18.1_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.1_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936951" comment="xen-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936952" comment="xen-devel-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936953" comment="xen-doc-html-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936954" comment="xen-libs-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936955" comment="xen-tools-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936956" comment="xen-tools-domU-4.18.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936957" comment="xen-tools-xendomains-wait-disk-4.18.1_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252123" version="1" class="patch">
	<metadata>
		<title>python-Scrapy-doc-2.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1892" ref_url="https://www.suse.com/security/cve/CVE-2024-1892/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Scrapy-doc-2.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1892/">CVE-2024-1892 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1892">CVE-2024-1892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936958" comment="python-Scrapy-doc-2.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936959" comment="python310-Scrapy-2.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936960" comment="python311-Scrapy-2.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936961" comment="python312-Scrapy-2.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936962" comment="python39-Scrapy-2.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252124" version="1" class="patch">
	<metadata>
		<title>libonnx-1.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27318" ref_url="https://www.suse.com/security/cve/CVE-2024-27318/" source="CVE"/>
		<reference ref_id="CVE-2024-27319" ref_url="https://www.suse.com/security/cve/CVE-2024-27319/" source="CVE"/>
		<description>
These are all security issues fixed in the libonnx-1.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27318/">CVE-2024-27318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27318">CVE-2024-27318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27319/">CVE-2024-27319 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27319">CVE-2024-27319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936963" comment="libonnx-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936964" comment="libonnx_proto-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936965" comment="onnx-backend-test-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936966" comment="onnx-devel-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936967" comment="python310-onnx-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936968" comment="python311-onnx-1.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936969" comment="python312-onnx-1.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252125" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-33.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936970" comment="avahi-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936971" comment="avahi-autoipd-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936972" comment="avahi-compat-howl-devel-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936973" comment="avahi-compat-mDNSResponder-devel-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936974" comment="avahi-lang-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936975" comment="avahi-utils-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936976" comment="libavahi-client3-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936977" comment="libavahi-client3-32bit-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936978" comment="libavahi-common3-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936979" comment="libavahi-common3-32bit-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936980" comment="libavahi-core7-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936981" comment="libavahi-devel-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936982" comment="libavahi-libevent1-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936983" comment="libdns_sd-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936984" comment="libdns_sd-32bit-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936985" comment="libhowl0-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936986" comment="python310-avahi-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936987" comment="python311-avahi-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936988" comment="python312-avahi-0.8-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936989" comment="python39-avahi-0.8-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252126" version="1" class="patch">
	<metadata>
		<title>curl-8.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004/" source="CVE"/>
		<reference ref_id="CVE-2024-2379" ref_url="https://www.suse.com/security/cve/CVE-2024-2379/" source="CVE"/>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<reference ref_id="CVE-2024-2466" ref_url="https://www.suse.com/security/cve/CVE-2024-2466/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2379/">CVE-2024-2379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2466/">CVE-2024-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936990" comment="curl-8.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936991" comment="libcurl-devel-8.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936992" comment="libcurl-devel-32bit-8.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936993" comment="libcurl4-8.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936994" comment="libcurl4-32bit-8.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252127" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009936995" comment="gnutls-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936996" comment="libgnutls-dane-devel-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936997" comment="libgnutls-dane0-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936998" comment="libgnutls-devel-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009936999" comment="libgnutls-devel-32bit-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937000" comment="libgnutls-devel-doc-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937001" comment="libgnutls30-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937002" comment="libgnutls30-32bit-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937003" comment="libgnutlsxx-devel-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937004" comment="libgnutlsxx30-3.8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252128" version="1" class="patch">
	<metadata>
		<title>ovmf-202308-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48733" ref_url="https://www.suse.com/security/cve/CVE-2023-48733/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202308-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-48733/">CVE-2023-48733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48733">CVE-2023-48733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937005" comment="ovmf-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937006" comment="ovmf-tools-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937007" comment="qemu-ovmf-ia32-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937008" comment="qemu-ovmf-x86_64-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937009" comment="qemu-ovmf-x86_64-debug-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937010" comment="qemu-uefi-aarch32-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937011" comment="qemu-uefi-aarch64-202308-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937012" comment="qemu-uefi-riscv64-202308-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252129" version="1" class="patch">
	<metadata>
		<title>libqpid-proton-core10-0.38.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-0223" ref_url="https://www.suse.com/security/cve/CVE-2019-0223/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpid-proton-core10-0.38.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-0223/">CVE-2019-0223 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0223">CVE-2019-0223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937013" comment="libqpid-proton-core10-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937014" comment="libqpid-proton-cpp12-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937015" comment="libqpid-proton-proactor1-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937016" comment="libqpid-proton11-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937017" comment="python310-python-qpid-proton-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937018" comment="python311-python-qpid-proton-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937019" comment="python312-python-qpid-proton-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937020" comment="python39-python-qpid-proton-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937021" comment="qpid-proton-devel-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937022" comment="qpid-proton-devel-doc-0.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937023" comment="qpid-proton-test-0.38.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252130" version="1" class="patch">
	<metadata>
		<title>libwireshark17-4.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2955" ref_url="https://www.suse.com/security/cve/CVE-2024-2955/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark17-4.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2955/">CVE-2024-2955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2955">CVE-2024-2955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937024" comment="libwireshark17-4.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937025" comment="libwiretap14-4.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937026" comment="libwsutil15-4.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937027" comment="wireshark-4.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937028" comment="wireshark-devel-4.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937029" comment="wireshark-ui-qt-4.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252131" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2625" ref_url="https://www.suse.com/security/cve/CVE-2024-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2625/">CVE-2024-2625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2625">CVE-2024-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937030" comment="nodejs-electron-28.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937031" comment="nodejs-electron-devel-28.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937032" comment="nodejs-electron-doc-28.2.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252132" version="1" class="patch">
	<metadata>
		<title>python310-validators-0.24.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19588" ref_url="https://www.suse.com/security/cve/CVE-2019-19588/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-validators-0.24.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19588/">CVE-2019-19588 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19588">CVE-2019-19588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937033" comment="python310-validators-0.24.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937034" comment="python311-validators-0.24.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937035" comment="python312-validators-0.24.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252133" version="1" class="patch">
	<metadata>
		<title>etcd-3.5.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.5.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937036" comment="etcd-3.5.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937037" comment="etcdctl-3.5.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937038" comment="etcdutl-3.5.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252134" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28960" ref_url="https://www.suse.com/security/cve/CVE-2024-28960/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28960/">CVE-2024-28960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28960">CVE-2024-28960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937039" comment="libmbedcrypto7-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937040" comment="libmbedcrypto7-x86-64-v3-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937041" comment="libmbedtls14-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937042" comment="libmbedtls14-x86-64-v3-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937043" comment="libmbedx509-1-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937044" comment="libmbedx509-1-x86-64-v3-2.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937045" comment="mbedtls-2-devel-2.28.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252135" version="1" class="patch">
	<metadata>
		<title>buildah-1.35.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.35.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937046" comment="buildah-1.35.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252136" version="1" class="patch">
	<metadata>
		<title>freerdp-3.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574/" source="CVE"/>
		<reference ref_id="CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575/" source="CVE"/>
		<reference ref_id="CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937047" comment="freerdp-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937048" comment="freerdp-devel-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937049" comment="freerdp-proxy-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937050" comment="freerdp-proxy-plugins-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937051" comment="freerdp-sdl-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937052" comment="freerdp-server-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937053" comment="freerdp-wayland-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937054" comment="libfreerdp-server-proxy3-3-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937055" comment="libfreerdp3-3-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937056" comment="librdtk0-0-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937057" comment="libuwac0-0-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937058" comment="libwinpr3-3-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937059" comment="rdtk0-devel-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937060" comment="uwac0-devel-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937061" comment="winpr-devel-3.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252137" version="1" class="patch">
	<metadata>
		<title>freerdp2-devel-2.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574/" source="CVE"/>
		<reference ref_id="CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575/" source="CVE"/>
		<reference ref_id="CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-devel-2.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0250">CVE-2014-0250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0791">CVE-2014-0791 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937062" comment="freerdp2-devel-2.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937063" comment="freerdp2-proxy-2.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937064" comment="freerdp2-server-2.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937065" comment="libfreerdp2-2-2.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937066" comment="libwinpr2-2-2.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937067" comment="winpr2-devel-2.11.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252138" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937069" comment="kernel-macros-6.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937070" comment="kernel-source-6.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937071" comment="kernel-source-vanilla-6.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252139" version="1" class="patch">
	<metadata>
		<title>libuv-devel-1.48.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<description>
These are all security issues fixed in the libuv-devel-1.48.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937072" comment="libuv-devel-1.48.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937073" comment="libuv1-1.48.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937074" comment="libuv1-32bit-1.48.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252140" version="1" class="patch">
	<metadata>
		<title>python310-cryptography-42.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-cryptography-42.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937075" comment="python310-cryptography-42.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937076" comment="python311-cryptography-42.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937077" comment="python312-cryptography-42.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252141" version="1" class="patch">
	<metadata>
		<title>python310-numpy-1.26.2-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-numpy-1.26.2-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12852">CVE-2017-12852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937078" comment="python310-numpy-1.26.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937079" comment="python310-numpy-devel-1.26.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937080" comment="python311-numpy-1.26.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937081" comment="python311-numpy-devel-1.26.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937082" comment="python312-numpy-1.26.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937083" comment="python312-numpy-devel-1.26.2-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252142" version="1" class="patch">
	<metadata>
		<title>python310-pyzmq-25.1.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pyzmq-25.1.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937084" comment="python310-pyzmq-25.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937085" comment="python310-pyzmq-devel-25.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937086" comment="python311-pyzmq-25.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937087" comment="python311-pyzmq-devel-25.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937088" comment="python312-pyzmq-25.1.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937089" comment="python312-pyzmq-devel-25.1.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252143" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937090" comment="go1.21-1.21.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937091" comment="go1.21-doc-1.21.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937092" comment="go1.21-libstd-1.21.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937093" comment="go1.21-race-1.21.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252144" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937094" comment="go1.22-1.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937095" comment="go1.22-doc-1.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937096" comment="go1.22-libstd-1.22.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937097" comment="go1.22-race-1.22.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252145" version="1" class="patch">
	<metadata>
		<title>kubeseal-0.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the kubeseal-0.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937098" comment="kubeseal-0.26.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252146" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.61.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.61.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937099" comment="libnghttp2-14-1.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937100" comment="libnghttp2-14-32bit-1.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937101" comment="libnghttp2-devel-1.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937102" comment="nghttp2-1.61.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252147" version="1" class="patch">
	<metadata>
		<title>podman-5.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937103" comment="podman-5.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937104" comment="podman-docker-5.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937105" comment="podman-remote-5.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937106" comment="podmansh-5.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252148" version="1" class="patch">
	<metadata>
		<title>python310-Pillow-10.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3589" ref_url="https://www.suse.com/security/cve/CVE-2014-3589/" source="CVE"/>
		<reference ref_id="CVE-2014-3598" ref_url="https://www.suse.com/security/cve/CVE-2014-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-0740" ref_url="https://www.suse.com/security/cve/CVE-2016-0740/" source="CVE"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<reference ref_id="CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654/" source="CVE"/>
		<reference ref_id="CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655/" source="CVE"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25291" ref_url="https://www.suse.com/security/cve/CVE-2021-25291/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293/" source="CVE"/>
		<reference ref_id="CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921/" source="CVE"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Pillow-10.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3589/">CVE-2014-3589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3589">CVE-2014-3589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3598/">CVE-2014-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3598">CVE-2014-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0740/">CVE-2016-0740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0740">CVE-2016-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0775">CVE-2016-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3076">CVE-2016-3076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35654">CVE-2020-35654 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35655">CVE-2020-35655 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25289">CVE-2021-25289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25291/">CVE-2021-25291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25291">CVE-2021-25291 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25293">CVE-2021-25293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27921">CVE-2021-27921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937107" comment="python310-Pillow-10.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937108" comment="python310-Pillow-tk-10.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937109" comment="python311-Pillow-10.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937110" comment="python311-Pillow-tk-10.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937111" comment="python312-Pillow-10.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937112" comment="python312-Pillow-tk-10.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252149" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31082" ref_url="https://www.suse.com/security/cve/CVE-2024-31082/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31082/">CVE-2024-31082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31082">CVE-2024-31082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937113" comment="xorg-x11-server-21.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937114" comment="xorg-x11-server-Xvfb-21.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937115" comment="xorg-x11-server-extra-21.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937116" comment="xorg-x11-server-sdk-21.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937117" comment="xorg-x11-server-source-21.1.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937118" comment="xorg-x11-server-wrapper-21.1.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252150" version="1" class="patch">
	<metadata>
		<title>xwayland-23.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-23.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937119" comment="xwayland-23.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937120" comment="xwayland-devel-23.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252151" version="1" class="patch">
	<metadata>
		<title>system-user-velociraptor-1.0.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5950" ref_url="https://www.suse.com/security/cve/CVE-2023-5950/" source="CVE"/>
		<reference ref_id="CVE-2024-28849" ref_url="https://www.suse.com/security/cve/CVE-2024-28849/" source="CVE"/>
		<description>
These are all security issues fixed in the system-user-velociraptor-1.0.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5950/">CVE-2023-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5950">CVE-2023-5950 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28849/">CVE-2024-28849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28849">CVE-2024-28849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937121" comment="system-user-velociraptor-1.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937122" comment="velociraptor-0.7.0.4.git74.3426c0a-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252152" version="1" class="patch">
	<metadata>
		<title>grafana-10.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-10.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937123" comment="grafana-10.3.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252153" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.87-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.87-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937124" comment="tomcat-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937125" comment="tomcat-admin-webapps-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937126" comment="tomcat-docs-webapp-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937127" comment="tomcat-el-3_0-api-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937128" comment="tomcat-embed-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937129" comment="tomcat-javadoc-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937130" comment="tomcat-jsp-2_3-api-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937131" comment="tomcat-jsvc-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937132" comment="tomcat-lib-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937133" comment="tomcat-servlet-4_0-api-9.0.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937134" comment="tomcat-webapps-9.0.87-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252154" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937135" comment="tomcat10-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937136" comment="tomcat10-admin-webapps-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937137" comment="tomcat10-doc-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937138" comment="tomcat10-docs-webapp-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937139" comment="tomcat10-el-5_0-api-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937140" comment="tomcat10-embed-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937141" comment="tomcat10-jsp-3_1-api-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937142" comment="tomcat10-jsvc-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937143" comment="tomcat10-lib-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937144" comment="tomcat10-servlet-6_0-api-10.1.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937145" comment="tomcat10-webapps-10.1.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252155" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.27-3.5.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.27-3.5.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937146" comment="etcd-for-k8s1.27-3.5.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252156" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.28-3.5.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.28-3.5.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937147" comment="etcd-for-k8s1.28-3.5.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252157" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.29-3.5.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.29-3.5.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937148" comment="etcd-for-k8s1.29-3.5.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252158" version="1" class="patch">
	<metadata>
		<title>forgejo-1.21.10+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-1.21.10+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937149" comment="forgejo-1.21.10+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937150" comment="forgejo-apparmor-1.21.10+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937151" comment="forgejo-selinux-1.21.10+0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252159" version="1" class="patch">
	<metadata>
		<title>kubernetes1.26-apiserver-1.26.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.26-apiserver-1.26.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937152" comment="kubernetes1.26-apiserver-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937153" comment="kubernetes1.26-client-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937154" comment="kubernetes1.26-client-bash-completion-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937155" comment="kubernetes1.26-client-common-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937156" comment="kubernetes1.26-client-fish-completion-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937157" comment="kubernetes1.26-controller-manager-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937158" comment="kubernetes1.26-kubeadm-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937159" comment="kubernetes1.26-kubelet-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937160" comment="kubernetes1.26-kubelet-common-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937161" comment="kubernetes1.26-proxy-1.26.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937162" comment="kubernetes1.26-scheduler-1.26.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252160" version="1" class="patch">
	<metadata>
		<title>kubernetes1.27-apiserver-1.27.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.27-apiserver-1.27.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937163" comment="kubernetes1.27-apiserver-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937164" comment="kubernetes1.27-client-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937165" comment="kubernetes1.27-client-bash-completion-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937166" comment="kubernetes1.27-client-common-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937167" comment="kubernetes1.27-client-fish-completion-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937168" comment="kubernetes1.27-controller-manager-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937169" comment="kubernetes1.27-kubeadm-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937170" comment="kubernetes1.27-kubelet-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937171" comment="kubernetes1.27-kubelet-common-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937172" comment="kubernetes1.27-proxy-1.27.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937173" comment="kubernetes1.27-scheduler-1.27.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252161" version="1" class="patch">
	<metadata>
		<title>kubernetes1.28-apiserver-1.28.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.28-apiserver-1.28.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937174" comment="kubernetes1.28-apiserver-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937175" comment="kubernetes1.28-client-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937176" comment="kubernetes1.28-client-bash-completion-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937177" comment="kubernetes1.28-client-common-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937178" comment="kubernetes1.28-client-fish-completion-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937179" comment="kubernetes1.28-controller-manager-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937180" comment="kubernetes1.28-kubeadm-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937181" comment="kubernetes1.28-kubelet-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937182" comment="kubernetes1.28-kubelet-common-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937183" comment="kubernetes1.28-proxy-1.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937184" comment="kubernetes1.28-scheduler-1.28.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252162" version="1" class="patch">
	<metadata>
		<title>kubernetes1.29-apiserver-1.29.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.29-apiserver-1.29.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937185" comment="kubernetes1.29-apiserver-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937186" comment="kubernetes1.29-client-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937187" comment="kubernetes1.29-client-bash-completion-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937188" comment="kubernetes1.29-client-common-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937189" comment="kubernetes1.29-client-fish-completion-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937190" comment="kubernetes1.29-controller-manager-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937191" comment="kubernetes1.29-kubeadm-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937192" comment="kubernetes1.29-kubelet-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937193" comment="kubernetes1.29-kubelet-common-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937194" comment="kubernetes1.29-proxy-1.29.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937195" comment="kubernetes1.29-scheduler-1.29.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252163" version="1" class="patch">
	<metadata>
		<title>openssh-9.6p1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041/" source="CVE"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.6p1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28041">CVE-2021-28041 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937196" comment="openssh-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937197" comment="openssh-cavs-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937198" comment="openssh-clients-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937199" comment="openssh-common-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937200" comment="openssh-fips-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937201" comment="openssh-helpers-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937202" comment="openssh-server-9.6p1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937203" comment="openssh-server-config-rootlogin-9.6p1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252164" version="1" class="patch">
	<metadata>
		<title>pgadmin4-8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2044" ref_url="https://www.suse.com/security/cve/CVE-2024-2044/" source="CVE"/>
		<reference ref_id="CVE-2024-3116" ref_url="https://www.suse.com/security/cve/CVE-2024-3116/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2044/">CVE-2024-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2044">CVE-2024-2044 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3116/">CVE-2024-3116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3116">CVE-2024-3116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937204" comment="pgadmin4-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937205" comment="pgadmin4-cloud-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937206" comment="pgadmin4-desktop-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937207" comment="pgadmin4-doc-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937208" comment="pgadmin4-web-uwsgi-8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937209" comment="system-user-pgadmin-8.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252165" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-30161" ref_url="https://www.suse.com/security/cve/CVE-2024-30161/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30161/">CVE-2024-30161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30161">CVE-2024-30161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937210" comment="libQt6Concurrent6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937211" comment="libQt6Core6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937212" comment="libQt6DBus6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937213" comment="libQt6Gui6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937214" comment="libQt6Network6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937215" comment="libQt6OpenGL6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937216" comment="libQt6OpenGLWidgets6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937217" comment="libQt6PrintSupport6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937218" comment="libQt6Sql6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937219" comment="libQt6Test6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937220" comment="libQt6Widgets6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937221" comment="libQt6Xml6-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937222" comment="qt6-base-common-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937223" comment="qt6-base-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937224" comment="qt6-base-examples-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937225" comment="qt6-base-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937226" comment="qt6-concurrent-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937227" comment="qt6-core-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937228" comment="qt6-core-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937229" comment="qt6-dbus-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937230" comment="qt6-dbus-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937231" comment="qt6-docs-common-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937232" comment="qt6-exampleicons-devel-static-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937233" comment="qt6-gui-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937234" comment="qt6-gui-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937235" comment="qt6-kmssupport-devel-static-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937236" comment="qt6-kmssupport-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937237" comment="qt6-network-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937238" comment="qt6-network-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937239" comment="qt6-network-tls-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937240" comment="qt6-networkinformation-glib-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937241" comment="qt6-networkinformation-nm-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937242" comment="qt6-opengl-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937243" comment="qt6-opengl-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937244" comment="qt6-openglwidgets-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937245" comment="qt6-platformsupport-devel-static-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937246" comment="qt6-platformsupport-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937247" comment="qt6-platformtheme-gtk3-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937248" comment="qt6-platformtheme-xdgdesktopportal-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937249" comment="qt6-printsupport-cups-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937250" comment="qt6-printsupport-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937251" comment="qt6-printsupport-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937252" comment="qt6-sql-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937253" comment="qt6-sql-mysql-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937254" comment="qt6-sql-postgresql-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937255" comment="qt6-sql-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937256" comment="qt6-sql-sqlite-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937257" comment="qt6-sql-unixODBC-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937258" comment="qt6-test-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937259" comment="qt6-test-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937260" comment="qt6-widgets-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937261" comment="qt6-widgets-private-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937262" comment="qt6-xml-devel-6.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937263" comment="qt6-xml-private-devel-6.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252166" version="1" class="patch">
	<metadata>
		<title>kubo-0.27.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<description>
These are all security issues fixed in the kubo-0.27.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937264" comment="kubo-0.27.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252167" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2883" ref_url="https://www.suse.com/security/cve/CVE-2024-2883/" source="CVE"/>
		<reference ref_id="CVE-2024-2886" ref_url="https://www.suse.com/security/cve/CVE-2024-2886/" source="CVE"/>
		<reference ref_id="CVE-2024-2887" ref_url="https://www.suse.com/security/cve/CVE-2024-2887/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2883/">CVE-2024-2883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2883">CVE-2024-2883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2886/">CVE-2024-2886 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2886">CVE-2024-2886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2887/">CVE-2024-2887 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2887">CVE-2024-2887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937265" comment="nodejs-electron-28.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937266" comment="nodejs-electron-devel-28.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937267" comment="nodejs-electron-doc-28.2.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252168" version="1" class="patch">
	<metadata>
		<title>syncthing-1.27.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<description>
These are all security issues fixed in the syncthing-1.27.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937268" comment="syncthing-1.27.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937269" comment="syncthing-relaysrv-1.27.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252169" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_mellon-0.19.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_mellon-0.19.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3639">CVE-2021-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937270" comment="apache2-mod_auth_mellon-0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937271" comment="apache2-mod_auth_mellon-diagnostics-0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937272" comment="apache2-mod_auth_mellon-doc-0.19.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252170" version="1" class="patch">
	<metadata>
		<title>coredns-1.11.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.11.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937273" comment="coredns-1.11.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937274" comment="coredns-extras-1.11.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252171" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-30260" ref_url="https://www.suse.com/security/cve/CVE-2024-30260/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30260/">CVE-2024-30260 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30260">CVE-2024-30260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937275" comment="nodejs-electron-28.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937276" comment="nodejs-electron-devel-28.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937277" comment="nodejs-electron-doc-28.2.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252172" version="1" class="patch">
	<metadata>
		<title>corepack20-20.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-30260" ref_url="https://www.suse.com/security/cve/CVE-2024-30260/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30260/">CVE-2024-30260 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30260">CVE-2024-30260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937278" comment="corepack20-20.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937279" comment="nodejs20-20.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937280" comment="nodejs20-devel-20.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937281" comment="nodejs20-docs-20.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937282" comment="npm20-20.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252173" version="1" class="patch">
	<metadata>
		<title>corepack21-21.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-30260" ref_url="https://www.suse.com/security/cve/CVE-2024-30260/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack21-21.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30260/">CVE-2024-30260 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30260">CVE-2024-30260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937283" comment="corepack21-21.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937284" comment="nodejs21-21.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937285" comment="nodejs21-devel-21.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937286" comment="nodejs21-docs-21.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937287" comment="npm21-21.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252174" version="1" class="patch">
	<metadata>
		<title>xen-4.18.2_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.2_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937288" comment="xen-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937289" comment="xen-devel-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937290" comment="xen-doc-html-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937291" comment="xen-libs-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937292" comment="xen-tools-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937293" comment="xen-tools-domU-4.18.2_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937294" comment="xen-tools-xendomains-wait-disk-4.18.2_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252175" version="1" class="patch">
	<metadata>
		<title>python310-yt-dlp-2024.04.09-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22423" ref_url="https://www.suse.com/security/cve/CVE-2024-22423/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-yt-dlp-2024.04.09-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22423/">CVE-2024-22423 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22423">CVE-2024-22423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937295" comment="python310-yt-dlp-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937296" comment="python311-yt-dlp-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937297" comment="python312-yt-dlp-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937298" comment="yt-dlp-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937299" comment="yt-dlp-bash-completion-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937300" comment="yt-dlp-fish-completion-2024.04.09-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937301" comment="yt-dlp-zsh-completion-2024.04.09-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252176" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.2.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-30261" ref_url="https://www.suse.com/security/cve/CVE-2024-30261/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.2.10-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30261/">CVE-2024-30261 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30261">CVE-2024-30261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937302" comment="nodejs-electron-28.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937303" comment="nodejs-electron-devel-28.2.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937304" comment="nodejs-electron-doc-28.2.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252177" version="1" class="patch">
	<metadata>
		<title>sngrep-1.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3119" ref_url="https://www.suse.com/security/cve/CVE-2024-3119/" source="CVE"/>
		<reference ref_id="CVE-2024-3120" ref_url="https://www.suse.com/security/cve/CVE-2024-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the sngrep-1.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3119/">CVE-2024-3119 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3119">CVE-2024-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3120/">CVE-2024-3120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3120">CVE-2024-3120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937305" comment="sngrep-1.8.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252178" version="1" class="patch">
	<metadata>
		<title>aws-nitro-enclaves-binaryblobs-upstream-1.2.3~git11.d3d77e0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-nitro-enclaves-binaryblobs-upstream-1.2.3~git11.d3d77e0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937306" comment="aws-nitro-enclaves-binaryblobs-upstream-1.2.3~git11.d3d77e0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937307" comment="aws-nitro-enclaves-cli-1.2.3~git11.d3d77e0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937308" comment="system-group-ne-1.2.3~git11.d3d77e0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252179" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.8.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.8.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937310" comment="kernel-macros-6.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937311" comment="kernel-source-6.8.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937312" comment="kernel-source-vanilla-6.8.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252180" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-28.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3159" ref_url="https://www.suse.com/security/cve/CVE-2024-3159/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-28.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3159/">CVE-2024-3159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3159">CVE-2024-3159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937313" comment="nodejs-electron-28.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937314" comment="nodejs-electron-devel-28.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937315" comment="nodejs-electron-doc-28.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252181" version="1" class="patch">
	<metadata>
		<title>frr-8.4-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31948" ref_url="https://www.suse.com/security/cve/CVE-2024-31948/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31948/">CVE-2024-31948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31948">CVE-2024-31948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937316" comment="frr-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937317" comment="frr-devel-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937318" comment="libfrr0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937319" comment="libfrr_pb0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937320" comment="libfrrcares0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937321" comment="libfrrfpm_pb0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937322" comment="libfrrospfapiclient0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937323" comment="libfrrsnmp0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937324" comment="libfrrzmq0-8.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937325" comment="libmlag_pb0-8.4-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252182" version="1" class="patch">
	<metadata>
		<title>python310-djangorestframework-3.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25626" ref_url="https://www.suse.com/security/cve/CVE-2020-25626/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-djangorestframework-3.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-25626/">CVE-2020-25626 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25626">CVE-2020-25626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937326" comment="python310-djangorestframework-3.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937327" comment="python311-djangorestframework-3.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937328" comment="python312-djangorestframework-3.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252183" version="1" class="patch">
	<metadata>
		<title>python310-ecdsa-0.19.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ecdsa-0.19.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937329" comment="python310-ecdsa-0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937330" comment="python311-ecdsa-0.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937331" comment="python312-ecdsa-0.19.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252184" version="1" class="patch">
	<metadata>
		<title>cosign-2.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29902" ref_url="https://www.suse.com/security/cve/CVE-2024-29902/" source="CVE"/>
		<reference ref_id="CVE-2024-29903" ref_url="https://www.suse.com/security/cve/CVE-2024-29903/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29902/">CVE-2024-29902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29902">CVE-2024-29902 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29903/">CVE-2024-29903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29903">CVE-2024-29903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937332" comment="cosign-2.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252185" version="1" class="patch">
	<metadata>
		<title>python310-pikepdf-8.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29421" ref_url="https://www.suse.com/security/cve/CVE-2021-29421/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pikepdf-8.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29421/">CVE-2021-29421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29421">CVE-2021-29421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937333" comment="python310-pikepdf-8.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937334" comment="python311-pikepdf-8.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937335" comment="python312-pikepdf-8.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252186" version="1" class="patch">
	<metadata>
		<title>golang-github-v2fly-v2ray-core-5.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-v2fly-v2ray-core-5.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937336" comment="golang-github-v2fly-v2ray-core-5.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937337" comment="v2ray-core-5.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252187" version="1" class="patch">
	<metadata>
		<title>perl-CryptX-0.80.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-25099" ref_url="https://www.suse.com/security/cve/CVE-2018-25099/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-CryptX-0.80.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-25099/">CVE-2018-25099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-25099">CVE-2018-25099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937338" comment="perl-CryptX-0.80.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252188" version="1" class="patch">
	<metadata>
		<title>php8-8.3.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2024-1874" ref_url="https://www.suse.com/security/cve/CVE-2024-1874/" source="CVE"/>
		<reference ref_id="CVE-2024-2757" ref_url="https://www.suse.com/security/cve/CVE-2024-2757/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.3.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1874/">CVE-2024-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1874">CVE-2024-1874 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2757/">CVE-2024-2757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2757">CVE-2024-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937339" comment="php8-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937340" comment="php8-bcmath-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937341" comment="php8-bz2-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937342" comment="php8-calendar-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937343" comment="php8-cli-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937344" comment="php8-ctype-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937345" comment="php8-curl-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937346" comment="php8-dba-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937347" comment="php8-devel-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937348" comment="php8-dom-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937349" comment="php8-enchant-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937350" comment="php8-exif-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937351" comment="php8-ffi-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937352" comment="php8-fileinfo-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937353" comment="php8-ftp-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937354" comment="php8-gd-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937355" comment="php8-gettext-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937356" comment="php8-gmp-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937357" comment="php8-iconv-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937358" comment="php8-intl-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937359" comment="php8-ldap-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937360" comment="php8-mbstring-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937361" comment="php8-mysql-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937362" comment="php8-odbc-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937363" comment="php8-opcache-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937364" comment="php8-openssl-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937365" comment="php8-pcntl-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937366" comment="php8-pdo-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937367" comment="php8-pgsql-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937368" comment="php8-phar-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937369" comment="php8-posix-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937370" comment="php8-readline-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937371" comment="php8-shmop-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937372" comment="php8-snmp-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937373" comment="php8-soap-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937374" comment="php8-sockets-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937375" comment="php8-sodium-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937376" comment="php8-sqlite-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937377" comment="php8-sysvmsg-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937378" comment="php8-sysvsem-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937379" comment="php8-sysvshm-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937380" comment="php8-tidy-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937381" comment="php8-tokenizer-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937382" comment="php8-xmlreader-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937383" comment="php8-xmlwriter-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937384" comment="php8-xsl-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937385" comment="php8-zip-8.3.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937386" comment="php8-zlib-8.3.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252189" version="1" class="patch">
	<metadata>
		<title>putty-0.81-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31497" ref_url="https://www.suse.com/security/cve/CVE-2024-31497/" source="CVE"/>
		<description>
These are all security issues fixed in the putty-0.81-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31497/">CVE-2024-31497 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31497">CVE-2024-31497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937387" comment="putty-0.81-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252190" version="1" class="patch">
	<metadata>
		<title>python310-pydantic-2.6.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-29510" ref_url="https://www.suse.com/security/cve/CVE-2021-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-3772" ref_url="https://www.suse.com/security/cve/CVE-2024-3772/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pydantic-2.6.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29510/">CVE-2021-29510 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29510">CVE-2021-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3772/">CVE-2024-3772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3772">CVE-2024-3772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937388" comment="python310-pydantic-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937389" comment="python311-pydantic-2.6.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937390" comment="python312-pydantic-2.6.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252191" version="1" class="patch">
	<metadata>
		<title>filezilla-3.67.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31497" ref_url="https://www.suse.com/security/cve/CVE-2024-31497/" source="CVE"/>
		<description>
These are all security issues fixed in the filezilla-3.67.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31497/">CVE-2024-31497 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31497">CVE-2024-31497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937391" comment="filezilla-3.67.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937392" comment="filezilla-devel-3.67.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937393" comment="filezilla-lang-3.67.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252192" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.23.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.23.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937394" comment="java-11-openjdk-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937395" comment="java-11-openjdk-demo-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937396" comment="java-11-openjdk-devel-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937397" comment="java-11-openjdk-headless-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937398" comment="java-11-openjdk-javadoc-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937399" comment="java-11-openjdk-jmods-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937400" comment="java-11-openjdk-src-11.0.23.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252193" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937401" comment="java-17-openjdk-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937402" comment="java-17-openjdk-demo-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937403" comment="java-17-openjdk-devel-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937404" comment="java-17-openjdk-headless-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937405" comment="java-17-openjdk-javadoc-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937406" comment="java-17-openjdk-jmods-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937407" comment="java-17-openjdk-src-17.0.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252194" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937408" comment="java-21-openjdk-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937409" comment="java-21-openjdk-demo-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937410" comment="java-21-openjdk-devel-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937411" comment="java-21-openjdk-headless-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937412" comment="java-21-openjdk-javadoc-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937413" comment="java-21-openjdk-jmods-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937414" comment="java-21-openjdk-src-21.0.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252195" version="1" class="patch">
	<metadata>
		<title>python310-idna-3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-idna-3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937415" comment="python310-idna-3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937416" comment="python311-idna-3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937417" comment="python312-idna-3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252196" version="1" class="patch">
	<metadata>
		<title>java-22-openjdk-22.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<description>
These are all security issues fixed in the java-22-openjdk-22.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937418" comment="java-22-openjdk-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937419" comment="java-22-openjdk-demo-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937420" comment="java-22-openjdk-devel-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937421" comment="java-22-openjdk-headless-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937422" comment="java-22-openjdk-javadoc-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937423" comment="java-22-openjdk-jmods-22.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937424" comment="java-22-openjdk-src-22.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252197" version="1" class="patch">
	<metadata>
		<title>qemu-8.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26328" ref_url="https://www.suse.com/security/cve/CVE-2024-26328/" source="CVE"/>
		<reference ref_id="CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446/" source="CVE"/>
		<reference ref_id="CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447/" source="CVE"/>
		<reference ref_id="CVE-2024-3567" ref_url="https://www.suse.com/security/cve/CVE-2024-3567/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-8.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26328/">CVE-2024-26328 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26328">CVE-2024-26328 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3567/">CVE-2024-3567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3567">CVE-2024-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937425" comment="qemu-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937426" comment="qemu-SLOF-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937427" comment="qemu-accel-qtest-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937428" comment="qemu-accel-tcg-x86-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937429" comment="qemu-arm-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937430" comment="qemu-audio-alsa-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937431" comment="qemu-audio-dbus-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937432" comment="qemu-audio-jack-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937433" comment="qemu-audio-oss-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937434" comment="qemu-audio-pa-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937435" comment="qemu-audio-pipewire-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937436" comment="qemu-audio-spice-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937437" comment="qemu-block-curl-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937438" comment="qemu-block-dmg-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937439" comment="qemu-block-gluster-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937440" comment="qemu-block-iscsi-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937441" comment="qemu-block-nfs-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937442" comment="qemu-block-rbd-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937443" comment="qemu-block-ssh-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937444" comment="qemu-chardev-baum-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937445" comment="qemu-chardev-spice-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937446" comment="qemu-doc-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937447" comment="qemu-extra-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937448" comment="qemu-guest-agent-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937449" comment="qemu-headless-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937450" comment="qemu-hw-display-qxl-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937451" comment="qemu-hw-display-virtio-gpu-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937452" comment="qemu-hw-display-virtio-gpu-pci-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937453" comment="qemu-hw-display-virtio-vga-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937454" comment="qemu-hw-s390x-virtio-gpu-ccw-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937455" comment="qemu-hw-usb-host-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937456" comment="qemu-hw-usb-redirect-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937457" comment="qemu-hw-usb-smartcard-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937458" comment="qemu-img-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937459" comment="qemu-ipxe-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937460" comment="qemu-ivshmem-tools-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937461" comment="qemu-ksm-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937462" comment="qemu-lang-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937463" comment="qemu-microvm-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937464" comment="qemu-ppc-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937465" comment="qemu-pr-helper-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937466" comment="qemu-s390x-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937467" comment="qemu-seabios-8.2.21.16.3_3_ga95067eb-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937468" comment="qemu-skiboot-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937469" comment="qemu-spice-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937470" comment="qemu-tools-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937471" comment="qemu-ui-curses-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937472" comment="qemu-ui-dbus-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937473" comment="qemu-ui-gtk-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937474" comment="qemu-ui-opengl-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937475" comment="qemu-ui-spice-app-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937476" comment="qemu-ui-spice-core-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937477" comment="qemu-vgabios-8.2.21.16.3_3_ga95067eb-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937478" comment="qemu-vhost-user-gpu-8.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937479" comment="qemu-x86-8.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252198" version="1" class="patch">
	<metadata>
		<title>glibc-2.39-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.39-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937480" comment="glibc-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937481" comment="glibc-devel-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937482" comment="glibc-devel-static-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937483" comment="glibc-extra-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937484" comment="glibc-html-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937485" comment="glibc-i18ndata-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937486" comment="glibc-info-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937487" comment="glibc-lang-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937488" comment="glibc-locale-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937489" comment="glibc-locale-base-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937490" comment="glibc-profile-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937491" comment="libnsl1-2.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937492" comment="nscd-2.39-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252199" version="1" class="patch">
	<metadata>
		<title>jasper-4.2.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31744" ref_url="https://www.suse.com/security/cve/CVE-2024-31744/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.2.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31744/">CVE-2024-31744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31744">CVE-2024-31744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937493" comment="jasper-4.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937494" comment="libjasper-devel-4.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937495" comment="libjasper7-4.2.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937496" comment="libjasper7-32bit-4.2.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252200" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.412-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.412-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937497" comment="java-1_8_0-openjdk-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937498" comment="java-1_8_0-openjdk-accessibility-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937499" comment="java-1_8_0-openjdk-demo-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937500" comment="java-1_8_0-openjdk-devel-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937501" comment="java-1_8_0-openjdk-headless-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937502" comment="java-1_8_0-openjdk-javadoc-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937503" comment="java-1_8_0-openjdk-src-1.8.0.412-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252201" version="1" class="patch">
	<metadata>
		<title>kubernetes1.27-apiserver-1.27.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.27-apiserver-1.27.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937504" comment="kubernetes1.27-apiserver-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937505" comment="kubernetes1.27-client-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937506" comment="kubernetes1.27-client-bash-completion-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937507" comment="kubernetes1.27-client-common-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937508" comment="kubernetes1.27-client-fish-completion-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937509" comment="kubernetes1.27-controller-manager-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937510" comment="kubernetes1.27-kubeadm-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937511" comment="kubernetes1.27-kubelet-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937512" comment="kubernetes1.27-kubelet-common-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937513" comment="kubernetes1.27-proxy-1.27.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937514" comment="kubernetes1.27-scheduler-1.27.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252202" version="1" class="patch">
	<metadata>
		<title>kubernetes1.28-apiserver-1.28.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.28-apiserver-1.28.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937515" comment="kubernetes1.28-apiserver-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937516" comment="kubernetes1.28-client-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937517" comment="kubernetes1.28-client-bash-completion-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937518" comment="kubernetes1.28-client-common-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937519" comment="kubernetes1.28-client-fish-completion-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937520" comment="kubernetes1.28-controller-manager-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937521" comment="kubernetes1.28-kubeadm-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937522" comment="kubernetes1.28-kubelet-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937523" comment="kubernetes1.28-kubelet-common-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937524" comment="kubernetes1.28-proxy-1.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937525" comment="kubernetes1.28-scheduler-1.28.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252203" version="1" class="patch">
	<metadata>
		<title>kubernetes1.29-apiserver-1.29.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.29-apiserver-1.29.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937526" comment="kubernetes1.29-apiserver-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937527" comment="kubernetes1.29-client-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937528" comment="kubernetes1.29-client-bash-completion-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937529" comment="kubernetes1.29-client-common-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937530" comment="kubernetes1.29-client-fish-completion-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937531" comment="kubernetes1.29-controller-manager-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937532" comment="kubernetes1.29-kubeadm-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937533" comment="kubernetes1.29-kubelet-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937534" comment="kubernetes1.29-kubelet-common-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937535" comment="kubernetes1.29-proxy-1.29.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937536" comment="kubernetes1.29-scheduler-1.29.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252204" version="1" class="patch">
	<metadata>
		<title>python311-3.11.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937537" comment="python311-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937538" comment="python311-32bit-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937539" comment="python311-curses-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937540" comment="python311-dbm-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937541" comment="python311-idle-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937542" comment="python311-tk-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937543" comment="python311-x86-64-v3-3.11.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252205" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937544" comment="MozillaThunderbird-115.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937545" comment="MozillaThunderbird-openpgp-librnp-115.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937546" comment="MozillaThunderbird-translations-common-115.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937547" comment="MozillaThunderbird-translations-other-115.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252206" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-29.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3516" ref_url="https://www.suse.com/security/cve/CVE-2024-3516/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-29.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3516/">CVE-2024-3516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3516">CVE-2024-3516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937548" comment="nodejs-electron-29.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937549" comment="nodejs-electron-devel-29.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937550" comment="nodejs-electron-doc-29.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252207" version="1" class="patch">
	<metadata>
		<title>python310-Beaker-1.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2012-3458" ref_url="https://www.suse.com/security/cve/CVE-2012-3458/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Beaker-1.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3458/">CVE-2012-3458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3458">CVE-2012-3458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937551" comment="python310-Beaker-1.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937552" comment="python311-Beaker-1.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937553" comment="python312-Beaker-1.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252208" version="1" class="patch">
	<metadata>
		<title>python310-Django-4.2.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3982" ref_url="https://www.suse.com/security/cve/CVE-2015-3982/" source="CVE"/>
		<reference ref_id="CVE-2015-5145" ref_url="https://www.suse.com/security/cve/CVE-2015-5145/" source="CVE"/>
		<reference ref_id="CVE-2015-5963" ref_url="https://www.suse.com/security/cve/CVE-2015-5963/" source="CVE"/>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<reference ref_id="CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794/" source="CVE"/>
		<reference ref_id="CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233/" source="CVE"/>
		<reference ref_id="CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234/" source="CVE"/>
		<reference ref_id="CVE-2018-16984" ref_url="https://www.suse.com/security/cve/CVE-2018-16984/" source="CVE"/>
		<reference ref_id="CVE-2018-6188" ref_url="https://www.suse.com/security/cve/CVE-2018-6188/" source="CVE"/>
		<reference ref_id="CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536/" source="CVE"/>
		<reference ref_id="CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-24583" ref_url="https://www.suse.com/security/cve/CVE-2020-24583/" source="CVE"/>
		<reference ref_id="CVE-2020-24584" ref_url="https://www.suse.com/security/cve/CVE-2020-24584/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-32052" ref_url="https://www.suse.com/security/cve/CVE-2021-32052/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="CVE-2021-35042" ref_url="https://www.suse.com/security/cve/CVE-2021-35042/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-4.2.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3982/">CVE-2015-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3982">CVE-2015-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5145/">CVE-2015-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5145">CVE-2015-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5963/">CVE-2015-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5963">CVE-2015-5963 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12794">CVE-2017-12794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7233">CVE-2017-7233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7234">CVE-2017-7234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16984/">CVE-2018-16984 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16984">CVE-2018-16984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6188/">CVE-2018-6188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6188">CVE-2018-6188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7536">CVE-2018-7536 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7537">CVE-2018-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19118">CVE-2019-19118 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24583/">CVE-2020-24583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24583">CVE-2020-24583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24584/">CVE-2020-24584 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24584">CVE-2020-24584 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32052/">CVE-2021-32052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32052">CVE-2021-32052 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35042/">CVE-2021-35042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35042">CVE-2021-35042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937554" comment="python310-Django-4.2.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937555" comment="python311-Django-4.2.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937556" comment="python312-Django-4.2.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252209" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49528" ref_url="https://www.suse.com/security/cve/CVE-2023-49528/" source="CVE"/>
		<reference ref_id="CVE-2023-51796" ref_url="https://www.suse.com/security/cve/CVE-2023-51796/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="CVE-2024-31582" ref_url="https://www.suse.com/security/cve/CVE-2024-31582/" source="CVE"/>
		<reference ref_id="CVE-2024-31585" ref_url="https://www.suse.com/security/cve/CVE-2024-31585/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49528/">CVE-2023-49528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49528">CVE-2023-49528 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51796/">CVE-2023-51796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51796">CVE-2023-51796 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31582/">CVE-2024-31582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31582">CVE-2024-31582 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31585/">CVE-2024-31585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31585">CVE-2024-31585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937557" comment="ffmpeg-5-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937558" comment="ffmpeg-5-libavcodec-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937559" comment="ffmpeg-5-libavdevice-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937560" comment="ffmpeg-5-libavfilter-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937561" comment="ffmpeg-5-libavformat-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937562" comment="ffmpeg-5-libavutil-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937563" comment="ffmpeg-5-libpostproc-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937564" comment="ffmpeg-5-libswresample-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937565" comment="ffmpeg-5-libswscale-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937566" comment="ffmpeg-5-private-devel-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937567" comment="libavcodec59-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937568" comment="libavcodec59-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937569" comment="libavdevice59-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937570" comment="libavdevice59-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937571" comment="libavfilter8-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937572" comment="libavfilter8-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937573" comment="libavformat59-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937574" comment="libavformat59-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937575" comment="libavutil57-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937576" comment="libavutil57-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937577" comment="libpostproc56-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937578" comment="libpostproc56-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937579" comment="libswresample4_ff5-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937580" comment="libswresample4_ff5-32bit-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937581" comment="libswscale6-5.1.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937582" comment="libswscale6-32bit-5.1.4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252210" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2022-3964" ref_url="https://www.suse.com/security/cve/CVE-2022-3964/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22046">CVE-2020-22046 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3964/">CVE-2022-3964 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3964">CVE-2022-3964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937583" comment="ffmpeg-7-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937584" comment="ffmpeg-7-libavcodec-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937585" comment="ffmpeg-7-libavdevice-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937586" comment="ffmpeg-7-libavfilter-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937587" comment="ffmpeg-7-libavformat-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937588" comment="ffmpeg-7-libavutil-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937589" comment="ffmpeg-7-libpostproc-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937590" comment="ffmpeg-7-libswresample-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937591" comment="ffmpeg-7-libswscale-devel-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937592" comment="libavcodec61-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937593" comment="libavdevice61-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937594" comment="libavfilter10-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937595" comment="libavformat61-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937596" comment="libavutil59-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937597" comment="libpostproc58-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937598" comment="libswresample5-7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937599" comment="libswscale8-7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252211" version="1" class="patch">
	<metadata>
		<title>python-gevent-doc-24.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
These are all security issues fixed in the python-gevent-doc-24.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937600" comment="python-gevent-doc-24.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937601" comment="python310-gevent-24.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937602" comment="python311-gevent-24.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937603" comment="python312-gevent-24.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252212" version="1" class="patch">
	<metadata>
		<title>python-gunicorn-doc-22.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1135" ref_url="https://www.suse.com/security/cve/CVE-2024-1135/" source="CVE"/>
		<description>
These are all security issues fixed in the python-gunicorn-doc-22.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1135/">CVE-2024-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1135">CVE-2024-1135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937604" comment="python-gunicorn-doc-22.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937605" comment="python310-gunicorn-22.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937606" comment="python311-gunicorn-22.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937607" comment="python312-gunicorn-22.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252213" version="1" class="patch">
	<metadata>
		<title>python312-3.12.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937608" comment="python312-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937609" comment="python312-32bit-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937610" comment="python312-curses-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937611" comment="python312-dbm-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937612" comment="python312-idle-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937613" comment="python312-tk-3.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937614" comment="python312-x86-64-v3-3.12.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252214" version="1" class="patch">
	<metadata>
		<title>shadowsocks-rust-1.18.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the shadowsocks-rust-1.18.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937615" comment="shadowsocks-rust-1.18.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252215" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937616" comment="ffmpeg-4-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937617" comment="ffmpeg-4-libavcodec-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937618" comment="ffmpeg-4-libavdevice-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937619" comment="ffmpeg-4-libavfilter-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937620" comment="ffmpeg-4-libavformat-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937621" comment="ffmpeg-4-libavresample-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937622" comment="ffmpeg-4-libavutil-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937623" comment="ffmpeg-4-libpostproc-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937624" comment="ffmpeg-4-libswresample-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937625" comment="ffmpeg-4-libswscale-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937626" comment="ffmpeg-4-private-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937627" comment="libavcodec58_134-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937628" comment="libavcodec58_134-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937629" comment="libavdevice58_13-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937630" comment="libavdevice58_13-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937631" comment="libavfilter7_110-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937632" comment="libavfilter7_110-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937633" comment="libavformat58_76-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937634" comment="libavformat58_76-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937635" comment="libavresample4_0-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937636" comment="libavresample4_0-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937637" comment="libavutil56_70-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937638" comment="libavutil56_70-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937639" comment="libpostproc55_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937640" comment="libpostproc55_9-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937641" comment="libswresample3_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937642" comment="libswresample3_9-32bit-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937643" comment="libswscale5_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937644" comment="libswscale5_9-32bit-4.4.4-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252216" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49501" ref_url="https://www.suse.com/security/cve/CVE-2023-49501/" source="CVE"/>
		<reference ref_id="CVE-2023-49502" ref_url="https://www.suse.com/security/cve/CVE-2023-49502/" source="CVE"/>
		<reference ref_id="CVE-2023-49528" ref_url="https://www.suse.com/security/cve/CVE-2023-49528/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="CVE-2024-31582" ref_url="https://www.suse.com/security/cve/CVE-2024-31582/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49501/">CVE-2023-49501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49501">CVE-2023-49501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49502/">CVE-2023-49502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502">CVE-2023-49502 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49528/">CVE-2023-49528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49528">CVE-2023-49528 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31582/">CVE-2024-31582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31582">CVE-2024-31582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937645" comment="ffmpeg-6-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937646" comment="ffmpeg-6-libavcodec-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937647" comment="ffmpeg-6-libavdevice-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937648" comment="ffmpeg-6-libavfilter-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937649" comment="ffmpeg-6-libavformat-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937650" comment="ffmpeg-6-libavutil-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937651" comment="ffmpeg-6-libpostproc-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937652" comment="ffmpeg-6-libswresample-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937653" comment="ffmpeg-6-libswscale-devel-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937654" comment="libavcodec60-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937655" comment="libavcodec60-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937656" comment="libavdevice60-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937657" comment="libavdevice60-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937658" comment="libavfilter9-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937659" comment="libavfilter9-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937660" comment="libavformat60-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937661" comment="libavformat60-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937662" comment="libavutil58-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937663" comment="libavutil58-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937664" comment="libpostproc57-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937665" comment="libpostproc57-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937666" comment="libswresample4-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937667" comment="libswresample4-32bit-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937668" comment="libswscale7-6.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937669" comment="libswscale7-32bit-6.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252217" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.24.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.24.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937670" comment="gstreamer-plugins-bad-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937671" comment="gstreamer-plugins-bad-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937672" comment="gstreamer-plugins-bad-chromaprint-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937673" comment="gstreamer-plugins-bad-chromaprint-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937674" comment="gstreamer-plugins-bad-devel-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937675" comment="gstreamer-plugins-bad-fluidsynth-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937676" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937677" comment="gstreamer-plugins-bad-lang-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937678" comment="gstreamer-transcoder-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937679" comment="gstreamer-transcoder-devel-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937680" comment="libgstadaptivedemux-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937681" comment="libgstadaptivedemux-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937682" comment="libgstanalytics-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937683" comment="libgstanalytics-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937684" comment="libgstbadaudio-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937685" comment="libgstbadaudio-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937686" comment="libgstbasecamerabinsrc-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937687" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937688" comment="libgstcodecparsers-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937689" comment="libgstcodecparsers-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937690" comment="libgstcodecs-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937691" comment="libgstcodecs-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937692" comment="libgstcuda-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937693" comment="libgstcuda-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937694" comment="libgstdxva-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937695" comment="libgstdxva-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937696" comment="libgstinsertbin-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937697" comment="libgstinsertbin-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937698" comment="libgstisoff-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937699" comment="libgstisoff-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937700" comment="libgstmpegts-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937701" comment="libgstmpegts-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937702" comment="libgstmse-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937703" comment="libgstmse-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937704" comment="libgstphotography-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937705" comment="libgstphotography-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937706" comment="libgstplay-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937707" comment="libgstplay-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937708" comment="libgstplayer-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937709" comment="libgstplayer-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937710" comment="libgstsctp-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937711" comment="libgstsctp-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937712" comment="libgsttranscoder-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937713" comment="libgsttranscoder-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937714" comment="libgsturidownloader-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937715" comment="libgsturidownloader-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937716" comment="libgstva-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937717" comment="libgstva-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937718" comment="libgstvulkan-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937719" comment="libgstvulkan-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937720" comment="libgstwayland-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937721" comment="libgstwayland-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937722" comment="libgstwebrtc-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937723" comment="libgstwebrtc-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937724" comment="libgstwebrtcnice-1_0-0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937725" comment="libgstwebrtcnice-1_0-0-32bit-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937726" comment="typelib-1_0-CudaGst-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937727" comment="typelib-1_0-GstAnalytics-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937728" comment="typelib-1_0-GstBadAudio-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937729" comment="typelib-1_0-GstCodecs-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937730" comment="typelib-1_0-GstCuda-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937731" comment="typelib-1_0-GstDxva-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937732" comment="typelib-1_0-GstInsertBin-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937733" comment="typelib-1_0-GstMpegts-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937734" comment="typelib-1_0-GstMse-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937735" comment="typelib-1_0-GstPlay-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937736" comment="typelib-1_0-GstPlayer-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937737" comment="typelib-1_0-GstTranscoder-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937738" comment="typelib-1_0-GstVa-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937739" comment="typelib-1_0-GstVulkan-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937740" comment="typelib-1_0-GstVulkanWayland-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937741" comment="typelib-1_0-GstVulkanXCB-1_0-1.24.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937742" comment="typelib-1_0-GstWebRTC-1_0-1.24.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252218" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.105.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31208" ref_url="https://www.suse.com/security/cve/CVE-2024-31208/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.105.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31208/">CVE-2024-31208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31208">CVE-2024-31208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937743" comment="matrix-synapse-1.105.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252219" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28130" ref_url="https://www.suse.com/security/cve/CVE-2024-28130/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28130/">CVE-2024-28130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28130">CVE-2024-28130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937744" comment="dcmtk-3.6.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937745" comment="dcmtk-devel-3.6.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937746" comment="libdcmtk18-3.6.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252220" version="1" class="patch">
	<metadata>
		<title>flatpak-1.15.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.15.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937747" comment="flatpak-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937748" comment="flatpak-devel-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937749" comment="flatpak-remote-flathub-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937750" comment="flatpak-selinux-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937751" comment="flatpak-zsh-completion-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937752" comment="libflatpak0-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937753" comment="system-user-flatpak-1.15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937754" comment="typelib-1_0-Flatpak-1_0-1.15.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252221" version="1" class="patch">
	<metadata>
		<title>freerdp-3.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937755" comment="freerdp-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937756" comment="freerdp-devel-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937757" comment="freerdp-proxy-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937758" comment="freerdp-proxy-plugins-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937759" comment="freerdp-sdl-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937760" comment="freerdp-server-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937761" comment="freerdp-wayland-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937762" comment="libfreerdp-server-proxy3-3-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937763" comment="libfreerdp3-3-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937764" comment="librdtk0-0-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937765" comment="libuwac0-0-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937766" comment="libwinpr3-3-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937767" comment="rdtk0-devel-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937768" comment="uwac0-devel-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937769" comment="winpr-devel-3.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252222" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-5.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25583" ref_url="https://www.suse.com/security/cve/CVE-2024-25583/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-5.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25583/">CVE-2024-25583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25583">CVE-2024-25583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937770" comment="pdns-recursor-5.0.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252223" version="1" class="patch">
	<metadata>
		<title>python310-autobahn-23.6.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35678" ref_url="https://www.suse.com/security/cve/CVE-2020-35678/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-autobahn-23.6.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35678/">CVE-2020-35678 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35678">CVE-2020-35678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937771" comment="python310-autobahn-23.6.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937772" comment="python311-autobahn-23.6.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937773" comment="python312-autobahn-23.6.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252224" version="1" class="patch">
	<metadata>
		<title>teleport-15.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-29902" ref_url="https://www.suse.com/security/cve/CVE-2024-29902/" source="CVE"/>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-15.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29902/">CVE-2024-29902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29902">CVE-2024-29902 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937774" comment="teleport-15.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937775" comment="teleport-tbot-15.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937776" comment="teleport-tctl-15.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937777" comment="teleport-tsh-15.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252225" version="1" class="patch">
	<metadata>
		<title>topgrade-14.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the topgrade-14.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937778" comment="topgrade-14.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252226" version="1" class="patch">
	<metadata>
		<title>cmctl-1.14.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-1.14.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937779" comment="cmctl-1.14.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252227" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49502" ref_url="https://www.suse.com/security/cve/CVE-2023-49502/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49502/">CVE-2023-49502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502">CVE-2023-49502 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937616" comment="ffmpeg-4-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937617" comment="ffmpeg-4-libavcodec-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937618" comment="ffmpeg-4-libavdevice-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937619" comment="ffmpeg-4-libavfilter-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937620" comment="ffmpeg-4-libavformat-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937621" comment="ffmpeg-4-libavresample-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937622" comment="ffmpeg-4-libavutil-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937623" comment="ffmpeg-4-libpostproc-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937624" comment="ffmpeg-4-libswresample-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937625" comment="ffmpeg-4-libswscale-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937626" comment="ffmpeg-4-private-devel-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937627" comment="libavcodec58_134-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937780" comment="libavcodec58_134-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937629" comment="libavdevice58_13-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937781" comment="libavdevice58_13-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937631" comment="libavfilter7_110-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937782" comment="libavfilter7_110-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937633" comment="libavformat58_76-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937783" comment="libavformat58_76-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937635" comment="libavresample4_0-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937784" comment="libavresample4_0-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937637" comment="libavutil56_70-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937785" comment="libavutil56_70-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937639" comment="libpostproc55_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937786" comment="libpostproc55_9-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937641" comment="libswresample3_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937787" comment="libswresample3_9-32bit-4.4.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937643" comment="libswscale5_9-4.4.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937788" comment="libswscale5_9-32bit-4.4.4-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252228" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-125.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3853" ref_url="https://www.suse.com/security/cve/CVE-2024-3853/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3855" ref_url="https://www.suse.com/security/cve/CVE-2024-3855/" source="CVE"/>
		<reference ref_id="CVE-2024-3856" ref_url="https://www.suse.com/security/cve/CVE-2024-3856/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3858" ref_url="https://www.suse.com/security/cve/CVE-2024-3858/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3860" ref_url="https://www.suse.com/security/cve/CVE-2024-3860/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3862" ref_url="https://www.suse.com/security/cve/CVE-2024-3862/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="CVE-2024-3865" ref_url="https://www.suse.com/security/cve/CVE-2024-3865/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-125.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3853/">CVE-2024-3853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3853">CVE-2024-3853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3855/">CVE-2024-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3855">CVE-2024-3855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3856/">CVE-2024-3856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3856">CVE-2024-3856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3858/">CVE-2024-3858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3858">CVE-2024-3858 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3860/">CVE-2024-3860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3860">CVE-2024-3860 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3862/">CVE-2024-3862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3862">CVE-2024-3862 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3865/">CVE-2024-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3865">CVE-2024-3865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937789" comment="MozillaFirefox-125.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937790" comment="MozillaFirefox-branding-upstream-125.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937791" comment="MozillaFirefox-devel-125.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937792" comment="MozillaFirefox-translations-common-125.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937793" comment="MozillaFirefox-translations-other-125.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252229" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49502" ref_url="https://www.suse.com/security/cve/CVE-2023-49502/" source="CVE"/>
		<reference ref_id="CVE-2023-50007" ref_url="https://www.suse.com/security/cve/CVE-2023-50007/" source="CVE"/>
		<reference ref_id="CVE-2023-50008" ref_url="https://www.suse.com/security/cve/CVE-2023-50008/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49502/">CVE-2023-49502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502">CVE-2023-49502 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50007/">CVE-2023-50007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50007">CVE-2023-50007 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50008/">CVE-2023-50008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50008">CVE-2023-50008 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937794" comment="ffmpeg-5-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937795" comment="ffmpeg-5-libavcodec-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937796" comment="ffmpeg-5-libavdevice-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937797" comment="ffmpeg-5-libavfilter-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937798" comment="ffmpeg-5-libavformat-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937799" comment="ffmpeg-5-libavutil-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937800" comment="ffmpeg-5-libpostproc-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937801" comment="ffmpeg-5-libswresample-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937802" comment="ffmpeg-5-libswscale-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937803" comment="ffmpeg-5-private-devel-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937804" comment="libavcodec59-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937805" comment="libavcodec59-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937806" comment="libavdevice59-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937807" comment="libavdevice59-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937808" comment="libavfilter8-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937809" comment="libavfilter8-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937810" comment="libavformat59-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937811" comment="libavformat59-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937812" comment="libavutil57-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937813" comment="libavutil57-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937814" comment="libpostproc56-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937815" comment="libpostproc56-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937816" comment="libswresample4_ff5-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937817" comment="libswresample4_ff5-32bit-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937818" comment="libswscale6-5.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937819" comment="libswscale6-32bit-5.1.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252230" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50007" ref_url="https://www.suse.com/security/cve/CVE-2023-50007/" source="CVE"/>
		<reference ref_id="CVE-2023-50008" ref_url="https://www.suse.com/security/cve/CVE-2023-50008/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50007/">CVE-2023-50007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50007">CVE-2023-50007 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50008/">CVE-2023-50008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50008">CVE-2023-50008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937820" comment="ffmpeg-6-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937821" comment="ffmpeg-6-libavcodec-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937822" comment="ffmpeg-6-libavdevice-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937823" comment="ffmpeg-6-libavfilter-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937824" comment="ffmpeg-6-libavformat-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937825" comment="ffmpeg-6-libavutil-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937826" comment="ffmpeg-6-libpostproc-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937827" comment="ffmpeg-6-libswresample-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937828" comment="ffmpeg-6-libswscale-devel-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937829" comment="libavcodec60-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937830" comment="libavcodec60-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937831" comment="libavdevice60-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937832" comment="libavdevice60-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937833" comment="libavfilter9-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937834" comment="libavfilter9-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937835" comment="libavformat60-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937836" comment="libavformat60-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937837" comment="libavutil58-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937838" comment="libavutil58-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937839" comment="libpostproc57-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937840" comment="libpostproc57-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937841" comment="libswresample4-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937842" comment="libswresample4-32bit-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937843" comment="libswscale7-6.1.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937844" comment="libswscale7-32bit-6.1.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252231" version="1" class="patch">
	<metadata>
		<title>blosc2-devel-2.14.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3203" ref_url="https://www.suse.com/security/cve/CVE-2024-3203/" source="CVE"/>
		<description>
These are all security issues fixed in the blosc2-devel-2.14.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-3203/">CVE-2024-3203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3203">CVE-2024-3203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937845" comment="blosc2-devel-2.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937846" comment="libblosc2-3-2.14.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937847" comment="libblosc2-3-x86-64-v3-2.14.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252232" version="1" class="patch">
	<metadata>
		<title>frr-8.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27913" ref_url="https://www.suse.com/security/cve/CVE-2024-27913/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27913/">CVE-2024-27913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27913">CVE-2024-27913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937848" comment="frr-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937849" comment="frr-devel-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937850" comment="libfrr0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937851" comment="libfrr_pb0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937852" comment="libfrrcares0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937853" comment="libfrrfpm_pb0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937854" comment="libfrrospfapiclient0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937855" comment="libfrrsnmp0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937856" comment="libfrrzmq0-8.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937857" comment="libmlag_pb0-8.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252233" version="1" class="patch">
	<metadata>
		<title>kubetui-1.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the kubetui-1.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937858" comment="kubetui-1.5.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252234" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937859" comment="ffmpeg-4-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937860" comment="ffmpeg-4-libavcodec-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937861" comment="ffmpeg-4-libavdevice-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937862" comment="ffmpeg-4-libavfilter-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937863" comment="ffmpeg-4-libavformat-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937864" comment="ffmpeg-4-libavresample-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937865" comment="ffmpeg-4-libavutil-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937866" comment="ffmpeg-4-libpostproc-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937867" comment="ffmpeg-4-libswresample-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937868" comment="ffmpeg-4-libswscale-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937869" comment="ffmpeg-4-private-devel-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937870" comment="libavcodec58_134-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937871" comment="libavcodec58_134-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937872" comment="libavdevice58_13-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937873" comment="libavdevice58_13-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937874" comment="libavfilter7_110-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937875" comment="libavfilter7_110-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937876" comment="libavformat58_76-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937877" comment="libavformat58_76-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937878" comment="libavresample4_0-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937879" comment="libavresample4_0-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937880" comment="libavutil56_70-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937881" comment="libavutil56_70-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937882" comment="libpostproc55_9-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937883" comment="libpostproc55_9-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937884" comment="libswresample3_9-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937885" comment="libswresample3_9-32bit-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937886" comment="libswscale5_9-4.4.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937887" comment="libswscale5_9-32bit-4.4.4-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252235" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.78.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29857" ref_url="https://www.suse.com/security/cve/CVE-2024-29857/" source="CVE"/>
		<reference ref_id="CVE-2024-30171" ref_url="https://www.suse.com/security/cve/CVE-2024-30171/" source="CVE"/>
		<reference ref_id="CVE-2024-30172" ref_url="https://www.suse.com/security/cve/CVE-2024-30172/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.78.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-29857/">CVE-2024-29857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857">CVE-2024-29857 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30171/">CVE-2024-30171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171">CVE-2024-30171 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-30172/">CVE-2024-30172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172">CVE-2024-30172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937888" comment="bouncycastle-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937889" comment="bouncycastle-javadoc-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937890" comment="bouncycastle-jmail-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937891" comment="bouncycastle-mail-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937892" comment="bouncycastle-pg-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937893" comment="bouncycastle-pkix-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937894" comment="bouncycastle-tls-1.78.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937895" comment="bouncycastle-util-1.78.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252236" version="1" class="patch">
	<metadata>
		<title>hcode-2.1-680.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34020" ref_url="https://www.suse.com/security/cve/CVE-2024-34020/" source="CVE"/>
		<description>
These are all security issues fixed in the hcode-2.1-680.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34020/">CVE-2024-34020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34020">CVE-2024-34020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937896" comment="hcode-2.1-680.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252237" version="1" class="patch">
	<metadata>
		<title>python310-pip-24.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pip-24.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937897" comment="python310-pip-24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937898" comment="python310-pip-wheel-24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937899" comment="python311-pip-24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937900" comment="python311-pip-wheel-24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937901" comment="python312-pip-24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937902" comment="python312-pip-wheel-24.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252238" version="1" class="patch">
	<metadata>
		<title>tlrc-1.9.2+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the tlrc-1.9.2+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937903" comment="tlrc-1.9.2+0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252239" version="1" class="patch">
	<metadata>
		<title>k9s-0.32.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<description>
These are all security issues fixed in the k9s-0.32.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937904" comment="k9s-0.32.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252240" version="1" class="patch">
	<metadata>
		<title>openjfx-17.0.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21002" ref_url="https://www.suse.com/security/cve/CVE-2024-21002/" source="CVE"/>
		<reference ref_id="CVE-2024-21003" ref_url="https://www.suse.com/security/cve/CVE-2024-21003/" source="CVE"/>
		<reference ref_id="CVE-2024-21004" ref_url="https://www.suse.com/security/cve/CVE-2024-21004/" source="CVE"/>
		<reference ref_id="CVE-2024-21005" ref_url="https://www.suse.com/security/cve/CVE-2024-21005/" source="CVE"/>
		<description>
These are all security issues fixed in the openjfx-17.0.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21002/">CVE-2024-21002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21002">CVE-2024-21002 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21003/">CVE-2024-21003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21003">CVE-2024-21003 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21004/">CVE-2024-21004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21004">CVE-2024-21004 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21005/">CVE-2024-21005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21005">CVE-2024-21005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937905" comment="openjfx-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937906" comment="openjfx-devel-17.0.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252241" version="1" class="patch">
	<metadata>
		<title>python310-distributed-2024.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42343" ref_url="https://www.suse.com/security/cve/CVE-2021-42343/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-distributed-2024.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42343/">CVE-2021-42343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42343">CVE-2021-42343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937907" comment="python310-distributed-2024.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937908" comment="python311-distributed-2024.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937909" comment="python312-distributed-2024.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252242" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<reference ref_id="CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937910" comment="krb5-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937911" comment="krb5-32bit-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937912" comment="krb5-client-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937913" comment="krb5-devel-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937914" comment="krb5-devel-32bit-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937915" comment="krb5-plugin-kdb-ldap-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937916" comment="krb5-plugin-preauth-otp-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937917" comment="krb5-plugin-preauth-pkinit-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937918" comment="krb5-plugin-preauth-spake-1.21.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937919" comment="krb5-server-1.21.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252243" version="1" class="patch">
	<metadata>
		<title>libluajit2-5_1-2-2.1.20240314-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19391" ref_url="https://www.suse.com/security/cve/CVE-2019-19391/" source="CVE"/>
		<description>
These are all security issues fixed in the libluajit2-5_1-2-2.1.20240314-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19391/">CVE-2019-19391 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19391">CVE-2019-19391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937920" comment="libluajit2-5_1-2-2.1.20240314-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937921" comment="luajit2-2.1.20240314-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937922" comment="luajit2-devel-2.1.20240314-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252244" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.5~0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.5~0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937923" comment="keylime-ima-policy-0.2.5~0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937924" comment="rust-keylime-0.2.5~0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252245" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-29.3.2~20240430g19f0abd6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4058" ref_url="https://www.suse.com/security/cve/CVE-2024-4058/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-29.3.2~20240430g19f0abd6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4058/">CVE-2024-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4058">CVE-2024-4058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937925" comment="nodejs-electron-29.3.2~20240430g19f0abd6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937926" comment="nodejs-electron-devel-29.3.2~20240430g19f0abd6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937927" comment="nodejs-electron-doc-29.3.2~20240430g19f0abd6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252246" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33861" ref_url="https://www.suse.com/security/cve/CVE-2024-33861/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33861/">CVE-2024-33861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33861">CVE-2024-33861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937928" comment="libQt6Concurrent6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937929" comment="libQt6Core6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937930" comment="libQt6DBus6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937931" comment="libQt6Gui6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937932" comment="libQt6Network6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937933" comment="libQt6OpenGL6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937934" comment="libQt6OpenGLWidgets6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937935" comment="libQt6PrintSupport6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937936" comment="libQt6Sql6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937937" comment="libQt6Test6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937938" comment="libQt6Widgets6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937939" comment="libQt6Xml6-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937940" comment="qt6-base-common-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937941" comment="qt6-base-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937942" comment="qt6-base-examples-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937943" comment="qt6-base-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937944" comment="qt6-concurrent-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937945" comment="qt6-core-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937946" comment="qt6-core-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937947" comment="qt6-dbus-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937948" comment="qt6-dbus-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937949" comment="qt6-docs-common-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937950" comment="qt6-exampleicons-devel-static-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937951" comment="qt6-gui-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937952" comment="qt6-gui-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937953" comment="qt6-kmssupport-devel-static-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937954" comment="qt6-kmssupport-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937955" comment="qt6-network-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937956" comment="qt6-network-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937957" comment="qt6-network-tls-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937958" comment="qt6-networkinformation-glib-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937959" comment="qt6-networkinformation-nm-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937960" comment="qt6-opengl-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937961" comment="qt6-opengl-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937962" comment="qt6-openglwidgets-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937963" comment="qt6-platformsupport-devel-static-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937964" comment="qt6-platformsupport-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937965" comment="qt6-platformtheme-gtk3-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937966" comment="qt6-platformtheme-xdgdesktopportal-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937967" comment="qt6-printsupport-cups-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937968" comment="qt6-printsupport-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937969" comment="qt6-printsupport-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937970" comment="qt6-sql-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937971" comment="qt6-sql-mysql-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937972" comment="qt6-sql-postgresql-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937973" comment="qt6-sql-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937974" comment="qt6-sql-sqlite-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937975" comment="qt6-sql-unixODBC-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937976" comment="qt6-test-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937977" comment="qt6-test-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937978" comment="qt6-widgets-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937979" comment="qt6-widgets-private-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937980" comment="qt6-xml-devel-6.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937981" comment="qt6-xml-private-devel-6.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252247" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-5.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038/" source="CVE"/>
		<reference ref_id="CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-5.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937982" comment="tpm2.0-tools-5.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252248" version="1" class="patch">
	<metadata>
		<title>traefik-2.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-28869" ref_url="https://www.suse.com/security/cve/CVE-2024-28869/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-2.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28869/">CVE-2024-28869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28869">CVE-2024-28869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937983" comment="traefik-2.11.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252249" version="1" class="patch">
	<metadata>
		<title>python310-python-jose-3.3.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33663" ref_url="https://www.suse.com/security/cve/CVE-2024-33663/" source="CVE"/>
		<reference ref_id="CVE-2024-33664" ref_url="https://www.suse.com/security/cve/CVE-2024-33664/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-jose-3.3.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33663/">CVE-2024-33663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33663">CVE-2024-33663 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33664/">CVE-2024-33664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33664">CVE-2024-33664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937984" comment="python310-python-jose-3.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937985" comment="python310-python-jose-cryptography-3.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937986" comment="python311-python-jose-3.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937987" comment="python311-python-jose-cryptography-3.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937988" comment="python312-python-jose-3.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937989" comment="python312-python-jose-cryptography-3.3.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252250" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26256" ref_url="https://www.suse.com/security/cve/CVE-2024-26256/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26256/">CVE-2024-26256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937990" comment="bsdtar-3.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937991" comment="libarchive-devel-3.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937992" comment="libarchive13-3.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937993" comment="libarchive13-32bit-3.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252251" version="1" class="patch">
	<metadata>
		<title>python310-Jinja2-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012/" source="CVE"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Jinja2-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0012">CVE-2014-0012 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937994" comment="python310-Jinja2-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937995" comment="python311-Jinja2-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937996" comment="python312-Jinja2-3.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252252" version="1" class="patch">
	<metadata>
		<title>python310-pymongo-4.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2132" ref_url="https://www.suse.com/security/cve/CVE-2013-2132/" source="CVE"/>
		<reference ref_id="CVE-2024-21506" ref_url="https://www.suse.com/security/cve/CVE-2024-21506/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pymongo-4.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2132/">CVE-2013-2132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2132">CVE-2013-2132 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21506/">CVE-2024-21506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21506">CVE-2024-21506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009937997" comment="python310-pymongo-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937998" comment="python311-pymongo-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009937999" comment="python312-pymongo-4.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252253" version="1" class="patch">
	<metadata>
		<title>ssh-audit-3.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2002-20001" ref_url="https://www.suse.com/security/cve/CVE-2002-20001/" source="CVE"/>
		<description>
These are all security issues fixed in the ssh-audit-3.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2002-20001/">CVE-2002-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2002-20001">CVE-2002-20001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938000" comment="ssh-audit-3.2.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252254" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-32bit-4.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-32bit-4.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938001" comment="libtss2-esys0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938002" comment="libtss2-esys0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938003" comment="libtss2-fapi-common-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938004" comment="libtss2-fapi1-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938005" comment="libtss2-fapi1-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938006" comment="libtss2-mu0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938007" comment="libtss2-mu0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938008" comment="libtss2-policy0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938009" comment="libtss2-policy0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938010" comment="libtss2-rc0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938011" comment="libtss2-rc0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938012" comment="libtss2-sys1-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938013" comment="libtss2-sys1-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938014" comment="libtss2-tcti-cmd0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938015" comment="libtss2-tcti-cmd0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938016" comment="libtss2-tcti-device0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938017" comment="libtss2-tcti-device0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938018" comment="libtss2-tcti-i2c-helper0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938019" comment="libtss2-tcti-mssim0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938020" comment="libtss2-tcti-mssim0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938021" comment="libtss2-tcti-pcap0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938022" comment="libtss2-tcti-spi-helper0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938023" comment="libtss2-tcti-spi-helper0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938024" comment="libtss2-tcti-spidev0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938025" comment="libtss2-tcti-swtpm0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938026" comment="libtss2-tcti-swtpm0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938027" comment="libtss2-tctildr0-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938028" comment="libtss2-tctildr0-32bit-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938029" comment="tpm2-0-tss-4.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938030" comment="tpm2-0-tss-devel-4.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252255" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50009" ref_url="https://www.suse.com/security/cve/CVE-2023-50009/" source="CVE"/>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50009/">CVE-2023-50009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50009">CVE-2023-50009 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938031" comment="ffmpeg-5-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938032" comment="ffmpeg-5-libavcodec-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938033" comment="ffmpeg-5-libavdevice-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938034" comment="ffmpeg-5-libavfilter-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938035" comment="ffmpeg-5-libavformat-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938036" comment="ffmpeg-5-libavutil-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938037" comment="ffmpeg-5-libpostproc-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938038" comment="ffmpeg-5-libswresample-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938039" comment="ffmpeg-5-libswscale-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938040" comment="ffmpeg-5-private-devel-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938041" comment="libavcodec59-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938042" comment="libavcodec59-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938043" comment="libavdevice59-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938044" comment="libavdevice59-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938045" comment="libavfilter8-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938046" comment="libavfilter8-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938047" comment="libavformat59-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938048" comment="libavformat59-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938049" comment="libavutil57-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938050" comment="libavutil57-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938051" comment="libpostproc56-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938052" comment="libpostproc56-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938053" comment="libswresample4_ff5-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938054" comment="libswresample4_ff5-32bit-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938055" comment="libswscale6-5.1.4-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938056" comment="libswscale6-32bit-5.1.4-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252256" version="1" class="patch">
	<metadata>
		<title>glibc-2.39-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.39-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938057" comment="glibc-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938058" comment="glibc-devel-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938059" comment="glibc-devel-static-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938060" comment="glibc-extra-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938061" comment="glibc-html-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938062" comment="glibc-i18ndata-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938063" comment="glibc-info-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938064" comment="glibc-lang-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938065" comment="glibc-locale-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938066" comment="glibc-locale-base-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938067" comment="glibc-profile-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938068" comment="libnsl1-2.39-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938069" comment="nscd-2.39-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252257" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938070" comment="go1.22-1.22.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938071" comment="go1.22-doc-1.22.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938072" comment="go1.22-libstd-1.22.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938073" comment="go1.22-race-1.22.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252258" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1w-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1w-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938074" comment="libopenssl-1_1-devel-1.1.1w-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938075" comment="libopenssl-1_1-devel-32bit-1.1.1w-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938076" comment="libopenssl1_1-1.1.1w-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938077" comment="libopenssl1_1-32bit-1.1.1w-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938078" comment="openssl-1_1-1.1.1w-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938079" comment="openssl-1_1-doc-1.1.1w-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252259" version="1" class="patch">
	<metadata>
		<title>python310-sqlparse-0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32839" ref_url="https://www.suse.com/security/cve/CVE-2021-32839/" source="CVE"/>
		<reference ref_id="CVE-2024-2430" ref_url="https://www.suse.com/security/cve/CVE-2024-2430/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-sqlparse-0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32839/">CVE-2021-32839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32839">CVE-2021-32839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2430/">CVE-2024-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2430">CVE-2024-2430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938080" comment="python310-sqlparse-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938081" comment="python311-sqlparse-0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938082" comment="python312-sqlparse-0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252260" version="1" class="patch">
	<metadata>
		<title>python-tqdm-bash-completion-4.66.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34062" ref_url="https://www.suse.com/security/cve/CVE-2024-34062/" source="CVE"/>
		<description>
These are all security issues fixed in the python-tqdm-bash-completion-4.66.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-34062/">CVE-2024-34062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34062">CVE-2024-34062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938083" comment="python-tqdm-bash-completion-4.66.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938084" comment="python310-tqdm-4.66.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938085" comment="python311-tqdm-4.66.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938086" comment="python312-tqdm-4.66.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252261" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938087" comment="ffmpeg-4-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938088" comment="ffmpeg-4-libavcodec-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938089" comment="ffmpeg-4-libavdevice-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938090" comment="ffmpeg-4-libavfilter-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938091" comment="ffmpeg-4-libavformat-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938092" comment="ffmpeg-4-libavresample-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938093" comment="ffmpeg-4-libavutil-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938094" comment="ffmpeg-4-libpostproc-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938095" comment="ffmpeg-4-libswresample-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938096" comment="ffmpeg-4-libswscale-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938097" comment="ffmpeg-4-private-devel-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938098" comment="libavcodec58_134-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938099" comment="libavcodec58_134-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938100" comment="libavdevice58_13-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938101" comment="libavdevice58_13-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938102" comment="libavfilter7_110-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938103" comment="libavfilter7_110-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938104" comment="libavformat58_76-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938105" comment="libavformat58_76-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938106" comment="libavresample4_0-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938107" comment="libavresample4_0-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938108" comment="libavutil56_70-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938109" comment="libavutil56_70-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938110" comment="libpostproc55_9-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938111" comment="libpostproc55_9-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938112" comment="libswresample3_9-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938113" comment="libswresample3_9-32bit-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938114" comment="libswscale5_9-4.4.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938115" comment="libswscale5_9-32bit-4.4.4-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252262" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938116" comment="go1.21-1.21.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938117" comment="go1.21-doc-1.21.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938118" comment="go1.21-libstd-1.21.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938119" comment="go1.21-race-1.21.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252263" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938120" comment="libopenssl-3-devel-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938121" comment="libopenssl-3-devel-32bit-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938122" comment="libopenssl-3-fips-provider-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938123" comment="libopenssl-3-fips-provider-32bit-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938124" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938125" comment="libopenssl3-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938126" comment="libopenssl3-32bit-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938127" comment="libopenssl3-x86-64-v3-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938128" comment="openssl-3-3.1.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938129" comment="openssl-3-doc-3.1.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252264" version="1" class="patch">
	<metadata>
		<title>tinyproxy-1.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49606" ref_url="https://www.suse.com/security/cve/CVE-2023-49606/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyproxy-1.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49606/">CVE-2023-49606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49606">CVE-2023-49606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938130" comment="tinyproxy-1.11.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252265" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33655" ref_url="https://www.suse.com/security/cve/CVE-2024-33655/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33655/">CVE-2024-33655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33655">CVE-2024-33655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938131" comment="libunbound8-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938132" comment="python3-unbound-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938133" comment="unbound-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938134" comment="unbound-anchor-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938135" comment="unbound-devel-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938136" comment="unbound-munin-1.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252266" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-29.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3914" ref_url="https://www.suse.com/security/cve/CVE-2024-3914/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-29.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3914/">CVE-2024-3914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3914">CVE-2024-3914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938137" comment="nodejs-electron-29.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938138" comment="nodejs-electron-devel-29.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938139" comment="nodejs-electron-doc-29.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252267" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938140" comment="postgresql14-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938141" comment="postgresql14-contrib-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938142" comment="postgresql14-devel-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938143" comment="postgresql14-docs-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938144" comment="postgresql14-llvmjit-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938145" comment="postgresql14-llvmjit-devel-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938146" comment="postgresql14-plperl-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938147" comment="postgresql14-plpython-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938148" comment="postgresql14-pltcl-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938149" comment="postgresql14-server-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938150" comment="postgresql14-server-devel-14.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938151" comment="postgresql14-test-14.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252268" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938152" comment="postgresql15-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938153" comment="postgresql15-contrib-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938154" comment="postgresql15-devel-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938155" comment="postgresql15-docs-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938156" comment="postgresql15-llvmjit-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938157" comment="postgresql15-llvmjit-devel-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938158" comment="postgresql15-plperl-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938159" comment="postgresql15-plpython-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938160" comment="postgresql15-pltcl-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938161" comment="postgresql15-server-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938162" comment="postgresql15-server-devel-15.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938163" comment="postgresql15-test-15.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252269" version="1" class="patch">
	<metadata>
		<title>libvirt-10.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4418" ref_url="https://www.suse.com/security/cve/CVE-2024-4418/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-10.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4418/">CVE-2024-4418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4418">CVE-2024-4418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938164" comment="libvirt-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938165" comment="libvirt-client-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938166" comment="libvirt-client-qemu-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938167" comment="libvirt-daemon-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938168" comment="libvirt-daemon-common-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938169" comment="libvirt-daemon-config-network-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938170" comment="libvirt-daemon-config-nwfilter-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938171" comment="libvirt-daemon-driver-interface-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938172" comment="libvirt-daemon-driver-libxl-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938173" comment="libvirt-daemon-driver-lxc-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938174" comment="libvirt-daemon-driver-network-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938175" comment="libvirt-daemon-driver-nodedev-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938176" comment="libvirt-daemon-driver-nwfilter-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938177" comment="libvirt-daemon-driver-qemu-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938178" comment="libvirt-daemon-driver-secret-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938179" comment="libvirt-daemon-driver-storage-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938180" comment="libvirt-daemon-driver-storage-core-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938181" comment="libvirt-daemon-driver-storage-disk-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938182" comment="libvirt-daemon-driver-storage-gluster-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938183" comment="libvirt-daemon-driver-storage-iscsi-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938184" comment="libvirt-daemon-driver-storage-iscsi-direct-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938185" comment="libvirt-daemon-driver-storage-logical-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938186" comment="libvirt-daemon-driver-storage-mpath-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938187" comment="libvirt-daemon-driver-storage-rbd-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938188" comment="libvirt-daemon-driver-storage-scsi-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938189" comment="libvirt-daemon-hooks-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938190" comment="libvirt-daemon-lock-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938191" comment="libvirt-daemon-log-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938192" comment="libvirt-daemon-lxc-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938193" comment="libvirt-daemon-plugin-lockd-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938194" comment="libvirt-daemon-plugin-sanlock-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938195" comment="libvirt-daemon-proxy-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938196" comment="libvirt-daemon-qemu-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938197" comment="libvirt-daemon-xen-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938198" comment="libvirt-devel-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938199" comment="libvirt-doc-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938200" comment="libvirt-libs-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938201" comment="libvirt-nss-10.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938202" comment="wireshark-plugin-libvirt-10.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252270" version="1" class="patch">
	<metadata>
		<title>ovmf-202308-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36763" ref_url="https://www.suse.com/security/cve/CVE-2022-36763/" source="CVE"/>
		<reference ref_id="CVE-2022-36764" ref_url="https://www.suse.com/security/cve/CVE-2022-36764/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202308-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36763/">CVE-2022-36763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36763">CVE-2022-36763 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36764/">CVE-2022-36764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36764">CVE-2022-36764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938203" comment="ovmf-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938204" comment="ovmf-tools-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938205" comment="qemu-ovmf-ia32-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938206" comment="qemu-ovmf-x86_64-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938207" comment="qemu-ovmf-x86_64-debug-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938208" comment="qemu-uefi-aarch32-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938209" comment="qemu-uefi-aarch64-202308-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938210" comment="qemu-uefi-riscv64-202308-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252271" version="1" class="patch">
	<metadata>
		<title>libecpg6-16.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-16.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938211" comment="libecpg6-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938212" comment="libecpg6-32bit-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938213" comment="libpq5-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938214" comment="libpq5-32bit-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938215" comment="postgresql16-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938216" comment="postgresql16-contrib-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938217" comment="postgresql16-devel-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938218" comment="postgresql16-docs-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938219" comment="postgresql16-llvmjit-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938220" comment="postgresql16-llvmjit-devel-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938221" comment="postgresql16-plperl-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938222" comment="postgresql16-plpython-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938223" comment="postgresql16-pltcl-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938224" comment="postgresql16-server-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938225" comment="postgresql16-server-devel-16.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938226" comment="postgresql16-test-16.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252272" version="1" class="patch">
	<metadata>
		<title>apptainer-1.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938227" comment="apptainer-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938228" comment="apptainer-leap-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938229" comment="apptainer-sle15_5-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938230" comment="apptainer-sle15_6-1.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252273" version="1" class="patch">
	<metadata>
		<title>buildah-1.35.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.35.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938231" comment="buildah-1.35.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252274" version="1" class="patch">
	<metadata>
		<title>chromedriver-124.0.6367.201-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2625" ref_url="https://www.suse.com/security/cve/CVE-2024-2625/" source="CVE"/>
		<reference ref_id="CVE-2024-2626" ref_url="https://www.suse.com/security/cve/CVE-2024-2626/" source="CVE"/>
		<reference ref_id="CVE-2024-2627" ref_url="https://www.suse.com/security/cve/CVE-2024-2627/" source="CVE"/>
		<reference ref_id="CVE-2024-2628" ref_url="https://www.suse.com/security/cve/CVE-2024-2628/" source="CVE"/>
		<reference ref_id="CVE-2024-2883" ref_url="https://www.suse.com/security/cve/CVE-2024-2883/" source="CVE"/>
		<reference ref_id="CVE-2024-2885" ref_url="https://www.suse.com/security/cve/CVE-2024-2885/" source="CVE"/>
		<reference ref_id="CVE-2024-2886" ref_url="https://www.suse.com/security/cve/CVE-2024-2886/" source="CVE"/>
		<reference ref_id="CVE-2024-2887" ref_url="https://www.suse.com/security/cve/CVE-2024-2887/" source="CVE"/>
		<reference ref_id="CVE-2024-3156" ref_url="https://www.suse.com/security/cve/CVE-2024-3156/" source="CVE"/>
		<reference ref_id="CVE-2024-3157" ref_url="https://www.suse.com/security/cve/CVE-2024-3157/" source="CVE"/>
		<reference ref_id="CVE-2024-3158" ref_url="https://www.suse.com/security/cve/CVE-2024-3158/" source="CVE"/>
		<reference ref_id="CVE-2024-3159" ref_url="https://www.suse.com/security/cve/CVE-2024-3159/" source="CVE"/>
		<reference ref_id="CVE-2024-3515" ref_url="https://www.suse.com/security/cve/CVE-2024-3515/" source="CVE"/>
		<reference ref_id="CVE-2024-3516" ref_url="https://www.suse.com/security/cve/CVE-2024-3516/" source="CVE"/>
		<reference ref_id="CVE-2024-3832" ref_url="https://www.suse.com/security/cve/CVE-2024-3832/" source="CVE"/>
		<reference ref_id="CVE-2024-3833" ref_url="https://www.suse.com/security/cve/CVE-2024-3833/" source="CVE"/>
		<reference ref_id="CVE-2024-3834" ref_url="https://www.suse.com/security/cve/CVE-2024-3834/" source="CVE"/>
		<reference ref_id="CVE-2024-3837" ref_url="https://www.suse.com/security/cve/CVE-2024-3837/" source="CVE"/>
		<reference ref_id="CVE-2024-3838" ref_url="https://www.suse.com/security/cve/CVE-2024-3838/" source="CVE"/>
		<reference ref_id="CVE-2024-3839" ref_url="https://www.suse.com/security/cve/CVE-2024-3839/" source="CVE"/>
		<reference ref_id="CVE-2024-3840" ref_url="https://www.suse.com/security/cve/CVE-2024-3840/" source="CVE"/>
		<reference ref_id="CVE-2024-3841" ref_url="https://www.suse.com/security/cve/CVE-2024-3841/" source="CVE"/>
		<reference ref_id="CVE-2024-3843" ref_url="https://www.suse.com/security/cve/CVE-2024-3843/" source="CVE"/>
		<reference ref_id="CVE-2024-3844" ref_url="https://www.suse.com/security/cve/CVE-2024-3844/" source="CVE"/>
		<reference ref_id="CVE-2024-3845" ref_url="https://www.suse.com/security/cve/CVE-2024-3845/" source="CVE"/>
		<reference ref_id="CVE-2024-3846" ref_url="https://www.suse.com/security/cve/CVE-2024-3846/" source="CVE"/>
		<reference ref_id="CVE-2024-3847" ref_url="https://www.suse.com/security/cve/CVE-2024-3847/" source="CVE"/>
		<reference ref_id="CVE-2024-4058" ref_url="https://www.suse.com/security/cve/CVE-2024-4058/" source="CVE"/>
		<reference ref_id="CVE-2024-4059" ref_url="https://www.suse.com/security/cve/CVE-2024-4059/" source="CVE"/>
		<reference ref_id="CVE-2024-4060" ref_url="https://www.suse.com/security/cve/CVE-2024-4060/" source="CVE"/>
		<reference ref_id="CVE-2024-4331" ref_url="https://www.suse.com/security/cve/CVE-2024-4331/" source="CVE"/>
		<reference ref_id="CVE-2024-4368" ref_url="https://www.suse.com/security/cve/CVE-2024-4368/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="CVE-2024-4559" ref_url="https://www.suse.com/security/cve/CVE-2024-4559/" source="CVE"/>
		<reference ref_id="CVE-2024-4671" ref_url="https://www.suse.com/security/cve/CVE-2024-4671/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-124.0.6367.201-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2625/">CVE-2024-2625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2625">CVE-2024-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2626/">CVE-2024-2626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2626">CVE-2024-2626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2627/">CVE-2024-2627 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2627">CVE-2024-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2628/">CVE-2024-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2628">CVE-2024-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2883/">CVE-2024-2883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2883">CVE-2024-2883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2885/">CVE-2024-2885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2885">CVE-2024-2885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2886/">CVE-2024-2886 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2886">CVE-2024-2886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2887/">CVE-2024-2887 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2887">CVE-2024-2887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3156/">CVE-2024-3156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3156">CVE-2024-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3157/">CVE-2024-3157 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3157">CVE-2024-3157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3158/">CVE-2024-3158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3158">CVE-2024-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3159/">CVE-2024-3159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3159">CVE-2024-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3515/">CVE-2024-3515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3515">CVE-2024-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3516/">CVE-2024-3516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3516">CVE-2024-3516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3832/">CVE-2024-3832 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3832">CVE-2024-3832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3833/">CVE-2024-3833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3833">CVE-2024-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3834/">CVE-2024-3834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3834">CVE-2024-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3837/">CVE-2024-3837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3837">CVE-2024-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3838/">CVE-2024-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3838">CVE-2024-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3839/">CVE-2024-3839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3839">CVE-2024-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3840/">CVE-2024-3840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3840">CVE-2024-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3841/">CVE-2024-3841 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3841">CVE-2024-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3843/">CVE-2024-3843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3843">CVE-2024-3843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3844/">CVE-2024-3844 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3844">CVE-2024-3844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3845/">CVE-2024-3845 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3845">CVE-2024-3845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3846/">CVE-2024-3846 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3846">CVE-2024-3846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3847/">CVE-2024-3847 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3847">CVE-2024-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4058/">CVE-2024-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4058">CVE-2024-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4059/">CVE-2024-4059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4059">CVE-2024-4059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4060/">CVE-2024-4060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4060">CVE-2024-4060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4331/">CVE-2024-4331 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4331">CVE-2024-4331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4368/">CVE-2024-4368 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4368">CVE-2024-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4559/">CVE-2024-4559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4559">CVE-2024-4559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4671/">CVE-2024-4671 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4671">CVE-2024-4671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938232" comment="chromedriver-124.0.6367.201-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938233" comment="chromium-124.0.6367.201-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252275" version="1" class="patch">
	<metadata>
		<title>gnu-recutils-1.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-46019" ref_url="https://www.suse.com/security/cve/CVE-2021-46019/" source="CVE"/>
		<description>
These are all security issues fixed in the gnu-recutils-1.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46019/">CVE-2021-46019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46019">CVE-2021-46019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938234" comment="gnu-recutils-1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938235" comment="gnu-recutils-devel-1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938236" comment="gnu-recutils-lang-1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938237" comment="librec1-1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938238" comment="readrec0-1.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938239" comment="testrec0-1.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252276" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-46.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938240" comment="python-2.7.18-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938241" comment="python-curses-2.7.18-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938242" comment="python-demo-2.7.18-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938243" comment="python-gdbm-2.7.18-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938244" comment="python-idle-2.7.18-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938245" comment="python-tk-2.7.18-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252277" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-grpc-1.63.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-grpc-1.63.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938246" comment="ruby3.3-rubygem-grpc-1.63.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252278" version="1" class="patch">
	<metadata>
		<title>liburiparser1-0.9.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34402" ref_url="https://www.suse.com/security/cve/CVE-2024-34402/" source="CVE"/>
		<reference ref_id="CVE-2024-34403" ref_url="https://www.suse.com/security/cve/CVE-2024-34403/" source="CVE"/>
		<description>
These are all security issues fixed in the liburiparser1-0.9.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34402/">CVE-2024-34402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34402">CVE-2024-34402 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34403/">CVE-2024-34403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34403">CVE-2024-34403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938247" comment="liburiparser1-0.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938248" comment="uriparser-0.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938249" comment="uriparser-devel-0.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938250" comment="uriparser-doc-0.9.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252279" version="1" class="patch">
	<metadata>
		<title>dnsdist-1.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25581" ref_url="https://www.suse.com/security/cve/CVE-2024-25581/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-1.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25581/">CVE-2024-25581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25581">CVE-2024-25581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938251" comment="dnsdist-1.9.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252280" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.8.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26865" ref_url="https://www.suse.com/security/cve/CVE-2024-26865/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.8.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26865/">CVE-2024-26865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26865">CVE-2024-26865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938253" comment="kernel-macros-6.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938254" comment="kernel-source-6.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938255" comment="kernel-source-vanilla-6.8.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252281" version="1" class="patch">
	<metadata>
		<title>podman-5.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938256" comment="podman-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938257" comment="podman-docker-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938258" comment="podman-remote-5.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938259" comment="podmansh-5.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252282" version="1" class="patch">
	<metadata>
		<title>sccache-0.8.0~3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.8.0~3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938260" comment="sccache-0.8.0~3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252283" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25641" ref_url="https://www.suse.com/security/cve/CVE-2024-25641/" source="CVE"/>
		<reference ref_id="CVE-2024-27082" ref_url="https://www.suse.com/security/cve/CVE-2024-27082/" source="CVE"/>
		<reference ref_id="CVE-2024-29894" ref_url="https://www.suse.com/security/cve/CVE-2024-29894/" source="CVE"/>
		<reference ref_id="CVE-2024-31443" ref_url="https://www.suse.com/security/cve/CVE-2024-31443/" source="CVE"/>
		<reference ref_id="CVE-2024-31444" ref_url="https://www.suse.com/security/cve/CVE-2024-31444/" source="CVE"/>
		<reference ref_id="CVE-2024-31445" ref_url="https://www.suse.com/security/cve/CVE-2024-31445/" source="CVE"/>
		<reference ref_id="CVE-2024-31458" ref_url="https://www.suse.com/security/cve/CVE-2024-31458/" source="CVE"/>
		<reference ref_id="CVE-2024-31459" ref_url="https://www.suse.com/security/cve/CVE-2024-31459/" source="CVE"/>
		<reference ref_id="CVE-2024-31460" ref_url="https://www.suse.com/security/cve/CVE-2024-31460/" source="CVE"/>
		<reference ref_id="CVE-2024-34340" ref_url="https://www.suse.com/security/cve/CVE-2024-34340/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25641/">CVE-2024-25641 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25641">CVE-2024-25641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27082/">CVE-2024-27082 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27082">CVE-2024-27082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29894/">CVE-2024-29894 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29894">CVE-2024-29894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31443/">CVE-2024-31443 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31443">CVE-2024-31443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31444/">CVE-2024-31444 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31444">CVE-2024-31444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31445/">CVE-2024-31445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31445">CVE-2024-31445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31458/">CVE-2024-31458 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31458">CVE-2024-31458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31459/">CVE-2024-31459 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31459">CVE-2024-31459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31460/">CVE-2024-31460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31460">CVE-2024-31460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34340/">CVE-2024-34340 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34340">CVE-2024-34340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938261" comment="cacti-1.2.27-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252284" version="1" class="patch">
	<metadata>
		<title>containerized-data-importer-api-1.59.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the containerized-data-importer-api-1.59.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938262" comment="containerized-data-importer-api-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938263" comment="containerized-data-importer-cloner-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938264" comment="containerized-data-importer-controller-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938265" comment="containerized-data-importer-importer-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938266" comment="containerized-data-importer-manifests-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938267" comment="containerized-data-importer-operator-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938268" comment="containerized-data-importer-uploadproxy-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938269" comment="containerized-data-importer-uploadserver-1.59.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938270" comment="obs-service-cdi_containers_meta-1.59.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252285" version="1" class="patch">
	<metadata>
		<title>iperf-3.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938271" comment="iperf-3.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938272" comment="iperf-devel-3.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938273" comment="libiperf0-3.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252286" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.9.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27306" ref_url="https://www.suse.com/security/cve/CVE-2024-27306/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.9.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27306/">CVE-2024-27306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27306">CVE-2024-27306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938274" comment="python310-aiohttp-3.9.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938275" comment="python311-aiohttp-3.9.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938276" comment="python312-aiohttp-3.9.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252287" version="1" class="patch">
	<metadata>
		<title>cargo1.77-1.77.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24576" ref_url="https://www.suse.com/security/cve/CVE-2024-24576/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.77-1.77.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24576/">CVE-2024-24576 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24576">CVE-2024-24576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938277" comment="cargo1.77-1.77.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938278" comment="rust1.77-1.77.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252288" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938279" comment="gdk-pixbuf-devel-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938280" comment="gdk-pixbuf-devel-32bit-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938281" comment="gdk-pixbuf-lang-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938282" comment="gdk-pixbuf-query-loaders-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938283" comment="gdk-pixbuf-query-loaders-32bit-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938284" comment="gdk-pixbuf-thumbnailer-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938285" comment="libgdk_pixbuf-2_0-0-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938286" comment="libgdk_pixbuf-2_0-0-32bit-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938287" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938288" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252289" version="1" class="patch">
	<metadata>
		<title>git-2.45.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002/" source="CVE"/>
		<reference ref_id="CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004/" source="CVE"/>
		<reference ref_id="CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020/" source="CVE"/>
		<reference ref_id="CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021/" source="CVE"/>
		<reference ref_id="CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.45.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938289" comment="git-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938290" comment="git-arch-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938291" comment="git-core-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938292" comment="git-credential-libsecret-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938293" comment="git-cvs-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938294" comment="git-daemon-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938295" comment="git-doc-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938296" comment="git-email-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938297" comment="git-gui-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938298" comment="git-p4-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938299" comment="git-svn-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938300" comment="git-web-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938301" comment="gitk-2.45.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938302" comment="perl-Git-2.45.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252290" version="1" class="patch">
	<metadata>
		<title>git-cliff-2.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the git-cliff-2.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938303" comment="git-cliff-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938304" comment="git-cliff-bash-completion-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938305" comment="git-cliff-fish-completion-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938306" comment="git-cliff-zsh-completion-2.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252291" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.80.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.80.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938307" comment="gio-branding-upstream-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938308" comment="glib2-devel-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938309" comment="glib2-devel-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938310" comment="glib2-devel-static-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938311" comment="glib2-lang-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938312" comment="glib2-tests-devel-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938313" comment="glib2-tools-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938314" comment="glib2-tools-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938315" comment="libgio-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938316" comment="libgio-2_0-0-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938317" comment="libgirepository-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938318" comment="libglib-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938319" comment="libglib-2_0-0-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938320" comment="libgmodule-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938321" comment="libgmodule-2_0-0-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938322" comment="libgobject-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938323" comment="libgobject-2_0-0-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938324" comment="libgthread-2_0-0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938325" comment="libgthread-2_0-0-32bit-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938326" comment="typelib-1_0-GIRepository-3_0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938327" comment="typelib-1_0-GLib-2_0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938328" comment="typelib-1_0-GLibUnix-2_0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938329" comment="typelib-1_0-GModule-2_0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938330" comment="typelib-1_0-GObject-2_0-2.80.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938331" comment="typelib-1_0-Gio-2_0-2.80.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252292" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.12.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.12.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938332" comment="libxml2-2-2.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938333" comment="libxml2-2-32bit-2.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938334" comment="libxml2-devel-2.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938335" comment="libxml2-devel-32bit-2.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938336" comment="libxml2-doc-2.12.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938337" comment="libxml2-tools-2.12.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252293" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-29.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-29.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938338" comment="nodejs-electron-29.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938339" comment="nodejs-electron-devel-29.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938340" comment="nodejs-electron-doc-29.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252294" version="1" class="patch">
	<metadata>
		<title>perl-Email-MIME-1.954.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4140" ref_url="https://www.suse.com/security/cve/CVE-2024-4140/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Email-MIME-1.954.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4140/">CVE-2024-4140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4140">CVE-2024-4140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938341" comment="perl-Email-MIME-1.954.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252295" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20240514-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20240514-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938342" comment="ucode-intel-20240514-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252296" version="1" class="patch">
	<metadata>
		<title>warewulf4-4.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the warewulf4-4.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938343" comment="warewulf4-4.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938344" comment="warewulf4-man-4.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938345" comment="warewulf4-overlay-4.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938346" comment="warewulf4-overlay-slurm-4.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252297" version="1" class="patch">
	<metadata>
		<title>chromedriver-124.0.6367.207-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4761" ref_url="https://www.suse.com/security/cve/CVE-2024-4761/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-124.0.6367.207-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4761/">CVE-2024-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4761">CVE-2024-4761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938347" comment="chromedriver-124.0.6367.207-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938348" comment="chromium-124.0.6367.207-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252298" version="1" class="patch">
	<metadata>
		<title>python310-pywbem-1.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pywbem-1.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938349" comment="python310-pywbem-1.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938350" comment="python311-pywbem-1.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938351" comment="python312-pywbem-1.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252299" version="1" class="patch">
	<metadata>
		<title>libwireshark17-4.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4853" ref_url="https://www.suse.com/security/cve/CVE-2024-4853/" source="CVE"/>
		<reference ref_id="CVE-2024-4854" ref_url="https://www.suse.com/security/cve/CVE-2024-4854/" source="CVE"/>
		<reference ref_id="CVE-2024-4855" ref_url="https://www.suse.com/security/cve/CVE-2024-4855/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark17-4.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4853/">CVE-2024-4853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4853">CVE-2024-4853 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4854/">CVE-2024-4854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4854">CVE-2024-4854 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-4855/">CVE-2024-4855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4855">CVE-2024-4855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938352" comment="libwireshark17-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938353" comment="libwiretap14-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938354" comment="libwsutil15-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938355" comment="wireshark-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938356" comment="wireshark-devel-4.2.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938357" comment="wireshark-ui-qt-4.2.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252300" version="1" class="patch">
	<metadata>
		<title>gitui-0.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the gitui-0.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938358" comment="gitui-0.26.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252301" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-126.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4764" ref_url="https://www.suse.com/security/cve/CVE-2024-4764/" source="CVE"/>
		<reference ref_id="CVE-2024-4765" ref_url="https://www.suse.com/security/cve/CVE-2024-4765/" source="CVE"/>
		<reference ref_id="CVE-2024-4766" ref_url="https://www.suse.com/security/cve/CVE-2024-4766/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4771" ref_url="https://www.suse.com/security/cve/CVE-2024-4771/" source="CVE"/>
		<reference ref_id="CVE-2024-4772" ref_url="https://www.suse.com/security/cve/CVE-2024-4772/" source="CVE"/>
		<reference ref_id="CVE-2024-4773" ref_url="https://www.suse.com/security/cve/CVE-2024-4773/" source="CVE"/>
		<reference ref_id="CVE-2024-4774" ref_url="https://www.suse.com/security/cve/CVE-2024-4774/" source="CVE"/>
		<reference ref_id="CVE-2024-4775" ref_url="https://www.suse.com/security/cve/CVE-2024-4775/" source="CVE"/>
		<reference ref_id="CVE-2024-4776" ref_url="https://www.suse.com/security/cve/CVE-2024-4776/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<reference ref_id="CVE-2024-4778" ref_url="https://www.suse.com/security/cve/CVE-2024-4778/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-126.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4764/">CVE-2024-4764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4764">CVE-2024-4764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4765/">CVE-2024-4765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4765">CVE-2024-4765 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4766/">CVE-2024-4766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4766">CVE-2024-4766 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4771/">CVE-2024-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4771">CVE-2024-4771 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4772/">CVE-2024-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4772">CVE-2024-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4773/">CVE-2024-4773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4773">CVE-2024-4773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4774/">CVE-2024-4774 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4774">CVE-2024-4774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4775/">CVE-2024-4775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4775">CVE-2024-4775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4776/">CVE-2024-4776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4776">CVE-2024-4776 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4778/">CVE-2024-4778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4778">CVE-2024-4778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938359" comment="MozillaFirefox-126.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938360" comment="MozillaFirefox-branding-upstream-126.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938361" comment="MozillaFirefox-devel-126.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938362" comment="MozillaFirefox-translations-common-126.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938363" comment="MozillaFirefox-translations-other-126.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252302" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938364" comment="MozillaThunderbird-115.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938365" comment="MozillaThunderbird-openpgp-librnp-115.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938366" comment="MozillaThunderbird-translations-common-115.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938367" comment="MozillaThunderbird-translations-other-115.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252303" version="1" class="patch">
	<metadata>
		<title>chromedriver-125.0.6422.60-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4947" ref_url="https://www.suse.com/security/cve/CVE-2024-4947/" source="CVE"/>
		<reference ref_id="CVE-2024-4948" ref_url="https://www.suse.com/security/cve/CVE-2024-4948/" source="CVE"/>
		<reference ref_id="CVE-2024-4949" ref_url="https://www.suse.com/security/cve/CVE-2024-4949/" source="CVE"/>
		<reference ref_id="CVE-2024-4950" ref_url="https://www.suse.com/security/cve/CVE-2024-4950/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-125.0.6422.60-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4947/">CVE-2024-4947 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4947">CVE-2024-4947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4948/">CVE-2024-4948 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4948">CVE-2024-4948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4949/">CVE-2024-4949 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4949">CVE-2024-4949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4950/">CVE-2024-4950 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4950">CVE-2024-4950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938368" comment="chromedriver-125.0.6422.60-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938369" comment="chromium-125.0.6422.60-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252304" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-47.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938370" comment="python-2.7.18-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938371" comment="python-curses-2.7.18-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938372" comment="python-demo-2.7.18-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938373" comment="python-gdbm-2.7.18-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938374" comment="python-idle-2.7.18-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938375" comment="python-tk-2.7.18-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252305" version="1" class="patch">
	<metadata>
		<title>python310-aiosmtpd-1.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34083" ref_url="https://www.suse.com/security/cve/CVE-2024-34083/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiosmtpd-1.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34083/">CVE-2024-34083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34083">CVE-2024-34083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938376" comment="python310-aiosmtpd-1.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938377" comment="python311-aiosmtpd-1.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938378" comment="python312-aiosmtpd-1.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252306" version="1" class="patch">
	<metadata>
		<title>xdg-desktop-portal-1.18.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-desktop-portal-1.18.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938379" comment="xdg-desktop-portal-1.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938380" comment="xdg-desktop-portal-devel-1.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938381" comment="xdg-desktop-portal-lang-1.18.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252307" version="1" class="patch">
	<metadata>
		<title>bpftrace-0.20.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2313" ref_url="https://www.suse.com/security/cve/CVE-2024-2313/" source="CVE"/>
		<description>
These are all security issues fixed in the bpftrace-0.20.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2313/">CVE-2024-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2313">CVE-2024-2313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938382" comment="bpftrace-0.20.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938383" comment="bpftrace-tools-0.20.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252308" version="1" class="patch">
	<metadata>
		<title>gitoxide-0.36.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35186" ref_url="https://www.suse.com/security/cve/CVE-2024-35186/" source="CVE"/>
		<description>
These are all security issues fixed in the gitoxide-0.36.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35186/">CVE-2024-35186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35186">CVE-2024-35186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938384" comment="gitoxide-0.36.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252309" version="1" class="patch">
	<metadata>
		<title>chromedriver-125.0.6422.76-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5157" ref_url="https://www.suse.com/security/cve/CVE-2024-5157/" source="CVE"/>
		<reference ref_id="CVE-2024-5158" ref_url="https://www.suse.com/security/cve/CVE-2024-5158/" source="CVE"/>
		<reference ref_id="CVE-2024-5159" ref_url="https://www.suse.com/security/cve/CVE-2024-5159/" source="CVE"/>
		<reference ref_id="CVE-2024-5160" ref_url="https://www.suse.com/security/cve/CVE-2024-5160/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-125.0.6422.76-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5157/">CVE-2024-5157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5157">CVE-2024-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5158/">CVE-2024-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5158">CVE-2024-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5159/">CVE-2024-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5159">CVE-2024-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5160/">CVE-2024-5160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5160">CVE-2024-5160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938385" comment="chromedriver-125.0.6422.76-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938386" comment="chromium-125.0.6422.76-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252310" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938387" comment="containerd-1.7.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938388" comment="containerd-ctr-1.7.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938389" comment="containerd-devel-1.7.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252311" version="1" class="patch">
	<metadata>
		<title>forgejo-7.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-7.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938390" comment="forgejo-7.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938391" comment="forgejo-apparmor-7.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938392" comment="forgejo-selinux-7.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252312" version="1" class="patch">
	<metadata>
		<title>glibc-2.39-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.39-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938393" comment="glibc-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938394" comment="glibc-devel-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938395" comment="glibc-devel-static-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938396" comment="glibc-extra-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938397" comment="glibc-html-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938398" comment="glibc-i18ndata-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938399" comment="glibc-info-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938400" comment="glibc-lang-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938401" comment="glibc-locale-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938402" comment="glibc-locale-base-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938403" comment="glibc-profile-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938404" comment="libnsl1-2.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938405" comment="nscd-2.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252313" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938406" comment="libopenssl-3-devel-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938407" comment="libopenssl-3-devel-32bit-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938408" comment="libopenssl-3-fips-provider-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938409" comment="libopenssl-3-fips-provider-32bit-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938410" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938411" comment="libopenssl3-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938412" comment="libopenssl3-32bit-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938413" comment="libopenssl3-x86-64-v3-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938414" comment="openssl-3-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938415" comment="openssl-3-doc-3.1.4-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252314" version="1" class="patch">
	<metadata>
		<title>python310-PyMySQL-1.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-PyMySQL-1.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938416" comment="python310-PyMySQL-1.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938417" comment="python311-PyMySQL-1.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938418" comment="python312-PyMySQL-1.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252315" version="1" class="patch">
	<metadata>
		<title>freerdp2-devel-2.11.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658/" source="CVE"/>
		<reference ref_id="CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659/" source="CVE"/>
		<reference ref_id="CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660/" source="CVE"/>
		<reference ref_id="CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-devel-2.11.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938419" comment="freerdp2-devel-2.11.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938420" comment="freerdp2-proxy-2.11.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938421" comment="freerdp2-server-2.11.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938422" comment="libfreerdp2-2-2.11.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938423" comment="libwinpr2-2-2.11.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938424" comment="winpr2-devel-2.11.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252316" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.23.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.23.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938425" comment="java-11-openj9-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938426" comment="java-11-openj9-demo-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938427" comment="java-11-openj9-devel-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938428" comment="java-11-openj9-headless-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938429" comment="java-11-openj9-javadoc-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938430" comment="java-11-openj9-jmods-11.0.23.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938431" comment="java-11-openj9-src-11.0.23.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252317" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938432" comment="java-17-openj9-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938433" comment="java-17-openj9-demo-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938434" comment="java-17-openj9-devel-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938435" comment="java-17-openj9-headless-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938436" comment="java-17-openj9-javadoc-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938437" comment="java-17-openj9-jmods-17.0.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938438" comment="java-17-openj9-src-17.0.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252318" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.412-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.412-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938439" comment="java-1_8_0-openj9-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938440" comment="java-1_8_0-openj9-accessibility-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938441" comment="java-1_8_0-openj9-demo-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938442" comment="java-1_8_0-openj9-devel-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938443" comment="java-1_8_0-openj9-headless-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938444" comment="java-1_8_0-openj9-javadoc-1.8.0.412-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938445" comment="java-1_8_0-openj9-src-1.8.0.412-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252319" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938446" comment="java-21-openj9-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938447" comment="java-21-openj9-demo-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938448" comment="java-21-openj9-devel-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938449" comment="java-21-openj9-headless-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938450" comment="java-21-openj9-javadoc-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938451" comment="java-21-openj9-jmods-21.0.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938452" comment="java-21-openj9-src-21.0.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252320" version="1" class="patch">
	<metadata>
		<title>python310-requests-2.32.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-requests-2.32.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938453" comment="python310-requests-2.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938454" comment="python311-requests-2.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938455" comment="python312-requests-2.32.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252321" version="1" class="patch">
	<metadata>
		<title>traefik-3.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938456" comment="traefik-3.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252322" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5997" ref_url="https://www.suse.com/security/cve/CVE-2023-5997/" source="CVE"/>
		<reference ref_id="CVE-2023-6112" ref_url="https://www.suse.com/security/cve/CVE-2023-6112/" source="CVE"/>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6510" ref_url="https://www.suse.com/security/cve/CVE-2023-6510/" source="CVE"/>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<reference ref_id="CVE-2024-0224" ref_url="https://www.suse.com/security/cve/CVE-2024-0224/" source="CVE"/>
		<reference ref_id="CVE-2024-0333" ref_url="https://www.suse.com/security/cve/CVE-2024-0333/" source="CVE"/>
		<reference ref_id="CVE-2024-0518" ref_url="https://www.suse.com/security/cve/CVE-2024-0518/" source="CVE"/>
		<reference ref_id="CVE-2024-0519" ref_url="https://www.suse.com/security/cve/CVE-2024-0519/" source="CVE"/>
		<reference ref_id="CVE-2024-0807" ref_url="https://www.suse.com/security/cve/CVE-2024-0807/" source="CVE"/>
		<reference ref_id="CVE-2024-0808" ref_url="https://www.suse.com/security/cve/CVE-2024-0808/" source="CVE"/>
		<reference ref_id="CVE-2024-1059" ref_url="https://www.suse.com/security/cve/CVE-2024-1059/" source="CVE"/>
		<reference ref_id="CVE-2024-1060" ref_url="https://www.suse.com/security/cve/CVE-2024-1060/" source="CVE"/>
		<reference ref_id="CVE-2024-1077" ref_url="https://www.suse.com/security/cve/CVE-2024-1077/" source="CVE"/>
		<reference ref_id="CVE-2024-1283" ref_url="https://www.suse.com/security/cve/CVE-2024-1283/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5997/">CVE-2023-5997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6112/">CVE-2023-6112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6510/">CVE-2023-6510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6510">CVE-2023-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0224/">CVE-2024-0224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0333/">CVE-2024-0333 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0333">CVE-2024-0333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0518/">CVE-2024-0518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0518">CVE-2024-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0519/">CVE-2024-0519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0519">CVE-2024-0519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0807/">CVE-2024-0807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0807">CVE-2024-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0808/">CVE-2024-0808 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0808">CVE-2024-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1059/">CVE-2024-1059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1059">CVE-2024-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1060/">CVE-2024-1060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1060">CVE-2024-1060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1077/">CVE-2024-1077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1077">CVE-2024-1077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1283/">CVE-2024-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1283">CVE-2024-1283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938457" comment="libQt5Pdf5-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938458" comment="libQt5PdfWidgets5-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938459" comment="libqt5-qtpdf-devel-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938460" comment="libqt5-qtpdf-examples-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938461" comment="libqt5-qtpdf-imports-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938462" comment="libqt5-qtpdf-private-headers-devel-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938463" comment="libqt5-qtwebengine-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938464" comment="libqt5-qtwebengine-devel-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938465" comment="libqt5-qtwebengine-examples-5.15.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938466" comment="libqt5-qtwebengine-private-headers-devel-5.15.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252323" version="1" class="patch">
	<metadata>
		<title>gnome-remote-desktop-46.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5148" ref_url="https://www.suse.com/security/cve/CVE-2024-5148/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-remote-desktop-46.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5148/">CVE-2024-5148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5148">CVE-2024-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938467" comment="gnome-remote-desktop-46.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938468" comment="gnome-remote-desktop-lang-46.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252324" version="1" class="patch">
	<metadata>
		<title>libQt6NetworkAuth6-6.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36048" ref_url="https://www.suse.com/security/cve/CVE-2024-36048/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6NetworkAuth6-6.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36048/">CVE-2024-36048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36048">CVE-2024-36048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938469" comment="libQt6NetworkAuth6-6.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938470" comment="qt6-networkauth-devel-6.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938471" comment="qt6-networkauth-examples-6.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938472" comment="qt6-networkauth-private-devel-6.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252325" version="1" class="patch">
	<metadata>
		<title>chromedriver-125.0.6422.112-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5274" ref_url="https://www.suse.com/security/cve/CVE-2024-5274/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-125.0.6422.112-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5274/">CVE-2024-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5274">CVE-2024-5274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938473" comment="chromedriver-125.0.6422.112-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938474" comment="chromium-125.0.6422.112-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252326" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.24.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.24.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938475" comment="gstreamer-plugins-base-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938476" comment="gstreamer-plugins-base-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938477" comment="gstreamer-plugins-base-devel-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938478" comment="gstreamer-plugins-base-devel-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938479" comment="gstreamer-plugins-base-lang-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938480" comment="libgstallocators-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938481" comment="libgstallocators-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938482" comment="libgstapp-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938483" comment="libgstapp-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938484" comment="libgstaudio-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938485" comment="libgstaudio-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938486" comment="libgstfft-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938487" comment="libgstfft-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938488" comment="libgstgl-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938489" comment="libgstgl-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938490" comment="libgstpbutils-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938491" comment="libgstpbutils-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938492" comment="libgstriff-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938493" comment="libgstriff-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938494" comment="libgstrtp-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938495" comment="libgstrtp-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938496" comment="libgstrtsp-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938497" comment="libgstrtsp-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938498" comment="libgstsdp-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938499" comment="libgstsdp-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938500" comment="libgsttag-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938501" comment="libgsttag-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938502" comment="libgstvideo-1_0-0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938503" comment="libgstvideo-1_0-0-32bit-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938504" comment="typelib-1_0-GstAllocators-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938505" comment="typelib-1_0-GstApp-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938506" comment="typelib-1_0-GstAudio-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938507" comment="typelib-1_0-GstGL-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938508" comment="typelib-1_0-GstGLEGL-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938509" comment="typelib-1_0-GstGLWayland-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938510" comment="typelib-1_0-GstGLX11-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938511" comment="typelib-1_0-GstPbutils-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938512" comment="typelib-1_0-GstRtp-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938513" comment="typelib-1_0-GstRtsp-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938514" comment="typelib-1_0-GstSdp-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938515" comment="typelib-1_0-GstTag-1_0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938516" comment="typelib-1_0-GstVideo-1_0-1.24.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252327" version="1" class="patch">
	<metadata>
		<title>libQt5NetworkAuth5-5.15.13+kde1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36048" ref_url="https://www.suse.com/security/cve/CVE-2024-36048/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5NetworkAuth5-5.15.13+kde1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36048/">CVE-2024-36048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36048">CVE-2024-36048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938517" comment="libQt5NetworkAuth5-5.15.13+kde1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938518" comment="libqt5-qtnetworkauth-devel-5.15.13+kde1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938519" comment="libqt5-qtnetworkauth-examples-5.15.13+kde1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938520" comment="libqt5-qtnetworkauth-private-headers-devel-5.15.13+kde1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252328" version="1" class="patch">
	<metadata>
		<title>jupyter-plotly-5.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4067" ref_url="https://www.suse.com/security/cve/CVE-2024-4067/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-plotly-5.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4067/">CVE-2024-4067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4067">CVE-2024-4067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938521" comment="jupyter-plotly-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938522" comment="python310-plotly-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938523" comment="python310-plotly-jupyter-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938524" comment="python311-plotly-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938525" comment="python311-plotly-jupyter-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938526" comment="python312-plotly-5.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938527" comment="python312-plotly-jupyter-5.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252329" version="1" class="patch">
	<metadata>
		<title>squid-6.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33427" ref_url="https://www.suse.com/security/cve/CVE-2024-33427/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33427/">CVE-2024-33427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33427">CVE-2024-33427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938528" comment="squid-6.9-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252330" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20240528-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28854" ref_url="https://www.suse.com/security/cve/CVE-2024-28854/" source="CVE"/>
		<reference ref_id="CVE-2024-34063" ref_url="https://www.suse.com/security/cve/CVE-2024-34063/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20240528-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28854/">CVE-2024-28854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28854">CVE-2024-28854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34063/">CVE-2024-34063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34063">CVE-2024-34063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938529" comment="cargo-audit-advisory-db-20240528-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252331" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938530" comment="ffmpeg-5-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938531" comment="ffmpeg-5-libavcodec-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938532" comment="ffmpeg-5-libavdevice-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938533" comment="ffmpeg-5-libavfilter-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938534" comment="ffmpeg-5-libavformat-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938535" comment="ffmpeg-5-libavutil-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938536" comment="ffmpeg-5-libpostproc-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938537" comment="ffmpeg-5-libswresample-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938538" comment="ffmpeg-5-libswscale-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938539" comment="ffmpeg-5-private-devel-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938540" comment="libavcodec59-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938541" comment="libavcodec59-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938542" comment="libavdevice59-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938543" comment="libavdevice59-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938544" comment="libavfilter8-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938545" comment="libavfilter8-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938546" comment="libavformat59-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938547" comment="libavformat59-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938548" comment="libavutil57-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938549" comment="libavutil57-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938550" comment="libpostproc56-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938551" comment="libpostproc56-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938552" comment="libswresample4_ff5-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938553" comment="libswresample4_ff5-32bit-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938554" comment="libswscale6-5.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938555" comment="libswscale6-32bit-5.1.4-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252332" version="1" class="patch">
	<metadata>
		<title>minidlna-1.3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-33476" ref_url="https://www.suse.com/security/cve/CVE-2023-33476/" source="CVE"/>
		<description>
These are all security issues fixed in the minidlna-1.3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33476/">CVE-2023-33476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33476">CVE-2023-33476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938556" comment="minidlna-1.3.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252333" version="1" class="patch">
	<metadata>
		<title>system-user-velociraptor-1.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883/" source="CVE"/>
		<description>
These are all security issues fixed in the system-user-velociraptor-1.0.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938557" comment="system-user-velociraptor-1.0.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938558" comment="velociraptor-0.7.0.4.git74.3426c0a-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252334" version="1" class="patch">
	<metadata>
		<title>chromedriver-125.0.6422.141-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5493" ref_url="https://www.suse.com/security/cve/CVE-2024-5493/" source="CVE"/>
		<reference ref_id="CVE-2024-5494" ref_url="https://www.suse.com/security/cve/CVE-2024-5494/" source="CVE"/>
		<reference ref_id="CVE-2024-5495" ref_url="https://www.suse.com/security/cve/CVE-2024-5495/" source="CVE"/>
		<reference ref_id="CVE-2024-5496" ref_url="https://www.suse.com/security/cve/CVE-2024-5496/" source="CVE"/>
		<reference ref_id="CVE-2024-5497" ref_url="https://www.suse.com/security/cve/CVE-2024-5497/" source="CVE"/>
		<reference ref_id="CVE-2024-5498" ref_url="https://www.suse.com/security/cve/CVE-2024-5498/" source="CVE"/>
		<reference ref_id="CVE-2024-5499" ref_url="https://www.suse.com/security/cve/CVE-2024-5499/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-125.0.6422.141-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5493/">CVE-2024-5493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5493">CVE-2024-5493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5494/">CVE-2024-5494 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5494">CVE-2024-5494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5495/">CVE-2024-5495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5495">CVE-2024-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5496/">CVE-2024-5496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5496">CVE-2024-5496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5497/">CVE-2024-5497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5497">CVE-2024-5497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5498/">CVE-2024-5498 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5498">CVE-2024-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5499/">CVE-2024-5499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5499">CVE-2024-5499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938559" comment="chromedriver-125.0.6422.141-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938560" comment="chromium-125.0.6422.141-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252335" version="1" class="patch">
	<metadata>
		<title>caddy-2.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<description>
These are all security issues fixed in the caddy-2.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938561" comment="caddy-2.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252336" version="1" class="patch">
	<metadata>
		<title>gitleaks-8.18.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-38561" ref_url="https://www.suse.com/security/cve/CVE-2021-38561/" source="CVE"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<description>
These are all security issues fixed in the gitleaks-8.18.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38561/">CVE-2021-38561 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938562" comment="gitleaks-8.18.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252337" version="1" class="patch">
	<metadata>
		<title>libhtp-devel-0.5.48-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28871" ref_url="https://www.suse.com/security/cve/CVE-2024-28871/" source="CVE"/>
		<description>
These are all security issues fixed in the libhtp-devel-0.5.48-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28871/">CVE-2024-28871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28871">CVE-2024-28871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938563" comment="libhtp-devel-0.5.48-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938564" comment="libhtp2-0.5.48-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252338" version="1" class="patch">
	<metadata>
		<title>liblzma5-32bit-5.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3094" ref_url="https://www.suse.com/security/cve/CVE-2024-3094/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzma5-32bit-5.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3094/">CVE-2024-3094 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">CVE-2024-3094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938565" comment="liblzma5-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938566" comment="liblzma5-32bit-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938567" comment="liblzma5-x86-64-v3-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938568" comment="xz-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938569" comment="xz-devel-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938570" comment="xz-devel-32bit-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938571" comment="xz-lang-5.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252339" version="1" class="patch">
	<metadata>
		<title>plasma6-session-6.0.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36041" ref_url="https://www.suse.com/security/cve/CVE-2024-36041/" source="CVE"/>
		<description>
These are all security issues fixed in the plasma6-session-6.0.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36041/">CVE-2024-36041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36041">CVE-2024-36041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938572" comment="plasma6-session-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938573" comment="plasma6-session-x11-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938574" comment="plasma6-workspace-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938575" comment="plasma6-workspace-devel-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938576" comment="plasma6-workspace-lang-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938577" comment="plasma6-workspace-libs-6.0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938578" comment="sddm-qt6-branding-openSUSE-6.0.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252340" version="1" class="patch">
	<metadata>
		<title>skopeo-1.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the skopeo-1.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938579" comment="skopeo-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938580" comment="skopeo-bash-completion-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938581" comment="skopeo-fish-completion-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938582" comment="skopeo-zsh-completion-1.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252341" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938583" comment="go1.22-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938584" comment="go1.22-doc-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938585" comment="go1.22-libstd-1.22.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938586" comment="go1.22-race-1.22.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252342" version="1" class="patch">
	<metadata>
		<title>cJSON-devel-1.7.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31755" ref_url="https://www.suse.com/security/cve/CVE-2024-31755/" source="CVE"/>
		<description>
These are all security issues fixed in the cJSON-devel-1.7.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31755/">CVE-2024-31755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31755">CVE-2024-31755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938587" comment="cJSON-devel-1.7.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938588" comment="libcjson1-1.7.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252343" version="1" class="patch">
	<metadata>
		<title>freerdp2-2.11.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-2.11.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938589" comment="freerdp2-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938590" comment="freerdp2-devel-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938591" comment="freerdp2-proxy-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938592" comment="freerdp2-server-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938593" comment="libfreerdp2-2-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938594" comment="libwinpr2-2-2.11.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938595" comment="winpr2-devel-2.11.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252344" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938596" comment="go1.21-1.21.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938597" comment="go1.21-doc-1.21.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938598" comment="go1.21-libstd-1.21.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938599" comment="go1.21-race-1.21.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252345" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938600" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252346" version="1" class="patch">
	<metadata>
		<title>corepack21-21.7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27980" ref_url="https://www.suse.com/security/cve/CVE-2024-27980/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack21-21.7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27980/">CVE-2024-27980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27980">CVE-2024-27980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938601" comment="corepack21-21.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938602" comment="nodejs21-21.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938603" comment="nodejs21-devel-21.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938604" comment="nodejs21-docs-21.7.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938605" comment="npm21-21.7.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252347" version="1" class="patch">
	<metadata>
		<title>nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<reference ref_id="CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091/" source="CVE"/>
		<description>
These are all security issues fixed in the nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938606" comment="nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938607" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252348" version="1" class="patch">
	<metadata>
		<title>WPEWebDriver-2.44.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<description>
These are all security issues fixed in the WPEWebDriver-2.44.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938608" comment="WPEWebDriver-2.44.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938609" comment="libWPEWebInspectorResources-2.44.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938610" comment="libWPEWebKit-2_0-1-2.44.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938611" comment="wpewebkit-2_0-injected-bundles-2.44.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938612" comment="wpewebkit-devel-2.44.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938613" comment="wpewebkit-minibrowser-2.44.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252349" version="1" class="patch">
	<metadata>
		<title>python310-openpyxl-3.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5992" ref_url="https://www.suse.com/security/cve/CVE-2017-5992/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-openpyxl-3.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5992/">CVE-2017-5992 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5992">CVE-2017-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938614" comment="python310-openpyxl-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938615" comment="python311-openpyxl-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938616" comment="python312-openpyxl-3.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252350" version="1" class="patch">
	<metadata>
		<title>python310-setuptools-70.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-setuptools-70.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938617" comment="python310-setuptools-70.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938618" comment="python310-setuptools-wheel-70.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938619" comment="python311-setuptools-70.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938620" comment="python311-setuptools-wheel-70.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938621" comment="python312-setuptools-70.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938622" comment="python312-setuptools-wheel-70.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252351" version="1" class="patch">
	<metadata>
		<title>trivy-0.52.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35192" ref_url="https://www.suse.com/security/cve/CVE-2024-35192/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.52.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35192/">CVE-2024-35192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35192">CVE-2024-35192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938623" comment="trivy-0.52.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252352" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.90-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49441" ref_url="https://www.suse.com/security/cve/CVE-2023-49441/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.90-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49441/">CVE-2023-49441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49441">CVE-2023-49441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938624" comment="dnsmasq-2.90-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938625" comment="dnsmasq-utils-2.90-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252353" version="1" class="patch">
	<metadata>
		<title>okteto-2.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<description>
These are all security issues fixed in the okteto-2.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938626" comment="okteto-2.28.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252354" version="1" class="patch">
	<metadata>
		<title>php8-8.3.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.3.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938627" comment="php8-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938628" comment="php8-bcmath-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938629" comment="php8-bz2-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938630" comment="php8-calendar-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938631" comment="php8-cli-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938632" comment="php8-ctype-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938633" comment="php8-curl-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938634" comment="php8-dba-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938635" comment="php8-devel-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938636" comment="php8-dom-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938637" comment="php8-enchant-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938638" comment="php8-exif-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938639" comment="php8-ffi-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938640" comment="php8-fileinfo-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938641" comment="php8-ftp-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938642" comment="php8-gd-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938643" comment="php8-gettext-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938644" comment="php8-gmp-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938645" comment="php8-iconv-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938646" comment="php8-intl-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938647" comment="php8-ldap-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938648" comment="php8-mbstring-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938649" comment="php8-mysql-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938650" comment="php8-odbc-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938651" comment="php8-opcache-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938652" comment="php8-openssl-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938653" comment="php8-pcntl-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938654" comment="php8-pdo-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938655" comment="php8-pgsql-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938656" comment="php8-phar-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938657" comment="php8-posix-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938658" comment="php8-readline-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938659" comment="php8-shmop-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938660" comment="php8-snmp-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938661" comment="php8-soap-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938662" comment="php8-sockets-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938663" comment="php8-sodium-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938664" comment="php8-sqlite-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938665" comment="php8-sysvmsg-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938666" comment="php8-sysvsem-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938667" comment="php8-sysvshm-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938668" comment="php8-tidy-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938669" comment="php8-tokenizer-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938670" comment="php8-xmlreader-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938671" comment="php8-xmlwriter-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938672" comment="php8-xsl-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938673" comment="php8-zip-8.3.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938674" comment="php8-zlib-8.3.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252355" version="1" class="patch">
	<metadata>
		<title>nano-8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5742" ref_url="https://www.suse.com/security/cve/CVE-2024-5742/" source="CVE"/>
		<description>
These are all security issues fixed in the nano-8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5742/">CVE-2024-5742 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5742">CVE-2024-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938675" comment="nano-8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938676" comment="nano-lang-8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252356" version="1" class="patch">
	<metadata>
		<title>python310-Authlib-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37568" ref_url="https://www.suse.com/security/cve/CVE-2024-37568/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Authlib-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37568/">CVE-2024-37568 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37568">CVE-2024-37568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938677" comment="python310-Authlib-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938678" comment="python311-Authlib-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938679" comment="python312-Authlib-1.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252357" version="1" class="patch">
	<metadata>
		<title>python310-social-auth-app-django-5.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32879" ref_url="https://www.suse.com/security/cve/CVE-2024-32879/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-social-auth-app-django-5.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-32879/">CVE-2024-32879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32879">CVE-2024-32879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938680" comment="python310-social-auth-app-django-5.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938681" comment="python311-social-auth-app-django-5.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938682" comment="python312-social-auth-app-django-5.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252358" version="1" class="patch">
	<metadata>
		<title>python310-w3lib-2.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-w3lib-2.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938683" comment="python310-w3lib-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938684" comment="python311-w3lib-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938685" comment="python312-w3lib-2.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252359" version="1" class="patch">
	<metadata>
		<title>frr-8.4-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31950" ref_url="https://www.suse.com/security/cve/CVE-2024-31950/" source="CVE"/>
		<reference ref_id="CVE-2024-31951" ref_url="https://www.suse.com/security/cve/CVE-2024-31951/" source="CVE"/>
		<reference ref_id="CVE-2024-34088" ref_url="https://www.suse.com/security/cve/CVE-2024-34088/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-8.4-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31950/">CVE-2024-31950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31950">CVE-2024-31950 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31951/">CVE-2024-31951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31951">CVE-2024-31951 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34088/">CVE-2024-34088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34088">CVE-2024-34088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938686" comment="frr-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938687" comment="frr-devel-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938688" comment="libfrr0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938689" comment="libfrr_pb0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938690" comment="libfrrcares0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938691" comment="libfrrfpm_pb0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938692" comment="libfrrospfapiclient0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938693" comment="libfrrsnmp0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938694" comment="libfrrzmq0-8.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938695" comment="libmlag_pb0-8.4-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252360" version="1" class="patch">
	<metadata>
		<title>liboqs-devel-0.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36405" ref_url="https://www.suse.com/security/cve/CVE-2024-36405/" source="CVE"/>
		<description>
These are all security issues fixed in the liboqs-devel-0.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36405/">CVE-2024-36405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36405">CVE-2024-36405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938696" comment="liboqs-devel-0.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938697" comment="liboqs5-0.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252361" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.7.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35241" ref_url="https://www.suse.com/security/cve/CVE-2024-35241/" source="CVE"/>
		<reference ref_id="CVE-2024-35242" ref_url="https://www.suse.com/security/cve/CVE-2024-35242/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.7.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35241/">CVE-2024-35241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35241">CVE-2024-35241 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35242/">CVE-2024-35242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35242">CVE-2024-35242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938698" comment="php-composer2-2.7.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252362" version="1" class="patch">
	<metadata>
		<title>cups-2.4.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938699" comment="cups-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938700" comment="cups-client-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938701" comment="cups-config-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938702" comment="cups-ddk-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938703" comment="cups-devel-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938704" comment="cups-devel-32bit-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938705" comment="libcups2-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938706" comment="libcups2-32bit-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938707" comment="libcupsimage2-2.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938708" comment="libcupsimage2-32bit-2.4.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252363" version="1" class="patch">
	<metadata>
		<title>python310-Werkzeug-3.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<reference ref_id="CVE-2024-34069" ref_url="https://www.suse.com/security/cve/CVE-2024-34069/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Werkzeug-3.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14806">CVE-2019-14806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34069/">CVE-2024-34069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34069">CVE-2024-34069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938709" comment="python310-Werkzeug-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938710" comment="python311-Werkzeug-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938711" comment="python312-Werkzeug-3.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252364" version="1" class="patch">
	<metadata>
		<title>python310-scikit-learn-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5206" ref_url="https://www.suse.com/security/cve/CVE-2024-5206/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-scikit-learn-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-5206/">CVE-2024-5206 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5206">CVE-2024-5206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938712" comment="python310-scikit-learn-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938713" comment="python311-scikit-learn-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938714" comment="python312-scikit-learn-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252365" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-127.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5687" ref_url="https://www.suse.com/security/cve/CVE-2024-5687/" source="CVE"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5689" ref_url="https://www.suse.com/security/cve/CVE-2024-5689/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5694" ref_url="https://www.suse.com/security/cve/CVE-2024-5694/" source="CVE"/>
		<reference ref_id="CVE-2024-5695" ref_url="https://www.suse.com/security/cve/CVE-2024-5695/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5697" ref_url="https://www.suse.com/security/cve/CVE-2024-5697/" source="CVE"/>
		<reference ref_id="CVE-2024-5698" ref_url="https://www.suse.com/security/cve/CVE-2024-5698/" source="CVE"/>
		<reference ref_id="CVE-2024-5699" ref_url="https://www.suse.com/security/cve/CVE-2024-5699/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5701" ref_url="https://www.suse.com/security/cve/CVE-2024-5701/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-127.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5687/">CVE-2024-5687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5687">CVE-2024-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5689/">CVE-2024-5689 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5689">CVE-2024-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5694/">CVE-2024-5694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5694">CVE-2024-5694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5695/">CVE-2024-5695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5695">CVE-2024-5695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5697/">CVE-2024-5697 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5697">CVE-2024-5697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5698/">CVE-2024-5698 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5698">CVE-2024-5698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5699/">CVE-2024-5699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5699">CVE-2024-5699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5701/">CVE-2024-5701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5701">CVE-2024-5701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938715" comment="MozillaFirefox-127.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938716" comment="MozillaFirefox-branding-upstream-127.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938717" comment="MozillaFirefox-devel-127.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938718" comment="MozillaFirefox-translations-common-127.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938719" comment="MozillaFirefox-translations-other-127.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252366" version="1" class="patch">
	<metadata>
		<title>booth-1.2+git0.322fea0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3049" ref_url="https://www.suse.com/security/cve/CVE-2024-3049/" source="CVE"/>
		<description>
These are all security issues fixed in the booth-1.2+git0.322fea0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3049/">CVE-2024-3049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3049">CVE-2024-3049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938720" comment="booth-1.2+git0.322fea0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938721" comment="booth-test-1.2+git0.322fea0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252367" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2022.10.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52890" ref_url="https://www.suse.com/security/cve/CVE-2023-52890/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2022.10.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52890/">CVE-2023-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52890">CVE-2023-52890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938722" comment="libntfs-3g-devel-2022.10.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938723" comment="libntfs-3g89-2022.10.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938724" comment="ntfs-3g-2022.10.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938725" comment="ntfsprogs-2022.10.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938726" comment="ntfsprogs-extra-2022.10.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252368" version="1" class="patch">
	<metadata>
		<title>python310-eventlet-0.36.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-eventlet-0.36.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938727" comment="python310-eventlet-0.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938728" comment="python311-eventlet-0.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938729" comment="python312-eventlet-0.36.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252369" version="1" class="patch">
	<metadata>
		<title>teleport-15.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35255" ref_url="https://www.suse.com/security/cve/CVE-2024-35255/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-15.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2024-06-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35255/">CVE-2024-35255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35255">CVE-2024-35255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938730" comment="teleport-15.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938731" comment="teleport-fdpass-teleport-15.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938732" comment="teleport-tbot-15.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938733" comment="teleport-tctl-15.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938734" comment="teleport-tsh-15.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252370" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938735" comment="MozillaThunderbird-115.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938736" comment="MozillaThunderbird-openpgp-librnp-115.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938737" comment="MozillaThunderbird-translations-common-115.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938738" comment="MozillaThunderbird-translations-other-115.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252371" version="1" class="patch">
	<metadata>
		<title>forgejo-7.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-7.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938739" comment="forgejo-7.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938740" comment="forgejo-apparmor-7.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938741" comment="forgejo-selinux-7.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252372" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3674" ref_url="https://www.suse.com/security/cve/CVE-2023-3674/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3674/">CVE-2023-3674 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3674">CVE-2023-3674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938742" comment="keylime-config-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938743" comment="keylime-firewalld-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938744" comment="keylime-logrotate-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938745" comment="keylime-registrar-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938746" comment="keylime-tenant-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938747" comment="keylime-tpm_cert_store-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938748" comment="keylime-verifier-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938749" comment="python310-keylime-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938750" comment="python311-keylime-7.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938751" comment="python312-keylime-7.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252373" version="1" class="patch">
	<metadata>
		<title>pgadmin4-8.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4215" ref_url="https://www.suse.com/security/cve/CVE-2024-4215/" source="CVE"/>
		<reference ref_id="CVE-2024-4216" ref_url="https://www.suse.com/security/cve/CVE-2024-4216/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-8.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4215/">CVE-2024-4215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4215">CVE-2024-4215 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-4216/">CVE-2024-4216 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4216">CVE-2024-4216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938752" comment="pgadmin4-8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938753" comment="pgadmin4-cloud-8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938754" comment="pgadmin4-desktop-8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938755" comment="pgadmin4-doc-8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938756" comment="pgadmin4-web-uwsgi-8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938757" comment="system-user-pgadmin-8.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252374" version="1" class="patch">
	<metadata>
		<title>rclone-1.67.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.67.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938758" comment="rclone-1.67.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938759" comment="rclone-bash-completion-1.67.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938760" comment="rclone-zsh-completion-1.67.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252375" version="1" class="patch">
	<metadata>
		<title>oqs-provider-0.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37305" ref_url="https://www.suse.com/security/cve/CVE-2024-37305/" source="CVE"/>
		<description>
These are all security issues fixed in the oqs-provider-0.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37305/">CVE-2024-37305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37305">CVE-2024-37305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938761" comment="oqs-provider-0.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252376" version="1" class="patch">
	<metadata>
		<title>python310-urllib3-2.1.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-urllib3-2.1.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938762" comment="python310-urllib3-2.1.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938763" comment="python311-urllib3-2.1.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938764" comment="python312-urllib3-2.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252377" version="1" class="patch">
	<metadata>
		<title>wget-1.24.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.24.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938765" comment="wget-1.24.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938766" comment="wget-lang-1.24.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252378" version="1" class="patch">
	<metadata>
		<title>sngrep-1.8.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35434" ref_url="https://www.suse.com/security/cve/CVE-2024-35434/" source="CVE"/>
		<description>
These are all security issues fixed in the sngrep-1.8.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35434/">CVE-2024-35434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35434">CVE-2024-35434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938767" comment="sngrep-1.8.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252379" version="1" class="patch">
	<metadata>
		<title>kubevirt-container-disk-1.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-33394" ref_url="https://www.suse.com/security/cve/CVE-2024-33394/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-container-disk-1.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33394/">CVE-2024-33394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33394">CVE-2024-33394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938768" comment="kubevirt-container-disk-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938769" comment="kubevirt-manifests-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938770" comment="kubevirt-pr-helper-conf-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938771" comment="kubevirt-tests-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938772" comment="kubevirt-virt-api-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938773" comment="kubevirt-virt-controller-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938774" comment="kubevirt-virt-exportproxy-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938775" comment="kubevirt-virt-exportserver-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938776" comment="kubevirt-virt-handler-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938777" comment="kubevirt-virt-launcher-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938778" comment="kubevirt-virt-operator-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938779" comment="kubevirt-virtctl-1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938780" comment="obs-service-kubevirt_containers_meta-1.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252380" version="1" class="patch">
	<metadata>
		<title>singularity-ce-4.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23538" ref_url="https://www.suse.com/security/cve/CVE-2022-23538/" source="CVE"/>
		<reference ref_id="CVE-2022-39237" ref_url="https://www.suse.com/security/cve/CVE-2022-39237/" source="CVE"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="CVE-2024-23650" ref_url="https://www.suse.com/security/cve/CVE-2024-23650/" source="CVE"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
These are all security issues fixed in the singularity-ce-4.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23538/">CVE-2022-23538 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23538">CVE-2022-23538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39237/">CVE-2022-39237 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39237">CVE-2022-39237 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23650/">CVE-2024-23650 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23650">CVE-2024-23650 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938781" comment="singularity-ce-4.1.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252381" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-46.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38394" ref_url="https://www.suse.com/security/cve/CVE-2024-38394/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-46.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38394/">CVE-2024-38394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38394">CVE-2024-38394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938782" comment="gnome-settings-daemon-46.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938783" comment="gnome-settings-daemon-devel-46.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938784" comment="gnome-settings-daemon-lang-46.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252382" version="1" class="patch">
	<metadata>
		<title>perl-DBI-1.643-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBI-1.643-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938785" comment="perl-DBI-1.643-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252383" version="1" class="patch">
	<metadata>
		<title>python310-dnspython-2.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-dnspython-2.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938786" comment="python310-dnspython-2.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938787" comment="python311-dnspython-2.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938788" comment="python312-dnspython-2.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252384" version="1" class="patch">
	<metadata>
		<title>python38-3.8.19-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.19-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938789" comment="python38-3.8.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938790" comment="python38-curses-3.8.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938791" comment="python38-dbm-3.8.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938792" comment="python38-idle-3.8.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938793" comment="python38-tk-3.8.19-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252385" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938794" comment="python39-3.9.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938795" comment="python39-32bit-3.9.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938796" comment="python39-curses-3.9.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938797" comment="python39-dbm-3.9.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938798" comment="python39-idle-3.9.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938799" comment="python39-tk-3.9.19-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252386" version="1" class="patch">
	<metadata>
		<title>python310-django-allauth-0.63.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-django-allauth-0.63.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938800" comment="python310-django-allauth-0.63.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938801" comment="python311-django-allauth-0.63.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938802" comment="python312-django-allauth-0.63.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252387" version="1" class="patch">
	<metadata>
		<title>python310-3.10.14-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.14-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938803" comment="python310-3.10.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938804" comment="python310-32bit-3.10.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938805" comment="python310-curses-3.10.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938806" comment="python310-dbm-3.10.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938807" comment="python310-idle-3.10.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938808" comment="python310-tk-3.10.14-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252388" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-actionpack-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<reference ref_id="CVE-2023-22792" ref_url="https://www.suse.com/security/cve/CVE-2023-22792/" source="CVE"/>
		<reference ref_id="CVE-2023-22795" ref_url="https://www.suse.com/security/cve/CVE-2023-22795/" source="CVE"/>
		<reference ref_id="CVE-2023-22797" ref_url="https://www.suse.com/security/cve/CVE-2023-22797/" source="CVE"/>
		<reference ref_id="CVE-2024-26143" ref_url="https://www.suse.com/security/cve/CVE-2024-26143/" source="CVE"/>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-actionpack-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23633">CVE-2022-23633 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22792/">CVE-2023-22792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22792">CVE-2023-22792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22795/">CVE-2023-22795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22795">CVE-2023-22795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22797/">CVE-2023-22797 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22797">CVE-2023-22797 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26143/">CVE-2024-26143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26143">CVE-2024-26143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938809" comment="ruby3.3-rubygem-actionpack-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252389" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-actiontext-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34341" ref_url="https://www.suse.com/security/cve/CVE-2024-34341/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-actiontext-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34341/">CVE-2024-34341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34341">CVE-2024-34341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938810" comment="ruby3.3-rubygem-actiontext-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252390" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-activerecord-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32224" ref_url="https://www.suse.com/security/cve/CVE-2022-32224/" source="CVE"/>
		<reference ref_id="CVE-2022-44566" ref_url="https://www.suse.com/security/cve/CVE-2022-44566/" source="CVE"/>
		<reference ref_id="CVE-2023-22794" ref_url="https://www.suse.com/security/cve/CVE-2023-22794/" source="CVE"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-activerecord-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32224/">CVE-2022-32224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32224">CVE-2022-32224 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44566/">CVE-2022-44566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44566">CVE-2022-44566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22794/">CVE-2023-22794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22794">CVE-2023-22794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938811" comment="ruby3.3-rubygem-activerecord-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252391" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-activestorage-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21831" ref_url="https://www.suse.com/security/cve/CVE-2022-21831/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-activestorage-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21831/">CVE-2022-21831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21831">CVE-2022-21831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938812" comment="ruby3.3-rubygem-activestorage-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252392" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-activesupport-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22796" ref_url="https://www.suse.com/security/cve/CVE-2023-22796/" source="CVE"/>
		<reference ref_id="CVE-2023-28120" ref_url="https://www.suse.com/security/cve/CVE-2023-28120/" source="CVE"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-activesupport-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22796/">CVE-2023-22796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22796">CVE-2023-22796 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28120/">CVE-2023-28120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28120">CVE-2023-28120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938813" comment="ruby3.3-rubygem-activesupport-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252393" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-fluentd-1.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41186" ref_url="https://www.suse.com/security/cve/CVE-2021-41186/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-fluentd-1.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41186/">CVE-2021-41186 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41186">CVE-2021-41186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938814" comment="ruby3.3-rubygem-fluentd-1.17.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252394" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-http-cookie-1.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-http-cookie-1.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938815" comment="ruby3.3-rubygem-http-cookie-1.0.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252395" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rails-7.0-7.0.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<reference ref_id="CVE-2024-26143" ref_url="https://www.suse.com/security/cve/CVE-2024-26143/" source="CVE"/>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<reference ref_id="CVE-2024-34341" ref_url="https://www.suse.com/security/cve/CVE-2024-34341/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rails-7.0-7.0.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26143/">CVE-2024-26143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26143">CVE-2024-26143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34341/">CVE-2024-34341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34341">CVE-2024-34341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938816" comment="ruby3.3-rubygem-rails-7.0-7.0.8.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252396" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-sprockets-3.7-3.7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-sprockets-3.7-3.7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938817" comment="ruby3.3-rubygem-sprockets-3.7-3.7.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252397" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23469" ref_url="https://www.suse.com/security/cve/CVE-2022-23469/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-46153" ref_url="https://www.suse.com/security/cve/CVE-2022-46153/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-29013" ref_url="https://www.suse.com/security/cve/CVE-2023-29013/" source="CVE"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-47106" ref_url="https://www.suse.com/security/cve/CVE-2023-47106/" source="CVE"/>
		<reference ref_id="CVE-2023-47124" ref_url="https://www.suse.com/security/cve/CVE-2023-47124/" source="CVE"/>
		<reference ref_id="CVE-2023-47633" ref_url="https://www.suse.com/security/cve/CVE-2023-47633/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-28869" ref_url="https://www.suse.com/security/cve/CVE-2024-28869/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23469/">CVE-2022-23469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23469">CVE-2022-23469 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46153/">CVE-2022-46153 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46153">CVE-2022-46153 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29013/">CVE-2023-29013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29013">CVE-2023-29013 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47106/">CVE-2023-47106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47106">CVE-2023-47106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47124/">CVE-2023-47124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47124">CVE-2023-47124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47633/">CVE-2023-47633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47633">CVE-2023-47633 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28869/">CVE-2024-28869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28869">CVE-2024-28869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938818" comment="traefik2-2.11.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252398" version="1" class="patch">
	<metadata>
		<title>helmfile-0.166.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the helmfile-0.166.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938819" comment="helmfile-0.166.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938820" comment="helmfile-bash-completion-0.166.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938821" comment="helmfile-fish-completion-0.166.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938822" comment="helmfile-zsh-completion-0.166.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252399" version="1" class="patch">
	<metadata>
		<title>python38-3.8.19-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.19-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938823" comment="python38-3.8.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938824" comment="python38-curses-3.8.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938825" comment="python38-dbm-3.8.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938826" comment="python38-idle-3.8.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938827" comment="python38-tk-3.8.19-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252400" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938828" comment="python39-3.9.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938829" comment="python39-32bit-3.9.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938830" comment="python39-curses-3.9.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938831" comment="python39-dbm-3.9.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938832" comment="python39-idle-3.9.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938833" comment="python39-tk-3.9.19-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252401" version="1" class="patch">
	<metadata>
		<title>squid-6.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37894" ref_url="https://www.suse.com/security/cve/CVE-2024-37894/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37894/">CVE-2024-37894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37894">CVE-2024-37894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938834" comment="squid-6.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252402" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.17-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.17-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-28"/>
	<updated date="2024-06-28"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938835" comment="containerd-1.7.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938836" comment="containerd-ctr-1.7.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938837" comment="containerd-devel-1.7.17-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252403" version="1" class="patch">
	<metadata>
		<title>python311-3.11.9-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.9-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-28"/>
	<updated date="2024-06-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938838" comment="python311-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938839" comment="python311-32bit-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938840" comment="python311-curses-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938841" comment="python311-dbm-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938842" comment="python311-idle-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938843" comment="python311-tk-3.11.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938844" comment="python311-x86-64-v3-3.11.9-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252404" version="1" class="patch">
	<metadata>
		<title>python310-3.10.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.14-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2024-06-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938845" comment="python310-3.10.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938846" comment="python310-32bit-3.10.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938847" comment="python310-curses-3.10.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938848" comment="python310-dbm-3.10.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938849" comment="python310-idle-3.10.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938850" comment="python310-tk-3.10.14-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252405" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-29.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5158" ref_url="https://www.suse.com/security/cve/CVE-2024-5158/" source="CVE"/>
		<reference ref_id="CVE-2024-5499" ref_url="https://www.suse.com/security/cve/CVE-2024-5499/" source="CVE"/>
		<reference ref_id="CVE-2024-6100" ref_url="https://www.suse.com/security/cve/CVE-2024-6100/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-29.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-01"/>
	<updated date="2024-07-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5158/">CVE-2024-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5158">CVE-2024-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5499/">CVE-2024-5499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5499">CVE-2024-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6100/">CVE-2024-6100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6100">CVE-2024-6100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938851" comment="nodejs-electron-29.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938852" comment="nodejs-electron-devel-29.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938853" comment="nodejs-electron-doc-29.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252406" version="1" class="patch">
	<metadata>
		<title>fiona-fio-1.9.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<description>
These are all security issues fixed in the fiona-fio-1.9.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-01"/>
	<updated date="2024-07-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938854" comment="fiona-fio-1.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938855" comment="python310-Fiona-1.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938856" comment="python311-Fiona-1.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938857" comment="python312-Fiona-1.9.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252407" version="1" class="patch">
	<metadata>
		<title>python310-Js2Py-0.74-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28397" ref_url="https://www.suse.com/security/cve/CVE-2024-28397/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Js2Py-0.74-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-01"/>
	<updated date="2024-07-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-28397/">CVE-2024-28397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28397">CVE-2024-28397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938858" comment="python310-Js2Py-0.74-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938859" comment="python311-Js2Py-0.74-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938860" comment="python312-Js2Py-0.74-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252408" version="1" class="patch">
	<metadata>
		<title>clamav-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20380" ref_url="https://www.suse.com/security/cve/CVE-2024-20380/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-20380/">CVE-2024-20380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20380">CVE-2024-20380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938861" comment="clamav-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938862" comment="clamav-devel-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938863" comment="clamav-docs-html-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938864" comment="clamav-milter-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938865" comment="libclamav12-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938866" comment="libclammspack0-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938867" comment="libfreshclam3-1.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252409" version="1" class="patch">
	<metadata>
		<title>openssh-9.6p1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6387" ref_url="https://www.suse.com/security/cve/CVE-2024-6387/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.6p1-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6387/">CVE-2024-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938868" comment="openssh-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938869" comment="openssh-cavs-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938870" comment="openssh-clients-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938871" comment="openssh-common-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938872" comment="openssh-fips-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938873" comment="openssh-helpers-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938874" comment="openssh-server-9.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938875" comment="openssh-server-config-rootlogin-9.6p1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252410" version="1" class="patch">
	<metadata>
		<title>python310-PyYAML-6.0.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-PyYAML-6.0.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938876" comment="python310-PyYAML-6.0.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938877" comment="python311-PyYAML-6.0.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938878" comment="python312-PyYAML-6.0.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252411" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.03.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52722" ref_url="https://www.suse.com/security/cve/CVE-2023-52722/" source="CVE"/>
		<reference ref_id="CVE-2024-29510" ref_url="https://www.suse.com/security/cve/CVE-2024-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-33869" ref_url="https://www.suse.com/security/cve/CVE-2024-33869/" source="CVE"/>
		<reference ref_id="CVE-2024-33870" ref_url="https://www.suse.com/security/cve/CVE-2024-33870/" source="CVE"/>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.03.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52722/">CVE-2023-52722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52722">CVE-2023-52722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-29510/">CVE-2024-29510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510">CVE-2024-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-33869/">CVE-2024-33869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869">CVE-2024-33869 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33870/">CVE-2024-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870">CVE-2024-33870 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938879" comment="ghostscript-10.03.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938880" comment="ghostscript-devel-10.03.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938881" comment="ghostscript-x11-10.03.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252412" version="1" class="patch">
	<metadata>
		<title>go1.21-1.21.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.21-1.21.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938882" comment="go1.21-1.21.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938883" comment="go1.21-doc-1.21.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938884" comment="go1.21-libstd-1.21.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938885" comment="go1.21-race-1.21.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252413" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.53.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.53.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938886" comment="golang-github-prometheus-prometheus-2.53.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252414" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp1-24.07.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp1-24.07.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938887" comment="libpoppler-cpp1-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938888" comment="libpoppler-cpp1-32bit-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938889" comment="libpoppler-devel-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938890" comment="libpoppler-glib-devel-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938891" comment="libpoppler-glib8-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938892" comment="libpoppler-glib8-32bit-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938893" comment="libpoppler139-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938894" comment="libpoppler139-32bit-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938895" comment="poppler-tools-24.07.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938896" comment="typelib-1_0-Poppler-0_18-24.07.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252415" version="1" class="patch">
	<metadata>
		<title>python310-yt-dlp-2024.07.01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38519" ref_url="https://www.suse.com/security/cve/CVE-2024-38519/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-yt-dlp-2024.07.01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38519/">CVE-2024-38519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38519">CVE-2024-38519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938897" comment="python310-yt-dlp-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938898" comment="python311-yt-dlp-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938899" comment="python312-yt-dlp-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938900" comment="yt-dlp-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938901" comment="yt-dlp-bash-completion-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938902" comment="yt-dlp-fish-completion-2024.07.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938903" comment="yt-dlp-zsh-completion-2024.07.01-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252416" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34703" ref_url="https://www.suse.com/security/cve/CVE-2024-34703/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34703/">CVE-2024-34703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34703">CVE-2024-34703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938904" comment="MozillaThunderbird-115.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938905" comment="MozillaThunderbird-openpgp-librnp-115.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938906" comment="MozillaThunderbird-translations-common-115.12.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938907" comment="MozillaThunderbird-translations-other-115.12.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252417" version="1" class="patch">
	<metadata>
		<title>cockpit-320-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6126" ref_url="https://www.suse.com/security/cve/CVE-2024-6126/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-320-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6126/">CVE-2024-6126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6126">CVE-2024-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938908" comment="cockpit-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938909" comment="cockpit-bridge-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938910" comment="cockpit-devel-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938911" comment="cockpit-doc-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938912" comment="cockpit-kdump-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938913" comment="cockpit-networkmanager-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938914" comment="cockpit-packagekit-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938915" comment="cockpit-pcp-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938916" comment="cockpit-selinux-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938917" comment="cockpit-storaged-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938918" comment="cockpit-system-320-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938919" comment="cockpit-ws-320-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252418" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32228" ref_url="https://www.suse.com/security/cve/CVE-2024-32228/" source="CVE"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32228/">CVE-2024-32228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32228">CVE-2024-32228 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938920" comment="ffmpeg-7-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938921" comment="ffmpeg-7-libavcodec-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938922" comment="ffmpeg-7-libavdevice-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938923" comment="ffmpeg-7-libavfilter-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938924" comment="ffmpeg-7-libavformat-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938925" comment="ffmpeg-7-libavutil-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938926" comment="ffmpeg-7-libpostproc-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938927" comment="ffmpeg-7-libswresample-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938928" comment="ffmpeg-7-libswscale-devel-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938929" comment="libavcodec61-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938930" comment="libavdevice61-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938931" comment="libavfilter10-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938932" comment="libavformat61-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938933" comment="libavutil59-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938934" comment="libpostproc58-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938935" comment="libswresample5-7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938936" comment="libswscale8-7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252419" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938937" comment="go1.22-1.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938938" comment="go1.22-doc-1.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938939" comment="go1.22-libstd-1.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938940" comment="go1.22-race-1.22.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252420" version="1" class="patch">
	<metadata>
		<title>gomuks-0.3.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24792" ref_url="https://www.suse.com/security/cve/CVE-2024-24792/" source="CVE"/>
		<description>
These are all security issues fixed in the gomuks-0.3.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24792/">CVE-2024-24792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24792">CVE-2024-24792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938941" comment="gomuks-0.3.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252421" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938942" comment="libvpx-devel-1.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938943" comment="libvpx9-1.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938944" comment="libvpx9-32bit-1.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938945" comment="vpx-tools-1.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252422" version="1" class="patch">
	<metadata>
		<title>netty3-3.10.6-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29025" ref_url="https://www.suse.com/security/cve/CVE-2024-29025/" source="CVE"/>
		<description>
These are all security issues fixed in the netty3-3.10.6-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29025/">CVE-2024-29025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29025">CVE-2024-29025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938946" comment="netty3-3.10.6-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938947" comment="netty3-javadoc-3.10.6-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252423" version="1" class="patch">
	<metadata>
		<title>podman-5.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938948" comment="podman-5.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938949" comment="podman-docker-5.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938950" comment="podman-remote-5.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938951" comment="podmansh-5.1.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252424" version="1" class="patch">
	<metadata>
		<title>python310-nltk-3.8.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14751" ref_url="https://www.suse.com/security/cve/CVE-2019-14751/" source="CVE"/>
		<reference ref_id="CVE-2024-39705" ref_url="https://www.suse.com/security/cve/CVE-2024-39705/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-nltk-3.8.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14751/">CVE-2019-14751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14751">CVE-2019-14751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39705/">CVE-2024-39705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39705">CVE-2024-39705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938952" comment="python310-nltk-3.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938953" comment="python311-nltk-3.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938954" comment="python312-nltk-3.8.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252425" version="1" class="patch">
	<metadata>
		<title>sops-3.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2660" ref_url="https://www.suse.com/security/cve/CVE-2024-2660/" source="CVE"/>
		<description>
These are all security issues fixed in the sops-3.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2660/">CVE-2024-2660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2660">CVE-2024-2660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938955" comment="sops-3.9.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252426" version="1" class="patch">
	<metadata>
		<title>teleport-15.4.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-15.4.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938956" comment="teleport-15.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938957" comment="teleport-fdpass-teleport-15.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938958" comment="teleport-tbot-15.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938959" comment="teleport-tctl-15.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938960" comment="teleport-tsh-15.4.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252427" version="1" class="patch">
	<metadata>
		<title>agama-web-ui-9+52-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28154" ref_url="https://www.suse.com/security/cve/CVE-2023-28154/" source="CVE"/>
		<description>
These are all security issues fixed in the agama-web-ui-9+52-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28154/">CVE-2023-28154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28154">CVE-2023-28154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938961" comment="agama-web-ui-9+52-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252428" version="1" class="patch">
	<metadata>
		<title>forgejo-7.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-7.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938962" comment="forgejo-7.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938963" comment="forgejo-apparmor-7.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938964" comment="forgejo-selinux-7.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252429" version="1" class="patch">
	<metadata>
		<title>kbfs-6.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24792" ref_url="https://www.suse.com/security/cve/CVE-2024-24792/" source="CVE"/>
		<description>
These are all security issues fixed in the kbfs-6.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24792/">CVE-2024-24792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24792">CVE-2024-24792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938965" comment="kbfs-6.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938966" comment="kbfs-git-6.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938967" comment="kbfs-tool-6.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938968" comment="keybase-client-6.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252430" version="1" class="patch">
	<metadata>
		<title>python313-3.13.0~b3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.0~b3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938969" comment="python313-3.13.0~b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938970" comment="python313-curses-3.13.0~b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938971" comment="python313-dbm-3.13.0~b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938972" comment="python313-idle-3.13.0~b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938973" comment="python313-tk-3.13.0~b3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938974" comment="python313-x86-64-v3-3.13.0~b3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252431" version="1" class="patch">
	<metadata>
		<title>rmt-server-2.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<description>
These are all security issues fixed in the rmt-server-2.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938975" comment="rmt-server-2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938976" comment="rmt-server-config-2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938977" comment="rmt-server-pubcloud-2.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252432" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938978" comment="krb5-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938979" comment="krb5-32bit-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938980" comment="krb5-client-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938981" comment="krb5-devel-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938982" comment="krb5-devel-32bit-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938983" comment="krb5-plugin-kdb-ldap-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938984" comment="krb5-plugin-preauth-otp-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938985" comment="krb5-plugin-preauth-pkinit-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938986" comment="krb5-plugin-preauth-spake-1.21.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938987" comment="krb5-server-1.21.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252433" version="1" class="patch">
	<metadata>
		<title>libndp-1.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp-1.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938988" comment="libndp-1.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938989" comment="libndp-devel-1.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938990" comment="libndp0-1.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252434" version="1" class="patch">
	<metadata>
		<title>openssh-9.6p1-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<reference ref_id="CVE-2024-39894" ref_url="https://www.suse.com/security/cve/CVE-2024-39894/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.6p1-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39894/">CVE-2024-39894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39894">CVE-2024-39894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938991" comment="openssh-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938992" comment="openssh-cavs-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938993" comment="openssh-clients-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938994" comment="openssh-common-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938995" comment="openssh-fips-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938996" comment="openssh-helpers-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938997" comment="openssh-server-9.6p1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009938998" comment="openssh-server-config-rootlogin-9.6p1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252435" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.7.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.7.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009938999" comment="libQt6Concurrent6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939000" comment="libQt6Core6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939001" comment="libQt6DBus6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939002" comment="libQt6Gui6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939003" comment="libQt6Network6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939004" comment="libQt6OpenGL6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939005" comment="libQt6OpenGLWidgets6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939006" comment="libQt6PrintSupport6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939007" comment="libQt6Sql6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939008" comment="libQt6Test6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939009" comment="libQt6Widgets6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939010" comment="libQt6Xml6-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939011" comment="qt6-base-common-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939012" comment="qt6-base-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939013" comment="qt6-base-examples-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939014" comment="qt6-base-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939015" comment="qt6-concurrent-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939016" comment="qt6-core-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939017" comment="qt6-core-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939018" comment="qt6-dbus-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939019" comment="qt6-dbus-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939020" comment="qt6-docs-common-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939021" comment="qt6-exampleicons-devel-static-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939022" comment="qt6-gui-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939023" comment="qt6-gui-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939024" comment="qt6-kmssupport-devel-static-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939025" comment="qt6-kmssupport-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939026" comment="qt6-network-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939027" comment="qt6-network-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939028" comment="qt6-network-tls-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939029" comment="qt6-networkinformation-glib-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939030" comment="qt6-networkinformation-nm-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939031" comment="qt6-opengl-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939032" comment="qt6-opengl-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939033" comment="qt6-openglwidgets-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939034" comment="qt6-platformsupport-devel-static-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939035" comment="qt6-platformsupport-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939036" comment="qt6-platformtheme-gtk3-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939037" comment="qt6-platformtheme-xdgdesktopportal-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939038" comment="qt6-printsupport-cups-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939039" comment="qt6-printsupport-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939040" comment="qt6-printsupport-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939041" comment="qt6-sql-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939042" comment="qt6-sql-mysql-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939043" comment="qt6-sql-postgresql-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939044" comment="qt6-sql-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939045" comment="qt6-sql-sqlite-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939046" comment="qt6-sql-unixODBC-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939047" comment="qt6-test-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939048" comment="qt6-test-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939049" comment="qt6-widgets-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939050" comment="qt6-widgets-private-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939051" comment="qt6-xml-devel-6.7.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939052" comment="qt6-xml-private-devel-6.7.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252436" version="1" class="patch">
	<metadata>
		<title>znc-1.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39844" ref_url="https://www.suse.com/security/cve/CVE-2024-39844/" source="CVE"/>
		<description>
These are all security issues fixed in the znc-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39844/">CVE-2024-39844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39844">CVE-2024-39844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939053" comment="znc-1.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939054" comment="znc-devel-1.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939055" comment="znc-lang-1.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939056" comment="znc-perl-1.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939057" comment="znc-python3-1.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939058" comment="znc-tcl-1.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252437" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.61-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36387" ref_url="https://www.suse.com/security/cve/CVE-2024-36387/" source="CVE"/>
		<reference ref_id="CVE-2024-38472" ref_url="https://www.suse.com/security/cve/CVE-2024-38472/" source="CVE"/>
		<reference ref_id="CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<reference ref_id="CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573/" source="CVE"/>
		<reference ref_id="CVE-2024-39884" ref_url="https://www.suse.com/security/cve/CVE-2024-39884/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.61-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36387/">CVE-2024-36387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36387">CVE-2024-36387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38472/">CVE-2024-38472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38472">CVE-2024-38472 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39884/">CVE-2024-39884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39884">CVE-2024-39884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939059" comment="apache2-2.4.61-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252438" version="1" class="patch">
	<metadata>
		<title>emacs-29.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-29.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939060" comment="emacs-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939061" comment="emacs-el-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939062" comment="emacs-eln-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939063" comment="emacs-info-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939064" comment="emacs-nox-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939065" comment="emacs-x11-29.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939066" comment="etags-29.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252439" version="1" class="patch">
	<metadata>
		<title>python310-certifi-2024.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39689" ref_url="https://www.suse.com/security/cve/CVE-2024-39689/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-certifi-2024.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39689/">CVE-2024-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39689">CVE-2024-39689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939067" comment="python310-certifi-2024.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939068" comment="python311-certifi-2024.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939069" comment="python312-certifi-2024.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252440" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.91-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.91-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939070" comment="tomcat-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939071" comment="tomcat-admin-webapps-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939072" comment="tomcat-docs-webapp-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939073" comment="tomcat-el-3_0-api-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939074" comment="tomcat-embed-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939075" comment="tomcat-javadoc-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939076" comment="tomcat-jsp-2_3-api-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939077" comment="tomcat-jsvc-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939078" comment="tomcat-lib-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939079" comment="tomcat-servlet-4_0-api-9.0.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939080" comment="tomcat-webapps-9.0.91-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252441" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939081" comment="tomcat10-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939082" comment="tomcat10-admin-webapps-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939083" comment="tomcat10-doc-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939084" comment="tomcat10-docs-webapp-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939085" comment="tomcat10-el-5_0-api-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939086" comment="tomcat10-embed-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939087" comment="tomcat10-jsp-3_1-api-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939088" comment="tomcat10-jsvc-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939089" comment="tomcat10-lib-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939090" comment="tomcat10-servlet-6_0-api-10.1.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939091" comment="tomcat10-webapps-10.1.25-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252442" version="1" class="patch">
	<metadata>
		<title>cadvisor-0.49.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
These are all security issues fixed in the cadvisor-0.49.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939092" comment="cadvisor-0.49.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252443" version="1" class="patch">
	<metadata>
		<title>chromedriver-126.0.6478.126-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5830" ref_url="https://www.suse.com/security/cve/CVE-2024-5830/" source="CVE"/>
		<reference ref_id="CVE-2024-5831" ref_url="https://www.suse.com/security/cve/CVE-2024-5831/" source="CVE"/>
		<reference ref_id="CVE-2024-5832" ref_url="https://www.suse.com/security/cve/CVE-2024-5832/" source="CVE"/>
		<reference ref_id="CVE-2024-5833" ref_url="https://www.suse.com/security/cve/CVE-2024-5833/" source="CVE"/>
		<reference ref_id="CVE-2024-5834" ref_url="https://www.suse.com/security/cve/CVE-2024-5834/" source="CVE"/>
		<reference ref_id="CVE-2024-5835" ref_url="https://www.suse.com/security/cve/CVE-2024-5835/" source="CVE"/>
		<reference ref_id="CVE-2024-5836" ref_url="https://www.suse.com/security/cve/CVE-2024-5836/" source="CVE"/>
		<reference ref_id="CVE-2024-5837" ref_url="https://www.suse.com/security/cve/CVE-2024-5837/" source="CVE"/>
		<reference ref_id="CVE-2024-5838" ref_url="https://www.suse.com/security/cve/CVE-2024-5838/" source="CVE"/>
		<reference ref_id="CVE-2024-5839" ref_url="https://www.suse.com/security/cve/CVE-2024-5839/" source="CVE"/>
		<reference ref_id="CVE-2024-5840" ref_url="https://www.suse.com/security/cve/CVE-2024-5840/" source="CVE"/>
		<reference ref_id="CVE-2024-5841" ref_url="https://www.suse.com/security/cve/CVE-2024-5841/" source="CVE"/>
		<reference ref_id="CVE-2024-5842" ref_url="https://www.suse.com/security/cve/CVE-2024-5842/" source="CVE"/>
		<reference ref_id="CVE-2024-5843" ref_url="https://www.suse.com/security/cve/CVE-2024-5843/" source="CVE"/>
		<reference ref_id="CVE-2024-5844" ref_url="https://www.suse.com/security/cve/CVE-2024-5844/" source="CVE"/>
		<reference ref_id="CVE-2024-5845" ref_url="https://www.suse.com/security/cve/CVE-2024-5845/" source="CVE"/>
		<reference ref_id="CVE-2024-5846" ref_url="https://www.suse.com/security/cve/CVE-2024-5846/" source="CVE"/>
		<reference ref_id="CVE-2024-5847" ref_url="https://www.suse.com/security/cve/CVE-2024-5847/" source="CVE"/>
		<reference ref_id="CVE-2024-6100" ref_url="https://www.suse.com/security/cve/CVE-2024-6100/" source="CVE"/>
		<reference ref_id="CVE-2024-6101" ref_url="https://www.suse.com/security/cve/CVE-2024-6101/" source="CVE"/>
		<reference ref_id="CVE-2024-6102" ref_url="https://www.suse.com/security/cve/CVE-2024-6102/" source="CVE"/>
		<reference ref_id="CVE-2024-6103" ref_url="https://www.suse.com/security/cve/CVE-2024-6103/" source="CVE"/>
		<reference ref_id="CVE-2024-6290" ref_url="https://www.suse.com/security/cve/CVE-2024-6290/" source="CVE"/>
		<reference ref_id="CVE-2024-6291" ref_url="https://www.suse.com/security/cve/CVE-2024-6291/" source="CVE"/>
		<reference ref_id="CVE-2024-6292" ref_url="https://www.suse.com/security/cve/CVE-2024-6292/" source="CVE"/>
		<reference ref_id="CVE-2024-6293" ref_url="https://www.suse.com/security/cve/CVE-2024-6293/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-126.0.6478.126-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5830/">CVE-2024-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5830">CVE-2024-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5831/">CVE-2024-5831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5831">CVE-2024-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5832/">CVE-2024-5832 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5832">CVE-2024-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5833/">CVE-2024-5833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5833">CVE-2024-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5834/">CVE-2024-5834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5834">CVE-2024-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5835/">CVE-2024-5835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5835">CVE-2024-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5836/">CVE-2024-5836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5836">CVE-2024-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5837/">CVE-2024-5837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5837">CVE-2024-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5838/">CVE-2024-5838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5838">CVE-2024-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5839/">CVE-2024-5839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5839">CVE-2024-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5840/">CVE-2024-5840 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5840">CVE-2024-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5841/">CVE-2024-5841 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5841">CVE-2024-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5842/">CVE-2024-5842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5842">CVE-2024-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5843/">CVE-2024-5843 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5843">CVE-2024-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5844/">CVE-2024-5844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5844">CVE-2024-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5845/">CVE-2024-5845 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5845">CVE-2024-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5846/">CVE-2024-5846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5846">CVE-2024-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5847/">CVE-2024-5847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5847">CVE-2024-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6100/">CVE-2024-6100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6100">CVE-2024-6100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6101/">CVE-2024-6101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6101">CVE-2024-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6102/">CVE-2024-6102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6102">CVE-2024-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6103/">CVE-2024-6103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6103">CVE-2024-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6290/">CVE-2024-6290 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6290">CVE-2024-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6291/">CVE-2024-6291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6291">CVE-2024-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6292/">CVE-2024-6292 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6292">CVE-2024-6292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6293/">CVE-2024-6293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6293">CVE-2024-6293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939093" comment="chromedriver-126.0.6478.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939094" comment="chromium-126.0.6478.126-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252444" version="1" class="patch">
	<metadata>
		<title>global-6.6.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38448" ref_url="https://www.suse.com/security/cve/CVE-2024-38448/" source="CVE"/>
		<description>
These are all security issues fixed in the global-6.6.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38448/">CVE-2024-38448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38448">CVE-2024-38448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939095" comment="global-6.6.13-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252445" version="1" class="patch">
	<metadata>
		<title>gettext-its-gtk3-3.24.43-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<description>
These are all security issues fixed in the gettext-its-gtk3-3.24.43-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939096" comment="gettext-its-gtk3-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939097" comment="gtk3-branding-upstream-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939098" comment="gtk3-data-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939099" comment="gtk3-devel-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939100" comment="gtk3-devel-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939101" comment="gtk3-devel-doc-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939102" comment="gtk3-immodule-amharic-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939103" comment="gtk3-immodule-amharic-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939104" comment="gtk3-immodule-broadway-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939105" comment="gtk3-immodule-inuktitut-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939106" comment="gtk3-immodule-inuktitut-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939107" comment="gtk3-immodule-multipress-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939108" comment="gtk3-immodule-multipress-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939109" comment="gtk3-immodule-thai-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939110" comment="gtk3-immodule-thai-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939111" comment="gtk3-immodule-tigrigna-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939112" comment="gtk3-immodule-tigrigna-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939113" comment="gtk3-immodule-vietnamese-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939114" comment="gtk3-immodule-vietnamese-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939115" comment="gtk3-immodule-xim-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939116" comment="gtk3-immodule-xim-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939117" comment="gtk3-lang-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939118" comment="gtk3-schema-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939119" comment="gtk3-tools-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939120" comment="gtk3-tools-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939121" comment="libgtk-3-0-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939122" comment="libgtk-3-0-32bit-3.24.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939123" comment="typelib-1_0-Gtk-3_0-3.24.43-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252446" version="1" class="patch">
	<metadata>
		<title>iwd-2.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28084" ref_url="https://www.suse.com/security/cve/CVE-2024-28084/" source="CVE"/>
		<description>
These are all security issues fixed in the iwd-2.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28084/">CVE-2024-28084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28084">CVE-2024-28084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939124" comment="iwd-2.19-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252447" version="1" class="patch">
	<metadata>
		<title>obs-service-download_url-0.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22033" ref_url="https://www.suse.com/security/cve/CVE-2024-22033/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-download_url-0.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-22033/">CVE-2024-22033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22033">CVE-2024-22033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939125" comment="obs-service-download_url-0.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252448" version="1" class="patch">
	<metadata>
		<title>python310-Babel-2.14.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Babel-2.14.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939126" comment="python310-Babel-2.14.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939127" comment="python311-Babel-2.14.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939128" comment="python312-Babel-2.14.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252449" version="1" class="patch">
	<metadata>
		<title>python310-CherryPy-18.9.0-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-CherryPy-18.9.0-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939129" comment="python310-CherryPy-18.9.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939130" comment="python311-CherryPy-18.9.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939131" comment="python312-CherryPy-18.9.0-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252450" version="1" class="patch">
	<metadata>
		<title>python310-Flask-Cors-4.0.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-Cors-4.0.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25032">CVE-2020-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939132" comment="python310-Flask-Cors-4.0.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939133" comment="python311-Flask-Cors-4.0.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939134" comment="python312-Flask-Cors-4.0.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252451" version="1" class="patch">
	<metadata>
		<title>python-Scrapy-doc-2.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1968" ref_url="https://www.suse.com/security/cve/CVE-2024-1968/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Scrapy-doc-2.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-1968/">CVE-2024-1968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1968">CVE-2024-1968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939135" comment="python-Scrapy-doc-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939136" comment="python310-Scrapy-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939137" comment="python311-Scrapy-2.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939138" comment="python312-Scrapy-2.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252452" version="1" class="patch">
	<metadata>
		<title>python310-XStatic-jquery-ui-1.13.0.1-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7103" ref_url="https://www.suse.com/security/cve/CVE-2016-7103/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-XStatic-jquery-ui-1.13.0.1-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7103/">CVE-2016-7103 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7103">CVE-2016-7103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939139" comment="python310-XStatic-jquery-ui-1.13.0.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939140" comment="python311-XStatic-jquery-ui-1.13.0.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939141" comment="python312-XStatic-jquery-ui-1.13.0.1-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252453" version="1" class="patch">
	<metadata>
		<title>python310-asyncpg-0.29.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-17446" ref_url="https://www.suse.com/security/cve/CVE-2020-17446/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-asyncpg-0.29.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17446/">CVE-2020-17446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17446">CVE-2020-17446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939142" comment="python310-asyncpg-0.29.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939143" comment="python311-asyncpg-0.29.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939144" comment="python312-asyncpg-0.29.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252454" version="1" class="patch">
	<metadata>
		<title>python310-bjoern-3.2.2-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0219" ref_url="https://www.suse.com/security/cve/CVE-2015-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-bjoern-3.2.2-1.10 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0219/">CVE-2015-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0219">CVE-2015-0219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939145" comment="python310-bjoern-3.2.2-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939146" comment="python311-bjoern-3.2.2-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939147" comment="python312-bjoern-3.2.2-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252455" version="1" class="patch">
	<metadata>
		<title>python310-bleach-6.1.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-7753" ref_url="https://www.suse.com/security/cve/CVE-2018-7753/" source="CVE"/>
		<reference ref_id="CVE-2020-6802" ref_url="https://www.suse.com/security/cve/CVE-2020-6802/" source="CVE"/>
		<reference ref_id="CVE-2020-6816" ref_url="https://www.suse.com/security/cve/CVE-2020-6816/" source="CVE"/>
		<reference ref_id="CVE-2020-6817" ref_url="https://www.suse.com/security/cve/CVE-2020-6817/" source="CVE"/>
		<reference ref_id="CVE-2021-23980" ref_url="https://www.suse.com/security/cve/CVE-2021-23980/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-bleach-6.1.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7753/">CVE-2018-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7753">CVE-2018-7753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6802/">CVE-2020-6802 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6802">CVE-2020-6802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6816/">CVE-2020-6816 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6816">CVE-2020-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6817/">CVE-2020-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6817">CVE-2020-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23980/">CVE-2021-23980 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23980">CVE-2021-23980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939148" comment="python310-bleach-6.1.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939149" comment="python311-bleach-6.1.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939150" comment="python312-bleach-6.1.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252456" version="1" class="patch">
	<metadata>
		<title>python310-bugzilla-3.2.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2191" ref_url="https://www.suse.com/security/cve/CVE-2013-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-bugzilla-3.2.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2191/">CVE-2013-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2191">CVE-2013-2191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939151" comment="python310-bugzilla-3.2.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939152" comment="python311-bugzilla-3.2.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939153" comment="python312-bugzilla-3.2.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252457" version="1" class="patch">
	<metadata>
		<title>python310-colander-2.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18361" ref_url="https://www.suse.com/security/cve/CVE-2017-18361/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-colander-2.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18361/">CVE-2017-18361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18361">CVE-2017-18361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939154" comment="python310-colander-2.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939155" comment="python311-colander-2.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939156" comment="python312-colander-2.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252458" version="1" class="patch">
	<metadata>
		<title>python310-django-debug-toolbar-4.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-30459" ref_url="https://www.suse.com/security/cve/CVE-2021-30459/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-django-debug-toolbar-4.3-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30459/">CVE-2021-30459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30459">CVE-2021-30459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939157" comment="python310-django-debug-toolbar-4.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939158" comment="python311-django-debug-toolbar-4.3-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939159" comment="python312-django-debug-toolbar-4.3-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252459" version="1" class="patch">
	<metadata>
		<title>python310-django-registration-3.3-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21416" ref_url="https://www.suse.com/security/cve/CVE-2021-21416/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-django-registration-3.3-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21416/">CVE-2021-21416 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21416">CVE-2021-21416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939160" comment="python310-django-registration-3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939161" comment="python311-django-registration-3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939162" comment="python312-django-registration-3.3-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252460" version="1" class="patch">
	<metadata>
		<title>python310-dulwich-0.21.7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-0838" ref_url="https://www.suse.com/security/cve/CVE-2015-0838/" source="CVE"/>
		<reference ref_id="CVE-2017-16228" ref_url="https://www.suse.com/security/cve/CVE-2017-16228/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-dulwich-0.21.7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0838/">CVE-2015-0838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0838">CVE-2015-0838 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16228/">CVE-2017-16228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16228">CVE-2017-16228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939163" comment="python310-dulwich-0.21.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939164" comment="python311-dulwich-0.21.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939165" comment="python312-dulwich-0.21.7-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252461" version="1" class="patch">
	<metadata>
		<title>python310-hpack-4.0.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-6581" ref_url="https://www.suse.com/security/cve/CVE-2016-6581/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-hpack-4.0.0-2.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6581/">CVE-2016-6581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6581">CVE-2016-6581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939166" comment="python310-hpack-4.0.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939167" comment="python311-hpack-4.0.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939168" comment="python312-hpack-4.0.0-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252462" version="1" class="patch">
	<metadata>
		<title>python310-httplib2-0.22.0-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-httplib2-0.22.0-4.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939169" comment="python310-httplib2-0.22.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939170" comment="python311-httplib2-0.22.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939171" comment="python312-httplib2-0.22.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252463" version="1" class="patch">
	<metadata>
		<title>python310-impacket-0.11.0-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-31800" ref_url="https://www.suse.com/security/cve/CVE-2021-31800/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-impacket-0.11.0-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31800/">CVE-2021-31800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31800">CVE-2021-31800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939172" comment="python310-impacket-0.11.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939173" comment="python311-impacket-0.11.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939174" comment="python312-impacket-0.11.0-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252464" version="1" class="patch">
	<metadata>
		<title>python310-jupyter-server-2.13.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26232" ref_url="https://www.suse.com/security/cve/CVE-2020-26232/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jupyter-server-2.13.0-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26232/">CVE-2020-26232 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26232">CVE-2020-26232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939175" comment="python310-jupyter-server-2.13.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939176" comment="python310-jupyter-server-test-2.13.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939177" comment="python311-jupyter-server-2.13.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939178" comment="python311-jupyter-server-test-2.13.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939179" comment="python312-jupyter-server-2.13.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939180" comment="python312-jupyter-server-test-2.13.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252465" version="1" class="patch">
	<metadata>
		<title>python310-kubernetes-28.1.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-kubernetes-28.1.0-4.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939181" comment="python310-kubernetes-28.1.0-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939182" comment="python311-kubernetes-28.1.0-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939183" comment="python312-kubernetes-28.1.0-4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252466" version="1" class="patch">
	<metadata>
		<title>python310-logilab-common-1.11.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-1838" ref_url="https://www.suse.com/security/cve/CVE-2014-1838/" source="CVE"/>
		<reference ref_id="CVE-2014-1839" ref_url="https://www.suse.com/security/cve/CVE-2014-1839/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-logilab-common-1.11.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1838/">CVE-2014-1838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1838">CVE-2014-1838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1839/">CVE-2014-1839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1839">CVE-2014-1839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939184" comment="python310-logilab-common-1.11.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939185" comment="python311-logilab-common-1.11.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939186" comment="python312-logilab-common-1.11.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252467" version="1" class="patch">
	<metadata>
		<title>python310-markdown2-2.4.13-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-5773" ref_url="https://www.suse.com/security/cve/CVE-2018-5773/" source="CVE"/>
		<reference ref_id="CVE-2021-26813" ref_url="https://www.suse.com/security/cve/CVE-2021-26813/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-markdown2-2.4.13-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5773/">CVE-2018-5773 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5773">CVE-2018-5773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26813/">CVE-2021-26813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26813">CVE-2021-26813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939187" comment="python310-markdown2-2.4.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939188" comment="python311-markdown2-2.4.13-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939189" comment="python312-markdown2-2.4.13-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252468" version="1" class="patch">
	<metadata>
		<title>python-marshmallow-doc-3.20.2-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-17175" ref_url="https://www.suse.com/security/cve/CVE-2018-17175/" source="CVE"/>
		<description>
These are all security issues fixed in the python-marshmallow-doc-3.20.2-2.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17175/">CVE-2018-17175 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17175">CVE-2018-17175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939190" comment="python-marshmallow-doc-3.20.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939191" comment="python310-marshmallow-3.20.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939192" comment="python311-marshmallow-3.20.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939193" comment="python312-marshmallow-3.20.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252469" version="1" class="patch">
	<metadata>
		<title>python310-mistune-3.0.2-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-15612" ref_url="https://www.suse.com/security/cve/CVE-2017-15612/" source="CVE"/>
		<reference ref_id="CVE-2017-16876" ref_url="https://www.suse.com/security/cve/CVE-2017-16876/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mistune-3.0.2-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15612/">CVE-2017-15612 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15612">CVE-2017-15612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16876/">CVE-2017-16876 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16876">CVE-2017-16876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939194" comment="python310-mistune-3.0.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939195" comment="python311-mistune-3.0.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939196" comment="python312-mistune-3.0.2-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252470" version="1" class="patch">
	<metadata>
		<title>python310-mysql-connector-python-8.2.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-5598" ref_url="https://www.suse.com/security/cve/CVE-2016-5598/" source="CVE"/>
		<reference ref_id="CVE-2019-2435" ref_url="https://www.suse.com/security/cve/CVE-2019-2435/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mysql-connector-python-8.2.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5598/">CVE-2016-5598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5598">CVE-2016-5598 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2435/">CVE-2019-2435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2435">CVE-2019-2435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939197" comment="python310-mysql-connector-python-8.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939198" comment="python311-mysql-connector-python-8.2.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939199" comment="python312-mysql-connector-python-8.2.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252471" version="1" class="patch">
	<metadata>
		<title>python310-oic-1.5.0-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-26244" ref_url="https://www.suse.com/security/cve/CVE-2020-26244/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-oic-1.5.0-1.8 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26244/">CVE-2020-26244 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26244">CVE-2020-26244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939200" comment="python310-oic-1.5.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939201" comment="python311-oic-1.5.0-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939202" comment="python312-oic-1.5.0-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252472" version="1" class="patch">
	<metadata>
		<title>python310-oletools-0.60.1-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-27058" ref_url="https://www.suse.com/security/cve/CVE-2021-27058/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-oletools-0.60.1-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27058/">CVE-2021-27058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27058">CVE-2021-27058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939203" comment="python310-oletools-0.60.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939204" comment="python311-oletools-0.60.1-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939205" comment="python312-oletools-0.60.1-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252473" version="1" class="patch">
	<metadata>
		<title>python310-openapi-spec-validator-0.7.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-openapi-spec-validator-0.7.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939206" comment="python310-openapi-spec-validator-0.7.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939207" comment="python311-openapi-spec-validator-0.7.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939208" comment="python312-openapi-spec-validator-0.7.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252474" version="1" class="patch">
	<metadata>
		<title>python310-py-1.11.0-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-py-1.11.0-6.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939209" comment="python310-py-1.11.0-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939210" comment="python311-py-1.11.0-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939211" comment="python312-py-1.11.0-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252475" version="1" class="patch">
	<metadata>
		<title>python310-pyOpenSSL-24.1.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pyOpenSSL-24.1.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939212" comment="python310-pyOpenSSL-24.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939213" comment="python311-pyOpenSSL-24.1.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939214" comment="python312-pyOpenSSL-24.1.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252476" version="1" class="patch">
	<metadata>
		<title>python310-pyramid-2.0.2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pyramid-2.0.2-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4671">CVE-2014-4671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939215" comment="python310-pyramid-2.0.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939216" comment="python311-pyramid-2.0.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939217" comment="python312-pyramid-2.0.2-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252477" version="1" class="patch">
	<metadata>
		<title>python310-pysaml2-7.4.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-5390" ref_url="https://www.suse.com/security/cve/CVE-2020-5390/" source="CVE"/>
		<reference ref_id="CVE-2021-21238" ref_url="https://www.suse.com/security/cve/CVE-2021-21238/" source="CVE"/>
		<reference ref_id="CVE-2021-21239" ref_url="https://www.suse.com/security/cve/CVE-2021-21239/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pysaml2-7.4.2-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5390/">CVE-2020-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5390">CVE-2020-5390 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21238/">CVE-2021-21238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21238">CVE-2021-21238 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21239/">CVE-2021-21239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21239">CVE-2021-21239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939218" comment="python310-pysaml2-7.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939219" comment="python311-pysaml2-7.4.2-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939220" comment="python312-pysaml2-7.4.2-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252478" version="1" class="patch">
	<metadata>
		<title>python310-python-engineio-4.3.4-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13611" ref_url="https://www.suse.com/security/cve/CVE-2019-13611/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-engineio-4.3.4-3.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13611/">CVE-2019-13611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13611">CVE-2019-13611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939221" comment="python310-python-engineio-4.3.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939222" comment="python311-python-engineio-4.3.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939223" comment="python312-python-engineio-4.3.4-3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252479" version="1" class="patch">
	<metadata>
		<title>python310-python-gnupg-0.5.2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2019-6690" ref_url="https://www.suse.com/security/cve/CVE-2019-6690/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-gnupg-0.5.2-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6690/">CVE-2019-6690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6690">CVE-2019-6690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939224" comment="python310-python-gnupg-0.5.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939225" comment="python311-python-gnupg-0.5.2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939226" comment="python312-python-gnupg-0.5.2-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252480" version="1" class="patch">
	<metadata>
		<title>python310-python3-saml-1.15.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-11427" ref_url="https://www.suse.com/security/cve/CVE-2017-11427/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python3-saml-1.15.0-2.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11427/">CVE-2017-11427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11427">CVE-2017-11427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939227" comment="python310-python3-saml-1.15.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939228" comment="python311-python3-saml-1.15.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939229" comment="python312-python3-saml-1.15.0-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252481" version="1" class="patch">
	<metadata>
		<title>python310-reportlab-4.0.7-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-reportlab-4.0.7-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17626">CVE-2019-17626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939230" comment="python310-reportlab-4.0.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939231" comment="python311-reportlab-4.0.7-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939232" comment="python312-reportlab-4.0.7-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252482" version="1" class="patch">
	<metadata>
		<title>python310-rope-1.12.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3539" ref_url="https://www.suse.com/security/cve/CVE-2014-3539/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-rope-1.12.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3539/">CVE-2014-3539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3539">CVE-2014-3539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939233" comment="python310-rope-1.12.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939234" comment="python311-rope-1.12.0-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939235" comment="python312-rope-1.12.0-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252483" version="1" class="patch">
	<metadata>
		<title>python310-rpyc-6.0.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16328" ref_url="https://www.suse.com/security/cve/CVE-2019-16328/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-rpyc-6.0.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16328/">CVE-2019-16328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16328">CVE-2019-16328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939236" comment="python310-rpyc-6.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939237" comment="python311-rpyc-6.0.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939238" comment="python312-rpyc-6.0.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252484" version="1" class="patch">
	<metadata>
		<title>python310-rsa-4.9-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-rsa-4.9-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25658">CVE-2020-25658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939239" comment="python310-rsa-4.9-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939240" comment="python311-rsa-4.9-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939241" comment="python312-rsa-4.9-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252485" version="1" class="patch">
	<metadata>
		<title>python310-ruamel.yaml-0.18.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20478" ref_url="https://www.suse.com/security/cve/CVE-2019-20478/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-ruamel.yaml-0.18.6-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20478/">CVE-2019-20478 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20478">CVE-2019-20478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939242" comment="python310-ruamel.yaml-0.18.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939243" comment="python311-ruamel.yaml-0.18.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939244" comment="python312-ruamel.yaml-0.18.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252486" version="1" class="patch">
	<metadata>
		<title>python310-slixmpp-1.8.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5589" ref_url="https://www.suse.com/security/cve/CVE-2017-5589/" source="CVE"/>
		<reference ref_id="CVE-2019-1000021" ref_url="https://www.suse.com/security/cve/CVE-2019-1000021/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-slixmpp-1.8.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5589/">CVE-2017-5589 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5589">CVE-2017-5589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1000021/">CVE-2019-1000021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000021">CVE-2019-1000021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939245" comment="python310-slixmpp-1.8.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939246" comment="python311-slixmpp-1.8.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939247" comment="python312-slixmpp-1.8.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252487" version="1" class="patch">
	<metadata>
		<title>python310-websockets-12.0-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-1000518" ref_url="https://www.suse.com/security/cve/CVE-2018-1000518/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-websockets-12.0-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000518/">CVE-2018-1000518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000518">CVE-2018-1000518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939248" comment="python310-websockets-12.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939249" comment="python311-websockets-12.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939250" comment="python312-websockets-12.0-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252488" version="1" class="patch">
	<metadata>
		<title>python310-zipp-3.19.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5569" ref_url="https://www.suse.com/security/cve/CVE-2024-5569/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-zipp-3.19.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5569/">CVE-2024-5569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5569">CVE-2024-5569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939251" comment="python310-zipp-3.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939252" comment="python311-zipp-3.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939253" comment="python312-zipp-3.19.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252489" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-globalid-1.2.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22799" ref_url="https://www.suse.com/security/cve/CVE-2023-22799/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-globalid-1.2.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22799/">CVE-2023-22799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22799">CVE-2023-22799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939254" comment="ruby3.3-rubygem-globalid-1.2.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252490" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-jquery-rails-4.6.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-jquery-rails-4.6.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939255" comment="ruby3.3-rubygem-jquery-rails-4.6.0-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252491" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-kramdown-2.4.0-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-kramdown-2.4.0-1.12 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939256" comment="ruby3.3-rubygem-kramdown-2.4.0-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252492" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-loofah-2.22.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<reference ref_id="CVE-2022-23514" ref_url="https://www.suse.com/security/cve/CVE-2022-23514/" source="CVE"/>
		<reference ref_id="CVE-2022-23515" ref_url="https://www.suse.com/security/cve/CVE-2022-23515/" source="CVE"/>
		<reference ref_id="CVE-2022-23516" ref_url="https://www.suse.com/security/cve/CVE-2022-23516/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-loofah-2.22.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23514/">CVE-2022-23514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23514">CVE-2022-23514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23515/">CVE-2022-23515 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23515">CVE-2022-23515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23516/">CVE-2022-23516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23516">CVE-2022-23516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939257" comment="ruby3.3-rubygem-loofah-2.22.0-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252493" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-minitar-0.9-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-minitar-0.9-1.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939258" comment="ruby3.3-rubygem-minitar-0.9-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252494" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-multi_xml-0.6.0-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0175" ref_url="https://www.suse.com/security/cve/CVE-2013-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-multi_xml-0.6.0-1.27 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0175/">CVE-2013-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0175">CVE-2013-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939259" comment="ruby3.3-rubygem-multi_xml-0.6.0-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252495" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-nokogiri-1.15.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="CVE-2022-23476" ref_url="https://www.suse.com/security/cve/CVE-2022-23476/" source="CVE"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-24839" ref_url="https://www.suse.com/security/cve/CVE-2022-24839/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-nokogiri-1.15.5-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23476/">CVE-2022-23476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23476">CVE-2022-23476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24839/">CVE-2022-24839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939260" comment="ruby3.3-rubygem-nokogiri-1.15.5-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252496" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939261" comment="ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252497" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rubyzip-2.3.2-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5946" ref_url="https://www.suse.com/security/cve/CVE-2017-5946/" source="CVE"/>
		<reference ref_id="CVE-2018-1000544" ref_url="https://www.suse.com/security/cve/CVE-2018-1000544/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rubyzip-2.3.2-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5946/">CVE-2017-5946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5946">CVE-2017-5946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000544/">CVE-2018-1000544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000544">CVE-2018-1000544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939262" comment="ruby3.3-rubygem-rubyzip-2.3.2-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252498" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-sprockets-4.2.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-sprockets-4.2.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939263" comment="ruby3.3-rubygem-sprockets-4.2.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252499" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-tzinfo-1.2-1.2.11-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-31163" ref_url="https://www.suse.com/security/cve/CVE-2022-31163/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-tzinfo-1.2-1.2.11-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31163/">CVE-2022-31163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31163">CVE-2022-31163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939264" comment="ruby3.3-rubygem-tzinfo-1.2-1.2.11-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252500" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-web-console-4.2.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3224" ref_url="https://www.suse.com/security/cve/CVE-2015-3224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-web-console-4.2.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3224/">CVE-2015-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3224">CVE-2015-3224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939265" comment="ruby3.3-rubygem-web-console-4.2.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252501" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-websocket-extensions-0.1.5-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7663" ref_url="https://www.suse.com/security/cve/CVE-2020-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-websocket-extensions-0.1.5-1.20 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7663/">CVE-2020-7663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">CVE-2020-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939266" comment="ruby3.3-rubygem-websocket-extensions-0.1.5-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252502" version="1" class="patch">
	<metadata>
		<title>traefik-3.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39321" ref_url="https://www.suse.com/security/cve/CVE-2024-39321/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39321/">CVE-2024-39321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39321">CVE-2024-39321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939267" comment="traefik-3.0.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252503" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39321" ref_url="https://www.suse.com/security/cve/CVE-2024-39321/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39321/">CVE-2024-39321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39321">CVE-2024-39321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939268" comment="traefik2-2.11.6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252504" version="1" class="patch">
	<metadata>
		<title>trivy-0.53.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6257" ref_url="https://www.suse.com/security/cve/CVE-2024-6257/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.53.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6257/">CVE-2024-6257 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6257">CVE-2024-6257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939269" comment="trivy-0.53.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252505" version="1" class="patch">
	<metadata>
		<title>exiv2-0.28.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39695" ref_url="https://www.suse.com/security/cve/CVE-2024-39695/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.28.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-14"/>
	<updated date="2024-07-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39695/">CVE-2024-39695 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39695">CVE-2024-39695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939270" comment="exiv2-0.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939271" comment="exiv2-lang-0.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939272" comment="libexiv2-28-0.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939273" comment="libexiv2-28-x86-64-v3-0.28.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939274" comment="libexiv2-devel-0.28.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252506" version="1" class="patch">
	<metadata>
		<title>kubelogin-0.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the kubelogin-0.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-14"/>
	<updated date="2024-07-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939275" comment="kubelogin-0.1.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252507" version="1" class="patch">
	<metadata>
		<title>libreoffice-24.2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5261" ref_url="https://www.suse.com/security/cve/CVE-2024-5261/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-24.2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-14"/>
	<updated date="2024-07-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5261/">CVE-2024-5261 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5261">CVE-2024-5261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939276" comment="libreoffice-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939277" comment="libreoffice-base-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939278" comment="libreoffice-base-drivers-postgresql-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939279" comment="libreoffice-branding-upstream-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939280" comment="libreoffice-calc-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939281" comment="libreoffice-calc-extensions-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939282" comment="libreoffice-draw-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939283" comment="libreoffice-filters-optional-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939284" comment="libreoffice-gdb-pretty-printers-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939285" comment="libreoffice-glade-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939286" comment="libreoffice-gnome-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939287" comment="libreoffice-gtk3-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939288" comment="libreoffice-icon-themes-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939289" comment="libreoffice-impress-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939290" comment="libreoffice-kdeintegration-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939291" comment="libreoffice-l10n-af-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939292" comment="libreoffice-l10n-am-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939293" comment="libreoffice-l10n-ar-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939294" comment="libreoffice-l10n-as-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939295" comment="libreoffice-l10n-ast-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939296" comment="libreoffice-l10n-be-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939297" comment="libreoffice-l10n-bg-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939298" comment="libreoffice-l10n-bn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939299" comment="libreoffice-l10n-bn_IN-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939300" comment="libreoffice-l10n-bo-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939301" comment="libreoffice-l10n-br-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939302" comment="libreoffice-l10n-brx-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939303" comment="libreoffice-l10n-bs-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939304" comment="libreoffice-l10n-ca-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939305" comment="libreoffice-l10n-ca_valencia-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939306" comment="libreoffice-l10n-ckb-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939307" comment="libreoffice-l10n-cs-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939308" comment="libreoffice-l10n-cy-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939309" comment="libreoffice-l10n-da-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939310" comment="libreoffice-l10n-de-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939311" comment="libreoffice-l10n-dgo-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939312" comment="libreoffice-l10n-dsb-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939313" comment="libreoffice-l10n-dz-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939314" comment="libreoffice-l10n-el-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939315" comment="libreoffice-l10n-en-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939316" comment="libreoffice-l10n-en_GB-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939317" comment="libreoffice-l10n-en_ZA-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939318" comment="libreoffice-l10n-eo-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939319" comment="libreoffice-l10n-es-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939320" comment="libreoffice-l10n-et-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939321" comment="libreoffice-l10n-eu-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939322" comment="libreoffice-l10n-fa-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939323" comment="libreoffice-l10n-fi-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939324" comment="libreoffice-l10n-fr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939325" comment="libreoffice-l10n-fur-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939326" comment="libreoffice-l10n-fy-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939327" comment="libreoffice-l10n-ga-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939328" comment="libreoffice-l10n-gd-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939329" comment="libreoffice-l10n-gl-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939330" comment="libreoffice-l10n-gu-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939331" comment="libreoffice-l10n-gug-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939332" comment="libreoffice-l10n-he-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939333" comment="libreoffice-l10n-hi-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939334" comment="libreoffice-l10n-hr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939335" comment="libreoffice-l10n-hsb-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939336" comment="libreoffice-l10n-hu-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939337" comment="libreoffice-l10n-hy-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939338" comment="libreoffice-l10n-id-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939339" comment="libreoffice-l10n-is-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939340" comment="libreoffice-l10n-it-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939341" comment="libreoffice-l10n-ja-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939342" comment="libreoffice-l10n-ka-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939343" comment="libreoffice-l10n-kab-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939344" comment="libreoffice-l10n-kk-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939345" comment="libreoffice-l10n-km-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939346" comment="libreoffice-l10n-kmr_Latn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939347" comment="libreoffice-l10n-kn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939348" comment="libreoffice-l10n-ko-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939349" comment="libreoffice-l10n-kok-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939350" comment="libreoffice-l10n-ks-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939351" comment="libreoffice-l10n-lb-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939352" comment="libreoffice-l10n-lo-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939353" comment="libreoffice-l10n-lt-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939354" comment="libreoffice-l10n-lv-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939355" comment="libreoffice-l10n-mai-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939356" comment="libreoffice-l10n-mk-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939357" comment="libreoffice-l10n-ml-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939358" comment="libreoffice-l10n-mn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939359" comment="libreoffice-l10n-mni-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939360" comment="libreoffice-l10n-mr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939361" comment="libreoffice-l10n-my-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939362" comment="libreoffice-l10n-nb-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939363" comment="libreoffice-l10n-ne-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939364" comment="libreoffice-l10n-nl-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939365" comment="libreoffice-l10n-nn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939366" comment="libreoffice-l10n-nr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939367" comment="libreoffice-l10n-nso-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939368" comment="libreoffice-l10n-oc-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939369" comment="libreoffice-l10n-om-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939370" comment="libreoffice-l10n-or-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939371" comment="libreoffice-l10n-pa-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939372" comment="libreoffice-l10n-pl-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939373" comment="libreoffice-l10n-pt_BR-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939374" comment="libreoffice-l10n-pt_PT-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939375" comment="libreoffice-l10n-ro-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939376" comment="libreoffice-l10n-ru-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939377" comment="libreoffice-l10n-rw-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939378" comment="libreoffice-l10n-sa_IN-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939379" comment="libreoffice-l10n-sat-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939380" comment="libreoffice-l10n-sd-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939381" comment="libreoffice-l10n-si-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939382" comment="libreoffice-l10n-sid-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939383" comment="libreoffice-l10n-sk-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939384" comment="libreoffice-l10n-sl-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939385" comment="libreoffice-l10n-sq-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939386" comment="libreoffice-l10n-sr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939387" comment="libreoffice-l10n-ss-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939388" comment="libreoffice-l10n-st-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939389" comment="libreoffice-l10n-sv-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939390" comment="libreoffice-l10n-sw_TZ-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939391" comment="libreoffice-l10n-szl-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939392" comment="libreoffice-l10n-ta-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939393" comment="libreoffice-l10n-te-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939394" comment="libreoffice-l10n-tg-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939395" comment="libreoffice-l10n-th-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939396" comment="libreoffice-l10n-tn-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939397" comment="libreoffice-l10n-tr-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939398" comment="libreoffice-l10n-ts-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939399" comment="libreoffice-l10n-tt-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939400" comment="libreoffice-l10n-ug-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939401" comment="libreoffice-l10n-uk-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939402" comment="libreoffice-l10n-uz-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939403" comment="libreoffice-l10n-ve-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939404" comment="libreoffice-l10n-vec-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939405" comment="libreoffice-l10n-vi-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939406" comment="libreoffice-l10n-xh-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939407" comment="libreoffice-l10n-zh_CN-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939408" comment="libreoffice-l10n-zh_TW-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939409" comment="libreoffice-l10n-zu-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939410" comment="libreoffice-librelogo-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939411" comment="libreoffice-mailmerge-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939412" comment="libreoffice-math-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939413" comment="libreoffice-officebean-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939414" comment="libreoffice-pyuno-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939415" comment="libreoffice-qt5-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939416" comment="libreoffice-qt6-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939417" comment="libreoffice-sdk-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939418" comment="libreoffice-sdk-doc-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939419" comment="libreoffice-writer-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939420" comment="libreoffice-writer-extensions-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939421" comment="libreofficekit-24.2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939422" comment="libreofficekit-devel-24.2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252508" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-11.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38526" ref_url="https://www.suse.com/security/cve/CVE-2024-38526/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-11.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-14"/>
	<updated date="2024-07-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38526/">CVE-2024-38526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38526">CVE-2024-38526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939423" comment="libnetpbm-devel-11.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939424" comment="libnetpbm11-11.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939425" comment="libnetpbm11-32bit-11.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939426" comment="netpbm-11.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252509" version="1" class="patch">
	<metadata>
		<title>Botan-doc-2.19.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34702" ref_url="https://www.suse.com/security/cve/CVE-2024-34702/" source="CVE"/>
		<reference ref_id="CVE-2024-34703" ref_url="https://www.suse.com/security/cve/CVE-2024-34703/" source="CVE"/>
		<reference ref_id="CVE-2024-39312" ref_url="https://www.suse.com/security/cve/CVE-2024-39312/" source="CVE"/>
		<description>
These are all security issues fixed in the Botan-doc-2.19.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34702/">CVE-2024-34702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34702">CVE-2024-34702 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34703/">CVE-2024-34703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34703">CVE-2024-34703 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-39312/">CVE-2024-39312 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39312">CVE-2024-39312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939427" comment="Botan-doc-2.19.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939428" comment="libbotan-2-19-2.19.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939429" comment="libbotan-devel-2.19.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939430" comment="python3-botan-2.19.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252510" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939431" comment="MozillaThunderbird-115.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939432" comment="MozillaThunderbird-openpgp-librnp-115.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939433" comment="MozillaThunderbird-translations-common-115.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939434" comment="MozillaThunderbird-translations-other-115.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252511" version="1" class="patch">
	<metadata>
		<title>conftest-0.54.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6257" ref_url="https://www.suse.com/security/cve/CVE-2024-6257/" source="CVE"/>
		<description>
These are all security issues fixed in the conftest-0.54.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6257/">CVE-2024-6257 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6257">CVE-2024-6257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939435" comment="conftest-0.54.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939436" comment="conftest-bash-completion-0.54.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939437" comment="conftest-fish-completion-0.54.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939438" comment="conftest-zsh-completion-0.54.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252512" version="1" class="patch">
	<metadata>
		<title>gtk2-branding-upstream-2.24.33-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-branding-upstream-2.24.33-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939439" comment="gtk2-branding-upstream-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939440" comment="gtk2-data-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939441" comment="gtk2-devel-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939442" comment="gtk2-devel-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939443" comment="gtk2-immodule-amharic-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939444" comment="gtk2-immodule-amharic-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939445" comment="gtk2-immodule-inuktitut-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939446" comment="gtk2-immodule-inuktitut-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939447" comment="gtk2-immodule-multipress-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939448" comment="gtk2-immodule-multipress-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939449" comment="gtk2-immodule-thai-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939450" comment="gtk2-immodule-thai-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939451" comment="gtk2-immodule-tigrigna-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939452" comment="gtk2-immodule-tigrigna-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939453" comment="gtk2-immodule-vietnamese-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939454" comment="gtk2-immodule-vietnamese-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939455" comment="gtk2-immodule-xim-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939456" comment="gtk2-immodule-xim-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939457" comment="gtk2-lang-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939458" comment="gtk2-tools-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939459" comment="gtk2-tools-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939460" comment="libgtk-2_0-0-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939461" comment="libgtk-2_0-0-32bit-2.24.33-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939462" comment="typelib-1_0-Gtk-2_0-2.24.33-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252513" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20240712-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47210" ref_url="https://www.suse.com/security/cve/CVE-2023-47210/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20240712-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47210/">CVE-2023-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47210">CVE-2023-47210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939463" comment="kernel-firmware-all-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939464" comment="kernel-firmware-amdgpu-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939465" comment="kernel-firmware-ath10k-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939466" comment="kernel-firmware-ath11k-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939467" comment="kernel-firmware-ath12k-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939468" comment="kernel-firmware-atheros-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939469" comment="kernel-firmware-bluetooth-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939470" comment="kernel-firmware-bnx2-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939471" comment="kernel-firmware-brcm-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939472" comment="kernel-firmware-chelsio-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939473" comment="kernel-firmware-dpaa2-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939474" comment="kernel-firmware-i915-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939475" comment="kernel-firmware-intel-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939476" comment="kernel-firmware-iwlwifi-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939477" comment="kernel-firmware-liquidio-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939478" comment="kernel-firmware-marvell-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939479" comment="kernel-firmware-media-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939480" comment="kernel-firmware-mediatek-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939481" comment="kernel-firmware-mellanox-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939482" comment="kernel-firmware-mwifiex-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939483" comment="kernel-firmware-network-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939484" comment="kernel-firmware-nfp-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939485" comment="kernel-firmware-nvidia-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939486" comment="kernel-firmware-platform-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939487" comment="kernel-firmware-prestera-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939488" comment="kernel-firmware-qcom-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939489" comment="kernel-firmware-qlogic-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939490" comment="kernel-firmware-radeon-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939491" comment="kernel-firmware-realtek-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939492" comment="kernel-firmware-serial-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939493" comment="kernel-firmware-sound-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939494" comment="kernel-firmware-ti-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939495" comment="kernel-firmware-ueagle-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939496" comment="kernel-firmware-usb-network-20240712-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939497" comment="ucode-amd-20240712-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252514" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-30.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5493" ref_url="https://www.suse.com/security/cve/CVE-2024-5493/" source="CVE"/>
		<reference ref_id="CVE-2024-6291" ref_url="https://www.suse.com/security/cve/CVE-2024-6291/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-30.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5493/">CVE-2024-5493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5493">CVE-2024-5493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6291/">CVE-2024-6291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6291">CVE-2024-6291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939498" comment="nodejs-electron-30.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939499" comment="nodejs-electron-devel-30.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939500" comment="nodejs-electron-doc-30.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252515" version="1" class="patch">
	<metadata>
		<title>ntpd-rs-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38528" ref_url="https://www.suse.com/security/cve/CVE-2024-38528/" source="CVE"/>
		<description>
These are all security issues fixed in the ntpd-rs-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38528/">CVE-2024-38528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38528">CVE-2024-38528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939501" comment="ntpd-rs-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939502" comment="ntpd-rs-common-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252516" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.23.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.23.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939503" comment="openCryptoki-3.23.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939504" comment="openCryptoki-64bit-3.23.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939505" comment="openCryptoki-devel-3.23.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252517" version="1" class="patch">
	<metadata>
		<title>exim-4.98-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39929" ref_url="https://www.suse.com/security/cve/CVE-2024-39929/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.98-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39929/">CVE-2024-39929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39929">CVE-2024-39929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939506" comment="exim-4.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939507" comment="eximon-4.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939508" comment="eximstats-html-4.98-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252518" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-128.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="CVE-2024-6605" ref_url="https://www.suse.com/security/cve/CVE-2024-6605/" source="CVE"/>
		<reference ref_id="CVE-2024-6606" ref_url="https://www.suse.com/security/cve/CVE-2024-6606/" source="CVE"/>
		<reference ref_id="CVE-2024-6607" ref_url="https://www.suse.com/security/cve/CVE-2024-6607/" source="CVE"/>
		<reference ref_id="CVE-2024-6608" ref_url="https://www.suse.com/security/cve/CVE-2024-6608/" source="CVE"/>
		<reference ref_id="CVE-2024-6609" ref_url="https://www.suse.com/security/cve/CVE-2024-6609/" source="CVE"/>
		<reference ref_id="CVE-2024-6610" ref_url="https://www.suse.com/security/cve/CVE-2024-6610/" source="CVE"/>
		<reference ref_id="CVE-2024-6611" ref_url="https://www.suse.com/security/cve/CVE-2024-6611/" source="CVE"/>
		<reference ref_id="CVE-2024-6612" ref_url="https://www.suse.com/security/cve/CVE-2024-6612/" source="CVE"/>
		<reference ref_id="CVE-2024-6613" ref_url="https://www.suse.com/security/cve/CVE-2024-6613/" source="CVE"/>
		<reference ref_id="CVE-2024-6614" ref_url="https://www.suse.com/security/cve/CVE-2024-6614/" source="CVE"/>
		<reference ref_id="CVE-2024-6615" ref_url="https://www.suse.com/security/cve/CVE-2024-6615/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-128.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6605/">CVE-2024-6605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6605">CVE-2024-6605 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6606/">CVE-2024-6606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6607/">CVE-2024-6607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6608/">CVE-2024-6608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6609/">CVE-2024-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6610/">CVE-2024-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6611/">CVE-2024-6611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6612/">CVE-2024-6612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6613/">CVE-2024-6613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6614/">CVE-2024-6614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6615/">CVE-2024-6615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939509" comment="MozillaFirefox-128.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939510" comment="MozillaFirefox-branding-upstream-128.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939511" comment="MozillaFirefox-devel-128.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939512" comment="MozillaFirefox-translations-common-128.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939513" comment="MozillaFirefox-translations-other-128.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252519" version="1" class="patch">
	<metadata>
		<title>istioctl-1.22.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-39305" ref_url="https://www.suse.com/security/cve/CVE-2024-39305/" source="CVE"/>
		<description>
These are all security issues fixed in the istioctl-1.22.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39305/">CVE-2024-39305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39305">CVE-2024-39305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939514" comment="istioctl-1.22.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939515" comment="istioctl-bash-completion-1.22.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939516" comment="istioctl-zsh-completion-1.22.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252520" version="1" class="patch">
	<metadata>
		<title>ovmf-202402-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229/" source="CVE"/>
		<reference ref_id="CVE-2023-45230" ref_url="https://www.suse.com/security/cve/CVE-2023-45230/" source="CVE"/>
		<reference ref_id="CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231/" source="CVE"/>
		<reference ref_id="CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232/" source="CVE"/>
		<reference ref_id="CVE-2023-45234" ref_url="https://www.suse.com/security/cve/CVE-2023-45234/" source="CVE"/>
		<reference ref_id="CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202402-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45230/">CVE-2023-45230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45230">CVE-2023-45230 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45234/">CVE-2023-45234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45234">CVE-2023-45234 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939517" comment="ovmf-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939518" comment="ovmf-tools-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939519" comment="qemu-ovmf-ia32-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939520" comment="qemu-ovmf-x86_64-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939521" comment="qemu-ovmf-x86_64-debug-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939522" comment="qemu-uefi-aarch32-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939523" comment="qemu-uefi-aarch64-202402-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939524" comment="qemu-uefi-riscv64-202402-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252521" version="1" class="patch">
	<metadata>
		<title>OpenImageIO-2.5.13.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40630" ref_url="https://www.suse.com/security/cve/CVE-2024-40630/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenImageIO-2.5.13.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40630/">CVE-2024-40630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40630">CVE-2024-40630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939525" comment="OpenImageIO-2.5.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939526" comment="OpenImageIO-devel-2.5.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939527" comment="libOpenImageIO2_5-2.5.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939528" comment="libOpenImageIO_Util2_5-2.5.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939529" comment="python3-OpenImageIO-2.5.13.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252522" version="1" class="patch">
	<metadata>
		<title>gnome-extensions-46.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-extensions-46.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939530" comment="gnome-extensions-46.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939531" comment="gnome-shell-46.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939532" comment="gnome-shell-calendar-46.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939533" comment="gnome-shell-devel-46.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939534" comment="gnome-shell-lang-46.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252523" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939535" comment="java-17-openjdk-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939536" comment="java-17-openjdk-demo-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939537" comment="java-17-openjdk-devel-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939538" comment="java-17-openjdk-headless-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939539" comment="java-17-openjdk-javadoc-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939540" comment="java-17-openjdk-jmods-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939541" comment="java-17-openjdk-src-17.0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252524" version="1" class="patch">
	<metadata>
		<title>python310-Django-5.0.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38875" ref_url="https://www.suse.com/security/cve/CVE-2024-38875/" source="CVE"/>
		<reference ref_id="CVE-2024-39329" ref_url="https://www.suse.com/security/cve/CVE-2024-39329/" source="CVE"/>
		<reference ref_id="CVE-2024-39330" ref_url="https://www.suse.com/security/cve/CVE-2024-39330/" source="CVE"/>
		<reference ref_id="CVE-2024-39614" ref_url="https://www.suse.com/security/cve/CVE-2024-39614/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-5.0.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38875/">CVE-2024-38875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38875">CVE-2024-38875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39329/">CVE-2024-39329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39329">CVE-2024-39329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39330/">CVE-2024-39330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39330">CVE-2024-39330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39614/">CVE-2024-39614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39614">CVE-2024-39614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939542" comment="python310-Django-5.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939543" comment="python311-Django-5.0.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939544" comment="python312-Django-5.0.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252525" version="1" class="patch">
	<metadata>
		<title>xen-4.18.2_06-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31143" ref_url="https://www.suse.com/security/cve/CVE-2024-31143/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.18.2_06-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31143/">CVE-2024-31143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31143">CVE-2024-31143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939545" comment="xen-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939546" comment="xen-devel-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939547" comment="xen-doc-html-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939548" comment="xen-libs-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939549" comment="xen-tools-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939550" comment="xen-tools-domU-4.18.2_06-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939551" comment="xen-tools-xendomains-wait-disk-4.18.2_06-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252526" version="1" class="patch">
	<metadata>
		<title>chromedriver-126.0.6478.182-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6772" ref_url="https://www.suse.com/security/cve/CVE-2024-6772/" source="CVE"/>
		<reference ref_id="CVE-2024-6773" ref_url="https://www.suse.com/security/cve/CVE-2024-6773/" source="CVE"/>
		<reference ref_id="CVE-2024-6774" ref_url="https://www.suse.com/security/cve/CVE-2024-6774/" source="CVE"/>
		<reference ref_id="CVE-2024-6775" ref_url="https://www.suse.com/security/cve/CVE-2024-6775/" source="CVE"/>
		<reference ref_id="CVE-2024-6776" ref_url="https://www.suse.com/security/cve/CVE-2024-6776/" source="CVE"/>
		<reference ref_id="CVE-2024-6777" ref_url="https://www.suse.com/security/cve/CVE-2024-6777/" source="CVE"/>
		<reference ref_id="CVE-2024-6778" ref_url="https://www.suse.com/security/cve/CVE-2024-6778/" source="CVE"/>
		<reference ref_id="CVE-2024-6779" ref_url="https://www.suse.com/security/cve/CVE-2024-6779/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-126.0.6478.182-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6772/">CVE-2024-6772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6772">CVE-2024-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6773/">CVE-2024-6773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6773">CVE-2024-6773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6774/">CVE-2024-6774 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6774">CVE-2024-6774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6775/">CVE-2024-6775 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6775">CVE-2024-6775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6776/">CVE-2024-6776 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6776">CVE-2024-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6777/">CVE-2024-6777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6777">CVE-2024-6777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6778/">CVE-2024-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6778">CVE-2024-6778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6779/">CVE-2024-6779 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6779">CVE-2024-6779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939552" comment="chromedriver-126.0.6478.182-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939553" comment="chromium-126.0.6478.182-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252527" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.24.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.24.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939554" comment="java-11-openjdk-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939555" comment="java-11-openjdk-demo-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939556" comment="java-11-openjdk-devel-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939557" comment="java-11-openjdk-headless-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939558" comment="java-11-openjdk-javadoc-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939559" comment="java-11-openjdk-jmods-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939560" comment="java-11-openjdk-src-11.0.24.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252528" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939561" comment="java-21-openjdk-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939562" comment="java-21-openjdk-demo-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939563" comment="java-21-openjdk-devel-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939564" comment="java-21-openjdk-headless-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939565" comment="java-21-openjdk-javadoc-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939566" comment="java-21-openjdk-jmods-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939567" comment="java-21-openjdk-src-21.0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252529" version="1" class="patch">
	<metadata>
		<title>python310-Django4-4.2.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3982" ref_url="https://www.suse.com/security/cve/CVE-2015-3982/" source="CVE"/>
		<reference ref_id="CVE-2015-5145" ref_url="https://www.suse.com/security/cve/CVE-2015-5145/" source="CVE"/>
		<reference ref_id="CVE-2015-5963" ref_url="https://www.suse.com/security/cve/CVE-2015-5963/" source="CVE"/>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<reference ref_id="CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794/" source="CVE"/>
		<reference ref_id="CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233/" source="CVE"/>
		<reference ref_id="CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234/" source="CVE"/>
		<reference ref_id="CVE-2018-16984" ref_url="https://www.suse.com/security/cve/CVE-2018-16984/" source="CVE"/>
		<reference ref_id="CVE-2018-6188" ref_url="https://www.suse.com/security/cve/CVE-2018-6188/" source="CVE"/>
		<reference ref_id="CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536/" source="CVE"/>
		<reference ref_id="CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-24583" ref_url="https://www.suse.com/security/cve/CVE-2020-24583/" source="CVE"/>
		<reference ref_id="CVE-2020-24584" ref_url="https://www.suse.com/security/cve/CVE-2020-24584/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-32052" ref_url="https://www.suse.com/security/cve/CVE-2021-32052/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="CVE-2021-35042" ref_url="https://www.suse.com/security/cve/CVE-2021-35042/" source="CVE"/>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-28347" ref_url="https://www.suse.com/security/cve/CVE-2022-28347/" source="CVE"/>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<reference ref_id="CVE-2022-36359" ref_url="https://www.suse.com/security/cve/CVE-2022-36359/" source="CVE"/>
		<reference ref_id="CVE-2022-41323" ref_url="https://www.suse.com/security/cve/CVE-2022-41323/" source="CVE"/>
		<reference ref_id="CVE-2023-23969" ref_url="https://www.suse.com/security/cve/CVE-2023-23969/" source="CVE"/>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<reference ref_id="CVE-2023-31047" ref_url="https://www.suse.com/security/cve/CVE-2023-31047/" source="CVE"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="CVE-2023-41164" ref_url="https://www.suse.com/security/cve/CVE-2023-41164/" source="CVE"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<reference ref_id="CVE-2024-24680" ref_url="https://www.suse.com/security/cve/CVE-2024-24680/" source="CVE"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="CVE-2024-38875" ref_url="https://www.suse.com/security/cve/CVE-2024-38875/" source="CVE"/>
		<reference ref_id="CVE-2024-39329" ref_url="https://www.suse.com/security/cve/CVE-2024-39329/" source="CVE"/>
		<reference ref_id="CVE-2024-39330" ref_url="https://www.suse.com/security/cve/CVE-2024-39330/" source="CVE"/>
		<reference ref_id="CVE-2024-39614" ref_url="https://www.suse.com/security/cve/CVE-2024-39614/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django4-4.2.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3982/">CVE-2015-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3982">CVE-2015-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5145/">CVE-2015-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5145">CVE-2015-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5963/">CVE-2015-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5963">CVE-2015-5963 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12794">CVE-2017-12794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7233">CVE-2017-7233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7234">CVE-2017-7234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16984/">CVE-2018-16984 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16984">CVE-2018-16984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6188/">CVE-2018-6188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6188">CVE-2018-6188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7536">CVE-2018-7536 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7537">CVE-2018-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19118">CVE-2019-19118 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24583/">CVE-2020-24583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24583">CVE-2020-24583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24584/">CVE-2020-24584 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24584">CVE-2020-24584 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32052/">CVE-2021-32052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32052">CVE-2021-32052 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35042/">CVE-2021-35042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35042">CVE-2021-35042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28347/">CVE-2022-28347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28347">CVE-2022-28347 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-36359/">CVE-2022-36359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36359">CVE-2022-36359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41323/">CVE-2022-41323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41323">CVE-2022-41323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23969/">CVE-2023-23969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23969">CVE-2023-23969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-31047/">CVE-2023-31047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31047">CVE-2023-31047 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41164/">CVE-2023-41164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41164">CVE-2023-41164 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24680/">CVE-2024-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24680">CVE-2024-24680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38875/">CVE-2024-38875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38875">CVE-2024-38875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39329/">CVE-2024-39329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39329">CVE-2024-39329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39330/">CVE-2024-39330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39330">CVE-2024-39330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39614/">CVE-2024-39614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39614">CVE-2024-39614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939568" comment="python310-Django4-4.2.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939569" comment="python311-Django4-4.2.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939570" comment="python312-Django4-4.2.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252530" version="1" class="patch">
	<metadata>
		<title>python310-sentry-sdk-2.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40647" ref_url="https://www.suse.com/security/cve/CVE-2024-40647/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-sentry-sdk-2.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40647/">CVE-2024-40647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40647">CVE-2024-40647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939571" comment="python310-sentry-sdk-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939572" comment="python311-sentry-sdk-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939573" comment="python312-sentry-sdk-2.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252531" version="1" class="patch">
	<metadata>
		<title>weblate-5.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39303" ref_url="https://www.suse.com/security/cve/CVE-2024-39303/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39303/">CVE-2024-39303 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39303">CVE-2024-39303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939574" comment="weblate-5.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939575" comment="weblate-doc-5.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252532" version="1" class="patch">
	<metadata>
		<title>gh-2.53.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the gh-2.53.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939576" comment="gh-2.53.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939577" comment="gh-bash-completion-2.53.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939578" comment="gh-fish-completion-2.53.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939579" comment="gh-zsh-completion-2.53.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252533" version="1" class="patch">
	<metadata>
		<title>git-2.45.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.45.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939580" comment="git-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939581" comment="git-arch-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939582" comment="git-core-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939583" comment="git-credential-libsecret-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939584" comment="git-cvs-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939585" comment="git-daemon-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939586" comment="git-doc-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939587" comment="git-email-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939588" comment="git-gui-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939589" comment="git-p4-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939590" comment="git-svn-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939591" comment="git-web-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939592" comment="gitk-2.45.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939593" comment="perl-Git-2.45.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252534" version="1" class="patch">
	<metadata>
		<title>java-22-openjdk-22.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-22-openjdk-22.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939594" comment="java-22-openjdk-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939595" comment="java-22-openjdk-demo-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939596" comment="java-22-openjdk-devel-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939597" comment="java-22-openjdk-headless-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939598" comment="java-22-openjdk-javadoc-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939599" comment="java-22-openjdk-jmods-22.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939600" comment="java-22-openjdk-src-22.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252535" version="1" class="patch">
	<metadata>
		<title>corepack20-20.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-27980" ref_url="https://www.suse.com/security/cve/CVE-2024-27980/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<reference ref_id="CVE-2024-37372" ref_url="https://www.suse.com/security/cve/CVE-2024-37372/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack20-20.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27980/">CVE-2024-27980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27980">CVE-2024-27980 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37372/">CVE-2024-37372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37372">CVE-2024-37372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939601" comment="corepack20-20.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939602" comment="nodejs20-20.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939603" comment="nodejs20-devel-20.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939604" comment="nodejs20-docs-20.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939605" comment="npm20-20.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252536" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.14+kde143-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.14+kde143-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-24"/>
	<updated date="2024-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939606" comment="libQt5Bootstrap-devel-static-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939607" comment="libQt5Bootstrap-devel-static-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939608" comment="libQt5Concurrent-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939609" comment="libQt5Concurrent-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939610" comment="libQt5Concurrent5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939611" comment="libQt5Concurrent5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939612" comment="libQt5Core-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939613" comment="libQt5Core-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939614" comment="libQt5Core-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939615" comment="libQt5Core5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939616" comment="libQt5Core5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939617" comment="libQt5DBus-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939618" comment="libQt5DBus-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939619" comment="libQt5DBus-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939620" comment="libQt5DBus5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939621" comment="libQt5DBus5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939622" comment="libQt5Gui-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939623" comment="libQt5Gui-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939624" comment="libQt5Gui-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939625" comment="libQt5Gui5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939626" comment="libQt5Gui5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939627" comment="libQt5KmsSupport-devel-static-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939628" comment="libQt5KmsSupport-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939629" comment="libQt5Network-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939630" comment="libQt5Network-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939631" comment="libQt5Network-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939632" comment="libQt5Network5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939633" comment="libQt5Network5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939634" comment="libQt5OpenGL-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939635" comment="libQt5OpenGL-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939636" comment="libQt5OpenGL-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939637" comment="libQt5OpenGL5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939638" comment="libQt5OpenGL5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939639" comment="libQt5OpenGLExtensions-devel-static-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939640" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939641" comment="libQt5PlatformHeaders-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939642" comment="libQt5PlatformSupport-devel-static-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939643" comment="libQt5PlatformSupport-devel-static-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939644" comment="libQt5PlatformSupport-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939645" comment="libQt5PrintSupport-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939646" comment="libQt5PrintSupport-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939647" comment="libQt5PrintSupport-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939648" comment="libQt5PrintSupport5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939649" comment="libQt5PrintSupport5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939650" comment="libQt5Sql-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939651" comment="libQt5Sql-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939652" comment="libQt5Sql-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939653" comment="libQt5Sql5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939654" comment="libQt5Sql5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939655" comment="libQt5Sql5-mysql-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939656" comment="libQt5Sql5-mysql-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939657" comment="libQt5Sql5-postgresql-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939658" comment="libQt5Sql5-postgresql-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939659" comment="libQt5Sql5-sqlite-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939660" comment="libQt5Sql5-sqlite-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939661" comment="libQt5Sql5-unixODBC-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939662" comment="libQt5Sql5-unixODBC-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939663" comment="libQt5Test-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939664" comment="libQt5Test-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939665" comment="libQt5Test-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939666" comment="libQt5Test5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939667" comment="libQt5Test5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939668" comment="libQt5Widgets-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939669" comment="libQt5Widgets-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939670" comment="libQt5Widgets-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939671" comment="libQt5Widgets5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939672" comment="libQt5Widgets5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939673" comment="libQt5Xml-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939674" comment="libQt5Xml-devel-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939675" comment="libQt5Xml5-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939676" comment="libQt5Xml5-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939677" comment="libqt5-qtbase-common-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939678" comment="libqt5-qtbase-devel-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939679" comment="libqt5-qtbase-examples-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939680" comment="libqt5-qtbase-examples-32bit-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939681" comment="libqt5-qtbase-platformtheme-gtk3-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939682" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.14+kde143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939683" comment="libqt5-qtbase-private-headers-devel-5.15.14+kde143-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252537" version="1" class="patch">
	<metadata>
		<title>liborc-0_4-0-0.4.39-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<description>
These are all security issues fixed in the liborc-0_4-0-0.4.39-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-24"/>
	<updated date="2024-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939684" comment="liborc-0_4-0-0.4.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939685" comment="liborc-0_4-0-32bit-0.4.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939686" comment="orc-0.4.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939687" comment="orc-doc-0.4.39-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252538" version="1" class="patch">
	<metadata>
		<title>bind-9.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0760" ref_url="https://www.suse.com/security/cve/CVE-2024-0760/" source="CVE"/>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<reference ref_id="CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0760/">CVE-2024-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0760">CVE-2024-0760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939688" comment="bind-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939689" comment="bind-doc-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939690" comment="bind-modules-bdbhpt-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939691" comment="bind-modules-generic-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939692" comment="bind-modules-ldap-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939693" comment="bind-modules-mysql-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939694" comment="bind-modules-perl-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939695" comment="bind-modules-sqlite3-9.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939696" comment="bind-utils-9.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252539" version="1" class="patch">
	<metadata>
		<title>golang-github-lusitaniae-apache_exporter-1.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-3978" ref_url="https://www.suse.com/security/cve/CVE-2023-3978/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-lusitaniae-apache_exporter-1.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-3978/">CVE-2023-3978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3978">CVE-2023-3978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939697" comment="golang-github-lusitaniae-apache_exporter-1.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252540" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1w-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1w-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939698" comment="libopenssl-1_1-devel-1.1.1w-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939699" comment="libopenssl-1_1-devel-32bit-1.1.1w-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939700" comment="libopenssl1_1-1.1.1w-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939701" comment="libopenssl1_1-32bit-1.1.1w-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939702" comment="openssl-1_1-1.1.1w-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939703" comment="openssl-1_1-doc-1.1.1w-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252541" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939704" comment="libopenssl-3-devel-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939705" comment="libopenssl-3-devel-32bit-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939706" comment="libopenssl-3-fips-provider-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939707" comment="libopenssl-3-fips-provider-32bit-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939708" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939709" comment="libopenssl3-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939710" comment="libopenssl3-32bit-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939711" comment="libopenssl3-x86-64-v3-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939712" comment="openssl-3-3.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939713" comment="openssl-3-doc-3.1.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252542" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32228" ref_url="https://www.suse.com/security/cve/CVE-2024-32228/" source="CVE"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-28"/>
	<updated date="2024-07-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32228/">CVE-2024-32228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32228">CVE-2024-32228 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939714" comment="ffmpeg-5-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939715" comment="ffmpeg-5-libavcodec-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939716" comment="ffmpeg-5-libavdevice-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939717" comment="ffmpeg-5-libavfilter-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939718" comment="ffmpeg-5-libavformat-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939719" comment="ffmpeg-5-libavutil-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939720" comment="ffmpeg-5-libpostproc-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939721" comment="ffmpeg-5-libswresample-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939722" comment="ffmpeg-5-libswscale-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939723" comment="ffmpeg-5-private-devel-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939724" comment="libavcodec59-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939725" comment="libavcodec59-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939726" comment="libavdevice59-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939727" comment="libavdevice59-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939728" comment="libavfilter8-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939729" comment="libavfilter8-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939730" comment="libavformat59-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939731" comment="libavformat59-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939732" comment="libavutil57-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939733" comment="libavutil57-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939734" comment="libpostproc56-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939735" comment="libpostproc56-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939736" comment="libswresample4_ff5-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939737" comment="libswresample4_ff5-32bit-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939738" comment="libswscale6-5.1.4-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939739" comment="libswscale6-32bit-5.1.4-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252543" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32229" ref_url="https://www.suse.com/security/cve/CVE-2024-32229/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-28"/>
	<updated date="2024-07-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32229/">CVE-2024-32229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32229">CVE-2024-32229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939740" comment="ffmpeg-7-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939741" comment="ffmpeg-7-libavcodec-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939742" comment="ffmpeg-7-libavdevice-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939743" comment="ffmpeg-7-libavfilter-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939744" comment="ffmpeg-7-libavformat-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939745" comment="ffmpeg-7-libavutil-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939746" comment="ffmpeg-7-libpostproc-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939747" comment="ffmpeg-7-libswresample-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939748" comment="ffmpeg-7-libswscale-devel-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939749" comment="libavcodec61-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939750" comment="libavdevice61-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939751" comment="libavfilter10-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939752" comment="libavformat61-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939753" comment="libavutil59-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939754" comment="libpostproc58-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939755" comment="libswresample5-7.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939756" comment="libswscale8-7.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252544" version="1" class="patch">
	<metadata>
		<title>libwireshark17-4.2.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3725" ref_url="https://www.suse.com/security/cve/CVE-2022-3725/" source="CVE"/>
		<reference ref_id="CVE-2024-24476" ref_url="https://www.suse.com/security/cve/CVE-2024-24476/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark17-4.2.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-29"/>
	<updated date="2024-07-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3725/">CVE-2022-3725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3725">CVE-2022-3725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24476/">CVE-2024-24476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476">CVE-2024-24476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939757" comment="libwireshark17-4.2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939758" comment="libwiretap14-4.2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939759" comment="libwsutil15-4.2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939760" comment="wireshark-4.2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939761" comment="wireshark-devel-4.2.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939762" comment="wireshark-ui-qt-4.2.6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252545" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20240730-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40648" ref_url="https://www.suse.com/security/cve/CVE-2024-40648/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20240730-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40648/">CVE-2024-40648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40648">CVE-2024-40648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939763" comment="cargo-audit-advisory-db-20240730-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252546" version="1" class="patch">
	<metadata>
		<title>curl-8.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6197" ref_url="https://www.suse.com/security/cve/CVE-2024-6197/" source="CVE"/>
		<reference ref_id="CVE-2024-6874" ref_url="https://www.suse.com/security/cve/CVE-2024-6874/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6197/">CVE-2024-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6874/">CVE-2024-6874 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939764" comment="curl-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939765" comment="curl-fish-completion-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939766" comment="curl-zsh-completion-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939767" comment="libcurl-devel-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939768" comment="libcurl-devel-32bit-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939769" comment="libcurl-devel-doc-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939770" comment="libcurl4-8.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939771" comment="libcurl4-32bit-8.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252547" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32228" ref_url="https://www.suse.com/security/cve/CVE-2024-32228/" source="CVE"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32228/">CVE-2024-32228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32228">CVE-2024-32228 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939772" comment="ffmpeg-6-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939773" comment="ffmpeg-6-libavcodec-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939774" comment="ffmpeg-6-libavdevice-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939775" comment="ffmpeg-6-libavfilter-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939776" comment="ffmpeg-6-libavformat-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939777" comment="ffmpeg-6-libavutil-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939778" comment="ffmpeg-6-libpostproc-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939779" comment="ffmpeg-6-libswresample-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939780" comment="ffmpeg-6-libswscale-devel-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939781" comment="libavcodec60-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939782" comment="libavcodec60-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939783" comment="libavdevice60-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939784" comment="libavdevice60-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939785" comment="libavfilter9-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939786" comment="libavfilter9-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939787" comment="libavformat60-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939788" comment="libavformat60-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939789" comment="libavutil58-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939790" comment="libavutil58-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939791" comment="libpostproc57-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939792" comment="libpostproc57-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939793" comment="libswresample4-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939794" comment="libswresample4-32bit-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939795" comment="libswscale7-6.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939796" comment="libswscale7-32bit-6.1.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252548" version="1" class="patch">
	<metadata>
		<title>389-ds-3.1.1~git0.aef1668-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<reference ref_id="CVE-2024-6237" ref_url="https://www.suse.com/security/cve/CVE-2024-6237/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.1.1~git0.aef1668-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6237/">CVE-2024-6237 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6237">CVE-2024-6237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939797" comment="389-ds-3.1.1~git0.aef1668-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939798" comment="389-ds-devel-3.1.1~git0.aef1668-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939799" comment="389-ds-snmp-3.1.1~git0.aef1668-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939800" comment="lib389-3.1.1~git0.aef1668-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939801" comment="libsvrcore0-3.1.1~git0.aef1668-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252549" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.112.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41671" ref_url="https://www.suse.com/security/cve/CVE-2024-41671/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.112.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41671/">CVE-2024-41671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41671">CVE-2024-41671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939802" comment="matrix-synapse-1.112.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252550" version="1" class="patch">
	<metadata>
		<title>docker-26.1.5_ce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-26.1.5_ce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939803" comment="docker-26.1.5_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939804" comment="docker-bash-completion-26.1.5_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939805" comment="docker-fish-completion-26.1.5_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939806" comment="docker-rootless-extras-26.1.5_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939807" comment="docker-zsh-completion-26.1.5_ce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252551" version="1" class="patch">
	<metadata>
		<title>espeak-ng-1.51.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49990" ref_url="https://www.suse.com/security/cve/CVE-2023-49990/" source="CVE"/>
		<reference ref_id="CVE-2023-49992" ref_url="https://www.suse.com/security/cve/CVE-2023-49992/" source="CVE"/>
		<reference ref_id="CVE-2023-49994" ref_url="https://www.suse.com/security/cve/CVE-2023-49994/" source="CVE"/>
		<description>
These are all security issues fixed in the espeak-ng-1.51.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49990/">CVE-2023-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49990">CVE-2023-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49992/">CVE-2023-49992 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49992">CVE-2023-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49994/">CVE-2023-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49994">CVE-2023-49994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939808" comment="espeak-ng-1.51.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939809" comment="espeak-ng-compat-1.51.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939810" comment="espeak-ng-compat-devel-1.51.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939811" comment="espeak-ng-devel-1.51.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939812" comment="espeak-ng-vim-1.51.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939813" comment="libespeak-ng1-1.51.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252552" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939814" comment="ffmpeg-4-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939815" comment="ffmpeg-4-libavcodec-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939816" comment="ffmpeg-4-libavdevice-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939817" comment="ffmpeg-4-libavfilter-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939818" comment="ffmpeg-4-libavformat-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939819" comment="ffmpeg-4-libavresample-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939820" comment="ffmpeg-4-libavutil-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939821" comment="ffmpeg-4-libpostproc-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939822" comment="ffmpeg-4-libswresample-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939823" comment="ffmpeg-4-libswscale-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939824" comment="ffmpeg-4-private-devel-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939825" comment="libavcodec58_134-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939826" comment="libavcodec58_134-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939827" comment="libavdevice58_13-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939828" comment="libavdevice58_13-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939829" comment="libavfilter7_110-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939830" comment="libavfilter7_110-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939831" comment="libavformat58_76-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939832" comment="libavformat58_76-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939833" comment="libavresample4_0-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939834" comment="libavresample4_0-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939835" comment="libavutil56_70-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939836" comment="libavutil56_70-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939837" comment="libpostproc55_9-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939838" comment="libpostproc55_9-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939839" comment="libswresample3_9-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939840" comment="libswresample3_9-32bit-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939841" comment="libswscale5_9-4.4.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939842" comment="libswscale5_9-32bit-4.4.4-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252553" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.53.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.53.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939843" comment="golang-github-prometheus-prometheus-2.53.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252554" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.422-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.422-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939844" comment="java-1_8_0-openjdk-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939845" comment="java-1_8_0-openjdk-accessibility-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939846" comment="java-1_8_0-openjdk-demo-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939847" comment="java-1_8_0-openjdk-devel-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939848" comment="java-1_8_0-openjdk-headless-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939849" comment="java-1_8_0-openjdk-javadoc-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939850" comment="java-1_8_0-openjdk-src-1.8.0.422-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252555" version="1" class="patch">
	<metadata>
		<title>klp-build-0~20240731.edfe0bf-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<description>
These are all security issues fixed in the klp-build-0~20240731.edfe0bf-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939851" comment="klp-build-0~20240731.edfe0bf-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252556" version="1" class="patch">
	<metadata>
		<title>nova-3.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<description>
These are all security issues fixed in the nova-3.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939852" comment="nova-3.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939853" comment="nova-bash-completion-3.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939854" comment="nova-fish-completion-3.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939855" comment="nova-zsh-completion-3.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252557" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-24.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41671" ref_url="https://www.suse.com/security/cve/CVE-2024-41671/" source="CVE"/>
		<reference ref_id="CVE-2024-41810" ref_url="https://www.suse.com/security/cve/CVE-2024-41810/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-24.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41671/">CVE-2024-41671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41671">CVE-2024-41671 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41810/">CVE-2024-41810 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41810">CVE-2024-41810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939856" comment="python-Twisted-doc-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939857" comment="python310-Twisted-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939858" comment="python310-Twisted-all_non_platform-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939859" comment="python310-Twisted-conch-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939860" comment="python310-Twisted-conch_nacl-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939861" comment="python310-Twisted-contextvars-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939862" comment="python310-Twisted-http2-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939863" comment="python310-Twisted-serial-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939864" comment="python310-Twisted-tls-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939865" comment="python311-Twisted-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939866" comment="python311-Twisted-all_non_platform-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939867" comment="python311-Twisted-conch-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939868" comment="python311-Twisted-conch_nacl-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939869" comment="python311-Twisted-contextvars-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939870" comment="python311-Twisted-http2-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939871" comment="python311-Twisted-serial-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939872" comment="python311-Twisted-tls-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939873" comment="python312-Twisted-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939874" comment="python312-Twisted-all_non_platform-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939875" comment="python312-Twisted-conch-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939876" comment="python312-Twisted-conch_nacl-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939877" comment="python312-Twisted-contextvars-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939878" comment="python312-Twisted-http2-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939879" comment="python312-Twisted-serial-24.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939880" comment="python312-Twisted-tls-24.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252558" version="1" class="patch">
	<metadata>
		<title>trivy-0.54.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42363" ref_url="https://www.suse.com/security/cve/CVE-2023-42363/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.54.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42363/">CVE-2023-42363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42363">CVE-2023-42363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939881" comment="trivy-0.54.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252559" version="1" class="patch">
	<metadata>
		<title>libneatvnc0-0.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42458" ref_url="https://www.suse.com/security/cve/CVE-2024-42458/" source="CVE"/>
		<description>
These are all security issues fixed in the libneatvnc0-0.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-02"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42458/">CVE-2024-42458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42458">CVE-2024-42458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939882" comment="libneatvnc0-0.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939883" comment="neatvnc-devel-0.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252560" version="1" class="patch">
	<metadata>
		<title>patch-2.7.6-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-20633" ref_url="https://www.suse.com/security/cve/CVE-2019-20633/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.6-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-02"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20633/">CVE-2019-20633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20633">CVE-2019-20633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939884" comment="patch-2.7.6-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252561" version="1" class="patch">
	<metadata>
		<title>libnbd-1.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7383" ref_url="https://www.suse.com/security/cve/CVE-2024-7383/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7383/">CVE-2024-7383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7383">CVE-2024-7383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939885" comment="libnbd-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939886" comment="libnbd-bash-completion-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939887" comment="libnbd-devel-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939888" comment="libnbd0-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939889" comment="nbdfuse-1.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939890" comment="python3-libnbd-1.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252562" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.12.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40896" ref_url="https://www.suse.com/security/cve/CVE-2024-40896/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.12.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40896/">CVE-2024-40896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40896">CVE-2024-40896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939891" comment="libxml2-2-2.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939892" comment="libxml2-2-32bit-2.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939893" comment="libxml2-devel-2.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939894" comment="libxml2-devel-32bit-2.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939895" comment="libxml2-doc-2.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939896" comment="libxml2-tools-2.12.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252563" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.73-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42347" ref_url="https://www.suse.com/security/cve/CVE-2024-42347/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.73-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42347/">CVE-2024-42347 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42347">CVE-2024-42347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939897" comment="element-web-1.11.73-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252564" version="1" class="patch">
	<metadata>
		<title>roundcubemail-1.6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42008" ref_url="https://www.suse.com/security/cve/CVE-2024-42008/" source="CVE"/>
		<reference ref_id="CVE-2024-42009" ref_url="https://www.suse.com/security/cve/CVE-2024-42009/" source="CVE"/>
		<reference ref_id="CVE-2024-42010" ref_url="https://www.suse.com/security/cve/CVE-2024-42010/" source="CVE"/>
		<description>
These are all security issues fixed in the roundcubemail-1.6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42008/">CVE-2024-42008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42008">CVE-2024-42008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42009/">CVE-2024-42009 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42009">CVE-2024-42009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42010/">CVE-2024-42010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42010">CVE-2024-42010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939898" comment="roundcubemail-1.6.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252565" version="1" class="patch">
	<metadata>
		<title>ansible-9-9.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-9-9.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939899" comment="ansible-9-9.8.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252566" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.62-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40725" ref_url="https://www.suse.com/security/cve/CVE-2024-40725/" source="CVE"/>
		<reference ref_id="CVE-2024-40898" ref_url="https://www.suse.com/security/cve/CVE-2024-40898/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.62-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40725/">CVE-2024-40725 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40725">CVE-2024-40725 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40898/">CVE-2024-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40898">CVE-2024-40898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939900" comment="apache2-2.4.62-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252567" version="1" class="patch">
	<metadata>
		<title>db48-doc-4.8.30-45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<description>
These are all security issues fixed in the db48-doc-4.8.30-45.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2708">CVE-2019-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939901" comment="db48-doc-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939902" comment="db48-utils-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939903" comment="libdb-4_8-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939904" comment="libdb-4_8-32bit-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939905" comment="libdb-4_8-devel-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939906" comment="libdb-4_8-devel-32bit-4.8.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939907" comment="libdb-4_8-x86-64-v3-4.8.30-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252568" version="1" class="patch">
	<metadata>
		<title>python310-Django-5.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41989" ref_url="https://www.suse.com/security/cve/CVE-2024-41989/" source="CVE"/>
		<reference ref_id="CVE-2024-41990" ref_url="https://www.suse.com/security/cve/CVE-2024-41990/" source="CVE"/>
		<reference ref_id="CVE-2024-41991" ref_url="https://www.suse.com/security/cve/CVE-2024-41991/" source="CVE"/>
		<reference ref_id="CVE-2024-42005" ref_url="https://www.suse.com/security/cve/CVE-2024-42005/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-5.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41989/">CVE-2024-41989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41989">CVE-2024-41989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41990/">CVE-2024-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41990">CVE-2024-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41991/">CVE-2024-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41991">CVE-2024-41991 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42005/">CVE-2024-42005 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42005">CVE-2024-42005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939908" comment="python310-Django-5.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939909" comment="python311-Django-5.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939910" comment="python312-Django-5.0.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252569" version="1" class="patch">
	<metadata>
		<title>python310-Django4-4.2.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41989" ref_url="https://www.suse.com/security/cve/CVE-2024-41989/" source="CVE"/>
		<reference ref_id="CVE-2024-41990" ref_url="https://www.suse.com/security/cve/CVE-2024-41990/" source="CVE"/>
		<reference ref_id="CVE-2024-41991" ref_url="https://www.suse.com/security/cve/CVE-2024-41991/" source="CVE"/>
		<reference ref_id="CVE-2024-42005" ref_url="https://www.suse.com/security/cve/CVE-2024-42005/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django4-4.2.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41989/">CVE-2024-41989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41989">CVE-2024-41989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41990/">CVE-2024-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41990">CVE-2024-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41991/">CVE-2024-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41991">CVE-2024-41991 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42005/">CVE-2024-42005 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42005">CVE-2024-42005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939911" comment="python310-Django4-4.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939912" comment="python311-Django4-4.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939913" comment="python312-Django4-4.2.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252570" version="1" class="patch">
	<metadata>
		<title>python313-3.13.0~rc1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.0~rc1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939914" comment="python313-3.13.0~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939915" comment="python313-curses-3.13.0~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939916" comment="python313-dbm-3.13.0~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939917" comment="python313-idle-3.13.0~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939918" comment="python313-tk-3.13.0~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939919" comment="python313-x86-64-v3-3.13.0~rc1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252571" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939920" comment="MozillaThunderbird-115.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939921" comment="MozillaThunderbird-openpgp-librnp-115.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939922" comment="MozillaThunderbird-translations-common-115.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939923" comment="MozillaThunderbird-translations-other-115.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252572" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.16-2.16.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.16-2.16.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939924" comment="ansible-core-2.16-2.16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939925" comment="ansible-test-2.16-2.16.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252573" version="1" class="patch">
	<metadata>
		<title>ksh-93vu-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-14868" ref_url="https://www.suse.com/security/cve/CVE-2019-14868/" source="CVE"/>
		<description>
These are all security issues fixed in the ksh-93vu-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14868/">CVE-2019-14868 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14868">CVE-2019-14868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939926" comment="ksh-93vu-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939927" comment="ksh-devel-93vu-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252574" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939928" comment="python39-3.9.19-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939929" comment="python39-curses-3.9.19-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939930" comment="python39-dbm-3.9.19-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939931" comment="python39-idle-3.9.19-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939932" comment="python39-tk-3.9.19-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252575" version="1" class="patch">
	<metadata>
		<title>python310-3.10.14-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.14-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939933" comment="python310-3.10.14-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939934" comment="python310-32bit-3.10.14-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939935" comment="python310-curses-3.10.14-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939936" comment="python310-dbm-3.10.14-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939937" comment="python310-idle-3.10.14-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939938" comment="python310-tk-3.10.14-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252576" version="1" class="patch">
	<metadata>
		<title>python311-3.11.9-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.9-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939939" comment="python311-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939940" comment="python311-32bit-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939941" comment="python311-curses-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939942" comment="python311-dbm-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939943" comment="python311-idle-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939944" comment="python311-tk-3.11.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939945" comment="python311-x86-64-v3-3.11.9-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252577" version="1" class="patch">
	<metadata>
		<title>python38-3.8.19-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.19-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939946" comment="python38-3.8.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939947" comment="python38-curses-3.8.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939948" comment="python38-dbm-3.8.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939949" comment="python38-idle-3.8.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939950" comment="python38-tk-3.8.19-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252578" version="1" class="patch">
	<metadata>
		<title>traefik-3.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4068" ref_url="https://www.suse.com/security/cve/CVE-2024-4068/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4068/">CVE-2024-4068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4068">CVE-2024-4068 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939951" comment="traefik-3.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252579" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4068" ref_url="https://www.suse.com/security/cve/CVE-2024-4068/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4068/">CVE-2024-4068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4068">CVE-2024-4068 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939952" comment="traefik2-2.11.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252580" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.78-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39133" ref_url="https://www.suse.com/security/cve/CVE-2024-39133/" source="CVE"/>
		<reference ref_id="CVE-2024-39134" ref_url="https://www.suse.com/security/cve/CVE-2024-39134/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.78-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-11"/>
	<updated date="2024-08-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39133/">CVE-2024-39133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39133">CVE-2024-39133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39134/">CVE-2024-39134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39134">CVE-2024-39134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939953" comment="libzzip-0-13-0.13.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939954" comment="libzzip-0-13-32bit-0.13.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939955" comment="zziplib-devel-0.13.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939956" comment="zziplib-devel-32bit-0.13.78-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252581" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-129.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7523" ref_url="https://www.suse.com/security/cve/CVE-2024-7523/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="CVE-2024-7530" ref_url="https://www.suse.com/security/cve/CVE-2024-7530/" source="CVE"/>
		<reference ref_id="CVE-2024-7531" ref_url="https://www.suse.com/security/cve/CVE-2024-7531/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-129.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7523/">CVE-2024-7523 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7523">CVE-2024-7523 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7530/">CVE-2024-7530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7530">CVE-2024-7530 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7531/">CVE-2024-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939957" comment="MozillaFirefox-129.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939958" comment="MozillaFirefox-branding-upstream-129.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939959" comment="MozillaFirefox-devel-129.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939960" comment="MozillaFirefox-translations-common-129.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939961" comment="MozillaFirefox-translations-other-129.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252582" version="1" class="patch">
	<metadata>
		<title>curl-8.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939962" comment="curl-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939963" comment="curl-fish-completion-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939964" comment="curl-zsh-completion-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939965" comment="libcurl-devel-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939966" comment="libcurl-devel-32bit-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939967" comment="libcurl-devel-doc-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939968" comment="libcurl4-8.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939969" comment="libcurl4-32bit-8.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252583" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.24.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.24.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939970" comment="java-11-openj9-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939971" comment="java-11-openj9-demo-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939972" comment="java-11-openj9-devel-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939973" comment="java-11-openj9-headless-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939974" comment="java-11-openj9-javadoc-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939975" comment="java-11-openj9-jmods-11.0.24.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939976" comment="java-11-openj9-src-11.0.24.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252584" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939977" comment="java-17-openj9-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939978" comment="java-17-openj9-demo-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939979" comment="java-17-openj9-devel-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939980" comment="java-17-openj9-headless-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939981" comment="java-17-openj9-javadoc-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939982" comment="java-17-openj9-jmods-17.0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939983" comment="java-17-openj9-src-17.0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252585" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.422-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.422-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939984" comment="java-1_8_0-openj9-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939985" comment="java-1_8_0-openj9-accessibility-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939986" comment="java-1_8_0-openj9-demo-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939987" comment="java-1_8_0-openj9-devel-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939988" comment="java-1_8_0-openj9-headless-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939989" comment="java-1_8_0-openj9-javadoc-1.8.0.422-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939990" comment="java-1_8_0-openj9-src-1.8.0.422-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252586" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939991" comment="java-21-openj9-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939992" comment="java-21-openj9-demo-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939993" comment="java-21-openj9-devel-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939994" comment="java-21-openj9-headless-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939995" comment="java-21-openj9-javadoc-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939996" comment="java-21-openj9-jmods-21.0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939997" comment="java-21-openj9-src-21.0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252587" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20240809-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20240809-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009939998" comment="kernel-firmware-all-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009939999" comment="kernel-firmware-amdgpu-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940000" comment="kernel-firmware-ath10k-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940001" comment="kernel-firmware-ath11k-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940002" comment="kernel-firmware-ath12k-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940003" comment="kernel-firmware-atheros-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940004" comment="kernel-firmware-bluetooth-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940005" comment="kernel-firmware-bnx2-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940006" comment="kernel-firmware-brcm-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940007" comment="kernel-firmware-chelsio-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940008" comment="kernel-firmware-dpaa2-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940009" comment="kernel-firmware-i915-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940010" comment="kernel-firmware-intel-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940011" comment="kernel-firmware-iwlwifi-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940012" comment="kernel-firmware-liquidio-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940013" comment="kernel-firmware-marvell-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940014" comment="kernel-firmware-media-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940015" comment="kernel-firmware-mediatek-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940016" comment="kernel-firmware-mellanox-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940017" comment="kernel-firmware-mwifiex-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940018" comment="kernel-firmware-network-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940019" comment="kernel-firmware-nfp-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940020" comment="kernel-firmware-nvidia-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940021" comment="kernel-firmware-platform-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940022" comment="kernel-firmware-prestera-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940023" comment="kernel-firmware-qcom-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940024" comment="kernel-firmware-qlogic-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940025" comment="kernel-firmware-radeon-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940026" comment="kernel-firmware-realtek-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940027" comment="kernel-firmware-serial-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940028" comment="kernel-firmware-sound-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940029" comment="kernel-firmware-ti-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940030" comment="kernel-firmware-ueagle-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940031" comment="kernel-firmware-usb-network-20240809-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940032" comment="ucode-amd-20240809-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252588" version="1" class="patch">
	<metadata>
		<title>klp-build-0~20240812.ad9f0e0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<description>
These are all security issues fixed in the klp-build-0~20240812.ad9f0e0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940033" comment="klp-build-0~20240812.ad9f0e0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252589" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20240813-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667/" source="CVE"/>
		<reference ref_id="CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141/" source="CVE"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980/" source="CVE"/>
		<reference ref_id="CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20240813-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940034" comment="ucode-intel-20240813-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252590" version="1" class="patch">
	<metadata>
		<title>bubblewrap-0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
These are all security issues fixed in the bubblewrap-0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940035" comment="bubblewrap-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940036" comment="bubblewrap-zsh-completion-0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252591" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43167" ref_url="https://www.suse.com/security/cve/CVE-2024-43167/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43167/">CVE-2024-43167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43167">CVE-2024-43167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940037" comment="libunbound8-1.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940038" comment="python3-unbound-1.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940039" comment="unbound-1.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940040" comment="unbound-anchor-1.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940041" comment="unbound-devel-1.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940042" comment="unbound-munin-1.21.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252592" version="1" class="patch">
	<metadata>
		<title>nginx-1.27.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.27.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940043" comment="nginx-1.27.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940044" comment="nginx-source-1.27.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252593" version="1" class="patch">
	<metadata>
		<title>chromedriver-127.0.6533.119-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6988" ref_url="https://www.suse.com/security/cve/CVE-2024-6988/" source="CVE"/>
		<reference ref_id="CVE-2024-6989" ref_url="https://www.suse.com/security/cve/CVE-2024-6989/" source="CVE"/>
		<reference ref_id="CVE-2024-6990" ref_url="https://www.suse.com/security/cve/CVE-2024-6990/" source="CVE"/>
		<reference ref_id="CVE-2024-6991" ref_url="https://www.suse.com/security/cve/CVE-2024-6991/" source="CVE"/>
		<reference ref_id="CVE-2024-6992" ref_url="https://www.suse.com/security/cve/CVE-2024-6992/" source="CVE"/>
		<reference ref_id="CVE-2024-6993" ref_url="https://www.suse.com/security/cve/CVE-2024-6993/" source="CVE"/>
		<reference ref_id="CVE-2024-6994" ref_url="https://www.suse.com/security/cve/CVE-2024-6994/" source="CVE"/>
		<reference ref_id="CVE-2024-6995" ref_url="https://www.suse.com/security/cve/CVE-2024-6995/" source="CVE"/>
		<reference ref_id="CVE-2024-6996" ref_url="https://www.suse.com/security/cve/CVE-2024-6996/" source="CVE"/>
		<reference ref_id="CVE-2024-6997" ref_url="https://www.suse.com/security/cve/CVE-2024-6997/" source="CVE"/>
		<reference ref_id="CVE-2024-6998" ref_url="https://www.suse.com/security/cve/CVE-2024-6998/" source="CVE"/>
		<reference ref_id="CVE-2024-6999" ref_url="https://www.suse.com/security/cve/CVE-2024-6999/" source="CVE"/>
		<reference ref_id="CVE-2024-7000" ref_url="https://www.suse.com/security/cve/CVE-2024-7000/" source="CVE"/>
		<reference ref_id="CVE-2024-7001" ref_url="https://www.suse.com/security/cve/CVE-2024-7001/" source="CVE"/>
		<reference ref_id="CVE-2024-7003" ref_url="https://www.suse.com/security/cve/CVE-2024-7003/" source="CVE"/>
		<reference ref_id="CVE-2024-7004" ref_url="https://www.suse.com/security/cve/CVE-2024-7004/" source="CVE"/>
		<reference ref_id="CVE-2024-7005" ref_url="https://www.suse.com/security/cve/CVE-2024-7005/" source="CVE"/>
		<reference ref_id="CVE-2024-7255" ref_url="https://www.suse.com/security/cve/CVE-2024-7255/" source="CVE"/>
		<reference ref_id="CVE-2024-7256" ref_url="https://www.suse.com/security/cve/CVE-2024-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-7532" ref_url="https://www.suse.com/security/cve/CVE-2024-7532/" source="CVE"/>
		<reference ref_id="CVE-2024-7533" ref_url="https://www.suse.com/security/cve/CVE-2024-7533/" source="CVE"/>
		<reference ref_id="CVE-2024-7534" ref_url="https://www.suse.com/security/cve/CVE-2024-7534/" source="CVE"/>
		<reference ref_id="CVE-2024-7535" ref_url="https://www.suse.com/security/cve/CVE-2024-7535/" source="CVE"/>
		<reference ref_id="CVE-2024-7536" ref_url="https://www.suse.com/security/cve/CVE-2024-7536/" source="CVE"/>
		<reference ref_id="CVE-2024-7550" ref_url="https://www.suse.com/security/cve/CVE-2024-7550/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-127.0.6533.119-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-18"/>
	<updated date="2024-08-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6988/">CVE-2024-6988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6988">CVE-2024-6988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6989/">CVE-2024-6989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6989">CVE-2024-6989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6990/">CVE-2024-6990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6990">CVE-2024-6990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6991/">CVE-2024-6991 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6991">CVE-2024-6991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6992/">CVE-2024-6992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6992">CVE-2024-6992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6993/">CVE-2024-6993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6993">CVE-2024-6993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6994/">CVE-2024-6994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6994">CVE-2024-6994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6995/">CVE-2024-6995 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6995">CVE-2024-6995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6996/">CVE-2024-6996 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6996">CVE-2024-6996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6997/">CVE-2024-6997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6997">CVE-2024-6997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6998/">CVE-2024-6998 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6998">CVE-2024-6998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6999/">CVE-2024-6999 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6999">CVE-2024-6999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7000/">CVE-2024-7000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7000">CVE-2024-7000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7001/">CVE-2024-7001 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7001">CVE-2024-7001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7003/">CVE-2024-7003 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7003">CVE-2024-7003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7004/">CVE-2024-7004 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7004">CVE-2024-7004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7005/">CVE-2024-7005 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7005">CVE-2024-7005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7255/">CVE-2024-7255 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7255">CVE-2024-7255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7256/">CVE-2024-7256 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7256">CVE-2024-7256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7532/">CVE-2024-7532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7532">CVE-2024-7532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7533/">CVE-2024-7533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7533">CVE-2024-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7534/">CVE-2024-7534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7534">CVE-2024-7534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7535/">CVE-2024-7535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7535">CVE-2024-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7536/">CVE-2024-7536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7536">CVE-2024-7536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7550/">CVE-2024-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7550">CVE-2024-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940045" comment="chromedriver-127.0.6533.119-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940046" comment="chromium-127.0.6533.119-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252594" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.73-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42347" ref_url="https://www.suse.com/security/cve/CVE-2024-42347/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.73-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-18"/>
	<updated date="2024-08-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42347/">CVE-2024-42347 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42347">CVE-2024-42347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940047" comment="element-desktop-1.11.73-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252595" version="1" class="patch">
	<metadata>
		<title>dovecot23-2.3.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot23-2.3.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940048" comment="dovecot23-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940049" comment="dovecot23-backend-mysql-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940050" comment="dovecot23-backend-pgsql-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940051" comment="dovecot23-backend-sqlite-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940052" comment="dovecot23-devel-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940053" comment="dovecot23-fts-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940054" comment="dovecot23-fts-lucene-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940055" comment="dovecot23-fts-solr-2.3.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940056" comment="dovecot23-fts-squat-2.3.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252596" version="1" class="patch">
	<metadata>
		<title>flatpak-1.15.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.15.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940057" comment="flatpak-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940058" comment="flatpak-devel-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940059" comment="flatpak-remote-flathub-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940060" comment="flatpak-selinux-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940061" comment="flatpak-zsh-completion-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940062" comment="libflatpak0-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940063" comment="system-user-flatpak-1.15.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940064" comment="typelib-1_0-Flatpak-1_0-1.15.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252597" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-30.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6776" ref_url="https://www.suse.com/security/cve/CVE-2024-6776/" source="CVE"/>
		<reference ref_id="CVE-2024-6989" ref_url="https://www.suse.com/security/cve/CVE-2024-6989/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-30.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6776/">CVE-2024-6776 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6776">CVE-2024-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6989/">CVE-2024-6989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6989">CVE-2024-6989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940065" comment="nodejs-electron-30.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940066" comment="nodejs-electron-devel-30.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940067" comment="nodejs-electron-doc-30.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252598" version="1" class="patch">
	<metadata>
		<title>osc-1.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22034" ref_url="https://www.suse.com/security/cve/CVE-2024-22034/" source="CVE"/>
		<description>
These are all security issues fixed in the osc-1.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-22034/">CVE-2024-22034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22034">CVE-2024-22034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940068" comment="osc-1.9.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252599" version="1" class="patch">
	<metadata>
		<title>libpodofo-devel-0.10.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-19532" ref_url="https://www.suse.com/security/cve/CVE-2018-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-20093" ref_url="https://www.suse.com/security/cve/CVE-2019-20093/" source="CVE"/>
		<reference ref_id="CVE-2019-9199" ref_url="https://www.suse.com/security/cve/CVE-2019-9199/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo-devel-0.10.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19532/">CVE-2018-19532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19532">CVE-2018-19532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20093/">CVE-2019-20093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20093">CVE-2019-20093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9199/">CVE-2019-9199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9199">CVE-2019-9199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940069" comment="libpodofo-devel-0.10.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940070" comment="libpodofo2-0.10.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940071" comment="podofo-0.10.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252600" version="1" class="patch">
	<metadata>
		<title>python-WebOb-doc-1.8.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42353" ref_url="https://www.suse.com/security/cve/CVE-2024-42353/" source="CVE"/>
		<description>
These are all security issues fixed in the python-WebOb-doc-1.8.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-42353/">CVE-2024-42353 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42353">CVE-2024-42353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940072" comment="python-WebOb-doc-1.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940073" comment="python310-WebOb-1.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940074" comment="python311-WebOb-1.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940075" comment="python312-WebOb-1.8.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252601" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.10.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42367" ref_url="https://www.suse.com/security/cve/CVE-2024-42367/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.10.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42367/">CVE-2024-42367 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42367">CVE-2024-42367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940076" comment="python310-aiohttp-3.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940077" comment="python311-aiohttp-3.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940078" comment="python312-aiohttp-3.10.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252602" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.6.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.6.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940079" comment="libtiff-devel-4.6.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940080" comment="libtiff-devel-32bit-4.6.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940081" comment="libtiff6-4.6.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940082" comment="libtiff6-32bit-4.6.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940083" comment="tiff-4.6.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252603" version="1" class="patch">
	<metadata>
		<title>velociraptor-0.7.0.4.git97.675e45f9-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39338" ref_url="https://www.suse.com/security/cve/CVE-2024-39338/" source="CVE"/>
		<description>
These are all security issues fixed in the velociraptor-0.7.0.4.git97.675e45f9-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39338/">CVE-2024-39338 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39338">CVE-2024-39338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940084" comment="velociraptor-0.7.0.4.git97.675e45f9-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252604" version="1" class="patch">
	<metadata>
		<title>xen-4.19.0_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31145" ref_url="https://www.suse.com/security/cve/CVE-2024-31145/" source="CVE"/>
		<reference ref_id="CVE-2024-31146" ref_url="https://www.suse.com/security/cve/CVE-2024-31146/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.19.0_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31145/">CVE-2024-31145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31145">CVE-2024-31145 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31146/">CVE-2024-31146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31146">CVE-2024-31146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940085" comment="xen-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940086" comment="xen-devel-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940087" comment="xen-doc-html-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940088" comment="xen-libs-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940089" comment="xen-tools-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940090" comment="xen-tools-domU-4.19.0_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940091" comment="xen-tools-xendomains-wait-disk-4.19.0_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252605" version="1" class="patch">
	<metadata>
		<title>libvte-2_91-0-0.76.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37535" ref_url="https://www.suse.com/security/cve/CVE-2024-37535/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte-2_91-0-0.76.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37535/">CVE-2024-37535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37535">CVE-2024-37535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940092" comment="libvte-2_91-0-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940093" comment="typelib-1_0-Vte-2_91-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940094" comment="typelib-1_0-Vte-3_91-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940095" comment="vte-devel-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940096" comment="vte-lang-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940097" comment="vte-tools-0.76.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940098" comment="vte-tools-gtk4-0.76.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252606" version="1" class="patch">
	<metadata>
		<title>chromedriver-128.0.6613.84-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7964" ref_url="https://www.suse.com/security/cve/CVE-2024-7964/" source="CVE"/>
		<reference ref_id="CVE-2024-7965" ref_url="https://www.suse.com/security/cve/CVE-2024-7965/" source="CVE"/>
		<reference ref_id="CVE-2024-7966" ref_url="https://www.suse.com/security/cve/CVE-2024-7966/" source="CVE"/>
		<reference ref_id="CVE-2024-7967" ref_url="https://www.suse.com/security/cve/CVE-2024-7967/" source="CVE"/>
		<reference ref_id="CVE-2024-7968" ref_url="https://www.suse.com/security/cve/CVE-2024-7968/" source="CVE"/>
		<reference ref_id="CVE-2024-7969" ref_url="https://www.suse.com/security/cve/CVE-2024-7969/" source="CVE"/>
		<reference ref_id="CVE-2024-7971" ref_url="https://www.suse.com/security/cve/CVE-2024-7971/" source="CVE"/>
		<reference ref_id="CVE-2024-7972" ref_url="https://www.suse.com/security/cve/CVE-2024-7972/" source="CVE"/>
		<reference ref_id="CVE-2024-7973" ref_url="https://www.suse.com/security/cve/CVE-2024-7973/" source="CVE"/>
		<reference ref_id="CVE-2024-7974" ref_url="https://www.suse.com/security/cve/CVE-2024-7974/" source="CVE"/>
		<reference ref_id="CVE-2024-7975" ref_url="https://www.suse.com/security/cve/CVE-2024-7975/" source="CVE"/>
		<reference ref_id="CVE-2024-7976" ref_url="https://www.suse.com/security/cve/CVE-2024-7976/" source="CVE"/>
		<reference ref_id="CVE-2024-7977" ref_url="https://www.suse.com/security/cve/CVE-2024-7977/" source="CVE"/>
		<reference ref_id="CVE-2024-7978" ref_url="https://www.suse.com/security/cve/CVE-2024-7978/" source="CVE"/>
		<reference ref_id="CVE-2024-7979" ref_url="https://www.suse.com/security/cve/CVE-2024-7979/" source="CVE"/>
		<reference ref_id="CVE-2024-7980" ref_url="https://www.suse.com/security/cve/CVE-2024-7980/" source="CVE"/>
		<reference ref_id="CVE-2024-7981" ref_url="https://www.suse.com/security/cve/CVE-2024-7981/" source="CVE"/>
		<reference ref_id="CVE-2024-8033" ref_url="https://www.suse.com/security/cve/CVE-2024-8033/" source="CVE"/>
		<reference ref_id="CVE-2024-8034" ref_url="https://www.suse.com/security/cve/CVE-2024-8034/" source="CVE"/>
		<reference ref_id="CVE-2024-8035" ref_url="https://www.suse.com/security/cve/CVE-2024-8035/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-128.0.6613.84-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7964/">CVE-2024-7964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7964">CVE-2024-7964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7965/">CVE-2024-7965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7965">CVE-2024-7965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7966/">CVE-2024-7966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7966">CVE-2024-7966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7967/">CVE-2024-7967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7967">CVE-2024-7967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7968/">CVE-2024-7968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7968">CVE-2024-7968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7969/">CVE-2024-7969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7969">CVE-2024-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7971/">CVE-2024-7971 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7971">CVE-2024-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7972/">CVE-2024-7972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7972">CVE-2024-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7973/">CVE-2024-7973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7973">CVE-2024-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7974/">CVE-2024-7974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7974">CVE-2024-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7975/">CVE-2024-7975 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7975">CVE-2024-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7976/">CVE-2024-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7976">CVE-2024-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7977/">CVE-2024-7977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7977">CVE-2024-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7978/">CVE-2024-7978 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7978">CVE-2024-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7979/">CVE-2024-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7979">CVE-2024-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7980/">CVE-2024-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7980">CVE-2024-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7981/">CVE-2024-7981 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7981">CVE-2024-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8033/">CVE-2024-8033 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8033">CVE-2024-8033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8034/">CVE-2024-8034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8034">CVE-2024-8034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8035/">CVE-2024-8035 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8035">CVE-2024-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940099" comment="chromedriver-128.0.6613.84-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940100" comment="chromium-128.0.6613.84-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252607" version="1" class="patch">
	<metadata>
		<title>frr-10.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-44070" ref_url="https://www.suse.com/security/cve/CVE-2024-44070/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-10.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44070/">CVE-2024-44070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44070">CVE-2024-44070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940101" comment="frr-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940102" comment="frr-devel-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940103" comment="libfrr0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940104" comment="libfrr_pb0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940105" comment="libfrrcares0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940106" comment="libfrrfpm_pb0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940107" comment="libfrrospfapiclient0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940108" comment="libfrrsnmp0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940109" comment="libfrrzmq0-10.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940110" comment="libmgmt_be_nb0-10.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252608" version="1" class="patch">
	<metadata>
		<title>forgejo-runner-3.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24557" ref_url="https://www.suse.com/security/cve/CVE-2024-24557/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-runner-3.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-08-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24557/">CVE-2024-24557 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940111" comment="forgejo-runner-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940112" comment="forgejo-runner-bash-completion-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940113" comment="forgejo-runner-fish-completion-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940114" comment="forgejo-runner-zsh-completion-3.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252609" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.75-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42369" ref_url="https://www.suse.com/security/cve/CVE-2024-42369/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.75-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42369/">CVE-2024-42369 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42369">CVE-2024-42369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940115" comment="element-desktop-1.11.75-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252610" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.75-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42369" ref_url="https://www.suse.com/security/cve/CVE-2024-42369/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.75-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42369/">CVE-2024-42369 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42369">CVE-2024-42369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940116" comment="element-web-1.11.75-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252611" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7272" ref_url="https://www.suse.com/security/cve/CVE-2024-7272/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7272/">CVE-2024-7272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7272">CVE-2024-7272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940117" comment="ffmpeg-5-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940118" comment="ffmpeg-5-libavcodec-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940119" comment="ffmpeg-5-libavdevice-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940120" comment="ffmpeg-5-libavfilter-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940121" comment="ffmpeg-5-libavformat-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940122" comment="ffmpeg-5-libavutil-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940123" comment="ffmpeg-5-libpostproc-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940124" comment="ffmpeg-5-libswresample-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940125" comment="ffmpeg-5-libswscale-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940126" comment="ffmpeg-5-private-devel-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940127" comment="libavcodec59-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940128" comment="libavcodec59-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940129" comment="libavdevice59-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940130" comment="libavdevice59-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940131" comment="libavfilter8-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940132" comment="libavfilter8-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940133" comment="libavformat59-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940134" comment="libavformat59-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940135" comment="libavutil57-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940136" comment="libavutil57-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940137" comment="libpostproc56-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940138" comment="libpostproc56-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940139" comment="libswresample4_ff5-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940140" comment="libswresample4_ff5-32bit-5.1.4-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940141" comment="libswscale6-5.1.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940142" comment="libswscale6-32bit-5.1.4-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252612" version="1" class="patch">
	<metadata>
		<title>perl-App-cpanminus-1.7047-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45321" ref_url="https://www.suse.com/security/cve/CVE-2024-45321/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-App-cpanminus-1.7047-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45321/">CVE-2024-45321 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45321">CVE-2024-45321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940143" comment="perl-App-cpanminus-1.7047-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252613" version="1" class="patch">
	<metadata>
		<title>kubernetes1.28-apiserver-1.28.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.28-apiserver-1.28.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940144" comment="kubernetes1.28-apiserver-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940145" comment="kubernetes1.28-client-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940146" comment="kubernetes1.28-client-bash-completion-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940147" comment="kubernetes1.28-client-common-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940148" comment="kubernetes1.28-client-fish-completion-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940149" comment="kubernetes1.28-controller-manager-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940150" comment="kubernetes1.28-kubeadm-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940151" comment="kubernetes1.28-kubelet-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940152" comment="kubernetes1.28-kubelet-common-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940153" comment="kubernetes1.28-proxy-1.28.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940154" comment="kubernetes1.28-scheduler-1.28.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252614" version="1" class="patch">
	<metadata>
		<title>python310-Flask-Cors-4.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1681" ref_url="https://www.suse.com/security/cve/CVE-2024-1681/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-Cors-4.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-1681/">CVE-2024-1681 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1681">CVE-2024-1681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940155" comment="python310-Flask-Cors-4.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940156" comment="python311-Flask-Cors-4.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940157" comment="python312-Flask-Cors-4.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252615" version="1" class="patch">
	<metadata>
		<title>python310-setuptools-72.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-setuptools-72.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940158" comment="python310-setuptools-72.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940159" comment="python310-setuptools-wheel-72.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940160" comment="python311-setuptools-72.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940161" comment="python311-setuptools-wheel-72.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940162" comment="python312-setuptools-72.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940163" comment="python312-setuptools-wheel-72.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252616" version="1" class="patch">
	<metadata>
		<title>python312-3.12.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940164" comment="python312-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940165" comment="python312-32bit-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940166" comment="python312-curses-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940167" comment="python312-dbm-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940168" comment="python312-idle-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940169" comment="python312-tk-3.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940170" comment="python312-x86-64-v3-3.12.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252617" version="1" class="patch">
	<metadata>
		<title>python38-3.8.19-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.19-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940171" comment="python38-3.8.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940172" comment="python38-curses-3.8.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940173" comment="python38-dbm-3.8.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940174" comment="python38-idle-3.8.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940175" comment="python38-tk-3.8.19-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252618" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940176" comment="python39-3.9.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940177" comment="python39-curses-3.9.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940178" comment="python39-dbm-3.9.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940179" comment="python39-idle-3.9.19-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940180" comment="python39-tk-3.9.19-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252619" version="1" class="patch">
	<metadata>
		<title>python310-3.10.14-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.14-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940181" comment="python310-3.10.14-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940182" comment="python310-32bit-3.10.14-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940183" comment="python310-curses-3.10.14-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940184" comment="python310-dbm-3.10.14-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940185" comment="python310-idle-3.10.14-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940186" comment="python310-tk-3.10.14-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252620" version="1" class="patch">
	<metadata>
		<title>python311-3.11.9-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.9-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940187" comment="python311-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940188" comment="python311-32bit-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940189" comment="python311-curses-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940190" comment="python311-dbm-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940191" comment="python311-idle-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940192" comment="python311-tk-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940193" comment="python311-x86-64-v3-3.11.9-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252621" version="1" class="patch">
	<metadata>
		<title>python312-3.12.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940194" comment="python312-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940195" comment="python312-32bit-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940196" comment="python312-curses-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940197" comment="python312-dbm-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940198" comment="python312-idle-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940199" comment="python312-tk-3.12.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940200" comment="python312-x86-64-v3-3.12.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252622" version="1" class="patch">
	<metadata>
		<title>python313-3.13.0~rc1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.0~rc1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940201" comment="python313-3.13.0~rc1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940202" comment="python313-curses-3.13.0~rc1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940203" comment="python313-dbm-3.13.0~rc1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940204" comment="python313-idle-3.13.0~rc1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940205" comment="python313-tk-3.13.0~rc1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940206" comment="python313-x86-64-v3-3.13.0~rc1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252623" version="1" class="patch">
	<metadata>
		<title>libwireshark17-4.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8250" ref_url="https://www.suse.com/security/cve/CVE-2024-8250/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark17-4.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8250/">CVE-2024-8250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8250">CVE-2024-8250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940207" comment="libwireshark17-4.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940208" comment="libwiretap14-4.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940209" comment="libwsutil15-4.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940210" comment="wireshark-4.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940211" comment="wireshark-devel-4.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940212" comment="wireshark-ui-qt-4.2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252624" version="1" class="patch">
	<metadata>
		<title>chromedriver-128.0.6613.113-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8193" ref_url="https://www.suse.com/security/cve/CVE-2024-8193/" source="CVE"/>
		<reference ref_id="CVE-2024-8194" ref_url="https://www.suse.com/security/cve/CVE-2024-8194/" source="CVE"/>
		<reference ref_id="CVE-2024-8198" ref_url="https://www.suse.com/security/cve/CVE-2024-8198/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-128.0.6613.113-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8193/">CVE-2024-8193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8193">CVE-2024-8193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8194/">CVE-2024-8194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8194">CVE-2024-8194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8198/">CVE-2024-8198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8198">CVE-2024-8198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940213" comment="chromedriver-128.0.6613.113-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940214" comment="chromium-128.0.6613.113-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252625" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45157" ref_url="https://www.suse.com/security/cve/CVE-2024-45157/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45157/">CVE-2024-45157 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45157">CVE-2024-45157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941088" comment="libmbedcrypto7-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941089" comment="libmbedcrypto7-x86-64-v3-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941090" comment="libmbedtls14-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941091" comment="libmbedtls14-x86-64-v3-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941092" comment="libmbedx509-1-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941093" comment="libmbedx509-1-x86-64-v3-2.28.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941094" comment="mbedtls-2-devel-2.28.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252626" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.99.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2397" ref_url="https://www.suse.com/security/cve/CVE-2024-2397/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.99.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2397/">CVE-2024-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2397">CVE-2024-2397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941095" comment="tcpdump-4.99.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252627" version="1" class="patch">
	<metadata>
		<title>389-ds-3.1.1~git13.a9c7ff9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.1.1~git13.a9c7ff9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941096" comment="389-ds-3.1.1~git13.a9c7ff9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941097" comment="389-ds-devel-3.1.1~git13.a9c7ff9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941098" comment="389-ds-snmp-3.1.1~git13.a9c7ff9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941099" comment="lib389-3.1.1~git13.a9c7ff9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941100" comment="libsvrcore0-3.1.1~git13.a9c7ff9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252628" version="1" class="patch">
	<metadata>
		<title>haproxy-3.0.4+git0.7a59afa93-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45506" ref_url="https://www.suse.com/security/cve/CVE-2024-45506/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-3.0.4+git0.7a59afa93-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45506/">CVE-2024-45506 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45506">CVE-2024-45506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941101" comment="haproxy-3.0.4+git0.7a59afa93-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252629" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.18-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45508" ref_url="https://www.suse.com/security/cve/CVE-2024-45508/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.18-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45508/">CVE-2024-45508 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45508">CVE-2024-45508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941102" comment="htmldoc-1.9.18-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252630" version="1" class="patch">
	<metadata>
		<title>libpcap-devel-1.10.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-7256" ref_url="https://www.suse.com/security/cve/CVE-2023-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-8006" ref_url="https://www.suse.com/security/cve/CVE-2024-8006/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap-devel-1.10.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7256/">CVE-2023-7256 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8006/">CVE-2024-8006 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941103" comment="libpcap-devel-1.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941104" comment="libpcap-devel-32bit-1.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941105" comment="libpcap-devel-static-1.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941106" comment="libpcap1-1.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941107" comment="libpcap1-32bit-1.10.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252631" version="1" class="patch">
	<metadata>
		<title>python310-Django4-4.2.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45230" ref_url="https://www.suse.com/security/cve/CVE-2024-45230/" source="CVE"/>
		<reference ref_id="CVE-2024-45231" ref_url="https://www.suse.com/security/cve/CVE-2024-45231/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django4-4.2.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45230/">CVE-2024-45230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45230">CVE-2024-45230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45231/">CVE-2024-45231 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45231">CVE-2024-45231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941108" comment="python310-Django4-4.2.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941109" comment="python311-Django4-4.2.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941110" comment="python312-Django4-4.2.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252632" version="1" class="patch">
	<metadata>
		<title>python310-numpy1-1.26.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41495" ref_url="https://www.suse.com/security/cve/CVE-2021-41495/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-numpy1-1.26.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12852">CVE-2017-12852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41495/">CVE-2021-41495 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41495">CVE-2021-41495 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41496">CVE-2021-41496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941111" comment="python310-numpy1-1.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941112" comment="python310-numpy1-devel-1.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941113" comment="python311-numpy1-1.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941114" comment="python311-numpy1-devel-1.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941115" comment="python312-numpy1-1.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941116" comment="python312-numpy1-devel-1.26.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252633" version="1" class="patch">
	<metadata>
		<title>runc-1.2.0~rc3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.2.0~rc3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941117" comment="runc-1.2.0~rc3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252634" version="1" class="patch">
	<metadata>
		<title>chromedriver-128.0.6613.119-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7970" ref_url="https://www.suse.com/security/cve/CVE-2024-7970/" source="CVE"/>
		<reference ref_id="CVE-2024-8362" ref_url="https://www.suse.com/security/cve/CVE-2024-8362/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-128.0.6613.119-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7970/">CVE-2024-7970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7970">CVE-2024-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8362/">CVE-2024-8362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8362">CVE-2024-8362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941358" comment="chromedriver-128.0.6613.119-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941359" comment="chromium-128.0.6613.119-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252635" version="1" class="patch">
	<metadata>
		<title>klp-build-0~20240902.c95cc9e-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921/" source="CVE"/>
		<description>
These are all security issues fixed in the klp-build-0~20240902.c95cc9e-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941360" comment="klp-build-0~20240902.c95cc9e-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252636" version="1" class="patch">
	<metadata>
		<title>libvirt-10.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8235" ref_url="https://www.suse.com/security/cve/CVE-2024-8235/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-10.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8235/">CVE-2024-8235 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8235">CVE-2024-8235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941361" comment="libvirt-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941362" comment="libvirt-client-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941363" comment="libvirt-client-qemu-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941364" comment="libvirt-daemon-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941365" comment="libvirt-daemon-common-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941366" comment="libvirt-daemon-config-network-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941367" comment="libvirt-daemon-config-nwfilter-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941368" comment="libvirt-daemon-driver-libxl-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941369" comment="libvirt-daemon-driver-lxc-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941370" comment="libvirt-daemon-driver-network-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941371" comment="libvirt-daemon-driver-nodedev-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941372" comment="libvirt-daemon-driver-nwfilter-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941373" comment="libvirt-daemon-driver-qemu-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941374" comment="libvirt-daemon-driver-secret-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941375" comment="libvirt-daemon-driver-storage-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941376" comment="libvirt-daemon-driver-storage-core-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941377" comment="libvirt-daemon-driver-storage-disk-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941378" comment="libvirt-daemon-driver-storage-gluster-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941379" comment="libvirt-daemon-driver-storage-iscsi-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941380" comment="libvirt-daemon-driver-storage-iscsi-direct-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941381" comment="libvirt-daemon-driver-storage-logical-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941382" comment="libvirt-daemon-driver-storage-mpath-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941383" comment="libvirt-daemon-driver-storage-rbd-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941384" comment="libvirt-daemon-driver-storage-scsi-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941385" comment="libvirt-daemon-hooks-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941386" comment="libvirt-daemon-lock-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941387" comment="libvirt-daemon-log-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941388" comment="libvirt-daemon-lxc-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941389" comment="libvirt-daemon-plugin-lockd-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941390" comment="libvirt-daemon-plugin-sanlock-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941391" comment="libvirt-daemon-proxy-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941392" comment="libvirt-daemon-qemu-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941393" comment="libvirt-daemon-xen-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941394" comment="libvirt-devel-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941395" comment="libvirt-doc-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941396" comment="libvirt-libs-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941397" comment="libvirt-nss-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941398" comment="libvirt-ssh-proxy-10.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941399" comment="wireshark-plugin-libvirt-10.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252637" version="1" class="patch">
	<metadata>
		<title>nqptp-1.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-43771" ref_url="https://www.suse.com/security/cve/CVE-2023-43771/" source="CVE"/>
		<description>
These are all security issues fixed in the nqptp-1.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43771/">CVE-2023-43771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43771">CVE-2023-43771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941400" comment="nqptp-1.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252638" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941401" comment="libopenssl-3-devel-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941402" comment="libopenssl-3-devel-32bit-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941403" comment="libopenssl-3-fips-provider-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941404" comment="libopenssl-3-fips-provider-32bit-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941405" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941406" comment="libopenssl3-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941407" comment="libopenssl3-32bit-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941408" comment="libopenssl3-x86-64-v3-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941409" comment="openssl-3-3.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941410" comment="openssl-3-doc-3.1.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252639" version="1" class="patch">
	<metadata>
		<title>python310-Django-5.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45230" ref_url="https://www.suse.com/security/cve/CVE-2024-45230/" source="CVE"/>
		<reference ref_id="CVE-2024-45231" ref_url="https://www.suse.com/security/cve/CVE-2024-45231/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-5.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45230/">CVE-2024-45230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45230">CVE-2024-45230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45231/">CVE-2024-45231 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45231">CVE-2024-45231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941411" comment="python310-Django-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941412" comment="python311-Django-5.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941413" comment="python312-Django-5.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252640" version="1" class="patch">
	<metadata>
		<title>aardvark-dns-1.12.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8418" ref_url="https://www.suse.com/security/cve/CVE-2024-8418/" source="CVE"/>
		<description>
These are all security issues fixed in the aardvark-dns-1.12.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8418/">CVE-2024-8418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8418">CVE-2024-8418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941567" comment="aardvark-dns-1.12.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252641" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941568" comment="containerd-1.7.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941569" comment="containerd-ctr-1.7.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941570" comment="containerd-devel-1.7.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252642" version="1" class="patch">
	<metadata>
		<title>docker-26.1.5_ce-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-26.1.5_ce-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941571" comment="docker-26.1.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941572" comment="docker-bash-completion-26.1.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941573" comment="docker-fish-completion-26.1.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941574" comment="docker-rootless-extras-26.1.5_ce-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941575" comment="docker-zsh-completion-26.1.5_ce-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252643" version="1" class="patch">
	<metadata>
		<title>expat-2.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941576" comment="expat-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941577" comment="libexpat-devel-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941578" comment="libexpat-devel-32bit-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941579" comment="libexpat1-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941580" comment="libexpat1-32bit-2.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252644" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941581" comment="go1.22-1.22.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941582" comment="go1.22-doc-1.22.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941583" comment="go1.22-libstd-1.22.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941584" comment="go1.22-race-1.22.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252645" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941585" comment="go1.23-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941586" comment="go1.23-doc-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941587" comment="go1.23-libstd-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941588" comment="go1.23-race-1.23.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252646" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-115.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-115.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941937" comment="MozillaThunderbird-115.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941938" comment="MozillaThunderbird-openpgp-librnp-115.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941939" comment="MozillaThunderbird-translations-common-115.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941940" comment="MozillaThunderbird-translations-other-115.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252647" version="1" class="patch">
	<metadata>
		<title>python313-3.13.0~rc2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.0~rc2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941941" comment="python313-3.13.0~rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941942" comment="python313-curses-3.13.0~rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941943" comment="python313-dbm-3.13.0~rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941944" comment="python313-idle-3.13.0~rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941945" comment="python313-tk-3.13.0~rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941946" comment="python313-x86-64-v3-3.13.0~rc2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252648" version="1" class="patch">
	<metadata>
		<title>python39-3.9.19-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.19-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941947" comment="python39-3.9.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941948" comment="python39-curses-3.9.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941949" comment="python39-dbm-3.9.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941950" comment="python39-idle-3.9.19-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941951" comment="python39-tk-3.9.19-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252649" version="1" class="patch">
	<metadata>
		<title>x3270-4.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-4.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941952" comment="x3270-4.3-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252650" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40724" ref_url="https://www.suse.com/security/cve/CVE-2024-40724/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40724/">CVE-2024-40724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40724">CVE-2024-40724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942152" comment="assimp-devel-5.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942153" comment="libassimp5-5.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252651" version="1" class="patch">
	<metadata>
		<title>forgejo-8.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43788" ref_url="https://www.suse.com/security/cve/CVE-2024-43788/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-8.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-43788/">CVE-2024-43788 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43788">CVE-2024-43788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942154" comment="forgejo-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942155" comment="forgejo-apparmor-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942156" comment="forgejo-firewalld-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942157" comment="forgejo-selinux-8.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252652" version="1" class="patch">
	<metadata>
		<title>python39-3.9.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942158" comment="python39-3.9.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942159" comment="python39-curses-3.9.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942160" comment="python39-dbm-3.9.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942161" comment="python39-idle-3.9.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942162" comment="python39-tk-3.9.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252653" version="1" class="patch">
	<metadata>
		<title>keepalived-2.3.1+git59.b6681f98-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184/" source="CVE"/>
		<description>
These are all security issues fixed in the keepalived-2.3.1+git59.b6681f98-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942415" comment="keepalived-2.3.1+git59.b6681f98-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252654" version="1" class="patch">
	<metadata>
		<title>curl-8.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8096" ref_url="https://www.suse.com/security/cve/CVE-2024-8096/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8096/">CVE-2024-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942545" comment="curl-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942546" comment="curl-fish-completion-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942547" comment="curl-zsh-completion-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942548" comment="libcurl-devel-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942549" comment="libcurl-devel-32bit-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942550" comment="libcurl-devel-doc-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942551" comment="libcurl4-8.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942552" comment="libcurl4-32bit-8.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252655" version="1" class="patch">
	<metadata>
		<title>grype-0.80.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3154" ref_url="https://www.suse.com/security/cve/CVE-2024-3154/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-0.80.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3154/">CVE-2024-3154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3154">CVE-2024-3154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942553" comment="grype-0.80.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942554" comment="grype-bash-completion-0.80.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942555" comment="grype-fish-completion-0.80.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942556" comment="grype-zsh-completion-0.80.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252656" version="1" class="patch">
	<metadata>
		<title>chromedriver-128.0.6613.137-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8636" ref_url="https://www.suse.com/security/cve/CVE-2024-8636/" source="CVE"/>
		<reference ref_id="CVE-2024-8637" ref_url="https://www.suse.com/security/cve/CVE-2024-8637/" source="CVE"/>
		<reference ref_id="CVE-2024-8638" ref_url="https://www.suse.com/security/cve/CVE-2024-8638/" source="CVE"/>
		<reference ref_id="CVE-2024-8639" ref_url="https://www.suse.com/security/cve/CVE-2024-8639/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-128.0.6613.137-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8636/">CVE-2024-8636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8636">CVE-2024-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8637/">CVE-2024-8637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8637">CVE-2024-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8638/">CVE-2024-8638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8638">CVE-2024-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8639/">CVE-2024-8639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8639">CVE-2024-8639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942583" comment="chromedriver-128.0.6613.137-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942584" comment="chromium-128.0.6613.137-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252657" version="1" class="patch">
	<metadata>
		<title>ovmf-202405-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202405-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942585" comment="ovmf-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942586" comment="ovmf-tools-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942587" comment="qemu-ovmf-ia32-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942588" comment="qemu-ovmf-x86_64-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942589" comment="qemu-ovmf-x86_64-debug-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942590" comment="qemu-uefi-aarch32-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942591" comment="qemu-uefi-aarch64-202405-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942592" comment="qemu-uefi-riscv64-202405-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252658" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20240910-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20240910-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942593" comment="ucode-intel-20240910-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252659" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52424" ref_url="https://www.suse.com/security/cve/CVE-2023-52424/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52424/">CVE-2023-52424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52424">CVE-2023-52424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942594" comment="wpa_supplicant-2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942595" comment="wpa_supplicant-gui-2.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252660" version="1" class="patch">
	<metadata>
		<title>ffmpeg-5-5.1.4-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-5-5.1.4-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942975" comment="ffmpeg-5-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942976" comment="ffmpeg-5-libavcodec-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942977" comment="ffmpeg-5-libavdevice-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942978" comment="ffmpeg-5-libavfilter-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942979" comment="ffmpeg-5-libavformat-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942980" comment="ffmpeg-5-libavutil-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942981" comment="ffmpeg-5-libpostproc-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942982" comment="ffmpeg-5-libswresample-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942983" comment="ffmpeg-5-libswscale-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942984" comment="ffmpeg-5-private-devel-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942985" comment="libavcodec59-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942986" comment="libavcodec59-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942987" comment="libavdevice59-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942988" comment="libavdevice59-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942989" comment="libavfilter8-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942990" comment="libavfilter8-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942991" comment="libavformat59-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942992" comment="libavformat59-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942993" comment="libavutil57-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942994" comment="libavutil57-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942995" comment="libpostproc56-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942996" comment="libpostproc56-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942997" comment="libswresample4_ff5-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942998" comment="libswresample4_ff5-32bit-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942999" comment="libswscale6-5.1.4-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943000" comment="libswscale6-32bit-5.1.4-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252661" version="1" class="patch">
	<metadata>
		<title>python38-3.8.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
These are all security issues fixed in the python38-3.8.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943001" comment="python38-3.8.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943002" comment="python38-curses-3.8.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943003" comment="python38-dbm-3.8.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943004" comment="python38-idle-3.8.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943005" comment="python38-tk-3.8.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252662" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8645" ref_url="https://www.suse.com/security/cve/CVE-2024-8645/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-8645/">CVE-2024-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8645">CVE-2024-8645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943006" comment="libwireshark18-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943007" comment="libwiretap15-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943008" comment="libwsutil16-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943009" comment="wireshark-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943010" comment="wireshark-devel-4.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943011" comment="wireshark-ui-qt-4.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252663" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.4.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45679" ref_url="https://www.suse.com/security/cve/CVE-2024-45679/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.4.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45679/">CVE-2024-45679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45679">CVE-2024-45679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943332" comment="assimp-devel-5.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943333" comment="libassimp5-5.4.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252664" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.4-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.4-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943334" comment="ffmpeg-4-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943335" comment="ffmpeg-4-libavcodec-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943336" comment="ffmpeg-4-libavdevice-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943337" comment="ffmpeg-4-libavfilter-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943338" comment="ffmpeg-4-libavformat-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943339" comment="ffmpeg-4-libavresample-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943340" comment="ffmpeg-4-libavutil-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943341" comment="ffmpeg-4-libpostproc-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943342" comment="ffmpeg-4-libswresample-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943343" comment="ffmpeg-4-libswscale-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943344" comment="ffmpeg-4-private-devel-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943345" comment="libavcodec58_134-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943346" comment="libavcodec58_134-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943347" comment="libavdevice58_13-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943348" comment="libavdevice58_13-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943349" comment="libavfilter7_110-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943350" comment="libavfilter7_110-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943351" comment="libavformat58_76-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943352" comment="libavformat58_76-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943353" comment="libavresample4_0-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943354" comment="libavresample4_0-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943355" comment="libavutil56_70-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943356" comment="libavutil56_70-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943357" comment="libpostproc55_9-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943358" comment="libpostproc55_9-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943359" comment="libswresample3_9-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943360" comment="libswresample3_9-32bit-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943361" comment="libswscale5_9-4.4.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943362" comment="libswscale5_9-32bit-4.4.4-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252665" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.1-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943363" comment="ffmpeg-6-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943364" comment="ffmpeg-6-libavcodec-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943365" comment="ffmpeg-6-libavdevice-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943366" comment="ffmpeg-6-libavfilter-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943367" comment="ffmpeg-6-libavformat-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943368" comment="ffmpeg-6-libavutil-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943369" comment="ffmpeg-6-libpostproc-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943370" comment="ffmpeg-6-libswresample-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943371" comment="ffmpeg-6-libswscale-devel-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943372" comment="libavcodec60-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943373" comment="libavcodec60-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943374" comment="libavdevice60-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943375" comment="libavdevice60-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943376" comment="libavfilter9-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943377" comment="libavfilter9-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943378" comment="libavformat60-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943379" comment="libavformat60-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943380" comment="libavutil58-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943381" comment="libavutil58-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943382" comment="libpostproc57-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943383" comment="libpostproc57-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943384" comment="libswresample4-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943385" comment="libswresample4-32bit-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943386" comment="libswscale7-6.1.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943387" comment="libswscale7-32bit-6.1.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252666" version="1" class="patch">
	<metadata>
		<title>python310-3.10.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943388" comment="python310-3.10.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943389" comment="python310-32bit-3.10.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943390" comment="python310-curses-3.10.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943391" comment="python310-dbm-3.10.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943392" comment="python310-idle-3.10.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943393" comment="python310-tk-3.10.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252667" version="1" class="patch">
	<metadata>
		<title>python311-3.11.9-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.9-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940187" comment="python311-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943394" comment="python311-32bit-3.11.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940189" comment="python311-curses-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940190" comment="python311-dbm-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940191" comment="python311-idle-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940192" comment="python311-tk-3.11.9-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940193" comment="python311-x86-64-v3-3.11.9-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252668" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49582" ref_url="https://www.suse.com/security/cve/CVE-2023-49582/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49582/">CVE-2023-49582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49582">CVE-2023-49582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943664" comment="apr-devel-1.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943665" comment="libapr1-0-1.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252669" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943666" comment="postgresql12-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943667" comment="postgresql12-contrib-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943668" comment="postgresql12-devel-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943669" comment="postgresql12-docs-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943670" comment="postgresql12-llvmjit-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943671" comment="postgresql12-llvmjit-devel-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943672" comment="postgresql12-plperl-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943673" comment="postgresql12-plpython-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943674" comment="postgresql12-pltcl-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943675" comment="postgresql12-server-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943676" comment="postgresql12-server-devel-12.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943677" comment="postgresql12-test-12.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252670" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943678" comment="postgresql13-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943679" comment="postgresql13-contrib-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943680" comment="postgresql13-devel-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943681" comment="postgresql13-docs-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943682" comment="postgresql13-llvmjit-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943683" comment="postgresql13-llvmjit-devel-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943684" comment="postgresql13-plperl-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943685" comment="postgresql13-plpython-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943686" comment="postgresql13-pltcl-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943687" comment="postgresql13-server-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943688" comment="postgresql13-server-devel-13.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943689" comment="postgresql13-test-13.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252671" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943690" comment="postgresql14-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943691" comment="postgresql14-contrib-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943692" comment="postgresql14-devel-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943693" comment="postgresql14-docs-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943694" comment="postgresql14-llvmjit-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943695" comment="postgresql14-llvmjit-devel-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943696" comment="postgresql14-plperl-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943697" comment="postgresql14-plpython-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943698" comment="postgresql14-pltcl-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943699" comment="postgresql14-server-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943700" comment="postgresql14-server-devel-14.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943701" comment="postgresql14-test-14.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252672" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943702" comment="postgresql15-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943703" comment="postgresql15-contrib-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943704" comment="postgresql15-devel-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943705" comment="postgresql15-docs-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943706" comment="postgresql15-llvmjit-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943707" comment="postgresql15-llvmjit-devel-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943708" comment="postgresql15-plperl-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943709" comment="postgresql15-plpython-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943710" comment="postgresql15-pltcl-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943711" comment="postgresql15-server-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943712" comment="postgresql15-server-devel-15.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943713" comment="postgresql15-test-15.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252673" version="1" class="patch">
	<metadata>
		<title>python39-3.9.20-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.20-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943714" comment="python39-3.9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943715" comment="python39-curses-3.9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943716" comment="python39-dbm-3.9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943717" comment="python39-idle-3.9.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943718" comment="python39-tk-3.9.20-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252674" version="1" class="patch">
	<metadata>
		<title>onefetch-2.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the onefetch-2.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944056" comment="onefetch-2.22.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252675" version="1" class="patch">
	<metadata>
		<title>rage-encryption-0.10.0+0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<description>
These are all security issues fixed in the rage-encryption-0.10.0+0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944057" comment="rage-encryption-0.10.0+0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944058" comment="rage-encryption-bash-completion-0.10.0+0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944059" comment="rage-encryption-fish-completion-0.10.0+0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944060" comment="rage-encryption-zsh-completion-0.10.0+0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252676" version="1" class="patch">
	<metadata>
		<title>stgit-2.4.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the stgit-2.4.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944061" comment="stgit-2.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944062" comment="stgit-bash-completion-2.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944063" comment="stgit-emacs-2.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944064" comment="stgit-fish-completion-2.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944065" comment="stgit-vim-plugin-2.4.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944066" comment="stgit-zsh-completion-2.4.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252677" version="1" class="patch">
	<metadata>
		<title>system-user-zabbix-6.0.33-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36461" ref_url="https://www.suse.com/security/cve/CVE-2024-36461/" source="CVE"/>
		<description>
These are all security issues fixed in the system-user-zabbix-6.0.33-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36461/">CVE-2024-36461 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36461">CVE-2024-36461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944067" comment="system-user-zabbix-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944068" comment="zabbix-agent-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944069" comment="zabbix-java-gateway-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944070" comment="zabbix-proxy-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944071" comment="zabbix-proxy-mysql-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944072" comment="zabbix-proxy-postgresql-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944073" comment="zabbix-proxy-sqlite-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944074" comment="zabbix-server-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944075" comment="zabbix-server-mysql-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944076" comment="zabbix-server-postgresql-6.0.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944077" comment="zabbix-ui-6.0.33-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252678" version="1" class="patch">
	<metadata>
		<title>chromedriver-129.0.6668.58-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8904" ref_url="https://www.suse.com/security/cve/CVE-2024-8904/" source="CVE"/>
		<reference ref_id="CVE-2024-8905" ref_url="https://www.suse.com/security/cve/CVE-2024-8905/" source="CVE"/>
		<reference ref_id="CVE-2024-8906" ref_url="https://www.suse.com/security/cve/CVE-2024-8906/" source="CVE"/>
		<reference ref_id="CVE-2024-8907" ref_url="https://www.suse.com/security/cve/CVE-2024-8907/" source="CVE"/>
		<reference ref_id="CVE-2024-8908" ref_url="https://www.suse.com/security/cve/CVE-2024-8908/" source="CVE"/>
		<reference ref_id="CVE-2024-8909" ref_url="https://www.suse.com/security/cve/CVE-2024-8909/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-129.0.6668.58-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2024-09-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8904/">CVE-2024-8904 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8904">CVE-2024-8904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8905/">CVE-2024-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8905">CVE-2024-8905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8906/">CVE-2024-8906 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8906">CVE-2024-8906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8907/">CVE-2024-8907 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8907">CVE-2024-8907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8908/">CVE-2024-8908 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8908">CVE-2024-8908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8909/">CVE-2024-8909 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8909">CVE-2024-8909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944078" comment="chromedriver-129.0.6668.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944079" comment="chromium-129.0.6668.58-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252679" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-130.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8388" ref_url="https://www.suse.com/security/cve/CVE-2024-8388/" source="CVE"/>
		<reference ref_id="CVE-2024-8389" ref_url="https://www.suse.com/security/cve/CVE-2024-8389/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-130.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8388/">CVE-2024-8388 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8388">CVE-2024-8388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8389/">CVE-2024-8389 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8389">CVE-2024-8389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944096" comment="MozillaFirefox-130.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944097" comment="MozillaFirefox-branding-upstream-130.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944098" comment="MozillaFirefox-devel-130.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944099" comment="MozillaFirefox-translations-common-130.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944100" comment="MozillaFirefox-translations-other-130.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252680" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.10.3~git0.ee7d7ef-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.10.3~git0.ee7d7ef-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944101" comment="cargo-c-0.10.3~git0.ee7d7ef-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252681" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944371" comment="postgresql16-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944372" comment="postgresql16-contrib-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944373" comment="postgresql16-devel-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944374" comment="postgresql16-docs-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944375" comment="postgresql16-llvmjit-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944376" comment="postgresql16-llvmjit-devel-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944377" comment="postgresql16-plperl-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944378" comment="postgresql16-plpython-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944379" comment="postgresql16-pltcl-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944380" comment="postgresql16-server-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944381" comment="postgresql16-server-devel-16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944382" comment="postgresql16-test-16.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252682" version="1" class="patch">
	<metadata>
		<title>libecpg6-17~rc1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17~rc1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944383" comment="libecpg6-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944384" comment="libecpg6-32bit-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944385" comment="libpq5-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944386" comment="libpq5-32bit-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944387" comment="postgresql17-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944388" comment="postgresql17-contrib-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944389" comment="postgresql17-devel-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944390" comment="postgresql17-docs-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944391" comment="postgresql17-llvmjit-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944392" comment="postgresql17-llvmjit-devel-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944393" comment="postgresql17-plperl-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944394" comment="postgresql17-plpython-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944395" comment="postgresql17-pltcl-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944396" comment="postgresql17-server-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944397" comment="postgresql17-server-devel-17~rc1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944398" comment="postgresql17-test-17~rc1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252683" version="1" class="patch">
	<metadata>
		<title>python310-azure-identity-1.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35255" ref_url="https://www.suse.com/security/cve/CVE-2024-35255/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-azure-identity-1.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35255/">CVE-2024-35255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35255">CVE-2024-35255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944399" comment="python310-azure-identity-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944400" comment="python311-azure-identity-1.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944401" comment="python312-azure-identity-1.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252684" version="1" class="patch">
	<metadata>
		<title>cargo-audit-0.20.0~git66.972ac93-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-0.20.0~git66.972ac93-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944674" comment="cargo-audit-0.20.0~git66.972ac93-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252685" version="1" class="patch">
	<metadata>
		<title>obs-service-cargo-1.3.6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-cargo-1.3.6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944675" comment="obs-service-cargo-1.3.6-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252686" version="1" class="patch">
	<metadata>
		<title>traefik-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45410" ref_url="https://www.suse.com/security/cve/CVE-2024-45410/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45410/">CVE-2024-45410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45410">CVE-2024-45410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944676" comment="traefik-3.1.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252687" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2024-09-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944755" comment="libopenssl-3-devel-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944756" comment="libopenssl-3-devel-32bit-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944757" comment="libopenssl-3-fips-provider-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944758" comment="libopenssl-3-fips-provider-32bit-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944759" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944760" comment="libopenssl3-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944761" comment="libopenssl3-32bit-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944762" comment="libopenssl3-x86-64-v3-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944763" comment="openssl-3-3.1.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944764" comment="openssl-3-doc-3.1.4-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252688" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45410" ref_url="https://www.suse.com/security/cve/CVE-2024-45410/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2024-09-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45410/">CVE-2024-45410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45410">CVE-2024-45410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944765" comment="traefik2-2.11.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252689" version="1" class="patch">
	<metadata>
		<title>chromedriver-129.0.6668.70-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9120" ref_url="https://www.suse.com/security/cve/CVE-2024-9120/" source="CVE"/>
		<reference ref_id="CVE-2024-9121" ref_url="https://www.suse.com/security/cve/CVE-2024-9121/" source="CVE"/>
		<reference ref_id="CVE-2024-9122" ref_url="https://www.suse.com/security/cve/CVE-2024-9122/" source="CVE"/>
		<reference ref_id="CVE-2024-9123" ref_url="https://www.suse.com/security/cve/CVE-2024-9123/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-129.0.6668.70-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9120/">CVE-2024-9120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9120">CVE-2024-9120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9121/">CVE-2024-9121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9121">CVE-2024-9121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9122/">CVE-2024-9122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9122">CVE-2024-9122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9123/">CVE-2024-9123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9123">CVE-2024-9123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945200" comment="chromedriver-129.0.6668.70-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945201" comment="chromium-129.0.6668.70-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252690" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945202" comment="libmozjs-128-0-128.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945203" comment="mozjs128-128.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945204" comment="mozjs128-devel-128.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252691" version="1" class="patch">
	<metadata>
		<title>python312-3.12.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945205" comment="python312-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945206" comment="python312-32bit-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945207" comment="python312-curses-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945208" comment="python312-dbm-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945209" comment="python312-idle-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945210" comment="python312-tk-3.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945211" comment="python312-x86-64-v3-3.12.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252692" version="1" class="patch">
	<metadata>
		<title>json-java-20240303-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45688" ref_url="https://www.suse.com/security/cve/CVE-2022-45688/" source="CVE"/>
		<description>
These are all security issues fixed in the json-java-20240303-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45688/">CVE-2022-45688 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45688">CVE-2022-45688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945212" comment="json-java-20240303-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945213" comment="json-java-javadoc-20240303-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252693" version="1" class="patch">
	<metadata>
		<title>maven-archetype-3.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47197" ref_url="https://www.suse.com/security/cve/CVE-2024-47197/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-archetype-3.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47197/">CVE-2024-47197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47197">CVE-2024-47197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945214" comment="maven-archetype-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945215" comment="maven-archetype-catalog-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945216" comment="maven-archetype-common-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945217" comment="maven-archetype-descriptor-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945218" comment="maven-archetype-javadoc-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945219" comment="maven-archetype-packaging-3.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945220" comment="maven-archetype-plugin-3.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252694" version="1" class="patch">
	<metadata>
		<title>OpenIPMI-2.0.36.4+git.c114912-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42934" ref_url="https://www.suse.com/security/cve/CVE-2024-42934/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenIPMI-2.0.36.4+git.c114912-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-29"/>
	<updated date="2024-09-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42934/">CVE-2024-42934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42934">CVE-2024-42934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945221" comment="OpenIPMI-2.0.36.4+git.c114912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945222" comment="OpenIPMI-devel-2.0.36.4+git.c114912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945223" comment="OpenIPMI-python3-2.0.36.4+git.c114912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945224" comment="libOpenIPMI0-2.0.36.4+git.c114912-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945225" comment="libOpenIPMIui1-2.0.36.4+git.c114912-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252695" version="1" class="patch">
	<metadata>
		<title>argocd-cli-2.12.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45296" ref_url="https://www.suse.com/security/cve/CVE-2024-45296/" source="CVE"/>
		<description>
These are all security issues fixed in the argocd-cli-2.12.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-29"/>
	<updated date="2024-09-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45296/">CVE-2024-45296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45296">CVE-2024-45296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945226" comment="argocd-cli-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945227" comment="argocd-cli-bash-completion-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945228" comment="argocd-cli-zsh-completion-2.12.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252696" version="1" class="patch">
	<metadata>
		<title>kyverno-1.12.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
These are all security issues fixed in the kyverno-1.12.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-29"/>
	<updated date="2024-09-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945229" comment="kyverno-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945230" comment="kyverno-bash-completion-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945231" comment="kyverno-fish-completion-1.12.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945232" comment="kyverno-zsh-completion-1.12.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252697" version="1" class="patch">
	<metadata>
		<title>php8-8.3.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4577" ref_url="https://www.suse.com/security/cve/CVE-2024-4577/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.3.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-29"/>
	<updated date="2024-09-29"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4577/">CVE-2024-4577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4577">CVE-2024-4577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945233" comment="php8-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945234" comment="php8-bcmath-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945235" comment="php8-bz2-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945236" comment="php8-calendar-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945237" comment="php8-cli-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945238" comment="php8-ctype-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945239" comment="php8-curl-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945240" comment="php8-dba-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945241" comment="php8-devel-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945242" comment="php8-dom-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945243" comment="php8-enchant-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945244" comment="php8-exif-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945245" comment="php8-ffi-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945246" comment="php8-fileinfo-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945247" comment="php8-ftp-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945248" comment="php8-gd-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945249" comment="php8-gettext-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945250" comment="php8-gmp-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945251" comment="php8-iconv-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945252" comment="php8-intl-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945253" comment="php8-ldap-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945254" comment="php8-mbstring-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945255" comment="php8-mysql-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945256" comment="php8-odbc-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945257" comment="php8-opcache-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945258" comment="php8-openssl-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945259" comment="php8-pcntl-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945260" comment="php8-pdo-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945261" comment="php8-pgsql-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945262" comment="php8-phar-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945263" comment="php8-posix-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945264" comment="php8-readline-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945265" comment="php8-shmop-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945266" comment="php8-snmp-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945267" comment="php8-soap-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945268" comment="php8-sockets-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945269" comment="php8-sodium-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945270" comment="php8-sqlite-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945271" comment="php8-sysvmsg-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945272" comment="php8-sysvsem-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945273" comment="php8-sysvshm-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945274" comment="php8-tidy-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945275" comment="php8-tokenizer-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945276" comment="php8-xmlreader-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945277" comment="php8-xmlwriter-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945278" comment="php8-xsl-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945279" comment="php8-zip-8.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945280" comment="php8-zlib-8.3.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252698" version="1" class="patch">
	<metadata>
		<title>xen-4.19.0_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45817" ref_url="https://www.suse.com/security/cve/CVE-2024-45817/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.19.0_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45817/">CVE-2024-45817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45817">CVE-2024-45817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945384" comment="xen-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945385" comment="xen-devel-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945386" comment="xen-doc-html-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945387" comment="xen-libs-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945388" comment="xen-tools-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945389" comment="xen-tools-domU-4.19.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945390" comment="xen-tools-xendomains-wait-disk-4.19.0_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252699" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.7.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.7.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945444" comment="bsdtar-3.7.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945445" comment="libarchive-devel-3.7.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945446" comment="libarchive13-3.7.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945447" comment="libarchive13-32bit-3.7.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252700" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.4.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.4.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945448" comment="libmozjs-115-0-115.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945449" comment="mozjs115-115.4.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945450" comment="mozjs115-devel-115.4.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252701" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945451" comment="libmozjs-128-0-128.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945452" comment="mozjs128-128.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945453" comment="mozjs128-devel-128.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252702" version="1" class="patch">
	<metadata>
		<title>libmozjs-78-0-78.15.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-78-0-78.15.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945454" comment="libmozjs-78-0-78.15.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945455" comment="mozjs78-78.15.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945456" comment="mozjs78-devel-78.15.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252703" version="1" class="patch">
	<metadata>
		<title>opensc-0.25.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45615" ref_url="https://www.suse.com/security/cve/CVE-2024-45615/" source="CVE"/>
		<reference ref_id="CVE-2024-45616" ref_url="https://www.suse.com/security/cve/CVE-2024-45616/" source="CVE"/>
		<reference ref_id="CVE-2024-45617" ref_url="https://www.suse.com/security/cve/CVE-2024-45617/" source="CVE"/>
		<reference ref_id="CVE-2024-45618" ref_url="https://www.suse.com/security/cve/CVE-2024-45618/" source="CVE"/>
		<reference ref_id="CVE-2024-45619" ref_url="https://www.suse.com/security/cve/CVE-2024-45619/" source="CVE"/>
		<reference ref_id="CVE-2024-45620" ref_url="https://www.suse.com/security/cve/CVE-2024-45620/" source="CVE"/>
		<reference ref_id="CVE-2024-8443" ref_url="https://www.suse.com/security/cve/CVE-2024-8443/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.25.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45615/">CVE-2024-45615 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615">CVE-2024-45615 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45616/">CVE-2024-45616 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616">CVE-2024-45616 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45617/">CVE-2024-45617 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617">CVE-2024-45617 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45618/">CVE-2024-45618 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618">CVE-2024-45618 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45619/">CVE-2024-45619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619">CVE-2024-45619 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45620/">CVE-2024-45620 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620">CVE-2024-45620 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8443/">CVE-2024-8443 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443">CVE-2024-8443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945457" comment="opensc-0.25.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945458" comment="opensc-bash-completion-0.25.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252704" version="1" class="patch">
	<metadata>
		<title>chromedriver-129.0.6668.89-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7025" ref_url="https://www.suse.com/security/cve/CVE-2024-7025/" source="CVE"/>
		<reference ref_id="CVE-2024-9369" ref_url="https://www.suse.com/security/cve/CVE-2024-9369/" source="CVE"/>
		<reference ref_id="CVE-2024-9370" ref_url="https://www.suse.com/security/cve/CVE-2024-9370/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-129.0.6668.89-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7025/">CVE-2024-7025 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7025">CVE-2024-7025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9369/">CVE-2024-9369 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9369">CVE-2024-9369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9370/">CVE-2024-9370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9370">CVE-2024-9370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945786" comment="chromedriver-129.0.6668.89-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945787" comment="chromium-129.0.6668.89-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252705" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945788" comment="ffmpeg-7-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945789" comment="ffmpeg-7-libavcodec-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945790" comment="ffmpeg-7-libavdevice-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945791" comment="ffmpeg-7-libavfilter-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945792" comment="ffmpeg-7-libavformat-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945793" comment="ffmpeg-7-libavutil-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945794" comment="ffmpeg-7-libpostproc-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945795" comment="ffmpeg-7-libswresample-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945796" comment="ffmpeg-7-libswscale-devel-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945797" comment="libavcodec61-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945798" comment="libavcodec61-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945799" comment="libavdevice61-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945800" comment="libavdevice61-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945801" comment="libavfilter10-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945802" comment="libavfilter10-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945803" comment="libavformat61-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945804" comment="libavformat61-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945805" comment="libavutil59-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945806" comment="libavutil59-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945807" comment="libpostproc58-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945808" comment="libpostproc58-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945809" comment="libswresample5-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945810" comment="libswresample5-32bit-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945811" comment="libswscale8-7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945812" comment="libswscale8-32bit-7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252706" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-131.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9391" ref_url="https://www.suse.com/security/cve/CVE-2024-9391/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9395" ref_url="https://www.suse.com/security/cve/CVE-2024-9395/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9403" ref_url="https://www.suse.com/security/cve/CVE-2024-9403/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-131.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-06"/>
	<updated date="2024-10-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9391/">CVE-2024-9391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9391">CVE-2024-9391 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9395/">CVE-2024-9395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9395">CVE-2024-9395 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9403/">CVE-2024-9403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9403">CVE-2024-9403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945813" comment="MozillaFirefox-131.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945814" comment="MozillaFirefox-branding-upstream-131.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945815" comment="MozillaFirefox-devel-131.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945816" comment="MozillaFirefox-translations-common-131.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945817" comment="MozillaFirefox-translations-other-131.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252707" version="1" class="patch">
	<metadata>
		<title>rusty_v8-0.106.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the rusty_v8-0.106.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-07"/>
	<updated date="2024-10-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945834" comment="rusty_v8-0.106.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252708" version="1" class="patch">
	<metadata>
		<title>apache-commons-io-2.17.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47554" ref_url="https://www.suse.com/security/cve/CVE-2024-47554/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-io-2.17.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47554/">CVE-2024-47554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946121" comment="apache-commons-io-2.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946122" comment="apache-commons-io-javadoc-2.17.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252709" version="1" class="patch">
	<metadata>
		<title>buildah-1.37.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.37.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946123" comment="buildah-1.37.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252710" version="1" class="patch">
	<metadata>
		<title>liboath-devel-2.6.11.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47191" ref_url="https://www.suse.com/security/cve/CVE-2024-47191/" source="CVE"/>
		<description>
These are all security issues fixed in the liboath-devel-2.6.11.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47191/">CVE-2024-47191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47191">CVE-2024-47191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946124" comment="liboath-devel-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946125" comment="liboath0-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946126" comment="libpskc-devel-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946127" comment="libpskc0-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946128" comment="oath-toolkit-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946129" comment="oath-toolkit-xml-2.6.11.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946130" comment="pam_oath-2.6.11.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252711" version="1" class="patch">
	<metadata>
		<title>podman-5.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946131" comment="podman-5.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946132" comment="podman-docker-5.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946133" comment="podman-remote-5.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946134" comment="podmansh-5.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252712" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946135" comment="libunbound8-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946136" comment="python3-unbound-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946137" comment="unbound-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946138" comment="unbound-anchor-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946139" comment="unbound-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946140" comment="unbound-munin-1.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252713" version="1" class="patch">
	<metadata>
		<title>trivy-0.56.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.56.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946420" comment="trivy-0.56.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252714" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-131.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-131.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947277" comment="MozillaFirefox-131.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947278" comment="MozillaFirefox-branding-upstream-131.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947279" comment="MozillaFirefox-devel-131.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947280" comment="MozillaFirefox-translations-common-131.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947281" comment="MozillaFirefox-translations-other-131.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252715" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947282" comment="MozillaThunderbird-128.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947283" comment="MozillaThunderbird-openpgp-librnp-128.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947284" comment="MozillaThunderbird-translations-common-128.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947285" comment="MozillaThunderbird-translations-other-128.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252716" version="1" class="patch">
	<metadata>
		<title>java-jwt-4.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-42003" ref_url="https://www.suse.com/security/cve/CVE-2022-42003/" source="CVE"/>
		<description>
These are all security issues fixed in the java-jwt-4.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42003/">CVE-2022-42003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947286" comment="java-jwt-4.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947287" comment="java-jwt-javadoc-4.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252717" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9780" ref_url="https://www.suse.com/security/cve/CVE-2024-9780/" source="CVE"/>
		<reference ref_id="CVE-2024-9781" ref_url="https://www.suse.com/security/cve/CVE-2024-9781/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-9780/">CVE-2024-9780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9780">CVE-2024-9780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-9781/">CVE-2024-9781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9781">CVE-2024-9781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947288" comment="libwireshark18-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947289" comment="libwiretap15-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947290" comment="libwsutil16-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947291" comment="wireshark-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947292" comment="wireshark-devel-4.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947293" comment="wireshark-ui-qt-4.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252718" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947297" comment="libmozjs-128-0-128.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947298" comment="mozjs128-128.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947299" comment="mozjs128-devel-128.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252719" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-fop-2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28168" ref_url="https://www.suse.com/security/cve/CVE-2024-28168/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-fop-2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-13"/>
	<updated date="2024-10-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28168/">CVE-2024-28168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28168">CVE-2024-28168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947300" comment="xmlgraphics-fop-2.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252720" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.28-3.5.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.28-3.5.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947403" comment="etcd-for-k8s1.28-3.5.15-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252721" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.30-3.5.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.30-3.5.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947404" comment="etcd-for-k8s1.30-3.5.15-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252722" version="1" class="patch">
	<metadata>
		<title>libsonivox3-3.6.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23709" ref_url="https://www.suse.com/security/cve/CVE-2024-23709/" source="CVE"/>
		<description>
These are all security issues fixed in the libsonivox3-3.6.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23709/">CVE-2024-23709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23709">CVE-2024-23709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947405" comment="libsonivox3-3.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947406" comment="sonivox-devel-3.6.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252723" version="1" class="patch">
	<metadata>
		<title>haproxy-3.0.5+git0.8e879a52e-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49214" ref_url="https://www.suse.com/security/cve/CVE-2024-49214/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-3.0.5+git0.8e879a52e-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-49214/">CVE-2024-49214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49214">CVE-2024-49214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947441" comment="haproxy-3.0.5+git0.8e879a52e-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252724" version="1" class="patch">
	<metadata>
		<title>python310-pytest-html-4.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48949" ref_url="https://www.suse.com/security/cve/CVE-2024-48949/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pytest-html-4.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48949/">CVE-2024-48949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48949">CVE-2024-48949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947442" comment="python310-pytest-html-4.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947443" comment="python311-pytest-html-4.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947444" comment="python312-pytest-html-4.1.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252725" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-24.05.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42511" ref_url="https://www.suse.com/security/cve/CVE-2024-42511/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-24.05.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42511/">CVE-2024-42511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42511">CVE-2024-42511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947445" comment="libnss_slurm2-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947446" comment="libpmi0-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947447" comment="libslurm41-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947448" comment="perl-slurm-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947449" comment="slurm-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947450" comment="slurm-auth-none-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947451" comment="slurm-config-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947452" comment="slurm-config-man-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947453" comment="slurm-cray-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947454" comment="slurm-devel-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947455" comment="slurm-doc-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947456" comment="slurm-hdf5-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947457" comment="slurm-lua-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947458" comment="slurm-munge-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947459" comment="slurm-node-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947460" comment="slurm-openlava-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947461" comment="slurm-pam_slurm-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947462" comment="slurm-plugins-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947463" comment="slurm-rest-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947464" comment="slurm-seff-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947465" comment="slurm-sjstat-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947466" comment="slurm-slurmdbd-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947467" comment="slurm-sql-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947468" comment="slurm-sview-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947469" comment="slurm-testsuite-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947470" comment="slurm-torque-24.05.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947471" comment="slurm-webdoc-24.05.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252726" version="1" class="patch">
	<metadata>
		<title>buildah-1.37.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.37.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947817" comment="buildah-1.37.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252727" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.81-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47771" ref_url="https://www.suse.com/security/cve/CVE-2024-47771/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.81-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47771/">CVE-2024-47771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47771">CVE-2024-47771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947818" comment="element-desktop-1.11.81-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252728" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.81-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47771" ref_url="https://www.suse.com/security/cve/CVE-2024-47771/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.81-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47771/">CVE-2024-47771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47771">CVE-2024-47771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947819" comment="element-web-1.11.81-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252729" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.56-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8184" ref_url="https://www.suse.com/security/cve/CVE-2024-8184/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.56-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8184/">CVE-2024-8184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8184">CVE-2024-8184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947820" comment="jetty-annotations-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947821" comment="jetty-ant-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947822" comment="jetty-cdi-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947823" comment="jetty-client-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947824" comment="jetty-continuation-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947825" comment="jetty-deploy-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947826" comment="jetty-fcgi-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947827" comment="jetty-http-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947828" comment="jetty-http-spi-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947829" comment="jetty-io-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947830" comment="jetty-jaas-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947831" comment="jetty-jmx-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947832" comment="jetty-jndi-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947833" comment="jetty-jsp-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947834" comment="jetty-minimal-javadoc-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947835" comment="jetty-openid-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947836" comment="jetty-plus-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947837" comment="jetty-proxy-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947838" comment="jetty-quickstart-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947839" comment="jetty-rewrite-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947840" comment="jetty-security-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947841" comment="jetty-server-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947842" comment="jetty-servlet-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947843" comment="jetty-servlets-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947844" comment="jetty-start-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947845" comment="jetty-util-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947846" comment="jetty-util-ajax-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947847" comment="jetty-webapp-9.4.56-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947848" comment="jetty-xml-9.4.56-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252730" version="1" class="patch">
	<metadata>
		<title>podman-5.2.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.2.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947849" comment="podman-5.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947850" comment="podman-docker-5.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947851" comment="podman-remote-5.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947852" comment="podmansh-5.2.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252731" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-31.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9602" ref_url="https://www.suse.com/security/cve/CVE-2024-9602/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-31.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9602/">CVE-2024-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9602">CVE-2024-9602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948170" comment="nodejs-electron-31.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948171" comment="nodejs-electron-devel-31.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948172" comment="nodejs-electron-doc-31.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252732" version="1" class="patch">
	<metadata>
		<title>qemu-9.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467/" source="CVE"/>
		<reference ref_id="CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409/" source="CVE"/>
		<reference ref_id="CVE-2024-8612" ref_url="https://www.suse.com/security/cve/CVE-2024-8612/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-9.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8612/">CVE-2024-8612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8612">CVE-2024-8612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948173" comment="qemu-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948174" comment="qemu-SLOF-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948175" comment="qemu-accel-qtest-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948176" comment="qemu-accel-tcg-x86-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948177" comment="qemu-arm-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948178" comment="qemu-audio-alsa-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948179" comment="qemu-audio-dbus-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948180" comment="qemu-audio-jack-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948181" comment="qemu-audio-oss-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948182" comment="qemu-audio-pa-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948183" comment="qemu-audio-pipewire-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948184" comment="qemu-audio-spice-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948185" comment="qemu-block-curl-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948186" comment="qemu-block-dmg-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948187" comment="qemu-block-gluster-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948188" comment="qemu-block-iscsi-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948189" comment="qemu-block-nfs-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948190" comment="qemu-block-rbd-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948191" comment="qemu-block-ssh-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948192" comment="qemu-chardev-baum-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948193" comment="qemu-chardev-spice-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948194" comment="qemu-doc-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948195" comment="qemu-extra-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948196" comment="qemu-guest-agent-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948197" comment="qemu-headless-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948198" comment="qemu-hw-display-qxl-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948199" comment="qemu-hw-display-virtio-gpu-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948200" comment="qemu-hw-display-virtio-gpu-pci-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948201" comment="qemu-hw-display-virtio-vga-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948202" comment="qemu-hw-s390x-virtio-gpu-ccw-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948203" comment="qemu-hw-usb-host-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948204" comment="qemu-hw-usb-redirect-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948205" comment="qemu-hw-usb-smartcard-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948206" comment="qemu-img-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948207" comment="qemu-ipxe-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948208" comment="qemu-ivshmem-tools-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948209" comment="qemu-ksm-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948210" comment="qemu-lang-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948211" comment="qemu-microvm-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948212" comment="qemu-ppc-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948213" comment="qemu-pr-helper-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948214" comment="qemu-s390x-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948215" comment="qemu-seabios-9.1.01.16.3_3_gc13ff2cd-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948216" comment="qemu-skiboot-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948217" comment="qemu-spice-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948218" comment="qemu-tools-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948219" comment="qemu-ui-curses-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948220" comment="qemu-ui-dbus-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948221" comment="qemu-ui-gtk-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948222" comment="qemu-ui-opengl-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948223" comment="qemu-ui-spice-app-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948224" comment="qemu-ui-spice-core-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948225" comment="qemu-vgabios-9.1.01.16.3_3_gc13ff2cd-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948226" comment="qemu-vhost-user-gpu-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948227" comment="qemu-vmsr-helper-9.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948228" comment="qemu-x86-9.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252733" version="1" class="patch">
	<metadata>
		<title>valkey-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948229" comment="valkey-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948230" comment="valkey-compat-redis-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948231" comment="valkey-devel-8.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252734" version="1" class="patch">
	<metadata>
		<title>python3-virtualbox-7.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21248" ref_url="https://www.suse.com/security/cve/CVE-2024-21248/" source="CVE"/>
		<reference ref_id="CVE-2024-21263" ref_url="https://www.suse.com/security/cve/CVE-2024-21263/" source="CVE"/>
		<reference ref_id="CVE-2024-21273" ref_url="https://www.suse.com/security/cve/CVE-2024-21273/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-virtualbox-7.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21248/">CVE-2024-21248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21248">CVE-2024-21248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21263/">CVE-2024-21263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21263">CVE-2024-21263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21273/">CVE-2024-21273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21273">CVE-2024-21273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948232" comment="python3-virtualbox-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948233" comment="virtualbox-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948234" comment="virtualbox-devel-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948235" comment="virtualbox-guest-desktop-icons-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948236" comment="virtualbox-guest-source-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948237" comment="virtualbox-guest-tools-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948238" comment="virtualbox-host-source-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948239" comment="virtualbox-qt-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948240" comment="virtualbox-vnc-7.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948241" comment="virtualbox-websrv-7.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252735" version="1" class="patch">
	<metadata>
		<title>chromedriver-130.0.6723.58-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9602" ref_url="https://www.suse.com/security/cve/CVE-2024-9602/" source="CVE"/>
		<reference ref_id="CVE-2024-9603" ref_url="https://www.suse.com/security/cve/CVE-2024-9603/" source="CVE"/>
		<reference ref_id="CVE-2024-9954" ref_url="https://www.suse.com/security/cve/CVE-2024-9954/" source="CVE"/>
		<reference ref_id="CVE-2024-9955" ref_url="https://www.suse.com/security/cve/CVE-2024-9955/" source="CVE"/>
		<reference ref_id="CVE-2024-9956" ref_url="https://www.suse.com/security/cve/CVE-2024-9956/" source="CVE"/>
		<reference ref_id="CVE-2024-9957" ref_url="https://www.suse.com/security/cve/CVE-2024-9957/" source="CVE"/>
		<reference ref_id="CVE-2024-9958" ref_url="https://www.suse.com/security/cve/CVE-2024-9958/" source="CVE"/>
		<reference ref_id="CVE-2024-9959" ref_url="https://www.suse.com/security/cve/CVE-2024-9959/" source="CVE"/>
		<reference ref_id="CVE-2024-9960" ref_url="https://www.suse.com/security/cve/CVE-2024-9960/" source="CVE"/>
		<reference ref_id="CVE-2024-9961" ref_url="https://www.suse.com/security/cve/CVE-2024-9961/" source="CVE"/>
		<reference ref_id="CVE-2024-9962" ref_url="https://www.suse.com/security/cve/CVE-2024-9962/" source="CVE"/>
		<reference ref_id="CVE-2024-9963" ref_url="https://www.suse.com/security/cve/CVE-2024-9963/" source="CVE"/>
		<reference ref_id="CVE-2024-9964" ref_url="https://www.suse.com/security/cve/CVE-2024-9964/" source="CVE"/>
		<reference ref_id="CVE-2024-9965" ref_url="https://www.suse.com/security/cve/CVE-2024-9965/" source="CVE"/>
		<reference ref_id="CVE-2024-9966" ref_url="https://www.suse.com/security/cve/CVE-2024-9966/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-130.0.6723.58-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-19"/>
	<updated date="2024-10-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9602/">CVE-2024-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9602">CVE-2024-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9603/">CVE-2024-9603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9603">CVE-2024-9603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9954/">CVE-2024-9954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9954">CVE-2024-9954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9955/">CVE-2024-9955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9955">CVE-2024-9955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9956/">CVE-2024-9956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9956">CVE-2024-9956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9957/">CVE-2024-9957 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9957">CVE-2024-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9958/">CVE-2024-9958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9958">CVE-2024-9958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9959/">CVE-2024-9959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9959">CVE-2024-9959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9960/">CVE-2024-9960 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9960">CVE-2024-9960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9961/">CVE-2024-9961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9961">CVE-2024-9961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9962/">CVE-2024-9962 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9962">CVE-2024-9962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9963/">CVE-2024-9963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9963">CVE-2024-9963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9964/">CVE-2024-9964 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9964">CVE-2024-9964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9965/">CVE-2024-9965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9965">CVE-2024-9965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9966/">CVE-2024-9966 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9966">CVE-2024-9966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948283" comment="chromedriver-130.0.6723.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948284" comment="chromium-130.0.6723.58-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252736" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-131.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9936" ref_url="https://www.suse.com/security/cve/CVE-2024-9936/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-131.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2024-10-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-9936/">CVE-2024-9936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9936">CVE-2024-9936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948285" comment="MozillaFirefox-131.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948286" comment="MozillaFirefox-branding-upstream-131.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948287" comment="MozillaFirefox-devel-131.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948288" comment="MozillaFirefox-translations-common-131.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948289" comment="MozillaFirefox-translations-other-131.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252737" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.1.4-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="CVE-2024-9143" ref_url="https://www.suse.com/security/cve/CVE-2024-9143/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.1.4-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2024-10-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9143/">CVE-2024-9143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948290" comment="libopenssl-3-devel-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948291" comment="libopenssl-3-devel-32bit-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948292" comment="libopenssl-3-fips-provider-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948293" comment="libopenssl-3-fips-provider-32bit-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948294" comment="libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948295" comment="libopenssl3-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948296" comment="libopenssl3-32bit-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948297" comment="libopenssl3-x86-64-v3-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948298" comment="openssl-3-3.1.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948299" comment="openssl-3-doc-3.1.4-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252738" version="1" class="patch">
	<metadata>
		<title>python310-starlette-0.41.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47874" ref_url="https://www.suse.com/security/cve/CVE-2024-47874/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-starlette-0.41.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2024-10-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-47874/">CVE-2024-47874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47874">CVE-2024-47874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948300" comment="python310-starlette-0.41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948301" comment="python311-starlette-0.41.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948302" comment="python312-starlette-0.41.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252739" version="1" class="patch">
	<metadata>
		<title>buildah-1.37.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.37.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-21"/>
	<updated date="2024-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948317" comment="buildah-1.37.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252740" version="1" class="patch">
	<metadata>
		<title>libeverest-3.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49195" ref_url="https://www.suse.com/security/cve/CVE-2024-49195/" source="CVE"/>
		<description>
These are all security issues fixed in the libeverest-3.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-21"/>
	<updated date="2024-10-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49195/">CVE-2024-49195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49195">CVE-2024-49195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948318" comment="libeverest-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948319" comment="libeverest-x86-64-v3-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948320" comment="libmbedcrypto16-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948321" comment="libmbedcrypto16-x86-64-v3-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948322" comment="libmbedtls21-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948323" comment="libmbedtls21-x86-64-v3-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948324" comment="libmbedx509-7-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948325" comment="libmbedx509-7-x86-64-v3-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948326" comment="libp256m-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948327" comment="libp256m-x86-64-v3-3.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948328" comment="mbedtls-devel-3.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252741" version="1" class="patch">
	<metadata>
		<title>podman-5.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.2.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-10-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948409" comment="podman-5.2.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948410" comment="podman-docker-5.2.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948411" comment="podman-remote-5.2.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948412" comment="podmansh-5.2.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252742" version="1" class="patch">
	<metadata>
		<title>python310-mysql-connector-python-9.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21272" ref_url="https://www.suse.com/security/cve/CVE-2024-21272/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-mysql-connector-python-9.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-10-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21272/">CVE-2024-21272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21272">CVE-2024-21272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948413" comment="python310-mysql-connector-python-9.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948414" comment="python311-mysql-connector-python-9.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948415" comment="python312-mysql-connector-python-9.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252743" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-libreswan-1.2.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-libreswan-1.2.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948573" comment="NetworkManager-applet-libreswan-1.2.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948574" comment="NetworkManager-libreswan-1.2.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948575" comment="NetworkManager-libreswan-lang-1.2.24-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252744" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.04.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951/" source="CVE"/>
		<reference ref_id="CVE-2024-46952" ref_url="https://www.suse.com/security/cve/CVE-2024-46952/" source="CVE"/>
		<reference ref_id="CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953/" source="CVE"/>
		<reference ref_id="CVE-2024-46954" ref_url="https://www.suse.com/security/cve/CVE-2024-46954/" source="CVE"/>
		<reference ref_id="CVE-2024-46955" ref_url="https://www.suse.com/security/cve/CVE-2024-46955/" source="CVE"/>
		<reference ref_id="CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.04.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46952/">CVE-2024-46952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46952">CVE-2024-46952 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46954/">CVE-2024-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46954">CVE-2024-46954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46955/">CVE-2024-46955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46955">CVE-2024-46955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948576" comment="ghostscript-10.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948577" comment="ghostscript-devel-10.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948578" comment="ghostscript-x11-10.04.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252745" version="1" class="patch">
	<metadata>
		<title>gitoxide-0.38.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<description>
These are all security issues fixed in the gitoxide-0.38.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948579" comment="gitoxide-0.38.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252746" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-31.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7025" ref_url="https://www.suse.com/security/cve/CVE-2024-7025/" source="CVE"/>
		<reference ref_id="CVE-2024-7965" ref_url="https://www.suse.com/security/cve/CVE-2024-7965/" source="CVE"/>
		<reference ref_id="CVE-2024-8198" ref_url="https://www.suse.com/security/cve/CVE-2024-8198/" source="CVE"/>
		<reference ref_id="CVE-2024-8362" ref_url="https://www.suse.com/security/cve/CVE-2024-8362/" source="CVE"/>
		<reference ref_id="CVE-2024-8636" ref_url="https://www.suse.com/security/cve/CVE-2024-8636/" source="CVE"/>
		<reference ref_id="CVE-2024-9121" ref_url="https://www.suse.com/security/cve/CVE-2024-9121/" source="CVE"/>
		<reference ref_id="CVE-2024-9123" ref_url="https://www.suse.com/security/cve/CVE-2024-9123/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-31.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-25"/>
	<updated date="2024-10-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7025/">CVE-2024-7025 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7025">CVE-2024-7025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7965/">CVE-2024-7965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7965">CVE-2024-7965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8198/">CVE-2024-8198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8198">CVE-2024-8198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8362/">CVE-2024-8362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8362">CVE-2024-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8636/">CVE-2024-8636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8636">CVE-2024-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9121/">CVE-2024-9121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9121">CVE-2024-9121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9123/">CVE-2024-9123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9123">CVE-2024-9123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948580" comment="nodejs-electron-31.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948581" comment="nodejs-electron-devel-31.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948582" comment="nodejs-electron-doc-31.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252747" version="1" class="patch">
	<metadata>
		<title>python310-virtualenv-20.26.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-virtualenv-20.26.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-25"/>
	<updated date="2024-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948583" comment="python310-virtualenv-20.26.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948584" comment="python311-virtualenv-20.26.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948585" comment="python312-virtualenv-20.26.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252748" version="1" class="patch">
	<metadata>
		<title>python310-3.10.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-25"/>
	<updated date="2024-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948586" comment="python310-3.10.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948587" comment="python310-32bit-3.10.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948588" comment="python310-curses-3.10.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948589" comment="python310-dbm-3.10.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948590" comment="python310-idle-3.10.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948591" comment="python310-tk-3.10.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252749" version="1" class="patch">
	<metadata>
		<title>python39-3.9.20-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.20-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-25"/>
	<updated date="2024-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948592" comment="python39-3.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948593" comment="python39-curses-3.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948594" comment="python39-dbm-3.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948595" comment="python39-idle-3.9.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948596" comment="python39-tk-3.9.20-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252750" version="1" class="patch">
	<metadata>
		<title>Botan-3.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50382" ref_url="https://www.suse.com/security/cve/CVE-2024-50382/" source="CVE"/>
		<description>
These are all security issues fixed in the Botan-3.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50382/">CVE-2024-50382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50382">CVE-2024-50382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950239" comment="Botan-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950240" comment="Botan-doc-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950241" comment="libbotan-3-6-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950242" comment="libbotan-devel-3.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950243" comment="python3-botan-3.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252751" version="1" class="patch">
	<metadata>
		<title>python313-3.13.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950244" comment="python313-3.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950245" comment="python313-curses-3.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950246" comment="python313-dbm-3.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950247" comment="python313-idle-3.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950248" comment="python313-tk-3.13.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950249" comment="python313-x86-64-v3-3.13.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252752" version="1" class="patch">
	<metadata>
		<title>grafana-11.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8118" ref_url="https://www.suse.com/security/cve/CVE-2024-8118/" source="CVE"/>
		<reference ref_id="CVE-2024-9264" ref_url="https://www.suse.com/security/cve/CVE-2024-9264/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-28"/>
	<updated date="2024-10-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8118/">CVE-2024-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8118">CVE-2024-8118 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-9264/">CVE-2024-9264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9264">CVE-2024-9264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950250" comment="grafana-11.3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252753" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.25.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.25.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-28"/>
	<updated date="2024-10-28"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950251" comment="java-11-openjdk-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950252" comment="java-11-openjdk-demo-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950253" comment="java-11-openjdk-devel-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950254" comment="java-11-openjdk-headless-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950255" comment="java-11-openjdk-javadoc-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950256" comment="java-11-openjdk-jmods-11.0.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950257" comment="java-11-openjdk-src-11.0.25.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252754" version="1" class="patch">
	<metadata>
		<title>python310-pytest-html-4.1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48948" ref_url="https://www.suse.com/security/cve/CVE-2024-48948/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pytest-html-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-28"/>
	<updated date="2024-10-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48948/">CVE-2024-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48948">CVE-2024-48948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950258" comment="python310-pytest-html-4.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950259" comment="python311-pytest-html-4.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950260" comment="python312-pytest-html-4.1.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252755" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0~a1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-28"/>
	<updated date="2024-10-28"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950261" comment="python314-3.14.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950262" comment="python314-curses-3.14.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950263" comment="python314-dbm-3.14.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950264" comment="python314-idle-3.14.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950265" comment="python314-tk-3.14.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950266" comment="python314-x86-64-v3-3.14.0~a1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252756" version="1" class="patch">
	<metadata>
		<title>corepack22-22.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<reference ref_id="CVE-2024-36138" ref_url="https://www.suse.com/security/cve/CVE-2024-36138/" source="CVE"/>
		<reference ref_id="CVE-2024-37372" ref_url="https://www.suse.com/security/cve/CVE-2024-37372/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36138/">CVE-2024-36138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36138">CVE-2024-36138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37372/">CVE-2024-37372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37372">CVE-2024-37372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950267" comment="corepack22-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950268" comment="nodejs22-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950269" comment="nodejs22-devel-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950270" comment="nodejs22-docs-22.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950271" comment="npm22-22.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252757" version="1" class="patch">
	<metadata>
		<title>openvpn-2.6.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28882" ref_url="https://www.suse.com/security/cve/CVE-2024-28882/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.6.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-28882/">CVE-2024-28882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28882">CVE-2024-28882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950272" comment="openvpn-2.6.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950273" comment="openvpn-auth-pam-plugin-2.6.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950274" comment="openvpn-devel-2.6.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950275" comment="openvpn-down-root-plugin-2.6.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252758" version="1" class="patch">
	<metadata>
		<title>python310-Werkzeug-3.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49767" ref_url="https://www.suse.com/security/cve/CVE-2024-49767/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Werkzeug-3.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-49767/">CVE-2024-49767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49767">CVE-2024-49767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950276" comment="python310-Werkzeug-3.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950277" comment="python311-Werkzeug-3.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950278" comment="python312-Werkzeug-3.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252759" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950279" comment="MozillaThunderbird-128.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950280" comment="MozillaThunderbird-openpgp-librnp-128.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950281" comment="MozillaThunderbird-translations-common-128.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950282" comment="MozillaThunderbird-translations-other-128.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252760" version="1" class="patch">
	<metadata>
		<title>alloy-1.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36129" ref_url="https://www.suse.com/security/cve/CVE-2024-36129/" source="CVE"/>
		<reference ref_id="CVE-2024-8975" ref_url="https://www.suse.com/security/cve/CVE-2024-8975/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36129/">CVE-2024-36129 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8975/">CVE-2024-8975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8975">CVE-2024-8975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950283" comment="alloy-1.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252761" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20241030-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47609" ref_url="https://www.suse.com/security/cve/CVE-2024-47609/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20241030-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47609/">CVE-2024-47609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47609">CVE-2024-47609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950284" comment="cargo-audit-advisory-db-20241030-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252762" version="1" class="patch">
	<metadata>
		<title>chromedriver-130.0.6723.69-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10229" ref_url="https://www.suse.com/security/cve/CVE-2024-10229/" source="CVE"/>
		<reference ref_id="CVE-2024-10230" ref_url="https://www.suse.com/security/cve/CVE-2024-10230/" source="CVE"/>
		<reference ref_id="CVE-2024-10231" ref_url="https://www.suse.com/security/cve/CVE-2024-10231/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-130.0.6723.69-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10229/">CVE-2024-10229 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10229">CVE-2024-10229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10230/">CVE-2024-10230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10230">CVE-2024-10230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10231/">CVE-2024-10231 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10231">CVE-2024-10231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950285" comment="chromedriver-130.0.6723.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950286" comment="chromium-130.0.6723.69-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252763" version="1" class="patch">
	<metadata>
		<title>netty-4.1.114-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21409" ref_url="https://www.suse.com/security/cve/CVE-2021-21409/" source="CVE"/>
		<reference ref_id="CVE-2021-37136" ref_url="https://www.suse.com/security/cve/CVE-2021-37136/" source="CVE"/>
		<reference ref_id="CVE-2021-37137" ref_url="https://www.suse.com/security/cve/CVE-2021-37137/" source="CVE"/>
		<reference ref_id="CVE-2022-24823" ref_url="https://www.suse.com/security/cve/CVE-2022-24823/" source="CVE"/>
		<reference ref_id="CVE-2022-41881" ref_url="https://www.suse.com/security/cve/CVE-2022-41881/" source="CVE"/>
		<reference ref_id="CVE-2022-41915" ref_url="https://www.suse.com/security/cve/CVE-2022-41915/" source="CVE"/>
		<reference ref_id="CVE-2023-34462" ref_url="https://www.suse.com/security/cve/CVE-2023-34462/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-29025" ref_url="https://www.suse.com/security/cve/CVE-2024-29025/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.114-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21409/">CVE-2021-21409 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21409">CVE-2021-21409 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37136/">CVE-2021-37136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37137/">CVE-2021-37137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24823/">CVE-2022-24823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24823">CVE-2022-24823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41881/">CVE-2022-41881 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41915/">CVE-2022-41915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41915">CVE-2022-41915 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34462/">CVE-2023-34462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29025/">CVE-2024-29025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29025">CVE-2024-29025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950287" comment="netty-4.1.114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950288" comment="netty-javadoc-4.1.114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950289" comment="netty-poms-4.1.114-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252764" version="1" class="patch">
	<metadata>
		<title>xsd-4.1.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the xsd-4.1.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950290" comment="xsd-4.1.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950291" comment="xsd-doc-4.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252765" version="1" class="patch">
	<metadata>
		<title>gama-2.31-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the gama-2.31-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950384" comment="gama-2.31-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252766" version="1" class="patch">
	<metadata>
		<title>python310-waitress-3.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49769" ref_url="https://www.suse.com/security/cve/CVE-2024-49769/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-waitress-3.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49769/">CVE-2024-49769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49769">CVE-2024-49769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950385" comment="python310-waitress-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950386" comment="python311-waitress-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950387" comment="python312-waitress-3.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252767" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950738" comment="docker-stable-24.0.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950739" comment="docker-stable-bash-completion-24.0.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950740" comment="docker-stable-buildx-0.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950741" comment="docker-stable-fish-completion-24.0.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950742" comment="docker-stable-rootless-extras-24.0.9_ce-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950743" comment="docker-stable-zsh-completion-24.0.9_ce-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252768" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241030T212825-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45157" ref_url="https://www.suse.com/security/cve/CVE-2022-45157/" source="CVE"/>
		<reference ref_id="CVE-2023-22644" ref_url="https://www.suse.com/security/cve/CVE-2023-22644/" source="CVE"/>
		<reference ref_id="CVE-2023-32197" ref_url="https://www.suse.com/security/cve/CVE-2023-32197/" source="CVE"/>
		<reference ref_id="CVE-2024-10214" ref_url="https://www.suse.com/security/cve/CVE-2024-10214/" source="CVE"/>
		<reference ref_id="CVE-2024-10241" ref_url="https://www.suse.com/security/cve/CVE-2024-10241/" source="CVE"/>
		<reference ref_id="CVE-2024-22030" ref_url="https://www.suse.com/security/cve/CVE-2024-22030/" source="CVE"/>
		<reference ref_id="CVE-2024-22036" ref_url="https://www.suse.com/security/cve/CVE-2024-22036/" source="CVE"/>
		<reference ref_id="CVE-2024-33662" ref_url="https://www.suse.com/security/cve/CVE-2024-33662/" source="CVE"/>
		<reference ref_id="CVE-2024-36814" ref_url="https://www.suse.com/security/cve/CVE-2024-36814/" source="CVE"/>
		<reference ref_id="CVE-2024-38365" ref_url="https://www.suse.com/security/cve/CVE-2024-38365/" source="CVE"/>
		<reference ref_id="CVE-2024-39223" ref_url="https://www.suse.com/security/cve/CVE-2024-39223/" source="CVE"/>
		<reference ref_id="CVE-2024-47003" ref_url="https://www.suse.com/security/cve/CVE-2024-47003/" source="CVE"/>
		<reference ref_id="CVE-2024-47067" ref_url="https://www.suse.com/security/cve/CVE-2024-47067/" source="CVE"/>
		<reference ref_id="CVE-2024-47182" ref_url="https://www.suse.com/security/cve/CVE-2024-47182/" source="CVE"/>
		<reference ref_id="CVE-2024-47534" ref_url="https://www.suse.com/security/cve/CVE-2024-47534/" source="CVE"/>
		<reference ref_id="CVE-2024-47616" ref_url="https://www.suse.com/security/cve/CVE-2024-47616/" source="CVE"/>
		<reference ref_id="CVE-2024-47825" ref_url="https://www.suse.com/security/cve/CVE-2024-47825/" source="CVE"/>
		<reference ref_id="CVE-2024-47827" ref_url="https://www.suse.com/security/cve/CVE-2024-47827/" source="CVE"/>
		<reference ref_id="CVE-2024-47832" ref_url="https://www.suse.com/security/cve/CVE-2024-47832/" source="CVE"/>
		<reference ref_id="CVE-2024-47877" ref_url="https://www.suse.com/security/cve/CVE-2024-47877/" source="CVE"/>
		<reference ref_id="CVE-2024-48909" ref_url="https://www.suse.com/security/cve/CVE-2024-48909/" source="CVE"/>
		<reference ref_id="CVE-2024-48921" ref_url="https://www.suse.com/security/cve/CVE-2024-48921/" source="CVE"/>
		<reference ref_id="CVE-2024-49380" ref_url="https://www.suse.com/security/cve/CVE-2024-49380/" source="CVE"/>
		<reference ref_id="CVE-2024-49381" ref_url="https://www.suse.com/security/cve/CVE-2024-49381/" source="CVE"/>
		<reference ref_id="CVE-2024-49753" ref_url="https://www.suse.com/security/cve/CVE-2024-49753/" source="CVE"/>
		<reference ref_id="CVE-2024-49757" ref_url="https://www.suse.com/security/cve/CVE-2024-49757/" source="CVE"/>
		<reference ref_id="CVE-2024-50312" ref_url="https://www.suse.com/security/cve/CVE-2024-50312/" source="CVE"/>
		<reference ref_id="CVE-2024-7558" ref_url="https://www.suse.com/security/cve/CVE-2024-7558/" source="CVE"/>
		<reference ref_id="CVE-2024-7594" ref_url="https://www.suse.com/security/cve/CVE-2024-7594/" source="CVE"/>
		<reference ref_id="CVE-2024-8037" ref_url="https://www.suse.com/security/cve/CVE-2024-8037/" source="CVE"/>
		<reference ref_id="CVE-2024-8038" ref_url="https://www.suse.com/security/cve/CVE-2024-8038/" source="CVE"/>
		<reference ref_id="CVE-2024-8901" ref_url="https://www.suse.com/security/cve/CVE-2024-8901/" source="CVE"/>
		<reference ref_id="CVE-2024-8975" ref_url="https://www.suse.com/security/cve/CVE-2024-8975/" source="CVE"/>
		<reference ref_id="CVE-2024-8996" ref_url="https://www.suse.com/security/cve/CVE-2024-8996/" source="CVE"/>
		<reference ref_id="CVE-2024-9180" ref_url="https://www.suse.com/security/cve/CVE-2024-9180/" source="CVE"/>
		<reference ref_id="CVE-2024-9264" ref_url="https://www.suse.com/security/cve/CVE-2024-9264/" source="CVE"/>
		<reference ref_id="CVE-2024-9312" ref_url="https://www.suse.com/security/cve/CVE-2024-9312/" source="CVE"/>
		<reference ref_id="CVE-2024-9313" ref_url="https://www.suse.com/security/cve/CVE-2024-9313/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9486" ref_url="https://www.suse.com/security/cve/CVE-2024-9486/" source="CVE"/>
		<reference ref_id="CVE-2024-9594" ref_url="https://www.suse.com/security/cve/CVE-2024-9594/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241030T212825-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45157/">CVE-2022-45157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-45157">CVE-2022-45157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22644/">CVE-2023-22644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22644">CVE-2023-22644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32197/">CVE-2023-32197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32197">CVE-2023-32197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10214/">CVE-2024-10214 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10214">CVE-2024-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10241/">CVE-2024-10241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10241">CVE-2024-10241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22030/">CVE-2024-22030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22030">CVE-2024-22030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22036/">CVE-2024-22036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22036">CVE-2024-22036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-33662/">CVE-2024-33662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33662">CVE-2024-33662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36814/">CVE-2024-36814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36814">CVE-2024-36814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38365/">CVE-2024-38365 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38365">CVE-2024-38365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39223/">CVE-2024-39223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39223">CVE-2024-39223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47003/">CVE-2024-47003 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47003">CVE-2024-47003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47067/">CVE-2024-47067 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47067">CVE-2024-47067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47182/">CVE-2024-47182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47182">CVE-2024-47182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47534/">CVE-2024-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47534">CVE-2024-47534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47616/">CVE-2024-47616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47616">CVE-2024-47616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47825/">CVE-2024-47825 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47825">CVE-2024-47825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47827/">CVE-2024-47827 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47827">CVE-2024-47827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47832/">CVE-2024-47832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47832">CVE-2024-47832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47877/">CVE-2024-47877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47877">CVE-2024-47877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48909/">CVE-2024-48909 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48909">CVE-2024-48909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48921/">CVE-2024-48921 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48921">CVE-2024-48921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49380/">CVE-2024-49380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49380">CVE-2024-49380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49381/">CVE-2024-49381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49381">CVE-2024-49381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49753/">CVE-2024-49753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49753">CVE-2024-49753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49757/">CVE-2024-49757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49757">CVE-2024-49757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50312/">CVE-2024-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50312">CVE-2024-50312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7558/">CVE-2024-7558 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7558">CVE-2024-7558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7594/">CVE-2024-7594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7594">CVE-2024-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8037/">CVE-2024-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8037">CVE-2024-8037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8038/">CVE-2024-8038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8038">CVE-2024-8038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8901/">CVE-2024-8901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8901">CVE-2024-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8975/">CVE-2024-8975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8975">CVE-2024-8975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8996/">CVE-2024-8996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8996">CVE-2024-8996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9180/">CVE-2024-9180 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9180">CVE-2024-9180 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-9264/">CVE-2024-9264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9264">CVE-2024-9264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9312/">CVE-2024-9312 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9312">CVE-2024-9312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9313/">CVE-2024-9313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9313">CVE-2024-9313 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9486/">CVE-2024-9486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9486">CVE-2024-9486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9594/">CVE-2024-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9594">CVE-2024-9594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950744" comment="govulncheck-vulndb-0.0.20241030T212825-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252769" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950745" comment="java-17-openjdk-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950746" comment="java-17-openjdk-demo-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950747" comment="java-17-openjdk-devel-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950748" comment="java-17-openjdk-headless-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950749" comment="java-17-openjdk-javadoc-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950750" comment="java-17-openjdk-jmods-17.0.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950751" comment="java-17-openjdk-src-17.0.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252770" version="1" class="patch">
	<metadata>
		<title>java-23-openjdk-23.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-23-openjdk-23.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950752" comment="java-23-openjdk-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950753" comment="java-23-openjdk-demo-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950754" comment="java-23-openjdk-devel-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950755" comment="java-23-openjdk-headless-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950756" comment="java-23-openjdk-javadoc-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950757" comment="java-23-openjdk-jmods-23.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950758" comment="java-23-openjdk-src-23.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252771" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-24.05.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48936" ref_url="https://www.suse.com/security/cve/CVE-2024-48936/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-24.05.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48936/">CVE-2024-48936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48936">CVE-2024-48936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950759" comment="libnss_slurm2-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950760" comment="libpmi0-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950761" comment="libslurm41-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950762" comment="perl-slurm-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950763" comment="slurm-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950764" comment="slurm-auth-none-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950765" comment="slurm-config-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950766" comment="slurm-config-man-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950767" comment="slurm-cray-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950768" comment="slurm-devel-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950769" comment="slurm-doc-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950770" comment="slurm-hdf5-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950771" comment="slurm-lua-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950772" comment="slurm-munge-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950773" comment="slurm-node-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950774" comment="slurm-openlava-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950775" comment="slurm-pam_slurm-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950776" comment="slurm-plugins-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950777" comment="slurm-rest-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950778" comment="slurm-seff-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950779" comment="slurm-sjstat-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950780" comment="slurm-slurmdbd-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950781" comment="slurm-sql-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950782" comment="slurm-sview-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950783" comment="slurm-testsuite-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950784" comment="slurm-torque-24.05.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950785" comment="slurm-webdoc-24.05.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252772" version="1" class="patch">
	<metadata>
		<title>chromedriver-130.0.6723.91-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10487" ref_url="https://www.suse.com/security/cve/CVE-2024-10487/" source="CVE"/>
		<reference ref_id="CVE-2024-10488" ref_url="https://www.suse.com/security/cve/CVE-2024-10488/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-130.0.6723.91-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-02"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10487/">CVE-2024-10487 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10487">CVE-2024-10487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10488/">CVE-2024-10488 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10488">CVE-2024-10488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950786" comment="chromedriver-130.0.6723.91-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950787" comment="chromium-130.0.6723.91-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252773" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241101T215616-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39720" ref_url="https://www.suse.com/security/cve/CVE-2024-39720/" source="CVE"/>
		<reference ref_id="CVE-2024-50354" ref_url="https://www.suse.com/security/cve/CVE-2024-50354/" source="CVE"/>
		<reference ref_id="CVE-2024-8185" ref_url="https://www.suse.com/security/cve/CVE-2024-8185/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241101T215616-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-02"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39720/">CVE-2024-39720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39720">CVE-2024-39720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50354/">CVE-2024-50354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50354">CVE-2024-50354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8185/">CVE-2024-8185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8185">CVE-2024-8185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950788" comment="govulncheck-vulndb-0.0.20241101T215616-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252774" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-02"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950789" comment="java-21-openjdk-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950790" comment="java-21-openjdk-demo-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950791" comment="java-21-openjdk-devel-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950792" comment="java-21-openjdk-headless-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950793" comment="java-21-openjdk-javadoc-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950794" comment="java-21-openjdk-jmods-21.0.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950795" comment="java-21-openjdk-src-21.0.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252775" version="1" class="patch">
	<metadata>
		<title>libmpg123-0-1.32.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10573" ref_url="https://www.suse.com/security/cve/CVE-2024-10573/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpg123-0-1.32.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-03"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10573/">CVE-2024-10573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10573">CVE-2024-10573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950812" comment="libmpg123-0-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950813" comment="libmpg123-0-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950814" comment="libout123-0-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950815" comment="libout123-0-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950816" comment="libsyn123-0-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950817" comment="libsyn123-0-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950818" comment="mpg123-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950819" comment="mpg123-devel-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950820" comment="mpg123-devel-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950821" comment="mpg123-jack-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950822" comment="mpg123-jack-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950823" comment="mpg123-openal-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950824" comment="mpg123-openal-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950825" comment="mpg123-portaudio-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950826" comment="mpg123-portaudio-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950827" comment="mpg123-pulse-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950828" comment="mpg123-pulse-32bit-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950829" comment="mpg123-sdl-1.32.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950830" comment="mpg123-sdl-32bit-1.32.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252776" version="1" class="patch">
	<metadata>
		<title>python311-3.11.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.10-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-03"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950831" comment="python311-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950832" comment="python311-32bit-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950833" comment="python311-curses-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950834" comment="python311-dbm-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950835" comment="python311-idle-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950836" comment="python311-tk-3.11.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950837" comment="python311-x86-64-v3-3.11.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252777" version="1" class="patch">
	<metadata>
		<title>python312-3.12.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-03"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950838" comment="python312-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950839" comment="python312-32bit-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950840" comment="python312-curses-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950841" comment="python312-dbm-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950842" comment="python312-idle-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950843" comment="python312-tk-3.12.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950844" comment="python312-x86-64-v3-3.12.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252778" version="1" class="patch">
	<metadata>
		<title>audacity-3.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the audacity-3.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-04"/>
	<updated date="2024-11-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950968" comment="audacity-3.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950969" comment="audacity-lang-3.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252779" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241104T154416-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0132" ref_url="https://www.suse.com/security/cve/CVE-2024-0132/" source="CVE"/>
		<reference ref_id="CVE-2024-0133" ref_url="https://www.suse.com/security/cve/CVE-2024-0133/" source="CVE"/>
		<reference ref_id="CVE-2024-10005" ref_url="https://www.suse.com/security/cve/CVE-2024-10005/" source="CVE"/>
		<reference ref_id="CVE-2024-10006" ref_url="https://www.suse.com/security/cve/CVE-2024-10006/" source="CVE"/>
		<reference ref_id="CVE-2024-10086" ref_url="https://www.suse.com/security/cve/CVE-2024-10086/" source="CVE"/>
		<reference ref_id="CVE-2024-10452" ref_url="https://www.suse.com/security/cve/CVE-2024-10452/" source="CVE"/>
		<reference ref_id="CVE-2024-46872" ref_url="https://www.suse.com/security/cve/CVE-2024-46872/" source="CVE"/>
		<reference ref_id="CVE-2024-47401" ref_url="https://www.suse.com/security/cve/CVE-2024-47401/" source="CVE"/>
		<reference ref_id="CVE-2024-50052" ref_url="https://www.suse.com/security/cve/CVE-2024-50052/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241104T154416-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-04"/>
	<updated date="2024-11-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-0132/">CVE-2024-0132 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0132">CVE-2024-0132 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-0133/">CVE-2024-0133 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0133">CVE-2024-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10005/">CVE-2024-10005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10005">CVE-2024-10005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10006/">CVE-2024-10006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10006">CVE-2024-10006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10086/">CVE-2024-10086 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10086">CVE-2024-10086 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10452/">CVE-2024-10452 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10452">CVE-2024-10452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46872/">CVE-2024-46872 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46872">CVE-2024-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47401/">CVE-2024-47401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47401">CVE-2024-47401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50052/">CVE-2024-50052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50052">CVE-2024-50052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950970" comment="govulncheck-vulndb-0.0.20241104T154416-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252780" version="1" class="patch">
	<metadata>
		<title>qbittorrent-5.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51774" ref_url="https://www.suse.com/security/cve/CVE-2024-51774/" source="CVE"/>
		<description>
These are all security issues fixed in the qbittorrent-5.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-04"/>
	<updated date="2024-11-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51774/">CVE-2024-51774 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-51774">CVE-2024-51774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950971" comment="qbittorrent-5.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950972" comment="qbittorrent-nox-5.0.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252781" version="1" class="patch">
	<metadata>
		<title>htmldoc-1.9.18-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-46478" ref_url="https://www.suse.com/security/cve/CVE-2024-46478/" source="CVE"/>
		<description>
These are all security issues fixed in the htmldoc-1.9.18-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46478/">CVE-2024-46478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46478">CVE-2024-46478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951042" comment="htmldoc-1.9.18-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252782" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951043" comment="libmozjs-128-0-128.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951044" comment="mozjs128-128.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951045" comment="mozjs128-devel-128.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252783" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-5.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25590" ref_url="https://www.suse.com/security/cve/CVE-2024-25590/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-5.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25590/">CVE-2024-25590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25590">CVE-2024-25590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951046" comment="pdns-recursor-5.1.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252784" version="1" class="patch">
	<metadata>
		<title>apache2-mod_uwsgi-2.0.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_uwsgi-2.0.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951047" comment="apache2-mod_uwsgi-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951048" comment="python310-uwsgi-python3-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951049" comment="python311-uwsgi-python3-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951050" comment="python312-uwsgi-python3-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951051" comment="uwsgi-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951052" comment="uwsgi-emperor_pg-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951053" comment="uwsgi-emperor_zeromq-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951054" comment="uwsgi-gevent-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951055" comment="uwsgi-glusterfs-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951056" comment="uwsgi-greenlet-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951057" comment="uwsgi-jvm-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951058" comment="uwsgi-ldap-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951059" comment="uwsgi-libffi-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951060" comment="uwsgi-logzmq-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951061" comment="uwsgi-lua-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951062" comment="uwsgi-pam-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951063" comment="uwsgi-php8-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951064" comment="uwsgi-psgi-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951065" comment="uwsgi-pypy-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951066" comment="uwsgi-sqlite3-2.0.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951067" comment="uwsgi-xslt-2.0.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252785" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49504" ref_url="https://www.suse.com/security/cve/CVE-2024-49504/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-28.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49504/">CVE-2024-49504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49504">CVE-2024-49504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951190" comment="grub2-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951191" comment="grub2-branding-upstream-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951192" comment="grub2-common-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951193" comment="grub2-i386-efi-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951194" comment="grub2-i386-efi-bls-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951195" comment="grub2-i386-efi-debug-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951196" comment="grub2-i386-efi-extras-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951197" comment="grub2-i386-pc-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951198" comment="grub2-i386-pc-debug-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951199" comment="grub2-i386-pc-extras-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951200" comment="grub2-snapper-plugin-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951201" comment="grub2-systemd-sleep-plugin-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951202" comment="grub2-x86_64-efi-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951203" comment="grub2-x86_64-efi-bls-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951204" comment="grub2-x86_64-efi-debug-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951205" comment="grub2-x86_64-efi-extras-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951206" comment="grub2-x86_64-xen-2.12-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951207" comment="grub2-x86_64-xen-extras-2.12-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252786" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.432-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.432-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951208" comment="java-1_8_0-openjdk-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951209" comment="java-1_8_0-openjdk-accessibility-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951210" comment="java-1_8_0-openjdk-demo-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951211" comment="java-1_8_0-openjdk-devel-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951212" comment="java-1_8_0-openjdk-headless-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951213" comment="java-1_8_0-openjdk-javadoc-1.8.0.432-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951214" comment="java-1_8_0-openjdk-src-1.8.0.432-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252787" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951215" comment="xorg-x11-server-21.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951216" comment="xorg-x11-server-Xvfb-21.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951217" comment="xorg-x11-server-extra-21.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951218" comment="xorg-x11-server-sdk-21.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951219" comment="xorg-x11-server-source-21.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951220" comment="xorg-x11-server-wrapper-21.1.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252788" version="1" class="patch">
	<metadata>
		<title>xwayland-24.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-24.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951221" comment="xwayland-24.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951222" comment="xwayland-devel-24.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252789" version="1" class="patch">
	<metadata>
		<title>IPAddress-5.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50570" ref_url="https://www.suse.com/security/cve/CVE-2023-50570/" source="CVE"/>
		<description>
These are all security issues fixed in the IPAddress-5.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50570/">CVE-2023-50570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50570">CVE-2023-50570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951414" comment="IPAddress-5.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951415" comment="IPAddress-javadoc-5.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252790" version="1" class="patch">
	<metadata>
		<title>chromedriver-130.0.6723.116-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10826" ref_url="https://www.suse.com/security/cve/CVE-2024-10826/" source="CVE"/>
		<reference ref_id="CVE-2024-10827" ref_url="https://www.suse.com/security/cve/CVE-2024-10827/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-130.0.6723.116-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10826/">CVE-2024-10826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10826">CVE-2024-10826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10827/">CVE-2024-10827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10827">CVE-2024-10827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951416" comment="chromedriver-130.0.6723.116-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951417" comment="chromium-130.0.6723.116-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252791" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241106T172143-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10389" ref_url="https://www.suse.com/security/cve/CVE-2024-10389/" source="CVE"/>
		<reference ref_id="CVE-2024-48057" ref_url="https://www.suse.com/security/cve/CVE-2024-48057/" source="CVE"/>
		<reference ref_id="CVE-2024-51735" ref_url="https://www.suse.com/security/cve/CVE-2024-51735/" source="CVE"/>
		<reference ref_id="CVE-2024-51746" ref_url="https://www.suse.com/security/cve/CVE-2024-51746/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241106T172143-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10389/">CVE-2024-10389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10389">CVE-2024-10389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48057/">CVE-2024-48057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48057">CVE-2024-48057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51735/">CVE-2024-51735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51735">CVE-2024-51735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51746/">CVE-2024-51746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51746">CVE-2024-51746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951418" comment="govulncheck-vulndb-0.0.20241106T172143-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252792" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-actionmailer-7.0-7.0.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47889" ref_url="https://www.suse.com/security/cve/CVE-2024-47889/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-actionmailer-7.0-7.0.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47889/">CVE-2024-47889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47889">CVE-2024-47889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951419" comment="ruby3.3-rubygem-actionmailer-7.0-7.0.8.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252793" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-actionpack-7.0-7.0.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41128" ref_url="https://www.suse.com/security/cve/CVE-2024-41128/" source="CVE"/>
		<reference ref_id="CVE-2024-47887" ref_url="https://www.suse.com/security/cve/CVE-2024-47887/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-actionpack-7.0-7.0.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41128/">CVE-2024-41128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41128">CVE-2024-41128 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47887/">CVE-2024-47887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47887">CVE-2024-47887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951420" comment="ruby3.3-rubygem-actionpack-7.0-7.0.8.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252794" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-actiontext-7.0-7.0.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47888" ref_url="https://www.suse.com/security/cve/CVE-2024-47888/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-actiontext-7.0-7.0.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47888/">CVE-2024-47888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47888">CVE-2024-47888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951421" comment="ruby3.3-rubygem-actiontext-7.0-7.0.8.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252795" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-puma-6.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45614" ref_url="https://www.suse.com/security/cve/CVE-2024-45614/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-puma-6.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45614/">CVE-2024-45614 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45614">CVE-2024-45614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951422" comment="ruby3.3-rubygem-puma-6.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252796" version="1" class="patch">
	<metadata>
		<title>Mesa-24.2.6-392.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45913" ref_url="https://www.suse.com/security/cve/CVE-2023-45913/" source="CVE"/>
		<reference ref_id="CVE-2023-45919" ref_url="https://www.suse.com/security/cve/CVE-2023-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-45922" ref_url="https://www.suse.com/security/cve/CVE-2023-45922/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-24.2.6-392.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45913/">CVE-2023-45913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45913">CVE-2023-45913 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45919/">CVE-2023-45919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45919">CVE-2023-45919 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45922/">CVE-2023-45922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45922">CVE-2023-45922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951701" comment="Mesa-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951702" comment="Mesa-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951703" comment="Mesa-KHR-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951704" comment="Mesa-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951705" comment="Mesa-dri-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951706" comment="Mesa-libEGL-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951707" comment="Mesa-libEGL-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951708" comment="Mesa-libEGL1-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951709" comment="Mesa-libEGL1-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951710" comment="Mesa-libGL-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951711" comment="Mesa-libGL-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951712" comment="Mesa-libGL1-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951713" comment="Mesa-libGL1-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951714" comment="Mesa-libGLESv1_CM-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951715" comment="Mesa-libGLESv1_CM-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951716" comment="Mesa-libGLESv2-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951717" comment="Mesa-libGLESv2-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951718" comment="Mesa-libGLESv3-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951719" comment="Mesa-libglapi-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951720" comment="Mesa-libglapi-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951721" comment="Mesa-libglapi0-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951722" comment="Mesa-libglapi0-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951723" comment="libOSMesa-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951724" comment="libOSMesa-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951725" comment="libOSMesa8-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951726" comment="libOSMesa8-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951727" comment="libgbm-devel-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951728" comment="libgbm-devel-32bit-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951729" comment="libgbm1-24.2.6-392.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951730" comment="libgbm1-32bit-24.2.6-392.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252797" version="1" class="patch">
	<metadata>
		<title>curl-8.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9681" ref_url="https://www.suse.com/security/cve/CVE-2024-9681/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9681/">CVE-2024-9681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951731" comment="curl-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951732" comment="curl-fish-completion-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951733" comment="curl-zsh-completion-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951734" comment="libcurl-devel-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951735" comment="libcurl-devel-32bit-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951736" comment="libcurl-devel-doc-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951737" comment="libcurl4-8.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951738" comment="libcurl4-32bit-8.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252798" version="1" class="patch">
	<metadata>
		<title>expat-2.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951739" comment="expat-2.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951740" comment="libexpat-devel-2.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951741" comment="libexpat-devel-32bit-2.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951742" comment="libexpat1-2.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951743" comment="libexpat1-32bit-2.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252799" version="1" class="patch">
	<metadata>
		<title>httpcomponents-client-4.5.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<description>
These are all security issues fixed in the httpcomponents-client-4.5.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951744" comment="httpcomponents-client-4.5.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951745" comment="httpcomponents-client-cache-4.5.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951746" comment="httpcomponents-client-javadoc-4.5.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252800" version="1" class="patch">
	<metadata>
		<title>ruby3.3-rubygem-rails-7.0-7.0.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41128" ref_url="https://www.suse.com/security/cve/CVE-2024-41128/" source="CVE"/>
		<reference ref_id="CVE-2024-47887" ref_url="https://www.suse.com/security/cve/CVE-2024-47887/" source="CVE"/>
		<reference ref_id="CVE-2024-47888" ref_url="https://www.suse.com/security/cve/CVE-2024-47888/" source="CVE"/>
		<reference ref_id="CVE-2024-47889" ref_url="https://www.suse.com/security/cve/CVE-2024-47889/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.3-rubygem-rails-7.0-7.0.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41128/">CVE-2024-41128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41128">CVE-2024-41128 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47887/">CVE-2024-47887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47887">CVE-2024-47887 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47888/">CVE-2024-47888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47888">CVE-2024-47888 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47889/">CVE-2024-47889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47889">CVE-2024-47889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951747" comment="ruby3.3-rubygem-rails-7.0-7.0.8.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252801" version="1" class="patch">
	<metadata>
		<title>xstream-1.4.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47072" ref_url="https://www.suse.com/security/cve/CVE-2024-47072/" source="CVE"/>
		<description>
These are all security issues fixed in the xstream-1.4.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47072/">CVE-2024-47072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47072">CVE-2024-47072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951748" comment="xstream-1.4.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951749" comment="xstream-benchmark-1.4.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951750" comment="xstream-javadoc-1.4.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951751" comment="xstream-parent-1.4.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252802" version="1" class="patch">
	<metadata>
		<title>coredns-1.11.3+git129.387f34d-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.11.3+git129.387f34d-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951823" comment="coredns-1.11.3+git129.387f34d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951824" comment="coredns-extras-1.11.3+git129.387f34d-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252803" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241108T172500-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10975" ref_url="https://www.suse.com/security/cve/CVE-2024-10975/" source="CVE"/>
		<reference ref_id="CVE-2024-45794" ref_url="https://www.suse.com/security/cve/CVE-2024-45794/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241108T172500-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10975/">CVE-2024-10975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10975">CVE-2024-10975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45794/">CVE-2024-45794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45794">CVE-2024-45794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951825" comment="govulncheck-vulndb-0.0.20241108T172500-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252804" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-132.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-10468" ref_url="https://www.suse.com/security/cve/CVE-2024-10468/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-132.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-11"/>
	<updated date="2024-11-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10468/">CVE-2024-10468 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10468">CVE-2024-10468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951863" comment="MozillaFirefox-132.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951864" comment="MozillaFirefox-branding-upstream-132.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951865" comment="MozillaFirefox-devel-132.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951866" comment="MozillaFirefox-translations-common-132.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951867" comment="MozillaFirefox-translations-other-132.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252805" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241112T145010-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241112T145010-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952224" comment="govulncheck-vulndb-0.0.20241112T145010-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252806" version="1" class="patch">
	<metadata>
		<title>jujutsu-0.23.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51990" ref_url="https://www.suse.com/security/cve/CVE-2024-51990/" source="CVE"/>
		<description>
These are all security issues fixed in the jujutsu-0.23.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51990/">CVE-2024-51990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51990">CVE-2024-51990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952225" comment="jujutsu-0.23.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252807" version="1" class="patch">
	<metadata>
		<title>switchboard-plug-bluetooth-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21367" ref_url="https://www.suse.com/security/cve/CVE-2021-21367/" source="CVE"/>
		<description>
These are all security issues fixed in the switchboard-plug-bluetooth-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21367/">CVE-2021-21367 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21367">CVE-2021-21367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952226" comment="switchboard-plug-bluetooth-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952227" comment="switchboard-plug-bluetooth-lang-8.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252808" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.82.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.82.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952228" comment="gio-branding-upstream-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952229" comment="glib2-devel-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952230" comment="glib2-devel-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952231" comment="glib2-devel-static-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952232" comment="glib2-lang-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952233" comment="glib2-tests-devel-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952234" comment="glib2-tools-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952235" comment="glib2-tools-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952236" comment="libgio-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952237" comment="libgio-2_0-0-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952238" comment="libgirepository-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952239" comment="libglib-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952240" comment="libglib-2_0-0-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952241" comment="libgmodule-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952242" comment="libgmodule-2_0-0-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952243" comment="libgobject-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952244" comment="libgobject-2_0-0-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952245" comment="libgthread-2_0-0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952246" comment="libgthread-2_0-0-32bit-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952247" comment="typelib-1_0-GIRepository-3_0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952248" comment="typelib-1_0-GLib-2_0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952249" comment="typelib-1_0-GLibUnix-2_0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952250" comment="typelib-1_0-GModule-2_0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952251" comment="typelib-1_0-GObject-2_0-2.82.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952252" comment="typelib-1_0-Gio-2_0-2.82.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252809" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952253" comment="libsoup-3_0-0-3.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952254" comment="libsoup-3_0-0-32bit-3.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952255" comment="libsoup-devel-3.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952256" comment="libsoup-devel-32bit-3.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952257" comment="libsoup-lang-3.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952258" comment="typelib-1_0-Soup-3_0-3.6.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252810" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952259" comment="libsoup-2_4-1-2.74.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952260" comment="libsoup-2_4-1-32bit-2.74.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952261" comment="libsoup2-devel-2.74.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952262" comment="libsoup2-devel-32bit-2.74.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952263" comment="libsoup2-lang-2.74.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952264" comment="typelib-1_0-Soup-2_4-2.74.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252811" version="1" class="patch">
	<metadata>
		<title>libvirt-10.9.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<reference ref_id="CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-10.9.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12430">CVE-2020-12430 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952265" comment="libvirt-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952266" comment="libvirt-client-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952267" comment="libvirt-client-qemu-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952268" comment="libvirt-daemon-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952269" comment="libvirt-daemon-common-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952270" comment="libvirt-daemon-config-network-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952271" comment="libvirt-daemon-config-nwfilter-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952272" comment="libvirt-daemon-driver-libxl-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952273" comment="libvirt-daemon-driver-lxc-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952274" comment="libvirt-daemon-driver-network-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952275" comment="libvirt-daemon-driver-nodedev-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952276" comment="libvirt-daemon-driver-nwfilter-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952277" comment="libvirt-daemon-driver-qemu-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952278" comment="libvirt-daemon-driver-secret-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952279" comment="libvirt-daemon-driver-storage-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952280" comment="libvirt-daemon-driver-storage-core-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952281" comment="libvirt-daemon-driver-storage-disk-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952282" comment="libvirt-daemon-driver-storage-gluster-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952283" comment="libvirt-daemon-driver-storage-iscsi-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952284" comment="libvirt-daemon-driver-storage-iscsi-direct-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952285" comment="libvirt-daemon-driver-storage-logical-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952286" comment="libvirt-daemon-driver-storage-mpath-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952287" comment="libvirt-daemon-driver-storage-rbd-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952288" comment="libvirt-daemon-driver-storage-scsi-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952289" comment="libvirt-daemon-hooks-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952290" comment="libvirt-daemon-lock-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952291" comment="libvirt-daemon-log-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952292" comment="libvirt-daemon-lxc-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952293" comment="libvirt-daemon-plugin-lockd-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952294" comment="libvirt-daemon-plugin-sanlock-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952295" comment="libvirt-daemon-proxy-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952296" comment="libvirt-daemon-qemu-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952297" comment="libvirt-daemon-xen-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952298" comment="libvirt-devel-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952299" comment="libvirt-doc-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952300" comment="libvirt-libs-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952301" comment="libvirt-nss-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952302" comment="libvirt-ssh-proxy-10.9.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952303" comment="wireshark-plugin-libvirt-10.9.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252812" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.64.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.64.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18802">CVE-2019-18802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952304" comment="libnghttp2-14-1.64.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952305" comment="libnghttp2-14-32bit-1.64.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952306" comment="libnghttp2-devel-1.64.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952307" comment="nghttp2-1.64.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252813" version="1" class="patch">
	<metadata>
		<title>wget-1.25.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10524" ref_url="https://www.suse.com/security/cve/CVE-2024-10524/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.25.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10524/">CVE-2024-10524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524">CVE-2024-10524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952308" comment="wget-1.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952309" comment="wget-lang-1.25.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252814" version="1" class="patch">
	<metadata>
		<title>icinga2-2.14.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49369" ref_url="https://www.suse.com/security/cve/CVE-2024-49369/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga2-2.14.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-14"/>
	<updated date="2024-11-14"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-49369/">CVE-2024-49369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49369">CVE-2024-49369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952310" comment="icinga2-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952311" comment="icinga2-bin-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952312" comment="icinga2-common-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952313" comment="icinga2-doc-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952314" comment="icinga2-ido-mysql-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952315" comment="icinga2-ido-pgsql-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952316" comment="nano-icinga2-2.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952317" comment="vim-icinga2-2.14.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252815" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-31.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10231" ref_url="https://www.suse.com/security/cve/CVE-2024-10231/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-31.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-14"/>
	<updated date="2024-11-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10231/">CVE-2024-10231 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10231">CVE-2024-10231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952318" comment="nodejs-electron-31.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952319" comment="nodejs-electron-devel-31.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952320" comment="nodejs-electron-doc-31.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252816" version="1" class="patch">
	<metadata>
		<title>rclone-1.68.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.68.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-14"/>
	<updated date="2024-11-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952321" comment="rclone-1.68.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952322" comment="rclone-bash-completion-1.68.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952323" comment="rclone-zsh-completion-1.68.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252817" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20241112-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820/" source="CVE"/>
		<reference ref_id="CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853/" source="CVE"/>
		<reference ref_id="CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20241112-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-14"/>
	<updated date="2024-11-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952324" comment="ucode-intel-20241112-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252818" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11159" ref_url="https://www.suse.com/security/cve/CVE-2024-11159/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11159/">CVE-2024-11159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11159">CVE-2024-11159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952397" comment="MozillaThunderbird-128.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952398" comment="MozillaThunderbird-openpgp-librnp-128.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952399" comment="MozillaThunderbird-translations-common-128.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952400" comment="MozillaThunderbird-translations-other-128.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252819" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.17.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.17.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952401" comment="ansible-core-2.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952402" comment="ansible-test-2.17.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252820" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.16-2.16.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.16-2.16.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952403" comment="ansible-core-2.16-2.16.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952404" comment="ansible-test-2.16-2.16.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252821" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2024-46869" ref_url="https://www.suse.com/security/cve/CVE-2024-46869/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47675" ref_url="https://www.suse.com/security/cve/CVE-2024-47675/" source="CVE"/>
		<reference ref_id="CVE-2024-47676" ref_url="https://www.suse.com/security/cve/CVE-2024-47676/" source="CVE"/>
		<reference ref_id="CVE-2024-47677" ref_url="https://www.suse.com/security/cve/CVE-2024-47677/" source="CVE"/>
		<reference ref_id="CVE-2024-47678" ref_url="https://www.suse.com/security/cve/CVE-2024-47678/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47680" ref_url="https://www.suse.com/security/cve/CVE-2024-47680/" source="CVE"/>
		<reference ref_id="CVE-2024-47681" ref_url="https://www.suse.com/security/cve/CVE-2024-47681/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47683" ref_url="https://www.suse.com/security/cve/CVE-2024-47683/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47686" ref_url="https://www.suse.com/security/cve/CVE-2024-47686/" source="CVE"/>
		<reference ref_id="CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687/" source="CVE"/>
		<reference ref_id="CVE-2024-47688" ref_url="https://www.suse.com/security/cve/CVE-2024-47688/" source="CVE"/>
		<reference ref_id="CVE-2024-47689" ref_url="https://www.suse.com/security/cve/CVE-2024-47689/" source="CVE"/>
		<reference ref_id="CVE-2024-47690" ref_url="https://www.suse.com/security/cve/CVE-2024-47690/" source="CVE"/>
		<reference ref_id="CVE-2024-47691" ref_url="https://www.suse.com/security/cve/CVE-2024-47691/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47694" ref_url="https://www.suse.com/security/cve/CVE-2024-47694/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47700" ref_url="https://www.suse.com/security/cve/CVE-2024-47700/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47702" ref_url="https://www.suse.com/security/cve/CVE-2024-47702/" source="CVE"/>
		<reference ref_id="CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47708" ref_url="https://www.suse.com/security/cve/CVE-2024-47708/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47711" ref_url="https://www.suse.com/security/cve/CVE-2024-47711/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47714" ref_url="https://www.suse.com/security/cve/CVE-2024-47714/" source="CVE"/>
		<reference ref_id="CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715/" source="CVE"/>
		<reference ref_id="CVE-2024-47716" ref_url="https://www.suse.com/security/cve/CVE-2024-47716/" source="CVE"/>
		<reference ref_id="CVE-2024-47717" ref_url="https://www.suse.com/security/cve/CVE-2024-47717/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47721" ref_url="https://www.suse.com/security/cve/CVE-2024-47721/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47724" ref_url="https://www.suse.com/security/cve/CVE-2024-47724/" source="CVE"/>
		<reference ref_id="CVE-2024-47726" ref_url="https://www.suse.com/security/cve/CVE-2024-47726/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47729" ref_url="https://www.suse.com/security/cve/CVE-2024-47729/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47731" ref_url="https://www.suse.com/security/cve/CVE-2024-47731/" source="CVE"/>
		<reference ref_id="CVE-2024-47732" ref_url="https://www.suse.com/security/cve/CVE-2024-47732/" source="CVE"/>
		<reference ref_id="CVE-2024-47733" ref_url="https://www.suse.com/security/cve/CVE-2024-47733/" source="CVE"/>
		<reference ref_id="CVE-2024-47734" ref_url="https://www.suse.com/security/cve/CVE-2024-47734/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47736" ref_url="https://www.suse.com/security/cve/CVE-2024-47736/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47740" ref_url="https://www.suse.com/security/cve/CVE-2024-47740/" source="CVE"/>
		<reference ref_id="CVE-2024-47741" ref_url="https://www.suse.com/security/cve/CVE-2024-47741/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47743" ref_url="https://www.suse.com/security/cve/CVE-2024-47743/" source="CVE"/>
		<reference ref_id="CVE-2024-47744" ref_url="https://www.suse.com/security/cve/CVE-2024-47744/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47746" ref_url="https://www.suse.com/security/cve/CVE-2024-47746/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47750" ref_url="https://www.suse.com/security/cve/CVE-2024-47750/" source="CVE"/>
		<reference ref_id="CVE-2024-47751" ref_url="https://www.suse.com/security/cve/CVE-2024-47751/" source="CVE"/>
		<reference ref_id="CVE-2024-47752" ref_url="https://www.suse.com/security/cve/CVE-2024-47752/" source="CVE"/>
		<reference ref_id="CVE-2024-47753" ref_url="https://www.suse.com/security/cve/CVE-2024-47753/" source="CVE"/>
		<reference ref_id="CVE-2024-47754" ref_url="https://www.suse.com/security/cve/CVE-2024-47754/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49853" ref_url="https://www.suse.com/security/cve/CVE-2024-49853/" source="CVE"/>
		<reference ref_id="CVE-2024-49854" ref_url="https://www.suse.com/security/cve/CVE-2024-49854/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49856" ref_url="https://www.suse.com/security/cve/CVE-2024-49856/" source="CVE"/>
		<reference ref_id="CVE-2024-49857" ref_url="https://www.suse.com/security/cve/CVE-2024-49857/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49859" ref_url="https://www.suse.com/security/cve/CVE-2024-49859/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864/" source="CVE"/>
		<reference ref_id="CVE-2024-49865" ref_url="https://www.suse.com/security/cve/CVE-2024-49865/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868/" source="CVE"/>
		<reference ref_id="CVE-2024-49869" ref_url="https://www.suse.com/security/cve/CVE-2024-49869/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49872" ref_url="https://www.suse.com/security/cve/CVE-2024-49872/" source="CVE"/>
		<reference ref_id="CVE-2024-49873" ref_url="https://www.suse.com/security/cve/CVE-2024-49873/" source="CVE"/>
		<reference ref_id="CVE-2024-49874" ref_url="https://www.suse.com/security/cve/CVE-2024-49874/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49876" ref_url="https://www.suse.com/security/cve/CVE-2024-49876/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49880" ref_url="https://www.suse.com/security/cve/CVE-2024-49880/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49885" ref_url="https://www.suse.com/security/cve/CVE-2024-49885/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49887" ref_url="https://www.suse.com/security/cve/CVE-2024-49887/" source="CVE"/>
		<reference ref_id="CVE-2024-49888" ref_url="https://www.suse.com/security/cve/CVE-2024-49888/" source="CVE"/>
		<reference ref_id="CVE-2024-49889" ref_url="https://www.suse.com/security/cve/CVE-2024-49889/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49893" ref_url="https://www.suse.com/security/cve/CVE-2024-49893/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49898" ref_url="https://www.suse.com/security/cve/CVE-2024-49898/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49904" ref_url="https://www.suse.com/security/cve/CVE-2024-49904/" source="CVE"/>
		<reference ref_id="CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49910" ref_url="https://www.suse.com/security/cve/CVE-2024-49910/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49915" ref_url="https://www.suse.com/security/cve/CVE-2024-49915/" source="CVE"/>
		<reference ref_id="CVE-2024-49916" ref_url="https://www.suse.com/security/cve/CVE-2024-49916/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49926" ref_url="https://www.suse.com/security/cve/CVE-2024-49926/" source="CVE"/>
		<reference ref_id="CVE-2024-49927" ref_url="https://www.suse.com/security/cve/CVE-2024-49927/" source="CVE"/>
		<reference ref_id="CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49931" ref_url="https://www.suse.com/security/cve/CVE-2024-49931/" source="CVE"/>
		<reference ref_id="CVE-2024-49932" ref_url="https://www.suse.com/security/cve/CVE-2024-49932/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49940" ref_url="https://www.suse.com/security/cve/CVE-2024-49940/" source="CVE"/>
		<reference ref_id="CVE-2024-49941" ref_url="https://www.suse.com/security/cve/CVE-2024-49941/" source="CVE"/>
		<reference ref_id="CVE-2024-49942" ref_url="https://www.suse.com/security/cve/CVE-2024-49942/" source="CVE"/>
		<reference ref_id="CVE-2024-49943" ref_url="https://www.suse.com/security/cve/CVE-2024-49943/" source="CVE"/>
		<reference ref_id="CVE-2024-49944" ref_url="https://www.suse.com/security/cve/CVE-2024-49944/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49948" ref_url="https://www.suse.com/security/cve/CVE-2024-49948/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49951" ref_url="https://www.suse.com/security/cve/CVE-2024-49951/" source="CVE"/>
		<reference ref_id="CVE-2024-49952" ref_url="https://www.suse.com/security/cve/CVE-2024-49952/" source="CVE"/>
		<reference ref_id="CVE-2024-49953" ref_url="https://www.suse.com/security/cve/CVE-2024-49953/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49956" ref_url="https://www.suse.com/security/cve/CVE-2024-49956/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49961" ref_url="https://www.suse.com/security/cve/CVE-2024-49961/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49964" ref_url="https://www.suse.com/security/cve/CVE-2024-49964/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49970" ref_url="https://www.suse.com/security/cve/CVE-2024-49970/" source="CVE"/>
		<reference ref_id="CVE-2024-49971" ref_url="https://www.suse.com/security/cve/CVE-2024-49971/" source="CVE"/>
		<reference ref_id="CVE-2024-49972" ref_url="https://www.suse.com/security/cve/CVE-2024-49972/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49976" ref_url="https://www.suse.com/security/cve/CVE-2024-49976/" source="CVE"/>
		<reference ref_id="CVE-2024-49977" ref_url="https://www.suse.com/security/cve/CVE-2024-49977/" source="CVE"/>
		<reference ref_id="CVE-2024-49978" ref_url="https://www.suse.com/security/cve/CVE-2024-49978/" source="CVE"/>
		<reference ref_id="CVE-2024-49979" ref_url="https://www.suse.com/security/cve/CVE-2024-49979/" source="CVE"/>
		<reference ref_id="CVE-2024-49980" ref_url="https://www.suse.com/security/cve/CVE-2024-49980/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49984" ref_url="https://www.suse.com/security/cve/CVE-2024-49984/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49986" ref_url="https://www.suse.com/security/cve/CVE-2024-49986/" source="CVE"/>
		<reference ref_id="CVE-2024-49987" ref_url="https://www.suse.com/security/cve/CVE-2024-49987/" source="CVE"/>
		<reference ref_id="CVE-2024-49988" ref_url="https://www.suse.com/security/cve/CVE-2024-49988/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-49990" ref_url="https://www.suse.com/security/cve/CVE-2024-49990/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49992" ref_url="https://www.suse.com/security/cve/CVE-2024-49992/" source="CVE"/>
		<reference ref_id="CVE-2024-49994" ref_url="https://www.suse.com/security/cve/CVE-2024-49994/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-49997" ref_url="https://www.suse.com/security/cve/CVE-2024-49997/" source="CVE"/>
		<reference ref_id="CVE-2024-49998" ref_url="https://www.suse.com/security/cve/CVE-2024-49998/" source="CVE"/>
		<reference ref_id="CVE-2024-49999" ref_url="https://www.suse.com/security/cve/CVE-2024-49999/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50004" ref_url="https://www.suse.com/security/cve/CVE-2024-50004/" source="CVE"/>
		<reference ref_id="CVE-2024-50005" ref_url="https://www.suse.com/security/cve/CVE-2024-50005/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50010" ref_url="https://www.suse.com/security/cve/CVE-2024-50010/" source="CVE"/>
		<reference ref_id="CVE-2024-50011" ref_url="https://www.suse.com/security/cve/CVE-2024-50011/" source="CVE"/>
		<reference ref_id="CVE-2024-50012" ref_url="https://www.suse.com/security/cve/CVE-2024-50012/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015/" source="CVE"/>
		<reference ref_id="CVE-2024-50016" ref_url="https://www.suse.com/security/cve/CVE-2024-50016/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50018" ref_url="https://www.suse.com/security/cve/CVE-2024-50018/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50020" ref_url="https://www.suse.com/security/cve/CVE-2024-50020/" source="CVE"/>
		<reference ref_id="CVE-2024-50021" ref_url="https://www.suse.com/security/cve/CVE-2024-50021/" source="CVE"/>
		<reference ref_id="CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026/" source="CVE"/>
		<reference ref_id="CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50029" ref_url="https://www.suse.com/security/cve/CVE-2024-50029/" source="CVE"/>
		<reference ref_id="CVE-2024-50030" ref_url="https://www.suse.com/security/cve/CVE-2024-50030/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50032" ref_url="https://www.suse.com/security/cve/CVE-2024-50032/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50034" ref_url="https://www.suse.com/security/cve/CVE-2024-50034/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50036" ref_url="https://www.suse.com/security/cve/CVE-2024-50036/" source="CVE"/>
		<reference ref_id="CVE-2024-50037" ref_url="https://www.suse.com/security/cve/CVE-2024-50037/" source="CVE"/>
		<reference ref_id="CVE-2024-50038" ref_url="https://www.suse.com/security/cve/CVE-2024-50038/" source="CVE"/>
		<reference ref_id="CVE-2024-50039" ref_url="https://www.suse.com/security/cve/CVE-2024-50039/" source="CVE"/>
		<reference ref_id="CVE-2024-50040" ref_url="https://www.suse.com/security/cve/CVE-2024-50040/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50042" ref_url="https://www.suse.com/security/cve/CVE-2024-50042/" source="CVE"/>
		<reference ref_id="CVE-2024-50043" ref_url="https://www.suse.com/security/cve/CVE-2024-50043/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50056" ref_url="https://www.suse.com/security/cve/CVE-2024-50056/" source="CVE"/>
		<reference ref_id="CVE-2024-50057" ref_url="https://www.suse.com/security/cve/CVE-2024-50057/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064/" source="CVE"/>
		<reference ref_id="CVE-2024-50065" ref_url="https://www.suse.com/security/cve/CVE-2024-50065/" source="CVE"/>
		<reference ref_id="CVE-2024-50066" ref_url="https://www.suse.com/security/cve/CVE-2024-50066/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50068" ref_url="https://www.suse.com/security/cve/CVE-2024-50068/" source="CVE"/>
		<reference ref_id="CVE-2024-50069" ref_url="https://www.suse.com/security/cve/CVE-2024-50069/" source="CVE"/>
		<reference ref_id="CVE-2024-50070" ref_url="https://www.suse.com/security/cve/CVE-2024-50070/" source="CVE"/>
		<reference ref_id="CVE-2024-50071" ref_url="https://www.suse.com/security/cve/CVE-2024-50071/" source="CVE"/>
		<reference ref_id="CVE-2024-50072" ref_url="https://www.suse.com/security/cve/CVE-2024-50072/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075/" source="CVE"/>
		<reference ref_id="CVE-2024-50076" ref_url="https://www.suse.com/security/cve/CVE-2024-50076/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50079" ref_url="https://www.suse.com/security/cve/CVE-2024-50079/" source="CVE"/>
		<reference ref_id="CVE-2024-50080" ref_url="https://www.suse.com/security/cve/CVE-2024-50080/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50083" ref_url="https://www.suse.com/security/cve/CVE-2024-50083/" source="CVE"/>
		<reference ref_id="CVE-2024-50084" ref_url="https://www.suse.com/security/cve/CVE-2024-50084/" source="CVE"/>
		<reference ref_id="CVE-2024-50085" ref_url="https://www.suse.com/security/cve/CVE-2024-50085/" source="CVE"/>
		<reference ref_id="CVE-2024-50086" ref_url="https://www.suse.com/security/cve/CVE-2024-50086/" source="CVE"/>
		<reference ref_id="CVE-2024-50087" ref_url="https://www.suse.com/security/cve/CVE-2024-50087/" source="CVE"/>
		<reference ref_id="CVE-2024-50088" ref_url="https://www.suse.com/security/cve/CVE-2024-50088/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50090" ref_url="https://www.suse.com/security/cve/CVE-2024-50090/" source="CVE"/>
		<reference ref_id="CVE-2024-50091" ref_url="https://www.suse.com/security/cve/CVE-2024-50091/" source="CVE"/>
		<reference ref_id="CVE-2024-50092" ref_url="https://www.suse.com/security/cve/CVE-2024-50092/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50094" ref_url="https://www.suse.com/security/cve/CVE-2024-50094/" source="CVE"/>
		<reference ref_id="CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095/" source="CVE"/>
		<reference ref_id="CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096/" source="CVE"/>
		<reference ref_id="CVE-2024-50097" ref_url="https://www.suse.com/security/cve/CVE-2024-50097/" source="CVE"/>
		<reference ref_id="CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50100" ref_url="https://www.suse.com/security/cve/CVE-2024-50100/" source="CVE"/>
		<reference ref_id="CVE-2024-50101" ref_url="https://www.suse.com/security/cve/CVE-2024-50101/" source="CVE"/>
		<reference ref_id="CVE-2024-50102" ref_url="https://www.suse.com/security/cve/CVE-2024-50102/" source="CVE"/>
		<reference ref_id="CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103/" source="CVE"/>
		<reference ref_id="CVE-2024-50104" ref_url="https://www.suse.com/security/cve/CVE-2024-50104/" source="CVE"/>
		<reference ref_id="CVE-2024-50105" ref_url="https://www.suse.com/security/cve/CVE-2024-50105/" source="CVE"/>
		<reference ref_id="CVE-2024-50106" ref_url="https://www.suse.com/security/cve/CVE-2024-50106/" source="CVE"/>
		<reference ref_id="CVE-2024-50107" ref_url="https://www.suse.com/security/cve/CVE-2024-50107/" source="CVE"/>
		<reference ref_id="CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108/" source="CVE"/>
		<reference ref_id="CVE-2024-50109" ref_url="https://www.suse.com/security/cve/CVE-2024-50109/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50111" ref_url="https://www.suse.com/security/cve/CVE-2024-50111/" source="CVE"/>
		<reference ref_id="CVE-2024-50112" ref_url="https://www.suse.com/security/cve/CVE-2024-50112/" source="CVE"/>
		<reference ref_id="CVE-2024-50113" ref_url="https://www.suse.com/security/cve/CVE-2024-50113/" source="CVE"/>
		<reference ref_id="CVE-2024-50114" ref_url="https://www.suse.com/security/cve/CVE-2024-50114/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50118" ref_url="https://www.suse.com/security/cve/CVE-2024-50118/" source="CVE"/>
		<reference ref_id="CVE-2024-50119" ref_url="https://www.suse.com/security/cve/CVE-2024-50119/" source="CVE"/>
		<reference ref_id="CVE-2024-50120" ref_url="https://www.suse.com/security/cve/CVE-2024-50120/" source="CVE"/>
		<reference ref_id="CVE-2024-50121" ref_url="https://www.suse.com/security/cve/CVE-2024-50121/" source="CVE"/>
		<reference ref_id="CVE-2024-50122" ref_url="https://www.suse.com/security/cve/CVE-2024-50122/" source="CVE"/>
		<reference ref_id="CVE-2024-50123" ref_url="https://www.suse.com/security/cve/CVE-2024-50123/" source="CVE"/>
		<reference ref_id="CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50126" ref_url="https://www.suse.com/security/cve/CVE-2024-50126/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50129" ref_url="https://www.suse.com/security/cve/CVE-2024-50129/" source="CVE"/>
		<reference ref_id="CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130/" source="CVE"/>
		<reference ref_id="CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131/" source="CVE"/>
		<reference ref_id="CVE-2024-50132" ref_url="https://www.suse.com/security/cve/CVE-2024-50132/" source="CVE"/>
		<reference ref_id="CVE-2024-50133" ref_url="https://www.suse.com/security/cve/CVE-2024-50133/" source="CVE"/>
		<reference ref_id="CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134/" source="CVE"/>
		<reference ref_id="CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135/" source="CVE"/>
		<reference ref_id="CVE-2024-50136" ref_url="https://www.suse.com/security/cve/CVE-2024-50136/" source="CVE"/>
		<reference ref_id="CVE-2024-50137" ref_url="https://www.suse.com/security/cve/CVE-2024-50137/" source="CVE"/>
		<reference ref_id="CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138/" source="CVE"/>
		<reference ref_id="CVE-2024-50139" ref_url="https://www.suse.com/security/cve/CVE-2024-50139/" source="CVE"/>
		<reference ref_id="CVE-2024-50140" ref_url="https://www.suse.com/security/cve/CVE-2024-50140/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50142" ref_url="https://www.suse.com/security/cve/CVE-2024-50142/" source="CVE"/>
		<reference ref_id="CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-50144" ref_url="https://www.suse.com/security/cve/CVE-2024-50144/" source="CVE"/>
		<reference ref_id="CVE-2024-50145" ref_url="https://www.suse.com/security/cve/CVE-2024-50145/" source="CVE"/>
		<reference ref_id="CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146/" source="CVE"/>
		<reference ref_id="CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147/" source="CVE"/>
		<reference ref_id="CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148/" source="CVE"/>
		<reference ref_id="CVE-2024-50149" ref_url="https://www.suse.com/security/cve/CVE-2024-50149/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50151" ref_url="https://www.suse.com/security/cve/CVE-2024-50151/" source="CVE"/>
		<reference ref_id="CVE-2024-50152" ref_url="https://www.suse.com/security/cve/CVE-2024-50152/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155/" source="CVE"/>
		<reference ref_id="CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156/" source="CVE"/>
		<reference ref_id="CVE-2024-50157" ref_url="https://www.suse.com/security/cve/CVE-2024-50157/" source="CVE"/>
		<reference ref_id="CVE-2024-50158" ref_url="https://www.suse.com/security/cve/CVE-2024-50158/" source="CVE"/>
		<reference ref_id="CVE-2024-50159" ref_url="https://www.suse.com/security/cve/CVE-2024-50159/" source="CVE"/>
		<reference ref_id="CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160/" source="CVE"/>
		<reference ref_id="CVE-2024-50161" ref_url="https://www.suse.com/security/cve/CVE-2024-50161/" source="CVE"/>
		<reference ref_id="CVE-2024-50162" ref_url="https://www.suse.com/security/cve/CVE-2024-50162/" source="CVE"/>
		<reference ref_id="CVE-2024-50163" ref_url="https://www.suse.com/security/cve/CVE-2024-50163/" source="CVE"/>
		<reference ref_id="CVE-2024-50164" ref_url="https://www.suse.com/security/cve/CVE-2024-50164/" source="CVE"/>
		<reference ref_id="CVE-2024-50165" ref_url="https://www.suse.com/security/cve/CVE-2024-50165/" source="CVE"/>
		<reference ref_id="CVE-2024-50166" ref_url="https://www.suse.com/security/cve/CVE-2024-50166/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50168" ref_url="https://www.suse.com/security/cve/CVE-2024-50168/" source="CVE"/>
		<reference ref_id="CVE-2024-50170" ref_url="https://www.suse.com/security/cve/CVE-2024-50170/" source="CVE"/>
		<reference ref_id="CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171/" source="CVE"/>
		<reference ref_id="CVE-2024-50172" ref_url="https://www.suse.com/security/cve/CVE-2024-50172/" source="CVE"/>
		<reference ref_id="CVE-2024-50173" ref_url="https://www.suse.com/security/cve/CVE-2024-50173/" source="CVE"/>
		<reference ref_id="CVE-2024-50174" ref_url="https://www.suse.com/security/cve/CVE-2024-50174/" source="CVE"/>
		<reference ref_id="CVE-2024-50175" ref_url="https://www.suse.com/security/cve/CVE-2024-50175/" source="CVE"/>
		<reference ref_id="CVE-2024-50176" ref_url="https://www.suse.com/security/cve/CVE-2024-50176/" source="CVE"/>
		<reference ref_id="CVE-2024-50177" ref_url="https://www.suse.com/security/cve/CVE-2024-50177/" source="CVE"/>
		<reference ref_id="CVE-2024-50178" ref_url="https://www.suse.com/security/cve/CVE-2024-50178/" source="CVE"/>
		<reference ref_id="CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179/" source="CVE"/>
		<reference ref_id="CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180/" source="CVE"/>
		<reference ref_id="CVE-2024-50181" ref_url="https://www.suse.com/security/cve/CVE-2024-50181/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183/" source="CVE"/>
		<reference ref_id="CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184/" source="CVE"/>
		<reference ref_id="CVE-2024-50185" ref_url="https://www.suse.com/security/cve/CVE-2024-50185/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187/" source="CVE"/>
		<reference ref_id="CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50190" ref_url="https://www.suse.com/security/cve/CVE-2024-50190/" source="CVE"/>
		<reference ref_id="CVE-2024-50191" ref_url="https://www.suse.com/security/cve/CVE-2024-50191/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50193" ref_url="https://www.suse.com/security/cve/CVE-2024-50193/" source="CVE"/>
		<reference ref_id="CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196/" source="CVE"/>
		<reference ref_id="CVE-2024-50197" ref_url="https://www.suse.com/security/cve/CVE-2024-50197/" source="CVE"/>
		<reference ref_id="CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198/" source="CVE"/>
		<reference ref_id="CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199/" source="CVE"/>
		<reference ref_id="CVE-2024-50200" ref_url="https://www.suse.com/security/cve/CVE-2024-50200/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50206" ref_url="https://www.suse.com/security/cve/CVE-2024-50206/" source="CVE"/>
		<reference ref_id="CVE-2024-50207" ref_url="https://www.suse.com/security/cve/CVE-2024-50207/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209/" source="CVE"/>
		<reference ref_id="CVE-2024-50210" ref_url="https://www.suse.com/security/cve/CVE-2024-50210/" source="CVE"/>
		<reference ref_id="CVE-2024-50211" ref_url="https://www.suse.com/security/cve/CVE-2024-50211/" source="CVE"/>
		<reference ref_id="CVE-2024-50212" ref_url="https://www.suse.com/security/cve/CVE-2024-50212/" source="CVE"/>
		<reference ref_id="CVE-2024-50213" ref_url="https://www.suse.com/security/cve/CVE-2024-50213/" source="CVE"/>
		<reference ref_id="CVE-2024-50214" ref_url="https://www.suse.com/security/cve/CVE-2024-50214/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50216" ref_url="https://www.suse.com/security/cve/CVE-2024-50216/" source="CVE"/>
		<reference ref_id="CVE-2024-50217" ref_url="https://www.suse.com/security/cve/CVE-2024-50217/" source="CVE"/>
		<reference ref_id="CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218/" source="CVE"/>
		<reference ref_id="CVE-2024-50220" ref_url="https://www.suse.com/security/cve/CVE-2024-50220/" source="CVE"/>
		<reference ref_id="CVE-2024-50221" ref_url="https://www.suse.com/security/cve/CVE-2024-50221/" source="CVE"/>
		<reference ref_id="CVE-2024-50222" ref_url="https://www.suse.com/security/cve/CVE-2024-50222/" source="CVE"/>
		<reference ref_id="CVE-2024-50223" ref_url="https://www.suse.com/security/cve/CVE-2024-50223/" source="CVE"/>
		<reference ref_id="CVE-2024-50224" ref_url="https://www.suse.com/security/cve/CVE-2024-50224/" source="CVE"/>
		<reference ref_id="CVE-2024-50225" ref_url="https://www.suse.com/security/cve/CVE-2024-50225/" source="CVE"/>
		<reference ref_id="CVE-2024-50226" ref_url="https://www.suse.com/security/cve/CVE-2024-50226/" source="CVE"/>
		<reference ref_id="CVE-2024-50227" ref_url="https://www.suse.com/security/cve/CVE-2024-50227/" source="CVE"/>
		<reference ref_id="CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228/" source="CVE"/>
		<reference ref_id="CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50231" ref_url="https://www.suse.com/security/cve/CVE-2024-50231/" source="CVE"/>
		<reference ref_id="CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232/" source="CVE"/>
		<reference ref_id="CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233/" source="CVE"/>
		<reference ref_id="CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234/" source="CVE"/>
		<reference ref_id="CVE-2024-50235" ref_url="https://www.suse.com/security/cve/CVE-2024-50235/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50238" ref_url="https://www.suse.com/security/cve/CVE-2024-50238/" source="CVE"/>
		<reference ref_id="CVE-2024-50239" ref_url="https://www.suse.com/security/cve/CVE-2024-50239/" source="CVE"/>
		<reference ref_id="CVE-2024-50240" ref_url="https://www.suse.com/security/cve/CVE-2024-50240/" source="CVE"/>
		<reference ref_id="CVE-2024-50241" ref_url="https://www.suse.com/security/cve/CVE-2024-50241/" source="CVE"/>
		<reference ref_id="CVE-2024-50242" ref_url="https://www.suse.com/security/cve/CVE-2024-50242/" source="CVE"/>
		<reference ref_id="CVE-2024-50243" ref_url="https://www.suse.com/security/cve/CVE-2024-50243/" source="CVE"/>
		<reference ref_id="CVE-2024-50244" ref_url="https://www.suse.com/security/cve/CVE-2024-50244/" source="CVE"/>
		<reference ref_id="CVE-2024-50245" ref_url="https://www.suse.com/security/cve/CVE-2024-50245/" source="CVE"/>
		<reference ref_id="CVE-2024-50246" ref_url="https://www.suse.com/security/cve/CVE-2024-50246/" source="CVE"/>
		<reference ref_id="CVE-2024-50247" ref_url="https://www.suse.com/security/cve/CVE-2024-50247/" source="CVE"/>
		<reference ref_id="CVE-2024-50248" ref_url="https://www.suse.com/security/cve/CVE-2024-50248/" source="CVE"/>
		<reference ref_id="CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249/" source="CVE"/>
		<reference ref_id="CVE-2024-50250" ref_url="https://www.suse.com/security/cve/CVE-2024-50250/" source="CVE"/>
		<reference ref_id="CVE-2024-50251" ref_url="https://www.suse.com/security/cve/CVE-2024-50251/" source="CVE"/>
		<reference ref_id="CVE-2024-50252" ref_url="https://www.suse.com/security/cve/CVE-2024-50252/" source="CVE"/>
		<reference ref_id="CVE-2024-50253" ref_url="https://www.suse.com/security/cve/CVE-2024-50253/" source="CVE"/>
		<reference ref_id="CVE-2024-50254" ref_url="https://www.suse.com/security/cve/CVE-2024-50254/" source="CVE"/>
		<reference ref_id="CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255/" source="CVE"/>
		<reference ref_id="CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256/" source="CVE"/>
		<reference ref_id="CVE-2024-50257" ref_url="https://www.suse.com/security/cve/CVE-2024-50257/" source="CVE"/>
		<reference ref_id="CVE-2024-50258" ref_url="https://www.suse.com/security/cve/CVE-2024-50258/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50260" ref_url="https://www.suse.com/security/cve/CVE-2024-50260/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50262" ref_url="https://www.suse.com/security/cve/CVE-2024-50262/" source="CVE"/>
		<reference ref_id="CVE-2024-50263" ref_url="https://www.suse.com/security/cve/CVE-2024-50263/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46869/">CVE-2024-46869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46869">CVE-2024-46869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47675/">CVE-2024-47675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47675">CVE-2024-47675 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47676/">CVE-2024-47676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47676">CVE-2024-47676 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47677/">CVE-2024-47677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47677">CVE-2024-47677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47678/">CVE-2024-47678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47678">CVE-2024-47678 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47680/">CVE-2024-47680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47680">CVE-2024-47680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47681/">CVE-2024-47681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47681">CVE-2024-47681 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47683/">CVE-2024-47683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47683">CVE-2024-47683 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47686/">CVE-2024-47686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47686">CVE-2024-47686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47688/">CVE-2024-47688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47688">CVE-2024-47688 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47689/">CVE-2024-47689 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47689">CVE-2024-47689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47690/">CVE-2024-47690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47690">CVE-2024-47690 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47691/">CVE-2024-47691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47691">CVE-2024-47691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47694/">CVE-2024-47694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47694">CVE-2024-47694 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47700/">CVE-2024-47700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47700">CVE-2024-47700 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47702/">CVE-2024-47702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47702">CVE-2024-47702 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47708/">CVE-2024-47708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47708">CVE-2024-47708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47711/">CVE-2024-47711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47711">CVE-2024-47711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47714/">CVE-2024-47714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47714">CVE-2024-47714 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47716/">CVE-2024-47716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47716">CVE-2024-47716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47717/">CVE-2024-47717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47717">CVE-2024-47717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47721/">CVE-2024-47721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47721">CVE-2024-47721 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47724/">CVE-2024-47724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47724">CVE-2024-47724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47726/">CVE-2024-47726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47726">CVE-2024-47726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47729/">CVE-2024-47729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47729">CVE-2024-47729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47731/">CVE-2024-47731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47731">CVE-2024-47731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47732/">CVE-2024-47732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47732">CVE-2024-47732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47733/">CVE-2024-47733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47733">CVE-2024-47733 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47734/">CVE-2024-47734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47734">CVE-2024-47734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47736/">CVE-2024-47736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47736">CVE-2024-47736 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47740/">CVE-2024-47740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47740">CVE-2024-47740 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47741/">CVE-2024-47741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47741">CVE-2024-47741 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47743/">CVE-2024-47743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47743">CVE-2024-47743 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47744/">CVE-2024-47744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47744">CVE-2024-47744 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47746/">CVE-2024-47746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47746">CVE-2024-47746 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47750/">CVE-2024-47750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47750">CVE-2024-47750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47751/">CVE-2024-47751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47751">CVE-2024-47751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47752/">CVE-2024-47752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47752">CVE-2024-47752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47753/">CVE-2024-47753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47753">CVE-2024-47753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47754/">CVE-2024-47754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47754">CVE-2024-47754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49853/">CVE-2024-49853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49853">CVE-2024-49853 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49854/">CVE-2024-49854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49854">CVE-2024-49854 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49856/">CVE-2024-49856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49857/">CVE-2024-49857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49857">CVE-2024-49857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49859/">CVE-2024-49859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49859">CVE-2024-49859 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49865/">CVE-2024-49865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49865">CVE-2024-49865 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49869/">CVE-2024-49869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49869">CVE-2024-49869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49872/">CVE-2024-49872 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49872">CVE-2024-49872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49873/">CVE-2024-49873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49873">CVE-2024-49873 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49874/">CVE-2024-49874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49876/">CVE-2024-49876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49876">CVE-2024-49876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49880/">CVE-2024-49880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49880">CVE-2024-49880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49885/">CVE-2024-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49885">CVE-2024-49885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49887/">CVE-2024-49887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49887">CVE-2024-49887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49888/">CVE-2024-49888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49888">CVE-2024-49888 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49889/">CVE-2024-49889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49893/">CVE-2024-49893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49893">CVE-2024-49893 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49898/">CVE-2024-49898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49898">CVE-2024-49898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49904/">CVE-2024-49904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49904">CVE-2024-49904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49910/">CVE-2024-49910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49910">CVE-2024-49910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49915/">CVE-2024-49915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49915">CVE-2024-49915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49916/">CVE-2024-49916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49916">CVE-2024-49916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49926/">CVE-2024-49926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49926">CVE-2024-49926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49927/">CVE-2024-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49931/">CVE-2024-49931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49932/">CVE-2024-49932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49932">CVE-2024-49932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49940/">CVE-2024-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49940">CVE-2024-49940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49941/">CVE-2024-49941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49941">CVE-2024-49941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49942/">CVE-2024-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49942">CVE-2024-49942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49943/">CVE-2024-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49943">CVE-2024-49943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49944/">CVE-2024-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49948/">CVE-2024-49948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49951/">CVE-2024-49951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49952/">CVE-2024-49952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49953/">CVE-2024-49953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49956/">CVE-2024-49956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49956">CVE-2024-49956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49961/">CVE-2024-49961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49964/">CVE-2024-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49964">CVE-2024-49964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49970/">CVE-2024-49970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49970">CVE-2024-49970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49971/">CVE-2024-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49971">CVE-2024-49971 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49972/">CVE-2024-49972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49972">CVE-2024-49972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49976/">CVE-2024-49976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49977/">CVE-2024-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49978/">CVE-2024-49978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49979/">CVE-2024-49979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49979">CVE-2024-49979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49980/">CVE-2024-49980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49984/">CVE-2024-49984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49984">CVE-2024-49984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49986/">CVE-2024-49986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49987/">CVE-2024-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49988/">CVE-2024-49988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49990/">CVE-2024-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49990">CVE-2024-49990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49992/">CVE-2024-49992 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49994/">CVE-2024-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49994">CVE-2024-49994 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49997/">CVE-2024-49997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49998/">CVE-2024-49998 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49998">CVE-2024-49998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49999/">CVE-2024-49999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49999">CVE-2024-49999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50004/">CVE-2024-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50004">CVE-2024-50004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50005/">CVE-2024-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50010/">CVE-2024-50010 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50010">CVE-2024-50010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50011/">CVE-2024-50011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50011">CVE-2024-50011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50012/">CVE-2024-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50016/">CVE-2024-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50018/">CVE-2024-50018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50018">CVE-2024-50018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50020/">CVE-2024-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50020">CVE-2024-50020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50021/">CVE-2024-50021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50021">CVE-2024-50021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50029/">CVE-2024-50029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50030/">CVE-2024-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50030">CVE-2024-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50032/">CVE-2024-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50034/">CVE-2024-50034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50034">CVE-2024-50034 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50036/">CVE-2024-50036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50037/">CVE-2024-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50037">CVE-2024-50037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50038/">CVE-2024-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50039/">CVE-2024-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50040/">CVE-2024-50040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50042/">CVE-2024-50042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50042">CVE-2024-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50043/">CVE-2024-50043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50043">CVE-2024-50043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50056/">CVE-2024-50056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50056">CVE-2024-50056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50057/">CVE-2024-50057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50065/">CVE-2024-50065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50066/">CVE-2024-50066 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50068/">CVE-2024-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50068">CVE-2024-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50069/">CVE-2024-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50070/">CVE-2024-50070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50071/">CVE-2024-50071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50071">CVE-2024-50071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50072/">CVE-2024-50072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50076/">CVE-2024-50076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50079/">CVE-2024-50079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50079">CVE-2024-50079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50080/">CVE-2024-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50083/">CVE-2024-50083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50084/">CVE-2024-50084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50085/">CVE-2024-50085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50086/">CVE-2024-50086 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50087/">CVE-2024-50087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50088/">CVE-2024-50088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50090/">CVE-2024-50090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50090">CVE-2024-50090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50091/">CVE-2024-50091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50091">CVE-2024-50091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50092/">CVE-2024-50092 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50092">CVE-2024-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50094/">CVE-2024-50094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50094">CVE-2024-50094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50097/">CVE-2024-50097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50100/">CVE-2024-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50100">CVE-2024-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50101/">CVE-2024-50101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50102/">CVE-2024-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50102">CVE-2024-50102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50104/">CVE-2024-50104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50104">CVE-2024-50104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50105/">CVE-2024-50105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50105">CVE-2024-50105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50106/">CVE-2024-50106 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50106">CVE-2024-50106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50107/">CVE-2024-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50107">CVE-2024-50107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50109/">CVE-2024-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50109">CVE-2024-50109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50111/">CVE-2024-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50112/">CVE-2024-50112 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50113/">CVE-2024-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50113">CVE-2024-50113 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50114/">CVE-2024-50114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50114">CVE-2024-50114 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50118/">CVE-2024-50118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50118">CVE-2024-50118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50119/">CVE-2024-50119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50119">CVE-2024-50119 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50120/">CVE-2024-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50121/">CVE-2024-50121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50122/">CVE-2024-50122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50122">CVE-2024-50122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50123/">CVE-2024-50123 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50123">CVE-2024-50123 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50126/">CVE-2024-50126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50129/">CVE-2024-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50129">CVE-2024-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50132/">CVE-2024-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50132">CVE-2024-50132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50133/">CVE-2024-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50136/">CVE-2024-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50137/">CVE-2024-50137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50137">CVE-2024-50137 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50139/">CVE-2024-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50140/">CVE-2024-50140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50142/">CVE-2024-50142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50144/">CVE-2024-50144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50144">CVE-2024-50144 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50145/">CVE-2024-50145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50149/">CVE-2024-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50149">CVE-2024-50149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50151/">CVE-2024-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50152/">CVE-2024-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50157/">CVE-2024-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50157">CVE-2024-50157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50158/">CVE-2024-50158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50159/">CVE-2024-50159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50161/">CVE-2024-50161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50161">CVE-2024-50161 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50162/">CVE-2024-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50163/">CVE-2024-50163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50164/">CVE-2024-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50165/">CVE-2024-50165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50165">CVE-2024-50165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50166/">CVE-2024-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50168/">CVE-2024-50168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50170/">CVE-2024-50170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50172/">CVE-2024-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50173/">CVE-2024-50173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50173">CVE-2024-50173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50174/">CVE-2024-50174 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50174">CVE-2024-50174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50175/">CVE-2024-50175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50176/">CVE-2024-50176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50177/">CVE-2024-50177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50177">CVE-2024-50177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50178/">CVE-2024-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50178">CVE-2024-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50181/">CVE-2024-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50185/">CVE-2024-50185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50190/">CVE-2024-50190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50190">CVE-2024-50190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50191/">CVE-2024-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50193/">CVE-2024-50193 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50193">CVE-2024-50193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50197/">CVE-2024-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50197">CVE-2024-50197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50200/">CVE-2024-50200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50200">CVE-2024-50200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50206/">CVE-2024-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50206">CVE-2024-50206 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50207/">CVE-2024-50207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50207">CVE-2024-50207 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50210/">CVE-2024-50210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50211/">CVE-2024-50211 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50212/">CVE-2024-50212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50212">CVE-2024-50212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50213/">CVE-2024-50213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50213">CVE-2024-50213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50214/">CVE-2024-50214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50214">CVE-2024-50214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50216/">CVE-2024-50216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50217/">CVE-2024-50217 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50217">CVE-2024-50217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50220/">CVE-2024-50220 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50220">CVE-2024-50220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50221/">CVE-2024-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50221">CVE-2024-50221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50222/">CVE-2024-50222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50223/">CVE-2024-50223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50224/">CVE-2024-50224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50225/">CVE-2024-50225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50225">CVE-2024-50225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50226/">CVE-2024-50226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50227/">CVE-2024-50227 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50227">CVE-2024-50227 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50231/">CVE-2024-50231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50235/">CVE-2024-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50238/">CVE-2024-50238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50238">CVE-2024-50238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50239/">CVE-2024-50239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50240/">CVE-2024-50240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50241/">CVE-2024-50241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50241">CVE-2024-50241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50242/">CVE-2024-50242 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50243/">CVE-2024-50243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50244/">CVE-2024-50244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50245/">CVE-2024-50245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50246/">CVE-2024-50246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50247/">CVE-2024-50247 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50248/">CVE-2024-50248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50250/">CVE-2024-50250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50251/">CVE-2024-50251 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50252/">CVE-2024-50252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50253/">CVE-2024-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50253">CVE-2024-50253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50254/">CVE-2024-50254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50254">CVE-2024-50254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50257/">CVE-2024-50257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50258/">CVE-2024-50258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50260/">CVE-2024-50260 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50260">CVE-2024-50260 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50262/">CVE-2024-50262 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50263/">CVE-2024-50263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50263">CVE-2024-50263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952406" comment="kernel-macros-6.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952407" comment="kernel-source-6.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952408" comment="kernel-source-vanilla-6.11.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252822" version="1" class="patch">
	<metadata>
		<title>postgresql12-12.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql12-12.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952409" comment="postgresql12-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952410" comment="postgresql12-contrib-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952411" comment="postgresql12-devel-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952412" comment="postgresql12-docs-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952413" comment="postgresql12-llvmjit-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952414" comment="postgresql12-llvmjit-devel-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952415" comment="postgresql12-plperl-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952416" comment="postgresql12-plpython-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952417" comment="postgresql12-pltcl-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952418" comment="postgresql12-server-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952419" comment="postgresql12-server-devel-12.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952420" comment="postgresql12-test-12.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252823" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952421" comment="postgresql13-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952422" comment="postgresql13-contrib-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952423" comment="postgresql13-devel-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952424" comment="postgresql13-docs-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952425" comment="postgresql13-llvmjit-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952426" comment="postgresql13-llvmjit-devel-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952427" comment="postgresql13-plperl-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952428" comment="postgresql13-plpython-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952429" comment="postgresql13-pltcl-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952430" comment="postgresql13-server-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952431" comment="postgresql13-server-devel-13.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952432" comment="postgresql13-test-13.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252824" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952433" comment="postgresql14-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952434" comment="postgresql14-contrib-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952435" comment="postgresql14-devel-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952436" comment="postgresql14-docs-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952437" comment="postgresql14-llvmjit-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952438" comment="postgresql14-llvmjit-devel-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952439" comment="postgresql14-plperl-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952440" comment="postgresql14-plpython-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952441" comment="postgresql14-pltcl-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952442" comment="postgresql14-server-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952443" comment="postgresql14-server-devel-14.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952444" comment="postgresql14-test-14.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252825" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952445" comment="postgresql15-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952446" comment="postgresql15-contrib-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952447" comment="postgresql15-devel-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952448" comment="postgresql15-docs-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952449" comment="postgresql15-llvmjit-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952450" comment="postgresql15-llvmjit-devel-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952451" comment="postgresql15-plperl-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952452" comment="postgresql15-plpython-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952453" comment="postgresql15-pltcl-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952454" comment="postgresql15-server-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952455" comment="postgresql15-server-devel-15.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952456" comment="postgresql15-test-15.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252826" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952457" comment="postgresql16-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952458" comment="postgresql16-contrib-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952459" comment="postgresql16-devel-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952460" comment="postgresql16-docs-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952461" comment="postgresql16-llvmjit-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952462" comment="postgresql16-llvmjit-devel-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952463" comment="postgresql16-plperl-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952464" comment="postgresql16-plpython-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952465" comment="postgresql16-pltcl-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952466" comment="postgresql16-server-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952467" comment="postgresql16-server-devel-16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952468" comment="postgresql16-test-16.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252827" version="1" class="patch">
	<metadata>
		<title>libecpg6-17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952469" comment="libecpg6-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952470" comment="libecpg6-32bit-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952471" comment="libpq5-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952472" comment="libpq5-32bit-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952473" comment="postgresql17-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952474" comment="postgresql17-contrib-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952475" comment="postgresql17-devel-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952476" comment="postgresql17-docs-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952477" comment="postgresql17-llvmjit-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952478" comment="postgresql17-llvmjit-devel-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952479" comment="postgresql17-plperl-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952480" comment="postgresql17-plpython-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952481" comment="postgresql17-pltcl-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952482" comment="postgresql17-server-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952483" comment="postgresql17-server-devel-17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952484" comment="postgresql17-test-17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252828" version="1" class="patch">
	<metadata>
		<title>python310-3.10.15-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.15-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952485" comment="python310-3.10.15-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952486" comment="python310-32bit-3.10.15-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952487" comment="python310-curses-3.10.15-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952488" comment="python310-dbm-3.10.15-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952489" comment="python310-idle-3.10.15-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952490" comment="python310-tk-3.10.15-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252829" version="1" class="patch">
	<metadata>
		<title>python39-3.9.20-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.20-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952491" comment="python39-3.9.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952492" comment="python39-curses-3.9.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952493" comment="python39-dbm-3.9.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952494" comment="python39-idle-3.9.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952495" comment="python39-tk-3.9.20-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252830" version="1" class="patch">
	<metadata>
		<title>gh-2.62.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52308" ref_url="https://www.suse.com/security/cve/CVE-2024-52308/" source="CVE"/>
		<description>
These are all security issues fixed in the gh-2.62.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-18"/>
	<updated date="2024-11-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52308/">CVE-2024-52308 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52308">CVE-2024-52308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953448" comment="gh-2.62.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953449" comment="gh-bash-completion-2.62.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953450" comment="gh-fish-completion-2.62.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953451" comment="gh-zsh-completion-2.62.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252831" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-31.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10827" ref_url="https://www.suse.com/security/cve/CVE-2024-10827/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-31.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-19"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10827/">CVE-2024-10827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10827">CVE-2024-10827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953499" comment="nodejs-electron-31.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953500" comment="nodejs-electron-devel-31.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953501" comment="nodejs-electron-doc-31.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252832" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.69-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11110" ref_url="https://www.suse.com/security/cve/CVE-2024-11110/" source="CVE"/>
		<reference ref_id="CVE-2024-11111" ref_url="https://www.suse.com/security/cve/CVE-2024-11111/" source="CVE"/>
		<reference ref_id="CVE-2024-11112" ref_url="https://www.suse.com/security/cve/CVE-2024-11112/" source="CVE"/>
		<reference ref_id="CVE-2024-11113" ref_url="https://www.suse.com/security/cve/CVE-2024-11113/" source="CVE"/>
		<reference ref_id="CVE-2024-11114" ref_url="https://www.suse.com/security/cve/CVE-2024-11114/" source="CVE"/>
		<reference ref_id="CVE-2024-11115" ref_url="https://www.suse.com/security/cve/CVE-2024-11115/" source="CVE"/>
		<reference ref_id="CVE-2024-11116" ref_url="https://www.suse.com/security/cve/CVE-2024-11116/" source="CVE"/>
		<reference ref_id="CVE-2024-11117" ref_url="https://www.suse.com/security/cve/CVE-2024-11117/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.69-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-20"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11110/">CVE-2024-11110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11110">CVE-2024-11110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11111/">CVE-2024-11111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11111">CVE-2024-11111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11112/">CVE-2024-11112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11112">CVE-2024-11112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11113/">CVE-2024-11113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11113">CVE-2024-11113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11114/">CVE-2024-11114 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11114">CVE-2024-11114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11115/">CVE-2024-11115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11115">CVE-2024-11115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11116/">CVE-2024-11116 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11116">CVE-2024-11116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11117/">CVE-2024-11117 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11117">CVE-2024-11117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953502" comment="chromedriver-131.0.6778.69-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953503" comment="chromium-131.0.6778.69-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252833" version="1" class="patch">
	<metadata>
		<title>cobbler-3.3.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47533" ref_url="https://www.suse.com/security/cve/CVE-2024-47533/" source="CVE"/>
		<description>
These are all security issues fixed in the cobbler-3.3.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-20"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47533/">CVE-2024-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47533">CVE-2024-47533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953504" comment="cobbler-3.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953505" comment="cobbler-tests-3.3.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953506" comment="cobbler-tests-containers-3.3.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252834" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241119T173509-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-8911" ref_url="https://www.suse.com/security/cve/CVE-2020-8911/" source="CVE"/>
		<reference ref_id="CVE-2023-0109" ref_url="https://www.suse.com/security/cve/CVE-2023-0109/" source="CVE"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="CVE-2024-24425" ref_url="https://www.suse.com/security/cve/CVE-2024-24425/" source="CVE"/>
		<reference ref_id="CVE-2024-24426" ref_url="https://www.suse.com/security/cve/CVE-2024-24426/" source="CVE"/>
		<reference ref_id="CVE-2024-44625" ref_url="https://www.suse.com/security/cve/CVE-2024-44625/" source="CVE"/>
		<reference ref_id="CVE-2024-52010" ref_url="https://www.suse.com/security/cve/CVE-2024-52010/" source="CVE"/>
		<reference ref_id="CVE-2024-52308" ref_url="https://www.suse.com/security/cve/CVE-2024-52308/" source="CVE"/>
		<reference ref_id="CVE-2024-52522" ref_url="https://www.suse.com/security/cve/CVE-2024-52522/" source="CVE"/>
		<reference ref_id="CVE-2024-9526" ref_url="https://www.suse.com/security/cve/CVE-2024-9526/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241119T173509-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-20"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8911/">CVE-2020-8911 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8911">CVE-2020-8911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0109/">CVE-2023-0109 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0109">CVE-2023-0109 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24425/">CVE-2024-24425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24425">CVE-2024-24425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24426/">CVE-2024-24426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24426">CVE-2024-24426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44625/">CVE-2024-44625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44625">CVE-2024-44625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52010/">CVE-2024-52010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52010">CVE-2024-52010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52308/">CVE-2024-52308 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52308">CVE-2024-52308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52522/">CVE-2024-52522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52522">CVE-2024-52522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9526/">CVE-2024-9526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9526">CVE-2024-9526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953507" comment="govulncheck-vulndb-0.0.20241119T173509-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252835" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.8-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-27628" ref_url="https://www.suse.com/security/cve/CVE-2024-27628/" source="CVE"/>
		<reference ref_id="CVE-2024-34509" ref_url="https://www.suse.com/security/cve/CVE-2024-34509/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.8-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27628/">CVE-2024-27628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27628">CVE-2024-27628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34509/">CVE-2024-34509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34509">CVE-2024-34509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953998" comment="dcmtk-3.6.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953999" comment="dcmtk-devel-3.6.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954000" comment="libdcmtk18-3.6.8-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252836" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241120T172248-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52009" ref_url="https://www.suse.com/security/cve/CVE-2024-52009/" source="CVE"/>
		<reference ref_id="CVE-2024-8986" ref_url="https://www.suse.com/security/cve/CVE-2024-8986/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241120T172248-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52009/">CVE-2024-52009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52009">CVE-2024-52009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8986/">CVE-2024-8986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8986">CVE-2024-8986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954001" comment="govulncheck-vulndb-0.0.20241120T172248-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252837" version="1" class="patch">
	<metadata>
		<title>iptraf-ng-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52949" ref_url="https://www.suse.com/security/cve/CVE-2024-52949/" source="CVE"/>
		<description>
These are all security issues fixed in the iptraf-ng-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52949/">CVE-2024-52949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52949">CVE-2024-52949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954002" comment="iptraf-ng-1.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252838" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954003" comment="traefik2-2.11.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252839" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.85-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11395" ref_url="https://www.suse.com/security/cve/CVE-2024-11395/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.85-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11395/">CVE-2024-11395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11395">CVE-2024-11395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954026" comment="chromedriver-131.0.6778.85-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954027" comment="chromium-131.0.6778.85-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252840" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241121T195252-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52280" ref_url="https://www.suse.com/security/cve/CVE-2024-52280/" source="CVE"/>
		<reference ref_id="CVE-2024-52282" ref_url="https://www.suse.com/security/cve/CVE-2024-52282/" source="CVE"/>
		<reference ref_id="CVE-2024-52309" ref_url="https://www.suse.com/security/cve/CVE-2024-52309/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241121T195252-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52280/">CVE-2024-52280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52280">CVE-2024-52280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52282/">CVE-2024-52282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52282">CVE-2024-52282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52309/">CVE-2024-52309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52309">CVE-2024-52309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954669" comment="govulncheck-vulndb-0.0.20241121T195252-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252841" version="1" class="patch">
	<metadata>
		<title>opentofu-1.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
These are all security issues fixed in the opentofu-1.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954670" comment="opentofu-1.8.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252842" version="1" class="patch">
	<metadata>
		<title>php8-8.3.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-11236" ref_url="https://www.suse.com/security/cve/CVE-2024-11236/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2024-8932" ref_url="https://www.suse.com/security/cve/CVE-2024-8932/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.3.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11236/">CVE-2024-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11236">CVE-2024-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8932/">CVE-2024-8932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8932">CVE-2024-8932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954671" comment="php8-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954672" comment="php8-bcmath-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954673" comment="php8-bz2-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954674" comment="php8-calendar-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954675" comment="php8-cli-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954676" comment="php8-ctype-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954677" comment="php8-curl-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954678" comment="php8-dba-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954679" comment="php8-devel-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954680" comment="php8-dom-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954681" comment="php8-enchant-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954682" comment="php8-exif-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954683" comment="php8-ffi-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954684" comment="php8-fileinfo-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954685" comment="php8-ftp-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954686" comment="php8-gd-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954687" comment="php8-gettext-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954688" comment="php8-gmp-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954689" comment="php8-iconv-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954690" comment="php8-intl-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954691" comment="php8-ldap-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954692" comment="php8-mbstring-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954693" comment="php8-mysql-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954694" comment="php8-odbc-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954695" comment="php8-opcache-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954696" comment="php8-openssl-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954697" comment="php8-pcntl-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954698" comment="php8-pdo-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954699" comment="php8-pgsql-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954700" comment="php8-phar-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954701" comment="php8-posix-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954702" comment="php8-readline-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954703" comment="php8-shmop-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954704" comment="php8-snmp-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954705" comment="php8-soap-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954706" comment="php8-sockets-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954707" comment="php8-sodium-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954708" comment="php8-sqlite-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954709" comment="php8-sysvmsg-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954710" comment="php8-sysvsem-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954711" comment="php8-sysvshm-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954712" comment="php8-tidy-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954713" comment="php8-tokenizer-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954714" comment="php8-xmlreader-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954715" comment="php8-xmlwriter-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954716" comment="php8-xsl-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954717" comment="php8-zip-8.3.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954718" comment="php8-zlib-8.3.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252843" version="1" class="patch">
	<metadata>
		<title>traefik-3.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954719" comment="traefik-3.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252844" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.40.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.40.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954720" comment="libblkid-devel-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954721" comment="libblkid-devel-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954722" comment="libblkid-devel-static-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954723" comment="libblkid1-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954724" comment="libblkid1-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954725" comment="libfdisk-devel-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954726" comment="libfdisk-devel-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954727" comment="libfdisk-devel-static-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954728" comment="libfdisk1-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954729" comment="libfdisk1-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954730" comment="libmount-devel-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954731" comment="libmount-devel-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954732" comment="libmount-devel-static-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954733" comment="libmount1-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954734" comment="libmount1-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954735" comment="libsmartcols-devel-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954736" comment="libsmartcols-devel-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954737" comment="libsmartcols-devel-static-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954738" comment="libsmartcols1-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954739" comment="libsmartcols1-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954740" comment="libuuid-devel-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954741" comment="libuuid-devel-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954742" comment="libuuid-devel-static-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954743" comment="libuuid1-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954744" comment="libuuid1-32bit-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954745" comment="util-linux-2.40.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954746" comment="util-linux-lang-2.40.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252845" version="1" class="patch">
	<metadata>
		<title>rclone-1.68.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52522" ref_url="https://www.suse.com/security/cve/CVE-2024-52522/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.68.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-25"/>
	<updated date="2024-11-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52522/">CVE-2024-52522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52522">CVE-2024-52522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954820" comment="rclone-1.68.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954821" comment="rclone-bash-completion-1.68.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954822" comment="rclone-zsh-completion-1.68.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252846" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.97-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.97-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-25"/>
	<updated date="2024-11-25"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954823" comment="tomcat-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954824" comment="tomcat-admin-webapps-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954825" comment="tomcat-docs-webapp-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954826" comment="tomcat-el-3_0-api-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954827" comment="tomcat-embed-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954828" comment="tomcat-javadoc-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954829" comment="tomcat-jsp-2_3-api-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954830" comment="tomcat-jsvc-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954831" comment="tomcat-lib-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954832" comment="tomcat-servlet-4_0-api-9.0.97-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954833" comment="tomcat-webapps-9.0.97-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252847" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.33-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.33-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-25"/>
	<updated date="2024-11-25"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954834" comment="tomcat10-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954835" comment="tomcat10-admin-webapps-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954836" comment="tomcat10-doc-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954837" comment="tomcat10-docs-webapp-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954838" comment="tomcat10-el-5_0-api-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954839" comment="tomcat10-embed-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954840" comment="tomcat10-jsp-3_1-api-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954841" comment="tomcat10-jsvc-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954842" comment="tomcat10-lib-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954843" comment="tomcat10-servlet-6_0-api-10.1.33-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954844" comment="tomcat10-webapps-10.1.33-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252848" version="1" class="patch">
	<metadata>
		<title>neomutt-20241114-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-49393" ref_url="https://www.suse.com/security/cve/CVE-2024-49393/" source="CVE"/>
		<reference ref_id="CVE-2024-49394" ref_url="https://www.suse.com/security/cve/CVE-2024-49394/" source="CVE"/>
		<description>
These are all security issues fixed in the neomutt-20241114-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49393/">CVE-2024-49393 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49393">CVE-2024-49393 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49394/">CVE-2024-49394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49394">CVE-2024-49394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954930" comment="neomutt-20241114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954931" comment="neomutt-contrib-20241114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954932" comment="neomutt-doc-20241114-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954933" comment="neomutt-lang-20241114-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252849" version="1" class="patch">
	<metadata>
		<title>python310-tornado6-6.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-tornado6-6.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954934" comment="python310-tornado6-6.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954935" comment="python311-tornado6-6.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954936" comment="python312-tornado6-6.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954937" comment="python313-tornado6-6.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252850" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11595" ref_url="https://www.suse.com/security/cve/CVE-2024-11595/" source="CVE"/>
		<reference ref_id="CVE-2024-11596" ref_url="https://www.suse.com/security/cve/CVE-2024-11596/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11595/">CVE-2024-11595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11595">CVE-2024-11595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11596/">CVE-2024-11596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11596">CVE-2024-11596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954938" comment="libwireshark18-4.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954939" comment="libwiretap15-4.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954940" comment="libwsutil16-4.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954941" comment="wireshark-4.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954942" comment="wireshark-devel-4.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954943" comment="wireshark-ui-qt-4.4.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252851" version="1" class="patch">
	<metadata>
		<title>xen-4.19.0_06-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45818" ref_url="https://www.suse.com/security/cve/CVE-2024-45818/" source="CVE"/>
		<reference ref_id="CVE-2024-45819" ref_url="https://www.suse.com/security/cve/CVE-2024-45819/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.19.0_06-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45818/">CVE-2024-45818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45818">CVE-2024-45818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45819/">CVE-2024-45819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45819">CVE-2024-45819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954944" comment="xen-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954945" comment="xen-devel-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954946" comment="xen-doc-html-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954947" comment="xen-libs-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954948" comment="xen-tools-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954949" comment="xen-tools-domU-4.19.0_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954950" comment="xen-tools-xendomains-wait-disk-4.19.0_06-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252852" version="1" class="patch">
	<metadata>
		<title>libjxl-devel-0.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="CVE-2024-11498" ref_url="https://www.suse.com/security/cve/CVE-2024-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the libjxl-devel-0.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11498/">CVE-2024-11498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11498">CVE-2024-11498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955226" comment="libjxl-devel-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955227" comment="libjxl-tools-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955228" comment="libjxl0_11-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955229" comment="libjxl0_11-32bit-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955230" comment="libjxl0_11-x86-64-v3-0.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252853" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.2.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50612" ref_url="https://www.suse.com/security/cve/CVE-2024-50612/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.2.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50612/">CVE-2024-50612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50612">CVE-2024-50612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955231" comment="libsndfile-devel-1.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955232" comment="libsndfile1-1.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955233" comment="libsndfile1-32bit-1.2.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252854" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955523" comment="MozillaThunderbird-128.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955524" comment="MozillaThunderbird-openpgp-librnp-128.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955525" comment="MozillaThunderbird-translations-common-128.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955526" comment="MozillaThunderbird-translations-other-128.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252855" version="1" class="patch">
	<metadata>
		<title>gimp-2.10.38-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32990" ref_url="https://www.suse.com/security/cve/CVE-2022-32990/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.10.38-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-30"/>
	<updated date="2024-11-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32990/">CVE-2022-32990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32990">CVE-2022-32990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955653" comment="gimp-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955654" comment="gimp-devel-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955655" comment="gimp-lang-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955656" comment="gimp-plugin-aa-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955657" comment="gimp-plugins-python-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955658" comment="libgimp-2_0-0-2.10.38-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955659" comment="libgimpui-2_0-0-2.10.38-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252856" version="1" class="patch">
	<metadata>
		<title>python-2.7.18-51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.18-51.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-30"/>
	<updated date="2024-11-30"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955660" comment="python-2.7.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955661" comment="python-curses-2.7.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955662" comment="python-demo-2.7.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955663" comment="python-gdbm-2.7.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955664" comment="python-idle-2.7.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955665" comment="python-tk-2.7.18-51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252857" version="1" class="patch">
	<metadata>
		<title>ansible-10-10.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-10-10.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955871" comment="ansible-10-10.6.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252858" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.17-2.17.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.17-2.17.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955872" comment="ansible-core-2.17-2.17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955873" comment="ansible-test-2.17-2.17.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252859" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955874" comment="avahi-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955875" comment="avahi-autoipd-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955876" comment="avahi-compat-howl-devel-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955877" comment="avahi-compat-mDNSResponder-devel-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955878" comment="avahi-lang-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955879" comment="avahi-utils-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955880" comment="libavahi-client3-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955881" comment="libavahi-client3-32bit-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955882" comment="libavahi-common3-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955883" comment="libavahi-common3-32bit-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955884" comment="libavahi-core7-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955885" comment="libavahi-devel-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955886" comment="libavahi-libevent1-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955887" comment="libdns_sd-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955888" comment="libdns_sd-32bit-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955889" comment="libhowl0-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955890" comment="python310-avahi-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955891" comment="python311-avahi-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955892" comment="python312-avahi-0.8-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955893" comment="python313-avahi-0.8-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252860" version="1" class="patch">
	<metadata>
		<title>himmelblau-0.7.7+git.0.b48d0bb-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11738" ref_url="https://www.suse.com/security/cve/CVE-2024-11738/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-0.7.7+git.0.b48d0bb-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11738/">CVE-2024-11738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11738">CVE-2024-11738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956191" comment="himmelblau-0.7.7+git.0.b48d0bb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956192" comment="himmelblau-sshd-config-0.7.7+git.0.b48d0bb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956193" comment="himmelblau-sso-0.7.7+git.0.b48d0bb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956194" comment="libnss_himmelblau2-0.7.7+git.0.b48d0bb-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956195" comment="pam-himmelblau-0.7.7+git.0.b48d0bb-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252861" version="1" class="patch">
	<metadata>
		<title>python310-PyJWT-2.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53861" ref_url="https://www.suse.com/security/cve/CVE-2024-53861/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-PyJWT-2.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53861/">CVE-2024-53861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53861">CVE-2024-53861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956196" comment="python310-PyJWT-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956197" comment="python311-PyJWT-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956198" comment="python312-PyJWT-2.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956199" comment="python313-PyJWT-2.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252862" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.120.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37302" ref_url="https://www.suse.com/security/cve/CVE-2024-37302/" source="CVE"/>
		<reference ref_id="CVE-2024-37303" ref_url="https://www.suse.com/security/cve/CVE-2024-37303/" source="CVE"/>
		<reference ref_id="CVE-2024-52805" ref_url="https://www.suse.com/security/cve/CVE-2024-52805/" source="CVE"/>
		<reference ref_id="CVE-2024-52815" ref_url="https://www.suse.com/security/cve/CVE-2024-52815/" source="CVE"/>
		<reference ref_id="CVE-2024-53863" ref_url="https://www.suse.com/security/cve/CVE-2024-53863/" source="CVE"/>
		<reference ref_id="CVE-2024-53867" ref_url="https://www.suse.com/security/cve/CVE-2024-53867/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.120.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37302/">CVE-2024-37302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37302">CVE-2024-37302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37303/">CVE-2024-37303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37303">CVE-2024-37303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52805/">CVE-2024-52805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52805">CVE-2024-52805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52815/">CVE-2024-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52815">CVE-2024-52815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53863/">CVE-2024-53863 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53863">CVE-2024-53863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53867/">CVE-2024-53867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53867">CVE-2024-53867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956790" comment="matrix-synapse-1.120.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252863" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956791" comment="libmozjs-128-0-128.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956792" comment="mozjs128-128.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956793" comment="mozjs128-devel-128.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252864" version="1" class="patch">
	<metadata>
		<title>obs-scm-bridge-0.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22038" ref_url="https://www.suse.com/security/cve/CVE-2024-22038/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-scm-bridge-0.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-22038/">CVE-2024-22038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22038">CVE-2024-22038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956794" comment="obs-scm-bridge-0.5.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252865" version="1" class="patch">
	<metadata>
		<title>teleport-17.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53259" ref_url="https://www.suse.com/security/cve/CVE-2024-53259/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53259/">CVE-2024-53259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53259">CVE-2024-53259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956795" comment="teleport-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956796" comment="teleport-bash-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956797" comment="teleport-fdpass-teleport-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956798" comment="teleport-tbot-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956799" comment="teleport-tbot-bash-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956800" comment="teleport-tbot-zsh-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956801" comment="teleport-tctl-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956802" comment="teleport-tctl-bash-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956803" comment="teleport-tctl-zsh-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956804" comment="teleport-tsh-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956805" comment="teleport-tsh-bash-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956806" comment="teleport-tsh-zsh-completion-17.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956807" comment="teleport-zsh-completion-17.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252866" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956808" comment="ansible-core-2.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956809" comment="ansible-test-2.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252867" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.16-2.16.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.16-2.16.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956810" comment="ansible-core-2.16-2.16.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956811" comment="ansible-test-2.16-2.16.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252868" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.17-2.17.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.17-2.17.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956812" comment="ansible-core-2.17-2.17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956813" comment="ansible-test-2.17-2.17.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252869" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3157" ref_url="https://www.suse.com/security/cve/CVE-2024-3157/" source="CVE"/>
		<reference ref_id="CVE-2024-3516" ref_url="https://www.suse.com/security/cve/CVE-2024-3516/" source="CVE"/>
		<reference ref_id="CVE-2024-3837" ref_url="https://www.suse.com/security/cve/CVE-2024-3837/" source="CVE"/>
		<reference ref_id="CVE-2024-3839" ref_url="https://www.suse.com/security/cve/CVE-2024-3839/" source="CVE"/>
		<reference ref_id="CVE-2024-3914" ref_url="https://www.suse.com/security/cve/CVE-2024-3914/" source="CVE"/>
		<reference ref_id="CVE-2024-4058" ref_url="https://www.suse.com/security/cve/CVE-2024-4058/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="CVE-2024-4761" ref_url="https://www.suse.com/security/cve/CVE-2024-4761/" source="CVE"/>
		<reference ref_id="CVE-2024-5158" ref_url="https://www.suse.com/security/cve/CVE-2024-5158/" source="CVE"/>
		<reference ref_id="CVE-2024-5496" ref_url="https://www.suse.com/security/cve/CVE-2024-5496/" source="CVE"/>
		<reference ref_id="CVE-2024-5846" ref_url="https://www.suse.com/security/cve/CVE-2024-5846/" source="CVE"/>
		<reference ref_id="CVE-2024-6291" ref_url="https://www.suse.com/security/cve/CVE-2024-6291/" source="CVE"/>
		<reference ref_id="CVE-2024-6989" ref_url="https://www.suse.com/security/cve/CVE-2024-6989/" source="CVE"/>
		<reference ref_id="CVE-2024-6996" ref_url="https://www.suse.com/security/cve/CVE-2024-6996/" source="CVE"/>
		<reference ref_id="CVE-2024-7532" ref_url="https://www.suse.com/security/cve/CVE-2024-7532/" source="CVE"/>
		<reference ref_id="CVE-2024-7536" ref_url="https://www.suse.com/security/cve/CVE-2024-7536/" source="CVE"/>
		<reference ref_id="CVE-2024-7965" ref_url="https://www.suse.com/security/cve/CVE-2024-7965/" source="CVE"/>
		<reference ref_id="CVE-2024-7967" ref_url="https://www.suse.com/security/cve/CVE-2024-7967/" source="CVE"/>
		<reference ref_id="CVE-2024-7971" ref_url="https://www.suse.com/security/cve/CVE-2024-7971/" source="CVE"/>
		<reference ref_id="CVE-2024-8198" ref_url="https://www.suse.com/security/cve/CVE-2024-8198/" source="CVE"/>
		<reference ref_id="CVE-2024-8636" ref_url="https://www.suse.com/security/cve/CVE-2024-8636/" source="CVE"/>
		<reference ref_id="CVE-2024-9123" ref_url="https://www.suse.com/security/cve/CVE-2024-9123/" source="CVE"/>
		<reference ref_id="CVE-2024-9602" ref_url="https://www.suse.com/security/cve/CVE-2024-9602/" source="CVE"/>
		<reference ref_id="CVE-2024-9603" ref_url="https://www.suse.com/security/cve/CVE-2024-9603/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3157/">CVE-2024-3157 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3157">CVE-2024-3157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3516/">CVE-2024-3516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3516">CVE-2024-3516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3837/">CVE-2024-3837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3837">CVE-2024-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3839/">CVE-2024-3839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3839">CVE-2024-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3914/">CVE-2024-3914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3914">CVE-2024-3914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4058/">CVE-2024-4058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4058">CVE-2024-4058 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4761/">CVE-2024-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4761">CVE-2024-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5158/">CVE-2024-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5158">CVE-2024-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5496/">CVE-2024-5496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5496">CVE-2024-5496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5846/">CVE-2024-5846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5846">CVE-2024-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6291/">CVE-2024-6291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6291">CVE-2024-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6989/">CVE-2024-6989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6989">CVE-2024-6989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6996/">CVE-2024-6996 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6996">CVE-2024-6996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7532/">CVE-2024-7532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7532">CVE-2024-7532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7536/">CVE-2024-7536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7536">CVE-2024-7536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7965/">CVE-2024-7965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7965">CVE-2024-7965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7967/">CVE-2024-7967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7967">CVE-2024-7967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7971/">CVE-2024-7971 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7971">CVE-2024-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8198/">CVE-2024-8198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8198">CVE-2024-8198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8636/">CVE-2024-8636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8636">CVE-2024-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9123/">CVE-2024-9123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9123">CVE-2024-9123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9602/">CVE-2024-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9602">CVE-2024-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9603/">CVE-2024-9603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9603">CVE-2024-9603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956814" comment="libQt5Pdf5-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956815" comment="libQt5PdfWidgets5-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956816" comment="libqt5-qtpdf-devel-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956817" comment="libqt5-qtpdf-examples-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956818" comment="libqt5-qtpdf-imports-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956819" comment="libqt5-qtpdf-private-headers-devel-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956820" comment="libqt5-qtwebengine-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956821" comment="libqt5-qtwebengine-devel-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956822" comment="libqt5-qtwebengine-examples-5.15.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956823" comment="libqt5-qtwebengine-private-headers-devel-5.15.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252870" version="1" class="patch">
	<metadata>
		<title>netty-4.1.115-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47535" ref_url="https://www.suse.com/security/cve/CVE-2024-47535/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.115-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47535/">CVE-2024-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956824" comment="netty-4.1.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956825" comment="netty-bom-4.1.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956826" comment="netty-javadoc-4.1.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956827" comment="netty-parent-4.1.115-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252871" version="1" class="patch">
	<metadata>
		<title>jupyter-nbclassic-1.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbclassic-1.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956828" comment="jupyter-nbclassic-1.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956829" comment="python310-nbclassic-1.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956830" comment="python311-nbclassic-1.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956831" comment="python312-nbclassic-1.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956832" comment="python313-nbclassic-1.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252872" version="1" class="patch">
	<metadata>
		<title>python310-python-multipart-0.0.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53981" ref_url="https://www.suse.com/security/cve/CVE-2024-53981/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-python-multipart-0.0.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53981/">CVE-2024-53981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53981">CVE-2024-53981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956833" comment="python310-python-multipart-0.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956834" comment="python311-python-multipart-0.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956835" comment="python312-python-multipart-0.0.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956836" comment="python313-python-multipart-0.0.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252873" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.108-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12053" ref_url="https://www.suse.com/security/cve/CVE-2024-12053/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.108-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12053/">CVE-2024-12053 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12053">CVE-2024-12053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956998" comment="chromedriver-131.0.6778.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956999" comment="chromium-131.0.6778.108-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252874" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-latex-4.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-latex-4.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957000" comment="jupyter-jupyterlab-latex-4.1.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252875" version="1" class="patch">
	<metadata>
		<title>oras-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the oras-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957001" comment="oras-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957002" comment="oras-bash-completion-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957003" comment="oras-fish-completion-1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957004" comment="oras-zsh-completion-1.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252876" version="1" class="patch">
	<metadata>
		<title>python310-Flask-Security-5.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21241" ref_url="https://www.suse.com/security/cve/CVE-2021-21241/" source="CVE"/>
		<reference ref_id="CVE-2021-23385" ref_url="https://www.suse.com/security/cve/CVE-2021-23385/" source="CVE"/>
		<reference ref_id="CVE-2023-49438" ref_url="https://www.suse.com/security/cve/CVE-2023-49438/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Flask-Security-5.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21241/">CVE-2021-21241 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21241">CVE-2021-21241 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23385/">CVE-2021-23385 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23385">CVE-2021-23385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49438/">CVE-2023-49438 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49438">CVE-2023-49438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957005" comment="python310-Flask-Security-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957006" comment="python311-Flask-Security-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957007" comment="python312-Flask-Security-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957008" comment="python313-Flask-Security-5.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252877" version="1" class="patch">
	<metadata>
		<title>python310-aiohttp-3.11.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52303" ref_url="https://www.suse.com/security/cve/CVE-2024-52303/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-aiohttp-3.11.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-52303/">CVE-2024-52303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52303">CVE-2024-52303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957009" comment="python310-aiohttp-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957010" comment="python311-aiohttp-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957011" comment="python312-aiohttp-3.11.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957012" comment="python313-aiohttp-3.11.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252878" version="1" class="patch">
	<metadata>
		<title>python310-django-ckeditor-6.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24815" ref_url="https://www.suse.com/security/cve/CVE-2024-24815/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-django-ckeditor-6.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24815/">CVE-2024-24815 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24815">CVE-2024-24815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957013" comment="python310-django-ckeditor-6.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957014" comment="python311-django-ckeditor-6.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957015" comment="python312-django-ckeditor-6.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957016" comment="python313-django-ckeditor-6.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252879" version="1" class="patch">
	<metadata>
		<title>python-furo-doc-2024.8.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the python-furo-doc-2024.8.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957017" comment="python-furo-doc-2024.8.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957018" comment="python310-furo-2024.8.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957019" comment="python311-furo-2024.8.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957020" comment="python312-furo-2024.8.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957021" comment="python313-furo-2024.8.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252880" version="1" class="patch">
	<metadata>
		<title>python310-jupyter-ydoc-3.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-jupyter-ydoc-3.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957022" comment="python310-jupyter-ydoc-3.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957023" comment="python311-jupyter-ydoc-3.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957024" comment="python312-jupyter-ydoc-3.0.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957025" comment="python313-jupyter-ydoc-3.0.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252881" version="1" class="patch">
	<metadata>
		<title>jupyter-nbdime-7.0.2-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbdime-7.0.2-18.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957026" comment="jupyter-nbdime-7.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957027" comment="jupyter-nbdime-jupyterlab-3.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957028" comment="python310-nbdime-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957029" comment="python310-nbdime-git-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957030" comment="python310-nbdime-hg-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957031" comment="python311-nbdime-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957032" comment="python311-nbdime-git-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957033" comment="python311-nbdime-hg-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957034" comment="python312-nbdime-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957035" comment="python312-nbdime-git-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957036" comment="python312-nbdime-hg-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957037" comment="python313-nbdime-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957038" comment="python313-nbdime-git-4.0.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957039" comment="python313-nbdime-hg-4.0.2-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252882" version="1" class="patch">
	<metadata>
		<title>python310-pytest-html-4.1.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-pytest-html-4.1.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957040" comment="python310-pytest-html-4.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957041" comment="python311-pytest-html-4.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957042" comment="python312-pytest-html-4.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957043" comment="python313-pytest-html-4.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252883" version="1" class="patch">
	<metadata>
		<title>skopeo-1.16.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
These are all security issues fixed in the skopeo-1.16.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957044" comment="skopeo-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957045" comment="skopeo-bash-completion-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957046" comment="skopeo-fish-completion-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957047" comment="skopeo-zsh-completion-1.16.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252884" version="1" class="patch">
	<metadata>
		<title>pam-1.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10963" ref_url="https://www.suse.com/security/cve/CVE-2024-10963/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-08"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10963/">CVE-2024-10963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957137" comment="pam-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957138" comment="pam-32bit-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957139" comment="pam-devel-1.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957140" comment="pam-devel-32bit-1.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252885" version="1" class="patch">
	<metadata>
		<title>lxd-5.21.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-46565" ref_url="https://www.suse.com/security/cve/CVE-2023-46565/" source="CVE"/>
		<description>
These are all security issues fixed in the lxd-5.21.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-09"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46565/">CVE-2023-46565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46565">CVE-2023-46565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957230" comment="lxd-5.21.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957231" comment="lxd-bash-completion-5.21.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252886" version="1" class="patch">
	<metadata>
		<title>python310-Django4-4.2.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53907" ref_url="https://www.suse.com/security/cve/CVE-2024-53907/" source="CVE"/>
		<reference ref_id="CVE-2024-53908" ref_url="https://www.suse.com/security/cve/CVE-2024-53908/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django4-4.2.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-09"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53907/">CVE-2024-53907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53907">CVE-2024-53907 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-53908/">CVE-2024-53908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53908">CVE-2024-53908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957232" comment="python310-Django4-4.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957233" comment="python311-Django4-4.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957234" comment="python312-Django4-4.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957235" comment="python313-Django4-4.2.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252887" version="1" class="patch">
	<metadata>
		<title>squid-6.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-09"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957236" comment="squid-6.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252888" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241209T183251-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10220" ref_url="https://www.suse.com/security/cve/CVE-2024-10220/" source="CVE"/>
		<reference ref_id="CVE-2024-36620" ref_url="https://www.suse.com/security/cve/CVE-2024-36620/" source="CVE"/>
		<reference ref_id="CVE-2024-36621" ref_url="https://www.suse.com/security/cve/CVE-2024-36621/" source="CVE"/>
		<reference ref_id="CVE-2024-36623" ref_url="https://www.suse.com/security/cve/CVE-2024-36623/" source="CVE"/>
		<reference ref_id="CVE-2024-37820" ref_url="https://www.suse.com/security/cve/CVE-2024-37820/" source="CVE"/>
		<reference ref_id="CVE-2024-43784" ref_url="https://www.suse.com/security/cve/CVE-2024-43784/" source="CVE"/>
		<reference ref_id="CVE-2024-45719" ref_url="https://www.suse.com/security/cve/CVE-2024-45719/" source="CVE"/>
		<reference ref_id="CVE-2024-50948" ref_url="https://www.suse.com/security/cve/CVE-2024-50948/" source="CVE"/>
		<reference ref_id="CVE-2024-52003" ref_url="https://www.suse.com/security/cve/CVE-2024-52003/" source="CVE"/>
		<reference ref_id="CVE-2024-52529" ref_url="https://www.suse.com/security/cve/CVE-2024-52529/" source="CVE"/>
		<reference ref_id="CVE-2024-52801" ref_url="https://www.suse.com/security/cve/CVE-2024-52801/" source="CVE"/>
		<reference ref_id="CVE-2024-53259" ref_url="https://www.suse.com/security/cve/CVE-2024-53259/" source="CVE"/>
		<reference ref_id="CVE-2024-53264" ref_url="https://www.suse.com/security/cve/CVE-2024-53264/" source="CVE"/>
		<reference ref_id="CVE-2024-53858" ref_url="https://www.suse.com/security/cve/CVE-2024-53858/" source="CVE"/>
		<reference ref_id="CVE-2024-53862" ref_url="https://www.suse.com/security/cve/CVE-2024-53862/" source="CVE"/>
		<reference ref_id="CVE-2024-54131" ref_url="https://www.suse.com/security/cve/CVE-2024-54131/" source="CVE"/>
		<reference ref_id="CVE-2024-54132" ref_url="https://www.suse.com/security/cve/CVE-2024-54132/" source="CVE"/>
		<reference ref_id="CVE-2024-6156" ref_url="https://www.suse.com/security/cve/CVE-2024-6156/" source="CVE"/>
		<reference ref_id="CVE-2024-6219" ref_url="https://www.suse.com/security/cve/CVE-2024-6219/" source="CVE"/>
		<reference ref_id="CVE-2024-6538" ref_url="https://www.suse.com/security/cve/CVE-2024-6538/" source="CVE"/>
		<reference ref_id="CVE-2024-8676" ref_url="https://www.suse.com/security/cve/CVE-2024-8676/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241209T183251-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-11"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-10220/">CVE-2024-10220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10220">CVE-2024-10220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36620/">CVE-2024-36620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36620">CVE-2024-36620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36621/">CVE-2024-36621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36621">CVE-2024-36621 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36623/">CVE-2024-36623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36623">CVE-2024-36623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37820/">CVE-2024-37820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37820">CVE-2024-37820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43784/">CVE-2024-43784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43784">CVE-2024-43784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45719/">CVE-2024-45719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45719">CVE-2024-45719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50948/">CVE-2024-50948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50948">CVE-2024-50948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52003/">CVE-2024-52003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52003">CVE-2024-52003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52529/">CVE-2024-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52529">CVE-2024-52529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52801/">CVE-2024-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52801">CVE-2024-52801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53259/">CVE-2024-53259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53259">CVE-2024-53259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53264/">CVE-2024-53264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53264">CVE-2024-53264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53858/">CVE-2024-53858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53858">CVE-2024-53858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53862/">CVE-2024-53862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53862">CVE-2024-53862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54131/">CVE-2024-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54131">CVE-2024-54131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-54132/">CVE-2024-54132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54132">CVE-2024-54132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6156/">CVE-2024-6156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6156">CVE-2024-6156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6219/">CVE-2024-6219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6219">CVE-2024-6219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6538/">CVE-2024-6538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6538">CVE-2024-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8676/">CVE-2024-8676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8676">CVE-2024-8676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958021" comment="govulncheck-vulndb-0.0.20241209T183251-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252889" version="1" class="patch">
	<metadata>
		<title>python310-Django-5.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53907" ref_url="https://www.suse.com/security/cve/CVE-2024-53907/" source="CVE"/>
		<reference ref_id="CVE-2024-53908" ref_url="https://www.suse.com/security/cve/CVE-2024-53908/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-Django-5.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-11"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53907/">CVE-2024-53907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53907">CVE-2024-53907 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-53908/">CVE-2024-53908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53908">CVE-2024-53908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958022" comment="python310-Django-5.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958023" comment="python311-Django-5.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958024" comment="python312-Django-5.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958025" comment="python313-Django-5.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252890" version="1" class="patch">
	<metadata>
		<title>radare2-5.9.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29645" ref_url="https://www.suse.com/security/cve/CVE-2024-29645/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.9.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-11"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29645/">CVE-2024-29645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29645">CVE-2024-29645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958026" comment="radare2-5.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958027" comment="radare2-devel-5.9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958028" comment="radare2-zsh-completion-5.9.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252891" version="1" class="patch">
	<metadata>
		<title>libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-46901" ref_url="https://www.suse.com/security/cve/CVE-2024-46901/" source="CVE"/>
		<description>
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-11"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46901/">CVE-2024-46901 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46901">CVE-2024-46901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958029" comment="libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958030" comment="libsvn_auth_kwallet-1-0-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958031" comment="subversion-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958032" comment="subversion-bash-completion-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958033" comment="subversion-devel-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958034" comment="subversion-perl-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958035" comment="subversion-python-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958036" comment="subversion-ruby-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958037" comment="subversion-server-1.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958038" comment="subversion-tools-1.14.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252892" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958039" comment="docker-stable-24.0.9_ce-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958040" comment="docker-stable-bash-completion-24.0.9_ce-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958041" comment="docker-stable-buildx-0.19.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958042" comment="docker-stable-fish-completion-24.0.9_ce-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958043" comment="docker-stable-rootless-extras-24.0.9_ce-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958044" comment="docker-stable-zsh-completion-24.0.9_ce-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252893" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1522" ref_url="https://www.suse.com/security/cve/CVE-2014-1522/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1525" ref_url="https://www.suse.com/security/cve/CVE-2014-1525/" source="CVE"/>
		<reference ref_id="CVE-2014-1526" ref_url="https://www.suse.com/security/cve/CVE-2014-1526/" source="CVE"/>
		<reference ref_id="CVE-2014-1528" ref_url="https://www.suse.com/security/cve/CVE-2014-1528/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1539" ref_url="https://www.suse.com/security/cve/CVE-2014-1539/" source="CVE"/>
		<reference ref_id="CVE-2014-1540" ref_url="https://www.suse.com/security/cve/CVE-2014-1540/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1542" ref_url="https://www.suse.com/security/cve/CVE-2014-1542/" source="CVE"/>
		<reference ref_id="CVE-2014-1543" ref_url="https://www.suse.com/security/cve/CVE-2014-1543/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1549" ref_url="https://www.suse.com/security/cve/CVE-2014-1549/" source="CVE"/>
		<reference ref_id="CVE-2014-1550" ref_url="https://www.suse.com/security/cve/CVE-2014-1550/" source="CVE"/>
		<reference ref_id="CVE-2014-1552" ref_url="https://www.suse.com/security/cve/CVE-2014-1552/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1558" ref_url="https://www.suse.com/security/cve/CVE-2014-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-1561" ref_url="https://www.suse.com/security/cve/CVE-2014-1561/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1580" ref_url="https://www.suse.com/security/cve/CVE-2014-1580/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1582" ref_url="https://www.suse.com/security/cve/CVE-2014-1582/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0798" ref_url="https://www.suse.com/security/cve/CVE-2015-0798/" source="CVE"/>
		<reference ref_id="CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799/" source="CVE"/>
		<reference ref_id="CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802/" source="CVE"/>
		<reference ref_id="CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803/" source="CVE"/>
		<reference ref_id="CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808/" source="CVE"/>
		<reference ref_id="CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810/" source="CVE"/>
		<reference ref_id="CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811/" source="CVE"/>
		<reference ref_id="CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2711" ref_url="https://www.suse.com/security/cve/CVE-2015-2711/" source="CVE"/>
		<reference ref_id="CVE-2015-2712" ref_url="https://www.suse.com/security/cve/CVE-2015-2712/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2715" ref_url="https://www.suse.com/security/cve/CVE-2015-2715/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2717" ref_url="https://www.suse.com/security/cve/CVE-2015-2717/" source="CVE"/>
		<reference ref_id="CVE-2015-2718" ref_url="https://www.suse.com/security/cve/CVE-2015-2718/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2742" ref_url="https://www.suse.com/security/cve/CVE-2015-2742/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4476" ref_url="https://www.suse.com/security/cve/CVE-2015-4476/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4483" ref_url="https://www.suse.com/security/cve/CVE-2015-4483/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4490" ref_url="https://www.suse.com/security/cve/CVE-2015-4490/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4508" ref_url="https://www.suse.com/security/cve/CVE-2015-4508/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1933" ref_url="https://www.suse.com/security/cve/CVE-2016-1933/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1942" ref_url="https://www.suse.com/security/cve/CVE-2016-1942/" source="CVE"/>
		<reference ref_id="CVE-2016-1944" ref_url="https://www.suse.com/security/cve/CVE-2016-1944/" source="CVE"/>
		<reference ref_id="CVE-2016-1947" ref_url="https://www.suse.com/security/cve/CVE-2016-1947/" source="CVE"/>
		<reference ref_id="CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1959" ref_url="https://www.suse.com/security/cve/CVE-2016-1959/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1963" ref_url="https://www.suse.com/security/cve/CVE-2016-1963/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1967" ref_url="https://www.suse.com/security/cve/CVE-2016-1967/" source="CVE"/>
		<reference ref_id="CVE-2016-1968" ref_url="https://www.suse.com/security/cve/CVE-2016-1968/" source="CVE"/>
		<reference ref_id="CVE-2016-1970" ref_url="https://www.suse.com/security/cve/CVE-2016-1970/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1976" ref_url="https://www.suse.com/security/cve/CVE-2016-1976/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809/" source="CVE"/>
		<reference ref_id="CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810/" source="CVE"/>
		<reference ref_id="CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811/" source="CVE"/>
		<reference ref_id="CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816/" source="CVE"/>
		<reference ref_id="CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825/" source="CVE"/>
		<reference ref_id="CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832/" source="CVE"/>
		<reference ref_id="CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5253" ref_url="https://www.suse.com/security/cve/CVE-2016-5253/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255/" source="CVE"/>
		<reference ref_id="CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5260" ref_url="https://www.suse.com/security/cve/CVE-2016-5260/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266/" source="CVE"/>
		<reference ref_id="CVE-2016-5267" ref_url="https://www.suse.com/security/cve/CVE-2016-5267/" source="CVE"/>
		<reference ref_id="CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282/" source="CVE"/>
		<reference ref_id="CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287/" source="CVE"/>
		<reference ref_id="CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293/" source="CVE"/>
		<reference ref_id="CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294/" source="CVE"/>
		<reference ref_id="CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298/" source="CVE"/>
		<reference ref_id="CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061/" source="CVE"/>
		<reference ref_id="CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9070" ref_url="https://www.suse.com/security/cve/CVE-2016-9070/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9080" ref_url="https://www.suse.com/security/cve/CVE-2016-9080/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9894" ref_url="https://www.suse.com/security/cve/CVE-2016-9894/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9896" ref_url="https://www.suse.com/security/cve/CVE-2016-9896/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9903" ref_url="https://www.suse.com/security/cve/CVE-2016-9903/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381/" source="CVE"/>
		<reference ref_id="CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384/" source="CVE"/>
		<reference ref_id="CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387/" source="CVE"/>
		<reference ref_id="CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388/" source="CVE"/>
		<reference ref_id="CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391/" source="CVE"/>
		<reference ref_id="CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392/" source="CVE"/>
		<reference ref_id="CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393/" source="CVE"/>
		<reference ref_id="CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394/" source="CVE"/>
		<reference ref_id="CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5415" ref_url="https://www.suse.com/security/cve/CVE-2017-5415/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5417" ref_url="https://www.suse.com/security/cve/CVE-2017-5417/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5420" ref_url="https://www.suse.com/security/cve/CVE-2017-5420/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5427" ref_url="https://www.suse.com/security/cve/CVE-2017-5427/" source="CVE"/>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5453" ref_url="https://www.suse.com/security/cve/CVE-2017-5453/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5458" ref_url="https://www.suse.com/security/cve/CVE-2017-5458/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5468" ref_url="https://www.suse.com/security/cve/CVE-2017-5468/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7780" ref_url="https://www.suse.com/security/cve/CVE-2017-7780/" source="CVE"/>
		<reference ref_id="CVE-2017-7781" ref_url="https://www.suse.com/security/cve/CVE-2017-7781/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7783" ref_url="https://www.suse.com/security/cve/CVE-2017-7783/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7788" ref_url="https://www.suse.com/security/cve/CVE-2017-7788/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2017-7790" ref_url="https://www.suse.com/security/cve/CVE-2017-7790/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7794" ref_url="https://www.suse.com/security/cve/CVE-2017-7794/" source="CVE"/>
		<reference ref_id="CVE-2017-7796" ref_url="https://www.suse.com/security/cve/CVE-2017-7796/" source="CVE"/>
		<reference ref_id="CVE-2017-7797" ref_url="https://www.suse.com/security/cve/CVE-2017-7797/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7799" ref_url="https://www.suse.com/security/cve/CVE-2017-7799/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7806" ref_url="https://www.suse.com/security/cve/CVE-2017-7806/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7808" ref_url="https://www.suse.com/security/cve/CVE-2017-7808/" source="CVE"/>
		<reference ref_id="CVE-2017-7809" ref_url="https://www.suse.com/security/cve/CVE-2017-7809/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7811" ref_url="https://www.suse.com/security/cve/CVE-2017-7811/" source="CVE"/>
		<reference ref_id="CVE-2017-7812" ref_url="https://www.suse.com/security/cve/CVE-2017-7812/" source="CVE"/>
		<reference ref_id="CVE-2017-7813" ref_url="https://www.suse.com/security/cve/CVE-2017-7813/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7815" ref_url="https://www.suse.com/security/cve/CVE-2017-7815/" source="CVE"/>
		<reference ref_id="CVE-2017-7816" ref_url="https://www.suse.com/security/cve/CVE-2017-7816/" source="CVE"/>
		<reference ref_id="CVE-2017-7817" ref_url="https://www.suse.com/security/cve/CVE-2017-7817/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7820" ref_url="https://www.suse.com/security/cve/CVE-2017-7820/" source="CVE"/>
		<reference ref_id="CVE-2017-7821" ref_url="https://www.suse.com/security/cve/CVE-2017-7821/" source="CVE"/>
		<reference ref_id="CVE-2017-7822" ref_url="https://www.suse.com/security/cve/CVE-2017-7822/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7827" ref_url="https://www.suse.com/security/cve/CVE-2017-7827/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7831" ref_url="https://www.suse.com/security/cve/CVE-2017-7831/" source="CVE"/>
		<reference ref_id="CVE-2017-7832" ref_url="https://www.suse.com/security/cve/CVE-2017-7832/" source="CVE"/>
		<reference ref_id="CVE-2017-7833" ref_url="https://www.suse.com/security/cve/CVE-2017-7833/" source="CVE"/>
		<reference ref_id="CVE-2017-7834" ref_url="https://www.suse.com/security/cve/CVE-2017-7834/" source="CVE"/>
		<reference ref_id="CVE-2017-7835" ref_url="https://www.suse.com/security/cve/CVE-2017-7835/" source="CVE"/>
		<reference ref_id="CVE-2017-7836" ref_url="https://www.suse.com/security/cve/CVE-2017-7836/" source="CVE"/>
		<reference ref_id="CVE-2017-7837" ref_url="https://www.suse.com/security/cve/CVE-2017-7837/" source="CVE"/>
		<reference ref_id="CVE-2017-7838" ref_url="https://www.suse.com/security/cve/CVE-2017-7838/" source="CVE"/>
		<reference ref_id="CVE-2017-7839" ref_url="https://www.suse.com/security/cve/CVE-2017-7839/" source="CVE"/>
		<reference ref_id="CVE-2017-7840" ref_url="https://www.suse.com/security/cve/CVE-2017-7840/" source="CVE"/>
		<reference ref_id="CVE-2017-7842" ref_url="https://www.suse.com/security/cve/CVE-2017-7842/" source="CVE"/>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<reference ref_id="CVE-2017-7844" ref_url="https://www.suse.com/security/cve/CVE-2017-7844/" source="CVE"/>
		<reference ref_id="CVE-2018-12358" ref_url="https://www.suse.com/security/cve/CVE-2018-12358/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12361" ref_url="https://www.suse.com/security/cve/CVE-2018-12361/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12367" ref_url="https://www.suse.com/security/cve/CVE-2018-12367/" source="CVE"/>
		<reference ref_id="CVE-2018-12369" ref_url="https://www.suse.com/security/cve/CVE-2018-12369/" source="CVE"/>
		<reference ref_id="CVE-2018-12370" ref_url="https://www.suse.com/security/cve/CVE-2018-12370/" source="CVE"/>
		<reference ref_id="CVE-2018-12371" ref_url="https://www.suse.com/security/cve/CVE-2018-12371/" source="CVE"/>
		<reference ref_id="CVE-2018-12375" ref_url="https://www.suse.com/security/cve/CVE-2018-12375/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12382" ref_url="https://www.suse.com/security/cve/CVE-2018-12382/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="CVE-2018-12388" ref_url="https://www.suse.com/security/cve/CVE-2018-12388/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12391" ref_url="https://www.suse.com/security/cve/CVE-2018-12391/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="CVE-2018-12398" ref_url="https://www.suse.com/security/cve/CVE-2018-12398/" source="CVE"/>
		<reference ref_id="CVE-2018-12399" ref_url="https://www.suse.com/security/cve/CVE-2018-12399/" source="CVE"/>
		<reference ref_id="CVE-2018-12400" ref_url="https://www.suse.com/security/cve/CVE-2018-12400/" source="CVE"/>
		<reference ref_id="CVE-2018-12401" ref_url="https://www.suse.com/security/cve/CVE-2018-12401/" source="CVE"/>
		<reference ref_id="CVE-2018-12402" ref_url="https://www.suse.com/security/cve/CVE-2018-12402/" source="CVE"/>
		<reference ref_id="CVE-2018-12403" ref_url="https://www.suse.com/security/cve/CVE-2018-12403/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-12406" ref_url="https://www.suse.com/security/cve/CVE-2018-12406/" source="CVE"/>
		<reference ref_id="CVE-2018-12407" ref_url="https://www.suse.com/security/cve/CVE-2018-12407/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18495" ref_url="https://www.suse.com/security/cve/CVE-2018-18495/" source="CVE"/>
		<reference ref_id="CVE-2018-18496" ref_url="https://www.suse.com/security/cve/CVE-2018-18496/" source="CVE"/>
		<reference ref_id="CVE-2018-18497" ref_url="https://www.suse.com/security/cve/CVE-2018-18497/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18502" ref_url="https://www.suse.com/security/cve/CVE-2018-18502/" source="CVE"/>
		<reference ref_id="CVE-2018-18503" ref_url="https://www.suse.com/security/cve/CVE-2018-18503/" source="CVE"/>
		<reference ref_id="CVE-2018-18504" ref_url="https://www.suse.com/security/cve/CVE-2018-18504/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5090" ref_url="https://www.suse.com/security/cve/CVE-2018-5090/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5092" ref_url="https://www.suse.com/security/cve/CVE-2018-5092/" source="CVE"/>
		<reference ref_id="CVE-2018-5093" ref_url="https://www.suse.com/security/cve/CVE-2018-5093/" source="CVE"/>
		<reference ref_id="CVE-2018-5094" ref_url="https://www.suse.com/security/cve/CVE-2018-5094/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5100" ref_url="https://www.suse.com/security/cve/CVE-2018-5100/" source="CVE"/>
		<reference ref_id="CVE-2018-5101" ref_url="https://www.suse.com/security/cve/CVE-2018-5101/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5105" ref_url="https://www.suse.com/security/cve/CVE-2018-5105/" source="CVE"/>
		<reference ref_id="CVE-2018-5106" ref_url="https://www.suse.com/security/cve/CVE-2018-5106/" source="CVE"/>
		<reference ref_id="CVE-2018-5107" ref_url="https://www.suse.com/security/cve/CVE-2018-5107/" source="CVE"/>
		<reference ref_id="CVE-2018-5108" ref_url="https://www.suse.com/security/cve/CVE-2018-5108/" source="CVE"/>
		<reference ref_id="CVE-2018-5109" ref_url="https://www.suse.com/security/cve/CVE-2018-5109/" source="CVE"/>
		<reference ref_id="CVE-2018-5110" ref_url="https://www.suse.com/security/cve/CVE-2018-5110/" source="CVE"/>
		<reference ref_id="CVE-2018-5111" ref_url="https://www.suse.com/security/cve/CVE-2018-5111/" source="CVE"/>
		<reference ref_id="CVE-2018-5112" ref_url="https://www.suse.com/security/cve/CVE-2018-5112/" source="CVE"/>
		<reference ref_id="CVE-2018-5113" ref_url="https://www.suse.com/security/cve/CVE-2018-5113/" source="CVE"/>
		<reference ref_id="CVE-2018-5114" ref_url="https://www.suse.com/security/cve/CVE-2018-5114/" source="CVE"/>
		<reference ref_id="CVE-2018-5115" ref_url="https://www.suse.com/security/cve/CVE-2018-5115/" source="CVE"/>
		<reference ref_id="CVE-2018-5116" ref_url="https://www.suse.com/security/cve/CVE-2018-5116/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5118" ref_url="https://www.suse.com/security/cve/CVE-2018-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-5119" ref_url="https://www.suse.com/security/cve/CVE-2018-5119/" source="CVE"/>
		<reference ref_id="CVE-2018-5121" ref_url="https://www.suse.com/security/cve/CVE-2018-5121/" source="CVE"/>
		<reference ref_id="CVE-2018-5122" ref_url="https://www.suse.com/security/cve/CVE-2018-5122/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5126" ref_url="https://www.suse.com/security/cve/CVE-2018-5126/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5128" ref_url="https://www.suse.com/security/cve/CVE-2018-5128/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5132" ref_url="https://www.suse.com/security/cve/CVE-2018-5132/" source="CVE"/>
		<reference ref_id="CVE-2018-5133" ref_url="https://www.suse.com/security/cve/CVE-2018-5133/" source="CVE"/>
		<reference ref_id="CVE-2018-5134" ref_url="https://www.suse.com/security/cve/CVE-2018-5134/" source="CVE"/>
		<reference ref_id="CVE-2018-5135" ref_url="https://www.suse.com/security/cve/CVE-2018-5135/" source="CVE"/>
		<reference ref_id="CVE-2018-5136" ref_url="https://www.suse.com/security/cve/CVE-2018-5136/" source="CVE"/>
		<reference ref_id="CVE-2018-5137" ref_url="https://www.suse.com/security/cve/CVE-2018-5137/" source="CVE"/>
		<reference ref_id="CVE-2018-5138" ref_url="https://www.suse.com/security/cve/CVE-2018-5138/" source="CVE"/>
		<reference ref_id="CVE-2018-5140" ref_url="https://www.suse.com/security/cve/CVE-2018-5140/" source="CVE"/>
		<reference ref_id="CVE-2018-5141" ref_url="https://www.suse.com/security/cve/CVE-2018-5141/" source="CVE"/>
		<reference ref_id="CVE-2018-5142" ref_url="https://www.suse.com/security/cve/CVE-2018-5142/" source="CVE"/>
		<reference ref_id="CVE-2018-5143" ref_url="https://www.suse.com/security/cve/CVE-2018-5143/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5186" ref_url="https://www.suse.com/security/cve/CVE-2018-5186/" source="CVE"/>
		<reference ref_id="CVE-2018-5187" ref_url="https://www.suse.com/security/cve/CVE-2018-5187/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2018-6156" ref_url="https://www.suse.com/security/cve/CVE-2018-6156/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11695" ref_url="https://www.suse.com/security/cve/CVE-2019-11695/" source="CVE"/>
		<reference ref_id="CVE-2019-11696" ref_url="https://www.suse.com/security/cve/CVE-2019-11696/" source="CVE"/>
		<reference ref_id="CVE-2019-11697" ref_url="https://www.suse.com/security/cve/CVE-2019-11697/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11699" ref_url="https://www.suse.com/security/cve/CVE-2019-11699/" source="CVE"/>
		<reference ref_id="CVE-2019-11700" ref_url="https://www.suse.com/security/cve/CVE-2019-11700/" source="CVE"/>
		<reference ref_id="CVE-2019-11701" ref_url="https://www.suse.com/security/cve/CVE-2019-11701/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11734" ref_url="https://www.suse.com/security/cve/CVE-2019-11734/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11737" ref_url="https://www.suse.com/security/cve/CVE-2019-11737/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11741" ref_url="https://www.suse.com/security/cve/CVE-2019-11741/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11754" ref_url="https://www.suse.com/security/cve/CVE-2019-11754/" source="CVE"/>
		<reference ref_id="CVE-2019-11756" ref_url="https://www.suse.com/security/cve/CVE-2019-11756/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-11765" ref_url="https://www.suse.com/security/cve/CVE-2019-11765/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17000" ref_url="https://www.suse.com/security/cve/CVE-2019-17000/" source="CVE"/>
		<reference ref_id="CVE-2019-17001" ref_url="https://www.suse.com/security/cve/CVE-2019-17001/" source="CVE"/>
		<reference ref_id="CVE-2019-17002" ref_url="https://www.suse.com/security/cve/CVE-2019-17002/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17013" ref_url="https://www.suse.com/security/cve/CVE-2019-17013/" source="CVE"/>
		<reference ref_id="CVE-2019-17014" ref_url="https://www.suse.com/security/cve/CVE-2019-17014/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17020" ref_url="https://www.suse.com/security/cve/CVE-2019-17020/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17023" ref_url="https://www.suse.com/security/cve/CVE-2019-17023/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17025" ref_url="https://www.suse.com/security/cve/CVE-2019-17025/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-5849" ref_url="https://www.suse.com/security/cve/CVE-2019-5849/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9789" ref_url="https://www.suse.com/security/cve/CVE-2019-9789/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9798" ref_url="https://www.suse.com/security/cve/CVE-2019-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-9799" ref_url="https://www.suse.com/security/cve/CVE-2019-9799/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9802" ref_url="https://www.suse.com/security/cve/CVE-2019-9802/" source="CVE"/>
		<reference ref_id="CVE-2019-9803" ref_url="https://www.suse.com/security/cve/CVE-2019-9803/" source="CVE"/>
		<reference ref_id="CVE-2019-9804" ref_url="https://www.suse.com/security/cve/CVE-2019-9804/" source="CVE"/>
		<reference ref_id="CVE-2019-9805" ref_url="https://www.suse.com/security/cve/CVE-2019-9805/" source="CVE"/>
		<reference ref_id="CVE-2019-9806" ref_url="https://www.suse.com/security/cve/CVE-2019-9806/" source="CVE"/>
		<reference ref_id="CVE-2019-9807" ref_url="https://www.suse.com/security/cve/CVE-2019-9807/" source="CVE"/>
		<reference ref_id="CVE-2019-9808" ref_url="https://www.suse.com/security/cve/CVE-2019-9808/" source="CVE"/>
		<reference ref_id="CVE-2019-9809" ref_url="https://www.suse.com/security/cve/CVE-2019-9809/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9814" ref_url="https://www.suse.com/security/cve/CVE-2019-9814/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2019-9821" ref_url="https://www.suse.com/security/cve/CVE-2019-9821/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12390" ref_url="https://www.suse.com/security/cve/CVE-2020-12390/" source="CVE"/>
		<reference ref_id="CVE-2020-12391" ref_url="https://www.suse.com/security/cve/CVE-2020-12391/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12394" ref_url="https://www.suse.com/security/cve/CVE-2020-12394/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12396" ref_url="https://www.suse.com/security/cve/CVE-2020-12396/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12407" ref_url="https://www.suse.com/security/cve/CVE-2020-12407/" source="CVE"/>
		<reference ref_id="CVE-2020-12408" ref_url="https://www.suse.com/security/cve/CVE-2020-12408/" source="CVE"/>
		<reference ref_id="CVE-2020-12409" ref_url="https://www.suse.com/security/cve/CVE-2020-12409/" source="CVE"/>
		<reference ref_id="CVE-2020-12411" ref_url="https://www.suse.com/security/cve/CVE-2020-12411/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-15254" ref_url="https://www.suse.com/security/cve/CVE-2020-15254/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15665" ref_url="https://www.suse.com/security/cve/CVE-2020-15665/" source="CVE"/>
		<reference ref_id="CVE-2020-15666" ref_url="https://www.suse.com/security/cve/CVE-2020-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-15667" ref_url="https://www.suse.com/security/cve/CVE-2020-15667/" source="CVE"/>
		<reference ref_id="CVE-2020-15668" ref_url="https://www.suse.com/security/cve/CVE-2020-15668/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15674" ref_url="https://www.suse.com/security/cve/CVE-2020-15674/" source="CVE"/>
		<reference ref_id="CVE-2020-15675" ref_url="https://www.suse.com/security/cve/CVE-2020-15675/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15680" ref_url="https://www.suse.com/security/cve/CVE-2020-15680/" source="CVE"/>
		<reference ref_id="CVE-2020-15681" ref_url="https://www.suse.com/security/cve/CVE-2020-15681/" source="CVE"/>
		<reference ref_id="CVE-2020-15682" ref_url="https://www.suse.com/security/cve/CVE-2020-15682/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15684" ref_url="https://www.suse.com/security/cve/CVE-2020-15684/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26952" ref_url="https://www.suse.com/security/cve/CVE-2020-26952/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26954" ref_url="https://www.suse.com/security/cve/CVE-2020-26954/" source="CVE"/>
		<reference ref_id="CVE-2020-26955" ref_url="https://www.suse.com/security/cve/CVE-2020-26955/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26957" ref_url="https://www.suse.com/security/cve/CVE-2020-26957/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26962" ref_url="https://www.suse.com/security/cve/CVE-2020-26962/" source="CVE"/>
		<reference ref_id="CVE-2020-26963" ref_url="https://www.suse.com/security/cve/CVE-2020-26963/" source="CVE"/>
		<reference ref_id="CVE-2020-26964" ref_url="https://www.suse.com/security/cve/CVE-2020-26964/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26967" ref_url="https://www.suse.com/security/cve/CVE-2020-26967/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26969" ref_url="https://www.suse.com/security/cve/CVE-2020-26969/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26972" ref_url="https://www.suse.com/security/cve/CVE-2020-26972/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26975" ref_url="https://www.suse.com/security/cve/CVE-2020-26975/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26977" ref_url="https://www.suse.com/security/cve/CVE-2020-26977/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-26979" ref_url="https://www.suse.com/security/cve/CVE-2020-26979/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-35114" ref_url="https://www.suse.com/security/cve/CVE-2020-35114/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6801" ref_url="https://www.suse.com/security/cve/CVE-2020-6801/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6808" ref_url="https://www.suse.com/security/cve/CVE-2020-6808/" source="CVE"/>
		<reference ref_id="CVE-2020-6809" ref_url="https://www.suse.com/security/cve/CVE-2020-6809/" source="CVE"/>
		<reference ref_id="CVE-2020-6810" ref_url="https://www.suse.com/security/cve/CVE-2020-6810/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6815" ref_url="https://www.suse.com/security/cve/CVE-2020-6815/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6823" ref_url="https://www.suse.com/security/cve/CVE-2020-6823/" source="CVE"/>
		<reference ref_id="CVE-2020-6824" ref_url="https://www.suse.com/security/cve/CVE-2020-6824/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6826" ref_url="https://www.suse.com/security/cve/CVE-2020-6826/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23955" ref_url="https://www.suse.com/security/cve/CVE-2021-23955/" source="CVE"/>
		<reference ref_id="CVE-2021-23956" ref_url="https://www.suse.com/security/cve/CVE-2021-23956/" source="CVE"/>
		<reference ref_id="CVE-2021-23957" ref_url="https://www.suse.com/security/cve/CVE-2021-23957/" source="CVE"/>
		<reference ref_id="CVE-2021-23958" ref_url="https://www.suse.com/security/cve/CVE-2021-23958/" source="CVE"/>
		<reference ref_id="CVE-2021-23959" ref_url="https://www.suse.com/security/cve/CVE-2021-23959/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23962" ref_url="https://www.suse.com/security/cve/CVE-2021-23962/" source="CVE"/>
		<reference ref_id="CVE-2021-23963" ref_url="https://www.suse.com/security/cve/CVE-2021-23963/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23965" ref_url="https://www.suse.com/security/cve/CVE-2021-23965/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23970" ref_url="https://www.suse.com/security/cve/CVE-2021-23970/" source="CVE"/>
		<reference ref_id="CVE-2021-23971" ref_url="https://www.suse.com/security/cve/CVE-2021-23971/" source="CVE"/>
		<reference ref_id="CVE-2021-23972" ref_url="https://www.suse.com/security/cve/CVE-2021-23972/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23974" ref_url="https://www.suse.com/security/cve/CVE-2021-23974/" source="CVE"/>
		<reference ref_id="CVE-2021-23975" ref_url="https://www.suse.com/security/cve/CVE-2021-23975/" source="CVE"/>
		<reference ref_id="CVE-2021-23976" ref_url="https://www.suse.com/security/cve/CVE-2021-23976/" source="CVE"/>
		<reference ref_id="CVE-2021-23977" ref_url="https://www.suse.com/security/cve/CVE-2021-23977/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23979" ref_url="https://www.suse.com/security/cve/CVE-2021-23979/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23983" ref_url="https://www.suse.com/security/cve/CVE-2021-23983/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23985" ref_url="https://www.suse.com/security/cve/CVE-2021-23985/" source="CVE"/>
		<reference ref_id="CVE-2021-23986" ref_url="https://www.suse.com/security/cve/CVE-2021-23986/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23988" ref_url="https://www.suse.com/security/cve/CVE-2021-23988/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23996" ref_url="https://www.suse.com/security/cve/CVE-2021-23996/" source="CVE"/>
		<reference ref_id="CVE-2021-23997" ref_url="https://www.suse.com/security/cve/CVE-2021-23997/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24000" ref_url="https://www.suse.com/security/cve/CVE-2021-24000/" source="CVE"/>
		<reference ref_id="CVE-2021-24001" ref_url="https://www.suse.com/security/cve/CVE-2021-24001/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29944" ref_url="https://www.suse.com/security/cve/CVE-2021-29944/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29947" ref_url="https://www.suse.com/security/cve/CVE-2021-29947/" source="CVE"/>
		<reference ref_id="CVE-2021-29952" ref_url="https://www.suse.com/security/cve/CVE-2021-29952/" source="CVE"/>
		<reference ref_id="CVE-2021-29959" ref_url="https://www.suse.com/security/cve/CVE-2021-29959/" source="CVE"/>
		<reference ref_id="CVE-2021-29960" ref_url="https://www.suse.com/security/cve/CVE-2021-29960/" source="CVE"/>
		<reference ref_id="CVE-2021-29961" ref_url="https://www.suse.com/security/cve/CVE-2021-29961/" source="CVE"/>
		<reference ref_id="CVE-2021-29962" ref_url="https://www.suse.com/security/cve/CVE-2021-29962/" source="CVE"/>
		<reference ref_id="CVE-2021-29963" ref_url="https://www.suse.com/security/cve/CVE-2021-29963/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29965" ref_url="https://www.suse.com/security/cve/CVE-2021-29965/" source="CVE"/>
		<reference ref_id="CVE-2021-29966" ref_url="https://www.suse.com/security/cve/CVE-2021-29966/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29971" ref_url="https://www.suse.com/security/cve/CVE-2021-29971/" source="CVE"/>
		<reference ref_id="CVE-2021-29972" ref_url="https://www.suse.com/security/cve/CVE-2021-29972/" source="CVE"/>
		<reference ref_id="CVE-2021-29973" ref_url="https://www.suse.com/security/cve/CVE-2021-29973/" source="CVE"/>
		<reference ref_id="CVE-2021-29974" ref_url="https://www.suse.com/security/cve/CVE-2021-29974/" source="CVE"/>
		<reference ref_id="CVE-2021-29975" ref_url="https://www.suse.com/security/cve/CVE-2021-29975/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-29977" ref_url="https://www.suse.com/security/cve/CVE-2021-29977/" source="CVE"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-29993" ref_url="https://www.suse.com/security/cve/CVE-2021-29993/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38491" ref_url="https://www.suse.com/security/cve/CVE-2021-38491/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<reference ref_id="CVE-2021-38494" ref_url="https://www.suse.com/security/cve/CVE-2021-38494/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38499" ref_url="https://www.suse.com/security/cve/CVE-2021-38499/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43540" ref_url="https://www.suse.com/security/cve/CVE-2021-43540/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43544" ref_url="https://www.suse.com/security/cve/CVE-2021-43544/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="CVE-2022-0511" ref_url="https://www.suse.com/security/cve/CVE-2022-0511/" source="CVE"/>
		<reference ref_id="CVE-2022-0843" ref_url="https://www.suse.com/security/cve/CVE-2022-0843/" source="CVE"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="CVE-2022-1919" ref_url="https://www.suse.com/security/cve/CVE-2022-1919/" source="CVE"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-22736" ref_url="https://www.suse.com/security/cve/CVE-2022-22736/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22749" ref_url="https://www.suse.com/security/cve/CVE-2022-22749/" source="CVE"/>
		<reference ref_id="CVE-2022-22750" ref_url="https://www.suse.com/security/cve/CVE-2022-22750/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="CVE-2022-22752" ref_url="https://www.suse.com/security/cve/CVE-2022-22752/" source="CVE"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22755" ref_url="https://www.suse.com/security/cve/CVE-2022-22755/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22757" ref_url="https://www.suse.com/security/cve/CVE-2022-22757/" source="CVE"/>
		<reference ref_id="CVE-2022-22758" ref_url="https://www.suse.com/security/cve/CVE-2022-22758/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22762" ref_url="https://www.suse.com/security/cve/CVE-2022-22762/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26382" ref_url="https://www.suse.com/security/cve/CVE-2022-26382/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26385" ref_url="https://www.suse.com/security/cve/CVE-2022-26385/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28283" ref_url="https://www.suse.com/security/cve/CVE-2022-28283/" source="CVE"/>
		<reference ref_id="CVE-2022-28284" ref_url="https://www.suse.com/security/cve/CVE-2022-28284/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28287" ref_url="https://www.suse.com/security/cve/CVE-2022-28287/" source="CVE"/>
		<reference ref_id="CVE-2022-28288" ref_url="https://www.suse.com/security/cve/CVE-2022-28288/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29910" ref_url="https://www.suse.com/security/cve/CVE-2022-29910/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29915" ref_url="https://www.suse.com/security/cve/CVE-2022-29915/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="CVE-2022-29918" ref_url="https://www.suse.com/security/cve/CVE-2022-29918/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31743" ref_url="https://www.suse.com/security/cve/CVE-2022-31743/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-31745" ref_url="https://www.suse.com/security/cve/CVE-2022-31745/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="CVE-2022-31748" ref_url="https://www.suse.com/security/cve/CVE-2022-31748/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36315" ref_url="https://www.suse.com/security/cve/CVE-2022-36315/" source="CVE"/>
		<reference ref_id="CVE-2022-36316" ref_url="https://www.suse.com/security/cve/CVE-2022-36316/" source="CVE"/>
		<reference ref_id="CVE-2022-36317" ref_url="https://www.suse.com/security/cve/CVE-2022-36317/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-36320" ref_url="https://www.suse.com/security/cve/CVE-2022-36320/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38474" ref_url="https://www.suse.com/security/cve/CVE-2022-38474/" source="CVE"/>
		<reference ref_id="CVE-2022-38475" ref_url="https://www.suse.com/security/cve/CVE-2022-38475/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40961" ref_url="https://www.suse.com/security/cve/CVE-2022-40961/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42930" ref_url="https://www.suse.com/security/cve/CVE-2022-42930/" source="CVE"/>
		<reference ref_id="CVE-2022-42931" ref_url="https://www.suse.com/security/cve/CVE-2022-42931/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45407" ref_url="https://www.suse.com/security/cve/CVE-2022-45407/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45413" ref_url="https://www.suse.com/security/cve/CVE-2022-45413/" source="CVE"/>
		<reference ref_id="CVE-2022-45415" ref_url="https://www.suse.com/security/cve/CVE-2022-45415/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45417" ref_url="https://www.suse.com/security/cve/CVE-2022-45417/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45419" ref_url="https://www.suse.com/security/cve/CVE-2022-45419/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46873" ref_url="https://www.suse.com/security/cve/CVE-2022-46873/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46879" ref_url="https://www.suse.com/security/cve/CVE-2022-46879/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-23597" ref_url="https://www.suse.com/security/cve/CVE-2023-23597/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23600" ref_url="https://www.suse.com/security/cve/CVE-2023-23600/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23604" ref_url="https://www.suse.com/security/cve/CVE-2023-23604/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<reference ref_id="CVE-2023-23606" ref_url="https://www.suse.com/security/cve/CVE-2023-23606/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25731" ref_url="https://www.suse.com/security/cve/CVE-2023-25731/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25733" ref_url="https://www.suse.com/security/cve/CVE-2023-25733/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25736" ref_url="https://www.suse.com/security/cve/CVE-2023-25736/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25740" ref_url="https://www.suse.com/security/cve/CVE-2023-25740/" source="CVE"/>
		<reference ref_id="CVE-2023-25741" ref_url="https://www.suse.com/security/cve/CVE-2023-25741/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25745" ref_url="https://www.suse.com/security/cve/CVE-2023-25745/" source="CVE"/>
		<reference ref_id="CVE-2023-25748" ref_url="https://www.suse.com/security/cve/CVE-2023-25748/" source="CVE"/>
		<reference ref_id="CVE-2023-25749" ref_url="https://www.suse.com/security/cve/CVE-2023-25749/" source="CVE"/>
		<reference ref_id="CVE-2023-25750" ref_url="https://www.suse.com/security/cve/CVE-2023-25750/" source="CVE"/>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28159" ref_url="https://www.suse.com/security/cve/CVE-2023-28159/" source="CVE"/>
		<reference ref_id="CVE-2023-28160" ref_url="https://www.suse.com/security/cve/CVE-2023-28160/" source="CVE"/>
		<reference ref_id="CVE-2023-28161" ref_url="https://www.suse.com/security/cve/CVE-2023-28161/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<reference ref_id="CVE-2023-28177" ref_url="https://www.suse.com/security/cve/CVE-2023-28177/" source="CVE"/>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29534" ref_url="https://www.suse.com/security/cve/CVE-2023-29534/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29537" ref_url="https://www.suse.com/security/cve/CVE-2023-29537/" source="CVE"/>
		<reference ref_id="CVE-2023-29538" ref_url="https://www.suse.com/security/cve/CVE-2023-29538/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29540" ref_url="https://www.suse.com/security/cve/CVE-2023-29540/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29543" ref_url="https://www.suse.com/security/cve/CVE-2023-29543/" source="CVE"/>
		<reference ref_id="CVE-2023-29544" ref_url="https://www.suse.com/security/cve/CVE-2023-29544/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29546" ref_url="https://www.suse.com/security/cve/CVE-2023-29546/" source="CVE"/>
		<reference ref_id="CVE-2023-29547" ref_url="https://www.suse.com/security/cve/CVE-2023-29547/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29549" ref_url="https://www.suse.com/security/cve/CVE-2023-29549/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<reference ref_id="CVE-2023-29551" ref_url="https://www.suse.com/security/cve/CVE-2023-29551/" source="CVE"/>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32208" ref_url="https://www.suse.com/security/cve/CVE-2023-32208/" source="CVE"/>
		<reference ref_id="CVE-2023-32209" ref_url="https://www.suse.com/security/cve/CVE-2023-32209/" source="CVE"/>
		<reference ref_id="CVE-2023-32210" ref_url="https://www.suse.com/security/cve/CVE-2023-32210/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<reference ref_id="CVE-2023-32216" ref_url="https://www.suse.com/security/cve/CVE-2023-32216/" source="CVE"/>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34415" ref_url="https://www.suse.com/security/cve/CVE-2023-34415/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<reference ref_id="CVE-2023-34417" ref_url="https://www.suse.com/security/cve/CVE-2023-34417/" source="CVE"/>
		<reference ref_id="CVE-2023-3482" ref_url="https://www.suse.com/security/cve/CVE-2023-3482/" source="CVE"/>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37203" ref_url="https://www.suse.com/security/cve/CVE-2023-37203/" source="CVE"/>
		<reference ref_id="CVE-2023-37204" ref_url="https://www.suse.com/security/cve/CVE-2023-37204/" source="CVE"/>
		<reference ref_id="CVE-2023-37205" ref_url="https://www.suse.com/security/cve/CVE-2023-37205/" source="CVE"/>
		<reference ref_id="CVE-2023-37206" ref_url="https://www.suse.com/security/cve/CVE-2023-37206/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37209" ref_url="https://www.suse.com/security/cve/CVE-2023-37209/" source="CVE"/>
		<reference ref_id="CVE-2023-37210" ref_url="https://www.suse.com/security/cve/CVE-2023-37210/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-37212" ref_url="https://www.suse.com/security/cve/CVE-2023-37212/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<reference ref_id="CVE-2023-4058" ref_url="https://www.suse.com/security/cve/CVE-2023-4058/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4579" ref_url="https://www.suse.com/security/cve/CVE-2023-4579/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5170" ref_url="https://www.suse.com/security/cve/CVE-2023-5170/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5172" ref_url="https://www.suse.com/security/cve/CVE-2023-5172/" source="CVE"/>
		<reference ref_id="CVE-2023-5173" ref_url="https://www.suse.com/security/cve/CVE-2023-5173/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5175" ref_url="https://www.suse.com/security/cve/CVE-2023-5175/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5722" ref_url="https://www.suse.com/security/cve/CVE-2023-5722/" source="CVE"/>
		<reference ref_id="CVE-2023-5723" ref_url="https://www.suse.com/security/cve/CVE-2023-5723/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5729" ref_url="https://www.suse.com/security/cve/CVE-2023-5729/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5731" ref_url="https://www.suse.com/security/cve/CVE-2023-5731/" source="CVE"/>
		<reference ref_id="CVE-2023-6135" ref_url="https://www.suse.com/security/cve/CVE-2023-6135/" source="CVE"/>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6210" ref_url="https://www.suse.com/security/cve/CVE-2023-6210/" source="CVE"/>
		<reference ref_id="CVE-2023-6211" ref_url="https://www.suse.com/security/cve/CVE-2023-6211/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="CVE-2023-6213" ref_url="https://www.suse.com/security/cve/CVE-2023-6213/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6866" ref_url="https://www.suse.com/security/cve/CVE-2023-6866/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<reference ref_id="CVE-2023-6868" ref_url="https://www.suse.com/security/cve/CVE-2023-6868/" source="CVE"/>
		<reference ref_id="CVE-2023-6869" ref_url="https://www.suse.com/security/cve/CVE-2023-6869/" source="CVE"/>
		<reference ref_id="CVE-2023-6870" ref_url="https://www.suse.com/security/cve/CVE-2023-6870/" source="CVE"/>
		<reference ref_id="CVE-2023-6871" ref_url="https://www.suse.com/security/cve/CVE-2023-6871/" source="CVE"/>
		<reference ref_id="CVE-2023-6872" ref_url="https://www.suse.com/security/cve/CVE-2023-6872/" source="CVE"/>
		<reference ref_id="CVE-2023-6873" ref_url="https://www.suse.com/security/cve/CVE-2023-6873/" source="CVE"/>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-0744" ref_url="https://www.suse.com/security/cve/CVE-2024-0744/" source="CVE"/>
		<reference ref_id="CVE-2024-0745" ref_url="https://www.suse.com/security/cve/CVE-2024-0745/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0748" ref_url="https://www.suse.com/security/cve/CVE-2024-0748/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0752" ref_url="https://www.suse.com/security/cve/CVE-2024-0752/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0754" ref_url="https://www.suse.com/security/cve/CVE-2024-0754/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="CVE-2024-1554" ref_url="https://www.suse.com/security/cve/CVE-2024-1554/" source="CVE"/>
		<reference ref_id="CVE-2024-1555" ref_url="https://www.suse.com/security/cve/CVE-2024-1555/" source="CVE"/>
		<reference ref_id="CVE-2024-1556" ref_url="https://www.suse.com/security/cve/CVE-2024-1556/" source="CVE"/>
		<reference ref_id="CVE-2024-1557" ref_url="https://www.suse.com/security/cve/CVE-2024-1557/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2606" ref_url="https://www.suse.com/security/cve/CVE-2024-2606/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2613" ref_url="https://www.suse.com/security/cve/CVE-2024-2613/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2615" ref_url="https://www.suse.com/security/cve/CVE-2024-2615/" source="CVE"/>
		<reference ref_id="CVE-2024-29943" ref_url="https://www.suse.com/security/cve/CVE-2024-29943/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3853" ref_url="https://www.suse.com/security/cve/CVE-2024-3853/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3855" ref_url="https://www.suse.com/security/cve/CVE-2024-3855/" source="CVE"/>
		<reference ref_id="CVE-2024-3856" ref_url="https://www.suse.com/security/cve/CVE-2024-3856/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3858" ref_url="https://www.suse.com/security/cve/CVE-2024-3858/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3860" ref_url="https://www.suse.com/security/cve/CVE-2024-3860/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3862" ref_url="https://www.suse.com/security/cve/CVE-2024-3862/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="CVE-2024-3865" ref_url="https://www.suse.com/security/cve/CVE-2024-3865/" source="CVE"/>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4764" ref_url="https://www.suse.com/security/cve/CVE-2024-4764/" source="CVE"/>
		<reference ref_id="CVE-2024-4765" ref_url="https://www.suse.com/security/cve/CVE-2024-4765/" source="CVE"/>
		<reference ref_id="CVE-2024-4766" ref_url="https://www.suse.com/security/cve/CVE-2024-4766/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4771" ref_url="https://www.suse.com/security/cve/CVE-2024-4771/" source="CVE"/>
		<reference ref_id="CVE-2024-4772" ref_url="https://www.suse.com/security/cve/CVE-2024-4772/" source="CVE"/>
		<reference ref_id="CVE-2024-4773" ref_url="https://www.suse.com/security/cve/CVE-2024-4773/" source="CVE"/>
		<reference ref_id="CVE-2024-4774" ref_url="https://www.suse.com/security/cve/CVE-2024-4774/" source="CVE"/>
		<reference ref_id="CVE-2024-4775" ref_url="https://www.suse.com/security/cve/CVE-2024-4775/" source="CVE"/>
		<reference ref_id="CVE-2024-4776" ref_url="https://www.suse.com/security/cve/CVE-2024-4776/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<reference ref_id="CVE-2024-4778" ref_url="https://www.suse.com/security/cve/CVE-2024-4778/" source="CVE"/>
		<reference ref_id="CVE-2024-5687" ref_url="https://www.suse.com/security/cve/CVE-2024-5687/" source="CVE"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5689" ref_url="https://www.suse.com/security/cve/CVE-2024-5689/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5694" ref_url="https://www.suse.com/security/cve/CVE-2024-5694/" source="CVE"/>
		<reference ref_id="CVE-2024-5695" ref_url="https://www.suse.com/security/cve/CVE-2024-5695/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5697" ref_url="https://www.suse.com/security/cve/CVE-2024-5697/" source="CVE"/>
		<reference ref_id="CVE-2024-5698" ref_url="https://www.suse.com/security/cve/CVE-2024-5698/" source="CVE"/>
		<reference ref_id="CVE-2024-5699" ref_url="https://www.suse.com/security/cve/CVE-2024-5699/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5701" ref_url="https://www.suse.com/security/cve/CVE-2024-5701/" source="CVE"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="CVE-2024-6605" ref_url="https://www.suse.com/security/cve/CVE-2024-6605/" source="CVE"/>
		<reference ref_id="CVE-2024-6606" ref_url="https://www.suse.com/security/cve/CVE-2024-6606/" source="CVE"/>
		<reference ref_id="CVE-2024-6607" ref_url="https://www.suse.com/security/cve/CVE-2024-6607/" source="CVE"/>
		<reference ref_id="CVE-2024-6608" ref_url="https://www.suse.com/security/cve/CVE-2024-6608/" source="CVE"/>
		<reference ref_id="CVE-2024-6609" ref_url="https://www.suse.com/security/cve/CVE-2024-6609/" source="CVE"/>
		<reference ref_id="CVE-2024-6610" ref_url="https://www.suse.com/security/cve/CVE-2024-6610/" source="CVE"/>
		<reference ref_id="CVE-2024-6611" ref_url="https://www.suse.com/security/cve/CVE-2024-6611/" source="CVE"/>
		<reference ref_id="CVE-2024-6612" ref_url="https://www.suse.com/security/cve/CVE-2024-6612/" source="CVE"/>
		<reference ref_id="CVE-2024-6613" ref_url="https://www.suse.com/security/cve/CVE-2024-6613/" source="CVE"/>
		<reference ref_id="CVE-2024-6614" ref_url="https://www.suse.com/security/cve/CVE-2024-6614/" source="CVE"/>
		<reference ref_id="CVE-2024-6615" ref_url="https://www.suse.com/security/cve/CVE-2024-6615/" source="CVE"/>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="CVE-2024-7531" ref_url="https://www.suse.com/security/cve/CVE-2024-7531/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0068">CVE-2011-0068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2366">CVE-2011-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2367">CVE-2011-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2369">CVE-2011-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2370">CVE-2011-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2990">CVE-2011-2990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2993">CVE-2011-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0778">CVE-2013-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1671">CVE-2013-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1688">CVE-2013-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1695">CVE-2013-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1696">CVE-2013-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1698">CVE-2013-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1699">CVE-2013-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1704">CVE-2013-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1708">CVE-2013-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1711">CVE-2013-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1721">CVE-2013-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5598">CVE-2013-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1522/">CVE-2014-1522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1522">CVE-2014-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1525/">CVE-2014-1525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1525">CVE-2014-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1526/">CVE-2014-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1526">CVE-2014-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1528/">CVE-2014-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1528">CVE-2014-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1539/">CVE-2014-1539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1539">CVE-2014-1539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1540/">CVE-2014-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1540">CVE-2014-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1542/">CVE-2014-1542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1542">CVE-2014-1542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1543/">CVE-2014-1543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1543">CVE-2014-1543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1549/">CVE-2014-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1549">CVE-2014-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1550/">CVE-2014-1550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1550">CVE-2014-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1552/">CVE-2014-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1552">CVE-2014-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1558/">CVE-2014-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1558">CVE-2014-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1561/">CVE-2014-1561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1561">CVE-2014-1561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1563">CVE-2014-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1564">CVE-2014-1564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1565">CVE-2014-1565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1580/">CVE-2014-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1580">CVE-2014-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1582/">CVE-2014-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1582">CVE-2014-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8642">CVE-2014-8642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8643">CVE-2014-8643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0798/">CVE-2015-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0798">CVE-2015-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0799">CVE-2015-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0800">CVE-2015-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0802">CVE-2015-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0803">CVE-2015-0803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0805">CVE-2015-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0808">CVE-2015-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0810">CVE-2015-0810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0811">CVE-2015-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0812">CVE-2015-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0819">CVE-2015-0819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0820">CVE-2015-0820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0821">CVE-2015-0821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0823">CVE-2015-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0824">CVE-2015-0824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0825">CVE-2015-0825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0826">CVE-2015-0826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0828">CVE-2015-0828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0829">CVE-2015-0829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0830">CVE-2015-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0832">CVE-2015-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0833">CVE-2015-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0834">CVE-2015-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2706">CVE-2015-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2711/">CVE-2015-2711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2711">CVE-2015-2711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2712/">CVE-2015-2712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2712">CVE-2015-2712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2715/">CVE-2015-2715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2715">CVE-2015-2715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2717/">CVE-2015-2717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2717">CVE-2015-2717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2718/">CVE-2015-2718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2718">CVE-2015-2718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2742/">CVE-2015-2742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2742">CVE-2015-2742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4476/">CVE-2015-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4476">CVE-2015-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4477">CVE-2015-4477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4481">CVE-2015-4481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4482">CVE-2015-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4483/">CVE-2015-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4483">CVE-2015-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4490/">CVE-2015-4490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4490">CVE-2015-4490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4502">CVE-2015-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4503">CVE-2015-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4504">CVE-2015-4504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4505">CVE-2015-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4507">CVE-2015-4507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4508/">CVE-2015-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4508">CVE-2015-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4512">CVE-2015-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4515">CVE-2015-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4516">CVE-2015-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4518">CVE-2015-4518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7178">CVE-2015-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7184">CVE-2015-7184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7185">CVE-2015-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7186">CVE-2015-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7187">CVE-2015-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7190">CVE-2015-7190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7191">CVE-2015-7191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7192">CVE-2015-7192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7195">CVE-2015-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7203">CVE-2015-7203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7204">CVE-2015-7204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7207">CVE-2015-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7208">CVE-2015-7208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7211">CVE-2015-7211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7215">CVE-2015-7215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7216">CVE-2015-7216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7218">CVE-2015-7218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7223">CVE-2015-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1933/">CVE-2016-1933 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1933">CVE-2016-1933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1937">CVE-2016-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1942/">CVE-2016-1942 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1942">CVE-2016-1942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1944/">CVE-2016-1944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1944">CVE-2016-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1947/">CVE-2016-1947 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1947">CVE-2016-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1949">CVE-2016-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1955">CVE-2016-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1956">CVE-2016-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1959/">CVE-2016-1959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1959">CVE-2016-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1963/">CVE-2016-1963 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1963">CVE-2016-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1967/">CVE-2016-1967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1967">CVE-2016-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1968/">CVE-2016-1968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1968">CVE-2016-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1970/">CVE-2016-1970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1970">CVE-2016-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1973">CVE-2016-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1976/">CVE-2016-1976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1976">CVE-2016-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2804">CVE-2016-2804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2809">CVE-2016-2809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2810">CVE-2016-2810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2811">CVE-2016-2811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2813">CVE-2016-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2816">CVE-2016-2816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2817">CVE-2016-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2820">CVE-2016-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2825">CVE-2016-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2827">CVE-2016-2827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2829">CVE-2016-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2832">CVE-2016-2832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2833">CVE-2016-2833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5251">CVE-2016-5251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5253/">CVE-2016-5253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5253">CVE-2016-5253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5255">CVE-2016-5255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5256">CVE-2016-5256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5260/">CVE-2016-5260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5260">CVE-2016-5260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5266">CVE-2016-5266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5267/">CVE-2016-5267 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5267">CVE-2016-5267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5268">CVE-2016-5268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5271">CVE-2016-5271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5273">CVE-2016-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5275">CVE-2016-5275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5279">CVE-2016-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5282">CVE-2016-5282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5283">CVE-2016-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5287">CVE-2016-5287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5288">CVE-2016-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5293">CVE-2016-5293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5294">CVE-2016-5294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5295">CVE-2016-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5298">CVE-2016-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5299">CVE-2016-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9061">CVE-2016-9061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9062">CVE-2016-9062 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9065">CVE-2016-9065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9070/">CVE-2016-9070 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9070">CVE-2016-9070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9072">CVE-2016-9072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9078">CVE-2016-9078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9080/">CVE-2016-9080 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9080">CVE-2016-9080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9894/">CVE-2016-9894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9894">CVE-2016-9894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9896/">CVE-2016-9896 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9896">CVE-2016-9896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9903/">CVE-2016-9903 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9903">CVE-2016-9903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5374">CVE-2017-5374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5377">CVE-2017-5377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5379">CVE-2017-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5381">CVE-2017-5381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5382">CVE-2017-5382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5384">CVE-2017-5384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5385">CVE-2017-5385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5387">CVE-2017-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5388">CVE-2017-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5389">CVE-2017-5389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5391">CVE-2017-5391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5392">CVE-2017-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5393">CVE-2017-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5394">CVE-2017-5394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5395">CVE-2017-5395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5399">CVE-2017-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5403">CVE-2017-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5406">CVE-2017-5406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5412">CVE-2017-5412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5413">CVE-2017-5413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5414">CVE-2017-5414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5415/">CVE-2017-5415 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5415">CVE-2017-5415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5416">CVE-2017-5416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5417/">CVE-2017-5417 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5417">CVE-2017-5417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5418">CVE-2017-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5419">CVE-2017-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5420/">CVE-2017-5420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5420">CVE-2017-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5421">CVE-2017-5421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5422">CVE-2017-5422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5426">CVE-2017-5426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5427/">CVE-2017-5427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5427">CVE-2017-5427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5428">CVE-2017-5428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5453/">CVE-2017-5453 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5453">CVE-2017-5453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5458/">CVE-2017-5458 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5458">CVE-2017-5458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5468/">CVE-2017-5468 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5468">CVE-2017-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7780/">CVE-2017-7780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7780">CVE-2017-7780 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7781/">CVE-2017-7781 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7781">CVE-2017-7781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7783/">CVE-2017-7783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7783">CVE-2017-7783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7788/">CVE-2017-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7788">CVE-2017-7788 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7790/">CVE-2017-7790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7790">CVE-2017-7790 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7794/">CVE-2017-7794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7794">CVE-2017-7794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7796/">CVE-2017-7796 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7796">CVE-2017-7796 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7797/">CVE-2017-7797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7797">CVE-2017-7797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7799/">CVE-2017-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7799">CVE-2017-7799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7806/">CVE-2017-7806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7806">CVE-2017-7806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7808/">CVE-2017-7808 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7808">CVE-2017-7808 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7809/">CVE-2017-7809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7809">CVE-2017-7809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7811/">CVE-2017-7811 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7811">CVE-2017-7811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7812/">CVE-2017-7812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7812">CVE-2017-7812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7813/">CVE-2017-7813 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7813">CVE-2017-7813 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7815/">CVE-2017-7815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7815">CVE-2017-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7816/">CVE-2017-7816 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7816">CVE-2017-7816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7817/">CVE-2017-7817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7817">CVE-2017-7817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7820/">CVE-2017-7820 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7820">CVE-2017-7820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7821/">CVE-2017-7821 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7821">CVE-2017-7821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7822/">CVE-2017-7822 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7822">CVE-2017-7822 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7827/">CVE-2017-7827 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7827">CVE-2017-7827 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7831/">CVE-2017-7831 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7831">CVE-2017-7831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7832/">CVE-2017-7832 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7832">CVE-2017-7832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7833/">CVE-2017-7833 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7833">CVE-2017-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7834/">CVE-2017-7834 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7834">CVE-2017-7834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7835/">CVE-2017-7835 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7835">CVE-2017-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7836/">CVE-2017-7836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7836">CVE-2017-7836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7837/">CVE-2017-7837 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7837">CVE-2017-7837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7838/">CVE-2017-7838 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7838">CVE-2017-7838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7839/">CVE-2017-7839 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7839">CVE-2017-7839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7840/">CVE-2017-7840 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7840">CVE-2017-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7842/">CVE-2017-7842 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7842">CVE-2017-7842 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7843">CVE-2017-7843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7844/">CVE-2017-7844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7844">CVE-2017-7844 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12358/">CVE-2018-12358 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12358">CVE-2018-12358 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12361/">CVE-2018-12361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12361">CVE-2018-12361 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12367/">CVE-2018-12367 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12367">CVE-2018-12367 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12369/">CVE-2018-12369 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12369">CVE-2018-12369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12370/">CVE-2018-12370 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12370">CVE-2018-12370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12371/">CVE-2018-12371 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12371">CVE-2018-12371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12375/">CVE-2018-12375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12375">CVE-2018-12375 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12381">CVE-2018-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12382/">CVE-2018-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12382">CVE-2018-12382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12388/">CVE-2018-12388 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12388">CVE-2018-12388 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12391/">CVE-2018-12391 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12391">CVE-2018-12391 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12398/">CVE-2018-12398 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12398">CVE-2018-12398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12399/">CVE-2018-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12399">CVE-2018-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12400/">CVE-2018-12400 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12400">CVE-2018-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12401/">CVE-2018-12401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12401">CVE-2018-12401 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12402/">CVE-2018-12402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12402">CVE-2018-12402 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12403/">CVE-2018-12403 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12403">CVE-2018-12403 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12406/">CVE-2018-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12406">CVE-2018-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12407/">CVE-2018-12407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12407">CVE-2018-12407 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18495/">CVE-2018-18495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18495">CVE-2018-18495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18496/">CVE-2018-18496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18496">CVE-2018-18496 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18497/">CVE-2018-18497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18497">CVE-2018-18497 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18502/">CVE-2018-18502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18502">CVE-2018-18502 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18503/">CVE-2018-18503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18503">CVE-2018-18503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18504/">CVE-2018-18504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18504">CVE-2018-18504 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5090/">CVE-2018-5090 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5090">CVE-2018-5090 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5092/">CVE-2018-5092 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5092">CVE-2018-5092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5093/">CVE-2018-5093 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5093">CVE-2018-5093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5094/">CVE-2018-5094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5094">CVE-2018-5094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5100/">CVE-2018-5100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5100">CVE-2018-5100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5101/">CVE-2018-5101 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5101">CVE-2018-5101 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5105/">CVE-2018-5105 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5105">CVE-2018-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5106/">CVE-2018-5106 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5106">CVE-2018-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5107/">CVE-2018-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5107">CVE-2018-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5108/">CVE-2018-5108 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5108">CVE-2018-5108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5109/">CVE-2018-5109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5109">CVE-2018-5109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5110/">CVE-2018-5110 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5110">CVE-2018-5110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5111/">CVE-2018-5111 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5111">CVE-2018-5111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5112/">CVE-2018-5112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5112">CVE-2018-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5113/">CVE-2018-5113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5113">CVE-2018-5113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5114/">CVE-2018-5114 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5114">CVE-2018-5114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5115/">CVE-2018-5115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5115">CVE-2018-5115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5116/">CVE-2018-5116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5116">CVE-2018-5116 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5118/">CVE-2018-5118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5118">CVE-2018-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5119/">CVE-2018-5119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5119">CVE-2018-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5121/">CVE-2018-5121 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5121">CVE-2018-5121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5122/">CVE-2018-5122 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5122">CVE-2018-5122 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5126/">CVE-2018-5126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5126">CVE-2018-5126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5128/">CVE-2018-5128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5128">CVE-2018-5128 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5132/">CVE-2018-5132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5132">CVE-2018-5132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5133/">CVE-2018-5133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5133">CVE-2018-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5134/">CVE-2018-5134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5134">CVE-2018-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5135/">CVE-2018-5135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5135">CVE-2018-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5136/">CVE-2018-5136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5136">CVE-2018-5136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5137/">CVE-2018-5137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5137">CVE-2018-5137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5138/">CVE-2018-5138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5138">CVE-2018-5138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5140/">CVE-2018-5140 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5140">CVE-2018-5140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5141/">CVE-2018-5141 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5141">CVE-2018-5141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5142/">CVE-2018-5142 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5142">CVE-2018-5142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5143/">CVE-2018-5143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5143">CVE-2018-5143 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5186/">CVE-2018-5186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5186">CVE-2018-5186 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5187/">CVE-2018-5187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5187">CVE-2018-5187 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6156/">CVE-2018-6156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6156">CVE-2018-6156 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11695/">CVE-2019-11695 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11695">CVE-2019-11695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11696/">CVE-2019-11696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11696">CVE-2019-11696 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11697/">CVE-2019-11697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11697">CVE-2019-11697 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11699/">CVE-2019-11699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11699">CVE-2019-11699 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11700/">CVE-2019-11700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11700">CVE-2019-11700 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11701/">CVE-2019-11701 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11701">CVE-2019-11701 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11734/">CVE-2019-11734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11734">CVE-2019-11734 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11737/">CVE-2019-11737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11737">CVE-2019-11737 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11741/">CVE-2019-11741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11741">CVE-2019-11741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11754/">CVE-2019-11754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11754">CVE-2019-11754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11756/">CVE-2019-11756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11756">CVE-2019-11756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11765/">CVE-2019-11765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11765">CVE-2019-11765 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17000/">CVE-2019-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17000">CVE-2019-17000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17001/">CVE-2019-17001 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17001">CVE-2019-17001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17002/">CVE-2019-17002 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17002">CVE-2019-17002 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17013/">CVE-2019-17013 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17013">CVE-2019-17013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17014/">CVE-2019-17014 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17014">CVE-2019-17014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17020/">CVE-2019-17020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17020">CVE-2019-17020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17023/">CVE-2019-17023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17023">CVE-2019-17023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17025/">CVE-2019-17025 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17025">CVE-2019-17025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5849/">CVE-2019-5849 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5849">CVE-2019-5849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9789/">CVE-2019-9789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9789">CVE-2019-9789 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9794">CVE-2019-9794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9798/">CVE-2019-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9798">CVE-2019-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9799/">CVE-2019-9799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9799">CVE-2019-9799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9801">CVE-2019-9801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9802/">CVE-2019-9802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9802">CVE-2019-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9803/">CVE-2019-9803 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9803">CVE-2019-9803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9804/">CVE-2019-9804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9804">CVE-2019-9804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9805/">CVE-2019-9805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9805">CVE-2019-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9806/">CVE-2019-9806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9806">CVE-2019-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9807/">CVE-2019-9807 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9807">CVE-2019-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9808/">CVE-2019-9808 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9808">CVE-2019-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9809/">CVE-2019-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9809">CVE-2019-9809 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9814/">CVE-2019-9814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9814">CVE-2019-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9821/">CVE-2019-9821 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9821">CVE-2019-9821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12390/">CVE-2020-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12390">CVE-2020-12390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12391/">CVE-2020-12391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12391">CVE-2020-12391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12394/">CVE-2020-12394 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12394">CVE-2020-12394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12396/">CVE-2020-12396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12396">CVE-2020-12396 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12407/">CVE-2020-12407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12407">CVE-2020-12407 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12408/">CVE-2020-12408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12408">CVE-2020-12408 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12409/">CVE-2020-12409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12409">CVE-2020-12409 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12411/">CVE-2020-12411 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12411">CVE-2020-12411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15254/">CVE-2020-15254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15254">CVE-2020-15254 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15665/">CVE-2020-15665 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15665">CVE-2020-15665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15666/">CVE-2020-15666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15666">CVE-2020-15666 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15667/">CVE-2020-15667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15667">CVE-2020-15667 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15668/">CVE-2020-15668 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15668">CVE-2020-15668 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15674/">CVE-2020-15674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15674">CVE-2020-15674 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15675/">CVE-2020-15675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15675">CVE-2020-15675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15680/">CVE-2020-15680 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15680">CVE-2020-15680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15681/">CVE-2020-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15681">CVE-2020-15681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15682/">CVE-2020-15682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15682">CVE-2020-15682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15684/">CVE-2020-15684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15684">CVE-2020-15684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26952/">CVE-2020-26952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26952">CVE-2020-26952 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26954/">CVE-2020-26954 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26954">CVE-2020-26954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26955/">CVE-2020-26955 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26955">CVE-2020-26955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26957/">CVE-2020-26957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26957">CVE-2020-26957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26962/">CVE-2020-26962 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26962">CVE-2020-26962 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26963/">CVE-2020-26963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26963">CVE-2020-26963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26964/">CVE-2020-26964 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26964">CVE-2020-26964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26967/">CVE-2020-26967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26967">CVE-2020-26967 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26969/">CVE-2020-26969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26969">CVE-2020-26969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26972/">CVE-2020-26972 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26972">CVE-2020-26972 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26975/">CVE-2020-26975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26975">CVE-2020-26975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26977/">CVE-2020-26977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26977">CVE-2020-26977 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26979/">CVE-2020-26979 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26979">CVE-2020-26979 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35114/">CVE-2020-35114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35114">CVE-2020-35114 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6801/">CVE-2020-6801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6801">CVE-2020-6801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6808/">CVE-2020-6808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6808">CVE-2020-6808 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6809/">CVE-2020-6809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6809">CVE-2020-6809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6810/">CVE-2020-6810 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6810">CVE-2020-6810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6815/">CVE-2020-6815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6815">CVE-2020-6815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6823/">CVE-2020-6823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6823">CVE-2020-6823 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6824/">CVE-2020-6824 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6824">CVE-2020-6824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6826/">CVE-2020-6826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6826">CVE-2020-6826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23955/">CVE-2021-23955 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23955">CVE-2021-23955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23956/">CVE-2021-23956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23956">CVE-2021-23956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23957/">CVE-2021-23957 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23957">CVE-2021-23957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23958/">CVE-2021-23958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23958">CVE-2021-23958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23959/">CVE-2021-23959 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23959">CVE-2021-23959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23962/">CVE-2021-23962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23962">CVE-2021-23962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23963/">CVE-2021-23963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23963">CVE-2021-23963 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23965/">CVE-2021-23965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23965">CVE-2021-23965 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23970/">CVE-2021-23970 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23970">CVE-2021-23970 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23971/">CVE-2021-23971 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23971">CVE-2021-23971 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23972/">CVE-2021-23972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23972">CVE-2021-23972 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23974/">CVE-2021-23974 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23974">CVE-2021-23974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-23975/">CVE-2021-23975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23975">CVE-2021-23975 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-23976/">CVE-2021-23976 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23976">CVE-2021-23976 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23977/">CVE-2021-23977 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23977">CVE-2021-23977 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23979/">CVE-2021-23979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23979">CVE-2021-23979 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23983/">CVE-2021-23983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23983">CVE-2021-23983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23985/">CVE-2021-23985 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23985">CVE-2021-23985 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23986/">CVE-2021-23986 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23986">CVE-2021-23986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23988/">CVE-2021-23988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23988">CVE-2021-23988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23996/">CVE-2021-23996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23996">CVE-2021-23996 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23997/">CVE-2021-23997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23997">CVE-2021-23997 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24000/">CVE-2021-24000 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24000">CVE-2021-24000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-24001/">CVE-2021-24001 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24001">CVE-2021-24001 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29944/">CVE-2021-29944 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29944">CVE-2021-29944 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29947/">CVE-2021-29947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29947">CVE-2021-29947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29952/">CVE-2021-29952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29952">CVE-2021-29952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29959/">CVE-2021-29959 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29959">CVE-2021-29959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29960/">CVE-2021-29960 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29960">CVE-2021-29960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29961/">CVE-2021-29961 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29961">CVE-2021-29961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29962/">CVE-2021-29962 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29962">CVE-2021-29962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29963/">CVE-2021-29963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29963">CVE-2021-29963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29965/">CVE-2021-29965 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29965">CVE-2021-29965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29966/">CVE-2021-29966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29966">CVE-2021-29966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29971/">CVE-2021-29971 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29971">CVE-2021-29971 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29972/">CVE-2021-29972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29972">CVE-2021-29972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29973/">CVE-2021-29973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29973">CVE-2021-29973 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29974/">CVE-2021-29974 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29974">CVE-2021-29974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29975/">CVE-2021-29975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29975">CVE-2021-29975 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29977/">CVE-2021-29977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29977">CVE-2021-29977 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29993/">CVE-2021-29993 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29993">CVE-2021-29993 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38491/">CVE-2021-38491 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38491">CVE-2021-38491 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38494/">CVE-2021-38494 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38494">CVE-2021-38494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38499/">CVE-2021-38499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38499">CVE-2021-38499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43540/">CVE-2021-43540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43540">CVE-2021-43540 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43544/">CVE-2021-43544 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43544">CVE-2021-43544 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0511/">CVE-2022-0511 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0511">CVE-2022-0511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0843/">CVE-2022-0843 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0843">CVE-2022-0843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1919/">CVE-2022-1919 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1919">CVE-2022-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22736/">CVE-2022-22736 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22736">CVE-2022-22736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22749/">CVE-2022-22749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22749">CVE-2022-22749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22750/">CVE-2022-22750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22750">CVE-2022-22750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22752/">CVE-2022-22752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22752">CVE-2022-22752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22755/">CVE-2022-22755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22755">CVE-2022-22755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22757/">CVE-2022-22757 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22757">CVE-2022-22757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22758/">CVE-2022-22758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22758">CVE-2022-22758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22762/">CVE-2022-22762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22762">CVE-2022-22762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26382/">CVE-2022-26382 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26382">CVE-2022-26382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26385/">CVE-2022-26385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26385">CVE-2022-26385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28283/">CVE-2022-28283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28283">CVE-2022-28283 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28284/">CVE-2022-28284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28284">CVE-2022-28284 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-28287/">CVE-2022-28287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28287">CVE-2022-28287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28288/">CVE-2022-28288 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28288">CVE-2022-28288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29910/">CVE-2022-29910 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29910">CVE-2022-29910 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29915/">CVE-2022-29915 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29915">CVE-2022-29915 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29918/">CVE-2022-29918 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29918">CVE-2022-29918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31743/">CVE-2022-31743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31743">CVE-2022-31743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31745/">CVE-2022-31745 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31745">CVE-2022-31745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31748/">CVE-2022-31748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31748">CVE-2022-31748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36315/">CVE-2022-36315 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36315">CVE-2022-36315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36316/">CVE-2022-36316 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36316">CVE-2022-36316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36317/">CVE-2022-36317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36317">CVE-2022-36317 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36320/">CVE-2022-36320 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36320">CVE-2022-36320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38474/">CVE-2022-38474 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38474">CVE-2022-38474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38475/">CVE-2022-38475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38475">CVE-2022-38475 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40961/">CVE-2022-40961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40961">CVE-2022-40961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42930/">CVE-2022-42930 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42930">CVE-2022-42930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42931/">CVE-2022-42931 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42931">CVE-2022-42931 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45407/">CVE-2022-45407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45407">CVE-2022-45407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45413/">CVE-2022-45413 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45413">CVE-2022-45413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45415/">CVE-2022-45415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45415">CVE-2022-45415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45417/">CVE-2022-45417 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45417">CVE-2022-45417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45419/">CVE-2022-45419 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45419">CVE-2022-45419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46873/">CVE-2022-46873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46873">CVE-2022-46873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46879/">CVE-2022-46879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46879">CVE-2022-46879 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23597/">CVE-2023-23597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23597">CVE-2023-23597 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23600/">CVE-2023-23600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23600">CVE-2023-23600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23604/">CVE-2023-23604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23604">CVE-2023-23604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23606/">CVE-2023-23606 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23606">CVE-2023-23606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25731/">CVE-2023-25731 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25731">CVE-2023-25731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25733/">CVE-2023-25733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25733">CVE-2023-25733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25736/">CVE-2023-25736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25736">CVE-2023-25736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25740/">CVE-2023-25740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25740">CVE-2023-25740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25741/">CVE-2023-25741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25741">CVE-2023-25741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25745/">CVE-2023-25745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25745">CVE-2023-25745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25748/">CVE-2023-25748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25748">CVE-2023-25748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25749/">CVE-2023-25749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25749">CVE-2023-25749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25750/">CVE-2023-25750 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25750">CVE-2023-25750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28159/">CVE-2023-28159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28159">CVE-2023-28159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28160/">CVE-2023-28160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28160">CVE-2023-28160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28161/">CVE-2023-28161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28161">CVE-2023-28161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28177/">CVE-2023-28177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28177">CVE-2023-28177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29534/">CVE-2023-29534 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29534">CVE-2023-29534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29537/">CVE-2023-29537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29537">CVE-2023-29537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29538/">CVE-2023-29538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29538">CVE-2023-29538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29540/">CVE-2023-29540 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29540">CVE-2023-29540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29543/">CVE-2023-29543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29543">CVE-2023-29543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29544/">CVE-2023-29544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29544">CVE-2023-29544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29546/">CVE-2023-29546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29546">CVE-2023-29546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29547/">CVE-2023-29547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29547">CVE-2023-29547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29549/">CVE-2023-29549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29549">CVE-2023-29549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29551/">CVE-2023-29551 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29551">CVE-2023-29551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32208/">CVE-2023-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32208">CVE-2023-32208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32209/">CVE-2023-32209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32209">CVE-2023-32209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32210/">CVE-2023-32210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32210">CVE-2023-32210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32216/">CVE-2023-32216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32216">CVE-2023-32216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34415/">CVE-2023-34415 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34415">CVE-2023-34415 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34417/">CVE-2023-34417 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34417">CVE-2023-34417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3482/">CVE-2023-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3482">CVE-2023-3482 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37203/">CVE-2023-37203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37203">CVE-2023-37203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37204/">CVE-2023-37204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37204">CVE-2023-37204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37205/">CVE-2023-37205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37205">CVE-2023-37205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37206/">CVE-2023-37206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37206">CVE-2023-37206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37209/">CVE-2023-37209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37209">CVE-2023-37209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37210/">CVE-2023-37210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37210">CVE-2023-37210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37212/">CVE-2023-37212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37212">CVE-2023-37212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4058/">CVE-2023-4058 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4058">CVE-2023-4058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4579/">CVE-2023-4579 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4579">CVE-2023-4579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5170/">CVE-2023-5170 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5170">CVE-2023-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5172/">CVE-2023-5172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5172">CVE-2023-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5173/">CVE-2023-5173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5173">CVE-2023-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5175/">CVE-2023-5175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5175">CVE-2023-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5722/">CVE-2023-5722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5722">CVE-2023-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5723/">CVE-2023-5723 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5723">CVE-2023-5723 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5729/">CVE-2023-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5729">CVE-2023-5729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5731/">CVE-2023-5731 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5731">CVE-2023-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6135/">CVE-2023-6135 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6135">CVE-2023-6135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6210/">CVE-2023-6210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6210">CVE-2023-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6211/">CVE-2023-6211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6211">CVE-2023-6211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6213/">CVE-2023-6213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6213">CVE-2023-6213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6866/">CVE-2023-6866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6866">CVE-2023-6866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6868/">CVE-2023-6868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6868">CVE-2023-6868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6869/">CVE-2023-6869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6869">CVE-2023-6869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6870/">CVE-2023-6870 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6870">CVE-2023-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6871/">CVE-2023-6871 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6871">CVE-2023-6871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6872/">CVE-2023-6872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6872">CVE-2023-6872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6873/">CVE-2023-6873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6873">CVE-2023-6873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0744/">CVE-2024-0744 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0744">CVE-2024-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0745/">CVE-2024-0745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0745">CVE-2024-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0748/">CVE-2024-0748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0748">CVE-2024-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0752/">CVE-2024-0752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0752">CVE-2024-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0754/">CVE-2024-0754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0754">CVE-2024-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1554/">CVE-2024-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1554">CVE-2024-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1555/">CVE-2024-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1555">CVE-2024-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1556/">CVE-2024-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1556">CVE-2024-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1557/">CVE-2024-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1557">CVE-2024-1557 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2606/">CVE-2024-2606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2606">CVE-2024-2606 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2613/">CVE-2024-2613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2613">CVE-2024-2613 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2615/">CVE-2024-2615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2615">CVE-2024-2615 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29943/">CVE-2024-29943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29943">CVE-2024-29943 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3853/">CVE-2024-3853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3853">CVE-2024-3853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3855/">CVE-2024-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3855">CVE-2024-3855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3856/">CVE-2024-3856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3856">CVE-2024-3856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3858/">CVE-2024-3858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3858">CVE-2024-3858 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3860/">CVE-2024-3860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3860">CVE-2024-3860 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3862/">CVE-2024-3862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3862">CVE-2024-3862 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3865/">CVE-2024-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3865">CVE-2024-3865 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4764/">CVE-2024-4764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4764">CVE-2024-4764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4765/">CVE-2024-4765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4765">CVE-2024-4765 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4766/">CVE-2024-4766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4766">CVE-2024-4766 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4771/">CVE-2024-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4771">CVE-2024-4771 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4772/">CVE-2024-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4772">CVE-2024-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4773/">CVE-2024-4773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4773">CVE-2024-4773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4774/">CVE-2024-4774 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4774">CVE-2024-4774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4775/">CVE-2024-4775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4775">CVE-2024-4775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4776/">CVE-2024-4776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4776">CVE-2024-4776 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4778/">CVE-2024-4778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4778">CVE-2024-4778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5687/">CVE-2024-5687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5687">CVE-2024-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5689/">CVE-2024-5689 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5689">CVE-2024-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5694/">CVE-2024-5694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5694">CVE-2024-5694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5695/">CVE-2024-5695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5695">CVE-2024-5695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5697/">CVE-2024-5697 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5697">CVE-2024-5697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5698/">CVE-2024-5698 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5698">CVE-2024-5698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5699/">CVE-2024-5699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5699">CVE-2024-5699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5701/">CVE-2024-5701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5701">CVE-2024-5701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6605/">CVE-2024-6605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6605">CVE-2024-6605 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6606/">CVE-2024-6606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6607/">CVE-2024-6607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6608/">CVE-2024-6608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6609/">CVE-2024-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6610/">CVE-2024-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6611/">CVE-2024-6611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6612/">CVE-2024-6612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6613/">CVE-2024-6613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6614/">CVE-2024-6614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6615/">CVE-2024-6615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7531/">CVE-2024-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958045" comment="firefox-esr-128.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958046" comment="firefox-esr-branding-upstream-128.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958047" comment="firefox-esr-translations-common-128.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958048" comment="firefox-esr-translations-other-128.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252894" version="1" class="patch">
	<metadata>
		<title>teleport-17.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958049" comment="teleport-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958050" comment="teleport-bash-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958051" comment="teleport-fdpass-teleport-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958052" comment="teleport-tbot-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958053" comment="teleport-tbot-bash-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958054" comment="teleport-tbot-zsh-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958055" comment="teleport-tctl-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958056" comment="teleport-tctl-bash-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958057" comment="teleport-tctl-zsh-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958058" comment="teleport-tsh-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958059" comment="teleport-tsh-bash-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958060" comment="teleport-tsh-zsh-completion-17.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958061" comment="teleport-zsh-completion-17.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252895" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.139-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12381" ref_url="https://www.suse.com/security/cve/CVE-2024-12381/" source="CVE"/>
		<reference ref_id="CVE-2024-12382" ref_url="https://www.suse.com/security/cve/CVE-2024-12382/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.139-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12381/">CVE-2024-12381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12381">CVE-2024-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12382/">CVE-2024-12382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12382">CVE-2024-12382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958062" comment="chromedriver-131.0.6778.139-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958063" comment="chromium-131.0.6778.139-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252896" version="1" class="patch">
	<metadata>
		<title>curl-8.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958064" comment="curl-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958065" comment="curl-fish-completion-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958066" comment="curl-zsh-completion-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958067" comment="libcurl-devel-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958068" comment="libcurl-devel-32bit-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958069" comment="libcurl-devel-doc-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958070" comment="libcurl4-8.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958071" comment="libcurl4-32bit-8.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252897" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.24.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.24.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958072" comment="gstreamer-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958073" comment="gstreamer-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958074" comment="gstreamer-devel-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958075" comment="gstreamer-devel-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958076" comment="gstreamer-lang-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958077" comment="gstreamer-utils-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958078" comment="libgstreamer-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958079" comment="libgstreamer-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958080" comment="typelib-1_0-Gst-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958081" comment="typelib-1_0-Gst-1_0-32bit-1.24.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252898" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.24.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538/" source="CVE"/>
		<reference ref_id="CVE-2024-47542" ref_url="https://www.suse.com/security/cve/CVE-2024-47542/" source="CVE"/>
		<reference ref_id="CVE-2024-47600" ref_url="https://www.suse.com/security/cve/CVE-2024-47600/" source="CVE"/>
		<reference ref_id="CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615/" source="CVE"/>
		<reference ref_id="CVE-2024-47835" ref_url="https://www.suse.com/security/cve/CVE-2024-47835/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.24.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47542/">CVE-2024-47542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47542">CVE-2024-47542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47600/">CVE-2024-47600 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47600">CVE-2024-47600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47835/">CVE-2024-47835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47835">CVE-2024-47835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958082" comment="gstreamer-plugins-base-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958083" comment="gstreamer-plugins-base-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958084" comment="gstreamer-plugins-base-devel-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958085" comment="gstreamer-plugins-base-devel-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958086" comment="gstreamer-plugins-base-lang-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958087" comment="libgstallocators-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958088" comment="libgstallocators-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958089" comment="libgstapp-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958090" comment="libgstapp-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958091" comment="libgstaudio-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958092" comment="libgstaudio-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958093" comment="libgstfft-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958094" comment="libgstfft-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958095" comment="libgstgl-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958096" comment="libgstgl-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958097" comment="libgstpbutils-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958098" comment="libgstpbutils-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958099" comment="libgstriff-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958100" comment="libgstriff-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958101" comment="libgstrtp-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958102" comment="libgstrtp-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958103" comment="libgstrtsp-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958104" comment="libgstrtsp-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958105" comment="libgstsdp-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958106" comment="libgstsdp-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958107" comment="libgsttag-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958108" comment="libgsttag-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958109" comment="libgstvideo-1_0-0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958110" comment="libgstvideo-1_0-0-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958111" comment="typelib-1_0-GstAllocators-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958112" comment="typelib-1_0-GstApp-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958113" comment="typelib-1_0-GstAudio-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958114" comment="typelib-1_0-GstGL-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958115" comment="typelib-1_0-GstGLEGL-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958116" comment="typelib-1_0-GstGLWayland-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958117" comment="typelib-1_0-GstGLX11-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958118" comment="typelib-1_0-GstPbutils-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958119" comment="typelib-1_0-GstRtp-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958120" comment="typelib-1_0-GstRtsp-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958121" comment="typelib-1_0-GstSdp-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958122" comment="typelib-1_0-GstTag-1_0-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958123" comment="typelib-1_0-GstVideo-1_0-1.24.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252899" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.24.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47530" ref_url="https://www.suse.com/security/cve/CVE-2024-47530/" source="CVE"/>
		<reference ref_id="CVE-2024-47537" ref_url="https://www.suse.com/security/cve/CVE-2024-47537/" source="CVE"/>
		<reference ref_id="CVE-2024-47598" ref_url="https://www.suse.com/security/cve/CVE-2024-47598/" source="CVE"/>
		<reference ref_id="CVE-2024-47599" ref_url="https://www.suse.com/security/cve/CVE-2024-47599/" source="CVE"/>
		<reference ref_id="CVE-2024-47601" ref_url="https://www.suse.com/security/cve/CVE-2024-47601/" source="CVE"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<reference ref_id="CVE-2024-47613" ref_url="https://www.suse.com/security/cve/CVE-2024-47613/" source="CVE"/>
		<reference ref_id="CVE-2024-47774" ref_url="https://www.suse.com/security/cve/CVE-2024-47774/" source="CVE"/>
		<reference ref_id="CVE-2024-47775" ref_url="https://www.suse.com/security/cve/CVE-2024-47775/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.24.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47530/">CVE-2024-47530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47530">CVE-2024-47530 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47537/">CVE-2024-47537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47537">CVE-2024-47537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47598/">CVE-2024-47598 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47598">CVE-2024-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47599/">CVE-2024-47599 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47599">CVE-2024-47599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47601/">CVE-2024-47601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47601">CVE-2024-47601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47613/">CVE-2024-47613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47613">CVE-2024-47613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47774/">CVE-2024-47774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47774">CVE-2024-47774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47775/">CVE-2024-47775 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47775">CVE-2024-47775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958124" comment="gstreamer-plugins-good-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958125" comment="gstreamer-plugins-good-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958126" comment="gstreamer-plugins-good-extra-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958127" comment="gstreamer-plugins-good-extra-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958128" comment="gstreamer-plugins-good-gtk-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958129" comment="gstreamer-plugins-good-jack-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958130" comment="gstreamer-plugins-good-jack-32bit-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958131" comment="gstreamer-plugins-good-lang-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958132" comment="gstreamer-plugins-good-qtqml-1.24.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958133" comment="gstreamer-plugins-good-qtqml6-1.24.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252900" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.19.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0996" ref_url="https://www.suse.com/security/cve/CVE-2023-0996/" source="CVE"/>
		<reference ref_id="CVE-2023-29659" ref_url="https://www.suse.com/security/cve/CVE-2023-29659/" source="CVE"/>
		<reference ref_id="CVE-2024-41311" ref_url="https://www.suse.com/security/cve/CVE-2024-41311/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.19.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0996/">CVE-2023-0996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0996">CVE-2023-0996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29659/">CVE-2023-29659 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29659">CVE-2023-29659 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41311/">CVE-2024-41311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41311">CVE-2024-41311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958134" comment="gdk-pixbuf-loader-libheif-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958135" comment="libheif-aom-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958136" comment="libheif-dav1d-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958137" comment="libheif-devel-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958138" comment="libheif-ffmpeg-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958139" comment="libheif-jpeg-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958140" comment="libheif-openjpeg-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958141" comment="libheif-rav1e-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958142" comment="libheif-svtenc-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958143" comment="libheif1-1.19.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958144" comment="libheif1-32bit-1.19.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252901" version="1" class="patch">
	<metadata>
		<title>liboqs-devel-0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54137" ref_url="https://www.suse.com/security/cve/CVE-2024-54137/" source="CVE"/>
		<description>
These are all security issues fixed in the liboqs-devel-0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-54137/">CVE-2024-54137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54137">CVE-2024-54137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958145" comment="liboqs-devel-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958146" comment="liboqs-devel-32bit-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958147" comment="liboqs7-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958148" comment="liboqs7-32bit-0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252902" version="1" class="patch">
	<metadata>
		<title>python312-3.12.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958149" comment="python312-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958150" comment="python312-32bit-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958151" comment="python312-curses-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958152" comment="python312-dbm-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958153" comment="python312-idle-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958154" comment="python312-tk-3.12.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958155" comment="python312-x86-64-v3-3.12.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252903" version="1" class="patch">
	<metadata>
		<title>socat-1.8.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.8.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958156" comment="socat-1.8.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958157" comment="socat-extra-1.8.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252904" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-133.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<reference ref_id="CVE-2024-11700" ref_url="https://www.suse.com/security/cve/CVE-2024-11700/" source="CVE"/>
		<reference ref_id="CVE-2024-11701" ref_url="https://www.suse.com/security/cve/CVE-2024-11701/" source="CVE"/>
		<reference ref_id="CVE-2024-11702" ref_url="https://www.suse.com/security/cve/CVE-2024-11702/" source="CVE"/>
		<reference ref_id="CVE-2024-11703" ref_url="https://www.suse.com/security/cve/CVE-2024-11703/" source="CVE"/>
		<reference ref_id="CVE-2024-11704" ref_url="https://www.suse.com/security/cve/CVE-2024-11704/" source="CVE"/>
		<reference ref_id="CVE-2024-11705" ref_url="https://www.suse.com/security/cve/CVE-2024-11705/" source="CVE"/>
		<reference ref_id="CVE-2024-11706" ref_url="https://www.suse.com/security/cve/CVE-2024-11706/" source="CVE"/>
		<reference ref_id="CVE-2024-11708" ref_url="https://www.suse.com/security/cve/CVE-2024-11708/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-133.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-11700/">CVE-2024-11700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11700">CVE-2024-11700 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11701/">CVE-2024-11701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11701">CVE-2024-11701 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11702/">CVE-2024-11702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11702">CVE-2024-11702 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11703/">CVE-2024-11703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11703">CVE-2024-11703 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11704/">CVE-2024-11704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11704">CVE-2024-11704 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11705/">CVE-2024-11705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11705">CVE-2024-11705 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11706/">CVE-2024-11706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11706">CVE-2024-11706 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11708/">CVE-2024-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11708">CVE-2024-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958238" comment="MozillaFirefox-133.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958239" comment="MozillaFirefox-branding-upstream-133.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958240" comment="MozillaFirefox-devel-133.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958241" comment="MozillaFirefox-translations-common-133.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958242" comment="MozillaFirefox-translations-other-133.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252905" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50336" ref_url="https://www.suse.com/security/cve/CVE-2024-50336/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50336/">CVE-2024-50336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50336">CVE-2024-50336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958243" comment="MozillaThunderbird-128.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958244" comment="MozillaThunderbird-openpgp-librnp-128.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958245" comment="MozillaThunderbird-translations-common-128.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958246" comment="MozillaThunderbird-translations-other-128.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252906" version="1" class="patch">
	<metadata>
		<title>cloudflared-2024.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the cloudflared-2024.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958247" comment="cloudflared-2024.12.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252907" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.24.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47539" ref_url="https://www.suse.com/security/cve/CVE-2024-47539/" source="CVE"/>
		<reference ref_id="CVE-2024-47543" ref_url="https://www.suse.com/security/cve/CVE-2024-47543/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.24.10-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47539/">CVE-2024-47539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47539">CVE-2024-47539 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47543/">CVE-2024-47543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47543">CVE-2024-47543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958248" comment="gstreamer-plugins-good-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958249" comment="gstreamer-plugins-good-32bit-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958250" comment="gstreamer-plugins-good-extra-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958251" comment="gstreamer-plugins-good-extra-32bit-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958252" comment="gstreamer-plugins-good-gtk-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958253" comment="gstreamer-plugins-good-jack-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958254" comment="gstreamer-plugins-good-jack-32bit-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958255" comment="gstreamer-plugins-good-lang-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958256" comment="gstreamer-plugins-good-qtqml-1.24.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958257" comment="gstreamer-plugins-good-qtqml6-1.24.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252908" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.15.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.15.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958258" comment="libmozjs-115-0-115.15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958259" comment="mozjs115-115.15.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958260" comment="mozjs115-devel-115.15.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252909" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.5.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.5.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958261" comment="libmozjs-128-0-128.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958262" comment="mozjs128-128.5.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958263" comment="mozjs128-devel-128.5.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252910" version="1" class="patch">
	<metadata>
		<title>libmozjs-78-0-78.15.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-78-0-78.15.0-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958264" comment="libmozjs-78-0-78.15.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958265" comment="mozjs78-78.15.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958266" comment="mozjs78-devel-78.15.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252911" version="1" class="patch">
	<metadata>
		<title>traefik-3.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958267" comment="traefik-3.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252912" version="1" class="patch">
	<metadata>
		<title>emacs-29.4-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-29.4-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958748" comment="emacs-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958749" comment="emacs-el-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958750" comment="emacs-eln-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958751" comment="emacs-games-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958752" comment="emacs-info-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958753" comment="emacs-nox-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958754" comment="emacs-x11-29.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958755" comment="etags-29.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252913" version="1" class="patch">
	<metadata>
		<title>git-bug-0.8.0+git.1733745604.d499b6e-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the git-bug-0.8.0+git.1733745604.d499b6e-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958756" comment="git-bug-0.8.0+git.1733745604.d499b6e-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958757" comment="git-bug-bash-completion-0.8.0+git.1733745604.d499b6e-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958758" comment="git-bug-fish-completion-0.8.0+git.1733745604.d499b6e-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958759" comment="git-bug-zsh-completion-0.8.0+git.1733745604.d499b6e-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252914" version="1" class="patch">
	<metadata>
		<title>helm-3.16.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.16.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958760" comment="helm-3.16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958761" comment="helm-bash-completion-3.16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958762" comment="helm-fish-completion-3.16.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958763" comment="helm-zsh-completion-3.16.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252915" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.15.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="CVE-2024-11498" ref_url="https://www.suse.com/security/cve/CVE-2024-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.15.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11498/">CVE-2024-11498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11498">CVE-2024-11498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958764" comment="libmozjs-115-0-115.15.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958765" comment="mozjs115-115.15.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958766" comment="mozjs115-devel-115.15.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252916" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958767" comment="traefik2-2.11.16-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252917" version="1" class="patch">
	<metadata>
		<title>clamav-1.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-20505" ref_url="https://www.suse.com/security/cve/CVE-2024-20505/" source="CVE"/>
		<reference ref_id="CVE-2024-20506" ref_url="https://www.suse.com/security/cve/CVE-2024-20506/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20505/">CVE-2024-20505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20505">CVE-2024-20505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20506/">CVE-2024-20506 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20506">CVE-2024-20506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958768" comment="clamav-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958769" comment="clamav-devel-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958770" comment="clamav-docs-html-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958771" comment="clamav-milter-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958772" comment="libclamav12-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958773" comment="libclammspack0-1.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958774" comment="libfreshclam3-1.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252918" version="1" class="patch">
	<metadata>
		<title>docker-27.4.1_ce-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-27.4.1_ce-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958775" comment="docker-27.4.1_ce-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958776" comment="docker-bash-completion-27.4.1_ce-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958777" comment="docker-buildx-0.19.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958778" comment="docker-fish-completion-27.4.1_ce-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958779" comment="docker-rootless-extras-27.4.1_ce-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958780" comment="docker-zsh-completion-27.4.1_ce-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252919" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2365" ref_url="https://www.suse.com/security/cve/CVE-2024-2365/" source="CVE"/>
		<reference ref_id="CVE-2024-23650" ref_url="https://www.suse.com/security/cve/CVE-2024-23650/" source="CVE"/>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2365/">CVE-2024-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2365">CVE-2024-2365 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23650/">CVE-2024-23650 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23650">CVE-2024-23650 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958781" comment="docker-stable-24.0.9_ce-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958782" comment="docker-stable-bash-completion-24.0.9_ce-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958783" comment="docker-stable-buildx-0.19.3-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958784" comment="docker-stable-fish-completion-24.0.9_ce-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958785" comment="docker-stable-rootless-extras-24.0.9_ce-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958786" comment="docker-stable-zsh-completion-24.0.9_ce-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252920" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2020-8912" ref_url="https://www.suse.com/security/cve/CVE-2020-8912/" source="CVE"/>
		<reference ref_id="CVE-2022-31668" ref_url="https://www.suse.com/security/cve/CVE-2022-31668/" source="CVE"/>
		<reference ref_id="CVE-2023-26248" ref_url="https://www.suse.com/security/cve/CVE-2023-26248/" source="CVE"/>
		<reference ref_id="CVE-2023-3676" ref_url="https://www.suse.com/security/cve/CVE-2023-3676/" source="CVE"/>
		<reference ref_id="CVE-2023-3955" ref_url="https://www.suse.com/security/cve/CVE-2023-3955/" source="CVE"/>
		<reference ref_id="CVE-2024-12401" ref_url="https://www.suse.com/security/cve/CVE-2024-12401/" source="CVE"/>
		<reference ref_id="CVE-2024-37032" ref_url="https://www.suse.com/security/cve/CVE-2024-37032/" source="CVE"/>
		<reference ref_id="CVE-2024-44337" ref_url="https://www.suse.com/security/cve/CVE-2024-44337/" source="CVE"/>
		<reference ref_id="CVE-2024-45039" ref_url="https://www.suse.com/security/cve/CVE-2024-45039/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45436" ref_url="https://www.suse.com/security/cve/CVE-2024-45436/" source="CVE"/>
		<reference ref_id="CVE-2024-46455" ref_url="https://www.suse.com/security/cve/CVE-2024-46455/" source="CVE"/>
		<reference ref_id="CVE-2024-46528" ref_url="https://www.suse.com/security/cve/CVE-2024-46528/" source="CVE"/>
		<reference ref_id="CVE-2024-53257" ref_url="https://www.suse.com/security/cve/CVE-2024-53257/" source="CVE"/>
		<reference ref_id="CVE-2024-53859" ref_url="https://www.suse.com/security/cve/CVE-2024-53859/" source="CVE"/>
		<reference ref_id="CVE-2024-55601" ref_url="https://www.suse.com/security/cve/CVE-2024-55601/" source="CVE"/>
		<reference ref_id="CVE-2024-55657" ref_url="https://www.suse.com/security/cve/CVE-2024-55657/" source="CVE"/>
		<reference ref_id="CVE-2024-55658" ref_url="https://www.suse.com/security/cve/CVE-2024-55658/" source="CVE"/>
		<reference ref_id="CVE-2024-55659" ref_url="https://www.suse.com/security/cve/CVE-2024-55659/" source="CVE"/>
		<reference ref_id="CVE-2024-55660" ref_url="https://www.suse.com/security/cve/CVE-2024-55660/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241213T205935-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8912/">CVE-2020-8912 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8912">CVE-2020-8912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31668/">CVE-2022-31668 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31668">CVE-2022-31668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26248/">CVE-2023-26248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26248">CVE-2023-26248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3676/">CVE-2023-3676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3676">CVE-2023-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3955/">CVE-2023-3955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3955">CVE-2023-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12401/">CVE-2024-12401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12401">CVE-2024-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37032/">CVE-2024-37032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37032">CVE-2024-37032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44337/">CVE-2024-44337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44337">CVE-2024-44337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45039/">CVE-2024-45039 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45039">CVE-2024-45039 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45436/">CVE-2024-45436 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45436">CVE-2024-45436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46455/">CVE-2024-46455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46455">CVE-2024-46455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46528/">CVE-2024-46528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46528">CVE-2024-46528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53257/">CVE-2024-53257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53257">CVE-2024-53257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53859/">CVE-2024-53859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53859">CVE-2024-53859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55601/">CVE-2024-55601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55601">CVE-2024-55601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55657/">CVE-2024-55657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55657">CVE-2024-55657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55658/">CVE-2024-55658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55658">CVE-2024-55658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55659/">CVE-2024-55659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55659">CVE-2024-55659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55660/">CVE-2024-55660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55660">CVE-2024-55660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958787" comment="govulncheck-vulndb-0.0.20241213T205935-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252921" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.5.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="CVE-2024-11498" ref_url="https://www.suse.com/security/cve/CVE-2024-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.5.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11498/">CVE-2024-11498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11498">CVE-2024-11498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958788" comment="libmozjs-128-0-128.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958789" comment="mozjs128-128.5.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958790" comment="mozjs128-devel-128.5.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252922" version="1" class="patch">
	<metadata>
		<title>python310-xhtml2pdf-0.2.16-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25885" ref_url="https://www.suse.com/security/cve/CVE-2024-25885/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-xhtml2pdf-0.2.16-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25885/">CVE-2024-25885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25885">CVE-2024-25885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958791" comment="python310-xhtml2pdf-0.2.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958792" comment="python311-xhtml2pdf-0.2.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958793" comment="python312-xhtml2pdf-0.2.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958794" comment="python313-xhtml2pdf-0.2.16-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252923" version="1" class="patch">
	<metadata>
		<title>tailscale-1.78.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the tailscale-1.78.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958795" comment="tailscale-1.78.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958796" comment="tailscale-bash-completion-1.78.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958797" comment="tailscale-fish-completion-1.78.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958798" comment="tailscale-zsh-completion-1.78.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252924" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241218T202206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12289" ref_url="https://www.suse.com/security/cve/CVE-2024-12289/" source="CVE"/>
		<reference ref_id="CVE-2024-28053" ref_url="https://www.suse.com/security/cve/CVE-2024-28053/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2024-48872" ref_url="https://www.suse.com/security/cve/CVE-2024-48872/" source="CVE"/>
		<reference ref_id="CVE-2024-54083" ref_url="https://www.suse.com/security/cve/CVE-2024-54083/" source="CVE"/>
		<reference ref_id="CVE-2024-54682" ref_url="https://www.suse.com/security/cve/CVE-2024-54682/" source="CVE"/>
		<reference ref_id="CVE-2024-55885" ref_url="https://www.suse.com/security/cve/CVE-2024-55885/" source="CVE"/>
		<reference ref_id="CVE-2024-55949" ref_url="https://www.suse.com/security/cve/CVE-2024-55949/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241218T202206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12289/">CVE-2024-12289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12289">CVE-2024-12289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28053/">CVE-2024-28053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28053">CVE-2024-28053 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48872/">CVE-2024-48872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48872">CVE-2024-48872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54083/">CVE-2024-54083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54083">CVE-2024-54083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54682/">CVE-2024-54682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54682">CVE-2024-54682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55885/">CVE-2024-55885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55885">CVE-2024-55885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55949/">CVE-2024-55949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55949">CVE-2024-55949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958799" comment="govulncheck-vulndb-0.0.20241218T202206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252925" version="1" class="patch">
	<metadata>
		<title>logcli-3.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the logcli-3.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958800" comment="logcli-3.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958801" comment="loki-3.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958802" comment="lokitool-3.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958803" comment="promtail-3.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252926" version="1" class="patch">
	<metadata>
		<title>tuned-2.24.1.0+git.90c24ee-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52336" ref_url="https://www.suse.com/security/cve/CVE-2024-52336/" source="CVE"/>
		<reference ref_id="CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337/" source="CVE"/>
		<description>
These are all security issues fixed in the tuned-2.24.1.0+git.90c24ee-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52336/">CVE-2024-52336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52336">CVE-2024-52336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958804" comment="tuned-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958805" comment="tuned-gtk-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958806" comment="tuned-ppd-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958807" comment="tuned-profiles-atomic-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958808" comment="tuned-profiles-nfv-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958809" comment="tuned-profiles-openshift-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958810" comment="tuned-profiles-oracle-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958811" comment="tuned-profiles-postgresql-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958812" comment="tuned-profiles-realtime-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958813" comment="tuned-profiles-sap-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958814" comment="tuned-profiles-sap-hana-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958815" comment="tuned-profiles-spectrumscale-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958816" comment="tuned-utils-2.24.1.0+git.90c24ee-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958817" comment="tuned-utils-systemtap-2.24.1.0+git.90c24ee-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252927" version="1" class="patch">
	<metadata>
		<title>teleport-17.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958818" comment="teleport-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958819" comment="teleport-bash-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958820" comment="teleport-fdpass-teleport-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958821" comment="teleport-tbot-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958822" comment="teleport-tbot-bash-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958823" comment="teleport-tbot-zsh-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958824" comment="teleport-tctl-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958825" comment="teleport-tctl-bash-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958826" comment="teleport-tctl-zsh-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958827" comment="teleport-tsh-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958828" comment="teleport-tsh-bash-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958829" comment="teleport-tsh-zsh-completion-17.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958830" comment="teleport-zsh-completion-17.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252928" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.204-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12692" ref_url="https://www.suse.com/security/cve/CVE-2024-12692/" source="CVE"/>
		<reference ref_id="CVE-2024-12693" ref_url="https://www.suse.com/security/cve/CVE-2024-12693/" source="CVE"/>
		<reference ref_id="CVE-2024-12694" ref_url="https://www.suse.com/security/cve/CVE-2024-12694/" source="CVE"/>
		<reference ref_id="CVE-2024-12695" ref_url="https://www.suse.com/security/cve/CVE-2024-12695/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.204-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-21"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12692/">CVE-2024-12692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12692">CVE-2024-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12693/">CVE-2024-12693 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12693">CVE-2024-12693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12694/">CVE-2024-12694 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12694">CVE-2024-12694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12695/">CVE-2024-12695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12695">CVE-2024-12695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958831" comment="chromedriver-131.0.6778.204-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958832" comment="chromium-131.0.6778.204-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252929" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20241220T214820-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12678" ref_url="https://www.suse.com/security/cve/CVE-2024-12678/" source="CVE"/>
		<reference ref_id="CVE-2024-25131" ref_url="https://www.suse.com/security/cve/CVE-2024-25131/" source="CVE"/>
		<reference ref_id="CVE-2024-43803" ref_url="https://www.suse.com/security/cve/CVE-2024-43803/" source="CVE"/>
		<reference ref_id="CVE-2024-9779" ref_url="https://www.suse.com/security/cve/CVE-2024-9779/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20241220T214820-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-22"/>
	<updated date="2024-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12678/">CVE-2024-12678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12678">CVE-2024-12678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25131/">CVE-2024-25131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25131">CVE-2024-25131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43803/">CVE-2024-43803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43803">CVE-2024-43803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9779/">CVE-2024-9779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9779">CVE-2024-9779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958833" comment="govulncheck-vulndb-0.0.20241220T214820-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252930" version="1" class="patch">
	<metadata>
		<title>libparaview5_12-5.12.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
These are all security issues fixed in the libparaview5_12-5.12.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-22"/>
	<updated date="2024-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958834" comment="libparaview5_12-5.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958835" comment="paraview-5.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958836" comment="paraview-devel-5.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958837" comment="paraview-devel-static-5.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958838" comment="paraview-plugins-5.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958839" comment="python3-paraview-5.12.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252931" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.4.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48423" ref_url="https://www.suse.com/security/cve/CVE-2024-48423/" source="CVE"/>
		<reference ref_id="CVE-2024-48424" ref_url="https://www.suse.com/security/cve/CVE-2024-48424/" source="CVE"/>
		<reference ref_id="CVE-2024-48425" ref_url="https://www.suse.com/security/cve/CVE-2024-48425/" source="CVE"/>
		<reference ref_id="CVE-2024-53425" ref_url="https://www.suse.com/security/cve/CVE-2024-53425/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.4.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-29"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-48423/">CVE-2024-48423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48423">CVE-2024-48423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-48424/">CVE-2024-48424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48424">CVE-2024-48424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-48425/">CVE-2024-48425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48425">CVE-2024-48425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53425/">CVE-2024-53425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53425">CVE-2024-53425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958948" comment="assimp-devel-5.4.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958949" comment="libassimp5-5.4.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252932" version="1" class="patch">
	<metadata>
		<title>libQt6Pdf6-6.8.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40896" ref_url="https://www.suse.com/security/cve/CVE-2024-40896/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Pdf6-6.8.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-29"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40896/">CVE-2024-40896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40896">CVE-2024-40896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958950" comment="libQt6Pdf6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958951" comment="libQt6PdfQuick6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958952" comment="libQt6PdfWidgets6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958953" comment="libQt6WebEngineCore6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958954" comment="libQt6WebEngineQuick6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958955" comment="libQt6WebEngineWidgets6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958956" comment="qt6-pdf-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958957" comment="qt6-pdf-imports-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958958" comment="qt6-pdf-private-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958959" comment="qt6-pdfquick-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958960" comment="qt6-pdfquick-private-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958961" comment="qt6-pdfwidgets-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958962" comment="qt6-pdfwidgets-private-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958963" comment="qt6-webengine-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958964" comment="qt6-webengine-examples-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958965" comment="qt6-webengine-imports-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958966" comment="qt6-webenginecore-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958967" comment="qt6-webenginecore-private-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958968" comment="qt6-webenginequick-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958969" comment="qt6-webenginequick-private-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958970" comment="qt6-webenginewidgets-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958971" comment="qt6-webenginewidgets-private-devel-6.8.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252933" version="1" class="patch">
	<metadata>
		<title>sops-3.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the sops-3.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-01"/>
	<updated date="2025-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959048" comment="sops-3.9.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252934" version="1" class="patch">
	<metadata>
		<title>velero-1.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the velero-1.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-01"/>
	<updated date="2025-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959049" comment="velero-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959050" comment="velero-bash-completion-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959051" comment="velero-fish-completion-1.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959052" comment="velero-zsh-completion-1.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252935" version="1" class="patch">
	<metadata>
		<title>harfbuzz-devel-10.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56732" ref_url="https://www.suse.com/security/cve/CVE-2024-56732/" source="CVE"/>
		<description>
These are all security issues fixed in the harfbuzz-devel-10.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56732/">CVE-2024-56732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56732">CVE-2024-56732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959090" comment="harfbuzz-devel-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959091" comment="harfbuzz-tools-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959092" comment="libharfbuzz-cairo0-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959093" comment="libharfbuzz-cairo0-32bit-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959094" comment="libharfbuzz-gobject0-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959095" comment="libharfbuzz-gobject0-32bit-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959096" comment="libharfbuzz-icu0-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959097" comment="libharfbuzz-icu0-32bit-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959098" comment="libharfbuzz-subset0-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959099" comment="libharfbuzz-subset0-32bit-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959100" comment="libharfbuzz0-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959101" comment="libharfbuzz0-32bit-10.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959102" comment="typelib-1_0-HarfBuzz-0_0-10.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252936" version="1" class="patch">
	<metadata>
		<title>corepack22-22.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-03"/>
	<updated date="2025-01-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959103" comment="corepack22-22.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959104" comment="nodejs22-22.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959105" comment="nodejs22-devel-22.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959106" comment="nodejs22-docs-22.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959107" comment="npm22-22.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252937" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp1-24.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56378" ref_url="https://www.suse.com/security/cve/CVE-2024-56378/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp1-24.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-03"/>
	<updated date="2025-01-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56378/">CVE-2024-56378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56378">CVE-2024-56378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959108" comment="libpoppler-cpp1-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959109" comment="libpoppler-cpp1-32bit-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959110" comment="libpoppler-devel-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959111" comment="libpoppler-glib-devel-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959112" comment="libpoppler-glib8-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959113" comment="libpoppler-glib8-32bit-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959114" comment="libpoppler144-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959115" comment="libpoppler144-32bit-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959116" comment="poppler-tools-24.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959117" comment="typelib-1_0-Poppler-0_18-24.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252938" version="1" class="patch">
	<metadata>
		<title>rizin-0.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1207" ref_url="https://www.suse.com/security/cve/CVE-2022-1207/" source="CVE"/>
		<description>
These are all security issues fixed in the rizin-0.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-05"/>
	<updated date="2025-01-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1207/">CVE-2022-1207 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1207">CVE-2022-1207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959118" comment="rizin-0.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959119" comment="rizin-common-0.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959120" comment="rizin-devel-0.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252939" version="1" class="patch">
	<metadata>
		<title>apptainer-1.3.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.3.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959228" comment="apptainer-1.3.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959229" comment="apptainer-leap-1.3.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959230" comment="apptainer-sle15_5-1.3.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959231" comment="apptainer-sle15_6-1.3.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959232" comment="apptainer-sle15_7-1.3.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252940" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959233" comment="firefox-esr-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959234" comment="firefox-esr-branding-upstream-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959235" comment="firefox-esr-translations-common-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959236" comment="firefox-esr-translations-other-128.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252941" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.5.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56826" ref_url="https://www.suse.com/security/cve/CVE-2024-56826/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.5.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56826/">CVE-2024-56826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56826">CVE-2024-56826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959237" comment="libopenjp2-7-2.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959238" comment="libopenjp2-7-32bit-2.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959239" comment="libopenjp2-7-x86-64-v3-2.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959240" comment="openjpeg2-2.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959241" comment="openjpeg2-devel-2.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959242" comment="openjpeg2-devel-doc-2.5.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252942" version="1" class="patch">
	<metadata>
		<title>libruby3_4-3_4-3.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_4-3_4-3.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959243" comment="libruby3_4-3_4-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959244" comment="ruby3.4-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959245" comment="ruby3.4-devel-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959246" comment="ruby3.4-devel-extra-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959247" comment="ruby3.4-doc-3.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959248" comment="ruby3.4-doc-ri-3.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252943" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.98-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2024-54677" ref_url="https://www.suse.com/security/cve/CVE-2024-54677/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.98-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54677/">CVE-2024-54677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54677">CVE-2024-54677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959249" comment="tomcat-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959250" comment="tomcat-admin-webapps-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959251" comment="tomcat-docs-webapp-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959252" comment="tomcat-el-3_0-api-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959253" comment="tomcat-embed-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959254" comment="tomcat-javadoc-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959255" comment="tomcat-jsp-2_3-api-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959256" comment="tomcat-jsvc-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959257" comment="tomcat-lib-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959258" comment="tomcat-servlet-4_0-api-9.0.98-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959259" comment="tomcat-webapps-9.0.98-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252944" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.34-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2024-54677" ref_url="https://www.suse.com/security/cve/CVE-2024-54677/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.34-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54677/">CVE-2024-54677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54677">CVE-2024-54677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959260" comment="tomcat10-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959261" comment="tomcat10-admin-webapps-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959262" comment="tomcat10-doc-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959263" comment="tomcat10-docs-webapp-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959264" comment="tomcat10-el-5_0-api-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959265" comment="tomcat10-embed-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959266" comment="tomcat10-jsp-3_1-api-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959267" comment="tomcat10-jsvc-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959268" comment="tomcat10-lib-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959269" comment="tomcat10-servlet-6_0-api-10.1.34-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959270" comment="tomcat10-webapps-10.1.34-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252945" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250108T191942-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25133" ref_url="https://www.suse.com/security/cve/CVE-2024-25133/" source="CVE"/>
		<reference ref_id="CVE-2024-28892" ref_url="https://www.suse.com/security/cve/CVE-2024-28892/" source="CVE"/>
		<reference ref_id="CVE-2024-45387" ref_url="https://www.suse.com/security/cve/CVE-2024-45387/" source="CVE"/>
		<reference ref_id="CVE-2024-54148" ref_url="https://www.suse.com/security/cve/CVE-2024-54148/" source="CVE"/>
		<reference ref_id="CVE-2024-55196" ref_url="https://www.suse.com/security/cve/CVE-2024-55196/" source="CVE"/>
		<reference ref_id="CVE-2024-55947" ref_url="https://www.suse.com/security/cve/CVE-2024-55947/" source="CVE"/>
		<reference ref_id="CVE-2024-56362" ref_url="https://www.suse.com/security/cve/CVE-2024-56362/" source="CVE"/>
		<reference ref_id="CVE-2024-56513" ref_url="https://www.suse.com/security/cve/CVE-2024-56513/" source="CVE"/>
		<reference ref_id="CVE-2024-56514" ref_url="https://www.suse.com/security/cve/CVE-2024-56514/" source="CVE"/>
		<reference ref_id="CVE-2025-21609" ref_url="https://www.suse.com/security/cve/CVE-2025-21609/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<reference ref_id="CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614/" source="CVE"/>
		<reference ref_id="CVE-2025-22130" ref_url="https://www.suse.com/security/cve/CVE-2025-22130/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250108T191942-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25133/">CVE-2024-25133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25133">CVE-2024-25133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28892/">CVE-2024-28892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28892">CVE-2024-28892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45387/">CVE-2024-45387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45387">CVE-2024-45387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54148/">CVE-2024-54148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54148">CVE-2024-54148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55196/">CVE-2024-55196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55196">CVE-2024-55196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55947/">CVE-2024-55947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55947">CVE-2024-55947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56362/">CVE-2024-56362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56362">CVE-2024-56362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56513/">CVE-2024-56513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56513">CVE-2024-56513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56514/">CVE-2024-56514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56514">CVE-2024-56514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21609/">CVE-2025-21609 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21609">CVE-2025-21609 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22130/">CVE-2025-22130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22130">CVE-2025-22130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959630" comment="govulncheck-vulndb-0.0.20250108T191942-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252946" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.24.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959631" comment="gstreamer-plugins-base-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959632" comment="gstreamer-plugins-base-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959633" comment="gstreamer-plugins-base-devel-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959634" comment="gstreamer-plugins-base-devel-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959635" comment="gstreamer-plugins-base-lang-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959636" comment="libgstallocators-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959637" comment="libgstallocators-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959638" comment="libgstapp-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959639" comment="libgstapp-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959640" comment="libgstaudio-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959641" comment="libgstaudio-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959642" comment="libgstfft-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959643" comment="libgstfft-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959644" comment="libgstgl-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959645" comment="libgstgl-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959646" comment="libgstpbutils-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959647" comment="libgstpbutils-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959648" comment="libgstriff-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959649" comment="libgstriff-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959650" comment="libgstrtp-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959651" comment="libgstrtp-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959652" comment="libgstrtsp-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959653" comment="libgstrtsp-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959654" comment="libgstsdp-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959655" comment="libgstsdp-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959656" comment="libgsttag-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959657" comment="libgsttag-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959658" comment="libgstvideo-1_0-0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959659" comment="libgstvideo-1_0-0-32bit-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959660" comment="typelib-1_0-GstAllocators-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959661" comment="typelib-1_0-GstApp-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959662" comment="typelib-1_0-GstAudio-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959663" comment="typelib-1_0-GstGL-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959664" comment="typelib-1_0-GstGLEGL-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959665" comment="typelib-1_0-GstGLWayland-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959666" comment="typelib-1_0-GstGLX11-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959667" comment="typelib-1_0-GstPbutils-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959668" comment="typelib-1_0-GstRtp-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959669" comment="typelib-1_0-GstRtsp-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959670" comment="typelib-1_0-GstSdp-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959671" comment="typelib-1_0-GstTag-1_0-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959672" comment="typelib-1_0-GstVideo-1_0-1.24.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252947" version="1" class="patch">
	<metadata>
		<title>kubo-0.32.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-49295" ref_url="https://www.suse.com/security/cve/CVE-2023-49295/" source="CVE"/>
		<description>
These are all security issues fixed in the kubo-0.32.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49295/">CVE-2023-49295 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49295">CVE-2023-49295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959673" comment="kubo-0.32.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252948" version="1" class="patch">
	<metadata>
		<title>logback-1.2.11-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12798" ref_url="https://www.suse.com/security/cve/CVE-2024-12798/" source="CVE"/>
		<reference ref_id="CVE-2024-12801" ref_url="https://www.suse.com/security/cve/CVE-2024-12801/" source="CVE"/>
		<description>
These are all security issues fixed in the logback-1.2.11-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-12798/">CVE-2024-12798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12798">CVE-2024-12798 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-12801/">CVE-2024-12801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12801">CVE-2024-12801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959674" comment="logback-1.2.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959675" comment="logback-access-1.2.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959676" comment="logback-examples-1.2.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959677" comment="logback-javadoc-1.2.11-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252949" version="1" class="patch">
	<metadata>
		<title>python311-slixmpp-1.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-45197" ref_url="https://www.suse.com/security/cve/CVE-2022-45197/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-slixmpp-1.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45197/">CVE-2022-45197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45197">CVE-2022-45197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959678" comment="python311-slixmpp-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959679" comment="python312-slixmpp-1.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959680" comment="python313-slixmpp-1.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252950" version="1" class="patch">
	<metadata>
		<title>chromedriver-131.0.6778.264-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0291" ref_url="https://www.suse.com/security/cve/CVE-2025-0291/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-131.0.6778.264-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0291/">CVE-2025-0291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0291">CVE-2025-0291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960020" comment="chromedriver-131.0.6778.264-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960021" comment="chromium-131.0.6778.264-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252951" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-134.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<reference ref_id="CVE-2025-0244" ref_url="https://www.suse.com/security/cve/CVE-2025-0244/" source="CVE"/>
		<reference ref_id="CVE-2025-0245" ref_url="https://www.suse.com/security/cve/CVE-2025-0245/" source="CVE"/>
		<reference ref_id="CVE-2025-0246" ref_url="https://www.suse.com/security/cve/CVE-2025-0246/" source="CVE"/>
		<reference ref_id="CVE-2025-0247" ref_url="https://www.suse.com/security/cve/CVE-2025-0247/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-134.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0244/">CVE-2025-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0244">CVE-2025-0244 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0245/">CVE-2025-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0245">CVE-2025-0245 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0246/">CVE-2025-0246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0246">CVE-2025-0246 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0247/">CVE-2025-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0247">CVE-2025-0247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960022" comment="MozillaFirefox-134.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960023" comment="MozillaFirefox-branding-upstream-134.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960024" comment="MozillaFirefox-devel-134.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960025" comment="MozillaFirefox-translations-common-134.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960026" comment="MozillaFirefox-translations-other-134.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252952" version="1" class="patch">
	<metadata>
		<title>dpdk-23.11.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11614" ref_url="https://www.suse.com/security/cve/CVE-2024-11614/" source="CVE"/>
		<description>
These are all security issues fixed in the dpdk-23.11.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11614/">CVE-2024-11614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11614">CVE-2024-11614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960027" comment="dpdk-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960028" comment="dpdk-devel-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960029" comment="dpdk-devel-static-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960030" comment="dpdk-doc-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960031" comment="dpdk-examples-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960032" comment="dpdk-tools-23.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960033" comment="libdpdk-24-23.11.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252953" version="1" class="patch">
	<metadata>
		<title>frr-10.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-55553" ref_url="https://www.suse.com/security/cve/CVE-2024-55553/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-10.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55553/">CVE-2024-55553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55553">CVE-2024-55553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960034" comment="frr-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960035" comment="frr-devel-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960036" comment="libfrr0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960037" comment="libfrr_pb0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960038" comment="libfrrcares0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960039" comment="libfrrfpm_pb0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960040" comment="libfrrospfapiclient0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960041" comment="libfrrsnmp0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960042" comment="libfrrzmq0-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960043" comment="libmgmt_be_nb0-10.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252954" version="1" class="patch">
	<metadata>
		<title>grafana-11.3.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.3.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960044" comment="grafana-11.3.0-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252955" version="1" class="patch">
	<metadata>
		<title>operator-sdk-1.39.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614/" source="CVE"/>
		<description>
These are all security issues fixed in the operator-sdk-1.39.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960045" comment="operator-sdk-1.39.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960046" comment="operator-sdk-bash-completion-1.39.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960047" comment="operator-sdk-fish-completion-1.39.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960048" comment="operator-sdk-zsh-completion-1.39.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252956" version="1" class="patch">
	<metadata>
		<title>perl-Module-ScanDeps-1.370.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10224" ref_url="https://www.suse.com/security/cve/CVE-2024-10224/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Module-ScanDeps-1.370.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10224/">CVE-2024-10224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10224">CVE-2024-10224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960049" comment="perl-Module-ScanDeps-1.370.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252957" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.8c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48651" ref_url="https://www.suse.com/security/cve/CVE-2024-48651/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.8c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48651/">CVE-2024-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48651">CVE-2024-48651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960050" comment="proftpd-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960051" comment="proftpd-devel-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960052" comment="proftpd-doc-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960053" comment="proftpd-lang-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960054" comment="proftpd-ldap-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960055" comment="proftpd-mysql-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960056" comment="proftpd-pgsql-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960057" comment="proftpd-radius-1.3.8c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960058" comment="proftpd-sqlite-1.3.8c-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252958" version="1" class="patch">
	<metadata>
		<title>python311-mistune-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-34749" ref_url="https://www.suse.com/security/cve/CVE-2022-34749/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-mistune-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34749/">CVE-2022-34749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34749">CVE-2022-34749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960059" comment="python311-mistune-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960060" comment="python312-mistune-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960061" comment="python313-mistune-3.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252959" version="1" class="patch">
	<metadata>
		<title>valkey-8.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<reference ref_id="CVE-2024-51741" ref_url="https://www.suse.com/security/cve/CVE-2024-51741/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51741/">CVE-2024-51741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51741">CVE-2024-51741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960062" comment="valkey-8.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960063" comment="valkey-compat-redis-8.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960064" comment="valkey-devel-8.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252960" version="1" class="patch">
	<metadata>
		<title>yq-4.44.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the yq-4.44.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-12"/>
	<updated date="2025-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960065" comment="yq-4.44.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960066" comment="yq-bash-completion-4.44.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960067" comment="yq-fish-completion-4.44.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960068" comment="yq-zsh-completion-4.44.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252961" version="1" class="patch">
	<metadata>
		<title>kepler-0.7.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the kepler-0.7.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960311" comment="kepler-0.7.11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252962" version="1" class="patch">
	<metadata>
		<title>rclone-1.69.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.69.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960312" comment="rclone-1.69.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960313" comment="rclone-bash-completion-1.69.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960314" comment="rclone-zsh-completion-1.69.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252963" version="1" class="patch">
	<metadata>
		<title>SDL2_sound-devel-2.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45676" ref_url="https://www.suse.com/security/cve/CVE-2023-45676/" source="CVE"/>
		<reference ref_id="CVE-2023-45677" ref_url="https://www.suse.com/security/cve/CVE-2023-45677/" source="CVE"/>
		<reference ref_id="CVE-2023-45681" ref_url="https://www.suse.com/security/cve/CVE-2023-45681/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL2_sound-devel-2.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45676/">CVE-2023-45676 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45676">CVE-2023-45676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45677/">CVE-2023-45677 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45677">CVE-2023-45677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45681/">CVE-2023-45681 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45681">CVE-2023-45681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960315" comment="SDL2_sound-devel-2.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960316" comment="libSDL2_sound2-2.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252964" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47796" ref_url="https://www.suse.com/security/cve/CVE-2024-47796/" source="CVE"/>
		<reference ref_id="CVE-2024-52333" ref_url="https://www.suse.com/security/cve/CVE-2024-52333/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47796/">CVE-2024-47796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47796">CVE-2024-47796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52333/">CVE-2024-52333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52333">CVE-2024-52333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960317" comment="dcmtk-3.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960318" comment="dcmtk-devel-3.6.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960319" comment="libdcmtk19-3.6.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252965" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250109T194159-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-20033" ref_url="https://www.suse.com/security/cve/CVE-2025-20033/" source="CVE"/>
		<reference ref_id="CVE-2025-22149" ref_url="https://www.suse.com/security/cve/CVE-2025-22149/" source="CVE"/>
		<reference ref_id="CVE-2025-22445" ref_url="https://www.suse.com/security/cve/CVE-2025-22445/" source="CVE"/>
		<reference ref_id="CVE-2025-22449" ref_url="https://www.suse.com/security/cve/CVE-2025-22449/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250109T194159-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20033/">CVE-2025-20033 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20033">CVE-2025-20033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22149/">CVE-2025-22149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22149">CVE-2025-22149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22445/">CVE-2025-22445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22445">CVE-2025-22445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22449/">CVE-2025-22449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22449">CVE-2025-22449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960320" comment="govulncheck-vulndb-0.0.20250109T194159-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252966" version="1" class="patch">
	<metadata>
		<title>python311-Pillow-11.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<reference ref_id="CVE-2022-24303" ref_url="https://www.suse.com/security/cve/CVE-2022-24303/" source="CVE"/>
		<reference ref_id="CVE-2022-30595" ref_url="https://www.suse.com/security/cve/CVE-2022-30595/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Pillow-11.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24303/">CVE-2022-24303 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24303">CVE-2022-24303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30595/">CVE-2022-30595 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30595">CVE-2022-30595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960321" comment="python311-Pillow-11.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960322" comment="python311-Pillow-tk-11.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960323" comment="python312-Pillow-11.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960324" comment="python312-Pillow-tk-11.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960325" comment="python313-Pillow-11.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960326" comment="python313-Pillow-tk-11.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252967" version="1" class="patch">
	<metadata>
		<title>libraptor-devel-2.0.16-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor-devel-2.0.16-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960327" comment="libraptor-devel-2.0.16-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960328" comment="libraptor2-0-2.0.16-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960329" comment="libraptor2-0-32bit-2.0.16-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960330" comment="raptor-2.0.16-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252968" version="1" class="patch">
	<metadata>
		<title>python311-translate-toolkit-3.14.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-translate-toolkit-3.14.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-14"/>
	<updated date="2025-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960331" comment="python311-translate-toolkit-3.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960332" comment="python312-translate-toolkit-3.14.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960333" comment="python313-translate-toolkit-3.14.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252969" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960395" comment="MozillaThunderbird-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960396" comment="MozillaThunderbird-openpgp-librnp-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960397" comment="MozillaThunderbird-translations-common-128.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960398" comment="MozillaThunderbird-translations-other-128.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252970" version="1" class="patch">
	<metadata>
		<title>git-lfs-3.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263/" source="CVE"/>
		<description>
These are all security issues fixed in the git-lfs-3.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960399" comment="git-lfs-3.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252971" version="1" class="patch">
	<metadata>
		<title>pam_u2f-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23013" ref_url="https://www.suse.com/security/cve/CVE-2025-23013/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_u2f-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23013/">CVE-2025-23013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23013">CVE-2025-23013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960400" comment="pam_u2f-1.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252972" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56374" ref_url="https://www.suse.com/security/cve/CVE-2024-56374/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56374/">CVE-2024-56374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56374">CVE-2024-56374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960401" comment="python311-Django4-4.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960402" comment="python312-Django4-4.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960403" comment="python313-Django4-4.2.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252973" version="1" class="patch">
	<metadata>
		<title>git-2.48.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50349" ref_url="https://www.suse.com/security/cve/CVE-2024-50349/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.48.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50349/">CVE-2024-50349 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960718" comment="git-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960719" comment="git-arch-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960720" comment="git-core-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960721" comment="git-credential-libsecret-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960722" comment="git-cvs-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960723" comment="git-daemon-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960724" comment="git-doc-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960725" comment="git-email-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960726" comment="git-gui-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960727" comment="git-p4-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960728" comment="git-svn-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960729" comment="git-web-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960730" comment="gitk-2.48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960731" comment="perl-Git-2.48.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252974" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250115T172141-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51491" ref_url="https://www.suse.com/security/cve/CVE-2024-51491/" source="CVE"/>
		<reference ref_id="CVE-2024-52281" ref_url="https://www.suse.com/security/cve/CVE-2024-52281/" source="CVE"/>
		<reference ref_id="CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263/" source="CVE"/>
		<reference ref_id="CVE-2024-56138" ref_url="https://www.suse.com/security/cve/CVE-2024-56138/" source="CVE"/>
		<reference ref_id="CVE-2024-56323" ref_url="https://www.suse.com/security/cve/CVE-2024-56323/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250115T172141-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51491/">CVE-2024-51491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51491">CVE-2024-51491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52281/">CVE-2024-52281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52281">CVE-2024-52281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56138/">CVE-2024-56138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56138">CVE-2024-56138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56323/">CVE-2024-56323 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56323">CVE-2024-56323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960732" comment="govulncheck-vulndb-0.0.20250115T172141-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252975" version="1" class="patch">
	<metadata>
		<title>grafana-11.3.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.3.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960733" comment="grafana-11.3.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252976" version="1" class="patch">
	<metadata>
		<title>hplip-3.24.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-6923" ref_url="https://www.suse.com/security/cve/CVE-2020-6923/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.24.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6923/">CVE-2020-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-6923">CVE-2020-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960734" comment="hplip-3.24.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960735" comment="hplip-devel-3.24.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960736" comment="hplip-hpijs-3.24.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960737" comment="hplip-sane-3.24.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960738" comment="hplip-scan-utils-3.24.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960739" comment="hplip-udev-rules-3.24.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252977" version="1" class="patch">
	<metadata>
		<title>perl-Compress-Raw-Zlib-2.213-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Compress-Raw-Zlib-2.213-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960740" comment="perl-Compress-Raw-Zlib-2.213-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252978" version="1" class="patch">
	<metadata>
		<title>perl-IO-Compress-2.213.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-IO-Compress-2.213.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960741" comment="perl-IO-Compress-2.213.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252979" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.3.1611.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.3.1611.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960742" comment="amazon-ssm-agent-3.3.1611.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252980" version="1" class="patch">
	<metadata>
		<title>chromedriver-132.0.6834.83-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0434" ref_url="https://www.suse.com/security/cve/CVE-2025-0434/" source="CVE"/>
		<reference ref_id="CVE-2025-0435" ref_url="https://www.suse.com/security/cve/CVE-2025-0435/" source="CVE"/>
		<reference ref_id="CVE-2025-0436" ref_url="https://www.suse.com/security/cve/CVE-2025-0436/" source="CVE"/>
		<reference ref_id="CVE-2025-0437" ref_url="https://www.suse.com/security/cve/CVE-2025-0437/" source="CVE"/>
		<reference ref_id="CVE-2025-0438" ref_url="https://www.suse.com/security/cve/CVE-2025-0438/" source="CVE"/>
		<reference ref_id="CVE-2025-0439" ref_url="https://www.suse.com/security/cve/CVE-2025-0439/" source="CVE"/>
		<reference ref_id="CVE-2025-0440" ref_url="https://www.suse.com/security/cve/CVE-2025-0440/" source="CVE"/>
		<reference ref_id="CVE-2025-0441" ref_url="https://www.suse.com/security/cve/CVE-2025-0441/" source="CVE"/>
		<reference ref_id="CVE-2025-0442" ref_url="https://www.suse.com/security/cve/CVE-2025-0442/" source="CVE"/>
		<reference ref_id="CVE-2025-0443" ref_url="https://www.suse.com/security/cve/CVE-2025-0443/" source="CVE"/>
		<reference ref_id="CVE-2025-0446" ref_url="https://www.suse.com/security/cve/CVE-2025-0446/" source="CVE"/>
		<reference ref_id="CVE-2025-0447" ref_url="https://www.suse.com/security/cve/CVE-2025-0447/" source="CVE"/>
		<reference ref_id="CVE-2025-0448" ref_url="https://www.suse.com/security/cve/CVE-2025-0448/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-132.0.6834.83-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0434/">CVE-2025-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0434">CVE-2025-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0435/">CVE-2025-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0435">CVE-2025-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0436/">CVE-2025-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0436">CVE-2025-0436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0437/">CVE-2025-0437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0437">CVE-2025-0437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0438/">CVE-2025-0438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0438">CVE-2025-0438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0439/">CVE-2025-0439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0439">CVE-2025-0439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0440/">CVE-2025-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0440">CVE-2025-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0441/">CVE-2025-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0441">CVE-2025-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0442/">CVE-2025-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0442">CVE-2025-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0443/">CVE-2025-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0443">CVE-2025-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0446/">CVE-2025-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0446">CVE-2025-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0447/">CVE-2025-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0447">CVE-2025-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0448/">CVE-2025-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0448">CVE-2025-0448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960743" comment="chromedriver-132.0.6834.83-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960744" comment="chromium-132.0.6834.83-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252981" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960745" comment="golang-github-prometheus-prometheus-3.1.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252982" version="1" class="patch">
	<metadata>
		<title>nvidia-open-driver-G06-signed-default-devel-550.144.03-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0131" ref_url="https://www.suse.com/security/cve/CVE-2024-0131/" source="CVE"/>
		<reference ref_id="CVE-2024-0150" ref_url="https://www.suse.com/security/cve/CVE-2024-0150/" source="CVE"/>
		<description>
These are all security issues fixed in the nvidia-open-driver-G06-signed-default-devel-550.144.03-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0131/">CVE-2024-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0150/">CVE-2024-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960746" comment="nvidia-open-driver-G06-signed-default-devel-550.144.03-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960747" comment="nvidia-open-driver-G06-signed-kmp-default-550.144.03_k6.12.9_1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252983" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.1.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-28347" ref_url="https://www.suse.com/security/cve/CVE-2022-28347/" source="CVE"/>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<reference ref_id="CVE-2022-36359" ref_url="https://www.suse.com/security/cve/CVE-2022-36359/" source="CVE"/>
		<reference ref_id="CVE-2022-41323" ref_url="https://www.suse.com/security/cve/CVE-2022-41323/" source="CVE"/>
		<reference ref_id="CVE-2023-23969" ref_url="https://www.suse.com/security/cve/CVE-2023-23969/" source="CVE"/>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<reference ref_id="CVE-2024-56374" ref_url="https://www.suse.com/security/cve/CVE-2024-56374/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.1.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28347/">CVE-2022-28347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28347">CVE-2022-28347 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-36359/">CVE-2022-36359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36359">CVE-2022-36359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41323/">CVE-2022-41323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41323">CVE-2022-41323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23969/">CVE-2023-23969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23969">CVE-2023-23969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56374/">CVE-2024-56374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56374">CVE-2024-56374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960748" comment="python311-Django-5.1.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960749" comment="python312-Django-5.1.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960750" comment="python313-Django-5.1.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252984" version="1" class="patch">
	<metadata>
		<title>velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-1732" ref_url="https://www.suse.com/security/cve/CVE-2023-1732/" source="CVE"/>
		<reference ref_id="CVE-2023-44270" ref_url="https://www.suse.com/security/cve/CVE-2023-44270/" source="CVE"/>
		<reference ref_id="CVE-2023-45133" ref_url="https://www.suse.com/security/cve/CVE-2023-45133/" source="CVE"/>
		<reference ref_id="CVE-2023-45683" ref_url="https://www.suse.com/security/cve/CVE-2023-45683/" source="CVE"/>
		<reference ref_id="CVE-2023-46234" ref_url="https://www.suse.com/security/cve/CVE-2023-46234/" source="CVE"/>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="CVE-2024-23331" ref_url="https://www.suse.com/security/cve/CVE-2024-23331/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-31207" ref_url="https://www.suse.com/security/cve/CVE-2024-31207/" source="CVE"/>
		<reference ref_id="CVE-2024-37298" ref_url="https://www.suse.com/security/cve/CVE-2024-37298/" source="CVE"/>
		<reference ref_id="CVE-2024-4067" ref_url="https://www.suse.com/security/cve/CVE-2024-4067/" source="CVE"/>
		<reference ref_id="CVE-2024-4068" ref_url="https://www.suse.com/security/cve/CVE-2024-4068/" source="CVE"/>
		<reference ref_id="CVE-2024-42459" ref_url="https://www.suse.com/security/cve/CVE-2024-42459/" source="CVE"/>
		<reference ref_id="CVE-2024-42460" ref_url="https://www.suse.com/security/cve/CVE-2024-42460/" source="CVE"/>
		<reference ref_id="CVE-2024-42461" ref_url="https://www.suse.com/security/cve/CVE-2024-42461/" source="CVE"/>
		<reference ref_id="CVE-2024-45296" ref_url="https://www.suse.com/security/cve/CVE-2024-45296/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2024-45811" ref_url="https://www.suse.com/security/cve/CVE-2024-45811/" source="CVE"/>
		<reference ref_id="CVE-2024-45812" ref_url="https://www.suse.com/security/cve/CVE-2024-45812/" source="CVE"/>
		<reference ref_id="CVE-2024-47068" ref_url="https://www.suse.com/security/cve/CVE-2024-47068/" source="CVE"/>
		<reference ref_id="CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875/" source="CVE"/>
		<reference ref_id="CVE-2024-48948" ref_url="https://www.suse.com/security/cve/CVE-2024-48948/" source="CVE"/>
		<reference ref_id="CVE-2024-48949" ref_url="https://www.suse.com/security/cve/CVE-2024-48949/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-55565" ref_url="https://www.suse.com/security/cve/CVE-2024-55565/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the velociraptor-0.7.0.4.git142.862ef23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1732/">CVE-2023-1732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1732">CVE-2023-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44270/">CVE-2023-44270 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44270">CVE-2023-44270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45133/">CVE-2023-45133 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45133">CVE-2023-45133 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45683/">CVE-2023-45683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45683">CVE-2023-45683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46234/">CVE-2023-46234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46234">CVE-2023-46234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23331/">CVE-2024-23331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23331">CVE-2024-23331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31207/">CVE-2024-31207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31207">CVE-2024-31207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37298/">CVE-2024-37298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37298">CVE-2024-37298 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4067/">CVE-2024-4067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4067">CVE-2024-4067 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4068/">CVE-2024-4068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4068">CVE-2024-4068 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42459/">CVE-2024-42459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42459">CVE-2024-42459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42460/">CVE-2024-42460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42460">CVE-2024-42460 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42461/">CVE-2024-42461 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42461">CVE-2024-42461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45296/">CVE-2024-45296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45296">CVE-2024-45296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45811/">CVE-2024-45811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45811">CVE-2024-45811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45812/">CVE-2024-45812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45812">CVE-2024-45812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47068/">CVE-2024-47068 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47068">CVE-2024-47068 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48948/">CVE-2024-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48948">CVE-2024-48948 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48949/">CVE-2024-48949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48949">CVE-2024-48949 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55565/">CVE-2024-55565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55565">CVE-2024-55565 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960751" comment="velociraptor-0.7.0.4.git142.862ef23-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252985" version="1" class="patch">
	<metadata>
		<title>python311-httpx-0.28.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41945" ref_url="https://www.suse.com/security/cve/CVE-2021-41945/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-httpx-0.28.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41945/">CVE-2021-41945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41945">CVE-2021-41945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960758" comment="python311-httpx-0.28.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960759" comment="python312-httpx-0.28.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960760" comment="python313-httpx-0.28.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252986" version="1" class="patch">
	<metadata>
		<title>rsync-3.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12084" ref_url="https://www.suse.com/security/cve/CVE-2024-12084/" source="CVE"/>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<reference ref_id="CVE-2024-12086" ref_url="https://www.suse.com/security/cve/CVE-2024-12086/" source="CVE"/>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<reference ref_id="CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088/" source="CVE"/>
		<reference ref_id="CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12084/">CVE-2024-12084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12084">CVE-2024-12084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12086/">CVE-2024-12086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12086">CVE-2024-12086 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960761" comment="rsync-3.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252987" version="1" class="patch">
	<metadata>
		<title>helmfile-0.170.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the helmfile-0.170.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961045" comment="helmfile-0.170.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961046" comment="helmfile-bash-completion-0.170.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961047" comment="helmfile-fish-completion-0.170.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961048" comment="helmfile-zsh-completion-0.170.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252988" version="1" class="patch">
	<metadata>
		<title>nvidia-modprobe-565.77-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0131" ref_url="https://www.suse.com/security/cve/CVE-2024-0131/" source="CVE"/>
		<reference ref_id="CVE-2024-0147" ref_url="https://www.suse.com/security/cve/CVE-2024-0147/" source="CVE"/>
		<description>
These are all security issues fixed in the nvidia-modprobe-565.77-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0131/">CVE-2024-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0147/">CVE-2024-0147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0147">CVE-2024-0147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961049" comment="nvidia-modprobe-565.77-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252989" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actioncable-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actioncable-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961050" comment="ruby3.4-rubygem-actioncable-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252990" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionmailbox-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionmailbox-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961051" comment="ruby3.4-rubygem-actionmailbox-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252991" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionmailer-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionmailer-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961052" comment="ruby3.4-rubygem-actionmailer-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252992" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionpack-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionpack-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961053" comment="ruby3.4-rubygem-actionpack-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252993" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actiontext-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actiontext-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961054" comment="ruby3.4-rubygem-actiontext-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252994" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionview-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionview-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961055" comment="ruby3.4-rubygem-actionview-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252995" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activejob-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activejob-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961056" comment="ruby3.4-rubygem-activejob-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252996" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activemodel-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activemodel-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961057" comment="ruby3.4-rubygem-activemodel-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252997" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activerecord-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activerecord-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961058" comment="ruby3.4-rubygem-activerecord-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252998" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activestorage-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activestorage-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961059" comment="ruby3.4-rubygem-activestorage-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252999" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activesupport-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activesupport-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961060" comment="ruby3.4-rubygem-activesupport-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253000" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rails-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rails-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961061" comment="ruby3.4-rubygem-rails-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253001" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-railties-8.0-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-railties-8.0-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961062" comment="ruby3.4-rubygem-railties-8.0-8.0.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253002" version="1" class="patch">
	<metadata>
		<title>grafana-11.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9476" ref_url="https://www.suse.com/security/cve/CVE-2024-9476/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-9476/">CVE-2024-9476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9476">CVE-2024-9476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961078" comment="grafana-11.3.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253003" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961079" comment="java-17-openjdk-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961080" comment="java-17-openjdk-demo-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961081" comment="java-17-openjdk-devel-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961082" comment="java-17-openjdk-headless-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961083" comment="java-17-openjdk-javadoc-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961084" comment="java-17-openjdk-jmods-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961085" comment="java-17-openjdk-src-17.0.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253004" version="1" class="patch">
	<metadata>
		<title>clamav-1.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2025-20128" ref_url="https://www.suse.com/security/cve/CVE-2025-20128/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20128/">CVE-2025-20128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20128">CVE-2025-20128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961151" comment="clamav-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961152" comment="clamav-devel-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961153" comment="clamav-docs-html-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961154" comment="clamav-milter-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961155" comment="libclamav12-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961156" comment="libclammspack0-1.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961157" comment="libfreshclam3-1.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253005" version="1" class="patch">
	<metadata>
		<title>helmfile-0.170.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0377" ref_url="https://www.suse.com/security/cve/CVE-2025-0377/" source="CVE"/>
		<description>
These are all security issues fixed in the helmfile-0.170.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0377/">CVE-2025-0377 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961158" comment="helmfile-0.170.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961159" comment="helmfile-bash-completion-0.170.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961160" comment="helmfile-fish-completion-0.170.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961161" comment="helmfile-zsh-completion-0.170.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253006" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.26.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.26.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961162" comment="java-11-openjdk-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961163" comment="java-11-openjdk-demo-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961164" comment="java-11-openjdk-devel-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961165" comment="java-11-openjdk-headless-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961166" comment="java-11-openjdk-javadoc-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961167" comment="java-11-openjdk-jmods-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961168" comment="java-11-openjdk-src-11.0.26.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253007" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961169" comment="java-21-openjdk-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961170" comment="java-21-openjdk-demo-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961171" comment="java-21-openjdk-devel-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961172" comment="java-21-openjdk-headless-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961173" comment="java-21-openjdk-javadoc-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961174" comment="java-21-openjdk-jmods-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961175" comment="java-21-openjdk-src-21.0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253008" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-33.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0434" ref_url="https://www.suse.com/security/cve/CVE-2025-0434/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-33.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0434/">CVE-2025-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0434">CVE-2025-0434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961176" comment="nodejs-electron-33.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961177" comment="nodejs-electron-devel-33.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961178" comment="nodejs-electron-doc-33.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253009" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-30536" ref_url="https://www.suse.com/security/cve/CVE-2023-30536/" source="CVE"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30536/">CVE-2023-30536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30536">CVE-2023-30536 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961179" comment="phpMyAdmin-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961180" comment="phpMyAdmin-apache-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961181" comment="phpMyAdmin-lang-5.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253010" version="1" class="patch">
	<metadata>
		<title>podman-5.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961182" comment="podman-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961183" comment="podman-docker-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961184" comment="podman-remote-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961185" comment="podmansh-5.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253011" version="1" class="patch">
	<metadata>
		<title>python311-azure-storage-blob-12.24.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-30187" ref_url="https://www.suse.com/security/cve/CVE-2022-30187/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-azure-storage-blob-12.24.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30187/">CVE-2022-30187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30187">CVE-2022-30187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961186" comment="python311-azure-storage-blob-12.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961187" comment="python312-azure-storage-blob-12.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961188" comment="python313-azure-storage-blob-12.24.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253012" version="1" class="patch">
	<metadata>
		<title>python313-3.13.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961189" comment="python313-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961190" comment="python313-32bit-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961191" comment="python313-curses-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961192" comment="python313-dbm-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961193" comment="python313-idle-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961194" comment="python313-tk-3.13.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961195" comment="python313-x86-64-v3-3.13.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253013" version="1" class="patch">
	<metadata>
		<title>libQt6Bluetooth6-6.8.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23050" ref_url="https://www.suse.com/security/cve/CVE-2025-23050/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Bluetooth6-6.8.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23050/">CVE-2025-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23050">CVE-2025-23050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961196" comment="libQt6Bluetooth6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961197" comment="libQt6Nfc6-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961198" comment="qt6-connectivity-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961199" comment="qt6-connectivity-devel-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961200" comment="qt6-connectivity-examples-6.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961201" comment="qt6-connectivity-private-devel-6.8.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253014" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24rc2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45340" ref_url="https://www.suse.com/security/cve/CVE-2024-45340/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2025-22865" ref_url="https://www.suse.com/security/cve/CVE-2025-22865/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24rc2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-24"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-45340/">CVE-2024-45340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45340">CVE-2024-45340 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22865/">CVE-2025-22865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22865">CVE-2025-22865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961978" comment="go1.24-1.24rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961979" comment="go1.24-doc-1.24rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961980" comment="go1.24-libstd-1.24rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961981" comment="go1.24-race-1.24rc2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253015" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-25"/>
	<updated date="2025-01-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961982" comment="go1.22-1.22.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961983" comment="go1.22-doc-1.22.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961984" comment="go1.22-libstd-1.22.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961985" comment="go1.22-race-1.22.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253016" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-25"/>
	<updated date="2025-01-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961986" comment="go1.23-1.23.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961987" comment="go1.23-doc-1.23.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961988" comment="go1.23-libstd-1.23.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961989" comment="go1.23-race-1.23.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253017" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.2.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-13176" ref_url="https://www.suse.com/security/cve/CVE-2024-13176/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.2.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-25"/>
	<updated date="2025-01-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13176/">CVE-2024-13176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961990" comment="libopenssl-3-devel-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961991" comment="libopenssl-3-devel-32bit-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961992" comment="libopenssl-3-fips-provider-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961993" comment="libopenssl-3-fips-provider-32bit-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961994" comment="libopenssl-3-fips-provider-x86-64-v3-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961995" comment="libopenssl3-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961996" comment="libopenssl3-32bit-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961997" comment="libopenssl3-x86-64-v3-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961998" comment="openssl-3-3.2.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961999" comment="openssl-3-doc-3.2.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253018" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-nokogiri-1.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="CVE-2022-23476" ref_url="https://www.suse.com/security/cve/CVE-2022-23476/" source="CVE"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-24839" ref_url="https://www.suse.com/security/cve/CVE-2022-24839/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-nokogiri-1.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-25"/>
	<updated date="2025-01-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23476/">CVE-2022-23476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23476">CVE-2022-23476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24839/">CVE-2022-24839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962000" comment="ruby3.4-rubygem-nokogiri-1.18.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253019" version="1" class="patch">
	<metadata>
		<title>chromedriver-132.0.6834.110-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0611" ref_url="https://www.suse.com/security/cve/CVE-2025-0611/" source="CVE"/>
		<reference ref_id="CVE-2025-0612" ref_url="https://www.suse.com/security/cve/CVE-2025-0612/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-132.0.6834.110-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-26"/>
	<updated date="2025-01-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0611/">CVE-2025-0611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0611">CVE-2025-0611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0612/">CVE-2025-0612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0612">CVE-2025-0612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962001" comment="chromedriver-132.0.6834.110-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962002" comment="chromium-132.0.6834.110-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253020" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.24.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47540" ref_url="https://www.suse.com/security/cve/CVE-2024-47540/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.24.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-27"/>
	<updated date="2025-01-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47540/">CVE-2024-47540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47540">CVE-2024-47540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962003" comment="gstreamer-plugins-good-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962004" comment="gstreamer-plugins-good-32bit-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962005" comment="gstreamer-plugins-good-extra-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962006" comment="gstreamer-plugins-good-extra-32bit-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962007" comment="gstreamer-plugins-good-gtk-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962008" comment="gstreamer-plugins-good-jack-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962009" comment="gstreamer-plugins-good-jack-32bit-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962010" comment="gstreamer-plugins-good-lang-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962011" comment="gstreamer-plugins-good-qtqml-1.24.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962012" comment="gstreamer-plugins-good-qtqml6-1.24.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253021" version="1" class="patch">
	<metadata>
		<title>iperf-3.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-27"/>
	<updated date="2025-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962013" comment="iperf-3.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962014" comment="iperf-devel-3.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962015" comment="libiperf0-3.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253022" version="1" class="patch">
	<metadata>
		<title>python311-asteval-1.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24359" ref_url="https://www.suse.com/security/cve/CVE-2025-24359/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-asteval-1.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-27"/>
	<updated date="2025-01-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24359/">CVE-2025-24359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24359">CVE-2025-24359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962016" comment="python311-asteval-1.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962017" comment="python312-asteval-1.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962018" comment="python313-asteval-1.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253023" version="1" class="patch">
	<metadata>
		<title>python311-sentry-sdk-2.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-44420" ref_url="https://www.suse.com/security/cve/CVE-2021-44420/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-sentry-sdk-2.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-27"/>
	<updated date="2025-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44420/">CVE-2021-44420 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44420">CVE-2021-44420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962019" comment="python311-sentry-sdk-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962020" comment="python312-sentry-sdk-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962021" comment="python313-sentry-sdk-2.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253024" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48279" ref_url="https://www.suse.com/security/cve/CVE-2022-48279/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48279/">CVE-2022-48279 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48279">CVE-2022-48279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962022" comment="apache2-mod_security2-2.9.8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253025" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250117T214834-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36402" ref_url="https://www.suse.com/security/cve/CVE-2024-36402/" source="CVE"/>
		<reference ref_id="CVE-2024-36403" ref_url="https://www.suse.com/security/cve/CVE-2024-36403/" source="CVE"/>
		<reference ref_id="CVE-2024-52594" ref_url="https://www.suse.com/security/cve/CVE-2024-52594/" source="CVE"/>
		<reference ref_id="CVE-2024-52602" ref_url="https://www.suse.com/security/cve/CVE-2024-52602/" source="CVE"/>
		<reference ref_id="CVE-2024-52791" ref_url="https://www.suse.com/security/cve/CVE-2024-52791/" source="CVE"/>
		<reference ref_id="CVE-2024-56515" ref_url="https://www.suse.com/security/cve/CVE-2024-56515/" source="CVE"/>
		<reference ref_id="CVE-2025-20086" ref_url="https://www.suse.com/security/cve/CVE-2025-20086/" source="CVE"/>
		<reference ref_id="CVE-2025-20088" ref_url="https://www.suse.com/security/cve/CVE-2025-20088/" source="CVE"/>
		<reference ref_id="CVE-2025-20621" ref_url="https://www.suse.com/security/cve/CVE-2025-20621/" source="CVE"/>
		<reference ref_id="CVE-2025-21088" ref_url="https://www.suse.com/security/cve/CVE-2025-21088/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250117T214834-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36402/">CVE-2024-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36402">CVE-2024-36402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36403/">CVE-2024-36403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36403">CVE-2024-36403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52594/">CVE-2024-52594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52594">CVE-2024-52594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52602/">CVE-2024-52602 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52602">CVE-2024-52602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52791/">CVE-2024-52791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52791">CVE-2024-52791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56515/">CVE-2024-56515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56515">CVE-2024-56515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20086/">CVE-2025-20086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20086">CVE-2025-20086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20088/">CVE-2025-20088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20088">CVE-2025-20088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20621/">CVE-2025-20621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20621">CVE-2025-20621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21088/">CVE-2025-21088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21088">CVE-2025-21088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962023" comment="govulncheck-vulndb-0.0.20250117T214834-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253026" version="1" class="patch">
	<metadata>
		<title>kernel-devel-longterm-6.12.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52459" ref_url="https://www.suse.com/security/cve/CVE-2023-52459/" source="CVE"/>
		<reference ref_id="CVE-2023-52461" ref_url="https://www.suse.com/security/cve/CVE-2023-52461/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="CVE-2024-26605" ref_url="https://www.suse.com/security/cve/CVE-2024-26605/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26865" ref_url="https://www.suse.com/security/cve/CVE-2024-26865/" source="CVE"/>
		<reference ref_id="CVE-2024-46869" ref_url="https://www.suse.com/security/cve/CVE-2024-46869/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47675" ref_url="https://www.suse.com/security/cve/CVE-2024-47675/" source="CVE"/>
		<reference ref_id="CVE-2024-47676" ref_url="https://www.suse.com/security/cve/CVE-2024-47676/" source="CVE"/>
		<reference ref_id="CVE-2024-47677" ref_url="https://www.suse.com/security/cve/CVE-2024-47677/" source="CVE"/>
		<reference ref_id="CVE-2024-47678" ref_url="https://www.suse.com/security/cve/CVE-2024-47678/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47680" ref_url="https://www.suse.com/security/cve/CVE-2024-47680/" source="CVE"/>
		<reference ref_id="CVE-2024-47681" ref_url="https://www.suse.com/security/cve/CVE-2024-47681/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47683" ref_url="https://www.suse.com/security/cve/CVE-2024-47683/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47686" ref_url="https://www.suse.com/security/cve/CVE-2024-47686/" source="CVE"/>
		<reference ref_id="CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687/" source="CVE"/>
		<reference ref_id="CVE-2024-47688" ref_url="https://www.suse.com/security/cve/CVE-2024-47688/" source="CVE"/>
		<reference ref_id="CVE-2024-47689" ref_url="https://www.suse.com/security/cve/CVE-2024-47689/" source="CVE"/>
		<reference ref_id="CVE-2024-47690" ref_url="https://www.suse.com/security/cve/CVE-2024-47690/" source="CVE"/>
		<reference ref_id="CVE-2024-47691" ref_url="https://www.suse.com/security/cve/CVE-2024-47691/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47694" ref_url="https://www.suse.com/security/cve/CVE-2024-47694/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47700" ref_url="https://www.suse.com/security/cve/CVE-2024-47700/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47702" ref_url="https://www.suse.com/security/cve/CVE-2024-47702/" source="CVE"/>
		<reference ref_id="CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47708" ref_url="https://www.suse.com/security/cve/CVE-2024-47708/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47711" ref_url="https://www.suse.com/security/cve/CVE-2024-47711/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47714" ref_url="https://www.suse.com/security/cve/CVE-2024-47714/" source="CVE"/>
		<reference ref_id="CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715/" source="CVE"/>
		<reference ref_id="CVE-2024-47716" ref_url="https://www.suse.com/security/cve/CVE-2024-47716/" source="CVE"/>
		<reference ref_id="CVE-2024-47717" ref_url="https://www.suse.com/security/cve/CVE-2024-47717/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47721" ref_url="https://www.suse.com/security/cve/CVE-2024-47721/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47724" ref_url="https://www.suse.com/security/cve/CVE-2024-47724/" source="CVE"/>
		<reference ref_id="CVE-2024-47726" ref_url="https://www.suse.com/security/cve/CVE-2024-47726/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47729" ref_url="https://www.suse.com/security/cve/CVE-2024-47729/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47731" ref_url="https://www.suse.com/security/cve/CVE-2024-47731/" source="CVE"/>
		<reference ref_id="CVE-2024-47732" ref_url="https://www.suse.com/security/cve/CVE-2024-47732/" source="CVE"/>
		<reference ref_id="CVE-2024-47733" ref_url="https://www.suse.com/security/cve/CVE-2024-47733/" source="CVE"/>
		<reference ref_id="CVE-2024-47734" ref_url="https://www.suse.com/security/cve/CVE-2024-47734/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47736" ref_url="https://www.suse.com/security/cve/CVE-2024-47736/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47740" ref_url="https://www.suse.com/security/cve/CVE-2024-47740/" source="CVE"/>
		<reference ref_id="CVE-2024-47741" ref_url="https://www.suse.com/security/cve/CVE-2024-47741/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47743" ref_url="https://www.suse.com/security/cve/CVE-2024-47743/" source="CVE"/>
		<reference ref_id="CVE-2024-47744" ref_url="https://www.suse.com/security/cve/CVE-2024-47744/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47746" ref_url="https://www.suse.com/security/cve/CVE-2024-47746/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47750" ref_url="https://www.suse.com/security/cve/CVE-2024-47750/" source="CVE"/>
		<reference ref_id="CVE-2024-47751" ref_url="https://www.suse.com/security/cve/CVE-2024-47751/" source="CVE"/>
		<reference ref_id="CVE-2024-47752" ref_url="https://www.suse.com/security/cve/CVE-2024-47752/" source="CVE"/>
		<reference ref_id="CVE-2024-47753" ref_url="https://www.suse.com/security/cve/CVE-2024-47753/" source="CVE"/>
		<reference ref_id="CVE-2024-47754" ref_url="https://www.suse.com/security/cve/CVE-2024-47754/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49853" ref_url="https://www.suse.com/security/cve/CVE-2024-49853/" source="CVE"/>
		<reference ref_id="CVE-2024-49854" ref_url="https://www.suse.com/security/cve/CVE-2024-49854/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49856" ref_url="https://www.suse.com/security/cve/CVE-2024-49856/" source="CVE"/>
		<reference ref_id="CVE-2024-49857" ref_url="https://www.suse.com/security/cve/CVE-2024-49857/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49859" ref_url="https://www.suse.com/security/cve/CVE-2024-49859/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864/" source="CVE"/>
		<reference ref_id="CVE-2024-49865" ref_url="https://www.suse.com/security/cve/CVE-2024-49865/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868/" source="CVE"/>
		<reference ref_id="CVE-2024-49869" ref_url="https://www.suse.com/security/cve/CVE-2024-49869/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49872" ref_url="https://www.suse.com/security/cve/CVE-2024-49872/" source="CVE"/>
		<reference ref_id="CVE-2024-49873" ref_url="https://www.suse.com/security/cve/CVE-2024-49873/" source="CVE"/>
		<reference ref_id="CVE-2024-49874" ref_url="https://www.suse.com/security/cve/CVE-2024-49874/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49876" ref_url="https://www.suse.com/security/cve/CVE-2024-49876/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49880" ref_url="https://www.suse.com/security/cve/CVE-2024-49880/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49885" ref_url="https://www.suse.com/security/cve/CVE-2024-49885/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49887" ref_url="https://www.suse.com/security/cve/CVE-2024-49887/" source="CVE"/>
		<reference ref_id="CVE-2024-49888" ref_url="https://www.suse.com/security/cve/CVE-2024-49888/" source="CVE"/>
		<reference ref_id="CVE-2024-49889" ref_url="https://www.suse.com/security/cve/CVE-2024-49889/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49893" ref_url="https://www.suse.com/security/cve/CVE-2024-49893/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49898" ref_url="https://www.suse.com/security/cve/CVE-2024-49898/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49904" ref_url="https://www.suse.com/security/cve/CVE-2024-49904/" source="CVE"/>
		<reference ref_id="CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49910" ref_url="https://www.suse.com/security/cve/CVE-2024-49910/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49915" ref_url="https://www.suse.com/security/cve/CVE-2024-49915/" source="CVE"/>
		<reference ref_id="CVE-2024-49916" ref_url="https://www.suse.com/security/cve/CVE-2024-49916/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49926" ref_url="https://www.suse.com/security/cve/CVE-2024-49926/" source="CVE"/>
		<reference ref_id="CVE-2024-49927" ref_url="https://www.suse.com/security/cve/CVE-2024-49927/" source="CVE"/>
		<reference ref_id="CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49931" ref_url="https://www.suse.com/security/cve/CVE-2024-49931/" source="CVE"/>
		<reference ref_id="CVE-2024-49932" ref_url="https://www.suse.com/security/cve/CVE-2024-49932/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49940" ref_url="https://www.suse.com/security/cve/CVE-2024-49940/" source="CVE"/>
		<reference ref_id="CVE-2024-49941" ref_url="https://www.suse.com/security/cve/CVE-2024-49941/" source="CVE"/>
		<reference ref_id="CVE-2024-49942" ref_url="https://www.suse.com/security/cve/CVE-2024-49942/" source="CVE"/>
		<reference ref_id="CVE-2024-49943" ref_url="https://www.suse.com/security/cve/CVE-2024-49943/" source="CVE"/>
		<reference ref_id="CVE-2024-49944" ref_url="https://www.suse.com/security/cve/CVE-2024-49944/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49948" ref_url="https://www.suse.com/security/cve/CVE-2024-49948/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49951" ref_url="https://www.suse.com/security/cve/CVE-2024-49951/" source="CVE"/>
		<reference ref_id="CVE-2024-49952" ref_url="https://www.suse.com/security/cve/CVE-2024-49952/" source="CVE"/>
		<reference ref_id="CVE-2024-49953" ref_url="https://www.suse.com/security/cve/CVE-2024-49953/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49956" ref_url="https://www.suse.com/security/cve/CVE-2024-49956/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49961" ref_url="https://www.suse.com/security/cve/CVE-2024-49961/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49964" ref_url="https://www.suse.com/security/cve/CVE-2024-49964/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49970" ref_url="https://www.suse.com/security/cve/CVE-2024-49970/" source="CVE"/>
		<reference ref_id="CVE-2024-49971" ref_url="https://www.suse.com/security/cve/CVE-2024-49971/" source="CVE"/>
		<reference ref_id="CVE-2024-49972" ref_url="https://www.suse.com/security/cve/CVE-2024-49972/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49976" ref_url="https://www.suse.com/security/cve/CVE-2024-49976/" source="CVE"/>
		<reference ref_id="CVE-2024-49977" ref_url="https://www.suse.com/security/cve/CVE-2024-49977/" source="CVE"/>
		<reference ref_id="CVE-2024-49978" ref_url="https://www.suse.com/security/cve/CVE-2024-49978/" source="CVE"/>
		<reference ref_id="CVE-2024-49979" ref_url="https://www.suse.com/security/cve/CVE-2024-49979/" source="CVE"/>
		<reference ref_id="CVE-2024-49980" ref_url="https://www.suse.com/security/cve/CVE-2024-49980/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49984" ref_url="https://www.suse.com/security/cve/CVE-2024-49984/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49986" ref_url="https://www.suse.com/security/cve/CVE-2024-49986/" source="CVE"/>
		<reference ref_id="CVE-2024-49987" ref_url="https://www.suse.com/security/cve/CVE-2024-49987/" source="CVE"/>
		<reference ref_id="CVE-2024-49988" ref_url="https://www.suse.com/security/cve/CVE-2024-49988/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-49990" ref_url="https://www.suse.com/security/cve/CVE-2024-49990/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49992" ref_url="https://www.suse.com/security/cve/CVE-2024-49992/" source="CVE"/>
		<reference ref_id="CVE-2024-49994" ref_url="https://www.suse.com/security/cve/CVE-2024-49994/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-49997" ref_url="https://www.suse.com/security/cve/CVE-2024-49997/" source="CVE"/>
		<reference ref_id="CVE-2024-49998" ref_url="https://www.suse.com/security/cve/CVE-2024-49998/" source="CVE"/>
		<reference ref_id="CVE-2024-49999" ref_url="https://www.suse.com/security/cve/CVE-2024-49999/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50004" ref_url="https://www.suse.com/security/cve/CVE-2024-50004/" source="CVE"/>
		<reference ref_id="CVE-2024-50005" ref_url="https://www.suse.com/security/cve/CVE-2024-50005/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50010" ref_url="https://www.suse.com/security/cve/CVE-2024-50010/" source="CVE"/>
		<reference ref_id="CVE-2024-50011" ref_url="https://www.suse.com/security/cve/CVE-2024-50011/" source="CVE"/>
		<reference ref_id="CVE-2024-50012" ref_url="https://www.suse.com/security/cve/CVE-2024-50012/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015/" source="CVE"/>
		<reference ref_id="CVE-2024-50016" ref_url="https://www.suse.com/security/cve/CVE-2024-50016/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50018" ref_url="https://www.suse.com/security/cve/CVE-2024-50018/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50020" ref_url="https://www.suse.com/security/cve/CVE-2024-50020/" source="CVE"/>
		<reference ref_id="CVE-2024-50021" ref_url="https://www.suse.com/security/cve/CVE-2024-50021/" source="CVE"/>
		<reference ref_id="CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026/" source="CVE"/>
		<reference ref_id="CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50029" ref_url="https://www.suse.com/security/cve/CVE-2024-50029/" source="CVE"/>
		<reference ref_id="CVE-2024-50030" ref_url="https://www.suse.com/security/cve/CVE-2024-50030/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50032" ref_url="https://www.suse.com/security/cve/CVE-2024-50032/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50034" ref_url="https://www.suse.com/security/cve/CVE-2024-50034/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50036" ref_url="https://www.suse.com/security/cve/CVE-2024-50036/" source="CVE"/>
		<reference ref_id="CVE-2024-50037" ref_url="https://www.suse.com/security/cve/CVE-2024-50037/" source="CVE"/>
		<reference ref_id="CVE-2024-50038" ref_url="https://www.suse.com/security/cve/CVE-2024-50038/" source="CVE"/>
		<reference ref_id="CVE-2024-50039" ref_url="https://www.suse.com/security/cve/CVE-2024-50039/" source="CVE"/>
		<reference ref_id="CVE-2024-50040" ref_url="https://www.suse.com/security/cve/CVE-2024-50040/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50042" ref_url="https://www.suse.com/security/cve/CVE-2024-50042/" source="CVE"/>
		<reference ref_id="CVE-2024-50043" ref_url="https://www.suse.com/security/cve/CVE-2024-50043/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50056" ref_url="https://www.suse.com/security/cve/CVE-2024-50056/" source="CVE"/>
		<reference ref_id="CVE-2024-50057" ref_url="https://www.suse.com/security/cve/CVE-2024-50057/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064/" source="CVE"/>
		<reference ref_id="CVE-2024-50065" ref_url="https://www.suse.com/security/cve/CVE-2024-50065/" source="CVE"/>
		<reference ref_id="CVE-2024-50066" ref_url="https://www.suse.com/security/cve/CVE-2024-50066/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50068" ref_url="https://www.suse.com/security/cve/CVE-2024-50068/" source="CVE"/>
		<reference ref_id="CVE-2024-50069" ref_url="https://www.suse.com/security/cve/CVE-2024-50069/" source="CVE"/>
		<reference ref_id="CVE-2024-50070" ref_url="https://www.suse.com/security/cve/CVE-2024-50070/" source="CVE"/>
		<reference ref_id="CVE-2024-50071" ref_url="https://www.suse.com/security/cve/CVE-2024-50071/" source="CVE"/>
		<reference ref_id="CVE-2024-50072" ref_url="https://www.suse.com/security/cve/CVE-2024-50072/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075/" source="CVE"/>
		<reference ref_id="CVE-2024-50076" ref_url="https://www.suse.com/security/cve/CVE-2024-50076/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50079" ref_url="https://www.suse.com/security/cve/CVE-2024-50079/" source="CVE"/>
		<reference ref_id="CVE-2024-50080" ref_url="https://www.suse.com/security/cve/CVE-2024-50080/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50083" ref_url="https://www.suse.com/security/cve/CVE-2024-50083/" source="CVE"/>
		<reference ref_id="CVE-2024-50084" ref_url="https://www.suse.com/security/cve/CVE-2024-50084/" source="CVE"/>
		<reference ref_id="CVE-2024-50085" ref_url="https://www.suse.com/security/cve/CVE-2024-50085/" source="CVE"/>
		<reference ref_id="CVE-2024-50086" ref_url="https://www.suse.com/security/cve/CVE-2024-50086/" source="CVE"/>
		<reference ref_id="CVE-2024-50087" ref_url="https://www.suse.com/security/cve/CVE-2024-50087/" source="CVE"/>
		<reference ref_id="CVE-2024-50088" ref_url="https://www.suse.com/security/cve/CVE-2024-50088/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50090" ref_url="https://www.suse.com/security/cve/CVE-2024-50090/" source="CVE"/>
		<reference ref_id="CVE-2024-50091" ref_url="https://www.suse.com/security/cve/CVE-2024-50091/" source="CVE"/>
		<reference ref_id="CVE-2024-50092" ref_url="https://www.suse.com/security/cve/CVE-2024-50092/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50094" ref_url="https://www.suse.com/security/cve/CVE-2024-50094/" source="CVE"/>
		<reference ref_id="CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095/" source="CVE"/>
		<reference ref_id="CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096/" source="CVE"/>
		<reference ref_id="CVE-2024-50097" ref_url="https://www.suse.com/security/cve/CVE-2024-50097/" source="CVE"/>
		<reference ref_id="CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50100" ref_url="https://www.suse.com/security/cve/CVE-2024-50100/" source="CVE"/>
		<reference ref_id="CVE-2024-50101" ref_url="https://www.suse.com/security/cve/CVE-2024-50101/" source="CVE"/>
		<reference ref_id="CVE-2024-50102" ref_url="https://www.suse.com/security/cve/CVE-2024-50102/" source="CVE"/>
		<reference ref_id="CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103/" source="CVE"/>
		<reference ref_id="CVE-2024-50104" ref_url="https://www.suse.com/security/cve/CVE-2024-50104/" source="CVE"/>
		<reference ref_id="CVE-2024-50105" ref_url="https://www.suse.com/security/cve/CVE-2024-50105/" source="CVE"/>
		<reference ref_id="CVE-2024-50106" ref_url="https://www.suse.com/security/cve/CVE-2024-50106/" source="CVE"/>
		<reference ref_id="CVE-2024-50107" ref_url="https://www.suse.com/security/cve/CVE-2024-50107/" source="CVE"/>
		<reference ref_id="CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108/" source="CVE"/>
		<reference ref_id="CVE-2024-50109" ref_url="https://www.suse.com/security/cve/CVE-2024-50109/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50111" ref_url="https://www.suse.com/security/cve/CVE-2024-50111/" source="CVE"/>
		<reference ref_id="CVE-2024-50112" ref_url="https://www.suse.com/security/cve/CVE-2024-50112/" source="CVE"/>
		<reference ref_id="CVE-2024-50113" ref_url="https://www.suse.com/security/cve/CVE-2024-50113/" source="CVE"/>
		<reference ref_id="CVE-2024-50114" ref_url="https://www.suse.com/security/cve/CVE-2024-50114/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50118" ref_url="https://www.suse.com/security/cve/CVE-2024-50118/" source="CVE"/>
		<reference ref_id="CVE-2024-50119" ref_url="https://www.suse.com/security/cve/CVE-2024-50119/" source="CVE"/>
		<reference ref_id="CVE-2024-50120" ref_url="https://www.suse.com/security/cve/CVE-2024-50120/" source="CVE"/>
		<reference ref_id="CVE-2024-50121" ref_url="https://www.suse.com/security/cve/CVE-2024-50121/" source="CVE"/>
		<reference ref_id="CVE-2024-50122" ref_url="https://www.suse.com/security/cve/CVE-2024-50122/" source="CVE"/>
		<reference ref_id="CVE-2024-50123" ref_url="https://www.suse.com/security/cve/CVE-2024-50123/" source="CVE"/>
		<reference ref_id="CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50126" ref_url="https://www.suse.com/security/cve/CVE-2024-50126/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50129" ref_url="https://www.suse.com/security/cve/CVE-2024-50129/" source="CVE"/>
		<reference ref_id="CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130/" source="CVE"/>
		<reference ref_id="CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131/" source="CVE"/>
		<reference ref_id="CVE-2024-50132" ref_url="https://www.suse.com/security/cve/CVE-2024-50132/" source="CVE"/>
		<reference ref_id="CVE-2024-50133" ref_url="https://www.suse.com/security/cve/CVE-2024-50133/" source="CVE"/>
		<reference ref_id="CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134/" source="CVE"/>
		<reference ref_id="CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135/" source="CVE"/>
		<reference ref_id="CVE-2024-50136" ref_url="https://www.suse.com/security/cve/CVE-2024-50136/" source="CVE"/>
		<reference ref_id="CVE-2024-50137" ref_url="https://www.suse.com/security/cve/CVE-2024-50137/" source="CVE"/>
		<reference ref_id="CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138/" source="CVE"/>
		<reference ref_id="CVE-2024-50139" ref_url="https://www.suse.com/security/cve/CVE-2024-50139/" source="CVE"/>
		<reference ref_id="CVE-2024-50140" ref_url="https://www.suse.com/security/cve/CVE-2024-50140/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50142" ref_url="https://www.suse.com/security/cve/CVE-2024-50142/" source="CVE"/>
		<reference ref_id="CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-50144" ref_url="https://www.suse.com/security/cve/CVE-2024-50144/" source="CVE"/>
		<reference ref_id="CVE-2024-50145" ref_url="https://www.suse.com/security/cve/CVE-2024-50145/" source="CVE"/>
		<reference ref_id="CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146/" source="CVE"/>
		<reference ref_id="CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147/" source="CVE"/>
		<reference ref_id="CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148/" source="CVE"/>
		<reference ref_id="CVE-2024-50149" ref_url="https://www.suse.com/security/cve/CVE-2024-50149/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50151" ref_url="https://www.suse.com/security/cve/CVE-2024-50151/" source="CVE"/>
		<reference ref_id="CVE-2024-50152" ref_url="https://www.suse.com/security/cve/CVE-2024-50152/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155/" source="CVE"/>
		<reference ref_id="CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156/" source="CVE"/>
		<reference ref_id="CVE-2024-50157" ref_url="https://www.suse.com/security/cve/CVE-2024-50157/" source="CVE"/>
		<reference ref_id="CVE-2024-50158" ref_url="https://www.suse.com/security/cve/CVE-2024-50158/" source="CVE"/>
		<reference ref_id="CVE-2024-50159" ref_url="https://www.suse.com/security/cve/CVE-2024-50159/" source="CVE"/>
		<reference ref_id="CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160/" source="CVE"/>
		<reference ref_id="CVE-2024-50161" ref_url="https://www.suse.com/security/cve/CVE-2024-50161/" source="CVE"/>
		<reference ref_id="CVE-2024-50162" ref_url="https://www.suse.com/security/cve/CVE-2024-50162/" source="CVE"/>
		<reference ref_id="CVE-2024-50163" ref_url="https://www.suse.com/security/cve/CVE-2024-50163/" source="CVE"/>
		<reference ref_id="CVE-2024-50164" ref_url="https://www.suse.com/security/cve/CVE-2024-50164/" source="CVE"/>
		<reference ref_id="CVE-2024-50165" ref_url="https://www.suse.com/security/cve/CVE-2024-50165/" source="CVE"/>
		<reference ref_id="CVE-2024-50166" ref_url="https://www.suse.com/security/cve/CVE-2024-50166/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50168" ref_url="https://www.suse.com/security/cve/CVE-2024-50168/" source="CVE"/>
		<reference ref_id="CVE-2024-50170" ref_url="https://www.suse.com/security/cve/CVE-2024-50170/" source="CVE"/>
		<reference ref_id="CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171/" source="CVE"/>
		<reference ref_id="CVE-2024-50172" ref_url="https://www.suse.com/security/cve/CVE-2024-50172/" source="CVE"/>
		<reference ref_id="CVE-2024-50173" ref_url="https://www.suse.com/security/cve/CVE-2024-50173/" source="CVE"/>
		<reference ref_id="CVE-2024-50174" ref_url="https://www.suse.com/security/cve/CVE-2024-50174/" source="CVE"/>
		<reference ref_id="CVE-2024-50175" ref_url="https://www.suse.com/security/cve/CVE-2024-50175/" source="CVE"/>
		<reference ref_id="CVE-2024-50176" ref_url="https://www.suse.com/security/cve/CVE-2024-50176/" source="CVE"/>
		<reference ref_id="CVE-2024-50177" ref_url="https://www.suse.com/security/cve/CVE-2024-50177/" source="CVE"/>
		<reference ref_id="CVE-2024-50178" ref_url="https://www.suse.com/security/cve/CVE-2024-50178/" source="CVE"/>
		<reference ref_id="CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179/" source="CVE"/>
		<reference ref_id="CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180/" source="CVE"/>
		<reference ref_id="CVE-2024-50181" ref_url="https://www.suse.com/security/cve/CVE-2024-50181/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183/" source="CVE"/>
		<reference ref_id="CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184/" source="CVE"/>
		<reference ref_id="CVE-2024-50185" ref_url="https://www.suse.com/security/cve/CVE-2024-50185/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187/" source="CVE"/>
		<reference ref_id="CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50190" ref_url="https://www.suse.com/security/cve/CVE-2024-50190/" source="CVE"/>
		<reference ref_id="CVE-2024-50191" ref_url="https://www.suse.com/security/cve/CVE-2024-50191/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50193" ref_url="https://www.suse.com/security/cve/CVE-2024-50193/" source="CVE"/>
		<reference ref_id="CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196/" source="CVE"/>
		<reference ref_id="CVE-2024-50197" ref_url="https://www.suse.com/security/cve/CVE-2024-50197/" source="CVE"/>
		<reference ref_id="CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198/" source="CVE"/>
		<reference ref_id="CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199/" source="CVE"/>
		<reference ref_id="CVE-2024-50200" ref_url="https://www.suse.com/security/cve/CVE-2024-50200/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50206" ref_url="https://www.suse.com/security/cve/CVE-2024-50206/" source="CVE"/>
		<reference ref_id="CVE-2024-50207" ref_url="https://www.suse.com/security/cve/CVE-2024-50207/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209/" source="CVE"/>
		<reference ref_id="CVE-2024-50210" ref_url="https://www.suse.com/security/cve/CVE-2024-50210/" source="CVE"/>
		<reference ref_id="CVE-2024-50211" ref_url="https://www.suse.com/security/cve/CVE-2024-50211/" source="CVE"/>
		<reference ref_id="CVE-2024-50212" ref_url="https://www.suse.com/security/cve/CVE-2024-50212/" source="CVE"/>
		<reference ref_id="CVE-2024-50213" ref_url="https://www.suse.com/security/cve/CVE-2024-50213/" source="CVE"/>
		<reference ref_id="CVE-2024-50214" ref_url="https://www.suse.com/security/cve/CVE-2024-50214/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50216" ref_url="https://www.suse.com/security/cve/CVE-2024-50216/" source="CVE"/>
		<reference ref_id="CVE-2024-50217" ref_url="https://www.suse.com/security/cve/CVE-2024-50217/" source="CVE"/>
		<reference ref_id="CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218/" source="CVE"/>
		<reference ref_id="CVE-2024-50220" ref_url="https://www.suse.com/security/cve/CVE-2024-50220/" source="CVE"/>
		<reference ref_id="CVE-2024-50221" ref_url="https://www.suse.com/security/cve/CVE-2024-50221/" source="CVE"/>
		<reference ref_id="CVE-2024-50222" ref_url="https://www.suse.com/security/cve/CVE-2024-50222/" source="CVE"/>
		<reference ref_id="CVE-2024-50223" ref_url="https://www.suse.com/security/cve/CVE-2024-50223/" source="CVE"/>
		<reference ref_id="CVE-2024-50224" ref_url="https://www.suse.com/security/cve/CVE-2024-50224/" source="CVE"/>
		<reference ref_id="CVE-2024-50225" ref_url="https://www.suse.com/security/cve/CVE-2024-50225/" source="CVE"/>
		<reference ref_id="CVE-2024-50226" ref_url="https://www.suse.com/security/cve/CVE-2024-50226/" source="CVE"/>
		<reference ref_id="CVE-2024-50227" ref_url="https://www.suse.com/security/cve/CVE-2024-50227/" source="CVE"/>
		<reference ref_id="CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228/" source="CVE"/>
		<reference ref_id="CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50231" ref_url="https://www.suse.com/security/cve/CVE-2024-50231/" source="CVE"/>
		<reference ref_id="CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232/" source="CVE"/>
		<reference ref_id="CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233/" source="CVE"/>
		<reference ref_id="CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234/" source="CVE"/>
		<reference ref_id="CVE-2024-50235" ref_url="https://www.suse.com/security/cve/CVE-2024-50235/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50238" ref_url="https://www.suse.com/security/cve/CVE-2024-50238/" source="CVE"/>
		<reference ref_id="CVE-2024-50239" ref_url="https://www.suse.com/security/cve/CVE-2024-50239/" source="CVE"/>
		<reference ref_id="CVE-2024-50240" ref_url="https://www.suse.com/security/cve/CVE-2024-50240/" source="CVE"/>
		<reference ref_id="CVE-2024-50241" ref_url="https://www.suse.com/security/cve/CVE-2024-50241/" source="CVE"/>
		<reference ref_id="CVE-2024-50242" ref_url="https://www.suse.com/security/cve/CVE-2024-50242/" source="CVE"/>
		<reference ref_id="CVE-2024-50243" ref_url="https://www.suse.com/security/cve/CVE-2024-50243/" source="CVE"/>
		<reference ref_id="CVE-2024-50244" ref_url="https://www.suse.com/security/cve/CVE-2024-50244/" source="CVE"/>
		<reference ref_id="CVE-2024-50245" ref_url="https://www.suse.com/security/cve/CVE-2024-50245/" source="CVE"/>
		<reference ref_id="CVE-2024-50246" ref_url="https://www.suse.com/security/cve/CVE-2024-50246/" source="CVE"/>
		<reference ref_id="CVE-2024-50247" ref_url="https://www.suse.com/security/cve/CVE-2024-50247/" source="CVE"/>
		<reference ref_id="CVE-2024-50248" ref_url="https://www.suse.com/security/cve/CVE-2024-50248/" source="CVE"/>
		<reference ref_id="CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249/" source="CVE"/>
		<reference ref_id="CVE-2024-50250" ref_url="https://www.suse.com/security/cve/CVE-2024-50250/" source="CVE"/>
		<reference ref_id="CVE-2024-50251" ref_url="https://www.suse.com/security/cve/CVE-2024-50251/" source="CVE"/>
		<reference ref_id="CVE-2024-50252" ref_url="https://www.suse.com/security/cve/CVE-2024-50252/" source="CVE"/>
		<reference ref_id="CVE-2024-50253" ref_url="https://www.suse.com/security/cve/CVE-2024-50253/" source="CVE"/>
		<reference ref_id="CVE-2024-50254" ref_url="https://www.suse.com/security/cve/CVE-2024-50254/" source="CVE"/>
		<reference ref_id="CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255/" source="CVE"/>
		<reference ref_id="CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256/" source="CVE"/>
		<reference ref_id="CVE-2024-50257" ref_url="https://www.suse.com/security/cve/CVE-2024-50257/" source="CVE"/>
		<reference ref_id="CVE-2024-50258" ref_url="https://www.suse.com/security/cve/CVE-2024-50258/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50260" ref_url="https://www.suse.com/security/cve/CVE-2024-50260/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50262" ref_url="https://www.suse.com/security/cve/CVE-2024-50262/" source="CVE"/>
		<reference ref_id="CVE-2024-50263" ref_url="https://www.suse.com/security/cve/CVE-2024-50263/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-longterm-6.12.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52459/">CVE-2023-52459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52459">CVE-2023-52459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52461/">CVE-2023-52461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52461">CVE-2023-52461 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26605/">CVE-2024-26605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26605">CVE-2024-26605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26865/">CVE-2024-26865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26865">CVE-2024-26865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46869/">CVE-2024-46869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46869">CVE-2024-46869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47675/">CVE-2024-47675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47675">CVE-2024-47675 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47676/">CVE-2024-47676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47676">CVE-2024-47676 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47677/">CVE-2024-47677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47677">CVE-2024-47677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47678/">CVE-2024-47678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47678">CVE-2024-47678 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47680/">CVE-2024-47680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47680">CVE-2024-47680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47681/">CVE-2024-47681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47681">CVE-2024-47681 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47683/">CVE-2024-47683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47683">CVE-2024-47683 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47686/">CVE-2024-47686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47686">CVE-2024-47686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47688/">CVE-2024-47688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47688">CVE-2024-47688 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47689/">CVE-2024-47689 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47689">CVE-2024-47689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47690/">CVE-2024-47690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47690">CVE-2024-47690 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47691/">CVE-2024-47691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47691">CVE-2024-47691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47694/">CVE-2024-47694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47694">CVE-2024-47694 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47700/">CVE-2024-47700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47700">CVE-2024-47700 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47702/">CVE-2024-47702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47702">CVE-2024-47702 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47708/">CVE-2024-47708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47708">CVE-2024-47708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47711/">CVE-2024-47711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47711">CVE-2024-47711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47714/">CVE-2024-47714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47714">CVE-2024-47714 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47716/">CVE-2024-47716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47716">CVE-2024-47716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47717/">CVE-2024-47717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47717">CVE-2024-47717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47721/">CVE-2024-47721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47721">CVE-2024-47721 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47724/">CVE-2024-47724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47724">CVE-2024-47724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47726/">CVE-2024-47726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47726">CVE-2024-47726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47729/">CVE-2024-47729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47729">CVE-2024-47729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47731/">CVE-2024-47731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47731">CVE-2024-47731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47732/">CVE-2024-47732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47732">CVE-2024-47732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47733/">CVE-2024-47733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47733">CVE-2024-47733 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47734/">CVE-2024-47734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47734">CVE-2024-47734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47736/">CVE-2024-47736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47736">CVE-2024-47736 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47740/">CVE-2024-47740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47740">CVE-2024-47740 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47741/">CVE-2024-47741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47741">CVE-2024-47741 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47743/">CVE-2024-47743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47743">CVE-2024-47743 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47744/">CVE-2024-47744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47744">CVE-2024-47744 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47746/">CVE-2024-47746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47746">CVE-2024-47746 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47750/">CVE-2024-47750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47750">CVE-2024-47750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47751/">CVE-2024-47751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47751">CVE-2024-47751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47752/">CVE-2024-47752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47752">CVE-2024-47752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47753/">CVE-2024-47753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47753">CVE-2024-47753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47754/">CVE-2024-47754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47754">CVE-2024-47754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49853/">CVE-2024-49853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49853">CVE-2024-49853 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49854/">CVE-2024-49854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49854">CVE-2024-49854 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49856/">CVE-2024-49856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49857/">CVE-2024-49857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49857">CVE-2024-49857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49859/">CVE-2024-49859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49859">CVE-2024-49859 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49865/">CVE-2024-49865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49865">CVE-2024-49865 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49869/">CVE-2024-49869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49869">CVE-2024-49869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49872/">CVE-2024-49872 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49872">CVE-2024-49872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49873/">CVE-2024-49873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49873">CVE-2024-49873 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49874/">CVE-2024-49874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49876/">CVE-2024-49876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49876">CVE-2024-49876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49880/">CVE-2024-49880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49880">CVE-2024-49880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49885/">CVE-2024-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49885">CVE-2024-49885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49887/">CVE-2024-49887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49887">CVE-2024-49887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49888/">CVE-2024-49888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49888">CVE-2024-49888 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49889/">CVE-2024-49889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49893/">CVE-2024-49893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49893">CVE-2024-49893 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49898/">CVE-2024-49898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49898">CVE-2024-49898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49904/">CVE-2024-49904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49904">CVE-2024-49904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49910/">CVE-2024-49910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49910">CVE-2024-49910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49915/">CVE-2024-49915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49915">CVE-2024-49915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49916/">CVE-2024-49916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49916">CVE-2024-49916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49926/">CVE-2024-49926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49926">CVE-2024-49926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49927/">CVE-2024-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49931/">CVE-2024-49931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49932/">CVE-2024-49932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49932">CVE-2024-49932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49940/">CVE-2024-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49940">CVE-2024-49940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49941/">CVE-2024-49941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49941">CVE-2024-49941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49942/">CVE-2024-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49942">CVE-2024-49942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49943/">CVE-2024-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49943">CVE-2024-49943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49944/">CVE-2024-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49948/">CVE-2024-49948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49951/">CVE-2024-49951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49952/">CVE-2024-49952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49953/">CVE-2024-49953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49956/">CVE-2024-49956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49956">CVE-2024-49956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49961/">CVE-2024-49961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49964/">CVE-2024-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49964">CVE-2024-49964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49970/">CVE-2024-49970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49970">CVE-2024-49970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49971/">CVE-2024-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49971">CVE-2024-49971 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49972/">CVE-2024-49972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49972">CVE-2024-49972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49976/">CVE-2024-49976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49977/">CVE-2024-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49978/">CVE-2024-49978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49979/">CVE-2024-49979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49979">CVE-2024-49979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49980/">CVE-2024-49980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49984/">CVE-2024-49984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49984">CVE-2024-49984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49986/">CVE-2024-49986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49987/">CVE-2024-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49988/">CVE-2024-49988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49990/">CVE-2024-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49990">CVE-2024-49990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49992/">CVE-2024-49992 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49994/">CVE-2024-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49994">CVE-2024-49994 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49997/">CVE-2024-49997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49998/">CVE-2024-49998 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49998">CVE-2024-49998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49999/">CVE-2024-49999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49999">CVE-2024-49999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50004/">CVE-2024-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50004">CVE-2024-50004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50005/">CVE-2024-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50010/">CVE-2024-50010 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50010">CVE-2024-50010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50011/">CVE-2024-50011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50011">CVE-2024-50011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50012/">CVE-2024-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50016/">CVE-2024-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50018/">CVE-2024-50018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50018">CVE-2024-50018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50020/">CVE-2024-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50020">CVE-2024-50020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50021/">CVE-2024-50021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50021">CVE-2024-50021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50029/">CVE-2024-50029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50030/">CVE-2024-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50030">CVE-2024-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50032/">CVE-2024-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50034/">CVE-2024-50034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50034">CVE-2024-50034 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50036/">CVE-2024-50036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50037/">CVE-2024-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50037">CVE-2024-50037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50038/">CVE-2024-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50039/">CVE-2024-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50040/">CVE-2024-50040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50042/">CVE-2024-50042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50042">CVE-2024-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50043/">CVE-2024-50043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50043">CVE-2024-50043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50056/">CVE-2024-50056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50056">CVE-2024-50056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50057/">CVE-2024-50057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50065/">CVE-2024-50065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50066/">CVE-2024-50066 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50068/">CVE-2024-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50068">CVE-2024-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50069/">CVE-2024-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50070/">CVE-2024-50070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50071/">CVE-2024-50071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50071">CVE-2024-50071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50072/">CVE-2024-50072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50076/">CVE-2024-50076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50079/">CVE-2024-50079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50079">CVE-2024-50079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50080/">CVE-2024-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50083/">CVE-2024-50083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50084/">CVE-2024-50084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50085/">CVE-2024-50085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50086/">CVE-2024-50086 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50087/">CVE-2024-50087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50088/">CVE-2024-50088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50090/">CVE-2024-50090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50090">CVE-2024-50090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50091/">CVE-2024-50091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50091">CVE-2024-50091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50092/">CVE-2024-50092 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50092">CVE-2024-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50094/">CVE-2024-50094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50094">CVE-2024-50094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50097/">CVE-2024-50097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50100/">CVE-2024-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50100">CVE-2024-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50101/">CVE-2024-50101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50102/">CVE-2024-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50102">CVE-2024-50102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50104/">CVE-2024-50104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50104">CVE-2024-50104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50105/">CVE-2024-50105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50105">CVE-2024-50105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50106/">CVE-2024-50106 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50106">CVE-2024-50106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50107/">CVE-2024-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50107">CVE-2024-50107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50109/">CVE-2024-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50109">CVE-2024-50109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50111/">CVE-2024-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50112/">CVE-2024-50112 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50113/">CVE-2024-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50113">CVE-2024-50113 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50114/">CVE-2024-50114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50114">CVE-2024-50114 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50118/">CVE-2024-50118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50118">CVE-2024-50118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50119/">CVE-2024-50119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50119">CVE-2024-50119 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50120/">CVE-2024-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50121/">CVE-2024-50121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50122/">CVE-2024-50122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50122">CVE-2024-50122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50123/">CVE-2024-50123 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50123">CVE-2024-50123 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50126/">CVE-2024-50126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50129/">CVE-2024-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50129">CVE-2024-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50132/">CVE-2024-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50132">CVE-2024-50132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50133/">CVE-2024-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50136/">CVE-2024-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50137/">CVE-2024-50137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50137">CVE-2024-50137 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50139/">CVE-2024-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50140/">CVE-2024-50140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50142/">CVE-2024-50142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50144/">CVE-2024-50144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50144">CVE-2024-50144 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50145/">CVE-2024-50145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50149/">CVE-2024-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50149">CVE-2024-50149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50151/">CVE-2024-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50152/">CVE-2024-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50157/">CVE-2024-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50157">CVE-2024-50157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50158/">CVE-2024-50158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50159/">CVE-2024-50159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50161/">CVE-2024-50161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50161">CVE-2024-50161 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50162/">CVE-2024-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50163/">CVE-2024-50163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50164/">CVE-2024-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50165/">CVE-2024-50165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50165">CVE-2024-50165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50166/">CVE-2024-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50168/">CVE-2024-50168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50170/">CVE-2024-50170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50172/">CVE-2024-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50173/">CVE-2024-50173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50173">CVE-2024-50173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50174/">CVE-2024-50174 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50174">CVE-2024-50174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50175/">CVE-2024-50175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50176/">CVE-2024-50176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50177/">CVE-2024-50177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50177">CVE-2024-50177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50178/">CVE-2024-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50178">CVE-2024-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50181/">CVE-2024-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50185/">CVE-2024-50185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50190/">CVE-2024-50190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50190">CVE-2024-50190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50191/">CVE-2024-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50193/">CVE-2024-50193 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50193">CVE-2024-50193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50197/">CVE-2024-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50197">CVE-2024-50197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50200/">CVE-2024-50200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50200">CVE-2024-50200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50206/">CVE-2024-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50206">CVE-2024-50206 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50207/">CVE-2024-50207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50207">CVE-2024-50207 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50210/">CVE-2024-50210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50211/">CVE-2024-50211 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50212/">CVE-2024-50212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50212">CVE-2024-50212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50213/">CVE-2024-50213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50213">CVE-2024-50213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50214/">CVE-2024-50214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50214">CVE-2024-50214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50216/">CVE-2024-50216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50217/">CVE-2024-50217 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50217">CVE-2024-50217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50220/">CVE-2024-50220 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50220">CVE-2024-50220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50221/">CVE-2024-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50221">CVE-2024-50221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50222/">CVE-2024-50222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50223/">CVE-2024-50223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50224/">CVE-2024-50224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50225/">CVE-2024-50225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50225">CVE-2024-50225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50226/">CVE-2024-50226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50227/">CVE-2024-50227 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50227">CVE-2024-50227 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50231/">CVE-2024-50231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50235/">CVE-2024-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50238/">CVE-2024-50238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50238">CVE-2024-50238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50239/">CVE-2024-50239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50240/">CVE-2024-50240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50241/">CVE-2024-50241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50241">CVE-2024-50241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50242/">CVE-2024-50242 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50243/">CVE-2024-50243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50244/">CVE-2024-50244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50245/">CVE-2024-50245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50246/">CVE-2024-50246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50247/">CVE-2024-50247 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50248/">CVE-2024-50248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50250/">CVE-2024-50250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50251/">CVE-2024-50251 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50252/">CVE-2024-50252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50253/">CVE-2024-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50253">CVE-2024-50253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50254/">CVE-2024-50254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50254">CVE-2024-50254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50257/">CVE-2024-50257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50258/">CVE-2024-50258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50260/">CVE-2024-50260 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50260">CVE-2024-50260 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50262/">CVE-2024-50262 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50263/">CVE-2024-50263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50263">CVE-2024-50263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962025" comment="kernel-source-longterm-6.12.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253027" version="1" class="patch">
	<metadata>
		<title>corepack22-22.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962026" comment="corepack22-22.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962027" comment="nodejs22-22.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962028" comment="nodejs22-devel-22.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962029" comment="nodejs22-docs-22.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962030" comment="npm22-22.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253028" version="1" class="patch">
	<metadata>
		<title>openvpn-2.6.10-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-5594" ref_url="https://www.suse.com/security/cve/CVE-2024-5594/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.6.10-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-5594/">CVE-2024-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5594">CVE-2024-5594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962031" comment="openvpn-2.6.10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962032" comment="openvpn-auth-pam-plugin-2.6.10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962033" comment="openvpn-devel-2.6.10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962034" comment="openvpn-down-root-plugin-2.6.10-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253029" version="1" class="patch">
	<metadata>
		<title>owasp-modsecurity-crs-4.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<description>
These are all security issues fixed in the owasp-modsecurity-crs-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962035" comment="owasp-modsecurity-crs-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962036" comment="owasp-modsecurity-crs-apache2-4.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253030" version="1" class="patch">
	<metadata>
		<title>fake-gcs-server-1.52.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the fake-gcs-server-1.52.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962343" comment="fake-gcs-server-1.52.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253031" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250128T150132-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339/" source="CVE"/>
		<reference ref_id="CVE-2024-45340" ref_url="https://www.suse.com/security/cve/CVE-2024-45340/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2025-0377" ref_url="https://www.suse.com/security/cve/CVE-2025-0377/" source="CVE"/>
		<reference ref_id="CVE-2025-22865" ref_url="https://www.suse.com/security/cve/CVE-2025-22865/" source="CVE"/>
		<reference ref_id="CVE-2025-23028" ref_url="https://www.suse.com/security/cve/CVE-2025-23028/" source="CVE"/>
		<reference ref_id="CVE-2025-23047" ref_url="https://www.suse.com/security/cve/CVE-2025-23047/" source="CVE"/>
		<reference ref_id="CVE-2025-23208" ref_url="https://www.suse.com/security/cve/CVE-2025-23208/" source="CVE"/>
		<reference ref_id="CVE-2025-24030" ref_url="https://www.suse.com/security/cve/CVE-2025-24030/" source="CVE"/>
		<reference ref_id="CVE-2025-24337" ref_url="https://www.suse.com/security/cve/CVE-2025-24337/" source="CVE"/>
		<reference ref_id="CVE-2025-24354" ref_url="https://www.suse.com/security/cve/CVE-2025-24354/" source="CVE"/>
		<reference ref_id="CVE-2025-24355" ref_url="https://www.suse.com/security/cve/CVE-2025-24355/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250128T150132-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-45340/">CVE-2024-45340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45340">CVE-2024-45340 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0377/">CVE-2025-0377 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22865/">CVE-2025-22865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22865">CVE-2025-22865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23028/">CVE-2025-23028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23028">CVE-2025-23028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23047/">CVE-2025-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23047">CVE-2025-23047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23208/">CVE-2025-23208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23208">CVE-2025-23208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24030/">CVE-2025-24030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24030">CVE-2025-24030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24337/">CVE-2025-24337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24337">CVE-2025-24337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24354/">CVE-2025-24354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24354">CVE-2025-24354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24355/">CVE-2025-24355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24355">CVE-2025-24355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962344" comment="govulncheck-vulndb-0.0.20250128T150132-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253032" version="1" class="patch">
	<metadata>
		<title>hauler-1.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962345" comment="hauler-1.1.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253033" version="1" class="patch">
	<metadata>
		<title>python311-pydantic-2.10.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pydantic-2.10.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962346" comment="python311-pydantic-2.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962347" comment="python312-pydantic-2.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962348" comment="python313-pydantic-2.10.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253034" version="1" class="patch">
	<metadata>
		<title>trivy-0.58.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3817" ref_url="https://www.suse.com/security/cve/CVE-2024-3817/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.58.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3817/">CVE-2024-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3817">CVE-2024-3817 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962349" comment="trivy-0.58.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253035" version="1" class="patch">
	<metadata>
		<title>apptainer-1.3.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.3.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-30"/>
	<updated date="2025-01-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962350" comment="apptainer-1.3.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962351" comment="apptainer-leap-1.3.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962352" comment="apptainer-sle15_5-1.3.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962353" comment="apptainer-sle15_6-1.3.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962354" comment="apptainer-sle15_7-1.3.6-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253036" version="1" class="patch">
	<metadata>
		<title>dovecot24-2.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461/" source="CVE"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="CVE-2019-10691" ref_url="https://www.suse.com/security/cve/CVE-2019-10691/" source="CVE"/>
		<reference ref_id="CVE-2019-11494" ref_url="https://www.suse.com/security/cve/CVE-2019-11494/" source="CVE"/>
		<reference ref_id="CVE-2019-11499" ref_url="https://www.suse.com/security/cve/CVE-2019-11499/" source="CVE"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="CVE-2019-19722" ref_url="https://www.suse.com/security/cve/CVE-2019-19722/" source="CVE"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957/" source="CVE"/>
		<reference ref_id="CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958/" source="CVE"/>
		<reference ref_id="CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967/" source="CVE"/>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200/" source="CVE"/>
		<reference ref_id="CVE-2020-7046" ref_url="https://www.suse.com/security/cve/CVE-2020-7046/" source="CVE"/>
		<reference ref_id="CVE-2020-7957" ref_url="https://www.suse.com/security/cve/CVE-2020-7957/" source="CVE"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot24-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-30"/>
	<updated date="2025-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14461">CVE-2017-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15130">CVE-2017-15130 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15132">CVE-2017-15132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10691/">CVE-2019-10691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10691">CVE-2019-10691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11494/">CVE-2019-11494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11494">CVE-2019-11494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11499/">CVE-2019-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11499">CVE-2019-11499 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19722/">CVE-2019-19722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19722">CVE-2019-19722 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10957">CVE-2020-10957 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10958">CVE-2020-10958 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10967">CVE-2020-10967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28200">CVE-2020-28200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7046/">CVE-2020-7046 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7046">CVE-2020-7046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7957/">CVE-2020-7957 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7957">CVE-2020-7957 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29157">CVE-2021-29157 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">CVE-2021-33515 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962355" comment="dovecot24-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962356" comment="dovecot24-backend-mysql-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962357" comment="dovecot24-backend-pgsql-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962358" comment="dovecot24-backend-sqlite-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962359" comment="dovecot24-devel-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962360" comment="dovecot24-fts-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962361" comment="dovecot24-fts-flatcurve-2.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962362" comment="dovecot24-fts-solr-2.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253037" version="1" class="patch">
	<metadata>
		<title>libQt5Bluetooth5-32bit-5.15.16+kde2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23050" ref_url="https://www.suse.com/security/cve/CVE-2025-23050/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bluetooth5-32bit-5.15.16+kde2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-30"/>
	<updated date="2025-01-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23050/">CVE-2025-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23050">CVE-2025-23050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962363" comment="libQt5Bluetooth5-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962364" comment="libQt5Bluetooth5-32bit-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962365" comment="libQt5Bluetooth5-imports-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962366" comment="libQt5Nfc5-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962367" comment="libQt5Nfc5-32bit-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962368" comment="libQt5Nfc5-imports-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962369" comment="libqt5-qtconnectivity-devel-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962370" comment="libqt5-qtconnectivity-devel-32bit-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962371" comment="libqt5-qtconnectivity-examples-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962372" comment="libqt5-qtconnectivity-private-headers-devel-5.15.16+kde2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962373" comment="libqt5-qtconnectivity-tools-5.15.16+kde2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253038" version="1" class="patch">
	<metadata>
		<title>owasp-modsecurity-crs-4.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5003" ref_url="https://www.suse.com/security/cve/CVE-2023-5003/" source="CVE"/>
		<description>
These are all security issues fixed in the owasp-modsecurity-crs-4.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-30"/>
	<updated date="2025-01-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5003/">CVE-2023-5003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5003">CVE-2023-5003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962374" comment="owasp-modsecurity-crs-4.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962375" comment="owasp-modsecurity-crs-apache2-4.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253039" version="1" class="patch">
	<metadata>
		<title>python311-ipython-8.31.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21699" ref_url="https://www.suse.com/security/cve/CVE-2022-21699/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ipython-8.31.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-30"/>
	<updated date="2025-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21699/">CVE-2022-21699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21699">CVE-2022-21699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962376" comment="python311-ipython-8.31.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962377" comment="python312-ipython-8.31.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962378" comment="python313-ipython-8.31.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253040" version="1" class="patch">
	<metadata>
		<title>bind-9.20.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<reference ref_id="CVE-2024-12705" ref_url="https://www.suse.com/security/cve/CVE-2024-12705/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-31"/>
	<updated date="2025-01-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12705/">CVE-2024-12705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12705">CVE-2024-12705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962379" comment="bind-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962380" comment="bind-doc-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962381" comment="bind-modules-bdbhpt-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962382" comment="bind-modules-generic-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962383" comment="bind-modules-ldap-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962384" comment="bind-modules-mysql-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962385" comment="bind-modules-perl-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962386" comment="bind-modules-sqlite3-9.20.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962387" comment="bind-utils-9.20.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253041" version="1" class="patch">
	<metadata>
		<title>chromedriver-132.0.6834.159-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0762" ref_url="https://www.suse.com/security/cve/CVE-2025-0762/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-132.0.6834.159-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-31"/>
	<updated date="2025-01-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0762/">CVE-2025-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0762">CVE-2025-0762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962388" comment="chromedriver-132.0.6834.159-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962389" comment="chromium-132.0.6834.159-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253042" version="1" class="patch">
	<metadata>
		<title>kubelogin-0.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the kubelogin-0.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-31"/>
	<updated date="2025-01-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962390" comment="kubelogin-0.1.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253043" version="1" class="patch">
	<metadata>
		<title>rime-schema-all-20230603+git.5fdd2d6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2161" ref_url="https://www.suse.com/security/cve/CVE-2025-2161/" source="CVE"/>
		<description>
These are all security issues fixed in the rime-schema-all-20230603+git.5fdd2d6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2161/">CVE-2025-2161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2161">CVE-2025-2161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962941" comment="rime-schema-all-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962942" comment="rime-schema-array-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962943" comment="rime-schema-bopomofo-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962944" comment="rime-schema-cangjie-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962945" comment="rime-schema-cantonese-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962946" comment="rime-schema-combo-pinyin-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962947" comment="rime-schema-custom-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962948" comment="rime-schema-default-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962949" comment="rime-schema-double-pinyin-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962950" comment="rime-schema-emoji-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962951" comment="rime-schema-essay-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962952" comment="rime-schema-essay-simp-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962953" comment="rime-schema-extra-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962954" comment="rime-schema-ipa-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962955" comment="rime-schema-luna-pinyin-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962956" comment="rime-schema-middle-chinese-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962957" comment="rime-schema-pinyin-simp-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962958" comment="rime-schema-prelude-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962959" comment="rime-schema-quick-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962960" comment="rime-schema-scj-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962961" comment="rime-schema-soutzoe-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962962" comment="rime-schema-stenotype-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962963" comment="rime-schema-stroke-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962964" comment="rime-schema-terra-pinyin-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962965" comment="rime-schema-wubi-20230603+git.5fdd2d6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962966" comment="rime-schema-wugniu-20230603+git.5fdd2d6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253044" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20250115.01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20250115.01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962967" comment="google-osconfig-agent-20250115.01-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253045" version="1" class="patch">
	<metadata>
		<title>grafana-11.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11741" ref_url="https://www.suse.com/security/cve/CVE-2024-11741/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11741/">CVE-2024-11741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11741">CVE-2024-11741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962968" comment="grafana-11.3.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253046" version="1" class="patch">
	<metadata>
		<title>helm-3.17.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.17.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962969" comment="helm-3.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962970" comment="helm-bash-completion-3.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962971" comment="helm-fish-completion-3.17.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962972" comment="helm-zsh-completion-3.17.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253047" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20250204-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52813" ref_url="https://www.suse.com/security/cve/CVE-2024-52813/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20250204-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-04"/>
	<updated date="2025-02-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52813/">CVE-2024-52813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52813">CVE-2024-52813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962973" comment="cargo-audit-advisory-db-20250204-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253048" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11704" ref_url="https://www.suse.com/security/cve/CVE-2024-11704/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-04"/>
	<updated date="2025-02-04"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11704/">CVE-2024-11704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11704">CVE-2024-11704 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962974" comment="firefox-esr-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962975" comment="firefox-esr-branding-upstream-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962976" comment="firefox-esr-translations-common-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962977" comment="firefox-esr-translations-other-128.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253049" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250130T185858-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10846" ref_url="https://www.suse.com/security/cve/CVE-2024-10846/" source="CVE"/>
		<reference ref_id="CVE-2024-13484" ref_url="https://www.suse.com/security/cve/CVE-2024-13484/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2025-0750" ref_url="https://www.suse.com/security/cve/CVE-2025-0750/" source="CVE"/>
		<reference ref_id="CVE-2025-24369" ref_url="https://www.suse.com/security/cve/CVE-2025-24369/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250130T185858-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-04"/>
	<updated date="2025-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-10846/">CVE-2024-10846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10846">CVE-2024-10846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-13484/">CVE-2024-13484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13484">CVE-2024-13484 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0750/">CVE-2025-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0750">CVE-2025-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24369/">CVE-2025-24369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24369">CVE-2025-24369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962978" comment="govulncheck-vulndb-0.0.20250130T185858-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253050" version="1" class="patch">
	<metadata>
		<title>python311-scikit-learn-1.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28975" ref_url="https://www.suse.com/security/cve/CVE-2020-28975/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-scikit-learn-1.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-04"/>
	<updated date="2025-02-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28975/">CVE-2020-28975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28975">CVE-2020-28975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962979" comment="python311-scikit-learn-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962980" comment="python312-scikit-learn-1.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962981" comment="python313-scikit-learn-1.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253051" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-135.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<reference ref_id="CVE-2025-1018" ref_url="https://www.suse.com/security/cve/CVE-2025-1018/" source="CVE"/>
		<reference ref_id="CVE-2025-1019" ref_url="https://www.suse.com/security/cve/CVE-2025-1019/" source="CVE"/>
		<reference ref_id="CVE-2025-1020" ref_url="https://www.suse.com/security/cve/CVE-2025-1020/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-135.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1018/">CVE-2025-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1018">CVE-2025-1018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1019/">CVE-2025-1019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1019">CVE-2025-1019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1020/">CVE-2025-1020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1020">CVE-2025-1020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962982" comment="MozillaFirefox-135.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962983" comment="MozillaFirefox-branding-upstream-135.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962984" comment="MozillaFirefox-devel-135.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962985" comment="MozillaFirefox-translations-common-135.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962986" comment="MozillaFirefox-translations-other-135.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253052" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11704" ref_url="https://www.suse.com/security/cve/CVE-2024-11704/" source="CVE"/>
		<reference ref_id="CVE-2025-0510" ref_url="https://www.suse.com/security/cve/CVE-2025-0510/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1015" ref_url="https://www.suse.com/security/cve/CVE-2025-1015/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11704/">CVE-2024-11704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11704">CVE-2024-11704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-0510/">CVE-2025-0510 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0510">CVE-2025-0510 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1015/">CVE-2025-1015 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1015">CVE-2025-1015 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962987" comment="MozillaThunderbird-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962988" comment="MozillaThunderbird-openpgp-librnp-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962989" comment="MozillaThunderbird-translations-common-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962990" comment="MozillaThunderbird-translations-other-128.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253053" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250204T220613-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11741" ref_url="https://www.suse.com/security/cve/CVE-2024-11741/" source="CVE"/>
		<reference ref_id="CVE-2024-35177" ref_url="https://www.suse.com/security/cve/CVE-2024-35177/" source="CVE"/>
		<reference ref_id="CVE-2024-47770" ref_url="https://www.suse.com/security/cve/CVE-2024-47770/" source="CVE"/>
		<reference ref_id="CVE-2025-23216" ref_url="https://www.suse.com/security/cve/CVE-2025-23216/" source="CVE"/>
		<reference ref_id="CVE-2025-24371" ref_url="https://www.suse.com/security/cve/CVE-2025-24371/" source="CVE"/>
		<reference ref_id="CVE-2025-24376" ref_url="https://www.suse.com/security/cve/CVE-2025-24376/" source="CVE"/>
		<reference ref_id="CVE-2025-24784" ref_url="https://www.suse.com/security/cve/CVE-2025-24784/" source="CVE"/>
		<reference ref_id="CVE-2025-24883" ref_url="https://www.suse.com/security/cve/CVE-2025-24883/" source="CVE"/>
		<reference ref_id="CVE-2025-24884" ref_url="https://www.suse.com/security/cve/CVE-2025-24884/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250204T220613-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11741/">CVE-2024-11741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11741">CVE-2024-11741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35177/">CVE-2024-35177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35177">CVE-2024-35177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47770/">CVE-2024-47770 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47770">CVE-2024-47770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23216/">CVE-2025-23216 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23216">CVE-2025-23216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24371/">CVE-2025-24371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24371">CVE-2025-24371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24376/">CVE-2025-24376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24376">CVE-2025-24376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24784/">CVE-2025-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24784">CVE-2025-24784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24883/">CVE-2025-24883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24883">CVE-2025-24883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24884/">CVE-2025-24884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24884">CVE-2025-24884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962991" comment="govulncheck-vulndb-0.0.20250204T220613-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253054" version="1" class="patch">
	<metadata>
		<title>python311-cbor2-5.6.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-26134" ref_url="https://www.suse.com/security/cve/CVE-2024-26134/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cbor2-5.6.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26134/">CVE-2024-26134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26134">CVE-2024-26134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962992" comment="python311-cbor2-5.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962993" comment="python312-cbor2-5.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962994" comment="python313-cbor2-5.6.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253055" version="1" class="patch">
	<metadata>
		<title>weechat-4.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-46613" ref_url="https://www.suse.com/security/cve/CVE-2024-46613/" source="CVE"/>
		<description>
These are all security issues fixed in the weechat-4.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46613/">CVE-2024-46613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46613">CVE-2024-46613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962995" comment="weechat-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962996" comment="weechat-devel-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962997" comment="weechat-lang-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962998" comment="weechat-lua-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962999" comment="weechat-perl-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963000" comment="weechat-python-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963001" comment="weechat-ruby-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963002" comment="weechat-spell-4.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963003" comment="weechat-tcl-4.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253056" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24rc3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<reference ref_id="CVE-2025-22867" ref_url="https://www.suse.com/security/cve/CVE-2025-22867/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24rc3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-22867/">CVE-2025-22867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22867">CVE-2025-22867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963004" comment="go1.24-1.24rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963005" comment="go1.24-doc-1.24rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963006" comment="go1.24-libstd-1.24rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963007" comment="go1.24-race-1.24rc3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253057" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963008" comment="krb5-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963009" comment="krb5-32bit-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963010" comment="krb5-client-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963011" comment="krb5-devel-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963012" comment="krb5-devel-32bit-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963013" comment="krb5-plugin-kdb-ldap-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963014" comment="krb5-plugin-preauth-otp-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963015" comment="krb5-plugin-preauth-pkinit-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963016" comment="krb5-plugin-preauth-spake-1.21.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963017" comment="krb5-server-1.21.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253058" version="1" class="patch">
	<metadata>
		<title>nginx-1.27.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23419" ref_url="https://www.suse.com/security/cve/CVE-2025-23419/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.27.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23419/">CVE-2025-23419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23419">CVE-2025-23419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963018" comment="nginx-1.27.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963019" comment="nginx-source-1.27.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253059" version="1" class="patch">
	<metadata>
		<title>pam_pkcs11-0.6.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24032" ref_url="https://www.suse.com/security/cve/CVE-2025-24032/" source="CVE"/>
		<reference ref_id="CVE-2025-24531" ref_url="https://www.suse.com/security/cve/CVE-2025-24531/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_pkcs11-0.6.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24032/">CVE-2025-24032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24032">CVE-2025-24032 at NVD</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-24531/">CVE-2025-24531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24531">CVE-2025-24531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963020" comment="pam_pkcs11-0.6.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963021" comment="pam_pkcs11-devel-doc-0.6.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253060" version="1" class="patch">
	<metadata>
		<title>python311-cryptography-44.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cryptography-44.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963022" comment="python311-cryptography-44.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963023" comment="python312-cryptography-44.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963024" comment="python313-cryptography-44.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253061" version="1" class="patch">
	<metadata>
		<title>python311-cryptography-vectors-44.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cryptography-vectors-44.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963025" comment="python311-cryptography-vectors-44.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963026" comment="python312-cryptography-vectors-44.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963027" comment="python313-cryptography-vectors-44.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253062" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-http-cookie-1.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-http-cookie-1.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-06"/>
	<updated date="2025-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963028" comment="ruby3.4-rubygem-http-cookie-1.0.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253063" version="1" class="patch">
	<metadata>
		<title>chromedriver-133.0.6943.53-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0444" ref_url="https://www.suse.com/security/cve/CVE-2025-0444/" source="CVE"/>
		<reference ref_id="CVE-2025-0445" ref_url="https://www.suse.com/security/cve/CVE-2025-0445/" source="CVE"/>
		<reference ref_id="CVE-2025-0451" ref_url="https://www.suse.com/security/cve/CVE-2025-0451/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-133.0.6943.53-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-07"/>
	<updated date="2025-02-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0444/">CVE-2025-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0444">CVE-2025-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0445/">CVE-2025-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0445">CVE-2025-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0451/">CVE-2025-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0451">CVE-2025-0451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963029" comment="chromedriver-133.0.6943.53-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963030" comment="chromium-133.0.6943.53-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253064" version="1" class="patch">
	<metadata>
		<title>python311-numba-0.61.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-numba-0.61.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-07"/>
	<updated date="2025-02-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963031" comment="python311-numba-0.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963032" comment="python311-numba-devel-0.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963033" comment="python312-numba-0.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963034" comment="python312-numba-devel-0.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963035" comment="python313-numba-0.61.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963036" comment="python313-numba-devel-0.61.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253065" version="1" class="patch">
	<metadata>
		<title>flannel-0.26.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the flannel-0.26.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963037" comment="flannel-0.26.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963038" comment="flannel-k8s-yaml-0.26.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253066" version="1" class="patch">
	<metadata>
		<title>go1.22-1.22.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.22-1.22.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963039" comment="go1.22-1.22.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963040" comment="go1.22-doc-1.22.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963041" comment="go1.22-libstd-1.22.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963042" comment="go1.22-race-1.22.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253067" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963043" comment="go1.23-1.23.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963044" comment="go1.23-doc-1.23.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963045" comment="go1.23-libstd-1.23.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963046" comment="go1.23-race-1.23.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253068" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.26.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-3933" ref_url="https://www.suse.com/security/cve/CVE-2024-3933/" source="CVE"/>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.26.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-3933/">CVE-2024-3933 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3933">CVE-2024-3933 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963047" comment="java-11-openj9-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963048" comment="java-11-openj9-demo-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963049" comment="java-11-openj9-devel-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963050" comment="java-11-openj9-headless-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963051" comment="java-11-openj9-javadoc-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963052" comment="java-11-openj9-jmods-11.0.26.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963053" comment="java-11-openj9-src-11.0.26.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253069" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963054" comment="java-17-openj9-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963055" comment="java-17-openj9-demo-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963056" comment="java-17-openj9-devel-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963057" comment="java-17-openj9-headless-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963058" comment="java-17-openj9-javadoc-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963059" comment="java-17-openj9-jmods-17.0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963060" comment="java-17-openj9-src-17.0.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253070" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.442-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-3933" ref_url="https://www.suse.com/security/cve/CVE-2024-3933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.442-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-3933/">CVE-2024-3933 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3933">CVE-2024-3933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963061" comment="java-1_8_0-openj9-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963062" comment="java-1_8_0-openj9-accessibility-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963063" comment="java-1_8_0-openj9-demo-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963064" comment="java-1_8_0-openj9-devel-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963065" comment="java-1_8_0-openj9-headless-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963066" comment="java-1_8_0-openj9-javadoc-1.8.0.442-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963067" comment="java-1_8_0-openj9-src-1.8.0.442-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253071" version="1" class="patch">
	<metadata>
		<title>python311-3.11.11-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.11-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963068" comment="python311-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963069" comment="python311-32bit-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963070" comment="python311-curses-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963071" comment="python311-dbm-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963072" comment="python311-idle-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963073" comment="python311-tk-3.11.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963074" comment="python311-x86-64-v3-3.11.11-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253072" version="1" class="patch">
	<metadata>
		<title>python39-3.9.21-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.21-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-08"/>
	<updated date="2025-02-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963075" comment="python39-3.9.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963076" comment="python39-curses-3.9.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963077" comment="python39-dbm-3.9.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963078" comment="python39-idle-3.9.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963079" comment="python39-tk-3.9.21-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253073" version="1" class="patch">
	<metadata>
		<title>rime-schema-all-20230603+git.5fdd2d6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the rime-schema-all-20230603+git.5fdd2d6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963080" comment="rime-schema-all-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963081" comment="rime-schema-array-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963082" comment="rime-schema-bopomofo-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963083" comment="rime-schema-cangjie-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963084" comment="rime-schema-cantonese-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963085" comment="rime-schema-combo-pinyin-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963086" comment="rime-schema-custom-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963087" comment="rime-schema-default-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963088" comment="rime-schema-double-pinyin-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963089" comment="rime-schema-emoji-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963090" comment="rime-schema-essay-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963091" comment="rime-schema-essay-simp-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963092" comment="rime-schema-extra-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963093" comment="rime-schema-ipa-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963094" comment="rime-schema-luna-pinyin-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963095" comment="rime-schema-middle-chinese-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963096" comment="rime-schema-pinyin-simp-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963097" comment="rime-schema-prelude-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963098" comment="rime-schema-quick-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963099" comment="rime-schema-scj-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963100" comment="rime-schema-soutzoe-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963101" comment="rime-schema-stenotype-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963102" comment="rime-schema-stroke-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963103" comment="rime-schema-terra-pinyin-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963104" comment="rime-schema-wubi-20230603+git.5fdd2d6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963105" comment="rime-schema-wugniu-20230603+git.5fdd2d6-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253074" version="1" class="patch">
	<metadata>
		<title>fq-0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-44337" ref_url="https://www.suse.com/security/cve/CVE-2024-44337/" source="CVE"/>
		<description>
These are all security issues fixed in the fq-0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44337/">CVE-2024-44337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44337">CVE-2024-44337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963106" comment="fq-0.14.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253075" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250207T224745-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-47930" ref_url="https://www.suse.com/security/cve/CVE-2022-47930/" source="CVE"/>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<reference ref_id="CVE-2025-22867" ref_url="https://www.suse.com/security/cve/CVE-2025-22867/" source="CVE"/>
		<reference ref_id="CVE-2025-24366" ref_url="https://www.suse.com/security/cve/CVE-2025-24366/" source="CVE"/>
		<reference ref_id="CVE-2025-24786" ref_url="https://www.suse.com/security/cve/CVE-2025-24786/" source="CVE"/>
		<reference ref_id="CVE-2025-24787" ref_url="https://www.suse.com/security/cve/CVE-2025-24787/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250207T224745-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47930/">CVE-2022-47930 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47930">CVE-2022-47930 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-22867/">CVE-2025-22867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22867">CVE-2025-22867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24366/">CVE-2025-24366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24366">CVE-2025-24366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24786/">CVE-2025-24786 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24786">CVE-2025-24786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24787/">CVE-2025-24787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24787">CVE-2025-24787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963107" comment="govulncheck-vulndb-0.0.20250207T224745-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253076" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963108" comment="java-21-openj9-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963109" comment="java-21-openj9-demo-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963110" comment="java-21-openj9-devel-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963111" comment="java-21-openj9-headless-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963112" comment="java-21-openj9-javadoc-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963113" comment="java-21-openj9-jmods-21.0.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963114" comment="java-21-openj9-src-21.0.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253077" version="1" class="patch">
	<metadata>
		<title>libtasn1-6-32bit-4.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-6-32bit-4.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963115" comment="libtasn1-6-4.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963116" comment="libtasn1-6-32bit-4.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963117" comment="libtasn1-devel-4.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963118" comment="libtasn1-devel-32bit-4.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963119" comment="libtasn1-tools-4.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253078" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_3-0-3.3.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0650" ref_url="https://www.suse.com/security/cve/CVE-2025-0650/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_3-0-3.3.2-25.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0650/">CVE-2025-0650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0650">CVE-2025-0650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963120" comment="libopenvswitch-3_3-0-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963121" comment="libovn-24_03-0-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963122" comment="openvswitch-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963123" comment="openvswitch-devel-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963124" comment="openvswitch-doc-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963125" comment="openvswitch-ipsec-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963126" comment="openvswitch-pki-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963127" comment="openvswitch-test-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963128" comment="openvswitch-vtep-3.3.2-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963129" comment="ovn-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963130" comment="ovn-central-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963131" comment="ovn-devel-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963132" comment="ovn-doc-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963133" comment="ovn-docker-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963134" comment="ovn-host-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963135" comment="ovn-vtep-24.03.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963136" comment="python3-ovs-3.3.2-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253079" version="1" class="patch">
	<metadata>
		<title>python310-3.10.16-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.16-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963137" comment="python310-3.10.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963138" comment="python310-32bit-3.10.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963139" comment="python310-curses-3.10.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963140" comment="python310-dbm-3.10.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963141" comment="python310-idle-3.10.16-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963142" comment="python310-tk-3.10.16-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253080" version="1" class="patch">
	<metadata>
		<title>python312-3.12.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963143" comment="python312-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963144" comment="python312-32bit-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963145" comment="python312-curses-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963146" comment="python312-dbm-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963147" comment="python312-idle-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963148" comment="python312-tk-3.12.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963149" comment="python312-x86-64-v3-3.12.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253081" version="1" class="patch">
	<metadata>
		<title>python313-3.13.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963150" comment="python313-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963151" comment="python313-32bit-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963152" comment="python313-curses-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963153" comment="python313-dbm-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963154" comment="python313-idle-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963155" comment="python313-tk-3.13.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963156" comment="python313-x86-64-v3-3.13.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253082" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0~a4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0~a4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-09"/>
	<updated date="2025-02-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963157" comment="python314-3.14.0~a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963158" comment="python314-curses-3.14.0~a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963159" comment="python314-dbm-3.14.0~a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963160" comment="python314-idle-3.14.0~a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963161" comment="python314-tk-3.14.0~a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963162" comment="python314-x86-64-v3-3.14.0~a4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253083" version="1" class="patch">
	<metadata>
		<title>python312-mitmproxy-11.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24766" ref_url="https://www.suse.com/security/cve/CVE-2022-24766/" source="CVE"/>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2025-23217" ref_url="https://www.suse.com/security/cve/CVE-2025-23217/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-mitmproxy-11.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-10"/>
	<updated date="2025-02-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24766/">CVE-2022-24766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24766">CVE-2022-24766 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23217/">CVE-2025-23217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23217">CVE-2025-23217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963639" comment="python312-mitmproxy-11.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963640" comment="python313-mitmproxy-11.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253084" version="1" class="patch">
	<metadata>
		<title>crun-1.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24965" ref_url="https://www.suse.com/security/cve/CVE-2025-24965/" source="CVE"/>
		<description>
These are all security issues fixed in the crun-1.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2025-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24965/">CVE-2025-24965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24965">CVE-2025-24965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963641" comment="crun-1.20-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253085" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2025-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963642" comment="libmozjs-128-0-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963643" comment="mozjs128-128.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963644" comment="mozjs128-devel-128.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253086" version="1" class="patch">
	<metadata>
		<title>netty-4.1.118-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24970" ref_url="https://www.suse.com/security/cve/CVE-2025-24970/" source="CVE"/>
		<reference ref_id="CVE-2025-25193" ref_url="https://www.suse.com/security/cve/CVE-2025-25193/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.118-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2025-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-24970/">CVE-2025-24970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-25193/">CVE-2025-25193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963645" comment="netty-4.1.118-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963646" comment="netty-bom-4.1.118-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963647" comment="netty-javadoc-4.1.118-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963648" comment="netty-parent-4.1.118-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253087" version="1" class="patch">
	<metadata>
		<title>libngtcp2-16-1.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52811" ref_url="https://www.suse.com/security/cve/CVE-2024-52811/" source="CVE"/>
		<description>
These are all security issues fixed in the libngtcp2-16-1.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2025-02-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52811/">CVE-2024-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52811">CVE-2024-52811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963649" comment="libngtcp2-16-1.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963650" comment="libngtcp2-devel-1.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963651" comment="libngtcp2_crypto_gnutls8-1.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253088" version="1" class="patch">
	<metadata>
		<title>emacs-29.4-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-29.4-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964604" comment="emacs-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964605" comment="emacs-el-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964606" comment="emacs-eln-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964607" comment="emacs-games-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964608" comment="emacs-info-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964609" comment="emacs-nox-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964610" comment="emacs-x11-29.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964611" comment="etags-29.4-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253089" version="1" class="patch">
	<metadata>
		<title>grafana-11.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964612" comment="grafana-11.5.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253090" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-amdgpu-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-amdgpu-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964613" comment="kernel-firmware-amdgpu-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253091" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-ath10k-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-ath10k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964614" comment="kernel-firmware-ath10k-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253092" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-ath11k-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-ath11k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964615" comment="kernel-firmware-ath11k-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253093" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-ath12k-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820/" source="CVE"/>
		<reference ref_id="CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-ath12k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964616" comment="kernel-firmware-ath12k-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253094" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-atheros-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-atheros-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964617" comment="kernel-firmware-atheros-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253095" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-bluetooth-20250208-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-bluetooth-20250208-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964618" comment="kernel-firmware-bluetooth-20250208-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253096" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-bnx2-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-bnx2-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964619" comment="kernel-firmware-bnx2-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253097" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-brcm-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-brcm-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964620" comment="kernel-firmware-brcm-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253098" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-chelsio-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-chelsio-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964621" comment="kernel-firmware-chelsio-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253099" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-dpaa2-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-dpaa2-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964622" comment="kernel-firmware-dpaa2-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253100" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-i915-20250210-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-i915-20250210-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964623" comment="kernel-firmware-i915-20250210-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253101" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-intel-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-intel-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964624" comment="kernel-firmware-intel-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253102" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-iwlwifi-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-iwlwifi-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964625" comment="kernel-firmware-iwlwifi-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253103" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-liquidio-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-liquidio-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964626" comment="kernel-firmware-liquidio-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253104" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-marvell-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-marvell-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964627" comment="kernel-firmware-marvell-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253105" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-media-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-media-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964628" comment="kernel-firmware-media-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253106" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-mediatek-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-mediatek-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964629" comment="kernel-firmware-mediatek-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253107" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-mellanox-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-mellanox-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964630" comment="kernel-firmware-mellanox-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253108" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-mwifiex-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-mwifiex-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964631" comment="kernel-firmware-mwifiex-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253109" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-network-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-network-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964632" comment="kernel-firmware-network-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253110" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-nfp-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-nfp-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964633" comment="kernel-firmware-nfp-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253111" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-nvidia-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-nvidia-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964634" comment="kernel-firmware-nvidia-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253112" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-platform-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-platform-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964635" comment="kernel-firmware-platform-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253113" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-prestera-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-prestera-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964636" comment="kernel-firmware-prestera-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253114" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-qcom-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-qcom-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964637" comment="kernel-firmware-qcom-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253115" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-qlogic-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-qlogic-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964638" comment="kernel-firmware-qlogic-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253116" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-radeon-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-radeon-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964639" comment="kernel-firmware-radeon-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253117" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-realtek-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-realtek-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964640" comment="kernel-firmware-realtek-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253118" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-serial-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-serial-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964641" comment="kernel-firmware-serial-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253119" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-sound-20250210-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-sound-20250210-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964642" comment="kernel-firmware-sound-20250210-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253120" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-ti-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-ti-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964643" comment="kernel-firmware-ti-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253121" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-ueagle-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-ueagle-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964644" comment="kernel-firmware-ueagle-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253122" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-usb-network-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-usb-network-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964645" comment="kernel-firmware-usb-network-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253123" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12797" ref_url="https://www.suse.com/security/cve/CVE-2024-12797/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12797/">CVE-2024-12797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964646" comment="libopenssl-3-devel-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964647" comment="libopenssl-3-devel-32bit-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964648" comment="libopenssl-3-fips-provider-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964649" comment="libopenssl-3-fips-provider-32bit-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964650" comment="libopenssl-3-fips-provider-x86-64-v3-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964651" comment="libopenssl3-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964652" comment="libopenssl3-32bit-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964653" comment="libopenssl3-x86-64-v3-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964654" comment="openssl-3-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964655" comment="openssl-3-doc-3.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253124" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20250211-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31068" ref_url="https://www.suse.com/security/cve/CVE-2024-31068/" source="CVE"/>
		<reference ref_id="CVE-2024-36293" ref_url="https://www.suse.com/security/cve/CVE-2024-36293/" source="CVE"/>
		<reference ref_id="CVE-2024-37020" ref_url="https://www.suse.com/security/cve/CVE-2024-37020/" source="CVE"/>
		<reference ref_id="CVE-2024-39355" ref_url="https://www.suse.com/security/cve/CVE-2024-39355/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20250211-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-31068/">CVE-2024-31068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36293/">CVE-2024-36293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-37020/">CVE-2024-37020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39355/">CVE-2024-39355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964656" comment="ucode-intel-20250211-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253125" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20250206-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20250206-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964657" comment="kernel-firmware-all-20250206-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253126" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964658" comment="postgresql13-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964659" comment="postgresql13-contrib-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964660" comment="postgresql13-devel-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964661" comment="postgresql13-docs-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964662" comment="postgresql13-llvmjit-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964663" comment="postgresql13-llvmjit-devel-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964664" comment="postgresql13-plperl-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964665" comment="postgresql13-plpython-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964666" comment="postgresql13-pltcl-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964667" comment="postgresql13-server-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964668" comment="postgresql13-server-devel-13.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964669" comment="postgresql13-test-13.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253127" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964670" comment="postgresql14-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964671" comment="postgresql14-contrib-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964672" comment="postgresql14-devel-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964673" comment="postgresql14-docs-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964674" comment="postgresql14-llvmjit-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964675" comment="postgresql14-llvmjit-devel-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964676" comment="postgresql14-plperl-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964677" comment="postgresql14-plpython-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964678" comment="postgresql14-pltcl-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964679" comment="postgresql14-server-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964680" comment="postgresql14-server-devel-14.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964681" comment="postgresql14-test-14.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253128" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964682" comment="postgresql15-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964683" comment="postgresql15-contrib-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964684" comment="postgresql15-devel-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964685" comment="postgresql15-docs-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964686" comment="postgresql15-llvmjit-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964687" comment="postgresql15-llvmjit-devel-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964688" comment="postgresql15-plperl-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964689" comment="postgresql15-plpython-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964690" comment="postgresql15-pltcl-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964691" comment="postgresql15-server-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964692" comment="postgresql15-server-devel-15.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964693" comment="postgresql15-test-15.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253129" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964694" comment="postgresql16-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964695" comment="postgresql16-contrib-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964696" comment="postgresql16-devel-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964697" comment="postgresql16-docs-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964698" comment="postgresql16-llvmjit-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964699" comment="postgresql16-llvmjit-devel-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964700" comment="postgresql16-plperl-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964701" comment="postgresql16-plpython-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964702" comment="postgresql16-pltcl-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964703" comment="postgresql16-server-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964704" comment="postgresql16-server-devel-16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964705" comment="postgresql16-test-16.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253130" version="1" class="patch">
	<metadata>
		<title>curl-8.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0665" ref_url="https://www.suse.com/security/cve/CVE-2025-0665/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0665/">CVE-2025-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0665">CVE-2025-0665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964706" comment="curl-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964707" comment="curl-fish-completion-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964708" comment="curl-zsh-completion-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964709" comment="libcurl-devel-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964710" comment="libcurl-devel-32bit-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964711" comment="libcurl-devel-doc-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964712" comment="libcurl4-8.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964713" comment="libcurl4-32bit-8.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253131" version="1" class="patch">
	<metadata>
		<title>libecpg6-17.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964714" comment="libecpg6-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964715" comment="libecpg6-32bit-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964716" comment="libpq5-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964717" comment="libpq5-32bit-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964718" comment="postgresql17-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964719" comment="postgresql17-contrib-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964720" comment="postgresql17-devel-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964721" comment="postgresql17-docs-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964722" comment="postgresql17-llvmjit-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964723" comment="postgresql17-llvmjit-devel-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964724" comment="postgresql17-plperl-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964725" comment="postgresql17-plpython-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964726" comment="postgresql17-pltcl-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964727" comment="postgresql17-server-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964728" comment="postgresql17-server-devel-17.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964729" comment="postgresql17-test-17.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253132" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="CVE-2025-25184" ref_url="https://www.suse.com/security/cve/CVE-2025-25184/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25184/">CVE-2025-25184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25184">CVE-2025-25184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964730" comment="ruby3.4-rubygem-rack-2.2-2.2.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253133" version="1" class="patch">
	<metadata>
		<title>chromedriver-133.0.6943.98-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0995" ref_url="https://www.suse.com/security/cve/CVE-2025-0995/" source="CVE"/>
		<reference ref_id="CVE-2025-0996" ref_url="https://www.suse.com/security/cve/CVE-2025-0996/" source="CVE"/>
		<reference ref_id="CVE-2025-0997" ref_url="https://www.suse.com/security/cve/CVE-2025-0997/" source="CVE"/>
		<reference ref_id="CVE-2025-0998" ref_url="https://www.suse.com/security/cve/CVE-2025-0998/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-133.0.6943.98-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-15"/>
	<updated date="2025-02-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0995/">CVE-2025-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0995">CVE-2025-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0996/">CVE-2025-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0996">CVE-2025-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0997/">CVE-2025-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0997">CVE-2025-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0998/">CVE-2025-0998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0998">CVE-2025-0998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964731" comment="chromedriver-133.0.6943.98-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964732" comment="chromium-133.0.6943.98-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253134" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1057" ref_url="https://www.suse.com/security/cve/CVE-2025-1057/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1057/">CVE-2025-1057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1057">CVE-2025-1057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964733" comment="keylime-config-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964734" comment="keylime-firewalld-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964735" comment="keylime-logrotate-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964736" comment="keylime-registrar-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964737" comment="keylime-tenant-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964738" comment="keylime-tpm_cert_store-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964739" comment="keylime-verifier-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964740" comment="python311-keylime-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964741" comment="python312-keylime-7.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964742" comment="python313-keylime-7.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253135" version="1" class="patch">
	<metadata>
		<title>obs-service-cargo-4.5.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
These are all security issues fixed in the obs-service-cargo-4.5.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964743" comment="obs-service-cargo-4.5.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253136" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20250115.01-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20250115.01-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964744" comment="google-osconfig-agent-20250115.01-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253137" version="1" class="patch">
	<metadata>
		<title>kubernetes1.29-apiserver-1.29.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.29-apiserver-1.29.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964745" comment="kubernetes1.29-apiserver-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964746" comment="kubernetes1.29-client-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964747" comment="kubernetes1.29-client-bash-completion-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964748" comment="kubernetes1.29-client-common-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964749" comment="kubernetes1.29-client-fish-completion-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964750" comment="kubernetes1.29-controller-manager-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964751" comment="kubernetes1.29-kubeadm-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964752" comment="kubernetes1.29-kubelet-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964753" comment="kubernetes1.29-kubelet-common-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964754" comment="kubernetes1.29-proxy-1.29.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964755" comment="kubernetes1.29-scheduler-1.29.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253138" version="1" class="patch">
	<metadata>
		<title>kubernetes1.30-apiserver-1.30.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.30-apiserver-1.30.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964756" comment="kubernetes1.30-apiserver-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964757" comment="kubernetes1.30-client-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964758" comment="kubernetes1.30-client-bash-completion-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964759" comment="kubernetes1.30-client-common-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964760" comment="kubernetes1.30-client-fish-completion-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964761" comment="kubernetes1.30-controller-manager-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964762" comment="kubernetes1.30-kubeadm-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964763" comment="kubernetes1.30-kubelet-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964764" comment="kubernetes1.30-kubelet-common-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964765" comment="kubernetes1.30-proxy-1.30.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964766" comment="kubernetes1.30-scheduler-1.30.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253139" version="1" class="patch">
	<metadata>
		<title>kubernetes1.31-apiserver-1.31.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.31-apiserver-1.31.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964767" comment="kubernetes1.31-apiserver-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964768" comment="kubernetes1.31-client-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964769" comment="kubernetes1.31-client-bash-completion-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964770" comment="kubernetes1.31-client-common-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964771" comment="kubernetes1.31-client-fish-completion-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964772" comment="kubernetes1.31-controller-manager-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964773" comment="kubernetes1.31-kubeadm-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964774" comment="kubernetes1.31-kubelet-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964775" comment="kubernetes1.31-kubelet-common-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964776" comment="kubernetes1.31-proxy-1.31.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964777" comment="kubernetes1.31-scheduler-1.31.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253140" version="1" class="patch">
	<metadata>
		<title>kubernetes1.32-apiserver-1.32.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.32-apiserver-1.32.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964778" comment="kubernetes1.32-apiserver-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964779" comment="kubernetes1.32-client-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964780" comment="kubernetes1.32-client-bash-completion-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964781" comment="kubernetes1.32-client-common-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964782" comment="kubernetes1.32-client-fish-completion-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964783" comment="kubernetes1.32-controller-manager-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964784" comment="kubernetes1.32-kubeadm-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964785" comment="kubernetes1.32-kubelet-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964786" comment="kubernetes1.32-kubelet-common-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964787" comment="kubernetes1.32-proxy-1.32.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964788" comment="kubernetes1.32-scheduler-1.32.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253141" version="1" class="patch">
	<metadata>
		<title>openssh-9.9p2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465/" source="CVE"/>
		<reference ref_id="CVE-2025-26466" ref_url="https://www.suse.com/security/cve/CVE-2025-26466/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-9.9p2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26466/">CVE-2025-26466 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964789" comment="openssh-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964790" comment="openssh-cavs-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964791" comment="openssh-clients-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964792" comment="openssh-common-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964793" comment="openssh-fips-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964794" comment="openssh-helpers-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964795" comment="openssh-server-9.9p2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964796" comment="openssh-server-config-rootlogin-9.9p2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253142" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-grpc-1.70.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-grpc-1.70.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964797" comment="ruby3.4-rubygem-grpc-1.70.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253143" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45774" ref_url="https://www.suse.com/security/cve/CVE-2024-45774/" source="CVE"/>
		<reference ref_id="CVE-2024-45775" ref_url="https://www.suse.com/security/cve/CVE-2024-45775/" source="CVE"/>
		<reference ref_id="CVE-2024-45776" ref_url="https://www.suse.com/security/cve/CVE-2024-45776/" source="CVE"/>
		<reference ref_id="CVE-2024-45777" ref_url="https://www.suse.com/security/cve/CVE-2024-45777/" source="CVE"/>
		<reference ref_id="CVE-2024-45778" ref_url="https://www.suse.com/security/cve/CVE-2024-45778/" source="CVE"/>
		<reference ref_id="CVE-2024-45779" ref_url="https://www.suse.com/security/cve/CVE-2024-45779/" source="CVE"/>
		<reference ref_id="CVE-2024-45780" ref_url="https://www.suse.com/security/cve/CVE-2024-45780/" source="CVE"/>
		<reference ref_id="CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781/" source="CVE"/>
		<reference ref_id="CVE-2024-45782" ref_url="https://www.suse.com/security/cve/CVE-2024-45782/" source="CVE"/>
		<reference ref_id="CVE-2024-45783" ref_url="https://www.suse.com/security/cve/CVE-2024-45783/" source="CVE"/>
		<reference ref_id="CVE-2024-56737" ref_url="https://www.suse.com/security/cve/CVE-2024-56737/" source="CVE"/>
		<reference ref_id="CVE-2025-0622" ref_url="https://www.suse.com/security/cve/CVE-2025-0622/" source="CVE"/>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<reference ref_id="CVE-2025-0677" ref_url="https://www.suse.com/security/cve/CVE-2025-0677/" source="CVE"/>
		<reference ref_id="CVE-2025-0678" ref_url="https://www.suse.com/security/cve/CVE-2025-0678/" source="CVE"/>
		<reference ref_id="CVE-2025-0684" ref_url="https://www.suse.com/security/cve/CVE-2025-0684/" source="CVE"/>
		<reference ref_id="CVE-2025-0685" ref_url="https://www.suse.com/security/cve/CVE-2025-0685/" source="CVE"/>
		<reference ref_id="CVE-2025-0686" ref_url="https://www.suse.com/security/cve/CVE-2025-0686/" source="CVE"/>
		<reference ref_id="CVE-2025-0689" ref_url="https://www.suse.com/security/cve/CVE-2025-0689/" source="CVE"/>
		<reference ref_id="CVE-2025-0690" ref_url="https://www.suse.com/security/cve/CVE-2025-0690/" source="CVE"/>
		<reference ref_id="CVE-2025-1118" ref_url="https://www.suse.com/security/cve/CVE-2025-1118/" source="CVE"/>
		<reference ref_id="CVE-2025-1125" ref_url="https://www.suse.com/security/cve/CVE-2025-1125/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-35.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-19"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45774/">CVE-2024-45774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45774">CVE-2024-45774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45775/">CVE-2024-45775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45775">CVE-2024-45775 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45776/">CVE-2024-45776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45776">CVE-2024-45776 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45777/">CVE-2024-45777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45777">CVE-2024-45777 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-45778/">CVE-2024-45778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45778">CVE-2024-45778 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45779/">CVE-2024-45779 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45779">CVE-2024-45779 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45780/">CVE-2024-45780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45780">CVE-2024-45780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45782/">CVE-2024-45782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45782">CVE-2024-45782 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45783/">CVE-2024-45783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45783">CVE-2024-45783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56737/">CVE-2024-56737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56737">CVE-2024-56737 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0622/">CVE-2025-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0622">CVE-2025-0622 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0677/">CVE-2025-0677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0677">CVE-2025-0677 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0678/">CVE-2025-0678 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0678">CVE-2025-0678 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0684/">CVE-2025-0684 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0684">CVE-2025-0684 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0685/">CVE-2025-0685 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0685">CVE-2025-0685 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0686/">CVE-2025-0686 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0686">CVE-2025-0686 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0689/">CVE-2025-0689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0689">CVE-2025-0689 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0690/">CVE-2025-0690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0690">CVE-2025-0690 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1118/">CVE-2025-1118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1118">CVE-2025-1118 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-1125/">CVE-2025-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1125">CVE-2025-1125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964921" comment="grub2-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964922" comment="grub2-branding-upstream-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964923" comment="grub2-common-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964924" comment="grub2-i386-efi-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964925" comment="grub2-i386-efi-bls-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964926" comment="grub2-i386-efi-debug-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964927" comment="grub2-i386-efi-extras-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964928" comment="grub2-i386-pc-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964929" comment="grub2-i386-pc-debug-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964930" comment="grub2-i386-pc-extras-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964931" comment="grub2-snapper-plugin-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964932" comment="grub2-systemd-sleep-plugin-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964933" comment="grub2-x86_64-efi-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964934" comment="grub2-x86_64-efi-bls-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964935" comment="grub2-x86_64-efi-debug-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964936" comment="grub2-x86_64-efi-extras-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964937" comment="grub2-x86_64-xen-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964938" comment="grub2-x86_64-xen-debug-2.12-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964939" comment="grub2-x86_64-xen-extras-2.12-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253144" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-25472" ref_url="https://www.suse.com/security/cve/CVE-2025-25472/" source="CVE"/>
		<reference ref_id="CVE-2025-25474" ref_url="https://www.suse.com/security/cve/CVE-2025-25474/" source="CVE"/>
		<reference ref_id="CVE-2025-25475" ref_url="https://www.suse.com/security/cve/CVE-2025-25475/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25472/">CVE-2025-25472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25472">CVE-2025-25472 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25474/">CVE-2025-25474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25474">CVE-2025-25474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25475/">CVE-2025-25475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25475">CVE-2025-25475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965246" comment="dcmtk-3.6.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965247" comment="dcmtk-devel-3.6.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965248" comment="libdcmtk19-3.6.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253145" version="1" class="patch">
	<metadata>
		<title>java-23-openjdk-23.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
These are all security issues fixed in the java-23-openjdk-23.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965249" comment="java-23-openjdk-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965250" comment="java-23-openjdk-demo-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965251" comment="java-23-openjdk-devel-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965252" comment="java-23-openjdk-headless-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965253" comment="java-23-openjdk-javadoc-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965254" comment="java-23-openjdk-jmods-23.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965255" comment="java-23-openjdk-src-23.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253146" version="1" class="patch">
	<metadata>
		<title>luanti-5.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-35978" ref_url="https://www.suse.com/security/cve/CVE-2022-35978/" source="CVE"/>
		<description>
These are all security issues fixed in the luanti-5.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-35978/">CVE-2022-35978 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35978">CVE-2022-35978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965256" comment="luanti-5.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965257" comment="luanti-data-5.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965258" comment="luanti-lang-5.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965259" comment="luantiserver-5.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253147" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-11.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-11.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965260" comment="libmariadbd-devel-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965261" comment="libmariadbd19-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965262" comment="mariadb-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965263" comment="mariadb-bench-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965264" comment="mariadb-client-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965265" comment="mariadb-errormessages-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965266" comment="mariadb-galera-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965267" comment="mariadb-rpm-macros-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965268" comment="mariadb-test-11.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965269" comment="mariadb-tools-11.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253148" version="1" class="patch">
	<metadata>
		<title>proftpd-1.3.8c-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-57392" ref_url="https://www.suse.com/security/cve/CVE-2024-57392/" source="CVE"/>
		<description>
These are all security issues fixed in the proftpd-1.3.8c-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57392/">CVE-2024-57392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57392">CVE-2024-57392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965270" comment="proftpd-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965271" comment="proftpd-devel-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965272" comment="proftpd-doc-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965273" comment="proftpd-lang-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965274" comment="proftpd-ldap-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965275" comment="proftpd-mysql-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965276" comment="proftpd-pgsql-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965277" comment="proftpd-radius-1.3.8c-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965278" comment="proftpd-sqlite-1.3.8c-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253149" version="1" class="patch">
	<metadata>
		<title>radare2-5.9.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1378" ref_url="https://www.suse.com/security/cve/CVE-2025-1378/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.9.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1378/">CVE-2025-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1378">CVE-2025-1378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965279" comment="radare2-5.9.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965280" comment="radare2-devel-5.9.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965281" comment="radare2-zsh-completion-5.9.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253150" version="1" class="patch">
	<metadata>
		<title>chromedriver-133.0.6943.126-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0999" ref_url="https://www.suse.com/security/cve/CVE-2025-0999/" source="CVE"/>
		<reference ref_id="CVE-2025-1006" ref_url="https://www.suse.com/security/cve/CVE-2025-1006/" source="CVE"/>
		<reference ref_id="CVE-2025-1426" ref_url="https://www.suse.com/security/cve/CVE-2025-1426/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-133.0.6943.126-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0999/">CVE-2025-0999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0999">CVE-2025-0999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1006/">CVE-2025-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1006">CVE-2025-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1426/">CVE-2025-1426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1426">CVE-2025-1426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965806" comment="chromedriver-133.0.6943.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965807" comment="chromium-133.0.6943.126-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253151" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.13.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<reference ref_id="CVE-2025-27113" ref_url="https://www.suse.com/security/cve/CVE-2025-27113/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.13.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27113/">CVE-2025-27113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965808" comment="libxml2-2-2.13.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965809" comment="libxml2-2-32bit-2.13.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965810" comment="libxml2-devel-2.13.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965811" comment="libxml2-devel-32bit-2.13.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965812" comment="libxml2-doc-2.13.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965813" comment="libxml2-tools-2.13.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253152" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1492" ref_url="https://www.suse.com/security/cve/CVE-2025-1492/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1492/">CVE-2025-1492 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1492">CVE-2025-1492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965814" comment="libwireshark18-4.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965815" comment="libwiretap15-4.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965816" comment="libwsutil16-4.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965817" comment="wireshark-4.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965818" comment="wireshark-devel-4.4.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965819" comment="wireshark-ui-qt-4.4.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253153" version="1" class="patch">
	<metadata>
		<title>libprotobuf-lite28_3_0-28.3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-7254" ref_url="https://www.suse.com/security/cve/CVE-2024-7254/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-lite28_3_0-28.3-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-24"/>
	<updated date="2025-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-7254/">CVE-2024-7254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966275" comment="libprotobuf-lite28_3_0-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966276" comment="libprotobuf-lite28_3_0-32bit-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966277" comment="libprotobuf28_3_0-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966278" comment="libprotobuf28_3_0-32bit-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966279" comment="libprotoc28_3_0-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966280" comment="libprotoc28_3_0-32bit-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966281" comment="libutf8_range-28_3_0-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966282" comment="libutf8_range-28_3_0-32bit-28.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966283" comment="protobuf-devel-28.3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253154" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12361" ref_url="https://www.suse.com/security/cve/CVE-2024-12361/" source="CVE"/>
		<reference ref_id="CVE-2024-36613" ref_url="https://www.suse.com/security/cve/CVE-2024-36613/" source="CVE"/>
		<reference ref_id="CVE-2025-0518" ref_url="https://www.suse.com/security/cve/CVE-2025-0518/" source="CVE"/>
		<reference ref_id="CVE-2025-22919" ref_url="https://www.suse.com/security/cve/CVE-2025-22919/" source="CVE"/>
		<reference ref_id="CVE-2025-22921" ref_url="https://www.suse.com/security/cve/CVE-2025-22921/" source="CVE"/>
		<reference ref_id="CVE-2025-25473" ref_url="https://www.suse.com/security/cve/CVE-2025-25473/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-02-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12361/">CVE-2024-12361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12361">CVE-2024-12361 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36613/">CVE-2024-36613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613">CVE-2024-36613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0518/">CVE-2025-0518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0518">CVE-2025-0518 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22919/">CVE-2025-22919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22919">CVE-2025-22919 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22921/">CVE-2025-22921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22921">CVE-2025-22921 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25473/">CVE-2025-25473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25473">CVE-2025-25473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966326" comment="ffmpeg-4-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966327" comment="ffmpeg-4-libavcodec-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966328" comment="ffmpeg-4-libavdevice-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966329" comment="ffmpeg-4-libavfilter-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966330" comment="ffmpeg-4-libavformat-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966331" comment="ffmpeg-4-libavresample-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966332" comment="ffmpeg-4-libavutil-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966333" comment="ffmpeg-4-libpostproc-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966334" comment="ffmpeg-4-libswresample-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966335" comment="ffmpeg-4-libswscale-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966336" comment="ffmpeg-4-private-devel-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966337" comment="libavcodec58_134-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966338" comment="libavcodec58_134-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966339" comment="libavdevice58_13-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966340" comment="libavdevice58_13-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966341" comment="libavfilter7_110-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966342" comment="libavfilter7_110-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966343" comment="libavformat58_76-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966344" comment="libavformat58_76-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966345" comment="libavresample4_0-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966346" comment="libavresample4_0-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966347" comment="libavutil56_70-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966348" comment="libavutil56_70-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966349" comment="libpostproc55_9-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966350" comment="libpostproc55_9-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966351" comment="libswresample3_9-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966352" comment="libswresample3_9-32bit-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966353" comment="libswscale5_9-4.4.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966354" comment="libswscale5_9-32bit-4.4.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253155" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12361" ref_url="https://www.suse.com/security/cve/CVE-2024-12361/" source="CVE"/>
		<reference ref_id="CVE-2024-35365" ref_url="https://www.suse.com/security/cve/CVE-2024-35365/" source="CVE"/>
		<reference ref_id="CVE-2024-36613" ref_url="https://www.suse.com/security/cve/CVE-2024-36613/" source="CVE"/>
		<reference ref_id="CVE-2025-0518" ref_url="https://www.suse.com/security/cve/CVE-2025-0518/" source="CVE"/>
		<reference ref_id="CVE-2025-22919" ref_url="https://www.suse.com/security/cve/CVE-2025-22919/" source="CVE"/>
		<reference ref_id="CVE-2025-22920" ref_url="https://www.suse.com/security/cve/CVE-2025-22920/" source="CVE"/>
		<reference ref_id="CVE-2025-22921" ref_url="https://www.suse.com/security/cve/CVE-2025-22921/" source="CVE"/>
		<reference ref_id="CVE-2025-25473" ref_url="https://www.suse.com/security/cve/CVE-2025-25473/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-02-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12361/">CVE-2024-12361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12361">CVE-2024-12361 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35365/">CVE-2024-35365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35365">CVE-2024-35365 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36613/">CVE-2024-36613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613">CVE-2024-36613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0518/">CVE-2025-0518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0518">CVE-2025-0518 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22919/">CVE-2025-22919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22919">CVE-2025-22919 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22920/">CVE-2025-22920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22920">CVE-2025-22920 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22921/">CVE-2025-22921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22921">CVE-2025-22921 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25473/">CVE-2025-25473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25473">CVE-2025-25473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966355" comment="ffmpeg-7-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966356" comment="ffmpeg-7-libavcodec-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966357" comment="ffmpeg-7-libavdevice-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966358" comment="ffmpeg-7-libavfilter-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966359" comment="ffmpeg-7-libavformat-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966360" comment="ffmpeg-7-libavutil-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966361" comment="ffmpeg-7-libpostproc-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966362" comment="ffmpeg-7-libswresample-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966363" comment="ffmpeg-7-libswscale-devel-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966364" comment="libavcodec61-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966365" comment="libavcodec61-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966366" comment="libavdevice61-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966367" comment="libavdevice61-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966368" comment="libavfilter10-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966369" comment="libavfilter10-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966370" comment="libavformat61-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966371" comment="libavformat61-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966372" comment="libavutil59-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966373" comment="libavutil59-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966374" comment="libpostproc58-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966375" comment="libpostproc58-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966376" comment="libswresample5-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966377" comment="libswresample5-32bit-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966378" comment="libswscale8-7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966379" comment="libswscale8-32bit-7.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253156" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<reference ref_id="CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966380" comment="gnutls-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966381" comment="libgnutls-dane-devel-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966382" comment="libgnutls-dane0-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966383" comment="libgnutls-devel-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966384" comment="libgnutls-devel-32bit-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966385" comment="libgnutls-devel-doc-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966386" comment="libgnutls30-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966387" comment="libgnutls30-32bit-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966388" comment="libgnutlsxx-devel-3.8.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966389" comment="libgnutlsxx30-3.8.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253157" version="1" class="patch">
	<metadata>
		<title>libiniparser-devel-4.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0633" ref_url="https://www.suse.com/security/cve/CVE-2025-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the libiniparser-devel-4.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-02-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0633/">CVE-2025-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0633">CVE-2025-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966390" comment="libiniparser-devel-4.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966391" comment="libiniparser4-4.2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253158" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966607" comment="libX11-6-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966608" comment="libX11-6-32bit-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966609" comment="libX11-data-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966610" comment="libX11-devel-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966611" comment="libX11-devel-32bit-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966612" comment="libX11-devel-doc-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966613" comment="libX11-xcb1-1.8.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966614" comment="libX11-xcb1-32bit-1.8.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253159" version="1" class="patch">
	<metadata>
		<title>libxkbfile-devel-1.1.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbfile-devel-1.1.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966615" comment="libxkbfile-devel-1.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966616" comment="libxkbfile-devel-32bit-1.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966617" comment="libxkbfile1-1.1.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966618" comment="libxkbfile1-32bit-1.1.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253160" version="1" class="patch">
	<metadata>
		<title>teleport-17.2.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.2.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966619" comment="teleport-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966620" comment="teleport-bash-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966621" comment="teleport-fdpass-teleport-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966622" comment="teleport-tbot-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966623" comment="teleport-tbot-bash-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966624" comment="teleport-tbot-zsh-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966625" comment="teleport-tctl-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966626" comment="teleport-tctl-bash-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966627" comment="teleport-tctl-zsh-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966628" comment="teleport-tsh-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966629" comment="teleport-tsh-bash-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966630" comment="teleport-tsh-zsh-completion-17.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966631" comment="teleport-zsh-completion-17.2.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253161" version="1" class="patch">
	<metadata>
		<title>trivy-0.59.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.59.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966632" comment="trivy-0.59.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253162" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966633" comment="xorg-x11-server-21.1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966634" comment="xorg-x11-server-Xvfb-21.1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966635" comment="xorg-x11-server-extra-21.1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966636" comment="xorg-x11-server-sdk-21.1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966637" comment="xorg-x11-server-source-21.1.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966638" comment="xorg-x11-server-wrapper-21.1.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253163" version="1" class="patch">
	<metadata>
		<title>xwayland-24.1.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-24.1.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966639" comment="xwayland-24.1.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966640" comment="xwayland-devel-24.1.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253164" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250226T025151-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250226T025151-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-27"/>
	<updated date="2025-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966655" comment="govulncheck-vulndb-0.0.20250226T025151-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253165" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.7.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-57970" ref_url="https://www.suse.com/security/cve/CVE-2024-57970/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.7.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-27"/>
	<updated date="2025-02-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57970/">CVE-2024-57970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57970">CVE-2024-57970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966656" comment="bsdtar-3.7.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966657" comment="libarchive-devel-3.7.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966658" comment="libarchive13-3.7.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966659" comment="libarchive13-32bit-3.7.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253166" version="1" class="patch">
	<metadata>
		<title>python311-jupyter-server-2.14.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29241" ref_url="https://www.suse.com/security/cve/CVE-2022-29241/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jupyter-server-2.14.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-27"/>
	<updated date="2025-02-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29241/">CVE-2022-29241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29241">CVE-2022-29241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966660" comment="python311-jupyter-server-2.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966661" comment="python311-jupyter-server-test-2.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966662" comment="python312-jupyter-server-2.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966663" comment="python312-jupyter-server-test-2.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966664" comment="python313-jupyter-server-2.14.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966665" comment="python313-jupyter-server-test-2.14.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253167" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin-5.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24529" ref_url="https://www.suse.com/security/cve/CVE-2025-24529/" source="CVE"/>
		<reference ref_id="CVE-2025-24530" ref_url="https://www.suse.com/security/cve/CVE-2025-24530/" source="CVE"/>
		<description>
These are all security issues fixed in the phpMyAdmin-5.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-28"/>
	<updated date="2025-02-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24529/">CVE-2025-24529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24529">CVE-2025-24529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24530/">CVE-2025-24530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24530">CVE-2025-24530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966929" comment="phpMyAdmin-5.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966930" comment="phpMyAdmin-apache-5.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966931" comment="phpMyAdmin-lang-5.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253168" version="1" class="patch">
	<metadata>
		<title>python311-spotipy-2.25.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27154" ref_url="https://www.suse.com/security/cve/CVE-2025-27154/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-spotipy-2.25.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-28"/>
	<updated date="2025-02-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27154/">CVE-2025-27154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27154">CVE-2025-27154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966932" comment="python311-spotipy-2.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966933" comment="python312-spotipy-2.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966934" comment="python313-spotipy-2.25.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253169" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-33.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0611" ref_url="https://www.suse.com/security/cve/CVE-2025-0611/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-33.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-01"/>
	<updated date="2025-03-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0611/">CVE-2025-0611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0611">CVE-2025-0611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966935" comment="nodejs-electron-33.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966936" comment="nodejs-electron-devel-33.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966937" comment="nodejs-electron-doc-33.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253170" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35368" ref_url="https://www.suse.com/security/cve/CVE-2024-35368/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.5-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-02"/>
	<updated date="2025-03-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35368/">CVE-2024-35368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35368">CVE-2024-35368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966938" comment="ffmpeg-4-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966939" comment="ffmpeg-4-libavcodec-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966940" comment="ffmpeg-4-libavdevice-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966941" comment="ffmpeg-4-libavfilter-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966942" comment="ffmpeg-4-libavformat-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966943" comment="ffmpeg-4-libavresample-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966944" comment="ffmpeg-4-libavutil-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966945" comment="ffmpeg-4-libpostproc-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966946" comment="ffmpeg-4-libswresample-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966947" comment="ffmpeg-4-libswscale-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966948" comment="ffmpeg-4-private-devel-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966949" comment="libavcodec58_134-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966950" comment="libavcodec58_134-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966951" comment="libavdevice58_13-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966952" comment="libavdevice58_13-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966953" comment="libavfilter7_110-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966954" comment="libavfilter7_110-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966955" comment="libavformat58_76-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966956" comment="libavformat58_76-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966957" comment="libavresample4_0-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966958" comment="libavresample4_0-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966959" comment="libavutil56_70-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966960" comment="libavutil56_70-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966961" comment="libpostproc55_9-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966962" comment="libpostproc55_9-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966963" comment="libswresample3_9-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966964" comment="libswresample3_9-32bit-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966965" comment="libswscale5_9-4.4.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966966" comment="libswscale5_9-32bit-4.4.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253171" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-35368" ref_url="https://www.suse.com/security/cve/CVE-2024-35368/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-02"/>
	<updated date="2025-03-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35368/">CVE-2024-35368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35368">CVE-2024-35368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966967" comment="ffmpeg-7-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966968" comment="ffmpeg-7-libavcodec-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966969" comment="ffmpeg-7-libavdevice-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966970" comment="ffmpeg-7-libavfilter-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966971" comment="ffmpeg-7-libavformat-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966972" comment="ffmpeg-7-libavutil-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966973" comment="ffmpeg-7-libpostproc-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966974" comment="ffmpeg-7-libswresample-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966975" comment="ffmpeg-7-libswscale-devel-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966976" comment="libavcodec61-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966977" comment="libavcodec61-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966978" comment="libavdevice61-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966979" comment="libavdevice61-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966980" comment="libavfilter10-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966981" comment="libavfilter10-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966982" comment="libavformat61-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966983" comment="libavformat61-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966984" comment="libavutil59-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966985" comment="libavutil59-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966986" comment="libpostproc58-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966987" comment="libpostproc58-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966988" comment="libswresample5-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966989" comment="libswresample5-32bit-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966990" comment="libswscale8-7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966991" comment="libswscale8-32bit-7.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253172" version="1" class="patch">
	<metadata>
		<title>glibc-2.41-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.41-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-02"/>
	<updated date="2025-03-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966992" comment="glibc-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966993" comment="glibc-devel-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966994" comment="glibc-devel-static-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966995" comment="glibc-extra-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966996" comment="glibc-gconv-modules-extra-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966997" comment="glibc-html-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966998" comment="glibc-i18ndata-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966999" comment="glibc-info-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967000" comment="glibc-lang-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967001" comment="glibc-locale-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967002" comment="glibc-locale-base-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967003" comment="glibc-profile-2.41-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967004" comment="libnsl1-2.41-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253173" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43097" ref_url="https://www.suse.com/security/cve/CVE-2024-43097/" source="CVE"/>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-04"/>
	<updated date="2025-03-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43097/">CVE-2024-43097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43097">CVE-2024-43097 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967144" comment="firefox-esr-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967145" comment="firefox-esr-branding-upstream-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967146" comment="firefox-esr-translations-common-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967147" comment="firefox-esr-translations-other-128.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253174" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43097" ref_url="https://www.suse.com/security/cve/CVE-2024-43097/" source="CVE"/>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43097/">CVE-2024-43097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43097">CVE-2024-43097 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967422" comment="MozillaThunderbird-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967423" comment="MozillaThunderbird-openpgp-librnp-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967424" comment="MozillaThunderbird-translations-common-128.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967425" comment="MozillaThunderbird-translations-other-128.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253175" version="1" class="patch">
	<metadata>
		<title>chromedriver-134.0.6998.35-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1914" ref_url="https://www.suse.com/security/cve/CVE-2025-1914/" source="CVE"/>
		<reference ref_id="CVE-2025-1915" ref_url="https://www.suse.com/security/cve/CVE-2025-1915/" source="CVE"/>
		<reference ref_id="CVE-2025-1916" ref_url="https://www.suse.com/security/cve/CVE-2025-1916/" source="CVE"/>
		<reference ref_id="CVE-2025-1917" ref_url="https://www.suse.com/security/cve/CVE-2025-1917/" source="CVE"/>
		<reference ref_id="CVE-2025-1918" ref_url="https://www.suse.com/security/cve/CVE-2025-1918/" source="CVE"/>
		<reference ref_id="CVE-2025-1919" ref_url="https://www.suse.com/security/cve/CVE-2025-1919/" source="CVE"/>
		<reference ref_id="CVE-2025-1921" ref_url="https://www.suse.com/security/cve/CVE-2025-1921/" source="CVE"/>
		<reference ref_id="CVE-2025-1922" ref_url="https://www.suse.com/security/cve/CVE-2025-1922/" source="CVE"/>
		<reference ref_id="CVE-2025-1923" ref_url="https://www.suse.com/security/cve/CVE-2025-1923/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-134.0.6998.35-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1914/">CVE-2025-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1914">CVE-2025-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1915/">CVE-2025-1915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1915">CVE-2025-1915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1916/">CVE-2025-1916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1916">CVE-2025-1916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1917/">CVE-2025-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1917">CVE-2025-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1918/">CVE-2025-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1918">CVE-2025-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1919/">CVE-2025-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1919">CVE-2025-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1921/">CVE-2025-1921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1921">CVE-2025-1921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1922/">CVE-2025-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1922">CVE-2025-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1923/">CVE-2025-1923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1923">CVE-2025-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967426" comment="chromedriver-134.0.6998.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967427" comment="chromium-134.0.6998.35-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253176" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967428" comment="go1.23-1.23.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967429" comment="go1.23-doc-1.23.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967430" comment="go1.23-libstd-1.23.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967431" comment="go1.23-race-1.23.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253177" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967432" comment="go1.24-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967433" comment="go1.24-doc-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967434" comment="go1.24-libstd-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967435" comment="go1.24-race-1.24.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253178" version="1" class="patch">
	<metadata>
		<title>grype-0.88.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-0.88.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967436" comment="grype-0.88.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967437" comment="grype-bash-completion-0.88.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967438" comment="grype-fish-completion-0.88.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967439" comment="grype-zsh-completion-0.88.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253179" version="1" class="patch">
	<metadata>
		<title>python311-GitPython-3.1.44-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24439" ref_url="https://www.suse.com/security/cve/CVE-2022-24439/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-GitPython-3.1.44-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24439/">CVE-2022-24439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24439">CVE-2022-24439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967440" comment="python311-GitPython-3.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967441" comment="python312-GitPython-3.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967442" comment="python313-GitPython-3.1.44-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253180" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27111" ref_url="https://www.suse.com/security/cve/CVE-2025-27111/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27111/">CVE-2025-27111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27111">CVE-2025-27111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967443" comment="ruby3.4-rubygem-rack-2.2-2.2.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253181" version="1" class="patch">
	<metadata>
		<title>xen-4.20.0_08-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1713" ref_url="https://www.suse.com/security/cve/CVE-2025-1713/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.0_08-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-1713/">CVE-2025-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1713">CVE-2025-1713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967444" comment="xen-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967445" comment="xen-devel-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967446" comment="xen-doc-html-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967447" comment="xen-libs-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967448" comment="xen-tools-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967449" comment="xen-tools-domU-4.20.0_08-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967450" comment="xen-tools-xendomains-wait-disk-4.20.0_08-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253182" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-136.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-9956" ref_url="https://www.suse.com/security/cve/CVE-2024-9956/" source="CVE"/>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<reference ref_id="CVE-2025-1939" ref_url="https://www.suse.com/security/cve/CVE-2025-1939/" source="CVE"/>
		<reference ref_id="CVE-2025-1940" ref_url="https://www.suse.com/security/cve/CVE-2025-1940/" source="CVE"/>
		<reference ref_id="CVE-2025-1941" ref_url="https://www.suse.com/security/cve/CVE-2025-1941/" source="CVE"/>
		<reference ref_id="CVE-2025-1942" ref_url="https://www.suse.com/security/cve/CVE-2025-1942/" source="CVE"/>
		<reference ref_id="CVE-2025-1943" ref_url="https://www.suse.com/security/cve/CVE-2025-1943/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-136.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-07"/>
	<updated date="2025-03-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9956/">CVE-2024-9956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9956">CVE-2024-9956 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1939/">CVE-2025-1939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1939">CVE-2025-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1940/">CVE-2025-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1940">CVE-2025-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1941/">CVE-2025-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1941">CVE-2025-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1942/">CVE-2025-1942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1942">CVE-2025-1942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1943/">CVE-2025-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1943">CVE-2025-1943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967453" comment="MozillaFirefox-136.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967454" comment="MozillaFirefox-branding-upstream-136.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967455" comment="MozillaFirefox-devel-136.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967456" comment="MozillaFirefox-translations-common-136.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967457" comment="MozillaFirefox-translations-other-136.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253183" version="1" class="patch">
	<metadata>
		<title>less-668-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
These are all security issues fixed in the less-668-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-07"/>
	<updated date="2025-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967458" comment="less-668-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253184" version="1" class="patch">
	<metadata>
		<title>teleport-17.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-07"/>
	<updated date="2025-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967459" comment="teleport-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967460" comment="teleport-bash-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967461" comment="teleport-fdpass-teleport-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967462" comment="teleport-tbot-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967463" comment="teleport-tbot-bash-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967464" comment="teleport-tbot-zsh-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967465" comment="teleport-tctl-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967466" comment="teleport-tctl-bash-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967467" comment="teleport-tctl-zsh-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967468" comment="teleport-tsh-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967469" comment="teleport-tsh-bash-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967470" comment="teleport-tsh-zsh-completion-17.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967471" comment="teleport-zsh-completion-17.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253185" version="1" class="patch">
	<metadata>
		<title>gerbera-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23386" ref_url="https://www.suse.com/security/cve/CVE-2025-23386/" source="CVE"/>
		<description>
These are all security issues fixed in the gerbera-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-10"/>
	<updated date="2025-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23386/">CVE-2025-23386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23386">CVE-2025-23386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967542" comment="gerbera-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967543" comment="gerbera-apache-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967544" comment="gerbera-nginx-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253186" version="1" class="patch">
	<metadata>
		<title>grafana-11.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-10"/>
	<updated date="2025-03-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967545" comment="grafana-11.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253187" version="1" class="patch">
	<metadata>
		<title>libtinyxml2-10-10.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50615" ref_url="https://www.suse.com/security/cve/CVE-2024-50615/" source="CVE"/>
		<description>
These are all security issues fixed in the libtinyxml2-10-10.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-10"/>
	<updated date="2025-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50615/">CVE-2024-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50615">CVE-2024-50615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967546" comment="libtinyxml2-10-10.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967547" comment="tinyxml2-devel-10.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253188" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.3.1957.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.3.1957.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967830" comment="amazon-ssm-agent-3.3.1957.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253189" version="1" class="patch">
	<metadata>
		<title>fake-gcs-server-1.52.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the fake-gcs-server-1.52.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967831" comment="fake-gcs-server-1.52.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253190" version="1" class="patch">
	<metadata>
		<title>google-guest-agent-20250116.00-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the google-guest-agent-20250116.00-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967832" comment="google-guest-agent-20250116.00-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253191" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20250115.01-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20250115.01-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967833" comment="google-osconfig-agent-20250115.01-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253192" version="1" class="patch">
	<metadata>
		<title>podman-5.4.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.4.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967834" comment="podman-5.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967835" comment="podman-docker-5.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967836" comment="podman-remote-5.4.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967837" comment="podmansh-5.4.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253193" version="1" class="patch">
	<metadata>
		<title>python311-3.11.11-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1795" ref_url="https://www.suse.com/security/cve/CVE-2025-1795/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.11-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1795/">CVE-2025-1795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1795">CVE-2025-1795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967838" comment="python311-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967839" comment="python311-32bit-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967840" comment="python311-curses-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967841" comment="python311-dbm-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967842" comment="python311-idle-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967843" comment="python311-tk-3.11.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967844" comment="python311-x86-64-v3-3.11.11-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253194" version="1" class="patch">
	<metadata>
		<title>python312-3.12.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1795" ref_url="https://www.suse.com/security/cve/CVE-2025-1795/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1795/">CVE-2025-1795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1795">CVE-2025-1795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967845" comment="python312-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967846" comment="python312-32bit-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967847" comment="python312-curses-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967848" comment="python312-dbm-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967849" comment="python312-idle-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967850" comment="python312-tk-3.12.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967851" comment="python312-x86-64-v3-3.12.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253195" version="1" class="patch">
	<metadata>
		<title>restic-0.17.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the restic-0.17.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967852" comment="restic-0.17.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967853" comment="restic-bash-completion-0.17.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967854" comment="restic-zsh-completion-0.17.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253196" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-3.1.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="CVE-2025-25184" ref_url="https://www.suse.com/security/cve/CVE-2025-25184/" source="CVE"/>
		<reference ref_id="CVE-2025-27111" ref_url="https://www.suse.com/security/cve/CVE-2025-27111/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-3.1.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25184/">CVE-2025-25184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25184">CVE-2025-25184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27111/">CVE-2025-27111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27111">CVE-2025-27111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967855" comment="ruby3.4-rubygem-rack-3.1.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253197" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27610" ref_url="https://www.suse.com/security/cve/CVE-2025-27610/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27610/">CVE-2025-27610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27610">CVE-2025-27610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967856" comment="ruby3.4-rubygem-rack-2.2-2.2.13-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253198" version="1" class="patch">
	<metadata>
		<title>distrobuilder-3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the distrobuilder-3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967903" comment="distrobuilder-3.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253199" version="1" class="patch">
	<metadata>
		<title>dool-1.3.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the dool-1.3.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3894">CVE-2009-3894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967904" comment="dool-1.3.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253200" version="1" class="patch">
	<metadata>
		<title>erlang-27.2.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26618" ref_url="https://www.suse.com/security/cve/CVE-2025-26618/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-27.2.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26618/">CVE-2025-26618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26618">CVE-2025-26618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967905" comment="erlang-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967906" comment="erlang-debugger-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967907" comment="erlang-debugger-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967908" comment="erlang-dialyzer-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967909" comment="erlang-dialyzer-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967910" comment="erlang-diameter-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967911" comment="erlang-diameter-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967912" comment="erlang-doc-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967913" comment="erlang-epmd-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967914" comment="erlang-et-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967915" comment="erlang-et-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967916" comment="erlang-jinterface-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967917" comment="erlang-jinterface-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967918" comment="erlang-observer-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967919" comment="erlang-observer-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967920" comment="erlang-reltool-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967921" comment="erlang-reltool-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967922" comment="erlang-src-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967923" comment="erlang-wx-27.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967924" comment="erlang-wx-src-27.2.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253201" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2022-48434" ref_url="https://www.suse.com/security/cve/CVE-2022-48434/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.5-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22021">CVE-2020-22021 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48434/">CVE-2022-48434 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48434">CVE-2022-48434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967925" comment="ffmpeg-4-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967926" comment="ffmpeg-4-libavcodec-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967927" comment="ffmpeg-4-libavdevice-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967928" comment="ffmpeg-4-libavfilter-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967929" comment="ffmpeg-4-libavformat-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967930" comment="ffmpeg-4-libavresample-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967931" comment="ffmpeg-4-libavutil-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967932" comment="ffmpeg-4-libpostproc-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967933" comment="ffmpeg-4-libswresample-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967934" comment="ffmpeg-4-libswscale-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967935" comment="ffmpeg-4-private-devel-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967936" comment="libavcodec58_134-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967937" comment="libavcodec58_134-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967938" comment="libavdevice58_13-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967939" comment="libavdevice58_13-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967940" comment="libavfilter7_110-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967941" comment="libavfilter7_110-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967942" comment="libavformat58_76-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967943" comment="libavformat58_76-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967944" comment="libavresample4_0-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967945" comment="libavresample4_0-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967946" comment="libavutil56_70-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967947" comment="libavutil56_70-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967948" comment="libpostproc55_9-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967949" comment="libpostproc55_9-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967950" comment="libswresample3_9-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967951" comment="libswresample3_9-32bit-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967952" comment="libswscale5_9-4.4.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967953" comment="libswscale5_9-32bit-4.4.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253202" version="1" class="patch">
	<metadata>
		<title>forgejo-runner-6.2.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-runner-6.2.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967954" comment="forgejo-runner-6.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967955" comment="forgejo-runner-bash-completion-6.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967956" comment="forgejo-runner-fish-completion-6.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967957" comment="forgejo-runner-zsh-completion-6.2.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253203" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.7.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1632" ref_url="https://www.suse.com/security/cve/CVE-2025-1632/" source="CVE"/>
		<reference ref_id="CVE-2025-25724" ref_url="https://www.suse.com/security/cve/CVE-2025-25724/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.7.7-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1632/">CVE-2025-1632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1632">CVE-2025-1632 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25724/">CVE-2025-25724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967958" comment="bsdtar-3.7.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967959" comment="libarchive-devel-3.7.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967960" comment="libarchive13-3.7.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967961" comment="libarchive13-32bit-3.7.7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253204" version="1" class="patch">
	<metadata>
		<title>nebula-1.9.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the nebula-1.9.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967962" comment="nebula-1.9.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967963" comment="nebula-cert-1.9.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253205" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-33.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0445" ref_url="https://www.suse.com/security/cve/CVE-2025-0445/" source="CVE"/>
		<reference ref_id="CVE-2025-0995" ref_url="https://www.suse.com/security/cve/CVE-2025-0995/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-33.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0445/">CVE-2025-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0445">CVE-2025-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0995/">CVE-2025-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0995">CVE-2025-0995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967964" comment="nodejs-electron-33.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967965" comment="nodejs-electron-devel-33.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967966" comment="nodejs-electron-doc-33.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253206" version="1" class="patch">
	<metadata>
		<title>python313-3.13.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1795" ref_url="https://www.suse.com/security/cve/CVE-2025-1795/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1795/">CVE-2025-1795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1795">CVE-2025-1795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967967" comment="python313-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967968" comment="python313-32bit-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967969" comment="python313-curses-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967970" comment="python313-dbm-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967971" comment="python313-idle-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967972" comment="python313-tk-3.13.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967973" comment="python313-x86-64-v3-3.13.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253207" version="1" class="patch">
	<metadata>
		<title>stalld-1.19.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54159" ref_url="https://www.suse.com/security/cve/CVE-2024-54159/" source="CVE"/>
		<description>
These are all security issues fixed in the stalld-1.19.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54159/">CVE-2024-54159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54159">CVE-2024-54159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967974" comment="stalld-1.19.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253208" version="1" class="patch">
	<metadata>
		<title>tailscale-1.80.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the tailscale-1.80.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-12"/>
	<updated date="2025-03-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967975" comment="tailscale-1.80.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967976" comment="tailscale-bash-completion-1.80.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967977" comment="tailscale-fish-completion-1.80.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967978" comment="tailscale-zsh-completion-1.80.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253209" version="1" class="patch">
	<metadata>
		<title>chromedriver-134.0.6998.88-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1920" ref_url="https://www.suse.com/security/cve/CVE-2025-1920/" source="CVE"/>
		<reference ref_id="CVE-2025-2135" ref_url="https://www.suse.com/security/cve/CVE-2025-2135/" source="CVE"/>
		<reference ref_id="CVE-2025-2136" ref_url="https://www.suse.com/security/cve/CVE-2025-2136/" source="CVE"/>
		<reference ref_id="CVE-2025-2137" ref_url="https://www.suse.com/security/cve/CVE-2025-2137/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-134.0.6998.88-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2025-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1920/">CVE-2025-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1920">CVE-2025-1920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2135/">CVE-2025-2135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2135">CVE-2025-2135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2136/">CVE-2025-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2136">CVE-2025-2136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2137/">CVE-2025-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2137">CVE-2025-2137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968113" comment="chromedriver-134.0.6998.88-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968114" comment="chromium-134.0.6998.88-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253210" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250312T181707-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-57603" ref_url="https://www.suse.com/security/cve/CVE-2024-57603/" source="CVE"/>
		<reference ref_id="CVE-2024-57604" ref_url="https://www.suse.com/security/cve/CVE-2024-57604/" source="CVE"/>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<reference ref_id="CVE-2025-1243" ref_url="https://www.suse.com/security/cve/CVE-2025-1243/" source="CVE"/>
		<reference ref_id="CVE-2025-1293" ref_url="https://www.suse.com/security/cve/CVE-2025-1293/" source="CVE"/>
		<reference ref_id="CVE-2025-1412" ref_url="https://www.suse.com/security/cve/CVE-2025-1412/" source="CVE"/>
		<reference ref_id="CVE-2025-20051" ref_url="https://www.suse.com/security/cve/CVE-2025-20051/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-22952" ref_url="https://www.suse.com/security/cve/CVE-2025-22952/" source="CVE"/>
		<reference ref_id="CVE-2025-23387" ref_url="https://www.suse.com/security/cve/CVE-2025-23387/" source="CVE"/>
		<reference ref_id="CVE-2025-23388" ref_url="https://www.suse.com/security/cve/CVE-2025-23388/" source="CVE"/>
		<reference ref_id="CVE-2025-23389" ref_url="https://www.suse.com/security/cve/CVE-2025-23389/" source="CVE"/>
		<reference ref_id="CVE-2025-24016" ref_url="https://www.suse.com/security/cve/CVE-2025-24016/" source="CVE"/>
		<reference ref_id="CVE-2025-24526" ref_url="https://www.suse.com/security/cve/CVE-2025-24526/" source="CVE"/>
		<reference ref_id="CVE-2025-24806" ref_url="https://www.suse.com/security/cve/CVE-2025-24806/" source="CVE"/>
		<reference ref_id="CVE-2025-24976" ref_url="https://www.suse.com/security/cve/CVE-2025-24976/" source="CVE"/>
		<reference ref_id="CVE-2025-25196" ref_url="https://www.suse.com/security/cve/CVE-2025-25196/" source="CVE"/>
		<reference ref_id="CVE-2025-25199" ref_url="https://www.suse.com/security/cve/CVE-2025-25199/" source="CVE"/>
		<reference ref_id="CVE-2025-25204" ref_url="https://www.suse.com/security/cve/CVE-2025-25204/" source="CVE"/>
		<reference ref_id="CVE-2025-25279" ref_url="https://www.suse.com/security/cve/CVE-2025-25279/" source="CVE"/>
		<reference ref_id="CVE-2025-25294" ref_url="https://www.suse.com/security/cve/CVE-2025-25294/" source="CVE"/>
		<reference ref_id="CVE-2025-27088" ref_url="https://www.suse.com/security/cve/CVE-2025-27088/" source="CVE"/>
		<reference ref_id="CVE-2025-27090" ref_url="https://www.suse.com/security/cve/CVE-2025-27090/" source="CVE"/>
		<reference ref_id="CVE-2025-27100" ref_url="https://www.suse.com/security/cve/CVE-2025-27100/" source="CVE"/>
		<reference ref_id="CVE-2025-27112" ref_url="https://www.suse.com/security/cve/CVE-2025-27112/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-27155" ref_url="https://www.suse.com/security/cve/CVE-2025-27155/" source="CVE"/>
		<reference ref_id="CVE-2025-27414" ref_url="https://www.suse.com/security/cve/CVE-2025-27414/" source="CVE"/>
		<reference ref_id="CVE-2025-27421" ref_url="https://www.suse.com/security/cve/CVE-2025-27421/" source="CVE"/>
		<reference ref_id="CVE-2025-27507" ref_url="https://www.suse.com/security/cve/CVE-2025-27507/" source="CVE"/>
		<reference ref_id="CVE-2025-27509" ref_url="https://www.suse.com/security/cve/CVE-2025-27509/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250312T181707-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2025-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57603/">CVE-2024-57603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57603">CVE-2024-57603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57604/">CVE-2024-57604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57604">CVE-2024-57604 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1243/">CVE-2025-1243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1243">CVE-2025-1243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1293/">CVE-2025-1293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1293">CVE-2025-1293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1412/">CVE-2025-1412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1412">CVE-2025-1412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20051/">CVE-2025-20051 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20051">CVE-2025-20051 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22952/">CVE-2025-22952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22952">CVE-2025-22952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23387/">CVE-2025-23387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23387">CVE-2025-23387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23388/">CVE-2025-23388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23388">CVE-2025-23388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23389/">CVE-2025-23389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23389">CVE-2025-23389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24016/">CVE-2025-24016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24016">CVE-2025-24016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24526/">CVE-2025-24526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24526">CVE-2025-24526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24806/">CVE-2025-24806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24806">CVE-2025-24806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-24976/">CVE-2025-24976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24976">CVE-2025-24976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25196/">CVE-2025-25196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25196">CVE-2025-25196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25199/">CVE-2025-25199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25199">CVE-2025-25199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25204/">CVE-2025-25204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25204">CVE-2025-25204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25279/">CVE-2025-25279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25279">CVE-2025-25279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25294/">CVE-2025-25294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25294">CVE-2025-25294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27088/">CVE-2025-27088 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27088">CVE-2025-27088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27090/">CVE-2025-27090 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27090">CVE-2025-27090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27100/">CVE-2025-27100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27100">CVE-2025-27100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27112/">CVE-2025-27112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27112">CVE-2025-27112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27155/">CVE-2025-27155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27155">CVE-2025-27155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27414/">CVE-2025-27414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27414">CVE-2025-27414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27421/">CVE-2025-27421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27421">CVE-2025-27421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27507/">CVE-2025-27507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27507">CVE-2025-27507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27509/">CVE-2025-27509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27509">CVE-2025-27509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968115" comment="govulncheck-vulndb-0.0.20250312T181707-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253211" version="1" class="patch">
	<metadata>
		<title>hostapd-2.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52424" ref_url="https://www.suse.com/security/cve/CVE-2023-52424/" source="CVE"/>
		<reference ref_id="CVE-2025-24912" ref_url="https://www.suse.com/security/cve/CVE-2025-24912/" source="CVE"/>
		<description>
These are all security issues fixed in the hostapd-2.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2025-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52424/">CVE-2023-52424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52424">CVE-2023-52424 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-24912/">CVE-2025-24912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24912">CVE-2025-24912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968116" comment="hostapd-2.11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253212" version="1" class="patch">
	<metadata>
		<title>libzvbi-chains0-0.2.44-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2173" ref_url="https://www.suse.com/security/cve/CVE-2025-2173/" source="CVE"/>
		<reference ref_id="CVE-2025-2174" ref_url="https://www.suse.com/security/cve/CVE-2025-2174/" source="CVE"/>
		<reference ref_id="CVE-2025-2175" ref_url="https://www.suse.com/security/cve/CVE-2025-2175/" source="CVE"/>
		<reference ref_id="CVE-2025-2176" ref_url="https://www.suse.com/security/cve/CVE-2025-2176/" source="CVE"/>
		<reference ref_id="CVE-2025-2177" ref_url="https://www.suse.com/security/cve/CVE-2025-2177/" source="CVE"/>
		<description>
These are all security issues fixed in the libzvbi-chains0-0.2.44-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2025-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2173/">CVE-2025-2173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2173">CVE-2025-2173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2174/">CVE-2025-2174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2174">CVE-2025-2174 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2175/">CVE-2025-2175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2175">CVE-2025-2175 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2176/">CVE-2025-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2176">CVE-2025-2176 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2177/">CVE-2025-2177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2177">CVE-2025-2177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968117" comment="libzvbi-chains0-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968118" comment="libzvbi-chains0-32bit-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968119" comment="libzvbi0-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968120" comment="libzvbi0-32bit-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968121" comment="zvbi-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968122" comment="zvbi-devel-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968123" comment="zvbi-devel-32bit-0.2.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968124" comment="zvbi-lang-0.2.44-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253213" version="1" class="patch">
	<metadata>
		<title>ed25519-java-0.3.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36843" ref_url="https://www.suse.com/security/cve/CVE-2020-36843/" source="CVE"/>
		<description>
These are all security issues fixed in the ed25519-java-0.3.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2020-36843/">CVE-2020-36843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36843">CVE-2020-36843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968668" comment="ed25519-java-0.3.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968669" comment="ed25519-java-javadoc-0.3.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253214" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250313T170021-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-1725" ref_url="https://www.suse.com/security/cve/CVE-2024-1725/" source="CVE"/>
		<reference ref_id="CVE-2024-52812" ref_url="https://www.suse.com/security/cve/CVE-2024-52812/" source="CVE"/>
		<reference ref_id="CVE-2025-1296" ref_url="https://www.suse.com/security/cve/CVE-2025-1296/" source="CVE"/>
		<reference ref_id="CVE-2025-26260" ref_url="https://www.suse.com/security/cve/CVE-2025-26260/" source="CVE"/>
		<reference ref_id="CVE-2025-27403" ref_url="https://www.suse.com/security/cve/CVE-2025-27403/" source="CVE"/>
		<reference ref_id="CVE-2025-27616" ref_url="https://www.suse.com/security/cve/CVE-2025-27616/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250313T170021-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1725/">CVE-2024-1725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1725">CVE-2024-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52812/">CVE-2024-52812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52812">CVE-2024-52812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1296/">CVE-2025-1296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1296">CVE-2025-1296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26260/">CVE-2025-26260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26260">CVE-2025-26260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27403/">CVE-2025-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27403">CVE-2025-27403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27616/">CVE-2025-27616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27616">CVE-2025-27616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968670" comment="govulncheck-vulndb-0.0.20250313T170021-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253215" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.43-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.43-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968671" comment="libexslt0-1.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968672" comment="libxslt-devel-1.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968673" comment="libxslt-devel-32bit-1.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968674" comment="libxslt-tools-1.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968675" comment="libxslt1-1.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968676" comment="libxslt1-32bit-1.1.43-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253216" version="1" class="patch">
	<metadata>
		<title>php8-8.3.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11235" ref_url="https://www.suse.com/security/cve/CVE-2024-11235/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.3.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11235/">CVE-2024-11235 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11235">CVE-2024-11235 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968677" comment="php8-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968678" comment="php8-bcmath-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968679" comment="php8-bz2-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968680" comment="php8-calendar-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968681" comment="php8-cli-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968682" comment="php8-ctype-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968683" comment="php8-curl-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968684" comment="php8-dba-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968685" comment="php8-devel-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968686" comment="php8-dom-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968687" comment="php8-enchant-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968688" comment="php8-exif-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968689" comment="php8-ffi-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968690" comment="php8-fileinfo-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968691" comment="php8-ftp-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968692" comment="php8-gd-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968693" comment="php8-gettext-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968694" comment="php8-gmp-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968695" comment="php8-iconv-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968696" comment="php8-intl-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968697" comment="php8-ldap-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968698" comment="php8-mbstring-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968699" comment="php8-mysql-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968700" comment="php8-odbc-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968701" comment="php8-opcache-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968702" comment="php8-openssl-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968703" comment="php8-pcntl-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968704" comment="php8-pdo-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968705" comment="php8-pgsql-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968706" comment="php8-phar-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968707" comment="php8-posix-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968708" comment="php8-readline-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968709" comment="php8-shmop-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968710" comment="php8-snmp-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968711" comment="php8-soap-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968712" comment="php8-sockets-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968713" comment="php8-sodium-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968714" comment="php8-sqlite-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968715" comment="php8-sysvmsg-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968716" comment="php8-sysvsem-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968717" comment="php8-sysvshm-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968718" comment="php8-tidy-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968719" comment="php8-tokenizer-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968720" comment="php8-xmlreader-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968721" comment="php8-xmlwriter-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968722" comment="php8-xsl-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968723" comment="php8-zip-8.3.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968724" comment="php8-zlib-8.3.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253217" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.99-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.99-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968725" comment="tomcat-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968726" comment="tomcat-admin-webapps-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968727" comment="tomcat-docs-webapp-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968728" comment="tomcat-el-3_0-api-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968729" comment="tomcat-embed-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968730" comment="tomcat-javadoc-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968731" comment="tomcat-jsp-2_3-api-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968732" comment="tomcat-jsvc-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968733" comment="tomcat-lib-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968734" comment="tomcat-servlet-4_0-api-9.0.99-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968735" comment="tomcat-webapps-9.0.99-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253218" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.35-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.35-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-15"/>
	<updated date="2025-03-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968736" comment="tomcat10-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968737" comment="tomcat10-admin-webapps-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968738" comment="tomcat10-doc-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968739" comment="tomcat10-docs-webapp-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968740" comment="tomcat10-el-5_0-api-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968741" comment="tomcat10-embed-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968742" comment="tomcat10-jsp-3_1-api-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968743" comment="tomcat10-jsvc-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968744" comment="tomcat10-lib-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968745" comment="tomcat10-servlet-6_0-api-10.1.35-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968746" comment="tomcat10-webapps-10.1.35-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253219" version="1" class="patch">
	<metadata>
		<title>nethack-3.4.3-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-5253" ref_url="https://www.suse.com/security/cve/CVE-2020-5253/" source="CVE"/>
		<description>
These are all security issues fixed in the nethack-3.4.3-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-16"/>
	<updated date="2025-03-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-5253/">CVE-2020-5253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5253">CVE-2020-5253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968747" comment="nethack-3.4.3-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253220" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.11-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24912" ref_url="https://www.suse.com/security/cve/CVE-2025-24912/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.11-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-16"/>
	<updated date="2025-03-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-24912/">CVE-2025-24912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24912">CVE-2025-24912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968748" comment="wpa_supplicant-2.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968749" comment="wpa_supplicant-gui-2.11-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253221" version="1" class="patch">
	<metadata>
		<title>copacetic-0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the copacetic-0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-17"/>
	<updated date="2025-03-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968750" comment="copacetic-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968751" comment="copacetic-bash-completion-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968752" comment="copacetic-fish-completion-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968753" comment="copacetic-zsh-completion-0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253222" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.9-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2357" ref_url="https://www.suse.com/security/cve/CVE-2025-2357/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.9-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-17"/>
	<updated date="2025-03-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2357/">CVE-2025-2357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2357">CVE-2025-2357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968754" comment="dcmtk-3.6.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968755" comment="dcmtk-devel-3.6.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968756" comment="libdcmtk19-3.6.9-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253223" version="1" class="patch">
	<metadata>
		<title>rime-plum-1.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2025-2161" ref_url="https://www.suse.com/security/cve/CVE-2025-2161/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the rime-plum-1.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-17"/>
	<updated date="2025-03-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2161/">CVE-2025-2161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2161">CVE-2025-2161 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968757" comment="rime-plum-1.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253224" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.4.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2151" ref_url="https://www.suse.com/security/cve/CVE-2025-2151/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.4.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-2151/">CVE-2025-2151 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2151">CVE-2025-2151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968758" comment="assimp-devel-5.4.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968759" comment="libassimp5-5.4.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253225" version="1" class="patch">
	<metadata>
		<title>cadvisor-0.52.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the cadvisor-0.52.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968760" comment="cadvisor-0.52.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253226" version="1" class="patch">
	<metadata>
		<title>crane-0.20.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the crane-0.20.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968761" comment="crane-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968762" comment="crane-bash-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968763" comment="crane-fish-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968764" comment="crane-zsh-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968765" comment="gcrane-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968766" comment="gcrane-bash-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968767" comment="gcrane-fish-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968768" comment="gcrane-zsh-completion-0.20.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968769" comment="go-containerregistry-0.20.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253227" version="1" class="patch">
	<metadata>
		<title>helm-3.17.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.17.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968770" comment="helm-3.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968771" comment="helm-bash-completion-3.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968772" comment="helm-fish-completion-3.17.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968773" comment="helm-zsh-completion-3.17.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253228" version="1" class="patch">
	<metadata>
		<title>kured-1.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the kured-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968774" comment="kured-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968775" comment="kured-k8s-yaml-1.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253229" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26699" ref_url="https://www.suse.com/security/cve/CVE-2025-26699/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-18"/>
	<updated date="2025-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26699/">CVE-2025-26699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26699">CVE-2025-26699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968776" comment="python311-Django4-4.2.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968777" comment="python312-Django4-4.2.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968778" comment="python313-Django4-4.2.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253230" version="1" class="patch">
	<metadata>
		<title>apptainer-1.3.6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.3.6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-19"/>
	<updated date="2025-03-19"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968779" comment="apptainer-1.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968780" comment="apptainer-leap-1.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968781" comment="apptainer-sle15_5-1.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968782" comment="apptainer-sle15_6-1.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968783" comment="apptainer-sle15_7-1.3.6-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253231" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250318T181448-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-2241" ref_url="https://www.suse.com/security/cve/CVE-2025-2241/" source="CVE"/>
		<reference ref_id="CVE-2025-29781" ref_url="https://www.suse.com/security/cve/CVE-2025-29781/" source="CVE"/>
		<reference ref_id="CVE-2025-29786" ref_url="https://www.suse.com/security/cve/CVE-2025-29786/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250318T181448-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-19"/>
	<updated date="2025-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2241/">CVE-2025-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2241">CVE-2025-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29781/">CVE-2025-29781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29781">CVE-2025-29781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29786/">CVE-2025-29786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968784" comment="govulncheck-vulndb-0.0.20250318T181448-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253232" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.102-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52317" ref_url="https://www.suse.com/security/cve/CVE-2024-52317/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.102-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-19"/>
	<updated date="2025-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52317/">CVE-2024-52317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52317">CVE-2024-52317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968785" comment="tomcat-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968786" comment="tomcat-admin-webapps-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968787" comment="tomcat-docs-webapp-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968788" comment="tomcat-el-3_0-api-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968789" comment="tomcat-embed-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968790" comment="tomcat-javadoc-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968791" comment="tomcat-jsp-2_3-api-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968792" comment="tomcat-jsvc-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968793" comment="tomcat-lib-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968794" comment="tomcat-servlet-4_0-api-9.0.102-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968795" comment="tomcat-webapps-9.0.102-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253233" version="1" class="patch">
	<metadata>
		<title>mercurial-6.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2361" ref_url="https://www.suse.com/security/cve/CVE-2025-2361/" source="CVE"/>
		<description>
These are all security issues fixed in the mercurial-6.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-2361/">CVE-2025-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2361">CVE-2025-2361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968796" comment="mercurial-6.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968797" comment="mercurial-lang-6.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968798" comment="mercurial-tests-6.9.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253234" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26699" ref_url="https://www.suse.com/security/cve/CVE-2025-26699/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26699/">CVE-2025-26699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26699">CVE-2025-26699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968799" comment="python311-Django-5.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968800" comment="python312-Django-5.1.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968801" comment="python313-Django-5.1.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253235" version="1" class="patch">
	<metadata>
		<title>python311-joblib-1.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21797" ref_url="https://www.suse.com/security/cve/CVE-2022-21797/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-joblib-1.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21797/">CVE-2022-21797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21797">CVE-2022-21797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968802" comment="python311-joblib-1.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968803" comment="python312-joblib-1.4.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968804" comment="python313-joblib-1.4.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253236" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.39-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52317" ref_url="https://www.suse.com/security/cve/CVE-2024-52317/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.39-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52317/">CVE-2024-52317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52317">CVE-2024-52317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968805" comment="tomcat10-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968806" comment="tomcat10-admin-webapps-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968807" comment="tomcat10-doc-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968808" comment="tomcat10-docs-webapp-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968809" comment="tomcat10-el-5_0-api-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968810" comment="tomcat10-embed-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968811" comment="tomcat10-jsp-3_1-api-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968812" comment="tomcat10-jsvc-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968813" comment="tomcat10-lib-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968814" comment="tomcat10-servlet-6_0-api-10.1.39-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968815" comment="tomcat10-webapps-10.1.39-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253237" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-49737" ref_url="https://www.suse.com/security/cve/CVE-2022-49737/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49737/">CVE-2022-49737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49737">CVE-2022-49737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968816" comment="xorg-x11-server-21.1.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968817" comment="xorg-x11-server-Xvfb-21.1.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968818" comment="xorg-x11-server-extra-21.1.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968819" comment="xorg-x11-server-sdk-21.1.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968820" comment="xorg-x11-server-source-21.1.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968821" comment="xorg-x11-server-wrapper-21.1.15-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253238" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-33.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1920" ref_url="https://www.suse.com/security/cve/CVE-2025-1920/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-33.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-21"/>
	<updated date="2025-03-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1920/">CVE-2025-1920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1920">CVE-2025-1920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969066" comment="nodejs-electron-33.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969067" comment="nodejs-electron-devel-33.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969068" comment="nodejs-electron-doc-33.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253239" version="1" class="patch">
	<metadata>
		<title>warewulf4-4.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the warewulf4-4.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-21"/>
	<updated date="2025-03-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969069" comment="warewulf4-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969070" comment="warewulf4-dracut-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969071" comment="warewulf4-man-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969072" comment="warewulf4-overlay-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969073" comment="warewulf4-overlay-rke2-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969074" comment="warewulf4-overlay-slurm-4.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969075" comment="warewulf4-reference-doc-4.6.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253240" version="1" class="patch">
	<metadata>
		<title>forgejo-10.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-10.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-24"/>
	<updated date="2025-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969533" comment="forgejo-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969534" comment="forgejo-apparmor-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969535" comment="forgejo-environment-to-ini-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969536" comment="forgejo-firewalld-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969537" comment="forgejo-selinux-10.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253241" version="1" class="patch">
	<metadata>
		<title>gitleaks-8.24.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the gitleaks-8.24.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-24"/>
	<updated date="2025-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969538" comment="gitleaks-8.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969539" comment="gitleaks-bash-completion-8.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969540" comment="gitleaks-fish-completion-8.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969541" comment="gitleaks-zsh-completion-8.24.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253242" version="1" class="patch">
	<metadata>
		<title>argocd-cli-2.14.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26791" ref_url="https://www.suse.com/security/cve/CVE-2025-26791/" source="CVE"/>
		<description>
These are all security issues fixed in the argocd-cli-2.14.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26791/">CVE-2025-26791 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26791">CVE-2025-26791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969677" comment="argocd-cli-2.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969678" comment="argocd-cli-bash-completion-2.14.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969679" comment="argocd-cli-zsh-completion-2.14.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253243" version="1" class="patch">
	<metadata>
		<title>chromedriver-134.0.6998.117-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2476" ref_url="https://www.suse.com/security/cve/CVE-2025-2476/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-134.0.6998.117-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2476/">CVE-2025-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2476">CVE-2025-2476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969680" comment="chromedriver-134.0.6998.117-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969681" comment="chromium-134.0.6998.117-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253244" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969682" comment="docker-stable-24.0.9_ce-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969683" comment="docker-stable-bash-completion-24.0.9_ce-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969684" comment="docker-stable-buildx-0.19.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969685" comment="docker-stable-fish-completion-24.0.9_ce-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969686" comment="docker-stable-rootless-extras-24.0.9_ce-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969687" comment="docker-stable-zsh-completion-24.0.9_ce-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253245" version="1" class="patch">
	<metadata>
		<title>kubernetes1.29-apiserver-1.29.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.29-apiserver-1.29.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969688" comment="kubernetes1.29-apiserver-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969689" comment="kubernetes1.29-client-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969690" comment="kubernetes1.29-client-bash-completion-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969691" comment="kubernetes1.29-client-common-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969692" comment="kubernetes1.29-client-fish-completion-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969693" comment="kubernetes1.29-controller-manager-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969694" comment="kubernetes1.29-kubeadm-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969695" comment="kubernetes1.29-kubelet-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969696" comment="kubernetes1.29-kubelet-common-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969697" comment="kubernetes1.29-proxy-1.29.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969698" comment="kubernetes1.29-scheduler-1.29.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253246" version="1" class="patch">
	<metadata>
		<title>kubernetes1.30-apiserver-1.30.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.30-apiserver-1.30.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969699" comment="kubernetes1.30-apiserver-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969700" comment="kubernetes1.30-client-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969701" comment="kubernetes1.30-client-bash-completion-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969702" comment="kubernetes1.30-client-common-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969703" comment="kubernetes1.30-client-fish-completion-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969704" comment="kubernetes1.30-controller-manager-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969705" comment="kubernetes1.30-kubeadm-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969706" comment="kubernetes1.30-kubelet-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969707" comment="kubernetes1.30-kubelet-common-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969708" comment="kubernetes1.30-proxy-1.30.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969709" comment="kubernetes1.30-scheduler-1.30.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253247" version="1" class="patch">
	<metadata>
		<title>kubernetes1.31-apiserver-1.31.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.31-apiserver-1.31.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969710" comment="kubernetes1.31-apiserver-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969711" comment="kubernetes1.31-client-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969712" comment="kubernetes1.31-client-bash-completion-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969713" comment="kubernetes1.31-client-common-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969714" comment="kubernetes1.31-client-fish-completion-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969715" comment="kubernetes1.31-controller-manager-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969716" comment="kubernetes1.31-kubeadm-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969717" comment="kubernetes1.31-kubelet-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969718" comment="kubernetes1.31-kubelet-common-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969719" comment="kubernetes1.31-proxy-1.31.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969720" comment="kubernetes1.31-scheduler-1.31.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253248" version="1" class="patch">
	<metadata>
		<title>kubernetes1.32-apiserver-1.32.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.32-apiserver-1.32.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969721" comment="kubernetes1.32-apiserver-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969722" comment="kubernetes1.32-client-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969723" comment="kubernetes1.32-client-bash-completion-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969724" comment="kubernetes1.32-client-common-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969725" comment="kubernetes1.32-client-fish-completion-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969726" comment="kubernetes1.32-controller-manager-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969727" comment="kubernetes1.32-kubeadm-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969728" comment="kubernetes1.32-kubelet-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969729" comment="kubernetes1.32-kubelet-common-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969730" comment="kubernetes1.32-proxy-1.32.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969731" comment="kubernetes1.32-scheduler-1.32.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253249" version="1" class="patch">
	<metadata>
		<title>libmbedcrypto7-2.28.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27809" ref_url="https://www.suse.com/security/cve/CVE-2025-27809/" source="CVE"/>
		<reference ref_id="CVE-2025-27810" ref_url="https://www.suse.com/security/cve/CVE-2025-27810/" source="CVE"/>
		<description>
These are all security issues fixed in the libmbedcrypto7-2.28.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27809/">CVE-2025-27809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27809">CVE-2025-27809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27810/">CVE-2025-27810 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27810">CVE-2025-27810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969732" comment="libmbedcrypto7-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969733" comment="libmbedcrypto7-x86-64-v3-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969734" comment="libmbedtls14-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969735" comment="libmbedtls14-x86-64-v3-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969736" comment="libmbedx509-1-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969737" comment="libmbedx509-1-x86-64-v3-2.28.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969738" comment="mbedtls-2-devel-2.28.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253250" version="1" class="patch">
	<metadata>
		<title>apache-commons-vfs2-2.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27553" ref_url="https://www.suse.com/security/cve/CVE-2025-27553/" source="CVE"/>
		<reference ref_id="CVE-2025-30474" ref_url="https://www.suse.com/security/cve/CVE-2025-30474/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-vfs2-2.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-27553/">CVE-2025-27553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27553">CVE-2025-27553 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-30474/">CVE-2025-30474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30474">CVE-2025-30474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970282" comment="apache-commons-vfs2-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970283" comment="apache-commons-vfs2-ant-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970284" comment="apache-commons-vfs2-examples-2.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970285" comment="apache-commons-vfs2-javadoc-2.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253251" version="1" class="patch">
	<metadata>
		<title>git-bug-0.8.0+git.1742269202.0ab94c9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the git-bug-0.8.0+git.1742269202.0ab94c9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970286" comment="git-bug-0.8.0+git.1742269202.0ab94c9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970287" comment="git-bug-bash-completion-0.8.0+git.1742269202.0ab94c9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970288" comment="git-bug-fish-completion-0.8.0+git.1742269202.0ab94c9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970289" comment="git-bug-zsh-completion-0.8.0+git.1742269202.0ab94c9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253252" version="1" class="patch">
	<metadata>
		<title>icingacli-2.12.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27404" ref_url="https://www.suse.com/security/cve/CVE-2025-27404/" source="CVE"/>
		<reference ref_id="CVE-2025-27405" ref_url="https://www.suse.com/security/cve/CVE-2025-27405/" source="CVE"/>
		<reference ref_id="CVE-2025-27609" ref_url="https://www.suse.com/security/cve/CVE-2025-27609/" source="CVE"/>
		<reference ref_id="CVE-2025-30164" ref_url="https://www.suse.com/security/cve/CVE-2025-30164/" source="CVE"/>
		<description>
These are all security issues fixed in the icingacli-2.12.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27404/">CVE-2025-27404 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27404">CVE-2025-27404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27405/">CVE-2025-27405 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27405">CVE-2025-27405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27609/">CVE-2025-27609 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27609">CVE-2025-27609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30164/">CVE-2025-30164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30164">CVE-2025-30164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970290" comment="icingacli-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970291" comment="icingaweb2-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970292" comment="icingaweb2-common-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970293" comment="icingaweb2-php-fpm-2.12.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970294" comment="php-icinga-2.12.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253253" version="1" class="patch">
	<metadata>
		<title>qubesome-0.0.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the qubesome-0.0.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970295" comment="qubesome-0.0.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253254" version="1" class="patch">
	<metadata>
		<title>corosync-3.1.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30472" ref_url="https://www.suse.com/security/cve/CVE-2025-30472/" source="CVE"/>
		<description>
These are all security issues fixed in the corosync-3.1.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-27"/>
	<updated date="2025-03-27"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-30472/">CVE-2025-30472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30472">CVE-2025-30472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970348" comment="corosync-3.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970349" comment="corosync-devel-3.1.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970350" comment="corosync-libs-3.1.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253255" version="1" class="patch">
	<metadata>
		<title>389-ds-3.1.2~git55.7fbd4526-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2487" ref_url="https://www.suse.com/security/cve/CVE-2025-2487/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.1.2~git55.7fbd4526-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2487/">CVE-2025-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2487">CVE-2025-2487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970571" comment="389-ds-3.1.2~git55.7fbd4526-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970572" comment="389-ds-devel-3.1.2~git55.7fbd4526-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970573" comment="389-ds-snmp-3.1.2~git55.7fbd4526-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970574" comment="lib389-3.1.2~git55.7fbd4526-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970575" comment="libsvrcore0-3.1.2~git55.7fbd4526-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253256" version="1" class="patch">
	<metadata>
		<title>exim-4.98.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26794" ref_url="https://www.suse.com/security/cve/CVE-2025-26794/" source="CVE"/>
		<reference ref_id="CVE-2025-30232" ref_url="https://www.suse.com/security/cve/CVE-2025-30232/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.98.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26794/">CVE-2025-26794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26794">CVE-2025-26794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30232/">CVE-2025-30232 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30232">CVE-2025-30232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970576" comment="exim-4.98.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970577" comment="eximon-4.98.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970578" comment="eximstats-html-4.98.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253257" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.5-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970579" comment="ffmpeg-4-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970580" comment="ffmpeg-4-libavcodec-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970581" comment="ffmpeg-4-libavdevice-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970582" comment="ffmpeg-4-libavfilter-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970583" comment="ffmpeg-4-libavformat-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970584" comment="ffmpeg-4-libavresample-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970585" comment="ffmpeg-4-libavutil-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970586" comment="ffmpeg-4-libpostproc-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970587" comment="ffmpeg-4-libswresample-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970588" comment="ffmpeg-4-libswscale-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970589" comment="ffmpeg-4-private-devel-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970590" comment="libavcodec58_134-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970591" comment="libavcodec58_134-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970592" comment="libavdevice58_13-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970593" comment="libavdevice58_13-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970594" comment="libavfilter7_110-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970595" comment="libavfilter7_110-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970596" comment="libavformat58_76-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970597" comment="libavformat58_76-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970598" comment="libavresample4_0-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970599" comment="libavresample4_0-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970600" comment="libavutil56_70-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970601" comment="libavutil56_70-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970602" comment="libpostproc55_9-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970603" comment="libpostproc55_9-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970604" comment="libswresample3_9-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970605" comment="libswresample3_9-32bit-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970606" comment="libswscale5_9-4.4.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970607" comment="libswscale5_9-32bit-4.4.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253258" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250327T184518-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25132" ref_url="https://www.suse.com/security/cve/CVE-2024-25132/" source="CVE"/>
		<reference ref_id="CVE-2024-53348" ref_url="https://www.suse.com/security/cve/CVE-2024-53348/" source="CVE"/>
		<reference ref_id="CVE-2024-53351" ref_url="https://www.suse.com/security/cve/CVE-2024-53351/" source="CVE"/>
		<reference ref_id="CVE-2024-7598" ref_url="https://www.suse.com/security/cve/CVE-2024-7598/" source="CVE"/>
		<reference ref_id="CVE-2024-7631" ref_url="https://www.suse.com/security/cve/CVE-2024-7631/" source="CVE"/>
		<reference ref_id="CVE-2024-9042" ref_url="https://www.suse.com/security/cve/CVE-2024-9042/" source="CVE"/>
		<reference ref_id="CVE-2024-9900" ref_url="https://www.suse.com/security/cve/CVE-2024-9900/" source="CVE"/>
		<reference ref_id="CVE-2025-1097" ref_url="https://www.suse.com/security/cve/CVE-2025-1097/" source="CVE"/>
		<reference ref_id="CVE-2025-1098" ref_url="https://www.suse.com/security/cve/CVE-2025-1098/" source="CVE"/>
		<reference ref_id="CVE-2025-1472" ref_url="https://www.suse.com/security/cve/CVE-2025-1472/" source="CVE"/>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<reference ref_id="CVE-2025-24513" ref_url="https://www.suse.com/security/cve/CVE-2025-24513/" source="CVE"/>
		<reference ref_id="CVE-2025-24514" ref_url="https://www.suse.com/security/cve/CVE-2025-24514/" source="CVE"/>
		<reference ref_id="CVE-2025-24920" ref_url="https://www.suse.com/security/cve/CVE-2025-24920/" source="CVE"/>
		<reference ref_id="CVE-2025-25068" ref_url="https://www.suse.com/security/cve/CVE-2025-25068/" source="CVE"/>
		<reference ref_id="CVE-2025-25274" ref_url="https://www.suse.com/security/cve/CVE-2025-25274/" source="CVE"/>
		<reference ref_id="CVE-2025-27612" ref_url="https://www.suse.com/security/cve/CVE-2025-27612/" source="CVE"/>
		<reference ref_id="CVE-2025-27715" ref_url="https://www.suse.com/security/cve/CVE-2025-27715/" source="CVE"/>
		<reference ref_id="CVE-2025-27933" ref_url="https://www.suse.com/security/cve/CVE-2025-27933/" source="CVE"/>
		<reference ref_id="CVE-2025-29778" ref_url="https://www.suse.com/security/cve/CVE-2025-29778/" source="CVE"/>
		<reference ref_id="CVE-2025-29914" ref_url="https://www.suse.com/security/cve/CVE-2025-29914/" source="CVE"/>
		<reference ref_id="CVE-2025-29922" ref_url="https://www.suse.com/security/cve/CVE-2025-29922/" source="CVE"/>
		<reference ref_id="CVE-2025-29923" ref_url="https://www.suse.com/security/cve/CVE-2025-29923/" source="CVE"/>
		<reference ref_id="CVE-2025-30077" ref_url="https://www.suse.com/security/cve/CVE-2025-30077/" source="CVE"/>
		<reference ref_id="CVE-2025-30153" ref_url="https://www.suse.com/security/cve/CVE-2025-30153/" source="CVE"/>
		<reference ref_id="CVE-2025-30162" ref_url="https://www.suse.com/security/cve/CVE-2025-30162/" source="CVE"/>
		<reference ref_id="CVE-2025-30163" ref_url="https://www.suse.com/security/cve/CVE-2025-30163/" source="CVE"/>
		<reference ref_id="CVE-2025-30179" ref_url="https://www.suse.com/security/cve/CVE-2025-30179/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25132/">CVE-2024-25132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25132">CVE-2024-25132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53348/">CVE-2024-53348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53348">CVE-2024-53348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53351/">CVE-2024-53351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53351">CVE-2024-53351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7598/">CVE-2024-7598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7598">CVE-2024-7598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7631/">CVE-2024-7631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7631">CVE-2024-7631 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9042/">CVE-2024-9042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9042">CVE-2024-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9900/">CVE-2024-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9900">CVE-2024-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1097/">CVE-2025-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1097">CVE-2025-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1098/">CVE-2025-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1098">CVE-2025-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1472/">CVE-2025-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1472">CVE-2025-1472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24513/">CVE-2025-24513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24513">CVE-2025-24513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24514/">CVE-2025-24514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24514">CVE-2025-24514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24920/">CVE-2025-24920 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24920">CVE-2025-24920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25068/">CVE-2025-25068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25068">CVE-2025-25068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25274/">CVE-2025-25274 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25274">CVE-2025-25274 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-27612/">CVE-2025-27612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27612">CVE-2025-27612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27715/">CVE-2025-27715 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27715">CVE-2025-27715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27933/">CVE-2025-27933 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27933">CVE-2025-27933 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-29778/">CVE-2025-29778 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29778">CVE-2025-29778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29914/">CVE-2025-29914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29914">CVE-2025-29914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29922/">CVE-2025-29922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29922">CVE-2025-29922 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-29923/">CVE-2025-29923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29923">CVE-2025-29923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30077/">CVE-2025-30077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30077">CVE-2025-30077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30153/">CVE-2025-30153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30153">CVE-2025-30153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30162/">CVE-2025-30162 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30162">CVE-2025-30162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30163/">CVE-2025-30163 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30163">CVE-2025-30163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30179/">CVE-2025-30179 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30179">CVE-2025-30179 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970608" comment="govulncheck-vulndb-0.0.20250327T184518-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253259" version="1" class="patch">
	<metadata>
		<title>istioctl-1.25.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30157" ref_url="https://www.suse.com/security/cve/CVE-2025-30157/" source="CVE"/>
		<description>
These are all security issues fixed in the istioctl-1.25.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30157/">CVE-2025-30157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30157">CVE-2025-30157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970609" comment="istioctl-1.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970610" comment="istioctl-bash-completion-1.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970611" comment="istioctl-zsh-completion-1.25.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253260" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.127.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30355" ref_url="https://www.suse.com/security/cve/CVE-2025-30355/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.127.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30355/">CVE-2025-30355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30355">CVE-2025-30355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970612" comment="matrix-synapse-1.127.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253261" version="1" class="patch">
	<metadata>
		<title>podman-5.4.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.4.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970613" comment="podman-5.4.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970614" comment="podman-docker-5.4.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970615" comment="podman-remote-5.4.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970616" comment="podmansh-5.4.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253262" version="1" class="patch">
	<metadata>
		<title>rke2-1.32.3+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.32.3+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970617" comment="rke2-1.32.3+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253263" version="1" class="patch">
	<metadata>
		<title>rke2-1.29-1.29.15+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.29-1.29.15+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970618" comment="rke2-1.29-1.29.15+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253264" version="1" class="patch">
	<metadata>
		<title>rke2-1.30-1.30.11+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.30-1.30.11+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970619" comment="rke2-1.30-1.30.11+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253265" version="1" class="patch">
	<metadata>
		<title>rke2-1.31-1.31.7+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.31-1.31.7+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970620" comment="rke2-1.31-1.31.7+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253266" version="1" class="patch">
	<metadata>
		<title>atop-2.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31160" ref_url="https://www.suse.com/security/cve/CVE-2025-31160/" source="CVE"/>
		<description>
These are all security issues fixed in the atop-2.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-31"/>
	<updated date="2025-03-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31160/">CVE-2025-31160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31160">CVE-2025-31160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970716" comment="atop-2.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970717" comment="atop-daemon-2.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253267" version="1" class="patch">
	<metadata>
		<title>libmodsecurity3-3.0.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27110" ref_url="https://www.suse.com/security/cve/CVE-2025-27110/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodsecurity3-3.0.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-31"/>
	<updated date="2025-03-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="7.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27110/">CVE-2025-27110 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27110">CVE-2025-27110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970718" comment="libmodsecurity3-3.0.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970719" comment="modsecurity-3.0.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970720" comment="modsecurity-devel-3.0.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253268" version="1" class="patch">
	<metadata>
		<title>upx-5.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2849" ref_url="https://www.suse.com/security/cve/CVE-2025-2849/" source="CVE"/>
		<description>
These are all security issues fixed in the upx-5.0.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-31"/>
	<updated date="2025-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-2849/">CVE-2025-2849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2849">CVE-2025-2849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970721" comment="upx-5.0.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253269" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-136.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2857" ref_url="https://www.suse.com/security/cve/CVE-2025-2857/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-136.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-01"/>
	<updated date="2025-04-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2857/">CVE-2025-2857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2857">CVE-2025-2857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974043" comment="MozillaFirefox-136.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974044" comment="MozillaFirefox-branding-upstream-136.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974045" comment="MozillaFirefox-devel-136.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974046" comment="MozillaFirefox-translations-common-136.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974047" comment="MozillaFirefox-translations-other-136.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253270" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.45-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27795" ref_url="https://www.suse.com/security/cve/CVE-2025-27795/" source="CVE"/>
		<reference ref_id="CVE-2025-27796" ref_url="https://www.suse.com/security/cve/CVE-2025-27796/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.45-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27795/">CVE-2025-27795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27795">CVE-2025-27795 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27796/">CVE-2025-27796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27796">CVE-2025-27796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974129" comment="GraphicsMagick-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974130" comment="GraphicsMagick-devel-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974131" comment="libGraphicsMagick++-Q16-12-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974132" comment="libGraphicsMagick++-devel-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974133" comment="libGraphicsMagick-Q16-3-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974134" comment="libGraphicsMagick3-config-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974135" comment="libGraphicsMagickWand-Q16-2-1.3.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974136" comment="perl-GraphicsMagick-1.3.45-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253271" version="1" class="patch">
	<metadata>
		<title>assimp-devel-5.4.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2591" ref_url="https://www.suse.com/security/cve/CVE-2025-2591/" source="CVE"/>
		<reference ref_id="CVE-2025-2592" ref_url="https://www.suse.com/security/cve/CVE-2025-2592/" source="CVE"/>
		<reference ref_id="CVE-2025-3015" ref_url="https://www.suse.com/security/cve/CVE-2025-3015/" source="CVE"/>
		<reference ref_id="CVE-2025-3016" ref_url="https://www.suse.com/security/cve/CVE-2025-3016/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-5.4.3-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2591/">CVE-2025-2591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2591">CVE-2025-2591 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2592/">CVE-2025-2592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2592">CVE-2025-2592 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3015/">CVE-2025-3015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3015">CVE-2025-3015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3016/">CVE-2025-3016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3016">CVE-2025-3016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974137" comment="assimp-devel-5.4.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974138" comment="libassimp5-5.4.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253272" version="1" class="patch">
	<metadata>
		<title>aws-efs-utils-2.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-35881" ref_url="https://www.suse.com/security/cve/CVE-2020-35881/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-efs-utils-2.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-35881/">CVE-2020-35881 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35881">CVE-2020-35881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974139" comment="aws-efs-utils-2.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253273" version="1" class="patch">
	<metadata>
		<title>expat-2.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974140" comment="expat-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974141" comment="libexpat-devel-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974142" comment="libexpat-devel-32bit-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974143" comment="libexpat1-2.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974144" comment="libexpat1-32bit-2.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253274" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.05.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27830" ref_url="https://www.suse.com/security/cve/CVE-2025-27830/" source="CVE"/>
		<reference ref_id="CVE-2025-27831" ref_url="https://www.suse.com/security/cve/CVE-2025-27831/" source="CVE"/>
		<reference ref_id="CVE-2025-27832" ref_url="https://www.suse.com/security/cve/CVE-2025-27832/" source="CVE"/>
		<reference ref_id="CVE-2025-27833" ref_url="https://www.suse.com/security/cve/CVE-2025-27833/" source="CVE"/>
		<reference ref_id="CVE-2025-27834" ref_url="https://www.suse.com/security/cve/CVE-2025-27834/" source="CVE"/>
		<reference ref_id="CVE-2025-27835" ref_url="https://www.suse.com/security/cve/CVE-2025-27835/" source="CVE"/>
		<reference ref_id="CVE-2025-27836" ref_url="https://www.suse.com/security/cve/CVE-2025-27836/" source="CVE"/>
		<reference ref_id="CVE-2025-27837" ref_url="https://www.suse.com/security/cve/CVE-2025-27837/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.05.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27830/">CVE-2025-27830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27830">CVE-2025-27830 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27831/">CVE-2025-27831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27831">CVE-2025-27831 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27832/">CVE-2025-27832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27832">CVE-2025-27832 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27833/">CVE-2025-27833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27833">CVE-2025-27833 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27834/">CVE-2025-27834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27834">CVE-2025-27834 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27835/">CVE-2025-27835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27835">CVE-2025-27835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27836/">CVE-2025-27836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27836">CVE-2025-27836 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-27837/">CVE-2025-27837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27837">CVE-2025-27837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974145" comment="ghostscript-10.05.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974146" comment="ghostscript-devel-10.05.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974147" comment="ghostscript-x11-10.05.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253275" version="1" class="patch">
	<metadata>
		<title>gotosocial-0.18.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the gotosocial-0.18.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974148" comment="gotosocial-0.18.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253276" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250331T171002-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12055" ref_url="https://www.suse.com/security/cve/CVE-2024-12055/" source="CVE"/>
		<reference ref_id="CVE-2024-12886" ref_url="https://www.suse.com/security/cve/CVE-2024-12886/" source="CVE"/>
		<reference ref_id="CVE-2025-0315" ref_url="https://www.suse.com/security/cve/CVE-2025-0315/" source="CVE"/>
		<reference ref_id="CVE-2025-0317" ref_url="https://www.suse.com/security/cve/CVE-2025-0317/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250331T171002-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12055/">CVE-2024-12055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12055">CVE-2024-12055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12886/">CVE-2024-12886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12886">CVE-2024-12886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0315/">CVE-2025-0315 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0315">CVE-2025-0315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0317/">CVE-2025-0317 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0317">CVE-2025-0317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974149" comment="govulncheck-vulndb-0.0.20250331T171002-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253277" version="1" class="patch">
	<metadata>
		<title>headscale-0.25.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the headscale-0.25.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974150" comment="headscale-0.25.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253278" version="1" class="patch">
	<metadata>
		<title>libtheora-devel-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2024-56431" ref_url="https://www.suse.com/security/cve/CVE-2024-56431/" source="CVE"/>
		<description>
These are all security issues fixed in the libtheora-devel-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56431/">CVE-2024-56431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56431">CVE-2024-56431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974151" comment="libtheora-devel-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974152" comment="libtheora1-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974153" comment="libtheora1-32bit-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974154" comment="libtheoradec2-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974155" comment="libtheoradec2-32bit-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974156" comment="libtheoraenc2-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974157" comment="libtheoraenc2-32bit-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253279" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43097" ref_url="https://www.suse.com/security/cve/CVE-2024-43097/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-2857" ref_url="https://www.suse.com/security/cve/CVE-2025-2857/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43097/">CVE-2024-43097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43097">CVE-2024-43097 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2857/">CVE-2025-2857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2857">CVE-2025-2857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974158" comment="libmozjs-128-0-128.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974159" comment="mozjs128-128.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974160" comment="mozjs128-devel-128.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253280" version="1" class="patch">
	<metadata>
		<title>libsaml-devel-3.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31335" ref_url="https://www.suse.com/security/cve/CVE-2025-31335/" source="CVE"/>
		<description>
These are all security issues fixed in the libsaml-devel-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-31335/">CVE-2025-31335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31335">CVE-2025-31335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974161" comment="libsaml-devel-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974162" comment="libsaml13-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974163" comment="opensaml-bin-3.3.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974164" comment="opensaml-schemas-3.3.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253281" version="1" class="patch">
	<metadata>
		<title>perl-Data-Entropy-0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1860" ref_url="https://www.suse.com/security/cve/CVE-2025-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Data-Entropy-0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-02"/>
	<updated date="2025-04-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1860/">CVE-2025-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1860">CVE-2025-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974165" comment="perl-Data-Entropy-0.8.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253282" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2783" ref_url="https://www.suse.com/security/cve/CVE-2025-2783/" source="CVE"/>
		<reference ref_id="CVE-2025-2857" ref_url="https://www.suse.com/security/cve/CVE-2025-2857/" source="CVE"/>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2783/">CVE-2025-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2783">CVE-2025-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2857/">CVE-2025-2857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2857">CVE-2025-2857 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974373" comment="firefox-esr-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974374" comment="firefox-esr-branding-upstream-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974375" comment="firefox-esr-translations-common-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974376" comment="firefox-esr-translations-other-128.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253283" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974377" comment="go1.23-1.23.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974378" comment="go1.23-doc-1.23.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974379" comment="go1.23-libstd-1.23.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974380" comment="go1.23-race-1.23.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253284" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974381" comment="go1.24-1.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974382" comment="go1.24-doc-1.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974383" comment="go1.24-libstd-1.24.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974384" comment="go1.24-race-1.24.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253285" version="1" class="patch">
	<metadata>
		<title>gsl-2.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-353570" ref_url="https://www.suse.com/security/cve/CVE-2020-353570/" source="CVE"/>
		<description>
These are all security issues fixed in the gsl-2.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-353570/">CVE-2020-353570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-353570">CVE-2020-353570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974385" comment="gsl-2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974386" comment="gsl-devel-2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974387" comment="gsl-doc-2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974388" comment="gsl-examples-2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974389" comment="libgsl28-2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974390" comment="libgslcblas0-2.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253286" version="1" class="patch">
	<metadata>
		<title>python311-ecdsa-0.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ecdsa-0.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974391" comment="python311-ecdsa-0.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974392" comment="python312-ecdsa-0.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974393" comment="python313-ecdsa-0.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253287" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974477" comment="MozillaThunderbird-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974478" comment="MozillaThunderbird-openpgp-librnp-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974479" comment="MozillaThunderbird-translations-common-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974480" comment="MozillaThunderbird-translations-other-128.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253288" version="1" class="patch">
	<metadata>
		<title>chromedriver-135.0.7049.52-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3066" ref_url="https://www.suse.com/security/cve/CVE-2025-3066/" source="CVE"/>
		<reference ref_id="CVE-2025-3067" ref_url="https://www.suse.com/security/cve/CVE-2025-3067/" source="CVE"/>
		<reference ref_id="CVE-2025-3068" ref_url="https://www.suse.com/security/cve/CVE-2025-3068/" source="CVE"/>
		<reference ref_id="CVE-2025-3069" ref_url="https://www.suse.com/security/cve/CVE-2025-3069/" source="CVE"/>
		<reference ref_id="CVE-2025-3070" ref_url="https://www.suse.com/security/cve/CVE-2025-3070/" source="CVE"/>
		<reference ref_id="CVE-2025-3071" ref_url="https://www.suse.com/security/cve/CVE-2025-3071/" source="CVE"/>
		<reference ref_id="CVE-2025-3072" ref_url="https://www.suse.com/security/cve/CVE-2025-3072/" source="CVE"/>
		<reference ref_id="CVE-2025-3073" ref_url="https://www.suse.com/security/cve/CVE-2025-3073/" source="CVE"/>
		<reference ref_id="CVE-2025-3074" ref_url="https://www.suse.com/security/cve/CVE-2025-3074/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-135.0.7049.52-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-04-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3066/">CVE-2025-3066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3066">CVE-2025-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3067/">CVE-2025-3067 at SUSE</cve>
	<cve cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3067">CVE-2025-3067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3068/">CVE-2025-3068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3068">CVE-2025-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3069/">CVE-2025-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3069">CVE-2025-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3070/">CVE-2025-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3070">CVE-2025-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3071/">CVE-2025-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3071">CVE-2025-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3072/">CVE-2025-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3072">CVE-2025-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3073/">CVE-2025-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3073">CVE-2025-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3074/">CVE-2025-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3074">CVE-2025-3074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974481" comment="chromedriver-135.0.7049.52-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974482" comment="chromium-135.0.7049.52-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253289" version="1" class="patch">
	<metadata>
		<title>cyradm-3.8.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11356" ref_url="https://www.suse.com/security/cve/CVE-2019-11356/" source="CVE"/>
		<reference ref_id="CVE-2019-18928" ref_url="https://www.suse.com/security/cve/CVE-2019-18928/" source="CVE"/>
		<reference ref_id="CVE-2019-19783" ref_url="https://www.suse.com/security/cve/CVE-2019-19783/" source="CVE"/>
		<reference ref_id="CVE-2024-34055" ref_url="https://www.suse.com/security/cve/CVE-2024-34055/" source="CVE"/>
		<description>
These are all security issues fixed in the cyradm-3.8.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-04-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11356/">CVE-2019-11356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11356">CVE-2019-11356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18928/">CVE-2019-18928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18928">CVE-2019-18928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19783/">CVE-2019-19783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19783">CVE-2019-19783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34055/">CVE-2024-34055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34055">CVE-2024-34055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974483" comment="cyradm-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974484" comment="cyrus-imapd-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974485" comment="cyrus-imapd-devel-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974486" comment="cyrus-imapd-snmp-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974487" comment="cyrus-imapd-snmp-mibs-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974488" comment="cyrus-imapd-utils-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974489" comment="libcyrus0-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974490" comment="perl-Cyrus-Annotator-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974491" comment="perl-Cyrus-IMAP-3.8.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974492" comment="perl-Cyrus-SIEVE-managesieve-3.8.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253290" version="1" class="patch">
	<metadata>
		<title>google-guest-agent-20250327.01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the google-guest-agent-20250327.01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-04-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974493" comment="google-guest-agent-20250327.01-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253291" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250402T160203-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0312" ref_url="https://www.suse.com/security/cve/CVE-2025-0312/" source="CVE"/>
		<reference ref_id="CVE-2025-23391" ref_url="https://www.suse.com/security/cve/CVE-2025-23391/" source="CVE"/>
		<reference ref_id="CVE-2025-29072" ref_url="https://www.suse.com/security/cve/CVE-2025-29072/" source="CVE"/>
		<reference ref_id="CVE-2025-29868" ref_url="https://www.suse.com/security/cve/CVE-2025-29868/" source="CVE"/>
		<reference ref_id="CVE-2025-30223" ref_url="https://www.suse.com/security/cve/CVE-2025-30223/" source="CVE"/>
		<reference ref_id="CVE-2025-31135" ref_url="https://www.suse.com/security/cve/CVE-2025-31135/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250402T160203-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-04-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0312/">CVE-2025-0312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0312">CVE-2025-0312 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23391/">CVE-2025-23391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23391">CVE-2025-23391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29072/">CVE-2025-29072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29072">CVE-2025-29072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29868/">CVE-2025-29868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29868">CVE-2025-29868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30223/">CVE-2025-30223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30223">CVE-2025-30223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31135/">CVE-2025-31135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31135">CVE-2025-31135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974494" comment="govulncheck-vulndb-0.0.20250402T160203-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253292" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-137.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<reference ref_id="CVE-2025-3031" ref_url="https://www.suse.com/security/cve/CVE-2025-3031/" source="CVE"/>
		<reference ref_id="CVE-2025-3032" ref_url="https://www.suse.com/security/cve/CVE-2025-3032/" source="CVE"/>
		<reference ref_id="CVE-2025-3033" ref_url="https://www.suse.com/security/cve/CVE-2025-3033/" source="CVE"/>
		<reference ref_id="CVE-2025-3034" ref_url="https://www.suse.com/security/cve/CVE-2025-3034/" source="CVE"/>
		<reference ref_id="CVE-2025-3035" ref_url="https://www.suse.com/security/cve/CVE-2025-3035/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-137.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-3031/">CVE-2025-3031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3031">CVE-2025-3031 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-3032/">CVE-2025-3032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3032">CVE-2025-3032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3033/">CVE-2025-3033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3033">CVE-2025-3033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3034/">CVE-2025-3034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3034">CVE-2025-3034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3035/">CVE-2025-3035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3035">CVE-2025-3035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974699" comment="MozillaFirefox-137.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974700" comment="MozillaFirefox-branding-upstream-137.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974701" comment="MozillaFirefox-devel-137.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974702" comment="MozillaFirefox-translations-common-137.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974703" comment="MozillaFirefox-translations-other-137.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253293" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.4.16.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31492" ref_url="https://www.suse.com/security/cve/CVE-2025-31492/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.4.16.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31492/">CVE-2025-31492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31492">CVE-2025-31492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974704" comment="apache2-mod_auth_openidc-2.4.16.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253294" version="1" class="patch">
	<metadata>
		<title>etcd-3.5.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-3.5.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974705" comment="etcd-3.5.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974706" comment="etcdctl-3.5.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974707" comment="etcdutl-3.5.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253295" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="CVE-2025-1816" ref_url="https://www.suse.com/security/cve/CVE-2025-1816/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1816/">CVE-2025-1816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1816">CVE-2025-1816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974708" comment="ffmpeg-7-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974709" comment="ffmpeg-7-libavcodec-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974710" comment="ffmpeg-7-libavdevice-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974711" comment="ffmpeg-7-libavfilter-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974712" comment="ffmpeg-7-libavformat-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974713" comment="ffmpeg-7-libavutil-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974714" comment="ffmpeg-7-libpostproc-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974715" comment="ffmpeg-7-libswresample-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974716" comment="ffmpeg-7-libswscale-devel-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974717" comment="libavcodec61-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974718" comment="libavcodec61-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974719" comment="libavdevice61-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974720" comment="libavdevice61-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974721" comment="libavfilter10-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974722" comment="libavfilter10-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974723" comment="libavformat61-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974724" comment="libavformat61-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974725" comment="libavutil59-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974726" comment="libavutil59-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974727" comment="libpostproc58-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974728" comment="libpostproc58-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974729" comment="libswresample5-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974730" comment="libswresample5-32bit-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974731" comment="libswscale8-7.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974732" comment="libswscale8-32bit-7.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253296" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974733" comment="libmozjs-128-0-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974734" comment="mozjs128-128.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974735" comment="mozjs128-devel-128.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253297" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.04.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32364" ref_url="https://www.suse.com/security/cve/CVE-2025-32364/" source="CVE"/>
		<reference ref_id="CVE-2025-32365" ref_url="https://www.suse.com/security/cve/CVE-2025-32365/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.04.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2025-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32364/">CVE-2025-32364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32364">CVE-2025-32364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32365/">CVE-2025-32365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32365">CVE-2025-32365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974736" comment="libpoppler-cpp2-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974737" comment="libpoppler-cpp2-32bit-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974738" comment="libpoppler-devel-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974739" comment="libpoppler-glib-devel-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974740" comment="libpoppler-glib8-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974741" comment="libpoppler-glib8-32bit-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974742" comment="libpoppler148-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974743" comment="libpoppler148-32bit-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974744" comment="poppler-tools-25.04.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974745" comment="typelib-1_0-Poppler-0_18-25.04.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253298" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.34.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.34.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2025-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974849" comment="c-ares-devel-1.34.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974850" comment="c-ares-utils-1.34.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974851" comment="libcares2-1.34.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974852" comment="libcares2-32bit-1.34.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253299" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250408T210408-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250408T210408-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2025-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974853" comment="govulncheck-vulndb-0.0.20250408T210408-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253300" version="1" class="patch">
	<metadata>
		<title>openvpn-2.6.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2704" ref_url="https://www.suse.com/security/cve/CVE-2025-2704/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.6.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2025-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2704/">CVE-2025-2704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2704">CVE-2025-2704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974854" comment="openvpn-2.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974855" comment="openvpn-auth-pam-plugin-2.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974856" comment="openvpn-devel-2.6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974857" comment="openvpn-down-root-plugin-2.6.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253301" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974951" comment="docker-stable-24.0.9_ce-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974952" comment="docker-stable-bash-completion-24.0.9_ce-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974953" comment="docker-stable-buildx-0.22.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974954" comment="docker-stable-fish-completion-24.0.9_ce-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974955" comment="docker-stable-rootless-extras-24.0.9_ce-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974956" comment="docker-stable-zsh-completion-24.0.9_ce-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253302" version="1" class="patch">
	<metadata>
		<title>fontforge-20230101-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-17521" ref_url="https://www.suse.com/security/cve/CVE-2017-17521/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20230101-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17521/">CVE-2017-17521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17521">CVE-2017-17521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974957" comment="fontforge-20230101-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974958" comment="fontforge-devel-20230101-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974959" comment="fontforge-doc-20230101-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253303" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250409T170536-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31483" ref_url="https://www.suse.com/security/cve/CVE-2025-31483/" source="CVE"/>
		<reference ref_id="CVE-2025-31489" ref_url="https://www.suse.com/security/cve/CVE-2025-31489/" source="CVE"/>
		<reference ref_id="CVE-2025-32024" ref_url="https://www.suse.com/security/cve/CVE-2025-32024/" source="CVE"/>
		<reference ref_id="CVE-2025-32025" ref_url="https://www.suse.com/security/cve/CVE-2025-32025/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250409T170536-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31483/">CVE-2025-31483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31483">CVE-2025-31483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31489/">CVE-2025-31489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31489">CVE-2025-31489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32024/">CVE-2025-32024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32024">CVE-2025-32024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32025/">CVE-2025-32025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32025">CVE-2025-32025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974960" comment="govulncheck-vulndb-0.0.20250409T170536-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253304" version="1" class="patch">
	<metadata>
		<title>pgadmin4-9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6238" ref_url="https://www.suse.com/security/cve/CVE-2024-6238/" source="CVE"/>
		<reference ref_id="CVE-2024-9014" ref_url="https://www.suse.com/security/cve/CVE-2024-9014/" source="CVE"/>
		<reference ref_id="CVE-2025-2945" ref_url="https://www.suse.com/security/cve/CVE-2025-2945/" source="CVE"/>
		<reference ref_id="CVE-2025-2946" ref_url="https://www.suse.com/security/cve/CVE-2025-2946/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6238/">CVE-2024-6238 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6238">CVE-2024-6238 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9014/">CVE-2024-9014 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9014">CVE-2024-9014 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-2945/">CVE-2025-2945 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2945">CVE-2025-2945 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-2946/">CVE-2025-2946 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2946">CVE-2025-2946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974961" comment="pgadmin4-9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974962" comment="pgadmin4-cloud-9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974963" comment="pgadmin4-desktop-9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974964" comment="pgadmin4-doc-9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974965" comment="pgadmin4-web-uwsgi-9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974966" comment="system-user-pgadmin-9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253305" version="1" class="patch">
	<metadata>
		<title>liblzma5-32bit-5.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31115" ref_url="https://www.suse.com/security/cve/CVE-2025-31115/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzma5-32bit-5.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31115/">CVE-2025-31115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31115">CVE-2025-31115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974967" comment="liblzma5-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974968" comment="liblzma5-32bit-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974969" comment="liblzma5-x86-64-v3-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974970" comment="xz-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974971" comment="xz-devel-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974972" comment="xz-devel-32bit-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974973" comment="xz-lang-5.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253306" version="1" class="patch">
	<metadata>
		<title>docker-27.5.1_ce-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-27.5.1_ce-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975017" comment="docker-27.5.1_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975018" comment="docker-bash-completion-27.5.1_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975019" comment="docker-buildx-0.22.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975020" comment="docker-fish-completion-27.5.1_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975021" comment="docker-rootless-extras-27.5.1_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975022" comment="docker-zsh-completion-27.5.1_ce-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253307" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27556" ref_url="https://www.suse.com/security/cve/CVE-2025-27556/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-27556/">CVE-2025-27556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27556">CVE-2025-27556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975023" comment="python311-Django-5.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975024" comment="python312-Django-5.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975025" comment="python313-Django-5.1.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253308" version="1" class="patch">
	<metadata>
		<title>python311-PyJWT-2.10.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-29217" ref_url="https://www.suse.com/security/cve/CVE-2022-29217/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyJWT-2.10.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-04-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29217/">CVE-2022-29217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29217">CVE-2022-29217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975026" comment="python311-PyJWT-2.10.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975027" comment="python312-PyJWT-2.10.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975028" comment="python313-PyJWT-2.10.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253309" version="1" class="patch">
	<metadata>
		<title>cosign-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-14"/>
	<updated date="2025-04-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975383" comment="cosign-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975384" comment="cosign-bash-completion-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975385" comment="cosign-fish-completion-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975386" comment="cosign-zsh-completion-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253310" version="1" class="patch">
	<metadata>
		<title>flannel-0.26.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the flannel-0.26.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-14"/>
	<updated date="2025-04-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975387" comment="flannel-0.26.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975388" comment="flannel-k8s-yaml-0.26.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253311" version="1" class="patch">
	<metadata>
		<title>rekor-1.3.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.3.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-14"/>
	<updated date="2025-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975389" comment="rekor-1.3.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253312" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.49.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-29087" ref_url="https://www.suse.com/security/cve/CVE-2025-29087/" source="CVE"/>
		<reference ref_id="CVE-2025-29088" ref_url="https://www.suse.com/security/cve/CVE-2025-29088/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.49.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-14"/>
	<updated date="2025-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29087/">CVE-2025-29087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29087">CVE-2025-29087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29088/">CVE-2025-29088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29088">CVE-2025-29088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975390" comment="libsqlite3-0-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975391" comment="libsqlite3-0-32bit-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975392" comment="libsqlite3-0-x86-64-v3-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975393" comment="sqlite3-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975394" comment="sqlite3-devel-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975395" comment="sqlite3-doc-3.49.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975396" comment="sqlite3-tcl-3.49.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253313" version="1" class="patch">
	<metadata>
		<title>libvarnishapi3-7.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30346" ref_url="https://www.suse.com/security/cve/CVE-2025-30346/" source="CVE"/>
		<description>
These are all security issues fixed in the libvarnishapi3-7.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-14"/>
	<updated date="2025-04-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30346/">CVE-2025-30346 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30346">CVE-2025-30346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975397" comment="libvarnishapi3-7.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975398" comment="varnish-7.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975399" comment="varnish-devel-7.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253314" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.45-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32460" ref_url="https://www.suse.com/security/cve/CVE-2025-32460/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.45-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32460/">CVE-2025-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32460">CVE-2025-32460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975528" comment="GraphicsMagick-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975529" comment="GraphicsMagick-devel-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975530" comment="libGraphicsMagick++-Q16-12-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975531" comment="libGraphicsMagick++-devel-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975532" comment="libGraphicsMagick-Q16-3-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975533" comment="libGraphicsMagick3-config-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975534" comment="libGraphicsMagickWand-Q16-2-1.3.45-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975535" comment="perl-GraphicsMagick-1.3.45-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253315" version="1" class="patch">
	<metadata>
		<title>gitoxide-0.42.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22620" ref_url="https://www.suse.com/security/cve/CVE-2025-22620/" source="CVE"/>
		<reference ref_id="CVE-2025-31130" ref_url="https://www.suse.com/security/cve/CVE-2025-31130/" source="CVE"/>
		<description>
These are all security issues fixed in the gitoxide-0.42.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22620/">CVE-2025-22620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22620">CVE-2025-22620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31130/">CVE-2025-31130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31130">CVE-2025-31130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975536" comment="gitoxide-0.42.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253316" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32386" ref_url="https://www.suse.com/security/cve/CVE-2025-32386/" source="CVE"/>
		<reference ref_id="CVE-2025-32387" ref_url="https://www.suse.com/security/cve/CVE-2025-32387/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250410T162706-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32386/">CVE-2025-32386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32386">CVE-2025-32386 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32387/">CVE-2025-32387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32387">CVE-2025-32387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975537" comment="govulncheck-vulndb-0.0.20250410T162706-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253317" version="1" class="patch">
	<metadata>
		<title>hauler-1.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0406" ref_url="https://www.suse.com/security/cve/CVE-2024-0406/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0406/">CVE-2024-0406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0406">CVE-2024-0406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975538" comment="hauler-1.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253318" version="1" class="patch">
	<metadata>
		<title>oci-cli-3.54.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<reference ref_id="CVE-2024-39689" ref_url="https://www.suse.com/security/cve/CVE-2024-39689/" source="CVE"/>
		<reference ref_id="CVE-2024-56201" ref_url="https://www.suse.com/security/cve/CVE-2024-56201/" source="CVE"/>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<description>
These are all security issues fixed in the oci-cli-3.54.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39689/">CVE-2024-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39689">CVE-2024-39689 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56201/">CVE-2024-56201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56201">CVE-2024-56201 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975539" comment="oci-cli-3.54.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253319" version="1" class="patch">
	<metadata>
		<title>python311-aiohttp-3.11.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-aiohttp-3.11.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975540" comment="python311-aiohttp-3.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975541" comment="python312-aiohttp-3.11.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975542" comment="python313-aiohttp-3.11.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253320" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-5.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-5.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-15"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975543" comment="python-lxml-doc-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975544" comment="python311-lxml-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975545" comment="python311-lxml-devel-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975546" comment="python312-lxml-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975547" comment="python312-lxml-devel-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975548" comment="python313-lxml-5.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975549" comment="python313-lxml-devel-5.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253321" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2830" ref_url="https://www.suse.com/security/cve/CVE-2025-2830/" source="CVE"/>
		<reference ref_id="CVE-2025-3522" ref_url="https://www.suse.com/security/cve/CVE-2025-3522/" source="CVE"/>
		<reference ref_id="CVE-2025-3523" ref_url="https://www.suse.com/security/cve/CVE-2025-3523/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-16"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="4.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2830/">CVE-2025-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2830">CVE-2025-2830 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3522/">CVE-2025-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3522">CVE-2025-3522 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3523/">CVE-2025-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3523">CVE-2025-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975709" comment="MozillaThunderbird-128.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975710" comment="MozillaThunderbird-openpgp-librnp-128.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975711" comment="MozillaThunderbird-translations-common-128.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975712" comment="MozillaThunderbird-translations-other-128.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253322" version="1" class="patch">
	<metadata>
		<title>forgejo-10.0.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3445" ref_url="https://www.suse.com/security/cve/CVE-2025-3445/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-10.0.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-16"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-3445/">CVE-2025-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3445">CVE-2025-3445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975713" comment="forgejo-10.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975714" comment="forgejo-apparmor-10.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975715" comment="forgejo-environment-to-ini-10.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975716" comment="forgejo-firewalld-10.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975717" comment="forgejo-selinux-10.0.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253323" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.15.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56431" ref_url="https://www.suse.com/security/cve/CVE-2024-56431/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.15.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-16"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56431/">CVE-2024-56431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56431">CVE-2024-56431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975718" comment="libmozjs-115-0-115.15.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975719" comment="mozjs115-115.15.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975720" comment="mozjs115-devel-115.15.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253324" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.40.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56406" ref_url="https://www.suse.com/security/cve/CVE-2024-56406/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.40.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-16"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56406/">CVE-2024-56406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56406">CVE-2024-56406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975721" comment="perl-5.40.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975722" comment="perl-32bit-5.40.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975723" comment="perl-base-5.40.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975724" comment="perl-base-32bit-5.40.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975725" comment="perl-doc-5.40.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253325" version="1" class="patch">
	<metadata>
		<title>subfinder-2.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0406" ref_url="https://www.suse.com/security/cve/CVE-2024-0406/" source="CVE"/>
		<description>
These are all security issues fixed in the subfinder-2.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-16"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0406/">CVE-2024-0406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0406">CVE-2024-0406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975726" comment="subfinder-2.7.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253326" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-137.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3608" ref_url="https://www.suse.com/security/cve/CVE-2025-3608/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-137.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3608/">CVE-2025-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3608">CVE-2025-3608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975947" comment="MozillaFirefox-137.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975948" comment="MozillaFirefox-branding-upstream-137.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975949" comment="MozillaFirefox-devel-137.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975950" comment="MozillaFirefox-translations-common-137.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975951" comment="MozillaFirefox-translations-other-137.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253327" version="1" class="patch">
	<metadata>
		<title>argocd-cli-2.14.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-29786" ref_url="https://www.suse.com/security/cve/CVE-2025-29786/" source="CVE"/>
		<description>
These are all security issues fixed in the argocd-cli-2.14.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29786/">CVE-2025-29786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975952" comment="argocd-cli-2.14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975953" comment="argocd-cli-bash-completion-2.14.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975954" comment="argocd-cli-zsh-completion-2.14.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253328" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.84.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3360" ref_url="https://www.suse.com/security/cve/CVE-2025-3360/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.84.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3360/">CVE-2025-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3360">CVE-2025-3360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975955" comment="gio-branding-upstream-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975956" comment="glib2-devel-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975957" comment="glib2-devel-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975958" comment="glib2-devel-static-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975959" comment="glib2-lang-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975960" comment="glib2-tests-devel-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975961" comment="glib2-tools-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975962" comment="glib2-tools-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975963" comment="libgio-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975964" comment="libgio-2_0-0-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975965" comment="libgirepository-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975966" comment="libglib-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975967" comment="libglib-2_0-0-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975968" comment="libgmodule-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975969" comment="libgmodule-2_0-0-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975970" comment="libgobject-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975971" comment="libgobject-2_0-0-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975972" comment="libgthread-2_0-0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975973" comment="libgthread-2_0-0-32bit-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975974" comment="typelib-1_0-GIRepository-3_0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975975" comment="typelib-1_0-GLib-2_0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975976" comment="typelib-1_0-GLibUnix-2_0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975977" comment="typelib-1_0-GModule-2_0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975978" comment="typelib-1_0-GObject-2_0-2.84.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975979" comment="typelib-1_0-Gio-2_0-2.84.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253329" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250416T165455-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250416T165455-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975980" comment="govulncheck-vulndb-0.0.20250416T165455-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253330" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.9.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56431" ref_url="https://www.suse.com/security/cve/CVE-2024-56431/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.9.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56431/">CVE-2024-56431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56431">CVE-2024-56431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975981" comment="libmozjs-128-0-128.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975982" comment="mozjs128-128.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975983" comment="mozjs128-devel-128.9.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253331" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<reference ref_id="CVE-2024-12361" ref_url="https://www.suse.com/security/cve/CVE-2024-12361/" source="CVE"/>
		<reference ref_id="CVE-2024-35365" ref_url="https://www.suse.com/security/cve/CVE-2024-35365/" source="CVE"/>
		<reference ref_id="CVE-2024-35368" ref_url="https://www.suse.com/security/cve/CVE-2024-35368/" source="CVE"/>
		<reference ref_id="CVE-2025-0518" ref_url="https://www.suse.com/security/cve/CVE-2025-0518/" source="CVE"/>
		<reference ref_id="CVE-2025-22919" ref_url="https://www.suse.com/security/cve/CVE-2025-22919/" source="CVE"/>
		<reference ref_id="CVE-2025-22921" ref_url="https://www.suse.com/security/cve/CVE-2025-22921/" source="CVE"/>
		<reference ref_id="CVE-2025-25473" ref_url="https://www.suse.com/security/cve/CVE-2025-25473/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-18"/>
	<updated date="2025-04-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12361/">CVE-2024-12361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12361">CVE-2024-12361 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35365/">CVE-2024-35365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35365">CVE-2024-35365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35368/">CVE-2024-35368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35368">CVE-2024-35368 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0518/">CVE-2025-0518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0518">CVE-2025-0518 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22919/">CVE-2025-22919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22919">CVE-2025-22919 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22921/">CVE-2025-22921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22921">CVE-2025-22921 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25473/">CVE-2025-25473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25473">CVE-2025-25473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975997" comment="ffmpeg-6-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975998" comment="ffmpeg-6-libavcodec-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975999" comment="ffmpeg-6-libavdevice-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976000" comment="ffmpeg-6-libavfilter-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976001" comment="ffmpeg-6-libavformat-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976002" comment="ffmpeg-6-libavutil-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976003" comment="ffmpeg-6-libpostproc-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976004" comment="ffmpeg-6-libswresample-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976005" comment="ffmpeg-6-libswscale-devel-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976006" comment="libavcodec60-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976007" comment="libavdevice60-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976008" comment="libavfilter9-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976009" comment="libavformat60-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976010" comment="libavutil58-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976011" comment="libpostproc57-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976012" comment="libswresample4-6.1.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976013" comment="libswscale7-6.1.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253332" version="1" class="patch">
	<metadata>
		<title>epiphany-48.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3839" ref_url="https://www.suse.com/security/cve/CVE-2025-3839/" source="CVE"/>
		<description>
These are all security issues fixed in the epiphany-48.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-3839/">CVE-2025-3839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3839">CVE-2025-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976105" comment="epiphany-48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976106" comment="epiphany-branding-upstream-48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976107" comment="epiphany-lang-48.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976108" comment="gnome-shell-search-provider-epiphany-48.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253333" version="1" class="patch">
	<metadata>
		<title>ffmpeg-6-6.1.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<reference ref_id="CVE-2024-36613" ref_url="https://www.suse.com/security/cve/CVE-2024-36613/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-6-6.1.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36613/">CVE-2024-36613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613">CVE-2024-36613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976109" comment="ffmpeg-6-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976110" comment="ffmpeg-6-libavcodec-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976111" comment="ffmpeg-6-libavdevice-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976112" comment="ffmpeg-6-libavfilter-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976113" comment="ffmpeg-6-libavformat-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976114" comment="ffmpeg-6-libavutil-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976115" comment="ffmpeg-6-libpostproc-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976116" comment="ffmpeg-6-libswresample-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976117" comment="ffmpeg-6-libswscale-devel-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976118" comment="libavcodec60-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976119" comment="libavdevice60-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976120" comment="libavfilter9-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976121" comment="libavformat60-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976122" comment="libavutil58-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976123" comment="libpostproc57-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976124" comment="libswresample4-6.1.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976125" comment="libswscale7-6.1.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253334" version="1" class="patch">
	<metadata>
		<title>gopass-1.15.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the gopass-1.15.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976126" comment="gopass-1.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976127" comment="gopass-bash-completion-1.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976128" comment="gopass-fish-completion-1.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976129" comment="gopass-impersonate-pass-1.15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976130" comment="gopass-zsh-completion-1.15.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253335" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250422T152923-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30215" ref_url="https://www.suse.com/security/cve/CVE-2025-30215/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250422T152923-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30215/">CVE-2025-30215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30215">CVE-2025-30215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976131" comment="govulncheck-vulndb-0.0.20250422T152923-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253336" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32908" ref_url="https://www.suse.com/security/cve/CVE-2025-32908/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32908/">CVE-2025-32908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32908">CVE-2025-32908 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976132" comment="libsoup-3_0-0-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976133" comment="libsoup-3_0-0-32bit-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976134" comment="libsoup-devel-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976135" comment="libsoup-devel-32bit-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976136" comment="libsoup-lang-3.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976137" comment="typelib-1_0-Soup-3_0-3.6.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253337" version="1" class="patch">
	<metadata>
		<title>mcabber-1.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5589" ref_url="https://www.suse.com/security/cve/CVE-2017-5589/" source="CVE"/>
		<description>
These are all security issues fixed in the mcabber-1.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-04-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5589/">CVE-2017-5589 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5589">CVE-2017-5589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976138" comment="mcabber-1.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976139" comment="mcabber-devel-1.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253338" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250422T181640-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-15119" ref_url="https://www.suse.com/security/cve/CVE-2019-15119/" source="CVE"/>
		<reference ref_id="CVE-2025-1386" ref_url="https://www.suse.com/security/cve/CVE-2025-1386/" source="CVE"/>
		<reference ref_id="CVE-2025-2424" ref_url="https://www.suse.com/security/cve/CVE-2025-2424/" source="CVE"/>
		<reference ref_id="CVE-2025-24358" ref_url="https://www.suse.com/security/cve/CVE-2025-24358/" source="CVE"/>
		<reference ref_id="CVE-2025-2475" ref_url="https://www.suse.com/security/cve/CVE-2025-2475/" source="CVE"/>
		<reference ref_id="CVE-2025-24839" ref_url="https://www.suse.com/security/cve/CVE-2025-24839/" source="CVE"/>
		<reference ref_id="CVE-2025-24866" ref_url="https://www.suse.com/security/cve/CVE-2025-24866/" source="CVE"/>
		<reference ref_id="CVE-2025-2564" ref_url="https://www.suse.com/security/cve/CVE-2025-2564/" source="CVE"/>
		<reference ref_id="CVE-2025-27538" ref_url="https://www.suse.com/security/cve/CVE-2025-27538/" source="CVE"/>
		<reference ref_id="CVE-2025-27571" ref_url="https://www.suse.com/security/cve/CVE-2025-27571/" source="CVE"/>
		<reference ref_id="CVE-2025-27936" ref_url="https://www.suse.com/security/cve/CVE-2025-27936/" source="CVE"/>
		<reference ref_id="CVE-2025-30206" ref_url="https://www.suse.com/security/cve/CVE-2025-30206/" source="CVE"/>
		<reference ref_id="CVE-2025-31363" ref_url="https://www.suse.com/security/cve/CVE-2025-31363/" source="CVE"/>
		<reference ref_id="CVE-2025-32093" ref_url="https://www.suse.com/security/cve/CVE-2025-32093/" source="CVE"/>
		<reference ref_id="CVE-2025-32431" ref_url="https://www.suse.com/security/cve/CVE-2025-32431/" source="CVE"/>
		<reference ref_id="CVE-2025-32445" ref_url="https://www.suse.com/security/cve/CVE-2025-32445/" source="CVE"/>
		<reference ref_id="CVE-2025-32793" ref_url="https://www.suse.com/security/cve/CVE-2025-32793/" source="CVE"/>
		<reference ref_id="CVE-2025-32963" ref_url="https://www.suse.com/security/cve/CVE-2025-32963/" source="CVE"/>
		<reference ref_id="CVE-2025-3801" ref_url="https://www.suse.com/security/cve/CVE-2025-3801/" source="CVE"/>
		<reference ref_id="CVE-2025-43970" ref_url="https://www.suse.com/security/cve/CVE-2025-43970/" source="CVE"/>
		<reference ref_id="CVE-2025-43971" ref_url="https://www.suse.com/security/cve/CVE-2025-43971/" source="CVE"/>
		<reference ref_id="CVE-2025-43972" ref_url="https://www.suse.com/security/cve/CVE-2025-43972/" source="CVE"/>
		<reference ref_id="CVE-2025-43973" ref_url="https://www.suse.com/security/cve/CVE-2025-43973/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250422T181640-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-23"/>
	<updated date="2025-04-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15119/">CVE-2019-15119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15119">CVE-2019-15119 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1386/">CVE-2025-1386 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1386">CVE-2025-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2424/">CVE-2025-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2424">CVE-2025-2424 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24358/">CVE-2025-24358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24358">CVE-2025-24358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2475/">CVE-2025-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2475">CVE-2025-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24839/">CVE-2025-24839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24839">CVE-2025-24839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24866/">CVE-2025-24866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24866">CVE-2025-24866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2564/">CVE-2025-2564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2564">CVE-2025-2564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27538/">CVE-2025-27538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27538">CVE-2025-27538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27571/">CVE-2025-27571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27571">CVE-2025-27571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27936/">CVE-2025-27936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27936">CVE-2025-27936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30206/">CVE-2025-30206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30206">CVE-2025-30206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31363/">CVE-2025-31363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31363">CVE-2025-31363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32093/">CVE-2025-32093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32093">CVE-2025-32093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32431/">CVE-2025-32431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32431">CVE-2025-32431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32445/">CVE-2025-32445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32445">CVE-2025-32445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32793/">CVE-2025-32793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32793">CVE-2025-32793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32963/">CVE-2025-32963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32963">CVE-2025-32963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3801/">CVE-2025-3801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3801">CVE-2025-3801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43970/">CVE-2025-43970 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43970">CVE-2025-43970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43971/">CVE-2025-43971 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43971">CVE-2025-43971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43972/">CVE-2025-43972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43972">CVE-2025-43972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43973/">CVE-2025-43973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43973">CVE-2025-43973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976218" comment="govulncheck-vulndb-0.0.20250422T181640-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253339" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784/" source="CVE"/>
		<reference ref_id="CVE-2025-32050" ref_url="https://www.suse.com/security/cve/CVE-2025-32050/" source="CVE"/>
		<reference ref_id="CVE-2025-32052" ref_url="https://www.suse.com/security/cve/CVE-2025-32052/" source="CVE"/>
		<reference ref_id="CVE-2025-32053" ref_url="https://www.suse.com/security/cve/CVE-2025-32053/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-23"/>
	<updated date="2025-04-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32050/">CVE-2025-32050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32050">CVE-2025-32050 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32052/">CVE-2025-32052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32052">CVE-2025-32052 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32053/">CVE-2025-32053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32053">CVE-2025-32053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976219" comment="libsoup-2_4-1-2.74.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976220" comment="libsoup-2_4-1-32bit-2.74.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976221" comment="libsoup2-devel-2.74.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976222" comment="libsoup2-devel-32bit-2.74.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976223" comment="libsoup2-lang-2.74.3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976224" comment="typelib-1_0-Soup-2_4-2.74.3-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253340" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.13.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.13.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-23"/>
	<updated date="2025-04-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976225" comment="libxml2-2-2.13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976226" comment="libxml2-2-32bit-2.13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976227" comment="libxml2-devel-2.13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976228" comment="libxml2-devel-32bit-2.13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976229" comment="libxml2-doc-2.13.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976230" comment="libxml2-tools-2.13.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253341" version="1" class="patch">
	<metadata>
		<title>rollup-3.29.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-43788" ref_url="https://www.suse.com/security/cve/CVE-2024-43788/" source="CVE"/>
		<description>
These are all security issues fixed in the rollup-3.29.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-23"/>
	<updated date="2025-04-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-43788/">CVE-2024-43788 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43788">CVE-2024-43788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976231" comment="rollup-3.29.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253342" version="1" class="patch">
	<metadata>
		<title>augeas-1.14.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2588" ref_url="https://www.suse.com/security/cve/CVE-2025-2588/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.14.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2588/">CVE-2025-2588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2588">CVE-2025-2588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976362" comment="augeas-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976363" comment="augeas-bash-completion-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976364" comment="augeas-devel-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976365" comment="augeas-devel-32bit-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976366" comment="augeas-lense-tests-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976367" comment="augeas-lenses-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976368" comment="libaugeas0-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976369" comment="libaugeas0-32bit-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976370" comment="libfa1-1.14.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976371" comment="libfa1-32bit-1.14.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253343" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.27.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.27.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976372" comment="java-11-openjdk-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976373" comment="java-11-openjdk-demo-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976374" comment="java-11-openjdk-devel-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976375" comment="java-11-openjdk-headless-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976376" comment="java-11-openjdk-javadoc-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976377" comment="java-11-openjdk-jmods-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976378" comment="java-11-openjdk-src-11.0.27.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253344" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976379" comment="java-17-openjdk-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976380" comment="java-17-openjdk-demo-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976381" comment="java-17-openjdk-devel-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976382" comment="java-17-openjdk-headless-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976383" comment="java-17-openjdk-javadoc-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976384" comment="java-17-openjdk-jmods-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976385" comment="java-17-openjdk-src-17.0.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253345" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976386" comment="java-21-openjdk-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976387" comment="java-21-openjdk-demo-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976388" comment="java-21-openjdk-devel-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976389" comment="java-21-openjdk-headless-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976390" comment="java-21-openjdk-javadoc-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976391" comment="java-21-openjdk-jmods-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976392" comment="java-21-openjdk-src-21.0.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253346" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.21.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-43961" ref_url="https://www.suse.com/security/cve/CVE-2025-43961/" source="CVE"/>
		<reference ref_id="CVE-2025-43962" ref_url="https://www.suse.com/security/cve/CVE-2025-43962/" source="CVE"/>
		<reference ref_id="CVE-2025-43963" ref_url="https://www.suse.com/security/cve/CVE-2025-43963/" source="CVE"/>
		<reference ref_id="CVE-2025-43964" ref_url="https://www.suse.com/security/cve/CVE-2025-43964/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.21.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43961/">CVE-2025-43961 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43961">CVE-2025-43961 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43962/">CVE-2025-43962 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43962">CVE-2025-43962 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43963/">CVE-2025-43963 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43963">CVE-2025-43963 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43964/">CVE-2025-43964 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43964">CVE-2025-43964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976393" comment="libraw-devel-0.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976394" comment="libraw-devel-static-0.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976395" comment="libraw-tools-0.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976396" comment="libraw23-0.21.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976397" comment="libraw23-32bit-0.21.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253347" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-9.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30706" ref_url="https://www.suse.com/security/cve/CVE-2025-30706/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-9.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30706/">CVE-2025-30706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30706">CVE-2025-30706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976398" comment="mysql-connector-java-9.3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253348" version="1" class="patch">
	<metadata>
		<title>chromedriver-135.0.7049.95-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3619" ref_url="https://www.suse.com/security/cve/CVE-2025-3619/" source="CVE"/>
		<reference ref_id="CVE-2025-3620" ref_url="https://www.suse.com/security/cve/CVE-2025-3620/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-135.0.7049.95-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3619/">CVE-2025-3619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3619">CVE-2025-3619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3620/">CVE-2025-3620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3620">CVE-2025-3620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976405" comment="chromedriver-135.0.7049.95-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976406" comment="chromium-135.0.7049.95-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253349" version="1" class="patch">
	<metadata>
		<title>distrobuilder-3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the distrobuilder-3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976407" comment="distrobuilder-3.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253350" version="1" class="patch">
	<metadata>
		<title>kyverno-1.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the kyverno-1.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976408" comment="kyverno-1.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976409" comment="kyverno-bash-completion-1.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976410" comment="kyverno-fish-completion-1.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976411" comment="kyverno-zsh-completion-1.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253351" version="1" class="patch">
	<metadata>
		<title>opentofu-1.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<description>
These are all security issues fixed in the opentofu-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976412" comment="opentofu-1.9.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253352" version="1" class="patch">
	<metadata>
		<title>python311-grpcio-1.69.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11407" ref_url="https://www.suse.com/security/cve/CVE-2024-11407/" source="CVE"/>
		<reference ref_id="CVE-2024-7246" ref_url="https://www.suse.com/security/cve/CVE-2024-7246/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-grpcio-1.69.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green" href="https://www.suse.com/security/cve/CVE-2024-11407/">CVE-2024-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11407">CVE-2024-11407 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-7246/">CVE-2024-7246 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7246">CVE-2024-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976413" comment="python311-grpcio-1.69.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976414" comment="python312-grpcio-1.69.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976415" comment="python313-grpcio-1.69.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253353" version="1" class="patch">
	<metadata>
		<title>python311-h11-0.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-43859" ref_url="https://www.suse.com/security/cve/CVE-2025-43859/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-h11-0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-04-25"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43859/">CVE-2025-43859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43859">CVE-2025-43859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976416" comment="python311-h11-0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976417" comment="python312-h11-0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976418" comment="python313-h11-0.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253354" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250424T181457-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-9232" ref_url="https://www.suse.com/security/cve/CVE-2017-9232/" source="CVE"/>
		<reference ref_id="CVE-2025-35965" ref_url="https://www.suse.com/security/cve/CVE-2025-35965/" source="CVE"/>
		<reference ref_id="CVE-2025-41395" ref_url="https://www.suse.com/security/cve/CVE-2025-41395/" source="CVE"/>
		<reference ref_id="CVE-2025-41423" ref_url="https://www.suse.com/security/cve/CVE-2025-41423/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250424T181457-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-26"/>
	<updated date="2025-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9232/">CVE-2017-9232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9232">CVE-2017-9232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-35965/">CVE-2025-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-35965">CVE-2025-35965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41395/">CVE-2025-41395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41395">CVE-2025-41395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41423/">CVE-2025-41423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41423">CVE-2025-41423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976421" comment="govulncheck-vulndb-0.0.20250424T181457-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253355" version="1" class="patch">
	<metadata>
		<title>subfinder-2.7.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the subfinder-2.7.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-26"/>
	<updated date="2025-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976422" comment="subfinder-2.7.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253356" version="1" class="patch">
	<metadata>
		<title>valkey-8.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-26"/>
	<updated date="2025-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976423" comment="valkey-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976424" comment="valkey-compat-redis-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976425" comment="valkey-devel-8.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253357" version="1" class="patch">
	<metadata>
		<title>glow-2.1.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the glow-2.1.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-27"/>
	<updated date="2025-04-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976428" comment="glow-2.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976429" comment="glow-bash-completion-2.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976430" comment="glow-fish-completion-2.1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976431" comment="glow-zsh-completion-2.1.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253358" version="1" class="patch">
	<metadata>
		<title>amber-cli-1.13.1+git20250329.c2e3bb8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the amber-cli-1.13.1+git20250329.c2e3bb8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-29"/>
	<updated date="2025-04-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976821" comment="amber-cli-1.13.1+git20250329.c2e3bb8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253359" version="1" class="patch">
	<metadata>
		<title>cyradm-3.8.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23394" ref_url="https://www.suse.com/security/cve/CVE-2025-23394/" source="CVE"/>
		<description>
These are all security issues fixed in the cyradm-3.8.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-29"/>
	<updated date="2025-04-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23394/">CVE-2025-23394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23394">CVE-2025-23394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976822" comment="cyradm-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976823" comment="cyrus-imapd-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976824" comment="cyrus-imapd-devel-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976825" comment="cyrus-imapd-snmp-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976826" comment="cyrus-imapd-snmp-mibs-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976827" comment="cyrus-imapd-utils-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976828" comment="libcyrus0-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976829" comment="perl-Cyrus-Annotator-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976830" comment="perl-Cyrus-IMAP-3.8.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976831" comment="perl-Cyrus-SIEVE-managesieve-3.8.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253360" version="1" class="patch">
	<metadata>
		<title>cmctl-2.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-2.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2025-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976992" comment="cmctl-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976993" comment="cmctl-bash-completion-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976994" comment="cmctl-fish-completion-2.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976995" comment="cmctl-zsh-completion-2.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253361" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2025-04-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976996" comment="firefox-esr-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976997" comment="firefox-esr-branding-upstream-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976998" comment="firefox-esr-translations-common-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976999" comment="firefox-esr-translations-other-128.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253362" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-node_exporter-1.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-node_exporter-1.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2025-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977000" comment="golang-github-prometheus-node_exporter-1.9.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253363" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4082" ref_url="https://www.suse.com/security/cve/CVE-2025-4082/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4084" ref_url="https://www.suse.com/security/cve/CVE-2025-4084/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-01"/>
	<updated date="2025-05-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4082/">CVE-2025-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4082">CVE-2025-4082 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4084/">CVE-2025-4084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4084">CVE-2025-4084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977001" comment="MozillaThunderbird-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977002" comment="MozillaThunderbird-openpgp-librnp-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977003" comment="MozillaThunderbird-translations-common-128.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977004" comment="MozillaThunderbird-translations-other-128.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253364" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-01"/>
	<updated date="2025-05-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977005" comment="libsoup-3_0-0-3.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977006" comment="libsoup-3_0-0-32bit-3.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977007" comment="libsoup-devel-3.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977008" comment="libsoup-devel-32bit-3.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977009" comment="libsoup-lang-3.6.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977010" comment="typelib-1_0-Soup-3_0-3.6.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253365" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-46420" ref_url="https://www.suse.com/security/cve/CVE-2025-46420/" source="CVE"/>
		<reference ref_id="CVE-2025-46421" ref_url="https://www.suse.com/security/cve/CVE-2025-46421/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-01"/>
	<updated date="2025-05-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46420/">CVE-2025-46420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46420">CVE-2025-46420 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46421/">CVE-2025-46421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46421">CVE-2025-46421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977011" comment="libsoup-2_4-1-2.74.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977012" comment="libsoup-2_4-1-32bit-2.74.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977013" comment="libsoup2-devel-2.74.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977014" comment="libsoup2-devel-32bit-2.74.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977015" comment="libsoup2-lang-2.74.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977016" comment="typelib-1_0-Soup-2_4-2.74.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253366" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-138.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4082" ref_url="https://www.suse.com/security/cve/CVE-2025-4082/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4085" ref_url="https://www.suse.com/security/cve/CVE-2025-4085/" source="CVE"/>
		<reference ref_id="CVE-2025-4086" ref_url="https://www.suse.com/security/cve/CVE-2025-4086/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4088" ref_url="https://www.suse.com/security/cve/CVE-2025-4088/" source="CVE"/>
		<reference ref_id="CVE-2025-4089" ref_url="https://www.suse.com/security/cve/CVE-2025-4089/" source="CVE"/>
		<reference ref_id="CVE-2025-4090" ref_url="https://www.suse.com/security/cve/CVE-2025-4090/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4092" ref_url="https://www.suse.com/security/cve/CVE-2025-4092/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-138.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4082/">CVE-2025-4082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4082">CVE-2025-4082 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4085/">CVE-2025-4085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4085">CVE-2025-4085 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4086/">CVE-2025-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4086">CVE-2025-4086 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4088/">CVE-2025-4088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4088">CVE-2025-4088 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4089/">CVE-2025-4089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4089">CVE-2025-4089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4090/">CVE-2025-4090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4090">CVE-2025-4090 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4092/">CVE-2025-4092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4092">CVE-2025-4092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977088" comment="MozillaFirefox-138.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977089" comment="MozillaFirefox-branding-upstream-138.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977090" comment="MozillaFirefox-devel-138.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977091" comment="MozillaFirefox-translations-common-138.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977092" comment="MozillaFirefox-translations-other-138.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253367" version="1" class="patch">
	<metadata>
		<title>docker-28.1.1_ce-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-28.1.1_ce-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977093" comment="docker-28.1.1_ce-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977094" comment="docker-bash-completion-28.1.1_ce-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977095" comment="docker-buildx-0.23.0-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977096" comment="docker-fish-completion-28.1.1_ce-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977097" comment="docker-rootless-extras-28.1.1_ce-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977098" comment="docker-zsh-completion-28.1.1_ce-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253368" version="1" class="patch">
	<metadata>
		<title>hauler-1.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977099" comment="hauler-1.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253369" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.104-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.104-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977100" comment="tomcat-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977101" comment="tomcat-admin-webapps-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977102" comment="tomcat-docs-webapp-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977103" comment="tomcat-el-3_0-api-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977104" comment="tomcat-embed-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977105" comment="tomcat-javadoc-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977106" comment="tomcat-jsp-2_3-api-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977107" comment="tomcat-jsvc-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977108" comment="tomcat-lib-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977109" comment="tomcat-servlet-4_0-api-9.0.104-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977110" comment="tomcat-webapps-9.0.104-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253370" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.40-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.40-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977111" comment="tomcat10-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977112" comment="tomcat10-admin-webapps-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977113" comment="tomcat10-doc-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977114" comment="tomcat10-docs-webapp-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977115" comment="tomcat10-el-5_0-api-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977116" comment="tomcat10-embed-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977117" comment="tomcat10-jsp-3_1-api-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977118" comment="tomcat10-jsvc-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977119" comment="tomcat10-lib-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977120" comment="tomcat10-servlet-6_0-api-10.1.40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977121" comment="tomcat10-webapps-10.1.40-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253371" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24599" ref_url="https://www.suse.com/security/cve/CVE-2022-24599/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-03"/>
	<updated date="2025-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24599/">CVE-2022-24599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24599">CVE-2022-24599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977124" comment="audiofile-0.3.6-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977125" comment="audiofile-devel-0.3.6-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977126" comment="audiofile-doc-0.3.6-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977127" comment="libaudiofile1-0.3.6-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253372" version="1" class="patch">
	<metadata>
		<title>chromedriver-136.0.7103.59-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4050" ref_url="https://www.suse.com/security/cve/CVE-2025-4050/" source="CVE"/>
		<reference ref_id="CVE-2025-4051" ref_url="https://www.suse.com/security/cve/CVE-2025-4051/" source="CVE"/>
		<reference ref_id="CVE-2025-4052" ref_url="https://www.suse.com/security/cve/CVE-2025-4052/" source="CVE"/>
		<reference ref_id="CVE-2025-4096" ref_url="https://www.suse.com/security/cve/CVE-2025-4096/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-136.0.7103.59-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-04"/>
	<updated date="2025-05-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4050/">CVE-2025-4050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4050">CVE-2025-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4051/">CVE-2025-4051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4051">CVE-2025-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4052/">CVE-2025-4052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4052">CVE-2025-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4096/">CVE-2025-4096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4096">CVE-2025-4096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977136" comment="chromedriver-136.0.7103.59-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977137" comment="chromium-136.0.7103.59-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253373" version="1" class="patch">
	<metadata>
		<title>grafana-11.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-2703" ref_url="https://www.suse.com/security/cve/CVE-2025-2703/" source="CVE"/>
		<reference ref_id="CVE-2025-29923" ref_url="https://www.suse.com/security/cve/CVE-2025-29923/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-3454" ref_url="https://www.suse.com/security/cve/CVE-2025-3454/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-05"/>
	<updated date="2025-05-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-2703/">CVE-2025-2703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2703">CVE-2025-2703 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-29923/">CVE-2025-29923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29923">CVE-2025-29923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-3454/">CVE-2025-3454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3454">CVE-2025-3454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977269" comment="grafana-11.5.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253374" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.452-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.452-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-05"/>
	<updated date="2025-05-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977270" comment="java-1_8_0-openjdk-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977271" comment="java-1_8_0-openjdk-accessibility-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977272" comment="java-1_8_0-openjdk-demo-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977273" comment="java-1_8_0-openjdk-devel-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977274" comment="java-1_8_0-openjdk-headless-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977275" comment="java-1_8_0-openjdk-javadoc-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977276" comment="java-1_8_0-openjdk-src-1.8.0.452-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253375" version="1" class="patch">
	<metadata>
		<title>rclone-1.69.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.69.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-05"/>
	<updated date="2025-05-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977277" comment="rclone-1.69.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977278" comment="rclone-bash-completion-1.69.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977279" comment="rclone-zsh-completion-1.69.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253376" version="1" class="patch">
	<metadata>
		<title>weblate-5.11.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32021" ref_url="https://www.suse.com/security/cve/CVE-2025-32021/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.11.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-06"/>
	<updated date="2025-05-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32021/">CVE-2025-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32021">CVE-2025-32021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977523" comment="weblate-5.11.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253377" version="1" class="patch">
	<metadata>
		<title>389-ds-3.1.2~git90.2bc7250be-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.1.2~git90.2bc7250be-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981624" comment="389-ds-3.1.2~git90.2bc7250be-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981625" comment="389-ds-devel-3.1.2~git90.2bc7250be-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981626" comment="389-ds-snmp-3.1.2~git90.2bc7250be-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981627" comment="lib389-3.1.2~git90.2bc7250be-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981628" comment="libsvrcore0-3.1.2~git90.2bc7250be-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253378" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.10.3~git0.ee7d7ef-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.10.3~git0.ee7d7ef-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981629" comment="cargo-c-0.10.3~git0.ee7d7ef-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253379" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22873" ref_url="https://www.suse.com/security/cve/CVE-2025-22873/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22873/">CVE-2025-22873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22873">CVE-2025-22873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981630" comment="go1.24-1.24.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981631" comment="go1.24-doc-1.24.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981632" comment="go1.24-libstd-1.24.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981633" comment="go1.24-race-1.24.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253380" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250506T153719-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-11243" ref_url="https://www.suse.com/security/cve/CVE-2019-11243/" source="CVE"/>
		<reference ref_id="CVE-2023-32198" ref_url="https://www.suse.com/security/cve/CVE-2023-32198/" source="CVE"/>
		<reference ref_id="CVE-2024-22031" ref_url="https://www.suse.com/security/cve/CVE-2024-22031/" source="CVE"/>
		<reference ref_id="CVE-2025-23390" ref_url="https://www.suse.com/security/cve/CVE-2025-23390/" source="CVE"/>
		<reference ref_id="CVE-2025-32777" ref_url="https://www.suse.com/security/cve/CVE-2025-32777/" source="CVE"/>
		<reference ref_id="CVE-2025-3879" ref_url="https://www.suse.com/security/cve/CVE-2025-3879/" source="CVE"/>
		<reference ref_id="CVE-2025-4166" ref_url="https://www.suse.com/security/cve/CVE-2025-4166/" source="CVE"/>
		<reference ref_id="CVE-2025-4210" ref_url="https://www.suse.com/security/cve/CVE-2025-4210/" source="CVE"/>
		<reference ref_id="CVE-2025-46327" ref_url="https://www.suse.com/security/cve/CVE-2025-46327/" source="CVE"/>
		<reference ref_id="CVE-2025-46342" ref_url="https://www.suse.com/security/cve/CVE-2025-46342/" source="CVE"/>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<reference ref_id="CVE-2025-46599" ref_url="https://www.suse.com/security/cve/CVE-2025-46599/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250506T153719-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11243/">CVE-2019-11243 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11243">CVE-2019-11243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32198/">CVE-2023-32198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32198">CVE-2023-32198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22031/">CVE-2024-22031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22031">CVE-2024-22031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23390/">CVE-2025-23390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23390">CVE-2025-23390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32777/">CVE-2025-32777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32777">CVE-2025-32777 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3879/">CVE-2025-3879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3879">CVE-2025-3879 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4166/">CVE-2025-4166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4166">CVE-2025-4166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4210/">CVE-2025-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4210">CVE-2025-4210 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46327/">CVE-2025-46327 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46327">CVE-2025-46327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46342/">CVE-2025-46342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46342">CVE-2025-46342 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46599/">CVE-2025-46599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46599">CVE-2025-46599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981634" comment="govulncheck-vulndb-0.0.20250506T153719-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253381" version="1" class="patch">
	<metadata>
		<title>kanidm-1.6.0~git0.d7ae0f336-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the kanidm-1.6.0~git0.d7ae0f336-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981635" comment="kanidm-1.6.0~git0.d7ae0f336-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981636" comment="kanidm-clients-1.6.0~git0.d7ae0f336-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981637" comment="kanidm-docs-1.6.0~git0.d7ae0f336-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981638" comment="kanidm-server-1.6.0~git0.d7ae0f336-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981639" comment="kanidm-unixd-clients-1.6.0~git0.d7ae0f336-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253382" version="1" class="patch">
	<metadata>
		<title>rustup-1.28.1~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.28.1~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981640" comment="rustup-1.28.1~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253383" version="1" class="patch">
	<metadata>
		<title>sccache-0.9.1~22-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.9.1~22-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981641" comment="sccache-0.9.1~22-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253384" version="1" class="patch">
	<metadata>
		<title>tealdeer-1.7.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the tealdeer-1.7.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981642" comment="tealdeer-1.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981643" comment="tealdeer-bash-completion-1.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981644" comment="tealdeer-fish-completion-1.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981645" comment="tealdeer-zsh-completion-1.7.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253385" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.9a-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31162" ref_url="https://www.suse.com/security/cve/CVE-2025-31162/" source="CVE"/>
		<reference ref_id="CVE-2025-31163" ref_url="https://www.suse.com/security/cve/CVE-2025-31163/" source="CVE"/>
		<reference ref_id="CVE-2025-31164" ref_url="https://www.suse.com/security/cve/CVE-2025-31164/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.9a-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-31162/">CVE-2025-31162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31162">CVE-2025-31162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-31163/">CVE-2025-31163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31163">CVE-2025-31163 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-31164/">CVE-2025-31164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31164">CVE-2025-31164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981646" comment="transfig-3.2.9a-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253386" version="1" class="patch">
	<metadata>
		<title>wasm-bindgen-0.2.97~0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the wasm-bindgen-0.2.97~0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981647" comment="wasm-bindgen-0.2.97~0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253387" version="1" class="patch">
	<metadata>
		<title>ldap-proxy-0.1.0~90-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the ldap-proxy-0.1.0~90-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-08"/>
	<updated date="2025-05-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981648" comment="ldap-proxy-0.1.0~90-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253388" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46727" ref_url="https://www.suse.com/security/cve/CVE-2025-46727/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-08"/>
	<updated date="2025-05-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46727/">CVE-2025-46727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46727">CVE-2025-46727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981649" comment="ruby3.4-rubygem-rack-2.2-2.2.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253389" version="1" class="patch">
	<metadata>
		<title>sequoia-octopus-librnp-1.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the sequoia-octopus-librnp-1.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-08"/>
	<updated date="2025-05-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981650" comment="sequoia-octopus-librnp-1.11.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253390" version="1" class="patch">
	<metadata>
		<title>sslh-2.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<description>
These are all security issues fixed in the sslh-2.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-08"/>
	<updated date="2025-05-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28935">CVE-2020-28935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981651" comment="sslh-2.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253391" version="1" class="patch">
	<metadata>
		<title>libevtlog-4_8-0-4.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47619" ref_url="https://www.suse.com/security/cve/CVE-2024-47619/" source="CVE"/>
		<description>
These are all security issues fixed in the libevtlog-4_8-0-4.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-08"/>
	<updated date="2025-05-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47619/">CVE-2024-47619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47619">CVE-2024-47619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981652" comment="libevtlog-4_8-0-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981653" comment="syslog-ng-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981654" comment="syslog-ng-bigquery-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981655" comment="syslog-ng-bpf-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981656" comment="syslog-ng-cloudauth-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981657" comment="syslog-ng-devel-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981658" comment="syslog-ng-geoip-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981659" comment="syslog-ng-grpc-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981660" comment="syslog-ng-http-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981661" comment="syslog-ng-java-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981662" comment="syslog-ng-loki-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981663" comment="syslog-ng-mqtt-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981664" comment="syslog-ng-opentelemetry-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981665" comment="syslog-ng-python-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981666" comment="syslog-ng-python-modules-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981667" comment="syslog-ng-redis-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981668" comment="syslog-ng-smtp-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981669" comment="syslog-ng-snmp-4.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981670" comment="syslog-ng-sql-4.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253392" version="1" class="patch">
	<metadata>
		<title>afterburn-5.7.0.git103.bae893c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.7.0.git103.bae893c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981752" comment="afterburn-5.7.0.git103.bae893c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981753" comment="afterburn-dracut-5.7.0.git103.bae893c-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253393" version="1" class="patch">
	<metadata>
		<title>bird3-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16159" ref_url="https://www.suse.com/security/cve/CVE-2019-16159/" source="CVE"/>
		<description>
These are all security issues fixed in the bird3-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16159/">CVE-2019-16159 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16159">CVE-2019-16159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981754" comment="bird3-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981755" comment="bird3-doc-3.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253394" version="1" class="patch">
	<metadata>
		<title>chromedriver-136.0.7103.92-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4372" ref_url="https://www.suse.com/security/cve/CVE-2025-4372/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-136.0.7103.92-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4372/">CVE-2025-4372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4372">CVE-2025-4372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981756" comment="chromedriver-136.0.7103.92-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981757" comment="chromium-136.0.7103.92-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253395" version="1" class="patch">
	<metadata>
		<title>libmosquitto1-2.0.21-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3935" ref_url="https://www.suse.com/security/cve/CVE-2024-3935/" source="CVE"/>
		<description>
These are all security issues fixed in the libmosquitto1-2.0.21-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3935/">CVE-2024-3935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3935">CVE-2024-3935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981758" comment="libmosquitto1-2.0.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981759" comment="libmosquittopp1-2.0.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981760" comment="mosquitto-2.0.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981761" comment="mosquitto-clients-2.0.21-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981762" comment="mosquitto-devel-2.0.21-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253396" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-node_exporter-1.9.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-node_exporter-1.9.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981792" comment="golang-github-prometheus-node_exporter-1.9.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253397" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.5.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30258" ref_url="https://www.suse.com/security/cve/CVE-2025-30258/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.5.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30258/">CVE-2025-30258 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30258">CVE-2025-30258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981793" comment="dirmngr-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981794" comment="gpg2-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981795" comment="gpg2-lang-2.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981796" comment="gpg2-tpm-2.5.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253398" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.27.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.27.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981797" comment="java-11-openj9-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981798" comment="java-11-openj9-demo-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981799" comment="java-11-openj9-devel-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981800" comment="java-11-openj9-headless-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981801" comment="java-11-openj9-javadoc-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981802" comment="java-11-openj9-jmods-11.0.27.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981803" comment="java-11-openj9-src-11.0.27.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253399" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981804" comment="java-17-openj9-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981805" comment="java-17-openj9-demo-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981806" comment="java-17-openj9-devel-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981807" comment="java-17-openj9-headless-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981808" comment="java-17-openj9-javadoc-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981809" comment="java-17-openj9-jmods-17.0.15.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981810" comment="java-17-openj9-src-17.0.15.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253400" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.452-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.452-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981811" comment="java-1_8_0-openj9-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981812" comment="java-1_8_0-openj9-accessibility-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981813" comment="java-1_8_0-openj9-demo-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981814" comment="java-1_8_0-openj9-devel-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981815" comment="java-1_8_0-openj9-headless-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981816" comment="java-1_8_0-openj9-javadoc-1.8.0.452-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981817" comment="java-1_8_0-openj9-src-1.8.0.452-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253401" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981818" comment="java-21-openj9-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981819" comment="java-21-openj9-demo-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981820" comment="java-21-openj9-devel-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981821" comment="java-21-openj9-headless-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981822" comment="java-21-openj9-javadoc-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981823" comment="java-21-openj9-jmods-21.0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981824" comment="java-21-openj9-src-21.0.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253402" version="1" class="patch">
	<metadata>
		<title>libxmp-devel-4.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47256" ref_url="https://www.suse.com/security/cve/CVE-2025-47256/" source="CVE"/>
		<description>
These are all security issues fixed in the libxmp-devel-4.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-47256/">CVE-2025-47256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47256">CVE-2025-47256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981825" comment="libxmp-devel-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981826" comment="libxmp4-4.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253403" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32873" ref_url="https://www.suse.com/security/cve/CVE-2025-32873/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32873/">CVE-2025-32873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32873">CVE-2025-32873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981827" comment="python311-Django4-4.2.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981828" comment="python312-Django4-4.2.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981829" comment="python313-Django4-4.2.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253404" version="1" class="patch">
	<metadata>
		<title>rke2-1.32-1.32.4+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.32-1.32.4+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-12"/>
	<updated date="2025-05-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981830" comment="rke2-1.32-1.32.4+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253405" version="1" class="patch">
	<metadata>
		<title>cpp-httplib-devel-0.20.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46728" ref_url="https://www.suse.com/security/cve/CVE-2025-46728/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp-httplib-devel-0.20.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-13"/>
	<updated date="2025-05-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46728/">CVE-2025-46728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46728">CVE-2025-46728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981907" comment="cpp-httplib-devel-0.20.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981908" comment="libcpp-httplib0_20-0.20.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253406" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4382" ref_url="https://www.suse.com/security/cve/CVE-2025-4382/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-50.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-13"/>
	<updated date="2025-05-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4382/">CVE-2025-4382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4382">CVE-2025-4382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981909" comment="grub2-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981910" comment="grub2-branding-upstream-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981911" comment="grub2-common-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981912" comment="grub2-i386-efi-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981913" comment="grub2-i386-efi-bls-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981914" comment="grub2-i386-efi-debug-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981915" comment="grub2-i386-efi-extras-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981916" comment="grub2-i386-pc-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981917" comment="grub2-i386-pc-debug-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981918" comment="grub2-i386-pc-extras-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981919" comment="grub2-snapper-plugin-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981920" comment="grub2-systemd-sleep-plugin-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981921" comment="grub2-x86_64-efi-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981922" comment="grub2-x86_64-efi-bls-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981923" comment="grub2-x86_64-efi-debug-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981924" comment="grub2-x86_64-efi-extras-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981925" comment="grub2-x86_64-xen-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981926" comment="grub2-x86_64-xen-debug-2.12-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981927" comment="grub2-x86_64-xen-extras-2.12-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253407" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.14.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.14.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-13"/>
	<updated date="2025-05-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981929" comment="kernel-macros-6.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981930" comment="kernel-source-6.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981931" comment="kernel-source-vanilla-6.14.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253408" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32873" ref_url="https://www.suse.com/security/cve/CVE-2025-32873/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-13"/>
	<updated date="2025-05-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32873/">CVE-2025-32873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32873">CVE-2025-32873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981932" comment="python311-Django-5.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981933" comment="python312-Django-5.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981934" comment="python313-Django-5.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253409" version="1" class="patch">
	<metadata>
		<title>nbdkit-1.42.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47711" ref_url="https://www.suse.com/security/cve/CVE-2025-47711/" source="CVE"/>
		<reference ref_id="CVE-2025-47712" ref_url="https://www.suse.com/security/cve/CVE-2025-47712/" source="CVE"/>
		<description>
These are all security issues fixed in the nbdkit-1.42.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-14"/>
	<updated date="2025-05-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47711/">CVE-2025-47711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47711">CVE-2025-47711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47712/">CVE-2025-47712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47712">CVE-2025-47712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982052" comment="nbdkit-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982053" comment="nbdkit-bash-completion-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982054" comment="nbdkit-basic-filters-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982055" comment="nbdkit-basic-plugins-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982056" comment="nbdkit-bzip2-filter-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982057" comment="nbdkit-curl-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982058" comment="nbdkit-devel-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982059" comment="nbdkit-example-plugins-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982060" comment="nbdkit-gcs-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982061" comment="nbdkit-linuxdisk-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982062" comment="nbdkit-nbd-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982063" comment="nbdkit-python-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982064" comment="nbdkit-server-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982065" comment="nbdkit-ssh-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982066" comment="nbdkit-stats-filter-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982067" comment="nbdkit-tar-filter-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982068" comment="nbdkit-tmpdisk-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982069" comment="nbdkit-vddk-plugin-1.42.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982070" comment="nbdkit-xz-filter-1.42.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253410" version="1" class="patch">
	<metadata>
		<title>iputils-20240905-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47268" ref_url="https://www.suse.com/security/cve/CVE-2025-47268/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-20240905-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47268/">CVE-2025-47268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47268">CVE-2025-47268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982096" comment="iputils-20240905-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253411" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-12.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-12.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982097" comment="libvmtools-devel-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982098" comment="libvmtools0-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982099" comment="open-vm-tools-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982100" comment="open-vm-tools-containerinfo-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982101" comment="open-vm-tools-desktop-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982102" comment="open-vm-tools-salt-minion-12.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982103" comment="open-vm-tools-sdmp-12.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253412" version="1" class="patch">
	<metadata>
		<title>openssh-10.0p2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32728" ref_url="https://www.suse.com/security/cve/CVE-2025-32728/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-10.0p2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32728/">CVE-2025-32728 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32728">CVE-2025-32728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982104" comment="openssh-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982105" comment="openssh-cavs-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982106" comment="openssh-clients-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982107" comment="openssh-common-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982108" comment="openssh-helpers-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982109" comment="openssh-server-10.0p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982110" comment="openssh-server-config-rootlogin-10.0p2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253413" version="1" class="patch">
	<metadata>
		<title>pnpm-10.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-1234" ref_url="https://www.suse.com/security/cve/CVE-2021-1234/" source="CVE"/>
		<description>
These are all security issues fixed in the pnpm-10.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1234/">CVE-2021-1234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-1234">CVE-2021-1234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982111" comment="pnpm-10.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982112" comment="pnpm-bash-completion-10.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982113" comment="pnpm-fish-completion-10.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982114" comment="pnpm-zsh-completion-10.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253414" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20250512-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20054" ref_url="https://www.suse.com/security/cve/CVE-2025-20054/" source="CVE"/>
		<reference ref_id="CVE-2025-20103" ref_url="https://www.suse.com/security/cve/CVE-2025-20103/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20250512-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20054/">CVE-2025-20054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20054">CVE-2025-20054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20103/">CVE-2025-20103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20103">CVE-2025-20103 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982115" comment="ucode-intel-20250512-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253415" version="1" class="patch">
	<metadata>
		<title>python311-cramjam-2.9.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22895" ref_url="https://www.suse.com/security/cve/CVE-2023-22895/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cramjam-2.9.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22895/">CVE-2023-22895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22895">CVE-2023-22895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982286" comment="python311-cramjam-2.9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982287" comment="python312-cramjam-2.9.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982288" comment="python313-cramjam-2.9.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253416" version="1" class="patch">
	<metadata>
		<title>python311-httptools-0.6.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-httptools-0.6.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982289" comment="python311-httptools-0.6.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982290" comment="python312-httptools-0.6.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982291" comment="python313-httptools-0.6.1-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253417" version="1" class="patch">
	<metadata>
		<title>python311-jwcrypto-1.5.6-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-3102" ref_url="https://www.suse.com/security/cve/CVE-2022-3102/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jwcrypto-1.5.6-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3102/">CVE-2022-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-3102">CVE-2022-3102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982292" comment="python311-jwcrypto-1.5.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982293" comment="python312-jwcrypto-1.5.6-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982294" comment="python313-jwcrypto-1.5.6-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253418" version="1" class="patch">
	<metadata>
		<title>python311-loguru-0.7.2-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0329" ref_url="https://www.suse.com/security/cve/CVE-2022-0329/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-loguru-0.7.2-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0329/">CVE-2022-0329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0329">CVE-2022-0329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982295" comment="python311-loguru-0.7.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982296" comment="python312-loguru-0.7.2-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982297" comment="python313-loguru-0.7.2-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253419" version="1" class="patch">
	<metadata>
		<title>python311-mechanize-0.4.10-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-32837" ref_url="https://www.suse.com/security/cve/CVE-2021-32837/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-mechanize-0.4.10-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32837/">CVE-2021-32837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32837">CVE-2021-32837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982298" comment="python311-mechanize-0.4.10-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982299" comment="python312-mechanize-0.4.10-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982300" comment="python313-mechanize-0.4.10-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253420" version="1" class="patch">
	<metadata>
		<title>python311-nltk-3.9.1-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3828" ref_url="https://www.suse.com/security/cve/CVE-2021-3828/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-nltk-3.9.1-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3828/">CVE-2021-3828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3828">CVE-2021-3828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982301" comment="python311-nltk-3.9.1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982302" comment="python312-nltk-3.9.1-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982303" comment="python313-nltk-3.9.1-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253421" version="1" class="patch">
	<metadata>
		<title>python311-oauthlib-3.2.2-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-36087" ref_url="https://www.suse.com/security/cve/CVE-2022-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-oauthlib-3.2.2-5.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36087/">CVE-2022-36087 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36087">CVE-2022-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982304" comment="python311-oauthlib-3.2.2-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982305" comment="python312-oauthlib-3.2.2-5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982306" comment="python313-oauthlib-3.2.2-5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253422" version="1" class="patch">
	<metadata>
		<title>python311-py7zr-0.20.8-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-44900" ref_url="https://www.suse.com/security/cve/CVE-2022-44900/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-py7zr-0.20.8-2.6 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44900/">CVE-2022-44900 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44900">CVE-2022-44900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982307" comment="python311-py7zr-0.20.8-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982308" comment="python312-py7zr-0.20.8-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982309" comment="python313-py7zr-0.20.8-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253423" version="1" class="patch">
	<metadata>
		<title>python311-pycapnp-2.0.0-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-46149" ref_url="https://www.suse.com/security/cve/CVE-2022-46149/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pycapnp-2.0.0-2.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-46149/">CVE-2022-46149 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46149">CVE-2022-46149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982310" comment="python311-pycapnp-2.0.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982311" comment="python312-pycapnp-2.0.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982312" comment="python313-pycapnp-2.0.0-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253424" version="1" class="patch">
	<metadata>
		<title>python311-pyspnego-0.11.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pyspnego-0.11.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0886">CVE-2018-0886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982313" comment="python311-pyspnego-0.11.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982314" comment="python312-pyspnego-0.11.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982315" comment="python313-pyspnego-0.11.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253425" version="1" class="patch">
	<metadata>
		<title>python311-pywayland-0.4.17-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pywayland-0.4.17-3.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982316" comment="python311-pywayland-0.4.17-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982317" comment="python312-pywayland-0.4.17-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982318" comment="python313-pywayland-0.4.17-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253426" version="1" class="patch">
	<metadata>
		<title>python311-suds-1.2.0-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-suds-1.2.0-2.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982319" comment="python311-suds-1.2.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982320" comment="python312-suds-1.2.0-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982321" comment="python313-suds-1.2.0-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253427" version="1" class="patch">
	<metadata>
		<title>python311-treq-24.9.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23607" ref_url="https://www.suse.com/security/cve/CVE-2022-23607/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-treq-24.9.1-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23607/">CVE-2022-23607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23607">CVE-2022-23607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982322" comment="python311-treq-24.9.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982323" comment="python312-treq-24.9.1-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982324" comment="python313-treq-24.9.1-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253428" version="1" class="patch">
	<metadata>
		<title>python311-ujson-5.10.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45958" ref_url="https://www.suse.com/security/cve/CVE-2021-45958/" source="CVE"/>
		<reference ref_id="CVE-2022-31116" ref_url="https://www.suse.com/security/cve/CVE-2022-31116/" source="CVE"/>
		<reference ref_id="CVE-2022-31117" ref_url="https://www.suse.com/security/cve/CVE-2022-31117/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ujson-5.10.0-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45958/">CVE-2021-45958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45958">CVE-2021-45958 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31116/">CVE-2022-31116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31116">CVE-2022-31116 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31117/">CVE-2022-31117 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31117">CVE-2022-31117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982325" comment="python311-ujson-5.10.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982326" comment="python312-ujson-5.10.0-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982327" comment="python313-ujson-5.10.0-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253429" version="1" class="patch">
	<metadata>
		<title>python311-waitress-3.0.2-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<reference ref_id="CVE-2022-31015" ref_url="https://www.suse.com/security/cve/CVE-2022-31015/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-waitress-3.0.2-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24761">CVE-2022-24761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31015/">CVE-2022-31015 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31015">CVE-2022-31015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982328" comment="python311-waitress-3.0.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982329" comment="python312-waitress-3.0.2-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982330" comment="python313-waitress-3.0.2-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253430" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionmailer-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47889" ref_url="https://www.suse.com/security/cve/CVE-2024-47889/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionmailer-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47889/">CVE-2024-47889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47889">CVE-2024-47889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982331" comment="ruby3.4-rubygem-actionmailer-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253431" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actionpack-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<reference ref_id="CVE-2023-22792" ref_url="https://www.suse.com/security/cve/CVE-2023-22792/" source="CVE"/>
		<reference ref_id="CVE-2023-22795" ref_url="https://www.suse.com/security/cve/CVE-2023-22795/" source="CVE"/>
		<reference ref_id="CVE-2023-22797" ref_url="https://www.suse.com/security/cve/CVE-2023-22797/" source="CVE"/>
		<reference ref_id="CVE-2024-26143" ref_url="https://www.suse.com/security/cve/CVE-2024-26143/" source="CVE"/>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<reference ref_id="CVE-2024-41128" ref_url="https://www.suse.com/security/cve/CVE-2024-41128/" source="CVE"/>
		<reference ref_id="CVE-2024-47887" ref_url="https://www.suse.com/security/cve/CVE-2024-47887/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actionpack-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23633">CVE-2022-23633 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22792/">CVE-2023-22792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22792">CVE-2023-22792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22795/">CVE-2023-22795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22795">CVE-2023-22795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22797/">CVE-2023-22797 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22797">CVE-2023-22797 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26143/">CVE-2024-26143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26143">CVE-2024-26143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41128/">CVE-2024-41128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41128">CVE-2024-41128 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47887/">CVE-2024-47887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47887">CVE-2024-47887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982332" comment="ruby3.4-rubygem-actionpack-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253432" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-actiontext-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34341" ref_url="https://www.suse.com/security/cve/CVE-2024-34341/" source="CVE"/>
		<reference ref_id="CVE-2024-47888" ref_url="https://www.suse.com/security/cve/CVE-2024-47888/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-actiontext-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34341/">CVE-2024-34341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34341">CVE-2024-34341 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47888/">CVE-2024-47888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47888">CVE-2024-47888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982333" comment="ruby3.4-rubygem-actiontext-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253433" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activerecord-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-32224" ref_url="https://www.suse.com/security/cve/CVE-2022-32224/" source="CVE"/>
		<reference ref_id="CVE-2022-44566" ref_url="https://www.suse.com/security/cve/CVE-2022-44566/" source="CVE"/>
		<reference ref_id="CVE-2023-22794" ref_url="https://www.suse.com/security/cve/CVE-2023-22794/" source="CVE"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activerecord-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32224/">CVE-2022-32224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32224">CVE-2022-32224 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44566/">CVE-2022-44566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44566">CVE-2022-44566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22794/">CVE-2023-22794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22794">CVE-2023-22794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982334" comment="ruby3.4-rubygem-activerecord-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253434" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activestorage-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-21831" ref_url="https://www.suse.com/security/cve/CVE-2022-21831/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activestorage-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21831/">CVE-2022-21831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21831">CVE-2022-21831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982335" comment="ruby3.4-rubygem-activestorage-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253435" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activesupport-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22796" ref_url="https://www.suse.com/security/cve/CVE-2023-22796/" source="CVE"/>
		<reference ref_id="CVE-2023-28120" ref_url="https://www.suse.com/security/cve/CVE-2023-28120/" source="CVE"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activesupport-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22796/">CVE-2023-22796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22796">CVE-2023-22796 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28120/">CVE-2023-28120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28120">CVE-2023-28120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982336" comment="ruby3.4-rubygem-activesupport-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253436" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-fluentd-1.17.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41186" ref_url="https://www.suse.com/security/cve/CVE-2021-41186/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-fluentd-1.17.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41186/">CVE-2021-41186 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41186">CVE-2021-41186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982337" comment="ruby3.4-rubygem-fluentd-1.17.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253437" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-globalid-1.2.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22799" ref_url="https://www.suse.com/security/cve/CVE-2023-22799/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-globalid-1.2.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22799/">CVE-2023-22799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22799">CVE-2023-22799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982338" comment="ruby3.4-rubygem-globalid-1.2.1-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253438" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-jquery-rails-4.6.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-jquery-rails-4.6.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982339" comment="ruby3.4-rubygem-jquery-rails-4.6.0-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253439" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-json_pure-2.7.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-json_pure-2.7.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982340" comment="ruby3.4-rubygem-json_pure-2.7.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253440" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-kramdown-2.4.0-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-kramdown-2.4.0-1.15 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982341" comment="ruby3.4-rubygem-kramdown-2.4.0-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253441" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-loofah-2.23.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<reference ref_id="CVE-2022-23514" ref_url="https://www.suse.com/security/cve/CVE-2022-23514/" source="CVE"/>
		<reference ref_id="CVE-2022-23515" ref_url="https://www.suse.com/security/cve/CVE-2022-23515/" source="CVE"/>
		<reference ref_id="CVE-2022-23516" ref_url="https://www.suse.com/security/cve/CVE-2022-23516/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-loofah-2.23.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23514/">CVE-2022-23514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23514">CVE-2022-23514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23515/">CVE-2022-23515 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23515">CVE-2022-23515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23516/">CVE-2022-23516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23516">CVE-2022-23516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982342" comment="ruby3.4-rubygem-loofah-2.23.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253442" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-minitar-0.9-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-minitar-0.9-1.19 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982343" comment="ruby3.4-rubygem-minitar-0.9-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253443" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-multi_xml-0.6.0-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0175" ref_url="https://www.suse.com/security/cve/CVE-2013-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-multi_xml-0.6.0-1.29 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0175/">CVE-2013-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0175">CVE-2013-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982344" comment="ruby3.4-rubygem-multi_xml-0.6.0-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253444" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-puma-6.4.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<reference ref_id="CVE-2024-45614" ref_url="https://www.suse.com/security/cve/CVE-2024-45614/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-puma-6.4.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23634">CVE-2022-23634 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45614/">CVE-2024-45614 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45614">CVE-2024-45614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982345" comment="ruby3.4-rubygem-puma-6.4.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253445" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rails-7.0-7.0.8.6-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<reference ref_id="CVE-2024-26143" ref_url="https://www.suse.com/security/cve/CVE-2024-26143/" source="CVE"/>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<reference ref_id="CVE-2024-34341" ref_url="https://www.suse.com/security/cve/CVE-2024-34341/" source="CVE"/>
		<reference ref_id="CVE-2024-41128" ref_url="https://www.suse.com/security/cve/CVE-2024-41128/" source="CVE"/>
		<reference ref_id="CVE-2024-47887" ref_url="https://www.suse.com/security/cve/CVE-2024-47887/" source="CVE"/>
		<reference ref_id="CVE-2024-47888" ref_url="https://www.suse.com/security/cve/CVE-2024-47888/" source="CVE"/>
		<reference ref_id="CVE-2024-47889" ref_url="https://www.suse.com/security/cve/CVE-2024-47889/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rails-7.0-7.0.8.6-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26143/">CVE-2024-26143 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26143">CVE-2024-26143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34341/">CVE-2024-34341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34341">CVE-2024-34341 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41128/">CVE-2024-41128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41128">CVE-2024-41128 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47887/">CVE-2024-47887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47887">CVE-2024-47887 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47888/">CVE-2024-47888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47888">CVE-2024-47888 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47889/">CVE-2024-47889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47889">CVE-2024-47889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982346" comment="ruby3.4-rubygem-rails-7.0-7.0.8.6-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253446" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982347" comment="ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253447" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rubyzip-2.3.2-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5946" ref_url="https://www.suse.com/security/cve/CVE-2017-5946/" source="CVE"/>
		<reference ref_id="CVE-2018-1000544" ref_url="https://www.suse.com/security/cve/CVE-2018-1000544/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rubyzip-2.3.2-1.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5946/">CVE-2017-5946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5946">CVE-2017-5946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000544/">CVE-2018-1000544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000544">CVE-2018-1000544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982348" comment="ruby3.4-rubygem-rubyzip-2.3.2-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253448" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-sprockets-4.2.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-sprockets-4.2.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982349" comment="ruby3.4-rubygem-sprockets-4.2.1-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253449" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-sprockets-3.7-3.7.5-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-sprockets-3.7-3.7.5-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982350" comment="ruby3.4-rubygem-sprockets-3.7-3.7.5-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253450" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-web-console-4.2.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3224" ref_url="https://www.suse.com/security/cve/CVE-2015-3224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-web-console-4.2.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3224/">CVE-2015-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3224">CVE-2015-3224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982351" comment="ruby3.4-rubygem-web-console-4.2.1-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253451" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-websocket-extensions-0.1.5-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7663" ref_url="https://www.suse.com/security/cve/CVE-2020-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-websocket-extensions-0.1.5-1.22 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-17"/>
	<updated date="2025-05-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7663/">CVE-2020-7663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">CVE-2020-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982352" comment="ruby3.4-rubygem-websocket-extensions-0.1.5-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253452" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3875" ref_url="https://www.suse.com/security/cve/CVE-2025-3875/" source="CVE"/>
		<reference ref_id="CVE-2025-3877" ref_url="https://www.suse.com/security/cve/CVE-2025-3877/" source="CVE"/>
		<reference ref_id="CVE-2025-3909" ref_url="https://www.suse.com/security/cve/CVE-2025-3909/" source="CVE"/>
		<reference ref_id="CVE-2025-3932" ref_url="https://www.suse.com/security/cve/CVE-2025-3932/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3875/">CVE-2025-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3875">CVE-2025-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3877/">CVE-2025-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3877">CVE-2025-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3909/">CVE-2025-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3909">CVE-2025-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3932/">CVE-2025-3932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3932">CVE-2025-3932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982548" comment="MozillaThunderbird-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982549" comment="MozillaThunderbird-openpgp-librnp-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982550" comment="MozillaThunderbird-translations-common-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982551" comment="MozillaThunderbird-translations-other-128.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253453" version="1" class="patch">
	<metadata>
		<title>dante-1.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54662" ref_url="https://www.suse.com/security/cve/CVE-2024-54662/" source="CVE"/>
		<description>
These are all security issues fixed in the dante-1.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-54662/">CVE-2024-54662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54662">CVE-2024-54662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982552" comment="dante-1.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982553" comment="dante-devel-1.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982554" comment="dante-server-1.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982555" comment="libsocks0-1.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253454" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982556" comment="firefox-esr-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982557" comment="firefox-esr-branding-upstream-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982558" comment="firefox-esr-translations-common-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982559" comment="firefox-esr-translations-other-128.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253455" version="1" class="patch">
	<metadata>
		<title>gnuplot-6.0.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31176" ref_url="https://www.suse.com/security/cve/CVE-2025-31176/" source="CVE"/>
		<reference ref_id="CVE-2025-31177" ref_url="https://www.suse.com/security/cve/CVE-2025-31177/" source="CVE"/>
		<reference ref_id="CVE-2025-31178" ref_url="https://www.suse.com/security/cve/CVE-2025-31178/" source="CVE"/>
		<reference ref_id="CVE-2025-31179" ref_url="https://www.suse.com/security/cve/CVE-2025-31179/" source="CVE"/>
		<reference ref_id="CVE-2025-31180" ref_url="https://www.suse.com/security/cve/CVE-2025-31180/" source="CVE"/>
		<reference ref_id="CVE-2025-31181" ref_url="https://www.suse.com/security/cve/CVE-2025-31181/" source="CVE"/>
		<reference ref_id="CVE-2025-3359" ref_url="https://www.suse.com/security/cve/CVE-2025-3359/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuplot-6.0.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31176/">CVE-2025-31176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31176">CVE-2025-31176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31177/">CVE-2025-31177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31177">CVE-2025-31177 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31178/">CVE-2025-31178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31178">CVE-2025-31178 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31179/">CVE-2025-31179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31179">CVE-2025-31179 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31180/">CVE-2025-31180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31180">CVE-2025-31180 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31181/">CVE-2025-31181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31181">CVE-2025-31181 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3359/">CVE-2025-3359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3359">CVE-2025-3359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982560" comment="gnuplot-6.0.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253456" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250515T200012-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52290" ref_url="https://www.suse.com/security/cve/CVE-2024-52290/" source="CVE"/>
		<reference ref_id="CVE-2024-8063" ref_url="https://www.suse.com/security/cve/CVE-2024-8063/" source="CVE"/>
		<reference ref_id="CVE-2025-3757" ref_url="https://www.suse.com/security/cve/CVE-2025-3757/" source="CVE"/>
		<reference ref_id="CVE-2025-3931" ref_url="https://www.suse.com/security/cve/CVE-2025-3931/" source="CVE"/>
		<reference ref_id="CVE-2025-4432" ref_url="https://www.suse.com/security/cve/CVE-2025-4432/" source="CVE"/>
		<reference ref_id="CVE-2025-46331" ref_url="https://www.suse.com/security/cve/CVE-2025-46331/" source="CVE"/>
		<reference ref_id="CVE-2025-4658" ref_url="https://www.suse.com/security/cve/CVE-2025-4658/" source="CVE"/>
		<reference ref_id="CVE-2025-46721" ref_url="https://www.suse.com/security/cve/CVE-2025-46721/" source="CVE"/>
		<reference ref_id="CVE-2025-46735" ref_url="https://www.suse.com/security/cve/CVE-2025-46735/" source="CVE"/>
		<reference ref_id="CVE-2025-46815" ref_url="https://www.suse.com/security/cve/CVE-2025-46815/" source="CVE"/>
		<reference ref_id="CVE-2025-46816" ref_url="https://www.suse.com/security/cve/CVE-2025-46816/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250515T200012-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52290/">CVE-2024-52290 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52290">CVE-2024-52290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8063/">CVE-2024-8063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8063">CVE-2024-8063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3757/">CVE-2025-3757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3757">CVE-2025-3757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3931/">CVE-2025-3931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3931">CVE-2025-3931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4432/">CVE-2025-4432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4432">CVE-2025-4432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46331/">CVE-2025-46331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46331">CVE-2025-46331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4658/">CVE-2025-4658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4658">CVE-2025-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46721/">CVE-2025-46721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46721">CVE-2025-46721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46735/">CVE-2025-46735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46735">CVE-2025-46735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46815/">CVE-2025-46815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46815">CVE-2025-46815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46816/">CVE-2025-46816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46816">CVE-2025-46816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982561" comment="govulncheck-vulndb-0.0.20250515T200012-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253457" version="1" class="patch">
	<metadata>
		<title>grype-0.92.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-0.92.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982562" comment="grype-0.92.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982563" comment="grype-bash-completion-0.92.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982564" comment="grype-fish-completion-0.92.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982565" comment="grype-zsh-completion-0.92.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253458" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982566" comment="postgresql13-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982567" comment="postgresql13-contrib-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982568" comment="postgresql13-devel-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982569" comment="postgresql13-docs-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982570" comment="postgresql13-llvmjit-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982571" comment="postgresql13-llvmjit-devel-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982572" comment="postgresql13-plperl-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982573" comment="postgresql13-plpython-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982574" comment="postgresql13-pltcl-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982575" comment="postgresql13-server-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982576" comment="postgresql13-server-devel-13.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982577" comment="postgresql13-test-13.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253459" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982578" comment="postgresql14-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982579" comment="postgresql14-contrib-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982580" comment="postgresql14-devel-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982581" comment="postgresql14-docs-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982582" comment="postgresql14-llvmjit-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982583" comment="postgresql14-llvmjit-devel-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982584" comment="postgresql14-plperl-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982585" comment="postgresql14-plpython-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982586" comment="postgresql14-pltcl-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982587" comment="postgresql14-server-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982588" comment="postgresql14-server-devel-14.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982589" comment="postgresql14-test-14.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253460" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982590" comment="postgresql15-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982591" comment="postgresql15-contrib-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982592" comment="postgresql15-devel-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982593" comment="postgresql15-docs-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982594" comment="postgresql15-llvmjit-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982595" comment="postgresql15-llvmjit-devel-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982596" comment="postgresql15-plperl-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982597" comment="postgresql15-plpython-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982598" comment="postgresql15-pltcl-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982599" comment="postgresql15-server-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982600" comment="postgresql15-server-devel-15.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982601" comment="postgresql15-test-15.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253461" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982602" comment="postgresql16-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982603" comment="postgresql16-contrib-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982604" comment="postgresql16-devel-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982605" comment="postgresql16-docs-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982606" comment="postgresql16-llvmjit-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982607" comment="postgresql16-llvmjit-devel-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982608" comment="postgresql16-plperl-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982609" comment="postgresql16-plpython-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982610" comment="postgresql16-pltcl-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982611" comment="postgresql16-server-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982612" comment="postgresql16-server-devel-16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982613" comment="postgresql16-test-16.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253462" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0~b1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0~b1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982614" comment="python314-3.14.0~b1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982615" comment="python314-curses-3.14.0~b1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982616" comment="python314-dbm-3.14.0~b1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982617" comment="python314-idle-3.14.0~b1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982618" comment="python314-tk-3.14.0~b1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982619" comment="python314-x86-64-v3-3.14.0~b1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253463" version="1" class="patch">
	<metadata>
		<title>xen-4.20.0_12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.0_12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982620" comment="xen-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982621" comment="xen-devel-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982622" comment="xen-doc-html-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982623" comment="xen-libs-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982624" comment="xen-tools-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982625" comment="xen-tools-domU-4.20.0_12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982626" comment="xen-tools-xendomains-wait-disk-4.20.0_12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253464" version="1" class="patch">
	<metadata>
		<title>chromedriver-136.0.7103.113-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4609" ref_url="https://www.suse.com/security/cve/CVE-2025-4609/" source="CVE"/>
		<reference ref_id="CVE-2025-4664" ref_url="https://www.suse.com/security/cve/CVE-2025-4664/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-136.0.7103.113-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-21"/>
	<updated date="2025-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4609/">CVE-2025-4609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4609">CVE-2025-4609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4664/">CVE-2025-4664 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4664">CVE-2025-4664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982925" comment="chromedriver-136.0.7103.113-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982926" comment="chromium-136.0.7103.113-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253465" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250520T172319-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-43915" ref_url="https://www.suse.com/security/cve/CVE-2025-43915/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250520T172319-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43915/">CVE-2025-43915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43915">CVE-2025-43915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983048" comment="govulncheck-vulndb-0.0.20250520T172319-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253466" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983049" comment="grafana-11.6.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253467" version="1" class="patch">
	<metadata>
		<title>kind-0.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47290" ref_url="https://www.suse.com/security/cve/CVE-2025-47290/" source="CVE"/>
		<description>
These are all security issues fixed in the kind-0.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47290/">CVE-2025-47290 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47290">CVE-2025-47290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983050" comment="kind-0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983051" comment="kind-bash-completion-0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983052" comment="kind-fish-completion-0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983053" comment="kind-zsh-completion-0.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253468" version="1" class="patch">
	<metadata>
		<title>kubo-0.35.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the kubo-0.35.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983054" comment="kubo-0.35.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253469" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-138.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-138.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983084" comment="MozillaFirefox-138.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983085" comment="MozillaFirefox-branding-upstream-138.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983086" comment="MozillaFirefox-devel-138.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983087" comment="MozillaFirefox-translations-common-138.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983088" comment="MozillaFirefox-translations-other-138.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253470" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.10.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.10.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983089" comment="MozillaThunderbird-128.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983090" comment="MozillaThunderbird-openpgp-librnp-128.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983091" comment="MozillaThunderbird-translations-common-128.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983092" comment="MozillaThunderbird-translations-other-128.10.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253471" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13147" ref_url="https://www.suse.com/security/cve/CVE-2019-13147/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13147/">CVE-2019-13147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13147">CVE-2019-13147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983093" comment="audiofile-0.3.6-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983094" comment="audiofile-devel-0.3.6-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983095" comment="audiofile-doc-0.3.6-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983096" comment="libaudiofile1-0.3.6-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253472" version="1" class="patch">
	<metadata>
		<title>libecpg6-17.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983097" comment="libecpg6-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983098" comment="libecpg6-32bit-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983099" comment="libpq5-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983100" comment="libpq5-32bit-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983101" comment="postgresql17-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983102" comment="postgresql17-contrib-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983103" comment="postgresql17-devel-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983104" comment="postgresql17-docs-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983105" comment="postgresql17-llvmjit-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983106" comment="postgresql17-llvmjit-devel-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983107" comment="postgresql17-plperl-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983108" comment="postgresql17-plpython-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983109" comment="postgresql17-pltcl-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983110" comment="postgresql17-server-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983111" comment="postgresql17-server-devel-17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983112" comment="postgresql17-test-17.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253473" version="1" class="patch">
	<metadata>
		<title>python311-Flask-3.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47278" ref_url="https://www.suse.com/security/cve/CVE-2025-47278/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Flask-3.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47278/">CVE-2025-47278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47278">CVE-2025-47278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983113" comment="python311-Flask-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983114" comment="python311-Flask-doc-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983115" comment="python312-Flask-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983116" comment="python312-Flask-doc-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983117" comment="python313-Flask-3.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983118" comment="python313-Flask-doc-3.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253474" version="1" class="patch">
	<metadata>
		<title>python311-tornado6-6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-tornado6-6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983119" comment="python311-tornado6-6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983120" comment="python312-tornado6-6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983121" comment="python313-tornado6-6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253475" version="1" class="patch">
	<metadata>
		<title>python313-3.13.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983122" comment="python313-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983123" comment="python313-32bit-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983124" comment="python313-curses-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983125" comment="python313-dbm-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983126" comment="python313-idle-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983127" comment="python313-tk-3.13.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983128" comment="python313-x86-64-v3-3.13.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253476" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.9a-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46397" ref_url="https://www.suse.com/security/cve/CVE-2025-46397/" source="CVE"/>
		<reference ref_id="CVE-2025-46398" ref_url="https://www.suse.com/security/cve/CVE-2025-46398/" source="CVE"/>
		<reference ref_id="CVE-2025-46399" ref_url="https://www.suse.com/security/cve/CVE-2025-46399/" source="CVE"/>
		<reference ref_id="CVE-2025-46400" ref_url="https://www.suse.com/security/cve/CVE-2025-46400/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.9a-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-23"/>
	<updated date="2025-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46397/">CVE-2025-46397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46397">CVE-2025-46397 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46398/">CVE-2025-46398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46398">CVE-2025-46398 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46399/">CVE-2025-46399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46399">CVE-2025-46399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46400/">CVE-2025-46400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46400">CVE-2025-46400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983129" comment="transfig-3.2.9a-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253477" version="1" class="patch">
	<metadata>
		<title>bind-9.20.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40775" ref_url="https://www.suse.com/security/cve/CVE-2025-40775/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40775/">CVE-2025-40775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40775">CVE-2025-40775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983280" comment="bind-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983281" comment="bind-doc-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983282" comment="bind-modules-bdbhpt-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983283" comment="bind-modules-generic-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983284" comment="bind-modules-ldap-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983285" comment="bind-modules-mysql-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983286" comment="bind-modules-perl-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983287" comment="bind-modules-sqlite3-9.20.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983288" comment="bind-utils-9.20.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253478" version="1" class="patch">
	<metadata>
		<title>dnsdist-1.9.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30194" ref_url="https://www.suse.com/security/cve/CVE-2025-30194/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-1.9.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30194/">CVE-2025-30194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30194">CVE-2025-30194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983289" comment="dnsdist-1.9.10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253479" version="1" class="patch">
	<metadata>
		<title>gh-2.73.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the gh-2.73.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983290" comment="gh-2.73.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983291" comment="gh-bash-completion-2.73.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983292" comment="gh-fish-completion-2.73.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983293" comment="gh-zsh-completion-2.73.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253480" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250523T151856-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40120" ref_url="https://www.suse.com/security/cve/CVE-2024-40120/" source="CVE"/>
		<reference ref_id="CVE-2025-1975" ref_url="https://www.suse.com/security/cve/CVE-2025-1975/" source="CVE"/>
		<reference ref_id="CVE-2025-2527" ref_url="https://www.suse.com/security/cve/CVE-2025-2527/" source="CVE"/>
		<reference ref_id="CVE-2025-2570" ref_url="https://www.suse.com/security/cve/CVE-2025-2570/" source="CVE"/>
		<reference ref_id="CVE-2025-31947" ref_url="https://www.suse.com/security/cve/CVE-2025-31947/" source="CVE"/>
		<reference ref_id="CVE-2025-3446" ref_url="https://www.suse.com/security/cve/CVE-2025-3446/" source="CVE"/>
		<reference ref_id="CVE-2025-47282" ref_url="https://www.suse.com/security/cve/CVE-2025-47282/" source="CVE"/>
		<reference ref_id="CVE-2025-47283" ref_url="https://www.suse.com/security/cve/CVE-2025-47283/" source="CVE"/>
		<reference ref_id="CVE-2025-47284" ref_url="https://www.suse.com/security/cve/CVE-2025-47284/" source="CVE"/>
		<reference ref_id="CVE-2025-47290" ref_url="https://www.suse.com/security/cve/CVE-2025-47290/" source="CVE"/>
		<reference ref_id="CVE-2025-47291" ref_url="https://www.suse.com/security/cve/CVE-2025-47291/" source="CVE"/>
		<reference ref_id="CVE-2025-48056" ref_url="https://www.suse.com/security/cve/CVE-2025-48056/" source="CVE"/>
		<reference ref_id="CVE-2025-48069" ref_url="https://www.suse.com/security/cve/CVE-2025-48069/" source="CVE"/>
		<reference ref_id="CVE-2025-5031" ref_url="https://www.suse.com/security/cve/CVE-2025-5031/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250523T151856-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40120/">CVE-2024-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40120">CVE-2024-40120 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-1975/">CVE-2025-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1975">CVE-2025-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2527/">CVE-2025-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2527">CVE-2025-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2570/">CVE-2025-2570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2570">CVE-2025-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31947/">CVE-2025-31947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31947">CVE-2025-31947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3446/">CVE-2025-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3446">CVE-2025-3446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47282/">CVE-2025-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47282">CVE-2025-47282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47283/">CVE-2025-47283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47283">CVE-2025-47283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47284/">CVE-2025-47284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47284">CVE-2025-47284 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47290/">CVE-2025-47290 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47290">CVE-2025-47290 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47291/">CVE-2025-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47291">CVE-2025-47291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48056/">CVE-2025-48056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48056">CVE-2025-48056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48069/">CVE-2025-48069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48069">CVE-2025-48069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5031/">CVE-2025-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5031">CVE-2025-5031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983294" comment="govulncheck-vulndb-0.0.20250523T151856-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253481" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.57-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-13009" ref_url="https://www.suse.com/security/cve/CVE-2024-13009/" source="CVE"/>
		<reference ref_id="CVE-2024-6763" ref_url="https://www.suse.com/security/cve/CVE-2024-6763/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.57-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-13009/">CVE-2024-13009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6763/">CVE-2024-6763 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983295" comment="jetty-annotations-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983296" comment="jetty-ant-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983297" comment="jetty-cdi-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983298" comment="jetty-client-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983299" comment="jetty-continuation-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983300" comment="jetty-deploy-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983301" comment="jetty-fcgi-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983302" comment="jetty-http-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983303" comment="jetty-http-spi-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983304" comment="jetty-io-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983305" comment="jetty-jaas-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983306" comment="jetty-jmx-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983307" comment="jetty-jndi-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983308" comment="jetty-jsp-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983309" comment="jetty-minimal-javadoc-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983310" comment="jetty-openid-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983311" comment="jetty-plus-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983312" comment="jetty-project-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983313" comment="jetty-proxy-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983314" comment="jetty-quickstart-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983315" comment="jetty-rewrite-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983316" comment="jetty-security-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983317" comment="jetty-server-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983318" comment="jetty-servlet-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983319" comment="jetty-servlets-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983320" comment="jetty-start-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983321" comment="jetty-util-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983322" comment="jetty-util-ajax-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983323" comment="jetty-webapp-9.4.57-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983324" comment="jetty-xml-9.4.57-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253482" version="1" class="patch">
	<metadata>
		<title>jq-1.7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53427" ref_url="https://www.suse.com/security/cve/CVE-2024-53427/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-53427/">CVE-2024-53427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53427">CVE-2024-53427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983325" comment="jq-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983326" comment="libjq-devel-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983327" comment="libjq1-1.7.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253483" version="1" class="patch">
	<metadata>
		<title>prometheus-blackbox_exporter-0.24.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the prometheus-blackbox_exporter-0.24.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983328" comment="prometheus-blackbox_exporter-0.24.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253484" version="1" class="patch">
	<metadata>
		<title>python312-3.12.10-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.10-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983329" comment="python312-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983330" comment="python312-32bit-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983331" comment="python312-curses-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983332" comment="python312-dbm-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983333" comment="python312-idle-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983334" comment="python312-tk-3.12.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983335" comment="python312-x86-64-v3-3.12.10-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253485" version="1" class="patch">
	<metadata>
		<title>screen-4.9.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46802" ref_url="https://www.suse.com/security/cve/CVE-2025-46802/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.9.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46802/">CVE-2025-46802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46802">CVE-2025-46802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983336" comment="screen-4.9.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253486" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-24.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-43904" ref_url="https://www.suse.com/security/cve/CVE-2025-43904/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-24.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43904/">CVE-2025-43904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43904">CVE-2025-43904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983337" comment="libnss_slurm2-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983338" comment="libpmi0-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983339" comment="libslurm42-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983340" comment="perl-slurm-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983341" comment="slurm-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983342" comment="slurm-auth-none-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983343" comment="slurm-config-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983344" comment="slurm-config-man-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983345" comment="slurm-cray-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983346" comment="slurm-devel-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983347" comment="slurm-doc-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983348" comment="slurm-hdf5-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983349" comment="slurm-lua-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983350" comment="slurm-munge-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983351" comment="slurm-node-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983352" comment="slurm-openlava-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983353" comment="slurm-pam_slurm-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983354" comment="slurm-plugins-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983355" comment="slurm-rest-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983356" comment="slurm-seff-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983357" comment="slurm-sjstat-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983358" comment="slurm-slurmdbd-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983359" comment="slurm-sql-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983360" comment="slurm-sview-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983361" comment="slurm-testsuite-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983362" comment="slurm-torque-24.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983363" comment="slurm-webdoc-24.11.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253487" version="1" class="patch">
	<metadata>
		<title>umoci-0.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the umoci-0.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983364" comment="umoci-0.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253488" version="1" class="patch">
	<metadata>
		<title>libyelp0-42.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155/" source="CVE"/>
		<description>
These are all security issues fixed in the libyelp0-42.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983365" comment="libyelp0-42.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983366" comment="yelp-42.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983367" comment="yelp-devel-42.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983368" comment="yelp-lang-42.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253489" version="1" class="patch">
	<metadata>
		<title>yelp-xsl-42.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155/" source="CVE"/>
		<description>
These are all security issues fixed in the yelp-xsl-42.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-26"/>
	<updated date="2025-05-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983369" comment="yelp-xsl-42.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253490" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-27"/>
	<updated date="2025-05-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983573" comment="containerd-1.7.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983574" comment="containerd-ctr-1.7.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983575" comment="containerd-devel-1.7.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253491" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5262" ref_url="https://www.suse.com/security/cve/CVE-2025-5262/" source="CVE"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-27"/>
	<updated date="2025-05-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5262/">CVE-2025-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5262">CVE-2025-5262 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983576" comment="firefox-esr-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983577" comment="firefox-esr-branding-upstream-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983578" comment="firefox-esr-translations-common-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983579" comment="firefox-esr-translations-other-128.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253492" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.1+security01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-3580" ref_url="https://www.suse.com/security/cve/CVE-2025-3580/" source="CVE"/>
		<reference ref_id="CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.1+security01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-27"/>
	<updated date="2025-05-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3580/">CVE-2025-3580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3580">CVE-2025-3580 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983580" comment="grafana-11.6.1+security01-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253493" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4920" ref_url="https://www.suse.com/security/cve/CVE-2025-4920/" source="CVE"/>
		<reference ref_id="CVE-2025-4921" ref_url="https://www.suse.com/security/cve/CVE-2025-4921/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-27"/>
	<updated date="2025-05-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4920/">CVE-2025-4920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4920">CVE-2025-4920 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4921/">CVE-2025-4921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4921">CVE-2025-4921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983581" comment="libmozjs-128-0-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983582" comment="mozjs128-128.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983583" comment="mozjs128-devel-128.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253494" version="1" class="patch">
	<metadata>
		<title>s390-tools-2.37.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the s390-tools-2.37.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-27"/>
	<updated date="2025-05-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983584" comment="s390-tools-2.37.0-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253495" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5262" ref_url="https://www.suse.com/security/cve/CVE-2025-5262/" source="CVE"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5262/">CVE-2025-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5262">CVE-2025-5262 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985228" comment="MozillaThunderbird-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985229" comment="MozillaThunderbird-openpgp-librnp-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985230" comment="MozillaThunderbird-translations-common-128.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985231" comment="MozillaThunderbird-translations-other-128.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253496" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48734" ref_url="https://www.suse.com/security/cve/CVE-2025-48734/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48734/">CVE-2025-48734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985232" comment="apache-commons-beanutils-1.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985233" comment="apache-commons-beanutils-javadoc-1.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253497" version="1" class="patch">
	<metadata>
		<title>curl-8.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4947" ref_url="https://www.suse.com/security/cve/CVE-2025-4947/" source="CVE"/>
		<reference ref_id="CVE-2025-5025" ref_url="https://www.suse.com/security/cve/CVE-2025-5025/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4947/">CVE-2025-4947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4947">CVE-2025-4947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5025/">CVE-2025-5025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5025">CVE-2025-5025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985234" comment="curl-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985235" comment="curl-fish-completion-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985236" comment="curl-zsh-completion-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985237" comment="libcurl-devel-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985238" comment="libcurl-devel-32bit-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985239" comment="libcurl-devel-doc-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985240" comment="libcurl4-8.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985241" comment="libcurl4-32bit-8.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253498" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36615" ref_url="https://www.suse.com/security/cve/CVE-2024-36615/" source="CVE"/>
		<reference ref_id="CVE-2024-36616" ref_url="https://www.suse.com/security/cve/CVE-2024-36616/" source="CVE"/>
		<reference ref_id="CVE-2024-36617" ref_url="https://www.suse.com/security/cve/CVE-2024-36617/" source="CVE"/>
		<reference ref_id="CVE-2024-36618" ref_url="https://www.suse.com/security/cve/CVE-2024-36618/" source="CVE"/>
		<reference ref_id="CVE-2024-36619" ref_url="https://www.suse.com/security/cve/CVE-2024-36619/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36615/">CVE-2024-36615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36615">CVE-2024-36615 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36616/">CVE-2024-36616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36616">CVE-2024-36616 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36617/">CVE-2024-36617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36617">CVE-2024-36617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36618/">CVE-2024-36618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36618">CVE-2024-36618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36619/">CVE-2024-36619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36619">CVE-2024-36619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985242" comment="ffmpeg-7-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985243" comment="ffmpeg-7-libavcodec-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985244" comment="ffmpeg-7-libavdevice-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985245" comment="ffmpeg-7-libavfilter-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985246" comment="ffmpeg-7-libavformat-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985247" comment="ffmpeg-7-libavutil-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985248" comment="ffmpeg-7-libpostproc-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985249" comment="ffmpeg-7-libswresample-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985250" comment="ffmpeg-7-libswscale-devel-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985251" comment="libavcodec61-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985252" comment="libavcodec61-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985253" comment="libavdevice61-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985254" comment="libavdevice61-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985255" comment="libavfilter10-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985256" comment="libavfilter10-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985257" comment="libavformat61-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985258" comment="libavformat61-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985259" comment="libavutil59-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985260" comment="libavutil59-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985261" comment="libpostproc58-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985262" comment="libpostproc58-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985263" comment="libswresample5-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985264" comment="libswresample5-32bit-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985265" comment="libswscale8-7.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985266" comment="libswscale8-32bit-7.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253499" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-alertmanager-0.28.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-alertmanager-0.28.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985267" comment="golang-github-prometheus-alertmanager-0.28.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253500" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250527T204717-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123/" source="CVE"/>
		<reference ref_id="CVE-2025-48075" ref_url="https://www.suse.com/security/cve/CVE-2025-48075/" source="CVE"/>
		<reference ref_id="CVE-2025-48371" ref_url="https://www.suse.com/security/cve/CVE-2025-48371/" source="CVE"/>
		<reference ref_id="CVE-2025-48374" ref_url="https://www.suse.com/security/cve/CVE-2025-48374/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250527T204717-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48075/">CVE-2025-48075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48075">CVE-2025-48075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48371/">CVE-2025-48371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48371">CVE-2025-48371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48374/">CVE-2025-48374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48374">CVE-2025-48374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985268" comment="govulncheck-vulndb-0.0.20250527T204717-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253501" version="1" class="patch">
	<metadata>
		<title>icinga2-2.14.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48057" ref_url="https://www.suse.com/security/cve/CVE-2025-48057/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga2-2.14.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-48057/">CVE-2025-48057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48057">CVE-2025-48057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985269" comment="icinga2-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985270" comment="icinga2-bin-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985271" comment="icinga2-common-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985272" comment="icinga2-doc-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985273" comment="icinga2-ido-mysql-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985274" comment="icinga2-ido-pgsql-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985275" comment="nano-icinga2-2.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985276" comment="vim-icinga2-2.14.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253502" version="1" class="patch">
	<metadata>
		<title>kea-2.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32801" ref_url="https://www.suse.com/security/cve/CVE-2025-32801/" source="CVE"/>
		<reference ref_id="CVE-2025-32802" ref_url="https://www.suse.com/security/cve/CVE-2025-32802/" source="CVE"/>
		<reference ref_id="CVE-2025-32803" ref_url="https://www.suse.com/security/cve/CVE-2025-32803/" source="CVE"/>
		<description>
These are all security issues fixed in the kea-2.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32801/">CVE-2025-32801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32801">CVE-2025-32801 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32802/">CVE-2025-32802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32802">CVE-2025-32802 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32803/">CVE-2025-32803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32803">CVE-2025-32803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985277" comment="kea-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985278" comment="kea-devel-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985279" comment="kea-doc-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985280" comment="kea-hooks-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985281" comment="libkea-asiodns49-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985282" comment="libkea-asiolink72-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985283" comment="libkea-cc68-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985284" comment="libkea-cfgclient66-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985285" comment="libkea-cryptolink50-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985286" comment="libkea-d2srv47-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985287" comment="libkea-database62-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985288" comment="libkea-dhcp++92-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985289" comment="libkea-dhcp_ddns57-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985290" comment="libkea-dhcpsrv111-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985291" comment="libkea-dns++57-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985292" comment="libkea-eval69-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985293" comment="libkea-exceptions33-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985294" comment="libkea-hooks100-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985295" comment="libkea-http72-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985296" comment="libkea-log61-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985297" comment="libkea-mysql71-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985298" comment="libkea-pgsql71-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985299" comment="libkea-process74-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985300" comment="libkea-stats41-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985301" comment="libkea-tcp19-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985302" comment="libkea-util-io0-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985303" comment="libkea-util86-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985304" comment="python3-kea-2.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253503" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-35.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4609" ref_url="https://www.suse.com/security/cve/CVE-2025-4609/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-35.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4609/">CVE-2025-4609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4609">CVE-2025-4609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985305" comment="nodejs-electron-35.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985306" comment="nodejs-electron-devel-35.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985307" comment="nodejs-electron-doc-35.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253504" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.5.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27587" ref_url="https://www.suse.com/security/cve/CVE-2025-27587/" source="CVE"/>
		<reference ref_id="CVE-2025-4575" ref_url="https://www.suse.com/security/cve/CVE-2025-4575/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.5.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27587/">CVE-2025-27587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27587">CVE-2025-27587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4575/">CVE-2025-4575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4575">CVE-2025-4575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985308" comment="libopenssl-3-devel-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985309" comment="libopenssl-3-devel-32bit-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985310" comment="libopenssl-3-fips-provider-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985311" comment="libopenssl-3-fips-provider-32bit-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985312" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985313" comment="libopenssl3-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985314" comment="libopenssl3-32bit-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985315" comment="libopenssl3-x86-64-v3-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985316" comment="openssl-3-3.5.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985317" comment="openssl-3-doc-3.5.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253505" version="1" class="patch">
	<metadata>
		<title>pluto-5.21.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the pluto-5.21.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985318" comment="pluto-5.21.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985319" comment="pluto-bash-completion-5.21.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985320" comment="pluto-fish-completion-5.21.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985321" comment="pluto-zsh-completion-5.21.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253506" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4476" ref_url="https://www.suse.com/security/cve/CVE-2025-4476/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<reference ref_id="CVE-2025-4969" ref_url="https://www.suse.com/security/cve/CVE-2025-4969/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4476/">CVE-2025-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4476">CVE-2025-4476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4969/">CVE-2025-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4969">CVE-2025-4969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985500" comment="libsoup-3_0-0-3.6.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985501" comment="libsoup-3_0-0-32bit-3.6.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985502" comment="libsoup-devel-3.6.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985503" comment="libsoup-devel-32bit-3.6.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985504" comment="libsoup-lang-3.6.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985505" comment="typelib-1_0-Soup-3_0-3.6.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253507" version="1" class="patch">
	<metadata>
		<title>openbao-2.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4166" ref_url="https://www.suse.com/security/cve/CVE-2025-4166/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4166/">CVE-2025-4166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4166">CVE-2025-4166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985506" comment="openbao-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985507" comment="openbao-agent-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985508" comment="openbao-cassandra-database-plugin-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985509" comment="openbao-influxdb-database-plugin-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985510" comment="openbao-mysql-database-plugin-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985511" comment="openbao-mysql-legacy-database-plugin-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985512" comment="openbao-postgresql-database-plugin-2.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985513" comment="openbao-server-2.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253508" version="1" class="patch">
	<metadata>
		<title>perl-Net-Dropbox-API-1.900.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-58036" ref_url="https://www.suse.com/security/cve/CVE-2024-58036/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Net-Dropbox-API-1.900.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-58036/">CVE-2024-58036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58036">CVE-2024-58036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985514" comment="perl-Net-Dropbox-API-1.900.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253509" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250529T205903-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4057" ref_url="https://www.suse.com/security/cve/CVE-2025-4057/" source="CVE"/>
		<reference ref_id="CVE-2025-47933" ref_url="https://www.suse.com/security/cve/CVE-2025-47933/" source="CVE"/>
		<reference ref_id="CVE-2025-47952" ref_url="https://www.suse.com/security/cve/CVE-2025-47952/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250529T205903-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4057/">CVE-2025-4057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4057">CVE-2025-4057 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-47933/">CVE-2025-47933 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47933">CVE-2025-47933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47952/">CVE-2025-47952 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47952">CVE-2025-47952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985515" comment="govulncheck-vulndb-0.0.20250529T205903-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253510" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906/" source="CVE"/>
		<reference ref_id="CVE-2025-32909" ref_url="https://www.suse.com/security/cve/CVE-2025-32909/" source="CVE"/>
		<reference ref_id="CVE-2025-32910" ref_url="https://www.suse.com/security/cve/CVE-2025-32910/" source="CVE"/>
		<reference ref_id="CVE-2025-32912" ref_url="https://www.suse.com/security/cve/CVE-2025-32912/" source="CVE"/>
		<reference ref_id="CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<reference ref_id="CVE-2025-4969" ref_url="https://www.suse.com/security/cve/CVE-2025-4969/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32909/">CVE-2025-32909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32909">CVE-2025-32909 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32910/">CVE-2025-32910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32910">CVE-2025-32910 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32912/">CVE-2025-32912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32912">CVE-2025-32912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4969/">CVE-2025-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4969">CVE-2025-4969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985516" comment="libsoup-2_4-1-2.74.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985517" comment="libsoup-2_4-1-32bit-2.74.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985518" comment="libsoup2-devel-2.74.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985519" comment="libsoup2-devel-32bit-2.74.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985520" comment="libsoup2-lang-2.74.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985521" comment="typelib-1_0-Soup-2_4-2.74.3-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253511" version="1" class="patch">
	<metadata>
		<title>python310-3.10.17-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.17-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985752" comment="python310-3.10.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985753" comment="python310-32bit-3.10.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985754" comment="python310-curses-3.10.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985755" comment="python310-dbm-3.10.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985756" comment="python310-idle-3.10.17-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985757" comment="python310-tk-3.10.17-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253512" version="1" class="patch">
	<metadata>
		<title>python311-3.11.12-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.12-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985758" comment="python311-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985759" comment="python311-32bit-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985760" comment="python311-curses-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985761" comment="python311-dbm-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985762" comment="python311-idle-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985763" comment="python311-tk-3.11.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985764" comment="python311-x86-64-v3-3.11.12-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253513" version="1" class="patch">
	<metadata>
		<title>python39-3.9.22-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.22-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985765" comment="python39-3.9.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985766" comment="python39-curses-3.9.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985767" comment="python39-dbm-3.9.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985768" comment="python39-idle-3.9.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985769" comment="python39-tk-3.9.22-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253514" version="1" class="patch">
	<metadata>
		<title>golang-github-teddysun-v2ray-plugin-5.25.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-297850" ref_url="https://www.suse.com/security/cve/CVE-2025-297850/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-teddysun-v2ray-plugin-5.25.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-297850/">CVE-2025-297850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-297850">CVE-2025-297850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985770" comment="golang-github-teddysun-v2ray-plugin-5.25.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985771" comment="shadowsocks-v2ray-plugin-5.25.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253515" version="1" class="patch">
	<metadata>
		<title>sslh-2.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46806" ref_url="https://www.suse.com/security/cve/CVE-2025-46806/" source="CVE"/>
		<reference ref_id="CVE-2025-46807" ref_url="https://www.suse.com/security/cve/CVE-2025-46807/" source="CVE"/>
		<description>
These are all security issues fixed in the sslh-2.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-46806/">CVE-2025-46806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46806">CVE-2025-46806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-46807/">CVE-2025-46807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46807">CVE-2025-46807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985772" comment="sslh-2.2.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253516" version="1" class="patch">
	<metadata>
		<title>golang-github-v2fly-v2ray-core-5.33.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-297850" ref_url="https://www.suse.com/security/cve/CVE-2025-297850/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-v2fly-v2ray-core-5.33.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-02"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-297850/">CVE-2025-297850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-297850">CVE-2025-297850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985773" comment="golang-github-v2fly-v2ray-core-5.33.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985774" comment="v2ray-core-5.33.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253517" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-139.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5270" ref_url="https://www.suse.com/security/cve/CVE-2025-5270/" source="CVE"/>
		<reference ref_id="CVE-2025-5271" ref_url="https://www.suse.com/security/cve/CVE-2025-5271/" source="CVE"/>
		<reference ref_id="CVE-2025-5272" ref_url="https://www.suse.com/security/cve/CVE-2025-5272/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-139.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5270/">CVE-2025-5270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5270">CVE-2025-5270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5271/">CVE-2025-5271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5271">CVE-2025-5271 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5272/">CVE-2025-5272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5272">CVE-2025-5272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985854" comment="MozillaFirefox-139.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985855" comment="MozillaFirefox-branding-upstream-139.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985856" comment="MozillaFirefox-devel-139.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985857" comment="MozillaFirefox-translations-common-139.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985858" comment="MozillaFirefox-translations-other-139.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253518" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47947" ref_url="https://www.suse.com/security/cve/CVE-2025-47947/" source="CVE"/>
		<reference ref_id="CVE-2025-48866" ref_url="https://www.suse.com/security/cve/CVE-2025-48866/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47947/">CVE-2025-47947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47947">CVE-2025-47947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48866/">CVE-2025-48866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48866">CVE-2025-48866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985859" comment="apache2-mod_security2-2.9.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253519" version="1" class="patch">
	<metadata>
		<title>assimp-devel-6.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48426" ref_url="https://www.suse.com/security/cve/CVE-2024-48426/" source="CVE"/>
		<reference ref_id="CVE-2025-2152" ref_url="https://www.suse.com/security/cve/CVE-2025-2152/" source="CVE"/>
		<reference ref_id="CVE-2025-3159" ref_url="https://www.suse.com/security/cve/CVE-2025-3159/" source="CVE"/>
		<reference ref_id="CVE-2025-3160" ref_url="https://www.suse.com/security/cve/CVE-2025-3160/" source="CVE"/>
		<reference ref_id="CVE-2025-3196" ref_url="https://www.suse.com/security/cve/CVE-2025-3196/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-6.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-48426/">CVE-2024-48426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48426">CVE-2024-48426 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-2152/">CVE-2025-2152 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2152">CVE-2025-2152 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3159/">CVE-2025-3159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3159">CVE-2025-3159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3160/">CVE-2025-3160 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3160">CVE-2025-3160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3196/">CVE-2025-3196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3196">CVE-2025-3196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985860" comment="assimp-devel-6.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985861" comment="libassimp5-6.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253520" version="1" class="patch">
	<metadata>
		<title>perl-Crypt-OpenSSL-RSA-0.350.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2467" ref_url="https://www.suse.com/security/cve/CVE-2024-2467/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Crypt-OpenSSL-RSA-0.350.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2467/">CVE-2024-2467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2467">CVE-2024-2467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985862" comment="perl-Crypt-OpenSSL-RSA-0.350.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253521" version="1" class="patch">
	<metadata>
		<title>haproxy-3.2.0+git0.e134140d2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32464" ref_url="https://www.suse.com/security/cve/CVE-2025-32464/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-3.2.0+git0.e134140d2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32464/">CVE-2025-32464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32464">CVE-2025-32464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985922" comment="haproxy-3.2.0+git0.e134140d2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253522" version="1" class="patch">
	<metadata>
		<title>python311-nh3-0.2.17-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-nh3-0.2.17-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985923" comment="python311-nh3-0.2.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985924" comment="python312-nh3-0.2.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985925" comment="python313-nh3-0.2.17-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253523" version="1" class="patch">
	<metadata>
		<title>python311-selenium-4.25.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-selenium-4.25.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985926" comment="python311-selenium-4.25.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985927" comment="python312-selenium-4.25.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985928" comment="python313-selenium-4.25.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253524" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-139.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49709" ref_url="https://www.suse.com/security/cve/CVE-2025-49709/" source="CVE"/>
		<reference ref_id="CVE-2025-49710" ref_url="https://www.suse.com/security/cve/CVE-2025-49710/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-139.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-49709/">CVE-2025-49709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49709">CVE-2025-49709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-49710/">CVE-2025-49710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49710">CVE-2025-49710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998201" comment="MozillaFirefox-139.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998202" comment="MozillaFirefox-branding-upstream-139.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998203" comment="MozillaFirefox-devel-139.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998204" comment="MozillaFirefox-translations-common-139.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998205" comment="MozillaFirefox-translations-other-139.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253525" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5986" ref_url="https://www.suse.com/security/cve/CVE-2025-5986/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-5986/">CVE-2025-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5986">CVE-2025-5986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998206" comment="MozillaThunderbird-128.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998207" comment="MozillaThunderbird-openpgp-librnp-128.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998208" comment="MozillaThunderbird-translations-common-128.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998209" comment="MozillaThunderbird-translations-other-128.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253526" version="1" class="patch">
	<metadata>
		<title>SDL-1.2.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL-1.2.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998210" comment="SDL-1.2.15-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253527" version="1" class="patch">
	<metadata>
		<title>SDL2-2.32.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="CVE-2022-4743" ref_url="https://www.suse.com/security/cve/CVE-2022-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL2-2.32.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2888">CVE-2017-2888 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13626">CVE-2019-13626 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4743/">CVE-2022-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4743">CVE-2022-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998211" comment="SDL2-2.32.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253528" version="1" class="patch">
	<metadata>
		<title>alloy-1.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-46327" ref_url="https://www.suse.com/security/cve/CVE-2025-46327/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46327/">CVE-2025-46327 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46327">CVE-2025-46327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998212" comment="alloy-1.9.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253529" version="1" class="patch">
	<metadata>
		<title>apache-commons-fileupload-1.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48976" ref_url="https://www.suse.com/security/cve/CVE-2025-48976/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-fileupload-1.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48976/">CVE-2025-48976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48976">CVE-2025-48976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998213" comment="apache-commons-fileupload-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998214" comment="apache-commons-fileupload-javadoc-1.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253530" version="1" class="patch">
	<metadata>
		<title>assimp-devel-6.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2750" ref_url="https://www.suse.com/security/cve/CVE-2025-2750/" source="CVE"/>
		<reference ref_id="CVE-2025-2751" ref_url="https://www.suse.com/security/cve/CVE-2025-2751/" source="CVE"/>
		<reference ref_id="CVE-2025-2757" ref_url="https://www.suse.com/security/cve/CVE-2025-2757/" source="CVE"/>
		<reference ref_id="CVE-2025-3158" ref_url="https://www.suse.com/security/cve/CVE-2025-3158/" source="CVE"/>
		<reference ref_id="CVE-2025-3548" ref_url="https://www.suse.com/security/cve/CVE-2025-3548/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-6.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2750/">CVE-2025-2750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2750">CVE-2025-2750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2751/">CVE-2025-2751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2751">CVE-2025-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2757/">CVE-2025-2757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2757">CVE-2025-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3158/">CVE-2025-3158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3158">CVE-2025-3158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3548/">CVE-2025-3548 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3548">CVE-2025-3548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998215" comment="assimp-devel-6.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998216" comment="libassimp6-6.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253531" version="1" class="patch">
	<metadata>
		<title>chromedriver-138.0.7204.96-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5063" ref_url="https://www.suse.com/security/cve/CVE-2025-5063/" source="CVE"/>
		<reference ref_id="CVE-2025-5064" ref_url="https://www.suse.com/security/cve/CVE-2025-5064/" source="CVE"/>
		<reference ref_id="CVE-2025-5065" ref_url="https://www.suse.com/security/cve/CVE-2025-5065/" source="CVE"/>
		<reference ref_id="CVE-2025-5066" ref_url="https://www.suse.com/security/cve/CVE-2025-5066/" source="CVE"/>
		<reference ref_id="CVE-2025-5067" ref_url="https://www.suse.com/security/cve/CVE-2025-5067/" source="CVE"/>
		<reference ref_id="CVE-2025-5068" ref_url="https://www.suse.com/security/cve/CVE-2025-5068/" source="CVE"/>
		<reference ref_id="CVE-2025-5280" ref_url="https://www.suse.com/security/cve/CVE-2025-5280/" source="CVE"/>
		<reference ref_id="CVE-2025-5281" ref_url="https://www.suse.com/security/cve/CVE-2025-5281/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<reference ref_id="CVE-2025-5419" ref_url="https://www.suse.com/security/cve/CVE-2025-5419/" source="CVE"/>
		<reference ref_id="CVE-2025-5958" ref_url="https://www.suse.com/security/cve/CVE-2025-5958/" source="CVE"/>
		<reference ref_id="CVE-2025-5959" ref_url="https://www.suse.com/security/cve/CVE-2025-5959/" source="CVE"/>
		<reference ref_id="CVE-2025-6191" ref_url="https://www.suse.com/security/cve/CVE-2025-6191/" source="CVE"/>
		<reference ref_id="CVE-2025-6192" ref_url="https://www.suse.com/security/cve/CVE-2025-6192/" source="CVE"/>
		<reference ref_id="CVE-2025-6554" ref_url="https://www.suse.com/security/cve/CVE-2025-6554/" source="CVE"/>
		<reference ref_id="CVE-2025-6555" ref_url="https://www.suse.com/security/cve/CVE-2025-6555/" source="CVE"/>
		<reference ref_id="CVE-2025-6556" ref_url="https://www.suse.com/security/cve/CVE-2025-6556/" source="CVE"/>
		<reference ref_id="CVE-2025-6557" ref_url="https://www.suse.com/security/cve/CVE-2025-6557/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-138.0.7204.96-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5063/">CVE-2025-5063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5063">CVE-2025-5063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5064/">CVE-2025-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5064">CVE-2025-5064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5065/">CVE-2025-5065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5065">CVE-2025-5065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5066/">CVE-2025-5066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5066">CVE-2025-5066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5067/">CVE-2025-5067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5067">CVE-2025-5067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5068/">CVE-2025-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5068">CVE-2025-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5280/">CVE-2025-5280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5280">CVE-2025-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5281/">CVE-2025-5281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5281">CVE-2025-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5419/">CVE-2025-5419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5419">CVE-2025-5419 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5958/">CVE-2025-5958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5958">CVE-2025-5958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5959/">CVE-2025-5959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5959">CVE-2025-5959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6191/">CVE-2025-6191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6191">CVE-2025-6191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6192/">CVE-2025-6192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6192">CVE-2025-6192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6554/">CVE-2025-6554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6554">CVE-2025-6554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6555/">CVE-2025-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6555">CVE-2025-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6556/">CVE-2025-6556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6556">CVE-2025-6556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6557/">CVE-2025-6557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6557">CVE-2025-6557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998217" comment="chromedriver-138.0.7204.96-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998218" comment="chromium-138.0.7204.96-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253532" version="1" class="patch">
	<metadata>
		<title>clamav-1.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-20234" ref_url="https://www.suse.com/security/cve/CVE-2025-20234/" source="CVE"/>
		<reference ref_id="CVE-2025-20260" ref_url="https://www.suse.com/security/cve/CVE-2025-20260/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20234/">CVE-2025-20234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20234">CVE-2025-20234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-20260/">CVE-2025-20260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20260">CVE-2025-20260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998219" comment="clamav-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998220" comment="clamav-devel-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998221" comment="clamav-docs-html-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998222" comment="clamav-milter-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998223" comment="libclamav12-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998224" comment="libclammspack0-1.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998225" comment="libfreshclam3-1.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253533" version="1" class="patch">
	<metadata>
		<title>clustershell-1.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
These are all security issues fixed in the clustershell-1.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998226" comment="clustershell-1.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998227" comment="python3-clustershell-1.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253534" version="1" class="patch">
	<metadata>
		<title>curl-8.14.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5399" ref_url="https://www.suse.com/security/cve/CVE-2025-5399/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.14.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5399/">CVE-2025-5399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5399">CVE-2025-5399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998228" comment="curl-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998229" comment="curl-fish-completion-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998230" comment="curl-zsh-completion-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998231" comment="libcurl-devel-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998232" comment="libcurl-devel-32bit-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998233" comment="libcurl-devel-doc-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998234" comment="libcurl4-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998235" comment="libcurl4-32bit-8.14.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998236" comment="wcurl-8.14.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253535" version="1" class="patch">
	<metadata>
		<title>faad2-2.11.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-20194" ref_url="https://www.suse.com/security/cve/CVE-2018-20194/" source="CVE"/>
		<reference ref_id="CVE-2018-20196" ref_url="https://www.suse.com/security/cve/CVE-2018-20196/" source="CVE"/>
		<reference ref_id="CVE-2018-20199" ref_url="https://www.suse.com/security/cve/CVE-2018-20199/" source="CVE"/>
		<reference ref_id="CVE-2018-20358" ref_url="https://www.suse.com/security/cve/CVE-2018-20358/" source="CVE"/>
		<reference ref_id="CVE-2018-20359" ref_url="https://www.suse.com/security/cve/CVE-2018-20359/" source="CVE"/>
		<reference ref_id="CVE-2018-20362" ref_url="https://www.suse.com/security/cve/CVE-2018-20362/" source="CVE"/>
		<reference ref_id="CVE-2019-15296" ref_url="https://www.suse.com/security/cve/CVE-2019-15296/" source="CVE"/>
		<reference ref_id="CVE-2019-6956" ref_url="https://www.suse.com/security/cve/CVE-2019-6956/" source="CVE"/>
		<description>
These are all security issues fixed in the faad2-2.11.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20194/">CVE-2018-20194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20194">CVE-2018-20194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20196/">CVE-2018-20196 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20196">CVE-2018-20196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20199/">CVE-2018-20199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20199">CVE-2018-20199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20358/">CVE-2018-20358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20358">CVE-2018-20358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20359/">CVE-2018-20359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20359">CVE-2018-20359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20362/">CVE-2018-20362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20362">CVE-2018-20362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15296/">CVE-2019-15296 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15296">CVE-2019-15296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6956/">CVE-2019-6956 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6956">CVE-2019-6956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998237" comment="faad2-2.11.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998238" comment="faad2-devel-2.11.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998239" comment="libfaad2-2.11.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998240" comment="libfaad2-32bit-2.11.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998241" comment="libfaad_drm2-2.11.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998242" comment="libfaad_drm2-32bit-2.11.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253536" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-1475" ref_url="https://www.suse.com/security/cve/CVE-2022-1475/" source="CVE"/>
		<reference ref_id="CVE-2024-36616" ref_url="https://www.suse.com/security/cve/CVE-2024-36616/" source="CVE"/>
		<reference ref_id="CVE-2024-36617" ref_url="https://www.suse.com/security/cve/CVE-2024-36617/" source="CVE"/>
		<reference ref_id="CVE-2024-36618" ref_url="https://www.suse.com/security/cve/CVE-2024-36618/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1475/">CVE-2022-1475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1475">CVE-2022-1475 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36616/">CVE-2024-36616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36616">CVE-2024-36616 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36617/">CVE-2024-36617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36617">CVE-2024-36617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36618/">CVE-2024-36618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36618">CVE-2024-36618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998243" comment="ffmpeg-4-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998244" comment="ffmpeg-4-libavcodec-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998245" comment="ffmpeg-4-libavdevice-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998246" comment="ffmpeg-4-libavfilter-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998247" comment="ffmpeg-4-libavformat-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998248" comment="ffmpeg-4-libavresample-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998249" comment="ffmpeg-4-libavutil-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998250" comment="ffmpeg-4-libpostproc-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998251" comment="ffmpeg-4-libswresample-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998252" comment="ffmpeg-4-libswscale-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998253" comment="ffmpeg-4-private-devel-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998254" comment="libavcodec58_134-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998255" comment="libavcodec58_134-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998256" comment="libavdevice58_13-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998257" comment="libavdevice58_13-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998258" comment="libavfilter7_110-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998259" comment="libavfilter7_110-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998260" comment="libavformat58_76-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998261" comment="libavformat58_76-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998262" comment="libavresample4_0-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998263" comment="libavresample4_0-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998264" comment="libavutil56_70-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998265" comment="libavutil56_70-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998266" comment="libpostproc55_9-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998267" comment="libpostproc55_9-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998268" comment="libswresample3_9-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998269" comment="libswresample3_9-32bit-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998270" comment="libswscale5_9-4.4.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998271" comment="libswscale5_9-32bit-4.4.6-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253537" version="1" class="patch">
	<metadata>
		<title>firefox-esr-128.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-128.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998272" comment="firefox-esr-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998273" comment="firefox-esr-branding-upstream-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998274" comment="firefox-esr-translations-common-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998275" comment="firefox-esr-translations-other-128.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253538" version="1" class="patch">
	<metadata>
		<title>flake-pilot-3.1.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the flake-pilot-3.1.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998276" comment="flake-pilot-3.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998277" comment="flake-pilot-firecracker-3.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998278" comment="flake-pilot-firecracker-dracut-netstart-3.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998279" comment="flake-pilot-firecracker-guestvm-tools-3.1.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998280" comment="flake-pilot-podman-3.1.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253539" version="1" class="patch">
	<metadata>
		<title>fractal-11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48937" ref_url="https://www.suse.com/security/cve/CVE-2025-48937/" source="CVE"/>
		<description>
These are all security issues fixed in the fractal-11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48937/">CVE-2025-48937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48937">CVE-2025-48937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998281" comment="fractal-11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998282" comment="fractal-lang-11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253540" version="1" class="patch">
	<metadata>
		<title>gdm-48.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-48.0-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998283" comment="gdm-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998284" comment="gdm-branding-upstream-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998285" comment="gdm-devel-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998286" comment="gdm-lang-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998287" comment="gdm-schema-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998288" comment="gdm-systemd-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998289" comment="gdm-xdm-integration-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998290" comment="gdmflexiserver-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998291" comment="libgdm1-48.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998292" comment="typelib-1_0-Gdm-1_0-48.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253541" version="1" class="patch">
	<metadata>
		<title>git-lfs-3.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the git-lfs-3.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998293" comment="git-lfs-3.7.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253542" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.84.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6052" ref_url="https://www.suse.com/security/cve/CVE-2025-6052/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.84.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6052/">CVE-2025-6052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6052">CVE-2025-6052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998294" comment="gio-branding-upstream-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998295" comment="glib2-devel-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998296" comment="glib2-devel-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998297" comment="glib2-devel-static-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998298" comment="glib2-lang-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998299" comment="glib2-tests-devel-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998300" comment="glib2-tools-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998301" comment="glib2-tools-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998302" comment="libgio-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998303" comment="libgio-2_0-0-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998304" comment="libgirepository-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998305" comment="libglib-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998306" comment="libglib-2_0-0-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998307" comment="libgmodule-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998308" comment="libgmodule-2_0-0-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998309" comment="libgobject-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998310" comment="libgobject-2_0-0-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998311" comment="libgthread-2_0-0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998312" comment="libgthread-2_0-0-32bit-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998313" comment="typelib-1_0-GIRepository-3_0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998314" comment="typelib-1_0-GLib-2_0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998315" comment="typelib-1_0-GLibUnix-2_0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998316" comment="typelib-1_0-GModule-2_0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998317" comment="typelib-1_0-GObject-2_0-2.84.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998318" comment="typelib-1_0-Gio-2_0-2.84.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253543" version="1" class="patch">
	<metadata>
		<title>glibc-2.41-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<reference ref_id="CVE-2025-5745" ref_url="https://www.suse.com/security/cve/CVE-2025-5745/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.41-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5745/">CVE-2025-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5745">CVE-2025-5745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998319" comment="glibc-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998320" comment="glibc-devel-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998321" comment="glibc-devel-static-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998322" comment="glibc-extra-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998323" comment="glibc-gconv-modules-extra-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998324" comment="glibc-html-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998325" comment="glibc-i18ndata-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998326" comment="glibc-info-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998327" comment="glibc-lang-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998328" comment="glibc-locale-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998329" comment="glibc-locale-base-2.41-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998330" comment="glibc-profile-2.41-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253544" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998331" comment="go1.23-1.23.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998332" comment="go1.23-doc-1.23.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998333" comment="go1.23-libstd-1.23.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998334" comment="go1.23-race-1.23.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253545" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998335" comment="go1.24-1.24.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998336" comment="go1.24-doc-1.24.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998337" comment="go1.24-libstd-1.24.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998338" comment="go1.24-race-1.24.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253546" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250612T141001-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-36846" ref_url="https://www.suse.com/security/cve/CVE-2020-36846/" source="CVE"/>
		<reference ref_id="CVE-2022-31022" ref_url="https://www.suse.com/security/cve/CVE-2022-31022/" source="CVE"/>
		<reference ref_id="CVE-2023-42818" ref_url="https://www.suse.com/security/cve/CVE-2023-42818/" source="CVE"/>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-1792" ref_url="https://www.suse.com/security/cve/CVE-2025-1792/" source="CVE"/>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<reference ref_id="CVE-2025-25207" ref_url="https://www.suse.com/security/cve/CVE-2025-25207/" source="CVE"/>
		<reference ref_id="CVE-2025-25208" ref_url="https://www.suse.com/security/cve/CVE-2025-25208/" source="CVE"/>
		<reference ref_id="CVE-2025-2571" ref_url="https://www.suse.com/security/cve/CVE-2025-2571/" source="CVE"/>
		<reference ref_id="CVE-2025-29785" ref_url="https://www.suse.com/security/cve/CVE-2025-29785/" source="CVE"/>
		<reference ref_id="CVE-2025-3230" ref_url="https://www.suse.com/security/cve/CVE-2025-3230/" source="CVE"/>
		<reference ref_id="CVE-2025-3260" ref_url="https://www.suse.com/security/cve/CVE-2025-3260/" source="CVE"/>
		<reference ref_id="CVE-2025-3454" ref_url="https://www.suse.com/security/cve/CVE-2025-3454/" source="CVE"/>
		<reference ref_id="CVE-2025-3611" ref_url="https://www.suse.com/security/cve/CVE-2025-3611/" source="CVE"/>
		<reference ref_id="CVE-2025-3913" ref_url="https://www.suse.com/security/cve/CVE-2025-3913/" source="CVE"/>
		<reference ref_id="CVE-2025-4128" ref_url="https://www.suse.com/security/cve/CVE-2025-4128/" source="CVE"/>
		<reference ref_id="CVE-2025-4573" ref_url="https://www.suse.com/security/cve/CVE-2025-4573/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<reference ref_id="CVE-2025-47950" ref_url="https://www.suse.com/security/cve/CVE-2025-47950/" source="CVE"/>
		<reference ref_id="CVE-2025-48494" ref_url="https://www.suse.com/security/cve/CVE-2025-48494/" source="CVE"/>
		<reference ref_id="CVE-2025-48495" ref_url="https://www.suse.com/security/cve/CVE-2025-48495/" source="CVE"/>
		<reference ref_id="CVE-2025-48710" ref_url="https://www.suse.com/security/cve/CVE-2025-48710/" source="CVE"/>
		<reference ref_id="CVE-2025-48865" ref_url="https://www.suse.com/security/cve/CVE-2025-48865/" source="CVE"/>
		<reference ref_id="CVE-2025-48938" ref_url="https://www.suse.com/security/cve/CVE-2025-48938/" source="CVE"/>
		<reference ref_id="CVE-2025-48948" ref_url="https://www.suse.com/security/cve/CVE-2025-48948/" source="CVE"/>
		<reference ref_id="CVE-2025-48949" ref_url="https://www.suse.com/security/cve/CVE-2025-48949/" source="CVE"/>
		<reference ref_id="CVE-2025-49011" ref_url="https://www.suse.com/security/cve/CVE-2025-49011/" source="CVE"/>
		<reference ref_id="CVE-2025-49136" ref_url="https://www.suse.com/security/cve/CVE-2025-49136/" source="CVE"/>
		<reference ref_id="CVE-2025-49140" ref_url="https://www.suse.com/security/cve/CVE-2025-49140/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250612T141001-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36846/">CVE-2020-36846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36846">CVE-2020-36846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31022/">CVE-2022-31022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31022">CVE-2022-31022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42818/">CVE-2023-42818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42818">CVE-2023-42818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1792/">CVE-2025-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1792">CVE-2025-1792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25207/">CVE-2025-25207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25207">CVE-2025-25207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25208/">CVE-2025-25208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25208">CVE-2025-25208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2571/">CVE-2025-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2571">CVE-2025-2571 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29785/">CVE-2025-29785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29785">CVE-2025-29785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3230/">CVE-2025-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3230">CVE-2025-3230 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-3260/">CVE-2025-3260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3260">CVE-2025-3260 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-3454/">CVE-2025-3454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3454">CVE-2025-3454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3611/">CVE-2025-3611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3611">CVE-2025-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3913/">CVE-2025-3913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3913">CVE-2025-3913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4128/">CVE-2025-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4128">CVE-2025-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4573/">CVE-2025-4573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4573">CVE-2025-4573 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47950/">CVE-2025-47950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47950">CVE-2025-47950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48494/">CVE-2025-48494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48494">CVE-2025-48494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48495/">CVE-2025-48495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48495">CVE-2025-48495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48710/">CVE-2025-48710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48710">CVE-2025-48710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48865/">CVE-2025-48865 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48865">CVE-2025-48865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48938/">CVE-2025-48938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48938">CVE-2025-48938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48948/">CVE-2025-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48948">CVE-2025-48948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48949/">CVE-2025-48949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48949">CVE-2025-48949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49011/">CVE-2025-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49011">CVE-2025-49011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49136/">CVE-2025-49136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49136">CVE-2025-49136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49140/">CVE-2025-49140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49140">CVE-2025-49140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998339" comment="govulncheck-vulndb-0.0.20250612T141001-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253547" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1088" ref_url="https://www.suse.com/security/cve/CVE-2025-1088/" source="CVE"/>
		<reference ref_id="CVE-2025-3415" ref_url="https://www.suse.com/security/cve/CVE-2025-3415/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1088/">CVE-2025-1088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1088">CVE-2025-1088 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3415/">CVE-2025-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3415">CVE-2025-3415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998340" comment="grafana-11.6.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253548" version="1" class="patch">
	<metadata>
		<title>grype-0.94.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5702" ref_url="https://www.suse.com/security/cve/CVE-2025-5702/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-0.94.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5702/">CVE-2025-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5702">CVE-2025-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998341" comment="grype-0.94.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998342" comment="grype-bash-completion-0.94.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998343" comment="grype-fish-completion-0.94.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998344" comment="grype-zsh-completion-0.94.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253549" version="1" class="patch">
	<metadata>
		<title>helm-3.18.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.18.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998345" comment="helm-3.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998346" comment="helm-bash-completion-3.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998347" comment="helm-fish-completion-3.18.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998348" comment="helm-zsh-completion-3.18.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253550" version="1" class="patch">
	<metadata>
		<title>himmelblau-0.9.17+git.0.4a97692-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53013" ref_url="https://www.suse.com/security/cve/CVE-2025-53013/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-0.9.17+git.0.4a97692-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="4.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53013/">CVE-2025-53013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53013">CVE-2025-53013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998349" comment="himmelblau-0.9.17+git.0.4a97692-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998350" comment="himmelblau-qr-greeter-0.9.17+git.0.4a97692-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998351" comment="himmelblau-sshd-config-0.9.17+git.0.4a97692-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998352" comment="himmelblau-sso-0.9.17+git.0.4a97692-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998353" comment="libnss_himmelblau2-0.9.17+git.0.4a97692-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998354" comment="pam-himmelblau-0.9.17+git.0.4a97692-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253551" version="1" class="patch">
	<metadata>
		<title>icu-77.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5222" ref_url="https://www.suse.com/security/cve/CVE-2025-5222/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-77.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5222/">CVE-2025-5222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5222">CVE-2025-5222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998355" comment="icu-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998356" comment="libicu-devel-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998357" comment="libicu-devel-32bit-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998358" comment="libicu-doc-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998359" comment="libicu77-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998360" comment="libicu77-32bit-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998361" comment="libicu77-bedata-77.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998362" comment="libicu77-ledata-77.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253552" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.452-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4447" ref_url="https://www.suse.com/security/cve/CVE-2025-4447/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.452-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4447/">CVE-2025-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4447">CVE-2025-4447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998363" comment="java-1_8_0-openj9-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998364" comment="java-1_8_0-openj9-accessibility-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998365" comment="java-1_8_0-openj9-demo-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998366" comment="java-1_8_0-openj9-devel-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998367" comment="java-1_8_0-openj9-headless-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998368" comment="java-1_8_0-openj9-javadoc-1.8.0.452-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998369" comment="java-1_8_0-openj9-src-1.8.0.452-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253553" version="1" class="patch">
	<metadata>
		<title>jgit-5.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4759" ref_url="https://www.suse.com/security/cve/CVE-2023-4759/" source="CVE"/>
		<reference ref_id="CVE-2025-4949" ref_url="https://www.suse.com/security/cve/CVE-2025-4949/" source="CVE"/>
		<description>
These are all security issues fixed in the jgit-5.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4759/">CVE-2023-4759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4759">CVE-2023-4759 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4949/">CVE-2025-4949 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4949">CVE-2025-4949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998370" comment="jgit-5.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998371" comment="jgit-javadoc-5.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253554" version="1" class="patch">
	<metadata>
		<title>jq-1.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337/" source="CVE"/>
		<reference ref_id="CVE-2025-48060" ref_url="https://www.suse.com/security/cve/CVE-2025-48060/" source="CVE"/>
		<reference ref_id="CVE-2025-49014" ref_url="https://www.suse.com/security/cve/CVE-2025-49014/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48060/">CVE-2025-48060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48060">CVE-2025-48060 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49014/">CVE-2025-49014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49014">CVE-2025-49014 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998372" comment="jq-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998373" comment="libjq-devel-1.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998374" comment="libjq1-1.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253555" version="1" class="patch">
	<metadata>
		<title>kubernetes1.30-apiserver-1.30.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.30-apiserver-1.30.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998375" comment="kubernetes1.30-apiserver-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998376" comment="kubernetes1.30-client-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998377" comment="kubernetes1.30-client-bash-completion-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998378" comment="kubernetes1.30-client-common-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998379" comment="kubernetes1.30-client-fish-completion-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998380" comment="kubernetes1.30-controller-manager-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998381" comment="kubernetes1.30-kubeadm-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998382" comment="kubernetes1.30-kubelet-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998383" comment="kubernetes1.30-kubelet-common-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998384" comment="kubernetes1.30-proxy-1.30.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998385" comment="kubernetes1.30-scheduler-1.30.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253556" version="1" class="patch">
	<metadata>
		<title>kubernetes1.31-apiserver-1.31.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.31-apiserver-1.31.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998386" comment="kubernetes1.31-apiserver-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998387" comment="kubernetes1.31-client-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998388" comment="kubernetes1.31-client-bash-completion-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998389" comment="kubernetes1.31-client-common-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998390" comment="kubernetes1.31-client-fish-completion-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998391" comment="kubernetes1.31-controller-manager-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998392" comment="kubernetes1.31-kubeadm-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998393" comment="kubernetes1.31-kubelet-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998394" comment="kubernetes1.31-kubelet-common-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998395" comment="kubernetes1.31-proxy-1.31.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998396" comment="kubernetes1.31-scheduler-1.31.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253557" version="1" class="patch">
	<metadata>
		<title>kubernetes1.32-apiserver-1.32.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the kubernetes1.32-apiserver-1.32.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998397" comment="kubernetes1.32-apiserver-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998398" comment="kubernetes1.32-client-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998399" comment="kubernetes1.32-client-bash-completion-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998400" comment="kubernetes1.32-client-common-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998401" comment="kubernetes1.32-client-fish-completion-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998402" comment="kubernetes1.32-controller-manager-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998403" comment="kubernetes1.32-kubeadm-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998404" comment="kubernetes1.32-kubelet-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998405" comment="kubernetes1.32-kubelet-common-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998406" comment="kubernetes1.32-proxy-1.32.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998407" comment="kubernetes1.32-scheduler-1.32.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253558" version="1" class="patch">
	<metadata>
		<title>libbd_btrfs-devel-3.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<description>
These are all security issues fixed in the libbd_btrfs-devel-3.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998408" comment="libbd_btrfs-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998409" comment="libbd_btrfs3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998410" comment="libbd_crypto-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998411" comment="libbd_crypto3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998412" comment="libbd_dm-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998413" comment="libbd_dm3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998414" comment="libbd_fs-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998415" comment="libbd_fs3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998416" comment="libbd_loop-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998417" comment="libbd_loop3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998418" comment="libbd_lvm-dbus-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998419" comment="libbd_lvm-dbus3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998420" comment="libbd_lvm-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998421" comment="libbd_lvm3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998422" comment="libbd_mdraid-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998423" comment="libbd_mdraid3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998424" comment="libbd_mpath-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998425" comment="libbd_mpath3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998426" comment="libbd_nvme-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998427" comment="libbd_nvme3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998428" comment="libbd_part-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998429" comment="libbd_part3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998430" comment="libbd_swap-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998431" comment="libbd_swap3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998432" comment="libbd_utils-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998433" comment="libbd_utils3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998434" comment="libblockdev-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998435" comment="libblockdev-devel-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998436" comment="libblockdev3-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998437" comment="python3-libblockdev-3.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998438" comment="typelib-1_0-BlockDev-3_0-3.1.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253559" version="1" class="patch">
	<metadata>
		<title>libetebase-devel-0.5.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the libetebase-devel-0.5.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998439" comment="libetebase-devel-0.5.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998440" comment="libetebase0-0.5.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253560" version="1" class="patch">
	<metadata>
		<title>libgcrypt-devel-1.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-2236" ref_url="https://www.suse.com/security/cve/CVE-2024-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-devel-1.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2236/">CVE-2024-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998441" comment="libgcrypt-devel-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998442" comment="libgcrypt-devel-32bit-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998443" comment="libgcrypt-devel-x86-64-v3-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998444" comment="libgcrypt20-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998445" comment="libgcrypt20-32bit-1.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998446" comment="libgcrypt20-x86-64-v3-1.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253561" version="1" class="patch">
	<metadata>
		<title>libQt5Bootstrap-devel-static-32bit-5.15.17+kde122-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5455" ref_url="https://www.suse.com/security/cve/CVE-2025-5455/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Bootstrap-devel-static-32bit-5.15.17+kde122-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5455/">CVE-2025-5455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5455">CVE-2025-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998447" comment="libQt5Bootstrap-devel-static-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998448" comment="libQt5Bootstrap-devel-static-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998449" comment="libQt5Concurrent-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998450" comment="libQt5Concurrent-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998451" comment="libQt5Concurrent5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998452" comment="libQt5Concurrent5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998453" comment="libQt5Core-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998454" comment="libQt5Core-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998455" comment="libQt5Core-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998456" comment="libQt5Core5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998457" comment="libQt5Core5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998458" comment="libQt5DBus-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998459" comment="libQt5DBus-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998460" comment="libQt5DBus-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998461" comment="libQt5DBus5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998462" comment="libQt5DBus5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998463" comment="libQt5Gui-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998464" comment="libQt5Gui-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998465" comment="libQt5Gui-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998466" comment="libQt5Gui5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998467" comment="libQt5Gui5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998468" comment="libQt5KmsSupport-devel-static-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998469" comment="libQt5KmsSupport-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998470" comment="libQt5Network-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998471" comment="libQt5Network-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998472" comment="libQt5Network-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998473" comment="libQt5Network5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998474" comment="libQt5Network5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998475" comment="libQt5OpenGL-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998476" comment="libQt5OpenGL-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998477" comment="libQt5OpenGL-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998478" comment="libQt5OpenGL5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998479" comment="libQt5OpenGL5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998480" comment="libQt5OpenGLExtensions-devel-static-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998481" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998482" comment="libQt5PlatformHeaders-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998483" comment="libQt5PlatformSupport-devel-static-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998484" comment="libQt5PlatformSupport-devel-static-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998485" comment="libQt5PlatformSupport-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998486" comment="libQt5PrintSupport-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998487" comment="libQt5PrintSupport-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998488" comment="libQt5PrintSupport-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998489" comment="libQt5PrintSupport5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998490" comment="libQt5PrintSupport5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998491" comment="libQt5Sql-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998492" comment="libQt5Sql-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998493" comment="libQt5Sql-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998494" comment="libQt5Sql5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998495" comment="libQt5Sql5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998496" comment="libQt5Sql5-mysql-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998497" comment="libQt5Sql5-mysql-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998498" comment="libQt5Sql5-postgresql-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998499" comment="libQt5Sql5-postgresql-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998500" comment="libQt5Sql5-sqlite-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998501" comment="libQt5Sql5-sqlite-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998502" comment="libQt5Sql5-unixODBC-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998503" comment="libQt5Sql5-unixODBC-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998504" comment="libQt5Test-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998505" comment="libQt5Test-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998506" comment="libQt5Test-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998507" comment="libQt5Test5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998508" comment="libQt5Test5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998509" comment="libQt5Widgets-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998510" comment="libQt5Widgets-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998511" comment="libQt5Widgets-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998512" comment="libQt5Widgets5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998513" comment="libQt5Widgets5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998514" comment="libQt5Xml-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998515" comment="libQt5Xml-devel-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998516" comment="libQt5Xml5-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998517" comment="libQt5Xml5-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998518" comment="libqt5-qtbase-common-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998519" comment="libqt5-qtbase-devel-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998520" comment="libqt5-qtbase-examples-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998521" comment="libqt5-qtbase-examples-32bit-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998522" comment="libqt5-qtbase-platformtheme-gtk3-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998523" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.17+kde122-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998524" comment="libqt5-qtbase-private-headers-devel-5.15.17+kde122-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253562" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998525" comment="libsoup-3_0-0-3.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998526" comment="libsoup-3_0-0-32bit-3.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998527" comment="libsoup-devel-3.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998528" comment="libsoup-devel-32bit-3.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998529" comment="libsoup-lang-3.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998530" comment="typelib-1_0-Soup-3_0-3.6.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253563" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998531" comment="libsoup-2_4-1-2.74.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998532" comment="libsoup-2_4-1-32bit-2.74.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998533" comment="libsoup2-devel-2.74.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998534" comment="libsoup2-devel-32bit-2.74.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998535" comment="libsoup2-lang-2.74.3-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998536" comment="typelib-1_0-Soup-2_4-2.74.3-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253564" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4877" ref_url="https://www.suse.com/security/cve/CVE-2025-4877/" source="CVE"/>
		<reference ref_id="CVE-2025-4878" ref_url="https://www.suse.com/security/cve/CVE-2025-4878/" source="CVE"/>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<reference ref_id="CVE-2025-5351" ref_url="https://www.suse.com/security/cve/CVE-2025-5351/" source="CVE"/>
		<reference ref_id="CVE-2025-5372" ref_url="https://www.suse.com/security/cve/CVE-2025-5372/" source="CVE"/>
		<reference ref_id="CVE-2025-5449" ref_url="https://www.suse.com/security/cve/CVE-2025-5449/" source="CVE"/>
		<reference ref_id="CVE-2025-5987" ref_url="https://www.suse.com/security/cve/CVE-2025-5987/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4877/">CVE-2025-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4877">CVE-2025-4877 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4878/">CVE-2025-4878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4878">CVE-2025-4878 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5351/">CVE-2025-5351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5351">CVE-2025-5351 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5372/">CVE-2025-5372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5372">CVE-2025-5372 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5449/">CVE-2025-5449 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5449">CVE-2025-5449 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5987/">CVE-2025-5987 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5987">CVE-2025-5987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998537" comment="libssh-config-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998538" comment="libssh-devel-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998539" comment="libssh4-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998540" comment="libssh4-32bit-0.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253565" version="1" class="patch">
	<metadata>
		<title>libtpms-devel-0.10.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49133" ref_url="https://www.suse.com/security/cve/CVE-2025-49133/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms-devel-0.10.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-49133/">CVE-2025-49133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49133">CVE-2025-49133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998541" comment="libtpms-devel-0.10.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998542" comment="libtpms0-0.10.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253566" version="1" class="patch">
	<metadata>
		<title>ggml-devel-5699-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49847" ref_url="https://www.suse.com/security/cve/CVE-2025-49847/" source="CVE"/>
		<description>
These are all security issues fixed in the ggml-devel-5699-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49847/">CVE-2025-49847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49847">CVE-2025-49847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998543" comment="ggml-devel-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998544" comment="libggml-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998545" comment="libggml-base-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998546" comment="libggml-cpu-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998547" comment="libggml-opencl-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998548" comment="libggml-vulkan-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998549" comment="libllama-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998550" comment="libmtmd-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998551" comment="llamacpp-5699-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998552" comment="llamacpp-devel-5699-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253567" version="1" class="patch">
	<metadata>
		<title>mirrorsorcerer-0.1.3~1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the mirrorsorcerer-0.1.3~1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998553" comment="mirrorsorcerer-0.1.3~1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253568" version="1" class="patch">
	<metadata>
		<title>moarvm-2025.05-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the moarvm-2025.05-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5461">CVE-2014-5461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998554" comment="moarvm-2025.05-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998555" comment="moarvm-devel-2025.05-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253569" version="1" class="patch">
	<metadata>
		<title>nix-2.29.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46415" ref_url="https://www.suse.com/security/cve/CVE-2025-46415/" source="CVE"/>
		<reference ref_id="CVE-2025-52991" ref_url="https://www.suse.com/security/cve/CVE-2025-52991/" source="CVE"/>
		<reference ref_id="CVE-2025-52992" ref_url="https://www.suse.com/security/cve/CVE-2025-52992/" source="CVE"/>
		<reference ref_id="CVE-2025-52993" ref_url="https://www.suse.com/security/cve/CVE-2025-52993/" source="CVE"/>
		<description>
These are all security issues fixed in the nix-2.29.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46415/">CVE-2025-46415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46415">CVE-2025-46415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52991/">CVE-2025-52991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52991">CVE-2025-52991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52992/">CVE-2025-52992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52992">CVE-2025-52992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52993/">CVE-2025-52993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52993">CVE-2025-52993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998556" comment="nix-2.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998557" comment="nix-bash-completion-2.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998558" comment="nix-devel-2.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998559" comment="nix-doc-2.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998560" comment="nix-fish-completion-2.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998561" comment="nix-zsh-completion-2.29.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253570" version="1" class="patch">
	<metadata>
		<title>nodejs-electron-35.6.0-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5419" ref_url="https://www.suse.com/security/cve/CVE-2025-5419/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs-electron-35.6.0-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5419/">CVE-2025-5419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5419">CVE-2025-5419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998562" comment="nodejs-electron-35.6.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998563" comment="nodejs-electron-devel-35.6.0-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998564" comment="nodejs-electron-doc-35.6.0-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253571" version="1" class="patch">
	<metadata>
		<title>corepack22-22.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998565" comment="corepack22-22.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998566" comment="nodejs22-22.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998567" comment="nodejs22-devel-22.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998568" comment="nodejs22-docs-22.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998569" comment="npm22-22.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253572" version="1" class="patch">
	<metadata>
		<title>nova-3.11.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<description>
These are all security issues fixed in the nova-3.11.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998570" comment="nova-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998571" comment="nova-bash-completion-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998572" comment="nova-fish-completion-3.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998573" comment="nova-zsh-completion-3.11.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253573" version="1" class="patch">
	<metadata>
		<title>oci-cli-3.61.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53899" ref_url="https://www.suse.com/security/cve/CVE-2024-53899/" source="CVE"/>
		<description>
These are all security issues fixed in the oci-cli-3.61.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53899/">CVE-2024-53899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53899">CVE-2024-53899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998574" comment="oci-cli-3.61.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253574" version="1" class="patch">
	<metadata>
		<title>opa-1.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<description>
These are all security issues fixed in the opa-1.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998575" comment="opa-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998576" comment="opa-bash-completion-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998577" comment="opa-fish-completion-1.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998578" comment="opa-zsh-completion-1.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253575" version="1" class="patch">
	<metadata>
		<title>openbao-2.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4656" ref_url="https://www.suse.com/security/cve/CVE-2025-4656/" source="CVE"/>
		<reference ref_id="CVE-2025-52893" ref_url="https://www.suse.com/security/cve/CVE-2025-52893/" source="CVE"/>
		<reference ref_id="CVE-2025-52894" ref_url="https://www.suse.com/security/cve/CVE-2025-52894/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4656/">CVE-2025-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4656">CVE-2025-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52893/">CVE-2025-52893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52893">CVE-2025-52893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52894/">CVE-2025-52894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52894">CVE-2025-52894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998579" comment="openbao-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998580" comment="openbao-agent-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998581" comment="openbao-cassandra-database-plugin-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998582" comment="openbao-influxdb-database-plugin-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998583" comment="openbao-mysql-database-plugin-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998584" comment="openbao-mysql-legacy-database-plugin-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998585" comment="openbao-postgresql-database-plugin-2.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998586" comment="openbao-server-2.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253576" version="1" class="patch">
	<metadata>
		<title>ovmf-202505-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38797" ref_url="https://www.suse.com/security/cve/CVE-2024-38797/" source="CVE"/>
		<reference ref_id="CVE-2024-38805" ref_url="https://www.suse.com/security/cve/CVE-2024-38805/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202505-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38797/">CVE-2024-38797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38797">CVE-2024-38797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38805/">CVE-2024-38805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38805">CVE-2024-38805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998587" comment="ovmf-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998588" comment="ovmf-tools-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998589" comment="qemu-ovmf-ia32-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998590" comment="qemu-ovmf-x86_64-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998591" comment="qemu-ovmf-x86_64-debug-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998592" comment="qemu-uefi-aarch32-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998593" comment="qemu-uefi-aarch64-202505-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998594" comment="qemu-uefi-riscv64-202505-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253577" version="1" class="patch">
	<metadata>
		<title>pam-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998595" comment="pam-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998596" comment="pam-32bit-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998597" comment="pam-devel-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998598" comment="pam-devel-32bit-1.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253578" version="1" class="patch">
	<metadata>
		<title>pam_pkcs11-0.6.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_pkcs11-0.6.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998599" comment="pam_pkcs11-0.6.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998600" comment="pam_pkcs11-devel-doc-0.6.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253579" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.40.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.40.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998601" comment="perl-5.40.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998602" comment="perl-32bit-5.40.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998603" comment="perl-base-5.40.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998604" comment="perl-base-32bit-5.40.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998605" comment="perl-doc-5.40.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253580" version="1" class="patch">
	<metadata>
		<title>perl-CryptX-0.87.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40914" ref_url="https://www.suse.com/security/cve/CVE-2025-40914/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-CryptX-0.87.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-40914/">CVE-2025-40914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40914">CVE-2025-40914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998606" comment="perl-CryptX-0.87.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253581" version="1" class="patch">
	<metadata>
		<title>perl-File-Find-Rule-0.350.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-File-Find-Rule-0.350.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998607" comment="perl-File-Find-Rule-0.350.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253582" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.904.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40908" ref_url="https://www.suse.com/security/cve/CVE-2025-40908/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.904.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40908/">CVE-2025-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40908">CVE-2025-40908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998608" comment="perl-YAML-LibYAML-0.904.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253583" version="1" class="patch">
	<metadata>
		<title>podman-5.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998609" comment="podman-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998610" comment="podman-docker-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998611" comment="podman-remote-5.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998612" comment="podmansh-5.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253584" version="1" class="patch">
	<metadata>
		<title>polaris-9.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<description>
These are all security issues fixed in the polaris-9.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998613" comment="polaris-9.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998614" comment="polaris-bash-completion-9.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998615" comment="polaris-fish-completion-9.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998616" comment="polaris-zsh-completion-9.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253585" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.7.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49146" ref_url="https://www.suse.com/security/cve/CVE-2025-49146/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.7.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49146/">CVE-2025-49146 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49146">CVE-2025-49146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998617" comment="postgresql-jdbc-42.7.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998618" comment="postgresql-jdbc-javadoc-42.7.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253586" version="1" class="patch">
	<metadata>
		<title>libprotobuf-lite31_1_0-31.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-lite31_1_0-31.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998619" comment="libprotobuf-lite31_1_0-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998620" comment="libprotobuf-lite31_1_0-32bit-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998621" comment="libprotobuf31_1_0-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998622" comment="libprotobuf31_1_0-32bit-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998623" comment="libprotoc31_1_0-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998624" comment="libprotoc31_1_0-32bit-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998625" comment="libutf8_range-31_1_0-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998626" comment="libutf8_range-31_1_0-32bit-31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998627" comment="protobuf-devel-31.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253587" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.51-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-48208" ref_url="https://www.suse.com/security/cve/CVE-2024-48208/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.51-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48208/">CVE-2024-48208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48208">CVE-2024-48208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998628" comment="pure-ftpd-1.0.51-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253588" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48432" ref_url="https://www.suse.com/security/cve/CVE-2025-48432/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48432/">CVE-2025-48432 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48432">CVE-2025-48432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998629" comment="python311-Django-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998630" comment="python312-Django-5.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998631" comment="python313-Django-5.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253589" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48432" ref_url="https://www.suse.com/security/cve/CVE-2025-48432/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48432/">CVE-2025-48432 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48432">CVE-2025-48432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998632" comment="python311-Django4-4.2.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998633" comment="python312-Django4-4.2.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998634" comment="python313-Django4-4.2.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253590" version="1" class="patch">
	<metadata>
		<title>jupyter-bqplot-jupyterlab-0.5.44-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-bqplot-jupyterlab-0.5.44-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998635" comment="jupyter-bqplot-jupyterlab-0.5.44-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998636" comment="jupyter-bqplot-notebook-0.5.44-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998637" comment="python311-bqplot-0.12.45-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253591" version="1" class="patch">
	<metadata>
		<title>python-furo-doc-2024.8.6-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the python-furo-doc-2024.8.6-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998638" comment="python-furo-doc-2024.8.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998639" comment="python311-furo-2024.8.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998640" comment="python312-furo-2024.8.6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998641" comment="python313-furo-2024.8.6-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253592" version="1" class="patch">
	<metadata>
		<title>jupyter-matplotlib-0.11.4-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-matplotlib-0.11.4-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998642" comment="jupyter-matplotlib-0.11.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998643" comment="jupyter-matplotlib-jupyterlab-0.11.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998644" comment="python311-ipympl-0.9.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998645" comment="python312-ipympl-0.9.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998646" comment="python313-ipympl-0.9.4-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253593" version="1" class="patch">
	<metadata>
		<title>python311-jupyter-core-5.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30167" ref_url="https://www.suse.com/security/cve/CVE-2025-30167/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jupyter-core-5.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30167/">CVE-2025-30167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30167">CVE-2025-30167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998647" comment="python311-jupyter-core-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998648" comment="python312-jupyter-core-5.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998649" comment="python313-jupyter-core-5.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253594" version="1" class="patch">
	<metadata>
		<title>python311-jupyter-ydoc-3.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jupyter-ydoc-3.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998650" comment="python311-jupyter-ydoc-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998651" comment="python312-jupyter-ydoc-3.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998652" comment="python313-jupyter-ydoc-3.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253595" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-templates-0.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998653" comment="jupyter-jupyterlab-templates-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998654" comment="python311-jupyterlab-templates-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998655" comment="python312-jupyterlab-templates-0.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998656" comment="python313-jupyterlab-templates-0.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253596" version="1" class="patch">
	<metadata>
		<title>jupyter-nbclassic-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbclassic-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998657" comment="jupyter-nbclassic-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998658" comment="python311-nbclassic-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998659" comment="python312-nbclassic-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998660" comment="python313-nbclassic-1.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253597" version="1" class="patch">
	<metadata>
		<title>jupyter-nbdime-7.0.2-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbdime-7.0.2-20.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998661" comment="jupyter-nbdime-7.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998662" comment="jupyter-nbdime-jupyterlab-3.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998663" comment="python311-nbdime-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998664" comment="python311-nbdime-git-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998665" comment="python311-nbdime-hg-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998666" comment="python312-nbdime-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998667" comment="python312-nbdime-git-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998668" comment="python312-nbdime-hg-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998669" comment="python313-nbdime-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998670" comment="python313-nbdime-git-4.0.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998671" comment="python313-nbdime-hg-4.0.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253598" version="1" class="patch">
	<metadata>
		<title>jupyter-panel-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-panel-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998672" comment="jupyter-panel-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998673" comment="python311-panel-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998674" comment="python312-panel-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998675" comment="python313-panel-1.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253599" version="1" class="patch">
	<metadata>
		<title>jupyter-plotly-6.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-plotly-6.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998676" comment="jupyter-plotly-6.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998677" comment="python311-plotly-6.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998678" comment="python312-plotly-6.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998679" comment="python313-plotly-6.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253600" version="1" class="patch">
	<metadata>
		<title>python311-pydata-sphinx-theme-0.16.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pydata-sphinx-theme-0.16.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998680" comment="python311-pydata-sphinx-theme-0.16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998681" comment="python312-pydata-sphinx-theme-0.16.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998682" comment="python313-pydata-sphinx-theme-0.16.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253601" version="1" class="patch">
	<metadata>
		<title>python311-pytest-html-4.1.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<reference ref_id="CVE-2025-6545" ref_url="https://www.suse.com/security/cve/CVE-2025-6545/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pytest-html-4.1.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6545/">CVE-2025-6545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6545">CVE-2025-6545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998683" comment="python311-pytest-html-4.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998684" comment="python312-pytest-html-4.1.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998685" comment="python313-pytest-html-4.1.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253602" version="1" class="patch">
	<metadata>
		<title>python311-requests-2.32.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-requests-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998686" comment="python311-requests-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998687" comment="python312-requests-2.32.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998688" comment="python313-requests-2.32.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253603" version="1" class="patch">
	<metadata>
		<title>python311-rfc3161-client-1.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52556" ref_url="https://www.suse.com/security/cve/CVE-2025-52556/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-rfc3161-client-1.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52556/">CVE-2025-52556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52556">CVE-2025-52556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998689" comment="python311-rfc3161-client-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998690" comment="python312-rfc3161-client-1.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998691" comment="python313-rfc3161-client-1.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253604" version="1" class="patch">
	<metadata>
		<title>python311-urllib3-2.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50181" ref_url="https://www.suse.com/security/cve/CVE-2025-50181/" source="CVE"/>
		<reference ref_id="CVE-2025-50182" ref_url="https://www.suse.com/security/cve/CVE-2025-50182/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-urllib3-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50181/">CVE-2025-50181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50181">CVE-2025-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50182/">CVE-2025-50182 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50182">CVE-2025-50182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998692" comment="python311-urllib3-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998693" comment="python312-urllib3-2.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998694" comment="python313-urllib3-2.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253605" version="1" class="patch">
	<metadata>
		<title>python311-urllib3_1-1.26.20-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50181" ref_url="https://www.suse.com/security/cve/CVE-2025-50181/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-urllib3_1-1.26.20-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50181/">CVE-2025-50181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50181">CVE-2025-50181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998695" comment="python311-urllib3_1-1.26.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998696" comment="python312-urllib3_1-1.26.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998697" comment="python313-urllib3_1-1.26.20-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253606" version="1" class="patch">
	<metadata>
		<title>python310-3.10.18-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.18-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998698" comment="python310-3.10.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998699" comment="python310-32bit-3.10.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998700" comment="python310-curses-3.10.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998701" comment="python310-dbm-3.10.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998702" comment="python310-idle-3.10.18-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998703" comment="python310-tk-3.10.18-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253607" version="1" class="patch">
	<metadata>
		<title>python311-3.11.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998704" comment="python311-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998705" comment="python311-32bit-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998706" comment="python311-curses-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998707" comment="python311-dbm-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998708" comment="python311-idle-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998709" comment="python311-tk-3.11.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998710" comment="python311-x86-64-v3-3.11.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253608" version="1" class="patch">
	<metadata>
		<title>python312-3.12.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998711" comment="python312-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998712" comment="python312-32bit-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998713" comment="python312-curses-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998714" comment="python312-dbm-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998715" comment="python312-idle-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998716" comment="python312-tk-3.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998717" comment="python312-x86-64-v3-3.12.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253609" version="1" class="patch">
	<metadata>
		<title>python313-3.13.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998718" comment="python313-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998719" comment="python313-32bit-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998720" comment="python313-curses-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998721" comment="python313-dbm-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998722" comment="python313-idle-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998723" comment="python313-tk-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998724" comment="python313-x86-64-v3-3.13.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253610" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0~b3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0~b3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998725" comment="python314-3.14.0~b3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998726" comment="python314-curses-3.14.0~b3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998727" comment="python314-dbm-3.14.0~b3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998728" comment="python314-idle-3.14.0~b3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998729" comment="python314-tk-3.14.0~b3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998730" comment="python314-x86-64-v3-3.14.0~b3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253611" version="1" class="patch">
	<metadata>
		<title>python39-3.9.23-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.23-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998731" comment="python39-3.9.23-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998732" comment="python39-curses-3.9.23-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998733" comment="python39-dbm-3.9.23-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998734" comment="python39-idle-3.9.23-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998735" comment="python39-tk-3.9.23-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253612" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.13.7-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30219" ref_url="https://www.suse.com/security/cve/CVE-2025-30219/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.13.7-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30219/">CVE-2025-30219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30219">CVE-2025-30219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998736" comment="erlang-rabbitmq-client-3.13.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998737" comment="rabbitmq-server-3.13.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998738" comment="rabbitmq-server-bash-completion-3.13.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998739" comment="rabbitmq-server-plugins-3.13.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998740" comment="rabbitmq-server-zsh-completion-3.13.7-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253613" version="1" class="patch">
	<metadata>
		<title>radare2-5.9.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1744" ref_url="https://www.suse.com/security/cve/CVE-2025-1744/" source="CVE"/>
		<reference ref_id="CVE-2025-1864" ref_url="https://www.suse.com/security/cve/CVE-2025-1864/" source="CVE"/>
		<reference ref_id="CVE-2025-5641" ref_url="https://www.suse.com/security/cve/CVE-2025-5641/" source="CVE"/>
		<description>
These are all security issues fixed in the radare2-5.9.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1744/">CVE-2025-1744 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1744">CVE-2025-1744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1864/">CVE-2025-1864 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1864">CVE-2025-1864 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5641/">CVE-2025-5641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5641">CVE-2025-5641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998741" comment="radare2-5.9.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998742" comment="radare2-devel-5.9.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998743" comment="radare2-zsh-completion-5.9.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253614" version="1" class="patch">
	<metadata>
		<title>redis-8.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<reference ref_id="CVE-2024-51741" ref_url="https://www.suse.com/security/cve/CVE-2024-51741/" source="CVE"/>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<reference ref_id="CVE-2025-27151" ref_url="https://www.suse.com/security/cve/CVE-2025-27151/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-8.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51741/">CVE-2024-51741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51741">CVE-2024-51741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-27151/">CVE-2025-27151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27151">CVE-2025-27151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998744" comment="redis-8.0.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253615" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.7+70-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.7+70-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998745" comment="keylime-ima-policy-0.2.7+70-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998746" comment="rust-keylime-0.2.7+70-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253616" version="1" class="patch">
	<metadata>
		<title>python311-salt-3006.0-41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-38822" ref_url="https://www.suse.com/security/cve/CVE-2024-38822/" source="CVE"/>
		<reference ref_id="CVE-2024-38823" ref_url="https://www.suse.com/security/cve/CVE-2024-38823/" source="CVE"/>
		<reference ref_id="CVE-2024-38824" ref_url="https://www.suse.com/security/cve/CVE-2024-38824/" source="CVE"/>
		<reference ref_id="CVE-2024-38825" ref_url="https://www.suse.com/security/cve/CVE-2024-38825/" source="CVE"/>
		<reference ref_id="CVE-2025-22236" ref_url="https://www.suse.com/security/cve/CVE-2025-22236/" source="CVE"/>
		<reference ref_id="CVE-2025-22237" ref_url="https://www.suse.com/security/cve/CVE-2025-22237/" source="CVE"/>
		<reference ref_id="CVE-2025-22238" ref_url="https://www.suse.com/security/cve/CVE-2025-22238/" source="CVE"/>
		<reference ref_id="CVE-2025-22239" ref_url="https://www.suse.com/security/cve/CVE-2025-22239/" source="CVE"/>
		<reference ref_id="CVE-2025-22240" ref_url="https://www.suse.com/security/cve/CVE-2025-22240/" source="CVE"/>
		<reference ref_id="CVE-2025-22241" ref_url="https://www.suse.com/security/cve/CVE-2025-22241/" source="CVE"/>
		<reference ref_id="CVE-2025-22242" ref_url="https://www.suse.com/security/cve/CVE-2025-22242/" source="CVE"/>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-salt-3006.0-41.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38822/">CVE-2024-38822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38822">CVE-2024-38822 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38823/">CVE-2024-38823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38823">CVE-2024-38823 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38824/">CVE-2024-38824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38824">CVE-2024-38824 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38825/">CVE-2024-38825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38825">CVE-2024-38825 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22236/">CVE-2025-22236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22236">CVE-2025-22236 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22237/">CVE-2025-22237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22237">CVE-2025-22237 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22238/">CVE-2025-22238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22238">CVE-2025-22238 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22239/">CVE-2025-22239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22239">CVE-2025-22239 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22240/">CVE-2025-22240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22240">CVE-2025-22240 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22241/">CVE-2025-22241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22241">CVE-2025-22241 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22242/">CVE-2025-22242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22242">CVE-2025-22242 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998747" comment="python311-salt-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998748" comment="python312-salt-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998749" comment="python313-salt-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998750" comment="salt-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998751" comment="salt-api-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998752" comment="salt-bash-completion-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998753" comment="salt-cloud-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998754" comment="salt-doc-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998755" comment="salt-fish-completion-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998756" comment="salt-master-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998757" comment="salt-minion-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998758" comment="salt-proxy-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998759" comment="salt-ssh-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998760" comment="salt-standalone-formulas-configuration-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998761" comment="salt-syndic-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998762" comment="salt-transactional-update-3006.0-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998763" comment="salt-zsh-completion-3006.0-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253617" version="1" class="patch">
	<metadata>
		<title>ctdb-4.22.2+git.396.c752843dcf4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0620" ref_url="https://www.suse.com/security/cve/CVE-2025-0620/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.22.2+git.396.c752843dcf4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0620/">CVE-2025-0620 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0620">CVE-2025-0620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998764" comment="ctdb-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998765" comment="ctdb-pcp-pmda-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998766" comment="ldb-tools-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998767" comment="libldb-devel-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998768" comment="libldb2-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998769" comment="libldb2-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998770" comment="python3-ldb-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998771" comment="python3-ldb-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998772" comment="samba-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998773" comment="samba-ad-dc-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998774" comment="samba-ad-dc-libs-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998775" comment="samba-ad-dc-libs-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998776" comment="samba-ceph-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998777" comment="samba-client-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998778" comment="samba-client-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998779" comment="samba-client-libs-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998780" comment="samba-client-libs-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998781" comment="samba-dcerpc-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998782" comment="samba-devel-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998783" comment="samba-devel-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998784" comment="samba-doc-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998785" comment="samba-dsdb-modules-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998786" comment="samba-gpupdate-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998787" comment="samba-ldb-ldap-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998788" comment="samba-libs-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998789" comment="samba-libs-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998790" comment="samba-libs-python3-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998791" comment="samba-libs-python3-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998792" comment="samba-python3-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998793" comment="samba-test-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998794" comment="samba-tool-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998795" comment="samba-winbind-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998796" comment="samba-winbind-libs-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998797" comment="samba-winbind-libs-32bit-4.22.2+git.396.c752843dcf4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253618" version="1" class="patch">
	<metadata>
		<title>libspdlog1_15-1.15.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6140" ref_url="https://www.suse.com/security/cve/CVE-2025-6140/" source="CVE"/>
		<description>
These are all security issues fixed in the libspdlog1_15-1.15.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6140/">CVE-2025-6140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6140">CVE-2025-6140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998798" comment="libspdlog1_15-1.15.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998799" comment="libspdlog1_15-32bit-1.15.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998800" comment="spdlog-devel-1.15.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253619" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.17p1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<reference ref_id="CVE-2025-32463" ref_url="https://www.suse.com/security/cve/CVE-2025-32463/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.17p1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32463/">CVE-2025-32463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32463">CVE-2025-32463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998801" comment="sudo-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998802" comment="sudo-devel-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998803" comment="sudo-plugin-python-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998804" comment="sudo-policy-sudo-auth-self-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998805" comment="sudo-policy-wheel-auth-self-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998806" comment="sudo-test-1.9.17p1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998807" comment="system-group-sudo-1.9.17p1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253620" version="1" class="patch">
	<metadata>
		<title>libsystemd0-257.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4598" ref_url="https://www.suse.com/security/cve/CVE-2025-4598/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-257.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4598/">CVE-2025-4598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4598">CVE-2025-4598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998808" comment="libsystemd0-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998809" comment="libsystemd0-32bit-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998810" comment="libudev1-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998811" comment="libudev1-32bit-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998812" comment="systemd-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998813" comment="systemd-32bit-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998814" comment="systemd-boot-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998815" comment="systemd-container-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998816" comment="systemd-devel-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998817" comment="systemd-devel-32bit-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998818" comment="systemd-doc-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998819" comment="systemd-experimental-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998820" comment="systemd-homed-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998821" comment="systemd-journal-remote-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998822" comment="systemd-lang-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998823" comment="systemd-networkd-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998824" comment="systemd-portable-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998825" comment="systemd-resolved-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998826" comment="systemd-sysvcompat-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998827" comment="systemd-testsuite-257.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998828" comment="udev-257.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253621" version="1" class="patch">
	<metadata>
		<title>teleport-17.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49825" ref_url="https://www.suse.com/security/cve/CVE-2025-49825/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49825/">CVE-2025-49825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49825">CVE-2025-49825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998829" comment="teleport-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998830" comment="teleport-bash-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998831" comment="teleport-fdpass-teleport-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998832" comment="teleport-tbot-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998833" comment="teleport-tbot-bash-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998834" comment="teleport-tbot-zsh-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998835" comment="teleport-tctl-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998836" comment="teleport-tctl-bash-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998837" comment="teleport-tctl-zsh-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998838" comment="teleport-tsh-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998839" comment="teleport-tsh-bash-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998840" comment="teleport-tsh-zsh-completion-17.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998841" comment="teleport-zsh-completion-17.5.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253622" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.106-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.106-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998842" comment="tomcat-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998843" comment="tomcat-admin-webapps-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998844" comment="tomcat-docs-webapp-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998845" comment="tomcat-el-3_0-api-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998846" comment="tomcat-embed-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998847" comment="tomcat-javadoc-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998848" comment="tomcat-jsp-2_3-api-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998849" comment="tomcat-jsvc-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998850" comment="tomcat-lib-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998851" comment="tomcat-servlet-4_0-api-9.0.106-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998852" comment="tomcat-webapps-9.0.106-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253623" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.42-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.42-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998853" comment="tomcat10-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998854" comment="tomcat10-admin-webapps-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998855" comment="tomcat10-doc-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998856" comment="tomcat10-docs-webapp-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998857" comment="tomcat10-el-5_0-api-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998858" comment="tomcat10-embed-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998859" comment="tomcat10-jsp-3_1-api-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998860" comment="tomcat10-jsvc-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998861" comment="tomcat10-lib-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998862" comment="tomcat10-servlet-6_0-api-10.1.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998863" comment="tomcat10-webapps-10.1.42-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253624" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998864" comment="tomcat11-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998865" comment="tomcat11-admin-webapps-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998866" comment="tomcat11-doc-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998867" comment="tomcat11-docs-webapp-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998868" comment="tomcat11-el-6_0-api-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998869" comment="tomcat11-embed-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998870" comment="tomcat11-jsp-4_0-api-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998871" comment="tomcat11-jsvc-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998872" comment="tomcat11-lib-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998873" comment="tomcat11-servlet-6_1-api-11.0.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998874" comment="tomcat11-webapps-11.0.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253625" version="1" class="patch">
	<metadata>
		<title>traefik-3.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-4533" ref_url="https://www.suse.com/security/cve/CVE-2024-4533/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-47952" ref_url="https://www.suse.com/security/cve/CVE-2025-47952/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4533/">CVE-2024-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4533">CVE-2024-4533 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47952/">CVE-2025-47952 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47952">CVE-2025-47952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998875" comment="traefik-3.4.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253626" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-32431" ref_url="https://www.suse.com/security/cve/CVE-2025-32431/" source="CVE"/>
		<reference ref_id="CVE-2025-47952" ref_url="https://www.suse.com/security/cve/CVE-2025-47952/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32431/">CVE-2025-32431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32431">CVE-2025-32431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47952/">CVE-2025-47952 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47952">CVE-2025-47952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998876" comment="traefik2-2.11.26-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253627" version="1" class="patch">
	<metadata>
		<title>valkey-8.1.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27151" ref_url="https://www.suse.com/security/cve/CVE-2025-27151/" source="CVE"/>
		<reference ref_id="CVE-2025-49112" ref_url="https://www.suse.com/security/cve/CVE-2025-49112/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.1.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-27151/">CVE-2025-27151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27151">CVE-2025-27151 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49112/">CVE-2025-49112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49112">CVE-2025-49112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998877" comment="valkey-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998878" comment="valkey-compat-redis-8.1.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998879" comment="valkey-devel-8.1.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253628" version="1" class="patch">
	<metadata>
		<title>velociraptor-0.7.0.4.git163.87ee3570-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-27152" ref_url="https://www.suse.com/security/cve/CVE-2025-27152/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the velociraptor-0.7.0.4.git163.87ee3570-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27152/">CVE-2025-27152 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27152">CVE-2025-27152 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998880" comment="velociraptor-0.7.0.4.git163.87ee3570-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253629" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5601" ref_url="https://www.suse.com/security/cve/CVE-2025-5601/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-5601/">CVE-2025-5601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5601">CVE-2025-5601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998881" comment="libwireshark18-4.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998882" comment="libwiretap15-4.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998883" comment="libwsutil16-4.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998884" comment="wireshark-4.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998885" comment="wireshark-devel-4.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998886" comment="wireshark-ui-qt-4.4.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253630" version="1" class="patch">
	<metadata>
		<title>libwx_gtk2u_adv-suse16_0_0-3.2.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-58249" ref_url="https://www.suse.com/security/cve/CVE-2024-58249/" source="CVE"/>
		<description>
These are all security issues fixed in the libwx_gtk2u_adv-suse16_0_0-3.2.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58249/">CVE-2024-58249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58249">CVE-2024-58249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998887" comment="libwx_gtk2u_adv-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998888" comment="libwx_gtk2u_aui-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998889" comment="libwx_gtk2u_core-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998890" comment="libwx_gtk2u_gl-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998891" comment="libwx_gtk2u_html-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998892" comment="libwx_gtk2u_media-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998893" comment="libwx_gtk2u_propgrid-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998894" comment="libwx_gtk2u_qa-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998895" comment="libwx_gtk2u_ribbon-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998896" comment="libwx_gtk2u_richtext-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998897" comment="libwx_gtk2u_stc-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998898" comment="libwx_gtk2u_xrc-suse16_0_0-3.2.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998899" comment="wxWidgets-3_2-devel-3.2.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253631" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.15-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49177" ref_url="https://www.suse.com/security/cve/CVE-2025-49177/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.15-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49177/">CVE-2025-49177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49177">CVE-2025-49177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998900" comment="xorg-x11-server-21.1.15-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998901" comment="xorg-x11-server-Xvfb-21.1.15-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998902" comment="xorg-x11-server-extra-21.1.15-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998903" comment="xorg-x11-server-sdk-21.1.15-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998904" comment="xorg-x11-server-source-21.1.15-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998905" comment="xorg-x11-server-wrapper-21.1.15-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253632" version="1" class="patch">
	<metadata>
		<title>xwayland-24.1.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49177" ref_url="https://www.suse.com/security/cve/CVE-2025-49177/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-24.1.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2025-07-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49177/">CVE-2025-49177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49177">CVE-2025-49177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998906" comment="xwayland-24.1.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998907" comment="xwayland-devel-24.1.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253633" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-128.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-128.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-06"/>
	<updated date="2025-07-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999003" comment="MozillaThunderbird-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999004" comment="MozillaThunderbird-openpgp-librnp-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999005" comment="MozillaThunderbird-translations-common-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999006" comment="MozillaThunderbird-translations-other-128.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253634" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52891" ref_url="https://www.suse.com/security/cve/CVE-2025-52891/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-06"/>
	<updated date="2025-07-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52891/">CVE-2025-52891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52891">CVE-2025-52891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999007" comment="apache2-mod_security2-2.9.11-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253635" version="1" class="patch">
	<metadata>
		<title>dpkg-1.22.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6297" ref_url="https://www.suse.com/security/cve/CVE-2025-6297/" source="CVE"/>
		<description>
These are all security issues fixed in the dpkg-1.22.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-06"/>
	<updated date="2025-07-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6297/">CVE-2025-6297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6297">CVE-2025-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999008" comment="dpkg-1.22.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999009" comment="dpkg-devel-1.22.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999010" comment="dpkg-lang-1.22.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253636" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-06"/>
	<updated date="2025-07-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999011" comment="libmozjs-128-0-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999012" comment="mozjs128-128.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999013" comment="mozjs128-devel-128.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253637" version="1" class="patch">
	<metadata>
		<title>python311-Pillow-11.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48379" ref_url="https://www.suse.com/security/cve/CVE-2025-48379/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Pillow-11.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-06"/>
	<updated date="2025-07-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48379/">CVE-2025-48379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48379">CVE-2025-48379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999014" comment="python311-Pillow-11.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999015" comment="python311-Pillow-tk-11.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999016" comment="python312-Pillow-11.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999017" comment="python312-Pillow-tk-11.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999018" comment="python313-Pillow-11.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999019" comment="python313-Pillow-tk-11.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253638" version="1" class="patch">
	<metadata>
		<title>incus-6.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52889" ref_url="https://www.suse.com/security/cve/CVE-2025-52889/" source="CVE"/>
		<reference ref_id="CVE-2025-52890" ref_url="https://www.suse.com/security/cve/CVE-2025-52890/" source="CVE"/>
		<description>
These are all security issues fixed in the incus-6.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-07"/>
	<updated date="2025-07-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52889/">CVE-2025-52889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52889">CVE-2025-52889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52890/">CVE-2025-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52890">CVE-2025-52890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999175" comment="incus-6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999176" comment="incus-bash-completion-6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999177" comment="incus-fish-completion-6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999178" comment="incus-tools-6.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999179" comment="incus-zsh-completion-6.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253639" version="1" class="patch">
	<metadata>
		<title>redis-8.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-8.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-07"/>
	<updated date="2025-07-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999180" comment="redis-8.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253640" version="1" class="patch">
	<metadata>
		<title>djvulibre-3.5.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53367" ref_url="https://www.suse.com/security/cve/CVE-2025-53367/" source="CVE"/>
		<description>
These are all security issues fixed in the djvulibre-3.5.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53367/">CVE-2025-53367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53367">CVE-2025-53367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999304" comment="djvulibre-3.5.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999305" comment="djvulibre-doc-3.5.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999306" comment="libdjvulibre-devel-3.5.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999307" comment="libdjvulibre21-3.5.29-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253641" version="1" class="patch">
	<metadata>
		<title>avif-tools-1.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48174" ref_url="https://www.suse.com/security/cve/CVE-2025-48174/" source="CVE"/>
		<description>
These are all security issues fixed in the avif-tools-1.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48174/">CVE-2025-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48174">CVE-2025-48174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999308" comment="avif-tools-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999309" comment="gdk-pixbuf-loader-libavif-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999310" comment="libavif-devel-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999311" comment="libavif16-1.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999312" comment="libavif16-32bit-1.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253642" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.13.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49795" ref_url="https://www.suse.com/security/cve/CVE-2025-49795/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<reference ref_id="CVE-2025-6170" ref_url="https://www.suse.com/security/cve/CVE-2025-6170/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.13.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49795/">CVE-2025-49795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49795">CVE-2025-49795 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6170/">CVE-2025-6170 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6170">CVE-2025-6170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999313" comment="libxml2-2-2.13.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999314" comment="libxml2-2-32bit-2.13.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999315" comment="libxml2-devel-2.13.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999316" comment="libxml2-devel-32bit-2.13.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999317" comment="libxml2-doc-2.13.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999318" comment="libxml2-tools-2.13.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253643" version="1" class="patch">
	<metadata>
		<title>libPocoActiveRecord112-1.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-52389" ref_url="https://www.suse.com/security/cve/CVE-2023-52389/" source="CVE"/>
		<reference ref_id="CVE-2025-6375" ref_url="https://www.suse.com/security/cve/CVE-2025-6375/" source="CVE"/>
		<description>
These are all security issues fixed in the libPocoActiveRecord112-1.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52389/">CVE-2023-52389 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52389">CVE-2023-52389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6375/">CVE-2025-6375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6375">CVE-2025-6375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999319" comment="libPocoActiveRecord112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999320" comment="libPocoCppParser112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999321" comment="libPocoCrypto112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999322" comment="libPocoData112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999323" comment="libPocoDataMySQL112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999324" comment="libPocoDataODBC112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999325" comment="libPocoDataPostgreSQL112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999326" comment="libPocoDataSQLite112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999327" comment="libPocoEncodings112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999328" comment="libPocoFoundation112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999329" comment="libPocoJSON112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999330" comment="libPocoJWT112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999331" comment="libPocoMongoDB112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999332" comment="libPocoNet112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999333" comment="libPocoNetSSL112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999334" comment="libPocoPDF112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999335" comment="libPocoPrometheus112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999336" comment="libPocoRedis112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999337" comment="libPocoUtil112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999338" comment="libPocoXML112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999339" comment="libPocoZip112-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999340" comment="poco-cpspc-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999341" comment="poco-devel-1.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253644" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.06.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52886" ref_url="https://www.suse.com/security/cve/CVE-2025-52886/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.06.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52886/">CVE-2025-52886 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52886">CVE-2025-52886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999342" comment="libpoppler-cpp2-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999343" comment="libpoppler-cpp2-32bit-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999344" comment="libpoppler-devel-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999345" comment="libpoppler-glib-devel-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999346" comment="libpoppler-glib8-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999347" comment="libpoppler-glib8-32bit-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999348" comment="libpoppler150-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999349" comment="libpoppler150-32bit-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999350" comment="poppler-tools-25.06.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999351" comment="typelib-1_0-Poppler-0_18-25.06.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253645" version="1" class="patch">
	<metadata>
		<title>python311-pycares-4.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48945" ref_url="https://www.suse.com/security/cve/CVE-2025-48945/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pycares-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-08"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48945/">CVE-2025-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48945">CVE-2025-48945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999352" comment="python311-pycares-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999353" comment="python312-pycares-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999354" comment="python313-pycares-4.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253646" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-140.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6427" ref_url="https://www.suse.com/security/cve/CVE-2025-6427/" source="CVE"/>
		<reference ref_id="CVE-2025-6428" ref_url="https://www.suse.com/security/cve/CVE-2025-6428/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<reference ref_id="CVE-2025-6431" ref_url="https://www.suse.com/security/cve/CVE-2025-6431/" source="CVE"/>
		<reference ref_id="CVE-2025-6432" ref_url="https://www.suse.com/security/cve/CVE-2025-6432/" source="CVE"/>
		<reference ref_id="CVE-2025-6433" ref_url="https://www.suse.com/security/cve/CVE-2025-6433/" source="CVE"/>
		<reference ref_id="CVE-2025-6434" ref_url="https://www.suse.com/security/cve/CVE-2025-6434/" source="CVE"/>
		<reference ref_id="CVE-2025-6435" ref_url="https://www.suse.com/security/cve/CVE-2025-6435/" source="CVE"/>
		<reference ref_id="CVE-2025-6436" ref_url="https://www.suse.com/security/cve/CVE-2025-6436/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-140.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6427/">CVE-2025-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6427">CVE-2025-6427 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6428/">CVE-2025-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6428">CVE-2025-6428 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6431/">CVE-2025-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6431">CVE-2025-6431 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6432/">CVE-2025-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6432">CVE-2025-6432 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6433/">CVE-2025-6433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6433">CVE-2025-6433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6434/">CVE-2025-6434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6434">CVE-2025-6434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6435/">CVE-2025-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6435">CVE-2025-6435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6436/">CVE-2025-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6436">CVE-2025-6436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999508" comment="MozillaFirefox-140.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999509" comment="MozillaFirefox-branding-upstream-140.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999510" comment="MozillaFirefox-devel-140.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999511" comment="MozillaFirefox-translations-common-140.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999512" comment="MozillaFirefox-translations-other-140.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253647" version="1" class="patch">
	<metadata>
		<title>chmlib-devel-0.40-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48172" ref_url="https://www.suse.com/security/cve/CVE-2025-48172/" source="CVE"/>
		<description>
These are all security issues fixed in the chmlib-devel-0.40-26.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48172/">CVE-2025-48172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48172">CVE-2025-48172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999513" comment="chmlib-devel-0.40-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999514" comment="chmlib-examples-0.40-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999515" comment="libchm0-0.40-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253648" version="1" class="patch">
	<metadata>
		<title>coreutils-9.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5278" ref_url="https://www.suse.com/security/cve/CVE-2025-5278/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-9.7-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5278/">CVE-2025-5278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5278">CVE-2025-5278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999516" comment="coreutils-9.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999517" comment="coreutils-doc-9.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999518" comment="coreutils-lang-9.7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253649" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999519" comment="go1.23-1.23.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999520" comment="go1.23-doc-1.23.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999521" comment="go1.23-libstd-1.23.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999522" comment="go1.23-race-1.23.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253650" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999523" comment="go1.24-1.24.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999524" comment="go1.24-doc-1.24.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999525" comment="go1.24-libstd-1.24.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999526" comment="go1.24-race-1.24.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253651" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25rc2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25rc2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999527" comment="go1.25-1.25rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999528" comment="go1.25-doc-1.25rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999529" comment="go1.25-libstd-1.25rc2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999530" comment="go1.25-race-1.25rc2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253652" version="1" class="patch">
	<metadata>
		<title>helm-3.18.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.18.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999531" comment="helm-3.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999532" comment="helm-bash-completion-3.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999533" comment="helm-fish-completion-3.18.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999534" comment="helm-zsh-completion-3.18.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253653" version="1" class="patch">
	<metadata>
		<title>avif-tools-1.3.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48175" ref_url="https://www.suse.com/security/cve/CVE-2025-48175/" source="CVE"/>
		<description>
These are all security issues fixed in the avif-tools-1.3.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48175/">CVE-2025-48175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48175">CVE-2025-48175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999535" comment="avif-tools-1.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999536" comment="gdk-pixbuf-loader-libavif-1.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999537" comment="libavif-devel-1.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999538" comment="libavif16-1.3.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999539" comment="libavif16-32bit-1.3.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253654" version="1" class="patch">
	<metadata>
		<title>libmruby3_4_0-3.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0623" ref_url="https://www.suse.com/security/cve/CVE-2022-0623/" source="CVE"/>
		<reference ref_id="CVE-2022-0717" ref_url="https://www.suse.com/security/cve/CVE-2022-0717/" source="CVE"/>
		<reference ref_id="CVE-2022-1276" ref_url="https://www.suse.com/security/cve/CVE-2022-1276/" source="CVE"/>
		<reference ref_id="CVE-2025-7207" ref_url="https://www.suse.com/security/cve/CVE-2025-7207/" source="CVE"/>
		<description>
These are all security issues fixed in the libmruby3_4_0-3.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0623/">CVE-2022-0623 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0623">CVE-2022-0623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0717/">CVE-2022-0717 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0717">CVE-2022-0717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1276/">CVE-2022-1276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1276">CVE-2022-1276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7207/">CVE-2025-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7207">CVE-2025-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999540" comment="libmruby3_4_0-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999541" comment="libmruby_core3_4_0-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999542" comment="mruby-3.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999543" comment="mruby-devel-3.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253655" version="1" class="patch">
	<metadata>
		<title>libraptor-devel-2.0.16-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-57822" ref_url="https://www.suse.com/security/cve/CVE-2024-57822/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor-devel-2.0.16-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57822/">CVE-2024-57822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57822">CVE-2024-57822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999544" comment="libraptor-devel-2.0.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999545" comment="libraptor2-0-2.0.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999546" comment="libraptor2-0-32bit-2.0.16-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999547" comment="raptor-2.0.16-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253656" version="1" class="patch">
	<metadata>
		<title>afterburn-5.8.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.8.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006071" comment="afterburn-5.8.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006072" comment="afterburn-dracut-5.8.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253657" version="1" class="patch">
	<metadata>
		<title>cmctl-2.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-2.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006073" comment="cmctl-2.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006074" comment="cmctl-bash-completion-2.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006075" comment="cmctl-fish-completion-2.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006076" comment="cmctl-zsh-completion-2.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253658" version="1" class="patch">
	<metadata>
		<title>git-2.50.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27613" ref_url="https://www.suse.com/security/cve/CVE-2025-27613/" source="CVE"/>
		<reference ref_id="CVE-2025-27614" ref_url="https://www.suse.com/security/cve/CVE-2025-27614/" source="CVE"/>
		<reference ref_id="CVE-2025-46334" ref_url="https://www.suse.com/security/cve/CVE-2025-46334/" source="CVE"/>
		<reference ref_id="CVE-2025-46835" ref_url="https://www.suse.com/security/cve/CVE-2025-46835/" source="CVE"/>
		<reference ref_id="CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384/" source="CVE"/>
		<reference ref_id="CVE-2025-48385" ref_url="https://www.suse.com/security/cve/CVE-2025-48385/" source="CVE"/>
		<reference ref_id="CVE-2025-48386" ref_url="https://www.suse.com/security/cve/CVE-2025-48386/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.50.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27613/">CVE-2025-27613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27613">CVE-2025-27613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27614/">CVE-2025-27614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27614">CVE-2025-27614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46334/">CVE-2025-46334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46334">CVE-2025-46334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46835/">CVE-2025-46835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46835">CVE-2025-46835 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48385/">CVE-2025-48385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48385">CVE-2025-48385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48386/">CVE-2025-48386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48386">CVE-2025-48386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006077" comment="git-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006078" comment="git-arch-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006079" comment="git-core-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006080" comment="git-credential-libsecret-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006081" comment="git-cvs-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006082" comment="git-daemon-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006083" comment="git-doc-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006084" comment="git-email-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006085" comment="git-gui-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006086" comment="git-p4-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006087" comment="git-svn-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006088" comment="git-web-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006089" comment="gitk-2.50.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006090" comment="perl-Git-2.50.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253659" version="1" class="patch">
	<metadata>
		<title>k9s-0.50.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the k9s-0.50.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006091" comment="k9s-0.50.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253660" version="1" class="patch">
	<metadata>
		<title>liboqs-devel-0.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52473" ref_url="https://www.suse.com/security/cve/CVE-2025-52473/" source="CVE"/>
		<description>
These are all security issues fixed in the liboqs-devel-0.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52473/">CVE-2025-52473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52473">CVE-2025-52473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006092" comment="liboqs-devel-0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006093" comment="liboqs-devel-32bit-0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006094" comment="liboqs8-0.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006095" comment="liboqs8-32bit-0.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253661" version="1" class="patch">
	<metadata>
		<title>php8-8.4.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.4.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006096" comment="php8-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006097" comment="php8-bcmath-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006098" comment="php8-bz2-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006099" comment="php8-calendar-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006100" comment="php8-cli-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006101" comment="php8-ctype-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006102" comment="php8-curl-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006103" comment="php8-dba-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006104" comment="php8-devel-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006105" comment="php8-dom-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006106" comment="php8-enchant-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006107" comment="php8-exif-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006108" comment="php8-ffi-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006109" comment="php8-fileinfo-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006110" comment="php8-ftp-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006111" comment="php8-gd-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006112" comment="php8-gettext-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006113" comment="php8-gmp-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006114" comment="php8-iconv-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006115" comment="php8-intl-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006116" comment="php8-ldap-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006117" comment="php8-mbstring-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006118" comment="php8-mysql-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006119" comment="php8-odbc-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006120" comment="php8-opcache-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006121" comment="php8-openssl-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006122" comment="php8-pcntl-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006123" comment="php8-pdo-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006124" comment="php8-pgsql-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006125" comment="php8-phar-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006126" comment="php8-posix-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006127" comment="php8-readline-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006128" comment="php8-shmop-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006129" comment="php8-snmp-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006130" comment="php8-soap-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006131" comment="php8-sockets-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006132" comment="php8-sodium-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006133" comment="php8-sqlite-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006134" comment="php8-sysvmsg-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006135" comment="php8-sysvsem-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006136" comment="php8-sysvshm-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006137" comment="php8-tidy-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006138" comment="php8-tokenizer-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006139" comment="php8-xmlreader-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006140" comment="php8-xmlwriter-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006141" comment="php8-xsl-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006142" comment="php8-zip-8.4.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006143" comment="php8-zlib-8.4.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253662" version="1" class="patch">
	<metadata>
		<title>trivy-0.64.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.64.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006144" comment="trivy-0.64.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253663" version="1" class="patch">
	<metadata>
		<title>xen-4.20.1_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27465" ref_url="https://www.suse.com/security/cve/CVE-2025-27465/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.1_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27465/">CVE-2025-27465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27465">CVE-2025-27465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006145" comment="xen-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006146" comment="xen-devel-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006147" comment="xen-doc-html-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006148" comment="xen-libs-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006149" comment="xen-tools-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006150" comment="xen-tools-domU-4.20.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006151" comment="xen-tools-xendomains-wait-disk-4.20.1_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253664" version="1" class="patch">
	<metadata>
		<title>ggml-devel-5889-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53630" ref_url="https://www.suse.com/security/cve/CVE-2025-53630/" source="CVE"/>
		<description>
These are all security issues fixed in the ggml-devel-5889-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53630/">CVE-2025-53630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53630">CVE-2025-53630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007723" comment="ggml-devel-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007724" comment="libggml-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007725" comment="libggml-base-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007726" comment="libggml-cpu-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007727" comment="libggml-opencl-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007728" comment="libggml-vulkan-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007729" comment="libllama-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007730" comment="libmtmd-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007731" comment="llamacpp-5889-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007732" comment="llamacpp-devel-5889-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253665" version="1" class="patch">
	<metadata>
		<title>mailman3-3.3.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53882" ref_url="https://www.suse.com/security/cve/CVE-2025-53882/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman3-3.3.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53882/">CVE-2025-53882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53882">CVE-2025-53882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007733" comment="mailman3-3.3.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007734" comment="system-user-mailman-3.3.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253666" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5992" ref_url="https://www.suse.com/security/cve/CVE-2025-5992/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5992/">CVE-2025-5992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5992">CVE-2025-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007735" comment="libQt6Concurrent6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007736" comment="libQt6Core6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007737" comment="libQt6DBus6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007738" comment="libQt6Gui6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007739" comment="libQt6Network6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007740" comment="libQt6OpenGL6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007741" comment="libQt6OpenGLWidgets6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007742" comment="libQt6PrintSupport6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007743" comment="libQt6Sql6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007744" comment="libQt6Test6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007745" comment="libQt6Widgets6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007746" comment="libQt6Xml6-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007747" comment="qt6-base-common-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007748" comment="qt6-base-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007749" comment="qt6-base-examples-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007750" comment="qt6-base-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007751" comment="qt6-concurrent-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007752" comment="qt6-core-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007753" comment="qt6-core-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007754" comment="qt6-dbus-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007755" comment="qt6-dbus-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007756" comment="qt6-docs-common-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007757" comment="qt6-exampleicons-devel-static-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007758" comment="qt6-gui-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007759" comment="qt6-gui-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007760" comment="qt6-kmssupport-devel-static-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007761" comment="qt6-kmssupport-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007762" comment="qt6-network-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007763" comment="qt6-network-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007764" comment="qt6-network-tls-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007765" comment="qt6-networkinformation-glib-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007766" comment="qt6-networkinformation-nm-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007767" comment="qt6-opengl-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007768" comment="qt6-opengl-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007769" comment="qt6-openglwidgets-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007770" comment="qt6-platformsupport-devel-static-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007771" comment="qt6-platformsupport-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007772" comment="qt6-platformtheme-gtk3-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007773" comment="qt6-platformtheme-xdgdesktopportal-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007774" comment="qt6-printsupport-cups-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007775" comment="qt6-printsupport-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007776" comment="qt6-printsupport-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007777" comment="qt6-sql-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007778" comment="qt6-sql-mysql-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007779" comment="qt6-sql-postgresql-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007780" comment="qt6-sql-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007781" comment="qt6-sql-sqlite-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007782" comment="qt6-sql-unixODBC-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007783" comment="qt6-test-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007784" comment="qt6-test-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007785" comment="qt6-widgets-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007786" comment="qt6-widgets-private-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007787" comment="qt6-xml-devel-6.9.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007788" comment="qt6-xml-private-devel-6.9.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253667" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.7+117-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.7+117-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007789" comment="keylime-ima-policy-0.2.7+117-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007790" comment="rust-keylime-0.2.7+117-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253668" version="1" class="patch">
	<metadata>
		<title>apache-commons-lang3-3.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48924" ref_url="https://www.suse.com/security/cve/CVE-2025-48924/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-lang3-3.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-16"/>
	<updated date="2025-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48924/">CVE-2025-48924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007989" comment="apache-commons-lang3-3.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007990" comment="apache-commons-lang3-javadoc-3.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253669" version="1" class="patch">
	<metadata>
		<title>FastCGI-2.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23016" ref_url="https://www.suse.com/security/cve/CVE-2025-23016/" source="CVE"/>
		<description>
These are all security issues fixed in the FastCGI-2.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23016/">CVE-2025-23016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23016">CVE-2025-23016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008256" comment="FastCGI-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008257" comment="FastCGI-devel-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008258" comment="libfcgi0-2.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008259" comment="perl-FCGI-2.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253670" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53014" ref_url="https://www.suse.com/security/cve/CVE-2025-53014/" source="CVE"/>
		<reference ref_id="CVE-2025-53015" ref_url="https://www.suse.com/security/cve/CVE-2025-53015/" source="CVE"/>
		<reference ref_id="CVE-2025-53019" ref_url="https://www.suse.com/security/cve/CVE-2025-53019/" source="CVE"/>
		<reference ref_id="CVE-2025-53101" ref_url="https://www.suse.com/security/cve/CVE-2025-53101/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53014/">CVE-2025-53014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53014">CVE-2025-53014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53015/">CVE-2025-53015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53015">CVE-2025-53015 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53019/">CVE-2025-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53019">CVE-2025-53019 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53101/">CVE-2025-53101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53101">CVE-2025-53101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008260" comment="ImageMagick-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008261" comment="ImageMagick-config-7-SUSE-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008262" comment="ImageMagick-devel-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008263" comment="ImageMagick-devel-32bit-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008264" comment="ImageMagick-doc-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008265" comment="ImageMagick-extra-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008266" comment="libMagick++-7_Q16HDRI5-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008267" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008268" comment="libMagick++-devel-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008269" comment="libMagick++-devel-32bit-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008270" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008271" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008272" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008273" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008274" comment="perl-PerlMagick-7.1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253671" version="1" class="patch">
	<metadata>
		<title>chromedriver-138.0.7204.157-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6558" ref_url="https://www.suse.com/security/cve/CVE-2025-6558/" source="CVE"/>
		<reference ref_id="CVE-2025-7656" ref_url="https://www.suse.com/security/cve/CVE-2025-7656/" source="CVE"/>
		<reference ref_id="CVE-2025-7657" ref_url="https://www.suse.com/security/cve/CVE-2025-7657/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-138.0.7204.157-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-6558/">CVE-2025-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6558">CVE-2025-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7656/">CVE-2025-7656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7656">CVE-2025-7656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7657/">CVE-2025-7657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7657">CVE-2025-7657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008275" comment="chromedriver-138.0.7204.157-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008276" comment="chromium-138.0.7204.157-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253672" version="1" class="patch">
	<metadata>
		<title>fractal-12.beta+14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53549" ref_url="https://www.suse.com/security/cve/CVE-2025-53549/" source="CVE"/>
		<description>
These are all security issues fixed in the fractal-12.beta+14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53549/">CVE-2025-53549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53549">CVE-2025-53549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008277" comment="fractal-12.beta+14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008278" comment="fractal-lang-12.beta+14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253673" version="1" class="patch">
	<metadata>
		<title>kubelogin-0.2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
These are all security issues fixed in the kubelogin-0.2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008279" comment="kubelogin-0.2.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253674" version="1" class="patch">
	<metadata>
		<title>rustup-1.28.2~0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.28.2~0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008280" comment="rustup-1.28.2~0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253675" version="1" class="patch">
	<metadata>
		<title>bind-9.20.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40777" ref_url="https://www.suse.com/security/cve/CVE-2025-40777/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40777/">CVE-2025-40777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40777">CVE-2025-40777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008663" comment="bind-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008664" comment="bind-doc-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008665" comment="bind-modules-bdbhpt-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008666" comment="bind-modules-generic-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008667" comment="bind-modules-ldap-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008668" comment="bind-modules-mysql-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008669" comment="bind-modules-perl-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008670" comment="bind-modules-sqlite3-9.20.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008671" comment="bind-utils-9.20.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253676" version="1" class="patch">
	<metadata>
		<title>cosign-2.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008672" comment="cosign-2.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008673" comment="cosign-bash-completion-2.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008674" comment="cosign-fish-completion-2.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008675" comment="cosign-zsh-completion-2.5.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253677" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008676" comment="java-11-openjdk-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008677" comment="java-11-openjdk-demo-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008678" comment="java-11-openjdk-devel-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008679" comment="java-11-openjdk-headless-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008680" comment="java-11-openjdk-javadoc-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008681" comment="java-11-openjdk-jmods-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008682" comment="java-11-openjdk-src-11.0.28.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253678" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008683" comment="java-17-openjdk-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008684" comment="java-17-openjdk-demo-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008685" comment="java-17-openjdk-devel-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008686" comment="java-17-openjdk-headless-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008687" comment="java-17-openjdk-javadoc-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008688" comment="java-17-openjdk-jmods-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008689" comment="java-17-openjdk-src-17.0.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253679" version="1" class="patch">
	<metadata>
		<title>java-24-openjdk-24.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-24-openjdk-24.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008690" comment="java-24-openjdk-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008691" comment="java-24-openjdk-demo-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008692" comment="java-24-openjdk-devel-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008693" comment="java-24-openjdk-headless-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008694" comment="java-24-openjdk-javadoc-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008695" comment="java-24-openjdk-jmods-24.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008696" comment="java-24-openjdk-src-24.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253680" version="1" class="patch">
	<metadata>
		<title>valkey-8.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008697" comment="valkey-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008698" comment="valkey-compat-redis-8.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008699" comment="valkey-devel-8.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253681" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.64-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-42516" ref_url="https://www.suse.com/security/cve/CVE-2024-42516/" source="CVE"/>
		<reference ref_id="CVE-2024-43204" ref_url="https://www.suse.com/security/cve/CVE-2024-43204/" source="CVE"/>
		<reference ref_id="CVE-2024-43394" ref_url="https://www.suse.com/security/cve/CVE-2024-43394/" source="CVE"/>
		<reference ref_id="CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252/" source="CVE"/>
		<reference ref_id="CVE-2025-23048" ref_url="https://www.suse.com/security/cve/CVE-2025-23048/" source="CVE"/>
		<reference ref_id="CVE-2025-49630" ref_url="https://www.suse.com/security/cve/CVE-2025-49630/" source="CVE"/>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<reference ref_id="CVE-2025-53020" ref_url="https://www.suse.com/security/cve/CVE-2025-53020/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.64-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42516/">CVE-2024-42516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42516">CVE-2024-42516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43204/">CVE-2024-43204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43204">CVE-2024-43204 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43394/">CVE-2024-43394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43394">CVE-2024-43394 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23048/">CVE-2025-23048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23048">CVE-2025-23048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49630/">CVE-2025-49630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49630">CVE-2025-49630 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53020/">CVE-2025-53020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53020">CVE-2025-53020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008715" comment="apache2-2.4.64-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253682" version="1" class="patch">
	<metadata>
		<title>busybox-1.37.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-42363" ref_url="https://www.suse.com/security/cve/CVE-2023-42363/" source="CVE"/>
		<reference ref_id="CVE-2023-42364" ref_url="https://www.suse.com/security/cve/CVE-2023-42364/" source="CVE"/>
		<reference ref_id="CVE-2023-42365" ref_url="https://www.suse.com/security/cve/CVE-2023-42365/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.37.0-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42363/">CVE-2023-42363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42363">CVE-2023-42363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42364/">CVE-2023-42364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42364">CVE-2023-42364 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42365/">CVE-2023-42365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42365">CVE-2023-42365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008716" comment="busybox-1.37.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008717" comment="busybox-static-1.37.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008718" comment="busybox-testsuite-1.37.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008719" comment="busybox-warewulf3-1.37.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253683" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008720" comment="java-21-openjdk-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008721" comment="java-21-openjdk-demo-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008722" comment="java-21-openjdk-devel-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008723" comment="java-21-openjdk-headless-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008724" comment="java-21-openjdk-javadoc-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008725" comment="java-21-openjdk-jmods-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008726" comment="java-21-openjdk-src-21.0.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253684" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.13.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.13.8-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008727" comment="libxml2-2-2.13.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008728" comment="libxml2-2-32bit-2.13.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008729" comment="libxml2-devel-2.13.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008730" comment="libxml2-devel-32bit-2.13.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008731" comment="libxml2-doc-2.13.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008732" comment="libxml2-tools-2.13.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253685" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.43-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7424" ref_url="https://www.suse.com/security/cve/CVE-2025-7424/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.43-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-7424/">CVE-2025-7424 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7424">CVE-2025-7424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008733" comment="libexslt0-1.1.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008734" comment="libxslt-devel-1.1.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008735" comment="libxslt-devel-32bit-1.1.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008736" comment="libxslt-tools-1.1.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008737" comment="libxslt1-1.1.43-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008738" comment="libxslt1-32bit-1.1.43-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253686" version="1" class="patch">
	<metadata>
		<title>python311-3.11.13-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.13-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008739" comment="python311-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008740" comment="python311-32bit-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008741" comment="python311-curses-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008742" comment="python311-dbm-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008743" comment="python311-idle-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008744" comment="python311-tk-3.11.13-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008745" comment="python311-x86-64-v3-3.11.13-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253687" version="1" class="patch">
	<metadata>
		<title>python312-3.12.11-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.11-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008746" comment="python312-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008747" comment="python312-32bit-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008748" comment="python312-curses-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008749" comment="python312-dbm-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008750" comment="python312-idle-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008751" comment="python312-tk-3.12.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008752" comment="python312-x86-64-v3-3.12.11-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253688" version="1" class="patch">
	<metadata>
		<title>python313-3.13.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008753" comment="python313-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008754" comment="python313-32bit-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008755" comment="python313-curses-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008756" comment="python313-dbm-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008757" comment="python313-idle-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008758" comment="python313-tk-3.13.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008759" comment="python313-x86-64-v3-3.13.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253689" version="1" class="patch">
	<metadata>
		<title>lemon-3.50.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
These are all security issues fixed in the lemon-3.50.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-20"/>
	<updated date="2025-07-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008760" comment="lemon-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008761" comment="libsqlite3-0-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008762" comment="libsqlite3-0-32bit-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008763" comment="libsqlite3-0-x86-64-v3-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008764" comment="sqlite3-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008765" comment="sqlite3-devel-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008766" comment="sqlite3-doc-3.50.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008767" comment="sqlite3-tcl-3.50.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253690" version="1" class="patch">
	<metadata>
		<title>cyradm-3.8.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<description>
These are all security issues fixed in the cyradm-3.8.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-21"/>
	<updated date="2025-07-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008949" comment="cyradm-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008950" comment="cyrus-imapd-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008951" comment="cyrus-imapd-devel-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008952" comment="cyrus-imapd-snmp-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008953" comment="cyrus-imapd-snmp-mibs-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008954" comment="cyrus-imapd-utils-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008955" comment="libcyrus0-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008956" comment="perl-Cyrus-Annotator-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008957" comment="perl-Cyrus-IMAP-3.8.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008958" comment="perl-Cyrus-SIEVE-managesieve-3.8.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253691" version="1" class="patch">
	<metadata>
		<title>hauler-1.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-21"/>
	<updated date="2025-07-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008959" comment="hauler-1.2.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253692" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6427" ref_url="https://www.suse.com/security/cve/CVE-2025-6427/" source="CVE"/>
		<reference ref_id="CVE-2025-6428" ref_url="https://www.suse.com/security/cve/CVE-2025-6428/" source="CVE"/>
		<reference ref_id="CVE-2025-6431" ref_url="https://www.suse.com/security/cve/CVE-2025-6431/" source="CVE"/>
		<reference ref_id="CVE-2025-6432" ref_url="https://www.suse.com/security/cve/CVE-2025-6432/" source="CVE"/>
		<reference ref_id="CVE-2025-6433" ref_url="https://www.suse.com/security/cve/CVE-2025-6433/" source="CVE"/>
		<reference ref_id="CVE-2025-6434" ref_url="https://www.suse.com/security/cve/CVE-2025-6434/" source="CVE"/>
		<reference ref_id="CVE-2025-6435" ref_url="https://www.suse.com/security/cve/CVE-2025-6435/" source="CVE"/>
		<reference ref_id="CVE-2025-6436" ref_url="https://www.suse.com/security/cve/CVE-2025-6436/" source="CVE"/>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<reference ref_id="CVE-2025-8036" ref_url="https://www.suse.com/security/cve/CVE-2025-8036/" source="CVE"/>
		<reference ref_id="CVE-2025-8037" ref_url="https://www.suse.com/security/cve/CVE-2025-8037/" source="CVE"/>
		<reference ref_id="CVE-2025-8038" ref_url="https://www.suse.com/security/cve/CVE-2025-8038/" source="CVE"/>
		<reference ref_id="CVE-2025-8039" ref_url="https://www.suse.com/security/cve/CVE-2025-8039/" source="CVE"/>
		<reference ref_id="CVE-2025-8040" ref_url="https://www.suse.com/security/cve/CVE-2025-8040/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6427/">CVE-2025-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6427">CVE-2025-6427 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6428/">CVE-2025-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6428">CVE-2025-6428 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6431/">CVE-2025-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6431">CVE-2025-6431 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6432/">CVE-2025-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6432">CVE-2025-6432 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6433/">CVE-2025-6433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6433">CVE-2025-6433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6434/">CVE-2025-6434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6434">CVE-2025-6434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6435/">CVE-2025-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6435">CVE-2025-6435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6436/">CVE-2025-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6436">CVE-2025-6436 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8036/">CVE-2025-8036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8036">CVE-2025-8036 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8037/">CVE-2025-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8037">CVE-2025-8037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8038/">CVE-2025-8038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8038">CVE-2025-8038 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8039/">CVE-2025-8039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8039">CVE-2025-8039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8040/">CVE-2025-8040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8040">CVE-2025-8040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010049" comment="firefox-esr-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010050" comment="firefox-esr-branding-upstream-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010051" comment="firefox-esr-translations-common-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010052" comment="firefox-esr-translations-other-140.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253693" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.3+security01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6023" ref_url="https://www.suse.com/security/cve/CVE-2025-6023/" source="CVE"/>
		<reference ref_id="CVE-2025-6197" ref_url="https://www.suse.com/security/cve/CVE-2025-6197/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6023/">CVE-2025-6023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6023">CVE-2025-6023 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6197/">CVE-2025-6197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6197">CVE-2025-6197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010053" comment="grafana-11.6.3+security01-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253694" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-templates-0.5.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7783" ref_url="https://www.suse.com/security/cve/CVE-2025-7783/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7783/">CVE-2025-7783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783">CVE-2025-7783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010054" comment="jupyter-jupyterlab-templates-0.5.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010055" comment="python311-jupyterlab-templates-0.5.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010056" comment="python312-jupyterlab-templates-0.5.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010057" comment="python313-jupyterlab-templates-0.5.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253695" version="1" class="patch">
	<metadata>
		<title>viewvc-1.3.0~dev20250722-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54141" ref_url="https://www.suse.com/security/cve/CVE-2025-54141/" source="CVE"/>
		<description>
These are all security issues fixed in the viewvc-1.3.0~dev20250722-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54141/">CVE-2025-54141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54141">CVE-2025-54141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010058" comment="viewvc-1.3.0~dev20250722-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253696" version="1" class="patch">
	<metadata>
		<title>chromedriver-138.0.7204.168-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8010" ref_url="https://www.suse.com/security/cve/CVE-2025-8010/" source="CVE"/>
		<reference ref_id="CVE-2025-8011" ref_url="https://www.suse.com/security/cve/CVE-2025-8011/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-138.0.7204.168-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8010/">CVE-2025-8010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8010">CVE-2025-8010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8011/">CVE-2025-8011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8011">CVE-2025-8011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010114" comment="chromedriver-138.0.7204.168-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010115" comment="chromium-138.0.7204.168-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253697" version="1" class="patch">
	<metadata>
		<title>cloud-init-25.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-11584" ref_url="https://www.suse.com/security/cve/CVE-2024-11584/" source="CVE"/>
		<reference ref_id="CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-25.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11584/">CVE-2024-11584 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11584">CVE-2024-11584 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010116" comment="cloud-init-25.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010117" comment="cloud-init-config-suse-25.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010118" comment="cloud-init-doc-25.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253698" version="1" class="patch">
	<metadata>
		<title>grype-db-0.35.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2004-0377" ref_url="https://www.suse.com/security/cve/CVE-2004-0377/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-db-0.35.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0377/">CVE-2004-0377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0377">CVE-2004-0377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010119" comment="grype-db-0.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010120" comment="grype-db-bash-completion-0.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010121" comment="grype-db-fish-completion-0.35.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010122" comment="grype-db-zsh-completion-0.35.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253699" version="1" class="patch">
	<metadata>
		<title>javamail-1.6.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7962" ref_url="https://www.suse.com/security/cve/CVE-2025-7962/" source="CVE"/>
		<description>
These are all security issues fixed in the javamail-1.6.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7962/">CVE-2025-7962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7962">CVE-2025-7962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010123" comment="javamail-1.6.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010124" comment="javamail-javadoc-1.6.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253700" version="1" class="patch">
	<metadata>
		<title>minio-client-20250721T052808Z-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<description>
These are all security issues fixed in the minio-client-20250721T052808Z-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010125" comment="minio-client-20250721T052808Z-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010126" comment="minio-client-as-mc-20250721T052808Z-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253701" version="1" class="patch">
	<metadata>
		<title>jupyter-nbdime-7.0.2-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7783" ref_url="https://www.suse.com/security/cve/CVE-2025-7783/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbdime-7.0.2-21.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7783/">CVE-2025-7783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783">CVE-2025-7783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010127" comment="jupyter-nbdime-7.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010128" comment="jupyter-nbdime-jupyterlab-3.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010129" comment="python311-nbdime-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010130" comment="python311-nbdime-git-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010131" comment="python311-nbdime-hg-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010132" comment="python312-nbdime-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010133" comment="python312-nbdime-git-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010134" comment="python312-nbdime-hg-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010135" comment="python313-nbdime-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010136" comment="python313-nbdime-git-4.0.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010137" comment="python313-nbdime-hg-4.0.2-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253702" version="1" class="patch">
	<metadata>
		<title>python311-starlette-0.47.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54121" ref_url="https://www.suse.com/security/cve/CVE-2025-54121/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-starlette-0.47.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54121/">CVE-2025-54121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54121">CVE-2025-54121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010138" comment="python311-starlette-0.47.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010139" comment="python312-starlette-0.47.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010140" comment="python313-starlette-0.47.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253703" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-thor-1.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54314" ref_url="https://www.suse.com/security/cve/CVE-2025-54314/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-thor-1.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54314/">CVE-2025-54314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54314">CVE-2025-54314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010141" comment="ruby3.4-rubygem-thor-1.4.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253704" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6427" ref_url="https://www.suse.com/security/cve/CVE-2025-6427/" source="CVE"/>
		<reference ref_id="CVE-2025-6432" ref_url="https://www.suse.com/security/cve/CVE-2025-6432/" source="CVE"/>
		<reference ref_id="CVE-2025-6433" ref_url="https://www.suse.com/security/cve/CVE-2025-6433/" source="CVE"/>
		<reference ref_id="CVE-2025-6434" ref_url="https://www.suse.com/security/cve/CVE-2025-6434/" source="CVE"/>
		<reference ref_id="CVE-2025-6435" ref_url="https://www.suse.com/security/cve/CVE-2025-6435/" source="CVE"/>
		<reference ref_id="CVE-2025-6436" ref_url="https://www.suse.com/security/cve/CVE-2025-6436/" source="CVE"/>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<reference ref_id="CVE-2025-8036" ref_url="https://www.suse.com/security/cve/CVE-2025-8036/" source="CVE"/>
		<reference ref_id="CVE-2025-8037" ref_url="https://www.suse.com/security/cve/CVE-2025-8037/" source="CVE"/>
		<reference ref_id="CVE-2025-8038" ref_url="https://www.suse.com/security/cve/CVE-2025-8038/" source="CVE"/>
		<reference ref_id="CVE-2025-8039" ref_url="https://www.suse.com/security/cve/CVE-2025-8039/" source="CVE"/>
		<reference ref_id="CVE-2025-8040" ref_url="https://www.suse.com/security/cve/CVE-2025-8040/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-25"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6427/">CVE-2025-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6427">CVE-2025-6427 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6432/">CVE-2025-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6432">CVE-2025-6432 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6433/">CVE-2025-6433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6433">CVE-2025-6433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6434/">CVE-2025-6434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6434">CVE-2025-6434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6435/">CVE-2025-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6435">CVE-2025-6435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6436/">CVE-2025-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6436">CVE-2025-6436 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8036/">CVE-2025-8036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8036">CVE-2025-8036 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8037/">CVE-2025-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8037">CVE-2025-8037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8038/">CVE-2025-8038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8038">CVE-2025-8038 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8039/">CVE-2025-8039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8039">CVE-2025-8039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8040/">CVE-2025-8040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8040">CVE-2025-8040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010461" comment="MozillaThunderbird-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010462" comment="MozillaThunderbird-openpgp-librnp-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010463" comment="MozillaThunderbird-translations-common-140.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010464" comment="MozillaThunderbird-translations-other-140.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253705" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.65-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54090" ref_url="https://www.suse.com/security/cve/CVE-2025-54090/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.65-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-25"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54090/">CVE-2025-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54090">CVE-2025-54090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010465" comment="apache2-2.4.65-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253706" version="1" class="patch">
	<metadata>
		<title>perl-Authen-SASL-2.180.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40918" ref_url="https://www.suse.com/security/cve/CVE-2025-40918/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Authen-SASL-2.180.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-25"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40918/">CVE-2025-40918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40918">CVE-2025-40918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010466" comment="perl-Authen-SASL-2.180.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253707" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-141.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<reference ref_id="CVE-2025-8036" ref_url="https://www.suse.com/security/cve/CVE-2025-8036/" source="CVE"/>
		<reference ref_id="CVE-2025-8037" ref_url="https://www.suse.com/security/cve/CVE-2025-8037/" source="CVE"/>
		<reference ref_id="CVE-2025-8038" ref_url="https://www.suse.com/security/cve/CVE-2025-8038/" source="CVE"/>
		<reference ref_id="CVE-2025-8039" ref_url="https://www.suse.com/security/cve/CVE-2025-8039/" source="CVE"/>
		<reference ref_id="CVE-2025-8040" ref_url="https://www.suse.com/security/cve/CVE-2025-8040/" source="CVE"/>
		<reference ref_id="CVE-2025-8041" ref_url="https://www.suse.com/security/cve/CVE-2025-8041/" source="CVE"/>
		<reference ref_id="CVE-2025-8042" ref_url="https://www.suse.com/security/cve/CVE-2025-8042/" source="CVE"/>
		<reference ref_id="CVE-2025-8043" ref_url="https://www.suse.com/security/cve/CVE-2025-8043/" source="CVE"/>
		<reference ref_id="CVE-2025-8044" ref_url="https://www.suse.com/security/cve/CVE-2025-8044/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-141.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8036/">CVE-2025-8036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8036">CVE-2025-8036 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8037/">CVE-2025-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8037">CVE-2025-8037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8038/">CVE-2025-8038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8038">CVE-2025-8038 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8039/">CVE-2025-8039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8039">CVE-2025-8039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8040/">CVE-2025-8040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8040">CVE-2025-8040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8041/">CVE-2025-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8041">CVE-2025-8041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8042/">CVE-2025-8042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8042">CVE-2025-8042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8043/">CVE-2025-8043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8043">CVE-2025-8043 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8044/">CVE-2025-8044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8044">CVE-2025-8044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010467" comment="MozillaFirefox-141.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010468" comment="MozillaFirefox-branding-upstream-141.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010469" comment="MozillaFirefox-devel-141.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010470" comment="MozillaFirefox-translations-common-141.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010471" comment="MozillaFirefox-translations-other-141.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253708" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010472" comment="libmozjs-128-0-128.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010473" comment="mozjs128-128.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010474" comment="mozjs128-devel-128.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253709" version="1" class="patch">
	<metadata>
		<title>rpi-imager-1.9.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5916" ref_url="https://www.suse.com/security/cve/CVE-2025-5916/" source="CVE"/>
		<description>
These are all security issues fixed in the rpi-imager-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5916/">CVE-2025-5916 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5916">CVE-2025-5916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010475" comment="rpi-imager-1.9.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253710" version="1" class="patch">
	<metadata>
		<title>forgejo-longterm-11.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-longterm-11.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-27"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010476" comment="forgejo-longterm-11.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010477" comment="forgejo-longterm-apparmor-11.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010478" comment="forgejo-longterm-environment-to-ini-11.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010479" comment="forgejo-longterm-firewalld-11.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010480" comment="forgejo-longterm-selinux-11.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253711" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-27"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010481" comment="java-11-openj9-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010482" comment="java-11-openj9-demo-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010483" comment="java-11-openj9-devel-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010484" comment="java-11-openj9-headless-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010485" comment="java-11-openj9-javadoc-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010486" comment="java-11-openj9-jmods-11.0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010487" comment="java-11-openj9-src-11.0.28.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253712" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-27"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010488" comment="java-17-openj9-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010489" comment="java-17-openj9-demo-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010490" comment="java-17-openj9-devel-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010491" comment="java-17-openj9-headless-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010492" comment="java-17-openj9-javadoc-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010493" comment="java-17-openj9-jmods-17.0.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010494" comment="java-17-openj9-src-17.0.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253713" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.462-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.462-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-27"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010495" comment="java-1_8_0-openj9-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010496" comment="java-1_8_0-openj9-accessibility-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010497" comment="java-1_8_0-openj9-demo-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010498" comment="java-1_8_0-openj9-devel-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010499" comment="java-1_8_0-openj9-headless-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010500" comment="java-1_8_0-openj9-javadoc-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010501" comment="java-1_8_0-openj9-src-1.8.0.462-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253714" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-27"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010502" comment="java-21-openj9-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010503" comment="java-21-openj9-demo-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010504" comment="java-21-openj9-devel-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010505" comment="java-21-openj9-headless-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010506" comment="java-21-openj9-javadoc-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010507" comment="java-21-openj9-jmods-21.0.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010508" comment="java-21-openj9-src-21.0.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253715" version="1" class="patch">
	<metadata>
		<title>libsuricata8_0_0-8.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10728" ref_url="https://www.suse.com/security/cve/CVE-2016-10728/" source="CVE"/>
		<reference ref_id="CVE-2018-14568" ref_url="https://www.suse.com/security/cve/CVE-2018-14568/" source="CVE"/>
		<reference ref_id="CVE-2019-10050" ref_url="https://www.suse.com/security/cve/CVE-2019-10050/" source="CVE"/>
		<reference ref_id="CVE-2019-10053" ref_url="https://www.suse.com/security/cve/CVE-2019-10053/" source="CVE"/>
		<reference ref_id="CVE-2024-23835" ref_url="https://www.suse.com/security/cve/CVE-2024-23835/" source="CVE"/>
		<reference ref_id="CVE-2024-23836" ref_url="https://www.suse.com/security/cve/CVE-2024-23836/" source="CVE"/>
		<reference ref_id="CVE-2024-23839" ref_url="https://www.suse.com/security/cve/CVE-2024-23839/" source="CVE"/>
		<reference ref_id="CVE-2024-24568" ref_url="https://www.suse.com/security/cve/CVE-2024-24568/" source="CVE"/>
		<reference ref_id="CVE-2024-32663" ref_url="https://www.suse.com/security/cve/CVE-2024-32663/" source="CVE"/>
		<reference ref_id="CVE-2024-32664" ref_url="https://www.suse.com/security/cve/CVE-2024-32664/" source="CVE"/>
		<reference ref_id="CVE-2024-32867" ref_url="https://www.suse.com/security/cve/CVE-2024-32867/" source="CVE"/>
		<reference ref_id="CVE-2024-37151" ref_url="https://www.suse.com/security/cve/CVE-2024-37151/" source="CVE"/>
		<reference ref_id="CVE-2024-38534" ref_url="https://www.suse.com/security/cve/CVE-2024-38534/" source="CVE"/>
		<reference ref_id="CVE-2024-38535" ref_url="https://www.suse.com/security/cve/CVE-2024-38535/" source="CVE"/>
		<reference ref_id="CVE-2024-38536" ref_url="https://www.suse.com/security/cve/CVE-2024-38536/" source="CVE"/>
		<reference ref_id="CVE-2024-45795" ref_url="https://www.suse.com/security/cve/CVE-2024-45795/" source="CVE"/>
		<reference ref_id="CVE-2024-45796" ref_url="https://www.suse.com/security/cve/CVE-2024-45796/" source="CVE"/>
		<reference ref_id="CVE-2024-45797" ref_url="https://www.suse.com/security/cve/CVE-2024-45797/" source="CVE"/>
		<reference ref_id="CVE-2024-47187" ref_url="https://www.suse.com/security/cve/CVE-2024-47187/" source="CVE"/>
		<reference ref_id="CVE-2024-47188" ref_url="https://www.suse.com/security/cve/CVE-2024-47188/" source="CVE"/>
		<reference ref_id="CVE-2024-47522" ref_url="https://www.suse.com/security/cve/CVE-2024-47522/" source="CVE"/>
		<reference ref_id="CVE-2024-55605" ref_url="https://www.suse.com/security/cve/CVE-2024-55605/" source="CVE"/>
		<reference ref_id="CVE-2024-55626" ref_url="https://www.suse.com/security/cve/CVE-2024-55626/" source="CVE"/>
		<reference ref_id="CVE-2024-55627" ref_url="https://www.suse.com/security/cve/CVE-2024-55627/" source="CVE"/>
		<reference ref_id="CVE-2024-55628" ref_url="https://www.suse.com/security/cve/CVE-2024-55628/" source="CVE"/>
		<reference ref_id="CVE-2024-55629" ref_url="https://www.suse.com/security/cve/CVE-2024-55629/" source="CVE"/>
		<reference ref_id="CVE-2025-29915" ref_url="https://www.suse.com/security/cve/CVE-2025-29915/" source="CVE"/>
		<reference ref_id="CVE-2025-29916" ref_url="https://www.suse.com/security/cve/CVE-2025-29916/" source="CVE"/>
		<reference ref_id="CVE-2025-29917" ref_url="https://www.suse.com/security/cve/CVE-2025-29917/" source="CVE"/>
		<reference ref_id="CVE-2025-29918" ref_url="https://www.suse.com/security/cve/CVE-2025-29918/" source="CVE"/>
		<description>
These are all security issues fixed in the libsuricata8_0_0-8.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-28"/>
	<updated date="2025-07-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10728/">CVE-2016-10728 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10728">CVE-2016-10728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14568/">CVE-2018-14568 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14568">CVE-2018-14568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10050/">CVE-2019-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10050">CVE-2019-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10053/">CVE-2019-10053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10053">CVE-2019-10053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23835/">CVE-2024-23835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23835">CVE-2024-23835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23836/">CVE-2024-23836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23836">CVE-2024-23836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23839/">CVE-2024-23839 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23839">CVE-2024-23839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24568/">CVE-2024-24568 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24568">CVE-2024-24568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-32663/">CVE-2024-32663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32663">CVE-2024-32663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-32664/">CVE-2024-32664 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32664">CVE-2024-32664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-32867/">CVE-2024-32867 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32867">CVE-2024-32867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37151/">CVE-2024-37151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37151">CVE-2024-37151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38534/">CVE-2024-38534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38534">CVE-2024-38534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38535/">CVE-2024-38535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38535">CVE-2024-38535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38536/">CVE-2024-38536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38536">CVE-2024-38536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45795/">CVE-2024-45795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45795">CVE-2024-45795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45796/">CVE-2024-45796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45796">CVE-2024-45796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45797/">CVE-2024-45797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45797">CVE-2024-45797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47187/">CVE-2024-47187 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47187">CVE-2024-47187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47188/">CVE-2024-47188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47188">CVE-2024-47188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47522/">CVE-2024-47522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47522">CVE-2024-47522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55605/">CVE-2024-55605 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55605">CVE-2024-55605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55626/">CVE-2024-55626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55626">CVE-2024-55626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55627/">CVE-2024-55627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55627">CVE-2024-55627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55628/">CVE-2024-55628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55628">CVE-2024-55628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55629/">CVE-2024-55629 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55629">CVE-2024-55629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29915/">CVE-2025-29915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29915">CVE-2025-29915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29916/">CVE-2025-29916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29916">CVE-2025-29916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29917/">CVE-2025-29917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29917">CVE-2025-29917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29918/">CVE-2025-29918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29918">CVE-2025-29918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011162" comment="libsuricata8_0_0-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011163" comment="suricata-8.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011164" comment="suricata-devel-8.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253716" version="1" class="patch">
	<metadata>
		<title>docker-28.3.3_ce-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-28.3.3_ce-26.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011504" comment="docker-28.3.3_ce-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011505" comment="docker-bash-completion-28.3.3_ce-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011506" comment="docker-buildx-0.26.1-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011507" comment="docker-fish-completion-28.3.3_ce-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011508" comment="docker-rootless-extras-28.3.3_ce-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011509" comment="docker-zsh-completion-28.3.3_ce-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253717" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7700" ref_url="https://www.suse.com/security/cve/CVE-2025-7700/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1.1-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7700/">CVE-2025-7700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7700">CVE-2025-7700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011510" comment="ffmpeg-7-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011511" comment="ffmpeg-7-libavcodec-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011512" comment="ffmpeg-7-libavdevice-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011513" comment="ffmpeg-7-libavfilter-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011514" comment="ffmpeg-7-libavformat-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011515" comment="ffmpeg-7-libavutil-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011516" comment="ffmpeg-7-libpostproc-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011517" comment="ffmpeg-7-libswresample-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011518" comment="ffmpeg-7-libswscale-devel-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011519" comment="libavcodec61-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011520" comment="libavcodec61-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011521" comment="libavdevice61-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011522" comment="libavdevice61-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011523" comment="libavfilter10-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011524" comment="libavfilter10-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011525" comment="libavformat61-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011526" comment="libavformat61-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011527" comment="libavutil59-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011528" comment="libavutil59-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011529" comment="libpostproc58-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011530" comment="libpostproc58-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011531" comment="libswresample5-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011532" comment="libswresample5-32bit-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011533" comment="libswscale8-7.1.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011534" comment="libswscale8-32bit-7.1.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253718" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.12-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6199" ref_url="https://www.suse.com/security/cve/CVE-2025-6199/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.12-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-31"/>
	<updated date="2025-07-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6199/">CVE-2025-6199 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6199">CVE-2025-6199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011632" comment="gdk-pixbuf-devel-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011633" comment="gdk-pixbuf-devel-32bit-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011634" comment="gdk-pixbuf-lang-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011635" comment="gdk-pixbuf-query-loaders-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011636" comment="gdk-pixbuf-query-loaders-32bit-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011637" comment="gdk-pixbuf-thumbnailer-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011638" comment="libgdk_pixbuf-2_0-0-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011639" comment="libgdk_pixbuf-2_0-0-32bit-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011640" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011641" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253719" version="1" class="patch">
	<metadata>
		<title>kwctl-1.27.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53901" ref_url="https://www.suse.com/security/cve/CVE-2025-53901/" source="CVE"/>
		<description>
These are all security issues fixed in the kwctl-1.27.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-31"/>
	<updated date="2025-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53901/">CVE-2025-53901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53901">CVE-2025-53901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011642" comment="kwctl-1.27.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253720" version="1" class="patch">
	<metadata>
		<title>chromedriver-138.0.7204.183-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8292" ref_url="https://www.suse.com/security/cve/CVE-2025-8292/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-138.0.7204.183-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-01"/>
	<updated date="2025-08-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8292/">CVE-2025-8292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8292">CVE-2025-8292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011822" comment="chromedriver-138.0.7204.183-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011823" comment="chromium-138.0.7204.183-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253721" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-56738" ref_url="https://www.suse.com/security/cve/CVE-2024-56738/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-56.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-03"/>
	<updated date="2025-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56738/">CVE-2024-56738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56738">CVE-2024-56738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011895" comment="grub2-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011896" comment="grub2-branding-upstream-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011897" comment="grub2-common-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011898" comment="grub2-i386-efi-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011899" comment="grub2-i386-efi-bls-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011900" comment="grub2-i386-efi-debug-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011901" comment="grub2-i386-efi-extras-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011902" comment="grub2-i386-pc-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011903" comment="grub2-i386-pc-debug-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011904" comment="grub2-i386-pc-extras-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011905" comment="grub2-i386-xen-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011906" comment="grub2-i386-xen-debug-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011907" comment="grub2-i386-xen-extras-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011908" comment="grub2-snapper-plugin-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011909" comment="grub2-systemd-sleep-plugin-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011910" comment="grub2-x86_64-efi-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011911" comment="grub2-x86_64-efi-bls-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011912" comment="grub2-x86_64-efi-debug-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011913" comment="grub2-x86_64-efi-extras-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011914" comment="grub2-x86_64-xen-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011915" comment="grub2-x86_64-xen-debug-2.12-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011916" comment="grub2-x86_64-xen-extras-2.12-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253722" version="1" class="patch">
	<metadata>
		<title>liblua5_5-5-5.5.0~beta1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888/" source="CVE"/>
		<reference ref_id="CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945/" source="CVE"/>
		<reference ref_id="CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342/" source="CVE"/>
		<reference ref_id="CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369/" source="CVE"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<reference ref_id="CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519/" source="CVE"/>
		<reference ref_id="CVE-2021-44647" ref_url="https://www.suse.com/security/cve/CVE-2021-44647/" source="CVE"/>
		<reference ref_id="CVE-2022-33099" ref_url="https://www.suse.com/security/cve/CVE-2022-33099/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_5-5-5.5.0~beta1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-03"/>
	<updated date="2025-08-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15888">CVE-2020-15888 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15945">CVE-2020-15945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24342">CVE-2020-24342 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24369">CVE-2020-24369 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44647/">CVE-2021-44647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44647">CVE-2021-44647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33099/">CVE-2022-33099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011917" comment="liblua5_5-5-5.5.0~beta1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011918" comment="lua55-5.5.0~beta1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011919" comment="lua55-devel-5.5.0~beta1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011920" comment="lua55-doc-5.5.0~beta1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253723" version="1" class="patch">
	<metadata>
		<title>python310-3.10.18-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.18-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-03"/>
	<updated date="2025-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011921" comment="python310-3.10.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011922" comment="python310-32bit-3.10.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011923" comment="python310-curses-3.10.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011924" comment="python310-dbm-3.10.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011925" comment="python310-idle-3.10.18-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011926" comment="python310-tk-3.10.18-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253724" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0~rc1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0~rc1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-03"/>
	<updated date="2025-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011927" comment="python314-3.14.0~rc1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011928" comment="python314-curses-3.14.0~rc1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011929" comment="python314-dbm-3.14.0~rc1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011930" comment="python314-idle-3.14.0~rc1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011931" comment="python314-tk-3.14.0~rc1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011932" comment="python314-x86-64-v3-3.14.0~rc1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253725" version="1" class="patch">
	<metadata>
		<title>python39-3.9.23-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.23-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-03"/>
	<updated date="2025-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011933" comment="python39-3.9.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011934" comment="python39-curses-3.9.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011935" comment="python39-dbm-3.9.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011936" comment="python39-idle-3.9.23-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011937" comment="python39-tk-3.9.23-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253726" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-44905" ref_url="https://www.suse.com/security/cve/CVE-2024-44905/" source="CVE"/>
		<reference ref_id="CVE-2024-44906" ref_url="https://www.suse.com/security/cve/CVE-2024-44906/" source="CVE"/>
		<reference ref_id="CVE-2024-56731" ref_url="https://www.suse.com/security/cve/CVE-2024-56731/" source="CVE"/>
		<reference ref_id="CVE-2025-0928" ref_url="https://www.suse.com/security/cve/CVE-2025-0928/" source="CVE"/>
		<reference ref_id="CVE-2025-1088" ref_url="https://www.suse.com/security/cve/CVE-2025-1088/" source="CVE"/>
		<reference ref_id="CVE-2025-30086" ref_url="https://www.suse.com/security/cve/CVE-2025-30086/" source="CVE"/>
		<reference ref_id="CVE-2025-32019" ref_url="https://www.suse.com/security/cve/CVE-2025-32019/" source="CVE"/>
		<reference ref_id="CVE-2025-3227" ref_url="https://www.suse.com/security/cve/CVE-2025-3227/" source="CVE"/>
		<reference ref_id="CVE-2025-3228" ref_url="https://www.suse.com/security/cve/CVE-2025-3228/" source="CVE"/>
		<reference ref_id="CVE-2025-3415" ref_url="https://www.suse.com/security/cve/CVE-2025-3415/" source="CVE"/>
		<reference ref_id="CVE-2025-4563" ref_url="https://www.suse.com/security/cve/CVE-2025-4563/" source="CVE"/>
		<reference ref_id="CVE-2025-4656" ref_url="https://www.suse.com/security/cve/CVE-2025-4656/" source="CVE"/>
		<reference ref_id="CVE-2025-46702" ref_url="https://www.suse.com/security/cve/CVE-2025-46702/" source="CVE"/>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<reference ref_id="CVE-2025-47281" ref_url="https://www.suse.com/security/cve/CVE-2025-47281/" source="CVE"/>
		<reference ref_id="CVE-2025-47871" ref_url="https://www.suse.com/security/cve/CVE-2025-47871/" source="CVE"/>
		<reference ref_id="CVE-2025-47943" ref_url="https://www.suse.com/security/cve/CVE-2025-47943/" source="CVE"/>
		<reference ref_id="CVE-2025-4922" ref_url="https://www.suse.com/security/cve/CVE-2025-4922/" source="CVE"/>
		<reference ref_id="CVE-2025-4981" ref_url="https://www.suse.com/security/cve/CVE-2025-4981/" source="CVE"/>
		<reference ref_id="CVE-2025-49825" ref_url="https://www.suse.com/security/cve/CVE-2025-49825/" source="CVE"/>
		<reference ref_id="CVE-2025-5030" ref_url="https://www.suse.com/security/cve/CVE-2025-5030/" source="CVE"/>
		<reference ref_id="CVE-2025-51471" ref_url="https://www.suse.com/security/cve/CVE-2025-51471/" source="CVE"/>
		<reference ref_id="CVE-2025-52477" ref_url="https://www.suse.com/security/cve/CVE-2025-52477/" source="CVE"/>
		<reference ref_id="CVE-2025-52889" ref_url="https://www.suse.com/security/cve/CVE-2025-52889/" source="CVE"/>
		<reference ref_id="CVE-2025-52890" ref_url="https://www.suse.com/security/cve/CVE-2025-52890/" source="CVE"/>
		<reference ref_id="CVE-2025-52893" ref_url="https://www.suse.com/security/cve/CVE-2025-52893/" source="CVE"/>
		<reference ref_id="CVE-2025-52894" ref_url="https://www.suse.com/security/cve/CVE-2025-52894/" source="CVE"/>
		<reference ref_id="CVE-2025-52900" ref_url="https://www.suse.com/security/cve/CVE-2025-52900/" source="CVE"/>
		<reference ref_id="CVE-2025-52901" ref_url="https://www.suse.com/security/cve/CVE-2025-52901/" source="CVE"/>
		<reference ref_id="CVE-2025-52902" ref_url="https://www.suse.com/security/cve/CVE-2025-52902/" source="CVE"/>
		<reference ref_id="CVE-2025-52903" ref_url="https://www.suse.com/security/cve/CVE-2025-52903/" source="CVE"/>
		<reference ref_id="CVE-2025-52904" ref_url="https://www.suse.com/security/cve/CVE-2025-52904/" source="CVE"/>
		<reference ref_id="CVE-2025-52995" ref_url="https://www.suse.com/security/cve/CVE-2025-52995/" source="CVE"/>
		<reference ref_id="CVE-2025-52996" ref_url="https://www.suse.com/security/cve/CVE-2025-52996/" source="CVE"/>
		<reference ref_id="CVE-2025-52997" ref_url="https://www.suse.com/security/cve/CVE-2025-52997/" source="CVE"/>
		<reference ref_id="CVE-2025-53512" ref_url="https://www.suse.com/security/cve/CVE-2025-53512/" source="CVE"/>
		<reference ref_id="CVE-2025-53513" ref_url="https://www.suse.com/security/cve/CVE-2025-53513/" source="CVE"/>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<reference ref_id="CVE-2025-53632" ref_url="https://www.suse.com/security/cve/CVE-2025-53632/" source="CVE"/>
		<reference ref_id="CVE-2025-53633" ref_url="https://www.suse.com/security/cve/CVE-2025-53633/" source="CVE"/>
		<reference ref_id="CVE-2025-53634" ref_url="https://www.suse.com/security/cve/CVE-2025-53634/" source="CVE"/>
		<reference ref_id="CVE-2025-53826" ref_url="https://www.suse.com/security/cve/CVE-2025-53826/" source="CVE"/>
		<reference ref_id="CVE-2025-53893" ref_url="https://www.suse.com/security/cve/CVE-2025-53893/" source="CVE"/>
		<reference ref_id="CVE-2025-53945" ref_url="https://www.suse.com/security/cve/CVE-2025-53945/" source="CVE"/>
		<reference ref_id="CVE-2025-54059" ref_url="https://www.suse.com/security/cve/CVE-2025-54059/" source="CVE"/>
		<reference ref_id="CVE-2025-54379" ref_url="https://www.suse.com/security/cve/CVE-2025-54379/" source="CVE"/>
		<reference ref_id="CVE-2025-5689" ref_url="https://www.suse.com/security/cve/CVE-2025-5689/" source="CVE"/>
		<reference ref_id="CVE-2025-5981" ref_url="https://www.suse.com/security/cve/CVE-2025-5981/" source="CVE"/>
		<reference ref_id="CVE-2025-6023" ref_url="https://www.suse.com/security/cve/CVE-2025-6023/" source="CVE"/>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<reference ref_id="CVE-2025-6224" ref_url="https://www.suse.com/security/cve/CVE-2025-6224/" source="CVE"/>
		<reference ref_id="CVE-2025-6226" ref_url="https://www.suse.com/security/cve/CVE-2025-6226/" source="CVE"/>
		<reference ref_id="CVE-2025-6227" ref_url="https://www.suse.com/security/cve/CVE-2025-6227/" source="CVE"/>
		<reference ref_id="CVE-2025-6233" ref_url="https://www.suse.com/security/cve/CVE-2025-6233/" source="CVE"/>
		<reference ref_id="CVE-2025-6264" ref_url="https://www.suse.com/security/cve/CVE-2025-6264/" source="CVE"/>
		<reference ref_id="CVE-2025-6624" ref_url="https://www.suse.com/security/cve/CVE-2025-6624/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44905/">CVE-2024-44905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44905">CVE-2024-44905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44906/">CVE-2024-44906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44906">CVE-2024-44906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56731/">CVE-2024-56731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56731">CVE-2024-56731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0928/">CVE-2025-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0928">CVE-2025-0928 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1088/">CVE-2025-1088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1088">CVE-2025-1088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30086/">CVE-2025-30086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30086">CVE-2025-30086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32019/">CVE-2025-32019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32019">CVE-2025-32019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3227/">CVE-2025-3227 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3227">CVE-2025-3227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3228/">CVE-2025-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3228">CVE-2025-3228 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3415/">CVE-2025-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3415">CVE-2025-3415 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4563/">CVE-2025-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4563">CVE-2025-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4656/">CVE-2025-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4656">CVE-2025-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46702/">CVE-2025-46702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46702">CVE-2025-46702 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47281/">CVE-2025-47281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47281">CVE-2025-47281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47871/">CVE-2025-47871 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47871">CVE-2025-47871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47943/">CVE-2025-47943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47943">CVE-2025-47943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4922/">CVE-2025-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4922">CVE-2025-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4981/">CVE-2025-4981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4981">CVE-2025-4981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49825/">CVE-2025-49825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49825">CVE-2025-49825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5030/">CVE-2025-5030 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5030">CVE-2025-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-51471/">CVE-2025-51471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-51471">CVE-2025-51471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52477/">CVE-2025-52477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52477">CVE-2025-52477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52889/">CVE-2025-52889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52889">CVE-2025-52889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52890/">CVE-2025-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52890">CVE-2025-52890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52893/">CVE-2025-52893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52893">CVE-2025-52893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52894/">CVE-2025-52894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52894">CVE-2025-52894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52900/">CVE-2025-52900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52900">CVE-2025-52900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52901/">CVE-2025-52901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52901">CVE-2025-52901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52902/">CVE-2025-52902 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52902">CVE-2025-52902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52903/">CVE-2025-52903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52903">CVE-2025-52903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52904/">CVE-2025-52904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52904">CVE-2025-52904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52995/">CVE-2025-52995 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52995">CVE-2025-52995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52996/">CVE-2025-52996 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52996">CVE-2025-52996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52997/">CVE-2025-52997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52997">CVE-2025-52997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53512/">CVE-2025-53512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53512">CVE-2025-53512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53513/">CVE-2025-53513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53513">CVE-2025-53513 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53632/">CVE-2025-53632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53632">CVE-2025-53632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53633/">CVE-2025-53633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53633">CVE-2025-53633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53634/">CVE-2025-53634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53634">CVE-2025-53634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53826/">CVE-2025-53826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53826">CVE-2025-53826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53893/">CVE-2025-53893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53893">CVE-2025-53893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53945/">CVE-2025-53945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53945">CVE-2025-53945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54059/">CVE-2025-54059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54059">CVE-2025-54059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54379/">CVE-2025-54379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54379">CVE-2025-54379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5689/">CVE-2025-5689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5689">CVE-2025-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5981/">CVE-2025-5981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5981">CVE-2025-5981 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6023/">CVE-2025-6023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6023">CVE-2025-6023 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6224/">CVE-2025-6224 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6224">CVE-2025-6224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6226/">CVE-2025-6226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6226">CVE-2025-6226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6227/">CVE-2025-6227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6227">CVE-2025-6227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6233/">CVE-2025-6233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6233">CVE-2025-6233 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6264/">CVE-2025-6264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6264">CVE-2025-6264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6624/">CVE-2025-6624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6624">CVE-2025-6624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012325" comment="govulncheck-vulndb-0.0.20250730T213748-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253727" version="1" class="patch">
	<metadata>
		<title>kubeshark-cli-52.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the kubeshark-cli-52.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012326" comment="kubeshark-cli-52.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012327" comment="kubeshark-cli-bash-completion-52.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012328" comment="kubeshark-cli-fish-completion-52.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012329" comment="kubeshark-cli-zsh-completion-52.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253728" version="1" class="patch">
	<metadata>
		<title>python311-3.11.13-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.13-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012330" comment="python311-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012331" comment="python311-32bit-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012332" comment="python311-curses-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012333" comment="python311-dbm-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012334" comment="python311-idle-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012335" comment="python311-tk-3.11.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012336" comment="python311-x86-64-v3-3.11.13-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253729" version="1" class="patch">
	<metadata>
		<title>python312-3.12.11-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.11-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012337" comment="python312-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012338" comment="python312-32bit-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012339" comment="python312-curses-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012340" comment="python312-dbm-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012341" comment="python312-idle-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012342" comment="python312-tk-3.12.11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012343" comment="python312-x86-64-v3-3.12.11-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253730" version="1" class="patch">
	<metadata>
		<title>python313-3.13.5-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.5-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012344" comment="python313-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012345" comment="python313-32bit-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012346" comment="python313-curses-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012347" comment="python313-dbm-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012348" comment="python313-idle-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012349" comment="python313-tk-3.13.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012350" comment="python313-x86-64-v3-3.13.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253731" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.13.7-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50200" ref_url="https://www.suse.com/security/cve/CVE-2025-50200/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.13.7-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-50200/">CVE-2025-50200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50200">CVE-2025-50200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012351" comment="erlang-rabbitmq-client-3.13.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012352" comment="rabbitmq-server-3.13.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012353" comment="rabbitmq-server-bash-completion-3.13.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012354" comment="rabbitmq-server-plugins-3.13.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012355" comment="rabbitmq-server-zsh-completion-3.13.7-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253732" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988/" source="CVE"/>
		<reference ref_id="CVE-2025-32989" ref_url="https://www.suse.com/security/cve/CVE-2025-32989/" source="CVE"/>
		<reference ref_id="CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990/" source="CVE"/>
		<reference ref_id="CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32989/">CVE-2025-32989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32989">CVE-2025-32989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012775" comment="gnutls-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012776" comment="libgnutls-dane-devel-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012777" comment="libgnutls-dane0-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012778" comment="libgnutls-devel-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012779" comment="libgnutls-devel-32bit-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012780" comment="libgnutls-devel-doc-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012781" comment="libgnutls30-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012782" comment="libgnutls30-32bit-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012783" comment="libgnutlsxx-devel-3.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012784" comment="libgnutlsxx30-3.8.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253733" version="1" class="patch">
	<metadata>
		<title>agama-17+60.68fdb92ec-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the agama-17+60.68fdb92ec-26.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013034" comment="agama-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013035" comment="agama-autoinstall-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013036" comment="agama-cli-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013037" comment="agama-cli-bash-completion-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013038" comment="agama-cli-fish-completion-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013039" comment="agama-cli-zsh-completion-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013040" comment="agama-openapi-17+60.68fdb92ec-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013041" comment="agama-scripts-17+60.68fdb92ec-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253734" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.05.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46646" ref_url="https://www.suse.com/security/cve/CVE-2025-46646/" source="CVE"/>
		<reference ref_id="CVE-2025-48708" ref_url="https://www.suse.com/security/cve/CVE-2025-48708/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.05.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-46646/">CVE-2025-46646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46646">CVE-2025-46646 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-48708/">CVE-2025-48708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48708">CVE-2025-48708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013042" comment="ghostscript-10.05.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013043" comment="ghostscript-devel-10.05.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013044" comment="ghostscript-x11-10.05.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253735" version="1" class="patch">
	<metadata>
		<title>iperf-3.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54349" ref_url="https://www.suse.com/security/cve/CVE-2025-54349/" source="CVE"/>
		<reference ref_id="CVE-2025-54350" ref_url="https://www.suse.com/security/cve/CVE-2025-54350/" source="CVE"/>
		<reference ref_id="CVE-2025-54351" ref_url="https://www.suse.com/security/cve/CVE-2025-54351/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-54349/">CVE-2025-54349 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54349">CVE-2025-54349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-54350/">CVE-2025-54350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54350">CVE-2025-54350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-54351/">CVE-2025-54351 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54351">CVE-2025-54351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013045" comment="iperf-3.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013046" comment="iperf-devel-3.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013047" comment="libiperf0-3.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253736" version="1" class="patch">
	<metadata>
		<title>libIex-3_3-32-3.3.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48071" ref_url="https://www.suse.com/security/cve/CVE-2025-48071/" source="CVE"/>
		<reference ref_id="CVE-2025-48072" ref_url="https://www.suse.com/security/cve/CVE-2025-48072/" source="CVE"/>
		<reference ref_id="CVE-2025-48073" ref_url="https://www.suse.com/security/cve/CVE-2025-48073/" source="CVE"/>
		<reference ref_id="CVE-2025-48074" ref_url="https://www.suse.com/security/cve/CVE-2025-48074/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_3-32-3.3.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48071/">CVE-2025-48071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48071">CVE-2025-48071 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48072/">CVE-2025-48072 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48072">CVE-2025-48072 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48073/">CVE-2025-48073 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48073">CVE-2025-48073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48074/">CVE-2025-48074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48074">CVE-2025-48074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013048" comment="libIex-3_3-32-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013049" comment="libIex-3_3-32-32bit-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013050" comment="libIex-3_3-32-x86-64-v3-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013051" comment="libIlmThread-3_3-32-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013052" comment="libIlmThread-3_3-32-32bit-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013053" comment="libIlmThread-3_3-32-x86-64-v3-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013054" comment="libOpenEXR-3_3-32-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013055" comment="libOpenEXR-3_3-32-32bit-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013056" comment="libOpenEXR-3_3-32-x86-64-v3-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013057" comment="libOpenEXRCore-3_3-32-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013058" comment="libOpenEXRCore-3_3-32-32bit-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013059" comment="libOpenEXRCore-3_3-32-x86-64-v3-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013060" comment="libOpenEXRUtil-3_3-32-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013061" comment="libOpenEXRUtil-3_3-32-32bit-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013062" comment="libOpenEXRUtil-3_3-32-x86-64-v3-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013063" comment="openexr-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013064" comment="openexr-devel-3.3.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013065" comment="openexr-doc-3.3.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253737" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.08.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50420" ref_url="https://www.suse.com/security/cve/CVE-2025-50420/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.08.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-50420/">CVE-2025-50420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50420">CVE-2025-50420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013066" comment="libpoppler-cpp2-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013067" comment="libpoppler-cpp2-32bit-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013068" comment="libpoppler-devel-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013069" comment="libpoppler-glib-devel-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013070" comment="libpoppler-glib8-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013071" comment="libpoppler-glib8-32bit-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013072" comment="libpoppler152-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013073" comment="libpoppler152-32bit-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013074" comment="poppler-tools-25.08.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013075" comment="typelib-1_0-Poppler-0_18-25.08.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253738" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.7.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<reference ref_id="CVE-2025-8177" ref_url="https://www.suse.com/security/cve/CVE-2025-8177/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.7.0-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8177/">CVE-2025-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8177">CVE-2025-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013076" comment="libtiff-devel-4.7.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013077" comment="libtiff-devel-32bit-4.7.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013078" comment="libtiff6-4.7.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013079" comment="libtiff6-32bit-4.7.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013080" comment="tiff-4.7.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253739" version="1" class="patch">
	<metadata>
		<title>traefik-3.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013081" comment="traefik-3.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253740" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013082" comment="traefik2-2.11.28-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253741" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25rc3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25rc3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-07"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013155" comment="go1.25-1.25rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013156" comment="go1.25-doc-1.25rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013157" comment="go1.25-libstd-1.25rc3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013158" comment="go1.25-race-1.25rc3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253742" version="1" class="patch">
	<metadata>
		<title>chromedriver-139.0.7258.66-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54874" ref_url="https://www.suse.com/security/cve/CVE-2025-54874/" source="CVE"/>
		<reference ref_id="CVE-2025-8576" ref_url="https://www.suse.com/security/cve/CVE-2025-8576/" source="CVE"/>
		<reference ref_id="CVE-2025-8577" ref_url="https://www.suse.com/security/cve/CVE-2025-8577/" source="CVE"/>
		<reference ref_id="CVE-2025-8578" ref_url="https://www.suse.com/security/cve/CVE-2025-8578/" source="CVE"/>
		<reference ref_id="CVE-2025-8579" ref_url="https://www.suse.com/security/cve/CVE-2025-8579/" source="CVE"/>
		<reference ref_id="CVE-2025-8580" ref_url="https://www.suse.com/security/cve/CVE-2025-8580/" source="CVE"/>
		<reference ref_id="CVE-2025-8581" ref_url="https://www.suse.com/security/cve/CVE-2025-8581/" source="CVE"/>
		<reference ref_id="CVE-2025-8582" ref_url="https://www.suse.com/security/cve/CVE-2025-8582/" source="CVE"/>
		<reference ref_id="CVE-2025-8583" ref_url="https://www.suse.com/security/cve/CVE-2025-8583/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-139.0.7258.66-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54874/">CVE-2025-54874 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54874">CVE-2025-54874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8576/">CVE-2025-8576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8576">CVE-2025-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8577/">CVE-2025-8577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8577">CVE-2025-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8578/">CVE-2025-8578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8578">CVE-2025-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8579/">CVE-2025-8579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8579">CVE-2025-8579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8580/">CVE-2025-8580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8580">CVE-2025-8580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8581/">CVE-2025-8581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8581">CVE-2025-8581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8582/">CVE-2025-8582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8582">CVE-2025-8582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8583/">CVE-2025-8583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8583">CVE-2025-8583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013204" comment="chromedriver-139.0.7258.66-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013205" comment="chromium-139.0.7258.66-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253743" version="1" class="patch">
	<metadata>
		<title>go1.23-1.23.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.23-1.23.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013206" comment="go1.23-1.23.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013207" comment="go1.23-doc-1.23.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013208" comment="go1.23-libstd-1.23.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013209" comment="go1.23-race-1.23.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253744" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013210" comment="go1.24-1.24.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013211" comment="go1.24-doc-1.24.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013212" comment="go1.24-libstd-1.24.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013213" comment="go1.24-race-1.24.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253745" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250807T150727-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7561" ref_url="https://www.suse.com/security/cve/CVE-2015-7561/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-1000056" ref_url="https://www.suse.com/security/cve/CVE-2017-1000056/" source="CVE"/>
		<reference ref_id="CVE-2017-1002102" ref_url="https://www.suse.com/security/cve/CVE-2017-1002102/" source="CVE"/>
		<reference ref_id="CVE-2018-1002100" ref_url="https://www.suse.com/security/cve/CVE-2018-1002100/" source="CVE"/>
		<reference ref_id="CVE-2018-1002101" ref_url="https://www.suse.com/security/cve/CVE-2018-1002101/" source="CVE"/>
		<reference ref_id="CVE-2018-16733" ref_url="https://www.suse.com/security/cve/CVE-2018-16733/" source="CVE"/>
		<reference ref_id="CVE-2018-19184" ref_url="https://www.suse.com/security/cve/CVE-2018-19184/" source="CVE"/>
		<reference ref_id="CVE-2019-1002100" ref_url="https://www.suse.com/security/cve/CVE-2019-1002100/" source="CVE"/>
		<reference ref_id="CVE-2019-1002101" ref_url="https://www.suse.com/security/cve/CVE-2019-1002101/" source="CVE"/>
		<reference ref_id="CVE-2019-11245" ref_url="https://www.suse.com/security/cve/CVE-2019-11245/" source="CVE"/>
		<reference ref_id="CVE-2019-11251" ref_url="https://www.suse.com/security/cve/CVE-2019-11251/" source="CVE"/>
		<reference ref_id="CVE-2019-11253" ref_url="https://www.suse.com/security/cve/CVE-2019-11253/" source="CVE"/>
		<reference ref_id="CVE-2020-26240" ref_url="https://www.suse.com/security/cve/CVE-2020-26240/" source="CVE"/>
		<reference ref_id="CVE-2020-26241" ref_url="https://www.suse.com/security/cve/CVE-2020-26241/" source="CVE"/>
		<reference ref_id="CVE-2020-8551" ref_url="https://www.suse.com/security/cve/CVE-2020-8551/" source="CVE"/>
		<reference ref_id="CVE-2020-8555" ref_url="https://www.suse.com/security/cve/CVE-2020-8555/" source="CVE"/>
		<reference ref_id="CVE-2020-8557" ref_url="https://www.suse.com/security/cve/CVE-2020-8557/" source="CVE"/>
		<reference ref_id="CVE-2020-8558" ref_url="https://www.suse.com/security/cve/CVE-2020-8558/" source="CVE"/>
		<reference ref_id="CVE-2020-8562" ref_url="https://www.suse.com/security/cve/CVE-2020-8562/" source="CVE"/>
		<reference ref_id="CVE-2020-8563" ref_url="https://www.suse.com/security/cve/CVE-2020-8563/" source="CVE"/>
		<reference ref_id="CVE-2020-8566" ref_url="https://www.suse.com/security/cve/CVE-2020-8566/" source="CVE"/>
		<reference ref_id="CVE-2021-25735" ref_url="https://www.suse.com/security/cve/CVE-2021-25735/" source="CVE"/>
		<reference ref_id="CVE-2021-25736" ref_url="https://www.suse.com/security/cve/CVE-2021-25736/" source="CVE"/>
		<reference ref_id="CVE-2021-25737" ref_url="https://www.suse.com/security/cve/CVE-2021-25737/" source="CVE"/>
		<reference ref_id="CVE-2021-25741" ref_url="https://www.suse.com/security/cve/CVE-2021-25741/" source="CVE"/>
		<reference ref_id="CVE-2021-25743" ref_url="https://www.suse.com/security/cve/CVE-2021-25743/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2022-29177" ref_url="https://www.suse.com/security/cve/CVE-2022-29177/" source="CVE"/>
		<reference ref_id="CVE-2022-3162" ref_url="https://www.suse.com/security/cve/CVE-2022-3162/" source="CVE"/>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<reference ref_id="CVE-2023-2431" ref_url="https://www.suse.com/security/cve/CVE-2023-2431/" source="CVE"/>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<reference ref_id="CVE-2023-5528" ref_url="https://www.suse.com/security/cve/CVE-2023-5528/" source="CVE"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="CVE-2024-5321" ref_url="https://www.suse.com/security/cve/CVE-2024-5321/" source="CVE"/>
		<reference ref_id="CVE-2025-3445" ref_url="https://www.suse.com/security/cve/CVE-2025-3445/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<reference ref_id="CVE-2025-47908" ref_url="https://www.suse.com/security/cve/CVE-2025-47908/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250807T150727-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7561/">CVE-2015-7561 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7561">CVE-2015-7561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000056/">CVE-2017-1000056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000056">CVE-2017-1000056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1002102/">CVE-2017-1002102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002102">CVE-2017-1002102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1002100/">CVE-2018-1002100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002100">CVE-2018-1002100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1002101/">CVE-2018-1002101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002101">CVE-2018-1002101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16733/">CVE-2018-16733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16733">CVE-2018-16733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19184/">CVE-2018-19184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19184">CVE-2018-19184 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1002100/">CVE-2019-1002100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1002100">CVE-2019-1002100 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-1002101/">CVE-2019-1002101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1002101">CVE-2019-1002101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11245/">CVE-2019-11245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11245">CVE-2019-11245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11251/">CVE-2019-11251 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11251">CVE-2019-11251 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11253/">CVE-2019-11253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11253">CVE-2019-11253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26240/">CVE-2020-26240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26240">CVE-2020-26240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26241/">CVE-2020-26241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26241">CVE-2020-26241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8551/">CVE-2020-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8551">CVE-2020-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8555/">CVE-2020-8555 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8555">CVE-2020-8555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8557/">CVE-2020-8557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8557">CVE-2020-8557 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8558/">CVE-2020-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8558">CVE-2020-8558 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8562/">CVE-2020-8562 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8562">CVE-2020-8562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8563/">CVE-2020-8563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8563">CVE-2020-8563 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8566/">CVE-2020-8566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8566">CVE-2020-8566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25735/">CVE-2021-25735 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25735">CVE-2021-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-25736/">CVE-2021-25736 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25736">CVE-2021-25736 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25737/">CVE-2021-25737 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25737">CVE-2021-25737 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25741/">CVE-2021-25741 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25741">CVE-2021-25741 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25743/">CVE-2021-25743 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25743">CVE-2021-25743 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29177/">CVE-2022-29177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29177">CVE-2022-29177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3162/">CVE-2022-3162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3162">CVE-2022-3162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2431/">CVE-2023-2431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2431">CVE-2023-2431 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5528/">CVE-2023-5528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5528">CVE-2023-5528 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5321/">CVE-2024-5321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5321">CVE-2024-5321 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-3445/">CVE-2025-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3445">CVE-2025-3445 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47908/">CVE-2025-47908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47908">CVE-2025-47908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013214" comment="govulncheck-vulndb-0.0.20250807T150727-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253746" version="1" class="patch">
	<metadata>
		<title>himmelblau-1.2.0+git.0.6befefc-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54882" ref_url="https://www.suse.com/security/cve/CVE-2025-54882/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-1.2.0+git.0.6befefc-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54882/">CVE-2025-54882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54882">CVE-2025-54882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013215" comment="himmelblau-1.2.0+git.0.6befefc-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013216" comment="himmelblau-qr-greeter-1.2.0+git.0.6befefc-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013217" comment="himmelblau-sshd-config-1.2.0+git.0.6befefc-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013218" comment="himmelblau-sso-1.2.0+git.0.6befefc-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013219" comment="libnss_himmelblau2-1.2.0+git.0.6befefc-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013220" comment="pam-himmelblau-1.2.0+git.0.6befefc-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253747" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.7+141-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58266" ref_url="https://www.suse.com/security/cve/CVE-2025-58266/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.7+141-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58266/">CVE-2025-58266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58266">CVE-2025-58266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013221" comment="keylime-ima-policy-0.2.7+141-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013222" comment="rust-keylime-0.2.7+141-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253748" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7700" ref_url="https://www.suse.com/security/cve/CVE-2025-7700/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7700/">CVE-2025-7700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7700">CVE-2025-7700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013223" comment="ffmpeg-4-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013224" comment="ffmpeg-4-libavcodec-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013225" comment="ffmpeg-4-libavdevice-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013226" comment="ffmpeg-4-libavfilter-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013227" comment="ffmpeg-4-libavformat-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013228" comment="ffmpeg-4-libavresample-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013229" comment="ffmpeg-4-libavutil-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013230" comment="ffmpeg-4-libpostproc-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013231" comment="ffmpeg-4-libswresample-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013232" comment="ffmpeg-4-libswscale-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013233" comment="ffmpeg-4-private-devel-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013234" comment="libavcodec58_134-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013235" comment="libavcodec58_134-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013236" comment="libavdevice58_13-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013237" comment="libavdevice58_13-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013238" comment="libavfilter7_110-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013239" comment="libavfilter7_110-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013240" comment="libavformat58_76-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013241" comment="libavformat58_76-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013242" comment="libavresample4_0-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013243" comment="libavresample4_0-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013244" comment="libavutil56_70-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013245" comment="libavutil56_70-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013246" comment="libpostproc55_9-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013247" comment="libpostproc55_9-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013248" comment="libswresample3_9-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013249" comment="libswresample3_9-32bit-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013250" comment="libswscale5_9-4.4.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013251" comment="libswscale5_9-32bit-4.4.6-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253749" version="1" class="patch">
	<metadata>
		<title>net-tools-2.10-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836/" source="CVE"/>
		<description>
These are all security issues fixed in the net-tools-2.10-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013252" comment="net-tools-2.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013253" comment="net-tools-deprecated-2.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013254" comment="net-tools-lang-2.10-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253750" version="1" class="patch">
	<metadata>
		<title>python311-uv-0.8.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54368" ref_url="https://www.suse.com/security/cve/CVE-2025-54368/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-uv-0.8.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54368/">CVE-2025-54368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54368">CVE-2025-54368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013255" comment="python311-uv-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013256" comment="python311-uv-bash-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013257" comment="python311-uv-fish-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013258" comment="python311-uv-zsh-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013259" comment="python312-uv-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013260" comment="python312-uv-bash-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013261" comment="python312-uv-fish-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013262" comment="python312-uv-zsh-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013263" comment="python313-uv-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013264" comment="python313-uv-bash-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013265" comment="python313-uv-fish-completion-0.8.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013266" comment="python313-uv-zsh-completion-0.8.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253751" version="1" class="patch">
	<metadata>
		<title>texmaker-6.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50952" ref_url="https://www.suse.com/security/cve/CVE-2025-50952/" source="CVE"/>
		<description>
These are all security issues fixed in the texmaker-6.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50952/">CVE-2025-50952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50952">CVE-2025-50952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013267" comment="texmaker-6.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253752" version="1" class="patch">
	<metadata>
		<title>nvidia-open-driver-G06-signed-default-devel-570.172.08-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-23277" ref_url="https://www.suse.com/security/cve/CVE-2025-23277/" source="CVE"/>
		<reference ref_id="CVE-2025-23278" ref_url="https://www.suse.com/security/cve/CVE-2025-23278/" source="CVE"/>
		<reference ref_id="CVE-2025-23279" ref_url="https://www.suse.com/security/cve/CVE-2025-23279/" source="CVE"/>
		<reference ref_id="CVE-2025-23283" ref_url="https://www.suse.com/security/cve/CVE-2025-23283/" source="CVE"/>
		<reference ref_id="CVE-2025-23286" ref_url="https://www.suse.com/security/cve/CVE-2025-23286/" source="CVE"/>
		<description>
These are all security issues fixed in the nvidia-open-driver-G06-signed-default-devel-570.172.08-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-10"/>
	<updated date="2025-08-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23277/">CVE-2025-23277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23277">CVE-2025-23277 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23278/">CVE-2025-23278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23278">CVE-2025-23278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23279/">CVE-2025-23279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23279">CVE-2025-23279 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23283/">CVE-2025-23283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23283">CVE-2025-23283 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-23286/">CVE-2025-23286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23286">CVE-2025-23286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013268" comment="nvidia-open-driver-G06-signed-default-devel-570.172.08-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013269" comment="nvidia-open-driver-G06-signed-kmp-default-570.172.08_k6.15.8_1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013270" comment="nvidia-open-driver-G06-signed-kmp-longterm-570.172.08_k6.12.41_1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013271" comment="nvidia-open-driver-G06-signed-longterm-devel-570.172.08-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253753" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.84.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7039" ref_url="https://www.suse.com/security/cve/CVE-2025-7039/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.84.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-11"/>
	<updated date="2025-08-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7039/">CVE-2025-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039">CVE-2025-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013336" comment="gio-branding-upstream-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013337" comment="glib2-devel-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013338" comment="glib2-devel-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013339" comment="glib2-devel-static-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013340" comment="glib2-lang-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013341" comment="glib2-tests-devel-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013342" comment="glib2-tools-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013343" comment="glib2-tools-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013344" comment="libgio-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013345" comment="libgio-2_0-0-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013346" comment="libgirepository-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013347" comment="libglib-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013348" comment="libglib-2_0-0-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013349" comment="libgmodule-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013350" comment="libgmodule-2_0-0-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013351" comment="libgobject-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013352" comment="libgobject-2_0-0-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013353" comment="libgthread-2_0-0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013354" comment="libgthread-2_0-0-32bit-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013355" comment="typelib-1_0-GIRepository-3_0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013356" comment="typelib-1_0-GLib-2_0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013357" comment="typelib-1_0-GLibUnix-2_0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013358" comment="typelib-1_0-GModule-2_0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013359" comment="typelib-1_0-GObject-2_0-2.84.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013360" comment="typelib-1_0-Gio-2_0-2.84.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253754" version="1" class="patch">
	<metadata>
		<title>framework-inputmodule-control-0.2.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-53156" ref_url="https://www.suse.com/security/cve/CVE-2023-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-58266" ref_url="https://www.suse.com/security/cve/CVE-2024-58266/" source="CVE"/>
		<description>
These are all security issues fixed in the framework-inputmodule-control-0.2.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-08-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53156/">CVE-2023-53156 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53156">CVE-2023-53156 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58266/">CVE-2024-58266 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58266">CVE-2024-58266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013614" comment="framework-inputmodule-control-0.2.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013615" comment="framework-inputmodule-udev-rules-0.2.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253755" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250811T192933-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-21411" ref_url="https://www.suse.com/security/cve/CVE-2021-21411/" source="CVE"/>
		<reference ref_id="CVE-2025-44779" ref_url="https://www.suse.com/security/cve/CVE-2025-44779/" source="CVE"/>
		<reference ref_id="CVE-2025-50738" ref_url="https://www.suse.com/security/cve/CVE-2025-50738/" source="CVE"/>
		<reference ref_id="CVE-2025-53534" ref_url="https://www.suse.com/security/cve/CVE-2025-53534/" source="CVE"/>
		<reference ref_id="CVE-2025-53942" ref_url="https://www.suse.com/security/cve/CVE-2025-53942/" source="CVE"/>
		<reference ref_id="CVE-2025-54386" ref_url="https://www.suse.com/security/cve/CVE-2025-54386/" source="CVE"/>
		<reference ref_id="CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388/" source="CVE"/>
		<reference ref_id="CVE-2025-54410" ref_url="https://www.suse.com/security/cve/CVE-2025-54410/" source="CVE"/>
		<reference ref_id="CVE-2025-54424" ref_url="https://www.suse.com/security/cve/CVE-2025-54424/" source="CVE"/>
		<reference ref_id="CVE-2025-54576" ref_url="https://www.suse.com/security/cve/CVE-2025-54576/" source="CVE"/>
		<reference ref_id="CVE-2025-54799" ref_url="https://www.suse.com/security/cve/CVE-2025-54799/" source="CVE"/>
		<reference ref_id="CVE-2025-54801" ref_url="https://www.suse.com/security/cve/CVE-2025-54801/" source="CVE"/>
		<reference ref_id="CVE-2025-54996" ref_url="https://www.suse.com/security/cve/CVE-2025-54996/" source="CVE"/>
		<reference ref_id="CVE-2025-54997" ref_url="https://www.suse.com/security/cve/CVE-2025-54997/" source="CVE"/>
		<reference ref_id="CVE-2025-54998" ref_url="https://www.suse.com/security/cve/CVE-2025-54998/" source="CVE"/>
		<reference ref_id="CVE-2025-54999" ref_url="https://www.suse.com/security/cve/CVE-2025-54999/" source="CVE"/>
		<reference ref_id="CVE-2025-55000" ref_url="https://www.suse.com/security/cve/CVE-2025-55000/" source="CVE"/>
		<reference ref_id="CVE-2025-55001" ref_url="https://www.suse.com/security/cve/CVE-2025-55001/" source="CVE"/>
		<reference ref_id="CVE-2025-55003" ref_url="https://www.suse.com/security/cve/CVE-2025-55003/" source="CVE"/>
		<reference ref_id="CVE-2025-5999" ref_url="https://www.suse.com/security/cve/CVE-2025-5999/" source="CVE"/>
		<reference ref_id="CVE-2025-6000" ref_url="https://www.suse.com/security/cve/CVE-2025-6000/" source="CVE"/>
		<reference ref_id="CVE-2025-6004" ref_url="https://www.suse.com/security/cve/CVE-2025-6004/" source="CVE"/>
		<reference ref_id="CVE-2025-6011" ref_url="https://www.suse.com/security/cve/CVE-2025-6011/" source="CVE"/>
		<reference ref_id="CVE-2025-6013" ref_url="https://www.suse.com/security/cve/CVE-2025-6013/" source="CVE"/>
		<reference ref_id="CVE-2025-6014" ref_url="https://www.suse.com/security/cve/CVE-2025-6014/" source="CVE"/>
		<reference ref_id="CVE-2025-6015" ref_url="https://www.suse.com/security/cve/CVE-2025-6015/" source="CVE"/>
		<reference ref_id="CVE-2025-6037" ref_url="https://www.suse.com/security/cve/CVE-2025-6037/" source="CVE"/>
		<reference ref_id="CVE-2025-7195" ref_url="https://www.suse.com/security/cve/CVE-2025-7195/" source="CVE"/>
		<reference ref_id="CVE-2025-8341" ref_url="https://www.suse.com/security/cve/CVE-2025-8341/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250811T192933-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-08-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21411/">CVE-2021-21411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21411">CVE-2021-21411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-44779/">CVE-2025-44779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-44779">CVE-2025-44779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50738/">CVE-2025-50738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50738">CVE-2025-50738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53534/">CVE-2025-53534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53534">CVE-2025-53534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53942/">CVE-2025-53942 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53942">CVE-2025-53942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54386/">CVE-2025-54386 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54386">CVE-2025-54386 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54410/">CVE-2025-54410 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54410">CVE-2025-54410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54424/">CVE-2025-54424 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54424">CVE-2025-54424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54576/">CVE-2025-54576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54576">CVE-2025-54576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54799/">CVE-2025-54799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54799">CVE-2025-54799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54801/">CVE-2025-54801 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54801">CVE-2025-54801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54996/">CVE-2025-54996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54996">CVE-2025-54996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54997/">CVE-2025-54997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54997">CVE-2025-54997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54998/">CVE-2025-54998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54998">CVE-2025-54998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54999/">CVE-2025-54999 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54999">CVE-2025-54999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55000/">CVE-2025-55000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55000">CVE-2025-55000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55001/">CVE-2025-55001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55001">CVE-2025-55001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55003/">CVE-2025-55003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55003">CVE-2025-55003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5999/">CVE-2025-5999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5999">CVE-2025-5999 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5.5/CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6000/">CVE-2025-6000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6000">CVE-2025-6000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6004/">CVE-2025-6004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6004">CVE-2025-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6011/">CVE-2025-6011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6011">CVE-2025-6011 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6013/">CVE-2025-6013 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6013">CVE-2025-6013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6014/">CVE-2025-6014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6014">CVE-2025-6014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6015/">CVE-2025-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6015">CVE-2025-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6037/">CVE-2025-6037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6037">CVE-2025-6037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7195/">CVE-2025-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7195">CVE-2025-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8341/">CVE-2025-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8341">CVE-2025-8341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013616" comment="govulncheck-vulndb-0.0.20250811T192933-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253756" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.23.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5994" ref_url="https://www.suse.com/security/cve/CVE-2025-5994/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.23.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-08-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5994/">CVE-2025-5994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994">CVE-2025-5994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013617" comment="libunbound8-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013618" comment="python3-unbound-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013619" comment="unbound-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013620" comment="unbound-anchor-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013621" comment="unbound-devel-1.23.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013622" comment="unbound-munin-1.23.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253757" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.136.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-49090" ref_url="https://www.suse.com/security/cve/CVE-2025-49090/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.136.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2025-08-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49090/">CVE-2025-49090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49090">CVE-2025-49090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013877" comment="matrix-synapse-1.136.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253758" version="1" class="patch">
	<metadata>
		<title>qemu-10.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54566" ref_url="https://www.suse.com/security/cve/CVE-2025-54566/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2025-08-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54566/">CVE-2025-54566 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54566">CVE-2025-54566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013878" comment="qemu-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013879" comment="qemu-SLOF-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013880" comment="qemu-accel-qtest-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013881" comment="qemu-arm-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013882" comment="qemu-audio-alsa-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013883" comment="qemu-audio-dbus-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013884" comment="qemu-audio-jack-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013885" comment="qemu-audio-oss-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013886" comment="qemu-audio-pa-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013887" comment="qemu-audio-pipewire-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013888" comment="qemu-audio-spice-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013889" comment="qemu-block-curl-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013890" comment="qemu-block-dmg-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013891" comment="qemu-block-gluster-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013892" comment="qemu-block-iscsi-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013893" comment="qemu-block-nfs-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013894" comment="qemu-block-rbd-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013895" comment="qemu-block-ssh-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013896" comment="qemu-chardev-baum-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013897" comment="qemu-chardev-spice-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013898" comment="qemu-doc-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013899" comment="qemu-extra-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013900" comment="qemu-guest-agent-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013901" comment="qemu-headless-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013902" comment="qemu-hw-display-qxl-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013903" comment="qemu-hw-display-virtio-gpu-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013904" comment="qemu-hw-display-virtio-gpu-pci-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013905" comment="qemu-hw-display-virtio-vga-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013906" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013907" comment="qemu-hw-usb-host-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013908" comment="qemu-hw-usb-redirect-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013909" comment="qemu-hw-usb-smartcard-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013910" comment="qemu-img-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013911" comment="qemu-ipxe-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013912" comment="qemu-ivshmem-tools-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013913" comment="qemu-ksm-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013914" comment="qemu-lang-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013915" comment="qemu-microvm-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013916" comment="qemu-ppc-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013917" comment="qemu-pr-helper-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013918" comment="qemu-s390x-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013919" comment="qemu-seabios-10.0.31.16.3_3_g3d33c746-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013920" comment="qemu-skiboot-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013921" comment="qemu-spice-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013922" comment="qemu-tools-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013923" comment="qemu-ui-curses-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013924" comment="qemu-ui-dbus-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013925" comment="qemu-ui-gtk-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013926" comment="qemu-ui-opengl-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013927" comment="qemu-ui-spice-app-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013928" comment="qemu-ui-spice-core-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013929" comment="qemu-vgabios-10.0.31.16.3_3_g3d33c746-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013930" comment="qemu-vhost-user-gpu-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013931" comment="qemu-vmsr-helper-10.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013932" comment="qemu-x86-10.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253759" version="1" class="patch">
	<metadata>
		<title>rz-pm-0.3.3+git~14~gcee0d0d-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<description>
These are all security issues fixed in the rz-pm-0.3.3+git~14~gcee0d0d-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2025-08-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013933" comment="rz-pm-0.3.3+git~14~gcee0d0d-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253760" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55197" ref_url="https://www.suse.com/security/cve/CVE-2025-55197/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-14"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55197/">CVE-2025-55197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55197">CVE-2025-55197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013988" comment="python311-pypdf-6.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013989" comment="python312-pypdf-6.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013990" comment="python313-pypdf-6.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253761" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.107-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52434" ref_url="https://www.suse.com/security/cve/CVE-2025-52434/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.107-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-14"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52434/">CVE-2025-52434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52434">CVE-2025-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013991" comment="tomcat-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013992" comment="tomcat-admin-webapps-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013993" comment="tomcat-docs-webapp-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013994" comment="tomcat-el-3_0-api-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013995" comment="tomcat-embed-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013996" comment="tomcat-javadoc-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013997" comment="tomcat-jsp-2_3-api-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013998" comment="tomcat-jsvc-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013999" comment="tomcat-lib-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014000" comment="tomcat-servlet-4_0-api-9.0.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014001" comment="tomcat-webapps-9.0.107-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253762" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.43-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.43-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-14"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014002" comment="tomcat10-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014003" comment="tomcat10-admin-webapps-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014004" comment="tomcat10-doc-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014005" comment="tomcat10-docs-webapp-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014006" comment="tomcat10-el-5_0-api-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014007" comment="tomcat10-embed-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014008" comment="tomcat10-jsp-3_1-api-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014009" comment="tomcat10-jsvc-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014010" comment="tomcat10-lib-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014011" comment="tomcat10-servlet-6_0-api-10.1.43-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014012" comment="tomcat10-webapps-10.1.43-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253763" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-14"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014013" comment="tomcat11-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014014" comment="tomcat11-admin-webapps-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014015" comment="tomcat11-doc-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014016" comment="tomcat11-docs-webapp-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014017" comment="tomcat11-el-6_0-api-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014018" comment="tomcat11-embed-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014019" comment="tomcat11-jsp-4_0-api-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014020" comment="tomcat11-jsvc-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014021" comment="tomcat11-lib-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014022" comment="tomcat11-servlet-6_1-api-11.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014023" comment="tomcat11-webapps-11.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253764" version="1" class="patch">
	<metadata>
		<title>chromedriver-139.0.7258.127-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8879" ref_url="https://www.suse.com/security/cve/CVE-2025-8879/" source="CVE"/>
		<reference ref_id="CVE-2025-8880" ref_url="https://www.suse.com/security/cve/CVE-2025-8880/" source="CVE"/>
		<reference ref_id="CVE-2025-8881" ref_url="https://www.suse.com/security/cve/CVE-2025-8881/" source="CVE"/>
		<reference ref_id="CVE-2025-8882" ref_url="https://www.suse.com/security/cve/CVE-2025-8882/" source="CVE"/>
		<reference ref_id="CVE-2025-8901" ref_url="https://www.suse.com/security/cve/CVE-2025-8901/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-139.0.7258.127-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8879/">CVE-2025-8879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8879">CVE-2025-8879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8880/">CVE-2025-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8880">CVE-2025-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8881/">CVE-2025-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8881">CVE-2025-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8882/">CVE-2025-8882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8882">CVE-2025-8882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8901/">CVE-2025-8901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8901">CVE-2025-8901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014131" comment="chromedriver-139.0.7258.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014132" comment="chromium-139.0.7258.127-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253765" version="1" class="patch">
	<metadata>
		<title>framework_tool-0.4.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the framework_tool-0.4.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014133" comment="framework_tool-0.4.5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253766" version="1" class="patch">
	<metadata>
		<title>gstreamer-devtools-1.26.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-devtools-1.26.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014134" comment="gstreamer-devtools-1.26.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014135" comment="gstreamer-devtools-devel-1.26.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014136" comment="libgstvalidate-1_0-0-1.26.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014137" comment="typelib-1_0-GstValidate-1_0-1.26.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253767" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014138" comment="gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014139" comment="gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253768" version="1" class="patch">
	<metadata>
		<title>jasper-4.2.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8835" ref_url="https://www.suse.com/security/cve/CVE-2025-8835/" source="CVE"/>
		<reference ref_id="CVE-2025-8836" ref_url="https://www.suse.com/security/cve/CVE-2025-8836/" source="CVE"/>
		<reference ref_id="CVE-2025-8837" ref_url="https://www.suse.com/security/cve/CVE-2025-8837/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8835/">CVE-2025-8835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8835">CVE-2025-8835 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8836/">CVE-2025-8836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8836">CVE-2025-8836 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8837/">CVE-2025-8837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8837">CVE-2025-8837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014140" comment="jasper-4.2.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014141" comment="libjasper-devel-4.2.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014142" comment="libjasper7-4.2.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014143" comment="libjasper7-32bit-4.2.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253769" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8671" ref_url="https://www.suse.com/security/cve/CVE-2025-8671/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8671/">CVE-2025-8671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8671">CVE-2025-8671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014144" comment="lighttpd-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014145" comment="lighttpd-mod_authn_dbi-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014146" comment="lighttpd-mod_authn_gssapi-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014147" comment="lighttpd-mod_authn_ldap-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014148" comment="lighttpd-mod_authn_pam-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014149" comment="lighttpd-mod_authn_sasl-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014150" comment="lighttpd-mod_deflate-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014151" comment="lighttpd-mod_gnutls-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014152" comment="lighttpd-mod_magnet-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014153" comment="lighttpd-mod_maxminddb-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014154" comment="lighttpd-mod_mbedtls-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014155" comment="lighttpd-mod_nss-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014156" comment="lighttpd-mod_openssl-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014157" comment="lighttpd-mod_rrdtool-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014158" comment="lighttpd-mod_vhostdb_dbi-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014159" comment="lighttpd-mod_vhostdb_ldap-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014160" comment="lighttpd-mod_vhostdb_mysql-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014161" comment="lighttpd-mod_vhostdb_pgsql-1.4.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014162" comment="lighttpd-mod_webdav-1.4.80-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253770" version="1" class="patch">
	<metadata>
		<title>nginx-1.29.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53859" ref_url="https://www.suse.com/security/cve/CVE-2025-53859/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.29.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-53859/">CVE-2025-53859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53859">CVE-2025-53859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014163" comment="nginx-1.29.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014164" comment="nginx-source-1.29.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253771" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014165" comment="postgresql13-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014166" comment="postgresql13-contrib-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014167" comment="postgresql13-devel-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014168" comment="postgresql13-docs-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014169" comment="postgresql13-llvmjit-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014170" comment="postgresql13-llvmjit-devel-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014171" comment="postgresql13-plperl-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014172" comment="postgresql13-plpython-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014173" comment="postgresql13-pltcl-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014174" comment="postgresql13-server-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014175" comment="postgresql13-server-devel-13.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014176" comment="postgresql13-test-13.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253772" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014177" comment="postgresql14-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014178" comment="postgresql14-contrib-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014179" comment="postgresql14-devel-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014180" comment="postgresql14-docs-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014181" comment="postgresql14-llvmjit-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014182" comment="postgresql14-llvmjit-devel-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014183" comment="postgresql14-plperl-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014184" comment="postgresql14-plpython-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014185" comment="postgresql14-pltcl-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014186" comment="postgresql14-server-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014187" comment="postgresql14-server-devel-14.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014188" comment="postgresql14-test-14.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253773" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014189" comment="postgresql15-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014190" comment="postgresql15-contrib-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014191" comment="postgresql15-devel-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014192" comment="postgresql15-docs-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014193" comment="postgresql15-llvmjit-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014194" comment="postgresql15-llvmjit-devel-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014195" comment="postgresql15-plperl-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014196" comment="postgresql15-plpython-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014197" comment="postgresql15-pltcl-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014198" comment="postgresql15-server-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014199" comment="postgresql15-server-devel-15.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014200" comment="postgresql15-test-15.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253774" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014201" comment="postgresql16-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014202" comment="postgresql16-contrib-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014203" comment="postgresql16-devel-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014204" comment="postgresql16-docs-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014205" comment="postgresql16-llvmjit-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014206" comment="postgresql16-llvmjit-devel-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014207" comment="postgresql16-plperl-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014208" comment="postgresql16-plpython-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014209" comment="postgresql16-pltcl-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014210" comment="postgresql16-server-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014211" comment="postgresql16-server-devel-16.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014212" comment="postgresql16-test-16.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253775" version="1" class="patch">
	<metadata>
		<title>trivy-0.65.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-47291" ref_url="https://www.suse.com/security/cve/CVE-2025-47291/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.65.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47291/">CVE-2025-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47291">CVE-2025-47291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014213" comment="trivy-0.65.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253776" version="1" class="patch">
	<metadata>
		<title>libecpg6-17.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-16"/>
	<updated date="2025-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014238" comment="libecpg6-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014239" comment="libecpg6-32bit-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014240" comment="libpq5-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014241" comment="libpq5-32bit-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014242" comment="postgresql17-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014243" comment="postgresql17-contrib-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014244" comment="postgresql17-devel-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014245" comment="postgresql17-docs-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014246" comment="postgresql17-llvmjit-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014247" comment="postgresql17-llvmjit-devel-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014248" comment="postgresql17-plperl-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014249" comment="postgresql17-plpython-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014250" comment="postgresql17-pltcl-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014251" comment="postgresql17-server-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014252" comment="postgresql17-server-devel-17.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014253" comment="postgresql17-test-17.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253777" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54571" ref_url="https://www.suse.com/security/cve/CVE-2025-54571/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54571/">CVE-2025-54571 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54571">CVE-2025-54571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014453" comment="apache2-mod_security2-2.9.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253778" version="1" class="patch">
	<metadata>
		<title>cairo-devel-1.18.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50422" ref_url="https://www.suse.com/security/cve/CVE-2025-50422/" source="CVE"/>
		<description>
These are all security issues fixed in the cairo-devel-1.18.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-50422/">CVE-2025-50422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50422">CVE-2025-50422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014454" comment="cairo-devel-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014455" comment="cairo-devel-32bit-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014456" comment="cairo-tools-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014457" comment="libcairo-gobject2-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014458" comment="libcairo-gobject2-32bit-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014459" comment="libcairo-script-interpreter2-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014460" comment="libcairo-script-interpreter2-32bit-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014461" comment="libcairo2-1.18.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014462" comment="libcairo2-32bit-1.18.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253779" version="1" class="patch">
	<metadata>
		<title>cflow-1.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6031" ref_url="https://www.suse.com/security/cve/CVE-2023-6031/" source="CVE"/>
		<description>
These are all security issues fixed in the cflow-1.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6031/">CVE-2023-6031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6031">CVE-2023-6031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014463" comment="cflow-1.8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253780" version="1" class="patch">
	<metadata>
		<title>glibc-2.42-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.42-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014464" comment="glibc-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014465" comment="glibc-devel-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014466" comment="glibc-devel-static-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014467" comment="glibc-extra-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014468" comment="glibc-gconv-modules-extra-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014469" comment="glibc-html-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014470" comment="glibc-i18ndata-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014471" comment="glibc-info-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014472" comment="glibc-lang-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014473" comment="glibc-locale-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014474" comment="glibc-locale-base-2.42-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014475" comment="glibc-profile-2.42-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253781" version="1" class="patch">
	<metadata>
		<title>openbao-2.3.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54996" ref_url="https://www.suse.com/security/cve/CVE-2025-54996/" source="CVE"/>
		<reference ref_id="CVE-2025-55000" ref_url="https://www.suse.com/security/cve/CVE-2025-55000/" source="CVE"/>
		<reference ref_id="CVE-2025-55003" ref_url="https://www.suse.com/security/cve/CVE-2025-55003/" source="CVE"/>
		<reference ref_id="CVE-2025-5999" ref_url="https://www.suse.com/security/cve/CVE-2025-5999/" source="CVE"/>
		<reference ref_id="CVE-2025-6000" ref_url="https://www.suse.com/security/cve/CVE-2025-6000/" source="CVE"/>
		<reference ref_id="CVE-2025-6004" ref_url="https://www.suse.com/security/cve/CVE-2025-6004/" source="CVE"/>
		<reference ref_id="CVE-2025-6010" ref_url="https://www.suse.com/security/cve/CVE-2025-6010/" source="CVE"/>
		<reference ref_id="CVE-2025-6011" ref_url="https://www.suse.com/security/cve/CVE-2025-6011/" source="CVE"/>
		<reference ref_id="CVE-2025-6013" ref_url="https://www.suse.com/security/cve/CVE-2025-6013/" source="CVE"/>
		<reference ref_id="CVE-2025-6014" ref_url="https://www.suse.com/security/cve/CVE-2025-6014/" source="CVE"/>
		<reference ref_id="CVE-2025-6015" ref_url="https://www.suse.com/security/cve/CVE-2025-6015/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54996/">CVE-2025-54996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54996">CVE-2025-54996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55000/">CVE-2025-55000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55000">CVE-2025-55000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55003/">CVE-2025-55003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55003">CVE-2025-55003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5999/">CVE-2025-5999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5999">CVE-2025-5999 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5.5/CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6000/">CVE-2025-6000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6000">CVE-2025-6000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6004/">CVE-2025-6004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6004">CVE-2025-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6010/">CVE-2025-6010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6010">CVE-2025-6010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6011/">CVE-2025-6011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6011">CVE-2025-6011 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6013/">CVE-2025-6013 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6013">CVE-2025-6013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6014/">CVE-2025-6014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6014">CVE-2025-6014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6015/">CVE-2025-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6015">CVE-2025-6015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014476" comment="openbao-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014477" comment="openbao-agent-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014478" comment="openbao-cassandra-database-plugin-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014479" comment="openbao-influxdb-database-plugin-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014480" comment="openbao-mysql-database-plugin-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014481" comment="openbao-mysql-legacy-database-plugin-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014482" comment="openbao-postgresql-database-plugin-2.3.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014483" comment="openbao-server-2.3.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253782" version="1" class="patch">
	<metadata>
		<title>aws-efs-utils-2.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-efs-utils-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014652" comment="aws-efs-utils-2.3.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253783" version="1" class="patch">
	<metadata>
		<title>go-sendxmpp-0.15.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the go-sendxmpp-0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014653" comment="go-sendxmpp-0.15.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253784" version="1" class="patch">
	<metadata>
		<title>docker-machine-driver-kvm2-1.36.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-machine-driver-kvm2-1.36.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014654" comment="docker-machine-driver-kvm2-1.36.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014655" comment="minikube-1.36.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014656" comment="minikube-bash-completion-1.36.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014657" comment="minikube-fish-completion-1.36.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014658" comment="minikube-zsh-completion-1.36.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253785" version="1" class="patch">
	<metadata>
		<title>nova-3.11.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the nova-3.11.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014659" comment="nova-3.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014660" comment="nova-bash-completion-3.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014661" comment="nova-fish-completion-3.11.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014662" comment="nova-zsh-completion-3.11.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253786" version="1" class="patch">
	<metadata>
		<title>pluto-5.22.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the pluto-5.22.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014663" comment="pluto-5.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014664" comment="pluto-bash-completion-5.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014665" comment="pluto-fish-completion-5.22.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014666" comment="pluto-zsh-completion-5.22.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253787" version="1" class="patch">
	<metadata>
		<title>polaris-10.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the polaris-10.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014667" comment="polaris-10.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014668" comment="polaris-bash-completion-10.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014669" comment="polaris-fish-completion-10.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014670" comment="polaris-zsh-completion-10.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253788" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9183" ref_url="https://www.suse.com/security/cve/CVE-2025-9183/" source="CVE"/>
		<reference ref_id="CVE-2025-9184" ref_url="https://www.suse.com/security/cve/CVE-2025-9184/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-9183/">CVE-2025-9183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9183">CVE-2025-9183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9184/">CVE-2025-9184 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9184">CVE-2025-9184 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014726" comment="firefox-esr-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014727" comment="firefox-esr-branding-upstream-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014728" comment="firefox-esr-translations-common-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014729" comment="firefox-esr-translations-other-140.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253789" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.12-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.12-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014730" comment="gdk-pixbuf-devel-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014731" comment="gdk-pixbuf-devel-32bit-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014732" comment="gdk-pixbuf-lang-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014733" comment="gdk-pixbuf-query-loaders-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014734" comment="gdk-pixbuf-query-loaders-32bit-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014735" comment="gdk-pixbuf-thumbnailer-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014736" comment="libgdk_pixbuf-2_0-0-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014737" comment="libgdk_pixbuf-2_0-0-32bit-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014738" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014739" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253790" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26154" ref_url="https://www.suse.com/security/cve/CVE-2023-26154/" source="CVE"/>
		<reference ref_id="CVE-2025-44001" ref_url="https://www.suse.com/security/cve/CVE-2025-44001/" source="CVE"/>
		<reference ref_id="CVE-2025-44004" ref_url="https://www.suse.com/security/cve/CVE-2025-44004/" source="CVE"/>
		<reference ref_id="CVE-2025-48731" ref_url="https://www.suse.com/security/cve/CVE-2025-48731/" source="CVE"/>
		<reference ref_id="CVE-2025-49221" ref_url="https://www.suse.com/security/cve/CVE-2025-49221/" source="CVE"/>
		<reference ref_id="CVE-2025-50946" ref_url="https://www.suse.com/security/cve/CVE-2025-50946/" source="CVE"/>
		<reference ref_id="CVE-2025-52931" ref_url="https://www.suse.com/security/cve/CVE-2025-52931/" source="CVE"/>
		<reference ref_id="CVE-2025-53514" ref_url="https://www.suse.com/security/cve/CVE-2025-53514/" source="CVE"/>
		<reference ref_id="CVE-2025-53857" ref_url="https://www.suse.com/security/cve/CVE-2025-53857/" source="CVE"/>
		<reference ref_id="CVE-2025-53910" ref_url="https://www.suse.com/security/cve/CVE-2025-53910/" source="CVE"/>
		<reference ref_id="CVE-2025-54458" ref_url="https://www.suse.com/security/cve/CVE-2025-54458/" source="CVE"/>
		<reference ref_id="CVE-2025-54463" ref_url="https://www.suse.com/security/cve/CVE-2025-54463/" source="CVE"/>
		<reference ref_id="CVE-2025-54478" ref_url="https://www.suse.com/security/cve/CVE-2025-54478/" source="CVE"/>
		<reference ref_id="CVE-2025-54525" ref_url="https://www.suse.com/security/cve/CVE-2025-54525/" source="CVE"/>
		<reference ref_id="CVE-2025-55196" ref_url="https://www.suse.com/security/cve/CVE-2025-55196/" source="CVE"/>
		<reference ref_id="CVE-2025-55198" ref_url="https://www.suse.com/security/cve/CVE-2025-55198/" source="CVE"/>
		<reference ref_id="CVE-2025-55199" ref_url="https://www.suse.com/security/cve/CVE-2025-55199/" source="CVE"/>
		<reference ref_id="CVE-2025-8285" ref_url="https://www.suse.com/security/cve/CVE-2025-8285/" source="CVE"/>
		<reference ref_id="CVE-2025-9039" ref_url="https://www.suse.com/security/cve/CVE-2025-9039/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250818T190335-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26154/">CVE-2023-26154 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26154">CVE-2023-26154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-44001/">CVE-2025-44001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-44001">CVE-2025-44001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-44004/">CVE-2025-44004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-44004">CVE-2025-44004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48731/">CVE-2025-48731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48731">CVE-2025-48731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49221/">CVE-2025-49221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49221">CVE-2025-49221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50946/">CVE-2025-50946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50946">CVE-2025-50946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52931/">CVE-2025-52931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52931">CVE-2025-52931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53514/">CVE-2025-53514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53514">CVE-2025-53514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53857/">CVE-2025-53857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53857">CVE-2025-53857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53910/">CVE-2025-53910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53910">CVE-2025-53910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54458/">CVE-2025-54458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54458">CVE-2025-54458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54463/">CVE-2025-54463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54463">CVE-2025-54463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54478/">CVE-2025-54478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54478">CVE-2025-54478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54525/">CVE-2025-54525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54525">CVE-2025-54525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55196/">CVE-2025-55196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55196">CVE-2025-55196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55198/">CVE-2025-55198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55198">CVE-2025-55198 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55199/">CVE-2025-55199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55199">CVE-2025-55199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8285/">CVE-2025-8285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8285">CVE-2025-8285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9039/">CVE-2025-9039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9039">CVE-2025-9039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014740" comment="govulncheck-vulndb-0.0.20250818T190335-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253791" version="1" class="patch">
	<metadata>
		<title>wicked2nm-1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014741" comment="wicked2nm-1.2.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253792" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55154" ref_url="https://www.suse.com/security/cve/CVE-2025-55154/" source="CVE"/>
		<reference ref_id="CVE-2025-55160" ref_url="https://www.suse.com/security/cve/CVE-2025-55160/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55154/">CVE-2025-55154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55154">CVE-2025-55154 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55160/">CVE-2025-55160 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55160">CVE-2025-55160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014864" comment="ImageMagick-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014865" comment="ImageMagick-config-7-SUSE-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014866" comment="ImageMagick-devel-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014867" comment="ImageMagick-devel-32bit-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014868" comment="ImageMagick-doc-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014869" comment="ImageMagick-extra-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014870" comment="libMagick++-7_Q16HDRI5-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014871" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014872" comment="libMagick++-devel-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014873" comment="libMagick++-devel-32bit-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014874" comment="libMagickCore-7_Q16HDRI10-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014875" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014876" comment="libMagickWand-7_Q16HDRI10-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014877" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014878" comment="perl-PerlMagick-7.1.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253793" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9184" ref_url="https://www.suse.com/security/cve/CVE-2025-9184/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9184/">CVE-2025-9184 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9184">CVE-2025-9184 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014879" comment="MozillaThunderbird-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014880" comment="MozillaThunderbird-openpgp-librnp-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014881" comment="MozillaThunderbird-translations-common-140.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014882" comment="MozillaThunderbird-translations-other-140.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253794" version="1" class="patch">
	<metadata>
		<title>abseil-cpp-devel-20250814.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0838" ref_url="https://www.suse.com/security/cve/CVE-2025-0838/" source="CVE"/>
		<description>
These are all security issues fixed in the abseil-cpp-devel-20250814.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-0838/">CVE-2025-0838 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0838">CVE-2025-0838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014883" comment="abseil-cpp-devel-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014884" comment="libabsl_base2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014885" comment="libabsl_base2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014886" comment="libabsl_city2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014887" comment="libabsl_city2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014888" comment="libabsl_civil_time2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014889" comment="libabsl_civil_time2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014890" comment="libabsl_cord2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014891" comment="libabsl_cord2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014892" comment="libabsl_cord_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014893" comment="libabsl_cord_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014894" comment="libabsl_cordz_functions2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014895" comment="libabsl_cordz_functions2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014896" comment="libabsl_cordz_handle2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014897" comment="libabsl_cordz_handle2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014898" comment="libabsl_cordz_info2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014899" comment="libabsl_cordz_info2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014900" comment="libabsl_cordz_sample_token2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014901" comment="libabsl_cordz_sample_token2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014902" comment="libabsl_crc32c2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014903" comment="libabsl_crc32c2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014904" comment="libabsl_crc_cord_state2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014905" comment="libabsl_crc_cord_state2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014906" comment="libabsl_crc_cpu_detect2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014907" comment="libabsl_crc_cpu_detect2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014908" comment="libabsl_crc_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014909" comment="libabsl_crc_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014910" comment="libabsl_debugging_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014911" comment="libabsl_debugging_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014912" comment="libabsl_decode_rust_punycode2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014913" comment="libabsl_decode_rust_punycode2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014914" comment="libabsl_demangle_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014915" comment="libabsl_demangle_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014916" comment="libabsl_demangle_rust2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014917" comment="libabsl_demangle_rust2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014918" comment="libabsl_die_if_null2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014919" comment="libabsl_die_if_null2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014920" comment="libabsl_examine_stack2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014921" comment="libabsl_examine_stack2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014922" comment="libabsl_exponential_biased2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014923" comment="libabsl_exponential_biased2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014924" comment="libabsl_failure_signal_handler2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014925" comment="libabsl_failure_signal_handler2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014926" comment="libabsl_flags_commandlineflag2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014927" comment="libabsl_flags_commandlineflag2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014928" comment="libabsl_flags_commandlineflag_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014929" comment="libabsl_flags_commandlineflag_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014930" comment="libabsl_flags_config2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014931" comment="libabsl_flags_config2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014932" comment="libabsl_flags_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014933" comment="libabsl_flags_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014934" comment="libabsl_flags_marshalling2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014935" comment="libabsl_flags_marshalling2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014936" comment="libabsl_flags_parse2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014937" comment="libabsl_flags_parse2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014938" comment="libabsl_flags_private_handle_accessor2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014939" comment="libabsl_flags_private_handle_accessor2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014940" comment="libabsl_flags_program_name2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014941" comment="libabsl_flags_program_name2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014942" comment="libabsl_flags_reflection2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014943" comment="libabsl_flags_reflection2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014944" comment="libabsl_flags_usage2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014945" comment="libabsl_flags_usage2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014946" comment="libabsl_flags_usage_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014947" comment="libabsl_flags_usage_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014948" comment="libabsl_graphcycles_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014949" comment="libabsl_graphcycles_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014950" comment="libabsl_hash2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014951" comment="libabsl_hash2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014952" comment="libabsl_hashtable_profiler2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014953" comment="libabsl_hashtable_profiler2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014954" comment="libabsl_hashtablez_sampler2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014955" comment="libabsl_hashtablez_sampler2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014956" comment="libabsl_int128-2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014957" comment="libabsl_int128-2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014958" comment="libabsl_kernel_timeout_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014959" comment="libabsl_kernel_timeout_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014960" comment="libabsl_leak_check2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014961" comment="libabsl_leak_check2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014962" comment="libabsl_log_entry2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014963" comment="libabsl_log_entry2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014964" comment="libabsl_log_flags2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014965" comment="libabsl_log_flags2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014966" comment="libabsl_log_globals2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014967" comment="libabsl_log_globals2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014968" comment="libabsl_log_initialize2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014969" comment="libabsl_log_initialize2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014970" comment="libabsl_log_internal_check_op2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014971" comment="libabsl_log_internal_check_op2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014972" comment="libabsl_log_internal_conditions2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014973" comment="libabsl_log_internal_conditions2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014974" comment="libabsl_log_internal_fnmatch2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014975" comment="libabsl_log_internal_fnmatch2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014976" comment="libabsl_log_internal_format2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014977" comment="libabsl_log_internal_format2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014978" comment="libabsl_log_internal_globals2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014979" comment="libabsl_log_internal_globals2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014980" comment="libabsl_log_internal_log_sink_set2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014981" comment="libabsl_log_internal_log_sink_set2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014982" comment="libabsl_log_internal_message2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014983" comment="libabsl_log_internal_message2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014984" comment="libabsl_log_internal_nullguard2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014985" comment="libabsl_log_internal_nullguard2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014986" comment="libabsl_log_internal_proto2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014987" comment="libabsl_log_internal_proto2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014988" comment="libabsl_log_internal_structured_proto2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014989" comment="libabsl_log_internal_structured_proto2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014990" comment="libabsl_log_severity2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014991" comment="libabsl_log_severity2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014992" comment="libabsl_log_sink2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014993" comment="libabsl_log_sink2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014994" comment="libabsl_malloc_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014995" comment="libabsl_malloc_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014996" comment="libabsl_periodic_sampler2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014997" comment="libabsl_periodic_sampler2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014998" comment="libabsl_poison2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014999" comment="libabsl_poison2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015000" comment="libabsl_profile_builder2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015001" comment="libabsl_profile_builder2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015002" comment="libabsl_random_distributions2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015003" comment="libabsl_random_distributions2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015004" comment="libabsl_random_internal_distribution_test_util2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015005" comment="libabsl_random_internal_distribution_test_util2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015006" comment="libabsl_random_internal_entropy_pool2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015007" comment="libabsl_random_internal_entropy_pool2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015008" comment="libabsl_random_internal_platform2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015009" comment="libabsl_random_internal_platform2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015010" comment="libabsl_random_internal_randen2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015011" comment="libabsl_random_internal_randen2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015012" comment="libabsl_random_internal_randen_hwaes2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015013" comment="libabsl_random_internal_randen_hwaes2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015014" comment="libabsl_random_internal_randen_hwaes_impl2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015015" comment="libabsl_random_internal_randen_hwaes_impl2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015016" comment="libabsl_random_internal_randen_slow2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015017" comment="libabsl_random_internal_randen_slow2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015018" comment="libabsl_random_internal_seed_material2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015019" comment="libabsl_random_internal_seed_material2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015020" comment="libabsl_random_seed_gen_exception2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015021" comment="libabsl_random_seed_gen_exception2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015022" comment="libabsl_random_seed_sequences2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015023" comment="libabsl_random_seed_sequences2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015024" comment="libabsl_raw_hash_set2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015025" comment="libabsl_raw_hash_set2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015026" comment="libabsl_raw_logging_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015027" comment="libabsl_raw_logging_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015028" comment="libabsl_scoped_set_env2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015029" comment="libabsl_scoped_set_env2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015030" comment="libabsl_spinlock_wait2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015031" comment="libabsl_spinlock_wait2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015032" comment="libabsl_stacktrace2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015033" comment="libabsl_stacktrace2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015034" comment="libabsl_status2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015035" comment="libabsl_status2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015036" comment="libabsl_statusor2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015037" comment="libabsl_statusor2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015038" comment="libabsl_str_format_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015039" comment="libabsl_str_format_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015040" comment="libabsl_strerror2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015041" comment="libabsl_strerror2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015042" comment="libabsl_string_view2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015043" comment="libabsl_string_view2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015044" comment="libabsl_strings2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015045" comment="libabsl_strings2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015046" comment="libabsl_strings_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015047" comment="libabsl_strings_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015048" comment="libabsl_symbolize2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015049" comment="libabsl_symbolize2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015050" comment="libabsl_synchronization2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015051" comment="libabsl_synchronization2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015052" comment="libabsl_throw_delegate2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015053" comment="libabsl_throw_delegate2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015054" comment="libabsl_time2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015055" comment="libabsl_time2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015056" comment="libabsl_time_zone2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015057" comment="libabsl_time_zone2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015058" comment="libabsl_tracing_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015059" comment="libabsl_tracing_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015060" comment="libabsl_utf8_for_code_point2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015061" comment="libabsl_utf8_for_code_point2508_0_0-32bit-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015062" comment="libabsl_vlog_config_internal2508_0_0-20250814.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015063" comment="libabsl_vlog_config_internal2508_0_0-32bit-20250814.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253795" version="1" class="patch">
	<metadata>
		<title>aide-0.19.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54389" ref_url="https://www.suse.com/security/cve/CVE-2025-54389/" source="CVE"/>
		<reference ref_id="CVE-2025-54409" ref_url="https://www.suse.com/security/cve/CVE-2025-54409/" source="CVE"/>
		<description>
These are all security issues fixed in the aide-0.19.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54389/">CVE-2025-54389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54389">CVE-2025-54389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-54409/">CVE-2025-54409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54409">CVE-2025-54409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015064" comment="aide-0.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015065" comment="aide-test-0.19.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253796" version="1" class="patch">
	<metadata>
		<title>flake-pilot-3.1.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the flake-pilot-3.1.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015066" comment="flake-pilot-3.1.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015067" comment="flake-pilot-firecracker-3.1.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015068" comment="flake-pilot-firecracker-dracut-netstart-3.1.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015069" comment="flake-pilot-firecracker-guestvm-tools-3.1.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015070" comment="flake-pilot-podman-3.1.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253797" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2760" ref_url="https://www.suse.com/security/cve/CVE-2025-2760/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-2760/">CVE-2025-2760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2760">CVE-2025-2760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015071" comment="gimp-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015072" comment="gimp-devel-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015073" comment="gimp-extension-goat-excercises-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015074" comment="gimp-lang-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015075" comment="gimp-plugin-aa-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015076" comment="gimp-plugin-python3-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015077" comment="gimp-vala-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015078" comment="libgimp-3_0-0-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015079" comment="libgimpui-3_0-0-3.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253798" version="1" class="patch">
	<metadata>
		<title>pam-1.7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10041" ref_url="https://www.suse.com/security/cve/CVE-2024-10041/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10041/">CVE-2024-10041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015080" comment="pam-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015081" comment="pam-32bit-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015082" comment="pam-devel-1.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015083" comment="pam-devel-32bit-1.7.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253799" version="1" class="patch">
	<metadata>
		<title>pdns-recursor-5.2.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30192" ref_url="https://www.suse.com/security/cve/CVE-2025-30192/" source="CVE"/>
		<description>
These are all security issues fixed in the pdns-recursor-5.2.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30192/">CVE-2025-30192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30192">CVE-2025-30192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015084" comment="pdns-recursor-5.2.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253800" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-activerecord-8.0-8.0.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55193" ref_url="https://www.suse.com/security/cve/CVE-2025-55193/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-activerecord-8.0-8.0.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55193/">CVE-2025-55193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55193">CVE-2025-55193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015085" comment="ruby3.4-rubygem-activerecord-8.0-8.0.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253801" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.8+12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.8+12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-21"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015086" comment="keylime-ima-policy-0.2.8+12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015087" comment="rust-keylime-0.2.8+12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253802" version="1" class="patch">
	<metadata>
		<title>chromedriver-139.0.7258.138-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9132" ref_url="https://www.suse.com/security/cve/CVE-2025-9132/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-139.0.7258.138-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9132/">CVE-2025-9132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9132">CVE-2025-9132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015413" comment="chromedriver-139.0.7258.138-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015414" comment="chromium-139.0.7258.138-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253803" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.58-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5115" ref_url="https://www.suse.com/security/cve/CVE-2025-5115/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.58-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5115/">CVE-2025-5115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115">CVE-2025-5115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015415" comment="jetty-annotations-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015416" comment="jetty-ant-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015417" comment="jetty-cdi-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015418" comment="jetty-client-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015419" comment="jetty-continuation-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015420" comment="jetty-deploy-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015421" comment="jetty-fcgi-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015422" comment="jetty-http-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015423" comment="jetty-http-spi-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015424" comment="jetty-io-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015425" comment="jetty-jaas-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015426" comment="jetty-jmx-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015427" comment="jetty-jndi-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015428" comment="jetty-jsp-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015429" comment="jetty-minimal-javadoc-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015430" comment="jetty-openid-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015431" comment="jetty-plus-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015432" comment="jetty-project-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015433" comment="jetty-proxy-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015434" comment="jetty-quickstart-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015435" comment="jetty-rewrite-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015436" comment="jetty-security-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015437" comment="jetty-server-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015438" comment="jetty-servlet-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015439" comment="jetty-servlets-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015440" comment="jetty-start-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015441" comment="jetty-util-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015442" comment="jetty-util-ajax-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015443" comment="jetty-webapp-9.4.58-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015444" comment="jetty-xml-9.4.58-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253804" version="1" class="patch">
	<metadata>
		<title>netty-4.1.124-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55163" ref_url="https://www.suse.com/security/cve/CVE-2025-55163/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.124-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55163/">CVE-2025-55163 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55163">CVE-2025-55163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015445" comment="netty-4.1.124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015446" comment="netty-bom-4.1.124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015447" comment="netty-javadoc-4.1.124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015448" comment="netty-parent-4.1.124-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253805" version="1" class="patch">
	<metadata>
		<title>jupyter-bqplot-jupyterlab-0.5.46-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9287" ref_url="https://www.suse.com/security/cve/CVE-2025-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-bqplot-jupyterlab-0.5.46-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-9287/">CVE-2025-9287 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9287">CVE-2025-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015449" comment="jupyter-bqplot-jupyterlab-0.5.46-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015450" comment="jupyter-bqplot-notebook-0.5.46-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015451" comment="python311-bqplot-0.12.45-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253806" version="1" class="patch">
	<metadata>
		<title>terragrunt-0.85.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8959" ref_url="https://www.suse.com/security/cve/CVE-2025-8959/" source="CVE"/>
		<description>
These are all security issues fixed in the terragrunt-0.85.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8959/">CVE-2025-8959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8959">CVE-2025-8959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015452" comment="terragrunt-0.85.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015453" comment="terragrunt-bash-completion-0.85.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015454" comment="terragrunt-zsh-completion-0.85.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253807" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.7.0-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-13978" ref_url="https://www.suse.com/security/cve/CVE-2024-13978/" source="CVE"/>
		<reference ref_id="CVE-2025-8534" ref_url="https://www.suse.com/security/cve/CVE-2025-8534/" source="CVE"/>
		<reference ref_id="CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.7.0-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13978/">CVE-2024-13978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13978">CVE-2024-13978 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8534/">CVE-2025-8534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8534">CVE-2025-8534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015455" comment="libtiff-devel-4.7.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015456" comment="libtiff-devel-32bit-4.7.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015457" comment="libtiff6-4.7.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015458" comment="libtiff6-32bit-4.7.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015459" comment="tiff-4.7.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253808" version="1" class="patch">
	<metadata>
		<title>cheat-4.4.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<reference ref_id="CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the cheat-4.4.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015460" comment="cheat-4.4.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253809" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.108-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.108-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015461" comment="tomcat-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015462" comment="tomcat-admin-webapps-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015463" comment="tomcat-docs-webapp-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015464" comment="tomcat-el-3_0-api-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015465" comment="tomcat-embed-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015466" comment="tomcat-javadoc-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015467" comment="tomcat-jsp-2_3-api-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015468" comment="tomcat-jsvc-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015469" comment="tomcat-lib-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015470" comment="tomcat-servlet-4_0-api-9.0.108-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015471" comment="tomcat-webapps-9.0.108-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253810" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.44-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.44-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015472" comment="tomcat10-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015473" comment="tomcat10-admin-webapps-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015474" comment="tomcat10-doc-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015475" comment="tomcat10-docs-webapp-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015476" comment="tomcat10-el-5_0-api-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015477" comment="tomcat10-embed-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015478" comment="tomcat10-jsp-3_1-api-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015479" comment="tomcat10-jsvc-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015480" comment="tomcat10-lib-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015481" comment="tomcat10-servlet-6_0-api-10.1.44-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015482" comment="tomcat10-webapps-10.1.44-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253811" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015483" comment="tomcat11-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015484" comment="tomcat11-admin-webapps-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015485" comment="tomcat11-doc-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015486" comment="tomcat11-docs-webapp-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015487" comment="tomcat11-el-6_0-api-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015488" comment="tomcat11-embed-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015489" comment="tomcat11-jsp-4_0-api-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015490" comment="tomcat11-jsvc-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015491" comment="tomcat11-lib-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015492" comment="tomcat11-servlet-6_1-api-11.0.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015493" comment="tomcat11-webapps-11.0.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253812" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20250812-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-20053" ref_url="https://www.suse.com/security/cve/CVE-2025-20053/" source="CVE"/>
		<reference ref_id="CVE-2025-20109" ref_url="https://www.suse.com/security/cve/CVE-2025-20109/" source="CVE"/>
		<reference ref_id="CVE-2025-22839" ref_url="https://www.suse.com/security/cve/CVE-2025-22839/" source="CVE"/>
		<reference ref_id="CVE-2025-22840" ref_url="https://www.suse.com/security/cve/CVE-2025-22840/" source="CVE"/>
		<reference ref_id="CVE-2025-22889" ref_url="https://www.suse.com/security/cve/CVE-2025-22889/" source="CVE"/>
		<reference ref_id="CVE-2025-26403" ref_url="https://www.suse.com/security/cve/CVE-2025-26403/" source="CVE"/>
		<reference ref_id="CVE-2025-32086" ref_url="https://www.suse.com/security/cve/CVE-2025-32086/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20250812-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20053/">CVE-2025-20053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20053">CVE-2025-20053 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20109/">CVE-2025-20109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20109">CVE-2025-20109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22839/">CVE-2025-22839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22839">CVE-2025-22839 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22840/">CVE-2025-22840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22840">CVE-2025-22840 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22889/">CVE-2025-22889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22889">CVE-2025-22889 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-26403/">CVE-2025-26403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26403">CVE-2025-26403 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-32086/">CVE-2025-32086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32086">CVE-2025-32086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015494" comment="ucode-intel-20250812-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253813" version="1" class="patch">
	<metadata>
		<title>fractal-12.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the fractal-12.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-26"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015626" comment="fractal-12.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015627" comment="fractal-lang-12.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253814" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.137.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.137.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-26"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015628" comment="matrix-synapse-1.137.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253815" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-26"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015629" comment="libmozjs-128-0-128.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015630" comment="mozjs128-128.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015631" comment="mozjs128-devel-128.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253816" version="1" class="patch">
	<metadata>
		<title>perl-Crypt-CBC-3.70.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2814" ref_url="https://www.suse.com/security/cve/CVE-2025-2814/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Crypt-CBC-3.70.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2814/">CVE-2025-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2814">CVE-2025-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016083" comment="perl-Crypt-CBC-3.70.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253817" version="1" class="patch">
	<metadata>
		<title>python311-h2-4.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-57804" ref_url="https://www.suse.com/security/cve/CVE-2025-57804/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-h2-4.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-57804/">CVE-2025-57804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57804">CVE-2025-57804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016084" comment="python311-h2-4.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016085" comment="python312-h2-4.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016086" comment="python313-h2-4.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253818" version="1" class="patch">
	<metadata>
		<title>scx-1.0.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the scx-1.0.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016087" comment="scx-1.0.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016088" comment="scx-devel-1.0.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253819" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55212" ref_url="https://www.suse.com/security/cve/CVE-2025-55212/" source="CVE"/>
		<reference ref_id="CVE-2025-55298" ref_url="https://www.suse.com/security/cve/CVE-2025-55298/" source="CVE"/>
		<reference ref_id="CVE-2025-57803" ref_url="https://www.suse.com/security/cve/CVE-2025-57803/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-28"/>
	<updated date="2025-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55212/">CVE-2025-55212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55212">CVE-2025-55212 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-55298/">CVE-2025-55298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55298">CVE-2025-55298 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-57803/">CVE-2025-57803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57803">CVE-2025-57803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016188" comment="ImageMagick-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016189" comment="ImageMagick-config-7-SUSE-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016190" comment="ImageMagick-devel-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016191" comment="ImageMagick-devel-32bit-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016192" comment="ImageMagick-doc-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016193" comment="ImageMagick-extra-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016194" comment="libMagick++-7_Q16HDRI5-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016195" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016196" comment="libMagick++-devel-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016197" comment="libMagick++-devel-32bit-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016198" comment="libMagickCore-7_Q16HDRI10-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016199" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016200" comment="libMagickWand-7_Q16HDRI10-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016201" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016202" comment="perl-PerlMagick-7.1.2.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253820" version="1" class="patch">
	<metadata>
		<title>kea-3.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40779" ref_url="https://www.suse.com/security/cve/CVE-2025-40779/" source="CVE"/>
		<description>
These are all security issues fixed in the kea-3.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-28"/>
	<updated date="2025-08-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40779/">CVE-2025-40779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40779">CVE-2025-40779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016203" comment="kea-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016204" comment="kea-devel-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016205" comment="kea-doc-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016206" comment="kea-hooks-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016207" comment="libkea-asiodns62-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016208" comment="libkea-asiolink88-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016209" comment="libkea-cc82-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016210" comment="libkea-cfgrpt3-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016211" comment="libkea-config83-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016212" comment="libkea-cryptolink64-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016213" comment="libkea-d2srv63-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016214" comment="libkea-database76-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016215" comment="libkea-dhcp109-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016216" comment="libkea-dhcp_ddns68-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016217" comment="libkea-dhcpsrv130-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016218" comment="libkea-dns71-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016219" comment="libkea-eval84-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016220" comment="libkea-exceptions45-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016221" comment="libkea-hooks119-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016222" comment="libkea-http87-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016223" comment="libkea-log-interprocess3-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016224" comment="libkea-log75-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016225" comment="libkea-mysql88-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016226" comment="libkea-pgsql88-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016227" comment="libkea-process90-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016228" comment="libkea-stats53-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016229" comment="libkea-tcp33-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016230" comment="libkea-util-io12-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016231" comment="libkea-util101-3.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016232" comment="python3-kea-3.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253821" version="1" class="patch">
	<metadata>
		<title>chromedriver-139.0.7258.154-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9478" ref_url="https://www.suse.com/security/cve/CVE-2025-9478/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-139.0.7258.154-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9478/">CVE-2025-9478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9478">CVE-2025-9478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016673" comment="chromedriver-139.0.7258.154-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016674" comment="chromium-139.0.7258.154-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253822" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.46-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58050" ref_url="https://www.suse.com/security/cve/CVE-2025-58050/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.46-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58050/">CVE-2025-58050 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58050">CVE-2025-58050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016675" comment="libpcre2-16-0-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016676" comment="libpcre2-16-0-32bit-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016677" comment="libpcre2-32-0-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016678" comment="libpcre2-32-0-32bit-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016679" comment="libpcre2-8-0-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016680" comment="libpcre2-8-0-32bit-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016681" comment="libpcre2-posix3-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016682" comment="libpcre2-posix3-32bit-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016683" comment="pcre2-devel-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016684" comment="pcre2-devel-static-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016685" comment="pcre2-doc-10.46-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016686" comment="pcre2-tools-10.46-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253823" version="1" class="patch">
	<metadata>
		<title>jupyter-nbdime-7.0.2-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54798" ref_url="https://www.suse.com/security/cve/CVE-2025-54798/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbdime-7.0.2-23.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54798/">CVE-2025-54798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54798">CVE-2025-54798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016687" comment="jupyter-nbdime-7.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016688" comment="jupyter-nbdime-jupyterlab-3.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016689" comment="python311-nbdime-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016690" comment="python311-nbdime-git-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016691" comment="python311-nbdime-hg-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016692" comment="python312-nbdime-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016693" comment="python312-nbdime-git-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016694" comment="python312-nbdime-hg-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016695" comment="python313-nbdime-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016696" comment="python313-nbdime-git-4.0.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016697" comment="python313-nbdime-hg-4.0.2-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253824" version="1" class="patch">
	<metadata>
		<title>tailscale-1.86.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the tailscale-1.86.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016698" comment="tailscale-1.86.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016699" comment="tailscale-bash-completion-1.86.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016700" comment="tailscale-fish-completion-1.86.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016701" comment="tailscale-zsh-completion-1.86.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253825" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.6.9-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9732" ref_url="https://www.suse.com/security/cve/CVE-2025-9732/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.6.9-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9732/">CVE-2025-9732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9732">CVE-2025-9732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016811" comment="dcmtk-3.6.9-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016812" comment="dcmtk-devel-3.6.9-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016813" comment="libdcmtk19-3.6.9-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253826" version="1" class="patch">
	<metadata>
		<title>kured-1.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
These are all security issues fixed in the kured-1.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016814" comment="kured-1.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016815" comment="kured-k8s-yaml-1.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253827" version="1" class="patch">
	<metadata>
		<title>jupyter-bqplot-jupyterlab-0.5.46-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54798" ref_url="https://www.suse.com/security/cve/CVE-2025-54798/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-bqplot-jupyterlab-0.5.46-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54798/">CVE-2025-54798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54798">CVE-2025-54798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016816" comment="jupyter-bqplot-jupyterlab-0.5.46-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016817" comment="jupyter-bqplot-notebook-0.5.46-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016818" comment="python311-bqplot-0.12.45-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253828" version="1" class="patch">
	<metadata>
		<title>python311-eventlet-0.40.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58068" ref_url="https://www.suse.com/security/cve/CVE-2025-58068/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-eventlet-0.40.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-58068/">CVE-2025-58068 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58068">CVE-2025-58068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016819" comment="python311-eventlet-0.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016820" comment="python312-eventlet-0.40.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016821" comment="python313-eventlet-0.40.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253829" version="1" class="patch">
	<metadata>
		<title>rekor-1.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-29923" ref_url="https://www.suse.com/security/cve/CVE-2025-29923/" source="CVE"/>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-29923/">CVE-2025-29923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29923">CVE-2025-29923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016822" comment="rekor-1.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253830" version="1" class="patch">
	<metadata>
		<title>sbctl-0.17-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the sbctl-0.17-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016823" comment="sbctl-0.17-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253831" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28948" ref_url="https://www.suse.com/security/cve/CVE-2022-28948/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28948/">CVE-2022-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016824" comment="traefik2-2.11.29-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253832" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.10.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.10.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-01"/>
	<updated date="2025-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016825" comment="libudisks2-0-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016826" comment="libudisks2-0-devel-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016827" comment="libudisks2-0_btrfs-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016828" comment="libudisks2-0_lsm-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016829" comment="libudisks2-0_lvm2-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016830" comment="typelib-1_0-UDisks-2_0-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016831" comment="udisks2-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016832" comment="udisks2-bash-completion-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016833" comment="udisks2-docs-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016834" comment="udisks2-lang-2.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016835" comment="udisks2-zsh-completion-2.10.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253833" version="1" class="patch">
	<metadata>
		<title>bpftop-0.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the bpftop-0.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016875" comment="bpftop-0.7.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253834" version="1" class="patch">
	<metadata>
		<title>libmupen64plus-devel-2.6.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9688" ref_url="https://www.suse.com/security/cve/CVE-2025-9688/" source="CVE"/>
		<description>
These are all security issues fixed in the libmupen64plus-devel-2.6.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9688/">CVE-2025-9688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9688">CVE-2025-9688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016876" comment="libmupen64plus-devel-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016877" comment="libmupen64plus2-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016878" comment="mupen64plus-plugin-audio-sdl-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016879" comment="mupen64plus-plugin-input-sdl-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016880" comment="mupen64plus-plugin-rsp-hle-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016881" comment="mupen64plus-plugin-video-glide64mk2-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016882" comment="mupen64plus-plugin-video-rice-2.6.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016883" comment="mupen64plus-ui-console-2.6.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253835" version="1" class="patch">
	<metadata>
		<title>python311-uv-0.8.14-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-uv-0.8.14-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016884" comment="python311-uv-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016885" comment="python311-uv-bash-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016886" comment="python311-uv-fish-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016887" comment="python311-uv-zsh-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016888" comment="python312-uv-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016889" comment="python312-uv-bash-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016890" comment="python312-uv-fish-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016891" comment="python312-uv-zsh-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016892" comment="python313-uv-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016893" comment="python313-uv-bash-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016894" comment="python313-uv-fish-completion-0.8.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016895" comment="python313-uv-zsh-completion-0.8.14-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253836" version="1" class="patch">
	<metadata>
		<title>regclient-0.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the regclient-0.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016896" comment="regclient-0.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016897" comment="regclient-bash-completion-0.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016898" comment="regclient-fish-completion-0.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016899" comment="regclient-zsh-completion-0.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253837" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-142.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9183" ref_url="https://www.suse.com/security/cve/CVE-2025-9183/" source="CVE"/>
		<reference ref_id="CVE-2025-9184" ref_url="https://www.suse.com/security/cve/CVE-2025-9184/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<reference ref_id="CVE-2025-9186" ref_url="https://www.suse.com/security/cve/CVE-2025-9186/" source="CVE"/>
		<reference ref_id="CVE-2025-9187" ref_url="https://www.suse.com/security/cve/CVE-2025-9187/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-142.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-03"/>
	<updated date="2025-09-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-9183/">CVE-2025-9183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9183">CVE-2025-9183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9184/">CVE-2025-9184 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9184">CVE-2025-9184 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-9186/">CVE-2025-9186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9186">CVE-2025-9186 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9187/">CVE-2025-9187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9187">CVE-2025-9187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016943" comment="MozillaFirefox-142.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016944" comment="MozillaFirefox-branding-upstream-142.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016945" comment="MozillaFirefox-devel-142.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016946" comment="MozillaFirefox-translations-common-142.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016947" comment="MozillaFirefox-translations-other-142.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253838" version="1" class="patch">
	<metadata>
		<title>himmelblau-1.2.2+git.0.2d04bca-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-1.2.2+git.0.2d04bca-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-03"/>
	<updated date="2025-09-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016948" comment="himmelblau-1.2.2+git.0.2d04bca-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016949" comment="himmelblau-qr-greeter-1.2.2+git.0.2d04bca-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016950" comment="himmelblau-sshd-config-1.2.2+git.0.2d04bca-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016951" comment="himmelblau-sso-1.2.2+git.0.2d04bca-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016952" comment="libnss_himmelblau2-1.2.2+git.0.2d04bca-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016953" comment="pam-himmelblau-1.2.2+git.0.2d04bca-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253839" version="1" class="patch">
	<metadata>
		<title>python311-maturin-1.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-maturin-1.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-03"/>
	<updated date="2025-09-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016954" comment="python311-maturin-1.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016955" comment="python312-maturin-1.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016956" comment="python313-maturin-1.9.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253840" version="1" class="patch">
	<metadata>
		<title>python311-ruff-0.12.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ruff-0.12.11-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-03"/>
	<updated date="2025-09-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016957" comment="python311-ruff-0.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016958" comment="python312-ruff-0.12.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016959" comment="python313-ruff-0.12.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253841" version="1" class="patch">
	<metadata>
		<title>netty-4.1.126-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58056" ref_url="https://www.suse.com/security/cve/CVE-2025-58056/" source="CVE"/>
		<reference ref_id="CVE-2025-58057" ref_url="https://www.suse.com/security/cve/CVE-2025-58057/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.126-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-04"/>
	<updated date="2025-09-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58056/">CVE-2025-58056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58056">CVE-2025-58056 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58057/">CVE-2025-58057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017094" comment="netty-4.1.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017095" comment="netty-bom-4.1.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017096" comment="netty-javadoc-4.1.126-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017097" comment="netty-parent-4.1.126-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253842" version="1" class="patch">
	<metadata>
		<title>libpodofo-0_10-devel-0.10.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5852" ref_url="https://www.suse.com/security/cve/CVE-2017-5852/" source="CVE"/>
		<reference ref_id="CVE-2017-5853" ref_url="https://www.suse.com/security/cve/CVE-2017-5853/" source="CVE"/>
		<reference ref_id="CVE-2017-5854" ref_url="https://www.suse.com/security/cve/CVE-2017-5854/" source="CVE"/>
		<reference ref_id="CVE-2017-5855" ref_url="https://www.suse.com/security/cve/CVE-2017-5855/" source="CVE"/>
		<reference ref_id="CVE-2017-5886" ref_url="https://www.suse.com/security/cve/CVE-2017-5886/" source="CVE"/>
		<reference ref_id="CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840/" source="CVE"/>
		<reference ref_id="CVE-2017-6844" ref_url="https://www.suse.com/security/cve/CVE-2017-6844/" source="CVE"/>
		<reference ref_id="CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845/" source="CVE"/>
		<reference ref_id="CVE-2017-6847" ref_url="https://www.suse.com/security/cve/CVE-2017-6847/" source="CVE"/>
		<reference ref_id="CVE-2017-7378" ref_url="https://www.suse.com/security/cve/CVE-2017-7378/" source="CVE"/>
		<reference ref_id="CVE-2017-7379" ref_url="https://www.suse.com/security/cve/CVE-2017-7379/" source="CVE"/>
		<reference ref_id="CVE-2017-7380" ref_url="https://www.suse.com/security/cve/CVE-2017-7380/" source="CVE"/>
		<reference ref_id="CVE-2017-7381" ref_url="https://www.suse.com/security/cve/CVE-2017-7381/" source="CVE"/>
		<reference ref_id="CVE-2017-7382" ref_url="https://www.suse.com/security/cve/CVE-2017-7382/" source="CVE"/>
		<reference ref_id="CVE-2017-7383" ref_url="https://www.suse.com/security/cve/CVE-2017-7383/" source="CVE"/>
		<reference ref_id="CVE-2017-7994" ref_url="https://www.suse.com/security/cve/CVE-2017-7994/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2017-8787" ref_url="https://www.suse.com/security/cve/CVE-2017-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-11255" ref_url="https://www.suse.com/security/cve/CVE-2018-11255/" source="CVE"/>
		<reference ref_id="CVE-2018-11256" ref_url="https://www.suse.com/security/cve/CVE-2018-11256/" source="CVE"/>
		<reference ref_id="CVE-2018-12982" ref_url="https://www.suse.com/security/cve/CVE-2018-12982/" source="CVE"/>
		<reference ref_id="CVE-2018-12983" ref_url="https://www.suse.com/security/cve/CVE-2018-12983/" source="CVE"/>
		<reference ref_id="CVE-2018-14320" ref_url="https://www.suse.com/security/cve/CVE-2018-14320/" source="CVE"/>
		<reference ref_id="CVE-2018-20751" ref_url="https://www.suse.com/security/cve/CVE-2018-20751/" source="CVE"/>
		<reference ref_id="CVE-2018-20797" ref_url="https://www.suse.com/security/cve/CVE-2018-20797/" source="CVE"/>
		<reference ref_id="CVE-2018-5295" ref_url="https://www.suse.com/security/cve/CVE-2018-5295/" source="CVE"/>
		<reference ref_id="CVE-2018-5296" ref_url="https://www.suse.com/security/cve/CVE-2018-5296/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309/" source="CVE"/>
		<reference ref_id="CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783/" source="CVE"/>
		<reference ref_id="CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001/" source="CVE"/>
		<reference ref_id="CVE-2019-10723" ref_url="https://www.suse.com/security/cve/CVE-2019-10723/" source="CVE"/>
		<reference ref_id="CVE-2019-9687" ref_url="https://www.suse.com/security/cve/CVE-2019-9687/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo-0_10-devel-0.10.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-04"/>
	<updated date="2025-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5852/">CVE-2017-5852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5852">CVE-2017-5852 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5853/">CVE-2017-5853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5853">CVE-2017-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5854/">CVE-2017-5854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5854">CVE-2017-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5855/">CVE-2017-5855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5855">CVE-2017-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5886/">CVE-2017-5886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5886">CVE-2017-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6840">CVE-2017-6840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6844/">CVE-2017-6844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6844">CVE-2017-6844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6845">CVE-2017-6845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6847/">CVE-2017-6847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6847">CVE-2017-6847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7378/">CVE-2017-7378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7378">CVE-2017-7378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7379/">CVE-2017-7379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7379">CVE-2017-7379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7380/">CVE-2017-7380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7380">CVE-2017-7380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7381/">CVE-2017-7381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7381">CVE-2017-7381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7382/">CVE-2017-7382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7382">CVE-2017-7382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7383/">CVE-2017-7383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7383">CVE-2017-7383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7994/">CVE-2017-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7994">CVE-2017-7994 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8054">CVE-2017-8054 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8787/">CVE-2017-8787 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8787">CVE-2017-8787 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11255/">CVE-2018-11255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11255">CVE-2018-11255 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11256/">CVE-2018-11256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11256">CVE-2018-11256 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12982/">CVE-2018-12982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12982">CVE-2018-12982 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12983/">CVE-2018-12983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12983">CVE-2018-12983 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14320/">CVE-2018-14320 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14320">CVE-2018-14320 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20751/">CVE-2018-20751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20751">CVE-2018-20751 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20797/">CVE-2018-20797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20797">CVE-2018-20797 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5295/">CVE-2018-5295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5295">CVE-2018-5295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5296/">CVE-2018-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5296">CVE-2018-5296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5308">CVE-2018-5308 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5309">CVE-2018-5309 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5783">CVE-2018-5783 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8001">CVE-2018-8001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10723/">CVE-2019-10723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10723">CVE-2019-10723 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9687/">CVE-2019-9687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9687">CVE-2019-9687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017098" comment="libpodofo-0_10-devel-0.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017099" comment="libpodofo2-0.10.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017100" comment="podofo-0_10-0.10.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253843" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9817" ref_url="https://www.suse.com/security/cve/CVE-2025-9817/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-04"/>
	<updated date="2025-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9817/">CVE-2025-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9817">CVE-2025-9817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017101" comment="libwireshark18-4.4.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017102" comment="libwiretap15-4.4.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017103" comment="libwsutil16-4.4.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017104" comment="wireshark-4.4.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017105" comment="wireshark-devel-4.4.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017106" comment="wireshark-ui-qt-4.4.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253844" version="1" class="patch">
	<metadata>
		<title>7zip-25.01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53816" ref_url="https://www.suse.com/security/cve/CVE-2025-53816/" source="CVE"/>
		<reference ref_id="CVE-2025-53817" ref_url="https://www.suse.com/security/cve/CVE-2025-53817/" source="CVE"/>
		<description>
These are all security issues fixed in the 7zip-25.01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53816/">CVE-2025-53816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53816">CVE-2025-53816 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53817/">CVE-2025-53817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53817">CVE-2025-53817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017189" comment="7zip-25.01-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253845" version="1" class="patch">
	<metadata>
		<title>chromedriver-140.0.7339.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9864" ref_url="https://www.suse.com/security/cve/CVE-2025-9864/" source="CVE"/>
		<reference ref_id="CVE-2025-9865" ref_url="https://www.suse.com/security/cve/CVE-2025-9865/" source="CVE"/>
		<reference ref_id="CVE-2025-9866" ref_url="https://www.suse.com/security/cve/CVE-2025-9866/" source="CVE"/>
		<reference ref_id="CVE-2025-9867" ref_url="https://www.suse.com/security/cve/CVE-2025-9867/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-140.0.7339.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9864/">CVE-2025-9864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9864">CVE-2025-9864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9865/">CVE-2025-9865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9865">CVE-2025-9865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9866/">CVE-2025-9866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9866">CVE-2025-9866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9867/">CVE-2025-9867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9867">CVE-2025-9867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017190" comment="chromedriver-140.0.7339.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017191" comment="chromium-140.0.7339.80-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253846" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47910" ref_url="https://www.suse.com/security/cve/CVE-2025-47910/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-47910/">CVE-2025-47910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47910">CVE-2025-47910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017192" comment="go1.25-1.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017193" comment="go1.25-doc-1.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017194" comment="go1.25-libstd-1.25.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017195" comment="go1.25-race-1.25.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253847" version="1" class="patch">
	<metadata>
		<title>libsixel-bash-completion-1.10.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9300" ref_url="https://www.suse.com/security/cve/CVE-2025-9300/" source="CVE"/>
		<description>
These are all security issues fixed in the libsixel-bash-completion-1.10.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9300/">CVE-2025-9300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9300">CVE-2025-9300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017196" comment="libsixel-bash-completion-1.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017197" comment="libsixel-devel-1.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017198" comment="libsixel-utils-1.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017199" comment="libsixel-zsh-completion-1.10.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017200" comment="libsixel1-1.10.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253848" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-57833" ref_url="https://www.suse.com/security/cve/CVE-2025-57833/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-57833/">CVE-2025-57833 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57833">CVE-2025-57833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017201" comment="python311-Django-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017202" comment="python312-Django-5.2.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017203" comment="python313-Django-5.2.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253849" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-57833" ref_url="https://www.suse.com/security/cve/CVE-2025-57833/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-57833/">CVE-2025-57833 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57833">CVE-2025-57833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017204" comment="python311-Django4-4.2.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017205" comment="python312-Django4-4.2.24-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017206" comment="python313-Django4-4.2.24-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253850" version="1" class="patch">
	<metadata>
		<title>traefik-3.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-28948" ref_url="https://www.suse.com/security/cve/CVE-2022-28948/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28948/">CVE-2022-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017207" comment="traefik-3.5.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253851" version="1" class="patch">
	<metadata>
		<title>trivy-0.65.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.65.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017208" comment="trivy-0.65.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253852" version="1" class="patch">
	<metadata>
		<title>libQt5Pdf5-5.15.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-10229" ref_url="https://www.suse.com/security/cve/CVE-2024-10229/" source="CVE"/>
		<reference ref_id="CVE-2024-10827" ref_url="https://www.suse.com/security/cve/CVE-2024-10827/" source="CVE"/>
		<reference ref_id="CVE-2024-11477" ref_url="https://www.suse.com/security/cve/CVE-2024-11477/" source="CVE"/>
		<reference ref_id="CVE-2024-12694" ref_url="https://www.suse.com/security/cve/CVE-2024-12694/" source="CVE"/>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-0436" ref_url="https://www.suse.com/security/cve/CVE-2025-0436/" source="CVE"/>
		<reference ref_id="CVE-2025-0762" ref_url="https://www.suse.com/security/cve/CVE-2025-0762/" source="CVE"/>
		<reference ref_id="CVE-2025-0996" ref_url="https://www.suse.com/security/cve/CVE-2025-0996/" source="CVE"/>
		<reference ref_id="CVE-2025-0999" ref_url="https://www.suse.com/security/cve/CVE-2025-0999/" source="CVE"/>
		<reference ref_id="CVE-2025-1426" ref_url="https://www.suse.com/security/cve/CVE-2025-1426/" source="CVE"/>
		<reference ref_id="CVE-2025-1919" ref_url="https://www.suse.com/security/cve/CVE-2025-1919/" source="CVE"/>
		<reference ref_id="CVE-2025-2136" ref_url="https://www.suse.com/security/cve/CVE-2025-2136/" source="CVE"/>
		<reference ref_id="CVE-2025-24201" ref_url="https://www.suse.com/security/cve/CVE-2025-24201/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<reference ref_id="CVE-2025-2783" ref_url="https://www.suse.com/security/cve/CVE-2025-2783/" source="CVE"/>
		<reference ref_id="CVE-2025-3619" ref_url="https://www.suse.com/security/cve/CVE-2025-3619/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Pdf5-5.15.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2025-09-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10229/">CVE-2024-10229 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10229">CVE-2024-10229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10827/">CVE-2024-10827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10827">CVE-2024-10827 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11477/">CVE-2024-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11477">CVE-2024-11477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12694/">CVE-2024-12694 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12694">CVE-2024-12694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0436/">CVE-2025-0436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0436">CVE-2025-0436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0762/">CVE-2025-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0762">CVE-2025-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0996/">CVE-2025-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0996">CVE-2025-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0999/">CVE-2025-0999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0999">CVE-2025-0999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1426/">CVE-2025-1426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1426">CVE-2025-1426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1919/">CVE-2025-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1919">CVE-2025-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2136/">CVE-2025-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2136">CVE-2025-2136 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24201/">CVE-2025-24201 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2783/">CVE-2025-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2783">CVE-2025-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3619/">CVE-2025-3619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3619">CVE-2025-3619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017213" comment="libQt5Pdf5-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017214" comment="libQt5PdfWidgets5-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017215" comment="libqt5-qtpdf-devel-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017216" comment="libqt5-qtpdf-examples-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017217" comment="libqt5-qtpdf-imports-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017218" comment="libqt5-qtpdf-private-headers-devel-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017219" comment="libqt5-qtwebengine-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017220" comment="libqt5-qtwebengine-devel-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017221" comment="libqt5-qtwebengine-examples-5.15.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017222" comment="libqt5-qtwebengine-private-headers-devel-5.15.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253853" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.462-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.462-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-08"/>
	<updated date="2025-09-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017318" comment="java-1_8_0-openjdk-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017319" comment="java-1_8_0-openjdk-accessibility-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017320" comment="java-1_8_0-openjdk-demo-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017321" comment="java-1_8_0-openjdk-devel-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017322" comment="java-1_8_0-openjdk-headless-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017323" comment="java-1_8_0-openjdk-javadoc-1.8.0.462-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017324" comment="java-1_8_0-openjdk-src-1.8.0.462-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253854" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.16.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-38652" ref_url="https://www.suse.com/security/cve/CVE-2025-38652/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.16.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-08"/>
	<updated date="2025-09-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38652/">CVE-2025-38652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017326" comment="kernel-macros-6.16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017327" comment="kernel-source-6.16.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017328" comment="kernel-source-vanilla-6.16.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253855" version="1" class="patch">
	<metadata>
		<title>perl-Cpanel-JSON-XS-4.400.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40929" ref_url="https://www.suse.com/security/cve/CVE-2025-40929/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Cpanel-JSON-XS-4.400.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40929/">CVE-2025-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40929">CVE-2025-40929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017385" comment="perl-Cpanel-JSON-XS-4.400.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253856" version="1" class="patch">
	<metadata>
		<title>perl-JSON-XS-4.40.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40928" ref_url="https://www.suse.com/security/cve/CVE-2025-40928/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-JSON-XS-4.40.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40928/">CVE-2025-40928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40928">CVE-2025-40928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017386" comment="perl-JSON-XS-4.40.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253857" version="1" class="patch">
	<metadata>
		<title>python311-deepdiff-8.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58367" ref_url="https://www.suse.com/security/cve/CVE-2025-58367/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-deepdiff-8.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-58367/">CVE-2025-58367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58367">CVE-2025-58367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017387" comment="python311-deepdiff-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017388" comment="python312-deepdiff-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017389" comment="python313-deepdiff-8.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253858" version="1" class="patch">
	<metadata>
		<title>warewulf4-4.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the warewulf4-4.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017390" comment="warewulf4-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017391" comment="warewulf4-dracut-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017392" comment="warewulf4-man-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017393" comment="warewulf4-overlay-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017394" comment="warewulf4-overlay-rke2-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017395" comment="warewulf4-overlay-slurm-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017396" comment="warewulf4-reference-doc-4.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253859" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250908T141310-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52284" ref_url="https://www.suse.com/security/cve/CVE-2024-52284/" source="CVE"/>
		<reference ref_id="CVE-2024-58259" ref_url="https://www.suse.com/security/cve/CVE-2024-58259/" source="CVE"/>
		<reference ref_id="CVE-2025-51667" ref_url="https://www.suse.com/security/cve/CVE-2025-51667/" source="CVE"/>
		<reference ref_id="CVE-2025-53884" ref_url="https://www.suse.com/security/cve/CVE-2025-53884/" source="CVE"/>
		<reference ref_id="CVE-2025-54467" ref_url="https://www.suse.com/security/cve/CVE-2025-54467/" source="CVE"/>
		<reference ref_id="CVE-2025-55190" ref_url="https://www.suse.com/security/cve/CVE-2025-55190/" source="CVE"/>
		<reference ref_id="CVE-2025-56760" ref_url="https://www.suse.com/security/cve/CVE-2025-56760/" source="CVE"/>
		<reference ref_id="CVE-2025-56761" ref_url="https://www.suse.com/security/cve/CVE-2025-56761/" source="CVE"/>
		<reference ref_id="CVE-2025-58355" ref_url="https://www.suse.com/security/cve/CVE-2025-58355/" source="CVE"/>
		<reference ref_id="CVE-2025-6203" ref_url="https://www.suse.com/security/cve/CVE-2025-6203/" source="CVE"/>
		<reference ref_id="CVE-2025-8077" ref_url="https://www.suse.com/security/cve/CVE-2025-8077/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250908T141310-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-10"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52284/">CVE-2024-52284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52284">CVE-2024-52284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-58259/">CVE-2024-58259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58259">CVE-2024-58259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-51667/">CVE-2025-51667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-51667">CVE-2025-51667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53884/">CVE-2025-53884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53884">CVE-2025-53884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54467/">CVE-2025-54467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54467">CVE-2025-54467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55190/">CVE-2025-55190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55190">CVE-2025-55190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-56760/">CVE-2025-56760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56760">CVE-2025-56760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-56761/">CVE-2025-56761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56761">CVE-2025-56761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58355/">CVE-2025-58355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58355">CVE-2025-58355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6203/">CVE-2025-6203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6203">CVE-2025-6203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8077/">CVE-2025-8077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8077">CVE-2025-8077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017656" comment="govulncheck-vulndb-0.0.20250908T141310-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253860" version="1" class="patch">
	<metadata>
		<title>python311-xmltodict-0.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9375" ref_url="https://www.suse.com/security/cve/CVE-2025-9375/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-xmltodict-0.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-10"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-9375/">CVE-2025-9375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9375">CVE-2025-9375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017657" comment="python311-xmltodict-0.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017658" comment="python312-xmltodict-0.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017659" comment="python313-xmltodict-0.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253861" version="1" class="patch">
	<metadata>
		<title>rustup-1.28.2~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.28.2~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-10"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017660" comment="rustup-1.28.2~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253862" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.7.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8961" ref_url="https://www.suse.com/security/cve/CVE-2025-8961/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.7.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-10"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8961/">CVE-2025-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8961">CVE-2025-8961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017661" comment="libtiff-devel-4.7.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017662" comment="libtiff-devel-32bit-4.7.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017663" comment="libtiff6-4.7.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017664" comment="libtiff6-32bit-4.7.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017665" comment="tiff-4.7.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253863" version="1" class="patch">
	<metadata>
		<title>trivy-0.66.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.66.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-10"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017666" comment="trivy-0.66.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253864" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-57807" ref_url="https://www.suse.com/security/cve/CVE-2025-57807/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57807/">CVE-2025-57807 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57807">CVE-2025-57807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017815" comment="ImageMagick-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017816" comment="ImageMagick-config-7-SUSE-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017817" comment="ImageMagick-devel-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017818" comment="ImageMagick-devel-32bit-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017819" comment="ImageMagick-doc-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017820" comment="ImageMagick-extra-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017821" comment="libMagick++-7_Q16HDRI5-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017822" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017823" comment="libMagick++-devel-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017824" comment="libMagick++-devel-32bit-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017825" comment="libMagickCore-7_Q16HDRI10-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017826" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017827" comment="libMagickWand-7_Q16HDRI10-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017828" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017829" comment="perl-PerlMagick-7.1.2.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253865" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.16.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-53093" ref_url="https://www.suse.com/security/cve/CVE-2024-53093/" source="CVE"/>
		<reference ref_id="CVE-2025-38216" ref_url="https://www.suse.com/security/cve/CVE-2025-38216/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.16.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53093/">CVE-2024-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38216/">CVE-2025-38216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017831" comment="kernel-macros-6.16.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017832" comment="kernel-source-6.16.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017833" comment="kernel-source-vanilla-6.16.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253866" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.11.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8114" ref_url="https://www.suse.com/security/cve/CVE-2025-8114/" source="CVE"/>
		<reference ref_id="CVE-2025-8277" ref_url="https://www.suse.com/security/cve/CVE-2025-8277/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.11.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8114/">CVE-2025-8114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8114">CVE-2025-8114 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-8277/">CVE-2025-8277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8277">CVE-2025-8277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017834" comment="libssh-config-0.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017835" comment="libssh-devel-0.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017836" comment="libssh4-0.11.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017837" comment="libssh4-32bit-0.11.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253867" version="1" class="patch">
	<metadata>
		<title>orthanc-gdcm-1.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22373" ref_url="https://www.suse.com/security/cve/CVE-2024-22373/" source="CVE"/>
		<reference ref_id="CVE-2024-22391" ref_url="https://www.suse.com/security/cve/CVE-2024-22391/" source="CVE"/>
		<reference ref_id="CVE-2024-25569" ref_url="https://www.suse.com/security/cve/CVE-2024-25569/" source="CVE"/>
		<description>
These are all security issues fixed in the orthanc-gdcm-1.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22373/">CVE-2024-22373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22373">CVE-2024-22373 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22391/">CVE-2024-22391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22391">CVE-2024-22391 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-25569/">CVE-2024-25569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25569">CVE-2024-25569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017838" comment="orthanc-gdcm-1.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253868" version="1" class="patch">
	<metadata>
		<title>xen-4.20.1_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2025-27466" ref_url="https://www.suse.com/security/cve/CVE-2025-27466/" source="CVE"/>
		<reference ref_id="CVE-2025-58143" ref_url="https://www.suse.com/security/cve/CVE-2025-58143/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.1_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27466/">CVE-2025-27466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27466">CVE-2025-27466 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-58143/">CVE-2025-58143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58143">CVE-2025-58143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017839" comment="xen-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017840" comment="xen-devel-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017841" comment="xen-doc-html-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017842" comment="xen-libs-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017843" comment="xen-tools-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017844" comment="xen-tools-domU-4.20.1_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017845" comment="xen-tools-xendomains-wait-disk-4.20.1_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253869" version="1" class="patch">
	<metadata>
		<title>chromedriver-140.0.7339.127-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10200" ref_url="https://www.suse.com/security/cve/CVE-2025-10200/" source="CVE"/>
		<reference ref_id="CVE-2025-10201" ref_url="https://www.suse.com/security/cve/CVE-2025-10201/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-140.0.7339.127-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-12"/>
	<updated date="2025-09-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10200/">CVE-2025-10200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10200">CVE-2025-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10201/">CVE-2025-10201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10201">CVE-2025-10201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017973" comment="chromedriver-140.0.7339.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017974" comment="chromium-140.0.7339.127-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253870" version="1" class="patch">
	<metadata>
		<title>liblog4cxx-devel-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54812" ref_url="https://www.suse.com/security/cve/CVE-2025-54812/" source="CVE"/>
		<description>
These are all security issues fixed in the liblog4cxx-devel-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-12"/>
	<updated date="2025-09-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54812/">CVE-2025-54812 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54812">CVE-2025-54812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017975" comment="liblog4cxx-devel-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017976" comment="liblog4cxx15-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253871" version="1" class="patch">
	<metadata>
		<title>cargo-audit-0.21.2~git0.18e58c2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2025-4574" ref_url="https://www.suse.com/security/cve/CVE-2025-4574/" source="CVE"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-0.21.2~git0.18e58c2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-14"/>
	<updated date="2025-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4574/">CVE-2025-4574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4574">CVE-2025-4574 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018018" comment="cargo-audit-0.21.2~git0.18e58c2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253872" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.10.3~git0.ee7d7ef-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2025-4574" ref_url="https://www.suse.com/security/cve/CVE-2025-4574/" source="CVE"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.10.3~git0.ee7d7ef-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-14"/>
	<updated date="2025-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4574/">CVE-2025-4574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4574">CVE-2025-4574 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018019" comment="cargo-c-0.10.3~git0.ee7d7ef-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253873" version="1" class="patch">
	<metadata>
		<title>cargo-packaging-1.3.0+0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-packaging-1.3.0+0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-14"/>
	<updated date="2025-09-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018020" comment="cargo-packaging-1.3.0+0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253874" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.16.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.16.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-14"/>
	<updated date="2025-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018022" comment="kernel-macros-6.16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018023" comment="kernel-source-6.16.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018024" comment="kernel-source-vanilla-6.16.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253875" version="1" class="patch">
	<metadata>
		<title>watchexec-2.3.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the watchexec-2.3.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-15"/>
	<updated date="2025-09-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018185" comment="watchexec-2.3.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253876" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-16"/>
	<updated date="2025-09-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018311" comment="firefox-esr-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018312" comment="firefox-esr-branding-upstream-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018313" comment="firefox-esr-translations-common-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018314" comment="firefox-esr-translations-other-140.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253877" version="1" class="patch">
	<metadata>
		<title>tkimg-2.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8851" ref_url="https://www.suse.com/security/cve/CVE-2025-8851/" source="CVE"/>
		<reference ref_id="CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165/" source="CVE"/>
		<description>
These are all security issues fixed in the tkimg-2.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-16"/>
	<updated date="2025-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8851/">CVE-2025-8851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8851">CVE-2025-8851 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018315" comment="tkimg-2.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018316" comment="tkimg-devel-2.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253878" version="1" class="patch">
	<metadata>
		<title>autogen-5.18.16-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8746" ref_url="https://www.suse.com/security/cve/CVE-2025-8746/" source="CVE"/>
		<description>
These are all security issues fixed in the autogen-5.18.16-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2025-09-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8746/">CVE-2025-8746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8746">CVE-2025-8746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018408" comment="autogen-5.18.16-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018409" comment="autoopts-5.18.16-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018410" comment="libopts25-5.18.16-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253879" version="1" class="patch">
	<metadata>
		<title>element-desktop-1.11.112-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59161" ref_url="https://www.suse.com/security/cve/CVE-2025-59161/" source="CVE"/>
		<description>
These are all security issues fixed in the element-desktop-1.11.112-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2025-09-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59161/">CVE-2025-59161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59161">CVE-2025-59161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018411" comment="element-desktop-1.11.112-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253880" version="1" class="patch">
	<metadata>
		<title>element-web-1.11.112-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59161" ref_url="https://www.suse.com/security/cve/CVE-2025-59161/" source="CVE"/>
		<description>
These are all security issues fixed in the element-web-1.11.112-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2025-09-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59161/">CVE-2025-59161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59161">CVE-2025-59161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018412" comment="element-web-1.11.112-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253881" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018636" comment="MozillaThunderbird-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018637" comment="MozillaThunderbird-openpgp-librnp-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018638" comment="MozillaThunderbird-translations-common-140.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018639" comment="MozillaThunderbird-translations-other-140.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253882" version="1" class="patch">
	<metadata>
		<title>coredns-1.12.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58063" ref_url="https://www.suse.com/security/cve/CVE-2025-58063/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.12.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-58063/">CVE-2025-58063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58063">CVE-2025-58063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018640" comment="coredns-1.12.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018641" comment="coredns-extras-1.12.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253883" version="1" class="patch">
	<metadata>
		<title>cups-2.4.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<reference ref_id="CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018642" comment="cups-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018643" comment="cups-client-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018644" comment="cups-config-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018645" comment="cups-ddk-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018646" comment="cups-devel-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018647" comment="cups-devel-32bit-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018648" comment="libcups2-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018649" comment="libcups2-32bit-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018650" comment="libcupsimage2-2.4.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018651" comment="libcupsimage2-32bit-2.4.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253884" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.28.17-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076/" source="CVE"/>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<reference ref_id="CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176/" source="CVE"/>
		<reference ref_id="CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.28.17-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018652" comment="cups-filters-1.28.17-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018653" comment="cups-filters-devel-1.28.17-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253885" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250917T170349-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4953" ref_url="https://www.suse.com/security/cve/CVE-2025-4953/" source="CVE"/>
		<reference ref_id="CVE-2025-54123" ref_url="https://www.suse.com/security/cve/CVE-2025-54123/" source="CVE"/>
		<reference ref_id="CVE-2025-54376" ref_url="https://www.suse.com/security/cve/CVE-2025-54376/" source="CVE"/>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<reference ref_id="CVE-2025-58063" ref_url="https://www.suse.com/security/cve/CVE-2025-58063/" source="CVE"/>
		<reference ref_id="CVE-2025-58157" ref_url="https://www.suse.com/security/cve/CVE-2025-58157/" source="CVE"/>
		<reference ref_id="CVE-2025-58158" ref_url="https://www.suse.com/security/cve/CVE-2025-58158/" source="CVE"/>
		<reference ref_id="CVE-2025-58430" ref_url="https://www.suse.com/security/cve/CVE-2025-58430/" source="CVE"/>
		<reference ref_id="CVE-2025-58437" ref_url="https://www.suse.com/security/cve/CVE-2025-58437/" source="CVE"/>
		<reference ref_id="CVE-2025-58445" ref_url="https://www.suse.com/security/cve/CVE-2025-58445/" source="CVE"/>
		<reference ref_id="CVE-2025-58450" ref_url="https://www.suse.com/security/cve/CVE-2025-58450/" source="CVE"/>
		<reference ref_id="CVE-2025-59358" ref_url="https://www.suse.com/security/cve/CVE-2025-59358/" source="CVE"/>
		<reference ref_id="CVE-2025-59359" ref_url="https://www.suse.com/security/cve/CVE-2025-59359/" source="CVE"/>
		<reference ref_id="CVE-2025-59360" ref_url="https://www.suse.com/security/cve/CVE-2025-59360/" source="CVE"/>
		<reference ref_id="CVE-2025-59361" ref_url="https://www.suse.com/security/cve/CVE-2025-59361/" source="CVE"/>
		<reference ref_id="CVE-2025-7445" ref_url="https://www.suse.com/security/cve/CVE-2025-7445/" source="CVE"/>
		<reference ref_id="CVE-2025-8396" ref_url="https://www.suse.com/security/cve/CVE-2025-8396/" source="CVE"/>
		<reference ref_id="CVE-2025-9072" ref_url="https://www.suse.com/security/cve/CVE-2025-9072/" source="CVE"/>
		<reference ref_id="CVE-2025-9076" ref_url="https://www.suse.com/security/cve/CVE-2025-9076/" source="CVE"/>
		<reference ref_id="CVE-2025-9078" ref_url="https://www.suse.com/security/cve/CVE-2025-9078/" source="CVE"/>
		<reference ref_id="CVE-2025-9084" ref_url="https://www.suse.com/security/cve/CVE-2025-9084/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250917T170349-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4953/">CVE-2025-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4953">CVE-2025-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54123/">CVE-2025-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54123">CVE-2025-54123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54376/">CVE-2025-54376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54376">CVE-2025-54376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-58063/">CVE-2025-58063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58063">CVE-2025-58063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58157/">CVE-2025-58157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58157">CVE-2025-58157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58158/">CVE-2025-58158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58158">CVE-2025-58158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58430/">CVE-2025-58430 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58430">CVE-2025-58430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58437/">CVE-2025-58437 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58437">CVE-2025-58437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58445/">CVE-2025-58445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58445">CVE-2025-58445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58450/">CVE-2025-58450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58450">CVE-2025-58450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59358/">CVE-2025-59358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59358">CVE-2025-59358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59359/">CVE-2025-59359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59359">CVE-2025-59359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59360/">CVE-2025-59360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59360">CVE-2025-59360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59361/">CVE-2025-59361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59361">CVE-2025-59361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7445/">CVE-2025-7445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7445">CVE-2025-7445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8396/">CVE-2025-8396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8396">CVE-2025-8396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9072/">CVE-2025-9072 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9072">CVE-2025-9072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9076/">CVE-2025-9076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9076">CVE-2025-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9078/">CVE-2025-9078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9078">CVE-2025-9078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9084/">CVE-2025-9084 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9084">CVE-2025-9084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018654" comment="govulncheck-vulndb-0.0.20250917T170349-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253886" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-143.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10530" ref_url="https://www.suse.com/security/cve/CVE-2025-10530/" source="CVE"/>
		<reference ref_id="CVE-2025-10531" ref_url="https://www.suse.com/security/cve/CVE-2025-10531/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10534" ref_url="https://www.suse.com/security/cve/CVE-2025-10534/" source="CVE"/>
		<reference ref_id="CVE-2025-10535" ref_url="https://www.suse.com/security/cve/CVE-2025-10535/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-143.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10530/">CVE-2025-10530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10530">CVE-2025-10530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10531/">CVE-2025-10531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10531">CVE-2025-10531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10534/">CVE-2025-10534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10534">CVE-2025-10534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10535/">CVE-2025-10535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10535">CVE-2025-10535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018729" comment="MozillaFirefox-143.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018730" comment="MozillaFirefox-branding-upstream-143.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018731" comment="MozillaFirefox-devel-143.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018732" comment="MozillaFirefox-translations-common-143.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018733" comment="MozillaFirefox-translations-other-143.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253887" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250918T182144-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-5187" ref_url="https://www.suse.com/security/cve/CVE-2025-5187/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250918T182144-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5187/">CVE-2025-5187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5187">CVE-2025-5187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018734" comment="govulncheck-vulndb-0.0.20250918T182144-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253888" version="1" class="patch">
	<metadata>
		<title>mybatis-3.5.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53192" ref_url="https://www.suse.com/security/cve/CVE-2025-53192/" source="CVE"/>
		<description>
These are all security issues fixed in the mybatis-3.5.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53192/">CVE-2025-53192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53192">CVE-2025-53192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018735" comment="mybatis-3.5.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018736" comment="mybatis-javadoc-3.5.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253889" version="1" class="patch">
	<metadata>
		<title>ognl-3.4.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53192" ref_url="https://www.suse.com/security/cve/CVE-2025-53192/" source="CVE"/>
		<description>
These are all security issues fixed in the ognl-3.4.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53192/">CVE-2025-53192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53192">CVE-2025-53192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018737" comment="ognl-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018738" comment="ognl-javadoc-3.4.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253890" version="1" class="patch">
	<metadata>
		<title>rke2-1.33-1.33.5+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.33-1.33.5+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-09-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018756" comment="rke2-1.33-1.33.5+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253891" version="1" class="patch">
	<metadata>
		<title>tcpreplay-4.5.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8746" ref_url="https://www.suse.com/security/cve/CVE-2025-8746/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpreplay-4.5.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-22"/>
	<updated date="2025-09-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8746/">CVE-2025-8746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8746">CVE-2025-8746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018807" comment="tcpreplay-4.5.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253892" version="1" class="patch">
	<metadata>
		<title>tor-0.4.8.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4444" ref_url="https://www.suse.com/security/cve/CVE-2025-4444/" source="CVE"/>
		<description>
These are all security issues fixed in the tor-0.4.8.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-22"/>
	<updated date="2025-09-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4444/">CVE-2025-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4444">CVE-2025-4444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018808" comment="tor-0.4.8.18-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253893" version="1" class="patch">
	<metadata>
		<title>bird3-3.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59688" ref_url="https://www.suse.com/security/cve/CVE-2025-59688/" source="CVE"/>
		<description>
These are all security issues fixed in the bird3-3.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-23"/>
	<updated date="2025-09-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59688/">CVE-2025-59688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59688">CVE-2025-59688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019234" comment="bird3-3.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019235" comment="bird3-doc-3.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253894" version="1" class="patch">
	<metadata>
		<title>expat-2.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-23"/>
	<updated date="2025-09-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019236" comment="expat-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019237" comment="libexpat-devel-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019238" comment="libexpat-devel-32bit-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019239" comment="libexpat1-2.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019240" comment="libexpat1-32bit-2.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253895" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250922T204835-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47910" ref_url="https://www.suse.com/security/cve/CVE-2025-47910/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250922T204835-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-23"/>
	<updated date="2025-09-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-47910/">CVE-2025-47910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47910">CVE-2025-47910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019241" comment="govulncheck-vulndb-0.0.20250922T204835-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253896" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-40.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-24"/>
	<updated date="2025-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019387" comment="avahi-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019388" comment="avahi-autoipd-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019389" comment="avahi-compat-howl-devel-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019390" comment="avahi-compat-mDNSResponder-devel-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019391" comment="avahi-lang-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019392" comment="avahi-utils-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019393" comment="libavahi-client3-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019394" comment="libavahi-client3-32bit-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019395" comment="libavahi-common3-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019396" comment="libavahi-common3-32bit-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019397" comment="libavahi-core7-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019398" comment="libavahi-devel-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019399" comment="libavahi-libevent1-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019400" comment="libdns_sd-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019401" comment="libdns_sd-32bit-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019402" comment="libhowl0-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019403" comment="python311-avahi-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019404" comment="python312-avahi-0.8-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019405" comment="python313-avahi-0.8-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253897" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10630" ref_url="https://www.suse.com/security/cve/CVE-2025-10630/" source="CVE"/>
		<reference ref_id="CVE-2025-59341" ref_url="https://www.suse.com/security/cve/CVE-2025-59341/" source="CVE"/>
		<reference ref_id="CVE-2025-59342" ref_url="https://www.suse.com/security/cve/CVE-2025-59342/" source="CVE"/>
		<reference ref_id="CVE-2025-59345" ref_url="https://www.suse.com/security/cve/CVE-2025-59345/" source="CVE"/>
		<reference ref_id="CVE-2025-59346" ref_url="https://www.suse.com/security/cve/CVE-2025-59346/" source="CVE"/>
		<reference ref_id="CVE-2025-59347" ref_url="https://www.suse.com/security/cve/CVE-2025-59347/" source="CVE"/>
		<reference ref_id="CVE-2025-59348" ref_url="https://www.suse.com/security/cve/CVE-2025-59348/" source="CVE"/>
		<reference ref_id="CVE-2025-59349" ref_url="https://www.suse.com/security/cve/CVE-2025-59349/" source="CVE"/>
		<reference ref_id="CVE-2025-59350" ref_url="https://www.suse.com/security/cve/CVE-2025-59350/" source="CVE"/>
		<reference ref_id="CVE-2025-59351" ref_url="https://www.suse.com/security/cve/CVE-2025-59351/" source="CVE"/>
		<reference ref_id="CVE-2025-59352" ref_url="https://www.suse.com/security/cve/CVE-2025-59352/" source="CVE"/>
		<reference ref_id="CVE-2025-59353" ref_url="https://www.suse.com/security/cve/CVE-2025-59353/" source="CVE"/>
		<reference ref_id="CVE-2025-59354" ref_url="https://www.suse.com/security/cve/CVE-2025-59354/" source="CVE"/>
		<reference ref_id="CVE-2025-59410" ref_url="https://www.suse.com/security/cve/CVE-2025-59410/" source="CVE"/>
		<reference ref_id="CVE-2025-9079" ref_url="https://www.suse.com/security/cve/CVE-2025-9079/" source="CVE"/>
		<reference ref_id="CVE-2025-9081" ref_url="https://www.suse.com/security/cve/CVE-2025-9081/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250924T192141-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-25"/>
	<updated date="2025-09-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10630/">CVE-2025-10630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10630">CVE-2025-10630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59341/">CVE-2025-59341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59341">CVE-2025-59341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59342/">CVE-2025-59342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59342">CVE-2025-59342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59345/">CVE-2025-59345 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59345">CVE-2025-59345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59346/">CVE-2025-59346 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59346">CVE-2025-59346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59347/">CVE-2025-59347 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59347">CVE-2025-59347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59348/">CVE-2025-59348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59348">CVE-2025-59348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59349/">CVE-2025-59349 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59349">CVE-2025-59349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59350/">CVE-2025-59350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59350">CVE-2025-59350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59351/">CVE-2025-59351 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59351">CVE-2025-59351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59352/">CVE-2025-59352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59352">CVE-2025-59352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59353/">CVE-2025-59353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59353">CVE-2025-59353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59354/">CVE-2025-59354 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59354">CVE-2025-59354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59410/">CVE-2025-59410 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59410">CVE-2025-59410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9079/">CVE-2025-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9079">CVE-2025-9079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9081/">CVE-2025-9081 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9081">CVE-2025-9081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019447" comment="govulncheck-vulndb-0.0.20250924T192141-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253898" version="1" class="patch">
	<metadata>
		<title>krita-5.2.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59820" ref_url="https://www.suse.com/security/cve/CVE-2025-59820/" source="CVE"/>
		<description>
These are all security issues fixed in the krita-5.2.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-25"/>
	<updated date="2025-09-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59820/">CVE-2025-59820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59820">CVE-2025-59820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019448" comment="krita-5.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019449" comment="krita-devel-5.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019450" comment="krita-lang-5.2.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253899" version="1" class="patch">
	<metadata>
		<title>chromedriver-140.0.7339.207-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10500" ref_url="https://www.suse.com/security/cve/CVE-2025-10500/" source="CVE"/>
		<reference ref_id="CVE-2025-10501" ref_url="https://www.suse.com/security/cve/CVE-2025-10501/" source="CVE"/>
		<reference ref_id="CVE-2025-10502" ref_url="https://www.suse.com/security/cve/CVE-2025-10502/" source="CVE"/>
		<reference ref_id="CVE-2025-10585" ref_url="https://www.suse.com/security/cve/CVE-2025-10585/" source="CVE"/>
		<reference ref_id="CVE-2025-10890" ref_url="https://www.suse.com/security/cve/CVE-2025-10890/" source="CVE"/>
		<reference ref_id="CVE-2025-10891" ref_url="https://www.suse.com/security/cve/CVE-2025-10891/" source="CVE"/>
		<reference ref_id="CVE-2025-10892" ref_url="https://www.suse.com/security/cve/CVE-2025-10892/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-140.0.7339.207-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10500/">CVE-2025-10500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10500">CVE-2025-10500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10501/">CVE-2025-10501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10501">CVE-2025-10501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10502/">CVE-2025-10502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10502">CVE-2025-10502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10585/">CVE-2025-10585 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-10585">CVE-2025-10585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10890/">CVE-2025-10890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10890">CVE-2025-10890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10891/">CVE-2025-10891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10891">CVE-2025-10891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10892/">CVE-2025-10892 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-10892">CVE-2025-10892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019677" comment="chromedriver-140.0.7339.207-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019678" comment="chromium-140.0.7339.207-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253900" version="1" class="patch">
	<metadata>
		<title>openbao-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6203" ref_url="https://www.suse.com/security/cve/CVE-2025-6203/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6203/">CVE-2025-6203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6203">CVE-2025-6203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019679" comment="openbao-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019680" comment="openbao-agent-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019681" comment="openbao-cassandra-database-plugin-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019682" comment="openbao-influxdb-database-plugin-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019683" comment="openbao-mysql-database-plugin-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019684" comment="openbao-mysql-legacy-database-plugin-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019685" comment="openbao-postgresql-database-plugin-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019686" comment="openbao-server-2.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253901" version="1" class="patch">
	<metadata>
		<title>postgresql17-17.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql17-17.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019687" comment="postgresql17-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019688" comment="postgresql17-contrib-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019689" comment="postgresql17-devel-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019690" comment="postgresql17-docs-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019691" comment="postgresql17-llvmjit-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019692" comment="postgresql17-llvmjit-devel-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019693" comment="postgresql17-plperl-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019694" comment="postgresql17-plpython-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019695" comment="postgresql17-pltcl-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019696" comment="postgresql17-server-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019697" comment="postgresql17-server-devel-17.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019698" comment="postgresql17-test-17.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253902" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.29-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46810" ref_url="https://www.suse.com/security/cve/CVE-2025-46810/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.29-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46810/">CVE-2025-46810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46810">CVE-2025-46810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019699" comment="traefik2-2.11.29-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253903" version="1" class="patch">
	<metadata>
		<title>tree-sitter-ruby-0.23.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5889" ref_url="https://www.suse.com/security/cve/CVE-2025-5889/" source="CVE"/>
		<reference ref_id="CVE-2025-59343" ref_url="https://www.suse.com/security/cve/CVE-2025-59343/" source="CVE"/>
		<description>
These are all security issues fixed in the tree-sitter-ruby-0.23.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5889/">CVE-2025-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5889">CVE-2025-5889 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59343/">CVE-2025-59343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59343">CVE-2025-59343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019700" comment="tree-sitter-ruby-0.23.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019701" comment="tree-sitter-ruby-devel-0.23.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253904" version="1" class="patch">
	<metadata>
		<title>cJSON-devel-1.7.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-26819" ref_url="https://www.suse.com/security/cve/CVE-2023-26819/" source="CVE"/>
		<reference ref_id="CVE-2025-57052" ref_url="https://www.suse.com/security/cve/CVE-2025-57052/" source="CVE"/>
		<description>
These are all security issues fixed in the cJSON-devel-1.7.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-26819/">CVE-2023-26819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26819">CVE-2023-26819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57052/">CVE-2025-57052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57052">CVE-2025-57052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019861" comment="cJSON-devel-1.7.19-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019862" comment="libcjson1-1.7.19-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253905" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10924" ref_url="https://www.suse.com/security/cve/CVE-2025-10924/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.4-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10924/">CVE-2025-10924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10924">CVE-2025-10924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019863" comment="gimp-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019864" comment="gimp-devel-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019865" comment="gimp-extension-goat-excercises-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019866" comment="gimp-lang-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019867" comment="gimp-plugin-aa-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019868" comment="gimp-plugin-python3-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019869" comment="gimp-vala-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019870" comment="libgimp-3_0-0-3.0.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019871" comment="libgimpui-3_0-0-3.0.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253906" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.16.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-50412" ref_url="https://www.suse.com/security/cve/CVE-2022-50412/" source="CVE"/>
		<reference ref_id="CVE-2023-53220" ref_url="https://www.suse.com/security/cve/CVE-2023-53220/" source="CVE"/>
		<reference ref_id="CVE-2025-38011" ref_url="https://www.suse.com/security/cve/CVE-2025-38011/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.16.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50412/">CVE-2022-50412 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50412">CVE-2022-50412 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53220/">CVE-2023-53220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53220">CVE-2023-53220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38011/">CVE-2025-38011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38011">CVE-2025-38011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019873" comment="kernel-macros-6.16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019874" comment="kernel-source-6.16.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019875" comment="kernel-source-vanilla-6.16.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253907" version="1" class="patch">
	<metadata>
		<title>kubecolor-0.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<description>
These are all security issues fixed in the kubecolor-0.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019876" comment="kubecolor-0.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253908" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019877" comment="ruby3.4-rubygem-rack-2.2-2.2.18-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253909" version="1" class="patch">
	<metadata>
		<title>afterburn-5.9.0.git21.a73f509-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.9.0.git21.a73f509-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2025-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020022" comment="afterburn-5.9.0.git21.a73f509-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020023" comment="afterburn-dracut-5.9.0.git21.a73f509-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253910" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-3499" ref_url="https://www.suse.com/security/cve/CVE-2014-3499/" source="CVE"/>
		<reference ref_id="CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277/" source="CVE"/>
		<reference ref_id="CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407/" source="CVE"/>
		<reference ref_id="CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408/" source="CVE"/>
		<reference ref_id="CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178/" source="CVE"/>
		<reference ref_id="CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179/" source="CVE"/>
		<reference ref_id="CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356/" source="CVE"/>
		<reference ref_id="CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357/" source="CVE"/>
		<reference ref_id="CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358/" source="CVE"/>
		<reference ref_id="CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627/" source="CVE"/>
		<reference ref_id="CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629/" source="CVE"/>
		<reference ref_id="CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630/" source="CVE"/>
		<reference ref_id="CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631/" source="CVE"/>
		<reference ref_id="CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697/" source="CVE"/>
		<reference ref_id="CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892/" source="CVE"/>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699/" source="CVE"/>
		<reference ref_id="CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509/" source="CVE"/>
		<reference ref_id="CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271/" source="CVE"/>
		<reference ref_id="CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912/" source="CVE"/>
		<reference ref_id="CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109/" source="CVE"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<reference ref_id="CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841/" source="CVE"/>
		<reference ref_id="CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842/" source="CVE"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2025-09-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3499/">CVE-2014-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3499">CVE-2014-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5277">CVE-2014-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6407">CVE-2014-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6408">CVE-2014-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8178">CVE-2014-8178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8179">CVE-2014-8179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9356">CVE-2014-9356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9357">CVE-2014-9357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9358">CVE-2014-9358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3627">CVE-2015-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3629">CVE-2015-3629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3630">CVE-2015-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3631">CVE-2015-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3697">CVE-2016-3697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8867">CVE-2016-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16539">CVE-2017-16539 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10892">CVE-2018-10892 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20699">CVE-2018-20699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13509">CVE-2019-13509 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14271">CVE-2019-14271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13401">CVE-2020-13401 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020024" comment="docker-stable-24.0.9_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020025" comment="docker-stable-bash-completion-24.0.9_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020026" comment="docker-stable-buildx-0.25.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020027" comment="docker-stable-fish-completion-24.0.9_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020028" comment="docker-stable-rootless-extras-24.0.9_ce-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020029" comment="docker-stable-zsh-completion-24.0.9_ce-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253911" version="1" class="patch">
	<metadata>
		<title>curl-8.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148/" source="CVE"/>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-01"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020072" comment="curl-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020073" comment="curl-fish-completion-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020074" comment="curl-zsh-completion-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020075" comment="libcurl-devel-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020076" comment="libcurl-devel-32bit-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020077" comment="libcurl-devel-doc-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020078" comment="libcurl4-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020079" comment="libcurl4-32bit-8.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020080" comment="wcurl-8.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253912" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-4.4.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59842" ref_url="https://www.suse.com/security/cve/CVE-2025-59842/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-4.4.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-01"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59842/">CVE-2025-59842 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59842">CVE-2025-59842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020081" comment="jupyter-jupyterlab-4.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020082" comment="python311-jupyterlab-4.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020083" comment="python312-jupyterlab-4.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020084" comment="python313-jupyterlab-4.4.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253913" version="1" class="patch">
	<metadata>
		<title>libsuricata8_0_1-8.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59147" ref_url="https://www.suse.com/security/cve/CVE-2025-59147/" source="CVE"/>
		<reference ref_id="CVE-2025-59148" ref_url="https://www.suse.com/security/cve/CVE-2025-59148/" source="CVE"/>
		<reference ref_id="CVE-2025-59149" ref_url="https://www.suse.com/security/cve/CVE-2025-59149/" source="CVE"/>
		<reference ref_id="CVE-2025-59150" ref_url="https://www.suse.com/security/cve/CVE-2025-59150/" source="CVE"/>
		<description>
These are all security issues fixed in the libsuricata8_0_1-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-01"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59147/">CVE-2025-59147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59147">CVE-2025-59147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59148/">CVE-2025-59148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59148">CVE-2025-59148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59149/">CVE-2025-59149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59149">CVE-2025-59149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59150/">CVE-2025-59150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59150">CVE-2025-59150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020085" comment="libsuricata8_0_1-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020086" comment="suricata-8.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020087" comment="suricata-devel-8.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253914" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-143.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11152" ref_url="https://www.suse.com/security/cve/CVE-2025-11152/" source="CVE"/>
		<reference ref_id="CVE-2025-11153" ref_url="https://www.suse.com/security/cve/CVE-2025-11153/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-143.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-02"/>
	<updated date="2025-10-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11152/">CVE-2025-11152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11152">CVE-2025-11152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11153/">CVE-2025-11153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11153">CVE-2025-11153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020145" comment="MozillaFirefox-143.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020146" comment="MozillaFirefox-branding-upstream-143.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020147" comment="MozillaFirefox-devel-143.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020148" comment="MozillaFirefox-translations-common-143.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020149" comment="MozillaFirefox-translations-other-143.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253915" version="1" class="patch">
	<metadata>
		<title>azure-storage-azcopy-10.30.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the azure-storage-azcopy-10.30.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-02"/>
	<updated date="2025-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020150" comment="azure-storage-azcopy-10.30.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253916" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-13.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-13.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-02"/>
	<updated date="2025-10-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020151" comment="libvmtools-devel-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020152" comment="libvmtools0-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020153" comment="open-vm-tools-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020154" comment="open-vm-tools-containerinfo-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020155" comment="open-vm-tools-desktop-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020156" comment="open-vm-tools-salt-minion-13.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020157" comment="open-vm-tools-sdmp-13.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253917" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.25-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59681" ref_url="https://www.suse.com/security/cve/CVE-2025-59681/" source="CVE"/>
		<reference ref_id="CVE-2025-59682" ref_url="https://www.suse.com/security/cve/CVE-2025-59682/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.25-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-02"/>
	<updated date="2025-10-02"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59681/">CVE-2025-59681 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59681">CVE-2025-59681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59682/">CVE-2025-59682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59682">CVE-2025-59682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020158" comment="python311-Django4-4.2.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020159" comment="python312-Django4-4.2.25-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020160" comment="python313-Django4-4.2.25-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253918" version="1" class="patch">
	<metadata>
		<title>logback-1.2.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6378" ref_url="https://www.suse.com/security/cve/CVE-2023-6378/" source="CVE"/>
		<reference ref_id="CVE-2023-6481" ref_url="https://www.suse.com/security/cve/CVE-2023-6481/" source="CVE"/>
		<reference ref_id="CVE-2025-11226" ref_url="https://www.suse.com/security/cve/CVE-2025-11226/" source="CVE"/>
		<description>
These are all security issues fixed in the logback-1.2.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-03"/>
	<updated date="2025-10-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6378/">CVE-2023-6378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6378">CVE-2023-6378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6481/">CVE-2023-6481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6481">CVE-2023-6481 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-11226/">CVE-2025-11226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11226">CVE-2025-11226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020178" comment="logback-1.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020179" comment="logback-access-1.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020180" comment="logback-examples-1.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020181" comment="logback-javadoc-1.2.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253919" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59681" ref_url="https://www.suse.com/security/cve/CVE-2025-59681/" source="CVE"/>
		<reference ref_id="CVE-2025-59682" ref_url="https://www.suse.com/security/cve/CVE-2025-59682/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-03"/>
	<updated date="2025-10-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59681/">CVE-2025-59681 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59681">CVE-2025-59681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59682/">CVE-2025-59682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59682">CVE-2025-59682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020182" comment="python311-Django-5.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020183" comment="python312-Django-5.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020184" comment="python313-Django-5.2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253920" version="1" class="patch">
	<metadata>
		<title>haproxy-3.2.6+git0.81568b2d1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-3.2.6+git0.81568b2d1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-04"/>
	<updated date="2025-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020185" comment="haproxy-3.2.6+git0.81568b2d1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253921" version="1" class="patch">
	<metadata>
		<title>redis-8.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-8.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-04"/>
	<updated date="2025-10-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020186" comment="redis-8.2.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253922" version="1" class="patch">
	<metadata>
		<title>chromedriver-141.0.7390.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11205" ref_url="https://www.suse.com/security/cve/CVE-2025-11205/" source="CVE"/>
		<reference ref_id="CVE-2025-11206" ref_url="https://www.suse.com/security/cve/CVE-2025-11206/" source="CVE"/>
		<reference ref_id="CVE-2025-11207" ref_url="https://www.suse.com/security/cve/CVE-2025-11207/" source="CVE"/>
		<reference ref_id="CVE-2025-11208" ref_url="https://www.suse.com/security/cve/CVE-2025-11208/" source="CVE"/>
		<reference ref_id="CVE-2025-11209" ref_url="https://www.suse.com/security/cve/CVE-2025-11209/" source="CVE"/>
		<reference ref_id="CVE-2025-11210" ref_url="https://www.suse.com/security/cve/CVE-2025-11210/" source="CVE"/>
		<reference ref_id="CVE-2025-11211" ref_url="https://www.suse.com/security/cve/CVE-2025-11211/" source="CVE"/>
		<reference ref_id="CVE-2025-11212" ref_url="https://www.suse.com/security/cve/CVE-2025-11212/" source="CVE"/>
		<reference ref_id="CVE-2025-11213" ref_url="https://www.suse.com/security/cve/CVE-2025-11213/" source="CVE"/>
		<reference ref_id="CVE-2025-11215" ref_url="https://www.suse.com/security/cve/CVE-2025-11215/" source="CVE"/>
		<reference ref_id="CVE-2025-11216" ref_url="https://www.suse.com/security/cve/CVE-2025-11216/" source="CVE"/>
		<reference ref_id="CVE-2025-11219" ref_url="https://www.suse.com/security/cve/CVE-2025-11219/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-141.0.7390.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-05"/>
	<updated date="2025-10-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11205/">CVE-2025-11205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11205">CVE-2025-11205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11206/">CVE-2025-11206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11206">CVE-2025-11206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11207/">CVE-2025-11207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11207">CVE-2025-11207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11208/">CVE-2025-11208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11208">CVE-2025-11208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11209/">CVE-2025-11209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11209">CVE-2025-11209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11210/">CVE-2025-11210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11210">CVE-2025-11210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11211/">CVE-2025-11211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11211">CVE-2025-11211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11212/">CVE-2025-11212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11212">CVE-2025-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11213/">CVE-2025-11213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11213">CVE-2025-11213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11215/">CVE-2025-11215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11215">CVE-2025-11215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11216/">CVE-2025-11216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11216">CVE-2025-11216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11219/">CVE-2025-11219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11219">CVE-2025-11219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020187" comment="chromedriver-141.0.7390.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020188" comment="chromium-141.0.7390.54-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253923" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10920" ref_url="https://www.suse.com/security/cve/CVE-2025-10920/" source="CVE"/>
		<reference ref_id="CVE-2025-10922" ref_url="https://www.suse.com/security/cve/CVE-2025-10922/" source="CVE"/>
		<reference ref_id="CVE-2025-10925" ref_url="https://www.suse.com/security/cve/CVE-2025-10925/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-06"/>
	<updated date="2025-10-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10920/">CVE-2025-10920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10920">CVE-2025-10920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10922/">CVE-2025-10922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10922">CVE-2025-10922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10925/">CVE-2025-10925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10925">CVE-2025-10925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020193" comment="gimp-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020194" comment="gimp-devel-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020195" comment="gimp-extension-goat-excercises-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020196" comment="gimp-lang-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020197" comment="gimp-plugin-aa-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020198" comment="gimp-plugin-python3-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020199" comment="gimp-vala-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020200" comment="libgimp-3_0-0-3.0.4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020201" comment="libgimpui-3_0-0-3.0.4-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253924" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.139.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61672" ref_url="https://www.suse.com/security/cve/CVE-2025-61672/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.139.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-07"/>
	<updated date="2025-10-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61672/">CVE-2025-61672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61672">CVE-2025-61672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020292" comment="matrix-synapse-1.139.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253925" version="1" class="patch">
	<metadata>
		<title>valkey-8.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-07"/>
	<updated date="2025-10-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020293" comment="valkey-8.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020294" comment="valkey-compat-redis-8.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020295" comment="valkey-devel-8.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253926" version="1" class="patch">
	<metadata>
		<title>ansible-11-11.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-11-11.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020335" comment="ansible-11-11.11.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253927" version="1" class="patch">
	<metadata>
		<title>digger-cli-0.6.127-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the digger-cli-0.6.127-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020336" comment="digger-cli-0.6.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020337" comment="digger-cli-bash-completion-0.6.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020338" comment="digger-cli-fish-completion-0.6.127-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020339" comment="digger-cli-zsh-completion-0.6.127-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253928" version="1" class="patch">
	<metadata>
		<title>glow-2.1.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the glow-2.1.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020340" comment="glow-2.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020341" comment="glow-bash-completion-2.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020342" comment="glow-fish-completion-2.1.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020343" comment="glow-zsh-completion-2.1.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253929" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020344" comment="go1.24-1.24.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020345" comment="go1.24-doc-1.24.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020346" comment="go1.24-libstd-1.24.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020347" comment="go1.24-race-1.24.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253930" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020348" comment="go1.25-1.25.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020349" comment="go1.25-doc-1.25.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020350" comment="go1.25-libstd-1.25.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020351" comment="go1.25-race-1.25.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253931" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020352" comment="grafana-11.6.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253932" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.43-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.43-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020353" comment="libexslt0-1.1.43-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020354" comment="libxslt-devel-1.1.43-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020355" comment="libxslt-devel-32bit-1.1.43-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020356" comment="libxslt-tools-1.1.43-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020357" comment="libxslt1-1.1.43-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020358" comment="libxslt1-32bit-1.1.43-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253933" version="1" class="patch">
	<metadata>
		<title>pgadmin4-9.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9636" ref_url="https://www.suse.com/security/cve/CVE-2025-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-9.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9636/">CVE-2025-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9636">CVE-2025-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020359" comment="pgadmin4-9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020360" comment="pgadmin4-cloud-9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020361" comment="pgadmin4-desktop-9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020362" comment="pgadmin4-doc-9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020363" comment="pgadmin4-web-uwsgi-9.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020364" comment="system-user-pgadmin-9.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253934" version="1" class="patch">
	<metadata>
		<title>python311-python-socketio-5.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61765" ref_url="https://www.suse.com/security/cve/CVE-2025-61765/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-python-socketio-5.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-61765/">CVE-2025-61765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61765">CVE-2025-61765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020365" comment="python311-python-socketio-5.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020366" comment="python312-python-socketio-5.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020367" comment="python313-python-socketio-5.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253935" version="1" class="patch">
	<metadata>
		<title>libruby3_4-3_4-3.4.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61594" ref_url="https://www.suse.com/security/cve/CVE-2025-61594/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_4-3_4-3.4.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61594/">CVE-2025-61594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61594">CVE-2025-61594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020368" comment="libruby3_4-3_4-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020369" comment="ruby3.4-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020370" comment="ruby3.4-devel-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020371" comment="ruby3.4-devel-extra-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020372" comment="ruby3.4-doc-3.4.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020373" comment="ruby3.4-doc-ri-3.4.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253936" version="1" class="patch">
	<metadata>
		<title>weblate-5.13.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61587" ref_url="https://www.suse.com/security/cve/CVE-2025-61587/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.13.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-08"/>
	<updated date="2025-10-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61587/">CVE-2025-61587 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61587">CVE-2025-61587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020374" comment="weblate-5.13.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253937" version="1" class="patch">
	<metadata>
		<title>distrobuilder-3.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the distrobuilder-3.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020487" comment="distrobuilder-3.2-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253938" version="1" class="patch">
	<metadata>
		<title>forgejo-12.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-12.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020488" comment="forgejo-12.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020489" comment="forgejo-apparmor-12.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020490" comment="forgejo-environment-to-ini-12.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020491" comment="forgejo-firewalld-12.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020492" comment="forgejo-selinux-12.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253939" version="1" class="patch">
	<metadata>
		<title>forgejo-longterm-11.0.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the forgejo-longterm-11.0.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020493" comment="forgejo-longterm-11.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020494" comment="forgejo-longterm-apparmor-11.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020495" comment="forgejo-longterm-environment-to-ini-11.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020496" comment="forgejo-longterm-firewalld-11.0.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020497" comment="forgejo-longterm-selinux-11.0.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253940" version="1" class="patch">
	<metadata>
		<title>gitea-tea-0.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the gitea-tea-0.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020498" comment="gitea-tea-0.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020499" comment="gitea-tea-bash-completion-0.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020500" comment="gitea-tea-zsh-completion-0.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253941" version="1" class="patch">
	<metadata>
		<title>headscale-0.26.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the headscale-0.26.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020501" comment="headscale-0.26.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253942" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.19-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770/" source="CVE"/>
		<reference ref_id="CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771/" source="CVE"/>
		<reference ref_id="CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.19-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2025-10-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020502" comment="ruby3.4-rubygem-rack-2.2-2.2.19-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253943" version="1" class="patch">
	<metadata>
		<title>chromedriver-141.0.7390.65-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11458" ref_url="https://www.suse.com/security/cve/CVE-2025-11458/" source="CVE"/>
		<reference ref_id="CVE-2025-11460" ref_url="https://www.suse.com/security/cve/CVE-2025-11460/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-141.0.7390.65-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2025-10-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11458/">CVE-2025-11458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11458">CVE-2025-11458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11460/">CVE-2025-11460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11460">CVE-2025-11460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020668" comment="chromedriver-141.0.7390.65-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020669" comment="chromium-141.0.7390.65-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253944" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-session-2.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46336" ref_url="https://www.suse.com/security/cve/CVE-2025-46336/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-session-2.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2025-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-46336/">CVE-2025-46336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46336">CVE-2025-46336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020670" comment="ruby3.4-rubygem-rack-session-2.1.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253945" version="1" class="patch">
	<metadata>
		<title>golang-github-v2fly-v2ray-core-5.40.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-v2fly-v2ray-core-5.40.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2025-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020671" comment="golang-github-v2fly-v2ray-core-5.40.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020672" comment="v2ray-core-5.40.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253946" version="1" class="patch">
	<metadata>
		<title>perl-CGI-Simple-1.282.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40927" ref_url="https://www.suse.com/security/cve/CVE-2025-40927/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-CGI-Simple-1.282.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-11"/>
	<updated date="2025-10-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-40927/">CVE-2025-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40927">CVE-2025-40927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020701" comment="perl-CGI-Simple-1.282.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253947" version="1" class="patch">
	<metadata>
		<title>exim-4.98.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53881" ref_url="https://www.suse.com/security/cve/CVE-2025-53881/" source="CVE"/>
		<description>
These are all security issues fixed in the exim-4.98.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53881/">CVE-2025-53881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53881">CVE-2025-53881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020844" comment="exim-4.98.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020845" comment="eximon-4.98.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020846" comment="eximstats-html-4.98.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253948" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-8.9.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28285" ref_url="https://www.suse.com/security/cve/CVE-2024-28285/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-8.9.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-28285/">CVE-2024-28285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28285">CVE-2024-28285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020847" comment="libcryptopp-devel-8.9.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020848" comment="libcryptopp8_9_0-8.9.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253949" version="1" class="patch">
	<metadata>
		<title>lsd-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the lsd-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020849" comment="lsd-1.2.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253950" version="1" class="patch">
	<metadata>
		<title>python311-Authlib-1.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61920" ref_url="https://www.suse.com/security/cve/CVE-2025-61920/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Authlib-1.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61920/">CVE-2025-61920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61920">CVE-2025-61920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020850" comment="python311-Authlib-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020851" comment="python312-Authlib-1.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020852" comment="python313-Authlib-1.6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253951" version="1" class="patch">
	<metadata>
		<title>libQt6Svg6-6.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10728" ref_url="https://www.suse.com/security/cve/CVE-2025-10728/" source="CVE"/>
		<reference ref_id="CVE-2025-10729" ref_url="https://www.suse.com/security/cve/CVE-2025-10729/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Svg6-6.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-10728/">CVE-2025-10728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10728">CVE-2025-10728 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10729/">CVE-2025-10729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10729">CVE-2025-10729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020853" comment="libQt6Svg6-6.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020854" comment="libQt6SvgWidgets6-6.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020855" comment="qt6-svg-devel-6.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020856" comment="qt6-svg-examples-6.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020857" comment="qt6-svg-private-devel-6.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253952" version="1" class="patch">
	<metadata>
		<title>alloy-1.11.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.11.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021445" comment="alloy-1.11.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253953" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11713" ref_url="https://www.suse.com/security/cve/CVE-2025-11713/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11713/">CVE-2025-11713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11713">CVE-2025-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021446" comment="firefox-esr-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021447" comment="firefox-esr-branding-upstream-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021448" comment="firefox-esr-translations-common-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021449" comment="firefox-esr-translations-other-140.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253954" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021450" comment="libsoup-3_0-0-3.6.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021451" comment="libsoup-3_0-0-32bit-3.6.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021452" comment="libsoup-devel-3.6.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021453" comment="libsoup-devel-32bit-3.6.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021454" comment="libsoup-lang-3.6.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021455" comment="typelib-1_0-Soup-3_0-3.6.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253955" version="1" class="patch">
	<metadata>
		<title>python3-gi-docgen-2025.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11687" ref_url="https://www.suse.com/security/cve/CVE-2025-11687/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-gi-docgen-2025.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-11687/">CVE-2025-11687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11687">CVE-2025-11687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021456" comment="python3-gi-docgen-2025.5-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253956" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.7.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.7.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021457" comment="libtiff-devel-4.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021458" comment="libtiff-devel-32bit-4.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021459" comment="libtiff6-4.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021460" comment="libtiff6-32bit-4.7.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021461" comment="tiff-4.7.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253957" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11626" ref_url="https://www.suse.com/security/cve/CVE-2025-11626/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11626/">CVE-2025-11626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11626">CVE-2025-11626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021462" comment="libwireshark18-4.4.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021463" comment="libwiretap15-4.4.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021464" comment="libwsutil16-4.4.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021465" comment="wireshark-4.4.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021466" comment="wireshark-devel-4.4.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021467" comment="wireshark-ui-qt-4.4.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253958" version="1" class="patch">
	<metadata>
		<title>python311-ldap-3.4.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61911" ref_url="https://www.suse.com/security/cve/CVE-2025-61911/" source="CVE"/>
		<reference ref_id="CVE-2025-61912" ref_url="https://www.suse.com/security/cve/CVE-2025-61912/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ldap-3.4.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2025-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61911/">CVE-2025-61911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61911">CVE-2025-61911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61912/">CVE-2025-61912 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61912">CVE-2025-61912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022505" comment="python311-ldap-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022506" comment="python312-ldap-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022507" comment="python313-ldap-3.4.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253959" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.18-2.18.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.18-2.18.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022508" comment="ansible-core-2.18-2.18.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022509" comment="ansible-test-2.18-2.18.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253960" version="1" class="patch">
	<metadata>
		<title>chromedriver-141.0.7390.107-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11756" ref_url="https://www.suse.com/security/cve/CVE-2025-11756/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-141.0.7390.107-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11756/">CVE-2025-11756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11756">CVE-2025-11756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022510" comment="chromedriver-141.0.7390.107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022511" comment="chromium-141.0.7390.107-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253961" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.6-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59728" ref_url="https://www.suse.com/security/cve/CVE-2025-59728/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.6-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59728/">CVE-2025-59728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59728">CVE-2025-59728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022512" comment="ffmpeg-4-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022513" comment="ffmpeg-4-libavcodec-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022514" comment="ffmpeg-4-libavdevice-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022515" comment="ffmpeg-4-libavfilter-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022516" comment="ffmpeg-4-libavformat-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022517" comment="ffmpeg-4-libavresample-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022518" comment="ffmpeg-4-libavutil-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022519" comment="ffmpeg-4-libpostproc-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022520" comment="ffmpeg-4-libswresample-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022521" comment="ffmpeg-4-libswscale-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022522" comment="ffmpeg-4-private-devel-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022523" comment="libavcodec58_134-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022524" comment="libavcodec58_134-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022525" comment="libavdevice58_13-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022526" comment="libavdevice58_13-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022527" comment="libavfilter7_110-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022528" comment="libavfilter7_110-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022529" comment="libavformat58_76-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022530" comment="libavformat58_76-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022531" comment="libavresample4_0-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022532" comment="libavresample4_0-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022533" comment="libavutil56_70-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022534" comment="libavutil56_70-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022535" comment="libpostproc55_9-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022536" comment="libpostproc55_9-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022537" comment="libswresample3_9-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022538" comment="libswresample3_9-32bit-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022539" comment="libswscale5_9-4.4.6-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022540" comment="libswscale5_9-32bit-4.4.6-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253962" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.43-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11731" ref_url="https://www.suse.com/security/cve/CVE-2025-11731/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.43-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11731/">CVE-2025-11731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11731">CVE-2025-11731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022541" comment="libexslt0-1.1.43-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022542" comment="libxslt-devel-1.1.43-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022543" comment="libxslt-devel-32bit-1.1.43-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022544" comment="libxslt-tools-1.1.43-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022545" comment="libxslt1-1.1.43-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022546" comment="libxslt1-32bit-1.1.43-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253963" version="1" class="patch">
	<metadata>
		<title>ruby3.4-rubygem-rack-2.2-2.2.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby3.4-rubygem-rack-2.2-2.2.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022547" comment="ruby3.4-rubygem-rack-2.2-2.2.20-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253964" version="1" class="patch">
	<metadata>
		<title>git-lfs-3.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26625" ref_url="https://www.suse.com/security/cve/CVE-2025-26625/" source="CVE"/>
		<description>
These are all security issues fixed in the git-lfs-3.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26625/">CVE-2025-26625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26625">CVE-2025-26625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022548" comment="git-lfs-3.7.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253965" version="1" class="patch">
	<metadata>
		<title>icinga2-2.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61907" ref_url="https://www.suse.com/security/cve/CVE-2025-61907/" source="CVE"/>
		<reference ref_id="CVE-2025-61908" ref_url="https://www.suse.com/security/cve/CVE-2025-61908/" source="CVE"/>
		<reference ref_id="CVE-2025-61909" ref_url="https://www.suse.com/security/cve/CVE-2025-61909/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga2-2.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61907/">CVE-2025-61907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61907">CVE-2025-61907 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61908/">CVE-2025-61908 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61908">CVE-2025-61908 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61909/">CVE-2025-61909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61909">CVE-2025-61909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022549" comment="icinga2-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022550" comment="icinga2-bin-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022551" comment="icinga2-common-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022552" comment="icinga2-doc-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022553" comment="icinga2-ido-mysql-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022554" comment="icinga2-ido-pgsql-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022555" comment="nano-icinga2-2.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022556" comment="vim-icinga2-2.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253966" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-144.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11713" ref_url="https://www.suse.com/security/cve/CVE-2025-11713/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<reference ref_id="CVE-2025-11716" ref_url="https://www.suse.com/security/cve/CVE-2025-11716/" source="CVE"/>
		<reference ref_id="CVE-2025-11717" ref_url="https://www.suse.com/security/cve/CVE-2025-11717/" source="CVE"/>
		<reference ref_id="CVE-2025-11718" ref_url="https://www.suse.com/security/cve/CVE-2025-11718/" source="CVE"/>
		<reference ref_id="CVE-2025-11719" ref_url="https://www.suse.com/security/cve/CVE-2025-11719/" source="CVE"/>
		<reference ref_id="CVE-2025-11720" ref_url="https://www.suse.com/security/cve/CVE-2025-11720/" source="CVE"/>
		<reference ref_id="CVE-2025-11721" ref_url="https://www.suse.com/security/cve/CVE-2025-11721/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-144.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11713/">CVE-2025-11713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11713">CVE-2025-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11716/">CVE-2025-11716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11716">CVE-2025-11716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11717/">CVE-2025-11717 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11717">CVE-2025-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11718/">CVE-2025-11718 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11718">CVE-2025-11718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11719/">CVE-2025-11719 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11719">CVE-2025-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11720/">CVE-2025-11720 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11720">CVE-2025-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11721/">CVE-2025-11721 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11721">CVE-2025-11721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022557" comment="MozillaFirefox-144.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022558" comment="MozillaFirefox-branding-upstream-144.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022559" comment="MozillaFirefox-devel-144.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022560" comment="MozillaFirefox-translations-common-144.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022561" comment="MozillaFirefox-translations-other-144.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253967" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11713" ref_url="https://www.suse.com/security/cve/CVE-2025-11713/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11713/">CVE-2025-11713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11713">CVE-2025-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022562" comment="MozillaThunderbird-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022563" comment="MozillaThunderbird-openpgp-librnp-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022564" comment="MozillaThunderbird-translations-common-140.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022565" comment="MozillaThunderbird-translations-other-140.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253968" version="1" class="patch">
	<metadata>
		<title>ollama-0.12.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<description>
These are all security issues fixed in the ollama-0.12.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022566" comment="ollama-0.12.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253969" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.09.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52885" ref_url="https://www.suse.com/security/cve/CVE-2025-52885/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.09.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52885/">CVE-2025-52885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52885">CVE-2025-52885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022567" comment="libpoppler-cpp2-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022568" comment="libpoppler-cpp2-32bit-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022569" comment="libpoppler-devel-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022570" comment="libpoppler-glib-devel-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022571" comment="libpoppler-glib8-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022572" comment="libpoppler-glib8-32bit-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022573" comment="libpoppler153-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022574" comment="libpoppler153-32bit-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022575" comment="poppler-tools-25.09.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022576" comment="typelib-1_0-Poppler-0_18-25.09.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253970" version="1" class="patch">
	<metadata>
		<title>ctdb-4.22.5+git.431.dc5a539f124-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10230" ref_url="https://www.suse.com/security/cve/CVE-2025-10230/" source="CVE"/>
		<reference ref_id="CVE-2025-9640" ref_url="https://www.suse.com/security/cve/CVE-2025-9640/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.22.5+git.431.dc5a539f124-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10230/">CVE-2025-10230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10230">CVE-2025-10230 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9640/">CVE-2025-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9640">CVE-2025-9640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022577" comment="ctdb-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022578" comment="ctdb-pcp-pmda-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022579" comment="ldb-tools-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022580" comment="libldb-devel-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022581" comment="libldb2-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022582" comment="libldb2-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022583" comment="python3-ldb-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022584" comment="python3-ldb-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022585" comment="samba-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022586" comment="samba-ad-dc-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022587" comment="samba-ad-dc-libs-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022588" comment="samba-ad-dc-libs-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022589" comment="samba-ceph-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022590" comment="samba-client-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022591" comment="samba-client-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022592" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022593" comment="samba-client-libs-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022594" comment="samba-dcerpc-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022595" comment="samba-devel-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022596" comment="samba-devel-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022597" comment="samba-doc-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022598" comment="samba-dsdb-modules-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022599" comment="samba-gpupdate-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022600" comment="samba-ldb-ldap-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022601" comment="samba-libs-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022602" comment="samba-libs-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022603" comment="samba-libs-python3-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022604" comment="samba-libs-python3-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022605" comment="samba-python3-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022606" comment="samba-test-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022607" comment="samba-tool-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022608" comment="samba-winbind-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022609" comment="samba-winbind-libs-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022610" comment="samba-winbind-libs-32bit-4.22.5+git.431.dc5a539f124-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253971" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62171" ref_url="https://www.suse.com/security/cve/CVE-2025-62171/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62171/">CVE-2025-62171 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62171">CVE-2025-62171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022769" comment="ImageMagick-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022770" comment="ImageMagick-config-7-SUSE-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022771" comment="ImageMagick-devel-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022772" comment="ImageMagick-devel-32bit-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022773" comment="ImageMagick-doc-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022774" comment="ImageMagick-extra-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022775" comment="libMagick++-7_Q16HDRI5-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022776" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022777" comment="libMagick++-devel-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022778" comment="libMagick++-devel-32bit-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022779" comment="libMagickCore-7_Q16HDRI10-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022780" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022781" comment="libMagickWand-7_Q16HDRI10-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022782" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022783" comment="perl-PerlMagick-7.1.2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253972" version="1" class="patch">
	<metadata>
		<title>binutils-2.45-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<reference ref_id="CVE-2025-11412" ref_url="https://www.suse.com/security/cve/CVE-2025-11412/" source="CVE"/>
		<reference ref_id="CVE-2025-11413" ref_url="https://www.suse.com/security/cve/CVE-2025-11413/" source="CVE"/>
		<reference ref_id="CVE-2025-11414" ref_url="https://www.suse.com/security/cve/CVE-2025-11414/" source="CVE"/>
		<reference ref_id="CVE-2025-1147" ref_url="https://www.suse.com/security/cve/CVE-2025-1147/" source="CVE"/>
		<reference ref_id="CVE-2025-1148" ref_url="https://www.suse.com/security/cve/CVE-2025-1148/" source="CVE"/>
		<reference ref_id="CVE-2025-1149" ref_url="https://www.suse.com/security/cve/CVE-2025-1149/" source="CVE"/>
		<reference ref_id="CVE-2025-11494" ref_url="https://www.suse.com/security/cve/CVE-2025-11494/" source="CVE"/>
		<reference ref_id="CVE-2025-11495" ref_url="https://www.suse.com/security/cve/CVE-2025-11495/" source="CVE"/>
		<reference ref_id="CVE-2025-1150" ref_url="https://www.suse.com/security/cve/CVE-2025-1150/" source="CVE"/>
		<reference ref_id="CVE-2025-1151" ref_url="https://www.suse.com/security/cve/CVE-2025-1151/" source="CVE"/>
		<reference ref_id="CVE-2025-1152" ref_url="https://www.suse.com/security/cve/CVE-2025-1152/" source="CVE"/>
		<reference ref_id="CVE-2025-1153" ref_url="https://www.suse.com/security/cve/CVE-2025-1153/" source="CVE"/>
		<reference ref_id="CVE-2025-1176" ref_url="https://www.suse.com/security/cve/CVE-2025-1176/" source="CVE"/>
		<reference ref_id="CVE-2025-1178" ref_url="https://www.suse.com/security/cve/CVE-2025-1178/" source="CVE"/>
		<reference ref_id="CVE-2025-1179" ref_url="https://www.suse.com/security/cve/CVE-2025-1179/" source="CVE"/>
		<reference ref_id="CVE-2025-1180" ref_url="https://www.suse.com/security/cve/CVE-2025-1180/" source="CVE"/>
		<reference ref_id="CVE-2025-1181" ref_url="https://www.suse.com/security/cve/CVE-2025-1181/" source="CVE"/>
		<reference ref_id="CVE-2025-1182" ref_url="https://www.suse.com/security/cve/CVE-2025-1182/" source="CVE"/>
		<reference ref_id="CVE-2025-3198" ref_url="https://www.suse.com/security/cve/CVE-2025-3198/" source="CVE"/>
		<reference ref_id="CVE-2025-5244" ref_url="https://www.suse.com/security/cve/CVE-2025-5244/" source="CVE"/>
		<reference ref_id="CVE-2025-5245" ref_url="https://www.suse.com/security/cve/CVE-2025-5245/" source="CVE"/>
		<reference ref_id="CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545/" source="CVE"/>
		<reference ref_id="CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546/" source="CVE"/>
		<reference ref_id="CVE-2025-8224" ref_url="https://www.suse.com/security/cve/CVE-2025-8224/" source="CVE"/>
		<reference ref_id="CVE-2025-8225" ref_url="https://www.suse.com/security/cve/CVE-2025-8225/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.45-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11412/">CVE-2025-11412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412">CVE-2025-11412 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11413/">CVE-2025-11413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413">CVE-2025-11413 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11414/">CVE-2025-11414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414">CVE-2025-11414 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1147/">CVE-2025-1147 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1147">CVE-2025-1147 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1148/">CVE-2025-1148 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1148">CVE-2025-1148 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1149/">CVE-2025-1149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1149">CVE-2025-1149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11494/">CVE-2025-11494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11494">CVE-2025-11494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11495/">CVE-2025-11495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495">CVE-2025-11495 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1150/">CVE-2025-1150 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1150">CVE-2025-1150 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1151/">CVE-2025-1151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1151">CVE-2025-1151 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1152/">CVE-2025-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1152">CVE-2025-1152 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1153/">CVE-2025-1153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1153">CVE-2025-1153 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1176/">CVE-2025-1176 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1178/">CVE-2025-1178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1179/">CVE-2025-1179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1180/">CVE-2025-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1181/">CVE-2025-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1182/">CVE-2025-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3198/">CVE-2025-3198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3198">CVE-2025-3198 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5244/">CVE-2025-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5244">CVE-2025-5244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5245/">CVE-2025-5245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5245">CVE-2025-5245 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8224/">CVE-2025-8224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8224">CVE-2025-8224 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8225/">CVE-2025-8225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8225">CVE-2025-8225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022784" comment="binutils-2.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022785" comment="binutils-devel-2.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022786" comment="binutils-devel-32bit-2.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022787" comment="gprofng-2.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022788" comment="libctf-nobfd0-2.45-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022789" comment="libctf0-2.45-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253973" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20251021-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62370" ref_url="https://www.suse.com/security/cve/CVE-2025-62370/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20251021-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62370/">CVE-2025-62370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62370">CVE-2025-62370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022790" comment="cargo-audit-advisory-db-20251021-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253974" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.5.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61962" ref_url="https://www.suse.com/security/cve/CVE-2025-61962/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.5.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-61962/">CVE-2025-61962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61962">CVE-2025-61962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022791" comment="fetchmail-6.5.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022792" comment="fetchmailconf-6.5.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253975" version="1" class="patch">
	<metadata>
		<title>git-bug-0.10.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the git-bug-0.10.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022793" comment="git-bug-0.10.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022794" comment="git-bug-bash-completion-0.10.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022795" comment="git-bug-fish-completion-0.10.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022796" comment="git-bug-zsh-completion-0.10.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253976" version="1" class="patch">
	<metadata>
		<title>istioctl-1.27.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62409" ref_url="https://www.suse.com/security/cve/CVE-2025-62409/" source="CVE"/>
		<reference ref_id="CVE-2025-62504" ref_url="https://www.suse.com/security/cve/CVE-2025-62504/" source="CVE"/>
		<description>
These are all security issues fixed in the istioctl-1.27.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62409/">CVE-2025-62409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62409">CVE-2025-62409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62504/">CVE-2025-62504 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62504">CVE-2025-62504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022797" comment="istioctl-1.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022798" comment="istioctl-bash-completion-1.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022799" comment="istioctl-zsh-completion-1.27.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253977" version="1" class="patch">
	<metadata>
		<title>sccache-0.12.0~1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.12.0~1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2025-10-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022800" comment="sccache-0.12.0~1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253978" version="1" class="patch">
	<metadata>
		<title>bleachbit-5.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-47113" ref_url="https://www.suse.com/security/cve/CVE-2023-47113/" source="CVE"/>
		<description>
These are all security issues fixed in the bleachbit-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2025-10-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47113/">CVE-2023-47113 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47113">CVE-2023-47113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023015" comment="bleachbit-5.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023016" comment="bleachbit-lang-5.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253979" version="1" class="patch">
	<metadata>
		<title>python311-uv-0.9.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62518" ref_url="https://www.suse.com/security/cve/CVE-2025-62518/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-uv-0.9.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2025-10-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62518/">CVE-2025-62518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62518">CVE-2025-62518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023017" comment="python311-uv-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023018" comment="python312-uv-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023019" comment="python313-uv-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023020" comment="uv-bash-completion-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023021" comment="uv-fish-completion-0.9.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023022" comment="uv-zsh-completion-0.9.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253980" version="1" class="patch">
	<metadata>
		<title>bind-9.20.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<reference ref_id="CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023302" comment="bind-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023303" comment="bind-doc-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023304" comment="bind-modules-bdbhpt-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023305" comment="bind-modules-generic-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023306" comment="bind-modules-ldap-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023307" comment="bind-modules-mysql-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023308" comment="bind-modules-perl-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023309" comment="bind-modules-sqlite3-9.20.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023310" comment="bind-utils-9.20.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253981" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023311" comment="java-11-openjdk-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023312" comment="java-11-openjdk-demo-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023313" comment="java-11-openjdk-devel-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023314" comment="java-11-openjdk-headless-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023315" comment="java-11-openjdk-javadoc-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023316" comment="java-11-openjdk-jmods-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023317" comment="java-11-openjdk-src-11.0.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253982" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023318" comment="java-17-openjdk-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023319" comment="java-17-openjdk-demo-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023320" comment="java-17-openjdk-devel-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023321" comment="java-17-openjdk-headless-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023322" comment="java-17-openjdk-javadoc-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023323" comment="java-17-openjdk-jmods-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023324" comment="java-17-openjdk-src-17.0.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253983" version="1" class="patch">
	<metadata>
		<title>micropython-1.26.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438/" source="CVE"/>
		<description>
These are all security issues fixed in the micropython-1.26.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023325" comment="micropython-1.26.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023326" comment="mpremote-1.26.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023327" comment="mpy-tools-1.26.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253984" version="1" class="patch">
	<metadata>
		<title>openbao-2.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62513" ref_url="https://www.suse.com/security/cve/CVE-2025-62513/" source="CVE"/>
		<reference ref_id="CVE-2025-62705" ref_url="https://www.suse.com/security/cve/CVE-2025-62705/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62513/">CVE-2025-62513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62513">CVE-2025-62513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62705/">CVE-2025-62705 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62705">CVE-2025-62705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023328" comment="openbao-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023329" comment="openbao-agent-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023330" comment="openbao-cassandra-database-plugin-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023331" comment="openbao-influxdb-database-plugin-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023332" comment="openbao-mysql-database-plugin-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023333" comment="openbao-mysql-legacy-database-plugin-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023334" comment="openbao-postgresql-database-plugin-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023335" comment="openbao-server-2.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253985" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62707" ref_url="https://www.suse.com/security/cve/CVE-2025-62707/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-23"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-62707/">CVE-2025-62707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62707">CVE-2025-62707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023336" comment="python311-pypdf-6.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023337" comment="python312-pypdf-6.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023338" comment="python313-pypdf-6.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253986" version="1" class="patch">
	<metadata>
		<title>chromedriver-141.0.7390.122-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12036" ref_url="https://www.suse.com/security/cve/CVE-2025-12036/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-141.0.7390.122-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12036/">CVE-2025-12036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12036">CVE-2025-12036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023696" comment="chromedriver-141.0.7390.122-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023697" comment="chromium-141.0.7390.122-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253987" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20251023T162509-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-58260" ref_url="https://www.suse.com/security/cve/CVE-2024-58260/" source="CVE"/>
		<reference ref_id="CVE-2024-58267" ref_url="https://www.suse.com/security/cve/CVE-2024-58267/" source="CVE"/>
		<reference ref_id="CVE-2025-23266" ref_url="https://www.suse.com/security/cve/CVE-2025-23266/" source="CVE"/>
		<reference ref_id="CVE-2025-23267" ref_url="https://www.suse.com/security/cve/CVE-2025-23267/" source="CVE"/>
		<reference ref_id="CVE-2025-54468" ref_url="https://www.suse.com/security/cve/CVE-2025-54468/" source="CVE"/>
		<reference ref_id="CVE-2025-55191" ref_url="https://www.suse.com/security/cve/CVE-2025-55191/" source="CVE"/>
		<reference ref_id="CVE-2025-59163" ref_url="https://www.suse.com/security/cve/CVE-2025-59163/" source="CVE"/>
		<reference ref_id="CVE-2025-59531" ref_url="https://www.suse.com/security/cve/CVE-2025-59531/" source="CVE"/>
		<reference ref_id="CVE-2025-59537" ref_url="https://www.suse.com/security/cve/CVE-2025-59537/" source="CVE"/>
		<reference ref_id="CVE-2025-59538" ref_url="https://www.suse.com/security/cve/CVE-2025-59538/" source="CVE"/>
		<reference ref_id="CVE-2025-59823" ref_url="https://www.suse.com/security/cve/CVE-2025-59823/" source="CVE"/>
		<reference ref_id="CVE-2025-59824" ref_url="https://www.suse.com/security/cve/CVE-2025-59824/" source="CVE"/>
		<reference ref_id="CVE-2025-59941" ref_url="https://www.suse.com/security/cve/CVE-2025-59941/" source="CVE"/>
		<reference ref_id="CVE-2025-59942" ref_url="https://www.suse.com/security/cve/CVE-2025-59942/" source="CVE"/>
		<reference ref_id="CVE-2025-59956" ref_url="https://www.suse.com/security/cve/CVE-2025-59956/" source="CVE"/>
		<reference ref_id="CVE-2025-61595" ref_url="https://www.suse.com/security/cve/CVE-2025-61595/" source="CVE"/>
		<reference ref_id="CVE-2025-61926" ref_url="https://www.suse.com/security/cve/CVE-2025-61926/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20251023T162509-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-58260/">CVE-2024-58260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58260">CVE-2024-58260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-58267/">CVE-2024-58267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58267">CVE-2024-58267 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-23266/">CVE-2025-23266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23266">CVE-2025-23266 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H" cvss4="8.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-23267/">CVE-2025-23267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23267">CVE-2025-23267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54468/">CVE-2025-54468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54468">CVE-2025-54468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55191/">CVE-2025-55191 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55191">CVE-2025-55191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59163/">CVE-2025-59163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59163">CVE-2025-59163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59531/">CVE-2025-59531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59531">CVE-2025-59531 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59537/">CVE-2025-59537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59537">CVE-2025-59537 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59538/">CVE-2025-59538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59538">CVE-2025-59538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59823/">CVE-2025-59823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59823">CVE-2025-59823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59824/">CVE-2025-59824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59824">CVE-2025-59824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59941/">CVE-2025-59941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59941">CVE-2025-59941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59942/">CVE-2025-59942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59942">CVE-2025-59942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59956/">CVE-2025-59956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59956">CVE-2025-59956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61595/">CVE-2025-61595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61595">CVE-2025-61595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61926/">CVE-2025-61926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61926">CVE-2025-61926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023698" comment="govulncheck-vulndb-0.0.20251023T162509-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253988" version="1" class="patch">
	<metadata>
		<title>netty-4.1.128-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59419" ref_url="https://www.suse.com/security/cve/CVE-2025-59419/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.128-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59419/">CVE-2025-59419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59419">CVE-2025-59419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023699" comment="netty-4.1.128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023700" comment="netty-bom-4.1.128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023701" comment="netty-javadoc-4.1.128-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023702" comment="netty-parent-4.1.128-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253989" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.24.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11411" ref_url="https://www.suse.com/security/cve/CVE-2025-11411/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.24.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L" cvss4="7.1/CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-11411/">CVE-2025-11411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11411">CVE-2025-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023703" comment="libunbound8-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023704" comment="python3-unbound-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023705" comment="unbound-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023706" comment="unbound-anchor-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023707" comment="unbound-devel-1.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023708" comment="unbound-munin-1.24.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253990" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023905" comment="grafana-11.6.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253991" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023906" comment="java-21-openjdk-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023907" comment="java-21-openjdk-demo-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023908" comment="java-21-openjdk-devel-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023909" comment="java-21-openjdk-headless-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023910" comment="java-21-openjdk-javadoc-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023911" comment="java-21-openjdk-jmods-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023912" comment="java-21-openjdk-src-21.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253992" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.17.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991/" source="CVE"/>
		<reference ref_id="CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992/" source="CVE"/>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994/" source="CVE"/>
		<reference ref_id="CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995/" source="CVE"/>
		<reference ref_id="CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996/" source="CVE"/>
		<reference ref_id="CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997/" source="CVE"/>
		<reference ref_id="CVE-2025-39998" ref_url="https://www.suse.com/security/cve/CVE-2025-39998/" source="CVE"/>
		<reference ref_id="CVE-2025-39999" ref_url="https://www.suse.com/security/cve/CVE-2025-39999/" source="CVE"/>
		<reference ref_id="CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000/" source="CVE"/>
		<reference ref_id="CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001/" source="CVE"/>
		<reference ref_id="CVE-2025-40002" ref_url="https://www.suse.com/security/cve/CVE-2025-40002/" source="CVE"/>
		<reference ref_id="CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003/" source="CVE"/>
		<reference ref_id="CVE-2025-40004" ref_url="https://www.suse.com/security/cve/CVE-2025-40004/" source="CVE"/>
		<reference ref_id="CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013/" source="CVE"/>
		<reference ref_id="CVE-2025-40015" ref_url="https://www.suse.com/security/cve/CVE-2025-40015/" source="CVE"/>
		<reference ref_id="CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016/" source="CVE"/>
		<reference ref_id="CVE-2025-40017" ref_url="https://www.suse.com/security/cve/CVE-2025-40017/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.17.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39998/">CVE-2025-39998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39998">CVE-2025-39998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39999/">CVE-2025-39999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39999">CVE-2025-39999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40002/">CVE-2025-40002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40002">CVE-2025-40002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40004/">CVE-2025-40004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40004">CVE-2025-40004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40015/">CVE-2025-40015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40015">CVE-2025-40015 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40017/">CVE-2025-40017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40017">CVE-2025-40017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023914" comment="kernel-macros-6.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023915" comment="kernel-source-6.17.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023916" comment="kernel-source-vanilla-6.17.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253993" version="1" class="patch">
	<metadata>
		<title>libluajit-5_1-2-2.1.20250826-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-19391" ref_url="https://www.suse.com/security/cve/CVE-2019-19391/" source="CVE"/>
		<description>
These are all security issues fixed in the libluajit-5_1-2-2.1.20250826-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19391/">CVE-2019-19391 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19391">CVE-2019-19391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023917" comment="libluajit-5_1-2-2.1.20250826-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023918" comment="libluajit-5_1-2-32bit-2.1.20250826-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023919" comment="luajit-2.1.20250826-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023920" comment="luajit-devel-2.1.20250826-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253994" version="1" class="patch">
	<metadata>
		<title>xen-4.20.1_06-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58147" ref_url="https://www.suse.com/security/cve/CVE-2025-58147/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.1_06-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-58147/">CVE-2025-58147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58147">CVE-2025-58147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023921" comment="xen-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023922" comment="xen-devel-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023923" comment="xen-doc-html-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023924" comment="xen-libs-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023925" comment="xen-tools-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023926" comment="xen-tools-domU-4.20.1_06-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023927" comment="xen-tools-xendomains-wait-disk-4.20.1_06-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253995" version="1" class="patch">
	<metadata>
		<title>java-25-openjdk-25.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
These are all security issues fixed in the java-25-openjdk-25.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-28"/>
	<updated date="2025-10-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024091" comment="java-25-openjdk-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024092" comment="java-25-openjdk-demo-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024093" comment="java-25-openjdk-devel-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024094" comment="java-25-openjdk-headless-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024095" comment="java-25-openjdk-javadoc-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024096" comment="java-25-openjdk-jmods-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024097" comment="java-25-openjdk-src-25.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253996" version="1" class="patch">
	<metadata>
		<title>coreboot-utils-25.09-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62813" ref_url="https://www.suse.com/security/cve/CVE-2025-62813/" source="CVE"/>
		<description>
These are all security issues fixed in the coreboot-utils-25.09-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62813/">CVE-2025-62813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62813">CVE-2025-62813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024169" comment="coreboot-utils-25.09-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253997" version="1" class="patch">
	<metadata>
		<title>dovecot24-2.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30189" ref_url="https://www.suse.com/security/cve/CVE-2025-30189/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot24-2.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30189/">CVE-2025-30189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30189">CVE-2025-30189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024170" comment="dovecot24-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024171" comment="dovecot24-backend-mysql-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024172" comment="dovecot24-backend-pgsql-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024173" comment="dovecot24-backend-sqlite-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024174" comment="dovecot24-devel-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024175" comment="dovecot24-fts-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024176" comment="dovecot24-fts-flatcurve-2.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024177" comment="dovecot24-fts-solr-2.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253998" version="1" class="patch">
	<metadata>
		<title>kea-3.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11232" ref_url="https://www.suse.com/security/cve/CVE-2025-11232/" source="CVE"/>
		<description>
These are all security issues fixed in the kea-3.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11232/">CVE-2025-11232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11232">CVE-2025-11232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024178" comment="kea-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024179" comment="kea-devel-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024180" comment="kea-doc-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024181" comment="kea-hooks-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024182" comment="libkea-asiodns62-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024183" comment="libkea-asiolink88-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024184" comment="libkea-cc82-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024185" comment="libkea-cfgrpt3-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024186" comment="libkea-config83-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024187" comment="libkea-cryptolink64-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024188" comment="libkea-d2srv63-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024189" comment="libkea-database76-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024190" comment="libkea-dhcp109-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024191" comment="libkea-dhcp_ddns68-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024192" comment="libkea-dhcpsrv131-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024193" comment="libkea-dns71-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024194" comment="libkea-eval84-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024195" comment="libkea-exceptions45-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024196" comment="libkea-hooks120-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024197" comment="libkea-http87-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024198" comment="libkea-log-interprocess3-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024199" comment="libkea-log75-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024200" comment="libkea-mysql88-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024201" comment="libkea-pgsql88-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024202" comment="libkea-process90-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024203" comment="libkea-stats53-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024204" comment="libkea-tcp33-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024205" comment="libkea-util-io12-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024206" comment="libkea-util101-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024207" comment="python3-kea-3.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253999" version="1" class="patch">
	<metadata>
		<title>libmozjs-115-0-115.15.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62813" ref_url="https://www.suse.com/security/cve/CVE-2025-62813/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-115-0-115.15.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62813/">CVE-2025-62813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62813">CVE-2025-62813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024208" comment="libmozjs-115-0-115.15.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024209" comment="mozjs115-115.15.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024210" comment="mozjs115-devel-115.15.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254000" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.14.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62813" ref_url="https://www.suse.com/security/cve/CVE-2025-62813/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.14.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62813/">CVE-2025-62813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62813">CVE-2025-62813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024211" comment="libmozjs-128-0-128.14.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024212" comment="mozjs128-128.14.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024213" comment="mozjs128-devel-128.14.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254001" version="1" class="patch">
	<metadata>
		<title>ongres-scram-3.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59432" ref_url="https://www.suse.com/security/cve/CVE-2025-59432/" source="CVE"/>
		<description>
These are all security issues fixed in the ongres-scram-3.2-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59432/">CVE-2025-59432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59432">CVE-2025-59432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024214" comment="ongres-scram-3.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024215" comment="ongres-scram-client-3.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024216" comment="ongres-scram-javadoc-3.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254002" version="1" class="patch">
	<metadata>
		<title>strongswan-6.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62291" ref_url="https://www.suse.com/security/cve/CVE-2025-62291/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-62291/">CVE-2025-62291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62291">CVE-2025-62291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024217" comment="strongswan-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024218" comment="strongswan-doc-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024219" comment="strongswan-fips-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024220" comment="strongswan-ipsec-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024221" comment="strongswan-mysql-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024222" comment="strongswan-nm-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024223" comment="strongswan-sqlite-6.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254003" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-32bit-4.7.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8851" ref_url="https://www.suse.com/security/cve/CVE-2025-8851/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-32bit-4.7.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8851/">CVE-2025-8851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8851">CVE-2025-8851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024224" comment="libtiff-devel-4.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024225" comment="libtiff-devel-32bit-4.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024226" comment="libtiff6-4.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024227" comment="libtiff6-32bit-4.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024228" comment="tiff-4.7.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254004" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-21.1.15-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-21.1.15-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024229" comment="xorg-x11-server-21.1.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024230" comment="xorg-x11-server-Xvfb-21.1.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024231" comment="xorg-x11-server-extra-21.1.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024232" comment="xorg-x11-server-sdk-21.1.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024233" comment="xorg-x11-server-source-21.1.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024234" comment="xorg-x11-server-wrapper-21.1.15-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254005" version="1" class="patch">
	<metadata>
		<title>xwayland-24.1.8-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-24.1.8-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2025-10-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024235" comment="xwayland-24.1.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024236" comment="xwayland-devel-24.1.8-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254006" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62594" ref_url="https://www.suse.com/security/cve/CVE-2025-62594/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-10-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62594/">CVE-2025-62594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62594">CVE-2025-62594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024423" comment="ImageMagick-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024424" comment="ImageMagick-config-7-SUSE-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024425" comment="ImageMagick-devel-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024426" comment="ImageMagick-devel-32bit-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024427" comment="ImageMagick-doc-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024428" comment="ImageMagick-extra-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024429" comment="libMagick++-7_Q16HDRI5-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024430" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024431" comment="libMagick++-devel-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024432" comment="libMagick++-devel-32bit-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024433" comment="libMagickCore-7_Q16HDRI10-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024434" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024435" comment="libMagickWand-7_Q16HDRI10-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024436" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024437" comment="perl-PerlMagick-7.1.2.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254007" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-144.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12380" ref_url="https://www.suse.com/security/cve/CVE-2025-12380/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-144.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-10-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-12380/">CVE-2025-12380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12380">CVE-2025-12380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024438" comment="MozillaFirefox-144.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024439" comment="MozillaFirefox-branding-upstream-144.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024440" comment="MozillaFirefox-devel-144.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024441" comment="MozillaFirefox-translations-common-144.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024442" comment="MozillaFirefox-translations-other-144.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254008" version="1" class="patch">
	<metadata>
		<title>chromedriver-142.0.7444.59-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12428" ref_url="https://www.suse.com/security/cve/CVE-2025-12428/" source="CVE"/>
		<reference ref_id="CVE-2025-12429" ref_url="https://www.suse.com/security/cve/CVE-2025-12429/" source="CVE"/>
		<reference ref_id="CVE-2025-12430" ref_url="https://www.suse.com/security/cve/CVE-2025-12430/" source="CVE"/>
		<reference ref_id="CVE-2025-12431" ref_url="https://www.suse.com/security/cve/CVE-2025-12431/" source="CVE"/>
		<reference ref_id="CVE-2025-12432" ref_url="https://www.suse.com/security/cve/CVE-2025-12432/" source="CVE"/>
		<reference ref_id="CVE-2025-12433" ref_url="https://www.suse.com/security/cve/CVE-2025-12433/" source="CVE"/>
		<reference ref_id="CVE-2025-12434" ref_url="https://www.suse.com/security/cve/CVE-2025-12434/" source="CVE"/>
		<reference ref_id="CVE-2025-12435" ref_url="https://www.suse.com/security/cve/CVE-2025-12435/" source="CVE"/>
		<reference ref_id="CVE-2025-12436" ref_url="https://www.suse.com/security/cve/CVE-2025-12436/" source="CVE"/>
		<reference ref_id="CVE-2025-12437" ref_url="https://www.suse.com/security/cve/CVE-2025-12437/" source="CVE"/>
		<reference ref_id="CVE-2025-12438" ref_url="https://www.suse.com/security/cve/CVE-2025-12438/" source="CVE"/>
		<reference ref_id="CVE-2025-12439" ref_url="https://www.suse.com/security/cve/CVE-2025-12439/" source="CVE"/>
		<reference ref_id="CVE-2025-12440" ref_url="https://www.suse.com/security/cve/CVE-2025-12440/" source="CVE"/>
		<reference ref_id="CVE-2025-12441" ref_url="https://www.suse.com/security/cve/CVE-2025-12441/" source="CVE"/>
		<reference ref_id="CVE-2025-12443" ref_url="https://www.suse.com/security/cve/CVE-2025-12443/" source="CVE"/>
		<reference ref_id="CVE-2025-12444" ref_url="https://www.suse.com/security/cve/CVE-2025-12444/" source="CVE"/>
		<reference ref_id="CVE-2025-12445" ref_url="https://www.suse.com/security/cve/CVE-2025-12445/" source="CVE"/>
		<reference ref_id="CVE-2025-12446" ref_url="https://www.suse.com/security/cve/CVE-2025-12446/" source="CVE"/>
		<reference ref_id="CVE-2025-12447" ref_url="https://www.suse.com/security/cve/CVE-2025-12447/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-142.0.7444.59-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-10-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12428/">CVE-2025-12428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12428">CVE-2025-12428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12429/">CVE-2025-12429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12429">CVE-2025-12429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12430/">CVE-2025-12430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12430">CVE-2025-12430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12431/">CVE-2025-12431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12431">CVE-2025-12431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12432/">CVE-2025-12432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12432">CVE-2025-12432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12433/">CVE-2025-12433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12433">CVE-2025-12433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12434/">CVE-2025-12434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12434">CVE-2025-12434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12435/">CVE-2025-12435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12435">CVE-2025-12435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12436/">CVE-2025-12436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12436">CVE-2025-12436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12437/">CVE-2025-12437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12437">CVE-2025-12437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12438/">CVE-2025-12438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12438">CVE-2025-12438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12439/">CVE-2025-12439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12439">CVE-2025-12439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12440/">CVE-2025-12440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12440">CVE-2025-12440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12441/">CVE-2025-12441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12441">CVE-2025-12441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12443/">CVE-2025-12443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12443">CVE-2025-12443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12444/">CVE-2025-12444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12444">CVE-2025-12444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12445/">CVE-2025-12445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12445">CVE-2025-12445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12446/">CVE-2025-12446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12446">CVE-2025-12446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12447/">CVE-2025-12447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12447">CVE-2025-12447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024443" comment="chromedriver-142.0.7444.59-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024444" comment="chromium-142.0.7444.59-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254009" version="1" class="patch">
	<metadata>
		<title>libmozjs-140-0-140.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62813" ref_url="https://www.suse.com/security/cve/CVE-2025-62813/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-140-0-140.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-10-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62813/">CVE-2025-62813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62813">CVE-2025-62813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024445" comment="libmozjs-140-0-140.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024446" comment="mozjs140-140.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024447" comment="mozjs140-devel-140.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254010" version="1" class="patch">
	<metadata>
		<title>gomuks-0.3.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<description>
These are all security issues fixed in the gomuks-0.3.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024541" comment="gomuks-0.3.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254011" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.29.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.29.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024542" comment="java-11-openj9-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024543" comment="java-11-openj9-demo-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024544" comment="java-11-openj9-devel-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024545" comment="java-11-openj9-headless-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024546" comment="java-11-openj9-javadoc-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024547" comment="java-11-openj9-jmods-11.0.29.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024548" comment="java-11-openj9-src-11.0.29.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254012" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024549" comment="java-17-openj9-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024550" comment="java-17-openj9-demo-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024551" comment="java-17-openj9-devel-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024552" comment="java-17-openj9-headless-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024553" comment="java-17-openj9-javadoc-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024554" comment="java-17-openj9-jmods-17.0.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024555" comment="java-17-openj9-src-17.0.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254013" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.472-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.472-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024556" comment="java-1_8_0-openj9-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024557" comment="java-1_8_0-openj9-accessibility-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024558" comment="java-1_8_0-openj9-demo-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024559" comment="java-1_8_0-openj9-devel-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024560" comment="java-1_8_0-openj9-headless-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024561" comment="java-1_8_0-openj9-javadoc-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024562" comment="java-1_8_0-openj9-src-1.8.0.472-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254014" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024563" comment="java-21-openj9-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024564" comment="java-21-openj9-demo-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024565" comment="java-21-openj9-devel-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024566" comment="java-21-openj9-headless-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024567" comment="java-21-openj9-javadoc-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024568" comment="java-21-openj9-jmods-21.0.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024569" comment="java-21-openj9-src-21.0.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254015" version="1" class="patch">
	<metadata>
		<title>java-25-openj9-25.0.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
These are all security issues fixed in the java-25-openj9-25.0.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024570" comment="java-25-openj9-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024571" comment="java-25-openj9-demo-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024572" comment="java-25-openj9-devel-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024573" comment="java-25-openj9-headless-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024574" comment="java-25-openj9-javadoc-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024575" comment="java-25-openj9-jmods-25.0.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024576" comment="java-25-openj9-src-25.0.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254016" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20251029T215107-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20251029T215107-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024608" comment="govulncheck-vulndb-0.0.20251029T215107-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254017" version="1" class="patch">
	<metadata>
		<title>python311-starlette-0.49.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62727" ref_url="https://www.suse.com/security/cve/CVE-2025-62727/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-starlette-0.49.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62727/">CVE-2025-62727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62727">CVE-2025-62727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024609" comment="python311-starlette-0.49.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024610" comment="python312-starlette-0.49.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024611" comment="python313-starlette-0.49.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254018" version="1" class="patch">
	<metadata>
		<title>kumactl-2.12.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<description>
These are all security issues fixed in the kumactl-2.12.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-02"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024662" comment="kumactl-2.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024663" comment="kumactl-bash-completion-2.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024664" comment="kumactl-fish-completion-2.12.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024665" comment="kumactl-zsh-completion-2.12.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254019" version="1" class="patch">
	<metadata>
		<title>redis-8.2.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62507" ref_url="https://www.suse.com/security/cve/CVE-2025-62507/" source="CVE"/>
		<description>
These are all security issues fixed in the redis-8.2.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-02"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62507/">CVE-2025-62507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62507">CVE-2025-62507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024666" comment="redis-8.2.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254020" version="1" class="patch">
	<metadata>
		<title>python311-djangorestframework-simplejwt-5.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22513" ref_url="https://www.suse.com/security/cve/CVE-2024-22513/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-djangorestframework-simplejwt-5.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-03"/>
	<updated date="2025-11-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22513/">CVE-2024-22513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22513">CVE-2024-22513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025063" comment="python311-djangorestframework-simplejwt-5.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025064" comment="python312-djangorestframework-simplejwt-5.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025065" comment="python313-djangorestframework-simplejwt-5.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254021" version="1" class="patch">
	<metadata>
		<title>OpenSMTPD-7.8.0p0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62875" ref_url="https://www.suse.com/security/cve/CVE-2025-62875/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenSMTPD-7.8.0p0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-04"/>
	<updated date="2025-11-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62875/">CVE-2025-62875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62875">CVE-2025-62875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025066" comment="OpenSMTPD-7.8.0p0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254022" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.472-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.472-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-04"/>
	<updated date="2025-11-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025067" comment="java-1_8_0-openjdk-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025068" comment="java-1_8_0-openjdk-accessibility-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025069" comment="java-1_8_0-openjdk-demo-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025070" comment="java-1_8_0-openjdk-devel-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025071" comment="java-1_8_0-openjdk-headless-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025072" comment="java-1_8_0-openjdk-javadoc-1.8.0.472-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025073" comment="java-1_8_0-openjdk-src-1.8.0.472-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254023" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.17.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40025" ref_url="https://www.suse.com/security/cve/CVE-2025-40025/" source="CVE"/>
		<reference ref_id="CVE-2025-40026" ref_url="https://www.suse.com/security/cve/CVE-2025-40026/" source="CVE"/>
		<reference ref_id="CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027/" source="CVE"/>
		<reference ref_id="CVE-2025-40028" ref_url="https://www.suse.com/security/cve/CVE-2025-40028/" source="CVE"/>
		<reference ref_id="CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029/" source="CVE"/>
		<reference ref_id="CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030/" source="CVE"/>
		<reference ref_id="CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031/" source="CVE"/>
		<reference ref_id="CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032/" source="CVE"/>
		<reference ref_id="CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033/" source="CVE"/>
		<reference ref_id="CVE-2025-40034" ref_url="https://www.suse.com/security/cve/CVE-2025-40034/" source="CVE"/>
		<reference ref_id="CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035/" source="CVE"/>
		<reference ref_id="CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036/" source="CVE"/>
		<reference ref_id="CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037/" source="CVE"/>
		<reference ref_id="CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038/" source="CVE"/>
		<reference ref_id="CVE-2025-40039" ref_url="https://www.suse.com/security/cve/CVE-2025-40039/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40041" ref_url="https://www.suse.com/security/cve/CVE-2025-40041/" source="CVE"/>
		<reference ref_id="CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042/" source="CVE"/>
		<reference ref_id="CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045/" source="CVE"/>
		<reference ref_id="CVE-2025-40046" ref_url="https://www.suse.com/security/cve/CVE-2025-40046/" source="CVE"/>
		<reference ref_id="CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049/" source="CVE"/>
		<reference ref_id="CVE-2025-40050" ref_url="https://www.suse.com/security/cve/CVE-2025-40050/" source="CVE"/>
		<reference ref_id="CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051/" source="CVE"/>
		<reference ref_id="CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052/" source="CVE"/>
		<reference ref_id="CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053/" source="CVE"/>
		<reference ref_id="CVE-2025-40054" ref_url="https://www.suse.com/security/cve/CVE-2025-40054/" source="CVE"/>
		<reference ref_id="CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055/" source="CVE"/>
		<reference ref_id="CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056/" source="CVE"/>
		<reference ref_id="CVE-2025-40057" ref_url="https://www.suse.com/security/cve/CVE-2025-40057/" source="CVE"/>
		<reference ref_id="CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058/" source="CVE"/>
		<reference ref_id="CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059/" source="CVE"/>
		<reference ref_id="CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060/" source="CVE"/>
		<reference ref_id="CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061/" source="CVE"/>
		<reference ref_id="CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062/" source="CVE"/>
		<reference ref_id="CVE-2025-40063" ref_url="https://www.suse.com/security/cve/CVE-2025-40063/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-40065" ref_url="https://www.suse.com/security/cve/CVE-2025-40065/" source="CVE"/>
		<reference ref_id="CVE-2025-40066" ref_url="https://www.suse.com/security/cve/CVE-2025-40066/" source="CVE"/>
		<reference ref_id="CVE-2025-40067" ref_url="https://www.suse.com/security/cve/CVE-2025-40067/" source="CVE"/>
		<reference ref_id="CVE-2025-40068" ref_url="https://www.suse.com/security/cve/CVE-2025-40068/" source="CVE"/>
		<reference ref_id="CVE-2025-40069" ref_url="https://www.suse.com/security/cve/CVE-2025-40069/" source="CVE"/>
		<reference ref_id="CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070/" source="CVE"/>
		<reference ref_id="CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071/" source="CVE"/>
		<reference ref_id="CVE-2025-40072" ref_url="https://www.suse.com/security/cve/CVE-2025-40072/" source="CVE"/>
		<reference ref_id="CVE-2025-40073" ref_url="https://www.suse.com/security/cve/CVE-2025-40073/" source="CVE"/>
		<reference ref_id="CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074/" source="CVE"/>
		<reference ref_id="CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075/" source="CVE"/>
		<reference ref_id="CVE-2025-40076" ref_url="https://www.suse.com/security/cve/CVE-2025-40076/" source="CVE"/>
		<reference ref_id="CVE-2025-40077" ref_url="https://www.suse.com/security/cve/CVE-2025-40077/" source="CVE"/>
		<reference ref_id="CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078/" source="CVE"/>
		<reference ref_id="CVE-2025-40079" ref_url="https://www.suse.com/security/cve/CVE-2025-40079/" source="CVE"/>
		<reference ref_id="CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080/" source="CVE"/>
		<reference ref_id="CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081/" source="CVE"/>
		<reference ref_id="CVE-2025-40082" ref_url="https://www.suse.com/security/cve/CVE-2025-40082/" source="CVE"/>
		<reference ref_id="CVE-2025-40084" ref_url="https://www.suse.com/security/cve/CVE-2025-40084/" source="CVE"/>
		<reference ref_id="CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085/" source="CVE"/>
		<reference ref_id="CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086/" source="CVE"/>
		<reference ref_id="CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087/" source="CVE"/>
		<reference ref_id="CVE-2025-40088" ref_url="https://www.suse.com/security/cve/CVE-2025-40088/" source="CVE"/>
		<reference ref_id="CVE-2025-40089" ref_url="https://www.suse.com/security/cve/CVE-2025-40089/" source="CVE"/>
		<reference ref_id="CVE-2025-40090" ref_url="https://www.suse.com/security/cve/CVE-2025-40090/" source="CVE"/>
		<reference ref_id="CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091/" source="CVE"/>
		<reference ref_id="CVE-2025-40092" ref_url="https://www.suse.com/security/cve/CVE-2025-40092/" source="CVE"/>
		<reference ref_id="CVE-2025-40093" ref_url="https://www.suse.com/security/cve/CVE-2025-40093/" source="CVE"/>
		<reference ref_id="CVE-2025-40094" ref_url="https://www.suse.com/security/cve/CVE-2025-40094/" source="CVE"/>
		<reference ref_id="CVE-2025-40095" ref_url="https://www.suse.com/security/cve/CVE-2025-40095/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097/" source="CVE"/>
		<reference ref_id="CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098/" source="CVE"/>
		<reference ref_id="CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099/" source="CVE"/>
		<reference ref_id="CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100/" source="CVE"/>
		<reference ref_id="CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103/" source="CVE"/>
		<reference ref_id="CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104/" source="CVE"/>
		<reference ref_id="CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105/" source="CVE"/>
		<reference ref_id="CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.17.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-04"/>
	<updated date="2025-11-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40025/">CVE-2025-40025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40025">CVE-2025-40025 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40026/">CVE-2025-40026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40026">CVE-2025-40026 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40028/">CVE-2025-40028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40028">CVE-2025-40028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40034/">CVE-2025-40034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40034">CVE-2025-40034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40039/">CVE-2025-40039 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40039">CVE-2025-40039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40041/">CVE-2025-40041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40041">CVE-2025-40041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40046/">CVE-2025-40046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40046">CVE-2025-40046 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40050/">CVE-2025-40050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40050">CVE-2025-40050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40054/">CVE-2025-40054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40054">CVE-2025-40054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40057/">CVE-2025-40057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40057">CVE-2025-40057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40063/">CVE-2025-40063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40063">CVE-2025-40063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40065/">CVE-2025-40065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40065">CVE-2025-40065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40066/">CVE-2025-40066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40066">CVE-2025-40066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40067/">CVE-2025-40067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40067">CVE-2025-40067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40068/">CVE-2025-40068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40068">CVE-2025-40068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40069/">CVE-2025-40069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40069">CVE-2025-40069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40072/">CVE-2025-40072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40072">CVE-2025-40072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40073/">CVE-2025-40073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40073">CVE-2025-40073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40076/">CVE-2025-40076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40076">CVE-2025-40076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40077/">CVE-2025-40077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40077">CVE-2025-40077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40079/">CVE-2025-40079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40079">CVE-2025-40079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40082/">CVE-2025-40082 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40082">CVE-2025-40082 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40084/">CVE-2025-40084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40084">CVE-2025-40084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40088/">CVE-2025-40088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40089/">CVE-2025-40089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40089">CVE-2025-40089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40090/">CVE-2025-40090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40090">CVE-2025-40090 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40092/">CVE-2025-40092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40092">CVE-2025-40092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40093/">CVE-2025-40093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40093">CVE-2025-40093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40094/">CVE-2025-40094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40094">CVE-2025-40094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40095/">CVE-2025-40095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40095">CVE-2025-40095 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025075" comment="kernel-macros-6.17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025076" comment="kernel-source-6.17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025077" comment="kernel-source-vanilla-6.17.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254024" version="1" class="patch">
	<metadata>
		<title>kubecolor-0.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<description>
These are all security issues fixed in the kubecolor-0.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-04"/>
	<updated date="2025-11-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025078" comment="kubecolor-0.5.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254025" version="1" class="patch">
	<metadata>
		<title>zellij-0.43.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-53901" ref_url="https://www.suse.com/security/cve/CVE-2025-53901/" source="CVE"/>
		<description>
These are all security issues fixed in the zellij-0.43.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-04"/>
	<updated date="2025-11-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53901/">CVE-2025-53901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53901">CVE-2025-53901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025079" comment="zellij-0.43.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025080" comment="zellij-bash-completion-0.43.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025081" comment="zellij-fish-completion-0.43.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025082" comment="zellij-zsh-completion-0.43.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254026" version="1" class="patch">
	<metadata>
		<title>runc-1.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-05"/>
	<updated date="2025-11-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025083" comment="runc-1.3.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254027" version="1" class="patch">
	<metadata>
		<title>erlang-28.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-1000107" ref_url="https://www.suse.com/security/cve/CVE-2016-1000107/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-28.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-06"/>
	<updated date="2025-11-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000107/">CVE-2016-1000107 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000107">CVE-2016-1000107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025084" comment="erlang-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025085" comment="erlang-debugger-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025086" comment="erlang-debugger-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025087" comment="erlang-dialyzer-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025088" comment="erlang-dialyzer-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025089" comment="erlang-diameter-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025090" comment="erlang-diameter-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025091" comment="erlang-doc-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025092" comment="erlang-epmd-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025093" comment="erlang-et-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025094" comment="erlang-et-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025095" comment="erlang-jinterface-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025096" comment="erlang-jinterface-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025097" comment="erlang-observer-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025098" comment="erlang-observer-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025099" comment="erlang-reltool-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025100" comment="erlang-reltool-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025101" comment="erlang-src-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025102" comment="erlang-wx-28.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025103" comment="erlang-wx-src-28.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254028" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.06.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59798" ref_url="https://www.suse.com/security/cve/CVE-2025-59798/" source="CVE"/>
		<reference ref_id="CVE-2025-59799" ref_url="https://www.suse.com/security/cve/CVE-2025-59799/" source="CVE"/>
		<reference ref_id="CVE-2025-59800" ref_url="https://www.suse.com/security/cve/CVE-2025-59800/" source="CVE"/>
		<reference ref_id="CVE-2025-59801" ref_url="https://www.suse.com/security/cve/CVE-2025-59801/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.06.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-06"/>
	<updated date="2025-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-59798/">CVE-2025-59798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59798">CVE-2025-59798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-59799/">CVE-2025-59799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59799">CVE-2025-59799 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-59800/">CVE-2025-59800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59800">CVE-2025-59800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59801/">CVE-2025-59801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59801">CVE-2025-59801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025104" comment="ghostscript-10.06.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025105" comment="ghostscript-devel-10.06.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025106" comment="ghostscript-x11-10.06.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254029" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.26-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64459" ref_url="https://www.suse.com/security/cve/CVE-2025-64459/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.26-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-06"/>
	<updated date="2025-11-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64459/">CVE-2025-64459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64459">CVE-2025-64459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025107" comment="python311-Django4-4.2.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025108" comment="python312-Django4-4.2.26-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025109" comment="python313-Django4-4.2.26-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254030" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20251028.00-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20251028.00-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025194" comment="google-osconfig-agent-20251028.00-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254031" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-11063" ref_url="https://www.suse.com/security/cve/CVE-2016-11063/" source="CVE"/>
		<reference ref_id="CVE-2016-11066" ref_url="https://www.suse.com/security/cve/CVE-2016-11066/" source="CVE"/>
		<reference ref_id="CVE-2016-11067" ref_url="https://www.suse.com/security/cve/CVE-2016-11067/" source="CVE"/>
		<reference ref_id="CVE-2016-11068" ref_url="https://www.suse.com/security/cve/CVE-2016-11068/" source="CVE"/>
		<reference ref_id="CVE-2016-11069" ref_url="https://www.suse.com/security/cve/CVE-2016-11069/" source="CVE"/>
		<reference ref_id="CVE-2016-11070" ref_url="https://www.suse.com/security/cve/CVE-2016-11070/" source="CVE"/>
		<reference ref_id="CVE-2016-11071" ref_url="https://www.suse.com/security/cve/CVE-2016-11071/" source="CVE"/>
		<reference ref_id="CVE-2016-11072" ref_url="https://www.suse.com/security/cve/CVE-2016-11072/" source="CVE"/>
		<reference ref_id="CVE-2016-11073" ref_url="https://www.suse.com/security/cve/CVE-2016-11073/" source="CVE"/>
		<reference ref_id="CVE-2016-11074" ref_url="https://www.suse.com/security/cve/CVE-2016-11074/" source="CVE"/>
		<reference ref_id="CVE-2016-11075" ref_url="https://www.suse.com/security/cve/CVE-2016-11075/" source="CVE"/>
		<reference ref_id="CVE-2016-11076" ref_url="https://www.suse.com/security/cve/CVE-2016-11076/" source="CVE"/>
		<reference ref_id="CVE-2016-11077" ref_url="https://www.suse.com/security/cve/CVE-2016-11077/" source="CVE"/>
		<reference ref_id="CVE-2016-11078" ref_url="https://www.suse.com/security/cve/CVE-2016-11078/" source="CVE"/>
		<reference ref_id="CVE-2016-11079" ref_url="https://www.suse.com/security/cve/CVE-2016-11079/" source="CVE"/>
		<reference ref_id="CVE-2016-11080" ref_url="https://www.suse.com/security/cve/CVE-2016-11080/" source="CVE"/>
		<reference ref_id="CVE-2016-11081" ref_url="https://www.suse.com/security/cve/CVE-2016-11081/" source="CVE"/>
		<reference ref_id="CVE-2016-11082" ref_url="https://www.suse.com/security/cve/CVE-2016-11082/" source="CVE"/>
		<reference ref_id="CVE-2016-11083" ref_url="https://www.suse.com/security/cve/CVE-2016-11083/" source="CVE"/>
		<reference ref_id="CVE-2016-11084" ref_url="https://www.suse.com/security/cve/CVE-2016-11084/" source="CVE"/>
		<reference ref_id="CVE-2017-18872" ref_url="https://www.suse.com/security/cve/CVE-2017-18872/" source="CVE"/>
		<reference ref_id="CVE-2023-32199" ref_url="https://www.suse.com/security/cve/CVE-2023-32199/" source="CVE"/>
		<reference ref_id="CVE-2024-58269" ref_url="https://www.suse.com/security/cve/CVE-2024-58269/" source="CVE"/>
		<reference ref_id="CVE-2025-10545" ref_url="https://www.suse.com/security/cve/CVE-2025-10545/" source="CVE"/>
		<reference ref_id="CVE-2025-10678" ref_url="https://www.suse.com/security/cve/CVE-2025-10678/" source="CVE"/>
		<reference ref_id="CVE-2025-10954" ref_url="https://www.suse.com/security/cve/CVE-2025-10954/" source="CVE"/>
		<reference ref_id="CVE-2025-11374" ref_url="https://www.suse.com/security/cve/CVE-2025-11374/" source="CVE"/>
		<reference ref_id="CVE-2025-11375" ref_url="https://www.suse.com/security/cve/CVE-2025-11375/" source="CVE"/>
		<reference ref_id="CVE-2025-11579" ref_url="https://www.suse.com/security/cve/CVE-2025-11579/" source="CVE"/>
		<reference ref_id="CVE-2025-11621" ref_url="https://www.suse.com/security/cve/CVE-2025-11621/" source="CVE"/>
		<reference ref_id="CVE-2025-12044" ref_url="https://www.suse.com/security/cve/CVE-2025-12044/" source="CVE"/>
		<reference ref_id="CVE-2025-26625" ref_url="https://www.suse.com/security/cve/CVE-2025-26625/" source="CVE"/>
		<reference ref_id="CVE-2025-27093" ref_url="https://www.suse.com/security/cve/CVE-2025-27093/" source="CVE"/>
		<reference ref_id="CVE-2025-41410" ref_url="https://www.suse.com/security/cve/CVE-2025-41410/" source="CVE"/>
		<reference ref_id="CVE-2025-41443" ref_url="https://www.suse.com/security/cve/CVE-2025-41443/" source="CVE"/>
		<reference ref_id="CVE-2025-54286" ref_url="https://www.suse.com/security/cve/CVE-2025-54286/" source="CVE"/>
		<reference ref_id="CVE-2025-54287" ref_url="https://www.suse.com/security/cve/CVE-2025-54287/" source="CVE"/>
		<reference ref_id="CVE-2025-54288" ref_url="https://www.suse.com/security/cve/CVE-2025-54288/" source="CVE"/>
		<reference ref_id="CVE-2025-54289" ref_url="https://www.suse.com/security/cve/CVE-2025-54289/" source="CVE"/>
		<reference ref_id="CVE-2025-54290" ref_url="https://www.suse.com/security/cve/CVE-2025-54290/" source="CVE"/>
		<reference ref_id="CVE-2025-54291" ref_url="https://www.suse.com/security/cve/CVE-2025-54291/" source="CVE"/>
		<reference ref_id="CVE-2025-54293" ref_url="https://www.suse.com/security/cve/CVE-2025-54293/" source="CVE"/>
		<reference ref_id="CVE-2025-54469" ref_url="https://www.suse.com/security/cve/CVE-2025-54469/" source="CVE"/>
		<reference ref_id="CVE-2025-54470" ref_url="https://www.suse.com/security/cve/CVE-2025-54470/" source="CVE"/>
		<reference ref_id="CVE-2025-54471" ref_url="https://www.suse.com/security/cve/CVE-2025-54471/" source="CVE"/>
		<reference ref_id="CVE-2025-54499" ref_url="https://www.suse.com/security/cve/CVE-2025-54499/" source="CVE"/>
		<reference ref_id="CVE-2025-58073" ref_url="https://www.suse.com/security/cve/CVE-2025-58073/" source="CVE"/>
		<reference ref_id="CVE-2025-58075" ref_url="https://www.suse.com/security/cve/CVE-2025-58075/" source="CVE"/>
		<reference ref_id="CVE-2025-58356" ref_url="https://www.suse.com/security/cve/CVE-2025-58356/" source="CVE"/>
		<reference ref_id="CVE-2025-59043" ref_url="https://www.suse.com/security/cve/CVE-2025-59043/" source="CVE"/>
		<reference ref_id="CVE-2025-59048" ref_url="https://www.suse.com/security/cve/CVE-2025-59048/" source="CVE"/>
		<reference ref_id="CVE-2025-59530" ref_url="https://www.suse.com/security/cve/CVE-2025-59530/" source="CVE"/>
		<reference ref_id="CVE-2025-59836" ref_url="https://www.suse.com/security/cve/CVE-2025-59836/" source="CVE"/>
		<reference ref_id="CVE-2025-59937" ref_url="https://www.suse.com/security/cve/CVE-2025-59937/" source="CVE"/>
		<reference ref_id="CVE-2025-61141" ref_url="https://www.suse.com/security/cve/CVE-2025-61141/" source="CVE"/>
		<reference ref_id="CVE-2025-61524" ref_url="https://www.suse.com/security/cve/CVE-2025-61524/" source="CVE"/>
		<reference ref_id="CVE-2025-61581" ref_url="https://www.suse.com/security/cve/CVE-2025-61581/" source="CVE"/>
		<reference ref_id="CVE-2025-61688" ref_url="https://www.suse.com/security/cve/CVE-2025-61688/" source="CVE"/>
		<reference ref_id="CVE-2025-62156" ref_url="https://www.suse.com/security/cve/CVE-2025-62156/" source="CVE"/>
		<reference ref_id="CVE-2025-62157" ref_url="https://www.suse.com/security/cve/CVE-2025-62157/" source="CVE"/>
		<reference ref_id="CVE-2025-62375" ref_url="https://www.suse.com/security/cve/CVE-2025-62375/" source="CVE"/>
		<reference ref_id="CVE-2025-62506" ref_url="https://www.suse.com/security/cve/CVE-2025-62506/" source="CVE"/>
		<reference ref_id="CVE-2025-62513" ref_url="https://www.suse.com/security/cve/CVE-2025-62513/" source="CVE"/>
		<reference ref_id="CVE-2025-62705" ref_url="https://www.suse.com/security/cve/CVE-2025-62705/" source="CVE"/>
		<reference ref_id="CVE-2025-62714" ref_url="https://www.suse.com/security/cve/CVE-2025-62714/" source="CVE"/>
		<reference ref_id="CVE-2025-62725" ref_url="https://www.suse.com/security/cve/CVE-2025-62725/" source="CVE"/>
		<reference ref_id="CVE-2025-62820" ref_url="https://www.suse.com/security/cve/CVE-2025-62820/" source="CVE"/>
		<reference ref_id="CVE-2025-64101" ref_url="https://www.suse.com/security/cve/CVE-2025-64101/" source="CVE"/>
		<reference ref_id="CVE-2025-64102" ref_url="https://www.suse.com/security/cve/CVE-2025-64102/" source="CVE"/>
		<reference ref_id="CVE-2025-64103" ref_url="https://www.suse.com/security/cve/CVE-2025-64103/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20251105T184115-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11063/">CVE-2016-11063 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11063">CVE-2016-11063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11066/">CVE-2016-11066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11066">CVE-2016-11066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11067/">CVE-2016-11067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11067">CVE-2016-11067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11068/">CVE-2016-11068 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11068">CVE-2016-11068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11069/">CVE-2016-11069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11069">CVE-2016-11069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11070/">CVE-2016-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11070">CVE-2016-11070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11071/">CVE-2016-11071 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11071">CVE-2016-11071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11072/">CVE-2016-11072 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11072">CVE-2016-11072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11073/">CVE-2016-11073 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11073">CVE-2016-11073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11074/">CVE-2016-11074 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11074">CVE-2016-11074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11075/">CVE-2016-11075 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11075">CVE-2016-11075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11076/">CVE-2016-11076 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11076">CVE-2016-11076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11077/">CVE-2016-11077 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11077">CVE-2016-11077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11078/">CVE-2016-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11078">CVE-2016-11078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11079/">CVE-2016-11079 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11079">CVE-2016-11079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11080/">CVE-2016-11080 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11080">CVE-2016-11080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11081/">CVE-2016-11081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11081">CVE-2016-11081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11082/">CVE-2016-11082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11082">CVE-2016-11082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11083/">CVE-2016-11083 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11083">CVE-2016-11083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-11084/">CVE-2016-11084 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-11084">CVE-2016-11084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18872/">CVE-2017-18872 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18872">CVE-2017-18872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32199/">CVE-2023-32199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32199">CVE-2023-32199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-58269/">CVE-2024-58269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58269">CVE-2024-58269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10545/">CVE-2025-10545 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-10545">CVE-2025-10545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10678/">CVE-2025-10678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10678">CVE-2025-10678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10954/">CVE-2025-10954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-10954">CVE-2025-10954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11374/">CVE-2025-11374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11374">CVE-2025-11374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11375/">CVE-2025-11375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11375">CVE-2025-11375 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11579/">CVE-2025-11579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11579">CVE-2025-11579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11621/">CVE-2025-11621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11621">CVE-2025-11621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12044/">CVE-2025-12044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12044">CVE-2025-12044 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26625/">CVE-2025-26625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26625">CVE-2025-26625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27093/">CVE-2025-27093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27093">CVE-2025-27093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41410/">CVE-2025-41410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41410">CVE-2025-41410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41443/">CVE-2025-41443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41443">CVE-2025-41443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54286/">CVE-2025-54286 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54286">CVE-2025-54286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54287/">CVE-2025-54287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54287">CVE-2025-54287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54288/">CVE-2025-54288 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54288">CVE-2025-54288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54289/">CVE-2025-54289 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54289">CVE-2025-54289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54290/">CVE-2025-54290 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54290">CVE-2025-54290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54291/">CVE-2025-54291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54291">CVE-2025-54291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54293/">CVE-2025-54293 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54293">CVE-2025-54293 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-54469/">CVE-2025-54469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54469">CVE-2025-54469 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-54470/">CVE-2025-54470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54470">CVE-2025-54470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-54471/">CVE-2025-54471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54471">CVE-2025-54471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54499/">CVE-2025-54499 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54499">CVE-2025-54499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58073/">CVE-2025-58073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58073">CVE-2025-58073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58075/">CVE-2025-58075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58075">CVE-2025-58075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58356/">CVE-2025-58356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58356">CVE-2025-58356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59043/">CVE-2025-59043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59043">CVE-2025-59043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59048/">CVE-2025-59048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59048">CVE-2025-59048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59530/">CVE-2025-59530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59530">CVE-2025-59530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59836/">CVE-2025-59836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59836">CVE-2025-59836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59937/">CVE-2025-59937 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59937">CVE-2025-59937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61141/">CVE-2025-61141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61141">CVE-2025-61141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61524/">CVE-2025-61524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61524">CVE-2025-61524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61581/">CVE-2025-61581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61581">CVE-2025-61581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61688/">CVE-2025-61688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61688">CVE-2025-61688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62156/">CVE-2025-62156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62156">CVE-2025-62156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62157/">CVE-2025-62157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62157">CVE-2025-62157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62375/">CVE-2025-62375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62375">CVE-2025-62375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62506/">CVE-2025-62506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62506">CVE-2025-62506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62513/">CVE-2025-62513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62513">CVE-2025-62513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62705/">CVE-2025-62705 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62705">CVE-2025-62705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62714/">CVE-2025-62714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62714">CVE-2025-62714 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-62725/">CVE-2025-62725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62725">CVE-2025-62725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62820/">CVE-2025-62820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62820">CVE-2025-62820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64101/">CVE-2025-64101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64101">CVE-2025-64101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64102/">CVE-2025-64102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64102">CVE-2025-64102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64103/">CVE-2025-64103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64103">CVE-2025-64103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025195" comment="govulncheck-vulndb-0.0.20251105T184115-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254032" version="1" class="patch">
	<metadata>
		<title>opentofu-1.10.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<description>
These are all security issues fixed in the opentofu-1.10.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025196" comment="opentofu-1.10.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254033" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64459" ref_url="https://www.suse.com/security/cve/CVE-2025-64459/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64459/">CVE-2025-64459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64459">CVE-2025-64459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025197" comment="python311-Django-5.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025198" comment="python312-Django-5.2.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025199" comment="python313-Django-5.2.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254034" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025200" comment="python315-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025201" comment="python315-curses-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025202" comment="python315-dbm-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025203" comment="python315-idle-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025204" comment="python315-profiling-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025205" comment="python315-tk-3.15.0~a1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025206" comment="python315-x86-64-v3-3.15.0~a1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254035" version="1" class="patch">
	<metadata>
		<title>libshibsp-lite12-3.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9943" ref_url="https://www.suse.com/security/cve/CVE-2025-9943/" source="CVE"/>
		<description>
These are all security issues fixed in the libshibsp-lite12-3.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-9943/">CVE-2025-9943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9943">CVE-2025-9943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025207" comment="libshibsp-lite12-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025208" comment="libshibsp12-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025209" comment="shibboleth-sp-3.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025210" comment="shibboleth-sp-devel-3.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254036" version="1" class="patch">
	<metadata>
		<title>squid-7.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-7.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025211" comment="squid-7.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254037" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.111-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.111-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025212" comment="tomcat-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025213" comment="tomcat-admin-webapps-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025214" comment="tomcat-docs-webapp-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025215" comment="tomcat-el-3_0-api-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025216" comment="tomcat-embed-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025217" comment="tomcat-javadoc-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025218" comment="tomcat-jsp-2_3-api-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025219" comment="tomcat-jsvc-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025220" comment="tomcat-lib-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025221" comment="tomcat-servlet-4_0-api-9.0.111-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025222" comment="tomcat-webapps-9.0.111-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254038" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.48-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.48-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025223" comment="tomcat10-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025224" comment="tomcat10-admin-webapps-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025225" comment="tomcat10-doc-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025226" comment="tomcat10-docs-webapp-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025227" comment="tomcat10-el-5_0-api-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025228" comment="tomcat10-embed-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025229" comment="tomcat10-jsp-3_1-api-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025230" comment="tomcat10-jsvc-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025231" comment="tomcat10-lib-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025232" comment="tomcat10-servlet-6_0-api-10.1.48-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025233" comment="tomcat10-webapps-10.1.48-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254039" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025234" comment="tomcat11-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025235" comment="tomcat11-admin-webapps-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025236" comment="tomcat11-doc-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025237" comment="tomcat11-docs-webapp-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025238" comment="tomcat11-el-6_0-api-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025239" comment="tomcat11-embed-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025240" comment="tomcat11-jsp-4_0-api-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025241" comment="tomcat11-jsvc-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025242" comment="tomcat11-lib-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025243" comment="tomcat11-servlet-6_1-api-11.0.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025244" comment="tomcat11-webapps-11.0.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254040" version="1" class="patch">
	<metadata>
		<title>xen-4.20.1_08-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58149" ref_url="https://www.suse.com/security/cve/CVE-2025-58149/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.20.1_08-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="4.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58149/">CVE-2025-58149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58149">CVE-2025-58149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025245" comment="xen-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025246" comment="xen-devel-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025247" comment="xen-doc-html-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025248" comment="xen-libs-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025249" comment="xen-tools-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025250" comment="xen-tools-domU-4.20.1_08-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025251" comment="xen-tools-xendomains-wait-disk-4.20.1_08-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254041" version="1" class="patch">
	<metadata>
		<title>chromedriver-142.0.7444.134-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12725" ref_url="https://www.suse.com/security/cve/CVE-2025-12725/" source="CVE"/>
		<reference ref_id="CVE-2025-12726" ref_url="https://www.suse.com/security/cve/CVE-2025-12726/" source="CVE"/>
		<reference ref_id="CVE-2025-12727" ref_url="https://www.suse.com/security/cve/CVE-2025-12727/" source="CVE"/>
		<reference ref_id="CVE-2025-12728" ref_url="https://www.suse.com/security/cve/CVE-2025-12728/" source="CVE"/>
		<reference ref_id="CVE-2025-12729" ref_url="https://www.suse.com/security/cve/CVE-2025-12729/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-142.0.7444.134-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-08"/>
	<updated date="2025-11-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12725/">CVE-2025-12725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12725">CVE-2025-12725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12726/">CVE-2025-12726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12726">CVE-2025-12726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12727/">CVE-2025-12727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12727">CVE-2025-12727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12728/">CVE-2025-12728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12728">CVE-2025-12728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12729/">CVE-2025-12729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12729">CVE-2025-12729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025252" comment="chromedriver-142.0.7444.134-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025253" comment="chromium-142.0.7444.134-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254042" version="1" class="patch">
	<metadata>
		<title>incus-6.17-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
These are all security issues fixed in the incus-6.17-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-09"/>
	<updated date="2025-11-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025280" comment="incus-6.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025281" comment="incus-bash-completion-6.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025282" comment="incus-fish-completion-6.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025283" comment="incus-tools-6.17-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025284" comment="incus-zsh-completion-6.17-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254043" version="1" class="patch">
	<metadata>
		<title>hauler-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11579" ref_url="https://www.suse.com/security/cve/CVE-2025-11579/" source="CVE"/>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-10"/>
	<updated date="2025-11-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11579/">CVE-2025-11579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11579">CVE-2025-11579 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025487" comment="hauler-1.3.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254044" version="1" class="patch">
	<metadata>
		<title>regclient-0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="CVE-2025-9231" ref_url="https://www.suse.com/security/cve/CVE-2025-9231/" source="CVE"/>
		<reference ref_id="CVE-2025-9232" ref_url="https://www.suse.com/security/cve/CVE-2025-9232/" source="CVE"/>
		<description>
These are all security issues fixed in the regclient-0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-10"/>
	<updated date="2025-11-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9231/">CVE-2025-9231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9231">CVE-2025-9231 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9232/">CVE-2025-9232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025488" comment="regclient-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025489" comment="regclient-bash-completion-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025490" comment="regclient-fish-completion-0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025491" comment="regclient-zsh-completion-0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254045" version="1" class="patch">
	<metadata>
		<title>trivy-0.67.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.67.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-10"/>
	<updated date="2025-11-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025492" comment="trivy-0.67.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254046" version="1" class="patch">
	<metadata>
		<title>binutils-2.45-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-0840" ref_url="https://www.suse.com/security/cve/CVE-2025-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.45-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0840/">CVE-2025-0840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0840">CVE-2025-0840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025854" comment="binutils-2.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025855" comment="binutils-devel-2.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025856" comment="binutils-devel-32bit-2.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025857" comment="gprofng-2.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025858" comment="libctf-nobfd0-2.45-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025859" comment="libctf0-2.45-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254047" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-25621" ref_url="https://www.suse.com/security/cve/CVE-2024-25621/" source="CVE"/>
		<reference ref_id="CVE-2025-64329" ref_url="https://www.suse.com/security/cve/CVE-2025-64329/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25621/">CVE-2024-25621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25621">CVE-2024-25621 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64329/">CVE-2025-64329 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64329">CVE-2025-64329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025860" comment="containerd-1.7.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025861" comment="containerd-ctr-1.7.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025862" comment="containerd-devel-1.7.29-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254048" version="1" class="patch">
	<metadata>
		<title>python311-pdfminer.six-20251107-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64512" ref_url="https://www.suse.com/security/cve/CVE-2025-64512/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pdfminer.six-20251107-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64512/">CVE-2025-64512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64512">CVE-2025-64512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025863" comment="python311-pdfminer.six-20251107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025864" comment="python312-pdfminer.six-20251107-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025865" comment="python313-pdfminer.six-20251107-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254049" version="1" class="patch">
	<metadata>
		<title>tcpreplay-4.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-51006" ref_url="https://www.suse.com/security/cve/CVE-2025-51006/" source="CVE"/>
		<reference ref_id="CVE-2025-9157" ref_url="https://www.suse.com/security/cve/CVE-2025-9157/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpreplay-4.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-51006/">CVE-2025-51006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-51006">CVE-2025-51006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9157/">CVE-2025-9157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9157">CVE-2025-9157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025866" comment="tcpreplay-4.5.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254050" version="1" class="patch">
	<metadata>
		<title>go-sendxmpp-0.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the go-sendxmpp-0.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025867" comment="go-sendxmpp-0.15.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254051" version="1" class="patch">
	<metadata>
		<title>helm-3.19.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.19.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025868" comment="helm-3.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025869" comment="helm-bash-completion-3.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025870" comment="helm-fish-completion-3.19.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025871" comment="helm-zsh-completion-3.19.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254052" version="1" class="patch">
	<metadata>
		<title>python311-Brotli-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Brotli-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025872" comment="python311-Brotli-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025873" comment="python312-Brotli-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025874" comment="python313-Brotli-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254053" version="1" class="patch">
	<metadata>
		<title>python-Scrapy-doc-2.13.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Scrapy-doc-2.13.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025875" comment="python-Scrapy-doc-2.13.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025876" comment="python311-Scrapy-2.13.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025877" comment="python312-Scrapy-2.13.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025878" comment="python313-Scrapy-2.13.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254054" version="1" class="patch">
	<metadata>
		<title>weblate-5.14.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64326" ref_url="https://www.suse.com/security/cve/CVE-2025-64326/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.14.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64326/">CVE-2025-64326 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64326">CVE-2025-64326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025879" comment="weblate-5.14.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254055" version="1" class="patch">
	<metadata>
		<title>starboard-0.15.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<description>
These are all security issues fixed in the starboard-0.15.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029349" comment="starboard-0.15.28-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254056" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-145.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<reference ref_id="CVE-2025-13021" ref_url="https://www.suse.com/security/cve/CVE-2025-13021/" source="CVE"/>
		<reference ref_id="CVE-2025-13022" ref_url="https://www.suse.com/security/cve/CVE-2025-13022/" source="CVE"/>
		<reference ref_id="CVE-2025-13023" ref_url="https://www.suse.com/security/cve/CVE-2025-13023/" source="CVE"/>
		<reference ref_id="CVE-2025-13024" ref_url="https://www.suse.com/security/cve/CVE-2025-13024/" source="CVE"/>
		<reference ref_id="CVE-2025-13025" ref_url="https://www.suse.com/security/cve/CVE-2025-13025/" source="CVE"/>
		<reference ref_id="CVE-2025-13026" ref_url="https://www.suse.com/security/cve/CVE-2025-13026/" source="CVE"/>
		<reference ref_id="CVE-2025-13027" ref_url="https://www.suse.com/security/cve/CVE-2025-13027/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-145.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2025-11-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13021/">CVE-2025-13021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13021">CVE-2025-13021 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13022/">CVE-2025-13022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13022">CVE-2025-13022 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13023/">CVE-2025-13023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13023">CVE-2025-13023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13024/">CVE-2025-13024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13024">CVE-2025-13024 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13025/">CVE-2025-13025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13025">CVE-2025-13025 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13026/">CVE-2025-13026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13026">CVE-2025-13026 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13027/">CVE-2025-13027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13027">CVE-2025-13027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029739" comment="MozillaFirefox-145.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029740" comment="MozillaFirefox-branding-upstream-145.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029741" comment="MozillaFirefox-devel-145.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029742" comment="MozillaFirefox-translations-common-145.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029743" comment="MozillaFirefox-translations-other-145.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254057" version="1" class="patch">
	<metadata>
		<title>chromedriver-142.0.7444.162-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13042" ref_url="https://www.suse.com/security/cve/CVE-2025-13042/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-142.0.7444.162-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2025-11-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13042/">CVE-2025-13042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13042">CVE-2025-13042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029744" comment="chromedriver-142.0.7444.162-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029745" comment="chromium-142.0.7444.162-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254058" version="1" class="patch">
	<metadata>
		<title>teleport-17.7.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59530" ref_url="https://www.suse.com/security/cve/CVE-2025-59530/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.7.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2025-11-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59530/">CVE-2025-59530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59530">CVE-2025-59530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029746" comment="teleport-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029747" comment="teleport-bash-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029748" comment="teleport-fdpass-teleport-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029749" comment="teleport-tbot-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029750" comment="teleport-tbot-bash-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029751" comment="teleport-tbot-zsh-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029752" comment="teleport-tctl-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029753" comment="teleport-tctl-bash-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029754" comment="teleport-tctl-zsh-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029755" comment="teleport-tsh-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029756" comment="teleport-tsh-bash-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029757" comment="teleport-tsh-zsh-completion-17.7.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029758" comment="teleport-zsh-completion-17.7.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254059" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-17"/>
	<updated date="2025-11-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029788" comment="MozillaThunderbird-140.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029789" comment="MozillaThunderbird-openpgp-librnp-140.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029790" comment="MozillaThunderbird-translations-common-140.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029791" comment="MozillaThunderbird-translations-other-140.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254060" version="1" class="patch">
	<metadata>
		<title>itextpdf-5.5.13.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-29857" ref_url="https://www.suse.com/security/cve/CVE-2024-29857/" source="CVE"/>
		<description>
These are all security issues fixed in the itextpdf-5.5.13.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-17"/>
	<updated date="2025-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-29857/">CVE-2024-29857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857">CVE-2024-29857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029792" comment="itextpdf-5.5.13.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029793" comment="itextpdf-javadoc-5.5.13.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254061" version="1" class="patch">
	<metadata>
		<title>erlang27-27.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-25623" ref_url="https://www.suse.com/security/cve/CVE-2020-25623/" source="CVE"/>
		<reference ref_id="CVE-2020-35733" ref_url="https://www.suse.com/security/cve/CVE-2020-35733/" source="CVE"/>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2025-48041" ref_url="https://www.suse.com/security/cve/CVE-2025-48041/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang27-27.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-18"/>
	<updated date="2025-11-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25623/">CVE-2020-25623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25623">CVE-2020-25623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35733/">CVE-2020-35733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35733">CVE-2020-35733 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37026">CVE-2022-37026 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48041/">CVE-2025-48041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48041">CVE-2025-48041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029887" comment="erlang27-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029888" comment="erlang27-debugger-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029889" comment="erlang27-debugger-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029890" comment="erlang27-dialyzer-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029891" comment="erlang27-dialyzer-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029892" comment="erlang27-diameter-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029893" comment="erlang27-diameter-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029894" comment="erlang27-doc-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029895" comment="erlang27-epmd-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029896" comment="erlang27-et-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029897" comment="erlang27-et-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029898" comment="erlang27-jinterface-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029899" comment="erlang27-jinterface-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029900" comment="erlang27-observer-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029901" comment="erlang27-observer-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029902" comment="erlang27-reltool-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029903" comment="erlang27-reltool-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029904" comment="erlang27-src-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029905" comment="erlang27-wx-27.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029906" comment="erlang27-wx-src-27.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254062" version="1" class="patch">
	<metadata>
		<title>libIex-3_4-33-3.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64181" ref_url="https://www.suse.com/security/cve/CVE-2025-64181/" source="CVE"/>
		<reference ref_id="CVE-2025-64182" ref_url="https://www.suse.com/security/cve/CVE-2025-64182/" source="CVE"/>
		<reference ref_id="CVE-2025-64183" ref_url="https://www.suse.com/security/cve/CVE-2025-64183/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_4-33-3.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-18"/>
	<updated date="2025-11-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64181/">CVE-2025-64181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64181">CVE-2025-64181 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64182/">CVE-2025-64182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64182">CVE-2025-64182 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64183/">CVE-2025-64183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64183">CVE-2025-64183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029907" comment="libIex-3_4-33-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029908" comment="libIex-3_4-33-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029909" comment="libIex-3_4-33-x86-64-v3-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029910" comment="libIlmThread-3_4-33-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029911" comment="libIlmThread-3_4-33-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029912" comment="libIlmThread-3_4-33-x86-64-v3-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029913" comment="libOpenEXR-3_4-33-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029914" comment="libOpenEXR-3_4-33-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029915" comment="libOpenEXR-3_4-33-x86-64-v3-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029916" comment="libOpenEXRCore-3_4-33-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029917" comment="libOpenEXRCore-3_4-33-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029918" comment="libOpenEXRCore-3_4-33-x86-64-v3-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029919" comment="libOpenEXRUtil-3_4-33-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029920" comment="libOpenEXRUtil-3_4-33-32bit-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029921" comment="libOpenEXRUtil-3_4-33-x86-64-v3-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029922" comment="openexr-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029923" comment="openexr-devel-3.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029924" comment="openexr-doc-3.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254063" version="1" class="patch">
	<metadata>
		<title>python312-3.12.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-18"/>
	<updated date="2025-11-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029925" comment="python312-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029926" comment="python312-32bit-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029927" comment="python312-curses-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029928" comment="python312-dbm-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029929" comment="python312-idle-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029930" comment="python312-tk-3.12.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029931" comment="python312-x86-64-v3-3.12.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254064" version="1" class="patch">
	<metadata>
		<title>sbctl-0.18-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the sbctl-0.18-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-18"/>
	<updated date="2025-11-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029932" comment="sbctl-0.18-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254065" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.3.3270.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.3.3270.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030033" comment="amazon-ssm-agent-3.3.3270.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254066" version="1" class="patch">
	<metadata>
		<title>chromedriver-142.0.7444.175-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13223" ref_url="https://www.suse.com/security/cve/CVE-2025-13223/" source="CVE"/>
		<reference ref_id="CVE-2025-13224" ref_url="https://www.suse.com/security/cve/CVE-2025-13224/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-142.0.7444.175-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13223/">CVE-2025-13223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13223">CVE-2025-13223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13224/">CVE-2025-13224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13224">CVE-2025-13224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030034" comment="chromedriver-142.0.7444.175-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030035" comment="chromium-142.0.7444.175-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254067" version="1" class="patch">
	<metadata>
		<title>libvirt-11.9.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12748" ref_url="https://www.suse.com/security/cve/CVE-2025-12748/" source="CVE"/>
		<reference ref_id="CVE-2025-13193" ref_url="https://www.suse.com/security/cve/CVE-2025-13193/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-11.9.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12748/">CVE-2025-12748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12748">CVE-2025-12748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13193/">CVE-2025-13193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13193">CVE-2025-13193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030036" comment="libvirt-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030037" comment="libvirt-client-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030038" comment="libvirt-client-qemu-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030039" comment="libvirt-daemon-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030040" comment="libvirt-daemon-common-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030041" comment="libvirt-daemon-config-network-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030042" comment="libvirt-daemon-config-nwfilter-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030043" comment="libvirt-daemon-driver-libxl-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030044" comment="libvirt-daemon-driver-lxc-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030045" comment="libvirt-daemon-driver-network-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030046" comment="libvirt-daemon-driver-nodedev-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030047" comment="libvirt-daemon-driver-nwfilter-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030048" comment="libvirt-daemon-driver-qemu-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030049" comment="libvirt-daemon-driver-secret-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030050" comment="libvirt-daemon-driver-storage-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030051" comment="libvirt-daemon-driver-storage-core-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030052" comment="libvirt-daemon-driver-storage-disk-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030053" comment="libvirt-daemon-driver-storage-gluster-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030054" comment="libvirt-daemon-driver-storage-iscsi-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030055" comment="libvirt-daemon-driver-storage-iscsi-direct-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030056" comment="libvirt-daemon-driver-storage-logical-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030057" comment="libvirt-daemon-driver-storage-mpath-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030058" comment="libvirt-daemon-driver-storage-rbd-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030059" comment="libvirt-daemon-driver-storage-scsi-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030060" comment="libvirt-daemon-hooks-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030061" comment="libvirt-daemon-lock-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030062" comment="libvirt-daemon-log-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030063" comment="libvirt-daemon-lxc-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030064" comment="libvirt-daemon-plugin-lockd-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030065" comment="libvirt-daemon-plugin-sanlock-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030066" comment="libvirt-daemon-proxy-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030067" comment="libvirt-daemon-qemu-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030068" comment="libvirt-daemon-xen-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030069" comment="libvirt-devel-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030070" comment="libvirt-doc-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030071" comment="libvirt-libs-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030072" comment="libvirt-nss-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030073" comment="libvirt-ssh-proxy-11.9.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030074" comment="wireshark-plugin-libvirt-11.9.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254068" version="1" class="patch">
	<metadata>
		<title>libeverest-3.6.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54764" ref_url="https://www.suse.com/security/cve/CVE-2025-54764/" source="CVE"/>
		<reference ref_id="CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438/" source="CVE"/>
		<description>
These are all security issues fixed in the libeverest-3.6.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54764/">CVE-2025-54764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54764">CVE-2025-54764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030075" comment="libeverest-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030076" comment="libeverest-x86-64-v3-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030077" comment="libmbedcrypto16-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030078" comment="libmbedcrypto16-x86-64-v3-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030079" comment="libmbedtls21-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030080" comment="libmbedtls21-x86-64-v3-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030081" comment="libmbedx509-7-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030082" comment="libmbedx509-7-x86-64-v3-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030083" comment="libp256m-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030084" comment="libp256m-x86-64-v3-3.6.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030085" comment="mbedtls-devel-3.6.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254069" version="1" class="patch">
	<metadata>
		<title>python314-3.14.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030086" comment="python314-3.14.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030087" comment="python314-curses-3.14.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030088" comment="python314-dbm-3.14.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030089" comment="python314-idle-3.14.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030090" comment="python314-tk-3.14.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030091" comment="python314-x86-64-v3-3.14.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254070" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-67.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54770" ref_url="https://www.suse.com/security/cve/CVE-2025-54770/" source="CVE"/>
		<reference ref_id="CVE-2025-54771" ref_url="https://www.suse.com/security/cve/CVE-2025-54771/" source="CVE"/>
		<reference ref_id="CVE-2025-61661" ref_url="https://www.suse.com/security/cve/CVE-2025-61661/" source="CVE"/>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<reference ref_id="CVE-2025-61663" ref_url="https://www.suse.com/security/cve/CVE-2025-61663/" source="CVE"/>
		<reference ref_id="CVE-2025-61664" ref_url="https://www.suse.com/security/cve/CVE-2025-61664/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-67.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54770/">CVE-2025-54770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54770">CVE-2025-54770 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54771/">CVE-2025-54771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54771">CVE-2025-54771 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61661/">CVE-2025-61661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61661">CVE-2025-61661 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61663/">CVE-2025-61663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61663">CVE-2025-61663 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61664/">CVE-2025-61664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61664">CVE-2025-61664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030110" comment="grub2-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030111" comment="grub2-branding-upstream-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030112" comment="grub2-common-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030113" comment="grub2-i386-efi-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030114" comment="grub2-i386-efi-bls-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030115" comment="grub2-i386-efi-debug-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030116" comment="grub2-i386-efi-extras-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030117" comment="grub2-i386-pc-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030118" comment="grub2-i386-pc-debug-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030119" comment="grub2-i386-pc-extras-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030120" comment="grub2-i386-xen-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030121" comment="grub2-i386-xen-debug-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030122" comment="grub2-i386-xen-extras-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030123" comment="grub2-snapper-plugin-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030124" comment="grub2-systemd-sleep-plugin-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030125" comment="grub2-x86_64-efi-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030126" comment="grub2-x86_64-efi-bls-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030127" comment="grub2-x86_64-efi-debug-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030128" comment="grub2-x86_64-efi-extras-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030129" comment="grub2-x86_64-xen-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030130" comment="grub2-x86_64-xen-debug-2.12-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030131" comment="grub2-x86_64-xen-extras-2.12-67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254071" version="1" class="patch">
	<metadata>
		<title>python313-3.13.9-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.9-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030132" comment="python313-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030133" comment="python313-32bit-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030134" comment="python313-curses-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030135" comment="python313-dbm-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030136" comment="python313-idle-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030137" comment="python313-tk-3.13.9-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030138" comment="python313-x86-64-v3-3.13.9-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254072" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-2.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-2.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030139" comment="libipa_hbac-devel-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030140" comment="libipa_hbac0-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030141" comment="libnfsidmap-sss-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030142" comment="libsss_certmap-devel-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030143" comment="libsss_certmap0-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030144" comment="libsss_idmap-devel-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030145" comment="libsss_idmap0-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030146" comment="libsss_nss_idmap-devel-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030147" comment="libsss_nss_idmap0-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030148" comment="python3-ipa_hbac-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030149" comment="python3-sss-murmur-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030150" comment="python3-sss_nss_idmap-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030151" comment="python3-sssd-config-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030152" comment="sssd-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030153" comment="sssd-ad-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030154" comment="sssd-cifs-idmap-plugin-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030155" comment="sssd-dbus-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030156" comment="sssd-ipa-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030157" comment="sssd-kcm-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030158" comment="sssd-krb5-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030159" comment="sssd-krb5-common-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030160" comment="sssd-ldap-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030161" comment="sssd-proxy-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030162" comment="sssd-tools-2.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030163" comment="sssd-winbind-idmap-2.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254073" version="1" class="patch">
	<metadata>
		<title>act-0.2.82-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
These are all security issues fixed in the act-0.2.82-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030619" comment="act-0.2.82-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254074" version="1" class="patch">
	<metadata>
		<title>ansible-12-12.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-12-12.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030620" comment="ansible-12-12.2.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254075" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.19-2.19.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.19-2.19.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030621" comment="ansible-core-2.19-2.19.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030622" comment="ansible-test-2.19-2.19.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254076" version="1" class="patch">
	<metadata>
		<title>blender-4.5-4.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0544" ref_url="https://www.suse.com/security/cve/CVE-2022-0544/" source="CVE"/>
		<reference ref_id="CVE-2022-0545" ref_url="https://www.suse.com/security/cve/CVE-2022-0545/" source="CVE"/>
		<reference ref_id="CVE-2022-0546" ref_url="https://www.suse.com/security/cve/CVE-2022-0546/" source="CVE"/>
		<description>
These are all security issues fixed in the blender-4.5-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0544/">CVE-2022-0544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0544">CVE-2022-0544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0545/">CVE-2022-0545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0545">CVE-2022-0545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0546/">CVE-2022-0546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0546">CVE-2022-0546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030623" comment="blender-4.5-4.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030624" comment="blender-4.5-demo-4.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030625" comment="blender-4.5-lang-4.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254077" version="1" class="patch">
	<metadata>
		<title>blender-5.0-5.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-0544" ref_url="https://www.suse.com/security/cve/CVE-2022-0544/" source="CVE"/>
		<reference ref_id="CVE-2022-0545" ref_url="https://www.suse.com/security/cve/CVE-2022-0545/" source="CVE"/>
		<reference ref_id="CVE-2022-0546" ref_url="https://www.suse.com/security/cve/CVE-2022-0546/" source="CVE"/>
		<description>
These are all security issues fixed in the blender-5.0-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0544/">CVE-2022-0544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0544">CVE-2022-0544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0545/">CVE-2022-0545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0545">CVE-2022-0545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0546/">CVE-2022-0546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0546">CVE-2022-0546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030626" comment="blender-5.0-5.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030627" comment="blender-5.0-demo-5.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030628" comment="blender-5.0-lang-5.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254078" version="1" class="patch">
	<metadata>
		<title>curl-8.17.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10966" ref_url="https://www.suse.com/security/cve/CVE-2025-10966/" source="CVE"/>
		<reference ref_id="CVE-2025-11563" ref_url="https://www.suse.com/security/cve/CVE-2025-11563/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.17.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10966/">CVE-2025-10966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10966">CVE-2025-10966 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11563/">CVE-2025-11563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11563">CVE-2025-11563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030629" comment="curl-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030630" comment="curl-fish-completion-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030631" comment="curl-zsh-completion-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030632" comment="libcurl-devel-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030633" comment="libcurl-devel-32bit-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030634" comment="libcurl-devel-doc-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030635" comment="libcurl4-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030636" comment="libcurl4-32bit-8.17.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030637" comment="wcurl-8.17.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254079" version="1" class="patch">
	<metadata>
		<title>fontforge-20251009-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50949" ref_url="https://www.suse.com/security/cve/CVE-2025-50949/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20251009-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50949/">CVE-2025-50949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50949">CVE-2025-50949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031396" comment="fontforge-20251009-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031397" comment="fontforge-devel-20251009-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031398" comment="fontforge-doc-20251009-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254080" version="1" class="patch">
	<metadata>
		<title>libIex-3_4-33-3.4.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12495" ref_url="https://www.suse.com/security/cve/CVE-2025-12495/" source="CVE"/>
		<reference ref_id="CVE-2025-12839" ref_url="https://www.suse.com/security/cve/CVE-2025-12839/" source="CVE"/>
		<reference ref_id="CVE-2025-12840" ref_url="https://www.suse.com/security/cve/CVE-2025-12840/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_4-33-3.4.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12495/">CVE-2025-12495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12495">CVE-2025-12495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12839/">CVE-2025-12839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12839">CVE-2025-12839 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12840/">CVE-2025-12840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12840">CVE-2025-12840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031399" comment="libIex-3_4-33-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031400" comment="libIex-3_4-33-32bit-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031401" comment="libIex-3_4-33-x86-64-v3-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031402" comment="libIlmThread-3_4-33-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031403" comment="libIlmThread-3_4-33-32bit-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031404" comment="libIlmThread-3_4-33-x86-64-v3-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031405" comment="libOpenEXR-3_4-33-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031406" comment="libOpenEXR-3_4-33-32bit-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031407" comment="libOpenEXR-3_4-33-x86-64-v3-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031408" comment="libOpenEXRCore-3_4-33-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031409" comment="libOpenEXRCore-3_4-33-32bit-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031410" comment="libOpenEXRCore-3_4-33-x86-64-v3-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031411" comment="libOpenEXRUtil-3_4-33-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031412" comment="libOpenEXRUtil-3_4-33-32bit-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031413" comment="libOpenEXRUtil-3_4-33-x86-64-v3-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031414" comment="openexr-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031415" comment="openexr-devel-3.4.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031416" comment="openexr-doc-3.4.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254081" version="1" class="patch">
	<metadata>
		<title>python311-3.11.14-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.14-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031417" comment="python311-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031418" comment="python311-32bit-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031419" comment="python311-curses-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031420" comment="python311-dbm-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031421" comment="python311-idle-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031422" comment="python311-tk-3.11.14-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031423" comment="python311-x86-64-v3-3.11.14-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254082" version="1" class="patch">
	<metadata>
		<title>rclone-1.72.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.72.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031424" comment="rclone-1.72.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031425" comment="rclone-bash-completion-1.72.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031426" comment="rclone-zsh-completion-1.72.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254083" version="1" class="patch">
	<metadata>
		<title>librnp0-0.18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13402" ref_url="https://www.suse.com/security/cve/CVE-2025-13402/" source="CVE"/>
		<reference ref_id="CVE-2025-13470" ref_url="https://www.suse.com/security/cve/CVE-2025-13470/" source="CVE"/>
		<description>
These are all security issues fixed in the librnp0-0.18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13402/">CVE-2025-13402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13402">CVE-2025-13402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13470/">CVE-2025-13470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13470">CVE-2025-13470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031427" comment="librnp0-0.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031428" comment="rnp-0.18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031429" comment="rnp-devel-0.18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254084" version="1" class="patch">
	<metadata>
		<title>cloudflared-2025.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the cloudflared-2025.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031430" comment="cloudflared-2025.11.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254085" version="1" class="patch">
	<metadata>
		<title>etcd-for-k8s1.32-3.5.24-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-20329" ref_url="https://www.suse.com/security/cve/CVE-2021-20329/" source="CVE"/>
		<reference ref_id="CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339/" source="CVE"/>
		<description>
These are all security issues fixed in the etcd-for-k8s1.32-3.5.24-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20329/">CVE-2021-20329 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20329">CVE-2021-20329 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031431" comment="etcd-for-k8s1.32-3.5.24-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254086" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031432" comment="gnutls-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031433" comment="libgnutls-dane-devel-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031434" comment="libgnutls-dane0-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031435" comment="libgnutls-devel-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031436" comment="libgnutls-devel-32bit-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031437" comment="libgnutls-devel-doc-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031438" comment="libgnutls30-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031439" comment="libgnutls30-32bit-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031440" comment="libgnutlsxx-devel-3.8.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031441" comment="libgnutlsxx30-3.8.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254087" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12105" ref_url="https://www.suse.com/security/cve/CVE-2025-12105/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12105/">CVE-2025-12105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12105">CVE-2025-12105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031442" comment="libsoup-3_0-0-3.6.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031443" comment="libsoup-3_0-0-32bit-3.6.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031444" comment="libsoup-devel-3.6.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031445" comment="libsoup-devel-32bit-3.6.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031446" comment="libsoup-lang-3.6.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031447" comment="typelib-1_0-Soup-3_0-3.6.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254088" version="1" class="patch">
	<metadata>
		<title>openbao-2.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64761" ref_url="https://www.suse.com/security/cve/CVE-2025-64761/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64761/">CVE-2025-64761 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64761">CVE-2025-64761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031448" comment="openbao-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031449" comment="openbao-agent-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031450" comment="openbao-cassandra-database-plugin-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031451" comment="openbao-influxdb-database-plugin-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031452" comment="openbao-mysql-database-plugin-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031453" comment="openbao-mysql-legacy-database-plugin-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031454" comment="openbao-postgresql-database-plugin-2.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031455" comment="openbao-server-2.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254089" version="1" class="patch">
	<metadata>
		<title>python310-3.10.19-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.19-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031456" comment="python310-3.10.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031457" comment="python310-32bit-3.10.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031458" comment="python310-curses-3.10.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031459" comment="python310-dbm-3.10.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031460" comment="python310-idle-3.10.19-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031461" comment="python310-tk-3.10.19-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254090" version="1" class="patch">
	<metadata>
		<title>libwireshark19-4.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13499" ref_url="https://www.suse.com/security/cve/CVE-2025-13499/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark19-4.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13499/">CVE-2025-13499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13499">CVE-2025-13499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031462" comment="libwireshark19-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031463" comment="libwiretap16-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031464" comment="libwsutil17-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031465" comment="wireshark-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031466" comment="wireshark-devel-4.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031467" comment="wireshark-ui-qt-4.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254091" version="1" class="patch">
	<metadata>
		<title>bash-git-prompt-2.7.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61659" ref_url="https://www.suse.com/security/cve/CVE-2025-61659/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-git-prompt-2.7.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61659/">CVE-2025-61659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61659">CVE-2025-61659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031633" comment="bash-git-prompt-2.7.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254092" version="1" class="patch">
	<metadata>
		<title>git-bug-0.10.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the git-bug-0.10.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031634" comment="git-bug-0.10.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031635" comment="git-bug-bash-completion-0.10.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031636" comment="git-bug-fish-completion-0.10.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031637" comment="git-bug-zsh-completion-0.10.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254093" version="1" class="patch">
	<metadata>
		<title>kubevirt-container-disk-1.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-64433" ref_url="https://www.suse.com/security/cve/CVE-2025-64433/" source="CVE"/>
		<reference ref_id="CVE-2025-64437" ref_url="https://www.suse.com/security/cve/CVE-2025-64437/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-container-disk-1.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64433/">CVE-2025-64433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64433">CVE-2025-64433 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64437/">CVE-2025-64437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64437">CVE-2025-64437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031638" comment="kubevirt-container-disk-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031639" comment="kubevirt-manifests-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031640" comment="kubevirt-pr-helper-conf-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031641" comment="kubevirt-sidecar-shim-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031642" comment="kubevirt-tests-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031643" comment="kubevirt-virt-api-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031644" comment="kubevirt-virt-controller-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031645" comment="kubevirt-virt-exportproxy-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031646" comment="kubevirt-virt-exportserver-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031647" comment="kubevirt-virt-handler-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031648" comment="kubevirt-virt-launcher-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031649" comment="kubevirt-virt-operator-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031650" comment="kubevirt-virtctl-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031651" comment="obs-service-kubevirt_containers_meta-1.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254094" version="1" class="patch">
	<metadata>
		<title>cheat-4.4.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the cheat-4.4.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031868" comment="cheat-4.4.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254095" version="1" class="patch">
	<metadata>
		<title>netbird-0.60.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the netbird-0.60.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031869" comment="netbird-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031870" comment="netbird-applet-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031871" comment="netbird-bash-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031872" comment="netbird-fish-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031873" comment="netbird-management-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031874" comment="netbird-management-bash-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031875" comment="netbird-management-fish-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031876" comment="netbird-management-zsh-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031877" comment="netbird-relay-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031878" comment="netbird-signal-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031879" comment="netbird-signal-bash-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031880" comment="netbird-signal-fish-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031881" comment="netbird-signal-zsh-completion-0.60.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031882" comment="netbird-zsh-completion-0.60.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254096" version="1" class="patch">
	<metadata>
		<title>opa-1.11.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64756" ref_url="https://www.suse.com/security/cve/CVE-2025-64756/" source="CVE"/>
		<description>
These are all security issues fixed in the opa-1.11.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64756/">CVE-2025-64756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64756">CVE-2025-64756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031883" comment="opa-1.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031884" comment="opa-bash-completion-1.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031885" comment="opa-fish-completion-1.11.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031886" comment="opa-zsh-completion-1.11.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254097" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66019" ref_url="https://www.suse.com/security/cve/CVE-2025-66019/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66019/">CVE-2025-66019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66019">CVE-2025-66019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031887" comment="python311-pypdf-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031888" comment="python312-pypdf-6.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031889" comment="python313-pypdf-6.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254098" version="1" class="patch">
	<metadata>
		<title>python311-spotipy-2.25.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66040" ref_url="https://www.suse.com/security/cve/CVE-2025-66040/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-spotipy-2.25.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66040/">CVE-2025-66040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66040">CVE-2025-66040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031890" comment="python311-spotipy-2.25.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031891" comment="python312-spotipy-2.25.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031892" comment="python313-spotipy-2.25.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254099" version="1" class="patch">
	<metadata>
		<title>libwireshark19-4.6.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13674" ref_url="https://www.suse.com/security/cve/CVE-2025-13674/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark19-4.6.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13674/">CVE-2025-13674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13674">CVE-2025-13674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031893" comment="libwireshark19-4.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031894" comment="libwiretap16-4.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031895" comment="libwsutil17-4.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031896" comment="wireshark-4.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031897" comment="wireshark-devel-4.6.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031898" comment="wireshark-ui-qt-4.6.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254100" version="1" class="patch">
	<metadata>
		<title>helm3-3.19.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2021-21272" ref_url="https://www.suse.com/security/cve/CVE-2021-21272/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-23524" ref_url="https://www.suse.com/security/cve/CVE-2022-23524/" source="CVE"/>
		<reference ref_id="CVE-2022-23525" ref_url="https://www.suse.com/security/cve/CVE-2022-23525/" source="CVE"/>
		<reference ref_id="CVE-2022-23526" ref_url="https://www.suse.com/security/cve/CVE-2022-23526/" source="CVE"/>
		<reference ref_id="CVE-2022-36055" ref_url="https://www.suse.com/security/cve/CVE-2022-36055/" source="CVE"/>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620/" source="CVE"/>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the helm3-3.19.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21272/">CVE-2021-21272 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21272">CVE-2021-21272 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23524/">CVE-2022-23524 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23524">CVE-2022-23524 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23525/">CVE-2022-23525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23525">CVE-2022-23525 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23526/">CVE-2022-23526 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23526">CVE-2022-23526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36055/">CVE-2022-36055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36055">CVE-2022-36055 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032147" comment="helm3-3.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032148" comment="helm3-bash-completion-3.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032149" comment="helm3-fish-completion-3.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032150" comment="helm3-zsh-completion-3.19.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254101" version="1" class="patch">
	<metadata>
		<title>libcoap-devel-4.3.5a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-65493" ref_url="https://www.suse.com/security/cve/CVE-2025-65493/" source="CVE"/>
		<reference ref_id="CVE-2025-65494" ref_url="https://www.suse.com/security/cve/CVE-2025-65494/" source="CVE"/>
		<reference ref_id="CVE-2025-65495" ref_url="https://www.suse.com/security/cve/CVE-2025-65495/" source="CVE"/>
		<reference ref_id="CVE-2025-65496" ref_url="https://www.suse.com/security/cve/CVE-2025-65496/" source="CVE"/>
		<reference ref_id="CVE-2025-65497" ref_url="https://www.suse.com/security/cve/CVE-2025-65497/" source="CVE"/>
		<reference ref_id="CVE-2025-65498" ref_url="https://www.suse.com/security/cve/CVE-2025-65498/" source="CVE"/>
		<reference ref_id="CVE-2025-65499" ref_url="https://www.suse.com/security/cve/CVE-2025-65499/" source="CVE"/>
		<reference ref_id="CVE-2025-65500" ref_url="https://www.suse.com/security/cve/CVE-2025-65500/" source="CVE"/>
		<reference ref_id="CVE-2025-65501" ref_url="https://www.suse.com/security/cve/CVE-2025-65501/" source="CVE"/>
		<description>
These are all security issues fixed in the libcoap-devel-4.3.5a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65493/">CVE-2025-65493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65493">CVE-2025-65493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65494/">CVE-2025-65494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65494">CVE-2025-65494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65495/">CVE-2025-65495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65495">CVE-2025-65495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65496/">CVE-2025-65496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65496">CVE-2025-65496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65497/">CVE-2025-65497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65497">CVE-2025-65497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65498/">CVE-2025-65498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65498">CVE-2025-65498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65499/">CVE-2025-65499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65499">CVE-2025-65499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65500/">CVE-2025-65500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65500">CVE-2025-65500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65501/">CVE-2025-65501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65501">CVE-2025-65501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032151" comment="libcoap-devel-4.3.5a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032152" comment="libcoap-utils-4.3.5a-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032153" comment="libcoap3-3-4.3.5a-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254102" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.51-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505/" source="CVE"/>
		<reference ref_id="CVE-2025-64506" ref_url="https://www.suse.com/security/cve/CVE-2025-64506/" source="CVE"/>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.51-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64506/">CVE-2025-64506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64506">CVE-2025-64506 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032154" comment="libpng16-16-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032155" comment="libpng16-16-32bit-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032156" comment="libpng16-16-x86-64-v3-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032157" comment="libpng16-compat-devel-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032158" comment="libpng16-compat-devel-32bit-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032159" comment="libpng16-compat-devel-x86-64-v3-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032160" comment="libpng16-devel-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032161" comment="libpng16-devel-32bit-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032162" comment="libpng16-devel-x86-64-v3-1.6.51-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032163" comment="libpng16-tools-1.6.51-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254103" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032164" comment="postgresql13-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032165" comment="postgresql13-contrib-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032166" comment="postgresql13-devel-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032167" comment="postgresql13-docs-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032168" comment="postgresql13-llvmjit-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032169" comment="postgresql13-llvmjit-devel-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032170" comment="postgresql13-plperl-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032171" comment="postgresql13-plpython-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032172" comment="postgresql13-pltcl-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032173" comment="postgresql13-server-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032174" comment="postgresql13-server-devel-13.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032175" comment="postgresql13-test-13.23-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254104" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.20-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.20-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032176" comment="postgresql14-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032177" comment="postgresql14-contrib-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032178" comment="postgresql14-devel-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032179" comment="postgresql14-docs-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032180" comment="postgresql14-llvmjit-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032181" comment="postgresql14-llvmjit-devel-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032182" comment="postgresql14-plperl-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032183" comment="postgresql14-plpython-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032184" comment="postgresql14-pltcl-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032185" comment="postgresql14-server-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032186" comment="postgresql14-server-devel-14.20-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032187" comment="postgresql14-test-14.20-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254105" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032188" comment="postgresql15-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032189" comment="postgresql15-contrib-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032190" comment="postgresql15-devel-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032191" comment="postgresql15-docs-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032192" comment="postgresql15-llvmjit-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032193" comment="postgresql15-llvmjit-devel-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032194" comment="postgresql15-plperl-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032195" comment="postgresql15-plpython-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032196" comment="postgresql15-pltcl-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032197" comment="postgresql15-server-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032198" comment="postgresql15-server-devel-15.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032199" comment="postgresql15-test-15.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254106" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032200" comment="postgresql16-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032201" comment="postgresql16-contrib-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032202" comment="postgresql16-devel-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032203" comment="postgresql16-docs-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032204" comment="postgresql16-llvmjit-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032205" comment="postgresql16-llvmjit-devel-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032206" comment="postgresql16-plperl-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032207" comment="postgresql16-plpython-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032208" comment="postgresql16-pltcl-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032209" comment="postgresql16-server-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032210" comment="postgresql16-server-devel-16.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032211" comment="postgresql16-test-16.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254107" version="1" class="patch">
	<metadata>
		<title>postgresql17-17.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql17-17.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032212" comment="postgresql17-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032213" comment="postgresql17-contrib-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032214" comment="postgresql17-devel-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032215" comment="postgresql17-docs-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032216" comment="postgresql17-llvmjit-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032217" comment="postgresql17-llvmjit-devel-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032218" comment="postgresql17-plperl-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032219" comment="postgresql17-plpython-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032220" comment="postgresql17-pltcl-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032221" comment="postgresql17-server-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032222" comment="postgresql17-server-devel-17.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032223" comment="postgresql17-test-17.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254108" version="1" class="patch">
	<metadata>
		<title>python311-salt-3006.0-52.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62348" ref_url="https://www.suse.com/security/cve/CVE-2025-62348/" source="CVE"/>
		<reference ref_id="CVE-2025-62349" ref_url="https://www.suse.com/security/cve/CVE-2025-62349/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-salt-3006.0-52.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62348/">CVE-2025-62348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62348">CVE-2025-62348 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62349/">CVE-2025-62349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62349">CVE-2025-62349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032224" comment="python311-salt-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032225" comment="python312-salt-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032226" comment="python313-salt-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032227" comment="salt-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032228" comment="salt-api-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032229" comment="salt-bash-completion-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032230" comment="salt-cloud-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032231" comment="salt-doc-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032232" comment="salt-fish-completion-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032233" comment="salt-master-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032234" comment="salt-minion-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032235" comment="salt-proxy-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032236" comment="salt-ssh-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032237" comment="salt-standalone-formulas-configuration-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032238" comment="salt-syndic-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032239" comment="salt-transactional-update-3006.0-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032240" comment="salt-zsh-completion-3006.0-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254109" version="1" class="patch">
	<metadata>
		<title>lightdm-kde-greeter-6.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62876" ref_url="https://www.suse.com/security/cve/CVE-2025-62876/" source="CVE"/>
		<description>
These are all security issues fixed in the lightdm-kde-greeter-6.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62876/">CVE-2025-62876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62876">CVE-2025-62876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032364" comment="lightdm-kde-greeter-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032365" comment="lightdm-kde-greeter-branding-upstream-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032366" comment="lightdm-kde-greeter-lang-6.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254110" version="1" class="patch">
	<metadata>
		<title>libecpg6-18.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-18.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032367" comment="libecpg6-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032368" comment="libecpg6-32bit-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032369" comment="libpq5-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032370" comment="libpq5-32bit-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032371" comment="postgresql18-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032372" comment="postgresql18-contrib-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032373" comment="postgresql18-devel-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032374" comment="postgresql18-docs-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032375" comment="postgresql18-llvmjit-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032376" comment="postgresql18-llvmjit-devel-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032377" comment="postgresql18-plperl-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032378" comment="postgresql18-plpython-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032379" comment="postgresql18-pltcl-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032380" comment="postgresql18-server-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032381" comment="postgresql18-server-devel-18.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032382" comment="postgresql18-test-18.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254111" version="1" class="patch">
	<metadata>
		<title>python-mistralclient-doc-6.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-4472" ref_url="https://www.suse.com/security/cve/CVE-2021-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the python-mistralclient-doc-6.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4472/">CVE-2021-4472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-4472">CVE-2021-4472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032383" comment="python-mistralclient-doc-6.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032384" comment="python313-mistralclient-6.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254112" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032385" comment="python315-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032386" comment="python315-curses-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032387" comment="python315-dbm-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032388" comment="python315-idle-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032389" comment="python315-profiling-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032390" comment="python315-tk-3.15.0~a1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032391" comment="python315-x86-64-v3-3.15.0~a1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254113" version="1" class="patch">
	<metadata>
		<title>python39-3.9.24-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.24-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-01"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032392" comment="python39-3.9.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032393" comment="python39-curses-3.9.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032394" comment="python39-dbm-3.9.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032395" comment="python39-idle-3.9.24-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032396" comment="python39-tk-3.9.24-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254114" version="1" class="patch">
	<metadata>
		<title>gegl-0.4.64-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10921" ref_url="https://www.suse.com/security/cve/CVE-2025-10921/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0.4.64-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10921/">CVE-2025-10921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10921">CVE-2025-10921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032411" comment="gegl-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032412" comment="gegl-0_4-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032413" comment="gegl-0_4-lang-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032414" comment="gegl-devel-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032415" comment="gegl-doc-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032416" comment="libgegl-0_4-0-0.4.64-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032417" comment="typelib-1_0-Gegl-0_4-0.4.64-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254115" version="1" class="patch">
	<metadata>
		<title>chromedriver-143.0.7499.40-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13630" ref_url="https://www.suse.com/security/cve/CVE-2025-13630/" source="CVE"/>
		<reference ref_id="CVE-2025-13631" ref_url="https://www.suse.com/security/cve/CVE-2025-13631/" source="CVE"/>
		<reference ref_id="CVE-2025-13632" ref_url="https://www.suse.com/security/cve/CVE-2025-13632/" source="CVE"/>
		<reference ref_id="CVE-2025-13633" ref_url="https://www.suse.com/security/cve/CVE-2025-13633/" source="CVE"/>
		<reference ref_id="CVE-2025-13634" ref_url="https://www.suse.com/security/cve/CVE-2025-13634/" source="CVE"/>
		<reference ref_id="CVE-2025-13635" ref_url="https://www.suse.com/security/cve/CVE-2025-13635/" source="CVE"/>
		<reference ref_id="CVE-2025-13636" ref_url="https://www.suse.com/security/cve/CVE-2025-13636/" source="CVE"/>
		<reference ref_id="CVE-2025-13637" ref_url="https://www.suse.com/security/cve/CVE-2025-13637/" source="CVE"/>
		<reference ref_id="CVE-2025-13638" ref_url="https://www.suse.com/security/cve/CVE-2025-13638/" source="CVE"/>
		<reference ref_id="CVE-2025-13639" ref_url="https://www.suse.com/security/cve/CVE-2025-13639/" source="CVE"/>
		<reference ref_id="CVE-2025-13640" ref_url="https://www.suse.com/security/cve/CVE-2025-13640/" source="CVE"/>
		<reference ref_id="CVE-2025-13720" ref_url="https://www.suse.com/security/cve/CVE-2025-13720/" source="CVE"/>
		<reference ref_id="CVE-2025-13721" ref_url="https://www.suse.com/security/cve/CVE-2025-13721/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-143.0.7499.40-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13630/">CVE-2025-13630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13630">CVE-2025-13630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13631/">CVE-2025-13631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13631">CVE-2025-13631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13632/">CVE-2025-13632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13632">CVE-2025-13632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13633/">CVE-2025-13633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13633">CVE-2025-13633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13634/">CVE-2025-13634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13634">CVE-2025-13634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13635/">CVE-2025-13635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13635">CVE-2025-13635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13636/">CVE-2025-13636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13636">CVE-2025-13636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13637/">CVE-2025-13637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13637">CVE-2025-13637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13638/">CVE-2025-13638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13638">CVE-2025-13638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13639/">CVE-2025-13639 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13639">CVE-2025-13639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13640/">CVE-2025-13640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13640">CVE-2025-13640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13720/">CVE-2025-13720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13720">CVE-2025-13720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13721/">CVE-2025-13721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13721">CVE-2025-13721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032524" comment="chromedriver-143.0.7499.40-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032525" comment="chromium-143.0.7499.40-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254116" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032526" comment="go1.25-1.25.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032527" comment="go1.25-doc-1.25.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032528" comment="go1.25-libstd-1.25.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032529" comment="go1.25-race-1.25.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254117" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-04"/>
	<updated date="2025-12-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032530" comment="go1.24-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032531" comment="go1.24-doc-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032532" comment="go1.24-libstd-1.24.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032533" comment="go1.24-race-1.24.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254118" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.59-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.59-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-04"/>
	<updated date="2025-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032534" comment="libpng12-0-1.2.59-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032535" comment="libpng12-0-32bit-1.2.59-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032536" comment="libpng12-compat-devel-1.2.59-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032537" comment="libpng12-compat-devel-32bit-1.2.59-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032538" comment="libpng12-devel-1.2.59-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032539" comment="libpng12-devel-32bit-1.2.59-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254119" version="1" class="patch">
	<metadata>
		<title>rhino-1.7.15.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66453" ref_url="https://www.suse.com/security/cve/CVE-2025-66453/" source="CVE"/>
		<description>
These are all security issues fixed in the rhino-1.7.15.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2025-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-66453/">CVE-2025-66453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66453">CVE-2025-66453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032569" comment="rhino-1.7.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032570" comment="rhino-demo-1.7.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032571" comment="rhino-engine-1.7.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032572" comment="rhino-javadoc-1.7.15.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032573" comment="rhino-runtime-1.7.15.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254120" version="1" class="patch">
	<metadata>
		<title>libwireshark19-4.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13945" ref_url="https://www.suse.com/security/cve/CVE-2025-13945/" source="CVE"/>
		<reference ref_id="CVE-2025-13946" ref_url="https://www.suse.com/security/cve/CVE-2025-13946/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark19-4.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2025-12-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13945/">CVE-2025-13945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13945">CVE-2025-13945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13946/">CVE-2025-13946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13946">CVE-2025-13946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032574" comment="libwireshark19-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032575" comment="libwiretap16-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032576" comment="libwsutil17-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032577" comment="wireshark-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032578" comment="wireshark-devel-4.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032579" comment="wireshark-ui-qt-4.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254121" version="1" class="patch">
	<metadata>
		<title>kdeconnect-kde-25.11.90-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66270" ref_url="https://www.suse.com/security/cve/CVE-2025-66270/" source="CVE"/>
		<description>
These are all security issues fixed in the kdeconnect-kde-25.11.90-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-08"/>
	<updated date="2025-12-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66270/">CVE-2025-66270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66270">CVE-2025-66270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032625" comment="kdeconnect-kde-25.11.90-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032626" comment="kdeconnect-kde-lang-25.11.90-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254122" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.52-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.52-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-08"/>
	<updated date="2025-12-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032627" comment="libpng16-16-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032628" comment="libpng16-16-32bit-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032629" comment="libpng16-16-x86-64-v3-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032630" comment="libpng16-compat-devel-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032631" comment="libpng16-compat-devel-32bit-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032632" comment="libpng16-compat-devel-x86-64-v3-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032633" comment="libpng16-devel-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032634" comment="libpng16-devel-32bit-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032635" comment="libpng16-devel-x86-64-v3-1.6.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032636" comment="libpng16-tools-1.6.52-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254123" version="1" class="patch">
	<metadata>
		<title>corepack24-24.11.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<reference ref_id="CVE-2024-36138" ref_url="https://www.suse.com/security/cve/CVE-2024-36138/" source="CVE"/>
		<reference ref_id="CVE-2024-37372" ref_url="https://www.suse.com/security/cve/CVE-2024-37372/" source="CVE"/>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack24-24.11.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-08"/>
	<updated date="2025-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36138/">CVE-2024-36138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36138">CVE-2024-36138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37372/">CVE-2024-37372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37372">CVE-2024-37372 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032637" comment="corepack24-24.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032638" comment="nodejs24-24.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032639" comment="nodejs24-devel-24.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032640" comment="nodejs24-docs-24.11.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032641" comment="npm24-24.11.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254124" version="1" class="patch">
	<metadata>
		<title>krb5-1.22.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-57736" ref_url="https://www.suse.com/security/cve/CVE-2025-57736/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.22.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-57736/">CVE-2025-57736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57736">CVE-2025-57736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032783" comment="krb5-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032784" comment="krb5-32bit-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032785" comment="krb5-client-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032786" comment="krb5-devel-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032787" comment="krb5-devel-32bit-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032788" comment="krb5-plugin-kdb-ldap-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032789" comment="krb5-plugin-preauth-otp-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032790" comment="krb5-plugin-preauth-pkinit-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032791" comment="krb5-plugin-preauth-spake-1.22.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032792" comment="krb5-server-1.22.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254125" version="1" class="patch">
	<metadata>
		<title>nvidia-open-driver-G07-signed-check-590.44.01-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<reference ref_id="CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091/" source="CVE"/>
		<reference ref_id="CVE-2024-0131" ref_url="https://www.suse.com/security/cve/CVE-2024-0131/" source="CVE"/>
		<reference ref_id="CVE-2024-0150" ref_url="https://www.suse.com/security/cve/CVE-2024-0150/" source="CVE"/>
		<reference ref_id="CVE-2025-23277" ref_url="https://www.suse.com/security/cve/CVE-2025-23277/" source="CVE"/>
		<reference ref_id="CVE-2025-23278" ref_url="https://www.suse.com/security/cve/CVE-2025-23278/" source="CVE"/>
		<reference ref_id="CVE-2025-23279" ref_url="https://www.suse.com/security/cve/CVE-2025-23279/" source="CVE"/>
		<reference ref_id="CVE-2025-23283" ref_url="https://www.suse.com/security/cve/CVE-2025-23283/" source="CVE"/>
		<reference ref_id="CVE-2025-23286" ref_url="https://www.suse.com/security/cve/CVE-2025-23286/" source="CVE"/>
		<description>
These are all security issues fixed in the nvidia-open-driver-G07-signed-check-590.44.01-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0131/">CVE-2024-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0150/">CVE-2024-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23277/">CVE-2025-23277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23277">CVE-2025-23277 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23278/">CVE-2025-23278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23278">CVE-2025-23278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23279/">CVE-2025-23279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23279">CVE-2025-23279 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23283/">CVE-2025-23283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23283">CVE-2025-23283 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-23286/">CVE-2025-23286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23286">CVE-2025-23286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032793" comment="nvidia-open-driver-G07-signed-check-590.44.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032794" comment="nvidia-open-driver-G07-signed-default-devel-590.44.01-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032795" comment="nvidia-open-driver-G07-signed-kmp-default-590.44.01_k6.18.0_2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032796" comment="nvidia-open-driver-G07-signed-kmp-longterm-590.44.01_k6.12.61_1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032797" comment="nvidia-open-driver-G07-signed-longterm-devel-590.44.01-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254126" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13372" ref_url="https://www.suse.com/security/cve/CVE-2025-13372/" source="CVE"/>
		<reference ref_id="CVE-2025-64460" ref_url="https://www.suse.com/security/cve/CVE-2025-64460/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13372/">CVE-2025-13372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13372">CVE-2025-13372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-64460/">CVE-2025-64460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64460">CVE-2025-64460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032798" comment="python311-Django-5.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032799" comment="python312-Django-5.2.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032800" comment="python313-Django-5.2.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254127" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13372" ref_url="https://www.suse.com/security/cve/CVE-2025-13372/" source="CVE"/>
		<reference ref_id="CVE-2025-64460" ref_url="https://www.suse.com/security/cve/CVE-2025-64460/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13372/">CVE-2025-13372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13372">CVE-2025-13372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-64460/">CVE-2025-64460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64460">CVE-2025-64460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032801" comment="python311-Django4-4.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032802" comment="python312-Django4-4.2.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032803" comment="python313-Django4-4.2.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254128" version="1" class="patch">
	<metadata>
		<title>regclient-0.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the regclient-0.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032804" comment="regclient-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032805" comment="regclient-bash-completion-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032806" comment="regclient-fish-completion-0.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032807" comment="regclient-zsh-completion-0.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254129" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.66-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753/" source="CVE"/>
		<reference ref_id="CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098/" source="CVE"/>
		<reference ref_id="CVE-2025-59775" ref_url="https://www.suse.com/security/cve/CVE-2025-59775/" source="CVE"/>
		<reference ref_id="CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082/" source="CVE"/>
		<reference ref_id="CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.66-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59775/">CVE-2025-59775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59775">CVE-2025-59775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032889" comment="apache2-2.4.66-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254130" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032890" comment="firefox-esr-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032891" comment="firefox-esr-branding-upstream-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032892" comment="firefox-esr-translations-common-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032893" comment="firefox-esr-translations-other-140.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254131" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.86.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.86.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032894" comment="gio-branding-upstream-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032895" comment="glib2-devel-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032896" comment="glib2-devel-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032897" comment="glib2-devel-static-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032898" comment="glib2-lang-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032899" comment="glib2-tests-devel-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032900" comment="glib2-tools-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032901" comment="glib2-tools-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032902" comment="libgio-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032903" comment="libgio-2_0-0-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032904" comment="libgirepository-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032905" comment="libglib-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032906" comment="libglib-2_0-0-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032907" comment="libgmodule-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032908" comment="libgmodule-2_0-0-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032909" comment="libgobject-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032910" comment="libgobject-2_0-0-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032911" comment="libgthread-2_0-0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032912" comment="libgthread-2_0-0-32bit-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032913" comment="typelib-1_0-GIRepository-3_0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032914" comment="typelib-1_0-GLib-2_0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032915" comment="typelib-1_0-GLibUnix-2_0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032916" comment="typelib-1_0-GModule-2_0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032917" comment="typelib-1_0-GObject-2_0-2.86.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032918" comment="typelib-1_0-Gio-2_0-2.86.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254132" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.13.0+40-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13609" ref_url="https://www.suse.com/security/cve/CVE-2025-13609/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.13.0+40-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-13609/">CVE-2025-13609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13609">CVE-2025-13609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032919" comment="keylime-config-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032920" comment="keylime-firewalld-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032921" comment="keylime-logrotate-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032922" comment="keylime-registrar-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032923" comment="keylime-tenant-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032924" comment="keylime-tpm_cert_store-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032925" comment="keylime-verifier-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032926" comment="python311-keylime-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032927" comment="python312-keylime-7.13.0+40-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032928" comment="python313-keylime-7.13.0+40-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254133" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.09.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11896" ref_url="https://www.suse.com/security/cve/CVE-2025-11896/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.09.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11896/">CVE-2025-11896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11896">CVE-2025-11896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032929" comment="libpoppler-cpp2-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032930" comment="libpoppler-cpp2-32bit-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032931" comment="libpoppler-devel-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032932" comment="libpoppler-glib-devel-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032933" comment="libpoppler-glib8-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032934" comment="libpoppler-glib8-32bit-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032935" comment="libpoppler153-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032936" comment="libpoppler153-32bit-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032937" comment="poppler-tools-25.09.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032938" comment="typelib-1_0-Poppler-0_18-25.09.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254134" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-146.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14326" ref_url="https://www.suse.com/security/cve/CVE-2025-14326/" source="CVE"/>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14332" ref_url="https://www.suse.com/security/cve/CVE-2025-14332/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-146.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14326/">CVE-2025-14326 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14326">CVE-2025-14326 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14332/">CVE-2025-14332 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14332">CVE-2025-14332 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033197" comment="MozillaFirefox-146.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033198" comment="MozillaFirefox-branding-upstream-146.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033199" comment="MozillaFirefox-devel-146.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033200" comment="MozillaFirefox-translations-common-146.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033201" comment="MozillaFirefox-translations-other-146.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254135" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033202" comment="MozillaThunderbird-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033203" comment="MozillaThunderbird-openpgp-librnp-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033204" comment="MozillaThunderbird-translations-common-140.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033205" comment="MozillaThunderbird-translations-other-140.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254136" version="1" class="patch">
	<metadata>
		<title>xkbcomp-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<description>
These are all security issues fixed in the xkbcomp-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033206" comment="xkbcomp-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033207" comment="xkbcomp-devel-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254137" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-65955" ref_url="https://www.suse.com/security/cve/CVE-2025-65955/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65955/">CVE-2025-65955 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-65955">CVE-2025-65955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033395" comment="ImageMagick-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033396" comment="ImageMagick-config-7-SUSE-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033397" comment="ImageMagick-devel-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033398" comment="ImageMagick-devel-32bit-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033399" comment="ImageMagick-doc-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033400" comment="ImageMagick-extra-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033401" comment="libMagick++-7_Q16HDRI5-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033402" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033403" comment="libMagick++-devel-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033404" comment="libMagick++-devel-32bit-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033405" comment="libMagickCore-7_Q16HDRI10-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033406" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033407" comment="libMagickWand-7_Q16HDRI10-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033408" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033409" comment="perl-PerlMagick-7.1.2.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254138" version="1" class="patch">
	<metadata>
		<title>buildpacks-cli-0.39.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the buildpacks-cli-0.39.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033410" comment="buildpacks-cli-0.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033411" comment="buildpacks-cli-bash-completion-0.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033412" comment="buildpacks-cli-fish-completion-0.39.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033413" comment="buildpacks-cli-zsh-completion-0.39.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254139" version="1" class="patch">
	<metadata>
		<title>pgadmin4-9.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12762" ref_url="https://www.suse.com/security/cve/CVE-2025-12762/" source="CVE"/>
		<reference ref_id="CVE-2025-12763" ref_url="https://www.suse.com/security/cve/CVE-2025-12763/" source="CVE"/>
		<reference ref_id="CVE-2025-12764" ref_url="https://www.suse.com/security/cve/CVE-2025-12764/" source="CVE"/>
		<reference ref_id="CVE-2025-12765" ref_url="https://www.suse.com/security/cve/CVE-2025-12765/" source="CVE"/>
		<reference ref_id="CVE-2025-13780" ref_url="https://www.suse.com/security/cve/CVE-2025-13780/" source="CVE"/>
		<description>
These are all security issues fixed in the pgadmin4-9.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-12762/">CVE-2025-12762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12762">CVE-2025-12762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12763/">CVE-2025-12763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12763">CVE-2025-12763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12764/">CVE-2025-12764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12764">CVE-2025-12764 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12765/">CVE-2025-12765 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12765">CVE-2025-12765 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-13780/">CVE-2025-13780 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13780">CVE-2025-13780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033414" comment="pgadmin4-9.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033415" comment="pgadmin4-cloud-9.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033416" comment="pgadmin4-desktop-9.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033417" comment="pgadmin4-doc-9.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033418" comment="pgadmin4-web-uwsgi-9.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033419" comment="system-user-pgadmin-9.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254140" version="1" class="patch">
	<metadata>
		<title>libruby4_0-4_0-4.0.0~preview2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby4_0-4_0-4.0.0~preview2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033420" comment="libruby4_0-4_0-4.0.0~preview2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033421" comment="ruby4.0-4.0.0~preview2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033422" comment="ruby4.0-devel-4.0.0~preview2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033423" comment="ruby4.0-devel-extra-4.0.0~preview2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033424" comment="ruby4.0-doc-4.0.0~preview2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033425" comment="ruby4.0-doc-ri-4.0.0~preview2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254141" version="1" class="patch">
	<metadata>
		<title>chromedriver-143.0.7499.109-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14372" ref_url="https://www.suse.com/security/cve/CVE-2025-14372/" source="CVE"/>
		<reference ref_id="CVE-2025-14373" ref_url="https://www.suse.com/security/cve/CVE-2025-14373/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-143.0.7499.109-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14372/">CVE-2025-14372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14372">CVE-2025-14372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14373/">CVE-2025-14373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14373">CVE-2025-14373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033426" comment="chromedriver-143.0.7499.109-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033427" comment="chromium-143.0.7499.109-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254142" version="1" class="patch">
	<metadata>
		<title>qemu-10.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11234" ref_url="https://www.suse.com/security/cve/CVE-2025-11234/" source="CVE"/>
		<reference ref_id="CVE-2025-12464" ref_url="https://www.suse.com/security/cve/CVE-2025-12464/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11234/">CVE-2025-11234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234">CVE-2025-11234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12464/">CVE-2025-12464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12464">CVE-2025-12464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033575" comment="qemu-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033576" comment="qemu-SLOF-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033577" comment="qemu-accel-qtest-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033578" comment="qemu-arm-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033579" comment="qemu-audio-alsa-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033580" comment="qemu-audio-dbus-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033581" comment="qemu-audio-jack-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033582" comment="qemu-audio-oss-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033583" comment="qemu-audio-pa-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033584" comment="qemu-audio-pipewire-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033585" comment="qemu-audio-spice-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033586" comment="qemu-block-curl-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033587" comment="qemu-block-dmg-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033588" comment="qemu-block-iscsi-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033589" comment="qemu-block-nfs-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033590" comment="qemu-block-rbd-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033591" comment="qemu-block-ssh-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033592" comment="qemu-chardev-baum-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033593" comment="qemu-chardev-spice-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033594" comment="qemu-doc-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033595" comment="qemu-extra-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033596" comment="qemu-guest-agent-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033597" comment="qemu-headless-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033598" comment="qemu-hw-display-qxl-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033599" comment="qemu-hw-display-virtio-gpu-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033600" comment="qemu-hw-display-virtio-gpu-pci-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033601" comment="qemu-hw-display-virtio-vga-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033602" comment="qemu-hw-s390x-virtio-gpu-ccw-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033603" comment="qemu-hw-usb-host-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033604" comment="qemu-hw-usb-redirect-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033605" comment="qemu-hw-usb-smartcard-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033606" comment="qemu-img-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033607" comment="qemu-ipxe-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033608" comment="qemu-ivshmem-tools-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033609" comment="qemu-ksm-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033610" comment="qemu-lang-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033611" comment="qemu-microvm-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033612" comment="qemu-ppc-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033613" comment="qemu-pr-helper-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033614" comment="qemu-s390x-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033615" comment="qemu-seabios-10.1.31.17.0_2_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033616" comment="qemu-skiboot-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033617" comment="qemu-spice-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033618" comment="qemu-tools-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033619" comment="qemu-ui-curses-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033620" comment="qemu-ui-dbus-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033621" comment="qemu-ui-gtk-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033622" comment="qemu-ui-opengl-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033623" comment="qemu-ui-spice-app-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033624" comment="qemu-ui-spice-core-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033625" comment="qemu-vgabios-10.1.31.17.0_2_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033626" comment="qemu-vhost-user-gpu-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033627" comment="qemu-vmsr-helper-10.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033628" comment="qemu-x86-10.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254143" version="1" class="patch">
	<metadata>
		<title>strongswan-6.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9615" ref_url="https://www.suse.com/security/cve/CVE-2025-9615/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-6.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9615/">CVE-2025-9615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9615">CVE-2025-9615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033629" comment="strongswan-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033630" comment="strongswan-doc-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033631" comment="strongswan-fips-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033632" comment="strongswan-ipsec-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033633" comment="strongswan-mysql-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033634" comment="strongswan-nm-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033635" comment="strongswan-sqlite-6.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254144" version="1" class="patch">
	<metadata>
		<title>clair-4.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the clair-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2025-12-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034196" comment="clair-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034197" comment="clairctl-4.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254145" version="1" class="patch">
	<metadata>
		<title>netty-4.1.130-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67735" ref_url="https://www.suse.com/security/cve/CVE-2025-67735/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.130-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2025-12-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67735/">CVE-2025-67735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034198" comment="netty-4.1.130-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034199" comment="netty-bom-4.1.130-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034200" comment="netty-javadoc-4.1.130-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034201" comment="netty-parent-4.1.130-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254146" version="1" class="patch">
	<metadata>
		<title>coredns-for-k8s1.33-1.12.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-for-k8s1.33-1.12.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034564" comment="coredns-for-k8s1.33-1.12.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034565" comment="coredns-for-k8s1.33-extras-1.12.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254147" version="1" class="patch">
	<metadata>
		<title>coredns-for-k8s1.34-1.12.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-for-k8s1.34-1.12.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034566" comment="coredns-for-k8s1.34-1.12.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034567" comment="coredns-for-k8s1.34-extras-1.12.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254148" version="1" class="patch">
	<metadata>
		<title>rsync-3.4.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10158" ref_url="https://www.suse.com/security/cve/CVE-2025-10158/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.4.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-10158/">CVE-2025-10158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10158">CVE-2025-10158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034568" comment="rsync-3.4.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254149" version="1" class="patch">
	<metadata>
		<title>libruby3_4-3_4-3.4.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58767" ref_url="https://www.suse.com/security/cve/CVE-2025-58767/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_4-3_4-3.4.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58767/">CVE-2025-58767 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034569" comment="libruby3_4-3_4-3.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034570" comment="ruby3.4-3.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034571" comment="ruby3.4-devel-3.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034572" comment="ruby3.4-devel-extra-3.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034573" comment="ruby3.4-doc-3.4.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034574" comment="ruby3.4-doc-ri-3.4.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254150" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66628" ref_url="https://www.suse.com/security/cve/CVE-2025-66628/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66628/">CVE-2025-66628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66628">CVE-2025-66628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034658" comment="ImageMagick-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034659" comment="ImageMagick-config-7-SUSE-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034660" comment="ImageMagick-devel-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034661" comment="ImageMagick-devel-32bit-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034662" comment="ImageMagick-doc-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034663" comment="ImageMagick-extra-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034664" comment="libMagick++-7_Q16HDRI5-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034665" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034666" comment="libMagick++-devel-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034667" comment="libMagick++-devel-32bit-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034668" comment="libMagickCore-7_Q16HDRI10-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034669" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034670" comment="libMagickWand-7_Q16HDRI10-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034671" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.10-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034672" comment="perl-PerlMagick-7.1.2.10-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254151" version="1" class="patch">
	<metadata>
		<title>alloy-1.12.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.12.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034673" comment="alloy-1.12.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254152" version="1" class="patch">
	<metadata>
		<title>chromedriver-143.0.7499.146-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174/" source="CVE"/>
		<reference ref_id="CVE-2025-14765" ref_url="https://www.suse.com/security/cve/CVE-2025-14765/" source="CVE"/>
		<reference ref_id="CVE-2025-14766" ref_url="https://www.suse.com/security/cve/CVE-2025-14766/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-143.0.7499.146-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14765/">CVE-2025-14765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14765">CVE-2025-14765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14766/">CVE-2025-14766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14766">CVE-2025-14766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034674" comment="chromedriver-143.0.7499.146-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034675" comment="chromium-143.0.7499.146-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254153" version="1" class="patch">
	<metadata>
		<title>coredns-for-k8s1.35-1.13.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-for-k8s1.35-1.13.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034676" comment="coredns-for-k8s1.35-1.13.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034677" comment="coredns-for-k8s1.35-extras-1.13.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254154" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-146.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14860" ref_url="https://www.suse.com/security/cve/CVE-2025-14860/" source="CVE"/>
		<reference ref_id="CVE-2025-14861" ref_url="https://www.suse.com/security/cve/CVE-2025-14861/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-146.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14860/">CVE-2025-14860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14860">CVE-2025-14860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14861/">CVE-2025-14861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14861">CVE-2025-14861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034678" comment="MozillaFirefox-146.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034679" comment="MozillaFirefox-branding-upstream-146.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034680" comment="MozillaFirefox-devel-146.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034681" comment="MozillaFirefox-translations-common-146.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034682" comment="MozillaFirefox-translations-other-146.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254155" version="1" class="patch">
	<metadata>
		<title>busybox-1.37.0-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46394" ref_url="https://www.suse.com/security/cve/CVE-2025-46394/" source="CVE"/>
		<reference ref_id="CVE-2025-60876" ref_url="https://www.suse.com/security/cve/CVE-2025-60876/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.37.0-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46394/">CVE-2025-46394 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46394">CVE-2025-46394 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-60876/">CVE-2025-60876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-60876">CVE-2025-60876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034683" comment="busybox-1.37.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034684" comment="busybox-static-1.37.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034685" comment="busybox-testsuite-1.37.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034686" comment="busybox-warewulf3-1.37.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254156" version="1" class="patch">
	<metadata>
		<title>duc-1.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13654" ref_url="https://www.suse.com/security/cve/CVE-2025-13654/" source="CVE"/>
		<description>
These are all security issues fixed in the duc-1.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13654/">CVE-2025-13654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13654">CVE-2025-13654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034687" comment="duc-1.4.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254157" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254/" source="CVE"/>
		<reference ref_id="CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255/" source="CVE"/>
		<reference ref_id="CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256/" source="CVE"/>
		<reference ref_id="CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257/" source="CVE"/>
		<reference ref_id="CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258/" source="CVE"/>
		<reference ref_id="CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259/" source="CVE"/>
		<reference ref_id="CVE-2025-68260" ref_url="https://www.suse.com/security/cve/CVE-2025-68260/" source="CVE"/>
		<reference ref_id="CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261/" source="CVE"/>
		<reference ref_id="CVE-2025-68262" ref_url="https://www.suse.com/security/cve/CVE-2025-68262/" source="CVE"/>
		<reference ref_id="CVE-2025-68263" ref_url="https://www.suse.com/security/cve/CVE-2025-68263/" source="CVE"/>
		<reference ref_id="CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264/" source="CVE"/>
		<reference ref_id="CVE-2025-68323" ref_url="https://www.suse.com/security/cve/CVE-2025-68323/" source="CVE"/>
		<reference ref_id="CVE-2025-68324" ref_url="https://www.suse.com/security/cve/CVE-2025-68324/" source="CVE"/>
		<reference ref_id="CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68260/">CVE-2025-68260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68260">CVE-2025-68260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68262/">CVE-2025-68262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68262">CVE-2025-68262 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68263/">CVE-2025-68263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68263">CVE-2025-68263 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68323/">CVE-2025-68323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68323">CVE-2025-68323 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68324/">CVE-2025-68324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68324">CVE-2025-68324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034689" comment="kernel-macros-6.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034690" comment="kernel-source-6.18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034691" comment="kernel-source-vanilla-6.18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254158" version="1" class="patch">
	<metadata>
		<title>php8-8.4.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-8.4.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034692" comment="php8-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034693" comment="php8-bcmath-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034694" comment="php8-bz2-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034695" comment="php8-calendar-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034696" comment="php8-cli-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034697" comment="php8-ctype-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034698" comment="php8-curl-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034699" comment="php8-dba-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034700" comment="php8-devel-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034701" comment="php8-dom-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034702" comment="php8-enchant-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034703" comment="php8-exif-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034704" comment="php8-ffi-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034705" comment="php8-fileinfo-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034706" comment="php8-ftp-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034707" comment="php8-gd-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034708" comment="php8-gettext-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034709" comment="php8-gmp-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034710" comment="php8-iconv-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034711" comment="php8-intl-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034712" comment="php8-ldap-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034713" comment="php8-mbstring-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034714" comment="php8-mysql-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034715" comment="php8-odbc-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034716" comment="php8-opcache-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034717" comment="php8-openssl-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034718" comment="php8-pcntl-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034719" comment="php8-pdo-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034720" comment="php8-pgsql-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034721" comment="php8-phar-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034722" comment="php8-posix-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034723" comment="php8-readline-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034724" comment="php8-shmop-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034725" comment="php8-snmp-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034726" comment="php8-soap-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034727" comment="php8-sockets-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034728" comment="php8-sodium-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034729" comment="php8-sqlite-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034730" comment="php8-sysvmsg-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034731" comment="php8-sysvsem-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034732" comment="php8-sysvshm-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034733" comment="php8-tidy-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034734" comment="php8-tokenizer-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034735" comment="php8-xmlreader-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034736" comment="php8-xmlwriter-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034737" comment="php8-xsl-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034738" comment="php8-zip-8.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034739" comment="php8-zlib-8.4.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254159" version="1" class="patch">
	<metadata>
		<title>python311-tornado6-6.5.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724/" source="CVE"/>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-tornado6-6.5.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034740" comment="python311-tornado6-6.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034741" comment="python312-tornado6-6.5.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034742" comment="python313-tornado6-6.5.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254160" version="1" class="patch">
	<metadata>
		<title>python310-3.10.19-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.19-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034921" comment="python310-3.10.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034922" comment="python310-32bit-3.10.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034923" comment="python310-curses-3.10.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034924" comment="python310-dbm-3.10.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034925" comment="python310-idle-3.10.19-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034926" comment="python310-tk-3.10.19-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254161" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034927" comment="python315-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034928" comment="python315-curses-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034929" comment="python315-dbm-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034930" comment="python315-idle-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034931" comment="python315-profiling-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034932" comment="python315-tk-3.15.0~a3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034933" comment="python315-x86-64-v3-3.15.0~a3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254162" version="1" class="patch">
	<metadata>
		<title>zk-0.15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the zk-0.15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034934" comment="zk-0.15.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254163" version="1" class="patch">
	<metadata>
		<title>libnbd-1.24.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14946" ref_url="https://www.suse.com/security/cve/CVE-2025-14946/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.24.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2025-12-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-14946/">CVE-2025-14946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14946">CVE-2025-14946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035154" comment="libnbd-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035155" comment="libnbd-bash-completion-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035156" comment="libnbd-devel-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035157" comment="libnbd0-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035158" comment="nbdfuse-1.24.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035159" comment="python3-libnbd-1.24.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254164" version="1" class="patch">
	<metadata>
		<title>buildah-1.42.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.42.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2025-12-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035257" comment="buildah-1.42.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254165" version="1" class="patch">
	<metadata>
		<title>cpp-httplib-devel-0.28.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66570" ref_url="https://www.suse.com/security/cve/CVE-2025-66570/" source="CVE"/>
		<reference ref_id="CVE-2025-66577" ref_url="https://www.suse.com/security/cve/CVE-2025-66577/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp-httplib-devel-0.28.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2025-12-24"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66570/">CVE-2025-66570 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66570">CVE-2025-66570 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66577/">CVE-2025-66577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66577">CVE-2025-66577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035258" comment="cpp-httplib-devel-0.28.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035259" comment="libcpp-httplib0_28-0.28.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254166" version="1" class="patch">
	<metadata>
		<title>podman-5.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2025-12-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035260" comment="podman-5.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035261" comment="podman-docker-5.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035262" comment="podman-remote-5.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035263" comment="podmansh-5.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254167" version="1" class="patch">
	<metadata>
		<title>python39-3.9.25-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python39-3.9.25-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2025-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035264" comment="python39-3.9.25-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035265" comment="python39-curses-3.9.25-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035266" comment="python39-dbm-3.9.25-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035267" comment="python39-idle-3.9.25-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035268" comment="python39-tk-3.9.25-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254168" version="1" class="patch">
	<metadata>
		<title>anubis-1.24.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24369" ref_url="https://www.suse.com/security/cve/CVE-2025-24369/" source="CVE"/>
		<description>
These are all security issues fixed in the anubis-1.24.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-28"/>
	<updated date="2025-12-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24369/">CVE-2025-24369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24369">CVE-2025-24369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035442" comment="anubis-1.24.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254169" version="1" class="patch">
	<metadata>
		<title>python311-openapi-core-0.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66221" ref_url="https://www.suse.com/security/cve/CVE-2025-66221/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-openapi-core-0.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-28"/>
	<updated date="2025-12-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66221/">CVE-2025-66221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66221">CVE-2025-66221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035443" comment="python311-openapi-core-0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035444" comment="python312-openapi-core-0.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035445" comment="python313-openapi-core-0.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254170" version="1" class="patch">
	<metadata>
		<title>python311-3.11.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.14-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-29"/>
	<updated date="2025-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035538" comment="python311-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035539" comment="python311-32bit-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035540" comment="python311-curses-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035541" comment="python311-dbm-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035542" comment="python311-idle-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035543" comment="python311-tk-3.11.14-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035544" comment="python311-x86-64-v3-3.11.14-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254171" version="1" class="patch">
	<metadata>
		<title>python312-3.12.12-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.12-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-29"/>
	<updated date="2025-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035545" comment="python312-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035546" comment="python312-32bit-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035547" comment="python312-curses-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035548" comment="python312-dbm-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035549" comment="python312-idle-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035550" comment="python312-tk-3.12.12-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035551" comment="python312-x86-64-v3-3.12.12-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254172" version="1" class="patch">
	<metadata>
		<title>python313-3.13.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-29"/>
	<updated date="2025-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035552" comment="python313-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035553" comment="python313-32bit-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035554" comment="python313-curses-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035555" comment="python313-dbm-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035556" comment="python313-idle-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035557" comment="python313-tk-3.13.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035558" comment="python313-x86-64-v3-3.13.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254173" version="1" class="patch">
	<metadata>
		<title>trivy-0.68.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.68.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-29"/>
	<updated date="2025-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035559" comment="trivy-0.68.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254174" version="1" class="patch">
	<metadata>
		<title>weblate-5.14.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68398" ref_url="https://www.suse.com/security/cve/CVE-2025-68398/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.14.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2025-12-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-68398/">CVE-2025-68398 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68398">CVE-2025-68398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035579" comment="weblate-5.14.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254175" version="1" class="patch">
	<metadata>
		<title>kepler-0.11.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the kepler-0.11.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2025-12-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035598" comment="kepler-0.11.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254176" version="1" class="patch">
	<metadata>
		<title>gnu-recutils-1.9-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-65409" ref_url="https://www.suse.com/security/cve/CVE-2025-65409/" source="CVE"/>
		<description>
These are all security issues fixed in the gnu-recutils-1.9-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65409/">CVE-2025-65409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65409">CVE-2025-65409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035599" comment="gnu-recutils-1.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035600" comment="gnu-recutils-devel-1.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035601" comment="gnu-recutils-lang-1.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035602" comment="librec1-1.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035603" comment="readrec0-1.9-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035604" comment="testrec0-1.9-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254177" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.5.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.5.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035605" comment="dirmngr-2.5.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035606" comment="gpg2-2.5.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035607" comment="gpg2-lang-2.5.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035608" comment="gpg2-tpm-2.5.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254178" version="1" class="patch">
	<metadata>
		<title>libmatio-devel-1.5.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2337" ref_url="https://www.suse.com/security/cve/CVE-2025-2337/" source="CVE"/>
		<reference ref_id="CVE-2025-2338" ref_url="https://www.suse.com/security/cve/CVE-2025-2338/" source="CVE"/>
		<description>
These are all security issues fixed in the libmatio-devel-1.5.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2337/">CVE-2025-2337 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2337">CVE-2025-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2338/">CVE-2025-2338 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2338">CVE-2025-2338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035609" comment="libmatio-devel-1.5.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035610" comment="libmatio13-1.5.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035611" comment="matio-tools-1.5.29-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254179" version="1" class="patch">
	<metadata>
		<title>python311-marshmallow-3.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68480" ref_url="https://www.suse.com/security/cve/CVE-2025-68480/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-marshmallow-3.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68480/">CVE-2025-68480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68480">CVE-2025-68480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035676" comment="python311-marshmallow-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035677" comment="python312-marshmallow-3.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035678" comment="python313-marshmallow-3.26.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254180" version="1" class="patch">
	<metadata>
		<title>fluidsynth-2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68617" ref_url="https://www.suse.com/security/cve/CVE-2025-68617/" source="CVE"/>
		<description>
These are all security issues fixed in the fluidsynth-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-01-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-68617/">CVE-2025-68617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68617">CVE-2025-68617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035681" comment="fluidsynth-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035682" comment="fluidsynth-devel-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035683" comment="libfluidsynth3-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035684" comment="libfluidsynth3-32bit-2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254181" version="1" class="patch">
	<metadata>
		<title>python312-Django6-6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3982" ref_url="https://www.suse.com/security/cve/CVE-2015-3982/" source="CVE"/>
		<reference ref_id="CVE-2015-5145" ref_url="https://www.suse.com/security/cve/CVE-2015-5145/" source="CVE"/>
		<reference ref_id="CVE-2015-5963" ref_url="https://www.suse.com/security/cve/CVE-2015-5963/" source="CVE"/>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<reference ref_id="CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794/" source="CVE"/>
		<reference ref_id="CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233/" source="CVE"/>
		<reference ref_id="CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234/" source="CVE"/>
		<reference ref_id="CVE-2018-16984" ref_url="https://www.suse.com/security/cve/CVE-2018-16984/" source="CVE"/>
		<reference ref_id="CVE-2018-6188" ref_url="https://www.suse.com/security/cve/CVE-2018-6188/" source="CVE"/>
		<reference ref_id="CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536/" source="CVE"/>
		<reference ref_id="CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-24583" ref_url="https://www.suse.com/security/cve/CVE-2020-24583/" source="CVE"/>
		<reference ref_id="CVE-2020-24584" ref_url="https://www.suse.com/security/cve/CVE-2020-24584/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-32052" ref_url="https://www.suse.com/security/cve/CVE-2021-32052/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="CVE-2021-35042" ref_url="https://www.suse.com/security/cve/CVE-2021-35042/" source="CVE"/>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-28347" ref_url="https://www.suse.com/security/cve/CVE-2022-28347/" source="CVE"/>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<reference ref_id="CVE-2022-36359" ref_url="https://www.suse.com/security/cve/CVE-2022-36359/" source="CVE"/>
		<reference ref_id="CVE-2022-41323" ref_url="https://www.suse.com/security/cve/CVE-2022-41323/" source="CVE"/>
		<reference ref_id="CVE-2023-23969" ref_url="https://www.suse.com/security/cve/CVE-2023-23969/" source="CVE"/>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<reference ref_id="CVE-2023-31047" ref_url="https://www.suse.com/security/cve/CVE-2023-31047/" source="CVE"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="CVE-2023-41164" ref_url="https://www.suse.com/security/cve/CVE-2023-41164/" source="CVE"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<reference ref_id="CVE-2024-24680" ref_url="https://www.suse.com/security/cve/CVE-2024-24680/" source="CVE"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="CVE-2024-38875" ref_url="https://www.suse.com/security/cve/CVE-2024-38875/" source="CVE"/>
		<reference ref_id="CVE-2024-39329" ref_url="https://www.suse.com/security/cve/CVE-2024-39329/" source="CVE"/>
		<reference ref_id="CVE-2024-39330" ref_url="https://www.suse.com/security/cve/CVE-2024-39330/" source="CVE"/>
		<reference ref_id="CVE-2024-39614" ref_url="https://www.suse.com/security/cve/CVE-2024-39614/" source="CVE"/>
		<reference ref_id="CVE-2024-41989" ref_url="https://www.suse.com/security/cve/CVE-2024-41989/" source="CVE"/>
		<reference ref_id="CVE-2024-41990" ref_url="https://www.suse.com/security/cve/CVE-2024-41990/" source="CVE"/>
		<reference ref_id="CVE-2024-41991" ref_url="https://www.suse.com/security/cve/CVE-2024-41991/" source="CVE"/>
		<reference ref_id="CVE-2024-42005" ref_url="https://www.suse.com/security/cve/CVE-2024-42005/" source="CVE"/>
		<reference ref_id="CVE-2024-45230" ref_url="https://www.suse.com/security/cve/CVE-2024-45230/" source="CVE"/>
		<reference ref_id="CVE-2024-45231" ref_url="https://www.suse.com/security/cve/CVE-2024-45231/" source="CVE"/>
		<reference ref_id="CVE-2024-53907" ref_url="https://www.suse.com/security/cve/CVE-2024-53907/" source="CVE"/>
		<reference ref_id="CVE-2024-53908" ref_url="https://www.suse.com/security/cve/CVE-2024-53908/" source="CVE"/>
		<reference ref_id="CVE-2024-56374" ref_url="https://www.suse.com/security/cve/CVE-2024-56374/" source="CVE"/>
		<reference ref_id="CVE-2025-13372" ref_url="https://www.suse.com/security/cve/CVE-2025-13372/" source="CVE"/>
		<reference ref_id="CVE-2025-26699" ref_url="https://www.suse.com/security/cve/CVE-2025-26699/" source="CVE"/>
		<reference ref_id="CVE-2025-27556" ref_url="https://www.suse.com/security/cve/CVE-2025-27556/" source="CVE"/>
		<reference ref_id="CVE-2025-32873" ref_url="https://www.suse.com/security/cve/CVE-2025-32873/" source="CVE"/>
		<reference ref_id="CVE-2025-48432" ref_url="https://www.suse.com/security/cve/CVE-2025-48432/" source="CVE"/>
		<reference ref_id="CVE-2025-57833" ref_url="https://www.suse.com/security/cve/CVE-2025-57833/" source="CVE"/>
		<reference ref_id="CVE-2025-59681" ref_url="https://www.suse.com/security/cve/CVE-2025-59681/" source="CVE"/>
		<reference ref_id="CVE-2025-59682" ref_url="https://www.suse.com/security/cve/CVE-2025-59682/" source="CVE"/>
		<reference ref_id="CVE-2025-64459" ref_url="https://www.suse.com/security/cve/CVE-2025-64459/" source="CVE"/>
		<reference ref_id="CVE-2025-64460" ref_url="https://www.suse.com/security/cve/CVE-2025-64460/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-Django6-6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-01-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3982/">CVE-2015-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3982">CVE-2015-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5145/">CVE-2015-5145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5145">CVE-2015-5145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5963/">CVE-2015-5963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5963">CVE-2015-5963 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12794">CVE-2017-12794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7233">CVE-2017-7233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7234">CVE-2017-7234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16984/">CVE-2018-16984 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16984">CVE-2018-16984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6188/">CVE-2018-6188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6188">CVE-2018-6188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7536">CVE-2018-7536 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7537">CVE-2018-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19118">CVE-2019-19118 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24583/">CVE-2020-24583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24583">CVE-2020-24583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24584/">CVE-2020-24584 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24584">CVE-2020-24584 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32052/">CVE-2021-32052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32052">CVE-2021-32052 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35042/">CVE-2021-35042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35042">CVE-2021-35042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28347/">CVE-2022-28347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28347">CVE-2022-28347 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-36359/">CVE-2022-36359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36359">CVE-2022-36359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41323/">CVE-2022-41323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41323">CVE-2022-41323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23969/">CVE-2023-23969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23969">CVE-2023-23969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-31047/">CVE-2023-31047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31047">CVE-2023-31047 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41164/">CVE-2023-41164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41164">CVE-2023-41164 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24680/">CVE-2024-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24680">CVE-2024-24680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38875/">CVE-2024-38875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38875">CVE-2024-38875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39329/">CVE-2024-39329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39329">CVE-2024-39329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39330/">CVE-2024-39330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39330">CVE-2024-39330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39614/">CVE-2024-39614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39614">CVE-2024-39614 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41989/">CVE-2024-41989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41989">CVE-2024-41989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41990/">CVE-2024-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41990">CVE-2024-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41991/">CVE-2024-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41991">CVE-2024-41991 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42005/">CVE-2024-42005 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42005">CVE-2024-42005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45230/">CVE-2024-45230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45230">CVE-2024-45230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45231/">CVE-2024-45231 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45231">CVE-2024-45231 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53907/">CVE-2024-53907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53907">CVE-2024-53907 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-53908/">CVE-2024-53908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53908">CVE-2024-53908 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56374/">CVE-2024-56374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56374">CVE-2024-56374 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13372/">CVE-2025-13372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13372">CVE-2025-13372 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26699/">CVE-2025-26699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26699">CVE-2025-26699 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-27556/">CVE-2025-27556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27556">CVE-2025-27556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32873/">CVE-2025-32873 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32873">CVE-2025-32873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48432/">CVE-2025-48432 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48432">CVE-2025-48432 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-57833/">CVE-2025-57833 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57833">CVE-2025-57833 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59681/">CVE-2025-59681 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59681">CVE-2025-59681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59682/">CVE-2025-59682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59682">CVE-2025-59682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64459/">CVE-2025-64459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64459">CVE-2025-64459 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-64460/">CVE-2025-64460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64460">CVE-2025-64460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035685" comment="python312-Django6-6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035686" comment="python313-Django6-6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254182" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14607" ref_url="https://www.suse.com/security/cve/CVE-2025-14607/" source="CVE"/>
		<reference ref_id="CVE-2025-14841" ref_url="https://www.suse.com/security/cve/CVE-2025-14841/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-05"/>
	<updated date="2026-01-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14607/">CVE-2025-14607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14607">CVE-2025-14607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14841/">CVE-2025-14841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14841">CVE-2025-14841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036171" comment="dcmtk-3.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036172" comment="dcmtk-devel-3.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036173" comment="libdcmtk20-3.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254183" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.34.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62408" ref_url="https://www.suse.com/security/cve/CVE-2025-62408/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.34.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-62408/">CVE-2025-62408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62408">CVE-2025-62408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036424" comment="c-ares-devel-1.34.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036425" comment="c-ares-utils-1.34.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036426" comment="libcares2-1.34.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036427" comment="libcares2-32bit-1.34.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254184" version="1" class="patch">
	<metadata>
		<title>gpsd-3.27.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67268" ref_url="https://www.suse.com/security/cve/CVE-2025-67268/" source="CVE"/>
		<reference ref_id="CVE-2025-67269" ref_url="https://www.suse.com/security/cve/CVE-2025-67269/" source="CVE"/>
		<description>
These are all security issues fixed in the gpsd-3.27.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67268/">CVE-2025-67268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67268">CVE-2025-67268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67269/">CVE-2025-67269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67269">CVE-2025-67269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036428" comment="gpsd-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036429" comment="gpsd-clients-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036430" comment="gpsd-devel-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036431" comment="gpsd-qt6-devel-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036432" comment="libQgpsmm32-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036433" comment="libgps32-3.27.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036434" comment="python3-gpsd-3.27.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254185" version="1" class="patch">
	<metadata>
		<title>log4j-2.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68161" ref_url="https://www.suse.com/security/cve/CVE-2025-68161/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j-2.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68161/">CVE-2025-68161 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161">CVE-2025-68161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036435" comment="log4j-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036436" comment="log4j-bom-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036437" comment="log4j-javadoc-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036438" comment="log4j-jcl-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036439" comment="log4j-jmx-gui-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036440" comment="log4j-nosql-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036441" comment="log4j-slf4j-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036442" comment="log4j-taglib-2.20.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036443" comment="log4j-web-2.20.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254186" version="1" class="patch">
	<metadata>
		<title>python311-filelock-3.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68146" ref_url="https://www.suse.com/security/cve/CVE-2025-68146/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-filelock-3.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68146/">CVE-2025-68146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68146">CVE-2025-68146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036444" comment="python311-filelock-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036445" comment="python312-filelock-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036446" comment="python313-filelock-3.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254187" version="1" class="patch">
	<metadata>
		<title>python314-3.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036447" comment="python314-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036448" comment="python314-curses-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036449" comment="python314-dbm-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036450" comment="python314-idle-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036451" comment="python314-tk-3.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036452" comment="python314-x86-64-v3-3.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254188" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68618" ref_url="https://www.suse.com/security/cve/CVE-2025-68618/" source="CVE"/>
		<reference ref_id="CVE-2025-68950" ref_url="https://www.suse.com/security/cve/CVE-2025-68950/" source="CVE"/>
		<reference ref_id="CVE-2025-69204" ref_url="https://www.suse.com/security/cve/CVE-2025-69204/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68618/">CVE-2025-68618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68618">CVE-2025-68618 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68950/">CVE-2025-68950 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68950">CVE-2025-68950 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69204/">CVE-2025-69204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69204">CVE-2025-69204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036549" comment="ImageMagick-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036550" comment="ImageMagick-config-7-SUSE-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036551" comment="ImageMagick-devel-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036552" comment="ImageMagick-devel-32bit-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036553" comment="ImageMagick-doc-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036554" comment="ImageMagick-extra-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036555" comment="libMagick++-7_Q16HDRI5-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036556" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036557" comment="libMagick++-devel-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036558" comment="libMagick++-devel-32bit-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036559" comment="libMagickCore-7_Q16HDRI10-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036560" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036561" comment="libMagickWand-7_Q16HDRI10-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036562" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036563" comment="perl-PerlMagick-7.1.2.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254189" version="1" class="patch">
	<metadata>
		<title>apptainer-1.4.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2025-65105" ref_url="https://www.suse.com/security/cve/CVE-2025-65105/" source="CVE"/>
		<reference ref_id="CVE-2025-8556" ref_url="https://www.suse.com/security/cve/CVE-2025-8556/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.4.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-65105/">CVE-2025-65105 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-65105">CVE-2025-65105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8556/">CVE-2025-8556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8556">CVE-2025-8556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036564" comment="apptainer-1.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036565" comment="apptainer-leap-1.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036566" comment="apptainer-sle15_7-1.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036567" comment="apptainer-sle16-1.4.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254190" version="1" class="patch">
	<metadata>
		<title>python311-cbor2-5.8.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68131" ref_url="https://www.suse.com/security/cve/CVE-2025-68131/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cbor2-5.8.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68131/">CVE-2025-68131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68131">CVE-2025-68131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036568" comment="python311-cbor2-5.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036569" comment="python312-cbor2-5.8.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036570" comment="python313-cbor2-5.8.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254191" version="1" class="patch">
	<metadata>
		<title>libwget4-2.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-69194" ref_url="https://www.suse.com/security/cve/CVE-2025-69194/" source="CVE"/>
		<reference ref_id="CVE-2025-69195" ref_url="https://www.suse.com/security/cve/CVE-2025-69195/" source="CVE"/>
		<description>
These are all security issues fixed in the libwget4-2.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-69194/">CVE-2025-69194 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69194">CVE-2025-69194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-69195/">CVE-2025-69195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69195">CVE-2025-69195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036571" comment="libwget4-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036572" comment="wget2-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036573" comment="wget2-devel-2.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254192" version="1" class="patch">
	<metadata>
		<title>chromedriver-143.0.7499.192-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0628" ref_url="https://www.suse.com/security/cve/CVE-2026-0628/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-143.0.7499.192-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0628/">CVE-2026-0628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0628">CVE-2026-0628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036797" comment="chromedriver-143.0.7499.192-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036798" comment="chromium-143.0.7499.192-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254193" version="1" class="patch">
	<metadata>
		<title>curl-8.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14017" ref_url="https://www.suse.com/security/cve/CVE-2025-14017/" source="CVE"/>
		<reference ref_id="CVE-2025-14524" ref_url="https://www.suse.com/security/cve/CVE-2025-14524/" source="CVE"/>
		<reference ref_id="CVE-2025-14819" ref_url="https://www.suse.com/security/cve/CVE-2025-14819/" source="CVE"/>
		<reference ref_id="CVE-2025-15079" ref_url="https://www.suse.com/security/cve/CVE-2025-15079/" source="CVE"/>
		<reference ref_id="CVE-2025-15224" ref_url="https://www.suse.com/security/cve/CVE-2025-15224/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14017/">CVE-2025-14017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017">CVE-2025-14017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14524/">CVE-2025-14524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524">CVE-2025-14524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14819/">CVE-2025-14819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14819">CVE-2025-14819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15079/">CVE-2025-15079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079">CVE-2025-15079 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15224/">CVE-2025-15224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224">CVE-2025-15224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036799" comment="curl-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036800" comment="curl-fish-completion-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036801" comment="curl-zsh-completion-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036802" comment="libcurl-devel-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036803" comment="libcurl-devel-32bit-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036804" comment="libcurl-devel-doc-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036805" comment="libcurl4-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036806" comment="libcurl4-32bit-8.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036807" comment="wcurl-8.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254194" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.6-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15059" ref_url="https://www.suse.com/security/cve/CVE-2025-15059/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.6-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15059/">CVE-2025-15059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15059">CVE-2025-15059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036808" comment="gimp-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036809" comment="gimp-devel-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036810" comment="gimp-extension-goat-excercises-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036811" comment="gimp-lang-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036812" comment="gimp-plugin-aa-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036813" comment="gimp-plugin-python3-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036814" comment="gimp-vala-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036815" comment="libgimp-3_0-0-3.0.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036816" comment="libgimpui-3_0-0-3.0.6-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254195" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.21.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68431" ref_url="https://www.suse.com/security/cve/CVE-2025-68431/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68431/">CVE-2025-68431 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68431">CVE-2025-68431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036817" comment="gdk-pixbuf-loader-libheif-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036818" comment="libheif-aom-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036819" comment="libheif-dav1d-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036820" comment="libheif-devel-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036821" comment="libheif-ffmpeg-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036822" comment="libheif-jpeg-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036823" comment="libheif-openh264-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036824" comment="libheif-openjpeg-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036825" comment="libheif-rav1e-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036826" comment="libheif-svtenc-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036827" comment="libheif1-1.21.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036828" comment="libheif1-32bit-1.21.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254196" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66490" ref_url="https://www.suse.com/security/cve/CVE-2025-66490/" source="CVE"/>
		<reference ref_id="CVE-2025-66491" ref_url="https://www.suse.com/security/cve/CVE-2025-66491/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-66490/">CVE-2025-66490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66490">CVE-2025-66490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66491/">CVE-2025-66491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66491">CVE-2025-66491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036829" comment="traefik-3.6.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254197" version="1" class="patch">
	<metadata>
		<title>coredns-1.14.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.14.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037016" comment="coredns-1.14.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037017" comment="coredns-extras-1.14.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254198" version="1" class="patch">
	<metadata>
		<title>libsodium-devel-1.0.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444/" source="CVE"/>
		<description>
These are all security issues fixed in the libsodium-devel-1.0.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037018" comment="libsodium-devel-1.0.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037019" comment="libsodium26-1.0.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037020" comment="libsodium26-32bit-1.0.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254199" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037021" comment="libsoup-3_0-0-3.6.5-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037022" comment="libsoup-3_0-0-32bit-3.6.5-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037023" comment="libsoup-devel-3.6.5-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037024" comment="libsoup-devel-32bit-3.6.5-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037025" comment="libsoup-lang-3.6.5-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037026" comment="typelib-1_0-Soup-3_0-3.6.5-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254200" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037027" comment="libsoup-2_4-1-2.74.3-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037028" comment="libsoup-2_4-1-32bit-2.74.3-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037029" comment="libsoup2-devel-2.74.3-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037030" comment="libsoup2-devel-32bit-2.74.3-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037031" comment="libsoup2-lang-2.74.3-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037032" comment="typelib-1_0-Soup-2_4-2.74.3-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254201" version="1" class="patch">
	<metadata>
		<title>python311-aiohttp-3.13.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-69223" ref_url="https://www.suse.com/security/cve/CVE-2025-69223/" source="CVE"/>
		<reference ref_id="CVE-2025-69224" ref_url="https://www.suse.com/security/cve/CVE-2025-69224/" source="CVE"/>
		<reference ref_id="CVE-2025-69225" ref_url="https://www.suse.com/security/cve/CVE-2025-69225/" source="CVE"/>
		<reference ref_id="CVE-2025-69226" ref_url="https://www.suse.com/security/cve/CVE-2025-69226/" source="CVE"/>
		<reference ref_id="CVE-2025-69227" ref_url="https://www.suse.com/security/cve/CVE-2025-69227/" source="CVE"/>
		<reference ref_id="CVE-2025-69228" ref_url="https://www.suse.com/security/cve/CVE-2025-69228/" source="CVE"/>
		<reference ref_id="CVE-2025-69229" ref_url="https://www.suse.com/security/cve/CVE-2025-69229/" source="CVE"/>
		<reference ref_id="CVE-2025-69230" ref_url="https://www.suse.com/security/cve/CVE-2025-69230/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-aiohttp-3.13.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69223/">CVE-2025-69223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69223">CVE-2025-69223 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69224/">CVE-2025-69224 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69224">CVE-2025-69224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69225/">CVE-2025-69225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69225">CVE-2025-69225 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69226/">CVE-2025-69226 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69226">CVE-2025-69226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69227/">CVE-2025-69227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69227">CVE-2025-69227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69228/">CVE-2025-69228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69228">CVE-2025-69228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69229/">CVE-2025-69229 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69229">CVE-2025-69229 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69230/">CVE-2025-69230 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69230">CVE-2025-69230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037033" comment="python311-aiohttp-3.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037034" comment="python312-aiohttp-3.13.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037035" comment="python313-aiohttp-3.13.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254202" version="1" class="patch">
	<metadata>
		<title>python311-urllib3-2.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-urllib3-2.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037036" comment="python311-urllib3-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037037" comment="python312-urllib3-2.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037038" comment="python313-urllib3-2.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254203" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.6-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6601" ref_url="https://www.suse.com/security/cve/CVE-2023-6601/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.6-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6601/">CVE-2023-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6601">CVE-2023-6601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037242" comment="ffmpeg-4-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037243" comment="ffmpeg-4-libavcodec-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037244" comment="ffmpeg-4-libavdevice-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037245" comment="ffmpeg-4-libavfilter-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037246" comment="ffmpeg-4-libavformat-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037247" comment="ffmpeg-4-libavresample-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037248" comment="ffmpeg-4-libavutil-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037249" comment="ffmpeg-4-libpostproc-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037250" comment="ffmpeg-4-libswresample-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037251" comment="ffmpeg-4-libswscale-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037252" comment="ffmpeg-4-private-devel-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037253" comment="libavcodec58_134-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037254" comment="libavdevice58_13-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037255" comment="libavfilter7_110-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037256" comment="libavformat58_76-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037257" comment="libavresample4_0-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037258" comment="libavutil56_70-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037259" comment="libpostproc55_9-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037260" comment="libswresample3_9-4.4.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037261" comment="libswscale5_9-4.4.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254204" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-6601" ref_url="https://www.suse.com/security/cve/CVE-2023-6601/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6601/">CVE-2023-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6601">CVE-2023-6601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037262" comment="ffmpeg-7-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037263" comment="ffmpeg-7-libavcodec-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037264" comment="ffmpeg-7-libavdevice-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037265" comment="ffmpeg-7-libavfilter-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037266" comment="ffmpeg-7-libavformat-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037267" comment="ffmpeg-7-libavutil-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037268" comment="ffmpeg-7-libpostproc-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037269" comment="ffmpeg-7-libswresample-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037270" comment="ffmpeg-7-libswscale-devel-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037271" comment="libavcodec61-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037272" comment="libavdevice61-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037273" comment="libavfilter10-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037274" comment="libavformat61-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037275" comment="libavutil59-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037276" comment="libpostproc58-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037277" comment="libswresample5-7.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037278" comment="libswscale8-7.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254205" version="1" class="patch">
	<metadata>
		<title>istioctl-1.28.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62408" ref_url="https://www.suse.com/security/cve/CVE-2025-62408/" source="CVE"/>
		<description>
These are all security issues fixed in the istioctl-1.28.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-62408/">CVE-2025-62408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62408">CVE-2025-62408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037279" comment="istioctl-1.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037280" comment="istioctl-bash-completion-1.28.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037281" comment="istioctl-zsh-completion-1.28.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254206" version="1" class="patch">
	<metadata>
		<title>k6-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the k6-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037282" comment="k6-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037283" comment="k6-bash-completion-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037284" comment="k6-fish-completion-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037285" comment="k6-zsh-completion-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254207" version="1" class="patch">
	<metadata>
		<title>kubelogin-0.2.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<description>
These are all security issues fixed in the kubelogin-0.2.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037286" comment="kubelogin-0.2.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254208" version="1" class="patch">
	<metadata>
		<title>libpcap-devel-1.10.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11961" ref_url="https://www.suse.com/security/cve/CVE-2025-11961/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap-devel-1.10.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11961/">CVE-2025-11961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11961">CVE-2025-11961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037287" comment="libpcap-devel-1.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037288" comment="libpcap-devel-32bit-1.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037289" comment="libpcap-devel-static-1.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037290" comment="libpcap1-1.10.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037291" comment="libpcap1-32bit-1.10.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254209" version="1" class="patch">
	<metadata>
		<title>libtasn1-6-32bit-4.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13151" ref_url="https://www.suse.com/security/cve/CVE-2025-13151/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-6-32bit-4.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13151/">CVE-2025-13151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13151">CVE-2025-13151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037292" comment="libtasn1-6-4.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037293" comment="libtasn1-6-32bit-4.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037294" comment="libtasn1-devel-4.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037295" comment="libtasn1-devel-32bit-4.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037296" comment="libtasn1-tools-4.21.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254210" version="1" class="patch">
	<metadata>
		<title>python311-Authlib-1.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68158" ref_url="https://www.suse.com/security/cve/CVE-2025-68158/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Authlib-1.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68158/">CVE-2025-68158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68158">CVE-2025-68158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037297" comment="python311-Authlib-1.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037298" comment="python312-Authlib-1.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037299" comment="python313-Authlib-1.6.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254211" version="1" class="patch">
	<metadata>
		<title>teleport-17.7.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64702" ref_url="https://www.suse.com/security/cve/CVE-2025-64702/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.7.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64702/">CVE-2025-64702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64702">CVE-2025-64702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037300" comment="teleport-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037301" comment="teleport-bash-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037302" comment="teleport-fdpass-teleport-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037303" comment="teleport-tbot-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037304" comment="teleport-tbot-bash-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037305" comment="teleport-tbot-zsh-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037306" comment="teleport-tctl-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037307" comment="teleport-tctl-bash-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037308" comment="teleport-tctl-zsh-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037309" comment="teleport-tsh-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037310" comment="teleport-tsh-bash-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037311" comment="teleport-tsh-zsh-completion-17.7.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037312" comment="teleport-zsh-completion-17.7.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254212" version="1" class="patch">
	<metadata>
		<title>cockpit-repos-4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64718" ref_url="https://www.suse.com/security/cve/CVE-2025-64718/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-repos-4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64718/">CVE-2025-64718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718">CVE-2025-64718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037593" comment="cockpit-repos-4.6-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254213" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037594" comment="firefox-esr-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037595" comment="firefox-esr-branding-upstream-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037596" comment="firefox-esr-translations-common-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037597" comment="firefox-esr-translations-other-140.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254214" version="1" class="patch">
	<metadata>
		<title>fluidsynth-2.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-56225" ref_url="https://www.suse.com/security/cve/CVE-2025-56225/" source="CVE"/>
		<description>
These are all security issues fixed in the fluidsynth-2.5.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-56225/">CVE-2025-56225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56225">CVE-2025-56225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037598" comment="fluidsynth-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037599" comment="fluidsynth-devel-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037600" comment="libfluidsynth3-2.5.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037601" comment="libfluidsynth3-32bit-2.5.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254215" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.18.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332/" source="CVE"/>
		<reference ref_id="CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335/" source="CVE"/>
		<reference ref_id="CVE-2025-68336" ref_url="https://www.suse.com/security/cve/CVE-2025-68336/" source="CVE"/>
		<reference ref_id="CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337/" source="CVE"/>
		<reference ref_id="CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344/" source="CVE"/>
		<reference ref_id="CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345/" source="CVE"/>
		<reference ref_id="CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346/" source="CVE"/>
		<reference ref_id="CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347/" source="CVE"/>
		<reference ref_id="CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2025-68350" ref_url="https://www.suse.com/security/cve/CVE-2025-68350/" source="CVE"/>
		<reference ref_id="CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351/" source="CVE"/>
		<reference ref_id="CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352/" source="CVE"/>
		<reference ref_id="CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353/" source="CVE"/>
		<reference ref_id="CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354/" source="CVE"/>
		<reference ref_id="CVE-2025-68355" ref_url="https://www.suse.com/security/cve/CVE-2025-68355/" source="CVE"/>
		<reference ref_id="CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356/" source="CVE"/>
		<reference ref_id="CVE-2025-68357" ref_url="https://www.suse.com/security/cve/CVE-2025-68357/" source="CVE"/>
		<reference ref_id="CVE-2025-68358" ref_url="https://www.suse.com/security/cve/CVE-2025-68358/" source="CVE"/>
		<reference ref_id="CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359/" source="CVE"/>
		<reference ref_id="CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360/" source="CVE"/>
		<reference ref_id="CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361/" source="CVE"/>
		<reference ref_id="CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362/" source="CVE"/>
		<reference ref_id="CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363/" source="CVE"/>
		<reference ref_id="CVE-2025-68364" ref_url="https://www.suse.com/security/cve/CVE-2025-68364/" source="CVE"/>
		<reference ref_id="CVE-2025-68365" ref_url="https://www.suse.com/security/cve/CVE-2025-68365/" source="CVE"/>
		<reference ref_id="CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366/" source="CVE"/>
		<reference ref_id="CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367/" source="CVE"/>
		<reference ref_id="CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368/" source="CVE"/>
		<reference ref_id="CVE-2025-68369" ref_url="https://www.suse.com/security/cve/CVE-2025-68369/" source="CVE"/>
		<reference ref_id="CVE-2025-68370" ref_url="https://www.suse.com/security/cve/CVE-2025-68370/" source="CVE"/>
		<reference ref_id="CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371/" source="CVE"/>
		<reference ref_id="CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372/" source="CVE"/>
		<reference ref_id="CVE-2025-68373" ref_url="https://www.suse.com/security/cve/CVE-2025-68373/" source="CVE"/>
		<reference ref_id="CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374/" source="CVE"/>
		<reference ref_id="CVE-2025-68375" ref_url="https://www.suse.com/security/cve/CVE-2025-68375/" source="CVE"/>
		<reference ref_id="CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376/" source="CVE"/>
		<reference ref_id="CVE-2025-68377" ref_url="https://www.suse.com/security/cve/CVE-2025-68377/" source="CVE"/>
		<reference ref_id="CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378/" source="CVE"/>
		<reference ref_id="CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379/" source="CVE"/>
		<reference ref_id="CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380/" source="CVE"/>
		<reference ref_id="CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724/" source="CVE"/>
		<reference ref_id="CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725/" source="CVE"/>
		<reference ref_id="CVE-2025-68726" ref_url="https://www.suse.com/security/cve/CVE-2025-68726/" source="CVE"/>
		<reference ref_id="CVE-2025-68727" ref_url="https://www.suse.com/security/cve/CVE-2025-68727/" source="CVE"/>
		<reference ref_id="CVE-2025-68728" ref_url="https://www.suse.com/security/cve/CVE-2025-68728/" source="CVE"/>
		<reference ref_id="CVE-2025-68729" ref_url="https://www.suse.com/security/cve/CVE-2025-68729/" source="CVE"/>
		<reference ref_id="CVE-2025-68730" ref_url="https://www.suse.com/security/cve/CVE-2025-68730/" source="CVE"/>
		<reference ref_id="CVE-2025-68731" ref_url="https://www.suse.com/security/cve/CVE-2025-68731/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68733" ref_url="https://www.suse.com/security/cve/CVE-2025-68733/" source="CVE"/>
		<reference ref_id="CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735/" source="CVE"/>
		<reference ref_id="CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736/" source="CVE"/>
		<reference ref_id="CVE-2025-68737" ref_url="https://www.suse.com/security/cve/CVE-2025-68737/" source="CVE"/>
		<reference ref_id="CVE-2025-68738" ref_url="https://www.suse.com/security/cve/CVE-2025-68738/" source="CVE"/>
		<reference ref_id="CVE-2025-68739" ref_url="https://www.suse.com/security/cve/CVE-2025-68739/" source="CVE"/>
		<reference ref_id="CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740/" source="CVE"/>
		<reference ref_id="CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741/" source="CVE"/>
		<reference ref_id="CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742/" source="CVE"/>
		<reference ref_id="CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743/" source="CVE"/>
		<reference ref_id="CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744/" source="CVE"/>
		<reference ref_id="CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745/" source="CVE"/>
		<reference ref_id="CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746/" source="CVE"/>
		<reference ref_id="CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747/" source="CVE"/>
		<reference ref_id="CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748/" source="CVE"/>
		<reference ref_id="CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749/" source="CVE"/>
		<reference ref_id="CVE-2025-68751" ref_url="https://www.suse.com/security/cve/CVE-2025-68751/" source="CVE"/>
		<reference ref_id="CVE-2025-68752" ref_url="https://www.suse.com/security/cve/CVE-2025-68752/" source="CVE"/>
		<reference ref_id="CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753/" source="CVE"/>
		<reference ref_id="CVE-2025-68754" ref_url="https://www.suse.com/security/cve/CVE-2025-68754/" source="CVE"/>
		<reference ref_id="CVE-2025-68755" ref_url="https://www.suse.com/security/cve/CVE-2025-68755/" source="CVE"/>
		<reference ref_id="CVE-2025-68756" ref_url="https://www.suse.com/security/cve/CVE-2025-68756/" source="CVE"/>
		<reference ref_id="CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757/" source="CVE"/>
		<reference ref_id="CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758/" source="CVE"/>
		<reference ref_id="CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759/" source="CVE"/>
		<reference ref_id="CVE-2025-68760" ref_url="https://www.suse.com/security/cve/CVE-2025-68760/" source="CVE"/>
		<reference ref_id="CVE-2025-68761" ref_url="https://www.suse.com/security/cve/CVE-2025-68761/" source="CVE"/>
		<reference ref_id="CVE-2025-68762" ref_url="https://www.suse.com/security/cve/CVE-2025-68762/" source="CVE"/>
		<reference ref_id="CVE-2025-68763" ref_url="https://www.suse.com/security/cve/CVE-2025-68763/" source="CVE"/>
		<reference ref_id="CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764/" source="CVE"/>
		<reference ref_id="CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765/" source="CVE"/>
		<reference ref_id="CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.18.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68336/">CVE-2025-68336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68336">CVE-2025-68336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68350/">CVE-2025-68350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68350">CVE-2025-68350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68355/">CVE-2025-68355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68355">CVE-2025-68355 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68357/">CVE-2025-68357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68357">CVE-2025-68357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68358/">CVE-2025-68358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68358">CVE-2025-68358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68364/">CVE-2025-68364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68364">CVE-2025-68364 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68365/">CVE-2025-68365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68365">CVE-2025-68365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68369/">CVE-2025-68369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68369">CVE-2025-68369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68370/">CVE-2025-68370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68370">CVE-2025-68370 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68373/">CVE-2025-68373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68373">CVE-2025-68373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68375/">CVE-2025-68375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68375">CVE-2025-68375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68377/">CVE-2025-68377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68377">CVE-2025-68377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68726/">CVE-2025-68726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68726">CVE-2025-68726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68727/">CVE-2025-68727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68727">CVE-2025-68727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68728/">CVE-2025-68728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68728">CVE-2025-68728 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68729/">CVE-2025-68729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68729">CVE-2025-68729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68730/">CVE-2025-68730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68730">CVE-2025-68730 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68731/">CVE-2025-68731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68731">CVE-2025-68731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68733/">CVE-2025-68733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68733">CVE-2025-68733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68737/">CVE-2025-68737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68737">CVE-2025-68737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68738/">CVE-2025-68738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68738">CVE-2025-68738 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68739/">CVE-2025-68739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68739">CVE-2025-68739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68751/">CVE-2025-68751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68751">CVE-2025-68751 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/S:U/UI:N/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68752/">CVE-2025-68752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68752">CVE-2025-68752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68754/">CVE-2025-68754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68754">CVE-2025-68754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68755/">CVE-2025-68755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68755">CVE-2025-68755 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68756/">CVE-2025-68756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68756">CVE-2025-68756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68760/">CVE-2025-68760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68760">CVE-2025-68760 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68761/">CVE-2025-68761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68761">CVE-2025-68761 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68762/">CVE-2025-68762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68762">CVE-2025-68762 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68763/">CVE-2025-68763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68763">CVE-2025-68763 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037603" comment="kernel-macros-6.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037604" comment="kernel-source-6.18.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037605" comment="kernel-source-vanilla-6.18.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254216" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716/" source="CVE"/>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037606" comment="libsoup-3_0-0-3.6.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037607" comment="libsoup-3_0-0-32bit-3.6.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037608" comment="libsoup-devel-3.6.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037609" comment="libsoup-devel-32bit-3.6.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037610" comment="libsoup-lang-3.6.5-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037611" comment="typelib-1_0-Soup-3_0-3.6.5-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254217" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037612" comment="libsoup-2_4-1-2.74.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037613" comment="libsoup-2_4-1-32bit-2.74.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037614" comment="libsoup2-devel-2.74.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037615" comment="libsoup2-devel-32bit-2.74.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037616" comment="libsoup2-lang-2.74.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037617" comment="typelib-1_0-Soup-2_4-2.74.3-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254218" version="1" class="patch">
	<metadata>
		<title>mcphost-0.32.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the mcphost-0.32.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037618" comment="mcphost-0.32.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037619" comment="mcphost-bash-completion-0.32.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037620" comment="mcphost-fish-completion-0.32.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037621" comment="mcphost-zsh-completion-0.32.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254219" version="1" class="patch">
	<metadata>
		<title>python311-filelock-3.20.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22701" ref_url="https://www.suse.com/security/cve/CVE-2026-22701/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-filelock-3.20.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22701/">CVE-2026-22701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22701">CVE-2026-22701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037622" comment="python311-filelock-3.20.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037623" comment="python312-filelock-3.20.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037624" comment="python313-filelock-3.20.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254220" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.6.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22690" ref_url="https://www.suse.com/security/cve/CVE-2026-22690/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.6.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22690/">CVE-2026-22690 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22690">CVE-2026-22690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037625" comment="python311-pypdf-6.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037626" comment="python312-pypdf-6.6.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037627" comment="python313-pypdf-6.6.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254221" version="1" class="patch">
	<metadata>
		<title>liburiparser1-1.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67899" ref_url="https://www.suse.com/security/cve/CVE-2025-67899/" source="CVE"/>
		<description>
These are all security issues fixed in the liburiparser1-1.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67899/">CVE-2025-67899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67899">CVE-2025-67899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037628" comment="liburiparser1-1.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037629" comment="uriparser-1.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037630" comment="uriparser-devel-1.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037631" comment="uriparser-doc-1.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254222" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-147.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0881" ref_url="https://www.suse.com/security/cve/CVE-2026-0881/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0888" ref_url="https://www.suse.com/security/cve/CVE-2026-0888/" source="CVE"/>
		<reference ref_id="CVE-2026-0889" ref_url="https://www.suse.com/security/cve/CVE-2026-0889/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<reference ref_id="CVE-2026-0892" ref_url="https://www.suse.com/security/cve/CVE-2026-0892/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-147.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0881/">CVE-2026-0881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0881">CVE-2026-0881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0888/">CVE-2026-0888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0888">CVE-2026-0888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0889/">CVE-2026-0889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0889">CVE-2026-0889 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0892/">CVE-2026-0892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0892">CVE-2026-0892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037632" comment="MozillaFirefox-147.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037633" comment="MozillaFirefox-branding-upstream-147.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037634" comment="MozillaFirefox-devel-147.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037635" comment="MozillaFirefox-translations-common-147.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037636" comment="MozillaFirefox-translations-other-147.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254223" version="1" class="patch">
	<metadata>
		<title>libcryptopp-devel-8.9.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-50979" ref_url="https://www.suse.com/security/cve/CVE-2023-50979/" source="CVE"/>
		<description>
These are all security issues fixed in the libcryptopp-devel-8.9.0-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50979/">CVE-2023-50979 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50979">CVE-2023-50979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037637" comment="libcryptopp-devel-8.9.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037638" comment="libcryptopp8_9_0-8.9.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254224" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.26.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22791" ref_url="https://www.suse.com/security/cve/CVE-2026-22791/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.26.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22791/">CVE-2026-22791 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22791">CVE-2026-22791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037639" comment="openCryptoki-3.26.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037640" comment="openCryptoki-64bit-3.26.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037641" comment="openCryptoki-devel-3.26.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254225" version="1" class="patch">
	<metadata>
		<title>python311-urllib3-2.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-urllib3-2.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037642" comment="python311-urllib3-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037643" comment="python312-urllib3-2.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037644" comment="python313-urllib3-2.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254226" version="1" class="patch">
	<metadata>
		<title>rke2-1.34-1.34.3+rke2r1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<description>
These are all security issues fixed in the rke2-1.34-1.34.3+rke2r1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037645" comment="rke2-1.34-1.34.3+rke2r1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254227" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-l2tp-1.52.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9615" ref_url="https://www.suse.com/security/cve/CVE-2025-9615/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-l2tp-1.52.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9615/">CVE-2025-9615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9615">CVE-2025-9615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037745" comment="NetworkManager-applet-l2tp-1.52.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037746" comment="NetworkManager-l2tp-1.52.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037747" comment="NetworkManager-l2tp-lang-1.52.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254228" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68276" ref_url="https://www.suse.com/security/cve/CVE-2025-68276/" source="CVE"/>
		<reference ref_id="CVE-2025-68468" ref_url="https://www.suse.com/security/cve/CVE-2025-68468/" source="CVE"/>
		<reference ref_id="CVE-2025-68471" ref_url="https://www.suse.com/security/cve/CVE-2025-68471/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-41.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68276/">CVE-2025-68276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68276">CVE-2025-68276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68468/">CVE-2025-68468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68468">CVE-2025-68468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68471/">CVE-2025-68471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68471">CVE-2025-68471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037748" comment="avahi-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037749" comment="avahi-autoipd-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037750" comment="avahi-compat-howl-devel-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037751" comment="avahi-compat-mDNSResponder-devel-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037752" comment="avahi-lang-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037753" comment="avahi-utils-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037754" comment="libavahi-client3-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037755" comment="libavahi-client3-32bit-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037756" comment="libavahi-common3-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037757" comment="libavahi-common3-32bit-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037758" comment="libavahi-core7-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037759" comment="libavahi-devel-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037760" comment="libavahi-libevent1-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037761" comment="libdns_sd-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037762" comment="libdns_sd-32bit-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037763" comment="libhowl0-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037764" comment="python311-avahi-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037765" comment="python312-avahi-0.8-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037766" comment="python313-avahi-0.8-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254229" version="1" class="patch">
	<metadata>
		<title>ffmpeg-4-4.4.6-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-63757" ref_url="https://www.suse.com/security/cve/CVE-2025-63757/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-4-4.4.6-11.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-63757/">CVE-2025-63757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-63757">CVE-2025-63757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037767" comment="ffmpeg-4-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037768" comment="ffmpeg-4-libavcodec-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037769" comment="ffmpeg-4-libavdevice-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037770" comment="ffmpeg-4-libavfilter-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037771" comment="ffmpeg-4-libavformat-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037772" comment="ffmpeg-4-libavresample-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037773" comment="ffmpeg-4-libavutil-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037774" comment="ffmpeg-4-libpostproc-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037775" comment="ffmpeg-4-libswresample-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037776" comment="ffmpeg-4-libswscale-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037777" comment="ffmpeg-4-private-devel-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037778" comment="libavcodec58_134-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037779" comment="libavdevice58_13-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037780" comment="libavfilter7_110-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037781" comment="libavformat58_76-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037782" comment="libavresample4_0-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037783" comment="libavutil56_70-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037784" comment="libpostproc55_9-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037785" comment="libswresample3_9-4.4.6-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037786" comment="libswscale5_9-4.4.6-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254230" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67746" ref_url="https://www.suse.com/security/cve/CVE-2025-67746/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67746/">CVE-2025-67746 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67746">CVE-2025-67746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037787" comment="php-composer2-2.9.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254231" version="1" class="patch">
	<metadata>
		<title>python311-virtualenv-20.36.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68146" ref_url="https://www.suse.com/security/cve/CVE-2025-68146/" source="CVE"/>
		<reference ref_id="CVE-2026-22702" ref_url="https://www.suse.com/security/cve/CVE-2026-22702/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-virtualenv-20.36.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68146/">CVE-2025-68146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68146">CVE-2025-68146 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22702/">CVE-2026-22702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22702">CVE-2026-22702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037788" comment="python311-virtualenv-20.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037789" comment="python312-virtualenv-20.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037790" comment="python313-virtualenv-20.36.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254232" version="1" class="patch">
	<metadata>
		<title>libwireshark19-4.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0959" ref_url="https://www.suse.com/security/cve/CVE-2026-0959/" source="CVE"/>
		<reference ref_id="CVE-2026-0960" ref_url="https://www.suse.com/security/cve/CVE-2026-0960/" source="CVE"/>
		<reference ref_id="CVE-2026-0961" ref_url="https://www.suse.com/security/cve/CVE-2026-0961/" source="CVE"/>
		<reference ref_id="CVE-2026-0962" ref_url="https://www.suse.com/security/cve/CVE-2026-0962/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark19-4.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0959/">CVE-2026-0959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0959">CVE-2026-0959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0960/">CVE-2026-0960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0960">CVE-2026-0960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0961/">CVE-2026-0961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0961">CVE-2026-0961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0962/">CVE-2026-0962 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0962">CVE-2026-0962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037791" comment="libwireshark19-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037792" comment="libwiretap16-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037793" comment="libwsutil17-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037794" comment="wireshark-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037795" comment="wireshark-devel-4.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037796" comment="wireshark-ui-qt-4.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254233" version="1" class="patch">
	<metadata>
		<title>chromedriver-144.0.7559.59-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0899" ref_url="https://www.suse.com/security/cve/CVE-2026-0899/" source="CVE"/>
		<reference ref_id="CVE-2026-0900" ref_url="https://www.suse.com/security/cve/CVE-2026-0900/" source="CVE"/>
		<reference ref_id="CVE-2026-0901" ref_url="https://www.suse.com/security/cve/CVE-2026-0901/" source="CVE"/>
		<reference ref_id="CVE-2026-0902" ref_url="https://www.suse.com/security/cve/CVE-2026-0902/" source="CVE"/>
		<reference ref_id="CVE-2026-0903" ref_url="https://www.suse.com/security/cve/CVE-2026-0903/" source="CVE"/>
		<reference ref_id="CVE-2026-0904" ref_url="https://www.suse.com/security/cve/CVE-2026-0904/" source="CVE"/>
		<reference ref_id="CVE-2026-0905" ref_url="https://www.suse.com/security/cve/CVE-2026-0905/" source="CVE"/>
		<reference ref_id="CVE-2026-0906" ref_url="https://www.suse.com/security/cve/CVE-2026-0906/" source="CVE"/>
		<reference ref_id="CVE-2026-0907" ref_url="https://www.suse.com/security/cve/CVE-2026-0907/" source="CVE"/>
		<reference ref_id="CVE-2026-0908" ref_url="https://www.suse.com/security/cve/CVE-2026-0908/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-144.0.7559.59-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-01-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0899/">CVE-2026-0899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0899">CVE-2026-0899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0900/">CVE-2026-0900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0900">CVE-2026-0900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0901/">CVE-2026-0901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0901">CVE-2026-0901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0902/">CVE-2026-0902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0902">CVE-2026-0902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0903/">CVE-2026-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0903">CVE-2026-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0904/">CVE-2026-0904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0904">CVE-2026-0904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0905/">CVE-2026-0905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0905">CVE-2026-0905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0906/">CVE-2026-0906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0906">CVE-2026-0906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0907/">CVE-2026-0907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0907">CVE-2026-0907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0908/">CVE-2026-0908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0908">CVE-2026-0908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037824" comment="chromedriver-144.0.7559.59-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037825" comment="chromium-144.0.7559.59-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254234" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037923" comment="MozillaThunderbird-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037924" comment="MozillaThunderbird-openpgp-librnp-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037925" comment="MozillaThunderbird-translations-common-140.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037926" comment="MozillaThunderbird-translations-other-140.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254235" version="1" class="patch">
	<metadata>
		<title>freerdp-3.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22851" ref_url="https://www.suse.com/security/cve/CVE-2026-22851/" source="CVE"/>
		<reference ref_id="CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852/" source="CVE"/>
		<reference ref_id="CVE-2026-22853" ref_url="https://www.suse.com/security/cve/CVE-2026-22853/" source="CVE"/>
		<reference ref_id="CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854/" source="CVE"/>
		<reference ref_id="CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855/" source="CVE"/>
		<reference ref_id="CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856/" source="CVE"/>
		<reference ref_id="CVE-2026-22857" ref_url="https://www.suse.com/security/cve/CVE-2026-22857/" source="CVE"/>
		<reference ref_id="CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858/" source="CVE"/>
		<reference ref_id="CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22851/">CVE-2026-22851 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22851">CVE-2026-22851 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22853/">CVE-2026-22853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22853">CVE-2026-22853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22857/">CVE-2026-22857 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22857">CVE-2026-22857 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037927" comment="freerdp-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037928" comment="freerdp-devel-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037929" comment="freerdp-proxy-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037930" comment="freerdp-proxy-plugins-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037931" comment="freerdp-sdl-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037932" comment="freerdp-server-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037933" comment="freerdp-wayland-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037934" comment="libfreerdp-server-proxy3-3-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037935" comment="libfreerdp3-3-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037936" comment="librdtk0-0-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037937" comment="libuwac0-0-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037938" comment="libwinpr3-3-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037939" comment="rdtk0-devel-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037940" comment="uwac0-devel-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037941" comment="winpr-devel-3.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254236" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.54-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.54-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037942" comment="libpng16-16-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037943" comment="libpng16-16-32bit-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037944" comment="libpng16-16-x86-64-v3-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037945" comment="libpng16-compat-devel-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037946" comment="libpng16-compat-devel-32bit-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037947" comment="libpng16-compat-devel-x86-64-v3-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037948" comment="libpng16-devel-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037949" comment="libpng16-devel-32bit-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037950" comment="libpng16-devel-x86-64-v3-1.6.54-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037951" comment="libpng16-tools-1.6.54-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254237" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.2.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-56226" ref_url="https://www.suse.com/security/cve/CVE-2025-56226/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.2.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-56226/">CVE-2025-56226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56226">CVE-2025-56226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037952" comment="libsndfile-devel-1.2.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037953" comment="libsndfile1-1.2.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037954" comment="libsndfile1-32bit-1.2.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254238" version="1" class="patch">
	<metadata>
		<title>corepack24-24.13.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack24-24.13.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037955" comment="corepack24-24.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037956" comment="nodejs24-24.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037957" comment="nodejs24-devel-24.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037958" comment="nodejs24-docs-24.13.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037959" comment="npm24-24.13.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254239" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037960" comment="go1.24-1.24.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037961" comment="go1.24-doc-1.24.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037962" comment="go1.24-libstd-1.24.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037963" comment="go1.24-race-1.24.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254240" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037964" comment="go1.25-1.25.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037965" comment="go1.25-doc-1.25.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037966" comment="go1.25-libstd-1.25.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037967" comment="go1.25-race-1.25.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254241" version="1" class="patch">
	<metadata>
		<title>harfbuzz-devel-12.3.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22693" ref_url="https://www.suse.com/security/cve/CVE-2026-22693/" source="CVE"/>
		<description>
These are all security issues fixed in the harfbuzz-devel-12.3.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22693/">CVE-2026-22693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22693">CVE-2026-22693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037968" comment="harfbuzz-devel-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037969" comment="harfbuzz-tools-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037970" comment="libharfbuzz-cairo0-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037971" comment="libharfbuzz-cairo0-32bit-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037972" comment="libharfbuzz-gobject0-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037973" comment="libharfbuzz-gobject0-32bit-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037974" comment="libharfbuzz-icu0-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037975" comment="libharfbuzz-icu0-32bit-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037976" comment="libharfbuzz-subset0-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037977" comment="libharfbuzz-subset0-32bit-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037978" comment="libharfbuzz0-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037979" comment="libharfbuzz0-32bit-12.3.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037980" comment="typelib-1_0-HarfBuzz-0_0-12.3.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254242" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.6-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14422" ref_url="https://www.suse.com/security/cve/CVE-2025-14422/" source="CVE"/>
		<reference ref_id="CVE-2025-14423" ref_url="https://www.suse.com/security/cve/CVE-2025-14423/" source="CVE"/>
		<reference ref_id="CVE-2025-14424" ref_url="https://www.suse.com/security/cve/CVE-2025-14424/" source="CVE"/>
		<reference ref_id="CVE-2025-14425" ref_url="https://www.suse.com/security/cve/CVE-2025-14425/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.6-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14422/">CVE-2025-14422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14422">CVE-2025-14422 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14423/">CVE-2025-14423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14423">CVE-2025-14423 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14424/">CVE-2025-14424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14424">CVE-2025-14424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14425/">CVE-2025-14425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14425">CVE-2025-14425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038166" comment="gimp-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038167" comment="gimp-devel-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038168" comment="gimp-extension-goat-excercises-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038169" comment="gimp-lang-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038170" comment="gimp-plugin-aa-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038171" comment="gimp-plugin-python3-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038172" comment="gimp-vala-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038173" comment="libgimp-3_0-0-3.0.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038174" comment="libgimpui-3_0-0-3.0.6-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254243" version="1" class="patch">
	<metadata>
		<title>grafana-11.6.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the grafana-11.6.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038175" comment="grafana-11.6.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254244" version="1" class="patch">
	<metadata>
		<title>hauler-1.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772/" source="CVE"/>
		<description>
These are all security issues fixed in the hauler-1.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038176" comment="hauler-1.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254245" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.18.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22029" ref_url="https://www.suse.com/security/cve/CVE-2026-22029/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.18.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-22029/">CVE-2026-22029 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22029">CVE-2026-22029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038177" comment="heroic-games-launcher-2.18.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254246" version="1" class="patch">
	<metadata>
		<title>python-keystonemiddleware-doc-10.12.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22797" ref_url="https://www.suse.com/security/cve/CVE-2026-22797/" source="CVE"/>
		<description>
These are all security issues fixed in the python-keystonemiddleware-doc-10.12.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22797/">CVE-2026-22797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22797">CVE-2026-22797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038178" comment="python-keystonemiddleware-doc-10.12.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038179" comment="python311-keystonemiddleware-10.12.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038180" comment="python312-keystonemiddleware-10.12.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038181" comment="python313-keystonemiddleware-10.12.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254247" version="1" class="patch">
	<metadata>
		<title>libraylib550-5.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15533" ref_url="https://www.suse.com/security/cve/CVE-2025-15533/" source="CVE"/>
		<reference ref_id="CVE-2025-15534" ref_url="https://www.suse.com/security/cve/CVE-2025-15534/" source="CVE"/>
		<description>
These are all security issues fixed in the libraylib550-5.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-15533/">CVE-2025-15533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-15533">CVE-2025-15533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-15534/">CVE-2025-15534 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-15534">CVE-2025-15534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038182" comment="libraylib550-5.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038183" comment="raylib-devel-5.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254248" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.41.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.41.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038184" comment="libblkid-devel-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038185" comment="libblkid-devel-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038186" comment="libblkid-devel-static-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038187" comment="libblkid1-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038188" comment="libblkid1-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038189" comment="libfdisk-devel-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038190" comment="libfdisk-devel-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038191" comment="libfdisk-devel-static-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038192" comment="libfdisk1-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038193" comment="libfdisk1-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038194" comment="libmount-devel-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038195" comment="libmount-devel-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038196" comment="libmount-devel-static-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038197" comment="libmount1-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038198" comment="libmount1-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038199" comment="libsmartcols-devel-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038200" comment="libsmartcols-devel-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038201" comment="libsmartcols-devel-static-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038202" comment="libsmartcols1-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038203" comment="libsmartcols1-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038204" comment="libuuid-devel-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038205" comment="libuuid-devel-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038206" comment="libuuid-devel-static-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038207" comment="libuuid1-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038208" comment="libuuid1-32bit-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038209" comment="util-linux-2.41.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038210" comment="util-linux-lang-2.41.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254249" version="1" class="patch">
	<metadata>
		<title>alloy-1.12.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.12.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038486" comment="alloy-1.12.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254250" version="1" class="patch">
	<metadata>
		<title>corepack22-22.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<reference ref_id="CVE-2026-22036" ref_url="https://www.suse.com/security/cve/CVE-2026-22036/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22036/">CVE-2026-22036 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22036">CVE-2026-22036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038487" comment="corepack22-22.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038488" comment="nodejs22-22.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038489" comment="nodejs22-devel-22.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038490" comment="nodejs22-docs-22.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038491" comment="npm22-22.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254251" version="1" class="patch">
	<metadata>
		<title>corepack24-24.13.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22036" ref_url="https://www.suse.com/security/cve/CVE-2026-22036/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack24-24.13.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22036/">CVE-2026-22036 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22036">CVE-2026-22036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038492" comment="corepack24-24.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038493" comment="nodejs24-24.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038494" comment="nodejs24-devel-24.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038495" comment="nodejs24-docs-24.13.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038496" comment="npm24-24.13.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254252" version="1" class="patch">
	<metadata>
		<title>python311-FontTools-4.61.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66034" ref_url="https://www.suse.com/security/cve/CVE-2025-66034/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-FontTools-4.61.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66034/">CVE-2025-66034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66034">CVE-2025-66034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038497" comment="python311-FontTools-4.61.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038498" comment="python312-FontTools-4.61.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038499" comment="python313-FontTools-4.61.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254253" version="1" class="patch">
	<metadata>
		<title>python311-jaraco.context-6.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23949" ref_url="https://www.suse.com/security/cve/CVE-2026-23949/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jaraco.context-6.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23949/">CVE-2026-23949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23949">CVE-2026-23949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038500" comment="python311-jaraco.context-6.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038501" comment="python312-jaraco.context-6.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038502" comment="python313-jaraco.context-6.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254254" version="1" class="patch">
	<metadata>
		<title>python311-pyasn1-0.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2141" ref_url="https://www.suse.com/security/cve/CVE-2026-2141/" source="CVE"/>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pyasn1-0.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2141/">CVE-2026-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2141">CVE-2026-2141 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038503" comment="python311-pyasn1-0.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038504" comment="python312-pyasn1-0.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038505" comment="python313-pyasn1-0.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254255" version="1" class="patch">
	<metadata>
		<title>python311-weasyprint-68.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68616" ref_url="https://www.suse.com/security/cve/CVE-2025-68616/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-weasyprint-68.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-68616/">CVE-2025-68616 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68616">CVE-2025-68616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038506" comment="python311-weasyprint-68.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038507" comment="python312-weasyprint-68.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038508" comment="python313-weasyprint-68.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254256" version="1" class="patch">
	<metadata>
		<title>bind-9.20.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13878" ref_url="https://www.suse.com/security/cve/CVE-2025-13878/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13878/">CVE-2025-13878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13878">CVE-2025-13878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039560" comment="bind-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039561" comment="bind-doc-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039562" comment="bind-modules-bdbhpt-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039563" comment="bind-modules-generic-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039564" comment="bind-modules-ldap-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039565" comment="bind-modules-mysql-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039566" comment="bind-modules-perl-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039567" comment="bind-modules-sqlite3-9.20.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039568" comment="bind-utils-9.20.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254257" version="1" class="patch">
	<metadata>
		<title>libsubid-devel-4.19.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<description>
These are all security issues fixed in the libsubid-devel-4.19.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039569" comment="libsubid-devel-4.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039570" comment="libsubid5-4.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039571" comment="login_defs-4.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039572" comment="shadow-4.19.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039573" comment="shadow-pw-mgmt-4.19.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254258" version="1" class="patch">
	<metadata>
		<title>libsuricata8_0_3-8.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64330" ref_url="https://www.suse.com/security/cve/CVE-2025-64330/" source="CVE"/>
		<reference ref_id="CVE-2025-64331" ref_url="https://www.suse.com/security/cve/CVE-2025-64331/" source="CVE"/>
		<reference ref_id="CVE-2025-64332" ref_url="https://www.suse.com/security/cve/CVE-2025-64332/" source="CVE"/>
		<reference ref_id="CVE-2025-64333" ref_url="https://www.suse.com/security/cve/CVE-2025-64333/" source="CVE"/>
		<reference ref_id="CVE-2025-64334" ref_url="https://www.suse.com/security/cve/CVE-2025-64334/" source="CVE"/>
		<reference ref_id="CVE-2025-64335" ref_url="https://www.suse.com/security/cve/CVE-2025-64335/" source="CVE"/>
		<reference ref_id="CVE-2025-64344" ref_url="https://www.suse.com/security/cve/CVE-2025-64344/" source="CVE"/>
		<reference ref_id="CVE-2026-22258" ref_url="https://www.suse.com/security/cve/CVE-2026-22258/" source="CVE"/>
		<reference ref_id="CVE-2026-22259" ref_url="https://www.suse.com/security/cve/CVE-2026-22259/" source="CVE"/>
		<reference ref_id="CVE-2026-22260" ref_url="https://www.suse.com/security/cve/CVE-2026-22260/" source="CVE"/>
		<reference ref_id="CVE-2026-22261" ref_url="https://www.suse.com/security/cve/CVE-2026-22261/" source="CVE"/>
		<reference ref_id="CVE-2026-22262" ref_url="https://www.suse.com/security/cve/CVE-2026-22262/" source="CVE"/>
		<reference ref_id="CVE-2026-22263" ref_url="https://www.suse.com/security/cve/CVE-2026-22263/" source="CVE"/>
		<reference ref_id="CVE-2026-22264" ref_url="https://www.suse.com/security/cve/CVE-2026-22264/" source="CVE"/>
		<description>
These are all security issues fixed in the libsuricata8_0_3-8.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64330/">CVE-2025-64330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64330">CVE-2025-64330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64331/">CVE-2025-64331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64331">CVE-2025-64331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64332/">CVE-2025-64332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64332">CVE-2025-64332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64333/">CVE-2025-64333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64333">CVE-2025-64333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64334/">CVE-2025-64334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64334">CVE-2025-64334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64335/">CVE-2025-64335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64335">CVE-2025-64335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64344/">CVE-2025-64344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64344">CVE-2025-64344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22258/">CVE-2026-22258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22258">CVE-2026-22258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22259/">CVE-2026-22259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22259">CVE-2026-22259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22260/">CVE-2026-22260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22260">CVE-2026-22260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22261/">CVE-2026-22261 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22261">CVE-2026-22261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22262/">CVE-2026-22262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22262">CVE-2026-22262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22263/">CVE-2026-22263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22263">CVE-2026-22263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22264/">CVE-2026-22264 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22264">CVE-2026-22264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039574" comment="libsuricata8_0_3-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039575" comment="suricata-8.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039576" comment="suricata-devel-8.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254259" version="1" class="patch">
	<metadata>
		<title>vlang-0.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438/" source="CVE"/>
		<description>
These are all security issues fixed in the vlang-0.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039577" comment="vlang-0.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039578" comment="vlang-examples-0.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254260" version="1" class="patch">
	<metadata>
		<title>chromedriver-144.0.7559.96-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1220" ref_url="https://www.suse.com/security/cve/CVE-2026-1220/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-144.0.7559.96-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1220/">CVE-2026-1220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1220">CVE-2026-1220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039579" comment="chromedriver-144.0.7559.96-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039580" comment="chromium-144.0.7559.96-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254261" version="1" class="patch">
	<metadata>
		<title>libxml2-16-2.14.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0989" ref_url="https://www.suse.com/security/cve/CVE-2026-0989/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-16-2.14.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0989/">CVE-2026-0989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0989">CVE-2026-0989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039581" comment="libxml2-16-2.14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039582" comment="libxml2-16-32bit-2.14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039583" comment="libxml2-devel-2.14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039584" comment="libxml2-devel-32bit-2.14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039585" comment="libxml2-doc-2.14.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039586" comment="libxml2-tools-2.14.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254262" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.26.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.26.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039587" comment="openCryptoki-3.26.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039588" comment="openCryptoki-64bit-3.26.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039589" comment="openCryptoki-devel-3.26.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254263" version="1" class="patch">
	<metadata>
		<title>tdom-0.9.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66382" ref_url="https://www.suse.com/security/cve/CVE-2025-66382/" source="CVE"/>
		<description>
These are all security issues fixed in the tdom-0.9.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66382/">CVE-2025-66382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66382">CVE-2025-66382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039590" comment="tdom-0.9.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039591" comment="tdom-devel-0.9.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254264" version="1" class="patch">
	<metadata>
		<title>cups-2.4.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040514" comment="cups-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040515" comment="cups-client-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040516" comment="cups-config-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040517" comment="cups-ddk-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040518" comment="cups-devel-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040519" comment="cups-devel-32bit-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040520" comment="libcups2-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040521" comment="libcups2-32bit-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040522" comment="libcupsimage2-2.4.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040523" comment="libcupsimage2-32bit-2.4.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254265" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.86.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0988" ref_url="https://www.suse.com/security/cve/CVE-2026-0988/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.86.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0988/">CVE-2026-0988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0988">CVE-2026-0988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040524" comment="gio-branding-upstream-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040525" comment="glib2-devel-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040526" comment="glib2-devel-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040527" comment="glib2-devel-static-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040528" comment="glib2-lang-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040529" comment="glib2-tests-devel-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040530" comment="glib2-tools-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040531" comment="glib2-tools-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040532" comment="libgio-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040533" comment="libgio-2_0-0-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040534" comment="libgirepository-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040535" comment="libglib-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040536" comment="libglib-2_0-0-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040537" comment="libgmodule-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040538" comment="libgmodule-2_0-0-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040539" comment="libgobject-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040540" comment="libgobject-2_0-0-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040541" comment="libgthread-2_0-0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040542" comment="libgthread-2_0-0-32bit-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040543" comment="typelib-1_0-GIRepository-3_0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040544" comment="typelib-1_0-GLib-2_0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040545" comment="typelib-1_0-GLibUnix-2_0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040546" comment="typelib-1_0-GModule-2_0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040547" comment="typelib-1_0-GObject-2_0-2.86.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040548" comment="typelib-1_0-Gio-2_0-2.86.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254266" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20260119.00-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20260119.00-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040549" comment="google-osconfig-agent-20260119.00-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254267" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.30.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.30.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040550" comment="java-11-openjdk-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040551" comment="java-11-openjdk-demo-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040552" comment="java-11-openjdk-devel-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040553" comment="java-11-openjdk-headless-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040554" comment="java-11-openjdk-javadoc-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040555" comment="java-11-openjdk-jmods-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040556" comment="java-11-openjdk-src-11.0.30.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254268" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040557" comment="java-17-openjdk-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040558" comment="java-17-openjdk-demo-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040559" comment="java-17-openjdk-devel-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040560" comment="java-17-openjdk-headless-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040561" comment="java-17-openjdk-javadoc-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040562" comment="java-17-openjdk-jmods-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040563" comment="java-17-openjdk-src-17.0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254269" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040564" comment="java-21-openjdk-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040565" comment="java-21-openjdk-demo-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040566" comment="java-21-openjdk-devel-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040567" comment="java-21-openjdk-headless-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040568" comment="java-21-openjdk-javadoc-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040569" comment="java-21-openjdk-jmods-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040570" comment="java-21-openjdk-src-21.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254270" version="1" class="patch">
	<metadata>
		<title>libmatio-devel-1.5.30-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-50343" ref_url="https://www.suse.com/security/cve/CVE-2025-50343/" source="CVE"/>
		<description>
These are all security issues fixed in the libmatio-devel-1.5.30-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50343/">CVE-2025-50343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50343">CVE-2025-50343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040571" comment="libmatio-devel-1.5.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040572" comment="libmatio14-1.5.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040573" comment="matio-tools-1.5.30-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254271" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.5.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-39327" ref_url="https://www.suse.com/security/cve/CVE-2023-39327/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.5.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-39327/">CVE-2023-39327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39327">CVE-2023-39327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040574" comment="libopenjp2-7-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040575" comment="libopenjp2-7-32bit-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040576" comment="libopenjp2-7-x86-64-v3-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040577" comment="openjpeg2-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040578" comment="openjpeg2-devel-2.5.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040579" comment="openjpeg2-devel-doc-2.5.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254272" version="1" class="patch">
	<metadata>
		<title>python311-urllib3_1-1.26.20-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-urllib3_1-1.26.20-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040580" comment="python311-urllib3_1-1.26.20-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040581" comment="python312-urllib3_1-1.26.20-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040582" comment="python313-urllib3_1-1.26.20-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254273" version="1" class="patch">
	<metadata>
		<title>qemu-10.2.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0665" ref_url="https://www.suse.com/security/cve/CVE-2026-0665/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.2.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0665/">CVE-2026-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0665">CVE-2026-0665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040583" comment="qemu-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040584" comment="qemu-SLOF-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040585" comment="qemu-accel-qtest-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040586" comment="qemu-arm-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040587" comment="qemu-audio-alsa-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040588" comment="qemu-audio-dbus-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040589" comment="qemu-audio-jack-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040590" comment="qemu-audio-oss-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040591" comment="qemu-audio-pa-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040592" comment="qemu-audio-pipewire-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040593" comment="qemu-audio-sdl-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040594" comment="qemu-audio-spice-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040595" comment="qemu-block-curl-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040596" comment="qemu-block-dmg-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040597" comment="qemu-block-iscsi-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040598" comment="qemu-block-nfs-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040599" comment="qemu-block-rbd-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040600" comment="qemu-block-ssh-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040601" comment="qemu-chardev-baum-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040602" comment="qemu-chardev-spice-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040603" comment="qemu-doc-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040604" comment="qemu-extra-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040605" comment="qemu-guest-agent-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040606" comment="qemu-headless-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040607" comment="qemu-hw-display-qxl-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040608" comment="qemu-hw-display-virtio-gpu-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040609" comment="qemu-hw-display-virtio-gpu-pci-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040610" comment="qemu-hw-display-virtio-vga-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040611" comment="qemu-hw-s390x-virtio-gpu-ccw-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040612" comment="qemu-hw-usb-host-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040613" comment="qemu-hw-usb-redirect-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040614" comment="qemu-hw-usb-smartcard-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040615" comment="qemu-img-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040616" comment="qemu-ipxe-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040617" comment="qemu-ivshmem-tools-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040618" comment="qemu-ksm-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040619" comment="qemu-lang-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040620" comment="qemu-microvm-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040621" comment="qemu-ppc-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040622" comment="qemu-pr-helper-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040623" comment="qemu-s390x-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040624" comment="qemu-seabios-10.2.01.17.0_1_g4f253b9b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040625" comment="qemu-skiboot-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040626" comment="qemu-spice-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040627" comment="qemu-tools-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040628" comment="qemu-ui-curses-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040629" comment="qemu-ui-dbus-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040630" comment="qemu-ui-gtk-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040631" comment="qemu-ui-opengl-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040632" comment="qemu-ui-sdl-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040633" comment="qemu-ui-spice-app-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040634" comment="qemu-ui-spice-core-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040635" comment="qemu-vgabios-10.2.01.17.0_1_g4f253b9b-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040636" comment="qemu-vhost-user-gpu-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040637" comment="qemu-vmsr-helper-10.2.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040638" comment="qemu-x86-10.2.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254274" version="1" class="patch">
	<metadata>
		<title>tlp-1.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67859" ref_url="https://www.suse.com/security/cve/CVE-2025-67859/" source="CVE"/>
		<description>
These are all security issues fixed in the tlp-1.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67859/">CVE-2025-67859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67859">CVE-2025-67859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040639" comment="tlp-1.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040640" comment="tlp-rdw-1.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254275" version="1" class="patch">
	<metadata>
		<title>zli-2.1.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the zli-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040641" comment="zli-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040642" comment="zli-bash-completion-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040643" comment="zli-fish-completion-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040644" comment="zli-zsh-completion-2.1.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254276" version="1" class="patch">
	<metadata>
		<title>zot-registry-2.1.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the zot-registry-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040645" comment="zot-registry-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040646" comment="zot-registry-bash-completion-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040647" comment="zot-registry-fish-completion-2.1.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040648" comment="zot-registry-zsh-completion-2.1.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254277" version="1" class="patch">
	<metadata>
		<title>coredns-1.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040649" comment="coredns-1.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040650" comment="coredns-extras-1.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254278" version="1" class="patch">
	<metadata>
		<title>libopencc1_2-1.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15536" ref_url="https://www.suse.com/security/cve/CVE-2025-15536/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencc1_2-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15536/">CVE-2025-15536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-15536">CVE-2025-15536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040651" comment="libopencc1_2-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040652" comment="opencc-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040653" comment="opencc-data-1.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040654" comment="opencc-devel-1.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254279" version="1" class="patch">
	<metadata>
		<title>python311-orjson-3.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67221" ref_url="https://www.suse.com/security/cve/CVE-2025-67221/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-orjson-3.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67221/">CVE-2025-67221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67221">CVE-2025-67221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040655" comment="python311-orjson-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040656" comment="python312-orjson-3.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040657" comment="python313-orjson-3.11.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254280" version="1" class="patch">
	<metadata>
		<title>python311-sigstore-4.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24408" ref_url="https://www.suse.com/security/cve/CVE-2026-24408/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-sigstore-4.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-24408/">CVE-2026-24408 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24408">CVE-2026-24408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040658" comment="python311-sigstore-4.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040659" comment="python312-sigstore-4.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040660" comment="python313-sigstore-4.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254281" version="1" class="patch">
	<metadata>
		<title>teleport-17.7.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21895" ref_url="https://www.suse.com/security/cve/CVE-2026-21895/" source="CVE"/>
		<description>
These are all security issues fixed in the teleport-17.7.14-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21895/">CVE-2026-21895 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21895">CVE-2026-21895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040661" comment="teleport-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040662" comment="teleport-bash-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040663" comment="teleport-fdpass-teleport-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040664" comment="teleport-tbot-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040665" comment="teleport-tbot-bash-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040666" comment="teleport-tbot-zsh-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040667" comment="teleport-tctl-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040668" comment="teleport-tctl-bash-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040669" comment="teleport-tctl-zsh-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040670" comment="teleport-tsh-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040671" comment="teleport-tsh-bash-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040672" comment="teleport-tsh-zsh-completion-17.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040673" comment="teleport-zsh-completion-17.7.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254282" version="1" class="patch">
	<metadata>
		<title>assertj-core-3.27.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24400" ref_url="https://www.suse.com/security/cve/CVE-2026-24400/" source="CVE"/>
		<description>
These are all security issues fixed in the assertj-core-3.27.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24400/">CVE-2026-24400 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24400">CVE-2026-24400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040674" comment="assertj-core-3.27.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040675" comment="assertj-core-javadoc-3.27.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254283" version="1" class="patch">
	<metadata>
		<title>freerdp-3.21.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530/" source="CVE"/>
		<reference ref_id="CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531/" source="CVE"/>
		<reference ref_id="CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532/" source="CVE"/>
		<reference ref_id="CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533/" source="CVE"/>
		<reference ref_id="CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534/" source="CVE"/>
		<reference ref_id="CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732/" source="CVE"/>
		<reference ref_id="CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883/" source="CVE"/>
		<reference ref_id="CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.21.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040676" comment="freerdp-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040677" comment="freerdp-devel-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040678" comment="freerdp-proxy-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040679" comment="freerdp-proxy-plugins-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040680" comment="freerdp-sdl-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040681" comment="freerdp-server-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040682" comment="freerdp-wayland-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040683" comment="libfreerdp-server-proxy3-3-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040684" comment="libfreerdp3-3-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040685" comment="librdtk0-0-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040686" comment="libuwac0-0-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040687" comment="libwinpr3-3-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040688" comment="rdtk0-devel-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040689" comment="uwac0-devel-3.21.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040690" comment="winpr-devel-3.21.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254284" version="1" class="patch">
	<metadata>
		<title>java-25-openjdk-25.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-25-openjdk-25.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040691" comment="java-25-openjdk-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040692" comment="java-25-openjdk-demo-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040693" comment="java-25-openjdk-devel-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040694" comment="java-25-openjdk-headless-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040695" comment="java-25-openjdk-javadoc-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040696" comment="java-25-openjdk-jmods-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040697" comment="java-25-openjdk-src-25.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254285" version="1" class="patch">
	<metadata>
		<title>python311-sse-starlette-3.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-62727" ref_url="https://www.suse.com/security/cve/CVE-2025-62727/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-sse-starlette-3.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62727/">CVE-2025-62727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62727">CVE-2025-62727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040698" comment="python311-sse-starlette-3.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040699" comment="python312-sse-starlette-3.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040700" comment="python313-sse-starlette-3.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254286" version="1" class="patch">
	<metadata>
		<title>python311-salt-3006.0-55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724/" source="CVE"/>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-salt-3006.0-55.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040701" comment="python311-salt-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040702" comment="python312-salt-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040703" comment="python313-salt-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040704" comment="salt-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040705" comment="salt-api-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040706" comment="salt-bash-completion-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040707" comment="salt-cloud-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040708" comment="salt-doc-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040709" comment="salt-fish-completion-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040710" comment="salt-master-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040711" comment="salt-minion-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040712" comment="salt-proxy-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040713" comment="salt-ssh-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040714" comment="salt-standalone-formulas-configuration-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040715" comment="salt-syndic-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040716" comment="salt-transactional-update-3006.0-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040717" comment="salt-zsh-completion-3006.0-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254287" version="1" class="patch">
	<metadata>
		<title>gio-branding-upstream-2.86.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1484" ref_url="https://www.suse.com/security/cve/CVE-2026-1484/" source="CVE"/>
		<reference ref_id="CVE-2026-1485" ref_url="https://www.suse.com/security/cve/CVE-2026-1485/" source="CVE"/>
		<reference ref_id="CVE-2026-1489" ref_url="https://www.suse.com/security/cve/CVE-2026-1489/" source="CVE"/>
		<description>
These are all security issues fixed in the gio-branding-upstream-2.86.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1484/">CVE-2026-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1484">CVE-2026-1484 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1485/">CVE-2026-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1485">CVE-2026-1485 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1489/">CVE-2026-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1489">CVE-2026-1489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041050" comment="gio-branding-upstream-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041051" comment="glib2-devel-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041052" comment="glib2-devel-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041053" comment="glib2-devel-static-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041054" comment="glib2-lang-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041055" comment="glib2-tests-devel-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041056" comment="glib2-tools-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041057" comment="glib2-tools-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041058" comment="libgio-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041059" comment="libgio-2_0-0-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041060" comment="libgirepository-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041061" comment="libglib-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041062" comment="libglib-2_0-0-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041063" comment="libgmodule-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041064" comment="libgmodule-2_0-0-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041065" comment="libgobject-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041066" comment="libgobject-2_0-0-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041067" comment="libgthread-2_0-0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041068" comment="libgthread-2_0-0-32bit-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041069" comment="typelib-1_0-GIRepository-3_0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041070" comment="typelib-1_0-GLib-2_0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041071" comment="typelib-1_0-GLibUnix-2_0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041072" comment="typelib-1_0-GModule-2_0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041073" comment="typelib-1_0-GObject-2_0-2.86.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041074" comment="typelib-1_0-Gio-2_0-2.86.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254288" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.5.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24881" ref_url="https://www.suse.com/security/cve/CVE-2026-24881/" source="CVE"/>
		<reference ref_id="CVE-2026-24882" ref_url="https://www.suse.com/security/cve/CVE-2026-24882/" source="CVE"/>
		<reference ref_id="CVE-2026-24883" ref_url="https://www.suse.com/security/cve/CVE-2026-24883/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.5.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24881/">CVE-2026-24881 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24881">CVE-2026-24881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24882/">CVE-2026-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24882">CVE-2026-24882 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24883/">CVE-2026-24883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24883">CVE-2026-24883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041075" comment="dirmngr-2.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041076" comment="gpg2-2.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041077" comment="gpg2-lang-2.5.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041078" comment="gpg2-tpm-2.5.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254289" version="1" class="patch">
	<metadata>
		<title>icinga2-2.15.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24413" ref_url="https://www.suse.com/security/cve/CVE-2026-24413/" source="CVE"/>
		<description>
These are all security issues fixed in the icinga2-2.15.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24413/">CVE-2026-24413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24413">CVE-2026-24413 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041079" comment="icinga2-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041080" comment="icinga2-bin-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041081" comment="icinga2-common-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041082" comment="icinga2-doc-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041083" comment="icinga2-ido-mysql-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041084" comment="icinga2-ido-pgsql-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041085" comment="nano-icinga2-2.15.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041086" comment="vim-icinga2-2.15.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254290" version="1" class="patch">
	<metadata>
		<title>logback-1.2.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1225" ref_url="https://www.suse.com/security/cve/CVE-2026-1225/" source="CVE"/>
		<description>
These are all security issues fixed in the logback-1.2.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1225/">CVE-2026-1225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1225">CVE-2026-1225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041087" comment="logback-1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041088" comment="logback-access-1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041089" comment="logback-examples-1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041090" comment="logback-javadoc-1.2.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254291" version="1" class="patch">
	<metadata>
		<title>python311-djangorestframework-3.16.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-21520" ref_url="https://www.suse.com/security/cve/CVE-2024-21520/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-djangorestframework-3.16.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21520/">CVE-2024-21520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21520">CVE-2024-21520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041091" comment="python311-djangorestframework-3.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041092" comment="python312-djangorestframework-3.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041093" comment="python313-djangorestframework-3.16.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254292" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24688" ref_url="https://www.suse.com/security/cve/CVE-2026-24688/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-24688/">CVE-2026-24688 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24688">CVE-2026-24688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041094" comment="python311-pypdf-6.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041095" comment="python312-pypdf-6.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041096" comment="python313-pypdf-6.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254293" version="1" class="patch">
	<metadata>
		<title>python314-3.14.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041097" comment="python314-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041098" comment="python314-curses-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041099" comment="python314-dbm-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041100" comment="python314-idle-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041101" comment="python314-tk-3.14.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041102" comment="python314-x86-64-v3-3.14.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254294" version="1" class="patch">
	<metadata>
		<title>xen-4.21.0_04-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58150" ref_url="https://www.suse.com/security/cve/CVE-2025-58150/" source="CVE"/>
		<reference ref_id="CVE-2026-23553" ref_url="https://www.suse.com/security/cve/CVE-2026-23553/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.21.0_04-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58150/">CVE-2025-58150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58150">CVE-2025-58150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23553/">CVE-2026-23553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23553">CVE-2026-23553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041103" comment="xen-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041104" comment="xen-devel-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041105" comment="xen-doc-html-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041106" comment="xen-libs-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041107" comment="xen-tools-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041108" comment="xen-tools-domU-4.21.0_04-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041109" comment="xen-tools-xendomains-wait-disk-4.21.0_04-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254295" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22770" ref_url="https://www.suse.com/security/cve/CVE-2026-22770/" source="CVE"/>
		<reference ref_id="CVE-2026-23874" ref_url="https://www.suse.com/security/cve/CVE-2026-23874/" source="CVE"/>
		<reference ref_id="CVE-2026-23876" ref_url="https://www.suse.com/security/cve/CVE-2026-23876/" source="CVE"/>
		<reference ref_id="CVE-2026-23952" ref_url="https://www.suse.com/security/cve/CVE-2026-23952/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22770/">CVE-2026-22770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22770">CVE-2026-22770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23874/">CVE-2026-23874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23874">CVE-2026-23874 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23876/">CVE-2026-23876 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23876">CVE-2026-23876 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23952/">CVE-2026-23952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23952">CVE-2026-23952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041110" comment="ImageMagick-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041111" comment="ImageMagick-config-7-SUSE-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041112" comment="ImageMagick-devel-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041113" comment="ImageMagick-devel-32bit-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041114" comment="ImageMagick-doc-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041115" comment="ImageMagick-extra-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041116" comment="libMagick++-7_Q16HDRI5-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041117" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041118" comment="libMagick++-devel-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041119" comment="libMagick++-devel-32bit-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041120" comment="libMagickCore-7_Q16HDRI10-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041121" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041122" comment="libMagickWand-7_Q16HDRI10-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041123" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041124" comment="perl-PerlMagick-7.1.2.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254296" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-147.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24868" ref_url="https://www.suse.com/security/cve/CVE-2026-24868/" source="CVE"/>
		<reference ref_id="CVE-2026-24869" ref_url="https://www.suse.com/security/cve/CVE-2026-24869/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-147.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24868/">CVE-2026-24868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24868">CVE-2026-24868 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24869/">CVE-2026-24869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24869">CVE-2026-24869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041125" comment="MozillaFirefox-147.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041126" comment="MozillaFirefox-branding-upstream-147.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041127" comment="MozillaFirefox-devel-147.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041128" comment="MozillaFirefox-translations-common-147.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041129" comment="MozillaFirefox-translations-other-147.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254297" version="1" class="patch">
	<metadata>
		<title>chromedriver-144.0.7559.109-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1504" ref_url="https://www.suse.com/security/cve/CVE-2026-1504/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-144.0.7559.109-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1504/">CVE-2026-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1504">CVE-2026-1504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041130" comment="chromedriver-144.0.7559.109-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041131" comment="chromium-144.0.7559.109-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254298" version="1" class="patch">
	<metadata>
		<title>fontforge-20251009-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269/" source="CVE"/>
		<reference ref_id="CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275/" source="CVE"/>
		<reference ref_id="CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20251009-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041132" comment="fontforge-20251009-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041133" comment="fontforge-devel-20251009-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041134" comment="fontforge-doc-20251009-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254299" version="1" class="patch">
	<metadata>
		<title>freerdp-3.21.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211/" source="CVE"/>
		<reference ref_id="CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658/" source="CVE"/>
		<reference ref_id="CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659/" source="CVE"/>
		<reference ref_id="CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660/" source="CVE"/>
		<reference ref_id="CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661/" source="CVE"/>
		<reference ref_id="CVE-2025-4478" ref_url="https://www.suse.com/security/cve/CVE-2025-4478/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.21.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4478/">CVE-2025-4478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4478">CVE-2025-4478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041135" comment="freerdp-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041136" comment="freerdp-devel-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041137" comment="freerdp-proxy-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041138" comment="freerdp-proxy-plugins-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041139" comment="freerdp-sdl-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041140" comment="freerdp-server-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041141" comment="freerdp-wayland-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041142" comment="libfreerdp-server-proxy3-3-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041143" comment="libfreerdp3-3-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041144" comment="librdtk0-0-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041145" comment="libuwac0-0-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041146" comment="libwinpr3-3-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041147" comment="rdtk0-devel-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041148" comment="uwac0-devel-3.21.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041149" comment="winpr-devel-3.21.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254300" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-3.9.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-3.9.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041150" comment="golang-github-prometheus-prometheus-3.9.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254301" version="1" class="patch">
	<metadata>
		<title>python311-django-storages-1.14.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39330" ref_url="https://www.suse.com/security/cve/CVE-2024-39330/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-django-storages-1.14.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39330/">CVE-2024-39330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39330">CVE-2024-39330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041151" comment="python311-django-storages-1.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041152" comment="python312-django-storages-1.14.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041153" comment="python313-django-storages-1.14.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254302" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041154" comment="python315-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041155" comment="python315-curses-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041156" comment="python315-dbm-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041157" comment="python315-idle-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041158" comment="python315-profiling-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041159" comment="python315-tk-3.15.0~a3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041160" comment="python315-x86-64-v3-3.15.0~a3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254303" version="1" class="patch">
	<metadata>
		<title>rekor-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2026-23831" ref_url="https://www.suse.com/security/cve/CVE-2026-23831/" source="CVE"/>
		<reference ref_id="CVE-2026-24117" ref_url="https://www.suse.com/security/cve/CVE-2026-24117/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23831/">CVE-2026-23831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23831">CVE-2026-23831 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24117/">CVE-2026-24117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24117">CVE-2026-24117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041161" comment="rekor-1.5.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254304" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0818" ref_url="https://www.suse.com/security/cve/CVE-2026-0818/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0818/">CVE-2026-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0818">CVE-2026-0818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041162" comment="MozillaThunderbird-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041163" comment="MozillaThunderbird-openpgp-librnp-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041164" comment="MozillaThunderbird-translations-common-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041165" comment="MozillaThunderbird-translations-other-140.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254305" version="1" class="patch">
	<metadata>
		<title>libmlt++-7-7-7.36.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-65834" ref_url="https://www.suse.com/security/cve/CVE-2025-65834/" source="CVE"/>
		<description>
These are all security issues fixed in the libmlt++-7-7-7.36.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65834/">CVE-2025-65834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65834">CVE-2025-65834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041668" comment="libmlt++-7-7-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041669" comment="libmlt-7-7-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041670" comment="libmlt-devel-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041671" comment="libmlt7-data-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041672" comment="libmlt7-module-qt6-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041673" comment="libmlt7-modules-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041674" comment="melt-7.36.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041675" comment="python3-mlt-7.36.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254306" version="1" class="patch">
	<metadata>
		<title>python311-PyNaCl-1.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-69277" ref_url="https://www.suse.com/security/cve/CVE-2025-69277/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyNaCl-1.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69277/">CVE-2025-69277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277">CVE-2025-69277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041676" comment="python311-PyNaCl-1.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041677" comment="python312-PyNaCl-1.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041678" comment="python313-PyNaCl-1.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254307" version="1" class="patch">
	<metadata>
		<title>trivy-0.69.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64702" ref_url="https://www.suse.com/security/cve/CVE-2025-64702/" source="CVE"/>
		<reference ref_id="CVE-2025-66564" ref_url="https://www.suse.com/security/cve/CVE-2025-66564/" source="CVE"/>
		<description>
These are all security issues fixed in the trivy-0.69.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64702/">CVE-2025-64702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64702">CVE-2025-64702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66564/">CVE-2025-66564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66564">CVE-2025-66564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041679" comment="trivy-0.69.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254308" version="1" class="patch">
	<metadata>
		<title>freerdp-3.22.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948/" source="CVE"/>
		<reference ref_id="CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491/" source="CVE"/>
		<reference ref_id="CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675/" source="CVE"/>
		<reference ref_id="CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676/" source="CVE"/>
		<reference ref_id="CVE-2026-24677" ref_url="https://www.suse.com/security/cve/CVE-2026-24677/" source="CVE"/>
		<reference ref_id="CVE-2026-24678" ref_url="https://www.suse.com/security/cve/CVE-2026-24678/" source="CVE"/>
		<reference ref_id="CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679/" source="CVE"/>
		<reference ref_id="CVE-2026-24680" ref_url="https://www.suse.com/security/cve/CVE-2026-24680/" source="CVE"/>
		<reference ref_id="CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681/" source="CVE"/>
		<reference ref_id="CVE-2026-24682" ref_url="https://www.suse.com/security/cve/CVE-2026-24682/" source="CVE"/>
		<reference ref_id="CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683/" source="CVE"/>
		<reference ref_id="CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.22.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24677/">CVE-2026-24677 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24677">CVE-2026-24677 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24678/">CVE-2026-24678 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24678">CVE-2026-24678 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24680/">CVE-2026-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24680">CVE-2026-24680 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24682/">CVE-2026-24682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24682">CVE-2026-24682 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041955" comment="freerdp-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041956" comment="freerdp-devel-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041957" comment="freerdp-proxy-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041958" comment="freerdp-proxy-plugins-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041959" comment="freerdp-sdl-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041960" comment="freerdp-server-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041961" comment="freerdp-wayland-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041962" comment="libfreerdp-server-proxy3-3-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041963" comment="libfreerdp3-3-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041964" comment="librdtk0-0-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041965" comment="libuwac0-0-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041966" comment="libwinpr3-3-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041967" comment="rdtk0-devel-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041968" comment="uwac0-devel-3.22.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041969" comment="winpr-devel-3.22.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254309" version="1" class="patch">
	<metadata>
		<title>java-11-openj9-11.0.30.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openj9-11.0.30.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041970" comment="java-11-openj9-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041971" comment="java-11-openj9-demo-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041972" comment="java-11-openj9-devel-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041973" comment="java-11-openj9-headless-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041974" comment="java-11-openj9-javadoc-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041975" comment="java-11-openj9-jmods-11.0.30.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041976" comment="java-11-openj9-src-11.0.30.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254310" version="1" class="patch">
	<metadata>
		<title>java-17-openj9-17.0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openj9-17.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041977" comment="java-17-openj9-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041978" comment="java-17-openj9-demo-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041979" comment="java-17-openj9-devel-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041980" comment="java-17-openj9-headless-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041981" comment="java-17-openj9-javadoc-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041982" comment="java-17-openj9-jmods-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041983" comment="java-17-openj9-src-17.0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254311" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openj9-1.8.0.482-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.482-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041984" comment="java-1_8_0-openj9-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041985" comment="java-1_8_0-openj9-accessibility-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041986" comment="java-1_8_0-openj9-demo-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041987" comment="java-1_8_0-openj9-devel-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041988" comment="java-1_8_0-openj9-headless-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041989" comment="java-1_8_0-openj9-javadoc-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041990" comment="java-1_8_0-openj9-src-1.8.0.482-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254312" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.482-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.482-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041991" comment="java-1_8_0-openjdk-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041992" comment="java-1_8_0-openjdk-accessibility-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041993" comment="java-1_8_0-openjdk-demo-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041994" comment="java-1_8_0-openjdk-devel-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041995" comment="java-1_8_0-openjdk-headless-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041996" comment="java-1_8_0-openjdk-javadoc-1.8.0.482-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041997" comment="java-1_8_0-openjdk-src-1.8.0.482-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254313" version="1" class="patch">
	<metadata>
		<title>java-21-openj9-21.0.10.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openj9-21.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041998" comment="java-21-openj9-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041999" comment="java-21-openj9-demo-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042000" comment="java-21-openj9-devel-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042001" comment="java-21-openj9-headless-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042002" comment="java-21-openj9-javadoc-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042003" comment="java-21-openj9-jmods-21.0.10.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042004" comment="java-21-openj9-src-21.0.10.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254314" version="1" class="patch">
	<metadata>
		<title>java-25-openj9-25.0.2.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<description>
These are all security issues fixed in the java-25-openj9-25.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042005" comment="java-25-openj9-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042006" comment="java-25-openj9-demo-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042007" comment="java-25-openj9-devel-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042008" comment="java-25-openj9-headless-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042009" comment="java-25-openj9-javadoc-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042010" comment="java-25-openj9-jmods-25.0.2.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042011" comment="java-25-openj9-src-25.0.2.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254315" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1536" ref_url="https://www.suse.com/security/cve/CVE-2026-1536/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-12.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1536/">CVE-2026-1536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1536">CVE-2026-1536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042012" comment="libsoup-3_0-0-3.6.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042013" comment="libsoup-3_0-0-32bit-3.6.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042014" comment="libsoup-devel-3.6.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042015" comment="libsoup-devel-32bit-3.6.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042016" comment="libsoup-lang-3.6.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042017" comment="typelib-1_0-Soup-3_0-3.6.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254316" version="1" class="patch">
	<metadata>
		<title>patch-2.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-45261" ref_url="https://www.suse.com/security/cve/CVE-2021-45261/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45261/">CVE-2021-45261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45261">CVE-2021-45261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042018" comment="patch-2.8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254317" version="1" class="patch">
	<metadata>
		<title>rizin-0.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22780" ref_url="https://www.suse.com/security/cve/CVE-2026-22780/" source="CVE"/>
		<description>
These are all security issues fixed in the rizin-0.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-22780/">CVE-2026-22780 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22780">CVE-2026-22780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042019" comment="rizin-0.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042020" comment="rizin-common-0.8.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042021" comment="rizin-devel-0.8.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254318" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2026-22045" ref_url="https://www.suse.com/security/cve/CVE-2026-22045/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22045/">CVE-2026-22045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22045">CVE-2026-22045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042022" comment="traefik-3.6.7-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254319" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.35-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54386" ref_url="https://www.suse.com/security/cve/CVE-2025-54386/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2025-66490" ref_url="https://www.suse.com/security/cve/CVE-2025-66490/" source="CVE"/>
		<reference ref_id="CVE-2026-22045" ref_url="https://www.suse.com/security/cve/CVE-2026-22045/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.35-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54386/">CVE-2025-54386 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54386">CVE-2025-54386 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-66490/">CVE-2025-66490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66490">CVE-2025-66490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22045/">CVE-2026-22045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22045">CVE-2026-22045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042023" comment="traefik2-2.11.35-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254320" version="1" class="patch">
	<metadata>
		<title>expat-2.7.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24515" ref_url="https://www.suse.com/security/cve/CVE-2026-24515/" source="CVE"/>
		<reference ref_id="CVE-2026-25210" ref_url="https://www.suse.com/security/cve/CVE-2026-25210/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.7.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24515/">CVE-2026-24515 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24515">CVE-2026-24515 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25210/">CVE-2026-25210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25210">CVE-2026-25210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042147" comment="expat-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042148" comment="libexpat-devel-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042149" comment="libexpat-devel-32bit-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042150" comment="libexpat1-2.7.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042151" comment="libexpat1-32bit-2.7.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254321" version="1" class="patch">
	<metadata>
		<title>python312-Django6-6.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13473" ref_url="https://www.suse.com/security/cve/CVE-2025-13473/" source="CVE"/>
		<reference ref_id="CVE-2025-14550" ref_url="https://www.suse.com/security/cve/CVE-2025-14550/" source="CVE"/>
		<reference ref_id="CVE-2026-1207" ref_url="https://www.suse.com/security/cve/CVE-2026-1207/" source="CVE"/>
		<reference ref_id="CVE-2026-1285" ref_url="https://www.suse.com/security/cve/CVE-2026-1285/" source="CVE"/>
		<reference ref_id="CVE-2026-1287" ref_url="https://www.suse.com/security/cve/CVE-2026-1287/" source="CVE"/>
		<reference ref_id="CVE-2026-1312" ref_url="https://www.suse.com/security/cve/CVE-2026-1312/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-Django6-6.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13473/">CVE-2025-13473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13473">CVE-2025-13473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-14550/">CVE-2025-14550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1207/">CVE-2026-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1207">CVE-2026-1207 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1285/">CVE-2026-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1285">CVE-2026-1285 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1287/">CVE-2026-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1287">CVE-2026-1287 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1312/">CVE-2026-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1312">CVE-2026-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042152" comment="python312-Django6-6.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042153" comment="python313-Django6-6.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254322" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68670" ref_url="https://www.suse.com/security/cve/CVE-2025-68670/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68670/">CVE-2025-68670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68670">CVE-2025-68670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042154" comment="libpainter0-0.9.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042155" comment="librfxencode0-0.9.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042156" comment="xrdp-0.9.27-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042157" comment="xrdp-devel-0.9.27-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254323" version="1" class="patch">
	<metadata>
		<title>cockpit-machines-346-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-machines-346-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042244" comment="cockpit-machines-346-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254324" version="1" class="patch">
	<metadata>
		<title>cockpit-packages-4.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-packages-4.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042245" comment="cockpit-packages-4.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254325" version="1" class="patch">
	<metadata>
		<title>cockpit-repos-4.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-repos-4.7-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042246" comment="cockpit-repos-4.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254326" version="1" class="patch">
	<metadata>
		<title>cockpit-subscriptions-14.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-subscriptions-14.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042247" comment="cockpit-subscriptions-14.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254327" version="1" class="patch">
	<metadata>
		<title>python311-wheel-0.46.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-wheel-0.46.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042248" comment="python311-wheel-0.46.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042249" comment="python312-wheel-0.46.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042250" comment="python313-wheel-0.46.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254328" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12781" ref_url="https://www.suse.com/security/cve/CVE-2025-12781/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12781/">CVE-2025-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12781">CVE-2025-12781 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042251" comment="python315-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042252" comment="python315-curses-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042253" comment="python315-dbm-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042254" comment="python315-idle-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042255" comment="python315-profiling-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042256" comment="python315-tk-3.15.0~a3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042257" comment="python315-x86-64-v3-3.15.0~a3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254329" version="1" class="patch">
	<metadata>
		<title>chromedriver-144.0.7559.132-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1861" ref_url="https://www.suse.com/security/cve/CVE-2026-1861/" source="CVE"/>
		<reference ref_id="CVE-2026-1862" ref_url="https://www.suse.com/security/cve/CVE-2026-1862/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-144.0.7559.132-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1861/">CVE-2026-1861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1861">CVE-2026-1861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1862/">CVE-2026-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1862">CVE-2026-1862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042328" comment="chromedriver-144.0.7559.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042329" comment="chromium-144.0.7559.132-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254330" version="1" class="patch">
	<metadata>
		<title>cockpit-354-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-354-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042330" comment="cockpit-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042331" comment="cockpit-bridge-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042332" comment="cockpit-devel-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042333" comment="cockpit-doc-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042334" comment="cockpit-firewalld-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042335" comment="cockpit-kdump-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042336" comment="cockpit-networkmanager-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042337" comment="cockpit-packagekit-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042338" comment="cockpit-selinux-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042339" comment="cockpit-storaged-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042340" comment="cockpit-system-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042341" comment="cockpit-ws-354-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042342" comment="cockpit-ws-selinux-354-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254331" version="1" class="patch">
	<metadata>
		<title>cockpit-podman-119.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-podman-119.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042343" comment="cockpit-podman-119.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254332" version="1" class="patch">
	<metadata>
		<title>micropython-1.26.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1998" ref_url="https://www.suse.com/security/cve/CVE-2026-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the micropython-1.26.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1998/">CVE-2026-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1998">CVE-2026-1998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042344" comment="micropython-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042345" comment="mpremote-1.26.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042346" comment="mpy-tools-1.26.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254333" version="1" class="patch">
	<metadata>
		<title>libsnmp45-32bit-5.9.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp45-32bit-5.9.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042347" comment="libsnmp45-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042348" comment="libsnmp45-32bit-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042349" comment="net-snmp-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042350" comment="net-snmp-devel-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042351" comment="net-snmp-devel-32bit-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042352" comment="perl-SNMP-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042353" comment="python311-net-snmp-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042354" comment="python312-net-snmp-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042355" comment="python313-net-snmp-5.9.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042356" comment="snmp-mibs-5.9.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254334" version="1" class="patch">
	<metadata>
		<title>nginx-1.29.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.29.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042357" comment="nginx-1.29.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042358" comment="nginx-source-1.29.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254335" version="1" class="patch">
	<metadata>
		<title>opencloud-server-5.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23989" ref_url="https://www.suse.com/security/cve/CVE-2026-23989/" source="CVE"/>
		<description>
These are all security issues fixed in the opencloud-server-5.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-23989/">CVE-2026-23989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23989">CVE-2026-23989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042359" comment="opencloud-server-5.0.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254336" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13473" ref_url="https://www.suse.com/security/cve/CVE-2025-13473/" source="CVE"/>
		<reference ref_id="CVE-2025-14550" ref_url="https://www.suse.com/security/cve/CVE-2025-14550/" source="CVE"/>
		<reference ref_id="CVE-2026-1207" ref_url="https://www.suse.com/security/cve/CVE-2026-1207/" source="CVE"/>
		<reference ref_id="CVE-2026-1285" ref_url="https://www.suse.com/security/cve/CVE-2026-1285/" source="CVE"/>
		<reference ref_id="CVE-2026-1287" ref_url="https://www.suse.com/security/cve/CVE-2026-1287/" source="CVE"/>
		<reference ref_id="CVE-2026-1312" ref_url="https://www.suse.com/security/cve/CVE-2026-1312/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13473/">CVE-2025-13473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13473">CVE-2025-13473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-14550/">CVE-2025-14550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1207/">CVE-2026-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1207">CVE-2026-1207 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1285/">CVE-2026-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1285">CVE-2026-1285 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1287/">CVE-2026-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1287">CVE-2026-1287 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1312/">CVE-2026-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1312">CVE-2026-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042360" comment="python311-Django-5.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042361" comment="python312-Django-5.2.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042362" comment="python313-Django-5.2.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254337" version="1" class="patch">
	<metadata>
		<title>python311-azure-core-1.38.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21226" ref_url="https://www.suse.com/security/cve/CVE-2026-21226/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-azure-core-1.38.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21226/">CVE-2026-21226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21226">CVE-2026-21226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042363" comment="python311-azure-core-1.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042364" comment="python312-azure-core-1.38.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042365" comment="python313-azure-core-1.38.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254338" version="1" class="patch">
	<metadata>
		<title>localsearch-3.10.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1764" ref_url="https://www.suse.com/security/cve/CVE-2026-1764/" source="CVE"/>
		<reference ref_id="CVE-2026-1765" ref_url="https://www.suse.com/security/cve/CVE-2026-1765/" source="CVE"/>
		<reference ref_id="CVE-2026-1766" ref_url="https://www.suse.com/security/cve/CVE-2026-1766/" source="CVE"/>
		<reference ref_id="CVE-2026-1767" ref_url="https://www.suse.com/security/cve/CVE-2026-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the localsearch-3.10.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-07"/>
	<updated date="2026-02-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1764/">CVE-2026-1764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1764">CVE-2026-1764 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1765/">CVE-2026-1765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1765">CVE-2026-1765 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1766/">CVE-2026-1766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1766">CVE-2026-1766 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1767/">CVE-2026-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1767">CVE-2026-1767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042369" comment="localsearch-3.10.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042370" comment="localsearch-lang-3.10.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254339" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042658" comment="go1.24-1.24.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042659" comment="go1.24-doc-1.24.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042660" comment="go1.24-libstd-1.24.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042661" comment="go1.24-race-1.24.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254340" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042662" comment="go1.25-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042663" comment="go1.25-doc-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042664" comment="go1.25-libstd-1.25.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042665" comment="go1.25-race-1.25.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254341" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.14.0+0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1709" ref_url="https://www.suse.com/security/cve/CVE-2026-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.14.0+0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1709/">CVE-2026-1709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1709">CVE-2026-1709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042666" comment="keylime-config-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042667" comment="keylime-firewalld-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042668" comment="keylime-logrotate-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042669" comment="keylime-registrar-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042670" comment="keylime-tenant-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042671" comment="keylime-tpm_cert_store-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042672" comment="keylime-verifier-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042673" comment="python311-keylime-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042674" comment="python312-keylime-7.14.0+0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042675" comment="python313-keylime-7.14.0+0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254342" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-4476" ref_url="https://www.suse.com/security/cve/CVE-2025-4476/" source="CVE"/>
		<reference ref_id="CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-15.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4476/">CVE-2025-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4476">CVE-2025-4476 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042676" comment="libsoup-2_4-1-2.74.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042677" comment="libsoup-2_4-1-32bit-2.74.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042678" comment="libsoup2-devel-2.74.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042679" comment="libsoup2-devel-32bit-2.74.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042680" comment="libsoup2-lang-2.74.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042681" comment="typelib-1_0-Soup-2_4-2.74.3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254343" version="1" class="patch">
	<metadata>
		<title>libxml2-16-2.14.5-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="CVE-2026-1757" ref_url="https://www.suse.com/security/cve/CVE-2026-1757/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-16-2.14.5-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1757/">CVE-2026-1757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1757">CVE-2026-1757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042682" comment="libxml2-16-2.14.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042683" comment="libxml2-16-32bit-2.14.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042684" comment="libxml2-devel-2.14.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042685" comment="libxml2-devel-32bit-2.14.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042686" comment="libxml2-doc-2.14.5-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042687" comment="libxml2-tools-2.14.5-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254344" version="1" class="patch">
	<metadata>
		<title>openQA-5.1770718745.ce2072d3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the openQA-5.1770718745.ce2072d3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042688" comment="openQA-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042689" comment="openQA-auto-update-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042690" comment="openQA-bootstrap-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042691" comment="openQA-client-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042692" comment="openQA-common-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042693" comment="openQA-continuous-update-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042694" comment="openQA-devel-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042695" comment="openQA-doc-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042696" comment="openQA-local-db-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042697" comment="openQA-mcp-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042698" comment="openQA-munin-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042699" comment="openQA-python-scripts-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042700" comment="openQA-single-instance-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042701" comment="openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042702" comment="openQA-worker-5.1770718745.ce2072d3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254345" version="1" class="patch">
	<metadata>
		<title>libp11-kit0-0.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2100" ref_url="https://www.suse.com/security/cve/CVE-2026-2100/" source="CVE"/>
		<description>
These are all security issues fixed in the libp11-kit0-0.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2100/">CVE-2026-2100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2100">CVE-2026-2100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042703" comment="libp11-kit0-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042704" comment="libp11-kit0-32bit-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042705" comment="p11-kit-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042706" comment="p11-kit-32bit-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042707" comment="p11-kit-devel-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042708" comment="p11-kit-nss-trust-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042709" comment="p11-kit-nss-trust-32bit-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042710" comment="p11-kit-server-0.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042711" comment="p11-kit-tools-0.26.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254346" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.8+116-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.8+116-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042712" comment="keylime-ima-policy-0.2.8+116-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042713" comment="rust-keylime-0.2.8+116-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254347" version="1" class="patch">
	<metadata>
		<title>lemon-3.51.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7709" ref_url="https://www.suse.com/security/cve/CVE-2025-7709/" source="CVE"/>
		<description>
These are all security issues fixed in the lemon-3.51.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-7709/">CVE-2025-7709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7709">CVE-2025-7709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042714" comment="lemon-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042715" comment="libsqlite3-0-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042716" comment="libsqlite3-0-32bit-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042717" comment="libsqlite3-0-x86-64-v3-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042718" comment="sqlite3-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042719" comment="sqlite3-devel-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042720" comment="sqlite3-doc-3.51.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042721" comment="sqlite3-tcl-3.51.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254348" version="1" class="patch">
	<metadata>
		<title>wicked2nm-1.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked2nm-1.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042722" comment="wicked2nm-1.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254349" version="1" class="patch">
	<metadata>
		<title>apptainer-1.4.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
These are all security issues fixed in the apptainer-1.4.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043300" comment="apptainer-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043301" comment="apptainer-leap-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043302" comment="apptainer-sle15_7-1.4.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043303" comment="apptainer-sle16-1.4.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254350" version="1" class="patch">
	<metadata>
		<title>assimp-devel-6.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2756" ref_url="https://www.suse.com/security/cve/CVE-2025-2756/" source="CVE"/>
		<reference ref_id="CVE-2025-5167" ref_url="https://www.suse.com/security/cve/CVE-2025-5167/" source="CVE"/>
		<reference ref_id="CVE-2025-5200" ref_url="https://www.suse.com/security/cve/CVE-2025-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the assimp-devel-6.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2756/">CVE-2025-2756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2756">CVE-2025-2756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5167/">CVE-2025-5167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5167">CVE-2025-5167 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5200/">CVE-2025-5200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5200">CVE-2025-5200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043304" comment="assimp-devel-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043305" comment="libassimp6-6.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254351" version="1" class="patch">
	<metadata>
		<title>cargo-audit-0.22.1~git0.efcde93-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-0.22.1~git0.efcde93-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043306" comment="cargo-audit-0.22.1~git0.efcde93-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254352" version="1" class="patch">
	<metadata>
		<title>freerdp2-2.11.7-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211/" source="CVE"/>
		<reference ref_id="CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852/" source="CVE"/>
		<reference ref_id="CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854/" source="CVE"/>
		<reference ref_id="CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856/" source="CVE"/>
		<reference ref_id="CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859/" source="CVE"/>
		<reference ref_id="CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530/" source="CVE"/>
		<reference ref_id="CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531/" source="CVE"/>
		<reference ref_id="CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532/" source="CVE"/>
		<reference ref_id="CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-2.11.7-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043307" comment="freerdp2-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043308" comment="freerdp2-devel-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043309" comment="freerdp2-proxy-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043310" comment="freerdp2-server-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043311" comment="libfreerdp2-2-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043312" comment="libwinpr2-2-2.11.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043313" comment="winpr2-devel-2.11.7-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254353" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831/" source="CVE"/>
		<reference ref_id="CVE-2026-1584" ref_url="https://www.suse.com/security/cve/CVE-2026-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1584/">CVE-2026-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1584">CVE-2026-1584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043314" comment="gnutls-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043315" comment="libgnutls-dane-devel-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043316" comment="libgnutls-dane0-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043317" comment="libgnutls-devel-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043318" comment="libgnutls-devel-32bit-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043319" comment="libgnutls-devel-doc-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043320" comment="libgnutls30-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043321" comment="libgnutls30-32bit-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043322" comment="libgnutlsxx-devel-3.8.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043323" comment="libgnutlsxx30-3.8.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254354" version="1" class="patch">
	<metadata>
		<title>libmunge2-0.5.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25506" ref_url="https://www.suse.com/security/cve/CVE-2026-25506/" source="CVE"/>
		<description>
These are all security issues fixed in the libmunge2-0.5.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-25506/">CVE-2026-25506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25506">CVE-2026-25506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043324" comment="libmunge2-0.5.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043325" comment="munge-0.5.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043326" comment="munge-devel-0.5.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254355" version="1" class="patch">
	<metadata>
		<title>python311-maturin-1.11.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-maturin-1.11.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043327" comment="python311-maturin-1.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043328" comment="python312-maturin-1.11.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043329" comment="python313-maturin-1.11.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254356" version="1" class="patch">
	<metadata>
		<title>rustup-1.28.2~0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.28.2~0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043330" comment="rustup-1.28.2~0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254357" version="1" class="patch">
	<metadata>
		<title>sccache-0.13.0~1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.13.0~1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043331" comment="sccache-0.13.0~1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254358" version="1" class="patch">
	<metadata>
		<title>snpguest-0.10.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the snpguest-0.10.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043332" comment="snpguest-0.10.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254359" version="1" class="patch">
	<metadata>
		<title>build-20260202-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-22038" ref_url="https://www.suse.com/security/cve/CVE-2024-22038/" source="CVE"/>
		<description>
These are all security issues fixed in the build-20260202-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-22038/">CVE-2024-22038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22038">CVE-2024-22038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043576" comment="build-20260202-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043577" comment="build-initvm-i586-20260202-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043578" comment="build-initvm-x86_64-20260202-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043579" comment="build-mkbaselibs-20260202-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043580" comment="build-mkdrpms-20260202-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254360" version="1" class="patch">
	<metadata>
		<title>cargo-auditable-0.7.2~0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-auditable-0.7.2~0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043581" comment="cargo-auditable-0.7.2~0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254361" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.10.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.10.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043582" comment="cargo-c-0.10.15-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254362" version="1" class="patch">
	<metadata>
		<title>gnome-remote-desktop-49.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-5024" ref_url="https://www.suse.com/security/cve/CVE-2025-5024/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-remote-desktop-49.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-5024/">CVE-2025-5024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5024">CVE-2025-5024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043583" comment="gnome-remote-desktop-49.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043584" comment="gnome-remote-desktop-lang-49.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254363" version="1" class="patch">
	<metadata>
		<title>haproxy-3.3.3+git0.465d8e2fc-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26081" ref_url="https://www.suse.com/security/cve/CVE-2026-26081/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-3.3.3+git0.465d8e2fc-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26081/">CVE-2026-26081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26081">CVE-2026-26081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043585" comment="haproxy-3.3.3+git0.465d8e2fc-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254364" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.55-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.55-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043586" comment="libpng16-16-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043587" comment="libpng16-16-32bit-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043588" comment="libpng16-16-x86-64-v3-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043589" comment="libpng16-compat-devel-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043590" comment="libpng16-compat-devel-32bit-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043591" comment="libpng16-compat-devel-x86-64-v3-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043592" comment="libpng16-devel-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043593" comment="libpng16-devel-32bit-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043594" comment="libpng16-devel-x86-64-v3-1.6.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043595" comment="libpng16-tools-1.6.55-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254365" version="1" class="patch">
	<metadata>
		<title>libowncloudsync-devel-6.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-64441" ref_url="https://www.suse.com/security/cve/CVE-2025-64441/" source="CVE"/>
		<description>
These are all security issues fixed in the libowncloudsync-devel-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64441/">CVE-2025-64441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64441">CVE-2025-64441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043596" comment="libowncloudsync-devel-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043597" comment="libowncloudsync0-6.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043598" comment="owncloud-client-6.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254366" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043599" comment="postgresql14-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043600" comment="postgresql14-contrib-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043601" comment="postgresql14-devel-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043602" comment="postgresql14-docs-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043603" comment="postgresql14-llvmjit-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043604" comment="postgresql14-llvmjit-devel-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043605" comment="postgresql14-plperl-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043606" comment="postgresql14-plpython-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043607" comment="postgresql14-pltcl-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043608" comment="postgresql14-server-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043609" comment="postgresql14-server-devel-14.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043610" comment="postgresql14-test-14.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254367" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043611" comment="postgresql15-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043612" comment="postgresql15-contrib-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043613" comment="postgresql15-devel-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043614" comment="postgresql15-docs-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043615" comment="postgresql15-llvmjit-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043616" comment="postgresql15-llvmjit-devel-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043617" comment="postgresql15-plperl-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043618" comment="postgresql15-plpython-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043619" comment="postgresql15-pltcl-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043620" comment="postgresql15-server-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043621" comment="postgresql15-server-devel-15.16-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043622" comment="postgresql15-test-15.16-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254368" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043623" comment="postgresql16-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043624" comment="postgresql16-contrib-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043625" comment="postgresql16-devel-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043626" comment="postgresql16-docs-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043627" comment="postgresql16-llvmjit-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043628" comment="postgresql16-llvmjit-devel-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043629" comment="postgresql16-plperl-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043630" comment="postgresql16-plpython-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043631" comment="postgresql16-pltcl-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043632" comment="postgresql16-server-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043633" comment="postgresql16-server-devel-16.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043634" comment="postgresql16-test-16.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254369" version="1" class="patch">
	<metadata>
		<title>postgresql17-17.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql17-17.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043635" comment="postgresql17-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043636" comment="postgresql17-contrib-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043637" comment="postgresql17-devel-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043638" comment="postgresql17-docs-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043639" comment="postgresql17-llvmjit-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043640" comment="postgresql17-llvmjit-devel-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043641" comment="postgresql17-plperl-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043642" comment="postgresql17-plpython-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043643" comment="postgresql17-pltcl-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043644" comment="postgresql17-server-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043645" comment="postgresql17-server-devel-17.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043646" comment="postgresql17-test-17.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254370" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20260213-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-27591" ref_url="https://www.suse.com/security/cve/CVE-2025-27591/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20260213-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27591/">CVE-2025-27591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27591">CVE-2025-27591 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043913" comment="cargo-audit-advisory-db-20260213-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254371" version="1" class="patch">
	<metadata>
		<title>gimp-3.0.8-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2239" ref_url="https://www.suse.com/security/cve/CVE-2026-2239/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-3.0.8-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2239/">CVE-2026-2239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2239">CVE-2026-2239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043914" comment="gimp-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043915" comment="gimp-devel-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043916" comment="gimp-extension-goat-excercises-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043917" comment="gimp-lang-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043918" comment="gimp-plugin-aa-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043919" comment="gimp-plugin-python3-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043920" comment="gimp-vala-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043921" comment="libgimp-3_0-0-3.0.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043922" comment="libgimpui-3_0-0-3.0.8-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254372" version="1" class="patch">
	<metadata>
		<title>matrix-synapse-1.147.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24044" ref_url="https://www.suse.com/security/cve/CVE-2026-24044/" source="CVE"/>
		<description>
These are all security issues fixed in the matrix-synapse-1.147.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-24044/">CVE-2026-24044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24044">CVE-2026-24044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043923" comment="matrix-synapse-1.147.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254373" version="1" class="patch">
	<metadata>
		<title>libecpg6-18.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="CVE-2026-2007" ref_url="https://www.suse.com/security/cve/CVE-2026-2007/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-18.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-2007/">CVE-2026-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2007">CVE-2026-2007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043924" comment="libecpg6-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043925" comment="libecpg6-32bit-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043926" comment="libpq5-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043927" comment="libpq5-32bit-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043928" comment="postgresql18-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043929" comment="postgresql18-contrib-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043930" comment="postgresql18-devel-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043931" comment="postgresql18-docs-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043932" comment="postgresql18-llvmjit-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043933" comment="postgresql18-llvmjit-devel-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043934" comment="postgresql18-plperl-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043935" comment="postgresql18-plpython-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043936" comment="postgresql18-pltcl-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043937" comment="postgresql18-server-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043938" comment="postgresql18-server-devel-18.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043939" comment="postgresql18-test-18.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254374" version="1" class="patch">
	<metadata>
		<title>python311-Pillow-12.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25990" ref_url="https://www.suse.com/security/cve/CVE-2026-25990/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Pillow-12.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25990/">CVE-2026-25990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25990">CVE-2026-25990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043940" comment="python311-Pillow-12.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043941" comment="python311-Pillow-tk-12.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043942" comment="python312-Pillow-12.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043943" comment="python312-Pillow-tk-12.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043944" comment="python313-Pillow-12.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043945" comment="python313-Pillow-tk-12.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254375" version="1" class="patch">
	<metadata>
		<title>python311-pymssql-2.3.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pymssql-2.3.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043946" comment="python311-pymssql-2.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043947" comment="python312-pymssql-2.3.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043948" comment="python313-pymssql-2.3.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254376" version="1" class="patch">
	<metadata>
		<title>python310-3.10.19-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.19-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043949" comment="python310-3.10.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043950" comment="python310-32bit-3.10.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043951" comment="python310-curses-3.10.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043952" comment="python310-dbm-3.10.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043953" comment="python310-idle-3.10.19-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043954" comment="python310-tk-3.10.19-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254377" version="1" class="patch">
	<metadata>
		<title>chromedriver-145.0.7632.45-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2313" ref_url="https://www.suse.com/security/cve/CVE-2026-2313/" source="CVE"/>
		<reference ref_id="CVE-2026-2314" ref_url="https://www.suse.com/security/cve/CVE-2026-2314/" source="CVE"/>
		<reference ref_id="CVE-2026-2315" ref_url="https://www.suse.com/security/cve/CVE-2026-2315/" source="CVE"/>
		<reference ref_id="CVE-2026-2316" ref_url="https://www.suse.com/security/cve/CVE-2026-2316/" source="CVE"/>
		<reference ref_id="CVE-2026-2317" ref_url="https://www.suse.com/security/cve/CVE-2026-2317/" source="CVE"/>
		<reference ref_id="CVE-2026-2318" ref_url="https://www.suse.com/security/cve/CVE-2026-2318/" source="CVE"/>
		<reference ref_id="CVE-2026-2319" ref_url="https://www.suse.com/security/cve/CVE-2026-2319/" source="CVE"/>
		<reference ref_id="CVE-2026-2320" ref_url="https://www.suse.com/security/cve/CVE-2026-2320/" source="CVE"/>
		<reference ref_id="CVE-2026-2321" ref_url="https://www.suse.com/security/cve/CVE-2026-2321/" source="CVE"/>
		<reference ref_id="CVE-2026-2322" ref_url="https://www.suse.com/security/cve/CVE-2026-2322/" source="CVE"/>
		<reference ref_id="CVE-2026-2323" ref_url="https://www.suse.com/security/cve/CVE-2026-2323/" source="CVE"/>
		<reference ref_id="CVE-2026-2441" ref_url="https://www.suse.com/security/cve/CVE-2026-2441/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-145.0.7632.45-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2313/">CVE-2026-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2313">CVE-2026-2313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2314/">CVE-2026-2314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2314">CVE-2026-2314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2315/">CVE-2026-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2315">CVE-2026-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2316/">CVE-2026-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2316">CVE-2026-2316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2317/">CVE-2026-2317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2317">CVE-2026-2317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2318/">CVE-2026-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2318">CVE-2026-2318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2319/">CVE-2026-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2319">CVE-2026-2319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2320/">CVE-2026-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2320">CVE-2026-2320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2321/">CVE-2026-2321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2321">CVE-2026-2321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2322/">CVE-2026-2322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2322">CVE-2026-2322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2323/">CVE-2026-2323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2323">CVE-2026-2323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2441/">CVE-2026-2441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2441">CVE-2026-2441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043955" comment="chromedriver-145.0.7632.45-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043956" comment="chromium-145.0.7632.45-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254378" version="1" class="patch">
	<metadata>
		<title>himmelblau-2.3.5+git0.9dd526c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-2.3.5+git0.9dd526c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043957" comment="himmelblau-2.3.5+git0.9dd526c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043958" comment="himmelblau-qr-greeter-2.3.5+git0.9dd526c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043959" comment="himmelblau-sshd-config-2.3.5+git0.9dd526c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043960" comment="himmelblau-sso-2.3.5+git0.9dd526c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043961" comment="libnss_himmelblau2-2.3.5+git0.9dd526c-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043962" comment="pam-himmelblau-2.3.5+git0.9dd526c-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254379" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.11.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0964" ref_url="https://www.suse.com/security/cve/CVE-2026-0964/" source="CVE"/>
		<reference ref_id="CVE-2026-0965" ref_url="https://www.suse.com/security/cve/CVE-2026-0965/" source="CVE"/>
		<reference ref_id="CVE-2026-0966" ref_url="https://www.suse.com/security/cve/CVE-2026-0966/" source="CVE"/>
		<reference ref_id="CVE-2026-0967" ref_url="https://www.suse.com/security/cve/CVE-2026-0967/" source="CVE"/>
		<reference ref_id="CVE-2026-0968" ref_url="https://www.suse.com/security/cve/CVE-2026-0968/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.11.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-0964/">CVE-2026-0964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0964">CVE-2026-0964 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-0965/">CVE-2026-0965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0965">CVE-2026-0965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-0966/">CVE-2026-0966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0966">CVE-2026-0966 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0967/">CVE-2026-0967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0967">CVE-2026-0967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0968/">CVE-2026-0968 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0968">CVE-2026-0968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043963" comment="libssh-config-0.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043964" comment="libssh-devel-0.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043965" comment="libssh4-0.11.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043966" comment="libssh4-32bit-0.11.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254380" version="1" class="patch">
	<metadata>
		<title>openjfx-17.0.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21947" ref_url="https://www.suse.com/security/cve/CVE-2026-21947/" source="CVE"/>
		<description>
These are all security issues fixed in the openjfx-17.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21947/">CVE-2026-21947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21947">CVE-2026-21947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043967" comment="openjfx-17.0.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043968" comment="openjfx-devel-17.0.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254381" version="1" class="patch">
	<metadata>
		<title>python311-cryptography-46.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26007" ref_url="https://www.suse.com/security/cve/CVE-2026-26007/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cryptography-46.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26007/">CVE-2026-26007 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26007">CVE-2026-26007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043969" comment="python311-cryptography-46.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043970" comment="python312-cryptography-46.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043971" comment="python313-cryptography-46.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254382" version="1" class="patch">
	<metadata>
		<title>python314-3.14.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12781" ref_url="https://www.suse.com/security/cve/CVE-2025-12781/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12781/">CVE-2025-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12781">CVE-2025-12781 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043972" comment="python314-3.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043973" comment="python314-curses-3.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043974" comment="python314-dbm-3.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043975" comment="python314-idle-3.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043976" comment="python314-tk-3.14.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043977" comment="python314-x86-64-v3-3.14.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254383" version="1" class="patch">
	<metadata>
		<title>frr-10.2.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61099" ref_url="https://www.suse.com/security/cve/CVE-2025-61099/" source="CVE"/>
		<reference ref_id="CVE-2025-61100" ref_url="https://www.suse.com/security/cve/CVE-2025-61100/" source="CVE"/>
		<reference ref_id="CVE-2025-61104" ref_url="https://www.suse.com/security/cve/CVE-2025-61104/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-10.2.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61099/">CVE-2025-61099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61099">CVE-2025-61099 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61100/">CVE-2025-61100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61100">CVE-2025-61100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61104/">CVE-2025-61104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61104">CVE-2025-61104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044106" comment="frr-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044107" comment="frr-devel-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044108" comment="libfrr0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044109" comment="libfrr_pb0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044110" comment="libfrrcares0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044111" comment="libfrrfpm_pb0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044112" comment="libfrrospfapiclient0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044113" comment="libfrrsnmp0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044114" comment="libfrrzmq0-10.2.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044115" comment="libmgmt_be_nb0-10.2.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254384" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369/" source="CVE"/>
		<reference ref_id="CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-13.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044116" comment="libsoup-3_0-0-3.6.5-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044117" comment="libsoup-3_0-0-32bit-3.6.5-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044118" comment="libsoup-devel-3.6.5-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044119" comment="libsoup-devel-32bit-3.6.5-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044120" comment="libsoup-lang-3.6.5-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044121" comment="typelib-1_0-Soup-3_0-3.6.5-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254385" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369/" source="CVE"/>
		<reference ref_id="CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-16.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044122" comment="libsoup-2_4-1-2.74.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044123" comment="libsoup-2_4-1-32bit-2.74.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044124" comment="libsoup2-devel-2.74.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044125" comment="libsoup2-devel-32bit-2.74.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044126" comment="libsoup2-lang-2.74.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044127" comment="typelib-1_0-Soup-2_4-2.74.3-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254386" version="1" class="patch">
	<metadata>
		<title>python311-pip-26.0.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1703" ref_url="https://www.suse.com/security/cve/CVE-2026-1703/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pip-26.0.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1703/">CVE-2026-1703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1703">CVE-2026-1703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044128" comment="python311-pip-26.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044129" comment="python311-pip-wheel-26.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044130" comment="python312-pip-26.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044131" comment="python312-pip-wheel-26.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044132" comment="python313-pip-26.0.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044133" comment="python313-pip-wheel-26.0.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254387" version="1" class="patch">
	<metadata>
		<title>azure-cli-core-2.83.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-24049" ref_url="https://www.suse.com/security/cve/CVE-2025-24049/" source="CVE"/>
		<description>
These are all security issues fixed in the azure-cli-core-2.83.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24049/">CVE-2025-24049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24049">CVE-2025-24049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044238" comment="azure-cli-core-2.83.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254388" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044239" comment="firefox-esr-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044240" comment="firefox-esr-branding-upstream-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044241" comment="firefox-esr-translations-common-140.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044242" comment="firefox-esr-translations-other-140.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254389" version="1" class="patch">
	<metadata>
		<title>libxml2-16-2.14.5-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8732" ref_url="https://www.suse.com/security/cve/CVE-2025-8732/" source="CVE"/>
		<reference ref_id="CVE-2026-0990" ref_url="https://www.suse.com/security/cve/CVE-2026-0990/" source="CVE"/>
		<reference ref_id="CVE-2026-0992" ref_url="https://www.suse.com/security/cve/CVE-2026-0992/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-16-2.14.5-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8732/">CVE-2025-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8732">CVE-2025-8732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0990/">CVE-2026-0990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0990">CVE-2026-0990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0992/">CVE-2026-0992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0992">CVE-2026-0992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044243" comment="libxml2-16-2.14.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044244" comment="libxml2-16-32bit-2.14.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044245" comment="libxml2-devel-2.14.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044246" comment="libxml2-devel-32bit-2.14.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044247" comment="libxml2-doc-2.14.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044248" comment="libxml2-tools-2.14.5-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254390" version="1" class="patch">
	<metadata>
		<title>mupdf-1.27.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55780" ref_url="https://www.suse.com/security/cve/CVE-2025-55780/" source="CVE"/>
		<reference ref_id="CVE-2026-25556" ref_url="https://www.suse.com/security/cve/CVE-2026-25556/" source="CVE"/>
		<description>
These are all security issues fixed in the mupdf-1.27.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55780/">CVE-2025-55780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55780">CVE-2025-55780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-25556/">CVE-2026-25556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25556">CVE-2026-25556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044249" comment="mupdf-1.27.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044250" comment="mupdf-devel-static-1.27.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254391" version="1" class="patch">
	<metadata>
		<title>owntone-29.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-63648" ref_url="https://www.suse.com/security/cve/CVE-2025-63648/" source="CVE"/>
		<description>
These are all security issues fixed in the owntone-29.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-63648/">CVE-2025-63648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-63648">CVE-2025-63648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044251" comment="owntone-29.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254392" version="1" class="patch">
	<metadata>
		<title>python311-asgiref-3.11.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14550" ref_url="https://www.suse.com/security/cve/CVE-2025-14550/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-asgiref-3.11.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-14550/">CVE-2025-14550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044252" comment="python311-asgiref-3.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044253" comment="python312-asgiref-3.11.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044254" comment="python313-asgiref-3.11.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254393" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25949" ref_url="https://www.suse.com/security/cve/CVE-2026-25949/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25949/">CVE-2026-25949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25949">CVE-2026-25949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044255" comment="traefik-3.6.8-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254394" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.7.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.7.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044308" comment="MozillaThunderbird-140.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044309" comment="MozillaThunderbird-openpgp-librnp-140.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044310" comment="MozillaThunderbird-translations-common-140.7.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044311" comment="MozillaThunderbird-translations-other-140.7.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254395" version="1" class="patch">
	<metadata>
		<title>dnsdist-2.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-8671" ref_url="https://www.suse.com/security/cve/CVE-2025-8671/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-2.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8671/">CVE-2025-8671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8671">CVE-2025-8671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044312" comment="dnsdist-2.0.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254396" version="1" class="patch">
	<metadata>
		<title>istioctl-1.28.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the istioctl-1.28.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044313" comment="istioctl-1.28.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044314" comment="istioctl-bash-completion-1.28.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044315" comment="istioctl-zsh-completion-1.28.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254397" version="1" class="patch">
	<metadata>
		<title>python311-3.11.14-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-12781" ref_url="https://www.suse.com/security/cve/CVE-2025-12781/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.14-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12781/">CVE-2025-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12781">CVE-2025-12781 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044316" comment="python311-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044317" comment="python311-32bit-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044318" comment="python311-curses-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044319" comment="python311-dbm-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044320" comment="python311-idle-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044321" comment="python311-tk-3.11.14-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044322" comment="python311-x86-64-v3-3.11.14-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254398" version="1" class="patch">
	<metadata>
		<title>python312-3.12.12-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-12781" ref_url="https://www.suse.com/security/cve/CVE-2025-12781/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.12-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12781/">CVE-2025-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12781">CVE-2025-12781 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044323" comment="python312-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044324" comment="python312-32bit-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044325" comment="python312-curses-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044326" comment="python312-dbm-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044327" comment="python312-idle-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044328" comment="python312-tk-3.12.12-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044329" comment="python312-x86-64-v3-3.12.12-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254399" version="1" class="patch">
	<metadata>
		<title>python313-3.13.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044330" comment="python313-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044331" comment="python313-32bit-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044332" comment="python313-curses-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044333" comment="python313-dbm-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044334" comment="python313-idle-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044335" comment="python313-tk-3.13.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044336" comment="python313-x86-64-v3-3.13.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254400" version="1" class="patch">
	<metadata>
		<title>rclone-1.73.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.73.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044337" comment="rclone-1.73.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044338" comment="rclone-bash-completion-1.73.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044339" comment="rclone-zsh-completion-1.73.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254401" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-147.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-147.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044395" comment="MozillaFirefox-147.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044396" comment="MozillaFirefox-branding-upstream-147.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044397" comment="MozillaFirefox-devel-147.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044398" comment="MozillaFirefox-translations-common-147.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044399" comment="MozillaFirefox-translations-other-147.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254402" version="1" class="patch">
	<metadata>
		<title>python311-nltk-3.9.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14009" ref_url="https://www.suse.com/security/cve/CVE-2025-14009/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-nltk-3.9.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14009/">CVE-2025-14009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14009">CVE-2025-14009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044400" comment="python311-nltk-3.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044401" comment="python312-nltk-3.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044402" comment="python313-nltk-3.9.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254403" version="1" class="patch">
	<metadata>
		<title>python311-py7zr-1.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-py7zr-1.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044403" comment="python311-py7zr-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044404" comment="python312-py7zr-1.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044405" comment="python313-py7zr-1.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254404" version="1" class="patch">
	<metadata>
		<title>syft-1.42.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<description>
These are all security issues fixed in the syft-1.42.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044406" comment="syft-1.42.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044407" comment="syft-bash-completion-1.42.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044408" comment="syft-fish-completion-1.42.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044409" comment="syft-zsh-completion-1.42.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254405" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20260210-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20260210-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044410" comment="ucode-intel-20260210-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254406" version="1" class="patch">
	<metadata>
		<title>vexctl-0.4.1+git78.f951e3a-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772/" source="CVE"/>
		<reference ref_id="CVE-2026-24137" ref_url="https://www.suse.com/security/cve/CVE-2026-24137/" source="CVE"/>
		<description>
These are all security issues fixed in the vexctl-0.4.1+git78.f951e3a-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24137/">CVE-2026-24137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24137">CVE-2026-24137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044411" comment="vexctl-0.4.1+git78.f951e3a-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254407" version="1" class="patch">
	<metadata>
		<title>busybox-1.37.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26158" ref_url="https://www.suse.com/security/cve/CVE-2026-26158/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.37.0-9.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26158/">CVE-2026-26158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26158">CVE-2026-26158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044559" comment="busybox-1.37.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044560" comment="busybox-static-1.37.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044561" comment="busybox-testsuite-1.37.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044562" comment="busybox-warewulf3-1.37.0-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254408" version="1" class="patch">
	<metadata>
		<title>cosign-3.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2026-22703" ref_url="https://www.suse.com/security/cve/CVE-2026-22703/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-3.0.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-22703/">CVE-2026-22703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22703">CVE-2026-22703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044563" comment="cosign-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044564" comment="cosign-bash-completion-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044565" comment="cosign-fish-completion-3.0.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044566" comment="cosign-zsh-completion-3.0.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254409" version="1" class="patch">
	<metadata>
		<title>kyverno-1.17.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the kyverno-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044567" comment="kyverno-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044568" comment="kyverno-bash-completion-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044569" comment="kyverno-fish-completion-1.17.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044570" comment="kyverno-zsh-completion-1.17.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254410" version="1" class="patch">
	<metadata>
		<title>chromedriver-145.0.7632.109-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2648" ref_url="https://www.suse.com/security/cve/CVE-2026-2648/" source="CVE"/>
		<reference ref_id="CVE-2026-2649" ref_url="https://www.suse.com/security/cve/CVE-2026-2649/" source="CVE"/>
		<reference ref_id="CVE-2026-2650" ref_url="https://www.suse.com/security/cve/CVE-2026-2650/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-145.0.7632.109-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-21"/>
	<updated date="2026-02-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2648/">CVE-2026-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2648">CVE-2026-2648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2649/">CVE-2026-2649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2649">CVE-2026-2649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2650/">CVE-2026-2650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2650">CVE-2026-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044614" comment="chromedriver-145.0.7632.109-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044615" comment="chromium-145.0.7632.109-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254411" version="1" class="patch">
	<metadata>
		<title>cosign-3.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772/" source="CVE"/>
		<reference ref_id="CVE-2026-23991" ref_url="https://www.suse.com/security/cve/CVE-2026-23991/" source="CVE"/>
		<reference ref_id="CVE-2026-23992" ref_url="https://www.suse.com/security/cve/CVE-2026-23992/" source="CVE"/>
		<reference ref_id="CVE-2026-24122" ref_url="https://www.suse.com/security/cve/CVE-2026-24122/" source="CVE"/>
		<reference ref_id="CVE-2026-24137" ref_url="https://www.suse.com/security/cve/CVE-2026-24137/" source="CVE"/>
		<reference ref_id="CVE-2026-26958" ref_url="https://www.suse.com/security/cve/CVE-2026-26958/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-3.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23991/">CVE-2026-23991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23991">CVE-2026-23991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23992/">CVE-2026-23992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23992">CVE-2026-23992 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24122/">CVE-2026-24122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24122">CVE-2026-24122 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24137/">CVE-2026-24137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24137">CVE-2026-24137 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26958/">CVE-2026-26958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26958">CVE-2026-26958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044708" comment="cosign-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044709" comment="cosign-bash-completion-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044710" comment="cosign-fish-completion-3.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044711" comment="cosign-zsh-completion-3.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254412" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="CVE-2026-26278" ref_url="https://www.suse.com/security/cve/CVE-2026-26278/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26278/">CVE-2026-26278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26278">CVE-2026-26278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044712" comment="heroic-games-launcher-2.20.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254413" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.5.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187/" source="CVE"/>
		<reference ref_id="CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467/" source="CVE"/>
		<reference ref_id="CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468/" source="CVE"/>
		<reference ref_id="CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469/" source="CVE"/>
		<reference ref_id="CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199/" source="CVE"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418/" source="CVE"/>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="CVE-2025-9231" ref_url="https://www.suse.com/security/cve/CVE-2025-9231/" source="CVE"/>
		<reference ref_id="CVE-2025-9232" ref_url="https://www.suse.com/security/cve/CVE-2025-9232/" source="CVE"/>
		<reference ref_id="CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.5.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9231/">CVE-2025-9231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9231">CVE-2025-9231 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9232/">CVE-2025-9232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044713" comment="libopenssl-3-devel-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044714" comment="libopenssl-3-devel-32bit-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044715" comment="libopenssl-3-fips-provider-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044716" comment="libopenssl-3-fips-provider-32bit-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044717" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044718" comment="libopenssl3-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044719" comment="libopenssl3-32bit-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044720" comment="libopenssl3-x86-64-v3-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044721" comment="openssl-3-3.5.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044722" comment="openssl-3-doc-3.5.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254414" version="1" class="patch">
	<metadata>
		<title>python311-PyPDF2-2.11.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55197" ref_url="https://www.suse.com/security/cve/CVE-2025-55197/" source="CVE"/>
		<reference ref_id="CVE-2026-27024" ref_url="https://www.suse.com/security/cve/CVE-2026-27024/" source="CVE"/>
		<reference ref_id="CVE-2026-27025" ref_url="https://www.suse.com/security/cve/CVE-2026-27025/" source="CVE"/>
		<reference ref_id="CVE-2026-27026" ref_url="https://www.suse.com/security/cve/CVE-2026-27026/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyPDF2-2.11.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55197/">CVE-2025-55197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55197">CVE-2025-55197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27024/">CVE-2026-27024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27024">CVE-2026-27024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27025/">CVE-2026-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27025">CVE-2026-27025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27026/">CVE-2026-27026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27026">CVE-2026-27026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044723" comment="python311-PyPDF2-2.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044724" comment="python312-PyPDF2-2.11.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044725" comment="python313-PyPDF2-2.11.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254415" version="1" class="patch">
	<metadata>
		<title>warewulf4-4.6.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-69725" ref_url="https://www.suse.com/security/cve/CVE-2025-69725/" source="CVE"/>
		<description>
These are all security issues fixed in the warewulf4-4.6.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69725/">CVE-2025-69725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69725">CVE-2025-69725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044726" comment="warewulf4-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044727" comment="warewulf4-dracut-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044728" comment="warewulf4-man-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044729" comment="warewulf4-overlay-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044730" comment="warewulf4-overlay-rke2-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044731" comment="warewulf4-overlay-slurm-4.6.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044732" comment="warewulf4-reference-doc-4.6.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254416" version="1" class="patch">
	<metadata>
		<title>weblate-5.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21889" ref_url="https://www.suse.com/security/cve/CVE-2026-21889/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-21889/">CVE-2026-21889 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21889">CVE-2026-21889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044733" comment="weblate-5.16-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254417" version="1" class="patch">
	<metadata>
		<title>cacti-1.2.30+git231.bca15e70c-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1513" ref_url="https://www.suse.com/security/cve/CVE-2026-1513/" source="CVE"/>
		<reference ref_id="CVE-2026-22802" ref_url="https://www.suse.com/security/cve/CVE-2026-22802/" source="CVE"/>
		<description>
These are all security issues fixed in the cacti-1.2.30+git231.bca15e70c-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1513/">CVE-2026-1513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1513">CVE-2026-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-22802/">CVE-2026-22802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22802">CVE-2026-22802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045060" comment="cacti-1.2.30+git231.bca15e70c-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254418" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045061" comment="firefox-esr-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045062" comment="firefox-esr-branding-upstream-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045063" comment="firefox-esr-translations-common-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045064" comment="firefox-esr-translations-other-140.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254419" version="1" class="patch">
	<metadata>
		<title>freerdp2-2.11.7-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491/" source="CVE"/>
		<reference ref_id="CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675/" source="CVE"/>
		<reference ref_id="CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676/" source="CVE"/>
		<reference ref_id="CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679/" source="CVE"/>
		<reference ref_id="CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681/" source="CVE"/>
		<reference ref_id="CVE-2026-24682" ref_url="https://www.suse.com/security/cve/CVE-2026-24682/" source="CVE"/>
		<reference ref_id="CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683/" source="CVE"/>
		<reference ref_id="CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-2.11.7-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24682/">CVE-2026-24682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24682">CVE-2026-24682 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045065" comment="freerdp2-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045066" comment="freerdp2-devel-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045067" comment="freerdp2-proxy-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045068" comment="freerdp2-server-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045069" comment="libfreerdp2-2-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045070" comment="libwinpr2-2-2.11.7-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045071" comment="winpr2-devel-2.11.7-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254420" version="1" class="patch">
	<metadata>
		<title>libsignal-protocol-c-devel-2.3.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468/" source="CVE"/>
		<description>
These are all security issues fixed in the libsignal-protocol-c-devel-2.3.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045072" comment="libsignal-protocol-c-devel-2.3.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045073" comment="libsignal-protocol-c2-2.3.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254421" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045074" comment="libsoup-3_0-0-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045075" comment="libsoup-3_0-0-32bit-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045076" comment="libsoup-devel-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045077" comment="libsoup-devel-32bit-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045078" comment="libsoup-lang-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045079" comment="typelib-1_0-Soup-3_0-3.6.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254422" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045080" comment="libsoup-2_4-1-2.74.3-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045081" comment="libsoup-2_4-1-32bit-2.74.3-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045082" comment="libsoup2-devel-2.74.3-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045083" comment="libsoup2-devel-32bit-2.74.3-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045084" comment="libsoup2-lang-2.74.3-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045085" comment="typelib-1_0-Soup-2_4-2.74.3-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254423" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.28-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13473" ref_url="https://www.suse.com/security/cve/CVE-2025-13473/" source="CVE"/>
		<reference ref_id="CVE-2025-14550" ref_url="https://www.suse.com/security/cve/CVE-2025-14550/" source="CVE"/>
		<reference ref_id="CVE-2026-1207" ref_url="https://www.suse.com/security/cve/CVE-2026-1207/" source="CVE"/>
		<reference ref_id="CVE-2026-1285" ref_url="https://www.suse.com/security/cve/CVE-2026-1285/" source="CVE"/>
		<reference ref_id="CVE-2026-1287" ref_url="https://www.suse.com/security/cve/CVE-2026-1287/" source="CVE"/>
		<reference ref_id="CVE-2026-1312" ref_url="https://www.suse.com/security/cve/CVE-2026-1312/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.28-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13473/">CVE-2025-13473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13473">CVE-2025-13473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-14550/">CVE-2025-14550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1207/">CVE-2026-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1207">CVE-2026-1207 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1285/">CVE-2026-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1285">CVE-2026-1285 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1287/">CVE-2026-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1287">CVE-2026-1287 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1312/">CVE-2026-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1312">CVE-2026-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045086" comment="python311-Django4-4.2.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045087" comment="python312-Django4-4.2.28-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045088" comment="python313-Django4-4.2.28-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254424" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045256" comment="MozillaThunderbird-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045257" comment="MozillaThunderbird-openpgp-librnp-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045258" comment="MozillaThunderbird-translations-common-140.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045259" comment="MozillaThunderbird-translations-other-140.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254425" version="1" class="patch">
	<metadata>
		<title>cmctl-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the cmctl-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045260" comment="cmctl-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045261" comment="cmctl-bash-completion-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045262" comment="cmctl-fish-completion-2.4.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045263" comment="cmctl-zsh-completion-2.4.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254426" version="1" class="patch">
	<metadata>
		<title>cockpit-machines-348-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-machines-348-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045264" comment="cockpit-machines-348-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254427" version="1" class="patch">
	<metadata>
		<title>cockpit-packages-4.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-packages-4.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045265" comment="cockpit-packages-4.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254428" version="1" class="patch">
	<metadata>
		<title>cockpit-repos-4.7-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-repos-4.7-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045266" comment="cockpit-repos-4.7-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254429" version="1" class="patch">
	<metadata>
		<title>cockpit-subscriptions-14.4-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-subscriptions-14.4-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045267" comment="cockpit-subscriptions-14.4-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254430" version="1" class="patch">
	<metadata>
		<title>cockpit-tukit-0.1.7~git0.61e54f1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-tukit-0.1.7~git0.61e54f1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045268" comment="cockpit-tukit-0.1.7~git0.61e54f1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254431" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045269" comment="docker-stable-24.0.9_ce-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045270" comment="docker-stable-bash-completion-24.0.9_ce-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045271" comment="docker-stable-buildx-0.25.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045272" comment="docker-stable-fish-completion-24.0.9_ce-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045273" comment="docker-stable-rootless-extras-24.0.9_ce-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045274" comment="docker-stable-zsh-completion-24.0.9_ce-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254432" version="1" class="patch">
	<metadata>
		<title>regclient-0.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the regclient-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-25"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045275" comment="regclient-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045276" comment="regclient-bash-completion-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045277" comment="regclient-fish-completion-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045278" comment="regclient-zsh-completion-0.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254433" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-148.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<reference ref_id="CVE-2026-2794" ref_url="https://www.suse.com/security/cve/CVE-2026-2794/" source="CVE"/>
		<reference ref_id="CVE-2026-2795" ref_url="https://www.suse.com/security/cve/CVE-2026-2795/" source="CVE"/>
		<reference ref_id="CVE-2026-2796" ref_url="https://www.suse.com/security/cve/CVE-2026-2796/" source="CVE"/>
		<reference ref_id="CVE-2026-2797" ref_url="https://www.suse.com/security/cve/CVE-2026-2797/" source="CVE"/>
		<reference ref_id="CVE-2026-2798" ref_url="https://www.suse.com/security/cve/CVE-2026-2798/" source="CVE"/>
		<reference ref_id="CVE-2026-2799" ref_url="https://www.suse.com/security/cve/CVE-2026-2799/" source="CVE"/>
		<reference ref_id="CVE-2026-2800" ref_url="https://www.suse.com/security/cve/CVE-2026-2800/" source="CVE"/>
		<reference ref_id="CVE-2026-2801" ref_url="https://www.suse.com/security/cve/CVE-2026-2801/" source="CVE"/>
		<reference ref_id="CVE-2026-2802" ref_url="https://www.suse.com/security/cve/CVE-2026-2802/" source="CVE"/>
		<reference ref_id="CVE-2026-2803" ref_url="https://www.suse.com/security/cve/CVE-2026-2803/" source="CVE"/>
		<reference ref_id="CVE-2026-2804" ref_url="https://www.suse.com/security/cve/CVE-2026-2804/" source="CVE"/>
		<reference ref_id="CVE-2026-2805" ref_url="https://www.suse.com/security/cve/CVE-2026-2805/" source="CVE"/>
		<reference ref_id="CVE-2026-2806" ref_url="https://www.suse.com/security/cve/CVE-2026-2806/" source="CVE"/>
		<reference ref_id="CVE-2026-2807" ref_url="https://www.suse.com/security/cve/CVE-2026-2807/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-148.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2794/">CVE-2026-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2794">CVE-2026-2794 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2795/">CVE-2026-2795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2795">CVE-2026-2795 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2796/">CVE-2026-2796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2796">CVE-2026-2796 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2797/">CVE-2026-2797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2797">CVE-2026-2797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2798/">CVE-2026-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2798">CVE-2026-2798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2799/">CVE-2026-2799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2799">CVE-2026-2799 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2800/">CVE-2026-2800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2800">CVE-2026-2800 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2801/">CVE-2026-2801 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2801">CVE-2026-2801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2802/">CVE-2026-2802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2802">CVE-2026-2802 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2803/">CVE-2026-2803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2803">CVE-2026-2803 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2804/">CVE-2026-2804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2804">CVE-2026-2804 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2805/">CVE-2026-2805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2805">CVE-2026-2805 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-2806/">CVE-2026-2806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2806">CVE-2026-2806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2807/">CVE-2026-2807 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2807">CVE-2026-2807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046035" comment="MozillaFirefox-148.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046036" comment="MozillaFirefox-branding-upstream-148.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046037" comment="MozillaFirefox-devel-148.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046038" comment="MozillaFirefox-translations-common-148.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046039" comment="MozillaFirefox-translations-other-148.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254434" version="1" class="patch">
	<metadata>
		<title>busybox-1.37.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26157" ref_url="https://www.suse.com/security/cve/CVE-2026-26157/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.37.0-10.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26157/">CVE-2026-26157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26157">CVE-2026-26157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046040" comment="busybox-1.37.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046041" comment="busybox-static-1.37.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046042" comment="busybox-testsuite-1.37.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046043" comment="busybox-warewulf3-1.37.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254435" version="1" class="patch">
	<metadata>
		<title>chromedriver-145.0.7632.116-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-3063" ref_url="https://www.suse.com/security/cve/CVE-2025-3063/" source="CVE"/>
		<reference ref_id="CVE-2026-3061" ref_url="https://www.suse.com/security/cve/CVE-2026-3061/" source="CVE"/>
		<reference ref_id="CVE-2026-3062" ref_url="https://www.suse.com/security/cve/CVE-2026-3062/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-145.0.7632.116-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3063/">CVE-2025-3063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3063">CVE-2025-3063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3061/">CVE-2026-3061 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3061">CVE-2026-3061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3062/">CVE-2026-3062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3062">CVE-2026-3062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046044" comment="chromedriver-145.0.7632.116-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046045" comment="chromium-145.0.7632.116-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254436" version="1" class="patch">
	<metadata>
		<title>digger-cli-0.6.143-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
These are all security issues fixed in the digger-cli-0.6.143-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046046" comment="digger-cli-0.6.143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046047" comment="digger-cli-bash-completion-0.6.143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046048" comment="digger-cli-fish-completion-0.6.143-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046049" comment="digger-cli-zsh-completion-0.6.143-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254437" version="1" class="patch">
	<metadata>
		<title>docker-29.2.1_ce-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67499" ref_url="https://www.suse.com/security/cve/CVE-2025-67499/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-29.2.1_ce-37.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67499/">CVE-2025-67499 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67499">CVE-2025-67499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046050" comment="docker-29.2.1_ce-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046051" comment="docker-bash-completion-29.2.1_ce-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046052" comment="docker-buildx-0.31.1-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046053" comment="docker-fish-completion-29.2.1_ce-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046054" comment="docker-rootless-extras-29.2.1_ce-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046055" comment="docker-zsh-completion-29.2.1_ce-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254438" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-3.58.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2604" ref_url="https://www.suse.com/security/cve/CVE-2026-2604/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-3.58.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2604/">CVE-2026-2604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2604">CVE-2026-2604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046056" comment="evolution-data-server-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046057" comment="evolution-data-server-devel-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046058" comment="evolution-data-server-lang-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046059" comment="libcamel-1_2-66-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046060" comment="libebackend-1_2-11-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046061" comment="libebook-1_2-21-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046062" comment="libebook-contacts-1_2-4-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046063" comment="libecal-2_0-3-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046064" comment="libedata-book-1_2-27-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046065" comment="libedata-cal-2_0-2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046066" comment="libedataserver-1_2-27-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046067" comment="libedataserverui-1_2-4-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046068" comment="libedataserverui4-1_0-0-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046069" comment="typelib-1_0-Camel-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046070" comment="typelib-1_0-EBackend-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046071" comment="typelib-1_0-EBook-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046072" comment="typelib-1_0-EBookContacts-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046073" comment="typelib-1_0-ECal-2_0-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046074" comment="typelib-1_0-EDataBook-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046075" comment="typelib-1_0-EDataCal-2_0-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046076" comment="typelib-1_0-EDataServer-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046077" comment="typelib-1_0-EDataServerUI-1_2-3.58.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046078" comment="typelib-1_0-EDataServerUI4-1_0-3.58.3-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254439" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27606" ref_url="https://www.suse.com/security/cve/CVE-2026-27606/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27606/">CVE-2026-27606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27606">CVE-2026-27606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046079" comment="heroic-games-launcher-2.20.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254440" version="1" class="patch">
	<metadata>
		<title>python311-Flask-3.1.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27205" ref_url="https://www.suse.com/security/cve/CVE-2026-27205/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Flask-3.1.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27205/">CVE-2026-27205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27205">CVE-2026-27205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046080" comment="python311-Flask-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046081" comment="python311-Flask-doc-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046082" comment="python312-Flask-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046083" comment="python312-Flask-doc-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046084" comment="python313-Flask-3.1.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046085" comment="python313-Flask-doc-3.1.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254441" version="1" class="patch">
	<metadata>
		<title>qemu-10.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14876" ref_url="https://www.suse.com/security/cve/CVE-2025-14876/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.2.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14876/">CVE-2025-14876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14876">CVE-2025-14876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046086" comment="qemu-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046087" comment="qemu-SLOF-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046088" comment="qemu-accel-qtest-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046089" comment="qemu-arm-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046090" comment="qemu-audio-alsa-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046091" comment="qemu-audio-dbus-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046092" comment="qemu-audio-jack-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046093" comment="qemu-audio-oss-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046094" comment="qemu-audio-pa-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046095" comment="qemu-audio-pipewire-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046096" comment="qemu-audio-sdl-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046097" comment="qemu-audio-spice-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046098" comment="qemu-block-curl-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046099" comment="qemu-block-dmg-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046100" comment="qemu-block-iscsi-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046101" comment="qemu-block-nfs-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046102" comment="qemu-block-rbd-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046103" comment="qemu-block-ssh-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046104" comment="qemu-chardev-baum-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046105" comment="qemu-chardev-spice-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046106" comment="qemu-doc-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046107" comment="qemu-extra-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046108" comment="qemu-guest-agent-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046109" comment="qemu-headless-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046110" comment="qemu-hw-display-qxl-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046111" comment="qemu-hw-display-virtio-gpu-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046112" comment="qemu-hw-display-virtio-gpu-pci-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046113" comment="qemu-hw-display-virtio-vga-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046114" comment="qemu-hw-s390x-virtio-gpu-ccw-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046115" comment="qemu-hw-usb-host-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046116" comment="qemu-hw-usb-redirect-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046117" comment="qemu-hw-usb-smartcard-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046118" comment="qemu-img-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046119" comment="qemu-ipxe-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046120" comment="qemu-ivshmem-tools-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046121" comment="qemu-ksm-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046122" comment="qemu-lang-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046123" comment="qemu-microvm-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046124" comment="qemu-ppc-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046125" comment="qemu-pr-helper-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046126" comment="qemu-s390x-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046127" comment="qemu-seabios-10.2.11.17.0_1_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046128" comment="qemu-skiboot-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046129" comment="qemu-spice-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046130" comment="qemu-tools-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046131" comment="qemu-ui-curses-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046132" comment="qemu-ui-dbus-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046133" comment="qemu-ui-gtk-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046134" comment="qemu-ui-opengl-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046135" comment="qemu-ui-sdl-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046136" comment="qemu-ui-spice-app-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046137" comment="qemu-ui-spice-core-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046138" comment="qemu-vgabios-10.2.11.17.0_1_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046139" comment="qemu-vhost-user-gpu-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046140" comment="qemu-vmsr-helper-10.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046141" comment="qemu-x86-10.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254442" version="1" class="patch">
	<metadata>
		<title>valkey-9.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67733" ref_url="https://www.suse.com/security/cve/CVE-2025-67733/" source="CVE"/>
		<reference ref_id="CVE-2026-21863" ref_url="https://www.suse.com/security/cve/CVE-2026-21863/" source="CVE"/>
		<reference ref_id="CVE-2026-27623" ref_url="https://www.suse.com/security/cve/CVE-2026-27623/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-9.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-67733/">CVE-2025-67733 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67733">CVE-2025-67733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21863/">CVE-2026-21863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21863">CVE-2026-21863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27623/">CVE-2026-27623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27623">CVE-2026-27623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046142" comment="valkey-9.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046143" comment="valkey-compat-redis-9.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046144" comment="valkey-devel-9.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254443" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.15-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24481" ref_url="https://www.suse.com/security/cve/CVE-2026-24481/" source="CVE"/>
		<reference ref_id="CVE-2026-24485" ref_url="https://www.suse.com/security/cve/CVE-2026-24485/" source="CVE"/>
		<reference ref_id="CVE-2026-25576" ref_url="https://www.suse.com/security/cve/CVE-2026-25576/" source="CVE"/>
		<reference ref_id="CVE-2026-25637" ref_url="https://www.suse.com/security/cve/CVE-2026-25637/" source="CVE"/>
		<reference ref_id="CVE-2026-25638" ref_url="https://www.suse.com/security/cve/CVE-2026-25638/" source="CVE"/>
		<reference ref_id="CVE-2026-25794" ref_url="https://www.suse.com/security/cve/CVE-2026-25794/" source="CVE"/>
		<reference ref_id="CVE-2026-25795" ref_url="https://www.suse.com/security/cve/CVE-2026-25795/" source="CVE"/>
		<reference ref_id="CVE-2026-25796" ref_url="https://www.suse.com/security/cve/CVE-2026-25796/" source="CVE"/>
		<reference ref_id="CVE-2026-25797" ref_url="https://www.suse.com/security/cve/CVE-2026-25797/" source="CVE"/>
		<reference ref_id="CVE-2026-25798" ref_url="https://www.suse.com/security/cve/CVE-2026-25798/" source="CVE"/>
		<reference ref_id="CVE-2026-25799" ref_url="https://www.suse.com/security/cve/CVE-2026-25799/" source="CVE"/>
		<reference ref_id="CVE-2026-25897" ref_url="https://www.suse.com/security/cve/CVE-2026-25897/" source="CVE"/>
		<reference ref_id="CVE-2026-25898" ref_url="https://www.suse.com/security/cve/CVE-2026-25898/" source="CVE"/>
		<reference ref_id="CVE-2026-25965" ref_url="https://www.suse.com/security/cve/CVE-2026-25965/" source="CVE"/>
		<reference ref_id="CVE-2026-25966" ref_url="https://www.suse.com/security/cve/CVE-2026-25966/" source="CVE"/>
		<reference ref_id="CVE-2026-25967" ref_url="https://www.suse.com/security/cve/CVE-2026-25967/" source="CVE"/>
		<reference ref_id="CVE-2026-25968" ref_url="https://www.suse.com/security/cve/CVE-2026-25968/" source="CVE"/>
		<reference ref_id="CVE-2026-25969" ref_url="https://www.suse.com/security/cve/CVE-2026-25969/" source="CVE"/>
		<reference ref_id="CVE-2026-25970" ref_url="https://www.suse.com/security/cve/CVE-2026-25970/" source="CVE"/>
		<reference ref_id="CVE-2026-25971" ref_url="https://www.suse.com/security/cve/CVE-2026-25971/" source="CVE"/>
		<reference ref_id="CVE-2026-25982" ref_url="https://www.suse.com/security/cve/CVE-2026-25982/" source="CVE"/>
		<reference ref_id="CVE-2026-25983" ref_url="https://www.suse.com/security/cve/CVE-2026-25983/" source="CVE"/>
		<reference ref_id="CVE-2026-25985" ref_url="https://www.suse.com/security/cve/CVE-2026-25985/" source="CVE"/>
		<reference ref_id="CVE-2026-25986" ref_url="https://www.suse.com/security/cve/CVE-2026-25986/" source="CVE"/>
		<reference ref_id="CVE-2026-25987" ref_url="https://www.suse.com/security/cve/CVE-2026-25987/" source="CVE"/>
		<reference ref_id="CVE-2026-25988" ref_url="https://www.suse.com/security/cve/CVE-2026-25988/" source="CVE"/>
		<reference ref_id="CVE-2026-25989" ref_url="https://www.suse.com/security/cve/CVE-2026-25989/" source="CVE"/>
		<reference ref_id="CVE-2026-26066" ref_url="https://www.suse.com/security/cve/CVE-2026-26066/" source="CVE"/>
		<reference ref_id="CVE-2026-26283" ref_url="https://www.suse.com/security/cve/CVE-2026-26283/" source="CVE"/>
		<reference ref_id="CVE-2026-26284" ref_url="https://www.suse.com/security/cve/CVE-2026-26284/" source="CVE"/>
		<reference ref_id="CVE-2026-26983" ref_url="https://www.suse.com/security/cve/CVE-2026-26983/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.15-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-24481/">CVE-2026-24481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24481">CVE-2026-24481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24485/">CVE-2026-24485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24485">CVE-2026-24485 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-25576/">CVE-2026-25576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25576">CVE-2026-25576 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25637/">CVE-2026-25637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25637">CVE-2026-25637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25638/">CVE-2026-25638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25638">CVE-2026-25638 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-25794/">CVE-2026-25794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25794">CVE-2026-25794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25795/">CVE-2026-25795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25795">CVE-2026-25795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25796/">CVE-2026-25796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25796">CVE-2026-25796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-25797/">CVE-2026-25797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25797">CVE-2026-25797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25798/">CVE-2026-25798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25798">CVE-2026-25798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25799/">CVE-2026-25799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25799">CVE-2026-25799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25897/">CVE-2026-25897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25897">CVE-2026-25897 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25898/">CVE-2026-25898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25898">CVE-2026-25898 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25965/">CVE-2026-25965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25965">CVE-2026-25965 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25966/">CVE-2026-25966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25966">CVE-2026-25966 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25967/">CVE-2026-25967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25967">CVE-2026-25967 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25968/">CVE-2026-25968 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25968">CVE-2026-25968 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25969/">CVE-2026-25969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25969">CVE-2026-25969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25970/">CVE-2026-25970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25970">CVE-2026-25970 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25971/">CVE-2026-25971 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25971">CVE-2026-25971 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25982/">CVE-2026-25982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25982">CVE-2026-25982 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25983/">CVE-2026-25983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25983">CVE-2026-25983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25985/">CVE-2026-25985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25985">CVE-2026-25985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25986/">CVE-2026-25986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25986">CVE-2026-25986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25987/">CVE-2026-25987 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25987">CVE-2026-25987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25988/">CVE-2026-25988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25988">CVE-2026-25988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25989/">CVE-2026-25989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25989">CVE-2026-25989 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26066/">CVE-2026-26066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26066">CVE-2026-26066 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26283/">CVE-2026-26283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26283">CVE-2026-26283 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26284/">CVE-2026-26284 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26284">CVE-2026-26284 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26983/">CVE-2026-26983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26983">CVE-2026-26983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046145" comment="ImageMagick-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046146" comment="ImageMagick-config-7-SUSE-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046147" comment="ImageMagick-devel-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046148" comment="ImageMagick-devel-32bit-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046149" comment="ImageMagick-doc-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046150" comment="ImageMagick-extra-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046151" comment="libMagick++-7_Q16HDRI5-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046152" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046153" comment="libMagick++-devel-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046154" comment="libMagick++-devel-32bit-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046155" comment="libMagickCore-7_Q16HDRI10-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046156" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046157" comment="libMagickWand-7_Q16HDRI10-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046158" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.15-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046159" comment="perl-PerlMagick-7.1.2.15-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254444" version="1" class="patch">
	<metadata>
		<title>cockpit-356-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-356-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046160" comment="cockpit-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046161" comment="cockpit-bridge-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046162" comment="cockpit-devel-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046163" comment="cockpit-doc-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046164" comment="cockpit-firewalld-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046165" comment="cockpit-kdump-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046166" comment="cockpit-networkmanager-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046167" comment="cockpit-packagekit-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046168" comment="cockpit-selinux-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046169" comment="cockpit-storaged-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046170" comment="cockpit-system-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046171" comment="cockpit-ws-356-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046172" comment="cockpit-ws-selinux-356-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254445" version="1" class="patch">
	<metadata>
		<title>cockpit-podman-120-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-podman-120-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046173" comment="cockpit-podman-120-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254446" version="1" class="patch">
	<metadata>
		<title>gosec-2.24.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-22891" ref_url="https://www.suse.com/security/cve/CVE-2025-22891/" source="CVE"/>
		<description>
These are all security issues fixed in the gosec-2.24.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22891/">CVE-2025-22891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22891">CVE-2025-22891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046174" comment="gosec-2.24.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254447" version="1" class="patch">
	<metadata>
		<title>libjxl-devel-0.11.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1837" ref_url="https://www.suse.com/security/cve/CVE-2026-1837/" source="CVE"/>
		<description>
These are all security issues fixed in the libjxl-devel-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1837/">CVE-2026-1837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1837">CVE-2026-1837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046175" comment="libjxl-devel-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046176" comment="libjxl-tools-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046177" comment="libjxl0_11-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046178" comment="libjxl0_11-32bit-0.11.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046179" comment="libjxl0_11-x86-64-v3-0.11.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254448" version="1" class="patch">
	<metadata>
		<title>libIex-3_4-33-3.4.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26981" ref_url="https://www.suse.com/security/cve/CVE-2026-26981/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_4-33-3.4.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26981/">CVE-2026-26981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26981">CVE-2026-26981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046180" comment="libIex-3_4-33-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046181" comment="libIex-3_4-33-32bit-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046182" comment="libIex-3_4-33-x86-64-v3-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046183" comment="libIlmThread-3_4-33-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046184" comment="libIlmThread-3_4-33-32bit-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046185" comment="libIlmThread-3_4-33-x86-64-v3-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046186" comment="libOpenEXR-3_4-33-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046187" comment="libOpenEXR-3_4-33-32bit-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046188" comment="libOpenEXR-3_4-33-x86-64-v3-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046189" comment="libOpenEXRCore-3_4-33-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046190" comment="libOpenEXRCore-3_4-33-32bit-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046191" comment="libOpenEXRCore-3_4-33-x86-64-v3-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046192" comment="libOpenEXRUtil-3_4-33-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046193" comment="libOpenEXRUtil-3_4-33-32bit-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046194" comment="libOpenEXRUtil-3_4-33-x86-64-v3-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046195" comment="openexr-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046196" comment="openexr-devel-3.4.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046197" comment="openexr-doc-3.4.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254449" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.11.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26103" ref_url="https://www.suse.com/security/cve/CVE-2026-26103/" source="CVE"/>
		<reference ref_id="CVE-2026-26104" ref_url="https://www.suse.com/security/cve/CVE-2026-26104/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.11.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26103/">CVE-2026-26103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26103">CVE-2026-26103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26104/">CVE-2026-26104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26104">CVE-2026-26104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046198" comment="libudisks2-0-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046199" comment="libudisks2-0-devel-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046200" comment="libudisks2-0_btrfs-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046201" comment="libudisks2-0_lsm-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046202" comment="libudisks2-0_lvm2-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046203" comment="typelib-1_0-UDisks-2_0-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046204" comment="udisks2-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046205" comment="udisks2-bash-completion-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046206" comment="udisks2-docs-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046207" comment="udisks2-lang-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046208" comment="udisks2-zsh-completion-2.11.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254450" version="1" class="patch">
	<metadata>
		<title>libwireshark19-4.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3201" ref_url="https://www.suse.com/security/cve/CVE-2026-3201/" source="CVE"/>
		<reference ref_id="CVE-2026-3202" ref_url="https://www.suse.com/security/cve/CVE-2026-3202/" source="CVE"/>
		<reference ref_id="CVE-2026-3203" ref_url="https://www.suse.com/security/cve/CVE-2026-3203/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark19-4.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3201/">CVE-2026-3201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3201">CVE-2026-3201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3202/">CVE-2026-3202 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3202">CVE-2026-3202 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3203/">CVE-2026-3203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3203">CVE-2026-3203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046209" comment="libwireshark19-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046210" comment="libwiretap16-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046211" comment="libwsutil17-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046212" comment="wireshark-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046213" comment="wireshark-devel-4.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046214" comment="wireshark-ui-qt-4.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254451" version="1" class="patch">
	<metadata>
		<title>gvfs-1.58.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28295" ref_url="https://www.suse.com/security/cve/CVE-2026-28295/" source="CVE"/>
		<reference ref_id="CVE-2026-28296" ref_url="https://www.suse.com/security/cve/CVE-2026-28296/" source="CVE"/>
		<description>
These are all security issues fixed in the gvfs-1.58.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-01"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28295/">CVE-2026-28295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28295">CVE-2026-28295 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28296/">CVE-2026-28296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28296">CVE-2026-28296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046326" comment="gvfs-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046327" comment="gvfs-backend-afc-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046328" comment="gvfs-backend-goa-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046329" comment="gvfs-backend-gphoto-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046330" comment="gvfs-backend-samba-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046331" comment="gvfs-backends-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046332" comment="gvfs-fuse-1.58.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046333" comment="gvfs-lang-1.58.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254452" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467/" source="CVE"/>
		<reference ref_id="CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539/" source="CVE"/>
		<reference ref_id="CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.6-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-01"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046334" comment="libsoup-3_0-0-3.6.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046335" comment="libsoup-3_0-0-32bit-3.6.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046336" comment="libsoup-devel-3.6.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046337" comment="libsoup-devel-32bit-3.6.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046338" comment="libsoup-lang-3.6.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046339" comment="typelib-1_0-Soup-3_0-3.6.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254453" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27024" ref_url="https://www.suse.com/security/cve/CVE-2026-27024/" source="CVE"/>
		<reference ref_id="CVE-2026-28351" ref_url="https://www.suse.com/security/cve/CVE-2026-28351/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27024/">CVE-2026-27024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27024">CVE-2026-27024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28351/">CVE-2026-28351 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28351">CVE-2026-28351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046384" comment="python311-pypdf-6.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046385" comment="python313-pypdf-6.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254454" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24484" ref_url="https://www.suse.com/security/cve/CVE-2026-24484/" source="CVE"/>
		<reference ref_id="CVE-2026-27798" ref_url="https://www.suse.com/security/cve/CVE-2026-27798/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24484/">CVE-2026-24484 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24484">CVE-2026-24484 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27798/">CVE-2026-27798 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27798">CVE-2026-27798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047433" comment="ImageMagick-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047434" comment="ImageMagick-config-7-SUSE-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047435" comment="ImageMagick-devel-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047436" comment="ImageMagick-devel-32bit-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047437" comment="ImageMagick-doc-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047438" comment="ImageMagick-extra-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047439" comment="libMagick++-7_Q16HDRI5-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047440" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047441" comment="libMagick++-devel-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047442" comment="libMagick++-devel-32bit-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047443" comment="libMagickCore-7_Q16HDRI10-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047444" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047445" comment="libMagickWand-7_Q16HDRI10-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047446" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047447" comment="perl-PerlMagick-7.1.2.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254455" version="1" class="patch">
	<metadata>
		<title>c3p0-0.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27727" ref_url="https://www.suse.com/security/cve/CVE-2026-27727/" source="CVE"/>
		<description>
These are all security issues fixed in the c3p0-0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27727/">CVE-2026-27727 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27727">CVE-2026-27727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047448" comment="c3p0-0.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047449" comment="c3p0-javadoc-0.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254456" version="1" class="patch">
	<metadata>
		<title>incus-6.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23953" ref_url="https://www.suse.com/security/cve/CVE-2026-23953/" source="CVE"/>
		<reference ref_id="CVE-2026-23954" ref_url="https://www.suse.com/security/cve/CVE-2026-23954/" source="CVE"/>
		<description>
These are all security issues fixed in the incus-6.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-23953/">CVE-2026-23953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23953">CVE-2026-23953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-23954/">CVE-2026-23954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23954">CVE-2026-23954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047450" comment="incus-6.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047451" comment="incus-bash-completion-6.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047452" comment="incus-fish-completion-6.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047453" comment="incus-tools-6.22-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047454" comment="incus-zsh-completion-6.22-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254457" version="1" class="patch">
	<metadata>
		<title>mchange-commons-0.4.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27727" ref_url="https://www.suse.com/security/cve/CVE-2026-27727/" source="CVE"/>
		<description>
These are all security issues fixed in the mchange-commons-0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27727/">CVE-2026-27727 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27727">CVE-2026-27727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047455" comment="mchange-commons-0.4.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047456" comment="mchange-commons-javadoc-0.4.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254458" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.29-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25674" ref_url="https://www.suse.com/security/cve/CVE-2026-25674/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.29-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25674/">CVE-2026-25674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25674">CVE-2026-25674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047457" comment="python311-Django4-4.2.29-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047458" comment="python313-Django4-4.2.29-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254459" version="1" class="patch">
	<metadata>
		<title>python313-Django6-6.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25674" ref_url="https://www.suse.com/security/cve/CVE-2026-25674/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Django6-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25674/">CVE-2026-25674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25674">CVE-2026-25674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047459" comment="python313-Django6-6.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254460" version="1" class="patch">
	<metadata>
		<title>python311-PyPDF2-2.11.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27628" ref_url="https://www.suse.com/security/cve/CVE-2026-27628/" source="CVE"/>
		<reference ref_id="CVE-2026-27888" ref_url="https://www.suse.com/security/cve/CVE-2026-27888/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyPDF2-2.11.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27628/">CVE-2026-27628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27628">CVE-2026-27628 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27888/">CVE-2026-27888 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27888">CVE-2026-27888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047460" comment="python311-PyPDF2-2.11.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047461" comment="python313-PyPDF2-2.11.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254461" version="1" class="patch">
	<metadata>
		<title>python311-pillow-heif-1.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28231" ref_url="https://www.suse.com/security/cve/CVE-2026-28231/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pillow-heif-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28231/">CVE-2026-28231 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28231">CVE-2026-28231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047462" comment="python311-pillow-heif-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047463" comment="python313-pillow-heif-1.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254462" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="CVE-2025-25184" ref_url="https://www.suse.com/security/cve/CVE-2025-25184/" source="CVE"/>
		<reference ref_id="CVE-2025-27111" ref_url="https://www.suse.com/security/cve/CVE-2025-27111/" source="CVE"/>
		<reference ref_id="CVE-2025-27610" ref_url="https://www.suse.com/security/cve/CVE-2025-27610/" source="CVE"/>
		<reference ref_id="CVE-2025-46727" ref_url="https://www.suse.com/security/cve/CVE-2025-46727/" source="CVE"/>
		<reference ref_id="CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830/" source="CVE"/>
		<reference ref_id="CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770/" source="CVE"/>
		<reference ref_id="CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771/" source="CVE"/>
		<reference ref_id="CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<reference ref_id="CVE-2026-22860" ref_url="https://www.suse.com/security/cve/CVE-2026-22860/" source="CVE"/>
		<reference ref_id="CVE-2026-25500" ref_url="https://www.suse.com/security/cve/CVE-2026-25500/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.22-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25184/">CVE-2025-25184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25184">CVE-2025-25184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27111/">CVE-2025-27111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27111">CVE-2025-27111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27610/">CVE-2025-27610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27610">CVE-2025-27610 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46727/">CVE-2025-46727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46727">CVE-2025-46727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22860/">CVE-2026-22860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22860">CVE-2026-22860 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25500/">CVE-2026-25500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25500">CVE-2026-25500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047464" comment="ruby4.0-rubygem-rack-2.2-2.2.22-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254463" version="1" class="patch">
	<metadata>
		<title>sdbootutil-1+git20260303.90d816d-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25701" ref_url="https://www.suse.com/security/cve/CVE-2026-25701/" source="CVE"/>
		<description>
These are all security issues fixed in the sdbootutil-1+git20260303.90d816d-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25701/">CVE-2026-25701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25701">CVE-2026-25701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047465" comment="sdbootutil-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047466" comment="sdbootutil-bash-completion-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047467" comment="sdbootutil-dracut-measure-pcr-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047468" comment="sdbootutil-enroll-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047469" comment="sdbootutil-jeos-firstboot-enroll-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047470" comment="sdbootutil-kernel-install-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047471" comment="sdbootutil-snapper-1+git20260303.90d816d-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047472" comment="sdbootutil-tukit-1+git20260303.90d816d-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254464" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.41.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3184" ref_url="https://www.suse.com/security/cve/CVE-2026-3184/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.41.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3184/">CVE-2026-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3184">CVE-2026-3184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047473" comment="libblkid-devel-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047474" comment="libblkid-devel-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047475" comment="libblkid-devel-static-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047476" comment="libblkid1-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047477" comment="libblkid1-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047478" comment="libfdisk-devel-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047479" comment="libfdisk-devel-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047480" comment="libfdisk-devel-static-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047481" comment="libfdisk1-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047482" comment="libfdisk1-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047483" comment="libmount-devel-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047484" comment="libmount-devel-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047485" comment="libmount-devel-static-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047486" comment="libmount1-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047487" comment="libmount1-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047488" comment="libsmartcols-devel-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047489" comment="libsmartcols-devel-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047490" comment="libsmartcols-devel-static-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047491" comment="libsmartcols1-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047492" comment="libsmartcols1-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047493" comment="libuuid-devel-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047494" comment="libuuid-devel-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047495" comment="libuuid-devel-static-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047496" comment="libuuid1-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047497" comment="libuuid1-32bit-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047498" comment="util-linux-2.41.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047499" comment="util-linux-lang-2.41.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254465" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23865" ref_url="https://www.suse.com/security/cve/CVE-2026-23865/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23865/">CVE-2026-23865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23865">CVE-2026-23865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047500" comment="freetype2-devel-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047501" comment="freetype2-devel-32bit-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047502" comment="freetype2-profile-tti35-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047503" comment="ftdump-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047504" comment="libfreetype6-2.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047505" comment="libfreetype6-32bit-2.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254466" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3449" ref_url="https://www.suse.com/security/cve/CVE-2026-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3449/">CVE-2026-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3449">CVE-2026-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047506" comment="heroic-games-launcher-2.20.1-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254467" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.3-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467/" source="CVE"/>
		<reference ref_id="CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539/" source="CVE"/>
		<reference ref_id="CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.3-18.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047507" comment="libsoup-2_4-1-2.74.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047508" comment="libsoup-2_4-1-32bit-2.74.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047509" comment="libsoup2-devel-2.74.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047510" comment="libsoup2-devel-32bit-2.74.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047511" comment="libsoup2-lang-2.74.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047512" comment="typelib-1_0-Soup-2_4-2.74.3-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254468" version="1" class="patch">
	<metadata>
		<title>python311-Django-5.2.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25674" ref_url="https://www.suse.com/security/cve/CVE-2026-25674/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django-5.2.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25674/">CVE-2026-25674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25674">CVE-2026-25674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047513" comment="python311-Django-5.2.12-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047514" comment="python313-Django-5.2.12-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254469" version="1" class="patch">
	<metadata>
		<title>python311-joserfc-1.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27932" ref_url="https://www.suse.com/security/cve/CVE-2026-27932/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-joserfc-1.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27932/">CVE-2026-27932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27932">CVE-2026-27932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047515" comment="python311-joserfc-1.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047516" comment="python313-joserfc-1.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254470" version="1" class="patch">
	<metadata>
		<title>telemetrygen-0.147.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27141" ref_url="https://www.suse.com/security/cve/CVE-2026-27141/" source="CVE"/>
		<description>
These are all security issues fixed in the telemetrygen-0.147.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27141/">CVE-2026-27141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27141">CVE-2026-27141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047517" comment="telemetrygen-0.147.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254471" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-strongswan-1.6.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-9615" ref_url="https://www.suse.com/security/cve/CVE-2025-9615/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-strongswan-1.6.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9615/">CVE-2025-9615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9615">CVE-2025-9615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047687" comment="NetworkManager-applet-strongswan-1.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047688" comment="NetworkManager-strongswan-1.6.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047689" comment="NetworkManager-strongswan-lang-1.6.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254472" version="1" class="patch">
	<metadata>
		<title>chromedriver-145.0.7632.159-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3536" ref_url="https://www.suse.com/security/cve/CVE-2026-3536/" source="CVE"/>
		<reference ref_id="CVE-2026-3537" ref_url="https://www.suse.com/security/cve/CVE-2026-3537/" source="CVE"/>
		<reference ref_id="CVE-2026-3538" ref_url="https://www.suse.com/security/cve/CVE-2026-3538/" source="CVE"/>
		<reference ref_id="CVE-2026-3539" ref_url="https://www.suse.com/security/cve/CVE-2026-3539/" source="CVE"/>
		<reference ref_id="CVE-2026-3540" ref_url="https://www.suse.com/security/cve/CVE-2026-3540/" source="CVE"/>
		<reference ref_id="CVE-2026-3541" ref_url="https://www.suse.com/security/cve/CVE-2026-3541/" source="CVE"/>
		<reference ref_id="CVE-2026-3542" ref_url="https://www.suse.com/security/cve/CVE-2026-3542/" source="CVE"/>
		<reference ref_id="CVE-2026-3543" ref_url="https://www.suse.com/security/cve/CVE-2026-3543/" source="CVE"/>
		<reference ref_id="CVE-2026-3544" ref_url="https://www.suse.com/security/cve/CVE-2026-3544/" source="CVE"/>
		<reference ref_id="CVE-2026-3545" ref_url="https://www.suse.com/security/cve/CVE-2026-3545/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-145.0.7632.159-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3536/">CVE-2026-3536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3536">CVE-2026-3536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3537/">CVE-2026-3537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3537">CVE-2026-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3538/">CVE-2026-3538 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3538">CVE-2026-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3539/">CVE-2026-3539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3539">CVE-2026-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3540/">CVE-2026-3540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3540">CVE-2026-3540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3541/">CVE-2026-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3541">CVE-2026-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3542/">CVE-2026-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3542">CVE-2026-3542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3543/">CVE-2026-3543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3543">CVE-2026-3543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3544/">CVE-2026-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3544">CVE-2026-3544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3545/">CVE-2026-3545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3545">CVE-2026-3545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047690" comment="chromedriver-145.0.7632.159-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047691" comment="chromium-145.0.7632.159-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254473" version="1" class="patch">
	<metadata>
		<title>coredns-1.14.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26017" ref_url="https://www.suse.com/security/cve/CVE-2026-26017/" source="CVE"/>
		<reference ref_id="CVE-2026-26018" ref_url="https://www.suse.com/security/cve/CVE-2026-26018/" source="CVE"/>
		<description>
These are all security issues fixed in the coredns-1.14.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26017/">CVE-2026-26017 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26017">CVE-2026-26017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26018/">CVE-2026-26018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26018">CVE-2026-26018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047692" comment="coredns-1.14.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047693" comment="coredns-extras-1.14.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254474" version="1" class="patch">
	<metadata>
		<title>exiv2-0.28.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-26623" ref_url="https://www.suse.com/security/cve/CVE-2025-26623/" source="CVE"/>
		<reference ref_id="CVE-2025-54080" ref_url="https://www.suse.com/security/cve/CVE-2025-54080/" source="CVE"/>
		<reference ref_id="CVE-2025-55304" ref_url="https://www.suse.com/security/cve/CVE-2025-55304/" source="CVE"/>
		<reference ref_id="CVE-2026-25884" ref_url="https://www.suse.com/security/cve/CVE-2026-25884/" source="CVE"/>
		<reference ref_id="CVE-2026-27631" ref_url="https://www.suse.com/security/cve/CVE-2026-27631/" source="CVE"/>
		<description>
These are all security issues fixed in the exiv2-0.28.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26623/">CVE-2025-26623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26623">CVE-2025-26623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54080/">CVE-2025-54080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54080">CVE-2025-54080 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55304/">CVE-2025-55304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55304">CVE-2025-55304 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25884/">CVE-2026-25884 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25884">CVE-2026-25884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27631/">CVE-2026-27631 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27631">CVE-2026-27631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047694" comment="exiv2-0.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047695" comment="exiv2-lang-0.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047696" comment="libexiv2-28-0.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047697" comment="libexiv2-28-x86-64-v3-0.28.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047698" comment="libexiv2-devel-0.28.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254475" version="1" class="patch">
	<metadata>
		<title>go1.26-1.26.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<reference ref_id="CVE-2026-27137" ref_url="https://www.suse.com/security/cve/CVE-2026-27137/" source="CVE"/>
		<reference ref_id="CVE-2026-27138" ref_url="https://www.suse.com/security/cve/CVE-2026-27138/" source="CVE"/>
		<reference ref_id="CVE-2026-27139" ref_url="https://www.suse.com/security/cve/CVE-2026-27139/" source="CVE"/>
		<reference ref_id="CVE-2026-27142" ref_url="https://www.suse.com/security/cve/CVE-2026-27142/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.26-1.26.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27137/">CVE-2026-27137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27137">CVE-2026-27137 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27138/">CVE-2026-27138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27138">CVE-2026-27138 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27139/">CVE-2026-27139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27142/">CVE-2026-27142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047699" comment="go1.26-1.26.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047700" comment="go1.26-doc-1.26.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047701" comment="go1.26-libstd-1.26.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047702" comment="go1.26-race-1.26.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254476" version="1" class="patch">
	<metadata>
		<title>jetty-annotations-9.4.58-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-11143" ref_url="https://www.suse.com/security/cve/CVE-2025-11143/" source="CVE"/>
		<description>
These are all security issues fixed in the jetty-annotations-9.4.58-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11143/">CVE-2025-11143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11143">CVE-2025-11143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047703" comment="jetty-annotations-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047704" comment="jetty-ant-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047705" comment="jetty-cdi-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047706" comment="jetty-client-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047707" comment="jetty-continuation-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047708" comment="jetty-deploy-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047709" comment="jetty-fcgi-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047710" comment="jetty-http-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047711" comment="jetty-http-spi-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047712" comment="jetty-io-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047713" comment="jetty-jaas-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047714" comment="jetty-jmx-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047715" comment="jetty-jndi-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047716" comment="jetty-jsp-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047717" comment="jetty-minimal-javadoc-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047718" comment="jetty-openid-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047719" comment="jetty-plus-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047720" comment="jetty-project-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047721" comment="jetty-proxy-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047722" comment="jetty-quickstart-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047723" comment="jetty-rewrite-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047724" comment="jetty-security-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047725" comment="jetty-server-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047726" comment="jetty-servlet-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047727" comment="jetty-servlets-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047728" comment="jetty-start-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047729" comment="jetty-util-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047730" comment="jetty-util-ajax-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047731" comment="jetty-webapp-9.4.58-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047732" comment="jetty-xml-9.4.58-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254477" version="1" class="patch">
	<metadata>
		<title>kernel-devel-longterm-6.18.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991/" source="CVE"/>
		<reference ref_id="CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992/" source="CVE"/>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994/" source="CVE"/>
		<reference ref_id="CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995/" source="CVE"/>
		<reference ref_id="CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996/" source="CVE"/>
		<reference ref_id="CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997/" source="CVE"/>
		<reference ref_id="CVE-2025-39998" ref_url="https://www.suse.com/security/cve/CVE-2025-39998/" source="CVE"/>
		<reference ref_id="CVE-2025-39999" ref_url="https://www.suse.com/security/cve/CVE-2025-39999/" source="CVE"/>
		<reference ref_id="CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000/" source="CVE"/>
		<reference ref_id="CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001/" source="CVE"/>
		<reference ref_id="CVE-2025-40002" ref_url="https://www.suse.com/security/cve/CVE-2025-40002/" source="CVE"/>
		<reference ref_id="CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003/" source="CVE"/>
		<reference ref_id="CVE-2025-40004" ref_url="https://www.suse.com/security/cve/CVE-2025-40004/" source="CVE"/>
		<reference ref_id="CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013/" source="CVE"/>
		<reference ref_id="CVE-2025-40015" ref_url="https://www.suse.com/security/cve/CVE-2025-40015/" source="CVE"/>
		<reference ref_id="CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016/" source="CVE"/>
		<reference ref_id="CVE-2025-40017" ref_url="https://www.suse.com/security/cve/CVE-2025-40017/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40025" ref_url="https://www.suse.com/security/cve/CVE-2025-40025/" source="CVE"/>
		<reference ref_id="CVE-2025-40026" ref_url="https://www.suse.com/security/cve/CVE-2025-40026/" source="CVE"/>
		<reference ref_id="CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027/" source="CVE"/>
		<reference ref_id="CVE-2025-40028" ref_url="https://www.suse.com/security/cve/CVE-2025-40028/" source="CVE"/>
		<reference ref_id="CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029/" source="CVE"/>
		<reference ref_id="CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030/" source="CVE"/>
		<reference ref_id="CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031/" source="CVE"/>
		<reference ref_id="CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032/" source="CVE"/>
		<reference ref_id="CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033/" source="CVE"/>
		<reference ref_id="CVE-2025-40034" ref_url="https://www.suse.com/security/cve/CVE-2025-40034/" source="CVE"/>
		<reference ref_id="CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035/" source="CVE"/>
		<reference ref_id="CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036/" source="CVE"/>
		<reference ref_id="CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037/" source="CVE"/>
		<reference ref_id="CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038/" source="CVE"/>
		<reference ref_id="CVE-2025-40039" ref_url="https://www.suse.com/security/cve/CVE-2025-40039/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40041" ref_url="https://www.suse.com/security/cve/CVE-2025-40041/" source="CVE"/>
		<reference ref_id="CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042/" source="CVE"/>
		<reference ref_id="CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045/" source="CVE"/>
		<reference ref_id="CVE-2025-40046" ref_url="https://www.suse.com/security/cve/CVE-2025-40046/" source="CVE"/>
		<reference ref_id="CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049/" source="CVE"/>
		<reference ref_id="CVE-2025-40050" ref_url="https://www.suse.com/security/cve/CVE-2025-40050/" source="CVE"/>
		<reference ref_id="CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051/" source="CVE"/>
		<reference ref_id="CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052/" source="CVE"/>
		<reference ref_id="CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053/" source="CVE"/>
		<reference ref_id="CVE-2025-40054" ref_url="https://www.suse.com/security/cve/CVE-2025-40054/" source="CVE"/>
		<reference ref_id="CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055/" source="CVE"/>
		<reference ref_id="CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056/" source="CVE"/>
		<reference ref_id="CVE-2025-40057" ref_url="https://www.suse.com/security/cve/CVE-2025-40057/" source="CVE"/>
		<reference ref_id="CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058/" source="CVE"/>
		<reference ref_id="CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059/" source="CVE"/>
		<reference ref_id="CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060/" source="CVE"/>
		<reference ref_id="CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061/" source="CVE"/>
		<reference ref_id="CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062/" source="CVE"/>
		<reference ref_id="CVE-2025-40063" ref_url="https://www.suse.com/security/cve/CVE-2025-40063/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-40065" ref_url="https://www.suse.com/security/cve/CVE-2025-40065/" source="CVE"/>
		<reference ref_id="CVE-2025-40066" ref_url="https://www.suse.com/security/cve/CVE-2025-40066/" source="CVE"/>
		<reference ref_id="CVE-2025-40067" ref_url="https://www.suse.com/security/cve/CVE-2025-40067/" source="CVE"/>
		<reference ref_id="CVE-2025-40068" ref_url="https://www.suse.com/security/cve/CVE-2025-40068/" source="CVE"/>
		<reference ref_id="CVE-2025-40069" ref_url="https://www.suse.com/security/cve/CVE-2025-40069/" source="CVE"/>
		<reference ref_id="CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070/" source="CVE"/>
		<reference ref_id="CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071/" source="CVE"/>
		<reference ref_id="CVE-2025-40072" ref_url="https://www.suse.com/security/cve/CVE-2025-40072/" source="CVE"/>
		<reference ref_id="CVE-2025-40073" ref_url="https://www.suse.com/security/cve/CVE-2025-40073/" source="CVE"/>
		<reference ref_id="CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074/" source="CVE"/>
		<reference ref_id="CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075/" source="CVE"/>
		<reference ref_id="CVE-2025-40076" ref_url="https://www.suse.com/security/cve/CVE-2025-40076/" source="CVE"/>
		<reference ref_id="CVE-2025-40077" ref_url="https://www.suse.com/security/cve/CVE-2025-40077/" source="CVE"/>
		<reference ref_id="CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078/" source="CVE"/>
		<reference ref_id="CVE-2025-40079" ref_url="https://www.suse.com/security/cve/CVE-2025-40079/" source="CVE"/>
		<reference ref_id="CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080/" source="CVE"/>
		<reference ref_id="CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081/" source="CVE"/>
		<reference ref_id="CVE-2025-40082" ref_url="https://www.suse.com/security/cve/CVE-2025-40082/" source="CVE"/>
		<reference ref_id="CVE-2025-40084" ref_url="https://www.suse.com/security/cve/CVE-2025-40084/" source="CVE"/>
		<reference ref_id="CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085/" source="CVE"/>
		<reference ref_id="CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086/" source="CVE"/>
		<reference ref_id="CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087/" source="CVE"/>
		<reference ref_id="CVE-2025-40088" ref_url="https://www.suse.com/security/cve/CVE-2025-40088/" source="CVE"/>
		<reference ref_id="CVE-2025-40089" ref_url="https://www.suse.com/security/cve/CVE-2025-40089/" source="CVE"/>
		<reference ref_id="CVE-2025-40090" ref_url="https://www.suse.com/security/cve/CVE-2025-40090/" source="CVE"/>
		<reference ref_id="CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091/" source="CVE"/>
		<reference ref_id="CVE-2025-40092" ref_url="https://www.suse.com/security/cve/CVE-2025-40092/" source="CVE"/>
		<reference ref_id="CVE-2025-40093" ref_url="https://www.suse.com/security/cve/CVE-2025-40093/" source="CVE"/>
		<reference ref_id="CVE-2025-40094" ref_url="https://www.suse.com/security/cve/CVE-2025-40094/" source="CVE"/>
		<reference ref_id="CVE-2025-40095" ref_url="https://www.suse.com/security/cve/CVE-2025-40095/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097/" source="CVE"/>
		<reference ref_id="CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098/" source="CVE"/>
		<reference ref_id="CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099/" source="CVE"/>
		<reference ref_id="CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100/" source="CVE"/>
		<reference ref_id="CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103/" source="CVE"/>
		<reference ref_id="CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104/" source="CVE"/>
		<reference ref_id="CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105/" source="CVE"/>
		<reference ref_id="CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<reference ref_id="CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254/" source="CVE"/>
		<reference ref_id="CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255/" source="CVE"/>
		<reference ref_id="CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256/" source="CVE"/>
		<reference ref_id="CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257/" source="CVE"/>
		<reference ref_id="CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258/" source="CVE"/>
		<reference ref_id="CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259/" source="CVE"/>
		<reference ref_id="CVE-2025-68260" ref_url="https://www.suse.com/security/cve/CVE-2025-68260/" source="CVE"/>
		<reference ref_id="CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261/" source="CVE"/>
		<reference ref_id="CVE-2025-68262" ref_url="https://www.suse.com/security/cve/CVE-2025-68262/" source="CVE"/>
		<reference ref_id="CVE-2025-68263" ref_url="https://www.suse.com/security/cve/CVE-2025-68263/" source="CVE"/>
		<reference ref_id="CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264/" source="CVE"/>
		<reference ref_id="CVE-2025-68323" ref_url="https://www.suse.com/security/cve/CVE-2025-68323/" source="CVE"/>
		<reference ref_id="CVE-2025-68324" ref_url="https://www.suse.com/security/cve/CVE-2025-68324/" source="CVE"/>
		<reference ref_id="CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325/" source="CVE"/>
		<reference ref_id="CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332/" source="CVE"/>
		<reference ref_id="CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335/" source="CVE"/>
		<reference ref_id="CVE-2025-68336" ref_url="https://www.suse.com/security/cve/CVE-2025-68336/" source="CVE"/>
		<reference ref_id="CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337/" source="CVE"/>
		<reference ref_id="CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344/" source="CVE"/>
		<reference ref_id="CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345/" source="CVE"/>
		<reference ref_id="CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346/" source="CVE"/>
		<reference ref_id="CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347/" source="CVE"/>
		<reference ref_id="CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2025-68350" ref_url="https://www.suse.com/security/cve/CVE-2025-68350/" source="CVE"/>
		<reference ref_id="CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351/" source="CVE"/>
		<reference ref_id="CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352/" source="CVE"/>
		<reference ref_id="CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353/" source="CVE"/>
		<reference ref_id="CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354/" source="CVE"/>
		<reference ref_id="CVE-2025-68355" ref_url="https://www.suse.com/security/cve/CVE-2025-68355/" source="CVE"/>
		<reference ref_id="CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356/" source="CVE"/>
		<reference ref_id="CVE-2025-68357" ref_url="https://www.suse.com/security/cve/CVE-2025-68357/" source="CVE"/>
		<reference ref_id="CVE-2025-68358" ref_url="https://www.suse.com/security/cve/CVE-2025-68358/" source="CVE"/>
		<reference ref_id="CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359/" source="CVE"/>
		<reference ref_id="CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360/" source="CVE"/>
		<reference ref_id="CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361/" source="CVE"/>
		<reference ref_id="CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362/" source="CVE"/>
		<reference ref_id="CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363/" source="CVE"/>
		<reference ref_id="CVE-2025-68364" ref_url="https://www.suse.com/security/cve/CVE-2025-68364/" source="CVE"/>
		<reference ref_id="CVE-2025-68365" ref_url="https://www.suse.com/security/cve/CVE-2025-68365/" source="CVE"/>
		<reference ref_id="CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366/" source="CVE"/>
		<reference ref_id="CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367/" source="CVE"/>
		<reference ref_id="CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368/" source="CVE"/>
		<reference ref_id="CVE-2025-68369" ref_url="https://www.suse.com/security/cve/CVE-2025-68369/" source="CVE"/>
		<reference ref_id="CVE-2025-68370" ref_url="https://www.suse.com/security/cve/CVE-2025-68370/" source="CVE"/>
		<reference ref_id="CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371/" source="CVE"/>
		<reference ref_id="CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372/" source="CVE"/>
		<reference ref_id="CVE-2025-68373" ref_url="https://www.suse.com/security/cve/CVE-2025-68373/" source="CVE"/>
		<reference ref_id="CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374/" source="CVE"/>
		<reference ref_id="CVE-2025-68375" ref_url="https://www.suse.com/security/cve/CVE-2025-68375/" source="CVE"/>
		<reference ref_id="CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376/" source="CVE"/>
		<reference ref_id="CVE-2025-68377" ref_url="https://www.suse.com/security/cve/CVE-2025-68377/" source="CVE"/>
		<reference ref_id="CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378/" source="CVE"/>
		<reference ref_id="CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379/" source="CVE"/>
		<reference ref_id="CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380/" source="CVE"/>
		<reference ref_id="CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724/" source="CVE"/>
		<reference ref_id="CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725/" source="CVE"/>
		<reference ref_id="CVE-2025-68726" ref_url="https://www.suse.com/security/cve/CVE-2025-68726/" source="CVE"/>
		<reference ref_id="CVE-2025-68727" ref_url="https://www.suse.com/security/cve/CVE-2025-68727/" source="CVE"/>
		<reference ref_id="CVE-2025-68728" ref_url="https://www.suse.com/security/cve/CVE-2025-68728/" source="CVE"/>
		<reference ref_id="CVE-2025-68729" ref_url="https://www.suse.com/security/cve/CVE-2025-68729/" source="CVE"/>
		<reference ref_id="CVE-2025-68730" ref_url="https://www.suse.com/security/cve/CVE-2025-68730/" source="CVE"/>
		<reference ref_id="CVE-2025-68731" ref_url="https://www.suse.com/security/cve/CVE-2025-68731/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68733" ref_url="https://www.suse.com/security/cve/CVE-2025-68733/" source="CVE"/>
		<reference ref_id="CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735/" source="CVE"/>
		<reference ref_id="CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736/" source="CVE"/>
		<reference ref_id="CVE-2025-68737" ref_url="https://www.suse.com/security/cve/CVE-2025-68737/" source="CVE"/>
		<reference ref_id="CVE-2025-68738" ref_url="https://www.suse.com/security/cve/CVE-2025-68738/" source="CVE"/>
		<reference ref_id="CVE-2025-68739" ref_url="https://www.suse.com/security/cve/CVE-2025-68739/" source="CVE"/>
		<reference ref_id="CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740/" source="CVE"/>
		<reference ref_id="CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741/" source="CVE"/>
		<reference ref_id="CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742/" source="CVE"/>
		<reference ref_id="CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743/" source="CVE"/>
		<reference ref_id="CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744/" source="CVE"/>
		<reference ref_id="CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745/" source="CVE"/>
		<reference ref_id="CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746/" source="CVE"/>
		<reference ref_id="CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747/" source="CVE"/>
		<reference ref_id="CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748/" source="CVE"/>
		<reference ref_id="CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749/" source="CVE"/>
		<reference ref_id="CVE-2025-68751" ref_url="https://www.suse.com/security/cve/CVE-2025-68751/" source="CVE"/>
		<reference ref_id="CVE-2025-68752" ref_url="https://www.suse.com/security/cve/CVE-2025-68752/" source="CVE"/>
		<reference ref_id="CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753/" source="CVE"/>
		<reference ref_id="CVE-2025-68754" ref_url="https://www.suse.com/security/cve/CVE-2025-68754/" source="CVE"/>
		<reference ref_id="CVE-2025-68755" ref_url="https://www.suse.com/security/cve/CVE-2025-68755/" source="CVE"/>
		<reference ref_id="CVE-2025-68756" ref_url="https://www.suse.com/security/cve/CVE-2025-68756/" source="CVE"/>
		<reference ref_id="CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757/" source="CVE"/>
		<reference ref_id="CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758/" source="CVE"/>
		<reference ref_id="CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759/" source="CVE"/>
		<reference ref_id="CVE-2025-68760" ref_url="https://www.suse.com/security/cve/CVE-2025-68760/" source="CVE"/>
		<reference ref_id="CVE-2025-68761" ref_url="https://www.suse.com/security/cve/CVE-2025-68761/" source="CVE"/>
		<reference ref_id="CVE-2025-68762" ref_url="https://www.suse.com/security/cve/CVE-2025-68762/" source="CVE"/>
		<reference ref_id="CVE-2025-68763" ref_url="https://www.suse.com/security/cve/CVE-2025-68763/" source="CVE"/>
		<reference ref_id="CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764/" source="CVE"/>
		<reference ref_id="CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765/" source="CVE"/>
		<reference ref_id="CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-longterm-6.18.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39998/">CVE-2025-39998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39998">CVE-2025-39998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39999/">CVE-2025-39999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39999">CVE-2025-39999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40002/">CVE-2025-40002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40002">CVE-2025-40002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40004/">CVE-2025-40004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40004">CVE-2025-40004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40015/">CVE-2025-40015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40015">CVE-2025-40015 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40017/">CVE-2025-40017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40017">CVE-2025-40017 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40025/">CVE-2025-40025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40025">CVE-2025-40025 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40026/">CVE-2025-40026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40026">CVE-2025-40026 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40028/">CVE-2025-40028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40028">CVE-2025-40028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40034/">CVE-2025-40034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40034">CVE-2025-40034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40039/">CVE-2025-40039 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40039">CVE-2025-40039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40041/">CVE-2025-40041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40041">CVE-2025-40041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40046/">CVE-2025-40046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40046">CVE-2025-40046 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40050/">CVE-2025-40050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40050">CVE-2025-40050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40054/">CVE-2025-40054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40054">CVE-2025-40054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40057/">CVE-2025-40057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40057">CVE-2025-40057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40063/">CVE-2025-40063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40063">CVE-2025-40063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40065/">CVE-2025-40065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40065">CVE-2025-40065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40066/">CVE-2025-40066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40066">CVE-2025-40066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40067/">CVE-2025-40067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40067">CVE-2025-40067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40068/">CVE-2025-40068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40068">CVE-2025-40068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40069/">CVE-2025-40069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40069">CVE-2025-40069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40072/">CVE-2025-40072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40072">CVE-2025-40072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40073/">CVE-2025-40073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40073">CVE-2025-40073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40076/">CVE-2025-40076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40076">CVE-2025-40076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40077/">CVE-2025-40077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40077">CVE-2025-40077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40079/">CVE-2025-40079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40079">CVE-2025-40079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40082/">CVE-2025-40082 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40082">CVE-2025-40082 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40084/">CVE-2025-40084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40084">CVE-2025-40084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40088/">CVE-2025-40088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40089/">CVE-2025-40089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40089">CVE-2025-40089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40090/">CVE-2025-40090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40090">CVE-2025-40090 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40092/">CVE-2025-40092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40092">CVE-2025-40092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40093/">CVE-2025-40093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40093">CVE-2025-40093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40094/">CVE-2025-40094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40094">CVE-2025-40094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40095/">CVE-2025-40095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40095">CVE-2025-40095 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68260/">CVE-2025-68260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68260">CVE-2025-68260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68262/">CVE-2025-68262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68262">CVE-2025-68262 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68263/">CVE-2025-68263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68263">CVE-2025-68263 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68323/">CVE-2025-68323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68323">CVE-2025-68323 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68324/">CVE-2025-68324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68324">CVE-2025-68324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68336/">CVE-2025-68336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68336">CVE-2025-68336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68350/">CVE-2025-68350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68350">CVE-2025-68350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68355/">CVE-2025-68355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68355">CVE-2025-68355 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68357/">CVE-2025-68357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68357">CVE-2025-68357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68358/">CVE-2025-68358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68358">CVE-2025-68358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68364/">CVE-2025-68364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68364">CVE-2025-68364 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68365/">CVE-2025-68365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68365">CVE-2025-68365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68369/">CVE-2025-68369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68369">CVE-2025-68369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68370/">CVE-2025-68370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68370">CVE-2025-68370 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68373/">CVE-2025-68373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68373">CVE-2025-68373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68375/">CVE-2025-68375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68375">CVE-2025-68375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68377/">CVE-2025-68377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68377">CVE-2025-68377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68726/">CVE-2025-68726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68726">CVE-2025-68726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68727/">CVE-2025-68727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68727">CVE-2025-68727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68728/">CVE-2025-68728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68728">CVE-2025-68728 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68729/">CVE-2025-68729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68729">CVE-2025-68729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68730/">CVE-2025-68730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68730">CVE-2025-68730 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68731/">CVE-2025-68731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68731">CVE-2025-68731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68733/">CVE-2025-68733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68733">CVE-2025-68733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68737/">CVE-2025-68737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68737">CVE-2025-68737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68738/">CVE-2025-68738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68738">CVE-2025-68738 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68739/">CVE-2025-68739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68739">CVE-2025-68739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68751/">CVE-2025-68751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68751">CVE-2025-68751 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/S:U/UI:N/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68752/">CVE-2025-68752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68752">CVE-2025-68752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68754/">CVE-2025-68754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68754">CVE-2025-68754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68755/">CVE-2025-68755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68755">CVE-2025-68755 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68756/">CVE-2025-68756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68756">CVE-2025-68756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68760/">CVE-2025-68760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68760">CVE-2025-68760 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68761/">CVE-2025-68761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68761">CVE-2025-68761 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68762/">CVE-2025-68762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68762">CVE-2025-68762 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68763/">CVE-2025-68763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68763">CVE-2025-68763 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047733" comment="kernel-source-longterm-6.18.16-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254478" version="1" class="patch">
	<metadata>
		<title>kubeshark-cli-53.1.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<description>
These are all security issues fixed in the kubeshark-cli-53.1.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047734" comment="kubeshark-cli-53.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047735" comment="kubeshark-cli-bash-completion-53.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047736" comment="kubeshark-cli-fish-completion-53.1.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047737" comment="kubeshark-cli-zsh-completion-53.1.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254479" version="1" class="patch">
	<metadata>
		<title>libIex-3_4-33-3.4.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27622" ref_url="https://www.suse.com/security/cve/CVE-2026-27622/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_4-33-3.4.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27622/">CVE-2026-27622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27622">CVE-2026-27622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047738" comment="libIex-3_4-33-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047739" comment="libIex-3_4-33-32bit-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047740" comment="libIex-3_4-33-x86-64-v3-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047741" comment="libIlmThread-3_4-33-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047742" comment="libIlmThread-3_4-33-32bit-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047743" comment="libIlmThread-3_4-33-x86-64-v3-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047744" comment="libOpenEXR-3_4-33-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047745" comment="libOpenEXR-3_4-33-32bit-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047746" comment="libOpenEXR-3_4-33-x86-64-v3-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047747" comment="libOpenEXRCore-3_4-33-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047748" comment="libOpenEXRCore-3_4-33-32bit-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047749" comment="libOpenEXRCore-3_4-33-x86-64-v3-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047750" comment="libOpenEXRUtil-3_4-33-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047751" comment="libOpenEXRUtil-3_4-33-32bit-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047752" comment="libOpenEXRUtil-3_4-33-x86-64-v3-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047753" comment="openexr-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047754" comment="openexr-devel-3.4.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047755" comment="openexr-doc-3.4.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254480" version="1" class="patch">
	<metadata>
		<title>python311-nltk-3.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0847" ref_url="https://www.suse.com/security/cve/CVE-2026-0847/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-nltk-3.9.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0847/">CVE-2026-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0847">CVE-2026-0847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047756" comment="python311-nltk-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047757" comment="python313-nltk-3.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254481" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.115-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.115-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047758" comment="tomcat-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047759" comment="tomcat-admin-webapps-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047760" comment="tomcat-docs-webapp-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047761" comment="tomcat-el-3_0-api-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047762" comment="tomcat-embed-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047763" comment="tomcat-javadoc-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047764" comment="tomcat-jsp-2_3-api-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047765" comment="tomcat-jsvc-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047766" comment="tomcat-lib-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047767" comment="tomcat-servlet-4_0-api-9.0.115-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047768" comment="tomcat-webapps-9.0.115-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254482" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.52-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.52-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047769" comment="tomcat10-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047770" comment="tomcat10-admin-webapps-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047771" comment="tomcat10-doc-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047772" comment="tomcat10-docs-webapp-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047773" comment="tomcat10-el-5_0-api-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047774" comment="tomcat10-embed-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047775" comment="tomcat10-jsp-3_1-api-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047776" comment="tomcat10-jsvc-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047777" comment="tomcat10-lib-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047778" comment="tomcat10-servlet-6_0-api-10.1.52-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047779" comment="tomcat10-webapps-10.1.52-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254483" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047780" comment="tomcat11-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047781" comment="tomcat11-admin-webapps-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047782" comment="tomcat11-doc-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047783" comment="tomcat11-docs-webapp-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047784" comment="tomcat11-el-6_0-api-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047785" comment="tomcat11-embed-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047786" comment="tomcat11-jsp-4_0-api-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047787" comment="tomcat11-jsvc-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047788" comment="tomcat11-lib-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047789" comment="tomcat11-servlet-6_1-api-11.0.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047790" comment="tomcat11-webapps-11.0.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254484" version="1" class="patch">
	<metadata>
		<title>virtiofsd-1.13.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
These are all security issues fixed in the virtiofsd-1.13.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047791" comment="virtiofsd-1.13.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254485" version="1" class="patch">
	<metadata>
		<title>weblate-5.16.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27457" ref_url="https://www.suse.com/security/cve/CVE-2026-27457/" source="CVE"/>
		<description>
These are all security issues fixed in the weblate-5.16.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27457/">CVE-2026-27457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27457">CVE-2026-27457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047792" comment="weblate-5.16.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254486" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<reference ref_id="CVE-2026-27139" ref_url="https://www.suse.com/security/cve/CVE-2026-27139/" source="CVE"/>
		<reference ref_id="CVE-2026-27142" ref_url="https://www.suse.com/security/cve/CVE-2026-27142/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27139/">CVE-2026-27139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27142/">CVE-2026-27142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047798" comment="go1.25-1.25.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047799" comment="go1.25-doc-1.25.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047800" comment="go1.25-libstd-1.25.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047801" comment="go1.25-race-1.25.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254487" version="1" class="patch">
	<metadata>
		<title>corepack24-24.13.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59464" ref_url="https://www.suse.com/security/cve/CVE-2025-59464/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack24-24.13.0-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59464/">CVE-2025-59464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59464">CVE-2025-59464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047802" comment="corepack24-24.13.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047803" comment="nodejs24-24.13.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047804" comment="nodejs24-devel-24.13.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047805" comment="nodejs24-docs-24.13.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047806" comment="npm24-24.13.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254488" version="1" class="patch">
	<metadata>
		<title>python311-pymongo-4.16.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pymongo-4.16.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-09"/>
	<updated date="2026-03-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048023" comment="python311-pymongo-4.16.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048024" comment="python313-pymongo-4.16.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254489" version="1" class="patch">
	<metadata>
		<title>rclone-1.73.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1229" ref_url="https://www.suse.com/security/cve/CVE-2026-1229/" source="CVE"/>
		<reference ref_id="CVE-2026-27141" ref_url="https://www.suse.com/security/cve/CVE-2026-27141/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.73.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-09"/>
	<updated date="2026-03-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1229/">CVE-2026-1229 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1229">CVE-2026-1229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27141/">CVE-2026-27141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27141">CVE-2026-27141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048025" comment="rclone-1.73.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048026" comment="rclone-bash-completion-1.73.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048027" comment="rclone-zsh-completion-1.73.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254490" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.40-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26998" ref_url="https://www.suse.com/security/cve/CVE-2026-26998/" source="CVE"/>
		<reference ref_id="CVE-2026-26999" ref_url="https://www.suse.com/security/cve/CVE-2026-26999/" source="CVE"/>
		<reference ref_id="CVE-2026-29054" ref_url="https://www.suse.com/security/cve/CVE-2026-29054/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.40-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-09"/>
	<updated date="2026-03-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26998/">CVE-2026-26998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26998">CVE-2026-26998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26999/">CVE-2026-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26999">CVE-2026-26999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-29054/">CVE-2026-29054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29054">CVE-2026-29054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048028" comment="traefik2-2.11.40-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254491" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.46-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25799" ref_url="https://www.suse.com/security/cve/CVE-2026-25799/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.46-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25799/">CVE-2026-25799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25799">CVE-2026-25799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048029" comment="GraphicsMagick-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048030" comment="GraphicsMagick-devel-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048031" comment="libGraphicsMagick++-Q16-12-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048032" comment="libGraphicsMagick++-devel-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048033" comment="libGraphicsMagick-Q16-3-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048034" comment="libGraphicsMagick3-config-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048035" comment="libGraphicsMagickWand-Q16-2-1.3.46-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048036" comment="perl-GraphicsMagick-1.3.46-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254492" version="1" class="patch">
	<metadata>
		<title>ghostty-1.3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26982" ref_url="https://www.suse.com/security/cve/CVE-2026-26982/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostty-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26982/">CVE-2026-26982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26982">CVE-2026-26982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048037" comment="ghostty-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048038" comment="ghostty-bash-completion-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048039" comment="ghostty-devel-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048040" comment="ghostty-doc-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048041" comment="ghostty-fish-completion-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048042" comment="ghostty-lang-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048043" comment="ghostty-neovim-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048044" comment="ghostty-nushell-completion-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048045" comment="ghostty-vim-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048046" comment="ghostty-zsh-completion-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048047" comment="libghostty-vt0-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048048" comment="nautilus-extension-ghostty-1.3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048049" comment="terminfo-ghostty-1.3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254493" version="1" class="patch">
	<metadata>
		<title>grype-0.109.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-12183" ref_url="https://www.suse.com/security/cve/CVE-2025-12183/" source="CVE"/>
		<description>
These are all security issues fixed in the grype-0.109.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12183/">CVE-2025-12183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12183">CVE-2025-12183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048050" comment="grype-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048051" comment="grype-bash-completion-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048052" comment="grype-fish-completion-0.109.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048053" comment="grype-zsh-completion-0.109.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254494" version="1" class="patch">
	<metadata>
		<title>helm-4.1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55199" ref_url="https://www.suse.com/security/cve/CVE-2025-55199/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55199/">CVE-2025-55199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55199">CVE-2025-55199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048054" comment="helm-4.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048055" comment="helm-bash-completion-4.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048056" comment="helm-fish-completion-4.1.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048057" comment="helm-zsh-completion-4.1.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254495" version="1" class="patch">
	<metadata>
		<title>helm3-3.20.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55199" ref_url="https://www.suse.com/security/cve/CVE-2025-55199/" source="CVE"/>
		<description>
These are all security issues fixed in the helm3-3.20.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55199/">CVE-2025-55199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55199">CVE-2025-55199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048058" comment="helm3-3.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048059" comment="helm3-bash-completion-3.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048060" comment="helm3-fish-completion-3.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048061" comment="helm3-zsh-completion-3.20.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254496" version="1" class="patch">
	<metadata>
		<title>perl-Compress-Raw-Zlib-2.222-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3381" ref_url="https://www.suse.com/security/cve/CVE-2026-3381/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Compress-Raw-Zlib-2.222-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3381/">CVE-2026-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3381">CVE-2026-3381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048062" comment="perl-Compress-Raw-Zlib-2.222-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254497" version="1" class="patch">
	<metadata>
		<title>python311-PyPDF2-2.11.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28804" ref_url="https://www.suse.com/security/cve/CVE-2026-28804/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyPDF2-2.11.1-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28804/">CVE-2026-28804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28804">CVE-2026-28804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048063" comment="python311-PyPDF2-2.11.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048064" comment="python313-PyPDF2-2.11.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254498" version="1" class="patch">
	<metadata>
		<title>python311-lxml_html_clean-0.4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28348" ref_url="https://www.suse.com/security/cve/CVE-2026-28348/" source="CVE"/>
		<reference ref_id="CVE-2026-28350" ref_url="https://www.suse.com/security/cve/CVE-2026-28350/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-lxml_html_clean-0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28348/">CVE-2026-28348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28348">CVE-2026-28348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28350/">CVE-2026-28350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28350">CVE-2026-28350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048065" comment="python311-lxml_html_clean-0.4.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048066" comment="python313-lxml_html_clean-0.4.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254499" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26998" ref_url="https://www.suse.com/security/cve/CVE-2026-26998/" source="CVE"/>
		<reference ref_id="CVE-2026-26999" ref_url="https://www.suse.com/security/cve/CVE-2026-26999/" source="CVE"/>
		<reference ref_id="CVE-2026-29054" ref_url="https://www.suse.com/security/cve/CVE-2026-29054/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26998/">CVE-2026-26998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26998">CVE-2026-26998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26999/">CVE-2026-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26999">CVE-2026-26999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-29054/">CVE-2026-29054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29054">CVE-2026-29054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048067" comment="traefik-3.6.10-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254500" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-148.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3846" ref_url="https://www.suse.com/security/cve/CVE-2026-3846/" source="CVE"/>
		<reference ref_id="CVE-2026-3847" ref_url="https://www.suse.com/security/cve/CVE-2026-3847/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-148.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-3846/">CVE-2026-3846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3846">CVE-2026-3846 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3847/">CVE-2026-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3847">CVE-2026-3847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048766" comment="MozillaFirefox-148.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048767" comment="MozillaFirefox-branding-upstream-148.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048768" comment="MozillaFirefox-devel-148.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048769" comment="MozillaFirefox-translations-common-148.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048770" comment="MozillaFirefox-translations-other-148.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254501" version="1" class="patch">
	<metadata>
		<title>clamav-1.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-20031" ref_url="https://www.suse.com/security/cve/CVE-2026-20031/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-20031/">CVE-2026-20031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-20031">CVE-2026-20031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048771" comment="clamav-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048772" comment="clamav-devel-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048773" comment="clamav-docs-html-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048774" comment="clamav-milter-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048775" comment="libclamav12-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048776" comment="libclammspack0-1.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048777" comment="libfreshclam4-1.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254502" version="1" class="patch">
	<metadata>
		<title>giflib-devel-32bit-5.2.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23868" ref_url="https://www.suse.com/security/cve/CVE-2026-23868/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-32bit-5.2.2-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23868/">CVE-2026-23868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23868">CVE-2026-23868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048778" comment="giflib-devel-5.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048779" comment="giflib-devel-32bit-5.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048780" comment="giflib-progs-5.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048781" comment="libgif7-5.2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048782" comment="libgif7-32bit-5.2.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254503" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28292" ref_url="https://www.suse.com/security/cve/CVE-2026-28292/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.1-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-28292/">CVE-2026-28292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28292">CVE-2026-28292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048783" comment="heroic-games-launcher-2.20.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254504" version="1" class="patch">
	<metadata>
		<title>himmelblau-2.3.8+git0.dec3693-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31979" ref_url="https://www.suse.com/security/cve/CVE-2026-31979/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-2.3.8+git0.dec3693-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31979/">CVE-2026-31979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31979">CVE-2026-31979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048784" comment="himmelblau-2.3.8+git0.dec3693-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048785" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048786" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048787" comment="himmelblau-sso-2.3.8+git0.dec3693-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048788" comment="libnss_himmelblau2-2.3.8+git0.dec3693-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048789" comment="pam-himmelblau-2.3.8+git0.dec3693-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254505" version="1" class="patch">
	<metadata>
		<title>kubelogin-0.2.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
These are all security issues fixed in the kubelogin-0.2.16-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048790" comment="kubelogin-0.2.16-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254506" version="1" class="patch">
	<metadata>
		<title>mingw32-binutils-2.45.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545/" source="CVE"/>
		<reference ref_id="CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546/" source="CVE"/>
		<description>
These are all security issues fixed in the mingw32-binutils-2.45.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048791" comment="mingw32-binutils-2.45.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048792" comment="mingw32-binutils-debug-2.45.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048793" comment="mingw32-binutils-devel-2.45.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254507" version="1" class="patch">
	<metadata>
		<title>mingw64-binutils-2.45.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545/" source="CVE"/>
		<reference ref_id="CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546/" source="CVE"/>
		<description>
These are all security issues fixed in the mingw64-binutils-2.45.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048794" comment="mingw64-binutils-2.45.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048795" comment="mingw64-binutils-debug-2.45.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048796" comment="mingw64-binutils-devel-2.45.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254508" version="1" class="patch">
	<metadata>
		<title>python311-PyPDF2-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31826" ref_url="https://www.suse.com/security/cve/CVE-2026-31826/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyPDF2-2.11.1-7.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31826/">CVE-2026-31826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31826">CVE-2026-31826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048797" comment="python311-PyPDF2-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048798" comment="python313-PyPDF2-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254509" version="1" class="patch">
	<metadata>
		<title>python311-multipart-1.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28356" ref_url="https://www.suse.com/security/cve/CVE-2026-28356/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-multipart-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28356/">CVE-2026-28356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28356">CVE-2026-28356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048799" comment="python311-multipart-1.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048800" comment="python313-multipart-1.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254510" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31826" ref_url="https://www.suse.com/security/cve/CVE-2026-31826/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31826/">CVE-2026-31826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31826">CVE-2026-31826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048801" comment="python311-pypdf-6.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048802" comment="python313-pypdf-6.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254511" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048803" comment="ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254512" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048804" comment="ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254513" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048805" comment="ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254514" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048806" comment="ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254515" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048807" comment="ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254516" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048808" comment="ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254517" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048809" comment="ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254518" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048810" comment="ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254519" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<reference ref_id="CVE-2025-55193" ref_url="https://www.suse.com/security/cve/CVE-2025-55193/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55193/">CVE-2025-55193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55193">CVE-2025-55193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048811" comment="ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254520" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048812" comment="ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254521" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048813" comment="ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254522" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2021-41186" ref_url="https://www.suse.com/security/cve/CVE-2021-41186/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-fluentd-1.17.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41186/">CVE-2021-41186 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41186">CVE-2021-41186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048814" comment="ruby4.0-rubygem-fluentd-1.17.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254523" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-22799" ref_url="https://www.suse.com/security/cve/CVE-2023-22799/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-globalid-1.2.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22799/">CVE-2023-22799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22799">CVE-2023-22799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048815" comment="ruby4.0-rubygem-globalid-1.2.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254524" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-grpc-1.70.1-1.7 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048816" comment="ruby4.0-rubygem-grpc-1.70.1-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254525" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-http-cookie-1.0.8-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">CVE-2016-7401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048817" comment="ruby4.0-rubygem-http-cookie-1.0.8-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254526" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-1840" ref_url="https://www.suse.com/security/cve/CVE-2015-1840/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-jquery-rails-4.6.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1840/">CVE-2015-1840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1840">CVE-2015-1840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048818" comment="ruby4.0-rubygem-jquery-rails-4.6.0-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254527" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-json_pure-2.7.6-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048819" comment="ruby4.0-rubygem-json_pure-2.7.6-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254528" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="CVE-2021-28834" ref_url="https://www.suse.com/security/cve/CVE-2021-28834/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-kramdown-2.4.0-1.17 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28834/">CVE-2021-28834 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28834">CVE-2021-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048820" comment="ruby4.0-rubygem-kramdown-2.4.0-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254529" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<reference ref_id="CVE-2022-23514" ref_url="https://www.suse.com/security/cve/CVE-2022-23514/" source="CVE"/>
		<reference ref_id="CVE-2022-23515" ref_url="https://www.suse.com/security/cve/CVE-2022-23515/" source="CVE"/>
		<reference ref_id="CVE-2022-23516" ref_url="https://www.suse.com/security/cve/CVE-2022-23516/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-loofah-2.23.1-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23514/">CVE-2022-23514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23514">CVE-2022-23514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23515/">CVE-2022-23515 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23515">CVE-2022-23515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23516/">CVE-2022-23516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23516">CVE-2022-23516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048821" comment="ruby4.0-rubygem-loofah-2.23.1-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254530" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-minitar-0.9-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2016-10173" ref_url="https://www.suse.com/security/cve/CVE-2016-10173/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-minitar-0.9-1.21 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10173/">CVE-2016-10173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10173">CVE-2016-10173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048822" comment="ruby4.0-rubygem-minitar-0.9-1.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254531" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0175" ref_url="https://www.suse.com/security/cve/CVE-2013-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-multi_xml-0.6.0-1.31 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0175/">CVE-2013-0175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0175">CVE-2013-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048823" comment="ruby4.0-rubygem-multi_xml-0.6.0-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254532" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2021-41098" ref_url="https://www.suse.com/security/cve/CVE-2021-41098/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="CVE-2022-23476" ref_url="https://www.suse.com/security/cve/CVE-2022-23476/" source="CVE"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-24839" ref_url="https://www.suse.com/security/cve/CVE-2022-24839/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-nokogiri-1.18.9-1.4 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2877">CVE-2013-2877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41098/">CVE-2021-41098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41098">CVE-2021-41098 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23476/">CVE-2022-23476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23476">CVE-2022-23476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24839/">CVE-2022-24839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048824" comment="ruby4.0-rubygem-nokogiri-1.18.9-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254533" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-puma-6.4.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<reference ref_id="CVE-2024-45614" ref_url="https://www.suse.com/security/cve/CVE-2024-45614/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-puma-6.4.3-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23634">CVE-2022-23634 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45614/">CVE-2024-45614 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45614">CVE-2024-45614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048825" comment="ruby4.0-rubygem-puma-6.4.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254534" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rack-3.1.18-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="CVE-2022-44572" ref_url="https://www.suse.com/security/cve/CVE-2022-44572/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="CVE-2025-25184" ref_url="https://www.suse.com/security/cve/CVE-2025-25184/" source="CVE"/>
		<reference ref_id="CVE-2025-27111" ref_url="https://www.suse.com/security/cve/CVE-2025-27111/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rack-3.1.18-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0262">CVE-2013-0262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0263">CVE-2013-0263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44572/">CVE-2022-44572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44572">CVE-2022-44572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25184/">CVE-2025-25184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25184">CVE-2025-25184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27111/">CVE-2025-27111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27111">CVE-2025-27111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048826" comment="ruby4.0-rubygem-rack-3.1.18-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254535" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-46336" ref_url="https://www.suse.com/security/cve/CVE-2025-46336/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rack-session-2.1.1-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-46336/">CVE-2025-46336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46336">CVE-2025-46336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048827" comment="ruby4.0-rubygem-rack-session-2.1.1-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254536" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rails-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048828" comment="ruby4.0-rubygem-rails-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254537" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-7578" ref_url="https://www.suse.com/security/cve/CVE-2015-7578/" source="CVE"/>
		<reference ref_id="CVE-2015-7579" ref_url="https://www.suse.com/security/cve/CVE-2015-7579/" source="CVE"/>
		<reference ref_id="CVE-2015-7580" ref_url="https://www.suse.com/security/cve/CVE-2015-7580/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7578/">CVE-2015-7578 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7578">CVE-2015-7578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7579/">CVE-2015-7579 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7579">CVE-2015-7579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7580/">CVE-2015-7580 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7580">CVE-2015-7580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048829" comment="ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254538" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-54133" ref_url="https://www.suse.com/security/cve/CVE-2024-54133/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-railties-8.0-8.0.3-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54133/">CVE-2024-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54133">CVE-2024-54133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048830" comment="ruby4.0-rubygem-railties-8.0-8.0.3-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254539" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-5946" ref_url="https://www.suse.com/security/cve/CVE-2017-5946/" source="CVE"/>
		<reference ref_id="CVE-2018-1000544" ref_url="https://www.suse.com/security/cve/CVE-2018-1000544/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rubyzip-2.3.2-1.19 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5946/">CVE-2017-5946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5946">CVE-2017-5946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000544/">CVE-2018-1000544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000544">CVE-2018-1000544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048831" comment="ruby4.0-rubygem-rubyzip-2.3.2-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254540" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-sprockets-4.2.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048832" comment="ruby4.0-rubygem-sprockets-4.2.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254541" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048833" comment="ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254542" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-thor-1.4.0-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-54314" ref_url="https://www.suse.com/security/cve/CVE-2025-54314/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-thor-1.4.0-1.3 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54314/">CVE-2025-54314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54314">CVE-2025-54314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048834" comment="ruby4.0-rubygem-thor-1.4.0-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254543" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2015-3224" ref_url="https://www.suse.com/security/cve/CVE-2015-3224/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-web-console-4.2.1-1.9 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3224/">CVE-2015-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3224">CVE-2015-3224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048835" comment="ruby4.0-rubygem-web-console-4.2.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254544" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2020-7663" ref_url="https://www.suse.com/security/cve/CVE-2020-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7663/">CVE-2020-7663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">CVE-2020-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048836" comment="ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254545" version="1" class="patch">
	<metadata>
		<title>skaffold-2.18.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15558" ref_url="https://www.suse.com/security/cve/CVE-2025-15558/" source="CVE"/>
		<description>
These are all security issues fixed in the skaffold-2.18.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-15558/">CVE-2025-15558 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-15558">CVE-2025-15558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048837" comment="skaffold-2.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048838" comment="skaffold-bash-completion-2.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048839" comment="skaffold-fish-completion-2.18.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048840" comment="skaffold-zsh-completion-2.18.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254546" version="1" class="patch">
	<metadata>
		<title>smb4k-4.0.5-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2017-8849" ref_url="https://www.suse.com/security/cve/CVE-2017-8849/" source="CVE"/>
		<reference ref_id="CVE-2025-66002" ref_url="https://www.suse.com/security/cve/CVE-2025-66002/" source="CVE"/>
		<description>
These are all security issues fixed in the smb4k-4.0.5-1.2 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8849/">CVE-2017-8849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8849">CVE-2017-8849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66002/">CVE-2025-66002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66002">CVE-2025-66002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048841" comment="smb4k-4.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048842" comment="smb4k-doc-4.0.5-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048843" comment="smb4k-lang-4.0.5-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254547" version="1" class="patch">
	<metadata>
		<title>curl-8.19.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1965" ref_url="https://www.suse.com/security/cve/CVE-2026-1965/" source="CVE"/>
		<reference ref_id="CVE-2026-3783" ref_url="https://www.suse.com/security/cve/CVE-2026-3783/" source="CVE"/>
		<reference ref_id="CVE-2026-3784" ref_url="https://www.suse.com/security/cve/CVE-2026-3784/" source="CVE"/>
		<reference ref_id="CVE-2026-3805" ref_url="https://www.suse.com/security/cve/CVE-2026-3805/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.19.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1965/">CVE-2026-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1965">CVE-2026-1965 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3783/">CVE-2026-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3783">CVE-2026-3783 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3784/">CVE-2026-3784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3784">CVE-2026-3784 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3805/">CVE-2026-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3805">CVE-2026-3805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048859" comment="curl-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048860" comment="curl-fish-completion-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048861" comment="curl-zsh-completion-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048862" comment="libcurl-devel-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048863" comment="libcurl-devel-32bit-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048864" comment="libcurl-devel-doc-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048865" comment="libcurl4-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048866" comment="libcurl4-32bit-8.19.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048867" comment="wcurl-8.19.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254548" version="1" class="patch">
	<metadata>
		<title>python311-black-26.3.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31900" ref_url="https://www.suse.com/security/cve/CVE-2026-31900/" source="CVE"/>
		<reference ref_id="CVE-2026-32274" ref_url="https://www.suse.com/security/cve/CVE-2026-32274/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-black-26.3.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31900/">CVE-2026-31900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31900">CVE-2026-31900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32274/">CVE-2026-32274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32274">CVE-2026-32274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048868" comment="python311-black-26.3.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048869" comment="python313-black-26.3.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254549" version="1" class="patch">
	<metadata>
		<title>python311-simpleeval-1.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32640" ref_url="https://www.suse.com/security/cve/CVE-2026-32640/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-simpleeval-1.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32640/">CVE-2026-32640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32640">CVE-2026-32640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048870" comment="python311-simpleeval-1.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048871" comment="python313-simpleeval-1.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254550" version="1" class="patch">
	<metadata>
		<title>python311-tornado6-6.5.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-tornado6-6.5.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048872" comment="python311-tornado6-6.5.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048873" comment="python313-tornado6-6.5.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254551" version="1" class="patch">
	<metadata>
		<title>coturn-4.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-69217" ref_url="https://www.suse.com/security/cve/CVE-2025-69217/" source="CVE"/>
		<reference ref_id="CVE-2026-27624" ref_url="https://www.suse.com/security/cve/CVE-2026-27624/" source="CVE"/>
		<description>
These are all security issues fixed in the coturn-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-15"/>
	<updated date="2026-03-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-69217/">CVE-2025-69217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69217">CVE-2025-69217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27624/">CVE-2026-27624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27624">CVE-2026-27624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048874" comment="coturn-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048875" comment="coturn-devel-4.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048876" comment="coturn-utils-4.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254552" version="1" class="patch">
	<metadata>
		<title>chromedriver-146.0.7680.80-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3909" ref_url="https://www.suse.com/security/cve/CVE-2026-3909/" source="CVE"/>
		<reference ref_id="CVE-2026-3910" ref_url="https://www.suse.com/security/cve/CVE-2026-3910/" source="CVE"/>
		<reference ref_id="CVE-2026-3913" ref_url="https://www.suse.com/security/cve/CVE-2026-3913/" source="CVE"/>
		<reference ref_id="CVE-2026-3914" ref_url="https://www.suse.com/security/cve/CVE-2026-3914/" source="CVE"/>
		<reference ref_id="CVE-2026-3915" ref_url="https://www.suse.com/security/cve/CVE-2026-3915/" source="CVE"/>
		<reference ref_id="CVE-2026-3916" ref_url="https://www.suse.com/security/cve/CVE-2026-3916/" source="CVE"/>
		<reference ref_id="CVE-2026-3917" ref_url="https://www.suse.com/security/cve/CVE-2026-3917/" source="CVE"/>
		<reference ref_id="CVE-2026-3918" ref_url="https://www.suse.com/security/cve/CVE-2026-3918/" source="CVE"/>
		<reference ref_id="CVE-2026-3919" ref_url="https://www.suse.com/security/cve/CVE-2026-3919/" source="CVE"/>
		<reference ref_id="CVE-2026-3920" ref_url="https://www.suse.com/security/cve/CVE-2026-3920/" source="CVE"/>
		<reference ref_id="CVE-2026-3921" ref_url="https://www.suse.com/security/cve/CVE-2026-3921/" source="CVE"/>
		<reference ref_id="CVE-2026-3922" ref_url="https://www.suse.com/security/cve/CVE-2026-3922/" source="CVE"/>
		<reference ref_id="CVE-2026-3923" ref_url="https://www.suse.com/security/cve/CVE-2026-3923/" source="CVE"/>
		<reference ref_id="CVE-2026-3924" ref_url="https://www.suse.com/security/cve/CVE-2026-3924/" source="CVE"/>
		<reference ref_id="CVE-2026-3925" ref_url="https://www.suse.com/security/cve/CVE-2026-3925/" source="CVE"/>
		<reference ref_id="CVE-2026-3926" ref_url="https://www.suse.com/security/cve/CVE-2026-3926/" source="CVE"/>
		<reference ref_id="CVE-2026-3927" ref_url="https://www.suse.com/security/cve/CVE-2026-3927/" source="CVE"/>
		<reference ref_id="CVE-2026-3928" ref_url="https://www.suse.com/security/cve/CVE-2026-3928/" source="CVE"/>
		<reference ref_id="CVE-2026-3929" ref_url="https://www.suse.com/security/cve/CVE-2026-3929/" source="CVE"/>
		<reference ref_id="CVE-2026-3930" ref_url="https://www.suse.com/security/cve/CVE-2026-3930/" source="CVE"/>
		<reference ref_id="CVE-2026-3931" ref_url="https://www.suse.com/security/cve/CVE-2026-3931/" source="CVE"/>
		<reference ref_id="CVE-2026-3932" ref_url="https://www.suse.com/security/cve/CVE-2026-3932/" source="CVE"/>
		<reference ref_id="CVE-2026-3934" ref_url="https://www.suse.com/security/cve/CVE-2026-3934/" source="CVE"/>
		<reference ref_id="CVE-2026-3935" ref_url="https://www.suse.com/security/cve/CVE-2026-3935/" source="CVE"/>
		<reference ref_id="CVE-2026-3936" ref_url="https://www.suse.com/security/cve/CVE-2026-3936/" source="CVE"/>
		<reference ref_id="CVE-2026-3937" ref_url="https://www.suse.com/security/cve/CVE-2026-3937/" source="CVE"/>
		<reference ref_id="CVE-2026-3938" ref_url="https://www.suse.com/security/cve/CVE-2026-3938/" source="CVE"/>
		<reference ref_id="CVE-2026-3939" ref_url="https://www.suse.com/security/cve/CVE-2026-3939/" source="CVE"/>
		<reference ref_id="CVE-2026-3940" ref_url="https://www.suse.com/security/cve/CVE-2026-3940/" source="CVE"/>
		<reference ref_id="CVE-2026-3941" ref_url="https://www.suse.com/security/cve/CVE-2026-3941/" source="CVE"/>
		<reference ref_id="CVE-2026-3942" ref_url="https://www.suse.com/security/cve/CVE-2026-3942/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-146.0.7680.80-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-16"/>
	<updated date="2026-03-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3909/">CVE-2026-3909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3909">CVE-2026-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3910/">CVE-2026-3910 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3910">CVE-2026-3910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3913/">CVE-2026-3913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3913">CVE-2026-3913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3914/">CVE-2026-3914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3914">CVE-2026-3914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3915/">CVE-2026-3915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3915">CVE-2026-3915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3916/">CVE-2026-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3916">CVE-2026-3916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3917/">CVE-2026-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3917">CVE-2026-3917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3918/">CVE-2026-3918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3918">CVE-2026-3918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3919/">CVE-2026-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3919">CVE-2026-3919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3920/">CVE-2026-3920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3920">CVE-2026-3920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3921/">CVE-2026-3921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3921">CVE-2026-3921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3922/">CVE-2026-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3922">CVE-2026-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3923/">CVE-2026-3923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3923">CVE-2026-3923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3924/">CVE-2026-3924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3924">CVE-2026-3924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3925/">CVE-2026-3925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3925">CVE-2026-3925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3926/">CVE-2026-3926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3926">CVE-2026-3926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3927/">CVE-2026-3927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3927">CVE-2026-3927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3928/">CVE-2026-3928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3928">CVE-2026-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3929/">CVE-2026-3929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3929">CVE-2026-3929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3930/">CVE-2026-3930 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3930">CVE-2026-3930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3931/">CVE-2026-3931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3931">CVE-2026-3931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3932/">CVE-2026-3932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3932">CVE-2026-3932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3934/">CVE-2026-3934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3934">CVE-2026-3934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3935/">CVE-2026-3935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3935">CVE-2026-3935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3936/">CVE-2026-3936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3936">CVE-2026-3936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3937/">CVE-2026-3937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3937">CVE-2026-3937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3938/">CVE-2026-3938 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3938">CVE-2026-3938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3939/">CVE-2026-3939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3939">CVE-2026-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3940/">CVE-2026-3940 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3940">CVE-2026-3940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3941/">CVE-2026-3941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3941">CVE-2026-3941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3942/">CVE-2026-3942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3942">CVE-2026-3942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048974" comment="chromedriver-146.0.7680.80-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048975" comment="chromium-146.0.7680.80-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254553" version="1" class="patch">
	<metadata>
		<title>python312-3.12.13-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.13-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-16"/>
	<updated date="2026-03-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048976" comment="python312-3.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048977" comment="python312-curses-3.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048978" comment="python312-dbm-3.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048979" comment="python312-idle-3.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048980" comment="python312-tk-3.12.13-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048981" comment="python312-x86-64-v3-3.12.13-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254554" version="1" class="patch">
	<metadata>
		<title>ovmf-202602-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202602-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049221" comment="ovmf-202602-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049222" comment="ovmf-tools-202602-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049223" comment="qemu-ovmf-x86_64-202602-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049224" comment="qemu-ovmf-x86_64-debug-202602-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049225" comment="qemu-uefi-aarch64-202602-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049226" comment="qemu-uefi-riscv64-202602-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254555" version="1" class="patch">
	<metadata>
		<title>python311-CairoSVG-2.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31899" ref_url="https://www.suse.com/security/cve/CVE-2026-31899/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-CairoSVG-2.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31899/">CVE-2026-31899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31899">CVE-2026-31899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049227" comment="python311-CairoSVG-2.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049228" comment="python313-CairoSVG-2.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254556" version="1" class="patch">
	<metadata>
		<title>python311-uv-0.10.11-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31812" ref_url="https://www.suse.com/security/cve/CVE-2026-31812/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-uv-0.10.11-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31812/">CVE-2026-31812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31812">CVE-2026-31812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049229" comment="python311-uv-0.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049230" comment="python313-uv-0.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049231" comment="uv-bash-completion-0.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049232" comment="uv-fish-completion-0.10.11-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049233" comment="uv-zsh-completion-0.10.11-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254557" version="1" class="patch">
	<metadata>
		<title>python311-3.11.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049234" comment="python311-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049235" comment="python311-32bit-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049236" comment="python311-curses-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049237" comment="python311-dbm-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049238" comment="python311-idle-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049239" comment="python311-tk-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049240" comment="python311-x86-64-v3-3.11.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254558" version="1" class="patch">
	<metadata>
		<title>cargo1.92-1.92.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31812" ref_url="https://www.suse.com/security/cve/CVE-2026-31812/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.92-1.92.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31812/">CVE-2026-31812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31812">CVE-2026-31812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049241" comment="cargo1.92-1.92.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049242" comment="rust1.92-1.92.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049243" comment="rust1.92-src-1.92.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254559" version="1" class="patch">
	<metadata>
		<title>cargo1.93-1.93.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31812" ref_url="https://www.suse.com/security/cve/CVE-2026-31812/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.93-1.93.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31812/">CVE-2026-31812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31812">CVE-2026-31812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049244" comment="cargo1.93-1.93.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049245" comment="rust1.93-1.93.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049246" comment="rust1.93-src-1.93.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254560" version="1" class="patch">
	<metadata>
		<title>cargo1.94-1.94.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31812" ref_url="https://www.suse.com/security/cve/CVE-2026-31812/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo1.94-1.94.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31812/">CVE-2026-31812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31812">CVE-2026-31812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049247" comment="cargo1.94-1.94.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049248" comment="rust1.94-1.94.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049249" comment="rust1.94-src-1.94.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254561" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.10-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27141" ref_url="https://www.suse.com/security/cve/CVE-2026-27141/" source="CVE"/>
		<reference ref_id="CVE-2026-29777" ref_url="https://www.suse.com/security/cve/CVE-2026-29777/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.10-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27141/">CVE-2026-27141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27141">CVE-2026-27141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-29777/">CVE-2026-29777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-29777">CVE-2026-29777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049250" comment="traefik-3.6.10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254562" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28493" ref_url="https://www.suse.com/security/cve/CVE-2026-28493/" source="CVE"/>
		<reference ref_id="CVE-2026-28494" ref_url="https://www.suse.com/security/cve/CVE-2026-28494/" source="CVE"/>
		<reference ref_id="CVE-2026-28686" ref_url="https://www.suse.com/security/cve/CVE-2026-28686/" source="CVE"/>
		<reference ref_id="CVE-2026-28687" ref_url="https://www.suse.com/security/cve/CVE-2026-28687/" source="CVE"/>
		<reference ref_id="CVE-2026-28688" ref_url="https://www.suse.com/security/cve/CVE-2026-28688/" source="CVE"/>
		<reference ref_id="CVE-2026-28689" ref_url="https://www.suse.com/security/cve/CVE-2026-28689/" source="CVE"/>
		<reference ref_id="CVE-2026-28690" ref_url="https://www.suse.com/security/cve/CVE-2026-28690/" source="CVE"/>
		<reference ref_id="CVE-2026-28691" ref_url="https://www.suse.com/security/cve/CVE-2026-28691/" source="CVE"/>
		<reference ref_id="CVE-2026-28692" ref_url="https://www.suse.com/security/cve/CVE-2026-28692/" source="CVE"/>
		<reference ref_id="CVE-2026-28693" ref_url="https://www.suse.com/security/cve/CVE-2026-28693/" source="CVE"/>
		<reference ref_id="CVE-2026-30883" ref_url="https://www.suse.com/security/cve/CVE-2026-30883/" source="CVE"/>
		<reference ref_id="CVE-2026-30929" ref_url="https://www.suse.com/security/cve/CVE-2026-30929/" source="CVE"/>
		<reference ref_id="CVE-2026-30931" ref_url="https://www.suse.com/security/cve/CVE-2026-30931/" source="CVE"/>
		<reference ref_id="CVE-2026-30935" ref_url="https://www.suse.com/security/cve/CVE-2026-30935/" source="CVE"/>
		<reference ref_id="CVE-2026-30936" ref_url="https://www.suse.com/security/cve/CVE-2026-30936/" source="CVE"/>
		<reference ref_id="CVE-2026-30937" ref_url="https://www.suse.com/security/cve/CVE-2026-30937/" source="CVE"/>
		<reference ref_id="CVE-2026-31853" ref_url="https://www.suse.com/security/cve/CVE-2026-31853/" source="CVE"/>
		<reference ref_id="CVE-2026-32259" ref_url="https://www.suse.com/security/cve/CVE-2026-32259/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28493/">CVE-2026-28493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28493">CVE-2026-28493 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28494/">CVE-2026-28494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28494">CVE-2026-28494 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28686/">CVE-2026-28686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28686">CVE-2026-28686 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28687/">CVE-2026-28687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28687">CVE-2026-28687 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28688/">CVE-2026-28688 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28688">CVE-2026-28688 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28689/">CVE-2026-28689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28689">CVE-2026-28689 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28690/">CVE-2026-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28690">CVE-2026-28690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28691/">CVE-2026-28691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28691">CVE-2026-28691 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28692/">CVE-2026-28692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28692">CVE-2026-28692 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28693/">CVE-2026-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28693">CVE-2026-28693 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30883/">CVE-2026-30883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30883">CVE-2026-30883 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30929/">CVE-2026-30929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30929">CVE-2026-30929 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30931/">CVE-2026-30931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30931">CVE-2026-30931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30935/">CVE-2026-30935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30935">CVE-2026-30935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30936/">CVE-2026-30936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30936">CVE-2026-30936 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30937/">CVE-2026-30937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30937">CVE-2026-30937 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31853/">CVE-2026-31853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31853">CVE-2026-31853 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32259/">CVE-2026-32259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32259">CVE-2026-32259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049432" comment="ImageMagick-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049433" comment="ImageMagick-config-7-SUSE-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049434" comment="ImageMagick-devel-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049435" comment="ImageMagick-devel-32bit-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049436" comment="ImageMagick-doc-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049437" comment="ImageMagick-extra-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049438" comment="libMagick++-7_Q16HDRI5-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049439" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049440" comment="libMagick++-devel-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049441" comment="libMagick++-devel-32bit-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049442" comment="libMagickCore-7_Q16HDRI10-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049443" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049444" comment="libMagickWand-7_Q16HDRI10-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049445" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049446" comment="perl-PerlMagick-7.1.2.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254563" version="1" class="patch">
	<metadata>
		<title>kernel-devel-6.19.8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-71229" ref_url="https://www.suse.com/security/cve/CVE-2025-71229/" source="CVE"/>
		<reference ref_id="CVE-2025-71230" ref_url="https://www.suse.com/security/cve/CVE-2025-71230/" source="CVE"/>
		<reference ref_id="CVE-2025-71231" ref_url="https://www.suse.com/security/cve/CVE-2025-71231/" source="CVE"/>
		<reference ref_id="CVE-2025-71232" ref_url="https://www.suse.com/security/cve/CVE-2025-71232/" source="CVE"/>
		<reference ref_id="CVE-2025-71233" ref_url="https://www.suse.com/security/cve/CVE-2025-71233/" source="CVE"/>
		<reference ref_id="CVE-2025-71234" ref_url="https://www.suse.com/security/cve/CVE-2025-71234/" source="CVE"/>
		<reference ref_id="CVE-2025-71235" ref_url="https://www.suse.com/security/cve/CVE-2025-71235/" source="CVE"/>
		<reference ref_id="CVE-2025-71236" ref_url="https://www.suse.com/security/cve/CVE-2025-71236/" source="CVE"/>
		<reference ref_id="CVE-2025-71237" ref_url="https://www.suse.com/security/cve/CVE-2025-71237/" source="CVE"/>
		<reference ref_id="CVE-2025-71238" ref_url="https://www.suse.com/security/cve/CVE-2025-71238/" source="CVE"/>
		<reference ref_id="CVE-2026-23220" ref_url="https://www.suse.com/security/cve/CVE-2026-23220/" source="CVE"/>
		<reference ref_id="CVE-2026-23221" ref_url="https://www.suse.com/security/cve/CVE-2026-23221/" source="CVE"/>
		<reference ref_id="CVE-2026-23222" ref_url="https://www.suse.com/security/cve/CVE-2026-23222/" source="CVE"/>
		<reference ref_id="CVE-2026-23223" ref_url="https://www.suse.com/security/cve/CVE-2026-23223/" source="CVE"/>
		<reference ref_id="CVE-2026-23224" ref_url="https://www.suse.com/security/cve/CVE-2026-23224/" source="CVE"/>
		<reference ref_id="CVE-2026-23225" ref_url="https://www.suse.com/security/cve/CVE-2026-23225/" source="CVE"/>
		<reference ref_id="CVE-2026-23226" ref_url="https://www.suse.com/security/cve/CVE-2026-23226/" source="CVE"/>
		<reference ref_id="CVE-2026-23227" ref_url="https://www.suse.com/security/cve/CVE-2026-23227/" source="CVE"/>
		<reference ref_id="CVE-2026-23228" ref_url="https://www.suse.com/security/cve/CVE-2026-23228/" source="CVE"/>
		<reference ref_id="CVE-2026-23229" ref_url="https://www.suse.com/security/cve/CVE-2026-23229/" source="CVE"/>
		<reference ref_id="CVE-2026-23230" ref_url="https://www.suse.com/security/cve/CVE-2026-23230/" source="CVE"/>
		<reference ref_id="CVE-2026-23231" ref_url="https://www.suse.com/security/cve/CVE-2026-23231/" source="CVE"/>
		<reference ref_id="CVE-2026-23232" ref_url="https://www.suse.com/security/cve/CVE-2026-23232/" source="CVE"/>
		<reference ref_id="CVE-2026-23233" ref_url="https://www.suse.com/security/cve/CVE-2026-23233/" source="CVE"/>
		<reference ref_id="CVE-2026-23234" ref_url="https://www.suse.com/security/cve/CVE-2026-23234/" source="CVE"/>
		<reference ref_id="CVE-2026-23235" ref_url="https://www.suse.com/security/cve/CVE-2026-23235/" source="CVE"/>
		<reference ref_id="CVE-2026-23236" ref_url="https://www.suse.com/security/cve/CVE-2026-23236/" source="CVE"/>
		<reference ref_id="CVE-2026-23239" ref_url="https://www.suse.com/security/cve/CVE-2026-23239/" source="CVE"/>
		<reference ref_id="CVE-2026-23240" ref_url="https://www.suse.com/security/cve/CVE-2026-23240/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-6.19.8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71229/">CVE-2025-71229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71230/">CVE-2025-71230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71230">CVE-2025-71230 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71231/">CVE-2025-71231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71232/">CVE-2025-71232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71233/">CVE-2025-71233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71234/">CVE-2025-71234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71235/">CVE-2025-71235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71236/">CVE-2025-71236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71237/">CVE-2025-71237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71237">CVE-2025-71237 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71238/">CVE-2025-71238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71238">CVE-2025-71238 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23220/">CVE-2026-23220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23220">CVE-2026-23220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23221/">CVE-2026-23221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23221">CVE-2026-23221 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23222/">CVE-2026-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23223/">CVE-2026-23223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23224/">CVE-2026-23224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23225/">CVE-2026-23225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23225">CVE-2026-23225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23226/">CVE-2026-23226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23226">CVE-2026-23226 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23227/">CVE-2026-23227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23227">CVE-2026-23227 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23228/">CVE-2026-23228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23228">CVE-2026-23228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23229/">CVE-2026-23229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23230/">CVE-2026-23230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23231/">CVE-2026-23231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23231">CVE-2026-23231 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23232/">CVE-2026-23232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23232">CVE-2026-23232 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23233/">CVE-2026-23233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23233">CVE-2026-23233 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23234/">CVE-2026-23234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23234">CVE-2026-23234 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23235/">CVE-2026-23235 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23235">CVE-2026-23235 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23236/">CVE-2026-23236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23236">CVE-2026-23236 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23239/">CVE-2026-23239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23239">CVE-2026-23239 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23240/">CVE-2026-23240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23240">CVE-2026-23240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049447" comment="kernel-macros-6.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049448" comment="kernel-source-6.19.8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049449" comment="kernel-source-vanilla-6.19.8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254564" version="1" class="patch">
	<metadata>
		<title>mumble-1.5.857-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-71264" ref_url="https://www.suse.com/security/cve/CVE-2025-71264/" source="CVE"/>
		<description>
These are all security issues fixed in the mumble-1.5.857-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-71264/">CVE-2025-71264 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71264">CVE-2025-71264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049450" comment="mumble-1.5.857-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049451" comment="mumble-server-1.5.857-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254565" version="1" class="patch">
	<metadata>
		<title>python311-salt-3006.0-56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-salt-3006.0-56.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049452" comment="python311-salt-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049453" comment="python313-salt-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049454" comment="salt-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049455" comment="salt-api-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049456" comment="salt-bash-completion-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049457" comment="salt-cloud-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049458" comment="salt-doc-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049459" comment="salt-fish-completion-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049460" comment="salt-master-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049461" comment="salt-minion-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049462" comment="salt-proxy-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049463" comment="salt-ssh-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049464" comment="salt-standalone-formulas-configuration-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049465" comment="salt-syndic-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049466" comment="salt-transactional-update-3006.0-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049467" comment="salt-zsh-completion-3006.0-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254566" version="1" class="patch">
	<metadata>
		<title>tempo-cli-2.10.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28377" ref_url="https://www.suse.com/security/cve/CVE-2026-28377/" source="CVE"/>
		<description>
These are all security issues fixed in the tempo-cli-2.10.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28377/">CVE-2026-28377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28377">CVE-2026-28377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049468" comment="tempo-cli-2.10.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254567" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.46-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-30883" ref_url="https://www.suse.com/security/cve/CVE-2026-30883/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.46-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30883/">CVE-2026-30883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30883">CVE-2026-30883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049552" comment="GraphicsMagick-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049553" comment="GraphicsMagick-devel-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049554" comment="libGraphicsMagick++-Q16-12-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049555" comment="libGraphicsMagick++-devel-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049556" comment="libGraphicsMagick-Q16-3-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049557" comment="libGraphicsMagick3-config-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049558" comment="libGraphicsMagickWand-Q16-2-1.3.46-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049559" comment="perl-GraphicsMagick-1.3.46-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254568" version="1" class="patch">
	<metadata>
		<title>python311-pyOpenSSL-26.0.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27448" ref_url="https://www.suse.com/security/cve/CVE-2026-27448/" source="CVE"/>
		<reference ref_id="CVE-2026-27459" ref_url="https://www.suse.com/security/cve/CVE-2026-27459/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pyOpenSSL-26.0.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27448/">CVE-2026-27448 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27448">CVE-2026-27448 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27459/">CVE-2026-27459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27459">CVE-2026-27459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049560" comment="python311-pyOpenSSL-26.0.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049561" comment="python313-pyOpenSSL-26.0.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254569" version="1" class="patch">
	<metadata>
		<title>python311-pyasn1-0.6.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-30922" ref_url="https://www.suse.com/security/cve/CVE-2026-30922/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pyasn1-0.6.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30922/">CVE-2026-30922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30922">CVE-2026-30922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049562" comment="python311-pyasn1-0.6.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049563" comment="python313-pyasn1-0.6.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254570" version="1" class="patch">
	<metadata>
		<title>python313-3.13.12-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.12-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049564" comment="python313-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049565" comment="python313-32bit-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049566" comment="python313-curses-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049567" comment="python313-dbm-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049568" comment="python313-idle-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049569" comment="python313-tk-3.13.12-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049570" comment="python313-x86-64-v3-3.13.12-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254571" version="1" class="patch">
	<metadata>
		<title>qemu-10.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2243" ref_url="https://www.suse.com/security/cve/CVE-2026-2243/" source="CVE"/>
		<reference ref_id="CVE-2026-3196" ref_url="https://www.suse.com/security/cve/CVE-2026-3196/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2243/">CVE-2026-2243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2243">CVE-2026-2243 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-3196/">CVE-2026-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3196">CVE-2026-3196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049571" comment="qemu-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049572" comment="qemu-SLOF-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049573" comment="qemu-accel-qtest-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049574" comment="qemu-arm-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049575" comment="qemu-audio-alsa-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049576" comment="qemu-audio-dbus-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049577" comment="qemu-audio-jack-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049578" comment="qemu-audio-oss-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049579" comment="qemu-audio-pa-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049580" comment="qemu-audio-pipewire-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049581" comment="qemu-audio-sdl-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049582" comment="qemu-audio-spice-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049583" comment="qemu-block-curl-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049584" comment="qemu-block-dmg-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049585" comment="qemu-block-iscsi-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049586" comment="qemu-block-nfs-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049587" comment="qemu-block-rbd-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049588" comment="qemu-block-ssh-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049589" comment="qemu-chardev-baum-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049590" comment="qemu-chardev-spice-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049591" comment="qemu-doc-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049592" comment="qemu-extra-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049593" comment="qemu-guest-agent-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049594" comment="qemu-headless-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049595" comment="qemu-hw-display-qxl-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049596" comment="qemu-hw-display-virtio-gpu-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049597" comment="qemu-hw-display-virtio-gpu-pci-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049598" comment="qemu-hw-display-virtio-vga-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049599" comment="qemu-hw-s390x-virtio-gpu-ccw-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049600" comment="qemu-hw-usb-host-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049601" comment="qemu-hw-usb-redirect-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049602" comment="qemu-hw-usb-smartcard-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049603" comment="qemu-img-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049604" comment="qemu-ipxe-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049605" comment="qemu-ivshmem-tools-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049606" comment="qemu-ksm-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049607" comment="qemu-lang-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049608" comment="qemu-microvm-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049609" comment="qemu-ppc-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049610" comment="qemu-pr-helper-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049611" comment="qemu-s390x-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049612" comment="qemu-seabios-10.2.21.17.0_1_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049613" comment="qemu-skiboot-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049614" comment="qemu-spice-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049615" comment="qemu-tools-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049616" comment="qemu-ui-curses-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049617" comment="qemu-ui-dbus-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049618" comment="qemu-ui-gtk-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049619" comment="qemu-ui-opengl-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049620" comment="qemu-ui-sdl-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049621" comment="qemu-ui-spice-app-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049622" comment="qemu-ui-spice-core-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049623" comment="qemu-vgabios-10.2.21.17.0_1_g4f253b9b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049624" comment="qemu-vhost-user-gpu-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049625" comment="qemu-vmsr-helper-10.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049626" comment="qemu-x86-10.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254572" version="1" class="patch">
	<metadata>
		<title>openbao-2.5.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="CVE-2026-24051" ref_url="https://www.suse.com/security/cve/CVE-2026-24051/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.5.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-24051/">CVE-2026-24051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049695" comment="openbao-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049696" comment="openbao-agent-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049697" comment="openbao-cassandra-database-plugin-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049698" comment="openbao-influxdb-database-plugin-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049699" comment="openbao-mysql-database-plugin-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049700" comment="openbao-mysql-legacy-database-plugin-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049701" comment="openbao-postgresql-database-plugin-2.5.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049702" comment="openbao-server-2.5.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254573" version="1" class="patch">
	<metadata>
		<title>python311-PyJWT-2.12.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32597" ref_url="https://www.suse.com/security/cve/CVE-2026-32597/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyJWT-2.12.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32597/">CVE-2026-32597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32597">CVE-2026-32597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049703" comment="python311-PyJWT-2.12.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049704" comment="python313-PyJWT-2.12.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254574" version="1" class="patch">
	<metadata>
		<title>python311-3.11.15-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.15-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049705" comment="python311-3.11.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049235" comment="python311-32bit-3.11.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049706" comment="python311-curses-3.11.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049707" comment="python311-dbm-3.11.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049708" comment="python311-idle-3.11.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049709" comment="python311-tk-3.11.15-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049710" comment="python311-x86-64-v3-3.11.15-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254575" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.3.46-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-28690" ref_url="https://www.suse.com/security/cve/CVE-2026-28690/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.3.46-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28690/">CVE-2026-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28690">CVE-2026-28690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049724" comment="GraphicsMagick-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049725" comment="GraphicsMagick-devel-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049726" comment="libGraphicsMagick++-Q16-12-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049727" comment="libGraphicsMagick++-devel-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049728" comment="libGraphicsMagick-Q16-3-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049729" comment="libGraphicsMagick3-config-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049730" comment="libGraphicsMagickWand-Q16-2-1.3.46-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049731" comment="perl-GraphicsMagick-1.3.46-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254576" version="1" class="patch">
	<metadata>
		<title>chromedriver-146.0.7680.153-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-4439" ref_url="https://www.suse.com/security/cve/CVE-2026-4439/" source="CVE"/>
		<reference ref_id="CVE-2026-4440" ref_url="https://www.suse.com/security/cve/CVE-2026-4440/" source="CVE"/>
		<reference ref_id="CVE-2026-4441" ref_url="https://www.suse.com/security/cve/CVE-2026-4441/" source="CVE"/>
		<reference ref_id="CVE-2026-4442" ref_url="https://www.suse.com/security/cve/CVE-2026-4442/" source="CVE"/>
		<reference ref_id="CVE-2026-4443" ref_url="https://www.suse.com/security/cve/CVE-2026-4443/" source="CVE"/>
		<reference ref_id="CVE-2026-4444" ref_url="https://www.suse.com/security/cve/CVE-2026-4444/" source="CVE"/>
		<reference ref_id="CVE-2026-4445" ref_url="https://www.suse.com/security/cve/CVE-2026-4445/" source="CVE"/>
		<reference ref_id="CVE-2026-4446" ref_url="https://www.suse.com/security/cve/CVE-2026-4446/" source="CVE"/>
		<reference ref_id="CVE-2026-4447" ref_url="https://www.suse.com/security/cve/CVE-2026-4447/" source="CVE"/>
		<reference ref_id="CVE-2026-4448" ref_url="https://www.suse.com/security/cve/CVE-2026-4448/" source="CVE"/>
		<reference ref_id="CVE-2026-4449" ref_url="https://www.suse.com/security/cve/CVE-2026-4449/" source="CVE"/>
		<reference ref_id="CVE-2026-4450" ref_url="https://www.suse.com/security/cve/CVE-2026-4450/" source="CVE"/>
		<reference ref_id="CVE-2026-4451" ref_url="https://www.suse.com/security/cve/CVE-2026-4451/" source="CVE"/>
		<reference ref_id="CVE-2026-4452" ref_url="https://www.suse.com/security/cve/CVE-2026-4452/" source="CVE"/>
		<reference ref_id="CVE-2026-4453" ref_url="https://www.suse.com/security/cve/CVE-2026-4453/" source="CVE"/>
		<reference ref_id="CVE-2026-4454" ref_url="https://www.suse.com/security/cve/CVE-2026-4454/" source="CVE"/>
		<reference ref_id="CVE-2026-4455" ref_url="https://www.suse.com/security/cve/CVE-2026-4455/" source="CVE"/>
		<reference ref_id="CVE-2026-4456" ref_url="https://www.suse.com/security/cve/CVE-2026-4456/" source="CVE"/>
		<reference ref_id="CVE-2026-4457" ref_url="https://www.suse.com/security/cve/CVE-2026-4457/" source="CVE"/>
		<reference ref_id="CVE-2026-4458" ref_url="https://www.suse.com/security/cve/CVE-2026-4458/" source="CVE"/>
		<reference ref_id="CVE-2026-4459" ref_url="https://www.suse.com/security/cve/CVE-2026-4459/" source="CVE"/>
		<reference ref_id="CVE-2026-4460" ref_url="https://www.suse.com/security/cve/CVE-2026-4460/" source="CVE"/>
		<reference ref_id="CVE-2026-4461" ref_url="https://www.suse.com/security/cve/CVE-2026-4461/" source="CVE"/>
		<reference ref_id="CVE-2026-4462" ref_url="https://www.suse.com/security/cve/CVE-2026-4462/" source="CVE"/>
		<reference ref_id="CVE-2026-4463" ref_url="https://www.suse.com/security/cve/CVE-2026-4463/" source="CVE"/>
		<reference ref_id="CVE-2026-4464" ref_url="https://www.suse.com/security/cve/CVE-2026-4464/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-146.0.7680.153-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4439/">CVE-2026-4439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4439">CVE-2026-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4440/">CVE-2026-4440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4440">CVE-2026-4440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4441/">CVE-2026-4441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4441">CVE-2026-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4442/">CVE-2026-4442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4442">CVE-2026-4442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4443/">CVE-2026-4443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4443">CVE-2026-4443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4444/">CVE-2026-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4444">CVE-2026-4444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4445/">CVE-2026-4445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4445">CVE-2026-4445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4446/">CVE-2026-4446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4446">CVE-2026-4446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4447/">CVE-2026-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4447">CVE-2026-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4448/">CVE-2026-4448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4448">CVE-2026-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4449/">CVE-2026-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4449">CVE-2026-4449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4450/">CVE-2026-4450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4450">CVE-2026-4450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4451/">CVE-2026-4451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4451">CVE-2026-4451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4452/">CVE-2026-4452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4452">CVE-2026-4452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4453/">CVE-2026-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4453">CVE-2026-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4454/">CVE-2026-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4454">CVE-2026-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4455/">CVE-2026-4455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4455">CVE-2026-4455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4456/">CVE-2026-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4456">CVE-2026-4456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4457/">CVE-2026-4457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4457">CVE-2026-4457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4458/">CVE-2026-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4458">CVE-2026-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4459/">CVE-2026-4459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4459">CVE-2026-4459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4460/">CVE-2026-4460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4460">CVE-2026-4460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4461/">CVE-2026-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4461">CVE-2026-4461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4462/">CVE-2026-4462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4462">CVE-2026-4462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4463/">CVE-2026-4463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4463">CVE-2026-4463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4464/">CVE-2026-4464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4464">CVE-2026-4464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049732" comment="chromedriver-146.0.7680.153-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049733" comment="chromium-146.0.7680.153-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254577" version="1" class="patch">
	<metadata>
		<title>freeciv-3.2.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33250" ref_url="https://www.suse.com/security/cve/CVE-2026-33250/" source="CVE"/>
		<description>
These are all security issues fixed in the freeciv-3.2.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33250/">CVE-2026-33250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33250">CVE-2026-33250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049734" comment="freeciv-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049735" comment="freeciv-gtk3-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049736" comment="freeciv-gtk4-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049737" comment="freeciv-lang-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049738" comment="freeciv-qt-3.2.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049739" comment="freeciv-sdl2-3.2.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254578" version="1" class="patch">
	<metadata>
		<title>python311-PyPDF2-2.11.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33123" ref_url="https://www.suse.com/security/cve/CVE-2026-33123/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-PyPDF2-2.11.1-8.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33123/">CVE-2026-33123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33123">CVE-2026-33123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049740" comment="python311-PyPDF2-2.11.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049741" comment="python313-PyPDF2-2.11.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254579" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33123" ref_url="https://www.suse.com/security/cve/CVE-2026-33123/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33123/">CVE-2026-33123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33123">CVE-2026-33123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049742" comment="python311-pypdf-6.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049743" comment="python313-pypdf-6.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254580" version="1" class="patch">
	<metadata>
		<title>python310-3.10.20-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.20-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049744" comment="python310-3.10.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049745" comment="python310-curses-3.10.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049746" comment="python310-dbm-3.10.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049747" comment="python310-idle-3.10.20-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049748" comment="python310-tk-3.10.20-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254581" version="1" class="patch">
	<metadata>
		<title>python314-3.14.3-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.3-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049749" comment="python314-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049750" comment="python314-32bit-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049751" comment="python314-curses-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049752" comment="python314-dbm-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049753" comment="python314-idle-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049754" comment="python314-tk-3.14.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049755" comment="python314-x86-64-v3-3.14.3-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254582" version="1" class="patch">
	<metadata>
		<title>lemon-3.51.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-70873" ref_url="https://www.suse.com/security/cve/CVE-2025-70873/" source="CVE"/>
		<description>
These are all security issues fixed in the lemon-3.51.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-22"/>
	<updated date="2026-03-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-70873/">CVE-2025-70873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-70873">CVE-2025-70873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049756" comment="lemon-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049757" comment="libsqlite3-0-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049758" comment="libsqlite3-0-32bit-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049759" comment="libsqlite3-0-x86-64-v3-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049760" comment="sqlite3-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049761" comment="sqlite3-devel-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049762" comment="sqlite3-doc-3.51.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049763" comment="sqlite3-tcl-3.51.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254583" version="1" class="patch">
	<metadata>
		<title>azure-storage-azcopy-10.32.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the azure-storage-azcopy-10.32.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050030" comment="azure-storage-azcopy-10.32.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254584" version="1" class="patch">
	<metadata>
		<title>freerdp-3.24.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25941" ref_url="https://www.suse.com/security/cve/CVE-2026-25941/" source="CVE"/>
		<reference ref_id="CVE-2026-25942" ref_url="https://www.suse.com/security/cve/CVE-2026-25942/" source="CVE"/>
		<reference ref_id="CVE-2026-25952" ref_url="https://www.suse.com/security/cve/CVE-2026-25952/" source="CVE"/>
		<reference ref_id="CVE-2026-25953" ref_url="https://www.suse.com/security/cve/CVE-2026-25953/" source="CVE"/>
		<reference ref_id="CVE-2026-25954" ref_url="https://www.suse.com/security/cve/CVE-2026-25954/" source="CVE"/>
		<reference ref_id="CVE-2026-25955" ref_url="https://www.suse.com/security/cve/CVE-2026-25955/" source="CVE"/>
		<reference ref_id="CVE-2026-25959" ref_url="https://www.suse.com/security/cve/CVE-2026-25959/" source="CVE"/>
		<reference ref_id="CVE-2026-25997" ref_url="https://www.suse.com/security/cve/CVE-2026-25997/" source="CVE"/>
		<reference ref_id="CVE-2026-26271" ref_url="https://www.suse.com/security/cve/CVE-2026-26271/" source="CVE"/>
		<reference ref_id="CVE-2026-26955" ref_url="https://www.suse.com/security/cve/CVE-2026-26955/" source="CVE"/>
		<reference ref_id="CVE-2026-26965" ref_url="https://www.suse.com/security/cve/CVE-2026-26965/" source="CVE"/>
		<reference ref_id="CVE-2026-29774" ref_url="https://www.suse.com/security/cve/CVE-2026-29774/" source="CVE"/>
		<reference ref_id="CVE-2026-29775" ref_url="https://www.suse.com/security/cve/CVE-2026-29775/" source="CVE"/>
		<reference ref_id="CVE-2026-29776" ref_url="https://www.suse.com/security/cve/CVE-2026-29776/" source="CVE"/>
		<reference ref_id="CVE-2026-31806" ref_url="https://www.suse.com/security/cve/CVE-2026-31806/" source="CVE"/>
		<reference ref_id="CVE-2026-31883" ref_url="https://www.suse.com/security/cve/CVE-2026-31883/" source="CVE"/>
		<reference ref_id="CVE-2026-31884" ref_url="https://www.suse.com/security/cve/CVE-2026-31884/" source="CVE"/>
		<reference ref_id="CVE-2026-31885" ref_url="https://www.suse.com/security/cve/CVE-2026-31885/" source="CVE"/>
		<reference ref_id="CVE-2026-31897" ref_url="https://www.suse.com/security/cve/CVE-2026-31897/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.24.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25941/">CVE-2026-25941 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25941">CVE-2026-25941 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25942/">CVE-2026-25942 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25942">CVE-2026-25942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25952/">CVE-2026-25952 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25952">CVE-2026-25952 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25953/">CVE-2026-25953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25953">CVE-2026-25953 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25954/">CVE-2026-25954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25954">CVE-2026-25954 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25955/">CVE-2026-25955 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25955">CVE-2026-25955 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25959/">CVE-2026-25959 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25959">CVE-2026-25959 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25997/">CVE-2026-25997 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25997">CVE-2026-25997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26271/">CVE-2026-26271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26271">CVE-2026-26271 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26955/">CVE-2026-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26955">CVE-2026-26955 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26965/">CVE-2026-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26965">CVE-2026-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29774/">CVE-2026-29774 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-29774">CVE-2026-29774 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29775/">CVE-2026-29775 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-29775">CVE-2026-29775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29776/">CVE-2026-29776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29776">CVE-2026-29776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31806/">CVE-2026-31806 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31806">CVE-2026-31806 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31883/">CVE-2026-31883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31883">CVE-2026-31883 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31884/">CVE-2026-31884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31884">CVE-2026-31884 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31885/">CVE-2026-31885 at SUSE</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31885">CVE-2026-31885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31897/">CVE-2026-31897 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31897">CVE-2026-31897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050031" comment="freerdp-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050032" comment="freerdp-devel-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050033" comment="freerdp-proxy-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050034" comment="freerdp-proxy-plugins-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050035" comment="freerdp-sdl-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050036" comment="freerdp-server-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050037" comment="freerdp-wayland-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050038" comment="libfreerdp-server-proxy3-3-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050039" comment="libfreerdp3-3-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050040" comment="librdtk0-0-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050041" comment="libuwac0-0-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050042" comment="libwinpr3-3-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050043" comment="rdtk0-devel-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050044" comment="uwac0-devel-3.24.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050045" comment="winpr-devel-3.24.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254585" version="1" class="patch">
	<metadata>
		<title>pgvector-devel-0.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3172" ref_url="https://www.suse.com/security/cve/CVE-2026-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pgvector-devel-0.8.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-3172/">CVE-2026-3172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3172">CVE-2026-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050046" comment="pgvector-devel-0.8.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254586" version="1" class="patch">
	<metadata>
		<title>pnpm-10.32.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-24842" ref_url="https://www.suse.com/security/cve/CVE-2026-24842/" source="CVE"/>
		<description>
These are all security issues fixed in the pnpm-10.32.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24842/">CVE-2026-24842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24842">CVE-2026-24842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050047" comment="pnpm-10.32.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050048" comment="pnpm-bash-completion-10.32.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050049" comment="pnpm-fish-completion-10.32.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050050" comment="pnpm-zsh-completion-10.32.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254587" version="1" class="patch">
	<metadata>
		<title>python311-dynaconf-3.2.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33154" ref_url="https://www.suse.com/security/cve/CVE-2026-33154/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-dynaconf-3.2.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33154/">CVE-2026-33154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33154">CVE-2026-33154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050051" comment="python311-dynaconf-3.2.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050052" comment="python313-dynaconf-3.2.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254588" version="1" class="patch">
	<metadata>
		<title>python311-pydicom-3.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32711" ref_url="https://www.suse.com/security/cve/CVE-2026-32711/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pydicom-3.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32711/">CVE-2026-32711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32711">CVE-2026-32711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050053" comment="python311-pydicom-3.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050054" comment="python313-pydicom-3.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254589" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050289" comment="firefox-esr-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050290" comment="firefox-esr-branding-upstream-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050291" comment="firefox-esr-translations-common-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050292" comment="firefox-esr-translations-other-140.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254590" version="1" class="patch">
	<metadata>
		<title>perl-Crypt-URandom-0.550.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2474" ref_url="https://www.suse.com/security/cve/CVE-2026-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Crypt-URandom-0.550.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2474/">CVE-2026-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2474">CVE-2026-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050293" comment="perl-Crypt-URandom-0.550.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254591" version="1" class="patch">
	<metadata>
		<title>glances-common-4.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32596" ref_url="https://www.suse.com/security/cve/CVE-2026-32596/" source="CVE"/>
		<reference ref_id="CVE-2026-32608" ref_url="https://www.suse.com/security/cve/CVE-2026-32608/" source="CVE"/>
		<reference ref_id="CVE-2026-32609" ref_url="https://www.suse.com/security/cve/CVE-2026-32609/" source="CVE"/>
		<reference ref_id="CVE-2026-32610" ref_url="https://www.suse.com/security/cve/CVE-2026-32610/" source="CVE"/>
		<reference ref_id="CVE-2026-32611" ref_url="https://www.suse.com/security/cve/CVE-2026-32611/" source="CVE"/>
		<reference ref_id="CVE-2026-32632" ref_url="https://www.suse.com/security/cve/CVE-2026-32632/" source="CVE"/>
		<reference ref_id="CVE-2026-32633" ref_url="https://www.suse.com/security/cve/CVE-2026-32633/" source="CVE"/>
		<reference ref_id="CVE-2026-32634" ref_url="https://www.suse.com/security/cve/CVE-2026-32634/" source="CVE"/>
		<description>
These are all security issues fixed in the glances-common-4.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32596/">CVE-2026-32596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32596">CVE-2026-32596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32608/">CVE-2026-32608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32608">CVE-2026-32608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32609/">CVE-2026-32609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32609">CVE-2026-32609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32610/">CVE-2026-32610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32610">CVE-2026-32610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32611/">CVE-2026-32611 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32611">CVE-2026-32611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32632/">CVE-2026-32632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32632">CVE-2026-32632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32633/">CVE-2026-32633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32633">CVE-2026-32633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32634/">CVE-2026-32634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32634">CVE-2026-32634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050294" comment="glances-common-4.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050295" comment="python311-Glances-4.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050296" comment="python313-Glances-4.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254592" version="1" class="patch">
	<metadata>
		<title>python313-PyMuPDF-1.27.2.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3029" ref_url="https://www.suse.com/security/cve/CVE-2026-3029/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-PyMuPDF-1.27.2.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3029/">CVE-2026-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3029">CVE-2026-3029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050297" comment="python313-PyMuPDF-1.27.2.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050298" comment="python313-PyMuPDF-devel-1.27.2.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254593" version="1" class="patch">
	<metadata>
		<title>python311-deepdiff-8.6.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33155" ref_url="https://www.suse.com/security/cve/CVE-2026-33155/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-deepdiff-8.6.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33155/">CVE-2026-33155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33155">CVE-2026-33155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050299" comment="python311-deepdiff-8.6.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050300" comment="python313-deepdiff-8.6.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254594" version="1" class="patch">
	<metadata>
		<title>python311-jsonpath-ng-1.8.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-56005" ref_url="https://www.suse.com/security/cve/CVE-2025-56005/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jsonpath-ng-1.8.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-56005/">CVE-2025-56005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56005">CVE-2025-56005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050301" comment="python311-jsonpath-ng-1.8.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050302" comment="python313-jsonpath-ng-1.8.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254595" version="1" class="patch">
	<metadata>
		<title>rclone-1.73.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the rclone-1.73.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050303" comment="rclone-1.73.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050304" comment="rclone-bash-completion-1.73.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050305" comment="rclone-zsh-completion-1.73.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254596" version="1" class="patch">
	<metadata>
		<title>amazon-cloudwatch-agent-1.300064.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-cloudwatch-agent-1.300064.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050917" comment="amazon-cloudwatch-agent-1.300064.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254597" version="1" class="patch">
	<metadata>
		<title>kea-3.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3608" ref_url="https://www.suse.com/security/cve/CVE-2026-3608/" source="CVE"/>
		<description>
These are all security issues fixed in the kea-3.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3608/">CVE-2026-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3608">CVE-2026-3608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050918" comment="kea-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050919" comment="kea-devel-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050920" comment="kea-doc-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050921" comment="kea-hooks-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050922" comment="libkea-asiodns62-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050923" comment="libkea-asiolink88-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050924" comment="libkea-cc83-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050925" comment="libkea-cfgrpt3-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050926" comment="libkea-config84-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050927" comment="libkea-cryptolink64-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050928" comment="libkea-d2srv63-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050929" comment="libkea-database76-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050930" comment="libkea-dhcp109-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050931" comment="libkea-dhcp_ddns68-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050932" comment="libkea-dhcpsrv131-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050933" comment="libkea-dns71-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050934" comment="libkea-eval84-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050935" comment="libkea-exceptions45-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050936" comment="libkea-hooks121-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050937" comment="libkea-http87-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050938" comment="libkea-log-interprocess3-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050939" comment="libkea-log75-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050940" comment="libkea-mysql88-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050941" comment="libkea-pgsql88-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050942" comment="libkea-process91-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050943" comment="libkea-stats53-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050944" comment="libkea-tcp33-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050945" comment="libkea-util-io12-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050946" comment="libkea-util102-3.0.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050947" comment="python3-kea-3.0.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254598" version="1" class="patch">
	<metadata>
		<title>libtpms-devel-0.10.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21444" ref_url="https://www.suse.com/security/cve/CVE-2026-21444/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms-devel-0.10.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21444/">CVE-2026-21444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21444">CVE-2026-21444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050948" comment="libtpms-devel-0.10.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050949" comment="libtpms0-0.10.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254599" version="1" class="patch">
	<metadata>
		<title>nginx-1.29.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651/" source="CVE"/>
		<reference ref_id="CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654/" source="CVE"/>
		<reference ref_id="CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784/" source="CVE"/>
		<reference ref_id="CVE-2026-28753" ref_url="https://www.suse.com/security/cve/CVE-2026-28753/" source="CVE"/>
		<reference ref_id="CVE-2026-28755" ref_url="https://www.suse.com/security/cve/CVE-2026-28755/" source="CVE"/>
		<reference ref_id="CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.29.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-28753/">CVE-2026-28753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28753">CVE-2026-28753 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28755/">CVE-2026-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28755">CVE-2026-28755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050950" comment="nginx-1.29.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050951" comment="nginx-source-1.29.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254600" version="1" class="patch">
	<metadata>
		<title>jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="CVE-2026-27601" ref_url="https://www.suse.com/security/cve/CVE-2026-27601/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-bqplot-jupyterlab-0.5.46-14.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27601/">CVE-2026-27601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27601">CVE-2026-27601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050952" comment="jupyter-bqplot-jupyterlab-0.5.46-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050953" comment="jupyter-bqplot-notebook-0.5.46-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050954" comment="python311-bqplot-0.12.45-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254601" version="1" class="patch">
	<metadata>
		<title>python311-cbor2-5.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26209" ref_url="https://www.suse.com/security/cve/CVE-2026-26209/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cbor2-5.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26209/">CVE-2026-26209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26209">CVE-2026-26209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050955" comment="python311-cbor2-5.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050956" comment="python313-cbor2-5.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254602" version="1" class="patch">
	<metadata>
		<title>python311-intake-2.0.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33310" ref_url="https://www.suse.com/security/cve/CVE-2026-33310/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-intake-2.0.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33310/">CVE-2026-33310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33310">CVE-2026-33310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050957" comment="python311-intake-2.0.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050958" comment="python313-intake-2.0.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254603" version="1" class="patch">
	<metadata>
		<title>jupyter-matplotlib-0.11.7-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27601" ref_url="https://www.suse.com/security/cve/CVE-2026-27601/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-matplotlib-0.11.7-17.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27601/">CVE-2026-27601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27601">CVE-2026-27601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050959" comment="jupyter-matplotlib-0.11.7-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050960" comment="jupyter-matplotlib-jupyterlab-0.11.7-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050961" comment="python311-ipympl-0.9.7-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050962" comment="python313-ipympl-0.9.7-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254604" version="1" class="patch">
	<metadata>
		<title>python311-jupyter-ydoc-3.4.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-jupyter-ydoc-3.4.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050963" comment="python311-jupyter-ydoc-3.4.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050964" comment="python313-jupyter-ydoc-3.4.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254605" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-templates-0.5.2-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3449" ref_url="https://www.suse.com/security/cve/CVE-2026-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.2-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3449/">CVE-2026-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3449">CVE-2026-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050965" comment="jupyter-jupyterlab-templates-0.5.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050966" comment="python311-jupyterlab-templates-0.5.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050967" comment="python313-jupyterlab-templates-0.5.2-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254606" version="1" class="patch">
	<metadata>
		<title>python311-lmdb-2.1.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2019-16224" ref_url="https://www.suse.com/security/cve/CVE-2019-16224/" source="CVE"/>
		<reference ref_id="CVE-2019-16225" ref_url="https://www.suse.com/security/cve/CVE-2019-16225/" source="CVE"/>
		<reference ref_id="CVE-2019-16226" ref_url="https://www.suse.com/security/cve/CVE-2019-16226/" source="CVE"/>
		<reference ref_id="CVE-2019-16227" ref_url="https://www.suse.com/security/cve/CVE-2019-16227/" source="CVE"/>
		<reference ref_id="CVE-2019-16228" ref_url="https://www.suse.com/security/cve/CVE-2019-16228/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-lmdb-2.1.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16224/">CVE-2019-16224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16224">CVE-2019-16224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16225/">CVE-2019-16225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16225">CVE-2019-16225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16226/">CVE-2019-16226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16226">CVE-2019-16226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16227/">CVE-2019-16227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16227">CVE-2019-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16228/">CVE-2019-16228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16228">CVE-2019-16228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050968" comment="python311-lmdb-2.1.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050969" comment="python313-lmdb-2.1.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254607" version="1" class="patch">
	<metadata>
		<title>python311-oci-sdk-2.168.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-oci-sdk-2.168.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050970" comment="python311-oci-sdk-2.168.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050971" comment="python313-oci-sdk-2.168.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254608" version="1" class="patch">
	<metadata>
		<title>golang-github-v2fly-v2ray-core-5.47.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-v2fly-v2ray-core-5.47.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050972" comment="golang-github-v2fly-v2ray-core-5.47.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050973" comment="v2ray-core-5.47.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254609" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-devel-0.9.15-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32853" ref_url="https://www.suse.com/security/cve/CVE-2026-32853/" source="CVE"/>
		<reference ref_id="CVE-2026-32854" ref_url="https://www.suse.com/security/cve/CVE-2026-32854/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-devel-0.9.15-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32853/">CVE-2026-32853 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32853">CVE-2026-32853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32854/">CVE-2026-32854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32854">CVE-2026-32854 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051451" comment="LibVNCServer-devel-0.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051452" comment="libvncclient1-0.9.15-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051453" comment="libvncserver1-0.9.15-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254610" version="1" class="patch">
	<metadata>
		<title>chromedriver-146.0.7680.164-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-4673" ref_url="https://www.suse.com/security/cve/CVE-2026-4673/" source="CVE"/>
		<reference ref_id="CVE-2026-4674" ref_url="https://www.suse.com/security/cve/CVE-2026-4674/" source="CVE"/>
		<reference ref_id="CVE-2026-4675" ref_url="https://www.suse.com/security/cve/CVE-2026-4675/" source="CVE"/>
		<reference ref_id="CVE-2026-4676" ref_url="https://www.suse.com/security/cve/CVE-2026-4676/" source="CVE"/>
		<reference ref_id="CVE-2026-4677" ref_url="https://www.suse.com/security/cve/CVE-2026-4677/" source="CVE"/>
		<reference ref_id="CVE-2026-4678" ref_url="https://www.suse.com/security/cve/CVE-2026-4678/" source="CVE"/>
		<reference ref_id="CVE-2026-4679" ref_url="https://www.suse.com/security/cve/CVE-2026-4679/" source="CVE"/>
		<reference ref_id="CVE-2026-4680" ref_url="https://www.suse.com/security/cve/CVE-2026-4680/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-146.0.7680.164-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4673/">CVE-2026-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4673">CVE-2026-4673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4674/">CVE-2026-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4674">CVE-2026-4674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4675/">CVE-2026-4675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4675">CVE-2026-4675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4676/">CVE-2026-4676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4676">CVE-2026-4676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4677/">CVE-2026-4677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4677">CVE-2026-4677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4678/">CVE-2026-4678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4678">CVE-2026-4678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4679/">CVE-2026-4679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4679">CVE-2026-4679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4680/">CVE-2026-4680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4680">CVE-2026-4680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051454" comment="chromedriver-146.0.7680.164-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051455" comment="chromium-146.0.7680.164-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254611" version="1" class="patch">
	<metadata>
		<title>cpp-httplib-devel-0.38.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21428" ref_url="https://www.suse.com/security/cve/CVE-2026-21428/" source="CVE"/>
		<reference ref_id="CVE-2026-22776" ref_url="https://www.suse.com/security/cve/CVE-2026-22776/" source="CVE"/>
		<reference ref_id="CVE-2026-28434" ref_url="https://www.suse.com/security/cve/CVE-2026-28434/" source="CVE"/>
		<reference ref_id="CVE-2026-28435" ref_url="https://www.suse.com/security/cve/CVE-2026-28435/" source="CVE"/>
		<reference ref_id="CVE-2026-29076" ref_url="https://www.suse.com/security/cve/CVE-2026-29076/" source="CVE"/>
		<reference ref_id="CVE-2026-32627" ref_url="https://www.suse.com/security/cve/CVE-2026-32627/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp-httplib-devel-0.38.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21428/">CVE-2026-21428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21428">CVE-2026-21428 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22776/">CVE-2026-22776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22776">CVE-2026-22776 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28434/">CVE-2026-28434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28434">CVE-2026-28434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28435/">CVE-2026-28435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28435">CVE-2026-28435 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29076/">CVE-2026-29076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29076">CVE-2026-29076 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32627/">CVE-2026-32627 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32627">CVE-2026-32627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051456" comment="cpp-httplib-devel-0.38.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051457" comment="libcpp-httplib0_38-0.38.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254612" version="1" class="patch">
	<metadata>
		<title>freeipmi-1.6.17-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33554" ref_url="https://www.suse.com/security/cve/CVE-2026-33554/" source="CVE"/>
		<description>
These are all security issues fixed in the freeipmi-1.6.17-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33554/">CVE-2026-33554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33554">CVE-2026-33554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051458" comment="freeipmi-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051459" comment="freeipmi-bmc-watchdog-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051460" comment="freeipmi-devel-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051461" comment="freeipmi-ipmidetectd-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051462" comment="freeipmi-ipmiseld-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051463" comment="libfreeipmi17-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051464" comment="libipmiconsole2-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051465" comment="libipmidetect0-1.6.17-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051466" comment="libipmimonitoring6-1.6.17-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254613" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.68.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.68.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051467" comment="libnghttp2-14-1.68.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051468" comment="libnghttp2-14-32bit-1.68.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051469" comment="libnghttp2-devel-1.68.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051470" comment="nghttp2-1.68.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051471" comment="nghttp2-doc-1.68.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254614" version="1" class="patch">
	<metadata>
		<title>openbao-2.5.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33757" ref_url="https://www.suse.com/security/cve/CVE-2026-33757/" source="CVE"/>
		<reference ref_id="CVE-2026-33758" ref_url="https://www.suse.com/security/cve/CVE-2026-33758/" source="CVE"/>
		<description>
These are all security issues fixed in the openbao-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33757/">CVE-2026-33757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33757">CVE-2026-33757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33758/">CVE-2026-33758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33758">CVE-2026-33758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051472" comment="openbao-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051473" comment="openbao-agent-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051474" comment="openbao-cassandra-database-plugin-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051475" comment="openbao-influxdb-database-plugin-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051476" comment="openbao-mysql-database-plugin-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051477" comment="openbao-mysql-legacy-database-plugin-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051478" comment="openbao-postgresql-database-plugin-2.5.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051479" comment="openbao-server-2.5.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254615" version="1" class="patch">
	<metadata>
		<title>plexus-utils-4.0.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-67030" ref_url="https://www.suse.com/security/cve/CVE-2025-67030/" source="CVE"/>
		<description>
These are all security issues fixed in the plexus-utils-4.0.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67030/">CVE-2025-67030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67030">CVE-2025-67030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051480" comment="plexus-utils-4.0.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051481" comment="plexus-utils-javadoc-4.0.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254616" version="1" class="patch">
	<metadata>
		<title>jupyter-nbclassic-1.3.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27601" ref_url="https://www.suse.com/security/cve/CVE-2026-27601/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-nbclassic-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27601/">CVE-2026-27601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27601">CVE-2026-27601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051482" comment="jupyter-nbclassic-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051483" comment="python311-nbclassic-1.3.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051484" comment="python313-nbclassic-1.3.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254617" version="1" class="patch">
	<metadata>
		<title>strongswan-6.0.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25075" ref_url="https://www.suse.com/security/cve/CVE-2026-25075/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-6.0.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25075/">CVE-2026-25075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25075">CVE-2026-25075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051485" comment="strongswan-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051486" comment="strongswan-doc-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051487" comment="strongswan-fips-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051488" comment="strongswan-ipsec-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051489" comment="strongswan-mysql-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051490" comment="strongswan-nm-6.0.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051491" comment="strongswan-sqlite-6.0.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254618" version="1" class="patch">
	<metadata>
		<title>dovecot24-2.4.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59028" ref_url="https://www.suse.com/security/cve/CVE-2025-59028/" source="CVE"/>
		<reference ref_id="CVE-2025-59031" ref_url="https://www.suse.com/security/cve/CVE-2025-59031/" source="CVE"/>
		<reference ref_id="CVE-2025-59032" ref_url="https://www.suse.com/security/cve/CVE-2025-59032/" source="CVE"/>
		<reference ref_id="CVE-2026-24031" ref_url="https://www.suse.com/security/cve/CVE-2026-24031/" source="CVE"/>
		<reference ref_id="CVE-2026-27855" ref_url="https://www.suse.com/security/cve/CVE-2026-27855/" source="CVE"/>
		<reference ref_id="CVE-2026-27856" ref_url="https://www.suse.com/security/cve/CVE-2026-27856/" source="CVE"/>
		<reference ref_id="CVE-2026-27857" ref_url="https://www.suse.com/security/cve/CVE-2026-27857/" source="CVE"/>
		<reference ref_id="CVE-2026-27858" ref_url="https://www.suse.com/security/cve/CVE-2026-27858/" source="CVE"/>
		<reference ref_id="CVE-2026-27859" ref_url="https://www.suse.com/security/cve/CVE-2026-27859/" source="CVE"/>
		<reference ref_id="CVE-2026-27860" ref_url="https://www.suse.com/security/cve/CVE-2026-27860/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot24-2.4.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-59028/">CVE-2025-59028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59028">CVE-2025-59028 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59031/">CVE-2025-59031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59031">CVE-2025-59031 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59032/">CVE-2025-59032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59032">CVE-2025-59032 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24031/">CVE-2026-24031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24031">CVE-2026-24031 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27855/">CVE-2026-27855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27855">CVE-2026-27855 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27856/">CVE-2026-27856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27856">CVE-2026-27856 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27857/">CVE-2026-27857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27857">CVE-2026-27857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27858/">CVE-2026-27858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27858">CVE-2026-27858 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27859/">CVE-2026-27859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27859">CVE-2026-27859 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27860/">CVE-2026-27860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27860">CVE-2026-27860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052014" comment="dovecot24-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052015" comment="dovecot24-backend-mysql-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052016" comment="dovecot24-backend-pgsql-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052017" comment="dovecot24-backend-sqlite-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052018" comment="dovecot24-devel-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052019" comment="dovecot24-fts-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052020" comment="dovecot24-fts-flatcurve-2.4.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052021" comment="dovecot24-fts-solr-2.4.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254619" version="1" class="patch">
	<metadata>
		<title>libsuricata8_0_4-8.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-31931" ref_url="https://www.suse.com/security/cve/CVE-2026-31931/" source="CVE"/>
		<reference ref_id="CVE-2026-31932" ref_url="https://www.suse.com/security/cve/CVE-2026-31932/" source="CVE"/>
		<reference ref_id="CVE-2026-31933" ref_url="https://www.suse.com/security/cve/CVE-2026-31933/" source="CVE"/>
		<reference ref_id="CVE-2026-31934" ref_url="https://www.suse.com/security/cve/CVE-2026-31934/" source="CVE"/>
		<reference ref_id="CVE-2026-31935" ref_url="https://www.suse.com/security/cve/CVE-2026-31935/" source="CVE"/>
		<reference ref_id="CVE-2026-31937" ref_url="https://www.suse.com/security/cve/CVE-2026-31937/" source="CVE"/>
		<description>
These are all security issues fixed in the libsuricata8_0_4-8.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31931/">CVE-2026-31931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31931">CVE-2026-31931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31932/">CVE-2026-31932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31932">CVE-2026-31932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31933/">CVE-2026-31933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31933">CVE-2026-31933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31934/">CVE-2026-31934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31934">CVE-2026-31934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31935/">CVE-2026-31935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31935">CVE-2026-31935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31937/">CVE-2026-31937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31937">CVE-2026-31937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052022" comment="libsuricata8_0_4-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052023" comment="suricata-8.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052024" comment="suricata-devel-8.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254620" version="1" class="patch">
	<metadata>
		<title>traefik-3.6.12-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32305" ref_url="https://www.suse.com/security/cve/CVE-2026-32305/" source="CVE"/>
		<reference ref_id="CVE-2026-32595" ref_url="https://www.suse.com/security/cve/CVE-2026-32595/" source="CVE"/>
		<reference ref_id="CVE-2026-32695" ref_url="https://www.suse.com/security/cve/CVE-2026-32695/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik-3.6.12-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32305/">CVE-2026-32305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32305">CVE-2026-32305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32595/">CVE-2026-32595 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32595">CVE-2026-32595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32695/">CVE-2026-32695 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32695">CVE-2026-32695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052025" comment="traefik-3.6.12-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254621" version="1" class="patch">
	<metadata>
		<title>traefik2-2.11.42-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32305" ref_url="https://www.suse.com/security/cve/CVE-2026-32305/" source="CVE"/>
		<reference ref_id="CVE-2026-32595" ref_url="https://www.suse.com/security/cve/CVE-2026-32595/" source="CVE"/>
		<description>
These are all security issues fixed in the traefik2-2.11.42-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32305/">CVE-2026-32305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32305">CVE-2026-32305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32595/">CVE-2026-32595 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32595">CVE-2026-32595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052026" comment="traefik2-2.11.42-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254622" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.18-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32636" ref_url="https://www.suse.com/security/cve/CVE-2026-32636/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.18-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32636/">CVE-2026-32636 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32636">CVE-2026-32636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052027" comment="ImageMagick-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052028" comment="ImageMagick-config-7-SUSE-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052029" comment="ImageMagick-devel-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052030" comment="ImageMagick-devel-32bit-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052031" comment="ImageMagick-doc-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052032" comment="ImageMagick-extra-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052033" comment="libMagick++-7_Q16HDRI5-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052034" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052035" comment="libMagick++-devel-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052036" comment="libMagick++-devel-32bit-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052037" comment="libMagickCore-7_Q16HDRI10-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052038" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052039" comment="libMagickWand-7_Q16HDRI10-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052040" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.18-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052041" comment="perl-PerlMagick-7.1.2.18-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254623" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.9.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="CVE-2026-3889" ref_url="https://www.suse.com/security/cve/CVE-2026-3889/" source="CVE"/>
		<reference ref_id="CVE-2026-4371" ref_url="https://www.suse.com/security/cve/CVE-2026-4371/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.9.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-3889/">CVE-2026-3889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3889">CVE-2026-3889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4371/">CVE-2026-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4371">CVE-2026-4371 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052042" comment="MozillaThunderbird-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052043" comment="MozillaThunderbird-openpgp-librnp-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052044" comment="MozillaThunderbird-translations-common-140.9.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052045" comment="MozillaThunderbird-translations-other-140.9.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254624" version="1" class="patch">
	<metadata>
		<title>bind-9.20.21-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1519" ref_url="https://www.suse.com/security/cve/CVE-2026-1519/" source="CVE"/>
		<reference ref_id="CVE-2026-3104" ref_url="https://www.suse.com/security/cve/CVE-2026-3104/" source="CVE"/>
		<reference ref_id="CVE-2026-3119" ref_url="https://www.suse.com/security/cve/CVE-2026-3119/" source="CVE"/>
		<reference ref_id="CVE-2026-3591" ref_url="https://www.suse.com/security/cve/CVE-2026-3591/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.21-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1519/">CVE-2026-1519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1519">CVE-2026-1519 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3104/">CVE-2026-3104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3104">CVE-2026-3104 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3119/">CVE-2026-3119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3119">CVE-2026-3119 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3591/">CVE-2026-3591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3591">CVE-2026-3591 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052046" comment="bind-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052047" comment="bind-doc-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052048" comment="bind-modules-bdbhpt-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052049" comment="bind-modules-generic-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052050" comment="bind-modules-ldap-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052051" comment="bind-modules-mysql-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052052" comment="bind-modules-perl-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052053" comment="bind-modules-sqlite3-9.20.21-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052054" comment="bind-utils-9.20.21-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254625" version="1" class="patch">
	<metadata>
		<title>gsl-2.8-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-50610" ref_url="https://www.suse.com/security/cve/CVE-2024-50610/" source="CVE"/>
		<description>
These are all security issues fixed in the gsl-2.8-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50610/">CVE-2024-50610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50610">CVE-2024-50610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052055" comment="gsl-2.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052056" comment="gsl-devel-2.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052057" comment="gsl-doc-2.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052058" comment="gsl-examples-2.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052059" comment="libgsl28-2.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052060" comment="libgslcblas0-2.8-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254626" version="1" class="patch">
	<metadata>
		<title>incus-6.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33542" ref_url="https://www.suse.com/security/cve/CVE-2026-33542/" source="CVE"/>
		<reference ref_id="CVE-2026-33711" ref_url="https://www.suse.com/security/cve/CVE-2026-33711/" source="CVE"/>
		<reference ref_id="CVE-2026-33743" ref_url="https://www.suse.com/security/cve/CVE-2026-33743/" source="CVE"/>
		<reference ref_id="CVE-2026-33897" ref_url="https://www.suse.com/security/cve/CVE-2026-33897/" source="CVE"/>
		<reference ref_id="CVE-2026-33898" ref_url="https://www.suse.com/security/cve/CVE-2026-33898/" source="CVE"/>
		<reference ref_id="CVE-2026-33945" ref_url="https://www.suse.com/security/cve/CVE-2026-33945/" source="CVE"/>
		<description>
These are all security issues fixed in the incus-6.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-33542/">CVE-2026-33542 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33542">CVE-2026-33542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33711/">CVE-2026-33711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33711">CVE-2026-33711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33743/">CVE-2026-33743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33743">CVE-2026-33743 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-33897/">CVE-2026-33897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33897">CVE-2026-33897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33898/">CVE-2026-33898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33898">CVE-2026-33898 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-33945/">CVE-2026-33945 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33945">CVE-2026-33945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052061" comment="incus-6.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052062" comment="incus-bash-completion-6.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052063" comment="incus-fish-completion-6.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052064" comment="incus-tools-6.23-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052065" comment="incus-zsh-completion-6.23-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254627" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.56-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33416" ref_url="https://www.suse.com/security/cve/CVE-2026-33416/" source="CVE"/>
		<reference ref_id="CVE-2026-33636" ref_url="https://www.suse.com/security/cve/CVE-2026-33636/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.56-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33416/">CVE-2026-33416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33416">CVE-2026-33416 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33636/">CVE-2026-33636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33636">CVE-2026-33636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052066" comment="libpng16-16-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052067" comment="libpng16-16-32bit-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052068" comment="libpng16-16-x86-64-v3-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052069" comment="libpng16-compat-devel-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052070" comment="libpng16-compat-devel-32bit-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052071" comment="libpng16-compat-devel-x86-64-v3-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052072" comment="libpng16-devel-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052073" comment="libpng16-devel-32bit-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052074" comment="libpng16-devel-x86-64-v3-1.6.56-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052075" comment="libpng16-tools-1.6.56-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254628" version="1" class="patch">
	<metadata>
		<title>libjavamapscript-8.6.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33721" ref_url="https://www.suse.com/security/cve/CVE-2026-33721/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavamapscript-8.6.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33721/">CVE-2026-33721 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33721">CVE-2026-33721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052076" comment="libjavamapscript-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052077" comment="libmapserver2-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052078" comment="mapserver-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052079" comment="mapserver-devel-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052080" comment="perl-mapscript-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052081" comment="php-mapscriptng-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052082" comment="python311-mapserver-8.6.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052083" comment="python313-mapserver-8.6.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254629" version="1" class="patch">
	<metadata>
		<title>libpolkit-agent-1-0-127-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-7519" ref_url="https://www.suse.com/security/cve/CVE-2025-7519/" source="CVE"/>
		<reference ref_id="CVE-2026-4897" ref_url="https://www.suse.com/security/cve/CVE-2026-4897/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit-agent-1-0-127-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7519/">CVE-2025-7519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7519">CVE-2025-7519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4897/">CVE-2026-4897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4897">CVE-2026-4897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052084" comment="libpolkit-agent-1-0-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052085" comment="libpolkit-agent-1-0-32bit-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052086" comment="libpolkit-gobject-1-0-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052087" comment="libpolkit-gobject-1-0-32bit-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052088" comment="pkexec-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052089" comment="polkit-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052090" comment="polkit-devel-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052091" comment="polkit-doc-127-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052092" comment="typelib-1_0-Polkit-1_0-127-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254630" version="1" class="patch">
	<metadata>
		<title>python311-cryptography-46.0.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34073" ref_url="https://www.suse.com/security/cve/CVE-2026-34073/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cryptography-46.0.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34073/">CVE-2026-34073 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34073">CVE-2026-34073 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052093" comment="python311-cryptography-46.0.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052094" comment="python313-cryptography-46.0.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254631" version="1" class="patch">
	<metadata>
		<title>python311-requests-2.33.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25645" ref_url="https://www.suse.com/security/cve/CVE-2026-25645/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-requests-2.33.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25645/">CVE-2026-25645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25645">CVE-2026-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052095" comment="python311-requests-2.33.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052096" comment="python313-requests-2.33.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254632" version="1" class="patch">
	<metadata>
		<title>tailscale-1.96.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33747" ref_url="https://www.suse.com/security/cve/CVE-2026-33747/" source="CVE"/>
		<description>
These are all security issues fixed in the tailscale-1.96.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33747/">CVE-2026-33747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33747">CVE-2026-33747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052097" comment="tailscale-1.96.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052098" comment="tailscale-bash-completion-1.96.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052099" comment="tailscale-fish-completion-1.96.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052100" comment="tailscale-zsh-completion-1.96.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254633" version="1" class="patch">
	<metadata>
		<title>xen-4.21.1_02-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-23554" ref_url="https://www.suse.com/security/cve/CVE-2026-23554/" source="CVE"/>
		<reference ref_id="CVE-2026-23555" ref_url="https://www.suse.com/security/cve/CVE-2026-23555/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.21.1_02-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23554/">CVE-2026-23554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23554">CVE-2026-23554 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-23555/">CVE-2026-23555 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23555">CVE-2026-23555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052101" comment="xen-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052102" comment="xen-devel-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052103" comment="xen-doc-html-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052104" comment="xen-libs-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052105" comment="xen-tools-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052106" comment="xen-tools-domU-4.21.1_02-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052107" comment="xen-tools-xendomains-wait-disk-4.21.1_02-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254634" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-149.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<reference ref_id="CVE-2026-4722" ref_url="https://www.suse.com/security/cve/CVE-2026-4722/" source="CVE"/>
		<reference ref_id="CVE-2026-4723" ref_url="https://www.suse.com/security/cve/CVE-2026-4723/" source="CVE"/>
		<reference ref_id="CVE-2026-4724" ref_url="https://www.suse.com/security/cve/CVE-2026-4724/" source="CVE"/>
		<reference ref_id="CVE-2026-4725" ref_url="https://www.suse.com/security/cve/CVE-2026-4725/" source="CVE"/>
		<reference ref_id="CVE-2026-4726" ref_url="https://www.suse.com/security/cve/CVE-2026-4726/" source="CVE"/>
		<reference ref_id="CVE-2026-4727" ref_url="https://www.suse.com/security/cve/CVE-2026-4727/" source="CVE"/>
		<reference ref_id="CVE-2026-4728" ref_url="https://www.suse.com/security/cve/CVE-2026-4728/" source="CVE"/>
		<reference ref_id="CVE-2026-4729" ref_url="https://www.suse.com/security/cve/CVE-2026-4729/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-149.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4722/">CVE-2026-4722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4722">CVE-2026-4722 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4723/">CVE-2026-4723 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4723">CVE-2026-4723 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4724/">CVE-2026-4724 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4724">CVE-2026-4724 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4725/">CVE-2026-4725 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4725">CVE-2026-4725 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4726/">CVE-2026-4726 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4726">CVE-2026-4726 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4727/">CVE-2026-4727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4727">CVE-2026-4727 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4728/">CVE-2026-4728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4728">CVE-2026-4728 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4729/">CVE-2026-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4729">CVE-2026-4729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052108" comment="MozillaFirefox-149.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052109" comment="MozillaFirefox-branding-upstream-149.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052110" comment="MozillaFirefox-devel-149.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052111" comment="MozillaFirefox-translations-common-149.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052112" comment="MozillaFirefox-translations-other-149.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254635" version="1" class="patch">
	<metadata>
		<title>freerdp2-2.11.7-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855/" source="CVE"/>
		<reference ref_id="CVE-2026-22857" ref_url="https://www.suse.com/security/cve/CVE-2026-22857/" source="CVE"/>
		<reference ref_id="CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533/" source="CVE"/>
		<reference ref_id="CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732/" source="CVE"/>
		<reference ref_id="CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883/" source="CVE"/>
		<reference ref_id="CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884/" source="CVE"/>
		<reference ref_id="CVE-2026-26271" ref_url="https://www.suse.com/security/cve/CVE-2026-26271/" source="CVE"/>
		<reference ref_id="CVE-2026-26955" ref_url="https://www.suse.com/security/cve/CVE-2026-26955/" source="CVE"/>
		<reference ref_id="CVE-2026-26965" ref_url="https://www.suse.com/security/cve/CVE-2026-26965/" source="CVE"/>
		<reference ref_id="CVE-2026-31806" ref_url="https://www.suse.com/security/cve/CVE-2026-31806/" source="CVE"/>
		<reference ref_id="CVE-2026-31883" ref_url="https://www.suse.com/security/cve/CVE-2026-31883/" source="CVE"/>
		<reference ref_id="CVE-2026-31885" ref_url="https://www.suse.com/security/cve/CVE-2026-31885/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp2-2.11.7-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22857/">CVE-2026-22857 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22857">CVE-2026-22857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26271/">CVE-2026-26271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26271">CVE-2026-26271 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26955/">CVE-2026-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26955">CVE-2026-26955 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26965/">CVE-2026-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26965">CVE-2026-26965 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31806/">CVE-2026-31806 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31806">CVE-2026-31806 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31883/">CVE-2026-31883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31883">CVE-2026-31883 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31885/">CVE-2026-31885 at SUSE</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31885">CVE-2026-31885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052113" comment="freerdp2-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052114" comment="freerdp2-devel-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052115" comment="freerdp2-proxy-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052116" comment="freerdp2-server-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052117" comment="libfreerdp2-2-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052118" comment="libwinpr2-2-2.11.7-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052119" comment="winpr2-devel-2.11.7-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254636" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.21.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3949" ref_url="https://www.suse.com/security/cve/CVE-2026-3949/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.21.2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3949/">CVE-2026-3949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3949">CVE-2026-3949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052120" comment="gdk-pixbuf-loader-libheif-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052121" comment="libheif-aom-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052122" comment="libheif-dav1d-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052123" comment="libheif-devel-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052124" comment="libheif-ffmpeg-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052125" comment="libheif-jpeg-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052126" comment="libheif-openh264-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052127" comment="libheif-openjpeg-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052128" comment="libheif-rav1e-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052129" comment="libheif-svtenc-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052130" comment="libheif1-1.21.2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052131" comment="libheif1-32bit-1.21.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254637" version="1" class="patch">
	<metadata>
		<title>python311-nltk-3.9.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33230" ref_url="https://www.suse.com/security/cve/CVE-2026-33230/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-nltk-3.9.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33230/">CVE-2026-33230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33230">CVE-2026-33230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052132" comment="python311-nltk-3.9.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052133" comment="python313-nltk-3.9.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254638" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33036" ref_url="https://www.suse.com/security/cve/CVE-2026-33036/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.1-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33036/">CVE-2026-33036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33036">CVE-2026-33036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052296" comment="heroic-games-launcher-2.20.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254639" version="1" class="patch">
	<metadata>
		<title>netty-4.1.132-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33870" ref_url="https://www.suse.com/security/cve/CVE-2026-33870/" source="CVE"/>
		<reference ref_id="CVE-2026-33871" ref_url="https://www.suse.com/security/cve/CVE-2026-33871/" source="CVE"/>
		<description>
These are all security issues fixed in the netty-4.1.132-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33870/">CVE-2026-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33870">CVE-2026-33870 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33871/">CVE-2026-33871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33871">CVE-2026-33871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052297" comment="netty-4.1.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052298" comment="netty-bom-4.1.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052299" comment="netty-javadoc-4.1.132-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052300" comment="netty-parent-4.1.132-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254640" version="1" class="patch">
	<metadata>
		<title>python311-pypdf-6.9.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33699" ref_url="https://www.suse.com/security/cve/CVE-2026-33699/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-pypdf-6.9.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33699/">CVE-2026-33699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33699">CVE-2026-33699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052301" comment="python311-pypdf-6.9.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052302" comment="python313-pypdf-6.9.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254641" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.18-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33535" ref_url="https://www.suse.com/security/cve/CVE-2026-33535/" source="CVE"/>
		<reference ref_id="CVE-2026-33536" ref_url="https://www.suse.com/security/cve/CVE-2026-33536/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.18-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-33535/">CVE-2026-33535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33535">CVE-2026-33535 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33536/">CVE-2026-33536 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33536">CVE-2026-33536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052341" comment="ImageMagick-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052342" comment="ImageMagick-config-7-SUSE-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052343" comment="ImageMagick-devel-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052344" comment="ImageMagick-devel-32bit-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052345" comment="ImageMagick-doc-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052346" comment="ImageMagick-extra-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052347" comment="libMagick++-7_Q16HDRI5-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052348" comment="libMagick++-7_Q16HDRI5-32bit-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052349" comment="libMagick++-devel-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052350" comment="libMagick++-devel-32bit-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052351" comment="libMagickCore-7_Q16HDRI10-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052352" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052353" comment="libMagickWand-7_Q16HDRI10-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052354" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.2.18-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052355" comment="perl-PerlMagick-7.1.2.18-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254642" version="1" class="patch">
	<metadata>
		<title>expat-2.7.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32776" ref_url="https://www.suse.com/security/cve/CVE-2026-32776/" source="CVE"/>
		<reference ref_id="CVE-2026-32777" ref_url="https://www.suse.com/security/cve/CVE-2026-32777/" source="CVE"/>
		<reference ref_id="CVE-2026-32778" ref_url="https://www.suse.com/security/cve/CVE-2026-32778/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.7.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32776/">CVE-2026-32776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32776">CVE-2026-32776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32777/">CVE-2026-32777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32777">CVE-2026-32777 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32778/">CVE-2026-32778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32778">CVE-2026-32778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052356" comment="expat-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052357" comment="libexpat-devel-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052358" comment="libexpat-devel-32bit-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052359" comment="libexpat1-2.7.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052360" comment="libexpat1-32bit-2.7.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254643" version="1" class="patch">
	<metadata>
		<title>ovmf-202602-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-2296" ref_url="https://www.suse.com/security/cve/CVE-2025-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202602-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2296/">CVE-2025-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2296">CVE-2025-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052361" comment="ovmf-202602-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052362" comment="ovmf-tools-202602-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052363" comment="qemu-ovmf-x86_64-202602-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052364" comment="qemu-ovmf-x86_64-debug-202602-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052365" comment="qemu-uefi-aarch64-202602-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052366" comment="qemu-uefi-riscv64-202602-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254644" version="1" class="patch">
	<metadata>
		<title>python311-ecdsa-0.19.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33936" ref_url="https://www.suse.com/security/cve/CVE-2026-33936/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-ecdsa-0.19.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33936/">CVE-2026-33936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33936">CVE-2026-33936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052367" comment="python311-ecdsa-0.19.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052368" comment="python313-ecdsa-0.19.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254645" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a7-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052369" comment="python315-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052370" comment="python315-curses-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052371" comment="python315-dbm-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052372" comment="python315-idle-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052373" comment="python315-profiling-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052374" comment="python315-tk-3.15.0~a7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052375" comment="python315-x86-64-v3-3.15.0~a7-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254646" version="1" class="patch">
	<metadata>
		<title>libXvnc-devel-1.16.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34352" ref_url="https://www.suse.com/security/cve/CVE-2026-34352/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc-devel-1.16.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-34352/">CVE-2026-34352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34352">CVE-2026-34352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052376" comment="libXvnc-devel-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052377" comment="libXvnc1-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052378" comment="tigervnc-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052379" comment="tigervnc-selinux-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052380" comment="tigervnc-x11vnc-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052381" comment="xorg-x11-Xvnc-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052382" comment="xorg-x11-Xvnc-java-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052383" comment="xorg-x11-Xvnc-module-1.16.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052384" comment="xorg-x11-Xvnc-novnc-1.16.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254647" version="1" class="patch">
	<metadata>
		<title>tinyproxy-1.11.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3945" ref_url="https://www.suse.com/security/cve/CVE-2026-3945/" source="CVE"/>
		<description>
These are all security issues fixed in the tinyproxy-1.11.3-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3945/">CVE-2026-3945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3945">CVE-2026-3945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052385" comment="tinyproxy-1.11.3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254648" version="1" class="patch">
	<metadata>
		<title>conftest-0.67.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33747" ref_url="https://www.suse.com/security/cve/CVE-2026-33747/" source="CVE"/>
		<description>
These are all security issues fixed in the conftest-0.67.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33747/">CVE-2026-33747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33747">CVE-2026-33747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052721" comment="conftest-0.67.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052722" comment="conftest-bash-completion-0.67.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052723" comment="conftest-fish-completion-0.67.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052724" comment="conftest-zsh-completion-0.67.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254649" version="1" class="patch">
	<metadata>
		<title>dnsdist-2.0.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0396" ref_url="https://www.suse.com/security/cve/CVE-2026-0396/" source="CVE"/>
		<reference ref_id="CVE-2026-24028" ref_url="https://www.suse.com/security/cve/CVE-2026-24028/" source="CVE"/>
		<reference ref_id="CVE-2026-24030" ref_url="https://www.suse.com/security/cve/CVE-2026-24030/" source="CVE"/>
		<reference ref_id="CVE-2026-27854" ref_url="https://www.suse.com/security/cve/CVE-2026-27854/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-2.0.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0396/">CVE-2026-0396 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0396">CVE-2026-0396 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24028/">CVE-2026-24028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24028">CVE-2026-24028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24030/">CVE-2026-24030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24030">CVE-2026-24030 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27854/">CVE-2026-27854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27854">CVE-2026-27854 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052725" comment="dnsdist-2.0.3-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254650" version="1" class="patch">
	<metadata>
		<title>ignition-2.26.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the ignition-2.26.0-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052726" comment="ignition-2.26.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254651" version="1" class="patch">
	<metadata>
		<title>opensc-0.27.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13763" ref_url="https://www.suse.com/security/cve/CVE-2025-13763/" source="CVE"/>
		<reference ref_id="CVE-2025-49010" ref_url="https://www.suse.com/security/cve/CVE-2025-49010/" source="CVE"/>
		<reference ref_id="CVE-2025-66037" ref_url="https://www.suse.com/security/cve/CVE-2025-66037/" source="CVE"/>
		<reference ref_id="CVE-2025-66038" ref_url="https://www.suse.com/security/cve/CVE-2025-66038/" source="CVE"/>
		<reference ref_id="CVE-2025-66215" ref_url="https://www.suse.com/security/cve/CVE-2025-66215/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.27.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13763/">CVE-2025-13763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13763">CVE-2025-13763 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49010/">CVE-2025-49010 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49010">CVE-2025-49010 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66037/">CVE-2025-66037 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66037">CVE-2025-66037 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66038/">CVE-2025-66038 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66038">CVE-2025-66038 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66215/">CVE-2025-66215 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66215">CVE-2025-66215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052727" comment="opensc-0.27.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052728" comment="opensc-bash-completion-0.27.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254652" version="1" class="patch">
	<metadata>
		<title>python311-Pygments-2.20.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-4539" ref_url="https://www.suse.com/security/cve/CVE-2026-4539/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Pygments-2.20.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4539/">CVE-2026-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4539">CVE-2026-4539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052729" comment="python311-Pygments-2.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052730" comment="python313-Pygments-2.20.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052731" comment="python314-Pygments-2.20.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254653" version="1" class="patch">
	<metadata>
		<title>python310-3.10.20-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.20-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052732" comment="python310-3.10.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052733" comment="python310-curses-3.10.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052734" comment="python310-dbm-3.10.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052735" comment="python310-idle-3.10.20-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052736" comment="python310-tk-3.10.20-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254654" version="1" class="patch">
	<metadata>
		<title>python311-3.11.15-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-3.11.15-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052737" comment="python311-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052738" comment="python311-32bit-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052739" comment="python311-curses-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052740" comment="python311-dbm-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052741" comment="python311-idle-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052742" comment="python311-tk-3.11.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052743" comment="python311-x86-64-v3-3.11.15-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254655" version="1" class="patch">
	<metadata>
		<title>python312-3.12.13-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.13-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052744" comment="python312-3.12.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052745" comment="python312-curses-3.12.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052746" comment="python312-dbm-3.12.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052747" comment="python312-idle-3.12.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052748" comment="python312-tk-3.12.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052749" comment="python312-x86-64-v3-3.12.13-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254656" version="1" class="patch">
	<metadata>
		<title>python313-3.13.12-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-3.13.12-3.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052750" comment="python313-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052751" comment="python313-32bit-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052752" comment="python313-curses-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052753" comment="python313-dbm-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052754" comment="python313-idle-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052755" comment="python313-tk-3.13.12-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052756" comment="python313-x86-64-v3-3.13.12-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254657" version="1" class="patch">
	<metadata>
		<title>python314-3.14.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-13462" ref_url="https://www.suse.com/security/cve/CVE-2025-13462/" source="CVE"/>
		<reference ref_id="CVE-2026-3644" ref_url="https://www.suse.com/security/cve/CVE-2026-3644/" source="CVE"/>
		<reference ref_id="CVE-2026-4224" ref_url="https://www.suse.com/security/cve/CVE-2026-4224/" source="CVE"/>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
These are all security issues fixed in the python314-3.14.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13462/">CVE-2025-13462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13462">CVE-2025-13462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3644/">CVE-2026-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3644">CVE-2026-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4224/">CVE-2026-4224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4224">CVE-2026-4224 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052757" comment="python314-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052758" comment="python314-32bit-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052759" comment="python314-curses-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052760" comment="python314-dbm-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052761" comment="python314-idle-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052762" comment="python314-tk-3.14.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052763" comment="python314-x86-64-v3-3.14.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254658" version="1" class="patch">
	<metadata>
		<title>osslsigncode-2.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-70888" ref_url="https://www.suse.com/security/cve/CVE-2025-70888/" source="CVE"/>
		<description>
These are all security issues fixed in the osslsigncode-2.13-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-70888/">CVE-2025-70888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-70888">CVE-2025-70888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052764" comment="osslsigncode-2.13-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254659" version="1" class="patch">
	<metadata>
		<title>himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34397" ref_url="https://www.suse.com/security/cve/CVE-2026-34397/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-2.3.9+git0.a9fd29b-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34397/">CVE-2026-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34397">CVE-2026-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052796" comment="himmelblau-2.3.9+git0.a9fd29b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052797" comment="himmelblau-qr-greeter-2.3.9+git0.a9fd29b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052798" comment="himmelblau-sshd-config-2.3.9+git0.a9fd29b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052799" comment="himmelblau-sso-2.3.9+git0.a9fd29b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052800" comment="libnss_himmelblau2-2.3.9+git0.a9fd29b-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052801" comment="pam-himmelblau-2.3.9+git0.a9fd29b-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254660" version="1" class="patch">
	<metadata>
		<title>k6-1.7.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the k6-1.7.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052802" comment="k6-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052803" comment="k6-bash-completion-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052804" comment="k6-fish-completion-1.7.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052805" comment="k6-zsh-completion-1.7.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254661" version="1" class="patch">
	<metadata>
		<title>python311-Flask-Cors-6.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-6839" ref_url="https://www.suse.com/security/cve/CVE-2024-6839/" source="CVE"/>
		<reference ref_id="CVE-2024-6844" ref_url="https://www.suse.com/security/cve/CVE-2024-6844/" source="CVE"/>
		<reference ref_id="CVE-2024-6866" ref_url="https://www.suse.com/security/cve/CVE-2024-6866/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Flask-Cors-6.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6839/">CVE-2024-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6839">CVE-2024-6839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6844/">CVE-2024-6844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6844">CVE-2024-6844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6866/">CVE-2024-6866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6866">CVE-2024-6866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052806" comment="python311-Flask-Cors-6.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052807" comment="python313-Flask-Cors-6.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052808" comment="python314-Flask-Cors-6.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254662" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.3.4121.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-1229" ref_url="https://www.suse.com/security/cve/CVE-2026-1229/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.3.4121.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1229/">CVE-2026-1229 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1229">CVE-2026-1229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052816" comment="amazon-ssm-agent-3.3.4121.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254663" version="1" class="patch">
	<metadata>
		<title>chromedriver-146.0.7680.177-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5272" ref_url="https://www.suse.com/security/cve/CVE-2026-5272/" source="CVE"/>
		<reference ref_id="CVE-2026-5273" ref_url="https://www.suse.com/security/cve/CVE-2026-5273/" source="CVE"/>
		<reference ref_id="CVE-2026-5274" ref_url="https://www.suse.com/security/cve/CVE-2026-5274/" source="CVE"/>
		<reference ref_id="CVE-2026-5275" ref_url="https://www.suse.com/security/cve/CVE-2026-5275/" source="CVE"/>
		<reference ref_id="CVE-2026-5276" ref_url="https://www.suse.com/security/cve/CVE-2026-5276/" source="CVE"/>
		<reference ref_id="CVE-2026-5277" ref_url="https://www.suse.com/security/cve/CVE-2026-5277/" source="CVE"/>
		<reference ref_id="CVE-2026-5278" ref_url="https://www.suse.com/security/cve/CVE-2026-5278/" source="CVE"/>
		<reference ref_id="CVE-2026-5279" ref_url="https://www.suse.com/security/cve/CVE-2026-5279/" source="CVE"/>
		<reference ref_id="CVE-2026-5280" ref_url="https://www.suse.com/security/cve/CVE-2026-5280/" source="CVE"/>
		<reference ref_id="CVE-2026-5281" ref_url="https://www.suse.com/security/cve/CVE-2026-5281/" source="CVE"/>
		<reference ref_id="CVE-2026-5282" ref_url="https://www.suse.com/security/cve/CVE-2026-5282/" source="CVE"/>
		<reference ref_id="CVE-2026-5283" ref_url="https://www.suse.com/security/cve/CVE-2026-5283/" source="CVE"/>
		<reference ref_id="CVE-2026-5284" ref_url="https://www.suse.com/security/cve/CVE-2026-5284/" source="CVE"/>
		<reference ref_id="CVE-2026-5285" ref_url="https://www.suse.com/security/cve/CVE-2026-5285/" source="CVE"/>
		<reference ref_id="CVE-2026-5286" ref_url="https://www.suse.com/security/cve/CVE-2026-5286/" source="CVE"/>
		<reference ref_id="CVE-2026-5287" ref_url="https://www.suse.com/security/cve/CVE-2026-5287/" source="CVE"/>
		<reference ref_id="CVE-2026-5288" ref_url="https://www.suse.com/security/cve/CVE-2026-5288/" source="CVE"/>
		<reference ref_id="CVE-2026-5289" ref_url="https://www.suse.com/security/cve/CVE-2026-5289/" source="CVE"/>
		<reference ref_id="CVE-2026-5290" ref_url="https://www.suse.com/security/cve/CVE-2026-5290/" source="CVE"/>
		<reference ref_id="CVE-2026-5291" ref_url="https://www.suse.com/security/cve/CVE-2026-5291/" source="CVE"/>
		<reference ref_id="CVE-2026-5292" ref_url="https://www.suse.com/security/cve/CVE-2026-5292/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-146.0.7680.177-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5272/">CVE-2026-5272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5272">CVE-2026-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5273/">CVE-2026-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5273">CVE-2026-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5274/">CVE-2026-5274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5274">CVE-2026-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5275/">CVE-2026-5275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5275">CVE-2026-5275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5276/">CVE-2026-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5276">CVE-2026-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5277/">CVE-2026-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5277">CVE-2026-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5278/">CVE-2026-5278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5278">CVE-2026-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5279/">CVE-2026-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5279">CVE-2026-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5280/">CVE-2026-5280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5280">CVE-2026-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5281/">CVE-2026-5281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281">CVE-2026-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5282/">CVE-2026-5282 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5282">CVE-2026-5282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5283/">CVE-2026-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5283">CVE-2026-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5284/">CVE-2026-5284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5284">CVE-2026-5284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5285/">CVE-2026-5285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5285">CVE-2026-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5286/">CVE-2026-5286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5286">CVE-2026-5286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5287/">CVE-2026-5287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5287">CVE-2026-5287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5288/">CVE-2026-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5288">CVE-2026-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5289/">CVE-2026-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5289">CVE-2026-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5290/">CVE-2026-5290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5290">CVE-2026-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5291/">CVE-2026-5291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5291">CVE-2026-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5292/">CVE-2026-5292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5292">CVE-2026-5292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052817" comment="chromedriver-146.0.7680.177-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052818" comment="chromium-146.0.7680.177-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254664" version="1" class="patch">
	<metadata>
		<title>corosync-3.1.10-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35091" ref_url="https://www.suse.com/security/cve/CVE-2026-35091/" source="CVE"/>
		<description>
These are all security issues fixed in the corosync-3.1.10-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-35091/">CVE-2026-35091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35091">CVE-2026-35091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052819" comment="corosync-3.1.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052820" comment="corosync-devel-3.1.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052821" comment="corosync-libs-3.1.10-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254665" version="1" class="patch">
	<metadata>
		<title>libinput-devel-1.31.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35093" ref_url="https://www.suse.com/security/cve/CVE-2026-35093/" source="CVE"/>
		<reference ref_id="CVE-2026-35094" ref_url="https://www.suse.com/security/cve/CVE-2026-35094/" source="CVE"/>
		<description>
These are all security issues fixed in the libinput-devel-1.31.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="6.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-35093/">CVE-2026-35093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35093">CVE-2026-35093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-35094/">CVE-2026-35094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-35094">CVE-2026-35094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052822" comment="libinput-devel-1.31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052823" comment="libinput-tools-1.31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052824" comment="libinput-udev-1.31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052825" comment="libinput10-1.31.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052826" comment="libinput10-32bit-1.31.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254666" version="1" class="patch">
	<metadata>
		<title>python311-aiohttp-3.13.5-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34514" ref_url="https://www.suse.com/security/cve/CVE-2026-34514/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-aiohttp-3.13.5-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34514/">CVE-2026-34514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34514">CVE-2026-34514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052827" comment="python311-aiohttp-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052828" comment="python313-aiohttp-3.13.5-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052829" comment="python314-aiohttp-3.13.5-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254667" version="1" class="patch">
	<metadata>
		<title>python311-scitokens-1.8.1-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-32714" ref_url="https://www.suse.com/security/cve/CVE-2026-32714/" source="CVE"/>
		<reference ref_id="CVE-2026-32716" ref_url="https://www.suse.com/security/cve/CVE-2026-32716/" source="CVE"/>
		<reference ref_id="CVE-2026-32727" ref_url="https://www.suse.com/security/cve/CVE-2026-32727/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-scitokens-1.8.1-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32714/">CVE-2026-32714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32714">CVE-2026-32714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32716/">CVE-2026-32716 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32716">CVE-2026-32716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32727/">CVE-2026-32727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32727">CVE-2026-32727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052830" comment="python311-scitokens-1.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052831" comment="python313-scitokens-1.8.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052832" comment="python314-scitokens-1.8.1-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254668" version="1" class="patch">
	<metadata>
		<title>liblzma5-32bit-5.8.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34743" ref_url="https://www.suse.com/security/cve/CVE-2026-34743/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzma5-32bit-5.8.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34743/">CVE-2026-34743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34743">CVE-2026-34743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052833" comment="liblzma5-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052834" comment="liblzma5-32bit-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052835" comment="liblzma5-x86-64-v3-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052836" comment="xz-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052837" comment="xz-devel-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052838" comment="xz-devel-32bit-5.8.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052839" comment="xz-lang-5.8.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254669" version="1" class="patch">
	<metadata>
		<title>SDL3_image-devel-3.4.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35444" ref_url="https://www.suse.com/security/cve/CVE-2026-35444/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL3_image-devel-3.4.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-35444/">CVE-2026-35444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35444">CVE-2026-35444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052846" comment="SDL3_image-devel-3.4.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052847" comment="libSDL3_image0-3.4.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254670" version="1" class="patch">
	<metadata>
		<title>SDL2_image-devel-2.8.10-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35444" ref_url="https://www.suse.com/security/cve/CVE-2026-35444/" source="CVE"/>
		<description>
These are all security issues fixed in the SDL2_image-devel-2.8.10-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-35444/">CVE-2026-35444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35444">CVE-2026-35444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053053" comment="SDL2_image-devel-2.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053054" comment="libSDL2_image-2_0-0-2.8.10-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053055" comment="libSDL2_image-2_0-0-32bit-2.8.10-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254671" version="1" class="patch">
	<metadata>
		<title>ckermit-9.0.302-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68920" ref_url="https://www.suse.com/security/cve/CVE-2025-68920/" source="CVE"/>
		<description>
These are all security issues fixed in the ckermit-9.0.302-20.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68920/">CVE-2025-68920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68920">CVE-2025-68920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053056" comment="ckermit-9.0.302-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053057" comment="ckermit-doc-9.0.302-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254672" version="1" class="patch">
	<metadata>
		<title>git-cliff-2.12.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the git-cliff-2.12.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053058" comment="git-cliff-2.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053059" comment="git-cliff-bash-completion-2.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053060" comment="git-cliff-fish-completion-2.12.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053061" comment="git-cliff-zsh-completion-2.12.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254673" version="1" class="patch">
	<metadata>
		<title>heroic-games-launcher-2.20.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34601" ref_url="https://www.suse.com/security/cve/CVE-2026-34601/" source="CVE"/>
		<description>
These are all security issues fixed in the heroic-games-launcher-2.20.1-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34601/">CVE-2026-34601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34601">CVE-2026-34601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053062" comment="heroic-games-launcher-2.20.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254674" version="1" class="patch">
	<metadata>
		<title>libeverest-3.6.6-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-25833" ref_url="https://www.suse.com/security/cve/CVE-2026-25833/" source="CVE"/>
		<reference ref_id="CVE-2026-25834" ref_url="https://www.suse.com/security/cve/CVE-2026-25834/" source="CVE"/>
		<reference ref_id="CVE-2026-25835" ref_url="https://www.suse.com/security/cve/CVE-2026-25835/" source="CVE"/>
		<reference ref_id="CVE-2026-34871" ref_url="https://www.suse.com/security/cve/CVE-2026-34871/" source="CVE"/>
		<reference ref_id="CVE-2026-34872" ref_url="https://www.suse.com/security/cve/CVE-2026-34872/" source="CVE"/>
		<reference ref_id="CVE-2026-34873" ref_url="https://www.suse.com/security/cve/CVE-2026-34873/" source="CVE"/>
		<reference ref_id="CVE-2026-34874" ref_url="https://www.suse.com/security/cve/CVE-2026-34874/" source="CVE"/>
		<reference ref_id="CVE-2026-34875" ref_url="https://www.suse.com/security/cve/CVE-2026-34875/" source="CVE"/>
		<reference ref_id="CVE-2026-34876" ref_url="https://www.suse.com/security/cve/CVE-2026-34876/" source="CVE"/>
		<reference ref_id="CVE-2026-34877" ref_url="https://www.suse.com/security/cve/CVE-2026-34877/" source="CVE"/>
		<description>
These are all security issues fixed in the libeverest-3.6.6-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25833/">CVE-2026-25833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25833">CVE-2026-25833 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25834/">CVE-2026-25834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25834">CVE-2026-25834 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25835/">CVE-2026-25835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25835">CVE-2026-25835 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-34871/">CVE-2026-34871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34871">CVE-2026-34871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34872/">CVE-2026-34872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34872">CVE-2026-34872 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-34873/">CVE-2026-34873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34873">CVE-2026-34873 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34874/">CVE-2026-34874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34874">CVE-2026-34874 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-34875/">CVE-2026-34875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34875">CVE-2026-34875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34876/">CVE-2026-34876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34876">CVE-2026-34876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34877/">CVE-2026-34877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34877">CVE-2026-34877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053063" comment="libeverest-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053064" comment="libeverest-x86-64-v3-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053065" comment="libmbedcrypto16-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053066" comment="libmbedcrypto16-x86-64-v3-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053067" comment="libmbedtls21-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053068" comment="libmbedtls21-x86-64-v3-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053069" comment="libmbedx509-7-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053070" comment="libmbedx509-7-x86-64-v3-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053071" comment="libp256m-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053072" comment="libp256m-x86-64-v3-3.6.6-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053073" comment="mbedtls-devel-3.6.6-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254675" version="1" class="patch">
	<metadata>
		<title>python311-social-auth-app-django-5.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-61783" ref_url="https://www.suse.com/security/cve/CVE-2025-61783/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-social-auth-app-django-5.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61783/">CVE-2025-61783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61783">CVE-2025-61783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053074" comment="python311-social-auth-app-django-5.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053075" comment="python313-social-auth-app-django-5.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053076" comment="python314-social-auth-app-django-5.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254676" version="1" class="patch">
	<metadata>
		<title>389-ds-3.1.4+e2562f589-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.1.4+e2562f589-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053189" comment="389-ds-3.1.4+e2562f589-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053190" comment="389-ds-devel-3.1.4+e2562f589-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053191" comment="389-ds-snmp-3.1.4+e2562f589-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053192" comment="lib389-3.1.4+e2562f589-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053193" comment="libsvrcore0-3.1.4+e2562f589-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254677" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-140.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5731" ref_url="https://www.suse.com/security/cve/CVE-2026-5731/" source="CVE"/>
		<reference ref_id="CVE-2026-5732" ref_url="https://www.suse.com/security/cve/CVE-2026-5732/" source="CVE"/>
		<reference ref_id="CVE-2026-5734" ref_url="https://www.suse.com/security/cve/CVE-2026-5734/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5731/">CVE-2026-5731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5731">CVE-2026-5731 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5732/">CVE-2026-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5732">CVE-2026-5732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5734/">CVE-2026-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5734">CVE-2026-5734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053194" comment="MozillaThunderbird-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053195" comment="MozillaThunderbird-openpgp-librnp-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053196" comment="MozillaThunderbird-translations-common-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053197" comment="MozillaThunderbird-translations-other-140.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254678" version="1" class="patch">
	<metadata>
		<title>dcmtk-3.7.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5663" ref_url="https://www.suse.com/security/cve/CVE-2026-5663/" source="CVE"/>
		<description>
These are all security issues fixed in the dcmtk-3.7.0-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5663/">CVE-2026-5663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5663">CVE-2026-5663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053198" comment="dcmtk-3.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053199" comment="dcmtk-devel-3.7.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053200" comment="libdcmtk20-3.7.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254679" version="1" class="patch">
	<metadata>
		<title>firefox-esr-140.9.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5731" ref_url="https://www.suse.com/security/cve/CVE-2026-5731/" source="CVE"/>
		<reference ref_id="CVE-2026-5732" ref_url="https://www.suse.com/security/cve/CVE-2026-5732/" source="CVE"/>
		<reference ref_id="CVE-2026-5734" ref_url="https://www.suse.com/security/cve/CVE-2026-5734/" source="CVE"/>
		<description>
These are all security issues fixed in the firefox-esr-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5731/">CVE-2026-5731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5731">CVE-2026-5731 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5732/">CVE-2026-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5732">CVE-2026-5732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5734/">CVE-2026-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5734">CVE-2026-5734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053201" comment="firefox-esr-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053202" comment="firefox-esr-branding-upstream-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053203" comment="firefox-esr-translations-common-140.9.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053204" comment="firefox-esr-translations-other-140.9.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254680" version="1" class="patch">
	<metadata>
		<title>corepack24-24.14.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-21712" ref_url="https://www.suse.com/security/cve/CVE-2026-21712/" source="CVE"/>
		<reference ref_id="CVE-2026-21713" ref_url="https://www.suse.com/security/cve/CVE-2026-21713/" source="CVE"/>
		<reference ref_id="CVE-2026-21714" ref_url="https://www.suse.com/security/cve/CVE-2026-21714/" source="CVE"/>
		<reference ref_id="CVE-2026-21715" ref_url="https://www.suse.com/security/cve/CVE-2026-21715/" source="CVE"/>
		<reference ref_id="CVE-2026-21716" ref_url="https://www.suse.com/security/cve/CVE-2026-21716/" source="CVE"/>
		<reference ref_id="CVE-2026-21717" ref_url="https://www.suse.com/security/cve/CVE-2026-21717/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack24-24.14.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21712/">CVE-2026-21712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21712">CVE-2026-21712 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21713/">CVE-2026-21713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21713">CVE-2026-21713 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21714/">CVE-2026-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21714">CVE-2026-21714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21715/">CVE-2026-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21715">CVE-2026-21715 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21716/">CVE-2026-21716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21716">CVE-2026-21716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21717/">CVE-2026-21717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21717">CVE-2026-21717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053205" comment="corepack24-24.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053206" comment="nodejs24-24.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053207" comment="nodejs24-devel-24.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053208" comment="nodejs24-docs-24.14.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053209" comment="npm24-24.14.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254681" version="1" class="patch">
	<metadata>
		<title>libIex-3_4-33-3.4.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34378" ref_url="https://www.suse.com/security/cve/CVE-2026-34378/" source="CVE"/>
		<reference ref_id="CVE-2026-34379" ref_url="https://www.suse.com/security/cve/CVE-2026-34379/" source="CVE"/>
		<reference ref_id="CVE-2026-34380" ref_url="https://www.suse.com/security/cve/CVE-2026-34380/" source="CVE"/>
		<reference ref_id="CVE-2026-34543" ref_url="https://www.suse.com/security/cve/CVE-2026-34543/" source="CVE"/>
		<reference ref_id="CVE-2026-34544" ref_url="https://www.suse.com/security/cve/CVE-2026-34544/" source="CVE"/>
		<reference ref_id="CVE-2026-34545" ref_url="https://www.suse.com/security/cve/CVE-2026-34545/" source="CVE"/>
		<reference ref_id="CVE-2026-34588" ref_url="https://www.suse.com/security/cve/CVE-2026-34588/" source="CVE"/>
		<reference ref_id="CVE-2026-34589" ref_url="https://www.suse.com/security/cve/CVE-2026-34589/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_4-33-3.4.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34378/">CVE-2026-34378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34378">CVE-2026-34378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34379/">CVE-2026-34379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34379">CVE-2026-34379 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34380/">CVE-2026-34380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34380">CVE-2026-34380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34543/">CVE-2026-34543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34543">CVE-2026-34543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34544/">CVE-2026-34544 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34544">CVE-2026-34544 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34545/">CVE-2026-34545 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34545">CVE-2026-34545 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34588/">CVE-2026-34588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34588">CVE-2026-34588 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34589/">CVE-2026-34589 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34589">CVE-2026-34589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053210" comment="libIex-3_4-33-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053211" comment="libIex-3_4-33-32bit-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053212" comment="libIex-3_4-33-x86-64-v3-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053213" comment="libIlmThread-3_4-33-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053214" comment="libIlmThread-3_4-33-32bit-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053215" comment="libIlmThread-3_4-33-x86-64-v3-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053216" comment="libOpenEXR-3_4-33-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053217" comment="libOpenEXR-3_4-33-32bit-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053218" comment="libOpenEXR-3_4-33-x86-64-v3-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053219" comment="libOpenEXRCore-3_4-33-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053220" comment="libOpenEXRCore-3_4-33-32bit-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053221" comment="libOpenEXRCore-3_4-33-x86-64-v3-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053222" comment="libOpenEXRUtil-3_4-33-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053223" comment="libOpenEXRUtil-3_4-33-32bit-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053224" comment="libOpenEXRUtil-3_4-33-x86-64-v3-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053225" comment="openexr-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053226" comment="openexr-devel-3.4.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053227" comment="openexr-doc-3.4.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254682" version="1" class="patch">
	<metadata>
		<title>jupyter-jupyterlab-templates-0.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34601" ref_url="https://www.suse.com/security/cve/CVE-2026-34601/" source="CVE"/>
		<description>
These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34601/">CVE-2026-34601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34601">CVE-2026-34601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053228" comment="jupyter-jupyterlab-templates-0.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053229" comment="python311-jupyterlab-templates-0.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053230" comment="python313-jupyterlab-templates-0.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053231" comment="python314-jupyterlab-templates-0.5.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254683" version="1" class="patch">
	<metadata>
		<title>python311-lupa-2.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34444" ref_url="https://www.suse.com/security/cve/CVE-2026-34444/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-lupa-2.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34444/">CVE-2026-34444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34444">CVE-2026-34444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053232" comment="python311-lupa-2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053233" comment="python313-lupa-2.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053234" comment="python314-lupa-2.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254684" version="1" class="patch">
	<metadata>
		<title>ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-26961" ref_url="https://www.suse.com/security/cve/CVE-2026-26961/" source="CVE"/>
		<reference ref_id="CVE-2026-34230" ref_url="https://www.suse.com/security/cve/CVE-2026-34230/" source="CVE"/>
		<reference ref_id="CVE-2026-34763" ref_url="https://www.suse.com/security/cve/CVE-2026-34763/" source="CVE"/>
		<reference ref_id="CVE-2026-34785" ref_url="https://www.suse.com/security/cve/CVE-2026-34785/" source="CVE"/>
		<reference ref_id="CVE-2026-34786" ref_url="https://www.suse.com/security/cve/CVE-2026-34786/" source="CVE"/>
		<reference ref_id="CVE-2026-34826" ref_url="https://www.suse.com/security/cve/CVE-2026-34826/" source="CVE"/>
		<reference ref_id="CVE-2026-34829" ref_url="https://www.suse.com/security/cve/CVE-2026-34829/" source="CVE"/>
		<reference ref_id="CVE-2026-34830" ref_url="https://www.suse.com/security/cve/CVE-2026-34830/" source="CVE"/>
		<reference ref_id="CVE-2026-34831" ref_url="https://www.suse.com/security/cve/CVE-2026-34831/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.23-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26961/">CVE-2026-26961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26961">CVE-2026-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34230/">CVE-2026-34230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34230">CVE-2026-34230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34763/">CVE-2026-34763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34763">CVE-2026-34763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34785/">CVE-2026-34785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34785">CVE-2026-34785 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34786/">CVE-2026-34786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34786">CVE-2026-34786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34826/">CVE-2026-34826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34826">CVE-2026-34826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34829/">CVE-2026-34829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34829">CVE-2026-34829 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34830/">CVE-2026-34830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34830">CVE-2026-34830 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34831/">CVE-2026-34831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34831">CVE-2026-34831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053235" comment="ruby4.0-rubygem-rack-2.2-2.2.23-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254685" version="1" class="patch">
	<metadata>
		<title>steampipe-2.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27138" ref_url="https://www.suse.com/security/cve/CVE-2026-27138/" source="CVE"/>
		<reference ref_id="CVE-2026-34165" ref_url="https://www.suse.com/security/cve/CVE-2026-34165/" source="CVE"/>
		<description>
These are all security issues fixed in the steampipe-2.4.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27138/">CVE-2026-27138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27138">CVE-2026-27138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34165/">CVE-2026-34165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34165">CVE-2026-34165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053236" comment="steampipe-2.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254686" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.17p2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35535" ref_url="https://www.suse.com/security/cve/CVE-2026-35535/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.17p2-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-35535/">CVE-2026-35535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35535">CVE-2026-35535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053237" comment="sudo-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053238" comment="sudo-devel-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053239" comment="sudo-plugin-python-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053240" comment="sudo-policy-sudo-auth-self-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053241" comment="sudo-policy-wheel-auth-self-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053242" comment="sudo-test-1.9.17p2-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053243" comment="system-group-sudo-1.9.17p2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254687" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-149.0.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5731" ref_url="https://www.suse.com/security/cve/CVE-2026-5731/" source="CVE"/>
		<reference ref_id="CVE-2026-5732" ref_url="https://www.suse.com/security/cve/CVE-2026-5732/" source="CVE"/>
		<reference ref_id="CVE-2026-5733" ref_url="https://www.suse.com/security/cve/CVE-2026-5733/" source="CVE"/>
		<reference ref_id="CVE-2026-5734" ref_url="https://www.suse.com/security/cve/CVE-2026-5734/" source="CVE"/>
		<reference ref_id="CVE-2026-5735" ref_url="https://www.suse.com/security/cve/CVE-2026-5735/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-149.0.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5731/">CVE-2026-5731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5731">CVE-2026-5731 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5732/">CVE-2026-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5732">CVE-2026-5732 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5733/">CVE-2026-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5733">CVE-2026-5733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5734/">CVE-2026-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5734">CVE-2026-5734 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5735/">CVE-2026-5735 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5735">CVE-2026-5735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053422" comment="MozillaFirefox-149.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053423" comment="MozillaFirefox-branding-upstream-149.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053424" comment="MozillaFirefox-devel-149.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053425" comment="MozillaFirefox-translations-common-149.0.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053426" comment="MozillaFirefox-translations-other-149.0.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254688" version="1" class="patch">
	<metadata>
		<title>aws-c-event-stream-devel-0.7.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5190" ref_url="https://www.suse.com/security/cve/CVE-2026-5190/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-c-event-stream-devel-0.7.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5190/">CVE-2026-5190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5190">CVE-2026-5190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053427" comment="aws-c-event-stream-devel-0.7.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053428" comment="libaws-c-event-stream1-0.7.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254689" version="1" class="patch">
	<metadata>
		<title>fontforge-20251009-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-15270" ref_url="https://www.suse.com/security/cve/CVE-2025-15270/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20251009-6.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15270/">CVE-2025-15270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15270">CVE-2025-15270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053429" comment="fontforge-20251009-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053430" comment="fontforge-devel-20251009-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053431" comment="fontforge-doc-20251009-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254690" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.9-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27140" ref_url="https://www.suse.com/security/cve/CVE-2026-27140/" source="CVE"/>
		<reference ref_id="CVE-2026-27143" ref_url="https://www.suse.com/security/cve/CVE-2026-27143/" source="CVE"/>
		<reference ref_id="CVE-2026-27144" ref_url="https://www.suse.com/security/cve/CVE-2026-27144/" source="CVE"/>
		<reference ref_id="CVE-2026-32280" ref_url="https://www.suse.com/security/cve/CVE-2026-32280/" source="CVE"/>
		<reference ref_id="CVE-2026-32281" ref_url="https://www.suse.com/security/cve/CVE-2026-32281/" source="CVE"/>
		<reference ref_id="CVE-2026-32282" ref_url="https://www.suse.com/security/cve/CVE-2026-32282/" source="CVE"/>
		<reference ref_id="CVE-2026-32283" ref_url="https://www.suse.com/security/cve/CVE-2026-32283/" source="CVE"/>
		<reference ref_id="CVE-2026-32288" ref_url="https://www.suse.com/security/cve/CVE-2026-32288/" source="CVE"/>
		<reference ref_id="CVE-2026-32289" ref_url="https://www.suse.com/security/cve/CVE-2026-32289/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.9-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-27140/">CVE-2026-27140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27140">CVE-2026-27140 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-27143/">CVE-2026-27143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27143">CVE-2026-27143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-27144/">CVE-2026-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27144">CVE-2026-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32280/">CVE-2026-32280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32280">CVE-2026-32280 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32281/">CVE-2026-32281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32281">CVE-2026-32281 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-32282/">CVE-2026-32282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32282">CVE-2026-32282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32283/">CVE-2026-32283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32283">CVE-2026-32283 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-32288/">CVE-2026-32288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32288">CVE-2026-32288 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-32289/">CVE-2026-32289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32289">CVE-2026-32289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053432" comment="go1.25-1.25.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053433" comment="go1.25-doc-1.25.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053434" comment="go1.25-libstd-1.25.9-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053435" comment="go1.25-race-1.25.9-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254691" version="1" class="patch">
	<metadata>
		<title>libprotobuf-lite34_1_0-32bit-34.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-lite34_1_0-32bit-34.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053436" comment="libprotobuf-lite34_1_0-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053437" comment="libprotobuf-lite34_1_0-32bit-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053438" comment="libprotobuf34_1_0-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053439" comment="libprotobuf34_1_0-32bit-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053440" comment="libprotoc34_1_0-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053441" comment="libprotoc34_1_0-32bit-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053442" comment="libutf8_range-34_1_0-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053443" comment="libutf8_range-34_1_0-32bit-34.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053444" comment="protobuf-devel-34.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254692" version="1" class="patch">
	<metadata>
		<title>python311-Django4-4.2.30-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33033" ref_url="https://www.suse.com/security/cve/CVE-2026-33033/" source="CVE"/>
		<reference ref_id="CVE-2026-33034" ref_url="https://www.suse.com/security/cve/CVE-2026-33034/" source="CVE"/>
		<reference ref_id="CVE-2026-3902" ref_url="https://www.suse.com/security/cve/CVE-2026-3902/" source="CVE"/>
		<reference ref_id="CVE-2026-4277" ref_url="https://www.suse.com/security/cve/CVE-2026-4277/" source="CVE"/>
		<reference ref_id="CVE-2026-4292" ref_url="https://www.suse.com/security/cve/CVE-2026-4292/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Django4-4.2.30-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33033/">CVE-2026-33033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33033">CVE-2026-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-33034/">CVE-2026-33034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33034">CVE-2026-33034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3902/">CVE-2026-3902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3902">CVE-2026-3902 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4277/">CVE-2026-4277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4277">CVE-2026-4277 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4292/">CVE-2026-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4292">CVE-2026-4292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053445" comment="python311-Django4-4.2.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053446" comment="python313-Django4-4.2.30-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053447" comment="python314-Django4-4.2.30-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254693" version="1" class="patch">
	<metadata>
		<title>python313-Django6-6.0.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33033" ref_url="https://www.suse.com/security/cve/CVE-2026-33033/" source="CVE"/>
		<reference ref_id="CVE-2026-33034" ref_url="https://www.suse.com/security/cve/CVE-2026-33034/" source="CVE"/>
		<reference ref_id="CVE-2026-3902" ref_url="https://www.suse.com/security/cve/CVE-2026-3902/" source="CVE"/>
		<reference ref_id="CVE-2026-4277" ref_url="https://www.suse.com/security/cve/CVE-2026-4277/" source="CVE"/>
		<reference ref_id="CVE-2026-4292" ref_url="https://www.suse.com/security/cve/CVE-2026-4292/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Django6-6.0.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33033/">CVE-2026-33033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33033">CVE-2026-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-33034/">CVE-2026-33034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33034">CVE-2026-33034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3902/">CVE-2026-3902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3902">CVE-2026-3902 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4277/">CVE-2026-4277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4277">CVE-2026-4277 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4292/">CVE-2026-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4292">CVE-2026-4292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053448" comment="python313-Django6-6.0.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053449" comment="python314-Django6-6.0.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254694" version="1" class="patch">
	<metadata>
		<title>python311-Flask-HTTPAuth-4.8.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34531" ref_url="https://www.suse.com/security/cve/CVE-2026-34531/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-Flask-HTTPAuth-4.8.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34531/">CVE-2026-34531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34531">CVE-2026-34531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053450" comment="python311-Flask-HTTPAuth-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053451" comment="python313-Flask-HTTPAuth-4.8.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053452" comment="python314-Flask-HTTPAuth-4.8.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254695" version="1" class="patch">
	<metadata>
		<title>glances-common-4.5.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33533" ref_url="https://www.suse.com/security/cve/CVE-2026-33533/" source="CVE"/>
		<reference ref_id="CVE-2026-33641" ref_url="https://www.suse.com/security/cve/CVE-2026-33641/" source="CVE"/>
		<description>
These are all security issues fixed in the glances-common-4.5.3-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33533/">CVE-2026-33533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33533">CVE-2026-33533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33641/">CVE-2026-33641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33641">CVE-2026-33641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053453" comment="glances-common-4.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053454" comment="python311-Glances-4.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053455" comment="python313-Glances-4.5.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053456" comment="python314-Glances-4.5.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254696" version="1" class="patch">
	<metadata>
		<title>python310-3.10.20-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3479" ref_url="https://www.suse.com/security/cve/CVE-2026-3479/" source="CVE"/>
		<description>
These are all security issues fixed in the python310-3.10.20-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3479/">CVE-2026-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3479">CVE-2026-3479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053457" comment="python310-3.10.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053458" comment="python310-curses-3.10.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053459" comment="python310-dbm-3.10.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053460" comment="python310-idle-3.10.20-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053461" comment="python310-tk-3.10.20-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254697" version="1" class="patch">
	<metadata>
		<title>python312-3.12.13-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-3479" ref_url="https://www.suse.com/security/cve/CVE-2026-3479/" source="CVE"/>
		<description>
These are all security issues fixed in the python312-3.12.13-5.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3479/">CVE-2026-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3479">CVE-2026-3479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053462" comment="python312-3.12.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053463" comment="python312-curses-3.12.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053464" comment="python312-dbm-3.12.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053465" comment="python312-idle-3.12.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053466" comment="python312-tk-3.12.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053467" comment="python312-x86-64-v3-3.12.13-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254698" version="1" class="patch">
	<metadata>
		<title>python315-3.15.0~a8-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2297" ref_url="https://www.suse.com/security/cve/CVE-2026-2297/" source="CVE"/>
		<reference ref_id="CVE-2026-3479" ref_url="https://www.suse.com/security/cve/CVE-2026-3479/" source="CVE"/>
		<description>
These are all security issues fixed in the python315-3.15.0~a8-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2297/">CVE-2026-2297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2297">CVE-2026-2297 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3479/">CVE-2026-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3479">CVE-2026-3479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053468" comment="python315-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053469" comment="python315-curses-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053470" comment="python315-dbm-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053471" comment="python315-idle-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053472" comment="python315-profiling-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053473" comment="python315-tk-3.15.0~a8-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053474" comment="python315-x86-64-v3-3.15.0~a8-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254699" version="1" class="patch">
	<metadata>
		<title>clusterctl-1.12.5-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<description>
These are all security issues fixed in the clusterctl-1.12.5-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056165" comment="clusterctl-1.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056166" comment="clusterctl-bash-completion-1.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056167" comment="clusterctl-fish-completion-1.12.5-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056168" comment="clusterctl-zsh-completion-1.12.5-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254700" version="1" class="patch">
	<metadata>
		<title>crun-1.27-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-30892" ref_url="https://www.suse.com/security/cve/CVE-2026-30892/" source="CVE"/>
		<description>
These are all security issues fixed in the crun-1.27-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-30892/">CVE-2026-30892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30892">CVE-2026-30892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056169" comment="crun-1.27-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254701" version="1" class="patch">
	<metadata>
		<title>go1.26-1.26.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-27140" ref_url="https://www.suse.com/security/cve/CVE-2026-27140/" source="CVE"/>
		<reference ref_id="CVE-2026-27143" ref_url="https://www.suse.com/security/cve/CVE-2026-27143/" source="CVE"/>
		<reference ref_id="CVE-2026-27144" ref_url="https://www.suse.com/security/cve/CVE-2026-27144/" source="CVE"/>
		<reference ref_id="CVE-2026-32280" ref_url="https://www.suse.com/security/cve/CVE-2026-32280/" source="CVE"/>
		<reference ref_id="CVE-2026-32281" ref_url="https://www.suse.com/security/cve/CVE-2026-32281/" source="CVE"/>
		<reference ref_id="CVE-2026-32282" ref_url="https://www.suse.com/security/cve/CVE-2026-32282/" source="CVE"/>
		<reference ref_id="CVE-2026-32283" ref_url="https://www.suse.com/security/cve/CVE-2026-32283/" source="CVE"/>
		<reference ref_id="CVE-2026-32288" ref_url="https://www.suse.com/security/cve/CVE-2026-32288/" source="CVE"/>
		<reference ref_id="CVE-2026-32289" ref_url="https://www.suse.com/security/cve/CVE-2026-32289/" source="CVE"/>
		<reference ref_id="CVE-2026-33810" ref_url="https://www.suse.com/security/cve/CVE-2026-33810/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.26-1.26.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-27140/">CVE-2026-27140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27140">CVE-2026-27140 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-27143/">CVE-2026-27143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27143">CVE-2026-27143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-27144/">CVE-2026-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27144">CVE-2026-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32280/">CVE-2026-32280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32280">CVE-2026-32280 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32281/">CVE-2026-32281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32281">CVE-2026-32281 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-32282/">CVE-2026-32282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32282">CVE-2026-32282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-32283/">CVE-2026-32283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32283">CVE-2026-32283 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-32288/">CVE-2026-32288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32288">CVE-2026-32288 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-32289/">CVE-2026-32289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32289">CVE-2026-32289 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-33810/">CVE-2026-33810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33810">CVE-2026-33810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056170" comment="go1.26-1.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056171" comment="go1.26-doc-1.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056172" comment="go1.26-libstd-1.26.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056173" comment="go1.26-race-1.26.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254702" version="1" class="patch">
	<metadata>
		<title>helm-4.1.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35204" ref_url="https://www.suse.com/security/cve/CVE-2026-35204/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-4.1.4-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-35204/">CVE-2026-35204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35204">CVE-2026-35204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056174" comment="helm-4.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056175" comment="helm-bash-completion-4.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056176" comment="helm-fish-completion-4.1.4-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056177" comment="helm-zsh-completion-4.1.4-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254703" version="1" class="patch">
	<metadata>
		<title>perl-XML-Parser-2.570.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2006-10002" ref_url="https://www.suse.com/security/cve/CVE-2006-10002/" source="CVE"/>
		<reference ref_id="CVE-2006-10003" ref_url="https://www.suse.com/security/cve/CVE-2006-10003/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-Parser-2.570.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10002/">CVE-2006-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10002">CVE-2006-10002 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10003/">CVE-2006-10003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10003">CVE-2006-10003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056178" comment="perl-XML-Parser-2.570.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254704" version="1" class="patch">
	<metadata>
		<title>libradcli10-1.5.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
These are all security issues fixed in the libradcli10-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056179" comment="libradcli10-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056180" comment="radcli-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056181" comment="radcli-compat-devel-1.5.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056182" comment="radcli-devel-1.5.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254705" version="1" class="patch">
	<metadata>
		<title>tekton-cli-0.44.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-33211" ref_url="https://www.suse.com/security/cve/CVE-2026-33211/" source="CVE"/>
		<reference ref_id="CVE-2026-34986" ref_url="https://www.suse.com/security/cve/CVE-2026-34986/" source="CVE"/>
		<description>
These are all security issues fixed in the tekton-cli-0.44.1-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33211/">CVE-2026-33211 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33211">CVE-2026-33211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-34986/">CVE-2026-34986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34986">CVE-2026-34986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056183" comment="tekton-cli-0.44.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056184" comment="tekton-cli-bash-completion-0.44.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056185" comment="tekton-cli-fish-completion-0.44.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056186" comment="tekton-cli-zsh-completion-0.44.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254706" version="1" class="patch">
	<metadata>
		<title>chromedriver-147.0.7727.55-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-5858" ref_url="https://www.suse.com/security/cve/CVE-2026-5858/" source="CVE"/>
		<reference ref_id="CVE-2026-5859" ref_url="https://www.suse.com/security/cve/CVE-2026-5859/" source="CVE"/>
		<reference ref_id="CVE-2026-5860" ref_url="https://www.suse.com/security/cve/CVE-2026-5860/" source="CVE"/>
		<reference ref_id="CVE-2026-5861" ref_url="https://www.suse.com/security/cve/CVE-2026-5861/" source="CVE"/>
		<reference ref_id="CVE-2026-5862" ref_url="https://www.suse.com/security/cve/CVE-2026-5862/" source="CVE"/>
		<reference ref_id="CVE-2026-5863" ref_url="https://www.suse.com/security/cve/CVE-2026-5863/" source="CVE"/>
		<reference ref_id="CVE-2026-5864" ref_url="https://www.suse.com/security/cve/CVE-2026-5864/" source="CVE"/>
		<reference ref_id="CVE-2026-5865" ref_url="https://www.suse.com/security/cve/CVE-2026-5865/" source="CVE"/>
		<reference ref_id="CVE-2026-5866" ref_url="https://www.suse.com/security/cve/CVE-2026-5866/" source="CVE"/>
		<reference ref_id="CVE-2026-5867" ref_url="https://www.suse.com/security/cve/CVE-2026-5867/" source="CVE"/>
		<reference ref_id="CVE-2026-5868" ref_url="https://www.suse.com/security/cve/CVE-2026-5868/" source="CVE"/>
		<reference ref_id="CVE-2026-5869" ref_url="https://www.suse.com/security/cve/CVE-2026-5869/" source="CVE"/>
		<reference ref_id="CVE-2026-5870" ref_url="https://www.suse.com/security/cve/CVE-2026-5870/" source="CVE"/>
		<reference ref_id="CVE-2026-5871" ref_url="https://www.suse.com/security/cve/CVE-2026-5871/" source="CVE"/>
		<reference ref_id="CVE-2026-5872" ref_url="https://www.suse.com/security/cve/CVE-2026-5872/" source="CVE"/>
		<reference ref_id="CVE-2026-5873" ref_url="https://www.suse.com/security/cve/CVE-2026-5873/" source="CVE"/>
		<reference ref_id="CVE-2026-5874" ref_url="https://www.suse.com/security/cve/CVE-2026-5874/" source="CVE"/>
		<reference ref_id="CVE-2026-5875" ref_url="https://www.suse.com/security/cve/CVE-2026-5875/" source="CVE"/>
		<reference ref_id="CVE-2026-5876" ref_url="https://www.suse.com/security/cve/CVE-2026-5876/" source="CVE"/>
		<reference ref_id="CVE-2026-5877" ref_url="https://www.suse.com/security/cve/CVE-2026-5877/" source="CVE"/>
		<reference ref_id="CVE-2026-5878" ref_url="https://www.suse.com/security/cve/CVE-2026-5878/" source="CVE"/>
		<reference ref_id="CVE-2026-5879" ref_url="https://www.suse.com/security/cve/CVE-2026-5879/" source="CVE"/>
		<reference ref_id="CVE-2026-5880" ref_url="https://www.suse.com/security/cve/CVE-2026-5880/" source="CVE"/>
		<reference ref_id="CVE-2026-5881" ref_url="https://www.suse.com/security/cve/CVE-2026-5881/" source="CVE"/>
		<reference ref_id="CVE-2026-5882" ref_url="https://www.suse.com/security/cve/CVE-2026-5882/" source="CVE"/>
		<reference ref_id="CVE-2026-5883" ref_url="https://www.suse.com/security/cve/CVE-2026-5883/" source="CVE"/>
		<reference ref_id="CVE-2026-5884" ref_url="https://www.suse.com/security/cve/CVE-2026-5884/" source="CVE"/>
		<reference ref_id="CVE-2026-5885" ref_url="https://www.suse.com/security/cve/CVE-2026-5885/" source="CVE"/>
		<reference ref_id="CVE-2026-5886" ref_url="https://www.suse.com/security/cve/CVE-2026-5886/" source="CVE"/>
		<reference ref_id="CVE-2026-5887" ref_url="https://www.suse.com/security/cve/CVE-2026-5887/" source="CVE"/>
		<reference ref_id="CVE-2026-5888" ref_url="https://www.suse.com/security/cve/CVE-2026-5888/" source="CVE"/>
		<reference ref_id="CVE-2026-5889" ref_url="https://www.suse.com/security/cve/CVE-2026-5889/" source="CVE"/>
		<reference ref_id="CVE-2026-5890" ref_url="https://www.suse.com/security/cve/CVE-2026-5890/" source="CVE"/>
		<reference ref_id="CVE-2026-5891" ref_url="https://www.suse.com/security/cve/CVE-2026-5891/" source="CVE"/>
		<reference ref_id="CVE-2026-5892" ref_url="https://www.suse.com/security/cve/CVE-2026-5892/" source="CVE"/>
		<reference ref_id="CVE-2026-5893" ref_url="https://www.suse.com/security/cve/CVE-2026-5893/" source="CVE"/>
		<reference ref_id="CVE-2026-5894" ref_url="https://www.suse.com/security/cve/CVE-2026-5894/" source="CVE"/>
		<reference ref_id="CVE-2026-5895" ref_url="https://www.suse.com/security/cve/CVE-2026-5895/" source="CVE"/>
		<reference ref_id="CVE-2026-5896" ref_url="https://www.suse.com/security/cve/CVE-2026-5896/" source="CVE"/>
		<reference ref_id="CVE-2026-5897" ref_url="https://www.suse.com/security/cve/CVE-2026-5897/" source="CVE"/>
		<reference ref_id="CVE-2026-5898" ref_url="https://www.suse.com/security/cve/CVE-2026-5898/" source="CVE"/>
		<reference ref_id="CVE-2026-5899" ref_url="https://www.suse.com/security/cve/CVE-2026-5899/" source="CVE"/>
		<reference ref_id="CVE-2026-5900" ref_url="https://www.suse.com/security/cve/CVE-2026-5900/" source="CVE"/>
		<reference ref_id="CVE-2026-5901" ref_url="https://www.suse.com/security/cve/CVE-2026-5901/" source="CVE"/>
		<reference ref_id="CVE-2026-5902" ref_url="https://www.suse.com/security/cve/CVE-2026-5902/" source="CVE"/>
		<reference ref_id="CVE-2026-5903" ref_url="https://www.suse.com/security/cve/CVE-2026-5903/" source="CVE"/>
		<reference ref_id="CVE-2026-5904" ref_url="https://www.suse.com/security/cve/CVE-2026-5904/" source="CVE"/>
		<reference ref_id="CVE-2026-5905" ref_url="https://www.suse.com/security/cve/CVE-2026-5905/" source="CVE"/>
		<reference ref_id="CVE-2026-5906" ref_url="https://www.suse.com/security/cve/CVE-2026-5906/" source="CVE"/>
		<reference ref_id="CVE-2026-5907" ref_url="https://www.suse.com/security/cve/CVE-2026-5907/" source="CVE"/>
		<reference ref_id="CVE-2026-5908" ref_url="https://www.suse.com/security/cve/CVE-2026-5908/" source="CVE"/>
		<reference ref_id="CVE-2026-5909" ref_url="https://www.suse.com/security/cve/CVE-2026-5909/" source="CVE"/>
		<reference ref_id="CVE-2026-5910" ref_url="https://www.suse.com/security/cve/CVE-2026-5910/" source="CVE"/>
		<reference ref_id="CVE-2026-5911" ref_url="https://www.suse.com/security/cve/CVE-2026-5911/" source="CVE"/>
		<reference ref_id="CVE-2026-5912" ref_url="https://www.suse.com/security/cve/CVE-2026-5912/" source="CVE"/>
		<reference ref_id="CVE-2026-5913" ref_url="https://www.suse.com/security/cve/CVE-2026-5913/" source="CVE"/>
		<reference ref_id="CVE-2026-5914" ref_url="https://www.suse.com/security/cve/CVE-2026-5914/" source="CVE"/>
		<reference ref_id="CVE-2026-5915" ref_url="https://www.suse.com/security/cve/CVE-2026-5915/" source="CVE"/>
		<reference ref_id="CVE-2026-5918" ref_url="https://www.suse.com/security/cve/CVE-2026-5918/" source="CVE"/>
		<reference ref_id="CVE-2026-5919" ref_url="https://www.suse.com/security/cve/CVE-2026-5919/" source="CVE"/>
		<description>
These are all security issues fixed in the chromedriver-147.0.7727.55-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5858/">CVE-2026-5858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5858">CVE-2026-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5859/">CVE-2026-5859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5859">CVE-2026-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5860/">CVE-2026-5860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5860">CVE-2026-5860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5861/">CVE-2026-5861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5861">CVE-2026-5861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5862/">CVE-2026-5862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5862">CVE-2026-5862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5863/">CVE-2026-5863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5863">CVE-2026-5863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5864/">CVE-2026-5864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5864">CVE-2026-5864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5865/">CVE-2026-5865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5865">CVE-2026-5865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5866/">CVE-2026-5866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5866">CVE-2026-5866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5867/">CVE-2026-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5867">CVE-2026-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5868/">CVE-2026-5868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5868">CVE-2026-5868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5869/">CVE-2026-5869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5869">CVE-2026-5869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5870/">CVE-2026-5870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5870">CVE-2026-5870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5871/">CVE-2026-5871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5871">CVE-2026-5871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5872/">CVE-2026-5872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5872">CVE-2026-5872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5873/">CVE-2026-5873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5873">CVE-2026-5873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5874/">CVE-2026-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5874">CVE-2026-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5875/">CVE-2026-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5875">CVE-2026-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5876/">CVE-2026-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5876">CVE-2026-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5877/">CVE-2026-5877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5877">CVE-2026-5877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5878/">CVE-2026-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5878">CVE-2026-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5879/">CVE-2026-5879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5879">CVE-2026-5879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5880/">CVE-2026-5880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5880">CVE-2026-5880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5881/">CVE-2026-5881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5881">CVE-2026-5881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5882/">CVE-2026-5882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5882">CVE-2026-5882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5883/">CVE-2026-5883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5883">CVE-2026-5883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5884/">CVE-2026-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5884">CVE-2026-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5885/">CVE-2026-5885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5885">CVE-2026-5885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5886/">CVE-2026-5886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5886">CVE-2026-5886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5887/">CVE-2026-5887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5887">CVE-2026-5887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5888/">CVE-2026-5888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5888">CVE-2026-5888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5889/">CVE-2026-5889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5889">CVE-2026-5889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5890/">CVE-2026-5890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5890">CVE-2026-5890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5891/">CVE-2026-5891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5891">CVE-2026-5891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5892/">CVE-2026-5892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5892">CVE-2026-5892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5893/">CVE-2026-5893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5893">CVE-2026-5893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5894/">CVE-2026-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5894">CVE-2026-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5895/">CVE-2026-5895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5895">CVE-2026-5895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5896/">CVE-2026-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5896">CVE-2026-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5897/">CVE-2026-5897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5897">CVE-2026-5897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5898/">CVE-2026-5898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5898">CVE-2026-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5899/">CVE-2026-5899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5899">CVE-2026-5899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5900/">CVE-2026-5900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5900">CVE-2026-5900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5901/">CVE-2026-5901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5901">CVE-2026-5901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5902/">CVE-2026-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5902">CVE-2026-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5903/">CVE-2026-5903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5903">CVE-2026-5903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5904/">CVE-2026-5904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5904">CVE-2026-5904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5905/">CVE-2026-5905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5905">CVE-2026-5905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5906/">CVE-2026-5906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5906">CVE-2026-5906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5907/">CVE-2026-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5907">CVE-2026-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5908/">CVE-2026-5908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5908">CVE-2026-5908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5909/">CVE-2026-5909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5909">CVE-2026-5909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5910/">CVE-2026-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5910">CVE-2026-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5911/">CVE-2026-5911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5911">CVE-2026-5911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5912/">CVE-2026-5912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5912">CVE-2026-5912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5913/">CVE-2026-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5913">CVE-2026-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5914/">CVE-2026-5914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5914">CVE-2026-5914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5915/">CVE-2026-5915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5915">CVE-2026-5915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5918/">CVE-2026-5918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5918">CVE-2026-5918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5919/">CVE-2026-5919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5919">CVE-2026-5919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056236" comment="chromedriver-147.0.7727.55-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056237" comment="chromium-147.0.7727.55-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254707" version="1" class="patch">
	<metadata>
		<title>cockpit-360-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-4631" ref_url="https://www.suse.com/security/cve/CVE-2026-4631/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-360-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4631/">CVE-2026-4631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4631">CVE-2026-4631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056238" comment="cockpit-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056239" comment="cockpit-bridge-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056240" comment="cockpit-devel-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056241" comment="cockpit-doc-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056242" comment="cockpit-firewalld-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056243" comment="cockpit-kdump-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056244" comment="cockpit-networkmanager-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056245" comment="cockpit-packagekit-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056246" comment="cockpit-selinux-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056247" comment="cockpit-storaged-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056248" comment="cockpit-system-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056249" comment="cockpit-ws-360-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056250" comment="cockpit-ws-selinux-360-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254708" version="1" class="patch">
	<metadata>
		<title>helm3-3.20.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35206" ref_url="https://www.suse.com/security/cve/CVE-2026-35206/" source="CVE"/>
		<description>
These are all security issues fixed in the helm3-3.20.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-35206/">CVE-2026-35206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35206">CVE-2026-35206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056251" comment="helm3-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056252" comment="helm3-bash-completion-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056253" comment="helm3-fish-completion-3.20.2-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056254" comment="helm3-zsh-completion-3.20.2-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254709" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.5.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-2673" ref_url="https://www.suse.com/security/cve/CVE-2026-2673/" source="CVE"/>
		<reference ref_id="CVE-2026-28387" ref_url="https://www.suse.com/security/cve/CVE-2026-28387/" source="CVE"/>
		<reference ref_id="CVE-2026-28388" ref_url="https://www.suse.com/security/cve/CVE-2026-28388/" source="CVE"/>
		<reference ref_id="CVE-2026-28389" ref_url="https://www.suse.com/security/cve/CVE-2026-28389/" source="CVE"/>
		<reference ref_id="CVE-2026-28390" ref_url="https://www.suse.com/security/cve/CVE-2026-28390/" source="CVE"/>
		<reference ref_id="CVE-2026-31789" ref_url="https://www.suse.com/security/cve/CVE-2026-31789/" source="CVE"/>
		<reference ref_id="CVE-2026-31790" ref_url="https://www.suse.com/security/cve/CVE-2026-31790/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.5.3-4.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2673/">CVE-2026-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2673">CVE-2026-2673 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-28387/">CVE-2026-28387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28387">CVE-2026-28387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28388/">CVE-2026-28388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28388">CVE-2026-28388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-28389/">CVE-2026-28389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28389">CVE-2026-28389 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28390/">CVE-2026-28390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28390">CVE-2026-28390 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-31789/">CVE-2026-31789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31789">CVE-2026-31789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-31790/">CVE-2026-31790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31790">CVE-2026-31790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056255" comment="libopenssl-3-devel-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056256" comment="libopenssl-3-devel-32bit-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056257" comment="libopenssl-3-fips-provider-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056258" comment="libopenssl-3-fips-provider-32bit-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056259" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056260" comment="libopenssl3-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056261" comment="libopenssl3-32bit-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056262" comment="libopenssl3-x86-64-v3-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056263" comment="openssl-3-3.5.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056264" comment="openssl-3-doc-3.5.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254710" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_7-0-3.7.1-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-34956" ref_url="https://www.suse.com/security/cve/CVE-2026-34956/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_7-0-3.7.1-33.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34956/">CVE-2026-34956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34956">CVE-2026-34956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056265" comment="libopenvswitch-3_7-0-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056266" comment="libovn-26_03-0-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056267" comment="openvswitch-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056268" comment="openvswitch-devel-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056269" comment="openvswitch-doc-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056270" comment="openvswitch-ipsec-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056271" comment="openvswitch-pki-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056272" comment="openvswitch-test-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056273" comment="openvswitch-vtep-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056274" comment="ovn-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056275" comment="ovn-br-controller-3.7.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056276" comment="ovn-central-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056277" comment="ovn-devel-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056278" comment="ovn-doc-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056279" comment="ovn-docker-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056280" comment="ovn-host-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056281" comment="ovn-vtep-26.03.0-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056282" comment="python3-openvswitch-3.7.1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254711" version="1" class="patch">
	<metadata>
		<title>python311-cryptography-46.0.7-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-39892" ref_url="https://www.suse.com/security/cve/CVE-2026-39892/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-cryptography-46.0.7-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-39892/">CVE-2026-39892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-39892">CVE-2026-39892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056283" comment="python311-cryptography-46.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056284" comment="python313-cryptography-46.0.7-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056285" comment="python314-cryptography-46.0.7-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254712" version="1" class="patch">
	<metadata>
		<title>libcap-devel-2.78-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-4878" ref_url="https://www.suse.com/security/cve/CVE-2026-4878/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-devel-2.78-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-12"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4878/">CVE-2026-4878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4878">CVE-2026-4878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056344" comment="libcap-devel-2.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056345" comment="libcap-progs-2.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056346" comment="libcap2-2.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056347" comment="libcap2-32bit-2.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056348" comment="libpsx2-2.78-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056349" comment="libpsx2-32bit-2.78-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254713" version="1" class="patch">
	<metadata>
		<title>python311-biopython-1.87-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2025-68463" ref_url="https://www.suse.com/security/cve/CVE-2025-68463/" source="CVE"/>
		<description>
These are all security issues fixed in the python311-biopython-1.87-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-12"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-68463/">CVE-2025-68463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68463">CVE-2025-68463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056350" comment="python311-biopython-1.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056351" comment="python313-biopython-1.87-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056352" comment="python314-biopython-1.87-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254714" version="1" class="patch">
	<metadata>
		<title>helm-4.1.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2026-35205" ref_url="https://www.suse.com/security/cve/CVE-2026-35205/" source="CVE"/>
		<reference ref_id="CVE-2026-35206" ref_url="https://www.suse.com/security/cve/CVE-2026-35206/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-4.1.4-2.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-35205/">CVE-2026-35205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35205">CVE-2026-35205 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-35206/">CVE-2026-35206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35206">CVE-2026-35206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056582" comment="helm-4.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056583" comment="helm-bash-completion-4.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056584" comment="helm-fish-completion-4.1.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056585" comment="helm-zsh-completion-4.1.4-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254715" version="1" class="patch">
	<metadata>
		<title>oci-cli-3.76.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Tumbleweed</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<reference ref_id="CVE-2025-50181" ref_url="https://www.suse.com/security/cve/CVE-2025-50181/" source="CVE"/>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<reference ref_id="CVE-2026-26007" ref_url="https://www.suse.com/security/cve/CVE-2026-26007/" source="CVE"/>
		<description>
These are all security issues fixed in the oci-cli-3.76.2-1.1 package on the GA media of openSUSE Tumbleweed.		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50181/">CVE-2025-50181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50181">CVE-2025-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26007/">CVE-2026-26007 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26007">CVE-2026-26007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:tumbleweed</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009634834" comment="openSUSE Tumbleweed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056586" comment="oci-cli-3.76.2-1.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905610" version="1" comment="kdirstat is &lt;2.4.4-277.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634834" version="1" comment="openSUSE-release is &gt;=20210101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905611" version="1" comment="dstat is &lt;0.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905612" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905613" version="1" comment="libXxf86vm-devel-32bit is &lt;1.1.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905614" version="1" comment="libXxf86vm1 is &lt;1.1.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905615" version="1" comment="libXxf86vm1-32bit is &lt;1.1.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905616" version="1" comment="ghostscript is &lt;9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905617" version="1" comment="ghostscript-devel is &lt;9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905618" version="1" comment="ghostscript-x11 is &lt;9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905619" version="1" comment="krb5 is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905620" version="1" comment="krb5-32bit is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905621" version="1" comment="krb5-client is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905622" version="1" comment="krb5-devel is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905623" version="1" comment="krb5-devel-32bit is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905624" version="1" comment="krb5-doc is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905625" version="1" comment="krb5-mini is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905626" version="1" comment="krb5-mini-devel is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905627" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905628" version="1" comment="krb5-plugin-preauth-otp is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905629" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905630" version="1" comment="krb5-server is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905631" version="1" comment="libHX-devel is &lt;3.22-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905632" version="1" comment="libHX-devel-32bit is &lt;3.22-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905633" version="1" comment="libHX28 is &lt;3.22-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905634" version="1" comment="libHX28-32bit is &lt;3.22-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905635" version="1" comment="libreoffice is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905636" version="1" comment="libreoffice-base is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905637" version="1" comment="libreoffice-base-drivers-firebird is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905638" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905639" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905640" version="1" comment="libreoffice-branding-upstream is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905641" version="1" comment="libreoffice-calc is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905642" version="1" comment="libreoffice-calc-extensions is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905643" version="1" comment="libreoffice-draw is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905644" version="1" comment="libreoffice-filters-optional is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905645" version="1" comment="libreoffice-gdb-pretty-printers is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905646" version="1" comment="libreoffice-glade is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905647" version="1" comment="libreoffice-gnome is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905648" version="1" comment="libreoffice-gtk3 is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905649" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905650" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905651" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905652" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905653" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905654" version="1" comment="libreoffice-icon-theme-tango is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905655" version="1" comment="libreoffice-impress is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905656" version="1" comment="libreoffice-kde4 is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905657" version="1" comment="libreoffice-l10n-af is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905658" version="1" comment="libreoffice-l10n-ar is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905659" version="1" comment="libreoffice-l10n-as is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905660" version="1" comment="libreoffice-l10n-bg is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905661" version="1" comment="libreoffice-l10n-bn is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905662" version="1" comment="libreoffice-l10n-br is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905663" version="1" comment="libreoffice-l10n-ca is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905664" version="1" comment="libreoffice-l10n-cs is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905665" version="1" comment="libreoffice-l10n-cy is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905666" version="1" comment="libreoffice-l10n-da is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905667" version="1" comment="libreoffice-l10n-de is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905668" version="1" comment="libreoffice-l10n-dz is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905669" version="1" comment="libreoffice-l10n-el is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905670" version="1" comment="libreoffice-l10n-en is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905671" version="1" comment="libreoffice-l10n-es is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905672" version="1" comment="libreoffice-l10n-et is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905673" version="1" comment="libreoffice-l10n-eu is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905674" version="1" comment="libreoffice-l10n-fa is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905675" version="1" comment="libreoffice-l10n-fi is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905676" version="1" comment="libreoffice-l10n-fr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905677" version="1" comment="libreoffice-l10n-ga is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905678" version="1" comment="libreoffice-l10n-gl is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905679" version="1" comment="libreoffice-l10n-gu is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905680" version="1" comment="libreoffice-l10n-he is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905681" version="1" comment="libreoffice-l10n-hi is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905682" version="1" comment="libreoffice-l10n-hr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905683" version="1" comment="libreoffice-l10n-hu is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905684" version="1" comment="libreoffice-l10n-it is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905685" version="1" comment="libreoffice-l10n-ja is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905686" version="1" comment="libreoffice-l10n-kk is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905687" version="1" comment="libreoffice-l10n-kn is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905688" version="1" comment="libreoffice-l10n-ko is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905689" version="1" comment="libreoffice-l10n-lt is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905690" version="1" comment="libreoffice-l10n-lv is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905691" version="1" comment="libreoffice-l10n-mai is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905692" version="1" comment="libreoffice-l10n-ml is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905693" version="1" comment="libreoffice-l10n-mr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905694" version="1" comment="libreoffice-l10n-nb is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905695" version="1" comment="libreoffice-l10n-nl is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905696" version="1" comment="libreoffice-l10n-nn is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905697" version="1" comment="libreoffice-l10n-nr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905698" version="1" comment="libreoffice-l10n-nso is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905699" version="1" comment="libreoffice-l10n-or is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905700" version="1" comment="libreoffice-l10n-pa is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905701" version="1" comment="libreoffice-l10n-pl is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905702" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905703" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905704" version="1" comment="libreoffice-l10n-ro is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905705" version="1" comment="libreoffice-l10n-ru is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905706" version="1" comment="libreoffice-l10n-si is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905707" version="1" comment="libreoffice-l10n-sk is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905708" version="1" comment="libreoffice-l10n-sl is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905709" version="1" comment="libreoffice-l10n-sr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905710" version="1" comment="libreoffice-l10n-ss is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905711" version="1" comment="libreoffice-l10n-st is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905712" version="1" comment="libreoffice-l10n-sv is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905713" version="1" comment="libreoffice-l10n-ta is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905714" version="1" comment="libreoffice-l10n-te is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905715" version="1" comment="libreoffice-l10n-th is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905716" version="1" comment="libreoffice-l10n-tn is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905717" version="1" comment="libreoffice-l10n-tr is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905718" version="1" comment="libreoffice-l10n-ts is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905719" version="1" comment="libreoffice-l10n-uk is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905720" version="1" comment="libreoffice-l10n-ve is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905721" version="1" comment="libreoffice-l10n-xh is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905722" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905723" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905724" version="1" comment="libreoffice-l10n-zu is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905725" version="1" comment="libreoffice-mailmerge is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905726" version="1" comment="libreoffice-math is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905727" version="1" comment="libreoffice-officebean is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905728" version="1" comment="libreoffice-pyuno is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905729" version="1" comment="libreoffice-sdk is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905730" version="1" comment="libreoffice-sdk-doc is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905731" version="1" comment="libreoffice-writer is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905732" version="1" comment="libreoffice-writer-extensions is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905733" version="1" comment="libreofficekit is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905734" version="1" comment="libreofficekit-devel is &lt;5.2.3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905735" version="1" comment="mcabber is &lt;1.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905736" version="1" comment="mcabber-devel is &lt;1.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905737" version="1" comment="kbd is &lt;2.0.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905738" version="1" comment="kbd-legacy is &lt;2.0.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905739" version="1" comment="libupsclient1 is &lt;2.7.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905740" version="1" comment="nut is &lt;2.7.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905741" version="1" comment="nut-cgi is &lt;2.7.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905742" version="1" comment="nut-devel is &lt;2.7.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905743" version="1" comment="nut-drivers-net is &lt;2.7.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905744" version="1" comment="libnewt0_52 is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905745" version="1" comment="libnewt0_52-32bit is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905746" version="1" comment="newt is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905747" version="1" comment="newt-devel is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905748" version="1" comment="newt-doc is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905749" version="1" comment="newt-static is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905750" version="1" comment="python-newt is &lt;0.52.18-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905751" version="1" comment="kdelibs4 is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905752" version="1" comment="kdelibs4-apidocs is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905753" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905754" version="1" comment="kdelibs4-core is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905755" version="1" comment="kdelibs4-doc is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905756" version="1" comment="libkde4 is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905757" version="1" comment="libkde4-32bit is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905758" version="1" comment="libkde4-devel is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905759" version="1" comment="libkdecore4 is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905760" version="1" comment="libkdecore4-32bit is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905761" version="1" comment="libkdecore4-devel is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905762" version="1" comment="libksuseinstall-devel is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905763" version="1" comment="libksuseinstall1 is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905764" version="1" comment="libksuseinstall1-32bit is &lt;4.14.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905765" version="1" comment="libldap-2_4-2 is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905766" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905767" version="1" comment="libldap-data is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905768" version="1" comment="openldap2 is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905769" version="1" comment="openldap2-back-meta is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905770" version="1" comment="openldap2-back-perl is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905771" version="1" comment="openldap2-back-sock is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905772" version="1" comment="openldap2-back-sql is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905773" version="1" comment="openldap2-client is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905774" version="1" comment="openldap2-contrib is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905775" version="1" comment="openldap2-devel is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905776" version="1" comment="openldap2-devel-32bit is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905777" version="1" comment="openldap2-devel-static is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905778" version="1" comment="openldap2-doc is &lt;2.4.44-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905779" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905780" version="1" comment="libjson-c-devel is &lt;0.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905781" version="1" comment="libjson-c-doc is &lt;0.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905782" version="1" comment="libjson-c2 is &lt;0.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905783" version="1" comment="libjson-c2-32bit is &lt;0.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905784" version="1" comment="ack is &lt;2.15_02-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905785" version="1" comment="perl-App-Ack is &lt;2.15_02-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905786" version="1" comment="cyradm is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905787" version="1" comment="cyrus-imapd is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905788" version="1" comment="cyrus-imapd-devel is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905789" version="1" comment="cyrus-imapd-snmp is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905790" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905791" version="1" comment="cyrus-imapd-utils is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905792" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905793" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905794" version="1" comment="giflib-devel is &lt;5.1.4-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905795" version="1" comment="giflib-devel-32bit is &lt;5.1.4-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905796" version="1" comment="giflib-progs is &lt;5.1.4-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905797" version="1" comment="libgif7 is &lt;5.1.4-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905798" version="1" comment="libgif7-32bit is &lt;5.1.4-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905799" version="1" comment="exim is &lt;4.86.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905800" version="1" comment="eximon is &lt;4.86.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905801" version="1" comment="eximstats-html is &lt;4.86.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905802" version="1" comment="tkman is &lt;2.2-157.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905803" version="1" comment="archivemail is &lt;0.9.0-9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905804" version="1" comment="python-virtualbox is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905805" version="1" comment="virtualbox is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905806" version="1" comment="virtualbox-devel is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905807" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905808" version="1" comment="virtualbox-guest-kmp-default is &lt;5.1.10_k4.8.13_1-2.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905809" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.1.10_k4.8.13_1-2.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905810" version="1" comment="virtualbox-guest-tools is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905811" version="1" comment="virtualbox-guest-x11 is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905812" version="1" comment="virtualbox-host-kmp-default is &lt;5.1.10_k4.8.13_1-2.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905813" version="1" comment="virtualbox-host-kmp-pae is &lt;5.1.10_k4.8.13_1-2.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905814" version="1" comment="virtualbox-host-source is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905815" version="1" comment="virtualbox-qt is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905816" version="1" comment="virtualbox-websrv is &lt;5.1.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905817" version="1" comment="memcached is &lt;1.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905818" version="1" comment="memcached-devel is &lt;1.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905819" version="1" comment="hostapd is &lt;2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905820" version="1" comment="fileshareset is &lt;2.0-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905821" version="1" comment="kde4-kgreeter-plugins is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905822" version="1" comment="kdebase3 is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905823" version="1" comment="kdebase3-32bit is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905824" version="1" comment="kdebase3-apps is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905825" version="1" comment="kdebase3-devel is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905826" version="1" comment="kdebase3-extra is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905827" version="1" comment="kdebase3-kdm is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905828" version="1" comment="kdebase3-ksysguardd is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905829" version="1" comment="kdebase3-nsplugin is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905830" version="1" comment="kdebase3-runtime is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905831" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905832" version="1" comment="kdebase3-samba is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905833" version="1" comment="kdebase3-session is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905834" version="1" comment="kdebase3-workspace is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905835" version="1" comment="kdebase4-workspace is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905836" version="1" comment="kdebase4-workspace-addons is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905837" version="1" comment="kdebase4-workspace-devel is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905838" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905839" version="1" comment="kdebase4-workspace-liboxygenstyle is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905840" version="1" comment="kdebase4-workspace-liboxygenstyle-32bit is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905841" version="1" comment="kdebase4-workspace-libs is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905842" version="1" comment="kdebase4-workspace-libs-32bit is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905843" version="1" comment="kdm is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905844" version="1" comment="kdm-branding-upstream is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905845" version="1" comment="krandr is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905846" version="1" comment="kwin is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905847" version="1" comment="misc-console-font is &lt;3.5.10.1-73.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905848" version="1" comment="oxygen4-cursors is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905849" version="1" comment="python-kdebase4 is &lt;4.11.22-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905850" version="1" comment="libvorbis-devel is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905851" version="1" comment="libvorbis-devel-32bit is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905852" version="1" comment="libvorbis-doc is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905853" version="1" comment="libvorbis0 is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905854" version="1" comment="libvorbis0-32bit is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905855" version="1" comment="libvorbisenc2 is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905856" version="1" comment="libvorbisenc2-32bit is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905857" version="1" comment="libvorbisfile3 is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905858" version="1" comment="libvorbisfile3-32bit is &lt;1.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905859" version="1" comment="libxcb-composite0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905860" version="1" comment="libxcb-composite0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905861" version="1" comment="libxcb-damage0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905862" version="1" comment="libxcb-damage0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905863" version="1" comment="libxcb-devel is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905864" version="1" comment="libxcb-devel-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905865" version="1" comment="libxcb-devel-doc is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905866" version="1" comment="libxcb-dpms0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905867" version="1" comment="libxcb-dpms0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905868" version="1" comment="libxcb-dri2-0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905869" version="1" comment="libxcb-dri2-0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905870" version="1" comment="libxcb-dri3-0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905871" version="1" comment="libxcb-dri3-0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905872" version="1" comment="libxcb-glx0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905873" version="1" comment="libxcb-glx0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905874" version="1" comment="libxcb-present0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905875" version="1" comment="libxcb-present0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905876" version="1" comment="libxcb-randr0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905877" version="1" comment="libxcb-randr0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905878" version="1" comment="libxcb-record0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905879" version="1" comment="libxcb-record0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905880" version="1" comment="libxcb-render0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905881" version="1" comment="libxcb-render0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905882" version="1" comment="libxcb-res0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905883" version="1" comment="libxcb-res0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905884" version="1" comment="libxcb-screensaver0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905885" version="1" comment="libxcb-screensaver0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905886" version="1" comment="libxcb-shape0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905887" version="1" comment="libxcb-shape0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905888" version="1" comment="libxcb-shm0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905889" version="1" comment="libxcb-shm0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905890" version="1" comment="libxcb-sync1 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905891" version="1" comment="libxcb-sync1-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905892" version="1" comment="libxcb-xf86dri0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905893" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905894" version="1" comment="libxcb-xfixes0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905895" version="1" comment="libxcb-xfixes0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905896" version="1" comment="libxcb-xinerama0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905897" version="1" comment="libxcb-xinerama0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905898" version="1" comment="libxcb-xkb1 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905899" version="1" comment="libxcb-xkb1-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905900" version="1" comment="libxcb-xtest0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905901" version="1" comment="libxcb-xtest0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905902" version="1" comment="libxcb-xv0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905903" version="1" comment="libxcb-xv0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905904" version="1" comment="libxcb-xvmc0 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905905" version="1" comment="libxcb-xvmc0-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905906" version="1" comment="libxcb1 is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905907" version="1" comment="libxcb1-32bit is &lt;1.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905908" version="1" comment="apache-commons-beanutils is &lt;1.9.2-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905909" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905910" version="1" comment="automake is &lt;1.15-4.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905911" version="1" comment="m4 is &lt;1.4.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905912" version="1" comment="go is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905913" version="1" comment="go-doc is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905914" version="1" comment="libyaml-0-2 is &lt;0.1.6-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905915" version="1" comment="libyaml-devel is &lt;0.1.6-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905916" version="1" comment="postgresql94 is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905917" version="1" comment="postgresql94-contrib is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905918" version="1" comment="postgresql94-devel is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905919" version="1" comment="postgresql94-docs is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905920" version="1" comment="postgresql94-plperl is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905921" version="1" comment="postgresql94-plpython is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905922" version="1" comment="postgresql94-pltcl is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905923" version="1" comment="postgresql94-server is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905924" version="1" comment="postgresql94-test is &lt;9.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905925" version="1" comment="groff is &lt;1.22.3-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905926" version="1" comment="groff-doc is &lt;1.22.3-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905927" version="1" comment="groff-full is &lt;1.22.3-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905928" version="1" comment="gxditview is &lt;1.22.3-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905929" version="1" comment="guestfs-data is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905930" version="1" comment="guestfs-tools is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905931" version="1" comment="guestfsd is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905932" version="1" comment="libguestfs-devel is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905933" version="1" comment="libguestfs-test is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905934" version="1" comment="libguestfs0 is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905935" version="1" comment="lua-libguestfs is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905936" version="1" comment="ocaml-libguestfs is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905937" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905938" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905939" version="1" comment="python-libguestfs is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905940" version="1" comment="rubygem-libguestfs is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905941" version="1" comment="virt-p2v is &lt;1.32.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905942" version="1" comment="liblightdm-gobject-1-0 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905943" version="1" comment="liblightdm-qt-3-0 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905944" version="1" comment="liblightdm-qt5-3-0 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905945" version="1" comment="lightdm is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905946" version="1" comment="lightdm-gobject-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905947" version="1" comment="lightdm-lang is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905948" version="1" comment="lightdm-qt-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905949" version="1" comment="lightdm-qt5-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905950" version="1" comment="typelib-1_0-LightDM-1 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905951" version="1" comment="apache2-mod_security2 is &lt;2.9.0-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905952" version="1" comment="phpPgAdmin is &lt;5.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905953" version="1" comment="libssh-devel is &lt;0.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905954" version="1" comment="libssh-devel-doc is &lt;0.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905955" version="1" comment="libssh4 is &lt;0.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905956" version="1" comment="libssh4-32bit is &lt;0.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905957" version="1" comment="libgcrypt-cavs is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905958" version="1" comment="libgcrypt-devel is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905959" version="1" comment="libgcrypt-devel-32bit is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905960" version="1" comment="libgcrypt20 is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905961" version="1" comment="libgcrypt20-32bit is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905962" version="1" comment="libgcrypt20-hmac is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905963" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.7.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905964" version="1" comment="libzmq5 is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905965" version="1" comment="zeromq-devel is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905966" version="1" comment="zeromq-tools is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905967" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905968" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905969" version="1" comment="libxerces-c-devel is &lt;3.1.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905970" version="1" comment="xerces-c is &lt;3.1.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905971" version="1" comment="xerces-c-doc is &lt;3.1.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905972" version="1" comment="ImageMagick is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905973" version="1" comment="ImageMagick-devel is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905974" version="1" comment="ImageMagick-devel-32bit is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905975" version="1" comment="ImageMagick-doc is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905976" version="1" comment="ImageMagick-extra is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905977" version="1" comment="libMagick++-6_Q16-6 is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905978" version="1" comment="libMagick++-6_Q16-6-32bit is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905979" version="1" comment="libMagick++-devel is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905980" version="1" comment="libMagick++-devel-32bit is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905981" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905982" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905983" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905984" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905985" version="1" comment="perl-PerlMagick is &lt;6.9.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905986" version="1" comment="evince is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905987" version="1" comment="evince-browser-plugin is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905988" version="1" comment="evince-devel is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905989" version="1" comment="evince-lang is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905990" version="1" comment="evince-plugin-comicsdocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905991" version="1" comment="evince-plugin-djvudocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905992" version="1" comment="evince-plugin-dvidocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905993" version="1" comment="evince-plugin-pdfdocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905994" version="1" comment="evince-plugin-psdocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905995" version="1" comment="evince-plugin-tiffdocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905996" version="1" comment="evince-plugin-xpsdocument is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905997" version="1" comment="libevdocument3-4 is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905998" version="1" comment="libevview3-3 is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905999" version="1" comment="nautilus-evince is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906000" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906001" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906002" version="1" comment="libndp is &lt;1.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906003" version="1" comment="libndp-devel is &lt;1.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906004" version="1" comment="libndp0 is &lt;1.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906005" version="1" comment="pam-modules is &lt;12.1-27.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906006" version="1" comment="pam-modules-32bit is &lt;12.1-27.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906007" version="1" comment="nginx is &lt;1.11.4-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906008" version="1" comment="vim-plugin-nginx is &lt;1.11.4-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906009" version="1" comment="bsdiff is &lt;4.3-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906010" version="1" comment="libsoup-2_4-1 is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906011" version="1" comment="libsoup-2_4-1-32bit is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906012" version="1" comment="libsoup-devel is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906013" version="1" comment="libsoup-devel-32bit is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906014" version="1" comment="libsoup-lang is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906015" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.56.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906016" version="1" comment="vino is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906017" version="1" comment="vino-lang is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906018" version="1" comment="proftpd is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906019" version="1" comment="proftpd-devel is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906020" version="1" comment="proftpd-doc is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906021" version="1" comment="proftpd-lang is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906022" version="1" comment="proftpd-ldap is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906023" version="1" comment="proftpd-mysql is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906024" version="1" comment="proftpd-pgsql is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906025" version="1" comment="proftpd-radius is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906026" version="1" comment="proftpd-sqlite is &lt;1.3.5b-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906027" version="1" comment="ppp is &lt;2.4.7-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906028" version="1" comment="ppp-devel is &lt;2.4.7-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906029" version="1" comment="libpng16-16 is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906030" version="1" comment="libpng16-16-32bit is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906031" version="1" comment="libpng16-compat-devel is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906032" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906033" version="1" comment="libpng16-devel is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906034" version="1" comment="libpng16-devel-32bit is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906035" version="1" comment="libpng16-tools is &lt;1.6.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906036" version="1" comment="ant is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906037" version="1" comment="ant-antlr is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906038" version="1" comment="ant-apache-bcel is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906039" version="1" comment="ant-apache-bsf is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906040" version="1" comment="ant-apache-log4j is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906041" version="1" comment="ant-apache-oro is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906042" version="1" comment="ant-apache-regexp is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906043" version="1" comment="ant-apache-resolver is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906044" version="1" comment="ant-apache-xalan2 is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906045" version="1" comment="ant-commons-logging is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906046" version="1" comment="ant-commons-net is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906047" version="1" comment="ant-javadoc is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906048" version="1" comment="ant-javamail is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906049" version="1" comment="ant-jdepend is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906050" version="1" comment="ant-jmf is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906051" version="1" comment="ant-jsch is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906052" version="1" comment="ant-junit is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906053" version="1" comment="ant-manual is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906054" version="1" comment="ant-scripts is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906055" version="1" comment="ant-swing is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906056" version="1" comment="ant-testutil is &lt;1.9.6-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906057" version="1" comment="python-rope is &lt;0.10.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906058" version="1" comment="freeradius-server is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906059" version="1" comment="freeradius-server-devel is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906060" version="1" comment="freeradius-server-doc is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906061" version="1" comment="freeradius-server-krb5 is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906062" version="1" comment="freeradius-server-ldap is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906063" version="1" comment="freeradius-server-libs is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906064" version="1" comment="freeradius-server-mysql is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906065" version="1" comment="freeradius-server-perl is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906066" version="1" comment="freeradius-server-postgresql is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906067" version="1" comment="freeradius-server-python is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906068" version="1" comment="freeradius-server-sqlite is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906069" version="1" comment="freeradius-server-utils is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906070" version="1" comment="phpMyAdmin is &lt;4.6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906071" version="1" comment="hardlink is &lt;1.0.g50-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906072" version="1" comment="libXvnc-devel is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906073" version="1" comment="libXvnc1 is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906074" version="1" comment="tigervnc is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906075" version="1" comment="xorg-x11-Xvnc is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906076" version="1" comment="ruby2.2-rubygem-actionview-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906077" version="1" comment="ruby2.2-rubygem-actionview-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906078" version="1" comment="ruby2.2-rubygem-actionview-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906079" version="1" comment="ruby2.2-rubygem-actionview-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906080" version="1" comment="ruby2.3-rubygem-actionview-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906081" version="1" comment="ruby2.3-rubygem-actionview-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906082" version="1" comment="ruby2.3-rubygem-actionview-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906083" version="1" comment="ruby2.3-rubygem-actionview-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906084" version="1" comment="python-bugzilla is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906085" version="1" comment="gzip is &lt;1.8-1.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906086" version="1" comment="aria2 is &lt;1.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906087" version="1" comment="aria2-devel is &lt;1.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906088" version="1" comment="aria2-lang is &lt;1.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906089" version="1" comment="libaria2-0 is &lt;1.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906090" version="1" comment="libXp-devel is &lt;1.0.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906091" version="1" comment="libXp-devel-32bit is &lt;1.0.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906092" version="1" comment="libXp6 is &lt;1.0.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906093" version="1" comment="libXp6-32bit is &lt;1.0.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906094" version="1" comment="gd is &lt;2.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906095" version="1" comment="gd-devel is &lt;2.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906096" version="1" comment="libgd3 is &lt;2.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906097" version="1" comment="libgd3-32bit is &lt;2.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906098" version="1" comment="libapr1 is &lt;1.5.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906099" version="1" comment="libapr1-devel is &lt;1.5.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906100" version="1" comment="libvlc5 is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906101" version="1" comment="libvlccore8 is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906102" version="1" comment="vlc is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906103" version="1" comment="vlc-codec-gstreamer is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906104" version="1" comment="vlc-devel is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906105" version="1" comment="vlc-lang is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906106" version="1" comment="vlc-noX is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906107" version="1" comment="vlc-qt is &lt;2.2.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906108" version="1" comment="openslp is &lt;2.0.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906109" version="1" comment="openslp-32bit is &lt;2.0.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906110" version="1" comment="openslp-devel is &lt;2.0.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906111" version="1" comment="openslp-server is &lt;2.0.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906112" version="1" comment="python-Django is &lt;1.9.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906113" version="1" comment="icecast is &lt;2.4.2-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906114" version="1" comment="icecast-doc is &lt;2.4.2-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906115" version="1" comment="libFS-devel is &lt;1.0.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906116" version="1" comment="libFS-devel-32bit is &lt;1.0.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906117" version="1" comment="libFS6 is &lt;1.0.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906118" version="1" comment="libFS6-32bit is &lt;1.0.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906119" version="1" comment="ctdb is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906120" version="1" comment="ctdb-pcp-pmda is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906121" version="1" comment="ctdb-tests is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906122" version="1" comment="libdcerpc-binding0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906123" version="1" comment="libdcerpc-binding0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906124" version="1" comment="libdcerpc-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906125" version="1" comment="libdcerpc-samr-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906126" version="1" comment="libdcerpc-samr0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906127" version="1" comment="libdcerpc-samr0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906128" version="1" comment="libdcerpc0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906129" version="1" comment="libdcerpc0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906130" version="1" comment="libndr-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906131" version="1" comment="libndr-krb5pac-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906132" version="1" comment="libndr-krb5pac0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906133" version="1" comment="libndr-krb5pac0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906134" version="1" comment="libndr-nbt-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906135" version="1" comment="libndr-nbt0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906136" version="1" comment="libndr-nbt0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906137" version="1" comment="libndr-standard-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906138" version="1" comment="libndr-standard0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906139" version="1" comment="libndr-standard0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906140" version="1" comment="libndr0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906141" version="1" comment="libndr0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906142" version="1" comment="libnetapi-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906143" version="1" comment="libnetapi0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906144" version="1" comment="libnetapi0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906145" version="1" comment="libsamba-credentials-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906146" version="1" comment="libsamba-credentials0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906147" version="1" comment="libsamba-credentials0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906148" version="1" comment="libsamba-errors-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906149" version="1" comment="libsamba-errors0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906150" version="1" comment="libsamba-errors0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906151" version="1" comment="libsamba-hostconfig-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906152" version="1" comment="libsamba-hostconfig0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906153" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906154" version="1" comment="libsamba-passdb-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906155" version="1" comment="libsamba-passdb0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906156" version="1" comment="libsamba-passdb0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906157" version="1" comment="libsamba-policy-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906158" version="1" comment="libsamba-policy0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906159" version="1" comment="libsamba-policy0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906160" version="1" comment="libsamba-util-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906161" version="1" comment="libsamba-util0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906162" version="1" comment="libsamba-util0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906163" version="1" comment="libsamdb-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906164" version="1" comment="libsamdb0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906165" version="1" comment="libsamdb0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906166" version="1" comment="libsmbclient-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906167" version="1" comment="libsmbclient0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906168" version="1" comment="libsmbclient0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906169" version="1" comment="libsmbconf-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906170" version="1" comment="libsmbconf0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906171" version="1" comment="libsmbconf0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906172" version="1" comment="libsmbldap-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906173" version="1" comment="libsmbldap0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906174" version="1" comment="libsmbldap0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906175" version="1" comment="libtevent-util-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906176" version="1" comment="libtevent-util0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906177" version="1" comment="libtevent-util0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906178" version="1" comment="libwbclient-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906179" version="1" comment="libwbclient0 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906180" version="1" comment="libwbclient0-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906181" version="1" comment="samba is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906182" version="1" comment="samba-ceph is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906183" version="1" comment="samba-client is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906184" version="1" comment="samba-client-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906185" version="1" comment="samba-core-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906186" version="1" comment="samba-doc is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906187" version="1" comment="samba-libs is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906188" version="1" comment="samba-libs-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906189" version="1" comment="samba-pidl is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906190" version="1" comment="samba-python is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906191" version="1" comment="samba-test is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906192" version="1" comment="samba-winbind is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906193" version="1" comment="samba-winbind-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906194" version="1" comment="mercurial is &lt;4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906195" version="1" comment="mercurial-lang is &lt;4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906196" version="1" comment="MozillaFirefox is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906197" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906198" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906199" version="1" comment="MozillaFirefox-devel is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906200" version="1" comment="MozillaFirefox-translations-common is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906201" version="1" comment="MozillaFirefox-translations-other is &lt;50.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906202" version="1" comment="log4net is &lt;1.2.10-75.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906203" version="1" comment="otrs is &lt;3.3.16-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906204" version="1" comment="otrs-doc is &lt;3.3.16-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906205" version="1" comment="otrs-itsm is &lt;3.3.14-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906206" version="1" comment="ldb-tools is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906207" version="1" comment="libldb-devel is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906208" version="1" comment="libldb1 is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906209" version="1" comment="libldb1-32bit is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906210" version="1" comment="python-ldb is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906211" version="1" comment="python-ldb-32bit is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906212" version="1" comment="python-ldb-devel is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906213" version="1" comment="python3-ldb is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906214" version="1" comment="python3-ldb-32bit is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906215" version="1" comment="python3-ldb-devel is &lt;1.1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906216" version="1" comment="cups is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906217" version="1" comment="cups-client is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906218" version="1" comment="cups-ddk is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906219" version="1" comment="cups-devel is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906220" version="1" comment="cups-devel-32bit is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906221" version="1" comment="cups-libs is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906222" version="1" comment="cups-libs-32bit is &lt;2.1.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906223" version="1" comment="libgnomesu is &lt;2.0.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906224" version="1" comment="libgnomesu-devel is &lt;2.0.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906225" version="1" comment="libgnomesu-lang is &lt;2.0.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906226" version="1" comment="libgnomesu0 is &lt;2.0.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906227" version="1" comment="expat is &lt;2.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906228" version="1" comment="libexpat-devel is &lt;2.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906229" version="1" comment="libexpat-devel-32bit is &lt;2.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906230" version="1" comment="libexpat1 is &lt;2.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906231" version="1" comment="libexpat1-32bit is &lt;2.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906232" version="1" comment="grub2 is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906233" version="1" comment="grub2-branding-upstream is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906234" version="1" comment="grub2-i386-efi is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906235" version="1" comment="grub2-i386-pc is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906236" version="1" comment="grub2-i386-xen is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906237" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906238" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906239" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906240" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906241" version="1" comment="telepathy-gabble is &lt;0.18.3-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906242" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.18.3-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906243" version="1" comment="mumble is &lt;1.2.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906244" version="1" comment="mumble-32bit is &lt;1.2.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906245" version="1" comment="mumble-server is &lt;1.2.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906246" version="1" comment="kscreenlocker is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906247" version="1" comment="kscreenlocker-devel is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906248" version="1" comment="kscreenlocker-lang is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906249" version="1" comment="libKScreenLocker5 is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906250" version="1" comment="id3lib is &lt;3.8.3-266.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906251" version="1" comment="id3lib-32bit is &lt;3.8.3-266.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906252" version="1" comment="id3lib-devel is &lt;3.8.3-266.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906253" version="1" comment="id3lib-examples is &lt;3.8.3-266.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906254" version="1" comment="hplip is &lt;3.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906255" version="1" comment="hplip-devel is &lt;3.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906256" version="1" comment="hplip-hpijs is &lt;3.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906257" version="1" comment="hplip-sane is &lt;3.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906258" version="1" comment="cacti is &lt;0.8.8h-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906259" version="1" comment="cacti-doc is &lt;0.8.8h-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906260" version="1" comment="libgssglue-devel is &lt;0.4-5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906261" version="1" comment="libgssglue1 is &lt;0.4-5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906262" version="1" comment="libgssglue1-32bit is &lt;0.4-5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906263" version="1" comment="a2ps is &lt;4.14-6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906264" version="1" comment="a2ps-devel is &lt;4.14-6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906265" version="1" comment="libtag-devel is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906266" version="1" comment="libtag1 is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906267" version="1" comment="libtag1-32bit is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906268" version="1" comment="libtag_c0 is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906269" version="1" comment="libtag_c0-32bit is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906270" version="1" comment="taglib is &lt;1.11-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906271" version="1" comment="libmbedcrypto0 is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906272" version="1" comment="libmbedcrypto0-32bit is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906273" version="1" comment="libmbedtls10 is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906274" version="1" comment="libmbedtls10-32bit is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906275" version="1" comment="libmbedx509-0 is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906276" version="1" comment="libmbedx509-0-32bit is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906277" version="1" comment="mbedtls-devel is &lt;2.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906278" version="1" comment="remind is &lt;3.1.15-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906279" version="1" comment="libruby2_3-2_3 is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906280" version="1" comment="ruby2.3 is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906281" version="1" comment="ruby2.3-devel is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906282" version="1" comment="ruby2.3-devel-extra is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906283" version="1" comment="ruby2.3-doc is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906284" version="1" comment="ruby2.3-doc-ri is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906285" version="1" comment="ruby2.3-stdlib is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906286" version="1" comment="ruby2.3-tk is &lt;2.3.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906287" version="1" comment="shim is &lt;0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906288" version="1" comment="derby is &lt;10.11.1.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906289" version="1" comment="derby-javadoc is &lt;10.11.1.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906290" version="1" comment="conky is &lt;1.10.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906291" version="1" comment="conky-doc is &lt;1.10.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906292" version="1" comment="nano-plugin-conky is &lt;1.10.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906293" version="1" comment="vim-plugin-conky is &lt;1.10.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906294" version="1" comment="aaa_base is &lt;13.2+git20160915.106a00d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906295" version="1" comment="aaa_base-extras is &lt;13.2+git20160915.106a00d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906296" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20160915.106a00d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906297" version="1" comment="percona-toolkit is &lt;2.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906298" version="1" comment="jhead is &lt;3.00-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906299" version="1" comment="logwatch is &lt;7.4.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906300" version="1" comment="python-pip is &lt;8.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906301" version="1" comment="python3-pip is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906302" version="1" comment="git is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906303" version="1" comment="git-arch is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906304" version="1" comment="git-core is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906305" version="1" comment="git-credential-gnome-keyring is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906306" version="1" comment="git-cvs is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906307" version="1" comment="git-daemon is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906308" version="1" comment="git-doc is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906309" version="1" comment="git-email is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906310" version="1" comment="git-gui is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906311" version="1" comment="git-svn is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906312" version="1" comment="git-web is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906313" version="1" comment="gitk is &lt;2.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906314" version="1" comment="python3 is &lt;3.5.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906315" version="1" comment="python3-32bit is &lt;3.5.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906316" version="1" comment="python3-curses is &lt;3.5.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906317" version="1" comment="python3-dbm is &lt;3.5.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906318" version="1" comment="python3-tk is &lt;3.5.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906319" version="1" comment="pcsc-ccid is &lt;1.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906320" version="1" comment="gpg2 is &lt;2.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906321" version="1" comment="gpg2-lang is &lt;2.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906322" version="1" comment="colord is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906323" version="1" comment="colord-gtk is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906324" version="1" comment="colord-gtk-lang is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906325" version="1" comment="colord-lang is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906326" version="1" comment="libcolord-devel is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906327" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906328" version="1" comment="libcolord-gtk1 is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906329" version="1" comment="libcolord-gtk1-32bit is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906330" version="1" comment="libcolord2 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906331" version="1" comment="libcolord2-32bit is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906332" version="1" comment="libcolorhug2 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906333" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906334" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906335" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906336" version="1" comment="znc is &lt;1.6.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906337" version="1" comment="znc-devel is &lt;1.6.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906338" version="1" comment="znc-perl is &lt;1.6.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906339" version="1" comment="znc-python3 is &lt;1.6.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906340" version="1" comment="znc-tcl is &lt;1.6.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906341" version="1" comment="gnutls is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906342" version="1" comment="gnutls-guile is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906343" version="1" comment="libgnutls-dane-devel is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906344" version="1" comment="libgnutls-dane0 is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906345" version="1" comment="libgnutls-devel is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906346" version="1" comment="libgnutls-devel-32bit is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906347" version="1" comment="libgnutls-openssl-devel is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906348" version="1" comment="libgnutls-openssl27 is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906349" version="1" comment="libgnutls30 is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906350" version="1" comment="libgnutls30-32bit is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906351" version="1" comment="libgnutlsxx-devel is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906352" version="1" comment="libgnutlsxx28 is &lt;3.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906353" version="1" comment="bash is &lt;4.4-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906354" version="1" comment="bash-devel is &lt;4.4-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906355" version="1" comment="bash-doc is &lt;4.4-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906356" version="1" comment="bash-lang is &lt;4.4-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906357" version="1" comment="bash-loadables is &lt;4.4-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906358" version="1" comment="libreadline7 is &lt;7.0-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906359" version="1" comment="libreadline7-32bit is &lt;7.0-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906360" version="1" comment="readline-devel is &lt;7.0-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906361" version="1" comment="readline-devel-32bit is &lt;7.0-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906362" version="1" comment="readline-doc is &lt;7.0-92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906363" version="1" comment="gummi is &lt;0.7.4.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906364" version="1" comment="gummi-lang is &lt;0.7.4.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906365" version="1" comment="obs-service-set_version is &lt;0.5.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906366" version="1" comment="libmms-devel is &lt;0.6.4-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906367" version="1" comment="libmms0 is &lt;0.6.4-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906368" version="1" comment="libmms0-32bit is &lt;0.6.4-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906369" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906370" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906371" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906372" version="1" comment="crash is &lt;7.1.5-3.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906373" version="1" comment="crash-devel is &lt;7.1.5-3.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906374" version="1" comment="crash-doc is &lt;7.1.5-3.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906375" version="1" comment="crash-eppic is &lt;7.1.5-3.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906376" version="1" comment="crash-gcore is &lt;7.1.5-3.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906377" version="1" comment="crash-kmp-default is &lt;7.1.5_k4.8.13_1-3.51 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906378" version="1" comment="crash-kmp-pae is &lt;7.1.5_k4.8.13_1-3.51 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906379" version="1" comment="systemd-ui is &lt;3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906380" version="1" comment="libzip-devel is &lt;1.1.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906381" version="1" comment="libzip-tools is &lt;1.1.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906382" version="1" comment="libzip4 is &lt;1.1.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906383" version="1" comment="libzip4-32bit is &lt;1.1.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906384" version="1" comment="haproxy is &lt;1.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906385" version="1" comment="ruby2.2-rubygem-rack-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906386" version="1" comment="ruby2.2-rubygem-rack-doc-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906387" version="1" comment="ruby2.2-rubygem-rack-testsuite-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906388" version="1" comment="ruby2.3-rubygem-rack-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906389" version="1" comment="ruby2.3-rubygem-rack-doc-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906390" version="1" comment="ruby2.3-rubygem-rack-testsuite-1_4 is &lt;1.4.7-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906391" version="1" comment="libvarnishapi1 is &lt;5.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906392" version="1" comment="varnish is &lt;5.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906393" version="1" comment="varnish-devel is &lt;5.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906394" version="1" comment="libXinerama-devel is &lt;1.1.3-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906395" version="1" comment="libXinerama-devel-32bit is &lt;1.1.3-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906396" version="1" comment="libXinerama1 is &lt;1.1.3-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906397" version="1" comment="libXinerama1-32bit is &lt;1.1.3-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906398" version="1" comment="ecryptfs-utils is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906399" version="1" comment="ecryptfs-utils-32bit is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906400" version="1" comment="ecryptfs-utils-devel is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906401" version="1" comment="ecryptfs-utils-devel-32bit is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906402" version="1" comment="libecryptfs1 is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906403" version="1" comment="libecryptfs1-32bit is &lt;108-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906404" version="1" comment="quassel-base is &lt;0.12.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906405" version="1" comment="quassel-client is &lt;0.12.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906406" version="1" comment="quassel-client-qt5 is &lt;0.12.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906407" version="1" comment="quassel-core is &lt;0.12.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906408" version="1" comment="quassel-mono is &lt;0.12.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906409" version="1" comment="xtrabackup is &lt;2.3.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906410" version="1" comment="xtrabackup-test is &lt;2.3.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906411" version="1" comment="libunbound-devel-mini is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906412" version="1" comment="libunbound2 is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906413" version="1" comment="unbound is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906414" version="1" comment="unbound-anchor is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906415" version="1" comment="unbound-devel is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906416" version="1" comment="unbound-munin is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906417" version="1" comment="unbound-python is &lt;1.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906418" version="1" comment="rpcbind is &lt;0.2.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906419" version="1" comment="iputils is &lt;s20160308-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906420" version="1" comment="python-dulwich is &lt;0.12.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906421" version="1" comment="python-requests is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906422" version="1" comment="libksba-devel is &lt;1.3.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906423" version="1" comment="libksba8 is &lt;1.3.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906424" version="1" comment="bsdtar is &lt;3.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906425" version="1" comment="libarchive-devel is &lt;3.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906426" version="1" comment="libarchive13 is &lt;3.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906427" version="1" comment="libarchive13-32bit is &lt;3.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906428" version="1" comment="kernel-debug is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906429" version="1" comment="kernel-debug-base is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906431" version="1" comment="kernel-default is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906432" version="1" comment="kernel-default-base is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906435" version="1" comment="kernel-docs is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906436" version="1" comment="kernel-docs-html is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906437" version="1" comment="kernel-docs-pdf is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906438" version="1" comment="kernel-macros is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906439" version="1" comment="kernel-obs-build is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906440" version="1" comment="kernel-obs-qa is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906441" version="1" comment="kernel-pae is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906442" version="1" comment="kernel-pae-base is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906444" version="1" comment="kernel-source is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906445" version="1" comment="kernel-source-vanilla is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906446" version="1" comment="kernel-syms is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906447" version="1" comment="kernel-syzkaller is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906448" version="1" comment="kernel-syzkaller-base is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906450" version="1" comment="kernel-vanilla is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906451" version="1" comment="kernel-vanilla-base is &lt;4.8.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906453" version="1" comment="python-Jinja2 is &lt;2.8-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906454" version="1" comment="python-Jinja2-emacs is &lt;2.8-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906455" version="1" comment="python-Jinja2-vim is &lt;2.8-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906456" version="1" comment="flac is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906457" version="1" comment="flac-devel is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906458" version="1" comment="flac-devel-32bit is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906459" version="1" comment="flac-doc is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906460" version="1" comment="libFLAC++6 is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906461" version="1" comment="libFLAC++6-32bit is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906462" version="1" comment="libFLAC8 is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906463" version="1" comment="libFLAC8-32bit is &lt;1.3.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906464" version="1" comment="libXrender-devel is &lt;0.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906465" version="1" comment="libXrender-devel-32bit is &lt;0.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906466" version="1" comment="libXrender1 is &lt;0.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906467" version="1" comment="libXrender1-32bit is &lt;0.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906468" version="1" comment="bzip2 is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906469" version="1" comment="bzip2-doc is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906470" version="1" comment="libbz2-1 is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906471" version="1" comment="libbz2-1-32bit is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906472" version="1" comment="libbz2-devel is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906473" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-37.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906474" version="1" comment="osc is &lt;0.155.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906475" version="1" comment="xlockmore is &lt;5.45-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906476" version="1" comment="sddm is &lt;0.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906477" version="1" comment="sddm-branding-openSUSE is &lt;0.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906478" version="1" comment="sddm-branding-upstream is &lt;0.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906479" version="1" comment="pdns is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906480" version="1" comment="pdns-backend-geoip is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906481" version="1" comment="pdns-backend-godbc is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906482" version="1" comment="pdns-backend-ldap is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906483" version="1" comment="pdns-backend-lua is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906484" version="1" comment="pdns-backend-mydns is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906485" version="1" comment="pdns-backend-mysql is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906486" version="1" comment="pdns-backend-postgresql is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906487" version="1" comment="pdns-backend-remote is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906488" version="1" comment="pdns-backend-sqlite3 is &lt;4.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906489" version="1" comment="cgit is &lt;1.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906490" version="1" comment="yast2-core is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906491" version="1" comment="yast2-core-debugger is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906492" version="1" comment="yast2-core-devel is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906493" version="1" comment="cron is &lt;4.2-65.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906494" version="1" comment="cronie is &lt;1.5.0-65.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906495" version="1" comment="cronie-anacron is &lt;1.5.0-65.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906496" version="1" comment="optipng is &lt;0.7.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906497" version="1" comment="enigmail is &lt;1.9.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906498" version="1" comment="gnugk is &lt;4.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906499" version="1" comment="cpio is &lt;2.12-3.90 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906500" version="1" comment="cpio-lang is &lt;2.12-3.90 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906501" version="1" comment="python-suds-jurko is &lt;0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906502" version="1" comment="iperf is &lt;3.1.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009096127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906503" version="1" comment="iperf-devel is &lt;3.1.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009096127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906504" version="1" comment="libiperf0 is &lt;3.1.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009096127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906505" version="1" comment="perl-Config-IniFiles is &lt;2.94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906506" version="1" comment="libcares-devel is &lt;1.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906507" version="1" comment="libcares2 is &lt;1.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906508" version="1" comment="libcares2-32bit is &lt;1.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906509" version="1" comment="libsndfile-devel is &lt;1.0.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906510" version="1" comment="libsndfile1 is &lt;1.0.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906511" version="1" comment="libsndfile1-32bit is &lt;1.0.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906512" version="1" comment="yast2-users is &lt;3.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906513" version="1" comment="openvswitch is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906514" version="1" comment="openvswitch-devel is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906515" version="1" comment="openvswitch-dpdk is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906516" version="1" comment="openvswitch-dpdk-devel is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906517" version="1" comment="openvswitch-dpdk-ovn is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906518" version="1" comment="openvswitch-dpdk-pki is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906519" version="1" comment="openvswitch-dpdk-switch is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906520" version="1" comment="openvswitch-dpdk-test is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906521" version="1" comment="openvswitch-dpdk-vtep is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906522" version="1" comment="openvswitch-ovn is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906523" version="1" comment="openvswitch-pki is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906524" version="1" comment="openvswitch-switch is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906525" version="1" comment="openvswitch-test is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906526" version="1" comment="openvswitch-vtep is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906527" version="1" comment="python-openvswitch is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906528" version="1" comment="python-openvswitch-test is &lt;2.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906529" version="1" comment="xzgv is &lt;0.9.1-27.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906530" version="1" comment="NetworkManager is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906531" version="1" comment="NetworkManager-branding-upstream is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906532" version="1" comment="NetworkManager-devel is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906533" version="1" comment="NetworkManager-devel-32bit is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906534" version="1" comment="NetworkManager-lang is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906535" version="1" comment="libnm-glib-vpn1 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906536" version="1" comment="libnm-glib-vpn1-32bit is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906537" version="1" comment="libnm-glib4 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906538" version="1" comment="libnm-glib4-32bit is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906539" version="1" comment="libnm-util2 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906540" version="1" comment="libnm-util2-32bit is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906541" version="1" comment="libnm0 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906542" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906543" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906544" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906545" version="1" comment="libmysqlclient-devel is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906546" version="1" comment="libmysqlclient18 is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906547" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906548" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906549" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906550" version="1" comment="libmysqld-devel is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906551" version="1" comment="libmysqld18 is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906552" version="1" comment="mariadb is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906553" version="1" comment="mariadb-bench is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906554" version="1" comment="mariadb-client is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906555" version="1" comment="mariadb-errormessages is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906556" version="1" comment="mariadb-test is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906557" version="1" comment="mariadb-tools is &lt;10.0.22-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906558" version="1" comment="glibc is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906559" version="1" comment="glibc-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906560" version="1" comment="glibc-devel is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906561" version="1" comment="glibc-devel-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906562" version="1" comment="glibc-devel-static is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906563" version="1" comment="glibc-devel-static-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906564" version="1" comment="glibc-extra is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906565" version="1" comment="glibc-html is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906566" version="1" comment="glibc-i18ndata is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906567" version="1" comment="glibc-info is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906568" version="1" comment="glibc-locale is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906569" version="1" comment="glibc-locale-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906570" version="1" comment="glibc-obsolete is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906571" version="1" comment="glibc-profile is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906572" version="1" comment="glibc-profile-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906573" version="1" comment="glibc-utils is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906574" version="1" comment="glibc-utils-32bit is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906575" version="1" comment="nscd is &lt;2.24-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906576" version="1" comment="klogd is &lt;1.4.1-786.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906577" version="1" comment="syslog-service is &lt;2.0-786.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906578" version="1" comment="syslogd is &lt;1.4.1-786.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906579" version="1" comment="libraw-devel is &lt;0.17.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906580" version="1" comment="libraw-devel-static is &lt;0.17.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906581" version="1" comment="libraw-tools is &lt;0.17.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906582" version="1" comment="libraw15 is &lt;0.17.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906583" version="1" comment="389-ds is &lt;1.3.4.14-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906584" version="1" comment="389-ds-devel is &lt;1.3.4.14-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906585" version="1" comment="dovecot22 is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906586" version="1" comment="dovecot22-backend-mysql is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906587" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906588" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906589" version="1" comment="dovecot22-devel is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906590" version="1" comment="dovecot22-fts is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906591" version="1" comment="dovecot22-fts-lucene is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906592" version="1" comment="dovecot22-fts-solr is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906593" version="1" comment="dovecot22-fts-squat is &lt;2.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906594" version="1" comment="telepathy-idle is &lt;0.2.0-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906595" version="1" comment="libIlmImf-2_2-22 is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906596" version="1" comment="libIlmImf-2_2-22-32bit is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906597" version="1" comment="libIlmImfUtil-2_2-22 is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906598" version="1" comment="libIlmImfUtil-2_2-22-32bit is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906599" version="1" comment="openexr is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906600" version="1" comment="openexr-devel is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906601" version="1" comment="openexr-doc is &lt;2.2.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906602" version="1" comment="apache2-mod_perl is &lt;2.0.9-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906603" version="1" comment="apache2-mod_perl-devel is &lt;2.0.9-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906604" version="1" comment="python3-Twisted is &lt;16.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906605" version="1" comment="python3-Twisted-doc is &lt;16.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906606" version="1" comment="lua-rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906607" version="1" comment="perl-rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906608" version="1" comment="python-rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906609" version="1" comment="rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906610" version="1" comment="rrdtool-cached is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906611" version="1" comment="rrdtool-devel is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906612" version="1" comment="rrdtool-doc is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906613" version="1" comment="ruby-rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906614" version="1" comment="tcl-rrdtool is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906615" version="1" comment="libnghttp2-14 is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906616" version="1" comment="libnghttp2-14-32bit is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906617" version="1" comment="libnghttp2-devel is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906618" version="1" comment="libnghttp2_asio-devel is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906619" version="1" comment="libnghttp2_asio1 is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906620" version="1" comment="libnghttp2_asio1-32bit is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906621" version="1" comment="nghttp2 is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906622" version="1" comment="nghttp2-doc is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906623" version="1" comment="python-nghttp2 is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906624" version="1" comment="libpcp-devel is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906625" version="1" comment="libpcp3 is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906626" version="1" comment="pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906627" version="1" comment="pcp-conf is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906628" version="1" comment="pcp-doc is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906629" version="1" comment="pcp-gui is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906630" version="1" comment="pcp-import-collectl2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906631" version="1" comment="pcp-import-ganglia2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906632" version="1" comment="pcp-import-iostat2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906633" version="1" comment="pcp-import-mrtg2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906634" version="1" comment="pcp-import-sar2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906635" version="1" comment="pcp-import-sheet2pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906636" version="1" comment="pcp-manager is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906637" version="1" comment="pcp-pmda-infiniband is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906638" version="1" comment="pcp-testsuite is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906639" version="1" comment="pcp-webapi is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906640" version="1" comment="pcp-webjs is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906641" version="1" comment="perl-PCP-LogImport is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906642" version="1" comment="perl-PCP-LogSummary is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906643" version="1" comment="perl-PCP-MMV is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906644" version="1" comment="perl-PCP-PMDA is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906645" version="1" comment="python-pcp is &lt;3.10.4-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906646" version="1" comment="net6 is &lt;1.3.14-12.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906647" version="1" comment="net6-devel is &lt;1.3.14-12.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906648" version="1" comment="net6-lang is &lt;1.3.14-12.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906649" version="1" comment="apache-commons-daemon is &lt;1.0.15-7.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906650" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-7.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906651" version="1" comment="apache-commons-daemon-jsvc is &lt;1.0.15-7.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906652" version="1" comment="libltdl7 is &lt;2.4.6-4.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906653" version="1" comment="libltdl7-32bit is &lt;2.4.6-4.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906654" version="1" comment="libtool is &lt;2.4.6-4.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906655" version="1" comment="libtool-32bit is &lt;2.4.6-4.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906656" version="1" comment="xorg-x11-devel is &lt;7.6-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906657" version="1" comment="xorg-x11-libs is &lt;7.6-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906658" version="1" comment="eog is &lt;3.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906659" version="1" comment="eog-devel is &lt;3.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906660" version="1" comment="eog-lang is &lt;3.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906661" version="1" comment="chromedriver is &lt;55.0.2883.75-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906662" version="1" comment="chromium is &lt;55.0.2883.75-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906663" version="1" comment="ft2demos is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906664" version="1" comment="libxmp-devel is &lt;4.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906665" version="1" comment="libxmp4 is &lt;4.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906666" version="1" comment="openssh is &lt;7.2p2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906667" version="1" comment="openssh-cavs is &lt;7.2p2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906668" version="1" comment="openssh-fips is &lt;7.2p2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906669" version="1" comment="openssh-helpers is &lt;7.2p2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906670" version="1" comment="viewvc is &lt;1.1.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906671" version="1" comment="libXcursor-devel is &lt;1.1.14-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906672" version="1" comment="libXcursor-devel-32bit is &lt;1.1.14-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906673" version="1" comment="libXcursor1 is &lt;1.1.14-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906674" version="1" comment="libXcursor1-32bit is &lt;1.1.14-6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906675" version="1" comment="perl-Module-Metadata is &lt;1.000033-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906676" version="1" comment="libraptor-devel is &lt;2.0.15-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906677" version="1" comment="libraptor2-0 is &lt;2.0.15-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906678" version="1" comment="libraptor2-0-32bit is &lt;2.0.15-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906679" version="1" comment="raptor is &lt;2.0.15-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906680" version="1" comment="mupdf is &lt;1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906681" version="1" comment="mupdf-devel-static is &lt;1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906682" version="1" comment="libqt4 is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906683" version="1" comment="libqt4-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906684" version="1" comment="libqt4-devel is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906685" version="1" comment="libqt4-devel-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906686" version="1" comment="libqt4-devel-doc is &lt;4.8.7-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906687" version="1" comment="libqt4-devel-doc-data is &lt;4.8.7-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906688" version="1" comment="libqt4-linguist is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906689" version="1" comment="libqt4-private-headers-devel is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906690" version="1" comment="libqt4-qt3support is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906691" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906692" version="1" comment="libqt4-sql is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906693" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906694" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906695" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906696" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906697" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906698" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906699" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906700" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906701" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906702" version="1" comment="libqt4-x11 is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906703" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906704" version="1" comment="qt4-x11-tools is &lt;4.8.7-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906705" version="1" comment="ntp is &lt;4.2.8p9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906706" version="1" comment="ntp-doc is &lt;4.2.8p9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906707" version="1" comment="icinga is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906708" version="1" comment="icinga-devel is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906709" version="1" comment="icinga-doc is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906710" version="1" comment="icinga-idoutils is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906711" version="1" comment="icinga-idoutils-mysql is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906712" version="1" comment="icinga-idoutils-oracle is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906713" version="1" comment="icinga-idoutils-pgsql is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906714" version="1" comment="icinga-plugins-downtimes is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906715" version="1" comment="icinga-plugins-eventhandlers is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906716" version="1" comment="icinga-www is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906717" version="1" comment="icinga-www-config is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906718" version="1" comment="monitoring-tools is &lt;1.13.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906719" version="1" comment="less is &lt;481-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906720" version="1" comment="libpng12-0 is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906721" version="1" comment="libpng12-0-32bit is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906722" version="1" comment="libpng12-compat-devel is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906723" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906724" version="1" comment="libpng12-devel is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906725" version="1" comment="libpng12-devel-32bit is &lt;1.2.56-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906726" version="1" comment="libxslt-devel is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906727" version="1" comment="libxslt-devel-32bit is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906728" version="1" comment="libxslt-python is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906729" version="1" comment="libxslt-tools is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906730" version="1" comment="libxslt1 is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906731" version="1" comment="libxslt1-32bit is &lt;1.1.29-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906732" version="1" comment="perl-DBD-mysql is &lt;4.041-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906733" version="1" comment="thttpd is &lt;2.26-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906734" version="1" comment="ruby2.2-rubygem-extlib is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906735" version="1" comment="ruby2.2-rubygem-extlib-doc is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906736" version="1" comment="ruby2.2-rubygem-extlib-testsuite is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906737" version="1" comment="ruby2.3-rubygem-extlib is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906738" version="1" comment="ruby2.3-rubygem-extlib-doc is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906739" version="1" comment="ruby2.3-rubygem-extlib-testsuite is &lt;0.9.16-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906740" version="1" comment="ruby2.2-rubygem-rails-html-sanitizer is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906741" version="1" comment="ruby2.2-rubygem-rails-html-sanitizer-doc is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906742" version="1" comment="ruby2.2-rubygem-rails-html-sanitizer-testsuite is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906743" version="1" comment="ruby2.3-rubygem-rails-html-sanitizer is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906744" version="1" comment="ruby2.3-rubygem-rails-html-sanitizer-doc is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906745" version="1" comment="ruby2.3-rubygem-rails-html-sanitizer-testsuite is &lt;1.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906746" version="1" comment="libssh2-1 is &lt;1.7.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906747" version="1" comment="libssh2-1-32bit is &lt;1.7.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906748" version="1" comment="libssh2-devel is &lt;1.7.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906749" version="1" comment="horde5-imp is &lt;6.2.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906750" version="1" comment="libxml2-2 is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906751" version="1" comment="libxml2-2-32bit is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906752" version="1" comment="libxml2-devel is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906753" version="1" comment="libxml2-devel-32bit is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906754" version="1" comment="libxml2-doc is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906755" version="1" comment="libxml2-tools is &lt;2.9.4-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906756" version="1" comment="python-doc is &lt;2.7.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906757" version="1" comment="python-doc-pdf is &lt;2.7.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906758" version="1" comment="fetchmail is &lt;6.3.26-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906759" version="1" comment="fetchmailconf is &lt;6.3.26-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906760" version="1" comment="dnsmasq is &lt;2.76-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906761" version="1" comment="dnsmasq-utils is &lt;2.76-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906762" version="1" comment="xen is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906763" version="1" comment="xen-devel is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906764" version="1" comment="xen-doc-html is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906765" version="1" comment="xen-libs is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906766" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906767" version="1" comment="xen-tools is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906768" version="1" comment="xen-tools-domU is &lt;4.7.0_12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906769" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906770" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906771" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906772" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906773" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906774" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906775" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906776" version="1" comment="mutt is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906777" version="1" comment="wireshark is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906778" version="1" comment="wireshark-devel is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906779" version="1" comment="wireshark-ui-gtk is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906780" version="1" comment="wireshark-ui-qt is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906781" version="1" comment="libmysql56client18 is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906782" version="1" comment="libmysql56client18-32bit is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906783" version="1" comment="libmysql56client_r18 is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906784" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906785" version="1" comment="mysql-community-server is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906786" version="1" comment="mysql-community-server-bench is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906787" version="1" comment="mysql-community-server-client is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906788" version="1" comment="mysql-community-server-errormessages is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906789" version="1" comment="mysql-community-server-test is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906790" version="1" comment="mysql-community-server-tools is &lt;5.6.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906791" version="1" comment="squashfs is &lt;4.3-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906792" version="1" comment="libpotrace0 is &lt;1.13-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906793" version="1" comment="potrace is &lt;1.13-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906794" version="1" comment="potrace-devel is &lt;1.13-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906795" version="1" comment="exiv2 is &lt;0.25-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906796" version="1" comment="exiv2-lang is &lt;0.25-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906797" version="1" comment="libexiv2-14 is &lt;0.25-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906798" version="1" comment="libexiv2-14-32bit is &lt;0.25-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906799" version="1" comment="libexiv2-devel is &lt;0.25-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906800" version="1" comment="libsnmp30 is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906801" version="1" comment="libsnmp30-32bit is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906802" version="1" comment="net-snmp is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906803" version="1" comment="net-snmp-devel is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906804" version="1" comment="net-snmp-devel-32bit is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906805" version="1" comment="net-snmp-python is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906806" version="1" comment="perl-SNMP is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906807" version="1" comment="snmp-mibs is &lt;5.7.3-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906808" version="1" comment="firewall-applet is &lt;0.4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906809" version="1" comment="firewall-config is &lt;0.4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906810" version="1" comment="firewalld is &lt;0.4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906811" version="1" comment="firewalld-lang is &lt;0.4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906812" version="1" comment="python-bjoern is &lt;1.4.2-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906813" version="1" comment="ruby2.2-rubygem-railties-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906814" version="1" comment="ruby2.2-rubygem-railties-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906815" version="1" comment="ruby2.2-rubygem-railties-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906816" version="1" comment="ruby2.2-rubygem-railties-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906817" version="1" comment="ruby2.3-rubygem-railties-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906818" version="1" comment="ruby2.3-rubygem-railties-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906819" version="1" comment="ruby2.3-rubygem-railties-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906820" version="1" comment="ruby2.3-rubygem-railties-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906821" version="1" comment="apache-pdfbox is &lt;1.8.12-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906822" version="1" comment="apache-pdfbox-javadoc is &lt;1.8.12-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906823" version="1" comment="libvirt is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906824" version="1" comment="libvirt-admin is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906825" version="1" comment="libvirt-client is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906826" version="1" comment="libvirt-daemon is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906827" version="1" comment="libvirt-daemon-config-network is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906828" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906829" version="1" comment="libvirt-daemon-driver-interface is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906830" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906831" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906832" version="1" comment="libvirt-daemon-driver-network is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906833" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906834" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906835" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906836" version="1" comment="libvirt-daemon-driver-secret is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906837" version="1" comment="libvirt-daemon-driver-storage is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906838" version="1" comment="libvirt-daemon-driver-uml is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906839" version="1" comment="libvirt-daemon-driver-vbox is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906840" version="1" comment="libvirt-daemon-lxc is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906841" version="1" comment="libvirt-daemon-qemu is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906842" version="1" comment="libvirt-daemon-uml is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906843" version="1" comment="libvirt-daemon-vbox is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906844" version="1" comment="libvirt-daemon-xen is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906845" version="1" comment="libvirt-devel is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906846" version="1" comment="libvirt-devel-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906847" version="1" comment="libvirt-doc is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906848" version="1" comment="libvirt-libs is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906849" version="1" comment="libvirt-lock-sanlock is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906850" version="1" comment="libvirt-nss is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906851" version="1" comment="libtidy-devel is &lt;5.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906852" version="1" comment="libtidy5 is &lt;5.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906853" version="1" comment="tidy is &lt;5.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906854" version="1" comment="tidy-doc is &lt;5.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906855" version="1" comment="openvpn is &lt;2.3.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906856" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906857" version="1" comment="openvpn-devel is &lt;2.3.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906858" version="1" comment="openvpn-down-root-plugin is &lt;2.3.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906859" version="1" comment="cups-pk-helper is &lt;0.2.6-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906860" version="1" comment="cups-pk-helper-lang is &lt;0.2.6-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906861" version="1" comment="ceph-deploy is &lt;1.5.34+git.1470736983.963ba71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906862" version="1" comment="python-pyOpenSSL is &lt;16.2.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906863" version="1" comment="python-pyOpenSSL-doc is &lt;16.2.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906864" version="1" comment="mailman is &lt;2.1.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906865" version="1" comment="xscreensaver is &lt;5.34-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906866" version="1" comment="xscreensaver-data is &lt;5.34-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906867" version="1" comment="xscreensaver-data-extra is &lt;5.34-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906868" version="1" comment="libqpid-proton-cpp6 is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906869" version="1" comment="libqpid-proton6 is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906870" version="1" comment="perl-qpid-proton is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906871" version="1" comment="python-qpid-proton is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906872" version="1" comment="python-qpid-proton-doc is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906873" version="1" comment="qpid-proton is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906874" version="1" comment="qpid-proton-devel is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906875" version="1" comment="qpid-proton-devel-doc is &lt;0.12.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906876" version="1" comment="seamonkey is &lt;2.40-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906877" version="1" comment="seamonkey-dom-inspector is &lt;2.40-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906878" version="1" comment="seamonkey-irc is &lt;2.40-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906879" version="1" comment="seamonkey-translations-common is &lt;2.40-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906880" version="1" comment="seamonkey-translations-other is &lt;2.40-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906881" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-257.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906882" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-257.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906883" version="1" comment="charybdis is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906884" version="1" comment="file is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906885" version="1" comment="file-devel is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906886" version="1" comment="file-devel-32bit is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906887" version="1" comment="file-magic is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906888" version="1" comment="libmagic1 is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906889" version="1" comment="libmagic1-32bit is &lt;5.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906890" version="1" comment="ocaml is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906891" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906892" version="1" comment="ocaml-compiler-libs-devel is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906893" version="1" comment="ocaml-docs is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906894" version="1" comment="ocaml-emacs is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906895" version="1" comment="ocaml-ocamldoc is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906896" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906897" version="1" comment="ocaml-runtime is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906898" version="1" comment="ocaml-source is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906899" version="1" comment="ocaml-x11 is &lt;4.03.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906900" version="1" comment="python-pyramid is &lt;1.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906901" version="1" comment="python-pyramid-doc is &lt;1.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906902" version="1" comment="libvdpau-devel is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906903" version="1" comment="libvdpau-devel-32bit is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906904" version="1" comment="libvdpau1 is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906905" version="1" comment="libvdpau1-32bit is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906906" version="1" comment="libvdpau_trace1 is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906907" version="1" comment="libvdpau_trace1-32bit is &lt;1.1.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906908" version="1" comment="dracut is &lt;044-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906909" version="1" comment="dracut-fips is &lt;044-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906910" version="1" comment="dracut-tools is &lt;044-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906911" version="1" comment="python-pymongo is &lt;3.1.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906912" version="1" comment="python3-pymongo is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906913" version="1" comment="libopenjpeg1 is &lt;1.5.2-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906914" version="1" comment="libopenjpeg1-32bit is &lt;1.5.2-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906915" version="1" comment="openjpeg is &lt;1.5.2-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906916" version="1" comment="openjpeg-devel is &lt;1.5.2-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906917" version="1" comment="openjpeg-devel-32bit is &lt;1.5.2-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906918" version="1" comment="python-libxml2 is &lt;2.9.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906919" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906920" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906921" version="1" comment="librsvg-2-2 is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906922" version="1" comment="librsvg-2-2-32bit is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906923" version="1" comment="librsvg-devel is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906924" version="1" comment="rsvg-view is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906925" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.16-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906926" version="1" comment="MozillaThunderbird is &lt;45.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906927" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906928" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906929" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906930" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906931" version="1" comment="logrotate is &lt;3.10.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906932" version="1" comment="perl-PAR is &lt;1.011-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906933" version="1" comment="qemu is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906934" version="1" comment="qemu-arm is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906935" version="1" comment="qemu-block-curl is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906936" version="1" comment="qemu-block-dmg is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906937" version="1" comment="qemu-block-gluster is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906938" version="1" comment="qemu-block-iscsi is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906939" version="1" comment="qemu-block-ssh is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906940" version="1" comment="qemu-extra is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906941" version="1" comment="qemu-guest-agent is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906942" version="1" comment="qemu-ipxe is &lt;1.0.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906943" version="1" comment="qemu-ksm is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906944" version="1" comment="qemu-kvm is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906945" version="1" comment="qemu-lang is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906946" version="1" comment="qemu-ppc is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906947" version="1" comment="qemu-s390 is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906948" version="1" comment="qemu-seabios is &lt;1.9.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906949" version="1" comment="qemu-sgabios is &lt;8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906950" version="1" comment="qemu-testsuite is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906951" version="1" comment="qemu-tools is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906952" version="1" comment="qemu-vgabios is &lt;1.9.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906953" version="1" comment="qemu-x86 is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906954" version="1" comment="gvim is &lt;8.0.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906955" version="1" comment="vim is &lt;8.0.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906956" version="1" comment="vim-data is &lt;8.0.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906957" version="1" comment="w3m is &lt;0.5.3.git20161120-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906958" version="1" comment="w3m-inline-image is &lt;0.5.3.git20161120-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906959" version="1" comment="libevent-2_0-5 is &lt;2.0.22-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906960" version="1" comment="libevent-2_0-5-32bit is &lt;2.0.22-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906961" version="1" comment="libevent-devel is &lt;2.0.22-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906962" version="1" comment="fence-agents is &lt;4.0.24+git.1480563949.e67fcd4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906963" version="1" comment="fence-agents-devel is &lt;4.0.24+git.1480563949.e67fcd4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906964" version="1" comment="konversation is &lt;1.6.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906965" version="1" comment="konversation-lang is &lt;1.6.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906966" version="1" comment="perl-LWP-Protocol-https is &lt;6.06-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906967" version="1" comment="exif is &lt;0.6.21-8.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906968" version="1" comment="libpulse-devel is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906969" version="1" comment="libpulse-devel-32bit is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906970" version="1" comment="libpulse-mainloop-glib0 is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906971" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906972" version="1" comment="libpulse0 is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906973" version="1" comment="libpulse0-32bit is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906974" version="1" comment="pulseaudio is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906975" version="1" comment="pulseaudio-bash-completion is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906976" version="1" comment="pulseaudio-esound-compat is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906977" version="1" comment="pulseaudio-gdm-hooks is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906978" version="1" comment="pulseaudio-lang is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906979" version="1" comment="pulseaudio-module-bluetooth is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906980" version="1" comment="pulseaudio-module-gconf is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906981" version="1" comment="pulseaudio-module-jack is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906982" version="1" comment="pulseaudio-module-lirc is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906983" version="1" comment="pulseaudio-module-x11 is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906984" version="1" comment="pulseaudio-module-zeroconf is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906985" version="1" comment="pulseaudio-system-wide is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906986" version="1" comment="pulseaudio-utils is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906987" version="1" comment="pulseaudio-utils-32bit is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906988" version="1" comment="pulseaudio-zsh-completion is &lt;9.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906989" version="1" comment="graphite2 is &lt;1.3.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906990" version="1" comment="graphite2-devel is &lt;1.3.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906991" version="1" comment="libgraphite2-3 is &lt;1.3.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906992" version="1" comment="libgraphite2-3-32bit is &lt;1.3.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906993" version="1" comment="ffmpeg is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906994" version="1" comment="ffmpeg2-devel is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906995" version="1" comment="libavcodec-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906996" version="1" comment="libavcodec56 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906997" version="1" comment="libavcodec56-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906998" version="1" comment="libavcodec57 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009906999" version="1" comment="libavcodec57-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907000" version="1" comment="libavdevice-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907001" version="1" comment="libavdevice56 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907002" version="1" comment="libavdevice56-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907003" version="1" comment="libavdevice57 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907004" version="1" comment="libavdevice57-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907005" version="1" comment="libavfilter-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907006" version="1" comment="libavfilter5 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907007" version="1" comment="libavfilter5-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907008" version="1" comment="libavfilter6 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907009" version="1" comment="libavfilter6-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907010" version="1" comment="libavformat-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907011" version="1" comment="libavformat56 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907012" version="1" comment="libavformat56-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907013" version="1" comment="libavformat57 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907014" version="1" comment="libavformat57-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907015" version="1" comment="libavresample-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907016" version="1" comment="libavresample2 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907017" version="1" comment="libavresample2-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907018" version="1" comment="libavresample3 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907019" version="1" comment="libavresample3-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907020" version="1" comment="libavutil-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907021" version="1" comment="libavutil54 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907022" version="1" comment="libavutil54-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907023" version="1" comment="libavutil55 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907024" version="1" comment="libavutil55-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907025" version="1" comment="libpostproc-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907026" version="1" comment="libpostproc53 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907027" version="1" comment="libpostproc53-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907028" version="1" comment="libpostproc54 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907029" version="1" comment="libpostproc54-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907030" version="1" comment="libswresample-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907031" version="1" comment="libswresample1 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907032" version="1" comment="libswresample1-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907033" version="1" comment="libswresample2 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907034" version="1" comment="libswresample2-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907035" version="1" comment="libswscale-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907036" version="1" comment="libswscale3 is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907037" version="1" comment="libswscale3-32bit is &lt;2.8.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907038" version="1" comment="libswscale4 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907039" version="1" comment="libswscale4-32bit is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907040" version="1" comment="accountsservice is &lt;0.6.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907041" version="1" comment="accountsservice-devel is &lt;0.6.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907042" version="1" comment="accountsservice-lang is &lt;0.6.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907043" version="1" comment="libaccountsservice0 is &lt;0.6.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907044" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907045" version="1" comment="kvirc is &lt;4.2.0-6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907046" version="1" comment="kvirc-devel is &lt;4.2.0-6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907047" version="1" comment="libpcsclite1 is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907048" version="1" comment="libpcsclite1-32bit is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907049" version="1" comment="libpcscspy0 is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907050" version="1" comment="libpcscspy0-32bit is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907051" version="1" comment="pcsc-lite is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907052" version="1" comment="pcsc-lite-devel is &lt;1.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907053" version="1" comment="nodejs4 is &lt;4.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907054" version="1" comment="nodejs4-devel is &lt;4.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907055" version="1" comment="nodejs4-docs is &lt;4.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907056" version="1" comment="npm4 is &lt;4.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907057" version="1" comment="grep is &lt;2.27-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907058" version="1" comment="libgit2-24 is &lt;0.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907059" version="1" comment="libgit2-24-32bit is &lt;0.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907060" version="1" comment="libgit2-devel is &lt;0.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907061" version="1" comment="libXRes1 is &lt;1.0.7-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907062" version="1" comment="libXRes1-32bit is &lt;1.0.7-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907063" version="1" comment="libXres-devel is &lt;1.0.7-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907064" version="1" comment="libXres-devel-32bit is &lt;1.0.7-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907065" version="1" comment="tcpreplay is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907066" version="1" comment="audit-devel is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907067" version="1" comment="audit-devel-32bit is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907068" version="1" comment="libaudit1 is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907069" version="1" comment="libaudit1-32bit is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907070" version="1" comment="libauparse0 is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907071" version="1" comment="libauparse0-32bit is &lt;2.5-1.82 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907072" version="1" comment="dpkg is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907073" version="1" comment="dpkg-devel is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907074" version="1" comment="dpkg-lang is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907075" version="1" comment="update-alternatives is &lt;1.18.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907076" version="1" comment="gcab is &lt;0.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907077" version="1" comment="gcab-devel is &lt;0.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907078" version="1" comment="gcab-lang is &lt;0.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907079" version="1" comment="libgcab-1_0-0 is &lt;0.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907080" version="1" comment="libXvMC-devel is &lt;1.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907081" version="1" comment="libXvMC-devel-32bit is &lt;1.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907082" version="1" comment="libXvMC1 is &lt;1.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907083" version="1" comment="libXvMC1-32bit is &lt;1.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907084" version="1" comment="postgresql93 is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907085" version="1" comment="postgresql93-contrib is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907086" version="1" comment="postgresql93-devel is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907087" version="1" comment="postgresql93-docs is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907088" version="1" comment="postgresql93-plperl is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907089" version="1" comment="postgresql93-plpython is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907090" version="1" comment="postgresql93-pltcl is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907091" version="1" comment="postgresql93-server is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907092" version="1" comment="postgresql93-test is &lt;9.3.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907093" version="1" comment="librsync-devel is &lt;1.0.0-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907094" version="1" comment="librsync2 is &lt;1.0.0-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907095" version="1" comment="rdiff is &lt;1.0.0-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907096" version="1" comment="pidgin-otr is &lt;4.0.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907097" version="1" comment="vorbis-tools is &lt;1.4.0-22.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907098" version="1" comment="vorbis-tools-lang is &lt;1.4.0-22.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907099" version="1" comment="apache2-mod_mono is &lt;3.12-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907100" version="1" comment="xsp is &lt;3.0.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907101" version="1" comment="wesnoth is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907102" version="1" comment="wesnoth-campaign-server is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907103" version="1" comment="wesnoth-data is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907104" version="1" comment="wesnoth-fslayout is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907105" version="1" comment="wesnoth-server is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907106" version="1" comment="wesnoth-tools is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907107" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-125.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907108" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-125.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907109" version="1" comment="wget is &lt;1.18-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907110" version="1" comment="vsftpd is &lt;3.0.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907111" version="1" comment="libsrtp-devel is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907112" version="1" comment="libsrtp1 is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907113" version="1" comment="libsrtp1-32bit is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907114" version="1" comment="libsmi is &lt;0.4.8-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907115" version="1" comment="libsmi-devel is &lt;0.4.8-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907116" version="1" comment="libsmi2 is &lt;0.4.8-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907117" version="1" comment="audiofile is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907118" version="1" comment="audiofile-devel is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907119" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907120" version="1" comment="audiofile-doc is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907121" version="1" comment="libaudiofile1 is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907122" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907123" version="1" comment="apache2 is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907124" version="1" comment="apache2-devel is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907125" version="1" comment="apache2-doc is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907126" version="1" comment="apache2-event is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907127" version="1" comment="apache2-example-pages is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907128" version="1" comment="apache2-prefork is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907129" version="1" comment="apache2-utils is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907130" version="1" comment="apache2-worker is &lt;2.4.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907131" version="1" comment="opensc is &lt;0.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907132" version="1" comment="opensc-32bit is &lt;0.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907133" version="1" comment="nspluginwrapper is &lt;1.4.4-16.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907134" version="1" comment="libopenssl-devel is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907135" version="1" comment="libopenssl-devel-32bit is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907136" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907137" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907138" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907139" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907140" version="1" comment="openssl is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907141" version="1" comment="openssl-doc is &lt;1.0.2j-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907142" version="1" comment="transmission is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907143" version="1" comment="transmission-common is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907144" version="1" comment="transmission-daemon is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907145" version="1" comment="transmission-gtk is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907146" version="1" comment="transmission-gtk-lang is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907147" version="1" comment="transmission-qt is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907148" version="1" comment="transmission-qt-lang is &lt;2.92-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907149" version="1" comment="libecpg6 is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907150" version="1" comment="libecpg6-32bit is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907151" version="1" comment="libpq5 is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907152" version="1" comment="libpq5-32bit is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907153" version="1" comment="postgresql95 is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907154" version="1" comment="postgresql95-contrib is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907155" version="1" comment="postgresql95-devel is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907156" version="1" comment="postgresql95-docs is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907157" version="1" comment="postgresql95-plperl is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907158" version="1" comment="postgresql95-plpython is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907159" version="1" comment="postgresql95-pltcl is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907160" version="1" comment="postgresql95-server is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907161" version="1" comment="postgresql95-test is &lt;9.5.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907162" version="1" comment="libXv-devel is &lt;1.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907163" version="1" comment="libXv-devel-32bit is &lt;1.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907164" version="1" comment="libXv1 is &lt;1.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907165" version="1" comment="libXv1-32bit is &lt;1.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907166" version="1" comment="monit is &lt;5.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907167" version="1" comment="monit-doc is &lt;5.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907168" version="1" comment="python3-cupshelpers is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907169" version="1" comment="system-config-printer is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907170" version="1" comment="system-config-printer-applet is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907171" version="1" comment="system-config-printer-common is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907172" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907173" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907174" version="1" comment="udev-configure-printer is &lt;1.5.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907175" version="1" comment="libpcre1 is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907176" version="1" comment="libpcre1-32bit is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907177" version="1" comment="libpcre16-0 is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907178" version="1" comment="libpcre16-0-32bit is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907179" version="1" comment="libpcrecpp0 is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907180" version="1" comment="libpcrecpp0-32bit is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907181" version="1" comment="libpcreposix0 is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907182" version="1" comment="libpcreposix0-32bit is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907183" version="1" comment="pcre-devel is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907184" version="1" comment="pcre-devel-static is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907185" version="1" comment="pcre-doc is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907186" version="1" comment="pcre-tools is &lt;8.39-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907187" version="1" comment="criu is &lt;2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907188" version="1" comment="criu-devel is &lt;2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907189" version="1" comment="libcriu1 is &lt;2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907190" version="1" comment="libblkid-devel is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907191" version="1" comment="libblkid-devel-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907192" version="1" comment="libblkid-devel-static is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907193" version="1" comment="libblkid1 is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907194" version="1" comment="libblkid1-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907195" version="1" comment="libfdisk-devel is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907196" version="1" comment="libfdisk-devel-static is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907197" version="1" comment="libfdisk1 is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907198" version="1" comment="libmount-devel is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907199" version="1" comment="libmount-devel-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907200" version="1" comment="libmount-devel-static is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907201" version="1" comment="libmount1 is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907202" version="1" comment="libmount1-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907203" version="1" comment="libsmartcols-devel is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907204" version="1" comment="libsmartcols-devel-static is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907205" version="1" comment="libsmartcols1 is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907206" version="1" comment="libuuid-devel is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907207" version="1" comment="libuuid-devel-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907208" version="1" comment="libuuid-devel-static is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907209" version="1" comment="libuuid1 is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907210" version="1" comment="libuuid1-32bit is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907211" version="1" comment="python-libmount is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907212" version="1" comment="util-linux is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907213" version="1" comment="util-linux-lang is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907214" version="1" comment="util-linux-systemd is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907215" version="1" comment="uuidd is &lt;2.28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907216" version="1" comment="dbus-1-glib is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907217" version="1" comment="dbus-1-glib-32bit is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907218" version="1" comment="dbus-1-glib-devel is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907219" version="1" comment="dbus-1-glib-devel-32bit is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907220" version="1" comment="dbus-1-glib-doc is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907221" version="1" comment="dbus-1-glib-tool is &lt;0.108-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907222" version="1" comment="jasper is &lt;1.900.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907223" version="1" comment="libjasper-devel is &lt;1.900.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907224" version="1" comment="libjasper1 is &lt;1.900.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907225" version="1" comment="libjasper1-32bit is &lt;1.900.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907226" version="1" comment="cobbler is &lt;2.6.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907227" version="1" comment="cobbler-tests is &lt;2.6.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907228" version="1" comment="cobbler-web is &lt;2.6.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907229" version="1" comment="koan is &lt;2.6.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907230" version="1" comment="libminizip1 is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907231" version="1" comment="libz1 is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907232" version="1" comment="libz1-32bit is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907233" version="1" comment="minizip-devel is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907234" version="1" comment="zlib-devel is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907235" version="1" comment="zlib-devel-32bit is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907236" version="1" comment="zlib-devel-static is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907237" version="1" comment="zlib-devel-static-32bit is &lt;1.2.8-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907238" version="1" comment="argyllcms is &lt;1.8.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907239" version="1" comment="argyllcms-doc is &lt;1.8.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907240" version="1" comment="qemu-linux-user is &lt;2.6.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907241" version="1" comment="mysql-connector-java is &lt;5.1.35-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907242" version="1" comment="qt3 is &lt;3.3.8c-140.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907243" version="1" comment="qt3-32bit is &lt;3.3.8c-140.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907244" version="1" comment="qt3-devel is &lt;3.3.8c-140.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907245" version="1" comment="qt3-devel-32bit is &lt;3.3.8c-140.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907246" version="1" comment="libunwind is &lt;1.2~rc1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907247" version="1" comment="libunwind-32bit is &lt;1.2~rc1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907248" version="1" comment="libunwind-devel is &lt;1.2~rc1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907249" version="1" comment="stunnel is &lt;5.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907250" version="1" comment="stunnel-doc is &lt;5.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907251" version="1" comment="apache2-mod_php7 is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907252" version="1" comment="php7 is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907253" version="1" comment="php7-bcmath is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907254" version="1" comment="php7-bz2 is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907255" version="1" comment="php7-calendar is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907256" version="1" comment="php7-ctype is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907257" version="1" comment="php7-curl is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907258" version="1" comment="php7-dba is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907259" version="1" comment="php7-devel is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907260" version="1" comment="php7-dom is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907261" version="1" comment="php7-enchant is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907262" version="1" comment="php7-exif is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907263" version="1" comment="php7-fastcgi is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907264" version="1" comment="php7-fileinfo is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907265" version="1" comment="php7-firebird is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907266" version="1" comment="php7-fpm is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907267" version="1" comment="php7-ftp is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907268" version="1" comment="php7-gd is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907269" version="1" comment="php7-gettext is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907270" version="1" comment="php7-gmp is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907271" version="1" comment="php7-iconv is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907272" version="1" comment="php7-imap is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907273" version="1" comment="php7-intl is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907274" version="1" comment="php7-json is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907275" version="1" comment="php7-ldap is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907276" version="1" comment="php7-mbstring is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907277" version="1" comment="php7-mcrypt is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907278" version="1" comment="php7-mysql is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907279" version="1" comment="php7-odbc is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907280" version="1" comment="php7-opcache is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907281" version="1" comment="php7-openssl is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907282" version="1" comment="php7-pcntl is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907283" version="1" comment="php7-pdo is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907284" version="1" comment="php7-pear is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907285" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907286" version="1" comment="php7-pgsql is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907287" version="1" comment="php7-phar is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907288" version="1" comment="php7-posix is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907289" version="1" comment="php7-pspell is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907290" version="1" comment="php7-readline is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907291" version="1" comment="php7-shmop is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907292" version="1" comment="php7-snmp is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907293" version="1" comment="php7-soap is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907294" version="1" comment="php7-sockets is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907295" version="1" comment="php7-sqlite is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907296" version="1" comment="php7-sysvmsg is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907297" version="1" comment="php7-sysvsem is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907298" version="1" comment="php7-sysvshm is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907299" version="1" comment="php7-tidy is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907300" version="1" comment="php7-tokenizer is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907301" version="1" comment="php7-wddx is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907302" version="1" comment="php7-xmlreader is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907303" version="1" comment="php7-xmlrpc is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907304" version="1" comment="php7-xmlwriter is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907305" version="1" comment="php7-xsl is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907306" version="1" comment="php7-zip is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907307" version="1" comment="php7-zlib is &lt;7.0.14-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907308" version="1" comment="salt is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907309" version="1" comment="salt-api is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907310" version="1" comment="salt-bash-completion is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907311" version="1" comment="salt-cloud is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907312" version="1" comment="salt-doc is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907313" version="1" comment="salt-fish-completion is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907314" version="1" comment="salt-master is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907315" version="1" comment="salt-minion is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907316" version="1" comment="salt-proxy is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907317" version="1" comment="salt-raet is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907318" version="1" comment="salt-ssh is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907319" version="1" comment="salt-syndic is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907320" version="1" comment="salt-zsh-completion is &lt;2016.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907321" version="1" comment="uudeview is &lt;0.5.20-257.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907322" version="1" comment="cppi is &lt;1.18-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907323" version="1" comment="cppi-lang is &lt;1.18-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907324" version="1" comment="gimp is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907325" version="1" comment="gimp-devel is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907326" version="1" comment="gimp-help-browser is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907327" version="1" comment="gimp-lang is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907328" version="1" comment="gimp-plugin-aa is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907329" version="1" comment="gimp-plugins-python is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907330" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907331" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907332" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907333" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.18-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907334" version="1" comment="libXrandr-devel is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907335" version="1" comment="libXrandr-devel-32bit is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907336" version="1" comment="libXrandr2 is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907337" version="1" comment="libXrandr2-32bit is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907338" version="1" comment="ctags is &lt;5.8-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907339" version="1" comment="mozilla-nspr is &lt;4.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907340" version="1" comment="mozilla-nspr-32bit is &lt;4.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907341" version="1" comment="mozilla-nspr-devel is &lt;4.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907342" version="1" comment="libpgf-devel is &lt;6.14.12-4.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907343" version="1" comment="libpgf6 is &lt;6.14.12-4.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907344" version="1" comment="libXfont-devel is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907345" version="1" comment="libXfont-devel-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907346" version="1" comment="libXfont1 is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907347" version="1" comment="libXfont1-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907348" version="1" comment="libupnp-devel is &lt;1.6.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907349" version="1" comment="libupnp6 is &lt;1.6.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907350" version="1" comment="libupnp6-32bit is &lt;1.6.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907351" version="1" comment="lib3ds-1-3 is &lt;1.3.0-29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907352" version="1" comment="lib3ds-devel is &lt;1.3.0-29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907353" version="1" comment="gc-devel is &lt;7.4.2-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907354" version="1" comment="libgc1 is &lt;7.4.2-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907355" version="1" comment="curl is &lt;7.51.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907356" version="1" comment="libcurl-devel is &lt;7.51.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907357" version="1" comment="libcurl-devel-32bit is &lt;7.51.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907358" version="1" comment="libcurl4 is &lt;7.51.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907359" version="1" comment="libcurl4-32bit is &lt;7.51.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907360" version="1" comment="libzrtpcpp-devel is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907361" version="1" comment="libzrtpcpp4 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907362" version="1" comment="libmikmod-devel is &lt;3.3.7-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907363" version="1" comment="libmikmod3 is &lt;3.3.7-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907364" version="1" comment="libmikmod3-32bit is &lt;3.3.7-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907365" version="1" comment="tnftp is &lt;20151004-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907366" version="1" comment="squid is &lt;3.5.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907367" version="1" comment="libplib0 is &lt;1.8.5+svn.2173-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907368" version="1" comment="plib-devel is &lt;1.8.5+svn.2173-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907369" version="1" comment="libcrypto38 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907370" version="1" comment="libcrypto38-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907371" version="1" comment="libressl is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907372" version="1" comment="libressl-devel is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907373" version="1" comment="libressl-devel-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907374" version="1" comment="libressl-devel-doc is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907375" version="1" comment="libssl39 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907376" version="1" comment="libssl39-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907377" version="1" comment="libtls11 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907378" version="1" comment="libtls11-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907379" version="1" comment="sysconfig is &lt;0.84.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907380" version="1" comment="sysconfig-netconfig is &lt;0.84.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907381" version="1" comment="apache2-mod_nss is &lt;1.0.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907382" version="1" comment="sysvinit-tools is &lt;2.88+-103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907383" version="1" comment="whois is &lt;5.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907384" version="1" comment="cups-filters is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907385" version="1" comment="cups-filters-cups-browsed is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907386" version="1" comment="cups-filters-devel is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907387" version="1" comment="cups-filters-foomatic-rip is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907388" version="1" comment="cups-filters-ghostscript is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907389" version="1" comment="DevIL-devel is &lt;1.7.8-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907390" version="1" comment="libIL1 is &lt;1.7.8-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907391" version="1" comment="libdevil-tools is &lt;1.7.8-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907392" version="1" comment="firebird is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907393" version="1" comment="firebird-doc is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907394" version="1" comment="firebird-examples is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907395" version="1" comment="firebird-server is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907396" version="1" comment="firebird-utils is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907397" version="1" comment="libfbclient-devel is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907398" version="1" comment="libfbclient2 is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907399" version="1" comment="libfbclient2-32bit is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907400" version="1" comment="libib_util is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907401" version="1" comment="libib_util-32bit is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907402" version="1" comment="libib_util-devel is &lt;3.0.1.32609-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907403" version="1" comment="icedtea-web-javadoc is &lt;1.6.2-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009082363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907404" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.2-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009082363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907405" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.2-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009082363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907406" version="1" comment="python-Beaker is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907407" version="1" comment="python3-Beaker is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907408" version="1" comment="pure-ftpd is &lt;1.0.43-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907409" version="1" comment="autofs is &lt;5.1.1-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907410" version="1" comment="imlib2 is &lt;1.4.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907411" version="1" comment="imlib2-devel is &lt;1.4.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907412" version="1" comment="imlib2-filters is &lt;1.4.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907413" version="1" comment="imlib2-loaders is &lt;1.4.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907414" version="1" comment="libImlib2-1 is &lt;1.4.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907415" version="1" comment="rhythmbox is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907416" version="1" comment="rhythmbox-devel is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907417" version="1" comment="rhythmbox-lang is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907418" version="1" comment="p7zip is &lt;16.02-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907419" version="1" comment="xinetd is &lt;2.3.15-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907420" version="1" comment="android-tools is &lt;5.1.1_r8-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907421" version="1" comment="android-tools-udev is &lt;5.1.1_r8-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907422" version="1" comment="kdenetwork4-filesharing is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907423" version="1" comment="kdnssd is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907424" version="1" comment="kget is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907425" version="1" comment="kopete is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907426" version="1" comment="kopete-devel is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907427" version="1" comment="kppp is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907428" version="1" comment="krdc is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907429" version="1" comment="krdc-devel is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907430" version="1" comment="krfb is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907431" version="1" comment="ansible is &lt;2.2.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907432" version="1" comment="libproxy-devel is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907433" version="1" comment="libproxy-sharp is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907434" version="1" comment="libproxy-tools is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907435" version="1" comment="libproxy1 is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907436" version="1" comment="libproxy1-32bit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907437" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907438" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907439" version="1" comment="libproxy1-config-kde is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907440" version="1" comment="libproxy1-config-kde-32bit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907441" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907442" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907443" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907444" version="1" comment="libproxy1-pacrunner-webkit-32bit is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907445" version="1" comment="perl-Net-Libproxy is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907446" version="1" comment="python-libproxy is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907447" version="1" comment="python3-libproxy is &lt;0.4.13-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907448" version="1" comment="plasma5-desktop is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907449" version="1" comment="plasma5-desktop-lang is &lt;5.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907450" version="1" comment="lynx is &lt;2.8.8rel.2-4.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907451" version="1" comment="munin is &lt;2.0.25-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907452" version="1" comment="munin-node is &lt;2.0.25-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907453" version="1" comment="libjansson-devel is &lt;2.7-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907454" version="1" comment="libjansson4 is &lt;2.7-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907455" version="1" comment="libjansson4-32bit is &lt;2.7-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907456" version="1" comment="ruby2.2-rubygem-actionpack-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907457" version="1" comment="ruby2.2-rubygem-actionpack-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907458" version="1" comment="ruby2.2-rubygem-actionpack-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907459" version="1" comment="ruby2.2-rubygem-actionpack-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907460" version="1" comment="ruby2.3-rubygem-actionpack-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907461" version="1" comment="ruby2.3-rubygem-actionpack-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907462" version="1" comment="ruby2.3-rubygem-actionpack-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907463" version="1" comment="ruby2.3-rubygem-actionpack-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907464" version="1" comment="pwgen is &lt;2.07-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907465" version="1" comment="cifs-utils is &lt;6.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907466" version="1" comment="cifs-utils-devel is &lt;6.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907467" version="1" comment="pam_cifscreds is &lt;6.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907468" version="1" comment="libXxf86dga-devel is &lt;1.1.4-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907469" version="1" comment="libXxf86dga-devel-32bit is &lt;1.1.4-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907470" version="1" comment="libXxf86dga1 is &lt;1.1.4-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907471" version="1" comment="libXxf86dga1-32bit is &lt;1.1.4-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907472" version="1" comment="libcryptopp-devel is &lt;5.6.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907473" version="1" comment="libcryptopp-devel-static is &lt;5.6.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907474" version="1" comment="libcryptopp5_6 is &lt;5.6.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907475" version="1" comment="libcryptopp5_6-32bit is &lt;5.6.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907476" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907477" version="1" comment="libwmf-0_2-7-32bit is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907478" version="1" comment="libwmf-devel is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907479" version="1" comment="libwmf-gnome is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907480" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907481" version="1" comment="libwmf-tools is &lt;0.2.8.4-243.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907482" version="1" comment="gnuchess is &lt;6.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907483" version="1" comment="libhogweed4 is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907484" version="1" comment="libhogweed4-32bit is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907485" version="1" comment="libnettle-devel is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907486" version="1" comment="libnettle-devel-32bit is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907487" version="1" comment="libnettle6 is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907488" version="1" comment="libnettle6-32bit is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907489" version="1" comment="nettle is &lt;3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907490" version="1" comment="lcms is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907491" version="1" comment="liblcms-devel is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907492" version="1" comment="liblcms-devel-32bit is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907493" version="1" comment="liblcms1 is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907494" version="1" comment="liblcms1-32bit is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907495" version="1" comment="python-lcms is &lt;1.19-19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907496" version="1" comment="mosh is &lt;1.2.5-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907497" version="1" comment="LibVNCServer-devel is &lt;0.9.10-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907498" version="1" comment="liblzo2-2 is &lt;2.09-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907499" version="1" comment="liblzo2-2-32bit is &lt;2.09-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907500" version="1" comment="libvncclient0 is &lt;0.9.10-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907501" version="1" comment="libvncserver0 is &lt;0.9.10-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907502" version="1" comment="lzo-devel is &lt;2.09-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907503" version="1" comment="lzo-devel-32bit is &lt;2.09-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907504" version="1" comment="lzo-devel-static is &lt;2.09-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907505" version="1" comment="libgadu-devel is &lt;1.12.1-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907506" version="1" comment="libgadu3 is &lt;1.12.1-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907507" version="1" comment="apache2-mod_php5 is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907508" version="1" comment="php5 is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907509" version="1" comment="php5-bcmath is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907510" version="1" comment="php5-bz2 is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907511" version="1" comment="php5-calendar is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907512" version="1" comment="php5-ctype is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907513" version="1" comment="php5-curl is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907514" version="1" comment="php5-dba is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907515" version="1" comment="php5-devel is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907516" version="1" comment="php5-dom is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907517" version="1" comment="php5-enchant is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907518" version="1" comment="php5-exif is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907519" version="1" comment="php5-fastcgi is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907520" version="1" comment="php5-fileinfo is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907521" version="1" comment="php5-firebird is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907522" version="1" comment="php5-fpm is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907523" version="1" comment="php5-ftp is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907524" version="1" comment="php5-gd is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907525" version="1" comment="php5-gettext is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907526" version="1" comment="php5-gmp is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907527" version="1" comment="php5-iconv is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907528" version="1" comment="php5-imap is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907529" version="1" comment="php5-intl is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907530" version="1" comment="php5-json is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907531" version="1" comment="php5-ldap is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907532" version="1" comment="php5-mbstring is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907533" version="1" comment="php5-mcrypt is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907534" version="1" comment="php5-mssql is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907535" version="1" comment="php5-mysql is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907536" version="1" comment="php5-odbc is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907537" version="1" comment="php5-opcache is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907538" version="1" comment="php5-openssl is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907539" version="1" comment="php5-pcntl is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907540" version="1" comment="php5-pdo is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907541" version="1" comment="php5-pear is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907542" version="1" comment="php5-pear-Archive_Tar is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907543" version="1" comment="php5-pgsql is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907544" version="1" comment="php5-phar is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907545" version="1" comment="php5-posix is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907546" version="1" comment="php5-pspell is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907547" version="1" comment="php5-readline is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907548" version="1" comment="php5-shmop is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907549" version="1" comment="php5-snmp is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907550" version="1" comment="php5-soap is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907551" version="1" comment="php5-sockets is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907552" version="1" comment="php5-sqlite is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907553" version="1" comment="php5-suhosin is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907554" version="1" comment="php5-sysvmsg is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907555" version="1" comment="php5-sysvsem is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907556" version="1" comment="php5-sysvshm is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907557" version="1" comment="php5-tidy is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907558" version="1" comment="php5-tokenizer is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907559" version="1" comment="php5-wddx is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907560" version="1" comment="php5-xmlreader is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907561" version="1" comment="php5-xmlrpc is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907562" version="1" comment="php5-xmlwriter is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907563" version="1" comment="php5-xsl is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907564" version="1" comment="php5-zip is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907565" version="1" comment="php5-zlib is &lt;5.6.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907566" version="1" comment="chrony is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907567" version="1" comment="python-pycrypto is &lt;2.6.1-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907568" version="1" comment="python3-pycrypto is &lt;2.6.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907569" version="1" comment="SuSEfirewall2-fail2ban is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907570" version="1" comment="fail2ban is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907571" version="1" comment="nagios-plugins-fail2ban is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907572" version="1" comment="fish is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907573" version="1" comment="tftp is &lt;5.2-13.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907574" version="1" comment="trojita is &lt;0.7-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907575" version="1" comment="pngcrush is &lt;1.7.92-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907576" version="1" comment="kdegraphics3 is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907577" version="1" comment="kdegraphics3-3D is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907578" version="1" comment="kdegraphics3-devel is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907579" version="1" comment="kdegraphics3-extra is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907580" version="1" comment="kdegraphics3-fax is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907581" version="1" comment="kdegraphics3-imaging is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907582" version="1" comment="kdegraphics3-kamera is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907583" version="1" comment="kdegraphics3-pdf is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907584" version="1" comment="kdegraphics3-postscript is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907585" version="1" comment="kdegraphics3-scan is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907586" version="1" comment="kdegraphics3-tex is &lt;3.5.10-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907587" version="1" comment="gnump3d is &lt;3.0-103.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907588" version="1" comment="libthunarx-2-0 is &lt;1.6.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907589" version="1" comment="thunar is &lt;1.6.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907590" version="1" comment="thunar-devel is &lt;1.6.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907591" version="1" comment="thunar-lang is &lt;1.6.10-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907592" version="1" comment="libthai-data is &lt;0.1.25-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907593" version="1" comment="libthai-devel is &lt;0.1.25-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907594" version="1" comment="libthai0 is &lt;0.1.25-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907595" version="1" comment="libthai0-32bit is &lt;0.1.25-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907596" version="1" comment="libsystemd0 is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907597" version="1" comment="libsystemd0-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907598" version="1" comment="libsystemd0-mini is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907599" version="1" comment="libudev-devel is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907600" version="1" comment="libudev-devel-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907601" version="1" comment="libudev1 is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907602" version="1" comment="libudev1-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907603" version="1" comment="nss-myhostname is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907604" version="1" comment="nss-myhostname-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907605" version="1" comment="nss-mymachines is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907606" version="1" comment="nss-mymachines-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907607" version="1" comment="systemd is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907608" version="1" comment="systemd-32bit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907609" version="1" comment="systemd-bash-completion is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907610" version="1" comment="systemd-devel is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907611" version="1" comment="systemd-journal-remote is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907612" version="1" comment="systemd-logger is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907613" version="1" comment="systemd-mini-bash-completion is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907614" version="1" comment="systemd-sysvinit is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907615" version="1" comment="udev is &lt;228-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907616" version="1" comment="libjpeg-turbo is &lt;1.5.1-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907617" version="1" comment="libjpeg62 is &lt;62.2.0-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907618" version="1" comment="libjpeg62-32bit is &lt;62.2.0-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907619" version="1" comment="libjpeg62-devel is &lt;62.2.0-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907620" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907621" version="1" comment="libjpeg62-turbo is &lt;1.5.1-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907622" version="1" comment="libjpeg8 is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907623" version="1" comment="libjpeg8-32bit is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907624" version="1" comment="libjpeg8-devel is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907625" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907626" version="1" comment="libturbojpeg0 is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907627" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907628" version="1" comment="dhcp is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907629" version="1" comment="dhcp-client is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907630" version="1" comment="dhcp-devel is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907631" version="1" comment="dhcp-doc is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907632" version="1" comment="dhcp-relay is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907633" version="1" comment="dhcp-server is &lt;4.3.3.P1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907634" version="1" comment="cracklib is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907635" version="1" comment="cracklib-devel is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907636" version="1" comment="cracklib-devel-32bit is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907637" version="1" comment="cracklib-dict-small is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907638" version="1" comment="libcrack2 is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907639" version="1" comment="libcrack2-32bit is &lt;2.9.5-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907640" version="1" comment="libpoppler-cpp0 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907641" version="1" comment="libpoppler-cpp0-32bit is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907642" version="1" comment="libpoppler-devel is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907643" version="1" comment="libpoppler-glib-devel is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907644" version="1" comment="libpoppler-glib8 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907645" version="1" comment="libpoppler-glib8-32bit is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907646" version="1" comment="libpoppler-qt4-4 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907647" version="1" comment="libpoppler-qt4-4-32bit is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907648" version="1" comment="libpoppler-qt4-devel is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907649" version="1" comment="libpoppler-qt5-1 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907650" version="1" comment="libpoppler-qt5-1-32bit is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907651" version="1" comment="libpoppler-qt5-devel is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907652" version="1" comment="libpoppler65 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907653" version="1" comment="libpoppler65-32bit is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907654" version="1" comment="poppler-tools is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907655" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907656" version="1" comment="python3-Django is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907657" version="1" comment="libospf0 is &lt;1.0.20160315-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907658" version="1" comment="libospfapiclient0 is &lt;1.0.20160315-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907659" version="1" comment="libzebra0 is &lt;1.0.20160315-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907660" version="1" comment="quagga is &lt;1.0.20160315-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907661" version="1" comment="quagga-devel is &lt;1.0.20160315-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907662" version="1" comment="avahi is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907663" version="1" comment="avahi-autoipd is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907664" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907665" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907666" version="1" comment="avahi-lang is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907667" version="1" comment="avahi-utils is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907668" version="1" comment="libavahi-client3 is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907669" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907670" version="1" comment="libavahi-common3 is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907671" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907672" version="1" comment="libavahi-core7 is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907673" version="1" comment="libavahi-devel is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907674" version="1" comment="libdns_sd is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907675" version="1" comment="libdns_sd-32bit is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907676" version="1" comment="libhowl0 is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907677" version="1" comment="python-avahi is &lt;0.6.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907678" version="1" comment="cecilia is &lt;2.0.5-282.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907679" version="1" comment="libmspack-devel is &lt;0.5-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907680" version="1" comment="libmspack0 is &lt;0.5-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907681" version="1" comment="libmspack0-32bit is &lt;0.5-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907682" version="1" comment="gnome-shell is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907683" version="1" comment="gnome-shell-browser-plugin is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907684" version="1" comment="gnome-shell-calendar is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907685" version="1" comment="gnome-shell-devel is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907686" version="1" comment="gnome-shell-lang is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907687" version="1" comment="augeas is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907688" version="1" comment="augeas-devel is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907689" version="1" comment="augeas-devel-32bit is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907690" version="1" comment="augeas-lense-tests is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907691" version="1" comment="augeas-lenses is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907692" version="1" comment="libaugeas0 is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907693" version="1" comment="libaugeas0-32bit is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907694" version="1" comment="libuser is &lt;0.60-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907695" version="1" comment="libuser-devel is &lt;0.60-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907696" version="1" comment="libuser-lang is &lt;0.60-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907697" version="1" comment="libuser-python is &lt;0.60-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907698" version="1" comment="libuser1 is &lt;0.60-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907699" version="1" comment="perl-HTML-Parser is &lt;3.72-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907700" version="1" comment="erlang-rabbitmq-client is &lt;3.5.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907701" version="1" comment="rabbitmq-server is &lt;3.5.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907702" version="1" comment="rabbitmq-server-plugins is &lt;3.5.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907703" version="1" comment="socat is &lt;1.7.3.1-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907704" version="1" comment="checkbashisms is &lt;2.15.1-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907705" version="1" comment="devscripts is &lt;2.15.1-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907706" version="1" comment="iproxy is &lt;1.0.10-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907707" version="1" comment="libusbmuxd-devel is &lt;1.0.10-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907708" version="1" comment="libusbmuxd4 is &lt;1.0.10-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907709" version="1" comment="libusbmuxd4-32bit is &lt;1.0.10-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907710" version="1" comment="putty is &lt;0.67-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907711" version="1" comment="almanah is &lt;0.11.1-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907712" version="1" comment="almanah-lang is &lt;0.11.1-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907713" version="1" comment="libXi-devel is &lt;1.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907714" version="1" comment="libXi-devel-32bit is &lt;1.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907715" version="1" comment="libXi6 is &lt;1.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907716" version="1" comment="libXi6-32bit is &lt;1.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907717" version="1" comment="python3-jupyter_notebook is &lt;4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907718" version="1" comment="python3-jupyter_notebook-doc is &lt;4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907719" version="1" comment="fuse is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907720" version="1" comment="fuse-devel is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907721" version="1" comment="fuse-devel-static is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907722" version="1" comment="libfuse2 is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907723" version="1" comment="libfuse2-32bit is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907724" version="1" comment="libulockmgr1 is &lt;2.9.5-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907725" version="1" comment="patch is &lt;2.7.5-1.112 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907726" version="1" comment="lftp is &lt;4.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907727" version="1" comment="apache-commons-httpclient is &lt;3.1-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907728" version="1" comment="apache-commons-httpclient-demo is &lt;3.1-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907729" version="1" comment="apache-commons-httpclient-javadoc is &lt;3.1-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907730" version="1" comment="apache-commons-httpclient-manual is &lt;3.1-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907731" version="1" comment="tar is &lt;1.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907732" version="1" comment="tar-backup-scripts is &lt;1.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907733" version="1" comment="tar-lang is &lt;1.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907734" version="1" comment="tar-tests is &lt;1.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907735" version="1" comment="empathy is &lt;3.12.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907736" version="1" comment="empathy-lang is &lt;3.12.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907737" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907738" version="1" comment="cronic is &lt;3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907739" version="1" comment="ncompress is &lt;4.2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907740" version="1" comment="flatpak is &lt;0.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907741" version="1" comment="flatpak-builder is &lt;0.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907742" version="1" comment="flatpak-devel is &lt;0.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907743" version="1" comment="libflatpak0 is &lt;0.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907744" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;0.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907745" version="1" comment="FastCGI is &lt;2.4.0-171.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907746" version="1" comment="FastCGI-devel is &lt;2.4.0-171.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907747" version="1" comment="libfcgi0 is &lt;2.4.0-171.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907748" version="1" comment="perl-CGI is &lt;4.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907749" version="1" comment="perl-FastCGI is &lt;2.4.0-171.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907750" version="1" comment="postfixadmin is &lt;3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907751" version="1" comment="guile is &lt;2.0.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907752" version="1" comment="guile-devel is &lt;2.0.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907753" version="1" comment="guile-modules-2_0 is &lt;2.0.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907754" version="1" comment="libguile-2_0-22 is &lt;2.0.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907755" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907756" version="1" comment="coreutils is &lt;8.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907757" version="1" comment="coreutils-lang is &lt;8.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907758" version="1" comment="coreutils-testsuite is &lt;8.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907759" version="1" comment="libcgroup-devel is &lt;0.41-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907760" version="1" comment="libcgroup-tools is &lt;0.41-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907761" version="1" comment="libcgroup1 is &lt;0.41-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907762" version="1" comment="libcgroup1-32bit is &lt;0.41-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907763" version="1" comment="tkimg is &lt;1.4-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907764" version="1" comment="tkimg-devel is &lt;1.4-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907765" version="1" comment="libspice-server-devel is &lt;0.12.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907766" version="1" comment="libspice-server1 is &lt;0.12.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907767" version="1" comment="spice-client is &lt;0.12.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907768" version="1" comment="kdelibs3 is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907769" version="1" comment="kdelibs3-32bit is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907770" version="1" comment="kdelibs3-arts is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907771" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907772" version="1" comment="kdelibs3-default-style is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907773" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907774" version="1" comment="kdelibs3-devel is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907775" version="1" comment="kdelibs3-doc is &lt;3.5.10-89.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907776" version="1" comment="libX11-6 is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907777" version="1" comment="libX11-6-32bit is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907778" version="1" comment="libX11-data is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907779" version="1" comment="libX11-devel is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907780" version="1" comment="libX11-devel-32bit is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907781" version="1" comment="libX11-xcb1 is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907782" version="1" comment="libX11-xcb1-32bit is &lt;1.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907783" version="1" comment="tcpdump is &lt;4.7.4-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907784" version="1" comment="nagstamon is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907785" version="1" comment="gnome-online-accounts is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907786" version="1" comment="gnome-online-accounts-devel is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907787" version="1" comment="gnome-online-accounts-lang is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907788" version="1" comment="libgoa-1_0-0 is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907789" version="1" comment="libgoa-1_0-0-32bit is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907790" version="1" comment="libgoa-backend-1_0-1 is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907791" version="1" comment="libgoa-backend-1_0-1-32bit is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907792" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907793" version="1" comment="filezilla is &lt;3.23.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907794" version="1" comment="filezilla-lang is &lt;3.23.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907795" version="1" comment="python-logilab-common is &lt;1.0.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907796" version="1" comment="python3-logilab-common is &lt;1.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907797" version="1" comment="ruby2.2-rubygem-RedCloth is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907798" version="1" comment="ruby2.2-rubygem-RedCloth-doc is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907799" version="1" comment="ruby2.2-rubygem-RedCloth-testsuite is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907800" version="1" comment="ruby2.3-rubygem-RedCloth is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907801" version="1" comment="ruby2.3-rubygem-RedCloth-doc is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907802" version="1" comment="ruby2.3-rubygem-RedCloth-testsuite is &lt;4.3.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907803" version="1" comment="lighttpd is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907804" version="1" comment="lighttpd-mod_cml is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907805" version="1" comment="lighttpd-mod_geoip is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907806" version="1" comment="lighttpd-mod_magnet is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907807" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907808" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907809" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907810" version="1" comment="lighttpd-mod_webdav is &lt;1.4.37-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907811" version="1" comment="cyrus-sasl is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907812" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907813" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907814" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907815" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907816" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907817" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907818" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907819" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907820" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907821" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907822" version="1" comment="cyrus-sasl-ldap-auxprop is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907823" version="1" comment="cyrus-sasl-ldap-auxprop-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907824" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907825" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907826" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907827" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907828" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907829" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907830" version="1" comment="cyrus-sasl-scram is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907831" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907832" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907833" version="1" comment="libsasl2-3 is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907834" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-12.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907835" version="1" comment="xalan-j2 is &lt;2.7.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907836" version="1" comment="xalan-j2-demo is &lt;2.7.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907837" version="1" comment="xalan-j2-manual is &lt;2.7.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907838" version="1" comment="xalan-j2-xsltc is &lt;2.7.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907839" version="1" comment="pam is &lt;1.3.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907840" version="1" comment="pam-32bit is &lt;1.3.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907841" version="1" comment="pam-devel is &lt;1.3.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907842" version="1" comment="pam-devel-32bit is &lt;1.3.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907843" version="1" comment="pam-doc is &lt;1.3.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907844" version="1" comment="ruby2.2-rubygem-rack is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907845" version="1" comment="ruby2.2-rubygem-rack-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907846" version="1" comment="ruby2.2-rubygem-rack-doc is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907847" version="1" comment="ruby2.2-rubygem-rack-doc-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907848" version="1" comment="ruby2.2-rubygem-rack-testsuite is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907849" version="1" comment="ruby2.2-rubygem-rack-testsuite-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907850" version="1" comment="ruby2.3-rubygem-rack is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907851" version="1" comment="ruby2.3-rubygem-rack-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907852" version="1" comment="ruby2.3-rubygem-rack-doc is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907853" version="1" comment="ruby2.3-rubygem-rack-doc-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907854" version="1" comment="ruby2.3-rubygem-rack-testsuite is &lt;2.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907855" version="1" comment="ruby2.3-rubygem-rack-testsuite-1_6 is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907856" version="1" comment="glade3-catalog-vte is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907857" version="1" comment="libvte9 is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907858" version="1" comment="python-vte is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907859" version="1" comment="vte2-devel is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907860" version="1" comment="vte2-lang is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907861" version="1" comment="vte2-tools is &lt;0.28.2-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907862" version="1" comment="udisks is &lt;1.0.5-5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907863" version="1" comment="udisks-devel is &lt;1.0.5-5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907864" version="1" comment="jq is &lt;1.5-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907865" version="1" comment="libjq-devel is &lt;1.5-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907866" version="1" comment="libjq1 is &lt;1.5-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907867" version="1" comment="yast2 is &lt;3.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907868" version="1" comment="python-keystonemiddleware is &lt;4.9.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907869" version="1" comment="python-keystonemiddleware-doc is &lt;4.9.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907870" version="1" comment="gdm is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907871" version="1" comment="gdm-branding-upstream is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907872" version="1" comment="gdm-devel is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907873" version="1" comment="gdm-lang is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907874" version="1" comment="gdmflexiserver is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907875" version="1" comment="libgdm1 is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907876" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.22.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907877" version="1" comment="unixODBC is &lt;2.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907878" version="1" comment="unixODBC-32bit is &lt;2.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907879" version="1" comment="unixODBC-devel is &lt;2.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907880" version="1" comment="libtasn1 is &lt;4.9-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907881" version="1" comment="libtasn1-6 is &lt;4.9-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907882" version="1" comment="libtasn1-6-32bit is &lt;4.9-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907883" version="1" comment="libtasn1-devel is &lt;4.9-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907884" version="1" comment="libtasn1-devel-32bit is &lt;4.9-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907885" version="1" comment="guile1 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907886" version="1" comment="libguile-srfi-srfi-1-v-3-3 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907887" version="1" comment="libguile-srfi-srfi-13-14-v-3-3 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907888" version="1" comment="libguile-srfi-srfi-4-v-3-3 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907889" version="1" comment="libguile-srfi-srfi-60-v-2-2 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907890" version="1" comment="libguile1-devel is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907891" version="1" comment="libguile17 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907892" version="1" comment="libguilereadline-v-17-17 is &lt;1.8.8-19.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907893" version="1" comment="liblxc-devel is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907894" version="1" comment="liblxc1 is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907895" version="1" comment="lxc is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907896" version="1" comment="libdmx-devel is &lt;1.1.3-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907897" version="1" comment="libdmx-devel-32bit is &lt;1.1.3-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907898" version="1" comment="libdmx1 is &lt;1.1.3-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907899" version="1" comment="libdmx1-32bit is &lt;1.1.3-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907900" version="1" comment="rocksndiamonds is &lt;3.3.1.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907901" version="1" comment="libXt-devel is &lt;1.1.5-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907902" version="1" comment="libXt-devel-32bit is &lt;1.1.5-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907903" version="1" comment="libXt6 is &lt;1.1.5-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907904" version="1" comment="libXt6-32bit is &lt;1.1.5-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907905" version="1" comment="bsh2 is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907906" version="1" comment="bsh2-bsf is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907907" version="1" comment="bsh2-classgen is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907908" version="1" comment="bsh2-demo is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907909" version="1" comment="bsh2-javadoc is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907910" version="1" comment="bsh2-manual is &lt;2.0.0.b6-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907911" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907912" version="1" comment="libspice-client-glib-helper is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907913" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907914" version="1" comment="libspice-controller0 is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907915" version="1" comment="spice-gtk is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907916" version="1" comment="spice-gtk-devel is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907917" version="1" comment="spice-gtk-lang is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907918" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907919" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907920" version="1" comment="libvpx-devel is &lt;1.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907921" version="1" comment="libvpx4 is &lt;1.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907922" version="1" comment="libvpx4-32bit is &lt;1.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907923" version="1" comment="vpx-tools is &lt;1.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907924" version="1" comment="tor is &lt;0.2.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907925" version="1" comment="libXtst-devel is &lt;1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907926" version="1" comment="libXtst-devel-32bit is &lt;1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907927" version="1" comment="libXtst6 is &lt;1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907928" version="1" comment="libXtst6-32bit is &lt;1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907929" version="1" comment="edje is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907930" version="1" comment="efl is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907931" version="1" comment="efl-devel is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907932" version="1" comment="efl-examples is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907933" version="1" comment="efl-testsuite is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907934" version="1" comment="elementary is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907935" version="1" comment="elementary-examples is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907936" version="1" comment="elua is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907937" version="1" comment="embryo is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907938" version="1" comment="enlightenment-theme-dark is &lt;0.21.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907939" version="1" comment="enlightenment-theme-upstream is &lt;0.21.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907940" version="1" comment="enlightenment-x-dark-icon-theme is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907941" version="1" comment="evas-generic-loaders is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907942" version="1" comment="libecore1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907943" version="1" comment="libector1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907944" version="1" comment="libedje1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907945" version="1" comment="libeet1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907946" version="1" comment="libeeze1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907947" version="1" comment="libefl1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907948" version="1" comment="libefreet1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907949" version="1" comment="libefreet_mime1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907950" version="1" comment="libefreet_trash1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907951" version="1" comment="libeina1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907952" version="1" comment="libeio1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907953" version="1" comment="libeldbus1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907954" version="1" comment="libelocation1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907955" version="1" comment="libelput1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907956" version="1" comment="libelua1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907957" version="1" comment="libembryo1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907958" version="1" comment="libemile1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907959" version="1" comment="libemotion1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907960" version="1" comment="libeo1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907961" version="1" comment="libeolian1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907962" version="1" comment="libephysics1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907963" version="1" comment="libethumb1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907964" version="1" comment="libethumb_client1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907965" version="1" comment="libevas1 is &lt;1.18.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907966" version="1" comment="libpython3_5m1_0 is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907967" version="1" comment="libpython3_5m1_0-32bit is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907968" version="1" comment="python3-base is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907969" version="1" comment="python3-base-32bit is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907970" version="1" comment="python3-devel is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907971" version="1" comment="python3-idle is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907972" version="1" comment="python3-testsuite is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907973" version="1" comment="python3-tools is &lt;3.5.1-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907974" version="1" comment="libipa_hbac-devel is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907975" version="1" comment="libipa_hbac0 is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907976" version="1" comment="libnfsidmap-sss is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907977" version="1" comment="libsss_idmap-devel is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907978" version="1" comment="libsss_idmap0 is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907979" version="1" comment="libsss_nss_idmap-devel is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907980" version="1" comment="libsss_nss_idmap0 is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907981" version="1" comment="libsss_simpleifp-devel is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907982" version="1" comment="libsss_simpleifp0 is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907983" version="1" comment="python-ipa_hbac is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907984" version="1" comment="python-sss-murmur is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907985" version="1" comment="python-sss_nss_idmap is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907986" version="1" comment="python-sssd-config is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907987" version="1" comment="python3-ipa_hbac is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907988" version="1" comment="python3-sss-murmur is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907989" version="1" comment="python3-sss_nss_idmap is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907990" version="1" comment="python3-sssd-config is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907991" version="1" comment="sssd is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907992" version="1" comment="sssd-32bit is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907993" version="1" comment="sssd-ad is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907994" version="1" comment="sssd-dbus is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907995" version="1" comment="sssd-ipa is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907996" version="1" comment="sssd-krb5 is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907997" version="1" comment="sssd-krb5-common is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907998" version="1" comment="sssd-ldap is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009907999" version="1" comment="sssd-proxy is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908000" version="1" comment="sssd-tools is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908001" version="1" comment="sssd-wbclient is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908002" version="1" comment="sssd-wbclient-devel is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908003" version="1" comment="sssd-winbind-idmap is &lt;1.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908004" version="1" comment="claws-mail is &lt;3.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908005" version="1" comment="claws-mail-devel is &lt;3.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908006" version="1" comment="claws-mail-lang is &lt;3.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908007" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908008" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908009" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908010" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908011" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908012" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908013" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908014" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908015" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908016" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908017" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908018" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908019" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908020" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908021" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908022" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908023" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908024" version="1" comment="conntrack-tools is &lt;1.4.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908025" version="1" comment="xorg-x11 is &lt;7.6_1-16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908026" version="1" comment="xorg-x11-essentials is &lt;7.6_1-16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908027" version="1" comment="xrdb is &lt;1.1.0-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908028" version="1" comment="finch is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908029" version="1" comment="finch-devel is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908030" version="1" comment="libpurple is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908031" version="1" comment="libpurple-branding-upstream is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908032" version="1" comment="libpurple-devel is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908033" version="1" comment="libpurple-lang is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908034" version="1" comment="libpurple-plugin-sametime is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908035" version="1" comment="libpurple-tcl is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908036" version="1" comment="pidgin is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908037" version="1" comment="pidgin-devel is &lt;2.11.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908038" version="1" comment="libv8-5 is &lt;5.3.171-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908039" version="1" comment="v8 is &lt;5.3.171-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908040" version="1" comment="v8-devel is &lt;5.3.171-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908041" version="1" comment="v8-private-headers-devel is &lt;5.3.171-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908042" version="1" comment="libminiupnpc-devel is &lt;2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908043" version="1" comment="libminiupnpc16 is &lt;2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908044" version="1" comment="libminiupnpc16-32bit is &lt;2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908045" version="1" comment="miniupnpc is &lt;2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908046" version="1" comment="python-miniupnpc is &lt;2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908047" version="1" comment="nano is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908048" version="1" comment="nano-lang is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908049" version="1" comment="libpolkit0 is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908050" version="1" comment="libpolkit0-32bit is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908051" version="1" comment="polkit is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908052" version="1" comment="polkit-devel is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908053" version="1" comment="polkit-doc is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908054" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908055" version="1" comment="tomboy is &lt;1.15.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908056" version="1" comment="tomboy-lang is &lt;1.15.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908057" version="1" comment="freetype2-devel is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908058" version="1" comment="freetype2-devel-32bit is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908059" version="1" comment="libfreetype6 is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908060" version="1" comment="libfreetype6-32bit is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908061" version="1" comment="castor is &lt;0.9.5-326.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908062" version="1" comment="castor-demo is &lt;0.9.5-326.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908063" version="1" comment="castor-doc is &lt;0.9.5-326.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908064" version="1" comment="castor-test is &lt;0.9.5-326.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908065" version="1" comment="castor-xml is &lt;0.9.5-326.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908066" version="1" comment="timidity is &lt;2.14.0-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908067" version="1" comment="gnome-settings-daemon is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908068" version="1" comment="gnome-settings-daemon-devel is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908069" version="1" comment="gnome-settings-daemon-lang is &lt;3.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908070" version="1" comment="libXfixes-devel is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908071" version="1" comment="libXfixes-devel-32bit is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908072" version="1" comment="libXfixes3 is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908073" version="1" comment="libXfixes3-32bit is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908074" version="1" comment="jython is &lt;2.2.1-16.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908075" version="1" comment="jython-demo is &lt;2.2.1-16.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908076" version="1" comment="jython-javadoc is &lt;2.2.1-16.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908077" version="1" comment="jython-manual is &lt;2.2.1-16.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908078" version="1" comment="dia is &lt;0.97.3-4.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908079" version="1" comment="dia-lang is &lt;0.97.3-4.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908080" version="1" comment="zoo is &lt;2.10-1025.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908081" version="1" comment="tomcat is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908082" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908083" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908084" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908085" version="1" comment="tomcat-embed is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908086" version="1" comment="tomcat-javadoc is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908087" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908088" version="1" comment="tomcat-jsvc is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908089" version="1" comment="tomcat-lib is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908090" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908091" version="1" comment="tomcat-webapps is &lt;8.0.36-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908092" version="1" comment="libpcre2-16-0 is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908093" version="1" comment="libpcre2-16-0-32bit is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908094" version="1" comment="libpcre2-32-0 is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908095" version="1" comment="libpcre2-32-0-32bit is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908096" version="1" comment="libpcre2-8-0 is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908097" version="1" comment="libpcre2-8-0-32bit is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908098" version="1" comment="libpcre2-posix1 is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908099" version="1" comment="libpcre2-posix1-32bit is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908100" version="1" comment="pcre2-devel is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908101" version="1" comment="pcre2-devel-static is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908102" version="1" comment="pcre2-doc is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908103" version="1" comment="pcre2-tools is &lt;10.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908104" version="1" comment="tkdiff is &lt;4.2-10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908105" version="1" comment="perl is &lt;5.24.0-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908106" version="1" comment="perl-32bit is &lt;5.24.0-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908107" version="1" comment="perl-base is &lt;5.24.0-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908108" version="1" comment="perl-base-32bit is &lt;5.24.0-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908109" version="1" comment="perl-doc is &lt;5.24.0-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908110" version="1" comment="python is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908111" version="1" comment="python-32bit is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908112" version="1" comment="python-curses is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908113" version="1" comment="python-demo is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908114" version="1" comment="python-gdbm is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908115" version="1" comment="python-idle is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908116" version="1" comment="python-tk is &lt;2.7.12-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908117" version="1" comment="libfreebl3 is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908118" version="1" comment="libfreebl3-32bit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908119" version="1" comment="libsoftokn3 is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908120" version="1" comment="libsoftokn3-32bit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908121" version="1" comment="mozilla-nss is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908122" version="1" comment="mozilla-nss-32bit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908123" version="1" comment="mozilla-nss-certs is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908124" version="1" comment="mozilla-nss-certs-32bit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908125" version="1" comment="mozilla-nss-devel is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908126" version="1" comment="mozilla-nss-sysinit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908127" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908128" version="1" comment="mozilla-nss-tools is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908129" version="1" comment="perl-Email-Address is &lt;1.908-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908130" version="1" comment="gdk-pixbuf-devel is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908131" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908132" version="1" comment="gdk-pixbuf-lang is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908133" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908134" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908135" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908136" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908137" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908138" version="1" comment="libid3tag-devel is &lt;0.15.1b-185.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908139" version="1" comment="libid3tag0 is &lt;0.15.1b-185.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908140" version="1" comment="libid3tag0-32bit is &lt;0.15.1b-185.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908141" version="1" comment="irssi is &lt;0.8.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908142" version="1" comment="irssi-devel is &lt;0.8.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908143" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908144" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908145" version="1" comment="libQt5Concurrent-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908146" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908147" version="1" comment="libQt5Concurrent5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908148" version="1" comment="libQt5Concurrent5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908149" version="1" comment="libQt5Core-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908150" version="1" comment="libQt5Core-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908151" version="1" comment="libQt5Core-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908152" version="1" comment="libQt5Core5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908153" version="1" comment="libQt5Core5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908154" version="1" comment="libQt5DBus-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908155" version="1" comment="libQt5DBus-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908156" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908157" version="1" comment="libQt5DBus5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908158" version="1" comment="libQt5DBus5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908159" version="1" comment="libQt5Gui-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908160" version="1" comment="libQt5Gui-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908161" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908162" version="1" comment="libQt5Gui5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908163" version="1" comment="libQt5Gui5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908164" version="1" comment="libQt5Network-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908165" version="1" comment="libQt5Network-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908166" version="1" comment="libQt5Network-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908167" version="1" comment="libQt5Network5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908168" version="1" comment="libQt5Network5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908169" version="1" comment="libQt5OpenGL-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908170" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908171" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908172" version="1" comment="libQt5OpenGL5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908173" version="1" comment="libQt5OpenGL5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908174" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908175" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908176" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908177" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908178" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908179" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908180" version="1" comment="libQt5PrintSupport-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908181" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908182" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908183" version="1" comment="libQt5PrintSupport5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908184" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908185" version="1" comment="libQt5Sql-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908186" version="1" comment="libQt5Sql-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908187" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908188" version="1" comment="libQt5Sql5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908189" version="1" comment="libQt5Sql5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908190" version="1" comment="libQt5Sql5-mysql is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908191" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908192" version="1" comment="libQt5Sql5-postgresql is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908193" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908194" version="1" comment="libQt5Sql5-sqlite is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908195" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908196" version="1" comment="libQt5Sql5-unixODBC is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908197" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908198" version="1" comment="libQt5Test-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908199" version="1" comment="libQt5Test-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908200" version="1" comment="libQt5Test-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908201" version="1" comment="libQt5Test5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908202" version="1" comment="libQt5Test5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908203" version="1" comment="libQt5Widgets-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908204" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908205" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908206" version="1" comment="libQt5Widgets5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908207" version="1" comment="libQt5Widgets5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908208" version="1" comment="libQt5Xml-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908209" version="1" comment="libQt5Xml-devel-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908210" version="1" comment="libQt5Xml5 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908211" version="1" comment="libQt5Xml5-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908212" version="1" comment="libqt5-qtbase-common-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908213" version="1" comment="libqt5-qtbase-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908214" version="1" comment="libqt5-qtbase-examples is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908215" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908216" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908217" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908218" version="1" comment="apache2-mod_wsgi is &lt;4.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908219" version="1" comment="apache2-mod_wsgi-python3 is &lt;4.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908220" version="1" comment="perl-Module-Signature is &lt;0.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908221" version="1" comment="imobiledevice-tools is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908222" version="1" comment="libimobiledevice-devel is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908223" version="1" comment="libimobiledevice-doc is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908224" version="1" comment="libimobiledevice6 is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908225" version="1" comment="libimobiledevice6-32bit is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908226" version="1" comment="python-imobiledevice is &lt;1.2.0-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908227" version="1" comment="tinyproxy is &lt;1.8.4-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908228" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908229" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908230" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908231" version="1" comment="libjavascriptcoregtk-3_0-0-32bit is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908232" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908233" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908234" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908235" version="1" comment="libwebkitgtk-3_0-0-32bit is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908236" version="1" comment="libwebkitgtk-devel is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908237" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908238" version="1" comment="libwebkitgtk3-devel is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908239" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908240" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908241" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908242" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908243" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908244" version="1" comment="webkit-jsc-1 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908245" version="1" comment="webkit-jsc-3 is &lt;2.4.11-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908246" version="1" comment="collectd is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908247" version="1" comment="collectd-plugin-dbi is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908248" version="1" comment="collectd-plugin-ipmi is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908249" version="1" comment="collectd-plugin-java is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908250" version="1" comment="collectd-plugin-memcachec is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908251" version="1" comment="collectd-plugin-mysql is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908252" version="1" comment="collectd-plugin-notify-desktop is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908253" version="1" comment="collectd-plugin-pinba is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908254" version="1" comment="collectd-plugin-postgresql is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908255" version="1" comment="collectd-plugin-python is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908256" version="1" comment="collectd-plugin-smart is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908257" version="1" comment="collectd-plugin-snmp is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908258" version="1" comment="collectd-plugin-virt is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908259" version="1" comment="collectd-plugins-all is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908260" version="1" comment="collectd-spamassassin is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908261" version="1" comment="collectd-web is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908262" version="1" comment="collectd-web-js is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908263" version="1" comment="libcollectdclient-devel is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908264" version="1" comment="libcollectdclient1 is &lt;5.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908265" version="1" comment="htmldoc is &lt;1.8.28-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908266" version="1" comment="pam_ssh is &lt;2.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908267" version="1" comment="pam_ssh-32bit is &lt;2.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908268" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-23.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908269" version="1" comment="gpgme is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908270" version="1" comment="libgpgme-devel is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908271" version="1" comment="libgpgme11 is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908272" version="1" comment="libgpgme11-32bit is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908273" version="1" comment="libgpgmepp-devel is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908274" version="1" comment="libgpgmepp6 is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908275" version="1" comment="libgpgmepp6-32bit is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908276" version="1" comment="libqgpgme-devel is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908277" version="1" comment="libqgpgme7 is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908278" version="1" comment="libqgpgme7-32bit is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908279" version="1" comment="python-gpg is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908280" version="1" comment="bind is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908281" version="1" comment="bind-chrootenv is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908282" version="1" comment="bind-devel is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908283" version="1" comment="bind-devel-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908284" version="1" comment="bind-doc is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908285" version="1" comment="bind-lwresd is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908286" version="1" comment="bind-utils is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908287" version="1" comment="idnkit is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908288" version="1" comment="idnkit-devel is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908289" version="1" comment="idnkit-devel-32bit is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908290" version="1" comment="libbind9-140 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908291" version="1" comment="libbind9-140-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908292" version="1" comment="libdns162 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908293" version="1" comment="libdns162-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908294" version="1" comment="libidnkit1 is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908295" version="1" comment="libidnkit1-32bit is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908296" version="1" comment="libidnkitlite1 is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908297" version="1" comment="libidnkitlite1-32bit is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908298" version="1" comment="libidnkitres1 is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908299" version="1" comment="libidnkitres1-32bit is &lt;1.0-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908300" version="1" comment="libirs-devel is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908301" version="1" comment="libirs141 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908302" version="1" comment="libirs141-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908303" version="1" comment="libisc160 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908304" version="1" comment="libisc160-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908305" version="1" comment="libisccc140 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908306" version="1" comment="libisccc140-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908307" version="1" comment="libisccfg140 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908308" version="1" comment="libisccfg140-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908309" version="1" comment="liblwres141 is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908310" version="1" comment="liblwres141-32bit is &lt;9.10.3P4-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908311" version="1" comment="proxychains-ng is &lt;4.11-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908312" version="1" comment="emacs is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908313" version="1" comment="emacs-el is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908314" version="1" comment="emacs-info is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908315" version="1" comment="emacs-nox is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908316" version="1" comment="emacs-x11 is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908317" version="1" comment="etags is &lt;25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908318" version="1" comment="libsndfile-progs is &lt;1.0.26-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908319" version="1" comment="python-keystoneclient is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908320" version="1" comment="python-keystoneclient-doc is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908321" version="1" comment="libmpfr4 is &lt;3.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908322" version="1" comment="libmpfr4-32bit is &lt;3.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908323" version="1" comment="mpfr-devel is &lt;3.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908324" version="1" comment="mpfr-devel-32bit is &lt;3.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908325" version="1" comment="gio-branding-upstream is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908326" version="1" comment="glib2-devel is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908327" version="1" comment="glib2-devel-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908328" version="1" comment="glib2-devel-static is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908329" version="1" comment="glib2-lang is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908330" version="1" comment="glib2-tools is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908331" version="1" comment="glib2-tools-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908332" version="1" comment="libgio-2_0-0 is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908333" version="1" comment="libgio-2_0-0-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908334" version="1" comment="libgio-fam is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908335" version="1" comment="libgio-fam-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908336" version="1" comment="libglib-2_0-0 is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908337" version="1" comment="libglib-2_0-0-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908338" version="1" comment="libgmodule-2_0-0 is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908339" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908340" version="1" comment="libgobject-2_0-0 is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908341" version="1" comment="libgobject-2_0-0-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908342" version="1" comment="libgthread-2_0-0 is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908343" version="1" comment="libgthread-2_0-0-32bit is &lt;2.50.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908344" version="1" comment="python-eyeD3 is &lt;0.7.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908345" version="1" comment="libvmtools-devel is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908346" version="1" comment="libvmtools0 is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908347" version="1" comment="open-vm-tools is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908348" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908349" version="1" comment="ibm-data-db2 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908350" version="1" comment="libmono-2_0-1 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908351" version="1" comment="libmono-2_0-devel is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908352" version="1" comment="libmonoboehm-2_0-1 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908353" version="1" comment="libmonoboehm-2_0-devel is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908354" version="1" comment="libmonosgen-2_0-1 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908355" version="1" comment="libmonosgen-2_0-devel is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908356" version="1" comment="mono-complete is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908357" version="1" comment="mono-core is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908358" version="1" comment="mono-data is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908359" version="1" comment="mono-data-oracle is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908360" version="1" comment="mono-data-sqlite is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908361" version="1" comment="mono-devel is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908362" version="1" comment="mono-extras is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908363" version="1" comment="mono-locale-extras is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908364" version="1" comment="mono-mvc is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908365" version="1" comment="mono-nunit is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908366" version="1" comment="mono-reactive is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908367" version="1" comment="mono-wcf is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908368" version="1" comment="mono-web is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908369" version="1" comment="mono-winforms is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908370" version="1" comment="mono-winfxcore is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908371" version="1" comment="monodoc-core is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908372" version="1" comment="libbotan-1_10-1 is &lt;1.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908373" version="1" comment="libbotan-1_10-1-32bit is &lt;1.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908374" version="1" comment="libbotan-devel is &lt;1.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908375" version="1" comment="libbotan-devel-32bit is &lt;1.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908376" version="1" comment="darktable is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908377" version="1" comment="darktable-doc is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908378" version="1" comment="fossil is &lt;1.35-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908379" version="1" comment="unzip is &lt;6.00-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908380" version="1" comment="unzip-doc is &lt;6.00-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908381" version="1" comment="unzip-rcc is &lt;6.00-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908382" version="1" comment="libruby2_2-2_2 is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908383" version="1" comment="ruby2.2 is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908384" version="1" comment="ruby2.2-devel is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908385" version="1" comment="ruby2.2-devel-extra is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908386" version="1" comment="ruby2.2-doc is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908387" version="1" comment="ruby2.2-doc-ri is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908388" version="1" comment="ruby2.2-stdlib is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908389" version="1" comment="ruby2.2-tk is &lt;2.2.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908390" version="1" comment="python3-requests is &lt;2.11.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908391" version="1" comment="xfig is &lt;3.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908392" version="1" comment="perl-Tk is &lt;804.033-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908393" version="1" comment="perl-Tk-devel is &lt;804.033-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908394" version="1" comment="freeimage-devel is &lt;3.17.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908395" version="1" comment="libfreeimage3 is &lt;3.17.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908396" version="1" comment="libfreeimageplus3 is &lt;3.17.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908397" version="1" comment="bouncycastle is &lt;1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908398" version="1" comment="bouncycastle-javadoc is &lt;1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908399" version="1" comment="froxlor is &lt;0.9.38.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908400" version="1" comment="apache2-mod_jk is &lt;1.2.41-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908401" version="1" comment="prosody is &lt;0.9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908402" version="1" comment="lhasa is &lt;0.3.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908403" version="1" comment="lhasa-devel is &lt;0.3.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908404" version="1" comment="liblhasa0 is &lt;0.3.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908405" version="1" comment="roundcubemail is &lt;1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908406" version="1" comment="perl-HTTP-Body is &lt;1.22-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908407" version="1" comment="syslog-ng is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908408" version="1" comment="syslog-ng-curl is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908409" version="1" comment="syslog-ng-devel is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908410" version="1" comment="syslog-ng-geoip is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908411" version="1" comment="syslog-ng-java is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908412" version="1" comment="syslog-ng-python is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908413" version="1" comment="syslog-ng-redis is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908414" version="1" comment="syslog-ng-smtp is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908415" version="1" comment="syslog-ng-sql is &lt;3.8.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908416" version="1" comment="privoxy is &lt;3.0.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908417" version="1" comment="privoxy-doc is &lt;3.0.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908418" version="1" comment="libudisks2-0 is &lt;2.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908419" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908420" version="1" comment="udisks2 is &lt;2.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908421" version="1" comment="udisks2-devel is &lt;2.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908422" version="1" comment="udisks2-lang is &lt;2.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908423" version="1" comment="libneon-devel is &lt;0.30.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908424" version="1" comment="libneon27 is &lt;0.30.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908425" version="1" comment="libneon27-32bit is &lt;0.30.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908426" version="1" comment="kio-extras5 is &lt;16.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908427" version="1" comment="kwebkitpart is &lt;1.3.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908428" version="1" comment="kwebkitpart-lang is &lt;1.3.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908429" version="1" comment="rsyslog is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908430" version="1" comment="rsyslog-diag-tools is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908431" version="1" comment="rsyslog-doc is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908432" version="1" comment="rsyslog-module-dbi is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908433" version="1" comment="rsyslog-module-elasticsearch is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908434" version="1" comment="rsyslog-module-gcrypt is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908435" version="1" comment="rsyslog-module-gssapi is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908436" version="1" comment="rsyslog-module-gtls is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908437" version="1" comment="rsyslog-module-guardtime is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908438" version="1" comment="rsyslog-module-mmnormalize is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908439" version="1" comment="rsyslog-module-mysql is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908440" version="1" comment="rsyslog-module-omamqp1 is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908441" version="1" comment="rsyslog-module-omhttpfs is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908442" version="1" comment="rsyslog-module-omtcl is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908443" version="1" comment="rsyslog-module-pgsql is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908444" version="1" comment="rsyslog-module-relp is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908445" version="1" comment="rsyslog-module-snmp is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908446" version="1" comment="rsyslog-module-udpspoof is &lt;8.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908447" version="1" comment="wpa_supplicant is &lt;2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908448" version="1" comment="wpa_supplicant-gui is &lt;2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908449" version="1" comment="ibus-chewing is &lt;1.4.14-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908450" version="1" comment="ibus-pinyin is &lt;1.5.0-12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908451" version="1" comment="ruby2.2-rubygem-hub is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908452" version="1" comment="ruby2.2-rubygem-hub-doc is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908453" version="1" comment="ruby2.3-rubygem-hub is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908454" version="1" comment="ruby2.3-rubygem-hub-doc is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908455" version="1" comment="rubygem-hub is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908456" version="1" comment="rubygem-hub-bash-completion is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908457" version="1" comment="rubygem-hub-zsh-completion is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908458" version="1" comment="bogofilter-common is &lt;1.2.4-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908459" version="1" comment="bogofilter-db is &lt;1.2.4-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908460" version="1" comment="bogofilter-doc is &lt;1.2.4-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908461" version="1" comment="bogofilter-kyotocabinet is &lt;1.2.4-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908462" version="1" comment="bogofilter-sqlite3 is &lt;1.2.4-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908463" version="1" comment="obex-data-server is &lt;0.4.6-15.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908464" version="1" comment="cvs is &lt;1.12.12-183.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908465" version="1" comment="cvs-doc is &lt;1.12.12-183.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908466" version="1" comment="GraphicsMagick is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908467" version="1" comment="GraphicsMagick-devel is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908468" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908469" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908470" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908471" version="1" comment="libGraphicsMagick3-config is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908472" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908473" version="1" comment="perl-GraphicsMagick is &lt;1.3.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908474" version="1" comment="systemtap is &lt;3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908475" version="1" comment="systemtap-runtime is &lt;3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908476" version="1" comment="systemtap-sdt-devel is &lt;3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908477" version="1" comment="systemtap-server is &lt;3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908478" version="1" comment="libpacemaker-devel is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908479" version="1" comment="libpacemaker3 is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908480" version="1" comment="pacemaker is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908481" version="1" comment="pacemaker-cli is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908482" version="1" comment="pacemaker-cts is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908483" version="1" comment="pacemaker-remote is &lt;1.1.15+git20161104.b6f251a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908484" version="1" comment="libass-devel is &lt;0.13.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908485" version="1" comment="libass5 is &lt;0.13.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908486" version="1" comment="libass5-32bit is &lt;0.13.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908487" version="1" comment="kcoreaddons is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908488" version="1" comment="kcoreaddons-devel is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908489" version="1" comment="kcoreaddons-devel-32bit is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908490" version="1" comment="kcoreaddons-lang is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908491" version="1" comment="libKF5CoreAddons5 is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908492" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908493" version="1" comment="libexif-devel is &lt;0.6.21-10.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908494" version="1" comment="libexif12 is &lt;0.6.21-10.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908495" version="1" comment="libexif12-32bit is &lt;0.6.21-10.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908496" version="1" comment="python3-Pillow is &lt;3.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908497" version="1" comment="python3-Pillow-tk is &lt;3.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908498" version="1" comment="ruby2.2-rubygem-jquery-rails is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908499" version="1" comment="ruby2.2-rubygem-jquery-rails-doc is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908500" version="1" comment="ruby2.2-rubygem-jquery-rails-testsuite is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908501" version="1" comment="ruby2.3-rubygem-jquery-rails is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908502" version="1" comment="ruby2.3-rubygem-jquery-rails-doc is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908503" version="1" comment="ruby2.3-rubygem-jquery-rails-testsuite is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908504" version="1" comment="hyper-v is &lt;6-17.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908505" version="1" comment="libmodplug-devel is &lt;0.8.8.5-4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908506" version="1" comment="libmodplug1 is &lt;0.8.8.5-4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908507" version="1" comment="libmodplug1-32bit is &lt;0.8.8.5-4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908508" version="1" comment="atheme is &lt;7.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908509" version="1" comment="atheme-devel is &lt;7.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908510" version="1" comment="libathemecore1 is &lt;7.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908511" version="1" comment="perl-XML-LibXML is &lt;2.0128-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908512" version="1" comment="dbus-1 is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908513" version="1" comment="dbus-1-devel is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908514" version="1" comment="dbus-1-devel-32bit is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908515" version="1" comment="dbus-1-devel-doc is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908516" version="1" comment="dbus-1-x11 is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908517" version="1" comment="libdbus-1-3 is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908518" version="1" comment="libdbus-1-3-32bit is &lt;1.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908519" version="1" comment="xorg-x11-server is &lt;7.6_1.18.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908520" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908521" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908522" version="1" comment="xorg-x11-server-source is &lt;7.6_1.18.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908523" version="1" comment="xorg-x11-server-wayland is &lt;7.6_1.18.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908524" version="1" comment="xf86-video-intel is &lt;2.99.917.703_b45dbdb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908525" version="1" comment="xf86-video-intel-32bit is &lt;2.99.917.703_b45dbdb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908526" version="1" comment="perl-YAML-LibYAML is &lt;0.59-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908527" version="1" comment="pam_krb5 is &lt;2.4.4-6.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908528" version="1" comment="pam_krb5-32bit is &lt;2.4.4-6.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908529" version="1" comment="gnome-photos is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908530" version="1" comment="gnome-photos-lang is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908531" version="1" comment="gnome-shell-search-provider-gnome-photos is &lt;3.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908532" version="1" comment="gtk2-branding-upstream is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908533" version="1" comment="gtk2-data is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908534" version="1" comment="gtk2-devel is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908535" version="1" comment="gtk2-devel-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908536" version="1" comment="gtk2-immodule-amharic is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908537" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908538" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908539" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908540" version="1" comment="gtk2-immodule-multipress is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908541" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908542" version="1" comment="gtk2-immodule-thai is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908543" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908544" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908545" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908546" version="1" comment="gtk2-immodule-xim is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908547" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908548" version="1" comment="gtk2-immodules-tigrigna is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908549" version="1" comment="gtk2-immodules-tigrigna-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908550" version="1" comment="gtk2-lang is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908551" version="1" comment="gtk2-tools is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908552" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908553" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908554" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908555" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908556" version="1" comment="perl-Archive-Extract is &lt;0.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908557" version="1" comment="perl-HTTP-Tiny is &lt;0.070-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908558" version="1" comment="perl-Module-Load-Conditional is &lt;0.68-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908559" version="1" comment="gypsy is &lt;0.9-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908560" version="1" comment="libgypsy-devel is &lt;0.9-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908561" version="1" comment="libgypsy0 is &lt;0.9-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908562" version="1" comment="libgypsy0-32bit is &lt;0.9-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908563" version="1" comment="getmail is &lt;4.46.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908564" version="1" comment="getmail-doc is &lt;4.46.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908565" version="1" comment="rxvt-unicode is &lt;9.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908566" version="1" comment="kinit is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908567" version="1" comment="kinit-32bit is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908568" version="1" comment="kinit-devel is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908569" version="1" comment="kinit-lang is &lt;5.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908570" version="1" comment="bitcoin-qt5 is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908571" version="1" comment="bitcoin-test is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908572" version="1" comment="bitcoin-utils is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908573" version="1" comment="bitcoind is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908574" version="1" comment="libbitcoinconsensus-devel is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908575" version="1" comment="libbitcoinconsensus0 is &lt;0.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908576" version="1" comment="sslscan is &lt;1.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908577" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2h-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908578" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2h-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908579" version="1" comment="libmxml1 is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908580" version="1" comment="libmxml1-32bit is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908581" version="1" comment="mxml is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908582" version="1" comment="mxml-devel is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908583" version="1" comment="links is &lt;2.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908584" version="1" comment="docker is &lt;1.12.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908585" version="1" comment="docker-bash-completion is &lt;1.12.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908586" version="1" comment="docker-test is &lt;1.12.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908587" version="1" comment="docker-zsh-completion is &lt;1.12.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908588" version="1" comment="procmail is &lt;3.22-270.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908589" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908590" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908591" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908592" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908593" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908594" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908595" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908596" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908597" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908598" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908599" version="1" comment="DirectFB is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908600" version="1" comment="DirectFB-Mesa is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908601" version="1" comment="DirectFB-devel is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908602" version="1" comment="DirectFB-devel-32bit is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908603" version="1" comment="DirectFB-doc is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908604" version="1" comment="DirectFB-libSDL is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908605" version="1" comment="DirectFB-libvncclient is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908606" version="1" comment="lib++dfb-1_7-7 is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908607" version="1" comment="lib++dfb-devel is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908608" version="1" comment="libdirectfb-1_7-7 is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908609" version="1" comment="libdirectfb-1_7-7-32bit is &lt;1.7.7-5.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908610" version="1" comment="libpython2_7-1_0 is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908611" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908612" version="1" comment="python-base is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908613" version="1" comment="python-base-32bit is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908614" version="1" comment="python-devel is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908615" version="1" comment="python-xml is &lt;2.7.12-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908616" version="1" comment="pdns-recursor is &lt;4.0.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908617" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908618" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908619" version="1" comment="subversion is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908620" version="1" comment="subversion-bash-completion is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908621" version="1" comment="subversion-devel is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908622" version="1" comment="subversion-perl is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908623" version="1" comment="subversion-python is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908624" version="1" comment="subversion-python-ctypes is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908625" version="1" comment="subversion-ruby is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908626" version="1" comment="subversion-server is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908627" version="1" comment="subversion-tools is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908628" version="1" comment="freexl-devel is &lt;1.0.2-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908629" version="1" comment="libfreexl1 is &lt;1.0.2-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908630" version="1" comment="python3-urllib3 is &lt;1.18.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908631" version="1" comment="jbigkit is &lt;2.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908632" version="1" comment="libjbig-devel is &lt;2.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908633" version="1" comment="libjbig-devel-32bit is &lt;2.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908634" version="1" comment="libjbig2 is &lt;2.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908635" version="1" comment="libjbig2-32bit is &lt;2.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908636" version="1" comment="cpp5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908637" version="1" comment="cross-aarch64-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908638" version="1" comment="cross-aarch64-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908639" version="1" comment="cross-armv6hl-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908640" version="1" comment="cross-armv6hl-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908641" version="1" comment="cross-armv7hl-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908642" version="1" comment="cross-armv7hl-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908643" version="1" comment="cross-avr-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908644" version="1" comment="cross-avr-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908645" version="1" comment="cross-i386-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908646" version="1" comment="cross-i386-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908647" version="1" comment="cross-m68k-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908648" version="1" comment="cross-m68k-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908649" version="1" comment="cross-ppc64-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908650" version="1" comment="cross-ppc64-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908651" version="1" comment="cross-ppc64le-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908652" version="1" comment="cross-ppc64le-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908653" version="1" comment="cross-s390-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908654" version="1" comment="cross-s390-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908655" version="1" comment="cross-s390x-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908656" version="1" comment="cross-s390x-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908657" version="1" comment="cross-sparc-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908658" version="1" comment="cross-sparc64-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908659" version="1" comment="cross-sparc64-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908660" version="1" comment="cross-sparcv9-gcc5-icecream-backend is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908661" version="1" comment="gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908662" version="1" comment="gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908663" version="1" comment="gcc5-ada is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908664" version="1" comment="gcc5-ada-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908665" version="1" comment="gcc5-c++ is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908666" version="1" comment="gcc5-c++-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908667" version="1" comment="gcc5-fortran is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908668" version="1" comment="gcc5-fortran-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908669" version="1" comment="gcc5-gij is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908670" version="1" comment="gcc5-gij-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908671" version="1" comment="gcc5-go is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908672" version="1" comment="gcc5-go-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908673" version="1" comment="gcc5-info is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908674" version="1" comment="gcc5-java is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908675" version="1" comment="gcc5-locale is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908676" version="1" comment="gcc5-obj-c++ is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908677" version="1" comment="gcc5-obj-c++-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908678" version="1" comment="gcc5-objc is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908679" version="1" comment="gcc5-objc-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908680" version="1" comment="gcc5-testresults is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908681" version="1" comment="libada5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908682" version="1" comment="libada5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908683" version="1" comment="libasan2 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908684" version="1" comment="libasan2-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908685" version="1" comment="libatomic1-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908686" version="1" comment="libatomic1-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908687" version="1" comment="libcilkrts5-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908688" version="1" comment="libcilkrts5-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908689" version="1" comment="libffi-devel-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908690" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908691" version="1" comment="libffi4 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908692" version="1" comment="libffi4-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908693" version="1" comment="libgcc_s1-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908694" version="1" comment="libgcc_s1-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908695" version="1" comment="libgcj-devel-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908696" version="1" comment="libgcj-devel-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908697" version="1" comment="libgcj-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908698" version="1" comment="libgcj-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908699" version="1" comment="libgcj-jar-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908700" version="1" comment="libgcj_bc1-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908701" version="1" comment="libgfortran3-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908702" version="1" comment="libgfortran3-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908703" version="1" comment="libgo7 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908704" version="1" comment="libgo7-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908705" version="1" comment="libgomp1-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908706" version="1" comment="libgomp1-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908707" version="1" comment="libitm1-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908708" version="1" comment="libitm1-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908709" version="1" comment="liblsan0-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908710" version="1" comment="libmpx0 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908711" version="1" comment="libmpx0-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908712" version="1" comment="libmpxwrappers0 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908713" version="1" comment="libmpxwrappers0-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908714" version="1" comment="libobjc4-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908715" version="1" comment="libobjc4-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908716" version="1" comment="libquadmath0-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908717" version="1" comment="libquadmath0-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908718" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908719" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908720" version="1" comment="libstdc++6-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908721" version="1" comment="libstdc++6-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908722" version="1" comment="libstdc++6-gcc5-doc is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908723" version="1" comment="libstdc++6-gcc5-locale is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908724" version="1" comment="libtsan0-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908725" version="1" comment="libubsan0-gcc5 is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908726" version="1" comment="libubsan0-gcc5-32bit is &lt;5.4.1+r240125-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908727" version="1" comment="python-mysql-connector-python is &lt;2.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908728" version="1" comment="alsa is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908729" version="1" comment="alsa-devel is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908730" version="1" comment="alsa-devel-32bit is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908731" version="1" comment="alsa-docs is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908732" version="1" comment="libasound2 is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908733" version="1" comment="libasound2-32bit is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908734" version="1" comment="perl-CGI-Simple is &lt;1.115-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908735" version="1" comment="libotr-devel is &lt;4.1.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908736" version="1" comment="libotr-tools is &lt;4.1.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908737" version="1" comment="libotr5 is &lt;4.1.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908738" version="1" comment="gajim is &lt;0.16.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908739" version="1" comment="gajim-lang is &lt;0.16.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908740" version="1" comment="rsync is &lt;3.1.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908741" version="1" comment="ruby2.2-rubygem-nokogiri is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908742" version="1" comment="ruby2.2-rubygem-nokogiri-doc is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908743" version="1" comment="ruby2.2-rubygem-nokogiri-testsuite is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908744" version="1" comment="ruby2.3-rubygem-nokogiri is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908745" version="1" comment="ruby2.3-rubygem-nokogiri-doc is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908746" version="1" comment="ruby2.3-rubygem-nokogiri-testsuite is &lt;1.6.8.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908747" version="1" comment="opie is &lt;2.4-726.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908748" version="1" comment="opie-32bit is &lt;2.4-726.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908749" version="1" comment="sudo is &lt;1.8.18p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908750" version="1" comment="sudo-devel is &lt;1.8.18p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908751" version="1" comment="sudo-test is &lt;1.8.18p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908752" version="1" comment="redis is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908753" version="1" comment="openconnect is &lt;7.07-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908754" version="1" comment="openconnect-devel is &lt;7.07-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908755" version="1" comment="openconnect-doc is &lt;7.07-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908756" version="1" comment="openconnect-lang is &lt;7.07-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908757" version="1" comment="libtiff-devel is &lt;4.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908758" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908759" version="1" comment="libtiff5 is &lt;4.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908760" version="1" comment="libtiff5-32bit is &lt;4.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908761" version="1" comment="tiff is &lt;4.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908762" version="1" comment="coolkey is &lt;1.1.0-150.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908763" version="1" comment="coolkey-32bit is &lt;1.1.0-150.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908764" version="1" comment="coolkey-devel is &lt;1.1.0-150.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908765" version="1" comment="ldns is &lt;1.6.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908766" version="1" comment="ldns-devel is &lt;1.6.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908767" version="1" comment="libldns1 is &lt;1.6.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908768" version="1" comment="perl-DNS-LDNS is &lt;1.6.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908769" version="1" comment="python-ldns is &lt;1.6.17-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908770" version="1" comment="rtkit is &lt;0.11+git.20130926-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908771" version="1" comment="radvd is &lt;2.11-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908772" version="1" comment="libXext-devel is &lt;1.3.3-3.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908773" version="1" comment="libXext-devel-32bit is &lt;1.3.3-3.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908774" version="1" comment="libXext6 is &lt;1.3.3-3.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908775" version="1" comment="libXext6-32bit is &lt;1.3.3-3.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908776" version="1" comment="gnome-keyring is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908777" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908778" version="1" comment="gnome-keyring-lang is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908779" version="1" comment="gnome-keyring-pam is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908780" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908781" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908782" version="1" comment="mailx is &lt;12.5-24.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908783" version="1" comment="squidGuard is &lt;1.4-27.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908784" version="1" comment="squidGuard-doc is &lt;1.4-27.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908785" version="1" comment="openttd is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908786" version="1" comment="openttd-data is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908787" version="1" comment="openttd-dedicated is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908788" version="1" comment="apache2-mod_fcgid is &lt;2.3.9-7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908789" version="1" comment="ruby2.2-rubygem-facter is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908790" version="1" comment="ruby2.2-rubygem-facter-doc is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908791" version="1" comment="ruby2.2-rubygem-facter-testsuite is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908792" version="1" comment="ruby2.2-rubygem-hiera is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908793" version="1" comment="ruby2.2-rubygem-hiera-doc is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908794" version="1" comment="ruby2.2-rubygem-hiera-testsuite is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908795" version="1" comment="ruby2.3-rubygem-facter is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908796" version="1" comment="ruby2.3-rubygem-facter-doc is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908797" version="1" comment="ruby2.3-rubygem-facter-testsuite is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908798" version="1" comment="ruby2.3-rubygem-hiera is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908799" version="1" comment="ruby2.3-rubygem-hiera-doc is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908800" version="1" comment="ruby2.3-rubygem-hiera-testsuite is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908801" version="1" comment="rubygem-facter is &lt;2.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908802" version="1" comment="rubygem-hiera is &lt;1.3.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908803" version="1" comment="libidn-devel is &lt;1.33-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908804" version="1" comment="libidn-tools is &lt;1.33-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908805" version="1" comment="libidn11 is &lt;1.33-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908806" version="1" comment="libidn11-32bit is &lt;1.33-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908807" version="1" comment="libidn2-0 is &lt;0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908808" version="1" comment="libidn2-0-32bit is &lt;0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908809" version="1" comment="libidn2-devel is &lt;0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908810" version="1" comment="libidn2-tools is &lt;0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908811" version="1" comment="python-Pillow is &lt;3.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908812" version="1" comment="python-Pillow-tk is &lt;3.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908813" version="1" comment="libapr-util1 is &lt;1.5.4-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908814" version="1" comment="libapr-util1-dbd-mysql is &lt;1.5.4-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908815" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.5.4-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908816" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.4-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908817" version="1" comment="libapr-util1-devel is &lt;1.5.4-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908818" version="1" comment="libserf-1-1 is &lt;1.3.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908819" version="1" comment="libserf-devel is &lt;1.3.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908820" version="1" comment="elfutils is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908821" version="1" comment="elfutils-lang is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908822" version="1" comment="libasm-devel is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908823" version="1" comment="libasm1 is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908824" version="1" comment="libasm1-32bit is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908825" version="1" comment="libdw-devel is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908826" version="1" comment="libdw1 is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908827" version="1" comment="libdw1-32bit is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908828" version="1" comment="libebl-devel is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908829" version="1" comment="libebl1 is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908830" version="1" comment="libebl1-32bit is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908831" version="1" comment="libelf-devel is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908832" version="1" comment="libelf-devel-32bit is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908833" version="1" comment="libelf1 is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908834" version="1" comment="libelf1-32bit is &lt;0.167-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908835" version="1" comment="clamav is &lt;0.99.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908836" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908837" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908838" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908839" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908840" version="1" comment="libwebkit2gtk3-lang is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908841" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908842" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908843" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908844" version="1" comment="webkit-jsc-4 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908845" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908846" version="1" comment="webkit2gtk3-devel is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908847" version="1" comment="webkit2gtk3-plugin-process-gtk2 is &lt;2.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908848" version="1" comment="nbd is &lt;3.13-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908849" version="1" comment="nbd-doc is &lt;3.13-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908850" version="1" comment="ruby2.2-rubygem-activesupport-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908851" version="1" comment="ruby2.2-rubygem-activesupport-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908852" version="1" comment="ruby2.2-rubygem-activesupport-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908853" version="1" comment="ruby2.2-rubygem-activesupport-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908854" version="1" comment="ruby2.3-rubygem-activesupport-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908855" version="1" comment="ruby2.3-rubygem-activesupport-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908856" version="1" comment="ruby2.3-rubygem-activesupport-doc-4_2 is &lt;4.2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908857" version="1" comment="ruby2.3-rubygem-activesupport-doc-5_0 is &lt;5.0.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908858" version="1" comment="csound is &lt;5.18.02-7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908859" version="1" comment="csound-devel is &lt;5.18.02-7.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908860" version="1" comment="gv is &lt;3.7.4-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908861" version="1" comment="wdiff is &lt;1.2.2-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908862" version="1" comment="wdiff-lang is &lt;1.2.2-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908863" version="1" comment="gromacs is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908864" version="1" comment="gromacs-bash is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908865" version="1" comment="gromacs-devel is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908866" version="1" comment="gromacs-doc is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908867" version="1" comment="gromacs-openmpi is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908868" version="1" comment="libgromacs2 is &lt;2016.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908869" version="1" comment="libpango-1_0-0 is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908870" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908871" version="1" comment="pango-devel is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908872" version="1" comment="pango-devel-32bit is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908873" version="1" comment="pango-tools is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908874" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908875" version="1" comment="strongswan is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908876" version="1" comment="strongswan-doc is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908877" version="1" comment="strongswan-hmac is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908878" version="1" comment="strongswan-ipsec is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908879" version="1" comment="strongswan-libs0 is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908880" version="1" comment="strongswan-mysql is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908881" version="1" comment="strongswan-nm is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908882" version="1" comment="strongswan-sqlite is &lt;5.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908883" version="1" comment="httrack is &lt;3.48.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908884" version="1" comment="httrack-devel is &lt;3.48.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908885" version="1" comment="libhttrack2 is &lt;3.48.22-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908886" version="1" comment="ruby2.2-rubygem-puppet is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908887" version="1" comment="ruby2.2-rubygem-puppet-doc is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908888" version="1" comment="ruby2.2-rubygem-puppet-testsuite is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908889" version="1" comment="ruby2.3-rubygem-puppet is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908890" version="1" comment="ruby2.3-rubygem-puppet-doc is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908891" version="1" comment="ruby2.3-rubygem-puppet-testsuite is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908892" version="1" comment="rubygem-puppet is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908893" version="1" comment="rubygem-puppet-emacs is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908894" version="1" comment="rubygem-puppet-master is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908895" version="1" comment="rubygem-puppet-master-unicorn is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908896" version="1" comment="rubygem-puppet-vim is &lt;3.8.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908897" version="1" comment="curl is &lt;7.79.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908898" version="1" comment="libcurl-devel is &lt;7.79.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908899" version="1" comment="libcurl-devel-32bit is &lt;7.79.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908900" version="1" comment="libcurl4 is &lt;7.79.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908901" version="1" comment="libcurl4-32bit is &lt;7.79.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908902" version="1" comment="frr is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908903" version="1" comment="frr-devel is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908904" version="1" comment="libfrr0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908905" version="1" comment="libfrr_pb0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908906" version="1" comment="libfrrcares0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908907" version="1" comment="libfrrfpm_pb0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908908" version="1" comment="libfrrospfapiclient0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908909" version="1" comment="libfrrsnmp0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908910" version="1" comment="libfrrzmq0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908911" version="1" comment="libmlag_pb0 is &lt;7.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908912" version="1" comment="icecast is &lt;2.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908913" version="1" comment="icecast-doc is &lt;2.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908914" version="1" comment="lighttpd is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908915" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908916" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908917" version="1" comment="lighttpd-mod_authn_mysql is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908918" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908919" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908920" version="1" comment="lighttpd-mod_cml is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908921" version="1" comment="lighttpd-mod_magnet is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908922" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908923" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908924" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908925" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908926" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908927" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908928" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908929" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908930" version="1" comment="lighttpd-mod_webdav is &lt;1.4.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908931" version="1" comment="mercurial is &lt;5.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908932" version="1" comment="mercurial-lang is &lt;5.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908933" version="1" comment="mercurial-tests is &lt;5.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908934" version="1" comment="ocaml is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908935" version="1" comment="ocaml-compiler-libs is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908936" version="1" comment="ocaml-compiler-libs-devel is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908937" version="1" comment="ocaml-ocamldoc is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908938" version="1" comment="ocaml-runtime is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908939" version="1" comment="ocaml-source is &lt;4.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908940" version="1" comment="rawtherapee is &lt;5.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908941" version="1" comment="rmt-server is &lt;2.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908942" version="1" comment="rmt-server-config is &lt;2.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908943" version="1" comment="rmt-server-pubcloud is &lt;2.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908944" version="1" comment="seamonkey is &lt;2.53.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908945" version="1" comment="seamonkey-dom-inspector is &lt;2.53.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908946" version="1" comment="seamonkey-irc is &lt;2.53.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908947" version="1" comment="libXvnc-devel is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908948" version="1" comment="libXvnc1 is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908949" version="1" comment="tigervnc is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908950" version="1" comment="tigervnc-x11vnc is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908951" version="1" comment="xorg-x11-Xvnc is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908952" version="1" comment="xorg-x11-Xvnc-java is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908953" version="1" comment="xorg-x11-Xvnc-module is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908954" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.10.1-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908955" version="1" comment="xstream is &lt;1.4.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908956" version="1" comment="xstream-benchmark is &lt;1.4.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908957" version="1" comment="xstream-javadoc is &lt;1.4.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908958" version="1" comment="xstream-parent is &lt;1.4.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908959" version="1" comment="389-ds is &lt;2.0.10~git0.21dd2802c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908960" version="1" comment="389-ds-devel is &lt;2.0.10~git0.21dd2802c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908961" version="1" comment="389-ds-snmp is &lt;2.0.10~git0.21dd2802c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908962" version="1" comment="lib389 is &lt;2.0.10~git0.21dd2802c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908963" version="1" comment="libsvrcore0 is &lt;2.0.10~git0.21dd2802c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908964" version="1" comment="Botan is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908965" version="1" comment="Botan-doc is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908966" version="1" comment="libbotan-2-18 is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908967" version="1" comment="libbotan-2-18-32bit is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908968" version="1" comment="libbotan-devel is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908969" version="1" comment="libbotan-devel-32bit is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908970" version="1" comment="python3-botan is &lt;2.18.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908971" version="1" comment="FlightGear is &lt;2020.3.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908972" version="1" comment="GraphicsMagick is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908973" version="1" comment="GraphicsMagick-devel is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908974" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908975" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908976" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908977" version="1" comment="libGraphicsMagick3-config is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908978" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908979" version="1" comment="perl-GraphicsMagick is &lt;1.3.36-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908980" version="1" comment="ImageMagick is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908981" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908982" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908983" version="1" comment="ImageMagick-devel is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908984" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908985" version="1" comment="ImageMagick-doc is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908986" version="1" comment="ImageMagick-extra is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908987" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908988" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908989" version="1" comment="libMagick++-devel is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908990" version="1" comment="libMagick++-devel-32bit is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908991" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908992" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908993" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908994" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908995" version="1" comment="perl-PerlMagick is &lt;7.1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908996" version="1" comment="LibVNCServer-devel is &lt;0.9.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908997" version="1" comment="libvncclient1 is &lt;0.9.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908998" version="1" comment="libvncserver1 is &lt;0.9.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009908999" version="1" comment="Mesa is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909000" version="1" comment="Mesa-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909001" version="1" comment="Mesa-KHR-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909002" version="1" comment="Mesa-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909003" version="1" comment="Mesa-dri-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909004" version="1" comment="Mesa-libEGL-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909005" version="1" comment="Mesa-libEGL-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909006" version="1" comment="Mesa-libEGL1 is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909007" version="1" comment="Mesa-libEGL1-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909008" version="1" comment="Mesa-libGL-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909009" version="1" comment="Mesa-libGL-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909010" version="1" comment="Mesa-libGL1 is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909011" version="1" comment="Mesa-libGL1-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909012" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909013" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909014" version="1" comment="Mesa-libGLESv2-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909015" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909016" version="1" comment="Mesa-libGLESv3-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909017" version="1" comment="Mesa-libglapi-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909018" version="1" comment="Mesa-libglapi-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909019" version="1" comment="Mesa-libglapi0 is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909020" version="1" comment="Mesa-libglapi0-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909021" version="1" comment="libOSMesa-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909022" version="1" comment="libOSMesa-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909023" version="1" comment="libOSMesa8 is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909024" version="1" comment="libOSMesa8-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909025" version="1" comment="libgbm-devel is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909026" version="1" comment="libgbm-devel-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909027" version="1" comment="libgbm1 is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909028" version="1" comment="libgbm1-32bit is &lt;21.2.2-287.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909029" version="1" comment="MozillaFirefox is &lt;92.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909030" version="1" comment="MozillaFirefox-branding-upstream is &lt;92.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909031" version="1" comment="MozillaFirefox-devel is &lt;92.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909032" version="1" comment="MozillaFirefox-translations-common is &lt;92.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909033" version="1" comment="MozillaFirefox-translations-other is &lt;92.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909034" version="1" comment="MozillaThunderbird is &lt;91.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909035" version="1" comment="MozillaThunderbird-translations-common is &lt;91.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909036" version="1" comment="MozillaThunderbird-translations-other is &lt;91.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909037" version="1" comment="NetworkManager is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909038" version="1" comment="NetworkManager-branding-upstream is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909039" version="1" comment="NetworkManager-devel is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909040" version="1" comment="NetworkManager-devel-32bit is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909041" version="1" comment="NetworkManager-lang is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909042" version="1" comment="libnm0 is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909043" version="1" comment="libnm0-32bit is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909044" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.32.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909045" version="1" comment="NetworkManager-applet is &lt;1.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909046" version="1" comment="NetworkManager-applet-lang is &lt;1.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909047" version="1" comment="NetworkManager-connection-editor is &lt;1.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909048" version="1" comment="NetworkManager-vpnc is &lt;1.2.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909049" version="1" comment="NetworkManager-vpnc-gnome is &lt;1.2.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909050" version="1" comment="NetworkManager-vpnc-lang is &lt;1.2.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909051" version="1" comment="PackageKit is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909052" version="1" comment="PackageKit-backend-dnf is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909053" version="1" comment="PackageKit-backend-zypp is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909054" version="1" comment="PackageKit-branding-upstream is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909055" version="1" comment="PackageKit-devel is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909056" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909057" version="1" comment="PackageKit-gtk3-module is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909058" version="1" comment="PackageKit-lang is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909059" version="1" comment="libpackagekit-glib2-18 is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909060" version="1" comment="libpackagekit-glib2-18-32bit is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909061" version="1" comment="libpackagekit-glib2-devel is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909062" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909063" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.2.2-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909064" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-22.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909065" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-22.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909066" version="1" comment="libSDL-devel is &lt;1.2.15-22.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909067" version="1" comment="libSDL-devel-32bit is &lt;1.2.15-22.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909068" version="1" comment="libSDL2-2_0-0 is &lt;2.0.16-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909069" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.16-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909070" version="1" comment="libSDL2-devel is &lt;2.0.16-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909071" version="1" comment="libSDL2-devel-32bit is &lt;2.0.16-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909072" version="1" comment="libSDL2_image-2_0-0 is &lt;2.0.5-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909073" version="1" comment="libSDL2_image-2_0-0-32bit is &lt;2.0.5-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909074" version="1" comment="libSDL2_image-devel is &lt;2.0.5-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909075" version="1" comment="libSDL2_image-devel-32bit is &lt;2.0.5-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909076" version="1" comment="libSDL_image-1_2-0 is &lt;1.2.12+hg695-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909077" version="1" comment="libSDL_image-1_2-0-32bit is &lt;1.2.12+hg695-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909078" version="1" comment="libSDL_image-devel is &lt;1.2.12+hg695-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909079" version="1" comment="libSDL_image-devel-32bit is &lt;1.2.12+hg695-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909080" version="1" comment="libSDL_sound-1_0-1 is &lt;1.0.3-94.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909081" version="1" comment="libSDL_sound-1_0-1-32bit is &lt;1.0.3-94.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909082" version="1" comment="libSDL_sound-devel is &lt;1.0.3-94.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909083" version="1" comment="libSDL_sound-devel-32bit is &lt;1.0.3-94.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909084" version="1" comment="accountsservice is &lt;0.6.55-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909085" version="1" comment="accountsservice-devel is &lt;0.6.55-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909086" version="1" comment="accountsservice-lang is &lt;0.6.55-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909087" version="1" comment="libaccountsservice0 is &lt;0.6.55-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909088" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.55-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909089" version="1" comment="adns is &lt;1.6.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909090" version="1" comment="libadns-devel is &lt;1.6.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909091" version="1" comment="libadns-devel-32bit is &lt;1.6.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909092" version="1" comment="libadns1 is &lt;1.6.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909093" version="1" comment="libadns1-32bit is &lt;1.6.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909094" version="1" comment="alpine is &lt;2.25-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909095" version="1" comment="pico is &lt;5.07-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909096" version="1" comment="pilot is &lt;2.99-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909097" version="1" comment="amavisd-new is &lt;2.12.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909098" version="1" comment="amavisd-new-docs is &lt;2.12.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909099" version="1" comment="ansible is &lt;2.9.24-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909100" version="1" comment="ansible-doc is &lt;2.9.24-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909101" version="1" comment="ansible-test is &lt;2.9.24-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909102" version="1" comment="ant is &lt;1.10.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909103" version="1" comment="ant-jmf is &lt;1.10.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909104" version="1" comment="ant-scripts is &lt;1.10.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909105" version="1" comment="ant-swing is &lt;1.10.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909106" version="1" comment="apache-commons-beanutils is &lt;1.9.4-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909107" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.4-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909108" version="1" comment="apache-commons-compress is &lt;1.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909109" version="1" comment="apache-commons-compress-javadoc is &lt;1.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909110" version="1" comment="apache-commons-email is &lt;1.5-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909111" version="1" comment="apache-commons-email-javadoc is &lt;1.5-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909112" version="1" comment="apache-commons-fileupload is &lt;1.4-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909113" version="1" comment="apache-commons-fileupload-javadoc is &lt;1.4-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909114" version="1" comment="apache-commons-httpclient is &lt;3.1-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909115" version="1" comment="apache-commons-httpclient-demo is &lt;3.1-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909116" version="1" comment="apache-commons-httpclient-javadoc is &lt;3.1-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909117" version="1" comment="apache-commons-httpclient-manual is &lt;3.1-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909118" version="1" comment="apache-pdfbox is &lt;2.0.23-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909119" version="1" comment="apache-pdfbox-javadoc is &lt;2.0.23-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909120" version="1" comment="apache2 is &lt;2.4.49-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909121" version="1" comment="apache2-mod_auth_openidc is &lt;2.4.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909122" version="1" comment="apache2-mod_jk is &lt;1.2.48-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909123" version="1" comment="apache2-mod_perl is &lt;2.0.11-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909124" version="1" comment="apache2-mod_perl-devel is &lt;2.0.11-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909125" version="1" comment="apache2-mod_apparmor is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909126" version="1" comment="apparmor-abstractions is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909127" version="1" comment="apparmor-docs is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909128" version="1" comment="apparmor-parser is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909129" version="1" comment="apparmor-parser-lang is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909130" version="1" comment="apparmor-profiles is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909131" version="1" comment="apparmor-utils is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909132" version="1" comment="apparmor-utils-lang is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909133" version="1" comment="pam_apparmor is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909134" version="1" comment="pam_apparmor-32bit is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909135" version="1" comment="perl-apparmor is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909136" version="1" comment="python3-apparmor is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909137" version="1" comment="ruby-apparmor is &lt;3.0.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909138" version="1" comment="apr-devel is &lt;1.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909139" version="1" comment="libapr1 is &lt;1.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909140" version="1" comment="apr-util-devel is &lt;1.6.1-7.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909141" version="1" comment="libapr-util1 is &lt;1.6.1-7.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909142" version="1" comment="libapr-util1-dbd-mysql is &lt;1.6.1-7.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909143" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.6.1-7.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909144" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.6.1-7.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909145" version="1" comment="arc is &lt;5.21q-6.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909146" version="1" comment="aria2 is &lt;1.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909147" version="1" comment="aria2-devel is &lt;1.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909148" version="1" comment="aria2-lang is &lt;1.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909149" version="1" comment="libaria2-0 is &lt;1.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909150" version="1" comment="ark is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909151" version="1" comment="ark-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909152" version="1" comment="libkerfuffle21 is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909153" version="1" comment="arm-trusted-firmware is &lt;2.5-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909154" version="1" comment="arm-trusted-firmware-tools is &lt;2.5-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909155" version="1" comment="arpwatch is &lt;3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909156" version="1" comment="arpwatch-ethercodes-build is &lt;3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909157" version="1" comment="aspell is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909158" version="1" comment="aspell-devel is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909159" version="1" comment="aspell-ispell is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909160" version="1" comment="aspell-spell is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909161" version="1" comment="libaspell15 is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909162" version="1" comment="libaspell15-32bit is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909163" version="1" comment="libpspell15 is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909164" version="1" comment="libpspell15-32bit is &lt;0.60.8-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909165" version="1" comment="atftp is &lt;0.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909166" version="1" comment="atheme is &lt;7.2.11-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909167" version="1" comment="atheme-devel is &lt;7.2.11-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909168" version="1" comment="libathemecore1 is &lt;7.2.11-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909169" version="1" comment="aubio-tools is &lt;0.4.9-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909170" version="1" comment="libaubio-devel is &lt;0.4.9-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909171" version="1" comment="libaubio5 is &lt;0.4.9-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909172" version="1" comment="libaubio5-32bit is &lt;0.4.9-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909173" version="1" comment="audacity is &lt;3.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909174" version="1" comment="audacity-lang is &lt;3.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909175" version="1" comment="audiofile is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909176" version="1" comment="audiofile-devel is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909177" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909178" version="1" comment="audiofile-doc is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909179" version="1" comment="libaudiofile1 is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909180" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909181" version="1" comment="augeas is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909182" version="1" comment="augeas-devel is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909183" version="1" comment="augeas-devel-32bit is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909184" version="1" comment="augeas-lense-tests is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909185" version="1" comment="augeas-lenses is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909186" version="1" comment="libaugeas0 is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909187" version="1" comment="libaugeas0-32bit is &lt;1.12.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909188" version="1" comment="autoyast2 is &lt;4.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909189" version="1" comment="autoyast2-installation is &lt;4.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909190" version="1" comment="avahi is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909191" version="1" comment="avahi-autoipd is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909192" version="1" comment="avahi-compat-howl-devel is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909193" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909194" version="1" comment="avahi-lang is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909195" version="1" comment="avahi-utils is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909196" version="1" comment="libavahi-client3 is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909197" version="1" comment="libavahi-client3-32bit is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909198" version="1" comment="libavahi-common3 is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909199" version="1" comment="libavahi-common3-32bit is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909200" version="1" comment="libavahi-core7 is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909201" version="1" comment="libavahi-devel is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909202" version="1" comment="libavahi-libevent1 is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909203" version="1" comment="libdns_sd is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909204" version="1" comment="libdns_sd-32bit is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909205" version="1" comment="libhowl0 is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909206" version="1" comment="python36-avahi is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909207" version="1" comment="python38-avahi is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909208" version="1" comment="python39-avahi is &lt;0.8-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909209" version="1" comment="aws-cli is &lt;1.20.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909210" version="1" comment="axel is &lt;2.17.10-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909211" version="1" comment="axis is &lt;1.4-302.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909212" version="1" comment="axis-manual is &lt;1.4-302.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909213" version="1" comment="backintime is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909214" version="1" comment="backintime-lang is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909215" version="1" comment="backintime-qt is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909216" version="1" comment="bchunk is &lt;1.2.2-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909217" version="1" comment="benji is &lt;0.15.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909218" version="1" comment="bind is &lt;9.16.20-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909219" version="1" comment="bind-doc is &lt;9.16.20-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909220" version="1" comment="bind-utils is &lt;9.16.20-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909221" version="1" comment="python3-bind is &lt;9.16.20-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909222" version="1" comment="binutils is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909223" version="1" comment="binutils-devel is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909224" version="1" comment="binutils-devel-32bit is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909225" version="1" comment="binutils-gold is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909226" version="1" comment="libctf-nobfd0 is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909227" version="1" comment="libctf0 is &lt;2.37-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909228" version="1" comment="bird is &lt;2.0.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909229" version="1" comment="bird-doc is &lt;2.0.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909230" version="1" comment="bison is &lt;3.7.6-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909231" version="1" comment="bison-32bit is &lt;3.7.6-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909232" version="1" comment="bison-lang is &lt;3.7.6-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909233" version="1" comment="bitcoin-qt5 is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909234" version="1" comment="bitcoin-test is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909235" version="1" comment="bitcoin-utils is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909236" version="1" comment="bitcoind is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909237" version="1" comment="libbitcoinconsensus-devel is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909238" version="1" comment="libbitcoinconsensus0 is &lt;0.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909239" version="1" comment="blosc-devel is &lt;1.21.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909240" version="1" comment="libblosc1 is &lt;1.21.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909241" version="1" comment="blueman is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909242" version="1" comment="blueman-lang is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909243" version="1" comment="caja-extension-sendto-blueman is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909244" version="1" comment="nautilus-extension-sendto-blueman is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909245" version="1" comment="nemo-extension-sendto-blueman is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909246" version="1" comment="thunar-sendto-blueman is &lt;2.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909247" version="1" comment="bluez is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909248" version="1" comment="bluez-auto-enable-devices is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909249" version="1" comment="bluez-cups is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909250" version="1" comment="bluez-deprecated is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909251" version="1" comment="bluez-devel is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909252" version="1" comment="bluez-devel-32bit is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909253" version="1" comment="bluez-test is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909254" version="1" comment="libbluetooth3 is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909255" version="1" comment="libbluetooth3-32bit is &lt;5.61-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909256" version="1" comment="boinc-client is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909257" version="1" comment="boinc-client-lang is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909258" version="1" comment="boinc-manager is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909259" version="1" comment="boinc-manager-lang is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909260" version="1" comment="libboinc-devel is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909261" version="1" comment="libboinc7 is &lt;7.18.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909262" version="1" comment="borgbackup is &lt;1.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909263" version="1" comment="borgbackup-bash-completion is &lt;1.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909264" version="1" comment="borgbackup-doc is &lt;1.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909265" version="1" comment="borgbackup-fish-completion is &lt;1.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909266" version="1" comment="borgbackup-zsh-completion is &lt;1.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909267" version="1" comment="boringssl-devel is &lt;20200921-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909268" version="1" comment="boringssl-source is &lt;20200921-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909269" version="1" comment="libboringssl1 is &lt;20200921-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909270" version="1" comment="bouncycastle is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909271" version="1" comment="bouncycastle-javadoc is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909272" version="1" comment="bouncycastle-mail is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909273" version="1" comment="bouncycastle-pg is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909274" version="1" comment="bouncycastle-pkix is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909275" version="1" comment="bouncycastle-tls is &lt;1.68-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909276" version="1" comment="btrfsmaintenance is &lt;0.5-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909277" version="1" comment="bubblewrap is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909278" version="1" comment="bubblewrap-zsh-completion is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909279" version="1" comment="bugzilla is &lt;5.0.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909280" version="1" comment="bugzilla-apache is &lt;5.0.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909281" version="1" comment="bugzilla-lang-de is &lt;5.0.6-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909282" version="1" comment="build is &lt;20210902-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909283" version="1" comment="build-initvm-x86_64 is &lt;20210902-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909284" version="1" comment="build-mkbaselibs is &lt;20210902-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909285" version="1" comment="build-mkdrpms is &lt;20210902-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909286" version="1" comment="buildah is &lt;1.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909287" version="1" comment="bzip2 is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909288" version="1" comment="bzip2-doc is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909289" version="1" comment="libbz2-1 is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909290" version="1" comment="libbz2-1-32bit is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909291" version="1" comment="libbz2-devel is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909292" version="1" comment="libbz2-devel-32bit is &lt;1.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909293" version="1" comment="c-ares-devel is &lt;1.17.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909294" version="1" comment="c-ares-utils is &lt;1.17.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909295" version="1" comment="libcares2 is &lt;1.17.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909296" version="1" comment="libcares2-32bit is &lt;1.17.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909297" version="1" comment="c3p0 is &lt;0.9.5.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909298" version="1" comment="c3p0-javadoc is &lt;0.9.5.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909299" version="1" comment="cacti is &lt;1.2.18-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909300" version="1" comment="cairo-devel is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909301" version="1" comment="cairo-devel-32bit is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909302" version="1" comment="cairo-tools is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909303" version="1" comment="libcairo-gobject2 is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909304" version="1" comment="libcairo-gobject2-32bit is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909305" version="1" comment="libcairo-script-interpreter2 is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909306" version="1" comment="libcairo-script-interpreter2-32bit is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909307" version="1" comment="libcairo2 is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909308" version="1" comment="libcairo2-32bit is &lt;1.16.0-3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909309" version="1" comment="calamares is &lt;3.2.36-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909310" version="1" comment="calamares-branding-upstream is &lt;3.2.36-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909311" version="1" comment="calamares-lang is &lt;3.2.36-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909312" version="1" comment="calamares-webview is &lt;3.2.36-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909313" version="1" comment="cargo-audit-advisory-db is &lt;20210802-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909314" version="1" comment="caribou is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909315" version="1" comment="caribou-common is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909316" version="1" comment="caribou-devel is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909317" version="1" comment="caribou-gtk-module-common is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909318" version="1" comment="caribou-gtk2-module is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909319" version="1" comment="caribou-gtk3-module is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909320" version="1" comment="caribou-lang is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909321" version="1" comment="libcaribou0 is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909322" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909323" version="1" comment="libcdio++0 is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909324" version="1" comment="libcdio++0-32bit is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909325" version="1" comment="libcdio-devel is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909326" version="1" comment="libcdio19 is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909327" version="1" comment="libcdio19-32bit is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909328" version="1" comment="libiso9660-11 is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909329" version="1" comment="libiso9660-11-32bit is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909330" version="1" comment="libudf0 is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909331" version="1" comment="libudf0-32bit is &lt;2.1.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909332" version="1" comment="ceph is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909333" version="1" comment="ceph-base is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909334" version="1" comment="ceph-common is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909335" version="1" comment="ceph-fuse is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909336" version="1" comment="ceph-grafana-dashboards is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909337" version="1" comment="ceph-immutable-object-cache is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909338" version="1" comment="ceph-mds is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909339" version="1" comment="ceph-mgr is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909340" version="1" comment="ceph-mgr-cephadm is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909341" version="1" comment="ceph-mgr-dashboard is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909342" version="1" comment="ceph-mgr-diskprediction-local is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909343" version="1" comment="ceph-mgr-k8sevents is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909344" version="1" comment="ceph-mgr-modules-core is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909345" version="1" comment="ceph-mgr-rook is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909346" version="1" comment="ceph-mon is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909347" version="1" comment="ceph-osd is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909348" version="1" comment="ceph-prometheus-alerts is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909349" version="1" comment="ceph-radosgw is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909350" version="1" comment="cephadm is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909351" version="1" comment="cephfs-mirror is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909352" version="1" comment="cephfs-shell is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909353" version="1" comment="cephfs-top is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909354" version="1" comment="libcephfs-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909355" version="1" comment="libcephfs2 is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909356" version="1" comment="libcephsqlite is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909357" version="1" comment="libcephsqlite-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909358" version="1" comment="librados-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909359" version="1" comment="librados2 is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909360" version="1" comment="libradospp-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909361" version="1" comment="librbd-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909362" version="1" comment="librbd1 is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909363" version="1" comment="librgw-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909364" version="1" comment="librgw2 is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909365" version="1" comment="python3-ceph-argparse is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909366" version="1" comment="python3-ceph-common is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909367" version="1" comment="python3-cephfs is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909368" version="1" comment="python3-rados is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909369" version="1" comment="python3-rbd is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909370" version="1" comment="python3-rgw is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909371" version="1" comment="rados-objclass-devel is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909372" version="1" comment="rbd-fuse is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909373" version="1" comment="rbd-mirror is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909374" version="1" comment="rbd-nbd is &lt;16.2.6.45+g8fda9838398-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909375" version="1" comment="cfitsio is &lt;4.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909376" version="1" comment="cfitsio-devel is &lt;4.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909377" version="1" comment="cfitsio-devel-doc is &lt;4.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909378" version="1" comment="libcfitsio9 is &lt;4.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909379" version="1" comment="cgal-demo-examples-devel is &lt;5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909380" version="1" comment="cgal-devel is &lt;5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909381" version="1" comment="cgal-doc is &lt;5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909382" version="1" comment="cgit is &lt;1.2.3-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909383" version="1" comment="chocolate-doom is &lt;3.0.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909384" version="1" comment="chocolate-doom-bash-completion is &lt;3.0.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909385" version="1" comment="chromedriver is &lt;93.0.4577.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909386" version="1" comment="chromium is &lt;93.0.4577.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909387" version="1" comment="chrony is &lt;4.1-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909388" version="1" comment="chrony-pool-empty is &lt;4.1-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909389" version="1" comment="chrony-pool-openSUSE is &lt;4.1-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909390" version="1" comment="chrony-pool-suse is &lt;4.1-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909391" version="1" comment="cifs-utils is &lt;6.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909392" version="1" comment="cifs-utils-devel is &lt;6.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909393" version="1" comment="pam_cifscreds is &lt;6.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909394" version="1" comment="cinnamon is &lt;5.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909395" version="1" comment="cinnamon-gschemas is &lt;5.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909396" version="1" comment="cinnamon-gschemas-branding-upstream is &lt;5.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909397" version="1" comment="clamav is &lt;0.103.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909398" version="1" comment="clamav-devel is &lt;0.103.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909399" version="1" comment="clamav-milter is &lt;0.103.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909400" version="1" comment="libclamav9 is &lt;0.103.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909401" version="1" comment="libfreshclam2 is &lt;0.103.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909402" version="1" comment="claws-mail is &lt;4.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909403" version="1" comment="claws-mail-devel is &lt;4.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909404" version="1" comment="claws-mail-lang is &lt;4.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909405" version="1" comment="clojure is &lt;1.10.3.855-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909406" version="1" comment="cloud-init is &lt;21.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909407" version="1" comment="cloud-init-config-suse is &lt;21.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909408" version="1" comment="cloud-init-doc is &lt;21.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909409" version="1" comment="cni-plugins is &lt;0.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909410" version="1" comment="cobbler is &lt;3.2.1.336+git.5639a3af-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909411" version="1" comment="cobbler-tests is &lt;3.2.1.336+git.5639a3af-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909412" version="1" comment="collectd is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909413" version="1" comment="collectd-plugin-amqp is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909414" version="1" comment="collectd-plugin-buddyinfo is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909415" version="1" comment="collectd-plugin-connectivity is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909416" version="1" comment="collectd-plugin-dbi is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909417" version="1" comment="collectd-plugin-gps is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909418" version="1" comment="collectd-plugin-ipmi is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909419" version="1" comment="collectd-plugin-java is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909420" version="1" comment="collectd-plugin-logparser is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909421" version="1" comment="collectd-plugin-lua is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909422" version="1" comment="collectd-plugin-mcelog is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909423" version="1" comment="collectd-plugin-memcachec is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909424" version="1" comment="collectd-plugin-modbus is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909425" version="1" comment="collectd-plugin-mqtt is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909426" version="1" comment="collectd-plugin-mysql is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909427" version="1" comment="collectd-plugin-notify-desktop is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909428" version="1" comment="collectd-plugin-nut is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909429" version="1" comment="collectd-plugin-openldap is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909430" version="1" comment="collectd-plugin-ovs is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909431" version="1" comment="collectd-plugin-pcie is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909432" version="1" comment="collectd-plugin-pinba is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909433" version="1" comment="collectd-plugin-postgresql is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909434" version="1" comment="collectd-plugin-procevent is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909435" version="1" comment="collectd-plugin-python3 is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909436" version="1" comment="collectd-plugin-sigrok is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909437" version="1" comment="collectd-plugin-smart is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909438" version="1" comment="collectd-plugin-snmp is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909439" version="1" comment="collectd-plugin-synproxy is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909440" version="1" comment="collectd-plugin-sysevent is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909441" version="1" comment="collectd-plugin-ubi is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909442" version="1" comment="collectd-plugin-uptime is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909443" version="1" comment="collectd-plugin-virt is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909444" version="1" comment="collectd-plugin-write_influxdb_udp is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909445" version="1" comment="collectd-plugin-write_stackdriver is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909446" version="1" comment="collectd-plugin-write_syslog is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909447" version="1" comment="collectd-plugins-all is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909448" version="1" comment="collectd-spamassassin is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909449" version="1" comment="collectd-web is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909450" version="1" comment="collectd-web-js is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909451" version="1" comment="libcollectdclient-devel is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909452" version="1" comment="libcollectdclient1 is &lt;5.12.0-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909453" version="1" comment="connman is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909454" version="1" comment="connman-client is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909455" version="1" comment="connman-devel is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909456" version="1" comment="connman-doc is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909457" version="1" comment="connman-nmcompat is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909458" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909459" version="1" comment="connman-plugin-iospm is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909460" version="1" comment="connman-plugin-l2tp is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909461" version="1" comment="connman-plugin-openconnect is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909462" version="1" comment="connman-plugin-openvpn is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909463" version="1" comment="connman-plugin-polkit is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909464" version="1" comment="connman-plugin-pptp is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909465" version="1" comment="connman-plugin-tist is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909466" version="1" comment="connman-plugin-vpnc is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909467" version="1" comment="connman-plugin-wireguard is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909468" version="1" comment="connman-test is &lt;1.40-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909469" version="1" comment="containerd is &lt;1.4.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909470" version="1" comment="containerd-ctr is &lt;1.4.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909471" version="1" comment="coreutils is &lt;8.32-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909472" version="1" comment="coreutils-doc is &lt;8.32-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909473" version="1" comment="coreutils-lang is &lt;8.32-8.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909474" version="1" comment="corosync is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909475" version="1" comment="corosync-qdevice is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909476" version="1" comment="corosync-qnetd is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909477" version="1" comment="corosync-testagents is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909478" version="1" comment="libcfg6 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909479" version="1" comment="libcfg6-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909480" version="1" comment="libcmap4 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909481" version="1" comment="libcmap4-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909482" version="1" comment="libcorosync-devel is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909483" version="1" comment="libcorosync_common4 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909484" version="1" comment="libcorosync_common4-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909485" version="1" comment="libcpg4 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909486" version="1" comment="libcpg4-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909487" version="1" comment="libquorum5 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909488" version="1" comment="libquorum5-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909489" version="1" comment="libsam4 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909490" version="1" comment="libsam4-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909491" version="1" comment="libtotem_pg5 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909492" version="1" comment="libtotem_pg5-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909493" version="1" comment="libvotequorum8 is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909494" version="1" comment="libvotequorum8-32bit is &lt;2.4.5+git70.64010f57-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909495" version="1" comment="coturn is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909496" version="1" comment="coturn-devel is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909497" version="1" comment="coturn-utils is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909498" version="1" comment="cpio is &lt;2.13-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909499" version="1" comment="cpio-lang is &lt;2.13-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909500" version="1" comment="cpio-mt is &lt;2.13-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909501" version="1" comment="crawl is &lt;0.26.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909502" version="1" comment="crawl-data is &lt;0.26.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909503" version="1" comment="crawl-sdl is &lt;0.26.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909504" version="1" comment="cri-o is &lt;1.22.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909505" version="1" comment="cri-o-kubeadm-criconfig is &lt;1.22.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909506" version="1" comment="crmsh is &lt;4.3.1+20210913.d7356663-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909507" version="1" comment="crmsh-scripts is &lt;4.3.1+20210913.d7356663-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909508" version="1" comment="crmsh-test is &lt;4.3.1+20210913.d7356663-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909509" version="1" comment="cron is &lt;4.2-86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909510" version="1" comment="cronie is &lt;1.5.7-86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909511" version="1" comment="cronie-anacron is &lt;1.5.7-86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909512" version="1" comment="cpp10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909513" version="1" comment="gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909514" version="1" comment="gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909515" version="1" comment="gcc10-ada is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909516" version="1" comment="gcc10-ada-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909517" version="1" comment="gcc10-c++ is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909518" version="1" comment="gcc10-c++-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909519" version="1" comment="gcc10-d is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909520" version="1" comment="gcc10-d-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909521" version="1" comment="gcc10-devel is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909522" version="1" comment="gcc10-fortran is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909523" version="1" comment="gcc10-fortran-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909524" version="1" comment="gcc10-go is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909525" version="1" comment="gcc10-go-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909526" version="1" comment="gcc10-info is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909527" version="1" comment="gcc10-locale is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909528" version="1" comment="gcc10-obj-c++ is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909529" version="1" comment="gcc10-obj-c++-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909530" version="1" comment="gcc10-objc is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909531" version="1" comment="gcc10-objc-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909532" version="1" comment="libada10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909533" version="1" comment="libada10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909534" version="1" comment="libasan6-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909535" version="1" comment="libasan6-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909536" version="1" comment="libatomic1-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909537" version="1" comment="libatomic1-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909538" version="1" comment="libgcc_s1-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909539" version="1" comment="libgcc_s1-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909540" version="1" comment="libgdruntime1 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909541" version="1" comment="libgdruntime1-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909542" version="1" comment="libgfortran5-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909543" version="1" comment="libgfortran5-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909544" version="1" comment="libgo16 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909545" version="1" comment="libgo16-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909546" version="1" comment="libgomp1-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909547" version="1" comment="libgomp1-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909548" version="1" comment="libgphobos1 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909549" version="1" comment="libgphobos1-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909550" version="1" comment="libitm1-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909551" version="1" comment="libitm1-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909552" version="1" comment="liblsan0-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909553" version="1" comment="libobjc4-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909554" version="1" comment="libobjc4-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909555" version="1" comment="libquadmath0-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909556" version="1" comment="libquadmath0-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909557" version="1" comment="libstdc++6-devel-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909558" version="1" comment="libstdc++6-devel-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909559" version="1" comment="libstdc++6-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909560" version="1" comment="libstdc++6-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909561" version="1" comment="libstdc++6-gcc10-locale is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909562" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909563" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909564" version="1" comment="libtsan0-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909565" version="1" comment="libubsan1-gcc10 is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909566" version="1" comment="libubsan1-gcc10-32bit is &lt;10.3.1+git1893-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909567" version="1" comment="cpp7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909568" version="1" comment="gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909569" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909570" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909571" version="1" comment="gcc7-ada-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909572" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909573" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909574" version="1" comment="gcc7-devel is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909575" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909576" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909577" version="1" comment="gcc7-go is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909578" version="1" comment="gcc7-go-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909579" version="1" comment="gcc7-info is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909580" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909581" version="1" comment="gcc7-obj-c++ is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909582" version="1" comment="gcc7-obj-c++-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909583" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909584" version="1" comment="gcc7-objc-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909585" version="1" comment="libada7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909586" version="1" comment="libada7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909587" version="1" comment="libasan4 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909588" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909589" version="1" comment="libatomic1-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909590" version="1" comment="libatomic1-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909591" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909592" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909593" version="1" comment="libgcc_s1-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909594" version="1" comment="libgcc_s1-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909595" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909596" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909597" version="1" comment="libgo11 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909598" version="1" comment="libgo11-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909599" version="1" comment="libgomp1-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909600" version="1" comment="libgomp1-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909601" version="1" comment="libitm1-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909602" version="1" comment="libitm1-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909603" version="1" comment="liblsan0-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909604" version="1" comment="libmpx2-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909605" version="1" comment="libmpx2-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909606" version="1" comment="libmpxwrappers2-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909607" version="1" comment="libmpxwrappers2-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909608" version="1" comment="libobjc4-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909609" version="1" comment="libobjc4-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909610" version="1" comment="libquadmath0-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909611" version="1" comment="libquadmath0-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909612" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909613" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909614" version="1" comment="libstdc++6-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909615" version="1" comment="libstdc++6-gcc7-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909616" version="1" comment="libstdc++6-gcc7-locale is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909617" version="1" comment="libtsan0-gcc7 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909618" version="1" comment="libubsan0 is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909619" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909620" version="1" comment="cryptsetup is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909621" version="1" comment="cryptsetup-lang is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909622" version="1" comment="cryptsetup-ssh is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909623" version="1" comment="libcryptsetup-devel is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909624" version="1" comment="libcryptsetup12 is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909625" version="1" comment="libcryptsetup12-32bit is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909626" version="1" comment="libcryptsetup12-hmac is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909627" version="1" comment="libcryptsetup12-hmac-32bit is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909628" version="1" comment="cscope is &lt;15.9-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909629" version="1" comment="csync2 is &lt;2.0+git.1600444747.83b3644-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909630" version="1" comment="cups is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909631" version="1" comment="cups-client is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909632" version="1" comment="cups-config is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909633" version="1" comment="cups-ddk is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909634" version="1" comment="cups-devel is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909635" version="1" comment="cups-devel-32bit is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909636" version="1" comment="libcups2 is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909637" version="1" comment="libcups2-32bit is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909638" version="1" comment="libcupsimage2 is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909639" version="1" comment="libcupsimage2-32bit is &lt;2.3.3op2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909640" version="1" comment="cvs is &lt;1.12.13-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909641" version="1" comment="cvs-doc is &lt;1.12.13-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909642" version="1" comment="cyrus-sasl is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909643" version="1" comment="cyrus-sasl-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909644" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909645" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909646" version="1" comment="cyrus-sasl-devel is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909647" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909648" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909649" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909650" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909651" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909652" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909653" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909654" version="1" comment="cyrus-sasl-otp is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909655" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909656" version="1" comment="cyrus-sasl-plain is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909657" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909658" version="1" comment="cyrus-sasl-scram is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909659" version="1" comment="libsasl2-3 is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909660" version="1" comment="libsasl2-3-32bit is &lt;2.1.27-5.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909661" version="1" comment="davfs2 is &lt;1.6.0-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909662" version="1" comment="dbus-1 is &lt;1.12.20-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909663" version="1" comment="dbus-1-devel is &lt;1.12.20-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909664" version="1" comment="dbus-1-devel-32bit is &lt;1.12.20-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909665" version="1" comment="libdbus-1-3 is &lt;1.12.20-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909666" version="1" comment="libdbus-1-3-32bit is &lt;1.12.20-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909667" version="1" comment="dcraw is &lt;9.28.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909668" version="1" comment="dcraw-lang is &lt;9.28.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909669" version="1" comment="deluge is &lt;2.0.3-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909670" version="1" comment="deluge-lang is &lt;2.0.3-4.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909671" version="1" comment="dex-oidc is &lt;2.28.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909672" version="1" comment="dhcp is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909673" version="1" comment="dhcp-client is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909674" version="1" comment="dhcp-devel is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909675" version="1" comment="dhcp-doc is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909676" version="1" comment="dhcp-relay is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909677" version="1" comment="dhcp-server is &lt;4.4.2.P1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909678" version="1" comment="dia is &lt;0.97.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909679" version="1" comment="dia-lang is &lt;0.97.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909680" version="1" comment="diffoscope is &lt;183-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909681" version="1" comment="discount is &lt;2.2.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909682" version="1" comment="libmarkdown-devel is &lt;2.2.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909683" version="1" comment="libmarkdown2 is &lt;2.2.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909684" version="1" comment="djvulibre is &lt;3.5.28-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909685" version="1" comment="djvulibre-doc is &lt;3.5.28-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909686" version="1" comment="libdjvulibre-devel is &lt;3.5.28-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909687" version="1" comment="libdjvulibre21 is &lt;3.5.28-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909688" version="1" comment="dnscrypt-proxy is &lt;2.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909689" version="1" comment="dnsmasq is &lt;2.86-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909690" version="1" comment="dnsmasq-utils is &lt;2.86-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909691" version="1" comment="docker is &lt;20.10.6_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909692" version="1" comment="docker-bash-completion is &lt;20.10.6_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909693" version="1" comment="docker-fish-completion is &lt;20.10.6_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909694" version="1" comment="docker-zsh-completion is &lt;20.10.6_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909695" version="1" comment="docker-distribution-registry is &lt;2.7.1-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909696" version="1" comment="dom4j is &lt;1.6.1-33.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909697" version="1" comment="dom4j-demo is &lt;1.6.1-33.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909698" version="1" comment="dom4j-javadoc is &lt;1.6.1-33.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909699" version="1" comment="dom4j-manual is &lt;1.6.1-33.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909700" version="1" comment="dosbox is &lt;0.74.3-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909701" version="1" comment="dovecot23 is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909702" version="1" comment="dovecot23-backend-mysql is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909703" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909704" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909705" version="1" comment="dovecot23-devel is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909706" version="1" comment="dovecot23-fts is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909707" version="1" comment="dovecot23-fts-lucene is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909708" version="1" comment="dovecot23-fts-solr is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909709" version="1" comment="dovecot23-fts-squat is &lt;2.3.16-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909710" version="1" comment="dpdk is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909711" version="1" comment="dpdk-devel is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909712" version="1" comment="dpdk-doc is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909713" version="1" comment="dpdk-examples is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909714" version="1" comment="dpdk-kmp-default is &lt;19.11.8_k5.13.13_1-2.7 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909715" version="1" comment="dpdk-tools is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909716" version="1" comment="libdpdk-20_0 is &lt;19.11.8-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909718" version="1" comment="kernel-macros is &lt;5.14.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909719" version="1" comment="kernel-source is &lt;5.14.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909720" version="1" comment="kernel-source-vanilla is &lt;5.14.6-1.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909721" version="1" comment="dumb is &lt;2.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909722" version="1" comment="dumb-devel is &lt;2.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909723" version="1" comment="dumb-devel-doc is &lt;2.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909724" version="1" comment="libdumb2 is &lt;2.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909725" version="1" comment="dxflib-devel is &lt;3.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909726" version="1" comment="libdxflib-3_26_4-1 is &lt;3.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909727" version="1" comment="e2fsprogs is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909728" version="1" comment="e2fsprogs-devel is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909729" version="1" comment="e2fsprogs-scrub is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909730" version="1" comment="libcom_err-devel is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909731" version="1" comment="libcom_err-devel-32bit is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909732" version="1" comment="libcom_err-devel-static is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909733" version="1" comment="libcom_err2 is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909734" version="1" comment="libcom_err2-32bit is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909735" version="1" comment="libext2fs-devel is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909736" version="1" comment="libext2fs-devel-32bit is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909737" version="1" comment="libext2fs-devel-static is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909738" version="1" comment="libext2fs2 is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909739" version="1" comment="libext2fs2-32bit is &lt;1.46.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909740" version="1" comment="eclipse-contributor-tools is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909741" version="1" comment="eclipse-equinox-osgi is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909742" version="1" comment="eclipse-jdt is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909743" version="1" comment="eclipse-p2-discovery is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909744" version="1" comment="eclipse-pde is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909745" version="1" comment="eclipse-platform is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909746" version="1" comment="eclipse-swt is &lt;4.15-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909747" version="1" comment="elfutils is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909748" version="1" comment="elfutils-lang is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909749" version="1" comment="libasm-devel is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909750" version="1" comment="libasm1 is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909751" version="1" comment="libasm1-32bit is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909752" version="1" comment="libdw-devel is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909753" version="1" comment="libdw1 is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909754" version="1" comment="libdw1-32bit is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909755" version="1" comment="libelf-devel is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909756" version="1" comment="libelf-devel-32bit is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909757" version="1" comment="libelf1 is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909758" version="1" comment="libelf1-32bit is &lt;0.185-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909759" version="1" comment="elinks is &lt;0.13~0.20190723-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909760" version="1" comment="emacs is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909761" version="1" comment="emacs-el is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909762" version="1" comment="emacs-info is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909763" version="1" comment="emacs-nox is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909764" version="1" comment="emacs-x11 is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909765" version="1" comment="etags is &lt;27.2-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909766" version="1" comment="enigmail is &lt;2.2.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909767" version="1" comment="enscript is &lt;1.6.6-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909768" version="1" comment="eog is &lt;40.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909769" version="1" comment="eog-devel is &lt;40.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909770" version="1" comment="eog-lang is &lt;40.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909771" version="1" comment="epiphany is &lt;40.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909772" version="1" comment="epiphany-branding-upstream is &lt;40.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909773" version="1" comment="epiphany-lang is &lt;40.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909774" version="1" comment="gnome-shell-search-provider-epiphany is &lt;40.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909775" version="1" comment="erlang is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909776" version="1" comment="erlang-debugger is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909777" version="1" comment="erlang-debugger-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909778" version="1" comment="erlang-dialyzer is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909779" version="1" comment="erlang-dialyzer-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909780" version="1" comment="erlang-diameter is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909781" version="1" comment="erlang-diameter-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909782" version="1" comment="erlang-doc is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909783" version="1" comment="erlang-epmd is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909784" version="1" comment="erlang-et is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909785" version="1" comment="erlang-et-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909786" version="1" comment="erlang-jinterface is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909787" version="1" comment="erlang-jinterface-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909788" version="1" comment="erlang-observer is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909789" version="1" comment="erlang-observer-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909790" version="1" comment="erlang-reltool is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909791" version="1" comment="erlang-reltool-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909792" version="1" comment="erlang-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909793" version="1" comment="erlang-wx is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909794" version="1" comment="erlang-wx-src is &lt;24.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909795" version="1" comment="etcd is &lt;3.4.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909796" version="1" comment="etcdctl is &lt;3.4.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909797" version="1" comment="evince is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909798" version="1" comment="evince-devel is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909799" version="1" comment="evince-lang is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909800" version="1" comment="evince-plugin-comicsdocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909801" version="1" comment="evince-plugin-djvudocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909802" version="1" comment="evince-plugin-dvidocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909803" version="1" comment="evince-plugin-pdfdocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909804" version="1" comment="evince-plugin-psdocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909805" version="1" comment="evince-plugin-tiffdocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909806" version="1" comment="evince-plugin-xpsdocument is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909807" version="1" comment="libevdocument3-4 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909808" version="1" comment="libevview3-3 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909809" version="1" comment="nautilus-evince is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909810" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909811" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909812" version="1" comment="evolution is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909813" version="1" comment="evolution-devel is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909814" version="1" comment="evolution-lang is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909815" version="1" comment="evolution-plugin-bogofilter is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909816" version="1" comment="evolution-plugin-pst-import is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909817" version="1" comment="evolution-plugin-spamassassin is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909818" version="1" comment="evolution-plugin-text-highlight is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909819" version="1" comment="glade-catalog-evolution is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909820" version="1" comment="evolution-data-server is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909821" version="1" comment="evolution-data-server-devel is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909822" version="1" comment="evolution-data-server-lang is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909823" version="1" comment="libcamel-1_2-62 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909824" version="1" comment="libebackend-1_2-10 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909825" version="1" comment="libebook-1_2-20 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909826" version="1" comment="libebook-contacts-1_2-3 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909827" version="1" comment="libecal-2_0-1 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909828" version="1" comment="libedata-book-1_2-26 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909829" version="1" comment="libedata-cal-2_0-1 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909830" version="1" comment="libedataserver-1_2-26 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909831" version="1" comment="libedataserverui-1_2-3 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909832" version="1" comment="typelib-1_0-Camel-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909833" version="1" comment="typelib-1_0-EBackend-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909834" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909835" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909836" version="1" comment="typelib-1_0-ECal-2_0 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909837" version="1" comment="typelib-1_0-EDataBook-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909838" version="1" comment="typelib-1_0-EDataCal-2_0 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909839" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909840" version="1" comment="typelib-1_0-EDataServerUI-1_2 is &lt;3.40.4-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909841" version="1" comment="exempi-tools is &lt;2.5.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909842" version="1" comment="libexempi-devel is &lt;2.5.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909843" version="1" comment="libexempi8 is &lt;2.5.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909844" version="1" comment="libexempi8-32bit is &lt;2.5.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909845" version="1" comment="exim is &lt;4.94.2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909846" version="1" comment="eximon is &lt;4.94.2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909847" version="1" comment="eximstats-html is &lt;4.94.2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909848" version="1" comment="exiv2 is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909849" version="1" comment="exiv2-lang is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909850" version="1" comment="libexiv2-27 is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909851" version="1" comment="libexiv2-27-32bit is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909852" version="1" comment="libexiv2-devel is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909853" version="1" comment="libexiv2-xmp-static is &lt;0.27.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909854" version="1" comment="expat is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909855" version="1" comment="libexpat-devel is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909856" version="1" comment="libexpat-devel-32bit is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909857" version="1" comment="libexpat1 is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909858" version="1" comment="libexpat1-32bit is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909859" version="1" comment="fail2ban is &lt;0.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909860" version="1" comment="monitoring-plugins-fail2ban is &lt;0.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909861" version="1" comment="fastjar is &lt;0.98-26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909862" version="1" comment="feh is &lt;3.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909863" version="1" comment="fence-agents is &lt;4.10.0+git.1627556580.31443c15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909864" version="1" comment="fence-agents-amt_ws is &lt;4.10.0+git.1627556580.31443c15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909865" version="1" comment="fence-agents-devel is &lt;4.10.0+git.1627556580.31443c15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909866" version="1" comment="fetchmail is &lt;6.4.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909867" version="1" comment="fetchmailconf is &lt;6.4.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909868" version="1" comment="ffmpeg-4 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909869" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909870" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909871" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909872" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909873" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909874" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909875" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909876" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909877" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909878" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909879" version="1" comment="libavcodec58_134 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909880" version="1" comment="libavcodec58_134-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909881" version="1" comment="libavdevice58_13 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909882" version="1" comment="libavdevice58_13-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909883" version="1" comment="libavfilter7_110 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909884" version="1" comment="libavfilter7_110-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909885" version="1" comment="libavformat58_76 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909886" version="1" comment="libavformat58_76-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909887" version="1" comment="libavresample4_0 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909888" version="1" comment="libavresample4_0-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909889" version="1" comment="libavutil56_70 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909890" version="1" comment="libavutil56_70-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909891" version="1" comment="libpostproc55_9 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909892" version="1" comment="libpostproc55_9-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909893" version="1" comment="libswresample3_9 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909894" version="1" comment="libswresample3_9-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909895" version="1" comment="libswscale5_9 is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909896" version="1" comment="libswscale5_9-32bit is &lt;4.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909897" version="1" comment="file is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909898" version="1" comment="file-devel is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909899" version="1" comment="file-devel-32bit is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909900" version="1" comment="file-magic is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909901" version="1" comment="libmagic1 is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909902" version="1" comment="libmagic1-32bit is &lt;5.40-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909903" version="1" comment="file-roller is &lt;3.40.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909904" version="1" comment="file-roller-lang is &lt;3.40.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909905" version="1" comment="nautilus-file-roller is &lt;3.40.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909906" version="1" comment="filezilla is &lt;3.55.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909907" version="1" comment="filezilla-devel is &lt;3.55.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909908" version="1" comment="filezilla-lang is &lt;3.55.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909909" version="1" comment="findutils is &lt;4.8.0-2.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909910" version="1" comment="findutils-lang is &lt;4.8.0-2.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909911" version="1" comment="firejail is &lt;0.9.66-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909912" version="1" comment="firejail-bash-completion is &lt;0.9.66-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909913" version="1" comment="firejail-zsh-completion is &lt;0.9.66-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909914" version="1" comment="flac is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909915" version="1" comment="flac-devel is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909916" version="1" comment="flac-devel-32bit is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909917" version="1" comment="libFLAC++6 is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909918" version="1" comment="libFLAC++6-32bit is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909919" version="1" comment="libFLAC8 is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909920" version="1" comment="libFLAC8-32bit is &lt;1.3.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909921" version="1" comment="flannel is &lt;0.14.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909922" version="1" comment="flannel-k8s-yaml is &lt;0.14.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909923" version="1" comment="flatpak is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909924" version="1" comment="flatpak-devel is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909925" version="1" comment="flatpak-zsh-completion is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909926" version="1" comment="libflatpak0 is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909927" version="1" comment="system-user-flatpak is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909928" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.11.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909929" version="1" comment="fontforge is &lt;20201107-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909930" version="1" comment="fontforge-devel is &lt;20201107-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909931" version="1" comment="fontforge-doc is &lt;20201107-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909932" version="1" comment="fossil is &lt;2.16-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909933" version="1" comment="freeciv is &lt;2.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909934" version="1" comment="freeciv-gtk3 is &lt;2.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909935" version="1" comment="freeciv-lang is &lt;2.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909936" version="1" comment="freeciv-qt is &lt;2.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909937" version="1" comment="freeimage-devel is &lt;3.18.0-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909938" version="1" comment="libfreeimage3 is &lt;3.18.0-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909939" version="1" comment="libfreeimageplus3 is &lt;3.18.0-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909940" version="1" comment="freeradius-server is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909941" version="1" comment="freeradius-server-devel is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909942" version="1" comment="freeradius-server-doc is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909943" version="1" comment="freeradius-server-krb5 is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909944" version="1" comment="freeradius-server-ldap is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909945" version="1" comment="freeradius-server-ldap-schemas is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909946" version="1" comment="freeradius-server-libs is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909947" version="1" comment="freeradius-server-mysql is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909948" version="1" comment="freeradius-server-perl is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909949" version="1" comment="freeradius-server-postgresql is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909950" version="1" comment="freeradius-server-python3 is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909951" version="1" comment="freeradius-server-sqlite is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909952" version="1" comment="freeradius-server-utils is &lt;3.0.23-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909953" version="1" comment="freerdp is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909954" version="1" comment="freerdp-devel is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909955" version="1" comment="freerdp-proxy is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909956" version="1" comment="freerdp-server is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909957" version="1" comment="freerdp-wayland is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909958" version="1" comment="libfreerdp2 is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909959" version="1" comment="libuwac0-0 is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909960" version="1" comment="libwinpr2 is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909961" version="1" comment="uwac0-0-devel is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909962" version="1" comment="winpr2-devel is &lt;2.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909963" version="1" comment="freetds-config is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909964" version="1" comment="freetds-devel is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909965" version="1" comment="freetds-doc is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909966" version="1" comment="freetds-tools is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909967" version="1" comment="libct4 is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909968" version="1" comment="libsybdb5 is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909969" version="1" comment="libsybdb5-32bit is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909970" version="1" comment="libtdsodbc0 is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909971" version="1" comment="libtdsodbc0-32bit is &lt;1.2.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909972" version="1" comment="freetype2-devel is &lt;2.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909973" version="1" comment="freetype2-devel-32bit is &lt;2.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909974" version="1" comment="freetype2-profile-tti35 is &lt;2.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909975" version="1" comment="libfreetype6 is &lt;2.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909976" version="1" comment="libfreetype6-32bit is &lt;2.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909977" version="1" comment="freexl-devel is &lt;1.0.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909978" version="1" comment="libfreexl1 is &lt;1.0.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909979" version="1" comment="fribidi is &lt;1.0.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909980" version="1" comment="fribidi-devel is &lt;1.0.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909981" version="1" comment="libfribidi0 is &lt;1.0.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909982" version="1" comment="libfribidi0-32bit is &lt;1.0.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909983" version="1" comment="fvwm2 is &lt;2.6.9-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909984" version="1" comment="dfu-tool is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909985" version="1" comment="fwupd is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909986" version="1" comment="fwupd-devel is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909987" version="1" comment="fwupd-lang is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909988" version="1" comment="fwupdtpmevlog is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909989" version="1" comment="libfwupd2 is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909990" version="1" comment="libfwupdplugin1 is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909991" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909992" version="1" comment="typelib-1_0-FwupdPlugin-1_0 is &lt;1.5.8-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909993" version="1" comment="gajim is &lt;1.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909994" version="1" comment="gajim-lang is &lt;1.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909995" version="1" comment="gcab is &lt;1.4-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909996" version="1" comment="gcab-devel is &lt;1.4-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909997" version="1" comment="gcab-lang is &lt;1.4-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909998" version="1" comment="libgcab-1_0-0 is &lt;1.4-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009909999" version="1" comment="typelib-1_0-GCab-1_0 is &lt;1.4-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910000" version="1" comment="gd is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910001" version="1" comment="gd-devel is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910002" version="1" comment="gd-devel-32bit is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910003" version="1" comment="libgd3 is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910004" version="1" comment="libgd3-32bit is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910005" version="1" comment="gdb is &lt;10.1-11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910006" version="1" comment="gdbserver is &lt;10.1-11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910007" version="1" comment="gdk-pixbuf-devel is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910008" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910009" version="1" comment="gdk-pixbuf-lang is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910010" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910011" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910012" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910013" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910014" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910015" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910016" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910017" version="1" comment="gdm is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910018" version="1" comment="gdm-branding-upstream is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910019" version="1" comment="gdm-devel is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910020" version="1" comment="gdm-lang is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910021" version="1" comment="gdm-systemd is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910022" version="1" comment="gdmflexiserver is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910023" version="1" comment="libgdm1 is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910024" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.38.2-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910025" version="1" comment="geary is &lt;40.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910026" version="1" comment="geary-lang is &lt;40.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910027" version="1" comment="gegl is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910028" version="1" comment="gegl-0_4 is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910029" version="1" comment="gegl-0_4-lang is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910030" version="1" comment="gegl-devel is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910031" version="1" comment="gegl-doc is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910032" version="1" comment="libgegl-0_4-0 is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910033" version="1" comment="libgegl-0_4-0-32bit is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910034" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.30-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910035" version="1" comment="ghostscript is &lt;9.54.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910036" version="1" comment="ghostscript-devel is &lt;9.54.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910037" version="1" comment="ghostscript-x11 is &lt;9.54.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910038" version="1" comment="giflib-devel is &lt;5.2.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910039" version="1" comment="giflib-devel-32bit is &lt;5.2.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910040" version="1" comment="giflib-progs is &lt;5.2.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910041" version="1" comment="libgif7 is &lt;5.2.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910042" version="1" comment="libgif7-32bit is &lt;5.2.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910043" version="1" comment="gimp is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910044" version="1" comment="gimp-devel is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910045" version="1" comment="gimp-lang is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910046" version="1" comment="gimp-plugin-aa is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910047" version="1" comment="gimp-plugins-python is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910048" version="1" comment="libgimp-2_0-0 is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910049" version="1" comment="libgimp-2_0-0-32bit is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910050" version="1" comment="libgimpui-2_0-0 is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910051" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.10.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910052" version="1" comment="git is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910053" version="1" comment="git-arch is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910054" version="1" comment="git-core is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910055" version="1" comment="git-credential-gnome-keyring is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910056" version="1" comment="git-credential-libsecret is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910057" version="1" comment="git-cvs is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910058" version="1" comment="git-daemon is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910059" version="1" comment="git-doc is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910060" version="1" comment="git-email is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910061" version="1" comment="git-gui is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910062" version="1" comment="git-p4 is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910063" version="1" comment="git-svn is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910064" version="1" comment="git-web is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910065" version="1" comment="gitk is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910066" version="1" comment="perl-Git is &lt;2.33.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910067" version="1" comment="git-annex is &lt;8.20210903-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910068" version="1" comment="git-annex-bash-completion is &lt;8.20210903-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910069" version="1" comment="git-delta is &lt;0.8.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910070" version="1" comment="gitolite is &lt;3.6.12-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910071" version="1" comment="glib-networking is &lt;2.68.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910072" version="1" comment="glib-networking-32bit is &lt;2.68.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910073" version="1" comment="glib-networking-lang is &lt;2.68.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910074" version="1" comment="gio-branding-upstream is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910075" version="1" comment="glib2-devel is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910076" version="1" comment="glib2-devel-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910077" version="1" comment="glib2-devel-static is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910078" version="1" comment="glib2-lang is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910079" version="1" comment="glib2-tests-devel is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910080" version="1" comment="glib2-tools is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910081" version="1" comment="glib2-tools-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910082" version="1" comment="libgio-2_0-0 is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910083" version="1" comment="libgio-2_0-0-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910084" version="1" comment="libgio-fam is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910085" version="1" comment="libgio-fam-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910086" version="1" comment="libglib-2_0-0 is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910087" version="1" comment="libglib-2_0-0-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910088" version="1" comment="libgmodule-2_0-0 is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910089" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910090" version="1" comment="libgobject-2_0-0 is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910091" version="1" comment="libgobject-2_0-0-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910092" version="1" comment="libgthread-2_0-0 is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910093" version="1" comment="libgthread-2_0-0-32bit is &lt;2.68.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910094" version="1" comment="glibc is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910095" version="1" comment="glibc-devel is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910096" version="1" comment="glibc-devel-static is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910097" version="1" comment="glibc-extra is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910098" version="1" comment="glibc-html is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910099" version="1" comment="glibc-i18ndata is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910100" version="1" comment="glibc-info is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910101" version="1" comment="glibc-lang is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910102" version="1" comment="glibc-locale is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910103" version="1" comment="glibc-locale-base is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910104" version="1" comment="glibc-profile is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910105" version="1" comment="nscd is &lt;2.34-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910106" version="1" comment="global is &lt;6.6.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910107" version="1" comment="glusterfs is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910108" version="1" comment="glusterfs-devel is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910109" version="1" comment="libgfapi0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910110" version="1" comment="libgfchangelog0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910111" version="1" comment="libgfrpc0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910112" version="1" comment="libgfxdr0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910113" version="1" comment="libglusterd0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910114" version="1" comment="libglusterfs0 is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910115" version="1" comment="python3-gluster is &lt;9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910116" version="1" comment="gnome-autoar-devel is &lt;0.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910117" version="1" comment="libgnome-autoar-0-0 is &lt;0.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910118" version="1" comment="libgnome-autoar-gtk-0-0 is &lt;0.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910119" version="1" comment="typelib-1_0-GnomeAutoar-0_1 is &lt;0.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910120" version="1" comment="typelib-1_0-GnomeAutoarGtk-0_1 is &lt;0.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910121" version="1" comment="gnome-desktop-lang is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910122" version="1" comment="gnome-version is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910123" version="1" comment="libgnome-desktop-3-19 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910124" version="1" comment="libgnome-desktop-3-devel is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910125" version="1" comment="libgnome-desktop-3_0-common is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910126" version="1" comment="typelib-1_0-GnomeDesktop-3_0 is &lt;40.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910127" version="1" comment="gnome-extensions is &lt;40.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910128" version="1" comment="gnome-shell is &lt;40.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910129" version="1" comment="gnome-shell-calendar is &lt;40.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910130" version="1" comment="gnome-shell-devel is &lt;40.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910131" version="1" comment="gnome-shell-lang is &lt;40.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910132" version="1" comment="gnucash is &lt;4.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910133" version="1" comment="gnucash-devel is &lt;4.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910134" version="1" comment="gnucash-lang is &lt;4.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910135" version="1" comment="python3-gnucash is &lt;4.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910136" version="1" comment="gnuchess is &lt;6.2.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910137" version="1" comment="gnuplot is &lt;5.4.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910138" version="1" comment="gnutls is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910139" version="1" comment="gnutls-guile is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910140" version="1" comment="libgnutls-dane-devel is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910141" version="1" comment="libgnutls-dane0 is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910142" version="1" comment="libgnutls-devel is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910143" version="1" comment="libgnutls-devel-32bit is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910144" version="1" comment="libgnutls30 is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910145" version="1" comment="libgnutls30-32bit is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910146" version="1" comment="libgnutls30-hmac is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910147" version="1" comment="libgnutlsxx-devel is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910148" version="1" comment="libgnutlsxx28 is &lt;3.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910149" version="1" comment="go is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910150" version="1" comment="go-doc is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910151" version="1" comment="go-race is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910152" version="1" comment="go1.10 is &lt;1.10.8-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910153" version="1" comment="go1.10-doc is &lt;1.10.8-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910154" version="1" comment="go1.10-race is &lt;1.10.8-8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910155" version="1" comment="go1.11 is &lt;1.11.13-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910156" version="1" comment="go1.11-doc is &lt;1.11.13-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910157" version="1" comment="go1.11-race is &lt;1.11.13-10.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910158" version="1" comment="go1.12 is &lt;1.12.17-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910159" version="1" comment="go1.12-doc is &lt;1.12.17-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910160" version="1" comment="go1.12-race is &lt;1.12.17-4.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910161" version="1" comment="go1.13 is &lt;1.13.15-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910162" version="1" comment="go1.13-doc is &lt;1.13.15-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910163" version="1" comment="go1.13-race is &lt;1.13.15-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910164" version="1" comment="go1.14 is &lt;1.14.15-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910165" version="1" comment="go1.14-doc is &lt;1.14.15-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910166" version="1" comment="go1.14-race is &lt;1.14.15-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910167" version="1" comment="go1.15 is &lt;1.15.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910168" version="1" comment="go1.15-doc is &lt;1.15.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910169" version="1" comment="go1.15-race is &lt;1.15.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910170" version="1" comment="go1.16 is &lt;1.16.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910171" version="1" comment="go1.16-doc is &lt;1.16.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910172" version="1" comment="go1.16-race is &lt;1.16.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910173" version="1" comment="go1.17 is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910174" version="1" comment="go1.17-doc is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910175" version="1" comment="go1.17-race is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910176" version="1" comment="go1.4 is &lt;1.4.3-12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910177" version="1" comment="go1.4-doc is &lt;1.4.3-12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910178" version="1" comment="go1.4-race is &lt;1.4.3-12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910179" version="1" comment="go1.9 is &lt;1.9.7-11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910180" version="1" comment="go1.9-doc is &lt;1.9.7-11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910181" version="1" comment="go1.9-race is &lt;1.9.7-11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910182" version="1" comment="godot is &lt;3.3.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910183" version="1" comment="godot-bash-completion is &lt;3.3.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910184" version="1" comment="godot-headless is &lt;3.3.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910185" version="1" comment="godot-runner is &lt;3.3.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910186" version="1" comment="godot-server is &lt;3.3.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910187" version="1" comment="golang-github-prometheus-prometheus is &lt;2.27.1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910188" version="1" comment="dirmngr is &lt;2.2.27-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910189" version="1" comment="gpg2 is &lt;2.2.27-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910190" version="1" comment="gpg2-lang is &lt;2.2.27-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910191" version="1" comment="gptfdisk is &lt;1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910192" version="1" comment="gptfdisk-fixparts is &lt;1.0.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910193" version="1" comment="gradle is &lt;4.4.1-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910194" version="1" comment="grafana is &lt;7.5.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910195" version="1" comment="grafana-piechart-panel is &lt;1.6.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910196" version="1" comment="graphite2 is &lt;1.3.14-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910197" version="1" comment="graphite2-devel is &lt;1.3.14-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910198" version="1" comment="libgraphite2-3 is &lt;1.3.14-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910199" version="1" comment="libgraphite2-3-32bit is &lt;1.3.14-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910200" version="1" comment="graphviz is &lt;2.48.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910201" version="1" comment="graphviz-devel is &lt;2.48.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910202" version="1" comment="graphviz-plugins-core is &lt;2.48.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910203" version="1" comment="libgraphviz6 is &lt;2.48.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910204" version="1" comment="grilo-devel is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910205" version="1" comment="grilo-lang is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910206" version="1" comment="grilo-tools is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910207" version="1" comment="libgrilo-0_3-0 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910208" version="1" comment="libgrlnet-0_3-0 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910209" version="1" comment="libgrlpls-0_3-0 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910210" version="1" comment="typelib-1_0-Grl-0_3 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910211" version="1" comment="typelib-1_0-GrlNet-0_3 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910212" version="1" comment="typelib-1_0-GrlPls-0_3 is &lt;0.3.13-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910213" version="1" comment="groovy is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910214" version="1" comment="groovy-ant is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910215" version="1" comment="groovy-bsf is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910216" version="1" comment="groovy-console is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910217" version="1" comment="groovy-docgenerator is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910218" version="1" comment="groovy-groovydoc is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910219" version="1" comment="groovy-groovysh is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910220" version="1" comment="groovy-jmx is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910221" version="1" comment="groovy-json is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910222" version="1" comment="groovy-jsr223 is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910223" version="1" comment="groovy-lib is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910224" version="1" comment="groovy-nio is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910225" version="1" comment="groovy-servlet is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910226" version="1" comment="groovy-sql is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910227" version="1" comment="groovy-swing is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910228" version="1" comment="groovy-templates is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910229" version="1" comment="groovy-test is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910230" version="1" comment="groovy-testng is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910231" version="1" comment="groovy-xml is &lt;2.4.21-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910232" version="1" comment="grub2 is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910233" version="1" comment="grub2-branding-upstream is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910234" version="1" comment="grub2-i386-pc is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910235" version="1" comment="grub2-i386-pc-debug is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910236" version="1" comment="grub2-snapper-plugin is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910237" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910238" version="1" comment="grub2-x86_64-efi is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910239" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910240" version="1" comment="grub2-x86_64-xen is &lt;2.06-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910241" version="1" comment="gsoap-devel is &lt;2.8.117-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910242" version="1" comment="gsoap-doc is &lt;2.8.117-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910243" version="1" comment="libgsoap-2_8_117 is &lt;2.8.117-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910244" version="1" comment="gstreamer is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910245" version="1" comment="gstreamer-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910246" version="1" comment="gstreamer-devel is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910247" version="1" comment="gstreamer-devel-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910248" version="1" comment="gstreamer-lang is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910249" version="1" comment="gstreamer-utils is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910250" version="1" comment="libgstreamer-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910251" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910252" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910253" version="1" comment="typelib-1_0-Gst-1_0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910254" version="1" comment="gstreamer-plugins-bad is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910255" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910256" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910257" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910258" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910259" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910260" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910261" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910262" version="1" comment="gstreamer-transcoder is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910263" version="1" comment="gstreamer-transcoder-devel is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910264" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910265" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910266" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910267" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910268" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910269" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910270" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910271" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910272" version="1" comment="libgstcodecs-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910273" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910274" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910275" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910276" version="1" comment="libgstisoff-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910277" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910278" version="1" comment="libgstmpegts-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910279" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910280" version="1" comment="libgstphotography-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910281" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910282" version="1" comment="libgstplayer-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910283" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910284" version="1" comment="libgstsctp-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910285" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910286" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910287" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910288" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910289" version="1" comment="libgstvulkan-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910290" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910291" version="1" comment="libgstwayland-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910292" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910293" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910294" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910295" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910296" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910297" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910298" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910299" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910300" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910301" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910302" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910303" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910304" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910305" version="1" comment="gstreamer-plugins-base is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910306" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910307" version="1" comment="gstreamer-plugins-base-devel is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910308" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910309" version="1" comment="gstreamer-plugins-base-lang is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910310" version="1" comment="libgstallocators-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910311" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910312" version="1" comment="libgstapp-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910313" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910314" version="1" comment="libgstaudio-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910315" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910316" version="1" comment="libgstfft-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910317" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910318" version="1" comment="libgstgl-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910319" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910320" version="1" comment="libgstpbutils-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910321" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910322" version="1" comment="libgstriff-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910323" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910324" version="1" comment="libgstrtp-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910325" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910326" version="1" comment="libgstrtsp-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910327" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910328" version="1" comment="libgstsdp-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910329" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910330" version="1" comment="libgsttag-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910331" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910332" version="1" comment="libgstvideo-1_0-0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910333" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910334" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910335" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910336" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910337" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910338" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910339" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910340" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910341" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910342" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910343" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910344" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910345" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910346" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910347" version="1" comment="gstreamer-plugins-good is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910348" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910349" version="1" comment="gstreamer-plugins-good-extra is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910350" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910351" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910352" version="1" comment="gstreamer-plugins-good-jack is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910353" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910354" version="1" comment="gstreamer-plugins-good-lang is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910355" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910356" version="1" comment="gstreamer-plugins-ugly is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910357" version="1" comment="gstreamer-plugins-ugly-32bit is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910358" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.18.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910359" version="1" comment="gstreamer-rtsp-server-devel is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910360" version="1" comment="libgstrtspserver-1_0-0 is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910361" version="1" comment="typelib-1_0-GstRtspServer-1_0 is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910362" version="1" comment="gthumb is &lt;3.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910363" version="1" comment="gthumb-devel is &lt;3.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910364" version="1" comment="gthumb-lang is &lt;3.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910365" version="1" comment="gtk-vnc-devel is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910366" version="1" comment="gtk-vnc-lang is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910367" version="1" comment="gtk-vnc-tools is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910368" version="1" comment="libgtk-vnc-2_0-0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910369" version="1" comment="libgvnc-1_0-0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910370" version="1" comment="libgvncpulse-1_0-0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910371" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910372" version="1" comment="typelib-1_0-GVncPulse-1_0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910373" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910374" version="1" comment="gtk2-branding-upstream is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910375" version="1" comment="gtk2-data is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910376" version="1" comment="gtk2-devel is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910377" version="1" comment="gtk2-devel-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910378" version="1" comment="gtk2-immodule-amharic is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910379" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910380" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910381" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910382" version="1" comment="gtk2-immodule-multipress is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910383" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910384" version="1" comment="gtk2-immodule-thai is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910385" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910386" version="1" comment="gtk2-immodule-tigrigna is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910387" version="1" comment="gtk2-immodule-tigrigna-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910388" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910389" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910390" version="1" comment="gtk2-immodule-xim is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910391" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910392" version="1" comment="gtk2-lang is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910393" version="1" comment="gtk2-tools is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910394" version="1" comment="gtk2-tools-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910395" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910396" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910397" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.33-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910398" version="1" comment="guava is &lt;30.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910399" version="1" comment="guava-javadoc is &lt;30.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910400" version="1" comment="guava-testlib is &lt;30.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910401" version="1" comment="guix is &lt;1.3.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910402" version="1" comment="libgupnp-1_2-0 is &lt;1.2.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910403" version="1" comment="libgupnp-1_2-0-32bit is &lt;1.2.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910404" version="1" comment="libgupnp-devel is &lt;1.2.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910405" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.2.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910406" version="1" comment="gvfs is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910407" version="1" comment="gvfs-32bit is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910408" version="1" comment="gvfs-backend-afc is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910409" version="1" comment="gvfs-backend-samba is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910410" version="1" comment="gvfs-backends is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910411" version="1" comment="gvfs-devel is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910412" version="1" comment="gvfs-fuse is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910413" version="1" comment="gvfs-lang is &lt;1.48.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910414" version="1" comment="haproxy is &lt;2.4.4+git0.acb1d0bea-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910415" version="1" comment="haserl is &lt;0.9.36-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910416" version="1" comment="helm is &lt;3.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910417" version="1" comment="helm-bash-completion is &lt;3.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910418" version="1" comment="helm-zsh-completion is &lt;3.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910419" version="1" comment="helm-mirror is &lt;0.3.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910420" version="1" comment="hexchat is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910421" version="1" comment="hexchat-devel is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910422" version="1" comment="hexchat-lang is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910423" version="1" comment="hexchat-plugins-lua is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910424" version="1" comment="hexchat-plugins-perl is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910425" version="1" comment="hexchat-plugins-python3 is &lt;2.14.3-4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910426" version="1" comment="hiredis is &lt;1.0.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910427" version="1" comment="hiredis-devel is &lt;1.0.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910428" version="1" comment="libhiredis1_0_0 is &lt;1.0.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910429" version="1" comment="hivex is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910430" version="1" comment="hivex-devel is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910431" version="1" comment="hivex-lang is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910432" version="1" comment="libhivex0 is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910433" version="1" comment="ocaml-hivex is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910434" version="1" comment="ocaml-hivex-devel is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910435" version="1" comment="perl-Win-Hivex is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910436" version="1" comment="python3-hivex is &lt;1.3.21-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910437" version="1" comment="hostapd is &lt;2.9-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910438" version="1" comment="hplip is &lt;3.21.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910439" version="1" comment="hplip-devel is &lt;3.21.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910440" version="1" comment="hplip-hpijs is &lt;3.21.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910441" version="1" comment="hplip-sane is &lt;3.21.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910442" version="1" comment="hplip-scan-utils is &lt;3.21.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910443" version="1" comment="htmldoc is &lt;1.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910444" version="1" comment="httpie is &lt;2.5.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910445" version="1" comment="hugin is &lt;2020.0.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910446" version="1" comment="hunspell is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910447" version="1" comment="hunspell-devel is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910448" version="1" comment="hunspell-devel-32bit is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910449" version="1" comment="hunspell-tools is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910450" version="1" comment="libhunspell-1_7-0 is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910451" version="1" comment="libhunspell-1_7-0-32bit is &lt;1.7.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910452" version="1" comment="hylafax+ is &lt;7.0.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910453" version="1" comment="hylafax+-client is &lt;7.0.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910454" version="1" comment="libfaxutil7_0_3 is &lt;7.0.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910455" version="1" comment="ibus is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910456" version="1" comment="ibus-devel is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910457" version="1" comment="ibus-dict-emoji is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910458" version="1" comment="ibus-gtk is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910459" version="1" comment="ibus-gtk-32bit is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910460" version="1" comment="ibus-gtk3 is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910461" version="1" comment="ibus-gtk3-32bit is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910462" version="1" comment="ibus-lang is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910463" version="1" comment="libibus-1_0-5 is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910464" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910465" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.25-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910466" version="1" comment="icecream is &lt;1.3.1-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910467" version="1" comment="icecream-clang-wrappers is &lt;1.3.1-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910468" version="1" comment="libicecream-devel is &lt;1.3.1-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910469" version="1" comment="icedtea-web is &lt;1.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910470" version="1" comment="icedtea-web-javadoc is &lt;1.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910471" version="1" comment="icinga2 is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910472" version="1" comment="icinga2-bin is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910473" version="1" comment="icinga2-common is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910474" version="1" comment="icinga2-doc is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910475" version="1" comment="icinga2-ido-mysql is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910476" version="1" comment="icinga2-ido-pgsql is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910477" version="1" comment="nano-icinga2 is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910478" version="1" comment="vim-icinga2 is &lt;2.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910479" version="1" comment="icingacli is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910480" version="1" comment="icingaweb2 is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910481" version="1" comment="icingaweb2-common is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910482" version="1" comment="icingaweb2-vendor-HTMLPurifier is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910483" version="1" comment="icingaweb2-vendor-JShrink is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910484" version="1" comment="icingaweb2-vendor-Parsedown is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910485" version="1" comment="icingaweb2-vendor-dompdf is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910486" version="1" comment="icingaweb2-vendor-lessphp is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910487" version="1" comment="icingaweb2-vendor-zf1 is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910488" version="1" comment="php-Icinga is &lt;2.8.4-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910489" version="1" comment="icoutils is &lt;0.32.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910490" version="1" comment="icu is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910491" version="1" comment="libicu-devel is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910492" version="1" comment="libicu-devel-32bit is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910493" version="1" comment="libicu-doc is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910494" version="1" comment="libicu69 is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910495" version="1" comment="libicu69-32bit is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910496" version="1" comment="libicu69-bedata is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910497" version="1" comment="libicu69-ledata is &lt;69.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910498" version="1" comment="ikiwiki is &lt;3.20200202.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910499" version="1" comment="ikiwiki-w3m is &lt;3.20200202.3-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910500" version="1" comment="imlib2 is &lt;1.7.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910501" version="1" comment="imlib2-devel is &lt;1.7.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910502" version="1" comment="imlib2-filters is &lt;1.7.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910503" version="1" comment="imlib2-loaders is &lt;1.7.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910504" version="1" comment="libImlib2-1 is &lt;1.7.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910505" version="1" comment="inn is &lt;2.6.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910506" version="1" comment="inn-devel is &lt;2.6.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910507" version="1" comment="mininews is &lt;2.6.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910508" version="1" comment="ioquake3 is &lt;1.36+git.20210720-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910509" version="1" comment="ioquake3-devel is &lt;1.36+git.20210720-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910510" version="1" comment="ipmitool is &lt;1.8.18.238.gb7adc1d-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910511" version="1" comment="ipmitool-bmc-snmp-proxy is &lt;1.8.18.238.gb7adc1d-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910512" version="1" comment="irssi is &lt;1.2.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910513" version="1" comment="irssi-devel is &lt;1.2.3-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910514" version="1" comment="isync is &lt;1.4.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910515" version="1" comment="iucode-tool is &lt;2.3.1-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910516" version="1" comment="jackson-databind is &lt;2.10.5.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910517" version="1" comment="jackson-databind-javadoc is &lt;2.10.5.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910518" version="1" comment="jasper is &lt;2.0.33-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910519" version="1" comment="libjasper-devel is &lt;2.0.33-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910520" version="1" comment="libjasper4 is &lt;2.0.33-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910521" version="1" comment="libjasper4-32bit is &lt;2.0.33-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910522" version="1" comment="java-11-openj9 is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910523" version="1" comment="java-11-openj9-accessibility is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910524" version="1" comment="java-11-openj9-demo is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910525" version="1" comment="java-11-openj9-devel is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910526" version="1" comment="java-11-openj9-headless is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910527" version="1" comment="java-11-openj9-javadoc is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910528" version="1" comment="java-11-openj9-jmods is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910529" version="1" comment="java-11-openj9-src is &lt;11.0.11.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910530" version="1" comment="java-11-openjdk is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910531" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910532" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910533" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910534" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910535" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910536" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910537" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910538" version="1" comment="java-13-openjdk is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910539" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910540" version="1" comment="java-13-openjdk-demo is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910541" version="1" comment="java-13-openjdk-devel is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910542" version="1" comment="java-13-openjdk-headless is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910543" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910544" version="1" comment="java-13-openjdk-jmods is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910545" version="1" comment="java-13-openjdk-src is &lt;13.0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910546" version="1" comment="java-15-openjdk is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910547" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910548" version="1" comment="java-15-openjdk-demo is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910549" version="1" comment="java-15-openjdk-devel is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910550" version="1" comment="java-15-openjdk-headless is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910551" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910552" version="1" comment="java-15-openjdk-jmods is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910553" version="1" comment="java-15-openjdk-src is &lt;15.0.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910554" version="1" comment="java-16-openjdk is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910555" version="1" comment="java-16-openjdk-accessibility is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910556" version="1" comment="java-16-openjdk-demo is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910557" version="1" comment="java-16-openjdk-devel is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910558" version="1" comment="java-16-openjdk-headless is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910559" version="1" comment="java-16-openjdk-javadoc is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910560" version="1" comment="java-16-openjdk-jmods is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910561" version="1" comment="java-16-openjdk-src is &lt;16.0.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910562" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910563" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910564" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910565" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910566" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910567" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910568" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.292-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910569" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910570" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910571" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910572" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910573" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910574" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910575" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.302-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910576" version="1" comment="jdom2 is &lt;2.0.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910577" version="1" comment="jdom2-javadoc is &lt;2.0.6-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910578" version="1" comment="jetty-annotations is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910579" version="1" comment="jetty-ant is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910580" version="1" comment="jetty-cdi is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910581" version="1" comment="jetty-client is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910582" version="1" comment="jetty-continuation is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910583" version="1" comment="jetty-deploy is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910584" version="1" comment="jetty-fcgi is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910585" version="1" comment="jetty-http is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910586" version="1" comment="jetty-http-spi is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910587" version="1" comment="jetty-io is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910588" version="1" comment="jetty-jaas is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910589" version="1" comment="jetty-jmx is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910590" version="1" comment="jetty-jndi is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910591" version="1" comment="jetty-jsp is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910592" version="1" comment="jetty-minimal-javadoc is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910593" version="1" comment="jetty-openid is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910594" version="1" comment="jetty-plus is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910595" version="1" comment="jetty-proxy is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910596" version="1" comment="jetty-quickstart is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910597" version="1" comment="jetty-rewrite is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910598" version="1" comment="jetty-security is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910599" version="1" comment="jetty-server is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910600" version="1" comment="jetty-servlet is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910601" version="1" comment="jetty-servlets is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910602" version="1" comment="jetty-start is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910603" version="1" comment="jetty-util is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910604" version="1" comment="jetty-util-ajax is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910605" version="1" comment="jetty-webapp is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910606" version="1" comment="jetty-xml is &lt;9.4.43-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910607" version="1" comment="jgraphx is &lt;3.9.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910608" version="1" comment="jhead is &lt;3.06.0.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905172" version="1" comment="jq is &lt;1.6-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910609" version="1" comment="libjq-devel is &lt;1.6-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905173" version="1" comment="libjq1 is &lt;1.6-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910610" version="1" comment="jsoup is &lt;1.14.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910611" version="1" comment="jsoup-javadoc is &lt;1.14.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910612" version="1" comment="jsr-305 is &lt;3.0.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910613" version="1" comment="jsr-305-javadoc is &lt;3.0.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910614" version="1" comment="k3s is &lt;1.21.3+k3s1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910615" version="1" comment="kaffeine is &lt;2.0.18-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910616" version="1" comment="kaffeine-lang is &lt;2.0.18-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910617" version="1" comment="kafka-source is &lt;2.1.0-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910618" version="1" comment="kauth-devel is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910619" version="1" comment="libKF5Auth5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910620" version="1" comment="libKF5Auth5-lang is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910621" version="1" comment="libKF5AuthCore5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910622" version="1" comment="kcodecs-devel is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910623" version="1" comment="libKF5Codecs5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910624" version="1" comment="libKF5Codecs5-lang is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910625" version="1" comment="kconf_update5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910626" version="1" comment="kconfig-devel is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910627" version="1" comment="libKF5ConfigCore5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910628" version="1" comment="libKF5ConfigCore5-lang is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910629" version="1" comment="libKF5ConfigGui5 is &lt;5.86.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910630" version="1" comment="kdeconnect-kde is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910631" version="1" comment="kdeconnect-kde-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910632" version="1" comment="kdeconnect-kde-zsh-completion is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910633" version="1" comment="kdenetwork-filesharing is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910634" version="1" comment="kdenetwork-filesharing-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910635" version="1" comment="kdump is &lt;0.9.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910636" version="1" comment="keepalived is &lt;2.2.2-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910637" version="1" comment="kernel-firmware is &lt;20210901-1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910638" version="1" comment="ucode-amd is &lt;20210901-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910639" version="1" comment="kismet is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910640" version="1" comment="kismet-capture-bt-geiger is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910641" version="1" comment="kismet-capture-freaklabs-zigbee is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910642" version="1" comment="kismet-capture-linux-bluetooth is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910643" version="1" comment="kismet-capture-linux-wifi is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910644" version="1" comment="kismet-capture-nrf-51822 is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910645" version="1" comment="kismet-capture-nrf-52840 is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910646" version="1" comment="kismet-capture-nrf-mousejack is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910647" version="1" comment="kismet-capture-nrf-nxp-kw41z is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910648" version="1" comment="kismet-capture-rz-killerbee is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910649" version="1" comment="kismet-capture-sdr-rtl433 is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910650" version="1" comment="kismet-capture-sdr-rtladsb is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910651" version="1" comment="kismet-capture-sdr-rtlamr is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910652" version="1" comment="kismet-capture-ti-cc-2531 is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910653" version="1" comment="kismet-capture-ti-cc2540 is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910654" version="1" comment="kismet-devel is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910655" version="1" comment="kismet-logtools is &lt;2021_08_R1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910656" version="1" comment="kitty is &lt;0.21.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910657" version="1" comment="koan is &lt;3.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910658" version="1" comment="konversation is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910659" version="1" comment="konversation-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910660" version="1" comment="krb5 is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910661" version="1" comment="krb5-32bit is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910662" version="1" comment="krb5-client is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910663" version="1" comment="krb5-devel is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910664" version="1" comment="krb5-devel-32bit is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910665" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910666" version="1" comment="krb5-plugin-preauth-otp is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910667" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910668" version="1" comment="krb5-plugin-preauth-spake is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910669" version="1" comment="krb5-server is &lt;1.19.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910670" version="1" comment="ktexteditor is &lt;5.86.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910671" version="1" comment="ktexteditor-devel is &lt;5.86.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910672" version="1" comment="ktexteditor-lang is &lt;5.86.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910673" version="1" comment="kubernetes-apiserver is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910674" version="1" comment="kubernetes-apiserver-minus1 is &lt;1.21.5-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910675" version="1" comment="kubernetes-client is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910676" version="1" comment="kubernetes-controller-manager is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910677" version="1" comment="kubernetes-controller-manager-minus1 is &lt;1.21.5-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910678" version="1" comment="kubernetes-coredns is &lt;1.8.4-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910679" version="1" comment="kubernetes-coredns-minus1 is &lt;1.8.0-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910680" version="1" comment="kubernetes-etcd is &lt;3.5.0-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910681" version="1" comment="kubernetes-etcd-minus1 is &lt;3.4.13-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910682" version="1" comment="kubernetes-kubeadm is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910683" version="1" comment="kubernetes-kubelet is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910684" version="1" comment="kubernetes-proxy is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910685" version="1" comment="kubernetes-proxy-minus1 is &lt;1.21.5-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910686" version="1" comment="kubernetes-scheduler is &lt;1.22.2-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910687" version="1" comment="kubernetes-scheduler-minus1 is &lt;1.21.5-21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910688" version="1" comment="kubernetes1.18-apiserver is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910689" version="1" comment="kubernetes1.18-client is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910690" version="1" comment="kubernetes1.18-client-common is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910691" version="1" comment="kubernetes1.18-controller-manager is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910692" version="1" comment="kubernetes1.18-kubeadm is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910693" version="1" comment="kubernetes1.18-kubelet is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910694" version="1" comment="kubernetes1.18-kubelet-common is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910695" version="1" comment="kubernetes1.18-proxy is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910696" version="1" comment="kubernetes1.18-scheduler is &lt;1.18.20-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910697" version="1" comment="kubernetes1.19-apiserver is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910698" version="1" comment="kubernetes1.19-client is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910699" version="1" comment="kubernetes1.19-client-common is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910700" version="1" comment="kubernetes1.19-controller-manager is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910701" version="1" comment="kubernetes1.19-kubeadm is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910702" version="1" comment="kubernetes1.19-kubelet is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910703" version="1" comment="kubernetes1.19-kubelet-common is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910704" version="1" comment="kubernetes1.19-proxy is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910705" version="1" comment="kubernetes1.19-scheduler is &lt;1.19.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910706" version="1" comment="kubernetes1.20-apiserver is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910707" version="1" comment="kubernetes1.20-client is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910708" version="1" comment="kubernetes1.20-client-common is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910709" version="1" comment="kubernetes1.20-controller-manager is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910710" version="1" comment="kubernetes1.20-kubeadm is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910711" version="1" comment="kubernetes1.20-kubelet is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910712" version="1" comment="kubernetes1.20-kubelet-common is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910713" version="1" comment="kubernetes1.20-proxy is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910714" version="1" comment="kubernetes1.20-scheduler is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910715" version="1" comment="kubernetes1.21-apiserver is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910716" version="1" comment="kubernetes1.21-client is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910717" version="1" comment="kubernetes1.21-client-common is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910718" version="1" comment="kubernetes1.21-controller-manager is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910719" version="1" comment="kubernetes1.21-kubeadm is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910720" version="1" comment="kubernetes1.21-kubelet is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910721" version="1" comment="kubernetes1.21-kubelet-common is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910722" version="1" comment="kubernetes1.21-proxy is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910723" version="1" comment="kubernetes1.21-scheduler is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910724" version="1" comment="kvirc is &lt;5.0.0-4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910725" version="1" comment="lame is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910726" version="1" comment="lame-doc is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910727" version="1" comment="lame-mp3rtp is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910728" version="1" comment="libmp3lame-devel is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910729" version="1" comment="libmp3lame0 is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910730" version="1" comment="libmp3lame0-32bit is &lt;3.100-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910731" version="1" comment="lasem is &lt;0.4.4-2.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910732" version="1" comment="lasem-devel is &lt;0.4.4-2.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910733" version="1" comment="liblasem-0_4-4 is &lt;0.4.4-2.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910734" version="1" comment="liblasso-devel is &lt;2.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910735" version="1" comment="liblasso3 is &lt;2.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910736" version="1" comment="python3-lasso is &lt;2.7.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910737" version="1" comment="lcms2 is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910738" version="1" comment="liblcms2-2 is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910739" version="1" comment="liblcms2-2-32bit is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910740" version="1" comment="liblcms2-devel is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910741" version="1" comment="liblcms2-devel-32bit is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910742" version="1" comment="liblcms2-doc is &lt;2.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910743" version="1" comment="ldb-tools is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910744" version="1" comment="libldb-devel is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910745" version="1" comment="libldb2 is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910746" version="1" comment="libldb2-32bit is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910747" version="1" comment="python3-ldb is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910748" version="1" comment="python3-ldb-32bit is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910749" version="1" comment="python3-ldb-devel is &lt;2.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910750" version="1" comment="ldns is &lt;1.7.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910751" version="1" comment="ldns-devel is &lt;1.7.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910752" version="1" comment="libldns3 is &lt;1.7.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910753" version="1" comment="perl-DNS-LDNS is &lt;1.7.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910754" version="1" comment="python3-ldns is &lt;1.7.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910755" version="1" comment="ledger is &lt;3.2.1-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910756" version="1" comment="leptonica-devel is &lt;1.80.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910757" version="1" comment="leptonica-tools is &lt;1.80.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910758" version="1" comment="liblept5 is &lt;1.80.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910759" version="1" comment="liblept5-32bit is &lt;1.80.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910760" version="1" comment="lftp is &lt;4.9.2-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910761" version="1" comment="libEMF-devel is &lt;1.0.13-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910762" version="1" comment="libEMF-utils is &lt;1.0.13-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910763" version="1" comment="libEMF1 is &lt;1.0.13-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910764" version="1" comment="libICE-devel is &lt;1.0.10-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910765" version="1" comment="libICE-devel-32bit is &lt;1.0.10-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910766" version="1" comment="libICE6 is &lt;1.0.10-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910767" version="1" comment="libICE6-32bit is &lt;1.0.10-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910768" version="1" comment="libX11-6 is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910769" version="1" comment="libX11-6-32bit is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910770" version="1" comment="libX11-data is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910771" version="1" comment="libX11-devel is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910772" version="1" comment="libX11-devel-32bit is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910773" version="1" comment="libX11-xcb1 is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910774" version="1" comment="libX11-xcb1-32bit is &lt;1.7.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910775" version="1" comment="libXcursor-devel is &lt;1.2.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910776" version="1" comment="libXcursor-devel-32bit is &lt;1.2.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910777" version="1" comment="libXcursor1 is &lt;1.2.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910778" version="1" comment="libXcursor1-32bit is &lt;1.2.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910779" version="1" comment="libXdmcp-devel is &lt;1.1.3-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910780" version="1" comment="libXdmcp-devel-32bit is &lt;1.1.3-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910781" version="1" comment="libXdmcp6 is &lt;1.1.3-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910782" version="1" comment="libXdmcp6-32bit is &lt;1.1.3-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910783" version="1" comment="libXfont-devel is &lt;1.5.4-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910784" version="1" comment="libXfont-devel-32bit is &lt;1.5.4-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910785" version="1" comment="libXfont1 is &lt;1.5.4-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910786" version="1" comment="libXfont1-32bit is &lt;1.5.4-2.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910787" version="1" comment="libXfont2-2 is &lt;2.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910788" version="1" comment="libXfont2-2-32bit is &lt;2.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910789" version="1" comment="libXfont2-devel is &lt;2.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910790" version="1" comment="libXfont2-devel-32bit is &lt;2.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910791" version="1" comment="libXrandr-devel is &lt;1.5.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910792" version="1" comment="libXrandr-devel-32bit is &lt;1.5.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910793" version="1" comment="libXrandr2 is &lt;1.5.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910794" version="1" comment="libXrandr2-32bit is &lt;1.5.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910795" version="1" comment="aom-tools is &lt;3.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910796" version="1" comment="libaom-devel is &lt;3.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910797" version="1" comment="libaom-devel-doc is &lt;3.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910798" version="1" comment="libaom3 is &lt;3.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910799" version="1" comment="libaom3-32bit is &lt;3.1.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910800" version="1" comment="bsdtar is &lt;3.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910801" version="1" comment="libarchive-devel is &lt;3.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910802" version="1" comment="libarchive13 is &lt;3.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910803" version="1" comment="libarchive13-32bit is &lt;3.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910804" version="1" comment="libav-tools is &lt;12.3-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910805" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910806" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910807" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910808" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910809" version="1" comment="libcaca0-32bit is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910810" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910811" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910812" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910813" version="1" comment="libcacard-devel is &lt;2.8.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910814" version="1" comment="libcacard0 is &lt;2.8.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910815" version="1" comment="libcomps-devel is &lt;0.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910816" version="1" comment="libcomps-doc is &lt;0.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910817" version="1" comment="libcomps0 is &lt;0.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910818" version="1" comment="python-libcomps-doc is &lt;0.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910819" version="1" comment="python3-libcomps is &lt;0.1.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910820" version="1" comment="libconfuse-devel is &lt;3.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910821" version="1" comment="libconfuse-lang is &lt;3.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910822" version="1" comment="libconfuse2 is &lt;3.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910823" version="1" comment="libcontainers-common is &lt;20210626-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910824" version="1" comment="libcroco is &lt;0.6.13-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910825" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910826" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.13-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910827" version="1" comment="libcroco-devel is &lt;0.6.13-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910828" version="1" comment="libcryptopp-devel is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910829" version="1" comment="libcryptopp8_6_0 is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910830" version="1" comment="libcryptopp8_6_0-32bit is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910831" version="1" comment="hawkey-man is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910832" version="1" comment="libdnf-devel is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910833" version="1" comment="libdnf-repo-config-zypp is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910834" version="1" comment="libdnf2 is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910835" version="1" comment="python3-hawkey is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910836" version="1" comment="python3-libdnf is &lt;0.63.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910837" version="1" comment="libdrm-devel is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910838" version="1" comment="libdrm-devel-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910839" version="1" comment="libdrm-tools is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910840" version="1" comment="libdrm2 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910841" version="1" comment="libdrm2-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910842" version="1" comment="libdrm_amdgpu1 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910843" version="1" comment="libdrm_amdgpu1-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910844" version="1" comment="libdrm_intel1 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910845" version="1" comment="libdrm_intel1-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910846" version="1" comment="libdrm_nouveau2 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910847" version="1" comment="libdrm_nouveau2-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910848" version="1" comment="libdrm_radeon1 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910849" version="1" comment="libdrm_radeon1-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910850" version="1" comment="libkms-devel is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910851" version="1" comment="libkms-devel-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910852" version="1" comment="libkms1 is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910853" version="1" comment="libkms1-32bit is &lt;2.4.107-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910854" version="1" comment="libdwarf-devel is &lt;20210528-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910855" version="1" comment="libdwarf-devel-static is &lt;20210528-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910856" version="1" comment="libdwarf-doc is &lt;20210528-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910857" version="1" comment="libdwarf-tools is &lt;20210528-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910858" version="1" comment="libdwarf1 is &lt;20210528-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910859" version="1" comment="libebml-devel is &lt;1.4.2-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910860" version="1" comment="libebml5 is &lt;1.4.2-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910861" version="1" comment="libebml5-32bit is &lt;1.4.2-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910862" version="1" comment="libetpan-devel is &lt;1.9.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910863" version="1" comment="libetpan20 is &lt;1.9.4-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910864" version="1" comment="libexif-devel is &lt;0.6.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910865" version="1" comment="libexif-devel-32bit is &lt;0.6.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910866" version="1" comment="libexif12 is &lt;0.6.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910867" version="1" comment="libexif12-32bit is &lt;0.6.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910868" version="1" comment="libgadu-devel is &lt;1.12.2-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910869" version="1" comment="libgadu3 is &lt;1.12.2-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910870" version="1" comment="libgcrypt-cavs is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910871" version="1" comment="libgcrypt-devel is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910872" version="1" comment="libgcrypt-devel-32bit is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910873" version="1" comment="libgcrypt20 is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910874" version="1" comment="libgcrypt20-32bit is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910875" version="1" comment="libgcrypt20-hmac is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910876" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.9.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910877" version="1" comment="libakai0 is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910878" version="1" comment="libgig-devel is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910879" version="1" comment="libgig-tools is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910880" version="1" comment="libgig10 is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910881" version="1" comment="libgit2-1_1 is &lt;1.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910882" version="1" comment="libgit2-1_1-32bit is &lt;1.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910883" version="1" comment="libgit2-devel is &lt;1.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910884" version="1" comment="libgme-devel is &lt;0.6.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910885" version="1" comment="libgme0 is &lt;0.6.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910886" version="1" comment="libgme0-32bit is &lt;0.6.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910887" version="1" comment="libgtop is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910888" version="1" comment="libgtop-2_0-11 is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910889" version="1" comment="libgtop-2_0-11-32bit is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910890" version="1" comment="libgtop-devel is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910891" version="1" comment="libgtop-doc is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910892" version="1" comment="libgtop-lang is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910893" version="1" comment="typelib-1_0-GTop-2_0 is &lt;2.40.0-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910894" version="1" comment="libheimdal is &lt;7.7.0-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910895" version="1" comment="libheimdal-devel is &lt;7.7.0-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910896" version="1" comment="libical-devel is &lt;3.0.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910897" version="1" comment="libical-doc is &lt;3.0.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910898" version="1" comment="libical3 is &lt;3.0.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910899" version="1" comment="libical3-32bit is &lt;3.0.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910900" version="1" comment="libid3tag-devel is &lt;0.15.1b-188.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910901" version="1" comment="libid3tag0 is &lt;0.15.1b-188.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910902" version="1" comment="libid3tag0-32bit is &lt;0.15.1b-188.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910903" version="1" comment="libidn-devel is &lt;1.38-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910904" version="1" comment="libidn-tools is &lt;1.38-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910905" version="1" comment="libidn12 is &lt;1.38-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910906" version="1" comment="libidn12-32bit is &lt;1.38-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910907" version="1" comment="libidn2-0 is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910908" version="1" comment="libidn2-0-32bit is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910909" version="1" comment="libidn2-devel is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910910" version="1" comment="libidn2-lang is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910911" version="1" comment="libidn2-tools is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910912" version="1" comment="jcat-tool is &lt;0.1.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910913" version="1" comment="libjcat-devel is &lt;0.1.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910914" version="1" comment="libjcat1 is &lt;0.1.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910915" version="1" comment="typelib-1_0-Jcat-1_0 is &lt;0.1.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910916" version="1" comment="libjpeg-turbo is &lt;2.1.1-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910917" version="1" comment="libjpeg8 is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910918" version="1" comment="libjpeg8-32bit is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910919" version="1" comment="libjpeg8-devel is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910920" version="1" comment="libjpeg8-devel-32bit is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910921" version="1" comment="libturbojpeg0 is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910922" version="1" comment="libturbojpeg0-32bit is &lt;8.2.2-65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910923" version="1" comment="liblouis-data is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910924" version="1" comment="liblouis-devel is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910925" version="1" comment="liblouis-doc is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910926" version="1" comment="liblouis-tools is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910927" version="1" comment="liblouis20 is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910928" version="1" comment="python3-louis is &lt;3.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910929" version="1" comment="libmad-devel is &lt;0.15.1b-3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910930" version="1" comment="libmad0 is &lt;0.15.1b-3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910931" version="1" comment="libmad0-32bit is &lt;0.15.1b-3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910932" version="1" comment="libmediainfo-devel is &lt;21.09-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910933" version="1" comment="libmediainfo0 is &lt;21.09-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910934" version="1" comment="libmediainfo0-32bit is &lt;21.09-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910935" version="1" comment="libmicrohttpd-devel is &lt;0.9.73-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910936" version="1" comment="libmicrohttpd12 is &lt;0.9.73-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910937" version="1" comment="libmirage-3_2 is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910938" version="1" comment="libmirage-data is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910939" version="1" comment="libmirage-devel is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910940" version="1" comment="libmirage-lang is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910941" version="1" comment="libmirage-vala is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910942" version="1" comment="libmirage11 is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910943" version="1" comment="typelib-1_0-libmirage-3_2 is &lt;3.2.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910944" version="1" comment="libmspack-devel is &lt;0.10.1-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910945" version="1" comment="libmspack0 is &lt;0.10.1-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910946" version="1" comment="libmspack0-32bit is &lt;0.10.1-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910947" version="1" comment="mspack-examples is &lt;0.10.1-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910948" version="1" comment="libmwaw-0_3-3 is &lt;0.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910949" version="1" comment="libmwaw-devel is &lt;0.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910950" version="1" comment="libmwaw-devel-doc is &lt;0.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910951" version="1" comment="libmwaw-tools is &lt;0.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910952" version="1" comment="libmysofa-devel is &lt;1.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910953" version="1" comment="libmysofa1 is &lt;1.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910954" version="1" comment="libmysofa1-32bit is &lt;1.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910955" version="1" comment="libnbd is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910956" version="1" comment="libnbd-bash-completion is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910957" version="1" comment="libnbd-devel is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910958" version="1" comment="libnbd0 is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910959" version="1" comment="nbdfuse is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910960" version="1" comment="libhogweed6 is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910961" version="1" comment="libhogweed6-32bit is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910962" version="1" comment="libnettle-devel is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910963" version="1" comment="libnettle-devel-32bit is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910964" version="1" comment="libnettle8 is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910965" version="1" comment="libnettle8-32bit is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910966" version="1" comment="nettle is &lt;3.7.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910967" version="1" comment="libntlm-devel is &lt;1.6-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910968" version="1" comment="libntlm0 is &lt;1.6-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910969" version="1" comment="libofx is &lt;0.10.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910970" version="1" comment="libofx-devel is &lt;0.10.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910971" version="1" comment="libofx7 is &lt;0.10.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910972" version="1" comment="libopenmpt-devel is &lt;0.5.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910973" version="1" comment="libopenmpt0 is &lt;0.5.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910974" version="1" comment="libopenmpt0-32bit is &lt;0.5.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910975" version="1" comment="openmpt123 is &lt;0.5.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910976" version="1" comment="libosinfo is &lt;1.9.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910977" version="1" comment="libosinfo-1_0-0 is &lt;1.9.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910978" version="1" comment="libosinfo-devel is &lt;1.9.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910979" version="1" comment="libosinfo-lang is &lt;1.9.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910980" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.9.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910981" version="1" comment="libosip2-12 is &lt;5.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910982" version="1" comment="libosip2-devel is &lt;5.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910983" version="1" comment="libpano-devel is &lt;2.9.20-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910984" version="1" comment="libpano-utils is &lt;2.9.20-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910985" version="1" comment="libpano13-3 is &lt;2.9.20-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910986" version="1" comment="libpcap-devel is &lt;1.10.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910987" version="1" comment="libpcap-devel-32bit is &lt;1.10.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910988" version="1" comment="libpcap-devel-static is &lt;1.10.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910989" version="1" comment="libpcap1 is &lt;1.10.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910990" version="1" comment="libpcap1-32bit is &lt;1.10.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910991" version="1" comment="libplist++-2_0-3 is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910992" version="1" comment="libplist++-2_0-3-32bit is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910993" version="1" comment="libplist++-2_0-devel is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910994" version="1" comment="libplist-2_0-3 is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910995" version="1" comment="libplist-2_0-3-32bit is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910996" version="1" comment="libplist-2_0-devel is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910997" version="1" comment="plistutil is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910998" version="1" comment="python3-plist is &lt;2.2.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009910999" version="1" comment="libpng12-0 is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911000" version="1" comment="libpng12-0-32bit is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911001" version="1" comment="libpng12-compat-devel is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911002" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911003" version="1" comment="libpng12-devel is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911004" version="1" comment="libpng12-devel-32bit is &lt;1.2.59-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911005" version="1" comment="libpng16-16 is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911006" version="1" comment="libpng16-16-32bit is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911007" version="1" comment="libpng16-compat-devel is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911008" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911009" version="1" comment="libpng16-devel is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911010" version="1" comment="libpng16-devel-32bit is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911011" version="1" comment="libpng16-tools is &lt;1.6.37-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911012" version="1" comment="libproxy-devel is &lt;0.4.17-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911013" version="1" comment="libproxy-tools is &lt;0.4.17-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911014" version="1" comment="libproxy1 is &lt;0.4.17-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911015" version="1" comment="libproxy1-32bit is &lt;0.4.17-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911016" version="1" comment="doxygen2man is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911017" version="1" comment="libqb-devel is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911018" version="1" comment="libqb-devel-32bit is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911019" version="1" comment="libqb-tests is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911020" version="1" comment="libqb-tools is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911021" version="1" comment="libqb100 is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911022" version="1" comment="libqb100-32bit is &lt;2.0.2+20201203.def947e-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911023" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911024" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911025" version="1" comment="libQt5Concurrent-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911026" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911027" version="1" comment="libQt5Concurrent5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911028" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911029" version="1" comment="libQt5Core-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911030" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911031" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911032" version="1" comment="libQt5Core5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911033" version="1" comment="libQt5Core5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911034" version="1" comment="libQt5DBus-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911035" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911036" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911037" version="1" comment="libQt5DBus5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911038" version="1" comment="libQt5DBus5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911039" version="1" comment="libQt5Gui-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911040" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911041" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911042" version="1" comment="libQt5Gui5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911043" version="1" comment="libQt5Gui5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911044" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911045" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911046" version="1" comment="libQt5Network-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911047" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911048" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911049" version="1" comment="libQt5Network5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911050" version="1" comment="libQt5Network5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911051" version="1" comment="libQt5OpenGL-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911052" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911053" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911054" version="1" comment="libQt5OpenGL5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911055" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911056" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911057" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911058" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911059" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911060" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911061" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911062" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911063" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911064" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911065" version="1" comment="libQt5PrintSupport5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911066" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911067" version="1" comment="libQt5Sql-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911068" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911069" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911070" version="1" comment="libQt5Sql5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911071" version="1" comment="libQt5Sql5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911072" version="1" comment="libQt5Sql5-mysql is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911073" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911074" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911075" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911076" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911077" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911078" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911079" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911080" version="1" comment="libQt5Test-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911081" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911082" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911083" version="1" comment="libQt5Test5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911084" version="1" comment="libQt5Test5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911085" version="1" comment="libQt5Widgets-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911086" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911087" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911088" version="1" comment="libQt5Widgets5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911089" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911090" version="1" comment="libQt5Xml-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911091" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911092" version="1" comment="libQt5Xml5 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911093" version="1" comment="libQt5Xml5-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911094" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911095" version="1" comment="libqt5-qtbase-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911096" version="1" comment="libqt5-qtbase-examples is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911097" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911098" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911099" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911100" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.2+kde222-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911101" version="1" comment="libQt5Svg5 is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911102" version="1" comment="libQt5Svg5-32bit is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911103" version="1" comment="libqt5-qtsvg-devel is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911104" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911105" version="1" comment="libqt5-qtsvg-examples is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911106" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.15.2+kde7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911107" version="1" comment="libQt5Pdf5 is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911108" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911109" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911110" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911111" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911112" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911113" version="1" comment="libqt5-qtwebengine is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911114" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911115" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911116" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911117" version="1" comment="libquicktime is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911118" version="1" comment="libquicktime-32bit is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911119" version="1" comment="libquicktime-devel is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911120" version="1" comment="libquicktime-lang is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911121" version="1" comment="libquicktime-tools is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911122" version="1" comment="libquicktime0 is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911123" version="1" comment="libquicktime0-32bit is &lt;1.2.4+git20180804.fff99cd-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911124" version="1" comment="libqxmpp-devel is &lt;1.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911125" version="1" comment="libqxmpp-doc is &lt;1.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911126" version="1" comment="libqxmpp3 is &lt;1.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911127" version="1" comment="libqxmpp3-32bit is &lt;1.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911128" version="1" comment="libraw-devel is &lt;0.20.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911129" version="1" comment="libraw-devel-static is &lt;0.20.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911130" version="1" comment="libraw-tools is &lt;0.20.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911131" version="1" comment="libraw20 is &lt;0.20.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911132" version="1" comment="libraw20-32bit is &lt;0.20.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911133" version="1" comment="libredwg-devel is &lt;0.11.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911134" version="1" comment="libredwg-tools is &lt;0.11.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911135" version="1" comment="libredwg0 is &lt;0.11.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911136" version="1" comment="librelp-devel is &lt;1.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911137" version="1" comment="librelp0 is &lt;1.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911138" version="1" comment="libreoffice is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911139" version="1" comment="libreoffice-base is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911140" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911141" version="1" comment="libreoffice-branding-upstream is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911142" version="1" comment="libreoffice-calc is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911143" version="1" comment="libreoffice-calc-extensions is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911144" version="1" comment="libreoffice-draw is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911145" version="1" comment="libreoffice-filters-optional is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911146" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911147" version="1" comment="libreoffice-glade is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911148" version="1" comment="libreoffice-gnome is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911149" version="1" comment="libreoffice-gtk3 is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911150" version="1" comment="libreoffice-icon-themes is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911151" version="1" comment="libreoffice-impress is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911152" version="1" comment="libreoffice-l10n-af is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911153" version="1" comment="libreoffice-l10n-am is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911154" version="1" comment="libreoffice-l10n-ar is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911155" version="1" comment="libreoffice-l10n-as is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911156" version="1" comment="libreoffice-l10n-ast is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911157" version="1" comment="libreoffice-l10n-be is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911158" version="1" comment="libreoffice-l10n-bg is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911159" version="1" comment="libreoffice-l10n-bn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911160" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911161" version="1" comment="libreoffice-l10n-bo is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911162" version="1" comment="libreoffice-l10n-br is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911163" version="1" comment="libreoffice-l10n-brx is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911164" version="1" comment="libreoffice-l10n-bs is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911165" version="1" comment="libreoffice-l10n-ca is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911166" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911167" version="1" comment="libreoffice-l10n-ckb is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911168" version="1" comment="libreoffice-l10n-cs is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911169" version="1" comment="libreoffice-l10n-cy is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911170" version="1" comment="libreoffice-l10n-da is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911171" version="1" comment="libreoffice-l10n-de is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911172" version="1" comment="libreoffice-l10n-dgo is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911173" version="1" comment="libreoffice-l10n-dsb is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911174" version="1" comment="libreoffice-l10n-dz is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911175" version="1" comment="libreoffice-l10n-el is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911176" version="1" comment="libreoffice-l10n-en is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911177" version="1" comment="libreoffice-l10n-en_GB is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911178" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911179" version="1" comment="libreoffice-l10n-eo is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911180" version="1" comment="libreoffice-l10n-es is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911181" version="1" comment="libreoffice-l10n-et is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911182" version="1" comment="libreoffice-l10n-eu is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911183" version="1" comment="libreoffice-l10n-fa is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911184" version="1" comment="libreoffice-l10n-fi is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911185" version="1" comment="libreoffice-l10n-fr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911186" version="1" comment="libreoffice-l10n-fur is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911187" version="1" comment="libreoffice-l10n-fy is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911188" version="1" comment="libreoffice-l10n-ga is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911189" version="1" comment="libreoffice-l10n-gd is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911190" version="1" comment="libreoffice-l10n-gl is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911191" version="1" comment="libreoffice-l10n-gu is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911192" version="1" comment="libreoffice-l10n-gug is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911193" version="1" comment="libreoffice-l10n-he is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911194" version="1" comment="libreoffice-l10n-hi is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911195" version="1" comment="libreoffice-l10n-hr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911196" version="1" comment="libreoffice-l10n-hsb is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911197" version="1" comment="libreoffice-l10n-hu is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911198" version="1" comment="libreoffice-l10n-id is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911199" version="1" comment="libreoffice-l10n-is is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911200" version="1" comment="libreoffice-l10n-it is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911201" version="1" comment="libreoffice-l10n-ja is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911202" version="1" comment="libreoffice-l10n-ka is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911203" version="1" comment="libreoffice-l10n-kab is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911204" version="1" comment="libreoffice-l10n-kk is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911205" version="1" comment="libreoffice-l10n-km is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911206" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911207" version="1" comment="libreoffice-l10n-kn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911208" version="1" comment="libreoffice-l10n-ko is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911209" version="1" comment="libreoffice-l10n-kok is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911210" version="1" comment="libreoffice-l10n-ks is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911211" version="1" comment="libreoffice-l10n-lb is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911212" version="1" comment="libreoffice-l10n-lo is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911213" version="1" comment="libreoffice-l10n-lt is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911214" version="1" comment="libreoffice-l10n-lv is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911215" version="1" comment="libreoffice-l10n-mai is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911216" version="1" comment="libreoffice-l10n-mk is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911217" version="1" comment="libreoffice-l10n-ml is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911218" version="1" comment="libreoffice-l10n-mn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911219" version="1" comment="libreoffice-l10n-mni is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911220" version="1" comment="libreoffice-l10n-mr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911221" version="1" comment="libreoffice-l10n-my is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911222" version="1" comment="libreoffice-l10n-nb is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911223" version="1" comment="libreoffice-l10n-ne is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911224" version="1" comment="libreoffice-l10n-nl is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911225" version="1" comment="libreoffice-l10n-nn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911226" version="1" comment="libreoffice-l10n-nr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911227" version="1" comment="libreoffice-l10n-nso is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911228" version="1" comment="libreoffice-l10n-oc is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911229" version="1" comment="libreoffice-l10n-om is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911230" version="1" comment="libreoffice-l10n-or is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911231" version="1" comment="libreoffice-l10n-pa is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911232" version="1" comment="libreoffice-l10n-pl is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911233" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911234" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911235" version="1" comment="libreoffice-l10n-ro is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911236" version="1" comment="libreoffice-l10n-ru is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911237" version="1" comment="libreoffice-l10n-rw is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911238" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911239" version="1" comment="libreoffice-l10n-sat is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911240" version="1" comment="libreoffice-l10n-sd is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911241" version="1" comment="libreoffice-l10n-si is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911242" version="1" comment="libreoffice-l10n-sid is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911243" version="1" comment="libreoffice-l10n-sk is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911244" version="1" comment="libreoffice-l10n-sl is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911245" version="1" comment="libreoffice-l10n-sq is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911246" version="1" comment="libreoffice-l10n-sr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911247" version="1" comment="libreoffice-l10n-ss is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911248" version="1" comment="libreoffice-l10n-st is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911249" version="1" comment="libreoffice-l10n-sv is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911250" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911251" version="1" comment="libreoffice-l10n-szl is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911252" version="1" comment="libreoffice-l10n-ta is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911253" version="1" comment="libreoffice-l10n-te is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911254" version="1" comment="libreoffice-l10n-tg is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911255" version="1" comment="libreoffice-l10n-th is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911256" version="1" comment="libreoffice-l10n-tn is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911257" version="1" comment="libreoffice-l10n-tr is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911258" version="1" comment="libreoffice-l10n-ts is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911259" version="1" comment="libreoffice-l10n-tt is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911260" version="1" comment="libreoffice-l10n-ug is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911261" version="1" comment="libreoffice-l10n-uk is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911262" version="1" comment="libreoffice-l10n-uz is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911263" version="1" comment="libreoffice-l10n-ve is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911264" version="1" comment="libreoffice-l10n-vec is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911265" version="1" comment="libreoffice-l10n-vi is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911266" version="1" comment="libreoffice-l10n-xh is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911267" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911268" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911269" version="1" comment="libreoffice-l10n-zu is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911270" version="1" comment="libreoffice-librelogo is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911271" version="1" comment="libreoffice-mailmerge is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911272" version="1" comment="libreoffice-math is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911273" version="1" comment="libreoffice-officebean is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911274" version="1" comment="libreoffice-pyuno is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911275" version="1" comment="libreoffice-qt5 is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911276" version="1" comment="libreoffice-sdk is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911277" version="1" comment="libreoffice-sdk-doc is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911278" version="1" comment="libreoffice-writer is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911279" version="1" comment="libreoffice-writer-extensions is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911280" version="1" comment="libreofficekit is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911281" version="1" comment="libreofficekit-devel is &lt;7.1.5.2-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911282" version="1" comment="librepo-devel is &lt;1.14.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911283" version="1" comment="librepo0 is &lt;1.14.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911284" version="1" comment="python3-librepo is &lt;1.14.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911285" version="1" comment="libcrypto46 is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911286" version="1" comment="libcrypto46-32bit is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911287" version="1" comment="libressl is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911288" version="1" comment="libressl-devel is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911289" version="1" comment="libressl-devel-32bit is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911290" version="1" comment="libressl-devel-doc is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911291" version="1" comment="libssl48 is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911292" version="1" comment="libssl48-32bit is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911293" version="1" comment="libtls20 is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911294" version="1" comment="libtls20-32bit is &lt;3.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911295" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911296" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911297" version="1" comment="librsvg-2-2 is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911298" version="1" comment="librsvg-2-2-32bit is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911299" version="1" comment="librsvg-devel is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911300" version="1" comment="librsvg-lang is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911301" version="1" comment="rsvg-convert is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911302" version="1" comment="rsvg-thumbnailer is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911303" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.50.7-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911304" version="1" comment="libsamplerate-devel is &lt;0.2.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911305" version="1" comment="libsamplerate0 is &lt;0.2.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911306" version="1" comment="libsamplerate0-32bit is &lt;0.2.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911307" version="1" comment="libsass-3_6_5-1 is &lt;3.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911308" version="1" comment="libsass-devel is &lt;3.6.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911309" version="1" comment="libseccomp-devel is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911310" version="1" comment="libseccomp-tools is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911311" version="1" comment="libseccomp2 is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911312" version="1" comment="libseccomp2-32bit is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911313" version="1" comment="libsepol-devel is &lt;3.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911314" version="1" comment="libsepol-devel-static is &lt;3.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911315" version="1" comment="libsepol-utils is &lt;3.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911316" version="1" comment="libsepol2 is &lt;3.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911317" version="1" comment="libsepol2-32bit is &lt;3.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911318" version="1" comment="libslirp-devel is &lt;4.6.1+7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911319" version="1" comment="libslirp0 is &lt;4.6.1+7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911320" version="1" comment="libsndfile-devel is &lt;1.0.31-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911321" version="1" comment="libsndfile1 is &lt;1.0.31-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911322" version="1" comment="libsndfile1-32bit is &lt;1.0.31-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911323" version="1" comment="libsolv-demo is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911324" version="1" comment="libsolv-devel is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911325" version="1" comment="libsolv-tools is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911326" version="1" comment="perl-solv is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911327" version="1" comment="python-solv is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911328" version="1" comment="python3-solv is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911329" version="1" comment="ruby-solv is &lt;0.7.19-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911330" version="1" comment="libsoup-2_4-1 is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911331" version="1" comment="libsoup-2_4-1-32bit is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911332" version="1" comment="libsoup-devel is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911333" version="1" comment="libsoup-devel-32bit is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911334" version="1" comment="libsoup-lang is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911335" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.72.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911336" version="1" comment="libspf2-2 is &lt;1.2.10-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911337" version="1" comment="libspf2-apidocs is &lt;1.2.10-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911338" version="1" comment="libspf2-devel is &lt;1.2.10-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911339" version="1" comment="libspf2-tools is &lt;1.2.10-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911340" version="1" comment="perl-Mail-SPF_XS is &lt;0.01-5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911341" version="1" comment="libspiro-devel is &lt;20200505-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911342" version="1" comment="libspiro1 is &lt;20200505-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911343" version="1" comment="libsrtp2-1 is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911344" version="1" comment="libsrtp2-1-32bit is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911345" version="1" comment="libsrtp2-devel is &lt;2.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911346" version="1" comment="libssh-config is &lt;0.9.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911347" version="1" comment="libssh-devel is &lt;0.9.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911348" version="1" comment="libssh4 is &lt;0.9.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911349" version="1" comment="libssh4-32bit is &lt;0.9.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911350" version="1" comment="libssh2-1 is &lt;1.9.0-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911351" version="1" comment="libssh2-1-32bit is &lt;1.9.0-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911352" version="1" comment="libssh2-devel is &lt;1.9.0-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911353" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911354" version="1" comment="libstaroffice-devel is &lt;0.0.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911355" version="1" comment="libstaroffice-devel-doc is &lt;0.0.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911356" version="1" comment="libstaroffice-tools is &lt;0.0.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911357" version="1" comment="libtasn1-6 is &lt;4.17.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911358" version="1" comment="libtasn1-6-32bit is &lt;4.17.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911359" version="1" comment="libtasn1-devel is &lt;4.17.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911360" version="1" comment="libtasn1-devel-32bit is &lt;4.17.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911361" version="1" comment="libtasn1-tools is &lt;4.17.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911362" version="1" comment="libtirpc-devel is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911363" version="1" comment="libtirpc-netconfig is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911364" version="1" comment="libtirpc3 is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911365" version="1" comment="libtirpc3-32bit is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911366" version="1" comment="libtomcrypt-devel is &lt;1.18.2-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911367" version="1" comment="libtomcrypt-examples is &lt;1.18.2-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911368" version="1" comment="libtomcrypt1 is &lt;1.18.2-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911369" version="1" comment="libtomcrypt1-32bit is &lt;1.18.2-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911370" version="1" comment="libtpms-devel is &lt;0.8.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911371" version="1" comment="libtpms0 is &lt;0.8.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911372" version="1" comment="libunbound8 is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911373" version="1" comment="python3-unbound is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911374" version="1" comment="unbound is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911375" version="1" comment="unbound-anchor is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911376" version="1" comment="unbound-devel is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911377" version="1" comment="unbound-munin is &lt;1.13.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911378" version="1" comment="libixml11 is &lt;1.14.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911379" version="1" comment="libixml11-32bit is &lt;1.14.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911380" version="1" comment="libupnp-devel is &lt;1.14.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911381" version="1" comment="libupnp17 is &lt;1.14.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911382" version="1" comment="libupnp17-32bit is &lt;1.14.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911383" version="1" comment="libuv-devel is &lt;1.42.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911384" version="1" comment="libuv1 is &lt;1.42.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911385" version="1" comment="libuv1-32bit is &lt;1.42.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911386" version="1" comment="libvirt is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911387" version="1" comment="libvirt-client is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911388" version="1" comment="libvirt-daemon is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911389" version="1" comment="libvirt-daemon-config-network is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911390" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911391" version="1" comment="libvirt-daemon-driver-interface is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911392" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911393" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911394" version="1" comment="libvirt-daemon-driver-network is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911395" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911396" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911397" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911398" version="1" comment="libvirt-daemon-driver-secret is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911399" version="1" comment="libvirt-daemon-driver-storage is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911400" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911401" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911402" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911403" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911404" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911405" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911406" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911407" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911408" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911409" version="1" comment="libvirt-daemon-hooks is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911410" version="1" comment="libvirt-daemon-lxc is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911411" version="1" comment="libvirt-daemon-qemu is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911412" version="1" comment="libvirt-daemon-xen is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911413" version="1" comment="libvirt-devel is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911414" version="1" comment="libvirt-devel-32bit is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911415" version="1" comment="libvirt-doc is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911416" version="1" comment="libvirt-libs is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911417" version="1" comment="libvirt-lock-sanlock is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911418" version="1" comment="libvirt-nss is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911419" version="1" comment="wireshark-plugin-libvirt is &lt;7.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911420" version="1" comment="libvorbis-devel is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911421" version="1" comment="libvorbis-devel-32bit is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911422" version="1" comment="libvorbis0 is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911423" version="1" comment="libvorbis0-32bit is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911424" version="1" comment="libvorbisenc2 is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911425" version="1" comment="libvorbisenc2-32bit is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911426" version="1" comment="libvorbisfile3 is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911427" version="1" comment="libvorbisfile3-32bit is &lt;1.3.7-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911428" version="1" comment="libvpx-devel is &lt;1.10.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911429" version="1" comment="libvpx6 is &lt;1.10.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911430" version="1" comment="libvpx6-32bit is &lt;1.10.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911431" version="1" comment="vpx-tools is &lt;1.10.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911432" version="1" comment="libwebp-devel is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911433" version="1" comment="libwebp-devel-32bit is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911434" version="1" comment="libwebp-tools is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911435" version="1" comment="libwebp7 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911436" version="1" comment="libwebp7-32bit is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911437" version="1" comment="libwebpdecoder3 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911438" version="1" comment="libwebpdecoder3-32bit is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911439" version="1" comment="libwebpdemux2 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911440" version="1" comment="libwebpdemux2-32bit is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911441" version="1" comment="libwebpmux3 is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911442" version="1" comment="libwebpmux3-32bit is &lt;1.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911443" version="1" comment="libwmf-0_2-7 is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911444" version="1" comment="libwmf-0_2-7-32bit is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911445" version="1" comment="libwmf-devel is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911446" version="1" comment="libwmf-gnome is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911447" version="1" comment="libwmf-gnome-32bit is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911448" version="1" comment="libwmf-tools is &lt;0.2.12-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911449" version="1" comment="libwpd-0_10-10 is &lt;0.10.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911450" version="1" comment="libwpd-devel is &lt;0.10.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911451" version="1" comment="libwpd-devel-doc is &lt;0.10.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911452" version="1" comment="libwpd-tools is &lt;0.10.3-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911453" version="1" comment="libxkbcommon-devel is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911454" version="1" comment="libxkbcommon-devel-32bit is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911455" version="1" comment="libxkbcommon-tools is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911456" version="1" comment="libxkbcommon-x11-0 is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911457" version="1" comment="libxkbcommon-x11-0-32bit is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911458" version="1" comment="libxkbcommon-x11-devel is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911459" version="1" comment="libxkbcommon-x11-devel-32bit is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911460" version="1" comment="libxkbcommon0 is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911461" version="1" comment="libxkbcommon0-32bit is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911462" version="1" comment="libxkbregistry-devel is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911463" version="1" comment="libxkbregistry0 is &lt;1.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911464" version="1" comment="libxls-devel is &lt;1.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911465" version="1" comment="libxls-tools is &lt;1.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911466" version="1" comment="libxlsreader8 is &lt;1.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911467" version="1" comment="libxml2-2 is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911468" version="1" comment="libxml2-2-32bit is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911469" version="1" comment="libxml2-devel is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911470" version="1" comment="libxml2-devel-32bit is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911471" version="1" comment="libxml2-doc is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911472" version="1" comment="libxml2-tools is &lt;2.9.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911473" version="1" comment="libxslt-devel is &lt;1.1.34-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911474" version="1" comment="libxslt-devel-32bit is &lt;1.1.34-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911475" version="1" comment="libxslt-tools is &lt;1.1.34-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911476" version="1" comment="libxslt1 is &lt;1.1.34-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911477" version="1" comment="libxslt1-32bit is &lt;1.1.34-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911478" version="1" comment="libzip-devel is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911479" version="1" comment="libzip-tools is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911480" version="1" comment="libzip5 is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911481" version="1" comment="libzip5-32bit is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911482" version="1" comment="libzypp is &lt;17.28.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911483" version="1" comment="libzypp-devel is &lt;17.28.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911484" version="1" comment="libzypp-devel-doc is &lt;17.28.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911485" version="1" comment="liferea is &lt;1.13.6-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911486" version="1" comment="liferea-lang is &lt;1.13.6-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911487" version="1" comment="lilypond is &lt;2.23.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911488" version="1" comment="lilypond-emmentaler-fonts is &lt;2.23.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911489" version="1" comment="lilypond-fonts-common is &lt;2.23.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911490" version="1" comment="lilypond-texgy-fonts is &lt;2.23.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911491" version="1" comment="links is &lt;2.24-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911492" version="1" comment="libBasicUsageEnvironment1 is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911493" version="1" comment="libUsageEnvironment3 is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911494" version="1" comment="libgroupsock30 is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911495" version="1" comment="libliveMedia97 is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911496" version="1" comment="live555 is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911497" version="1" comment="live555-devel is &lt;2021.08.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911498" version="1" comment="liblldpctl4 is &lt;1.0.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911499" version="1" comment="lldpd is &lt;1.0.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911500" version="1" comment="lldpd-devel is &lt;1.0.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911501" version="1" comment="log4j is &lt;2.13.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911502" version="1" comment="log4j-javadoc is &lt;2.13.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911503" version="1" comment="log4j-jcl is &lt;2.13.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911504" version="1" comment="log4j-slf4j is &lt;2.13.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911505" version="1" comment="log4j12 is &lt;1.2.17-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911506" version="1" comment="log4j12-javadoc is &lt;1.2.17-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911507" version="1" comment="log4j12-manual is &lt;1.2.17-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911508" version="1" comment="lout is &lt;3.42-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911509" version="1" comment="liblua5_3-5 is &lt;5.3.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911510" version="1" comment="liblua5_3-5-32bit is &lt;5.3.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911511" version="1" comment="lua53 is &lt;5.3.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911512" version="1" comment="lua53-devel is &lt;5.3.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911513" version="1" comment="lua53-doc is &lt;5.3.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911514" version="1" comment="liblua5_4-5 is &lt;5.4.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911515" version="1" comment="liblua5_4-5-32bit is &lt;5.4.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911516" version="1" comment="lua54 is &lt;5.4.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911517" version="1" comment="lua54-devel is &lt;5.4.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911518" version="1" comment="lua54-doc is &lt;5.4.3-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911519" version="1" comment="liblxc-devel is &lt;4.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911520" version="1" comment="liblxc1 is &lt;4.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911521" version="1" comment="lxc is &lt;4.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911522" version="1" comment="lxc-bash-completion is &lt;4.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911523" version="1" comment="pam_cgfs is &lt;4.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911524" version="1" comment="lxterminal is &lt;0.4.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911525" version="1" comment="lxterminal-lang is &lt;0.4.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911526" version="1" comment="lynis is &lt;3.0.5-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911527" version="1" comment="lynx is &lt;2.9.0~dev.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911528" version="1" comment="liblz4-1 is &lt;1.9.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911529" version="1" comment="liblz4-1-32bit is &lt;1.9.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911530" version="1" comment="liblz4-devel is &lt;1.9.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911531" version="1" comment="lz4 is &lt;1.9.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911532" version="1" comment="libmailutils5 is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911533" version="1" comment="mailutils is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911534" version="1" comment="mailutils-devel is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911535" version="1" comment="mailutils-imap4d is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911536" version="1" comment="mailutils-mh is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911537" version="1" comment="mailutils-notify is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911538" version="1" comment="mailutils-pop3d is &lt;3.8-8.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911539" version="1" comment="man is &lt;2.9.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911540" version="1" comment="libjavamapscript is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911541" version="1" comment="libmapserver2 is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911542" version="1" comment="mapserver is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911543" version="1" comment="mapserver-devel is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911544" version="1" comment="perl-mapscript is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911545" version="1" comment="php-mapscript is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911546" version="1" comment="python-mapscript is &lt;7.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911547" version="1" comment="libmariadbd-devel is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911548" version="1" comment="libmariadbd19 is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911549" version="1" comment="mariadb is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911550" version="1" comment="mariadb-bench is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911551" version="1" comment="mariadb-client is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911552" version="1" comment="mariadb-errormessages is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911553" version="1" comment="mariadb-galera is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911554" version="1" comment="mariadb-rpm-macros is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911555" version="1" comment="mariadb-test is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911556" version="1" comment="mariadb-tools is &lt;10.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911557" version="1" comment="libmariadb-devel is &lt;3.2.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911558" version="1" comment="libmariadb3 is &lt;3.2.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911559" version="1" comment="libmariadb3-32bit is &lt;3.2.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911560" version="1" comment="libmariadb_plugins is &lt;3.2.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911561" version="1" comment="libmariadbprivate is &lt;3.2.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911562" version="1" comment="libmatio-devel is &lt;1.5.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911563" version="1" comment="libmatio11 is &lt;1.5.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911564" version="1" comment="matio-tools is &lt;1.5.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911565" version="1" comment="matrix-synapse is &lt;1.43.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911566" version="1" comment="maven is &lt;3.8.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911567" version="1" comment="maven-javadoc is &lt;3.8.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911568" version="1" comment="maven-lib is &lt;3.8.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911569" version="1" comment="libmbedcrypto7 is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911570" version="1" comment="libmbedcrypto7-32bit is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911571" version="1" comment="libmbedtls13 is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911572" version="1" comment="libmbedtls13-32bit is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911573" version="1" comment="libmbedx509-1 is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911574" version="1" comment="libmbedx509-1-32bit is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911575" version="1" comment="mbedtls-devel is &lt;2.27.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911576" version="1" comment="libmcpp0 is &lt;2.7.2-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911577" version="1" comment="mcpp is &lt;2.7.2-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911578" version="1" comment="mcpp-devel is &lt;2.7.2-24.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911579" version="1" comment="memcached is &lt;1.6.9-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911580" version="1" comment="memcached-devel is &lt;1.6.9-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911581" version="1" comment="messagelib is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911582" version="1" comment="messagelib-devel is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911583" version="1" comment="messagelib-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911584" version="1" comment="g3utils is &lt;1.2.1-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911585" version="1" comment="mgetty is &lt;1.2.1-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911586" version="1" comment="sendfax is &lt;1.2.1-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911587" version="1" comment="miller is &lt;5.10.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911588" version="1" comment="minicom is &lt;2.7.1-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911589" version="1" comment="minicom-lang is &lt;2.7.1-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911590" version="1" comment="minidlna is &lt;1.3.0-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911591" version="1" comment="docker-machine-driver-kvm2 is &lt;1.23.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911592" version="1" comment="minikube is &lt;1.23.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911593" version="1" comment="minikube-bash-completion is &lt;1.23.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911594" version="1" comment="libminiupnpc-devel is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911595" version="1" comment="libminiupnpc17 is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911596" version="1" comment="libminiupnpc17-32bit is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911597" version="1" comment="miniupnpc is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911598" version="1" comment="python36-miniupnpc is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911599" version="1" comment="python38-miniupnpc is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911600" version="1" comment="python39-miniupnpc is &lt;2.2.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911601" version="1" comment="mkvtoolnix is &lt;61.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911602" version="1" comment="mkvtoolnix-gui is &lt;61.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911603" version="1" comment="mobidict is &lt;1.2-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911604" version="1" comment="monero-devel is &lt;0.17.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911605" version="1" comment="monero-utils is &lt;0.17.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911606" version="1" comment="monerod is &lt;0.17.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911607" version="1" comment="monitoring-plugins is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911608" version="1" comment="monitoring-plugins-all is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911609" version="1" comment="monitoring-plugins-breeze is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911610" version="1" comment="monitoring-plugins-by_ssh is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911611" version="1" comment="monitoring-plugins-cluster is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911612" version="1" comment="monitoring-plugins-common is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911613" version="1" comment="monitoring-plugins-cups is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911614" version="1" comment="monitoring-plugins-dbi is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911615" version="1" comment="monitoring-plugins-dbi-mysql is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911616" version="1" comment="monitoring-plugins-dbi-pgsql is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911617" version="1" comment="monitoring-plugins-dbi-sqlite3 is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911618" version="1" comment="monitoring-plugins-dhcp is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911619" version="1" comment="monitoring-plugins-dig is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911620" version="1" comment="monitoring-plugins-disk is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911621" version="1" comment="monitoring-plugins-disk_smb is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911622" version="1" comment="monitoring-plugins-dns is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911623" version="1" comment="monitoring-plugins-dummy is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911624" version="1" comment="monitoring-plugins-extras is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911625" version="1" comment="monitoring-plugins-file_age is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911626" version="1" comment="monitoring-plugins-flexlm is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911627" version="1" comment="monitoring-plugins-fping is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911628" version="1" comment="monitoring-plugins-hpjd is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911629" version="1" comment="monitoring-plugins-http is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911630" version="1" comment="monitoring-plugins-icmp is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911631" version="1" comment="monitoring-plugins-ide_smart is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911632" version="1" comment="monitoring-plugins-ifoperstatus is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911633" version="1" comment="monitoring-plugins-ifstatus is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911634" version="1" comment="monitoring-plugins-ircd is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911635" version="1" comment="monitoring-plugins-ldap is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911636" version="1" comment="monitoring-plugins-load is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911637" version="1" comment="monitoring-plugins-log is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911638" version="1" comment="monitoring-plugins-mailq is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911639" version="1" comment="monitoring-plugins-mrtg is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911640" version="1" comment="monitoring-plugins-mrtgtraf is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911641" version="1" comment="monitoring-plugins-mysql is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911642" version="1" comment="monitoring-plugins-nagios is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911643" version="1" comment="monitoring-plugins-nt is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911644" version="1" comment="monitoring-plugins-ntp_peer is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911645" version="1" comment="monitoring-plugins-ntp_time is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911646" version="1" comment="monitoring-plugins-nwstat is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911647" version="1" comment="monitoring-plugins-oracle is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911648" version="1" comment="monitoring-plugins-overcr is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911649" version="1" comment="monitoring-plugins-pgsql is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911650" version="1" comment="monitoring-plugins-ping is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911651" version="1" comment="monitoring-plugins-procs is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911652" version="1" comment="monitoring-plugins-radius is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911653" version="1" comment="monitoring-plugins-real is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911654" version="1" comment="monitoring-plugins-rpc is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911655" version="1" comment="monitoring-plugins-sensors is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911656" version="1" comment="monitoring-plugins-smtp is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911657" version="1" comment="monitoring-plugins-snmp is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911658" version="1" comment="monitoring-plugins-ssh is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911659" version="1" comment="monitoring-plugins-swap is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911660" version="1" comment="monitoring-plugins-tcp is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911661" version="1" comment="monitoring-plugins-time is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911662" version="1" comment="monitoring-plugins-ups is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911663" version="1" comment="monitoring-plugins-uptime is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911664" version="1" comment="monitoring-plugins-users is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911665" version="1" comment="monitoring-plugins-wave is &lt;2.3.1-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911666" version="1" comment="libmosquitto1 is &lt;2.0.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911667" version="1" comment="libmosquittopp1 is &lt;2.0.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911668" version="1" comment="mosquitto is &lt;2.0.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911669" version="1" comment="mosquitto-clients is &lt;2.0.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911670" version="1" comment="mosquitto-devel is &lt;2.0.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911671" version="1" comment="libfreebl3 is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911672" version="1" comment="libfreebl3-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911673" version="1" comment="libfreebl3-hmac is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911674" version="1" comment="libfreebl3-hmac-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911675" version="1" comment="libsoftokn3 is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911676" version="1" comment="libsoftokn3-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911677" version="1" comment="libsoftokn3-hmac is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911678" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911679" version="1" comment="mozilla-nss is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911680" version="1" comment="mozilla-nss-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911681" version="1" comment="mozilla-nss-certs is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911682" version="1" comment="mozilla-nss-certs-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911683" version="1" comment="mozilla-nss-devel is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911684" version="1" comment="mozilla-nss-sysinit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911685" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911686" version="1" comment="mozilla-nss-tools is &lt;3.69.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911687" version="1" comment="libmozjs-78-0 is &lt;78.13.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911688" version="1" comment="mozjs78 is &lt;78.13.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911689" version="1" comment="mozjs78-devel is &lt;78.13.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911690" version="1" comment="mp3gain is &lt;1.6.2-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911691" version="1" comment="libmpg123-0 is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911692" version="1" comment="libmpg123-0-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911693" version="1" comment="libout123-0 is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911694" version="1" comment="libout123-0-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911695" version="1" comment="libsyn123-0 is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911696" version="1" comment="libsyn123-0-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911697" version="1" comment="mpg123 is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911698" version="1" comment="mpg123-devel is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911699" version="1" comment="mpg123-devel-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911700" version="1" comment="mpg123-jack is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911701" version="1" comment="mpg123-jack-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911702" version="1" comment="mpg123-openal is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911703" version="1" comment="mpg123-openal-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911704" version="1" comment="mpg123-portaudio is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911705" version="1" comment="mpg123-portaudio-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911706" version="1" comment="mpg123-pulse is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911707" version="1" comment="mpg123-pulse-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911708" version="1" comment="mpg123-sdl is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911709" version="1" comment="mpg123-sdl-32bit is &lt;1.29.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911710" version="1" comment="libmpv1 is &lt;0.33.1+git.20210630T163736.f2afae55e9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911711" version="1" comment="mpv is &lt;0.33.1+git.20210630T163736.f2afae55e9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911712" version="1" comment="mpv-bash-completion is &lt;0.33.1+git.20210630T163736.f2afae55e9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911713" version="1" comment="mpv-devel is &lt;0.33.1+git.20210630T163736.f2afae55e9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911714" version="1" comment="mpv-zsh-completion is &lt;0.33.1+git.20210630T163736.f2afae55e9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911715" version="1" comment="mr is &lt;1.20180726-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911716" version="1" comment="msmtp is &lt;1.8.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911717" version="1" comment="msmtp-doc is &lt;1.8.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911718" version="1" comment="msmtp-lang is &lt;1.8.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911719" version="1" comment="msmtp-mta is &lt;1.8.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911720" version="1" comment="mumble is &lt;1.3.4-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911721" version="1" comment="mumble-32bit is &lt;1.3.4-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911722" version="1" comment="mumble-server is &lt;1.3.4-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911723" version="1" comment="libmunge2 is &lt;0.5.14-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911724" version="1" comment="libmunge2-32bit is &lt;0.5.14-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911725" version="1" comment="munge is &lt;0.5.14-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911726" version="1" comment="munge-devel is &lt;0.5.14-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911727" version="1" comment="munge-devel-32bit is &lt;0.5.14-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911728" version="1" comment="munin is &lt;2.0.66-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911729" version="1" comment="munin-node is &lt;2.0.66-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911730" version="1" comment="mupdf is &lt;1.18.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911731" version="1" comment="mupdf-devel-static is &lt;1.18.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911732" version="1" comment="mutt is &lt;2.0.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911733" version="1" comment="mutt-doc is &lt;2.0.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911734" version="1" comment="mutt-lang is &lt;2.0.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911735" version="1" comment="mybatis is &lt;3.5.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911736" version="1" comment="mybatis-javadoc is &lt;3.5.6-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911737" version="1" comment="mysql-connector-java is &lt;8.0.25-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911738" version="1" comment="mysql-workbench is &lt;8.0.25-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911739" version="1" comment="nagios is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911740" version="1" comment="nagios-contrib is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911741" version="1" comment="nagios-devel is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911742" version="1" comment="nagios-theme-exfoliation is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911743" version="1" comment="nagios-www is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911744" version="1" comment="nagios-www-dch is &lt;4.4.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911745" version="1" comment="libprotobuf-nanopb0 is &lt;0.4.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911746" version="1" comment="nanopb-devel is &lt;0.4.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911747" version="1" comment="nanopb-source is &lt;0.4.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911748" version="1" comment="nasm is &lt;2.15.05-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911749" version="1" comment="gnome-shell-search-provider-nautilus is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911750" version="1" comment="libnautilus-extension1 is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911751" version="1" comment="nautilus is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911752" version="1" comment="nautilus-devel is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911753" version="1" comment="nautilus-lang is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911754" version="1" comment="typelib-1_0-Nautilus-3_0 is &lt;40.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911755" version="1" comment="nbd is &lt;3.21-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911756" version="1" comment="nbdkit is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911757" version="1" comment="nbdkit-bash-completion is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911758" version="1" comment="nbdkit-basic-filters is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911759" version="1" comment="nbdkit-basic-plugins is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911760" version="1" comment="nbdkit-curl-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911761" version="1" comment="nbdkit-devel is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911762" version="1" comment="nbdkit-example-plugins is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911763" version="1" comment="nbdkit-gzip-filter is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911764" version="1" comment="nbdkit-nbd-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911765" version="1" comment="nbdkit-python-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911766" version="1" comment="nbdkit-server is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911767" version="1" comment="nbdkit-ssh-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911768" version="1" comment="nbdkit-tar-filter is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911769" version="1" comment="nbdkit-tmpdisk-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911770" version="1" comment="nbdkit-vddk-plugin is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911771" version="1" comment="nbdkit-xz-filter is &lt;1.27.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911772" version="1" comment="neomutt is &lt;20210205-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911773" version="1" comment="neomutt-doc is &lt;20210205-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911774" version="1" comment="neomutt-lang is &lt;20210205-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911775" version="1" comment="libneon-devel is &lt;0.31.2-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911776" version="1" comment="libneon27 is &lt;0.31.2-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911777" version="1" comment="libneon27-32bit is &lt;0.31.2-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911778" version="1" comment="neovim is &lt;0.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911779" version="1" comment="neovim-lang is &lt;0.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911780" version="1" comment="libsnmp30 is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911781" version="1" comment="libsnmp30-32bit is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911782" version="1" comment="net-snmp is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911783" version="1" comment="net-snmp-devel is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911784" version="1" comment="net-snmp-devel-32bit is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911785" version="1" comment="perl-SNMP is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911786" version="1" comment="python36-net-snmp is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911787" version="1" comment="python38-net-snmp is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911788" version="1" comment="python39-net-snmp is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911789" version="1" comment="snmp-mibs is &lt;5.9-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911790" version="1" comment="netdata is &lt;1.31.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911791" version="1" comment="libnetpbm-devel is &lt;10.93.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911792" version="1" comment="libnetpbm11 is &lt;10.93.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911793" version="1" comment="libnetpbm11-32bit is &lt;10.93.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911794" version="1" comment="netpbm is &lt;10.93.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911795" version="1" comment="netty is &lt;4.1.60-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911796" version="1" comment="netty-javadoc is &lt;4.1.60-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911797" version="1" comment="netty-poms is &lt;4.1.60-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911798" version="1" comment="newlib is &lt;4.1.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911799" version="1" comment="nextcloud is &lt;22.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911800" version="1" comment="nextcloud-apache is &lt;22.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911801" version="1" comment="caja-extension-nextcloud is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911802" version="1" comment="libnextcloudsync-devel is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911803" version="1" comment="libnextcloudsync0 is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911804" version="1" comment="nautilus-extension-nextcloud is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911805" version="1" comment="nemo-extension-nextcloud is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911806" version="1" comment="nextcloud-desktop is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911807" version="1" comment="nextcloud-desktop-doc is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911808" version="1" comment="nextcloud-desktop-dolphin is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911809" version="1" comment="nextcloud-desktop-lang is &lt;3.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911810" version="1" comment="nfdump is &lt;1.6.23-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911811" version="1" comment="libnfsidmap1 is &lt;1.0-26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911812" version="1" comment="nfs-client is &lt;2.5.4-26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911813" version="1" comment="nfs-kernel-server is &lt;2.5.4-26.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911814" version="1" comment="nfsidmap-devel is &lt;1.0-26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911815" version="1" comment="libnghttp2-14 is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911816" version="1" comment="libnghttp2-14-32bit is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911817" version="1" comment="libnghttp2-devel is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911818" version="1" comment="libnghttp2_asio-devel is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911819" version="1" comment="libnghttp2_asio1 is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911820" version="1" comment="libnghttp2_asio1-32bit is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911821" version="1" comment="nghttp2 is &lt;1.43.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911822" version="1" comment="nginx is &lt;1.21.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911823" version="1" comment="nginx-source is &lt;1.21.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911824" version="1" comment="vim-plugin-nginx is &lt;1.21.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911825" version="1" comment="nim is &lt;1.2.12-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911826" version="1" comment="ncat is &lt;7.92-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911827" version="1" comment="nmap is &lt;7.92-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911828" version="1" comment="nping is &lt;7.92-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911829" version="1" comment="nodejs-underscore is &lt;1.13.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911830" version="1" comment="nodejs14 is &lt;14.17.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911831" version="1" comment="nodejs14-devel is &lt;14.17.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911832" version="1" comment="nodejs14-docs is &lt;14.17.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911833" version="1" comment="npm14 is &lt;14.17.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911834" version="1" comment="nodejs16 is &lt;16.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911835" version="1" comment="nodejs16-devel is &lt;16.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911836" version="1" comment="nodejs16-docs is &lt;16.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911837" version="1" comment="npm16 is &lt;16.6.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911838" version="1" comment="notary is &lt;0.7.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911839" version="1" comment="monitoring-plugins-nrpe is &lt;4.0.3-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911840" version="1" comment="nrpe is &lt;4.0.3-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911841" version="1" comment="nrpe-doc is &lt;4.0.3-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911842" version="1" comment="nsd is &lt;4.3.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911843" version="1" comment="libntfs-3g-devel is &lt;2021.8.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911844" version="1" comment="libntfs-3g89 is &lt;2021.8.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911845" version="1" comment="ntfs-3g is &lt;2021.8.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911846" version="1" comment="ntfsprogs is &lt;2021.8.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911847" version="1" comment="ntfsprogs-extra is &lt;2021.8.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911848" version="1" comment="ntp is &lt;4.2.8p15-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911849" version="1" comment="ntp-dcf77-tools is &lt;4.2.8p15-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911850" version="1" comment="ntp-doc is &lt;4.2.8p15-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911851" version="1" comment="libntpc1 is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911852" version="1" comment="ntpsec is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911853" version="1" comment="ntpsec-devel is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911854" version="1" comment="ntpsec-doc is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911855" version="1" comment="ntpsec-utils is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911856" version="1" comment="python3-ntp is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911857" version="1" comment="liboath-devel is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911858" version="1" comment="liboath0 is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911859" version="1" comment="libpskc-devel is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911860" version="1" comment="libpskc0 is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911861" version="1" comment="oath-toolkit is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911862" version="1" comment="oath-toolkit-xml is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911863" version="1" comment="pam_oath is &lt;2.6.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911864" version="1" comment="obs-service-refresh_patches is &lt;0.3.9+git.1625238904.d59f20e-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911865" version="1" comment="obs-service-source_validator is &lt;0.21-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911866" version="1" comment="obs-service-appimage is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911867" version="1" comment="obs-service-obs_scm is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911868" version="1" comment="obs-service-obs_scm-common is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911869" version="1" comment="obs-service-snapcraft is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911870" version="1" comment="obs-service-tar is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911871" version="1" comment="obs-service-tar_scm is &lt;0.10.28.1632141620.a8837d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911872" version="1" comment="oci-cli is &lt;3.0.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911873" version="1" comment="oddjob is &lt;0.34.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911874" version="1" comment="oddjob-mkhomedir is &lt;0.34.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911875" version="1" comment="okular is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911876" version="1" comment="okular-devel is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911877" version="1" comment="okular-lang is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911878" version="1" comment="okular-mobile is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911879" version="1" comment="okular-spectre is &lt;21.08.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911880" version="1" comment="libonig5 is &lt;6.9.7.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911881" version="1" comment="oniguruma-devel is &lt;6.9.7.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911882" version="1" comment="iscsiuio is &lt;0.7.8.6-80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911883" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.5-80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911884" version="1" comment="open-iscsi is &lt;2.1.5-80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911885" version="1" comment="open-iscsi-devel is &lt;2.1.5-80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911886" version="1" comment="openafs is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911887" version="1" comment="openafs-authlibs is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911888" version="1" comment="openafs-authlibs-devel is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911889" version="1" comment="openafs-client is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911890" version="1" comment="openafs-devel is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911891" version="1" comment="openafs-fuse_client is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911892" version="1" comment="openafs-kernel-source is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911893" version="1" comment="openafs-kmp-default is &lt;1.8.8_k5.14.6_1-1.13 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911894" version="1" comment="openafs-server is &lt;1.8.8-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911895" version="1" comment="libopenconnect5 is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911896" version="1" comment="openconnect is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911897" version="1" comment="openconnect-bash-completion is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911898" version="1" comment="openconnect-devel is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911899" version="1" comment="openconnect-doc is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911900" version="1" comment="openconnect-lang is &lt;8.10-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911901" version="1" comment="libopencv4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911902" version="1" comment="libopencv_aruco4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911903" version="1" comment="libopencv_face4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911904" version="1" comment="libopencv_highgui4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911905" version="1" comment="libopencv_imgcodecs4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911906" version="1" comment="libopencv_objdetect4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911907" version="1" comment="libopencv_superres4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911908" version="1" comment="libopencv_videoio4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911909" version="1" comment="libopencv_videostab4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911910" version="1" comment="libopencv_ximgproc4_5 is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911911" version="1" comment="opencv is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911912" version="1" comment="opencv-devel is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911913" version="1" comment="opencv-doc is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911914" version="1" comment="opencv4-cascades-data is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911915" version="1" comment="python3-opencv is &lt;4.5.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911916" version="1" comment="libopencv3_4 is &lt;3.4.10-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911917" version="1" comment="opencv3 is &lt;3.4.10-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911918" version="1" comment="opencv3-devel is &lt;3.4.10-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911919" version="1" comment="opencv3-doc is &lt;3.4.10-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911920" version="1" comment="python3-opencv3 is &lt;3.4.10-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911921" version="1" comment="libIex-3_1-30 is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911922" version="1" comment="libIex-3_1-30-32bit is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911923" version="1" comment="libIlmThread-3_1-30 is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911924" version="1" comment="libIlmThread-3_1-30-32bit is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911925" version="1" comment="libOpenEXR-3_1-30 is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911926" version="1" comment="libOpenEXR-3_1-30-32bit is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911927" version="1" comment="libOpenEXRCore-3_1-30 is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911928" version="1" comment="libOpenEXRUtil-3_1-30 is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911929" version="1" comment="libOpenEXRUtil-3_1-30-32bit is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911930" version="1" comment="openexr is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911931" version="1" comment="openexr-devel is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911932" version="1" comment="openexr-doc is &lt;3.1.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911933" version="1" comment="openfortivpn is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911934" version="1" comment="openjfx is &lt;11.0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911935" version="1" comment="openjfx-devel is &lt;11.0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911936" version="1" comment="openjfx-javadoc is &lt;11.0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911937" version="1" comment="openjfx-jmods is &lt;11.0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911938" version="1" comment="openjfx-src is &lt;11.0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911939" version="1" comment="libopenjp2-7 is &lt;2.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911940" version="1" comment="libopenjp2-7-32bit is &lt;2.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911941" version="1" comment="openjpeg2 is &lt;2.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911942" version="1" comment="openjpeg2-devel is &lt;2.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911943" version="1" comment="openjpeg2-devel-doc is &lt;2.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911944" version="1" comment="libldap-2_4-2 is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911945" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911946" version="1" comment="libldap-data is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911947" version="1" comment="openldap2 is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911948" version="1" comment="openldap2-back-meta is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911949" version="1" comment="openldap2-back-perl is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911950" version="1" comment="openldap2-back-sock is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911951" version="1" comment="openldap2-back-sql is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911952" version="1" comment="openldap2-client is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911953" version="1" comment="openldap2-contrib is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911954" version="1" comment="openldap2-devel is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911955" version="1" comment="openldap2-devel-32bit is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911956" version="1" comment="openldap2-devel-static is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911957" version="1" comment="openldap2-doc is &lt;2.4.59-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911958" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911959" version="1" comment="libsaml-devel is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911960" version="1" comment="libsaml12 is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911961" version="1" comment="opensaml-bin is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911962" version="1" comment="opensaml-schemas is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911963" version="1" comment="opensc is &lt;0.21.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911964" version="1" comment="opensc-32bit is &lt;0.21.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911965" version="1" comment="openssh is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911966" version="1" comment="openssh-cavs is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911967" version="1" comment="openssh-clients is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911968" version="1" comment="openssh-common is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911969" version="1" comment="openssh-fips is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911970" version="1" comment="openssh-helpers is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911971" version="1" comment="openssh-server is &lt;8.4p1-7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911972" version="1" comment="libopenssl-devel is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911973" version="1" comment="openssl is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911974" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911975" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911976" version="1" comment="libopenssl10 is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911977" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911978" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911979" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911980" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911981" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911982" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911983" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911984" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911985" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911986" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911987" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911988" version="1" comment="libopenssl1_1 is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911989" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911990" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911991" version="1" comment="openssl-1_1 is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911992" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911993" version="1" comment="openvpn is &lt;2.5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911994" version="1" comment="openvpn-auth-pam-plugin is &lt;2.5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911995" version="1" comment="openvpn-devel is &lt;2.5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911996" version="1" comment="openvpn-down-root-plugin is &lt;2.5.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911997" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911998" version="1" comment="libovn-20_06-0 is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009911999" version="1" comment="openvswitch is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912000" version="1" comment="openvswitch-devel is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912001" version="1" comment="openvswitch-doc is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912002" version="1" comment="openvswitch-ipsec is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912003" version="1" comment="openvswitch-pki is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912004" version="1" comment="openvswitch-test is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912005" version="1" comment="openvswitch-vtep is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912006" version="1" comment="ovn is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912007" version="1" comment="ovn-central is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912008" version="1" comment="ovn-devel is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912009" version="1" comment="ovn-doc is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912010" version="1" comment="ovn-docker is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912011" version="1" comment="ovn-host is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912012" version="1" comment="ovn-vtep is &lt;20.06.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912013" version="1" comment="python3-ovs is &lt;2.14.2-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912014" version="1" comment="libwsman-devel is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912015" version="1" comment="libwsman3 is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912016" version="1" comment="libwsman_client5 is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912017" version="1" comment="libwsman_clientpp-devel is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912018" version="1" comment="libwsman_clientpp1 is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912019" version="1" comment="openwsman-java is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912020" version="1" comment="openwsman-perl is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912021" version="1" comment="openwsman-ruby is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912022" version="1" comment="openwsman-ruby-docs is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912023" version="1" comment="openwsman-server is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912024" version="1" comment="openwsman-server-plugin-ruby is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912025" version="1" comment="python3-openwsman is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912026" version="1" comment="winrs is &lt;2.7.0-2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912027" version="1" comment="optipng is &lt;0.7.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912028" version="1" comment="libopus-devel is &lt;1.3.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912029" version="1" comment="libopus0 is &lt;1.3.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912030" version="1" comment="libopus0-32bit is &lt;1.3.1-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912031" version="1" comment="osc is &lt;0.174.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912032" version="1" comment="ovmf is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912033" version="1" comment="ovmf-tools is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912034" version="1" comment="qemu-ovmf-ia32 is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912035" version="1" comment="qemu-ovmf-x86_64 is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912036" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912037" version="1" comment="qemu-uefi-aarch32 is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912038" version="1" comment="qemu-uefi-aarch64 is &lt;202105-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912039" version="1" comment="owntone is &lt;28.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912040" version="1" comment="libp11-kit0 is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912041" version="1" comment="libp11-kit0-32bit is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912042" version="1" comment="p11-kit is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912043" version="1" comment="p11-kit-32bit is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912044" version="1" comment="p11-kit-devel is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912045" version="1" comment="p11-kit-nss-trust is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912046" version="1" comment="p11-kit-nss-trust-32bit is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912047" version="1" comment="p11-kit-server is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912048" version="1" comment="p11-kit-tools is &lt;0.23.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912049" version="1" comment="p7zip is &lt;16.02-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912050" version="1" comment="p7zip-doc is &lt;16.02-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912051" version="1" comment="p7zip-full is &lt;16.02-11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912052" version="1" comment="libpacemaker-devel is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912053" version="1" comment="libpacemaker3 is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912054" version="1" comment="pacemaker is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912055" version="1" comment="pacemaker-cli is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912056" version="1" comment="pacemaker-cts is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912057" version="1" comment="pacemaker-remote is &lt;2.1.0+20210816.c6a4f6e6c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912058" version="1" comment="pagure is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912059" version="1" comment="pagure-ci is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912060" version="1" comment="pagure-ev is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912061" version="1" comment="pagure-loadjson is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912062" version="1" comment="pagure-logcom is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912063" version="1" comment="pagure-milters is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912064" version="1" comment="pagure-mirror is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912065" version="1" comment="pagure-theme-chameleon is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912066" version="1" comment="pagure-theme-default-openSUSE is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912067" version="1" comment="pagure-theme-default-upstream is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912068" version="1" comment="pagure-theme-pagureio is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912069" version="1" comment="pagure-theme-srcfpo is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912070" version="1" comment="pagure-theme-upstream is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912071" version="1" comment="pagure-web-apache-httpd is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912072" version="1" comment="pagure-web-nginx is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912073" version="1" comment="pagure-webhook is &lt;5.13.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912074" version="1" comment="pam is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912075" version="1" comment="pam-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912076" version="1" comment="pam-devel is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912077" version="1" comment="pam-devel-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912078" version="1" comment="pam-doc is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912079" version="1" comment="pam-extra is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912080" version="1" comment="pam-extra-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912081" version="1" comment="pam_unix is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912082" version="1" comment="pam_unix-32bit is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912083" version="1" comment="pam_kwallet is &lt;5.22.5-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912084" version="1" comment="pam_kwallet-32bit is &lt;5.22.5-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912085" version="1" comment="pam_kwallet-common is &lt;5.22.5-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912086" version="1" comment="libcryptmount-devel is &lt;2.18-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912087" version="1" comment="libcryptmount0 is &lt;2.18-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912088" version="1" comment="libcryptmount0-32bit is &lt;2.18-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912089" version="1" comment="pam_mount is &lt;2.18-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912090" version="1" comment="pam_mount-32bit is &lt;2.18-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912091" version="1" comment="pam_p11 is &lt;0.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912092" version="1" comment="pam_p11-32bit is &lt;0.3.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912093" version="1" comment="pam_radius is &lt;2.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912094" version="1" comment="pam_radius-32bit is &lt;2.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912095" version="1" comment="pam_u2f is &lt;1.1.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912096" version="1" comment="pam_yubico is &lt;2.27-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912097" version="1" comment="pan is &lt;0.146-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912098" version="1" comment="pan-lang is &lt;0.146-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912099" version="1" comment="libpango-1_0-0 is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912100" version="1" comment="libpango-1_0-0-32bit is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912101" version="1" comment="pango-devel is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912102" version="1" comment="pango-devel-32bit is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912103" version="1" comment="pango-tools is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912104" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.48.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912105" version="1" comment="partclone is &lt;0.3.17-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912106" version="1" comment="partclone-lang is &lt;0.3.17-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912107" version="1" comment="password-store is &lt;1.7.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912108" version="1" comment="password-store-dmenu is &lt;1.7.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912109" version="1" comment="patch is &lt;2.7.6-3.43 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912110" version="1" comment="libpcp-devel is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912111" version="1" comment="libpcp3 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912112" version="1" comment="libpcp_gui2 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912113" version="1" comment="libpcp_import1 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912114" version="1" comment="libpcp_mmv1 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912115" version="1" comment="libpcp_trace2 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912116" version="1" comment="libpcp_web1 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912117" version="1" comment="pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912118" version="1" comment="pcp-conf is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912119" version="1" comment="pcp-devel is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912120" version="1" comment="pcp-doc is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912121" version="1" comment="pcp-export-pcp2elasticsearch is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912122" version="1" comment="pcp-export-pcp2graphite is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912123" version="1" comment="pcp-export-pcp2influxdb is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912124" version="1" comment="pcp-export-pcp2json is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912125" version="1" comment="pcp-export-pcp2spark is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912126" version="1" comment="pcp-export-pcp2xml is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912127" version="1" comment="pcp-export-pcp2zabbix is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912128" version="1" comment="pcp-gui is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912129" version="1" comment="pcp-import-collectl2pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912130" version="1" comment="pcp-import-ganglia2pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912131" version="1" comment="pcp-import-iostat2pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912132" version="1" comment="pcp-import-mrtg2pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912133" version="1" comment="pcp-import-sar2pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912134" version="1" comment="pcp-pmda-activemq is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912135" version="1" comment="pcp-pmda-apache is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912136" version="1" comment="pcp-pmda-bash is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912137" version="1" comment="pcp-pmda-bind2 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912138" version="1" comment="pcp-pmda-bonding is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912139" version="1" comment="pcp-pmda-cifs is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912140" version="1" comment="pcp-pmda-cisco is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912141" version="1" comment="pcp-pmda-dbping is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912142" version="1" comment="pcp-pmda-dm is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912143" version="1" comment="pcp-pmda-docker is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912144" version="1" comment="pcp-pmda-ds389 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912145" version="1" comment="pcp-pmda-ds389log is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912146" version="1" comment="pcp-pmda-elasticsearch is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912147" version="1" comment="pcp-pmda-gfs2 is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912148" version="1" comment="pcp-pmda-gluster is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912149" version="1" comment="pcp-pmda-gpfs is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912150" version="1" comment="pcp-pmda-gpsd is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912151" version="1" comment="pcp-pmda-haproxy is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912152" version="1" comment="pcp-pmda-infiniband is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912153" version="1" comment="pcp-pmda-json is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912154" version="1" comment="pcp-pmda-lio is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912155" version="1" comment="pcp-pmda-lmsensors is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912156" version="1" comment="pcp-pmda-logger is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912157" version="1" comment="pcp-pmda-lustre is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912158" version="1" comment="pcp-pmda-lustrecomm is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912159" version="1" comment="pcp-pmda-mailq is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912160" version="1" comment="pcp-pmda-memcache is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912161" version="1" comment="pcp-pmda-mic is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912162" version="1" comment="pcp-pmda-mounts is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912163" version="1" comment="pcp-pmda-mssql is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912164" version="1" comment="pcp-pmda-mysql is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912165" version="1" comment="pcp-pmda-named is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912166" version="1" comment="pcp-pmda-netcheck is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912167" version="1" comment="pcp-pmda-netfilter is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912168" version="1" comment="pcp-pmda-news is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912169" version="1" comment="pcp-pmda-nfsclient is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912170" version="1" comment="pcp-pmda-nginx is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912171" version="1" comment="pcp-pmda-nutcracker is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912172" version="1" comment="pcp-pmda-nvidia-gpu is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912173" version="1" comment="pcp-pmda-openmetrics is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912174" version="1" comment="pcp-pmda-openvswitch is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912175" version="1" comment="pcp-pmda-oracle is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912176" version="1" comment="pcp-pmda-pdns is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912177" version="1" comment="pcp-pmda-perfevent is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912178" version="1" comment="pcp-pmda-postfix is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912179" version="1" comment="pcp-pmda-rabbitmq is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912180" version="1" comment="pcp-pmda-redis is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912181" version="1" comment="pcp-pmda-roomtemp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912182" version="1" comment="pcp-pmda-rpm is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912183" version="1" comment="pcp-pmda-rsyslog is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912184" version="1" comment="pcp-pmda-samba is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912185" version="1" comment="pcp-pmda-sendmail is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912186" version="1" comment="pcp-pmda-shping is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912187" version="1" comment="pcp-pmda-slurm is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912188" version="1" comment="pcp-pmda-smart is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912189" version="1" comment="pcp-pmda-snmp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912190" version="1" comment="pcp-pmda-summary is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912191" version="1" comment="pcp-pmda-systemd is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912192" version="1" comment="pcp-pmda-trace is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912193" version="1" comment="pcp-pmda-unbound is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912194" version="1" comment="pcp-pmda-vmware is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912195" version="1" comment="pcp-pmda-weblog is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912196" version="1" comment="pcp-pmda-zimbra is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912197" version="1" comment="pcp-pmda-zswap is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912198" version="1" comment="pcp-system-tools is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912199" version="1" comment="pcp-testsuite is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912200" version="1" comment="pcp-zeroconf is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912201" version="1" comment="perl-PCP-LogImport is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912202" version="1" comment="perl-PCP-LogSummary is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912203" version="1" comment="perl-PCP-MMV is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912204" version="1" comment="perl-PCP-PMDA is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912205" version="1" comment="python3-pcp is &lt;5.2.2-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912206" version="1" comment="libpcre1 is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912207" version="1" comment="libpcre1-32bit is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912208" version="1" comment="libpcre16-0 is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912209" version="1" comment="libpcre16-0-32bit is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912210" version="1" comment="libpcrecpp0 is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912211" version="1" comment="libpcrecpp0-32bit is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912212" version="1" comment="libpcreposix0 is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912213" version="1" comment="libpcreposix0-32bit is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912214" version="1" comment="pcre-devel is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912215" version="1" comment="pcre-devel-static is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912216" version="1" comment="pcre-doc is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912217" version="1" comment="pcre-testsuite is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912218" version="1" comment="pcre-tools is &lt;8.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912219" version="1" comment="libpcre2-16-0 is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912220" version="1" comment="libpcre2-16-0-32bit is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912221" version="1" comment="libpcre2-32-0 is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912222" version="1" comment="libpcre2-32-0-32bit is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912223" version="1" comment="libpcre2-8-0 is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912224" version="1" comment="libpcre2-8-0-32bit is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912225" version="1" comment="libpcre2-posix3 is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912226" version="1" comment="libpcre2-posix3-32bit is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912227" version="1" comment="pcre2-devel is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912228" version="1" comment="pcre2-devel-static is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912229" version="1" comment="pcre2-doc is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912230" version="1" comment="pcre2-tools is &lt;10.37-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912231" version="1" comment="libpcsclite1 is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912232" version="1" comment="libpcsclite1-32bit is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912233" version="1" comment="libpcscspy0 is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912234" version="1" comment="libpcscspy0-32bit is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912235" version="1" comment="pcsc-lite is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912236" version="1" comment="pcsc-lite-devel is &lt;1.9.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912237" version="1" comment="pdns is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912238" version="1" comment="pdns-backend-geoip is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912239" version="1" comment="pdns-backend-godbc is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912240" version="1" comment="pdns-backend-ldap is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912241" version="1" comment="pdns-backend-lmdb is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912242" version="1" comment="pdns-backend-lua is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912243" version="1" comment="pdns-backend-mysql is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912244" version="1" comment="pdns-backend-postgresql is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912245" version="1" comment="pdns-backend-remote is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912246" version="1" comment="pdns-backend-sqlite3 is &lt;4.5.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912247" version="1" comment="pdns-recursor is &lt;4.5.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912248" version="1" comment="perl is &lt;5.34.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912249" version="1" comment="perl-32bit is &lt;5.34.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912250" version="1" comment="perl-base is &lt;5.34.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912251" version="1" comment="perl-base-32bit is &lt;5.34.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912252" version="1" comment="perl-doc is &lt;5.34.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912253" version="1" comment="perl-Convert-ASN1 is &lt;0.31-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912254" version="1" comment="perl-DBD-mysql is &lt;4.050-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912255" version="1" comment="perl-DBI is &lt;1.643-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912256" version="1" comment="perl-MIME-Charset is &lt;1.012.2-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912257" version="1" comment="perl-Test-File is &lt;1.448-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912258" version="1" comment="perl-XML-Twig is &lt;3.52-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912259" version="1" comment="chkstat is &lt;1550_20210901-29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912260" version="1" comment="permissions is &lt;1550_20210901.1550-29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912261" version="1" comment="permissions-config is &lt;1550_20210901-29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912262" version="1" comment="permissions-zypp-plugin is &lt;1550_20210901.1550-29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912263" version="1" comment="php-composer is &lt;1.10.22-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912264" version="1" comment="php7 is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912265" version="1" comment="php7-bcmath is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912266" version="1" comment="php7-bz2 is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912267" version="1" comment="php7-calendar is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912268" version="1" comment="php7-cli is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912269" version="1" comment="php7-ctype is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912270" version="1" comment="php7-curl is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912271" version="1" comment="php7-dba is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912272" version="1" comment="php7-devel is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912273" version="1" comment="php7-dom is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912274" version="1" comment="php7-enchant is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912275" version="1" comment="php7-exif is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912276" version="1" comment="php7-fileinfo is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912277" version="1" comment="php7-ftp is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912278" version="1" comment="php7-gd is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912279" version="1" comment="php7-gettext is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912280" version="1" comment="php7-gmp is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912281" version="1" comment="php7-iconv is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912282" version="1" comment="php7-intl is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912283" version="1" comment="php7-json is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912284" version="1" comment="php7-ldap is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912285" version="1" comment="php7-mbstring is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912286" version="1" comment="php7-mysql is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912287" version="1" comment="php7-odbc is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912288" version="1" comment="php7-opcache is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912289" version="1" comment="php7-openssl is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912290" version="1" comment="php7-pcntl is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912291" version="1" comment="php7-pdo is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912292" version="1" comment="php7-pgsql is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912293" version="1" comment="php7-phar is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912294" version="1" comment="php7-posix is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912295" version="1" comment="php7-readline is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912296" version="1" comment="php7-shmop is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912297" version="1" comment="php7-snmp is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912298" version="1" comment="php7-soap is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912299" version="1" comment="php7-sockets is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912300" version="1" comment="php7-sodium is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912301" version="1" comment="php7-sqlite is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912302" version="1" comment="php7-sysvmsg is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912303" version="1" comment="php7-sysvsem is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912304" version="1" comment="php7-sysvshm is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912305" version="1" comment="php7-tidy is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912306" version="1" comment="php7-tokenizer is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912307" version="1" comment="php7-xmlreader is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912308" version="1" comment="php7-xmlrpc is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912309" version="1" comment="php7-xmlwriter is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912310" version="1" comment="php7-xsl is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912311" version="1" comment="php7-zip is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912312" version="1" comment="php7-zlib is &lt;7.4.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912313" version="1" comment="php7-pear is &lt;1.10.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912314" version="1" comment="php7-pecl is &lt;1.10.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912315" version="1" comment="php8 is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912316" version="1" comment="php8-bcmath is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912317" version="1" comment="php8-bz2 is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912318" version="1" comment="php8-calendar is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912319" version="1" comment="php8-cli is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912320" version="1" comment="php8-ctype is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912321" version="1" comment="php8-curl is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912322" version="1" comment="php8-dba is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912323" version="1" comment="php8-devel is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912324" version="1" comment="php8-dom is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912325" version="1" comment="php8-enchant is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912326" version="1" comment="php8-exif is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912327" version="1" comment="php8-fileinfo is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912328" version="1" comment="php8-ftp is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912329" version="1" comment="php8-gd is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912330" version="1" comment="php8-gettext is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912331" version="1" comment="php8-gmp is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912332" version="1" comment="php8-iconv is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912333" version="1" comment="php8-intl is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912334" version="1" comment="php8-ldap is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912335" version="1" comment="php8-mbstring is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912336" version="1" comment="php8-mysql is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912337" version="1" comment="php8-odbc is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912338" version="1" comment="php8-opcache is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912339" version="1" comment="php8-openssl is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912340" version="1" comment="php8-pcntl is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912341" version="1" comment="php8-pdo is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912342" version="1" comment="php8-pgsql is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912343" version="1" comment="php8-phar is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912344" version="1" comment="php8-posix is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912345" version="1" comment="php8-readline is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912346" version="1" comment="php8-shmop is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912347" version="1" comment="php8-snmp is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912348" version="1" comment="php8-soap is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912349" version="1" comment="php8-sockets is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912350" version="1" comment="php8-sodium is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912351" version="1" comment="php8-sqlite is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912352" version="1" comment="php8-sysvmsg is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912353" version="1" comment="php8-sysvsem is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912354" version="1" comment="php8-sysvshm is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912355" version="1" comment="php8-tidy is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912356" version="1" comment="php8-tokenizer is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912357" version="1" comment="php8-xmlreader is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912358" version="1" comment="php8-xmlwriter is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912359" version="1" comment="php8-xsl is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912360" version="1" comment="php8-zip is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912361" version="1" comment="php8-zlib is &lt;8.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912362" version="1" comment="php8-pear is &lt;1.10.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912363" version="1" comment="php8-pecl is &lt;1.10.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912364" version="1" comment="phpMyAdmin is &lt;5.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912365" version="1" comment="phpMyAdmin-apache is &lt;5.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912366" version="1" comment="phpMyAdmin-lang is &lt;5.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912367" version="1" comment="finch is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912368" version="1" comment="finch-devel is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912369" version="1" comment="libpurple is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912370" version="1" comment="libpurple-branding-upstream is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912371" version="1" comment="libpurple-devel is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912372" version="1" comment="libpurple-lang is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912373" version="1" comment="libpurple-plugin-sametime is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912374" version="1" comment="libpurple-tcl is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912375" version="1" comment="pidgin is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912376" version="1" comment="pidgin-devel is &lt;2.14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912377" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-3.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912378" version="1" comment="pidgin-plugin-otr-lang is &lt;4.0.2-3.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912379" version="1" comment="libpkgconf-devel is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912380" version="1" comment="libpkgconf3 is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912381" version="1" comment="pkgconf is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912382" version="1" comment="pkgconf-m4 is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912383" version="1" comment="pkgconf-pkg-config is &lt;1.8.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912384" version="1" comment="platformsh-cli is &lt;3.67.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912385" version="1" comment="pngcheck is &lt;3.0.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912386" version="1" comment="podman is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912387" version="1" comment="podman-cni-config is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912388" version="1" comment="podman-docker is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912389" version="1" comment="podman-remote is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912390" version="1" comment="libpodofo-devel is &lt;0.9.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912391" version="1" comment="libpodofo0_9_7 is &lt;0.9.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912392" version="1" comment="podofo is &lt;0.9.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912393" version="1" comment="policycoreutils is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912394" version="1" comment="policycoreutils-devel is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912395" version="1" comment="policycoreutils-lang is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912396" version="1" comment="policycoreutils-newrole is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912397" version="1" comment="policycoreutils-python-utils is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912398" version="1" comment="python3-policycoreutils is &lt;3.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912399" version="1" comment="libpolkit0 is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912400" version="1" comment="libpolkit0-32bit is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912401" version="1" comment="polkit is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912402" version="1" comment="polkit-devel is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912403" version="1" comment="polkit-doc is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912404" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.118-7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912405" version="1" comment="libpoppler-cpp0 is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912406" version="1" comment="libpoppler-cpp0-32bit is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912407" version="1" comment="libpoppler-devel is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912408" version="1" comment="libpoppler-glib-devel is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912409" version="1" comment="libpoppler-glib8 is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912410" version="1" comment="libpoppler-glib8-32bit is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912411" version="1" comment="libpoppler112 is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912412" version="1" comment="libpoppler112-32bit is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912413" version="1" comment="poppler-tools is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912414" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;21.08.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912415" version="1" comment="postfixadmin is &lt;3.3.10-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912416" version="1" comment="postfixadmin-apache is &lt;3.3.10-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912417" version="1" comment="postgresql is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912418" version="1" comment="postgresql-contrib is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912419" version="1" comment="postgresql-devel is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912420" version="1" comment="postgresql-docs is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912421" version="1" comment="postgresql-llvmjit is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912422" version="1" comment="postgresql-plperl is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912423" version="1" comment="postgresql-plpython is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912424" version="1" comment="postgresql-pltcl is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912425" version="1" comment="postgresql-server is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912426" version="1" comment="postgresql-server-devel is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912427" version="1" comment="postgresql-test is &lt;13-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912428" version="1" comment="postgresql10 is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912429" version="1" comment="postgresql10-contrib is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912430" version="1" comment="postgresql10-devel is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912431" version="1" comment="postgresql10-docs is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912432" version="1" comment="postgresql10-plperl is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912433" version="1" comment="postgresql10-plpython is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912434" version="1" comment="postgresql10-pltcl is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912435" version="1" comment="postgresql10-server is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912436" version="1" comment="postgresql10-test is &lt;10.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912437" version="1" comment="postgresql11 is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912438" version="1" comment="postgresql11-contrib is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912439" version="1" comment="postgresql11-devel is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912440" version="1" comment="postgresql11-docs is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912441" version="1" comment="postgresql11-llvmjit is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912442" version="1" comment="postgresql11-plperl is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912443" version="1" comment="postgresql11-plpython is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912444" version="1" comment="postgresql11-pltcl is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912445" version="1" comment="postgresql11-server is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912446" version="1" comment="postgresql11-server-devel is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912447" version="1" comment="postgresql11-test is &lt;11.13-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912448" version="1" comment="postgresql12 is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912449" version="1" comment="postgresql12-contrib is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912450" version="1" comment="postgresql12-devel is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912451" version="1" comment="postgresql12-docs is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912452" version="1" comment="postgresql12-llvmjit is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912453" version="1" comment="postgresql12-plperl is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912454" version="1" comment="postgresql12-plpython is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912455" version="1" comment="postgresql12-pltcl is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912456" version="1" comment="postgresql12-server is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912457" version="1" comment="postgresql12-server-devel is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912458" version="1" comment="postgresql12-test is &lt;12.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912459" version="1" comment="libecpg6 is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912460" version="1" comment="libecpg6-32bit is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912461" version="1" comment="libpq5 is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912462" version="1" comment="libpq5-32bit is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912463" version="1" comment="postgresql13 is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912464" version="1" comment="postgresql13-contrib is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912465" version="1" comment="postgresql13-devel is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912466" version="1" comment="postgresql13-docs is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912467" version="1" comment="postgresql13-llvmjit is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912468" version="1" comment="postgresql13-plperl is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912469" version="1" comment="postgresql13-plpython is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912470" version="1" comment="postgresql13-pltcl is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912471" version="1" comment="postgresql13-server is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912472" version="1" comment="postgresql13-server-devel is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912473" version="1" comment="postgresql13-test is &lt;13.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912474" version="1" comment="postsrsd is &lt;1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912475" version="1" comment="libpotrace0 is &lt;1.16-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912476" version="1" comment="potrace is &lt;1.16-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912477" version="1" comment="potrace-devel is &lt;1.16-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912478" version="1" comment="pound is &lt;2.8-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912479" version="1" comment="pound-doc is &lt;2.8-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912480" version="1" comment="ppp is &lt;2.4.8-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912481" version="1" comment="ppp-devel is &lt;2.4.8-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912482" version="1" comment="ppp-modem is &lt;2.4.8-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912483" version="1" comment="prboom-plus is &lt;2.6.1um-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912484" version="1" comment="privoxy is &lt;3.0.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912485" version="1" comment="privoxy-doc is &lt;3.0.32-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912486" version="1" comment="procmail is &lt;3.22-277.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912487" version="1" comment="libprocps8 is &lt;3.3.17-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912488" version="1" comment="procps is &lt;3.3.17-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912489" version="1" comment="procps-devel is &lt;3.3.17-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912490" version="1" comment="procps-lang is &lt;3.3.17-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912491" version="1" comment="proftpd is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912492" version="1" comment="proftpd-devel is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912493" version="1" comment="proftpd-doc is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912494" version="1" comment="proftpd-lang is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912495" version="1" comment="proftpd-ldap is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912496" version="1" comment="proftpd-mysql is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912497" version="1" comment="proftpd-pgsql is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912498" version="1" comment="proftpd-radius is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912499" version="1" comment="proftpd-sqlite is &lt;1.3.6e-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912500" version="1" comment="prosody is &lt;0.11.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912501" version="1" comment="psi+ is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912502" version="1" comment="psi+-data is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912503" version="1" comment="psi+-plugins-attentionplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912504" version="1" comment="psi+-plugins-autoreplyplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912505" version="1" comment="psi+-plugins-birthdayreminderplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912506" version="1" comment="psi+-plugins-chessplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912507" version="1" comment="psi+-plugins-cleanerplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912508" version="1" comment="psi+-plugins-clientswitcherplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912509" version="1" comment="psi+-plugins-conferenceloggerplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912510" version="1" comment="psi+-plugins-contentdownloaderplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912511" version="1" comment="psi+-plugins-devel is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912512" version="1" comment="psi+-plugins-enummessagesplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912513" version="1" comment="psi+-plugins-extendedmenuplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912514" version="1" comment="psi+-plugins-extendedoptionsplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912515" version="1" comment="psi+-plugins-gomokugameplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912516" version="1" comment="psi+-plugins-historykeeperplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912517" version="1" comment="psi+-plugins-imageplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912518" version="1" comment="psi+-plugins-imagepreviewplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912519" version="1" comment="psi+-plugins-jabberdiskplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912520" version="1" comment="psi+-plugins-juickplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912521" version="1" comment="psi+-plugins-messagefilterplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912522" version="1" comment="psi+-plugins-omemoplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912523" version="1" comment="psi+-plugins-openpgpplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912524" version="1" comment="psi+-plugins-otrplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912525" version="1" comment="psi+-plugins-pepchangenotifyplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912526" version="1" comment="psi+-plugins-qipxstatusesplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912527" version="1" comment="psi+-plugins-screenshotplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912528" version="1" comment="psi+-plugins-stopspamplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912529" version="1" comment="psi+-plugins-storagenotesplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912530" version="1" comment="psi+-plugins-translateplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912531" version="1" comment="psi+-plugins-videostatusplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912532" version="1" comment="psi+-plugins-watcherplugin is &lt;1.5.1548+0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912533" version="1" comment="pspp is &lt;1.4.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912534" version="1" comment="pspp-devel is &lt;1.4.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912535" version="1" comment="pspp-devel-doc is &lt;1.4.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912536" version="1" comment="pspp-doc is &lt;1.4.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912537" version="1" comment="pspp-lang is &lt;1.4.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912538" version="1" comment="libpulse-devel is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912539" version="1" comment="libpulse-devel-32bit is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912540" version="1" comment="libpulse-mainloop-glib0 is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912541" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912542" version="1" comment="libpulse0 is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912543" version="1" comment="libpulse0-32bit is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912544" version="1" comment="pulseaudio is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912545" version="1" comment="pulseaudio-bash-completion is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912546" version="1" comment="pulseaudio-gdm-hooks is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912547" version="1" comment="pulseaudio-lang is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912548" version="1" comment="pulseaudio-module-bluetooth is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912549" version="1" comment="pulseaudio-module-gsettings is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912550" version="1" comment="pulseaudio-module-jack is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912551" version="1" comment="pulseaudio-module-lirc is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912552" version="1" comment="pulseaudio-module-x11 is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912553" version="1" comment="pulseaudio-module-zeroconf is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912554" version="1" comment="pulseaudio-system-wide is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912555" version="1" comment="pulseaudio-utils is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912556" version="1" comment="pulseaudio-utils-32bit is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912557" version="1" comment="pulseaudio-zsh-completion is &lt;15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912558" version="1" comment="putty is &lt;0.76-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912559" version="1" comment="python is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912560" version="1" comment="python-32bit is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912561" version="1" comment="python-curses is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912562" version="1" comment="python-demo is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912563" version="1" comment="python-gdbm is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912564" version="1" comment="python-idle is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912565" version="1" comment="python-tk is &lt;2.7.18-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912566" version="1" comment="python36-Beaker is &lt;1.11.0-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912567" version="1" comment="python38-Beaker is &lt;1.11.0-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912568" version="1" comment="python39-Beaker is &lt;1.11.0-5.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912569" version="1" comment="python36-CherryPy is &lt;18.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912570" version="1" comment="python38-CherryPy is &lt;18.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912571" version="1" comment="python39-CherryPy is &lt;18.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912572" version="1" comment="python36-Django is &lt;3.2.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912573" version="1" comment="python38-Django is &lt;3.2.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912574" version="1" comment="python39-Django is &lt;3.2.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912575" version="1" comment="python36-Flask-Cors is &lt;3.0.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912576" version="1" comment="python38-Flask-Cors is &lt;3.0.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912577" version="1" comment="python39-Flask-Cors is &lt;3.0.10-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912578" version="1" comment="HyperKitty-web is &lt;1.3.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912579" version="1" comment="HyperKitty-web-uwsgi is &lt;1.3.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912580" version="1" comment="python3-HyperKitty is &lt;1.3.4-5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912581" version="1" comment="python36-Jinja2 is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912582" version="1" comment="python38-Jinja2 is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912583" version="1" comment="python39-Jinja2 is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912584" version="1" comment="python36-Pillow is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912585" version="1" comment="python36-Pillow-tk is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912586" version="1" comment="python38-Pillow is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912587" version="1" comment="python38-Pillow-tk is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912588" version="1" comment="python39-Pillow is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912589" version="1" comment="python39-Pillow-tk is &lt;8.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912590" version="1" comment="python36-PyYAML is &lt;5.4.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912591" version="1" comment="python38-PyYAML is &lt;5.4.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912592" version="1" comment="python39-PyYAML is &lt;5.4.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912593" version="1" comment="python-SQLAlchemy-doc is &lt;1.4.22-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912594" version="1" comment="python36-SQLAlchemy is &lt;1.4.22-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912595" version="1" comment="python38-SQLAlchemy is &lt;1.4.22-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912596" version="1" comment="python39-SQLAlchemy is &lt;1.4.22-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912597" version="1" comment="python-Twisted-doc is &lt;21.7.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912598" version="1" comment="python36-Twisted is &lt;21.7.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912599" version="1" comment="python38-Twisted is &lt;21.7.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912600" version="1" comment="python39-Twisted is &lt;21.7.0-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912601" version="1" comment="python36-Werkzeug is &lt;2.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912602" version="1" comment="python38-Werkzeug is &lt;2.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912603" version="1" comment="python39-Werkzeug is &lt;2.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912604" version="1" comment="python36-XStatic-jquery-ui is &lt;1.12.1.1-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912605" version="1" comment="python38-XStatic-jquery-ui is &lt;1.12.1.1-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912606" version="1" comment="python39-XStatic-jquery-ui is &lt;1.12.1.1-2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912607" version="1" comment="python38-asyncpg is &lt;0.22.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912608" version="1" comment="python39-asyncpg is &lt;0.22.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912609" version="1" comment="python38-autobahn is &lt;21.3.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912610" version="1" comment="python39-autobahn is &lt;21.3.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912611" version="1" comment="python-azure-agent is &lt;2.2.49.2-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912612" version="1" comment="python-azure-agent-test is &lt;2.2.49.2-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912613" version="1" comment="python36-bjoern is &lt;3.1.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912614" version="1" comment="python38-bjoern is &lt;3.1.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912615" version="1" comment="python39-bjoern is &lt;3.1.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912616" version="1" comment="python36-bleach is &lt;3.3.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912617" version="1" comment="python38-bleach is &lt;3.3.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912618" version="1" comment="python39-bleach is &lt;3.3.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912619" version="1" comment="python-bottle-doc is &lt;0.12.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912620" version="1" comment="python36-bottle is &lt;0.12.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912621" version="1" comment="python38-bottle is &lt;0.12.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912622" version="1" comment="python39-bottle is &lt;0.12.19-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912623" version="1" comment="python36-bugzilla is &lt;3.0.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912624" version="1" comment="python38-bugzilla is &lt;3.0.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912625" version="1" comment="python39-bugzilla is &lt;3.0.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912626" version="1" comment="python36-colander is &lt;1.7.0-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912627" version="1" comment="python38-colander is &lt;1.7.0-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912628" version="1" comment="python39-colander is &lt;1.7.0-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912629" version="1" comment="python36-cryptography is &lt;3.3.2-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912630" version="1" comment="python38-cryptography is &lt;3.3.2-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912631" version="1" comment="python39-cryptography is &lt;3.3.2-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912632" version="1" comment="python36-django-allauth is &lt;0.42.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912633" version="1" comment="python38-django-allauth is &lt;0.42.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912634" version="1" comment="python39-django-allauth is &lt;0.42.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912635" version="1" comment="python36-django-debug-toolbar is &lt;3.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912636" version="1" comment="python38-django-debug-toolbar is &lt;3.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912637" version="1" comment="python39-django-debug-toolbar is &lt;3.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912638" version="1" comment="python36-django-registration is &lt;3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912639" version="1" comment="python38-django-registration is &lt;3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912640" version="1" comment="python39-django-registration is &lt;3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912641" version="1" comment="python36-djangorestframework is &lt;3.12.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912642" version="1" comment="python38-djangorestframework is &lt;3.12.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912643" version="1" comment="python39-djangorestframework is &lt;3.12.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912644" version="1" comment="python36-dulwich is &lt;0.20.24-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912645" version="1" comment="python38-dulwich is &lt;0.20.24-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912646" version="1" comment="python39-dulwich is &lt;0.20.24-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912647" version="1" comment="python36-ecdsa is &lt;0.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912648" version="1" comment="python38-ecdsa is &lt;0.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912649" version="1" comment="python39-ecdsa is &lt;0.16.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912650" version="1" comment="python36-hpack is &lt;4.0.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912651" version="1" comment="python38-hpack is &lt;4.0.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912652" version="1" comment="python39-hpack is &lt;4.0.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912653" version="1" comment="python36-httplib2 is &lt;0.19.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912654" version="1" comment="python38-httplib2 is &lt;0.19.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912655" version="1" comment="python39-httplib2 is &lt;0.19.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912656" version="1" comment="python36-impacket is &lt;0.9.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912657" version="1" comment="python38-impacket is &lt;0.9.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912658" version="1" comment="python39-impacket is &lt;0.9.23-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912659" version="1" comment="python36-jupyter-server is &lt;1.10.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912660" version="1" comment="python38-jupyter-server is &lt;1.10.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912661" version="1" comment="python39-jupyter-server is &lt;1.10.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912662" version="1" comment="python36-kubernetes is &lt;12.0.1-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912663" version="1" comment="python38-kubernetes is &lt;12.0.1-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912664" version="1" comment="python39-kubernetes is &lt;12.0.1-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912665" version="1" comment="python36-logilab-common is &lt;1.8.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912666" version="1" comment="python38-logilab-common is &lt;1.8.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912667" version="1" comment="python39-logilab-common is &lt;1.8.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912668" version="1" comment="python-lxml-doc is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912669" version="1" comment="python36-lxml is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912670" version="1" comment="python36-lxml-devel is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912671" version="1" comment="python38-lxml is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912672" version="1" comment="python38-lxml-devel is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912673" version="1" comment="python39-lxml is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912674" version="1" comment="python39-lxml-devel is &lt;4.6.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912675" version="1" comment="python36-markdown2 is &lt;2.4.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912676" version="1" comment="python38-markdown2 is &lt;2.4.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912677" version="1" comment="python39-markdown2 is &lt;2.4.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912678" version="1" comment="python-marshmallow-docs is &lt;3.11.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912679" version="1" comment="python36-marshmallow is &lt;3.11.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912680" version="1" comment="python38-marshmallow is &lt;3.11.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912681" version="1" comment="python39-marshmallow is &lt;3.11.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912682" version="1" comment="python36-mistune is &lt;0.8.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912683" version="1" comment="python38-mistune is &lt;0.8.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912684" version="1" comment="python39-mistune is &lt;0.8.4-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912685" version="1" comment="python36-mysql-connector-python is &lt;8.0.19-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912686" version="1" comment="python38-mysql-connector-python is &lt;8.0.19-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912687" version="1" comment="python39-mysql-connector-python is &lt;8.0.19-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912688" version="1" comment="python36-nltk is &lt;3.5-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912689" version="1" comment="python38-nltk is &lt;3.5-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912690" version="1" comment="python39-nltk is &lt;3.5-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912691" version="1" comment="jupyter-notebook is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912692" version="1" comment="jupyter-notebook-lang is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912693" version="1" comment="jupyter-notebook-latex is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912694" version="1" comment="python36-notebook is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912695" version="1" comment="python36-notebook-lang is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912696" version="1" comment="python38-notebook is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912697" version="1" comment="python38-notebook-lang is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912698" version="1" comment="python39-notebook is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912699" version="1" comment="python39-notebook-lang is &lt;6.2.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912700" version="1" comment="python38-numpy is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912701" version="1" comment="python38-numpy-devel is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912702" version="1" comment="python39-numpy is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912703" version="1" comment="python39-numpy-devel is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912704" version="1" comment="python36-oic is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912705" version="1" comment="python38-oic is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912706" version="1" comment="python39-oic is &lt;1.2.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912707" version="1" comment="python36-oletools is &lt;0.60-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912708" version="1" comment="python38-oletools is &lt;0.60-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912709" version="1" comment="python39-oletools is &lt;0.60-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912710" version="1" comment="python-onionshare is &lt;2.3.3-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912711" version="1" comment="python36-openapi-spec-validator is &lt;0.2.9-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912712" version="1" comment="python38-openapi-spec-validator is &lt;0.2.9-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912713" version="1" comment="python39-openapi-spec-validator is &lt;0.2.9-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912714" version="1" comment="python36-openpyxl is &lt;3.0.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912715" version="1" comment="python38-openpyxl is &lt;3.0.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912716" version="1" comment="python39-openpyxl is &lt;3.0.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912717" version="1" comment="python-paramiko-doc is &lt;2.7.2-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912718" version="1" comment="python36-paramiko is &lt;2.7.2-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912719" version="1" comment="python38-paramiko is &lt;2.7.2-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912720" version="1" comment="python39-paramiko is &lt;2.7.2-3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912721" version="1" comment="python36-pikepdf is &lt;2.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912722" version="1" comment="python38-pikepdf is &lt;2.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912723" version="1" comment="python39-pikepdf is &lt;2.12.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912724" version="1" comment="python36-pip is &lt;20.2.4-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912725" version="1" comment="python38-pip is &lt;20.2.4-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912726" version="1" comment="python39-pip is &lt;20.2.4-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912727" version="1" comment="python36-py is &lt;1.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912728" version="1" comment="python38-py is &lt;1.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912729" version="1" comment="python39-py is &lt;1.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912730" version="1" comment="python36-pyOpenSSL is &lt;20.0.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912731" version="1" comment="python38-pyOpenSSL is &lt;20.0.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912732" version="1" comment="python39-pyOpenSSL is &lt;20.0.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912733" version="1" comment="python36-pydantic is &lt;1.8.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912734" version="1" comment="python38-pydantic is &lt;1.8.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912735" version="1" comment="python39-pydantic is &lt;1.8.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912736" version="1" comment="python-pymisp-doc is &lt;2.4.148-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912737" version="1" comment="python36-pymisp is &lt;2.4.148-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912738" version="1" comment="python38-pymisp is &lt;2.4.148-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912739" version="1" comment="python39-pymisp is &lt;2.4.148-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912740" version="1" comment="python36-pymongo is &lt;3.11.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912741" version="1" comment="python38-pymongo is &lt;3.11.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912742" version="1" comment="python39-pymongo is &lt;3.11.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912743" version="1" comment="python36-pyramid is &lt;2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912744" version="1" comment="python38-pyramid is &lt;2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912745" version="1" comment="python39-pyramid is &lt;2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912746" version="1" comment="python36-pysaml2 is &lt;7.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912747" version="1" comment="python38-pysaml2 is &lt;7.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912748" version="1" comment="python39-pysaml2 is &lt;7.0.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912749" version="1" comment="python36-python-cjson is &lt;1.2.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912750" version="1" comment="python38-python-cjson is &lt;1.2.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912751" version="1" comment="python39-python-cjson is &lt;1.2.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912752" version="1" comment="python36-python-engineio is &lt;4.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912753" version="1" comment="python38-python-engineio is &lt;4.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912754" version="1" comment="python39-python-engineio is &lt;4.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912755" version="1" comment="python36-python-gnupg is &lt;0.4.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912756" version="1" comment="python38-python-gnupg is &lt;0.4.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912757" version="1" comment="python39-python-gnupg is &lt;0.4.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912758" version="1" comment="python36-python3-saml is &lt;1.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912759" version="1" comment="python38-python3-saml is &lt;1.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912760" version="1" comment="python39-python3-saml is &lt;1.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912761" version="1" comment="python36-pywbem is &lt;1.1.1-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912762" version="1" comment="python38-pywbem is &lt;1.1.1-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912763" version="1" comment="python39-pywbem is &lt;1.1.1-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912764" version="1" comment="python36-pyzmq is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912765" version="1" comment="python36-pyzmq-devel is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912766" version="1" comment="python38-pyzmq is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912767" version="1" comment="python38-pyzmq-devel is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912768" version="1" comment="python39-pyzmq is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912769" version="1" comment="python39-pyzmq-devel is &lt;22.2.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912770" version="1" comment="python36-reportlab is &lt;3.5.59-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912771" version="1" comment="python38-reportlab is &lt;3.5.59-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912772" version="1" comment="python39-reportlab is &lt;3.5.59-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912773" version="1" comment="python36-requests is &lt;2.25.1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912774" version="1" comment="python38-requests is &lt;2.25.1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912775" version="1" comment="python39-requests is &lt;2.25.1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912776" version="1" comment="python36-rope is &lt;0.19.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912777" version="1" comment="python38-rope is &lt;0.19.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912778" version="1" comment="python39-rope is &lt;0.19.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912779" version="1" comment="python36-rpyc is &lt;4.1.5-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912780" version="1" comment="python38-rpyc is &lt;4.1.5-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912781" version="1" comment="python39-rpyc is &lt;4.1.5-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912782" version="1" comment="python36-rsa is &lt;4.7.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912783" version="1" comment="python38-rsa is &lt;4.7.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912784" version="1" comment="python39-rsa is &lt;4.7.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912785" version="1" comment="python-rtslib-fb-common is &lt;2.1.74-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912786" version="1" comment="python36-rtslib-fb is &lt;2.1.74-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912787" version="1" comment="python38-rtslib-fb is &lt;2.1.74-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912788" version="1" comment="python39-rtslib-fb is &lt;2.1.74-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912789" version="1" comment="python36-ruamel.yaml is &lt;0.17.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912790" version="1" comment="python38-ruamel.yaml is &lt;0.17.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912791" version="1" comment="python39-ruamel.yaml is &lt;0.17.10-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912792" version="1" comment="python36-setuptools is &lt;57.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912793" version="1" comment="python38-setuptools is &lt;57.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912794" version="1" comment="python39-setuptools is &lt;57.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912795" version="1" comment="python36-sleekxmpp is &lt;1.3.3-4.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912796" version="1" comment="python38-sleekxmpp is &lt;1.3.3-4.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912797" version="1" comment="python39-sleekxmpp is &lt;1.3.3-4.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912798" version="1" comment="python36-slixmpp is &lt;1.5.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912799" version="1" comment="python38-slixmpp is &lt;1.5.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912800" version="1" comment="python39-slixmpp is &lt;1.5.2-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912801" version="1" comment="python36-suds-jurko is &lt;0.6-6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912802" version="1" comment="python38-suds-jurko is &lt;0.6-6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912803" version="1" comment="python39-suds-jurko is &lt;0.6-6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912804" version="1" comment="python-tqdm-bash-completion is &lt;4.62.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912805" version="1" comment="python36-tqdm is &lt;4.62.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912806" version="1" comment="python38-tqdm is &lt;4.62.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912807" version="1" comment="python39-tqdm is &lt;4.62.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912808" version="1" comment="python36-urllib3 is &lt;1.26.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912809" version="1" comment="python38-urllib3 is &lt;1.26.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912810" version="1" comment="python39-urllib3 is &lt;1.26.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912811" version="1" comment="python36-validators is &lt;0.18.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912812" version="1" comment="python38-validators is &lt;0.18.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912813" version="1" comment="python39-validators is &lt;0.18.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912814" version="1" comment="python36-w3lib is &lt;1.22.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912815" version="1" comment="python38-w3lib is &lt;1.22.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912816" version="1" comment="python39-w3lib is &lt;1.22.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912817" version="1" comment="python36-websockets is &lt;9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912818" version="1" comment="python38-websockets is &lt;9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912819" version="1" comment="python39-websockets is &lt;9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912820" version="1" comment="python2-pip is &lt;20.0.2-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912821" version="1" comment="libblkid-devel is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912822" version="1" comment="libblkid-devel-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912823" version="1" comment="libblkid-devel-static is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912824" version="1" comment="libblkid1 is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912825" version="1" comment="libblkid1-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912826" version="1" comment="libfdisk-devel is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912827" version="1" comment="libfdisk-devel-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912828" version="1" comment="libfdisk-devel-static is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912829" version="1" comment="libfdisk1 is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912830" version="1" comment="libfdisk1-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912831" version="1" comment="libmount-devel is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912832" version="1" comment="libmount-devel-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912833" version="1" comment="libmount-devel-static is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912834" version="1" comment="libmount1 is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912835" version="1" comment="libmount1-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912836" version="1" comment="libsmartcols-devel is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912837" version="1" comment="libsmartcols-devel-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912838" version="1" comment="libsmartcols-devel-static is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912839" version="1" comment="libsmartcols1 is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912840" version="1" comment="libsmartcols1-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912841" version="1" comment="libuuid-devel is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912842" version="1" comment="libuuid-devel-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912843" version="1" comment="libuuid-devel-static is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912844" version="1" comment="libuuid1 is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912845" version="1" comment="libuuid1-32bit is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912846" version="1" comment="util-linux is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912847" version="1" comment="util-linux-lang is &lt;2.36.2-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912848" version="1" comment="python310 is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912849" version="1" comment="python310-32bit is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912850" version="1" comment="python310-curses is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912851" version="1" comment="python310-dbm is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912852" version="1" comment="python310-idle is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912853" version="1" comment="python310-tk is &lt;3.10.0rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912854" version="1" comment="python36 is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912855" version="1" comment="python36-32bit is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912856" version="1" comment="python36-curses is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912857" version="1" comment="python36-dbm is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912858" version="1" comment="python36-idle is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912859" version="1" comment="python36-tk is &lt;3.6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912860" version="1" comment="python38 is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912861" version="1" comment="python38-32bit is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912862" version="1" comment="python38-curses is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912863" version="1" comment="python38-dbm is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912864" version="1" comment="python38-idle is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912865" version="1" comment="python38-tk is &lt;3.8.12-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912866" version="1" comment="python39 is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912867" version="1" comment="python39-32bit is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912868" version="1" comment="python39-curses is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912869" version="1" comment="python39-dbm is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912870" version="1" comment="python39-idle is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912871" version="1" comment="python39-tk is &lt;3.9.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912872" version="1" comment="qemu is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912873" version="1" comment="qemu-accel-qtest is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912874" version="1" comment="qemu-accel-tcg-x86 is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912875" version="1" comment="qemu-arm is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912876" version="1" comment="qemu-audio-alsa is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912877" version="1" comment="qemu-audio-jack is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912878" version="1" comment="qemu-audio-pa is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912879" version="1" comment="qemu-audio-spice is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912880" version="1" comment="qemu-block-curl is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912881" version="1" comment="qemu-block-dmg is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912882" version="1" comment="qemu-block-gluster is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912883" version="1" comment="qemu-block-iscsi is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912884" version="1" comment="qemu-block-nfs is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912885" version="1" comment="qemu-block-rbd is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912886" version="1" comment="qemu-block-ssh is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912887" version="1" comment="qemu-chardev-baum is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912888" version="1" comment="qemu-chardev-spice is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912889" version="1" comment="qemu-extra is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912890" version="1" comment="qemu-guest-agent is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912891" version="1" comment="qemu-hw-display-qxl is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912892" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912893" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912894" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912895" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912896" version="1" comment="qemu-hw-usb-host is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912897" version="1" comment="qemu-hw-usb-redirect is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912898" version="1" comment="qemu-hw-usb-smartcard is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912899" version="1" comment="qemu-ipxe is &lt;1.0.0+-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912900" version="1" comment="qemu-ivshmem-tools is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912901" version="1" comment="qemu-ksm is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912902" version="1" comment="qemu-kvm is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912903" version="1" comment="qemu-lang is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912904" version="1" comment="qemu-microvm is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912905" version="1" comment="qemu-ppc is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912906" version="1" comment="qemu-s390x is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912907" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912908" version="1" comment="qemu-sgabios is &lt;8-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912909" version="1" comment="qemu-skiboot is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912910" version="1" comment="qemu-tools is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912911" version="1" comment="qemu-ui-curses is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912912" version="1" comment="qemu-ui-gtk is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912913" version="1" comment="qemu-ui-opengl is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912914" version="1" comment="qemu-ui-spice-app is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912915" version="1" comment="qemu-ui-spice-core is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912916" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912917" version="1" comment="qemu-vhost-user-gpu is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912918" version="1" comment="qemu-x86 is &lt;6.1.0-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912919" version="1" comment="libqore6 is &lt;0.9.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912920" version="1" comment="qore is &lt;0.9.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912921" version="1" comment="qore-devel is &lt;0.9.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912922" version="1" comment="qore-misc-tools is &lt;0.9.15-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912923" version="1" comment="libqpdf28 is &lt;10.3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912924" version="1" comment="qpdf is &lt;10.3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912925" version="1" comment="qpdf-devel is &lt;10.3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912926" version="1" comment="qpdf-htmldoc is &lt;10.3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912927" version="1" comment="libfpm_pb0 is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912928" version="1" comment="libospf0 is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912929" version="1" comment="libospfapiclient0 is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912930" version="1" comment="libquagga_pb0 is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912931" version="1" comment="libzebra1 is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912932" version="1" comment="quagga is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912933" version="1" comment="quagga-devel is &lt;1.2.4-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912934" version="1" comment="quassel-base is &lt;0.13.1-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912935" version="1" comment="quassel-client is &lt;0.13.1-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912936" version="1" comment="quassel-client-qt5 is &lt;0.13.1-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912937" version="1" comment="quassel-core is &lt;0.13.1-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912938" version="1" comment="quassel-mono is &lt;0.13.1-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912939" version="1" comment="qutebrowser is &lt;2.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912940" version="1" comment="librabbitmq-devel is &lt;0.11.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912941" version="1" comment="librabbitmq4 is &lt;0.11.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912942" version="1" comment="rabbitmq-c-tools is &lt;0.11.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912943" version="1" comment="erlang-rabbitmq-client is &lt;3.9.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912944" version="1" comment="rabbitmq-server is &lt;3.9.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912945" version="1" comment="rabbitmq-server-bash-completion is &lt;3.9.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912946" version="1" comment="rabbitmq-server-plugins is &lt;3.9.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912947" version="1" comment="rabbitmq-server-zsh-completion is &lt;3.9.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912948" version="1" comment="radare2 is &lt;5.3.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912949" version="1" comment="radare2-devel is &lt;5.3.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912950" version="1" comment="libraptor-devel is &lt;2.0.15-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912951" version="1" comment="libraptor2-0 is &lt;2.0.15-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912952" version="1" comment="libraptor2-0-32bit is &lt;2.0.15-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912953" version="1" comment="raptor is &lt;2.0.15-3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912954" version="1" comment="rclone is &lt;1.55.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912955" version="1" comment="rclone-bash-completion is &lt;1.55.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912956" version="1" comment="rclone-zsh-completion is &lt;1.55.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912957" version="1" comment="rdesktop is &lt;1.9.0-4.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912958" version="1" comment="redis is &lt;6.2.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912959" version="1" comment="ripgrep is &lt;13.0.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912960" version="1" comment="ripgrep-bash-completion is &lt;13.0.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912961" version="1" comment="ripgrep-fish-completion is &lt;13.0.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912962" version="1" comment="ripgrep-zsh-completion is &lt;13.0.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912963" version="1" comment="rkhunter is &lt;1.4.6-5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912964" version="1" comment="librnp0 is &lt;0.15.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912965" version="1" comment="rnp is &lt;0.15.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912966" version="1" comment="rnp-devel is &lt;0.15.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912967" version="1" comment="roundcubemail is &lt;1.4.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912968" version="1" comment="rpcbind is &lt;1.2.6-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912969" version="1" comment="librpmbuild9 is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912970" version="1" comment="rpm is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912971" version="1" comment="rpm-32bit is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912972" version="1" comment="rpm-build is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912973" version="1" comment="rpm-build-perl is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912974" version="1" comment="rpm-build-python is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912975" version="1" comment="rpm-devel is &lt;4.16.1.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912976" version="1" comment="rpmdevtools is &lt;8.10-7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912977" version="1" comment="rpmlint is &lt;2.1+git20210924.ad0cf53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912978" version="1" comment="rsync is &lt;3.2.3-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912979" version="1" comment="rsyslog is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912980" version="1" comment="rsyslog-diag-tools is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912981" version="1" comment="rsyslog-doc is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912982" version="1" comment="rsyslog-module-elasticsearch is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912983" version="1" comment="rsyslog-module-gcrypt is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912984" version="1" comment="rsyslog-module-gssapi is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912985" version="1" comment="rsyslog-module-gtls is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912986" version="1" comment="rsyslog-module-kafka is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912987" version="1" comment="rsyslog-module-mmnormalize is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912988" version="1" comment="rsyslog-module-mysql is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912989" version="1" comment="rsyslog-module-omamqp1 is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912990" version="1" comment="rsyslog-module-omhttpfs is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912991" version="1" comment="rsyslog-module-omtcl is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912992" version="1" comment="rsyslog-module-ossl is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912993" version="1" comment="rsyslog-module-pgsql is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912994" version="1" comment="rsyslog-module-relp is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912995" version="1" comment="rsyslog-module-snmp is &lt;8.2106.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912996" version="1" comment="libruby2_7-2_7 is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912997" version="1" comment="ruby2.7 is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912998" version="1" comment="ruby2.7-devel is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009912999" version="1" comment="ruby2.7-devel-extra is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913000" version="1" comment="ruby2.7-doc is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913001" version="1" comment="ruby2.7-doc-ri is &lt;2.7.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913002" version="1" comment="libruby3_0-3_0 is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913003" version="1" comment="ruby3.0 is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913004" version="1" comment="ruby3.0-devel is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913005" version="1" comment="ruby3.0-devel-extra is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913006" version="1" comment="ruby3.0-doc is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913007" version="1" comment="ruby3.0-doc-ri is &lt;3.0.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913008" version="1" comment="ruby2.7-rubygem-actioncable-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913009" version="1" comment="ruby3.0-rubygem-actioncable-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913010" version="1" comment="ruby2.7-rubygem-actioncable-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913011" version="1" comment="ruby3.0-rubygem-actioncable-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913012" version="1" comment="ruby2.7-rubygem-actionmailbox-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913013" version="1" comment="ruby3.0-rubygem-actionmailbox-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913014" version="1" comment="ruby2.7-rubygem-actionmailer-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913015" version="1" comment="ruby3.0-rubygem-actionmailer-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913016" version="1" comment="ruby2.7-rubygem-actionmailer-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913017" version="1" comment="ruby3.0-rubygem-actionmailer-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913018" version="1" comment="ruby2.7-rubygem-actionpack-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913019" version="1" comment="ruby3.0-rubygem-actionpack-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913020" version="1" comment="ruby2.7-rubygem-actionpack-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913021" version="1" comment="ruby3.0-rubygem-actionpack-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913022" version="1" comment="ruby2.7-rubygem-actiontext-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913023" version="1" comment="ruby3.0-rubygem-actiontext-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913024" version="1" comment="ruby2.7-rubygem-actionview-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913025" version="1" comment="ruby3.0-rubygem-actionview-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913026" version="1" comment="ruby2.7-rubygem-actionview-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913027" version="1" comment="ruby3.0-rubygem-actionview-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913028" version="1" comment="ruby2.7-rubygem-activejob-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913029" version="1" comment="ruby3.0-rubygem-activejob-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913030" version="1" comment="ruby2.7-rubygem-activejob-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913031" version="1" comment="ruby3.0-rubygem-activejob-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913032" version="1" comment="ruby2.7-rubygem-activemodel-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913033" version="1" comment="ruby3.0-rubygem-activemodel-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913034" version="1" comment="ruby2.7-rubygem-activemodel-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913035" version="1" comment="ruby3.0-rubygem-activemodel-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913036" version="1" comment="ruby2.7-rubygem-activerecord-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913037" version="1" comment="ruby3.0-rubygem-activerecord-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913038" version="1" comment="ruby2.7-rubygem-activerecord-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913039" version="1" comment="ruby3.0-rubygem-activerecord-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913040" version="1" comment="ruby2.7-rubygem-activestorage-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913041" version="1" comment="ruby3.0-rubygem-activestorage-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913042" version="1" comment="ruby2.7-rubygem-activestorage-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913043" version="1" comment="ruby3.0-rubygem-activestorage-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913044" version="1" comment="ruby2.7-rubygem-activesupport-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913045" version="1" comment="ruby3.0-rubygem-activesupport-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913046" version="1" comment="ruby2.7-rubygem-activesupport-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913047" version="1" comment="ruby3.0-rubygem-activesupport-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913048" version="1" comment="ruby2.7-rubygem-archive-tar-minitar is &lt;0.5.2-9.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913049" version="1" comment="ruby3.0-rubygem-archive-tar-minitar is &lt;0.5.2-9.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913050" version="1" comment="ruby2.7-rubygem-http-cookie is &lt;1.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913051" version="1" comment="ruby3.0-rubygem-http-cookie is &lt;1.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913052" version="1" comment="ruby2.7-rubygem-jquery-rails is &lt;4.4.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913053" version="1" comment="ruby3.0-rubygem-jquery-rails is &lt;4.4.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913054" version="1" comment="ruby2.7-rubygem-json_pure is &lt;2.5.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913055" version="1" comment="ruby3.0-rubygem-json_pure is &lt;2.5.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913056" version="1" comment="ruby2.7-rubygem-kramdown is &lt;2.3.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913057" version="1" comment="ruby3.0-rubygem-kramdown is &lt;2.3.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913058" version="1" comment="ruby2.7-rubygem-loofah is &lt;2.12.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913059" version="1" comment="ruby3.0-rubygem-loofah is &lt;2.12.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913060" version="1" comment="ruby2.7-rubygem-minitar is &lt;0.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913061" version="1" comment="ruby3.0-rubygem-minitar is &lt;0.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913062" version="1" comment="ruby2.7-rubygem-multi_xml is &lt;0.6.0-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913063" version="1" comment="ruby3.0-rubygem-multi_xml is &lt;0.6.0-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913064" version="1" comment="ruby2.7-rubygem-nokogiri is &lt;1.12.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913065" version="1" comment="ruby3.0-rubygem-nokogiri is &lt;1.12.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913066" version="1" comment="ruby2.7-rubygem-passenger is &lt;6.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913067" version="1" comment="ruby3.0-rubygem-passenger is &lt;6.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913068" version="1" comment="rubygem-passenger is &lt;6.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913069" version="1" comment="rubygem-passenger-apache2 is &lt;6.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913070" version="1" comment="rubygem-passenger-nginx is &lt;6.0.8-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913071" version="1" comment="ruby2.7-rubygem-puma is &lt;5.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913072" version="1" comment="ruby3.0-rubygem-puma is &lt;5.4.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913073" version="1" comment="ruby2.7-rubygem-puma-4 is &lt;4.3.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913074" version="1" comment="ruby3.0-rubygem-puma-4 is &lt;4.3.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913075" version="1" comment="ruby2.7-rubygem-rack is &lt;2.2.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913076" version="1" comment="ruby3.0-rubygem-rack is &lt;2.2.3-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913077" version="1" comment="ruby2.7-rubygem-rack-1_6 is &lt;1.6.13-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913078" version="1" comment="ruby3.0-rubygem-rack-1_6 is &lt;1.6.13-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913079" version="1" comment="ruby2.7-rubygem-rack-2.0 is &lt;2.0.9-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913080" version="1" comment="ruby3.0-rubygem-rack-2.0 is &lt;2.0.9-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913081" version="1" comment="ruby2.7-rubygem-rails-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913082" version="1" comment="ruby3.0-rubygem-rails-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913083" version="1" comment="ruby2.7-rubygem-rails-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913084" version="1" comment="ruby3.0-rubygem-rails-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913085" version="1" comment="ruby2.7-rubygem-rails-html-sanitizer is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913086" version="1" comment="ruby3.0-rubygem-rails-html-sanitizer is &lt;1.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913087" version="1" comment="ruby2.7-rubygem-railties-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913088" version="1" comment="ruby3.0-rubygem-railties-5.2 is &lt;5.2.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913089" version="1" comment="ruby2.7-rubygem-railties-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913090" version="1" comment="ruby3.0-rubygem-railties-6.0 is &lt;6.0.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913091" version="1" comment="ruby2.7-rubygem-rubyzip is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913092" version="1" comment="ruby3.0-rubygem-rubyzip is &lt;2.3.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913093" version="1" comment="ruby2.7-rubygem-sinatra is &lt;2.1.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913094" version="1" comment="ruby3.0-rubygem-sinatra is &lt;2.1.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913095" version="1" comment="ruby2.7-rubygem-sprockets is &lt;4.0.2-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913096" version="1" comment="ruby3.0-rubygem-sprockets is &lt;4.0.2-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913097" version="1" comment="ruby2.7-rubygem-sprockets-3.7 is &lt;3.7.2-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913098" version="1" comment="ruby3.0-rubygem-sprockets-3.7 is &lt;3.7.2-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913099" version="1" comment="ruby2.7-rubygem-web-console is &lt;4.1.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913100" version="1" comment="ruby3.0-rubygem-web-console is &lt;4.1.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913101" version="1" comment="ruby2.7-rubygem-websocket-extensions is &lt;0.1.5-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913102" version="1" comment="ruby3.0-rubygem-websocket-extensions is &lt;0.1.5-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913103" version="1" comment="runc is &lt;1.0.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913104" version="1" comment="cargo is &lt;1.54.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913105" version="1" comment="rls is &lt;1.54.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913106" version="1" comment="rust is &lt;1.54.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913107" version="1" comment="rust-gdb is &lt;1.54.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913108" version="1" comment="cargo1.53 is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913109" version="1" comment="cargo1.53-doc is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913110" version="1" comment="rls1.53 is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913111" version="1" comment="rust1.53 is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913112" version="1" comment="rust1.53-analysis is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913113" version="1" comment="rust1.53-doc is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913114" version="1" comment="rust1.53-gdb is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913115" version="1" comment="rust1.53-src is &lt;1.53.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913116" version="1" comment="rxvt-unicode is &lt;9.26-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913117" version="1" comment="rzip is &lt;2.1-149.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913118" version="1" comment="rzsz is &lt;0.12.21~rc-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882467" version="1" comment="python3-salt is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882468" version="1" comment="salt is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886777" version="1" comment="salt-api is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882469" version="1" comment="salt-bash-completion is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886778" version="1" comment="salt-cloud is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882470" version="1" comment="salt-doc is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886779" version="1" comment="salt-fish-completion is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886780" version="1" comment="salt-master is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882471" version="1" comment="salt-minion is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886781" version="1" comment="salt-proxy is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886782" version="1" comment="salt-ssh is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886783" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886784" version="1" comment="salt-syndic is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913119" version="1" comment="salt-transactional-update is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882472" version="1" comment="salt-zsh-completion is &lt;3002.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913120" version="1" comment="ctdb is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913121" version="1" comment="ctdb-pcp-pmda is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913122" version="1" comment="libdcerpc-binding0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913123" version="1" comment="libdcerpc-binding0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913124" version="1" comment="libdcerpc-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913125" version="1" comment="libdcerpc-samr-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913126" version="1" comment="libdcerpc-samr0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913127" version="1" comment="libdcerpc-samr0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913128" version="1" comment="libdcerpc0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913129" version="1" comment="libdcerpc0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913130" version="1" comment="libndr-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913131" version="1" comment="libndr-krb5pac-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913132" version="1" comment="libndr-krb5pac0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913133" version="1" comment="libndr-krb5pac0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913134" version="1" comment="libndr-nbt-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913135" version="1" comment="libndr-nbt0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913136" version="1" comment="libndr-nbt0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913137" version="1" comment="libndr-standard-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913138" version="1" comment="libndr-standard0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913139" version="1" comment="libndr-standard0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913140" version="1" comment="libndr1 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913141" version="1" comment="libndr1-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913142" version="1" comment="libnetapi-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913143" version="1" comment="libnetapi-devel-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913144" version="1" comment="libnetapi0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913145" version="1" comment="libnetapi0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913146" version="1" comment="libsamba-credentials-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913147" version="1" comment="libsamba-credentials1 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913148" version="1" comment="libsamba-credentials1-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913149" version="1" comment="libsamba-errors-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913150" version="1" comment="libsamba-errors0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913151" version="1" comment="libsamba-errors0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913152" version="1" comment="libsamba-hostconfig-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913153" version="1" comment="libsamba-hostconfig0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913154" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913155" version="1" comment="libsamba-passdb-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913156" version="1" comment="libsamba-passdb0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913157" version="1" comment="libsamba-passdb0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913158" version="1" comment="libsamba-policy-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913159" version="1" comment="libsamba-policy-python3-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913160" version="1" comment="libsamba-policy0-python3 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913161" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913162" version="1" comment="libsamba-util-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913163" version="1" comment="libsamba-util0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913164" version="1" comment="libsamba-util0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913165" version="1" comment="libsamdb-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913166" version="1" comment="libsamdb0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913167" version="1" comment="libsamdb0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913168" version="1" comment="libsmbclient-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913169" version="1" comment="libsmbclient0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913170" version="1" comment="libsmbclient0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913171" version="1" comment="libsmbconf-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913172" version="1" comment="libsmbconf0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913173" version="1" comment="libsmbconf0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913174" version="1" comment="libsmbldap-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913175" version="1" comment="libsmbldap2 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913176" version="1" comment="libsmbldap2-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913177" version="1" comment="libtevent-util-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913178" version="1" comment="libtevent-util0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913179" version="1" comment="libtevent-util0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913180" version="1" comment="libwbclient-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913181" version="1" comment="libwbclient0 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913182" version="1" comment="libwbclient0-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913183" version="1" comment="samba is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913184" version="1" comment="samba-ad-dc is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913185" version="1" comment="samba-ad-dc-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913186" version="1" comment="samba-ceph is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913187" version="1" comment="samba-client is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913188" version="1" comment="samba-client-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913189" version="1" comment="samba-core-devel is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913190" version="1" comment="samba-doc is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913191" version="1" comment="samba-dsdb-modules is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913192" version="1" comment="samba-gpupdate is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913193" version="1" comment="samba-ldb-ldap is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913194" version="1" comment="samba-libs is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913195" version="1" comment="samba-libs-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913196" version="1" comment="samba-libs-python3 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913197" version="1" comment="samba-libs-python3-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913198" version="1" comment="samba-python3 is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913199" version="1" comment="samba-test is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913200" version="1" comment="samba-winbind is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913201" version="1" comment="samba-winbind-32bit is &lt;4.14.6+git.182.2205d5224e3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913202" version="1" comment="libsane1 is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913203" version="1" comment="libsane1-32bit is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913204" version="1" comment="sane-backends is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913205" version="1" comment="sane-backends-32bit is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913206" version="1" comment="sane-backends-autoconfig is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913207" version="1" comment="sane-backends-devel is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913208" version="1" comment="sane-backends-devel-32bit is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913209" version="1" comment="sane-saned is &lt;1.0.32-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913210" version="1" comment="sarg is &lt;2.4.0-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913211" version="1" comment="sblim-sfcb is &lt;1.4.9-13.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913212" version="1" comment="sca-patterns-sle11 is &lt;1.3.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913213" version="1" comment="sca-patterns-sle12 is &lt;1.0.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913214" version="1" comment="sca-patterns-sle15 is &lt;1.0.8-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913215" version="1" comment="bosh is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913216" version="1" comment="btcflash is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913217" version="1" comment="cdda2wav is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913218" version="1" comment="cdrecord is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913219" version="1" comment="libcdrdeflt1_0 is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913220" version="1" comment="libdeflt1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913221" version="1" comment="libedc_ecc1_0 is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913222" version="1" comment="libedc_ecc_dec1_0 is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913223" version="1" comment="libfile1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913224" version="1" comment="libfind4_0 is &lt;1.8-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913225" version="1" comment="libparanoia1_0 is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913226" version="1" comment="librmt-devel-doc is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913227" version="1" comment="librmt1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913228" version="1" comment="librscg1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913229" version="1" comment="libscg-devel is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913230" version="1" comment="libscg1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913231" version="1" comment="libscgcmd1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913232" version="1" comment="libschily-devel is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913233" version="1" comment="libschily-devel-doc is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913234" version="1" comment="libschily2_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913235" version="1" comment="libxtermcap1_0 is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913236" version="1" comment="mkisofs is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913237" version="1" comment="readcd is &lt;3.02~a10-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913238" version="1" comment="rscsi is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913239" version="1" comment="sccs is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913240" version="1" comment="schily-ctags is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913241" version="1" comment="schily-mt is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913242" version="1" comment="schily-rmt is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913243" version="1" comment="smake is &lt;2021.09.01-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913244" version="1" comment="spax is &lt;1.6.1-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913245" version="1" comment="star is &lt;1.6.1-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913246" version="1" comment="ved is &lt;1.8-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913247" version="1" comment="schismtracker is &lt;20210525-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913248" version="1" comment="screen is &lt;4.8.0-3.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913249" version="1" comment="scummvm is &lt;2.2.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913250" version="1" comment="scummvm-extra is &lt;2.2.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009081969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913251" version="1" comment="sddm is &lt;0.19.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913252" version="1" comment="sddm-branding-openSUSE is &lt;0.19.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913253" version="1" comment="sddm-branding-upstream is &lt;0.19.0-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913254" version="1" comment="libsha1detectcoll-devel is &lt;1.0.3-4.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913255" version="1" comment="libsha1detectcoll1 is &lt;1.0.3-4.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913256" version="1" comment="sha1collisiondetection is &lt;1.0.3-4.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913257" version="1" comment="libsubid-devel is &lt;4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913258" version="1" comment="libsubid3 is &lt;4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913259" version="1" comment="login_defs is &lt;4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913260" version="1" comment="shadow is &lt;4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913261" version="1" comment="libshadowsocks-libev2 is &lt;3.3.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913262" version="1" comment="shadowsocks-libev is &lt;3.3.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913263" version="1" comment="shadowsocks-libev-devel is &lt;3.3.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913264" version="1" comment="shadowsocks-libev-doc is &lt;3.3.5-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913265" version="1" comment="sharutils is &lt;4.15.2-6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913266" version="1" comment="sharutils-lang is &lt;4.15.2-6.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913267" version="1" comment="libshibsp-lite10 is &lt;3.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913268" version="1" comment="libshibsp10 is &lt;3.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913269" version="1" comment="shibboleth-sp is &lt;3.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913270" version="1" comment="shibboleth-sp-devel is &lt;3.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913271" version="1" comment="shim is &lt;15.4-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913272" version="1" comment="signing-party is &lt;2.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913273" version="1" comment="singularity is &lt;3.8.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913274" version="1" comment="skopeo is &lt;1.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913275" version="1" comment="skopeo-bash-completion is &lt;1.2.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913276" version="1" comment="jcl-over-slf4j is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913277" version="1" comment="jul-to-slf4j is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913278" version="1" comment="log4j-over-slf4j is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913279" version="1" comment="slf4j is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913280" version="1" comment="slf4j-ext is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913281" version="1" comment="slf4j-javadoc is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913282" version="1" comment="slf4j-jcl is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913283" version="1" comment="slf4j-jdk14 is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913284" version="1" comment="slf4j-log4j12 is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913285" version="1" comment="slf4j-manual is &lt;1.7.30-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913286" version="1" comment="slirp4netns is &lt;1.1.11-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913287" version="1" comment="slrn is &lt;1.0.3-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913288" version="1" comment="slrn-lang is &lt;1.0.3-3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913289" version="1" comment="libnss_slurm2 is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913290" version="1" comment="libpmi0 is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913291" version="1" comment="libslurm37 is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913292" version="1" comment="perl-slurm is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913293" version="1" comment="slurm is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913294" version="1" comment="slurm-auth-none is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913295" version="1" comment="slurm-config is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913296" version="1" comment="slurm-config-man is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913297" version="1" comment="slurm-cray is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913298" version="1" comment="slurm-devel is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913299" version="1" comment="slurm-doc is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913300" version="1" comment="slurm-hdf5 is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913301" version="1" comment="slurm-lua is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913302" version="1" comment="slurm-munge is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913303" version="1" comment="slurm-node is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913304" version="1" comment="slurm-openlava is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913305" version="1" comment="slurm-pam_slurm is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913306" version="1" comment="slurm-plugins is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913307" version="1" comment="slurm-rest is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913308" version="1" comment="slurm-seff is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913309" version="1" comment="slurm-sjstat is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913310" version="1" comment="slurm-slurmdbd is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913311" version="1" comment="slurm-sql is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913312" version="1" comment="slurm-sview is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913313" version="1" comment="slurm-torque is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913314" version="1" comment="slurm-webdoc is &lt;21.08.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913315" version="1" comment="snack is &lt;2.2.10-215.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913316" version="1" comment="snakeyaml is &lt;1.28-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913317" version="1" comment="snakeyaml-javadoc is &lt;1.28-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913318" version="1" comment="solanum is &lt;0~ch448-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913319" version="1" comment="libSoundTouch1 is &lt;2.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913320" version="1" comment="libSoundTouch1-32bit is &lt;2.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913321" version="1" comment="soundtouch is &lt;2.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913322" version="1" comment="soundtouch-devel is &lt;2.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913323" version="1" comment="libsox3 is &lt;14.4.2-5.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913324" version="1" comment="sox is &lt;14.4.2-5.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913325" version="1" comment="sox-devel is &lt;14.4.2-5.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913326" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.6-71.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913327" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-71.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913328" version="1" comment="spamassassin is &lt;3.4.6-71.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913329" version="1" comment="spamassassin-spamc is &lt;3.4.6-71.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913330" version="1" comment="spectre-meltdown-checker is &lt;0.44-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913331" version="1" comment="libspice-server-devel is &lt;0.15.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913332" version="1" comment="libspice-server1 is &lt;0.15.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913333" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913334" version="1" comment="libspice-client-glib-helper is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913335" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913336" version="1" comment="spice-gtk is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913337" version="1" comment="spice-gtk-devel is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913338" version="1" comment="spice-gtk-lang is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913339" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913340" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.39-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913341" version="1" comment="spice-vdagent is &lt;0.21.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913342" version="1" comment="libsqlite3-0 is &lt;3.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913343" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913344" version="1" comment="sqlite3 is &lt;3.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913345" version="1" comment="sqlite3-devel is &lt;3.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913346" version="1" comment="sqlite3-doc is &lt;3.36.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913347" version="1" comment="sqliteodbc is &lt;0.9998-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913348" version="1" comment="sqliteodbc-doc is &lt;0.9998-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913349" version="1" comment="squashfs is &lt;4.4-3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913350" version="1" comment="squid is &lt;4.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913351" version="1" comment="squidGuard is &lt;1.6.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913352" version="1" comment="squidGuard-doc is &lt;1.6.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913353" version="1" comment="libsrt1_4 is &lt;1.4.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913354" version="1" comment="libsrt1_4-32bit is &lt;1.4.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913355" version="1" comment="srt is &lt;1.4.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913356" version="1" comment="srt-devel is &lt;1.4.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913357" version="1" comment="ssdp-responder is &lt;1.7-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913358" version="1" comment="ssh-audit is &lt;2.5.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913359" version="1" comment="libipa_hbac-devel is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913360" version="1" comment="libipa_hbac0 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913361" version="1" comment="libnfsidmap-sss is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913362" version="1" comment="libsss_certmap-devel is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913363" version="1" comment="libsss_certmap0 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913364" version="1" comment="libsss_idmap-devel is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913365" version="1" comment="libsss_idmap0 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913366" version="1" comment="libsss_nss_idmap-devel is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913367" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913368" version="1" comment="libsss_simpleifp-devel is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913369" version="1" comment="libsss_simpleifp0 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913370" version="1" comment="python3-ipa_hbac is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913371" version="1" comment="python3-sss-murmur is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913372" version="1" comment="python3-sss_nss_idmap is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913373" version="1" comment="python3-sssd-config is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913374" version="1" comment="sssd is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913375" version="1" comment="sssd-32bit is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913376" version="1" comment="sssd-ad is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913377" version="1" comment="sssd-dbus is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913378" version="1" comment="sssd-ipa is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913379" version="1" comment="sssd-kcm is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913380" version="1" comment="sssd-krb5 is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913381" version="1" comment="sssd-krb5-common is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913382" version="1" comment="sssd-ldap is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913383" version="1" comment="sssd-proxy is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913384" version="1" comment="sssd-tools is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913385" version="1" comment="sssd-winbind-idmap is &lt;2.5.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913386" version="1" comment="stb-devel is &lt;2.36.1594640766.b42009b-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913387" version="1" comment="storeBackup is &lt;3.5-13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913388" version="1" comment="strongswan is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913389" version="1" comment="strongswan-doc is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913390" version="1" comment="strongswan-hmac is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913391" version="1" comment="strongswan-ipsec is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913392" version="1" comment="strongswan-libs0 is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913393" version="1" comment="strongswan-mysql is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913394" version="1" comment="strongswan-nm is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913395" version="1" comment="strongswan-sqlite is &lt;5.9.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913396" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913397" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913398" version="1" comment="subversion is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913399" version="1" comment="subversion-bash-completion is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913400" version="1" comment="subversion-devel is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913401" version="1" comment="subversion-perl is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913402" version="1" comment="subversion-python is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913403" version="1" comment="subversion-ruby is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913404" version="1" comment="subversion-server is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913405" version="1" comment="subversion-tools is &lt;1.14.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913406" version="1" comment="sudo is &lt;1.9.7p2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913407" version="1" comment="sudo-devel is &lt;1.9.7p2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913408" version="1" comment="sudo-plugin-python is &lt;1.9.7p2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913409" version="1" comment="sudo-test is &lt;1.9.7p2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913410" version="1" comment="supervisor is &lt;4.1.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913411" version="1" comment="supportutils is &lt;3.1.17-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913412" version="1" comment="swtpm is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913413" version="1" comment="swtpm-devel is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913414" version="1" comment="swtpm-selinux is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913415" version="1" comment="syncthing is &lt;1.18.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913416" version="1" comment="syncthing-relaysrv is &lt;1.18.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913417" version="1" comment="libevtlog-3_33-0 is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913418" version="1" comment="syslog-ng is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913419" version="1" comment="syslog-ng-curl is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913420" version="1" comment="syslog-ng-devel is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913421" version="1" comment="syslog-ng-geoip is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913422" version="1" comment="syslog-ng-java is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913423" version="1" comment="syslog-ng-mqtt is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913424" version="1" comment="syslog-ng-python is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913425" version="1" comment="syslog-ng-redis is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913426" version="1" comment="syslog-ng-smtp is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913427" version="1" comment="syslog-ng-snmp is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913428" version="1" comment="syslog-ng-sql is &lt;3.33.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913429" version="1" comment="sysstat is &lt;12.4.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913430" version="1" comment="sysstat-isag is &lt;12.4.3-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913431" version="1" comment="libsystemd0 is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913432" version="1" comment="libsystemd0-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913433" version="1" comment="libudev-devel is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913434" version="1" comment="libudev-devel-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913435" version="1" comment="libudev1 is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913436" version="1" comment="libudev1-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913437" version="1" comment="nss-myhostname is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913438" version="1" comment="nss-myhostname-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913439" version="1" comment="nss-mymachines is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913440" version="1" comment="nss-mymachines-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913441" version="1" comment="nss-resolve is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913442" version="1" comment="nss-systemd is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913443" version="1" comment="systemd is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913444" version="1" comment="systemd-32bit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913445" version="1" comment="systemd-container is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913446" version="1" comment="systemd-coredump is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913447" version="1" comment="systemd-devel is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913448" version="1" comment="systemd-doc is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913449" version="1" comment="systemd-experimental is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913450" version="1" comment="systemd-journal-remote is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913451" version="1" comment="systemd-lang is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913452" version="1" comment="systemd-logger is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913453" version="1" comment="systemd-network is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913454" version="1" comment="systemd-portable is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913455" version="1" comment="systemd-sysvinit is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913456" version="1" comment="systemd-testsuite is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913457" version="1" comment="udev is &lt;249.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913458" version="1" comment="libtag-devel is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913459" version="1" comment="libtag1 is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913460" version="1" comment="libtag1-32bit is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913461" version="1" comment="libtag_c0 is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913462" version="1" comment="libtag_c0-32bit is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913463" version="1" comment="taglib is &lt;1.12-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913464" version="1" comment="tar is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913465" version="1" comment="tar-backup-scripts is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913466" version="1" comment="tar-doc is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913467" version="1" comment="tar-lang is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913468" version="1" comment="tar-rmt is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913469" version="1" comment="tar-tests is &lt;1.34-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913470" version="1" comment="python36-targetcli-fb is &lt;2.1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913471" version="1" comment="python38-targetcli-fb is &lt;2.1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913472" version="1" comment="python39-targetcli-fb is &lt;2.1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913473" version="1" comment="targetcli-fb-common is &lt;2.1.54-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913474" version="1" comment="tboot is &lt;20210614_1.10.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913475" version="1" comment="tcpdump is &lt;4.99.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913476" version="1" comment="tcpreplay is &lt;4.3.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913477" version="1" comment="teeworlds is &lt;0.7.5-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913478" version="1" comment="telegraf is &lt;1.19.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913479" version="1" comment="terraform is &lt;0.14.10-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913480" version="1" comment="terraform-provider-helm is &lt;2.0.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913481" version="1" comment="libkpathsea6 is &lt;6.3.3-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913482" version="1" comment="libptexenc1 is &lt;1.3.9-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913483" version="1" comment="libsynctex2 is &lt;1.21-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913484" version="1" comment="libtexlua53-5 is &lt;5.3.6-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913485" version="1" comment="libtexluajit2 is &lt;2.1.0beta3-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913486" version="1" comment="perl-biber is &lt;2021.20210325.svn30357-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913487" version="1" comment="texlive is &lt;2021.20210325-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913488" version="1" comment="texlive-a2ping-bin is &lt;2021.20210325.svn27321-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913489" version="1" comment="texlive-accfonts-bin is &lt;2021.20210325.svn12688-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913490" version="1" comment="texlive-adhocfilelist-bin is &lt;2021.20210325.svn28038-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913491" version="1" comment="texlive-afm2pl-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913492" version="1" comment="texlive-albatross-bin is &lt;2021.20210325.svn57089-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913493" version="1" comment="texlive-aleph-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913494" version="1" comment="texlive-amstex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913495" version="1" comment="texlive-arara-bin is &lt;2021.20210325.svn29036-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913496" version="1" comment="texlive-asymptote-bin is &lt;2021.20210325.svn57890-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913497" version="1" comment="texlive-attachfile2-bin is &lt;2021.20210325.svn52909-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913498" version="1" comment="texlive-authorindex-bin is &lt;2021.20210325.svn18790-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913499" version="1" comment="texlive-autosp-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913500" version="1" comment="texlive-axodraw2-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913501" version="1" comment="texlive-bib2gls-bin is &lt;2021.20210325.svn45266-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913502" version="1" comment="texlive-biber-bin is &lt;2021.20210325.svn57273-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913503" version="1" comment="texlive-bibexport-bin is &lt;2021.20210325.svn16219-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913504" version="1" comment="texlive-bibtex-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913505" version="1" comment="texlive-bibtex8-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913506" version="1" comment="texlive-bibtexu-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913507" version="1" comment="texlive-bin-devel is &lt;2021.20210325-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913508" version="1" comment="texlive-bundledoc-bin is &lt;2021.20210325.svn17794-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913509" version="1" comment="texlive-cachepic-bin is &lt;2021.20210325.svn15543-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913510" version="1" comment="texlive-checkcites-bin is &lt;2021.20210325.svn25623-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913511" version="1" comment="texlive-checklistings-bin is &lt;2021.20210325.svn38300-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913512" version="1" comment="texlive-chklref-bin is &lt;2021.20210325.svn52631-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913513" version="1" comment="texlive-chktex-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913514" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2021.20210325.svn37223-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913515" version="1" comment="texlive-cjkutils-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913516" version="1" comment="texlive-clojure-pamphlet-bin is &lt;2021.20210325.svn51944-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913517" version="1" comment="texlive-cluttex-bin is &lt;2021.20210325.svn48871-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913518" version="1" comment="texlive-context-bin is &lt;2021.20210325.svn34112-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913519" version="1" comment="texlive-convbkmk-bin is &lt;2021.20210325.svn30408-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913520" version="1" comment="texlive-crossrefware-bin is &lt;2021.20210325.svn45927-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913521" version="1" comment="texlive-cslatex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913522" version="1" comment="texlive-csplain-bin is &lt;2021.20210325.svn50528-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913523" version="1" comment="texlive-ctan-o-mat-bin is &lt;2021.20210325.svn46996-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913524" version="1" comment="texlive-ctanbib-bin is &lt;2021.20210325.svn48478-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913525" version="1" comment="texlive-ctanify-bin is &lt;2021.20210325.svn24061-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913526" version="1" comment="texlive-ctanupload-bin is &lt;2021.20210325.svn23866-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913527" version="1" comment="texlive-ctie-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913528" version="1" comment="texlive-cweb-bin is &lt;2021.20210325.svn58136-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913529" version="1" comment="texlive-cyrillic-bin-bin is &lt;2021.20210325.svn53554-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913530" version="1" comment="texlive-de-macro-bin is &lt;2021.20210325.svn17399-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913531" version="1" comment="texlive-detex-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913532" version="1" comment="texlive-diadia-bin is &lt;2021.20210325.svn37645-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913533" version="1" comment="texlive-dosepsbin-bin is &lt;2021.20210325.svn24759-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913534" version="1" comment="texlive-dtl-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913535" version="1" comment="texlive-dtxgen-bin is &lt;2021.20210325.svn29031-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913536" version="1" comment="texlive-dviasm-bin is &lt;2021.20210325.svn8329-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913537" version="1" comment="texlive-dvicopy-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913538" version="1" comment="texlive-dvidvi-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913539" version="1" comment="texlive-dviinfox-bin is &lt;2021.20210325.svn44515-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913540" version="1" comment="texlive-dviljk-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913541" version="1" comment="texlive-dviout-util-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913542" version="1" comment="texlive-dvipdfmx-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913543" version="1" comment="texlive-dvipng-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913544" version="1" comment="texlive-dvipos-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913545" version="1" comment="texlive-dvips-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913546" version="1" comment="texlive-dvisvgm-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913547" version="1" comment="texlive-eplain-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913548" version="1" comment="texlive-epspdf-bin is &lt;2021.20210325.svn29050-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913549" version="1" comment="texlive-epstopdf-bin is &lt;2021.20210325.svn18336-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913550" version="1" comment="texlive-exceltex-bin is &lt;2021.20210325.svn25860-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913551" version="1" comment="texlive-fig4latex-bin is &lt;2021.20210325.svn14752-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913552" version="1" comment="texlive-findhyph-bin is &lt;2021.20210325.svn14758-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913553" version="1" comment="texlive-fontinst-bin is &lt;2021.20210325.svn53554-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913554" version="1" comment="texlive-fontools-bin is &lt;2021.20210325.svn25997-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913555" version="1" comment="texlive-fontware-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913556" version="1" comment="texlive-fragmaster-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913557" version="1" comment="texlive-getmap-bin is &lt;2021.20210325.svn34971-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913558" version="1" comment="texlive-git-latexdiff-bin is &lt;2021.20210325.svn54732-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913559" version="1" comment="texlive-glossaries-bin is &lt;2021.20210325.svn37813-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913560" version="1" comment="texlive-gregoriotex-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913561" version="1" comment="texlive-gsftopk-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913562" version="1" comment="texlive-hyperxmp-bin is &lt;2021.20210325.svn56984-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913563" version="1" comment="texlive-jadetex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913564" version="1" comment="texlive-jfmutil-bin is &lt;2021.20210325.svn44835-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913565" version="1" comment="texlive-ketcindy-bin is &lt;2021.20210325.svn49033-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913566" version="1" comment="texlive-kotex-utils-bin is &lt;2021.20210325.svn32101-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913567" version="1" comment="texlive-kpathsea-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913568" version="1" comment="texlive-kpathsea-devel is &lt;6.3.3-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913569" version="1" comment="texlive-l3build-bin is &lt;2021.20210325.svn46894-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913570" version="1" comment="texlive-lacheck-bin is &lt;2021.20210325.svn53999-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913571" version="1" comment="texlive-latex-bin-bin is &lt;2021.20210325.svn54358-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913572" version="1" comment="texlive-latex-bin-dev-bin is &lt;2021.20210325.svn53999-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913573" version="1" comment="texlive-latex-git-log-bin is &lt;2021.20210325.svn30983-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913574" version="1" comment="texlive-latex-papersize-bin is &lt;2021.20210325.svn42296-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913575" version="1" comment="texlive-latex2man-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913576" version="1" comment="texlive-latex2nemeth-bin is &lt;2021.20210325.svn42300-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913577" version="1" comment="texlive-latexdiff-bin is &lt;2021.20210325.svn16420-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913578" version="1" comment="texlive-latexfileversion-bin is &lt;2021.20210325.svn25012-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913579" version="1" comment="texlive-latexindent-bin is &lt;2021.20210325.svn32150-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913580" version="1" comment="texlive-latexmk-bin is &lt;2021.20210325.svn10937-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913581" version="1" comment="texlive-latexpand-bin is &lt;2021.20210325.svn27025-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913582" version="1" comment="texlive-lcdftypetools-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913583" version="1" comment="texlive-light-latex-make-bin is &lt;2021.20210325.svn56352-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913584" version="1" comment="texlive-lilyglyphs-bin is &lt;2021.20210325.svn31696-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913585" version="1" comment="texlive-listbib-bin is &lt;2021.20210325.svn26126-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913586" version="1" comment="texlive-listings-ext-bin is &lt;2021.20210325.svn15093-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913587" version="1" comment="texlive-lollipop-bin is &lt;2021.20210325.svn41465-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913588" version="1" comment="texlive-ltxfileinfo-bin is &lt;2021.20210325.svn29005-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913589" version="1" comment="texlive-ltximg-bin is &lt;2021.20210325.svn32346-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913590" version="1" comment="texlive-luahbtex-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913591" version="1" comment="texlive-luajittex-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913592" version="1" comment="texlive-luaotfload-bin is &lt;2021.20210325.svn34647-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913593" version="1" comment="texlive-luatex-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913594" version="1" comment="texlive-lwarp-bin is &lt;2021.20210325.svn43292-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913595" version="1" comment="texlive-m-tx-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913596" version="1" comment="texlive-make4ht-bin is &lt;2021.20210325.svn37750-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913597" version="1" comment="texlive-makedtx-bin is &lt;2021.20210325.svn38769-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913598" version="1" comment="texlive-makeindex-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913599" version="1" comment="texlive-match_parens-bin is &lt;2021.20210325.svn23500-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913600" version="1" comment="texlive-mathspic-bin is &lt;2021.20210325.svn23661-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913601" version="1" comment="texlive-metafont-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913602" version="1" comment="texlive-metapost-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913603" version="1" comment="texlive-mex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913604" version="1" comment="texlive-mf2pt1-bin is &lt;2021.20210325.svn23406-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913605" version="1" comment="texlive-mflua-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913606" version="1" comment="texlive-mfware-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913607" version="1" comment="texlive-mkgrkindex-bin is &lt;2021.20210325.svn14428-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913608" version="1" comment="texlive-mkjobtexmf-bin is &lt;2021.20210325.svn8457-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913609" version="1" comment="texlive-mkpic-bin is &lt;2021.20210325.svn33688-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913610" version="1" comment="texlive-mltex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913611" version="1" comment="texlive-mptopdf-bin is &lt;2021.20210325.svn18674-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913612" version="1" comment="texlive-multibibliography-bin is &lt;2021.20210325.svn30534-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913613" version="1" comment="texlive-musixtex-bin is &lt;2021.20210325.svn37026-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913614" version="1" comment="texlive-musixtnt-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913615" version="1" comment="texlive-omegaware-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913616" version="1" comment="texlive-optex-bin is &lt;2021.20210325.svn53804-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913617" version="1" comment="texlive-patgen-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913618" version="1" comment="texlive-pax-bin is &lt;2021.20210325.svn10843-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913619" version="1" comment="texlive-pdfbook2-bin is &lt;2021.20210325.svn37537-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913620" version="1" comment="texlive-pdfcrop-bin is &lt;2021.20210325.svn14387-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913621" version="1" comment="texlive-pdfjam-bin is &lt;2021.20210325.svn52858-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913622" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2021.20210325.svn41779-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913623" version="1" comment="texlive-pdftex-bin is &lt;2021.20210325.svn58535-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913624" version="1" comment="texlive-pdftex-quiet-bin is &lt;2021.20210325.svn49140-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913625" version="1" comment="texlive-pdftosrc-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913626" version="1" comment="texlive-pdfxup-bin is &lt;2021.20210325.svn40690-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913627" version="1" comment="texlive-pedigree-perl-bin is &lt;2021.20210325.svn25962-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913628" version="1" comment="texlive-perltex-bin is &lt;2021.20210325.svn16181-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913629" version="1" comment="texlive-petri-nets-bin is &lt;2021.20210325.svn39165-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913630" version="1" comment="texlive-pfarrei-bin is &lt;2021.20210325.svn29348-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913631" version="1" comment="texlive-pkfix-bin is &lt;2021.20210325.svn13364-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913632" version="1" comment="texlive-pkfix-helper-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913633" version="1" comment="texlive-platex-bin is &lt;2021.20210325.svn52800-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913634" version="1" comment="texlive-pmx-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913635" version="1" comment="texlive-pmxchords-bin is &lt;2021.20210325.svn32405-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913636" version="1" comment="texlive-ps2eps-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913637" version="1" comment="texlive-ps2pk-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913638" version="1" comment="texlive-pst-pdf-bin is &lt;2021.20210325.svn7838-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913639" version="1" comment="texlive-pst2pdf-bin is &lt;2021.20210325.svn29333-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913640" version="1" comment="texlive-ptex-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913641" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2021.20210325.svn44206-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913642" version="1" comment="texlive-ptex2pdf-bin is &lt;2021.20210325.svn29335-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913643" version="1" comment="texlive-ptexenc-devel is &lt;1.3.9-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913644" version="1" comment="texlive-purifyeps-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913645" version="1" comment="texlive-pygmentex-bin is &lt;2021.20210325.svn34996-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913646" version="1" comment="texlive-pythontex-bin is &lt;2021.20210325.svn31638-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913647" version="1" comment="texlive-rubik-bin is &lt;2021.20210325.svn32919-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913648" version="1" comment="texlive-scripts-bin is &lt;2021.20210325.svn55172-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913649" version="1" comment="texlive-scripts-extra-bin is &lt;2021.20210325.svn53577-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913650" version="1" comment="texlive-seetexk-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913651" version="1" comment="texlive-spix-bin is &lt;2021.20210325.svn55933-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913652" version="1" comment="texlive-splitindex-bin is &lt;2021.20210325.svn29688-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913653" version="1" comment="texlive-srcredact-bin is &lt;2021.20210325.svn38710-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913654" version="1" comment="texlive-sty2dtx-bin is &lt;2021.20210325.svn21215-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913655" version="1" comment="texlive-svn-multi-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913656" version="1" comment="texlive-synctex-bin is &lt;2021.20210325.svn58136-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913657" version="1" comment="texlive-synctex-devel is &lt;1.21-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913658" version="1" comment="texlive-tex-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913659" version="1" comment="texlive-tex4ebook-bin is &lt;2021.20210325.svn37771-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913660" version="1" comment="texlive-tex4ht-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913661" version="1" comment="texlive-texcount-bin is &lt;2021.20210325.svn13013-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913662" version="1" comment="texlive-texdef-bin is &lt;2021.20210325.svn45011-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913663" version="1" comment="texlive-texdiff-bin is &lt;2021.20210325.svn15506-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913664" version="1" comment="texlive-texdirflatten-bin is &lt;2021.20210325.svn12782-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913665" version="1" comment="texlive-texdoc-bin is &lt;2021.20210325.svn47948-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913666" version="1" comment="texlive-texdoctk-bin is &lt;2021.20210325.svn29741-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913667" version="1" comment="texlive-texfot-bin is &lt;2021.20210325.svn33155-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913668" version="1" comment="texlive-texliveonfly-bin is &lt;2021.20210325.svn24062-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913669" version="1" comment="texlive-texloganalyser-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913670" version="1" comment="texlive-texlua-devel is &lt;5.3.6-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913671" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta3-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913672" version="1" comment="texlive-texosquery-bin is &lt;2021.20210325.svn43596-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913673" version="1" comment="texlive-texplate-bin is &lt;2021.20210325.svn53444-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913674" version="1" comment="texlive-texsis-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913675" version="1" comment="texlive-texware-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913676" version="1" comment="texlive-thumbpdf-bin is &lt;2021.20210325.svn6898-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913677" version="1" comment="texlive-tie-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913678" version="1" comment="texlive-tikztosvg-bin is &lt;2021.20210325.svn55132-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913679" version="1" comment="texlive-tpic2pdftex-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913680" version="1" comment="texlive-ttfutils-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913681" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2021.20210325.svn25648-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913682" version="1" comment="texlive-ulqda-bin is &lt;2021.20210325.svn13663-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913683" version="1" comment="texlive-uplatex-bin is &lt;2021.20210325.svn52800-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913684" version="1" comment="texlive-uptex-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913685" version="1" comment="texlive-urlbst-bin is &lt;2021.20210325.svn23262-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913686" version="1" comment="texlive-velthuis-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913687" version="1" comment="texlive-vlna-bin is &lt;2021.20210325.svn50281-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913688" version="1" comment="texlive-vpe-bin is &lt;2021.20210325.svn6897-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913689" version="1" comment="texlive-web-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913690" version="1" comment="texlive-webquiz-bin is &lt;2021.20210325.svn50419-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913691" version="1" comment="texlive-wordcount-bin is &lt;2021.20210325.svn46165-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913692" version="1" comment="texlive-xdvi-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913693" version="1" comment="texlive-xelatex-dev-bin is &lt;2021.20210325.svn53999-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913694" version="1" comment="texlive-xetex-bin is &lt;2021.20210325.svn58378-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913695" version="1" comment="texlive-xindex-bin is &lt;2021.20210325.svn49312-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913696" version="1" comment="texlive-xml2pmx-bin is &lt;2021.20210325.svn57878-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913697" version="1" comment="texlive-xmltex-bin is &lt;2021.20210325.svn3006-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913698" version="1" comment="texlive-xpdfopen-bin is &lt;2021.20210325.svn52917-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913699" version="1" comment="texlive-yplan-bin is &lt;2021.20210325.svn34398-76.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913700" version="1" comment="texlive-collection-basic is &lt;2021.185.svn56569-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913701" version="1" comment="texlive-collection-bibtexextra is &lt;2021.185.svn58437-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913702" version="1" comment="texlive-collection-binextra is &lt;2021.185.svn56352-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913703" version="1" comment="texlive-collection-context is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913704" version="1" comment="texlive-collection-fontsextra is &lt;2021.185.svn58253-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913705" version="1" comment="texlive-collection-fontsrecommended is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913706" version="1" comment="texlive-collection-fontutils is &lt;2021.185.svn57089-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913707" version="1" comment="texlive-collection-formatsextra is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913708" version="1" comment="texlive-collection-games is &lt;2021.185.svn56623-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913709" version="1" comment="texlive-collection-humanities is &lt;2021.185.svn56575-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913710" version="1" comment="texlive-collection-langarabic is &lt;2021.185.svn56215-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913711" version="1" comment="texlive-collection-langchinese is &lt;2021.185.svn56196-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913712" version="1" comment="texlive-collection-langcjk is &lt;2021.185.svn54191-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913713" version="1" comment="texlive-collection-langcyrillic is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913714" version="1" comment="texlive-collection-langczechslovak is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913715" version="1" comment="texlive-collection-langenglish is &lt;2021.185.svn58290-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913716" version="1" comment="texlive-collection-langeuropean is &lt;2021.185.svn58626-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913717" version="1" comment="texlive-collection-langfrench is &lt;2021.185.svn57491-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913718" version="1" comment="texlive-collection-langgerman is &lt;2021.185.svn55706-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913719" version="1" comment="texlive-collection-langgreek is &lt;2021.185.svn54139-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913720" version="1" comment="texlive-collection-langitalian is &lt;2021.185.svn55129-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913721" version="1" comment="texlive-collection-langjapanese is &lt;2021.185.svn58754-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913722" version="1" comment="texlive-collection-langkorean is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913723" version="1" comment="texlive-collection-langother is &lt;2021.185.svn57757-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913724" version="1" comment="texlive-collection-langpolish is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913725" version="1" comment="texlive-collection-langportuguese is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913726" version="1" comment="texlive-collection-langspanish is &lt;2021.185.svn54141-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913727" version="1" comment="texlive-collection-latex is &lt;2021.185.svn57048-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913728" version="1" comment="texlive-collection-latexextra is &lt;2021.185.svn58593-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913729" version="1" comment="texlive-collection-latexrecommended is &lt;2021.185.svn57862-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913730" version="1" comment="texlive-collection-luatex is &lt;2021.185.svn58124-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913731" version="1" comment="texlive-collection-mathscience is &lt;2021.185.svn57759-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913732" version="1" comment="texlive-collection-metapost is &lt;2021.185.svn50293-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913733" version="1" comment="texlive-collection-music is &lt;2021.185.svn57878-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913734" version="1" comment="texlive-collection-pictures is &lt;2021.185.svn58759-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913735" version="1" comment="texlive-collection-plaingeneric is &lt;2021.185.svn56496-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913736" version="1" comment="texlive-collection-pstricks is &lt;2021.185.svn54455-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913737" version="1" comment="texlive-collection-publishers is &lt;2021.185.svn57312-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913738" version="1" comment="texlive-collection-xetex is &lt;2021.185.svn58543-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913739" version="1" comment="texlive-devel is &lt;2021.185-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913740" version="1" comment="texlive-extratools is &lt;2021.185-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913741" version="1" comment="texlive-filesystem is &lt;2021.185-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913742" version="1" comment="texlive-scheme-basic is &lt;2021.185.svn54191-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913743" version="1" comment="texlive-scheme-context is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913744" version="1" comment="texlive-scheme-full is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913745" version="1" comment="texlive-scheme-gust is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913746" version="1" comment="texlive-scheme-infraonly is &lt;2021.185.svn54191-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913747" version="1" comment="texlive-scheme-medium is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913748" version="1" comment="texlive-scheme-minimal is &lt;2021.185.svn54191-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913749" version="1" comment="texlive-scheme-small is &lt;2021.185.svn54191-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913750" version="1" comment="texlive-scheme-tetex is &lt;2021.185.svn54074-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913751" version="1" comment="texlive-updmap-map is &lt;2021.185.svn54495-52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913752" version="1" comment="texlive-12many is &lt;2021.186.0.0.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913753" version="1" comment="texlive-12many-doc is &lt;2021.186.0.0.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913754" version="1" comment="texlive-2up is &lt;2021.186.1.3asvn55076-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913755" version="1" comment="texlive-2up-doc is &lt;2021.186.1.3asvn55076-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913756" version="1" comment="texlive-Asana-Math is &lt;2021.186.0.000.958svn50999-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913757" version="1" comment="texlive-Asana-Math-doc is &lt;2021.186.0.000.958svn50999-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913758" version="1" comment="texlive-Asana-Math-fonts is &lt;2021.186.0.000.958svn50999-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913759" version="1" comment="texlive-ESIEEcv is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913760" version="1" comment="texlive-ESIEEcv-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913761" version="1" comment="texlive-GS1 is &lt;2021.186.22svn44822-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913762" version="1" comment="texlive-GS1-doc is &lt;2021.186.22svn44822-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913763" version="1" comment="texlive-HA-prosper is &lt;2021.186.4.21svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913764" version="1" comment="texlive-HA-prosper-doc is &lt;2021.186.4.21svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913765" version="1" comment="texlive-IEEEconf is &lt;2021.186.1.4svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913766" version="1" comment="texlive-IEEEconf-doc is &lt;2021.186.1.4svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913767" version="1" comment="texlive-IEEEtran is &lt;2021.186.1.8bsvn51065-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913768" version="1" comment="texlive-IEEEtran-doc is &lt;2021.186.1.8bsvn51065-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913769" version="1" comment="texlive-MemoirChapStyles is &lt;2021.186.1.7esvn25918-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913770" version="1" comment="texlive-SIstyle is &lt;2021.186.2.3asvn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913771" version="1" comment="texlive-SIstyle-doc is &lt;2021.186.2.3asvn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913772" version="1" comment="texlive-SIunits is &lt;2021.186.1.36svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913773" version="1" comment="texlive-SIunits-doc is &lt;2021.186.1.36svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913774" version="1" comment="texlive-Tabbing is &lt;2021.186.svn17022-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913775" version="1" comment="texlive-Tabbing-doc is &lt;2021.186.svn17022-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913776" version="1" comment="texlive-Type1fonts is &lt;2021.186.2.14svn19603-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913777" version="1" comment="texlive-a0poster is &lt;2021.186.1.22bsvn54071-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913778" version="1" comment="texlive-a0poster-doc is &lt;2021.186.1.22bsvn54071-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913779" version="1" comment="texlive-a2ping is &lt;2021.186.2.84psvn52964-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913780" version="1" comment="texlive-a2ping-doc is &lt;2021.186.2.84psvn52964-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913781" version="1" comment="texlive-a4wide is &lt;2021.186.svn20943-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913782" version="1" comment="texlive-a4wide-doc is &lt;2021.186.svn20943-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913783" version="1" comment="texlive-a5comb is &lt;2021.186.4svn17020-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913784" version="1" comment="texlive-a5comb-doc is &lt;2021.186.4svn17020-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913785" version="1" comment="texlive-aaai-named is &lt;2021.186.svn52470-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913786" version="1" comment="texlive-aalok is &lt;2021.186.0.0.2svn57728-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913787" version="1" comment="texlive-aalok-doc is &lt;2021.186.0.0.2svn57728-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913788" version="1" comment="texlive-aastex is &lt;2021.186.6.3.1svn58057-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913789" version="1" comment="texlive-aastex-doc is &lt;2021.186.6.3.1svn58057-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913790" version="1" comment="texlive-abbr is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913791" version="1" comment="texlive-abbr-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913792" version="1" comment="texlive-abc is &lt;2021.186.2.0bsvn41157-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913793" version="1" comment="texlive-abc-doc is &lt;2021.186.2.0bsvn41157-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913794" version="1" comment="texlive-abnt is &lt;2021.186.svn55471-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913795" version="1" comment="texlive-abnt-doc is &lt;2021.186.svn55471-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913796" version="1" comment="texlive-abntex2 is &lt;2021.186.1.9.7svn49248-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913797" version="1" comment="texlive-abntex2-doc is &lt;2021.186.1.9.7svn49248-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913798" version="1" comment="texlive-abraces is &lt;2021.186.2.0svn58761-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913799" version="1" comment="texlive-abraces-doc is &lt;2021.186.2.0svn58761-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913800" version="1" comment="texlive-abstract is &lt;2021.186.1.2asvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913801" version="1" comment="texlive-abstract-doc is &lt;2021.186.1.2asvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913802" version="1" comment="texlive-abstyles is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913803" version="1" comment="texlive-abstyles-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913804" version="1" comment="texlive-academicons is &lt;2021.186.1.9.0svn56119-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913805" version="1" comment="texlive-academicons-doc is &lt;2021.186.1.9.0svn56119-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913806" version="1" comment="texlive-academicons-fonts is &lt;2021.186.1.9.0svn56119-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913807" version="1" comment="texlive-accanthis is &lt;2021.186.svn32089-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913808" version="1" comment="texlive-accanthis-doc is &lt;2021.186.svn32089-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913809" version="1" comment="texlive-accanthis-fonts is &lt;2021.186.svn32089-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913810" version="1" comment="texlive-accents is &lt;2021.186.1.4svn51497-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913811" version="1" comment="texlive-accents-doc is &lt;2021.186.1.4svn51497-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913812" version="1" comment="texlive-accessibility is &lt;2021.186.2.0.3svn55777-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913813" version="1" comment="texlive-accessibility-doc is &lt;2021.186.2.0.3svn55777-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913814" version="1" comment="texlive-accfonts is &lt;2021.186.0.0.25svn18835-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913815" version="1" comment="texlive-accfonts-doc is &lt;2021.186.0.0.25svn18835-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913816" version="1" comment="texlive-accsupp is &lt;2021.186.0.0.6svn53052-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913817" version="1" comment="texlive-accsupp-doc is &lt;2021.186.0.0.6svn53052-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913818" version="1" comment="texlive-achemso is &lt;2021.186.3.13csvn57479-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913819" version="1" comment="texlive-achemso-doc is &lt;2021.186.3.13csvn57479-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913820" version="1" comment="texlive-acmart is &lt;2021.186.1.75svn56946-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913821" version="1" comment="texlive-acmart-doc is &lt;2021.186.1.75svn56946-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913822" version="1" comment="texlive-acmconf is &lt;2021.186.1.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913823" version="1" comment="texlive-acmconf-doc is &lt;2021.186.1.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913824" version="1" comment="texlive-acro is &lt;2021.186.3.5svn57447-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913825" version="1" comment="texlive-acro-doc is &lt;2021.186.3.5svn57447-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913826" version="1" comment="texlive-acronym is &lt;2021.186.1.47svn54758-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913827" version="1" comment="texlive-acronym-doc is &lt;2021.186.1.47svn54758-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913828" version="1" comment="texlive-acroterm is &lt;2021.186.0.0.1svn20498-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913829" version="1" comment="texlive-acroterm-doc is &lt;2021.186.0.0.1svn20498-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913830" version="1" comment="texlive-active-conf is &lt;2021.186.0.0.3asvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913831" version="1" comment="texlive-active-conf-doc is &lt;2021.186.0.0.3asvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913832" version="1" comment="texlive-actuarialangle is &lt;2021.186.2.1svn51376-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913833" version="1" comment="texlive-actuarialangle-doc is &lt;2021.186.2.1svn51376-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913834" version="1" comment="texlive-actuarialsymbol is &lt;2021.186.1.1svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913835" version="1" comment="texlive-actuarialsymbol-doc is &lt;2021.186.1.1svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913836" version="1" comment="texlive-addfont is &lt;2021.186.1.1svn58559-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913837" version="1" comment="texlive-addfont-doc is &lt;2021.186.1.1svn58559-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913838" version="1" comment="texlive-addliga is &lt;2021.186.1.0svn50912-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913839" version="1" comment="texlive-addliga-doc is &lt;2021.186.1.0svn50912-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913840" version="1" comment="texlive-addlines is &lt;2021.186.0.0.3svn49326-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913841" version="1" comment="texlive-addlines-doc is &lt;2021.186.0.0.3svn49326-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913842" version="1" comment="texlive-adfathesis is &lt;2021.186.2.42svn26048-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913843" version="1" comment="texlive-adfathesis-doc is &lt;2021.186.2.42svn26048-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913844" version="1" comment="texlive-adforn is &lt;2021.186.1.1bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913845" version="1" comment="texlive-adforn-doc is &lt;2021.186.1.1bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913846" version="1" comment="texlive-adforn-fonts is &lt;2021.186.1.1bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913847" version="1" comment="texlive-adfsymbols is &lt;2021.186.1.2bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913848" version="1" comment="texlive-adfsymbols-doc is &lt;2021.186.1.2bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913849" version="1" comment="texlive-adfsymbols-fonts is &lt;2021.186.1.2bsvn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913850" version="1" comment="texlive-adhocfilelist is &lt;2021.186.svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913851" version="1" comment="texlive-adhocfilelist-doc is &lt;2021.186.svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913852" version="1" comment="texlive-adigraph is &lt;2021.186.1.7.1svn49862-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913853" version="1" comment="texlive-adigraph-doc is &lt;2021.186.1.7.1svn49862-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913854" version="1" comment="texlive-adjmulticol is &lt;2021.186.1.2svn54157-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913855" version="1" comment="texlive-adjmulticol-doc is &lt;2021.186.1.2svn54157-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913856" version="1" comment="texlive-adjustbox is &lt;2021.186.1.3svn56291-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913857" version="1" comment="texlive-adjustbox-doc is &lt;2021.186.1.3svn56291-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913858" version="1" comment="texlive-adobemapping is &lt;2021.186.svn51787-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913859" version="1" comment="texlive-adrconv is &lt;2021.186.1.4svn46817-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913860" version="1" comment="texlive-adrconv-doc is &lt;2021.186.1.4svn46817-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913861" version="1" comment="texlive-adtrees is &lt;2021.186.1.1svn51618-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913862" version="1" comment="texlive-adtrees-doc is &lt;2021.186.1.1svn51618-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913863" version="1" comment="texlive-advdate is &lt;2021.186.svn20538-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913864" version="1" comment="texlive-advdate-doc is &lt;2021.186.svn20538-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913865" version="1" comment="texlive-ae is &lt;2021.186.1.4svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913866" version="1" comment="texlive-ae-doc is &lt;2021.186.1.4svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913867" version="1" comment="texlive-aeguill is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913868" version="1" comment="texlive-aeguill-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913869" version="1" comment="texlive-aesupp is &lt;2021.186.1svn58253-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913870" version="1" comment="texlive-aesupp-doc is &lt;2021.186.1svn58253-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913871" version="1" comment="texlive-aesupp-fonts is &lt;2021.186.1svn58253-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913872" version="1" comment="texlive-afm2pl is &lt;2021.186.svn54074-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913873" version="1" comment="texlive-afm2pl-doc is &lt;2021.186.svn54074-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913874" version="1" comment="texlive-afparticle is &lt;2021.186.1.3svn35900-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913875" version="1" comment="texlive-afparticle-doc is &lt;2021.186.1.3svn35900-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913876" version="1" comment="texlive-afthesis is &lt;2021.186.2.7svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913877" version="1" comment="texlive-afthesis-doc is &lt;2021.186.2.7svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913878" version="1" comment="texlive-aguplus is &lt;2021.186.1.6bsvn17156-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913879" version="1" comment="texlive-aguplus-doc is &lt;2021.186.1.6bsvn17156-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913880" version="1" comment="texlive-aiaa is &lt;2021.186.3.6svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913881" version="1" comment="texlive-aiaa-doc is &lt;2021.186.3.6svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913882" version="1" comment="texlive-aichej is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913883" version="1" comment="texlive-ajl is &lt;2021.186.svn34016-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913884" version="1" comment="texlive-akktex is &lt;2021.186.0.0.3.2svn26055-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913885" version="1" comment="texlive-akktex-doc is &lt;2021.186.0.0.3.2svn26055-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913886" version="1" comment="texlive-akletter is &lt;2021.186.1.5isvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913887" version="1" comment="texlive-akletter-doc is &lt;2021.186.1.5isvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913888" version="1" comment="texlive-akshar is &lt;2021.186.0.0.2svn56277-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913889" version="1" comment="texlive-akshar-doc is &lt;2021.186.0.0.2svn56277-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913890" version="1" comment="texlive-albatross is &lt;2021.186.0.0.3.0svn57416-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913891" version="1" comment="texlive-albatross-doc is &lt;2021.186.0.0.3.0svn57416-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913892" version="1" comment="texlive-alegreya is &lt;2021.186.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913893" version="1" comment="texlive-alegreya-doc is &lt;2021.186.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913894" version="1" comment="texlive-alegreya-fonts is &lt;2021.186.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913895" version="1" comment="texlive-aleph is &lt;2021.186.svn57972-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913896" version="1" comment="texlive-alertmessage is &lt;2021.186.1.1svn38055-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913897" version="1" comment="texlive-alertmessage-doc is &lt;2021.186.1.1svn38055-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913898" version="1" comment="texlive-alfaslabone is &lt;2021.186.0.0.0.1svn57452-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913899" version="1" comment="texlive-alfaslabone-doc is &lt;2021.186.0.0.0.1svn57452-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913900" version="1" comment="texlive-alfaslabone-fonts is &lt;2021.186.0.0.0.1svn57452-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913901" version="1" comment="texlive-alg is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913902" version="1" comment="texlive-alg-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913903" version="1" comment="texlive-algobox is &lt;2021.186.1.3svn52204-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913904" version="1" comment="texlive-algobox-doc is &lt;2021.186.1.3svn52204-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913905" version="1" comment="texlive-algolrevived is &lt;2021.186.1.052svn56864-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913906" version="1" comment="texlive-algolrevived-doc is &lt;2021.186.1.052svn56864-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913907" version="1" comment="texlive-algolrevived-fonts is &lt;2021.186.1.052svn56864-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913908" version="1" comment="texlive-algorithm2e is &lt;2021.186.5.2svn44846-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913909" version="1" comment="texlive-algorithm2e-doc is &lt;2021.186.5.2svn44846-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913910" version="1" comment="texlive-algorithmicx is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913911" version="1" comment="texlive-algorithmicx-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913912" version="1" comment="texlive-algorithms is &lt;2021.186.0.0.1svn42428-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913913" version="1" comment="texlive-algorithms-doc is &lt;2021.186.0.0.1svn42428-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913914" version="1" comment="texlive-algpseudocodex is &lt;2021.186.1.0svn56125-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913915" version="1" comment="texlive-algpseudocodex-doc is &lt;2021.186.1.0svn56125-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913916" version="1" comment="texlive-algxpar is &lt;2021.186.0.0.91svn56006-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913917" version="1" comment="texlive-algxpar-doc is &lt;2021.186.0.0.91svn56006-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913918" version="1" comment="texlive-aligned-overset is &lt;2021.186.0.0.1.0svn47290-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913919" version="1" comment="texlive-aligned-overset-doc is &lt;2021.186.0.0.1.0svn47290-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913920" version="1" comment="texlive-alkalami is &lt;2021.186.1.000svn44497-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913921" version="1" comment="texlive-alkalami-doc is &lt;2021.186.1.000svn44497-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913922" version="1" comment="texlive-alkalami-fonts is &lt;2021.186.1.000svn44497-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913923" version="1" comment="texlive-allrunes is &lt;2021.186.2.1.1svn42221-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913924" version="1" comment="texlive-allrunes-doc is &lt;2021.186.2.1.1svn42221-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913925" version="1" comment="texlive-allrunes-fonts is &lt;2021.186.2.1.1svn42221-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913926" version="1" comment="texlive-almendra is &lt;2021.186.svn56035-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913927" version="1" comment="texlive-almendra-doc is &lt;2021.186.svn56035-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913928" version="1" comment="texlive-almendra-fonts is &lt;2021.186.svn56035-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913929" version="1" comment="texlive-almfixed is &lt;2021.186.0.0.92svn35065-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913930" version="1" comment="texlive-almfixed-doc is &lt;2021.186.0.0.92svn35065-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913931" version="1" comment="texlive-almfixed-fonts is &lt;2021.186.0.0.92svn35065-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913932" version="1" comment="texlive-alnumsec is &lt;2021.186.0.0.03svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913933" version="1" comment="texlive-alnumsec-doc is &lt;2021.186.0.0.03svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913934" version="1" comment="texlive-alpha-persian is &lt;2021.186.1.3svn50316-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913935" version="1" comment="texlive-alpha-persian-doc is &lt;2021.186.1.3svn50316-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913936" version="1" comment="texlive-alphalph is &lt;2021.186.2.6svn53087-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913937" version="1" comment="texlive-alphalph-doc is &lt;2021.186.2.6svn53087-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913938" version="1" comment="texlive-altfont is &lt;2021.186.1.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913939" version="1" comment="texlive-altfont-doc is &lt;2021.186.1.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913940" version="1" comment="texlive-ametsoc is &lt;2021.186.4.3.2svn36030-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913941" version="1" comment="texlive-ametsoc-doc is &lt;2021.186.4.3.2svn36030-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913942" version="1" comment="texlive-amiri is &lt;2021.186.0.0.113svn55403-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913943" version="1" comment="texlive-amiri-doc is &lt;2021.186.0.0.113svn55403-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913944" version="1" comment="texlive-amiri-fonts is &lt;2021.186.0.0.113svn55403-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913945" version="1" comment="texlive-amiweb2c-guide is &lt;2021.186.1.0svn56878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913946" version="1" comment="texlive-amsaddr is &lt;2021.186.1.1svn29630-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913947" version="1" comment="texlive-amsaddr-doc is &lt;2021.186.1.1svn29630-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913948" version="1" comment="texlive-amscdx is &lt;2021.186.2.2xsvn51532-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913949" version="1" comment="texlive-amscdx-doc is &lt;2021.186.2.2xsvn51532-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913950" version="1" comment="texlive-amscls is &lt;2021.186.2.20.6svn55378-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913951" version="1" comment="texlive-amscls-doc is &lt;2021.186.svn46110-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913952" version="1" comment="texlive-amsfonts is &lt;2021.186.3.04svn29208-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913953" version="1" comment="texlive-amsfonts-doc is &lt;2021.186.3.04svn29208-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913954" version="1" comment="texlive-amsfonts-fonts is &lt;2021.186.3.04svn29208-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913955" version="1" comment="texlive-amslatex-primer is &lt;2021.186.2.3svn28980-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913956" version="1" comment="texlive-amsldoc-it is &lt;2021.186.svn45662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913957" version="1" comment="texlive-amsldoc-vn is &lt;2021.186.2.0svn21855-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913958" version="1" comment="texlive-amsmath is &lt;2021.186.svn56514-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913959" version="1" comment="texlive-amsmath-doc is &lt;2021.186.svn56514-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913960" version="1" comment="texlive-amsmath-it is &lt;2021.186.svn22930-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913961" version="1" comment="texlive-amsrefs is &lt;2021.186.2.14svn30646-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913962" version="1" comment="texlive-amsrefs-doc is &lt;2021.186.2.14svn30646-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913963" version="1" comment="texlive-amstex is &lt;2021.186.svn57972-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913964" version="1" comment="texlive-amstex-doc is &lt;2021.186.svn57972-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913965" version="1" comment="texlive-amsthdoc-it is &lt;2021.186.svn45662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913966" version="1" comment="texlive-animate is &lt;2021.186.svn56583-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913967" version="1" comment="texlive-animate-doc is &lt;2021.186.svn56583-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913968" version="1" comment="texlive-annee-scolaire is &lt;2021.186.1.6svn55988-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913969" version="1" comment="texlive-annee-scolaire-doc is &lt;2021.186.1.6svn55988-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913970" version="1" comment="texlive-annotate is &lt;2021.186.svn52824-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913971" version="1" comment="texlive-anonchap is &lt;2021.186.1.1asvn17049-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913972" version="1" comment="texlive-anonchap-doc is &lt;2021.186.1.1asvn17049-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913973" version="1" comment="texlive-anonymous-acm is &lt;2021.186.1.0svn55121-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913974" version="1" comment="texlive-anonymous-acm-doc is &lt;2021.186.1.0svn55121-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913975" version="1" comment="texlive-anonymouspro is &lt;2021.186.2.2svn51631-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913976" version="1" comment="texlive-anonymouspro-doc is &lt;2021.186.2.2svn51631-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913977" version="1" comment="texlive-anonymouspro-fonts is &lt;2021.186.2.2svn51631-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913978" version="1" comment="texlive-answers is &lt;2021.186.2.16svn35032-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913979" version="1" comment="texlive-answers-doc is &lt;2021.186.2.16svn35032-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913980" version="1" comment="texlive-antanilipsum is &lt;2021.186.0.0.8.1svn55250-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913981" version="1" comment="texlive-antanilipsum-doc is &lt;2021.186.0.0.8.1svn55250-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913982" version="1" comment="texlive-antiqua is &lt;2021.186.001.003svn24266-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913983" version="1" comment="texlive-antiqua-doc is &lt;2021.186.001.003svn24266-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913984" version="1" comment="texlive-antiqua-fonts is &lt;2021.186.001.003svn24266-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913985" version="1" comment="texlive-antomega is &lt;2021.186.0.0.8svn21933-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913986" version="1" comment="texlive-antomega-doc is &lt;2021.186.0.0.8svn21933-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913987" version="1" comment="texlive-antt is &lt;2021.186.2.08svn18651-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913988" version="1" comment="texlive-antt-doc is &lt;2021.186.2.08svn18651-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913989" version="1" comment="texlive-antt-fonts is &lt;2021.186.2.08svn18651-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913990" version="1" comment="texlive-anufinalexam is &lt;2021.186.svn26053-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913991" version="1" comment="texlive-anyfontsize is &lt;2021.186.svn17050-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913992" version="1" comment="texlive-anyfontsize-doc is &lt;2021.186.svn17050-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913993" version="1" comment="texlive-anysize is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913994" version="1" comment="texlive-anysize-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913995" version="1" comment="texlive-aobs-tikz is &lt;2021.186.1.0svn32662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913996" version="1" comment="texlive-aobs-tikz-doc is &lt;2021.186.1.0svn32662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913997" version="1" comment="texlive-aomart is &lt;2021.186.1.24svn56102-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913998" version="1" comment="texlive-aomart-doc is &lt;2021.186.1.24svn56102-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009913999" version="1" comment="texlive-apa is &lt;2021.186.1.3.4svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914000" version="1" comment="texlive-apa-doc is &lt;2021.186.1.3.4svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914001" version="1" comment="texlive-apa6 is &lt;2021.186.2.34svn53406-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914002" version="1" comment="texlive-apa6-doc is &lt;2021.186.2.34svn53406-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914003" version="1" comment="texlive-apa6e is &lt;2021.186.0.0.3svn23350-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914004" version="1" comment="texlive-apa6e-doc is &lt;2021.186.0.0.3svn23350-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914005" version="1" comment="texlive-apa7 is &lt;2021.186.2.10svn58121-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914006" version="1" comment="texlive-apa7-doc is &lt;2021.186.2.10svn58121-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914007" version="1" comment="texlive-apacite is &lt;2021.186.6.03svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914008" version="1" comment="texlive-apacite-doc is &lt;2021.186.6.03svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914009" version="1" comment="texlive-apalike-german is &lt;2021.186.svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914010" version="1" comment="texlive-apalike-german-doc is &lt;2021.186.svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914011" version="1" comment="texlive-apalike2 is &lt;2021.186.svn54080-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914012" version="1" comment="texlive-apnum is &lt;2021.186.1.7svn47510-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914013" version="1" comment="texlive-apnum-doc is &lt;2021.186.1.7svn47510-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914014" version="1" comment="texlive-appendix is &lt;2021.186.1.2csvn53718-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914015" version="1" comment="texlive-appendix-doc is &lt;2021.186.1.2csvn53718-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914016" version="1" comment="texlive-appendixnumberbeamer is &lt;2021.186.1.2svn46317-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914017" version="1" comment="texlive-appendixnumberbeamer-doc is &lt;2021.186.1.2svn46317-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914018" version="1" comment="texlive-apprendre-a-programmer-en-tex is &lt;2021.186.svn57179-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914019" version="1" comment="texlive-apprends-latex is &lt;2021.186.4.02svn19306-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914020" version="1" comment="texlive-apptools is &lt;2021.186.1.0svn28400-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914021" version="1" comment="texlive-apptools-doc is &lt;2021.186.1.0svn28400-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914022" version="1" comment="texlive-apxproof is &lt;2021.186.1.2.1svn56673-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914023" version="1" comment="texlive-apxproof-doc is &lt;2021.186.1.2.1svn56673-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914024" version="1" comment="texlive-arabi is &lt;2021.186.1.1svn44662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914025" version="1" comment="texlive-arabi-add is &lt;2021.186.1.0svn37709-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914026" version="1" comment="texlive-arabi-add-doc is &lt;2021.186.1.0svn37709-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914027" version="1" comment="texlive-arabi-doc is &lt;2021.186.1.1svn44662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914028" version="1" comment="texlive-arabi-fonts is &lt;2021.186.1.1svn44662-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914029" version="1" comment="texlive-arabicfront is &lt;2021.186.1.1svn51474-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914030" version="1" comment="texlive-arabicfront-doc is &lt;2021.186.1.1svn51474-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914031" version="1" comment="texlive-arabluatex is &lt;2021.186.1.20svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914032" version="1" comment="texlive-arabluatex-doc is &lt;2021.186.1.20svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914033" version="1" comment="texlive-arabtex is &lt;2021.186.3.17svn25711-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914034" version="1" comment="texlive-arabtex-doc is &lt;2021.186.3.17svn25711-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914035" version="1" comment="texlive-arabtex-fonts is &lt;2021.186.3.17svn25711-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914036" version="1" comment="texlive-arabxetex is &lt;2021.186.1.2.1svn38299-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914037" version="1" comment="texlive-arabxetex-doc is &lt;2021.186.1.2.1svn38299-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914038" version="1" comment="texlive-aramaic-serto is &lt;2021.186.1.0svn30042-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914039" version="1" comment="texlive-aramaic-serto-doc is &lt;2021.186.1.0svn30042-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914040" version="1" comment="texlive-aramaic-serto-fonts is &lt;2021.186.1.0svn30042-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914041" version="1" comment="texlive-arara is &lt;2021.186.6.1.0svn58764-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914042" version="1" comment="texlive-arara-doc is &lt;2021.186.6.1.0svn58764-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914043" version="1" comment="texlive-archaeologie is &lt;2021.186.2.4.5svn57090-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914044" version="1" comment="texlive-archaeologie-doc is &lt;2021.186.2.4.5svn57090-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914045" version="1" comment="texlive-archaic is &lt;2021.186.svn38005-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914046" version="1" comment="texlive-archaic-doc is &lt;2021.186.svn38005-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914047" version="1" comment="texlive-archaic-fonts is &lt;2021.186.svn38005-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914048" version="1" comment="texlive-archivo is &lt;2021.186.0.0.0.2svn57283-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914049" version="1" comment="texlive-archivo-doc is &lt;2021.186.0.0.0.2svn57283-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914050" version="1" comment="texlive-archivo-fonts is &lt;2021.186.0.0.0.2svn57283-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914051" version="1" comment="texlive-arcs is &lt;2021.186.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914052" version="1" comment="texlive-arcs-doc is &lt;2021.186.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914053" version="1" comment="texlive-arev is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914054" version="1" comment="texlive-arev-doc is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914055" version="1" comment="texlive-arev-fonts is &lt;2021.186.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914056" version="1" comment="texlive-arimo is &lt;2021.186.svn42880-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914057" version="1" comment="texlive-arimo-doc is &lt;2021.186.svn42880-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914058" version="1" comment="texlive-arimo-fonts is &lt;2021.186.svn42880-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914059" version="1" comment="texlive-armtex is &lt;2021.186.3.0_beta3svn33894-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914060" version="1" comment="texlive-armtex-doc is &lt;2021.186.3.0_beta3svn33894-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914061" version="1" comment="texlive-armtex-fonts is &lt;2021.186.3.0_beta3svn33894-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914062" version="1" comment="texlive-around-the-bend is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914063" version="1" comment="texlive-arphic is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914064" version="1" comment="texlive-arphic-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914065" version="1" comment="texlive-arphic-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914066" version="1" comment="texlive-arphic-ttf is &lt;2021.186.svn42675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914067" version="1" comment="texlive-arphic-ttf-doc is &lt;2021.186.svn42675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914068" version="1" comment="texlive-arphic-ttf-fonts is &lt;2021.186.svn42675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914069" version="1" comment="texlive-arraycols is &lt;2021.186.1.1svn56997-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914070" version="1" comment="texlive-arraycols-doc is &lt;2021.186.1.1svn56997-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914071" version="1" comment="texlive-arrayjobx is &lt;2021.186.1.04svn18125-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914072" version="1" comment="texlive-arrayjobx-doc is &lt;2021.186.1.04svn18125-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914073" version="1" comment="texlive-arraysort is &lt;2021.186.1.0svn31576-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914074" version="1" comment="texlive-arraysort-doc is &lt;2021.186.1.0svn31576-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914075" version="1" comment="texlive-arsclassica is &lt;2021.186.svn45656-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914076" version="1" comment="texlive-arsclassica-doc is &lt;2021.186.svn45656-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914077" version="1" comment="texlive-articleingud is &lt;2021.186.0.0.3svn38741-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914078" version="1" comment="texlive-articleingud-doc is &lt;2021.186.0.0.3svn38741-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914079" version="1" comment="texlive-arvo is &lt;2021.186.svn57213-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914080" version="1" comment="texlive-arvo-doc is &lt;2021.186.svn57213-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914081" version="1" comment="texlive-arvo-fonts is &lt;2021.186.svn57213-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914082" version="1" comment="texlive-arydshln is &lt;2021.186.1.76svn50084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914083" version="1" comment="texlive-arydshln-doc is &lt;2021.186.1.76svn50084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914084" version="1" comment="texlive-asaetr is &lt;2021.186.1.0asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914085" version="1" comment="texlive-asaetr-doc is &lt;2021.186.1.0asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914086" version="1" comment="texlive-asapsym is &lt;2021.186.1.0svn40201-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914087" version="1" comment="texlive-asapsym-doc is &lt;2021.186.1.0svn40201-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914088" version="1" comment="texlive-asapsym-fonts is &lt;2021.186.1.0svn40201-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914089" version="1" comment="texlive-ascelike is &lt;2021.186.2.3svn29129-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914090" version="1" comment="texlive-ascelike-doc is &lt;2021.186.2.3svn29129-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914091" version="1" comment="texlive-ascii-chart is &lt;2021.186.svn20536-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914092" version="1" comment="texlive-ascii-font is &lt;2021.186.2.0svn29989-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914093" version="1" comment="texlive-ascii-font-doc is &lt;2021.186.2.0svn29989-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914094" version="1" comment="texlive-ascii-font-fonts is &lt;2021.186.2.0svn29989-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914095" version="1" comment="texlive-asciilist is &lt;2021.186.2.2bsvn49060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914096" version="1" comment="texlive-asciilist-doc is &lt;2021.186.2.2bsvn49060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914097" version="1" comment="texlive-ascmac is &lt;2021.186.2.1svn53411-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914098" version="1" comment="texlive-ascmac-doc is &lt;2021.186.2.1svn53411-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914099" version="1" comment="texlive-ascmac-fonts is &lt;2021.186.2.1svn53411-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914100" version="1" comment="texlive-askinclude is &lt;2021.186.2.7svn54725-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914101" version="1" comment="texlive-askinclude-doc is &lt;2021.186.2.7svn54725-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914102" version="1" comment="texlive-askmaps is &lt;2021.186.0.0.2svn56730-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914103" version="1" comment="texlive-askmaps-doc is &lt;2021.186.0.0.2svn56730-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914104" version="1" comment="texlive-asmeconf is &lt;2021.186.1.26svn57833-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914105" version="1" comment="texlive-asmeconf-doc is &lt;2021.186.1.26svn57833-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914106" version="1" comment="texlive-asmejour is &lt;2021.186.1.15svn57598-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914107" version="1" comment="texlive-asmejour-doc is &lt;2021.186.1.15svn57598-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914108" version="1" comment="texlive-aspectratio is &lt;2021.186.2.0svn25243-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914109" version="1" comment="texlive-aspectratio-doc is &lt;2021.186.2.0svn25243-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914110" version="1" comment="texlive-aspectratio-fonts is &lt;2021.186.2.0svn25243-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914111" version="1" comment="texlive-assignment is &lt;2021.186.svn20431-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914112" version="1" comment="texlive-assignment-doc is &lt;2021.186.svn20431-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914113" version="1" comment="texlive-assoccnt is &lt;2021.186.0.0.8svn38497-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914114" version="1" comment="texlive-assoccnt-doc is &lt;2021.186.0.0.8svn38497-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914115" version="1" comment="texlive-association-matrix is &lt;2021.186.1.0svn56759-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914116" version="1" comment="texlive-association-matrix-doc is &lt;2021.186.1.0svn56759-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914117" version="1" comment="texlive-astro is &lt;2021.186.2.20svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914118" version="1" comment="texlive-astro-doc is &lt;2021.186.2.20svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914119" version="1" comment="texlive-asyfig is &lt;2021.186.0.0.1csvn17512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914120" version="1" comment="texlive-asyfig-doc is &lt;2021.186.0.0.1csvn17512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914121" version="1" comment="texlive-asymptote is &lt;2021.186.2.70svn58569-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914122" version="1" comment="texlive-asymptote-by-example-zh-cn is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914123" version="1" comment="texlive-asymptote-doc is &lt;2021.186.2.70svn58569-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914124" version="1" comment="texlive-asymptote-faq-zh-cn is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914125" version="1" comment="texlive-asymptote-manual-zh-cn is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914126" version="1" comment="texlive-asypictureb is &lt;2021.186.0.0.3svn33490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914127" version="1" comment="texlive-asypictureb-doc is &lt;2021.186.0.0.3svn33490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914128" version="1" comment="texlive-atbegshi is &lt;2021.186.1.19svn53051-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914129" version="1" comment="texlive-atbegshi-doc is &lt;2021.186.1.19svn53051-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914130" version="1" comment="texlive-atenddvi is &lt;2021.186.1.5svn56922-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914131" version="1" comment="texlive-atenddvi-doc is &lt;2021.186.1.5svn56922-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914132" version="1" comment="texlive-atkinson is &lt;2021.186.svn57624-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914133" version="1" comment="texlive-atkinson-doc is &lt;2021.186.svn57624-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914134" version="1" comment="texlive-atkinson-fonts is &lt;2021.186.svn57624-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914135" version="1" comment="texlive-attachfile is &lt;2021.186.1.9svn42099-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914136" version="1" comment="texlive-attachfile-doc is &lt;2021.186.1.9svn42099-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914137" version="1" comment="texlive-attachfile2 is &lt;2021.186.2.11svn57959-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914138" version="1" comment="texlive-attachfile2-doc is &lt;2021.186.2.11svn57959-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914139" version="1" comment="texlive-atveryend is &lt;2021.186.1.11svn53108-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914140" version="1" comment="texlive-atveryend-doc is &lt;2021.186.1.11svn53108-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914141" version="1" comment="texlive-aucklandthesis is &lt;2021.186.svn51323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914142" version="1" comment="texlive-aucklandthesis-doc is &lt;2021.186.svn51323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914143" version="1" comment="texlive-augie is &lt;2021.186.svn18948-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914144" version="1" comment="texlive-augie-doc is &lt;2021.186.svn18948-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914145" version="1" comment="texlive-augie-fonts is &lt;2021.186.svn18948-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914146" version="1" comment="texlive-auncial-new is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914147" version="1" comment="texlive-auncial-new-doc is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914148" version="1" comment="texlive-auncial-new-fonts is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914149" version="1" comment="texlive-aurical is &lt;2021.186.1.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914150" version="1" comment="texlive-aurical-doc is &lt;2021.186.1.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914151" version="1" comment="texlive-aurical-fonts is &lt;2021.186.1.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914152" version="1" comment="texlive-aurl is &lt;2021.186.svn41853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914153" version="1" comment="texlive-aurl-doc is &lt;2021.186.svn41853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914154" version="1" comment="texlive-authoraftertitle is &lt;2021.186.1.0svn55889-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914155" version="1" comment="texlive-authoraftertitle-doc is &lt;2021.186.1.0svn55889-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914156" version="1" comment="texlive-authorarchive is &lt;2021.186.1.1.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914157" version="1" comment="texlive-authorarchive-doc is &lt;2021.186.1.1.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914158" version="1" comment="texlive-authordate is &lt;2021.186.svn52564-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914159" version="1" comment="texlive-authordate-doc is &lt;2021.186.svn52564-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914160" version="1" comment="texlive-authorindex is &lt;2021.186.svn51757-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914161" version="1" comment="texlive-authorindex-doc is &lt;2021.186.svn51757-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914162" version="1" comment="texlive-auto-pst-pdf is &lt;2021.186.0.0.7svn56596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914163" version="1" comment="texlive-auto-pst-pdf-doc is &lt;2021.186.0.0.7svn56596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914164" version="1" comment="texlive-auto-pst-pdf-lua is &lt;2021.186.0.0.03svn54779-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914165" version="1" comment="texlive-auto-pst-pdf-lua-doc is &lt;2021.186.0.0.03svn54779-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914166" version="1" comment="texlive-autoaligne is &lt;2021.186.1.5svn56966-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914167" version="1" comment="texlive-autoaligne-doc is &lt;2021.186.1.5svn56966-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914168" version="1" comment="texlive-autoarea is &lt;2021.186.0.0.3asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914169" version="1" comment="texlive-autoarea-doc is &lt;2021.186.0.0.3asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914170" version="1" comment="texlive-autobreak is &lt;2021.186.0.0.3svn43337-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914171" version="1" comment="texlive-autobreak-doc is &lt;2021.186.0.0.3svn43337-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914172" version="1" comment="texlive-autofancyhdr is &lt;2021.186.0.0.1svn54049-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914173" version="1" comment="texlive-autofancyhdr-doc is &lt;2021.186.0.0.1svn54049-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914174" version="1" comment="texlive-automata is &lt;2021.186.0.0.3svn19717-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914175" version="1" comment="texlive-automata-doc is &lt;2021.186.0.0.3svn19717-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914176" version="1" comment="texlive-autonum is &lt;2021.186.0.0.3.11svn36084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914177" version="1" comment="texlive-autonum-doc is &lt;2021.186.0.0.3.11svn36084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914178" version="1" comment="texlive-autopdf is &lt;2021.186.1.1svn32377-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914179" version="1" comment="texlive-autopdf-doc is &lt;2021.186.1.1svn32377-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914180" version="1" comment="texlive-autosp is &lt;2021.186.svn58211-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914181" version="1" comment="texlive-auxhook is &lt;2021.186.1.6svn53173-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914182" version="1" comment="texlive-auxhook-doc is &lt;2021.186.1.6svn53173-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914183" version="1" comment="texlive-avantgar is &lt;2021.186.svn31835-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914184" version="1" comment="texlive-avantgar-fonts is &lt;2021.186.svn31835-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914185" version="1" comment="texlive-avremu is &lt;2021.186.0.0.1svn35373-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914186" version="1" comment="texlive-avremu-doc is &lt;2021.186.0.0.1svn35373-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914187" version="1" comment="texlive-awesomebox is &lt;2021.186.0.0.6svn57349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914188" version="1" comment="texlive-awesomebox-doc is &lt;2021.186.0.0.6svn57349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914189" version="1" comment="texlive-axessibility is &lt;2021.186.3.0svn57105-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914190" version="1" comment="texlive-axessibility-doc is &lt;2021.186.3.0svn57105-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914191" version="1" comment="texlive-axodraw2 is &lt;2021.186.2.1.1csvn58155-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914192" version="1" comment="texlive-axodraw2-doc is &lt;2021.186.2.1.1csvn58155-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914193" version="1" comment="texlive-b1encoding is &lt;2021.186.1.0svn21271-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914194" version="1" comment="texlive-b1encoding-doc is &lt;2021.186.1.0svn21271-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914195" version="1" comment="texlive-babel is &lt;2021.186.3.56svn58684-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914196" version="1" comment="texlive-babel-albanian is &lt;2021.186.1.0dsvn57005-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914197" version="1" comment="texlive-babel-albanian-doc is &lt;2021.186.1.0dsvn57005-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914198" version="1" comment="texlive-babel-azerbaijani is &lt;2021.186.1.0asvn44197-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914199" version="1" comment="texlive-babel-azerbaijani-doc is &lt;2021.186.1.0asvn44197-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914200" version="1" comment="texlive-babel-basque is &lt;2021.186.1.0fsvn30256-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914201" version="1" comment="texlive-babel-basque-doc is &lt;2021.186.1.0fsvn30256-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914202" version="1" comment="texlive-babel-belarusian is &lt;2021.186.1.5svn49022-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914203" version="1" comment="texlive-babel-belarusian-doc is &lt;2021.186.1.5svn49022-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914204" version="1" comment="texlive-babel-bosnian is &lt;2021.186.1.1svn38174-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914205" version="1" comment="texlive-babel-bosnian-doc is &lt;2021.186.1.1svn38174-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914206" version="1" comment="texlive-babel-breton is &lt;2021.186.1.0hsvn30257-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914207" version="1" comment="texlive-babel-breton-doc is &lt;2021.186.1.0hsvn30257-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914208" version="1" comment="texlive-babel-bulgarian is &lt;2021.186.1.2gsvn31902-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914209" version="1" comment="texlive-babel-bulgarian-doc is &lt;2021.186.1.2gsvn31902-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914210" version="1" comment="texlive-babel-catalan is &lt;2021.186.2.2psvn30259-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914211" version="1" comment="texlive-babel-catalan-doc is &lt;2021.186.2.2psvn30259-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914212" version="1" comment="texlive-babel-croatian is &lt;2021.186.1.3lsvn35198-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914213" version="1" comment="texlive-babel-croatian-doc is &lt;2021.186.1.3lsvn35198-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914214" version="1" comment="texlive-babel-czech is &lt;2021.186.3.1asvn30261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914215" version="1" comment="texlive-babel-czech-doc is &lt;2021.186.3.1asvn30261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914216" version="1" comment="texlive-babel-danish is &lt;2021.186.1.3ssvn57642-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914217" version="1" comment="texlive-babel-danish-doc is &lt;2021.186.1.3ssvn57642-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914218" version="1" comment="texlive-babel-doc is &lt;2021.186.3.56svn58684-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914219" version="1" comment="texlive-babel-dutch is &lt;2021.186.3.8jsvn56827-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914220" version="1" comment="texlive-babel-dutch-doc is &lt;2021.186.3.8jsvn56827-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914221" version="1" comment="texlive-babel-english is &lt;2021.186.3.3rsvn44495-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914222" version="1" comment="texlive-babel-english-doc is &lt;2021.186.3.3rsvn44495-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914223" version="1" comment="texlive-babel-esperanto is &lt;2021.186.1.4tsvn30265-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914224" version="1" comment="texlive-babel-esperanto-doc is &lt;2021.186.1.4tsvn30265-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914225" version="1" comment="texlive-babel-estonian is &lt;2021.186.1.1asvn38064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914226" version="1" comment="texlive-babel-estonian-doc is &lt;2021.186.1.1asvn38064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914227" version="1" comment="texlive-babel-finnish is &lt;2021.186.1.3ssvn57643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914228" version="1" comment="texlive-babel-finnish-doc is &lt;2021.186.1.3ssvn57643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914229" version="1" comment="texlive-babel-french is &lt;2021.186.3.5lsvn56607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914230" version="1" comment="texlive-babel-french-doc is &lt;2021.186.3.5lsvn56607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914231" version="1" comment="texlive-babel-friulan is &lt;2021.186.1.3svn39861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914232" version="1" comment="texlive-babel-friulan-doc is &lt;2021.186.1.3svn39861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914233" version="1" comment="texlive-babel-galician is &lt;2021.186.4.3csvn30270-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914234" version="1" comment="texlive-babel-galician-doc is &lt;2021.186.4.3csvn30270-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914235" version="1" comment="texlive-babel-georgian is &lt;2021.186.2.2svn45864-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914236" version="1" comment="texlive-babel-georgian-doc is &lt;2021.186.2.2svn45864-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914237" version="1" comment="texlive-babel-german is &lt;2021.186.2.13svn57978-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914238" version="1" comment="texlive-babel-german-doc is &lt;2021.186.2.13svn57978-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914239" version="1" comment="texlive-babel-greek is &lt;2021.186.1.10svn56904-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914240" version="1" comment="texlive-babel-greek-doc is &lt;2021.186.1.10svn56904-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914241" version="1" comment="texlive-babel-hebrew is &lt;2021.186.2.3hsvn30273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914242" version="1" comment="texlive-babel-hebrew-doc is &lt;2021.186.2.3hsvn30273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914243" version="1" comment="texlive-babel-hungarian is &lt;2021.186.1.5csvn49701-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914244" version="1" comment="texlive-babel-hungarian-doc is &lt;2021.186.1.5csvn49701-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914245" version="1" comment="texlive-babel-icelandic is &lt;2021.186.1.3svn51551-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914246" version="1" comment="texlive-babel-icelandic-doc is &lt;2021.186.1.3svn51551-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914247" version="1" comment="texlive-babel-indonesian is &lt;2021.186.1.0msvn43235-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914248" version="1" comment="texlive-babel-indonesian-doc is &lt;2021.186.1.0msvn43235-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914249" version="1" comment="texlive-babel-interlingua is &lt;2021.186.1.6svn30276-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914250" version="1" comment="texlive-babel-interlingua-doc is &lt;2021.186.1.6svn30276-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914251" version="1" comment="texlive-babel-irish is &lt;2021.186.1.0hsvn30277-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914252" version="1" comment="texlive-babel-irish-doc is &lt;2021.186.1.0hsvn30277-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914253" version="1" comment="texlive-babel-italian is &lt;2021.186.1.4.04svn55232-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914254" version="1" comment="texlive-babel-italian-doc is &lt;2021.186.1.4.04svn55232-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914255" version="1" comment="texlive-babel-japanese is &lt;2021.186.svn57733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914256" version="1" comment="texlive-babel-japanese-doc is &lt;2021.186.svn57733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914257" version="1" comment="texlive-babel-kurmanji is &lt;2021.186.1.1svn30279-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914258" version="1" comment="texlive-babel-kurmanji-doc is &lt;2021.186.1.1svn30279-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914259" version="1" comment="texlive-babel-latin is &lt;2021.186.3.5svn38173-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914260" version="1" comment="texlive-babel-latin-doc is &lt;2021.186.3.5svn38173-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914261" version="1" comment="texlive-babel-latvian is &lt;2021.186.2.0bsvn46681-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914262" version="1" comment="texlive-babel-latvian-doc is &lt;2021.186.2.0bsvn46681-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914263" version="1" comment="texlive-babel-macedonian is &lt;2021.186.svn39587-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914264" version="1" comment="texlive-babel-macedonian-doc is &lt;2021.186.svn39587-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914265" version="1" comment="texlive-babel-malay is &lt;2021.186.1.0msvn43234-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914266" version="1" comment="texlive-babel-malay-doc is &lt;2021.186.1.0msvn43234-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914267" version="1" comment="texlive-babel-norsk is &lt;2021.186.2.0isvn30281-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914268" version="1" comment="texlive-babel-norsk-doc is &lt;2021.186.2.0isvn30281-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914269" version="1" comment="texlive-babel-occitan is &lt;2021.186.0.0.2svn39608-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914270" version="1" comment="texlive-babel-occitan-doc is &lt;2021.186.0.0.2svn39608-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914271" version="1" comment="texlive-babel-piedmontese is &lt;2021.186.1.0svn30282-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914272" version="1" comment="texlive-babel-piedmontese-doc is &lt;2021.186.1.0svn30282-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914273" version="1" comment="texlive-babel-polish is &lt;2021.186.1.2lsvn30283-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914274" version="1" comment="texlive-babel-polish-doc is &lt;2021.186.1.2lsvn30283-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914275" version="1" comment="texlive-babel-portuges is &lt;2021.186.1.2ssvn57644-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914276" version="1" comment="texlive-babel-portuges-doc is &lt;2021.186.1.2ssvn57644-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914277" version="1" comment="texlive-babel-romanian is &lt;2021.186.1.2lsvn30285-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914278" version="1" comment="texlive-babel-romanian-doc is &lt;2021.186.1.2lsvn30285-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914279" version="1" comment="texlive-babel-romansh is &lt;2021.186.svn30286-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914280" version="1" comment="texlive-babel-romansh-doc is &lt;2021.186.svn30286-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914281" version="1" comment="texlive-babel-russian is &lt;2021.186.1.3msvn57376-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914282" version="1" comment="texlive-babel-russian-doc is &lt;2021.186.1.3msvn57376-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914283" version="1" comment="texlive-babel-samin is &lt;2021.186.1.0csvn30288-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914284" version="1" comment="texlive-babel-samin-doc is &lt;2021.186.1.0csvn30288-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914285" version="1" comment="texlive-babel-scottish is &lt;2021.186.1.0gsvn30289-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914286" version="1" comment="texlive-babel-scottish-doc is &lt;2021.186.1.0gsvn30289-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914287" version="1" comment="texlive-babel-serbian is &lt;2021.186.2.0asvn53140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914288" version="1" comment="texlive-babel-serbian-doc is &lt;2021.186.2.0asvn53140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914289" version="1" comment="texlive-babel-serbianc is &lt;2021.186.3.0asvn53139-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914290" version="1" comment="texlive-babel-serbianc-doc is &lt;2021.186.3.0asvn53139-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914291" version="1" comment="texlive-babel-slovak is &lt;2021.186.3.1asvn30292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914292" version="1" comment="texlive-babel-slovak-doc is &lt;2021.186.3.1asvn30292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914293" version="1" comment="texlive-babel-slovenian is &lt;2021.186.1.2nsvn57666-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914294" version="1" comment="texlive-babel-slovenian-doc is &lt;2021.186.1.2nsvn57666-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914295" version="1" comment="texlive-babel-sorbian is &lt;2021.186.1.0isvn57646-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914296" version="1" comment="texlive-babel-sorbian-doc is &lt;2021.186.1.0isvn57646-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914297" version="1" comment="texlive-babel-spanish is &lt;2021.186.5.0psvn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914298" version="1" comment="texlive-babel-spanish-doc is &lt;2021.186.5.0psvn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914299" version="1" comment="texlive-babel-swedish is &lt;2021.186.2.3esvn57647-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914300" version="1" comment="texlive-babel-swedish-doc is &lt;2021.186.2.3esvn57647-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914301" version="1" comment="texlive-babel-thai is &lt;2021.186.1.0.0svn30564-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914302" version="1" comment="texlive-babel-thai-doc is &lt;2021.186.1.0.0svn30564-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914303" version="1" comment="texlive-babel-turkish is &lt;2021.186.1.4svn51560-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914304" version="1" comment="texlive-babel-turkish-doc is &lt;2021.186.1.4svn51560-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914305" version="1" comment="texlive-babel-ukrainian is &lt;2021.186.1.4esvn56674-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914306" version="1" comment="texlive-babel-ukrainian-doc is &lt;2021.186.1.4esvn56674-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914307" version="1" comment="texlive-babel-vietnamese is &lt;2021.186.1.4svn39246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914308" version="1" comment="texlive-babel-vietnamese-doc is &lt;2021.186.1.4svn39246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914309" version="1" comment="texlive-babel-welsh is &lt;2021.186.1.1asvn38372-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914310" version="1" comment="texlive-babel-welsh-doc is &lt;2021.186.1.1asvn38372-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914311" version="1" comment="texlive-babelbib is &lt;2021.186.1.34svn57349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914312" version="1" comment="texlive-babelbib-doc is &lt;2021.186.1.34svn57349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914313" version="1" comment="texlive-background is &lt;2021.186.2.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914314" version="1" comment="texlive-background-doc is &lt;2021.186.2.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914315" version="1" comment="texlive-backnaur is &lt;2021.186.3.1svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914316" version="1" comment="texlive-backnaur-doc is &lt;2021.186.3.1svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914317" version="1" comment="texlive-baekmuk is &lt;2021.186.2.2.1svn56915-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914318" version="1" comment="texlive-baekmuk-doc is &lt;2021.186.2.2.1svn56915-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914319" version="1" comment="texlive-baekmuk-fonts is &lt;2021.186.2.2.1svn56915-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914320" version="1" comment="texlive-bagpipe is &lt;2021.186.3.02svn34393-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914321" version="1" comment="texlive-bagpipe-doc is &lt;2021.186.3.02svn34393-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914322" version="1" comment="texlive-bangorcsthesis is &lt;2021.186.1.5.3svn48834-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914323" version="1" comment="texlive-bangorcsthesis-doc is &lt;2021.186.1.5.3svn48834-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914324" version="1" comment="texlive-bangorexam is &lt;2021.186.1.4.0svn46626-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914325" version="1" comment="texlive-bangorexam-doc is &lt;2021.186.1.4.0svn46626-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914326" version="1" comment="texlive-bangtex is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914327" version="1" comment="texlive-bangtex-doc is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914328" version="1" comment="texlive-bankstatement is &lt;2021.186.0.0.9.2svn38857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914329" version="1" comment="texlive-bankstatement-doc is &lt;2021.186.0.0.9.2svn38857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914330" version="1" comment="texlive-barcodes is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914331" version="1" comment="texlive-barcodes-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914332" version="1" comment="texlive-bardiag is &lt;2021.186.0.0.4asvn22013-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914333" version="1" comment="texlive-bardiag-doc is &lt;2021.186.0.0.4asvn22013-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914334" version="1" comment="texlive-barr is &lt;2021.186.svn38479-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914335" version="1" comment="texlive-barr-doc is &lt;2021.186.svn38479-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914336" version="1" comment="texlive-barracuda is &lt;2021.186.0.0.0.10svn53683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914337" version="1" comment="texlive-barracuda-doc is &lt;2021.186.0.0.0.10svn53683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914338" version="1" comment="texlive-bartel-chess-fonts is &lt;2021.186.svn20619-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914339" version="1" comment="texlive-bartel-chess-fonts-doc is &lt;2021.186.svn20619-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914340" version="1" comment="texlive-bashful is &lt;2021.186.0.0.93svn25597-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914341" version="1" comment="texlive-bashful-doc is &lt;2021.186.0.0.93svn25597-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914342" version="1" comment="texlive-basicarith is &lt;2021.186.1.1svn35460-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914343" version="1" comment="texlive-basicarith-doc is &lt;2021.186.1.1svn35460-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914344" version="1" comment="texlive-baskervald is &lt;2021.186.1.016svn19490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914345" version="1" comment="texlive-baskervald-doc is &lt;2021.186.1.016svn19490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914346" version="1" comment="texlive-baskervald-fonts is &lt;2021.186.1.016svn19490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914347" version="1" comment="texlive-baskervaldx is &lt;2021.186.1.076svn57080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914348" version="1" comment="texlive-baskervaldx-doc is &lt;2021.186.1.076svn57080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914349" version="1" comment="texlive-baskervaldx-fonts is &lt;2021.186.1.076svn57080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914350" version="1" comment="texlive-baskervillef is &lt;2021.186.1.051svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914351" version="1" comment="texlive-baskervillef-doc is &lt;2021.186.1.051svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914352" version="1" comment="texlive-baskervillef-fonts is &lt;2021.186.1.051svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914353" version="1" comment="texlive-basque-book is &lt;2021.186.1.20svn32924-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914354" version="1" comment="texlive-basque-book-doc is &lt;2021.186.1.20svn32924-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914355" version="1" comment="texlive-basque-date is &lt;2021.186.1.05svn26477-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914356" version="1" comment="texlive-basque-date-doc is &lt;2021.186.1.05svn26477-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914357" version="1" comment="texlive-bath-bst is &lt;2021.186.4.0svn57925-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914358" version="1" comment="texlive-bath-bst-doc is &lt;2021.186.4.0svn57925-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914359" version="1" comment="texlive-bbcard is &lt;2021.186.svn19440-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914360" version="1" comment="texlive-bbcard-doc is &lt;2021.186.svn19440-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914361" version="1" comment="texlive-bbding is &lt;2021.186.1.01svn17186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914362" version="1" comment="texlive-bbding-doc is &lt;2021.186.1.01svn17186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914363" version="1" comment="texlive-bbm is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914364" version="1" comment="texlive-bbm-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914365" version="1" comment="texlive-bbm-macros is &lt;2021.186.svn17224-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914366" version="1" comment="texlive-bbm-macros-doc is &lt;2021.186.svn17224-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914367" version="1" comment="texlive-bbold is &lt;2021.186.1.01svn17187-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914368" version="1" comment="texlive-bbold-doc is &lt;2021.186.1.01svn17187-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914369" version="1" comment="texlive-bbold-type1 is &lt;2021.186.svn33143-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914370" version="1" comment="texlive-bbold-type1-doc is &lt;2021.186.svn33143-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914371" version="1" comment="texlive-bbold-type1-fonts is &lt;2021.186.svn33143-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914372" version="1" comment="texlive-bchart is &lt;2021.186.0.0.1.3svn43928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914373" version="1" comment="texlive-bchart-doc is &lt;2021.186.0.0.1.3svn43928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914374" version="1" comment="texlive-bclogo is &lt;2021.186.3.1svn39364-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914375" version="1" comment="texlive-bclogo-doc is &lt;2021.186.3.1svn39364-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914376" version="1" comment="texlive-beamer is &lt;2021.186.3.62svn58537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914377" version="1" comment="texlive-beamer-FUBerlin is &lt;2021.186.0.0.02bsvn38159-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914378" version="1" comment="texlive-beamer-doc is &lt;2021.186.3.62svn58537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914379" version="1" comment="texlive-beamer-rl is &lt;2021.186.1.4bsvn58513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914380" version="1" comment="texlive-beamer-rl-doc is &lt;2021.186.1.4bsvn58513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914381" version="1" comment="texlive-beamer-tut-pt is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914382" version="1" comment="texlive-beamer-verona is &lt;2021.186.0.0.2svn39180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914383" version="1" comment="texlive-beamer-verona-doc is &lt;2021.186.0.0.2svn39180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914384" version="1" comment="texlive-beamer2thesis is &lt;2021.186.2.2svn27539-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914385" version="1" comment="texlive-beamer2thesis-doc is &lt;2021.186.2.2svn27539-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914386" version="1" comment="texlive-beamerappendixnote is &lt;2021.186.1.2.0svn55732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914387" version="1" comment="texlive-beamerappendixnote-doc is &lt;2021.186.1.2.0svn55732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914388" version="1" comment="texlive-beameraudience is &lt;2021.186.0.0.1svn23427-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914389" version="1" comment="texlive-beameraudience-doc is &lt;2021.186.0.0.1svn23427-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914390" version="1" comment="texlive-beamerauxtheme is &lt;2021.186.1.02asvn56087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914391" version="1" comment="texlive-beamerauxtheme-doc is &lt;2021.186.1.02asvn56087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914392" version="1" comment="texlive-beamercolorthemeowl is &lt;2021.186.0.0.1.1svn40105-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914393" version="1" comment="texlive-beamercolorthemeowl-doc is &lt;2021.186.0.0.1.1svn40105-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914394" version="1" comment="texlive-beamerdarkthemes is &lt;2021.186.0.0.5.1svn55117-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914395" version="1" comment="texlive-beamerdarkthemes-doc is &lt;2021.186.0.0.5.1svn55117-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914396" version="1" comment="texlive-beamerposter is &lt;2021.186.1.13svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914397" version="1" comment="texlive-beamerposter-doc is &lt;2021.186.1.13svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914398" version="1" comment="texlive-beamersubframe is &lt;2021.186.0.0.2svn23510-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914399" version="1" comment="texlive-beamersubframe-doc is &lt;2021.186.0.0.2svn23510-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914400" version="1" comment="texlive-beamerswitch is &lt;2021.186.1.7svn55441-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914401" version="1" comment="texlive-beamerswitch-doc is &lt;2021.186.1.7svn55441-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914402" version="1" comment="texlive-beamertheme-cuerna is &lt;2021.186.svn42161-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914403" version="1" comment="texlive-beamertheme-cuerna-doc is &lt;2021.186.svn42161-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914404" version="1" comment="texlive-beamertheme-detlevcm is &lt;2021.186.1.02svn39048-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914405" version="1" comment="texlive-beamertheme-detlevcm-doc is &lt;2021.186.1.02svn39048-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914406" version="1" comment="texlive-beamertheme-epyt is &lt;2021.186.1.0svn41404-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914407" version="1" comment="texlive-beamertheme-epyt-doc is &lt;2021.186.1.0svn41404-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914408" version="1" comment="texlive-beamertheme-focus is &lt;2021.186.2.8.1svn56967-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914409" version="1" comment="texlive-beamertheme-focus-doc is &lt;2021.186.2.8.1svn56967-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914410" version="1" comment="texlive-beamertheme-light is &lt;2021.186.1.0svn49867-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914411" version="1" comment="texlive-beamertheme-light-doc is &lt;2021.186.1.0svn49867-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914412" version="1" comment="texlive-beamertheme-metropolis is &lt;2021.186.1.2svn43031-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914413" version="1" comment="texlive-beamertheme-metropolis-doc is &lt;2021.186.1.2svn43031-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914414" version="1" comment="texlive-beamertheme-npbt is &lt;2021.186.4.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914415" version="1" comment="texlive-beamertheme-npbt-doc is &lt;2021.186.4.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914416" version="1" comment="texlive-beamertheme-phnompenh is &lt;2021.186.1.0svn39100-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914417" version="1" comment="texlive-beamertheme-phnompenh-doc is &lt;2021.186.1.0svn39100-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914418" version="1" comment="texlive-beamertheme-pure-minimalistic is &lt;2021.186.2.0.0svn56934-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914419" version="1" comment="texlive-beamertheme-pure-minimalistic-doc is &lt;2021.186.2.0.0svn56934-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914420" version="1" comment="texlive-beamertheme-saintpetersburg is &lt;2021.186.svn45877-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914421" version="1" comment="texlive-beamertheme-saintpetersburg-doc is &lt;2021.186.svn45877-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914422" version="1" comment="texlive-beamertheme-upenn-bc is &lt;2021.186.1.0svn29937-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914423" version="1" comment="texlive-beamertheme-upenn-bc-doc is &lt;2021.186.1.0svn29937-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914424" version="1" comment="texlive-beamerthemejltree is &lt;2021.186.1.1svn21977-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914425" version="1" comment="texlive-beamerthemenirma is &lt;2021.186.0.0.1svn20765-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914426" version="1" comment="texlive-beamerthemenirma-doc is &lt;2021.186.0.0.1svn20765-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914427" version="1" comment="texlive-beamerthemenord is &lt;2021.186.0.0.2.0svn56180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914428" version="1" comment="texlive-beamerthemenord-doc is &lt;2021.186.0.0.2.0svn56180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914429" version="1" comment="texlive-bearwear is &lt;2021.186.0.0.2svn54826-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914430" version="1" comment="texlive-bearwear-doc is &lt;2021.186.0.0.2svn54826-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914431" version="1" comment="texlive-beaulivre is &lt;2021.186.svn58503-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914432" version="1" comment="texlive-beaulivre-doc is &lt;2021.186.svn58503-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914433" version="1" comment="texlive-beebe is &lt;2021.186.svn58697-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914434" version="1" comment="texlive-begingreek is &lt;2021.186.1.5svn36294-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914435" version="1" comment="texlive-begingreek-doc is &lt;2021.186.1.5svn36294-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914436" version="1" comment="texlive-begriff is &lt;2021.186.1.6svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914437" version="1" comment="texlive-begriff-doc is &lt;2021.186.1.6svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914438" version="1" comment="texlive-beilstein is &lt;2021.186.2.1svn56193-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914439" version="1" comment="texlive-beilstein-doc is &lt;2021.186.2.1svn56193-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914440" version="1" comment="texlive-belleek is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914441" version="1" comment="texlive-belleek-doc is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914442" version="1" comment="texlive-belleek-fonts is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914443" version="1" comment="texlive-bengali is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914444" version="1" comment="texlive-bengali-doc is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914445" version="1" comment="texlive-bera is &lt;2021.186.svn20031-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914446" version="1" comment="texlive-bera-doc is &lt;2021.186.svn20031-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914447" version="1" comment="texlive-bera-fonts is &lt;2021.186.svn20031-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914448" version="1" comment="texlive-berenisadf is &lt;2021.186.1.004svn32215-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914449" version="1" comment="texlive-berenisadf-doc is &lt;2021.186.1.004svn32215-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914450" version="1" comment="texlive-berenisadf-fonts is &lt;2021.186.1.004svn32215-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914451" version="1" comment="texlive-besjournals is &lt;2021.186.svn45662-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914452" version="1" comment="texlive-besjournals-doc is &lt;2021.186.svn45662-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914453" version="1" comment="texlive-bestpapers is &lt;2021.186.1.0svn38708-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914454" version="1" comment="texlive-bestpapers-doc is &lt;2021.186.1.0svn38708-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914455" version="1" comment="texlive-betababel is &lt;2021.186.0.0.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914456" version="1" comment="texlive-betababel-doc is &lt;2021.186.0.0.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914457" version="1" comment="texlive-beton is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914458" version="1" comment="texlive-beton-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914459" version="1" comment="texlive-beuron is &lt;2021.186.1.3svn46374-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914460" version="1" comment="texlive-beuron-doc is &lt;2021.186.1.3svn46374-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914461" version="1" comment="texlive-beuron-fonts is &lt;2021.186.1.3svn46374-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914462" version="1" comment="texlive-bewerbung is &lt;2021.186.1.2svn56998-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914463" version="1" comment="texlive-bewerbung-doc is &lt;2021.186.1.2svn56998-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914464" version="1" comment="texlive-bez123 is &lt;2021.186.1.1bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914465" version="1" comment="texlive-bez123-doc is &lt;2021.186.1.1bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914466" version="1" comment="texlive-bezierplot is &lt;2021.186.1.4svn51398-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914467" version="1" comment="texlive-bezierplot-doc is &lt;2021.186.1.4svn51398-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914468" version="1" comment="texlive-bgteubner is &lt;2021.186.2.11svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914469" version="1" comment="texlive-bgteubner-doc is &lt;2021.186.2.11svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914470" version="1" comment="texlive-bguq is &lt;2021.186.0.0.4svn27401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914471" version="1" comment="texlive-bguq-doc is &lt;2021.186.0.0.4svn27401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914472" version="1" comment="texlive-bguq-fonts is &lt;2021.186.0.0.4svn27401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914473" version="1" comment="texlive-bhcexam is &lt;2021.186.0.0.4svn39041-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914474" version="1" comment="texlive-bhcexam-doc is &lt;2021.186.0.0.4svn39041-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914475" version="1" comment="texlive-bib-fr is &lt;2021.186.1.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914476" version="1" comment="texlive-bib-fr-doc is &lt;2021.186.1.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914477" version="1" comment="texlive-bib2gls is &lt;2021.186.2.7svn55811-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914478" version="1" comment="texlive-bib2gls-doc is &lt;2021.186.2.7svn55811-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914479" version="1" comment="texlive-bibarts is &lt;2021.186.2.2svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914480" version="1" comment="texlive-bibarts-doc is &lt;2021.186.2.2svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914481" version="1" comment="texlive-biber is &lt;2021.186.2.16svn57273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914482" version="1" comment="texlive-bibexport is &lt;2021.186.3.03svn50677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914483" version="1" comment="texlive-bibexport-doc is &lt;2021.186.3.03svn50677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914484" version="1" comment="texlive-bibhtml is &lt;2021.186.2.0.2svn31607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914485" version="1" comment="texlive-bibhtml-doc is &lt;2021.186.2.0.2svn31607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914486" version="1" comment="texlive-biblatex is &lt;2021.186.3.16svn57272-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914487" version="1" comment="texlive-biblatex-abnt is &lt;2021.186.3.4svn49179-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914488" version="1" comment="texlive-biblatex-abnt-doc is &lt;2021.186.3.4svn49179-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914489" version="1" comment="texlive-biblatex-ajc2020unofficial is &lt;2021.186.0.0.2.0svn54401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914490" version="1" comment="texlive-biblatex-ajc2020unofficial-doc is &lt;2021.186.0.0.2.0svn54401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914491" version="1" comment="texlive-biblatex-anonymous is &lt;2021.186.2.6.2svn48548-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914492" version="1" comment="texlive-biblatex-anonymous-doc is &lt;2021.186.2.6.2svn48548-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914493" version="1" comment="texlive-biblatex-apa is &lt;2021.186.9.14svn56208-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914494" version="1" comment="texlive-biblatex-apa-doc is &lt;2021.186.9.14svn56208-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914495" version="1" comment="texlive-biblatex-apa6 is &lt;2021.186.8.5svn56209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914496" version="1" comment="texlive-biblatex-apa6-doc is &lt;2021.186.8.5svn56209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914497" version="1" comment="texlive-biblatex-archaeology is &lt;2021.186.2.2svn53281-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914498" version="1" comment="texlive-biblatex-archaeology-doc is &lt;2021.186.2.2svn53281-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914499" version="1" comment="texlive-biblatex-arthistory-bonn is &lt;2021.186.1.2svn46637-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914500" version="1" comment="texlive-biblatex-arthistory-bonn-doc is &lt;2021.186.1.2svn46637-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914501" version="1" comment="texlive-biblatex-bath is &lt;2021.186.4.0svn57924-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914502" version="1" comment="texlive-biblatex-bath-doc is &lt;2021.186.4.0svn57924-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914503" version="1" comment="texlive-biblatex-bookinarticle is &lt;2021.186.1.3.1asvn40323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914504" version="1" comment="texlive-biblatex-bookinarticle-doc is &lt;2021.186.1.3.1asvn40323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914505" version="1" comment="texlive-biblatex-bookinother is &lt;2021.186.2.3.3svn54015-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914506" version="1" comment="texlive-biblatex-bookinother-doc is &lt;2021.186.2.3.3svn54015-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914507" version="1" comment="texlive-biblatex-bwl is &lt;2021.186.0.0.02svn26556-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914508" version="1" comment="texlive-biblatex-bwl-doc is &lt;2021.186.0.0.02svn26556-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914509" version="1" comment="texlive-biblatex-caspervector is &lt;2021.186.0.0.3.5svn56837-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914510" version="1" comment="texlive-biblatex-caspervector-doc is &lt;2021.186.0.0.3.5svn56837-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914511" version="1" comment="texlive-biblatex-cheatsheet is &lt;2021.186.svn44685-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914512" version="1" comment="texlive-biblatex-chem is &lt;2021.186.1.1zsvn57904-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914513" version="1" comment="texlive-biblatex-chem-doc is &lt;2021.186.1.1zsvn57904-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914514" version="1" comment="texlive-biblatex-chicago is &lt;2021.186.2.1svn58715-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914515" version="1" comment="texlive-biblatex-chicago-doc is &lt;2021.186.2.1svn58715-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914516" version="1" comment="texlive-biblatex-claves is &lt;2021.186.1.2.1svn43723-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914517" version="1" comment="texlive-biblatex-claves-doc is &lt;2021.186.1.2.1svn43723-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914518" version="1" comment="texlive-biblatex-doc is &lt;2021.186.3.16svn57272-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914519" version="1" comment="texlive-biblatex-dw is &lt;2021.186.1.7svn42649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914520" version="1" comment="texlive-biblatex-dw-doc is &lt;2021.186.1.7svn42649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914521" version="1" comment="texlive-biblatex-enc is &lt;2021.186.1.0svn44627-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914522" version="1" comment="texlive-biblatex-enc-doc is &lt;2021.186.1.0svn44627-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914523" version="1" comment="texlive-biblatex-ext is &lt;2021.186.0.0.12svn57979-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914524" version="1" comment="texlive-biblatex-ext-doc is &lt;2021.186.0.0.12svn57979-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914525" version="1" comment="texlive-biblatex-fiwi is &lt;2021.186.1.7svn45876-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914526" version="1" comment="texlive-biblatex-fiwi-doc is &lt;2021.186.1.7svn45876-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914527" version="1" comment="texlive-biblatex-gb7714-2015 is &lt;2021.186.1.0xsvn58753-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914528" version="1" comment="texlive-biblatex-gb7714-2015-doc is &lt;2021.186.1.0xsvn58753-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914529" version="1" comment="texlive-biblatex-german-legal is &lt;2021.186.002svn56939-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914530" version="1" comment="texlive-biblatex-german-legal-doc is &lt;2021.186.002svn56939-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914531" version="1" comment="texlive-biblatex-gost is &lt;2021.186.1.21svn56790-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914532" version="1" comment="texlive-biblatex-gost-doc is &lt;2021.186.1.21svn56790-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914533" version="1" comment="texlive-biblatex-historian is &lt;2021.186.0.0.4svn19787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914534" version="1" comment="texlive-biblatex-historian-doc is &lt;2021.186.0.0.4svn19787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914535" version="1" comment="texlive-biblatex-ieee is &lt;2021.186.1.3esvn58716-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914536" version="1" comment="texlive-biblatex-ieee-doc is &lt;2021.186.1.3esvn58716-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914537" version="1" comment="texlive-biblatex-ijsra is &lt;2021.186.0.0.1svn41634-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914538" version="1" comment="texlive-biblatex-ijsra-doc is &lt;2021.186.0.0.1svn41634-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914539" version="1" comment="texlive-biblatex-iso690 is &lt;2021.186.0.0.4svn54561-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914540" version="1" comment="texlive-biblatex-iso690-doc is &lt;2021.186.0.0.4svn54561-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914541" version="1" comment="texlive-biblatex-jura2 is &lt;2021.186.0.0.4svn56133-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914542" version="1" comment="texlive-biblatex-jura2-doc is &lt;2021.186.0.0.4svn56133-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914543" version="1" comment="texlive-biblatex-juradiss is &lt;2021.186.0.0.23svn56502-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914544" version="1" comment="texlive-biblatex-juradiss-doc is &lt;2021.186.0.0.23svn56502-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914545" version="1" comment="texlive-biblatex-license is &lt;2021.186.0.0.1svn58437-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914546" version="1" comment="texlive-biblatex-license-doc is &lt;2021.186.0.0.1svn58437-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914547" version="1" comment="texlive-biblatex-lni is &lt;2021.186.0.0.5svn49935-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914548" version="1" comment="texlive-biblatex-lni-doc is &lt;2021.186.0.0.5svn49935-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914549" version="1" comment="texlive-biblatex-luh-ipw is &lt;2021.186.0.0.3svn32180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914550" version="1" comment="texlive-biblatex-luh-ipw-doc is &lt;2021.186.0.0.3svn32180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914551" version="1" comment="texlive-biblatex-manuscripts-philology is &lt;2021.186.2.1.2svn53344-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914552" version="1" comment="texlive-biblatex-manuscripts-philology-doc is &lt;2021.186.2.1.2svn53344-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914553" version="1" comment="texlive-biblatex-mla is &lt;2021.186.1.9svn42445-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914554" version="1" comment="texlive-biblatex-mla-doc is &lt;2021.186.1.9svn42445-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914555" version="1" comment="texlive-biblatex-morenames is &lt;2021.186.1.3.1svn43049-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914556" version="1" comment="texlive-biblatex-morenames-doc is &lt;2021.186.1.3.1svn43049-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914557" version="1" comment="texlive-biblatex-multiple-dm is &lt;2021.186.1.0.1svn37081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914558" version="1" comment="texlive-biblatex-multiple-dm-doc is &lt;2021.186.1.0.1svn37081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914559" version="1" comment="texlive-biblatex-musuos is &lt;2021.186.1.0svn24097-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914560" version="1" comment="texlive-biblatex-musuos-doc is &lt;2021.186.1.0svn24097-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914561" version="1" comment="texlive-biblatex-nature is &lt;2021.186.1.3dsvn57262-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914562" version="1" comment="texlive-biblatex-nature-doc is &lt;2021.186.1.3dsvn57262-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914563" version="1" comment="texlive-biblatex-nejm is &lt;2021.186.0.0.5.0svn49839-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914564" version="1" comment="texlive-biblatex-nejm-doc is &lt;2021.186.0.0.5.0svn49839-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914565" version="1" comment="texlive-biblatex-nottsclassic is &lt;2021.186.0.0.1svn41596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914566" version="1" comment="texlive-biblatex-nottsclassic-doc is &lt;2021.186.0.0.1svn41596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914567" version="1" comment="texlive-biblatex-opcit-booktitle is &lt;2021.186.1.9.0svn48983-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914568" version="1" comment="texlive-biblatex-opcit-booktitle-doc is &lt;2021.186.1.9.0svn48983-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914569" version="1" comment="texlive-biblatex-oxref is &lt;2021.186.2.2svn57513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914570" version="1" comment="texlive-biblatex-oxref-doc is &lt;2021.186.2.2svn57513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914571" version="1" comment="texlive-biblatex-philosophy is &lt;2021.186.1.9.8csvn56493-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914572" version="1" comment="texlive-biblatex-philosophy-doc is &lt;2021.186.1.9.8csvn56493-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914573" version="1" comment="texlive-biblatex-phys is &lt;2021.186.1.1bsvn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914574" version="1" comment="texlive-biblatex-phys-doc is &lt;2021.186.1.1bsvn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914575" version="1" comment="texlive-biblatex-publist is &lt;2021.186.1.21svn56392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914576" version="1" comment="texlive-biblatex-publist-doc is &lt;2021.186.1.21svn56392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914577" version="1" comment="texlive-biblatex-realauthor is &lt;2021.186.2.7.1asvn45865-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914578" version="1" comment="texlive-biblatex-realauthor-doc is &lt;2021.186.2.7.1asvn45865-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914579" version="1" comment="texlive-biblatex-sbl is &lt;2021.186.0.0.12svn56853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914580" version="1" comment="texlive-biblatex-sbl-doc is &lt;2021.186.0.0.12svn56853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914581" version="1" comment="texlive-biblatex-science is &lt;2021.186.1.2svn48945-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914582" version="1" comment="texlive-biblatex-science-doc is &lt;2021.186.1.2svn48945-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914583" version="1" comment="texlive-biblatex-shortfields is &lt;2021.186.1.0.1svn45858-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914584" version="1" comment="texlive-biblatex-shortfields-doc is &lt;2021.186.1.0.1svn45858-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914585" version="1" comment="texlive-biblatex-socialscienceshuberlin is &lt;2021.186.0.0.0.1svn47839-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914586" version="1" comment="texlive-biblatex-socialscienceshuberlin-doc is &lt;2021.186.0.0.0.1svn47839-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914587" version="1" comment="texlive-biblatex-software is &lt;2021.186.1.2_3svn57366-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914588" version="1" comment="texlive-biblatex-software-doc is &lt;2021.186.1.2_3svn57366-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914589" version="1" comment="texlive-biblatex-source-division is &lt;2021.186.2.4.2svn45379-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914590" version="1" comment="texlive-biblatex-source-division-doc is &lt;2021.186.2.4.2svn45379-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914591" version="1" comment="texlive-biblatex-subseries is &lt;2021.186.1.2.0svn43330-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914592" version="1" comment="texlive-biblatex-subseries-doc is &lt;2021.186.1.2.0svn43330-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914593" version="1" comment="texlive-biblatex-swiss-legal is &lt;2021.186.1.1.2asvn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914594" version="1" comment="texlive-biblatex-swiss-legal-doc is &lt;2021.186.1.1.2asvn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914595" version="1" comment="texlive-biblatex-trad is &lt;2021.186.0.0.5svn58169-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914596" version="1" comment="texlive-biblatex-trad-doc is &lt;2021.186.0.0.5svn58169-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914597" version="1" comment="texlive-biblatex-true-citepages-omit is &lt;2021.186.2.0.0svn44653-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914598" version="1" comment="texlive-biblatex-true-citepages-omit-doc is &lt;2021.186.2.0.0svn44653-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914599" version="1" comment="texlive-biblatex-unified is &lt;2021.186.1.00svn55290-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914600" version="1" comment="texlive-biblatex-unified-doc is &lt;2021.186.1.00svn55290-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914601" version="1" comment="texlive-biblatex-vancouver is &lt;2021.186.0.0.1svn55339-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914602" version="1" comment="texlive-biblatex-vancouver-doc is &lt;2021.186.0.0.1svn55339-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914603" version="1" comment="texlive-biblatex2bibitem is &lt;2021.186.0.0.2.0svn54030-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914604" version="1" comment="texlive-biblatex2bibitem-doc is &lt;2021.186.0.0.2.0svn54030-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914605" version="1" comment="texlive-bibleref is &lt;2021.186.1.25svn55626-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914606" version="1" comment="texlive-bibleref-doc is &lt;2021.186.1.25svn55626-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914607" version="1" comment="texlive-bibleref-french is &lt;2021.186.2.3.3svn53138-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914608" version="1" comment="texlive-bibleref-french-doc is &lt;2021.186.2.3.3svn53138-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914609" version="1" comment="texlive-bibleref-german is &lt;2021.186.1.0asvn21923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914610" version="1" comment="texlive-bibleref-german-doc is &lt;2021.186.1.0asvn21923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914611" version="1" comment="texlive-bibleref-lds is &lt;2021.186.1.0svn25526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914612" version="1" comment="texlive-bibleref-lds-doc is &lt;2021.186.1.0svn25526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914613" version="1" comment="texlive-bibleref-mouth is &lt;2021.186.1.0svn25527-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914614" version="1" comment="texlive-bibleref-mouth-doc is &lt;2021.186.1.0svn25527-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914615" version="1" comment="texlive-bibleref-parse is &lt;2021.186.1.1svn22054-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914616" version="1" comment="texlive-bibleref-parse-doc is &lt;2021.186.1.1svn22054-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914617" version="1" comment="texlive-bibletext is &lt;2021.186.0.0.1.2svn45196-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914618" version="1" comment="texlive-bibletext-doc is &lt;2021.186.0.0.1.2svn45196-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914619" version="1" comment="texlive-biblist is &lt;2021.186.svn17116-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914620" version="1" comment="texlive-biblist-doc is &lt;2021.186.svn17116-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914621" version="1" comment="texlive-bibtex is &lt;2021.186.0.0.99dsvn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914622" version="1" comment="texlive-bibtex-doc is &lt;2021.186.0.0.99dsvn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914623" version="1" comment="texlive-bibtex8 is &lt;2021.186.3.71svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914624" version="1" comment="texlive-bibtex8-doc is &lt;2021.186.3.71svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914625" version="1" comment="texlive-bibtexperllibs is &lt;2021.186.1.6svn57137-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914626" version="1" comment="texlive-bibtexu is &lt;2021.186.svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914627" version="1" comment="texlive-bibtopic is &lt;2021.186.1.1asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914628" version="1" comment="texlive-bibtopic-doc is &lt;2021.186.1.1asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914629" version="1" comment="texlive-bibtopicprefix is &lt;2021.186.1.10svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914630" version="1" comment="texlive-bibtopicprefix-doc is &lt;2021.186.1.10svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914631" version="1" comment="texlive-bibunits is &lt;2021.186.2.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914632" version="1" comment="texlive-bibunits-doc is &lt;2021.186.2.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914633" version="1" comment="texlive-bidi is &lt;2021.186.36.3svn55193-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914634" version="1" comment="texlive-bidi-atbegshi is &lt;2021.186.0.0.1svn35154-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914635" version="1" comment="texlive-bidi-atbegshi-doc is &lt;2021.186.0.0.1svn35154-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914636" version="1" comment="texlive-bidi-doc is &lt;2021.186.36.3svn55193-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914637" version="1" comment="texlive-bidicontour is &lt;2021.186.0.0.2svn34631-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914638" version="1" comment="texlive-bidicontour-doc is &lt;2021.186.0.0.2svn34631-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914639" version="1" comment="texlive-bidihl is &lt;2021.186.0.0.1csvn37795-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914640" version="1" comment="texlive-bidihl-doc is &lt;2021.186.0.0.1csvn37795-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914641" version="1" comment="texlive-bidipagegrid is &lt;2021.186.0.0.2svn34632-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914642" version="1" comment="texlive-bidipagegrid-doc is &lt;2021.186.0.0.2svn34632-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914643" version="1" comment="texlive-bidipresentation is &lt;2021.186.0.0.3svn35267-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914644" version="1" comment="texlive-bidipresentation-doc is &lt;2021.186.0.0.3svn35267-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914645" version="1" comment="texlive-bidishadowtext is &lt;2021.186.0.0.1svn34633-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914646" version="1" comment="texlive-bidishadowtext-doc is &lt;2021.186.0.0.1svn34633-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914647" version="1" comment="texlive-bigfoot is &lt;2021.186.2.1svn38248-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914648" version="1" comment="texlive-bigfoot-doc is &lt;2021.186.2.1svn38248-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914649" version="1" comment="texlive-bigintcalc is &lt;2021.186.1.5svn53172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914650" version="1" comment="texlive-bigintcalc-doc is &lt;2021.186.1.5svn53172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914651" version="1" comment="texlive-bigints is &lt;2021.186.svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914652" version="1" comment="texlive-bigints-doc is &lt;2021.186.svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914653" version="1" comment="texlive-binarytree is &lt;2021.186.1.01svn41777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914654" version="1" comment="texlive-binarytree-doc is &lt;2021.186.1.01svn41777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914655" version="1" comment="texlive-binomexp is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914656" version="1" comment="texlive-binomexp-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914657" version="1" comment="texlive-biochemistry-colors is &lt;2021.186.1.00svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914658" version="1" comment="texlive-biochemistry-colors-doc is &lt;2021.186.1.00svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914659" version="1" comment="texlive-biocon is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914660" version="1" comment="texlive-biocon-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914661" version="1" comment="texlive-biolett-bst is &lt;2021.186.svn42217-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914662" version="1" comment="texlive-biolett-bst-doc is &lt;2021.186.svn42217-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914663" version="1" comment="texlive-bitelist is &lt;2021.186.0.0.1svn25779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914664" version="1" comment="texlive-bitelist-doc is &lt;2021.186.0.0.1svn25779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914665" version="1" comment="texlive-bithesis is &lt;2021.186.1.0.1svn57388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914666" version="1" comment="texlive-bithesis-doc is &lt;2021.186.1.0.1svn57388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914667" version="1" comment="texlive-bitpattern is &lt;2021.186.svn39073-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914668" version="1" comment="texlive-bitpattern-doc is &lt;2021.186.svn39073-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914669" version="1" comment="texlive-bitset is &lt;2021.186.1.3svn53837-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914670" version="1" comment="texlive-bitset-doc is &lt;2021.186.1.3svn53837-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914671" version="1" comment="texlive-bitter is &lt;2021.186.svn56026-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914672" version="1" comment="texlive-bitter-doc is &lt;2021.186.svn56026-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914673" version="1" comment="texlive-bitter-fonts is &lt;2021.186.svn56026-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914674" version="1" comment="texlive-bizcard is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914675" version="1" comment="texlive-bizcard-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914676" version="1" comment="texlive-blacklettert1 is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914677" version="1" comment="texlive-blacklettert1-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914678" version="1" comment="texlive-blindtext is &lt;2021.186.2.0svn25039-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914679" version="1" comment="texlive-blindtext-doc is &lt;2021.186.2.0svn25039-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914680" version="1" comment="texlive-blkarray is &lt;2021.186.0.0.07svn36406-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914681" version="1" comment="texlive-blkarray-doc is &lt;2021.186.0.0.07svn36406-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914682" version="1" comment="texlive-blochsphere is &lt;2021.186.1.1svn38388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914683" version="1" comment="texlive-blochsphere-doc is &lt;2021.186.1.1svn38388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914684" version="1" comment="texlive-block is &lt;2021.186.svn17209-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914685" version="1" comment="texlive-block-doc is &lt;2021.186.svn17209-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914686" version="1" comment="texlive-blockdraw_mp is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914687" version="1" comment="texlive-blockdraw_mp-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914688" version="1" comment="texlive-bloques is &lt;2021.186.1.0svn22490-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914689" version="1" comment="texlive-bloques-doc is &lt;2021.186.1.0svn22490-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914690" version="1" comment="texlive-blowup is &lt;2021.186.1.0svn46213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914691" version="1" comment="texlive-blowup-doc is &lt;2021.186.1.0svn46213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914692" version="1" comment="texlive-blox is &lt;2021.186.2.51svn57949-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914693" version="1" comment="texlive-blox-doc is &lt;2021.186.2.51svn57949-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914694" version="1" comment="texlive-bnumexpr is &lt;2021.186.1.2dsvn49643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914695" version="1" comment="texlive-bnumexpr-doc is &lt;2021.186.1.2dsvn49643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914696" version="1" comment="texlive-bodegraph is &lt;2021.186.1.4svn20047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914697" version="1" comment="texlive-bodegraph-doc is &lt;2021.186.1.4svn20047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914698" version="1" comment="texlive-bohr is &lt;2021.186.1.0svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914699" version="1" comment="texlive-bohr-doc is &lt;2021.186.1.0svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914700" version="1" comment="texlive-boisik is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914701" version="1" comment="texlive-boisik-doc is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914702" version="1" comment="texlive-boites is &lt;2021.186.1.1svn32235-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914703" version="1" comment="texlive-boites-doc is &lt;2021.186.1.1svn32235-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914704" version="1" comment="texlive-bold-extra is &lt;2021.186.0.0.1svn17076-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914705" version="1" comment="texlive-bold-extra-doc is &lt;2021.186.0.0.1svn17076-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914706" version="1" comment="texlive-boldtensors is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914707" version="1" comment="texlive-boldtensors-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914708" version="1" comment="texlive-bondgraph is &lt;2021.186.1.0svn21670-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914709" version="1" comment="texlive-bondgraph-doc is &lt;2021.186.1.0svn21670-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914710" version="1" comment="texlive-bondgraphs is &lt;2021.186.1.0.1svn36605-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914711" version="1" comment="texlive-bondgraphs-doc is &lt;2021.186.1.0.1svn36605-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914712" version="1" comment="texlive-bookcover is &lt;2021.186.3.3svn57326-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914713" version="1" comment="texlive-bookcover-doc is &lt;2021.186.3.3svn57326-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914714" version="1" comment="texlive-bookdb is &lt;2021.186.0.0.2svn37536-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914715" version="1" comment="texlive-bookdb-doc is &lt;2021.186.0.0.2svn37536-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914716" version="1" comment="texlive-bookest is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914717" version="1" comment="texlive-bookest-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914718" version="1" comment="texlive-bookhands is &lt;2021.186.svn46480-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914719" version="1" comment="texlive-bookhands-doc is &lt;2021.186.svn46480-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914720" version="1" comment="texlive-bookhands-fonts is &lt;2021.186.svn46480-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914721" version="1" comment="texlive-booklet is &lt;2021.186.0.0.7bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914722" version="1" comment="texlive-booklet-doc is &lt;2021.186.0.0.7bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914723" version="1" comment="texlive-bookman is &lt;2021.186.svn31835-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914724" version="1" comment="texlive-bookman-fonts is &lt;2021.186.svn31835-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914725" version="1" comment="texlive-bookmark is &lt;2021.186.1.29svn56885-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914726" version="1" comment="texlive-bookmark-doc is &lt;2021.186.1.29svn56885-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914727" version="1" comment="texlive-bookshelf is &lt;2021.186.0.0.5svn55475-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914728" version="1" comment="texlive-bookshelf-doc is &lt;2021.186.0.0.5svn55475-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914729" version="1" comment="texlive-booktabs is &lt;2021.186.1.61803398svn53402-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914730" version="1" comment="texlive-booktabs-de is &lt;2021.186.1.61803svn21907-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914731" version="1" comment="texlive-booktabs-doc is &lt;2021.186.1.61803398svn53402-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914732" version="1" comment="texlive-booktabs-fr is &lt;2021.186.1.00svn21948-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914733" version="1" comment="texlive-boolexpr is &lt;2021.186.3.14svn17830-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914734" version="1" comment="texlive-boolexpr-doc is &lt;2021.186.3.14svn17830-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914735" version="1" comment="texlive-boondox is &lt;2021.186.1.02dsvn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914736" version="1" comment="texlive-boondox-doc is &lt;2021.186.1.02dsvn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914737" version="1" comment="texlive-boondox-fonts is &lt;2021.186.1.02dsvn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914738" version="1" comment="texlive-bophook is &lt;2021.186.0.0.02svn17062-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914739" version="1" comment="texlive-bophook-doc is &lt;2021.186.0.0.02svn17062-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914740" version="1" comment="texlive-borceux is &lt;2021.186.svn21047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914741" version="1" comment="texlive-borceux-doc is &lt;2021.186.svn21047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914742" version="1" comment="texlive-bosisio is &lt;2021.186.svn16989-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914743" version="1" comment="texlive-bosisio-doc is &lt;2021.186.svn16989-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914744" version="1" comment="texlive-boxedminipage is &lt;2021.186.1.1svn54827-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914745" version="1" comment="texlive-boxedminipage-doc is &lt;2021.186.1.1svn54827-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914746" version="1" comment="texlive-boxhandler is &lt;2021.186.1.30svn28031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914747" version="1" comment="texlive-boxhandler-doc is &lt;2021.186.1.30svn28031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914748" version="1" comment="texlive-bpchem is &lt;2021.186.1.1svn45120-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914749" version="1" comment="texlive-bpchem-doc is &lt;2021.186.1.1svn45120-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914750" version="1" comment="texlive-bpolynomial is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914751" version="1" comment="texlive-bpolynomial-doc is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914752" version="1" comment="texlive-br-lex is &lt;2021.186.svn44939-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914753" version="1" comment="texlive-br-lex-doc is &lt;2021.186.svn44939-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914754" version="1" comment="texlive-bracketkey is &lt;2021.186.1.0svn17129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914755" version="1" comment="texlive-bracketkey-doc is &lt;2021.186.1.0svn17129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914756" version="1" comment="texlive-braids is &lt;2021.186.2.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914757" version="1" comment="texlive-braids-doc is &lt;2021.186.2.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914758" version="1" comment="texlive-braille is &lt;2021.186.svn20655-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914759" version="1" comment="texlive-braille-doc is &lt;2021.186.svn20655-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914760" version="1" comment="texlive-braket is &lt;2021.186.svn17127-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914761" version="1" comment="texlive-braket-doc is &lt;2021.186.svn17127-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914762" version="1" comment="texlive-brandeis-dissertation is &lt;2021.186.3.11svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914763" version="1" comment="texlive-brandeis-dissertation-doc is &lt;2021.186.3.11svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914764" version="1" comment="texlive-brandeis-problemset is &lt;2021.186.0.0.5.5svn50991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914765" version="1" comment="texlive-brandeis-problemset-doc is &lt;2021.186.0.0.5.5svn50991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914766" version="1" comment="texlive-brandeis-thesis is &lt;2021.186.3.1svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914767" version="1" comment="texlive-brandeis-thesis-doc is &lt;2021.186.3.1svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914768" version="1" comment="texlive-breakcites is &lt;2021.186.svn21014-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914769" version="1" comment="texlive-breakcites-doc is &lt;2021.186.svn21014-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914770" version="1" comment="texlive-breakurl is &lt;2021.186.1.40svn29901-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914771" version="1" comment="texlive-breakurl-doc is &lt;2021.186.1.40svn29901-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914772" version="1" comment="texlive-bredzenie is &lt;2021.186.1.0svn44371-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914773" version="1" comment="texlive-bredzenie-doc is &lt;2021.186.1.0svn44371-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914774" version="1" comment="texlive-breqn is &lt;2021.186.0.0.98ksvn56422-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914775" version="1" comment="texlive-breqn-doc is &lt;2021.186.0.0.98ksvn56422-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914776" version="1" comment="texlive-bropd is &lt;2021.186.1.2svn35383-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914777" version="1" comment="texlive-bropd-doc is &lt;2021.186.1.2svn35383-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914778" version="1" comment="texlive-brushscr is &lt;2021.186.svn28363-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914779" version="1" comment="texlive-brushscr-doc is &lt;2021.186.svn28363-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914780" version="1" comment="texlive-brushscr-fonts is &lt;2021.186.svn28363-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914781" version="1" comment="texlive-bubblesort is &lt;2021.186.1.0svn56070-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914782" version="1" comment="texlive-bubblesort-doc is &lt;2021.186.1.0svn56070-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914783" version="1" comment="texlive-bullcntr is &lt;2021.186.0.0.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914784" version="1" comment="texlive-bullcntr-doc is &lt;2021.186.0.0.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914785" version="1" comment="texlive-bundledoc is &lt;2021.186.3.4svn55064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914786" version="1" comment="texlive-bundledoc-doc is &lt;2021.186.3.4svn55064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914787" version="1" comment="texlive-burmese is &lt;2021.186.svn25185-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914788" version="1" comment="texlive-burmese-doc is &lt;2021.186.svn25185-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914789" version="1" comment="texlive-burmese-fonts is &lt;2021.186.svn25185-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914790" version="1" comment="texlive-businesscard-qrcode is &lt;2021.186.1.2svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914791" version="1" comment="texlive-businesscard-qrcode-doc is &lt;2021.186.1.2svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914792" version="1" comment="texlive-bussproofs is &lt;2021.186.1.1svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914793" version="1" comment="texlive-bussproofs-doc is &lt;2021.186.1.1svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914794" version="1" comment="texlive-bussproofs-extra is &lt;2021.186.0.0.4svn51299-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914795" version="1" comment="texlive-bussproofs-extra-doc is &lt;2021.186.0.0.4svn51299-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914796" version="1" comment="texlive-bxbase is &lt;2021.186.1.2svn56528-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914797" version="1" comment="texlive-bxbase-doc is &lt;2021.186.1.2svn56528-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914798" version="1" comment="texlive-bxcalc is &lt;2021.186.1.1svn56431-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914799" version="1" comment="texlive-bxcalc-doc is &lt;2021.186.1.1svn56431-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914800" version="1" comment="texlive-bxcjkjatype is &lt;2021.186.0.0.3svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914801" version="1" comment="texlive-bxcjkjatype-doc is &lt;2021.186.0.0.3svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914802" version="1" comment="texlive-bxdpx-beamer is &lt;2021.186.0.0.3svn41813-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914803" version="1" comment="texlive-bxdpx-beamer-doc is &lt;2021.186.0.0.3svn41813-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914804" version="1" comment="texlive-bxdvidriver is &lt;2021.186.0.0.2asvn43219-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914805" version="1" comment="texlive-bxdvidriver-doc is &lt;2021.186.0.0.2asvn43219-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914806" version="1" comment="texlive-bxeepic is &lt;2021.186.0.0.2svn30559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914807" version="1" comment="texlive-bxeepic-doc is &lt;2021.186.0.0.2svn30559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914808" version="1" comment="texlive-bxenclose is &lt;2021.186.0.0.2svn40213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914809" version="1" comment="texlive-bxenclose-doc is &lt;2021.186.0.0.2svn40213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914810" version="1" comment="texlive-bxghost is &lt;2021.186.0.0.3.0svn53606-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914811" version="1" comment="texlive-bxghost-doc is &lt;2021.186.0.0.3.0svn53606-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914812" version="1" comment="texlive-bxjaholiday is &lt;2021.186.1.1.0svn57025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914813" version="1" comment="texlive-bxjaholiday-doc is &lt;2021.186.1.1.0svn57025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914814" version="1" comment="texlive-bxjalipsum is &lt;2021.186.0.0.3asvn43369-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914815" version="1" comment="texlive-bxjalipsum-doc is &lt;2021.186.0.0.3asvn43369-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914816" version="1" comment="texlive-bxjaprnind is &lt;2021.186.0.0.3bsvn45291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914817" version="1" comment="texlive-bxjaprnind-doc is &lt;2021.186.0.0.3bsvn45291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914818" version="1" comment="texlive-bxjatoucs is &lt;2021.186.0.0.2svn52509-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914819" version="1" comment="texlive-bxjatoucs-doc is &lt;2021.186.0.0.2svn52509-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914820" version="1" comment="texlive-bxjscls is &lt;2021.186.2.5svn57625-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914821" version="1" comment="texlive-bxjscls-doc is &lt;2021.186.2.5svn57625-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914822" version="1" comment="texlive-bxnewfont is &lt;2021.186.0.0.2bsvn44173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914823" version="1" comment="texlive-bxnewfont-doc is &lt;2021.186.0.0.2bsvn44173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914824" version="1" comment="texlive-bxorigcapt is &lt;2021.186.0.0.3svn48606-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914825" version="1" comment="texlive-bxorigcapt-doc is &lt;2021.186.0.0.3svn48606-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914826" version="1" comment="texlive-bxpapersize is &lt;2021.186.0.0.5svn56491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914827" version="1" comment="texlive-bxpapersize-doc is &lt;2021.186.0.0.5svn56491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914828" version="1" comment="texlive-bxpdfver is &lt;2021.186.0.0.5asvn57755-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914829" version="1" comment="texlive-bxpdfver-doc is &lt;2021.186.0.0.5asvn57755-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914830" version="1" comment="texlive-bxtexlogo is &lt;2021.186.0.0.4svn47230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914831" version="1" comment="texlive-bxtexlogo-doc is &lt;2021.186.0.0.4svn47230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914832" version="1" comment="texlive-bxwareki is &lt;2021.186.0.0.6svn51286-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914833" version="1" comment="texlive-bxwareki-doc is &lt;2021.186.0.0.6svn51286-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914834" version="1" comment="texlive-bytefield is &lt;2021.186.2.6svn56821-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914835" version="1" comment="texlive-bytefield-doc is &lt;2021.186.2.6svn56821-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914836" version="1" comment="texlive-c-pascal is &lt;2021.186.1.2svn18337-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914837" version="1" comment="texlive-c-pascal-doc is &lt;2021.186.1.2svn18337-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914838" version="1" comment="texlive-c90 is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914839" version="1" comment="texlive-c90-doc is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914840" version="1" comment="texlive-cabin is &lt;2021.186.svn55907-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914841" version="1" comment="texlive-cabin-doc is &lt;2021.186.svn55907-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914842" version="1" comment="texlive-cabin-fonts is &lt;2021.186.svn55907-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914843" version="1" comment="texlive-cachepic is &lt;2021.186.1.0svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914844" version="1" comment="texlive-cachepic-doc is &lt;2021.186.1.0svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914845" version="1" comment="texlive-caladea is &lt;2021.186.svn34991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914846" version="1" comment="texlive-caladea-doc is &lt;2021.186.svn34991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914847" version="1" comment="texlive-caladea-fonts is &lt;2021.186.svn34991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914848" version="1" comment="texlive-calcage is &lt;2021.186.0.0.90svn27725-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914849" version="1" comment="texlive-calcage-doc is &lt;2021.186.0.0.90svn27725-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914850" version="1" comment="texlive-calctab is &lt;2021.186.0.0.6.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914851" version="1" comment="texlive-calctab-doc is &lt;2021.186.0.0.6.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914852" version="1" comment="texlive-calculation is &lt;2021.186.1.0svn35973-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914853" version="1" comment="texlive-calculation-doc is &lt;2021.186.1.0svn35973-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914854" version="1" comment="texlive-calculator is &lt;2021.186.2.0svn33041-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914855" version="1" comment="texlive-calculator-doc is &lt;2021.186.2.0svn33041-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914856" version="1" comment="texlive-calligra is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914857" version="1" comment="texlive-calligra-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914858" version="1" comment="texlive-calligra-type1 is &lt;2021.186.001.000svn24302-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914859" version="1" comment="texlive-calligra-type1-doc is &lt;2021.186.001.000svn24302-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914860" version="1" comment="texlive-calligra-type1-fonts is &lt;2021.186.001.000svn24302-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914861" version="1" comment="texlive-callouts is &lt;2021.186.svn44899-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914862" version="1" comment="texlive-callouts-doc is &lt;2021.186.svn44899-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914863" version="1" comment="texlive-calrsfs is &lt;2021.186.svn17125-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914864" version="1" comment="texlive-calrsfs-doc is &lt;2021.186.svn17125-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914865" version="1" comment="texlive-cals is &lt;2021.186.2.4.2svn43003-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914866" version="1" comment="texlive-cals-doc is &lt;2021.186.2.4.2svn43003-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914867" version="1" comment="texlive-calxxxx-yyyy is &lt;2021.186.20.21asvn57282-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914868" version="1" comment="texlive-calxxxx-yyyy-doc is &lt;2021.186.20.21asvn57282-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914869" version="1" comment="texlive-cancel is &lt;2021.186.2.2svn32508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914870" version="1" comment="texlive-cancel-doc is &lt;2021.186.2.2svn32508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914871" version="1" comment="texlive-canoniclayout is &lt;2021.186.0.0.5svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914872" version="1" comment="texlive-canoniclayout-doc is &lt;2021.186.0.0.5svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914873" version="1" comment="texlive-cantarell is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914874" version="1" comment="texlive-cantarell-doc is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914875" version="1" comment="texlive-cantarell-fonts is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914876" version="1" comment="texlive-capt-of is &lt;2021.186.svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914877" version="1" comment="texlive-capt-of-doc is &lt;2021.186.svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914878" version="1" comment="texlive-captcont is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914879" version="1" comment="texlive-captcont-doc is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914880" version="1" comment="texlive-captdef is &lt;2021.186.svn17353-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914881" version="1" comment="texlive-captdef-doc is &lt;2021.186.svn17353-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914882" version="1" comment="texlive-caption is &lt;2021.186.svn56771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914883" version="1" comment="texlive-caption-doc is &lt;2021.186.svn56771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914884" version="1" comment="texlive-carbohydrates is &lt;2021.186.0.0.1svn39000-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914885" version="1" comment="texlive-carbohydrates-doc is &lt;2021.186.0.0.1svn39000-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914886" version="1" comment="texlive-carlisle is &lt;2021.186.svn56753-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914887" version="1" comment="texlive-carlisle-doc is &lt;2021.186.svn56753-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914888" version="1" comment="texlive-carlito is &lt;2021.186.svn35002-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914889" version="1" comment="texlive-carlito-doc is &lt;2021.186.svn35002-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914890" version="1" comment="texlive-carlito-fonts is &lt;2021.186.svn35002-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914891" version="1" comment="texlive-carolmin-ps is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914892" version="1" comment="texlive-carolmin-ps-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914893" version="1" comment="texlive-carolmin-ps-fonts is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914894" version="1" comment="texlive-cascade is &lt;2021.186.1.1svn55759-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914895" version="1" comment="texlive-cascade-doc is &lt;2021.186.1.1svn55759-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914896" version="1" comment="texlive-cascadia-code is &lt;2021.186.0.0.0.1svn57478-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914897" version="1" comment="texlive-cascadia-code-doc is &lt;2021.186.0.0.0.1svn57478-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914898" version="1" comment="texlive-cascadia-code-fonts is &lt;2021.186.0.0.0.1svn57478-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914899" version="1" comment="texlive-cascadilla is &lt;2021.186.1.8.2svn25144-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914900" version="1" comment="texlive-cascadilla-doc is &lt;2021.186.1.8.2svn25144-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914901" version="1" comment="texlive-cases is &lt;2021.186.3.2svn54682-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914902" version="1" comment="texlive-cases-doc is &lt;2021.186.3.2svn54682-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914903" version="1" comment="texlive-casyl is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914904" version="1" comment="texlive-casyl-doc is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914905" version="1" comment="texlive-catchfile is &lt;2021.186.1.8svn53084-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914906" version="1" comment="texlive-catchfile-doc is &lt;2021.186.1.8svn53084-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914907" version="1" comment="texlive-catchfilebetweentags is &lt;2021.186.1.1svn21476-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914908" version="1" comment="texlive-catchfilebetweentags-doc is &lt;2021.186.1.1svn21476-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914909" version="1" comment="texlive-catcodes is &lt;2021.186.r0.2svn38859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914910" version="1" comment="texlive-catcodes-doc is &lt;2021.186.r0.2svn38859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914911" version="1" comment="texlive-catechis is &lt;2021.186.2.5svn49061-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914912" version="1" comment="texlive-catechis-doc is &lt;2021.186.2.5svn49061-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914913" version="1" comment="texlive-catoptions is &lt;2021.186.0.0.2.7hsvn35069-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914914" version="1" comment="texlive-catoptions-doc is &lt;2021.186.0.0.2.7hsvn35069-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914915" version="1" comment="texlive-causets is &lt;2021.186.1.1svn57139-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914916" version="1" comment="texlive-causets-doc is &lt;2021.186.1.1svn57139-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914917" version="1" comment="texlive-cbcoptic is &lt;2021.186.0.0.2svn16666-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914918" version="1" comment="texlive-cbcoptic-doc is &lt;2021.186.0.0.2svn16666-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914919" version="1" comment="texlive-cbcoptic-fonts is &lt;2021.186.0.0.2svn16666-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914920" version="1" comment="texlive-cbfonts is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914921" version="1" comment="texlive-cbfonts-doc is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914922" version="1" comment="texlive-cbfonts-fd is &lt;2021.186.1.2svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914923" version="1" comment="texlive-cbfonts-fd-doc is &lt;2021.186.1.2svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914924" version="1" comment="texlive-cbfonts-fonts is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914925" version="1" comment="texlive-cc-pl is &lt;2021.186.1.02.3svn58602-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914926" version="1" comment="texlive-cc-pl-doc is &lt;2021.186.1.02.3svn58602-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914927" version="1" comment="texlive-cc-pl-fonts is &lt;2021.186.1.02.3svn58602-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914928" version="1" comment="texlive-ccaption is &lt;2021.186.3.2csvn23443-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914929" version="1" comment="texlive-ccaption-doc is &lt;2021.186.3.2csvn23443-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914930" version="1" comment="texlive-ccfonts is &lt;2021.186.1.2svn54686-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914931" version="1" comment="texlive-ccfonts-doc is &lt;2021.186.1.2svn54686-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914932" version="1" comment="texlive-ccicons is &lt;2021.186.1.6svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914933" version="1" comment="texlive-ccicons-doc is &lt;2021.186.1.6svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914934" version="1" comment="texlive-ccicons-fonts is &lt;2021.186.1.6svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914935" version="1" comment="texlive-cclicenses is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914936" version="1" comment="texlive-cclicenses-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914937" version="1" comment="texlive-ccool is &lt;2021.186.3.1svn56636-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914938" version="1" comment="texlive-ccool-doc is &lt;2021.186.3.1svn56636-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914939" version="1" comment="texlive-cd is &lt;2021.186.1.4svn34452-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914940" version="1" comment="texlive-cd-cover is &lt;2021.186.1.0svn17121-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914941" version="1" comment="texlive-cd-cover-doc is &lt;2021.186.1.0svn17121-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914942" version="1" comment="texlive-cd-doc is &lt;2021.186.1.4svn34452-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914943" version="1" comment="texlive-cdpbundl is &lt;2021.186.0.0.36dsvn46613-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914944" version="1" comment="texlive-cdpbundl-doc is &lt;2021.186.0.0.36dsvn46613-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914945" version="1" comment="texlive-cell is &lt;2021.186.svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914946" version="1" comment="texlive-cell-doc is &lt;2021.186.svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914947" version="1" comment="texlive-cellprops is &lt;2021.186.2.0svn57599-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914948" version="1" comment="texlive-cellprops-doc is &lt;2021.186.2.0svn57599-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914949" version="1" comment="texlive-cellspace is &lt;2021.186.1.8.1svn50374-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914950" version="1" comment="texlive-cellspace-doc is &lt;2021.186.1.8.1svn50374-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914951" version="1" comment="texlive-celtic is &lt;2021.186.1.1svn39797-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914952" version="1" comment="texlive-celtic-doc is &lt;2021.186.1.1svn39797-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914953" version="1" comment="texlive-censor is &lt;2021.186.3.22svn49168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914954" version="1" comment="texlive-censor-doc is &lt;2021.186.3.22svn49168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914955" version="1" comment="texlive-centeredline is &lt;2021.186.1.1svn50971-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914956" version="1" comment="texlive-centeredline-doc is &lt;2021.186.1.1svn50971-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914957" version="1" comment="texlive-centerlastline is &lt;2021.186.1.0svn56644-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914958" version="1" comment="texlive-centerlastline-doc is &lt;2021.186.1.0svn56644-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914959" version="1" comment="texlive-cesenaexam is &lt;2021.186.0.0.2svn44960-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914960" version="1" comment="texlive-cesenaexam-doc is &lt;2021.186.0.0.2svn44960-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914961" version="1" comment="texlive-cfr-initials is &lt;2021.186.1.01svn36728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914962" version="1" comment="texlive-cfr-initials-doc is &lt;2021.186.1.01svn36728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914963" version="1" comment="texlive-cfr-lm is &lt;2021.186.1.5svn36195-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914964" version="1" comment="texlive-cfr-lm-doc is &lt;2021.186.1.5svn36195-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914965" version="1" comment="texlive-changebar is &lt;2021.186.3.6csvn46919-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914966" version="1" comment="texlive-changebar-doc is &lt;2021.186.3.6csvn46919-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914967" version="1" comment="texlive-changelayout is &lt;2021.186.1.0svn16094-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914968" version="1" comment="texlive-changelayout-doc is &lt;2021.186.1.0svn16094-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914969" version="1" comment="texlive-changelog is &lt;2021.186.2.4.0svn56338-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914970" version="1" comment="texlive-changelog-doc is &lt;2021.186.2.4.0svn56338-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914971" version="1" comment="texlive-changepage is &lt;2021.186.1.0csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914972" version="1" comment="texlive-changepage-doc is &lt;2021.186.1.0csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914973" version="1" comment="texlive-changes is &lt;2021.186.4.0.1svn57756-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914974" version="1" comment="texlive-changes-doc is &lt;2021.186.4.0.1svn57756-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914975" version="1" comment="texlive-chappg is &lt;2021.186.2.1bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914976" version="1" comment="texlive-chappg-doc is &lt;2021.186.2.1bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914977" version="1" comment="texlive-chapterfolder is &lt;2021.186.2.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914978" version="1" comment="texlive-chapterfolder-doc is &lt;2021.186.2.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914979" version="1" comment="texlive-charissil is &lt;2021.186.5.0svn55920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914980" version="1" comment="texlive-charissil-doc is &lt;2021.186.5.0svn55920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914981" version="1" comment="texlive-charissil-fonts is &lt;2021.186.5.0svn55920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914982" version="1" comment="texlive-charter is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914983" version="1" comment="texlive-charter-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914984" version="1" comment="texlive-charter-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914985" version="1" comment="texlive-chbibref is &lt;2021.186.1.0svn17120-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914986" version="1" comment="texlive-chbibref-doc is &lt;2021.186.1.0svn17120-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914987" version="1" comment="texlive-cheatsheet is &lt;2021.186.0.0.8svn45069-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914988" version="1" comment="texlive-cheatsheet-doc is &lt;2021.186.0.0.8svn45069-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914989" version="1" comment="texlive-checkcites is &lt;2021.186.2.4svn52022-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914990" version="1" comment="texlive-checkcites-doc is &lt;2021.186.2.4svn52022-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914991" version="1" comment="texlive-checkend is &lt;2021.186.1.0svn51475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914992" version="1" comment="texlive-checkend-doc is &lt;2021.186.1.0svn51475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914993" version="1" comment="texlive-checklistings is &lt;2021.186.1.0svn38300-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914994" version="1" comment="texlive-checklistings-doc is &lt;2021.186.1.0svn38300-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914995" version="1" comment="texlive-chem-journal is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914996" version="1" comment="texlive-chemarrow is &lt;2021.186.0.0.9svn17146-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914997" version="1" comment="texlive-chemarrow-doc is &lt;2021.186.0.0.9svn17146-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914998" version="1" comment="texlive-chemarrow-fonts is &lt;2021.186.0.0.9svn17146-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009914999" version="1" comment="texlive-chembst is &lt;2021.186.0.0.2.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915000" version="1" comment="texlive-chembst-doc is &lt;2021.186.0.0.2.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915001" version="1" comment="texlive-chemcompounds is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915002" version="1" comment="texlive-chemcompounds-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915003" version="1" comment="texlive-chemcono is &lt;2021.186.1.3svn17119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915004" version="1" comment="texlive-chemcono-doc is &lt;2021.186.1.3svn17119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915005" version="1" comment="texlive-chemexec is &lt;2021.186.1.0svn21632-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915006" version="1" comment="texlive-chemexec-doc is &lt;2021.186.1.0svn21632-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915007" version="1" comment="texlive-chemfig is &lt;2021.186.1.6asvn58014-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915008" version="1" comment="texlive-chemfig-doc is &lt;2021.186.1.6asvn58014-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915009" version="1" comment="texlive-chemformula is &lt;2021.186.4.16svn57206-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915010" version="1" comment="texlive-chemformula-doc is &lt;2021.186.4.16svn57206-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915011" version="1" comment="texlive-chemgreek is &lt;2021.186.1.1asvn53437-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915012" version="1" comment="texlive-chemgreek-doc is &lt;2021.186.1.1asvn53437-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915013" version="1" comment="texlive-chemmacros is &lt;2021.186.5.11asvn56983-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915014" version="1" comment="texlive-chemmacros-doc is &lt;2021.186.5.11asvn56983-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915015" version="1" comment="texlive-chemnum is &lt;2021.186.1.3asvn57490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915016" version="1" comment="texlive-chemnum-doc is &lt;2021.186.1.3asvn57490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915017" version="1" comment="texlive-chemplants is &lt;2021.186.0.0.9.8svn52863-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915018" version="1" comment="texlive-chemplants-doc is &lt;2021.186.0.0.9.8svn52863-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915019" version="1" comment="texlive-chemschemex is &lt;2021.186.1.2svn46723-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915020" version="1" comment="texlive-chemschemex-doc is &lt;2021.186.1.2svn46723-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915021" version="1" comment="texlive-chemsec is &lt;2021.186.1.12asvn46972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915022" version="1" comment="texlive-chemsec-doc is &lt;2021.186.1.12asvn46972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915023" version="1" comment="texlive-chemstyle is &lt;2021.186.2.0msvn31096-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915024" version="1" comment="texlive-chemstyle-doc is &lt;2021.186.2.0msvn31096-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915025" version="1" comment="texlive-cherokee is &lt;2021.186.svn21046-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915026" version="1" comment="texlive-cherokee-doc is &lt;2021.186.svn21046-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915027" version="1" comment="texlive-chess is &lt;2021.186.1.2svn20582-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915028" version="1" comment="texlive-chess-doc is &lt;2021.186.1.2svn20582-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915029" version="1" comment="texlive-chess-problem-diagrams is &lt;2021.186.1.15svn53302-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915030" version="1" comment="texlive-chess-problem-diagrams-doc is &lt;2021.186.1.15svn53302-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915031" version="1" comment="texlive-chessboard is &lt;2021.186.1.9svn56833-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915032" version="1" comment="texlive-chessboard-doc is &lt;2021.186.1.9svn56833-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915033" version="1" comment="texlive-chessfss is &lt;2021.186.1.2asvn19440-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915034" version="1" comment="texlive-chessfss-doc is &lt;2021.186.1.2asvn19440-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915035" version="1" comment="texlive-chet is &lt;2021.186.2.2svn45081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915036" version="1" comment="texlive-chet-doc is &lt;2021.186.2.2svn45081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915037" version="1" comment="texlive-chextras is &lt;2021.186.1.01svn27118-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915038" version="1" comment="texlive-chextras-doc is &lt;2021.186.1.01svn27118-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915039" version="1" comment="texlive-chhaya is &lt;2021.186.0.0.2svn57508-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915040" version="1" comment="texlive-chhaya-doc is &lt;2021.186.0.0.2svn57508-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915041" version="1" comment="texlive-chicago is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915042" version="1" comment="texlive-chicago-annote is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915043" version="1" comment="texlive-chicago-annote-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915044" version="1" comment="texlive-chicagoa is &lt;2021.186.svn52567-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915045" version="1" comment="texlive-chickenize is &lt;2021.186.0.0.3svn57325-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915046" version="1" comment="texlive-chickenize-doc is &lt;2021.186.0.0.3svn57325-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915047" version="1" comment="texlive-chifoot is &lt;2021.186.1.0svn57312-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915048" version="1" comment="texlive-chifoot-doc is &lt;2021.186.1.0svn57312-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915049" version="1" comment="texlive-childdoc is &lt;2021.186.2.0svn49543-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915050" version="1" comment="texlive-childdoc-doc is &lt;2021.186.2.0svn49543-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915051" version="1" comment="texlive-chinese-jfm is &lt;2021.186.1.1.1svn57758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915052" version="1" comment="texlive-chinese-jfm-doc is &lt;2021.186.1.1.1svn57758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915053" version="1" comment="texlive-chivo is &lt;2021.186.2.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915054" version="1" comment="texlive-chivo-doc is &lt;2021.186.2.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915055" version="1" comment="texlive-chivo-fonts is &lt;2021.186.2.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915056" version="1" comment="texlive-chkfloat is &lt;2021.186.0.0.1svn27473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915057" version="1" comment="texlive-chkfloat-doc is &lt;2021.186.0.0.1svn27473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915058" version="1" comment="texlive-chklref is &lt;2021.186.3.1.2svn52649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915059" version="1" comment="texlive-chklref-doc is &lt;2021.186.3.1.2svn52649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915060" version="1" comment="texlive-chktex is &lt;2021.186.1.7.6svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915061" version="1" comment="texlive-chktex-doc is &lt;2021.186.1.7.6svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915062" version="1" comment="texlive-chletter is &lt;2021.186.2.0svn20060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915063" version="1" comment="texlive-chletter-doc is &lt;2021.186.2.0svn20060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915064" version="1" comment="texlive-chngcntr is &lt;2021.186.1.1asvn47577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915065" version="1" comment="texlive-chngcntr-doc is &lt;2021.186.1.1asvn47577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915066" version="1" comment="texlive-chordbars is &lt;2021.186.1.1svn49569-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915067" version="1" comment="texlive-chordbars-doc is &lt;2021.186.1.1svn49569-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915068" version="1" comment="texlive-chordbox is &lt;2021.186.1.0svn51000-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915069" version="1" comment="texlive-chordbox-doc is &lt;2021.186.1.0svn51000-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915070" version="1" comment="texlive-chronology is &lt;2021.186.1.1.1svn37934-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915071" version="1" comment="texlive-chronology-doc is &lt;2021.186.1.1.1svn37934-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915072" version="1" comment="texlive-chronosys is &lt;2021.186.1.2svn26700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915073" version="1" comment="texlive-chronosys-doc is &lt;2021.186.1.2svn26700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915074" version="1" comment="texlive-chs-physics-report is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915075" version="1" comment="texlive-chs-physics-report-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915076" version="1" comment="texlive-chscite is &lt;2021.186.2.9999svn28552-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915077" version="1" comment="texlive-chscite-doc is &lt;2021.186.2.9999svn28552-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915078" version="1" comment="texlive-churchslavonic is &lt;2021.186.0.0.2.1svn42751-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915079" version="1" comment="texlive-churchslavonic-doc is &lt;2021.186.0.0.2.1svn42751-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915080" version="1" comment="texlive-cinzel is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915081" version="1" comment="texlive-cinzel-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915082" version="1" comment="texlive-cinzel-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915083" version="1" comment="texlive-circ is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915084" version="1" comment="texlive-circ-doc is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915085" version="1" comment="texlive-circledsteps is &lt;2021.186.1.3svn53382-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915086" version="1" comment="texlive-circledsteps-doc is &lt;2021.186.1.3svn53382-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915087" version="1" comment="texlive-circuit-macros is &lt;2021.186.9.5svn57308-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915088" version="1" comment="texlive-circuit-macros-doc is &lt;2021.186.9.5svn57308-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915089" version="1" comment="texlive-circuitikz is &lt;2021.186.1.3.3svn58757-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915090" version="1" comment="texlive-circuitikz-doc is &lt;2021.186.1.3.3svn58757-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915091" version="1" comment="texlive-cite is &lt;2021.186.5.5svn36428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915092" version="1" comment="texlive-cite-doc is &lt;2021.186.5.5svn36428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915093" version="1" comment="texlive-citeall is &lt;2021.186.1.4svn45975-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915094" version="1" comment="texlive-citeall-doc is &lt;2021.186.1.4svn45975-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915095" version="1" comment="texlive-citeref is &lt;2021.186.1.1svn47407-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915096" version="1" comment="texlive-citeref-doc is &lt;2021.186.1.1svn47407-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915097" version="1" comment="texlive-cje is &lt;2021.186.1.06svn46721-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915098" version="1" comment="texlive-cje-doc is &lt;2021.186.1.06svn46721-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915099" version="1" comment="texlive-cjhebrew is &lt;2021.186.0.0.2asvn43444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915100" version="1" comment="texlive-cjhebrew-doc is &lt;2021.186.0.0.2asvn43444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915101" version="1" comment="texlive-cjhebrew-fonts is &lt;2021.186.0.0.2asvn43444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915102" version="1" comment="texlive-cjk is &lt;2021.186.4.8.4svn36951-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915103" version="1" comment="texlive-cjk-doc is &lt;2021.186.4.8.4svn36951-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915104" version="1" comment="texlive-cjk-gs-integrate is &lt;2021.186.20201206.0svn57081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915105" version="1" comment="texlive-cjk-gs-integrate-doc is &lt;2021.186.20201206.0svn57081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915106" version="1" comment="texlive-cjk-ko is &lt;2021.186.1.9svn58081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915107" version="1" comment="texlive-cjk-ko-doc is &lt;2021.186.1.9svn58081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915108" version="1" comment="texlive-cjkpunct is &lt;2021.186.4.8.4svn41119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915109" version="1" comment="texlive-cjkpunct-doc is &lt;2021.186.4.8.4svn41119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915110" version="1" comment="texlive-cjkutils is &lt;2021.186.4.8.4svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915111" version="1" comment="texlive-cjkutils-doc is &lt;2021.186.4.8.4svn52851-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915112" version="1" comment="texlive-clara is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915113" version="1" comment="texlive-clara-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915114" version="1" comment="texlive-clara-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915115" version="1" comment="texlive-classics is &lt;2021.186.0.0.1asvn53671-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915116" version="1" comment="texlive-classics-doc is &lt;2021.186.0.0.1asvn53671-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915117" version="1" comment="texlive-classicthesis is &lt;2021.186.4.6svn48041-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915118" version="1" comment="texlive-classicthesis-doc is &lt;2021.186.4.6svn48041-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915119" version="1" comment="texlive-classpack is &lt;2021.186.1.19svn55218-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915120" version="1" comment="texlive-classpack-doc is &lt;2021.186.1.19svn55218-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915121" version="1" comment="texlive-cleanthesis is &lt;2021.186.0.0.4.0svn51472-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915122" version="1" comment="texlive-cleanthesis-doc is &lt;2021.186.0.0.4.0svn51472-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915123" version="1" comment="texlive-clearsans is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915124" version="1" comment="texlive-clearsans-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915125" version="1" comment="texlive-clearsans-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915126" version="1" comment="texlive-clefval is &lt;2021.186.0.0.1svn55985-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915127" version="1" comment="texlive-clefval-doc is &lt;2021.186.0.0.1svn55985-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915128" version="1" comment="texlive-cleveref is &lt;2021.186.0.0.21.4svn47525-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915129" version="1" comment="texlive-cleveref-doc is &lt;2021.186.0.0.21.4svn47525-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915130" version="1" comment="texlive-clipboard is &lt;2021.186.0.0.3svn47747-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915131" version="1" comment="texlive-clipboard-doc is &lt;2021.186.0.0.3svn47747-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915132" version="1" comment="texlive-clock is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915133" version="1" comment="texlive-clock-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915134" version="1" comment="texlive-clojure-pamphlet is &lt;2021.186.1.3svn52082-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915135" version="1" comment="texlive-clojure-pamphlet-doc is &lt;2021.186.1.3svn52082-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915136" version="1" comment="texlive-cloze is &lt;2021.186.1.6svn55763-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915137" version="1" comment="texlive-cloze-doc is &lt;2021.186.1.6svn55763-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915138" version="1" comment="texlive-clrdblpg is &lt;2021.186.1.0svn47511-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915139" version="1" comment="texlive-clrdblpg-doc is &lt;2021.186.1.0svn47511-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915140" version="1" comment="texlive-clrscode is &lt;2021.186.1.7svn51136-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915141" version="1" comment="texlive-clrscode-doc is &lt;2021.186.1.7svn51136-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915142" version="1" comment="texlive-clrscode3e is &lt;2021.186.svn51137-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915143" version="1" comment="texlive-clrscode3e-doc is &lt;2021.186.svn51137-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915144" version="1" comment="texlive-clrstrip is &lt;2021.186.svn53537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915145" version="1" comment="texlive-clrstrip-doc is &lt;2021.186.svn53537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915146" version="1" comment="texlive-cluttex is &lt;2021.186.0.0.5svn53698-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915147" version="1" comment="texlive-cluttex-doc is &lt;2021.186.0.0.5svn53698-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915148" version="1" comment="texlive-cm is &lt;2021.186.svn57963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915149" version="1" comment="texlive-cm-doc is &lt;2021.186.svn57963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915150" version="1" comment="texlive-cm-lgc is &lt;2021.186.0.0.5svn28250-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915151" version="1" comment="texlive-cm-lgc-doc is &lt;2021.186.0.0.5svn28250-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915152" version="1" comment="texlive-cm-lgc-fonts is &lt;2021.186.0.0.5svn28250-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915153" version="1" comment="texlive-cm-mf-extra-bold is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915154" version="1" comment="texlive-cm-super is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915155" version="1" comment="texlive-cm-super-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915156" version="1" comment="texlive-cm-super-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915157" version="1" comment="texlive-cm-unicode is &lt;2021.186.0.0.7.0svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915158" version="1" comment="texlive-cm-unicode-doc is &lt;2021.186.0.0.7.0svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915159" version="1" comment="texlive-cm-unicode-fonts is &lt;2021.186.0.0.7.0svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915160" version="1" comment="texlive-cmap is &lt;2021.186.1.0jsvn57640-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915161" version="1" comment="texlive-cmap-doc is &lt;2021.186.1.0jsvn57640-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915162" version="1" comment="texlive-cmarrows is &lt;2021.186.0.0.9svn24378-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915163" version="1" comment="texlive-cmarrows-doc is &lt;2021.186.0.0.9svn24378-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915164" version="1" comment="texlive-cmathbb is &lt;2021.186.1.0svn56414-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915165" version="1" comment="texlive-cmathbb-doc is &lt;2021.186.1.0svn56414-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915166" version="1" comment="texlive-cmathbb-fonts is &lt;2021.186.1.0svn56414-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915167" version="1" comment="texlive-cmbright is &lt;2021.186.8.1svn21107-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915168" version="1" comment="texlive-cmbright-doc is &lt;2021.186.8.1svn21107-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915169" version="1" comment="texlive-cmcyr is &lt;2021.186.svn39273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915170" version="1" comment="texlive-cmcyr-doc is &lt;2021.186.svn39273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915171" version="1" comment="texlive-cmcyr-fonts is &lt;2021.186.svn39273-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915172" version="1" comment="texlive-cmdstring is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915173" version="1" comment="texlive-cmdstring-doc is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915174" version="1" comment="texlive-cmdtrack is &lt;2021.186.svn28910-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915175" version="1" comment="texlive-cmdtrack-doc is &lt;2021.186.svn28910-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915176" version="1" comment="texlive-cmexb is &lt;2021.186.svn54074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915177" version="1" comment="texlive-cmexb-doc is &lt;2021.186.svn54074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915178" version="1" comment="texlive-cmexb-fonts is &lt;2021.186.svn54074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915179" version="1" comment="texlive-cmextra is &lt;2021.186.svn57866-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915180" version="1" comment="texlive-cmll is &lt;2021.186.svn17964-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915181" version="1" comment="texlive-cmll-doc is &lt;2021.186.svn17964-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915182" version="1" comment="texlive-cmll-fonts is &lt;2021.186.svn17964-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915183" version="1" comment="texlive-cmpica is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915184" version="1" comment="texlive-cmpica-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915185" version="1" comment="texlive-cmpj is &lt;2021.186.3.03svn58506-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915186" version="1" comment="texlive-cmpj-doc is &lt;2021.186.3.03svn58506-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915187" version="1" comment="texlive-cmsd is &lt;2021.186.svn18787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915188" version="1" comment="texlive-cmsd-doc is &lt;2021.186.svn18787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915189" version="1" comment="texlive-cmsrb is &lt;2021.186.4.0svn54706-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915190" version="1" comment="texlive-cmsrb-doc is &lt;2021.186.4.0svn54706-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915191" version="1" comment="texlive-cmsrb-fonts is &lt;2021.186.4.0svn54706-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915192" version="1" comment="texlive-cmtiup is &lt;2021.186.2.1svn39728-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915193" version="1" comment="texlive-cmtiup-doc is &lt;2021.186.2.1svn39728-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915194" version="1" comment="texlive-cmupint is &lt;2021.186.1.1svn54735-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915195" version="1" comment="texlive-cmupint-doc is &lt;2021.186.1.1svn54735-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915196" version="1" comment="texlive-cmupint-fonts is &lt;2021.186.1.1svn54735-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915197" version="1" comment="texlive-cnbwp is &lt;2021.186.svn32550-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915198" version="1" comment="texlive-cnbwp-doc is &lt;2021.186.svn32550-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915199" version="1" comment="texlive-cnltx is &lt;2021.186.0.0.15svn55265-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915200" version="1" comment="texlive-cnltx-doc is &lt;2021.186.0.0.15svn55265-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915201" version="1" comment="texlive-cns is &lt;2021.186.4.2.0svn45677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915202" version="1" comment="texlive-cns-doc is &lt;2021.186.4.2.0svn45677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915203" version="1" comment="texlive-cntformats is &lt;2021.186.0.0.7svn34668-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915204" version="1" comment="texlive-cntformats-doc is &lt;2021.186.0.0.7svn34668-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915205" version="1" comment="texlive-cntperchap is &lt;2021.186.0.0.3svn37572-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915206" version="1" comment="texlive-cntperchap-doc is &lt;2021.186.0.0.3svn37572-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915207" version="1" comment="texlive-cochineal is &lt;2021.186.1.066svn58717-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915208" version="1" comment="texlive-cochineal-doc is &lt;2021.186.1.066svn58717-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915209" version="1" comment="texlive-cochineal-fonts is &lt;2021.186.1.066svn58717-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915210" version="1" comment="texlive-codeanatomy is &lt;2021.186.0.0.4_alphasvn51627-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915211" version="1" comment="texlive-codeanatomy-doc is &lt;2021.186.0.0.4_alphasvn51627-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915212" version="1" comment="texlive-codedoc is &lt;2021.186.0.0.3svn17630-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915213" version="1" comment="texlive-codedoc-doc is &lt;2021.186.0.0.3svn17630-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915214" version="1" comment="texlive-codepage is &lt;2021.186.svn51502-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915215" version="1" comment="texlive-codepage-doc is &lt;2021.186.svn51502-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915216" version="1" comment="texlive-codesection is &lt;2021.186.0.0.1svn34481-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915217" version="1" comment="texlive-codesection-doc is &lt;2021.186.0.0.1svn34481-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915218" version="1" comment="texlive-codicefiscaleitaliano is &lt;2021.186.1.2svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915219" version="1" comment="texlive-codicefiscaleitaliano-doc is &lt;2021.186.1.2svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915220" version="1" comment="texlive-coelacanth is &lt;2021.186.0.0.005svn54736-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915221" version="1" comment="texlive-coelacanth-doc is &lt;2021.186.0.0.005svn54736-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915222" version="1" comment="texlive-coelacanth-fonts is &lt;2021.186.0.0.005svn54736-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915223" version="1" comment="texlive-collcell is &lt;2021.186.0.0.5svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915224" version="1" comment="texlive-collcell-doc is &lt;2021.186.0.0.5svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915225" version="1" comment="texlive-collectbox is &lt;2021.186.0.0.4bsvn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915226" version="1" comment="texlive-collectbox-doc is &lt;2021.186.0.0.4bsvn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915227" version="1" comment="texlive-collref is &lt;2021.186.2.0csvn46358-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915228" version="1" comment="texlive-collref-doc is &lt;2021.186.2.0csvn46358-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915229" version="1" comment="texlive-colophon is &lt;2021.186.1.1svn47913-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915230" version="1" comment="texlive-colophon-doc is &lt;2021.186.1.1svn47913-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915231" version="1" comment="texlive-color-edits is &lt;2021.186.1.1svn56707-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915232" version="1" comment="texlive-color-edits-doc is &lt;2021.186.1.1svn56707-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915233" version="1" comment="texlive-colordoc is &lt;2021.186.svn18270-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915234" version="1" comment="texlive-colordoc-doc is &lt;2021.186.svn18270-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915235" version="1" comment="texlive-colorinfo is &lt;2021.186.0.0.3csvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915236" version="1" comment="texlive-colorinfo-doc is &lt;2021.186.0.0.3csvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915237" version="1" comment="texlive-coloring is &lt;2021.186.0.0.2svn41042-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915238" version="1" comment="texlive-coloring-doc is &lt;2021.186.0.0.2svn41042-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915239" version="1" comment="texlive-colorist is &lt;2021.186.svn58434-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915240" version="1" comment="texlive-colorist-doc is &lt;2021.186.svn58434-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915241" version="1" comment="texlive-colorprofiles is &lt;2021.186.20181105svn49086-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915242" version="1" comment="texlive-colorprofiles-doc is &lt;2021.186.20181105svn49086-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915243" version="1" comment="texlive-colorsep is &lt;2021.186.svn13293-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915244" version="1" comment="texlive-colorspace is &lt;2021.186.1.3svn50585-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915245" version="1" comment="texlive-colorspace-doc is &lt;2021.186.1.3svn50585-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915246" version="1" comment="texlive-colortab is &lt;2021.186.1.0svn22155-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915247" version="1" comment="texlive-colortab-doc is &lt;2021.186.1.0svn22155-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915248" version="1" comment="texlive-colortbl is &lt;2021.186.1.0esvn53545-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915249" version="1" comment="texlive-colortbl-doc is &lt;2021.186.1.0esvn53545-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915250" version="1" comment="texlive-colorwav is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915251" version="1" comment="texlive-colorwav-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915252" version="1" comment="texlive-colorweb is &lt;2021.186.1.3svn31490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915253" version="1" comment="texlive-colorweb-doc is &lt;2021.186.1.3svn31490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915254" version="1" comment="texlive-colourchange is &lt;2021.186.1.22svn21741-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915255" version="1" comment="texlive-colourchange-doc is &lt;2021.186.1.22svn21741-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915256" version="1" comment="texlive-combelow is &lt;2021.186.0.0.99fsvn18462-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915257" version="1" comment="texlive-combelow-doc is &lt;2021.186.0.0.99fsvn18462-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915258" version="1" comment="texlive-combine is &lt;2021.186.0.0.7asvn19361-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915259" version="1" comment="texlive-combine-doc is &lt;2021.186.0.0.7asvn19361-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915260" version="1" comment="texlive-combinedgraphics is &lt;2021.186.0.0.2.2svn27198-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915261" version="1" comment="texlive-combinedgraphics-doc is &lt;2021.186.0.0.2.2svn27198-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915262" version="1" comment="texlive-combofont is &lt;2021.186.0.0.3svn51348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915263" version="1" comment="texlive-combofont-doc is &lt;2021.186.0.0.3svn51348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915264" version="1" comment="texlive-comfortaa is &lt;2021.186.3.2svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915265" version="1" comment="texlive-comfortaa-doc is &lt;2021.186.3.2svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915266" version="1" comment="texlive-comfortaa-fonts is &lt;2021.186.3.2svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915267" version="1" comment="texlive-comicneue is &lt;2021.186.1.2svn54891-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915268" version="1" comment="texlive-comicneue-doc is &lt;2021.186.1.2svn54891-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915269" version="1" comment="texlive-comicneue-fonts is &lt;2021.186.1.2svn54891-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915270" version="1" comment="texlive-comma is &lt;2021.186.1.2svn18259-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915271" version="1" comment="texlive-comma-doc is &lt;2021.186.1.2svn18259-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915272" version="1" comment="texlive-commado is &lt;2021.186.r0.11asvn38875-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915273" version="1" comment="texlive-commado-doc is &lt;2021.186.r0.11asvn38875-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915274" version="1" comment="texlive-commath is &lt;2021.186.0.0.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915275" version="1" comment="texlive-commath-doc is &lt;2021.186.0.0.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915276" version="1" comment="texlive-commedit is &lt;2021.186.1.02svn50116-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915277" version="1" comment="texlive-commedit-doc is &lt;2021.186.1.02svn50116-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915278" version="1" comment="texlive-comment is &lt;2021.186.3.8svn41927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915279" version="1" comment="texlive-comment-doc is &lt;2021.186.3.8svn41927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915280" version="1" comment="texlive-commutative-diagrams is &lt;2021.186.1.0.1svn55526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915281" version="1" comment="texlive-commutative-diagrams-doc is &lt;2021.186.1.0.1svn55526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915282" version="1" comment="texlive-compactbib is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915283" version="1" comment="texlive-compare is &lt;2021.186.svn54265-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915284" version="1" comment="texlive-competences is &lt;2021.186.1.0svn47573-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915285" version="1" comment="texlive-competences-doc is &lt;2021.186.1.0svn47573-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915286" version="1" comment="texlive-complexity is &lt;2021.186.0.0.81asvn45322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915287" version="1" comment="texlive-complexity-doc is &lt;2021.186.0.0.81asvn45322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915288" version="1" comment="texlive-components-of-TeX is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915289" version="1" comment="texlive-comprehensive is &lt;2021.186.13.0svn55667-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915290" version="1" comment="texlive-computational-complexity is &lt;2021.186.2.25fsvn44847-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915291" version="1" comment="texlive-computational-complexity-doc is &lt;2021.186.2.25fsvn44847-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915292" version="1" comment="texlive-concepts is &lt;2021.186.0.0.0.5_r1svn29020-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915293" version="1" comment="texlive-concepts-doc is &lt;2021.186.0.0.0.5_r1svn29020-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915294" version="1" comment="texlive-concmath is &lt;2021.186.svn17219-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915295" version="1" comment="texlive-concmath-doc is &lt;2021.186.svn17219-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915296" version="1" comment="texlive-concmath-fonts is &lt;2021.186.svn17218-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915297" version="1" comment="texlive-concmath-fonts-doc is &lt;2021.186.svn17218-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915298" version="1" comment="texlive-concprog is &lt;2021.186.svn18791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915299" version="1" comment="texlive-concprog-doc is &lt;2021.186.svn18791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915300" version="1" comment="texlive-concrete is &lt;2021.186.svn57963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915301" version="1" comment="texlive-concrete-doc is &lt;2021.186.svn57963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915302" version="1" comment="texlive-conditext is &lt;2021.186.1.5svn55387-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915303" version="1" comment="texlive-conditext-doc is &lt;2021.186.1.5svn55387-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915304" version="1" comment="texlive-confproc is &lt;2021.186.0.0.8svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915305" version="1" comment="texlive-confproc-doc is &lt;2021.186.0.0.8svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915306" version="1" comment="texlive-constants is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915307" version="1" comment="texlive-constants-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915308" version="1" comment="texlive-conteq is &lt;2021.186.0.0.1.1svn37868-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915309" version="1" comment="texlive-conteq-doc is &lt;2021.186.0.0.1.1svn37868-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915310" version="1" comment="texlive-context is &lt;2021.186.svn58167-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915311" version="1" comment="texlive-context-account is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915312" version="1" comment="texlive-context-account-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915313" version="1" comment="texlive-context-algorithmic is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915314" version="1" comment="texlive-context-algorithmic-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915315" version="1" comment="texlive-context-animation is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915316" version="1" comment="texlive-context-animation-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915317" version="1" comment="texlive-context-annotation is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915318" version="1" comment="texlive-context-annotation-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915319" version="1" comment="texlive-context-bnf is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915320" version="1" comment="texlive-context-bnf-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915321" version="1" comment="texlive-context-chromato is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915322" version="1" comment="texlive-context-chromato-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915323" version="1" comment="texlive-context-cmscbf is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915324" version="1" comment="texlive-context-cmscbf-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915325" version="1" comment="texlive-context-cmttbf is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915326" version="1" comment="texlive-context-cmttbf-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915327" version="1" comment="texlive-context-construction-plan is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915328" version="1" comment="texlive-context-construction-plan-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915329" version="1" comment="texlive-context-cyrillicnumbers is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915330" version="1" comment="texlive-context-cyrillicnumbers-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915331" version="1" comment="texlive-context-degrade is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915332" version="1" comment="texlive-context-degrade-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915333" version="1" comment="texlive-context-doc is &lt;2021.186.svn58167-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915334" version="1" comment="texlive-context-fancybreak is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915335" version="1" comment="texlive-context-fancybreak-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915336" version="1" comment="texlive-context-filter is &lt;2021.186.svn55718-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915337" version="1" comment="texlive-context-filter-doc is &lt;2021.186.svn55718-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915338" version="1" comment="texlive-context-fonts is &lt;2021.186.svn58167-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915339" version="1" comment="texlive-context-french is &lt;2021.186.svn54215-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915340" version="1" comment="texlive-context-french-doc is &lt;2021.186.svn54215-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915341" version="1" comment="texlive-context-fullpage is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915342" version="1" comment="texlive-context-fullpage-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915343" version="1" comment="texlive-context-gantt is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915344" version="1" comment="texlive-context-gantt-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915345" version="1" comment="texlive-context-gnuplot is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915346" version="1" comment="texlive-context-gnuplot-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915347" version="1" comment="texlive-context-handlecsv is &lt;2021.186.svn51306-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915348" version="1" comment="texlive-context-handlecsv-doc is &lt;2021.186.svn51306-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915349" version="1" comment="texlive-context-inifile is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915350" version="1" comment="texlive-context-inifile-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915351" version="1" comment="texlive-context-layout is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915352" version="1" comment="texlive-context-layout-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915353" version="1" comment="texlive-context-letter is &lt;2021.186.svn56073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915354" version="1" comment="texlive-context-letter-doc is &lt;2021.186.svn56073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915355" version="1" comment="texlive-context-lettrine is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915356" version="1" comment="texlive-context-lettrine-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915357" version="1" comment="texlive-context-mathsets is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915358" version="1" comment="texlive-context-mathsets-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915359" version="1" comment="texlive-context-notes-zh-cn is &lt;2021.186.svn23171-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915360" version="1" comment="texlive-context-rst is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915361" version="1" comment="texlive-context-rst-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915362" version="1" comment="texlive-context-ruby is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915363" version="1" comment="texlive-context-ruby-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915364" version="1" comment="texlive-context-simplefonts is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915365" version="1" comment="texlive-context-simplefonts-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915366" version="1" comment="texlive-context-simpleslides is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915367" version="1" comment="texlive-context-simpleslides-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915368" version="1" comment="texlive-context-title is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915369" version="1" comment="texlive-context-title-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915370" version="1" comment="texlive-context-transliterator is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915371" version="1" comment="texlive-context-transliterator-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915372" version="1" comment="texlive-context-typearea is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915373" version="1" comment="texlive-context-typearea-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915374" version="1" comment="texlive-context-typescripts is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915375" version="1" comment="texlive-context-typescripts-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915376" version="1" comment="texlive-context-vim is &lt;2021.186.svn58082-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915377" version="1" comment="texlive-context-vim-doc is &lt;2021.186.svn58082-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915378" version="1" comment="texlive-context-visualcounter is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915379" version="1" comment="texlive-context-visualcounter-doc is &lt;2021.186.svn47085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915380" version="1" comment="texlive-continue is &lt;2021.186.0.0.2svn49449-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915381" version="1" comment="texlive-continue-doc is &lt;2021.186.0.0.2svn49449-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915382" version="1" comment="texlive-contour is &lt;2021.186.2.14svn18950-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915383" version="1" comment="texlive-contour-doc is &lt;2021.186.2.14svn18950-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915384" version="1" comment="texlive-contracard is &lt;2021.186.2.0.0svn50217-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915385" version="1" comment="texlive-contracard-doc is &lt;2021.186.2.0.0svn50217-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915386" version="1" comment="texlive-conv-xkv is &lt;2021.186.svn43558-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915387" version="1" comment="texlive-conv-xkv-doc is &lt;2021.186.svn43558-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915388" version="1" comment="texlive-convbkmk is &lt;2021.186.0.0.30svn49252-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915389" version="1" comment="texlive-convbkmk-doc is &lt;2021.186.0.0.30svn49252-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915390" version="1" comment="texlive-cooking is &lt;2021.186.0.0.9bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915391" version="1" comment="texlive-cooking-doc is &lt;2021.186.0.0.9bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915392" version="1" comment="texlive-cooking-units is &lt;2021.186.1.46svn53403-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915393" version="1" comment="texlive-cooking-units-doc is &lt;2021.186.1.46svn53403-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915394" version="1" comment="texlive-cookingsymbols is &lt;2021.186.1.1svn35929-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915395" version="1" comment="texlive-cookingsymbols-doc is &lt;2021.186.1.1svn35929-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915396" version="1" comment="texlive-cool is &lt;2021.186.1.35svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915397" version="1" comment="texlive-cool-doc is &lt;2021.186.1.35svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915398" version="1" comment="texlive-coollist is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915399" version="1" comment="texlive-coollist-doc is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915400" version="1" comment="texlive-coolstr is &lt;2021.186.2.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915401" version="1" comment="texlive-coolstr-doc is &lt;2021.186.2.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915402" version="1" comment="texlive-coolthms is &lt;2021.186.1.2svn29062-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915403" version="1" comment="texlive-coolthms-doc is &lt;2021.186.1.2svn29062-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915404" version="1" comment="texlive-cooltooltips is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915405" version="1" comment="texlive-cooltooltips-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915406" version="1" comment="texlive-coordsys is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915407" version="1" comment="texlive-coordsys-doc is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915408" version="1" comment="texlive-copyedit is &lt;2021.186.1.6svn37928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915409" version="1" comment="texlive-copyedit-doc is &lt;2021.186.1.6svn37928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915410" version="1" comment="texlive-copyrightbox is &lt;2021.186.0.0.1svn24829-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915411" version="1" comment="texlive-copyrightbox-doc is &lt;2021.186.0.0.1svn24829-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915412" version="1" comment="texlive-cormorantgaramond is &lt;2021.186.3.601svn54696-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915413" version="1" comment="texlive-cormorantgaramond-doc is &lt;2021.186.3.601svn54696-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915414" version="1" comment="texlive-cormorantgaramond-fonts is &lt;2021.186.3.601svn54696-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915415" version="1" comment="texlive-correctmathalign is &lt;2021.186.1.1svn44131-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915416" version="1" comment="texlive-correctmathalign-doc is &lt;2021.186.1.1svn44131-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915417" version="1" comment="texlive-coseoul is &lt;2021.186.1.1svn23862-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915418" version="1" comment="texlive-coseoul-doc is &lt;2021.186.1.1svn23862-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915419" version="1" comment="texlive-countriesofeurope is &lt;2021.186.0.0.23svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915420" version="1" comment="texlive-countriesofeurope-doc is &lt;2021.186.0.0.23svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915421" version="1" comment="texlive-countriesofeurope-fonts is &lt;2021.186.0.0.23svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915422" version="1" comment="texlive-counttexruns is &lt;2021.186.1.00asvn27576-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915423" version="1" comment="texlive-counttexruns-doc is &lt;2021.186.1.00asvn27576-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915424" version="1" comment="texlive-courier is &lt;2021.186.svn35058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915425" version="1" comment="texlive-courier-fonts is &lt;2021.186.svn35058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915426" version="1" comment="texlive-courier-scaled is &lt;2021.186.svn24940-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915427" version="1" comment="texlive-courier-scaled-doc is &lt;2021.186.svn24940-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915428" version="1" comment="texlive-courierten is &lt;2021.186.svn55436-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915429" version="1" comment="texlive-courierten-doc is &lt;2021.186.svn55436-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915430" version="1" comment="texlive-courierten-fonts is &lt;2021.186.svn55436-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915431" version="1" comment="texlive-courseoutline is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915432" version="1" comment="texlive-courseoutline-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915433" version="1" comment="texlive-coursepaper is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915434" version="1" comment="texlive-coursepaper-doc is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915435" version="1" comment="texlive-coverpage is &lt;2021.186.1.01svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915436" version="1" comment="texlive-coverpage-doc is &lt;2021.186.1.01svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915437" version="1" comment="texlive-covington is &lt;2021.186.2.5svn58589-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915438" version="1" comment="texlive-covington-doc is &lt;2021.186.2.5svn58589-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915439" version="1" comment="texlive-cprotect is &lt;2021.186.1.0esvn21209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915440" version="1" comment="texlive-cprotect-doc is &lt;2021.186.1.0esvn21209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915441" version="1" comment="texlive-cqubeamer is &lt;2021.186.1.0svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915442" version="1" comment="texlive-cqubeamer-doc is &lt;2021.186.1.0svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915443" version="1" comment="texlive-cquthesis is &lt;2021.186.1.50svn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915444" version="1" comment="texlive-cquthesis-doc is &lt;2021.186.1.50svn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915445" version="1" comment="texlive-crbox is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915446" version="1" comment="texlive-crbox-doc is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915447" version="1" comment="texlive-crimson is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915448" version="1" comment="texlive-crimson-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915449" version="1" comment="texlive-crimson-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915450" version="1" comment="texlive-crimsonpro is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915451" version="1" comment="texlive-crimsonpro-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915452" version="1" comment="texlive-crimsonpro-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915453" version="1" comment="texlive-crop is &lt;2021.186.1.10.2svn55424-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915454" version="1" comment="texlive-crop-doc is &lt;2021.186.1.10.2svn55424-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915455" version="1" comment="texlive-crossreference is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915456" version="1" comment="texlive-crossreference-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915457" version="1" comment="texlive-crossreftools is &lt;2021.186.1.0svn55879-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915458" version="1" comment="texlive-crossreftools-doc is &lt;2021.186.1.0svn55879-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915459" version="1" comment="texlive-crossrefware is &lt;2021.186.svn47861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915460" version="1" comment="texlive-crossrefware-doc is &lt;2021.186.svn47861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915461" version="1" comment="texlive-crossword is &lt;2021.186.1.10svn55271-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915462" version="1" comment="texlive-crossword-doc is &lt;2021.186.1.10svn55271-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915463" version="1" comment="texlive-crosswrd is &lt;2021.186.3.0svn16896-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915464" version="1" comment="texlive-crosswrd-doc is &lt;2021.186.3.0svn16896-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915465" version="1" comment="texlive-cryptocode is &lt;2021.186.0.0.40svn55920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915466" version="1" comment="texlive-cryptocode-doc is &lt;2021.186.0.0.40svn55920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915467" version="1" comment="texlive-cryst is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915468" version="1" comment="texlive-cryst-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915469" version="1" comment="texlive-cryst-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915470" version="1" comment="texlive-cs is &lt;2021.186.svn41553-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915471" version="1" comment="texlive-cs-fonts is &lt;2021.186.svn41553-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915472" version="1" comment="texlive-csbulletin is &lt;2021.186.svn54433-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915473" version="1" comment="texlive-csbulletin-doc is &lt;2021.186.svn54433-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915474" version="1" comment="texlive-cslatex is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915475" version="1" comment="texlive-cslatex-doc is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915476" version="1" comment="texlive-csplain is &lt;2021.186.mar._2021svn58353-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915477" version="1" comment="texlive-csquotes is &lt;2021.186.5.2lsvn57844-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915478" version="1" comment="texlive-csquotes-de is &lt;2021.186.1.01svn23371-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915479" version="1" comment="texlive-csquotes-doc is &lt;2021.186.5.2lsvn57844-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915480" version="1" comment="texlive-css-colors is &lt;2021.186.1.02svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915481" version="1" comment="texlive-css-colors-doc is &lt;2021.186.1.02svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915482" version="1" comment="texlive-cstex is &lt;2021.186.svn58354-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915483" version="1" comment="texlive-cstypo is &lt;2021.186.0.0.03svn41986-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915484" version="1" comment="texlive-cstypo-doc is &lt;2021.186.0.0.03svn41986-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915485" version="1" comment="texlive-csvmerge is &lt;2021.186.1.0svn51857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915486" version="1" comment="texlive-csvmerge-doc is &lt;2021.186.1.0svn51857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915487" version="1" comment="texlive-csvsimple is &lt;2021.186.1.21svn51010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915488" version="1" comment="texlive-csvsimple-doc is &lt;2021.186.1.21svn51010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915489" version="1" comment="texlive-ctable is &lt;2021.186.1.31svn38672-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915490" version="1" comment="texlive-ctable-doc is &lt;2021.186.1.31svn38672-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915491" version="1" comment="texlive-ctablestack is &lt;2021.186.1.0svn38514-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915492" version="1" comment="texlive-ctablestack-doc is &lt;2021.186.1.0svn38514-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915493" version="1" comment="texlive-ctan-o-mat is &lt;2021.186.1.2svn51578-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915494" version="1" comment="texlive-ctan-o-mat-doc is &lt;2021.186.1.2svn51578-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915495" version="1" comment="texlive-ctan_chk is &lt;2021.186.1.0svn36304-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915496" version="1" comment="texlive-ctanbib is &lt;2021.186.0.0.1dsvn52145-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915497" version="1" comment="texlive-ctanbib-doc is &lt;2021.186.0.0.1dsvn52145-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915498" version="1" comment="texlive-ctanify is &lt;2021.186.1.9.1svn44129-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915499" version="1" comment="texlive-ctanify-doc is &lt;2021.186.1.9.1svn44129-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915500" version="1" comment="texlive-ctanupload is &lt;2021.186.1.2csvn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915501" version="1" comment="texlive-ctanupload-doc is &lt;2021.186.1.2csvn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915502" version="1" comment="texlive-ctex is &lt;2021.186.2.5.6svn58583-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915503" version="1" comment="texlive-ctex-doc is &lt;2021.186.2.5.6svn58583-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915504" version="1" comment="texlive-ctex-faq is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915505" version="1" comment="texlive-ctib is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915506" version="1" comment="texlive-ctib-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915507" version="1" comment="texlive-ctie is &lt;2021.186.1.1svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915508" version="1" comment="texlive-cuisine is &lt;2021.186.0.0.7svn34453-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915509" version="1" comment="texlive-cuisine-doc is &lt;2021.186.0.0.7svn34453-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915510" version="1" comment="texlive-cuprum is &lt;2021.186.svn49909-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915511" version="1" comment="texlive-cuprum-doc is &lt;2021.186.svn49909-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915512" version="1" comment="texlive-cuprum-fonts is &lt;2021.186.svn49909-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915513" version="1" comment="texlive-currency is &lt;2021.186.0.0.4svn48990-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915514" version="1" comment="texlive-currency-doc is &lt;2021.186.0.0.4svn48990-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915515" version="1" comment="texlive-currfile is &lt;2021.186.0.0.7dsvn56478-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915516" version="1" comment="texlive-currfile-doc is &lt;2021.186.0.0.7dsvn56478-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915517" version="1" comment="texlive-currvita is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915518" version="1" comment="texlive-currvita-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915519" version="1" comment="texlive-cursolatex is &lt;2021.186.svn24139-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915520" version="1" comment="texlive-curve is &lt;2021.186.1.16svn20745-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915521" version="1" comment="texlive-curve-doc is &lt;2021.186.1.16svn20745-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915522" version="1" comment="texlive-curve2e is &lt;2021.186.2.2.15svn57402-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915523" version="1" comment="texlive-curve2e-doc is &lt;2021.186.2.2.15svn57402-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915524" version="1" comment="texlive-curves is &lt;2021.186.1.55svn45255-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915525" version="1" comment="texlive-curves-doc is &lt;2021.186.1.55svn45255-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915526" version="1" comment="texlive-custom-bib is &lt;2021.186.4.33svn24729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915527" version="1" comment="texlive-custom-bib-doc is &lt;2021.186.4.33svn24729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915528" version="1" comment="texlive-cutwin is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915529" version="1" comment="texlive-cutwin-doc is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915530" version="1" comment="texlive-cv is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915531" version="1" comment="texlive-cv-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915532" version="1" comment="texlive-cv4tw is &lt;2021.186.0.0.2svn34577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915533" version="1" comment="texlive-cv4tw-doc is &lt;2021.186.0.0.2svn34577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915534" version="1" comment="texlive-cweb is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915535" version="1" comment="texlive-cweb-doc is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915536" version="1" comment="texlive-cweb-latex is &lt;2021.186.svn28878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915537" version="1" comment="texlive-cweb-latex-doc is &lt;2021.186.svn28878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915538" version="1" comment="texlive-cweb-old is &lt;2021.186.svn49271-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915539" version="1" comment="texlive-cyber is &lt;2021.186.2.2svn46776-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915540" version="1" comment="texlive-cyber-doc is &lt;2021.186.2.2svn46776-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915541" version="1" comment="texlive-cybercic is &lt;2021.186.2.1svn37659-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915542" version="1" comment="texlive-cybercic-doc is &lt;2021.186.2.1svn37659-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915543" version="1" comment="texlive-cyklop is &lt;2021.186.0.0.915svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915544" version="1" comment="texlive-cyklop-doc is &lt;2021.186.0.0.915svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915545" version="1" comment="texlive-cyklop-fonts is &lt;2021.186.0.0.915svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915546" version="1" comment="texlive-cyrillic is &lt;2021.186.svn47350-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915547" version="1" comment="texlive-cyrillic-bin is &lt;2021.186.svn53559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915548" version="1" comment="texlive-cyrillic-bin-doc is &lt;2021.186.svn53559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915549" version="1" comment="texlive-cyrillic-doc is &lt;2021.186.svn47350-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915550" version="1" comment="texlive-cyrplain is &lt;2021.186.svn45692-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915551" version="1" comment="texlive-dad is &lt;2021.186.1.2svn54191-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915552" version="1" comment="texlive-dad-doc is &lt;2021.186.1.2svn54191-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915553" version="1" comment="texlive-dad-fonts is &lt;2021.186.1.2svn54191-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915554" version="1" comment="texlive-dancers is &lt;2021.186.svn13293-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915555" version="1" comment="texlive-dantelogo is &lt;2021.186.0.0.03svn38599-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915556" version="1" comment="texlive-dantelogo-doc is &lt;2021.186.0.0.03svn38599-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915557" version="1" comment="texlive-dantelogo-fonts is &lt;2021.186.0.0.03svn38599-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915558" version="1" comment="texlive-dashbox is &lt;2021.186.1.14svn23425-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915559" version="1" comment="texlive-dashbox-doc is &lt;2021.186.1.14svn23425-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915560" version="1" comment="texlive-dashrule is &lt;2021.186.1.3svn29579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915561" version="1" comment="texlive-dashrule-doc is &lt;2021.186.1.3svn29579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915562" version="1" comment="texlive-dashundergaps is &lt;2021.186.2.0hsvn58150-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915563" version="1" comment="texlive-dashundergaps-doc is &lt;2021.186.2.0hsvn58150-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915564" version="1" comment="texlive-dataref is &lt;2021.186.0.0.6svn42883-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915565" version="1" comment="texlive-dataref-doc is &lt;2021.186.0.0.6svn42883-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915566" version="1" comment="texlive-datatool is &lt;2021.186.2.32svn52663-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915567" version="1" comment="texlive-datatool-doc is &lt;2021.186.2.32svn52663-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915568" version="1" comment="texlive-datax is &lt;2021.186.1.1.1svn57033-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915569" version="1" comment="texlive-datax-doc is &lt;2021.186.1.1.1svn57033-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915570" version="1" comment="texlive-dateiliste is &lt;2021.186.0.0.6svn27974-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915571" version="1" comment="texlive-dateiliste-doc is &lt;2021.186.0.0.6svn27974-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915572" version="1" comment="texlive-datenumber is &lt;2021.186.0.0.02svn18951-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915573" version="1" comment="texlive-datenumber-doc is &lt;2021.186.0.0.02svn18951-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915574" version="1" comment="texlive-datetime is &lt;2021.186.2.60svn36650-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915575" version="1" comment="texlive-datetime-doc is &lt;2021.186.2.60svn36650-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915576" version="1" comment="texlive-datetime2 is &lt;2021.186.1.5.7svn58590-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915577" version="1" comment="texlive-datetime2-bahasai is &lt;2021.186.1.01svn46287-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915578" version="1" comment="texlive-datetime2-bahasai-doc is &lt;2021.186.1.01svn46287-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915579" version="1" comment="texlive-datetime2-doc is &lt;2021.186.1.5.7svn58590-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915580" version="1" comment="texlive-datetime2-basque is &lt;2021.186.1.2asvn47064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915581" version="1" comment="texlive-datetime2-basque-doc is &lt;2021.186.1.2asvn47064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915582" version="1" comment="texlive-datetime2-breton is &lt;2021.186.1.2svn52647-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915583" version="1" comment="texlive-datetime2-breton-doc is &lt;2021.186.1.2svn52647-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915584" version="1" comment="texlive-datetime2-bulgarian is &lt;2021.186.1.1svn47031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915585" version="1" comment="texlive-datetime2-bulgarian-doc is &lt;2021.186.1.1svn47031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915586" version="1" comment="texlive-datetime2-catalan is &lt;2021.186.1.1svn47032-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915587" version="1" comment="texlive-datetime2-catalan-doc is &lt;2021.186.1.1svn47032-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915588" version="1" comment="texlive-datetime2-croatian is &lt;2021.186.1.0svn36682-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915589" version="1" comment="texlive-datetime2-croatian-doc is &lt;2021.186.1.0svn36682-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915590" version="1" comment="texlive-datetime2-czech is &lt;2021.186.1.1svn47033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915591" version="1" comment="texlive-datetime2-czech-doc is &lt;2021.186.1.1svn47033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915592" version="1" comment="texlive-datetime2-danish is &lt;2021.186.1.1svn47034-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915593" version="1" comment="texlive-datetime2-danish-doc is &lt;2021.186.1.1svn47034-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915594" version="1" comment="texlive-datetime2-dutch is &lt;2021.186.1.1svn47355-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915595" version="1" comment="texlive-datetime2-dutch-doc is &lt;2021.186.1.1svn47355-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915596" version="1" comment="texlive-datetime2-en-fulltext is &lt;2021.186.1.0svn36705-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915597" version="1" comment="texlive-datetime2-en-fulltext-doc is &lt;2021.186.1.0svn36705-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915598" version="1" comment="texlive-datetime2-english is &lt;2021.186.1.05svn52479-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915599" version="1" comment="texlive-datetime2-english-doc is &lt;2021.186.1.05svn52479-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915600" version="1" comment="texlive-datetime2-esperanto is &lt;2021.186.1.1svn47356-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915601" version="1" comment="texlive-datetime2-esperanto-doc is &lt;2021.186.1.1svn47356-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915602" version="1" comment="texlive-datetime2-estonian is &lt;2021.186.1.1svn47565-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915603" version="1" comment="texlive-datetime2-estonian-doc is &lt;2021.186.1.1svn47565-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915604" version="1" comment="texlive-datetime2-finnish is &lt;2021.186.1.2svn47047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915605" version="1" comment="texlive-datetime2-finnish-doc is &lt;2021.186.1.2svn47047-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915606" version="1" comment="texlive-datetime2-french is &lt;2021.186.1.03svn56393-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915607" version="1" comment="texlive-datetime2-french-doc is &lt;2021.186.1.03svn56393-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915608" version="1" comment="texlive-datetime2-galician is &lt;2021.186.1.0svn47631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915609" version="1" comment="texlive-datetime2-galician-doc is &lt;2021.186.1.0svn47631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915610" version="1" comment="texlive-datetime2-german is &lt;2021.186.3.0svn53125-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915611" version="1" comment="texlive-datetime2-german-doc is &lt;2021.186.3.0svn53125-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915612" version="1" comment="texlive-datetime2-greek is &lt;2021.186.1.1svn47533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915613" version="1" comment="texlive-datetime2-greek-doc is &lt;2021.186.1.1svn47533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915614" version="1" comment="texlive-datetime2-hebrew is &lt;2021.186.1.1svn47534-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915615" version="1" comment="texlive-datetime2-hebrew-doc is &lt;2021.186.1.1svn47534-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915616" version="1" comment="texlive-datetime2-icelandic is &lt;2021.186.1.1svn47501-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915617" version="1" comment="texlive-datetime2-icelandic-doc is &lt;2021.186.1.1svn47501-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915618" version="1" comment="texlive-datetime2-irish is &lt;2021.186.1.1svn47632-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915619" version="1" comment="texlive-datetime2-irish-doc is &lt;2021.186.1.1svn47632-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915620" version="1" comment="texlive-datetime2-it-fulltext is &lt;2021.186.1.6svn54779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915621" version="1" comment="texlive-datetime2-it-fulltext-doc is &lt;2021.186.1.6svn54779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915622" version="1" comment="texlive-datetime2-italian is &lt;2021.186.1.3svn37146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915623" version="1" comment="texlive-datetime2-italian-doc is &lt;2021.186.1.3svn37146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915624" version="1" comment="texlive-datetime2-latin is &lt;2021.186.1.0svn47748-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915625" version="1" comment="texlive-datetime2-latin-doc is &lt;2021.186.1.0svn47748-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915626" version="1" comment="texlive-datetime2-lsorbian is &lt;2021.186.1.1svn47749-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915627" version="1" comment="texlive-datetime2-lsorbian-doc is &lt;2021.186.1.1svn47749-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915628" version="1" comment="texlive-datetime2-magyar is &lt;2021.186.1.1svn48266-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915629" version="1" comment="texlive-datetime2-magyar-doc is &lt;2021.186.1.1svn48266-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915630" version="1" comment="texlive-datetime2-norsk is &lt;2021.186.1.1svn48267-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915631" version="1" comment="texlive-datetime2-norsk-doc is &lt;2021.186.1.1svn48267-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915632" version="1" comment="texlive-datetime2-polish is &lt;2021.186.1.1svn48456-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915633" version="1" comment="texlive-datetime2-polish-doc is &lt;2021.186.1.1svn48456-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915634" version="1" comment="texlive-datetime2-portuges is &lt;2021.186.1.1svn48457-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915635" version="1" comment="texlive-datetime2-portuges-doc is &lt;2021.186.1.1svn48457-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915636" version="1" comment="texlive-datetime2-romanian is &lt;2021.186.1.02svn56394-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915637" version="1" comment="texlive-datetime2-romanian-doc is &lt;2021.186.1.02svn56394-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915638" version="1" comment="texlive-datetime2-russian is &lt;2021.186.1.1svn49345-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915639" version="1" comment="texlive-datetime2-russian-doc is &lt;2021.186.1.1svn49345-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915640" version="1" comment="texlive-datetime2-samin is &lt;2021.186.1.1svn49346-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915641" version="1" comment="texlive-datetime2-samin-doc is &lt;2021.186.1.1svn49346-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915642" version="1" comment="texlive-datetime2-scottish is &lt;2021.186.1.1svn52101-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915643" version="1" comment="texlive-datetime2-scottish-doc is &lt;2021.186.1.1svn52101-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915644" version="1" comment="texlive-datetime2-serbian is &lt;2021.186.2.1.0svn52893-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915645" version="1" comment="texlive-datetime2-serbian-doc is &lt;2021.186.2.1.0svn52893-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915646" version="1" comment="texlive-datetime2-slovak is &lt;2021.186.1.1svn52281-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915647" version="1" comment="texlive-datetime2-slovak-doc is &lt;2021.186.1.1svn52281-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915648" version="1" comment="texlive-datetime2-slovene is &lt;2021.186.1.1svn52282-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915649" version="1" comment="texlive-datetime2-slovene-doc is &lt;2021.186.1.1svn52282-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915650" version="1" comment="texlive-datetime2-spanish is &lt;2021.186.1.1svn45785-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915651" version="1" comment="texlive-datetime2-spanish-doc is &lt;2021.186.1.1svn45785-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915652" version="1" comment="texlive-datetime2-swedish is &lt;2021.186.1.0svn36700-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915653" version="1" comment="texlive-datetime2-swedish-doc is &lt;2021.186.1.0svn36700-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915654" version="1" comment="texlive-datetime2-turkish is &lt;2021.186.1.1svn52331-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915655" version="1" comment="texlive-datetime2-turkish-doc is &lt;2021.186.1.1svn52331-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915656" version="1" comment="texlive-datetime2-ukrainian is &lt;2021.186.1.2asvn47552-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915657" version="1" comment="texlive-datetime2-ukrainian-doc is &lt;2021.186.1.2asvn47552-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915658" version="1" comment="texlive-datetime2-usorbian is &lt;2021.186.1.1svn52375-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915659" version="1" comment="texlive-datetime2-usorbian-doc is &lt;2021.186.1.1svn52375-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915660" version="1" comment="texlive-datetime2-welsh is &lt;2021.186.1.1svn52553-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915661" version="1" comment="texlive-datetime2-welsh-doc is &lt;2021.186.1.1svn52553-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915662" version="1" comment="texlive-dblfloatfix is &lt;2021.186.1.0asvn28983-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915663" version="1" comment="texlive-dblfloatfix-doc is &lt;2021.186.1.0asvn28983-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915664" version="1" comment="texlive-dccpaper is &lt;2021.186.2.1svn57522-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915665" version="1" comment="texlive-dccpaper-doc is &lt;2021.186.2.1svn57522-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915666" version="1" comment="texlive-dcpic is &lt;2021.186.5.0.0svn30206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915667" version="1" comment="texlive-dcpic-doc is &lt;2021.186.5.0.0svn30206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915668" version="1" comment="texlive-ddphonism is &lt;2021.186.0.0.2svn52009-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915669" version="1" comment="texlive-ddphonism-doc is &lt;2021.186.0.0.2svn52009-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915670" version="1" comment="texlive-de-macro is &lt;2021.186.1.4svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915671" version="1" comment="texlive-de-macro-doc is &lt;2021.186.1.4svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915672" version="1" comment="texlive-decimal is &lt;2021.186.svn23374-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915673" version="1" comment="texlive-decimal-doc is &lt;2021.186.svn23374-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915674" version="1" comment="texlive-decision-table is &lt;2021.186.0.0.0.3svn57094-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915675" version="1" comment="texlive-decision-table-doc is &lt;2021.186.0.0.0.3svn57094-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915676" version="1" comment="texlive-decorule is &lt;2021.186.0.0.7svn55230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915677" version="1" comment="texlive-decorule-doc is &lt;2021.186.0.0.7svn55230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915678" version="1" comment="texlive-dehyph is &lt;2021.186.svn48599-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915679" version="1" comment="texlive-dehyph-exptl is &lt;2021.186.0.0.7svn58212-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915680" version="1" comment="texlive-dehyph-exptl-doc is &lt;2021.186.0.0.7svn58212-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915681" version="1" comment="texlive-dejavu is &lt;2021.186.2.34svn31771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915682" version="1" comment="texlive-dejavu-doc is &lt;2021.186.2.34svn31771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915683" version="1" comment="texlive-dejavu-fonts is &lt;2021.186.2.34svn31771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915684" version="1" comment="texlive-dejavu-otf is &lt;2021.186.0.0.04svn45991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915685" version="1" comment="texlive-dejavu-otf-doc is &lt;2021.186.0.0.04svn45991-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915686" version="1" comment="texlive-delim is &lt;2021.186.1.0svn23974-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915687" version="1" comment="texlive-delim-doc is &lt;2021.186.1.0svn23974-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915688" version="1" comment="texlive-delimseasy is &lt;2021.186.2.0svn39589-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915689" version="1" comment="texlive-delimseasy-doc is &lt;2021.186.2.0svn39589-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915690" version="1" comment="texlive-delimset is &lt;2021.186.1.1svn49544-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915691" version="1" comment="texlive-delimset-doc is &lt;2021.186.1.1svn49544-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915692" version="1" comment="texlive-delimtxt is &lt;2021.186.svn16549-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915693" version="1" comment="texlive-delimtxt-doc is &lt;2021.186.svn16549-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915694" version="1" comment="texlive-denisbdoc is &lt;2021.186.0.0.9.1svn56664-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915695" version="1" comment="texlive-denisbdoc-doc is &lt;2021.186.0.0.9.1svn56664-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915696" version="1" comment="texlive-derivative is &lt;2021.186.0.0.98svn55890-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915697" version="1" comment="texlive-derivative-doc is &lt;2021.186.0.0.98svn55890-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915698" version="1" comment="texlive-detex is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915699" version="1" comment="texlive-dhua is &lt;2021.186.0.0.11svn24035-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915700" version="1" comment="texlive-dhua-doc is &lt;2021.186.0.0.11svn24035-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915701" version="1" comment="texlive-diabetes-logbook is &lt;2021.186.svn54810-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915702" version="1" comment="texlive-diabetes-logbook-doc is &lt;2021.186.svn54810-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915703" version="1" comment="texlive-diadia is &lt;2021.186.1.1svn37656-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915704" version="1" comment="texlive-diadia-doc is &lt;2021.186.1.1svn37656-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915705" version="1" comment="texlive-diagbox is &lt;2021.186.2.4svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915706" version="1" comment="texlive-diagbox-doc is &lt;2021.186.2.4svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915707" version="1" comment="texlive-diagmac2 is &lt;2021.186.2.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915708" version="1" comment="texlive-diagmac2-doc is &lt;2021.186.2.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915709" version="1" comment="texlive-diagnose is &lt;2021.186.0.0.2svn19387-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915710" version="1" comment="texlive-diagnose-doc is &lt;2021.186.0.0.2svn19387-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915711" version="1" comment="texlive-dialogl is &lt;2021.186.svn28946-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915712" version="1" comment="texlive-dialogl-doc is &lt;2021.186.svn28946-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915713" version="1" comment="texlive-dice is &lt;2021.186.svn28501-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915714" version="1" comment="texlive-dice-doc is &lt;2021.186.svn28501-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915715" version="1" comment="texlive-dichokey is &lt;2021.186.svn17192-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915716" version="1" comment="texlive-dichokey-doc is &lt;2021.186.svn17192-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915717" version="1" comment="texlive-dickimaw is &lt;2021.186.svn32925-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915718" version="1" comment="texlive-dictsym is &lt;2021.186.svn20031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915719" version="1" comment="texlive-dictsym-doc is &lt;2021.186.svn20031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915720" version="1" comment="texlive-dictsym-fonts is &lt;2021.186.svn20031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915721" version="1" comment="texlive-diffcoeff is &lt;2021.186.3.2svn53244-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915722" version="1" comment="texlive-diffcoeff-doc is &lt;2021.186.3.2svn53244-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915723" version="1" comment="texlive-digiconfigs is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915724" version="1" comment="texlive-digiconfigs-doc is &lt;2021.186.0.0.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915725" version="1" comment="texlive-dijkstra is &lt;2021.186.0.0.12svn55661-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915726" version="1" comment="texlive-dijkstra-doc is &lt;2021.186.0.0.12svn55661-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915727" version="1" comment="texlive-din1505 is &lt;2021.186.svn19441-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915728" version="1" comment="texlive-din1505-doc is &lt;2021.186.svn19441-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915729" version="1" comment="texlive-dinat is &lt;2021.186.2.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915730" version="1" comment="texlive-dinat-doc is &lt;2021.186.2.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915731" version="1" comment="texlive-dinbrief is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915732" version="1" comment="texlive-dinbrief-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915733" version="1" comment="texlive-dingbat is &lt;2021.186.1.0svn27918-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915734" version="1" comment="texlive-dingbat-doc is &lt;2021.186.1.0svn27918-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915735" version="1" comment="texlive-directory is &lt;2021.186.1.20svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915736" version="1" comment="texlive-directory-doc is &lt;2021.186.1.20svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915737" version="1" comment="texlive-dirtree is &lt;2021.186.0.0.32svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915738" version="1" comment="texlive-dirtree-doc is &lt;2021.186.0.0.32svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915739" version="1" comment="texlive-dirtytalk is &lt;2021.186.1.0svn20520-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915740" version="1" comment="texlive-dirtytalk-doc is &lt;2021.186.1.0svn20520-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915741" version="1" comment="texlive-disser is &lt;2021.186.1.5.0svn43417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915742" version="1" comment="texlive-disser-doc is &lt;2021.186.1.5.0svn43417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915743" version="1" comment="texlive-ditaa is &lt;2021.186.0.0.9svn48932-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915744" version="1" comment="texlive-ditaa-doc is &lt;2021.186.0.0.9svn48932-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915745" version="1" comment="texlive-dithesis is &lt;2021.186.0.0.2svn34295-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915746" version="1" comment="texlive-dithesis-doc is &lt;2021.186.0.0.2svn34295-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915747" version="1" comment="texlive-dk-bib is &lt;2021.186.0.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915748" version="1" comment="texlive-dk-bib-doc is &lt;2021.186.0.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915749" version="1" comment="texlive-dlfltxb is &lt;2021.186.svn17337-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915750" version="1" comment="texlive-dlfltxb-doc is &lt;2021.186.svn17337-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915751" version="1" comment="texlive-dnaseq is &lt;2021.186.0.0.01svn17194-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915752" version="1" comment="texlive-dnaseq-doc is &lt;2021.186.0.0.01svn17194-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915753" version="1" comment="texlive-dnp is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915754" version="1" comment="texlive-doc-pictex is &lt;2021.186.svn24927-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915755" version="1" comment="texlive-docbytex is &lt;2021.186.svn34294-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915756" version="1" comment="texlive-docbytex-doc is &lt;2021.186.svn34294-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915757" version="1" comment="texlive-doclicense is &lt;2021.186.2.3.0svn58350-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915758" version="1" comment="texlive-doclicense-doc is &lt;2021.186.2.3.0svn58350-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915759" version="1" comment="texlive-docmfp is &lt;2021.186.1.2dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915760" version="1" comment="texlive-docmfp-doc is &lt;2021.186.1.2dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915761" version="1" comment="texlive-docmute is &lt;2021.186.1.4svn25741-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915762" version="1" comment="texlive-docmute-doc is &lt;2021.186.1.4svn25741-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915763" version="1" comment="texlive-docsurvey is &lt;2021.186.svn57362-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915764" version="1" comment="texlive-doctools is &lt;2021.186.0.0.1svn34474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915765" version="1" comment="texlive-doctools-doc is &lt;2021.186.0.0.1svn34474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915766" version="1" comment="texlive-documentation is &lt;2021.186.0.0.1svn34521-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915767" version="1" comment="texlive-documentation-doc is &lt;2021.186.0.0.1svn34521-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915768" version="1" comment="texlive-docutils is &lt;2021.186.svn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915769" version="1" comment="texlive-docutils-doc is &lt;2021.186.svn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915770" version="1" comment="texlive-doi is &lt;2021.186.svn48634-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915771" version="1" comment="texlive-doi-doc is &lt;2021.186.svn48634-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915772" version="1" comment="texlive-doipubmed is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915773" version="1" comment="texlive-doipubmed-doc is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915774" version="1" comment="texlive-domitian is &lt;2021.186.1.0.1svn55286-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915775" version="1" comment="texlive-domitian-doc is &lt;2021.186.1.0.1svn55286-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915776" version="1" comment="texlive-domitian-fonts is &lt;2021.186.1.0.1svn55286-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915777" version="1" comment="texlive-dosepsbin is &lt;2021.186.1.2svn29752-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915778" version="1" comment="texlive-dosepsbin-doc is &lt;2021.186.1.2svn29752-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915779" version="1" comment="texlive-dot2texi is &lt;2021.186.3.0svn26237-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915780" version="1" comment="texlive-dot2texi-doc is &lt;2021.186.3.0svn26237-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915781" version="1" comment="texlive-dotarrow is &lt;2021.186.0.0.01asvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915782" version="1" comment="texlive-dotarrow-doc is &lt;2021.186.0.0.01asvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915783" version="1" comment="texlive-dotlessi is &lt;2021.186.1.1svn51476-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915784" version="1" comment="texlive-dotlessi-doc is &lt;2021.186.1.1svn51476-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915785" version="1" comment="texlive-dotseqn is &lt;2021.186.1.1svn17195-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915786" version="1" comment="texlive-dotseqn-doc is &lt;2021.186.1.1svn17195-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915787" version="1" comment="texlive-dottex is &lt;2021.186.0.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915788" version="1" comment="texlive-dottex-doc is &lt;2021.186.0.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915789" version="1" comment="texlive-doublestroke is &lt;2021.186.1.111svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915790" version="1" comment="texlive-doublestroke-doc is &lt;2021.186.1.111svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915791" version="1" comment="texlive-doublestroke-fonts is &lt;2021.186.1.111svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915792" version="1" comment="texlive-doulossil is &lt;2021.186.0.0.1svn56407-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915793" version="1" comment="texlive-doulossil-doc is &lt;2021.186.0.0.1svn56407-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915794" version="1" comment="texlive-doulossil-fonts is &lt;2021.186.0.0.1svn56407-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915795" version="1" comment="texlive-dowith is &lt;2021.186.r0.32svn38860-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915796" version="1" comment="texlive-dowith-doc is &lt;2021.186.r0.32svn38860-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915797" version="1" comment="texlive-download is &lt;2021.186.1.2svn52257-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915798" version="1" comment="texlive-download-doc is &lt;2021.186.1.2svn52257-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915799" version="1" comment="texlive-dox is &lt;2021.186.2.4svn46011-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915800" version="1" comment="texlive-dox-doc is &lt;2021.186.2.4svn46011-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915801" version="1" comment="texlive-dozenal is &lt;2021.186.7.2svn47680-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915802" version="1" comment="texlive-dozenal-doc is &lt;2021.186.7.2svn47680-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915803" version="1" comment="texlive-dozenal-fonts is &lt;2021.186.7.2svn47680-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915804" version="1" comment="texlive-dpcircling is &lt;2021.186.1.0svn54994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915805" version="1" comment="texlive-dpcircling-doc is &lt;2021.186.1.0svn54994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915806" version="1" comment="texlive-dpfloat is &lt;2021.186.svn17196-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915807" version="1" comment="texlive-dpfloat-doc is &lt;2021.186.svn17196-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915808" version="1" comment="texlive-dprogress is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915809" version="1" comment="texlive-dprogress-doc is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915810" version="1" comment="texlive-drac is &lt;2021.186.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915811" version="1" comment="texlive-drac-doc is &lt;2021.186.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915812" version="1" comment="texlive-draftcopy is &lt;2021.186.2.16svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915813" version="1" comment="texlive-draftcopy-doc is &lt;2021.186.2.16svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915814" version="1" comment="texlive-draftfigure is &lt;2021.186.0.0.2svn44854-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915815" version="1" comment="texlive-draftfigure-doc is &lt;2021.186.0.0.2svn44854-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915816" version="1" comment="texlive-draftwatermark is &lt;2021.186.3.0svn57099-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915817" version="1" comment="texlive-draftwatermark-doc is &lt;2021.186.3.0svn57099-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915818" version="1" comment="texlive-dramatist is &lt;2021.186.1.2esvn35866-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915819" version="1" comment="texlive-dramatist-doc is &lt;2021.186.1.2esvn35866-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915820" version="1" comment="texlive-dratex is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915821" version="1" comment="texlive-dratex-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915822" version="1" comment="texlive-drawmatrix is &lt;2021.186.1.5.0svn44471-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915823" version="1" comment="texlive-drawmatrix-doc is &lt;2021.186.1.5.0svn44471-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915824" version="1" comment="texlive-drawstack is &lt;2021.186.svn28582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915825" version="1" comment="texlive-drawstack-doc is &lt;2021.186.svn28582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915826" version="1" comment="texlive-drm is &lt;2021.186.4.4svn38157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915827" version="1" comment="texlive-drm-doc is &lt;2021.186.4.4svn38157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915828" version="1" comment="texlive-drm-fonts is &lt;2021.186.4.4svn38157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915829" version="1" comment="texlive-droid is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915830" version="1" comment="texlive-droid-doc is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915831" version="1" comment="texlive-droid-fonts is &lt;2021.186.3.2svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915832" version="1" comment="texlive-droit-fr is &lt;2021.186.1.2svn39802-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915833" version="1" comment="texlive-droit-fr-doc is &lt;2021.186.1.2svn39802-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915834" version="1" comment="texlive-drs is &lt;2021.186.1.1bsvn19232-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915835" version="1" comment="texlive-drs-doc is &lt;2021.186.1.1bsvn19232-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915836" version="1" comment="texlive-drv is &lt;2021.186.0.0.97svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915837" version="1" comment="texlive-drv-doc is &lt;2021.186.0.0.97svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915838" version="1" comment="texlive-dsptricks is &lt;2021.186.1.0svn34724-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915839" version="1" comment="texlive-dsptricks-doc is &lt;2021.186.1.0svn34724-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915840" version="1" comment="texlive-dsserif is &lt;2021.186.1.01svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915841" version="1" comment="texlive-dsserif-doc is &lt;2021.186.1.01svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915842" version="1" comment="texlive-dsserif-fonts is &lt;2021.186.1.01svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915843" version="1" comment="texlive-dtk is &lt;2021.186.2.08hsvn56696-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915844" version="1" comment="texlive-dtk-bibliography is &lt;2021.186.2021_01svn58212-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915845" version="1" comment="texlive-dtk-doc is &lt;2021.186.2.08hsvn56696-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915846" version="1" comment="texlive-dtl is &lt;2021.186.0.0.6.1svn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915847" version="1" comment="texlive-dtxdescribe is &lt;2021.186.1.02svn51652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915848" version="1" comment="texlive-dtxdescribe-doc is &lt;2021.186.1.02svn51652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915849" version="1" comment="texlive-dtxgallery is &lt;2021.186.1svn49504-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915850" version="1" comment="texlive-dtxgen is &lt;2021.186.1.08svn51663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915851" version="1" comment="texlive-dtxgen-doc is &lt;2021.186.1.08svn51663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915852" version="1" comment="texlive-dtxtut is &lt;2021.186.2.1svn38375-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915853" version="1" comment="texlive-ducksay is &lt;2021.186.2.5asvn56800-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915854" version="1" comment="texlive-ducksay-doc is &lt;2021.186.2.5asvn56800-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915855" version="1" comment="texlive-duckuments is &lt;2021.186.0.0.5svn52271-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915856" version="1" comment="texlive-duckuments-doc is &lt;2021.186.0.0.5svn52271-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915857" version="1" comment="texlive-duerer is &lt;2021.186.svn20741-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915858" version="1" comment="texlive-duerer-doc is &lt;2021.186.svn20741-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915859" version="1" comment="texlive-duerer-latex is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915860" version="1" comment="texlive-duerer-latex-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915861" version="1" comment="texlive-duotenzor is &lt;2021.186.1.00svn18728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915862" version="1" comment="texlive-duotenzor-doc is &lt;2021.186.1.00svn18728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915863" version="1" comment="texlive-dutchcal is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915864" version="1" comment="texlive-dutchcal-doc is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915865" version="1" comment="texlive-dutchcal-fonts is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915866" version="1" comment="texlive-dvdcoll is &lt;2021.186.1.1asvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915867" version="1" comment="texlive-dvdcoll-doc is &lt;2021.186.1.1asvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915868" version="1" comment="texlive-dvgloss is &lt;2021.186.0.0.1svn29103-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915869" version="1" comment="texlive-dvgloss-doc is &lt;2021.186.0.0.1svn29103-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915870" version="1" comment="texlive-dviasm is &lt;2021.186.svn56373-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915871" version="1" comment="texlive-dviasm-doc is &lt;2021.186.svn56373-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915872" version="1" comment="texlive-dvicopy is &lt;2021.186.1.5svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915873" version="1" comment="texlive-dvidvi is &lt;2021.186.svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915874" version="1" comment="texlive-dviincl is &lt;2021.186.1.00svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915875" version="1" comment="texlive-dviincl-doc is &lt;2021.186.1.00svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915876" version="1" comment="texlive-dviinfox is &lt;2021.186.1.04svn44515-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915877" version="1" comment="texlive-dviinfox-doc is &lt;2021.186.1.04svn44515-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915878" version="1" comment="texlive-dviljk is &lt;2021.186.svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915879" version="1" comment="texlive-dviout-util is &lt;2021.186.svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915880" version="1" comment="texlive-dvipdfmx is &lt;2021.186.svn58645-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915881" version="1" comment="texlive-dvipdfmx-doc is &lt;2021.186.svn58645-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915882" version="1" comment="texlive-dvipng is &lt;2021.186.1.17svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915883" version="1" comment="texlive-dvipos is &lt;2021.186.svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915884" version="1" comment="texlive-dvips is &lt;2021.186.svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915885" version="1" comment="texlive-dvips-doc is &lt;2021.186.svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915886" version="1" comment="texlive-dvipsconfig is &lt;2021.186.1.6svn13293-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915887" version="1" comment="texlive-dvisvgm is &lt;2021.186.2.11svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915888" version="1" comment="texlive-dynamicnumber is &lt;2021.186.0.0.1.3svn38726-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915889" version="1" comment="texlive-dynamicnumber-doc is &lt;2021.186.0.0.1.3svn38726-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915890" version="1" comment="texlive-dynblocks is &lt;2021.186.0.0.2bsvn35193-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915891" version="1" comment="texlive-dynblocks-doc is &lt;2021.186.0.0.2bsvn35193-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915892" version="1" comment="texlive-dynkin-diagrams is &lt;2021.186.3.1415926535897932svn58758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915893" version="1" comment="texlive-dynkin-diagrams-doc is &lt;2021.186.3.1415926535897932svn58758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915894" version="1" comment="texlive-dyntree is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915895" version="1" comment="texlive-dyntree-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915896" version="1" comment="texlive-e-french is &lt;2021.186.6.11svn52027-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915897" version="1" comment="texlive-e-french-doc is &lt;2021.186.6.11svn52027-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915898" version="1" comment="texlive-ean is &lt;2021.186.svn20851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915899" version="1" comment="texlive-ean-doc is &lt;2021.186.svn20851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915900" version="1" comment="texlive-ean13isbn is &lt;2021.186.svn57514-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915901" version="1" comment="texlive-ean13isbn-doc is &lt;2021.186.svn57514-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915902" version="1" comment="texlive-easy is &lt;2021.186.0.0.99svn19440-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915903" version="1" comment="texlive-easy-doc is &lt;2021.186.0.0.99svn19440-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915904" version="1" comment="texlive-easy-todo is &lt;2021.186.svn32677-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915905" version="1" comment="texlive-easy-todo-doc is &lt;2021.186.svn32677-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915906" version="1" comment="texlive-easybook is &lt;2021.186.1.24esvn58762-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915907" version="1" comment="texlive-easybook-doc is &lt;2021.186.1.24esvn58762-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915908" version="1" comment="texlive-easyfig is &lt;2021.186.1.2asvn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915909" version="1" comment="texlive-easyfig-doc is &lt;2021.186.1.2asvn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915910" version="1" comment="texlive-easyfloats is &lt;2021.186.1.0.0svn57204-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915911" version="1" comment="texlive-easyfloats-doc is &lt;2021.186.1.0.0svn57204-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915912" version="1" comment="texlive-easyformat is &lt;2021.186.1.4.0svn44543-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915913" version="1" comment="texlive-easyformat-doc is &lt;2021.186.1.4.0svn44543-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915914" version="1" comment="texlive-easylist is &lt;2021.186.1.3svn32661-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915915" version="1" comment="texlive-easylist-doc is &lt;2021.186.1.3svn32661-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915916" version="1" comment="texlive-easyreview is &lt;2021.186.1.0svn38352-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915917" version="1" comment="texlive-easyreview-doc is &lt;2021.186.1.0svn38352-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915918" version="1" comment="texlive-ebezier is &lt;2021.186.4svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915919" version="1" comment="texlive-ebezier-doc is &lt;2021.186.4svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915920" version="1" comment="texlive-ebgaramond is &lt;2021.186.svn54721-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915921" version="1" comment="texlive-ebgaramond-doc is &lt;2021.186.svn54721-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915922" version="1" comment="texlive-ebgaramond-fonts is &lt;2021.186.svn54721-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915923" version="1" comment="texlive-ebgaramond-maths is &lt;2021.186.1.2svn52168-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915924" version="1" comment="texlive-ebgaramond-maths-doc is &lt;2021.186.1.2svn52168-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915925" version="1" comment="texlive-ebook is &lt;2021.186.svn29466-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915926" version="1" comment="texlive-ebook-doc is &lt;2021.186.svn29466-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915927" version="1" comment="texlive-ebproof is &lt;2021.186.2.1.1svn57544-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915928" version="1" comment="texlive-ebproof-doc is &lt;2021.186.2.1.1svn57544-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915929" version="1" comment="texlive-ebsthesis is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915930" version="1" comment="texlive-ebsthesis-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915931" version="1" comment="texlive-ec is &lt;2021.186.1.0svn25033-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915932" version="1" comment="texlive-ec-doc is &lt;2021.186.1.0svn25033-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915933" version="1" comment="texlive-ecc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915934" version="1" comment="texlive-ecc-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915935" version="1" comment="texlive-ecclesiastic is &lt;2021.186.0.0.3svn38172-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915936" version="1" comment="texlive-ecclesiastic-doc is &lt;2021.186.0.0.3svn38172-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915937" version="1" comment="texlive-ecgdraw is &lt;2021.186.0.0.1svn41617-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915938" version="1" comment="texlive-ecgdraw-doc is &lt;2021.186.0.0.1svn41617-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915939" version="1" comment="texlive-ecltree is &lt;2021.186.1.1asvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915940" version="1" comment="texlive-ecltree-doc is &lt;2021.186.1.1asvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915941" version="1" comment="texlive-eco is &lt;2021.186.1.3svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915942" version="1" comment="texlive-eco-doc is &lt;2021.186.1.3svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915943" version="1" comment="texlive-ecobiblatex is &lt;2021.186.1.0svn39233-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915944" version="1" comment="texlive-ecobiblatex-doc is &lt;2021.186.1.0svn39233-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915945" version="1" comment="texlive-econ-bst is &lt;2021.186.2.8svn54191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915946" version="1" comment="texlive-econ-bst-doc is &lt;2021.186.2.8svn54191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915947" version="1" comment="texlive-econlipsum is &lt;2021.186.0.0.8.2svn58390-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915948" version="1" comment="texlive-econlipsum-doc is &lt;2021.186.0.0.8.2svn58390-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915949" version="1" comment="texlive-econometrics is &lt;2021.186.1.0svn39396-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915950" version="1" comment="texlive-econometrics-doc is &lt;2021.186.1.0svn39396-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915951" version="1" comment="texlive-economic is &lt;2021.186.svn32639-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915952" version="1" comment="texlive-economic-doc is &lt;2021.186.svn32639-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915953" version="1" comment="texlive-ecothesis is &lt;2021.186.1.2svn48007-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915954" version="1" comment="texlive-ecv is &lt;2021.186.0.0.3svn24928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915955" version="1" comment="texlive-ecv-doc is &lt;2021.186.0.0.3svn24928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915956" version="1" comment="texlive-eczar is &lt;2021.186.0.0.1svn57716-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915957" version="1" comment="texlive-eczar-doc is &lt;2021.186.0.0.1svn57716-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915958" version="1" comment="texlive-eczar-fonts is &lt;2021.186.0.0.1svn57716-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915959" version="1" comment="texlive-ed is &lt;2021.186.1.8svn25231-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915960" version="1" comment="texlive-ed-doc is &lt;2021.186.1.8svn25231-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915961" version="1" comment="texlive-edfnotes is &lt;2021.186.0.0.6bsvn21540-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915962" version="1" comment="texlive-edfnotes-doc is &lt;2021.186.0.0.6bsvn21540-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915963" version="1" comment="texlive-edichokey is &lt;2021.186.2.01ysvn56223-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915964" version="1" comment="texlive-edichokey-doc is &lt;2021.186.2.01ysvn56223-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915965" version="1" comment="texlive-edmac is &lt;2021.186.3.17svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915966" version="1" comment="texlive-edmac-doc is &lt;2021.186.3.17svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915967" version="1" comment="texlive-edmargin is &lt;2021.186.1.2svn27599-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915968" version="1" comment="texlive-edmargin-doc is &lt;2021.186.1.2svn27599-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915969" version="1" comment="texlive-ednotes is &lt;2021.186.1.3asvn35829-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915970" version="1" comment="texlive-ednotes-doc is &lt;2021.186.1.3asvn35829-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915971" version="1" comment="texlive-eemeir is &lt;2021.186.1.1bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915972" version="1" comment="texlive-eemeir-doc is &lt;2021.186.1.1bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915973" version="1" comment="texlive-eepic is &lt;2021.186.1.1esvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915974" version="1" comment="texlive-eepic-doc is &lt;2021.186.1.1esvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915975" version="1" comment="texlive-efbox is &lt;2021.186.1.0svn33236-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915976" version="1" comment="texlive-efbox-doc is &lt;2021.186.1.0svn33236-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915977" version="1" comment="texlive-egameps is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915978" version="1" comment="texlive-egameps-doc is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915979" version="1" comment="texlive-egplot is &lt;2021.186.1.02asvn20617-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915980" version="1" comment="texlive-egplot-doc is &lt;2021.186.1.02asvn20617-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915981" version="1" comment="texlive-ehhline is &lt;2021.186.1.1svn54676-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915982" version="1" comment="texlive-ehhline-doc is &lt;2021.186.1.1svn54676-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915983" version="1" comment="texlive-eiad is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915984" version="1" comment="texlive-eiad-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915985" version="1" comment="texlive-eiad-ltx is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915986" version="1" comment="texlive-eiad-ltx-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915987" version="1" comment="texlive-eijkhout is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915988" version="1" comment="texlive-einfart is &lt;2021.186.svn58414-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915989" version="1" comment="texlive-einfart-doc is &lt;2021.186.svn58414-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915990" version="1" comment="texlive-ejpecp is &lt;2021.186.1.9.0svn56728-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915991" version="1" comment="texlive-ejpecp-doc is &lt;2021.186.1.9.0svn56728-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915992" version="1" comment="texlive-ekaia is &lt;2021.186.1.06svn49594-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915993" version="1" comment="texlive-ekaia-doc is &lt;2021.186.1.06svn49594-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915994" version="1" comment="texlive-ekdosis is &lt;2021.186.1.2svn58721-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915995" version="1" comment="texlive-ekdosis-doc is &lt;2021.186.1.2svn58721-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915996" version="1" comment="texlive-ektype-tanka is &lt;2021.186.0.0.2svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915997" version="1" comment="texlive-ektype-tanka-doc is &lt;2021.186.0.0.2svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915998" version="1" comment="texlive-ektype-tanka-fonts is &lt;2021.186.0.0.2svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009915999" version="1" comment="texlive-elbioimp is &lt;2021.186.1.2svn21758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916000" version="1" comment="texlive-elbioimp-doc is &lt;2021.186.1.2svn21758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916001" version="1" comment="texlive-electrum is &lt;2021.186.1.005_bsvn19705-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916002" version="1" comment="texlive-electrum-doc is &lt;2021.186.1.005_bsvn19705-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916003" version="1" comment="texlive-electrum-fonts is &lt;2021.186.1.005_bsvn19705-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916004" version="1" comment="texlive-eledform is &lt;2021.186.1.1asvn38114-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916005" version="1" comment="texlive-eledform-doc is &lt;2021.186.1.1asvn38114-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916006" version="1" comment="texlive-eledmac is &lt;2021.186.1.24.12svn45418-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916007" version="1" comment="texlive-eledmac-doc is &lt;2021.186.1.24.12svn45418-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916008" version="1" comment="texlive-elegantbook is &lt;2021.186.3.11svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916009" version="1" comment="texlive-elegantbook-doc is &lt;2021.186.3.11svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916010" version="1" comment="texlive-elegantnote is &lt;2021.186.2.30svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916011" version="1" comment="texlive-elegantnote-doc is &lt;2021.186.2.30svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916012" version="1" comment="texlive-elegantpaper is &lt;2021.186.0.0.09svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916013" version="1" comment="texlive-elegantpaper-doc is &lt;2021.186.0.0.09svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916014" version="1" comment="texlive-elements is &lt;2021.186.0.0.3svn52398-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916015" version="1" comment="texlive-elements-doc is &lt;2021.186.0.0.3svn52398-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916016" version="1" comment="texlive-ellipse is &lt;2021.186.1.0svn39025-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916017" version="1" comment="texlive-ellipse-doc is &lt;2021.186.1.0svn39025-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916018" version="1" comment="texlive-ellipsis is &lt;2021.186.1.8svn55418-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916019" version="1" comment="texlive-ellipsis-doc is &lt;2021.186.1.8svn55418-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916020" version="1" comment="texlive-elmath is &lt;2021.186.1.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916021" version="1" comment="texlive-elmath-doc is &lt;2021.186.1.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916022" version="1" comment="texlive-elocalloc is &lt;2021.186.0.0.03svn42712-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916023" version="1" comment="texlive-elocalloc-doc is &lt;2021.186.0.0.03svn42712-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916024" version="1" comment="texlive-elpres is &lt;2021.186.0.0.8svn58015-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916025" version="1" comment="texlive-elpres-doc is &lt;2021.186.0.0.8svn58015-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916026" version="1" comment="texlive-els-cas-templates is &lt;2021.186.2.1svn54317-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916027" version="1" comment="texlive-els-cas-templates-doc is &lt;2021.186.2.1svn54317-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916028" version="1" comment="texlive-elsarticle is &lt;2021.186.3.3svn56999-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916029" version="1" comment="texlive-elsarticle-doc is &lt;2021.186.3.3svn56999-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916030" version="1" comment="texlive-elteikthesis is &lt;2021.186.2.1svn55928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916031" version="1" comment="texlive-elteikthesis-doc is &lt;2021.186.2.1svn55928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916032" version="1" comment="texlive-eltex is &lt;2021.186.2.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916033" version="1" comment="texlive-eltex-doc is &lt;2021.186.2.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916034" version="1" comment="texlive-elvish is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916035" version="1" comment="texlive-elvish-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916036" version="1" comment="texlive-elzcards is &lt;2021.186.1.60svn51894-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916037" version="1" comment="texlive-elzcards-doc is &lt;2021.186.1.60svn51894-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916038" version="1" comment="texlive-emarks is &lt;2021.186.1.0svn24504-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916039" version="1" comment="texlive-emarks-doc is &lt;2021.186.1.0svn24504-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916040" version="1" comment="texlive-embedall is &lt;2021.186.2.0svn51177-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916041" version="1" comment="texlive-embedall-doc is &lt;2021.186.2.0svn51177-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916042" version="1" comment="texlive-embedfile is &lt;2021.186.2.11svn54865-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916043" version="1" comment="texlive-embedfile-doc is &lt;2021.186.2.11svn54865-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916044" version="1" comment="texlive-embrac is &lt;2021.186.0.0.9asvn57814-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916045" version="1" comment="texlive-embrac-doc is &lt;2021.186.0.0.9asvn57814-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916046" version="1" comment="texlive-emf is &lt;2021.186.1svn42023-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916047" version="1" comment="texlive-emf-doc is &lt;2021.186.1svn42023-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916048" version="1" comment="texlive-emisa is &lt;2021.186.2.3.0svn57013-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916049" version="1" comment="texlive-emisa-doc is &lt;2021.186.2.3.0svn57013-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916050" version="1" comment="texlive-emoji is &lt;2021.186.0.0.2.1svn55678-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916051" version="1" comment="texlive-emoji-doc is &lt;2021.186.0.0.2.1svn55678-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916052" version="1" comment="texlive-emojicite is &lt;2021.186.0.0.3svn55131-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916053" version="1" comment="texlive-emojicite-doc is &lt;2021.186.0.0.3svn55131-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916054" version="1" comment="texlive-emp is &lt;2021.186.svn23483-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916055" version="1" comment="texlive-emp-doc is &lt;2021.186.svn23483-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916056" version="1" comment="texlive-emptypage is &lt;2021.186.1.2svn18064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916057" version="1" comment="texlive-emptypage-doc is &lt;2021.186.1.2svn18064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916058" version="1" comment="texlive-emulateapj is &lt;2021.186.svn28469-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916059" version="1" comment="texlive-emulateapj-doc is &lt;2021.186.svn28469-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916060" version="1" comment="texlive-enctex is &lt;2021.186.svn34957-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916061" version="1" comment="texlive-enctex-doc is &lt;2021.186.svn34957-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916062" version="1" comment="texlive-encxvlna is &lt;2021.186.1.1svn34087-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916063" version="1" comment="texlive-encxvlna-doc is &lt;2021.186.1.1svn34087-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916064" version="1" comment="texlive-endfloat is &lt;2021.186.2.7svn57090-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916065" version="1" comment="texlive-endfloat-doc is &lt;2021.186.2.7svn57090-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916066" version="1" comment="texlive-endheads is &lt;2021.186.1.6svn43750-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916067" version="1" comment="texlive-endheads-doc is &lt;2021.186.1.6svn43750-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916068" version="1" comment="texlive-endiagram is &lt;2021.186.0.0.1dsvn34486-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916069" version="1" comment="texlive-endiagram-doc is &lt;2021.186.0.0.1dsvn34486-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916070" version="1" comment="texlive-endnotes is &lt;2021.186.svn53319-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916071" version="1" comment="texlive-endnotes-doc is &lt;2021.186.svn53319-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916072" version="1" comment="texlive-endnotes-hy is &lt;2021.186.svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916073" version="1" comment="texlive-endnotes-hy-doc is &lt;2021.186.svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916074" version="1" comment="texlive-endnotesj is &lt;2021.186.3.0svn47703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916075" version="1" comment="texlive-endnotesj-doc is &lt;2021.186.3.0svn47703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916076" version="1" comment="texlive-endofproofwd is &lt;2021.186.svn55643-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916077" version="1" comment="texlive-endofproofwd-doc is &lt;2021.186.svn55643-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916078" version="1" comment="texlive-engpron is &lt;2021.186.2svn16558-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916079" version="1" comment="texlive-engpron-doc is &lt;2021.186.2svn16558-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916080" version="1" comment="texlive-engrec is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916081" version="1" comment="texlive-engrec-doc is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916082" version="1" comment="texlive-engtlc is &lt;2021.186.3.2svn28571-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916083" version="1" comment="texlive-engtlc-doc is &lt;2021.186.3.2svn28571-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916084" version="1" comment="texlive-enigma is &lt;2021.186.0.0.1svn29802-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916085" version="1" comment="texlive-enigma-doc is &lt;2021.186.0.0.1svn29802-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916086" version="1" comment="texlive-enotez is &lt;2021.186.0.0.10csvn57130-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916087" version="1" comment="texlive-enotez-doc is &lt;2021.186.0.0.10csvn57130-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916088" version="1" comment="texlive-enumitem is &lt;2021.186.3.9svn51423-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916089" version="1" comment="texlive-enumitem-doc is &lt;2021.186.3.9svn51423-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916090" version="1" comment="texlive-enumitem-zref is &lt;2021.186.1.8svn21472-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916091" version="1" comment="texlive-enumitem-zref-doc is &lt;2021.186.1.8svn21472-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916092" version="1" comment="texlive-envbig is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916093" version="1" comment="texlive-envbig-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916094" version="1" comment="texlive-environ is &lt;2021.186.0.0.3svn56615-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916095" version="1" comment="texlive-environ-doc is &lt;2021.186.0.0.3svn56615-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916096" version="1" comment="texlive-envlab is &lt;2021.186.1.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916097" version="1" comment="texlive-envlab-doc is &lt;2021.186.1.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916098" version="1" comment="texlive-epigrafica is &lt;2021.186.1.01svn17210-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916099" version="1" comment="texlive-epigrafica-doc is &lt;2021.186.1.01svn17210-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916100" version="1" comment="texlive-epigrafica-fonts is &lt;2021.186.1.01svn17210-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916101" version="1" comment="texlive-epigram is &lt;2021.186.svn20513-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916102" version="1" comment="texlive-epigraph is &lt;2021.186.1.5esvn54857-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916103" version="1" comment="texlive-epigraph-doc is &lt;2021.186.1.5esvn54857-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916104" version="1" comment="texlive-epigraph-keys is &lt;2021.186.1.0svn54851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916105" version="1" comment="texlive-epigraph-keys-doc is &lt;2021.186.1.0svn54851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916106" version="1" comment="texlive-epiolmec is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916107" version="1" comment="texlive-epiolmec-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916108" version="1" comment="texlive-epiolmec-fonts is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916109" version="1" comment="texlive-eplain is &lt;2021.186.3.11svn57186-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916110" version="1" comment="texlive-eplain-doc is &lt;2021.186.3.11svn57186-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916111" version="1" comment="texlive-epsdice is &lt;2021.186.2.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916112" version="1" comment="texlive-epsdice-doc is &lt;2021.186.2.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916113" version="1" comment="texlive-epsf is &lt;2021.186.2.7.4svn21461-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916114" version="1" comment="texlive-epsf-doc is &lt;2021.186.2.7.4svn21461-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916115" version="1" comment="texlive-epsf-dvipdfmx is &lt;2021.186.2014svn35575-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916116" version="1" comment="texlive-epsf-dvipdfmx-doc is &lt;2021.186.2014svn35575-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916117" version="1" comment="texlive-epsincl is &lt;2021.186.0.0.2svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916118" version="1" comment="texlive-epsincl-doc is &lt;2021.186.0.0.2svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916119" version="1" comment="texlive-epslatex-fr is &lt;2021.186.svn19440-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916120" version="1" comment="texlive-epspdf is &lt;2021.186.0.0.6.5svn53472-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916121" version="1" comment="texlive-epspdf-doc is &lt;2021.186.0.0.6.5svn53472-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916122" version="1" comment="texlive-epspdfconversion is &lt;2021.186.0.0.61svn18703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916123" version="1" comment="texlive-epspdfconversion-doc is &lt;2021.186.0.0.61svn18703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916124" version="1" comment="texlive-epstopdf is &lt;2021.186.2.28svn48684-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916125" version="1" comment="texlive-epstopdf-doc is &lt;2021.186.2.28svn48684-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916126" version="1" comment="texlive-epstopdf-pkg is &lt;2021.186.2.11svn53546-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916127" version="1" comment="texlive-epstopdf-pkg-doc is &lt;2021.186.2.11svn53546-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916128" version="1" comment="texlive-eq-pin2corr is &lt;2021.186.1.0svn57815-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916129" version="1" comment="texlive-eq-pin2corr-doc is &lt;2021.186.1.0svn57815-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916130" version="1" comment="texlive-eqell is &lt;2021.186.svn22931-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916131" version="1" comment="texlive-eqell-doc is &lt;2021.186.svn22931-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916132" version="1" comment="texlive-eqexpl is &lt;2021.186.1.1svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916133" version="1" comment="texlive-eqexpl-doc is &lt;2021.186.1.1svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916134" version="1" comment="texlive-eqlist is &lt;2021.186.2.1svn32257-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916135" version="1" comment="texlive-eqlist-doc is &lt;2021.186.2.1svn32257-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916136" version="1" comment="texlive-eqnalign is &lt;2021.186.1.0asvn43278-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916137" version="1" comment="texlive-eqnalign-doc is &lt;2021.186.1.0asvn43278-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916138" version="1" comment="texlive-eqname is &lt;2021.186.svn20678-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916139" version="1" comment="texlive-eqnarray is &lt;2021.186.1.3svn20641-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916140" version="1" comment="texlive-eqnarray-doc is &lt;2021.186.1.3svn20641-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916141" version="1" comment="texlive-eqnnumwarn is &lt;2021.186.1.0svn45511-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916142" version="1" comment="texlive-eqnnumwarn-doc is &lt;2021.186.1.0svn45511-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916143" version="1" comment="texlive-eqparbox is &lt;2021.186.4.1svn45215-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916144" version="1" comment="texlive-eqparbox-doc is &lt;2021.186.4.1svn45215-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916145" version="1" comment="texlive-erdc is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916146" version="1" comment="texlive-erdc-doc is &lt;2021.186.1.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916147" version="1" comment="texlive-erewhon is &lt;2021.186.1.115svn58722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916148" version="1" comment="texlive-erewhon-doc is &lt;2021.186.1.115svn58722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916149" version="1" comment="texlive-erewhon-fonts is &lt;2021.186.1.115svn58722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916150" version="1" comment="texlive-erewhon-math is &lt;2021.186.0.0.45svn56703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916151" version="1" comment="texlive-erewhon-math-doc is &lt;2021.186.0.0.45svn56703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916152" version="1" comment="texlive-erewhon-math-fonts is &lt;2021.186.0.0.45svn56703-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916153" version="1" comment="texlive-errata is &lt;2021.186.0.0.3svn42428-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916154" version="1" comment="texlive-errata-doc is &lt;2021.186.0.0.3svn42428-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916155" version="1" comment="texlive-erw-l3 is &lt;2021.186.3.1svn55414-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916156" version="1" comment="texlive-erw-l3-doc is &lt;2021.186.3.1svn55414-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916157" version="1" comment="texlive-es-tex-faq is &lt;2021.186.1.97svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916158" version="1" comment="texlive-esami is &lt;2021.186.2.5svn47639-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916159" version="1" comment="texlive-esami-doc is &lt;2021.186.2.5svn47639-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916160" version="1" comment="texlive-esdiff is &lt;2021.186.1.2svn21385-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916161" version="1" comment="texlive-esdiff-doc is &lt;2021.186.1.2svn21385-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916162" version="1" comment="texlive-esindex is &lt;2021.186.1.7svn52342-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916163" version="1" comment="texlive-esindex-doc is &lt;2021.186.1.7svn52342-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916164" version="1" comment="texlive-esint is &lt;2021.186.1.2dsvn52240-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916165" version="1" comment="texlive-esint-doc is &lt;2021.186.1.2dsvn52240-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916166" version="1" comment="texlive-esint-type1 is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916167" version="1" comment="texlive-esint-type1-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916168" version="1" comment="texlive-esint-type1-fonts is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916169" version="1" comment="texlive-esk is &lt;2021.186.1.0svn18115-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916170" version="1" comment="texlive-esk-doc is &lt;2021.186.1.0svn18115-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916171" version="1" comment="texlive-eskd is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916172" version="1" comment="texlive-eskd-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916173" version="1" comment="texlive-eskdx is &lt;2021.186.0.0.98svn29235-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916174" version="1" comment="texlive-eskdx-doc is &lt;2021.186.0.0.98svn29235-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916175" version="1" comment="texlive-eso-pic is &lt;2021.186.3.0asvn56658-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916176" version="1" comment="texlive-eso-pic-doc is &lt;2021.186.3.0asvn56658-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916177" version="1" comment="texlive-esrelation is &lt;2021.186.svn37236-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916178" version="1" comment="texlive-esrelation-doc is &lt;2021.186.svn37236-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916179" version="1" comment="texlive-esrelation-fonts is &lt;2021.186.svn37236-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916180" version="1" comment="texlive-esstix is &lt;2021.186.1.0svn22426-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916181" version="1" comment="texlive-esstix-doc is &lt;2021.186.1.0svn22426-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916182" version="1" comment="texlive-esstix-fonts is &lt;2021.186.1.0svn22426-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916183" version="1" comment="texlive-estcpmm is &lt;2021.186.0.0.4svn17335-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916184" version="1" comment="texlive-estcpmm-doc is &lt;2021.186.0.0.4svn17335-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916185" version="1" comment="texlive-esvect is &lt;2021.186.1.3svn32098-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916186" version="1" comment="texlive-esvect-doc is &lt;2021.186.1.3svn32098-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916187" version="1" comment="texlive-esvect-fonts is &lt;2021.186.1.3svn32098-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916188" version="1" comment="texlive-etaremune is &lt;2021.186.1.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916189" version="1" comment="texlive-etaremune-doc is &lt;2021.186.1.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916190" version="1" comment="texlive-etbb is &lt;2021.186.1.051svn56390-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916191" version="1" comment="texlive-etbb-doc is &lt;2021.186.1.051svn56390-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916192" version="1" comment="texlive-etbb-fonts is &lt;2021.186.1.051svn56390-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916193" version="1" comment="texlive-etdipa is &lt;2021.186.2.6svn36354-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916194" version="1" comment="texlive-etex is &lt;2021.186.svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916195" version="1" comment="texlive-etex-doc is &lt;2021.186.svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916196" version="1" comment="texlive-etex-pkg is &lt;2021.186.2.7svn41784-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916197" version="1" comment="texlive-etex-pkg-doc is &lt;2021.186.2.7svn41784-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916198" version="1" comment="texlive-etexcmds is &lt;2021.186.1.7svn53171-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916199" version="1" comment="texlive-etexcmds-doc is &lt;2021.186.1.7svn53171-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916200" version="1" comment="texlive-etextools is &lt;2021.186.3.1415926svn20694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916201" version="1" comment="texlive-etextools-doc is &lt;2021.186.3.1415926svn20694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916202" version="1" comment="texlive-ethiop is &lt;2021.186.0.0.7svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916203" version="1" comment="texlive-ethiop-doc is &lt;2021.186.0.0.7svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916204" version="1" comment="texlive-ethiop-t1 is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916205" version="1" comment="texlive-ethiop-t1-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916206" version="1" comment="texlive-ethiop-t1-fonts is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916207" version="1" comment="texlive-etoc is &lt;2021.186.1.09csvn55156-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916208" version="1" comment="texlive-etoc-doc is &lt;2021.186.1.09csvn55156-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916209" version="1" comment="texlive-etoolbox is &lt;2021.186.2.5ksvn56554-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916210" version="1" comment="texlive-etoolbox-de is &lt;2021.186.1svn21906-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916211" version="1" comment="texlive-etoolbox-doc is &lt;2021.186.2.5ksvn56554-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916212" version="1" comment="texlive-etsvthor is &lt;2021.186.1.0svn48186-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916213" version="1" comment="texlive-etsvthor-doc is &lt;2021.186.1.0svn48186-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916214" version="1" comment="texlive-euclideangeometry is &lt;2021.186.0.0.1.8svn54897-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916215" version="1" comment="texlive-euclideangeometry-doc is &lt;2021.186.0.0.1.8svn54897-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916216" version="1" comment="texlive-euenc is &lt;2021.186.0.0.1hsvn19795-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916217" version="1" comment="texlive-euenc-doc is &lt;2021.186.0.0.1hsvn19795-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916218" version="1" comment="texlive-euflag is &lt;2021.186.0.0.8svn55265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916219" version="1" comment="texlive-euflag-doc is &lt;2021.186.0.0.8svn55265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916220" version="1" comment="texlive-eukdate is &lt;2021.186.1.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916221" version="1" comment="texlive-eukdate-doc is &lt;2021.186.1.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916222" version="1" comment="texlive-euler is &lt;2021.186.2.5svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916223" version="1" comment="texlive-euler-doc is &lt;2021.186.2.5svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916224" version="1" comment="texlive-eulerpx is &lt;2021.186.0.0.2.1svn43735-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916225" version="1" comment="texlive-eulerpx-doc is &lt;2021.186.0.0.2.1svn43735-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916226" version="1" comment="texlive-eulervm is &lt;2021.186.4.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916227" version="1" comment="texlive-eulervm-doc is &lt;2021.186.4.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916228" version="1" comment="texlive-euro is &lt;2021.186.1.1svn22191-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916229" version="1" comment="texlive-euro-ce is &lt;2021.186.3.0bsvn25714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916230" version="1" comment="texlive-euro-ce-doc is &lt;2021.186.3.0bsvn25714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916231" version="1" comment="texlive-euro-doc is &lt;2021.186.1.1svn22191-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916232" version="1" comment="texlive-europasscv is &lt;2021.186.svn56829-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916233" version="1" comment="texlive-europasscv-doc is &lt;2021.186.svn56829-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916234" version="1" comment="texlive-europecv is &lt;2021.186.svn57641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916235" version="1" comment="texlive-europecv-doc is &lt;2021.186.svn57641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916236" version="1" comment="texlive-eurosym is &lt;2021.186.1.4_subrfixsvn17265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916237" version="1" comment="texlive-eurosym-doc is &lt;2021.186.1.4_subrfixsvn17265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916238" version="1" comment="texlive-eurosym-fonts is &lt;2021.186.1.4_subrfixsvn17265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916239" version="1" comment="texlive-euxm is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916240" version="1" comment="texlive-everyhook is &lt;2021.186.1.2svn35675-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916241" version="1" comment="texlive-everyhook-doc is &lt;2021.186.1.2svn35675-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916242" version="1" comment="texlive-everypage is &lt;2021.186.2.0bsvn56694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916243" version="1" comment="texlive-everypage-doc is &lt;2021.186.2.0bsvn56694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916244" version="1" comment="texlive-everysel is &lt;2021.186.2.1svn57489-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916245" version="1" comment="texlive-everysel-doc is &lt;2021.186.2.1svn57489-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916246" version="1" comment="texlive-everyshi is &lt;2021.186.4.00svn57001-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916247" version="1" comment="texlive-everyshi-doc is &lt;2021.186.4.00svn57001-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916248" version="1" comment="texlive-exam is &lt;2021.186.2.7svn58023-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916249" version="1" comment="texlive-exam-doc is &lt;2021.186.2.7svn58023-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916250" version="1" comment="texlive-exam-n is &lt;2021.186.1.1.4svn42755-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916251" version="1" comment="texlive-exam-n-doc is &lt;2021.186.1.1.4svn42755-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916252" version="1" comment="texlive-exam-randomizechoices is &lt;2021.186.0.0.1svn49662-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916253" version="1" comment="texlive-exam-randomizechoices-doc is &lt;2021.186.0.0.1svn49662-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916254" version="1" comment="texlive-examdesign is &lt;2021.186.1.101svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916255" version="1" comment="texlive-examdesign-doc is &lt;2021.186.1.101svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916256" version="1" comment="texlive-example is &lt;2021.186.svn33398-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916257" version="1" comment="texlive-examplep is &lt;2021.186.0.0.04svn55265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916258" version="1" comment="texlive-examplep-doc is &lt;2021.186.0.0.04svn55265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916259" version="1" comment="texlive-exceltex is &lt;2021.186.0.0.5.1svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916260" version="1" comment="texlive-exceltex-doc is &lt;2021.186.0.0.5.1svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916261" version="1" comment="texlive-excludeonly is &lt;2021.186.1.0svn17262-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916262" version="1" comment="texlive-excludeonly-doc is &lt;2021.186.1.0svn17262-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916263" version="1" comment="texlive-exercise is &lt;2021.186.1.6svn35417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916264" version="1" comment="texlive-exercise-doc is &lt;2021.186.1.6svn35417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916265" version="1" comment="texlive-exercisebank is &lt;2021.186.0.0.3.0svn50448-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916266" version="1" comment="texlive-exercisebank-doc is &lt;2021.186.0.0.3.0svn50448-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916267" version="1" comment="texlive-exercisepoints is &lt;2021.186.1.2.3svn49590-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916268" version="1" comment="texlive-exercisepoints-doc is &lt;2021.186.1.2.3svn49590-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916269" version="1" comment="texlive-exercises is &lt;2021.186.1.1svn55188-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916270" version="1" comment="texlive-exercises-doc is &lt;2021.186.1.1svn55188-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916271" version="1" comment="texlive-exesheet is &lt;2021.186.1.0svn55916-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916272" version="1" comment="texlive-exesheet-doc is &lt;2021.186.1.0svn55916-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916273" version="1" comment="texlive-exframe is &lt;2021.186.3.4svn53911-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916274" version="1" comment="texlive-exframe-doc is &lt;2021.186.3.4svn53911-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916275" version="1" comment="texlive-exp-testopt is &lt;2021.186.0.0.3svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916276" version="1" comment="texlive-exp-testopt-doc is &lt;2021.186.0.0.3svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916277" version="1" comment="texlive-expdlist is &lt;2021.186.2.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916278" version="1" comment="texlive-expdlist-doc is &lt;2021.186.2.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916279" version="1" comment="texlive-expex is &lt;2021.186.5.1bsvn44499-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916280" version="1" comment="texlive-expex-doc is &lt;2021.186.5.1bsvn44499-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916281" version="1" comment="texlive-expkv is &lt;2021.186.1.6svn57247-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916282" version="1" comment="texlive-expkv-cs is &lt;2021.186.0.0.6svn56693-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916283" version="1" comment="texlive-expkv-cs-doc is &lt;2021.186.0.0.6svn56693-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916284" version="1" comment="texlive-expkv-def is &lt;2021.186.0.0.7svn57246-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916285" version="1" comment="texlive-expkv-def-doc is &lt;2021.186.0.0.7svn57246-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916286" version="1" comment="texlive-expkv-doc is &lt;2021.186.1.6svn57247-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916287" version="1" comment="texlive-expkv-opt is &lt;2021.186.0.0.1bsvn56633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916288" version="1" comment="texlive-expkv-opt-doc is &lt;2021.186.0.0.1bsvn56633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916289" version="1" comment="texlive-export is &lt;2021.186.1.8svn27206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916290" version="1" comment="texlive-export-doc is &lt;2021.186.1.8svn27206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916291" version="1" comment="texlive-expose-expl3-dunkerque-2019 is &lt;2021.186.1.2svn54451-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916292" version="1" comment="texlive-expressg is &lt;2021.186.1.5svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916293" version="1" comment="texlive-expressg-doc is &lt;2021.186.1.5svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916294" version="1" comment="texlive-exsheets is &lt;2021.186.0.0.21ksvn52227-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916295" version="1" comment="texlive-exsheets-doc is &lt;2021.186.0.0.21ksvn52227-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916296" version="1" comment="texlive-exsol is &lt;2021.186.1.4svn48977-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916297" version="1" comment="texlive-exsol-doc is &lt;2021.186.1.4svn48977-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916298" version="1" comment="texlive-extarrows is &lt;2021.186.1.2.0svn54400-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916299" version="1" comment="texlive-extarrows-doc is &lt;2021.186.1.2.0svn54400-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916300" version="1" comment="texlive-exteps is &lt;2021.186.0.0.41svn19859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916301" version="1" comment="texlive-exteps-doc is &lt;2021.186.0.0.41svn19859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916302" version="1" comment="texlive-extpfeil is &lt;2021.186.0.0.4svn16243-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916303" version="1" comment="texlive-extpfeil-doc is &lt;2021.186.0.0.4svn16243-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916304" version="1" comment="texlive-extract is &lt;2021.186.1.9asvn52117-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916305" version="1" comment="texlive-extract-doc is &lt;2021.186.1.9asvn52117-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916306" version="1" comment="texlive-extsizes is &lt;2021.186.1.4asvn17263-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916307" version="1" comment="texlive-extsizes-doc is &lt;2021.186.1.4asvn17263-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916308" version="1" comment="texlive-facsimile is &lt;2021.186.1.0svn21328-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916309" version="1" comment="texlive-facsimile-doc is &lt;2021.186.1.0svn21328-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916310" version="1" comment="texlive-factura is &lt;2021.186.4.00svn56948-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916311" version="1" comment="texlive-factura-doc is &lt;2021.186.4.00svn56948-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916312" version="1" comment="texlive-facture is &lt;2021.186.1.2.2svn43865-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916313" version="1" comment="texlive-facture-belge-simple-sans-tva is &lt;2021.186.2.1svn49004-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916314" version="1" comment="texlive-facture-belge-simple-sans-tva-doc is &lt;2021.186.2.1svn49004-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916315" version="1" comment="texlive-facture-doc is &lt;2021.186.1.2.2svn43865-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916316" version="1" comment="texlive-faktor is &lt;2021.186.0.0.1bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916317" version="1" comment="texlive-faktor-doc is &lt;2021.186.0.0.1bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916318" version="1" comment="texlive-fancybox is &lt;2021.186.1.4svn18304-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916319" version="1" comment="texlive-fancybox-doc is &lt;2021.186.1.4svn18304-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916320" version="1" comment="texlive-fancyhandout is &lt;2021.186.svn46411-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916321" version="1" comment="texlive-fancyhandout-doc is &lt;2021.186.svn46411-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916322" version="1" comment="texlive-fancyhdr is &lt;2021.186.4.0.1svn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916323" version="1" comment="texlive-fancyhdr-doc is &lt;2021.186.4.0.1svn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916324" version="1" comment="texlive-fancyhdr-it is &lt;2021.186.svn21912-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916325" version="1" comment="texlive-fancylabel is &lt;2021.186.1.1svn46736-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916326" version="1" comment="texlive-fancylabel-doc is &lt;2021.186.1.1svn46736-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916327" version="1" comment="texlive-fancynum is &lt;2021.186.0.0.92svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916328" version="1" comment="texlive-fancynum-doc is &lt;2021.186.0.0.92svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916329" version="1" comment="texlive-fancypar is &lt;2021.186.1.2svn49801-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916330" version="1" comment="texlive-fancypar-doc is &lt;2021.186.1.2svn49801-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916331" version="1" comment="texlive-fancyref is &lt;2021.186.0.0.9csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916332" version="1" comment="texlive-fancyref-doc is &lt;2021.186.0.0.9csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916333" version="1" comment="texlive-fancyslides is &lt;2021.186.1.0svn36263-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916334" version="1" comment="texlive-fancyslides-doc is &lt;2021.186.1.0svn36263-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916335" version="1" comment="texlive-fancytabs is &lt;2021.186.1.9svn41549-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916336" version="1" comment="texlive-fancytabs-doc is &lt;2021.186.1.9svn41549-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916337" version="1" comment="texlive-fancytooltips is &lt;2021.186.1.8svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916338" version="1" comment="texlive-fancytooltips-doc is &lt;2021.186.1.8svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916339" version="1" comment="texlive-fancyvrb is &lt;2021.186.3.7svn57488-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916340" version="1" comment="texlive-fancyvrb-doc is &lt;2021.186.3.7svn57488-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916341" version="1" comment="texlive-fandol is &lt;2021.186.0.0.3svn37889-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916342" version="1" comment="texlive-fandol-doc is &lt;2021.186.0.0.3svn37889-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916343" version="1" comment="texlive-fandol-fonts is &lt;2021.186.0.0.3svn37889-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916344" version="1" comment="texlive-fascicules is &lt;2021.186.1svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916345" version="1" comment="texlive-fascicules-doc is &lt;2021.186.1svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916346" version="1" comment="texlive-fast-diagram is &lt;2021.186.1.1svn29264-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916347" version="1" comment="texlive-fast-diagram-doc is &lt;2021.186.1.1svn29264-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916348" version="1" comment="texlive-fbb is &lt;2021.186.1.16svn55728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916349" version="1" comment="texlive-fbb-doc is &lt;2021.186.1.16svn55728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916350" version="1" comment="texlive-fbb-fonts is &lt;2021.186.1.16svn55728-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916351" version="1" comment="texlive-fbithesis is &lt;2021.186.1.2msvn21340-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916352" version="1" comment="texlive-fbithesis-doc is &lt;2021.186.1.2msvn21340-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916353" version="1" comment="texlive-fbox is &lt;2021.186.0.0.05svn55627-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916354" version="1" comment="texlive-fbox-doc is &lt;2021.186.0.0.05svn55627-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916355" version="1" comment="texlive-fbs is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916356" version="1" comment="texlive-fc is &lt;2021.186.1.4svn32796-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916357" version="1" comment="texlive-fc-doc is &lt;2021.186.1.4svn32796-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916358" version="1" comment="texlive-fcavtex is &lt;2021.186.1.1svn38074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916359" version="1" comment="texlive-fcavtex-doc is &lt;2021.186.1.1svn38074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916360" version="1" comment="texlive-fcltxdoc is &lt;2021.186.1.0svn24500-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916361" version="1" comment="texlive-fcltxdoc-doc is &lt;2021.186.1.0svn24500-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916362" version="1" comment="texlive-fcolumn is &lt;2021.186.1.3svn57428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916363" version="1" comment="texlive-fcolumn-doc is &lt;2021.186.1.3svn57428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916364" version="1" comment="texlive-fdsymbol is &lt;2021.186.0.0.8svn26722-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916365" version="1" comment="texlive-fdsymbol-doc is &lt;2021.186.0.0.8svn26722-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916366" version="1" comment="texlive-fdsymbol-fonts is &lt;2021.186.0.0.8svn26722-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916367" version="1" comment="texlive-fduthesis is &lt;2021.186.0.0.7esvn56216-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916368" version="1" comment="texlive-fduthesis-doc is &lt;2021.186.0.0.7esvn56216-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916369" version="1" comment="texlive-featpost is &lt;2021.186.0.0.8.8svn35346-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916370" version="1" comment="texlive-featpost-doc is &lt;2021.186.0.0.8.8svn35346-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916371" version="1" comment="texlive-fei is &lt;2021.186.4.10.1svn55960-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916372" version="1" comment="texlive-fei-doc is &lt;2021.186.4.10.1svn55960-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916373" version="1" comment="texlive-fenixpar is &lt;2021.186.0.0.92svn24730-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916374" version="1" comment="texlive-fenixpar-doc is &lt;2021.186.0.0.92svn24730-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916375" version="1" comment="texlive-fetamont is &lt;2021.186.svn43812-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916376" version="1" comment="texlive-fetamont-doc is &lt;2021.186.svn43812-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916377" version="1" comment="texlive-fetamont-fonts is &lt;2021.186.svn43812-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916378" version="1" comment="texlive-fetchcls is &lt;2021.186.1.0svn45245-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916379" version="1" comment="texlive-fetchcls-doc is &lt;2021.186.1.0svn45245-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916380" version="1" comment="texlive-feupphdteses is &lt;2021.186.4.0svn30962-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916381" version="1" comment="texlive-feupphdteses-doc is &lt;2021.186.4.0svn30962-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916382" version="1" comment="texlive-fewerfloatpages is &lt;2021.186.1.0bsvn58058-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916383" version="1" comment="texlive-fewerfloatpages-doc is &lt;2021.186.1.0bsvn58058-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916384" version="1" comment="texlive-feyn is &lt;2021.186.0.0.4.1svn55777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916385" version="1" comment="texlive-feyn-doc is &lt;2021.186.0.0.4.1svn55777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916386" version="1" comment="texlive-feynmf is &lt;2021.186.1.08svn17259-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916387" version="1" comment="texlive-feynmf-doc is &lt;2021.186.1.08svn17259-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916388" version="1" comment="texlive-feynmp-auto is &lt;2021.186.1.1svn30223-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916389" version="1" comment="texlive-feynmp-auto-doc is &lt;2021.186.1.1svn30223-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916390" version="1" comment="texlive-ffslides is &lt;2021.186.svn38895-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916391" version="1" comment="texlive-ffslides-doc is &lt;2021.186.svn38895-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916392" version="1" comment="texlive-fge is &lt;2021.186.1.25svn37628-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916393" version="1" comment="texlive-fge-doc is &lt;2021.186.1.25svn37628-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916394" version="1" comment="texlive-fge-fonts is &lt;2021.186.1.25svn37628-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916395" version="1" comment="texlive-fgruler is &lt;2021.186.1.3svn56854-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916396" version="1" comment="texlive-fgruler-doc is &lt;2021.186.1.3svn56854-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916397" version="1" comment="texlive-fibeamer is &lt;2021.186.1.1.8svn53146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916398" version="1" comment="texlive-fibeamer-doc is &lt;2021.186.1.1.8svn53146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916399" version="1" comment="texlive-fifinddo-info is &lt;2021.186.1.1bsvn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916400" version="1" comment="texlive-fifinddo-info-doc is &lt;2021.186.1.1bsvn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916401" version="1" comment="texlive-fifo-stack is &lt;2021.186.1.0svn33288-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916402" version="1" comment="texlive-fifo-stack-doc is &lt;2021.186.1.0svn33288-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916403" version="1" comment="texlive-fig4latex is &lt;2021.186.0.0.2svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916404" version="1" comment="texlive-fig4latex-doc is &lt;2021.186.0.0.2svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916405" version="1" comment="texlive-figbas is &lt;2021.186.1.0.3svn28943-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916406" version="1" comment="texlive-figbas-doc is &lt;2021.186.1.0.3svn28943-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916407" version="1" comment="texlive-figbas-fonts is &lt;2021.186.1.0.3svn28943-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916408" version="1" comment="texlive-figbib is &lt;2021.186.svn19388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916409" version="1" comment="texlive-figbib-doc is &lt;2021.186.svn19388-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916410" version="1" comment="texlive-figchild is &lt;2021.186.1.0.0svn58759-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916411" version="1" comment="texlive-figchild-doc is &lt;2021.186.1.0.0svn58759-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916412" version="1" comment="texlive-figflow is &lt;2021.186.svn21462-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916413" version="1" comment="texlive-figflow-doc is &lt;2021.186.svn21462-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916414" version="1" comment="texlive-figsize is &lt;2021.186.0.0.1svn18784-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916415" version="1" comment="texlive-figsize-doc is &lt;2021.186.0.0.1svn18784-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916416" version="1" comment="texlive-filecontents is &lt;2021.186.1.5svn52142-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916417" version="1" comment="texlive-filecontents-doc is &lt;2021.186.1.5svn52142-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916418" version="1" comment="texlive-filecontentsdef is &lt;2021.186.1.5svn52208-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916419" version="1" comment="texlive-filecontentsdef-doc is &lt;2021.186.1.5svn52208-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916420" version="1" comment="texlive-filedate is &lt;2021.186.svn29529-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916421" version="1" comment="texlive-filedate-doc is &lt;2021.186.svn29529-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916422" version="1" comment="texlive-filehook is &lt;2021.186.0.0.8asvn56479-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916423" version="1" comment="texlive-filehook-doc is &lt;2021.186.0.0.8asvn56479-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916424" version="1" comment="texlive-fileinfo is &lt;2021.186.0.0.81asvn28421-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916425" version="1" comment="texlive-fileinfo-doc is &lt;2021.186.0.0.81asvn28421-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916426" version="1" comment="texlive-filemod is &lt;2021.186.1.2svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916427" version="1" comment="texlive-filemod-doc is &lt;2021.186.1.2svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916428" version="1" comment="texlive-finbib is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916429" version="1" comment="texlive-findhyph is &lt;2021.186.3.4svn47444-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916430" version="1" comment="texlive-findhyph-doc is &lt;2021.186.3.4svn47444-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916431" version="1" comment="texlive-fink is &lt;2021.186.2.2.1svn24329-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916432" version="1" comment="texlive-fink-doc is &lt;2021.186.2.2.1svn24329-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916433" version="1" comment="texlive-finstrut is &lt;2021.186.0.0.5svn21719-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916434" version="1" comment="texlive-finstrut-doc is &lt;2021.186.0.0.5svn21719-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916435" version="1" comment="texlive-fira is &lt;2021.186.4.3svn55437-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916436" version="1" comment="texlive-fira-doc is &lt;2021.186.4.3svn55437-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916437" version="1" comment="texlive-fira-fonts is &lt;2021.186.4.3svn55437-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916438" version="1" comment="texlive-firamath is &lt;2021.186.0.0.3.4svn56672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916439" version="1" comment="texlive-firamath-doc is &lt;2021.186.0.0.3.4svn56672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916440" version="1" comment="texlive-firamath-fonts is &lt;2021.186.0.0.3.4svn56672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916441" version="1" comment="texlive-firamath-otf is &lt;2021.186.0.0.02asvn50732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916442" version="1" comment="texlive-firamath-otf-doc is &lt;2021.186.0.0.02asvn50732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916443" version="1" comment="texlive-first-latex-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916444" version="1" comment="texlive-firstaid is &lt;2021.186.1.0jsvn58440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916445" version="1" comment="texlive-firstaid-doc is &lt;2021.186.1.0jsvn58440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916446" version="1" comment="texlive-fitbox is &lt;2021.186.1.02svn50088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916447" version="1" comment="texlive-fitbox-doc is &lt;2021.186.1.02svn50088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916448" version="1" comment="texlive-fithesis is &lt;2021.186.0.0.3.51svn54483-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916449" version="1" comment="texlive-fithesis-doc is &lt;2021.186.0.0.3.51svn54483-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916450" version="1" comment="texlive-fix2col is &lt;2021.186.0.0.04svn38770-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916451" version="1" comment="texlive-fix2col-doc is &lt;2021.186.0.0.04svn38770-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916452" version="1" comment="texlive-fixcmex is &lt;2021.186.1.1svn51825-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916453" version="1" comment="texlive-fixcmex-doc is &lt;2021.186.1.1svn51825-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916454" version="1" comment="texlive-fixfoot is &lt;2021.186.0.0.3asvn17131-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916455" version="1" comment="texlive-fixfoot-doc is &lt;2021.186.0.0.3asvn17131-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916456" version="1" comment="texlive-fixjfm is &lt;2021.186.0.0.8svn47113-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916457" version="1" comment="texlive-fixjfm-doc is &lt;2021.186.0.0.8svn47113-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916458" version="1" comment="texlive-fixlatvian is &lt;2021.186.1asvn21631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916459" version="1" comment="texlive-fixlatvian-doc is &lt;2021.186.1asvn21631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916460" version="1" comment="texlive-fixltxhyph is &lt;2021.186.0.0.4svn25832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916461" version="1" comment="texlive-fixltxhyph-doc is &lt;2021.186.0.0.4svn25832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916462" version="1" comment="texlive-fixme is &lt;2021.186.4.5svn49591-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916463" version="1" comment="texlive-fixme-doc is &lt;2021.186.4.5svn49591-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916464" version="1" comment="texlive-fixmetodonotes is &lt;2021.186.0.0.2.2svn30168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916465" version="1" comment="texlive-fixmetodonotes-doc is &lt;2021.186.0.0.2.2svn30168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916466" version="1" comment="texlive-fixpdfmag is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916467" version="1" comment="texlive-fiziko is &lt;2021.186.0.0.1.3svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916468" version="1" comment="texlive-fiziko-doc is &lt;2021.186.0.0.1.3svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916469" version="1" comment="texlive-fjodor is &lt;2021.186.svn53207-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916470" version="1" comment="texlive-fjodor-doc is &lt;2021.186.svn53207-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916471" version="1" comment="texlive-flabels is &lt;2021.186.1.0svn17272-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916472" version="1" comment="texlive-flabels-doc is &lt;2021.186.1.0svn17272-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916473" version="1" comment="texlive-flacards is &lt;2021.186.0.0.1.1bsvn19440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916474" version="1" comment="texlive-flacards-doc is &lt;2021.186.0.0.1.1bsvn19440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916475" version="1" comment="texlive-flagderiv is &lt;2021.186.0.0.10svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916476" version="1" comment="texlive-flagderiv-doc is &lt;2021.186.0.0.10svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916477" version="1" comment="texlive-flashcards is &lt;2021.186.1.0.1svn19667-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916478" version="1" comment="texlive-flashcards-doc is &lt;2021.186.1.0.1svn19667-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916479" version="1" comment="texlive-flashmovie is &lt;2021.186.0.0.4svn25768-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916480" version="1" comment="texlive-flashmovie-doc is &lt;2021.186.0.0.4svn25768-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916481" version="1" comment="texlive-flipbook is &lt;2021.186.0.0.2svn25584-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916482" version="1" comment="texlive-flipbook-doc is &lt;2021.186.0.0.2svn25584-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916483" version="1" comment="texlive-flippdf is &lt;2021.186.2.0bsvn56782-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916484" version="1" comment="texlive-flippdf-doc is &lt;2021.186.2.0bsvn56782-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916485" version="1" comment="texlive-float is &lt;2021.186.1.3dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916486" version="1" comment="texlive-float-doc is &lt;2021.186.1.3dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916487" version="1" comment="texlive-floatrow is &lt;2021.186.0.0.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916488" version="1" comment="texlive-floatrow-doc is &lt;2021.186.0.0.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916489" version="1" comment="texlive-flowchart is &lt;2021.186.3.3svn36572-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916490" version="1" comment="texlive-flowchart-doc is &lt;2021.186.3.3svn36572-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916491" version="1" comment="texlive-flowfram is &lt;2021.186.1.17svn35291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916492" version="1" comment="texlive-flowfram-doc is &lt;2021.186.1.17svn35291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916493" version="1" comment="texlive-fltpoint is &lt;2021.186.1.1bsvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916494" version="1" comment="texlive-fltpoint-doc is &lt;2021.186.1.1bsvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916495" version="1" comment="texlive-fmp is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916496" version="1" comment="texlive-fmp-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916497" version="1" comment="texlive-fmtcount is &lt;2021.186.3.07svn53912-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916498" version="1" comment="texlive-fmtcount-doc is &lt;2021.186.3.07svn53912-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916499" version="1" comment="texlive-fn2end is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916500" version="1" comment="texlive-fn2end-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916501" version="1" comment="texlive-fnbreak is &lt;2021.186.1.30svn25003-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916502" version="1" comment="texlive-fnbreak-doc is &lt;2021.186.1.30svn25003-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916503" version="1" comment="texlive-fncychap is &lt;2021.186.1.34svn20710-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916504" version="1" comment="texlive-fncychap-doc is &lt;2021.186.1.34svn20710-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916505" version="1" comment="texlive-fncylab is &lt;2021.186.1.1svn52090-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916506" version="1" comment="texlive-fncylab-doc is &lt;2021.186.1.1svn52090-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916507" version="1" comment="texlive-fnpara is &lt;2021.186.svn25607-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916508" version="1" comment="texlive-fnpara-doc is &lt;2021.186.svn25607-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916509" version="1" comment="texlive-fnpct is &lt;2021.186.1.0svn57508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916510" version="1" comment="texlive-fnpct-doc is &lt;2021.186.1.0svn57508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916511" version="1" comment="texlive-fnspe is &lt;2021.186.1.2asvn45360-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916512" version="1" comment="texlive-fnspe-doc is &lt;2021.186.1.2asvn45360-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916513" version="1" comment="texlive-fntproof is &lt;2021.186.svn20638-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916514" version="1" comment="texlive-fntproof-doc is &lt;2021.186.svn20638-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916515" version="1" comment="texlive-fnumprint is &lt;2021.186.1.1asvn29173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916516" version="1" comment="texlive-fnumprint-doc is &lt;2021.186.1.1asvn29173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916517" version="1" comment="texlive-foekfont is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916518" version="1" comment="texlive-foekfont-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916519" version="1" comment="texlive-foekfont-fonts is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916520" version="1" comment="texlive-foilhtml is &lt;2021.186.1.2svn21855-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916521" version="1" comment="texlive-foilhtml-doc is &lt;2021.186.1.2svn21855-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916522" version="1" comment="texlive-fonetika is &lt;2021.186.svn21326-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916523" version="1" comment="texlive-fonetika-doc is &lt;2021.186.svn21326-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916524" version="1" comment="texlive-fonetika-fonts is &lt;2021.186.svn21326-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916525" version="1" comment="texlive-font-change is &lt;2021.186.2015.2svn40403-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916526" version="1" comment="texlive-font-change-doc is &lt;2021.186.2015.2svn40403-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916527" version="1" comment="texlive-font-change-xetex is &lt;2021.186.2016.1svn40404-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916528" version="1" comment="texlive-font-change-xetex-doc is &lt;2021.186.2016.1svn40404-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916529" version="1" comment="texlive-fontawesome is &lt;2021.186.4.6.3.2svn48145-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916530" version="1" comment="texlive-fontawesome-doc is &lt;2021.186.4.6.3.2svn48145-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916531" version="1" comment="texlive-fontawesome-fonts is &lt;2021.186.4.6.3.2svn48145-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916532" version="1" comment="texlive-fontawesome5 is &lt;2021.186.5.13.0svn54517-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916533" version="1" comment="texlive-fontawesome5-doc is &lt;2021.186.5.13.0svn54517-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916534" version="1" comment="texlive-fontawesome5-fonts is &lt;2021.186.5.13.0svn54517-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916535" version="1" comment="texlive-fontaxes is &lt;2021.186.1.0esvn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916536" version="1" comment="texlive-fontaxes-doc is &lt;2021.186.1.0esvn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916537" version="1" comment="texlive-fontbook is &lt;2021.186.0.0.2svn23608-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916538" version="1" comment="texlive-fontbook-doc is &lt;2021.186.0.0.2svn23608-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916539" version="1" comment="texlive-fontch is &lt;2021.186.2.2svn17859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916540" version="1" comment="texlive-fontch-doc is &lt;2021.186.2.2svn17859-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916541" version="1" comment="texlive-fontinst is &lt;2021.186.1.933svn53562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916542" version="1" comment="texlive-fontinst-doc is &lt;2021.186.1.933svn53562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916543" version="1" comment="texlive-fontmfizz is &lt;2021.186.svn43546-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916544" version="1" comment="texlive-fontmfizz-doc is &lt;2021.186.svn43546-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916545" version="1" comment="texlive-fontmfizz-fonts is &lt;2021.186.svn43546-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916546" version="1" comment="texlive-fontname is &lt;2021.186.svn53228-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916547" version="1" comment="texlive-fontname-doc is &lt;2021.186.svn53228-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916548" version="1" comment="texlive-fontools is &lt;2021.186.svn58747-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916549" version="1" comment="texlive-fontools-doc is &lt;2021.186.svn58747-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916550" version="1" comment="texlive-fonts-churchslavonic is &lt;2021.186.2.2svn56350-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916551" version="1" comment="texlive-fonts-churchslavonic-doc is &lt;2021.186.2.2svn56350-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916552" version="1" comment="texlive-fonts-churchslavonic-fonts is &lt;2021.186.2.2svn56350-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916553" version="1" comment="texlive-fonts-tlwg is &lt;2021.186.0.0.7.2svn54994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916554" version="1" comment="texlive-fonts-tlwg-doc is &lt;2021.186.0.0.7.2svn54994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916555" version="1" comment="texlive-fonts-tlwg-fonts is &lt;2021.186.0.0.7.2svn54994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916556" version="1" comment="texlive-fontsetup is &lt;2021.186.1.009svn57553-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916557" version="1" comment="texlive-fontsetup-doc is &lt;2021.186.1.009svn57553-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916558" version="1" comment="texlive-fontsize is &lt;2021.186.0.0.8.1svn58508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916559" version="1" comment="texlive-fontsize-doc is &lt;2021.186.0.0.8.1svn58508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916560" version="1" comment="texlive-fontspec is &lt;2021.186.2.7isvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916561" version="1" comment="texlive-fontspec-doc is &lt;2021.186.2.7isvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916562" version="1" comment="texlive-fonttable is &lt;2021.186.1.6csvn44799-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916563" version="1" comment="texlive-fonttable-doc is &lt;2021.186.1.6csvn44799-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916564" version="1" comment="texlive-fontware is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916565" version="1" comment="texlive-fontwrap is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916566" version="1" comment="texlive-fontwrap-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916567" version="1" comment="texlive-footbib is &lt;2021.186.2.0.7svn17115-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916568" version="1" comment="texlive-footbib-doc is &lt;2021.186.2.0.7svn17115-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916569" version="1" comment="texlive-footmisc is &lt;2021.186.5.5bsvn23330-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916570" version="1" comment="texlive-footmisc-doc is &lt;2021.186.5.5bsvn23330-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916571" version="1" comment="texlive-footmisx is &lt;2021.186.20161201svn42621-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916572" version="1" comment="texlive-footmisx-doc is &lt;2021.186.20161201svn42621-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916573" version="1" comment="texlive-footnotebackref is &lt;2021.186.1.0svn27034-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916574" version="1" comment="texlive-footnotebackref-doc is &lt;2021.186.1.0svn27034-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916575" version="1" comment="texlive-footnotehyper is &lt;2021.186.1.1dsvn57618-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916576" version="1" comment="texlive-footnotehyper-doc is &lt;2021.186.1.1dsvn57618-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916577" version="1" comment="texlive-footnoterange is &lt;2021.186.1.0csvn52910-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916578" version="1" comment="texlive-footnoterange-doc is &lt;2021.186.1.0csvn52910-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916579" version="1" comment="texlive-footnpag is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916580" version="1" comment="texlive-footnpag-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916581" version="1" comment="texlive-forarray is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916582" version="1" comment="texlive-forarray-doc is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916583" version="1" comment="texlive-foreign is &lt;2021.186.2.7svn27819-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916584" version="1" comment="texlive-foreign-doc is &lt;2021.186.2.7svn27819-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916585" version="1" comment="texlive-forest is &lt;2021.186.2.1.5svn57398-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916586" version="1" comment="texlive-forest-doc is &lt;2021.186.2.1.5svn57398-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916587" version="1" comment="texlive-forest-quickstart is &lt;2021.186.svn55688-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916588" version="1" comment="texlive-forloop is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916589" version="1" comment="texlive-forloop-doc is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916590" version="1" comment="texlive-formation-latex-ul is &lt;2021.186.2020.10svn56714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916591" version="1" comment="texlive-formation-latex-ul-doc is &lt;2021.186.2020.10svn56714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916592" version="1" comment="texlive-formlett is &lt;2021.186.2.3svn21480-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916593" version="1" comment="texlive-formlett-doc is &lt;2021.186.2.3svn21480-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916594" version="1" comment="texlive-forms16be is &lt;2021.186.1.3svn51305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916595" version="1" comment="texlive-forms16be-doc is &lt;2021.186.1.3svn51305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916596" version="1" comment="texlive-formular is &lt;2021.186.1.0asvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916597" version="1" comment="texlive-formular-doc is &lt;2021.186.1.0asvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916598" version="1" comment="texlive-forum is &lt;2021.186.svn56025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916599" version="1" comment="texlive-forum-doc is &lt;2021.186.svn56025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916600" version="1" comment="texlive-forum-fonts is &lt;2021.186.svn56025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916601" version="1" comment="texlive-fouridx is &lt;2021.186.2.00svn32214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916602" version="1" comment="texlive-fouridx-doc is &lt;2021.186.2.00svn32214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916603" version="1" comment="texlive-fourier is &lt;2021.186.2.2svn54090-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916604" version="1" comment="texlive-fourier-doc is &lt;2021.186.2.2svn54090-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916605" version="1" comment="texlive-fourier-fonts is &lt;2021.186.2.2svn54090-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916606" version="1" comment="texlive-fouriernc is &lt;2021.186.svn29646-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916607" version="1" comment="texlive-fouriernc-doc is &lt;2021.186.svn29646-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916608" version="1" comment="texlive-fp is &lt;2021.186.2.1dsvn49719-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916609" version="1" comment="texlive-fp-doc is &lt;2021.186.2.1dsvn49719-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916610" version="1" comment="texlive-fpl is &lt;2021.186.1.003svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916611" version="1" comment="texlive-fpl-doc is &lt;2021.186.1.003svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916612" version="1" comment="texlive-fpl-fonts is &lt;2021.186.1.003svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916613" version="1" comment="texlive-fragmaster is &lt;2021.186.1.6svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916614" version="1" comment="texlive-fragmaster-doc is &lt;2021.186.1.6svn26313-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916615" version="1" comment="texlive-fragments is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916616" version="1" comment="texlive-fragments-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916617" version="1" comment="texlive-frame is &lt;2021.186.1.0svn18312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916618" version="1" comment="texlive-frame-doc is &lt;2021.186.1.0svn18312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916619" version="1" comment="texlive-framed is &lt;2021.186.0.0.96svn26789-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916620" version="1" comment="texlive-framed-doc is &lt;2021.186.0.0.96svn26789-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916621" version="1" comment="texlive-francais-bst is &lt;2021.186.1.1svn38922-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916622" version="1" comment="texlive-francais-bst-doc is &lt;2021.186.1.1svn38922-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916623" version="1" comment="texlive-frankenstein is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916624" version="1" comment="texlive-frankenstein-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916625" version="1" comment="texlive-frcursive is &lt;2021.186.svn24559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916626" version="1" comment="texlive-frcursive-doc is &lt;2021.186.svn24559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916627" version="1" comment="texlive-frcursive-fonts is &lt;2021.186.svn24559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916628" version="1" comment="texlive-frederika2016 is &lt;2021.186.1.000_2016_initial_releasesvn42157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916629" version="1" comment="texlive-frederika2016-doc is &lt;2021.186.1.000_2016_initial_releasesvn42157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916630" version="1" comment="texlive-frederika2016-fonts is &lt;2021.186.1.000_2016_initial_releasesvn42157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916631" version="1" comment="texlive-frege is &lt;2021.186.1.3svn27417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916632" version="1" comment="texlive-frege-doc is &lt;2021.186.1.3svn27417-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916633" version="1" comment="texlive-frenchmath is &lt;2021.186.1.5svn56847-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916634" version="1" comment="texlive-frenchmath-doc is &lt;2021.186.1.5svn56847-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916635" version="1" comment="texlive-frimurer is &lt;2021.186.1svn56704-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916636" version="1" comment="texlive-frimurer-doc is &lt;2021.186.1svn56704-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916637" version="1" comment="texlive-frimurer-fonts is &lt;2021.186.1svn56704-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916638" version="1" comment="texlive-frletter is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916639" version="1" comment="texlive-frletter-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916640" version="1" comment="texlive-frontespizio is &lt;2021.186.1.4asvn24054-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916641" version="1" comment="texlive-frontespizio-doc is &lt;2021.186.1.4asvn24054-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916642" version="1" comment="texlive-froufrou is &lt;2021.186.1.2svn57248-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916643" version="1" comment="texlive-froufrou-doc is &lt;2021.186.1.2svn57248-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916644" version="1" comment="texlive-frpseudocode is &lt;2021.186.0.0.3.0svn56088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916645" version="1" comment="texlive-frpseudocode-doc is &lt;2021.186.0.0.3.0svn56088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916646" version="1" comment="texlive-ftc-notebook is &lt;2021.186.1.1svn50043-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916647" version="1" comment="texlive-ftc-notebook-doc is &lt;2021.186.1.1svn50043-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916648" version="1" comment="texlive-ftcap is &lt;2021.186.1.4svn17275-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916649" version="1" comment="texlive-ftcap-doc is &lt;2021.186.1.4svn17275-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916650" version="1" comment="texlive-ftnxtra is &lt;2021.186.0.0.1svn29652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916651" version="1" comment="texlive-ftnxtra-doc is &lt;2021.186.0.0.1svn29652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916652" version="1" comment="texlive-fullblck is &lt;2021.186.1.03svn25434-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916653" version="1" comment="texlive-fullblck-doc is &lt;2021.186.1.03svn25434-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916654" version="1" comment="texlive-fullminipage is &lt;2021.186.0.0.1.1svn34545-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916655" version="1" comment="texlive-fullminipage-doc is &lt;2021.186.0.0.1.1svn34545-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916656" version="1" comment="texlive-fullwidth is &lt;2021.186.0.0.1svn24684-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916657" version="1" comment="texlive-fullwidth-doc is &lt;2021.186.0.0.1svn24684-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916658" version="1" comment="texlive-functan is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916659" version="1" comment="texlive-functan-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916660" version="1" comment="texlive-fundus-calligra is &lt;2021.186.1.2svn26018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916661" version="1" comment="texlive-fundus-calligra-doc is &lt;2021.186.1.2svn26018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916662" version="1" comment="texlive-fundus-cyr is &lt;2021.186.svn26019-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916663" version="1" comment="texlive-fundus-sueterlin is &lt;2021.186.1.2svn26030-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916664" version="1" comment="texlive-fundus-sueterlin-doc is &lt;2021.186.1.2svn26030-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916665" version="1" comment="texlive-fvextra is &lt;2021.186.1.4svn49947-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916666" version="1" comment="texlive-fvextra-doc is &lt;2021.186.1.4svn49947-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916667" version="1" comment="texlive-fwlw is &lt;2021.186.svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916668" version="1" comment="texlive-fwlw-doc is &lt;2021.186.svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916669" version="1" comment="texlive-g-brief is &lt;2021.186.4.0.3svn50415-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916670" version="1" comment="texlive-g-brief-doc is &lt;2021.186.4.0.3svn50415-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916671" version="1" comment="texlive-gaceta is &lt;2021.186.1.06svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916672" version="1" comment="texlive-gaceta-doc is &lt;2021.186.1.06svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916673" version="1" comment="texlive-galois is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916674" version="1" comment="texlive-galois-doc is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916675" version="1" comment="texlive-gamebook is &lt;2021.186.1.0svn24714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916676" version="1" comment="texlive-gamebook-doc is &lt;2021.186.1.0svn24714-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916677" version="1" comment="texlive-gammas is &lt;2021.186.1.1svn56403-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916678" version="1" comment="texlive-gammas-doc is &lt;2021.186.1.1svn56403-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916679" version="1" comment="texlive-garamond-libre is &lt;2021.186.1.4svn55166-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916680" version="1" comment="texlive-garamond-libre-doc is &lt;2021.186.1.4svn55166-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916681" version="1" comment="texlive-garamond-libre-fonts is &lt;2021.186.1.4svn55166-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916682" version="1" comment="texlive-garamond-math is &lt;2021.186.svn52820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916683" version="1" comment="texlive-garamond-math-doc is &lt;2021.186.svn52820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916684" version="1" comment="texlive-garamond-math-fonts is &lt;2021.186.svn52820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916685" version="1" comment="texlive-garrigues is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916686" version="1" comment="texlive-garrigues-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916687" version="1" comment="texlive-garuda-c90 is &lt;2021.186.svn37677-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916688" version="1" comment="texlive-gastex is &lt;2021.186.3.0svn58505-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916689" version="1" comment="texlive-gastex-doc is &lt;2021.186.3.0svn58505-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916690" version="1" comment="texlive-gatech-thesis is &lt;2021.186.1.8svn19886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916691" version="1" comment="texlive-gatech-thesis-doc is &lt;2021.186.1.8svn19886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916692" version="1" comment="texlive-gates is &lt;2021.186.0.0.2svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916693" version="1" comment="texlive-gates-doc is &lt;2021.186.0.0.2svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916694" version="1" comment="texlive-gatherenum is &lt;2021.186.1.8svn52209-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916695" version="1" comment="texlive-gatherenum-doc is &lt;2021.186.1.8svn52209-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916696" version="1" comment="texlive-gauss is &lt;2021.186.svn32934-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916697" version="1" comment="texlive-gauss-doc is &lt;2021.186.svn32934-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916698" version="1" comment="texlive-gb4e is &lt;2021.186.svn19216-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916699" version="1" comment="texlive-gb4e-doc is &lt;2021.186.svn19216-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916700" version="1" comment="texlive-gbt7714 is &lt;2021.186.2.1svn57157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916701" version="1" comment="texlive-gbt7714-doc is &lt;2021.186.2.1svn57157-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916702" version="1" comment="texlive-gcard is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916703" version="1" comment="texlive-gcard-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916704" version="1" comment="texlive-gchords is &lt;2021.186.1.20svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916705" version="1" comment="texlive-gchords-doc is &lt;2021.186.1.20svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916706" version="1" comment="texlive-gcite is &lt;2021.186.1.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916707" version="1" comment="texlive-gcite-doc is &lt;2021.186.1.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916708" version="1" comment="texlive-gckanbun is &lt;2021.186.1.2svn58754-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916709" version="1" comment="texlive-gckanbun-doc is &lt;2021.186.1.2svn58754-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916710" version="1" comment="texlive-gender is &lt;2021.186.1.0svn36464-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916711" version="1" comment="texlive-gender-doc is &lt;2021.186.1.0svn36464-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916712" version="1" comment="texlive-gene-logic is &lt;2021.186.1.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916713" version="1" comment="texlive-gene-logic-doc is &lt;2021.186.1.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916714" version="1" comment="texlive-genealogy is &lt;2021.186.svn25112-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916715" version="1" comment="texlive-genealogy-doc is &lt;2021.186.svn25112-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916716" version="1" comment="texlive-genealogytree is &lt;2021.186.2.01svn55978-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916717" version="1" comment="texlive-genealogytree-doc is &lt;2021.186.2.01svn55978-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916718" version="1" comment="texlive-genmpage is &lt;2021.186.0.0.3.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916719" version="1" comment="texlive-genmpage-doc is &lt;2021.186.0.0.3.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916720" version="1" comment="texlive-gentium-tug is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916721" version="1" comment="texlive-gentium-tug-doc is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916722" version="1" comment="texlive-gentium-tug-fonts is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916723" version="1" comment="texlive-gentle is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916724" version="1" comment="texlive-gentombow is &lt;2021.186.svn56665-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916725" version="1" comment="texlive-gentombow-doc is &lt;2021.186.svn56665-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916726" version="1" comment="texlive-geometry is &lt;2021.186.5.9svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916727" version="1" comment="texlive-geometry-doc is &lt;2021.186.5.9svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916728" version="1" comment="texlive-german is &lt;2021.186.2.5esvn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916729" version="1" comment="texlive-german-doc is &lt;2021.186.2.5esvn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916730" version="1" comment="texlive-germbib is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916731" version="1" comment="texlive-germbib-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916732" version="1" comment="texlive-germkorr is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916733" version="1" comment="texlive-germkorr-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916734" version="1" comment="texlive-geschichtsfrkl is &lt;2021.186.1.4svn42121-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916735" version="1" comment="texlive-geschichtsfrkl-doc is &lt;2021.186.1.4svn42121-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916736" version="1" comment="texlive-getfiledate is &lt;2021.186.1.2svn16189-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916737" version="1" comment="texlive-getfiledate-doc is &lt;2021.186.1.2svn16189-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916738" version="1" comment="texlive-getitems is &lt;2021.186.1.0svn39365-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916739" version="1" comment="texlive-getitems-doc is &lt;2021.186.1.0svn39365-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916740" version="1" comment="texlive-getmap is &lt;2021.186.1.11svn50589-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916741" version="1" comment="texlive-getmap-doc is &lt;2021.186.1.11svn50589-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916742" version="1" comment="texlive-getoptk is &lt;2021.186.1.0svn23567-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916743" version="1" comment="texlive-getoptk-doc is &lt;2021.186.1.0svn23567-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916744" version="1" comment="texlive-gettitlestring is &lt;2021.186.1.6svn53170-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916745" version="1" comment="texlive-gettitlestring-doc is &lt;2021.186.1.6svn53170-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916746" version="1" comment="texlive-gfnotation is &lt;2021.186.2.9svn37156-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916747" version="1" comment="texlive-gfnotation-doc is &lt;2021.186.2.9svn37156-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916748" version="1" comment="texlive-gfsartemisia is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916749" version="1" comment="texlive-gfsartemisia-doc is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916750" version="1" comment="texlive-gfsartemisia-fonts is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916751" version="1" comment="texlive-gfsbaskerville is &lt;2021.186.1.0svn19440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916752" version="1" comment="texlive-gfsbaskerville-doc is &lt;2021.186.1.0svn19440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916753" version="1" comment="texlive-gfsbaskerville-fonts is &lt;2021.186.1.0svn19440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916754" version="1" comment="texlive-gfsbodoni is &lt;2021.186.1.01svn28484-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916755" version="1" comment="texlive-gfsbodoni-doc is &lt;2021.186.1.01svn28484-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916756" version="1" comment="texlive-gfsbodoni-fonts is &lt;2021.186.1.01svn28484-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916757" version="1" comment="texlive-gfscomplutum is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916758" version="1" comment="texlive-gfscomplutum-doc is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916759" version="1" comment="texlive-gfscomplutum-fonts is &lt;2021.186.1.0svn19469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916760" version="1" comment="texlive-gfsdidot is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916761" version="1" comment="texlive-gfsdidot-doc is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916762" version="1" comment="texlive-gfsdidot-fonts is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916763" version="1" comment="texlive-gfsdidotclassic is &lt;2021.186.001.001svn52778-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916764" version="1" comment="texlive-gfsdidotclassic-doc is &lt;2021.186.001.001svn52778-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916765" version="1" comment="texlive-gfsdidotclassic-fonts is &lt;2021.186.001.001svn52778-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916766" version="1" comment="texlive-gfsneohellenic is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916767" version="1" comment="texlive-gfsneohellenic-doc is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916768" version="1" comment="texlive-gfsneohellenic-fonts is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916769" version="1" comment="texlive-gfsneohellenicmath is &lt;2021.186.1.0.1svn52570-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916770" version="1" comment="texlive-gfsneohellenicmath-doc is &lt;2021.186.1.0.1svn52570-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916771" version="1" comment="texlive-gfsneohellenicmath-fonts is &lt;2021.186.1.0.1svn52570-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916772" version="1" comment="texlive-gfsporson is &lt;2021.186.1.01svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916773" version="1" comment="texlive-gfsporson-doc is &lt;2021.186.1.01svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916774" version="1" comment="texlive-gfsporson-fonts is &lt;2021.186.1.01svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916775" version="1" comment="texlive-gfssolomos is &lt;2021.186.1.0svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916776" version="1" comment="texlive-gfssolomos-doc is &lt;2021.186.1.0svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916777" version="1" comment="texlive-gfssolomos-fonts is &lt;2021.186.1.0svn18651-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916778" version="1" comment="texlive-ghab is &lt;2021.186.0.0.5svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916779" version="1" comment="texlive-ghab-doc is &lt;2021.186.0.0.5svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916780" version="1" comment="texlive-ghsystem is &lt;2021.186.4.8csvn53822-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916781" version="1" comment="texlive-ghsystem-doc is &lt;2021.186.4.8csvn53822-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916782" version="1" comment="texlive-gillcm is &lt;2021.186.1.1svn19878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916783" version="1" comment="texlive-gillcm-doc is &lt;2021.186.1.1svn19878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916784" version="1" comment="texlive-gillius is &lt;2021.186.svn32068-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916785" version="1" comment="texlive-gillius-doc is &lt;2021.186.svn32068-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916786" version="1" comment="texlive-gillius-fonts is &lt;2021.186.svn32068-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916787" version="1" comment="texlive-gincltex is &lt;2021.186.0.0.3svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916788" version="1" comment="texlive-gincltex-doc is &lt;2021.186.0.0.3svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916789" version="1" comment="texlive-gindex is &lt;2021.186.0.0.2svn52311-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916790" version="1" comment="texlive-gindex-doc is &lt;2021.186.0.0.2svn52311-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916791" version="1" comment="texlive-ginpenc is &lt;2021.186.1.0svn24980-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916792" version="1" comment="texlive-ginpenc-doc is &lt;2021.186.1.0svn24980-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916793" version="1" comment="texlive-git-latexdiff is &lt;2021.186.1.6.0svn54732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916794" version="1" comment="texlive-git-latexdiff-doc is &lt;2021.186.1.6.0svn54732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916795" version="1" comment="texlive-gitfile-info is &lt;2021.186.0.0.5svn51928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916796" version="1" comment="texlive-gitfile-info-doc is &lt;2021.186.0.0.5svn51928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916797" version="1" comment="texlive-gitinfo is &lt;2021.186.1.0svn34049-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916798" version="1" comment="texlive-gitinfo-doc is &lt;2021.186.1.0svn34049-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916799" version="1" comment="texlive-gitinfo2 is &lt;2021.186.2.0.7svn38913-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916800" version="1" comment="texlive-gitinfo2-doc is &lt;2021.186.2.0.7svn38913-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916801" version="1" comment="texlive-gitlog is &lt;2021.186.0.0.0.betasvn38932-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916802" version="1" comment="texlive-gitlog-doc is &lt;2021.186.0.0.0.betasvn38932-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916803" version="1" comment="texlive-gitver is &lt;2021.186.1.3svn56810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916804" version="1" comment="texlive-gitver-doc is &lt;2021.186.1.3svn56810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916805" version="1" comment="texlive-globalvals is &lt;2021.186.1.1svn49962-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916806" version="1" comment="texlive-globalvals-doc is &lt;2021.186.1.1svn49962-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916807" version="1" comment="texlive-glosmathtools is &lt;2021.186.1.0.0svn55920-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916808" version="1" comment="texlive-glosmathtools-doc is &lt;2021.186.1.0.0svn55920-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916809" version="1" comment="texlive-gloss is &lt;2021.186.1.5.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916810" version="1" comment="texlive-gloss-doc is &lt;2021.186.1.5.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916811" version="1" comment="texlive-gloss-occitan is &lt;2021.186.0.0.1svn52593-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916812" version="1" comment="texlive-gloss-occitan-doc is &lt;2021.186.0.0.1svn52593-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916813" version="1" comment="texlive-glossaries is &lt;2021.186.4.46svn54402-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916814" version="1" comment="texlive-glossaries-danish is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916815" version="1" comment="texlive-glossaries-danish-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916816" version="1" comment="texlive-glossaries-doc is &lt;2021.186.4.46svn54402-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916817" version="1" comment="texlive-glossaries-dutch is &lt;2021.186.1.1svn35685-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916818" version="1" comment="texlive-glossaries-dutch-doc is &lt;2021.186.1.1svn35685-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916819" version="1" comment="texlive-glossaries-english is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916820" version="1" comment="texlive-glossaries-english-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916821" version="1" comment="texlive-glossaries-estonian is &lt;2021.186.1.0svn49928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916822" version="1" comment="texlive-glossaries-estonian-doc is &lt;2021.186.1.0svn49928-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916823" version="1" comment="texlive-glossaries-extra is &lt;2021.186.1.45svn54688-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916824" version="1" comment="texlive-glossaries-extra-doc is &lt;2021.186.1.45svn54688-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916825" version="1" comment="texlive-glossaries-finnish is &lt;2021.186.1.0svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916826" version="1" comment="texlive-glossaries-finnish-doc is &lt;2021.186.1.0svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916827" version="1" comment="texlive-glossaries-french is &lt;2021.186.1.1svn42873-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916828" version="1" comment="texlive-glossaries-french-doc is &lt;2021.186.1.1svn42873-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916829" version="1" comment="texlive-glossaries-german is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916830" version="1" comment="texlive-glossaries-german-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916831" version="1" comment="texlive-glossaries-irish is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916832" version="1" comment="texlive-glossaries-irish-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916833" version="1" comment="texlive-glossaries-italian is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916834" version="1" comment="texlive-glossaries-italian-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916835" version="1" comment="texlive-glossaries-magyar is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916836" version="1" comment="texlive-glossaries-magyar-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916837" version="1" comment="texlive-glossaries-nynorsk is &lt;2021.186.1.0svn55189-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916838" version="1" comment="texlive-glossaries-nynorsk-doc is &lt;2021.186.1.0svn55189-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916839" version="1" comment="texlive-glossaries-polish is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916840" version="1" comment="texlive-glossaries-polish-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916841" version="1" comment="texlive-glossaries-portuges is &lt;2021.186.1.1svn36064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916842" version="1" comment="texlive-glossaries-portuges-doc is &lt;2021.186.1.1svn36064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916843" version="1" comment="texlive-glossaries-serbian is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916844" version="1" comment="texlive-glossaries-serbian-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916845" version="1" comment="texlive-glossaries-slovene is &lt;2021.186.1.0svn51211-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916846" version="1" comment="texlive-glossaries-slovene-doc is &lt;2021.186.1.0svn51211-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916847" version="1" comment="texlive-glossaries-spanish is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916848" version="1" comment="texlive-glossaries-spanish-doc is &lt;2021.186.1.0svn35665-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916849" version="1" comment="texlive-glyphlist is &lt;2021.186.svn54074-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916850" version="1" comment="texlive-gmdoc is &lt;2021.186.0.0.993svn21292-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916851" version="1" comment="texlive-gmdoc-doc is &lt;2021.186.0.0.993svn21292-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916852" version="1" comment="texlive-gmdoc-enhance is &lt;2021.186.0.0.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916853" version="1" comment="texlive-gmdoc-enhance-doc is &lt;2021.186.0.0.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916854" version="1" comment="texlive-gmiflink is &lt;2021.186.0.0.97svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916855" version="1" comment="texlive-gmiflink-doc is &lt;2021.186.0.0.97svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916856" version="1" comment="texlive-gmp is &lt;2021.186.1.0svn21691-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916857" version="1" comment="texlive-gmp-doc is &lt;2021.186.1.0svn21691-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916858" version="1" comment="texlive-gmutils is &lt;2021.186.0.0.996svn24287-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916859" version="1" comment="texlive-gmutils-doc is &lt;2021.186.0.0.996svn24287-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916860" version="1" comment="texlive-gmverb is &lt;2021.186.0.0.98svn24288-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916861" version="1" comment="texlive-gmverb-doc is &lt;2021.186.0.0.98svn24288-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916862" version="1" comment="texlive-gmverse is &lt;2021.186.0.0.73svn29803-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916863" version="1" comment="texlive-gmverse-doc is &lt;2021.186.0.0.73svn29803-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916864" version="1" comment="texlive-gnu-freefont is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916865" version="1" comment="texlive-gnu-freefont-doc is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916866" version="1" comment="texlive-gnu-freefont-fonts is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916867" version="1" comment="texlive-gnuplottex is &lt;2021.186.0.0.9.5svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916868" version="1" comment="texlive-gnuplottex-doc is &lt;2021.186.0.0.9.5svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916869" version="1" comment="texlive-go is &lt;2021.186.svn28628-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916870" version="1" comment="texlive-go-doc is &lt;2021.186.svn28628-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916871" version="1" comment="texlive-gobble is &lt;2021.186.0.0.2svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916872" version="1" comment="texlive-gobble-doc is &lt;2021.186.0.0.2svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916873" version="1" comment="texlive-gofonts is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916874" version="1" comment="texlive-gofonts-doc is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916875" version="1" comment="texlive-gofonts-fonts is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916876" version="1" comment="texlive-gost is &lt;2021.186.1.2lsvn57616-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916877" version="1" comment="texlive-gost-doc is &lt;2021.186.1.2lsvn57616-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916878" version="1" comment="texlive-gothic is &lt;2021.186.svn49869-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916879" version="1" comment="texlive-gothic-doc is &lt;2021.186.svn49869-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916880" version="1" comment="texlive-gotoh is &lt;2021.186.1.1svn44764-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916881" version="1" comment="texlive-gotoh-doc is &lt;2021.186.1.1svn44764-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916882" version="1" comment="texlive-grabbox is &lt;2021.186.1.4svn51052-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916883" version="1" comment="texlive-grabbox-doc is &lt;2021.186.1.4svn51052-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916884" version="1" comment="texlive-gradientframe is &lt;2021.186.0.0.2svn21387-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916885" version="1" comment="texlive-gradientframe-doc is &lt;2021.186.0.0.2svn21387-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916886" version="1" comment="texlive-gradstudentresume is &lt;2021.186.svn38832-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916887" version="1" comment="texlive-gradstudentresume-doc is &lt;2021.186.svn38832-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916888" version="1" comment="texlive-grafcet is &lt;2021.186.1.3.5svn22509-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916889" version="1" comment="texlive-grafcet-doc is &lt;2021.186.1.3.5svn22509-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916890" version="1" comment="texlive-grant is &lt;2021.186.0.0.0.5svn56852-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916891" version="1" comment="texlive-grant-doc is &lt;2021.186.0.0.0.5svn56852-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916892" version="1" comment="texlive-graph35 is &lt;2021.186.0.0.1.1svn47522-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916893" version="1" comment="texlive-graph35-doc is &lt;2021.186.0.0.1.1svn47522-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916894" version="1" comment="texlive-graphbox is &lt;2021.186.1.1svn46360-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916895" version="1" comment="texlive-graphbox-doc is &lt;2021.186.1.1svn46360-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916896" version="1" comment="texlive-graphics is &lt;2021.186.svn56514-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916897" version="1" comment="texlive-graphics-cfg is &lt;2021.186.svn41448-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916898" version="1" comment="texlive-graphics-cfg-doc is &lt;2021.186.svn41448-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916899" version="1" comment="texlive-graphics-def is &lt;2021.186.svn58539-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916900" version="1" comment="texlive-graphics-def-doc is &lt;2021.186.svn58539-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916901" version="1" comment="texlive-graphics-doc is &lt;2021.186.svn56514-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916902" version="1" comment="texlive-graphics-pln is &lt;2021.186.svn56823-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916903" version="1" comment="texlive-graphics-pln-doc is &lt;2021.186.svn56823-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916904" version="1" comment="texlive-graphicx-psmin is &lt;2021.186.1.2svn56931-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916905" version="1" comment="texlive-graphicx-psmin-doc is &lt;2021.186.1.2svn56931-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916906" version="1" comment="texlive-graphicxbox is &lt;2021.186.1.0svn32630-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916907" version="1" comment="texlive-graphicxbox-doc is &lt;2021.186.1.0svn32630-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916908" version="1" comment="texlive-graphicxpsd is &lt;2021.186.1.2svn57341-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916909" version="1" comment="texlive-graphicxpsd-doc is &lt;2021.186.1.2svn57341-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916910" version="1" comment="texlive-graphpaper is &lt;2021.186.1.0svn58661-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916911" version="1" comment="texlive-graphpaper-doc is &lt;2021.186.1.0svn58661-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916912" version="1" comment="texlive-graphviz is &lt;2021.186.0.0.94svn31517-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916913" version="1" comment="texlive-graphviz-doc is &lt;2021.186.0.0.94svn31517-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916914" version="1" comment="texlive-grayhints is &lt;2021.186.svn49052-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916915" version="1" comment="texlive-grayhints-doc is &lt;2021.186.svn49052-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916916" version="1" comment="texlive-greek-fontenc is &lt;2021.186.2.0svn56851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916917" version="1" comment="texlive-greek-fontenc-doc is &lt;2021.186.2.0svn56851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916918" version="1" comment="texlive-greek-inputenc is &lt;2021.186.1.7svn51612-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916919" version="1" comment="texlive-greek-inputenc-doc is &lt;2021.186.1.7svn51612-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916920" version="1" comment="texlive-greekdates is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916921" version="1" comment="texlive-greekdates-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916922" version="1" comment="texlive-greektex is &lt;2021.186.svn28327-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916923" version="1" comment="texlive-greektex-doc is &lt;2021.186.svn28327-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916924" version="1" comment="texlive-greektonoi is &lt;2021.186.svn39419-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916925" version="1" comment="texlive-greektonoi-doc is &lt;2021.186.svn39419-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916926" version="1" comment="texlive-greenpoint is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916927" version="1" comment="texlive-greenpoint-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916928" version="1" comment="texlive-gregoriotex is &lt;2021.186.6.0.0svn58331-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916929" version="1" comment="texlive-gregoriotex-doc is &lt;2021.186.6.0.0svn58331-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916930" version="1" comment="texlive-gregoriotex-fonts is &lt;2021.186.6.0.0svn58331-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916931" version="1" comment="texlive-grfext is &lt;2021.186.1.3svn53024-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916932" version="1" comment="texlive-grfext-doc is &lt;2021.186.1.3svn53024-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916933" version="1" comment="texlive-grffile is &lt;2021.186.2.1svn52756-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916934" version="1" comment="texlive-grffile-doc is &lt;2021.186.2.1svn52756-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916935" version="1" comment="texlive-grfpaste is &lt;2021.186.0.0.2svn17354-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916936" version="1" comment="texlive-grfpaste-doc is &lt;2021.186.0.0.2svn17354-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916937" version="1" comment="texlive-grid is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916938" version="1" comment="texlive-grid-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916939" version="1" comment="texlive-grid-system is &lt;2021.186.0.0.3.0svn32981-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916940" version="1" comment="texlive-grid-system-doc is &lt;2021.186.0.0.3.0svn32981-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916941" version="1" comment="texlive-gridpapers is &lt;2021.186.1.0.2svn58723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916942" version="1" comment="texlive-gridpapers-doc is &lt;2021.186.1.0.2svn58723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916943" version="1" comment="texlive-gridset is &lt;2021.186.0.0.3svn53762-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916944" version="1" comment="texlive-gridset-doc is &lt;2021.186.0.0.3svn53762-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916945" version="1" comment="texlive-gridslides is &lt;2021.186.0.0.1.1svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916946" version="1" comment="texlive-gridslides-doc is &lt;2021.186.0.0.1.1svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916947" version="1" comment="texlive-grotesq is &lt;2021.186.svn35859-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916948" version="1" comment="texlive-grotesq-doc is &lt;2021.186.svn35859-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916949" version="1" comment="texlive-grotesq-fonts is &lt;2021.186.svn35859-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916950" version="1" comment="texlive-grundgesetze is &lt;2021.186.1.02svn34439-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916951" version="1" comment="texlive-grundgesetze-doc is &lt;2021.186.1.02svn34439-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916952" version="1" comment="texlive-gsemthesis is &lt;2021.186.0.0.9.4svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916953" version="1" comment="texlive-gsemthesis-doc is &lt;2021.186.0.0.9.4svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916954" version="1" comment="texlive-gsftopk is &lt;2021.186.1.19.2svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916955" version="1" comment="texlive-gsftopk-doc is &lt;2021.186.1.19.2svn52851-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916956" version="1" comment="texlive-gtl is &lt;2021.186.0.0.5svn49527-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916957" version="1" comment="texlive-gtl-doc is &lt;2021.186.0.0.5svn49527-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916958" version="1" comment="texlive-gtrcrd is &lt;2021.186.1.1svn32484-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916959" version="1" comment="texlive-gtrcrd-doc is &lt;2021.186.1.1svn32484-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916960" version="1" comment="texlive-gtrlib-largetrees is &lt;2021.186.1.2bsvn49062-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916961" version="1" comment="texlive-gtrlib-largetrees-doc is &lt;2021.186.1.2bsvn49062-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916962" version="1" comment="texlive-gu is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916963" version="1" comment="texlive-gu-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916964" version="1" comment="texlive-gudea is &lt;2021.186.0.0.0.1svn57359-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916965" version="1" comment="texlive-gudea-doc is &lt;2021.186.0.0.0.1svn57359-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916966" version="1" comment="texlive-gudea-fonts is &lt;2021.186.0.0.0.1svn57359-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916967" version="1" comment="texlive-guide-to-latex is &lt;2021.186.svn45712-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916968" version="1" comment="texlive-guitar is &lt;2021.186.1.6svn32258-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916969" version="1" comment="texlive-guitar-doc is &lt;2021.186.1.6svn32258-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916970" version="1" comment="texlive-guitarchordschemes is &lt;2021.186.0.0.7svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916971" version="1" comment="texlive-guitarchordschemes-doc is &lt;2021.186.0.0.7svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916972" version="1" comment="texlive-guitartabs is &lt;2021.186.svn48102-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916973" version="1" comment="texlive-guitartabs-doc is &lt;2021.186.svn48102-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916974" version="1" comment="texlive-guitlogo is &lt;2021.186.1.0.0_alpha.4svn55741-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916975" version="1" comment="texlive-guitlogo-doc is &lt;2021.186.1.0.0_alpha.4svn55741-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916976" version="1" comment="texlive-gustlib is &lt;2021.186.svn54074-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916977" version="1" comment="texlive-gustlib-doc is &lt;2021.186.svn54074-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916978" version="1" comment="texlive-gustprog is &lt;2021.186.svn54074-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916979" version="1" comment="texlive-gzt is &lt;2021.186.1.0.1svn57765-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916980" version="1" comment="texlive-gzt-doc is &lt;2021.186.1.0.1svn57765-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916981" version="1" comment="texlive-h2020proposal is &lt;2021.186.1.0svn38428-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916982" version="1" comment="texlive-h2020proposal-doc is &lt;2021.186.1.0svn38428-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916983" version="1" comment="texlive-hackthefootline is &lt;2021.186.svn46494-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916984" version="1" comment="texlive-hackthefootline-doc is &lt;2021.186.svn46494-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916985" version="1" comment="texlive-hacm is &lt;2021.186.0.0.1svn27671-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916986" version="1" comment="texlive-hacm-doc is &lt;2021.186.0.0.1svn27671-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916987" version="1" comment="texlive-hacm-fonts is &lt;2021.186.0.0.1svn27671-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916988" version="1" comment="texlive-hagenberg-thesis is &lt;2021.186.svn56798-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916989" version="1" comment="texlive-hagenberg-thesis-doc is &lt;2021.186.svn56798-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916990" version="1" comment="texlive-halloweenmath is &lt;2021.186.0.0.11svn52602-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916991" version="1" comment="texlive-halloweenmath-doc is &lt;2021.186.0.0.11svn52602-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916992" version="1" comment="texlive-handin is &lt;2021.186.0.0.1.1svn48255-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916993" version="1" comment="texlive-handin-doc is &lt;2021.186.0.0.1.1svn48255-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916994" version="1" comment="texlive-handout is &lt;2021.186.1.6.0svn43962-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916995" version="1" comment="texlive-handout-doc is &lt;2021.186.1.6.0svn43962-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916996" version="1" comment="texlive-hands is &lt;2021.186.svn13293-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916997" version="1" comment="texlive-hang is &lt;2021.186.2.1svn43280-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916998" version="1" comment="texlive-hang-doc is &lt;2021.186.2.1svn43280-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009916999" version="1" comment="texlive-hanging is &lt;2021.186.1.2bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917000" version="1" comment="texlive-hanging-doc is &lt;2021.186.1.2bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917001" version="1" comment="texlive-hanoi is &lt;2021.186.20120101svn25019-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917002" version="1" comment="texlive-happy4th is &lt;2021.186.20120102svn25020-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917003" version="1" comment="texlive-har2nat is &lt;2021.186.1.0svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917004" version="1" comment="texlive-har2nat-doc is &lt;2021.186.1.0svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917005" version="1" comment="texlive-haranoaji is &lt;2021.186.20210130svn57574-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917006" version="1" comment="texlive-haranoaji-doc is &lt;2021.186.20210130svn57574-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917007" version="1" comment="texlive-haranoaji-extra is &lt;2021.186.20210130svn57573-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917008" version="1" comment="texlive-haranoaji-extra-doc is &lt;2021.186.20210130svn57573-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917009" version="1" comment="texlive-haranoaji-extra-fonts is &lt;2021.186.20210130svn57573-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917010" version="1" comment="texlive-haranoaji-fonts is &lt;2021.186.20210130svn57574-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917011" version="1" comment="texlive-hardwrap is &lt;2021.186.0.0.2svn21396-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917012" version="1" comment="texlive-hardwrap-doc is &lt;2021.186.0.0.2svn21396-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917013" version="1" comment="texlive-harmony is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917014" version="1" comment="texlive-harmony-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917015" version="1" comment="texlive-harnon-cv is &lt;2021.186.1.0svn26543-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917016" version="1" comment="texlive-harnon-cv-doc is &lt;2021.186.1.0svn26543-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917017" version="1" comment="texlive-harpoon is &lt;2021.186.1.0svn21327-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917018" version="1" comment="texlive-harpoon-doc is &lt;2021.186.1.0svn21327-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917019" version="1" comment="texlive-harvard is &lt;2021.186.2.0.5svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917020" version="1" comment="texlive-harvard-doc is &lt;2021.186.2.0.5svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917021" version="1" comment="texlive-harveyballs is &lt;2021.186.1.1svn32003-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917022" version="1" comment="texlive-harveyballs-doc is &lt;2021.186.1.1svn32003-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917023" version="1" comment="texlive-harvmac is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917024" version="1" comment="texlive-harvmac-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917025" version="1" comment="texlive-hatching is &lt;2021.186.0.0.11svn23818-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917026" version="1" comment="texlive-hatching-doc is &lt;2021.186.0.0.11svn23818-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917027" version="1" comment="texlive-hausarbeit-jura is &lt;2021.186.2.1.0svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917028" version="1" comment="texlive-hausarbeit-jura-doc is &lt;2021.186.2.1.0svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917029" version="1" comment="texlive-havannah is &lt;2021.186.svn36348-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917030" version="1" comment="texlive-havannah-doc is &lt;2021.186.svn36348-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917031" version="1" comment="texlive-hc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917032" version="1" comment="texlive-hc-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917033" version="1" comment="texlive-he-she is &lt;2021.186.1.3svn41359-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917034" version="1" comment="texlive-he-she-doc is &lt;2021.186.1.3svn41359-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917035" version="1" comment="texlive-hecthese is &lt;2021.186.1.4svn56181-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917036" version="1" comment="texlive-hecthese-doc is &lt;2021.186.1.4svn56181-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917037" version="1" comment="texlive-helmholtz-ellis-ji-notation is &lt;2021.186.1.1svn55213-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917038" version="1" comment="texlive-helmholtz-ellis-ji-notation-doc is &lt;2021.186.1.1svn55213-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917039" version="1" comment="texlive-helmholtz-ellis-ji-notation-fonts is &lt;2021.186.1.1svn55213-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917040" version="1" comment="texlive-helvetic is &lt;2021.186.svn31835-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917041" version="1" comment="texlive-helvetic-fonts is &lt;2021.186.svn31835-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917042" version="1" comment="texlive-hep is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917043" version="1" comment="texlive-hep-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917044" version="1" comment="texlive-hep-paper is &lt;2021.186.1.6svn57045-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917045" version="1" comment="texlive-hep-paper-doc is &lt;2021.186.1.6svn57045-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917046" version="1" comment="texlive-hepnames is &lt;2021.186.2.0svn35722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917047" version="1" comment="texlive-hepnames-doc is &lt;2021.186.2.0svn35722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917048" version="1" comment="texlive-hepparticles is &lt;2021.186.2.0svn35723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917049" version="1" comment="texlive-hepparticles-doc is &lt;2021.186.2.0svn35723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917050" version="1" comment="texlive-hepthesis is &lt;2021.186.1.5.2svn46054-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917051" version="1" comment="texlive-hepthesis-doc is &lt;2021.186.1.5.2svn46054-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917052" version="1" comment="texlive-hepunits is &lt;2021.186.2.0.0svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917053" version="1" comment="texlive-hepunits-doc is &lt;2021.186.2.0.0svn54758-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917054" version="1" comment="texlive-here is &lt;2021.186.svn16135-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917055" version="1" comment="texlive-here-doc is &lt;2021.186.svn16135-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917056" version="1" comment="texlive-heuristica is &lt;2021.186.1.092svn51362-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917057" version="1" comment="texlive-heuristica-doc is &lt;2021.186.1.092svn51362-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917058" version="1" comment="texlive-heuristica-fonts is &lt;2021.186.1.092svn51362-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917059" version="1" comment="texlive-hexgame is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917060" version="1" comment="texlive-hexgame-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917061" version="1" comment="texlive-hf-tikz is &lt;2021.186.0.0.3asvn34733-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917062" version="1" comment="texlive-hf-tikz-doc is &lt;2021.186.0.0.3asvn34733-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917063" version="1" comment="texlive-hfbright is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917064" version="1" comment="texlive-hfbright-doc is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917065" version="1" comment="texlive-hfbright-fonts is &lt;2021.186.svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917066" version="1" comment="texlive-hfoldsty is &lt;2021.186.1.15svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917067" version="1" comment="texlive-hfoldsty-doc is &lt;2021.186.1.15svn29349-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917068" version="1" comment="texlive-hhtensor is &lt;2021.186.0.0.61svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917069" version="1" comment="texlive-hhtensor-doc is &lt;2021.186.0.0.61svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917070" version="1" comment="texlive-highlightlatex is &lt;2021.186.svn58392-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917071" version="1" comment="texlive-highlightlatex-doc is &lt;2021.186.svn58392-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917072" version="1" comment="texlive-hindawi-latex-template is &lt;2021.186.1.0svn57757-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917073" version="1" comment="texlive-hindmadurai is &lt;2021.186.0.0.0.1svn57360-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917074" version="1" comment="texlive-hindmadurai-doc is &lt;2021.186.0.0.0.1svn57360-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917075" version="1" comment="texlive-hindmadurai-fonts is &lt;2021.186.0.0.0.1svn57360-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917076" version="1" comment="texlive-histogr is &lt;2021.186.1.01svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917077" version="1" comment="texlive-histogr-doc is &lt;2021.186.1.01svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917078" version="1" comment="texlive-historische-zeitschrift is &lt;2021.186.1.2svn42635-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917079" version="1" comment="texlive-historische-zeitschrift-doc is &lt;2021.186.1.2svn42635-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917080" version="1" comment="texlive-hitec is &lt;2021.186.0.0.0betasvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917081" version="1" comment="texlive-hitec-doc is &lt;2021.186.0.0.0betasvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917082" version="1" comment="texlive-hithesis is &lt;2021.186.2.0.11svn53362-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917083" version="1" comment="texlive-hithesis-doc is &lt;2021.186.2.0.11svn53362-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917084" version="1" comment="texlive-hitreport is &lt;2021.186.1.0.0svn58357-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917085" version="1" comment="texlive-hitreport-doc is &lt;2021.186.1.0.0svn58357-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917086" version="1" comment="texlive-hitszbeamer is &lt;2021.186.1.0.0svn54381-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917087" version="1" comment="texlive-hitszbeamer-doc is &lt;2021.186.1.0.0svn54381-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917088" version="1" comment="texlive-hitszthesis is &lt;2021.186.3.2svn55643-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917089" version="1" comment="texlive-hitszthesis-doc is &lt;2021.186.3.2svn55643-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917090" version="1" comment="texlive-hletter is &lt;2021.186.4.2svn30002-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917091" version="1" comment="texlive-hletter-doc is &lt;2021.186.4.2svn30002-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917092" version="1" comment="texlive-hlist is &lt;2021.186.0.0.11svn44983-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917093" version="1" comment="texlive-hlist-doc is &lt;2021.186.0.0.11svn44983-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917094" version="1" comment="texlive-hmtrump is &lt;2021.186.1.2asvn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917095" version="1" comment="texlive-hmtrump-doc is &lt;2021.186.1.2asvn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917096" version="1" comment="texlive-hmtrump-fonts is &lt;2021.186.1.2asvn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917097" version="1" comment="texlive-hobby is &lt;2021.186.1.8svn44474-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917098" version="1" comment="texlive-hobby-doc is &lt;2021.186.1.8svn44474-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917099" version="1" comment="texlive-hobete is &lt;2021.186.svn27036-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917100" version="1" comment="texlive-hobete-doc is &lt;2021.186.svn27036-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917101" version="1" comment="texlive-hobsub is &lt;2021.186.svn52810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917102" version="1" comment="texlive-hobsub-doc is &lt;2021.186.svn52810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917103" version="1" comment="texlive-hologo is &lt;2021.186.1.14svn53048-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917104" version="1" comment="texlive-hologo-doc is &lt;2021.186.1.14svn53048-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917105" version="1" comment="texlive-hook-pre-commit-pkg is &lt;2021.186.1.1.2svn41378-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917106" version="1" comment="texlive-hopatch is &lt;2021.186.1.4svn56106-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917107" version="1" comment="texlive-hopatch-doc is &lt;2021.186.1.4svn56106-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917108" version="1" comment="texlive-horoscop is &lt;2021.186.1.01svn56021-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917109" version="1" comment="texlive-horoscop-doc is &lt;2021.186.1.01svn56021-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917110" version="1" comment="texlive-hpsdiss is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917111" version="1" comment="texlive-hpsdiss-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917112" version="1" comment="texlive-hrefhide is &lt;2021.186.1.0fsvn22255-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917113" version="1" comment="texlive-hrefhide-doc is &lt;2021.186.1.0fsvn22255-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917114" version="1" comment="texlive-hrlatex is &lt;2021.186.0.0.23svn18020-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917115" version="1" comment="texlive-hrlatex-doc is &lt;2021.186.0.0.23svn18020-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917116" version="1" comment="texlive-hu-berlin-bundle is &lt;2021.186.1.1.1svn57580-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917117" version="1" comment="texlive-hu-berlin-bundle-doc is &lt;2021.186.1.1.1svn57580-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917118" version="1" comment="texlive-hulipsum is &lt;2021.186.1.1svn56848-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917119" version="1" comment="texlive-hulipsum-doc is &lt;2021.186.1.1svn56848-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917120" version="1" comment="texlive-hustthesis is &lt;2021.186.1.4svn42547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917121" version="1" comment="texlive-hustthesis-doc is &lt;2021.186.1.4svn42547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917122" version="1" comment="texlive-hvarabic is &lt;2021.186.0.0.01svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917123" version="1" comment="texlive-hvarabic-doc is &lt;2021.186.0.0.01svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917124" version="1" comment="texlive-hvfloat is &lt;2021.186.2.19svn58411-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917125" version="1" comment="texlive-hvfloat-doc is &lt;2021.186.2.19svn58411-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917126" version="1" comment="texlive-hvindex is &lt;2021.186.0.0.04svn46051-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917127" version="1" comment="texlive-hvindex-doc is &lt;2021.186.0.0.04svn46051-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917128" version="1" comment="texlive-hvqrurl is &lt;2021.186.0.0.01asvn52993-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917129" version="1" comment="texlive-hvqrurl-doc is &lt;2021.186.0.0.01asvn52993-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917130" version="1" comment="texlive-hycolor is &lt;2021.186.1.10svn53584-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917131" version="1" comment="texlive-hycolor-doc is &lt;2021.186.1.10svn53584-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917132" version="1" comment="texlive-hypdestopt is &lt;2021.186.2.7svn56253-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917133" version="1" comment="texlive-hypdestopt-doc is &lt;2021.186.2.7svn56253-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917134" version="1" comment="texlive-hypdvips is &lt;2021.186.3.03svn53197-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917135" version="1" comment="texlive-hypdvips-doc is &lt;2021.186.3.03svn53197-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917136" version="1" comment="texlive-hyper is &lt;2021.186.4.2dsvn17357-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917137" version="1" comment="texlive-hyper-doc is &lt;2021.186.4.2dsvn17357-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917138" version="1" comment="texlive-hyperbar is &lt;2021.186.0.0.1svn48147-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917139" version="1" comment="texlive-hyperbar-doc is &lt;2021.186.0.0.1svn48147-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917140" version="1" comment="texlive-hypernat is &lt;2021.186.1.0bsvn17358-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917141" version="1" comment="texlive-hypernat-doc is &lt;2021.186.1.0bsvn17358-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917142" version="1" comment="texlive-hyperref is &lt;2021.186.7.00ksvn58024-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917143" version="1" comment="texlive-hyperref-doc is &lt;2021.186.7.00ksvn58024-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917144" version="1" comment="texlive-hyperxmp is &lt;2021.186.5.9svn57004-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917145" version="1" comment="texlive-hyperxmp-doc is &lt;2021.186.5.9svn57004-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917146" version="1" comment="texlive-hyph-utf8 is &lt;2021.186.svn58619-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917147" version="1" comment="texlive-hyph-utf8-doc is &lt;2021.186.svn58619-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917148" version="1" comment="texlive-hyphen-afrikaans is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917149" version="1" comment="texlive-hyphen-ancientgreek is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917150" version="1" comment="texlive-hyphen-arabic is &lt;2021.186.svn54568-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917151" version="1" comment="texlive-hyphen-armenian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917152" version="1" comment="texlive-hyphen-base is &lt;2021.186.svn58630-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917153" version="1" comment="texlive-hyphen-basque is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917154" version="1" comment="texlive-hyphen-belarusian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917155" version="1" comment="texlive-hyphen-bulgarian is &lt;2021.186.svn58685-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917156" version="1" comment="texlive-hyphen-catalan is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917157" version="1" comment="texlive-hyphen-chinese is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917158" version="1" comment="texlive-hyphen-churchslavonic is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917159" version="1" comment="texlive-hyphen-coptic is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917160" version="1" comment="texlive-hyphen-croatian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917161" version="1" comment="texlive-hyphen-czech is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917162" version="1" comment="texlive-hyphen-danish is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917163" version="1" comment="texlive-hyphen-dutch is &lt;2021.186.1.1svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917164" version="1" comment="texlive-hyphen-english is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917165" version="1" comment="texlive-hyphen-esperanto is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917166" version="1" comment="texlive-hyphen-estonian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917167" version="1" comment="texlive-hyphen-ethiopic is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917168" version="1" comment="texlive-hyphen-farsi is &lt;2021.186.svn54568-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917169" version="1" comment="texlive-hyphen-finnish is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917170" version="1" comment="texlive-hyphen-french is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917171" version="1" comment="texlive-hyphen-friulan is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917172" version="1" comment="texlive-hyphen-galician is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917173" version="1" comment="texlive-hyphen-georgian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917174" version="1" comment="texlive-hyphen-german is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917175" version="1" comment="texlive-hyphen-greek is &lt;2021.186.5svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917176" version="1" comment="texlive-hyphen-greek-doc is &lt;2021.186.5svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917177" version="1" comment="texlive-hyphen-hungarian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917178" version="1" comment="texlive-hyphen-hungarian-doc is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917179" version="1" comment="texlive-hyphen-icelandic is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917180" version="1" comment="texlive-hyphen-indic is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917181" version="1" comment="texlive-hyphen-indonesian is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917182" version="1" comment="texlive-hyphen-interlingua is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917183" version="1" comment="texlive-hyphen-irish is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917184" version="1" comment="texlive-hyphen-italian is &lt;2021.186.4.8gsvn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917185" version="1" comment="texlive-hyphen-kurmanji is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917186" version="1" comment="texlive-hyphen-latin is &lt;2021.186.3.1svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917187" version="1" comment="texlive-hyphen-latvian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917188" version="1" comment="texlive-hyphen-lithuanian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917189" version="1" comment="texlive-hyphen-macedonian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917190" version="1" comment="texlive-hyphen-mongolian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917191" version="1" comment="texlive-hyphen-norwegian is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917192" version="1" comment="texlive-hyphen-occitan is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917193" version="1" comment="texlive-hyphen-piedmontese is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917194" version="1" comment="texlive-hyphen-polish is &lt;2021.186.3.0bsvn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917195" version="1" comment="texlive-hyphen-portuguese is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917196" version="1" comment="texlive-hyphen-romanian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917197" version="1" comment="texlive-hyphen-romansh is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917198" version="1" comment="texlive-hyphen-russian is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917199" version="1" comment="texlive-hyphen-sanskrit is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917200" version="1" comment="texlive-hyphen-sanskrit-doc is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917201" version="1" comment="texlive-hyphen-serbian is &lt;2021.186.1.0asvn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917202" version="1" comment="texlive-hyphen-slovak is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917203" version="1" comment="texlive-hyphen-slovenian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917204" version="1" comment="texlive-hyphen-spanish is &lt;2021.186.5.0svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917205" version="1" comment="texlive-hyphen-spanish-doc is &lt;2021.186.5.0svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917206" version="1" comment="texlive-hyphen-swedish is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917207" version="1" comment="texlive-hyphen-thai is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917208" version="1" comment="texlive-hyphen-turkish is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917209" version="1" comment="texlive-hyphen-turkmen is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917210" version="1" comment="texlive-hyphen-ukrainian is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917211" version="1" comment="texlive-hyphen-uppersorbian is &lt;2021.186.svn58609-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917212" version="1" comment="texlive-hyphen-welsh is &lt;2021.186.svn58652-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917213" version="1" comment="texlive-hyphenat is &lt;2021.186.2.3csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917214" version="1" comment="texlive-hyphenat-doc is &lt;2021.186.2.3csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917215" version="1" comment="texlive-hyphenex is &lt;2021.186.svn57387-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917216" version="1" comment="texlive-hyplain is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917217" version="1" comment="texlive-hyplain-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917218" version="1" comment="texlive-ibarra is &lt;2021.186.svn55820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917219" version="1" comment="texlive-ibarra-doc is &lt;2021.186.svn55820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917220" version="1" comment="texlive-ibarra-fonts is &lt;2021.186.svn55820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917221" version="1" comment="texlive-ibycus-babel is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917222" version="1" comment="texlive-ibycus-babel-doc is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917223" version="1" comment="texlive-ibygrk is &lt;2021.186.4.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917224" version="1" comment="texlive-ibygrk-doc is &lt;2021.186.4.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917225" version="1" comment="texlive-ibygrk-fonts is &lt;2021.186.4.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917226" version="1" comment="texlive-icite is &lt;2021.186.1.3asvn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917227" version="1" comment="texlive-icite-doc is &lt;2021.186.1.3asvn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917228" version="1" comment="texlive-icsv is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917229" version="1" comment="texlive-icsv-doc is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917230" version="1" comment="texlive-identkey is &lt;2021.186.0.0.1.0svn49018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917231" version="1" comment="texlive-identkey-doc is &lt;2021.186.0.0.1.0svn49018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917232" version="1" comment="texlive-idxcmds is &lt;2021.186.0.0.2csvn54554-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917233" version="1" comment="texlive-idxcmds-doc is &lt;2021.186.0.0.2csvn54554-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917234" version="1" comment="texlive-idxlayout is &lt;2021.186.0.0.4dsvn25821-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917235" version="1" comment="texlive-idxlayout-doc is &lt;2021.186.0.0.4dsvn25821-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917236" version="1" comment="texlive-ieeepes is &lt;2021.186.4.0svn17359-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917237" version="1" comment="texlive-ieeepes-doc is &lt;2021.186.4.0svn17359-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917238" version="1" comment="texlive-ietfbibs is &lt;2021.186.1.0.0svn41332-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917239" version="1" comment="texlive-iffont is &lt;2021.186.1.0.0svn38823-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917240" version="1" comment="texlive-iffont-doc is &lt;2021.186.1.0.0svn38823-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917241" version="1" comment="texlive-ifmslide is &lt;2021.186.0.0.47svn20727-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917242" version="1" comment="texlive-ifmslide-doc is &lt;2021.186.0.0.47svn20727-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917243" version="1" comment="texlive-ifmtarg is &lt;2021.186.1.2bsvn47544-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917244" version="1" comment="texlive-ifmtarg-doc is &lt;2021.186.1.2bsvn47544-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917245" version="1" comment="texlive-ifnextok is &lt;2021.186.0.0.3svn23379-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917246" version="1" comment="texlive-ifnextok-doc is &lt;2021.186.0.0.3svn23379-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917247" version="1" comment="texlive-ifoddpage is &lt;2021.186.1.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917248" version="1" comment="texlive-ifoddpage-doc is &lt;2021.186.1.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917249" version="1" comment="texlive-ifplatform is &lt;2021.186.0.0.4asvn45533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917250" version="1" comment="texlive-ifplatform-doc is &lt;2021.186.0.0.4asvn45533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917251" version="1" comment="texlive-ifptex is &lt;2021.186.2.0svn52626-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917252" version="1" comment="texlive-ifptex-doc is &lt;2021.186.2.0svn52626-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917253" version="1" comment="texlive-ifsym is &lt;2021.186.svn24868-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917254" version="1" comment="texlive-ifsym-doc is &lt;2021.186.svn24868-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917255" version="1" comment="texlive-iftex is &lt;2021.186.1.0dsvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917256" version="1" comment="texlive-iftex-doc is &lt;2021.186.1.0dsvn56594-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917257" version="1" comment="texlive-ifthenx is &lt;2021.186.0.0.1asvn25819-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917258" version="1" comment="texlive-ifthenx-doc is &lt;2021.186.0.0.1asvn25819-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917259" version="1" comment="texlive-ifxptex is &lt;2021.186.0.0.2svn46153-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917260" version="1" comment="texlive-ifxptex-doc is &lt;2021.186.0.0.2svn46153-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917261" version="1" comment="texlive-iitem is &lt;2021.186.1.0svn29613-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917262" version="1" comment="texlive-iitem-doc is &lt;2021.186.1.0svn29613-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917263" version="1" comment="texlive-ijmart is &lt;2021.186.1.7svn30958-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917264" version="1" comment="texlive-ijmart-doc is &lt;2021.186.1.7svn30958-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917265" version="1" comment="texlive-ijqc is &lt;2021.186.1.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917266" version="1" comment="texlive-ijqc-doc is &lt;2021.186.1.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917267" version="1" comment="texlive-ijsra is &lt;2021.186.1.1svn44886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917268" version="1" comment="texlive-ijsra-doc is &lt;2021.186.1.1svn44886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917269" version="1" comment="texlive-imac is &lt;2021.186.svn17347-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917270" version="1" comment="texlive-imac-doc is &lt;2021.186.svn17347-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917271" version="1" comment="texlive-image-gallery is &lt;2021.186.1.0jsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917272" version="1" comment="texlive-image-gallery-doc is &lt;2021.186.1.0jsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917273" version="1" comment="texlive-imakeidx is &lt;2021.186.1.3esvn42287-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917274" version="1" comment="texlive-imakeidx-doc is &lt;2021.186.1.3esvn42287-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917275" version="1" comment="texlive-imfellenglish is &lt;2021.186.svn38547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917276" version="1" comment="texlive-imfellenglish-doc is &lt;2021.186.svn38547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917277" version="1" comment="texlive-imfellenglish-fonts is &lt;2021.186.svn38547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917278" version="1" comment="texlive-impatient is &lt;2021.186.2020svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917279" version="1" comment="texlive-impatient-cn is &lt;2021.186.2020svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917280" version="1" comment="texlive-impatient-fr is &lt;2021.186.2020svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917281" version="1" comment="texlive-impnattypo is &lt;2021.186.1.5svn50227-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917282" version="1" comment="texlive-impnattypo-doc is &lt;2021.186.1.5svn50227-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917283" version="1" comment="texlive-import is &lt;2021.186.6.2svn54683-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917284" version="1" comment="texlive-import-doc is &lt;2021.186.6.2svn54683-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917285" version="1" comment="texlive-imsproc is &lt;2021.186.0.0.1svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917286" version="1" comment="texlive-imsproc-doc is &lt;2021.186.0.0.1svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917287" version="1" comment="texlive-imtekda is &lt;2021.186.1.7svn17667-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917288" version="1" comment="texlive-imtekda-doc is &lt;2021.186.1.7svn17667-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917289" version="1" comment="texlive-incgraph is &lt;2021.186.1.12svn36500-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917290" version="1" comment="texlive-incgraph-doc is &lt;2021.186.1.12svn36500-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917291" version="1" comment="texlive-includernw is &lt;2021.186.0.0.1.0svn47557-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917292" version="1" comment="texlive-includernw-doc is &lt;2021.186.0.0.1.0svn47557-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917293" version="1" comment="texlive-inconsolata is &lt;2021.186.1.121svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917294" version="1" comment="texlive-inconsolata-doc is &lt;2021.186.1.121svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917295" version="1" comment="texlive-inconsolata-fonts is &lt;2021.186.1.121svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917296" version="1" comment="texlive-index is &lt;2021.186.4.1betasvn24099-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917297" version="1" comment="texlive-index-doc is &lt;2021.186.4.1betasvn24099-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917298" version="1" comment="texlive-indextools is &lt;2021.186.1.5.1svn38931-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917299" version="1" comment="texlive-indextools-doc is &lt;2021.186.1.5.1svn38931-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917300" version="1" comment="texlive-infwarerr is &lt;2021.186.1.5svn53023-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917301" version="1" comment="texlive-infwarerr-doc is &lt;2021.186.1.5svn53023-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917302" version="1" comment="texlive-initials is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917303" version="1" comment="texlive-initials-doc is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917304" version="1" comment="texlive-initials-fonts is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917305" version="1" comment="texlive-inkpaper is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917306" version="1" comment="texlive-inkpaper-doc is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917307" version="1" comment="texlive-inline-images is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917308" version="1" comment="texlive-inline-images-doc is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917309" version="1" comment="texlive-inlinebib is &lt;2021.186.svn22018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917310" version="1" comment="texlive-inlinebib-doc is &lt;2021.186.svn22018-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917311" version="1" comment="texlive-inlinedef is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917312" version="1" comment="texlive-inlinedef-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917313" version="1" comment="texlive-innerscript is &lt;2021.186.1.1svn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917314" version="1" comment="texlive-innerscript-doc is &lt;2021.186.1.1svn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917315" version="1" comment="texlive-inputenx is &lt;2021.186.1.12svn52986-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917316" version="1" comment="texlive-inputenx-doc is &lt;2021.186.1.12svn52986-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917317" version="1" comment="texlive-inputtrc is &lt;2021.186.0.0.3svn28019-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917318" version="1" comment="texlive-inputtrc-doc is &lt;2021.186.0.0.3svn28019-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917319" version="1" comment="texlive-inriafonts is &lt;2021.186.1.0svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917320" version="1" comment="texlive-inriafonts-doc is &lt;2021.186.1.0svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917321" version="1" comment="texlive-inriafonts-fonts is &lt;2021.186.1.0svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917322" version="1" comment="texlive-insbox is &lt;2021.186.2.2svn34299-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917323" version="1" comment="texlive-insbox-doc is &lt;2021.186.2.2svn34299-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917324" version="1" comment="texlive-install-latex-guide-zh-cn is &lt;2021.186.2021.2.1svn57590-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917325" version="1" comment="texlive-intcalc is &lt;2021.186.1.3svn53168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917326" version="1" comment="texlive-intcalc-doc is &lt;2021.186.1.3svn53168-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917327" version="1" comment="texlive-inter is &lt;2021.186.svn57213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917328" version="1" comment="texlive-inter-doc is &lt;2021.186.svn57213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917329" version="1" comment="texlive-inter-fonts is &lt;2021.186.svn57213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917330" version="1" comment="texlive-interactiveworkbook is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917331" version="1" comment="texlive-interactiveworkbook-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917332" version="1" comment="texlive-interchar is &lt;2021.186.0.0.2svn36312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917333" version="1" comment="texlive-interchar-doc is &lt;2021.186.0.0.2svn36312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917334" version="1" comment="texlive-interfaces is &lt;2021.186.3.1svn21474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917335" version="1" comment="texlive-interfaces-doc is &lt;2021.186.3.1svn21474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917336" version="1" comment="texlive-interpreter is &lt;2021.186.1.2svn27232-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917337" version="1" comment="texlive-interpreter-doc is &lt;2021.186.1.2svn27232-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917338" version="1" comment="texlive-interval is &lt;2021.186.0.0.4svn50265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917339" version="1" comment="texlive-interval-doc is &lt;2021.186.0.0.4svn50265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917340" version="1" comment="texlive-intopdf is &lt;2021.186.0.0.4.0svn58743-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917341" version="1" comment="texlive-intopdf-doc is &lt;2021.186.0.0.4.0svn58743-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917342" version="1" comment="texlive-intro-scientific is &lt;2021.186.5th_editionsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917343" version="1" comment="texlive-inversepath is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917344" version="1" comment="texlive-inversepath-doc is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917345" version="1" comment="texlive-invoice is &lt;2021.186.svn48359-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917346" version="1" comment="texlive-invoice-class is &lt;2021.186.1.0svn49749-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917347" version="1" comment="texlive-invoice-class-doc is &lt;2021.186.1.0svn49749-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917348" version="1" comment="texlive-invoice-doc is &lt;2021.186.svn48359-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917349" version="1" comment="texlive-invoice2 is &lt;2021.186.svn46364-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917350" version="1" comment="texlive-invoice2-doc is &lt;2021.186.svn46364-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917351" version="1" comment="texlive-iodhbwm is &lt;2021.186.1.2.2svn57773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917352" version="1" comment="texlive-iodhbwm-doc is &lt;2021.186.1.2.2svn57773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917353" version="1" comment="texlive-ionumbers is &lt;2021.186.0.0.3.3svn33457-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917354" version="1" comment="texlive-ionumbers-doc is &lt;2021.186.0.0.3.3svn33457-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917355" version="1" comment="texlive-iopart-num is &lt;2021.186.2.1svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917356" version="1" comment="texlive-iopart-num-doc is &lt;2021.186.2.1svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917357" version="1" comment="texlive-ipaex is &lt;2021.186.svn52032-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917358" version="1" comment="texlive-ipaex-doc is &lt;2021.186.svn52032-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917359" version="1" comment="texlive-ipaex-fonts is &lt;2021.186.svn52032-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917360" version="1" comment="texlive-ipaex-type1 is &lt;2021.186.0.0.5svn47700-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917361" version="1" comment="texlive-ipaex-type1-doc is &lt;2021.186.0.0.5svn47700-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917362" version="1" comment="texlive-ipaex-type1-fonts is &lt;2021.186.0.0.5svn47700-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917363" version="1" comment="texlive-is-bst is &lt;2021.186.2.03svn52623-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917364" version="1" comment="texlive-is-bst-doc is &lt;2021.186.2.03svn52623-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917365" version="1" comment="texlive-iscram is &lt;2021.186.1.1svn45801-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917366" version="1" comment="texlive-iscram-doc is &lt;2021.186.1.1svn45801-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917367" version="1" comment="texlive-iso is &lt;2021.186.2.4svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917368" version="1" comment="texlive-iso-doc is &lt;2021.186.2.4svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917369" version="1" comment="texlive-iso10303 is &lt;2021.186.1.5svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917370" version="1" comment="texlive-iso10303-doc is &lt;2021.186.1.5svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917371" version="1" comment="texlive-isodate is &lt;2021.186.2.28svn16613-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917372" version="1" comment="texlive-isodate-doc is &lt;2021.186.2.28svn16613-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917373" version="1" comment="texlive-isodoc is &lt;2021.186.1.12svn57811-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917374" version="1" comment="texlive-isodoc-doc is &lt;2021.186.1.12svn57811-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917375" version="1" comment="texlive-isomath is &lt;2021.186.0.0.6.1svn27654-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917376" version="1" comment="texlive-isomath-doc is &lt;2021.186.0.0.6.1svn27654-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917377" version="1" comment="texlive-isonums is &lt;2021.186.1.0svn17362-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917378" version="1" comment="texlive-isonums-doc is &lt;2021.186.1.0svn17362-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917379" version="1" comment="texlive-isopt is &lt;2021.186.0.0.01svn45509-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917380" version="1" comment="texlive-isopt-doc is &lt;2021.186.0.0.01svn45509-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917381" version="1" comment="texlive-isorot is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917382" version="1" comment="texlive-isorot-doc is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917383" version="1" comment="texlive-isotope is &lt;2021.186.0.0.3svn23711-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917384" version="1" comment="texlive-isotope-doc is &lt;2021.186.0.0.3svn23711-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917385" version="1" comment="texlive-issuulinks is &lt;2021.186.1.1svn25742-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917386" version="1" comment="texlive-issuulinks-doc is &lt;2021.186.1.1svn25742-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917387" version="1" comment="texlive-istgame is &lt;2021.186.2.0svn49848-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917388" version="1" comment="texlive-istgame-doc is &lt;2021.186.2.0svn49848-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917389" version="1" comment="texlive-itnumpar is &lt;2021.186.1.0svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917390" version="1" comment="texlive-itnumpar-doc is &lt;2021.186.1.0svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917391" version="1" comment="texlive-iwhdp is &lt;2021.186.0.0.50svn37552-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917392" version="1" comment="texlive-iwhdp-doc is &lt;2021.186.0.0.50svn37552-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917393" version="1" comment="texlive-iwona is &lt;2021.186.0.0.995bsvn19611-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917394" version="1" comment="texlive-iwona-doc is &lt;2021.186.0.0.995bsvn19611-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917395" version="1" comment="texlive-iwona-fonts is &lt;2021.186.0.0.995bsvn19611-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917396" version="1" comment="texlive-jablantile is &lt;2021.186.svn16364-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917397" version="1" comment="texlive-jablantile-doc is &lt;2021.186.svn16364-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917398" version="1" comment="texlive-jacow is &lt;2021.186.2.4svn50870-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917399" version="1" comment="texlive-jacow-doc is &lt;2021.186.2.4svn50870-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917400" version="1" comment="texlive-jadetex is &lt;2021.186.3.13svn57186-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917401" version="1" comment="texlive-jadetex-doc is &lt;2021.186.3.13svn57186-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917402" version="1" comment="texlive-jamtimes is &lt;2021.186.1.12svn20408-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917403" version="1" comment="texlive-jamtimes-doc is &lt;2021.186.1.12svn20408-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917404" version="1" comment="texlive-japanese-otf is &lt;2021.186.1.7b8svn57826-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917405" version="1" comment="texlive-japanese-otf-doc is &lt;2021.186.1.7b8svn57826-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917406" version="1" comment="texlive-japanese-otf-uptex is &lt;2021.186.0.0.26svn56932-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917407" version="1" comment="texlive-japanese-otf-uptex-doc is &lt;2021.186.0.0.26svn56932-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917408" version="1" comment="texlive-jbact is &lt;2021.186.1.30svn52717-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917409" version="1" comment="texlive-jfmutil is &lt;2021.186.1.3.1svn55044-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917410" version="1" comment="texlive-jfmutil-doc is &lt;2021.186.1.3.1svn55044-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917411" version="1" comment="texlive-jigsaw is &lt;2021.186.0.0.1asvn49111-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917412" version="1" comment="texlive-jigsaw-doc is &lt;2021.186.0.0.1asvn49111-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917413" version="1" comment="texlive-jkmath is &lt;2021.186.0.0.1svn47109-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917414" version="1" comment="texlive-jkmath-doc is &lt;2021.186.0.0.1svn47109-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917415" version="1" comment="texlive-jknapltx is &lt;2021.186.svn19440-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917416" version="1" comment="texlive-jknapltx-doc is &lt;2021.186.svn19440-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917417" version="1" comment="texlive-jlabels is &lt;2021.186.svn24858-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917418" version="1" comment="texlive-jlabels-doc is &lt;2021.186.svn24858-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917419" version="1" comment="texlive-jlreq is &lt;2021.186.svn58472-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917420" version="1" comment="texlive-jlreq-deluxe is &lt;2021.186.0.0.4.0svn58329-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917421" version="1" comment="texlive-jlreq-deluxe-doc is &lt;2021.186.0.0.4.0svn58329-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917422" version="1" comment="texlive-jlreq-doc is &lt;2021.186.svn58472-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917423" version="1" comment="texlive-jmb is &lt;2021.186.1.21svn52718-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917424" version="1" comment="texlive-jmlr is &lt;2021.186.1.28svn56395-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917425" version="1" comment="texlive-jmlr-doc is &lt;2021.186.1.28svn56395-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917426" version="1" comment="texlive-jmn is &lt;2021.186.svn45751-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917427" version="1" comment="texlive-jmn-fonts is &lt;2021.186.svn45751-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917428" version="1" comment="texlive-jneurosci is &lt;2021.186.1.00svn17346-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917429" version="1" comment="texlive-jneurosci-doc is &lt;2021.186.1.00svn17346-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917430" version="1" comment="texlive-jnuexam is &lt;2021.186.1.0svn56867-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917431" version="1" comment="texlive-jnuexam-doc is &lt;2021.186.1.0svn56867-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917432" version="1" comment="texlive-josefin is &lt;2021.186.svn57152-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917433" version="1" comment="texlive-josefin-doc is &lt;2021.186.svn57152-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917434" version="1" comment="texlive-josefin-fonts is &lt;2021.186.svn57152-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917435" version="1" comment="texlive-jpsj is &lt;2021.186.1.2.2svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917436" version="1" comment="texlive-jpsj-doc is &lt;2021.186.1.2.2svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917437" version="1" comment="texlive-js-misc is &lt;2021.186.svn16211-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917438" version="1" comment="texlive-js-misc-doc is &lt;2021.186.svn16211-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917439" version="1" comment="texlive-jsclasses is &lt;2021.186.svn56608-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917440" version="1" comment="texlive-jsclasses-doc is &lt;2021.186.svn56608-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917441" version="1" comment="texlive-jslectureplanner is &lt;2021.186.1.12svn57095-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917442" version="1" comment="texlive-jslectureplanner-doc is &lt;2021.186.1.12svn57095-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917443" version="1" comment="texlive-jumplines is &lt;2021.186.0.0.2svn37553-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917444" version="1" comment="texlive-jumplines-doc is &lt;2021.186.0.0.2svn37553-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917445" version="1" comment="texlive-junicode is &lt;2021.186.1.0.2svn53954-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917446" version="1" comment="texlive-junicode-doc is &lt;2021.186.1.0.2svn53954-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917447" version="1" comment="texlive-junicode-fonts is &lt;2021.186.1.0.2svn53954-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917448" version="1" comment="texlive-jupynotex is &lt;2021.186.0.0.1svn56715-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917449" version="1" comment="texlive-jupynotex-doc is &lt;2021.186.0.0.1svn56715-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917450" version="1" comment="texlive-jura is &lt;2021.186.4.3svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917451" version="1" comment="texlive-jura-doc is &lt;2021.186.4.3svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917452" version="1" comment="texlive-juraabbrev is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917453" version="1" comment="texlive-juraabbrev-doc is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917454" version="1" comment="texlive-jurabib is &lt;2021.186.0.0.6svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917455" version="1" comment="texlive-jurabib-doc is &lt;2021.186.0.0.6svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917456" version="1" comment="texlive-juramisc is &lt;2021.186.0.0.91svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917457" version="1" comment="texlive-juramisc-doc is &lt;2021.186.0.0.91svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917458" version="1" comment="texlive-jurarsp is &lt;2021.186.0.0.52svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917459" version="1" comment="texlive-jurarsp-doc is &lt;2021.186.0.0.52svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917460" version="1" comment="texlive-jvlisting is &lt;2021.186.0.0.7svn24638-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917461" version="1" comment="texlive-jvlisting-doc is &lt;2021.186.0.0.7svn24638-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917462" version="1" comment="texlive-kalendarium is &lt;2021.186.1.0svn48744-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917463" version="1" comment="texlive-kalendarium-doc is &lt;2021.186.1.0svn48744-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917464" version="1" comment="texlive-kanaparser is &lt;2021.186.1.0svn48052-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917465" version="1" comment="texlive-kanaparser-doc is &lt;2021.186.1.0svn48052-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917466" version="1" comment="texlive-kantlipsum is &lt;2021.186.0.0.8asvn51727-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917467" version="1" comment="texlive-kantlipsum-doc is &lt;2021.186.0.0.8asvn51727-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917468" version="1" comment="texlive-karnaugh is &lt;2021.186.svn21338-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917469" version="1" comment="texlive-karnaugh-doc is &lt;2021.186.svn21338-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917470" version="1" comment="texlive-karnaugh-map is &lt;2021.186.1.1svn44131-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917471" version="1" comment="texlive-karnaugh-map-doc is &lt;2021.186.1.1svn44131-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917472" version="1" comment="texlive-karnaughmap is &lt;2021.186.2.0svn36989-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917473" version="1" comment="texlive-karnaughmap-doc is &lt;2021.186.2.0svn36989-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917474" version="1" comment="texlive-kastrup is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917475" version="1" comment="texlive-kastrup-doc is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917476" version="1" comment="texlive-kblocks is &lt;2021.186.2.0svn57617-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917477" version="1" comment="texlive-kblocks-doc is &lt;2021.186.2.0svn57617-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917478" version="1" comment="texlive-kdgdocs is &lt;2021.186.1.0svn24498-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917479" version="1" comment="texlive-kdgdocs-doc is &lt;2021.186.1.0svn24498-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917480" version="1" comment="texlive-kerkis is &lt;2021.186.1.11svn56271-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917481" version="1" comment="texlive-kerkis-doc is &lt;2021.186.1.11svn56271-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917482" version="1" comment="texlive-kerkis-fonts is &lt;2021.186.1.11svn56271-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917483" version="1" comment="texlive-kerntest is &lt;2021.186.1.32svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917484" version="1" comment="texlive-kerntest-doc is &lt;2021.186.1.32svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917485" version="1" comment="texlive-ketcindy is &lt;2021.186.20191225.0svn58661-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917486" version="1" comment="texlive-ketcindy-doc is &lt;2021.186.20191225.0svn58661-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917487" version="1" comment="texlive-keycommand is &lt;2021.186.3.1415svn18042-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917488" version="1" comment="texlive-keycommand-doc is &lt;2021.186.3.1415svn18042-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917489" version="1" comment="texlive-keyfloat is &lt;2021.186.2.01svn52160-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917490" version="1" comment="texlive-keyfloat-doc is &lt;2021.186.2.01svn52160-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917491" version="1" comment="texlive-keyindex is &lt;2021.186.1.0svn50828-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917492" version="1" comment="texlive-keyindex-doc is &lt;2021.186.1.0svn50828-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917493" version="1" comment="texlive-keyreader is &lt;2021.186.0.0.5bsvn28195-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917494" version="1" comment="texlive-keyreader-doc is &lt;2021.186.0.0.5bsvn28195-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917495" version="1" comment="texlive-keystroke is &lt;2021.186.1.6svn17992-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917496" version="1" comment="texlive-keystroke-doc is &lt;2021.186.1.6svn17992-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917497" version="1" comment="texlive-keyval2e is &lt;2021.186.0.0.0.2svn23698-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917498" version="1" comment="texlive-keyval2e-doc is &lt;2021.186.0.0.0.2svn23698-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917499" version="1" comment="texlive-keyvaltable is &lt;2021.186.2.2svn54677-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917500" version="1" comment="texlive-keyvaltable-doc is &lt;2021.186.2.2svn54677-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917501" version="1" comment="texlive-kix is &lt;2021.186.svn21606-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917502" version="1" comment="texlive-kix-doc is &lt;2021.186.svn21606-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917503" version="1" comment="texlive-kixfont is &lt;2021.186.svn18488-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917504" version="1" comment="texlive-kixfont-doc is &lt;2021.186.svn18488-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917505" version="1" comment="texlive-kluwer is &lt;2021.186.svn54074-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917506" version="1" comment="texlive-kluwer-doc is &lt;2021.186.svn54074-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917507" version="1" comment="texlive-knitting is &lt;2021.186.3.0svn50782-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917508" version="1" comment="texlive-knitting-doc is &lt;2021.186.3.0svn50782-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917509" version="1" comment="texlive-knitting-fonts is &lt;2021.186.3.0svn50782-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917510" version="1" comment="texlive-knittingpattern is &lt;2021.186.svn17205-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917511" version="1" comment="texlive-knittingpattern-doc is &lt;2021.186.svn17205-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917512" version="1" comment="texlive-knowledge is &lt;2021.186.1.25svn58724-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917513" version="1" comment="texlive-knowledge-doc is &lt;2021.186.1.25svn58724-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917514" version="1" comment="texlive-knuth-errata is &lt;2021.186.svn58682-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917515" version="1" comment="texlive-knuth-lib is &lt;2021.186.svn57963-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917516" version="1" comment="texlive-knuth-local is &lt;2021.186.svn57963-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917517" version="1" comment="texlive-knuth-pdf is &lt;2021.186.1.1svn58470-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917518" version="1" comment="texlive-koma-moderncvclassic is &lt;2021.186.0.0.5svn25025-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917519" version="1" comment="texlive-koma-moderncvclassic-doc is &lt;2021.186.0.0.5svn25025-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917520" version="1" comment="texlive-koma-script is &lt;2021.186.3.33svn58585-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917521" version="1" comment="texlive-koma-script-doc is &lt;2021.186.3.33svn58585-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917522" version="1" comment="texlive-koma-script-examples is &lt;2021.186.svn47523-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917523" version="1" comment="texlive-koma-script-sfs is &lt;2021.186.1.0svn26137-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917524" version="1" comment="texlive-koma-script-sfs-doc is &lt;2021.186.1.0svn26137-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917525" version="1" comment="texlive-komacv is &lt;2021.186.1.1.2svn57721-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917526" version="1" comment="texlive-komacv-doc is &lt;2021.186.1.1.2svn57721-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917527" version="1" comment="texlive-komacv-rg is &lt;2021.186.0.0.9.2svn49064-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917528" version="1" comment="texlive-komacv-rg-doc is &lt;2021.186.0.0.9.2svn49064-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917529" version="1" comment="texlive-kotex-oblivoir is &lt;2021.186.3.0.1svn58436-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917530" version="1" comment="texlive-kotex-oblivoir-doc is &lt;2021.186.3.0.1svn58436-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917531" version="1" comment="texlive-kotex-plain is &lt;2021.186.2.1.1asvn38630-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917532" version="1" comment="texlive-kotex-plain-doc is &lt;2021.186.2.1.1asvn38630-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917533" version="1" comment="texlive-kotex-utf is &lt;2021.186.2.1.2svn38558-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917534" version="1" comment="texlive-kotex-utf-doc is &lt;2021.186.2.1.2svn38558-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917535" version="1" comment="texlive-kotex-utils is &lt;2021.186.2.1.0svn38727-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917536" version="1" comment="texlive-kotex-utils-doc is &lt;2021.186.2.1.0svn38727-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917537" version="1" comment="texlive-kpathsea is &lt;2021.186.svn58622-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917538" version="1" comment="texlive-kpathsea-doc is &lt;2021.186.svn58622-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917539" version="1" comment="texlive-kpfonts is &lt;2021.186.3.33svn55643-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917540" version="1" comment="texlive-kpfonts-doc is &lt;2021.186.3.33svn55643-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917541" version="1" comment="texlive-kpfonts-fonts is &lt;2021.186.3.33svn55643-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917542" version="1" comment="texlive-kpfonts-otf is &lt;2021.186.0.0.35svn58435-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917543" version="1" comment="texlive-kpfonts-otf-doc is &lt;2021.186.0.0.35svn58435-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917544" version="1" comment="texlive-kpfonts-otf-fonts is &lt;2021.186.0.0.35svn58435-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917545" version="1" comment="texlive-ksfh_nat is &lt;2021.186.1.1svn24825-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917546" version="1" comment="texlive-ksp-thesis is &lt;2021.186.1.0.2svn39080-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917547" version="1" comment="texlive-ksp-thesis-doc is &lt;2021.186.1.0.2svn39080-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917548" version="1" comment="texlive-ktv-texdata is &lt;2021.186.05.34svn27369-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917549" version="1" comment="texlive-ktv-texdata-doc is &lt;2021.186.05.34svn27369-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917550" version="1" comment="texlive-ku-template is &lt;2021.186.0.0.02svn45935-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917551" version="1" comment="texlive-ku-template-doc is &lt;2021.186.0.0.02svn45935-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917552" version="1" comment="texlive-kurdishlipsum is &lt;2021.186.1.1svn47518-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917553" version="1" comment="texlive-kurdishlipsum-doc is &lt;2021.186.1.1svn47518-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917554" version="1" comment="texlive-kurier is &lt;2021.186.0.0.995bsvn19612-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917555" version="1" comment="texlive-kurier-doc is &lt;2021.186.0.0.995bsvn19612-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917556" version="1" comment="texlive-kurier-fonts is &lt;2021.186.0.0.995bsvn19612-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917557" version="1" comment="texlive-kvdefinekeys is &lt;2021.186.1.6svn53193-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917558" version="1" comment="texlive-kvdefinekeys-doc is &lt;2021.186.1.6svn53193-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917559" version="1" comment="texlive-kvmap is &lt;2021.186.0.0.3.5svn56361-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917560" version="1" comment="texlive-kvmap-doc is &lt;2021.186.0.0.3.5svn56361-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917561" version="1" comment="texlive-kvoptions is &lt;2021.186.3.14svn56609-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917562" version="1" comment="texlive-kvoptions-doc is &lt;2021.186.3.14svn56609-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917563" version="1" comment="texlive-kvsetkeys is &lt;2021.186.1.18svn53166-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917564" version="1" comment="texlive-kvsetkeys-doc is &lt;2021.186.1.18svn53166-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917565" version="1" comment="texlive-l2picfaq is &lt;2021.186.1.50svn19601-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917566" version="1" comment="texlive-l2tabu is &lt;2021.186.2.4svn39597-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917567" version="1" comment="texlive-l2tabu-english is &lt;2021.186.1.8.5.7svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917568" version="1" comment="texlive-l2tabu-french is &lt;2021.186.2.3svn31315-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917569" version="1" comment="texlive-l2tabu-italian is &lt;2021.186.2.3svn25218-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917570" version="1" comment="texlive-l2tabu-spanish is &lt;2021.186.1.1svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917571" version="1" comment="texlive-l3backend is &lt;2021.186.svn58509-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917572" version="1" comment="texlive-l3backend-doc is &lt;2021.186.svn58509-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917573" version="1" comment="texlive-l3build is &lt;2021.186.svn55426-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917574" version="1" comment="texlive-l3build-doc is &lt;2021.186.svn55426-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917575" version="1" comment="texlive-l3experimental is &lt;2021.186.svn57789-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917576" version="1" comment="texlive-l3experimental-doc is &lt;2021.186.svn57789-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917577" version="1" comment="texlive-l3kernel is &lt;2021.186.svn57789-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917578" version="1" comment="texlive-l3kernel-doc is &lt;2021.186.svn57789-48.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917579" version="1" comment="texlive-l3packages is &lt;2021.186.svn58296-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917580" version="1" comment="texlive-l3packages-doc is &lt;2021.186.svn58296-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917581" version="1" comment="texlive-labbook is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917582" version="1" comment="texlive-labbook-doc is &lt;2021.186.svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917583" version="1" comment="texlive-labels is &lt;2021.186.0.0.13svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917584" version="1" comment="texlive-labels-doc is &lt;2021.186.0.0.13svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917585" version="1" comment="texlive-labels4easylist is &lt;2021.186.1.0svn51124-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917586" version="1" comment="texlive-labels4easylist-doc is &lt;2021.186.1.0svn51124-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917587" version="1" comment="texlive-labelschanged is &lt;2021.186.1.0svn46040-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917588" version="1" comment="texlive-labelschanged-doc is &lt;2021.186.1.0svn46040-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917589" version="1" comment="texlive-labyrinth is &lt;2021.186.1.0svn33454-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917590" version="1" comment="texlive-labyrinth-doc is &lt;2021.186.1.0svn33454-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917591" version="1" comment="texlive-lacheck is &lt;2021.186.svn54070-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917592" version="1" comment="texlive-ladder is &lt;2021.186.svn44394-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917593" version="1" comment="texlive-ladder-doc is &lt;2021.186.svn44394-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917594" version="1" comment="texlive-lambda is &lt;2021.186.svn45756-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917595" version="1" comment="texlive-lambda-lists is &lt;2021.186.svn31402-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917596" version="1" comment="texlive-lambda-lists-doc is &lt;2021.186.svn31402-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917597" version="1" comment="texlive-langcode is &lt;2021.186.0.0.2svn27764-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917598" version="1" comment="texlive-langcode-doc is &lt;2021.186.0.0.2svn27764-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917599" version="1" comment="texlive-langsci is &lt;2021.186.svn58476-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917600" version="1" comment="texlive-langsci-avm is &lt;2021.186.0.0.2.1svn55846-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917601" version="1" comment="texlive-langsci-avm-doc is &lt;2021.186.0.0.2.1svn55846-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917602" version="1" comment="texlive-langsci-doc is &lt;2021.186.svn58476-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917603" version="1" comment="texlive-lapdf is &lt;2021.186.1.1svn23806-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917604" version="1" comment="texlive-lapdf-doc is &lt;2021.186.1.1svn23806-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917605" version="1" comment="texlive-lastpackage is &lt;2021.186.0.0.1svn34481-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917606" version="1" comment="texlive-lastpackage-doc is &lt;2021.186.0.0.1svn34481-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917607" version="1" comment="texlive-lastpage is &lt;2021.186.1.2msvn36680-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917608" version="1" comment="texlive-lastpage-doc is &lt;2021.186.1.2msvn36680-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917609" version="1" comment="texlive-latex is &lt;2021.186.20201001_pl4svn57354-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917610" version="1" comment="texlive-latex-amsmath-dev is &lt;2021.186.20210501_pre_release_0svn56791-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917611" version="1" comment="texlive-latex-amsmath-dev-doc is &lt;2021.186.20210501_pre_release_0svn56791-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917612" version="1" comment="texlive-latex-base-dev is &lt;2021.186.20210501_pre_release_2svn57982-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917613" version="1" comment="texlive-latex-base-dev-doc is &lt;2021.186.20210501_pre_release_2svn57982-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917614" version="1" comment="texlive-latex-bin is &lt;2021.186.svn57972-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917615" version="1" comment="texlive-latex-bin-dev is &lt;2021.186.svn57981-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917616" version="1" comment="texlive-latex-brochure is &lt;2021.186.svn40612-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917617" version="1" comment="texlive-latex-course is &lt;2021.186.2svn25505-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917618" version="1" comment="texlive-latex-doc is &lt;2021.186.20201001_pl4svn57354-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917619" version="1" comment="texlive-latex-doc-ptr is &lt;2021.186.svn57311-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917620" version="1" comment="texlive-latex-firstaid-dev is &lt;2021.186.1.0ksvn57981-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917621" version="1" comment="texlive-latex-firstaid-dev-doc is &lt;2021.186.1.0ksvn57981-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917622" version="1" comment="texlive-latex-fonts is &lt;2021.186.svn28888-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917623" version="1" comment="texlive-latex-fonts-doc is &lt;2021.186.svn28888-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917624" version="1" comment="texlive-latex-git-log is &lt;2021.186.1.0.0svn54010-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917625" version="1" comment="texlive-latex-git-log-doc is &lt;2021.186.1.0.0svn54010-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917626" version="1" comment="texlive-latex-graphics-companion is &lt;2021.186.svn29235-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917627" version="1" comment="texlive-latex-graphics-dev is &lt;2021.186.20210501_pre_release_0svn56791-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917628" version="1" comment="texlive-latex-graphics-dev-doc is &lt;2021.186.20210501_pre_release_0svn56791-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917629" version="1" comment="texlive-latex-make is &lt;2021.186.2.4.2svn57349-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917630" version="1" comment="texlive-latex-make-doc is &lt;2021.186.2.4.2svn57349-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917631" version="1" comment="texlive-latex-mr is &lt;2021.186.1.0svn55475-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917632" version="1" comment="texlive-latex-notes-zh-cn is &lt;2021.186.1.20svn15878-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917633" version="1" comment="texlive-latex-papersize is &lt;2021.186.1.63svn53131-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917634" version="1" comment="texlive-latex-papersize-doc is &lt;2021.186.1.63svn53131-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917635" version="1" comment="texlive-latex-refsheet is &lt;2021.186.1.2svn45076-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917636" version="1" comment="texlive-latex-tools-dev is &lt;2021.186.20210501_pre_release_1svn57982-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917637" version="1" comment="texlive-latex-tools-dev-doc is &lt;2021.186.20210501_pre_release_1svn57982-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917638" version="1" comment="texlive-latex-uni8 is &lt;2021.186.0.0.03svn49729-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917639" version="1" comment="texlive-latex-uni8-doc is &lt;2021.186.0.0.03svn49729-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917640" version="1" comment="texlive-latex-veryshortguide is &lt;2021.186.0.0.7svn55228-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917641" version="1" comment="texlive-latex-via-exemplos is &lt;2021.186.0.0.5.6svn53248-48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917642" version="1" comment="texlive-latex-web-companion is &lt;2021.187.svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917643" version="1" comment="texlive-latex2e-help-texinfo is &lt;2021.187.svn57213-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917644" version="1" comment="texlive-latex2e-help-texinfo-fr is &lt;2021.187.svn57275-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917645" version="1" comment="texlive-latex2e-help-texinfo-spanish is &lt;2021.187.svn57213-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917646" version="1" comment="texlive-latex2man is &lt;2021.187.1.29svn49249-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917647" version="1" comment="texlive-latex2man-doc is &lt;2021.187.1.29svn49249-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917648" version="1" comment="texlive-latex2nemeth is &lt;2021.187.1.0.2svn54389-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917649" version="1" comment="texlive-latex2nemeth-doc is &lt;2021.187.1.0.2svn54389-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917650" version="1" comment="texlive-latex4musicians is &lt;2021.187.1.0.1svn49759-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917651" version="1" comment="texlive-latex4wp is &lt;2021.187.1.0.10svn35999-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917652" version="1" comment="texlive-latex4wp-it is &lt;2021.187.1.0.10svn36000-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917653" version="1" comment="texlive-latexbangla is &lt;2021.187.0.0.2svn55475-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917654" version="1" comment="texlive-latexbangla-doc is &lt;2021.187.0.0.2svn55475-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917655" version="1" comment="texlive-latexbug is &lt;2021.187.1.0jsvn58151-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917656" version="1" comment="texlive-latexbug-doc is &lt;2021.187.1.0jsvn58151-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917657" version="1" comment="texlive-latexcheat is &lt;2021.187.1.13svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917658" version="1" comment="texlive-latexcheat-de is &lt;2021.187.svn35702-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917659" version="1" comment="texlive-latexcheat-esmx is &lt;2021.187.2.00svn36866-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917660" version="1" comment="texlive-latexcheat-ptbr is &lt;2021.187.1.13svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917661" version="1" comment="texlive-latexcolors is &lt;2021.187.0.0.1asvn49888-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917662" version="1" comment="texlive-latexcolors-doc is &lt;2021.187.0.0.1asvn49888-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917663" version="1" comment="texlive-latexconfig is &lt;2021.187.svn53525-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917664" version="1" comment="texlive-latexcourse-rug is &lt;2021.187.1.1svn39026-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917665" version="1" comment="texlive-latexdemo is &lt;2021.187.0.0.1svn55265-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917666" version="1" comment="texlive-latexdemo-doc is &lt;2021.187.0.0.1svn55265-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917667" version="1" comment="texlive-latexdiff is &lt;2021.187.1.3.1.1svn55540-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917668" version="1" comment="texlive-latexdiff-doc is &lt;2021.187.1.3.1.1svn55540-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917669" version="1" comment="texlive-latexfileinfo-pkgs is &lt;2021.187.0.0.22svn26760-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917670" version="1" comment="texlive-latexfileinfo-pkgs-doc is &lt;2021.187.0.0.22svn26760-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917671" version="1" comment="texlive-latexfileversion is &lt;2021.187.0.0.3svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917672" version="1" comment="texlive-latexfileversion-doc is &lt;2021.187.0.0.3svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917673" version="1" comment="texlive-latexgit is &lt;2021.187.svn54811-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917674" version="1" comment="texlive-latexgit-doc is &lt;2021.187.svn54811-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917675" version="1" comment="texlive-latexindent is &lt;2021.187.3.9.1svn58595-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917676" version="1" comment="texlive-latexindent-doc is &lt;2021.187.3.9.1svn58595-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917677" version="1" comment="texlive-latexmk is &lt;2021.187.4.70bsvn57213-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917678" version="1" comment="texlive-latexmk-doc is &lt;2021.187.4.70bsvn57213-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917679" version="1" comment="texlive-latexmp is &lt;2021.187.1.2.1svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917680" version="1" comment="texlive-latexmp-doc is &lt;2021.187.1.2.1svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917681" version="1" comment="texlive-latexpand is &lt;2021.187.1.6svn53109-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917682" version="1" comment="texlive-latexpand-doc is &lt;2021.187.1.6svn53109-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917683" version="1" comment="texlive-latino-sine-flexione is &lt;2021.187.1.2svn53485-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917684" version="1" comment="texlive-latino-sine-flexione-doc is &lt;2021.187.1.2svn53485-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917685" version="1" comment="texlive-lato is &lt;2021.187.3.3svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917686" version="1" comment="texlive-lato-doc is &lt;2021.187.3.3svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917687" version="1" comment="texlive-lato-fonts is &lt;2021.187.3.3svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917688" version="1" comment="texlive-layaureo is &lt;2021.187.0.0.2svn19087-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917689" version="1" comment="texlive-layaureo-doc is &lt;2021.187.0.0.2svn19087-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917690" version="1" comment="texlive-layouts is &lt;2021.187.2.6dsvn42428-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917691" version="1" comment="texlive-layouts-doc is &lt;2021.187.2.6dsvn42428-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917692" version="1" comment="texlive-lazylist is &lt;2021.187.1.0asvn17691-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917693" version="1" comment="texlive-lazylist-doc is &lt;2021.187.1.0asvn17691-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917694" version="1" comment="texlive-lccaps is &lt;2021.187.1.0svn46432-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917695" version="1" comment="texlive-lccaps-doc is &lt;2021.187.1.0svn46432-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917696" version="1" comment="texlive-lcd is &lt;2021.187.0.0.3svn16549-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917697" version="1" comment="texlive-lcd-doc is &lt;2021.187.0.0.3svn16549-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917698" version="1" comment="texlive-lcdftypetools is &lt;2021.187.svn52851-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917699" version="1" comment="texlive-lcg is &lt;2021.187.1.3svn31474-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917700" version="1" comment="texlive-lcg-doc is &lt;2021.187.1.3svn31474-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917701" version="1" comment="texlive-lcyw is &lt;2021.187.1.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917702" version="1" comment="texlive-lcyw-doc is &lt;2021.187.1.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917703" version="1" comment="texlive-leading is &lt;2021.187.0.0.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917704" version="1" comment="texlive-leading-doc is &lt;2021.187.0.0.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917705" version="1" comment="texlive-leadsheets is &lt;2021.187.0.0.6svn52275-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917706" version="1" comment="texlive-leadsheets-doc is &lt;2021.187.0.0.6svn52275-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917707" version="1" comment="texlive-leaflet is &lt;2021.187.2.1asvn56878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917708" version="1" comment="texlive-leaflet-doc is &lt;2021.187.2.1asvn56878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917709" version="1" comment="texlive-lebhart is &lt;2021.187.svn58503-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917710" version="1" comment="texlive-lebhart-doc is &lt;2021.187.svn58503-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917711" version="1" comment="texlive-lecturer is &lt;2021.187.svn23916-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917712" version="1" comment="texlive-lecturer-doc is &lt;2021.187.svn23916-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917713" version="1" comment="texlive-lectures is &lt;2021.187.1.0.5svn53642-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917714" version="1" comment="texlive-lectures-doc is &lt;2021.187.1.0.5svn53642-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917715" version="1" comment="texlive-lectureslides is &lt;2021.187.0.0.1svn58393-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917716" version="1" comment="texlive-lectureslides-doc is &lt;2021.187.0.0.1svn58393-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917717" version="1" comment="texlive-ledmac is &lt;2021.187.0.0.19.4svn41811-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917718" version="1" comment="texlive-ledmac-doc is &lt;2021.187.0.0.19.4svn41811-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917719" version="1" comment="texlive-leftidx is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917720" version="1" comment="texlive-leftidx-doc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917721" version="1" comment="texlive-leftindex is &lt;2021.187.0.0.1betasvn56182-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917722" version="1" comment="texlive-leftindex-doc is &lt;2021.187.0.0.1betasvn56182-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917723" version="1" comment="texlive-leipzig is &lt;2021.187.2.3svn52450-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917724" version="1" comment="texlive-leipzig-doc is &lt;2021.187.2.3svn52450-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917725" version="1" comment="texlive-lengthconvert is &lt;2021.187.1.0asvn55064-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917726" version="1" comment="texlive-lengthconvert-doc is &lt;2021.187.1.0asvn55064-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917727" version="1" comment="texlive-letltxmacro is &lt;2021.187.1.6svn53022-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917728" version="1" comment="texlive-letltxmacro-doc is &lt;2021.187.1.6svn53022-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917729" version="1" comment="texlive-letterspacing is &lt;2021.187.svn54266-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917730" version="1" comment="texlive-letterswitharrows is &lt;2021.187.svn53709-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917731" version="1" comment="texlive-letterswitharrows-doc is &lt;2021.187.svn53709-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917732" version="1" comment="texlive-lettre is &lt;2021.187.3.002svn54722-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917733" version="1" comment="texlive-lettre-doc is &lt;2021.187.3.002svn54722-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917734" version="1" comment="texlive-lettrine is &lt;2021.187.2.23svn54560-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917735" version="1" comment="texlive-lettrine-doc is &lt;2021.187.2.23svn54560-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917736" version="1" comment="texlive-levy is &lt;2021.187.svn21750-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917737" version="1" comment="texlive-levy-doc is &lt;2021.187.svn21750-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917738" version="1" comment="texlive-lewis is &lt;2021.187.0.0.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917739" version="1" comment="texlive-lewis-doc is &lt;2021.187.0.0.1svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917740" version="1" comment="texlive-lexend is &lt;2021.187.1.1.0.70svn57564-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917741" version="1" comment="texlive-lexend-doc is &lt;2021.187.1.1.0.70svn57564-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917742" version="1" comment="texlive-lexend-fonts is &lt;2021.187.1.1.0.70svn57564-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917743" version="1" comment="texlive-lexikon is &lt;2021.187.1.0csvn17364-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917744" version="1" comment="texlive-lexikon-doc is &lt;2021.187.1.0csvn17364-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917745" version="1" comment="texlive-lexref is &lt;2021.187.1.1asvn36026-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917746" version="1" comment="texlive-lexref-doc is &lt;2021.187.1.1asvn36026-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917747" version="1" comment="texlive-lfb is &lt;2021.187.1.0svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917748" version="1" comment="texlive-lfb-doc is &lt;2021.187.1.0svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917749" version="1" comment="texlive-lgreek is &lt;2021.187.svn21818-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917750" version="1" comment="texlive-lgreek-doc is &lt;2021.187.svn21818-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917751" version="1" comment="texlive-lh is &lt;2021.187.3.5gsvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917752" version="1" comment="texlive-lh-doc is &lt;2021.187.3.5gsvn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917753" version="1" comment="texlive-lhcyr is &lt;2021.187.svn31795-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917754" version="1" comment="texlive-lhelp is &lt;2021.187.2.0svn23638-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917755" version="1" comment="texlive-lhelp-doc is &lt;2021.187.2.0svn23638-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917756" version="1" comment="texlive-libertine is &lt;2021.187.5.3.0svn54583-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917757" version="1" comment="texlive-libertine-doc is &lt;2021.187.5.3.0svn54583-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917758" version="1" comment="texlive-libertine-fonts is &lt;2021.187.5.3.0svn54583-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917759" version="1" comment="texlive-libertinegc is &lt;2021.187.1.01svn44616-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917760" version="1" comment="texlive-libertinegc-doc is &lt;2021.187.1.01svn44616-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917761" version="1" comment="texlive-libertinus is &lt;2021.187.0.0.02svn55064-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917762" version="1" comment="texlive-libertinus-doc is &lt;2021.187.0.0.02svn55064-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917763" version="1" comment="texlive-libertinus-fonts is &lt;2021.187.7.040svn57948-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917764" version="1" comment="texlive-libertinus-fonts-doc is &lt;2021.187.7.040svn57948-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917765" version="1" comment="texlive-libertinus-fonts-fonts is &lt;2021.187.7.040svn57948-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917766" version="1" comment="texlive-libertinus-otf is &lt;2021.187.0.0.28svn57398-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917767" version="1" comment="texlive-libertinus-otf-doc is &lt;2021.187.0.0.28svn57398-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917768" version="1" comment="texlive-libertinus-type1 is &lt;2021.187.svn57754-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917769" version="1" comment="texlive-libertinus-type1-doc is &lt;2021.187.svn57754-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917770" version="1" comment="texlive-libertinus-type1-fonts is &lt;2021.187.svn57754-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917771" version="1" comment="texlive-libertinust1math is &lt;2021.187.1.2.2svn56861-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917772" version="1" comment="texlive-libertinust1math-doc is &lt;2021.187.1.2.2svn56861-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917773" version="1" comment="texlive-libertinust1math-fonts is &lt;2021.187.1.2.2svn56861-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917774" version="1" comment="texlive-libgreek is &lt;2021.187.1.0svn27789-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917775" version="1" comment="texlive-libgreek-doc is &lt;2021.187.1.0svn27789-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917776" version="1" comment="texlive-librarian is &lt;2021.187.1.0svn19880-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917777" version="1" comment="texlive-librarian-doc is &lt;2021.187.1.0svn19880-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917778" version="1" comment="texlive-librebaskerville is &lt;2021.187.svn56018-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917779" version="1" comment="texlive-librebaskerville-doc is &lt;2021.187.svn56018-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917780" version="1" comment="texlive-librebaskerville-fonts is &lt;2021.187.svn56018-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917781" version="1" comment="texlive-librebodoni is &lt;2021.187.svn39375-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917782" version="1" comment="texlive-librebodoni-doc is &lt;2021.187.svn39375-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917783" version="1" comment="texlive-librebodoni-fonts is &lt;2021.187.svn39375-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917784" version="1" comment="texlive-librecaslon is &lt;2021.187.svn56003-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917785" version="1" comment="texlive-librecaslon-doc is &lt;2021.187.svn56003-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917786" version="1" comment="texlive-librecaslon-fonts is &lt;2021.187.svn56003-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917787" version="1" comment="texlive-librefranklin is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917788" version="1" comment="texlive-librefranklin-doc is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917789" version="1" comment="texlive-librefranklin-fonts is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917790" version="1" comment="texlive-libris is &lt;2021.187.1.007svn19409-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917791" version="1" comment="texlive-libris-doc is &lt;2021.187.1.007svn19409-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917792" version="1" comment="texlive-libris-fonts is &lt;2021.187.1.007svn19409-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917793" version="1" comment="texlive-lie-hasse is &lt;2021.187.1.0svn53653-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917794" version="1" comment="texlive-lie-hasse-doc is &lt;2021.187.1.0svn53653-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917795" version="1" comment="texlive-light-latex-make is &lt;2021.187.0.0.2.0svn56513-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917796" version="1" comment="texlive-light-latex-make-doc is &lt;2021.187.0.0.2.0svn56513-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917797" version="1" comment="texlive-lilyglyphs is &lt;2021.187.0.0.2.4svn56473-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917798" version="1" comment="texlive-lilyglyphs-doc is &lt;2021.187.0.0.2.4svn56473-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917799" version="1" comment="texlive-lilyglyphs-fonts is &lt;2021.187.0.0.2.4svn56473-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917800" version="1" comment="texlive-limap is &lt;2021.187.2.2svn44863-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917801" version="1" comment="texlive-limap-doc is &lt;2021.187.2.2svn44863-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917802" version="1" comment="texlive-limecv is &lt;2021.187.0.0.1.8svn54329-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917803" version="1" comment="texlive-limecv-doc is &lt;2021.187.0.0.1.8svn54329-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917804" version="1" comment="texlive-linearA is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917805" version="1" comment="texlive-linearA-doc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917806" version="1" comment="texlive-linearA-fonts is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917807" version="1" comment="texlive-linegoal is &lt;2021.187.2.9svn21523-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917808" version="1" comment="texlive-linegoal-doc is &lt;2021.187.2.9svn21523-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917809" version="1" comment="texlive-lineno is &lt;2021.187.4.41svn57866-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917810" version="1" comment="texlive-lineno-doc is &lt;2021.187.4.41svn57866-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917811" version="1" comment="texlive-ling-macros is &lt;2021.187.svn42268-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917812" version="1" comment="texlive-ling-macros-doc is &lt;2021.187.svn42268-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917813" version="1" comment="texlive-linguex is &lt;2021.187.4.3svn30815-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917814" version="1" comment="texlive-linguex-doc is &lt;2021.187.4.3svn30815-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917815" version="1" comment="texlive-linguisticspro is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917816" version="1" comment="texlive-linguisticspro-doc is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917817" version="1" comment="texlive-linguisticspro-fonts is &lt;2021.187.svn54512-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917818" version="1" comment="texlive-linop is &lt;2021.187.0.0.1svn41304-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917819" version="1" comment="texlive-linop-doc is &lt;2021.187.0.0.1svn41304-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917820" version="1" comment="texlive-lion-msc is &lt;2021.187.0.0.30svn55415-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917821" version="1" comment="texlive-lion-msc-doc is &lt;2021.187.0.0.30svn55415-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917822" version="1" comment="texlive-lipsum is &lt;2021.187.2.3svn58123-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917823" version="1" comment="texlive-lipsum-doc is &lt;2021.187.2.3svn58123-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917824" version="1" comment="texlive-lisp-on-tex is &lt;2021.187.2.0svn38722-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917825" version="1" comment="texlive-lisp-on-tex-doc is &lt;2021.187.2.0svn38722-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917826" version="1" comment="texlive-listbib is &lt;2021.187.2.2svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917827" version="1" comment="texlive-listbib-doc is &lt;2021.187.2.2svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917828" version="1" comment="texlive-listing is &lt;2021.187.1.2svn17373-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917829" version="1" comment="texlive-listing-doc is &lt;2021.187.1.2svn17373-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917830" version="1" comment="texlive-listings is &lt;2021.187.1.8dsvn55265-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917831" version="1" comment="texlive-listings-doc is &lt;2021.187.1.8dsvn55265-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917832" version="1" comment="texlive-listings-ext is &lt;2021.187.67svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917833" version="1" comment="texlive-listings-ext-doc is &lt;2021.187.67svn29349-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917834" version="1" comment="texlive-listingsutf8 is &lt;2021.187.1.5svn53097-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917835" version="1" comment="texlive-listingsutf8-doc is &lt;2021.187.1.5svn53097-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917836" version="1" comment="texlive-listlbls is &lt;2021.187.1.03svn34893-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917837" version="1" comment="texlive-listlbls-doc is &lt;2021.187.1.03svn34893-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917838" version="1" comment="texlive-listliketab is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917839" version="1" comment="texlive-listliketab-doc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917840" version="1" comment="texlive-listofitems is &lt;2021.187.1.63svn51923-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917841" version="1" comment="texlive-listofitems-doc is &lt;2021.187.1.63svn51923-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917842" version="1" comment="texlive-listofsymbols is &lt;2021.187.0.0.2svn16134-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917843" version="1" comment="texlive-listofsymbols-doc is &lt;2021.187.0.0.2svn16134-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917844" version="1" comment="texlive-lithuanian is &lt;2021.187.svn46039-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917845" version="1" comment="texlive-lithuanian-doc is &lt;2021.187.svn46039-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917846" version="1" comment="texlive-liturg is &lt;2021.187.1.0svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917847" version="1" comment="texlive-liturg-doc is &lt;2021.187.1.0svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917848" version="1" comment="texlive-lkproof is &lt;2021.187.3.1svn20021-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917849" version="1" comment="texlive-lkproof-doc is &lt;2021.187.3.1svn20021-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917850" version="1" comment="texlive-llncsconf is &lt;2021.187.1.1.0svn55117-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917851" version="1" comment="texlive-llncsconf-doc is &lt;2021.187.1.1.0svn55117-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917852" version="1" comment="texlive-lm is &lt;2021.187.2.005svn58637-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917853" version="1" comment="texlive-lm-doc is &lt;2021.187.2.005svn58637-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917854" version="1" comment="texlive-lm-fonts is &lt;2021.187.2.005svn58637-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917855" version="1" comment="texlive-lm-math is &lt;2021.187.1.959svn36915-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917856" version="1" comment="texlive-lm-math-doc is &lt;2021.187.1.959svn36915-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917857" version="1" comment="texlive-lm-math-fonts is &lt;2021.187.1.959svn36915-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917858" version="1" comment="texlive-lmake is &lt;2021.187.1.0svn25552-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917859" version="1" comment="texlive-lmake-doc is &lt;2021.187.1.0svn25552-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917860" version="1" comment="texlive-lni is &lt;2021.187.1.7svn58061-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917861" version="1" comment="texlive-lni-doc is &lt;2021.187.1.7svn58061-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917862" version="1" comment="texlive-lobster2 is &lt;2021.187.svn56019-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917863" version="1" comment="texlive-lobster2-doc is &lt;2021.187.svn56019-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917864" version="1" comment="texlive-lobster2-fonts is &lt;2021.187.svn56019-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917865" version="1" comment="texlive-locality is &lt;2021.187.0.0.2svn20422-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917866" version="1" comment="texlive-locality-doc is &lt;2021.187.0.0.2svn20422-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917867" version="1" comment="texlive-localloc is &lt;2021.187.svn56496-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917868" version="1" comment="texlive-localloc-doc is &lt;2021.187.svn56496-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917869" version="1" comment="texlive-logbox is &lt;2021.187.1.0svn24499-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917870" version="1" comment="texlive-logbox-doc is &lt;2021.187.1.0svn24499-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917871" version="1" comment="texlive-logical-markup-utils is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917872" version="1" comment="texlive-logical-markup-utils-doc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917873" version="1" comment="texlive-logicproof is &lt;2021.187.svn33254-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917874" version="1" comment="texlive-logicproof-doc is &lt;2021.187.svn33254-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917875" version="1" comment="texlive-logicpuzzle is &lt;2021.187.2.5svn34491-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917876" version="1" comment="texlive-logicpuzzle-doc is &lt;2021.187.2.5svn34491-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917877" version="1" comment="texlive-logix is &lt;2021.187.1.08svn57457-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917878" version="1" comment="texlive-logix-doc is &lt;2021.187.1.08svn57457-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917879" version="1" comment="texlive-logix-fonts is &lt;2021.187.1.08svn57457-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917880" version="1" comment="texlive-logpap is &lt;2021.187.0.0.6svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917881" version="1" comment="texlive-logpap-doc is &lt;2021.187.0.0.6svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917882" version="1" comment="texlive-logreq is &lt;2021.187.1.0svn53003-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917883" version="1" comment="texlive-logreq-doc is &lt;2021.187.1.0svn53003-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917884" version="1" comment="texlive-lollipop is &lt;2021.187.1.07svn45678-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917885" version="1" comment="texlive-lollipop-doc is &lt;2021.187.1.07svn45678-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917886" version="1" comment="texlive-longdivision is &lt;2021.187.1.2.0svn55117-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917887" version="1" comment="texlive-longdivision-doc is &lt;2021.187.1.2.0svn55117-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917888" version="1" comment="texlive-longfbox is &lt;2021.187.1.0svn39028-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917889" version="1" comment="texlive-longfbox-doc is &lt;2021.187.1.0svn39028-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917890" version="1" comment="texlive-longfigure is &lt;2021.187.1.0svn34302-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917891" version="1" comment="texlive-longfigure-doc is &lt;2021.187.1.0svn34302-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917892" version="1" comment="texlive-longnamefilelist is &lt;2021.187.0.0.2svn27889-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917893" version="1" comment="texlive-longnamefilelist-doc is &lt;2021.187.0.0.2svn27889-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917894" version="1" comment="texlive-loops is &lt;2021.187.1.3svn30704-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917895" version="1" comment="texlive-loops-doc is &lt;2021.187.1.3svn30704-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917896" version="1" comment="texlive-lpform is &lt;2021.187.svn36918-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917897" version="1" comment="texlive-lpform-doc is &lt;2021.187.svn36918-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917898" version="1" comment="texlive-lpic is &lt;2021.187.0.0.8svn20843-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917899" version="1" comment="texlive-lpic-doc is &lt;2021.187.0.0.8svn20843-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917900" version="1" comment="texlive-lplfitch is &lt;2021.187.0.0.9svn31077-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917901" version="1" comment="texlive-lplfitch-doc is &lt;2021.187.0.0.9svn31077-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917902" version="1" comment="texlive-lps is &lt;2021.187.0.0.7svn21322-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917903" version="1" comment="texlive-lps-doc is &lt;2021.187.0.0.7svn21322-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917904" version="1" comment="texlive-lroundrect is &lt;2021.187.1.0svn39804-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917905" version="1" comment="texlive-lroundrect-doc is &lt;2021.187.1.0svn39804-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917906" version="1" comment="texlive-lsc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917907" version="1" comment="texlive-lsc-doc is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917908" version="1" comment="texlive-lshort-bulgarian is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917909" version="1" comment="texlive-lshort-chinese is &lt;2021.187.6.02svn56036-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917910" version="1" comment="texlive-lshort-czech is &lt;2021.187.4.27svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917911" version="1" comment="texlive-lshort-dutch is &lt;2021.187.1.3svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917912" version="1" comment="texlive-lshort-english is &lt;2021.187.6.4svn58309-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917913" version="1" comment="texlive-lshort-estonian is &lt;2021.187.5.05svn39323-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917914" version="1" comment="texlive-lshort-finnish is &lt;2021.187.svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917915" version="1" comment="texlive-lshort-french is &lt;2021.187.5.01fr_0svn23332-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917916" version="1" comment="texlive-lshort-german is &lt;2021.187.3.0csvn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917917" version="1" comment="texlive-lshort-italian is &lt;2021.187.6.2svn57038-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917918" version="1" comment="texlive-lshort-japanese is &lt;2021.187.svn36207-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917919" version="1" comment="texlive-lshort-korean is &lt;2021.187.svn58468-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917920" version="1" comment="texlive-lshort-mongol is &lt;2021.187.4.26svn15878-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917921" version="1" comment="texlive-lshort-persian is &lt;2021.187.5.01svn31296-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917922" version="1" comment="texlive-lshort-polish is &lt;2021.187.svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917923" version="1" comment="texlive-lshort-portuguese is &lt;2021.187.5.01.0svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917924" version="1" comment="texlive-lshort-russian is &lt;2021.187.svn55643-47.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917925" version="1" comment="texlive-lshort-slovak is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917926" version="1" comment="texlive-lshort-slovenian is &lt;2021.186.4.20svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917927" version="1" comment="texlive-lshort-spanish is &lt;2021.186.0.0.5svn35050-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917928" version="1" comment="texlive-lshort-thai is &lt;2021.186.1.32svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917929" version="1" comment="texlive-lshort-turkish is &lt;2021.186.4.20svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917930" version="1" comment="texlive-lshort-ukr is &lt;2021.186.4.00svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917931" version="1" comment="texlive-lshort-vietnamese is &lt;2021.186.4.00svn55643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917932" version="1" comment="texlive-lstaddons is &lt;2021.186.0.0.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917933" version="1" comment="texlive-lstaddons-doc is &lt;2021.186.0.0.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917934" version="1" comment="texlive-lstbayes is &lt;2021.186.svn48160-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917935" version="1" comment="texlive-lstbayes-doc is &lt;2021.186.svn48160-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917936" version="1" comment="texlive-lstfiracode is &lt;2021.186.0.0.1csvn49503-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917937" version="1" comment="texlive-lstfiracode-doc is &lt;2021.186.0.0.1csvn49503-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917938" version="1" comment="texlive-lt3graph is &lt;2021.186.0.0.1.9svn45913-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917939" version="1" comment="texlive-lt3graph-doc is &lt;2021.186.0.0.1.9svn45913-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917940" version="1" comment="texlive-ltablex is &lt;2021.186.1.1svn34923-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917941" version="1" comment="texlive-ltablex-doc is &lt;2021.186.1.1svn34923-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917942" version="1" comment="texlive-ltabptch is &lt;2021.186.1.74dsvn17533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917943" version="1" comment="texlive-ltabptch-doc is &lt;2021.186.1.74dsvn17533-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917944" version="1" comment="texlive-ltb2bib is &lt;2021.186.0.0.01svn43746-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917945" version="1" comment="texlive-ltb2bib-doc is &lt;2021.186.0.0.01svn43746-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917946" version="1" comment="texlive-ltxcmds is &lt;2021.186.1.25svn56421-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917947" version="1" comment="texlive-ltxcmds-doc is &lt;2021.186.1.25svn56421-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917948" version="1" comment="texlive-ltxdockit is &lt;2021.186.1.2dsvn21869-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917949" version="1" comment="texlive-ltxdockit-doc is &lt;2021.186.1.2dsvn21869-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917950" version="1" comment="texlive-ltxfileinfo is &lt;2021.186.2.04svn38663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917951" version="1" comment="texlive-ltxfileinfo-doc is &lt;2021.186.2.04svn38663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917952" version="1" comment="texlive-ltxguidex is &lt;2021.186.0.0.2.0svn50992-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917953" version="1" comment="texlive-ltxguidex-doc is &lt;2021.186.0.0.2.0svn50992-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917954" version="1" comment="texlive-ltximg is &lt;2021.186.2.0svn57521-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917955" version="1" comment="texlive-ltximg-doc is &lt;2021.186.2.0svn57521-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917956" version="1" comment="texlive-ltxkeys is &lt;2021.186.0.0.0.3csvn28332-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917957" version="1" comment="texlive-ltxkeys-doc is &lt;2021.186.0.0.0.3csvn28332-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917958" version="1" comment="texlive-ltxmisc is &lt;2021.186.svn21927-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917959" version="1" comment="texlive-ltxnew is &lt;2021.186.1.3svn21586-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917960" version="1" comment="texlive-ltxnew-doc is &lt;2021.186.1.3svn21586-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917961" version="1" comment="texlive-ltxtools is &lt;2021.186.0.0.0.1asvn24897-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917962" version="1" comment="texlive-ltxtools-doc is &lt;2021.186.0.0.0.1asvn24897-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917963" version="1" comment="texlive-lua-alt-getopt is &lt;2021.186.0.0.7.0svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917964" version="1" comment="texlive-lua-alt-getopt-doc is &lt;2021.186.0.0.7.0svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917965" version="1" comment="texlive-lua-check-hyphen is &lt;2021.186.0.0.7asvn47527-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917966" version="1" comment="texlive-lua-check-hyphen-doc is &lt;2021.186.0.0.7asvn47527-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917967" version="1" comment="texlive-lua-physical is &lt;2021.186.1.0.3svn56306-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917968" version="1" comment="texlive-lua-physical-doc is &lt;2021.186.1.0.3svn56306-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917969" version="1" comment="texlive-lua-typo is &lt;2021.186.0.0.32svn58744-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917970" version="1" comment="texlive-lua-typo-doc is &lt;2021.186.0.0.32svn58744-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917971" version="1" comment="texlive-lua-uca is &lt;2021.186.0.0.1svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917972" version="1" comment="texlive-lua-uca-doc is &lt;2021.186.0.0.1svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917973" version="1" comment="texlive-lua-ul is &lt;2021.186.0.0.1.2svn58745-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917974" version="1" comment="texlive-lua-ul-doc is &lt;2021.186.0.0.1.2svn58745-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917975" version="1" comment="texlive-lua-uni-algos is &lt;2021.186.0.0.2svn55206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917976" version="1" comment="texlive-lua-uni-algos-doc is &lt;2021.186.0.0.2svn55206-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917977" version="1" comment="texlive-lua-visual-debug is &lt;2021.186.0.0.8svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917978" version="1" comment="texlive-lua-visual-debug-doc is &lt;2021.186.0.0.8svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917979" version="1" comment="texlive-luabibentry is &lt;2021.186.0.0.1asvn55777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917980" version="1" comment="texlive-luabibentry-doc is &lt;2021.186.0.0.1asvn55777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917981" version="1" comment="texlive-luabidi is &lt;2021.186.0.0.5svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917982" version="1" comment="texlive-luabidi-doc is &lt;2021.186.0.0.5svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917983" version="1" comment="texlive-luacode is &lt;2021.186.1.2asvn25193-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917984" version="1" comment="texlive-luacode-doc is &lt;2021.186.1.2asvn25193-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917985" version="1" comment="texlive-luacolor is &lt;2021.186.1.17svn57829-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917986" version="1" comment="texlive-luacolor-doc is &lt;2021.186.1.17svn57829-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917987" version="1" comment="texlive-luahbtex is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917988" version="1" comment="texlive-luahyphenrules is &lt;2021.186.1.1svn56200-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917989" version="1" comment="texlive-luahyphenrules-doc is &lt;2021.186.1.1svn56200-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917990" version="1" comment="texlive-luaimageembed is &lt;2021.186.0.0.1svn50788-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917991" version="1" comment="texlive-luaimageembed-doc is &lt;2021.186.0.0.1svn50788-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917992" version="1" comment="texlive-luaindex is &lt;2021.186.0.0.1bsvn25882-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917993" version="1" comment="texlive-luaindex-doc is &lt;2021.186.0.0.1bsvn25882-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917994" version="1" comment="texlive-luainputenc is &lt;2021.186.0.0.973svn20491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917995" version="1" comment="texlive-luainputenc-doc is &lt;2021.186.0.0.973svn20491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917996" version="1" comment="texlive-luaintro is &lt;2021.186.0.0.03svn35490-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917997" version="1" comment="texlive-luajittex is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917998" version="1" comment="texlive-luakeys is &lt;2021.186.0.0.1svn57463-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009917999" version="1" comment="texlive-luakeys-doc is &lt;2021.186.0.0.1svn57463-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918000" version="1" comment="texlive-lualatex-doc is &lt;2021.186.svn30473-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918001" version="1" comment="texlive-lualatex-doc-de is &lt;2021.186.1.0svn30474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918002" version="1" comment="texlive-lualatex-math is &lt;2021.186.1.9svn56541-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918003" version="1" comment="texlive-lualatex-math-doc is &lt;2021.186.1.9svn56541-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918004" version="1" comment="texlive-lualatex-truncate is &lt;2021.186.1.1svn48469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918005" version="1" comment="texlive-lualatex-truncate-doc is &lt;2021.186.1.1svn48469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918006" version="1" comment="texlive-lualibs is &lt;2021.186.2.73svn57277-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918007" version="1" comment="texlive-lualibs-doc is &lt;2021.186.2.73svn57277-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918008" version="1" comment="texlive-luamesh is &lt;2021.186.0.0.6svn55475-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918009" version="1" comment="texlive-luamesh-doc is &lt;2021.186.0.0.6svn55475-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918010" version="1" comment="texlive-luamplib is &lt;2021.186.2.20.7svn58279-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918011" version="1" comment="texlive-luamplib-doc is &lt;2021.186.2.20.7svn58279-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918012" version="1" comment="texlive-luaotfload is &lt;2021.186.3.17svn57443-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918013" version="1" comment="texlive-luaotfload-doc is &lt;2021.186.3.17svn57443-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918014" version="1" comment="texlive-luapackageloader is &lt;2021.186.0.0.2svn54779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918015" version="1" comment="texlive-luapackageloader-doc is &lt;2021.186.0.0.2svn54779-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918016" version="1" comment="texlive-luaprogtable is &lt;2021.186.1.0svn56113-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918017" version="1" comment="texlive-luaprogtable-doc is &lt;2021.186.1.0svn56113-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918018" version="1" comment="texlive-luarandom is &lt;2021.186.0.0.01svn49419-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918019" version="1" comment="texlive-luarandom-doc is &lt;2021.186.0.0.01svn49419-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918020" version="1" comment="texlive-luasseq is &lt;2021.186.svn37877-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918021" version="1" comment="texlive-luasseq-doc is &lt;2021.186.svn37877-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918022" version="1" comment="texlive-luatex is &lt;2021.186.svn58702-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918023" version="1" comment="texlive-luatex-doc is &lt;2021.186.svn58702-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918024" version="1" comment="texlive-luatex85 is &lt;2021.186.1.4svn41456-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918025" version="1" comment="texlive-luatex85-doc is &lt;2021.186.1.4svn41456-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918026" version="1" comment="texlive-luatexbase is &lt;2021.186.1.3svn52663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918027" version="1" comment="texlive-luatexbase-doc is &lt;2021.186.1.3svn52663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918028" version="1" comment="texlive-luatexja is &lt;2021.186.20210319.0svn58542-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918029" version="1" comment="texlive-luatexja-doc is &lt;2021.186.20210319.0svn58542-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918030" version="1" comment="texlive-luatexko is &lt;2021.186.3.0svn58085-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918031" version="1" comment="texlive-luatexko-doc is &lt;2021.186.3.0svn58085-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918032" version="1" comment="texlive-luatextra is &lt;2021.186.1.0.1svn20747-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918033" version="1" comment="texlive-luatextra-doc is &lt;2021.186.1.0.1svn20747-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918034" version="1" comment="texlive-luatodonotes is &lt;2021.186.0.0.5svn53825-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918035" version="1" comment="texlive-luatodonotes-doc is &lt;2021.186.0.0.5svn53825-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918036" version="1" comment="texlive-luavlna is &lt;2021.186.0.0.1isvn58087-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918037" version="1" comment="texlive-luavlna-doc is &lt;2021.186.0.0.1isvn58087-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918038" version="1" comment="texlive-luaxml is &lt;2021.186.0.0.1nsvn57183-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918039" version="1" comment="texlive-luaxml-doc is &lt;2021.186.0.0.1nsvn57183-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918040" version="1" comment="texlive-lwarp is &lt;2021.186.0.0.895svn57836-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918041" version="1" comment="texlive-lwarp-doc is &lt;2021.186.0.0.895svn57836-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918042" version="1" comment="texlive-lxfonts is &lt;2021.186.2.0bsvn32354-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918043" version="1" comment="texlive-lxfonts-doc is &lt;2021.186.2.0bsvn32354-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918044" version="1" comment="texlive-lxfonts-fonts is &lt;2021.186.2.0bsvn32354-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918045" version="1" comment="texlive-ly1 is &lt;2021.186.svn47848-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918046" version="1" comment="texlive-ly1-doc is &lt;2021.186.svn47848-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918047" version="1" comment="texlive-lyluatex is &lt;2021.186.1.0fsvn51252-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918048" version="1" comment="texlive-lyluatex-doc is &lt;2021.186.1.0fsvn51252-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918049" version="1" comment="texlive-m-tx is &lt;2021.186.0.0.63csvn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918050" version="1" comment="texlive-m-tx-doc is &lt;2021.186.0.0.63csvn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918051" version="1" comment="texlive-macros2e is &lt;2021.186.0.0.4asvn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918052" version="1" comment="texlive-macros2e-doc is &lt;2021.186.0.0.4asvn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918053" version="1" comment="texlive-macroswap is &lt;2021.186.1.1svn31498-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918054" version="1" comment="texlive-macroswap-doc is &lt;2021.186.1.1svn31498-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918055" version="1" comment="texlive-mafr is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918056" version="1" comment="texlive-mafr-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918057" version="1" comment="texlive-magaz is &lt;2021.186.0.0.4svn24694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918058" version="1" comment="texlive-magaz-doc is &lt;2021.186.0.0.4svn24694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918059" version="1" comment="texlive-magicnum is &lt;2021.186.1.7svn52983-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918060" version="1" comment="texlive-magicnum-doc is &lt;2021.186.1.7svn52983-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918061" version="1" comment="texlive-magra is &lt;2021.186.0.0.0.1svn57373-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918062" version="1" comment="texlive-magra-doc is &lt;2021.186.0.0.0.1svn57373-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918063" version="1" comment="texlive-magra-fonts is &lt;2021.186.0.0.0.1svn57373-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918064" version="1" comment="texlive-mailing is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918065" version="1" comment="texlive-mailing-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918066" version="1" comment="texlive-mailmerge is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918067" version="1" comment="texlive-mailmerge-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918068" version="1" comment="texlive-make4ht is &lt;2021.186.0.0.3gsvn58563-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918069" version="1" comment="texlive-make4ht-doc is &lt;2021.186.0.0.3gsvn58563-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918070" version="1" comment="texlive-makebarcode is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918071" version="1" comment="texlive-makebarcode-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918072" version="1" comment="texlive-makebase is &lt;2021.186.0.0.2svn41012-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918073" version="1" comment="texlive-makebase-doc is &lt;2021.186.0.0.2svn41012-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918074" version="1" comment="texlive-makebox is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918075" version="1" comment="texlive-makebox-doc is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918076" version="1" comment="texlive-makecell is &lt;2021.186.0.0.1esvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918077" version="1" comment="texlive-makecell-doc is &lt;2021.186.0.0.1esvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918078" version="1" comment="texlive-makecirc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918079" version="1" comment="texlive-makecirc-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918080" version="1" comment="texlive-makecmds is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918081" version="1" comment="texlive-makecmds-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918082" version="1" comment="texlive-makecookbook is &lt;2021.186.0.0.85svn49311-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918083" version="1" comment="texlive-makedtx is &lt;2021.186.1.2svn46702-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918084" version="1" comment="texlive-makedtx-doc is &lt;2021.186.1.2svn46702-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918085" version="1" comment="texlive-makeglos is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918086" version="1" comment="texlive-makeglos-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918087" version="1" comment="texlive-makeindex is &lt;2021.186.svn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918088" version="1" comment="texlive-makeindex-doc is &lt;2021.186.svn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918089" version="1" comment="texlive-makeplot is &lt;2021.186.1.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918090" version="1" comment="texlive-makeplot-doc is &lt;2021.186.1.0.6svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918091" version="1" comment="texlive-maker is &lt;2021.186.1.0svn44823-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918092" version="1" comment="texlive-maker-doc is &lt;2021.186.1.0svn44823-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918093" version="1" comment="texlive-makerobust is &lt;2021.186.2.0svn52811-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918094" version="1" comment="texlive-makerobust-doc is &lt;2021.186.2.0svn52811-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918095" version="1" comment="texlive-makeshape is &lt;2021.186.2.1svn28973-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918096" version="1" comment="texlive-makeshape-doc is &lt;2021.186.2.1svn28973-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918097" version="1" comment="texlive-mandi is &lt;2021.186.2.7.5svn49720-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918098" version="1" comment="texlive-mandi-doc is &lt;2021.186.2.7.5svn49720-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918099" version="1" comment="texlive-manfnt is &lt;2021.186.svn54684-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918100" version="1" comment="texlive-manfnt-doc is &lt;2021.186.svn54684-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918101" version="1" comment="texlive-manfnt-font is &lt;2021.186.svn45777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918102" version="1" comment="texlive-manfnt-font-fonts is &lt;2021.186.svn45777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918103" version="1" comment="texlive-manuscript is &lt;2021.186.1.7svn36110-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918104" version="1" comment="texlive-manuscript-doc is &lt;2021.186.1.7svn36110-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918105" version="1" comment="texlive-manyind is &lt;2021.186.svn49874-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918106" version="1" comment="texlive-manyind-doc is &lt;2021.186.svn49874-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918107" version="1" comment="texlive-marathi is &lt;2021.186.1.6.2svn58760-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918108" version="1" comment="texlive-marathi-doc is &lt;2021.186.1.6.2svn58760-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918109" version="1" comment="texlive-marcellus is &lt;2021.186.svn56016-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918110" version="1" comment="texlive-marcellus-doc is &lt;2021.186.svn56016-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918111" version="1" comment="texlive-marcellus-fonts is &lt;2021.186.svn56016-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918112" version="1" comment="texlive-margbib is &lt;2021.186.1.0csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918113" version="1" comment="texlive-margbib-doc is &lt;2021.186.1.0csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918114" version="1" comment="texlive-marginfit is &lt;2021.186.1.1svn48281-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918115" version="1" comment="texlive-marginfit-doc is &lt;2021.186.1.1svn48281-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918116" version="1" comment="texlive-marginfix is &lt;2021.186.1.2svn55064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918117" version="1" comment="texlive-marginfix-doc is &lt;2021.186.1.2svn55064-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918118" version="1" comment="texlive-marginnote is &lt;2021.186.1.4bsvn48383-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918119" version="1" comment="texlive-marginnote-doc is &lt;2021.186.1.4bsvn48383-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918120" version="1" comment="texlive-markdown is &lt;2021.186.2.9.0svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918121" version="1" comment="texlive-markdown-doc is &lt;2021.186.2.9.0svn56414-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918122" version="1" comment="texlive-marvosym is &lt;2021.186.2.2asvn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918123" version="1" comment="texlive-marvosym-doc is &lt;2021.186.2.2asvn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918124" version="1" comment="texlive-marvosym-fonts is &lt;2021.186.2.2asvn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918125" version="1" comment="texlive-matapli is &lt;2021.186.1.1svn58635-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918126" version="1" comment="texlive-matapli-doc is &lt;2021.186.1.1svn58635-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918127" version="1" comment="texlive-matc3 is &lt;2021.186.1.0.1svn29845-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918128" version="1" comment="texlive-matc3-doc is &lt;2021.186.1.0.1svn29845-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918129" version="1" comment="texlive-matc3mem is &lt;2021.186.1.1svn35773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918130" version="1" comment="texlive-matc3mem-doc is &lt;2021.186.1.1svn35773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918131" version="1" comment="texlive-match_parens is &lt;2021.186.1.43svn36270-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918132" version="1" comment="texlive-match_parens-doc is &lt;2021.186.1.43svn36270-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918133" version="1" comment="texlive-math-into-latex-4 is &lt;2021.186.svn44131-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918134" version="1" comment="texlive-mathabx is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918135" version="1" comment="texlive-mathabx-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918136" version="1" comment="texlive-mathabx-type1 is &lt;2021.186.svn21129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918137" version="1" comment="texlive-mathabx-type1-doc is &lt;2021.186.svn21129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918138" version="1" comment="texlive-mathabx-type1-fonts is &lt;2021.186.svn21129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918139" version="1" comment="texlive-mathalpha is &lt;2021.186.1.13svn52305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918140" version="1" comment="texlive-mathalpha-doc is &lt;2021.186.1.13svn52305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918141" version="1" comment="texlive-mathastext is &lt;2021.186.1.3wsvn52840-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918142" version="1" comment="texlive-mathastext-doc is &lt;2021.186.1.3wsvn52840-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918143" version="1" comment="texlive-mathcommand is &lt;2021.186.1.03svn53044-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918144" version="1" comment="texlive-mathcommand-doc is &lt;2021.186.1.03svn53044-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918145" version="1" comment="texlive-mathcomp is &lt;2021.186.0.0.1fsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918146" version="1" comment="texlive-mathcomp-doc is &lt;2021.186.0.0.1fsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918147" version="1" comment="texlive-mathdesign is &lt;2021.186.2.31svn31639-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918148" version="1" comment="texlive-mathdesign-doc is &lt;2021.186.2.31svn31639-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918149" version="1" comment="texlive-mathdesign-fonts is &lt;2021.186.2.31svn31639-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918150" version="1" comment="texlive-mathdots is &lt;2021.186.0.0.9svn34301-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918151" version="1" comment="texlive-mathdots-doc is &lt;2021.186.0.0.9svn34301-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918152" version="1" comment="texlive-mathexam is &lt;2021.186.1.00svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918153" version="1" comment="texlive-mathexam-doc is &lt;2021.186.1.00svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918154" version="1" comment="texlive-mathfam256 is &lt;2021.186.0.0.5svn53519-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918155" version="1" comment="texlive-mathfam256-doc is &lt;2021.186.0.0.5svn53519-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918156" version="1" comment="texlive-mathfixs is &lt;2021.186.1.01svn49547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918157" version="1" comment="texlive-mathfixs-doc is &lt;2021.186.1.01svn49547-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918158" version="1" comment="texlive-mathfont is &lt;2021.186.1.6svn53035-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918159" version="1" comment="texlive-mathfont-doc is &lt;2021.186.1.6svn53035-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918160" version="1" comment="texlive-mathlig is &lt;2021.186.1.0svn54244-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918161" version="1" comment="texlive-mathpartir is &lt;2021.186.1.3.2svn39864-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918162" version="1" comment="texlive-mathpartir-doc is &lt;2021.186.1.3.2svn39864-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918163" version="1" comment="texlive-mathpazo is &lt;2021.186.1.003svn52663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918164" version="1" comment="texlive-mathpazo-doc is &lt;2021.186.1.003svn52663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918165" version="1" comment="texlive-mathpazo-fonts is &lt;2021.186.1.003svn52663-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918166" version="1" comment="texlive-mathpunctspace is &lt;2021.186.1.1svn46754-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918167" version="1" comment="texlive-mathpunctspace-doc is &lt;2021.186.1.1svn46754-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918168" version="1" comment="texlive-maths-symbols is &lt;2021.186.3.4svn37763-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918169" version="1" comment="texlive-mathspec is &lt;2021.186.0.0.2bsvn42773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918170" version="1" comment="texlive-mathspec-doc is &lt;2021.186.0.0.2bsvn42773-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918171" version="1" comment="texlive-mathspic is &lt;2021.186.1.13svn31957-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918172" version="1" comment="texlive-mathspic-doc is &lt;2021.186.1.13svn31957-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918173" version="1" comment="texlive-mathtools is &lt;2021.186.1.26svn58725-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918174" version="1" comment="texlive-mathtools-doc is &lt;2021.186.1.26svn58725-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918175" version="1" comment="texlive-matlab-prettifier is &lt;2021.186.0.0.3svn34323-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918176" version="1" comment="texlive-matlab-prettifier-doc is &lt;2021.186.0.0.3svn34323-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918177" version="1" comment="texlive-matrix-skeleton is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918178" version="1" comment="texlive-matrix-skeleton-doc is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918179" version="1" comment="texlive-mattens is &lt;2021.186.1.3svn17582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918180" version="1" comment="texlive-mattens-doc is &lt;2021.186.1.3svn17582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918181" version="1" comment="texlive-maybemath is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918182" version="1" comment="texlive-maybemath-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918183" version="1" comment="texlive-mcaption is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918184" version="1" comment="texlive-mcaption-doc is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918185" version="1" comment="texlive-mceinleger is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918186" version="1" comment="texlive-mceinleger-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918187" version="1" comment="texlive-mcexam is &lt;2021.186.0.0.4svn46155-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918188" version="1" comment="texlive-mcexam-doc is &lt;2021.186.0.0.4svn46155-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918189" version="1" comment="texlive-mcf2graph is &lt;2021.186.4.62svn58756-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918190" version="1" comment="texlive-mcf2graph-doc is &lt;2021.186.4.62svn58756-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918191" version="1" comment="texlive-mcite is &lt;2021.186.1.6svn18173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918192" version="1" comment="texlive-mcite-doc is &lt;2021.186.1.6svn18173-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918193" version="1" comment="texlive-mciteplus is &lt;2021.186.1.2svn31648-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918194" version="1" comment="texlive-mciteplus-doc is &lt;2021.186.1.2svn31648-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918195" version="1" comment="texlive-mcmthesis is &lt;2021.186.6.3.1svn57333-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918196" version="1" comment="texlive-mcmthesis-doc is &lt;2021.186.6.3.1svn57333-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918197" version="1" comment="texlive-mdframed is &lt;2021.186.1.9bsvn31075-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918198" version="1" comment="texlive-mdframed-doc is &lt;2021.186.1.9bsvn31075-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918199" version="1" comment="texlive-mdputu is &lt;2021.186.1.2svn20298-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918200" version="1" comment="texlive-mdputu-doc is &lt;2021.186.1.2svn20298-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918201" version="1" comment="texlive-mdsymbol is &lt;2021.186.0.0.5svn28399-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918202" version="1" comment="texlive-mdsymbol-doc is &lt;2021.186.0.0.5svn28399-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918203" version="1" comment="texlive-mdsymbol-fonts is &lt;2021.186.0.0.5svn28399-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918204" version="1" comment="texlive-mdwtools is &lt;2021.186.1.05.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918205" version="1" comment="texlive-mdwtools-doc is &lt;2021.186.1.05.4svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918206" version="1" comment="texlive-media4svg is &lt;2021.186.0.0.5svn57528-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918207" version="1" comment="texlive-media4svg-doc is &lt;2021.186.0.0.5svn57528-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918208" version="1" comment="texlive-media9 is &lt;2021.186.1.15svn58025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918209" version="1" comment="texlive-media9-doc is &lt;2021.186.1.15svn58025-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918210" version="1" comment="texlive-medstarbeamer is &lt;2021.186.svn38828-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918211" version="1" comment="texlive-medstarbeamer-doc is &lt;2021.186.svn38828-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918212" version="1" comment="texlive-meetingmins is &lt;2021.186.1.6svn31878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918213" version="1" comment="texlive-meetingmins-doc is &lt;2021.186.1.6svn31878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918214" version="1" comment="texlive-membranecomputing is &lt;2021.186.0.0.1svn55918-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918215" version="1" comment="texlive-membranecomputing-doc is &lt;2021.186.0.0.1svn55918-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918216" version="1" comment="texlive-memdesign is &lt;2021.186.svn48664-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918217" version="1" comment="texlive-memexsupp is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918218" version="1" comment="texlive-memexsupp-doc is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918219" version="1" comment="texlive-memoir is &lt;2021.186.3.7osvn58666-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918220" version="1" comment="texlive-memoir-doc is &lt;2021.186.3.7osvn58666-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918221" version="1" comment="texlive-memory is &lt;2021.186.1.2svn30452-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918222" version="1" comment="texlive-memory-doc is &lt;2021.186.1.2svn30452-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918223" version="1" comment="texlive-memorygraphs is &lt;2021.186.0.0.1.1svn49631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918224" version="1" comment="texlive-memorygraphs-doc is &lt;2021.186.0.0.1.1svn49631-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918225" version="1" comment="texlive-mendex-doc is &lt;2021.186.svn50268-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918226" version="1" comment="texlive-mendex-doc-doc is &lt;2021.186.svn50268-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918227" version="1" comment="texlive-mensa-tex is &lt;2021.186.svn45997-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918228" version="1" comment="texlive-mensa-tex-doc is &lt;2021.186.svn45997-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918229" version="1" comment="texlive-mentis is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918230" version="1" comment="texlive-mentis-doc is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918231" version="1" comment="texlive-menu is &lt;2021.186.0.0.994svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918232" version="1" comment="texlive-menu-doc is &lt;2021.186.0.0.994svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918233" version="1" comment="texlive-menucard is &lt;2021.186.0.0.1svn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918234" version="1" comment="texlive-menucard-doc is &lt;2021.186.0.0.1svn55643-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918235" version="1" comment="texlive-menukeys is &lt;2021.186.1.6.1svn57172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918236" version="1" comment="texlive-menukeys-doc is &lt;2021.186.1.6.1svn57172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918237" version="1" comment="texlive-mercatormap is &lt;2021.186.1.02svn56060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918238" version="1" comment="texlive-mercatormap-doc is &lt;2021.186.1.02svn56060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918239" version="1" comment="texlive-merriweather is &lt;2021.186.svn56365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918240" version="1" comment="texlive-merriweather-doc is &lt;2021.186.svn56365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918241" version="1" comment="texlive-merriweather-fonts is &lt;2021.186.svn56365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918242" version="1" comment="texlive-metafont is &lt;2021.186.2.71828182svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918243" version="1" comment="texlive-metafont-beginners is &lt;2021.186.svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918244" version="1" comment="texlive-metafont-doc is &lt;2021.186.2.71828182svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918245" version="1" comment="texlive-metago is &lt;2021.186.0.0.9svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918246" version="1" comment="texlive-metago-doc is &lt;2021.186.0.0.9svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918247" version="1" comment="texlive-metalogo is &lt;2021.186.0.0.12svn18611-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918248" version="1" comment="texlive-metalogo-doc is &lt;2021.186.0.0.12svn18611-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918249" version="1" comment="texlive-metalogox is &lt;2021.186.1.00svn49774-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918250" version="1" comment="texlive-metalogox-doc is &lt;2021.186.1.00svn49774-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918251" version="1" comment="texlive-metanorma is &lt;2021.186.0.0.5.0svn55010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918252" version="1" comment="texlive-metanorma-doc is &lt;2021.186.0.0.5.0svn55010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918253" version="1" comment="texlive-metaobj is &lt;2021.186.0.0.93svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918254" version="1" comment="texlive-metaobj-doc is &lt;2021.186.0.0.93svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918255" version="1" comment="texlive-metaplot is &lt;2021.186.0.0.91svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918256" version="1" comment="texlive-metaplot-doc is &lt;2021.186.0.0.91svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918257" version="1" comment="texlive-metapost is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918258" version="1" comment="texlive-metapost-colorbrewer is &lt;2021.186.svn48753-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918259" version="1" comment="texlive-metapost-colorbrewer-doc is &lt;2021.186.svn48753-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918260" version="1" comment="texlive-metapost-doc is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918261" version="1" comment="texlive-metapost-examples is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918262" version="1" comment="texlive-metapost-fonts is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918263" version="1" comment="texlive-metastr is &lt;2021.186.1.1.2svn56246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918264" version="1" comment="texlive-metastr-doc is &lt;2021.186.1.1.2svn56246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918265" version="1" comment="texlive-metatex is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918266" version="1" comment="texlive-metatex-doc is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918267" version="1" comment="texlive-metatype1 is &lt;2021.186.0.0.56svn37105-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918268" version="1" comment="texlive-metauml is &lt;2021.186.0.0.2.6svn49923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918269" version="1" comment="texlive-metauml-doc is &lt;2021.186.0.0.2.6svn49923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918270" version="1" comment="texlive-method is &lt;2021.186.2.0bsvn17485-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918271" version="1" comment="texlive-method-doc is &lt;2021.186.2.0bsvn17485-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918272" version="1" comment="texlive-metre is &lt;2021.186.1.0svn18489-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918273" version="1" comment="texlive-metre-doc is &lt;2021.186.1.0svn18489-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918274" version="1" comment="texlive-metrix is &lt;2021.186.1.5svn52323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918275" version="1" comment="texlive-metrix-doc is &lt;2021.186.1.5svn52323-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918276" version="1" comment="texlive-mex is &lt;2021.186.1.05asvn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918277" version="1" comment="texlive-mex-doc is &lt;2021.186.1.05asvn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918278" version="1" comment="texlive-mf2pt1 is &lt;2021.186.2.6svn57018-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918279" version="1" comment="texlive-mf2pt1-doc is &lt;2021.186.2.6svn57018-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918280" version="1" comment="texlive-mfirstuc is &lt;2021.186.2.06svn45803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918281" version="1" comment="texlive-mfirstuc-doc is &lt;2021.186.2.06svn45803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918282" version="1" comment="texlive-mflogo is &lt;2021.186.2.0svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918283" version="1" comment="texlive-mflogo-doc is &lt;2021.186.2.0svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918284" version="1" comment="texlive-mflogo-font is &lt;2021.186.1.002svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918285" version="1" comment="texlive-mflogo-font-doc is &lt;2021.186.1.002svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918286" version="1" comment="texlive-mflogo-font-fonts is &lt;2021.186.1.002svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918287" version="1" comment="texlive-mflua is &lt;2021.186.svn54074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918288" version="1" comment="texlive-mfnfss is &lt;2021.186.svn46036-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918289" version="1" comment="texlive-mfnfss-doc is &lt;2021.186.svn46036-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918290" version="1" comment="texlive-mfpic is &lt;2021.186.1.10svn28444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918291" version="1" comment="texlive-mfpic-doc is &lt;2021.186.1.10svn28444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918292" version="1" comment="texlive-mfpic4ode is &lt;2021.186.0.0.4svn17745-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918293" version="1" comment="texlive-mfpic4ode-doc is &lt;2021.186.0.0.4svn17745-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918294" version="1" comment="texlive-mftinc is &lt;2021.186.1.0asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918295" version="1" comment="texlive-mftinc-doc is &lt;2021.186.1.0asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918296" version="1" comment="texlive-mfware is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918297" version="1" comment="texlive-mfware-doc is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918298" version="1" comment="texlive-mgltex is &lt;2021.186.4.2svn41676-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918299" version="1" comment="texlive-mgltex-doc is &lt;2021.186.4.2svn41676-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918300" version="1" comment="texlive-mhchem is &lt;2021.186.svn52662-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918301" version="1" comment="texlive-mhchem-doc is &lt;2021.186.svn52662-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918302" version="1" comment="texlive-mhequ is &lt;2021.186.1.7svn38224-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918303" version="1" comment="texlive-mhequ-doc is &lt;2021.186.1.7svn38224-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918304" version="1" comment="texlive-mi-solns is &lt;2021.186.0.0.6svn49651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918305" version="1" comment="texlive-mi-solns-doc is &lt;2021.186.0.0.6svn49651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918306" version="1" comment="texlive-miama is &lt;2021.186.1.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918307" version="1" comment="texlive-miama-doc is &lt;2021.186.1.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918308" version="1" comment="texlive-miama-fonts is &lt;2021.186.1.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918309" version="1" comment="texlive-microtype is &lt;2021.186.2.8csvn58394-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918310" version="1" comment="texlive-microtype-de is &lt;2021.186.2.4svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918311" version="1" comment="texlive-microtype-doc is &lt;2021.186.2.8csvn58394-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918312" version="1" comment="texlive-midnight is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918313" version="1" comment="texlive-midnight-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918314" version="1" comment="texlive-midpage is &lt;2021.186.1.1asvn17484-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918315" version="1" comment="texlive-midpage-doc is &lt;2021.186.1.1asvn17484-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918316" version="1" comment="texlive-miller is &lt;2021.186.1.2svn18789-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918317" version="1" comment="texlive-miller-doc is &lt;2021.186.1.2svn18789-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918318" version="1" comment="texlive-milog is &lt;2021.186.1.0svn41610-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918319" version="1" comment="texlive-milog-doc is &lt;2021.186.1.0svn41610-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918320" version="1" comment="texlive-milsymb is &lt;2021.186.1.02svn54361-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918321" version="1" comment="texlive-milsymb-doc is &lt;2021.186.1.02svn54361-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918322" version="1" comment="texlive-mindflow is &lt;2021.186.svn58475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918323" version="1" comment="texlive-mindflow-doc is &lt;2021.186.svn58475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918324" version="1" comment="texlive-minibox is &lt;2021.186.0.0.2asvn30914-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918325" version="1" comment="texlive-minibox-doc is &lt;2021.186.0.0.2asvn30914-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918326" version="1" comment="texlive-minidocument is &lt;2021.186.1.0svn43752-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918327" version="1" comment="texlive-minidocument-doc is &lt;2021.186.1.0svn43752-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918328" version="1" comment="texlive-minifp is &lt;2021.186.0.0.96svn32559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918329" version="1" comment="texlive-minifp-doc is &lt;2021.186.0.0.96svn32559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918330" version="1" comment="texlive-minimalist is &lt;2021.186.svn58395-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918331" version="1" comment="texlive-minimalist-doc is &lt;2021.186.svn58395-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918332" version="1" comment="texlive-minipage-marginpar is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918333" version="1" comment="texlive-minipage-marginpar-doc is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918334" version="1" comment="texlive-miniplot is &lt;2021.186.svn17483-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918335" version="1" comment="texlive-miniplot-doc is &lt;2021.186.svn17483-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918336" version="1" comment="texlive-minitoc is &lt;2021.186.62svn48196-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918337" version="1" comment="texlive-minitoc-doc is &lt;2021.186.62svn48196-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918338" version="1" comment="texlive-minorrevision is &lt;2021.186.1.1svn32165-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918339" version="1" comment="texlive-minorrevision-doc is &lt;2021.186.1.1svn32165-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918340" version="1" comment="texlive-minted is &lt;2021.186.2.5svn44855-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918341" version="1" comment="texlive-minted-doc is &lt;2021.186.2.5svn44855-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918342" version="1" comment="texlive-mintspirit is &lt;2021.186.svn32069-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918343" version="1" comment="texlive-mintspirit-doc is &lt;2021.186.svn32069-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918344" version="1" comment="texlive-mintspirit-fonts is &lt;2021.186.svn32069-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918345" version="1" comment="texlive-minutes is &lt;2021.186.1.8fsvn42186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918346" version="1" comment="texlive-minutes-doc is &lt;2021.186.1.8fsvn42186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918347" version="1" comment="texlive-mismath is &lt;2021.186.1.8svn56949-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918348" version="1" comment="texlive-mismath-doc is &lt;2021.186.1.8svn56949-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918349" version="1" comment="texlive-missaali is &lt;2021.186.1.004svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918350" version="1" comment="texlive-missaali-doc is &lt;2021.186.1.004svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918351" version="1" comment="texlive-missaali-fonts is &lt;2021.186.1.004svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918352" version="1" comment="texlive-mkgrkindex is &lt;2021.186.2.0svn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918353" version="1" comment="texlive-mkgrkindex-doc is &lt;2021.186.2.0svn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918354" version="1" comment="texlive-mkjobtexmf is &lt;2021.186.0.0.8svn29725-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918355" version="1" comment="texlive-mkjobtexmf-doc is &lt;2021.186.0.0.8svn29725-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918356" version="1" comment="texlive-mkpattern is &lt;2021.186.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918357" version="1" comment="texlive-mkpattern-doc is &lt;2021.186.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918358" version="1" comment="texlive-mkpic is &lt;2021.186.1.02svn33700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918359" version="1" comment="texlive-mkpic-doc is &lt;2021.186.1.02svn33700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918360" version="1" comment="texlive-mla-paper is &lt;2021.186.svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918361" version="1" comment="texlive-mla-paper-doc is &lt;2021.186.svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918362" version="1" comment="texlive-mlacls is &lt;2021.186.0.0.9svn56878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918363" version="1" comment="texlive-mlacls-doc is &lt;2021.186.0.0.9svn56878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918364" version="1" comment="texlive-mleftright is &lt;2021.186.1.2svn53021-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918365" version="1" comment="texlive-mleftright-doc is &lt;2021.186.1.2svn53021-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918366" version="1" comment="texlive-mlist is &lt;2021.186.0.0.6asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918367" version="1" comment="texlive-mlist-doc is &lt;2021.186.0.0.6asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918368" version="1" comment="texlive-mlmodern is &lt;2021.186.1.2svn57458-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918369" version="1" comment="texlive-mlmodern-doc is &lt;2021.186.1.2svn57458-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918370" version="1" comment="texlive-mlmodern-fonts is &lt;2021.186.1.2svn57458-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918371" version="1" comment="texlive-mltex is &lt;2021.186.2.2svn57186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918372" version="1" comment="texlive-mltex-doc is &lt;2021.186.2.2svn57186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918373" version="1" comment="texlive-mluexercise is &lt;2021.186.2.0svn56927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918374" version="1" comment="texlive-mluexercise-doc is &lt;2021.186.2.0svn56927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918375" version="1" comment="texlive-mmap is &lt;2021.186.1.03svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918376" version="1" comment="texlive-mmap-doc is &lt;2021.186.1.03svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918377" version="1" comment="texlive-mnotes is &lt;2021.186.0.0.8svn35521-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918378" version="1" comment="texlive-mnotes-doc is &lt;2021.186.0.0.8svn35521-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918379" version="1" comment="texlive-mnras is &lt;2021.186.3.1svn55729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918380" version="1" comment="texlive-mnras-doc is &lt;2021.186.3.1svn55729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918381" version="1" comment="texlive-mnsymbol is &lt;2021.186.1.4svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918382" version="1" comment="texlive-mnsymbol-doc is &lt;2021.186.1.4svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918383" version="1" comment="texlive-mnsymbol-fonts is &lt;2021.186.1.4svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918384" version="1" comment="texlive-modeles-factures-belges-assocs is &lt;2021.186.1.0.1svn50010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918385" version="1" comment="texlive-modeles-factures-belges-assocs-doc is &lt;2021.186.1.0.1svn50010-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918386" version="1" comment="texlive-moderncv is &lt;2021.186.2.1.0svn57496-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918387" version="1" comment="texlive-moderncv-doc is &lt;2021.186.2.1.0svn57496-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918388" version="1" comment="texlive-modernposter is &lt;2021.186.1.03.1svn47269-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918389" version="1" comment="texlive-modernposter-doc is &lt;2021.186.1.03.1svn47269-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918390" version="1" comment="texlive-moderntimeline is &lt;2021.186.0.0.11svn55518-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918391" version="1" comment="texlive-moderntimeline-doc is &lt;2021.186.0.0.11svn55518-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918392" version="1" comment="texlive-modes is &lt;2021.186.4.2svn56303-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918393" version="1" comment="texlive-modes-doc is &lt;2021.186.4.2svn56303-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918394" version="1" comment="texlive-modiagram is &lt;2021.186.0.0.3asvn56886-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918395" version="1" comment="texlive-modiagram-doc is &lt;2021.186.0.0.3asvn56886-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918396" version="1" comment="texlive-modref is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918397" version="1" comment="texlive-modref-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918398" version="1" comment="texlive-modroman is &lt;2021.186.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918399" version="1" comment="texlive-modroman-doc is &lt;2021.186.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918400" version="1" comment="texlive-modular is &lt;2021.186.svn44142-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918401" version="1" comment="texlive-modular-doc is &lt;2021.186.svn44142-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918402" version="1" comment="texlive-modulus is &lt;2021.186.1.0svn47599-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918403" version="1" comment="texlive-modulus-doc is &lt;2021.186.1.0svn47599-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918404" version="1" comment="texlive-mongolian-babel is &lt;2021.186.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918405" version="1" comment="texlive-mongolian-babel-doc is &lt;2021.186.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918406" version="1" comment="texlive-monofill is &lt;2021.186.0.0.2svn28140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918407" version="1" comment="texlive-monofill-doc is &lt;2021.186.0.0.2svn28140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918408" version="1" comment="texlive-montex is &lt;2021.186.ivu.04.092svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918409" version="1" comment="texlive-montex-doc is &lt;2021.186.ivu.04.092svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918410" version="1" comment="texlive-montex-fonts is &lt;2021.186.ivu.04.092svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918411" version="1" comment="texlive-montserrat is &lt;2021.186.1.03svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918412" version="1" comment="texlive-montserrat-doc is &lt;2021.186.1.03svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918413" version="1" comment="texlive-montserrat-fonts is &lt;2021.186.1.03svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918414" version="1" comment="texlive-moodle is &lt;2021.186.0.0.9svn57683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918415" version="1" comment="texlive-moodle-doc is &lt;2021.186.0.0.9svn57683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918416" version="1" comment="texlive-moreenum is &lt;2021.186.1.03svn24479-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918417" version="1" comment="texlive-moreenum-doc is &lt;2021.186.1.03svn24479-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918418" version="1" comment="texlive-morefloats is &lt;2021.186.1.0hsvn37927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918419" version="1" comment="texlive-morefloats-doc is &lt;2021.186.1.0hsvn37927-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918420" version="1" comment="texlive-morehype is &lt;2021.186.r0.83svn38815-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918421" version="1" comment="texlive-morehype-doc is &lt;2021.186.r0.83svn38815-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918422" version="1" comment="texlive-moresize is &lt;2021.186.1.9svn17513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918423" version="1" comment="texlive-moresize-doc is &lt;2021.186.1.9svn17513-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918424" version="1" comment="texlive-moreverb is &lt;2021.186.2.3asvn22126-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918425" version="1" comment="texlive-moreverb-doc is &lt;2021.186.2.3asvn22126-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918426" version="1" comment="texlive-morewrites is &lt;2021.186.svn49531-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918427" version="1" comment="texlive-morewrites-doc is &lt;2021.186.svn49531-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918428" version="1" comment="texlive-morisawa is &lt;2021.186.svn46946-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918429" version="1" comment="texlive-morisawa-doc is &lt;2021.186.svn46946-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918430" version="1" comment="texlive-movie15 is &lt;2021.186.svn26473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918431" version="1" comment="texlive-movie15-doc is &lt;2021.186.svn26473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918432" version="1" comment="texlive-mp3d is &lt;2021.186.1.34svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918433" version="1" comment="texlive-mp3d-doc is &lt;2021.186.1.34svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918434" version="1" comment="texlive-mparhack is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918435" version="1" comment="texlive-mparhack-doc is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918436" version="1" comment="texlive-mparrows is &lt;2021.186.0.0.1svn39729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918437" version="1" comment="texlive-mparrows-doc is &lt;2021.186.0.0.1svn39729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918438" version="1" comment="texlive-mpattern is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918439" version="1" comment="texlive-mpattern-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918440" version="1" comment="texlive-mpcolornames is &lt;2021.186.0.0.20svn23252-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918441" version="1" comment="texlive-mpcolornames-doc is &lt;2021.186.0.0.20svn23252-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918442" version="1" comment="texlive-mpfonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918443" version="1" comment="texlive-mpfonts-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918444" version="1" comment="texlive-mpgraphics is &lt;2021.186.0.0.3svn29776-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918445" version="1" comment="texlive-mpgraphics-doc is &lt;2021.186.0.0.3svn29776-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918446" version="1" comment="texlive-mpman-ru is &lt;2021.186.1.004svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918447" version="1" comment="texlive-mpostinl is &lt;2021.186.1.5svn49559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918448" version="1" comment="texlive-mpostinl-doc is &lt;2021.186.1.5svn49559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918449" version="1" comment="texlive-mptopdf is &lt;2021.186.svn57347-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918450" version="1" comment="texlive-mptopdf-doc is &lt;2021.186.svn57347-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918451" version="1" comment="texlive-mptrees is &lt;2021.186.17.06svn44453-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918452" version="1" comment="texlive-mptrees-doc is &lt;2021.186.17.06svn44453-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918453" version="1" comment="texlive-ms is &lt;2021.186.svn57473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918454" version="1" comment="texlive-ms-doc is &lt;2021.186.svn57473-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918455" version="1" comment="texlive-msc is &lt;2021.186.1.16svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918456" version="1" comment="texlive-msc-doc is &lt;2021.186.1.16svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918457" version="1" comment="texlive-msg is &lt;2021.186.0.0.51svn49578-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918458" version="1" comment="texlive-msg-doc is &lt;2021.186.0.0.51svn49578-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918459" version="1" comment="texlive-mslapa is &lt;2021.186.svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918460" version="1" comment="texlive-mslapa-doc is &lt;2021.186.svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918461" version="1" comment="texlive-msu-thesis is &lt;2021.186.2.8svn46106-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918462" version="1" comment="texlive-msu-thesis-doc is &lt;2021.186.2.8svn46106-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918463" version="1" comment="texlive-mtgreek is &lt;2021.186.1.1+svn17967-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918464" version="1" comment="texlive-mtgreek-doc is &lt;2021.186.1.1+svn17967-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918465" version="1" comment="texlive-mucproc is &lt;2021.186.1.02svn43445-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918466" version="1" comment="texlive-mucproc-doc is &lt;2021.186.1.02svn43445-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918467" version="1" comment="texlive-mugsthesis is &lt;2021.186.svn34878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918468" version="1" comment="texlive-mugsthesis-doc is &lt;2021.186.svn34878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918469" version="1" comment="texlive-muling is &lt;2021.186.0.0.2svn56991-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918470" version="1" comment="texlive-muling-doc is &lt;2021.186.0.0.2svn56991-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918471" version="1" comment="texlive-multenum is &lt;2021.186.svn21775-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918472" version="1" comment="texlive-multenum-doc is &lt;2021.186.svn21775-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918473" version="1" comment="texlive-multiaudience is &lt;2021.186.1.03svn38035-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918474" version="1" comment="texlive-multiaudience-doc is &lt;2021.186.1.03svn38035-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918475" version="1" comment="texlive-multibbl is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918476" version="1" comment="texlive-multibbl-doc is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918477" version="1" comment="texlive-multibib is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918478" version="1" comment="texlive-multibib-doc is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918479" version="1" comment="texlive-multibibliography is &lt;2021.186.1.03svn30939-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918480" version="1" comment="texlive-multibibliography-doc is &lt;2021.186.1.03svn30939-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918481" version="1" comment="texlive-multicap is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918482" version="1" comment="texlive-multicap-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918483" version="1" comment="texlive-multicolrule is &lt;2021.186.1.3asvn56366-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918484" version="1" comment="texlive-multicolrule-doc is &lt;2021.186.1.3asvn56366-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918485" version="1" comment="texlive-multidef is &lt;2021.186.1.10svn40637-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918486" version="1" comment="texlive-multidef-doc is &lt;2021.186.1.10svn40637-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918487" version="1" comment="texlive-multido is &lt;2021.186.1.42svn18302-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918488" version="1" comment="texlive-multido-doc is &lt;2021.186.1.42svn18302-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918489" version="1" comment="texlive-multienv is &lt;2021.186.1.0svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918490" version="1" comment="texlive-multienv-doc is &lt;2021.186.1.0svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918491" version="1" comment="texlive-multiexpand is &lt;2021.186.1.5svn45943-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918492" version="1" comment="texlive-multiexpand-doc is &lt;2021.186.1.5svn45943-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918493" version="1" comment="texlive-multilang is &lt;2021.186.0.0.9bsvn49065-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918494" version="1" comment="texlive-multilang-doc is &lt;2021.186.0.0.9bsvn49065-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918495" version="1" comment="texlive-multiobjective is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918496" version="1" comment="texlive-multiobjective-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918497" version="1" comment="texlive-multirow is &lt;2021.186.2.8svn58396-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918498" version="1" comment="texlive-multirow-doc is &lt;2021.186.2.8svn58396-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918499" version="1" comment="texlive-munich is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918500" version="1" comment="texlive-munich-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918501" version="1" comment="texlive-musical is &lt;2021.186.3.1svn54758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918502" version="1" comment="texlive-musical-doc is &lt;2021.186.3.1svn54758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918503" version="1" comment="texlive-musicography is &lt;2021.186.svn53596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918504" version="1" comment="texlive-musicography-doc is &lt;2021.186.svn53596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918505" version="1" comment="texlive-musikui is &lt;2021.186.1svn47472-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918506" version="1" comment="texlive-musikui-doc is &lt;2021.186.1svn47472-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918507" version="1" comment="texlive-musixguit is &lt;2021.186.1.2.2svn21649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918508" version="1" comment="texlive-musixguit-doc is &lt;2021.186.1.2.2svn21649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918509" version="1" comment="texlive-musixtex is &lt;2021.186.1.31svn57353-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918510" version="1" comment="texlive-musixtex-doc is &lt;2021.186.1.31svn57353-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918511" version="1" comment="texlive-musixtex-fonts is &lt;2021.186.svn37762-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918512" version="1" comment="texlive-musixtex-fonts-doc is &lt;2021.186.svn37762-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918513" version="1" comment="texlive-musixtex-fonts-fonts is &lt;2021.186.svn37762-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918514" version="1" comment="texlive-musixtnt is &lt;2021.186.svn40307-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918515" version="1" comment="texlive-musixtnt-doc is &lt;2021.186.svn40307-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918516" version="1" comment="texlive-musuos is &lt;2021.186.1.1dsvn24857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918517" version="1" comment="texlive-musuos-doc is &lt;2021.186.1.1dsvn24857-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918518" version="1" comment="texlive-muthesis is &lt;2021.186.svn23861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918519" version="1" comment="texlive-muthesis-doc is &lt;2021.186.svn23861-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918520" version="1" comment="texlive-mversion is &lt;2021.186.1.0.1svn29370-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918521" version="1" comment="texlive-mversion-doc is &lt;2021.186.1.0.1svn29370-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918522" version="1" comment="texlive-mwcls is &lt;2021.186.0.0.75svn44352-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918523" version="1" comment="texlive-mwcls-doc is &lt;2021.186.0.0.75svn44352-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918524" version="1" comment="texlive-mwe is &lt;2021.186.0.0.5svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918525" version="1" comment="texlive-mwe-doc is &lt;2021.186.0.0.5svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918526" version="1" comment="texlive-mweights is &lt;2021.186.svn53520-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918527" version="1" comment="texlive-mweights-doc is &lt;2021.186.svn53520-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918528" version="1" comment="texlive-mxedruli is &lt;2021.186.3.3csvn30021-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918529" version="1" comment="texlive-mxedruli-doc is &lt;2021.186.3.3csvn30021-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918530" version="1" comment="texlive-mxedruli-fonts is &lt;2021.186.3.3csvn30021-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918531" version="1" comment="texlive-mycv is &lt;2021.186.1.5.6svn26807-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918532" version="1" comment="texlive-mycv-doc is &lt;2021.186.1.5.6svn26807-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918533" version="1" comment="texlive-mylatex is &lt;2021.186.svn56751-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918534" version="1" comment="texlive-mylatex-doc is &lt;2021.186.svn56751-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918535" version="1" comment="texlive-mylatexformat is &lt;2021.186.3.4svn21392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918536" version="1" comment="texlive-mylatexformat-doc is &lt;2021.186.3.4svn21392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918537" version="1" comment="texlive-mynsfc is &lt;2021.186.1.01svn41996-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918538" version="1" comment="texlive-mynsfc-doc is &lt;2021.186.1.01svn41996-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918539" version="1" comment="texlive-na-box is &lt;2021.186.1.0svn45130-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918540" version="1" comment="texlive-na-box-doc is &lt;2021.186.1.0svn45130-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918541" version="1" comment="texlive-na-position is &lt;2021.186.1.2svn55559-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918542" version="1" comment="texlive-na-position-doc is &lt;2021.186.1.2svn55559-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918543" version="1" comment="texlive-nag is &lt;2021.186.0.0.7svn24741-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918544" version="1" comment="texlive-nag-doc is &lt;2021.186.0.0.7svn24741-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918545" version="1" comment="texlive-nameauth is &lt;2021.186.3.6svn58026-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918546" version="1" comment="texlive-nameauth-doc is &lt;2021.186.3.6svn58026-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918547" version="1" comment="texlive-namedef is &lt;2021.186.1.0svn55881-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918548" version="1" comment="texlive-namedef-doc is &lt;2021.186.1.0svn55881-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918549" version="1" comment="texlive-namespc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918550" version="1" comment="texlive-namespc-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918551" version="1" comment="texlive-nanicolle is &lt;2021.186.2.03ysvn56224-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918552" version="1" comment="texlive-nanicolle-doc is &lt;2021.186.2.03ysvn56224-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918553" version="1" comment="texlive-nanumtype1 is &lt;2021.186.3.0svn29558-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918554" version="1" comment="texlive-nanumtype1-doc is &lt;2021.186.3.0svn29558-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918555" version="1" comment="texlive-nanumtype1-fonts is &lt;2021.186.3.0svn29558-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918556" version="1" comment="texlive-nar is &lt;2021.186.3.19svn38100-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918557" version="1" comment="texlive-natbib is &lt;2021.186.8.31bsvn20668-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918558" version="1" comment="texlive-natbib-doc is &lt;2021.186.8.31bsvn20668-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918559" version="1" comment="texlive-natded is &lt;2021.186.0.0.1svn32693-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918560" version="1" comment="texlive-natded-doc is &lt;2021.186.0.0.1svn32693-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918561" version="1" comment="texlive-nath is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918562" version="1" comment="texlive-nath-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918563" version="1" comment="texlive-nature is &lt;2021.186.1.0svn21819-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918564" version="1" comment="texlive-nature-doc is &lt;2021.186.1.0svn21819-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918565" version="1" comment="texlive-navigator is &lt;2021.186.1.1svn41413-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918566" version="1" comment="texlive-navigator-doc is &lt;2021.186.1.1svn41413-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918567" version="1" comment="texlive-navydocs is &lt;2021.186.1.1svn41643-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918568" version="1" comment="texlive-navydocs-doc is &lt;2021.186.1.1svn41643-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918569" version="1" comment="texlive-ncclatex is &lt;2021.186.1.5svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918570" version="1" comment="texlive-ncclatex-doc is &lt;2021.186.1.5svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918571" version="1" comment="texlive-ncctools is &lt;2021.186.3.5.3svn51810-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918572" version="1" comment="texlive-ncctools-doc is &lt;2021.186.3.5.3svn51810-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918573" version="1" comment="texlive-ncntrsbk is &lt;2021.186.svn31835-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918574" version="1" comment="texlive-ncntrsbk-fonts is &lt;2021.186.svn31835-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918575" version="1" comment="texlive-nddiss is &lt;2021.186.3.2017.2svn45107-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918576" version="1" comment="texlive-nddiss-doc is &lt;2021.186.3.2017.2svn45107-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918577" version="1" comment="texlive-ndsu-thesis is &lt;2021.186.svn46639-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918578" version="1" comment="texlive-ndsu-thesis-doc is &lt;2021.186.svn46639-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918579" version="1" comment="texlive-needspace is &lt;2021.186.1.3dsvn29601-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918580" version="1" comment="texlive-needspace-doc is &lt;2021.186.1.3dsvn29601-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918581" version="1" comment="texlive-nestquot is &lt;2021.186.svn27323-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918582" version="1" comment="texlive-neuralnetwork is &lt;2021.186.1.0svn31500-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918583" version="1" comment="texlive-neuralnetwork-doc is &lt;2021.186.1.0svn31500-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918584" version="1" comment="texlive-nevelok is &lt;2021.186.1.03svn39029-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918585" version="1" comment="texlive-nevelok-doc is &lt;2021.186.1.03svn39029-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918586" version="1" comment="texlive-newcommand is &lt;2021.186.2.0svn18704-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918587" version="1" comment="texlive-newcomputermodern is &lt;2021.186.3.02svn57801-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918588" version="1" comment="texlive-newcomputermodern-doc is &lt;2021.186.3.02svn57801-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918589" version="1" comment="texlive-newcomputermodern-fonts is &lt;2021.186.3.02svn57801-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918590" version="1" comment="texlive-newenviron is &lt;2021.186.1.0svn29331-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918591" version="1" comment="texlive-newenviron-doc is &lt;2021.186.1.0svn29331-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918592" version="1" comment="texlive-newfile is &lt;2021.186.1.0csvn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918593" version="1" comment="texlive-newfile-doc is &lt;2021.186.1.0csvn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918594" version="1" comment="texlive-newfloat is &lt;2021.186.1.1lsvn52906-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918595" version="1" comment="texlive-newfloat-doc is &lt;2021.186.1.1lsvn52906-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918596" version="1" comment="texlive-newlfm is &lt;2021.186.9.4svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918597" version="1" comment="texlive-newlfm-doc is &lt;2021.186.9.4svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918598" version="1" comment="texlive-newpax is &lt;2021.186.0.0.51svn58212-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918599" version="1" comment="texlive-newpax-doc is &lt;2021.186.0.0.51svn58212-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918600" version="1" comment="texlive-newpx is &lt;2021.186.1.414svn56845-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918601" version="1" comment="texlive-newpx-doc is &lt;2021.186.1.414svn56845-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918602" version="1" comment="texlive-newpx-fonts is &lt;2021.186.1.414svn56845-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918603" version="1" comment="texlive-newsletr is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918604" version="1" comment="texlive-newsletr-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918605" version="1" comment="texlive-newspaper is &lt;2021.186.1.0svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918606" version="1" comment="texlive-newspaper-doc is &lt;2021.186.1.0svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918607" version="1" comment="texlive-newtx is &lt;2021.186.1.642svn58748-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918608" version="1" comment="texlive-newtx-doc is &lt;2021.186.1.642svn58748-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918609" version="1" comment="texlive-newtx-fonts is &lt;2021.186.1.642svn58748-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918610" version="1" comment="texlive-newtxsf is &lt;2021.186.1.053svn56527-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918611" version="1" comment="texlive-newtxsf-doc is &lt;2021.186.1.053svn56527-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918612" version="1" comment="texlive-newtxsf-fonts is &lt;2021.186.1.053svn56527-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918613" version="1" comment="texlive-newtxtt is &lt;2021.186.1.056svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918614" version="1" comment="texlive-newtxtt-doc is &lt;2021.186.1.056svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918615" version="1" comment="texlive-newtxtt-fonts is &lt;2021.186.1.056svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918616" version="1" comment="texlive-newunicodechar is &lt;2021.186.1.2svn47382-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918617" version="1" comment="texlive-newunicodechar-doc is &lt;2021.186.1.2svn47382-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918618" version="1" comment="texlive-newvbtm is &lt;2021.186.1.1svn23996-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918619" version="1" comment="texlive-newvbtm-doc is &lt;2021.186.1.1svn23996-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918620" version="1" comment="texlive-newverbs is &lt;2021.186.1.6svn58256-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918621" version="1" comment="texlive-newverbs-doc is &lt;2021.186.1.6svn58256-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918622" version="1" comment="texlive-nextpage is &lt;2021.186.1.1asvn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918623" version="1" comment="texlive-nfssext-cfr is &lt;2021.186.svn43640-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918624" version="1" comment="texlive-nfssext-cfr-doc is &lt;2021.186.svn43640-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918625" version="1" comment="texlive-nicefilelist is &lt;2021.186.0.0.7asvn28527-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918626" version="1" comment="texlive-nicefilelist-doc is &lt;2021.186.0.0.7asvn28527-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918627" version="1" comment="texlive-niceframe is &lt;2021.186.1.1csvn36086-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918628" version="1" comment="texlive-niceframe-doc is &lt;2021.186.1.1csvn36086-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918629" version="1" comment="texlive-niceframe-type1 is &lt;2021.186.svn44671-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918630" version="1" comment="texlive-niceframe-type1-doc is &lt;2021.186.svn44671-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918631" version="1" comment="texlive-niceframe-type1-fonts is &lt;2021.186.svn44671-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918632" version="1" comment="texlive-nicematrix is &lt;2021.186.5.13svn58667-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918633" version="1" comment="texlive-nicematrix-doc is &lt;2021.186.5.13svn58667-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918634" version="1" comment="texlive-nicetext is &lt;2021.186.r0.67svn38914-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918635" version="1" comment="texlive-nicetext-doc is &lt;2021.186.r0.67svn38914-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918636" version="1" comment="texlive-nidanfloat is &lt;2021.186.svn48295-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918637" version="1" comment="texlive-nidanfloat-doc is &lt;2021.186.svn48295-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918638" version="1" comment="texlive-nih is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918639" version="1" comment="texlive-nih-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918640" version="1" comment="texlive-nihbiosketch is &lt;2021.186.svn54191-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918641" version="1" comment="texlive-nihbiosketch-doc is &lt;2021.186.svn54191-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918642" version="1" comment="texlive-nimbus15 is &lt;2021.186.1.013svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918643" version="1" comment="texlive-nimbus15-doc is &lt;2021.186.1.013svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918644" version="1" comment="texlive-nimbus15-fonts is &lt;2021.186.1.013svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918645" version="1" comment="texlive-nimsticks is &lt;2021.186.1.1svn55877-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918646" version="1" comment="texlive-nimsticks-doc is &lt;2021.186.1.1svn55877-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918647" version="1" comment="texlive-njurepo is &lt;2021.186.1.1.2svn50492-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918648" version="1" comment="texlive-njurepo-doc is &lt;2021.186.1.1.2svn50492-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918649" version="1" comment="texlive-nkarta is &lt;2021.186.0.0.2svn16437-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918650" version="1" comment="texlive-nkarta-doc is &lt;2021.186.0.0.2svn16437-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918651" version="1" comment="texlive-nl-interval is &lt;2021.186.1.0svn58328-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918652" version="1" comment="texlive-nl-interval-doc is &lt;2021.186.1.0svn58328-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918653" version="1" comment="texlive-nlctdoc is &lt;2021.186.1.07svn53768-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918654" version="1" comment="texlive-nlctdoc-doc is &lt;2021.186.1.07svn53768-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918655" version="1" comment="texlive-nmbib is &lt;2021.186.1.04svn37984-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918656" version="1" comment="texlive-nmbib-doc is &lt;2021.186.1.04svn37984-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918657" version="1" comment="texlive-nnext is &lt;2021.186.0.0.0svn56575-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918658" version="1" comment="texlive-nnext-doc is &lt;2021.186.0.0.0svn56575-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918659" version="1" comment="texlive-noconflict is &lt;2021.186.1.0svn30140-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918660" version="1" comment="texlive-noconflict-doc is &lt;2021.186.1.0svn30140-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918661" version="1" comment="texlive-nodetree is &lt;2021.186.2.2svn56742-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918662" version="1" comment="texlive-nodetree-doc is &lt;2021.186.2.2svn56742-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918663" version="1" comment="texlive-noindentafter is &lt;2021.186.0.0.2.2svn35709-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918664" version="1" comment="texlive-noindentafter-doc is &lt;2021.186.0.0.2.2svn35709-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918665" version="1" comment="texlive-noitcrul is &lt;2021.186.0.0.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918666" version="1" comment="texlive-noitcrul-doc is &lt;2021.186.0.0.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918667" version="1" comment="texlive-nolbreaks is &lt;2021.186.1.2svn26786-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918668" version="1" comment="texlive-nolbreaks-doc is &lt;2021.186.1.2svn26786-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918669" version="1" comment="texlive-nomencl is &lt;2021.186.5.5svn57263-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918670" version="1" comment="texlive-nomencl-doc is &lt;2021.186.5.5svn57263-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918671" version="1" comment="texlive-nomentbl is &lt;2021.186.0.0.4svn16549-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918672" version="1" comment="texlive-nomentbl-doc is &lt;2021.186.0.0.4svn16549-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918673" version="1" comment="texlive-nonfloat is &lt;2021.186.1.0svn17598-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918674" version="1" comment="texlive-nonfloat-doc is &lt;2021.186.1.0svn17598-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918675" version="1" comment="texlive-nonumonpart is &lt;2021.186.1svn22114-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918676" version="1" comment="texlive-nonumonpart-doc is &lt;2021.186.1svn22114-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918677" version="1" comment="texlive-nopageno is &lt;2021.186.svn18128-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918678" version="1" comment="texlive-nopageno-doc is &lt;2021.186.svn18128-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918679" version="1" comment="texlive-norasi-c90 is &lt;2021.186.svn37675-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918680" version="1" comment="texlive-normalcolor is &lt;2021.186.r11svn40125-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918681" version="1" comment="texlive-normalcolor-doc is &lt;2021.186.r11svn40125-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918682" version="1" comment="texlive-nostarch is &lt;2021.186.1.3svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918683" version="1" comment="texlive-nostarch-doc is &lt;2021.186.1.3svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918684" version="1" comment="texlive-notes is &lt;2021.186.1.0.1svn42428-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918685" version="1" comment="texlive-notes-doc is &lt;2021.186.1.0.1svn42428-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918686" version="1" comment="texlive-notes2bib is &lt;2021.186.2.0msvn52231-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918687" version="1" comment="texlive-notes2bib-doc is &lt;2021.186.2.0msvn52231-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918688" version="1" comment="texlive-notespages is &lt;2021.186.0.0.8.1svn41906-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918689" version="1" comment="texlive-notespages-doc is &lt;2021.186.0.0.8.1svn41906-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918690" version="1" comment="texlive-notestex is &lt;2021.186.1.0svn45396-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918691" version="1" comment="texlive-notestex-doc is &lt;2021.186.1.0svn45396-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918692" version="1" comment="texlive-notex-bst is &lt;2021.186.svn42361-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918693" version="1" comment="texlive-noto is &lt;2021.186.svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918694" version="1" comment="texlive-noto-doc is &lt;2021.186.svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918695" version="1" comment="texlive-noto-emoji is &lt;2021.186.20191119_unicode12svn53968-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918696" version="1" comment="texlive-noto-emoji-doc is &lt;2021.186.20191119_unicode12svn53968-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918697" version="1" comment="texlive-noto-emoji-fonts is &lt;2021.186.20191119_unicode12svn53968-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918698" version="1" comment="texlive-noto-fonts is &lt;2021.186.svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918699" version="1" comment="texlive-notoccite is &lt;2021.186.svn18129-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918700" version="1" comment="texlive-notoccite-doc is &lt;2021.186.svn18129-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918701" version="1" comment="texlive-notomath is &lt;2021.186.1.02svn58726-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918702" version="1" comment="texlive-notomath-doc is &lt;2021.186.1.02svn58726-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918703" version="1" comment="texlive-notomath-fonts is &lt;2021.186.1.02svn58726-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918704" version="1" comment="texlive-novel is &lt;2021.186.1.52svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918705" version="1" comment="texlive-novel-doc is &lt;2021.186.1.52svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918706" version="1" comment="texlive-novel-fonts is &lt;2021.186.1.52svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918707" version="1" comment="texlive-nowidow is &lt;2021.186.1.0svn24066-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918708" version="1" comment="texlive-nowidow-doc is &lt;2021.186.1.0svn24066-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918709" version="1" comment="texlive-nox is &lt;2021.186.1.0svn30991-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918710" version="1" comment="texlive-nox-doc is &lt;2021.186.1.0svn30991-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918711" version="1" comment="texlive-npp-for-context is &lt;2021.186.0.0.98svn51389-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918712" version="1" comment="texlive-nrc is &lt;2021.186.2.01asvn29027-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918713" version="1" comment="texlive-nrc-doc is &lt;2021.186.2.01asvn29027-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918714" version="1" comment="texlive-ntgclass is &lt;2021.186.2.1esvn56959-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918715" version="1" comment="texlive-ntgclass-doc is &lt;2021.186.2.1esvn56959-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918716" version="1" comment="texlive-nth is &lt;2021.186.svn54252-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918717" version="1" comment="texlive-ntheorem is &lt;2021.186.1.33svn27609-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918718" version="1" comment="texlive-ntheorem-doc is &lt;2021.186.1.33svn27609-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918719" version="1" comment="texlive-ntheorem-vn is &lt;2021.186.1.203svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918720" version="1" comment="texlive-nuc is &lt;2021.186.0.0.1svn22256-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918721" version="1" comment="texlive-nuc-doc is &lt;2021.186.0.0.1svn22256-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918722" version="1" comment="texlive-nucleardata is &lt;2021.186.1.1svn47307-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918723" version="1" comment="texlive-nucleardata-doc is &lt;2021.186.1.1svn47307-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918724" version="1" comment="texlive-numberedblock is &lt;2021.186.1.10svn33109-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918725" version="1" comment="texlive-numberedblock-doc is &lt;2021.186.1.10svn33109-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918726" version="1" comment="texlive-numberpt is &lt;2021.186.1.0svn51640-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918727" version="1" comment="texlive-numberpt-doc is &lt;2021.186.1.0svn51640-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918728" version="1" comment="texlive-numerica is &lt;2021.186.1.0.0svn57759-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918729" version="1" comment="texlive-numerica-doc is &lt;2021.186.1.0.0svn57759-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918730" version="1" comment="texlive-numericplots is &lt;2021.186.2.0.2svn31729-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918731" version="1" comment="texlive-numericplots-doc is &lt;2021.186.2.0.2svn31729-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918732" version="1" comment="texlive-numname is &lt;2021.186.svn18130-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918733" version="1" comment="texlive-numname-doc is &lt;2021.186.svn18130-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918734" version="1" comment="texlive-numnameru is &lt;2021.186.svn44895-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918735" version="1" comment="texlive-numnameru-doc is &lt;2021.186.svn44895-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918736" version="1" comment="texlive-numprint is &lt;2021.186.1.39svn27498-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918737" version="1" comment="texlive-numprint-doc is &lt;2021.186.1.39svn27498-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918738" version="1" comment="texlive-numspell is &lt;2021.186.1.4svn56912-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918739" version="1" comment="texlive-numspell-doc is &lt;2021.186.1.4svn56912-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918740" version="1" comment="texlive-nunito is &lt;2021.186.0.0.0.1svn57429-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918741" version="1" comment="texlive-nunito-doc is &lt;2021.186.0.0.0.1svn57429-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918742" version="1" comment="texlive-nunito-fonts is &lt;2021.186.0.0.0.1svn57429-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918743" version="1" comment="texlive-nwejm is &lt;2021.186.1.0.1svn54392-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918744" version="1" comment="texlive-nwejm-doc is &lt;2021.186.1.0.1svn54392-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918745" version="1" comment="texlive-oberdiek is &lt;2021.186.svn56291-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918746" version="1" comment="texlive-oberdiek-doc is &lt;2021.186.svn56291-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918747" version="1" comment="texlive-objectz is &lt;2021.186.svn19389-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918748" version="1" comment="texlive-objectz-doc is &lt;2021.186.svn19389-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918749" version="1" comment="texlive-obnov is &lt;2021.186.0.0.11svn33355-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918750" version="1" comment="texlive-obnov-doc is &lt;2021.186.0.0.11svn33355-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918751" version="1" comment="texlive-ocg-p is &lt;2021.186.0.0.4svn28803-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918752" version="1" comment="texlive-ocg-p-doc is &lt;2021.186.0.0.4svn28803-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918753" version="1" comment="texlive-ocgx is &lt;2021.186.0.0.5svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918754" version="1" comment="texlive-ocgx-doc is &lt;2021.186.0.0.5svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918755" version="1" comment="texlive-ocgx2 is &lt;2021.186.0.0.50svn57531-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918756" version="1" comment="texlive-ocgx2-doc is &lt;2021.186.0.0.50svn57531-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918757" version="1" comment="texlive-ocherokee is &lt;2021.186.svn25689-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918758" version="1" comment="texlive-ocherokee-doc is &lt;2021.186.svn25689-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918759" version="1" comment="texlive-ocherokee-fonts is &lt;2021.186.svn25689-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918760" version="1" comment="texlive-ocr-b is &lt;2021.186.svn20852-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918761" version="1" comment="texlive-ocr-b-doc is &lt;2021.186.svn20852-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918762" version="1" comment="texlive-ocr-b-outline is &lt;2021.186.svn20969-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918763" version="1" comment="texlive-ocr-b-outline-doc is &lt;2021.186.svn20969-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918764" version="1" comment="texlive-ocr-b-outline-fonts is &lt;2021.186.svn20969-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918765" version="1" comment="texlive-ocr-latex is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918766" version="1" comment="texlive-ocr-latex-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918767" version="1" comment="texlive-octave is &lt;2021.186.svn45674-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918768" version="1" comment="texlive-octave-doc is &lt;2021.186.svn45674-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918769" version="1" comment="texlive-octavo is &lt;2021.186.1.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918770" version="1" comment="texlive-octavo-doc is &lt;2021.186.1.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918771" version="1" comment="texlive-odsfile is &lt;2021.186.0.0.6svn38449-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918772" version="1" comment="texlive-odsfile-doc is &lt;2021.186.0.0.6svn38449-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918773" version="1" comment="texlive-ofs is &lt;2021.186.svn16991-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918774" version="1" comment="texlive-ofs-doc is &lt;2021.186.svn16991-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918775" version="1" comment="texlive-ogham is &lt;2021.186.svn24876-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918776" version="1" comment="texlive-ogham-doc is &lt;2021.186.svn24876-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918777" version="1" comment="texlive-oinuit is &lt;2021.186.svn28668-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918778" version="1" comment="texlive-oinuit-doc is &lt;2021.186.svn28668-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918779" version="1" comment="texlive-oinuit-fonts is &lt;2021.186.svn28668-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918780" version="1" comment="texlive-old-arrows is &lt;2021.186.2.0svn42872-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918781" version="1" comment="texlive-old-arrows-doc is &lt;2021.186.2.0svn42872-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918782" version="1" comment="texlive-old-arrows-fonts is &lt;2021.186.2.0svn42872-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918783" version="1" comment="texlive-oldlatin is &lt;2021.186.1.00svn17932-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918784" version="1" comment="texlive-oldlatin-doc is &lt;2021.186.1.00svn17932-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918785" version="1" comment="texlive-oldstandard is &lt;2021.186.2.6svn57213-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918786" version="1" comment="texlive-oldstandard-doc is &lt;2021.186.2.6svn57213-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918787" version="1" comment="texlive-oldstandard-fonts is &lt;2021.186.2.6svn57213-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918788" version="1" comment="texlive-oldstyle is &lt;2021.186.0.0.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918789" version="1" comment="texlive-oldstyle-doc is &lt;2021.186.0.0.2svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918790" version="1" comment="texlive-olsak-misc is &lt;2021.186.may_2019svn54080-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918791" version="1" comment="texlive-olsak-misc-doc is &lt;2021.186.may_2019svn54080-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918792" version="1" comment="texlive-omega is &lt;2021.186.svn33046-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918793" version="1" comment="texlive-omega-doc is &lt;2021.186.svn33046-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918794" version="1" comment="texlive-omega-fonts is &lt;2021.186.svn33046-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918795" version="1" comment="texlive-omegaware is &lt;2021.186.svn57972-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918796" version="1" comment="texlive-onedown is &lt;2021.186.1.4svn52525-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918797" version="1" comment="texlive-onedown-doc is &lt;2021.186.1.4svn52525-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918798" version="1" comment="texlive-onlyamsmath is &lt;2021.186.0.0.20svn42927-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918799" version="1" comment="texlive-onlyamsmath-doc is &lt;2021.186.0.0.20svn42927-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918800" version="1" comment="texlive-onrannual is &lt;2021.186.1.1svn17474-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918801" version="1" comment="texlive-onrannual-doc is &lt;2021.186.1.1svn17474-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918802" version="1" comment="texlive-opcit is &lt;2021.186.1.1svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918803" version="1" comment="texlive-opcit-doc is &lt;2021.186.1.1svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918804" version="1" comment="texlive-opensans is &lt;2021.186.2.2svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918805" version="1" comment="texlive-opensans-doc is &lt;2021.186.2.2svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918806" version="1" comment="texlive-opensans-fonts is &lt;2021.186.2.2svn54512-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918807" version="1" comment="texlive-oplotsymbl is &lt;2021.186.1.4svn44951-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918808" version="1" comment="texlive-oplotsymbl-doc is &lt;2021.186.1.4svn44951-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918809" version="1" comment="texlive-opteng is &lt;2021.186.1.0svn27331-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918810" version="1" comment="texlive-opteng-doc is &lt;2021.186.1.0svn27331-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918811" version="1" comment="texlive-optex is &lt;2021.186.1.01svn58515-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918812" version="1" comment="texlive-optex-doc is &lt;2021.186.1.01svn58515-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918813" version="1" comment="texlive-optidef is &lt;2021.186.3.1svn50941-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918814" version="1" comment="texlive-optidef-doc is &lt;2021.186.3.1svn50941-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918815" version="1" comment="texlive-optional is &lt;2021.186.2.2bsvn18131-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918816" version="1" comment="texlive-optional-doc is &lt;2021.186.2.2bsvn18131-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918817" version="1" comment="texlive-options is &lt;2021.186.1.0svn39030-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918818" version="1" comment="texlive-options-doc is &lt;2021.186.1.0svn39030-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918819" version="1" comment="texlive-orcidlink is &lt;2021.186.1.0.3svn58432-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918820" version="1" comment="texlive-orcidlink-doc is &lt;2021.186.1.0.3svn58432-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918821" version="1" comment="texlive-ordinalpt is &lt;2021.186.2.1svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918822" version="1" comment="texlive-ordinalpt-doc is &lt;2021.186.2.1svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918823" version="1" comment="texlive-orientation is &lt;2021.186.1.0svn57390-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918824" version="1" comment="texlive-orientation-doc is &lt;2021.186.1.0svn57390-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918825" version="1" comment="texlive-orkhun is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918826" version="1" comment="texlive-orkhun-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918827" version="1" comment="texlive-oscola is &lt;2021.186.1.7svn54328-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918828" version="1" comment="texlive-oscola-doc is &lt;2021.186.1.7svn54328-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918829" version="1" comment="texlive-oswald is &lt;2021.186.svn57253-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918830" version="1" comment="texlive-oswald-doc is &lt;2021.186.svn57253-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918831" version="1" comment="texlive-oswald-fonts is &lt;2021.186.svn57253-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918832" version="1" comment="texlive-ot-tableau is &lt;2021.186.svn44889-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918833" version="1" comment="texlive-ot-tableau-doc is &lt;2021.186.svn44889-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918834" version="1" comment="texlive-othello is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918835" version="1" comment="texlive-othello-doc is &lt;2021.186.svn15878-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918836" version="1" comment="texlive-othelloboard is &lt;2021.186.1.2svn23714-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918837" version="1" comment="texlive-othelloboard-doc is &lt;2021.186.1.2svn23714-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918838" version="1" comment="texlive-otibet is &lt;2021.186.svn45777-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918839" version="1" comment="texlive-otibet-doc is &lt;2021.186.svn45777-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918840" version="1" comment="texlive-oubraces is &lt;2021.186.svn21833-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918841" version="1" comment="texlive-oubraces-doc is &lt;2021.186.svn21833-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918842" version="1" comment="texlive-oup-authoring-template is &lt;2021.186.1.0svn58661-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918843" version="1" comment="texlive-oup-authoring-template-doc is &lt;2021.186.1.0svn58661-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918844" version="1" comment="texlive-outerhbox is &lt;2021.186.1.2svn54254-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918845" version="1" comment="texlive-outline is &lt;2021.186.svn18360-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918846" version="1" comment="texlive-outline-doc is &lt;2021.186.svn18360-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918847" version="1" comment="texlive-outliner is &lt;2021.186.0.0.94svn21095-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918848" version="1" comment="texlive-outliner-doc is &lt;2021.186.0.0.94svn21095-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918849" version="1" comment="texlive-outlines is &lt;2021.186.1.1svn25192-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918850" version="1" comment="texlive-outlines-doc is &lt;2021.186.1.1svn25192-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918851" version="1" comment="texlive-outlining is &lt;2021.186.0.0.1svn45601-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918852" version="1" comment="texlive-outlining-doc is &lt;2021.186.0.0.1svn45601-47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918853" version="1" comment="texlive-overlays is &lt;2021.186.2.12svn57866-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918854" version="1" comment="texlive-overlays-doc is &lt;2021.186.2.12svn57866-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918855" version="1" comment="texlive-overlock is &lt;2021.186.svn56079-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918856" version="1" comment="texlive-overlock-doc is &lt;2021.186.svn56079-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918857" version="1" comment="texlive-overlock-fonts is &lt;2021.186.svn56079-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918858" version="1" comment="texlive-overpic is &lt;2021.186.1.3svn53889-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918859" version="1" comment="texlive-overpic-doc is &lt;2021.186.1.3svn53889-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918860" version="1" comment="texlive-pacioli is &lt;2021.186.svn24947-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918861" version="1" comment="texlive-pacioli-doc is &lt;2021.186.svn24947-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918862" version="1" comment="texlive-padauk is &lt;2021.186.3.002svn42617-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918863" version="1" comment="texlive-padauk-doc is &lt;2021.186.3.002svn42617-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918864" version="1" comment="texlive-padauk-fonts is &lt;2021.186.3.002svn42617-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918865" version="1" comment="texlive-padcount is &lt;2021.186.1.0svn47621-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918866" version="1" comment="texlive-padcount-doc is &lt;2021.186.1.0svn47621-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918867" version="1" comment="texlive-pagecolor is &lt;2021.186.1.0isvn44487-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918868" version="1" comment="texlive-pagecolor-doc is &lt;2021.186.1.0isvn44487-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918869" version="1" comment="texlive-pagecont is &lt;2021.186.1.0svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918870" version="1" comment="texlive-pagecont-doc is &lt;2021.186.1.0svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918871" version="1" comment="texlive-pagenote is &lt;2021.186.1.1asvn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918872" version="1" comment="texlive-pagenote-doc is &lt;2021.186.1.1asvn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918873" version="1" comment="texlive-pagerange is &lt;2021.186.0.0.5svn16915-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918874" version="1" comment="texlive-pagerange-doc is &lt;2021.186.0.0.5svn16915-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918875" version="1" comment="texlive-pagesel is &lt;2021.186.1.10svn56105-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918876" version="1" comment="texlive-pagesel-doc is &lt;2021.186.1.10svn56105-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918877" version="1" comment="texlive-pageslts is &lt;2021.186.1.2fsvn39164-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918878" version="1" comment="texlive-pageslts-doc is &lt;2021.186.1.2fsvn39164-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918879" version="1" comment="texlive-palatino is &lt;2021.186.svn31835-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918880" version="1" comment="texlive-palatino-fonts is &lt;2021.186.svn31835-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918881" version="1" comment="texlive-paper is &lt;2021.186.1.0lsvn34521-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918882" version="1" comment="texlive-paper-doc is &lt;2021.186.1.0lsvn34521-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918883" version="1" comment="texlive-papercdcase is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918884" version="1" comment="texlive-papercdcase-doc is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918885" version="1" comment="texlive-papermas is &lt;2021.186.1.0hsvn23667-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918886" version="1" comment="texlive-papermas-doc is &lt;2021.186.1.0hsvn23667-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918887" version="1" comment="texlive-papertex is &lt;2021.186.1.2bsvn19230-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918888" version="1" comment="texlive-papertex-doc is &lt;2021.186.1.2bsvn19230-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918889" version="1" comment="texlive-paracol is &lt;2021.186.1.35svn49560-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918890" version="1" comment="texlive-paracol-doc is &lt;2021.186.1.35svn49560-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918891" version="1" comment="texlive-parades is &lt;2021.186.svn40042-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918892" version="1" comment="texlive-parades-doc is &lt;2021.186.svn40042-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918893" version="1" comment="texlive-paralist is &lt;2021.186.2.7svn43021-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918894" version="1" comment="texlive-paralist-doc is &lt;2021.186.2.7svn43021-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918895" version="1" comment="texlive-parallel is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918896" version="1" comment="texlive-parallel-doc is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918897" version="1" comment="texlive-paratype is &lt;2021.186.svn32859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918898" version="1" comment="texlive-paratype-doc is &lt;2021.186.svn32859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918899" version="1" comment="texlive-paratype-fonts is &lt;2021.186.svn32859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918900" version="1" comment="texlive-paresse is &lt;2021.186.5.0.1svn56621-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918901" version="1" comment="texlive-paresse-doc is &lt;2021.186.5.0.1svn56621-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918902" version="1" comment="texlive-parnotes is &lt;2021.186.3bsvn51720-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918903" version="1" comment="texlive-parnotes-doc is &lt;2021.186.3bsvn51720-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918904" version="1" comment="texlive-parrun is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918905" version="1" comment="texlive-parrun-doc is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918906" version="1" comment="texlive-parsa is &lt;2021.186.1.3svn54840-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918907" version="1" comment="texlive-parsa-doc is &lt;2021.186.1.3svn54840-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918908" version="1" comment="texlive-parselines is &lt;2021.186.1.4svn21475-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918909" version="1" comment="texlive-parselines-doc is &lt;2021.186.1.4svn21475-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918910" version="1" comment="texlive-parskip is &lt;2021.186.2.0hsvn58358-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918911" version="1" comment="texlive-parskip-doc is &lt;2021.186.2.0hsvn58358-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918912" version="1" comment="texlive-pas-cours is &lt;2021.186.1.9svn55859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918913" version="1" comment="texlive-pas-cours-doc is &lt;2021.186.1.9svn55859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918914" version="1" comment="texlive-pas-crosswords is &lt;2021.186.1.03svn32313-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918915" version="1" comment="texlive-pas-crosswords-doc is &lt;2021.186.1.03svn32313-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918916" version="1" comment="texlive-pas-cv is &lt;2021.186.2.01svn32263-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918917" version="1" comment="texlive-pas-cv-doc is &lt;2021.186.2.01svn32263-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918918" version="1" comment="texlive-pas-tableur is &lt;2021.186.2.01svn39542-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918919" version="1" comment="texlive-pas-tableur-doc is &lt;2021.186.2.01svn39542-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918920" version="1" comment="texlive-passivetex is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918921" version="1" comment="texlive-patch is &lt;2021.186.svn42428-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918922" version="1" comment="texlive-patchcmd is &lt;2021.186.1.05svn41379-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918923" version="1" comment="texlive-patchcmd-doc is &lt;2021.186.1.05svn41379-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918924" version="1" comment="texlive-patgen is &lt;2021.186.2.4svn57972-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918925" version="1" comment="texlive-patgen2-tutorial is &lt;2021.186.svn16490-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918926" version="1" comment="texlive-path is &lt;2021.186.3.05svn22045-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918927" version="1" comment="texlive-path-doc is &lt;2021.186.3.05svn22045-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918928" version="1" comment="texlive-pauldoc is &lt;2021.186.0.0.5svn16005-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918929" version="1" comment="texlive-pauldoc-doc is &lt;2021.186.0.0.5svn16005-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918930" version="1" comment="texlive-pawpict is &lt;2021.186.1.0svn21629-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918931" version="1" comment="texlive-pawpict-doc is &lt;2021.186.1.0svn21629-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918932" version="1" comment="texlive-pax is &lt;2021.186.0.0.1lsvn54512-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918933" version="1" comment="texlive-pax-doc is &lt;2021.186.0.0.1lsvn54512-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918934" version="1" comment="texlive-pb-diagram is &lt;2021.186.5.0svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918935" version="1" comment="texlive-pb-diagram-doc is &lt;2021.186.5.0svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918936" version="1" comment="texlive-pbalance is &lt;2021.186.1.0.1svn57161-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918937" version="1" comment="texlive-pbalance-doc is &lt;2021.186.1.0.1svn57161-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918938" version="1" comment="texlive-pbibtex-base is &lt;2021.186.svn40986-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918939" version="1" comment="texlive-pbibtex-base-doc is &lt;2021.186.svn40986-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918940" version="1" comment="texlive-pbox is &lt;2021.186.1.2svn24807-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918941" version="1" comment="texlive-pbox-doc is &lt;2021.186.1.2svn24807-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918942" version="1" comment="texlive-pbsheet is &lt;2021.186.0.0.1svn24830-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918943" version="1" comment="texlive-pbsheet-doc is &lt;2021.186.0.0.1svn24830-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918944" version="1" comment="texlive-pdf-trans is &lt;2021.186.2.4svn32809-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918945" version="1" comment="texlive-pdf-trans-doc is &lt;2021.186.2.4svn32809-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918946" version="1" comment="texlive-pdf14 is &lt;2021.186.0.0.1svn17583-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918947" version="1" comment="texlive-pdf14-doc is &lt;2021.186.0.0.1svn17583-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918948" version="1" comment="texlive-pdfarticle is &lt;2021.186.1.0svn51127-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918949" version="1" comment="texlive-pdfarticle-doc is &lt;2021.186.1.0svn51127-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918950" version="1" comment="texlive-pdfbook2 is &lt;2021.186.1.4svn53521-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918951" version="1" comment="texlive-pdfbook2-doc is &lt;2021.186.1.4svn53521-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918952" version="1" comment="texlive-pdfcolmk is &lt;2021.186.2.0svn52912-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918953" version="1" comment="texlive-pdfcolmk-doc is &lt;2021.186.2.0svn52912-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918954" version="1" comment="texlive-pdfcomment is &lt;2021.186.2.4asvn49047-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918955" version="1" comment="texlive-pdfcomment-doc is &lt;2021.186.2.4asvn49047-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918956" version="1" comment="texlive-pdfcprot is &lt;2021.186.1.7asvn18735-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918957" version="1" comment="texlive-pdfcprot-doc is &lt;2021.186.1.7asvn18735-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918958" version="1" comment="texlive-pdfcrop is &lt;2021.186.1.40svn55435-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918959" version="1" comment="texlive-pdfcrop-doc is &lt;2021.186.1.40svn55435-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918960" version="1" comment="texlive-pdfescape is &lt;2021.186.1.15svn53082-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918961" version="1" comment="texlive-pdfescape-doc is &lt;2021.186.1.15svn53082-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918962" version="1" comment="texlive-pdfjam is &lt;2021.186.3.03svn56991-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918963" version="1" comment="texlive-pdfjam-doc is &lt;2021.186.3.03svn56991-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918964" version="1" comment="texlive-pdflatexpicscale is &lt;2021.186.0.0.32svn46617-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918965" version="1" comment="texlive-pdflatexpicscale-doc is &lt;2021.186.0.0.32svn46617-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918966" version="1" comment="texlive-pdflscape is &lt;2021.186.0.0.12svn53047-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918967" version="1" comment="texlive-pdflscape-doc is &lt;2021.186.0.0.12svn53047-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918968" version="1" comment="texlive-pdfmanagement-testphase is &lt;2021.186.0.0.95csvn58511-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918969" version="1" comment="texlive-pdfmanagement-testphase-doc is &lt;2021.186.0.0.95csvn58511-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918970" version="1" comment="texlive-pdfmarginpar is &lt;2021.186.0.0.92svn23492-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918971" version="1" comment="texlive-pdfmarginpar-doc is &lt;2021.186.0.0.92svn23492-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918972" version="1" comment="texlive-pdfoverlay is &lt;2021.186.1.2asvn57923-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918973" version="1" comment="texlive-pdfoverlay-doc is &lt;2021.186.1.2asvn57923-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918974" version="1" comment="texlive-pdfpagediff is &lt;2021.186.1.4svn37946-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918975" version="1" comment="texlive-pdfpagediff-doc is &lt;2021.186.1.4svn37946-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918976" version="1" comment="texlive-pdfpages is &lt;2021.186.0.0.5tsvn58212-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918977" version="1" comment="texlive-pdfpages-doc is &lt;2021.186.0.0.5tsvn58212-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918978" version="1" comment="texlive-pdfpc is &lt;2021.186.0.0.6.0svn57735-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918979" version="1" comment="texlive-pdfpc-doc is &lt;2021.186.0.0.6.0svn57735-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918980" version="1" comment="texlive-pdfpc-movie is &lt;2021.186.1.0svn48245-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918981" version="1" comment="texlive-pdfpc-movie-doc is &lt;2021.186.1.0svn48245-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918982" version="1" comment="texlive-pdfprivacy is &lt;2021.186.1.0svn45985-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918983" version="1" comment="texlive-pdfprivacy-doc is &lt;2021.186.1.0svn45985-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918984" version="1" comment="texlive-pdfreview is &lt;2021.186.1.2svn50100-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918985" version="1" comment="texlive-pdfreview-doc is &lt;2021.186.1.2svn50100-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918986" version="1" comment="texlive-pdfscreen is &lt;2021.186.1.5svn42428-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918987" version="1" comment="texlive-pdfscreen-doc is &lt;2021.186.1.5svn42428-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918988" version="1" comment="texlive-pdfslide is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918989" version="1" comment="texlive-pdfslide-doc is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918990" version="1" comment="texlive-pdfsync is &lt;2021.186.svn20373-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918991" version="1" comment="texlive-pdfsync-doc is &lt;2021.186.svn20373-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918992" version="1" comment="texlive-pdftex is &lt;2021.186.svn57973-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918993" version="1" comment="texlive-pdftex-doc is &lt;2021.186.svn57973-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918994" version="1" comment="texlive-pdftex-fonts is &lt;2021.186.svn57973-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918995" version="1" comment="texlive-pdftex-quiet is &lt;2021.186.1.1.0svn49169-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918996" version="1" comment="texlive-pdftex-quiet-doc is &lt;2021.186.1.1.0svn49169-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918997" version="1" comment="texlive-pdftexcmds is &lt;2021.186.0.0.33svn55777-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918998" version="1" comment="texlive-pdftexcmds-doc is &lt;2021.186.0.0.33svn55777-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009918999" version="1" comment="texlive-pdftosrc is &lt;2021.186.svn57972-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919000" version="1" comment="texlive-pdftricks is &lt;2021.186.1.16svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919001" version="1" comment="texlive-pdftricks-doc is &lt;2021.186.1.16svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919002" version="1" comment="texlive-pdftricks2 is &lt;2021.186.1.01svn31016-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919003" version="1" comment="texlive-pdftricks2-doc is &lt;2021.186.1.01svn31016-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919004" version="1" comment="texlive-pdfwin is &lt;2021.186.svn54074-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919005" version="1" comment="texlive-pdfwin-doc is &lt;2021.186.svn54074-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919006" version="1" comment="texlive-pdfx is &lt;2021.186.1.6.3svn50338-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919007" version="1" comment="texlive-pdfx-doc is &lt;2021.186.1.6.3svn50338-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919008" version="1" comment="texlive-pdfxup is &lt;2021.186.2.00svn57166-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919009" version="1" comment="texlive-pdfxup-doc is &lt;2021.186.2.00svn57166-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919010" version="1" comment="texlive-pecha is &lt;2021.186.0.0.1svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919011" version="1" comment="texlive-pecha-doc is &lt;2021.186.0.0.1svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919012" version="1" comment="texlive-pedigree-perl is &lt;2021.186.1.0svn31990-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919013" version="1" comment="texlive-pedigree-perl-doc is &lt;2021.186.1.0svn31990-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919014" version="1" comment="texlive-penrose is &lt;2021.186.1.4svn57508-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919015" version="1" comment="texlive-penrose-doc is &lt;2021.186.1.4svn57508-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919016" version="1" comment="texlive-perception is &lt;2021.186.svn48861-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919017" version="1" comment="texlive-perception-doc is &lt;2021.186.svn48861-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919018" version="1" comment="texlive-perfectcut is &lt;2021.186.2.3svn54080-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919019" version="1" comment="texlive-perfectcut-doc is &lt;2021.186.2.3svn54080-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919020" version="1" comment="texlive-perltex is &lt;2021.186.2.2svn52162-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919021" version="1" comment="texlive-perltex-doc is &lt;2021.186.2.2svn52162-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919022" version="1" comment="texlive-permute is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919023" version="1" comment="texlive-permute-doc is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919024" version="1" comment="texlive-persian-bib is &lt;2021.186.0.0.9svn37297-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919025" version="1" comment="texlive-persian-bib-doc is &lt;2021.186.0.0.9svn37297-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919026" version="1" comment="texlive-petiteannonce is &lt;2021.186.1.0001svn25915-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919027" version="1" comment="texlive-petiteannonce-doc is &lt;2021.186.1.0001svn25915-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919028" version="1" comment="texlive-petri-nets is &lt;2021.186.svn39165-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919029" version="1" comment="texlive-petri-nets-doc is &lt;2021.186.svn39165-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919030" version="1" comment="texlive-pfarrei is &lt;2021.186.r36svn31934-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919031" version="1" comment="texlive-pfarrei-doc is &lt;2021.186.r36svn31934-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919032" version="1" comment="texlive-pgf is &lt;2021.186.3.1.8bsvn57240-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919033" version="1" comment="texlive-pgf-blur is &lt;2021.186.1.02svn54512-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919034" version="1" comment="texlive-pgf-blur-doc is &lt;2021.186.1.02svn54512-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919035" version="1" comment="texlive-pgf-cmykshadings is &lt;2021.186.1.2svn52635-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919036" version="1" comment="texlive-pgf-cmykshadings-doc is &lt;2021.186.1.2svn52635-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919037" version="1" comment="texlive-pgf-doc is &lt;2021.186.3.1.8bsvn57240-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919038" version="1" comment="texlive-pgf-pie is &lt;2021.186.0.0.3svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919039" version="1" comment="texlive-pgf-pie-doc is &lt;2021.186.0.0.3svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919040" version="1" comment="texlive-pgf-soroban is &lt;2021.186.1.1svn32269-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919041" version="1" comment="texlive-pgf-soroban-doc is &lt;2021.186.1.1svn32269-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919042" version="1" comment="texlive-pgf-spectra is &lt;2021.186.2.0.0svn58467-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919043" version="1" comment="texlive-pgf-spectra-doc is &lt;2021.186.2.0.0svn58467-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919044" version="1" comment="texlive-pgf-umlcd is &lt;2021.186.0.0.2.1.1svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919045" version="1" comment="texlive-pgf-umlcd-doc is &lt;2021.186.0.0.2.1.1svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919046" version="1" comment="texlive-pgf-umlsd is &lt;2021.186.0.0.7svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919047" version="1" comment="texlive-pgf-umlsd-doc is &lt;2021.186.0.0.7svn55342-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919048" version="1" comment="texlive-pgfgantt is &lt;2021.186.5.0svn52662-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919049" version="1" comment="texlive-pgfgantt-doc is &lt;2021.186.5.0svn52662-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919050" version="1" comment="texlive-pgfkeyx is &lt;2021.186.0.0.0.1svn26093-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919051" version="1" comment="texlive-pgfkeyx-doc is &lt;2021.186.0.0.0.1svn26093-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919052" version="1" comment="texlive-pgfmolbio is &lt;2021.186.0.0.21svn35152-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919053" version="1" comment="texlive-pgfmolbio-doc is &lt;2021.186.0.0.21svn35152-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919054" version="1" comment="texlive-pgfmorepages is &lt;2021.186.1.20svn54770-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919055" version="1" comment="texlive-pgfmorepages-doc is &lt;2021.186.1.20svn54770-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919056" version="1" comment="texlive-pgfopts is &lt;2021.186.2.1asvn56615-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919057" version="1" comment="texlive-pgfopts-doc is &lt;2021.186.2.1asvn56615-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919058" version="1" comment="texlive-pgfornament is &lt;2021.186.1.2svn55326-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919059" version="1" comment="texlive-pgfornament-doc is &lt;2021.186.1.2svn55326-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919060" version="1" comment="texlive-pgfornament-han is &lt;2021.186.svn54191-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919061" version="1" comment="texlive-pgfornament-han-doc is &lt;2021.186.svn54191-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919062" version="1" comment="texlive-pgfplots is &lt;2021.186.1.17svn54080-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919063" version="1" comment="texlive-pgfplots-doc is &lt;2021.186.1.17svn54080-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919064" version="1" comment="texlive-phaistos is &lt;2021.186.1.0svn18651-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919065" version="1" comment="texlive-phaistos-doc is &lt;2021.186.1.0svn18651-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919066" version="1" comment="texlive-phaistos-fonts is &lt;2021.186.1.0svn18651-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919067" version="1" comment="texlive-phffullpagefigure is &lt;2021.186.1.0svn41857-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919068" version="1" comment="texlive-phffullpagefigure-doc is &lt;2021.186.1.0svn41857-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919069" version="1" comment="texlive-phfnote is &lt;2021.186.1.0svn41858-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919070" version="1" comment="texlive-phfnote-doc is &lt;2021.186.1.0svn41858-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919071" version="1" comment="texlive-phfparen is &lt;2021.186.1.0svn41859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919072" version="1" comment="texlive-phfparen-doc is &lt;2021.186.1.0svn41859-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919073" version="1" comment="texlive-phfqit is &lt;2021.186.2.0svn45084-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919074" version="1" comment="texlive-phfqit-doc is &lt;2021.186.2.0svn45084-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919075" version="1" comment="texlive-phfquotetext is &lt;2021.186.1.0svn41869-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919076" version="1" comment="texlive-phfquotetext-doc is &lt;2021.186.1.0svn41869-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919077" version="1" comment="texlive-phfsvnwatermark is &lt;2021.186.1.0svn41870-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919078" version="1" comment="texlive-phfsvnwatermark-doc is &lt;2021.186.1.0svn41870-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919079" version="1" comment="texlive-phfthm is &lt;2021.186.1.0svn41871-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919080" version="1" comment="texlive-phfthm-doc is &lt;2021.186.1.0svn41871-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919081" version="1" comment="texlive-philex is &lt;2021.186.1.3svn36396-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919082" version="1" comment="texlive-philex-doc is &lt;2021.186.1.3svn36396-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919083" version="1" comment="texlive-philokalia is &lt;2021.186.1.2svn45356-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919084" version="1" comment="texlive-philokalia-doc is &lt;2021.186.1.2svn45356-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919085" version="1" comment="texlive-philokalia-fonts is &lt;2021.186.1.2svn45356-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919086" version="1" comment="texlive-philosophersimprint is &lt;2021.186.1.5svn56954-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919087" version="1" comment="texlive-philosophersimprint-doc is &lt;2021.186.1.5svn56954-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919088" version="1" comment="texlive-phonenumbers is &lt;2021.186.2.2svn51933-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919089" version="1" comment="texlive-phonenumbers-doc is &lt;2021.186.2.2svn51933-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919090" version="1" comment="texlive-phonetic is &lt;2021.186.svn56468-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919091" version="1" comment="texlive-phonetic-doc is &lt;2021.186.svn56468-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919092" version="1" comment="texlive-phonrule is &lt;2021.186.1.3.2svn43963-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919093" version="1" comment="texlive-phonrule-doc is &lt;2021.186.1.3.2svn43963-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919094" version="1" comment="texlive-photo is &lt;2021.186.svn18739-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919095" version="1" comment="texlive-photo-doc is &lt;2021.186.svn18739-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919096" version="1" comment="texlive-physconst is &lt;2021.186.1.1.2svn58727-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919097" version="1" comment="texlive-physconst-doc is &lt;2021.186.1.1.2svn58727-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919098" version="1" comment="texlive-physics is &lt;2021.186.1.3svn28590-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919099" version="1" comment="texlive-physics-doc is &lt;2021.186.1.3svn28590-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919100" version="1" comment="texlive-physunits is &lt;2021.186.1.2.0svn58728-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919101" version="1" comment="texlive-physunits-doc is &lt;2021.186.1.2.0svn58728-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919102" version="1" comment="texlive-piano is &lt;2021.186.1.0svn21574-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919103" version="1" comment="texlive-piano-doc is &lt;2021.186.1.0svn21574-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919104" version="1" comment="texlive-picinpar is &lt;2021.186.1.2asvn57349-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919105" version="1" comment="texlive-picinpar-doc is &lt;2021.186.1.2asvn57349-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919106" version="1" comment="texlive-pict2e is &lt;2021.186.0.0.4bsvn56504-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919107" version="1" comment="texlive-pict2e-doc is &lt;2021.186.0.0.4bsvn56504-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919108" version="1" comment="texlive-pictex is &lt;2021.186.1.1svn21943-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919109" version="1" comment="texlive-pictex-doc is &lt;2021.186.1.1svn21943-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919110" version="1" comment="texlive-pictex2 is &lt;2021.186.svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919111" version="1" comment="texlive-pictexsum is &lt;2021.186.svn24965-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919112" version="1" comment="texlive-picture is &lt;2021.186.1.6svn54867-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919113" version="1" comment="texlive-picture-doc is &lt;2021.186.1.6svn54867-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919114" version="1" comment="texlive-piechartmp is &lt;2021.186.0.0.3.0svn19440-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919115" version="1" comment="texlive-piechartmp-doc is &lt;2021.186.0.0.3.0svn19440-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919116" version="1" comment="texlive-piff is &lt;2021.186.svn21894-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919117" version="1" comment="texlive-piff-doc is &lt;2021.186.svn21894-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919118" version="1" comment="texlive-pigpen is &lt;2021.186.0.0.2svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919119" version="1" comment="texlive-pigpen-doc is &lt;2021.186.0.0.2svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919120" version="1" comment="texlive-pigpen-fonts is &lt;2021.186.0.0.2svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919121" version="1" comment="texlive-pinlabel is &lt;2021.186.1.2svn24769-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919122" version="1" comment="texlive-pinlabel-doc is &lt;2021.186.1.2svn24769-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919123" version="1" comment="texlive-pinoutikz is &lt;2021.186.1.1.2svn55966-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919124" version="1" comment="texlive-pinoutikz-doc is &lt;2021.186.1.1.2svn55966-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919125" version="1" comment="texlive-pitex is &lt;2021.186.svn24731-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919126" version="1" comment="texlive-pitex-doc is &lt;2021.186.svn24731-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919127" version="1" comment="texlive-pittetd is &lt;2021.186.1.618svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919128" version="1" comment="texlive-pittetd-doc is &lt;2021.186.1.618svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919129" version="1" comment="texlive-pixelart is &lt;2021.186.0.0.2.0svn57508-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919130" version="1" comment="texlive-pixelart-doc is &lt;2021.186.0.0.2.0svn57508-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919131" version="1" comment="texlive-pkfix is &lt;2021.186.1.7svn26032-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919132" version="1" comment="texlive-pkfix-doc is &lt;2021.186.1.7svn26032-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919133" version="1" comment="texlive-pkfix-helper is &lt;2021.186.1.6svn56061-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919134" version="1" comment="texlive-pkfix-helper-doc is &lt;2021.186.1.6svn56061-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919135" version="1" comment="texlive-pkgloader is &lt;2021.186.0.0.7.0svn47486-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919136" version="1" comment="texlive-pkgloader-doc is &lt;2021.186.0.0.7.0svn47486-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919137" version="1" comment="texlive-pkuthss is &lt;2021.186.1.9.0svn58729-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919138" version="1" comment="texlive-pkuthss-doc is &lt;2021.186.1.9.0svn58729-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919139" version="1" comment="texlive-pl is &lt;2021.186.1.09asvn58661-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919140" version="1" comment="texlive-pl-doc is &lt;2021.186.1.09asvn58661-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919141" version="1" comment="texlive-pl-fonts is &lt;2021.186.1.09asvn58661-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919142" version="1" comment="texlive-placeat is &lt;2021.186.0.0.1d1svn45145-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919143" version="1" comment="texlive-placeat-doc is &lt;2021.186.0.0.1d1svn45145-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919144" version="1" comment="texlive-placeins is &lt;2021.186.2.2svn19848-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919145" version="1" comment="texlive-placeins-doc is &lt;2021.186.2.2svn19848-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919146" version="1" comment="texlive-placeins-plain is &lt;2021.186.2.0svn15878-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919147" version="1" comment="texlive-plain is &lt;2021.186.3.141592653svn57963-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919148" version="1" comment="texlive-plain-doc is &lt;2021.186.svn28424-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919149" version="1" comment="texlive-plainpkg is &lt;2021.186.0.0.4asvn27765-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919150" version="1" comment="texlive-plainpkg-doc is &lt;2021.186.0.0.4asvn27765-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919151" version="1" comment="texlive-plainyr is &lt;2021.186.svn52783-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919152" version="1" comment="texlive-plantslabels is &lt;2021.186.1.0svn29803-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919153" version="1" comment="texlive-plantslabels-doc is &lt;2021.186.1.0svn29803-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919154" version="1" comment="texlive-plantuml is &lt;2021.186.0.0.3.1svn55214-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919155" version="1" comment="texlive-plantuml-doc is &lt;2021.186.0.0.3.1svn55214-44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919156" version="1" comment="texlive-plari is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919157" version="1" comment="texlive-plari-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919158" version="1" comment="texlive-plates is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919159" version="1" comment="texlive-plates-doc is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919160" version="1" comment="texlive-platex is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919161" version="1" comment="texlive-platex-doc is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919162" version="1" comment="texlive-platex-tools is &lt;2021.186.svn57729-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919163" version="1" comment="texlive-platex-tools-doc is &lt;2021.186.svn57729-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919164" version="1" comment="texlive-platexcheat is &lt;2021.186.3.1svn49557-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919165" version="1" comment="texlive-plautopatch is &lt;2021.186.0.0.9nsvn57731-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919166" version="1" comment="texlive-plautopatch-doc is &lt;2021.186.0.0.9nsvn57731-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919167" version="1" comment="texlive-play is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919168" version="1" comment="texlive-play-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919169" version="1" comment="texlive-playfair is &lt;2021.186.svn56005-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919170" version="1" comment="texlive-playfair-doc is &lt;2021.186.svn56005-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919171" version="1" comment="texlive-playfair-fonts is &lt;2021.186.svn56005-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919172" version="1" comment="texlive-plex is &lt;2021.186.svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919173" version="1" comment="texlive-plex-doc is &lt;2021.186.svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919174" version="1" comment="texlive-plex-fonts is &lt;2021.186.svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919175" version="1" comment="texlive-plex-otf is &lt;2021.186.0.0.07asvn47562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919176" version="1" comment="texlive-plex-otf-doc is &lt;2021.186.0.0.07asvn47562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919177" version="1" comment="texlive-plimsoll is &lt;2021.186.1svn56605-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919178" version="1" comment="texlive-plimsoll-doc is &lt;2021.186.1svn56605-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919179" version="1" comment="texlive-plimsoll-fonts is &lt;2021.186.1svn56605-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919180" version="1" comment="texlive-plipsum is &lt;2021.186.4.3svn30353-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919181" version="1" comment="texlive-plipsum-doc is &lt;2021.186.4.3svn30353-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919182" version="1" comment="texlive-plnfss is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919183" version="1" comment="texlive-plnfss-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919184" version="1" comment="texlive-plstmary is &lt;2021.186.0.0.5csvn31088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919185" version="1" comment="texlive-plstmary-doc is &lt;2021.186.0.0.5csvn31088-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919186" version="1" comment="texlive-plweb is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919187" version="1" comment="texlive-plweb-doc is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919188" version="1" comment="texlive-pm-isomath is &lt;2021.186.1.0.07svn56868-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919189" version="1" comment="texlive-pm-isomath-doc is &lt;2021.186.1.0.07svn56868-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919190" version="1" comment="texlive-pmboxdraw is &lt;2021.186.1.4svn53046-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919191" version="1" comment="texlive-pmboxdraw-doc is &lt;2021.186.1.4svn53046-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919192" version="1" comment="texlive-pmgraph is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919193" version="1" comment="texlive-pmgraph-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919194" version="1" comment="texlive-pmhanguljamo is &lt;2021.186.0.0.3.4svn54378-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919195" version="1" comment="texlive-pmhanguljamo-doc is &lt;2021.186.0.0.3.4svn54378-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919196" version="1" comment="texlive-pmx is &lt;2021.186.2.94asvn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919197" version="1" comment="texlive-pmx-doc is &lt;2021.186.2.94asvn57672-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919198" version="1" comment="texlive-pmxchords is &lt;2021.186.2.0.2svn39249-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919199" version="1" comment="texlive-pmxchords-doc is &lt;2021.186.2.0.2svn39249-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919200" version="1" comment="texlive-pnas2009 is &lt;2021.186.1.0svn16287-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919201" version="1" comment="texlive-poemscol is &lt;2021.186.3.1415926svn56082-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919202" version="1" comment="texlive-poemscol-doc is &lt;2021.186.3.1415926svn56082-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919203" version="1" comment="texlive-poetry is &lt;2021.186.2.2svn53129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919204" version="1" comment="texlive-poetry-doc is &lt;2021.186.2.2svn53129-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919205" version="1" comment="texlive-poetrytex is &lt;2021.186.3.0.1svn39921-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919206" version="1" comment="texlive-poetrytex-doc is &lt;2021.186.3.0.1svn39921-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919207" version="1" comment="texlive-poiretone is &lt;2021.186.svn56070-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919208" version="1" comment="texlive-poiretone-doc is &lt;2021.186.svn56070-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919209" version="1" comment="texlive-poiretone-fonts is &lt;2021.186.svn56070-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919210" version="1" comment="texlive-polexpr is &lt;2021.186.0.0.7.5svn53633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919211" version="1" comment="texlive-polexpr-doc is &lt;2021.186.0.0.7.5svn53633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919212" version="1" comment="texlive-polski is &lt;2021.186.1.3.4svn44213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919213" version="1" comment="texlive-polski-doc is &lt;2021.186.1.3.4svn44213-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919214" version="1" comment="texlive-poltawski is &lt;2021.186.1.101svn20075-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919215" version="1" comment="texlive-poltawski-doc is &lt;2021.186.1.101svn20075-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919216" version="1" comment="texlive-poltawski-fonts is &lt;2021.186.1.101svn20075-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919217" version="1" comment="texlive-polyglossia is &lt;2021.186.1.52svn58444-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919218" version="1" comment="texlive-polyglossia-doc is &lt;2021.186.1.52svn58444-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919219" version="1" comment="texlive-polynom is &lt;2021.186.0.0.19svn44832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919220" version="1" comment="texlive-polynom-doc is &lt;2021.186.0.0.19svn44832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919221" version="1" comment="texlive-polynomial is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919222" version="1" comment="texlive-polynomial-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919223" version="1" comment="texlive-polytable is &lt;2021.186.0.0.8.6svn55837-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919224" version="1" comment="texlive-polytable-doc is &lt;2021.186.0.0.8.6svn55837-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919225" version="1" comment="texlive-poormanlog is &lt;2021.186.0.0.05svn52080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919226" version="1" comment="texlive-poormanlog-doc is &lt;2021.186.0.0.05svn52080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919227" version="1" comment="texlive-postage is &lt;2021.186.1.0svn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919228" version="1" comment="texlive-postage-doc is &lt;2021.186.1.0svn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919229" version="1" comment="texlive-postcards is &lt;2021.186.svn21641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919230" version="1" comment="texlive-postcards-doc is &lt;2021.186.svn21641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919231" version="1" comment="texlive-poster-mac is &lt;2021.186.1.1svn18305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919232" version="1" comment="texlive-poster-mac-doc is &lt;2021.186.1.1svn18305-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919233" version="1" comment="texlive-powerdot is &lt;2021.186.1.6svn58730-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919234" version="1" comment="texlive-powerdot-doc is &lt;2021.186.1.6svn58730-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919235" version="1" comment="texlive-powerdot-fuberlin is &lt;2021.186.0.0.02asvn52922-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919236" version="1" comment="texlive-powerdot-fuberlin-doc is &lt;2021.186.0.0.02asvn52922-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919237" version="1" comment="texlive-powerdot-tuliplab is &lt;2021.186.1.0.0svn47963-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919238" version="1" comment="texlive-powerdot-tuliplab-doc is &lt;2021.186.1.0.0svn47963-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919239" version="1" comment="texlive-ppr-prv is &lt;2021.186.0.0.13csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919240" version="1" comment="texlive-ppr-prv-doc is &lt;2021.186.0.0.13csvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919241" version="1" comment="texlive-pracjourn is &lt;2021.186.0.0.4nsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919242" version="1" comment="texlive-pracjourn-doc is &lt;2021.186.0.0.4nsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919243" version="1" comment="texlive-practicalreports is &lt;2021.186.2.0.3svn52312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919244" version="1" comment="texlive-practicalreports-doc is &lt;2021.186.2.0.3svn52312-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919245" version="1" comment="texlive-prelim2e is &lt;2021.186.2.00svn57000-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919246" version="1" comment="texlive-prelim2e-doc is &lt;2021.186.2.00svn57000-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919247" version="1" comment="texlive-preprint is &lt;2021.186.2011svn30447-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919248" version="1" comment="texlive-preprint-doc is &lt;2021.186.2011svn30447-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919249" version="1" comment="texlive-prerex is &lt;2021.186.svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919250" version="1" comment="texlive-prerex-doc is &lt;2021.186.svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919251" version="1" comment="texlive-present is &lt;2021.186.2.2.1svn50048-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919252" version="1" comment="texlive-present-doc is &lt;2021.186.2.2.1svn50048-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919253" version="1" comment="texlive-pressrelease is &lt;2021.186.1.0svn35147-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919254" version="1" comment="texlive-pressrelease-doc is &lt;2021.186.1.0svn35147-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919255" version="1" comment="texlive-prettyref is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919256" version="1" comment="texlive-prettyref-doc is &lt;2021.186.3.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919257" version="1" comment="texlive-preview is &lt;2021.186.12.3svn56708-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919258" version="1" comment="texlive-preview-doc is &lt;2021.186.12.3svn56708-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919259" version="1" comment="texlive-prftree is &lt;2021.186.1.6svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919260" version="1" comment="texlive-prftree-doc is &lt;2021.186.1.6svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919261" version="1" comment="texlive-principia is &lt;2021.186.1.2svn57902-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919262" version="1" comment="texlive-principia-doc is &lt;2021.186.1.2svn57902-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919263" version="1" comment="texlive-printlen is &lt;2021.186.1.1asvn19847-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919264" version="1" comment="texlive-printlen-doc is &lt;2021.186.1.1asvn19847-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919265" version="1" comment="texlive-proba is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919266" version="1" comment="texlive-proba-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919267" version="1" comment="texlive-probsoln is &lt;2021.186.3.05svn44783-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919268" version="1" comment="texlive-probsoln-doc is &lt;2021.186.3.05svn44783-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919269" version="1" comment="texlive-procIAGssymp is &lt;2021.186.svn51771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919270" version="1" comment="texlive-procIAGssymp-doc is &lt;2021.186.svn51771-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919271" version="1" comment="texlive-prodint is &lt;2021.186.svn21893-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919272" version="1" comment="texlive-prodint-doc is &lt;2021.186.svn21893-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919273" version="1" comment="texlive-prodint-fonts is &lt;2021.186.svn21893-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919274" version="1" comment="texlive-productbox is &lt;2021.186.1.1svn20886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919275" version="1" comment="texlive-productbox-doc is &lt;2021.186.1.1svn20886-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919276" version="1" comment="texlive-profcollege is &lt;2021.186.0.0.98svn58710-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919277" version="1" comment="texlive-profcollege-doc is &lt;2021.186.0.0.98svn58710-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919278" version="1" comment="texlive-program is &lt;2021.186.3.3.14svn44214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919279" version="1" comment="texlive-program-doc is &lt;2021.186.3.3.14svn44214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919280" version="1" comment="texlive-progress is &lt;2021.186.1.10svn19519-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919281" version="1" comment="texlive-progress-doc is &lt;2021.186.1.10svn19519-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919282" version="1" comment="texlive-progressbar is &lt;2021.186.1.0b_4svn33822-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919283" version="1" comment="texlive-progressbar-doc is &lt;2021.186.1.0b_4svn33822-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919284" version="1" comment="texlive-proof-at-the-end is &lt;2021.186.svn51194-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919285" version="1" comment="texlive-proof-at-the-end-doc is &lt;2021.186.svn51194-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919286" version="1" comment="texlive-proofread is &lt;2021.186.1.04svn50938-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919287" version="1" comment="texlive-proofread-doc is &lt;2021.186.1.04svn50938-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919288" version="1" comment="texlive-prooftrees is &lt;2021.186.0.0.7_svn_8641svn52221-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919289" version="1" comment="texlive-prooftrees-doc is &lt;2021.186.0.0.7_svn_8641svn52221-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919290" version="1" comment="texlive-properties is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919291" version="1" comment="texlive-properties-doc is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919292" version="1" comment="texlive-proposal is &lt;2021.186.svn40538-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919293" version="1" comment="texlive-proposal-doc is &lt;2021.186.svn40538-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919294" version="1" comment="texlive-prosper is &lt;2021.186.1.0hsvn33033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919295" version="1" comment="texlive-prosper-doc is &lt;2021.186.1.0hsvn33033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919296" version="1" comment="texlive-protex is &lt;2021.186.svn41633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919297" version="1" comment="texlive-protex-doc is &lt;2021.186.svn41633-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919298" version="1" comment="texlive-protocol is &lt;2021.186.1.13svn25562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919299" version="1" comment="texlive-protocol-doc is &lt;2021.186.1.13svn25562-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919300" version="1" comment="texlive-prtec is &lt;2021.186.1.06svn51919-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919301" version="1" comment="texlive-prtec-doc is &lt;2021.186.1.06svn51919-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919302" version="1" comment="texlive-przechlewski-book is &lt;2021.186.svn23552-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919303" version="1" comment="texlive-przechlewski-book-doc is &lt;2021.186.svn23552-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919304" version="1" comment="texlive-ps2eps is &lt;2021.186.1.68svn53559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919305" version="1" comment="texlive-ps2eps-doc is &lt;2021.186.1.68svn53559-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919306" version="1" comment="texlive-ps2pk is &lt;2021.186.svn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919307" version="1" comment="texlive-psbao is &lt;2021.186.1.0svn55013-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919308" version="1" comment="texlive-psbao-doc is &lt;2021.186.1.0svn55013-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919309" version="1" comment="texlive-pseudo is &lt;2021.186.1.1.3svn52582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919310" version="1" comment="texlive-pseudo-doc is &lt;2021.186.1.1.3svn52582-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919311" version="1" comment="texlive-pseudocode is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919312" version="1" comment="texlive-pseudocode-doc is &lt;2021.186.svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919313" version="1" comment="texlive-psfrag is &lt;2021.186.3.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919314" version="1" comment="texlive-psfrag-doc is &lt;2021.186.3.04svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919315" version="1" comment="texlive-psfrag-italian is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919316" version="1" comment="texlive-psfragx is &lt;2021.186.1.1svn26243-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919317" version="1" comment="texlive-psfragx-doc is &lt;2021.186.1.1svn26243-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919318" version="1" comment="texlive-psgo is &lt;2021.186.0.0.17svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919319" version="1" comment="texlive-psgo-doc is &lt;2021.186.0.0.17svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919320" version="1" comment="texlive-psizzl is &lt;2021.186.0.0.35svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919321" version="1" comment="texlive-psizzl-doc is &lt;2021.186.0.0.35svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919322" version="1" comment="texlive-pslatex is &lt;2021.186.1.3svn57434-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919323" version="1" comment="texlive-psnfss is &lt;2021.186.9.3svn54694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919324" version="1" comment="texlive-psnfss-doc is &lt;2021.186.9.3svn54694-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919325" version="1" comment="texlive-pspicture is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919326" version="1" comment="texlive-pspicture-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919327" version="1" comment="texlive-pst-2dplot is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919328" version="1" comment="texlive-pst-2dplot-doc is &lt;2021.186.1.5svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919329" version="1" comment="texlive-pst-3d is &lt;2021.186.1.10svn17257-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919330" version="1" comment="texlive-pst-3d-doc is &lt;2021.186.1.10svn17257-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919331" version="1" comment="texlive-pst-3dplot is &lt;2021.186.2.06svn56758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919332" version="1" comment="texlive-pst-3dplot-doc is &lt;2021.186.2.06svn56758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919333" version="1" comment="texlive-pst-abspos is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919334" version="1" comment="texlive-pst-abspos-doc is &lt;2021.186.0.0.2svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919335" version="1" comment="texlive-pst-am is &lt;2021.186.1.02svn19591-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919336" version="1" comment="texlive-pst-am-doc is &lt;2021.186.1.02svn19591-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919337" version="1" comment="texlive-pst-antiprism is &lt;2021.186.0.0.02svn46643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919338" version="1" comment="texlive-pst-antiprism-doc is &lt;2021.186.0.0.02svn46643-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919339" version="1" comment="texlive-pst-arrow is &lt;2021.186.0.0.01svn41980-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919340" version="1" comment="texlive-pst-arrow-doc is &lt;2021.186.0.0.01svn41980-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919341" version="1" comment="texlive-pst-asr is &lt;2021.186.1.3svn22138-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919342" version="1" comment="texlive-pst-asr-doc is &lt;2021.186.1.3svn22138-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919343" version="1" comment="texlive-pst-bar is &lt;2021.186.0.0.92svn18734-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919344" version="1" comment="texlive-pst-bar-doc is &lt;2021.186.0.0.92svn18734-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919345" version="1" comment="texlive-pst-barcode is &lt;2021.186.0.0.18svn45096-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919346" version="1" comment="texlive-pst-barcode-doc is &lt;2021.186.0.0.18svn45096-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919347" version="1" comment="texlive-pst-bezier is &lt;2021.186.0.0.03svn41981-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919348" version="1" comment="texlive-pst-bezier-doc is &lt;2021.186.0.0.03svn41981-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919349" version="1" comment="texlive-pst-blur is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919350" version="1" comment="texlive-pst-blur-doc is &lt;2021.186.2.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919351" version="1" comment="texlive-pst-bspline is &lt;2021.186.1.62svn40685-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919352" version="1" comment="texlive-pst-bspline-doc is &lt;2021.186.1.62svn40685-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919353" version="1" comment="texlive-pst-calculate is &lt;2021.186.0.0.02svn49817-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919354" version="1" comment="texlive-pst-calculate-doc is &lt;2021.186.0.0.02svn49817-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919355" version="1" comment="texlive-pst-calendar is &lt;2021.186.0.0.47svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919356" version="1" comment="texlive-pst-calendar-doc is &lt;2021.186.0.0.47svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919357" version="1" comment="texlive-pst-cie is &lt;2021.186.1.06asvn49422-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919358" version="1" comment="texlive-pst-cie-doc is &lt;2021.186.1.06asvn49422-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919359" version="1" comment="texlive-pst-circ is &lt;2021.186.2.17svn55289-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919360" version="1" comment="texlive-pst-circ-doc is &lt;2021.186.2.17svn55289-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919361" version="1" comment="texlive-pst-coil is &lt;2021.186.1.07svn37377-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919362" version="1" comment="texlive-pst-coil-doc is &lt;2021.186.1.07svn37377-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919363" version="1" comment="texlive-pst-contourplot is &lt;2021.186.0.0.6svn48230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919364" version="1" comment="texlive-pst-contourplot-doc is &lt;2021.186.0.0.6svn48230-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919365" version="1" comment="texlive-pst-cox is &lt;2021.186.0.0.98_betasvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919366" version="1" comment="texlive-pst-cox-doc is &lt;2021.186.0.0.98_betasvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919367" version="1" comment="texlive-pst-dart is &lt;2021.186.0.0.02svn46579-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919368" version="1" comment="texlive-pst-dart-doc is &lt;2021.186.0.0.02svn46579-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919369" version="1" comment="texlive-pst-dbicons is &lt;2021.186.0.0.16svn17556-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919370" version="1" comment="texlive-pst-dbicons-doc is &lt;2021.186.0.0.16svn17556-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919371" version="1" comment="texlive-pst-diffraction is &lt;2021.186.2.03svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919372" version="1" comment="texlive-pst-diffraction-doc is &lt;2021.186.2.03svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919373" version="1" comment="texlive-pst-electricfield is &lt;2021.186.0.0.14svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919374" version="1" comment="texlive-pst-electricfield-doc is &lt;2021.186.0.0.14svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919375" version="1" comment="texlive-pst-eps is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919376" version="1" comment="texlive-pst-eps-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919377" version="1" comment="texlive-pst-eucl is &lt;2021.186.1.75svn56474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919378" version="1" comment="texlive-pst-eucl-doc is &lt;2021.186.1.75svn56474-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919379" version="1" comment="texlive-pst-eucl-translation-bg is &lt;2021.186.1.3.2svn19296-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919380" version="1" comment="texlive-pst-exa is &lt;2021.186.0.0.06svn45289-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919381" version="1" comment="texlive-pst-exa-doc is &lt;2021.186.0.0.06svn45289-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919382" version="1" comment="texlive-pst-feyn is &lt;2021.186.0.0.01svn48781-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919383" version="1" comment="texlive-pst-feyn-doc is &lt;2021.186.0.0.01svn48781-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919384" version="1" comment="texlive-pst-fill is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919385" version="1" comment="texlive-pst-fill-doc is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919386" version="1" comment="texlive-pst-fit is &lt;2021.186.0.0.02svn45109-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919387" version="1" comment="texlive-pst-fit-doc is &lt;2021.186.0.0.02svn45109-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919388" version="1" comment="texlive-pst-fr3d is &lt;2021.186.1.10svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919389" version="1" comment="texlive-pst-fr3d-doc is &lt;2021.186.1.10svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919390" version="1" comment="texlive-pst-fractal is &lt;2021.186.0.0.11asvn54376-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919391" version="1" comment="texlive-pst-fractal-doc is &lt;2021.186.0.0.11asvn54376-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919392" version="1" comment="texlive-pst-fun is &lt;2021.186.0.0.04svn17909-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919393" version="1" comment="texlive-pst-fun-doc is &lt;2021.186.0.0.04svn17909-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919394" version="1" comment="texlive-pst-func is &lt;2021.186.0.0.95svn55439-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919395" version="1" comment="texlive-pst-func-doc is &lt;2021.186.0.0.95svn55439-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919396" version="1" comment="texlive-pst-gantt is &lt;2021.186.0.0.22asvn35832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919397" version="1" comment="texlive-pst-gantt-doc is &lt;2021.186.0.0.22asvn35832-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919398" version="1" comment="texlive-pst-geo is &lt;2021.186.0.0.06svn46273-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919399" version="1" comment="texlive-pst-geo-doc is &lt;2021.186.0.0.06svn46273-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919400" version="1" comment="texlive-pst-geometrictools is &lt;2021.186.1.1svn45319-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919401" version="1" comment="texlive-pst-geometrictools-doc is &lt;2021.186.1.1svn45319-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919402" version="1" comment="texlive-pst-ghsb is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919403" version="1" comment="texlive-pst-ghsb-doc is &lt;2021.186.svn54074-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919404" version="1" comment="texlive-pst-gr3d is &lt;2021.186.1.34svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919405" version="1" comment="texlive-pst-gr3d-doc is &lt;2021.186.1.34svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919406" version="1" comment="texlive-pst-grad is &lt;2021.186.1.06svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919407" version="1" comment="texlive-pst-grad-doc is &lt;2021.186.1.06svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919408" version="1" comment="texlive-pst-graphicx is &lt;2021.186.0.0.02svn21717-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919409" version="1" comment="texlive-pst-graphicx-doc is &lt;2021.186.0.0.02svn21717-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919410" version="1" comment="texlive-pst-infixplot is &lt;2021.186.0.0.11svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919411" version="1" comment="texlive-pst-infixplot-doc is &lt;2021.186.0.0.11svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919412" version="1" comment="texlive-pst-intersect is &lt;2021.186.0.0.4svn33210-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919413" version="1" comment="texlive-pst-intersect-doc is &lt;2021.186.0.0.4svn33210-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919414" version="1" comment="texlive-pst-jtree is &lt;2021.186.2.6svn20946-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919415" version="1" comment="texlive-pst-jtree-doc is &lt;2021.186.2.6svn20946-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919416" version="1" comment="texlive-pst-knot is &lt;2021.186.0.0.2svn16033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919417" version="1" comment="texlive-pst-knot-doc is &lt;2021.186.0.0.2svn16033-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919418" version="1" comment="texlive-pst-labo is &lt;2021.186.2.04svn39077-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919419" version="1" comment="texlive-pst-labo-doc is &lt;2021.186.2.04svn39077-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919420" version="1" comment="texlive-pst-layout is &lt;2021.186.0.0.95svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919421" version="1" comment="texlive-pst-layout-doc is &lt;2021.186.0.0.95svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919422" version="1" comment="texlive-pst-lens is &lt;2021.186.1.02svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919423" version="1" comment="texlive-pst-lens-doc is &lt;2021.186.1.02svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919424" version="1" comment="texlive-pst-light3d is &lt;2021.186.0.0.12svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919425" version="1" comment="texlive-pst-light3d-doc is &lt;2021.186.0.0.12svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919426" version="1" comment="texlive-pst-lsystem is &lt;2021.186.0.0.02svn49556-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919427" version="1" comment="texlive-pst-lsystem-doc is &lt;2021.186.0.0.02svn49556-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919428" version="1" comment="texlive-pst-magneticfield is &lt;2021.186.1.16svn49780-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919429" version="1" comment="texlive-pst-magneticfield-doc is &lt;2021.186.1.16svn49780-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919430" version="1" comment="texlive-pst-marble is &lt;2021.186.1.6svn50925-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919431" version="1" comment="texlive-pst-marble-doc is &lt;2021.186.1.6svn50925-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919432" version="1" comment="texlive-pst-math is &lt;2021.186.0.0.65svn49425-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919433" version="1" comment="texlive-pst-math-doc is &lt;2021.186.0.0.65svn49425-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919434" version="1" comment="texlive-pst-mirror is &lt;2021.186.1.01svn32997-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919435" version="1" comment="texlive-pst-mirror-doc is &lt;2021.186.1.01svn32997-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919436" version="1" comment="texlive-pst-moire is &lt;2021.186.2.1svn49223-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919437" version="1" comment="texlive-pst-moire-doc is &lt;2021.186.2.1svn49223-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919438" version="1" comment="texlive-pst-node is &lt;2021.186.1.42asvn54687-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919439" version="1" comment="texlive-pst-node-doc is &lt;2021.186.1.42asvn54687-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919440" version="1" comment="texlive-pst-ob3d is &lt;2021.186.0.0.22svn54514-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919441" version="1" comment="texlive-pst-ob3d-doc is &lt;2021.186.0.0.22svn54514-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919442" version="1" comment="texlive-pst-ode is &lt;2021.186.0.0.15svn58293-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919443" version="1" comment="texlive-pst-ode-doc is &lt;2021.186.0.0.15svn58293-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919444" version="1" comment="texlive-pst-optexp is &lt;2021.186.6.0svn57977-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919445" version="1" comment="texlive-pst-optexp-doc is &lt;2021.186.6.0svn57977-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919446" version="1" comment="texlive-pst-optic is &lt;2021.186.1.02svn41999-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919447" version="1" comment="texlive-pst-optic-doc is &lt;2021.186.1.02svn41999-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919448" version="1" comment="texlive-pst-osci is &lt;2021.186.2.82svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919449" version="1" comment="texlive-pst-osci-doc is &lt;2021.186.2.82svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919450" version="1" comment="texlive-pst-ovl is &lt;2021.186.0.0.07bsvn54963-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919451" version="1" comment="texlive-pst-ovl-doc is &lt;2021.186.0.0.07bsvn54963-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919452" version="1" comment="texlive-pst-pad is &lt;2021.186.0.0.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919453" version="1" comment="texlive-pst-pad-doc is &lt;2021.186.0.0.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919454" version="1" comment="texlive-pst-pdf is &lt;2021.186.1.2fsvn56622-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919455" version="1" comment="texlive-pst-pdf-doc is &lt;2021.186.1.2fsvn56622-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919456" version="1" comment="texlive-pst-pdgr is &lt;2021.186.0.0.4svn45875-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919457" version="1" comment="texlive-pst-pdgr-doc is &lt;2021.186.0.0.4svn45875-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919458" version="1" comment="texlive-pst-perspective is &lt;2021.186.1.05svn39585-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919459" version="1" comment="texlive-pst-perspective-doc is &lt;2021.186.1.05svn39585-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919460" version="1" comment="texlive-pst-platon is &lt;2021.186.0.0.01svn16538-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919461" version="1" comment="texlive-pst-platon-doc is &lt;2021.186.0.0.01svn16538-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919462" version="1" comment="texlive-pst-plot is &lt;2021.186.1.92svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919463" version="1" comment="texlive-pst-plot-doc is &lt;2021.186.1.92svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919464" version="1" comment="texlive-pst-poker is &lt;2021.186.0.0.03asvn53482-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919465" version="1" comment="texlive-pst-poker-doc is &lt;2021.186.0.0.03asvn53482-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919466" version="1" comment="texlive-pst-poly is &lt;2021.186.1.63svn35062-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919467" version="1" comment="texlive-pst-poly-doc is &lt;2021.186.1.63svn35062-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919468" version="1" comment="texlive-pst-pulley is &lt;2021.186.0.0.02svn45316-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919469" version="1" comment="texlive-pst-pulley-doc is &lt;2021.186.0.0.02svn45316-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919470" version="1" comment="texlive-pst-qtree is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919471" version="1" comment="texlive-pst-qtree-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919472" version="1" comment="texlive-pst-rputover is &lt;2021.186.1.0svn44724-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919473" version="1" comment="texlive-pst-rputover-doc is &lt;2021.186.1.0svn44724-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919474" version="1" comment="texlive-pst-rubans is &lt;2021.186.1.2svn23464-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919475" version="1" comment="texlive-pst-rubans-doc is &lt;2021.186.1.2svn23464-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919476" version="1" comment="texlive-pst-shell is &lt;2021.186.0.0.03svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919477" version="1" comment="texlive-pst-shell-doc is &lt;2021.186.0.0.03svn56070-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919478" version="1" comment="texlive-pst-sigsys is &lt;2021.186.1.4svn21667-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919479" version="1" comment="texlive-pst-sigsys-doc is &lt;2021.186.1.4svn21667-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919480" version="1" comment="texlive-pst-slpe is &lt;2021.186.1.31svn24391-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919481" version="1" comment="texlive-pst-slpe-doc is &lt;2021.186.1.31svn24391-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919482" version="1" comment="texlive-pst-solarsystem is &lt;2021.186.0.0.13svn45097-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919483" version="1" comment="texlive-pst-solarsystem-doc is &lt;2021.186.0.0.13svn45097-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919484" version="1" comment="texlive-pst-solides3d is &lt;2021.186.4.34asvn49520-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919485" version="1" comment="texlive-pst-solides3d-doc is &lt;2021.186.4.34asvn49520-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919486" version="1" comment="texlive-pst-soroban is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919487" version="1" comment="texlive-pst-soroban-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919488" version="1" comment="texlive-pst-spectra is &lt;2021.186.0.0.91svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919489" version="1" comment="texlive-pst-spectra-doc is &lt;2021.186.0.0.91svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919490" version="1" comment="texlive-pst-spinner is &lt;2021.186.1.02svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919491" version="1" comment="texlive-pst-spinner-doc is &lt;2021.186.1.02svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919492" version="1" comment="texlive-pst-stru is &lt;2021.186.0.0.13svn38613-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919493" version="1" comment="texlive-pst-stru-doc is &lt;2021.186.0.0.13svn38613-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919494" version="1" comment="texlive-pst-support is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919495" version="1" comment="texlive-pst-text is &lt;2021.186.1.02svn49542-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919496" version="1" comment="texlive-pst-text-doc is &lt;2021.186.1.02svn49542-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919497" version="1" comment="texlive-pst-thick is &lt;2021.186.1.0svn16369-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919498" version="1" comment="texlive-pst-thick-doc is &lt;2021.186.1.0svn16369-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919499" version="1" comment="texlive-pst-tools is &lt;2021.186.0.0.10svn54518-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919500" version="1" comment="texlive-pst-tools-doc is &lt;2021.186.0.0.10svn54518-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919501" version="1" comment="texlive-pst-tree is &lt;2021.186.1.13svn43272-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919502" version="1" comment="texlive-pst-tree-doc is &lt;2021.186.1.13svn43272-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919503" version="1" comment="texlive-pst-turtle is &lt;2021.186.0.0.02svn52261-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919504" version="1" comment="texlive-pst-turtle-doc is &lt;2021.186.0.0.02svn52261-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919505" version="1" comment="texlive-pst-tvz is &lt;2021.186.1.01svn23451-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919506" version="1" comment="texlive-pst-tvz-doc is &lt;2021.186.1.01svn23451-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919507" version="1" comment="texlive-pst-uml is &lt;2021.186.0.0.83svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919508" version="1" comment="texlive-pst-uml-doc is &lt;2021.186.0.0.83svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919509" version="1" comment="texlive-pst-vectorian is &lt;2021.186.0.0.4svn28801-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919510" version="1" comment="texlive-pst-vectorian-doc is &lt;2021.186.0.0.4svn28801-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919511" version="1" comment="texlive-pst-vehicle is &lt;2021.186.1.2svn45320-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919512" version="1" comment="texlive-pst-vehicle-doc is &lt;2021.186.1.2svn45320-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919513" version="1" comment="texlive-pst-venn is &lt;2021.186.0.0.01svn49316-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919514" version="1" comment="texlive-pst-venn-doc is &lt;2021.186.0.0.01svn49316-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919515" version="1" comment="texlive-pst-vowel is &lt;2021.186.1.0svn25228-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919516" version="1" comment="texlive-pst-vowel-doc is &lt;2021.186.1.0svn25228-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919517" version="1" comment="texlive-pst2pdf is &lt;2021.186.0.0.20svn56172-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919518" version="1" comment="texlive-pst2pdf-doc is &lt;2021.186.0.0.20svn56172-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919519" version="1" comment="texlive-pstool is &lt;2021.186.1.5esvn46393-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919520" version="1" comment="texlive-pstool-doc is &lt;2021.186.1.5esvn46393-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919521" version="1" comment="texlive-pstricks is &lt;2021.186.3.01asvn58731-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919522" version="1" comment="texlive-pstricks-add is &lt;2021.186.3.89asvn53763-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919523" version="1" comment="texlive-pstricks-add-doc is &lt;2021.186.3.89asvn53763-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919524" version="1" comment="texlive-pstricks-doc is &lt;2021.186.3.01asvn58731-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919525" version="1" comment="texlive-pstricks_calcnotes is &lt;2021.186.1.2svn34363-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919526" version="1" comment="texlive-pstring is &lt;2021.186.svn42857-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919527" version="1" comment="texlive-pstring-doc is &lt;2021.186.svn42857-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919528" version="1" comment="texlive-ptex is &lt;2021.186.svn57972-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919529" version="1" comment="texlive-ptex-base is &lt;2021.186.svn56487-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919530" version="1" comment="texlive-ptex-base-doc is &lt;2021.186.svn56487-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919531" version="1" comment="texlive-ptex-fontmaps is &lt;2021.186.20201227.0svn57239-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919532" version="1" comment="texlive-ptex-fontmaps-doc is &lt;2021.186.20201227.0svn57239-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919533" version="1" comment="texlive-ptex-fonts is &lt;2021.186.svn46940-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919534" version="1" comment="texlive-ptex-fonts-doc is &lt;2021.186.svn46940-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919535" version="1" comment="texlive-ptex-manual is &lt;2021.186.svn57128-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919536" version="1" comment="texlive-ptex2pdf is &lt;2021.186.20200520.0svn58632-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919537" version="1" comment="texlive-ptex2pdf-doc is &lt;2021.186.20200520.0svn58632-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919538" version="1" comment="texlive-ptext is &lt;2021.186.1.1svn30171-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919539" version="1" comment="texlive-ptext-doc is &lt;2021.186.1.1svn30171-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919540" version="1" comment="texlive-ptolemaicastronomy is &lt;2021.186.1.0svn50810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919541" version="1" comment="texlive-ptolemaicastronomy-doc is &lt;2021.186.1.0svn50810-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919542" version="1" comment="texlive-ptptex is &lt;2021.186.0.0.91svn19440-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919543" version="1" comment="texlive-ptptex-doc is &lt;2021.186.0.0.91svn19440-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919544" version="1" comment="texlive-punk is &lt;2021.186.svn27388-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919545" version="1" comment="texlive-punk-doc is &lt;2021.186.svn27388-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919546" version="1" comment="texlive-punk-latex is &lt;2021.186.1.1svn27389-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919547" version="1" comment="texlive-punk-latex-doc is &lt;2021.186.1.1svn27389-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919548" version="1" comment="texlive-punknova is &lt;2021.186.1.003svn24649-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919549" version="1" comment="texlive-punknova-doc is &lt;2021.186.1.003svn24649-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919550" version="1" comment="texlive-punknova-fonts is &lt;2021.186.1.003svn24649-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919551" version="1" comment="texlive-purifyeps is &lt;2021.186.1.1svn29725-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919552" version="1" comment="texlive-purifyeps-doc is &lt;2021.186.1.1svn29725-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919553" version="1" comment="texlive-puyotikz is &lt;2021.186.1.0.1svn57254-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919554" version="1" comment="texlive-puyotikz-doc is &lt;2021.186.1.0.1svn57254-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919555" version="1" comment="texlive-pwebmac is &lt;2021.186.4.6.2svn58478-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919556" version="1" comment="texlive-pwebmac-doc is &lt;2021.186.4.6.2svn58478-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919557" version="1" comment="texlive-pxbase is &lt;2021.186.1.1bsvn44756-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919558" version="1" comment="texlive-pxbase-doc is &lt;2021.186.1.1bsvn44756-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919559" version="1" comment="texlive-pxchfon is &lt;2021.186.1.7esvn56537-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919560" version="1" comment="texlive-pxchfon-doc is &lt;2021.186.1.7esvn56537-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919561" version="1" comment="texlive-pxcjkcat is &lt;2021.186.1.1svn47266-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919562" version="1" comment="texlive-pxcjkcat-doc is &lt;2021.186.1.1svn47266-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919563" version="1" comment="texlive-pxfonts is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919564" version="1" comment="texlive-pxfonts-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919565" version="1" comment="texlive-pxfonts-fonts is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919566" version="1" comment="texlive-pxgreeks is &lt;2021.186.1.0svn21838-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919567" version="1" comment="texlive-pxgreeks-doc is &lt;2021.186.1.0svn21838-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919568" version="1" comment="texlive-pxjahyper is &lt;2021.186.0.0.7bsvn57950-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919569" version="1" comment="texlive-pxjahyper-doc is &lt;2021.186.0.0.7bsvn57950-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919570" version="1" comment="texlive-pxjodel is &lt;2021.186.0.0.3svn55006-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919571" version="1" comment="texlive-pxjodel-doc is &lt;2021.186.0.0.3svn55006-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919572" version="1" comment="texlive-pxpgfmark is &lt;2021.186.0.0.2svn30212-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919573" version="1" comment="texlive-pxpgfmark-doc is &lt;2021.186.0.0.2svn30212-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919574" version="1" comment="texlive-pxpic is &lt;2021.186.1.2svn57445-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919575" version="1" comment="texlive-pxpic-doc is &lt;2021.186.1.2svn57445-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919576" version="1" comment="texlive-pxrubrica is &lt;2021.186.1.3dsvn58168-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919577" version="1" comment="texlive-pxrubrica-doc is &lt;2021.186.1.3dsvn58168-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919578" version="1" comment="texlive-pxtatescale is &lt;2021.186.0.0.4svn43009-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919579" version="1" comment="texlive-pxtatescale-doc is &lt;2021.186.0.0.4svn43009-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919580" version="1" comment="texlive-pxtxalfa is &lt;2021.186.1svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919581" version="1" comment="texlive-pxtxalfa-doc is &lt;2021.186.1svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919582" version="1" comment="texlive-pxufont is &lt;2021.186.0.0.6svn53733-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919583" version="1" comment="texlive-pxufont-doc is &lt;2021.186.0.0.6svn53733-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919584" version="1" comment="texlive-pygmentex is &lt;2021.186.0.0.10svn57190-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919585" version="1" comment="texlive-pygmentex-doc is &lt;2021.186.0.0.10svn57190-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919586" version="1" comment="texlive-python is &lt;2021.186.0.0.21svn27064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919587" version="1" comment="texlive-python-doc is &lt;2021.186.0.0.21svn27064-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919588" version="1" comment="texlive-pythonhighlight is &lt;2021.186.svn43191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919589" version="1" comment="texlive-pythonhighlight-doc is &lt;2021.186.svn43191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919590" version="1" comment="texlive-pythontex is &lt;2021.186.0.0.17svn52174-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919591" version="1" comment="texlive-pythontex-doc is &lt;2021.186.0.0.17svn52174-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919592" version="1" comment="texlive-qcircuit is &lt;2021.186.2.6.0svn48400-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919593" version="1" comment="texlive-qcircuit-doc is &lt;2021.186.2.6.0svn48400-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919594" version="1" comment="texlive-qcm is &lt;2021.186.2.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919595" version="1" comment="texlive-qcm-doc is &lt;2021.186.2.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919596" version="1" comment="texlive-qobitree is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919597" version="1" comment="texlive-qobitree-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919598" version="1" comment="texlive-qpxqtx is &lt;2021.186.svn45797-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919599" version="1" comment="texlive-qpxqtx-doc is &lt;2021.186.svn45797-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919600" version="1" comment="texlive-qrbill is &lt;2021.186.1.02svn56190-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919601" version="1" comment="texlive-qrbill-doc is &lt;2021.186.1.02svn56190-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919602" version="1" comment="texlive-qrcode is &lt;2021.186.1.51svn36065-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919603" version="1" comment="texlive-qrcode-doc is &lt;2021.186.1.51svn36065-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919604" version="1" comment="texlive-qsharp is &lt;2021.186.0.0.3.1901.1401svn49722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919605" version="1" comment="texlive-qsharp-doc is &lt;2021.186.0.0.3.1901.1401svn49722-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919606" version="1" comment="texlive-qstest is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919607" version="1" comment="texlive-qstest-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919608" version="1" comment="texlive-qsymbols is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919609" version="1" comment="texlive-qsymbols-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919610" version="1" comment="texlive-qtree is &lt;2021.186.3.1bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919611" version="1" comment="texlive-qtree-doc is &lt;2021.186.3.1bsvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919612" version="1" comment="texlive-qualitype is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919613" version="1" comment="texlive-qualitype-doc is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919614" version="1" comment="texlive-qualitype-fonts is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919615" version="1" comment="texlive-quantikz is &lt;2021.186.0.0.9.6svn54911-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919616" version="1" comment="texlive-quantikz-doc is &lt;2021.186.0.0.9.6svn54911-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919617" version="1" comment="texlive-quantumarticle is &lt;2021.186.5.1svn56862-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919618" version="1" comment="texlive-quantumarticle-doc is &lt;2021.186.5.1svn56862-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919619" version="1" comment="texlive-quattrocento is &lt;2021.186.svn56020-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919620" version="1" comment="texlive-quattrocento-doc is &lt;2021.186.svn56020-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919621" version="1" comment="texlive-quattrocento-fonts is &lt;2021.186.svn56020-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919622" version="1" comment="texlive-quicktype is &lt;2021.186.0.0.1svn42183-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919623" version="1" comment="texlive-quicktype-doc is &lt;2021.186.0.0.1svn42183-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919624" version="1" comment="texlive-quiz2socrative is &lt;2021.186.1.0svn52276-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919625" version="1" comment="texlive-quiz2socrative-doc is &lt;2021.186.1.0svn52276-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919626" version="1" comment="texlive-quotchap is &lt;2021.186.1.3svn56926-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919627" version="1" comment="texlive-quotchap-doc is &lt;2021.186.1.3svn56926-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919628" version="1" comment="texlive-quoting is &lt;2021.186.0.0.1csvn32818-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919629" version="1" comment="texlive-quoting-doc is &lt;2021.186.0.0.1csvn32818-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919630" version="1" comment="texlive-quotmark is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919631" version="1" comment="texlive-quotmark-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919632" version="1" comment="texlive-quran is &lt;2021.186.1.81svn57601-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919633" version="1" comment="texlive-quran-bn is &lt;2021.186.0.0.1svn57602-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919634" version="1" comment="texlive-quran-bn-doc is &lt;2021.186.0.0.1svn57602-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919635" version="1" comment="texlive-quran-de is &lt;2021.186.0.0.2svn54191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919636" version="1" comment="texlive-quran-de-doc is &lt;2021.186.0.0.2svn54191-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919637" version="1" comment="texlive-quran-doc is &lt;2021.186.1.81svn57601-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919638" version="1" comment="texlive-quran-ur is &lt;2021.186.0.0.21svn57597-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919639" version="1" comment="texlive-quran-ur-doc is &lt;2021.186.0.0.21svn57597-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919640" version="1" comment="texlive-qyxf-book is &lt;2021.186.3.1.0svn56319-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919641" version="1" comment="texlive-qyxf-book-doc is &lt;2021.186.3.1.0svn56319-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919642" version="1" comment="texlive-r_und_s is &lt;2021.186.1.3isvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919643" version="1" comment="texlive-r_und_s-doc is &lt;2021.186.1.3isvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919644" version="1" comment="texlive-ragged2e is &lt;2021.186.3.0svn57638-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919645" version="1" comment="texlive-ragged2e-doc is &lt;2021.186.3.0svn57638-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919646" version="1" comment="texlive-raleway is &lt;2021.186.1.4svn42629-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919647" version="1" comment="texlive-raleway-doc is &lt;2021.186.1.4svn42629-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919648" version="1" comment="texlive-raleway-fonts is &lt;2021.186.1.4svn42629-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919649" version="1" comment="texlive-ran_toks is &lt;2021.186.svn57520-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919650" version="1" comment="texlive-ran_toks-doc is &lt;2021.186.svn57520-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919651" version="1" comment="texlive-randbild is &lt;2021.186.0.0.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919652" version="1" comment="texlive-randbild-doc is &lt;2021.186.0.0.2svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919653" version="1" comment="texlive-random is &lt;2021.186.0.0.2svn54723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919654" version="1" comment="texlive-random-doc is &lt;2021.186.0.0.2svn54723-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919655" version="1" comment="texlive-randomlist is &lt;2021.186.1.3svn45281-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919656" version="1" comment="texlive-randomlist-doc is &lt;2021.186.1.3svn45281-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919657" version="1" comment="texlive-randomwalk is &lt;2021.186.0.0.6svn49513-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919658" version="1" comment="texlive-randomwalk-doc is &lt;2021.186.0.0.6svn49513-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919659" version="1" comment="texlive-randtext is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919660" version="1" comment="texlive-randtext-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919661" version="1" comment="texlive-rank-2-roots is &lt;2021.186.1.0svn48515-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919662" version="1" comment="texlive-rank-2-roots-doc is &lt;2021.186.1.0svn48515-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919663" version="1" comment="texlive-rccol is &lt;2021.186.1.2csvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919664" version="1" comment="texlive-rccol-doc is &lt;2021.186.1.2csvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919665" version="1" comment="texlive-rcs is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919666" version="1" comment="texlive-rcs-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919667" version="1" comment="texlive-rcs-multi is &lt;2021.186.0.0.1asvn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919668" version="1" comment="texlive-rcs-multi-doc is &lt;2021.186.0.0.1asvn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919669" version="1" comment="texlive-rcsinfo is &lt;2021.186.1.11svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919670" version="1" comment="texlive-rcsinfo-doc is &lt;2021.186.1.11svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919671" version="1" comment="texlive-readablecv is &lt;2021.186.3.0svn57433-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919672" version="1" comment="texlive-readablecv-doc is &lt;2021.186.3.0svn57433-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919673" version="1" comment="texlive-readarray is &lt;2021.186.2.0svn42467-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919674" version="1" comment="texlive-readarray-doc is &lt;2021.186.2.0svn42467-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919675" version="1" comment="texlive-realboxes is &lt;2021.186.0.0.2svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919676" version="1" comment="texlive-realboxes-doc is &lt;2021.186.0.0.2svn56291-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919677" version="1" comment="texlive-realhats is &lt;2021.186.5.0svn52865-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919678" version="1" comment="texlive-realhats-doc is &lt;2021.186.5.0svn52865-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919679" version="1" comment="texlive-realscripts is &lt;2021.186.0.0.3dsvn56594-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919680" version="1" comment="texlive-realscripts-doc is &lt;2021.186.0.0.3dsvn56594-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919681" version="1" comment="texlive-realtranspose is &lt;2021.186.1.1svn56623-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919682" version="1" comment="texlive-realtranspose-doc is &lt;2021.186.1.1svn56623-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919683" version="1" comment="texlive-rec-thy is &lt;2021.186.3.7svn58732-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919684" version="1" comment="texlive-rec-thy-doc is &lt;2021.186.3.7svn58732-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919685" version="1" comment="texlive-recipe is &lt;2021.186.0.0.9svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919686" version="1" comment="texlive-recipe-doc is &lt;2021.186.0.0.9svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919687" version="1" comment="texlive-recipebook is &lt;2021.186.svn37026-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919688" version="1" comment="texlive-recipebook-doc is &lt;2021.186.svn37026-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919689" version="1" comment="texlive-recipecard is &lt;2021.186.2.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919690" version="1" comment="texlive-recipecard-doc is &lt;2021.186.2.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919691" version="1" comment="texlive-rectopma is &lt;2021.186.svn19980-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919692" version="1" comment="texlive-rectopma-doc is &lt;2021.186.svn19980-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919693" version="1" comment="texlive-recycle is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919694" version="1" comment="texlive-recycle-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919695" version="1" comment="texlive-recycle-fonts is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919696" version="1" comment="texlive-refcheck is &lt;2021.186.1.9.1svn29128-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919697" version="1" comment="texlive-refcheck-doc is &lt;2021.186.1.9.1svn29128-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919698" version="1" comment="texlive-refcount is &lt;2021.186.3.6svn53164-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919699" version="1" comment="texlive-refcount-doc is &lt;2021.186.3.6svn53164-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919700" version="1" comment="texlive-refenums is &lt;2021.186.1.1.2svn44131-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919701" version="1" comment="texlive-refenums-doc is &lt;2021.186.1.1.2svn44131-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919702" version="1" comment="texlive-reflectgraphics is &lt;2021.186.0.0.2csvn40612-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919703" version="1" comment="texlive-reflectgraphics-doc is &lt;2021.186.0.0.2csvn40612-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919704" version="1" comment="texlive-refman is &lt;2021.186.2.0esvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919705" version="1" comment="texlive-refman-doc is &lt;2021.186.2.0esvn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919706" version="1" comment="texlive-refstyle is &lt;2021.186.0.0.5svn20318-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919707" version="1" comment="texlive-refstyle-doc is &lt;2021.186.0.0.5svn20318-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919708" version="1" comment="texlive-regcount is &lt;2021.186.1.0svn19979-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919709" version="1" comment="texlive-regcount-doc is &lt;2021.186.1.0svn19979-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919710" version="1" comment="texlive-regexpatch is &lt;2021.186.0.0.2fsvn58668-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919711" version="1" comment="texlive-regexpatch-doc is &lt;2021.186.0.0.2fsvn58668-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919712" version="1" comment="texlive-register is &lt;2021.186.2.0svn54485-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919713" version="1" comment="texlive-register-doc is &lt;2021.186.2.0svn54485-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919714" version="1" comment="texlive-regstats is &lt;2021.186.1.0hsvn25050-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919715" version="1" comment="texlive-regstats-doc is &lt;2021.186.1.0hsvn25050-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919716" version="1" comment="texlive-reledmac is &lt;2021.186.2.37.2svn58763-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919717" version="1" comment="texlive-reledmac-doc is &lt;2021.186.2.37.2svn58763-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919718" version="1" comment="texlive-relenc is &lt;2021.186.svn22050-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919719" version="1" comment="texlive-relenc-doc is &lt;2021.186.svn22050-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919720" version="1" comment="texlive-relsize is &lt;2021.186.4.1svn30707-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919721" version="1" comment="texlive-relsize-doc is &lt;2021.186.4.1svn30707-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919722" version="1" comment="texlive-reotex is &lt;2021.186.1.1svn34924-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919723" version="1" comment="texlive-reotex-doc is &lt;2021.186.1.1svn34924-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919724" version="1" comment="texlive-repeatindex is &lt;2021.186.0.0.01svn24305-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919725" version="1" comment="texlive-repeatindex-doc is &lt;2021.186.0.0.01svn24305-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919726" version="1" comment="texlive-repere is &lt;2021.186.19.06svn51363-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919727" version="1" comment="texlive-repere-doc is &lt;2021.186.19.06svn51363-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919728" version="1" comment="texlive-repltext is &lt;2021.186.1.1svn56433-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919729" version="1" comment="texlive-repltext-doc is &lt;2021.186.1.1svn56433-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919730" version="1" comment="texlive-rerunfilecheck is &lt;2021.186.1.9svn54841-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919731" version="1" comment="texlive-rerunfilecheck-doc is &lt;2021.186.1.9svn54841-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919732" version="1" comment="texlive-resphilosophica is &lt;2021.186.1.35svn50935-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919733" version="1" comment="texlive-resphilosophica-doc is &lt;2021.186.1.35svn50935-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919734" version="1" comment="texlive-rest-api is &lt;2021.186.1.4svn57068-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919735" version="1" comment="texlive-rest-api-doc is &lt;2021.186.1.4svn57068-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919736" version="1" comment="texlive-resumecls is &lt;2021.186.0.0.4.1svn54815-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919737" version="1" comment="texlive-resumecls-doc is &lt;2021.186.0.0.4.1svn54815-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919738" version="1" comment="texlive-resumemac is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919739" version="1" comment="texlive-resumemac-doc is &lt;2021.186.svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919740" version="1" comment="texlive-returntogrid is &lt;2021.186.0.0.2svn48485-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919741" version="1" comment="texlive-returntogrid-doc is &lt;2021.186.0.0.2svn48485-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919742" version="1" comment="texlive-reverxii is &lt;2021.186.svn24976-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919743" version="1" comment="texlive-revquantum is &lt;2021.186.0.0.11svn43505-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919744" version="1" comment="texlive-revquantum-doc is &lt;2021.186.0.0.11svn43505-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919745" version="1" comment="texlive-revtex is &lt;2021.186.4.2esvn56591-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919746" version="1" comment="texlive-revtex-doc is &lt;2021.186.4.2esvn56591-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919747" version="1" comment="texlive-revtex4 is &lt;2021.186.4.0asvn56589-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919748" version="1" comment="texlive-revtex4-1 is &lt;2021.186.4.1ssvn56590-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919749" version="1" comment="texlive-revtex4-1-doc is &lt;2021.186.4.1ssvn56590-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919750" version="1" comment="texlive-revtex4-doc is &lt;2021.186.4.0asvn56589-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919751" version="1" comment="texlive-rgltxdoc is &lt;2021.186.1.3svn53858-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919752" version="1" comment="texlive-rgltxdoc-doc is &lt;2021.186.1.3svn53858-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919753" version="1" comment="texlive-ribbonproofs is &lt;2021.186.1.0svn31137-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919754" version="1" comment="texlive-ribbonproofs-doc is &lt;2021.186.1.0svn31137-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919755" version="1" comment="texlive-rjlparshap is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919756" version="1" comment="texlive-rjlparshap-doc is &lt;2021.186.1.0svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919757" version="1" comment="texlive-rlepsf is &lt;2021.186.svn19082-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919758" version="1" comment="texlive-rlepsf-doc is &lt;2021.186.svn19082-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919759" version="1" comment="texlive-rmathbr is &lt;2021.186.1.1.1svn57173-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919760" version="1" comment="texlive-rmathbr-doc is &lt;2021.186.1.1.1svn57173-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919761" version="1" comment="texlive-rmpage is &lt;2021.186.0.0.92svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919762" version="1" comment="texlive-rmpage-doc is &lt;2021.186.0.0.92svn54080-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919763" version="1" comment="texlive-roboto is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919764" version="1" comment="texlive-roboto-doc is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919765" version="1" comment="texlive-roboto-fonts is &lt;2021.186.svn54512-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919766" version="1" comment="texlive-robustcommand is &lt;2021.186.0.0.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919767" version="1" comment="texlive-robustcommand-doc is &lt;2021.186.0.0.1svn15878-46.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919768" version="1" comment="texlive-robustindex is &lt;2021.186.svn49877-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919769" version="1" comment="texlive-robustindex-doc is &lt;2021.186.svn49877-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919770" version="1" comment="texlive-roex is &lt;2021.186.svn45818-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919771" version="1" comment="texlive-rojud is &lt;2021.186.1.2svn56895-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919772" version="1" comment="texlive-rojud-doc is &lt;2021.186.1.2svn56895-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919773" version="1" comment="texlive-rojud-fonts is &lt;2021.186.1.2svn56895-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919774" version="1" comment="texlive-romanbar is &lt;2021.186.1.0fsvn25005-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919775" version="1" comment="texlive-romanbar-doc is &lt;2021.186.1.0fsvn25005-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919776" version="1" comment="texlive-romanbarpagenumber is &lt;2021.186.1.0svn36236-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919777" version="1" comment="texlive-romanbarpagenumber-doc is &lt;2021.186.1.0svn36236-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919778" version="1" comment="texlive-romande is &lt;2021.186.1.008_v7_scsvn19537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919779" version="1" comment="texlive-romande-doc is &lt;2021.186.1.008_v7_scsvn19537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919780" version="1" comment="texlive-romande-fonts is &lt;2021.186.1.008_v7_scsvn19537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919781" version="1" comment="texlive-romanneg is &lt;2021.186.svn20087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919782" version="1" comment="texlive-romanneg-doc is &lt;2021.186.svn20087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919783" version="1" comment="texlive-romannum is &lt;2021.186.1.0bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919784" version="1" comment="texlive-romannum-doc is &lt;2021.186.1.0bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919785" version="1" comment="texlive-rosario is &lt;2021.186.2.1svn51688-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919786" version="1" comment="texlive-rosario-doc is &lt;2021.186.2.1svn51688-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919787" version="1" comment="texlive-rosario-fonts is &lt;2021.186.2.1svn51688-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919788" version="1" comment="texlive-rotfloat is &lt;2021.186.1.2svn18292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919789" version="1" comment="texlive-rotfloat-doc is &lt;2021.186.1.2svn18292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919790" version="1" comment="texlive-rotpages is &lt;2021.186.3.0svn18740-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919791" version="1" comment="texlive-rotpages-doc is &lt;2021.186.3.0svn18740-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919792" version="1" comment="texlive-roundbox is &lt;2021.186.0.0.2svn29675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919793" version="1" comment="texlive-roundbox-doc is &lt;2021.186.0.0.2svn29675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919794" version="1" comment="texlive-roundrect is &lt;2021.186.2.2svn39796-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919795" version="1" comment="texlive-roundrect-doc is &lt;2021.186.2.2svn39796-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919796" version="1" comment="texlive-rrgtrees is &lt;2021.186.1.1svn27322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919797" version="1" comment="texlive-rrgtrees-doc is &lt;2021.186.1.1svn27322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919798" version="1" comment="texlive-rsc is &lt;2021.186.3.1fsvn41923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919799" version="1" comment="texlive-rsc-doc is &lt;2021.186.3.1fsvn41923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919800" version="1" comment="texlive-rsfs is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919801" version="1" comment="texlive-rsfs-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919802" version="1" comment="texlive-rsfs-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919803" version="1" comment="texlive-rsfso is &lt;2021.186.1.02svn37965-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919804" version="1" comment="texlive-rsfso-doc is &lt;2021.186.1.02svn37965-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919805" version="1" comment="texlive-rterface is &lt;2021.186.svn30084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919806" version="1" comment="texlive-rterface-doc is &lt;2021.186.svn30084-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919807" version="1" comment="texlive-rtkinenc is &lt;2021.186.1.0svn20003-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919808" version="1" comment="texlive-rtkinenc-doc is &lt;2021.186.1.0svn20003-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919809" version="1" comment="texlive-rtklage is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919810" version="1" comment="texlive-rtklage-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919811" version="1" comment="texlive-rubik is &lt;2021.186.5.0svn46791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919812" version="1" comment="texlive-rubik-doc is &lt;2021.186.5.0svn46791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919813" version="1" comment="texlive-ruhyphen is &lt;2021.186.1.6svn21081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919814" version="1" comment="texlive-ruler is &lt;2021.186.1.1svn54251-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919815" version="1" comment="texlive-rulerbox is &lt;2021.186.1.01svn50984-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919816" version="1" comment="texlive-rulerbox-doc is &lt;2021.186.1.01svn50984-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919817" version="1" comment="texlive-rulercompass is &lt;2021.186.1svn32392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919818" version="1" comment="texlive-rulercompass-doc is &lt;2021.186.1svn32392-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919819" version="1" comment="texlive-runcode is &lt;2021.186.1.0svn56594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919820" version="1" comment="texlive-runcode-doc is &lt;2021.186.1.0svn56594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919821" version="1" comment="texlive-russ is &lt;2021.186.svn25209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919822" version="1" comment="texlive-russ-doc is &lt;2021.186.svn25209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919823" version="1" comment="texlive-rutitlepage is &lt;2021.186.2.3svn51073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919824" version="1" comment="texlive-rutitlepage-doc is &lt;2021.186.2.3svn51073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919825" version="1" comment="texlive-rviewport is &lt;2021.186.1.0svn23739-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919826" version="1" comment="texlive-rviewport-doc is &lt;2021.186.1.0svn23739-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919827" version="1" comment="texlive-rvwrite is &lt;2021.186.1.2svn19614-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919828" version="1" comment="texlive-rvwrite-doc is &lt;2021.186.1.2svn19614-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919829" version="1" comment="texlive-ryersonsgsthesis is &lt;2021.186.1.0.3svn50119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919830" version="1" comment="texlive-ryersonsgsthesis-doc is &lt;2021.186.1.0.3svn50119-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919831" version="1" comment="texlive-ryethesis is &lt;2021.186.1.36svn33945-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919832" version="1" comment="texlive-ryethesis-doc is &lt;2021.186.1.36svn33945-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919833" version="1" comment="texlive-sa-tikz is &lt;2021.186.0.0.7asvn32815-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919834" version="1" comment="texlive-sa-tikz-doc is &lt;2021.186.0.0.7asvn32815-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919835" version="1" comment="texlive-sageep is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919836" version="1" comment="texlive-sageep-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919837" version="1" comment="texlive-sanitize-umlaut is &lt;2021.186.1.10svn53292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919838" version="1" comment="texlive-sanitize-umlaut-doc is &lt;2021.186.1.10svn53292-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919839" version="1" comment="texlive-sankey is &lt;2021.186.3.0svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919840" version="1" comment="texlive-sankey-doc is &lt;2021.186.3.0svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919841" version="1" comment="texlive-sanskrit is &lt;2021.186.2.2.1svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919842" version="1" comment="texlive-sanskrit-doc is &lt;2021.186.2.2.1svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919843" version="1" comment="texlive-sanskrit-t1 is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919844" version="1" comment="texlive-sanskrit-t1-doc is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919845" version="1" comment="texlive-sanskrit-t1-fonts is &lt;2021.186.svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919846" version="1" comment="texlive-sansmath is &lt;2021.186.1.1svn17997-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919847" version="1" comment="texlive-sansmath-doc is &lt;2021.186.1.1svn17997-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919848" version="1" comment="texlive-sansmathaccent is &lt;2021.186.svn53628-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919849" version="1" comment="texlive-sansmathaccent-doc is &lt;2021.186.svn53628-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919850" version="1" comment="texlive-sansmathfonts is &lt;2021.186.svn51356-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919851" version="1" comment="texlive-sansmathfonts-doc is &lt;2021.186.svn51356-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919852" version="1" comment="texlive-sansmathfonts-fonts is &lt;2021.186.svn51356-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919853" version="1" comment="texlive-sapthesis is &lt;2021.186.4.1svn48365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919854" version="1" comment="texlive-sapthesis-doc is &lt;2021.186.4.1svn48365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919855" version="1" comment="texlive-sasnrdisplay is &lt;2021.186.0.0.95svn45963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919856" version="1" comment="texlive-sasnrdisplay-doc is &lt;2021.186.0.0.95svn45963-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919857" version="1" comment="texlive-sauerj is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919858" version="1" comment="texlive-sauerj-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919859" version="1" comment="texlive-sauter is &lt;2021.186.2.4svn13293-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919860" version="1" comment="texlive-sauterfonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919861" version="1" comment="texlive-sauterfonts-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919862" version="1" comment="texlive-savefnmark is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919863" version="1" comment="texlive-savefnmark-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919864" version="1" comment="texlive-savesym is &lt;2021.186.1.2svn31565-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919865" version="1" comment="texlive-savetrees is &lt;2021.186.2.4svn40525-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919866" version="1" comment="texlive-savetrees-doc is &lt;2021.186.2.4svn40525-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919867" version="1" comment="texlive-scale is &lt;2021.186.1.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919868" version="1" comment="texlive-scale-doc is &lt;2021.186.1.1.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919869" version="1" comment="texlive-scalebar is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919870" version="1" comment="texlive-scalebar-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919871" version="1" comment="texlive-scalerel is &lt;2021.186.1.8svn42809-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919872" version="1" comment="texlive-scalerel-doc is &lt;2021.186.1.8svn42809-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919873" version="1" comment="texlive-scanpages is &lt;2021.186.1.05asvn42633-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919874" version="1" comment="texlive-scanpages-doc is &lt;2021.186.1.05asvn42633-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919875" version="1" comment="texlive-scanpages-fonts is &lt;2021.186.1.05asvn42633-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919876" version="1" comment="texlive-schedule is &lt;2021.186.1.20svn51805-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919877" version="1" comment="texlive-schedule-doc is &lt;2021.186.1.20svn51805-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919878" version="1" comment="texlive-schemabloc is &lt;2021.186.1.5svn58212-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919879" version="1" comment="texlive-schemabloc-doc is &lt;2021.186.1.5svn58212-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919880" version="1" comment="texlive-schemata is &lt;2021.186.1.4svn58020-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919881" version="1" comment="texlive-schemata-doc is &lt;2021.186.1.4svn58020-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919882" version="1" comment="texlive-scholax is &lt;2021.186.1.030svn58733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919883" version="1" comment="texlive-scholax-doc is &lt;2021.186.1.030svn58733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919884" version="1" comment="texlive-scholax-fonts is &lt;2021.186.1.030svn58733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919885" version="1" comment="texlive-schooldocs is &lt;2021.186.1.0svn55838-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919886" version="1" comment="texlive-schooldocs-doc is &lt;2021.186.1.0svn55838-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919887" version="1" comment="texlive-schule is &lt;2021.186.0.0.8.2svn56683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919888" version="1" comment="texlive-schule-doc is &lt;2021.186.0.0.8.2svn56683-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919889" version="1" comment="texlive-schulmathematik is &lt;2021.186.1.1svn58359-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919890" version="1" comment="texlive-schulmathematik-doc is &lt;2021.186.1.1svn58359-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919891" version="1" comment="texlive-schulschriften is &lt;2021.186.4svn35730-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919892" version="1" comment="texlive-schulschriften-doc is &lt;2021.186.4svn35730-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919893" version="1" comment="texlive-schwalbe-chess is &lt;2021.186.2.7svn53305-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919894" version="1" comment="texlive-schwalbe-chess-doc is &lt;2021.186.2.7svn53305-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919895" version="1" comment="texlive-scientific-thesis-cover is &lt;2021.186.4.0.2svn47923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919896" version="1" comment="texlive-scientific-thesis-cover-doc is &lt;2021.186.4.0.2svn47923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919897" version="1" comment="texlive-sciposter is &lt;2021.186.1.18svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919898" version="1" comment="texlive-sciposter-doc is &lt;2021.186.1.18svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919899" version="1" comment="texlive-sclang-prettifier is &lt;2021.186.0.0.1svn35087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919900" version="1" comment="texlive-sclang-prettifier-doc is &lt;2021.186.0.0.1svn35087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919901" version="1" comment="texlive-scontents is &lt;2021.186.1.9svn53504-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919902" version="1" comment="texlive-scontents-doc is &lt;2021.186.1.9svn53504-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919903" version="1" comment="texlive-scratch is &lt;2021.186.0.0.41svn50073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919904" version="1" comment="texlive-scratch-doc is &lt;2021.186.0.0.41svn50073-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919905" version="1" comment="texlive-scratch3 is &lt;2021.186.0.0.18svn56258-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919906" version="1" comment="texlive-scratch3-doc is &lt;2021.186.0.0.18svn56258-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919907" version="1" comment="texlive-scratchx is &lt;2021.186.1.1svn44906-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919908" version="1" comment="texlive-scratchx-doc is &lt;2021.186.1.1svn44906-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919909" version="1" comment="texlive-screenplay is &lt;2021.186.1.6svn27223-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919910" version="1" comment="texlive-screenplay-doc is &lt;2021.186.1.6svn27223-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919911" version="1" comment="texlive-screenplay-pkg is &lt;2021.186.1.1svn44965-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919912" version="1" comment="texlive-screenplay-pkg-doc is &lt;2021.186.1.1svn44965-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919913" version="1" comment="texlive-scrjrnl is &lt;2021.186.0.0.1svn27810-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919914" version="1" comment="texlive-scrjrnl-doc is &lt;2021.186.0.0.1svn27810-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919915" version="1" comment="texlive-scrlayer-fancyhdr is &lt;2021.186.0.0.2.1svn58746-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919916" version="1" comment="texlive-scrlayer-fancyhdr-doc is &lt;2021.186.0.0.2.1svn58746-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919917" version="1" comment="texlive-scrlttr2copy is &lt;2021.186.0.0.3asvn56733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919918" version="1" comment="texlive-scrlttr2copy-doc is &lt;2021.186.0.0.3asvn56733-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919919" version="1" comment="texlive-scsnowman is &lt;2021.186.1.2dsvn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919920" version="1" comment="texlive-scsnowman-doc is &lt;2021.186.1.2dsvn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919921" version="1" comment="texlive-sdaps is &lt;2021.186.1.9.8svn54678-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919922" version="1" comment="texlive-sdaps-doc is &lt;2021.186.1.9.8svn54678-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919923" version="1" comment="texlive-sdrt is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919924" version="1" comment="texlive-sdrt-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919925" version="1" comment="texlive-sduthesis is &lt;2021.186.1.2.1svn41401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919926" version="1" comment="texlive-sduthesis-doc is &lt;2021.186.1.2.1svn41401-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919927" version="1" comment="texlive-secdot is &lt;2021.186.1.0svn20208-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919928" version="1" comment="texlive-secdot-doc is &lt;2021.186.1.0svn20208-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919929" version="1" comment="texlive-secnum is &lt;2021.186.svn53657-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919930" version="1" comment="texlive-secnum-doc is &lt;2021.186.svn53657-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919931" version="1" comment="texlive-section is &lt;2021.186.svn20180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919932" version="1" comment="texlive-section-doc is &lt;2021.186.svn20180-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919933" version="1" comment="texlive-sectionbox is &lt;2021.186.1.01svn37749-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919934" version="1" comment="texlive-sectionbox-doc is &lt;2021.186.1.01svn37749-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919935" version="1" comment="texlive-sectionbreak is &lt;2021.186.0.0.1dsvn50339-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919936" version="1" comment="texlive-sectionbreak-doc is &lt;2021.186.0.0.1dsvn50339-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919937" version="1" comment="texlive-sectsty is &lt;2021.186.2.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919938" version="1" comment="texlive-sectsty-doc is &lt;2021.186.2.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919939" version="1" comment="texlive-seealso is &lt;2021.186.1.2svn43595-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919940" version="1" comment="texlive-seealso-doc is &lt;2021.186.1.2svn43595-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919941" version="1" comment="texlive-seetexk is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919942" version="1" comment="texlive-selectp is &lt;2021.186.1.0svn20185-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919943" version="1" comment="texlive-selectp-doc is &lt;2021.186.1.0svn20185-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919944" version="1" comment="texlive-selinput is &lt;2021.186.1.6svn53098-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919945" version="1" comment="texlive-selinput-doc is &lt;2021.186.1.6svn53098-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919946" version="1" comment="texlive-selnolig is &lt;2021.186.0.0.302svn38721-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919947" version="1" comment="texlive-selnolig-doc is &lt;2021.186.0.0.302svn38721-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919948" version="1" comment="texlive-semantex is &lt;2021.186.0.0.463svn56863-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919949" version="1" comment="texlive-semantex-doc is &lt;2021.186.0.0.463svn56863-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919950" version="1" comment="texlive-semantic is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919951" version="1" comment="texlive-semantic-doc is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919952" version="1" comment="texlive-semantic-markup is &lt;2021.186.svn53607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919953" version="1" comment="texlive-semantic-markup-doc is &lt;2021.186.svn53607-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919954" version="1" comment="texlive-semaphor is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919955" version="1" comment="texlive-semaphor-doc is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919956" version="1" comment="texlive-semaphor-fonts is &lt;2021.186.svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919957" version="1" comment="texlive-semesterplanner is &lt;2021.186.1.0svn56841-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919958" version="1" comment="texlive-semesterplanner-doc is &lt;2021.186.1.0svn56841-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919959" version="1" comment="texlive-seminar is &lt;2021.186.1.62svn34011-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919960" version="1" comment="texlive-seminar-doc is &lt;2021.186.1.62svn34011-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919961" version="1" comment="texlive-semioneside is &lt;2021.186.0.0.41svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919962" version="1" comment="texlive-semioneside-doc is &lt;2021.186.0.0.41svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919963" version="1" comment="texlive-semproc is &lt;2021.186.0.0.1svn37568-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919964" version="1" comment="texlive-semproc-doc is &lt;2021.186.0.0.1svn37568-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919965" version="1" comment="texlive-semtex is &lt;2021.186.0.0.45svn56530-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919966" version="1" comment="texlive-semtex-doc is &lt;2021.186.0.0.45svn56530-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919967" version="1" comment="texlive-sepfootnotes is &lt;2021.186.0.0.3csvn41732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919968" version="1" comment="texlive-sepfootnotes-doc is &lt;2021.186.0.0.3csvn41732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919969" version="1" comment="texlive-sepnum is &lt;2021.186.2.0svn20186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919970" version="1" comment="texlive-sepnum-doc is &lt;2021.186.2.0svn20186-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919971" version="1" comment="texlive-seqsplit is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919972" version="1" comment="texlive-seqsplit-doc is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919973" version="1" comment="texlive-serbian-apostrophe is &lt;2021.186.svn23799-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919974" version="1" comment="texlive-serbian-apostrophe-doc is &lt;2021.186.svn23799-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919975" version="1" comment="texlive-serbian-date-lat is &lt;2021.186.svn23446-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919976" version="1" comment="texlive-serbian-date-lat-doc is &lt;2021.186.svn23446-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919977" version="1" comment="texlive-serbian-def-cyr is &lt;2021.186.svn23734-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919978" version="1" comment="texlive-serbian-def-cyr-doc is &lt;2021.186.svn23734-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919979" version="1" comment="texlive-serbian-lig is &lt;2021.186.svn53127-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919980" version="1" comment="texlive-serbian-lig-doc is &lt;2021.186.svn53127-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919981" version="1" comment="texlive-sesamanuel is &lt;2021.186.0.0.6svn36613-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919982" version="1" comment="texlive-sesamanuel-doc is &lt;2021.186.0.0.6svn36613-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919983" version="1" comment="texlive-sesstime is &lt;2021.186.1.12svn49750-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919984" version="1" comment="texlive-sesstime-doc is &lt;2021.186.1.12svn49750-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919985" version="1" comment="texlive-setdeck is &lt;2021.186.0.0.1svn40613-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919986" version="1" comment="texlive-setdeck-doc is &lt;2021.186.0.0.1svn40613-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919987" version="1" comment="texlive-setspace is &lt;2021.186.6.7asvn24881-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919988" version="1" comment="texlive-setspace-doc is &lt;2021.186.6.7asvn24881-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919989" version="1" comment="texlive-seuthesis is &lt;2021.186.2.1.2svn33042-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919990" version="1" comment="texlive-seuthesis-doc is &lt;2021.186.2.1.2svn33042-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919991" version="1" comment="texlive-seuthesix is &lt;2021.186.1.0.1svn40088-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919992" version="1" comment="texlive-seuthesix-doc is &lt;2021.186.1.0.1svn40088-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919993" version="1" comment="texlive-sexam is &lt;2021.186.1svn46628-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919994" version="1" comment="texlive-sexam-doc is &lt;2021.186.1svn46628-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919995" version="1" comment="texlive-sf298 is &lt;2021.186.1.3svn41653-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919996" version="1" comment="texlive-sf298-doc is &lt;2021.186.1.3svn41653-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919997" version="1" comment="texlive-sffms is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919998" version="1" comment="texlive-sffms-doc is &lt;2021.186.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009919999" version="1" comment="texlive-sfg is &lt;2021.186.0.0.91svn20209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920000" version="1" comment="texlive-sfg-doc is &lt;2021.186.0.0.91svn20209-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920001" version="1" comment="texlive-sfmath is &lt;2021.186.0.0.8svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920002" version="1" comment="texlive-sgame is &lt;2021.186.2.15svn30959-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920003" version="1" comment="texlive-sgame-doc is &lt;2021.186.2.15svn30959-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920004" version="1" comment="texlive-shade is &lt;2021.186.1svn22212-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920005" version="1" comment="texlive-shade-doc is &lt;2021.186.1svn22212-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920006" version="1" comment="texlive-shadethm is &lt;2021.186.svn53350-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920007" version="1" comment="texlive-shadethm-doc is &lt;2021.186.svn53350-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920008" version="1" comment="texlive-shadow is &lt;2021.186.svn20312-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920009" version="1" comment="texlive-shadow-doc is &lt;2021.186.svn20312-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920010" version="1" comment="texlive-shadowtext is &lt;2021.186.0.0.3svn26522-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920011" version="1" comment="texlive-shadowtext-doc is &lt;2021.186.0.0.3svn26522-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920012" version="1" comment="texlive-shapepar is &lt;2021.186.2.2svn30708-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920013" version="1" comment="texlive-shapepar-doc is &lt;2021.186.2.2svn30708-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920014" version="1" comment="texlive-shapes is &lt;2021.186.1.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920015" version="1" comment="texlive-shapes-doc is &lt;2021.186.1.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920016" version="1" comment="texlive-shdoc is &lt;2021.186.2.1bsvn41991-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920017" version="1" comment="texlive-shdoc-doc is &lt;2021.186.2.1bsvn41991-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920018" version="1" comment="texlive-shipunov is &lt;2021.186.1.2svn52334-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920019" version="1" comment="texlive-shipunov-doc is &lt;2021.186.1.2svn52334-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920020" version="1" comment="texlive-shobhika is &lt;2021.186.1.05svn50555-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920021" version="1" comment="texlive-shobhika-doc is &lt;2021.186.1.05svn50555-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920022" version="1" comment="texlive-shobhika-fonts is &lt;2021.186.1.05svn50555-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920023" version="1" comment="texlive-short-math-guide is &lt;2021.186.2.0svn46126-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920024" version="1" comment="texlive-shortmathj is &lt;2021.186.0.0.5.0svn54407-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920025" version="1" comment="texlive-shortmathj-doc is &lt;2021.186.0.0.5.0svn54407-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920026" version="1" comment="texlive-shorttoc is &lt;2021.186.1.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920027" version="1" comment="texlive-shorttoc-doc is &lt;2021.186.1.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920028" version="1" comment="texlive-show2e is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920029" version="1" comment="texlive-show2e-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920030" version="1" comment="texlive-showcharinbox is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920031" version="1" comment="texlive-showcharinbox-doc is &lt;2021.186.0.0.1svn29803-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920032" version="1" comment="texlive-showdim is &lt;2021.186.1.2svn28918-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920033" version="1" comment="texlive-showdim-doc is &lt;2021.186.1.2svn28918-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920034" version="1" comment="texlive-showexpl is &lt;2021.186.0.0.3ssvn57414-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920035" version="1" comment="texlive-showexpl-doc is &lt;2021.186.0.0.3ssvn57414-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920036" version="1" comment="texlive-showhyphens is &lt;2021.186.0.0.5csvn39787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920037" version="1" comment="texlive-showhyphens-doc is &lt;2021.186.0.0.5csvn39787-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920038" version="1" comment="texlive-showlabels is &lt;2021.186.1.8svn41322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920039" version="1" comment="texlive-showlabels-doc is &lt;2021.186.1.8svn41322-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920040" version="1" comment="texlive-showtags is &lt;2021.186.1.05svn20336-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920041" version="1" comment="texlive-showtags-doc is &lt;2021.186.1.05svn20336-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920042" version="1" comment="texlive-shtthesis is &lt;2021.186.0.0.3.2svn57740-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920043" version="1" comment="texlive-shtthesis-doc is &lt;2021.186.0.0.3.2svn57740-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920044" version="1" comment="texlive-shuffle is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920045" version="1" comment="texlive-shuffle-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920046" version="1" comment="texlive-sidecap is &lt;2021.186.1.6fsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920047" version="1" comment="texlive-sidecap-doc is &lt;2021.186.1.6fsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920048" version="1" comment="texlive-sidenotes is &lt;2021.186.1.00asvn54524-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920049" version="1" comment="texlive-sidenotes-doc is &lt;2021.186.1.00asvn54524-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920050" version="1" comment="texlive-sides is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920051" version="1" comment="texlive-sides-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920052" version="1" comment="texlive-signchart is &lt;2021.186.1.01svn39707-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920053" version="1" comment="texlive-signchart-doc is &lt;2021.186.1.01svn39707-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920054" version="1" comment="texlive-silence is &lt;2021.186.1.5bsvn27028-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920055" version="1" comment="texlive-silence-doc is &lt;2021.186.1.5bsvn27028-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920056" version="1" comment="texlive-simple-resume-cv is &lt;2021.186.svn43057-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920057" version="1" comment="texlive-simple-resume-cv-doc is &lt;2021.186.svn43057-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920058" version="1" comment="texlive-simple-thesis-dissertation is &lt;2021.186.svn43058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920059" version="1" comment="texlive-simple-thesis-dissertation-doc is &lt;2021.186.svn43058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920060" version="1" comment="texlive-simplebnf is &lt;2021.186.0.0.2.0svn56761-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920061" version="1" comment="texlive-simplebnf-doc is &lt;2021.186.0.0.2.0svn56761-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920062" version="1" comment="texlive-simplecd is &lt;2021.186.1.4svn29260-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920063" version="1" comment="texlive-simplecd-doc is &lt;2021.186.1.4svn29260-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920064" version="1" comment="texlive-simplecv is &lt;2021.186.1.6asvn35537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920065" version="1" comment="texlive-simplecv-doc is &lt;2021.186.1.6asvn35537-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920066" version="1" comment="texlive-simpleinvoice is &lt;2021.186.svn45673-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920067" version="1" comment="texlive-simpleinvoice-doc is &lt;2021.186.svn45673-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920068" version="1" comment="texlive-simplekv is &lt;2021.186.0.0.2svn54915-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920069" version="1" comment="texlive-simplekv-doc is &lt;2021.186.0.0.2svn54915-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920070" version="1" comment="texlive-simpleoptics is &lt;2021.186.1.1.1svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920071" version="1" comment="texlive-simpleoptics-doc is &lt;2021.186.1.1.1svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920072" version="1" comment="texlive-simpler-wick is &lt;2021.186.1.0.0svn39074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920073" version="1" comment="texlive-simpler-wick-doc is &lt;2021.186.1.0.0svn39074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920074" version="1" comment="texlive-simplewick is &lt;2021.186.1.2asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920075" version="1" comment="texlive-simplewick-doc is &lt;2021.186.1.2asvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920076" version="1" comment="texlive-simplified-latex is &lt;2021.186.svn20620-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920077" version="1" comment="texlive-simplivre is &lt;2021.186.svn58414-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920078" version="1" comment="texlive-simplivre-doc is &lt;2021.186.svn58414-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920079" version="1" comment="texlive-simurgh is &lt;2021.186.0.0.01bsvn31719-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920080" version="1" comment="texlive-simurgh-doc is &lt;2021.186.0.0.01bsvn31719-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920081" version="1" comment="texlive-sitem is &lt;2021.186.1.0svn22136-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920082" version="1" comment="texlive-sitem-doc is &lt;2021.186.1.0svn22136-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920083" version="1" comment="texlive-siunitx is &lt;2021.186.2.8csvn58714-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920084" version="1" comment="texlive-siunitx-doc is &lt;2021.186.2.8csvn58714-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920085" version="1" comment="texlive-skak is &lt;2021.186.1.5.3svn46259-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920086" version="1" comment="texlive-skak-doc is &lt;2021.186.1.5.3svn46259-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920087" version="1" comment="texlive-skaknew is &lt;2021.186.svn20031-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920088" version="1" comment="texlive-skaknew-doc is &lt;2021.186.svn20031-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920089" version="1" comment="texlive-skaknew-fonts is &lt;2021.186.svn20031-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920090" version="1" comment="texlive-skb is &lt;2021.186.0.0.52svn22781-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920091" version="1" comment="texlive-skb-doc is &lt;2021.186.0.0.52svn22781-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920092" version="1" comment="texlive-skdoc is &lt;2021.186.1.5dsvn56950-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920093" version="1" comment="texlive-skdoc-doc is &lt;2021.186.1.5dsvn56950-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920094" version="1" comment="texlive-skeldoc is &lt;2021.186.0.0.1.2svn57922-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920095" version="1" comment="texlive-skeldoc-doc is &lt;2021.186.0.0.1.2svn57922-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920096" version="1" comment="texlive-skeycommand is &lt;2021.186.0.0.4svn24652-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920097" version="1" comment="texlive-skeycommand-doc is &lt;2021.186.0.0.4svn24652-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920098" version="1" comment="texlive-skeyval is &lt;2021.186.1.3svn30560-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920099" version="1" comment="texlive-skeyval-doc is &lt;2021.186.1.3svn30560-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920100" version="1" comment="texlive-skills is &lt;2021.186.1.0.0svn56734-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920101" version="1" comment="texlive-skills-doc is &lt;2021.186.1.0.0svn56734-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920102" version="1" comment="texlive-skmath is &lt;2021.186.0.0.5asvn52411-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920103" version="1" comment="texlive-skmath-doc is &lt;2021.186.0.0.5asvn52411-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920104" version="1" comment="texlive-skrapport is &lt;2021.186.0.0.12ksvn52412-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920105" version="1" comment="texlive-skrapport-doc is &lt;2021.186.0.0.12ksvn52412-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920106" version="1" comment="texlive-skull is &lt;2021.186.0.0.1svn51907-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920107" version="1" comment="texlive-slantsc is &lt;2021.186.2.11svn25007-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920108" version="1" comment="texlive-slantsc-doc is &lt;2021.186.2.11svn25007-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920109" version="1" comment="texlive-slideshow is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920110" version="1" comment="texlive-slideshow-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920111" version="1" comment="texlive-smalltableof is &lt;2021.186.svn20333-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920112" version="1" comment="texlive-smalltableof-doc is &lt;2021.186.svn20333-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920113" version="1" comment="texlive-smartdiagram is &lt;2021.186.0.0.3bsvn42781-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920114" version="1" comment="texlive-smartdiagram-doc is &lt;2021.186.0.0.3bsvn42781-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920115" version="1" comment="texlive-smartref is &lt;2021.186.1.9svn20311-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920116" version="1" comment="texlive-smartref-doc is &lt;2021.186.1.9svn20311-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920117" version="1" comment="texlive-smartunits is &lt;2021.186.1.2svn39592-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920118" version="1" comment="texlive-smartunits-doc is &lt;2021.186.1.2svn39592-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920119" version="1" comment="texlive-snapshot is &lt;2021.186.2.14svn56735-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920120" version="1" comment="texlive-snapshot-doc is &lt;2021.186.2.14svn56735-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920121" version="1" comment="texlive-snotez is &lt;2021.186.0.0.5asvn57147-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920122" version="1" comment="texlive-snotez-doc is &lt;2021.186.0.0.5asvn57147-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920123" version="1" comment="texlive-songbook is &lt;2021.186.4.5svn18136-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920124" version="1" comment="texlive-songbook-doc is &lt;2021.186.4.5svn18136-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920125" version="1" comment="texlive-songs is &lt;2021.186.3.1svn51494-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920126" version="1" comment="texlive-songs-doc is &lt;2021.186.3.1svn51494-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920127" version="1" comment="texlive-sort-by-letters is &lt;2021.186.svn27128-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920128" version="1" comment="texlive-sort-by-letters-doc is &lt;2021.186.svn27128-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920129" version="1" comment="texlive-soton is &lt;2021.186.0.0.1svn16215-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920130" version="1" comment="texlive-soton-doc is &lt;2021.186.0.0.1svn16215-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920131" version="1" comment="texlive-soul is &lt;2021.186.2.4svn56495-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920132" version="1" comment="texlive-soul-doc is &lt;2021.186.2.4svn56495-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920133" version="1" comment="texlive-soulpos is &lt;2021.186.1.1svn52663-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920134" version="1" comment="texlive-soulpos-doc is &lt;2021.186.1.1svn52663-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920135" version="1" comment="texlive-soulutf8 is &lt;2021.186.1.2svn53163-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920136" version="1" comment="texlive-soulutf8-doc is &lt;2021.186.1.2svn53163-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920137" version="1" comment="texlive-soup is &lt;2021.186.1.0.2svn50815-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920138" version="1" comment="texlive-soup-doc is &lt;2021.186.1.0.2svn50815-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920139" version="1" comment="texlive-sourcecodepro is &lt;2021.186.2.7svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920140" version="1" comment="texlive-sourcecodepro-doc is &lt;2021.186.2.7svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920141" version="1" comment="texlive-sourcecodepro-fonts is &lt;2021.186.2.7svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920142" version="1" comment="texlive-sourcesanspro is &lt;2021.186.2.8svn54892-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920143" version="1" comment="texlive-sourcesanspro-doc is &lt;2021.186.2.8svn54892-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920144" version="1" comment="texlive-sourcesanspro-fonts is &lt;2021.186.2.8svn54892-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920145" version="1" comment="texlive-sourceserifpro is &lt;2021.186.1.4svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920146" version="1" comment="texlive-sourceserifpro-doc is &lt;2021.186.1.4svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920147" version="1" comment="texlive-sourceserifpro-fonts is &lt;2021.186.1.4svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920148" version="1" comment="texlive-spacingtricks is &lt;2021.186.1.3svn56840-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920149" version="1" comment="texlive-spacingtricks-doc is &lt;2021.186.1.3svn56840-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920150" version="1" comment="texlive-spalign is &lt;2021.186.svn42225-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920151" version="1" comment="texlive-spalign-doc is &lt;2021.186.svn42225-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920152" version="1" comment="texlive-spark-otf is &lt;2021.186.0.0.05svn51005-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920153" version="1" comment="texlive-spark-otf-doc is &lt;2021.186.0.0.05svn51005-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920154" version="1" comment="texlive-sparklines is &lt;2021.186.1.7svn42821-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920155" version="1" comment="texlive-sparklines-doc is &lt;2021.186.1.7svn42821-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920156" version="1" comment="texlive-spath3 is &lt;2021.186.2.4svn57842-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920157" version="1" comment="texlive-spath3-doc is &lt;2021.186.2.4svn57842-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920158" version="1" comment="texlive-spectral is &lt;2021.186.svn57296-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920159" version="1" comment="texlive-spectral-doc is &lt;2021.186.svn57296-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920160" version="1" comment="texlive-spectral-fonts is &lt;2021.186.svn57296-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920161" version="1" comment="texlive-spectralsequences is &lt;2021.186.1.2.2svn50072-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920162" version="1" comment="texlive-spectralsequences-doc is &lt;2021.186.1.2.2svn50072-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920163" version="1" comment="texlive-spelling is &lt;2021.186.0.0.41svn30715-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920164" version="1" comment="texlive-spelling-doc is &lt;2021.186.0.0.41svn30715-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920165" version="1" comment="texlive-sphdthesis is &lt;2021.186.1.0svn34374-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920166" version="1" comment="texlive-sphdthesis-doc is &lt;2021.186.1.0svn34374-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920167" version="1" comment="texlive-spie is &lt;2021.186.3.25svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920168" version="1" comment="texlive-spie-doc is &lt;2021.186.3.25svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920169" version="1" comment="texlive-spix is &lt;2021.186.1.1.0svn55933-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920170" version="1" comment="texlive-spix-doc is &lt;2021.186.1.1.0svn55933-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920171" version="1" comment="texlive-splines is &lt;2021.186.0.0.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920172" version="1" comment="texlive-splines-doc is &lt;2021.186.0.0.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920173" version="1" comment="texlive-splitbib is &lt;2021.186.1.17svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920174" version="1" comment="texlive-splitbib-doc is &lt;2021.186.1.17svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920175" version="1" comment="texlive-splitindex is &lt;2021.186.1.2csvn39766-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920176" version="1" comment="texlive-splitindex-doc is &lt;2021.186.1.2csvn39766-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920177" version="1" comment="texlive-spot is &lt;2021.186.1.1svn22408-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920178" version="1" comment="texlive-spot-doc is &lt;2021.186.1.1svn22408-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920179" version="1" comment="texlive-spotcolor is &lt;2021.186.1.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920180" version="1" comment="texlive-spotcolor-doc is &lt;2021.186.1.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920181" version="1" comment="texlive-spreadtab is &lt;2021.186.0.0.5svn50147-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920182" version="1" comment="texlive-spreadtab-doc is &lt;2021.186.0.0.5svn50147-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920183" version="1" comment="texlive-spverbatim is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920184" version="1" comment="texlive-spverbatim-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920185" version="1" comment="texlive-sr-vorl is &lt;2021.186.1.1svn39529-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920186" version="1" comment="texlive-sr-vorl-doc is &lt;2021.186.1.1svn39529-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920187" version="1" comment="texlive-srbook-mem is &lt;2021.186.svn45818-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920188" version="1" comment="texlive-srbook-mem-doc is &lt;2021.186.svn45818-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920189" version="1" comment="texlive-srcltx is &lt;2021.186.1.6svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920190" version="1" comment="texlive-srcltx-doc is &lt;2021.186.1.6svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920191" version="1" comment="texlive-srcredact is &lt;2021.186.1.0svn38710-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920192" version="1" comment="texlive-srcredact-doc is &lt;2021.186.1.0svn38710-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920193" version="1" comment="texlive-srdp-mathematik is &lt;2021.186.1.9.0svn58734-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920194" version="1" comment="texlive-srdp-mathematik-doc is &lt;2021.186.1.9.0svn58734-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920195" version="1" comment="texlive-sseq is &lt;2021.186.2.01svn31585-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920196" version="1" comment="texlive-sseq-doc is &lt;2021.186.2.01svn31585-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920197" version="1" comment="texlive-sslides is &lt;2021.186.svn32293-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920198" version="1" comment="texlive-sslides-doc is &lt;2021.186.svn32293-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920199" version="1" comment="texlive-stack is &lt;2021.186.1.00svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920200" version="1" comment="texlive-stackengine is &lt;2021.186.4.01svn53843-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920201" version="1" comment="texlive-stackengine-doc is &lt;2021.186.4.01svn53843-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920202" version="1" comment="texlive-stage is &lt;2021.186.1.01svn53915-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920203" version="1" comment="texlive-stage-doc is &lt;2021.186.1.01svn53915-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920204" version="1" comment="texlive-standalone is &lt;2021.186.1.3asvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920205" version="1" comment="texlive-standalone-doc is &lt;2021.186.1.3asvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920206" version="1" comment="texlive-stanli is &lt;2021.186.3.0svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920207" version="1" comment="texlive-stanli-doc is &lt;2021.186.3.0svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920208" version="1" comment="texlive-starfont is &lt;2021.186.1.2svn19982-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920209" version="1" comment="texlive-starfont-doc is &lt;2021.186.1.2svn19982-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920210" version="1" comment="texlive-starfont-fonts is &lt;2021.186.1.2svn19982-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920211" version="1" comment="texlive-startex is &lt;2021.186.1.04svn35718-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920212" version="1" comment="texlive-startex-doc is &lt;2021.186.1.04svn35718-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920213" version="1" comment="texlive-startlatex2e is &lt;2021.186.svn56809-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920214" version="1" comment="texlive-statex is &lt;2021.186.1.6svn20306-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920215" version="1" comment="texlive-statex-doc is &lt;2021.186.1.6svn20306-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920216" version="1" comment="texlive-statex2 is &lt;2021.186.2.1svn23961-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920217" version="1" comment="texlive-statex2-doc is &lt;2021.186.2.1svn23961-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920218" version="1" comment="texlive-statistics is &lt;2021.186.2.2svn52212-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920219" version="1" comment="texlive-statistics-doc is &lt;2021.186.2.2svn52212-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920220" version="1" comment="texlive-statistik is &lt;2021.186.0.0.03svn20334-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920221" version="1" comment="texlive-statistik-doc is &lt;2021.186.0.0.03svn20334-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920222" version="1" comment="texlive-statmath is &lt;2021.186.0.0.1svn46925-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920223" version="1" comment="texlive-statmath-doc is &lt;2021.186.0.0.1svn46925-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920224" version="1" comment="texlive-staves is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920225" version="1" comment="texlive-staves-doc is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920226" version="1" comment="texlive-staves-fonts is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920227" version="1" comment="texlive-stdclsdv is &lt;2021.186.1.1asvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920228" version="1" comment="texlive-stdclsdv-doc is &lt;2021.186.1.1asvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920229" version="1" comment="texlive-stdpage is &lt;2021.186.0.0.6svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920230" version="1" comment="texlive-stdpage-doc is &lt;2021.186.0.0.6svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920231" version="1" comment="texlive-stealcaps is &lt;2021.186.1.0svn46434-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920232" version="1" comment="texlive-stealcaps-doc is &lt;2021.186.1.0svn46434-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920233" version="1" comment="texlive-steinmetz is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920234" version="1" comment="texlive-steinmetz-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920235" version="1" comment="texlive-stellenbosch is &lt;2021.186.11asvn36696-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920236" version="1" comment="texlive-stellenbosch-doc is &lt;2021.186.11asvn36696-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920237" version="1" comment="texlive-step is &lt;2021.186.2.0.5svn57307-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920238" version="1" comment="texlive-step-doc is &lt;2021.186.2.0.5svn57307-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920239" version="1" comment="texlive-step-fonts is &lt;2021.186.2.0.5svn57307-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920240" version="1" comment="texlive-stepgreek is &lt;2021.186.3.0b1svn57074-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920241" version="1" comment="texlive-stepgreek-doc is &lt;2021.186.3.0b1svn57074-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920242" version="1" comment="texlive-stepgreek-fonts is &lt;2021.186.3.0b1svn57074-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920243" version="1" comment="texlive-stex is &lt;2021.186.svn50489-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920244" version="1" comment="texlive-stex-doc is &lt;2021.186.svn50489-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920245" version="1" comment="texlive-stickstoo is &lt;2021.186.1.034svn57193-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920246" version="1" comment="texlive-stickstoo-doc is &lt;2021.186.1.034svn57193-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920247" version="1" comment="texlive-stickstoo-fonts is &lt;2021.186.1.034svn57193-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920248" version="1" comment="texlive-stix is &lt;2021.186.1.1.3svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920249" version="1" comment="texlive-stix-doc is &lt;2021.186.1.1.3svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920250" version="1" comment="texlive-stix-fonts is &lt;2021.186.1.1.3svn54512-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920251" version="1" comment="texlive-stix2-otf is &lt;2021.186.2.12svn58735-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920252" version="1" comment="texlive-stix2-otf-doc is &lt;2021.186.2.12svn58735-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920253" version="1" comment="texlive-stix2-otf-fonts is &lt;2021.186.2.12svn58735-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920254" version="1" comment="texlive-stix2-type1 is &lt;2021.186.2.0.2svn57448-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920255" version="1" comment="texlive-stix2-type1-doc is &lt;2021.186.2.0.2svn57448-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920256" version="1" comment="texlive-stix2-type1-fonts is &lt;2021.186.2.0.2svn57448-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920257" version="1" comment="texlive-stmaryrd is &lt;2021.186.svn22027-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920258" version="1" comment="texlive-stmaryrd-doc is &lt;2021.186.svn22027-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920259" version="1" comment="texlive-stmaryrd-fonts is &lt;2021.186.svn22027-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920260" version="1" comment="texlive-storebox is &lt;2021.186.1.3asvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920261" version="1" comment="texlive-storebox-doc is &lt;2021.186.1.3asvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920262" version="1" comment="texlive-storecmd is &lt;2021.186.0.0.0.2svn24431-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920263" version="1" comment="texlive-storecmd-doc is &lt;2021.186.0.0.0.2svn24431-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920264" version="1" comment="texlive-stricttex is &lt;2021.186.0.0.2betasvn56320-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920265" version="1" comment="texlive-stricttex-doc is &lt;2021.186.0.0.2betasvn56320-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920266" version="1" comment="texlive-stringenc is &lt;2021.186.1.12svn52982-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920267" version="1" comment="texlive-stringenc-doc is &lt;2021.186.1.12svn52982-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920268" version="1" comment="texlive-stringstrings is &lt;2021.186.1.24svn57097-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920269" version="1" comment="texlive-stringstrings-doc is &lt;2021.186.1.24svn57097-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920270" version="1" comment="texlive-structmech is &lt;2021.186.1.0svn47859-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920271" version="1" comment="texlive-struktex is &lt;2021.186.2.3c_0_g7d3fc5bsvn47931-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920272" version="1" comment="texlive-struktex-doc is &lt;2021.186.2.3c_0_g7d3fc5bsvn47931-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920273" version="1" comment="texlive-sttools is &lt;2021.186.2.1svn56774-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920274" version="1" comment="texlive-sttools-doc is &lt;2021.186.2.1svn56774-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920275" version="1" comment="texlive-stubs is &lt;2021.186.0.0.1.1svn19440-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920276" version="1" comment="texlive-stubs-doc is &lt;2021.186.0.0.1.1svn19440-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920277" version="1" comment="texlive-studenthandouts is &lt;2021.186.1.0svn43516-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920278" version="1" comment="texlive-studenthandouts-doc is &lt;2021.186.1.0svn43516-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920279" version="1" comment="texlive-sty2dtx is &lt;2021.186.2.3svn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920280" version="1" comment="texlive-sty2dtx-doc is &lt;2021.186.2.3svn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920281" version="1" comment="texlive-suanpan is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920282" version="1" comment="texlive-suanpan-doc is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920283" version="1" comment="texlive-subdepth is &lt;2021.186.0.0.1svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920284" version="1" comment="texlive-subdepth-doc is &lt;2021.186.0.0.1svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920285" version="1" comment="texlive-subdocs is &lt;2021.186.0.0.1svn51480-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920286" version="1" comment="texlive-subdocs-doc is &lt;2021.186.0.0.1svn51480-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920287" version="1" comment="texlive-subeqn is &lt;2021.186.2.0bsvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920288" version="1" comment="texlive-subeqn-doc is &lt;2021.186.2.0bsvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920289" version="1" comment="texlive-subeqnarray is &lt;2021.186.2.1csvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920290" version="1" comment="texlive-subeqnarray-doc is &lt;2021.186.2.1csvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920291" version="1" comment="texlive-subfig is &lt;2021.186.1.3svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920292" version="1" comment="texlive-subfig-doc is &lt;2021.186.1.3svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920293" version="1" comment="texlive-subfigmat is &lt;2021.186.1.0svn20308-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920294" version="1" comment="texlive-subfigmat-doc is &lt;2021.186.1.0svn20308-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920295" version="1" comment="texlive-subfigure is &lt;2021.186.2.1.5svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920296" version="1" comment="texlive-subfigure-doc is &lt;2021.186.2.1.5svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920297" version="1" comment="texlive-subfiles is &lt;2021.186.2.2svn56977-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920298" version="1" comment="texlive-subfiles-doc is &lt;2021.186.2.2svn56977-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920299" version="1" comment="texlive-subfloat is &lt;2021.186.2.14svn29349-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920300" version="1" comment="texlive-subfloat-doc is &lt;2021.186.2.14svn29349-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920301" version="1" comment="texlive-substances is &lt;2021.186.0.0.2asvn40989-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920302" version="1" comment="texlive-substances-doc is &lt;2021.186.0.0.2asvn40989-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920303" version="1" comment="texlive-substitutefont is &lt;2021.186.0.0.1.4svn32066-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920304" version="1" comment="texlive-substitutefont-doc is &lt;2021.186.0.0.1.4svn32066-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920305" version="1" comment="texlive-substr is &lt;2021.186.1.2svn16117-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920306" version="1" comment="texlive-substr-doc is &lt;2021.186.1.2svn16117-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920307" version="1" comment="texlive-subsupscripts is &lt;2021.186.1.0svn16080-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920308" version="1" comment="texlive-subsupscripts-doc is &lt;2021.186.1.0svn16080-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920309" version="1" comment="texlive-subtext is &lt;2021.186.1.1svn51273-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920310" version="1" comment="texlive-subtext-doc is &lt;2021.186.1.1svn51273-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920311" version="1" comment="texlive-sudoku is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920312" version="1" comment="texlive-sudoku-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920313" version="1" comment="texlive-sudokubundle is &lt;2021.186.1.0asvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920314" version="1" comment="texlive-sudokubundle-doc is &lt;2021.186.1.0asvn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920315" version="1" comment="texlive-suftesi is &lt;2021.186.3.0.2svn57650-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920316" version="1" comment="texlive-suftesi-doc is &lt;2021.186.3.0.2svn57650-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920317" version="1" comment="texlive-sugconf is &lt;2021.186.svn58752-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920318" version="1" comment="texlive-sugconf-doc is &lt;2021.186.svn58752-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920319" version="1" comment="texlive-superiors is &lt;2021.186.1.06svn51909-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920320" version="1" comment="texlive-superiors-doc is &lt;2021.186.1.06svn51909-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920321" version="1" comment="texlive-superiors-fonts is &lt;2021.186.1.06svn51909-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920322" version="1" comment="texlive-supertabular is &lt;2021.186.4.1gsvn53658-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920323" version="1" comment="texlive-supertabular-doc is &lt;2021.186.4.1gsvn53658-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920324" version="1" comment="texlive-suppose is &lt;2021.186.1.2svn58736-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920325" version="1" comment="texlive-suppose-doc is &lt;2021.186.1.2svn58736-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920326" version="1" comment="texlive-susy is &lt;2021.186.svn19440-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920327" version="1" comment="texlive-susy-doc is &lt;2021.186.svn19440-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920328" version="1" comment="texlive-svg is &lt;2021.186.2.02ksvn57010-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920329" version="1" comment="texlive-svg-doc is &lt;2021.186.2.02ksvn57010-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920330" version="1" comment="texlive-svg-inkscape is &lt;2021.186.svn32199-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920331" version="1" comment="texlive-svgcolor is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920332" version="1" comment="texlive-svgcolor-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920333" version="1" comment="texlive-svn is &lt;2021.186.43svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920334" version="1" comment="texlive-svn-doc is &lt;2021.186.43svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920335" version="1" comment="texlive-svn-multi is &lt;2021.186.2.4dsvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920336" version="1" comment="texlive-svn-multi-doc is &lt;2021.186.2.4dsvn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920337" version="1" comment="texlive-svn-prov is &lt;2021.186.3.1862svn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920338" version="1" comment="texlive-svn-prov-doc is &lt;2021.186.3.1862svn56291-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920339" version="1" comment="texlive-svninfo is &lt;2021.186.0.0.7.4svn17554-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920340" version="1" comment="texlive-svninfo-doc is &lt;2021.186.0.0.7.4svn17554-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920341" version="1" comment="texlive-svrsymbols is &lt;2021.186.2.0bsvn50019-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920342" version="1" comment="texlive-svrsymbols-doc is &lt;2021.186.2.0bsvn50019-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920343" version="1" comment="texlive-svrsymbols-fonts is &lt;2021.186.2.0bsvn50019-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920344" version="1" comment="texlive-swebib is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920345" version="1" comment="texlive-swebib-doc is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920346" version="1" comment="texlive-swfigure is &lt;2021.186.0.0.9.18svn57213-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920347" version="1" comment="texlive-swfigure-doc is &lt;2021.186.0.0.9.18svn57213-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920348" version="1" comment="texlive-swimgraf is &lt;2021.186.svn25446-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920349" version="1" comment="texlive-swimgraf-doc is &lt;2021.186.svn25446-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920350" version="1" comment="texlive-swrule is &lt;2021.186.svn54267-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920351" version="1" comment="texlive-syllogism is &lt;2021.186.1.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920352" version="1" comment="texlive-syllogism-doc is &lt;2021.186.1.2svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920353" version="1" comment="texlive-symbol is &lt;2021.186.svn31835-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920354" version="1" comment="texlive-symbol-fonts is &lt;2021.186.svn31835-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920355" version="1" comment="texlive-synctex is &lt;2021.186.svn54074-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920356" version="1" comment="texlive-synproof is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920357" version="1" comment="texlive-synproof-doc is &lt;2021.186.1.0svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920358" version="1" comment="texlive-syntax is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920359" version="1" comment="texlive-syntax-doc is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920360" version="1" comment="texlive-syntaxdi is &lt;2021.186.0.0.8.2svn56685-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920361" version="1" comment="texlive-syntaxdi-doc is &lt;2021.186.0.0.8.2svn56685-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920362" version="1" comment="texlive-syntrace is &lt;2021.186.1.1svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920363" version="1" comment="texlive-syntrace-doc is &lt;2021.186.1.1svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920364" version="1" comment="texlive-synttree is &lt;2021.186.1.4.2svn16252-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920365" version="1" comment="texlive-synttree-doc is &lt;2021.186.1.4.2svn16252-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920366" version="1" comment="texlive-systeme is &lt;2021.186.0.0.34svn55015-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920367" version="1" comment="texlive-systeme-doc is &lt;2021.186.0.0.34svn55015-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920368" version="1" comment="texlive-t-angles is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920369" version="1" comment="texlive-t-angles-doc is &lt;2021.186.svn15878-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920370" version="1" comment="texlive-t2 is &lt;2021.186.svn47870-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920371" version="1" comment="texlive-t2-doc is &lt;2021.186.svn47870-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920372" version="1" comment="texlive-tabfigures is &lt;2021.186.1.1svn25202-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920373" version="1" comment="texlive-tabfigures-doc is &lt;2021.186.1.1svn25202-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920374" version="1" comment="texlive-table-fct is &lt;2021.186.1.1svn41849-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920375" version="1" comment="texlive-table-fct-doc is &lt;2021.186.1.1svn41849-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920376" version="1" comment="texlive-tableaux is &lt;2021.186.svn42413-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920377" version="1" comment="texlive-tableaux-doc is &lt;2021.186.svn42413-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920378" version="1" comment="texlive-tablefootnote is &lt;2021.186.1.1csvn32804-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920379" version="1" comment="texlive-tablefootnote-doc is &lt;2021.186.1.1csvn32804-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920380" version="1" comment="texlive-tableof is &lt;2021.186.1.4bsvn48815-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920381" version="1" comment="texlive-tableof-doc is &lt;2021.186.1.4bsvn48815-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920382" version="1" comment="texlive-tablestyles is &lt;2021.186.0.0.1svn34495-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920383" version="1" comment="texlive-tablestyles-doc is &lt;2021.186.0.0.1svn34495-50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920384" version="1" comment="texlive-scripts is &lt;2021.186.svn58742-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920385" version="1" comment="texlive-scripts-doc is &lt;2021.186.svn58742-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920386" version="1" comment="texlive-scripts-extra is &lt;2021.186.svn54744-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920387" version="1" comment="texlive-scripts-extra-doc is &lt;2021.186.svn54744-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920388" version="1" comment="texlive-tablists is &lt;2021.186.0.0.0esvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920389" version="1" comment="texlive-tablists-doc is &lt;2021.186.0.0.0esvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920390" version="1" comment="texlive-tablor is &lt;2021.186.4.07_gsvn31855-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920391" version="1" comment="texlive-tablor-doc is &lt;2021.186.4.07_gsvn31855-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920392" version="1" comment="texlive-tabls is &lt;2021.186.3.5svn17255-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920393" version="1" comment="texlive-tabls-doc is &lt;2021.186.3.5svn17255-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920394" version="1" comment="texlive-tablvar is &lt;2021.186.1.2svn51543-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920395" version="1" comment="texlive-tablvar-doc is &lt;2021.186.1.2svn51543-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920396" version="1" comment="texlive-tabriz-thesis is &lt;2021.186.1.1svn51729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920397" version="1" comment="texlive-tabriz-thesis-doc is &lt;2021.186.1.1svn51729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920398" version="1" comment="texlive-tabstackengine is &lt;2021.186.2.10svn46848-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920399" version="1" comment="texlive-tabstackengine-doc is &lt;2021.186.2.10svn46848-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920400" version="1" comment="texlive-tabto-generic is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920401" version="1" comment="texlive-tabto-ltx is &lt;2021.186.1.4svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920402" version="1" comment="texlive-tabto-ltx-doc is &lt;2021.186.1.4svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920403" version="1" comment="texlive-tabu is &lt;2021.186.2.9svn56615-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920404" version="1" comment="texlive-tabu-doc is &lt;2021.186.2.9svn56615-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920405" version="1" comment="texlive-tabularborder is &lt;2021.186.1.0asvn17885-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920406" version="1" comment="texlive-tabularborder-doc is &lt;2021.186.1.0asvn17885-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920407" version="1" comment="texlive-tabularcalc is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920408" version="1" comment="texlive-tabularcalc-doc is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920409" version="1" comment="texlive-tabularew is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920410" version="1" comment="texlive-tabularew-doc is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920411" version="1" comment="texlive-tabulary is &lt;2021.186.0.0.10svn34368-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920412" version="1" comment="texlive-tabulary-doc is &lt;2021.186.0.0.10svn34368-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920413" version="1" comment="texlive-tabvar is &lt;2021.186.1.7svn28908-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920414" version="1" comment="texlive-tabvar-doc is &lt;2021.186.1.7svn28908-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920415" version="1" comment="texlive-tabvar-fonts is &lt;2021.186.1.7svn28908-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920416" version="1" comment="texlive-tagging is &lt;2021.186.1.1.0.1svn52064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920417" version="1" comment="texlive-tagging-doc is &lt;2021.186.1.1.0.1svn52064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920418" version="1" comment="texlive-tagpair is &lt;2021.186.1.1svn42138-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920419" version="1" comment="texlive-tagpair-doc is &lt;2021.186.1.1svn42138-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920420" version="1" comment="texlive-tagpdf is &lt;2021.186.0.0.80svn57954-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920421" version="1" comment="texlive-tagpdf-doc is &lt;2021.186.0.0.80svn57954-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920422" version="1" comment="texlive-talk is &lt;2021.186.1.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920423" version="1" comment="texlive-talk-doc is &lt;2021.186.1.1svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920424" version="1" comment="texlive-tamefloats is &lt;2021.186.0.0.42svn27345-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920425" version="1" comment="texlive-tamefloats-doc is &lt;2021.186.0.0.42svn27345-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920426" version="1" comment="texlive-tamethebeast is &lt;2021.186.1.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920427" version="1" comment="texlive-tap is &lt;2021.186.0.0.77svn31731-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920428" version="1" comment="texlive-tap-doc is &lt;2021.186.0.0.77svn31731-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920429" version="1" comment="texlive-tapir is &lt;2021.186.0.0.2svn20484-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920430" version="1" comment="texlive-tapir-doc is &lt;2021.186.0.0.2svn20484-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920431" version="1" comment="texlive-tapir-fonts is &lt;2021.186.0.0.2svn20484-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920432" version="1" comment="texlive-tasks is &lt;2021.186.1.3asvn57835-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920433" version="1" comment="texlive-tasks-doc is &lt;2021.186.1.3asvn57835-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920434" version="1" comment="texlive-tcldoc is &lt;2021.186.2.40svn22018-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920435" version="1" comment="texlive-tcldoc-doc is &lt;2021.186.2.40svn22018-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920436" version="1" comment="texlive-tcolorbox is &lt;2021.186.4.42svn56610-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920437" version="1" comment="texlive-tcolorbox-doc is &lt;2021.186.4.42svn56610-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920438" version="1" comment="texlive-tdclock is &lt;2021.186.2.5svn33043-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920439" version="1" comment="texlive-tdclock-doc is &lt;2021.186.2.5svn33043-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920440" version="1" comment="texlive-tds is &lt;2021.186.1.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920441" version="1" comment="texlive-tdsfrmath is &lt;2021.186.1.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920442" version="1" comment="texlive-tdsfrmath-doc is &lt;2021.186.1.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920443" version="1" comment="texlive-technics is &lt;2021.186.1.0svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920444" version="1" comment="texlive-technics-doc is &lt;2021.186.1.0svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920445" version="1" comment="texlive-technion-thesis-template is &lt;2021.186.1.0svn49889-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920446" version="1" comment="texlive-technion-thesis-template-doc is &lt;2021.186.1.0svn49889-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920447" version="1" comment="texlive-ted is &lt;2021.186.1.06svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920448" version="1" comment="texlive-ted-doc is &lt;2021.186.1.06svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920449" version="1" comment="texlive-templates-fenn is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920450" version="1" comment="texlive-templates-sommer is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920451" version="1" comment="texlive-templatetools is &lt;2021.186.svn34495-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920452" version="1" comment="texlive-templatetools-doc is &lt;2021.186.svn34495-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920453" version="1" comment="texlive-tempora is &lt;2021.186.1.05svn39596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920454" version="1" comment="texlive-tempora-doc is &lt;2021.186.1.05svn39596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920455" version="1" comment="texlive-tempora-fonts is &lt;2021.186.1.05svn39596-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920456" version="1" comment="texlive-tengwarscript is &lt;2021.186.1.3.1svn34594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920457" version="1" comment="texlive-tengwarscript-doc is &lt;2021.186.1.3.1svn34594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920458" version="1" comment="texlive-tensind is &lt;2021.186.1.1svn51481-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920459" version="1" comment="texlive-tensind-doc is &lt;2021.186.1.1svn51481-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920460" version="1" comment="texlive-tensor is &lt;2021.186.2.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920461" version="1" comment="texlive-tensor-doc is &lt;2021.186.2.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920462" version="1" comment="texlive-termcal is &lt;2021.186.1.8svn22514-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920463" version="1" comment="texlive-termcal-de is &lt;2021.186.2.0svn47111-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920464" version="1" comment="texlive-termcal-de-doc is &lt;2021.186.2.0svn47111-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920465" version="1" comment="texlive-termcal-doc is &lt;2021.186.1.8svn22514-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920466" version="1" comment="texlive-termlist is &lt;2021.186.1.1svn18923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920467" version="1" comment="texlive-termlist-doc is &lt;2021.186.1.1svn18923-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920468" version="1" comment="texlive-termmenu is &lt;2021.186.svn37700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920469" version="1" comment="texlive-termmenu-doc is &lt;2021.186.svn37700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920470" version="1" comment="texlive-testhyphens is &lt;2021.186.0.0.7svn38928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920471" version="1" comment="texlive-testhyphens-doc is &lt;2021.186.0.0.7svn38928-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920472" version="1" comment="texlive-testidx is &lt;2021.186.1.2svn52213-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920473" version="1" comment="texlive-testidx-doc is &lt;2021.186.1.2svn52213-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920474" version="1" comment="texlive-tetragonos is &lt;2021.186.1svn49732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920475" version="1" comment="texlive-tetragonos-doc is &lt;2021.186.1svn49732-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920476" version="1" comment="texlive-teubner is &lt;2021.186.5.4svn57684-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920477" version="1" comment="texlive-teubner-doc is &lt;2021.186.5.4svn57684-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920478" version="1" comment="texlive-tex is &lt;2021.186.3.141592653svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920479" version="1" comment="texlive-tex-ewd is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920480" version="1" comment="texlive-tex-ewd-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920481" version="1" comment="texlive-tex-font-errors-cheatsheet is &lt;2021.186.0.0.1svn18314-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920482" version="1" comment="texlive-tex-gyre is &lt;2021.186.2.501svn48058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920483" version="1" comment="texlive-tex-gyre-doc is &lt;2021.186.2.501svn48058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920484" version="1" comment="texlive-tex-gyre-fonts is &lt;2021.186.2.501svn48058-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920485" version="1" comment="texlive-tex-gyre-math is &lt;2021.186.svn41264-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920486" version="1" comment="texlive-tex-gyre-math-doc is &lt;2021.186.svn41264-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920487" version="1" comment="texlive-tex-gyre-math-fonts is &lt;2021.186.svn41264-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920488" version="1" comment="texlive-tex-ini-files is &lt;2021.186.svn40533-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920489" version="1" comment="texlive-tex-ini-files-doc is &lt;2021.186.svn40533-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920490" version="1" comment="texlive-tex-label is &lt;2021.186.svn16372-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920491" version="1" comment="texlive-tex-label-doc is &lt;2021.186.svn16372-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920492" version="1" comment="texlive-tex-locale is &lt;2021.186.1.0svn48500-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920493" version="1" comment="texlive-tex-locale-doc is &lt;2021.186.1.0svn48500-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920494" version="1" comment="texlive-tex-nutshell is &lt;2021.186.0.0.6svn58471-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920495" version="1" comment="texlive-tex-overview is &lt;2021.186.0.0.2svn41403-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920496" version="1" comment="texlive-tex-ps is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920497" version="1" comment="texlive-tex-ps-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920498" version="1" comment="texlive-tex-refs is &lt;2021.186.0.0.4.8svn57349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920499" version="1" comment="texlive-tex-virtual-academy-pl is &lt;2021.186.svn34177-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920500" version="1" comment="texlive-tex4ebook is &lt;2021.186.0.0.3csvn56878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920501" version="1" comment="texlive-tex4ebook-doc is &lt;2021.186.0.0.3csvn56878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920502" version="1" comment="texlive-tex4ht is &lt;2021.186.svn58348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920503" version="1" comment="texlive-tex4ht-doc is &lt;2021.186.svn58348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920504" version="1" comment="texlive-texapi is &lt;2021.186.1.04svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920505" version="1" comment="texlive-texapi-doc is &lt;2021.186.1.04svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920506" version="1" comment="texlive-texbytopic is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920507" version="1" comment="texlive-texcount is &lt;2021.186.3.1.1svn49013-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920508" version="1" comment="texlive-texcount-doc is &lt;2021.186.3.1.1svn49013-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920509" version="1" comment="texlive-texdate is &lt;2021.186.2.0svn49362-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920510" version="1" comment="texlive-texdate-doc is &lt;2021.186.2.0svn49362-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920511" version="1" comment="texlive-texdef is &lt;2021.186.1.9svn56466-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920512" version="1" comment="texlive-texdef-doc is &lt;2021.186.1.9svn56466-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920513" version="1" comment="texlive-texdiff is &lt;2021.186.0.0.4svn29752-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920514" version="1" comment="texlive-texdiff-doc is &lt;2021.186.0.0.4svn29752-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920515" version="1" comment="texlive-texdirflatten is &lt;2021.186.1.3svn55064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920516" version="1" comment="texlive-texdirflatten-doc is &lt;2021.186.1.3svn55064-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920517" version="1" comment="texlive-texdoc is &lt;2021.186.3.3svn58477-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920518" version="1" comment="texlive-texdoc-doc is &lt;2021.186.3.3svn58477-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920519" version="1" comment="texlive-texdoctk is &lt;2021.186.0.0.6.0svn54557-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920520" version="1" comment="texlive-texdoctk-doc is &lt;2021.186.0.0.6.0svn54557-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920521" version="1" comment="texlive-texdraw is &lt;2021.186.v2r3svn51030-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920522" version="1" comment="texlive-texdraw-doc is &lt;2021.186.v2r3svn51030-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920523" version="1" comment="texlive-texfot is &lt;2021.186.1.40svn54246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920524" version="1" comment="texlive-texfot-doc is &lt;2021.186.1.40svn54246-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920525" version="1" comment="texlive-texilikechaps is &lt;2021.186.1.0asvn28553-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920526" version="1" comment="texlive-texilikecover is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920527" version="1" comment="texlive-texinfo is &lt;2021.186.5.1svn57911-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920528" version="1" comment="texlive-texlive-common is &lt;2021.186.svn58055-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920529" version="1" comment="texlive-texlive-cz is &lt;2021.186.svn54496-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920530" version="1" comment="texlive-texlive-de is &lt;2021.186.svn58648-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920531" version="1" comment="texlive-texlive-en is &lt;2021.186.svn58572-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920532" version="1" comment="texlive-texlive-es is &lt;2021.186.svn58221-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920533" version="1" comment="texlive-texlive-fr is &lt;2021.186.svn58579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920534" version="1" comment="texlive-texlive-it is &lt;2021.186.svn58653-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920535" version="1" comment="texlive-texlive-ja is &lt;2021.186.svn58581-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920536" version="1" comment="texlive-texlive-pl is &lt;2021.186.svn58649-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920537" version="1" comment="texlive-texlive-ru is &lt;2021.186.svn58426-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920538" version="1" comment="texlive-texlive-sr is &lt;2021.186.svn54594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920539" version="1" comment="texlive-texlive-zh-cn is &lt;2021.186.svn54490-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920540" version="1" comment="texlive-texlive.infra is &lt;2021.186.svn58646-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920541" version="1" comment="texlive-texlive.infra-doc is &lt;2021.186.svn58646-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920542" version="1" comment="texlive-texliveonfly is &lt;2021.186.svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920543" version="1" comment="texlive-texliveonfly-doc is &lt;2021.186.svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920544" version="1" comment="texlive-texloganalyser is &lt;2021.186.0.0.11svn54526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920545" version="1" comment="texlive-texloganalyser-doc is &lt;2021.186.0.0.11svn54526-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920546" version="1" comment="texlive-texlogos is &lt;2021.186.1.3.1svn19083-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920547" version="1" comment="texlive-texmate is &lt;2021.186.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920548" version="1" comment="texlive-texmate-doc is &lt;2021.186.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920549" version="1" comment="texlive-texments is &lt;2021.186.0.0.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920550" version="1" comment="texlive-texments-doc is &lt;2021.186.0.0.2.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920551" version="1" comment="texlive-texnegar is &lt;2021.186.0.0.1esvn57692-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920552" version="1" comment="texlive-texnegar-doc is &lt;2021.186.0.0.1esvn57692-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920553" version="1" comment="texlive-texonly is &lt;2021.186.2svn50985-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920554" version="1" comment="texlive-texosquery is &lt;2021.186.1.7svn53676-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920555" version="1" comment="texlive-texosquery-doc is &lt;2021.186.1.7svn53676-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920556" version="1" comment="texlive-texplate is &lt;2021.186.1.0.3svn56083-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920557" version="1" comment="texlive-texplate-doc is &lt;2021.186.1.0.3svn56083-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920558" version="1" comment="texlive-texpower is &lt;2021.186.0.0.2svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920559" version="1" comment="texlive-texpower-doc is &lt;2021.186.0.0.2svn29349-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920560" version="1" comment="texlive-texproposal is &lt;2021.186.1.4svn43151-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920561" version="1" comment="texlive-texshade is &lt;2021.186.1.25svn46559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920562" version="1" comment="texlive-texshade-doc is &lt;2021.186.1.25svn46559-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920563" version="1" comment="texlive-texsis is &lt;2021.186.2.18svn45678-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920564" version="1" comment="texlive-texsis-doc is &lt;2021.186.2.18svn45678-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920565" version="1" comment="texlive-textcase is &lt;2021.186.1.00svn52092-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920566" version="1" comment="texlive-textcase-doc is &lt;2021.186.1.00svn52092-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920567" version="1" comment="texlive-textfit is &lt;2021.186.5svn20591-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920568" version="1" comment="texlive-textfit-doc is &lt;2021.186.5svn20591-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920569" version="1" comment="texlive-textglos is &lt;2021.186.1.0svn30788-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920570" version="1" comment="texlive-textglos-doc is &lt;2021.186.1.0svn30788-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920571" version="1" comment="texlive-textgreek is &lt;2021.186.0.0.7svn44192-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920572" version="1" comment="texlive-textgreek-doc is &lt;2021.186.0.0.7svn44192-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920573" version="1" comment="texlive-textmerg is &lt;2021.186.2.01svn20677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920574" version="1" comment="texlive-textmerg-doc is &lt;2021.186.2.01svn20677-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920575" version="1" comment="texlive-textopo is &lt;2021.186.1.5svn23796-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920576" version="1" comment="texlive-textopo-doc is &lt;2021.186.1.5svn23796-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920577" version="1" comment="texlive-textpath is &lt;2021.186.1.6svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920578" version="1" comment="texlive-textpath-doc is &lt;2021.186.1.6svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920579" version="1" comment="texlive-textpos is &lt;2021.186.1.10svn56441-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920580" version="1" comment="texlive-textpos-doc is &lt;2021.186.1.10svn56441-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920581" version="1" comment="texlive-textualicomma is &lt;2021.186.1.1svn48474-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920582" version="1" comment="texlive-textualicomma-doc is &lt;2021.186.1.1svn48474-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920583" version="1" comment="texlive-texvc is &lt;2021.186.1.1svn46844-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920584" version="1" comment="texlive-texvc-doc is &lt;2021.186.1.1svn46844-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920585" version="1" comment="texlive-texware is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920586" version="1" comment="texlive-tfrupee is &lt;2021.186.1.02svn20770-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920587" version="1" comment="texlive-tfrupee-doc is &lt;2021.186.1.02svn20770-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920588" version="1" comment="texlive-tfrupee-fonts is &lt;2021.186.1.02svn20770-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920589" version="1" comment="texlive-thaienum is &lt;2021.186.0.0.2svn44140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920590" version="1" comment="texlive-thaienum-doc is &lt;2021.186.0.0.2svn44140-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920591" version="1" comment="texlive-thaispec is &lt;2021.186.2021.03.01svn58019-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920592" version="1" comment="texlive-thaispec-doc is &lt;2021.186.2021.03.01svn58019-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920593" version="1" comment="texlive-thalie is &lt;2021.186.0.0.10bsvn51789-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920594" version="1" comment="texlive-thalie-doc is &lt;2021.186.0.0.10bsvn51789-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920595" version="1" comment="texlive-theanodidot is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920596" version="1" comment="texlive-theanodidot-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920597" version="1" comment="texlive-theanodidot-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920598" version="1" comment="texlive-theanomodern is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920599" version="1" comment="texlive-theanomodern-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920600" version="1" comment="texlive-theanomodern-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920601" version="1" comment="texlive-theanooldstyle is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920602" version="1" comment="texlive-theanooldstyle-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920603" version="1" comment="texlive-theanooldstyle-fonts is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920604" version="1" comment="texlive-theatre is &lt;2021.186.0.0.1svn45363-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920605" version="1" comment="texlive-theoremref is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920606" version="1" comment="texlive-theoremref-doc is &lt;2021.186.svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920607" version="1" comment="texlive-thesis-ekf is &lt;2021.186.4.1svn57207-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920608" version="1" comment="texlive-thesis-ekf-doc is &lt;2021.186.4.1svn57207-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920609" version="1" comment="texlive-thesis-gwu is &lt;2021.186.1.7.0svn54287-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920610" version="1" comment="texlive-thesis-gwu-doc is &lt;2021.186.1.7.0svn54287-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920611" version="1" comment="texlive-thesis-qom is &lt;2021.186.0.0.42svn49124-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920612" version="1" comment="texlive-thesis-qom-doc is &lt;2021.186.0.0.42svn49124-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920613" version="1" comment="texlive-thesis-titlepage-fhac is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920614" version="1" comment="texlive-thesis-titlepage-fhac-doc is &lt;2021.186.0.0.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920615" version="1" comment="texlive-thinsp is &lt;2021.186.0.0.2svn39669-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920616" version="1" comment="texlive-thinsp-doc is &lt;2021.186.0.0.2svn39669-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920617" version="1" comment="texlive-thmbox is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920618" version="1" comment="texlive-thmbox-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920619" version="1" comment="texlive-thmtools is &lt;2021.186.72svn56070-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920620" version="1" comment="texlive-thmtools-doc is &lt;2021.186.72svn56070-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920621" version="1" comment="texlive-threadcol is &lt;2021.186.1.0svn28754-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920622" version="1" comment="texlive-threadcol-doc is &lt;2021.186.1.0svn28754-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920623" version="1" comment="texlive-threeddice is &lt;2021.186.1.0svn20675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920624" version="1" comment="texlive-threeddice-doc is &lt;2021.186.1.0svn20675-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920625" version="1" comment="texlive-threeparttable is &lt;2021.186.svn17383-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920626" version="1" comment="texlive-threeparttable-doc is &lt;2021.186.svn17383-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920627" version="1" comment="texlive-threeparttablex is &lt;2021.186.0.0.3svn34206-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920628" version="1" comment="texlive-threeparttablex-doc is &lt;2021.186.0.0.3svn34206-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920629" version="1" comment="texlive-thuaslogos is &lt;2021.186.1.2svn51347-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920630" version="1" comment="texlive-thuaslogos-doc is &lt;2021.186.1.2svn51347-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920631" version="1" comment="texlive-thucoursework is &lt;2021.186.2.6svn56435-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920632" version="1" comment="texlive-thucoursework-doc is &lt;2021.186.2.6svn56435-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920633" version="1" comment="texlive-thumb is &lt;2021.186.1.0svn16549-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920634" version="1" comment="texlive-thumb-doc is &lt;2021.186.1.0svn16549-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920635" version="1" comment="texlive-thumbpdf is &lt;2021.186.3.17svn48625-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920636" version="1" comment="texlive-thumbpdf-doc is &lt;2021.186.3.17svn48625-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920637" version="1" comment="texlive-thumbs is &lt;2021.186.1.0qsvn33134-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920638" version="1" comment="texlive-thumbs-doc is &lt;2021.186.1.0qsvn33134-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920639" version="1" comment="texlive-thumby is &lt;2021.186.0.0.1svn16736-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920640" version="1" comment="texlive-thumby-doc is &lt;2021.186.0.0.1svn16736-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920641" version="1" comment="texlive-thuthesis is &lt;2021.186.7.2.2svn58750-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920642" version="1" comment="texlive-thuthesis-doc is &lt;2021.186.7.2.2svn58750-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920643" version="1" comment="texlive-ticket is &lt;2021.186.0.0.4dsvn42280-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920644" version="1" comment="texlive-ticket-doc is &lt;2021.186.0.0.4dsvn42280-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920645" version="1" comment="texlive-ticollege is &lt;2021.186.1.0svn36306-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920646" version="1" comment="texlive-ticollege-doc is &lt;2021.186.1.0svn36306-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920647" version="1" comment="texlive-tie is &lt;2021.186.2.4svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920648" version="1" comment="texlive-tikz-3dplot is &lt;2021.186.svn25087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920649" version="1" comment="texlive-tikz-3dplot-doc is &lt;2021.186.svn25087-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920650" version="1" comment="texlive-tikz-among-us is &lt;2021.186.1.1.0svn56820-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920651" version="1" comment="texlive-tikz-among-us-doc is &lt;2021.186.1.1.0svn56820-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920652" version="1" comment="texlive-tikz-bayesnet is &lt;2021.186.0.0.1svn38295-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920653" version="1" comment="texlive-tikz-bayesnet-doc is &lt;2021.186.0.0.1svn38295-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920654" version="1" comment="texlive-tikz-bbox is &lt;2021.186.0.0.1svn57444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920655" version="1" comment="texlive-tikz-bbox-doc is &lt;2021.186.0.0.1svn57444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920656" version="1" comment="texlive-tikz-cd is &lt;2021.186.0.0.9fsvn49201-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920657" version="1" comment="texlive-tikz-cd-doc is &lt;2021.186.0.0.9fsvn49201-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920658" version="1" comment="texlive-tikz-dependency is &lt;2021.186.1.2svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920659" version="1" comment="texlive-tikz-dependency-doc is &lt;2021.186.1.2svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920660" version="1" comment="texlive-tikz-dimline is &lt;2021.186.1.0svn35805-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920661" version="1" comment="texlive-tikz-dimline-doc is &lt;2021.186.1.0svn35805-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920662" version="1" comment="texlive-tikz-feynhand is &lt;2021.186.1.1.0svn51915-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920663" version="1" comment="texlive-tikz-feynhand-doc is &lt;2021.186.1.1.0svn51915-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920664" version="1" comment="texlive-tikz-feynman is &lt;2021.186.1.1.0svn56615-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920665" version="1" comment="texlive-tikz-feynman-doc is &lt;2021.186.1.1.0svn56615-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920666" version="1" comment="texlive-tikz-imagelabels is &lt;2021.186.0.0.2svn51490-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920667" version="1" comment="texlive-tikz-imagelabels-doc is &lt;2021.186.0.0.2svn51490-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920668" version="1" comment="texlive-tikz-inet is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920669" version="1" comment="texlive-tikz-inet-doc is &lt;2021.186.0.0.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920670" version="1" comment="texlive-tikz-kalender is &lt;2021.186.0.0.4fsvn52890-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920671" version="1" comment="texlive-tikz-kalender-doc is &lt;2021.186.0.0.4fsvn52890-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920672" version="1" comment="texlive-tikz-karnaugh is &lt;2021.186.1.2svn47026-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920673" version="1" comment="texlive-tikz-karnaugh-doc is &lt;2021.186.1.2svn47026-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920674" version="1" comment="texlive-tikz-ladder is &lt;2021.186.1.1svn46555-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920675" version="1" comment="texlive-tikz-ladder-doc is &lt;2021.186.1.1svn46555-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920676" version="1" comment="texlive-tikz-lake-fig is &lt;2021.186.1.0svn55288-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920677" version="1" comment="texlive-tikz-lake-fig-doc is &lt;2021.186.1.0svn55288-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920678" version="1" comment="texlive-tikz-layers is &lt;2021.186.0.0.9svn46660-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920679" version="1" comment="texlive-tikz-layers-doc is &lt;2021.186.0.0.9svn46660-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920680" version="1" comment="texlive-tikz-nef is &lt;2021.186.0.0.1svn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920681" version="1" comment="texlive-tikz-nef-doc is &lt;2021.186.0.0.1svn55920-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920682" version="1" comment="texlive-tikz-network is &lt;2021.186.1.1svn51884-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920683" version="1" comment="texlive-tikz-network-doc is &lt;2021.186.1.1svn51884-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920684" version="1" comment="texlive-tikz-opm is &lt;2021.186.0.0.1.1svn32769-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920685" version="1" comment="texlive-tikz-opm-doc is &lt;2021.186.0.0.1.1svn32769-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920686" version="1" comment="texlive-tikz-optics is &lt;2021.186.0.0.2.3svn43466-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920687" version="1" comment="texlive-tikz-optics-doc is &lt;2021.186.0.0.2.3svn43466-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920688" version="1" comment="texlive-tikz-page is &lt;2021.186.1.0svn42039-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920689" version="1" comment="texlive-tikz-page-doc is &lt;2021.186.1.0svn42039-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920690" version="1" comment="texlive-tikz-palattice is &lt;2021.186.2.3svn43442-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920691" version="1" comment="texlive-tikz-palattice-doc is &lt;2021.186.2.3svn43442-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920692" version="1" comment="texlive-tikz-planets is &lt;2021.186.1.0.2svn55002-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920693" version="1" comment="texlive-tikz-planets-doc is &lt;2021.186.1.0.2svn55002-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920694" version="1" comment="texlive-tikz-qtree is &lt;2021.186.1.2svn26108-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920695" version="1" comment="texlive-tikz-qtree-doc is &lt;2021.186.1.2svn26108-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920696" version="1" comment="texlive-tikz-relay is &lt;2021.186.1.2svn51355-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920697" version="1" comment="texlive-tikz-relay-doc is &lt;2021.186.1.2svn51355-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920698" version="1" comment="texlive-tikz-sfc is &lt;2021.186.1.0.1svn49424-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920699" version="1" comment="texlive-tikz-sfc-doc is &lt;2021.186.1.0.1svn49424-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920700" version="1" comment="texlive-tikz-timing is &lt;2021.186.0.0.7fsvn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920701" version="1" comment="texlive-tikz-timing-doc is &lt;2021.186.0.0.7fsvn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920702" version="1" comment="texlive-tikz-trackschematic is &lt;2021.186.0.0.6svn57300-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920703" version="1" comment="texlive-tikz-trackschematic-doc is &lt;2021.186.0.0.6svn57300-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920704" version="1" comment="texlive-tikz-truchet is &lt;2021.186.svn50020-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920705" version="1" comment="texlive-tikz-truchet-doc is &lt;2021.186.svn50020-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920706" version="1" comment="texlive-tikzcodeblocks is &lt;2021.186.0.0.13svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920707" version="1" comment="texlive-tikzcodeblocks-doc is &lt;2021.186.0.0.13svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920708" version="1" comment="texlive-tikzducks is &lt;2021.186.1.5svn55713-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920709" version="1" comment="texlive-tikzducks-doc is &lt;2021.186.1.5svn55713-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920710" version="1" comment="texlive-tikzinclude is &lt;2021.186.1.0svn28715-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920711" version="1" comment="texlive-tikzinclude-doc is &lt;2021.186.1.0svn28715-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920712" version="1" comment="texlive-tikzlings is &lt;2021.186.0.0.5svn58469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920713" version="1" comment="texlive-tikzlings-doc is &lt;2021.186.0.0.5svn58469-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920714" version="1" comment="texlive-tikzmark is &lt;2021.186.1.10svn57843-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920715" version="1" comment="texlive-tikzmark-doc is &lt;2021.186.1.10svn57843-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920716" version="1" comment="texlive-tikzmarmots is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920717" version="1" comment="texlive-tikzmarmots-doc is &lt;2021.186.1.0svn54080-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920718" version="1" comment="texlive-tikzorbital is &lt;2021.186.svn36439-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920719" version="1" comment="texlive-tikzorbital-doc is &lt;2021.186.svn36439-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920720" version="1" comment="texlive-tikzpackets is &lt;2021.186.1.0svn55827-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920721" version="1" comment="texlive-tikzpackets-doc is &lt;2021.186.1.0svn55827-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920722" version="1" comment="texlive-tikzpagenodes is &lt;2021.186.1.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920723" version="1" comment="texlive-tikzpagenodes-doc is &lt;2021.186.1.1svn56291-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920724" version="1" comment="texlive-tikzpeople is &lt;2021.186.0.0.4svn43978-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920725" version="1" comment="texlive-tikzpeople-doc is &lt;2021.186.0.0.4svn43978-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920726" version="1" comment="texlive-tikzpfeile is &lt;2021.186.1.0svn25777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920727" version="1" comment="texlive-tikzpfeile-doc is &lt;2021.186.1.0svn25777-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920728" version="1" comment="texlive-tikzposter is &lt;2021.186.2.0svn32732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920729" version="1" comment="texlive-tikzposter-doc is &lt;2021.186.2.0svn32732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920730" version="1" comment="texlive-tikzscale is &lt;2021.186.0.0.2.6svn30637-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920731" version="1" comment="texlive-tikzscale-doc is &lt;2021.186.0.0.2.6svn30637-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920732" version="1" comment="texlive-tikzsymbols is &lt;2021.186.4.10csvn49975-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920733" version="1" comment="texlive-tikzsymbols-doc is &lt;2021.186.4.10csvn49975-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920734" version="1" comment="texlive-tikztosvg is &lt;2021.186.0.0.2.0svn58737-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920735" version="1" comment="texlive-tikztosvg-doc is &lt;2021.186.0.0.2.0svn58737-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920736" version="1" comment="texlive-tile-graphic is &lt;2021.186.svn55325-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920737" version="1" comment="texlive-tile-graphic-doc is &lt;2021.186.svn55325-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920738" version="1" comment="texlive-timbreicmc is &lt;2021.186.2.0svn49740-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920739" version="1" comment="texlive-timbreicmc-doc is &lt;2021.186.2.0svn49740-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920740" version="1" comment="texlive-times is &lt;2021.186.svn35058-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920741" version="1" comment="texlive-times-fonts is &lt;2021.186.svn35058-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920742" version="1" comment="texlive-timetable is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920743" version="1" comment="texlive-timing-diagrams is &lt;2021.186.svn31491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920744" version="1" comment="texlive-timing-diagrams-doc is &lt;2021.186.svn31491-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920745" version="1" comment="texlive-tinos is &lt;2021.186.svn42882-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920746" version="1" comment="texlive-tinos-doc is &lt;2021.186.svn42882-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920747" version="1" comment="texlive-tinos-fonts is &lt;2021.186.svn42882-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920748" version="1" comment="texlive-tipa is &lt;2021.186.1.3svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920749" version="1" comment="texlive-tipa-de is &lt;2021.186.1.3svn22005-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920750" version="1" comment="texlive-tipa-doc is &lt;2021.186.1.3svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920751" version="1" comment="texlive-tipa-fonts is &lt;2021.186.1.3svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920752" version="1" comment="texlive-tipfr is &lt;2021.186.1.5svn38646-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920753" version="1" comment="texlive-tipfr-doc is &lt;2021.186.1.5svn38646-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920754" version="1" comment="texlive-titlecaps is &lt;2021.186.1.2svn36170-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920755" version="1" comment="texlive-titlecaps-doc is &lt;2021.186.1.2svn36170-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920756" version="1" comment="texlive-titlefoot is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920757" version="1" comment="texlive-titlepages is &lt;2021.186.svn19457-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920758" version="1" comment="texlive-titlepic is &lt;2021.186.1.2svn43497-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920759" version="1" comment="texlive-titlepic-doc is &lt;2021.186.1.2svn43497-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920760" version="1" comment="texlive-titleref is &lt;2021.186.3.1svn18729-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920761" version="1" comment="texlive-titleref-doc is &lt;2021.186.3.1svn18729-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920762" version="1" comment="texlive-titlesec is &lt;2021.186.2.13svn52413-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920763" version="1" comment="texlive-titlesec-doc is &lt;2021.186.2.13svn52413-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920764" version="1" comment="texlive-titling is &lt;2021.186.2.1dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920765" version="1" comment="texlive-titling-doc is &lt;2021.186.2.1dsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920766" version="1" comment="texlive-tkz-base is &lt;2021.186.3.06csvn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920767" version="1" comment="texlive-tkz-base-doc is &lt;2021.186.3.06csvn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920768" version="1" comment="texlive-tkz-berge is &lt;2021.186.2.0svn57485-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920769" version="1" comment="texlive-tkz-berge-doc is &lt;2021.186.2.0svn57485-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920770" version="1" comment="texlive-tkz-doc is &lt;2021.186.1.43csvn55265-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920771" version="1" comment="texlive-tkz-euclide is &lt;2021.186.3.06csvn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920772" version="1" comment="texlive-tkz-euclide-doc is &lt;2021.186.3.06csvn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920773" version="1" comment="texlive-tkz-fct is &lt;2021.186.1.3csvn55031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920774" version="1" comment="texlive-tkz-fct-doc is &lt;2021.186.1.3csvn55031-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920775" version="1" comment="texlive-tkz-graph is &lt;2021.186.2.0svn57484-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920776" version="1" comment="texlive-tkz-graph-doc is &lt;2021.186.2.0svn57484-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920777" version="1" comment="texlive-tkz-orm is &lt;2021.186.0.0.1.4svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920778" version="1" comment="texlive-tkz-orm-doc is &lt;2021.186.0.0.1.4svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920779" version="1" comment="texlive-tkz-tab is &lt;2021.186.2.12csvn54940-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920780" version="1" comment="texlive-tkz-tab-doc is &lt;2021.186.2.12csvn54940-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920781" version="1" comment="texlive-tlc-article is &lt;2021.186.1.0.17svn51431-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920782" version="1" comment="texlive-tlc-article-doc is &lt;2021.186.1.0.17svn51431-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920783" version="1" comment="texlive-tlc2 is &lt;2021.186.svn26096-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920784" version="1" comment="texlive-tlmgrbasics is &lt;2021.186.svn56221-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920785" version="1" comment="texlive-tocbibind is &lt;2021.186.1.5ksvn20085-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920786" version="1" comment="texlive-tocbibind-doc is &lt;2021.186.1.5ksvn20085-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920787" version="1" comment="texlive-tocdata is &lt;2021.186.2.04svn55852-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920788" version="1" comment="texlive-tocdata-doc is &lt;2021.186.2.04svn55852-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920789" version="1" comment="texlive-tocloft is &lt;2021.186.2.3jsvn53364-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920790" version="1" comment="texlive-tocloft-doc is &lt;2021.186.2.3jsvn53364-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920791" version="1" comment="texlive-tocvsec2 is &lt;2021.186.1.3asvn33146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920792" version="1" comment="texlive-tocvsec2-doc is &lt;2021.186.1.3asvn33146-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920793" version="1" comment="texlive-todo is &lt;2021.186.2.142svn17746-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920794" version="1" comment="texlive-todo-doc is &lt;2021.186.2.142svn17746-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920795" version="1" comment="texlive-todonotes is &lt;2021.186.1.1.3svn56166-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920796" version="1" comment="texlive-todonotes-doc is &lt;2021.186.1.1.3svn56166-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920797" version="1" comment="texlive-tokcycle is &lt;2021.186.1.3svn58254-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920798" version="1" comment="texlive-tokcycle-doc is &lt;2021.186.1.3svn58254-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920799" version="1" comment="texlive-tokenizer is &lt;2021.186.1.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920800" version="1" comment="texlive-tokenizer-doc is &lt;2021.186.1.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920801" version="1" comment="texlive-toolbox is &lt;2021.186.5.1svn32260-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920802" version="1" comment="texlive-toolbox-doc is &lt;2021.186.5.1svn32260-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920803" version="1" comment="texlive-tools is &lt;2021.186.svn56514-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920804" version="1" comment="texlive-tools-doc is &lt;2021.186.svn56514-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920805" version="1" comment="texlive-topfloat is &lt;2021.186.svn19084-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920806" version="1" comment="texlive-topfloat-doc is &lt;2021.186.svn19084-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920807" version="1" comment="texlive-topiclongtable is &lt;2021.186.1.3.2svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920808" version="1" comment="texlive-topiclongtable-doc is &lt;2021.186.1.3.2svn54758-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920809" version="1" comment="texlive-topletter is &lt;2021.186.0.0.3.0svn48182-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920810" version="1" comment="texlive-topletter-doc is &lt;2021.186.0.0.3.0svn48182-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920811" version="1" comment="texlive-toptesi is &lt;2021.186.6.4.06svn56276-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920812" version="1" comment="texlive-toptesi-doc is &lt;2021.186.6.4.06svn56276-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920813" version="1" comment="texlive-totalcount is &lt;2021.186.1.0asvn56214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920814" version="1" comment="texlive-totalcount-doc is &lt;2021.186.1.0asvn56214-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920815" version="1" comment="texlive-totcount is &lt;2021.186.1.2svn21178-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920816" version="1" comment="texlive-totcount-doc is &lt;2021.186.1.2svn21178-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920817" version="1" comment="texlive-totpages is &lt;2021.186.2.00svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920818" version="1" comment="texlive-totpages-doc is &lt;2021.186.2.00svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920819" version="1" comment="texlive-tpic2pdftex is &lt;2021.186.svn52851-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920820" version="1" comment="texlive-tpslifonts is &lt;2021.186.0.0.6svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920821" version="1" comment="texlive-tpslifonts-doc is &lt;2021.186.0.0.6svn42428-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920822" version="1" comment="texlive-tqft is &lt;2021.186.2.1svn44455-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920823" version="1" comment="texlive-tqft-doc is &lt;2021.186.2.1svn44455-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920824" version="1" comment="texlive-tracklang is &lt;2021.186.1.4svn55707-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920825" version="1" comment="texlive-tracklang-doc is &lt;2021.186.1.4svn55707-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920826" version="1" comment="texlive-trajan is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920827" version="1" comment="texlive-trajan-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920828" version="1" comment="texlive-trajan-fonts is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920829" version="1" comment="texlive-tram is &lt;2021.186.0.0.2svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920830" version="1" comment="texlive-tram-doc is &lt;2021.186.0.0.2svn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920831" version="1" comment="texlive-translation-array-fr is &lt;2021.186.svn24344-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920832" version="1" comment="texlive-translation-arsclassica-de is &lt;2021.186.svn23803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920833" version="1" comment="texlive-translation-biblatex-de is &lt;2021.186.3.15asvn57508-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920834" version="1" comment="texlive-translation-chemsym-de is &lt;2021.186.svn23804-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920835" version="1" comment="texlive-translation-dcolumn-fr is &lt;2021.186.svn24345-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920836" version="1" comment="texlive-translation-ecv-de is &lt;2021.186.svn24754-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920837" version="1" comment="texlive-translation-enumitem-de is &lt;2021.186.svn24196-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920838" version="1" comment="texlive-translation-europecv-de is &lt;2021.186.svn23840-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920839" version="1" comment="texlive-translation-filecontents-de is &lt;2021.186.svn24010-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920840" version="1" comment="texlive-translation-moreverb-de is &lt;2021.186.svn23957-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920841" version="1" comment="texlive-translation-natbib-fr is &lt;2021.186.svn25105-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920842" version="1" comment="texlive-translation-tabbing-fr is &lt;2021.186.svn24228-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920843" version="1" comment="texlive-translations is &lt;2021.186.1.10asvn57461-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920844" version="1" comment="texlive-translations-doc is &lt;2021.186.1.10asvn57461-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920845" version="1" comment="texlive-translator is &lt;2021.186.1.12csvn56052-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920846" version="1" comment="texlive-translator-doc is &lt;2021.186.1.12csvn56052-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920847" version="1" comment="texlive-transparent is &lt;2021.186.1.4svn52981-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920848" version="1" comment="texlive-transparent-doc is &lt;2021.186.1.4svn52981-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920849" version="1" comment="texlive-tree-dvips is &lt;2021.186.0.0.91svn21751-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920850" version="1" comment="texlive-tree-dvips-doc is &lt;2021.186.0.0.91svn21751-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920851" version="1" comment="texlive-treetex is &lt;2021.186.svn28176-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920852" version="1" comment="texlive-treetex-doc is &lt;2021.186.svn28176-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920853" version="1" comment="texlive-trfsigns is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920854" version="1" comment="texlive-trfsigns-doc is &lt;2021.186.1.01svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920855" version="1" comment="texlive-trigonometry is &lt;2021.186.svn43006-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920856" version="1" comment="texlive-trigonometry-doc is &lt;2021.186.svn43006-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920857" version="1" comment="texlive-trimspaces is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920858" version="1" comment="texlive-trimspaces-doc is &lt;2021.186.1.1svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920859" version="1" comment="texlive-trivfloat is &lt;2021.186.1.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920860" version="1" comment="texlive-trivfloat-doc is &lt;2021.186.1.3bsvn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920861" version="1" comment="texlive-trsym is &lt;2021.186.1.0svn18732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920862" version="1" comment="texlive-trsym-doc is &lt;2021.186.1.0svn18732-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920863" version="1" comment="texlive-truncate is &lt;2021.186.3.6svn18921-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920864" version="1" comment="texlive-truncate-doc is &lt;2021.186.3.6svn18921-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920865" version="1" comment="texlive-tsemlines is &lt;2021.186.1.0svn23440-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920866" version="1" comment="texlive-ttfutils is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920867" version="1" comment="texlive-ttfutils-doc is &lt;2021.186.svn57972-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920868" version="1" comment="texlive-tucv is &lt;2021.186.1.0svn20680-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920869" version="1" comment="texlive-tucv-doc is &lt;2021.186.1.0svn20680-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920870" version="1" comment="texlive-tuda-ci is &lt;2021.186.3.13asvn58661-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920871" version="1" comment="texlive-tuda-ci-doc is &lt;2021.186.3.13asvn58661-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920872" version="1" comment="texlive-tudscr is &lt;2021.186.2.06lsvn58713-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920873" version="1" comment="texlive-tudscr-doc is &lt;2021.186.2.06lsvn58713-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920874" version="1" comment="texlive-tufte-latex is &lt;2021.186.3.5.2svn37649-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920875" version="1" comment="texlive-tufte-latex-doc is &lt;2021.186.3.5.2svn37649-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920876" version="1" comment="texlive-tugboat is &lt;2021.186.2.24svn56942-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920877" version="1" comment="texlive-tugboat-doc is &lt;2021.186.2.24svn56942-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920878" version="1" comment="texlive-tugboat-plain is &lt;2021.186.1.25svn51373-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920879" version="1" comment="texlive-tugboat-plain-doc is &lt;2021.186.1.25svn51373-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920880" version="1" comment="texlive-tui is &lt;2021.186.1.9svn27253-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920881" version="1" comment="texlive-tui-doc is &lt;2021.186.1.9svn27253-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920882" version="1" comment="texlive-turabian is &lt;2021.186.0.0.1.0svn36298-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920883" version="1" comment="texlive-turabian-doc is &lt;2021.186.0.0.1.0svn36298-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920884" version="1" comment="texlive-turabian-formatting is &lt;2021.186.svn58561-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920885" version="1" comment="texlive-turabian-formatting-doc is &lt;2021.186.svn58561-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920886" version="1" comment="texlive-turkmen is &lt;2021.186.0.0.2svn17748-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920887" version="1" comment="texlive-turkmen-doc is &lt;2021.186.0.0.2svn17748-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920888" version="1" comment="texlive-turnstile is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920889" version="1" comment="texlive-turnstile-doc is &lt;2021.186.1.0svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920890" version="1" comment="texlive-turnthepage is &lt;2021.186.1.3asvn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920891" version="1" comment="texlive-turnthepage-doc is &lt;2021.186.1.3asvn29803-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920892" version="1" comment="texlive-twemoji-colr is &lt;2021.186.0.0.5.1svn55675-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920893" version="1" comment="texlive-twemoji-colr-doc is &lt;2021.186.0.0.5.1svn55675-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920894" version="1" comment="texlive-twemoji-colr-fonts is &lt;2021.186.0.0.5.1svn55675-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920895" version="1" comment="texlive-twoinone is &lt;2021.186.svn17024-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920896" version="1" comment="texlive-twoinone-doc is &lt;2021.186.svn17024-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920897" version="1" comment="texlive-twoup is &lt;2021.186.1.3svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920898" version="1" comment="texlive-twoup-doc is &lt;2021.186.1.3svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920899" version="1" comment="texlive-txfonts is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920900" version="1" comment="texlive-txfonts-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920901" version="1" comment="texlive-txfonts-fonts is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920902" version="1" comment="texlive-txfontsb is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920903" version="1" comment="texlive-txfontsb-doc is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920904" version="1" comment="texlive-txfontsb-fonts is &lt;2021.186.1.1.1svn54512-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009220395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920905" version="1" comment="texlive-txgreeks is &lt;2021.186.1.0svn21839-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920906" version="1" comment="texlive-txgreeks-doc is &lt;2021.186.1.0svn21839-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920907" version="1" comment="texlive-txuprcal is &lt;2021.186.1.00svn43327-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920908" version="1" comment="texlive-txuprcal-doc is &lt;2021.186.1.00svn43327-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920909" version="1" comment="texlive-txuprcal-fonts is &lt;2021.186.1.00svn43327-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920910" version="1" comment="texlive-type1cm is &lt;2021.186.svn21820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920911" version="1" comment="texlive-type1cm-doc is &lt;2021.186.svn21820-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920912" version="1" comment="texlive-typed-checklist is &lt;2021.186.2.0svn49731-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920913" version="1" comment="texlive-typed-checklist-doc is &lt;2021.186.2.0svn49731-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920914" version="1" comment="texlive-typeface is &lt;2021.186.0.0.1svn27046-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920915" version="1" comment="texlive-typeface-doc is &lt;2021.186.0.0.1svn27046-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920916" version="1" comment="texlive-typehtml is &lt;2021.186.svn17134-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920917" version="1" comment="texlive-typehtml-doc is &lt;2021.186.svn17134-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920918" version="1" comment="texlive-typeoutfileinfo is &lt;2021.186.0.0.31svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920919" version="1" comment="texlive-typeoutfileinfo-doc is &lt;2021.186.0.0.31svn29349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920920" version="1" comment="texlive-typewriter is &lt;2021.186.1.1svn46641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920921" version="1" comment="texlive-typewriter-doc is &lt;2021.186.1.1svn46641-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920922" version="1" comment="texlive-typicons is &lt;2021.186.2.0.7svn37623-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920923" version="1" comment="texlive-typicons-doc is &lt;2021.186.2.0.7svn37623-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920924" version="1" comment="texlive-typicons-fonts is &lt;2021.186.2.0.7svn37623-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920925" version="1" comment="texlive-typoaid is &lt;2021.186.0.0.4.7svn44238-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920926" version="1" comment="texlive-typoaid-doc is &lt;2021.186.0.0.4.7svn44238-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920927" version="1" comment="texlive-typogrid is &lt;2021.186.0.0.21svn24994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920928" version="1" comment="texlive-typogrid-doc is &lt;2021.186.0.0.21svn24994-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920929" version="1" comment="texlive-tzplot is &lt;2021.186.1.0.1svn58558-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920930" version="1" comment="texlive-tzplot-doc is &lt;2021.186.1.0.1svn58558-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920931" version="1" comment="texlive-uaclasses is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920932" version="1" comment="texlive-uaclasses-doc is &lt;2021.186.svn15878-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920933" version="1" comment="texlive-uafthesis is &lt;2021.186.12.12svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920934" version="1" comment="texlive-uafthesis-doc is &lt;2021.186.12.12svn57349-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920935" version="1" comment="texlive-uantwerpendocs is &lt;2021.186.3.2svn58669-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920936" version="1" comment="texlive-uantwerpendocs-doc is &lt;2021.186.3.2svn58669-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920937" version="1" comment="texlive-uassign is &lt;2021.186.1.01svn38459-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920938" version="1" comment="texlive-uassign-doc is &lt;2021.186.1.01svn38459-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920939" version="1" comment="texlive-ucalgmthesis is &lt;2021.186.svn52527-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920940" version="1" comment="texlive-ucalgmthesis-doc is &lt;2021.186.svn52527-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920941" version="1" comment="texlive-ucbthesis is &lt;2021.186.3.6svn51690-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920942" version="1" comment="texlive-ucbthesis-doc is &lt;2021.186.3.6svn51690-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920943" version="1" comment="texlive-ucdavisthesis is &lt;2021.186.1.3svn40772-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920944" version="1" comment="texlive-ucdavisthesis-doc is &lt;2021.186.1.3svn40772-45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920945" version="1" comment="texlive-ucharcat is &lt;2021.186.0.0.03svn38907-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920946" version="1" comment="texlive-ucharcat-doc is &lt;2021.186.0.0.03svn38907-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920947" version="1" comment="texlive-ucharclasses is &lt;2021.186.2.4svn58029-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920948" version="1" comment="texlive-ucharclasses-doc is &lt;2021.186.2.4svn58029-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920949" version="1" comment="texlive-ucs is &lt;2021.186.2.2svn35853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920950" version="1" comment="texlive-ucs-doc is &lt;2021.186.2.2svn35853-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920951" version="1" comment="texlive-ucsmonograph is &lt;2021.186.1.3.0svn52698-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920952" version="1" comment="texlive-ucsmonograph-doc is &lt;2021.186.1.3.0svn52698-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920953" version="1" comment="texlive-ucthesis is &lt;2021.186.3.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920954" version="1" comment="texlive-ucthesis-doc is &lt;2021.186.3.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920955" version="1" comment="texlive-udesoftec is &lt;2021.186.1.7.1svn57866-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920956" version="1" comment="texlive-udesoftec-doc is &lt;2021.186.1.7.1svn57866-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920957" version="1" comment="texlive-uebungsblatt is &lt;2021.186.1.5.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920958" version="1" comment="texlive-uebungsblatt-doc is &lt;2021.186.1.5.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920959" version="1" comment="texlive-uestcthesis is &lt;2021.186.1.1.0svn36371-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920960" version="1" comment="texlive-uestcthesis-doc is &lt;2021.186.1.1.0svn36371-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920961" version="1" comment="texlive-uhc is &lt;2021.186.svn16791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920962" version="1" comment="texlive-uhc-doc is &lt;2021.186.svn16791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920963" version="1" comment="texlive-uhc-fonts is &lt;2021.186.svn16791-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920964" version="1" comment="texlive-uhhassignment is &lt;2021.186.1.0svn44026-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920965" version="1" comment="texlive-uhhassignment-doc is &lt;2021.186.1.0svn44026-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920966" version="1" comment="texlive-uhrzeit is &lt;2021.186.0.0.2csvn39570-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920967" version="1" comment="texlive-uhrzeit-doc is &lt;2021.186.0.0.2csvn39570-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920968" version="1" comment="texlive-uiucredborder is &lt;2021.186.1.00svn29974-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920969" version="1" comment="texlive-uiucredborder-doc is &lt;2021.186.1.00svn29974-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920970" version="1" comment="texlive-uiucthesis is &lt;2021.186.2.25svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920971" version="1" comment="texlive-uiucthesis-doc is &lt;2021.186.2.25svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920972" version="1" comment="texlive-ukrhyph is &lt;2021.186.svn21081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920973" version="1" comment="texlive-ukrhyph-doc is &lt;2021.186.svn21081-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920974" version="1" comment="texlive-ulem is &lt;2021.186.svn53365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920975" version="1" comment="texlive-ulem-doc is &lt;2021.186.svn53365-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920976" version="1" comment="texlive-ulqda is &lt;2021.186.1.1svn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920977" version="1" comment="texlive-ulqda-doc is &lt;2021.186.1.1svn26313-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920978" version="1" comment="texlive-ulthese is &lt;2021.186.5.3svn52972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920979" version="1" comment="texlive-ulthese-doc is &lt;2021.186.5.3svn52972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920980" version="1" comment="texlive-umbclegislation is &lt;2021.186.2016_6_8svn41348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920981" version="1" comment="texlive-umbclegislation-doc is &lt;2021.186.2016_6_8svn41348-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920982" version="1" comment="texlive-umich-thesis is &lt;2021.186.1.20svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920983" version="1" comment="texlive-umich-thesis-doc is &lt;2021.186.1.20svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920984" version="1" comment="texlive-uml is &lt;2021.186.0.0.11svn17476-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920985" version="1" comment="texlive-uml-doc is &lt;2021.186.0.0.11svn17476-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920986" version="1" comment="texlive-umlaute is &lt;2021.186.2.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920987" version="1" comment="texlive-umlaute-doc is &lt;2021.186.2.1svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920988" version="1" comment="texlive-umoline is &lt;2021.186.svn19085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920989" version="1" comment="texlive-umoline-doc is &lt;2021.186.svn19085-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920990" version="1" comment="texlive-umthesis is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920991" version="1" comment="texlive-umthesis-doc is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920992" version="1" comment="texlive-umtypewriter is &lt;2021.186.001.002svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920993" version="1" comment="texlive-umtypewriter-fonts is &lt;2021.186.001.002svn18651-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920994" version="1" comment="texlive-unam-thesis is &lt;2021.186.0.0.5svn51207-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920995" version="1" comment="texlive-unam-thesis-doc is &lt;2021.186.0.0.5svn51207-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920996" version="1" comment="texlive-unamth-template is &lt;2021.186.2.0svn33625-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920997" version="1" comment="texlive-unamthesis is &lt;2021.186.2.1svn43639-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920998" version="1" comment="texlive-unamthesis-doc is &lt;2021.186.2.1svn43639-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009920999" version="1" comment="texlive-undergradmath is &lt;2021.186.svn57286-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921000" version="1" comment="texlive-underlin is &lt;2021.186.1.01svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921001" version="1" comment="texlive-underlin-doc is &lt;2021.186.1.01svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921002" version="1" comment="texlive-underoverlap is &lt;2021.186.0.0.0.1_r1svn29019-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921003" version="1" comment="texlive-underoverlap-doc is &lt;2021.186.0.0.0.1_r1svn29019-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921004" version="1" comment="texlive-underscore is &lt;2021.186.svn18261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921005" version="1" comment="texlive-underscore-doc is &lt;2021.186.svn18261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921006" version="1" comment="texlive-undolabl is &lt;2021.186.1.0lsvn36681-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921007" version="1" comment="texlive-undolabl-doc is &lt;2021.186.1.0lsvn36681-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921008" version="1" comment="texlive-unfonts-core is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921009" version="1" comment="texlive-unfonts-core-doc is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921010" version="1" comment="texlive-unfonts-core-fonts is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921011" version="1" comment="texlive-unfonts-extra is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921012" version="1" comment="texlive-unfonts-extra-doc is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921013" version="1" comment="texlive-unfonts-extra-fonts is &lt;2021.186.svn56291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921014" version="1" comment="texlive-uni-wtal-ger is &lt;2021.186.0.0.2svn31541-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921015" version="1" comment="texlive-uni-wtal-ger-doc is &lt;2021.186.0.0.2svn31541-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921016" version="1" comment="texlive-uni-wtal-lin is &lt;2021.186.0.0.2svn31409-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921017" version="1" comment="texlive-uni-wtal-lin-doc is &lt;2021.186.0.0.2svn31409-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921018" version="1" comment="texlive-unicode-alphabets is &lt;2021.186.svn54236-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921019" version="1" comment="texlive-unicode-alphabets-doc is &lt;2021.186.svn54236-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921020" version="1" comment="texlive-unicode-bidi is &lt;2021.186.0.0.01svn42482-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921021" version="1" comment="texlive-unicode-bidi-doc is &lt;2021.186.0.0.01svn42482-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921022" version="1" comment="texlive-unicode-data is &lt;2021.186.1.14svn56768-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921023" version="1" comment="texlive-unicode-data-doc is &lt;2021.186.1.14svn56768-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921024" version="1" comment="texlive-unicode-math is &lt;2021.186.0.0.8qsvn56594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921025" version="1" comment="texlive-unicode-math-doc is &lt;2021.186.0.0.8qsvn56594-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921026" version="1" comment="texlive-unifith is &lt;2021.186.1.2svn51968-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921027" version="1" comment="texlive-unifith-doc is &lt;2021.186.1.2svn51968-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921028" version="1" comment="texlive-uninormalize is &lt;2021.186.0.0.1svn57257-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921029" version="1" comment="texlive-uninormalize-doc is &lt;2021.186.0.0.1svn57257-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921030" version="1" comment="texlive-uniquecounter is &lt;2021.186.1.4svn53162-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921031" version="1" comment="texlive-uniquecounter-doc is &lt;2021.186.1.4svn53162-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921032" version="1" comment="texlive-unisugar is &lt;2021.186.0.0.92svn22357-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921033" version="1" comment="texlive-unisugar-doc is &lt;2021.186.0.0.92svn22357-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921034" version="1" comment="texlive-unitconv is &lt;2021.186.0.0.01svn55060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921035" version="1" comment="texlive-unitconv-doc is &lt;2021.186.0.0.01svn55060-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921036" version="1" comment="texlive-unitipa is &lt;2021.186.0.0.3svn58749-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921037" version="1" comment="texlive-unitipa-doc is &lt;2021.186.0.0.3svn58749-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921038" version="1" comment="texlive-unitn-bimrep is &lt;2021.186.svn45581-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921039" version="1" comment="texlive-unitn-bimrep-doc is &lt;2021.186.svn45581-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921040" version="1" comment="texlive-units is &lt;2021.186.0.0.9bsvn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921041" version="1" comment="texlive-units-doc is &lt;2021.186.0.0.9bsvn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921042" version="1" comment="texlive-unitsdef is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921043" version="1" comment="texlive-unitsdef-doc is &lt;2021.186.0.0.2svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921044" version="1" comment="texlive-universa is &lt;2021.186.2.1svn51984-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921045" version="1" comment="texlive-universa-doc is &lt;2021.186.2.1svn51984-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921046" version="1" comment="texlive-universalis is &lt;2021.186.svn33860-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921047" version="1" comment="texlive-universalis-doc is &lt;2021.186.svn33860-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921048" version="1" comment="texlive-universalis-fonts is &lt;2021.186.svn33860-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921049" version="1" comment="texlive-univie-ling is &lt;2021.186.1.13svn56913-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921050" version="1" comment="texlive-univie-ling-doc is &lt;2021.186.1.13svn56913-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921051" version="1" comment="texlive-unizgklasa is &lt;2021.186.1.0svn51647-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921052" version="1" comment="texlive-unizgklasa-doc is &lt;2021.186.1.0svn51647-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921053" version="1" comment="texlive-unravel is &lt;2021.186.0.0.2hsvn52822-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921054" version="1" comment="texlive-unravel-doc is &lt;2021.186.0.0.2hsvn52822-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921055" version="1" comment="texlive-unswcover is &lt;2021.186.1.0svn29476-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921056" version="1" comment="texlive-unswcover-doc is &lt;2021.186.1.0svn29476-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921057" version="1" comment="texlive-uothesis is &lt;2021.186.2.5.6svn25355-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921058" version="1" comment="texlive-uothesis-doc is &lt;2021.186.2.5.6svn25355-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921059" version="1" comment="texlive-uowthesis is &lt;2021.186.1.0asvn19700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921060" version="1" comment="texlive-uowthesis-doc is &lt;2021.186.1.0asvn19700-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921061" version="1" comment="texlive-uowthesistitlepage is &lt;2021.186.3.0.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921062" version="1" comment="texlive-uowthesistitlepage-doc is &lt;2021.186.3.0.1svn54512-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921063" version="1" comment="texlive-upca is &lt;2021.186.svn22511-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921064" version="1" comment="texlive-upca-doc is &lt;2021.186.svn22511-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921065" version="1" comment="texlive-uplatex is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921066" version="1" comment="texlive-uplatex-doc is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921067" version="1" comment="texlive-upmethodology is &lt;2021.186.20200406svn54758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921068" version="1" comment="texlive-upmethodology-doc is &lt;2021.186.20200406svn54758-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921069" version="1" comment="texlive-uppunctlm is &lt;2021.186.0.0.1svn42334-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921070" version="1" comment="texlive-uppunctlm-doc is &lt;2021.186.0.0.1svn42334-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921071" version="1" comment="texlive-upquote is &lt;2021.186.1.3svn26059-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921072" version="1" comment="texlive-upquote-doc is &lt;2021.186.1.3svn26059-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921073" version="1" comment="texlive-uptex is &lt;2021.186.svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921074" version="1" comment="texlive-uptex-base is &lt;2021.186.svn56832-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921075" version="1" comment="texlive-uptex-base-doc is &lt;2021.186.svn56832-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921076" version="1" comment="texlive-uptex-fonts is &lt;2021.186.svn54045-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921077" version="1" comment="texlive-uptex-fonts-doc is &lt;2021.186.svn54045-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921078" version="1" comment="texlive-upzhkinsoku is &lt;2021.186.0.0.5svn47354-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921079" version="1" comment="texlive-upzhkinsoku-doc is &lt;2021.186.0.0.5svn47354-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921080" version="1" comment="texlive-urcls is &lt;2021.186.2.1svn49903-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921081" version="1" comment="texlive-urcls-doc is &lt;2021.186.2.1svn49903-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921082" version="1" comment="texlive-uri is &lt;2021.186.2.0bsvn48602-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921083" version="1" comment="texlive-uri-doc is &lt;2021.186.2.0bsvn48602-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921084" version="1" comment="texlive-url is &lt;2021.186.3.4svn32528-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921085" version="1" comment="texlive-url-doc is &lt;2021.186.3.4svn32528-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921086" version="1" comment="texlive-urlbst is &lt;2021.186.0.0.8svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921087" version="1" comment="texlive-urlbst-doc is &lt;2021.186.0.0.8svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921088" version="1" comment="texlive-urwchancal is &lt;2021.186.1svn21701-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921089" version="1" comment="texlive-urwchancal-doc is &lt;2021.186.1svn21701-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921090" version="1" comment="texlive-usebib is &lt;2021.186.1.0asvn25969-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921091" version="1" comment="texlive-usebib-doc is &lt;2021.186.1.0asvn25969-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921092" version="1" comment="texlive-ushort is &lt;2021.186.2.2svn32261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921093" version="1" comment="texlive-ushort-doc is &lt;2021.186.2.2svn32261-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921094" version="1" comment="texlive-uspace is &lt;2021.186.0.0.04svn42456-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921095" version="1" comment="texlive-uspace-doc is &lt;2021.186.0.0.04svn42456-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921096" version="1" comment="texlive-uspatent is &lt;2021.186.1.0svn27744-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921097" version="1" comment="texlive-uspatent-doc is &lt;2021.186.1.0svn27744-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921098" version="1" comment="texlive-ut-thesis is &lt;2021.186.3.0.1svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921099" version="1" comment="texlive-ut-thesis-doc is &lt;2021.186.3.0.1svn58661-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921100" version="1" comment="texlive-utexasthesis is &lt;2021.186.1.0svn48648-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921101" version="1" comment="texlive-utexasthesis-doc is &lt;2021.186.1.0svn48648-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921102" version="1" comment="texlive-utf8add is &lt;2021.186.svn55291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921103" version="1" comment="texlive-utf8add-doc is &lt;2021.186.svn55291-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921104" version="1" comment="texlive-utf8mex is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921105" version="1" comment="texlive-utf8mex-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921106" version="1" comment="texlive-utfsym is &lt;2021.186.0.0.8.3svn56729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921107" version="1" comment="texlive-utfsym-doc is &lt;2021.186.0.0.8.3svn56729-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921108" version="1" comment="texlive-utopia is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921109" version="1" comment="texlive-utopia-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921110" version="1" comment="texlive-utopia-fonts is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921111" version="1" comment="texlive-uwmslide is &lt;2021.186.svn27354-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921112" version="1" comment="texlive-uwmslide-doc is &lt;2021.186.svn27354-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921113" version="1" comment="texlive-uwthesis is &lt;2021.186.6.13svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921114" version="1" comment="texlive-uwthesis-doc is &lt;2021.186.6.13svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921115" version="1" comment="texlive-vak is &lt;2021.186.svn23431-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921116" version="1" comment="texlive-vak-doc is &lt;2021.186.svn23431-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921117" version="1" comment="texlive-vancouver is &lt;2021.186.0.0.8svn55423-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921118" version="1" comment="texlive-vancouver-doc is &lt;2021.186.0.0.8svn55423-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921119" version="1" comment="texlive-variablelm is &lt;2021.186.1.1.2svn46611-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921120" version="1" comment="texlive-variablelm-doc is &lt;2021.186.1.1.2svn46611-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921121" version="1" comment="texlive-variations is &lt;2021.186.0.0.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921122" version="1" comment="texlive-variations-doc is &lt;2021.186.0.0.3svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921123" version="1" comment="texlive-varindex is &lt;2021.186.2.3svn32262-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921124" version="1" comment="texlive-varindex-doc is &lt;2021.186.2.3svn32262-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921125" version="1" comment="texlive-varisize is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921126" version="1" comment="texlive-varisize-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921127" version="1" comment="texlive-varsfromjobname is &lt;2021.186.1.0svn44154-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921128" version="1" comment="texlive-varsfromjobname-doc is &lt;2021.186.1.0svn44154-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921129" version="1" comment="texlive-varwidth is &lt;2021.186.0.0.92svn24104-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921130" version="1" comment="texlive-varwidth-doc is &lt;2021.186.0.0.92svn24104-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921131" version="1" comment="texlive-vaucanson-g is &lt;2021.186.0.0.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921132" version="1" comment="texlive-vaucanson-g-doc is &lt;2021.186.0.0.4svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921133" version="1" comment="texlive-vcell is &lt;2021.186.1.0.1svn55191-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921134" version="1" comment="texlive-vcell-doc is &lt;2021.186.1.0.1svn55191-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921135" version="1" comment="texlive-vdmlisting is &lt;2021.186.1.1svn56905-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921136" version="1" comment="texlive-vdmlisting-doc is &lt;2021.186.1.1svn56905-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921137" version="1" comment="texlive-velthuis is &lt;2021.186.2.17.1svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921138" version="1" comment="texlive-velthuis-doc is &lt;2021.186.2.17.1svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921139" version="1" comment="texlive-velthuis-fonts is &lt;2021.186.2.17.1svn55475-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921140" version="1" comment="texlive-venn is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921141" version="1" comment="texlive-venn-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921142" version="1" comment="texlive-venndiagram is &lt;2021.186.1.2svn47952-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921143" version="1" comment="texlive-venndiagram-doc is &lt;2021.186.1.2svn47952-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921144" version="1" comment="texlive-venturisadf is &lt;2021.186.1.005svn19444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921145" version="1" comment="texlive-venturisadf-doc is &lt;2021.186.1.005svn19444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921146" version="1" comment="texlive-venturisadf-fonts is &lt;2021.186.1.005svn19444-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921147" version="1" comment="texlive-verbasef is &lt;2021.186.1.1svn21922-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921148" version="1" comment="texlive-verbasef-doc is &lt;2021.186.1.1svn21922-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921149" version="1" comment="texlive-verbatimbox is &lt;2021.186.3.13svn33197-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921150" version="1" comment="texlive-verbatimbox-doc is &lt;2021.186.3.13svn33197-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921151" version="1" comment="texlive-verbatimcopy is &lt;2021.186.0.0.06svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921152" version="1" comment="texlive-verbatimcopy-doc is &lt;2021.186.0.0.06svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921153" version="1" comment="texlive-verbdef is &lt;2021.186.0.0.2svn17177-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921154" version="1" comment="texlive-verbdef-doc is &lt;2021.186.0.0.2svn17177-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921155" version="1" comment="texlive-verbments is &lt;2021.186.1.2svn23670-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921156" version="1" comment="texlive-verbments-doc is &lt;2021.186.1.2svn23670-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921157" version="1" comment="texlive-verifica is &lt;2021.186.1.3svn56625-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921158" version="1" comment="texlive-verifica-doc is &lt;2021.186.1.3svn56625-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921159" version="1" comment="texlive-verifiche is &lt;2021.186.4.1svn57766-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921160" version="1" comment="texlive-verifiche-doc is &lt;2021.186.4.1svn57766-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921161" version="1" comment="texlive-verse is &lt;2021.186.2.4bsvn34017-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921162" version="1" comment="texlive-verse-doc is &lt;2021.186.2.4bsvn34017-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921163" version="1" comment="texlive-version is &lt;2021.186.2.0svn21920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921164" version="1" comment="texlive-version-doc is &lt;2021.186.2.0svn21920-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921165" version="1" comment="texlive-versions is &lt;2021.186.0.0.55svn21921-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921166" version="1" comment="texlive-versions-doc is &lt;2021.186.0.0.55svn21921-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921167" version="1" comment="texlive-versonotes is &lt;2021.186.0.0.4svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921168" version="1" comment="texlive-versonotes-doc is &lt;2021.186.0.0.4svn55777-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921169" version="1" comment="texlive-vertbars is &lt;2021.186.1.0csvn49429-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921170" version="1" comment="texlive-vertbars-doc is &lt;2021.186.1.0csvn49429-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921171" version="1" comment="texlive-vgrid is &lt;2021.186.0.0.1svn32457-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921172" version="1" comment="texlive-vgrid-doc is &lt;2021.186.0.0.1svn32457-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921173" version="1" comment="texlive-vhistory is &lt;2021.186.1.6.1svn30080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921174" version="1" comment="texlive-vhistory-doc is &lt;2021.186.1.6.1svn30080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921175" version="1" comment="texlive-visualfaq is &lt;2021.186.svn38647-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921176" version="1" comment="texlive-visualpstricks is &lt;2021.186.2.3svn39799-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921177" version="1" comment="texlive-visualtikz is &lt;2021.186.0.0.65svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921178" version="1" comment="texlive-vlna is &lt;2021.186.svn54074-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921179" version="1" comment="texlive-vmargin is &lt;2021.186.2.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921180" version="1" comment="texlive-vmargin-doc is &lt;2021.186.2.5svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921181" version="1" comment="texlive-vntex is &lt;2021.186.3.2svn30579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921182" version="1" comment="texlive-vntex-doc is &lt;2021.186.3.2svn30579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921183" version="1" comment="texlive-vntex-fonts is &lt;2021.186.3.2svn30579-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921184" version="1" comment="texlive-vocaltract is &lt;2021.186.1svn25629-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921185" version="1" comment="texlive-vocaltract-doc is &lt;2021.186.1svn25629-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921186" version="1" comment="texlive-volumes is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921187" version="1" comment="texlive-volumes-doc is &lt;2021.186.1.0svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921188" version="1" comment="texlive-voss-mathcol is &lt;2021.186.0.0.1svn32954-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921189" version="1" comment="texlive-vpe is &lt;2021.186.0.0.2svn26039-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921190" version="1" comment="texlive-vpe-doc is &lt;2021.186.0.0.2svn26039-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921191" version="1" comment="texlive-vruler is &lt;2021.186.2.3svn21598-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921192" version="1" comment="texlive-vruler-doc is &lt;2021.186.2.3svn21598-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921193" version="1" comment="texlive-vtable is &lt;2021.186.1.0svn51126-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921194" version="1" comment="texlive-vtable-doc is &lt;2021.186.1.0svn51126-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921195" version="1" comment="texlive-vwcol is &lt;2021.186.0.0.2svn36254-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921196" version="1" comment="texlive-vwcol-doc is &lt;2021.186.0.0.2svn36254-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921197" version="1" comment="texlive-wadalab is &lt;2021.186.svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921198" version="1" comment="texlive-wadalab-doc is &lt;2021.186.svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921199" version="1" comment="texlive-wadalab-fonts is &lt;2021.186.svn42428-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921200" version="1" comment="texlive-wallcalendar is &lt;2021.186.1.3.1svn45568-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921201" version="1" comment="texlive-wallcalendar-doc is &lt;2021.186.1.3.1svn45568-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921202" version="1" comment="texlive-wallpaper is &lt;2021.186.1.10svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921203" version="1" comment="texlive-wallpaper-doc is &lt;2021.186.1.10svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921204" version="1" comment="texlive-warning is &lt;2021.186.0.0.01svn22028-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921205" version="1" comment="texlive-warning-doc is &lt;2021.186.0.0.01svn22028-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921206" version="1" comment="texlive-warpcol is &lt;2021.186.1.0csvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921207" version="1" comment="texlive-warpcol-doc is &lt;2021.186.1.0csvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921208" version="1" comment="texlive-was is &lt;2021.186.svn21439-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921209" version="1" comment="texlive-was-doc is &lt;2021.186.svn21439-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921210" version="1" comment="texlive-wasy is &lt;2021.186.2.5svn53533-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921211" version="1" comment="texlive-wasy-doc is &lt;2021.186.2.5svn53533-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921212" version="1" comment="texlive-wasy-type1 is &lt;2021.186.001.002svn53534-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921213" version="1" comment="texlive-wasy-type1-doc is &lt;2021.186.001.002svn53534-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921214" version="1" comment="texlive-wasy-type1-fonts is &lt;2021.186.001.002svn53534-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921215" version="1" comment="texlive-wasysym is &lt;2021.186.2.4svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921216" version="1" comment="texlive-wasysym-doc is &lt;2021.186.2.4svn54080-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009221100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921217" version="1" comment="texlive-web is &lt;2021.186.4.5svn57972-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921218" version="1" comment="texlive-webguide is &lt;2021.186.svn25813-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921219" version="1" comment="texlive-webquiz is &lt;2021.186.5.2svn50694-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921220" version="1" comment="texlive-webquiz-doc is &lt;2021.186.5.2svn50694-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921221" version="1" comment="texlive-widetable is &lt;2021.186.2.1svn53409-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921222" version="1" comment="texlive-widetable-doc is &lt;2021.186.2.1svn53409-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921223" version="1" comment="texlive-widows-and-orphans is &lt;2021.186.1.0dsvn58172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921224" version="1" comment="texlive-widows-and-orphans-doc is &lt;2021.186.1.0dsvn58172-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921225" version="1" comment="texlive-williams is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921226" version="1" comment="texlive-williams-doc is &lt;2021.186.svn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009219211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921227" version="1" comment="texlive-willowtreebook is &lt;2021.186.1.01svn54866-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921228" version="1" comment="texlive-willowtreebook-doc is &lt;2021.186.1.01svn54866-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921229" version="1" comment="texlive-windycity is &lt;2021.186.svn57577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921230" version="1" comment="texlive-windycity-doc is &lt;2021.186.svn57577-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921231" version="1" comment="texlive-withargs is &lt;2021.186.0.0.3.1svn52641-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921232" version="1" comment="texlive-withargs-doc is &lt;2021.186.0.0.3.1svn52641-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921233" version="1" comment="texlive-witharrows is &lt;2021.186.2.6csvn58120-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921234" version="1" comment="texlive-witharrows-doc is &lt;2021.186.2.6csvn58120-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921235" version="1" comment="texlive-wnri is &lt;2021.186.svn22459-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921236" version="1" comment="texlive-wnri-doc is &lt;2021.186.svn22459-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921237" version="1" comment="texlive-wnri-latex is &lt;2021.186.1.0bsvn22338-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921238" version="1" comment="texlive-wnri-latex-doc is &lt;2021.186.1.0bsvn22338-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921239" version="1" comment="texlive-wordcount is &lt;2021.186.1.7svn46165-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921240" version="1" comment="texlive-wordcount-doc is &lt;2021.186.1.7svn46165-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921241" version="1" comment="texlive-wordlike is &lt;2021.186.1.2bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921242" version="1" comment="texlive-wordlike-doc is &lt;2021.186.1.2bsvn15878-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921243" version="1" comment="texlive-worksheet is &lt;2021.186.1.1svn48423-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921244" version="1" comment="texlive-worksheet-doc is &lt;2021.186.1.1svn48423-46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921245" version="1" comment="texlive-wrapfig is &lt;2021.186.3.6svn22048-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921246" version="1" comment="texlive-wrapfig-doc is &lt;2021.186.3.6svn22048-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921247" version="1" comment="texlive-wsemclassic is &lt;2021.186.1.0.1svn31532-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921248" version="1" comment="texlive-wsemclassic-doc is &lt;2021.186.1.0.1svn31532-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921249" version="1" comment="texlive-wsuipa is &lt;2021.186.svn25469-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921250" version="1" comment="texlive-wsuipa-doc is &lt;2021.186.svn25469-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921251" version="1" comment="texlive-wtref is &lt;2021.186.0.0.4.0svn55558-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921252" version="1" comment="texlive-wtref-doc is &lt;2021.186.0.0.4.0svn55558-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921253" version="1" comment="texlive-xargs is &lt;2021.186.1.1svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921254" version="1" comment="texlive-xargs-doc is &lt;2021.186.1.1svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921255" version="1" comment="texlive-xassoccnt is &lt;2021.186.1.8svn55876-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921256" version="1" comment="texlive-xassoccnt-doc is &lt;2021.186.1.8svn55876-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921257" version="1" comment="texlive-xbmks is &lt;2021.186.svn53448-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921258" version="1" comment="texlive-xbmks-doc is &lt;2021.186.svn53448-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921259" version="1" comment="texlive-xcharter is &lt;2021.186.1.216svn58755-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921260" version="1" comment="texlive-xcharter-doc is &lt;2021.186.1.216svn58755-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921261" version="1" comment="texlive-xcharter-fonts is &lt;2021.186.1.216svn58755-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921262" version="1" comment="texlive-xcite is &lt;2021.186.16383.99998svn53486-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921263" version="1" comment="texlive-xcite-doc is &lt;2021.186.16383.99998svn53486-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921264" version="1" comment="texlive-xcjk2uni is &lt;2021.186.1.0svn54958-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921265" version="1" comment="texlive-xcjk2uni-doc is &lt;2021.186.1.0svn54958-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921266" version="1" comment="texlive-xcntperchap is &lt;2021.186.0.0.5svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921267" version="1" comment="texlive-xcntperchap-doc is &lt;2021.186.0.0.5svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921268" version="1" comment="texlive-xcolor is &lt;2021.186.2.12svn41044-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921269" version="1" comment="texlive-xcolor-doc is &lt;2021.186.2.12svn41044-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921270" version="1" comment="texlive-xcolor-material is &lt;2021.186.0.0.1svn42289-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921271" version="1" comment="texlive-xcolor-material-doc is &lt;2021.186.0.0.1svn42289-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921272" version="1" comment="texlive-xcolor-solarized is &lt;2021.186.0.0.4svn41809-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921273" version="1" comment="texlive-xcolor-solarized-doc is &lt;2021.186.0.0.4svn41809-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921274" version="1" comment="texlive-xcomment is &lt;2021.186.1.3svn20031-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921275" version="1" comment="texlive-xcomment-doc is &lt;2021.186.1.3svn20031-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921276" version="1" comment="texlive-xcookybooky is &lt;2021.186.1.5svn36435-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921277" version="1" comment="texlive-xcookybooky-doc is &lt;2021.186.1.5svn36435-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921278" version="1" comment="texlive-xcpdftips is &lt;2021.186.1.1svn50449-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921279" version="1" comment="texlive-xcpdftips-doc is &lt;2021.186.1.1svn50449-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921280" version="1" comment="texlive-xdoc is &lt;2021.186.prot2.5svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921281" version="1" comment="texlive-xdoc-doc is &lt;2021.186.prot2.5svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921282" version="1" comment="texlive-xduthesis is &lt;2021.186.1.00svn39694-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921283" version="1" comment="texlive-xduthesis-doc is &lt;2021.186.1.00svn39694-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921284" version="1" comment="texlive-xdvi is &lt;2021.186.svn54338-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921285" version="1" comment="texlive-xdvi-doc is &lt;2021.186.svn54338-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921286" version="1" comment="texlive-xebaposter is &lt;2021.186.2.51svn42046-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921287" version="1" comment="texlive-xebaposter-doc is &lt;2021.186.2.51svn42046-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921288" version="1" comment="texlive-xechangebar is &lt;2021.186.1.0svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921289" version="1" comment="texlive-xechangebar-doc is &lt;2021.186.1.0svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921290" version="1" comment="texlive-xecjk is &lt;2021.186.3.8.6svn56711-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921291" version="1" comment="texlive-xecjk-doc is &lt;2021.186.3.8.6svn56711-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921292" version="1" comment="texlive-xecolor is &lt;2021.186.0.0.1svn29660-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921293" version="1" comment="texlive-xecolor-doc is &lt;2021.186.0.0.1svn29660-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921294" version="1" comment="texlive-xecyr is &lt;2021.186.1.2svn54308-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921295" version="1" comment="texlive-xecyr-doc is &lt;2021.186.1.2svn54308-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921296" version="1" comment="texlive-xecyrmongolian is &lt;2021.186.1.0svn53160-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921297" version="1" comment="texlive-xecyrmongolian-doc is &lt;2021.186.1.0svn53160-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921298" version="1" comment="texlive-xeindex is &lt;2021.186.0.0.3svn35756-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921299" version="1" comment="texlive-xeindex-doc is &lt;2021.186.0.0.3svn35756-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921300" version="1" comment="texlive-xelatex-dev is &lt;2021.186.svn57186-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921301" version="1" comment="texlive-xellipsis is &lt;2021.186.2.0svn47546-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921302" version="1" comment="texlive-xellipsis-doc is &lt;2021.186.2.0svn47546-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921303" version="1" comment="texlive-xepersian is &lt;2021.186.23.1svn55194-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921304" version="1" comment="texlive-xepersian-doc is &lt;2021.186.23.1svn55194-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921305" version="1" comment="texlive-xepersian-hm is &lt;2021.186.1.1asvn56272-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921306" version="1" comment="texlive-xepersian-hm-doc is &lt;2021.186.1.1asvn56272-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921307" version="1" comment="texlive-xesearch is &lt;2021.186.0.0.2svn51908-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921308" version="1" comment="texlive-xesearch-doc is &lt;2021.186.0.0.2svn51908-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921309" version="1" comment="texlive-xespotcolor is &lt;2021.186.2.1svn58212-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921310" version="1" comment="texlive-xespotcolor-doc is &lt;2021.186.2.1svn58212-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921311" version="1" comment="texlive-xetex is &lt;2021.186.svn57972-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921312" version="1" comment="texlive-xetex-devanagari is &lt;2021.186.0.0.5svn34296-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921313" version="1" comment="texlive-xetex-devanagari-doc is &lt;2021.186.0.0.5svn34296-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921314" version="1" comment="texlive-xetex-doc is &lt;2021.186.svn57972-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921315" version="1" comment="texlive-xetex-itrans is &lt;2021.186.4.2svn55475-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921316" version="1" comment="texlive-xetex-itrans-doc is &lt;2021.186.4.2svn55475-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921317" version="1" comment="texlive-xetex-pstricks is &lt;2021.186.svn17055-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921318" version="1" comment="texlive-xetex-pstricks-doc is &lt;2021.186.svn17055-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921319" version="1" comment="texlive-xetex-tibetan is &lt;2021.186.0.0.1svn28847-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921320" version="1" comment="texlive-xetex-tibetan-doc is &lt;2021.186.0.0.1svn28847-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921321" version="1" comment="texlive-xetexconfig is &lt;2021.186.svn45845-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921322" version="1" comment="texlive-xetexfontinfo is &lt;2021.186.svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921323" version="1" comment="texlive-xetexfontinfo-doc is &lt;2021.186.svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921324" version="1" comment="texlive-xetexko is &lt;2021.186.3.1svn58633-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921325" version="1" comment="texlive-xetexko-doc is &lt;2021.186.3.1svn58633-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921326" version="1" comment="texlive-xetexref is &lt;2021.186.svn56291-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921327" version="1" comment="texlive-xevlna is &lt;2021.186.1.1svn43864-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921328" version="1" comment="texlive-xevlna-doc is &lt;2021.186.1.1svn43864-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921329" version="1" comment="texlive-xfakebold is &lt;2021.186.0.0.08svn55654-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921330" version="1" comment="texlive-xfakebold-doc is &lt;2021.186.0.0.08svn55654-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921331" version="1" comment="texlive-xfor is &lt;2021.186.1.05svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921332" version="1" comment="texlive-xfor-doc is &lt;2021.186.1.05svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921333" version="1" comment="texlive-xgreek is &lt;2021.186.3.0.1svn46662-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921334" version="1" comment="texlive-xgreek-doc is &lt;2021.186.3.0.1svn46662-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921335" version="1" comment="texlive-xhfill is &lt;2021.186.1.01svn22575-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921336" version="1" comment="texlive-xhfill-doc is &lt;2021.186.1.01svn22575-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921337" version="1" comment="texlive-xifthen is &lt;2021.186.1.4.0svn38929-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921338" version="1" comment="texlive-xifthen-doc is &lt;2021.186.1.4.0svn38929-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921339" version="1" comment="texlive-xii is &lt;2021.186.svn45804-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921340" version="1" comment="texlive-xii-lat is &lt;2021.186.svn45805-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921341" version="1" comment="texlive-xindex is &lt;2021.186.0.0.28svn56295-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921342" version="1" comment="texlive-xindex-doc is &lt;2021.186.0.0.28svn56295-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921343" version="1" comment="texlive-xint is &lt;2021.186.1.4dsvn58738-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921344" version="1" comment="texlive-xint-doc is &lt;2021.186.1.4dsvn58738-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921345" version="1" comment="texlive-xits is &lt;2021.186.1.302svn55730-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921346" version="1" comment="texlive-xits-doc is &lt;2021.186.1.302svn55730-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921347" version="1" comment="texlive-xits-fonts is &lt;2021.186.1.302svn55730-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921348" version="1" comment="texlive-xkcdcolors is &lt;2021.186.1.0.1svn54512-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921349" version="1" comment="texlive-xkcdcolors-doc is &lt;2021.186.1.0.1svn54512-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921350" version="1" comment="texlive-xkeyval is &lt;2021.186.2.8svn57006-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921351" version="1" comment="texlive-xkeyval-doc is &lt;2021.186.2.8svn57006-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921352" version="1" comment="texlive-xlop is &lt;2021.186.0.0.28svn56910-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921353" version="1" comment="texlive-xlop-doc is &lt;2021.186.0.0.28svn56910-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921354" version="1" comment="texlive-xltabular is &lt;2021.186.0.0.2esvn56855-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921355" version="1" comment="texlive-xltabular-doc is &lt;2021.186.0.0.2esvn56855-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921356" version="1" comment="texlive-xltxtra is &lt;2021.186.0.0.7svn56594-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921357" version="1" comment="texlive-xltxtra-doc is &lt;2021.186.0.0.7svn56594-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921358" version="1" comment="texlive-xml2pmx is &lt;2021.186.svn57972-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921359" version="1" comment="texlive-xmltex is &lt;2021.186.0.0.8svn57186-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921360" version="1" comment="texlive-xmltex-doc is &lt;2021.186.0.0.8svn57186-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921361" version="1" comment="texlive-xmltexconfig is &lt;2021.186.svn45845-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921362" version="1" comment="texlive-xmpincl is &lt;2021.186.2.2svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921363" version="1" comment="texlive-xmpincl-doc is &lt;2021.186.2.2svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921364" version="1" comment="texlive-xmuthesis is &lt;2021.186.0.0.4.1svn56614-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921365" version="1" comment="texlive-xmuthesis-doc is &lt;2021.186.0.0.4.1svn56614-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921366" version="1" comment="texlive-xnewcommand is &lt;2021.186.1.2svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921367" version="1" comment="texlive-xnewcommand-doc is &lt;2021.186.1.2svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921368" version="1" comment="texlive-xoptarg is &lt;2021.186.1.0svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921369" version="1" comment="texlive-xoptarg-doc is &lt;2021.186.1.0svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921370" version="1" comment="texlive-xpatch is &lt;2021.186.0.0.3svn54563-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921371" version="1" comment="texlive-xpatch-doc is &lt;2021.186.0.0.3svn54563-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921372" version="1" comment="texlive-xpdfopen is &lt;2021.186.0.0.86svn53998-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921373" version="1" comment="texlive-xpeek is &lt;2021.186.0.0.2svn27442-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921374" version="1" comment="texlive-xpeek-doc is &lt;2021.186.0.0.2svn27442-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921375" version="1" comment="texlive-xpiano is &lt;2021.186.1.0svn37604-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921376" version="1" comment="texlive-xpiano-doc is &lt;2021.186.1.0svn37604-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921377" version="1" comment="texlive-xpicture is &lt;2021.186.1.2asvn28770-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921378" version="1" comment="texlive-xpicture-doc is &lt;2021.186.1.2asvn28770-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921379" version="1" comment="texlive-xpinyin is &lt;2021.186.2.9svn56709-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921380" version="1" comment="texlive-xpinyin-doc is &lt;2021.186.2.9svn56709-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921381" version="1" comment="texlive-xprintlen is &lt;2021.186.1.0svn35928-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921382" version="1" comment="texlive-xprintlen-doc is &lt;2021.186.1.0svn35928-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921383" version="1" comment="texlive-xpunctuate is &lt;2021.186.1.0svn26641-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921384" version="1" comment="texlive-xpunctuate-doc is &lt;2021.186.1.0svn26641-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921385" version="1" comment="texlive-xq is &lt;2021.186.0.0.4svn35211-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921386" version="1" comment="texlive-xq-doc is &lt;2021.186.0.0.4svn35211-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921387" version="1" comment="texlive-xsavebox is &lt;2021.186.0.0.16svn54097-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921388" version="1" comment="texlive-xsavebox-doc is &lt;2021.186.0.0.16svn54097-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921389" version="1" comment="texlive-xsim is &lt;2021.186.0.0.20csvn57619-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921390" version="1" comment="texlive-xsim-doc is &lt;2021.186.0.0.20csvn57619-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921391" version="1" comment="texlive-xskak is &lt;2021.186.1.5svn51432-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921392" version="1" comment="texlive-xskak-doc is &lt;2021.186.1.5svn51432-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921393" version="1" comment="texlive-xstring is &lt;2021.186.1.83svn49946-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921394" version="1" comment="texlive-xstring-doc is &lt;2021.186.1.83svn49946-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921395" version="1" comment="texlive-xtab is &lt;2021.186.2.3fsvn23347-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921396" version="1" comment="texlive-xtab-doc is &lt;2021.186.2.3fsvn23347-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921397" version="1" comment="texlive-xtuthesis is &lt;2021.186.1.0svn47049-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921398" version="1" comment="texlive-xtuthesis-doc is &lt;2021.186.1.0svn47049-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921399" version="1" comment="texlive-xunicode is &lt;2021.186.0.0.981svn30466-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921400" version="1" comment="texlive-xunicode-doc is &lt;2021.186.0.0.981svn30466-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921401" version="1" comment="texlive-xurl is &lt;2021.186.0.0.09asvn57265-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921402" version="1" comment="texlive-xurl-doc is &lt;2021.186.0.0.09asvn57265-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921403" version="1" comment="texlive-xwatermark is &lt;2021.186.1.5.2dsvn28090-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921404" version="1" comment="texlive-xwatermark-doc is &lt;2021.186.1.5.2dsvn28090-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921405" version="1" comment="texlive-xyling is &lt;2021.186.1.1svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921406" version="1" comment="texlive-xyling-doc is &lt;2021.186.1.1svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921407" version="1" comment="texlive-xymtex is &lt;2021.186.5.06svn32182-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921408" version="1" comment="texlive-xymtex-doc is &lt;2021.186.5.06svn32182-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921409" version="1" comment="texlive-xypic is &lt;2021.186.3.8.9svn31859-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921410" version="1" comment="texlive-xypic-doc is &lt;2021.186.3.8.9svn31859-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921411" version="1" comment="texlive-xypic-fonts is &lt;2021.186.3.8.9svn31859-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921412" version="1" comment="texlive-xypic-tut-pt is &lt;2021.186.svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921413" version="1" comment="texlive-xytree is &lt;2021.186.1.5svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921414" version="1" comment="texlive-xytree-doc is &lt;2021.186.1.5svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921415" version="1" comment="texlive-yafoot is &lt;2021.186.1.1svn48568-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921416" version="1" comment="texlive-yafoot-doc is &lt;2021.186.1.1svn48568-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921417" version="1" comment="texlive-yagusylo is &lt;2021.186.1.2svn29803-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921418" version="1" comment="texlive-yagusylo-doc is &lt;2021.186.1.2svn29803-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921419" version="1" comment="texlive-yaletter is &lt;2021.186.1.1svn42830-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921420" version="1" comment="texlive-yaletter-doc is &lt;2021.186.1.1svn42830-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921421" version="1" comment="texlive-yannisgr is &lt;2021.186.svn22613-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921422" version="1" comment="texlive-yannisgr-doc is &lt;2021.186.svn22613-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921423" version="1" comment="texlive-yathesis is &lt;2021.186.1.0.7svn58683-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921424" version="1" comment="texlive-yathesis-doc is &lt;2021.186.1.0.7svn58683-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921425" version="1" comment="texlive-yax is &lt;2021.186.1.03svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921426" version="1" comment="texlive-yax-doc is &lt;2021.186.1.03svn54080-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921427" version="1" comment="texlive-yazd-thesis is &lt;2021.186.0.0.3svn51725-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921428" version="1" comment="texlive-yazd-thesis-doc is &lt;2021.186.0.0.3svn51725-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921429" version="1" comment="texlive-ycbook is &lt;2021.186.svn46201-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921430" version="1" comment="texlive-ycbook-doc is &lt;2021.186.svn46201-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921431" version="1" comment="texlive-ydoc is &lt;2021.186.0.0.6alphasvn56291-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921432" version="1" comment="texlive-ydoc-doc is &lt;2021.186.0.0.6alphasvn56291-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921433" version="1" comment="texlive-yfonts is &lt;2021.186.1.4svn50755-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921434" version="1" comment="texlive-yfonts-doc is &lt;2021.186.1.4svn50755-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921435" version="1" comment="texlive-yfonts-t1 is &lt;2021.186.1.0svn36013-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921436" version="1" comment="texlive-yfonts-t1-doc is &lt;2021.186.1.0svn36013-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921437" version="1" comment="texlive-yfonts-t1-fonts is &lt;2021.186.1.0svn36013-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921438" version="1" comment="texlive-yhmath is &lt;2021.186.1.6svn54377-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921439" version="1" comment="texlive-yhmath-doc is &lt;2021.186.1.6svn54377-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921440" version="1" comment="texlive-yhmath-fonts is &lt;2021.186.1.6svn54377-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921441" version="1" comment="texlive-yinit-otf is &lt;2021.186.1.0svn40207-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921442" version="1" comment="texlive-yinit-otf-doc is &lt;2021.186.1.0svn40207-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921443" version="1" comment="texlive-yinit-otf-fonts is &lt;2021.186.1.0svn40207-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921444" version="1" comment="texlive-york-thesis is &lt;2021.186.3.6svn23348-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921445" version="1" comment="texlive-york-thesis-doc is &lt;2021.186.3.6svn23348-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921446" version="1" comment="texlive-youngtab is &lt;2021.186.1.1svn56500-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921447" version="1" comment="texlive-youngtab-doc is &lt;2021.186.1.1svn56500-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921448" version="1" comment="texlive-yplan is &lt;2021.186.svn34398-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921449" version="1" comment="texlive-yplan-doc is &lt;2021.186.svn34398-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921450" version="1" comment="texlive-yquant is &lt;2021.186.0.0.4svn58712-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921451" version="1" comment="texlive-yquant-doc is &lt;2021.186.0.0.4svn58712-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921452" version="1" comment="texlive-ytableau is &lt;2021.186.1.3svn27430-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921453" version="1" comment="texlive-ytableau-doc is &lt;2021.186.1.3svn27430-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921454" version="1" comment="texlive-zapfchan is &lt;2021.186.svn31835-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921455" version="1" comment="texlive-zapfchan-fonts is &lt;2021.186.svn31835-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921456" version="1" comment="texlive-zapfding is &lt;2021.186.svn31835-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921457" version="1" comment="texlive-zapfding-fonts is &lt;2021.186.svn31835-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921458" version="1" comment="texlive-zbmath-review-template is &lt;2021.186.1.0svn58543-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921459" version="1" comment="texlive-zbmath-review-template-doc is &lt;2021.186.1.0svn58543-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921460" version="1" comment="texlive-zebra-goodies is &lt;2021.186.0.0.8.0svn51554-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921461" version="1" comment="texlive-zebra-goodies-doc is &lt;2021.186.0.0.8.0svn51554-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921462" version="1" comment="texlive-zed-csp is &lt;2021.186.svn17258-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921463" version="1" comment="texlive-zed-csp-doc is &lt;2021.186.svn17258-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921464" version="1" comment="texlive-zhlineskip is &lt;2021.186.1.0esvn51142-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921465" version="1" comment="texlive-zhlineskip-doc is &lt;2021.186.1.0esvn51142-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921466" version="1" comment="texlive-zhlipsum is &lt;2021.186.1.2.0svn54994-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921467" version="1" comment="texlive-zhlipsum-doc is &lt;2021.186.1.2.0svn54994-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921468" version="1" comment="texlive-zhmetrics is &lt;2021.186.r206svn22207-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921469" version="1" comment="texlive-zhmetrics-doc is &lt;2021.186.r206svn22207-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921470" version="1" comment="texlive-zhmetrics-uptex is &lt;2021.186.1.0svn40728-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921471" version="1" comment="texlive-zhmetrics-uptex-doc is &lt;2021.186.1.0svn40728-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921472" version="1" comment="texlive-zhnumber is &lt;2021.186.2.8svn54960-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921473" version="1" comment="texlive-zhnumber-doc is &lt;2021.186.2.8svn54960-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921474" version="1" comment="texlive-zhspacing is &lt;2021.186.svn41145-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921475" version="1" comment="texlive-zhspacing-doc is &lt;2021.186.svn41145-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921476" version="1" comment="texlive-ziffer is &lt;2021.186.2.1svn32279-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921477" version="1" comment="texlive-ziffer-doc is &lt;2021.186.2.1svn32279-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921478" version="1" comment="texlive-zlmtt is &lt;2021.186.1.02svn51368-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921479" version="1" comment="texlive-zlmtt-doc is &lt;2021.186.1.02svn51368-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921480" version="1" comment="texlive-zootaxa-bst is &lt;2021.186.1.0svn50619-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921481" version="1" comment="texlive-zootaxa-bst-doc is &lt;2021.186.1.0svn50619-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921482" version="1" comment="texlive-zref is &lt;2021.186.2.32svn56611-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921483" version="1" comment="texlive-zref-doc is &lt;2021.186.2.32svn56611-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921484" version="1" comment="texlive-zwgetfdate is &lt;2021.186.svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921485" version="1" comment="texlive-zwgetfdate-doc is &lt;2021.186.svn15878-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921486" version="1" comment="texlive-zwpagelayout is &lt;2021.186.1.4dsvn53965-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921487" version="1" comment="texlive-zwpagelayout-doc is &lt;2021.186.1.4dsvn53965-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921488" version="1" comment="texlive-zxjafbfont is &lt;2021.186.0.0.2svn28539-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921489" version="1" comment="texlive-zxjafbfont-doc is &lt;2021.186.0.0.2svn28539-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921490" version="1" comment="texlive-zxjafont is &lt;2021.186.1.2svn53884-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921491" version="1" comment="texlive-zxjafont-doc is &lt;2021.186.1.2svn53884-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921492" version="1" comment="texlive-zxjatype is &lt;2021.186.0.0.7svn53500-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921493" version="1" comment="texlive-zxjatype-doc is &lt;2021.186.0.0.7svn53500-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921494" version="1" comment="texlive-zztex is &lt;2021.186.17.7svn55862-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921495" version="1" comment="texlive-zztex-doc is &lt;2021.186.17.7svn55862-45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921496" version="1" comment="libthrift-0_14_1 is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921497" version="1" comment="libthrift-devel is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921498" version="1" comment="libthrift_c_glib0 is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921499" version="1" comment="libthriftnb-0_14_1 is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921500" version="1" comment="libthriftz-0_14_1 is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921501" version="1" comment="perl-thrift is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921502" version="1" comment="python36-thrift is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921503" version="1" comment="python38-thrift is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921504" version="1" comment="python39-thrift is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921505" version="1" comment="thrift is &lt;0.14.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921506" version="1" comment="thttpd is &lt;2.29-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921507" version="1" comment="libtiff-devel is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921508" version="1" comment="libtiff-devel-32bit is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921509" version="1" comment="libtiff5 is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921510" version="1" comment="libtiff5-32bit is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921511" version="1" comment="tiff is &lt;4.3.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921512" version="1" comment="timidity is &lt;2.15.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921513" version="1" comment="tinc is &lt;1.0.36-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921514" version="1" comment="libtinyobjloader2 is &lt;2.0.0rc8+git.20210821-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921515" version="1" comment="tinyobjloader-devel is &lt;2.0.0rc8+git.20210821-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921516" version="1" comment="tinyproxy is &lt;1.11.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921517" version="1" comment="tmux is &lt;3.2a-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921518" version="1" comment="tnef is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921519" version="1" comment="tomcat is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921520" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921521" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921522" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921523" version="1" comment="tomcat-embed is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921524" version="1" comment="tomcat-javadoc is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921525" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921526" version="1" comment="tomcat-jsvc is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921527" version="1" comment="tomcat-lib is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921528" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921529" version="1" comment="tomcat-webapps is &lt;9.0.36-8.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921530" version="1" comment="tor is &lt;0.4.6.7-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921531" version="1" comment="libtss2-esys0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921532" version="1" comment="libtss2-esys0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921533" version="1" comment="libtss2-fapi1 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921534" version="1" comment="libtss2-fapi1-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921535" version="1" comment="libtss2-mu0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921536" version="1" comment="libtss2-mu0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921537" version="1" comment="libtss2-rc0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921538" version="1" comment="libtss2-rc0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921539" version="1" comment="libtss2-sys1 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921540" version="1" comment="libtss2-sys1-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921541" version="1" comment="libtss2-tcti-cmd0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921542" version="1" comment="libtss2-tcti-cmd0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921543" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921544" version="1" comment="libtss2-tcti-device0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921545" version="1" comment="libtss2-tcti-mssim0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921546" version="1" comment="libtss2-tcti-mssim0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921547" version="1" comment="libtss2-tcti-pcap0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921548" version="1" comment="libtss2-tcti-swtpm0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921549" version="1" comment="libtss2-tcti-swtpm0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921550" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921551" version="1" comment="libtss2-tctildr0-32bit is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921552" version="1" comment="tpm2-0-tss is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921553" version="1" comment="tpm2-0-tss-devel is &lt;3.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921554" version="1" comment="tpm2.0-tools is &lt;5.1.1-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921555" version="1" comment="transfig is &lt;3.2.8a-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921556" version="1" comment="python36-translate-toolkit is &lt;3.3.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921557" version="1" comment="python38-translate-toolkit is &lt;3.3.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921558" version="1" comment="python39-translate-toolkit is &lt;3.3.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921559" version="1" comment="translate-toolkit-devel-doc is &lt;3.3.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921560" version="1" comment="translate-toolkit-doc is &lt;3.3.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921561" version="1" comment="transmission is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921562" version="1" comment="transmission-common is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921563" version="1" comment="transmission-daemon is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921564" version="1" comment="transmission-gtk is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921565" version="1" comment="transmission-gtk-lang is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921566" version="1" comment="transmission-qt is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921567" version="1" comment="transmission-qt-lang is &lt;3.00-2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921568" version="1" comment="agrep is &lt;0.8.0_git201402282055-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921569" version="1" comment="libtre5 is &lt;0.8.0_git201402282055-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921570" version="1" comment="tre is &lt;0.8.0_git201402282055-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921571" version="1" comment="tre-devel is &lt;0.8.0_git201402282055-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921572" version="1" comment="tre-lang is &lt;0.8.0_git201402282055-5.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921573" version="1" comment="libtspi1 is &lt;0.3.15-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921574" version="1" comment="libtspi1-32bit is &lt;0.3.15-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921575" version="1" comment="trousers is &lt;0.3.15-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921576" version="1" comment="trousers-devel is &lt;0.3.15-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921577" version="1" comment="libucl1 is &lt;1.03-4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921578" version="1" comment="ucl-devel is &lt;1.03-4.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921579" version="1" comment="ucode-intel is &lt;20210608-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921580" version="1" comment="libudisks2-0 is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921581" version="1" comment="libudisks2-0-devel is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921582" version="1" comment="libudisks2-0_bcache is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921583" version="1" comment="libudisks2-0_btrfs is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921584" version="1" comment="libudisks2-0_lsm is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921585" version="1" comment="libudisks2-0_lvm2 is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921586" version="1" comment="libudisks2-0_vdo is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921587" version="1" comment="libudisks2-0_zram is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921588" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921589" version="1" comment="udisks2 is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921590" version="1" comment="udisks2-lang is &lt;2.9.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921591" version="1" comment="gimp-ufraw is &lt;0.22-9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921592" version="1" comment="ufraw is &lt;0.22-9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921593" version="1" comment="ufraw-lang is &lt;0.22-9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921594" version="1" comment="libulfius2_7 is &lt;2.7.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921595" version="1" comment="ulfius-devel is &lt;2.7.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921596" version="1" comment="uwsc is &lt;2.7.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921597" version="1" comment="umoci is &lt;0.4.7-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921598" version="1" comment="libodbc2 is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921599" version="1" comment="libodbc2-32bit is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921600" version="1" comment="unixODBC is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921601" version="1" comment="unixODBC-32bit is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921602" version="1" comment="unixODBC-devel is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921603" version="1" comment="unixODBC-devel-32bit is &lt;2.3.9-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921604" version="1" comment="libunshield0 is &lt;1.4.3-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921605" version="1" comment="unshield is &lt;1.4.3-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921606" version="1" comment="unshield-devel is &lt;1.4.3-2.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921607" version="1" comment="unzip is &lt;6.00-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921608" version="1" comment="unzip-doc is &lt;6.00-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921609" version="1" comment="upx is &lt;3.96-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921610" version="1" comment="uranium-firmware-lulzbot is &lt;1.1.9.34_5f9c029d1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921611" version="1" comment="liburiparser1 is &lt;0.9.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921612" version="1" comment="liburiparser1-32bit is &lt;0.9.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921613" version="1" comment="uriparser is &lt;0.9.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921614" version="1" comment="uriparser-devel is &lt;0.9.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921615" version="1" comment="uriparser-doc is &lt;0.9.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921616" version="1" comment="libusbredirhost1 is &lt;0.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921617" version="1" comment="libusbredirparser1 is &lt;0.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921618" version="1" comment="usbredir is &lt;0.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921619" version="1" comment="usbredir-devel is &lt;0.11.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921620" version="1" comment="apache2-mod_uwsgi is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921621" version="1" comment="uwsgi is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921622" version="1" comment="uwsgi-emperor_pg is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921623" version="1" comment="uwsgi-emperor_zeromq is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921624" version="1" comment="uwsgi-gevent is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921625" version="1" comment="uwsgi-glusterfs is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921626" version="1" comment="uwsgi-greenlet is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921627" version="1" comment="uwsgi-jvm is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921628" version="1" comment="uwsgi-ldap is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921629" version="1" comment="uwsgi-libffi is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921630" version="1" comment="uwsgi-logzmq is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921631" version="1" comment="uwsgi-lua is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921632" version="1" comment="uwsgi-pam is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921633" version="1" comment="uwsgi-php7 is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921634" version="1" comment="uwsgi-psgi is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921635" version="1" comment="uwsgi-pypy is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921636" version="1" comment="uwsgi-python is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921637" version="1" comment="uwsgi-python3 is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921638" version="1" comment="uwsgi-sqlite3 is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921639" version="1" comment="uwsgi-xslt is &lt;2.0.19.1-3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921640" version="1" comment="vagrant is &lt;2.2.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921641" version="1" comment="vagrant-bash-completion is &lt;2.2.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921642" version="1" comment="vagrant-doc is &lt;2.2.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921643" version="1" comment="vagrant-emacs is &lt;2.2.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921644" version="1" comment="vagrant-vim is &lt;2.2.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921645" version="1" comment="valgrind is &lt;3.17.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921646" version="1" comment="valgrind-32bit is &lt;3.17.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921647" version="1" comment="valgrind-devel is &lt;3.17.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921648" version="1" comment="libvarnishapi2 is &lt;6.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921649" version="1" comment="varnish is &lt;6.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921650" version="1" comment="varnish-devel is &lt;6.6.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921651" version="1" comment="velero is &lt;1.6.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921652" version="1" comment="velocity is &lt;1.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921653" version="1" comment="velocity-demo is &lt;1.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921654" version="1" comment="velocity-javadoc is &lt;1.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921655" version="1" comment="velocity-manual is &lt;1.7-9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921656" version="1" comment="veyon is &lt;4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921657" version="1" comment="gvim is &lt;8.2.3408-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921658" version="1" comment="vim is &lt;8.2.3408-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921659" version="1" comment="vim-data is &lt;8.2.3408-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921660" version="1" comment="vim-data-common is &lt;8.2.3408-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921661" version="1" comment="vim-small is &lt;8.2.3408-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921662" version="1" comment="vino is &lt;3.22.0-7.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921663" version="1" comment="vino-lang is &lt;3.22.0-7.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921664" version="1" comment="libvirglrenderer1 is &lt;0.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921665" version="1" comment="virglrenderer-devel is &lt;0.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921666" version="1" comment="virglrenderer-test-server is &lt;0.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921667" version="1" comment="virt-install is &lt;3.2.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921668" version="1" comment="virt-manager is &lt;3.2.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921669" version="1" comment="virt-manager-common is &lt;3.2.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921670" version="1" comment="python3-virtualbox is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921671" version="1" comment="virtualbox is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921672" version="1" comment="virtualbox-devel is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921673" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921674" version="1" comment="virtualbox-guest-source is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921675" version="1" comment="virtualbox-guest-tools is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921676" version="1" comment="virtualbox-guest-x11 is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921677" version="1" comment="virtualbox-host-source is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921678" version="1" comment="virtualbox-qt is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921679" version="1" comment="virtualbox-vnc is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921680" version="1" comment="virtualbox-websrv is &lt;6.1.26-3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921681" version="1" comment="libvlc5 is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921682" version="1" comment="libvlccore9 is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921683" version="1" comment="vlc is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921684" version="1" comment="vlc-codec-gstreamer is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921685" version="1" comment="vlc-devel is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921686" version="1" comment="vlc-jack is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921687" version="1" comment="vlc-lang is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921688" version="1" comment="vlc-noX is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921689" version="1" comment="vlc-opencv is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921690" version="1" comment="vlc-qt is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921691" version="1" comment="vlc-vdpau is &lt;3.0.16-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921692" version="1" comment="vorbis-tools is &lt;1.4.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921693" version="1" comment="vorbis-tools-lang is &lt;1.4.2-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921694" version="1" comment="w3m is &lt;0.5.3+git20180125-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921695" version="1" comment="w3m-inline-image is &lt;0.5.3+git20180125-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921696" version="1" comment="libwavpack1 is &lt;5.4.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921697" version="1" comment="libwavpack1-32bit is &lt;5.4.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921698" version="1" comment="wavpack is &lt;5.4.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921699" version="1" comment="wavpack-devel is &lt;5.4.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921700" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921701" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921702" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921703" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921704" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921705" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921706" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921707" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921708" version="1" comment="webkit-jsc-4 is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921709" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921710" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921711" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921712" version="1" comment="weblate is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921713" version="1" comment="weblate-doc is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921714" version="1" comment="weechat is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921715" version="1" comment="weechat-devel is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921716" version="1" comment="weechat-lang is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921717" version="1" comment="weechat-lua is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921718" version="1" comment="weechat-perl is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921719" version="1" comment="weechat-python is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921720" version="1" comment="weechat-ruby is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921721" version="1" comment="weechat-spell is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921722" version="1" comment="weechat-tcl is &lt;3.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921723" version="1" comment="wesnoth is &lt;1.15.17-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921724" version="1" comment="wesnoth-campaign-server is &lt;1.15.17-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921725" version="1" comment="wesnoth-data is &lt;1.15.17-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921726" version="1" comment="wesnoth-fslayout is &lt;1.15.17-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921727" version="1" comment="wesnoth-server is &lt;1.15.17-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921728" version="1" comment="wget is &lt;1.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921729" version="1" comment="wget-lang is &lt;1.21.1-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921730" version="1" comment="wicked is &lt;0.6.66-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921731" version="1" comment="wicked-service is &lt;0.6.66-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921732" version="1" comment="libWildMidi2 is &lt;0.4.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921733" version="1" comment="wildmidi is &lt;0.4.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921734" version="1" comment="wildmidi-devel is &lt;0.4.4-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921735" version="1" comment="libwireshark14 is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921736" version="1" comment="libwiretap11 is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921737" version="1" comment="libwsutil12 is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921738" version="1" comment="wireshark is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921739" version="1" comment="wireshark-devel is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921740" version="1" comment="wireshark-ui-qt is &lt;3.4.8-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921741" version="1" comment="wp-cli is &lt;2.5.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921742" version="1" comment="wpa_supplicant is &lt;2.9-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921743" version="1" comment="wpa_supplicant-gui is &lt;2.9-13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921744" version="1" comment="libxapian-devel is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921745" version="1" comment="libxapian30 is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921746" version="1" comment="libxapian30-32bit is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921747" version="1" comment="xapian-core is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921748" version="1" comment="xapian-core-doc is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921749" version="1" comment="xapian-core-examples is &lt;1.4.18-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921750" version="1" comment="alevtd is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921751" version="1" comment="motv is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921752" version="1" comment="pia is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921753" version="1" comment="tv-common is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921754" version="1" comment="v4l-conf is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921755" version="1" comment="v4l-tools is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921756" version="1" comment="xawtv is &lt;3.107-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921757" version="1" comment="xdg-utils is &lt;1.1.3+20201113-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921758" version="1" comment="xdm is &lt;1.1.12-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921759" version="1" comment="xdm-xsession is &lt;1.1.12-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921760" version="1" comment="xen is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921761" version="1" comment="xen-devel is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921762" version="1" comment="xen-doc-html is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921763" version="1" comment="xen-libs is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921764" version="1" comment="xen-libs-32bit is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921765" version="1" comment="xen-tools is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921766" version="1" comment="xen-tools-domU is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921767" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.15.1_01-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921768" version="1" comment="libxerces-c-3_2 is &lt;3.2.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921769" version="1" comment="libxerces-c-3_2-32bit is &lt;3.2.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921770" version="1" comment="libxerces-c-devel is &lt;3.2.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921771" version="1" comment="xerces-c is &lt;3.2.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921772" version="1" comment="xerces-c-doc is &lt;3.2.3-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921773" version="1" comment="xmlgraphics-batik is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921774" version="1" comment="xmlgraphics-batik-css is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921775" version="1" comment="xmlgraphics-batik-demo is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921776" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921777" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921778" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921779" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921780" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921781" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.14-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921782" version="1" comment="libxmltooling-devel is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921783" version="1" comment="libxmltooling-lite10 is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921784" version="1" comment="libxmltooling10 is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921785" version="1" comment="xmltooling-schemas is &lt;3.2.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921786" version="1" comment="xorg-x11 is &lt;7.6_1-16.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921787" version="1" comment="xorg-x11-essentials is &lt;7.6_1-16.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921788" version="1" comment="xorg-x11-server is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921789" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921790" version="1" comment="xorg-x11-server-extra is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921791" version="1" comment="xorg-x11-server-sdk is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921792" version="1" comment="xorg-x11-server-source is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921793" version="1" comment="xorg-x11-server-wrapper is &lt;1.20.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921794" version="1" comment="libpainter0 is &lt;0.9.15-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921795" version="1" comment="librfxencode0 is &lt;0.9.15-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921796" version="1" comment="xrdp is &lt;0.9.15-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921797" version="1" comment="xrdp-devel is &lt;0.9.15-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921798" version="1" comment="xterm is &lt;368-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921799" version="1" comment="xterm-bin is &lt;368-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921800" version="1" comment="xwayland is &lt;21.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921801" version="1" comment="xwayland-devel is &lt;21.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921802" version="1" comment="libyaml-cpp0_6 is &lt;0.6.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921803" version="1" comment="yaml-cpp-devel is &lt;0.6.3-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921804" version="1" comment="libyara-devel is &lt;4.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921805" version="1" comment="libyara8 is &lt;4.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921806" version="1" comment="yara is &lt;4.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921807" version="1" comment="yara-doc is &lt;4.1.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921808" version="1" comment="yast2-core is &lt;4.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921809" version="1" comment="yast2-core-devel is &lt;4.4.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921810" version="1" comment="yast2-buildtools is &lt;4.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921811" version="1" comment="yast2-devtools is &lt;4.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921812" version="1" comment="yast2-multipath is &lt;4.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921813" version="1" comment="yast2-rmt is &lt;1.3.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921814" version="1" comment="yast2-samba-provision is &lt;1.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921815" version="1" comment="yast2-security is &lt;4.4.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921816" version="1" comment="libykcs11-2 is &lt;2.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921817" version="1" comment="libykcs11-devel is &lt;2.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921818" version="1" comment="libykpiv-devel is &lt;2.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921819" version="1" comment="libykpiv2 is &lt;2.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921820" version="1" comment="yubico-piv-tool is &lt;2.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921821" version="1" comment="yubikey-manager is &lt;4.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921822" version="1" comment="zabbix-agent is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921823" version="1" comment="zabbix-java-gateway is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921824" version="1" comment="zabbix-phpfrontend is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921825" version="1" comment="zabbix-proxy is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921826" version="1" comment="zabbix-proxy-mysql is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921827" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921828" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921829" version="1" comment="zabbix-server is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921830" version="1" comment="zabbix-server-mysql is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921831" version="1" comment="zabbix-server-postgresql is &lt;4.0.32-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921832" version="1" comment="libzmq5 is &lt;4.3.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921833" version="1" comment="libzmq5-32bit is &lt;4.3.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921834" version="1" comment="zeromq-devel is &lt;4.3.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921835" version="1" comment="zeromq-tools is &lt;4.3.4-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921836" version="1" comment="zim is &lt;0.73.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921837" version="1" comment="zim-lang is &lt;0.73.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921838" version="1" comment="znc is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921839" version="1" comment="znc-devel is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921840" version="1" comment="znc-lang is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921841" version="1" comment="znc-perl is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921842" version="1" comment="znc-python3 is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921843" version="1" comment="znc-tcl is &lt;1.8.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921844" version="1" comment="zsh is &lt;5.8-7.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921845" version="1" comment="zsh-htmldoc is &lt;5.8-7.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921846" version="1" comment="libzstd-devel is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921847" version="1" comment="libzstd-devel-32bit is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921848" version="1" comment="libzstd-devel-static is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921849" version="1" comment="libzstd1 is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921850" version="1" comment="libzstd1-32bit is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921851" version="1" comment="zstd is &lt;1.5.0-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921852" version="1" comment="zypper is &lt;1.14.49-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921853" version="1" comment="zypper-aptitude is &lt;1.14.49-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921854" version="1" comment="zypper-log is &lt;1.14.49-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921855" version="1" comment="zypper-needs-restarting is &lt;1.14.49-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921856" version="1" comment="libzzip-0-13 is &lt;0.13.72-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921857" version="1" comment="libzzip-0-13-32bit is &lt;0.13.72-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921858" version="1" comment="zziplib-devel is &lt;0.13.72-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921859" version="1" comment="zziplib-devel-32bit is &lt;0.13.72-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921860" version="1" comment="gdm is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921861" version="1" comment="gdm-branding-upstream is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921862" version="1" comment="gdm-devel is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921863" version="1" comment="gdm-lang is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921864" version="1" comment="gdm-systemd is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921865" version="1" comment="gdmflexiserver is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921866" version="1" comment="libgdm1 is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921867" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921868" version="1" comment="ffmpeg-4 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921869" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921870" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921871" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921872" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921873" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921874" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921875" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921876" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921877" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921878" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921879" version="1" comment="libavcodec58_134 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921880" version="1" comment="libavcodec58_134-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921881" version="1" comment="libavdevice58_13 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921882" version="1" comment="libavdevice58_13-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921883" version="1" comment="libavfilter7_110 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921884" version="1" comment="libavfilter7_110-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921885" version="1" comment="libavformat58_76 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921886" version="1" comment="libavformat58_76-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921887" version="1" comment="libavresample4_0 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921888" version="1" comment="libavresample4_0-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921889" version="1" comment="libavutil56_70 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921890" version="1" comment="libavutil56_70-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921891" version="1" comment="libpostproc55_9 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921892" version="1" comment="libpostproc55_9-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921893" version="1" comment="libswresample3_9 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921894" version="1" comment="libswresample3_9-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921895" version="1" comment="libswscale5_9 is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921896" version="1" comment="libswscale5_9-32bit is &lt;4.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921897" version="1" comment="krb5 is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921898" version="1" comment="krb5-32bit is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921899" version="1" comment="krb5-client is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921900" version="1" comment="krb5-devel is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921901" version="1" comment="krb5-devel-32bit is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921902" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921903" version="1" comment="krb5-plugin-preauth-otp is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921904" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921905" version="1" comment="krb5-plugin-preauth-spake is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921906" version="1" comment="krb5-server is &lt;1.19.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921907" version="1" comment="nodejs-electron is &lt;13.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921908" version="1" comment="python is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921909" version="1" comment="python-32bit is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921910" version="1" comment="python-curses is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921911" version="1" comment="python-demo is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921912" version="1" comment="python-gdbm is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921913" version="1" comment="python-idle is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921914" version="1" comment="python-tk is &lt;2.7.18-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921915" version="1" comment="libmbedcrypto7 is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921916" version="1" comment="libmbedcrypto7-32bit is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921917" version="1" comment="libmbedtls13 is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921918" version="1" comment="libmbedtls13-32bit is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921919" version="1" comment="libmbedx509-1 is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921920" version="1" comment="libmbedx509-1-32bit is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921921" version="1" comment="mbedtls-devel is &lt;2.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921922" version="1" comment="velero is &lt;1.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921923" version="1" comment="velero-plugin-for-aws is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921924" version="1" comment="chromedriver is &lt;94.0.4606.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921925" version="1" comment="chromium is &lt;94.0.4606.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921926" version="1" comment="ibm-data-db2 is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921927" version="1" comment="libmono-2_0-1 is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921928" version="1" comment="libmono-2_0-devel is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921929" version="1" comment="libmonoboehm-2_0-1 is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921930" version="1" comment="libmonoboehm-2_0-devel is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921931" version="1" comment="libmonosgen-2_0-1 is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921932" version="1" comment="libmonosgen-2_0-devel is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921933" version="1" comment="mono-complete is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921934" version="1" comment="mono-core is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921935" version="1" comment="mono-data is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921936" version="1" comment="mono-data-oracle is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921937" version="1" comment="mono-data-sqlite is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921938" version="1" comment="mono-devel is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921939" version="1" comment="mono-extras is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921940" version="1" comment="mono-locale-extras is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921941" version="1" comment="mono-mvc is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921942" version="1" comment="mono-reactive is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921943" version="1" comment="mono-wcf is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921944" version="1" comment="mono-web is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921945" version="1" comment="mono-winforms is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921946" version="1" comment="mono-winfxcore is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921947" version="1" comment="monodoc-core is &lt;6.12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921948" version="1" comment="python-onionshare is &lt;2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921949" version="1" comment="python-Scrapy-doc is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921950" version="1" comment="python38-Scrapy is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921951" version="1" comment="python39-Scrapy is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921952" version="1" comment="squid is &lt;5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921953" version="1" comment="apache2 is &lt;2.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921954" version="1" comment="hiredis is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921955" version="1" comment="hiredis-devel is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921956" version="1" comment="libhiredis1_0_0 is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921957" version="1" comment="liblz4-1 is &lt;1.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921958" version="1" comment="liblz4-1-32bit is &lt;1.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921959" version="1" comment="liblz4-devel is &lt;1.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921960" version="1" comment="lz4 is &lt;1.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921961" version="1" comment="redis is &lt;6.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921962" version="1" comment="ImageMagick is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921963" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921964" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921965" version="1" comment="ImageMagick-devel is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921966" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921967" version="1" comment="ImageMagick-doc is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921968" version="1" comment="ImageMagick-extra is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921969" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921970" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921971" version="1" comment="libMagick++-devel is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921972" version="1" comment="libMagick++-devel-32bit is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921973" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921974" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921975" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921976" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921977" version="1" comment="perl-PerlMagick is &lt;7.1.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921978" version="1" comment="containerd is &lt;1.4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921979" version="1" comment="containerd-ctr is &lt;1.4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921980" version="1" comment="docker is &lt;20.10.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921981" version="1" comment="docker-bash-completion is &lt;20.10.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921982" version="1" comment="docker-fish-completion is &lt;20.10.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921983" version="1" comment="docker-zsh-completion is &lt;20.10.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921984" version="1" comment="go1.16 is &lt;1.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921985" version="1" comment="go1.16-doc is &lt;1.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921986" version="1" comment="go1.16-race is &lt;1.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921987" version="1" comment="go1.17 is &lt;1.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921988" version="1" comment="go1.17-doc is &lt;1.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921989" version="1" comment="go1.17-race is &lt;1.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921990" version="1" comment="php7 is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921991" version="1" comment="php7-bcmath is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921992" version="1" comment="php7-bz2 is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921993" version="1" comment="php7-calendar is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921994" version="1" comment="php7-cli is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921995" version="1" comment="php7-ctype is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921996" version="1" comment="php7-curl is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921997" version="1" comment="php7-dba is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921998" version="1" comment="php7-devel is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009921999" version="1" comment="php7-dom is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922000" version="1" comment="php7-enchant is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922001" version="1" comment="php7-exif is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922002" version="1" comment="php7-fileinfo is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922003" version="1" comment="php7-ftp is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922004" version="1" comment="php7-gd is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922005" version="1" comment="php7-gettext is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922006" version="1" comment="php7-gmp is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922007" version="1" comment="php7-iconv is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922008" version="1" comment="php7-intl is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922009" version="1" comment="php7-json is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922010" version="1" comment="php7-ldap is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922011" version="1" comment="php7-mbstring is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922012" version="1" comment="php7-mysql is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922013" version="1" comment="php7-odbc is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922014" version="1" comment="php7-opcache is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922015" version="1" comment="php7-openssl is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922016" version="1" comment="php7-pcntl is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922017" version="1" comment="php7-pdo is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922018" version="1" comment="php7-pgsql is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922019" version="1" comment="php7-phar is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922020" version="1" comment="php7-posix is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922021" version="1" comment="php7-readline is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922022" version="1" comment="php7-shmop is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922023" version="1" comment="php7-snmp is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922024" version="1" comment="php7-soap is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922025" version="1" comment="php7-sockets is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922026" version="1" comment="php7-sodium is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922027" version="1" comment="php7-sqlite is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922028" version="1" comment="php7-sysvmsg is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922029" version="1" comment="php7-sysvsem is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922030" version="1" comment="php7-sysvshm is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922031" version="1" comment="php7-tidy is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922032" version="1" comment="php7-tokenizer is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922033" version="1" comment="php7-xmlreader is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922034" version="1" comment="php7-xmlrpc is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922035" version="1" comment="php7-xmlwriter is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922036" version="1" comment="php7-xsl is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922037" version="1" comment="php7-zip is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922038" version="1" comment="php7-zlib is &lt;7.4.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922039" version="1" comment="MozillaFirefox is &lt;93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922040" version="1" comment="MozillaFirefox-branding-upstream is &lt;93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922041" version="1" comment="MozillaFirefox-devel is &lt;93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922042" version="1" comment="MozillaFirefox-translations-common is &lt;93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922043" version="1" comment="MozillaFirefox-translations-other is &lt;93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922044" version="1" comment="MozillaThunderbird is &lt;91.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922045" version="1" comment="MozillaThunderbird-translations-common is &lt;91.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922046" version="1" comment="MozillaThunderbird-translations-other is &lt;91.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922047" version="1" comment="chromedriver is &lt;94.0.4606.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922048" version="1" comment="chromium is &lt;94.0.4606.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922049" version="1" comment="fetchmail is &lt;6.4.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922050" version="1" comment="fetchmailconf is &lt;6.4.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922051" version="1" comment="flatpak is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922052" version="1" comment="flatpak-devel is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922053" version="1" comment="flatpak-zsh-completion is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922054" version="1" comment="libflatpak0 is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922055" version="1" comment="system-user-flatpak is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922056" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922057" version="1" comment="libmosquitto1 is &lt;2.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922058" version="1" comment="libmosquittopp1 is &lt;2.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922059" version="1" comment="mosquitto is &lt;2.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922060" version="1" comment="mosquitto-clients is &lt;2.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922061" version="1" comment="mosquitto-devel is &lt;2.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922062" version="1" comment="autobuild is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922063" version="1" comment="libopendkim11 is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922064" version="1" comment="librbl1 is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922065" version="1" comment="librepute1 is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922066" version="1" comment="libut1 is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922067" version="1" comment="libvbr2 is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922068" version="1" comment="miltertest is &lt;1.6.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922069" version="1" comment="opendkim is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922070" version="1" comment="opendkim-devel is &lt;2.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922071" version="1" comment="ruby2.7-rubygem-nokogiri is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922072" version="1" comment="ruby3.0-rubygem-nokogiri is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922073" version="1" comment="python36-suds-community is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922074" version="1" comment="python38-suds-community is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922075" version="1" comment="python39-suds-community is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922076" version="1" comment="docker is &lt;20.10.9_ce-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922077" version="1" comment="docker-bash-completion is &lt;20.10.9_ce-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922078" version="1" comment="docker-fish-completion is &lt;20.10.9_ce-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922079" version="1" comment="docker-zsh-completion is &lt;20.10.9_ce-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922080" version="1" comment="mc is &lt;4.8.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922081" version="1" comment="mc-lang is &lt;4.8.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922082" version="1" comment="python36-sqlparse is &lt;0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922083" version="1" comment="python38-sqlparse is &lt;0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922084" version="1" comment="python39-sqlparse is &lt;0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922085" version="1" comment="jackson-dataformat-cbor is &lt;2.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922086" version="1" comment="jackson-dataformat-smile is &lt;2.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922087" version="1" comment="jackson-dataformats-binary is &lt;2.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922088" version="1" comment="jackson-dataformats-binary-javadoc is &lt;2.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922089" version="1" comment="java-13-openjdk is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922090" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922091" version="1" comment="java-13-openjdk-demo is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922092" version="1" comment="java-13-openjdk-devel is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922093" version="1" comment="java-13-openjdk-headless is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922094" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922095" version="1" comment="java-13-openjdk-jmods is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922096" version="1" comment="java-13-openjdk-src is &lt;13.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922097" version="1" comment="java-15-openjdk is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922098" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922099" version="1" comment="java-15-openjdk-demo is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922100" version="1" comment="java-15-openjdk-devel is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922101" version="1" comment="java-15-openjdk-headless is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922102" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922103" version="1" comment="java-15-openjdk-jmods is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922104" version="1" comment="java-15-openjdk-src is &lt;15.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922105" version="1" comment="php8 is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922106" version="1" comment="php8-bcmath is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922107" version="1" comment="php8-bz2 is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922108" version="1" comment="php8-calendar is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922109" version="1" comment="php8-cli is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922110" version="1" comment="php8-ctype is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922111" version="1" comment="php8-curl is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922112" version="1" comment="php8-dba is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922113" version="1" comment="php8-devel is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922114" version="1" comment="php8-dom is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922115" version="1" comment="php8-enchant is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922116" version="1" comment="php8-exif is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922117" version="1" comment="php8-fileinfo is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922118" version="1" comment="php8-ftp is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922119" version="1" comment="php8-gd is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922120" version="1" comment="php8-gettext is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922121" version="1" comment="php8-gmp is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922122" version="1" comment="php8-iconv is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922123" version="1" comment="php8-intl is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922124" version="1" comment="php8-ldap is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922125" version="1" comment="php8-mbstring is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922126" version="1" comment="php8-mysql is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922127" version="1" comment="php8-odbc is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922128" version="1" comment="php8-opcache is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922129" version="1" comment="php8-openssl is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922130" version="1" comment="php8-pcntl is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922131" version="1" comment="php8-pdo is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922132" version="1" comment="php8-pgsql is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922133" version="1" comment="php8-phar is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922134" version="1" comment="php8-posix is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922135" version="1" comment="php8-readline is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922136" version="1" comment="php8-shmop is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922137" version="1" comment="php8-snmp is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922138" version="1" comment="php8-soap is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922139" version="1" comment="php8-sockets is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922140" version="1" comment="php8-sodium is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922141" version="1" comment="php8-sqlite is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922142" version="1" comment="php8-sysvmsg is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922143" version="1" comment="php8-sysvsem is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922144" version="1" comment="php8-sysvshm is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922145" version="1" comment="php8-tidy is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922146" version="1" comment="php8-tokenizer is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922147" version="1" comment="php8-xmlreader is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922148" version="1" comment="php8-xmlwriter is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922149" version="1" comment="php8-xsl is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922150" version="1" comment="php8-zip is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922151" version="1" comment="php8-zlib is &lt;8.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922152" version="1" comment="apr-util-devel is &lt;1.6.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922153" version="1" comment="libapr-util1-0 is &lt;1.6.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922154" version="1" comment="libapr-util1-0-dbd-mysql is &lt;1.6.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922155" version="1" comment="libapr-util1-0-dbd-pgsql is &lt;1.6.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922156" version="1" comment="libapr-util1-0-dbd-sqlite3 is &lt;1.6.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922157" version="1" comment="java-17-openjdk is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922158" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922159" version="1" comment="java-17-openjdk-demo is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922160" version="1" comment="java-17-openjdk-devel is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922161" version="1" comment="java-17-openjdk-headless is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922162" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922163" version="1" comment="java-17-openjdk-jmods is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922164" version="1" comment="java-17-openjdk-src is &lt;17.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922165" version="1" comment="java-11-openjdk is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922166" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922167" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922168" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922169" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922170" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922171" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922172" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922173" version="1" comment="python3-virtualbox is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922174" version="1" comment="virtualbox is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922175" version="1" comment="virtualbox-devel is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922176" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922177" version="1" comment="virtualbox-guest-source is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922178" version="1" comment="virtualbox-guest-tools is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922179" version="1" comment="virtualbox-guest-x11 is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922180" version="1" comment="virtualbox-host-source is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922181" version="1" comment="virtualbox-qt is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922182" version="1" comment="virtualbox-vnc is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922183" version="1" comment="virtualbox-websrv is &lt;6.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922185" version="1" comment="kernel-macros is &lt;5.14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922186" version="1" comment="kernel-source is &lt;5.14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922187" version="1" comment="kernel-source-vanilla is &lt;5.14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922188" version="1" comment="freerdp is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922189" version="1" comment="freerdp-devel is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922190" version="1" comment="freerdp-proxy is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922191" version="1" comment="freerdp-server is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922192" version="1" comment="freerdp-wayland is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922193" version="1" comment="libfreerdp2-2 is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922194" version="1" comment="libuwac0-0 is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922195" version="1" comment="libwinpr2-2 is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922196" version="1" comment="uwac0-0-devel is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922197" version="1" comment="winpr-devel is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922198" version="1" comment="ruby2.7-rubygem-http is &lt;5.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922199" version="1" comment="ruby3.0-rubygem-http is &lt;5.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922200" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922201" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922202" version="1" comment="librsvg-2-2 is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922203" version="1" comment="librsvg-2-2-32bit is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922204" version="1" comment="librsvg-devel is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922205" version="1" comment="rsvg-convert is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922206" version="1" comment="rsvg-thumbnailer is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922207" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.52.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922208" version="1" comment="php7 is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922209" version="1" comment="php7-bcmath is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922210" version="1" comment="php7-bz2 is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922211" version="1" comment="php7-calendar is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922212" version="1" comment="php7-cli is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922213" version="1" comment="php7-ctype is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922214" version="1" comment="php7-curl is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922215" version="1" comment="php7-dba is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922216" version="1" comment="php7-devel is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922217" version="1" comment="php7-dom is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922218" version="1" comment="php7-enchant is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922219" version="1" comment="php7-exif is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922220" version="1" comment="php7-fileinfo is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922221" version="1" comment="php7-ftp is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922222" version="1" comment="php7-gd is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922223" version="1" comment="php7-gettext is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922224" version="1" comment="php7-gmp is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922225" version="1" comment="php7-iconv is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922226" version="1" comment="php7-intl is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922227" version="1" comment="php7-json is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922228" version="1" comment="php7-ldap is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922229" version="1" comment="php7-mbstring is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922230" version="1" comment="php7-mysql is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922231" version="1" comment="php7-odbc is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922232" version="1" comment="php7-opcache is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922233" version="1" comment="php7-openssl is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922234" version="1" comment="php7-pcntl is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922235" version="1" comment="php7-pdo is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922236" version="1" comment="php7-pgsql is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922237" version="1" comment="php7-phar is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922238" version="1" comment="php7-posix is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922239" version="1" comment="php7-readline is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922240" version="1" comment="php7-shmop is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922241" version="1" comment="php7-snmp is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922242" version="1" comment="php7-soap is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922243" version="1" comment="php7-sockets is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922244" version="1" comment="php7-sodium is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922245" version="1" comment="php7-sqlite is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922246" version="1" comment="php7-sysvmsg is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922247" version="1" comment="php7-sysvsem is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922248" version="1" comment="php7-sysvshm is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922249" version="1" comment="php7-tidy is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922250" version="1" comment="php7-tokenizer is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922251" version="1" comment="php7-xmlreader is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922252" version="1" comment="php7-xmlrpc is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922253" version="1" comment="php7-xmlwriter is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922254" version="1" comment="php7-xsl is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922255" version="1" comment="php7-zip is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922256" version="1" comment="php7-zlib is &lt;7.4.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922257" version="1" comment="transfig is &lt;3.2.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922258" version="1" comment="apr-devel is &lt;1.7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922259" version="1" comment="libapr1-0 is &lt;1.7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922260" version="1" comment="qemu is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922261" version="1" comment="qemu-accel-qtest is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922262" version="1" comment="qemu-accel-tcg-x86 is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922263" version="1" comment="qemu-arm is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922264" version="1" comment="qemu-audio-alsa is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922265" version="1" comment="qemu-audio-jack is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922266" version="1" comment="qemu-audio-pa is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922267" version="1" comment="qemu-audio-spice is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922268" version="1" comment="qemu-block-curl is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922269" version="1" comment="qemu-block-dmg is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922270" version="1" comment="qemu-block-gluster is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922271" version="1" comment="qemu-block-iscsi is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922272" version="1" comment="qemu-block-nfs is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922273" version="1" comment="qemu-block-rbd is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922274" version="1" comment="qemu-block-ssh is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922275" version="1" comment="qemu-chardev-baum is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922276" version="1" comment="qemu-chardev-spice is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922277" version="1" comment="qemu-extra is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922278" version="1" comment="qemu-guest-agent is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922279" version="1" comment="qemu-hw-display-qxl is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922280" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922281" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922282" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922283" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922284" version="1" comment="qemu-hw-usb-host is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922285" version="1" comment="qemu-hw-usb-redirect is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922286" version="1" comment="qemu-hw-usb-smartcard is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922287" version="1" comment="qemu-ipxe is &lt;1.0.0+-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922288" version="1" comment="qemu-ivshmem-tools is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922289" version="1" comment="qemu-ksm is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922290" version="1" comment="qemu-kvm is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922291" version="1" comment="qemu-lang is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922292" version="1" comment="qemu-microvm is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922293" version="1" comment="qemu-ppc is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922294" version="1" comment="qemu-s390x is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922295" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922296" version="1" comment="qemu-sgabios is &lt;8-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922297" version="1" comment="qemu-skiboot is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922298" version="1" comment="qemu-tools is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922299" version="1" comment="qemu-ui-curses is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922300" version="1" comment="qemu-ui-gtk is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922301" version="1" comment="qemu-ui-opengl is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922302" version="1" comment="qemu-ui-spice-app is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922303" version="1" comment="qemu-ui-spice-core is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922304" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922305" version="1" comment="qemu-vhost-user-gpu is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922306" version="1" comment="qemu-x86 is &lt;6.1.0-34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922307" version="1" comment="chromedriver is &lt;95.0.4638.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922308" version="1" comment="chromium is &lt;95.0.4638.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922309" version="1" comment="librdkafka-devel is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922310" version="1" comment="librdkafka1 is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922311" version="1" comment="libplib0 is &lt;1.8.5+svn.2173-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922312" version="1" comment="plib-devel is &lt;1.8.5+svn.2173-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922313" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922314" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922315" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922316" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922317" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922318" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922319" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922320" version="1" comment="python36-Babel is &lt;2.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922321" version="1" comment="python38-Babel is &lt;2.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922322" version="1" comment="python39-Babel is &lt;2.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922323" version="1" comment="libssh-config is &lt;0.9.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922324" version="1" comment="libssh-devel is &lt;0.9.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922325" version="1" comment="libssh4 is &lt;0.9.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922326" version="1" comment="libssh4-32bit is &lt;0.9.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922327" version="1" comment="chromedriver is &lt;95.0.4638.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922328" version="1" comment="chromium is &lt;95.0.4638.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922329" version="1" comment="libQt5Pdf5 is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922330" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922331" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922332" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922333" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922334" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922335" version="1" comment="libqt5-qtwebengine is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922336" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922337" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922338" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922339" version="1" comment="nodejs-electron is &lt;13.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922340" version="1" comment="MozillaThunderbird is &lt;91.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922341" version="1" comment="MozillaThunderbird-translations-common is &lt;91.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922342" version="1" comment="MozillaThunderbird-translations-other is &lt;91.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922343" version="1" comment="gfbgraph-devel is &lt;0.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922344" version="1" comment="gfbgraph-doc is &lt;0.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922345" version="1" comment="libgfbgraph-0_2-0 is &lt;0.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922346" version="1" comment="typelib-1_0-GFBGraph-0_2 is &lt;0.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922347" version="1" comment="go1.16 is &lt;1.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922348" version="1" comment="go1.16-doc is &lt;1.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922349" version="1" comment="go1.16-race is &lt;1.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922350" version="1" comment="go1.17 is &lt;1.17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922351" version="1" comment="go1.17-doc is &lt;1.17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922352" version="1" comment="go1.17-race is &lt;1.17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922353" version="1" comment="htmldoc is &lt;1.9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922354" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922355" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922356" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922357" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922358" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922359" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922360" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922361" version="1" comment="opensc is &lt;0.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922362" version="1" comment="opensc-32bit is &lt;0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922363" version="1" comment="MozillaFirefox is &lt;94.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922364" version="1" comment="MozillaFirefox-branding-upstream is &lt;94.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922365" version="1" comment="MozillaFirefox-devel is &lt;94.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922366" version="1" comment="MozillaFirefox-translations-common is &lt;94.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922367" version="1" comment="MozillaFirefox-translations-other is &lt;94.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922368" version="1" comment="mpop is &lt;1.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922369" version="1" comment="mpop-doc is &lt;1.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922370" version="1" comment="nodejs14 is &lt;14.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922371" version="1" comment="nodejs14-devel is &lt;14.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922372" version="1" comment="nodejs14-docs is &lt;14.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922373" version="1" comment="npm14 is &lt;14.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922374" version="1" comment="php-composer2 is &lt;2.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922375" version="1" comment="tomcat is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922376" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922377" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922378" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922379" version="1" comment="tomcat-embed is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922380" version="1" comment="tomcat-javadoc is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922381" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922382" version="1" comment="tomcat-jsvc is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922383" version="1" comment="tomcat-lib is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922384" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922385" version="1" comment="tomcat-webapps is &lt;9.0.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922386" version="1" comment="trivy is &lt;0.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922387" version="1" comment="tar is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922388" version="1" comment="tar-backup-scripts is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922389" version="1" comment="tar-doc is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922390" version="1" comment="tar-lang is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922391" version="1" comment="tar-rmt is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922392" version="1" comment="tar-tests is &lt;1.34-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922393" version="1" comment="libmariadbd-devel is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922394" version="1" comment="libmariadbd19 is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922395" version="1" comment="mariadb is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922396" version="1" comment="mariadb-bench is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922397" version="1" comment="mariadb-client is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922398" version="1" comment="mariadb-errormessages is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922399" version="1" comment="mariadb-galera is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922400" version="1" comment="mariadb-rpm-macros is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922401" version="1" comment="mariadb-test is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922402" version="1" comment="mariadb-tools is &lt;10.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922403" version="1" comment="libruby2_7-2_7 is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922404" version="1" comment="ruby2.7 is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922405" version="1" comment="ruby2.7-devel is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922406" version="1" comment="ruby2.7-devel-extra is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922407" version="1" comment="ruby2.7-doc is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922408" version="1" comment="ruby2.7-doc-ri is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922409" version="1" comment="libruby3_0-3_0 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922410" version="1" comment="ruby3.0 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922411" version="1" comment="ruby3.0-devel is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922412" version="1" comment="ruby3.0-devel-extra is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922413" version="1" comment="ruby3.0-doc is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922414" version="1" comment="ruby3.0-doc-ri is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922415" version="1" comment="xen is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922416" version="1" comment="xen-devel is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922417" version="1" comment="xen-doc-html is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922418" version="1" comment="xen-libs is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922419" version="1" comment="xen-libs-32bit is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922420" version="1" comment="xen-tools is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922421" version="1" comment="xen-tools-domU is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922422" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.16.0_01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922423" version="1" comment="postgresql10 is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922424" version="1" comment="postgresql10-contrib is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922425" version="1" comment="postgresql10-devel is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922426" version="1" comment="postgresql10-docs is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922427" version="1" comment="postgresql10-plperl is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922428" version="1" comment="postgresql10-plpython is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922429" version="1" comment="postgresql10-pltcl is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922430" version="1" comment="postgresql10-server is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922431" version="1" comment="postgresql10-test is &lt;10.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922432" version="1" comment="postgresql11 is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922433" version="1" comment="postgresql11-contrib is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922434" version="1" comment="postgresql11-devel is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922435" version="1" comment="postgresql11-docs is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922436" version="1" comment="postgresql11-llvmjit is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922437" version="1" comment="postgresql11-plperl is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922438" version="1" comment="postgresql11-plpython is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922439" version="1" comment="postgresql11-pltcl is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922440" version="1" comment="postgresql11-server is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922441" version="1" comment="postgresql11-server-devel is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922442" version="1" comment="postgresql11-test is &lt;11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922443" version="1" comment="postgresql12 is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922444" version="1" comment="postgresql12-contrib is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922445" version="1" comment="postgresql12-devel is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922446" version="1" comment="postgresql12-docs is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922447" version="1" comment="postgresql12-llvmjit is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922448" version="1" comment="postgresql12-plperl is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922449" version="1" comment="postgresql12-plpython is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922450" version="1" comment="postgresql12-pltcl is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922451" version="1" comment="postgresql12-server is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922452" version="1" comment="postgresql12-server-devel is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922453" version="1" comment="postgresql12-test is &lt;12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922454" version="1" comment="postgresql13 is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922455" version="1" comment="postgresql13-contrib is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922456" version="1" comment="postgresql13-devel is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922457" version="1" comment="postgresql13-docs is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922458" version="1" comment="postgresql13-llvmjit is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922459" version="1" comment="postgresql13-plperl is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922460" version="1" comment="postgresql13-plpython is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922461" version="1" comment="postgresql13-pltcl is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922462" version="1" comment="postgresql13-server is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922463" version="1" comment="postgresql13-server-devel is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922464" version="1" comment="postgresql13-test is &lt;13.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922465" version="1" comment="libecpg6 is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922466" version="1" comment="libecpg6-32bit is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922467" version="1" comment="libpq5 is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922468" version="1" comment="libpq5-32bit is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922469" version="1" comment="postgresql14 is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922470" version="1" comment="postgresql14-contrib is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922471" version="1" comment="postgresql14-devel is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922472" version="1" comment="postgresql14-docs is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922473" version="1" comment="postgresql14-llvmjit is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922474" version="1" comment="postgresql14-plperl is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922475" version="1" comment="postgresql14-plpython is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922476" version="1" comment="postgresql14-pltcl is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922477" version="1" comment="postgresql14-server is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922478" version="1" comment="postgresql14-server-devel is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922479" version="1" comment="postgresql14-test is &lt;14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922480" version="1" comment="jupyter-nbdime is &lt;6.1.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922481" version="1" comment="jupyter-nbdime-git is &lt;6.1.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922482" version="1" comment="jupyter-nbdime-hg is &lt;6.1.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922483" version="1" comment="jupyter-nbdime-jupyterlab is &lt;2.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922484" version="1" comment="python36-nbdime is &lt;3.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922485" version="1" comment="python38-nbdime is &lt;3.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922486" version="1" comment="python39-nbdime is &lt;3.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922487" version="1" comment="ctdb is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922488" version="1" comment="ctdb-pcp-pmda is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922489" version="1" comment="libdcerpc-binding0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922490" version="1" comment="libdcerpc-binding0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922491" version="1" comment="libdcerpc-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922492" version="1" comment="libdcerpc-samr-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922493" version="1" comment="libdcerpc-samr0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922494" version="1" comment="libdcerpc-samr0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922495" version="1" comment="libdcerpc0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922496" version="1" comment="libdcerpc0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922497" version="1" comment="libndr-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922498" version="1" comment="libndr-krb5pac-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922499" version="1" comment="libndr-krb5pac0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922500" version="1" comment="libndr-krb5pac0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922501" version="1" comment="libndr-nbt-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922502" version="1" comment="libndr-nbt0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922503" version="1" comment="libndr-nbt0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922504" version="1" comment="libndr-standard-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922505" version="1" comment="libndr-standard0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922506" version="1" comment="libndr-standard0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922507" version="1" comment="libndr2 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922508" version="1" comment="libndr2-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922509" version="1" comment="libnetapi-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922510" version="1" comment="libnetapi-devel-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922511" version="1" comment="libnetapi0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922512" version="1" comment="libnetapi0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922513" version="1" comment="libsamba-credentials-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922514" version="1" comment="libsamba-credentials1 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922515" version="1" comment="libsamba-credentials1-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922516" version="1" comment="libsamba-errors-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922517" version="1" comment="libsamba-errors0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922518" version="1" comment="libsamba-errors0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922519" version="1" comment="libsamba-hostconfig-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922520" version="1" comment="libsamba-hostconfig0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922521" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922522" version="1" comment="libsamba-passdb-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922523" version="1" comment="libsamba-passdb0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922524" version="1" comment="libsamba-passdb0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922525" version="1" comment="libsamba-policy-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922526" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922527" version="1" comment="libsamba-policy0-python3 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922528" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922529" version="1" comment="libsamba-util-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922530" version="1" comment="libsamba-util0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922531" version="1" comment="libsamba-util0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922532" version="1" comment="libsamdb-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922533" version="1" comment="libsamdb0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922534" version="1" comment="libsamdb0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922535" version="1" comment="libsmbclient-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922536" version="1" comment="libsmbclient0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922537" version="1" comment="libsmbclient0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922538" version="1" comment="libsmbconf-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922539" version="1" comment="libsmbconf0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922540" version="1" comment="libsmbconf0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922541" version="1" comment="libsmbldap-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922542" version="1" comment="libsmbldap2 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922543" version="1" comment="libsmbldap2-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922544" version="1" comment="libtevent-util-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922545" version="1" comment="libtevent-util0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922546" version="1" comment="libtevent-util0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922547" version="1" comment="libwbclient-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922548" version="1" comment="libwbclient0 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922549" version="1" comment="libwbclient0-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922550" version="1" comment="samba is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922551" version="1" comment="samba-ad-dc is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922552" version="1" comment="samba-ad-dc-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922553" version="1" comment="samba-ceph is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922554" version="1" comment="samba-client is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922555" version="1" comment="samba-client-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922556" version="1" comment="samba-core-devel is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922557" version="1" comment="samba-doc is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922558" version="1" comment="samba-dsdb-modules is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922559" version="1" comment="samba-gpupdate is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922560" version="1" comment="samba-ldb-ldap is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922561" version="1" comment="samba-libs is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922562" version="1" comment="samba-libs-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922563" version="1" comment="samba-libs-python3 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922564" version="1" comment="samba-libs-python3-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922565" version="1" comment="samba-python3 is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922566" version="1" comment="samba-test is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922567" version="1" comment="samba-tool is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922568" version="1" comment="samba-winbind is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922569" version="1" comment="samba-winbind-32bit is &lt;4.15.2+git.193.a4d6307f1fd-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922570" version="1" comment="libspeex1 is &lt;1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922571" version="1" comment="libspeex1-32bit is &lt;1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922572" version="1" comment="speex is &lt;1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922573" version="1" comment="speex-devel is &lt;1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922574" version="1" comment="barrier is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922575" version="1" comment="binutils is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922576" version="1" comment="binutils-devel is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922577" version="1" comment="binutils-devel-32bit is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922578" version="1" comment="binutils-gold is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922579" version="1" comment="libctf-nobfd0 is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922580" version="1" comment="libctf0 is &lt;2.37-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922581" version="1" comment="liblldpctl4 is &lt;1.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922582" version="1" comment="lldpd is &lt;1.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922583" version="1" comment="lldpd-devel is &lt;1.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922584" version="1" comment="gmp-devel is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922585" version="1" comment="gmp-devel-32bit is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922586" version="1" comment="libgmp10 is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922587" version="1" comment="libgmp10-32bit is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922588" version="1" comment="libgmpxx4 is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922589" version="1" comment="libgmpxx4-32bit is &lt;6.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922590" version="1" comment="corepack16 is &lt;16.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922591" version="1" comment="nodejs16 is &lt;16.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922592" version="1" comment="nodejs16-devel is &lt;16.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922593" version="1" comment="nodejs16-docs is &lt;16.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922594" version="1" comment="npm16 is &lt;16.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922595" version="1" comment="php8 is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922596" version="1" comment="php8-bcmath is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922597" version="1" comment="php8-bz2 is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922598" version="1" comment="php8-calendar is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922599" version="1" comment="php8-cli is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922600" version="1" comment="php8-ctype is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922601" version="1" comment="php8-curl is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922602" version="1" comment="php8-dba is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922603" version="1" comment="php8-devel is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922604" version="1" comment="php8-dom is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922605" version="1" comment="php8-enchant is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922606" version="1" comment="php8-exif is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922607" version="1" comment="php8-fileinfo is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922608" version="1" comment="php8-ftp is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922609" version="1" comment="php8-gd is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922610" version="1" comment="php8-gettext is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922611" version="1" comment="php8-gmp is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922612" version="1" comment="php8-iconv is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922613" version="1" comment="php8-intl is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922614" version="1" comment="php8-ldap is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922615" version="1" comment="php8-mbstring is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922616" version="1" comment="php8-mysql is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922617" version="1" comment="php8-odbc is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922618" version="1" comment="php8-opcache is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922619" version="1" comment="php8-openssl is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922620" version="1" comment="php8-pcntl is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922621" version="1" comment="php8-pdo is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922622" version="1" comment="php8-pgsql is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922623" version="1" comment="php8-phar is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922624" version="1" comment="php8-posix is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922625" version="1" comment="php8-readline is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922626" version="1" comment="php8-shmop is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922627" version="1" comment="php8-snmp is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922628" version="1" comment="php8-soap is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922629" version="1" comment="php8-sockets is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922630" version="1" comment="php8-sodium is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922631" version="1" comment="php8-sqlite is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922632" version="1" comment="php8-sysvmsg is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922633" version="1" comment="php8-sysvsem is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922634" version="1" comment="php8-sysvshm is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922635" version="1" comment="php8-tidy is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922636" version="1" comment="php8-tokenizer is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922637" version="1" comment="php8-xmlreader is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922638" version="1" comment="php8-xmlwriter is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922639" version="1" comment="php8-xsl is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922640" version="1" comment="php8-zip is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922641" version="1" comment="php8-zlib is &lt;8.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922642" version="1" comment="tor is &lt;0.4.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922643" version="1" comment="php7 is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922644" version="1" comment="php7-bcmath is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922645" version="1" comment="php7-bz2 is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922646" version="1" comment="php7-calendar is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922647" version="1" comment="php7-cli is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922648" version="1" comment="php7-ctype is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922649" version="1" comment="php7-curl is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922650" version="1" comment="php7-dba is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922651" version="1" comment="php7-devel is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922652" version="1" comment="php7-dom is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922653" version="1" comment="php7-enchant is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922654" version="1" comment="php7-exif is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922655" version="1" comment="php7-fileinfo is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922656" version="1" comment="php7-ftp is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922657" version="1" comment="php7-gd is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922658" version="1" comment="php7-gettext is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922659" version="1" comment="php7-gmp is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922660" version="1" comment="php7-iconv is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922661" version="1" comment="php7-intl is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922662" version="1" comment="php7-json is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922663" version="1" comment="php7-ldap is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922664" version="1" comment="php7-mbstring is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922665" version="1" comment="php7-mysql is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922666" version="1" comment="php7-odbc is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922667" version="1" comment="php7-opcache is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922668" version="1" comment="php7-openssl is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922669" version="1" comment="php7-pcntl is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922670" version="1" comment="php7-pdo is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922671" version="1" comment="php7-pgsql is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922672" version="1" comment="php7-phar is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922673" version="1" comment="php7-posix is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922674" version="1" comment="php7-readline is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922675" version="1" comment="php7-shmop is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922676" version="1" comment="php7-snmp is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922677" version="1" comment="php7-soap is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922678" version="1" comment="php7-sockets is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922679" version="1" comment="php7-sodium is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922680" version="1" comment="php7-sqlite is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922681" version="1" comment="php7-sysvmsg is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922682" version="1" comment="php7-sysvsem is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922683" version="1" comment="php7-sysvshm is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922684" version="1" comment="php7-tidy is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922685" version="1" comment="php7-tokenizer is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922686" version="1" comment="php7-xmlreader is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922687" version="1" comment="php7-xmlrpc is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922688" version="1" comment="php7-xmlwriter is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922689" version="1" comment="php7-xsl is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922690" version="1" comment="php7-zip is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922691" version="1" comment="php7-zlib is &lt;7.4.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922692" version="1" comment="libwireshark14 is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922693" version="1" comment="libwiretap11 is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922694" version="1" comment="libwsutil12 is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922695" version="1" comment="wireshark is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922696" version="1" comment="wireshark-devel is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922697" version="1" comment="wireshark-ui-qt is &lt;3.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922698" version="1" comment="aom-tools is &lt;3.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922699" version="1" comment="libaom-devel is &lt;3.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922700" version="1" comment="libaom-devel-doc is &lt;3.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922701" version="1" comment="libaom3 is &lt;3.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922702" version="1" comment="libaom3-32bit is &lt;3.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922703" version="1" comment="opensc is &lt;0.22.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922704" version="1" comment="opensc-32bit is &lt;0.22.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922705" version="1" comment="python3-mailman is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922706" version="1" comment="libnss_slurm2 is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922707" version="1" comment="libpmi0 is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922708" version="1" comment="libslurm37 is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922709" version="1" comment="perl-slurm is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922710" version="1" comment="slurm is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922711" version="1" comment="slurm-auth-none is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922712" version="1" comment="slurm-config is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922713" version="1" comment="slurm-config-man is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922714" version="1" comment="slurm-cray is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922715" version="1" comment="slurm-devel is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922716" version="1" comment="slurm-doc is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922717" version="1" comment="slurm-hdf5 is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922718" version="1" comment="slurm-lua is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922719" version="1" comment="slurm-munge is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922720" version="1" comment="slurm-node is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922721" version="1" comment="slurm-openlava is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922722" version="1" comment="slurm-pam_slurm is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922723" version="1" comment="slurm-plugins is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922724" version="1" comment="slurm-rest is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922725" version="1" comment="slurm-seff is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922726" version="1" comment="slurm-sjstat is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922727" version="1" comment="slurm-slurmdbd is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922728" version="1" comment="slurm-sql is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922729" version="1" comment="slurm-sview is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922730" version="1" comment="slurm-torque is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922731" version="1" comment="slurm-webdoc is &lt;21.08.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922732" version="1" comment="containerd is &lt;1.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922733" version="1" comment="containerd-ctr is &lt;1.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922734" version="1" comment="docker is &lt;20.10.11_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922735" version="1" comment="docker-bash-completion is &lt;20.10.11_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922736" version="1" comment="docker-fish-completion is &lt;20.10.11_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922737" version="1" comment="docker-zsh-completion is &lt;20.10.11_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922738" version="1" comment="libmariadbd-devel is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922739" version="1" comment="libmariadbd19 is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922740" version="1" comment="mariadb is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922741" version="1" comment="mariadb-bench is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922742" version="1" comment="mariadb-client is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922743" version="1" comment="mariadb-errormessages is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922744" version="1" comment="mariadb-galera is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922745" version="1" comment="mariadb-rpm-macros is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922746" version="1" comment="mariadb-test is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922747" version="1" comment="mariadb-tools is &lt;10.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922748" version="1" comment="matrix-synapse is &lt;1.47.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922749" version="1" comment="cargo1.56 is &lt;1.56.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922750" version="1" comment="rust1.56 is &lt;1.56.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922751" version="1" comment="grafana is &lt;7.5.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922752" version="1" comment="ceph is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922753" version="1" comment="ceph-base is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922754" version="1" comment="ceph-common is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922755" version="1" comment="ceph-fuse is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922756" version="1" comment="ceph-grafana-dashboards is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922757" version="1" comment="ceph-immutable-object-cache is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922758" version="1" comment="ceph-mds is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922759" version="1" comment="ceph-mgr is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922760" version="1" comment="ceph-mgr-cephadm is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922761" version="1" comment="ceph-mgr-dashboard is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922762" version="1" comment="ceph-mgr-diskprediction-local is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922763" version="1" comment="ceph-mgr-k8sevents is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922764" version="1" comment="ceph-mgr-modules-core is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922765" version="1" comment="ceph-mgr-rook is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922766" version="1" comment="ceph-mon is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922767" version="1" comment="ceph-osd is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922768" version="1" comment="ceph-prometheus-alerts is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922769" version="1" comment="ceph-radosgw is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922770" version="1" comment="cephadm is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922771" version="1" comment="cephfs-mirror is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922772" version="1" comment="cephfs-shell is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922773" version="1" comment="cephfs-top is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922774" version="1" comment="libcephfs-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922775" version="1" comment="libcephfs2 is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922776" version="1" comment="libcephsqlite is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922777" version="1" comment="libcephsqlite-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922778" version="1" comment="librados-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922779" version="1" comment="librados2 is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922780" version="1" comment="libradospp-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922781" version="1" comment="librbd-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922782" version="1" comment="librbd1 is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922783" version="1" comment="librgw-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922784" version="1" comment="librgw2 is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922785" version="1" comment="python3-ceph-argparse is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922786" version="1" comment="python3-ceph-common is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922787" version="1" comment="python3-cephfs is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922788" version="1" comment="python3-rados is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922789" version="1" comment="python3-rbd is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922790" version="1" comment="python3-rgw is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922791" version="1" comment="rados-objclass-devel is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922792" version="1" comment="rbd-fuse is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922793" version="1" comment="rbd-mirror is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922794" version="1" comment="rbd-nbd is &lt;16.2.6.463+g22e7612f9ad-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922795" version="1" comment="dnsmasq is &lt;2.86-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922796" version="1" comment="dnsmasq-utils is &lt;2.86-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922797" version="1" comment="libzapojit-0_0-0 is &lt;0.0.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922798" version="1" comment="libzapojit-devel is &lt;0.0.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922799" version="1" comment="typelib-1_0-Zpj-0_0 is &lt;0.0.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922800" version="1" comment="strongswan is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922801" version="1" comment="strongswan-doc is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922802" version="1" comment="strongswan-hmac is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922803" version="1" comment="strongswan-ipsec is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922804" version="1" comment="strongswan-libs0 is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922805" version="1" comment="strongswan-mysql is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922806" version="1" comment="strongswan-nm is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922807" version="1" comment="strongswan-sqlite is &lt;5.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922808" version="1" comment="nodejs-electron is &lt;13.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922809" version="1" comment="libruby2_7-2_7 is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922810" version="1" comment="ruby2.7 is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922811" version="1" comment="ruby2.7-devel is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922812" version="1" comment="ruby2.7-devel-extra is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922813" version="1" comment="ruby2.7-doc is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922814" version="1" comment="ruby2.7-doc-ri is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922815" version="1" comment="libruby3_0-3_0 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922816" version="1" comment="ruby3.0 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922817" version="1" comment="ruby3.0-devel is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922818" version="1" comment="ruby3.0-devel-extra is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922819" version="1" comment="ruby3.0-doc is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922820" version="1" comment="ruby3.0-doc-ri is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922821" version="1" comment="singularity is &lt;3.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922822" version="1" comment="bind is &lt;9.16.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922823" version="1" comment="bind-doc is &lt;9.16.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922824" version="1" comment="bind-utils is &lt;9.16.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922825" version="1" comment="python3-bind is &lt;9.16.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922826" version="1" comment="Botan is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922827" version="1" comment="Botan-doc is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922828" version="1" comment="libbotan-2-18 is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922829" version="1" comment="libbotan-2-18-32bit is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922830" version="1" comment="libbotan-devel is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922831" version="1" comment="libbotan-devel-32bit is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922832" version="1" comment="python3-botan is &lt;2.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922834" version="1" comment="kernel-macros is &lt;5.15.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922835" version="1" comment="kernel-source is &lt;5.15.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922836" version="1" comment="kernel-source-vanilla is &lt;5.15.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922837" version="1" comment="libfreebl3 is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922838" version="1" comment="libfreebl3-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922839" version="1" comment="libfreebl3-hmac is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922840" version="1" comment="libfreebl3-hmac-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922841" version="1" comment="libsoftokn3 is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922842" version="1" comment="libsoftokn3-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922843" version="1" comment="libsoftokn3-hmac is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922844" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922845" version="1" comment="mozilla-nss is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922846" version="1" comment="mozilla-nss-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922847" version="1" comment="mozilla-nss-certs is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922848" version="1" comment="mozilla-nss-certs-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922849" version="1" comment="mozilla-nss-devel is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922850" version="1" comment="mozilla-nss-sysinit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922851" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922852" version="1" comment="mozilla-nss-tools is &lt;3.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922853" version="1" comment="runc is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922854" version="1" comment="parsec is &lt;0.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922855" version="1" comment="log4j is &lt;2.13.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922856" version="1" comment="log4j-javadoc is &lt;2.13.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922857" version="1" comment="log4j-jcl is &lt;2.13.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922858" version="1" comment="log4j-slf4j is &lt;2.13.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922859" version="1" comment="velero is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922860" version="1" comment="velero-plugin-for-microsoft-azure is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922861" version="1" comment="MozillaFirefox is &lt;95.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922862" version="1" comment="MozillaFirefox-branding-upstream is &lt;95.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922863" version="1" comment="MozillaFirefox-devel is &lt;95.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922864" version="1" comment="MozillaFirefox-translations-common is &lt;95.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922865" version="1" comment="MozillaFirefox-translations-other is &lt;95.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922866" version="1" comment="MozillaThunderbird is &lt;91.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922867" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922868" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922869" version="1" comment="go1.16 is &lt;1.16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922870" version="1" comment="go1.16-doc is &lt;1.16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922871" version="1" comment="go1.16-race is &lt;1.16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922872" version="1" comment="go1.17 is &lt;1.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922873" version="1" comment="go1.17-doc is &lt;1.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922874" version="1" comment="go1.17-race is &lt;1.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922875" version="1" comment="libmysofa-devel is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922876" version="1" comment="libmysofa1 is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922877" version="1" comment="libmysofa1-32bit is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922878" version="1" comment="podman is &lt;3.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922879" version="1" comment="podman-cni-config is &lt;3.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922880" version="1" comment="podman-docker is &lt;3.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922881" version="1" comment="podman-remote is &lt;3.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922882" version="1" comment="janus-gateway is &lt;0.11.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922883" version="1" comment="janus-gateway-devel is &lt;0.11.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922884" version="1" comment="junit is &lt;4.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922885" version="1" comment="junit-javadoc is &lt;4.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922886" version="1" comment="junit-manual is &lt;4.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922887" version="1" comment="privoxy is &lt;3.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922888" version="1" comment="privoxy-doc is &lt;3.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922889" version="1" comment="velocity-custom-parser-example is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922890" version="1" comment="velocity-engine-core is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922891" version="1" comment="velocity-engine-examples is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922892" version="1" comment="velocity-engine-javadoc is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922893" version="1" comment="velocity-engine-parent is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922894" version="1" comment="velocity-engine-scripting is &lt;2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922895" version="1" comment="kubernetes1.22-apiserver is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922896" version="1" comment="kubernetes1.22-client is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922897" version="1" comment="kubernetes1.22-client-common is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922898" version="1" comment="kubernetes1.22-controller-manager is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922899" version="1" comment="kubernetes1.22-kubeadm is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922900" version="1" comment="kubernetes1.22-kubelet is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922901" version="1" comment="kubernetes1.22-kubelet-common is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922902" version="1" comment="kubernetes1.22-proxy is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922903" version="1" comment="kubernetes1.22-scheduler is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922904" version="1" comment="libvpx-devel is &lt;1.11.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922905" version="1" comment="libvpx7 is &lt;1.11.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922906" version="1" comment="libvpx7-32bit is &lt;1.11.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922907" version="1" comment="vpx-tools is &lt;1.11.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922908" version="1" comment="log4j is &lt;2.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922909" version="1" comment="log4j-javadoc is &lt;2.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922910" version="1" comment="log4j-jcl is &lt;2.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922911" version="1" comment="log4j-slf4j is &lt;2.16.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922912" version="1" comment="chainsaw is &lt;1.2.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922913" version="1" comment="log4j12 is &lt;1.2.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922914" version="1" comment="log4j12-javadoc is &lt;1.2.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922915" version="1" comment="log4j12-manual is &lt;1.2.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922916" version="1" comment="logfactor5 is &lt;1.2.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922917" version="1" comment="logback is &lt;1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922918" version="1" comment="logback-access is &lt;1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922919" version="1" comment="logback-examples is &lt;1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922920" version="1" comment="logback-javadoc is &lt;1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922921" version="1" comment="libmruby3 is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922922" version="1" comment="mruby is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922923" version="1" comment="mruby-devel is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922924" version="1" comment="xorg-x11-server is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922925" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922926" version="1" comment="xorg-x11-server-extra is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922927" version="1" comment="xorg-x11-server-sdk is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922928" version="1" comment="xorg-x11-server-source is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922929" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922930" version="1" comment="libZXing1 is &lt;1.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922931" version="1" comment="libZXing1-32bit is &lt;1.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922932" version="1" comment="zxing-cpp-devel is &lt;1.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922933" version="1" comment="chromedriver is &lt;96.0.4664.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922934" version="1" comment="chromium is &lt;96.0.4664.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922935" version="1" comment="ant is &lt;1.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922936" version="1" comment="ant-jmf is &lt;1.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922937" version="1" comment="ant-scripts is &lt;1.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922938" version="1" comment="ant-swing is &lt;1.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922939" version="1" comment="bcm43xx-firmware is &lt;20180314-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922940" version="1" comment="epiphany is &lt;41.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922941" version="1" comment="epiphany-branding-upstream is &lt;41.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922942" version="1" comment="epiphany-lang is &lt;41.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922943" version="1" comment="gnome-shell-search-provider-epiphany is &lt;41.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922944" version="1" comment="log4j is &lt;2.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922945" version="1" comment="log4j-javadoc is &lt;2.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922946" version="1" comment="log4j-jcl is &lt;2.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922947" version="1" comment="log4j-slf4j is &lt;2.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922948" version="1" comment="openvpn is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922949" version="1" comment="openvpn-auth-pam-plugin is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922950" version="1" comment="openvpn-devel is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922951" version="1" comment="openvpn-down-root-plugin is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922952" version="1" comment="xml-security is &lt;2.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922953" version="1" comment="xml-security-javadoc is &lt;2.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922954" version="1" comment="grafana is &lt;7.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922955" version="1" comment="apache2 is &lt;2.4.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922956" version="1" comment="kafka-kit is &lt;2.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922957" version="1" comment="libdxfrw-devel is &lt;1.0.1+git.20211110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922958" version="1" comment="libdxfrw-tools is &lt;1.0.1+git.20211110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922959" version="1" comment="libdxfrw1 is &lt;1.0.1+git.20211110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922960" version="1" comment="MozillaThunderbird is &lt;91.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922961" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922962" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922963" version="1" comment="xwayland is &lt;21.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922964" version="1" comment="xwayland-devel is &lt;21.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922965" version="1" comment="grub2 is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922966" version="1" comment="grub2-branding-upstream is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922967" version="1" comment="grub2-i386-pc is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922968" version="1" comment="grub2-i386-pc-debug is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922969" version="1" comment="grub2-snapper-plugin is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922970" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922971" version="1" comment="grub2-x86_64-efi is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922972" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922973" version="1" comment="grub2-x86_64-xen is &lt;2.06-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922974" version="1" comment="HyperKitty-web is &lt;1.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922975" version="1" comment="HyperKitty-web-uwsgi is &lt;1.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922976" version="1" comment="python3-HyperKitty is &lt;1.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922977" version="1" comment="log4j is &lt;2.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922978" version="1" comment="log4j-javadoc is &lt;2.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922979" version="1" comment="log4j-jcl is &lt;2.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922980" version="1" comment="log4j-slf4j is &lt;2.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922981" version="1" comment="libwireshark15 is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922982" version="1" comment="libwiretap12 is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922983" version="1" comment="libwsutil13 is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922984" version="1" comment="wireshark is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922985" version="1" comment="wireshark-devel is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922986" version="1" comment="wireshark-ui-qt is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922987" version="1" comment="blas-devel is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922988" version="1" comment="blas-devel-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922989" version="1" comment="blas-devel-static is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922990" version="1" comment="cblas-devel is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922991" version="1" comment="cblas-devel-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922992" version="1" comment="cblas-devel-static is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922993" version="1" comment="lapack-devel is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922994" version="1" comment="lapack-devel-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922995" version="1" comment="lapack-devel-static is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922996" version="1" comment="lapacke-devel is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922997" version="1" comment="lapacke-devel-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922998" version="1" comment="lapacke-devel-static is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009922999" version="1" comment="libblas3 is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923000" version="1" comment="libblas3-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923001" version="1" comment="libcblas3 is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923002" version="1" comment="libcblas3-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923003" version="1" comment="liblapack3 is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923004" version="1" comment="liblapack3-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923005" version="1" comment="liblapacke3 is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923006" version="1" comment="liblapacke3-32bit is &lt;3.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923007" version="1" comment="libsndfile-devel is &lt;1.0.31-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923008" version="1" comment="libsndfile1 is &lt;1.0.31-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923009" version="1" comment="libsndfile1-32bit is &lt;1.0.31-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923010" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923011" version="1" comment="libwireshark15 is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923012" version="1" comment="libwiretap12 is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923013" version="1" comment="libwsutil13 is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923014" version="1" comment="wireshark is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923015" version="1" comment="wireshark-devel is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923016" version="1" comment="wireshark-ui-qt is &lt;3.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923017" version="1" comment="cargo-audit-advisory-db is &lt;20220105-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923018" version="1" comment="cflow is &lt;1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923019" version="1" comment="greetd is &lt;0.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923020" version="1" comment="kanidm is &lt;1.1.0~alpha7~git0.c8468199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923021" version="1" comment="kanidm-clients is &lt;1.1.0~alpha7~git0.c8468199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923022" version="1" comment="kanidm-docs is &lt;1.1.0~alpha7~git0.c8468199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923023" version="1" comment="kanidm-server is &lt;1.1.0~alpha7~git0.c8468199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923024" version="1" comment="kanidm-unixd-clients is &lt;1.1.0~alpha7~git0.c8468199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923025" version="1" comment="libIex-3_1-30 is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923026" version="1" comment="libIex-3_1-30-32bit is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923027" version="1" comment="libIlmThread-3_1-30 is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923028" version="1" comment="libIlmThread-3_1-30-32bit is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923029" version="1" comment="libOpenEXR-3_1-30 is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923030" version="1" comment="libOpenEXR-3_1-30-32bit is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923031" version="1" comment="libOpenEXRCore-3_1-30 is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923032" version="1" comment="libOpenEXRCore-3_1-30-32bit is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923033" version="1" comment="libOpenEXRUtil-3_1-30 is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923034" version="1" comment="libOpenEXRUtil-3_1-30-32bit is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923035" version="1" comment="openexr is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923036" version="1" comment="openexr-devel is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923037" version="1" comment="openexr-doc is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923038" version="1" comment="python-lxml-doc is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923039" version="1" comment="python310-lxml is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923040" version="1" comment="python310-lxml-devel is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923041" version="1" comment="python38-lxml is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923042" version="1" comment="python38-lxml-devel is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923043" version="1" comment="python39-lxml is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923044" version="1" comment="python39-lxml-devel is &lt;4.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923045" version="1" comment="rustscan is &lt;2.0.1+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923046" version="1" comment="rustup is &lt;1.24.3~git1.0a74fef5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923047" version="1" comment="sccache is &lt;0.2.15~git0.6b6d2f7-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923048" version="1" comment="tuigreet is &lt;0.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923049" version="1" comment="jawn-ast is &lt;0.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923050" version="1" comment="jawn-json4s is &lt;0.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923051" version="1" comment="jawn-parser is &lt;0.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923052" version="1" comment="jawn-util is &lt;0.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923053" version="1" comment="neomutt is &lt;20211029-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923054" version="1" comment="neomutt-doc is &lt;20211029-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923055" version="1" comment="neomutt-lang is &lt;20211029-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923056" version="1" comment="cargo-c is &lt;0.8.1~git0.cce1b08-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923057" version="1" comment="librav1e0 is &lt;0.5.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923058" version="1" comment="librav1e0-32bit is &lt;0.5.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923059" version="1" comment="rav1e is &lt;0.5.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923060" version="1" comment="rav1e-devel is &lt;0.5.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923061" version="1" comment="spotifyd is &lt;0.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923062" version="1" comment="gnuplot is &lt;5.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923063" version="1" comment="pcmanfm is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923064" version="1" comment="pcmanfm-devel is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923065" version="1" comment="pcmanfm-lang is &lt;1.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923066" version="1" comment="python310-Django is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923067" version="1" comment="python38-Django is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923068" version="1" comment="python39-Django is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923069" version="1" comment="rke is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923070" version="1" comment="liburiparser1 is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923071" version="1" comment="liburiparser1-32bit is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923072" version="1" comment="uriparser is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923073" version="1" comment="uriparser-devel is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923074" version="1" comment="uriparser-doc is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923075" version="1" comment="python3-watchman is &lt;1.4.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923076" version="1" comment="watchman is &lt;4.9.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923077" version="1" comment="zram-generator is &lt;1.1.1~git5.8612dbb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923078" version="1" comment="corepack17 is &lt;17.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923079" version="1" comment="nodejs17 is &lt;17.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923080" version="1" comment="nodejs17-devel is &lt;17.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923081" version="1" comment="nodejs17-docs is &lt;17.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923082" version="1" comment="npm17 is &lt;17.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923083" version="1" comment="libsystemd0 is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923084" version="1" comment="libsystemd0-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923085" version="1" comment="libudev-devel is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923086" version="1" comment="libudev-devel-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923087" version="1" comment="libudev1 is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923088" version="1" comment="libudev1-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923089" version="1" comment="nss-myhostname is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923090" version="1" comment="nss-myhostname-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923091" version="1" comment="nss-mymachines is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923092" version="1" comment="nss-mymachines-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923093" version="1" comment="nss-resolve is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923094" version="1" comment="nss-systemd is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923095" version="1" comment="systemd is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923096" version="1" comment="systemd-32bit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923097" version="1" comment="systemd-container is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923098" version="1" comment="systemd-coredump is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923099" version="1" comment="systemd-devel is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923100" version="1" comment="systemd-doc is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923101" version="1" comment="systemd-experimental is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923102" version="1" comment="systemd-journal-remote is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923103" version="1" comment="systemd-lang is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923104" version="1" comment="systemd-network is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923105" version="1" comment="systemd-portable is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923106" version="1" comment="systemd-sysvinit is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923107" version="1" comment="systemd-testsuite is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923108" version="1" comment="udev is &lt;249.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923109" version="1" comment="MozillaFirefox is &lt;96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923110" version="1" comment="MozillaFirefox-branding-upstream is &lt;96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923111" version="1" comment="MozillaFirefox-devel is &lt;96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923112" version="1" comment="MozillaFirefox-translations-common is &lt;96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923113" version="1" comment="MozillaFirefox-translations-other is &lt;96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923114" version="1" comment="MozillaThunderbird is &lt;91.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923115" version="1" comment="MozillaThunderbird-translations-common is &lt;91.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923116" version="1" comment="MozillaThunderbird-translations-other is &lt;91.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923117" version="1" comment="gajim is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923118" version="1" comment="gajim-lang is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923119" version="1" comment="kubevirt-container-disk is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923120" version="1" comment="kubevirt-manifests is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923121" version="1" comment="kubevirt-tests is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923122" version="1" comment="kubevirt-virt-api is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923123" version="1" comment="kubevirt-virt-controller is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923124" version="1" comment="kubevirt-virt-handler is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923125" version="1" comment="kubevirt-virt-launcher is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923126" version="1" comment="kubevirt-virt-operator is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923127" version="1" comment="kubevirt-virtctl is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923128" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.49.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923129" version="1" comment="prosody is &lt;0.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923130" version="1" comment="gvim is &lt;8.2.4063-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923131" version="1" comment="vim is &lt;8.2.4063-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923132" version="1" comment="vim-data is &lt;8.2.4063-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923133" version="1" comment="vim-data-common is &lt;8.2.4063-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923134" version="1" comment="vim-small is &lt;8.2.4063-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923135" version="1" comment="busybox is &lt;1.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923136" version="1" comment="busybox-static is &lt;1.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923137" version="1" comment="busybox-testsuite is &lt;1.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923138" version="1" comment="busybox-warewulf3 is &lt;1.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923139" version="1" comment="chromedriver is &lt;97.0.4692.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923140" version="1" comment="chromium is &lt;97.0.4692.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923141" version="1" comment="flatpak is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923142" version="1" comment="flatpak-devel is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923143" version="1" comment="flatpak-zsh-completion is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923144" version="1" comment="libflatpak0 is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923145" version="1" comment="system-user-flatpak is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923146" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923147" version="1" comment="htmldoc is &lt;1.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923148" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923149" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923150" version="1" comment="libQt5Concurrent-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923151" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923152" version="1" comment="libQt5Concurrent5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923153" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923154" version="1" comment="libQt5Core-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923155" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923156" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923157" version="1" comment="libQt5Core5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923158" version="1" comment="libQt5Core5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923159" version="1" comment="libQt5DBus-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923160" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923161" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923162" version="1" comment="libQt5DBus5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923163" version="1" comment="libQt5DBus5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923164" version="1" comment="libQt5Gui-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923165" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923166" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923167" version="1" comment="libQt5Gui5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923168" version="1" comment="libQt5Gui5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923169" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923170" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923171" version="1" comment="libQt5Network-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923172" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923173" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923174" version="1" comment="libQt5Network5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923175" version="1" comment="libQt5Network5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923176" version="1" comment="libQt5OpenGL-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923177" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923178" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923179" version="1" comment="libQt5OpenGL5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923180" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923181" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923182" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923183" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923184" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923185" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923186" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923187" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923188" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923189" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923190" version="1" comment="libQt5PrintSupport5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923191" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923192" version="1" comment="libQt5Sql-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923193" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923194" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923195" version="1" comment="libQt5Sql5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923196" version="1" comment="libQt5Sql5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923197" version="1" comment="libQt5Sql5-mysql is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923198" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923199" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923200" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923201" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923202" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923203" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923204" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923205" version="1" comment="libQt5Test-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923206" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923207" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923208" version="1" comment="libQt5Test5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923209" version="1" comment="libQt5Test5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923210" version="1" comment="libQt5Widgets-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923211" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923212" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923213" version="1" comment="libQt5Widgets5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923214" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923215" version="1" comment="libQt5Xml-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923216" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923217" version="1" comment="libQt5Xml5 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923218" version="1" comment="libQt5Xml5-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923219" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923220" version="1" comment="libqt5-qtbase-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923221" version="1" comment="libqt5-qtbase-examples is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923222" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923223" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923224" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923225" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.2+kde268-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923226" version="1" comment="netty is &lt;4.1.72-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923227" version="1" comment="netty-javadoc is &lt;4.1.72-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923228" version="1" comment="netty-poms is &lt;4.1.72-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923229" version="1" comment="ghostscript is &lt;9.54.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923230" version="1" comment="ghostscript-devel is &lt;9.54.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923231" version="1" comment="ghostscript-x11 is &lt;9.54.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923232" version="1" comment="libQt5Pdf5 is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923233" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923234" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923235" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923236" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923237" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923238" version="1" comment="libqt5-qtwebengine is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923239" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923240" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923241" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923242" version="1" comment="corepack16 is &lt;16.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923243" version="1" comment="nodejs16 is &lt;16.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923244" version="1" comment="nodejs16-devel is &lt;16.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923245" version="1" comment="nodejs16-docs is &lt;16.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923246" version="1" comment="npm16 is &lt;16.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923247" version="1" comment="python310-numba is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923248" version="1" comment="python310-numba-devel is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923249" version="1" comment="python38-numba is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923250" version="1" comment="python38-numba-devel is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923251" version="1" comment="python39-numba is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923252" version="1" comment="python39-numba-devel is &lt;0.55.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923253" version="1" comment="clamav is &lt;0.103.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923254" version="1" comment="clamav-devel is &lt;0.103.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923255" version="1" comment="clamav-milter is &lt;0.103.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923256" version="1" comment="libclamav9 is &lt;0.103.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923257" version="1" comment="libfreshclam2 is &lt;0.103.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923258" version="1" comment="libsubid-devel is &lt;4.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923259" version="1" comment="libsubid4 is &lt;4.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923260" version="1" comment="login_defs is &lt;4.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923261" version="1" comment="shadow is &lt;4.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923262" version="1" comment="ncat is &lt;7.92-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923263" version="1" comment="nmap is &lt;7.92-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923264" version="1" comment="nping is &lt;7.92-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923265" version="1" comment="afterburn is &lt;5.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923266" version="1" comment="afterburn-dracut is &lt;5.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923267" version="1" comment="libmbedcrypto7 is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923268" version="1" comment="libmbedcrypto7-32bit is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923269" version="1" comment="libmbedtls14 is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923270" version="1" comment="libmbedtls14-32bit is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923271" version="1" comment="libmbedx509-1 is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923272" version="1" comment="libmbedx509-1-32bit is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923273" version="1" comment="mbedtls-devel is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923274" version="1" comment="libmruby3 is &lt;3.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923275" version="1" comment="mruby is &lt;3.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923276" version="1" comment="mruby-devel is &lt;3.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923277" version="1" comment="cryptsetup is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923278" version="1" comment="cryptsetup-lang is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923279" version="1" comment="cryptsetup-ssh is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923280" version="1" comment="libcryptsetup-devel is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923281" version="1" comment="libcryptsetup12 is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923282" version="1" comment="libcryptsetup12-32bit is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923283" version="1" comment="libcryptsetup12-hmac is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923284" version="1" comment="libcryptsetup12-hmac-32bit is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923285" version="1" comment="flatpak-builder is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923286" version="1" comment="flatpak is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923287" version="1" comment="flatpak-devel is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923288" version="1" comment="flatpak-zsh-completion is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923289" version="1" comment="libflatpak0 is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923290" version="1" comment="system-user-flatpak is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923291" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923292" version="1" comment="libcontainers-common is &lt;20210626-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923293" version="1" comment="libvirt is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923294" version="1" comment="libvirt-client is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923295" version="1" comment="libvirt-daemon is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923296" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923297" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923298" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923299" version="1" comment="libvirt-daemon-driver-libxl is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923300" version="1" comment="libvirt-daemon-driver-lxc is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923301" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923302" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923303" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923304" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923305" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923306" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923307" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923308" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923309" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923310" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923311" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923312" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923313" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923314" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923315" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923316" version="1" comment="libvirt-daemon-hooks is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923317" version="1" comment="libvirt-daemon-lxc is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923318" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923319" version="1" comment="libvirt-daemon-xen is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923320" version="1" comment="libvirt-devel is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923321" version="1" comment="libvirt-devel-32bit is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923322" version="1" comment="libvirt-doc is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923323" version="1" comment="libvirt-libs is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923324" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923325" version="1" comment="libvirt-nss is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923326" version="1" comment="wireshark-plugin-libvirt is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923327" version="1" comment="log4j12 is &lt;1.2.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923328" version="1" comment="log4j12-javadoc is &lt;1.2.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923329" version="1" comment="log4j12-manual is &lt;1.2.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923330" version="1" comment="logfactor5 is &lt;1.2.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923331" version="1" comment="mailman3 is &lt;3.3.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923332" version="1" comment="chromedriver is &lt;97.0.4692.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923333" version="1" comment="chromium is &lt;97.0.4692.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923334" version="1" comment="expat is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923335" version="1" comment="libexpat-devel is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923336" version="1" comment="libexpat-devel-32bit is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923337" version="1" comment="libexpat1 is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923338" version="1" comment="libexpat1-32bit is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923339" version="1" comment="python310-ipython is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923340" version="1" comment="python38-ipython is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923341" version="1" comment="python39-ipython is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923342" version="1" comment="lighttpd is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923343" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923344" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923345" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923346" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923347" version="1" comment="lighttpd-mod_magnet is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923348" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923349" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923350" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923351" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923352" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923353" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923354" version="1" comment="lighttpd-mod_webdav is &lt;1.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923355" version="1" comment="phpMyAdmin is &lt;5.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923356" version="1" comment="phpMyAdmin-apache is &lt;5.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923357" version="1" comment="phpMyAdmin-lang is &lt;5.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923358" version="1" comment="python38-distributed is &lt;2022.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923359" version="1" comment="python39-distributed is &lt;2022.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923360" version="1" comment="cargo1.56 is &lt;1.56.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923361" version="1" comment="rust1.56 is &lt;1.56.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923362" version="1" comment="cargo1.57 is &lt;1.57.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923363" version="1" comment="rust1.57 is &lt;1.57.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923364" version="1" comment="cargo1.58 is &lt;1.58.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923365" version="1" comment="rust1.58 is &lt;1.58.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923366" version="1" comment="libvirglrenderer1 is &lt;0.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923367" version="1" comment="virglrenderer-devel is &lt;0.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923368" version="1" comment="virglrenderer-test-server is &lt;0.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923369" version="1" comment="python3-virtualbox is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923370" version="1" comment="virtualbox is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923371" version="1" comment="virtualbox-devel is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923372" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923373" version="1" comment="virtualbox-guest-source is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923374" version="1" comment="virtualbox-guest-tools is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923375" version="1" comment="virtualbox-guest-x11 is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923376" version="1" comment="virtualbox-host-source is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923377" version="1" comment="virtualbox-qt is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923378" version="1" comment="virtualbox-vnc is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923379" version="1" comment="virtualbox-websrv is &lt;6.1.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923380" version="1" comment="zabbix-agent is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923381" version="1" comment="zabbix-java-gateway is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923382" version="1" comment="zabbix-phpfrontend is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923383" version="1" comment="zabbix-proxy is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923384" version="1" comment="zabbix-proxy-mysql is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923385" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923386" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923387" version="1" comment="zabbix-server is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923388" version="1" comment="zabbix-server-mysql is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923389" version="1" comment="zabbix-server-postgresql is &lt;4.0.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923390" version="1" comment="pure-ftpd is &lt;1.0.50-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923391" version="1" comment="usbview is &lt;3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923393" version="1" comment="kernel-macros is &lt;5.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923394" version="1" comment="kernel-source is &lt;5.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923395" version="1" comment="kernel-source-vanilla is &lt;5.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923396" version="1" comment="gstreamer is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923397" version="1" comment="gstreamer-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923398" version="1" comment="gstreamer-devel is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923399" version="1" comment="gstreamer-devel-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923400" version="1" comment="gstreamer-lang is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923401" version="1" comment="gstreamer-utils is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923402" version="1" comment="libgstreamer-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923403" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923404" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923405" version="1" comment="typelib-1_0-Gst-1_0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923406" version="1" comment="gstreamer-plugins-base is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923407" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923408" version="1" comment="gstreamer-plugins-base-devel is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923409" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923410" version="1" comment="gstreamer-plugins-base-lang is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923411" version="1" comment="libgstallocators-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923412" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923413" version="1" comment="libgstapp-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923414" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923415" version="1" comment="libgstaudio-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923416" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923417" version="1" comment="libgstfft-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923418" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923419" version="1" comment="libgstgl-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923420" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923421" version="1" comment="libgstpbutils-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923422" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923423" version="1" comment="libgstriff-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923424" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923425" version="1" comment="libgstrtp-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923426" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923427" version="1" comment="libgstrtsp-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923428" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923429" version="1" comment="libgstsdp-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923430" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923431" version="1" comment="libgsttag-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923432" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923433" version="1" comment="libgstvideo-1_0-0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923434" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923435" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923436" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923437" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923438" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923439" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923440" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923441" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923442" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923443" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923444" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923445" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923446" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923447" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923448" version="1" comment="gstreamer-plugins-good is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923449" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923450" version="1" comment="gstreamer-plugins-good-extra is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923451" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923452" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923453" version="1" comment="gstreamer-plugins-good-jack is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923454" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923455" version="1" comment="gstreamer-plugins-good-lang is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923456" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.18.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923457" version="1" comment="isync is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923458" version="1" comment="libpolkit-agent-1-0 is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923459" version="1" comment="libpolkit-agent-1-0-32bit is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923460" version="1" comment="libpolkit-gobject-1-0 is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923461" version="1" comment="libpolkit-gobject-1-0-32bit is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923462" version="1" comment="polkit is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923463" version="1" comment="polkit-devel is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923464" version="1" comment="polkit-doc is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923465" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923466" version="1" comment="xen is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923467" version="1" comment="xen-devel is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923468" version="1" comment="xen-doc-html is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923469" version="1" comment="xen-libs is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923470" version="1" comment="xen-libs-32bit is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923471" version="1" comment="xen-tools is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923472" version="1" comment="xen-tools-domU is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923473" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.16.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923474" version="1" comment="gstreamer-plugins-bad is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923475" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923476" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923477" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923478" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923479" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923480" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923481" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923482" version="1" comment="gstreamer-transcoder is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923483" version="1" comment="gstreamer-transcoder-devel is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923484" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923485" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923486" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923487" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923488" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923489" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923490" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923491" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923492" version="1" comment="libgstcodecs-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923493" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923494" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923495" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923496" version="1" comment="libgstisoff-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923497" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923498" version="1" comment="libgstmpegts-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923499" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923500" version="1" comment="libgstphotography-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923501" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923502" version="1" comment="libgstplayer-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923503" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923504" version="1" comment="libgstsctp-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923505" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923506" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923507" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923508" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923509" version="1" comment="libgstvulkan-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923510" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923511" version="1" comment="libgstwayland-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923512" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923513" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923514" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923515" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923516" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923517" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923518" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923519" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923520" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923521" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923522" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923523" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923524" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.18.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923525" version="1" comment="perl-App-cpanminus is &lt;1.7045-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923526" version="1" comment="libblkid-devel is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923527" version="1" comment="libblkid-devel-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923528" version="1" comment="libblkid-devel-static is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923529" version="1" comment="libblkid1 is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923530" version="1" comment="libblkid1-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923531" version="1" comment="libfdisk-devel is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923532" version="1" comment="libfdisk-devel-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923533" version="1" comment="libfdisk-devel-static is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923534" version="1" comment="libfdisk1 is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923535" version="1" comment="libfdisk1-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923536" version="1" comment="libmount-devel is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923537" version="1" comment="libmount-devel-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923538" version="1" comment="libmount-devel-static is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923539" version="1" comment="libmount1 is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923540" version="1" comment="libmount1-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923541" version="1" comment="libsmartcols-devel is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923542" version="1" comment="libsmartcols-devel-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923543" version="1" comment="libsmartcols-devel-static is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923544" version="1" comment="libsmartcols1 is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923545" version="1" comment="libsmartcols1-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923546" version="1" comment="libuuid-devel is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923547" version="1" comment="libuuid-devel-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923548" version="1" comment="libuuid-devel-static is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923549" version="1" comment="libuuid1 is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923550" version="1" comment="libuuid1-32bit is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923551" version="1" comment="util-linux is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923552" version="1" comment="util-linux-lang is &lt;2.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923553" version="1" comment="keylime-agent is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923554" version="1" comment="keylime-config is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923555" version="1" comment="keylime-firewalld is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923556" version="1" comment="keylime-registrar is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923557" version="1" comment="keylime-tpm_cert_store is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923558" version="1" comment="keylime-verifier is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923559" version="1" comment="python310-keylime is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923560" version="1" comment="python38-keylime is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923561" version="1" comment="python39-keylime is &lt;6.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923562" version="1" comment="libruby3_1-3_1 is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923563" version="1" comment="ruby3.1 is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923564" version="1" comment="ruby3.1-devel is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923565" version="1" comment="ruby3.1-devel-extra is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923566" version="1" comment="ruby3.1-doc is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923567" version="1" comment="ruby3.1-doc-ri is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923568" version="1" comment="libsphinxclient-0_0_1 is &lt;2.2.11-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923569" version="1" comment="libsphinxclient-devel is &lt;2.2.11-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923570" version="1" comment="sphinx is &lt;2.2.11-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923571" version="1" comment="gegl is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923572" version="1" comment="gegl-0_4 is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923573" version="1" comment="gegl-0_4-lang is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923574" version="1" comment="gegl-devel is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923575" version="1" comment="gegl-doc is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923576" version="1" comment="libgegl-0_4-0 is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923577" version="1" comment="libgegl-0_4-0-32bit is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923578" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.34-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923579" version="1" comment="element-desktop is &lt;1.9.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923580" version="1" comment="element-web is &lt;1.9.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923581" version="1" comment="python310-sentry-sdk is &lt;1.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923582" version="1" comment="python38-sentry-sdk is &lt;1.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923583" version="1" comment="python39-sentry-sdk is &lt;1.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923584" version="1" comment="connman is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923585" version="1" comment="connman-client is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923586" version="1" comment="connman-devel is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923587" version="1" comment="connman-doc is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923588" version="1" comment="connman-nmcompat is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923589" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923590" version="1" comment="connman-plugin-iospm is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923591" version="1" comment="connman-plugin-l2tp is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923592" version="1" comment="connman-plugin-openconnect is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923593" version="1" comment="connman-plugin-openvpn is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923594" version="1" comment="connman-plugin-polkit is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923595" version="1" comment="connman-plugin-pptp is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923596" version="1" comment="connman-plugin-tist is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923597" version="1" comment="connman-plugin-vpnc is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923598" version="1" comment="connman-plugin-wireguard is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923599" version="1" comment="connman-test is &lt;1.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923600" version="1" comment="expat is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923601" version="1" comment="libexpat-devel is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923602" version="1" comment="libexpat-devel-32bit is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923603" version="1" comment="libexpat1 is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923604" version="1" comment="libexpat1-32bit is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923605" version="1" comment="exiftool is &lt;12.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923606" version="1" comment="perl-File-RandomAccess is &lt;12.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923607" version="1" comment="perl-Image-ExifTool is &lt;12.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923608" version="1" comment="ruby3.1-rubygem-fluentd is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923610" version="1" comment="kernel-macros is &lt;5.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923611" version="1" comment="kernel-source is &lt;5.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923612" version="1" comment="kernel-source-vanilla is &lt;5.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923613" version="1" comment="libopenssl-3-devel is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923614" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923615" version="1" comment="libopenssl3 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923616" version="1" comment="libopenssl3-32bit is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923617" version="1" comment="openssl-3 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923618" version="1" comment="openssl-3-doc is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923619" version="1" comment="java-11-openjdk is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923620" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923621" version="1" comment="java-11-openjdk-demo is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923622" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923623" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923624" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923625" version="1" comment="java-11-openjdk-jmods is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923626" version="1" comment="java-11-openjdk-src is &lt;11.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923627" version="1" comment="java-15-openjdk is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923628" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923629" version="1" comment="java-15-openjdk-demo is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923630" version="1" comment="java-15-openjdk-devel is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923631" version="1" comment="java-15-openjdk-headless is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923632" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923633" version="1" comment="java-15-openjdk-jmods is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923634" version="1" comment="java-15-openjdk-src is &lt;15.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923635" version="1" comment="java-17-openjdk is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923636" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923637" version="1" comment="java-17-openjdk-demo is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923638" version="1" comment="java-17-openjdk-devel is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923639" version="1" comment="java-17-openjdk-headless is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923640" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923641" version="1" comment="java-17-openjdk-jmods is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923642" version="1" comment="java-17-openjdk-src is &lt;17.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923643" version="1" comment="kate is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923644" version="1" comment="kate-lang is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923645" version="1" comment="kate-plugins is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923646" version="1" comment="kwrite is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923647" version="1" comment="ldns is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923648" version="1" comment="ldns-devel is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923649" version="1" comment="libldns3 is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923650" version="1" comment="perl-DNS-LDNS is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923651" version="1" comment="python3-ldns is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923652" version="1" comment="glade-catalog-libgda is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923653" version="1" comment="libgda-6_0-6_0_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923654" version="1" comment="libgda-6_0-6_0_0-lang is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923655" version="1" comment="libgda-6_0-devel is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923656" version="1" comment="libgda-6_0-doc is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923657" version="1" comment="libgda-6_0-ldap is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923658" version="1" comment="libgda-6_0-mysql is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923659" version="1" comment="libgda-6_0-postgres is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923660" version="1" comment="libgda-6_0-sqlcipher is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923661" version="1" comment="libgda-6_0-sqlite is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923662" version="1" comment="libgda-6_0-tools is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923663" version="1" comment="libgda-report is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923664" version="1" comment="libgda-report-6_0-6_0_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923665" version="1" comment="libgda-ui-6_0-6_0_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923666" version="1" comment="libgda-ui-6_0-plugins is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923667" version="1" comment="libgda-ui-6_0-tools is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923668" version="1" comment="libgda-xslt-6_0-6_0_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923669" version="1" comment="typelib-1_0-Gda-6_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923670" version="1" comment="typelib-1_0-Gdaui-6_0 is &lt;6.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923671" version="1" comment="python310-Django is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923672" version="1" comment="python38-Django is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923673" version="1" comment="python39-Django is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923674" version="1" comment="python310-scikit-learn is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923675" version="1" comment="python38-scikit-learn is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923676" version="1" comment="python39-scikit-learn is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923677" version="1" comment="python310-treq is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923678" version="1" comment="python38-treq is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923679" version="1" comment="python39-treq is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923680" version="1" comment="ctdb is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923681" version="1" comment="ctdb-pcp-pmda is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923682" version="1" comment="libsamba-policy-devel is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923683" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923684" version="1" comment="libsamba-policy0-python3 is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923685" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923686" version="1" comment="samba is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923687" version="1" comment="samba-ad-dc is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923688" version="1" comment="samba-ad-dc-libs is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923689" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923690" version="1" comment="samba-ceph is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923691" version="1" comment="samba-client is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923692" version="1" comment="samba-client-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923693" version="1" comment="samba-client-libs is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923694" version="1" comment="samba-client-libs-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923695" version="1" comment="samba-devel is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923696" version="1" comment="samba-devel-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923697" version="1" comment="samba-doc is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923698" version="1" comment="samba-dsdb-modules is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923699" version="1" comment="samba-gpupdate is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923700" version="1" comment="samba-ldb-ldap is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923701" version="1" comment="samba-libs is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923702" version="1" comment="samba-libs-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923703" version="1" comment="samba-libs-python3 is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923704" version="1" comment="samba-libs-python3-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923705" version="1" comment="samba-python3 is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923706" version="1" comment="samba-test is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923707" version="1" comment="samba-tool is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923708" version="1" comment="samba-winbind is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923709" version="1" comment="samba-winbind-libs is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923710" version="1" comment="samba-winbind-libs-32bit is &lt;4.15.5+git.328.f1f29505d84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923711" version="1" comment="strongswan is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923712" version="1" comment="strongswan-doc is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923713" version="1" comment="strongswan-hmac is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923714" version="1" comment="strongswan-ipsec is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923715" version="1" comment="strongswan-libs0 is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923716" version="1" comment="strongswan-mysql is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923717" version="1" comment="strongswan-nm is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923718" version="1" comment="strongswan-sqlite is &lt;5.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923719" version="1" comment="xstream is &lt;1.4.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923720" version="1" comment="xstream-benchmark is &lt;1.4.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923721" version="1" comment="xstream-javadoc is &lt;1.4.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923722" version="1" comment="xstream-parent is &lt;1.4.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923723" version="1" comment="java-13-openjdk is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923724" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923725" version="1" comment="java-13-openjdk-demo is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923726" version="1" comment="java-13-openjdk-devel is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923727" version="1" comment="java-13-openjdk-headless is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923728" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923729" version="1" comment="java-13-openjdk-jmods is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923730" version="1" comment="java-13-openjdk-src is &lt;13.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923731" version="1" comment="chromedriver is &lt;98.0.4758.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923732" version="1" comment="chromium is &lt;98.0.4758.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923733" version="1" comment="gvim is &lt;8.2.4286-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923734" version="1" comment="vim is &lt;8.2.4286-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923735" version="1" comment="vim-data is &lt;8.2.4286-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923736" version="1" comment="vim-data-common is &lt;8.2.4286-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923737" version="1" comment="vim-small is &lt;8.2.4286-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923738" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923739" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923740" version="1" comment="libQt5Concurrent-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923741" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923742" version="1" comment="libQt5Concurrent5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923743" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923744" version="1" comment="libQt5Core-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923745" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923746" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923747" version="1" comment="libQt5Core5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923748" version="1" comment="libQt5Core5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923749" version="1" comment="libQt5DBus-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923750" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923751" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923752" version="1" comment="libQt5DBus5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923753" version="1" comment="libQt5DBus5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923754" version="1" comment="libQt5Gui-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923755" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923756" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923757" version="1" comment="libQt5Gui5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923758" version="1" comment="libQt5Gui5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923759" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923760" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923761" version="1" comment="libQt5Network-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923762" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923763" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923764" version="1" comment="libQt5Network5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923765" version="1" comment="libQt5Network5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923766" version="1" comment="libQt5OpenGL-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923767" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923768" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923769" version="1" comment="libQt5OpenGL5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923770" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923771" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923772" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923773" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923774" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923775" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923776" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923777" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923778" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923779" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923780" version="1" comment="libQt5PrintSupport5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923781" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923782" version="1" comment="libQt5Sql-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923783" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923784" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923785" version="1" comment="libQt5Sql5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923786" version="1" comment="libQt5Sql5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923787" version="1" comment="libQt5Sql5-mysql is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923788" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923789" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923790" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923791" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923792" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923793" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923794" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923795" version="1" comment="libQt5Test-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923796" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923797" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923798" version="1" comment="libQt5Test5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923799" version="1" comment="libQt5Test5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923800" version="1" comment="libQt5Widgets-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923801" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923802" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923803" version="1" comment="libQt5Widgets5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923804" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923805" version="1" comment="libQt5Xml-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923806" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923807" version="1" comment="libQt5Xml5 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923808" version="1" comment="libQt5Xml5-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923809" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923810" version="1" comment="libqt5-qtbase-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923811" version="1" comment="libqt5-qtbase-examples is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923812" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923813" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923814" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923815" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.2+kde294-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923816" version="1" comment="python310-Pillow is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923817" version="1" comment="python310-Pillow-tk is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923818" version="1" comment="python38-Pillow is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923819" version="1" comment="python38-Pillow-tk is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923820" version="1" comment="python39-Pillow is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923821" version="1" comment="python39-Pillow-tk is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923822" version="1" comment="libvirglrenderer1 is &lt;0.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923823" version="1" comment="virglrenderer-devel is &lt;0.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923824" version="1" comment="virglrenderer-test-server is &lt;0.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923825" version="1" comment="grafana is &lt;8.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923826" version="1" comment="openscad is &lt;2021.01-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923827" version="1" comment="ruby3.1-rubygem-actioncable-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923828" version="1" comment="ruby3.1-rubygem-actionmailbox-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923829" version="1" comment="ruby3.1-rubygem-actionmailer-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923830" version="1" comment="ruby3.1-rubygem-actionpack-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923831" version="1" comment="ruby3.1-rubygem-actiontext-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923832" version="1" comment="ruby3.1-rubygem-actionview-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923833" version="1" comment="ruby3.1-rubygem-activejob-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923834" version="1" comment="ruby3.1-rubygem-activemodel-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923835" version="1" comment="ruby3.1-rubygem-activerecord-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923836" version="1" comment="ruby3.1-rubygem-activestorage-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923837" version="1" comment="ruby3.1-rubygem-activesupport-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923838" version="1" comment="ruby3.1-rubygem-json_pure is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923839" version="1" comment="ruby3.1-rubygem-puma-4 is &lt;4.3.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923840" version="1" comment="ruby3.1-rubygem-rails-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923841" version="1" comment="ruby3.1-rubygem-railties-6.0 is &lt;6.0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923842" version="1" comment="libnbd is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923843" version="1" comment="libnbd-bash-completion is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923844" version="1" comment="libnbd-devel is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923845" version="1" comment="libnbd0 is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923846" version="1" comment="nbdfuse is &lt;1.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923847" version="1" comment="libmruby3 is &lt;3.0.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923848" version="1" comment="mruby is &lt;3.0.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923849" version="1" comment="mruby-devel is &lt;3.0.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923850" version="1" comment="python is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923851" version="1" comment="python-32bit is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923852" version="1" comment="python-curses is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923853" version="1" comment="python-demo is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923854" version="1" comment="python-gdbm is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923855" version="1" comment="python-idle is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923856" version="1" comment="python-tk is &lt;2.7.18-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923857" version="1" comment="grafana is &lt;8.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923858" version="1" comment="MozillaFirefox is &lt;97.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923859" version="1" comment="MozillaFirefox-branding-upstream is &lt;97.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923860" version="1" comment="MozillaFirefox-devel is &lt;97.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923861" version="1" comment="MozillaFirefox-translations-common is &lt;97.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923862" version="1" comment="MozillaFirefox-translations-other is &lt;97.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923863" version="1" comment="kafka-kit is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923864" version="1" comment="python is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923865" version="1" comment="python-32bit is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923866" version="1" comment="python-curses is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923867" version="1" comment="python-demo is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923868" version="1" comment="python-gdbm is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923869" version="1" comment="python-idle is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923870" version="1" comment="python-tk is &lt;2.7.18-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923871" version="1" comment="ucode-intel is &lt;20220207-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923872" version="1" comment="python-Twisted-doc is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923873" version="1" comment="python310-Twisted is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923874" version="1" comment="python38-Twisted is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923875" version="1" comment="python39-Twisted is &lt;22.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923876" version="1" comment="MozillaThunderbird is &lt;91.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923877" version="1" comment="MozillaThunderbird-translations-common is &lt;91.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923878" version="1" comment="MozillaThunderbird-translations-other is &lt;91.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923879" version="1" comment="go1.16 is &lt;1.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923880" version="1" comment="go1.16-doc is &lt;1.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923881" version="1" comment="go1.16-race is &lt;1.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923882" version="1" comment="go1.17 is &lt;1.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923883" version="1" comment="go1.17-doc is &lt;1.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923884" version="1" comment="go1.17-race is &lt;1.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923885" version="1" comment="xerces-j2 is &lt;2.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923886" version="1" comment="xerces-j2-demo is &lt;2.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923887" version="1" comment="xerces-j2-javadoc is &lt;2.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923888" version="1" comment="qtox is &lt;1.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923889" version="1" comment="ruby3.1-rubygem-puma is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923890" version="1" comment="atheme is &lt;7.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923891" version="1" comment="atheme-devel is &lt;7.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923892" version="1" comment="libathemecore1 is &lt;7.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923893" version="1" comment="chromedriver is &lt;98.0.4758.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923894" version="1" comment="chromium is &lt;98.0.4758.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923895" version="1" comment="glibc is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923896" version="1" comment="glibc-devel is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923897" version="1" comment="glibc-devel-static is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923898" version="1" comment="glibc-extra is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923899" version="1" comment="glibc-html is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923900" version="1" comment="glibc-i18ndata is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923901" version="1" comment="glibc-info is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923902" version="1" comment="glibc-lang is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923903" version="1" comment="glibc-locale is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923904" version="1" comment="glibc-locale-base is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923905" version="1" comment="glibc-profile is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923906" version="1" comment="nscd is &lt;2.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923907" version="1" comment="mujs is &lt;1.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923908" version="1" comment="mujs-devel is &lt;1.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923909" version="1" comment="perl-GD is &lt;2.76-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923910" version="1" comment="cobbler is &lt;3.3.1.0+git.f5b0599a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923911" version="1" comment="cobbler-tests is &lt;3.3.1.0+git.f5b0599a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923912" version="1" comment="php8 is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923913" version="1" comment="php8-bcmath is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923914" version="1" comment="php8-bz2 is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923915" version="1" comment="php8-calendar is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923916" version="1" comment="php8-cli is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923917" version="1" comment="php8-ctype is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923918" version="1" comment="php8-curl is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923919" version="1" comment="php8-dba is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923920" version="1" comment="php8-devel is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923921" version="1" comment="php8-dom is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923922" version="1" comment="php8-enchant is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923923" version="1" comment="php8-exif is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923924" version="1" comment="php8-ffi is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923925" version="1" comment="php8-fileinfo is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923926" version="1" comment="php8-ftp is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923927" version="1" comment="php8-gd is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923928" version="1" comment="php8-gettext is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923929" version="1" comment="php8-gmp is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923930" version="1" comment="php8-iconv is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923931" version="1" comment="php8-intl is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923932" version="1" comment="php8-ldap is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923933" version="1" comment="php8-mbstring is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923934" version="1" comment="php8-mysql is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923935" version="1" comment="php8-odbc is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923936" version="1" comment="php8-opcache is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923937" version="1" comment="php8-openssl is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923938" version="1" comment="php8-pcntl is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923939" version="1" comment="php8-pdo is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923940" version="1" comment="php8-pgsql is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923941" version="1" comment="php8-phar is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923942" version="1" comment="php8-posix is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923943" version="1" comment="php8-readline is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923944" version="1" comment="php8-shmop is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923945" version="1" comment="php8-snmp is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923946" version="1" comment="php8-soap is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923947" version="1" comment="php8-sockets is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923948" version="1" comment="php8-sodium is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923949" version="1" comment="php8-sqlite is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923950" version="1" comment="php8-sysvmsg is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923951" version="1" comment="php8-sysvsem is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923952" version="1" comment="php8-sysvshm is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923953" version="1" comment="php8-tidy is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923954" version="1" comment="php8-tokenizer is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923955" version="1" comment="php8-xmlreader is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923956" version="1" comment="php8-xmlwriter is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923957" version="1" comment="php8-xsl is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923958" version="1" comment="php8-zip is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923959" version="1" comment="php8-zlib is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923960" version="1" comment="libpodofo-devel is &lt;0.9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923961" version="1" comment="libpodofo0_9_7 is &lt;0.9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923962" version="1" comment="podofo is &lt;0.9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923963" version="1" comment="MozillaThunderbird is &lt;91.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923964" version="1" comment="MozillaThunderbird-translations-common is &lt;91.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923965" version="1" comment="MozillaThunderbird-translations-other is &lt;91.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923967" version="1" comment="kernel-macros is &lt;5.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923968" version="1" comment="kernel-source is &lt;5.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923969" version="1" comment="kernel-source-vanilla is &lt;5.16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923970" version="1" comment="libwireshark15 is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923971" version="1" comment="libwiretap12 is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923972" version="1" comment="libwsutil13 is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923973" version="1" comment="wireshark is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923974" version="1" comment="wireshark-devel is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923975" version="1" comment="wireshark-ui-qt is &lt;3.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923976" version="1" comment="blender is &lt;3.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923977" version="1" comment="blender-cycles-devel is &lt;3.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923978" version="1" comment="blender-demo is &lt;3.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923979" version="1" comment="blender-lang is &lt;3.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923980" version="1" comment="cosign is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923981" version="1" comment="php7 is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923982" version="1" comment="php7-bcmath is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923983" version="1" comment="php7-bz2 is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923984" version="1" comment="php7-calendar is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923985" version="1" comment="php7-cli is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923986" version="1" comment="php7-ctype is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923987" version="1" comment="php7-curl is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923988" version="1" comment="php7-dba is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923989" version="1" comment="php7-devel is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923990" version="1" comment="php7-dom is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923991" version="1" comment="php7-enchant is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923992" version="1" comment="php7-exif is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923993" version="1" comment="php7-fileinfo is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923994" version="1" comment="php7-ftp is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923995" version="1" comment="php7-gd is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923996" version="1" comment="php7-gettext is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923997" version="1" comment="php7-gmp is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923998" version="1" comment="php7-iconv is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009923999" version="1" comment="php7-intl is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924000" version="1" comment="php7-json is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924001" version="1" comment="php7-ldap is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924002" version="1" comment="php7-mbstring is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924003" version="1" comment="php7-mysql is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924004" version="1" comment="php7-odbc is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924005" version="1" comment="php7-opcache is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924006" version="1" comment="php7-openssl is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924007" version="1" comment="php7-pcntl is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924008" version="1" comment="php7-pdo is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924009" version="1" comment="php7-pgsql is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924010" version="1" comment="php7-phar is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924011" version="1" comment="php7-posix is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924012" version="1" comment="php7-readline is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924013" version="1" comment="php7-shmop is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924014" version="1" comment="php7-snmp is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924015" version="1" comment="php7-soap is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924016" version="1" comment="php7-sockets is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924017" version="1" comment="php7-sodium is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924018" version="1" comment="php7-sqlite is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924019" version="1" comment="php7-sysvmsg is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924020" version="1" comment="php7-sysvsem is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924021" version="1" comment="php7-sysvshm is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924022" version="1" comment="php7-tidy is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924023" version="1" comment="php7-tokenizer is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924024" version="1" comment="php7-xmlreader is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924025" version="1" comment="php7-xmlrpc is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924026" version="1" comment="php7-xmlwriter is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924027" version="1" comment="php7-xsl is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924028" version="1" comment="php7-zip is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924029" version="1" comment="php7-zlib is &lt;7.4.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924030" version="1" comment="qemu is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924031" version="1" comment="qemu-accel-qtest is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924032" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924033" version="1" comment="qemu-arm is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924034" version="1" comment="qemu-audio-alsa is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924035" version="1" comment="qemu-audio-jack is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924036" version="1" comment="qemu-audio-oss is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924037" version="1" comment="qemu-audio-pa is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924038" version="1" comment="qemu-audio-spice is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924039" version="1" comment="qemu-block-curl is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924040" version="1" comment="qemu-block-dmg is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924041" version="1" comment="qemu-block-gluster is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924042" version="1" comment="qemu-block-iscsi is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924043" version="1" comment="qemu-block-nfs is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924044" version="1" comment="qemu-block-rbd is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924045" version="1" comment="qemu-block-ssh is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924046" version="1" comment="qemu-chardev-baum is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924047" version="1" comment="qemu-chardev-spice is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924048" version="1" comment="qemu-extra is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924049" version="1" comment="qemu-guest-agent is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924050" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924051" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924052" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924053" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924054" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924055" version="1" comment="qemu-hw-usb-host is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924056" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924057" version="1" comment="qemu-hw-usb-smartcard is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924058" version="1" comment="qemu-ipxe is &lt;1.0.0+-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924059" version="1" comment="qemu-ivshmem-tools is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924060" version="1" comment="qemu-ksm is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924061" version="1" comment="qemu-kvm is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924062" version="1" comment="qemu-lang is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924063" version="1" comment="qemu-microvm is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924064" version="1" comment="qemu-ppc is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924065" version="1" comment="qemu-s390x is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924066" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924067" version="1" comment="qemu-sgabios is &lt;8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924068" version="1" comment="qemu-skiboot is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924069" version="1" comment="qemu-tools is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924070" version="1" comment="qemu-ui-curses is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924071" version="1" comment="qemu-ui-gtk is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924072" version="1" comment="qemu-ui-opengl is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924073" version="1" comment="qemu-ui-spice-app is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924074" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924075" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924076" version="1" comment="qemu-vhost-user-gpu is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924077" version="1" comment="qemu-x86 is &lt;6.2.0-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924078" version="1" comment="libshp-devel is &lt;1.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924079" version="1" comment="libshp2 is &lt;1.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924080" version="1" comment="shapelib is &lt;1.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924081" version="1" comment="tomcat is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924082" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924083" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924084" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924085" version="1" comment="tomcat-embed is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924086" version="1" comment="tomcat-javadoc is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924087" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924088" version="1" comment="tomcat-jsvc is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924089" version="1" comment="tomcat-lib is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924090" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924091" version="1" comment="tomcat-webapps is &lt;9.0.43-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924092" version="1" comment="apr-devel is &lt;1.7.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924093" version="1" comment="libapr1-0 is &lt;1.7.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924094" version="1" comment="expat is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924095" version="1" comment="libexpat-devel is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924096" version="1" comment="libexpat-devel-32bit is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924097" version="1" comment="libexpat1 is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924098" version="1" comment="libexpat1-32bit is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924099" version="1" comment="libmariadbd-devel is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924100" version="1" comment="libmariadbd19 is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924101" version="1" comment="mariadb is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924102" version="1" comment="mariadb-bench is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924103" version="1" comment="mariadb-client is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924104" version="1" comment="mariadb-errormessages is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924105" version="1" comment="mariadb-galera is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924106" version="1" comment="mariadb-rpm-macros is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924107" version="1" comment="mariadb-test is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924108" version="1" comment="mariadb-tools is &lt;10.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924109" version="1" comment="libpolkit-agent-1-0 is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924110" version="1" comment="libpolkit-agent-1-0-32bit is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924111" version="1" comment="libpolkit-gobject-1-0 is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924112" version="1" comment="libpolkit-gobject-1-0-32bit is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924113" version="1" comment="polkit is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924114" version="1" comment="polkit-devel is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924115" version="1" comment="polkit-doc is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924116" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.120-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924117" version="1" comment="ruby3.1-rubygem-actionpack-6.0 is &lt;6.0.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924118" version="1" comment="swtpm is &lt;0.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924119" version="1" comment="swtpm-devel is &lt;0.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924120" version="1" comment="swtpm-selinux is &lt;0.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924121" version="1" comment="libusbguard1 is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924122" version="1" comment="usbguard is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924123" version="1" comment="usbguard-devel is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924124" version="1" comment="usbguard-tools is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924125" version="1" comment="gvim is &lt;8.2.4456-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924126" version="1" comment="vim is &lt;8.2.4456-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924127" version="1" comment="vim-data is &lt;8.2.4456-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924128" version="1" comment="vim-data-common is &lt;8.2.4456-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924129" version="1" comment="vim-small is &lt;8.2.4456-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924130" version="1" comment="cfengine is &lt;3.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924131" version="1" comment="cfengine-examples is &lt;3.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924132" version="1" comment="libpromises-devel is &lt;3.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924133" version="1" comment="libpromises3 is &lt;3.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924134" version="1" comment="php-composer is &lt;1.10.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924135" version="1" comment="libseat1 is &lt;0.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924136" version="1" comment="seatd is &lt;0.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924137" version="1" comment="seatd-devel is &lt;0.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924138" version="1" comment="haproxy is &lt;2.5.4+git0.e55ab4208-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924139" version="1" comment="python is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924140" version="1" comment="python-32bit is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924141" version="1" comment="python-curses is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924142" version="1" comment="python-demo is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924143" version="1" comment="python-gdbm is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924144" version="1" comment="python-idle is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924145" version="1" comment="python-tk is &lt;2.7.18-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924146" version="1" comment="python36 is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924147" version="1" comment="python36-32bit is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924148" version="1" comment="python36-curses is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924149" version="1" comment="python36-dbm is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924150" version="1" comment="python36-idle is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924151" version="1" comment="python36-tk is &lt;3.6.15-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924152" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924153" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924154" version="1" comment="libQt5Concurrent-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924155" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924156" version="1" comment="libQt5Concurrent5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924157" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924158" version="1" comment="libQt5Core-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924159" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924160" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924161" version="1" comment="libQt5Core5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924162" version="1" comment="libQt5Core5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924163" version="1" comment="libQt5DBus-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924164" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924165" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924166" version="1" comment="libQt5DBus5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924167" version="1" comment="libQt5DBus5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924168" version="1" comment="libQt5Gui-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924169" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924170" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924171" version="1" comment="libQt5Gui5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924172" version="1" comment="libQt5Gui5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924173" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924174" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924175" version="1" comment="libQt5Network-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924176" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924177" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924178" version="1" comment="libQt5Network5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924179" version="1" comment="libQt5Network5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924180" version="1" comment="libQt5OpenGL-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924181" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924182" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924183" version="1" comment="libQt5OpenGL5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924184" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924185" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924186" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924187" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924188" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924189" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924190" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924191" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924192" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924193" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924194" version="1" comment="libQt5PrintSupport5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924195" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924196" version="1" comment="libQt5Sql-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924197" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924198" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924199" version="1" comment="libQt5Sql5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924200" version="1" comment="libQt5Sql5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924201" version="1" comment="libQt5Sql5-mysql is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924202" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924203" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924204" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924205" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924206" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924207" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924208" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924209" version="1" comment="libQt5Test-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924210" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924211" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924212" version="1" comment="libQt5Test5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924213" version="1" comment="libQt5Test5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924214" version="1" comment="libQt5Widgets-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924215" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924216" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924217" version="1" comment="libQt5Widgets5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924218" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924219" version="1" comment="libQt5Xml-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924220" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924221" version="1" comment="libQt5Xml5 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924222" version="1" comment="libQt5Xml5-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924223" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924224" version="1" comment="libqt5-qtbase-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924225" version="1" comment="libqt5-qtbase-examples is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924226" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924227" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924228" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924229" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.2+kde294-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924230" version="1" comment="frr is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924231" version="1" comment="frr-devel is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924232" version="1" comment="libfrr0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924233" version="1" comment="libfrr_pb0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924234" version="1" comment="libfrrcares0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924235" version="1" comment="libfrrfpm_pb0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924236" version="1" comment="libfrrospfapiclient0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924237" version="1" comment="libfrrsnmp0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924238" version="1" comment="libfrrzmq0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924239" version="1" comment="libmlag_pb0 is &lt;8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924240" version="1" comment="kcron is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924241" version="1" comment="kcron-lang is &lt;21.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924242" version="1" comment="ldb-tools is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924243" version="1" comment="libldb-devel is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924244" version="1" comment="libldb2 is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924245" version="1" comment="libldb2-32bit is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924246" version="1" comment="python3-ldb is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924247" version="1" comment="python3-ldb-32bit is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924248" version="1" comment="python3-ldb-devel is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924249" version="1" comment="mysql-connector-java is &lt;8.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924250" version="1" comment="screen is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924251" version="1" comment="flac is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924252" version="1" comment="flac-devel is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924253" version="1" comment="flac-devel-32bit is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924254" version="1" comment="libFLAC++6 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924255" version="1" comment="libFLAC++6-32bit is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924256" version="1" comment="libFLAC8 is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924257" version="1" comment="libFLAC8-32bit is &lt;1.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924258" version="1" comment="libQt6Concurrent6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924259" version="1" comment="libQt6Core6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924260" version="1" comment="libQt6DBus6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924261" version="1" comment="libQt6Gui6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924262" version="1" comment="libQt6Network6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924263" version="1" comment="libQt6OpenGL6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924264" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924265" version="1" comment="libQt6PrintSupport6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924266" version="1" comment="libQt6Sql6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924267" version="1" comment="libQt6Test6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924268" version="1" comment="libQt6Widgets6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924269" version="1" comment="libQt6Xml6 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924270" version="1" comment="qt6-base-common-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924271" version="1" comment="qt6-base-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924272" version="1" comment="qt6-base-examples is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924273" version="1" comment="qt6-base-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924274" version="1" comment="qt6-concurrent-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924275" version="1" comment="qt6-core-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924276" version="1" comment="qt6-core-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924277" version="1" comment="qt6-dbus-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924278" version="1" comment="qt6-dbus-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924279" version="1" comment="qt6-docs-common is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924280" version="1" comment="qt6-gui-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924281" version="1" comment="qt6-gui-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924282" version="1" comment="qt6-kmssupport-devel-static is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924283" version="1" comment="qt6-kmssupport-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924284" version="1" comment="qt6-network-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924285" version="1" comment="qt6-network-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924286" version="1" comment="qt6-network-tls is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924287" version="1" comment="qt6-networkinformation-nm is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924288" version="1" comment="qt6-opengl-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924289" version="1" comment="qt6-opengl-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924290" version="1" comment="qt6-openglwidgets-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924291" version="1" comment="qt6-platformsupport-devel-static is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924292" version="1" comment="qt6-platformsupport-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924293" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924294" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924295" version="1" comment="qt6-printsupport-cups is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924296" version="1" comment="qt6-printsupport-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924297" version="1" comment="qt6-printsupport-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924298" version="1" comment="qt6-sql-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924299" version="1" comment="qt6-sql-mysql is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924300" version="1" comment="qt6-sql-postgresql is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924301" version="1" comment="qt6-sql-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924302" version="1" comment="qt6-sql-sqlite is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924303" version="1" comment="qt6-sql-unixODBC is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924304" version="1" comment="qt6-test-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924305" version="1" comment="qt6-test-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924306" version="1" comment="qt6-widgets-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924307" version="1" comment="qt6-widgets-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924308" version="1" comment="qt6-xml-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924309" version="1" comment="qt6-xml-private-devel is &lt;6.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924310" version="1" comment="weblate is &lt;4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924311" version="1" comment="weblate-doc is &lt;4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924312" version="1" comment="keepalived is &lt;2.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924313" version="1" comment="python-Scrapy-doc is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924314" version="1" comment="python310-Scrapy is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924315" version="1" comment="python38-Scrapy is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924316" version="1" comment="python39-Scrapy is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924317" version="1" comment="chromedriver is &lt;99.0.4844.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924318" version="1" comment="chromium is &lt;99.0.4844.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924319" version="1" comment="containerd is &lt;1.4.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924320" version="1" comment="containerd-ctr is &lt;1.4.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924321" version="1" comment="go1.16 is &lt;1.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924322" version="1" comment="go1.16-doc is &lt;1.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924323" version="1" comment="go1.16-race is &lt;1.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924324" version="1" comment="go1.17 is &lt;1.17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924325" version="1" comment="go1.17-doc is &lt;1.17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924326" version="1" comment="go1.17-race is &lt;1.17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924327" version="1" comment="bsdtar is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924328" version="1" comment="libarchive-devel is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924329" version="1" comment="libarchive13 is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924330" version="1" comment="libarchive13-32bit is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924331" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924332" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924333" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924334" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924335" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924336" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924337" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.322-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924338" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924339" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924340" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924341" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924342" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924343" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924344" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.322-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924345" version="1" comment="minidlna is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924346" version="1" comment="libopenvswitch-2_17-0 is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924347" version="1" comment="openvswitch is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924348" version="1" comment="openvswitch-devel is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924349" version="1" comment="openvswitch-doc is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924350" version="1" comment="openvswitch-ipsec is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924351" version="1" comment="openvswitch-pki is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924352" version="1" comment="openvswitch-test is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924353" version="1" comment="openvswitch-vtep is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924354" version="1" comment="python310-ovs is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924355" version="1" comment="python38-ovs is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924356" version="1" comment="python39-ovs is &lt;2.17.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924357" version="1" comment="ruby3.1-rubygem-actionpack-7.0 is &lt;7.0.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924358" version="1" comment="ruby3.1-rubygem-loofah is &lt;2.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924359" version="1" comment="cyradm is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924360" version="1" comment="cyrus-imapd is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924361" version="1" comment="cyrus-imapd-devel is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924362" version="1" comment="cyrus-imapd-snmp is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924363" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924364" version="1" comment="cyrus-imapd-utils is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924365" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924366" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924367" version="1" comment="fscrypt is &lt;0.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924368" version="1" comment="pam-fscrypt is &lt;0.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924369" version="1" comment="ruby3.1-rubygem-activestorage-7.0 is &lt;7.0.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924370" version="1" comment="cobbler is &lt;3.3.2.0+git.9044aa99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924371" version="1" comment="cobbler-tests is &lt;3.3.2.0+git.9044aa99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924372" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924373" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924374" version="1" comment="libopenssl1_1 is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924375" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924376" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924377" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924378" version="1" comment="openssl-1_1 is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924379" version="1" comment="openssl-1_1-doc is &lt;1.1.1m-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924380" version="1" comment="ruby3.1-rubygem-sprockets is &lt;4.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924381" version="1" comment="qemu is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924382" version="1" comment="qemu-SLOF is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924383" version="1" comment="qemu-accel-qtest is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924384" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924385" version="1" comment="qemu-arm is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924386" version="1" comment="qemu-audio-alsa is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924387" version="1" comment="qemu-audio-jack is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924388" version="1" comment="qemu-audio-oss is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924389" version="1" comment="qemu-audio-pa is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924390" version="1" comment="qemu-audio-spice is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924391" version="1" comment="qemu-block-curl is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924392" version="1" comment="qemu-block-dmg is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924393" version="1" comment="qemu-block-gluster is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924394" version="1" comment="qemu-block-iscsi is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924395" version="1" comment="qemu-block-nfs is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924396" version="1" comment="qemu-block-rbd is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924397" version="1" comment="qemu-block-ssh is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924398" version="1" comment="qemu-chardev-baum is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924399" version="1" comment="qemu-chardev-spice is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924400" version="1" comment="qemu-extra is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924401" version="1" comment="qemu-guest-agent is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924402" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924403" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924404" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924405" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924406" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924407" version="1" comment="qemu-hw-usb-host is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924408" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924409" version="1" comment="qemu-hw-usb-smartcard is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924410" version="1" comment="qemu-ipxe is &lt;1.0.0+-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924411" version="1" comment="qemu-ivshmem-tools is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924412" version="1" comment="qemu-ksm is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924413" version="1" comment="qemu-kvm is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924414" version="1" comment="qemu-lang is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924415" version="1" comment="qemu-microvm is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924416" version="1" comment="qemu-ppc is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924417" version="1" comment="qemu-s390x is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924418" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924419" version="1" comment="qemu-sgabios is &lt;8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924420" version="1" comment="qemu-skiboot is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924421" version="1" comment="qemu-tools is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924422" version="1" comment="qemu-ui-curses is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924423" version="1" comment="qemu-ui-gtk is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924424" version="1" comment="qemu-ui-opengl is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924425" version="1" comment="qemu-ui-spice-app is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924426" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924427" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924428" version="1" comment="qemu-vhost-user-gpu is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924429" version="1" comment="qemu-x86 is &lt;6.2.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924430" version="1" comment="MozillaFirefox is &lt;98.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924431" version="1" comment="MozillaFirefox-branding-upstream is &lt;98.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924432" version="1" comment="MozillaFirefox-devel is &lt;98.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924433" version="1" comment="MozillaFirefox-translations-common is &lt;98.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924434" version="1" comment="MozillaFirefox-translations-other is &lt;98.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924435" version="1" comment="MozillaThunderbird is &lt;91.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924436" version="1" comment="MozillaThunderbird-translations-common is &lt;91.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924437" version="1" comment="MozillaThunderbird-translations-other is &lt;91.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924439" version="1" comment="kernel-macros is &lt;5.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924440" version="1" comment="kernel-source is &lt;5.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924441" version="1" comment="kernel-source-vanilla is &lt;5.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924442" version="1" comment="etcd is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924443" version="1" comment="etcdctl is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924444" version="1" comment="etcdutl is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924445" version="1" comment="ruby3.1-rubygem-nokogiri is &lt;1.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924446" version="1" comment="juliaup is &lt;1.5.37-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924447" version="1" comment="macchina is &lt;6.0.6~git0.c21ce78-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924448" version="1" comment="libblkid-devel is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924449" version="1" comment="libblkid-devel-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924450" version="1" comment="libblkid-devel-static is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924451" version="1" comment="libblkid1 is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924452" version="1" comment="libblkid1-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924453" version="1" comment="libfdisk-devel is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924454" version="1" comment="libfdisk-devel-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924455" version="1" comment="libfdisk-devel-static is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924456" version="1" comment="libfdisk1 is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924457" version="1" comment="libfdisk1-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924458" version="1" comment="libmount-devel is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924459" version="1" comment="libmount-devel-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924460" version="1" comment="libmount-devel-static is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924461" version="1" comment="libmount1 is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924462" version="1" comment="libmount1-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924463" version="1" comment="libsmartcols-devel is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924464" version="1" comment="libsmartcols-devel-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924465" version="1" comment="libsmartcols-devel-static is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924466" version="1" comment="libsmartcols1 is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924467" version="1" comment="libsmartcols1-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924468" version="1" comment="libuuid-devel is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924469" version="1" comment="libuuid-devel-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924470" version="1" comment="libuuid-devel-static is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924471" version="1" comment="libuuid1 is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924472" version="1" comment="libuuid1-32bit is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924473" version="1" comment="util-linux is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924474" version="1" comment="util-linux-lang is &lt;2.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924475" version="1" comment="tealdeer is &lt;1.5.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924476" version="1" comment="treefetch is &lt;2.0.0~git0.5b3eac1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924477" version="1" comment="tuigreet is &lt;0.7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924478" version="1" comment="apache2 is &lt;2.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924479" version="1" comment="cargo-audit is &lt;0.16.0~git0.625c965-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924480" version="1" comment="rage-encryption is &lt;0.7.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924481" version="1" comment="rage-encryption-bash-completion is &lt;0.7.1+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924482" version="1" comment="rustup is &lt;1.24.3~0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924483" version="1" comment="sccache is &lt;0.2.15~git0.6b6d2f7-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924484" version="1" comment="cscreen is &lt;1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924485" version="1" comment="firecracker is &lt;1.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924486" version="1" comment="grub2 is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924487" version="1" comment="grub2-branding-upstream is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924488" version="1" comment="grub2-i386-pc is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924489" version="1" comment="grub2-i386-pc-debug is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924490" version="1" comment="grub2-snapper-plugin is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924491" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924492" version="1" comment="grub2-x86_64-efi is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924493" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924494" version="1" comment="grub2-x86_64-xen is &lt;2.06-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924495" version="1" comment="libopenssl-3-devel is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924496" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924497" version="1" comment="libopenssl3 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924498" version="1" comment="libopenssl3-32bit is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924499" version="1" comment="openssl-3 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924500" version="1" comment="openssl-3-doc is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924501" version="1" comment="pleaser is &lt;0.5.1~git0.ce9627c-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924502" version="1" comment="squid is &lt;5.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924503" version="1" comment="xen is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924504" version="1" comment="xen-devel is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924505" version="1" comment="xen-doc-html is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924506" version="1" comment="xen-libs is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924507" version="1" comment="xen-libs-32bit is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924508" version="1" comment="xen-tools is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924509" version="1" comment="xen-tools-domU is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924510" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.16.0_06-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924511" version="1" comment="aws-nitro-enclaves-binaryblobs-upstream is &lt;1.2.0~git2.841ef94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924512" version="1" comment="aws-nitro-enclaves-cli is &lt;1.2.0~git2.841ef94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924513" version="1" comment="system-group-ne is &lt;1.2.0~git2.841ef94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924514" version="1" comment="chromedriver is &lt;99.0.4844.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924515" version="1" comment="chromium is &lt;99.0.4844.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924516" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924517" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924518" version="1" comment="libopenssl1_1 is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924519" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924520" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924521" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924522" version="1" comment="openssl-1_1 is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924523" version="1" comment="openssl-1_1-doc is &lt;1.1.1n-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924524" version="1" comment="zabbix-agent is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924525" version="1" comment="zabbix-java-gateway is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924526" version="1" comment="zabbix-phpfrontend is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924527" version="1" comment="zabbix-proxy is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924528" version="1" comment="zabbix-proxy-mysql is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924529" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924530" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924531" version="1" comment="zabbix-server is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924532" version="1" comment="zabbix-server-mysql is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924533" version="1" comment="zabbix-server-postgresql is &lt;4.0.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924534" version="1" comment="arm-trusted-firmware is &lt;2.6-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924535" version="1" comment="arm-trusted-firmware-tools is &lt;2.6-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924536" version="1" comment="fish is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924537" version="1" comment="fish-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924538" version="1" comment="git-delta is &lt;0.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924539" version="1" comment="libwavpack1 is &lt;5.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924540" version="1" comment="libwavpack1-32bit is &lt;5.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924541" version="1" comment="wavpack is &lt;5.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924542" version="1" comment="wavpack-devel is &lt;5.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924544" version="1" comment="kernel-macros is &lt;5.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924545" version="1" comment="kernel-source is &lt;5.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924546" version="1" comment="kernel-source-vanilla is &lt;5.16.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924547" version="1" comment="libtcmu2 is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924548" version="1" comment="tcmu-runner is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924549" version="1" comment="tcmu-runner-handler-glusterfs is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924550" version="1" comment="tcmu-runner-handler-rbd is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924551" version="1" comment="tcmu-runner-handler-zbc is &lt;1.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924552" version="1" comment="kanidm is &lt;1.1.0~alpha7~git0.c8468199-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924553" version="1" comment="kanidm-clients is &lt;1.1.0~alpha7~git0.c8468199-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924554" version="1" comment="kanidm-docs is &lt;1.1.0~alpha7~git0.c8468199-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924555" version="1" comment="kanidm-server is &lt;1.1.0~alpha7~git0.c8468199-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924556" version="1" comment="kanidm-unixd-clients is &lt;1.1.0~alpha7~git0.c8468199-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924557" version="1" comment="python310-waitress is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924558" version="1" comment="python38-waitress is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924559" version="1" comment="python39-waitress is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924560" version="1" comment="abcm2ps is &lt;8.14.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924561" version="1" comment="libcrypto47 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924562" version="1" comment="libcrypto47-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924563" version="1" comment="libressl is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924564" version="1" comment="libressl-devel is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924565" version="1" comment="libressl-devel-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924566" version="1" comment="libressl-devel-doc is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924567" version="1" comment="libssl50 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924568" version="1" comment="libssl50-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924569" version="1" comment="libtls22 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924570" version="1" comment="libtls22-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924571" version="1" comment="parsec is &lt;1.0.0~rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924572" version="1" comment="parsec-tool is &lt;0.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924573" version="1" comment="apptainer is &lt;1.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924574" version="1" comment="spotifyd is &lt;0.3.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924575" version="1" comment="cyrus-sasl is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924576" version="1" comment="cyrus-sasl-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924577" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924578" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924579" version="1" comment="cyrus-sasl-devel is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924580" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924581" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924582" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924583" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924584" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924585" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924586" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924587" version="1" comment="cyrus-sasl-otp is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924588" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924589" version="1" comment="cyrus-sasl-plain is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924590" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924591" version="1" comment="cyrus-sasl-scram is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924592" version="1" comment="libsasl2-3 is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924593" version="1" comment="libsasl2-3-32bit is &lt;2.1.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924594" version="1" comment="libxml2-2 is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924595" version="1" comment="libxml2-2-32bit is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924596" version="1" comment="libxml2-devel is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924597" version="1" comment="libxml2-devel-32bit is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924598" version="1" comment="libxml2-doc is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924599" version="1" comment="libxml2-tools is &lt;2.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924600" version="1" comment="libvlc5 is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924601" version="1" comment="libvlccore9 is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924602" version="1" comment="vlc is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924603" version="1" comment="vlc-codec-gstreamer is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924604" version="1" comment="vlc-devel is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924605" version="1" comment="vlc-jack is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924606" version="1" comment="vlc-lang is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924607" version="1" comment="vlc-noX is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924608" version="1" comment="vlc-opencv is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924609" version="1" comment="vlc-qt is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924610" version="1" comment="vlc-vdpau is &lt;3.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924611" version="1" comment="389-ds is &lt;2.0.14~git25.e6431d959-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924612" version="1" comment="389-ds-devel is &lt;2.0.14~git25.e6431d959-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924613" version="1" comment="389-ds-snmp is &lt;2.0.14~git25.e6431d959-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924614" version="1" comment="lib389 is &lt;2.0.14~git25.e6431d959-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924615" version="1" comment="libsvrcore0 is &lt;2.0.14~git25.e6431d959-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924616" version="1" comment="cargo-audit-advisory-db is &lt;20220323-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924617" version="1" comment="pdns is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924618" version="1" comment="pdns-backend-geoip is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924619" version="1" comment="pdns-backend-godbc is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924620" version="1" comment="pdns-backend-ldap is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924621" version="1" comment="pdns-backend-lmdb is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924622" version="1" comment="pdns-backend-lua is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924623" version="1" comment="pdns-backend-mysql is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924624" version="1" comment="pdns-backend-postgresql is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924625" version="1" comment="pdns-backend-remote is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924626" version="1" comment="pdns-backend-sqlite3 is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924627" version="1" comment="pdns-recursor is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924628" version="1" comment="python310-mitmproxy is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924629" version="1" comment="python38-mitmproxy is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924630" version="1" comment="python39-mitmproxy is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924631" version="1" comment="chromedriver is &lt;99.0.4844.84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924632" version="1" comment="chromium is &lt;99.0.4844.84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924633" version="1" comment="python310-nltk is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924634" version="1" comment="python38-nltk is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924635" version="1" comment="python39-nltk is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924636" version="1" comment="zsh is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924637" version="1" comment="zsh-htmldoc is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924638" version="1" comment="aide is &lt;0.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924639" version="1" comment="aide-test is &lt;0.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924640" version="1" comment="c3p0 is &lt;0.9.5.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924641" version="1" comment="c3p0-javadoc is &lt;0.9.5.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924642" version="1" comment="newsboat is &lt;2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924643" version="1" comment="newsboat-lang is &lt;2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924644" version="1" comment="389-ds is &lt;2.1.1~git4.b7f891097-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924645" version="1" comment="389-ds-devel is &lt;2.1.1~git4.b7f891097-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924646" version="1" comment="389-ds-snmp is &lt;2.1.1~git4.b7f891097-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924647" version="1" comment="lib389 is &lt;2.1.1~git4.b7f891097-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924648" version="1" comment="libsvrcore0 is &lt;2.1.1~git4.b7f891097-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924649" version="1" comment="buildah is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924650" version="1" comment="kubeseal is &lt;0.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924651" version="1" comment="libminizip1 is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924652" version="1" comment="libminizip1-32bit is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924653" version="1" comment="libz1 is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924654" version="1" comment="libz1-32bit is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924655" version="1" comment="minizip-devel is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924656" version="1" comment="zlib-devel is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924657" version="1" comment="zlib-devel-32bit is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924658" version="1" comment="zlib-devel-static is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924659" version="1" comment="zlib-devel-static-32bit is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924660" version="1" comment="zlib-testsuite is &lt;1.2.11-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924661" version="1" comment="chromedriver is &lt;100.0.4896.60-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924662" version="1" comment="chromium is &lt;100.0.4896.60-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924663" version="1" comment="openvpn is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924664" version="1" comment="openvpn-auth-pam-plugin is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924665" version="1" comment="openvpn-devel is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924666" version="1" comment="openvpn-down-root-plugin is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924667" version="1" comment="qemu is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924668" version="1" comment="qemu-SLOF is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924669" version="1" comment="qemu-accel-qtest is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924670" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924671" version="1" comment="qemu-arm is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924672" version="1" comment="qemu-audio-alsa is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924673" version="1" comment="qemu-audio-jack is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924674" version="1" comment="qemu-audio-oss is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924675" version="1" comment="qemu-audio-pa is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924676" version="1" comment="qemu-audio-spice is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924677" version="1" comment="qemu-block-curl is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924678" version="1" comment="qemu-block-dmg is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924679" version="1" comment="qemu-block-gluster is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924680" version="1" comment="qemu-block-iscsi is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924681" version="1" comment="qemu-block-nfs is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924682" version="1" comment="qemu-block-rbd is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924683" version="1" comment="qemu-block-ssh is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924684" version="1" comment="qemu-chardev-baum is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924685" version="1" comment="qemu-chardev-spice is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924686" version="1" comment="qemu-extra is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924687" version="1" comment="qemu-guest-agent is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924688" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924689" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924690" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924691" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924692" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924693" version="1" comment="qemu-hw-usb-host is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924694" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924695" version="1" comment="qemu-hw-usb-smartcard is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924696" version="1" comment="qemu-ipxe is &lt;1.0.0+-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924697" version="1" comment="qemu-ivshmem-tools is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924698" version="1" comment="qemu-ksm is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924699" version="1" comment="qemu-kvm is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924700" version="1" comment="qemu-lang is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924701" version="1" comment="qemu-microvm is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924702" version="1" comment="qemu-ppc is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924703" version="1" comment="qemu-s390x is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924704" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924705" version="1" comment="qemu-sgabios is &lt;8-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924706" version="1" comment="qemu-skiboot is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924707" version="1" comment="qemu-tools is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924708" version="1" comment="qemu-ui-curses is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924709" version="1" comment="qemu-ui-gtk is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924710" version="1" comment="qemu-ui-opengl is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924711" version="1" comment="qemu-ui-spice-app is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924712" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924713" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924714" version="1" comment="qemu-vhost-user-gpu is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924715" version="1" comment="qemu-x86 is &lt;6.2.0-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924716" version="1" comment="python3-salt is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924717" version="1" comment="salt is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924718" version="1" comment="salt-api is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924719" version="1" comment="salt-bash-completion is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924720" version="1" comment="salt-cloud is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924721" version="1" comment="salt-doc is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924722" version="1" comment="salt-fish-completion is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924723" version="1" comment="salt-master is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924724" version="1" comment="salt-minion is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924725" version="1" comment="salt-proxy is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924726" version="1" comment="salt-ssh is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924727" version="1" comment="salt-standalone-formulas-configuration is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924728" version="1" comment="salt-syndic is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924729" version="1" comment="salt-transactional-update is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924730" version="1" comment="salt-zsh-completion is &lt;3004-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924731" version="1" comment="chromedriver is &lt;100.0.4896.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924732" version="1" comment="chromium is &lt;100.0.4896.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924733" version="1" comment="libvirt is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924734" version="1" comment="libvirt-client is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924735" version="1" comment="libvirt-daemon is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924736" version="1" comment="libvirt-daemon-config-network is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924737" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924738" version="1" comment="libvirt-daemon-driver-interface is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924739" version="1" comment="libvirt-daemon-driver-libxl is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924740" version="1" comment="libvirt-daemon-driver-lxc is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924741" version="1" comment="libvirt-daemon-driver-network is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924742" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924743" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924744" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924745" version="1" comment="libvirt-daemon-driver-secret is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924746" version="1" comment="libvirt-daemon-driver-storage is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924747" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924748" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924749" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924750" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924751" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924752" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924753" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924754" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924755" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924756" version="1" comment="libvirt-daemon-hooks is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924757" version="1" comment="libvirt-daemon-lxc is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924758" version="1" comment="libvirt-daemon-qemu is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924759" version="1" comment="libvirt-daemon-xen is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924760" version="1" comment="libvirt-devel is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924761" version="1" comment="libvirt-devel-32bit is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924762" version="1" comment="libvirt-doc is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924763" version="1" comment="libvirt-libs is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924764" version="1" comment="libvirt-lock-sanlock is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924765" version="1" comment="libvirt-nss is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924766" version="1" comment="wireshark-plugin-libvirt is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924767" version="1" comment="libQt6Pdf6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924768" version="1" comment="libQt6PdfQuick6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924769" version="1" comment="libQt6PdfWidgets6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924770" version="1" comment="libQt6WebEngineCore6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924771" version="1" comment="libQt6WebEngineQuick6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924772" version="1" comment="libQt6WebEngineWidgets6 is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924773" version="1" comment="qt6-pdf-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924774" version="1" comment="qt6-pdf-imports is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924775" version="1" comment="qt6-pdf-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924776" version="1" comment="qt6-pdfquick-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924777" version="1" comment="qt6-pdfquick-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924778" version="1" comment="qt6-pdfwidgets-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924779" version="1" comment="qt6-pdfwidgets-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924780" version="1" comment="qt6-webengine is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924781" version="1" comment="qt6-webengine-examples is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924782" version="1" comment="qt6-webengine-imports is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924783" version="1" comment="qt6-webenginecore-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924784" version="1" comment="qt6-webenginecore-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924785" version="1" comment="qt6-webenginequick-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924786" version="1" comment="qt6-webenginequick-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924787" version="1" comment="qt6-webenginewidgets-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924788" version="1" comment="qt6-webenginewidgets-private-devel is &lt;6.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924789" version="1" comment="qutebrowser is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924790" version="1" comment="MozillaFirefox is &lt;99.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924791" version="1" comment="MozillaFirefox-branding-upstream is &lt;99.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924792" version="1" comment="MozillaFirefox-devel is &lt;99.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924793" version="1" comment="MozillaFirefox-translations-common is &lt;99.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924794" version="1" comment="MozillaFirefox-translations-other is &lt;99.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924795" version="1" comment="htcondor is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924796" version="1" comment="htcondor-bosco is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924797" version="1" comment="htcondor-classads is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924798" version="1" comment="htcondor-classads-devel is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924799" version="1" comment="htcondor-credmon-oauth is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924800" version="1" comment="htcondor-credmon-vault is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924801" version="1" comment="htcondor-devel is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924802" version="1" comment="htcondor-doc is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924803" version="1" comment="htcondor-kbdd is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924804" version="1" comment="htcondor-procd is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924805" version="1" comment="htcondor-vm-gahp is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924806" version="1" comment="minicondor is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924807" version="1" comment="python3-condor is &lt;9.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924808" version="1" comment="libQt5Pdf5 is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924809" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924810" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924811" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924812" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924813" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924814" version="1" comment="libqt5-qtwebengine is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924815" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924816" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924817" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924818" version="1" comment="python-Twisted-doc is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924819" version="1" comment="python310-Twisted is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924820" version="1" comment="python38-Twisted is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924821" version="1" comment="python39-Twisted is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924822" version="1" comment="xen is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924823" version="1" comment="xen-devel is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924824" version="1" comment="xen-doc-html is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924825" version="1" comment="xen-libs is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924826" version="1" comment="xen-libs-32bit is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924827" version="1" comment="xen-tools is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924828" version="1" comment="xen-tools-domU is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924829" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.16.0_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924830" version="1" comment="itextpdf is &lt;5.5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924831" version="1" comment="itextpdf-javadoc is &lt;5.5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924832" version="1" comment="netty3 is &lt;3.10.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924833" version="1" comment="netty3-javadoc is &lt;3.10.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924834" version="1" comment="podman is &lt;4.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924835" version="1" comment="podman-cni-config is &lt;4.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924836" version="1" comment="podman-docker is &lt;4.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924837" version="1" comment="podman-remote is &lt;4.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924838" version="1" comment="python-onionshare is &lt;2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924839" version="1" comment="SDL-devel is &lt;1.2.15-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924840" version="1" comment="SDL-devel-32bit is &lt;1.2.15-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924841" version="1" comment="SDL-devel-doc is &lt;1.2.15-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924842" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924843" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924844" version="1" comment="libQt5Pdf5 is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924845" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924846" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924847" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924848" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924849" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924850" version="1" comment="libqt5-qtwebengine is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924851" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924852" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924853" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924854" version="1" comment="squashfs is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924855" version="1" comment="apache2-mod_apparmor is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924856" version="1" comment="apparmor-abstractions is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924857" version="1" comment="apparmor-docs is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924858" version="1" comment="apparmor-parser is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924859" version="1" comment="apparmor-parser-lang is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924860" version="1" comment="apparmor-profiles is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924861" version="1" comment="apparmor-utils is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924862" version="1" comment="apparmor-utils-lang is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924863" version="1" comment="pam_apparmor is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924864" version="1" comment="pam_apparmor-32bit is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924865" version="1" comment="perl-apparmor is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924866" version="1" comment="python3-apparmor is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924867" version="1" comment="ruby-apparmor is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924868" version="1" comment="chromedriver is &lt;100.0.4896.88-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924869" version="1" comment="chromium is &lt;100.0.4896.88-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924870" version="1" comment="crun is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924872" version="1" comment="kernel-macros is &lt;5.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924873" version="1" comment="kernel-source is &lt;5.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924874" version="1" comment="kernel-source-vanilla is &lt;5.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924875" version="1" comment="go1.18 is &lt;1.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924876" version="1" comment="go1.18-doc is &lt;1.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924877" version="1" comment="go1.18-race is &lt;1.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924878" version="1" comment="gzip is &lt;1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924879" version="1" comment="nbd is &lt;3.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924880" version="1" comment="rtl_433 is &lt;21.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924881" version="1" comment="rtl_433-devel is &lt;21.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924882" version="1" comment="spyder is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924883" version="1" comment="spyder-dicom is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924884" version="1" comment="spyder-hdf5 is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924885" version="1" comment="spyder-lang is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924886" version="1" comment="GraphicsMagick is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924887" version="1" comment="GraphicsMagick-devel is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924888" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924889" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924890" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924891" version="1" comment="libGraphicsMagick3-config is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924892" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924893" version="1" comment="perl-GraphicsMagick is &lt;1.3.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924894" version="1" comment="dcraw is &lt;9.28.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924895" version="1" comment="dcraw-lang is &lt;9.28.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924896" version="1" comment="dnsmasq is &lt;2.86-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924897" version="1" comment="dnsmasq-utils is &lt;2.86-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924898" version="1" comment="ruby3.1-rubygem-nokogiri is &lt;1.13.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924899" version="1" comment="chromedriver is &lt;100.0.4896.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924900" version="1" comment="chromium is &lt;100.0.4896.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924901" version="1" comment="containerd is &lt;1.5.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924902" version="1" comment="containerd-ctr is &lt;1.5.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924903" version="1" comment="docker is &lt;20.10.14_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924904" version="1" comment="docker-bash-completion is &lt;20.10.14_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924905" version="1" comment="docker-fish-completion is &lt;20.10.14_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924906" version="1" comment="docker-zsh-completion is &lt;20.10.14_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924907" version="1" comment="git is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924908" version="1" comment="git-arch is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924909" version="1" comment="git-core is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924910" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924911" version="1" comment="git-credential-libsecret is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924912" version="1" comment="git-cvs is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924913" version="1" comment="git-daemon is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924914" version="1" comment="git-doc is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924915" version="1" comment="git-email is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924916" version="1" comment="git-gui is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924917" version="1" comment="git-p4 is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924918" version="1" comment="git-svn is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924919" version="1" comment="git-web is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924920" version="1" comment="gitk is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924921" version="1" comment="perl-Git is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924922" version="1" comment="go1.17 is &lt;1.17.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924923" version="1" comment="go1.17-doc is &lt;1.17.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924924" version="1" comment="go1.17-race is &lt;1.17.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924925" version="1" comment="libgit2-1_4 is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924926" version="1" comment="libgit2-1_4-32bit is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924927" version="1" comment="libgit2-devel is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924928" version="1" comment="libruby3_1-3_1 is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924929" version="1" comment="ruby3.1 is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924930" version="1" comment="ruby3.1-devel is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924931" version="1" comment="ruby3.1-devel-extra is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924932" version="1" comment="ruby3.1-doc is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924933" version="1" comment="ruby3.1-doc-ri is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924934" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924935" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924936" version="1" comment="subversion is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924937" version="1" comment="subversion-bash-completion is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924938" version="1" comment="subversion-devel is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924939" version="1" comment="subversion-perl is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924940" version="1" comment="subversion-python is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924941" version="1" comment="subversion-ruby is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924942" version="1" comment="subversion-server is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924943" version="1" comment="subversion-tools is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924944" version="1" comment="trivy is &lt;0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924945" version="1" comment="cargo-audit-advisory-db is &lt;20220420-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924946" version="1" comment="mutt is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924947" version="1" comment="mutt-doc is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924948" version="1" comment="mutt-lang is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924949" version="1" comment="plantuml is &lt;1.2022.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924950" version="1" comment="plantuml-javadoc is &lt;1.2022.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924951" version="1" comment="amazon-ssm-agent is &lt;3.1.1260.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924952" version="1" comment="java-13-openjdk is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924953" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924954" version="1" comment="java-13-openjdk-demo is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924955" version="1" comment="java-13-openjdk-devel is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924956" version="1" comment="java-13-openjdk-headless is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924957" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924958" version="1" comment="java-13-openjdk-jmods is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924959" version="1" comment="java-13-openjdk-src is &lt;13.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924960" version="1" comment="java-15-openjdk is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924961" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924962" version="1" comment="java-15-openjdk-demo is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924963" version="1" comment="java-15-openjdk-devel is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924964" version="1" comment="java-15-openjdk-headless is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924965" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924966" version="1" comment="java-15-openjdk-jmods is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924967" version="1" comment="java-15-openjdk-src is &lt;15.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924968" version="1" comment="java-18-openjdk is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924969" version="1" comment="java-18-openjdk-accessibility is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924970" version="1" comment="java-18-openjdk-demo is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924971" version="1" comment="java-18-openjdk-devel is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924972" version="1" comment="java-18-openjdk-headless is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924973" version="1" comment="java-18-openjdk-javadoc is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924974" version="1" comment="java-18-openjdk-jmods is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924975" version="1" comment="java-18-openjdk-src is &lt;18.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924976" version="1" comment="cacti is &lt;1.2.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924978" version="1" comment="kernel-macros is &lt;5.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924979" version="1" comment="kernel-source is &lt;5.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924980" version="1" comment="kernel-source-vanilla is &lt;5.17.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924981" version="1" comment="java-11-openjdk is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924982" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924983" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924984" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924985" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924986" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924987" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924988" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924989" version="1" comment="java-17-openjdk is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924990" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924991" version="1" comment="java-17-openjdk-demo is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924992" version="1" comment="java-17-openjdk-devel is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924993" version="1" comment="java-17-openjdk-headless is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924994" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924995" version="1" comment="java-17-openjdk-jmods is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924996" version="1" comment="java-17-openjdk-src is &lt;17.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924997" version="1" comment="libncurses5 is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924998" version="1" comment="libncurses5-32bit is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009924999" version="1" comment="libncurses6 is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925000" version="1" comment="libncurses6-32bit is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925001" version="1" comment="ncurses-devel is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925002" version="1" comment="ncurses-devel-32bit is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925003" version="1" comment="ncurses-devel-static is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925004" version="1" comment="ncurses-examples is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925005" version="1" comment="ncurses-utils is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925006" version="1" comment="ncurses5-devel is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925007" version="1" comment="ncurses5-devel-32bit is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925008" version="1" comment="ncurses5-devel-static is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925009" version="1" comment="tack is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925010" version="1" comment="terminfo is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925011" version="1" comment="terminfo-base is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925012" version="1" comment="terminfo-iterm is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925013" version="1" comment="terminfo-screen is &lt;6.3.20220416-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925014" version="1" comment="mupdf is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925015" version="1" comment="mupdf-devel-static is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925016" version="1" comment="nekohtml is &lt;1.9.22.noko2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925017" version="1" comment="nekohtml-demo is &lt;1.9.22.noko2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925018" version="1" comment="nekohtml-javadoc is &lt;1.9.22.noko2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925019" version="1" comment="libinput-devel is &lt;1.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925020" version="1" comment="libinput-tools is &lt;1.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925021" version="1" comment="libinput-udev is &lt;1.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925022" version="1" comment="libinput10 is &lt;1.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925023" version="1" comment="libinput10-32bit is &lt;1.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925024" version="1" comment="libmruby3_0_0 is &lt;3.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925025" version="1" comment="libmruby_core3_0_0 is &lt;3.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925026" version="1" comment="mruby is &lt;3.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925027" version="1" comment="mruby-devel is &lt;3.0.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925028" version="1" comment="epiphany is &lt;42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925029" version="1" comment="epiphany-branding-upstream is &lt;42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925030" version="1" comment="epiphany-lang is &lt;42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925031" version="1" comment="gnome-shell-search-provider-epiphany is &lt;42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925032" version="1" comment="logback is &lt;1.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925033" version="1" comment="logback-access is &lt;1.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925034" version="1" comment="logback-examples is &lt;1.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925035" version="1" comment="logback-javadoc is &lt;1.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925036" version="1" comment="maven-shared-utils is &lt;3.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925037" version="1" comment="maven-shared-utils-javadoc is &lt;3.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925038" version="1" comment="curl is &lt;7.83.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925039" version="1" comment="libcurl-devel is &lt;7.83.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925040" version="1" comment="libcurl-devel-32bit is &lt;7.83.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925041" version="1" comment="libcurl4 is &lt;7.83.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925042" version="1" comment="libcurl4-32bit is &lt;7.83.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925043" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925044" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925045" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925046" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925047" version="1" comment="libcaca0-32bit is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925048" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925049" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925050" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925051" version="1" comment="redis is &lt;6.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925052" version="1" comment="rke is &lt;1.3.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925053" version="1" comment="ruby3.1-rubygem-puma-4 is &lt;4.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925054" version="1" comment="ruby3.1-rubygem-sinatra is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925055" version="1" comment="docker is &lt;20.10.14_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925056" version="1" comment="docker-bash-completion is &lt;20.10.14_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925057" version="1" comment="docker-fish-completion is &lt;20.10.14_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925058" version="1" comment="docker-zsh-completion is &lt;20.10.14_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925059" version="1" comment="htmldoc is &lt;1.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925060" version="1" comment="finch is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925061" version="1" comment="finch-devel is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925062" version="1" comment="libpurple is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925063" version="1" comment="libpurple-branding-upstream is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925064" version="1" comment="libpurple-client0 is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925065" version="1" comment="libpurple-devel is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925066" version="1" comment="libpurple-lang is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925067" version="1" comment="libpurple-plugin-sametime is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925068" version="1" comment="libpurple-tcl is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925069" version="1" comment="libpurple0 is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925070" version="1" comment="pidgin is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925071" version="1" comment="pidgin-devel is &lt;2.14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925072" version="1" comment="libovn-21_09-0 is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925073" version="1" comment="ovn is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925074" version="1" comment="ovn-central is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925075" version="1" comment="ovn-devel is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925076" version="1" comment="ovn-doc is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925077" version="1" comment="ovn-docker is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925078" version="1" comment="ovn-host is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925079" version="1" comment="ovn-vtep is &lt;21.09.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925080" version="1" comment="ruby3.1-rubygem-kramdown is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925081" version="1" comment="dpdk is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925082" version="1" comment="dpdk-devel is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925083" version="1" comment="dpdk-devel-static is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925084" version="1" comment="dpdk-doc is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925085" version="1" comment="dpdk-examples is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925086" version="1" comment="dpdk-kmp-default is &lt;21.11.1_k5.17.4_1-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925087" version="1" comment="dpdk-tools is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925088" version="1" comment="libdpdk-22 is &lt;21.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925089" version="1" comment="google-gson is &lt;2.8.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925090" version="1" comment="google-gson-javadoc is &lt;2.8.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925091" version="1" comment="python310-httpx is &lt;0.22.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925092" version="1" comment="python38-httpx is &lt;0.22.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925093" version="1" comment="python39-httpx is &lt;0.22.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925094" version="1" comment="freetype2-devel is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925095" version="1" comment="freetype2-devel-32bit is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925096" version="1" comment="freetype2-profile-tti35 is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925097" version="1" comment="libfreetype6 is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925098" version="1" comment="libfreetype6-32bit is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925099" version="1" comment="libxml2-2 is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925100" version="1" comment="libxml2-2-32bit is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925101" version="1" comment="libxml2-devel is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925102" version="1" comment="libxml2-devel-32bit is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925103" version="1" comment="libxml2-doc is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925104" version="1" comment="libxml2-tools is &lt;2.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925105" version="1" comment="MozillaFirefox is &lt;100.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925106" version="1" comment="MozillaFirefox-branding-upstream is &lt;100.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925107" version="1" comment="MozillaFirefox-devel is &lt;100.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925108" version="1" comment="MozillaFirefox-translations-common is &lt;100.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925109" version="1" comment="MozillaFirefox-translations-other is &lt;100.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925110" version="1" comment="MozillaThunderbird is &lt;91.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925111" version="1" comment="MozillaThunderbird-translations-common is &lt;91.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925112" version="1" comment="MozillaThunderbird-translations-other is &lt;91.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925113" version="1" comment="chromedriver is &lt;101.0.4951.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925114" version="1" comment="chromium is &lt;101.0.4951.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925115" version="1" comment="clamav is &lt;0.103.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925116" version="1" comment="clamav-devel is &lt;0.103.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925117" version="1" comment="clamav-milter is &lt;0.103.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925118" version="1" comment="libclamav9 is &lt;0.103.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925119" version="1" comment="libfreshclam2 is &lt;0.103.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925120" version="1" comment="php-composer2 is &lt;2.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925121" version="1" comment="libpodofo-devel is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925122" version="1" comment="libpodofo0_9_8 is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925123" version="1" comment="podofo is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925124" version="1" comment="libnss_slurm2 is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925125" version="1" comment="libpmi0 is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925126" version="1" comment="libslurm37 is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925127" version="1" comment="perl-slurm is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925128" version="1" comment="slurm is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925129" version="1" comment="slurm-auth-none is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925130" version="1" comment="slurm-config is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925131" version="1" comment="slurm-config-man is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925132" version="1" comment="slurm-cray is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925133" version="1" comment="slurm-devel is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925134" version="1" comment="slurm-doc is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925135" version="1" comment="slurm-hdf5 is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925136" version="1" comment="slurm-lua is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925137" version="1" comment="slurm-munge is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925138" version="1" comment="slurm-node is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925139" version="1" comment="slurm-openlava is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925140" version="1" comment="slurm-pam_slurm is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925141" version="1" comment="slurm-plugins is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925142" version="1" comment="slurm-rest is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925143" version="1" comment="slurm-seff is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925144" version="1" comment="slurm-sjstat is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925145" version="1" comment="slurm-slurmdbd is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925146" version="1" comment="slurm-sql is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925147" version="1" comment="slurm-sview is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925148" version="1" comment="slurm-torque is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925149" version="1" comment="slurm-webdoc is &lt;21.08.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925150" version="1" comment="gvim is &lt;8.2.4877-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925151" version="1" comment="vim is &lt;8.2.4877-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925152" version="1" comment="vim-data is &lt;8.2.4877-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925153" version="1" comment="vim-data-common is &lt;8.2.4877-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925154" version="1" comment="vim-small is &lt;8.2.4877-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925155" version="1" comment="python3-virtualbox is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925156" version="1" comment="virtualbox is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925157" version="1" comment="virtualbox-devel is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925158" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925159" version="1" comment="virtualbox-guest-source is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925160" version="1" comment="virtualbox-guest-tools is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925161" version="1" comment="virtualbox-guest-x11 is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925162" version="1" comment="virtualbox-host-source is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925163" version="1" comment="virtualbox-qt is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925164" version="1" comment="virtualbox-vnc is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925165" version="1" comment="virtualbox-websrv is &lt;6.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925167" version="1" comment="kernel-macros is &lt;5.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925168" version="1" comment="kernel-source is &lt;5.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925169" version="1" comment="kernel-source-vanilla is &lt;5.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925170" version="1" comment="php-composer is &lt;1.10.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925171" version="1" comment="pijul is &lt;1.0.0~beta.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925172" version="1" comment="nodejs-electron is &lt;17.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925173" version="1" comment="nodejs-electron-devel is &lt;17.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925174" version="1" comment="libtiff-devel is &lt;4.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925175" version="1" comment="libtiff-devel-32bit is &lt;4.3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925176" version="1" comment="libtiff5 is &lt;4.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925177" version="1" comment="libtiff5-32bit is &lt;4.3.0-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925178" version="1" comment="tiff is &lt;4.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925179" version="1" comment="valgrind is &lt;3.19.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925180" version="1" comment="valgrind-32bit is &lt;3.19.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925181" version="1" comment="valgrind-devel is &lt;3.19.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925182" version="1" comment="rsyslog is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925183" version="1" comment="rsyslog-diag-tools is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925184" version="1" comment="rsyslog-doc is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925185" version="1" comment="rsyslog-module-elasticsearch is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925186" version="1" comment="rsyslog-module-gcrypt is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925187" version="1" comment="rsyslog-module-gssapi is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925188" version="1" comment="rsyslog-module-gtls is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925189" version="1" comment="rsyslog-module-kafka is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925190" version="1" comment="rsyslog-module-mmnormalize is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925191" version="1" comment="rsyslog-module-mysql is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925192" version="1" comment="rsyslog-module-omamqp1 is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925193" version="1" comment="rsyslog-module-omhttpfs is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925194" version="1" comment="rsyslog-module-omtcl is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925195" version="1" comment="rsyslog-module-ossl is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925196" version="1" comment="rsyslog-module-pgsql is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925197" version="1" comment="rsyslog-module-relp is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925198" version="1" comment="rsyslog-module-snmp is &lt;8.2204.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925199" version="1" comment="patch is &lt;2.7.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925200" version="1" comment="chromedriver is &lt;101.0.4951.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925201" version="1" comment="chromium is &lt;101.0.4951.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925202" version="1" comment="curl is &lt;7.83.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925203" version="1" comment="libcurl-devel is &lt;7.83.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925204" version="1" comment="libcurl-devel-32bit is &lt;7.83.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925205" version="1" comment="libcurl4 is &lt;7.83.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925206" version="1" comment="libcurl4-32bit is &lt;7.83.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925207" version="1" comment="exiv2 is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925208" version="1" comment="exiv2-lang is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925209" version="1" comment="libexiv2-27 is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925210" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925211" version="1" comment="libexiv2-devel is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925212" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925213" version="1" comment="gerbv is &lt;2.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925214" version="1" comment="gerbv-devel is &lt;2.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925215" version="1" comment="libgerbv1 is &lt;2.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925216" version="1" comment="go1.17 is &lt;1.17.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925217" version="1" comment="go1.17-doc is &lt;1.17.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925218" version="1" comment="go1.17-race is &lt;1.17.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925219" version="1" comment="go1.18 is &lt;1.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925220" version="1" comment="go1.18-doc is &lt;1.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925221" version="1" comment="go1.18-race is &lt;1.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925222" version="1" comment="nodejs-electron is &lt;17.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925223" version="1" comment="nodejs-electron-devel is &lt;17.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925224" version="1" comment="racket is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925225" version="1" comment="racket-devel is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925226" version="1" comment="racket-doc is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925227" version="1" comment="libnss_slurm2 is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925228" version="1" comment="libpmi0 is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925229" version="1" comment="libslurm37 is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925230" version="1" comment="perl-slurm is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925231" version="1" comment="slurm is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925232" version="1" comment="slurm-auth-none is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925233" version="1" comment="slurm-config is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925234" version="1" comment="slurm-config-man is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925235" version="1" comment="slurm-cray is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925236" version="1" comment="slurm-devel is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925237" version="1" comment="slurm-doc is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925238" version="1" comment="slurm-hdf5 is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925239" version="1" comment="slurm-lua is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925240" version="1" comment="slurm-munge is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925241" version="1" comment="slurm-node is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925242" version="1" comment="slurm-openlava is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925243" version="1" comment="slurm-pam_slurm is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925244" version="1" comment="slurm-plugins is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925245" version="1" comment="slurm-rest is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925246" version="1" comment="slurm-seff is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925247" version="1" comment="slurm-sjstat is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925248" version="1" comment="slurm-slurmdbd is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925249" version="1" comment="slurm-sql is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925250" version="1" comment="slurm-sview is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925251" version="1" comment="slurm-torque is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925252" version="1" comment="slurm-webdoc is &lt;21.08.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925253" version="1" comment="ucode-intel is &lt;20220510-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925254" version="1" comment="htmldoc is &lt;1.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925255" version="1" comment="postgresql10 is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925256" version="1" comment="postgresql10-contrib is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925257" version="1" comment="postgresql10-devel is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925258" version="1" comment="postgresql10-docs is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925259" version="1" comment="postgresql10-llvmjit-devel is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925260" version="1" comment="postgresql10-plperl is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925261" version="1" comment="postgresql10-plpython is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925262" version="1" comment="postgresql10-pltcl is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925263" version="1" comment="postgresql10-server is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925264" version="1" comment="postgresql10-test is &lt;10.19-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925265" version="1" comment="libecpg6 is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925266" version="1" comment="libecpg6-32bit is &lt;14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925267" version="1" comment="libpq5 is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925268" version="1" comment="libpq5-32bit is &lt;14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925269" version="1" comment="postgresql14 is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925270" version="1" comment="postgresql14-contrib is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925271" version="1" comment="postgresql14-devel is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925272" version="1" comment="postgresql14-docs is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925273" version="1" comment="postgresql14-llvmjit is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925274" version="1" comment="postgresql14-llvmjit-devel is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925275" version="1" comment="postgresql14-plperl is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925276" version="1" comment="postgresql14-plpython is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925277" version="1" comment="postgresql14-pltcl is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925278" version="1" comment="postgresql14-server is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925279" version="1" comment="postgresql14-server-devel is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925280" version="1" comment="postgresql14-test is &lt;14.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925281" version="1" comment="runc is &lt;1.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925282" version="1" comment="postgresql11 is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925283" version="1" comment="postgresql11-contrib is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925284" version="1" comment="postgresql11-devel is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925285" version="1" comment="postgresql11-docs is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925286" version="1" comment="postgresql11-llvmjit is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925287" version="1" comment="postgresql11-llvmjit-devel is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925288" version="1" comment="postgresql11-plperl is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925289" version="1" comment="postgresql11-plpython is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925290" version="1" comment="postgresql11-pltcl is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925291" version="1" comment="postgresql11-server is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925292" version="1" comment="postgresql11-server-devel is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925293" version="1" comment="postgresql11-test is &lt;11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925294" version="1" comment="postgresql12 is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925295" version="1" comment="postgresql12-contrib is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925296" version="1" comment="postgresql12-devel is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925297" version="1" comment="postgresql12-docs is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925298" version="1" comment="postgresql12-llvmjit is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925299" version="1" comment="postgresql12-llvmjit-devel is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925300" version="1" comment="postgresql12-plperl is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925301" version="1" comment="postgresql12-plpython is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925302" version="1" comment="postgresql12-pltcl is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925303" version="1" comment="postgresql12-server is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925304" version="1" comment="postgresql12-server-devel is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925305" version="1" comment="postgresql12-test is &lt;12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925306" version="1" comment="postgresql13 is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925307" version="1" comment="postgresql13-contrib is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925308" version="1" comment="postgresql13-devel is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925309" version="1" comment="postgresql13-docs is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925310" version="1" comment="postgresql13-llvmjit is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925311" version="1" comment="postgresql13-llvmjit-devel is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925312" version="1" comment="postgresql13-plperl is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925313" version="1" comment="postgresql13-plpython is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925314" version="1" comment="postgresql13-pltcl is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925315" version="1" comment="postgresql13-server is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925316" version="1" comment="postgresql13-server-devel is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925317" version="1" comment="postgresql13-test is &lt;13.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925318" version="1" comment="cryptctl is &lt;2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925319" version="1" comment="libmatio-devel is &lt;1.5.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925320" version="1" comment="libmatio11 is &lt;1.5.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925321" version="1" comment="matio-tools is &lt;1.5.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925322" version="1" comment="plantuml is &lt;1.2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925323" version="1" comment="plantuml-javadoc is &lt;1.2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925324" version="1" comment="bind is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925325" version="1" comment="bind-doc is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925326" version="1" comment="bind-modules-bdbhpt is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925327" version="1" comment="bind-modules-generic is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925328" version="1" comment="bind-modules-ldap is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925329" version="1" comment="bind-modules-mysql is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925330" version="1" comment="bind-modules-perl is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925331" version="1" comment="bind-modules-sqlite3 is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925332" version="1" comment="bind-utils is &lt;9.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925333" version="1" comment="librecad is &lt;2.2.0~rc3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925334" version="1" comment="librecad-parts is &lt;2.2.0~rc3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925335" version="1" comment="libredwg-devel is &lt;0.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925336" version="1" comment="libredwg-tools is &lt;0.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925337" version="1" comment="libredwg0 is &lt;0.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925338" version="1" comment="libxls-devel is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925339" version="1" comment="libxls-tools is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925340" version="1" comment="libxlsreader8 is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925341" version="1" comment="ruby3.1-rubygem-nokogiri is &lt;1.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925342" version="1" comment="libvarnishapi3 is &lt;7.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925343" version="1" comment="varnish is &lt;7.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925344" version="1" comment="varnish-devel is &lt;7.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925345" version="1" comment="cifs-utils is &lt;6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925346" version="1" comment="cifs-utils-devel is &lt;6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925347" version="1" comment="pam_cifscreds is &lt;6.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925348" version="1" comment="kernel-firmware is &lt;20220516-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925349" version="1" comment="ucode-amd is &lt;20220516-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925350" version="1" comment="python311 is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925351" version="1" comment="python311-32bit is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925352" version="1" comment="python311-curses is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925353" version="1" comment="python311-dbm is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925354" version="1" comment="python311-idle is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925355" version="1" comment="python311-tk is &lt;3.11.0b1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925356" version="1" comment="autotrace is &lt;0.31.1-645.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925357" version="1" comment="autotrace-devel is &lt;0.31.1-645.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925358" version="1" comment="libautotrace3 is &lt;0.31.1-645.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925359" version="1" comment="mujs is &lt;1.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925360" version="1" comment="mujs-devel is &lt;1.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925361" version="1" comment="gimp is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925362" version="1" comment="gimp-devel is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925363" version="1" comment="gimp-lang is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925364" version="1" comment="gimp-plugin-aa is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925365" version="1" comment="gimp-plugins-python is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925366" version="1" comment="libgimp-2_0-0 is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925367" version="1" comment="libgimp-2_0-0-32bit is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925368" version="1" comment="libgimpui-2_0-0 is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925369" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.10.30-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925370" version="1" comment="nodejs-electron is &lt;17.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925371" version="1" comment="nodejs-electron-devel is &lt;17.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925372" version="1" comment="python310-Django is &lt;4.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925373" version="1" comment="python38-Django is &lt;4.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925374" version="1" comment="python39-Django is &lt;4.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925375" version="1" comment="MozillaFirefox is &lt;100.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925376" version="1" comment="MozillaFirefox-branding-upstream is &lt;100.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925377" version="1" comment="MozillaFirefox-devel is &lt;100.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925378" version="1" comment="MozillaFirefox-translations-common is &lt;100.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925379" version="1" comment="MozillaFirefox-translations-other is &lt;100.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925380" version="1" comment="jackson-databind is &lt;2.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925381" version="1" comment="jackson-databind-javadoc is &lt;2.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925382" version="1" comment="python39 is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925383" version="1" comment="python39-32bit is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925384" version="1" comment="python39-curses is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925385" version="1" comment="python39-dbm is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925386" version="1" comment="python39-idle is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925387" version="1" comment="python39-tk is &lt;3.9.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925388" version="1" comment="MozillaThunderbird is &lt;91.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925389" version="1" comment="MozillaThunderbird-translations-common is &lt;91.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925390" version="1" comment="MozillaThunderbird-translations-other is &lt;91.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925391" version="1" comment="apache-commons-io is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925392" version="1" comment="apache-commons-io-javadoc is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925393" version="1" comment="jackson-annotations is &lt;2.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925394" version="1" comment="jackson-annotations-javadoc is &lt;2.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925395" version="1" comment="jackson-core is &lt;2.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925396" version="1" comment="jackson-core-javadoc is &lt;2.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925397" version="1" comment="trivy is &lt;0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925398" version="1" comment="tomcat is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925399" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925400" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925401" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925402" version="1" comment="tomcat-embed is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925403" version="1" comment="tomcat-javadoc is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925404" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925405" version="1" comment="tomcat-jsvc is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925406" version="1" comment="tomcat-lib is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925407" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925408" version="1" comment="tomcat-webapps is &lt;9.0.43-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925409" version="1" comment="keylime-agent is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925410" version="1" comment="keylime-config is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925411" version="1" comment="keylime-firewalld is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925412" version="1" comment="keylime-registrar is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925413" version="1" comment="keylime-tpm_cert_store is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925414" version="1" comment="keylime-verifier is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925415" version="1" comment="python310-keylime is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925416" version="1" comment="python38-keylime is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925417" version="1" comment="python39-keylime is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925418" version="1" comment="neomutt is &lt;20220429-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925419" version="1" comment="neomutt-doc is &lt;20220429-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925420" version="1" comment="neomutt-lang is &lt;20220429-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925421" version="1" comment="python310-ujson is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925422" version="1" comment="python38-ujson is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925423" version="1" comment="python39-ujson is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925424" version="1" comment="testng is &lt;7.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925425" version="1" comment="testng-javadoc is &lt;7.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925426" version="1" comment="logrotate is &lt;3.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925427" version="1" comment="chromedriver is &lt;102.0.5005.61-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925428" version="1" comment="chromium is &lt;102.0.5005.61-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925429" version="1" comment="dpkg is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925430" version="1" comment="dpkg-devel is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925431" version="1" comment="dpkg-lang is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925432" version="1" comment="python310-Pillow is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925433" version="1" comment="python310-Pillow-tk is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925434" version="1" comment="python38-Pillow is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925435" version="1" comment="python38-Pillow-tk is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925436" version="1" comment="python39-Pillow is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925437" version="1" comment="python39-Pillow-tk is &lt;9.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925438" version="1" comment="libpainter0 is &lt;0.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925439" version="1" comment="librfxencode0 is &lt;0.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925440" version="1" comment="xrdp is &lt;0.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925441" version="1" comment="xrdp-devel is &lt;0.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925442" version="1" comment="389-ds is &lt;2.1.1~git22.faef73366-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925443" version="1" comment="389-ds-devel is &lt;2.1.1~git22.faef73366-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925444" version="1" comment="389-ds-snmp is &lt;2.1.1~git22.faef73366-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925445" version="1" comment="lib389 is &lt;2.1.1~git22.faef73366-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925446" version="1" comment="libsvrcore0 is &lt;2.1.1~git22.faef73366-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925447" version="1" comment="afterburn is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925448" version="1" comment="afterburn-dracut is &lt;5.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925449" version="1" comment="libntfs-3g-devel is &lt;2022.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925450" version="1" comment="libntfs-3g89 is &lt;2022.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925451" version="1" comment="ntfs-3g is &lt;2022.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925452" version="1" comment="ntfsprogs is &lt;2022.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925453" version="1" comment="ntfsprogs-extra is &lt;2022.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925454" version="1" comment="tensorflow-lite is &lt;2.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925455" version="1" comment="tensorflow-lite-devel is &lt;2.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925456" version="1" comment="MozillaThunderbird is &lt;91.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925457" version="1" comment="MozillaThunderbird-translations-common is &lt;91.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925458" version="1" comment="MozillaThunderbird-translations-other is &lt;91.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925459" version="1" comment="libmodsecurity3 is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925460" version="1" comment="libmodsecurity3-32bit is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925461" version="1" comment="modsecurity is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925462" version="1" comment="modsecurity-devel is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925463" version="1" comment="ruby3.1-rubygem-rack is &lt;2.2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925465" version="1" comment="kernel-macros is &lt;5.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925466" version="1" comment="kernel-source is &lt;5.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925467" version="1" comment="kernel-source-vanilla is &lt;5.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925468" version="1" comment="MozillaFirefox is &lt;101.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925469" version="1" comment="MozillaFirefox-branding-upstream is &lt;101.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925470" version="1" comment="MozillaFirefox-devel is &lt;101.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925471" version="1" comment="MozillaFirefox-translations-common is &lt;101.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925472" version="1" comment="MozillaFirefox-translations-other is &lt;101.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925473" version="1" comment="cups is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925474" version="1" comment="cups-client is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925475" version="1" comment="cups-config is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925476" version="1" comment="cups-ddk is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925477" version="1" comment="cups-devel is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925478" version="1" comment="cups-devel-32bit is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925479" version="1" comment="libcups2 is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925480" version="1" comment="libcups2-32bit is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925481" version="1" comment="libcupsimage2 is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925482" version="1" comment="libcupsimage2-32bit is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925483" version="1" comment="go1.17 is &lt;1.17.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925484" version="1" comment="go1.17-doc is &lt;1.17.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925485" version="1" comment="go1.17-race is &lt;1.17.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925486" version="1" comment="go1.18 is &lt;1.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925487" version="1" comment="go1.18-doc is &lt;1.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925488" version="1" comment="go1.18-race is &lt;1.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925489" version="1" comment="liblouis-data is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925490" version="1" comment="liblouis-devel is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925491" version="1" comment="liblouis-doc is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925492" version="1" comment="liblouis-tools is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925493" version="1" comment="liblouis20 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925494" version="1" comment="python3-louis is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925495" version="1" comment="postgresql-jdbc is &lt;42.2.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925496" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925497" version="1" comment="python310-suds is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925498" version="1" comment="python38-suds is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925499" version="1" comment="python39-suds is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925500" version="1" comment="starboard is &lt;0.15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925501" version="1" comment="bind is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925502" version="1" comment="bind-doc is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925503" version="1" comment="bind-modules-bdbhpt is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925504" version="1" comment="bind-modules-generic is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925505" version="1" comment="bind-modules-ldap is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925506" version="1" comment="bind-modules-mysql is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925507" version="1" comment="bind-modules-perl is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925508" version="1" comment="bind-modules-sqlite3 is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925509" version="1" comment="bind-utils is &lt;9.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925510" version="1" comment="containerd is &lt;1.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925511" version="1" comment="containerd-ctr is &lt;1.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925512" version="1" comment="bat is &lt;0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925513" version="1" comment="caddy is &lt;2.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925515" version="1" comment="kernel-macros is &lt;5.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925516" version="1" comment="kernel-source is &lt;5.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925517" version="1" comment="kernel-source-vanilla is &lt;5.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925518" version="1" comment="libdwarf-devel is &lt;0.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925519" version="1" comment="libdwarf-devel-static is &lt;0.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925520" version="1" comment="libdwarf-doc is &lt;0.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925521" version="1" comment="libdwarf-tools is &lt;0.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925522" version="1" comment="libdwarf0 is &lt;0.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925523" version="1" comment="distribution-registry is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925524" version="1" comment="firejail is &lt;0.9.68-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925525" version="1" comment="firejail-bash-completion is &lt;0.9.68-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925526" version="1" comment="firejail-zsh-completion is &lt;0.9.68-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925527" version="1" comment="grub2 is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925528" version="1" comment="grub2-branding-upstream is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925529" version="1" comment="grub2-i386-pc is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925530" version="1" comment="grub2-i386-pc-debug is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925531" version="1" comment="grub2-snapper-plugin is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925532" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925533" version="1" comment="grub2-x86_64-efi is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925534" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925535" version="1" comment="grub2-x86_64-xen is &lt;2.06-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925536" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925537" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925538" version="1" comment="libopenssl1_1 is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925539" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925540" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925541" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925542" version="1" comment="openssl-1_1 is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925543" version="1" comment="openssl-1_1-doc is &lt;1.1.1o-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925544" version="1" comment="python310-PyJWT is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925545" version="1" comment="python38-PyJWT is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925546" version="1" comment="python39-PyJWT is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925547" version="1" comment="libQt5Pdf5 is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925548" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925549" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925550" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925551" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925552" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925553" version="1" comment="libqt5-qtwebengine is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925554" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925555" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925556" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925557" version="1" comment="chromedriver is &lt;102.0.5005.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925558" version="1" comment="chromium is &lt;102.0.5005.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925559" version="1" comment="apache2 is &lt;2.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925560" version="1" comment="python is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925561" version="1" comment="python-32bit is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925562" version="1" comment="python-curses is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925563" version="1" comment="python-demo is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925564" version="1" comment="python-gdbm is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925565" version="1" comment="python-idle is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925566" version="1" comment="python-tk is &lt;2.7.18-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925567" version="1" comment="ruby3.1-rubygem-jquery-rails is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925568" version="1" comment="ruby3.1-rubygem-rails-html-sanitizer is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925570" version="1" comment="kernel-macros is &lt;5.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925571" version="1" comment="kernel-source is &lt;5.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925572" version="1" comment="kernel-source-vanilla is &lt;5.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925573" version="1" comment="python310-jupyter-server is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925574" version="1" comment="python310-jupyter-server-test is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925575" version="1" comment="python38-jupyter-server is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925576" version="1" comment="python38-jupyter-server-test is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925577" version="1" comment="python39-jupyter-server is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925578" version="1" comment="python39-jupyter-server-test is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925579" version="1" comment="jupyter-notebook is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925580" version="1" comment="jupyter-notebook-lang is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925581" version="1" comment="jupyter-notebook-latex is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925582" version="1" comment="python310-notebook is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925583" version="1" comment="python310-notebook-lang is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925584" version="1" comment="python38-notebook is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925585" version="1" comment="python38-notebook-lang is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925586" version="1" comment="python39-notebook is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925587" version="1" comment="python39-notebook-lang is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925588" version="1" comment="tor is &lt;0.4.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925589" version="1" comment="python39 is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925590" version="1" comment="python39-32bit is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925591" version="1" comment="python39-curses is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925592" version="1" comment="python39-dbm is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925593" version="1" comment="python39-idle is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925594" version="1" comment="python39-tk is &lt;3.9.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925595" version="1" comment="chafa is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925596" version="1" comment="chafa-devel is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925597" version="1" comment="chafa-doc is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925598" version="1" comment="libchafa0 is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925599" version="1" comment="python310 is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925600" version="1" comment="python310-32bit is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925601" version="1" comment="python310-curses is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925602" version="1" comment="python310-dbm is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925603" version="1" comment="python310-idle is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925604" version="1" comment="python310-tk is &lt;3.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925605" version="1" comment="keylime-agent is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925606" version="1" comment="keylime-config is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925607" version="1" comment="keylime-firewalld is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925608" version="1" comment="keylime-logrotate is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925609" version="1" comment="keylime-registrar is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925610" version="1" comment="keylime-tpm_cert_store is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925611" version="1" comment="keylime-verifier is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925612" version="1" comment="python310-keylime is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925613" version="1" comment="python38-keylime is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925614" version="1" comment="python39-keylime is &lt;6.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925615" version="1" comment="python3-salt is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925616" version="1" comment="salt is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925617" version="1" comment="salt-api is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925618" version="1" comment="salt-bash-completion is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925619" version="1" comment="salt-cloud is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925620" version="1" comment="salt-doc is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925621" version="1" comment="salt-fish-completion is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925622" version="1" comment="salt-master is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925623" version="1" comment="salt-minion is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925624" version="1" comment="salt-proxy is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925625" version="1" comment="salt-ssh is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925626" version="1" comment="salt-standalone-formulas-configuration is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925627" version="1" comment="salt-syndic is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925628" version="1" comment="salt-transactional-update is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925629" version="1" comment="salt-zsh-completion is &lt;3004-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925631" version="1" comment="kernel-macros is &lt;5.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925632" version="1" comment="kernel-source is &lt;5.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925633" version="1" comment="kernel-source-vanilla is &lt;5.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925634" version="1" comment="liblua5_4-5 is &lt;5.4.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925635" version="1" comment="liblua5_4-5-32bit is &lt;5.4.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925636" version="1" comment="lua54 is &lt;5.4.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925637" version="1" comment="lua54-devel is &lt;5.4.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925638" version="1" comment="lua54-doc is &lt;5.4.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925639" version="1" comment="squid is &lt;5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925640" version="1" comment="chromedriver is &lt;103.0.5060.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925641" version="1" comment="chromium is &lt;103.0.5060.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925642" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925643" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925644" version="1" comment="libopenssl1_1 is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925645" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925646" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925647" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925648" version="1" comment="openssl-1_1 is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925649" version="1" comment="openssl-1_1-doc is &lt;1.1.1p-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925650" version="1" comment="matrix-synapse is &lt;1.61.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925651" version="1" comment="MozillaThunderbird is &lt;91.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925652" version="1" comment="MozillaThunderbird-translations-common is &lt;91.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925653" version="1" comment="MozillaThunderbird-translations-other is &lt;91.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925654" version="1" comment="conmon is &lt;2.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925655" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925656" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925657" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925658" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925659" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925660" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925661" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925662" version="1" comment="guestfs-tools is &lt;1.48.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925663" version="1" comment="guestfs-tools-bash-completion is &lt;1.48.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925664" version="1" comment="guestfs-tools-man-pages-ja is &lt;1.48.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925665" version="1" comment="guestfs-tools-man-pages-uk is &lt;1.48.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925666" version="1" comment="virt-win-reg is &lt;1.48.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925667" version="1" comment="libguestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925668" version="1" comment="libguestfs-appliance is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925669" version="1" comment="libguestfs-bash-completion is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925670" version="1" comment="libguestfs-devel is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925671" version="1" comment="libguestfs-gobject-1_0 is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925672" version="1" comment="libguestfs-gobject-devel is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925673" version="1" comment="libguestfs-inspect-icons is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925674" version="1" comment="libguestfs-man-pages-ja is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925675" version="1" comment="libguestfs-man-pages-uk is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925676" version="1" comment="libguestfs-rescue is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925677" version="1" comment="libguestfs-rsync is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925678" version="1" comment="libguestfs-typelib-Guestfs-1_0 is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925679" version="1" comment="libguestfs-winsupport is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925680" version="1" comment="libguestfs-xfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925681" version="1" comment="libguestfs0 is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925682" version="1" comment="libguestfsd is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925683" version="1" comment="lua-libguestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925684" version="1" comment="ocaml-libguestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925685" version="1" comment="ocaml-libguestfs-devel is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925686" version="1" comment="perl-Sys-Guestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925687" version="1" comment="python3-libguestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925688" version="1" comment="rubygem-libguestfs is &lt;1.48.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925689" version="1" comment="virt-v2v is &lt;2.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925690" version="1" comment="virt-v2v-bash-completion is &lt;2.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925691" version="1" comment="virt-v2v-man-pages-ja is &lt;2.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925692" version="1" comment="virt-v2v-man-pages-uk is &lt;2.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925693" version="1" comment="liblua5_4-5 is &lt;5.4.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925694" version="1" comment="liblua5_4-5-32bit is &lt;5.4.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925695" version="1" comment="lua54 is &lt;5.4.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925696" version="1" comment="lua54-devel is &lt;5.4.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925697" version="1" comment="lua54-doc is &lt;5.4.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925698" version="1" comment="harfbuzz-devel is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925699" version="1" comment="harfbuzz-tools is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925700" version="1" comment="libharfbuzz-gobject0 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925701" version="1" comment="libharfbuzz-gobject0-32bit is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925702" version="1" comment="libharfbuzz-icu0 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925703" version="1" comment="libharfbuzz-icu0-32bit is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925704" version="1" comment="libharfbuzz-subset0 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925705" version="1" comment="libharfbuzz-subset0-32bit is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925706" version="1" comment="libharfbuzz0 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925707" version="1" comment="libharfbuzz0-32bit is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925708" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925709" version="1" comment="nodejs-electron is &lt;19.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925710" version="1" comment="nodejs-electron-devel is &lt;19.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925711" version="1" comment="gvim is &lt;9.0.0032-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925712" version="1" comment="vim is &lt;9.0.0032-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925713" version="1" comment="vim-data is &lt;9.0.0032-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925714" version="1" comment="vim-data-common is &lt;9.0.0032-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925715" version="1" comment="vim-small is &lt;9.0.0032-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925716" version="1" comment="librttopo-devel is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925717" version="1" comment="librttopo1 is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925718" version="1" comment="python310-Django is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925719" version="1" comment="python38-Django is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925720" version="1" comment="python39-Django is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925721" version="1" comment="radare2 is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925722" version="1" comment="radare2-devel is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925723" version="1" comment="radare2-zsh-completion is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925724" version="1" comment="libsnmp40 is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925725" version="1" comment="libsnmp40-32bit is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925726" version="1" comment="net-snmp is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925727" version="1" comment="net-snmp-devel is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925728" version="1" comment="net-snmp-devel-32bit is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925729" version="1" comment="perl-SNMP is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925730" version="1" comment="python310-net-snmp is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925731" version="1" comment="python38-net-snmp is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925732" version="1" comment="python39-net-snmp is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925733" version="1" comment="snmp-mibs is &lt;5.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925734" version="1" comment="libprotobuf-c-devel is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925735" version="1" comment="libprotobuf-c1 is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925736" version="1" comment="libtiff-devel is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925737" version="1" comment="libtiff-devel-32bit is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925738" version="1" comment="libtiff5 is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925739" version="1" comment="libtiff5-32bit is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925740" version="1" comment="tiff is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925741" version="1" comment="libSDL2_ttf-2_0-0 is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925742" version="1" comment="libSDL2_ttf-devel is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925743" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925744" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925745" version="1" comment="libopenssl10 is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925746" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925747" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925748" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925749" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925750" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925751" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925752" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925753" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925754" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925755" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925756" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925757" version="1" comment="libopenssl1_1 is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925758" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925759" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925760" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925761" version="1" comment="openssl-1_1 is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925762" version="1" comment="openssl-1_1-doc is &lt;1.1.1q-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925763" version="1" comment="chromedriver is &lt;103.0.5060.114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925764" version="1" comment="chromium is &lt;103.0.5060.114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925766" version="1" comment="kernel-macros is &lt;5.18.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925767" version="1" comment="kernel-source is &lt;5.18.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925768" version="1" comment="kernel-source-vanilla is &lt;5.18.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925769" version="1" comment="jetty-annotations is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925770" version="1" comment="jetty-ant is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925771" version="1" comment="jetty-cdi is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925772" version="1" comment="jetty-client is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925773" version="1" comment="jetty-continuation is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925774" version="1" comment="jetty-deploy is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925775" version="1" comment="jetty-fcgi is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925776" version="1" comment="jetty-http is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925777" version="1" comment="jetty-http-spi is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925778" version="1" comment="jetty-io is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925779" version="1" comment="jetty-jaas is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925780" version="1" comment="jetty-jmx is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925781" version="1" comment="jetty-jndi is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925782" version="1" comment="jetty-jsp is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925783" version="1" comment="jetty-minimal-javadoc is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925784" version="1" comment="jetty-openid is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925785" version="1" comment="jetty-plus is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925786" version="1" comment="jetty-proxy is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925787" version="1" comment="jetty-quickstart is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925788" version="1" comment="jetty-rewrite is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925789" version="1" comment="jetty-security is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925790" version="1" comment="jetty-server is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925791" version="1" comment="jetty-servlet is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925792" version="1" comment="jetty-servlets is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925793" version="1" comment="jetty-start is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925794" version="1" comment="jetty-util is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925795" version="1" comment="jetty-util-ajax is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925796" version="1" comment="jetty-webapp is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925797" version="1" comment="jetty-xml is &lt;9.4.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925798" version="1" comment="python310-ujson is &lt;5.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925799" version="1" comment="python38-ujson is &lt;5.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925800" version="1" comment="python39-ujson is &lt;5.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925801" version="1" comment="MozillaFirefox is &lt;102.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925802" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925803" version="1" comment="MozillaFirefox-devel is &lt;102.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925804" version="1" comment="MozillaFirefox-translations-common is &lt;102.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925805" version="1" comment="MozillaFirefox-translations-other is &lt;102.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925806" version="1" comment="java-11-openj9 is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925807" version="1" comment="java-11-openj9-accessibility is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925808" version="1" comment="java-11-openj9-demo is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925809" version="1" comment="java-11-openj9-devel is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925810" version="1" comment="java-11-openj9-headless is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925811" version="1" comment="java-11-openj9-javadoc is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925812" version="1" comment="java-11-openj9-jmods is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925813" version="1" comment="java-11-openj9-src is &lt;11.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925814" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925815" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925816" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925817" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925818" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925819" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925820" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.332-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925821" version="1" comment="xorg-x11-server is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925822" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925823" version="1" comment="xorg-x11-server-extra is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925824" version="1" comment="xorg-x11-server-sdk is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925825" version="1" comment="xorg-x11-server-source is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925826" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925827" version="1" comment="git is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925828" version="1" comment="git-arch is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925829" version="1" comment="git-core is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925830" version="1" comment="git-credential-gnome-keyring is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925831" version="1" comment="git-credential-libsecret is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925832" version="1" comment="git-cvs is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925833" version="1" comment="git-daemon is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925834" version="1" comment="git-doc is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925835" version="1" comment="git-email is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925836" version="1" comment="git-gui is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925837" version="1" comment="git-p4 is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925838" version="1" comment="git-svn is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925839" version="1" comment="git-web is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925840" version="1" comment="gitk is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925841" version="1" comment="perl-Git is &lt;2.37.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925842" version="1" comment="go1.17 is &lt;1.17.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925843" version="1" comment="go1.17-doc is &lt;1.17.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925844" version="1" comment="go1.17-race is &lt;1.17.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925845" version="1" comment="go1.18 is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925846" version="1" comment="go1.18-doc is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925847" version="1" comment="go1.18-race is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925848" version="1" comment="phpMyAdmin is &lt;5.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925849" version="1" comment="phpMyAdmin-apache is &lt;5.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925850" version="1" comment="phpMyAdmin-lang is &lt;5.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925851" version="1" comment="python-M2Crypto-doc is &lt;0.38.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925852" version="1" comment="python310-M2Crypto is &lt;0.38.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925853" version="1" comment="python38-M2Crypto is &lt;0.38.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925854" version="1" comment="python39-M2Crypto is &lt;0.38.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925856" version="1" comment="kernel-macros is &lt;5.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925857" version="1" comment="kernel-source is &lt;5.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925858" version="1" comment="kernel-source-vanilla is &lt;5.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925859" version="1" comment="phpPgAdmin is &lt;7.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925860" version="1" comment="phpPgAdmin-apache is &lt;7.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925861" version="1" comment="ceph is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925862" version="1" comment="ceph-base is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925863" version="1" comment="ceph-common is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925864" version="1" comment="ceph-fuse is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925865" version="1" comment="ceph-grafana-dashboards is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925866" version="1" comment="ceph-immutable-object-cache is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925867" version="1" comment="ceph-mds is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925868" version="1" comment="ceph-mgr is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925869" version="1" comment="ceph-mgr-cephadm is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925870" version="1" comment="ceph-mgr-dashboard is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925871" version="1" comment="ceph-mgr-diskprediction-local is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925872" version="1" comment="ceph-mgr-k8sevents is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925873" version="1" comment="ceph-mgr-modules-core is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925874" version="1" comment="ceph-mgr-rook is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925875" version="1" comment="ceph-mon is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925876" version="1" comment="ceph-osd is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925877" version="1" comment="ceph-prometheus-alerts is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925878" version="1" comment="ceph-radosgw is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925879" version="1" comment="cephadm is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925880" version="1" comment="cephfs-mirror is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925881" version="1" comment="cephfs-shell is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925882" version="1" comment="cephfs-top is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925883" version="1" comment="libcephfs-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925884" version="1" comment="libcephfs2 is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925885" version="1" comment="libcephsqlite is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925886" version="1" comment="libcephsqlite-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925887" version="1" comment="librados-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925888" version="1" comment="librados2 is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925889" version="1" comment="libradospp-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925890" version="1" comment="librbd-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925891" version="1" comment="librbd1 is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925892" version="1" comment="librgw-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925893" version="1" comment="librgw2 is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925894" version="1" comment="python3-ceph-argparse is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925895" version="1" comment="python3-ceph-common is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925896" version="1" comment="python3-cephfs is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925897" version="1" comment="python3-rados is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925898" version="1" comment="python3-rbd is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925899" version="1" comment="python3-rgw is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925900" version="1" comment="rados-objclass-devel is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925901" version="1" comment="rbd-fuse is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925902" version="1" comment="rbd-mirror is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925903" version="1" comment="rbd-nbd is &lt;16.2.9.536+g41a9f9a5573-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925904" version="1" comment="stunnel is &lt;5.65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925905" version="1" comment="stunnel-doc is &lt;5.65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925906" version="1" comment="cereal-devel is &lt;1.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925907" version="1" comment="chromedriver is &lt;103.0.5060.134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925908" version="1" comment="chromium is &lt;103.0.5060.134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925909" version="1" comment="corepack16 is &lt;16.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925910" version="1" comment="nodejs16 is &lt;16.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925911" version="1" comment="nodejs16-devel is &lt;16.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925912" version="1" comment="nodejs16-docs is &lt;16.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925913" version="1" comment="npm16 is &lt;16.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925914" version="1" comment="pyenv is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925915" version="1" comment="pyenv-bash-completion is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925916" version="1" comment="pyenv-fish-completion is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925917" version="1" comment="pyenv-zsh-completion is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925918" version="1" comment="java-13-openjdk is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925919" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925920" version="1" comment="java-13-openjdk-demo is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925921" version="1" comment="java-13-openjdk-devel is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925922" version="1" comment="java-13-openjdk-headless is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925923" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925924" version="1" comment="java-13-openjdk-jmods is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925925" version="1" comment="java-13-openjdk-src is &lt;13.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925926" version="1" comment="java-15-openjdk is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925927" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925928" version="1" comment="java-15-openjdk-demo is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925929" version="1" comment="java-15-openjdk-devel is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925930" version="1" comment="java-15-openjdk-headless is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925931" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925932" version="1" comment="java-15-openjdk-jmods is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925933" version="1" comment="java-15-openjdk-src is &lt;15.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925934" version="1" comment="java-18-openjdk is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925935" version="1" comment="java-18-openjdk-accessibility is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925936" version="1" comment="java-18-openjdk-demo is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925937" version="1" comment="java-18-openjdk-devel is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925938" version="1" comment="java-18-openjdk-headless is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925939" version="1" comment="java-18-openjdk-javadoc is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925940" version="1" comment="java-18-openjdk-jmods is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925941" version="1" comment="java-18-openjdk-src is &lt;18.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925942" version="1" comment="libopenssl-3-devel is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925943" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925944" version="1" comment="libopenssl3 is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925945" version="1" comment="libopenssl3-32bit is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925946" version="1" comment="openssl-3 is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925947" version="1" comment="openssl-3-doc is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925948" version="1" comment="trivy is &lt;0.30.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925949" version="1" comment="cri-o is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925950" version="1" comment="cri-o-kubeadm-criconfig is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925951" version="1" comment="java-11-openjdk is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925952" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925953" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925954" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925955" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925956" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925957" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925958" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925959" version="1" comment="java-17-openjdk is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925960" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925961" version="1" comment="java-17-openjdk-demo is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925962" version="1" comment="java-17-openjdk-devel is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925963" version="1" comment="java-17-openjdk-headless is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925964" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925965" version="1" comment="java-17-openjdk-jmods is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925966" version="1" comment="java-17-openjdk-src is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925967" version="1" comment="qemu is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925968" version="1" comment="qemu-SLOF is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925969" version="1" comment="qemu-accel-qtest is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925970" version="1" comment="qemu-accel-tcg-x86 is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925971" version="1" comment="qemu-arm is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925972" version="1" comment="qemu-audio-alsa is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925973" version="1" comment="qemu-audio-dbus is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925974" version="1" comment="qemu-audio-jack is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925975" version="1" comment="qemu-audio-oss is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925976" version="1" comment="qemu-audio-pa is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925977" version="1" comment="qemu-audio-spice is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925978" version="1" comment="qemu-block-curl is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925979" version="1" comment="qemu-block-dmg is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925980" version="1" comment="qemu-block-gluster is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925981" version="1" comment="qemu-block-iscsi is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925982" version="1" comment="qemu-block-nfs is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925983" version="1" comment="qemu-block-rbd is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925984" version="1" comment="qemu-block-ssh is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925985" version="1" comment="qemu-chardev-baum is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925986" version="1" comment="qemu-chardev-spice is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925987" version="1" comment="qemu-extra is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925988" version="1" comment="qemu-guest-agent is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925989" version="1" comment="qemu-hw-display-qxl is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925990" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925991" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925992" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925993" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925994" version="1" comment="qemu-hw-usb-host is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925995" version="1" comment="qemu-hw-usb-redirect is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925996" version="1" comment="qemu-hw-usb-smartcard is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925997" version="1" comment="qemu-ipxe is &lt;1.0.0+-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925998" version="1" comment="qemu-ivshmem-tools is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009925999" version="1" comment="qemu-ksm is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926000" version="1" comment="qemu-kvm is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926001" version="1" comment="qemu-lang is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926002" version="1" comment="qemu-microvm is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926003" version="1" comment="qemu-ppc is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926004" version="1" comment="qemu-s390x is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926005" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926006" version="1" comment="qemu-sgabios is &lt;8-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926007" version="1" comment="qemu-skiboot is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926008" version="1" comment="qemu-tools is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926009" version="1" comment="qemu-ui-curses is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926010" version="1" comment="qemu-ui-dbus is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926011" version="1" comment="qemu-ui-gtk is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926012" version="1" comment="qemu-ui-opengl is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926013" version="1" comment="qemu-ui-spice-app is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926014" version="1" comment="qemu-ui-spice-core is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926015" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926016" version="1" comment="qemu-vhost-user-gpu is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926017" version="1" comment="qemu-x86 is &lt;7.0.0-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926018" version="1" comment="libsqlite3-0 is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926019" version="1" comment="libsqlite3-0-32bit is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926020" version="1" comment="sqlite3 is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926021" version="1" comment="sqlite3-devel is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926022" version="1" comment="sqlite3-doc is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926023" version="1" comment="sqlite3-tcl is &lt;3.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926024" version="1" comment="python3-virtualbox is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926025" version="1" comment="virtualbox is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926026" version="1" comment="virtualbox-devel is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926027" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926028" version="1" comment="virtualbox-guest-source is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926029" version="1" comment="virtualbox-guest-tools is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926030" version="1" comment="virtualbox-guest-x11 is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926031" version="1" comment="virtualbox-host-source is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926032" version="1" comment="virtualbox-qt is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926033" version="1" comment="virtualbox-vnc is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926034" version="1" comment="virtualbox-websrv is &lt;6.1.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926035" version="1" comment="zabbix-agent is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926036" version="1" comment="zabbix-java-gateway is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926037" version="1" comment="zabbix-phpfrontend is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926038" version="1" comment="zabbix-proxy is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926039" version="1" comment="zabbix-proxy-mysql is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926040" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926041" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926042" version="1" comment="zabbix-server is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926043" version="1" comment="zabbix-server-mysql is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926044" version="1" comment="zabbix-server-postgresql is &lt;4.0.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926045" version="1" comment="gvim is &lt;9.0.0032-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926046" version="1" comment="vim is &lt;9.0.0032-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926047" version="1" comment="vim-data is &lt;9.0.0032-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926048" version="1" comment="vim-data-common is &lt;9.0.0032-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926049" version="1" comment="vim-small is &lt;9.0.0032-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926050" version="1" comment="curl is &lt;7.84.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926051" version="1" comment="libcurl-devel is &lt;7.84.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926052" version="1" comment="libcurl-devel-32bit is &lt;7.84.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926053" version="1" comment="libcurl4 is &lt;7.84.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926054" version="1" comment="libcurl4-32bit is &lt;7.84.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926055" version="1" comment="dirmngr is &lt;2.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926056" version="1" comment="gpg2 is &lt;2.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926057" version="1" comment="gpg2-lang is &lt;2.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926058" version="1" comment="gpg2-tpm is &lt;2.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926059" version="1" comment="perl-HTTP-Daemon is &lt;6.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926060" version="1" comment="redis is &lt;7.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926061" version="1" comment="php8 is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926062" version="1" comment="php8-bcmath is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926063" version="1" comment="php8-bz2 is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926064" version="1" comment="php8-calendar is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926065" version="1" comment="php8-cli is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926066" version="1" comment="php8-ctype is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926067" version="1" comment="php8-curl is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926068" version="1" comment="php8-dba is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926069" version="1" comment="php8-devel is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926070" version="1" comment="php8-dom is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926071" version="1" comment="php8-enchant is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926072" version="1" comment="php8-exif is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926073" version="1" comment="php8-ffi is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926074" version="1" comment="php8-fileinfo is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926075" version="1" comment="php8-ftp is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926076" version="1" comment="php8-gd is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926077" version="1" comment="php8-gettext is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926078" version="1" comment="php8-gmp is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926079" version="1" comment="php8-iconv is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926080" version="1" comment="php8-intl is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926081" version="1" comment="php8-ldap is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926082" version="1" comment="php8-mbstring is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926083" version="1" comment="php8-mysql is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926084" version="1" comment="php8-odbc is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926085" version="1" comment="php8-opcache is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926086" version="1" comment="php8-openssl is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926087" version="1" comment="php8-pcntl is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926088" version="1" comment="php8-pdo is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926089" version="1" comment="php8-pgsql is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926090" version="1" comment="php8-phar is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926091" version="1" comment="php8-posix is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926092" version="1" comment="php8-readline is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926093" version="1" comment="php8-shmop is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926094" version="1" comment="php8-snmp is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926095" version="1" comment="php8-soap is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926096" version="1" comment="php8-sockets is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926097" version="1" comment="php8-sodium is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926098" version="1" comment="php8-sqlite is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926099" version="1" comment="php8-sysvmsg is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926100" version="1" comment="php8-sysvsem is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926101" version="1" comment="php8-sysvshm is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926102" version="1" comment="php8-tidy is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926103" version="1" comment="php8-tokenizer is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926104" version="1" comment="php8-xmlreader is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926105" version="1" comment="php8-xmlwriter is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926106" version="1" comment="php8-xsl is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926107" version="1" comment="php8-zip is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926108" version="1" comment="php8-zlib is &lt;8.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926109" version="1" comment="xen is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926110" version="1" comment="xen-devel is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926111" version="1" comment="xen-doc-html is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926112" version="1" comment="xen-libs is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926113" version="1" comment="xen-libs-32bit is &lt;4.16.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926114" version="1" comment="xen-tools is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926115" version="1" comment="xen-tools-domU is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926116" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.16.1_02-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926117" version="1" comment="caddy is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926118" version="1" comment="connman is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926119" version="1" comment="connman-client is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926120" version="1" comment="connman-devel is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926121" version="1" comment="connman-doc is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926122" version="1" comment="connman-nmcompat is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926123" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926124" version="1" comment="connman-plugin-iospm is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926125" version="1" comment="connman-plugin-l2tp is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926126" version="1" comment="connman-plugin-openconnect is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926127" version="1" comment="connman-plugin-openvpn is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926128" version="1" comment="connman-plugin-polkit is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926129" version="1" comment="connman-plugin-pptp is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926130" version="1" comment="connman-plugin-tist is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926131" version="1" comment="connman-plugin-vpnc is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926132" version="1" comment="connman-plugin-wireguard is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926133" version="1" comment="connman-test is &lt;1.41-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926134" version="1" comment="gdk-pixbuf-devel is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926135" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926136" version="1" comment="gdk-pixbuf-lang is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926137" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926138" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926139" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926140" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926141" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926142" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926143" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926144" version="1" comment="git-annex is &lt;10.20220624-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926145" version="1" comment="git-annex-bash-completion is &lt;10.20220624-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926146" version="1" comment="maven is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926147" version="1" comment="maven-javadoc is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926148" version="1" comment="maven-lib is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926149" version="1" comment="libnss_slurm2 is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926150" version="1" comment="libpmi0 is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926151" version="1" comment="libslurm38 is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926152" version="1" comment="perl-slurm is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926153" version="1" comment="slurm is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926154" version="1" comment="slurm-auth-none is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926155" version="1" comment="slurm-config is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926156" version="1" comment="slurm-config-man is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926157" version="1" comment="slurm-cray is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926158" version="1" comment="slurm-devel is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926159" version="1" comment="slurm-doc is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926160" version="1" comment="slurm-hdf5 is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926161" version="1" comment="slurm-lua is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926162" version="1" comment="slurm-munge is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926163" version="1" comment="slurm-node is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926164" version="1" comment="slurm-openlava is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926165" version="1" comment="slurm-pam_slurm is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926166" version="1" comment="slurm-plugins is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926167" version="1" comment="slurm-rest is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926168" version="1" comment="slurm-seff is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926169" version="1" comment="slurm-sjstat is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926170" version="1" comment="slurm-slurmdbd is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926171" version="1" comment="slurm-sql is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926172" version="1" comment="slurm-sview is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926173" version="1" comment="slurm-testsuite is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926174" version="1" comment="slurm-torque is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926175" version="1" comment="slurm-webdoc is &lt;22.05.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926176" version="1" comment="libtiff-devel is &lt;4.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926177" version="1" comment="libtiff-devel-32bit is &lt;4.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926178" version="1" comment="libtiff5 is &lt;4.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926179" version="1" comment="libtiff5-32bit is &lt;4.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926180" version="1" comment="tiff is &lt;4.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926181" version="1" comment="MozillaFirefox is &lt;103.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926182" version="1" comment="MozillaFirefox-branding-upstream is &lt;103.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926183" version="1" comment="MozillaFirefox-devel is &lt;103.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926184" version="1" comment="MozillaFirefox-translations-common is &lt;103.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926185" version="1" comment="MozillaFirefox-translations-other is &lt;103.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926186" version="1" comment="MozillaThunderbird is &lt;102.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926187" version="1" comment="MozillaThunderbird-translations-common is &lt;102.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926188" version="1" comment="MozillaThunderbird-translations-other is &lt;102.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926189" version="1" comment="go1.17 is &lt;1.17.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926190" version="1" comment="go1.17-doc is &lt;1.17.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926191" version="1" comment="go1.17-race is &lt;1.17.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926192" version="1" comment="go1.18 is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926193" version="1" comment="go1.18-doc is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926194" version="1" comment="go1.18-race is &lt;1.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926195" version="1" comment="logcli is &lt;2.6.1+git.1658128747.6bd05c9a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926196" version="1" comment="loki is &lt;2.6.1+git.1658128747.6bd05c9a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926197" version="1" comment="promtail is &lt;2.6.1+git.1658128747.6bd05c9a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926198" version="1" comment="rsync is &lt;3.2.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926199" version="1" comment="gnutls is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926200" version="1" comment="gnutls-guile is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926201" version="1" comment="libgnutls-dane-devel is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926202" version="1" comment="libgnutls-dane0 is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926203" version="1" comment="libgnutls-devel is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926204" version="1" comment="libgnutls-devel-32bit is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926205" version="1" comment="libgnutls30 is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926206" version="1" comment="libgnutls30-32bit is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926207" version="1" comment="libgnutls30-hmac is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926208" version="1" comment="libgnutlsxx-devel is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926209" version="1" comment="libgnutlsxx30 is &lt;3.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926210" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926211" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926212" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926213" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926214" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926215" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926216" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926217" version="1" comment="libunbound8 is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926218" version="1" comment="python3-unbound is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926219" version="1" comment="unbound is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926220" version="1" comment="unbound-anchor is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926221" version="1" comment="unbound-devel is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926222" version="1" comment="unbound-munin is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926223" version="1" comment="python310-Django is &lt;4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926224" version="1" comment="python38-Django is &lt;4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926225" version="1" comment="python39-Django is &lt;4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926226" version="1" comment="python310-httptools is &lt;0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926227" version="1" comment="python38-httptools is &lt;0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926228" version="1" comment="python39-httptools is &lt;0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926229" version="1" comment="tuigreet is &lt;0.7.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926230" version="1" comment="wayshot is &lt;1.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926231" version="1" comment="cosign is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926232" version="1" comment="ldb-tools is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926233" version="1" comment="libldb-devel is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926234" version="1" comment="libldb2 is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926235" version="1" comment="libldb2-32bit is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926236" version="1" comment="python3-ldb is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926237" version="1" comment="python3-ldb-32bit is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926238" version="1" comment="python3-ldb-devel is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926239" version="1" comment="libostree is &lt;2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926240" version="1" comment="libostree-1-1 is &lt;2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926241" version="1" comment="libostree-devel is &lt;2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926242" version="1" comment="libostree-grub2 is &lt;2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926243" version="1" comment="typelib-1_0-OSTree-1_0 is &lt;2022.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926244" version="1" comment="ctdb is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926245" version="1" comment="ctdb-pcp-pmda is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926246" version="1" comment="libsamba-policy-devel is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926247" version="1" comment="libsamba-policy-python3-devel is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926248" version="1" comment="libsamba-policy0-python3 is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926249" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926250" version="1" comment="samba is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926251" version="1" comment="samba-ad-dc is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926252" version="1" comment="samba-ad-dc-libs is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926253" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926254" version="1" comment="samba-ceph is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926255" version="1" comment="samba-client is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926256" version="1" comment="samba-client-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926257" version="1" comment="samba-client-libs is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926258" version="1" comment="samba-client-libs-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926259" version="1" comment="samba-devel is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926260" version="1" comment="samba-devel-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926261" version="1" comment="samba-doc is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926262" version="1" comment="samba-dsdb-modules is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926263" version="1" comment="samba-gpupdate is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926264" version="1" comment="samba-ldb-ldap is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926265" version="1" comment="samba-libs is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926266" version="1" comment="samba-libs-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926267" version="1" comment="samba-libs-python3 is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926268" version="1" comment="samba-libs-python3-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926269" version="1" comment="samba-python3 is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926270" version="1" comment="samba-test is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926271" version="1" comment="samba-tool is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926272" version="1" comment="samba-winbind is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926273" version="1" comment="samba-winbind-libs is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926274" version="1" comment="samba-winbind-libs-32bit is &lt;4.16.4+git.297.1497eb221ed-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926275" version="1" comment="ruby3.1-rubygem-activerecord-7.0 is &lt;7.0.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926276" version="1" comment="librpmbuild9 is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926277" version="1" comment="rpm is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926278" version="1" comment="rpm-32bit is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926279" version="1" comment="rpm-build is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926280" version="1" comment="rpm-build-perl is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926281" version="1" comment="rpm-devel is &lt;4.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926282" version="1" comment="budgie-control-center is &lt;1.1.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926283" version="1" comment="budgie-control-center-bash-completion is &lt;1.1.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926284" version="1" comment="budgie-control-center-lang is &lt;1.1.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926285" version="1" comment="ruby3.1-rubygem-http is &lt;5.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926286" version="1" comment="ruby3.1-rubygem-http-cookie is &lt;1.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926287" version="1" comment="ruby3.1-rubygem-tzinfo-1.2 is &lt;1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926288" version="1" comment="python310-loguru is &lt;0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926289" version="1" comment="python38-loguru is &lt;0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926290" version="1" comment="python39-loguru is &lt;0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926291" version="1" comment="chromedriver is &lt;104.0.5112.79-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926292" version="1" comment="chromium is &lt;104.0.5112.79-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926293" version="1" comment="helm is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926294" version="1" comment="helm-bash-completion is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926295" version="1" comment="helm-fish-completion is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926296" version="1" comment="helm-zsh-completion is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926297" version="1" comment="nim is &lt;1.6.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926298" version="1" comment="ucode-intel is &lt;20220809-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926299" version="1" comment="libvarnishapi3 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926300" version="1" comment="varnish is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926301" version="1" comment="varnish-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926302" version="1" comment="binutils is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926303" version="1" comment="binutils-devel is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926304" version="1" comment="binutils-devel-32bit is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926305" version="1" comment="binutils-gold is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926306" version="1" comment="gprofng is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926307" version="1" comment="libctf-nobfd0 is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926308" version="1" comment="libctf0 is &lt;2.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926310" version="1" comment="kernel-macros is &lt;5.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926311" version="1" comment="kernel-source is &lt;5.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926312" version="1" comment="kernel-source-vanilla is &lt;5.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926313" version="1" comment="libyajl-devel is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926314" version="1" comment="libyajl-devel-32bit is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926315" version="1" comment="libyajl-devel-static is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926316" version="1" comment="libyajl2 is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926317" version="1" comment="libyajl2-32bit is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926318" version="1" comment="yajl is &lt;2.1.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926319" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926320" version="1" comment="grafana is &lt;8.3.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926321" version="1" comment="java-11-openj9 is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926322" version="1" comment="java-11-openj9-accessibility is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926323" version="1" comment="java-11-openj9-demo is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926324" version="1" comment="java-11-openj9-devel is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926325" version="1" comment="java-11-openj9-headless is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926326" version="1" comment="java-11-openj9-javadoc is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926327" version="1" comment="java-11-openj9-jmods is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926328" version="1" comment="java-11-openj9-src is &lt;11.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926329" version="1" comment="java-17-openj9 is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926330" version="1" comment="java-17-openj9-accessibility is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926331" version="1" comment="java-17-openj9-demo is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926332" version="1" comment="java-17-openj9-devel is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926333" version="1" comment="java-17-openj9-headless is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926334" version="1" comment="java-17-openj9-javadoc is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926335" version="1" comment="java-17-openj9-jmods is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926336" version="1" comment="java-17-openj9-src is &lt;17.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926337" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926338" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926339" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926340" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926341" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926342" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926343" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.345-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926344" version="1" comment="postgresql10 is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926345" version="1" comment="postgresql10-contrib is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926346" version="1" comment="postgresql10-devel is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926347" version="1" comment="postgresql10-docs is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926348" version="1" comment="postgresql10-llvmjit-devel is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926349" version="1" comment="postgresql10-plperl is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926350" version="1" comment="postgresql10-plpython is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926351" version="1" comment="postgresql10-pltcl is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926352" version="1" comment="postgresql10-server is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926353" version="1" comment="postgresql10-test is &lt;10.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926354" version="1" comment="postgresql11 is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926355" version="1" comment="postgresql11-contrib is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926356" version="1" comment="postgresql11-devel is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926357" version="1" comment="postgresql11-docs is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926358" version="1" comment="postgresql11-llvmjit is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926359" version="1" comment="postgresql11-llvmjit-devel is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926360" version="1" comment="postgresql11-plperl is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926361" version="1" comment="postgresql11-plpython is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926362" version="1" comment="postgresql11-pltcl is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926363" version="1" comment="postgresql11-server is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926364" version="1" comment="postgresql11-server-devel is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926365" version="1" comment="postgresql11-test is &lt;11.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926366" version="1" comment="postgresql12 is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926367" version="1" comment="postgresql12-contrib is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926368" version="1" comment="postgresql12-devel is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926369" version="1" comment="postgresql12-docs is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926370" version="1" comment="postgresql12-llvmjit is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926371" version="1" comment="postgresql12-llvmjit-devel is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926372" version="1" comment="postgresql12-plperl is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926373" version="1" comment="postgresql12-plpython is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926374" version="1" comment="postgresql12-pltcl is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926375" version="1" comment="postgresql12-server is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926376" version="1" comment="postgresql12-server-devel is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926377" version="1" comment="postgresql12-test is &lt;12.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926378" version="1" comment="postgresql13 is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926379" version="1" comment="postgresql13-contrib is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926380" version="1" comment="postgresql13-devel is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926381" version="1" comment="postgresql13-docs is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926382" version="1" comment="postgresql13-llvmjit is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926383" version="1" comment="postgresql13-llvmjit-devel is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926384" version="1" comment="postgresql13-plperl is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926385" version="1" comment="postgresql13-plpython is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926386" version="1" comment="postgresql13-pltcl is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926387" version="1" comment="postgresql13-server is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926388" version="1" comment="postgresql13-server-devel is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926389" version="1" comment="postgresql13-test is &lt;13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926390" version="1" comment="libecpg6 is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926391" version="1" comment="libecpg6-32bit is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926392" version="1" comment="libpq5 is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926393" version="1" comment="libpq5-32bit is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926394" version="1" comment="postgresql14 is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926395" version="1" comment="postgresql14-contrib is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926396" version="1" comment="postgresql14-devel is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926397" version="1" comment="postgresql14-docs is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926398" version="1" comment="postgresql14-llvmjit is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926399" version="1" comment="postgresql14-llvmjit-devel is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926400" version="1" comment="postgresql14-plperl is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926401" version="1" comment="postgresql14-plpython is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926402" version="1" comment="postgresql14-pltcl is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926403" version="1" comment="postgresql14-server is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926404" version="1" comment="postgresql14-server-devel is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926405" version="1" comment="postgresql14-test is &lt;14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926406" version="1" comment="EternalTerminal is &lt;6.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926407" version="1" comment="rsync is &lt;3.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926408" version="1" comment="liblzma5 is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926409" version="1" comment="liblzma5-32bit is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926410" version="1" comment="xz is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926411" version="1" comment="xz-devel is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926412" version="1" comment="xz-devel-32bit is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926413" version="1" comment="xz-lang is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926414" version="1" comment="xz-static-devel is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926415" version="1" comment="freeciv is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926416" version="1" comment="freeciv-gtk3 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926417" version="1" comment="freeciv-lang is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926418" version="1" comment="freeciv-qt is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926419" version="1" comment="python-lxml-doc is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926420" version="1" comment="python310-lxml is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926421" version="1" comment="python310-lxml-devel is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926422" version="1" comment="python38-lxml is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926423" version="1" comment="python38-lxml-devel is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926424" version="1" comment="python39-lxml is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926425" version="1" comment="python39-lxml-devel is &lt;4.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926426" version="1" comment="spotifyd is &lt;0.3.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926427" version="1" comment="gvim is &lt;9.0.0224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926428" version="1" comment="vim is &lt;9.0.0224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926429" version="1" comment="vim-data is &lt;9.0.0224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926430" version="1" comment="vim-data-common is &lt;9.0.0224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926431" version="1" comment="vim-small is &lt;9.0.0224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926432" version="1" comment="libredwg-devel is &lt;0.12.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926433" version="1" comment="libredwg-tools is &lt;0.12.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926434" version="1" comment="libredwg0 is &lt;0.12.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926435" version="1" comment="chromedriver is &lt;104.0.5112.101-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926436" version="1" comment="chromium is &lt;104.0.5112.101-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926437" version="1" comment="libtirpc-devel is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926438" version="1" comment="libtirpc-netconfig is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926439" version="1" comment="libtirpc3 is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926440" version="1" comment="libtirpc3-32bit is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926441" version="1" comment="freetype2-devel is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926442" version="1" comment="freetype2-devel-32bit is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926443" version="1" comment="freetype2-profile-tti35 is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926444" version="1" comment="ftdump is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926445" version="1" comment="libfreetype6 is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926446" version="1" comment="libfreetype6-32bit is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926447" version="1" comment="corepack16 is &lt;16.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926448" version="1" comment="nodejs16 is &lt;16.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926449" version="1" comment="nodejs16-devel is &lt;16.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926450" version="1" comment="nodejs16-docs is &lt;16.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926451" version="1" comment="npm16 is &lt;16.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926452" version="1" comment="pdns-recursor is &lt;4.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926453" version="1" comment="grafana is &lt;8.5.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926454" version="1" comment="python310-azure-storage-blob is &lt;12.13.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926455" version="1" comment="python38-azure-storage-blob is &lt;12.13.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926456" version="1" comment="python39-azure-storage-blob is &lt;12.13.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926457" version="1" comment="minetest is &lt;5.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926458" version="1" comment="minetest-data is &lt;5.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926459" version="1" comment="minetest-lang is &lt;5.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926460" version="1" comment="minetestserver is &lt;5.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926461" version="1" comment="corepack16 is &lt;16.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926462" version="1" comment="nodejs16 is &lt;16.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926463" version="1" comment="nodejs16-devel is &lt;16.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926464" version="1" comment="nodejs16-docs is &lt;16.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926465" version="1" comment="npm16 is &lt;16.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926466" version="1" comment="MozillaFirefox is &lt;104.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926467" version="1" comment="MozillaFirefox-branding-upstream is &lt;104.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926468" version="1" comment="MozillaFirefox-devel is &lt;104.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926469" version="1" comment="MozillaFirefox-translations-common is &lt;104.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926470" version="1" comment="MozillaFirefox-translations-other is &lt;104.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926471" version="1" comment="MozillaThunderbird is &lt;102.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926472" version="1" comment="MozillaThunderbird-translations-common is &lt;102.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926473" version="1" comment="MozillaThunderbird-translations-other is &lt;102.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926474" version="1" comment="libvmtools-devel is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926475" version="1" comment="libvmtools0 is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926476" version="1" comment="open-vm-tools is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926477" version="1" comment="open-vm-tools-desktop is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926478" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926479" version="1" comment="open-vm-tools-sdmp is &lt;12.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926480" version="1" comment="buildah is &lt;1.27.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926481" version="1" comment="libxml2-2 is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926482" version="1" comment="libxml2-2-32bit is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926483" version="1" comment="libxml2-devel is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926484" version="1" comment="libxml2-devel-32bit is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926485" version="1" comment="libxml2-doc is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926486" version="1" comment="libxml2-tools is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926487" version="1" comment="nodejs-electron is &lt;19.0.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926488" version="1" comment="nodejs-electron-devel is &lt;19.0.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926489" version="1" comment="libmad-devel is &lt;0.15.1b-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926490" version="1" comment="libmad0 is &lt;0.15.1b-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926491" version="1" comment="libmad0-32bit is &lt;0.15.1b-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926492" version="1" comment="curl is &lt;7.85.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926493" version="1" comment="libcurl-devel is &lt;7.85.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926494" version="1" comment="libcurl-devel-32bit is &lt;7.85.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926495" version="1" comment="libcurl4 is &lt;7.85.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926496" version="1" comment="libcurl4-32bit is &lt;7.85.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926497" version="1" comment="element-desktop is &lt;1.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926498" version="1" comment="element-web is &lt;1.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926499" version="1" comment="gdk-pixbuf-devel is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926500" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926501" version="1" comment="gdk-pixbuf-lang is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926502" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926503" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926504" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926505" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926506" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926507" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926508" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926509" version="1" comment="python310 is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926510" version="1" comment="python310-32bit is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926511" version="1" comment="python310-curses is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926512" version="1" comment="python310-dbm is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926513" version="1" comment="python310-idle is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926514" version="1" comment="python310-tk is &lt;3.10.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926515" version="1" comment="libminizip1 is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926516" version="1" comment="libminizip1-32bit is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926517" version="1" comment="libz1 is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926518" version="1" comment="libz1-32bit is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926519" version="1" comment="minizip-devel is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926520" version="1" comment="zlib-devel is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926521" version="1" comment="zlib-devel-32bit is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926522" version="1" comment="zlib-devel-static is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926523" version="1" comment="zlib-devel-static-32bit is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926524" version="1" comment="zlib-testsuite is &lt;1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926525" version="1" comment="MozillaThunderbird is &lt;102.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926526" version="1" comment="MozillaThunderbird-translations-common is &lt;102.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926527" version="1" comment="MozillaThunderbird-translations-other is &lt;102.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926528" version="1" comment="python38 is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926529" version="1" comment="python38-32bit is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926530" version="1" comment="python38-curses is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926531" version="1" comment="python38-dbm is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926532" version="1" comment="python38-idle is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926533" version="1" comment="python38-tk is &lt;3.8.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926534" version="1" comment="python39 is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926535" version="1" comment="python39-32bit is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926536" version="1" comment="python39-curses is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926537" version="1" comment="python39-dbm is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926538" version="1" comment="python39-idle is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926539" version="1" comment="python39-tk is &lt;3.9.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926540" version="1" comment="ansible is &lt;2.9.27-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926541" version="1" comment="ansible-doc is &lt;2.9.27-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926542" version="1" comment="ansible-test is &lt;2.9.27-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926543" version="1" comment="ncat is &lt;7.93-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926544" version="1" comment="nmap is &lt;7.93-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926545" version="1" comment="nping is &lt;7.93-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926546" version="1" comment="phoronix-test-suite is &lt;10.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926548" version="1" comment="kernel-macros is &lt;5.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926549" version="1" comment="kernel-source is &lt;5.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926550" version="1" comment="kernel-source-vanilla is &lt;5.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926551" version="1" comment="postorius is &lt;1.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926552" version="1" comment="postorius-web is &lt;1.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926553" version="1" comment="postorius-web-uwsgi is &lt;1.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926554" version="1" comment="frr is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926555" version="1" comment="frr-devel is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926556" version="1" comment="libfrr0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926557" version="1" comment="libfrr_pb0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926558" version="1" comment="libfrrcares0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926559" version="1" comment="libfrrfpm_pb0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926560" version="1" comment="libfrrospfapiclient0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926561" version="1" comment="libfrrsnmp0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926562" version="1" comment="libfrrzmq0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926563" version="1" comment="libmlag_pb0 is &lt;8.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926564" version="1" comment="snakeyaml is &lt;1.31-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926565" version="1" comment="snakeyaml-javadoc is &lt;1.31-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926566" version="1" comment="go1.18 is &lt;1.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926567" version="1" comment="go1.18-doc is &lt;1.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926568" version="1" comment="go1.18-race is &lt;1.18.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926569" version="1" comment="go1.19 is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926570" version="1" comment="go1.19-doc is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926571" version="1" comment="go1.19-race is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926572" version="1" comment="log4net is &lt;1.2.10-78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926573" version="1" comment="nodejs-electron is &lt;19.0.14-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926574" version="1" comment="nodejs-electron-devel is &lt;19.0.14-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926575" version="1" comment="LibVNCServer-devel is &lt;0.9.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926576" version="1" comment="libvncclient1 is &lt;0.9.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926577" version="1" comment="libvncserver1 is &lt;0.9.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926578" version="1" comment="alpine is &lt;2.26-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926579" version="1" comment="pico is &lt;5.09-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926580" version="1" comment="pilot is &lt;2.99-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926581" version="1" comment="booth is &lt;1.0+20220724.dce51f9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926582" version="1" comment="booth-test is &lt;1.0+20220724.dce51f9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926583" version="1" comment="glibc is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926584" version="1" comment="glibc-devel is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926585" version="1" comment="glibc-devel-static is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926586" version="1" comment="glibc-extra is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926587" version="1" comment="glibc-html is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926588" version="1" comment="glibc-i18ndata is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926589" version="1" comment="glibc-info is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926590" version="1" comment="glibc-lang is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926591" version="1" comment="glibc-locale is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926592" version="1" comment="glibc-locale-base is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926593" version="1" comment="glibc-profile is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926594" version="1" comment="nscd is &lt;2.36-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926595" version="1" comment="nodejs-electron is &lt;19.0.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926596" version="1" comment="nodejs-electron-devel is &lt;19.0.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926597" version="1" comment="python310-pydantic is &lt;1.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926598" version="1" comment="python38-pydantic is &lt;1.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926599" version="1" comment="python39-pydantic is &lt;1.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926600" version="1" comment="chromedriver is &lt;105.0.5195.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926601" version="1" comment="chromium is &lt;105.0.5195.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926603" version="1" comment="kernel-macros is &lt;5.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926604" version="1" comment="kernel-source is &lt;5.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926605" version="1" comment="kernel-source-vanilla is &lt;5.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926606" version="1" comment="python is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926607" version="1" comment="python-32bit is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926608" version="1" comment="python-curses is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926609" version="1" comment="python-demo is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926610" version="1" comment="python-gdbm is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926611" version="1" comment="python-idle is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926612" version="1" comment="python-tk is &lt;2.7.18-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926613" version="1" comment="deluge is &lt;2.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926614" version="1" comment="deluge-lang is &lt;2.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926615" version="1" comment="helm is &lt;3.9.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926616" version="1" comment="helm-bash-completion is &lt;3.9.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926617" version="1" comment="helm-fish-completion is &lt;3.9.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926618" version="1" comment="helm-zsh-completion is &lt;3.9.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926619" version="1" comment="libconfuse-devel is &lt;3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926620" version="1" comment="libconfuse-lang is &lt;3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926621" version="1" comment="libconfuse2 is &lt;3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926622" version="1" comment="libgsasl-devel is &lt;1.10.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926623" version="1" comment="libgsasl-lang is &lt;1.10.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926624" version="1" comment="libgsasl7 is &lt;1.10.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926625" version="1" comment="mupdf is &lt;1.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926626" version="1" comment="mupdf-devel-static is &lt;1.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926627" version="1" comment="lighttpd is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926628" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926629" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926630" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926631" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926632" version="1" comment="lighttpd-mod_magnet is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926633" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926634" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926635" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926636" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926637" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926638" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926639" version="1" comment="lighttpd-mod_webdav is &lt;1.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926640" version="1" comment="gvim is &lt;9.0.0453-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926641" version="1" comment="vim is &lt;9.0.0453-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926642" version="1" comment="vim-data is &lt;9.0.0453-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926643" version="1" comment="vim-data-common is &lt;9.0.0453-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926644" version="1" comment="vim-small is &lt;9.0.0453-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926645" version="1" comment="libwireshark15 is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926646" version="1" comment="libwiretap12 is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926647" version="1" comment="libwsutil13 is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926648" version="1" comment="wireshark is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926649" version="1" comment="wireshark-devel is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926650" version="1" comment="wireshark-ui-qt is &lt;3.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926651" version="1" comment="cherrytree is &lt;0.99.49+3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926652" version="1" comment="cherrytree-lang is &lt;0.99.49+3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926653" version="1" comment="cosign is &lt;1.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926654" version="1" comment="ffmpeg-5 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926655" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926656" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926657" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926658" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926659" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926660" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926661" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926662" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926663" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926664" version="1" comment="libavcodec59 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926665" version="1" comment="libavcodec59-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926666" version="1" comment="libavdevice59 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926667" version="1" comment="libavdevice59-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926668" version="1" comment="libavfilter8 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926669" version="1" comment="libavfilter8-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926670" version="1" comment="libavformat59 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926671" version="1" comment="libavformat59-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926672" version="1" comment="libavutil57 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926673" version="1" comment="libavutil57-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926674" version="1" comment="libpostproc56 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926675" version="1" comment="libpostproc56-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926676" version="1" comment="libswresample4 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926677" version="1" comment="libswresample4-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926678" version="1" comment="libswscale6 is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926679" version="1" comment="libswscale6-32bit is &lt;5.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926680" version="1" comment="chromedriver is &lt;105.0.5195.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926681" version="1" comment="chromium is &lt;105.0.5195.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926682" version="1" comment="nodejs-electron is &lt;19.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926683" version="1" comment="nodejs-electron-devel is &lt;19.0.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926684" version="1" comment="chkstat is &lt;1599_20220912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926685" version="1" comment="permissions is &lt;1599_20220912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926686" version="1" comment="permissions-config is &lt;1599_20220912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926687" version="1" comment="permissions-zypp-plugin is &lt;1599_20220912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926688" version="1" comment="python311 is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926689" version="1" comment="python311-32bit is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926690" version="1" comment="python311-curses is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926691" version="1" comment="python311-dbm is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926692" version="1" comment="python311-idle is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926693" version="1" comment="python311-tk is &lt;3.11.0rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926694" version="1" comment="gvim is &lt;9.0.0453-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926695" version="1" comment="vim is &lt;9.0.0453-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926696" version="1" comment="vim-data is &lt;9.0.0453-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926697" version="1" comment="vim-data-common is &lt;9.0.0453-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926698" version="1" comment="vim-small is &lt;9.0.0453-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926699" version="1" comment="jasper is &lt;3.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926700" version="1" comment="libjasper-devel is &lt;3.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926701" version="1" comment="libjasper6 is &lt;3.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926702" version="1" comment="libjasper6-32bit is &lt;3.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926703" version="1" comment="python310-oauthlib is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926704" version="1" comment="python38-oauthlib is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926705" version="1" comment="python39-oauthlib is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926706" version="1" comment="python310 is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926707" version="1" comment="python310-32bit is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926708" version="1" comment="python310-curses is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926709" version="1" comment="python310-dbm is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926710" version="1" comment="python310-idle is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926711" version="1" comment="python310-tk is &lt;3.10.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926712" version="1" comment="python38 is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926713" version="1" comment="python38-32bit is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926714" version="1" comment="python38-curses is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926715" version="1" comment="python38-dbm is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926716" version="1" comment="python38-idle is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926717" version="1" comment="python38-tk is &lt;3.8.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926718" version="1" comment="python39 is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926719" version="1" comment="python39-32bit is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926720" version="1" comment="python39-curses is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926721" version="1" comment="python39-dbm is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926722" version="1" comment="python39-idle is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926723" version="1" comment="python39-tk is &lt;3.9.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926724" version="1" comment="cargo1.62 is &lt;1.62.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926725" version="1" comment="rust1.62 is &lt;1.62.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926726" version="1" comment="cargo1.63 is &lt;1.63.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926727" version="1" comment="rust1.63 is &lt;1.63.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926728" version="1" comment="helm is &lt;3.9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926729" version="1" comment="helm-bash-completion is &lt;3.9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926730" version="1" comment="helm-fish-completion is &lt;3.9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926731" version="1" comment="helm-zsh-completion is &lt;3.9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926732" version="1" comment="python310-waitress is &lt;2.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926733" version="1" comment="python38-waitress is &lt;2.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926734" version="1" comment="python39-waitress is &lt;2.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926735" version="1" comment="libsqlite3-0 is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926736" version="1" comment="libsqlite3-0-32bit is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926737" version="1" comment="sqlite3 is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926738" version="1" comment="sqlite3-devel is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926739" version="1" comment="sqlite3-doc is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926740" version="1" comment="sqlite3-tcl is &lt;3.39.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926741" version="1" comment="bluez is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926742" version="1" comment="bluez-auto-enable-devices is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926743" version="1" comment="bluez-cups is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926744" version="1" comment="bluez-deprecated is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926745" version="1" comment="bluez-devel is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926746" version="1" comment="bluez-devel-32bit is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926747" version="1" comment="bluez-obexd is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926748" version="1" comment="bluez-test is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926749" version="1" comment="bluez-zsh-completion is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926750" version="1" comment="libbluetooth3 is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926751" version="1" comment="libbluetooth3-32bit is &lt;5.65-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926752" version="1" comment="corepack18 is &lt;18.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926753" version="1" comment="nodejs18 is &lt;18.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926754" version="1" comment="nodejs18-devel is &lt;18.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926755" version="1" comment="nodejs18-docs is &lt;18.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926756" version="1" comment="npm18 is &lt;18.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926757" version="1" comment="python310-mistune is &lt;2.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926758" version="1" comment="python38-mistune is &lt;2.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926759" version="1" comment="python39-mistune is &lt;2.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926760" version="1" comment="tinyproxy is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926761" version="1" comment="gvim is &lt;9.0.0500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926762" version="1" comment="vim is &lt;9.0.0500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926763" version="1" comment="vim-data is &lt;9.0.0500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926764" version="1" comment="vim-data-common is &lt;9.0.0500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926765" version="1" comment="vim-small is &lt;9.0.0500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926766" version="1" comment="colord is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926767" version="1" comment="colord-color-profiles is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926768" version="1" comment="colord-lang is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926769" version="1" comment="libcolord-devel is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926770" version="1" comment="libcolord2 is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926771" version="1" comment="libcolord2-32bit is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926772" version="1" comment="libcolorhug2 is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926773" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926774" version="1" comment="typelib-1_0-Colorhug-1_0 is &lt;1.4.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926775" version="1" comment="gajim is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926776" version="1" comment="gajim-lang is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926777" version="1" comment="tensorflow-lite is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926778" version="1" comment="tensorflow-lite-devel is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926779" version="1" comment="bind is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926780" version="1" comment="bind-doc is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926781" version="1" comment="bind-modules-bdbhpt is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926782" version="1" comment="bind-modules-generic is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926783" version="1" comment="bind-modules-ldap is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926784" version="1" comment="bind-modules-mysql is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926785" version="1" comment="bind-modules-perl is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926786" version="1" comment="bind-modules-sqlite3 is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926787" version="1" comment="bind-utils is &lt;9.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926788" version="1" comment="unzip is &lt;6.00-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926789" version="1" comment="unzip-doc is &lt;6.00-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926790" version="1" comment="MozillaThunderbird is &lt;102.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926791" version="1" comment="MozillaThunderbird-translations-common is &lt;102.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926792" version="1" comment="MozillaThunderbird-translations-other is &lt;102.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926793" version="1" comment="expat is &lt;2.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926794" version="1" comment="libexpat-devel is &lt;2.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926795" version="1" comment="libexpat-devel-32bit is &lt;2.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926796" version="1" comment="libexpat1 is &lt;2.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926797" version="1" comment="libexpat1-32bit is &lt;2.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926798" version="1" comment="libmariadbd-devel is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926799" version="1" comment="libmariadbd19 is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926800" version="1" comment="mariadb is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926801" version="1" comment="mariadb-bench is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926802" version="1" comment="mariadb-client is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926803" version="1" comment="mariadb-errormessages is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926804" version="1" comment="mariadb-galera is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926805" version="1" comment="mariadb-rpm-macros is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926806" version="1" comment="mariadb-test is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926807" version="1" comment="mariadb-tools is &lt;10.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926808" version="1" comment="redis is &lt;7.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926809" version="1" comment="libpoppler-cpp0 is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926810" version="1" comment="libpoppler-cpp0-32bit is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926811" version="1" comment="libpoppler-devel is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926812" version="1" comment="libpoppler-glib-devel is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926813" version="1" comment="libpoppler-glib8 is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926814" version="1" comment="libpoppler-glib8-32bit is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926815" version="1" comment="libpoppler124 is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926816" version="1" comment="libpoppler124-32bit is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926817" version="1" comment="poppler-tools is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926818" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;22.09.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926819" version="1" comment="xmlgraphics-batik is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926820" version="1" comment="xmlgraphics-batik-css is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926821" version="1" comment="xmlgraphics-batik-demo is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926822" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926823" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926824" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926825" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926826" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926827" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926828" version="1" comment="squid is &lt;5.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926829" version="1" comment="enlightenment is &lt;0.25.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926830" version="1" comment="enlightenment-branding-upstream is &lt;0.25.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926831" version="1" comment="enlightenment-devel is &lt;0.25.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926832" version="1" comment="grafana is &lt;8.5.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926833" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926834" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926835" version="1" comment="libQt5Concurrent-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926836" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926837" version="1" comment="libQt5Concurrent5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926838" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926839" version="1" comment="libQt5Core-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926840" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926841" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926842" version="1" comment="libQt5Core5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926843" version="1" comment="libQt5Core5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926844" version="1" comment="libQt5DBus-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926845" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926846" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926847" version="1" comment="libQt5DBus5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926848" version="1" comment="libQt5DBus5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926849" version="1" comment="libQt5Gui-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926850" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926851" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926852" version="1" comment="libQt5Gui5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926853" version="1" comment="libQt5Gui5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926854" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926855" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926856" version="1" comment="libQt5Network-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926857" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926858" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926859" version="1" comment="libQt5Network5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926860" version="1" comment="libQt5Network5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926861" version="1" comment="libQt5OpenGL-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926862" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926863" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926864" version="1" comment="libQt5OpenGL5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926865" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926866" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926867" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926868" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926869" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926870" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926871" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926872" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926873" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926874" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926875" version="1" comment="libQt5PrintSupport5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926876" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926877" version="1" comment="libQt5Sql-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926878" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926879" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926880" version="1" comment="libQt5Sql5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926881" version="1" comment="libQt5Sql5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926882" version="1" comment="libQt5Sql5-mysql is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926883" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926884" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926885" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926886" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926887" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926888" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926889" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926890" version="1" comment="libQt5Test-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926891" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926892" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926893" version="1" comment="libQt5Test5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926894" version="1" comment="libQt5Test5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926895" version="1" comment="libQt5Widgets-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926896" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926897" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926898" version="1" comment="libQt5Widgets5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926899" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926900" version="1" comment="libQt5Xml-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926901" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926902" version="1" comment="libQt5Xml5 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926903" version="1" comment="libQt5Xml5-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926904" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926905" version="1" comment="libqt5-qtbase-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926906" version="1" comment="libqt5-qtbase-examples is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926907" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926908" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926909" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926910" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.6+kde177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926911" version="1" comment="libunbound8 is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926912" version="1" comment="python3-unbound is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926913" version="1" comment="unbound is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926914" version="1" comment="unbound-anchor is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926915" version="1" comment="unbound-devel is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926916" version="1" comment="unbound-munin is &lt;1.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926917" version="1" comment="postgresql-jdbc is &lt;42.2.25-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926918" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.25-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926919" version="1" comment="corepack16 is &lt;16.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926920" version="1" comment="nodejs16 is &lt;16.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926921" version="1" comment="nodejs16-devel is &lt;16.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926922" version="1" comment="nodejs16-docs is &lt;16.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926923" version="1" comment="npm16 is &lt;16.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926924" version="1" comment="podman is &lt;4.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926925" version="1" comment="podman-cni-config is &lt;4.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926926" version="1" comment="podman-docker is &lt;4.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926927" version="1" comment="podman-remote is &lt;4.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926928" version="1" comment="v4l2loopback-autoload is &lt;0.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926929" version="1" comment="v4l2loopback-kmp-default is &lt;0.12.7_k5.19.10_1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926930" version="1" comment="v4l2loopback-utils is &lt;0.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926932" version="1" comment="kernel-macros is &lt;5.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926933" version="1" comment="kernel-source is &lt;5.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926934" version="1" comment="kernel-source-vanilla is &lt;5.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926935" version="1" comment="element-desktop is &lt;1.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926936" version="1" comment="element-web is &lt;1.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926937" version="1" comment="corepack18 is &lt;18.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926938" version="1" comment="nodejs18 is &lt;18.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926939" version="1" comment="nodejs18-devel is &lt;18.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926940" version="1" comment="nodejs18-docs is &lt;18.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926941" version="1" comment="npm18 is &lt;18.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926942" version="1" comment="php7 is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926943" version="1" comment="php7-bcmath is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926944" version="1" comment="php7-bz2 is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926945" version="1" comment="php7-calendar is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926946" version="1" comment="php7-cli is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926947" version="1" comment="php7-ctype is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926948" version="1" comment="php7-curl is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926949" version="1" comment="php7-dba is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926950" version="1" comment="php7-devel is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926951" version="1" comment="php7-dom is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926952" version="1" comment="php7-enchant is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926953" version="1" comment="php7-exif is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926954" version="1" comment="php7-fileinfo is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926955" version="1" comment="php7-ftp is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926956" version="1" comment="php7-gd is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926957" version="1" comment="php7-gettext is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926958" version="1" comment="php7-gmp is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926959" version="1" comment="php7-iconv is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926960" version="1" comment="php7-intl is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926961" version="1" comment="php7-json is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926962" version="1" comment="php7-ldap is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926963" version="1" comment="php7-mbstring is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926964" version="1" comment="php7-mysql is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926965" version="1" comment="php7-odbc is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926966" version="1" comment="php7-opcache is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926967" version="1" comment="php7-openssl is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926968" version="1" comment="php7-pcntl is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926969" version="1" comment="php7-pdo is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926970" version="1" comment="php7-pgsql is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926971" version="1" comment="php7-phar is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926972" version="1" comment="php7-posix is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926973" version="1" comment="php7-readline is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926974" version="1" comment="php7-shmop is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926975" version="1" comment="php7-snmp is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926976" version="1" comment="php7-soap is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926977" version="1" comment="php7-sockets is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926978" version="1" comment="php7-sodium is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926979" version="1" comment="php7-sqlite is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926980" version="1" comment="php7-sysvmsg is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926981" version="1" comment="php7-sysvsem is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926982" version="1" comment="php7-sysvshm is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926983" version="1" comment="php7-tidy is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926984" version="1" comment="php7-tokenizer is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926985" version="1" comment="php7-xmlreader is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926986" version="1" comment="php7-xmlrpc is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926987" version="1" comment="php7-xmlwriter is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926988" version="1" comment="php7-xsl is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926989" version="1" comment="php7-zip is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926990" version="1" comment="php7-zlib is &lt;7.4.32-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926991" version="1" comment="gvim is &lt;9.0.0626-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926992" version="1" comment="vim is &lt;9.0.0626-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926993" version="1" comment="vim-data is &lt;9.0.0626-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926994" version="1" comment="vim-data-common is &lt;9.0.0626-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926995" version="1" comment="vim-small is &lt;9.0.0626-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926996" version="1" comment="MozillaThunderbird is &lt;102.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926997" version="1" comment="MozillaThunderbird-translations-common is &lt;102.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926998" version="1" comment="MozillaThunderbird-translations-other is &lt;102.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009926999" version="1" comment="chromedriver is &lt;106.0.5249.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927000" version="1" comment="chromium is &lt;106.0.5249.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927001" version="1" comment="exiv2 is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927002" version="1" comment="exiv2-lang is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927003" version="1" comment="libexiv2-27 is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927004" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927005" version="1" comment="libexiv2-devel is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927006" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927007" version="1" comment="lighttpd is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927008" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927009" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927010" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927011" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927012" version="1" comment="lighttpd-mod_magnet is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927013" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927014" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927015" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927016" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927017" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927018" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927019" version="1" comment="lighttpd-mod_webdav is &lt;1.4.67-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927020" version="1" comment="orthanc is &lt;1.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927021" version="1" comment="orthanc-devel is &lt;1.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927022" version="1" comment="orthanc-doc is &lt;1.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927023" version="1" comment="orthanc-source is &lt;1.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927024" version="1" comment="php8 is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927025" version="1" comment="php8-bcmath is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927026" version="1" comment="php8-bz2 is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927027" version="1" comment="php8-calendar is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927028" version="1" comment="php8-cli is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927029" version="1" comment="php8-ctype is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927030" version="1" comment="php8-curl is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927031" version="1" comment="php8-dba is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927032" version="1" comment="php8-devel is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927033" version="1" comment="php8-dom is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927034" version="1" comment="php8-enchant is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927035" version="1" comment="php8-exif is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927036" version="1" comment="php8-ffi is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927037" version="1" comment="php8-fileinfo is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927038" version="1" comment="php8-ftp is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927039" version="1" comment="php8-gd is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927040" version="1" comment="php8-gettext is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927041" version="1" comment="php8-gmp is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927042" version="1" comment="php8-iconv is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927043" version="1" comment="php8-intl is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927044" version="1" comment="php8-ldap is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927045" version="1" comment="php8-mbstring is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927046" version="1" comment="php8-mysql is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927047" version="1" comment="php8-odbc is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927048" version="1" comment="php8-opcache is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927049" version="1" comment="php8-openssl is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927050" version="1" comment="php8-pcntl is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927051" version="1" comment="php8-pdo is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927052" version="1" comment="php8-pgsql is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927053" version="1" comment="php8-phar is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927054" version="1" comment="php8-posix is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927055" version="1" comment="php8-readline is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927056" version="1" comment="php8-shmop is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927057" version="1" comment="php8-snmp is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927058" version="1" comment="php8-soap is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927059" version="1" comment="php8-sockets is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927060" version="1" comment="php8-sodium is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927061" version="1" comment="php8-sqlite is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927062" version="1" comment="php8-sysvmsg is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927063" version="1" comment="php8-sysvsem is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927064" version="1" comment="php8-sysvshm is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927065" version="1" comment="php8-tidy is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927066" version="1" comment="php8-tokenizer is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927067" version="1" comment="php8-xmlreader is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927068" version="1" comment="php8-xmlwriter is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927069" version="1" comment="php8-xsl is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927070" version="1" comment="php8-zip is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927071" version="1" comment="php8-zlib is &lt;8.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927072" version="1" comment="python310-pyspnego is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927073" version="1" comment="python38-pyspnego is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927074" version="1" comment="python39-pyspnego is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927075" version="1" comment="rxvt-unicode is &lt;9.30-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927076" version="1" comment="postgresql14 is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927077" version="1" comment="postgresql14-contrib is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927078" version="1" comment="postgresql14-devel is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927079" version="1" comment="postgresql14-docs is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927080" version="1" comment="postgresql14-llvmjit is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927081" version="1" comment="postgresql14-llvmjit-devel is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927082" version="1" comment="postgresql14-plperl is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927083" version="1" comment="postgresql14-plpython is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927084" version="1" comment="postgresql14-pltcl is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927085" version="1" comment="postgresql14-server is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927086" version="1" comment="postgresql14-server-devel is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927087" version="1" comment="postgresql14-test is &lt;14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927088" version="1" comment="jettison is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927089" version="1" comment="jettison-javadoc is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927090" version="1" comment="apptainer is &lt;1.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927091" version="1" comment="dhcp is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927092" version="1" comment="dhcp-client is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927093" version="1" comment="dhcp-devel is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927094" version="1" comment="dhcp-doc is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927095" version="1" comment="dhcp-relay is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927096" version="1" comment="dhcp-server is &lt;4.4.2.P1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927097" version="1" comment="go1.18 is &lt;1.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927098" version="1" comment="go1.18-doc is &lt;1.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927099" version="1" comment="go1.18-race is &lt;1.18.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927100" version="1" comment="go1.19 is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927101" version="1" comment="go1.19-doc is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927102" version="1" comment="go1.19-race is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927103" version="1" comment="qemu is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927104" version="1" comment="qemu-SLOF is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927105" version="1" comment="qemu-accel-qtest is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927106" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927107" version="1" comment="qemu-arm is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927108" version="1" comment="qemu-audio-alsa is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927109" version="1" comment="qemu-audio-dbus is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927110" version="1" comment="qemu-audio-jack is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927111" version="1" comment="qemu-audio-oss is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927112" version="1" comment="qemu-audio-pa is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927113" version="1" comment="qemu-audio-spice is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927114" version="1" comment="qemu-block-curl is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927115" version="1" comment="qemu-block-dmg is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927116" version="1" comment="qemu-block-gluster is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927117" version="1" comment="qemu-block-iscsi is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927118" version="1" comment="qemu-block-nfs is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927119" version="1" comment="qemu-block-rbd is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927120" version="1" comment="qemu-block-ssh is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927121" version="1" comment="qemu-chardev-baum is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927122" version="1" comment="qemu-chardev-spice is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927123" version="1" comment="qemu-extra is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927124" version="1" comment="qemu-guest-agent is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927125" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927126" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927127" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927128" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927129" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927130" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927131" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927132" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927133" version="1" comment="qemu-ipxe is &lt;1.0.0+-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927134" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927135" version="1" comment="qemu-ksm is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927136" version="1" comment="qemu-kvm is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927137" version="1" comment="qemu-lang is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927138" version="1" comment="qemu-microvm is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927139" version="1" comment="qemu-ppc is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927140" version="1" comment="qemu-s390x is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927141" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927142" version="1" comment="qemu-sgabios is &lt;8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927143" version="1" comment="qemu-skiboot is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927144" version="1" comment="qemu-tools is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927145" version="1" comment="qemu-ui-curses is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927146" version="1" comment="qemu-ui-dbus is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927147" version="1" comment="qemu-ui-gtk is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927148" version="1" comment="qemu-ui-opengl is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927149" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927150" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927151" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927152" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927153" version="1" comment="qemu-x86 is &lt;7.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927154" version="1" comment="bluez is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927155" version="1" comment="bluez-auto-enable-devices is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927156" version="1" comment="bluez-cups is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927157" version="1" comment="bluez-deprecated is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927158" version="1" comment="bluez-devel is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927159" version="1" comment="bluez-devel-32bit is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927160" version="1" comment="bluez-obexd is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927161" version="1" comment="bluez-test is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927162" version="1" comment="bluez-zsh-completion is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927163" version="1" comment="libbluetooth3 is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927164" version="1" comment="libbluetooth3-32bit is &lt;5.65-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927165" version="1" comment="libQt5Pdf5 is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927166" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927167" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927168" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927169" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927170" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927171" version="1" comment="libqt5-qtwebengine is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927172" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927173" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927174" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927175" version="1" comment="python310-Django is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927176" version="1" comment="python38-Django is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927177" version="1" comment="python39-Django is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927178" version="1" comment="ruby3.1-rubygem-rack-2.2 is &lt;2.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927179" version="1" comment="MozillaFirefox is &lt;105.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927180" version="1" comment="MozillaFirefox-branding-upstream is &lt;105.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927181" version="1" comment="MozillaFirefox-devel is &lt;105.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927182" version="1" comment="MozillaFirefox-translations-common is &lt;105.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927183" version="1" comment="MozillaFirefox-translations-other is &lt;105.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927184" version="1" comment="exiv2 is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927185" version="1" comment="exiv2-lang is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927186" version="1" comment="libexiv2-27 is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927187" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927188" version="1" comment="libexiv2-devel is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927189" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927190" version="1" comment="podman is &lt;4.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927191" version="1" comment="podman-cni-config is &lt;4.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927192" version="1" comment="podman-docker is &lt;4.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927193" version="1" comment="podman-remote is &lt;4.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927194" version="1" comment="python310-joblib is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927195" version="1" comment="python38-joblib is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927196" version="1" comment="python39-joblib is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927197" version="1" comment="xmlgraphics-batik is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927198" version="1" comment="xmlgraphics-batik-css is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927199" version="1" comment="xmlgraphics-batik-demo is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927200" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927201" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927202" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927203" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927204" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927205" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927206" version="1" comment="xmlgraphics-commons is &lt;2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927207" version="1" comment="xmlgraphics-commons-javadoc is &lt;2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927208" version="1" comment="chromedriver is &lt;106.0.5249.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927209" version="1" comment="chromium is &lt;106.0.5249.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927210" version="1" comment="exiv2 is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927211" version="1" comment="exiv2-lang is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927212" version="1" comment="libexiv2-27 is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927213" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927214" version="1" comment="libexiv2-devel is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927215" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927216" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927217" version="1" comment="libspice-client-glib-helper is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927218" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927219" version="1" comment="spice-gtk is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927220" version="1" comment="spice-gtk-devel is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927221" version="1" comment="spice-gtk-lang is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927222" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927223" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927225" version="1" comment="kernel-macros is &lt;6.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927226" version="1" comment="kernel-source is &lt;6.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927227" version="1" comment="kernel-source-vanilla is &lt;6.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927228" version="1" comment="python310-httptools is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927229" version="1" comment="python38-httptools is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927230" version="1" comment="python39-httptools is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927231" version="1" comment="apache-commons-text is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927232" version="1" comment="apache-commons-text-javadoc is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927233" version="1" comment="dex-oidc is &lt;2.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927234" version="1" comment="ardour is &lt;6.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927235" version="1" comment="jackson-databind is &lt;2.13.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927236" version="1" comment="jackson-databind-javadoc is &lt;2.13.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927237" version="1" comment="jsoup is &lt;1.15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927238" version="1" comment="jsoup-javadoc is &lt;1.15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927239" version="1" comment="python-lxml-doc is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927240" version="1" comment="python310-lxml is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927241" version="1" comment="python310-lxml-devel is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927242" version="1" comment="python38-lxml is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927243" version="1" comment="python38-lxml-devel is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927244" version="1" comment="python39-lxml is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927245" version="1" comment="python39-lxml-devel is &lt;4.9.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927246" version="1" comment="busybox is &lt;1.35.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927247" version="1" comment="busybox-static is &lt;1.35.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927248" version="1" comment="busybox-testsuite is &lt;1.35.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927249" version="1" comment="busybox-warewulf3 is &lt;1.35.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927250" version="1" comment="erlang is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927251" version="1" comment="erlang-debugger is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927252" version="1" comment="erlang-debugger-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927253" version="1" comment="erlang-dialyzer is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927254" version="1" comment="erlang-dialyzer-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927255" version="1" comment="erlang-diameter is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927256" version="1" comment="erlang-diameter-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927257" version="1" comment="erlang-doc is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927258" version="1" comment="erlang-epmd is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927259" version="1" comment="erlang-et is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927260" version="1" comment="erlang-et-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927261" version="1" comment="erlang-jinterface is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927262" version="1" comment="erlang-jinterface-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927263" version="1" comment="erlang-observer is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927264" version="1" comment="erlang-observer-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927265" version="1" comment="erlang-reltool is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927266" version="1" comment="erlang-reltool-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927267" version="1" comment="erlang-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927268" version="1" comment="erlang-wx is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927269" version="1" comment="erlang-wx-src is &lt;25.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927270" version="1" comment="git-bug is &lt;0.7.2+git.1665512451.0eef939-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927271" version="1" comment="git-bug-bash-completion is &lt;0.7.2+git.1665512451.0eef939-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927272" version="1" comment="git-bug-fish-completion is &lt;0.7.2+git.1665512451.0eef939-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927273" version="1" comment="git-bug-zsh-completion is &lt;0.7.2+git.1665512451.0eef939-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927274" version="1" comment="libksba-devel is &lt;1.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927275" version="1" comment="libksba8 is &lt;1.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927276" version="1" comment="libxml2-2 is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927277" version="1" comment="libxml2-2-32bit is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927278" version="1" comment="libxml2-devel is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927279" version="1" comment="libxml2-devel-32bit is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927280" version="1" comment="libxml2-doc is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927281" version="1" comment="libxml2-tools is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927282" version="1" comment="libtiff-devel is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927283" version="1" comment="libtiff-devel-32bit is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927284" version="1" comment="libtiff5 is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927285" version="1" comment="libtiff5-32bit is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927286" version="1" comment="tiff is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927287" version="1" comment="docker-compose is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927288" version="1" comment="exim is &lt;4.96-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927289" version="1" comment="eximon is &lt;4.96-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927290" version="1" comment="eximstats-html is &lt;4.96-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927291" version="1" comment="libexslt0 is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927292" version="1" comment="libxslt-devel is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927293" version="1" comment="libxslt-devel-32bit is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927294" version="1" comment="libxslt-tools is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927295" version="1" comment="libxslt1 is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927296" version="1" comment="libxslt1-32bit is &lt;1.1.37-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927297" version="1" comment="libX11-6 is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927298" version="1" comment="libX11-6-32bit is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927299" version="1" comment="libX11-data is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927300" version="1" comment="libX11-devel is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927301" version="1" comment="libX11-devel-32bit is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927302" version="1" comment="libX11-xcb1 is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927303" version="1" comment="libX11-xcb1-32bit is &lt;1.8.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927304" version="1" comment="libmozjs-102-0 is &lt;102.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927305" version="1" comment="mozjs102 is &lt;102.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927306" version="1" comment="mozjs102-devel is &lt;102.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927307" version="1" comment="starboard is &lt;0.15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927308" version="1" comment="xorg-x11-server is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927309" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927310" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927311" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927312" version="1" comment="xorg-x11-server-source is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927313" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927314" version="1" comment="xwayland is &lt;22.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927315" version="1" comment="xwayland-devel is &lt;22.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927316" version="1" comment="MozillaFirefox is &lt;106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927317" version="1" comment="MozillaFirefox-branding-upstream is &lt;106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927318" version="1" comment="MozillaFirefox-devel is &lt;106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927319" version="1" comment="MozillaFirefox-translations-common is &lt;106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927320" version="1" comment="MozillaFirefox-translations-other is &lt;106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927321" version="1" comment="docker-compose is &lt;2.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927322" version="1" comment="java-11-openjdk is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927323" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927324" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927325" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927326" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927327" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927328" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927329" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927330" version="1" comment="java-17-openjdk is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927331" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927332" version="1" comment="java-17-openjdk-demo is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927333" version="1" comment="java-17-openjdk-devel is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927334" version="1" comment="java-17-openjdk-headless is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927335" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927336" version="1" comment="java-17-openjdk-jmods is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927337" version="1" comment="java-17-openjdk-src is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927338" version="1" comment="nginx is &lt;1.23.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927339" version="1" comment="nginx-source is &lt;1.23.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927340" version="1" comment="python38 is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927341" version="1" comment="python38-32bit is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927342" version="1" comment="python38-curses is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927343" version="1" comment="python38-dbm is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927344" version="1" comment="python38-idle is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927345" version="1" comment="python38-tk is &lt;3.8.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927346" version="1" comment="ctdb is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927347" version="1" comment="ctdb-pcp-pmda is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927348" version="1" comment="libsamba-policy-devel is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927349" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927350" version="1" comment="libsamba-policy0-python3 is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927351" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927352" version="1" comment="samba is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927353" version="1" comment="samba-ad-dc is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927354" version="1" comment="samba-ad-dc-libs is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927355" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927356" version="1" comment="samba-ceph is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927357" version="1" comment="samba-client is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927358" version="1" comment="samba-client-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927359" version="1" comment="samba-client-libs is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927360" version="1" comment="samba-client-libs-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927361" version="1" comment="samba-devel is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927362" version="1" comment="samba-devel-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927363" version="1" comment="samba-doc is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927364" version="1" comment="samba-dsdb-modules is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927365" version="1" comment="samba-gpupdate is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927366" version="1" comment="samba-ldb-ldap is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927367" version="1" comment="samba-libs is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927368" version="1" comment="samba-libs-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927369" version="1" comment="samba-libs-python3 is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927370" version="1" comment="samba-libs-python3-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927371" version="1" comment="samba-python3 is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927372" version="1" comment="samba-test is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927373" version="1" comment="samba-tool is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927374" version="1" comment="samba-winbind is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927375" version="1" comment="samba-winbind-libs is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927376" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.1+git.270.17afe7cb6b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927377" version="1" comment="telnet is &lt;1.2-176.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927378" version="1" comment="telnet-server is &lt;1.2-176.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927380" version="1" comment="kernel-macros is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927381" version="1" comment="kernel-source is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927382" version="1" comment="kernel-source-vanilla is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927383" version="1" comment="dfu-tool is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927384" version="1" comment="fwupd is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927385" version="1" comment="fwupd-bash-completion is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927386" version="1" comment="fwupd-devel is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927387" version="1" comment="fwupd-doc is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927388" version="1" comment="fwupd-fish-completion is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927389" version="1" comment="fwupd-lang is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927390" version="1" comment="libfwupd2 is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927391" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927392" version="1" comment="MozillaThunderbird is &lt;102.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927393" version="1" comment="MozillaThunderbird-translations-common is &lt;102.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927394" version="1" comment="MozillaThunderbird-translations-other is &lt;102.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927395" version="1" comment="exiv2 is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927396" version="1" comment="exiv2-lang is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927397" version="1" comment="libexiv2-27 is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927398" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927399" version="1" comment="libexiv2-devel is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927400" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927401" version="1" comment="java-13-openjdk is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927402" version="1" comment="java-13-openjdk-accessibility is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927403" version="1" comment="java-13-openjdk-demo is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927404" version="1" comment="java-13-openjdk-devel is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927405" version="1" comment="java-13-openjdk-headless is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927406" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927407" version="1" comment="java-13-openjdk-jmods is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927408" version="1" comment="java-13-openjdk-src is &lt;13.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927409" version="1" comment="java-15-openjdk is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927410" version="1" comment="java-15-openjdk-accessibility is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927411" version="1" comment="java-15-openjdk-demo is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927412" version="1" comment="java-15-openjdk-devel is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927413" version="1" comment="java-15-openjdk-headless is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927414" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927415" version="1" comment="java-15-openjdk-jmods is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927416" version="1" comment="java-15-openjdk-src is &lt;15.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927417" version="1" comment="kpartx is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927418" version="1" comment="libdmmp-devel is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927419" version="1" comment="libdmmp0_2_0 is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927420" version="1" comment="libmpath0 is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927421" version="1" comment="multipath-tools is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927422" version="1" comment="multipath-tools-devel is &lt;0.9.2+57+suse.cf3c1e9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927423" version="1" comment="python310-ecdsa is &lt;0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927424" version="1" comment="python38-ecdsa is &lt;0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927425" version="1" comment="python39-ecdsa is &lt;0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927426" version="1" comment="libtpms-devel is &lt;0.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927427" version="1" comment="libtpms0 is &lt;0.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927428" version="1" comment="bluez is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927429" version="1" comment="bluez-auto-enable-devices is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927430" version="1" comment="bluez-cups is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927431" version="1" comment="bluez-deprecated is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927432" version="1" comment="bluez-devel is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927433" version="1" comment="bluez-devel-32bit is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927434" version="1" comment="bluez-obexd is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927435" version="1" comment="bluez-test is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927436" version="1" comment="bluez-zsh-completion is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927437" version="1" comment="libbluetooth3 is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927438" version="1" comment="libbluetooth3-32bit is &lt;5.65-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927439" version="1" comment="curl is &lt;7.86.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927440" version="1" comment="libcurl-devel is &lt;7.86.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927441" version="1" comment="libcurl-devel-32bit is &lt;7.86.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927442" version="1" comment="libcurl4 is &lt;7.86.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927443" version="1" comment="libcurl4-32bit is &lt;7.86.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927444" version="1" comment="dbus-1 is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927445" version="1" comment="dbus-1-common is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927446" version="1" comment="dbus-1-daemon is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927447" version="1" comment="dbus-1-devel is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927448" version="1" comment="dbus-1-devel-32bit is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927449" version="1" comment="dbus-1-tools is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927450" version="1" comment="libdbus-1-3 is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927451" version="1" comment="libdbus-1-3-32bit is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927452" version="1" comment="expat is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927453" version="1" comment="libexpat-devel is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927454" version="1" comment="libexpat-devel-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927455" version="1" comment="libexpat1 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927456" version="1" comment="libexpat1-32bit is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927457" version="1" comment="hsqldb is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927458" version="1" comment="hsqldb-demo is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927459" version="1" comment="hsqldb-javadoc is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927460" version="1" comment="hsqldb-manual is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927461" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.12.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927462" version="1" comment="libheif-devel is &lt;1.12.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927463" version="1" comment="libheif1 is &lt;1.12.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927464" version="1" comment="libheif1-32bit is &lt;1.12.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927465" version="1" comment="libreoffice is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927466" version="1" comment="libreoffice-base is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927467" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927468" version="1" comment="libreoffice-branding-upstream is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927469" version="1" comment="libreoffice-calc is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927470" version="1" comment="libreoffice-calc-extensions is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927471" version="1" comment="libreoffice-draw is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927472" version="1" comment="libreoffice-filters-optional is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927473" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927474" version="1" comment="libreoffice-glade is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927475" version="1" comment="libreoffice-gnome is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927476" version="1" comment="libreoffice-gtk3 is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927477" version="1" comment="libreoffice-icon-themes is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927478" version="1" comment="libreoffice-impress is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927479" version="1" comment="libreoffice-l10n-af is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927480" version="1" comment="libreoffice-l10n-am is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927481" version="1" comment="libreoffice-l10n-ar is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927482" version="1" comment="libreoffice-l10n-as is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927483" version="1" comment="libreoffice-l10n-ast is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927484" version="1" comment="libreoffice-l10n-be is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927485" version="1" comment="libreoffice-l10n-bg is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927486" version="1" comment="libreoffice-l10n-bn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927487" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927488" version="1" comment="libreoffice-l10n-bo is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927489" version="1" comment="libreoffice-l10n-br is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927490" version="1" comment="libreoffice-l10n-brx is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927491" version="1" comment="libreoffice-l10n-bs is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927492" version="1" comment="libreoffice-l10n-ca is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927493" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927494" version="1" comment="libreoffice-l10n-ckb is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927495" version="1" comment="libreoffice-l10n-cs is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927496" version="1" comment="libreoffice-l10n-cy is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927497" version="1" comment="libreoffice-l10n-da is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927498" version="1" comment="libreoffice-l10n-de is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927499" version="1" comment="libreoffice-l10n-dgo is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927500" version="1" comment="libreoffice-l10n-dsb is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927501" version="1" comment="libreoffice-l10n-dz is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927502" version="1" comment="libreoffice-l10n-el is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927503" version="1" comment="libreoffice-l10n-en is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927504" version="1" comment="libreoffice-l10n-en_GB is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927505" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927506" version="1" comment="libreoffice-l10n-eo is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927507" version="1" comment="libreoffice-l10n-es is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927508" version="1" comment="libreoffice-l10n-et is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927509" version="1" comment="libreoffice-l10n-eu is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927510" version="1" comment="libreoffice-l10n-fa is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927511" version="1" comment="libreoffice-l10n-fi is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927512" version="1" comment="libreoffice-l10n-fr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927513" version="1" comment="libreoffice-l10n-fur is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927514" version="1" comment="libreoffice-l10n-fy is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927515" version="1" comment="libreoffice-l10n-ga is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927516" version="1" comment="libreoffice-l10n-gd is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927517" version="1" comment="libreoffice-l10n-gl is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927518" version="1" comment="libreoffice-l10n-gu is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927519" version="1" comment="libreoffice-l10n-gug is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927520" version="1" comment="libreoffice-l10n-he is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927521" version="1" comment="libreoffice-l10n-hi is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927522" version="1" comment="libreoffice-l10n-hr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927523" version="1" comment="libreoffice-l10n-hsb is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927524" version="1" comment="libreoffice-l10n-hu is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927525" version="1" comment="libreoffice-l10n-id is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927526" version="1" comment="libreoffice-l10n-is is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927527" version="1" comment="libreoffice-l10n-it is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927528" version="1" comment="libreoffice-l10n-ja is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927529" version="1" comment="libreoffice-l10n-ka is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927530" version="1" comment="libreoffice-l10n-kab is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927531" version="1" comment="libreoffice-l10n-kk is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927532" version="1" comment="libreoffice-l10n-km is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927533" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927534" version="1" comment="libreoffice-l10n-kn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927535" version="1" comment="libreoffice-l10n-ko is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927536" version="1" comment="libreoffice-l10n-kok is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927537" version="1" comment="libreoffice-l10n-ks is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927538" version="1" comment="libreoffice-l10n-lb is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927539" version="1" comment="libreoffice-l10n-lo is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927540" version="1" comment="libreoffice-l10n-lt is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927541" version="1" comment="libreoffice-l10n-lv is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927542" version="1" comment="libreoffice-l10n-mai is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927543" version="1" comment="libreoffice-l10n-mk is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927544" version="1" comment="libreoffice-l10n-ml is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927545" version="1" comment="libreoffice-l10n-mn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927546" version="1" comment="libreoffice-l10n-mni is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927547" version="1" comment="libreoffice-l10n-mr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927548" version="1" comment="libreoffice-l10n-my is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927549" version="1" comment="libreoffice-l10n-nb is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927550" version="1" comment="libreoffice-l10n-ne is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927551" version="1" comment="libreoffice-l10n-nl is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927552" version="1" comment="libreoffice-l10n-nn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927553" version="1" comment="libreoffice-l10n-nr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927554" version="1" comment="libreoffice-l10n-nso is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927555" version="1" comment="libreoffice-l10n-oc is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927556" version="1" comment="libreoffice-l10n-om is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927557" version="1" comment="libreoffice-l10n-or is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927558" version="1" comment="libreoffice-l10n-pa is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927559" version="1" comment="libreoffice-l10n-pl is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927560" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927561" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927562" version="1" comment="libreoffice-l10n-ro is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927563" version="1" comment="libreoffice-l10n-ru is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927564" version="1" comment="libreoffice-l10n-rw is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927565" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927566" version="1" comment="libreoffice-l10n-sat is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927567" version="1" comment="libreoffice-l10n-sd is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927568" version="1" comment="libreoffice-l10n-si is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927569" version="1" comment="libreoffice-l10n-sid is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927570" version="1" comment="libreoffice-l10n-sk is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927571" version="1" comment="libreoffice-l10n-sl is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927572" version="1" comment="libreoffice-l10n-sq is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927573" version="1" comment="libreoffice-l10n-sr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927574" version="1" comment="libreoffice-l10n-ss is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927575" version="1" comment="libreoffice-l10n-st is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927576" version="1" comment="libreoffice-l10n-sv is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927577" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927578" version="1" comment="libreoffice-l10n-szl is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927579" version="1" comment="libreoffice-l10n-ta is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927580" version="1" comment="libreoffice-l10n-te is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927581" version="1" comment="libreoffice-l10n-tg is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927582" version="1" comment="libreoffice-l10n-th is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927583" version="1" comment="libreoffice-l10n-tn is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927584" version="1" comment="libreoffice-l10n-tr is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927585" version="1" comment="libreoffice-l10n-ts is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927586" version="1" comment="libreoffice-l10n-tt is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927587" version="1" comment="libreoffice-l10n-ug is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927588" version="1" comment="libreoffice-l10n-uk is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927589" version="1" comment="libreoffice-l10n-uz is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927590" version="1" comment="libreoffice-l10n-ve is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927591" version="1" comment="libreoffice-l10n-vec is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927592" version="1" comment="libreoffice-l10n-vi is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927593" version="1" comment="libreoffice-l10n-xh is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927594" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927595" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927596" version="1" comment="libreoffice-l10n-zu is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927597" version="1" comment="libreoffice-librelogo is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927598" version="1" comment="libreoffice-mailmerge is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927599" version="1" comment="libreoffice-math is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927600" version="1" comment="libreoffice-officebean is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927601" version="1" comment="libreoffice-pyuno is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927602" version="1" comment="libreoffice-qt5 is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927603" version="1" comment="libreoffice-sdk is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927604" version="1" comment="libreoffice-sdk-doc is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927605" version="1" comment="libreoffice-writer is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927606" version="1" comment="libreoffice-writer-extensions is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927607" version="1" comment="libreofficekit is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927608" version="1" comment="libreofficekit-devel is &lt;7.4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927609" version="1" comment="python311 is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927610" version="1" comment="python311-32bit is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927611" version="1" comment="python311-curses is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927612" version="1" comment="python311-dbm is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927613" version="1" comment="python311-idle is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927614" version="1" comment="python311-tk is &lt;3.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927615" version="1" comment="ctdb is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927616" version="1" comment="ctdb-pcp-pmda is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927617" version="1" comment="libsamba-policy-devel is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927618" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927619" version="1" comment="libsamba-policy0-python3 is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927620" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927621" version="1" comment="samba is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927622" version="1" comment="samba-ad-dc is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927623" version="1" comment="samba-ad-dc-libs is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927624" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927625" version="1" comment="samba-ceph is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927626" version="1" comment="samba-client is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927627" version="1" comment="samba-client-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927628" version="1" comment="samba-client-libs is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927629" version="1" comment="samba-client-libs-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927630" version="1" comment="samba-devel is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927631" version="1" comment="samba-devel-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927632" version="1" comment="samba-doc is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927633" version="1" comment="samba-dsdb-modules is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927634" version="1" comment="samba-gpupdate is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927635" version="1" comment="samba-ldb-ldap is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927636" version="1" comment="samba-libs is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927637" version="1" comment="samba-libs-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927638" version="1" comment="samba-libs-python3 is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927639" version="1" comment="samba-libs-python3-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927640" version="1" comment="samba-python3 is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927641" version="1" comment="samba-test is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927642" version="1" comment="samba-tool is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927643" version="1" comment="samba-winbind is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927644" version="1" comment="samba-winbind-libs is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927645" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.2+git.273.a55a83528b9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927646" version="1" comment="xmlbeans is &lt;2.6.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927647" version="1" comment="xmlbeans-scripts is &lt;2.6.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927649" version="1" comment="kernel-macros is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927650" version="1" comment="kernel-source is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927651" version="1" comment="kernel-source-vanilla is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927652" version="1" comment="libldap-data is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927653" version="1" comment="libldap2 is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927654" version="1" comment="libldap2-32bit is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927655" version="1" comment="openldap2 is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927656" version="1" comment="openldap2-back-meta is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927657" version="1" comment="openldap2-back-perl is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927658" version="1" comment="openldap2-back-sock is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927659" version="1" comment="openldap2-back-sql is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927660" version="1" comment="openldap2-client is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927661" version="1" comment="openldap2-contrib is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927662" version="1" comment="openldap2-devel is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927663" version="1" comment="openldap2-devel-32bit is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927664" version="1" comment="openldap2-devel-static is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927665" version="1" comment="openldap2-doc is &lt;2.6.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927666" version="1" comment="python310 is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927667" version="1" comment="python310-32bit is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927668" version="1" comment="python310-curses is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927669" version="1" comment="python310-dbm is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927670" version="1" comment="python310-idle is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927671" version="1" comment="python310-tk is &lt;3.10.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927672" version="1" comment="python39 is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927673" version="1" comment="python39-32bit is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927674" version="1" comment="python39-curses is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927675" version="1" comment="python39-dbm is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927676" version="1" comment="python39-idle is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927677" version="1" comment="python39-tk is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927678" version="1" comment="chromedriver is &lt;107.0.5304.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927679" version="1" comment="chromium is &lt;107.0.5304.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927680" version="1" comment="python38 is &lt;3.8.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927681" version="1" comment="python38-32bit is &lt;3.8.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927682" version="1" comment="python38-curses is &lt;3.8.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927683" version="1" comment="python38-dbm is &lt;3.8.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927684" version="1" comment="python38-idle is &lt;3.8.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927685" version="1" comment="python38-tk is &lt;3.8.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927686" version="1" comment="ganglia-web is &lt;3.7.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927687" version="1" comment="java-11-openj9 is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927688" version="1" comment="java-11-openj9-accessibility is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927689" version="1" comment="java-11-openj9-demo is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927690" version="1" comment="java-11-openj9-devel is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927691" version="1" comment="java-11-openj9-headless is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927692" version="1" comment="java-11-openj9-javadoc is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927693" version="1" comment="java-11-openj9-jmods is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927694" version="1" comment="java-11-openj9-src is &lt;11.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927695" version="1" comment="java-17-openj9 is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927696" version="1" comment="java-17-openj9-accessibility is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927697" version="1" comment="java-17-openj9-demo is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927698" version="1" comment="java-17-openj9-devel is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927699" version="1" comment="java-17-openj9-headless is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927700" version="1" comment="java-17-openj9-javadoc is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927701" version="1" comment="java-17-openj9-jmods is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927702" version="1" comment="java-17-openj9-src is &lt;17.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927703" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927704" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927705" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927706" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927707" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927708" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927709" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927710" version="1" comment="jhead is &lt;3.06.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927711" version="1" comment="php8 is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927712" version="1" comment="php8-bcmath is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927713" version="1" comment="php8-bz2 is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927714" version="1" comment="php8-calendar is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927715" version="1" comment="php8-cli is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927716" version="1" comment="php8-ctype is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927717" version="1" comment="php8-curl is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927718" version="1" comment="php8-dba is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927719" version="1" comment="php8-devel is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927720" version="1" comment="php8-dom is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927721" version="1" comment="php8-enchant is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927722" version="1" comment="php8-exif is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927723" version="1" comment="php8-ffi is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927724" version="1" comment="php8-fileinfo is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927725" version="1" comment="php8-ftp is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927726" version="1" comment="php8-gd is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927727" version="1" comment="php8-gettext is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927728" version="1" comment="php8-gmp is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927729" version="1" comment="php8-iconv is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927730" version="1" comment="php8-intl is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927731" version="1" comment="php8-ldap is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927732" version="1" comment="php8-mbstring is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927733" version="1" comment="php8-mysql is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927734" version="1" comment="php8-odbc is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927735" version="1" comment="php8-opcache is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927736" version="1" comment="php8-openssl is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927737" version="1" comment="php8-pcntl is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927738" version="1" comment="php8-pdo is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927739" version="1" comment="php8-pgsql is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927740" version="1" comment="php8-phar is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927741" version="1" comment="php8-posix is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927742" version="1" comment="php8-readline is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927743" version="1" comment="php8-shmop is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927744" version="1" comment="php8-snmp is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927745" version="1" comment="php8-soap is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927746" version="1" comment="php8-sockets is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927747" version="1" comment="php8-sodium is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927748" version="1" comment="php8-sqlite is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927749" version="1" comment="php8-sysvmsg is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927750" version="1" comment="php8-sysvsem is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927751" version="1" comment="php8-sysvshm is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927752" version="1" comment="php8-tidy is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927753" version="1" comment="php8-tokenizer is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927754" version="1" comment="php8-xmlreader is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927755" version="1" comment="php8-xmlwriter is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927756" version="1" comment="php8-xsl is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927757" version="1" comment="php8-zip is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927758" version="1" comment="php8-zlib is &lt;8.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927759" version="1" comment="redis is &lt;7.0.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927760" version="1" comment="cargo-audit-advisory-db is &lt;20221102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927762" version="1" comment="kernel-macros is &lt;6.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927763" version="1" comment="kernel-source is &lt;6.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927764" version="1" comment="kernel-source-vanilla is &lt;6.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927765" version="1" comment="go1.18 is &lt;1.18.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927766" version="1" comment="go1.18-doc is &lt;1.18.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927767" version="1" comment="go1.18-race is &lt;1.18.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927768" version="1" comment="go1.19 is &lt;1.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927769" version="1" comment="go1.19-doc is &lt;1.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927770" version="1" comment="go1.19-race is &lt;1.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927771" version="1" comment="libntfs-3g-devel is &lt;2022.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927772" version="1" comment="libntfs-3g89 is &lt;2022.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927773" version="1" comment="ntfs-3g is &lt;2022.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927774" version="1" comment="ntfsprogs is &lt;2022.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927775" version="1" comment="ntfsprogs-extra is &lt;2022.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927776" version="1" comment="python-Twisted-doc is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927777" version="1" comment="python310-Twisted is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927778" version="1" comment="python310-Twisted-all_non_platform is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927779" version="1" comment="python310-Twisted-conch is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927780" version="1" comment="python310-Twisted-conch_nacl is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927781" version="1" comment="python310-Twisted-contextvars is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927782" version="1" comment="python310-Twisted-http2 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927783" version="1" comment="python310-Twisted-serial is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927784" version="1" comment="python310-Twisted-tls is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927785" version="1" comment="python38-Twisted is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927786" version="1" comment="python38-Twisted-all_non_platform is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927787" version="1" comment="python38-Twisted-conch is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927788" version="1" comment="python38-Twisted-conch_nacl is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927789" version="1" comment="python38-Twisted-contextvars is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927790" version="1" comment="python38-Twisted-http2 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927791" version="1" comment="python38-Twisted-serial is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927792" version="1" comment="python38-Twisted-tls is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927793" version="1" comment="python39-Twisted is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927794" version="1" comment="python39-Twisted-all_non_platform is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927795" version="1" comment="python39-Twisted-conch is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927796" version="1" comment="python39-Twisted-conch_nacl is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927797" version="1" comment="python39-Twisted-contextvars is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927798" version="1" comment="python39-Twisted-http2 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927799" version="1" comment="python39-Twisted-serial is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927800" version="1" comment="python39-Twisted-tls is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927801" version="1" comment="libopenssl-3-devel is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927802" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927803" version="1" comment="libopenssl3 is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927804" version="1" comment="libopenssl3-32bit is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927805" version="1" comment="openssl-3 is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927806" version="1" comment="openssl-3-doc is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927807" version="1" comment="php7 is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927808" version="1" comment="php7-bcmath is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927809" version="1" comment="php7-bz2 is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927810" version="1" comment="php7-calendar is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927811" version="1" comment="php7-cli is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927812" version="1" comment="php7-ctype is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927813" version="1" comment="php7-curl is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927814" version="1" comment="php7-dba is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927815" version="1" comment="php7-devel is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927816" version="1" comment="php7-dom is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927817" version="1" comment="php7-enchant is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927818" version="1" comment="php7-exif is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927819" version="1" comment="php7-fileinfo is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927820" version="1" comment="php7-ftp is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927821" version="1" comment="php7-gd is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927822" version="1" comment="php7-gettext is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927823" version="1" comment="php7-gmp is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927824" version="1" comment="php7-iconv is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927825" version="1" comment="php7-intl is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927826" version="1" comment="php7-json is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927827" version="1" comment="php7-ldap is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927828" version="1" comment="php7-mbstring is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927829" version="1" comment="php7-mysql is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927830" version="1" comment="php7-odbc is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927831" version="1" comment="php7-opcache is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927832" version="1" comment="php7-openssl is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927833" version="1" comment="php7-pcntl is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927834" version="1" comment="php7-pdo is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927835" version="1" comment="php7-pgsql is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927836" version="1" comment="php7-phar is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927837" version="1" comment="php7-posix is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927838" version="1" comment="php7-readline is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927839" version="1" comment="php7-shmop is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927840" version="1" comment="php7-snmp is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927841" version="1" comment="php7-soap is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927842" version="1" comment="php7-sockets is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927843" version="1" comment="php7-sodium is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927844" version="1" comment="php7-sqlite is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927845" version="1" comment="php7-sysvmsg is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927846" version="1" comment="php7-sysvsem is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927847" version="1" comment="php7-sysvshm is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927848" version="1" comment="php7-tidy is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927849" version="1" comment="php7-tokenizer is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927850" version="1" comment="php7-xmlreader is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927851" version="1" comment="php7-xmlrpc is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927852" version="1" comment="php7-xmlwriter is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927853" version="1" comment="php7-xsl is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927854" version="1" comment="php7-zip is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927855" version="1" comment="php7-zlib is &lt;7.4.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927856" version="1" comment="OpenImageIO is &lt;2.4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927857" version="1" comment="OpenImageIO-devel is &lt;2.4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927858" version="1" comment="libOpenImageIO2_4 is &lt;2.4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927859" version="1" comment="libOpenImageIO_Util2_4 is &lt;2.4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927860" version="1" comment="python3-OpenImageIO is &lt;2.4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927861" version="1" comment="libmbedcrypto7 is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927862" version="1" comment="libmbedcrypto7-32bit is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927863" version="1" comment="libmbedtls14 is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927864" version="1" comment="libmbedtls14-32bit is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927865" version="1" comment="libmbedx509-1 is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927866" version="1" comment="libmbedx509-1-32bit is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927867" version="1" comment="mbedtls-devel is &lt;2.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927868" version="1" comment="python310-cryptography is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927869" version="1" comment="python38-cryptography is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927870" version="1" comment="python39-cryptography is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927871" version="1" comment="python310-cryptography-vectors is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927872" version="1" comment="python38-cryptography-vectors is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927873" version="1" comment="python39-cryptography-vectors is &lt;38.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927874" version="1" comment="python310 is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927875" version="1" comment="python310-32bit is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927876" version="1" comment="python310-curses is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927877" version="1" comment="python310-dbm is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927878" version="1" comment="python310-idle is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927879" version="1" comment="python310-tk is &lt;3.10.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927880" version="1" comment="python39 is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927881" version="1" comment="python39-32bit is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927882" version="1" comment="python39-curses is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927883" version="1" comment="python39-dbm is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927884" version="1" comment="python39-idle is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927885" version="1" comment="python39-tk is &lt;3.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927886" version="1" comment="sudo is &lt;1.9.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927887" version="1" comment="sudo-devel is &lt;1.9.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927888" version="1" comment="sudo-plugin-python is &lt;1.9.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927889" version="1" comment="sudo-test is &lt;1.9.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927891" version="1" comment="kernel-macros is &lt;6.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927892" version="1" comment="kernel-source is &lt;6.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927893" version="1" comment="kernel-source-vanilla is &lt;6.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927894" version="1" comment="nodejs-electron is &lt;21.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927895" version="1" comment="nodejs-electron-devel is &lt;21.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927896" version="1" comment="nodejs-electron-doc is &lt;21.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927897" version="1" comment="jasper is &lt;4.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927898" version="1" comment="libjasper-devel is &lt;4.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927899" version="1" comment="libjasper7 is &lt;4.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927900" version="1" comment="libjasper7-32bit is &lt;4.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927901" version="1" comment="git is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927902" version="1" comment="git-arch is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927903" version="1" comment="git-core is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927904" version="1" comment="git-credential-gnome-keyring is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927905" version="1" comment="git-credential-libsecret is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927906" version="1" comment="git-cvs is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927907" version="1" comment="git-daemon is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927908" version="1" comment="git-doc is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927909" version="1" comment="git-email is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927910" version="1" comment="git-gui is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927911" version="1" comment="git-p4 is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927912" version="1" comment="git-svn is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927913" version="1" comment="git-web is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927914" version="1" comment="gitk is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927915" version="1" comment="perl-Git is &lt;2.38.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927916" version="1" comment="corepack18 is &lt;18.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927917" version="1" comment="nodejs18 is &lt;18.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927918" version="1" comment="nodejs18-devel is &lt;18.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927919" version="1" comment="nodejs18-docs is &lt;18.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927920" version="1" comment="npm18 is &lt;18.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927921" version="1" comment="corepack19 is &lt;19.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927922" version="1" comment="nodejs19 is &lt;19.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927923" version="1" comment="nodejs19-devel is &lt;19.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927924" version="1" comment="nodejs19-docs is &lt;19.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927925" version="1" comment="npm19 is &lt;19.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927926" version="1" comment="coredns is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927927" version="1" comment="coredns-extras is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927928" version="1" comment="libbpf-devel is &lt;1.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927929" version="1" comment="libbpf-devel-static is &lt;1.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927930" version="1" comment="libbpf1 is &lt;1.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927931" version="1" comment="libbpf1-32bit is &lt;1.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927932" version="1" comment="velero is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927933" version="1" comment="velero-bash-completion is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927934" version="1" comment="velero-fish-completion is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927935" version="1" comment="velero-zsh-completion is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927936" version="1" comment="autotrace is &lt;0.31.1-646.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927937" version="1" comment="autotrace-devel is &lt;0.31.1-646.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927938" version="1" comment="libautotrace3 is &lt;0.31.1-646.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927939" version="1" comment="chromedriver is &lt;107.0.5304.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927940" version="1" comment="chromium is &lt;107.0.5304.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927941" version="1" comment="python311 is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927942" version="1" comment="python311-32bit is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927943" version="1" comment="python311-curses is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927944" version="1" comment="python311-dbm is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927945" version="1" comment="python311-idle is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927946" version="1" comment="python311-tk is &lt;3.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927947" version="1" comment="libvarnishapi3 is &lt;7.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927948" version="1" comment="varnish is &lt;7.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927949" version="1" comment="varnish-devel is &lt;7.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927950" version="1" comment="libpixman-1-0 is &lt;0.42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927951" version="1" comment="libpixman-1-0-32bit is &lt;0.42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927952" version="1" comment="libpixman-1-0-devel is &lt;0.42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927953" version="1" comment="bcel5_3 is &lt;5.3-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927954" version="1" comment="bcel5_3-javadoc is &lt;5.3-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927955" version="1" comment="jhead is &lt;3.06.0.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927956" version="1" comment="python is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927957" version="1" comment="python-32bit is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927958" version="1" comment="python-curses is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927959" version="1" comment="python-demo is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927960" version="1" comment="python-gdbm is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927961" version="1" comment="python-idle is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927962" version="1" comment="python-tk is &lt;2.7.18-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927963" version="1" comment="python310 is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927964" version="1" comment="python310-32bit is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927965" version="1" comment="python310-curses is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927966" version="1" comment="python310-dbm is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927967" version="1" comment="python310-idle is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927968" version="1" comment="python310-tk is &lt;3.10.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927969" version="1" comment="python38 is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927970" version="1" comment="python38-32bit is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927971" version="1" comment="python38-curses is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927972" version="1" comment="python38-dbm is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927973" version="1" comment="python38-idle is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927974" version="1" comment="python38-tk is &lt;3.8.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927975" version="1" comment="python39 is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927976" version="1" comment="python39-32bit is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927977" version="1" comment="python39-curses is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927978" version="1" comment="python39-dbm is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927979" version="1" comment="python39-idle is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927980" version="1" comment="python39-tk is &lt;3.9.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927981" version="1" comment="libfpm_pb0 is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927982" version="1" comment="libospf0 is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927983" version="1" comment="libospfapiclient0 is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927984" version="1" comment="libquagga_pb0 is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927985" version="1" comment="libzebra1 is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927986" version="1" comment="quagga is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927987" version="1" comment="quagga-devel is &lt;1.2.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927988" version="1" comment="xterm is &lt;375-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927989" version="1" comment="xterm-bin is &lt;375-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927990" version="1" comment="xterm-resize is &lt;375-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927991" version="1" comment="apache-ivy is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927992" version="1" comment="apache-ivy-javadoc is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927993" version="1" comment="exiv2 is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927994" version="1" comment="exiv2-lang is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927995" version="1" comment="libexiv2-27 is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927996" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927997" version="1" comment="libexiv2-devel is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927998" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009927999" version="1" comment="grafana is &lt;8.5.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928000" version="1" comment="libdwarf-devel is &lt;0.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928001" version="1" comment="libdwarf-devel-static is &lt;0.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928002" version="1" comment="libdwarf-doc is &lt;0.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928003" version="1" comment="libdwarf-tools is &lt;0.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928004" version="1" comment="libdwarf0 is &lt;0.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928005" version="1" comment="libtiff-devel is &lt;4.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928006" version="1" comment="libtiff-devel-32bit is &lt;4.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928007" version="1" comment="libtiff5 is &lt;4.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928008" version="1" comment="libtiff5-32bit is &lt;4.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928009" version="1" comment="tiff is &lt;4.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928010" version="1" comment="apache-sshd is &lt;2.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928011" version="1" comment="apache-sshd-javadoc is &lt;2.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928012" version="1" comment="cni is &lt;1.0.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928013" version="1" comment="cni-plugins is &lt;1.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928014" version="1" comment="ffmpeg-5 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928015" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928016" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928017" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928018" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928019" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928020" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928021" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928022" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928023" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928024" version="1" comment="libavcodec59 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928025" version="1" comment="libavcodec59-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928026" version="1" comment="libavdevice59 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928027" version="1" comment="libavdevice59-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928028" version="1" comment="libavfilter8 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928029" version="1" comment="libavfilter8-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928030" version="1" comment="libavformat59 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928031" version="1" comment="libavformat59-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928032" version="1" comment="libavutil57 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928033" version="1" comment="libavutil57-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928034" version="1" comment="libpostproc56 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928035" version="1" comment="libpostproc56-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928036" version="1" comment="libswresample4 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928037" version="1" comment="libswresample4-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928038" version="1" comment="libswscale6 is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928039" version="1" comment="libswscale6-32bit is &lt;5.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928040" version="1" comment="freerdp is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928041" version="1" comment="freerdp-devel is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928042" version="1" comment="freerdp-proxy is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928043" version="1" comment="freerdp-server is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928044" version="1" comment="freerdp-wayland is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928045" version="1" comment="libfreerdp2-2 is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928046" version="1" comment="libuwac0-0 is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928047" version="1" comment="libwinpr2-2 is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928048" version="1" comment="uwac0-0-devel is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928049" version="1" comment="winpr-devel is &lt;2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928050" version="1" comment="frr is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928051" version="1" comment="frr-devel is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928052" version="1" comment="libfrr0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928053" version="1" comment="libfrr_pb0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928054" version="1" comment="libfrrcares0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928055" version="1" comment="libfrrfpm_pb0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928056" version="1" comment="libfrrospfapiclient0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928057" version="1" comment="libfrrsnmp0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928058" version="1" comment="libfrrzmq0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928059" version="1" comment="libmlag_pb0 is &lt;8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928060" version="1" comment="grub2 is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928061" version="1" comment="grub2-branding-upstream is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928062" version="1" comment="grub2-i386-pc is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928063" version="1" comment="grub2-i386-pc-debug is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928064" version="1" comment="grub2-snapper-plugin is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928065" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928066" version="1" comment="grub2-x86_64-efi is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928067" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928068" version="1" comment="grub2-x86_64-xen is &lt;2.06-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928069" version="1" comment="MozillaFirefox is &lt;107.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928070" version="1" comment="MozillaFirefox-branding-upstream is &lt;107.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928071" version="1" comment="MozillaFirefox-devel is &lt;107.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928072" version="1" comment="MozillaFirefox-translations-common is &lt;107.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928073" version="1" comment="MozillaFirefox-translations-other is &lt;107.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928074" version="1" comment="MozillaThunderbird is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928075" version="1" comment="MozillaThunderbird-translations-common is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928076" version="1" comment="MozillaThunderbird-translations-other is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928077" version="1" comment="ffmpeg-4 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928078" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928079" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928080" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928081" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928082" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928083" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928084" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928085" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928086" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928087" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928088" version="1" comment="libavcodec58_134 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928089" version="1" comment="libavcodec58_134-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928090" version="1" comment="libavdevice58_13 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928091" version="1" comment="libavdevice58_13-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928092" version="1" comment="libavfilter7_110 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928093" version="1" comment="libavfilter7_110-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928094" version="1" comment="libavformat58_76 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928095" version="1" comment="libavformat58_76-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928096" version="1" comment="libavresample4_0 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928097" version="1" comment="libavresample4_0-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928098" version="1" comment="libavutil56_70 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928099" version="1" comment="libavutil56_70-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928100" version="1" comment="libpostproc55_9 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928101" version="1" comment="libpostproc55_9-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928102" version="1" comment="libswresample3_9 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928103" version="1" comment="libswresample3_9-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928104" version="1" comment="libswscale5_9 is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928105" version="1" comment="libswscale5_9-32bit is &lt;4.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928106" version="1" comment="radare2 is &lt;5.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928107" version="1" comment="radare2-devel is &lt;5.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928108" version="1" comment="radare2-zsh-completion is &lt;5.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928109" version="1" comment="Botan is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928110" version="1" comment="Botan-doc is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928111" version="1" comment="libbotan-2-19 is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928112" version="1" comment="libbotan-2-19-32bit is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928113" version="1" comment="libbotan-devel is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928114" version="1" comment="libbotan-devel-32bit is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928115" version="1" comment="python3-botan is &lt;2.19.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928116" version="1" comment="freerdp is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928117" version="1" comment="freerdp-devel is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928118" version="1" comment="freerdp-proxy is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928119" version="1" comment="freerdp-server is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928120" version="1" comment="freerdp-wayland is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928121" version="1" comment="libfreerdp2-2 is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928122" version="1" comment="libuwac0-0 is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928123" version="1" comment="libwinpr2-2 is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928124" version="1" comment="uwac0-0-devel is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928125" version="1" comment="winpr-devel is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928126" version="1" comment="krb5 is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928127" version="1" comment="krb5-32bit is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928128" version="1" comment="krb5-client is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928129" version="1" comment="krb5-devel is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928130" version="1" comment="krb5-devel-32bit is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928131" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928132" version="1" comment="krb5-plugin-preauth-otp is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928133" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928134" version="1" comment="krb5-plugin-preauth-spake is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928135" version="1" comment="krb5-server is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928136" version="1" comment="ctdb is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928137" version="1" comment="ctdb-pcp-pmda is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928138" version="1" comment="libsamba-policy-devel is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928139" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928140" version="1" comment="libsamba-policy0-python3 is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928141" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928142" version="1" comment="samba is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928143" version="1" comment="samba-ad-dc is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928144" version="1" comment="samba-ad-dc-libs is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928145" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928146" version="1" comment="samba-ceph is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928147" version="1" comment="samba-client is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928148" version="1" comment="samba-client-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928149" version="1" comment="samba-client-libs is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928150" version="1" comment="samba-client-libs-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928151" version="1" comment="samba-devel is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928152" version="1" comment="samba-devel-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928153" version="1" comment="samba-doc is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928154" version="1" comment="samba-dsdb-modules is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928155" version="1" comment="samba-gpupdate is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928156" version="1" comment="samba-ldb-ldap is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928157" version="1" comment="samba-libs is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928158" version="1" comment="samba-libs-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928159" version="1" comment="samba-libs-python3 is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928160" version="1" comment="samba-libs-python3-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928161" version="1" comment="samba-python3 is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928162" version="1" comment="samba-test is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928163" version="1" comment="samba-tool is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928164" version="1" comment="samba-winbind is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928165" version="1" comment="samba-winbind-libs is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928166" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.3+git.279.ff9bb8a298-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928167" version="1" comment="java-19-openjdk is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928168" version="1" comment="java-19-openjdk-accessibility is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928169" version="1" comment="java-19-openjdk-demo is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928170" version="1" comment="java-19-openjdk-devel is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928171" version="1" comment="java-19-openjdk-headless is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928172" version="1" comment="java-19-openjdk-javadoc is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928173" version="1" comment="java-19-openjdk-jmods is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928174" version="1" comment="java-19-openjdk-src is &lt;19.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928175" version="1" comment="gerbv is &lt;2.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928176" version="1" comment="gerbv-devel is &lt;2.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928177" version="1" comment="libgerbv1 is &lt;2.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928178" version="1" comment="python310-jwcrypto is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928179" version="1" comment="python38-jwcrypto is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928180" version="1" comment="python39-jwcrypto is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928181" version="1" comment="libslirp-devel is &lt;4.7.0+44-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928182" version="1" comment="libslirp0 is &lt;4.7.0+44-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928183" version="1" comment="bcel is &lt;5.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928184" version="1" comment="grafana is &lt;8.5.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928185" version="1" comment="libmozjs-102-0 is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928186" version="1" comment="mozjs102 is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928187" version="1" comment="mozjs102-devel is &lt;102.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928188" version="1" comment="testng is &lt;7.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928189" version="1" comment="testng-javadoc is &lt;7.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928190" version="1" comment="tomcat is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928191" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928192" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928193" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928194" version="1" comment="tomcat-embed is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928195" version="1" comment="tomcat-javadoc is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928196" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928197" version="1" comment="tomcat-jsvc is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928198" version="1" comment="tomcat-lib is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928199" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928200" version="1" comment="tomcat-webapps is &lt;9.0.43-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928201" version="1" comment="apache2-mod_wsgi is &lt;4.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928202" version="1" comment="busybox is &lt;1.35.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928203" version="1" comment="busybox-static is &lt;1.35.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928204" version="1" comment="busybox-testsuite is &lt;1.35.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928205" version="1" comment="busybox-warewulf3 is &lt;1.35.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928206" version="1" comment="caca-utils is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928207" version="1" comment="libcaca-devel is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928208" version="1" comment="libcaca-ruby is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928209" version="1" comment="libcaca0 is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928210" version="1" comment="libcaca0-32bit is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928211" version="1" comment="libcaca0-plugins is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928212" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928213" version="1" comment="python3-caca is &lt;0.99.beta20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928214" version="1" comment="chromedriver is &lt;107.0.5304.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928215" version="1" comment="chromium is &lt;107.0.5304.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928216" version="1" comment="libruby3_1-3_1 is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928217" version="1" comment="ruby3.1 is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928218" version="1" comment="ruby3.1-devel is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928219" version="1" comment="ruby3.1-devel-extra is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928220" version="1" comment="ruby3.1-doc is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928221" version="1" comment="ruby3.1-doc-ri is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928222" version="1" comment="libgcrypt-devel is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928223" version="1" comment="libgcrypt-devel-32bit is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928224" version="1" comment="libgcrypt20 is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928225" version="1" comment="libgcrypt20-32bit is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928226" version="1" comment="libgcrypt20-hmac is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928227" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928228" version="1" comment="emacs is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928229" version="1" comment="emacs-el is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928230" version="1" comment="emacs-eln is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928231" version="1" comment="emacs-info is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928232" version="1" comment="emacs-nox is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928233" version="1" comment="emacs-x11 is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928234" version="1" comment="etags is &lt;28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928235" version="1" comment="ovmf is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928236" version="1" comment="ovmf-tools is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928237" version="1" comment="qemu-ovmf-ia32 is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928238" version="1" comment="qemu-ovmf-x86_64 is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928239" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928240" version="1" comment="qemu-uefi-aarch32 is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928241" version="1" comment="qemu-uefi-aarch64 is &lt;202211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928242" version="1" comment="capnproto is &lt;0.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928243" version="1" comment="libcapnp-0_10_3 is &lt;0.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928244" version="1" comment="libcapnp-devel is &lt;0.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928245" version="1" comment="MozillaThunderbird is &lt;102.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928246" version="1" comment="MozillaThunderbird-translations-common is &lt;102.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928247" version="1" comment="MozillaThunderbird-translations-other is &lt;102.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928248" version="1" comment="chromedriver is &lt;108.0.5359.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928249" version="1" comment="chromium is &lt;108.0.5359.71-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928250" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928251" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928252" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928253" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928254" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928255" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928256" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.352-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928257" version="1" comment="chromedriver is &lt;108.0.5359.94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928258" version="1" comment="chromium is &lt;108.0.5359.94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928259" version="1" comment="exiv2 is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928260" version="1" comment="exiv2-lang is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928261" version="1" comment="libexiv2-27 is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928262" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928263" version="1" comment="libexiv2-devel is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928264" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928265" version="1" comment="apache-commons-net is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928266" version="1" comment="apache-commons-net-javadoc is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928267" version="1" comment="containerd is &lt;1.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928268" version="1" comment="containerd-ctr is &lt;1.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928269" version="1" comment="containerd-devel is &lt;1.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928270" version="1" comment="python310-slixmpp is &lt;1.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928271" version="1" comment="python38-slixmpp is &lt;1.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928272" version="1" comment="python39-slixmpp is &lt;1.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928273" version="1" comment="go1.18 is &lt;1.18.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928274" version="1" comment="go1.18-doc is &lt;1.18.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928275" version="1" comment="go1.18-race is &lt;1.18.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928276" version="1" comment="go1.19 is &lt;1.19.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928277" version="1" comment="go1.19-doc is &lt;1.19.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928278" version="1" comment="go1.19-race is &lt;1.19.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928279" version="1" comment="nodejs-electron is &lt;21.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928280" version="1" comment="nodejs-electron-devel is &lt;21.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928281" version="1" comment="nodejs-electron-doc is &lt;21.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928282" version="1" comment="phoronix-test-suite is &lt;10.8.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928283" version="1" comment="podman is &lt;4.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928284" version="1" comment="podman-cni-config is &lt;4.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928285" version="1" comment="podman-docker is &lt;4.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928286" version="1" comment="podman-remote is &lt;4.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928287" version="1" comment="python310-pycapnp is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928288" version="1" comment="python38-pycapnp is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928289" version="1" comment="python39-pycapnp is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928290" version="1" comment="containerd is &lt;1.6.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928291" version="1" comment="containerd-ctr is &lt;1.6.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928292" version="1" comment="containerd-devel is &lt;1.6.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928293" version="1" comment="python39 is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928294" version="1" comment="python39-32bit is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928295" version="1" comment="python39-curses is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928296" version="1" comment="python39-dbm is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928297" version="1" comment="python39-idle is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928298" version="1" comment="python39-tk is &lt;3.9.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928300" version="1" comment="kernel-macros is &lt;6.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928301" version="1" comment="kernel-source is &lt;6.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928302" version="1" comment="kernel-source-vanilla is &lt;6.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928303" version="1" comment="xen is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928304" version="1" comment="xen-devel is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928305" version="1" comment="xen-doc-html is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928306" version="1" comment="xen-libs is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928307" version="1" comment="xen-libs-32bit is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928308" version="1" comment="xen-tools is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928309" version="1" comment="xen-tools-domU is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928310" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928311" version="1" comment="librpmbuild9 is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928312" version="1" comment="rpm is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928313" version="1" comment="rpm-32bit is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928314" version="1" comment="rpm-build is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928315" version="1" comment="rpm-build-perl is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928316" version="1" comment="rpm-devel is &lt;4.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928317" version="1" comment="python310 is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928318" version="1" comment="python310-32bit is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928319" version="1" comment="python310-curses is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928320" version="1" comment="python310-dbm is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928321" version="1" comment="python310-idle is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928322" version="1" comment="python310-tk is &lt;3.10.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928323" version="1" comment="grafana is &lt;8.5.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928324" version="1" comment="libproc2-0 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928325" version="1" comment="procps4 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928326" version="1" comment="procps4-devel is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928327" version="1" comment="procps4-lang is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928328" version="1" comment="chromedriver is &lt;108.0.5359.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928329" version="1" comment="chromium is &lt;108.0.5359.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928330" version="1" comment="jettison is &lt;1.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928331" version="1" comment="jettison-javadoc is &lt;1.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928332" version="1" comment="libmozjs-102-0 is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928333" version="1" comment="mozjs102 is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928334" version="1" comment="mozjs102-devel is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928335" version="1" comment="xorg-x11-server is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928336" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928337" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928338" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928339" version="1" comment="xorg-x11-server-source is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928340" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928341" version="1" comment="xwayland is &lt;22.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928342" version="1" comment="xwayland-devel is &lt;22.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928343" version="1" comment="MozillaThunderbird is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928344" version="1" comment="MozillaThunderbird-translations-common is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928345" version="1" comment="MozillaThunderbird-translations-other is &lt;102.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928346" version="1" comment="helm is &lt;3.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928347" version="1" comment="helm-bash-completion is &lt;3.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928348" version="1" comment="helm-fish-completion is &lt;3.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928349" version="1" comment="helm-zsh-completion is &lt;3.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928350" version="1" comment="libopenssl-3-devel is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928351" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928352" version="1" comment="libopenssl3 is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928353" version="1" comment="libopenssl3-32bit is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928354" version="1" comment="openssl-3 is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928355" version="1" comment="openssl-3-doc is &lt;3.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928356" version="1" comment="libsqlite3-0 is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928357" version="1" comment="libsqlite3-0-32bit is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928358" version="1" comment="sqlite3 is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928359" version="1" comment="sqlite3-devel is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928360" version="1" comment="sqlite3-doc is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928361" version="1" comment="sqlite3-tcl is &lt;3.40.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928362" version="1" comment="python310-mitmproxy is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928363" version="1" comment="python39-mitmproxy is &lt;9.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928364" version="1" comment="libsystemd0 is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928365" version="1" comment="libsystemd0-32bit is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928366" version="1" comment="libudev1 is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928367" version="1" comment="libudev1-32bit is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928368" version="1" comment="systemd is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928369" version="1" comment="systemd-32bit is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928370" version="1" comment="systemd-container is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928371" version="1" comment="systemd-coredump is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928372" version="1" comment="systemd-devel is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928373" version="1" comment="systemd-doc is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928374" version="1" comment="systemd-experimental is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928375" version="1" comment="systemd-journal-remote is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928376" version="1" comment="systemd-lang is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928377" version="1" comment="systemd-network is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928378" version="1" comment="systemd-portable is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928379" version="1" comment="systemd-sysvcompat is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928380" version="1" comment="systemd-testsuite is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928381" version="1" comment="udev is &lt;252.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928382" version="1" comment="MozillaFirefox is &lt;108.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928383" version="1" comment="MozillaFirefox-branding-upstream is &lt;108.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928384" version="1" comment="MozillaFirefox-devel is &lt;108.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928385" version="1" comment="MozillaFirefox-translations-common is &lt;108.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928386" version="1" comment="MozillaFirefox-translations-other is &lt;108.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928387" version="1" comment="libosip2-15 is &lt;5.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928388" version="1" comment="libosip2-devel is &lt;5.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928390" version="1" comment="kernel-macros is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928391" version="1" comment="kernel-source is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928392" version="1" comment="kernel-source-vanilla is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928393" version="1" comment="libasn1-8 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928394" version="1" comment="libgssapi3 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928395" version="1" comment="libhcrypto4 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928396" version="1" comment="libhdb9 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928397" version="1" comment="libheimbase1 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928398" version="1" comment="libheimdal-devel is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928399" version="1" comment="libheimedit0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928400" version="1" comment="libheimntlm0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928401" version="1" comment="libhx509-5 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928402" version="1" comment="libkadm5clnt7 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928403" version="1" comment="libkadm5srv8 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928404" version="1" comment="libkafs0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928405" version="1" comment="libkdc2 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928406" version="1" comment="libkrb5-26 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928407" version="1" comment="libotp0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928408" version="1" comment="libroken18 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928409" version="1" comment="libsl0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928410" version="1" comment="libwind0 is &lt;7.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928411" version="1" comment="libmbedcrypto7 is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928412" version="1" comment="libmbedcrypto7-32bit is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928413" version="1" comment="libmbedtls14 is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928414" version="1" comment="libmbedtls14-32bit is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928415" version="1" comment="libmbedx509-1 is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928416" version="1" comment="libmbedx509-1-32bit is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928417" version="1" comment="mbedtls-devel is &lt;2.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928418" version="1" comment="libvlc5 is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928419" version="1" comment="libvlccore9 is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928420" version="1" comment="vlc is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928421" version="1" comment="vlc-codec-gstreamer is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928422" version="1" comment="vlc-devel is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928423" version="1" comment="vlc-jack is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928424" version="1" comment="vlc-lang is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928425" version="1" comment="vlc-noX is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928426" version="1" comment="vlc-opencv is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928427" version="1" comment="vlc-qt is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928428" version="1" comment="vlc-vdpau is &lt;3.0.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928429" version="1" comment="curl is &lt;7.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928430" version="1" comment="libcurl-devel is &lt;7.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928431" version="1" comment="libcurl-devel-32bit is &lt;7.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928432" version="1" comment="libcurl4 is &lt;7.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928433" version="1" comment="libcurl4-32bit is &lt;7.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928434" version="1" comment="apache2-mod_auth_openidc is &lt;2.4.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928435" version="1" comment="ffmpeg-4 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928436" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928437" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928438" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928439" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928440" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928441" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928442" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928443" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928444" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928445" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928446" version="1" comment="libavcodec58_134 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928447" version="1" comment="libavcodec58_134-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928448" version="1" comment="libavdevice58_13 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928449" version="1" comment="libavdevice58_13-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928450" version="1" comment="libavfilter7_110 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928451" version="1" comment="libavfilter7_110-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928452" version="1" comment="libavformat58_76 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928453" version="1" comment="libavformat58_76-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928454" version="1" comment="libavresample4_0 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928455" version="1" comment="libavresample4_0-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928456" version="1" comment="libavutil56_70 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928457" version="1" comment="libavutil56_70-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928458" version="1" comment="libpostproc55_9 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928459" version="1" comment="libpostproc55_9-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928460" version="1" comment="libswresample3_9 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928461" version="1" comment="libswresample3_9-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928462" version="1" comment="libswscale5_9 is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928463" version="1" comment="libswscale5_9-32bit is &lt;4.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928464" version="1" comment="python310-py7zr is &lt;0.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928465" version="1" comment="python38-py7zr is &lt;0.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928466" version="1" comment="python39-py7zr is &lt;0.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928467" version="1" comment="ctdb is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928468" version="1" comment="ctdb-pcp-pmda is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928469" version="1" comment="libsamba-policy-devel is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928470" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928471" version="1" comment="libsamba-policy0-python3 is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928472" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928473" version="1" comment="samba is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928474" version="1" comment="samba-ad-dc is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928475" version="1" comment="samba-ad-dc-libs is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928476" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928477" version="1" comment="samba-ceph is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928478" version="1" comment="samba-client is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928479" version="1" comment="samba-client-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928480" version="1" comment="samba-client-libs is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928481" version="1" comment="samba-client-libs-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928482" version="1" comment="samba-devel is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928483" version="1" comment="samba-devel-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928484" version="1" comment="samba-doc is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928485" version="1" comment="samba-dsdb-modules is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928486" version="1" comment="samba-gpupdate is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928487" version="1" comment="samba-ldb-ldap is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928488" version="1" comment="samba-libs is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928489" version="1" comment="samba-libs-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928490" version="1" comment="samba-libs-python3 is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928491" version="1" comment="samba-libs-python3-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928492" version="1" comment="samba-python3 is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928493" version="1" comment="samba-test is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928494" version="1" comment="samba-tool is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928495" version="1" comment="samba-winbind is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928496" version="1" comment="samba-winbind-libs is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928497" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.4+git.300.305b22bfce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928498" version="1" comment="bsdtar is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928499" version="1" comment="libarchive-devel is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928500" version="1" comment="libarchive13 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928501" version="1" comment="libarchive13-32bit is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928502" version="1" comment="OpenImageIO is &lt;2.4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928503" version="1" comment="OpenImageIO-devel is &lt;2.4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928504" version="1" comment="libOpenImageIO2_4 is &lt;2.4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928505" version="1" comment="libOpenImageIO_Util2_4 is &lt;2.4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928506" version="1" comment="python3-OpenImageIO is &lt;2.4.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928507" version="1" comment="libQt5Pdf5 is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928508" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928509" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928510" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928511" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928512" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928513" version="1" comment="libqt5-qtwebengine is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928514" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928515" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928516" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928517" version="1" comment="exiv2 is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928518" version="1" comment="exiv2-lang is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928519" version="1" comment="libexiv2-27 is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928520" version="1" comment="libexiv2-27-32bit is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928521" version="1" comment="libexiv2-devel is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928522" version="1" comment="libexiv2-xmp-static is &lt;0.27.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928523" version="1" comment="ruby3.1-rubygem-puma-5 is &lt;5.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928524" version="1" comment="cacti is &lt;1.2.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928525" version="1" comment="libesmtp-devel is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928526" version="1" comment="libesmtp6_2_0 is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928527" version="1" comment="libksba-devel is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928528" version="1" comment="libksba8 is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928529" version="1" comment="python310-GitPython is &lt;3.1.30.1672298042.141cd65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928530" version="1" comment="python38-GitPython is &lt;3.1.30.1672298042.141cd65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928531" version="1" comment="python39-GitPython is &lt;3.1.30.1672298042.141cd65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928532" version="1" comment="python310-future is &lt;0.18.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928533" version="1" comment="python38-future is &lt;0.18.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928534" version="1" comment="python39-future is &lt;0.18.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928535" version="1" comment="libsnmp40 is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928536" version="1" comment="libsnmp40-32bit is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928537" version="1" comment="net-snmp is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928538" version="1" comment="net-snmp-devel is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928539" version="1" comment="net-snmp-devel-32bit is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928540" version="1" comment="perl-SNMP is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928541" version="1" comment="python310-net-snmp is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928542" version="1" comment="python38-net-snmp is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928543" version="1" comment="python39-net-snmp is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928544" version="1" comment="snmp-mibs is &lt;5.9.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928545" version="1" comment="cni is &lt;1.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928546" version="1" comment="docker-compose is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928547" version="1" comment="php8 is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928548" version="1" comment="php8-bcmath is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928549" version="1" comment="php8-bz2 is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928550" version="1" comment="php8-calendar is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928551" version="1" comment="php8-cli is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928552" version="1" comment="php8-ctype is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928553" version="1" comment="php8-curl is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928554" version="1" comment="php8-dba is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928555" version="1" comment="php8-devel is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928556" version="1" comment="php8-dom is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928557" version="1" comment="php8-enchant is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928558" version="1" comment="php8-exif is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928559" version="1" comment="php8-ffi is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928560" version="1" comment="php8-fileinfo is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928561" version="1" comment="php8-ftp is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928562" version="1" comment="php8-gd is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928563" version="1" comment="php8-gettext is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928564" version="1" comment="php8-gmp is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928565" version="1" comment="php8-iconv is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928566" version="1" comment="php8-intl is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928567" version="1" comment="php8-ldap is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928568" version="1" comment="php8-mbstring is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928569" version="1" comment="php8-mysql is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928570" version="1" comment="php8-odbc is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928571" version="1" comment="php8-opcache is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928572" version="1" comment="php8-openssl is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928573" version="1" comment="php8-pcntl is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928574" version="1" comment="php8-pdo is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928575" version="1" comment="php8-pgsql is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928576" version="1" comment="php8-phar is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928577" version="1" comment="php8-posix is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928578" version="1" comment="php8-readline is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928579" version="1" comment="php8-shmop is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928580" version="1" comment="php8-snmp is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928581" version="1" comment="php8-soap is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928582" version="1" comment="php8-sockets is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928583" version="1" comment="php8-sodium is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928584" version="1" comment="php8-sqlite is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928585" version="1" comment="php8-sysvmsg is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928586" version="1" comment="php8-sysvsem is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928587" version="1" comment="php8-sysvshm is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928588" version="1" comment="php8-tidy is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928589" version="1" comment="php8-tokenizer is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928590" version="1" comment="php8-xmlreader is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928591" version="1" comment="php8-xmlwriter is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928592" version="1" comment="php8-xsl is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928593" version="1" comment="php8-zip is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928594" version="1" comment="php8-zlib is &lt;8.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928595" version="1" comment="libpainter0 is &lt;0.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928596" version="1" comment="librfxencode0 is &lt;0.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928597" version="1" comment="xrdp is &lt;0.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928598" version="1" comment="xrdp-devel is &lt;0.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928599" version="1" comment="cmctl is &lt;1.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928600" version="1" comment="libtiff-devel is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928601" version="1" comment="libtiff-devel-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928602" version="1" comment="libtiff6 is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928603" version="1" comment="libtiff6-32bit is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928604" version="1" comment="tiff is &lt;4.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928605" version="1" comment="chromedriver is &lt;109.0.5414.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928606" version="1" comment="chromium is &lt;109.0.5414.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928607" version="1" comment="postgresql-jdbc is &lt;42.2.25-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928608" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.25-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928609" version="1" comment="cargo1.65 is &lt;1.65.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928610" version="1" comment="rust1.65 is &lt;1.65.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928611" version="1" comment="cargo1.66 is &lt;1.66.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928612" version="1" comment="rust1.66 is &lt;1.66.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928613" version="1" comment="nodejs-electron is &lt;21.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928614" version="1" comment="nodejs-electron-devel is &lt;21.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928615" version="1" comment="nodejs-electron-doc is &lt;21.3.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928616" version="1" comment="rage-encryption is &lt;0.9.0+0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928617" version="1" comment="rage-encryption-bash-completion is &lt;0.9.0+0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928618" version="1" comment="squirrel is &lt;3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928619" version="1" comment="squirrel-devel is &lt;3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928620" version="1" comment="squirrel-devel-static is &lt;3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928621" version="1" comment="squirrel-doc is &lt;3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928622" version="1" comment="squirrel-examples is &lt;3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928623" version="1" comment="w3m is &lt;0.5.3+git20180125-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928624" version="1" comment="w3m-inline-image is &lt;0.5.3+git20180125-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928625" version="1" comment="upx is &lt;4.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928626" version="1" comment="python310-cramjam is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928627" version="1" comment="python38-cramjam is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928628" version="1" comment="python39-cramjam is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928629" version="1" comment="traefik is &lt;2.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928630" version="1" comment="wasm-pack is &lt;0.10.3~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928631" version="1" comment="libXpm-devel is &lt;3.5.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928632" version="1" comment="libXpm-devel-32bit is &lt;3.5.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928633" version="1" comment="libXpm-tools is &lt;3.5.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928634" version="1" comment="libXpm4 is &lt;3.5.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928635" version="1" comment="libXpm4-32bit is &lt;3.5.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928636" version="1" comment="mpd is &lt;0.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928637" version="1" comment="mpd-doc is &lt;0.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928638" version="1" comment="redis is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928639" version="1" comment="libtree-sitter0 is &lt;0.20.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928640" version="1" comment="tree-sitter is &lt;0.20.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928641" version="1" comment="tree-sitter-devel is &lt;0.20.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928642" version="1" comment="python310-mechanize is &lt;0.4.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928643" version="1" comment="python38-mechanize is &lt;0.4.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928644" version="1" comment="python39-mechanize is &lt;0.4.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928645" version="1" comment="libwbxml2-1 is &lt;0.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928646" version="1" comment="libwbxml2-devel is &lt;0.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928647" version="1" comment="wbxml2-tools is &lt;0.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928648" version="1" comment="MozillaFirefox is &lt;109.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928649" version="1" comment="MozillaFirefox-branding-upstream is &lt;109.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928650" version="1" comment="MozillaFirefox-devel is &lt;109.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928651" version="1" comment="MozillaFirefox-translations-common is &lt;109.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928652" version="1" comment="MozillaFirefox-translations-other is &lt;109.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928653" version="1" comment="ctags is &lt;5.8-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928654" version="1" comment="git is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928655" version="1" comment="git-arch is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928656" version="1" comment="git-core is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928657" version="1" comment="git-credential-gnome-keyring is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928658" version="1" comment="git-credential-libsecret is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928659" version="1" comment="git-cvs is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928660" version="1" comment="git-daemon is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928661" version="1" comment="git-doc is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928662" version="1" comment="git-email is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928663" version="1" comment="git-gui is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928664" version="1" comment="git-p4 is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928665" version="1" comment="git-svn is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928666" version="1" comment="git-web is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928667" version="1" comment="gitk is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928668" version="1" comment="perl-Git is &lt;2.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928669" version="1" comment="libzypp-plugin-appdata is &lt;1.0.1+git.20220816-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928670" version="1" comment="openSUSE-appdata-extra is &lt;1.0.1+git.20220816-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928671" version="1" comment="libmozjs-102-0 is &lt;102.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928672" version="1" comment="mozjs102 is &lt;102.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928673" version="1" comment="mozjs102-devel is &lt;102.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928674" version="1" comment="pdns-recursor is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928675" version="1" comment="libtss2-esys0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928676" version="1" comment="libtss2-esys0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928677" version="1" comment="libtss2-fapi1 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928678" version="1" comment="libtss2-fapi1-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928679" version="1" comment="libtss2-mu0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928680" version="1" comment="libtss2-mu0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928681" version="1" comment="libtss2-rc0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928682" version="1" comment="libtss2-rc0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928683" version="1" comment="libtss2-sys1 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928684" version="1" comment="libtss2-sys1-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928685" version="1" comment="libtss2-tcti-cmd0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928686" version="1" comment="libtss2-tcti-cmd0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928687" version="1" comment="libtss2-tcti-device0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928688" version="1" comment="libtss2-tcti-device0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928689" version="1" comment="libtss2-tcti-mssim0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928690" version="1" comment="libtss2-tcti-mssim0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928691" version="1" comment="libtss2-tcti-pcap0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928692" version="1" comment="libtss2-tcti-swtpm0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928693" version="1" comment="libtss2-tcti-swtpm0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928694" version="1" comment="libtss2-tctildr0 is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928695" version="1" comment="libtss2-tctildr0-32bit is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928696" version="1" comment="tpm2-0-tss is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928697" version="1" comment="tpm2-0-tss-devel is &lt;3.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928698" version="1" comment="EternalTerminal is &lt;6.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928699" version="1" comment="binutils is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928700" version="1" comment="binutils-devel is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928701" version="1" comment="binutils-devel-32bit is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928702" version="1" comment="binutils-gold is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928703" version="1" comment="gprofng is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928704" version="1" comment="libctf-nobfd0 is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928705" version="1" comment="libctf0 is &lt;2.39-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928706" version="1" comment="libgit2 is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928707" version="1" comment="libgit2-1_5 is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928708" version="1" comment="libgit2-devel is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928709" version="1" comment="ruby3.1-rubygem-rack is &lt;3.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928710" version="1" comment="ruby3.1-rubygem-rack-2.2 is &lt;2.2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928711" version="1" comment="apache2 is &lt;2.4.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928712" version="1" comment="ffmpeg-4 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928713" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928714" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928715" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928716" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928717" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928718" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928719" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928720" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928721" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928722" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928723" version="1" comment="libavcodec58_134 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928724" version="1" comment="libavcodec58_134-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928725" version="1" comment="libavdevice58_13 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928726" version="1" comment="libavdevice58_13-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928727" version="1" comment="libavfilter7_110 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928728" version="1" comment="libavfilter7_110-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928729" version="1" comment="libavformat58_76 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928730" version="1" comment="libavformat58_76-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928731" version="1" comment="libavresample4_0 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928732" version="1" comment="libavresample4_0-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928733" version="1" comment="libavutil56_70 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928734" version="1" comment="libavutil56_70-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928735" version="1" comment="libpostproc55_9 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928736" version="1" comment="libpostproc55_9-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928737" version="1" comment="libswresample3_9 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928738" version="1" comment="libswresample3_9-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928739" version="1" comment="libswscale5_9 is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928740" version="1" comment="libswscale5_9-32bit is &lt;4.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928741" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928742" version="1" comment="sudo is &lt;1.9.12p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928743" version="1" comment="sudo-devel is &lt;1.9.12p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928744" version="1" comment="sudo-plugin-python is &lt;1.9.12p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928745" version="1" comment="sudo-test is &lt;1.9.12p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928746" version="1" comment="aws-efs-utils is &lt;1.34.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928747" version="1" comment="python3-virtualbox is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928748" version="1" comment="virtualbox is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928749" version="1" comment="virtualbox-devel is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928750" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928751" version="1" comment="virtualbox-guest-source is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928752" version="1" comment="virtualbox-guest-tools is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928753" version="1" comment="virtualbox-host-source is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928754" version="1" comment="virtualbox-qt is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928755" version="1" comment="virtualbox-vnc is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928756" version="1" comment="virtualbox-websrv is &lt;7.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928757" version="1" comment="bind is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928758" version="1" comment="bind-doc is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928759" version="1" comment="bind-modules-bdbhpt is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928760" version="1" comment="bind-modules-generic is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928761" version="1" comment="bind-modules-ldap is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928762" version="1" comment="bind-modules-mysql is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928763" version="1" comment="bind-modules-perl is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928764" version="1" comment="bind-modules-sqlite3 is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928765" version="1" comment="bind-utils is &lt;9.18.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928766" version="1" comment="chromedriver is &lt;109.0.5414.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928767" version="1" comment="chromium is &lt;109.0.5414.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928768" version="1" comment="libtiff-devel is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928769" version="1" comment="libtiff-devel-32bit is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928770" version="1" comment="libtiff6 is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928771" version="1" comment="libtiff6-32bit is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928772" version="1" comment="tiff is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928773" version="1" comment="xen is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928774" version="1" comment="xen-devel is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928775" version="1" comment="xen-doc-html is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928776" version="1" comment="xen-libs is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928777" version="1" comment="xen-libs-32bit is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928778" version="1" comment="xen-tools is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928779" version="1" comment="xen-tools-domU is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928780" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928781" version="1" comment="python310-ciscoconfparse is &lt;1.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928782" version="1" comment="python38-ciscoconfparse is &lt;1.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928783" version="1" comment="python39-ciscoconfparse is &lt;1.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928784" version="1" comment="tmux is &lt;3.3a-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928785" version="1" comment="libwireshark16 is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928786" version="1" comment="libwiretap13 is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928787" version="1" comment="libwsutil14 is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928788" version="1" comment="wireshark is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928789" version="1" comment="wireshark-devel is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928790" version="1" comment="wireshark-ui-qt is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928791" version="1" comment="ruby3.1-rubygem-globalid is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928792" version="1" comment="binwalk is &lt;2.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928793" version="1" comment="golang-github-prometheus-prometheus is &lt;2.41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928794" version="1" comment="perl-Email-Address is &lt;1.913-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928795" version="1" comment="MozillaThunderbird is &lt;102.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928796" version="1" comment="MozillaThunderbird-translations-common is &lt;102.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928797" version="1" comment="MozillaThunderbird-translations-other is &lt;102.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928798" version="1" comment="libpkgconf-devel is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928799" version="1" comment="libpkgconf3 is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928800" version="1" comment="pkgconf is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928801" version="1" comment="pkgconf-m4 is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928802" version="1" comment="pkgconf-pkg-config is &lt;1.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928803" version="1" comment="python310-Django is &lt;4.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928804" version="1" comment="python38-Django is &lt;4.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928805" version="1" comment="python39-Django is &lt;4.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928806" version="1" comment="apr-devel is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928807" version="1" comment="libapr1-0 is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928808" version="1" comment="apr-util-devel is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928809" version="1" comment="libapr-util1-0 is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928810" version="1" comment="libapr-util1-0-dbd-mysql is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928811" version="1" comment="libapr-util1-0-dbd-pgsql is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928812" version="1" comment="libapr-util1-0-dbd-sqlite3 is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928813" version="1" comment="nodejs-electron is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928814" version="1" comment="nodejs-electron-devel is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928815" version="1" comment="nodejs-electron-doc is &lt;22.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928816" version="1" comment="sysstat is &lt;12.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928817" version="1" comment="sysstat-isag is &lt;12.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928818" version="1" comment="grafana is &lt;8.5.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928819" version="1" comment="harfbuzz-devel is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928820" version="1" comment="harfbuzz-tools is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928821" version="1" comment="libharfbuzz-gobject0 is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928822" version="1" comment="libharfbuzz-gobject0-32bit is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928823" version="1" comment="libharfbuzz-icu0 is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928824" version="1" comment="libharfbuzz-icu0-32bit is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928825" version="1" comment="libharfbuzz-subset0 is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928826" version="1" comment="libharfbuzz-subset0-32bit is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928827" version="1" comment="libharfbuzz0 is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928828" version="1" comment="libharfbuzz0-32bit is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928829" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928830" version="1" comment="java-19-openjdk is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928831" version="1" comment="java-19-openjdk-accessibility is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928832" version="1" comment="java-19-openjdk-demo is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928833" version="1" comment="java-19-openjdk-devel is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928834" version="1" comment="java-19-openjdk-headless is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928835" version="1" comment="java-19-openjdk-javadoc is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928836" version="1" comment="java-19-openjdk-jmods is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928837" version="1" comment="java-19-openjdk-src is &lt;19.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928838" version="1" comment="ceph is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928839" version="1" comment="ceph-base is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928840" version="1" comment="ceph-common is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928841" version="1" comment="ceph-fuse is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928842" version="1" comment="ceph-grafana-dashboards is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928843" version="1" comment="ceph-immutable-object-cache is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928844" version="1" comment="ceph-mds is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928845" version="1" comment="ceph-mgr is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928846" version="1" comment="ceph-mgr-cephadm is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928847" version="1" comment="ceph-mgr-dashboard is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928848" version="1" comment="ceph-mgr-diskprediction-local is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928849" version="1" comment="ceph-mgr-k8sevents is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928850" version="1" comment="ceph-mgr-modules-core is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928851" version="1" comment="ceph-mgr-rook is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928852" version="1" comment="ceph-mon is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928853" version="1" comment="ceph-osd is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928854" version="1" comment="ceph-prometheus-alerts is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928855" version="1" comment="ceph-radosgw is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928856" version="1" comment="cephadm is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928857" version="1" comment="cephfs-mirror is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928858" version="1" comment="cephfs-shell is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928859" version="1" comment="cephfs-top is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928860" version="1" comment="libcephfs-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928861" version="1" comment="libcephfs2 is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928862" version="1" comment="libcephsqlite is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928863" version="1" comment="libcephsqlite-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928864" version="1" comment="librados-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928865" version="1" comment="librados2 is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928866" version="1" comment="libradospp-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928867" version="1" comment="librbd-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928868" version="1" comment="librbd1 is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928869" version="1" comment="librgw-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928870" version="1" comment="librgw2 is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928871" version="1" comment="python3-ceph-argparse is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928872" version="1" comment="python3-ceph-common is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928873" version="1" comment="python3-cephfs is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928874" version="1" comment="python3-rados is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928875" version="1" comment="python3-rbd is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928876" version="1" comment="python3-rgw is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928877" version="1" comment="rados-objclass-devel is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928878" version="1" comment="rbd-fuse is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928879" version="1" comment="rbd-mirror is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928880" version="1" comment="rbd-nbd is &lt;16.2.11.58+g38d6afd3b78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928881" version="1" comment="java-11-openjdk is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928882" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928883" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928884" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928885" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928886" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928887" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928888" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928889" version="1" comment="xorg-x11-server is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928890" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928891" version="1" comment="xorg-x11-server-extra is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928892" version="1" comment="xorg-x11-server-sdk is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928893" version="1" comment="xorg-x11-server-source is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928894" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928895" version="1" comment="xwayland is &lt;22.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928896" version="1" comment="xwayland-devel is &lt;22.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928897" version="1" comment="caddy is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928898" version="1" comment="helm is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928899" version="1" comment="helm-bash-completion is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928900" version="1" comment="helm-fish-completion is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928901" version="1" comment="helm-zsh-completion is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928902" version="1" comment="helmfile is &lt;0.150.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928903" version="1" comment="java-17-openjdk is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928904" version="1" comment="java-17-openjdk-accessibility is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928905" version="1" comment="java-17-openjdk-demo is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928906" version="1" comment="java-17-openjdk-devel is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928907" version="1" comment="java-17-openjdk-headless is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928908" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928909" version="1" comment="java-17-openjdk-jmods is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928910" version="1" comment="java-17-openjdk-src is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928911" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928912" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928913" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928914" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928915" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928916" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928917" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928918" version="1" comment="less is &lt;608-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928919" version="1" comment="pesign is &lt;113-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928920" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928921" version="1" comment="libQt6Core6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928922" version="1" comment="libQt6DBus6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928923" version="1" comment="libQt6Gui6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928924" version="1" comment="libQt6Network6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928925" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928926" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928927" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928928" version="1" comment="libQt6Sql6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928929" version="1" comment="libQt6Test6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928930" version="1" comment="libQt6Widgets6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928931" version="1" comment="libQt6Xml6 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928932" version="1" comment="qt6-base-common-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928933" version="1" comment="qt6-base-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928934" version="1" comment="qt6-base-examples is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928935" version="1" comment="qt6-base-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928936" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928937" version="1" comment="qt6-core-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928938" version="1" comment="qt6-core-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928939" version="1" comment="qt6-dbus-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928940" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928941" version="1" comment="qt6-docs-common is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928942" version="1" comment="qt6-gui-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928943" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928944" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928945" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928946" version="1" comment="qt6-network-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928947" version="1" comment="qt6-network-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928948" version="1" comment="qt6-network-tls is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928949" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928950" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928951" version="1" comment="qt6-opengl-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928952" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928953" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928954" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928955" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928956" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928957" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928958" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928959" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928960" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928961" version="1" comment="qt6-sql-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928962" version="1" comment="qt6-sql-mysql is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928963" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928964" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928965" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928966" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928967" version="1" comment="qt6-test-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928968" version="1" comment="qt6-test-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928969" version="1" comment="qt6-widgets-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928970" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928971" version="1" comment="qt6-xml-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928972" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928973" version="1" comment="c-ares-devel is &lt;1.19.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928974" version="1" comment="c-ares-utils is &lt;1.19.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928975" version="1" comment="libcares2 is &lt;1.19.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928976" version="1" comment="libcares2-32bit is &lt;1.19.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928977" version="1" comment="chromedriver is &lt;110.0.5481.77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928978" version="1" comment="chromium is &lt;110.0.5481.77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928979" version="1" comment="nova is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928980" version="1" comment="postgresql12 is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928981" version="1" comment="postgresql12-contrib is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928982" version="1" comment="postgresql12-devel is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928983" version="1" comment="postgresql12-docs is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928984" version="1" comment="postgresql12-llvmjit is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928985" version="1" comment="postgresql12-llvmjit-devel is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928986" version="1" comment="postgresql12-plperl is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928987" version="1" comment="postgresql12-plpython is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928988" version="1" comment="postgresql12-pltcl is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928989" version="1" comment="postgresql12-server is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928990" version="1" comment="postgresql12-server-devel is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928991" version="1" comment="postgresql12-test is &lt;12.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928992" version="1" comment="postgresql13 is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928993" version="1" comment="postgresql13-contrib is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928994" version="1" comment="postgresql13-devel is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928995" version="1" comment="postgresql13-docs is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928996" version="1" comment="postgresql13-llvmjit is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928997" version="1" comment="postgresql13-llvmjit-devel is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928998" version="1" comment="postgresql13-plperl is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009928999" version="1" comment="postgresql13-plpython is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929000" version="1" comment="postgresql13-pltcl is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929001" version="1" comment="postgresql13-server is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929002" version="1" comment="postgresql13-server-devel is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929003" version="1" comment="postgresql13-test is &lt;13.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929004" version="1" comment="postgresql14 is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929005" version="1" comment="postgresql14-contrib is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929006" version="1" comment="postgresql14-devel is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929007" version="1" comment="postgresql14-docs is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929008" version="1" comment="postgresql14-llvmjit is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929009" version="1" comment="postgresql14-llvmjit-devel is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929010" version="1" comment="postgresql14-plperl is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929011" version="1" comment="postgresql14-plpython is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929012" version="1" comment="postgresql14-pltcl is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929013" version="1" comment="postgresql14-server is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929014" version="1" comment="postgresql14-server-devel is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929015" version="1" comment="postgresql14-test is &lt;14.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929016" version="1" comment="libecpg6 is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929017" version="1" comment="libecpg6-32bit is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929018" version="1" comment="libpq5 is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929019" version="1" comment="libpq5-32bit is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929020" version="1" comment="postgresql15 is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929021" version="1" comment="postgresql15-contrib is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929022" version="1" comment="postgresql15-devel is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929023" version="1" comment="postgresql15-docs is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929024" version="1" comment="postgresql15-llvmjit is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929025" version="1" comment="postgresql15-llvmjit-devel is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929026" version="1" comment="postgresql15-plperl is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929027" version="1" comment="postgresql15-plpython is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929028" version="1" comment="postgresql15-pltcl is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929029" version="1" comment="postgresql15-server is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929030" version="1" comment="postgresql15-server-devel is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929031" version="1" comment="postgresql15-test is &lt;15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929032" version="1" comment="python310-cryptography is &lt;39.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929033" version="1" comment="python38-cryptography is &lt;39.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929034" version="1" comment="python39-cryptography is &lt;39.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929035" version="1" comment="k9s is &lt;0.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929036" version="1" comment="pluto is &lt;5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929037" version="1" comment="pluto-bash-completion is &lt;5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929038" version="1" comment="pluto-fish-completion is &lt;5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929039" version="1" comment="pluto-zsh-completion is &lt;5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929040" version="1" comment="python310-pywayland is &lt;0.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929041" version="1" comment="python38-pywayland is &lt;0.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929042" version="1" comment="python39-pywayland is &lt;0.4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929043" version="1" comment="qemu is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929044" version="1" comment="qemu-SLOF is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929045" version="1" comment="qemu-accel-qtest is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929046" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929047" version="1" comment="qemu-arm is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929048" version="1" comment="qemu-audio-alsa is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929049" version="1" comment="qemu-audio-dbus is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929050" version="1" comment="qemu-audio-jack is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929051" version="1" comment="qemu-audio-oss is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929052" version="1" comment="qemu-audio-pa is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929053" version="1" comment="qemu-audio-spice is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929054" version="1" comment="qemu-block-curl is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929055" version="1" comment="qemu-block-dmg is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929056" version="1" comment="qemu-block-gluster is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929057" version="1" comment="qemu-block-iscsi is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929058" version="1" comment="qemu-block-nfs is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929059" version="1" comment="qemu-block-rbd is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929060" version="1" comment="qemu-block-ssh is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929061" version="1" comment="qemu-chardev-baum is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929062" version="1" comment="qemu-chardev-spice is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929063" version="1" comment="qemu-extra is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929064" version="1" comment="qemu-guest-agent is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929065" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929066" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929067" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929068" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929069" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929070" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929071" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929072" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929073" version="1" comment="qemu-ipxe is &lt;1.0.0+-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929074" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929075" version="1" comment="qemu-ksm is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929076" version="1" comment="qemu-kvm is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929077" version="1" comment="qemu-lang is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929078" version="1" comment="qemu-microvm is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929079" version="1" comment="qemu-ppc is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929080" version="1" comment="qemu-s390x is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929081" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929082" version="1" comment="qemu-sgabios is &lt;8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929083" version="1" comment="qemu-skiboot is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929084" version="1" comment="qemu-tools is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929085" version="1" comment="qemu-ui-curses is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929086" version="1" comment="qemu-ui-dbus is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929087" version="1" comment="qemu-ui-gtk is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929088" version="1" comment="qemu-ui-opengl is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929089" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929090" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929091" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929092" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929093" version="1" comment="qemu-x86 is &lt;7.1.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929094" version="1" comment="haproxy is &lt;2.7.3+git0.1065b1000-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929095" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929096" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929097" version="1" comment="libopenssl10 is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929098" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929099" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929100" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929101" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929102" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929103" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929104" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929105" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929106" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929107" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929108" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929109" version="1" comment="libopenssl1_1 is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929110" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929111" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929112" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929113" version="1" comment="openssl-1_1 is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929114" version="1" comment="openssl-1_1-doc is &lt;1.1.1t-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929115" version="1" comment="phpMyAdmin is &lt;5.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929116" version="1" comment="phpMyAdmin-apache is &lt;5.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929117" version="1" comment="phpMyAdmin-lang is &lt;5.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929118" version="1" comment="python310-Django is &lt;4.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929119" version="1" comment="python38-Django is &lt;4.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929120" version="1" comment="python39-Django is &lt;4.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929121" version="1" comment="prometheus-ha_cluster_exporter is &lt;1.3.1+git.1676027782.ad3c0e9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929122" version="1" comment="trivy is &lt;0.37.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929123" version="1" comment="OpenImageIO is &lt;2.4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929124" version="1" comment="OpenImageIO-devel is &lt;2.4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929125" version="1" comment="libOpenImageIO2_4 is &lt;2.4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929126" version="1" comment="libOpenImageIO_Util2_4 is &lt;2.4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929127" version="1" comment="python3-OpenImageIO is &lt;2.4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929128" version="1" comment="apptainer is &lt;1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929129" version="1" comment="cilium-cli is &lt;0.12.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929130" version="1" comment="clamav is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929131" version="1" comment="clamav-devel is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929132" version="1" comment="clamav-docs-html is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929133" version="1" comment="clamav-milter is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929134" version="1" comment="libclamav9 is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929135" version="1" comment="libfreshclam2 is &lt;0.103.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929137" version="1" comment="kernel-macros is &lt;6.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929138" version="1" comment="kernel-source is &lt;6.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929139" version="1" comment="kernel-source-vanilla is &lt;6.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929140" version="1" comment="git is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929141" version="1" comment="git-arch is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929142" version="1" comment="git-core is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929143" version="1" comment="git-credential-gnome-keyring is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929144" version="1" comment="git-credential-libsecret is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929145" version="1" comment="git-cvs is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929146" version="1" comment="git-daemon is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929147" version="1" comment="git-doc is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929148" version="1" comment="git-email is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929149" version="1" comment="git-gui is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929150" version="1" comment="git-p4 is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929151" version="1" comment="git-svn is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929152" version="1" comment="git-web is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929153" version="1" comment="gitk is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929154" version="1" comment="perl-Git is &lt;2.39.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929155" version="1" comment="gnutls is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929156" version="1" comment="gnutls-guile is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929157" version="1" comment="libgnutls-dane-devel is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929158" version="1" comment="libgnutls-dane0 is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929159" version="1" comment="libgnutls-devel is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929160" version="1" comment="libgnutls-devel-32bit is &lt;3.7.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929161" version="1" comment="libgnutls30 is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929162" version="1" comment="libgnutls30-32bit is &lt;3.7.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929163" version="1" comment="libgnutls30-hmac is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929164" version="1" comment="libgnutls30-hmac-32bit is &lt;3.7.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929165" version="1" comment="libgnutlsxx-devel is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929166" version="1" comment="libgnutlsxx30 is &lt;3.7.9-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929167" version="1" comment="grafana is &lt;8.5.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929168" version="1" comment="gssntlmssp is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929169" version="1" comment="gssntlmssp-devel is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929170" version="1" comment="libmozjs-102-0 is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929171" version="1" comment="mozjs102 is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929172" version="1" comment="mozjs102-devel is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929173" version="1" comment="libmruby3_1_0 is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929174" version="1" comment="libmruby_core3_1_0 is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929175" version="1" comment="mruby is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929176" version="1" comment="mruby-devel is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929177" version="1" comment="ucode-intel is &lt;20230214-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929178" version="1" comment="warewulf4 is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929179" version="1" comment="warewulf4-api is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929180" version="1" comment="warewulf4-ipxe is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929181" version="1" comment="warewulf4-overlay is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929182" version="1" comment="warewulf4-slurm is &lt;4.4.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929183" version="1" comment="amanda is &lt;3.5.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929184" version="1" comment="go1.19 is &lt;1.19.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929185" version="1" comment="go1.19-doc is &lt;1.19.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929186" version="1" comment="go1.19-race is &lt;1.19.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929187" version="1" comment="go1.20 is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929188" version="1" comment="go1.20-doc is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929189" version="1" comment="go1.20-race is &lt;1.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929190" version="1" comment="gstreamer-plugins-good is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929191" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929192" version="1" comment="gstreamer-plugins-good-extra is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929193" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929194" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929195" version="1" comment="gstreamer-plugins-good-jack is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929196" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929197" version="1" comment="gstreamer-plugins-good-lang is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929198" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.22.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929199" version="1" comment="nodejs-electron is &lt;22.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929200" version="1" comment="nodejs-electron-devel is &lt;22.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929201" version="1" comment="nodejs-electron-doc is &lt;22.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929202" version="1" comment="php8 is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929203" version="1" comment="php8-bcmath is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929204" version="1" comment="php8-bz2 is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929205" version="1" comment="php8-calendar is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929206" version="1" comment="php8-cli is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929207" version="1" comment="php8-ctype is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929208" version="1" comment="php8-curl is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929209" version="1" comment="php8-dba is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929210" version="1" comment="php8-devel is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929211" version="1" comment="php8-dom is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929212" version="1" comment="php8-enchant is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929213" version="1" comment="php8-exif is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929214" version="1" comment="php8-ffi is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929215" version="1" comment="php8-fileinfo is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929216" version="1" comment="php8-ftp is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929217" version="1" comment="php8-gd is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929218" version="1" comment="php8-gettext is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929219" version="1" comment="php8-gmp is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929220" version="1" comment="php8-iconv is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929221" version="1" comment="php8-intl is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929222" version="1" comment="php8-ldap is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929223" version="1" comment="php8-mbstring is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929224" version="1" comment="php8-mysql is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929225" version="1" comment="php8-odbc is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929226" version="1" comment="php8-opcache is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929227" version="1" comment="php8-openssl is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929228" version="1" comment="php8-pcntl is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929229" version="1" comment="php8-pdo is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929230" version="1" comment="php8-pgsql is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929231" version="1" comment="php8-phar is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929232" version="1" comment="php8-posix is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929233" version="1" comment="php8-readline is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929234" version="1" comment="php8-shmop is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929235" version="1" comment="php8-snmp is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929236" version="1" comment="php8-soap is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929237" version="1" comment="php8-sockets is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929238" version="1" comment="php8-sodium is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929239" version="1" comment="php8-sqlite is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929240" version="1" comment="php8-sysvmsg is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929241" version="1" comment="php8-sysvsem is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929242" version="1" comment="php8-sysvshm is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929243" version="1" comment="php8-tidy is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929244" version="1" comment="php8-tokenizer is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929245" version="1" comment="php8-xmlreader is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929246" version="1" comment="php8-xmlwriter is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929247" version="1" comment="php8-xsl is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929248" version="1" comment="php8-zip is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929249" version="1" comment="php8-zlib is &lt;8.1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929250" version="1" comment="libruby3_2-3_2 is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929251" version="1" comment="ruby3.2 is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929252" version="1" comment="ruby3.2-devel is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929253" version="1" comment="ruby3.2-devel-extra is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929254" version="1" comment="ruby3.2-doc is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929255" version="1" comment="ruby3.2-doc-ri is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929256" version="1" comment="MozillaThunderbird is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929257" version="1" comment="MozillaThunderbird-translations-common is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929258" version="1" comment="MozillaThunderbird-translations-other is &lt;102.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929259" version="1" comment="davix is &lt;0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929260" version="1" comment="davix-devel is &lt;0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929261" version="1" comment="libdavix0 is &lt;0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929262" version="1" comment="xen is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929263" version="1" comment="xen-devel is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929264" version="1" comment="xen-doc-html is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929265" version="1" comment="xen-libs is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929266" version="1" comment="xen-libs-32bit is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929267" version="1" comment="xen-tools is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929268" version="1" comment="xen-tools-domU is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929269" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.0_04-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929270" version="1" comment="libopenssl-3-devel is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929271" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929272" version="1" comment="libopenssl3 is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929273" version="1" comment="libopenssl3-32bit is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929274" version="1" comment="libopenssl3-hmac is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929275" version="1" comment="libopenssl3-hmac-32bit is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929276" version="1" comment="openssl-3 is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929277" version="1" comment="openssl-3-doc is &lt;3.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929278" version="1" comment="binutils is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929279" version="1" comment="binutils-devel is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929280" version="1" comment="binutils-devel-32bit is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929281" version="1" comment="binutils-gold is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929282" version="1" comment="gprofng is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929283" version="1" comment="libctf-nobfd0 is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929284" version="1" comment="libctf0 is &lt;2.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929285" version="1" comment="bitwarden is &lt;2023.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929286" version="1" comment="java-13-openjdk is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929287" version="1" comment="java-13-openjdk-demo is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929288" version="1" comment="java-13-openjdk-devel is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929289" version="1" comment="java-13-openjdk-headless is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929290" version="1" comment="java-13-openjdk-javadoc is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929291" version="1" comment="java-13-openjdk-jmods is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929292" version="1" comment="java-13-openjdk-src is &lt;13.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929293" version="1" comment="java-15-openjdk is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929294" version="1" comment="java-15-openjdk-demo is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929295" version="1" comment="java-15-openjdk-devel is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929296" version="1" comment="java-15-openjdk-headless is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929297" version="1" comment="java-15-openjdk-javadoc is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929298" version="1" comment="java-15-openjdk-jmods is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929299" version="1" comment="java-15-openjdk-src is &lt;15.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929300" version="1" comment="emacs is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929301" version="1" comment="emacs-el is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929302" version="1" comment="emacs-eln is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929303" version="1" comment="emacs-info is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929304" version="1" comment="emacs-nox is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929305" version="1" comment="emacs-x11 is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929306" version="1" comment="etags is &lt;28.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929307" version="1" comment="epiphany is &lt;43.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929308" version="1" comment="epiphany-branding-upstream is &lt;43.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929309" version="1" comment="epiphany-lang is &lt;43.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929310" version="1" comment="gnome-shell-search-provider-epiphany is &lt;43.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929311" version="1" comment="grafana is &lt;9.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929312" version="1" comment="chromedriver is &lt;110.0.5481.177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929313" version="1" comment="chromium is &lt;110.0.5481.177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929314" version="1" comment="corepack18 is &lt;18.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929315" version="1" comment="nodejs18 is &lt;18.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929316" version="1" comment="nodejs18-devel is &lt;18.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929317" version="1" comment="nodejs18-docs is &lt;18.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929318" version="1" comment="npm18 is &lt;18.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929319" version="1" comment="corepack19 is &lt;19.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929320" version="1" comment="nodejs19 is &lt;19.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929321" version="1" comment="nodejs19-devel is &lt;19.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929322" version="1" comment="nodejs19-docs is &lt;19.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929323" version="1" comment="npm19 is &lt;19.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929324" version="1" comment="rustup is &lt;1.25.2~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929325" version="1" comment="sccache is &lt;0.4.0pre.7~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929326" version="1" comment="terraform-provider-helm is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929327" version="1" comment="libtiff-devel is &lt;4.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929328" version="1" comment="libtiff-devel-32bit is &lt;4.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929329" version="1" comment="libtiff6 is &lt;4.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929330" version="1" comment="libtiff6-32bit is &lt;4.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929331" version="1" comment="tiff is &lt;4.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929332" version="1" comment="dnsdist is &lt;1.8.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929333" version="1" comment="grafana is &lt;9.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929334" version="1" comment="mlterm is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929335" version="1" comment="mlterm-common is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929336" version="1" comment="mlterm-fcitx is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929337" version="1" comment="mlterm-ibus is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929338" version="1" comment="mlterm-m17n is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929339" version="1" comment="mlterm-scim is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929340" version="1" comment="mlterm-sdl2 is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929341" version="1" comment="mlterm-uim is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929342" version="1" comment="mlterm-wnn is &lt;3.9.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929343" version="1" comment="peazip is &lt;9.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929344" version="1" comment="peazip-kf5 is &lt;9.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929345" version="1" comment="curl is &lt;7.88.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929346" version="1" comment="libcurl-devel is &lt;7.88.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929347" version="1" comment="libcurl-devel-32bit is &lt;7.88.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929348" version="1" comment="libcurl4 is &lt;7.88.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929349" version="1" comment="libcurl4-32bit is &lt;7.88.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929350" version="1" comment="qemu is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929351" version="1" comment="qemu-SLOF is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929352" version="1" comment="qemu-accel-qtest is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929353" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929354" version="1" comment="qemu-arm is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929355" version="1" comment="qemu-audio-alsa is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929356" version="1" comment="qemu-audio-dbus is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929357" version="1" comment="qemu-audio-jack is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929358" version="1" comment="qemu-audio-oss is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929359" version="1" comment="qemu-audio-pa is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929360" version="1" comment="qemu-audio-spice is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929361" version="1" comment="qemu-block-curl is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929362" version="1" comment="qemu-block-dmg is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929363" version="1" comment="qemu-block-gluster is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929364" version="1" comment="qemu-block-iscsi is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929365" version="1" comment="qemu-block-nfs is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929366" version="1" comment="qemu-block-rbd is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929367" version="1" comment="qemu-block-ssh is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929368" version="1" comment="qemu-chardev-baum is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929369" version="1" comment="qemu-chardev-spice is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929370" version="1" comment="qemu-extra is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929371" version="1" comment="qemu-guest-agent is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929372" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929373" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929374" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929375" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929376" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929377" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929378" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929379" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929380" version="1" comment="qemu-ipxe is &lt;1.0.0+-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929381" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929382" version="1" comment="qemu-ksm is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929383" version="1" comment="qemu-kvm is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929384" version="1" comment="qemu-lang is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929385" version="1" comment="qemu-microvm is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929386" version="1" comment="qemu-ppc is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929387" version="1" comment="qemu-s390x is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929388" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929389" version="1" comment="qemu-sgabios is &lt;8-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929390" version="1" comment="qemu-skiboot is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929391" version="1" comment="qemu-tools is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929392" version="1" comment="qemu-ui-curses is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929393" version="1" comment="qemu-ui-dbus is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929394" version="1" comment="qemu-ui-gtk is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929395" version="1" comment="qemu-ui-opengl is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929396" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929397" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929398" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929399" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929400" version="1" comment="qemu-x86 is &lt;7.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929401" version="1" comment="kubernetes1.22-apiserver is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929402" version="1" comment="kubernetes1.22-client is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929403" version="1" comment="kubernetes1.22-client-common is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929404" version="1" comment="kubernetes1.22-controller-manager is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929405" version="1" comment="kubernetes1.22-kubeadm is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929406" version="1" comment="kubernetes1.22-kubelet is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929407" version="1" comment="kubernetes1.22-kubelet-common is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929408" version="1" comment="kubernetes1.22-proxy is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929409" version="1" comment="kubernetes1.22-scheduler is &lt;1.22.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929410" version="1" comment="cloud-init is &lt;23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929411" version="1" comment="cloud-init-config-suse is &lt;23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929412" version="1" comment="cloud-init-doc is &lt;23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929413" version="1" comment="libmicrohttpd-devel is &lt;0.9.76-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929414" version="1" comment="libmicrohttpd12 is &lt;0.9.76-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929415" version="1" comment="obs-service-go_modules is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929416" version="1" comment="python is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929417" version="1" comment="python-32bit is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929418" version="1" comment="python-curses is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929419" version="1" comment="python-demo is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929420" version="1" comment="python-gdbm is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929421" version="1" comment="python-idle is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929422" version="1" comment="python-tk is &lt;2.7.18-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929423" version="1" comment="python310-yarl is &lt;1.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929424" version="1" comment="python311-yarl is &lt;1.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929425" version="1" comment="python38-yarl is &lt;1.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929426" version="1" comment="python39-yarl is &lt;1.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929427" version="1" comment="redis is &lt;7.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929428" version="1" comment="tar is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929429" version="1" comment="tar-backup-scripts is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929430" version="1" comment="tar-doc is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929431" version="1" comment="tar-lang is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929432" version="1" comment="tar-rmt is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929433" version="1" comment="tar-tests is &lt;1.34-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929434" version="1" comment="gdb is &lt;12.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929435" version="1" comment="gdbserver is &lt;12.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929436" version="1" comment="newsboat is &lt;2.30.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929437" version="1" comment="newsboat-lang is &lt;2.30.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929438" version="1" comment="python38 is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929439" version="1" comment="python38-32bit is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929440" version="1" comment="python38-curses is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929441" version="1" comment="python38-dbm is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929442" version="1" comment="python38-idle is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929443" version="1" comment="python38-tk is &lt;3.8.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929444" version="1" comment="python39 is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929445" version="1" comment="python39-32bit is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929446" version="1" comment="python39-curses is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929447" version="1" comment="python39-dbm is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929448" version="1" comment="python39-idle is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929449" version="1" comment="python39-tk is &lt;3.9.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929450" version="1" comment="strongswan is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929451" version="1" comment="strongswan-doc is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929452" version="1" comment="strongswan-hmac is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929453" version="1" comment="strongswan-ipsec is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929454" version="1" comment="strongswan-libs0 is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929455" version="1" comment="strongswan-mysql is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929456" version="1" comment="strongswan-nm is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929457" version="1" comment="strongswan-sqlite is &lt;5.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929458" version="1" comment="tomcat is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929459" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929460" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929461" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929462" version="1" comment="tomcat-embed is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929463" version="1" comment="tomcat-javadoc is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929464" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929465" version="1" comment="tomcat-jsvc is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929466" version="1" comment="tomcat-lib is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929467" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929468" version="1" comment="tomcat-webapps is &lt;9.0.43-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929469" version="1" comment="gvim is &lt;9.0.1367-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929470" version="1" comment="vim is &lt;9.0.1367-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929471" version="1" comment="vim-data is &lt;9.0.1367-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929472" version="1" comment="vim-data-common is &lt;9.0.1367-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929473" version="1" comment="vim-small is &lt;9.0.1367-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929474" version="1" comment="python310 is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929475" version="1" comment="python310-32bit is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929476" version="1" comment="python310-curses is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929477" version="1" comment="python310-dbm is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929478" version="1" comment="python310-idle is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929479" version="1" comment="python310-tk is &lt;3.10.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929480" version="1" comment="MozillaFirefox is &lt;110.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929481" version="1" comment="MozillaFirefox-branding-upstream is &lt;110.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929482" version="1" comment="MozillaFirefox-devel is &lt;110.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929483" version="1" comment="MozillaFirefox-translations-common is &lt;110.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929484" version="1" comment="MozillaFirefox-translations-other is &lt;110.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929485" version="1" comment="java-11-openj9 is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929486" version="1" comment="java-11-openj9-demo is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929487" version="1" comment="java-11-openj9-devel is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929488" version="1" comment="java-11-openj9-headless is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929489" version="1" comment="java-11-openj9-javadoc is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929490" version="1" comment="java-11-openj9-jmods is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929491" version="1" comment="java-11-openj9-src is &lt;11.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929492" version="1" comment="java-17-openj9 is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929493" version="1" comment="java-17-openj9-demo is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929494" version="1" comment="java-17-openj9-devel is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929495" version="1" comment="java-17-openj9-headless is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929496" version="1" comment="java-17-openj9-javadoc is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929497" version="1" comment="java-17-openj9-jmods is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929498" version="1" comment="java-17-openj9-src is &lt;17.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929499" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929500" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929501" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929502" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929503" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929504" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929505" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.362-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929506" version="1" comment="aws-nitro-enclaves-binaryblobs-upstream is &lt;1.2.2~git0.4ccc639-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929507" version="1" comment="aws-nitro-enclaves-cli is &lt;1.2.2~git0.4ccc639-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929508" version="1" comment="system-group-ne is &lt;1.2.2~git0.4ccc639-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929509" version="1" comment="google-guest-agent is &lt;20230221.00-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929510" version="1" comment="google-osconfig-agent is &lt;20230222.00-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929511" version="1" comment="go1.20 is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929512" version="1" comment="go1.20-doc is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929513" version="1" comment="go1.20-race is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929514" version="1" comment="godot3 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929515" version="1" comment="godot3-bash-completion is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929516" version="1" comment="godot3-headless is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929517" version="1" comment="godot3-runner is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929518" version="1" comment="godot3-server is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929519" version="1" comment="adplugdb is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929520" version="1" comment="libadplug-devel is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929521" version="1" comment="libadplug2_3_3-0 is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929522" version="1" comment="libtpms-devel is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929523" version="1" comment="libtpms0 is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929524" version="1" comment="pijul is &lt;1.0.0~beta.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929525" version="1" comment="ruby3.1-rubygem-actionpack-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929526" version="1" comment="ruby3.2-rubygem-actionpack-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929527" version="1" comment="ruby3.1-rubygem-activerecord-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929528" version="1" comment="ruby3.2-rubygem-activerecord-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929529" version="1" comment="ruby3.1-rubygem-activesupport-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929530" version="1" comment="ruby3.2-rubygem-activesupport-7.0 is &lt;7.0.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929531" version="1" comment="ruby3.1-rubygem-loofah is &lt;2.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929532" version="1" comment="ruby3.2-rubygem-loofah is &lt;2.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929533" version="1" comment="ruby3.1-rubygem-rails-html-sanitizer is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929534" version="1" comment="ruby3.2-rubygem-rails-html-sanitizer is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929535" version="1" comment="go1.19 is &lt;1.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929536" version="1" comment="go1.19-doc is &lt;1.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929537" version="1" comment="go1.19-race is &lt;1.19.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929538" version="1" comment="podman is &lt;4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929539" version="1" comment="podman-cni-config is &lt;4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929540" version="1" comment="podman-docker is &lt;4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929541" version="1" comment="podman-remote is &lt;4.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929542" version="1" comment="python310-markdown-it-py is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929543" version="1" comment="python311-markdown-it-py is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929544" version="1" comment="python38-markdown-it-py is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929545" version="1" comment="python39-markdown-it-py is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929546" version="1" comment="ruby3.1-rubygem-rack is &lt;3.0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929547" version="1" comment="ruby3.2-rubygem-rack is &lt;3.0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929548" version="1" comment="gvim is &lt;9.0.1392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929549" version="1" comment="vim is &lt;9.0.1392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929550" version="1" comment="vim-data is &lt;9.0.1392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929551" version="1" comment="vim-data-common is &lt;9.0.1392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929552" version="1" comment="vim-small is &lt;9.0.1392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929553" version="1" comment="chromedriver is &lt;111.0.5563.64-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929554" version="1" comment="chromium is &lt;111.0.5563.64-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929555" version="1" comment="apache2 is &lt;2.4.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929556" version="1" comment="emacs is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929557" version="1" comment="emacs-el is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929558" version="1" comment="emacs-eln is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929559" version="1" comment="emacs-info is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929560" version="1" comment="emacs-nox is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929561" version="1" comment="emacs-x11 is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929562" version="1" comment="etags is &lt;28.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929563" version="1" comment="libQt5Pdf5 is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929564" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929565" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929566" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929567" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929568" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929569" version="1" comment="libqt5-qtwebengine is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929570" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929571" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929572" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929574" version="1" comment="kernel-macros is &lt;6.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929575" version="1" comment="kernel-source is &lt;6.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929576" version="1" comment="kernel-source-vanilla is &lt;6.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929577" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929578" version="1" comment="kubernetes1.23-client is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929579" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929580" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929581" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929582" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929583" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929584" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929585" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929586" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929587" version="1" comment="kubernetes1.24-client is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929588" version="1" comment="kubernetes1.24-client-common is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929589" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929590" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929591" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929592" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929593" version="1" comment="kubernetes1.24-proxy is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929594" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929595" version="1" comment="hotspot is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929596" version="1" comment="liferea is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929597" version="1" comment="liferea-lang is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929598" version="1" comment="ruby3.1-rubygem-rack-2.2 is &lt;2.2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929599" version="1" comment="ruby3.2-rubygem-rack-2.2 is &lt;2.2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929600" version="1" comment="libwireshark16 is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929601" version="1" comment="libwiretap13 is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929602" version="1" comment="libwsutil14 is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929603" version="1" comment="wireshark is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929604" version="1" comment="wireshark-devel is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929605" version="1" comment="wireshark-ui-qt is &lt;4.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929606" version="1" comment="libmozjs-102-0 is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929607" version="1" comment="mozjs102 is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929608" version="1" comment="mozjs102-devel is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929609" version="1" comment="oci-cli is &lt;3.23.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929610" version="1" comment="python310-Werkzeug is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929611" version="1" comment="python311-Werkzeug is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929612" version="1" comment="python38-Werkzeug is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929613" version="1" comment="python39-Werkzeug is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929614" version="1" comment="ruby3.1-rubygem-rack-2.2 is &lt;2.2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929615" version="1" comment="ruby3.2-rubygem-rack-2.2 is &lt;2.2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929616" version="1" comment="docker is &lt;20.10.23_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929617" version="1" comment="docker-bash-completion is &lt;20.10.23_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929618" version="1" comment="docker-fish-completion is &lt;20.10.23_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929619" version="1" comment="docker-zsh-completion is &lt;20.10.23_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929620" version="1" comment="MozillaThunderbird is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929621" version="1" comment="MozillaThunderbird-translations-common is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929622" version="1" comment="MozillaThunderbird-translations-other is &lt;102.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929623" version="1" comment="kubevirt-container-disk is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929624" version="1" comment="kubevirt-manifests is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929625" version="1" comment="kubevirt-tests is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929626" version="1" comment="kubevirt-virt-api is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929627" version="1" comment="kubevirt-virt-controller is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929628" version="1" comment="kubevirt-virt-exportproxy is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929629" version="1" comment="kubevirt-virt-exportserver is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929630" version="1" comment="kubevirt-virt-handler is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929631" version="1" comment="kubevirt-virt-launcher is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929632" version="1" comment="kubevirt-virt-operator is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929633" version="1" comment="kubevirt-virtctl is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929634" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929635" version="1" comment="nodejs-electron is &lt;22.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929636" version="1" comment="nodejs-electron-devel is &lt;22.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929637" version="1" comment="nodejs-electron-doc is &lt;22.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929638" version="1" comment="ruby3.1-rubygem-grpc is &lt;1.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929639" version="1" comment="ruby3.2-rubygem-grpc is &lt;1.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929640" version="1" comment="sudo is &lt;1.9.13p3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929641" version="1" comment="sudo-devel is &lt;1.9.13p3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929642" version="1" comment="sudo-plugin-python is &lt;1.9.13p3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929643" version="1" comment="sudo-test is &lt;1.9.13p3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929644" version="1" comment="xstream is &lt;1.4.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929645" version="1" comment="xstream-benchmark is &lt;1.4.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929646" version="1" comment="xstream-javadoc is &lt;1.4.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929647" version="1" comment="xstream-parent is &lt;1.4.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929648" version="1" comment="a2ps is &lt;4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929649" version="1" comment="a2ps-devel is &lt;4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929650" version="1" comment="a2ps-lang is &lt;4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929651" version="1" comment="liba2ps1 is &lt;4.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929652" version="1" comment="go1.18 is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929653" version="1" comment="go1.18-doc is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929654" version="1" comment="go1.18-race is &lt;1.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929655" version="1" comment="libopusfile0 is &lt;0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929656" version="1" comment="opusfile-devel is &lt;0.12-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929657" version="1" comment="flatpak is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929658" version="1" comment="flatpak-devel is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929659" version="1" comment="flatpak-remote-flathub is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929660" version="1" comment="flatpak-zsh-completion is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929661" version="1" comment="libflatpak0 is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929662" version="1" comment="system-user-flatpak is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929663" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929664" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929665" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929666" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929667" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929668" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929669" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929670" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929671" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929672" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929673" version="1" comment="libQt5Core5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929674" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929675" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929676" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929677" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929678" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929679" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929680" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929681" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929682" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929683" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929684" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929685" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929686" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929687" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929688" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929689" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929690" version="1" comment="libQt5Network5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929691" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929692" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929693" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929694" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929695" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929696" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929697" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929698" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929699" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929700" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929701" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929702" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929703" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929704" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929705" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929706" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929707" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929708" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929709" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929710" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929711" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929712" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929713" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929714" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929715" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929716" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929717" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929718" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929719" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929720" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929721" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929722" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929723" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929724" version="1" comment="libQt5Test5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929725" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929726" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929727" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929728" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929729" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929730" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929731" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929732" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929733" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929734" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929735" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929736" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929737" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929738" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929739" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929740" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929741" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929742" version="1" comment="cmark is &lt;0.30.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929743" version="1" comment="cmark-devel is &lt;0.30.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929744" version="1" comment="libcmark0_30_3 is &lt;0.30.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929745" version="1" comment="cockpit-d-installer is &lt;0.8.1~1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929746" version="1" comment="ruby3.1-rubygem-activesupport-7.0 is &lt;7.0.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929747" version="1" comment="ruby3.2-rubygem-activesupport-7.0 is &lt;7.0.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929748" version="1" comment="ruby3.1-rubygem-rack is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929749" version="1" comment="ruby3.2-rubygem-rack is &lt;3.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929750" version="1" comment="ucode-intel is &lt;20230214-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929751" version="1" comment="wasm-pack is &lt;0.11.0~0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929752" version="1" comment="amanda is &lt;3.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929753" version="1" comment="docker-compose is &lt;2.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929754" version="1" comment="kubernetes1.25-apiserver is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929755" version="1" comment="kubernetes1.25-client is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929756" version="1" comment="kubernetes1.25-client-common is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929757" version="1" comment="kubernetes1.25-controller-manager is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929758" version="1" comment="kubernetes1.25-kubeadm is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929759" version="1" comment="kubernetes1.25-kubelet is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929760" version="1" comment="kubernetes1.25-kubelet-common is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929761" version="1" comment="kubernetes1.25-proxy is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929762" version="1" comment="kubernetes1.25-scheduler is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929763" version="1" comment="chromedriver is &lt;111.0.5563.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929764" version="1" comment="chromium is &lt;111.0.5563.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929765" version="1" comment="curl is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929766" version="1" comment="libcurl-devel is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929767" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929768" version="1" comment="libcurl4 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929769" version="1" comment="libcurl4-32bit is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929770" version="1" comment="dino is &lt;0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929771" version="1" comment="dino-devel is &lt;0.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929773" version="1" comment="kernel-macros is &lt;6.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929774" version="1" comment="kernel-source is &lt;6.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929775" version="1" comment="kernel-source-vanilla is &lt;6.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929776" version="1" comment="liblouis-data is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929777" version="1" comment="liblouis-devel is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929778" version="1" comment="liblouis-doc is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929779" version="1" comment="liblouis-tools is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929780" version="1" comment="liblouis20 is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929781" version="1" comment="python3-louis is &lt;3.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929782" version="1" comment="binutils is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929783" version="1" comment="binutils-devel is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929784" version="1" comment="binutils-devel-32bit is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929785" version="1" comment="binutils-gold is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929786" version="1" comment="gprofng is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929787" version="1" comment="libctf-nobfd0 is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929788" version="1" comment="libctf0 is &lt;2.40-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929789" version="1" comment="ffmpeg-6 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929790" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929791" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929792" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929793" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929794" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929795" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929796" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929797" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929798" version="1" comment="ffmpeg-6-private-devel is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929799" version="1" comment="libavcodec60 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929800" version="1" comment="libavcodec60-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929801" version="1" comment="libavdevice60 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929802" version="1" comment="libavdevice60-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929803" version="1" comment="libavfilter9 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929804" version="1" comment="libavfilter9-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929805" version="1" comment="libavformat60 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929806" version="1" comment="libavformat60-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929807" version="1" comment="libavutil58 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929808" version="1" comment="libavutil58-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929809" version="1" comment="libpostproc57 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929810" version="1" comment="libpostproc57-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929811" version="1" comment="libswresample4 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929812" version="1" comment="libswresample4-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929813" version="1" comment="libswscale7 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929814" version="1" comment="libswscale7-32bit is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929815" version="1" comment="nodejs-electron is &lt;22.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929816" version="1" comment="nodejs-electron-devel is &lt;22.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929817" version="1" comment="nodejs-electron-doc is &lt;22.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929818" version="1" comment="stellarium is &lt;23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929819" version="1" comment="python310-oci-sdk is &lt;2.96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929820" version="1" comment="python311-oci-sdk is &lt;2.96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929821" version="1" comment="python38-oci-sdk is &lt;2.96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929822" version="1" comment="python39-oci-sdk is &lt;2.96.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929823" version="1" comment="tomcat is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929824" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929825" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929826" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929827" version="1" comment="tomcat-embed is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929828" version="1" comment="tomcat-javadoc is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929829" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929830" version="1" comment="tomcat-jsvc is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929831" version="1" comment="tomcat-lib is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929832" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929833" version="1" comment="tomcat-webapps is &lt;9.0.43-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929834" version="1" comment="containerd is &lt;1.6.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929835" version="1" comment="containerd-ctr is &lt;1.6.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929836" version="1" comment="containerd-devel is &lt;1.6.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929837" version="1" comment="element-web is &lt;1.11.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929838" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929839" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929840" version="1" comment="libopenssl10 is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929841" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929842" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929843" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929844" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929845" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929846" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929847" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929848" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929849" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929850" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929851" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929852" version="1" comment="libopenssl1_1 is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929853" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929854" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929855" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929856" version="1" comment="openssl-1_1 is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929857" version="1" comment="openssl-1_1-doc is &lt;1.1.1t-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929858" version="1" comment="runc is &lt;1.1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929859" version="1" comment="xorg-x11-server is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929860" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929861" version="1" comment="xorg-x11-server-extra is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929862" version="1" comment="xorg-x11-server-sdk is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929863" version="1" comment="xorg-x11-server-source is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929864" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929865" version="1" comment="libruby3_2-3_2 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929866" version="1" comment="ruby3.2 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929867" version="1" comment="ruby3.2-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929868" version="1" comment="ruby3.2-devel-extra is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929869" version="1" comment="ruby3.2-doc is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929870" version="1" comment="ruby3.2-doc-ri is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929871" version="1" comment="nodejs-electron is &lt;22.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929872" version="1" comment="nodejs-electron-devel is &lt;22.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929873" version="1" comment="nodejs-electron-doc is &lt;22.3.4-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929874" version="1" comment="ldb-tools is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929875" version="1" comment="libldb-devel is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929876" version="1" comment="libldb2 is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929877" version="1" comment="libldb2-32bit is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929878" version="1" comment="python3-ldb is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929879" version="1" comment="python3-ldb-32bit is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929880" version="1" comment="python3-ldb-devel is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929881" version="1" comment="ctdb is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929882" version="1" comment="ctdb-pcp-pmda is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929883" version="1" comment="libsamba-policy-devel is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929884" version="1" comment="libsamba-policy-python3-devel is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929885" version="1" comment="libsamba-policy0-python3 is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929886" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929887" version="1" comment="samba is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929888" version="1" comment="samba-ad-dc is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929889" version="1" comment="samba-ad-dc-libs is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929890" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929891" version="1" comment="samba-ceph is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929892" version="1" comment="samba-client is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929893" version="1" comment="samba-client-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929894" version="1" comment="samba-client-libs is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929895" version="1" comment="samba-client-libs-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929896" version="1" comment="samba-devel is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929897" version="1" comment="samba-devel-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929898" version="1" comment="samba-doc is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929899" version="1" comment="samba-dsdb-modules is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929900" version="1" comment="samba-gpupdate is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929901" version="1" comment="samba-ldb-ldap is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929902" version="1" comment="samba-libs is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929903" version="1" comment="samba-libs-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929904" version="1" comment="samba-libs-python3 is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929905" version="1" comment="samba-libs-python3-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929906" version="1" comment="samba-python3 is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929907" version="1" comment="samba-test is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929908" version="1" comment="samba-tool is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929909" version="1" comment="samba-winbind is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929910" version="1" comment="samba-winbind-libs is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929911" version="1" comment="samba-winbind-libs-32bit is &lt;4.18.1+git.298.4ccf830b2a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929912" version="1" comment="gvim is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929913" version="1" comment="vim is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929914" version="1" comment="vim-data is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929915" version="1" comment="vim-data-common is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929916" version="1" comment="vim-small is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929917" version="1" comment="xxd is &lt;9.0.1430-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929918" version="1" comment="xen is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929919" version="1" comment="xen-devel is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929920" version="1" comment="xen-doc-html is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929921" version="1" comment="xen-libs is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929922" version="1" comment="xen-libs-32bit is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929923" version="1" comment="xen-tools is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929924" version="1" comment="xen-tools-domU is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929925" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929926" version="1" comment="xwayland is &lt;23.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929927" version="1" comment="xwayland-devel is &lt;23.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929928" version="1" comment="melange is &lt;0.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929929" version="1" comment="melange-bash-completion is &lt;0.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929930" version="1" comment="melange-fish-completion is &lt;0.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929931" version="1" comment="melange-zsh-completion is &lt;0.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929932" version="1" comment="libyang-devel is &lt;2.1.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929933" version="1" comment="libyang-doc is &lt;2.1.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929934" version="1" comment="libyang2 is &lt;2.1.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929935" version="1" comment="yang-tools is &lt;2.1.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929936" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929937" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929938" version="1" comment="libopenssl10 is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929939" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929940" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929941" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929942" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929943" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929944" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929945" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929946" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929947" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929948" version="1" comment="pdns-recursor is &lt;4.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929949" version="1" comment="MozillaFirefox is &lt;111.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929950" version="1" comment="MozillaFirefox-branding-upstream is &lt;111.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929951" version="1" comment="MozillaFirefox-devel is &lt;111.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929952" version="1" comment="MozillaFirefox-translations-common is &lt;111.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929953" version="1" comment="MozillaFirefox-translations-other is &lt;111.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929954" version="1" comment="clone-master-clean-up is &lt;1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929955" version="1" comment="go1.20 is &lt;1.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929956" version="1" comment="go1.20-doc is &lt;1.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929957" version="1" comment="go1.20-libstd is &lt;1.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929958" version="1" comment="go1.20-race is &lt;1.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929959" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929960" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929961" version="1" comment="libopenssl1_1 is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929962" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929963" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929964" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929965" version="1" comment="openssl-1_1 is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929966" version="1" comment="openssl-1_1-doc is &lt;1.1.1t-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929967" version="1" comment="libz-ng2 is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929968" version="1" comment="zlib-ng-devel is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929969" version="1" comment="chromedriver is &lt;112.0.5615.49-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929970" version="1" comment="chromium is &lt;112.0.5615.49-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929971" version="1" comment="go1.19 is &lt;1.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929972" version="1" comment="go1.19-doc is &lt;1.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929973" version="1" comment="go1.19-race is &lt;1.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929974" version="1" comment="libasn1-8 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929975" version="1" comment="libgssapi3 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929976" version="1" comment="libhcrypto4 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929977" version="1" comment="libhdb9 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929978" version="1" comment="libheimbase1 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929979" version="1" comment="libheimdal-devel is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929980" version="1" comment="libheimedit0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929981" version="1" comment="libheimntlm0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929982" version="1" comment="libhx509-5 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929983" version="1" comment="libkadm5clnt7 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929984" version="1" comment="libkadm5srv8 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929985" version="1" comment="libkafs0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929986" version="1" comment="libkdc2 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929987" version="1" comment="libkrb5-26 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929988" version="1" comment="libotp0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929989" version="1" comment="libroken18 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929990" version="1" comment="libsl0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929991" version="1" comment="libwind0 is &lt;7.8.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929992" version="1" comment="tomcat is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929993" version="1" comment="tomcat-admin-webapps is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929994" version="1" comment="tomcat-docs-webapp is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929995" version="1" comment="tomcat-el-3_0-api is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929996" version="1" comment="tomcat-embed is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929997" version="1" comment="tomcat-javadoc is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929998" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009929999" version="1" comment="tomcat-jsvc is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930000" version="1" comment="tomcat-lib is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930001" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930002" version="1" comment="tomcat-webapps is &lt;9.0.43-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930003" version="1" comment="irssi is &lt;1.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930004" version="1" comment="irssi-devel is &lt;1.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930005" version="1" comment="libruby3_1-3_1 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930006" version="1" comment="ruby3.1 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930007" version="1" comment="ruby3.1-devel is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930008" version="1" comment="ruby3.1-devel-extra is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930009" version="1" comment="ruby3.1-doc is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930010" version="1" comment="ruby3.1-doc-ri is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930011" version="1" comment="tcpdump is &lt;4.99.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930012" version="1" comment="reuse is &lt;1.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930013" version="1" comment="MozillaThunderbird is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930014" version="1" comment="MozillaThunderbird-translations-common is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930015" version="1" comment="MozillaThunderbird-translations-other is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930016" version="1" comment="ghostscript is &lt;9.56.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930017" version="1" comment="ghostscript-devel is &lt;9.56.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930018" version="1" comment="ghostscript-x11 is &lt;9.56.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930019" version="1" comment="avahi is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930020" version="1" comment="avahi-autoipd is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930021" version="1" comment="avahi-compat-howl-devel is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930022" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930023" version="1" comment="avahi-lang is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930024" version="1" comment="avahi-utils is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930025" version="1" comment="libavahi-client3 is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930026" version="1" comment="libavahi-client3-32bit is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930027" version="1" comment="libavahi-common3 is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930028" version="1" comment="libavahi-common3-32bit is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930029" version="1" comment="libavahi-core7 is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930030" version="1" comment="libavahi-devel is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930031" version="1" comment="libavahi-libevent1 is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930032" version="1" comment="libdns_sd is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930033" version="1" comment="libdns_sd-32bit is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930034" version="1" comment="libhowl0 is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930035" version="1" comment="python310-avahi is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930036" version="1" comment="python311-avahi is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930037" version="1" comment="python39-avahi is &lt;0.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930038" version="1" comment="grafana is &lt;9.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930039" version="1" comment="libmozjs-102-0 is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930040" version="1" comment="mozjs102 is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930041" version="1" comment="mozjs102-devel is &lt;102.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930042" version="1" comment="viewvc is &lt;1.3.0~dev20230104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930043" version="1" comment="ImageMagick is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930044" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930045" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930046" version="1" comment="ImageMagick-devel is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930047" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930048" version="1" comment="ImageMagick-doc is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930049" version="1" comment="ImageMagick-extra is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930050" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930051" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930052" version="1" comment="libMagick++-devel is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930053" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930054" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930055" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930056" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930057" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930058" version="1" comment="perl-PerlMagick is &lt;7.1.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930059" version="1" comment="kanidm is &lt;1.1.0~alpha11~git0.d3a2a6b-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930060" version="1" comment="kanidm-clients is &lt;1.1.0~alpha11~git0.d3a2a6b-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930061" version="1" comment="kanidm-docs is &lt;1.1.0~alpha11~git0.d3a2a6b-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930062" version="1" comment="kanidm-server is &lt;1.1.0~alpha11~git0.d3a2a6b-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930063" version="1" comment="kanidm-unixd-clients is &lt;1.1.0~alpha11~git0.d3a2a6b-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930064" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930065" version="1" comment="libovn-23_03-0 is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930066" version="1" comment="openvswitch is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930067" version="1" comment="openvswitch-devel is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930068" version="1" comment="openvswitch-doc is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930069" version="1" comment="openvswitch-ipsec is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930070" version="1" comment="openvswitch-pki is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930071" version="1" comment="openvswitch-test is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930072" version="1" comment="openvswitch-vtep is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930073" version="1" comment="ovn is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930074" version="1" comment="ovn-central is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930075" version="1" comment="ovn-devel is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930076" version="1" comment="ovn-doc is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930077" version="1" comment="ovn-docker is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930078" version="1" comment="ovn-host is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930079" version="1" comment="ovn-vtep is &lt;23.03.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930080" version="1" comment="python3-ovs is &lt;3.1.0-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930081" version="1" comment="rustup is &lt;1.25.2~0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930082" version="1" comment="sccache is &lt;0.4.1~18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930083" version="1" comment="tealdeer is &lt;1.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930084" version="1" comment="tealdeer-bash-completion is &lt;1.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930085" version="1" comment="tealdeer-fish-completion is &lt;1.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930086" version="1" comment="tealdeer-zsh-completion is &lt;1.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930087" version="1" comment="wasm-pack is &lt;0.11.0~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930088" version="1" comment="libwireshark16 is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930089" version="1" comment="libwiretap13 is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930090" version="1" comment="libwsutil14 is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930091" version="1" comment="wireshark is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930092" version="1" comment="wireshark-devel is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930093" version="1" comment="wireshark-ui-qt is &lt;4.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930094" version="1" comment="keylime-ima-policy is &lt;0.2.0+git.1681457715.54484b7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930095" version="1" comment="rust-keylime is &lt;0.2.0+git.1681457715.54484b7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930096" version="1" comment="chromedriver is &lt;112.0.5615.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930097" version="1" comment="chromium is &lt;112.0.5615.121-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930098" version="1" comment="jameica is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930099" version="1" comment="jameica-devel is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930100" version="1" comment="jameica-javadoc is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930101" version="1" comment="nodejs-electron is &lt;22.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930102" version="1" comment="nodejs-electron-devel is &lt;22.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930103" version="1" comment="nodejs-electron-doc is &lt;22.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930104" version="1" comment="corepack18 is &lt;18.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930105" version="1" comment="nodejs18 is &lt;18.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930106" version="1" comment="nodejs18-devel is &lt;18.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930107" version="1" comment="nodejs18-docs is &lt;18.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930108" version="1" comment="npm18 is &lt;18.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930109" version="1" comment="jettison is &lt;1.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930110" version="1" comment="jettison-javadoc is &lt;1.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930111" version="1" comment="prometheus-postgres_exporter is &lt;0.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930112" version="1" comment="python310-redis is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930113" version="1" comment="python311-redis is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930114" version="1" comment="python39-redis is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930115" version="1" comment="redis is &lt;7.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930116" version="1" comment="chromedriver is &lt;112.0.5615.165-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930117" version="1" comment="chromium is &lt;112.0.5615.165-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930118" version="1" comment="docker-compose is &lt;2.17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930119" version="1" comment="libxml2-2 is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930120" version="1" comment="libxml2-2-32bit is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930121" version="1" comment="libxml2-devel is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930122" version="1" comment="libxml2-devel-32bit is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930123" version="1" comment="libxml2-doc is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930124" version="1" comment="libxml2-tools is &lt;2.10.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930125" version="1" comment="ruby3.2-rubygem-actionpack-7.0 is &lt;7.0.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930126" version="1" comment="ruby3.2-rubygem-activerecord-7.0 is &lt;7.0.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930127" version="1" comment="ruby3.2-rubygem-activestorage-7.0 is &lt;7.0.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930128" version="1" comment="libsubid-devel is &lt;4.13-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930129" version="1" comment="libsubid4 is &lt;4.13-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930130" version="1" comment="login_defs is &lt;4.13-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930131" version="1" comment="shadow is &lt;4.13-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930132" version="1" comment="MozillaFirefox is &lt;112.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930133" version="1" comment="MozillaFirefox-branding-upstream is &lt;112.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930134" version="1" comment="MozillaFirefox-devel is &lt;112.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930135" version="1" comment="MozillaFirefox-translations-common is &lt;112.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930136" version="1" comment="MozillaFirefox-translations-other is &lt;112.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930137" version="1" comment="arm-trusted-firmware is &lt;2.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930138" version="1" comment="arm-trusted-firmware-tools is &lt;2.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930139" version="1" comment="element-web is &lt;1.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930140" version="1" comment="libprotobuf-c-devel is &lt;1.4.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930141" version="1" comment="libprotobuf-c1 is &lt;1.4.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930142" version="1" comment="rmt-server is &lt;2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930143" version="1" comment="rmt-server-config is &lt;2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930144" version="1" comment="rmt-server-pubcloud is &lt;2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930145" version="1" comment="dnsmasq is &lt;2.89-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930146" version="1" comment="dnsmasq-utils is &lt;2.89-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930147" version="1" comment="element-web is &lt;1.11.30-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930148" version="1" comment="git is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930149" version="1" comment="git-arch is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930150" version="1" comment="git-core is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930151" version="1" comment="git-credential-gnome-keyring is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930152" version="1" comment="git-credential-libsecret is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930153" version="1" comment="git-cvs is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930154" version="1" comment="git-daemon is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930155" version="1" comment="git-doc is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930156" version="1" comment="git-email is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930157" version="1" comment="git-gui is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930158" version="1" comment="git-p4 is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930159" version="1" comment="git-svn is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930160" version="1" comment="git-web is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930161" version="1" comment="gitk is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930162" version="1" comment="perl-Git is &lt;2.40.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930163" version="1" comment="grafana is &lt;9.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930164" version="1" comment="java-11-openjdk is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930165" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930166" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930167" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930168" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930169" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930170" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930171" version="1" comment="java-17-openjdk is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930172" version="1" comment="java-17-openjdk-demo is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930173" version="1" comment="java-17-openjdk-devel is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930174" version="1" comment="java-17-openjdk-headless is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930175" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930176" version="1" comment="java-17-openjdk-jmods is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930177" version="1" comment="java-17-openjdk-src is &lt;17.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930178" version="1" comment="python310-yarl is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930179" version="1" comment="python311-yarl is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930180" version="1" comment="python39-yarl is &lt;1.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930181" version="1" comment="apptainer is &lt;1.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930182" version="1" comment="element-desktop is &lt;1.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930183" version="1" comment="etcd is &lt;3.5.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930184" version="1" comment="etcdctl is &lt;3.5.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930185" version="1" comment="etcdutl is &lt;3.5.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930186" version="1" comment="nodejs-electron is &lt;22.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930187" version="1" comment="nodejs-electron-devel is &lt;22.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930188" version="1" comment="nodejs-electron-doc is &lt;22.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930189" version="1" comment="nemo-extension-warpinator is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930190" version="1" comment="warpinator is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930191" version="1" comment="warpinator-lang is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930192" version="1" comment="restic is &lt;0.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930193" version="1" comment="restic-bash-completion is &lt;0.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930194" version="1" comment="restic-zsh-completion is &lt;0.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930195" version="1" comment="ruby3.2-rubygem-puma is &lt;6.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930196" version="1" comment="libraw-devel is &lt;0.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930197" version="1" comment="libraw-devel-static is &lt;0.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930198" version="1" comment="libraw-tools is &lt;0.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930199" version="1" comment="libraw23 is &lt;0.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930200" version="1" comment="libraw23-32bit is &lt;0.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930201" version="1" comment="librdkafka-devel is &lt;2.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930202" version="1" comment="librdkafka1 is &lt;2.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930203" version="1" comment="libmbedcrypto7 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930204" version="1" comment="libmbedcrypto7-x86-64-v3 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930205" version="1" comment="libmbedtls14 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930206" version="1" comment="libmbedtls14-x86-64-v3 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930207" version="1" comment="libmbedx509-1 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930208" version="1" comment="libmbedx509-1-x86-64-v3 is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930209" version="1" comment="mbedtls-2-devel is &lt;2.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930210" version="1" comment="prometheus-blackbox_exporter is &lt;0.19.0-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930211" version="1" comment="gvim is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930212" version="1" comment="vim is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930213" version="1" comment="vim-data is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930214" version="1" comment="vim-data-common is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930215" version="1" comment="vim-small is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930216" version="1" comment="xxd is &lt;9.0.1504-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930217" version="1" comment="editorconfig is &lt;0.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930218" version="1" comment="libeditorconfig-devel is &lt;0.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930219" version="1" comment="libeditorconfig0 is &lt;0.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930220" version="1" comment="go1.19 is &lt;1.19.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930221" version="1" comment="go1.19-doc is &lt;1.19.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930222" version="1" comment="go1.19-libstd is &lt;1.19.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930223" version="1" comment="go1.19-race is &lt;1.19.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930224" version="1" comment="go1.20 is &lt;1.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930225" version="1" comment="go1.20-doc is &lt;1.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930226" version="1" comment="go1.20-libstd is &lt;1.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930227" version="1" comment="go1.20-race is &lt;1.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930228" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930229" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930230" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930231" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930232" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930233" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930234" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930235" version="1" comment="python312 is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930236" version="1" comment="python312-curses is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930237" version="1" comment="python312-dbm is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930238" version="1" comment="python312-idle is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930239" version="1" comment="python312-tk is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930240" version="1" comment="python312-x86-64-v3 is &lt;3.12.0a7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930241" version="1" comment="libfastjson-devel is &lt;1.2304.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930242" version="1" comment="libfastjson4 is &lt;1.2304.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930243" version="1" comment="python3-virtualbox is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930244" version="1" comment="virtualbox is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930245" version="1" comment="virtualbox-devel is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930246" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930247" version="1" comment="virtualbox-guest-source is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930248" version="1" comment="virtualbox-guest-tools is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930249" version="1" comment="virtualbox-host-source is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930250" version="1" comment="virtualbox-qt is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930251" version="1" comment="virtualbox-vnc is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930252" version="1" comment="virtualbox-websrv is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930253" version="1" comment="ntp is &lt;4.2.8p15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930254" version="1" comment="ntp-dcf77-tools is &lt;4.2.8p15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930255" version="1" comment="ntp-doc is &lt;4.2.8p15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930256" version="1" comment="libssh-config is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930257" version="1" comment="libssh-devel is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930258" version="1" comment="libssh4 is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930259" version="1" comment="libssh4-32bit is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930260" version="1" comment="python-SQLAlchemy1-doc is &lt;1.4.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930261" version="1" comment="python310-SQLAlchemy1 is &lt;1.4.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930262" version="1" comment="python311-SQLAlchemy1 is &lt;1.4.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930263" version="1" comment="python39-SQLAlchemy1 is &lt;1.4.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930264" version="1" comment="system-user-velociraptor is &lt;1.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930265" version="1" comment="velociraptor is &lt;0.6.7.5~git78.2bef6fc-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930266" version="1" comment="velociraptor-kafka-humio-gateway is &lt;0.6.7.5~git78.2bef6fc-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930267" version="1" comment="xen is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930268" version="1" comment="xen-devel is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930269" version="1" comment="xen-doc-html is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930270" version="1" comment="xen-libs is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930271" version="1" comment="xen-tools is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930272" version="1" comment="xen-tools-domU is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930273" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930274" version="1" comment="libmozjs-102-0 is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930275" version="1" comment="mozjs102 is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930276" version="1" comment="mozjs102-devel is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930277" version="1" comment="rekor is &lt;1.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930278" version="1" comment="MozillaFirefox is &lt;113.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930279" version="1" comment="MozillaFirefox-branding-upstream is &lt;113.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930280" version="1" comment="MozillaFirefox-devel is &lt;113.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930281" version="1" comment="MozillaFirefox-translations-common is &lt;113.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930282" version="1" comment="MozillaFirefox-translations-other is &lt;113.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930283" version="1" comment="MozillaThunderbird is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930284" version="1" comment="MozillaThunderbird-translations-common is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930285" version="1" comment="MozillaThunderbird-translations-other is &lt;102.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930286" version="1" comment="chromedriver is &lt;113.0.5672.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930287" version="1" comment="chromium is &lt;113.0.5672.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930288" version="1" comment="python310-Flask is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930289" version="1" comment="python310-Flask-doc is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930290" version="1" comment="python311-Flask is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930291" version="1" comment="python311-Flask-doc is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930292" version="1" comment="python39-Flask is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930293" version="1" comment="python39-Flask-doc is &lt;2.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930294" version="1" comment="libQt6Svg6 is &lt;6.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930295" version="1" comment="libQt6SvgWidgets6 is &lt;6.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930296" version="1" comment="qt6-svg-devel is &lt;6.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930297" version="1" comment="qt6-svg-examples is &lt;6.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930298" version="1" comment="qt6-svg-private-devel is &lt;6.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930299" version="1" comment="dcmtk is &lt;3.6.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930300" version="1" comment="dcmtk-devel is &lt;3.6.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930301" version="1" comment="libdcmtk17 is &lt;3.6.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930302" version="1" comment="distribution-registry is &lt;2.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930303" version="1" comment="mysql-connector-java is &lt;8.0.33-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930304" version="1" comment="libQt5Svg5 is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930305" version="1" comment="libQt5Svg5-32bit is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930306" version="1" comment="libqt5-qtsvg-devel is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930307" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930308" version="1" comment="libqt5-qtsvg-examples is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930309" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.15.9+kde8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930310" version="1" comment="postgresql11 is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930311" version="1" comment="postgresql11-contrib is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930312" version="1" comment="postgresql11-devel is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930313" version="1" comment="postgresql11-docs is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930314" version="1" comment="postgresql11-llvmjit is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930315" version="1" comment="postgresql11-llvmjit-devel is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930316" version="1" comment="postgresql11-plperl is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930317" version="1" comment="postgresql11-plpython is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930318" version="1" comment="postgresql11-pltcl is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930319" version="1" comment="postgresql11-server is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930320" version="1" comment="postgresql11-server-devel is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930321" version="1" comment="postgresql11-test is &lt;11.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930322" version="1" comment="postgresql12 is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930323" version="1" comment="postgresql12-contrib is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930324" version="1" comment="postgresql12-devel is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930325" version="1" comment="postgresql12-docs is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930326" version="1" comment="postgresql12-llvmjit is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930327" version="1" comment="postgresql12-llvmjit-devel is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930328" version="1" comment="postgresql12-plperl is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930329" version="1" comment="postgresql12-plpython is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930330" version="1" comment="postgresql12-pltcl is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930331" version="1" comment="postgresql12-server is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930332" version="1" comment="postgresql12-server-devel is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930333" version="1" comment="postgresql12-test is &lt;12.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930334" version="1" comment="postgresql13 is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930335" version="1" comment="postgresql13-contrib is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930336" version="1" comment="postgresql13-devel is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930337" version="1" comment="postgresql13-docs is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930338" version="1" comment="postgresql13-llvmjit is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930339" version="1" comment="postgresql13-llvmjit-devel is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930340" version="1" comment="postgresql13-plperl is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930341" version="1" comment="postgresql13-plpython is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930342" version="1" comment="postgresql13-pltcl is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930343" version="1" comment="postgresql13-server is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930344" version="1" comment="postgresql13-server-devel is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930345" version="1" comment="postgresql13-test is &lt;13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930346" version="1" comment="postgresql14 is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930347" version="1" comment="postgresql14-contrib is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930348" version="1" comment="postgresql14-devel is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930349" version="1" comment="postgresql14-docs is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930350" version="1" comment="postgresql14-llvmjit is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930351" version="1" comment="postgresql14-llvmjit-devel is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930352" version="1" comment="postgresql14-plperl is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930353" version="1" comment="postgresql14-plpython is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930354" version="1" comment="postgresql14-pltcl is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930355" version="1" comment="postgresql14-server is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930356" version="1" comment="postgresql14-server-devel is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930357" version="1" comment="postgresql14-test is &lt;14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930358" version="1" comment="libecpg6 is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930359" version="1" comment="libecpg6-32bit is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930360" version="1" comment="libpq5 is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930361" version="1" comment="libpq5-32bit is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930362" version="1" comment="postgresql15 is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930363" version="1" comment="postgresql15-contrib is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930364" version="1" comment="postgresql15-devel is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930365" version="1" comment="postgresql15-docs is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930366" version="1" comment="postgresql15-llvmjit is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930367" version="1" comment="postgresql15-llvmjit-devel is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930368" version="1" comment="postgresql15-plperl is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930369" version="1" comment="postgresql15-plpython is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930370" version="1" comment="postgresql15-pltcl is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930371" version="1" comment="postgresql15-server is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930372" version="1" comment="postgresql15-server-devel is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930373" version="1" comment="postgresql15-test is &lt;15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930374" version="1" comment="gvim is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930375" version="1" comment="vim is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930376" version="1" comment="vim-data is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930377" version="1" comment="vim-data-common is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930378" version="1" comment="vim-small is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930379" version="1" comment="xxd is &lt;9.0.1538-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930380" version="1" comment="liblxc-devel is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930381" version="1" comment="liblxc1 is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930382" version="1" comment="lxc is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930383" version="1" comment="lxc-bash-completion is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930384" version="1" comment="lxc-ja-doc is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930385" version="1" comment="lxc-ko-doc is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930386" version="1" comment="pam_cgfs is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930387" version="1" comment="libkpathsea6 is &lt;6.3.5-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930388" version="1" comment="libptexenc1 is &lt;1.4.3-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930389" version="1" comment="libsynctex2 is &lt;1.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930390" version="1" comment="libtexlua53-5 is &lt;5.3.6-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930391" version="1" comment="libtexluajit2 is &lt;2.1.0beta3-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930392" version="1" comment="perl-biber is &lt;2.19-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930393" version="1" comment="texlive is &lt;2023.20230311-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930394" version="1" comment="texlive-a2ping-bin is &lt;2023.20230311.svn27321-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930395" version="1" comment="texlive-accfonts-bin is &lt;2023.20230311.svn12688-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930396" version="1" comment="texlive-adhocfilelist-bin is &lt;2023.20230311.svn28038-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930397" version="1" comment="texlive-afm2pl-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930398" version="1" comment="texlive-albatross-bin is &lt;2023.20230311.svn57089-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930399" version="1" comment="texlive-aleph-bin is &lt;2023.20230311.svn66084-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930400" version="1" comment="texlive-amstex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930401" version="1" comment="texlive-arara-bin is &lt;2023.20230311.svn29036-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930402" version="1" comment="texlive-asymptote-bin is &lt;2023.20230311.svn66003-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930403" version="1" comment="texlive-attachfile2-bin is &lt;2023.20230311.svn52909-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930404" version="1" comment="texlive-authorindex-bin is &lt;2023.20230311.svn18790-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930405" version="1" comment="texlive-autosp-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930406" version="1" comment="texlive-axodraw2-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930407" version="1" comment="texlive-bib2gls-bin is &lt;2023.20230311.svn45266-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930408" version="1" comment="texlive-bibcop-bin is &lt;2023.20230311.svn65257-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930409" version="1" comment="texlive-biber-bin is &lt;2023.20230311.svn66402-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930410" version="1" comment="texlive-biber-ms-bin is &lt;2023.20230311.svn66478-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930411" version="1" comment="texlive-bibexport-bin is &lt;2023.20230311.svn16219-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930412" version="1" comment="texlive-bibtex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930413" version="1" comment="texlive-bibtex8-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930414" version="1" comment="texlive-bibtexu-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930415" version="1" comment="texlive-bin-devel is &lt;2023.20230311-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930416" version="1" comment="texlive-bundledoc-bin is &lt;2023.20230311.svn17794-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930417" version="1" comment="texlive-cachepic-bin is &lt;2023.20230311.svn15543-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930418" version="1" comment="texlive-checkcites-bin is &lt;2023.20230311.svn25623-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930419" version="1" comment="texlive-checklistings-bin is &lt;2023.20230311.svn38300-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930420" version="1" comment="texlive-chklref-bin is &lt;2023.20230311.svn52631-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930421" version="1" comment="texlive-chktex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930422" version="1" comment="texlive-citation-style-language-bin is &lt;2023.20230311.svn64151-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930423" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2023.20230311.svn37223-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930424" version="1" comment="texlive-cjkutils-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930425" version="1" comment="texlive-clojure-pamphlet-bin is &lt;2023.20230311.svn51944-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930426" version="1" comment="texlive-cluttex-bin is &lt;2023.20230311.svn48871-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930427" version="1" comment="texlive-context-bin is &lt;2023.20230311.svn66562-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930428" version="1" comment="texlive-convbkmk-bin is &lt;2023.20230311.svn30408-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930429" version="1" comment="texlive-crossrefware-bin is &lt;2023.20230311.svn45927-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930430" version="1" comment="texlive-cslatex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930431" version="1" comment="texlive-csplain-bin is &lt;2023.20230311.svn50528-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930432" version="1" comment="texlive-ctan-o-mat-bin is &lt;2023.20230311.svn46996-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930433" version="1" comment="texlive-ctanbib-bin is &lt;2023.20230311.svn48478-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930434" version="1" comment="texlive-ctanify-bin is &lt;2023.20230311.svn24061-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930435" version="1" comment="texlive-ctanupload-bin is &lt;2023.20230311.svn23866-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930436" version="1" comment="texlive-ctie-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930437" version="1" comment="texlive-cweb-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930438" version="1" comment="texlive-cyrillic-bin-bin is &lt;2023.20230311.svn53554-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930439" version="1" comment="texlive-de-macro-bin is &lt;2023.20230311.svn17399-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930440" version="1" comment="texlive-detex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930441" version="1" comment="texlive-diadia-bin is &lt;2023.20230311.svn37645-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930442" version="1" comment="texlive-digestif-bin is &lt;2023.20230311.svn65210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930443" version="1" comment="texlive-dosepsbin-bin is &lt;2023.20230311.svn24759-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930444" version="1" comment="texlive-dtl-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930445" version="1" comment="texlive-dtxgen-bin is &lt;2023.20230311.svn29031-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930446" version="1" comment="texlive-dviasm-bin is &lt;2023.20230311.svn8329-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930447" version="1" comment="texlive-dvicopy-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930448" version="1" comment="texlive-dvidvi-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930449" version="1" comment="texlive-dviinfox-bin is &lt;2023.20230311.svn44515-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930450" version="1" comment="texlive-dviljk-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930451" version="1" comment="texlive-dviout-util-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930452" version="1" comment="texlive-dvipdfmx-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930453" version="1" comment="texlive-dvipng-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930454" version="1" comment="texlive-dvipos-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930455" version="1" comment="texlive-dvips-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930456" version="1" comment="texlive-dvisvgm-bin is &lt;2023.20230311.svn66547-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930457" version="1" comment="texlive-eplain-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930458" version="1" comment="texlive-epspdf-bin is &lt;2023.20230311.svn29050-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930459" version="1" comment="texlive-epstopdf-bin is &lt;2023.20230311.svn18336-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930460" version="1" comment="texlive-exceltex-bin is &lt;2023.20230311.svn25860-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930461" version="1" comment="texlive-fig4latex-bin is &lt;2023.20230311.svn14752-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930462" version="1" comment="texlive-findhyph-bin is &lt;2023.20230311.svn14758-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930463" version="1" comment="texlive-fontinst-bin is &lt;2023.20230311.svn53554-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930464" version="1" comment="texlive-fontools-bin is &lt;2023.20230311.svn25997-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930465" version="1" comment="texlive-fontware-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930466" version="1" comment="texlive-fragmaster-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930467" version="1" comment="texlive-getmap-bin is &lt;2023.20230311.svn34971-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930468" version="1" comment="texlive-git-latexdiff-bin is &lt;2023.20230311.svn54732-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930469" version="1" comment="texlive-glossaries-bin is &lt;2023.20230311.svn37813-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930470" version="1" comment="texlive-gregoriotex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930471" version="1" comment="texlive-gsftopk-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930472" version="1" comment="texlive-hitex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930473" version="1" comment="texlive-hyperxmp-bin is &lt;2023.20230311.svn56984-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930474" version="1" comment="texlive-jadetex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930475" version="1" comment="texlive-jfmutil-bin is &lt;2023.20230311.svn44835-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930476" version="1" comment="texlive-ketcindy-bin is &lt;2023.20230311.svn49033-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930477" version="1" comment="texlive-kotex-utils-bin is &lt;2023.20230311.svn32101-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930478" version="1" comment="texlive-kpathsea-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930479" version="1" comment="texlive-kpathsea-devel is &lt;6.3.5-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930480" version="1" comment="texlive-l3build-bin is &lt;2023.20230311.svn46894-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930481" version="1" comment="texlive-lacheck-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930482" version="1" comment="texlive-latex-bin-bin is &lt;2023.20230311.svn54358-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930483" version="1" comment="texlive-latex-bin-dev-bin is &lt;2023.20230311.svn53999-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930484" version="1" comment="texlive-latex-git-log-bin is &lt;2023.20230311.svn30983-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930485" version="1" comment="texlive-latex-papersize-bin is &lt;2023.20230311.svn42296-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930486" version="1" comment="texlive-latex2man-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930487" version="1" comment="texlive-latex2nemeth-bin is &lt;2023.20230311.svn42300-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930488" version="1" comment="texlive-latexdiff-bin is &lt;2023.20230311.svn16420-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930489" version="1" comment="texlive-latexfileversion-bin is &lt;2023.20230311.svn25012-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930490" version="1" comment="texlive-latexindent-bin is &lt;2023.20230311.svn32150-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930491" version="1" comment="texlive-latexmk-bin is &lt;2023.20230311.svn10937-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930492" version="1" comment="texlive-latexpand-bin is &lt;2023.20230311.svn27025-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930493" version="1" comment="texlive-lcdftypetools-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930494" version="1" comment="texlive-light-latex-make-bin is &lt;2023.20230311.svn56352-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930495" version="1" comment="texlive-lilyglyphs-bin is &lt;2023.20230311.svn31696-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930496" version="1" comment="texlive-listbib-bin is &lt;2023.20230311.svn26126-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930497" version="1" comment="texlive-listings-ext-bin is &lt;2023.20230311.svn15093-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930498" version="1" comment="texlive-lollipop-bin is &lt;2023.20230311.svn41465-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930499" version="1" comment="texlive-ltxfileinfo-bin is &lt;2023.20230311.svn29005-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930500" version="1" comment="texlive-ltximg-bin is &lt;2023.20230311.svn32346-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930501" version="1" comment="texlive-luafindfont-bin is &lt;2023.20230311.svn61207-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930502" version="1" comment="texlive-luahbtex-bin is &lt;2023.20230311.svn66511-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930503" version="1" comment="texlive-luajittex-bin is &lt;2023.20230311.svn66511-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930504" version="1" comment="texlive-luaotfload-bin is &lt;2023.20230311.svn34647-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930505" version="1" comment="texlive-luatex-bin is &lt;2023.20230311.svn66511-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930506" version="1" comment="texlive-lwarp-bin is &lt;2023.20230311.svn43292-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930507" version="1" comment="texlive-m-tx-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930508" version="1" comment="texlive-make4ht-bin is &lt;2023.20230311.svn37750-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930509" version="1" comment="texlive-makedtx-bin is &lt;2023.20230311.svn38769-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930510" version="1" comment="texlive-makeindex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930511" version="1" comment="texlive-match_parens-bin is &lt;2023.20230311.svn23500-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930512" version="1" comment="texlive-mathspic-bin is &lt;2023.20230311.svn23661-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930513" version="1" comment="texlive-metafont-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930514" version="1" comment="texlive-metapost-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930515" version="1" comment="texlive-mex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930516" version="1" comment="texlive-mf2pt1-bin is &lt;2023.20230311.svn23406-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930517" version="1" comment="texlive-mflua-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930518" version="1" comment="texlive-mfware-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930519" version="1" comment="texlive-mkgrkindex-bin is &lt;2023.20230311.svn14428-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930520" version="1" comment="texlive-mkjobtexmf-bin is &lt;2023.20230311.svn8457-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930521" version="1" comment="texlive-mkpic-bin is &lt;2023.20230311.svn33688-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930522" version="1" comment="texlive-mltex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930523" version="1" comment="texlive-mptopdf-bin is &lt;2023.20230311.svn18674-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930524" version="1" comment="texlive-multibibliography-bin is &lt;2023.20230311.svn30534-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930525" version="1" comment="texlive-musixtex-bin is &lt;2023.20230311.svn37026-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930526" version="1" comment="texlive-musixtnt-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930527" version="1" comment="texlive-omegaware-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930528" version="1" comment="texlive-optex-bin is &lt;2023.20230311.svn53804-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930529" version="1" comment="texlive-optexcount-bin is &lt;2023.20230311.svn59817-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930530" version="1" comment="texlive-pagelayout-bin is &lt;2023.20230311.svn65625-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930531" version="1" comment="texlive-patgen-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930532" version="1" comment="texlive-pax-bin is &lt;2023.20230311.svn10843-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930533" version="1" comment="texlive-pdfbook2-bin is &lt;2023.20230311.svn37537-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930534" version="1" comment="texlive-pdfcrop-bin is &lt;2023.20230311.svn14387-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930535" version="1" comment="texlive-pdfjam-bin is &lt;2023.20230311.svn52858-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930536" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2023.20230311.svn41779-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930537" version="1" comment="texlive-pdftex-bin is &lt;2023.20230311.svn66084-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930538" version="1" comment="texlive-pdftex-quiet-bin is &lt;2023.20230311.svn49140-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930539" version="1" comment="texlive-pdftosrc-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930540" version="1" comment="texlive-pdfxup-bin is &lt;2023.20230311.svn40690-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930541" version="1" comment="texlive-pedigree-perl-bin is &lt;2023.20230311.svn25962-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930542" version="1" comment="texlive-perltex-bin is &lt;2023.20230311.svn16181-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930543" version="1" comment="texlive-petri-nets-bin is &lt;2023.20230311.svn39165-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930544" version="1" comment="texlive-pfarrei-bin is &lt;2023.20230311.svn29348-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930545" version="1" comment="texlive-pkfix-bin is &lt;2023.20230311.svn13364-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930546" version="1" comment="texlive-pkfix-helper-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930547" version="1" comment="texlive-platex-bin is &lt;2023.20230311.svn66079-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930548" version="1" comment="texlive-pmx-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930549" version="1" comment="texlive-pmxchords-bin is &lt;2023.20230311.svn32405-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930550" version="1" comment="texlive-ps2eps-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930551" version="1" comment="texlive-ps2pk-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930552" version="1" comment="texlive-pst-pdf-bin is &lt;2023.20230311.svn7838-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930553" version="1" comment="texlive-pst2pdf-bin is &lt;2023.20230311.svn29333-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930554" version="1" comment="texlive-ptex-bin is &lt;2023.20230311.svn66084-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930555" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2023.20230311.svn44206-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930556" version="1" comment="texlive-ptex2pdf-bin is &lt;2023.20230311.svn29335-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930557" version="1" comment="texlive-ptexenc-devel is &lt;1.4.3-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930558" version="1" comment="texlive-purifyeps-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930559" version="1" comment="texlive-pygmentex-bin is &lt;2023.20230311.svn34996-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930560" version="1" comment="texlive-pythontex-bin is &lt;2023.20230311.svn31638-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930561" version="1" comment="texlive-rubik-bin is &lt;2023.20230311.svn32919-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930562" version="1" comment="texlive-scripts-bin is &lt;2023.20230311.svn64356-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930563" version="1" comment="texlive-scripts-extra-bin is &lt;2023.20230311.svn53577-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930564" version="1" comment="texlive-seetexk-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930565" version="1" comment="texlive-spix-bin is &lt;2023.20230311.svn55933-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930566" version="1" comment="texlive-splitindex-bin is &lt;2023.20230311.svn29688-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930567" version="1" comment="texlive-srcredact-bin is &lt;2023.20230311.svn38710-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930568" version="1" comment="texlive-sty2dtx-bin is &lt;2023.20230311.svn21215-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930569" version="1" comment="texlive-svn-multi-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930570" version="1" comment="texlive-synctex-bin is &lt;2023.20230311.svn66084-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930571" version="1" comment="texlive-synctex-devel is &lt;1.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930572" version="1" comment="texlive-tex-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930573" version="1" comment="texlive-tex4ebook-bin is &lt;2023.20230311.svn37771-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930574" version="1" comment="texlive-tex4ht-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930575" version="1" comment="texlive-texaccents-bin is &lt;2023.20230311.svn64447-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930576" version="1" comment="texlive-texcount-bin is &lt;2023.20230311.svn13013-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930577" version="1" comment="texlive-texdef-bin is &lt;2023.20230311.svn45011-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930578" version="1" comment="texlive-texdiff-bin is &lt;2023.20230311.svn15506-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930579" version="1" comment="texlive-texdirflatten-bin is &lt;2023.20230311.svn12782-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930580" version="1" comment="texlive-texdoc-bin is &lt;2023.20230311.svn47948-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930581" version="1" comment="texlive-texdoctk-bin is &lt;2023.20230311.svn29741-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930582" version="1" comment="texlive-texfot-bin is &lt;2023.20230311.svn33155-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930583" version="1" comment="texlive-texliveonfly-bin is &lt;2023.20230311.svn24062-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930584" version="1" comment="texlive-texloganalyser-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930585" version="1" comment="texlive-texlogfilter-bin is &lt;2023.20230311.svn61780-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930586" version="1" comment="texlive-texlogsieve-bin is &lt;2023.20230311.svn61328-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930587" version="1" comment="texlive-texlua-devel is &lt;5.3.6-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930588" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta3-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930589" version="1" comment="texlive-texosquery-bin is &lt;2023.20230311.svn43596-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930590" version="1" comment="texlive-texplate-bin is &lt;2023.20230311.svn53444-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930591" version="1" comment="texlive-texsis-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930592" version="1" comment="texlive-texware-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930593" version="1" comment="texlive-thumbpdf-bin is &lt;2023.20230311.svn6898-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930594" version="1" comment="texlive-tie-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930595" version="1" comment="texlive-tikztosvg-bin is &lt;2023.20230311.svn55132-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930596" version="1" comment="texlive-tpic2pdftex-bin is &lt;2023.20230311.svn50281-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930597" version="1" comment="texlive-ttfutils-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930598" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2023.20230311.svn25648-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930599" version="1" comment="texlive-ulqda-bin is &lt;2023.20230311.svn13663-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930600" version="1" comment="texlive-uplatex-bin is &lt;2023.20230311.svn52800-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930601" version="1" comment="texlive-upmendex-bin is &lt;2023.20230311.svn66511-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930602" version="1" comment="texlive-uptex-bin is &lt;2023.20230311.svn66382-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930603" version="1" comment="texlive-urlbst-bin is &lt;2023.20230311.svn23262-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930604" version="1" comment="texlive-velthuis-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930605" version="1" comment="texlive-vlna-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930606" version="1" comment="texlive-vpe-bin is &lt;2023.20230311.svn6897-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930607" version="1" comment="texlive-web-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930608" version="1" comment="texlive-webquiz-bin is &lt;2023.20230311.svn50419-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930609" version="1" comment="texlive-wordcount-bin is &lt;2023.20230311.svn46165-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930610" version="1" comment="texlive-xdvi-bin is &lt;2023.20230311.svn65877-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930611" version="1" comment="texlive-xelatex-dev-bin is &lt;2023.20230311.svn53999-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930612" version="1" comment="texlive-xetex-bin is &lt;2023.20230311.svn66084-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930613" version="1" comment="texlive-xindex-bin is &lt;2023.20230311.svn49312-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930614" version="1" comment="texlive-xml2pmx-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930615" version="1" comment="texlive-xmltex-bin is &lt;2023.20230311.svn3006-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930616" version="1" comment="texlive-xpdfopen-bin is &lt;2023.20230311.svn62210-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930617" version="1" comment="texlive-yplan-bin is &lt;2023.20230311.svn34398-90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930618" version="1" comment="libmodsecurity3 is &lt;3.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930619" version="1" comment="modsecurity is &lt;3.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930620" version="1" comment="modsecurity-devel is &lt;3.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930621" version="1" comment="chromedriver is &lt;113.0.5672.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930622" version="1" comment="chromium is &lt;113.0.5672.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930623" version="1" comment="cups-filters is &lt;1.28.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930624" version="1" comment="cups-filters-devel is &lt;1.28.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930625" version="1" comment="curl is &lt;8.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930626" version="1" comment="libcurl-devel is &lt;8.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930627" version="1" comment="libcurl-devel-32bit is &lt;8.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930628" version="1" comment="libcurl4 is &lt;8.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930629" version="1" comment="libcurl4-32bit is &lt;8.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930630" version="1" comment="radare2 is &lt;5.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930631" version="1" comment="radare2-devel is &lt;5.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930632" version="1" comment="radare2-zsh-completion is &lt;5.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930633" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930634" version="1" comment="libovn-23_03-0 is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930635" version="1" comment="openvswitch is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930636" version="1" comment="openvswitch-devel is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930637" version="1" comment="openvswitch-doc is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930638" version="1" comment="openvswitch-ipsec is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930639" version="1" comment="openvswitch-pki is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930640" version="1" comment="openvswitch-test is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930641" version="1" comment="openvswitch-vtep is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930642" version="1" comment="ovn is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930643" version="1" comment="ovn-central is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930644" version="1" comment="ovn-devel is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930645" version="1" comment="ovn-doc is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930646" version="1" comment="ovn-docker is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930647" version="1" comment="ovn-host is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930648" version="1" comment="ovn-vtep is &lt;23.03.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930649" version="1" comment="python3-ovs is &lt;3.1.0-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930650" version="1" comment="python310-Django is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930651" version="1" comment="python311-Django is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930652" version="1" comment="python39-Django is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930653" version="1" comment="python310-urllib3_1 is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930654" version="1" comment="python311-urllib3_1 is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930655" version="1" comment="python39-urllib3_1 is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930656" version="1" comment="libcap-devel is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930657" version="1" comment="libcap-progs is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930658" version="1" comment="libcap2 is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930659" version="1" comment="libcap2-32bit is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930660" version="1" comment="libpsx2 is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930661" version="1" comment="libpsx2-32bit is &lt;2.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930662" version="1" comment="djvulibre is &lt;3.5.28-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930663" version="1" comment="djvulibre-doc is &lt;3.5.28-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930664" version="1" comment="libdjvulibre-devel is &lt;3.5.28-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930665" version="1" comment="libdjvulibre21 is &lt;3.5.28-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930666" version="1" comment="python39 is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930667" version="1" comment="python39-32bit is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930668" version="1" comment="python39-curses is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930669" version="1" comment="python39-dbm is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930670" version="1" comment="python39-idle is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930671" version="1" comment="python39-tk is &lt;3.9.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930672" version="1" comment="ungoogled-chromium is &lt;113.0.5672.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930673" version="1" comment="ungoogled-chromium-chromedriver is &lt;113.0.5672.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930674" version="1" comment="jetty-annotations is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930675" version="1" comment="jetty-ant is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930676" version="1" comment="jetty-cdi is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930677" version="1" comment="jetty-client is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930678" version="1" comment="jetty-continuation is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930679" version="1" comment="jetty-deploy is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930680" version="1" comment="jetty-fcgi is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930681" version="1" comment="jetty-http is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930682" version="1" comment="jetty-http-spi is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930683" version="1" comment="jetty-io is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930684" version="1" comment="jetty-jaas is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930685" version="1" comment="jetty-jmx is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930686" version="1" comment="jetty-jndi is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930687" version="1" comment="jetty-jsp is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930688" version="1" comment="jetty-minimal-javadoc is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930689" version="1" comment="jetty-openid is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930690" version="1" comment="jetty-plus is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930691" version="1" comment="jetty-proxy is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930692" version="1" comment="jetty-quickstart is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930693" version="1" comment="jetty-rewrite is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930694" version="1" comment="jetty-security is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930695" version="1" comment="jetty-server is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930696" version="1" comment="jetty-servlet is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930697" version="1" comment="jetty-servlets is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930698" version="1" comment="jetty-start is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930699" version="1" comment="jetty-util is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930700" version="1" comment="jetty-util-ajax is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930701" version="1" comment="jetty-webapp is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930702" version="1" comment="jetty-xml is &lt;9.4.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930703" version="1" comment="apache-commons-fileupload is &lt;1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930704" version="1" comment="apache-commons-fileupload-javadoc is &lt;1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930705" version="1" comment="c-ares-devel is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930706" version="1" comment="c-ares-utils is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930707" version="1" comment="libcares2 is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930708" version="1" comment="libcares2-32bit is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930709" version="1" comment="hawk2 is &lt;2.6.4+git.1682509819.1ff135ea-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930710" version="1" comment="tomcat is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930711" version="1" comment="tomcat-admin-webapps is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930712" version="1" comment="tomcat-docs-webapp is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930713" version="1" comment="tomcat-el-3_0-api is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930714" version="1" comment="tomcat-embed is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930715" version="1" comment="tomcat-javadoc is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930716" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930717" version="1" comment="tomcat-jsvc is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930718" version="1" comment="tomcat-lib is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930719" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930720" version="1" comment="tomcat-webapps is &lt;9.0.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930721" version="1" comment="ImageMagick is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930722" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930723" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930724" version="1" comment="ImageMagick-devel is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930725" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930726" version="1" comment="ImageMagick-doc is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930727" version="1" comment="ImageMagick-extra is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930728" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930729" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930730" version="1" comment="libMagick++-devel is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930731" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930732" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930733" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930734" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930735" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930736" version="1" comment="perl-PerlMagick is &lt;7.1.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930737" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930738" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930739" version="1" comment="libQt5Concurrent-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930740" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930741" version="1" comment="libQt5Concurrent5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930742" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930743" version="1" comment="libQt5Core-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930744" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930745" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930746" version="1" comment="libQt5Core5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930747" version="1" comment="libQt5Core5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930748" version="1" comment="libQt5DBus-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930749" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930750" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930751" version="1" comment="libQt5DBus5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930752" version="1" comment="libQt5DBus5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930753" version="1" comment="libQt5Gui-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930754" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930755" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930756" version="1" comment="libQt5Gui5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930757" version="1" comment="libQt5Gui5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930758" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930759" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930760" version="1" comment="libQt5Network-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930761" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930762" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930763" version="1" comment="libQt5Network5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930764" version="1" comment="libQt5Network5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930765" version="1" comment="libQt5OpenGL-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930766" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930767" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930768" version="1" comment="libQt5OpenGL5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930769" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930770" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930771" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930772" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930773" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930774" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930775" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930776" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930777" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930778" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930779" version="1" comment="libQt5PrintSupport5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930780" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930781" version="1" comment="libQt5Sql-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930782" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930783" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930784" version="1" comment="libQt5Sql5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930785" version="1" comment="libQt5Sql5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930786" version="1" comment="libQt5Sql5-mysql is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930787" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930788" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930789" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930790" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930791" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930792" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930793" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930794" version="1" comment="libQt5Test-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930795" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930796" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930797" version="1" comment="libQt5Test5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930798" version="1" comment="libQt5Test5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930799" version="1" comment="libQt5Widgets-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930800" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930801" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930802" version="1" comment="libQt5Widgets5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930803" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930804" version="1" comment="libQt5Xml-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930805" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930806" version="1" comment="libQt5Xml5 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930807" version="1" comment="libQt5Xml5-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930808" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930809" version="1" comment="libqt5-qtbase-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930810" version="1" comment="libqt5-qtbase-examples is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930811" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930812" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930813" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930814" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.9+kde154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930815" version="1" comment="libmariadbd-devel is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930816" version="1" comment="libmariadbd19 is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930817" version="1" comment="mariadb is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930818" version="1" comment="mariadb-bench is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930819" version="1" comment="mariadb-client is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930820" version="1" comment="mariadb-errormessages is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930821" version="1" comment="mariadb-galera is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930822" version="1" comment="mariadb-rpm-macros is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930823" version="1" comment="mariadb-test is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930824" version="1" comment="mariadb-tools is &lt;10.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930825" version="1" comment="python310-sqlparse is &lt;0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930826" version="1" comment="python311-sqlparse is &lt;0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930827" version="1" comment="python39-sqlparse is &lt;0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930828" version="1" comment="libwireshark16 is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930829" version="1" comment="libwiretap13 is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930830" version="1" comment="libwsutil14 is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930831" version="1" comment="wireshark is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930832" version="1" comment="wireshark-devel is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930833" version="1" comment="wireshark-ui-qt is &lt;4.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930834" version="1" comment="xen is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930835" version="1" comment="xen-devel is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930836" version="1" comment="xen-doc-html is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930837" version="1" comment="xen-libs is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930838" version="1" comment="xen-tools is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930839" version="1" comment="xen-tools-domU is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930840" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930841" version="1" comment="watchexec is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930842" version="1" comment="sysstat is &lt;12.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930843" version="1" comment="sysstat-isag is &lt;12.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930844" version="1" comment="ungoogled-chromium is &lt;113.0.5672.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930845" version="1" comment="ungoogled-chromium-chromedriver is &lt;113.0.5672.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930846" version="1" comment="libQt5Pdf5 is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930847" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930848" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930849" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930850" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930851" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930852" version="1" comment="libqt5-qtwebengine is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930853" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930854" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930855" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930856" version="1" comment="python310 is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930857" version="1" comment="python310-32bit is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930858" version="1" comment="python310-curses is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930859" version="1" comment="python310-dbm is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930860" version="1" comment="python310-idle is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930861" version="1" comment="python310-tk is &lt;3.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930862" version="1" comment="rekor is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930863" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930864" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930865" version="1" comment="libopenssl10 is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930866" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930867" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930868" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930869" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930870" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930871" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930872" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930873" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930874" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930875" version="1" comment="frr is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930876" version="1" comment="frr-devel is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930877" version="1" comment="libfrr0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930878" version="1" comment="libfrr_pb0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930879" version="1" comment="libfrrcares0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930880" version="1" comment="libfrrfpm_pb0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930881" version="1" comment="libfrrospfapiclient0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930882" version="1" comment="libfrrsnmp0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930883" version="1" comment="libfrrzmq0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930884" version="1" comment="libmlag_pb0 is &lt;8.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930885" version="1" comment="opensc is &lt;0.23.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930886" version="1" comment="libopenssl-3-devel is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930887" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930888" version="1" comment="libopenssl3 is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930889" version="1" comment="libopenssl3-32bit is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930890" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930891" version="1" comment="openssl-3 is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930892" version="1" comment="openssl-3-doc is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930893" version="1" comment="supportutils is &lt;3.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930894" version="1" comment="apache2-mod_apparmor is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930895" version="1" comment="apparmor-abstractions is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930896" version="1" comment="apparmor-docs is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930897" version="1" comment="apparmor-parser is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930898" version="1" comment="apparmor-parser-lang is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930899" version="1" comment="apparmor-profiles is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930900" version="1" comment="apparmor-utils is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930901" version="1" comment="apparmor-utils-lang is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930902" version="1" comment="pam_apparmor is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930903" version="1" comment="pam_apparmor-32bit is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930904" version="1" comment="perl-apparmor is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930905" version="1" comment="python3-apparmor is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930906" version="1" comment="ruby-apparmor is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930907" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930908" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930909" version="1" comment="libopenssl1_1 is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930910" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930911" version="1" comment="openssl-1_1 is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930912" version="1" comment="openssl-1_1-doc is &lt;1.1.1u-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930913" version="1" comment="pijul is &lt;1.0.0~beta.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930914" version="1" comment="ruby3.2-rubygem-rack-2.2 is &lt;2.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930915" version="1" comment="cups is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930916" version="1" comment="cups-client is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930917" version="1" comment="cups-config is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930918" version="1" comment="cups-ddk is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930919" version="1" comment="cups-devel is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930920" version="1" comment="cups-devel-32bit is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930921" version="1" comment="libcups2 is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930922" version="1" comment="libcups2-32bit is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930923" version="1" comment="libcupsimage2 is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930924" version="1" comment="libcupsimage2-32bit is &lt;2.4.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930925" version="1" comment="python311 is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930926" version="1" comment="python311-32bit is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930927" version="1" comment="python311-curses is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930928" version="1" comment="python311-dbm is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930929" version="1" comment="python311-idle is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930930" version="1" comment="python311-tk is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930931" version="1" comment="python311-x86-64-v3 is &lt;3.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930932" version="1" comment="python38 is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930933" version="1" comment="python38-32bit is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930934" version="1" comment="python38-curses is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930935" version="1" comment="python38-dbm is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930936" version="1" comment="python38-idle is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930937" version="1" comment="python38-tk is &lt;3.8.16-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930938" version="1" comment="chromedriver is &lt;114.0.5735.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930939" version="1" comment="chromium is &lt;114.0.5735.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930940" version="1" comment="cockpit-agama is &lt;2.1+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930941" version="1" comment="libQt6Concurrent6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930942" version="1" comment="libQt6Core6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930943" version="1" comment="libQt6DBus6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930944" version="1" comment="libQt6Gui6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930945" version="1" comment="libQt6Network6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930946" version="1" comment="libQt6OpenGL6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930947" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930948" version="1" comment="libQt6PrintSupport6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930949" version="1" comment="libQt6Sql6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930950" version="1" comment="libQt6Test6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930951" version="1" comment="libQt6Widgets6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930952" version="1" comment="libQt6Xml6 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930953" version="1" comment="qt6-base-common-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930954" version="1" comment="qt6-base-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930955" version="1" comment="qt6-base-examples is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930956" version="1" comment="qt6-base-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930957" version="1" comment="qt6-concurrent-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930958" version="1" comment="qt6-core-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930959" version="1" comment="qt6-core-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930960" version="1" comment="qt6-dbus-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930961" version="1" comment="qt6-dbus-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930962" version="1" comment="qt6-docs-common is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930963" version="1" comment="qt6-exampleicons-devel-static is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930964" version="1" comment="qt6-gui-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930965" version="1" comment="qt6-gui-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930966" version="1" comment="qt6-kmssupport-devel-static is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930967" version="1" comment="qt6-kmssupport-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930968" version="1" comment="qt6-network-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930969" version="1" comment="qt6-network-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930970" version="1" comment="qt6-network-tls is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930971" version="1" comment="qt6-networkinformation-glib is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930972" version="1" comment="qt6-networkinformation-nm is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930973" version="1" comment="qt6-opengl-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930974" version="1" comment="qt6-opengl-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930975" version="1" comment="qt6-openglwidgets-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930976" version="1" comment="qt6-platformsupport-devel-static is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930977" version="1" comment="qt6-platformsupport-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930978" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930979" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930980" version="1" comment="qt6-printsupport-cups is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930981" version="1" comment="qt6-printsupport-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930982" version="1" comment="qt6-printsupport-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930983" version="1" comment="qt6-sql-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930984" version="1" comment="qt6-sql-mysql is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930985" version="1" comment="qt6-sql-postgresql is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930986" version="1" comment="qt6-sql-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930987" version="1" comment="qt6-sql-sqlite is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930988" version="1" comment="qt6-sql-unixODBC is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930989" version="1" comment="qt6-test-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930990" version="1" comment="qt6-test-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930991" version="1" comment="qt6-widgets-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930992" version="1" comment="qt6-widgets-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930993" version="1" comment="qt6-xml-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930994" version="1" comment="qt6-xml-private-devel is &lt;6.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930996" version="1" comment="kernel-macros is &lt;6.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930997" version="1" comment="kernel-source is &lt;6.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930998" version="1" comment="kernel-source-vanilla is &lt;6.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009930999" version="1" comment="keepass is &lt;2.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931000" version="1" comment="openssh is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931001" version="1" comment="openssh-cavs is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931002" version="1" comment="openssh-clients is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931003" version="1" comment="openssh-common is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931004" version="1" comment="openssh-fips is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931005" version="1" comment="openssh-helpers is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931006" version="1" comment="openssh-server is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931007" version="1" comment="openssh-server-config-rootlogin is &lt;9.3p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931008" version="1" comment="syncthing is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931009" version="1" comment="syncthing-relaysrv is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931010" version="1" comment="chromedriver is &lt;114.0.5735.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931011" version="1" comment="chromium is &lt;114.0.5735.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931012" version="1" comment="renderdoc is &lt;1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931013" version="1" comment="renderdoc-devel is &lt;1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931014" version="1" comment="go1.19 is &lt;1.19.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931015" version="1" comment="go1.19-doc is &lt;1.19.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931016" version="1" comment="go1.19-libstd is &lt;1.19.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931017" version="1" comment="go1.19-race is &lt;1.19.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931018" version="1" comment="go1.20 is &lt;1.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931019" version="1" comment="go1.20-doc is &lt;1.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931020" version="1" comment="go1.20-libstd is &lt;1.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931021" version="1" comment="go1.20-race is &lt;1.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931022" version="1" comment="libwireshark16 is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931023" version="1" comment="libwiretap13 is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931024" version="1" comment="libwsutil14 is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931025" version="1" comment="wireshark is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931026" version="1" comment="wireshark-devel is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931027" version="1" comment="wireshark-ui-qt is &lt;4.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931028" version="1" comment="MozillaThunderbird is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931029" version="1" comment="MozillaThunderbird-translations-common is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931030" version="1" comment="MozillaThunderbird-translations-other is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931031" version="1" comment="MozillaFirefox is &lt;114.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931032" version="1" comment="MozillaFirefox-branding-upstream is &lt;114.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931033" version="1" comment="MozillaFirefox-devel is &lt;114.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931034" version="1" comment="MozillaFirefox-translations-common is &lt;114.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931035" version="1" comment="MozillaFirefox-translations-other is &lt;114.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931036" version="1" comment="kubernetes1.27-apiserver is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931037" version="1" comment="kubernetes1.27-client is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931038" version="1" comment="kubernetes1.27-client-bash-completion is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931039" version="1" comment="kubernetes1.27-client-common is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931040" version="1" comment="kubernetes1.27-client-fish-completion is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931041" version="1" comment="kubernetes1.27-controller-manager is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931042" version="1" comment="kubernetes1.27-kubeadm is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931043" version="1" comment="kubernetes1.27-kubelet is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931044" version="1" comment="kubernetes1.27-kubelet-common is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931045" version="1" comment="kubernetes1.27-proxy is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931046" version="1" comment="kubernetes1.27-scheduler is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931047" version="1" comment="xtrans is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931049" version="1" comment="kernel-macros is &lt;6.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931050" version="1" comment="kernel-source is &lt;6.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931051" version="1" comment="kernel-source-vanilla is &lt;6.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931052" version="1" comment="librnp0 is &lt;0.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931053" version="1" comment="rnp is &lt;0.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931054" version="1" comment="rnp-devel is &lt;0.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931055" version="1" comment="dbus-1 is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931056" version="1" comment="dbus-1-common is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931057" version="1" comment="dbus-1-daemon is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931058" version="1" comment="dbus-1-devel is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931059" version="1" comment="dbus-1-devel-32bit is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931060" version="1" comment="dbus-1-tools is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931061" version="1" comment="libdbus-1-3 is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931062" version="1" comment="libdbus-1-3-32bit is &lt;1.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931063" version="1" comment="ntp is &lt;4.2.8p17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931064" version="1" comment="ntp-dcf77-tools is &lt;4.2.8p17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931065" version="1" comment="ntp-doc is &lt;4.2.8p17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931066" version="1" comment="python310-requests is &lt;2.31.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931067" version="1" comment="python311-requests is &lt;2.31.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931068" version="1" comment="python39-requests is &lt;2.31.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931069" version="1" comment="chromedriver is &lt;114.0.5735.133-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931070" version="1" comment="chromium is &lt;114.0.5735.133-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931071" version="1" comment="ImageMagick is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931072" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931073" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931074" version="1" comment="ImageMagick-devel is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931075" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931076" version="1" comment="ImageMagick-doc is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931077" version="1" comment="ImageMagick-extra is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931078" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931079" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931080" version="1" comment="libMagick++-devel is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931081" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931082" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931083" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931084" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931085" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931086" version="1" comment="perl-PerlMagick is &lt;7.1.1.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931087" version="1" comment="guava is &lt;32.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931088" version="1" comment="guava-javadoc is &lt;32.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931089" version="1" comment="guava-testlib is &lt;32.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931090" version="1" comment="libiniparser-devel is &lt;4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931091" version="1" comment="libiniparser1 is &lt;4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931092" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931093" version="1" comment="kubernetes1.23-client is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931094" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931095" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931096" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931097" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931098" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931099" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931100" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931101" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931102" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931103" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931104" version="1" comment="kubernetes1.24-client is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931105" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931106" version="1" comment="kubernetes1.24-client-common is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931107" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931108" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931109" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931110" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931111" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931112" version="1" comment="kubernetes1.24-proxy is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931113" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931114" version="1" comment="kubescape is &lt;2.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931115" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931116" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931117" version="1" comment="libQt5Concurrent-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931118" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931119" version="1" comment="libQt5Concurrent5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931120" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931121" version="1" comment="libQt5Core-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931122" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931123" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931124" version="1" comment="libQt5Core5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931125" version="1" comment="libQt5Core5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931126" version="1" comment="libQt5DBus-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931127" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931128" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931129" version="1" comment="libQt5DBus5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931130" version="1" comment="libQt5DBus5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931131" version="1" comment="libQt5Gui-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931132" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931133" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931134" version="1" comment="libQt5Gui5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931135" version="1" comment="libQt5Gui5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931136" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931137" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931138" version="1" comment="libQt5Network-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931139" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931140" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931141" version="1" comment="libQt5Network5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931142" version="1" comment="libQt5Network5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931143" version="1" comment="libQt5OpenGL-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931144" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931145" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931146" version="1" comment="libQt5OpenGL5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931147" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931148" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931149" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931150" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931151" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931152" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931153" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931154" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931155" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931156" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931157" version="1" comment="libQt5PrintSupport5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931158" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931159" version="1" comment="libQt5Sql-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931160" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931161" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931162" version="1" comment="libQt5Sql5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931163" version="1" comment="libQt5Sql5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931164" version="1" comment="libQt5Sql5-mysql is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931165" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931166" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931167" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931168" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931169" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931170" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931171" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931172" version="1" comment="libQt5Test-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931173" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931174" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931175" version="1" comment="libQt5Test5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931176" version="1" comment="libQt5Test5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931177" version="1" comment="libQt5Widgets-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931178" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931179" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931180" version="1" comment="libQt5Widgets5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931181" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931182" version="1" comment="libQt5Xml-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931183" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931184" version="1" comment="libQt5Xml5 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931185" version="1" comment="libQt5Xml5-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931186" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931187" version="1" comment="libqt5-qtbase-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931188" version="1" comment="libqt5-qtbase-examples is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931189" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931190" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931191" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931192" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.10+kde129-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931193" version="1" comment="traefik is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931194" version="1" comment="libX11-6 is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931195" version="1" comment="libX11-6-32bit is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931196" version="1" comment="libX11-data is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931197" version="1" comment="libX11-devel is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931198" version="1" comment="libX11-devel-32bit is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931199" version="1" comment="libX11-xcb1 is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931200" version="1" comment="libX11-xcb1-32bit is &lt;1.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931201" version="1" comment="nodejs-electron is &lt;22.3.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931202" version="1" comment="nodejs-electron-devel is &lt;22.3.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931203" version="1" comment="nodejs-electron-doc is &lt;22.3.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931204" version="1" comment="imlib2 is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931205" version="1" comment="imlib2-devel is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931206" version="1" comment="imlib2-filters is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931207" version="1" comment="imlib2-loaders is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931208" version="1" comment="libImlib2-1 is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931209" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931210" version="1" comment="kubernetes1.24-client is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931211" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931212" version="1" comment="kubernetes1.24-client-common is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931213" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931214" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931215" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931216" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931217" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931218" version="1" comment="kubernetes1.24-proxy is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931219" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931220" version="1" comment="libldap-data is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931221" version="1" comment="libldap2 is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931222" version="1" comment="libldap2-32bit is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931223" version="1" comment="openldap2 is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931224" version="1" comment="openldap2-back-meta is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931225" version="1" comment="openldap2-back-perl is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931226" version="1" comment="openldap2-back-sock is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931227" version="1" comment="openldap2-back-sql is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931228" version="1" comment="openldap2-client is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931229" version="1" comment="openldap2-contrib is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931230" version="1" comment="openldap2-devel is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931231" version="1" comment="openldap2-devel-32bit is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931232" version="1" comment="openldap2-devel-static is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931233" version="1" comment="openldap2-doc is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931234" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931235" version="1" comment="kubernetes1.23-client is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931236" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931237" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931238" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931239" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931240" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931241" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931242" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931243" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931244" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931245" version="1" comment="libwireshark16 is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931246" version="1" comment="libwiretap13 is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931247" version="1" comment="libwsutil14 is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931248" version="1" comment="wireshark is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931249" version="1" comment="wireshark-devel is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931250" version="1" comment="wireshark-ui-qt is &lt;4.0.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931251" version="1" comment="bind is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931252" version="1" comment="bind-doc is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931253" version="1" comment="bind-modules-bdbhpt is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931254" version="1" comment="bind-modules-generic is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931255" version="1" comment="bind-modules-ldap is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931256" version="1" comment="bind-modules-mysql is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931257" version="1" comment="bind-modules-perl is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931258" version="1" comment="bind-modules-sqlite3 is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931259" version="1" comment="bind-utils is &lt;9.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931260" version="1" comment="bouncycastle is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931261" version="1" comment="bouncycastle-javadoc is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931262" version="1" comment="bouncycastle-jmail is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931263" version="1" comment="bouncycastle-mail is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931264" version="1" comment="bouncycastle-pg is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931265" version="1" comment="bouncycastle-pkix is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931266" version="1" comment="bouncycastle-tls is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931267" version="1" comment="bouncycastle-util is &lt;1.74-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931268" version="1" comment="cups is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931269" version="1" comment="cups-client is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931270" version="1" comment="cups-config is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931271" version="1" comment="cups-ddk is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931272" version="1" comment="cups-devel is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931273" version="1" comment="cups-devel-32bit is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931274" version="1" comment="libcups2 is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931275" version="1" comment="libcups2-32bit is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931276" version="1" comment="libcupsimage2 is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931277" version="1" comment="libcupsimage2-32bit is &lt;2.4.2-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931278" version="1" comment="grafana is &lt;10.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931279" version="1" comment="libsharpyuv0 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931280" version="1" comment="libsharpyuv0-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931281" version="1" comment="libwebp-devel is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931282" version="1" comment="libwebp-devel-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931283" version="1" comment="libwebp-tools is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931284" version="1" comment="libwebp7 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931285" version="1" comment="libwebp7-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931286" version="1" comment="libwebpdecoder3 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931287" version="1" comment="libwebpdecoder3-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931288" version="1" comment="libwebpdemux2 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931289" version="1" comment="libwebpdemux2-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931290" version="1" comment="libwebpmux3 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931291" version="1" comment="libwebpmux3-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931292" version="1" comment="nodejs-electron is &lt;22.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931293" version="1" comment="nodejs-electron-devel is &lt;22.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931294" version="1" comment="nodejs-electron-doc is &lt;22.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931295" version="1" comment="corepack20 is &lt;20.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931296" version="1" comment="nodejs20 is &lt;20.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931297" version="1" comment="nodejs20-devel is &lt;20.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931298" version="1" comment="nodejs20-docs is &lt;20.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931299" version="1" comment="npm20 is &lt;20.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931300" version="1" comment="libvmtools-devel is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931301" version="1" comment="libvmtools0 is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931302" version="1" comment="open-vm-tools is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931303" version="1" comment="open-vm-tools-containerinfo is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931304" version="1" comment="open-vm-tools-desktop is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931305" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931306" version="1" comment="open-vm-tools-sdmp is &lt;12.2.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931307" version="1" comment="gifsicle is &lt;1.94-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931308" version="1" comment="libhogweed6 is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931309" version="1" comment="libhogweed6-32bit is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931310" version="1" comment="libhogweed6-x86-64-v3 is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931311" version="1" comment="libnettle-devel is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931312" version="1" comment="libnettle-devel-32bit is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931313" version="1" comment="libnettle8 is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931314" version="1" comment="libnettle8-32bit is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931315" version="1" comment="libnettle8-x86-64-v3 is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931316" version="1" comment="nettle is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931317" version="1" comment="libmozjs-102-0 is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931318" version="1" comment="mozjs102 is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931319" version="1" comment="mozjs102-devel is &lt;102.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931320" version="1" comment="chromedriver is &lt;114.0.5735.198-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931321" version="1" comment="chromium is &lt;114.0.5735.198-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931322" version="1" comment="grafana is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931323" version="1" comment="librabbitmq-devel is &lt;0.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931324" version="1" comment="librabbitmq4 is &lt;0.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931325" version="1" comment="rabbitmq-c-tools is &lt;0.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931326" version="1" comment="python38 is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931327" version="1" comment="python38-32bit is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931328" version="1" comment="python38-curses is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931329" version="1" comment="python38-dbm is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931330" version="1" comment="python38-idle is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931331" version="1" comment="python38-tk is &lt;3.8.17-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931332" version="1" comment="ImageMagick is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931333" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931334" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931335" version="1" comment="ImageMagick-devel is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931336" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931337" version="1" comment="ImageMagick-doc is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931338" version="1" comment="ImageMagick-extra is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931339" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931340" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931341" version="1" comment="libMagick++-devel is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931342" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931343" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931344" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931345" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931346" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931347" version="1" comment="perl-PerlMagick is &lt;7.1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931348" version="1" comment="python310 is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931349" version="1" comment="python310-32bit is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931350" version="1" comment="python310-curses is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931351" version="1" comment="python310-dbm is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931352" version="1" comment="python310-idle is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931353" version="1" comment="python310-tk is &lt;3.10.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931354" version="1" comment="python312 is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931355" version="1" comment="python312-curses is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931356" version="1" comment="python312-dbm is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931357" version="1" comment="python312-idle is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931358" version="1" comment="python312-tk is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931359" version="1" comment="python312-x86-64-v3 is &lt;3.12.0b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931360" version="1" comment="python39 is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931361" version="1" comment="python39-32bit is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931362" version="1" comment="python39-curses is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931363" version="1" comment="python39-dbm is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931364" version="1" comment="python39-idle is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931365" version="1" comment="python39-tk is &lt;3.9.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931366" version="1" comment="perl-HTTP-Tiny is &lt;0.086-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931367" version="1" comment="squashfs is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931368" version="1" comment="ghostscript is &lt;9.56.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931369" version="1" comment="ghostscript-devel is &lt;9.56.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931370" version="1" comment="ghostscript-x11 is &lt;9.56.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931371" version="1" comment="MozillaFirefox is &lt;115.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931372" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931373" version="1" comment="MozillaFirefox-devel is &lt;115.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931374" version="1" comment="MozillaFirefox-translations-common is &lt;115.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931375" version="1" comment="MozillaFirefox-translations-other is &lt;115.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931376" version="1" comment="python311 is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931377" version="1" comment="python311-32bit is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931378" version="1" comment="python311-curses is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931379" version="1" comment="python311-dbm is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931380" version="1" comment="python311-idle is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931381" version="1" comment="python311-tk is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931382" version="1" comment="python311-x86-64-v3 is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931383" version="1" comment="matrix-synapse is &lt;1.85.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931384" version="1" comment="MozillaThunderbird is &lt;102.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931385" version="1" comment="MozillaThunderbird-translations-common is &lt;102.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931386" version="1" comment="MozillaThunderbird-translations-other is &lt;102.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931387" version="1" comment="python310-pipreqs is &lt;0.4.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931388" version="1" comment="python311-pipreqs is &lt;0.4.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931389" version="1" comment="python39-pipreqs is &lt;0.4.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931391" version="1" comment="kernel-macros is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931392" version="1" comment="kernel-source is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931393" version="1" comment="kernel-source-vanilla is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931394" version="1" comment="kitty is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931395" version="1" comment="kitty-shell-integration is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931396" version="1" comment="kitty-terminfo is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931397" version="1" comment="python310-Django is &lt;4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931398" version="1" comment="python311-Django is &lt;4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931399" version="1" comment="python39-Django is &lt;4.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931400" version="1" comment="libspice-server-devel is &lt;0.15.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931401" version="1" comment="libspice-server1 is &lt;0.15.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931402" version="1" comment="go1.19 is &lt;1.19.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931403" version="1" comment="go1.19-doc is &lt;1.19.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931404" version="1" comment="go1.19-libstd is &lt;1.19.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931405" version="1" comment="go1.19-race is &lt;1.19.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931406" version="1" comment="redis is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931407" version="1" comment="MozillaFirefox is &lt;115.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931408" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931409" version="1" comment="MozillaFirefox-devel is &lt;115.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931410" version="1" comment="MozillaFirefox-translations-common is &lt;115.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931411" version="1" comment="MozillaFirefox-translations-other is &lt;115.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931412" version="1" comment="python312 is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931413" version="1" comment="python312-curses is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931414" version="1" comment="python312-dbm is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931415" version="1" comment="python312-idle is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931416" version="1" comment="python312-tk is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931417" version="1" comment="python312-x86-64-v3 is &lt;3.12.0b4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931418" version="1" comment="krb5 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931419" version="1" comment="krb5-32bit is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931420" version="1" comment="krb5-client is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931421" version="1" comment="krb5-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931422" version="1" comment="krb5-devel-32bit is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931423" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931424" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931425" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931426" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931427" version="1" comment="krb5-server is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931428" version="1" comment="libredwg-devel is &lt;0.12.5.5907-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931429" version="1" comment="libredwg-tools is &lt;0.12.5.5907-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931430" version="1" comment="libredwg0 is &lt;0.12.5.5907-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931431" version="1" comment="libcjose-devel is &lt;0.6.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931432" version="1" comment="libcjose0 is &lt;0.6.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931433" version="1" comment="cloud-init is &lt;23.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931434" version="1" comment="cloud-init-config-suse is &lt;23.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931435" version="1" comment="cloud-init-doc is &lt;23.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931436" version="1" comment="element-desktop is &lt;1.11.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931437" version="1" comment="element-web is &lt;1.11.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931438" version="1" comment="ghc-pandoc is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931439" version="1" comment="ghc-pandoc-devel is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931440" version="1" comment="ghc-pandoc-doc is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931441" version="1" comment="ghc-pandoc-prof is &lt;3.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931442" version="1" comment="libyajl-devel is &lt;2.1.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931443" version="1" comment="libyajl-devel-static is &lt;2.1.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931444" version="1" comment="libyajl2 is &lt;2.1.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931445" version="1" comment="yajl is &lt;2.1.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931446" version="1" comment="qemu is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931447" version="1" comment="qemu-SLOF is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931448" version="1" comment="qemu-accel-qtest is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931449" version="1" comment="qemu-accel-tcg-x86 is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931450" version="1" comment="qemu-arm is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931451" version="1" comment="qemu-audio-alsa is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931452" version="1" comment="qemu-audio-dbus is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931453" version="1" comment="qemu-audio-jack is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931454" version="1" comment="qemu-audio-oss is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931455" version="1" comment="qemu-audio-pa is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931456" version="1" comment="qemu-audio-spice is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931457" version="1" comment="qemu-block-curl is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931458" version="1" comment="qemu-block-dmg is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931459" version="1" comment="qemu-block-gluster is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931460" version="1" comment="qemu-block-iscsi is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931461" version="1" comment="qemu-block-nfs is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931462" version="1" comment="qemu-block-rbd is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931463" version="1" comment="qemu-block-ssh is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931464" version="1" comment="qemu-chardev-baum is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931465" version="1" comment="qemu-chardev-spice is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931466" version="1" comment="qemu-doc is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931467" version="1" comment="qemu-extra is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931468" version="1" comment="qemu-guest-agent is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931469" version="1" comment="qemu-headless is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931470" version="1" comment="qemu-hw-display-qxl is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931471" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931472" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931473" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931474" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931475" version="1" comment="qemu-hw-usb-host is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931476" version="1" comment="qemu-hw-usb-redirect is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931477" version="1" comment="qemu-hw-usb-smartcard is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931478" version="1" comment="qemu-img is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009895334" version="1" comment="qemu-ipxe is &lt;1.0.0+-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931479" version="1" comment="qemu-ivshmem-tools is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931480" version="1" comment="qemu-ksm is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931481" version="1" comment="qemu-kvm is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931482" version="1" comment="qemu-lang is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931483" version="1" comment="qemu-microvm is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931484" version="1" comment="qemu-ppc is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931485" version="1" comment="qemu-pr-helper is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931486" version="1" comment="qemu-s390x is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931487" version="1" comment="qemu-seabios is &lt;1.16.2_3_gd478f380-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931488" version="1" comment="qemu-skiboot is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931489" version="1" comment="qemu-tools is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931490" version="1" comment="qemu-ui-curses is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931491" version="1" comment="qemu-ui-dbus is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931492" version="1" comment="qemu-ui-gtk is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931493" version="1" comment="qemu-ui-opengl is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931494" version="1" comment="qemu-ui-spice-app is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931495" version="1" comment="qemu-ui-spice-core is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931496" version="1" comment="qemu-vgabios is &lt;1.16.2_3_gd478f380-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931497" version="1" comment="qemu-vhost-user-gpu is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931498" version="1" comment="qemu-x86 is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931499" version="1" comment="chromedriver is &lt;115.0.5790.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931500" version="1" comment="chromium is &lt;115.0.5790.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931501" version="1" comment="iperf is &lt;3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931502" version="1" comment="iperf-devel is &lt;3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931503" version="1" comment="libiperf0 is &lt;3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931504" version="1" comment="libvirt is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931505" version="1" comment="libvirt-client is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931506" version="1" comment="libvirt-client-qemu is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931507" version="1" comment="libvirt-daemon is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931508" version="1" comment="libvirt-daemon-common is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931509" version="1" comment="libvirt-daemon-config-network is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931510" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931511" version="1" comment="libvirt-daemon-driver-interface is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931512" version="1" comment="libvirt-daemon-driver-libxl is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931513" version="1" comment="libvirt-daemon-driver-lxc is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931514" version="1" comment="libvirt-daemon-driver-network is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931515" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931516" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931517" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931518" version="1" comment="libvirt-daemon-driver-secret is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931519" version="1" comment="libvirt-daemon-driver-storage is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931520" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931521" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931522" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931523" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931524" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931525" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931526" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931527" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931528" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931529" version="1" comment="libvirt-daemon-hooks is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931530" version="1" comment="libvirt-daemon-lock is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931531" version="1" comment="libvirt-daemon-log is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931532" version="1" comment="libvirt-daemon-lxc is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931533" version="1" comment="libvirt-daemon-plugin-lockd is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931534" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931535" version="1" comment="libvirt-daemon-proxy is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931536" version="1" comment="libvirt-daemon-qemu is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931537" version="1" comment="libvirt-daemon-xen is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931538" version="1" comment="libvirt-devel is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931539" version="1" comment="libvirt-doc is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931540" version="1" comment="libvirt-libs is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931541" version="1" comment="libvirt-nss is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931542" version="1" comment="wireshark-plugin-libvirt is &lt;9.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931543" version="1" comment="libnghttp2-14 is &lt;1.55.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931544" version="1" comment="libnghttp2-14-32bit is &lt;1.55.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931545" version="1" comment="libnghttp2-devel is &lt;1.55.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931546" version="1" comment="nghttp2 is &lt;1.55.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931547" version="1" comment="openssh is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931548" version="1" comment="openssh-cavs is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931549" version="1" comment="openssh-clients is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931550" version="1" comment="openssh-common is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931551" version="1" comment="openssh-fips is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931552" version="1" comment="openssh-helpers is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931553" version="1" comment="openssh-server is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931554" version="1" comment="openssh-server-config-rootlogin is &lt;9.3p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931555" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931556" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931557" version="1" comment="libopenssl1_1 is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931558" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931559" version="1" comment="openssl-1_1 is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931560" version="1" comment="openssl-1_1-doc is &lt;1.1.1u-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931561" version="1" comment="libopenssl-3-devel is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931562" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931563" version="1" comment="libopenssl3 is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931564" version="1" comment="libopenssl3-32bit is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931565" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931566" version="1" comment="openssl-3 is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931567" version="1" comment="openssl-3-doc is &lt;3.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931568" version="1" comment="python310 is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931569" version="1" comment="python310-32bit is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931570" version="1" comment="python310-curses is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931571" version="1" comment="python310-dbm is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931572" version="1" comment="python310-idle is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931573" version="1" comment="python310-tk is &lt;3.10.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931574" version="1" comment="libwireshark16 is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931575" version="1" comment="libwiretap13 is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931576" version="1" comment="libwsutil14 is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931577" version="1" comment="wireshark is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931578" version="1" comment="wireshark-devel is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931579" version="1" comment="wireshark-ui-qt is &lt;4.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931580" version="1" comment="zabbix-agent is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931581" version="1" comment="zabbix-java-gateway is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931582" version="1" comment="zabbix-proxy is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931583" version="1" comment="zabbix-proxy-mysql is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931584" version="1" comment="zabbix-proxy-postgresql is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931585" version="1" comment="zabbix-proxy-sqlite is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931586" version="1" comment="zabbix-server is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931587" version="1" comment="zabbix-server-mysql is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931588" version="1" comment="zabbix-server-postgresql is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931589" version="1" comment="zabbix-ui is &lt;6.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931590" version="1" comment="curl is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931591" version="1" comment="libcurl-devel is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931592" version="1" comment="libcurl-devel-32bit is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931593" version="1" comment="libcurl4 is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931594" version="1" comment="libcurl4-32bit is &lt;8.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931595" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931596" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931597" version="1" comment="libopenssl10 is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931598" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931599" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931600" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931601" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931602" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931603" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931604" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931605" version="1" comment="ctdb is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931606" version="1" comment="ctdb-pcp-pmda is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931607" version="1" comment="libsamba-policy-devel is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931608" version="1" comment="libsamba-policy-python3-devel is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931609" version="1" comment="libsamba-policy0-python3 is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931610" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931611" version="1" comment="samba is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931612" version="1" comment="samba-ad-dc is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931613" version="1" comment="samba-ad-dc-libs is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931614" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931615" version="1" comment="samba-ceph is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931616" version="1" comment="samba-client is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931617" version="1" comment="samba-client-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931618" version="1" comment="samba-client-libs is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931619" version="1" comment="samba-client-libs-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931620" version="1" comment="samba-devel is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931621" version="1" comment="samba-devel-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931622" version="1" comment="samba-doc is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931623" version="1" comment="samba-dsdb-modules is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931624" version="1" comment="samba-gpupdate is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931625" version="1" comment="samba-ldb-ldap is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931626" version="1" comment="samba-libs is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931627" version="1" comment="samba-libs-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931628" version="1" comment="samba-libs-python3 is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931629" version="1" comment="samba-libs-python3-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931630" version="1" comment="samba-python3 is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931631" version="1" comment="samba-test is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931632" version="1" comment="samba-tool is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931633" version="1" comment="samba-winbind is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931634" version="1" comment="samba-winbind-libs is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931635" version="1" comment="samba-winbind-libs-32bit is &lt;4.18.5+git.313.c8e274c7852-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931636" version="1" comment="MozillaThunderbird is &lt;102.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931637" version="1" comment="MozillaThunderbird-translations-common is &lt;102.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931638" version="1" comment="MozillaThunderbird-translations-other is &lt;102.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931639" version="1" comment="apptainer is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931640" version="1" comment="go1.20 is &lt;1.20.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931641" version="1" comment="go1.20-doc is &lt;1.20.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931642" version="1" comment="go1.20-libstd is &lt;1.20.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931643" version="1" comment="go1.20-race is &lt;1.20.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931644" version="1" comment="java-11-openjdk is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931645" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931646" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931647" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931648" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931649" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931650" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931651" version="1" comment="java-17-openjdk is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931652" version="1" comment="java-17-openjdk-demo is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931653" version="1" comment="java-17-openjdk-devel is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931654" version="1" comment="java-17-openjdk-headless is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931655" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931656" version="1" comment="java-17-openjdk-jmods is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931657" version="1" comment="java-17-openjdk-src is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931658" version="1" comment="nodejs-electron is &lt;22.3.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931659" version="1" comment="nodejs-electron-devel is &lt;22.3.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931660" version="1" comment="nodejs-electron-doc is &lt;22.3.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931661" version="1" comment="python310-cryptography is &lt;41.0.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931662" version="1" comment="python311-cryptography is &lt;41.0.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931663" version="1" comment="python39-cryptography is &lt;41.0.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931664" version="1" comment="libQt6Concurrent6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931665" version="1" comment="libQt6Core6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931666" version="1" comment="libQt6DBus6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931667" version="1" comment="libQt6Gui6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931668" version="1" comment="libQt6Network6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931669" version="1" comment="libQt6OpenGL6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931670" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931671" version="1" comment="libQt6PrintSupport6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931672" version="1" comment="libQt6Sql6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931673" version="1" comment="libQt6Test6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931674" version="1" comment="libQt6Widgets6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931675" version="1" comment="libQt6Xml6 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931676" version="1" comment="qt6-base-common-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931677" version="1" comment="qt6-base-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931678" version="1" comment="qt6-base-examples is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931679" version="1" comment="qt6-base-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931680" version="1" comment="qt6-concurrent-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931681" version="1" comment="qt6-core-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931682" version="1" comment="qt6-core-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931683" version="1" comment="qt6-dbus-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931684" version="1" comment="qt6-dbus-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931685" version="1" comment="qt6-docs-common is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931686" version="1" comment="qt6-exampleicons-devel-static is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931687" version="1" comment="qt6-gui-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931688" version="1" comment="qt6-gui-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931689" version="1" comment="qt6-kmssupport-devel-static is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931690" version="1" comment="qt6-kmssupport-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931691" version="1" comment="qt6-network-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931692" version="1" comment="qt6-network-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931693" version="1" comment="qt6-network-tls is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931694" version="1" comment="qt6-networkinformation-glib is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931695" version="1" comment="qt6-networkinformation-nm is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931696" version="1" comment="qt6-opengl-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931697" version="1" comment="qt6-opengl-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931698" version="1" comment="qt6-openglwidgets-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931699" version="1" comment="qt6-platformsupport-devel-static is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931700" version="1" comment="qt6-platformsupport-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931701" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931702" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931703" version="1" comment="qt6-printsupport-cups is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931704" version="1" comment="qt6-printsupport-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931705" version="1" comment="qt6-printsupport-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931706" version="1" comment="qt6-sql-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931707" version="1" comment="qt6-sql-mysql is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931708" version="1" comment="qt6-sql-postgresql is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931709" version="1" comment="qt6-sql-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931710" version="1" comment="qt6-sql-sqlite is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931711" version="1" comment="qt6-sql-unixODBC is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931712" version="1" comment="qt6-test-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931713" version="1" comment="qt6-test-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931714" version="1" comment="qt6-widgets-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931715" version="1" comment="qt6-widgets-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931716" version="1" comment="qt6-xml-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931717" version="1" comment="qt6-xml-private-devel is &lt;6.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931719" version="1" comment="kernel-macros is &lt;6.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931720" version="1" comment="kernel-source is &lt;6.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931721" version="1" comment="kernel-source-vanilla is &lt;6.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931722" version="1" comment="ghostscript is &lt;9.56.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931723" version="1" comment="ghostscript-devel is &lt;9.56.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931724" version="1" comment="ghostscript-x11 is &lt;9.56.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931725" version="1" comment="qemu is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931726" version="1" comment="qemu-SLOF is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931727" version="1" comment="qemu-accel-qtest is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931728" version="1" comment="qemu-accel-tcg-x86 is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931729" version="1" comment="qemu-arm is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931730" version="1" comment="qemu-audio-alsa is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931731" version="1" comment="qemu-audio-dbus is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931732" version="1" comment="qemu-audio-jack is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931733" version="1" comment="qemu-audio-oss is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931734" version="1" comment="qemu-audio-pa is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931735" version="1" comment="qemu-audio-spice is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931736" version="1" comment="qemu-block-curl is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931737" version="1" comment="qemu-block-dmg is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931738" version="1" comment="qemu-block-gluster is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931739" version="1" comment="qemu-block-iscsi is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931740" version="1" comment="qemu-block-nfs is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931741" version="1" comment="qemu-block-rbd is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931742" version="1" comment="qemu-block-ssh is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931743" version="1" comment="qemu-chardev-baum is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931744" version="1" comment="qemu-chardev-spice is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931745" version="1" comment="qemu-doc is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931746" version="1" comment="qemu-extra is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931747" version="1" comment="qemu-guest-agent is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931748" version="1" comment="qemu-headless is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931749" version="1" comment="qemu-hw-display-qxl is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931750" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931751" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931752" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931753" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931754" version="1" comment="qemu-hw-usb-host is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931755" version="1" comment="qemu-hw-usb-redirect is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931756" version="1" comment="qemu-hw-usb-smartcard is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931757" version="1" comment="qemu-img is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931758" version="1" comment="qemu-ivshmem-tools is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931759" version="1" comment="qemu-ksm is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931760" version="1" comment="qemu-kvm is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931761" version="1" comment="qemu-lang is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931762" version="1" comment="qemu-microvm is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931763" version="1" comment="qemu-ppc is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931764" version="1" comment="qemu-pr-helper is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931765" version="1" comment="qemu-s390x is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931766" version="1" comment="qemu-seabios is &lt;1.16.2_3_gd478f380-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931767" version="1" comment="qemu-skiboot is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931768" version="1" comment="qemu-tools is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931769" version="1" comment="qemu-ui-curses is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931770" version="1" comment="qemu-ui-dbus is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931771" version="1" comment="qemu-ui-gtk is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931772" version="1" comment="qemu-ui-opengl is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931773" version="1" comment="qemu-ui-spice-app is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931774" version="1" comment="qemu-ui-spice-core is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931775" version="1" comment="qemu-vgabios is &lt;1.16.2_3_gd478f380-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931776" version="1" comment="qemu-vhost-user-gpu is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931777" version="1" comment="qemu-x86 is &lt;8.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931778" version="1" comment="amanda is &lt;3.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931779" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931780" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931781" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931782" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931783" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931784" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931785" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931786" version="1" comment="python39 is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931787" version="1" comment="python39-32bit is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931788" version="1" comment="python39-curses is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931789" version="1" comment="python39-dbm is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931790" version="1" comment="python39-idle is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931791" version="1" comment="python39-tk is &lt;3.9.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931792" version="1" comment="gstreamer-plugins-bad is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931793" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931794" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931795" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931796" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931797" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931798" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931799" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931800" version="1" comment="gstreamer-transcoder is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931801" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931802" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931803" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931804" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931805" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931806" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931807" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931808" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931809" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931810" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931811" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931812" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931813" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931814" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931815" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931816" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931817" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931818" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931819" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931820" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931821" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931822" version="1" comment="libgstplay-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931823" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931824" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931825" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931826" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931827" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931828" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931829" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931830" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931831" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931832" version="1" comment="libgstva-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931833" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931834" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931835" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931836" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931837" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931838" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931839" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931840" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931841" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931842" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931843" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931844" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931845" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931846" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931847" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931848" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931849" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931850" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931851" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931852" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931853" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931854" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931855" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931856" version="1" comment="gstreamer-plugins-base is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931857" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931858" version="1" comment="gstreamer-plugins-base-devel is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931859" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931860" version="1" comment="gstreamer-plugins-base-lang is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931861" version="1" comment="libgstallocators-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931862" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931863" version="1" comment="libgstapp-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931864" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931865" version="1" comment="libgstaudio-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931866" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931867" version="1" comment="libgstfft-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931868" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931869" version="1" comment="libgstgl-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931870" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931871" version="1" comment="libgstpbutils-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931872" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931873" version="1" comment="libgstriff-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931874" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931875" version="1" comment="libgstrtp-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931876" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931877" version="1" comment="libgstrtsp-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931878" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931879" version="1" comment="libgstsdp-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931880" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931881" version="1" comment="libgsttag-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931882" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931883" version="1" comment="libgstvideo-1_0-0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931884" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931885" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931886" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931887" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931888" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931889" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931890" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931891" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931892" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931893" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931894" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931895" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931896" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931897" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931898" version="1" comment="gstreamer-plugins-good is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931899" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931900" version="1" comment="gstreamer-plugins-good-extra is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931901" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931902" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931903" version="1" comment="gstreamer-plugins-good-jack is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931904" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931905" version="1" comment="gstreamer-plugins-good-lang is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931906" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931907" version="1" comment="gstreamer-plugins-ugly is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931908" version="1" comment="gstreamer-plugins-ugly-32bit is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931909" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.22.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931910" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931911" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931912" version="1" comment="libopenssl1_1 is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931913" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931914" version="1" comment="openssl-1_1 is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931915" version="1" comment="openssl-1_1-doc is &lt;1.1.1v-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931916" version="1" comment="MozillaThunderbird is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931917" version="1" comment="MozillaThunderbird-translations-common is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931918" version="1" comment="MozillaThunderbird-translations-other is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931919" version="1" comment="chromedriver is &lt;115.0.5790.170-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931920" version="1" comment="chromium is &lt;115.0.5790.170-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931921" version="1" comment="go1.19 is &lt;1.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931922" version="1" comment="go1.19-doc is &lt;1.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931923" version="1" comment="go1.19-libstd is &lt;1.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931924" version="1" comment="go1.19-race is &lt;1.19.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931925" version="1" comment="go1.20 is &lt;1.20.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931926" version="1" comment="go1.20-doc is &lt;1.20.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931927" version="1" comment="go1.20-libstd is &lt;1.20.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931928" version="1" comment="go1.20-race is &lt;1.20.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931929" version="1" comment="kernel-firmware is &lt;20230731-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931930" version="1" comment="ucode-amd is &lt;20230731-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931931" version="1" comment="keylime-config is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931932" version="1" comment="keylime-firewalld is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931933" version="1" comment="keylime-logrotate is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931934" version="1" comment="keylime-registrar is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931935" version="1" comment="keylime-tenant is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931936" version="1" comment="keylime-tpm_cert_store is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931937" version="1" comment="keylime-verifier is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931938" version="1" comment="python310-keylime is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931939" version="1" comment="python311-keylime is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931940" version="1" comment="python39-keylime is &lt;7.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931941" version="1" comment="libopenssl-3-devel is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931942" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931943" version="1" comment="libopenssl3 is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931944" version="1" comment="libopenssl3-32bit is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931945" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931946" version="1" comment="openssl-3 is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931947" version="1" comment="openssl-3-doc is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931948" version="1" comment="pgadmin4 is &lt;7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931949" version="1" comment="pgadmin4-doc is &lt;7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931950" version="1" comment="pgadmin4-web is &lt;7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931951" version="1" comment="pgadmin4-web-uwsgi is &lt;7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931952" version="1" comment="python38 is &lt;3.8.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931953" version="1" comment="python38-curses is &lt;3.8.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931954" version="1" comment="python38-dbm is &lt;3.8.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931955" version="1" comment="python38-idle is &lt;3.8.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931956" version="1" comment="python38-tk is &lt;3.8.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931957" version="1" comment="ungoogled-chromium is &lt;115.0.5790.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931958" version="1" comment="ungoogled-chromium-chromedriver is &lt;115.0.5790.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931959" version="1" comment="cargo1.71 is &lt;1.71.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931960" version="1" comment="rust1.71 is &lt;1.71.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931961" version="1" comment="ungoogled-chromium is &lt;115.0.5790.170-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931962" version="1" comment="ungoogled-chromium-chromedriver is &lt;115.0.5790.170-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931963" version="1" comment="kbfs is &lt;6.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931964" version="1" comment="kbfs-git is &lt;6.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931965" version="1" comment="kbfs-tool is &lt;6.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931966" version="1" comment="keybase-client is &lt;6.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931967" version="1" comment="python311 is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931968" version="1" comment="python311-32bit is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931969" version="1" comment="python311-curses is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931970" version="1" comment="python311-dbm is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931971" version="1" comment="python311-idle is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931972" version="1" comment="python311-tk is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931973" version="1" comment="python311-x86-64-v3 is &lt;3.11.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931974" version="1" comment="xen is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931975" version="1" comment="xen-devel is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931976" version="1" comment="xen-doc-html is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931977" version="1" comment="xen-libs is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931978" version="1" comment="xen-tools is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931979" version="1" comment="xen-tools-domU is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931980" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.1_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931981" version="1" comment="hoard is &lt;v.1.4.2~0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931982" version="1" comment="python310-tornado6 is &lt;6.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931983" version="1" comment="python311-tornado6 is &lt;6.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931984" version="1" comment="python39-tornado6 is &lt;6.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931985" version="1" comment="tcpreplay is &lt;4.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931986" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;1.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931987" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931988" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931989" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931990" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931991" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931992" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931993" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.372-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931994" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931995" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931996" version="1" comment="libopenssl10 is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931997" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931998" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009931999" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932000" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932001" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932002" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932003" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932005" version="1" comment="kernel-macros is &lt;6.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932006" version="1" comment="kernel-source is &lt;6.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932007" version="1" comment="kernel-source-vanilla is &lt;6.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932008" version="1" comment="kernel-firmware is &lt;20230731-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932009" version="1" comment="ucode-amd is &lt;20230731-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932010" version="1" comment="qemu is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932011" version="1" comment="qemu-SLOF is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932012" version="1" comment="qemu-accel-qtest is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932013" version="1" comment="qemu-accel-tcg-x86 is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932014" version="1" comment="qemu-arm is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932015" version="1" comment="qemu-audio-alsa is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932016" version="1" comment="qemu-audio-dbus is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932017" version="1" comment="qemu-audio-jack is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932018" version="1" comment="qemu-audio-oss is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932019" version="1" comment="qemu-audio-pa is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932020" version="1" comment="qemu-audio-spice is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932021" version="1" comment="qemu-block-curl is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932022" version="1" comment="qemu-block-dmg is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932023" version="1" comment="qemu-block-gluster is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932024" version="1" comment="qemu-block-iscsi is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932025" version="1" comment="qemu-block-nfs is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932026" version="1" comment="qemu-block-rbd is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932027" version="1" comment="qemu-block-ssh is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932028" version="1" comment="qemu-chardev-baum is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932029" version="1" comment="qemu-chardev-spice is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932030" version="1" comment="qemu-doc is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932031" version="1" comment="qemu-extra is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932032" version="1" comment="qemu-guest-agent is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932033" version="1" comment="qemu-headless is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932034" version="1" comment="qemu-hw-display-qxl is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932035" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932036" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932037" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932038" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932039" version="1" comment="qemu-hw-usb-host is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932040" version="1" comment="qemu-hw-usb-redirect is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932041" version="1" comment="qemu-hw-usb-smartcard is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932042" version="1" comment="qemu-img is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932043" version="1" comment="qemu-ivshmem-tools is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932044" version="1" comment="qemu-ksm is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932045" version="1" comment="qemu-kvm is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932046" version="1" comment="qemu-lang is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932047" version="1" comment="qemu-microvm is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932048" version="1" comment="qemu-ppc is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932049" version="1" comment="qemu-pr-helper is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932050" version="1" comment="qemu-s390x is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932051" version="1" comment="qemu-skiboot is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932052" version="1" comment="qemu-tools is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932053" version="1" comment="qemu-ui-curses is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932054" version="1" comment="qemu-ui-dbus is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932055" version="1" comment="qemu-ui-gtk is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932056" version="1" comment="qemu-ui-opengl is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932057" version="1" comment="qemu-ui-spice-app is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932058" version="1" comment="qemu-ui-spice-core is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932059" version="1" comment="qemu-vhost-user-gpu is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932060" version="1" comment="qemu-x86 is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932061" version="1" comment="ucode-intel is &lt;20230808-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932062" version="1" comment="haproxy is &lt;2.8.2+git0.61a0f576a-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932063" version="1" comment="corepack20 is &lt;20.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932064" version="1" comment="nodejs20 is &lt;20.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932065" version="1" comment="nodejs20-devel is &lt;20.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932066" version="1" comment="nodejs20-docs is &lt;20.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932067" version="1" comment="npm20 is &lt;20.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932068" version="1" comment="postgresql11 is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932069" version="1" comment="postgresql11-contrib is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932070" version="1" comment="postgresql11-devel is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932071" version="1" comment="postgresql11-docs is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932072" version="1" comment="postgresql11-llvmjit is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932073" version="1" comment="postgresql11-llvmjit-devel is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932074" version="1" comment="postgresql11-plperl is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932075" version="1" comment="postgresql11-plpython is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932076" version="1" comment="postgresql11-pltcl is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932077" version="1" comment="postgresql11-server is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932078" version="1" comment="postgresql11-server-devel is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932079" version="1" comment="postgresql11-test is &lt;11.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932080" version="1" comment="postgresql12 is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932081" version="1" comment="postgresql12-contrib is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932082" version="1" comment="postgresql12-devel is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932083" version="1" comment="postgresql12-docs is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932084" version="1" comment="postgresql12-llvmjit is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932085" version="1" comment="postgresql12-llvmjit-devel is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932086" version="1" comment="postgresql12-plperl is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932087" version="1" comment="postgresql12-plpython is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932088" version="1" comment="postgresql12-pltcl is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932089" version="1" comment="postgresql12-server is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932090" version="1" comment="postgresql12-server-devel is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932091" version="1" comment="postgresql12-test is &lt;12.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932092" version="1" comment="postgresql13 is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932093" version="1" comment="postgresql13-contrib is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932094" version="1" comment="postgresql13-devel is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932095" version="1" comment="postgresql13-docs is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932096" version="1" comment="postgresql13-llvmjit is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932097" version="1" comment="postgresql13-llvmjit-devel is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932098" version="1" comment="postgresql13-plperl is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932099" version="1" comment="postgresql13-plpython is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932100" version="1" comment="postgresql13-pltcl is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932101" version="1" comment="postgresql13-server is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932102" version="1" comment="postgresql13-server-devel is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932103" version="1" comment="postgresql13-test is &lt;13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932104" version="1" comment="python3-salt is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932105" version="1" comment="salt is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932106" version="1" comment="salt-api is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932107" version="1" comment="salt-bash-completion is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932108" version="1" comment="salt-cloud is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932109" version="1" comment="salt-doc is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932110" version="1" comment="salt-fish-completion is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932111" version="1" comment="salt-master is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932112" version="1" comment="salt-minion is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932113" version="1" comment="salt-proxy is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932114" version="1" comment="salt-ssh is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932115" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932116" version="1" comment="salt-syndic is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932117" version="1" comment="salt-tests is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932118" version="1" comment="salt-transactional-update is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932119" version="1" comment="salt-zsh-completion is &lt;3006.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932120" version="1" comment="xen is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932121" version="1" comment="xen-devel is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932122" version="1" comment="xen-doc-html is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932123" version="1" comment="xen-libs is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932124" version="1" comment="xen-tools is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932125" version="1" comment="xen-tools-domU is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932126" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932127" version="1" comment="glibc is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932128" version="1" comment="glibc-devel is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932129" version="1" comment="glibc-devel-static is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932130" version="1" comment="glibc-extra is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932131" version="1" comment="glibc-html is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932132" version="1" comment="glibc-i18ndata is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932133" version="1" comment="glibc-info is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932134" version="1" comment="glibc-lang is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932135" version="1" comment="glibc-locale is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932136" version="1" comment="glibc-locale-base is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932137" version="1" comment="glibc-profile is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932138" version="1" comment="nscd is &lt;2.38-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932139" version="1" comment="MozillaFirefox is &lt;116.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932140" version="1" comment="MozillaFirefox-branding-upstream is &lt;116.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932141" version="1" comment="MozillaFirefox-devel is &lt;116.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932142" version="1" comment="MozillaFirefox-translations-common is &lt;116.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932143" version="1" comment="MozillaFirefox-translations-other is &lt;116.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932144" version="1" comment="nodejs-electron is &lt;22.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932145" version="1" comment="nodejs-electron-devel is &lt;22.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932146" version="1" comment="nodejs-electron-doc is &lt;22.3.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932147" version="1" comment="opensuse-welcome is &lt;0.1.9+git.35.4b9444a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932148" version="1" comment="opensuse-welcome-lang is &lt;0.1.9+git.35.4b9444a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932149" version="1" comment="icu is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932150" version="1" comment="libicu-devel is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932151" version="1" comment="libicu-devel-32bit is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932152" version="1" comment="libicu-doc is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932153" version="1" comment="libicu73 is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932154" version="1" comment="libicu73-32bit is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932155" version="1" comment="libicu73-bedata is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932156" version="1" comment="libicu73-ledata is &lt;73.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932157" version="1" comment="bluez is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932158" version="1" comment="bluez-auto-enable-devices is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932159" version="1" comment="bluez-cups is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932160" version="1" comment="bluez-deprecated is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932161" version="1" comment="bluez-devel is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932162" version="1" comment="bluez-devel-32bit is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932163" version="1" comment="bluez-obexd is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932164" version="1" comment="bluez-test is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932165" version="1" comment="bluez-zsh-completion is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932166" version="1" comment="libbluetooth3 is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932167" version="1" comment="libbluetooth3-32bit is &lt;5.68-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932168" version="1" comment="commons-compiler is &lt;3.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932169" version="1" comment="commons-compiler-jdk is &lt;3.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932170" version="1" comment="janino is &lt;3.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932171" version="1" comment="janino-javadoc is &lt;3.1.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932172" version="1" comment="java-11-openj9 is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932173" version="1" comment="java-11-openj9-demo is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932174" version="1" comment="java-11-openj9-devel is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932175" version="1" comment="java-11-openj9-headless is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932176" version="1" comment="java-11-openj9-javadoc is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932177" version="1" comment="java-11-openj9-jmods is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932178" version="1" comment="java-11-openj9-src is &lt;11.0.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932179" version="1" comment="java-17-openj9 is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932180" version="1" comment="java-17-openj9-demo is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932181" version="1" comment="java-17-openj9-devel is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932182" version="1" comment="java-17-openj9-headless is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932183" version="1" comment="java-17-openj9-javadoc is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932184" version="1" comment="java-17-openj9-jmods is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932185" version="1" comment="java-17-openj9-src is &lt;17.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932186" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932187" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932188" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932189" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932190" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932191" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932192" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.382-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932193" version="1" comment="libmozjs-102-0 is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932194" version="1" comment="mozjs102 is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932195" version="1" comment="mozjs102-devel is &lt;102.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932196" version="1" comment="libecpg6 is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932197" version="1" comment="libecpg6-32bit is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932198" version="1" comment="libpq5 is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932199" version="1" comment="libpq5-32bit is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932200" version="1" comment="postgresql15 is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932201" version="1" comment="postgresql15-contrib is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932202" version="1" comment="postgresql15-devel is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932203" version="1" comment="postgresql15-docs is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932204" version="1" comment="postgresql15-llvmjit is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932205" version="1" comment="postgresql15-llvmjit-devel is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932206" version="1" comment="postgresql15-plperl is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932207" version="1" comment="postgresql15-plpython is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932208" version="1" comment="postgresql15-pltcl is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932209" version="1" comment="postgresql15-server is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932210" version="1" comment="postgresql15-server-devel is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932211" version="1" comment="postgresql15-test is &lt;15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932212" version="1" comment="python is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932213" version="1" comment="python-32bit is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932214" version="1" comment="python-curses is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932215" version="1" comment="python-demo is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932216" version="1" comment="python-gdbm is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932217" version="1" comment="python-idle is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932218" version="1" comment="python-tk is &lt;2.7.18-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932219" version="1" comment="python310-cmarkgfm is &lt;2022.10.27-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932220" version="1" comment="python311-cmarkgfm is &lt;2022.10.27-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932221" version="1" comment="python39-cmarkgfm is &lt;2022.10.27-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932222" version="1" comment="ruby3.2-rubygem-rails-html-sanitizer is &lt;1.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932223" version="1" comment="w3m is &lt;0.5.3+git20230121-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932224" version="1" comment="w3m-inline-image is &lt;0.5.3+git20230121-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932225" version="1" comment="chromedriver is &lt;116.0.5845.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932226" version="1" comment="chromium is &lt;116.0.5845.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932227" version="1" comment="libprocps8 is &lt;3.3.17-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932228" version="1" comment="procps is &lt;3.3.17-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932229" version="1" comment="procps-devel is &lt;3.3.17-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932230" version="1" comment="procps-lang is &lt;3.3.17-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932231" version="1" comment="libproc2-0 is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932232" version="1" comment="procps4 is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932233" version="1" comment="procps4-devel is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932234" version="1" comment="procps4-lang is &lt;4.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932235" version="1" comment="yt-dlp is &lt;2023.07.06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932236" version="1" comment="yt-dlp-bash-completion is &lt;2023.07.06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932237" version="1" comment="yt-dlp-fish-completion is &lt;2023.07.06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932238" version="1" comment="yt-dlp-zsh-completion is &lt;2023.07.06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932239" version="1" comment="golang-github-prometheus-prometheus is &lt;2.46.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932240" version="1" comment="ungoogled-chromium is &lt;116.0.5845.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932241" version="1" comment="ungoogled-chromium-chromedriver is &lt;116.0.5845.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932243" version="1" comment="kernel-macros is &lt;6.4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932244" version="1" comment="kernel-source is &lt;6.4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932245" version="1" comment="kernel-source-vanilla is &lt;6.4.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932246" version="1" comment="python310-GitPython is &lt;3.1.32.1689011721.5d45ce2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932247" version="1" comment="python311-GitPython is &lt;3.1.32.1689011721.5d45ce2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932248" version="1" comment="python39-GitPython is &lt;3.1.32.1689011721.5d45ce2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932249" version="1" comment="libQt6Concurrent6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932250" version="1" comment="libQt6Core6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932251" version="1" comment="libQt6DBus6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932252" version="1" comment="libQt6Gui6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932253" version="1" comment="libQt6Network6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932254" version="1" comment="libQt6OpenGL6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932255" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932256" version="1" comment="libQt6PrintSupport6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932257" version="1" comment="libQt6Sql6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932258" version="1" comment="libQt6Test6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932259" version="1" comment="libQt6Widgets6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932260" version="1" comment="libQt6Xml6 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932261" version="1" comment="qt6-base-common-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932262" version="1" comment="qt6-base-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932263" version="1" comment="qt6-base-examples is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932264" version="1" comment="qt6-base-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932265" version="1" comment="qt6-concurrent-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932266" version="1" comment="qt6-core-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932267" version="1" comment="qt6-core-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932268" version="1" comment="qt6-dbus-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932269" version="1" comment="qt6-dbus-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932270" version="1" comment="qt6-docs-common is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932271" version="1" comment="qt6-exampleicons-devel-static is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932272" version="1" comment="qt6-gui-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932273" version="1" comment="qt6-gui-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932274" version="1" comment="qt6-kmssupport-devel-static is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932275" version="1" comment="qt6-kmssupport-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932276" version="1" comment="qt6-network-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932277" version="1" comment="qt6-network-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932278" version="1" comment="qt6-network-tls is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932279" version="1" comment="qt6-networkinformation-glib is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932280" version="1" comment="qt6-networkinformation-nm is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932281" version="1" comment="qt6-opengl-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932282" version="1" comment="qt6-opengl-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932283" version="1" comment="qt6-openglwidgets-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932284" version="1" comment="qt6-platformsupport-devel-static is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932285" version="1" comment="qt6-platformsupport-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932286" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932287" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932288" version="1" comment="qt6-printsupport-cups is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932289" version="1" comment="qt6-printsupport-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932290" version="1" comment="qt6-printsupport-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932291" version="1" comment="qt6-sql-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932292" version="1" comment="qt6-sql-mysql is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932293" version="1" comment="qt6-sql-postgresql is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932294" version="1" comment="qt6-sql-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932295" version="1" comment="qt6-sql-sqlite is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932296" version="1" comment="qt6-sql-unixODBC is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932297" version="1" comment="qt6-test-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932298" version="1" comment="qt6-test-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932299" version="1" comment="qt6-widgets-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932300" version="1" comment="qt6-widgets-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932301" version="1" comment="qt6-xml-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932302" version="1" comment="qt6-xml-private-devel is &lt;6.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932303" version="1" comment="apache-ivy is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932304" version="1" comment="apache-ivy-javadoc is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932305" version="1" comment="indent is &lt;2.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932306" version="1" comment="indent-lang is &lt;2.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932307" version="1" comment="jackson-dataformat-xml is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932308" version="1" comment="jackson-dataformat-xml-javadoc is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932309" version="1" comment="jackson-dataformat-csv is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932310" version="1" comment="jackson-dataformat-properties is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932311" version="1" comment="jackson-dataformat-toml is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932312" version="1" comment="jackson-dataformat-yaml is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932313" version="1" comment="jackson-dataformats-text is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932314" version="1" comment="jackson-dataformats-text-javadoc is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932315" version="1" comment="jtidy is &lt;1.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932316" version="1" comment="jtidy-javadoc is &lt;1.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932317" version="1" comment="jtidy-scripts is &lt;1.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932318" version="1" comment="php8 is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932319" version="1" comment="php8-bcmath is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932320" version="1" comment="php8-bz2 is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932321" version="1" comment="php8-calendar is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932322" version="1" comment="php8-cli is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932323" version="1" comment="php8-ctype is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932324" version="1" comment="php8-curl is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932325" version="1" comment="php8-dba is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932326" version="1" comment="php8-devel is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932327" version="1" comment="php8-dom is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932328" version="1" comment="php8-enchant is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932329" version="1" comment="php8-exif is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932330" version="1" comment="php8-ffi is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932331" version="1" comment="php8-fileinfo is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932332" version="1" comment="php8-ftp is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932333" version="1" comment="php8-gd is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932334" version="1" comment="php8-gettext is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932335" version="1" comment="php8-gmp is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932336" version="1" comment="php8-iconv is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932337" version="1" comment="php8-intl is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932338" version="1" comment="php8-ldap is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932339" version="1" comment="php8-mbstring is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932340" version="1" comment="php8-mysql is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932341" version="1" comment="php8-odbc is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932342" version="1" comment="php8-opcache is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932343" version="1" comment="php8-openssl is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932344" version="1" comment="php8-pcntl is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932345" version="1" comment="php8-pdo is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932346" version="1" comment="php8-pgsql is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932347" version="1" comment="php8-phar is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932348" version="1" comment="php8-posix is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932349" version="1" comment="php8-readline is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932350" version="1" comment="php8-shmop is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932351" version="1" comment="php8-snmp is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932352" version="1" comment="php8-soap is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932353" version="1" comment="php8-sockets is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932354" version="1" comment="php8-sodium is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932355" version="1" comment="php8-sqlite is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932356" version="1" comment="php8-sysvmsg is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932357" version="1" comment="php8-sysvsem is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932358" version="1" comment="php8-sysvshm is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932359" version="1" comment="php8-tidy is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932360" version="1" comment="php8-tokenizer is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932361" version="1" comment="php8-xmlreader is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932362" version="1" comment="php8-xmlwriter is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932363" version="1" comment="php8-xsl is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932364" version="1" comment="php8-zip is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932365" version="1" comment="php8-zlib is &lt;8.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932366" version="1" comment="perl-File-Path is &lt;2.180000-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932367" version="1" comment="ruby3.2-rubygem-fluentd is &lt;1.15.3-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932368" version="1" comment="ruby3.2-rubygem-globalid is &lt;1.1.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932369" version="1" comment="ruby3.2-rubygem-http is &lt;5.1.0-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932370" version="1" comment="ruby3.2-rubygem-http-cookie is &lt;1.0.5-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932371" version="1" comment="ruby3.2-rubygem-jquery-rails is &lt;4.5.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932372" version="1" comment="ruby3.2-rubygem-json_pure is &lt;2.6.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932373" version="1" comment="ruby3.2-rubygem-kramdown is &lt;2.4.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932374" version="1" comment="ruby3.2-rubygem-loofah is &lt;2.19.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932375" version="1" comment="ruby3.2-rubygem-minitar is &lt;0.9-1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932376" version="1" comment="ruby3.2-rubygem-multi_xml is &lt;0.6.0-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932377" version="1" comment="ruby3.2-rubygem-nokogiri is &lt;1.13.9-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932378" version="1" comment="ruby3.2-rubygem-puma-5 is &lt;5.6.5-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932379" version="1" comment="ruby3.2-rubygem-rack is &lt;3.0.7-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932380" version="1" comment="ruby3.2-rubygem-rubyzip is &lt;2.3.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932381" version="1" comment="ruby3.2-rubygem-sprockets is &lt;4.1.1-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932382" version="1" comment="ruby3.2-rubygem-sprockets-3.7 is &lt;3.7.2-1.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932383" version="1" comment="ruby3.2-rubygem-tzinfo-1.2 is &lt;1.2.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932384" version="1" comment="ruby3.2-rubygem-web-console is &lt;4.2.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932385" version="1" comment="ruby3.2-rubygem-websocket-extensions is &lt;0.1.5-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932386" version="1" comment="clamav is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932387" version="1" comment="clamav-devel is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932388" version="1" comment="clamav-docs-html is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932389" version="1" comment="clamav-milter is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932390" version="1" comment="libclamav9 is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932391" version="1" comment="libfreshclam2 is &lt;0.103.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932392" version="1" comment="chromedriver is &lt;116.0.5845.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932393" version="1" comment="chromium is &lt;116.0.5845.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932394" version="1" comment="MozillaFirefox is &lt;117.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932395" version="1" comment="MozillaFirefox-branding-upstream is &lt;117.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932396" version="1" comment="MozillaFirefox-devel is &lt;117.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932397" version="1" comment="MozillaFirefox-translations-common is &lt;117.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932398" version="1" comment="MozillaFirefox-translations-other is &lt;117.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932399" version="1" comment="chromedriver is &lt;116.0.5845.140-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932400" version="1" comment="chromium is &lt;116.0.5845.140-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932401" version="1" comment="djvulibre is &lt;3.5.28-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932402" version="1" comment="djvulibre-doc is &lt;3.5.28-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932403" version="1" comment="libdjvulibre-devel is &lt;3.5.28-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932404" version="1" comment="libdjvulibre21 is &lt;3.5.28-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932406" version="1" comment="kernel-macros is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932407" version="1" comment="kernel-source is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932408" version="1" comment="kernel-source-vanilla is &lt;6.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932409" version="1" comment="jdom is &lt;1.1.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932410" version="1" comment="jdom-demo is &lt;1.1.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932411" version="1" comment="jdom-javadoc is &lt;1.1.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932412" version="1" comment="busybox is &lt;1.36.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932413" version="1" comment="busybox-static is &lt;1.36.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932414" version="1" comment="busybox-testsuite is &lt;1.36.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932415" version="1" comment="busybox-warewulf3 is &lt;1.36.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932416" version="1" comment="nodejs-electron is &lt;22.3.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932417" version="1" comment="nodejs-electron-devel is &lt;22.3.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932418" version="1" comment="nodejs-electron-doc is &lt;22.3.21-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932419" version="1" comment="spectre-meltdown-checker is &lt;0.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932420" version="1" comment="libwireshark16 is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932421" version="1" comment="libwiretap13 is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932422" version="1" comment="libwsutil14 is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932423" version="1" comment="wireshark is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932424" version="1" comment="wireshark-devel is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932425" version="1" comment="wireshark-ui-qt is &lt;4.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932426" version="1" comment="nodejs-electron is &lt;22.3.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932427" version="1" comment="nodejs-electron-devel is &lt;22.3.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932428" version="1" comment="nodejs-electron-doc is &lt;22.3.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932429" version="1" comment="libvmtools-devel is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932430" version="1" comment="libvmtools0 is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932431" version="1" comment="open-vm-tools is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932432" version="1" comment="open-vm-tools-containerinfo is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932433" version="1" comment="open-vm-tools-desktop is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932434" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932435" version="1" comment="open-vm-tools-sdmp is &lt;12.2.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932436" version="1" comment="owasp-modsecurity-crs is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932437" version="1" comment="owasp-modsecurity-crs-apache2 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932438" version="1" comment="python3-salt is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932439" version="1" comment="salt is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932440" version="1" comment="salt-api is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932441" version="1" comment="salt-bash-completion is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932442" version="1" comment="salt-cloud is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932443" version="1" comment="salt-doc is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932444" version="1" comment="salt-fish-completion is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932445" version="1" comment="salt-master is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932446" version="1" comment="salt-minion is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932447" version="1" comment="salt-proxy is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932448" version="1" comment="salt-ssh is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932449" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932450" version="1" comment="salt-syndic is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932451" version="1" comment="salt-tests is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932452" version="1" comment="salt-transactional-update is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932453" version="1" comment="salt-zsh-completion is &lt;3006.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932454" version="1" comment="xalan-j2 is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932455" version="1" comment="xalan-j2-demo is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932456" version="1" comment="xalan-j2-manual is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932457" version="1" comment="xalan-j2-xsltc is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932458" version="1" comment="libQt5Pdf5 is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932459" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932460" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932461" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932462" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932463" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932464" version="1" comment="libqt5-qtwebengine is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932465" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932466" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932467" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932468" version="1" comment="frr is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932469" version="1" comment="frr-devel is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932470" version="1" comment="libfrr0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932471" version="1" comment="libfrr_pb0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932472" version="1" comment="libfrrcares0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932473" version="1" comment="libfrrfpm_pb0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932474" version="1" comment="libfrrospfapiclient0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932475" version="1" comment="libfrrsnmp0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932476" version="1" comment="libfrrzmq0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932477" version="1" comment="libmlag_pb0 is &lt;8.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932478" version="1" comment="libxml2-2 is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932479" version="1" comment="libxml2-2-32bit is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932480" version="1" comment="libxml2-devel is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932481" version="1" comment="libxml2-devel-32bit is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932482" version="1" comment="libxml2-doc is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932483" version="1" comment="libxml2-tools is &lt;2.10.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932484" version="1" comment="python310 is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932485" version="1" comment="python310-32bit is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932486" version="1" comment="python310-curses is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932487" version="1" comment="python310-dbm is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932488" version="1" comment="python310-idle is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932489" version="1" comment="python310-tk is &lt;3.10.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932490" version="1" comment="dpic is &lt;2023.02.01-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932491" version="1" comment="dpic-doc is &lt;2023.02.01-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932492" version="1" comment="libmodsecurity3 is &lt;3.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932493" version="1" comment="modsecurity is &lt;3.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932494" version="1" comment="modsecurity-devel is &lt;3.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932495" version="1" comment="libmozjs-102-0 is &lt;102.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932496" version="1" comment="mozjs102 is &lt;102.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932497" version="1" comment="mozjs102-devel is &lt;102.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932498" version="1" comment="libmozjs-115-0 is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932499" version="1" comment="mozjs115 is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932500" version="1" comment="mozjs115-devel is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932501" version="1" comment="python310-Django is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932502" version="1" comment="python311-Django is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932503" version="1" comment="python39-Django is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932504" version="1" comment="python310-configobj is &lt;5.0.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932505" version="1" comment="python311-configobj is &lt;5.0.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932506" version="1" comment="python39-configobj is &lt;5.0.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932507" version="1" comment="python310-impacket is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932508" version="1" comment="python311-impacket is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932509" version="1" comment="python39-impacket is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932510" version="1" comment="python38 is &lt;3.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932511" version="1" comment="python38-curses is &lt;3.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932512" version="1" comment="python38-dbm is &lt;3.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932513" version="1" comment="python38-idle is &lt;3.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932514" version="1" comment="python38-tk is &lt;3.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932515" version="1" comment="MozillaThunderbird is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932516" version="1" comment="MozillaThunderbird-translations-common is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932517" version="1" comment="MozillaThunderbird-translations-other is &lt;115.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932518" version="1" comment="cacti is &lt;1.2.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932519" version="1" comment="chromedriver is &lt;116.0.5845.179-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932520" version="1" comment="chromium is &lt;116.0.5845.179-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932521" version="1" comment="docker is &lt;24.0.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932522" version="1" comment="docker-bash-completion is &lt;24.0.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932523" version="1" comment="docker-fish-completion is &lt;24.0.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932524" version="1" comment="docker-rootless-extras is &lt;24.0.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932525" version="1" comment="docker-zsh-completion is &lt;24.0.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932526" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932527" version="1" comment="libovn-23_03-0 is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932528" version="1" comment="openvswitch is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932529" version="1" comment="openvswitch-devel is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932530" version="1" comment="openvswitch-doc is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932531" version="1" comment="openvswitch-ipsec is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932532" version="1" comment="openvswitch-pki is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932533" version="1" comment="openvswitch-test is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932534" version="1" comment="openvswitch-vtep is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932535" version="1" comment="ovn is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932536" version="1" comment="ovn-central is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932537" version="1" comment="ovn-devel is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932538" version="1" comment="ovn-doc is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932539" version="1" comment="ovn-docker is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932540" version="1" comment="ovn-host is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932541" version="1" comment="ovn-vtep is &lt;23.03.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932542" version="1" comment="python3-ovs is &lt;3.1.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932543" version="1" comment="python310-GitPython is &lt;3.1.34.1693646983.2a2ae77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932544" version="1" comment="python311-GitPython is &lt;3.1.34.1693646983.2a2ae77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932545" version="1" comment="python39-GitPython is &lt;3.1.34.1693646983.2a2ae77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932546" version="1" comment="python310-Pygments is &lt;2.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932547" version="1" comment="python311-Pygments is &lt;2.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932548" version="1" comment="python39-Pygments is &lt;2.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932549" version="1" comment="python310-aiohttp is &lt;3.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932550" version="1" comment="python311-aiohttp is &lt;3.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932551" version="1" comment="python39-aiohttp is &lt;3.8.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932552" version="1" comment="python-bottle-doc is &lt;0.12.25-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932553" version="1" comment="python310-bottle is &lt;0.12.25-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932554" version="1" comment="python311-bottle is &lt;0.12.25-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932555" version="1" comment="python39-bottle is &lt;0.12.25-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932556" version="1" comment="python310-py is &lt;1.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932557" version="1" comment="python311-py is &lt;1.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932558" version="1" comment="python39-py is &lt;1.11.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932559" version="1" comment="python310-urllib3 is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932560" version="1" comment="python311-urllib3 is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932561" version="1" comment="python39-urllib3 is &lt;2.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932562" version="1" comment="python310-urllib3_1 is &lt;1.26.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932563" version="1" comment="python311-urllib3_1 is &lt;1.26.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932564" version="1" comment="python39-urllib3_1 is &lt;1.26.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932565" version="1" comment="python310-wheel is &lt;0.41.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932566" version="1" comment="python311-wheel is &lt;0.41.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932567" version="1" comment="python39-wheel is &lt;0.41.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932568" version="1" comment="python311 is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932569" version="1" comment="python311-32bit is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932570" version="1" comment="python311-curses is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932571" version="1" comment="python311-dbm is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932572" version="1" comment="python311-idle is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932573" version="1" comment="python311-tk is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932574" version="1" comment="python311-x86-64-v3 is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932575" version="1" comment="go1.20 is &lt;1.20.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932576" version="1" comment="go1.20-doc is &lt;1.20.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932577" version="1" comment="go1.20-libstd is &lt;1.20.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932578" version="1" comment="go1.20-race is &lt;1.20.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932579" version="1" comment="go1.21 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932580" version="1" comment="go1.21-doc is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932581" version="1" comment="go1.21-libstd is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932582" version="1" comment="go1.21-race is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932583" version="1" comment="python310-CairoSVG is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932584" version="1" comment="python311-CairoSVG is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932585" version="1" comment="python39-CairoSVG is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932586" version="1" comment="python39 is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932587" version="1" comment="python39-32bit is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932588" version="1" comment="python39-curses is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932589" version="1" comment="python39-dbm is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932590" version="1" comment="python39-idle is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932591" version="1" comment="python39-tk is &lt;3.9.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932592" version="1" comment="python310-numpy is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932593" version="1" comment="python310-numpy-devel is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932594" version="1" comment="python311-numpy is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932595" version="1" comment="python311-numpy-devel is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932596" version="1" comment="python39-numpy is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932597" version="1" comment="python39-numpy-devel is &lt;1.25.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932598" version="1" comment="libeconf-devel is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932599" version="1" comment="libeconf-utils is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932600" version="1" comment="libeconf0 is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932601" version="1" comment="libeconf0-32bit is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932602" version="1" comment="mutt is &lt;2.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932603" version="1" comment="mutt-doc is &lt;2.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932604" version="1" comment="mutt-lang is &lt;2.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932605" version="1" comment="libmca_common_dstore1 is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932606" version="1" comment="libpmix2 is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932607" version="1" comment="pmix is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932608" version="1" comment="pmix-devel is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932609" version="1" comment="pmix-headers is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932610" version="1" comment="pmix-mca-params is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932611" version="1" comment="pmix-plugin-munge is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932612" version="1" comment="pmix-plugins is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932613" version="1" comment="pmix-test is &lt;3.2.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932614" version="1" comment="python310-Brotli is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932615" version="1" comment="python311-Brotli is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932616" version="1" comment="python39-Brotli is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932617" version="1" comment="velero is &lt;1.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932618" version="1" comment="velero-bash-completion is &lt;1.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932619" version="1" comment="velero-fish-completion is &lt;1.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932620" version="1" comment="velero-zsh-completion is &lt;1.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932621" version="1" comment="gvim is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932622" version="1" comment="vim is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932623" version="1" comment="vim-data is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932624" version="1" comment="vim-data-common is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932625" version="1" comment="vim-small is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932626" version="1" comment="xxd is &lt;9.0.1894-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932627" version="1" comment="MozillaFirefox is &lt;117.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932628" version="1" comment="MozillaFirefox-branding-upstream is &lt;117.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932629" version="1" comment="MozillaFirefox-devel is &lt;117.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932630" version="1" comment="MozillaFirefox-translations-common is &lt;117.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932631" version="1" comment="MozillaFirefox-translations-other is &lt;117.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932632" version="1" comment="MozillaThunderbird is &lt;115.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932633" version="1" comment="MozillaThunderbird-translations-common is &lt;115.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932634" version="1" comment="MozillaThunderbird-translations-other is &lt;115.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932635" version="1" comment="chromedriver is &lt;116.0.5845.187-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932636" version="1" comment="chromium is &lt;116.0.5845.187-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932637" version="1" comment="curl is &lt;8.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932638" version="1" comment="libcurl-devel is &lt;8.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932639" version="1" comment="libcurl-devel-32bit is &lt;8.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932640" version="1" comment="libcurl4 is &lt;8.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932641" version="1" comment="libcurl4-32bit is &lt;8.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932642" version="1" comment="libsharpyuv0 is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932643" version="1" comment="libsharpyuv0-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932644" version="1" comment="libwebp-devel is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932645" version="1" comment="libwebp-devel-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932646" version="1" comment="libwebp-tools is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932647" version="1" comment="libwebp7 is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932648" version="1" comment="libwebp7-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932649" version="1" comment="libwebpdecoder3 is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932650" version="1" comment="libwebpdecoder3-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932651" version="1" comment="libwebpdemux2 is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932652" version="1" comment="libwebpdemux2-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932653" version="1" comment="libwebpmux3 is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932654" version="1" comment="libwebpmux3-32bit is &lt;1.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932655" version="1" comment="ungoogled-chromium is &lt;116.0.5845.179-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932656" version="1" comment="ungoogled-chromium-chromedriver is &lt;116.0.5845.179-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932657" version="1" comment="cpp12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932658" version="1" comment="gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932659" version="1" comment="gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932660" version="1" comment="gcc12-PIE is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932661" version="1" comment="gcc12-ada is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932662" version="1" comment="gcc12-ada-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932663" version="1" comment="gcc12-c++ is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932664" version="1" comment="gcc12-c++-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932665" version="1" comment="gcc12-d is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932666" version="1" comment="gcc12-d-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932667" version="1" comment="gcc12-devel is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932668" version="1" comment="gcc12-fortran is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932669" version="1" comment="gcc12-fortran-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932670" version="1" comment="gcc12-go is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932671" version="1" comment="gcc12-go-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932672" version="1" comment="gcc12-info is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932673" version="1" comment="gcc12-locale is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932674" version="1" comment="gcc12-obj-c++ is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932675" version="1" comment="gcc12-obj-c++-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932676" version="1" comment="gcc12-objc is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932677" version="1" comment="gcc12-objc-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932678" version="1" comment="libada12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932679" version="1" comment="libada12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932680" version="1" comment="libasan8-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932681" version="1" comment="libasan8-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932682" version="1" comment="libatomic1-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932683" version="1" comment="libatomic1-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932684" version="1" comment="libgcc_s1-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932685" version="1" comment="libgcc_s1-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932686" version="1" comment="libgccjit0-devel-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932687" version="1" comment="libgccjit0-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932688" version="1" comment="libgdruntime3 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932689" version="1" comment="libgdruntime3-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932690" version="1" comment="libgfortran5-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932691" version="1" comment="libgfortran5-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932692" version="1" comment="libgo21 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932693" version="1" comment="libgo21-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932694" version="1" comment="libgomp1-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932695" version="1" comment="libgomp1-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932696" version="1" comment="libgphobos3 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932697" version="1" comment="libgphobos3-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932698" version="1" comment="libitm1-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932699" version="1" comment="libitm1-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932700" version="1" comment="liblsan0-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932701" version="1" comment="libobjc4-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932702" version="1" comment="libobjc4-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932703" version="1" comment="libquadmath0-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932704" version="1" comment="libquadmath0-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932705" version="1" comment="libstdc++6-devel-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932706" version="1" comment="libstdc++6-devel-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932707" version="1" comment="libstdc++6-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932708" version="1" comment="libstdc++6-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932709" version="1" comment="libstdc++6-gcc12-locale is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932710" version="1" comment="libstdc++6-pp-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932711" version="1" comment="libstdc++6-pp-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932712" version="1" comment="libtsan2-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932713" version="1" comment="libubsan1-gcc12 is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932714" version="1" comment="libubsan1-gcc12-32bit is &lt;12.3.0+git1204-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932715" version="1" comment="cpp13 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932716" version="1" comment="gcc13 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932717" version="1" comment="gcc13-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932718" version="1" comment="gcc13-PIE is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932719" version="1" comment="gcc13-ada is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932720" version="1" comment="gcc13-ada-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932721" version="1" comment="gcc13-c++ is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932722" version="1" comment="gcc13-c++-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932723" version="1" comment="gcc13-d is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932724" version="1" comment="gcc13-d-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932725" version="1" comment="gcc13-devel is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932726" version="1" comment="gcc13-fortran is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932727" version="1" comment="gcc13-fortran-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932728" version="1" comment="gcc13-go is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932729" version="1" comment="gcc13-go-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932730" version="1" comment="gcc13-info is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932731" version="1" comment="gcc13-locale is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932732" version="1" comment="gcc13-m2 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932733" version="1" comment="gcc13-m2-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932734" version="1" comment="gcc13-obj-c++ is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932735" version="1" comment="gcc13-obj-c++-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932736" version="1" comment="gcc13-objc is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932737" version="1" comment="gcc13-objc-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932738" version="1" comment="libada13 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932739" version="1" comment="libada13-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932740" version="1" comment="libasan8 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932741" version="1" comment="libasan8-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932742" version="1" comment="libatomic1 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932743" version="1" comment="libatomic1-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932744" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932745" version="1" comment="libgcc_s1-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932746" version="1" comment="libgccjit0 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932747" version="1" comment="libgccjit0-devel-gcc13 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932748" version="1" comment="libgdruntime4 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932749" version="1" comment="libgdruntime4-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932750" version="1" comment="libgfortran5 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932751" version="1" comment="libgfortran5-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932752" version="1" comment="libgo22 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932753" version="1" comment="libgo22-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932754" version="1" comment="libgomp1 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932755" version="1" comment="libgomp1-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932756" version="1" comment="libgphobos4 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932757" version="1" comment="libgphobos4-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932758" version="1" comment="libhwasan0 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932759" version="1" comment="libitm1 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932760" version="1" comment="libitm1-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932761" version="1" comment="liblsan0 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932762" version="1" comment="libm2cor18 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932763" version="1" comment="libm2cor18-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932764" version="1" comment="libm2iso18 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932765" version="1" comment="libm2iso18-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932766" version="1" comment="libm2log18 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932767" version="1" comment="libm2log18-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932768" version="1" comment="libm2min18 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932769" version="1" comment="libm2min18-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932770" version="1" comment="libm2pim18 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932771" version="1" comment="libm2pim18-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932772" version="1" comment="libobjc4 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932773" version="1" comment="libobjc4-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932774" version="1" comment="libquadmath0 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932775" version="1" comment="libquadmath0-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932776" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932777" version="1" comment="libstdc++6-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932778" version="1" comment="libstdc++6-devel-gcc13 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932779" version="1" comment="libstdc++6-devel-gcc13-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932780" version="1" comment="libstdc++6-locale is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932781" version="1" comment="libstdc++6-pp is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932782" version="1" comment="libstdc++6-pp-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932783" version="1" comment="libtsan2 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932784" version="1" comment="libubsan1 is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932785" version="1" comment="libubsan1-32bit is &lt;13.2.1+git7813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932786" version="1" comment="cpp7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932787" version="1" comment="gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932788" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932789" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932790" version="1" comment="gcc7-ada-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932791" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932792" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932793" version="1" comment="gcc7-devel is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932794" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932795" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932796" version="1" comment="gcc7-go is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932797" version="1" comment="gcc7-go-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932798" version="1" comment="gcc7-info is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932799" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932800" version="1" comment="gcc7-obj-c++ is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932801" version="1" comment="gcc7-obj-c++-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932802" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932803" version="1" comment="gcc7-objc-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932804" version="1" comment="libada7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932805" version="1" comment="libada7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932806" version="1" comment="libasan4 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932807" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932808" version="1" comment="libatomic1-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932809" version="1" comment="libatomic1-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932810" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932811" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932812" version="1" comment="libgcc_s1-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932813" version="1" comment="libgcc_s1-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932814" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932815" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932816" version="1" comment="libgo11 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932817" version="1" comment="libgo11-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932818" version="1" comment="libgomp1-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932819" version="1" comment="libgomp1-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932820" version="1" comment="libitm1-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932821" version="1" comment="libitm1-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932822" version="1" comment="liblsan0-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932823" version="1" comment="libmpx2-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932824" version="1" comment="libmpx2-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932825" version="1" comment="libmpxwrappers2-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932826" version="1" comment="libmpxwrappers2-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932827" version="1" comment="libobjc4-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932828" version="1" comment="libobjc4-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932829" version="1" comment="libquadmath0-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932830" version="1" comment="libquadmath0-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932831" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932832" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932833" version="1" comment="libstdc++6-gcc7 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932834" version="1" comment="libstdc++6-gcc7-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932835" version="1" comment="libstdc++6-gcc7-locale is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932836" version="1" comment="libtsan0 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932837" version="1" comment="libubsan0 is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932838" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932839" version="1" comment="python is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932840" version="1" comment="python-32bit is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932841" version="1" comment="python-curses is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932842" version="1" comment="python-demo is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932843" version="1" comment="python-gdbm is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932844" version="1" comment="python-idle is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932845" version="1" comment="python-tk is &lt;2.7.18-38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932846" version="1" comment="python310-certifi is &lt;2023.7.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932847" version="1" comment="python311-certifi is &lt;2023.7.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932848" version="1" comment="python39-certifi is &lt;2023.7.22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932849" version="1" comment="frr is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932850" version="1" comment="frr-devel is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932851" version="1" comment="libfrr0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932852" version="1" comment="libfrr_pb0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932853" version="1" comment="libfrrcares0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932854" version="1" comment="libfrrfpm_pb0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932855" version="1" comment="libfrrospfapiclient0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932856" version="1" comment="libfrrsnmp0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932857" version="1" comment="libfrrzmq0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932858" version="1" comment="libmlag_pb0 is &lt;8.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932859" version="1" comment="sonobuoy is &lt;0.56.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932860" version="1" comment="sonobuoy-bash-completion is &lt;0.56.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932861" version="1" comment="sonobuoy-fish-completion is &lt;0.56.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932862" version="1" comment="sonobuoy-zsh-completion is &lt;0.56.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932863" version="1" comment="xterm is &lt;384-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932864" version="1" comment="xterm-bin is &lt;384-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932865" version="1" comment="xterm-resize is &lt;384-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932866" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932867" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932868" version="1" comment="libopenssl1_1 is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932869" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932870" version="1" comment="openssl-1_1 is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932871" version="1" comment="openssl-1_1-doc is &lt;1.1.1w-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932872" version="1" comment="postgresql15 is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932873" version="1" comment="postgresql15-contrib is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932874" version="1" comment="postgresql15-devel is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932875" version="1" comment="postgresql15-docs is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932876" version="1" comment="postgresql15-llvmjit is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932877" version="1" comment="postgresql15-llvmjit-devel is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932878" version="1" comment="postgresql15-plperl is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932879" version="1" comment="postgresql15-plpython is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932880" version="1" comment="postgresql15-pltcl is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932881" version="1" comment="postgresql15-server is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932882" version="1" comment="postgresql15-server-devel is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932883" version="1" comment="postgresql15-test is &lt;15.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932884" version="1" comment="ungoogled-chromium is &lt;116.0.5845.187-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932885" version="1" comment="ungoogled-chromium-chromedriver is &lt;116.0.5845.187-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932887" version="1" comment="kernel-macros is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932888" version="1" comment="kernel-source is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932889" version="1" comment="kernel-source-vanilla is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932890" version="1" comment="ghc-pandoc is &lt;3.1.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932891" version="1" comment="ghc-pandoc-devel is &lt;3.1.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932892" version="1" comment="ghc-pandoc-doc is &lt;3.1.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932893" version="1" comment="ghc-pandoc-prof is &lt;3.1.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932894" version="1" comment="ghostscript is &lt;9.56.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932895" version="1" comment="ghostscript-devel is &lt;9.56.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932896" version="1" comment="ghostscript-x11 is &lt;9.56.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932897" version="1" comment="python312 is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932898" version="1" comment="python312-curses is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932899" version="1" comment="python312-dbm is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932900" version="1" comment="python312-idle is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932901" version="1" comment="python312-tk is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932902" version="1" comment="python312-x86-64-v3 is &lt;3.12.0rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932903" version="1" comment="bind is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932904" version="1" comment="bind-doc is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932905" version="1" comment="bind-modules-bdbhpt is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932906" version="1" comment="bind-modules-generic is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932907" version="1" comment="bind-modules-ldap is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932908" version="1" comment="bind-modules-mysql is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932909" version="1" comment="bind-modules-perl is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932910" version="1" comment="bind-modules-sqlite3 is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932911" version="1" comment="bind-utils is &lt;9.18.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932912" version="1" comment="cups is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932913" version="1" comment="cups-client is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932914" version="1" comment="cups-config is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932915" version="1" comment="cups-ddk is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932916" version="1" comment="cups-devel is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932917" version="1" comment="cups-devel-32bit is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932918" version="1" comment="libcups2 is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932919" version="1" comment="libcups2-32bit is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932920" version="1" comment="libcupsimage2 is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932921" version="1" comment="libcupsimage2-32bit is &lt;2.4.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932922" version="1" comment="gnome-extensions is &lt;45.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932923" version="1" comment="gnome-shell is &lt;45.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932924" version="1" comment="gnome-shell-calendar is &lt;45.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932925" version="1" comment="gnome-shell-devel is &lt;45.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932926" version="1" comment="gnome-shell-lang is &lt;45.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932927" version="1" comment="libraw-devel is &lt;0.21.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932928" version="1" comment="libraw-devel-static is &lt;0.21.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932929" version="1" comment="libraw-tools is &lt;0.21.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932930" version="1" comment="libraw23 is &lt;0.21.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932931" version="1" comment="libraw23-32bit is &lt;0.21.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932932" version="1" comment="python is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932933" version="1" comment="python-32bit is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932934" version="1" comment="python-curses is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932935" version="1" comment="python-demo is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932936" version="1" comment="python-gdbm is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932937" version="1" comment="python-idle is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932938" version="1" comment="python-tk is &lt;2.7.18-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932939" version="1" comment="python-gevent-doc is &lt;23.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932940" version="1" comment="python310-gevent is &lt;23.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932941" version="1" comment="python311-gevent is &lt;23.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932942" version="1" comment="python39-gevent is &lt;23.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932943" version="1" comment="seamonkey is &lt;2.53.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932944" version="1" comment="seamonkey-dom-inspector is &lt;2.53.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932945" version="1" comment="seamonkey-irc is &lt;2.53.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932946" version="1" comment="tomcat is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932947" version="1" comment="tomcat-admin-webapps is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932948" version="1" comment="tomcat-docs-webapp is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932949" version="1" comment="tomcat-el-3_0-api is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932950" version="1" comment="tomcat-embed is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932951" version="1" comment="tomcat-javadoc is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932952" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932953" version="1" comment="tomcat-jsvc is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932954" version="1" comment="tomcat-lib is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932955" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932956" version="1" comment="tomcat-webapps is &lt;9.0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932957" version="1" comment="xen is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932958" version="1" comment="xen-devel is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932959" version="1" comment="xen-doc-html is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932960" version="1" comment="xen-libs is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932961" version="1" comment="xen-tools is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932962" version="1" comment="xen-tools-domU is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932963" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932964" version="1" comment="nodejs-electron is &lt;25.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932965" version="1" comment="nodejs-electron-devel is &lt;25.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932966" version="1" comment="nodejs-electron-doc is &lt;25.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932967" version="1" comment="apache-commons-configuration2 is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932968" version="1" comment="apache-commons-configuration2-javadoc is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932969" version="1" comment="python310-jupyter-server is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932970" version="1" comment="python310-jupyter-server-test is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932971" version="1" comment="python311-jupyter-server is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932972" version="1" comment="python311-jupyter-server-test is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932973" version="1" comment="python39-jupyter-server is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932974" version="1" comment="python39-jupyter-server-test is &lt;2.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932975" version="1" comment="python311 is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932976" version="1" comment="python311-32bit is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932977" version="1" comment="python311-curses is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932978" version="1" comment="python311-dbm is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932979" version="1" comment="python311-idle is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932980" version="1" comment="python311-tk is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932981" version="1" comment="python311-x86-64-v3 is &lt;3.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932982" version="1" comment="cargo1.72 is &lt;1.72.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932983" version="1" comment="rust1.72 is &lt;1.72.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932984" version="1" comment="ImageMagick is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932985" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932986" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932987" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932988" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932989" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932990" version="1" comment="ImageMagick-devel is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932991" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932992" version="1" comment="ImageMagick-doc is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932993" version="1" comment="ImageMagick-extra is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932994" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932995" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932996" version="1" comment="libMagick++-devel is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932997" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932998" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009932999" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933000" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933001" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933002" version="1" comment="perl-PerlMagick is &lt;7.1.1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933003" version="1" comment="dlt-daemon is &lt;2.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933004" version="1" comment="dlt-daemon-devel is &lt;2.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933005" version="1" comment="dlt-examples is &lt;2.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933006" version="1" comment="dlt-tools is &lt;2.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933007" version="1" comment="libdlt2 is &lt;2.18.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933008" version="1" comment="element-desktop is &lt;1.11.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933009" version="1" comment="libmozjs-102-0 is &lt;102.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933010" version="1" comment="mozjs102 is &lt;102.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933011" version="1" comment="mozjs102-devel is &lt;102.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933012" version="1" comment="php8 is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933013" version="1" comment="php8-bcmath is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933014" version="1" comment="php8-bz2 is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933015" version="1" comment="php8-calendar is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933016" version="1" comment="php8-cli is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933017" version="1" comment="php8-ctype is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933018" version="1" comment="php8-curl is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933019" version="1" comment="php8-dba is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933020" version="1" comment="php8-devel is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933021" version="1" comment="php8-dom is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933022" version="1" comment="php8-enchant is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933023" version="1" comment="php8-exif is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933024" version="1" comment="php8-ffi is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933025" version="1" comment="php8-fileinfo is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933026" version="1" comment="php8-ftp is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933027" version="1" comment="php8-gd is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933028" version="1" comment="php8-gettext is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933029" version="1" comment="php8-gmp is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933030" version="1" comment="php8-iconv is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933031" version="1" comment="php8-intl is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933032" version="1" comment="php8-ldap is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933033" version="1" comment="php8-mbstring is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933034" version="1" comment="php8-mysql is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933035" version="1" comment="php8-odbc is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933036" version="1" comment="php8-opcache is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933037" version="1" comment="php8-openssl is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933038" version="1" comment="php8-pcntl is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933039" version="1" comment="php8-pdo is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933040" version="1" comment="php8-pgsql is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933041" version="1" comment="php8-phar is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933042" version="1" comment="php8-posix is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933043" version="1" comment="php8-readline is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933044" version="1" comment="php8-shmop is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933045" version="1" comment="php8-snmp is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933046" version="1" comment="php8-soap is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933047" version="1" comment="php8-sockets is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933048" version="1" comment="php8-sodium is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933049" version="1" comment="php8-sqlite is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933050" version="1" comment="php8-sysvmsg is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933051" version="1" comment="php8-sysvsem is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933052" version="1" comment="php8-sysvshm is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933053" version="1" comment="php8-tidy is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933054" version="1" comment="php8-tokenizer is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933055" version="1" comment="php8-xmlreader is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933056" version="1" comment="php8-xmlwriter is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933057" version="1" comment="php8-xsl is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933058" version="1" comment="php8-zip is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933059" version="1" comment="php8-zlib is &lt;8.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933060" version="1" comment="MozillaThunderbird is &lt;115.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933061" version="1" comment="MozillaThunderbird-translations-common is &lt;115.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933062" version="1" comment="MozillaThunderbird-translations-other is &lt;115.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933063" version="1" comment="chromedriver is &lt;117.0.5938.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933064" version="1" comment="chromium is &lt;117.0.5938.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933065" version="1" comment="matrix-synapse is &lt;1.93.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933066" version="1" comment="libmozjs-115-0 is &lt;115.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933067" version="1" comment="mozjs115 is &lt;115.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933068" version="1" comment="mozjs115-devel is &lt;115.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933069" version="1" comment="MozillaFirefox is &lt;118.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933070" version="1" comment="MozillaFirefox-branding-upstream is &lt;118.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933071" version="1" comment="MozillaFirefox-devel is &lt;118.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933072" version="1" comment="MozillaFirefox-translations-common is &lt;118.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933073" version="1" comment="MozillaFirefox-translations-other is &lt;118.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933074" version="1" comment="glibc is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933075" version="1" comment="glibc-devel is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933076" version="1" comment="glibc-devel-static is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933077" version="1" comment="glibc-extra is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933078" version="1" comment="glibc-html is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933079" version="1" comment="glibc-i18ndata is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933080" version="1" comment="glibc-info is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933081" version="1" comment="glibc-lang is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933082" version="1" comment="glibc-locale is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933083" version="1" comment="glibc-locale-base is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933084" version="1" comment="glibc-profile is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933085" version="1" comment="nscd is &lt;2.38-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933086" version="1" comment="libvpx-devel is &lt;1.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933087" version="1" comment="libvpx8 is &lt;1.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933088" version="1" comment="libvpx8-32bit is &lt;1.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933089" version="1" comment="vpx-tools is &lt;1.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933090" version="1" comment="libopenssl-3-devel is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933091" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933092" version="1" comment="libopenssl3 is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933093" version="1" comment="libopenssl3-32bit is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933094" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933095" version="1" comment="openssl-3 is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933096" version="1" comment="openssl-3-doc is &lt;3.1.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933097" version="1" comment="ungoogled-chromium is &lt;117.0.5938.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933098" version="1" comment="ungoogled-chromium-chromedriver is &lt;117.0.5938.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933099" version="1" comment="MozillaThunderbird is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933100" version="1" comment="MozillaThunderbird-translations-common is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933101" version="1" comment="MozillaThunderbird-translations-other is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933102" version="1" comment="libnbd is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933103" version="1" comment="libnbd-bash-completion is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933104" version="1" comment="libnbd-devel is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933105" version="1" comment="libnbd0 is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933106" version="1" comment="nbdfuse is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933107" version="1" comment="python3-libnbd is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933108" version="1" comment="mutt is &lt;2.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933109" version="1" comment="mutt-doc is &lt;2.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933110" version="1" comment="mutt-lang is &lt;2.2.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933111" version="1" comment="python310-mpmath is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933112" version="1" comment="python311-mpmath is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933113" version="1" comment="python39-mpmath is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933114" version="1" comment="suse-module-tools is &lt;16.0.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933115" version="1" comment="suse-module-tools-scriptlets is &lt;16.0.36-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933116" version="1" comment="exim is &lt;4.96.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933117" version="1" comment="eximon is &lt;4.96.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933118" version="1" comment="eximstats-html is &lt;4.96.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933119" version="1" comment="nodejs-electron is &lt;25.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933120" version="1" comment="nodejs-electron-devel is &lt;25.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933121" version="1" comment="nodejs-electron-doc is &lt;25.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933122" version="1" comment="libopencv408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933123" version="1" comment="libopencv_aruco408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933124" version="1" comment="libopencv_face408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933125" version="1" comment="libopencv_gapi408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933126" version="1" comment="libopencv_highgui408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933127" version="1" comment="libopencv_imgcodecs408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933128" version="1" comment="libopencv_objdetect408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933129" version="1" comment="libopencv_optflow408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933130" version="1" comment="libopencv_superres408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933131" version="1" comment="libopencv_videoio408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933132" version="1" comment="libopencv_videostab408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933133" version="1" comment="libopencv_ximgproc408 is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933134" version="1" comment="opencv is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933135" version="1" comment="opencv-devel is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933136" version="1" comment="opencv-doc is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933137" version="1" comment="opencv4-cascades-data is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933138" version="1" comment="python3-opencv is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933139" version="1" comment="screen is &lt;4.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933140" version="1" comment="assimp-devel is &lt;5.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933141" version="1" comment="libassimp5 is &lt;5.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933142" version="1" comment="keylime-config is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933143" version="1" comment="keylime-firewalld is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933144" version="1" comment="keylime-logrotate is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933145" version="1" comment="keylime-registrar is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933146" version="1" comment="keylime-tenant is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933147" version="1" comment="keylime-tpm_cert_store is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933148" version="1" comment="keylime-verifier is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933149" version="1" comment="python310-keylime is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933150" version="1" comment="python311-keylime is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933151" version="1" comment="python39-keylime is &lt;7.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933152" version="1" comment="libmozjs-115-0 is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933153" version="1" comment="mozjs115 is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933154" version="1" comment="mozjs115-devel is &lt;115.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933155" version="1" comment="libQt6Concurrent6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933156" version="1" comment="libQt6Core6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933157" version="1" comment="libQt6DBus6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933158" version="1" comment="libQt6Gui6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933159" version="1" comment="libQt6Network6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933160" version="1" comment="libQt6OpenGL6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933161" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933162" version="1" comment="libQt6PrintSupport6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933163" version="1" comment="libQt6Sql6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933164" version="1" comment="libQt6Test6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933165" version="1" comment="libQt6Widgets6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933166" version="1" comment="libQt6Xml6 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933167" version="1" comment="qt6-base-common-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933168" version="1" comment="qt6-base-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933169" version="1" comment="qt6-base-examples is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933170" version="1" comment="qt6-base-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933171" version="1" comment="qt6-concurrent-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933172" version="1" comment="qt6-core-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933173" version="1" comment="qt6-core-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933174" version="1" comment="qt6-dbus-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933175" version="1" comment="qt6-dbus-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933176" version="1" comment="qt6-docs-common is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933177" version="1" comment="qt6-exampleicons-devel-static is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933178" version="1" comment="qt6-gui-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933179" version="1" comment="qt6-gui-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933180" version="1" comment="qt6-kmssupport-devel-static is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933181" version="1" comment="qt6-kmssupport-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933182" version="1" comment="qt6-network-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933183" version="1" comment="qt6-network-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933184" version="1" comment="qt6-network-tls is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933185" version="1" comment="qt6-networkinformation-glib is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933186" version="1" comment="qt6-networkinformation-nm is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933187" version="1" comment="qt6-opengl-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933188" version="1" comment="qt6-opengl-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933189" version="1" comment="qt6-openglwidgets-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933190" version="1" comment="qt6-platformsupport-devel-static is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933191" version="1" comment="qt6-platformsupport-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933192" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933193" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933194" version="1" comment="qt6-printsupport-cups is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933195" version="1" comment="qt6-printsupport-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933196" version="1" comment="qt6-printsupport-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933197" version="1" comment="qt6-sql-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933198" version="1" comment="qt6-sql-mysql is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933199" version="1" comment="qt6-sql-postgresql is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933200" version="1" comment="qt6-sql-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933201" version="1" comment="qt6-sql-sqlite is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933202" version="1" comment="qt6-sql-unixODBC is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933203" version="1" comment="qt6-test-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933204" version="1" comment="qt6-test-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933205" version="1" comment="qt6-widgets-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933206" version="1" comment="qt6-widgets-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933207" version="1" comment="qt6-xml-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933208" version="1" comment="qt6-xml-private-devel is &lt;6.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933209" version="1" comment="php-composer2 is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933210" version="1" comment="assimp-devel is &lt;5.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933211" version="1" comment="libassimp5 is &lt;5.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933212" version="1" comment="chromedriver is &lt;117.0.5938.149-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933213" version="1" comment="chromium is &lt;117.0.5938.149-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933214" version="1" comment="freeimage-devel is &lt;3.18.0.1909-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933215" version="1" comment="libfreeimage3 is &lt;3.18.0.1909-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933216" version="1" comment="libfreeimageplus3 is &lt;3.18.0.1909-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933217" version="1" comment="glibc is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933218" version="1" comment="glibc-devel is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933219" version="1" comment="glibc-devel-static is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933220" version="1" comment="glibc-extra is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933221" version="1" comment="glibc-html is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933222" version="1" comment="glibc-i18ndata is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933223" version="1" comment="glibc-info is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933224" version="1" comment="glibc-lang is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933225" version="1" comment="glibc-locale is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933226" version="1" comment="glibc-locale-base is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933227" version="1" comment="glibc-profile is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933228" version="1" comment="nscd is &lt;2.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933229" version="1" comment="helm is &lt;3.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933230" version="1" comment="helm-bash-completion is &lt;3.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933231" version="1" comment="helm-fish-completion is &lt;3.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933232" version="1" comment="helm-zsh-completion is &lt;3.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933233" version="1" comment="libX11-6 is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933234" version="1" comment="libX11-6-32bit is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933235" version="1" comment="libX11-data is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933236" version="1" comment="libX11-devel is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933237" version="1" comment="libX11-devel-32bit is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933238" version="1" comment="libX11-xcb1 is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933239" version="1" comment="libX11-xcb1-32bit is &lt;1.8.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933240" version="1" comment="libXpm-devel is &lt;3.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933241" version="1" comment="libXpm-devel-32bit is &lt;3.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933242" version="1" comment="libXpm-tools is &lt;3.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933243" version="1" comment="libXpm4 is &lt;3.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933244" version="1" comment="libXpm4-32bit is &lt;3.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933245" version="1" comment="ImageMagick is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933246" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933247" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933248" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933249" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933250" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933251" version="1" comment="ImageMagick-devel is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933252" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933253" version="1" comment="ImageMagick-doc is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933254" version="1" comment="ImageMagick-extra is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933255" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933256" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933257" version="1" comment="libMagick++-devel is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933258" version="1" comment="libMagick++-devel-32bit is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933259" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933260" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933261" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933262" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933263" version="1" comment="perl-PerlMagick is &lt;7.1.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933264" version="1" comment="kustomize is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933265" version="1" comment="kustomize-bash-completion is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933266" version="1" comment="kustomize-fish-completion is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933267" version="1" comment="kustomize-zsh-completion is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933268" version="1" comment="python-paramiko-doc is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933269" version="1" comment="python310-paramiko is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933270" version="1" comment="python311-paramiko is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933271" version="1" comment="python39-paramiko is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933272" version="1" comment="python310-urllib3 is &lt;2.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933273" version="1" comment="python311-urllib3 is &lt;2.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933274" version="1" comment="python39-urllib3 is &lt;2.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933275" version="1" comment="python310-urllib3_1 is &lt;1.26.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933276" version="1" comment="python311-urllib3_1 is &lt;1.26.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933277" version="1" comment="python39-urllib3_1 is &lt;1.26.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933278" version="1" comment="ungoogled-chromium is &lt;117.0.5938.149-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933279" version="1" comment="ungoogled-chromium-chromedriver is &lt;117.0.5938.149-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933280" version="1" comment="cargo-audit-advisory-db is &lt;20231007-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933282" version="1" comment="kernel-macros is &lt;6.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933283" version="1" comment="kernel-source is &lt;6.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933284" version="1" comment="kernel-source-vanilla is &lt;6.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933285" version="1" comment="go1.20 is &lt;1.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933286" version="1" comment="go1.20-doc is &lt;1.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933287" version="1" comment="go1.20-libstd is &lt;1.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933288" version="1" comment="go1.20-race is &lt;1.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933289" version="1" comment="go1.21 is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933290" version="1" comment="go1.21-doc is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933291" version="1" comment="go1.21-libstd is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933292" version="1" comment="go1.21-race is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933293" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933294" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933295" version="1" comment="libQt5Concurrent-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933296" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933297" version="1" comment="libQt5Concurrent5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933298" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933299" version="1" comment="libQt5Core-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933300" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933301" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933302" version="1" comment="libQt5Core5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933303" version="1" comment="libQt5Core5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933304" version="1" comment="libQt5DBus-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933305" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933306" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933307" version="1" comment="libQt5DBus5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933308" version="1" comment="libQt5DBus5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933309" version="1" comment="libQt5Gui-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933310" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933311" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933312" version="1" comment="libQt5Gui5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933313" version="1" comment="libQt5Gui5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933314" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933315" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933316" version="1" comment="libQt5Network-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933317" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933318" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933319" version="1" comment="libQt5Network5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933320" version="1" comment="libQt5Network5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933321" version="1" comment="libQt5OpenGL-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933322" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933323" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933324" version="1" comment="libQt5OpenGL5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933325" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933326" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933327" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933328" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933329" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933330" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933331" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933332" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933333" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933334" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933335" version="1" comment="libQt5PrintSupport5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933336" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933337" version="1" comment="libQt5Sql-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933338" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933339" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933340" version="1" comment="libQt5Sql5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933341" version="1" comment="libQt5Sql5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933342" version="1" comment="libQt5Sql5-mysql is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933343" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933344" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933345" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933346" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933347" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933348" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933349" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933350" version="1" comment="libQt5Test-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933351" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933352" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933353" version="1" comment="libQt5Test5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933354" version="1" comment="libQt5Test5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933355" version="1" comment="libQt5Widgets-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933356" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933357" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933358" version="1" comment="libQt5Widgets5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933359" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933360" version="1" comment="libQt5Xml-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933361" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933362" version="1" comment="libQt5Xml5 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933363" version="1" comment="libQt5Xml5-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933364" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933365" version="1" comment="libqt5-qtbase-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933366" version="1" comment="libqt5-qtbase-examples is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933367" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933368" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933369" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933370" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.11+kde134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933371" version="1" comment="plexus-archiver is &lt;4.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933372" version="1" comment="plexus-archiver-javadoc is &lt;4.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933373" version="1" comment="libwireshark16 is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933374" version="1" comment="libwiretap13 is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933375" version="1" comment="libwsutil14 is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933376" version="1" comment="wireshark is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933377" version="1" comment="wireshark-devel is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933378" version="1" comment="wireshark-ui-qt is &lt;4.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933379" version="1" comment="ansible-core is &lt;2.15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933380" version="1" comment="ansible-test is &lt;2.15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933381" version="1" comment="eclipse-jgit is &lt;5.11.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933382" version="1" comment="gpp is &lt;2.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933383" version="1" comment="opensc is &lt;0.23.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933384" version="1" comment="shadowsocks-rust is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933385" version="1" comment="borgbackup is &lt;1.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933386" version="1" comment="borgbackup-bash-completion is &lt;1.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933387" version="1" comment="borgbackup-doc is &lt;1.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933388" version="1" comment="borgbackup-fish-completion is &lt;1.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933389" version="1" comment="borgbackup-zsh-completion is &lt;1.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933390" version="1" comment="chromedriver is &lt;118.0.5993.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933391" version="1" comment="chromium is &lt;118.0.5993.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933392" version="1" comment="erofs-utils is &lt;1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933393" version="1" comment="libcue-devel is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933394" version="1" comment="libcue2 is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933395" version="1" comment="matrix-synapse is &lt;1.94.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933396" version="1" comment="libeverest is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933397" version="1" comment="libeverest-x86-64-v3 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933398" version="1" comment="libmbedcrypto15 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933399" version="1" comment="libmbedcrypto15-x86-64-v3 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933400" version="1" comment="libmbedtls20 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933401" version="1" comment="libmbedtls20-x86-64-v3 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933402" version="1" comment="libmbedx509-6 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933403" version="1" comment="libmbedx509-6-x86-64-v3 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933404" version="1" comment="libp256m is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933405" version="1" comment="libp256m-x86-64-v3 is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933406" version="1" comment="mbedtls-devel is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933407" version="1" comment="libopenconnect5 is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933408" version="1" comment="openconnect is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933409" version="1" comment="openconnect-bash-completion is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933410" version="1" comment="openconnect-devel is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933411" version="1" comment="openconnect-doc is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933412" version="1" comment="openconnect-lang is &lt;9.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933413" version="1" comment="rxvt-unicode is &lt;9.31-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933414" version="1" comment="tuxguitar is &lt;1.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933415" version="1" comment="curl is &lt;8.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933416" version="1" comment="libcurl-devel is &lt;8.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933417" version="1" comment="libcurl-devel-32bit is &lt;8.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933418" version="1" comment="libcurl4 is &lt;8.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933419" version="1" comment="libcurl4-32bit is &lt;8.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933420" version="1" comment="go1.20 is &lt;1.20.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933421" version="1" comment="go1.20-doc is &lt;1.20.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933422" version="1" comment="go1.20-libstd is &lt;1.20.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933423" version="1" comment="go1.20-race is &lt;1.20.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933424" version="1" comment="go1.21 is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933425" version="1" comment="go1.21-doc is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933426" version="1" comment="go1.21-libstd is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933427" version="1" comment="go1.21-race is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933428" version="1" comment="grub2 is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933429" version="1" comment="grub2-branding-upstream is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933430" version="1" comment="grub2-i386-efi is &lt;2.12~rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933431" version="1" comment="grub2-i386-efi-debug is &lt;2.12~rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933432" version="1" comment="grub2-i386-efi-extras is &lt;2.12~rc1-4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933433" version="1" comment="grub2-i386-pc is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933434" version="1" comment="grub2-i386-pc-debug is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933435" version="1" comment="grub2-i386-pc-extras is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933436" version="1" comment="grub2-snapper-plugin is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933437" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933438" version="1" comment="grub2-x86_64-efi is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933439" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933440" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933441" version="1" comment="grub2-x86_64-xen is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933442" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12~rc1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933443" version="1" comment="jetty-annotations is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933444" version="1" comment="jetty-ant is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933445" version="1" comment="jetty-cdi is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933446" version="1" comment="jetty-client is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933447" version="1" comment="jetty-continuation is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933448" version="1" comment="jetty-deploy is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933449" version="1" comment="jetty-fcgi is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933450" version="1" comment="jetty-http is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933451" version="1" comment="jetty-http-spi is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933452" version="1" comment="jetty-io is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933453" version="1" comment="jetty-jaas is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933454" version="1" comment="jetty-jmx is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933455" version="1" comment="jetty-jndi is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933456" version="1" comment="jetty-jsp is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933457" version="1" comment="jetty-minimal-javadoc is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933458" version="1" comment="jetty-openid is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933459" version="1" comment="jetty-plus is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933460" version="1" comment="jetty-proxy is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933461" version="1" comment="jetty-quickstart is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933462" version="1" comment="jetty-rewrite is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933463" version="1" comment="jetty-security is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933464" version="1" comment="jetty-server is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933465" version="1" comment="jetty-servlet is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933466" version="1" comment="jetty-servlets is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933467" version="1" comment="jetty-start is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933468" version="1" comment="jetty-util is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933469" version="1" comment="jetty-util-ajax is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933470" version="1" comment="jetty-webapp is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933471" version="1" comment="jetty-xml is &lt;9.4.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933472" version="1" comment="libnss_slurm2 is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933473" version="1" comment="libpmi0 is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933474" version="1" comment="libslurm39 is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933475" version="1" comment="perl-slurm is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933476" version="1" comment="slurm is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933477" version="1" comment="slurm-auth-none is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933478" version="1" comment="slurm-config is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933479" version="1" comment="slurm-config-man is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933480" version="1" comment="slurm-cray is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933481" version="1" comment="slurm-devel is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933482" version="1" comment="slurm-doc is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933483" version="1" comment="slurm-hdf5 is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933484" version="1" comment="slurm-lua is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933485" version="1" comment="slurm-munge is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933486" version="1" comment="slurm-node is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933487" version="1" comment="slurm-openlava is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933488" version="1" comment="slurm-pam_slurm is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933489" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933490" version="1" comment="slurm-plugins is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933491" version="1" comment="slurm-rest is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933492" version="1" comment="slurm-seff is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933493" version="1" comment="slurm-sjstat is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933494" version="1" comment="slurm-slurmdbd is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933495" version="1" comment="slurm-sql is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933496" version="1" comment="slurm-sview is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933497" version="1" comment="slurm-testsuite is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933498" version="1" comment="slurm-torque is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933499" version="1" comment="slurm-webdoc is &lt;23.02.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933500" version="1" comment="tomcat is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933501" version="1" comment="tomcat-admin-webapps is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933502" version="1" comment="tomcat-docs-webapp is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933503" version="1" comment="tomcat-el-3_0-api is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933504" version="1" comment="tomcat-embed is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933505" version="1" comment="tomcat-javadoc is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933506" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933507" version="1" comment="tomcat-jsvc is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933508" version="1" comment="tomcat-lib is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933509" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933510" version="1" comment="tomcat-webapps is &lt;9.0.82-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933511" version="1" comment="ctdb is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933512" version="1" comment="ctdb-pcp-pmda is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933513" version="1" comment="libsamba-policy-devel is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933514" version="1" comment="libsamba-policy-python3-devel is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933515" version="1" comment="libsamba-policy0-python3 is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933516" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933517" version="1" comment="samba is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933518" version="1" comment="samba-ad-dc is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933519" version="1" comment="samba-ad-dc-libs is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933520" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933521" version="1" comment="samba-ceph is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933522" version="1" comment="samba-client is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933523" version="1" comment="samba-client-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933524" version="1" comment="samba-client-libs is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933525" version="1" comment="samba-client-libs-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933526" version="1" comment="samba-devel is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933527" version="1" comment="samba-devel-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933528" version="1" comment="samba-doc is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933529" version="1" comment="samba-dsdb-modules is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933530" version="1" comment="samba-gpupdate is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933531" version="1" comment="samba-ldb-ldap is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933532" version="1" comment="samba-libs is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933533" version="1" comment="samba-libs-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933534" version="1" comment="samba-libs-python3 is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933535" version="1" comment="samba-libs-python3-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933536" version="1" comment="samba-python3 is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933537" version="1" comment="samba-test is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933538" version="1" comment="samba-tool is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933539" version="1" comment="samba-winbind is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933540" version="1" comment="samba-winbind-libs is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933541" version="1" comment="samba-winbind-libs-32bit is &lt;4.19.1+git.312.c912b3d2ef6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933542" version="1" comment="exim is &lt;4.96.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933543" version="1" comment="eximon is &lt;4.96.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933544" version="1" comment="eximstats-html is &lt;4.96.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933545" version="1" comment="python310-Django is &lt;4.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933546" version="1" comment="python311-Django is &lt;4.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933547" version="1" comment="python39-Django is &lt;4.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933548" version="1" comment="ungoogled-chromium is &lt;118.0.5993.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933549" version="1" comment="ungoogled-chromium-chromedriver is &lt;118.0.5993.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933550" version="1" comment="libnghttp2-14 is &lt;1.57.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933551" version="1" comment="libnghttp2-14-32bit is &lt;1.57.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933552" version="1" comment="libnghttp2-devel is &lt;1.57.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933553" version="1" comment="nghttp2 is &lt;1.57.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933554" version="1" comment="corepack20 is &lt;20.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933555" version="1" comment="nodejs20 is &lt;20.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933556" version="1" comment="nodejs20-devel is &lt;20.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933557" version="1" comment="nodejs20-docs is &lt;20.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933558" version="1" comment="npm20 is &lt;20.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933559" version="1" comment="picard is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933560" version="1" comment="picard-lang is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933561" version="1" comment="suse-module-tools is &lt;16.0.36-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933562" version="1" comment="suse-module-tools-scriptlets is &lt;16.0.36-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933563" version="1" comment="nodejs-electron is &lt;25.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933564" version="1" comment="nodejs-electron-devel is &lt;25.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933565" version="1" comment="nodejs-electron-doc is &lt;25.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933566" version="1" comment="zabbix-agent is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933567" version="1" comment="zabbix-java-gateway is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933568" version="1" comment="zabbix-proxy is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933569" version="1" comment="zabbix-proxy-mysql is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933570" version="1" comment="zabbix-proxy-postgresql is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933571" version="1" comment="zabbix-proxy-sqlite is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933572" version="1" comment="zabbix-server is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933573" version="1" comment="zabbix-server-mysql is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933574" version="1" comment="zabbix-server-postgresql is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933575" version="1" comment="zabbix-ui is &lt;6.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933576" version="1" comment="java-11-openjdk is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933577" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933578" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933579" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933580" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933581" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933582" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933583" version="1" comment="python310-urllib3 is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933584" version="1" comment="python311-urllib3 is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933585" version="1" comment="python39-urllib3 is &lt;2.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933586" version="1" comment="python310-urllib3_1 is &lt;1.26.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933587" version="1" comment="python311-urllib3_1 is &lt;1.26.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933588" version="1" comment="python39-urllib3_1 is &lt;1.26.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933589" version="1" comment="ctdb is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933590" version="1" comment="ctdb-pcp-pmda is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933591" version="1" comment="libsamba-policy-devel is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933592" version="1" comment="libsamba-policy-python3-devel is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933593" version="1" comment="libsamba-policy0-python3 is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933594" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933595" version="1" comment="samba is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933596" version="1" comment="samba-ad-dc is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933597" version="1" comment="samba-ad-dc-libs is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933598" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933599" version="1" comment="samba-ceph is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933600" version="1" comment="samba-client is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933601" version="1" comment="samba-client-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933602" version="1" comment="samba-client-libs is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933603" version="1" comment="samba-client-libs-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933604" version="1" comment="samba-devel is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933605" version="1" comment="samba-devel-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933606" version="1" comment="samba-doc is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933607" version="1" comment="samba-dsdb-modules is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933608" version="1" comment="samba-gpupdate is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933609" version="1" comment="samba-ldb-ldap is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933610" version="1" comment="samba-libs is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933611" version="1" comment="samba-libs-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933612" version="1" comment="samba-libs-python3 is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933613" version="1" comment="samba-libs-python3-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933614" version="1" comment="samba-python3 is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933615" version="1" comment="samba-test is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933616" version="1" comment="samba-tool is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933617" version="1" comment="samba-winbind is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933618" version="1" comment="samba-winbind-libs is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933619" version="1" comment="samba-winbind-libs-32bit is &lt;4.19.2+git.322.7e9201cef5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933620" version="1" comment="apache2-mod_uwsgi is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933621" version="1" comment="python310-uwsgi-python3 is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933622" version="1" comment="python311-uwsgi-python3 is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933623" version="1" comment="python39-uwsgi-python3 is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933624" version="1" comment="uwsgi is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933625" version="1" comment="uwsgi-emperor_pg is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933626" version="1" comment="uwsgi-emperor_zeromq is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933627" version="1" comment="uwsgi-gevent is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933628" version="1" comment="uwsgi-glusterfs is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933629" version="1" comment="uwsgi-greenlet is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933630" version="1" comment="uwsgi-jvm is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933631" version="1" comment="uwsgi-ldap is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933632" version="1" comment="uwsgi-libffi is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933633" version="1" comment="uwsgi-logzmq is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933634" version="1" comment="uwsgi-lua is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933635" version="1" comment="uwsgi-pam is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933636" version="1" comment="uwsgi-php8 is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933637" version="1" comment="uwsgi-psgi is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933638" version="1" comment="uwsgi-pypy is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933639" version="1" comment="uwsgi-sqlite3 is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933640" version="1" comment="uwsgi-xslt is &lt;2.0.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933641" version="1" comment="hwloc is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933642" version="1" comment="hwloc-data is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933643" version="1" comment="hwloc-devel is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933644" version="1" comment="hwloc-doc is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933645" version="1" comment="hwloc-gl is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933646" version="1" comment="hwloc-gui is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933647" version="1" comment="libhwloc15 is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933648" version="1" comment="libsndfile-devel is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933649" version="1" comment="libsndfile1 is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933650" version="1" comment="libsndfile1-32bit is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933651" version="1" comment="vorbis-tools is &lt;1.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933652" version="1" comment="vorbis-tools-lang is &lt;1.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933653" version="1" comment="apache2 is &lt;2.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933654" version="1" comment="java-17-openjdk is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933655" version="1" comment="java-17-openjdk-demo is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933656" version="1" comment="java-17-openjdk-devel is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933657" version="1" comment="java-17-openjdk-headless is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933658" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933659" version="1" comment="java-17-openjdk-jmods is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933660" version="1" comment="java-17-openjdk-src is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933661" version="1" comment="python310-unearth is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933662" version="1" comment="python311-unearth is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933663" version="1" comment="python39-unearth is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933664" version="1" comment="qutebrowser is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933665" version="1" comment="redis is &lt;7.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933666" version="1" comment="python3-virtualbox is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933667" version="1" comment="virtualbox is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933668" version="1" comment="virtualbox-devel is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933669" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933670" version="1" comment="virtualbox-guest-source is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933671" version="1" comment="virtualbox-guest-tools is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933672" version="1" comment="virtualbox-host-source is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933673" version="1" comment="virtualbox-qt is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933674" version="1" comment="virtualbox-vnc is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933675" version="1" comment="virtualbox-websrv is &lt;7.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933676" version="1" comment="MozillaThunderbird is &lt;115.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933677" version="1" comment="MozillaThunderbird-translations-common is &lt;115.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933678" version="1" comment="MozillaThunderbird-translations-other is &lt;115.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933679" version="1" comment="java-21-openjdk is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933680" version="1" comment="java-21-openjdk-demo is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933681" version="1" comment="java-21-openjdk-devel is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933682" version="1" comment="java-21-openjdk-headless is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933683" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933684" version="1" comment="java-21-openjdk-jmods is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933685" version="1" comment="java-21-openjdk-src is &lt;21.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933686" version="1" comment="postgresql14 is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933687" version="1" comment="postgresql14-contrib is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933688" version="1" comment="postgresql14-devel is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933689" version="1" comment="postgresql14-docs is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933690" version="1" comment="postgresql14-llvmjit is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933691" version="1" comment="postgresql14-llvmjit-devel is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933692" version="1" comment="postgresql14-plperl is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933693" version="1" comment="postgresql14-plpython is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933694" version="1" comment="postgresql14-pltcl is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933695" version="1" comment="postgresql14-server is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933696" version="1" comment="postgresql14-server-devel is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933697" version="1" comment="postgresql14-test is &lt;14.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933698" version="1" comment="libsox3 is &lt;14.4.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933699" version="1" comment="sox is &lt;14.4.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933700" version="1" comment="sox-devel is &lt;14.4.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933701" version="1" comment="teleport is &lt;14.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933702" version="1" comment="teleport-tbot is &lt;14.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933703" version="1" comment="teleport-tctl is &lt;14.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933704" version="1" comment="teleport-tsh is &lt;14.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933705" version="1" comment="xorg-x11-server is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933706" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933707" version="1" comment="xorg-x11-server-extra is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933708" version="1" comment="xorg-x11-server-sdk is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933709" version="1" comment="xorg-x11-server-source is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933710" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933711" version="1" comment="xwayland is &lt;23.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933712" version="1" comment="xwayland-devel is &lt;23.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933713" version="1" comment="libminizip1 is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933714" version="1" comment="libminizip1-32bit is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933715" version="1" comment="libminizip1-x86-64-v3 is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933716" version="1" comment="libz1 is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933717" version="1" comment="libz1-32bit is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933718" version="1" comment="libz1-x86-64-v3 is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933719" version="1" comment="minizip-devel is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933720" version="1" comment="zlib-devel is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933721" version="1" comment="zlib-devel-32bit is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933722" version="1" comment="zlib-devel-static is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933723" version="1" comment="zlib-devel-static-32bit is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933724" version="1" comment="zlib-testsuite is &lt;1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933725" version="1" comment="qemu is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933726" version="1" comment="qemu-SLOF is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933727" version="1" comment="qemu-accel-qtest is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933728" version="1" comment="qemu-accel-tcg-x86 is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933729" version="1" comment="qemu-arm is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933730" version="1" comment="qemu-audio-alsa is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933731" version="1" comment="qemu-audio-dbus is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933732" version="1" comment="qemu-audio-jack is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933733" version="1" comment="qemu-audio-oss is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933734" version="1" comment="qemu-audio-pa is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933735" version="1" comment="qemu-audio-pipewire is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933736" version="1" comment="qemu-audio-spice is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933737" version="1" comment="qemu-block-curl is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933738" version="1" comment="qemu-block-dmg is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933739" version="1" comment="qemu-block-gluster is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933740" version="1" comment="qemu-block-iscsi is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933741" version="1" comment="qemu-block-nfs is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933742" version="1" comment="qemu-block-rbd is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933743" version="1" comment="qemu-block-ssh is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933744" version="1" comment="qemu-chardev-baum is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933745" version="1" comment="qemu-chardev-spice is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933746" version="1" comment="qemu-doc is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933747" version="1" comment="qemu-extra is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933748" version="1" comment="qemu-guest-agent is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933749" version="1" comment="qemu-headless is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933750" version="1" comment="qemu-hw-display-qxl is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933751" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933752" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933753" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933754" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933755" version="1" comment="qemu-hw-usb-host is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933756" version="1" comment="qemu-hw-usb-redirect is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933757" version="1" comment="qemu-hw-usb-smartcard is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933758" version="1" comment="qemu-img is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933759" version="1" comment="qemu-ivshmem-tools is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933760" version="1" comment="qemu-ksm is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933761" version="1" comment="qemu-kvm is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933762" version="1" comment="qemu-lang is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933763" version="1" comment="qemu-microvm is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933764" version="1" comment="qemu-ppc is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933765" version="1" comment="qemu-pr-helper is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933766" version="1" comment="qemu-s390x is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933767" version="1" comment="qemu-skiboot is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933768" version="1" comment="qemu-tools is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933769" version="1" comment="qemu-ui-curses is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933770" version="1" comment="qemu-ui-dbus is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933771" version="1" comment="qemu-ui-gtk is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933772" version="1" comment="qemu-ui-opengl is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933773" version="1" comment="qemu-ui-spice-app is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933774" version="1" comment="qemu-ui-spice-core is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933775" version="1" comment="qemu-vhost-user-gpu is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933776" version="1" comment="qemu-x86 is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933777" version="1" comment="roundcubemail is &lt;1.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933778" version="1" comment="libsystemd0 is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933779" version="1" comment="libsystemd0-32bit is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933780" version="1" comment="libudev1 is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933781" version="1" comment="libudev1-32bit is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933782" version="1" comment="systemd is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933783" version="1" comment="systemd-32bit is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933784" version="1" comment="systemd-boot is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933785" version="1" comment="systemd-container is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933786" version="1" comment="systemd-coredump is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933787" version="1" comment="systemd-devel is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933788" version="1" comment="systemd-doc is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933789" version="1" comment="systemd-experimental is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933790" version="1" comment="systemd-homed is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933791" version="1" comment="systemd-journal-remote is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933792" version="1" comment="systemd-lang is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933793" version="1" comment="systemd-network is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933794" version="1" comment="systemd-portable is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933795" version="1" comment="systemd-sysvcompat is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933796" version="1" comment="systemd-testsuite is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933797" version="1" comment="udev is &lt;254.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933798" version="1" comment="libvlc5 is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933799" version="1" comment="libvlccore9 is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933800" version="1" comment="vlc is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933801" version="1" comment="vlc-codec-gstreamer is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933802" version="1" comment="vlc-devel is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933803" version="1" comment="vlc-jack is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933804" version="1" comment="vlc-lang is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933805" version="1" comment="vlc-noX is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933806" version="1" comment="vlc-opencv is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933807" version="1" comment="vlc-qt is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933808" version="1" comment="vlc-vdpau is &lt;3.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933809" version="1" comment="chromedriver is &lt;118.0.5993.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933810" version="1" comment="chromium is &lt;118.0.5993.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933811" version="1" comment="etcd-for-k8s1.25 is &lt;3.5.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933812" version="1" comment="etcd-for-k8s1.26 is &lt;3.5.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933813" version="1" comment="etcd-for-k8s1.27 is &lt;3.5.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933814" version="1" comment="libopenssl-3-devel is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933815" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933816" version="1" comment="libopenssl3 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933817" version="1" comment="libopenssl3-32bit is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933818" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933819" version="1" comment="openssl-3 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933820" version="1" comment="openssl-3-doc is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933821" version="1" comment="avahi is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933822" version="1" comment="avahi-autoipd is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933823" version="1" comment="avahi-compat-howl-devel is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933824" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933825" version="1" comment="avahi-lang is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933826" version="1" comment="avahi-utils is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933827" version="1" comment="libavahi-client3 is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933828" version="1" comment="libavahi-client3-32bit is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933829" version="1" comment="libavahi-common3 is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933830" version="1" comment="libavahi-common3-32bit is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933831" version="1" comment="libavahi-core7 is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933832" version="1" comment="libavahi-devel is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933833" version="1" comment="libavahi-libevent1 is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933834" version="1" comment="libdns_sd is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933835" version="1" comment="libdns_sd-32bit is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933836" version="1" comment="libhowl0 is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933837" version="1" comment="python310-avahi is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933838" version="1" comment="python311-avahi is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933839" version="1" comment="python39-avahi is &lt;0.8-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933840" version="1" comment="libvmtools-devel is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933841" version="1" comment="libvmtools0 is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933842" version="1" comment="open-vm-tools is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933843" version="1" comment="open-vm-tools-containerinfo is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933844" version="1" comment="open-vm-tools-desktop is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933845" version="1" comment="open-vm-tools-salt-minion is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933846" version="1" comment="open-vm-tools-sdmp is &lt;12.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933847" version="1" comment="python310-Werkzeug is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933848" version="1" comment="python311-Werkzeug is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933849" version="1" comment="python39-Werkzeug is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933850" version="1" comment="cmctl is &lt;1.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933851" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933852" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933853" version="1" comment="libQt5Concurrent-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933854" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933855" version="1" comment="libQt5Concurrent5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933856" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933857" version="1" comment="libQt5Core-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933858" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933859" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933860" version="1" comment="libQt5Core5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933861" version="1" comment="libQt5Core5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933862" version="1" comment="libQt5DBus-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933863" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933864" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933865" version="1" comment="libQt5DBus5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933866" version="1" comment="libQt5DBus5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933867" version="1" comment="libQt5Gui-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933868" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933869" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933870" version="1" comment="libQt5Gui5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933871" version="1" comment="libQt5Gui5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933872" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933873" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933874" version="1" comment="libQt5Network-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933875" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933876" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933877" version="1" comment="libQt5Network5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933878" version="1" comment="libQt5Network5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933879" version="1" comment="libQt5OpenGL-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933880" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933881" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933882" version="1" comment="libQt5OpenGL5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933883" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933884" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933885" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933886" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933887" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933888" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933889" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933890" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933891" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933892" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933893" version="1" comment="libQt5PrintSupport5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933894" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933895" version="1" comment="libQt5Sql-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933896" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933897" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933898" version="1" comment="libQt5Sql5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933899" version="1" comment="libQt5Sql5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933900" version="1" comment="libQt5Sql5-mysql is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933901" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933902" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933903" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933904" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933905" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933906" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933907" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933908" version="1" comment="libQt5Test-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933909" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933910" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933911" version="1" comment="libQt5Test5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933912" version="1" comment="libQt5Test5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933913" version="1" comment="libQt5Widgets-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933914" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933915" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933916" version="1" comment="libQt5Widgets5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933917" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933918" version="1" comment="libQt5Xml-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933919" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933920" version="1" comment="libQt5Xml5 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933921" version="1" comment="libQt5Xml5-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933922" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933923" version="1" comment="libqt5-qtbase-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933924" version="1" comment="libqt5-qtbase-examples is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933925" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933926" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933927" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933928" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.11+kde138-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933929" version="1" comment="libQt5Svg5 is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933930" version="1" comment="libQt5Svg5-32bit is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933931" version="1" comment="libqt5-qtsvg-devel is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933932" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933933" version="1" comment="libqt5-qtsvg-examples is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933934" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.15.11+kde6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933935" version="1" comment="pgadmin4 is &lt;7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933936" version="1" comment="pgadmin4-desktop is &lt;7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933937" version="1" comment="pgadmin4-doc is &lt;7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933938" version="1" comment="pgadmin4-web-uwsgi is &lt;7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933939" version="1" comment="libQt6Concurrent6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933940" version="1" comment="libQt6Core6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933941" version="1" comment="libQt6DBus6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933942" version="1" comment="libQt6Gui6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933943" version="1" comment="libQt6Network6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933944" version="1" comment="libQt6OpenGL6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933945" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933946" version="1" comment="libQt6PrintSupport6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933947" version="1" comment="libQt6Sql6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933948" version="1" comment="libQt6Test6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933949" version="1" comment="libQt6Widgets6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933950" version="1" comment="libQt6Xml6 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933951" version="1" comment="qt6-base-common-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933952" version="1" comment="qt6-base-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933953" version="1" comment="qt6-base-examples is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933954" version="1" comment="qt6-base-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933955" version="1" comment="qt6-concurrent-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933956" version="1" comment="qt6-core-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933957" version="1" comment="qt6-core-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933958" version="1" comment="qt6-dbus-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933959" version="1" comment="qt6-dbus-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933960" version="1" comment="qt6-docs-common is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933961" version="1" comment="qt6-exampleicons-devel-static is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933962" version="1" comment="qt6-gui-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933963" version="1" comment="qt6-gui-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933964" version="1" comment="qt6-kmssupport-devel-static is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933965" version="1" comment="qt6-kmssupport-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933966" version="1" comment="qt6-network-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933967" version="1" comment="qt6-network-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933968" version="1" comment="qt6-network-tls is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933969" version="1" comment="qt6-networkinformation-glib is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933970" version="1" comment="qt6-networkinformation-nm is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933971" version="1" comment="qt6-opengl-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933972" version="1" comment="qt6-opengl-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933973" version="1" comment="qt6-openglwidgets-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933974" version="1" comment="qt6-platformsupport-devel-static is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933975" version="1" comment="qt6-platformsupport-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933976" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933977" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933978" version="1" comment="qt6-printsupport-cups is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933979" version="1" comment="qt6-printsupport-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933980" version="1" comment="qt6-printsupport-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933981" version="1" comment="qt6-sql-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933982" version="1" comment="qt6-sql-mysql is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933983" version="1" comment="qt6-sql-postgresql is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933984" version="1" comment="qt6-sql-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933985" version="1" comment="qt6-sql-sqlite is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933986" version="1" comment="qt6-sql-unixODBC is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933987" version="1" comment="qt6-test-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933988" version="1" comment="qt6-test-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933989" version="1" comment="qt6-widgets-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933990" version="1" comment="qt6-widgets-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933991" version="1" comment="qt6-xml-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933992" version="1" comment="qt6-xml-private-devel is &lt;6.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933993" version="1" comment="libtiff-devel is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933994" version="1" comment="libtiff-devel-32bit is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933995" version="1" comment="libtiff6 is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933996" version="1" comment="libtiff6-32bit is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933997" version="1" comment="tiff is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933998" version="1" comment="tomcat is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009933999" version="1" comment="tomcat-admin-webapps is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934000" version="1" comment="tomcat-docs-webapp is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934001" version="1" comment="tomcat-el-3_0-api is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934002" version="1" comment="tomcat-embed is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934003" version="1" comment="tomcat-javadoc is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934004" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934005" version="1" comment="tomcat-jsvc is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934006" version="1" comment="tomcat-lib is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934007" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934008" version="1" comment="tomcat-webapps is &lt;9.0.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934009" version="1" comment="ungoogled-chromium is &lt;118.0.5993.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934010" version="1" comment="ungoogled-chromium-chromedriver is &lt;118.0.5993.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934011" version="1" comment="velero is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934012" version="1" comment="velero-bash-completion is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934013" version="1" comment="velero-fish-completion is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934014" version="1" comment="velero-zsh-completion is &lt;1.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934015" version="1" comment="MozillaFirefox is &lt;119.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934016" version="1" comment="MozillaFirefox-branding-upstream is &lt;119.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934017" version="1" comment="MozillaFirefox-devel is &lt;119.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934018" version="1" comment="MozillaFirefox-translations-common is &lt;119.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934019" version="1" comment="MozillaFirefox-translations-other is &lt;119.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934020" version="1" comment="freeradius-server is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934021" version="1" comment="freeradius-server-devel is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934022" version="1" comment="freeradius-server-doc is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934023" version="1" comment="freeradius-server-krb5 is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934024" version="1" comment="freeradius-server-ldap is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934025" version="1" comment="freeradius-server-ldap-schemas is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934026" version="1" comment="freeradius-server-libs is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934027" version="1" comment="freeradius-server-mysql is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934028" version="1" comment="freeradius-server-perl is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934029" version="1" comment="freeradius-server-postgresql is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934030" version="1" comment="freeradius-server-python3 is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934031" version="1" comment="freeradius-server-sqlite is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934032" version="1" comment="freeradius-server-utils is &lt;3.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934033" version="1" comment="frr is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934034" version="1" comment="frr-devel is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934035" version="1" comment="libfrr0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934036" version="1" comment="libfrr_pb0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934037" version="1" comment="libfrrcares0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934038" version="1" comment="libfrrfpm_pb0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934039" version="1" comment="libfrrospfapiclient0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934040" version="1" comment="libfrrsnmp0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934041" version="1" comment="libfrrzmq0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934042" version="1" comment="libmlag_pb0 is &lt;8.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934043" version="1" comment="glibc is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934044" version="1" comment="glibc-devel is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934045" version="1" comment="glibc-devel-static is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934046" version="1" comment="glibc-extra is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934047" version="1" comment="glibc-html is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934048" version="1" comment="glibc-i18ndata is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934049" version="1" comment="glibc-info is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934050" version="1" comment="glibc-lang is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934051" version="1" comment="glibc-locale is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934052" version="1" comment="glibc-locale-base is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934053" version="1" comment="glibc-profile is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934054" version="1" comment="nscd is &lt;2.38-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934055" version="1" comment="jasper is &lt;4.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934056" version="1" comment="libjasper-devel is &lt;4.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934057" version="1" comment="libjasper7 is &lt;4.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934058" version="1" comment="libjasper7-32bit is &lt;4.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934059" version="1" comment="lighttpd is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934060" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934061" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934062" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934063" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934064" version="1" comment="lighttpd-mod_magnet is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934065" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934066" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934067" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934068" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934069" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934070" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934071" version="1" comment="lighttpd-mod_webdav is &lt;1.4.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934072" version="1" comment="grpc-devel is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934073" version="1" comment="grpc-source is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934074" version="1" comment="libgrpc++1_59 is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934075" version="1" comment="libgrpc1_59 is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934076" version="1" comment="libgrpc36 is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934077" version="1" comment="libupb36 is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934078" version="1" comment="upb-devel is &lt;1.59.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934079" version="1" comment="matrix-synapse is &lt;1.95.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934080" version="1" comment="avahi is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934081" version="1" comment="avahi-autoipd is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934082" version="1" comment="avahi-compat-howl-devel is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934083" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934084" version="1" comment="avahi-lang is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934085" version="1" comment="avahi-utils is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934086" version="1" comment="libavahi-client3 is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934087" version="1" comment="libavahi-client3-32bit is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934088" version="1" comment="libavahi-common3 is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934089" version="1" comment="libavahi-common3-32bit is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934090" version="1" comment="libavahi-core7 is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934091" version="1" comment="libavahi-devel is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934092" version="1" comment="libavahi-libevent1 is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934093" version="1" comment="libdns_sd is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934094" version="1" comment="libdns_sd-32bit is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934095" version="1" comment="libhowl0 is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934096" version="1" comment="python310-avahi is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934097" version="1" comment="python311-avahi is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934098" version="1" comment="python39-avahi is &lt;0.8-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934099" version="1" comment="clamav is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934100" version="1" comment="clamav-devel is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934101" version="1" comment="clamav-docs-html is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934102" version="1" comment="clamav-milter is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934103" version="1" comment="libclamav9 is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934104" version="1" comment="libfreshclam2 is &lt;0.103.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934105" version="1" comment="element-desktop is &lt;1.11.47-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934106" version="1" comment="gstreamer-plugins-bad is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934107" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934108" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934109" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934110" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934111" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934112" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934113" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934114" version="1" comment="gstreamer-transcoder is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934115" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934116" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934117" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934118" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934119" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934120" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934121" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934122" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934123" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934124" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934125" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934126" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934127" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934128" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934129" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934130" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934131" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934132" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934133" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934134" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934135" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934136" version="1" comment="libgstplay-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934137" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934138" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934139" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934140" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934141" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934142" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934143" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934144" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934145" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934146" version="1" comment="libgstva-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934147" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934148" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934149" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934150" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934151" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934152" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934153" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934154" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934155" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934156" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934157" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934158" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934159" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934160" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934161" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934162" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934163" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934164" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934165" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934166" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934167" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934168" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934169" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934170" version="1" comment="ruby3.2-rubygem-activesupport-7.0 is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934171" version="1" comment="squid is &lt;6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934172" version="1" comment="libpainter0 is &lt;0.9.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934173" version="1" comment="librfxencode0 is &lt;0.9.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934174" version="1" comment="xrdp is &lt;0.9.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934175" version="1" comment="xrdp-devel is &lt;0.9.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934176" version="1" comment="phpPgAdmin is &lt;7.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934177" version="1" comment="phpPgAdmin-apache is &lt;7.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934178" version="1" comment="roundcubemail is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934179" version="1" comment="cosign is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934180" version="1" comment="exiv2 is &lt;0.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934181" version="1" comment="exiv2-lang is &lt;0.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934182" version="1" comment="libexiv2-28 is &lt;0.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934183" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934184" version="1" comment="libexiv2-devel is &lt;0.28.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934185" version="1" comment="mupdf is &lt;1.23.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934186" version="1" comment="mupdf-devel-static is &lt;1.23.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934188" version="1" comment="kernel-macros is &lt;6.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934189" version="1" comment="kernel-source is &lt;6.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934190" version="1" comment="kernel-source-vanilla is &lt;6.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934191" version="1" comment="go1.20 is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934192" version="1" comment="go1.20-doc is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934193" version="1" comment="go1.20-libstd is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934194" version="1" comment="go1.20-race is &lt;1.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934195" version="1" comment="go1.21 is &lt;1.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934196" version="1" comment="go1.21-doc is &lt;1.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934197" version="1" comment="go1.21-libstd is &lt;1.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934198" version="1" comment="go1.21-race is &lt;1.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934199" version="1" comment="postgresql11 is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934200" version="1" comment="postgresql11-contrib is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934201" version="1" comment="postgresql11-devel is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934202" version="1" comment="postgresql11-docs is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934203" version="1" comment="postgresql11-llvmjit is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934204" version="1" comment="postgresql11-llvmjit-devel is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934205" version="1" comment="postgresql11-plperl is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934206" version="1" comment="postgresql11-plpython is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934207" version="1" comment="postgresql11-pltcl is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934208" version="1" comment="postgresql11-server is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934209" version="1" comment="postgresql11-server-devel is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934210" version="1" comment="postgresql11-test is &lt;11.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934211" version="1" comment="postgresql13 is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934212" version="1" comment="postgresql13-contrib is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934213" version="1" comment="postgresql13-devel is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934214" version="1" comment="postgresql13-docs is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934215" version="1" comment="postgresql13-llvmjit is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934216" version="1" comment="postgresql13-llvmjit-devel is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934217" version="1" comment="postgresql13-plperl is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934218" version="1" comment="postgresql13-plpython is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934219" version="1" comment="postgresql13-pltcl is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934220" version="1" comment="postgresql13-server is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934221" version="1" comment="postgresql13-server-devel is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934222" version="1" comment="postgresql13-test is &lt;13.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934223" version="1" comment="postgresql14 is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934224" version="1" comment="postgresql14-contrib is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934225" version="1" comment="postgresql14-devel is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934226" version="1" comment="postgresql14-docs is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934227" version="1" comment="postgresql14-llvmjit is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934228" version="1" comment="postgresql14-llvmjit-devel is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934229" version="1" comment="postgresql14-plperl is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934230" version="1" comment="postgresql14-plpython is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934231" version="1" comment="postgresql14-pltcl is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934232" version="1" comment="postgresql14-server is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934233" version="1" comment="postgresql14-server-devel is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934234" version="1" comment="postgresql14-test is &lt;14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934235" version="1" comment="binutils is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934236" version="1" comment="binutils-devel is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934237" version="1" comment="binutils-devel-32bit is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934238" version="1" comment="binutils-gold is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934239" version="1" comment="gprofng is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934240" version="1" comment="libctf-nobfd0 is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934241" version="1" comment="libctf0 is &lt;2.41-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934242" version="1" comment="libmozjs-115-0 is &lt;115.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934243" version="1" comment="mozjs115 is &lt;115.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934244" version="1" comment="mozjs115-devel is &lt;115.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934245" version="1" comment="postgresql15 is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934246" version="1" comment="postgresql15-contrib is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934247" version="1" comment="postgresql15-devel is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934248" version="1" comment="postgresql15-docs is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934249" version="1" comment="postgresql15-llvmjit is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934250" version="1" comment="postgresql15-llvmjit-devel is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934251" version="1" comment="postgresql15-plperl is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934252" version="1" comment="postgresql15-plpython is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934253" version="1" comment="postgresql15-pltcl is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934254" version="1" comment="postgresql15-server is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934255" version="1" comment="postgresql15-server-devel is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934256" version="1" comment="postgresql15-test is &lt;15.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934257" version="1" comment="libecpg6 is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934258" version="1" comment="libecpg6-32bit is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934259" version="1" comment="libpq5 is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934260" version="1" comment="libpq5-32bit is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934261" version="1" comment="postgresql16 is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934262" version="1" comment="postgresql16-contrib is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934263" version="1" comment="postgresql16-devel is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934264" version="1" comment="postgresql16-docs is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934265" version="1" comment="postgresql16-llvmjit is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934266" version="1" comment="postgresql16-llvmjit-devel is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934267" version="1" comment="postgresql16-plperl is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934268" version="1" comment="postgresql16-plpython is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934269" version="1" comment="postgresql16-pltcl is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934270" version="1" comment="postgresql16-server is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934271" version="1" comment="postgresql16-server-devel is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934272" version="1" comment="postgresql16-test is &lt;16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934273" version="1" comment="optipng is &lt;0.7.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934274" version="1" comment="postfix is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934275" version="1" comment="postfix-devel is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934276" version="1" comment="postfix-doc is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934277" version="1" comment="postfix-ldap is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934278" version="1" comment="postfix-mysql is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934279" version="1" comment="postfix-postgresql is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934280" version="1" comment="python310-asyncssh is &lt;2.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934281" version="1" comment="python311-asyncssh is &lt;2.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934282" version="1" comment="python39-asyncssh is &lt;2.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934283" version="1" comment="traceroute is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934284" version="1" comment="chromedriver is &lt;119.0.6045.123-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934285" version="1" comment="chromium is &lt;119.0.6045.123-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934286" version="1" comment="connman is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934287" version="1" comment="connman-client is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934288" version="1" comment="connman-devel is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934289" version="1" comment="connman-doc is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934290" version="1" comment="connman-nmcompat is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934291" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934292" version="1" comment="connman-plugin-iospm is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934293" version="1" comment="connman-plugin-l2tp is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934294" version="1" comment="connman-plugin-openconnect is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934295" version="1" comment="connman-plugin-openvpn is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934296" version="1" comment="connman-plugin-polkit is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934297" version="1" comment="connman-plugin-pptp is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934298" version="1" comment="connman-plugin-tist is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934299" version="1" comment="connman-plugin-vpnc is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934300" version="1" comment="connman-plugin-wireguard is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934301" version="1" comment="connman-test is &lt;1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934302" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934303" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934304" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934305" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934306" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934307" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934308" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934309" version="1" comment="libnbd is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934310" version="1" comment="libnbd-bash-completion is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934311" version="1" comment="libnbd-devel is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934312" version="1" comment="libnbd0 is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934313" version="1" comment="nbdfuse is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934314" version="1" comment="python3-libnbd is &lt;1.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934315" version="1" comment="ungoogled-chromium is &lt;119.0.6045.123-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934316" version="1" comment="ungoogled-chromium-chromedriver is &lt;119.0.6045.123-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934317" version="1" comment="chromedriver is &lt;119.0.6045.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934318" version="1" comment="chromium is &lt;119.0.6045.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934319" version="1" comment="libtommath-devel is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934320" version="1" comment="libtommath-examples is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934321" version="1" comment="libtommath1 is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934322" version="1" comment="libtommath1-x86-64-v3 is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934323" version="1" comment="libxml2-2 is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934324" version="1" comment="libxml2-2-32bit is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934325" version="1" comment="libxml2-devel is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934326" version="1" comment="libxml2-devel-32bit is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934327" version="1" comment="libxml2-doc is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934328" version="1" comment="libxml2-tools is &lt;2.11.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934329" version="1" comment="memcached is &lt;1.6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934330" version="1" comment="memcached-devel is &lt;1.6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934331" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934332" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934333" version="1" comment="libopenssl10 is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934334" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934335" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934336" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934337" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934338" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934339" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934340" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934341" version="1" comment="openvpn is &lt;2.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934342" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934343" version="1" comment="openvpn-devel is &lt;2.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934344" version="1" comment="openvpn-down-root-plugin is &lt;2.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934345" version="1" comment="python-Twisted-doc is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934346" version="1" comment="python310-Twisted is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934347" version="1" comment="python310-Twisted-all_non_platform is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934348" version="1" comment="python310-Twisted-conch is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934349" version="1" comment="python310-Twisted-conch_nacl is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934350" version="1" comment="python310-Twisted-contextvars is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934351" version="1" comment="python310-Twisted-http2 is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934352" version="1" comment="python310-Twisted-serial is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934353" version="1" comment="python310-Twisted-tls is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934354" version="1" comment="python311-Twisted is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934355" version="1" comment="python311-Twisted-all_non_platform is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934356" version="1" comment="python311-Twisted-conch is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934357" version="1" comment="python311-Twisted-conch_nacl is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934358" version="1" comment="python311-Twisted-contextvars is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934359" version="1" comment="python311-Twisted-http2 is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934360" version="1" comment="python311-Twisted-serial is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934361" version="1" comment="python311-Twisted-tls is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934362" version="1" comment="python39-Twisted is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934363" version="1" comment="python39-Twisted-all_non_platform is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934364" version="1" comment="python39-Twisted-conch is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934365" version="1" comment="python39-Twisted-conch_nacl is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934366" version="1" comment="python39-Twisted-contextvars is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934367" version="1" comment="python39-Twisted-http2 is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934368" version="1" comment="python39-Twisted-serial is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934369" version="1" comment="python39-Twisted-tls is &lt;22.10.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934370" version="1" comment="python310-pyarrow is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934371" version="1" comment="python310-pyarrow-devel is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934372" version="1" comment="python311-pyarrow is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934373" version="1" comment="python311-pyarrow-devel is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934374" version="1" comment="python39-pyarrow is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934375" version="1" comment="python39-pyarrow-devel is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934376" version="1" comment="ruby3.2-rubygem-activerecord-7.0 is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934377" version="1" comment="ruby3.2-rubygem-rails-7.0 is &lt;7.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934378" version="1" comment="ucode-intel is &lt;20231114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934379" version="1" comment="python310-yt-dlp is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934380" version="1" comment="python311-yt-dlp is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934381" version="1" comment="python39-yt-dlp is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934382" version="1" comment="yt-dlp is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934383" version="1" comment="yt-dlp-bash-completion is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934384" version="1" comment="yt-dlp-fish-completion is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934385" version="1" comment="yt-dlp-zsh-completion is &lt;2023.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934386" version="1" comment="gdb is &lt;13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934387" version="1" comment="gdbserver is &lt;13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934388" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934389" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934390" version="1" comment="libopenssl1_1 is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934391" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934392" version="1" comment="openssl-1_1 is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934393" version="1" comment="openssl-1_1-doc is &lt;1.1.1w-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934394" version="1" comment="libopenssl-3-devel is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934395" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934396" version="1" comment="libopenssl3 is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934397" version="1" comment="libopenssl3-32bit is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934398" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934399" version="1" comment="openssl-3 is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934400" version="1" comment="openssl-3-doc is &lt;3.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934401" version="1" comment="python310-Pillow is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934402" version="1" comment="python310-Pillow-tk is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934403" version="1" comment="python311-Pillow is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934404" version="1" comment="python311-Pillow-tk is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934405" version="1" comment="python39-Pillow is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934406" version="1" comment="python39-Pillow-tk is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934407" version="1" comment="ruby3.2-rubygem-nokogiri is &lt;1.15.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934408" version="1" comment="tomcat10 is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934409" version="1" comment="tomcat10-admin-webapps is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934410" version="1" comment="tomcat10-doc is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934411" version="1" comment="tomcat10-docs-webapp is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934412" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934413" version="1" comment="tomcat10-embed is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934414" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934415" version="1" comment="tomcat10-jsvc is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934416" version="1" comment="tomcat10-lib is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934417" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934418" version="1" comment="tomcat10-webapps is &lt;10.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934419" version="1" comment="xen is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934420" version="1" comment="xen-devel is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934421" version="1" comment="xen-doc-html is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934422" version="1" comment="xen-libs is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934423" version="1" comment="xen-tools is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934424" version="1" comment="xen-tools-domU is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934425" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934426" version="1" comment="kubevirt-container-disk is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934427" version="1" comment="kubevirt-manifests is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934428" version="1" comment="kubevirt-pr-helper-conf is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934429" version="1" comment="kubevirt-tests is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934430" version="1" comment="kubevirt-virt-api is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934431" version="1" comment="kubevirt-virt-controller is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934432" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934433" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934434" version="1" comment="kubevirt-virt-handler is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934435" version="1" comment="kubevirt-virt-launcher is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934436" version="1" comment="kubevirt-virt-operator is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934437" version="1" comment="kubevirt-virtctl is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934438" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934439" version="1" comment="gnutls is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934440" version="1" comment="libgnutls-dane-devel is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934441" version="1" comment="libgnutls-dane0 is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934442" version="1" comment="libgnutls-devel is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934443" version="1" comment="libgnutls-devel-32bit is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934444" version="1" comment="libgnutls30 is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934445" version="1" comment="libgnutls30-32bit is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934446" version="1" comment="libgnutlsxx-devel is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934447" version="1" comment="libgnutlsxx30 is &lt;3.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934448" version="1" comment="jbig2dec is &lt;0.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934449" version="1" comment="jbig2dec-devel is &lt;0.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934450" version="1" comment="libjbig2dec0 is &lt;0.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934451" version="1" comment="libipa_hbac-devel is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934452" version="1" comment="libipa_hbac0 is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934453" version="1" comment="libnfsidmap-sss is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934454" version="1" comment="libsss_certmap-devel is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934455" version="1" comment="libsss_certmap0 is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934456" version="1" comment="libsss_idmap-devel is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934457" version="1" comment="libsss_idmap0 is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934458" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934459" version="1" comment="libsss_nss_idmap0 is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934460" version="1" comment="python3-ipa_hbac is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934461" version="1" comment="python3-sss-murmur is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934462" version="1" comment="python3-sss_nss_idmap is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934463" version="1" comment="python3-sssd-config is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934464" version="1" comment="sssd is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934465" version="1" comment="sssd-ad is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934466" version="1" comment="sssd-dbus is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934467" version="1" comment="sssd-ipa is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934468" version="1" comment="sssd-kcm is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934469" version="1" comment="sssd-krb5 is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934470" version="1" comment="sssd-krb5-common is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934471" version="1" comment="sssd-ldap is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934472" version="1" comment="sssd-proxy is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934473" version="1" comment="sssd-tools is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934474" version="1" comment="sssd-winbind-idmap is &lt;2.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934475" version="1" comment="ungoogled-chromium is &lt;119.0.6045.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934476" version="1" comment="ungoogled-chromium-chromedriver is &lt;119.0.6045.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934477" version="1" comment="libX11-6 is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934478" version="1" comment="libX11-6-32bit is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934479" version="1" comment="libX11-data is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934480" version="1" comment="libX11-devel is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934481" version="1" comment="libX11-devel-32bit is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934482" version="1" comment="libX11-xcb1 is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934483" version="1" comment="libX11-xcb1-32bit is &lt;1.8.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934484" version="1" comment="libgit2-1_7 is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934485" version="1" comment="libgit2-devel is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934486" version="1" comment="libgit2-tools is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934487" version="1" comment="doxygen2man is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934488" version="1" comment="libqb-devel is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934489" version="1" comment="libqb-devel-32bit is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934490" version="1" comment="libqb-tests is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934491" version="1" comment="libqb-tools is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934492" version="1" comment="libqb100 is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934493" version="1" comment="libqb100-32bit is &lt;2.0.8+20230721.002171b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934494" version="1" comment="ovmf is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934495" version="1" comment="ovmf-tools is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934496" version="1" comment="qemu-ovmf-ia32 is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934497" version="1" comment="qemu-ovmf-x86_64 is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934498" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934499" version="1" comment="qemu-uefi-aarch32 is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934500" version="1" comment="qemu-uefi-aarch64 is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934501" version="1" comment="qemu-uefi-riscv64 is &lt;202308-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934502" version="1" comment="python310-azure-storage-queue is &lt;12.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934503" version="1" comment="python311-azure-storage-queue is &lt;12.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934504" version="1" comment="python39-azure-storage-queue is &lt;12.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934505" version="1" comment="python310-mistune2 is &lt;2.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934506" version="1" comment="python311-mistune2 is &lt;2.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934507" version="1" comment="python39-mistune2 is &lt;2.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934508" version="1" comment="python310-pip is &lt;23.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934509" version="1" comment="python311-pip is &lt;23.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934510" version="1" comment="python39-pip is &lt;23.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934511" version="1" comment="java-11-openj9 is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934512" version="1" comment="java-11-openj9-demo is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934513" version="1" comment="java-11-openj9-devel is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934514" version="1" comment="java-11-openj9-headless is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934515" version="1" comment="java-11-openj9-javadoc is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934516" version="1" comment="java-11-openj9-jmods is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934517" version="1" comment="java-11-openj9-src is &lt;11.0.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934518" version="1" comment="java-17-openj9 is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934519" version="1" comment="java-17-openj9-demo is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934520" version="1" comment="java-17-openj9-devel is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934521" version="1" comment="java-17-openj9-headless is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934522" version="1" comment="java-17-openj9-javadoc is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934523" version="1" comment="java-17-openj9-jmods is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934524" version="1" comment="java-17-openj9-src is &lt;17.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934525" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934526" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934527" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934528" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934529" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934530" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934531" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.392-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934532" version="1" comment="libwireshark16 is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934533" version="1" comment="libwiretap13 is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934534" version="1" comment="libwsutil14 is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934535" version="1" comment="wireshark is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934536" version="1" comment="wireshark-devel is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934537" version="1" comment="wireshark-ui-qt is &lt;4.0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934538" version="1" comment="MozillaThunderbird is &lt;115.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934539" version="1" comment="MozillaThunderbird-translations-common is &lt;115.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934540" version="1" comment="MozillaThunderbird-translations-other is &lt;115.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934541" version="1" comment="python310-geopandas is &lt;0.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934542" version="1" comment="python311-geopandas is &lt;0.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934543" version="1" comment="python39-geopandas is &lt;0.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934544" version="1" comment="davix is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934545" version="1" comment="davix-devel is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934546" version="1" comment="libdavix0 is &lt;0.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934547" version="1" comment="libQt5Pdf5 is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934548" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934549" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934550" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934551" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934552" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934553" version="1" comment="libqt5-qtwebengine is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934554" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934555" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934556" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934557" version="1" comment="libntpc1 is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934558" version="1" comment="ntpsec is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934559" version="1" comment="ntpsec-devel is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934560" version="1" comment="ntpsec-doc is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934561" version="1" comment="ntpsec-utils is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934562" version="1" comment="python3-ntp is &lt;1.2.2a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934563" version="1" comment="cmake is &lt;3.27.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934564" version="1" comment="python310-aiohttp is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934565" version="1" comment="python311-aiohttp is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934566" version="1" comment="python39-aiohttp is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934567" version="1" comment="velero is &lt;1.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934568" version="1" comment="velero-bash-completion is &lt;1.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934569" version="1" comment="velero-fish-completion is &lt;1.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934570" version="1" comment="velero-zsh-completion is &lt;1.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934571" version="1" comment="xwayland is &lt;23.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934572" version="1" comment="xwayland-devel is &lt;23.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934573" version="1" comment="MozillaFirefox is &lt;120.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934574" version="1" comment="MozillaFirefox-branding-upstream is &lt;120.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934575" version="1" comment="MozillaFirefox-devel is &lt;120.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934576" version="1" comment="MozillaFirefox-translations-common is &lt;120.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934577" version="1" comment="MozillaFirefox-translations-other is &lt;120.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934578" version="1" comment="docker is &lt;24.0.7_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934579" version="1" comment="docker-bash-completion is &lt;24.0.7_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934580" version="1" comment="docker-fish-completion is &lt;24.0.7_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934581" version="1" comment="docker-rootless-extras is &lt;24.0.7_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934582" version="1" comment="docker-zsh-completion is &lt;24.0.7_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934583" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934584" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934585" version="1" comment="libQt5Concurrent-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934586" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934587" version="1" comment="libQt5Concurrent5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934588" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934589" version="1" comment="libQt5Core-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934590" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934591" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934592" version="1" comment="libQt5Core5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934593" version="1" comment="libQt5Core5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934594" version="1" comment="libQt5DBus-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934595" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934596" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934597" version="1" comment="libQt5DBus5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934598" version="1" comment="libQt5DBus5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934599" version="1" comment="libQt5Gui-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934600" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934601" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934602" version="1" comment="libQt5Gui5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934603" version="1" comment="libQt5Gui5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934604" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934605" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934606" version="1" comment="libQt5Network-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934607" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934608" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934609" version="1" comment="libQt5Network5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934610" version="1" comment="libQt5Network5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934611" version="1" comment="libQt5OpenGL-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934612" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934613" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934614" version="1" comment="libQt5OpenGL5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934615" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934616" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934617" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934618" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934619" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934620" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934621" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934622" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934623" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934624" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934625" version="1" comment="libQt5PrintSupport5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934626" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934627" version="1" comment="libQt5Sql-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934628" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934629" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934630" version="1" comment="libQt5Sql5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934631" version="1" comment="libQt5Sql5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934632" version="1" comment="libQt5Sql5-mysql is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934633" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934634" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934635" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934636" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934637" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934638" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934639" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934640" version="1" comment="libQt5Test-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934641" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934642" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934643" version="1" comment="libQt5Test5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934644" version="1" comment="libQt5Test5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934645" version="1" comment="libQt5Widgets-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934646" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934647" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934648" version="1" comment="libQt5Widgets5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934649" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934650" version="1" comment="libQt5Xml-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934651" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934652" version="1" comment="libQt5Xml5 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934653" version="1" comment="libQt5Xml5-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934654" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934655" version="1" comment="libqt5-qtbase-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934656" version="1" comment="libqt5-qtbase-examples is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934657" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934658" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934659" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934660" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.11+kde138-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934661" version="1" comment="jcasgen-maven-plugin is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934662" version="1" comment="uima-pear-maven-plugin is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934663" version="1" comment="uimaj is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934664" version="1" comment="uimaj-javadoc is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934665" version="1" comment="python310-cryptography is &lt;41.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934666" version="1" comment="python311-cryptography is &lt;41.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934667" version="1" comment="python39-cryptography is &lt;41.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934668" version="1" comment="chromedriver is &lt;119.0.6045.199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934669" version="1" comment="chromium is &lt;119.0.6045.199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934670" version="1" comment="gerbv is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934671" version="1" comment="gerbv-devel is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934672" version="1" comment="libgerbv1 is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934673" version="1" comment="kernel-firmware-all is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934674" version="1" comment="kernel-firmware-amdgpu is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934675" version="1" comment="kernel-firmware-ath10k is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934676" version="1" comment="kernel-firmware-ath11k is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934677" version="1" comment="kernel-firmware-atheros is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934678" version="1" comment="kernel-firmware-bluetooth is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934679" version="1" comment="kernel-firmware-bnx2 is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934680" version="1" comment="kernel-firmware-brcm is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934681" version="1" comment="kernel-firmware-chelsio is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934682" version="1" comment="kernel-firmware-dpaa2 is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934683" version="1" comment="kernel-firmware-i915 is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934684" version="1" comment="kernel-firmware-intel is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934685" version="1" comment="kernel-firmware-iwlwifi is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934686" version="1" comment="kernel-firmware-liquidio is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934687" version="1" comment="kernel-firmware-marvell is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934688" version="1" comment="kernel-firmware-media is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934689" version="1" comment="kernel-firmware-mediatek is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934690" version="1" comment="kernel-firmware-mellanox is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934691" version="1" comment="kernel-firmware-mwifiex is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934692" version="1" comment="kernel-firmware-network is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934693" version="1" comment="kernel-firmware-nfp is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934694" version="1" comment="kernel-firmware-nvidia is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934695" version="1" comment="kernel-firmware-platform is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934696" version="1" comment="kernel-firmware-prestera is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934697" version="1" comment="kernel-firmware-qcom is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934698" version="1" comment="kernel-firmware-qlogic is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934699" version="1" comment="kernel-firmware-radeon is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934700" version="1" comment="kernel-firmware-realtek is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934701" version="1" comment="kernel-firmware-serial is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934702" version="1" comment="kernel-firmware-sound is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934703" version="1" comment="kernel-firmware-ti is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934704" version="1" comment="kernel-firmware-ueagle is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934705" version="1" comment="kernel-firmware-usb-network is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934706" version="1" comment="ucode-amd is &lt;20231128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934707" version="1" comment="avif-tools is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934708" version="1" comment="gdk-pixbuf-loader-libavif is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934709" version="1" comment="libavif-devel is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934710" version="1" comment="libavif16 is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934711" version="1" comment="libavif16-32bit is &lt;1.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934712" version="1" comment="qbittorrent is &lt;4.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934713" version="1" comment="qbittorrent-nox is &lt;4.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934714" version="1" comment="avahi is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934715" version="1" comment="avahi-autoipd is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934716" version="1" comment="avahi-compat-howl-devel is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934717" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934718" version="1" comment="avahi-lang is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934719" version="1" comment="avahi-utils is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934720" version="1" comment="libavahi-client3 is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934721" version="1" comment="libavahi-client3-32bit is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934722" version="1" comment="libavahi-common3 is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934723" version="1" comment="libavahi-common3-32bit is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934724" version="1" comment="libavahi-core7 is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934725" version="1" comment="libavahi-devel is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934726" version="1" comment="libavahi-libevent1 is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934727" version="1" comment="libdns_sd is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934728" version="1" comment="libdns_sd-32bit is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934729" version="1" comment="libhowl0 is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934730" version="1" comment="python310-avahi is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934731" version="1" comment="python311-avahi is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934732" version="1" comment="python39-avahi is &lt;0.8-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934733" version="1" comment="perl is &lt;5.38.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934734" version="1" comment="perl-32bit is &lt;5.38.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934735" version="1" comment="perl-base is &lt;5.38.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934736" version="1" comment="perl-base-32bit is &lt;5.38.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934737" version="1" comment="perl-doc is &lt;5.38.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934738" version="1" comment="python310-pandas is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934739" version="1" comment="python310-pandas-all is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934740" version="1" comment="python310-pandas-clipboard is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934741" version="1" comment="python310-pandas-compression is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934742" version="1" comment="python310-pandas-computation is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934743" version="1" comment="python310-pandas-excel is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934744" version="1" comment="python310-pandas-feather is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934745" version="1" comment="python310-pandas-fss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934746" version="1" comment="python310-pandas-hdf5 is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934747" version="1" comment="python310-pandas-html is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934748" version="1" comment="python310-pandas-mysql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934749" version="1" comment="python310-pandas-output_formatting is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934750" version="1" comment="python310-pandas-parquet is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934751" version="1" comment="python310-pandas-performance is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934752" version="1" comment="python310-pandas-plot is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934753" version="1" comment="python310-pandas-postgresql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934754" version="1" comment="python310-pandas-spss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934755" version="1" comment="python310-pandas-sql-other is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934756" version="1" comment="python310-pandas-test is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934757" version="1" comment="python310-pandas-xml is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934758" version="1" comment="python311-pandas is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934759" version="1" comment="python311-pandas-all is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934760" version="1" comment="python311-pandas-clipboard is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934761" version="1" comment="python311-pandas-compression is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934762" version="1" comment="python311-pandas-computation is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934763" version="1" comment="python311-pandas-excel is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934764" version="1" comment="python311-pandas-feather is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934765" version="1" comment="python311-pandas-fss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934766" version="1" comment="python311-pandas-hdf5 is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934767" version="1" comment="python311-pandas-html is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934768" version="1" comment="python311-pandas-mysql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934769" version="1" comment="python311-pandas-output_formatting is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934770" version="1" comment="python311-pandas-parquet is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934771" version="1" comment="python311-pandas-performance is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934772" version="1" comment="python311-pandas-plot is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934773" version="1" comment="python311-pandas-postgresql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934774" version="1" comment="python311-pandas-spss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934775" version="1" comment="python311-pandas-sql-other is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934776" version="1" comment="python311-pandas-test is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934777" version="1" comment="python311-pandas-xml is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934778" version="1" comment="python39-pandas is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934779" version="1" comment="python39-pandas-all is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934780" version="1" comment="python39-pandas-clipboard is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934781" version="1" comment="python39-pandas-compression is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934782" version="1" comment="python39-pandas-computation is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934783" version="1" comment="python39-pandas-excel is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934784" version="1" comment="python39-pandas-feather is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934785" version="1" comment="python39-pandas-fss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934786" version="1" comment="python39-pandas-hdf5 is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934787" version="1" comment="python39-pandas-html is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934788" version="1" comment="python39-pandas-mysql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934789" version="1" comment="python39-pandas-output_formatting is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934790" version="1" comment="python39-pandas-parquet is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934791" version="1" comment="python39-pandas-performance is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934792" version="1" comment="python39-pandas-plot is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934793" version="1" comment="python39-pandas-postgresql is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934794" version="1" comment="python39-pandas-spss is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934795" version="1" comment="python39-pandas-sql-other is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934796" version="1" comment="python39-pandas-test is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934797" version="1" comment="python39-pandas-xml is &lt;2.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934798" version="1" comment="ungoogled-chromium is &lt;119.0.6045.199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934799" version="1" comment="ungoogled-chromium-chromedriver is &lt;119.0.6045.199-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934800" version="1" comment="libvarnishapi3 is &lt;7.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934801" version="1" comment="varnish is &lt;7.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934802" version="1" comment="varnish-devel is &lt;7.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934803" version="1" comment="nodejs-electron is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934804" version="1" comment="nodejs-electron-devel is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934805" version="1" comment="nodejs-electron-doc is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934806" version="1" comment="shotcut is &lt;23.11.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934807" version="1" comment="shotcut-lang is &lt;23.11.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934808" version="1" comment="ansible-core is &lt;2.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934809" version="1" comment="ansible-test is &lt;2.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934810" version="1" comment="ansible-documentation is &lt;2.15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934811" version="1" comment="frr is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934812" version="1" comment="frr-devel is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934813" version="1" comment="libfrr0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934814" version="1" comment="libfrr_pb0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934815" version="1" comment="libfrrcares0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934816" version="1" comment="libfrrfpm_pb0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934817" version="1" comment="libfrrospfapiclient0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934818" version="1" comment="libfrrsnmp0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934819" version="1" comment="libfrrzmq0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934820" version="1" comment="libmlag_pb0 is &lt;8.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934821" version="1" comment="python is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934822" version="1" comment="python-32bit is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934823" version="1" comment="python-curses is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934824" version="1" comment="python-demo is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934825" version="1" comment="python-gdbm is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934826" version="1" comment="python-idle is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934827" version="1" comment="python-tk is &lt;2.7.18-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934828" version="1" comment="python310-jupyter-server is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934829" version="1" comment="python310-jupyter-server-test is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934830" version="1" comment="python311-jupyter-server is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934831" version="1" comment="python311-jupyter-server-test is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934832" version="1" comment="python39-jupyter-server is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934833" version="1" comment="python39-jupyter-server-test is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934834" version="1" comment="sudo is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934835" version="1" comment="sudo-devel is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934836" version="1" comment="sudo-plugin-python is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934837" version="1" comment="sudo-policy-sudo-auth-self is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934838" version="1" comment="sudo-policy-wheel-auth-self is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934839" version="1" comment="sudo-test is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934840" version="1" comment="system-group-sudo is &lt;1.9.15p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934841" version="1" comment="go1.20 is &lt;1.20.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934842" version="1" comment="go1.20-doc is &lt;1.20.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934843" version="1" comment="go1.20-libstd is &lt;1.20.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934844" version="1" comment="go1.20-race is &lt;1.20.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934845" version="1" comment="go1.21 is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934846" version="1" comment="go1.21-doc is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934847" version="1" comment="go1.21-libstd is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934848" version="1" comment="go1.21-race is &lt;1.21.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934849" version="1" comment="python310-pydrive2 is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934850" version="1" comment="python311-pydrive2 is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934851" version="1" comment="python39-pydrive2 is &lt;1.16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934852" version="1" comment="libtiff-devel is &lt;4.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934853" version="1" comment="libtiff-devel-32bit is &lt;4.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934854" version="1" comment="libtiff6 is &lt;4.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934855" version="1" comment="libtiff6-32bit is &lt;4.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934856" version="1" comment="tiff is &lt;4.6.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934857" version="1" comment="caddy is &lt;2.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934858" version="1" comment="gio-branding-upstream is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934859" version="1" comment="glib2-devel is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934860" version="1" comment="glib2-devel-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934861" version="1" comment="glib2-devel-static is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934862" version="1" comment="glib2-lang is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934863" version="1" comment="glib2-tests-devel is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934864" version="1" comment="glib2-tools is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934865" version="1" comment="glib2-tools-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934866" version="1" comment="libgio-2_0-0 is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934867" version="1" comment="libgio-2_0-0-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934868" version="1" comment="libglib-2_0-0 is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934869" version="1" comment="libglib-2_0-0-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934870" version="1" comment="libgmodule-2_0-0 is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934871" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934872" version="1" comment="libgobject-2_0-0 is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934873" version="1" comment="libgobject-2_0-0-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934874" version="1" comment="libgthread-2_0-0 is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934875" version="1" comment="libgthread-2_0-0-32bit is &lt;2.78.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934876" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934877" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934878" version="1" comment="liblouis-data is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934879" version="1" comment="liblouis-devel is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934880" version="1" comment="liblouis-doc is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934881" version="1" comment="liblouis-tools is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934882" version="1" comment="liblouis20 is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934883" version="1" comment="python3-louis is &lt;3.25.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934884" version="1" comment="python310-MechanicalSoup is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934885" version="1" comment="python311-MechanicalSoup is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934886" version="1" comment="python39-MechanicalSoup is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934887" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934888" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934889" version="1" comment="librsvg-2-2 is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934890" version="1" comment="librsvg-2-2-32bit is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934891" version="1" comment="librsvg-devel is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934892" version="1" comment="rsvg-convert is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934893" version="1" comment="rsvg-thumbnailer is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934894" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.57.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934895" version="1" comment="fish is &lt;3.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934896" version="1" comment="fish-devel is &lt;3.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934897" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934898" version="1" comment="libheif-aom is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934899" version="1" comment="libheif-dav1d is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934900" version="1" comment="libheif-devel is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934901" version="1" comment="libheif-ffmpeg is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934902" version="1" comment="libheif-jpeg is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934903" version="1" comment="libheif-openjpeg is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934904" version="1" comment="libheif-rav1e is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934905" version="1" comment="libheif-svtenc is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934906" version="1" comment="libheif1 is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934907" version="1" comment="libheif1-32bit is &lt;1.17.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934908" version="1" comment="gnome-shell-search-provider-nautilus is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934909" version="1" comment="libnautilus-extension4 is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934910" version="1" comment="nautilus is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934911" version="1" comment="nautilus-devel is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934912" version="1" comment="nautilus-lang is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934913" version="1" comment="typelib-1_0-Nautilus-4_0 is &lt;45.2.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934914" version="1" comment="freerdp is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934915" version="1" comment="freerdp-devel is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934916" version="1" comment="freerdp-proxy is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934917" version="1" comment="freerdp-server is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934918" version="1" comment="freerdp-wayland is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934919" version="1" comment="libfreerdp2-2 is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934920" version="1" comment="libuwac0-0 is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934921" version="1" comment="libwinpr2-2 is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934922" version="1" comment="uwac0-0-devel is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934923" version="1" comment="winpr-devel is &lt;2.11.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934924" version="1" comment="gstreamer-plugins-bad is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934925" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934926" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934927" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934928" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934929" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934930" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934931" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934932" version="1" comment="gstreamer-transcoder is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934933" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934934" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934935" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934936" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934937" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934938" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934939" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934940" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934941" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934942" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934943" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934944" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934945" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934946" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934947" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934948" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934949" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934950" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934951" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934952" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934953" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934954" version="1" comment="libgstplay-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934955" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934956" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934957" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934958" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934959" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934960" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934961" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934962" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934963" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934964" version="1" comment="libgstva-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934965" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934966" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934967" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934968" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934969" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934970" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934971" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934972" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934973" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934974" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934975" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934976" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934977" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934978" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934979" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934980" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934981" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934982" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934983" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934984" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934985" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934986" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934987" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934988" version="1" comment="traefik is &lt;2.10.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934989" version="1" comment="bluez is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934990" version="1" comment="bluez-auto-enable-devices is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934991" version="1" comment="bluez-cups is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934992" version="1" comment="bluez-deprecated is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934993" version="1" comment="bluez-devel is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934994" version="1" comment="bluez-devel-32bit is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934995" version="1" comment="bluez-obexd is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934996" version="1" comment="bluez-test is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934997" version="1" comment="bluez-zsh-completion is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934998" version="1" comment="libbluetooth3 is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009934999" version="1" comment="libbluetooth3-32bit is &lt;5.70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935000" version="1" comment="budgie-app-launcher-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935001" version="1" comment="budgie-applications-menu-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935002" version="1" comment="budgie-brightness-controller-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935003" version="1" comment="budgie-clockworks-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935004" version="1" comment="budgie-countdown-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935005" version="1" comment="budgie-dropby-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935006" version="1" comment="budgie-extras is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935007" version="1" comment="budgie-extras-daemon is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935008" version="1" comment="budgie-extras-lang is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935009" version="1" comment="budgie-fuzzyclock-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935010" version="1" comment="budgie-hotcorners-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935011" version="1" comment="budgie-kangaroo-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935012" version="1" comment="budgie-keyboard-autoswitch-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935013" version="1" comment="budgie-network-manager-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935014" version="1" comment="budgie-previews is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935015" version="1" comment="budgie-quickchar is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935016" version="1" comment="budgie-quicknote-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935017" version="1" comment="budgie-recentlyused-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935018" version="1" comment="budgie-rotation-lock-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935019" version="1" comment="budgie-showtime-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935020" version="1" comment="budgie-takeabreak-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935021" version="1" comment="budgie-visualspace-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935022" version="1" comment="budgie-wallstreet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935023" version="1" comment="budgie-weathershow-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935024" version="1" comment="budgie-window-shuffler is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935025" version="1" comment="budgie-workspace-stopwatch-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935026" version="1" comment="budgie-workspace-wallpaper-applet is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935027" version="1" comment="curl is &lt;8.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935028" version="1" comment="libcurl-devel is &lt;8.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935029" version="1" comment="libcurl-devel-32bit is &lt;8.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935030" version="1" comment="libcurl4 is &lt;8.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935031" version="1" comment="libcurl4-32bit is &lt;8.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935032" version="1" comment="python3-bandit is &lt;1.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935033" version="1" comment="python312 is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935034" version="1" comment="python312-curses is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935035" version="1" comment="python312-dbm is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935036" version="1" comment="python312-idle is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935037" version="1" comment="python312-tk is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935038" version="1" comment="python312-x86-64-v3 is &lt;3.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935039" version="1" comment="xorg-x11-server is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935040" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935041" version="1" comment="xorg-x11-server-extra is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935042" version="1" comment="xorg-x11-server-sdk is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935043" version="1" comment="xorg-x11-server-source is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935044" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935045" version="1" comment="xwayland is &lt;23.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935046" version="1" comment="xwayland-devel is &lt;23.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935047" version="1" comment="s390-tools is &lt;2.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935048" version="1" comment="python310-asyncssh is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935049" version="1" comment="python311-asyncssh is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935050" version="1" comment="python39-asyncssh is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935051" version="1" comment="libsass-3_6_5-1 is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935052" version="1" comment="libsass-devel is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935053" version="1" comment="openssh is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935054" version="1" comment="openssh-cavs is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935055" version="1" comment="openssh-clients is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935056" version="1" comment="openssh-common is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935057" version="1" comment="openssh-fips is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935058" version="1" comment="openssh-helpers is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935059" version="1" comment="openssh-server is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935060" version="1" comment="openssh-server-config-rootlogin is &lt;9.3p2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935061" version="1" comment="putty is &lt;0.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935062" version="1" comment="MozillaThunderbird is &lt;115.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935063" version="1" comment="MozillaThunderbird-translations-common is &lt;115.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935064" version="1" comment="MozillaThunderbird-translations-other is &lt;115.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935065" version="1" comment="jbigkit is &lt;2.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935066" version="1" comment="libjbig-devel is &lt;2.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935067" version="1" comment="libjbig-devel-32bit is &lt;2.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935068" version="1" comment="libjbig2 is &lt;2.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935069" version="1" comment="libjbig2-32bit is &lt;2.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935070" version="1" comment="jq is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935071" version="1" comment="libjq-devel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935072" version="1" comment="libjq1 is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935073" version="1" comment="libssh2-1 is &lt;1.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935074" version="1" comment="libssh2-1-32bit is &lt;1.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935075" version="1" comment="libssh2-devel is &lt;1.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935076" version="1" comment="python-paramiko-doc is &lt;3.3.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935077" version="1" comment="python310-paramiko is &lt;3.3.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935078" version="1" comment="python311-paramiko is &lt;3.3.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935079" version="1" comment="python39-paramiko is &lt;3.3.1-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935080" version="1" comment="libtinyxml0 is &lt;2.6.2-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935081" version="1" comment="tinyxml-devel is &lt;2.6.2-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935082" version="1" comment="tinyxml-docs is &lt;2.6.2-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935083" version="1" comment="libzbar-devel is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935084" version="1" comment="libzbar0 is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935085" version="1" comment="libzbar0-32bit is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935086" version="1" comment="libzbarqt-devel is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935087" version="1" comment="libzbarqt0 is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935088" version="1" comment="libzbarqt0-32bit is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935089" version="1" comment="python3-zbar is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935090" version="1" comment="zbar is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935091" version="1" comment="zbar-lang is &lt;0.23.90-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935092" version="1" comment="cppcheck is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935093" version="1" comment="cppcheck-gui is &lt;2.12.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935094" version="1" comment="krb5 is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935095" version="1" comment="krb5-32bit is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935096" version="1" comment="krb5-client is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935097" version="1" comment="krb5-devel is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935098" version="1" comment="krb5-devel-32bit is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935099" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935100" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935101" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935102" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935103" version="1" comment="krb5-server is &lt;1.21.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935104" version="1" comment="libcryptopp-devel is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935105" version="1" comment="libcryptopp8_9_0 is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935106" version="1" comment="ppp is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935107" version="1" comment="ppp-devel is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935108" version="1" comment="ppp-modem is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935109" version="1" comment="ssh-audit is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935110" version="1" comment="MozillaFirefox is &lt;121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935111" version="1" comment="MozillaFirefox-branding-upstream is &lt;121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935112" version="1" comment="MozillaFirefox-devel is &lt;121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935113" version="1" comment="MozillaFirefox-translations-common is &lt;121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935114" version="1" comment="MozillaFirefox-translations-other is &lt;121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935115" version="1" comment="nodejs-electron is &lt;27.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935116" version="1" comment="nodejs-electron-devel is &lt;27.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935117" version="1" comment="nodejs-electron-doc is &lt;27.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935118" version="1" comment="cacti is &lt;1.2.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935119" version="1" comment="avif-tools is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935120" version="1" comment="gdk-pixbuf-loader-libavif is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935121" version="1" comment="libavif-devel is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935122" version="1" comment="libavif16 is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935123" version="1" comment="libavif16-32bit is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935124" version="1" comment="zabbix-agent is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935125" version="1" comment="zabbix-java-gateway is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935126" version="1" comment="zabbix-proxy is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935127" version="1" comment="zabbix-proxy-mysql is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935128" version="1" comment="zabbix-proxy-postgresql is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935129" version="1" comment="zabbix-proxy-sqlite is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935130" version="1" comment="zabbix-server is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935131" version="1" comment="zabbix-server-mysql is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935132" version="1" comment="zabbix-server-postgresql is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935133" version="1" comment="zabbix-ui is &lt;6.0.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935134" version="1" comment="deepin-reader is &lt;5.10.23-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935135" version="1" comment="deepin-reader-lang is &lt;5.10.23-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935136" version="1" comment="libdeepin-pdfium1 is &lt;5.10.23-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935137" version="1" comment="cJSON-devel is &lt;1.7.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935138" version="1" comment="libcjson1 is &lt;1.7.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935139" version="1" comment="postfix is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935140" version="1" comment="postfix-devel is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935141" version="1" comment="postfix-doc is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935142" version="1" comment="postfix-ldap is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935143" version="1" comment="postfix-mysql is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935144" version="1" comment="postfix-postgresql is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935145" version="1" comment="proftpd is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935146" version="1" comment="proftpd-devel is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935147" version="1" comment="proftpd-doc is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935148" version="1" comment="proftpd-lang is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935149" version="1" comment="proftpd-ldap is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935150" version="1" comment="proftpd-mysql is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935151" version="1" comment="proftpd-pgsql is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935152" version="1" comment="proftpd-radius is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935153" version="1" comment="proftpd-sqlite is &lt;1.3.8b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935154" version="1" comment="libxerces-c-3_2 is &lt;3.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935155" version="1" comment="libxerces-c-devel is &lt;3.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935156" version="1" comment="xerces-c is &lt;3.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935157" version="1" comment="xerces-c-doc is &lt;3.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935158" version="1" comment="deepin-compressor is &lt;5.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935159" version="1" comment="deepin-compressor-lang is &lt;5.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935160" version="1" comment="cargo-audit-advisory-db is &lt;20231219-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935161" version="1" comment="exim is &lt;4.97.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935162" version="1" comment="eximon is &lt;4.97.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935163" version="1" comment="eximstats-html is &lt;4.97.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935164" version="1" comment="libredwg-devel is &lt;0.12.5.6924-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935165" version="1" comment="libredwg-tools is &lt;0.12.5.6924-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935166" version="1" comment="libredwg0 is &lt;0.12.5.6924-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935167" version="1" comment="liblog4cxx-devel is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935168" version="1" comment="liblog4cxx15 is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935169" version="1" comment="libmosquitto1 is &lt;2.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935170" version="1" comment="libmosquittopp1 is &lt;2.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935171" version="1" comment="mosquitto is &lt;2.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935172" version="1" comment="mosquitto-clients is &lt;2.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935173" version="1" comment="mosquitto-devel is &lt;2.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935175" version="1" comment="kernel-macros is &lt;6.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935176" version="1" comment="kernel-source is &lt;6.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935177" version="1" comment="kernel-source-vanilla is &lt;6.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935178" version="1" comment="ghostscript is &lt;9.56.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935179" version="1" comment="ghostscript-devel is &lt;9.56.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935180" version="1" comment="ghostscript-x11 is &lt;9.56.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935181" version="1" comment="bsdtar is &lt;3.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935182" version="1" comment="libarchive-devel is &lt;3.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935183" version="1" comment="libarchive13 is &lt;3.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935184" version="1" comment="libarchive13-32bit is &lt;3.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935185" version="1" comment="libcryptopp-devel is &lt;8.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935186" version="1" comment="libcryptopp8_9_0 is &lt;8.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935187" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935188" version="1" comment="libheif-aom is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935189" version="1" comment="libheif-dav1d is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935190" version="1" comment="libheif-devel is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935191" version="1" comment="libheif-ffmpeg is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935192" version="1" comment="libheif-jpeg is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935193" version="1" comment="libheif-openjpeg is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935194" version="1" comment="libheif-rav1e is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935195" version="1" comment="libheif-svtenc is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935196" version="1" comment="libheif1 is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935197" version="1" comment="libheif1-32bit is &lt;1.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935198" version="1" comment="libjpeg-turbo is &lt;3.0.1-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935199" version="1" comment="libjpeg8 is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935200" version="1" comment="libjpeg8-32bit is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935201" version="1" comment="libjpeg8-devel is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935202" version="1" comment="libjpeg8-devel-32bit is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935203" version="1" comment="libjpeg8-x86-64-v3 is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935204" version="1" comment="libturbojpeg0 is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935205" version="1" comment="libturbojpeg0-32bit is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935206" version="1" comment="libturbojpeg0-x86-64-v3 is &lt;8.3.2-77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935207" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935208" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935209" version="1" comment="libQt5Concurrent-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935210" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935211" version="1" comment="libQt5Concurrent5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935212" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935213" version="1" comment="libQt5Core-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935214" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935215" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935216" version="1" comment="libQt5Core5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935217" version="1" comment="libQt5Core5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935218" version="1" comment="libQt5DBus-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935219" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935220" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935221" version="1" comment="libQt5DBus5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935222" version="1" comment="libQt5DBus5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935223" version="1" comment="libQt5Gui-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935224" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935225" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935226" version="1" comment="libQt5Gui5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935227" version="1" comment="libQt5Gui5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935228" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935229" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935230" version="1" comment="libQt5Network-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935231" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935232" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935233" version="1" comment="libQt5Network5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935234" version="1" comment="libQt5Network5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935235" version="1" comment="libQt5OpenGL-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935236" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935237" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935238" version="1" comment="libQt5OpenGL5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935239" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935240" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935241" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935242" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935243" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935244" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935245" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935246" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935247" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935248" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935249" version="1" comment="libQt5PrintSupport5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935250" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935251" version="1" comment="libQt5Sql-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935252" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935253" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935254" version="1" comment="libQt5Sql5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935255" version="1" comment="libQt5Sql5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935256" version="1" comment="libQt5Sql5-mysql is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935257" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935258" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935259" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935260" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935261" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935262" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935263" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935264" version="1" comment="libQt5Test-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935265" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935266" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935267" version="1" comment="libQt5Test5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935268" version="1" comment="libQt5Test5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935269" version="1" comment="libQt5Widgets-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935270" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935271" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935272" version="1" comment="libQt5Widgets5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935273" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935274" version="1" comment="libQt5Xml-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935275" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935276" version="1" comment="libQt5Xml5 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935277" version="1" comment="libQt5Xml5-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935278" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935279" version="1" comment="libqt5-qtbase-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935280" version="1" comment="libqt5-qtbase-examples is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935281" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935282" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935283" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935284" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.12+kde147-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935285" version="1" comment="proftpd is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935286" version="1" comment="proftpd-devel is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935287" version="1" comment="proftpd-doc is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935288" version="1" comment="proftpd-lang is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935289" version="1" comment="proftpd-ldap is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935290" version="1" comment="proftpd-mysql is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935291" version="1" comment="proftpd-pgsql is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935292" version="1" comment="proftpd-radius is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935293" version="1" comment="proftpd-sqlite is &lt;1.3.8b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935294" version="1" comment="libQt6Concurrent6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935295" version="1" comment="libQt6Core6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935296" version="1" comment="libQt6DBus6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935297" version="1" comment="libQt6Gui6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935298" version="1" comment="libQt6Network6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935299" version="1" comment="libQt6OpenGL6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935300" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935301" version="1" comment="libQt6PrintSupport6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935302" version="1" comment="libQt6Sql6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935303" version="1" comment="libQt6Test6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935304" version="1" comment="libQt6Widgets6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935305" version="1" comment="libQt6Xml6 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935306" version="1" comment="qt6-base-common-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935307" version="1" comment="qt6-base-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935308" version="1" comment="qt6-base-examples is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935309" version="1" comment="qt6-base-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935310" version="1" comment="qt6-concurrent-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935311" version="1" comment="qt6-core-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935312" version="1" comment="qt6-core-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935313" version="1" comment="qt6-dbus-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935314" version="1" comment="qt6-dbus-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935315" version="1" comment="qt6-docs-common is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935316" version="1" comment="qt6-exampleicons-devel-static is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935317" version="1" comment="qt6-gui-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935318" version="1" comment="qt6-gui-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935319" version="1" comment="qt6-kmssupport-devel-static is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935320" version="1" comment="qt6-kmssupport-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935321" version="1" comment="qt6-network-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935322" version="1" comment="qt6-network-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935323" version="1" comment="qt6-network-tls is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935324" version="1" comment="qt6-networkinformation-glib is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935325" version="1" comment="qt6-networkinformation-nm is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935326" version="1" comment="qt6-opengl-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935327" version="1" comment="qt6-opengl-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935328" version="1" comment="qt6-openglwidgets-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935329" version="1" comment="qt6-platformsupport-devel-static is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935330" version="1" comment="qt6-platformsupport-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935331" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935332" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935333" version="1" comment="qt6-printsupport-cups is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935334" version="1" comment="qt6-printsupport-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935335" version="1" comment="qt6-printsupport-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935336" version="1" comment="qt6-sql-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935337" version="1" comment="qt6-sql-mysql is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935338" version="1" comment="qt6-sql-postgresql is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935339" version="1" comment="qt6-sql-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935340" version="1" comment="qt6-sql-sqlite is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935341" version="1" comment="qt6-sql-unixODBC is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935342" version="1" comment="qt6-test-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935343" version="1" comment="qt6-test-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935344" version="1" comment="qt6-widgets-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935345" version="1" comment="qt6-widgets-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935346" version="1" comment="qt6-xml-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935347" version="1" comment="qt6-xml-private-devel is &lt;6.6.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935348" version="1" comment="libwireshark17 is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935349" version="1" comment="libwiretap14 is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935350" version="1" comment="libwsutil15 is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935351" version="1" comment="wireshark is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935352" version="1" comment="wireshark-devel is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935353" version="1" comment="wireshark-ui-qt is &lt;4.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935354" version="1" comment="gstreamer-plugins-bad is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935355" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935356" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935357" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935358" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935359" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935360" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935361" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935362" version="1" comment="gstreamer-transcoder is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935363" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935364" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935365" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935366" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935367" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935368" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935369" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935370" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935371" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935372" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935373" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935374" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935375" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935376" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935377" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935378" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935379" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935380" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935381" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935382" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935383" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935384" version="1" comment="libgstplay-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935385" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935386" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935387" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935388" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935389" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935390" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935391" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935392" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935393" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935394" version="1" comment="libgstva-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935395" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935396" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935397" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935398" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935399" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935400" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935401" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935402" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935403" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935404" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935405" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935406" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935407" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935408" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935409" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935410" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935411" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935412" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935413" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935414" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935415" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935416" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935417" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935418" version="1" comment="perl-Spreadsheet-ParseExcel is &lt;0.660.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935419" version="1" comment="libnss_slurm2 is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935420" version="1" comment="libpmi0 is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935421" version="1" comment="libslurm39 is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935422" version="1" comment="perl-slurm is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935423" version="1" comment="slurm is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935424" version="1" comment="slurm-auth-none is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935425" version="1" comment="slurm-config is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935426" version="1" comment="slurm-config-man is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935427" version="1" comment="slurm-cray is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935428" version="1" comment="slurm-devel is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935429" version="1" comment="slurm-doc is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935430" version="1" comment="slurm-hdf5 is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935431" version="1" comment="slurm-lua is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935432" version="1" comment="slurm-munge is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935433" version="1" comment="slurm-node is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935434" version="1" comment="slurm-openlava is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935435" version="1" comment="slurm-pam_slurm is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935436" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935437" version="1" comment="slurm-plugins is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935438" version="1" comment="slurm-rest is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935439" version="1" comment="slurm-seff is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935440" version="1" comment="slurm-sjstat is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935441" version="1" comment="slurm-slurmdbd is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935442" version="1" comment="slurm-sql is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935443" version="1" comment="slurm-sview is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935444" version="1" comment="slurm-testsuite is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935445" version="1" comment="slurm-torque is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935446" version="1" comment="slurm-webdoc is &lt;23.02.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935447" version="1" comment="nodejs-electron is &lt;27.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935448" version="1" comment="nodejs-electron-devel is &lt;27.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935449" version="1" comment="nodejs-electron-doc is &lt;27.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935450" version="1" comment="python310-Flask-Security-Too is &lt;5.3.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935451" version="1" comment="python311-Flask-Security-Too is &lt;5.3.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935452" version="1" comment="python39-Flask-Security-Too is &lt;5.3.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935453" version="1" comment="libzipios2 is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935454" version="1" comment="zipios-devel is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935455" version="1" comment="zipios-devel-doc is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935456" version="1" comment="python310-Flask-Security-Too is &lt;5.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935457" version="1" comment="python311-Flask-Security-Too is &lt;5.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935458" version="1" comment="python39-Flask-Security-Too is &lt;5.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935459" version="1" comment="python310-httptools is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935460" version="1" comment="python311-httptools is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935461" version="1" comment="python39-httptools is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935462" version="1" comment="teleport is &lt;14.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935463" version="1" comment="teleport-tbot is &lt;14.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935464" version="1" comment="teleport-tctl is &lt;14.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935465" version="1" comment="teleport-tsh is &lt;14.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935466" version="1" comment="micropython is &lt;1.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935467" version="1" comment="python310-pycryptodome is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935468" version="1" comment="python311-pycryptodome is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935469" version="1" comment="python39-pycryptodome is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935470" version="1" comment="python310-pycryptodomex is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935471" version="1" comment="python311-pycryptodomex is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935472" version="1" comment="python39-pycryptodomex is &lt;3.19.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935473" version="1" comment="rclone is &lt;1.65.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935474" version="1" comment="rclone-bash-completion is &lt;1.65.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935475" version="1" comment="rclone-zsh-completion is &lt;1.65.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935476" version="1" comment="syncthing is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935477" version="1" comment="syncthing-relaysrv is &lt;1.27.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935478" version="1" comment="libopenjp2-7 is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935479" version="1" comment="libopenjp2-7-32bit is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935480" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935481" version="1" comment="openjpeg2 is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935482" version="1" comment="openjpeg2-devel is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935483" version="1" comment="openjpeg2-devel-doc is &lt;2.5.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935484" version="1" comment="redis is &lt;7.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935485" version="1" comment="tracker-miner-files is &lt;3.6.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935486" version="1" comment="tracker-miners is &lt;3.6.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935487" version="1" comment="tracker-miners-lang is &lt;3.6.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935488" version="1" comment="nodejs-electron is &lt;27.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935489" version="1" comment="nodejs-electron-devel is &lt;27.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935490" version="1" comment="nodejs-electron-doc is &lt;27.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935492" version="1" comment="kernel-macros is &lt;6.6.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935493" version="1" comment="kernel-source is &lt;6.6.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935494" version="1" comment="kernel-source-vanilla is &lt;6.6.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935495" version="1" comment="jasper is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935496" version="1" comment="libjasper-devel is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935497" version="1" comment="libjasper7 is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935498" version="1" comment="libjasper7-32bit is &lt;4.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935499" version="1" comment="libpng16-16 is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935500" version="1" comment="libpng16-16-32bit is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935501" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935502" version="1" comment="libpng16-compat-devel is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935503" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935504" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935505" version="1" comment="libpng16-devel is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935506" version="1" comment="libpng16-devel-32bit is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935507" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935508" version="1" comment="libpng16-tools is &lt;1.6.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935509" version="1" comment="libuev-devel is &lt;2.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935510" version="1" comment="libuev3 is &lt;2.4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935511" version="1" comment="ctdb is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935512" version="1" comment="ctdb-pcp-pmda is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935513" version="1" comment="libsamba-policy-devel is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935514" version="1" comment="libsamba-policy-python3-devel is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935515" version="1" comment="libsamba-policy0-python3 is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935516" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935517" version="1" comment="samba is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935518" version="1" comment="samba-ad-dc is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935519" version="1" comment="samba-ad-dc-libs is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935520" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935521" version="1" comment="samba-ceph is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935522" version="1" comment="samba-client is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935523" version="1" comment="samba-client-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935524" version="1" comment="samba-client-libs is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935525" version="1" comment="samba-client-libs-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935526" version="1" comment="samba-devel is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935527" version="1" comment="samba-devel-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935528" version="1" comment="samba-doc is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935529" version="1" comment="samba-dsdb-modules is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935530" version="1" comment="samba-gpupdate is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935531" version="1" comment="samba-ldb-ldap is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935532" version="1" comment="samba-libs is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935533" version="1" comment="samba-libs-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935534" version="1" comment="samba-libs-python3 is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935535" version="1" comment="samba-libs-python3-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935536" version="1" comment="samba-python3 is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935537" version="1" comment="samba-test is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935538" version="1" comment="samba-tool is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935539" version="1" comment="samba-winbind is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935540" version="1" comment="samba-winbind-libs is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935541" version="1" comment="samba-winbind-libs-32bit is &lt;4.19.4+git.339.acf1ccaa020-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935542" version="1" comment="jsch is &lt;0.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935543" version="1" comment="jsch-demo is &lt;0.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935544" version="1" comment="jsch-javadoc is &lt;0.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935545" version="1" comment="python310-Jinja2 is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935546" version="1" comment="python311-Jinja2 is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935547" version="1" comment="python39-Jinja2 is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935548" version="1" comment="SDL2-devel is &lt;2.28.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935549" version="1" comment="SDL2-devel-32bit is &lt;2.28.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935550" version="1" comment="libSDL2-2_0-0 is &lt;2.28.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935551" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.28.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935552" version="1" comment="chromedriver is &lt;120.0.6099.216-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935553" version="1" comment="chromium is &lt;120.0.6099.216-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935554" version="1" comment="perl-Spreadsheet-ParseXLSX is &lt;0.290.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935555" version="1" comment="ungoogled-chromium is &lt;120.0.6099.216-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935556" version="1" comment="ungoogled-chromium-chromedriver is &lt;120.0.6099.216-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935557" version="1" comment="grafana is &lt;10.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935558" version="1" comment="java-17-openjdk is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935559" version="1" comment="java-17-openjdk-demo is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935560" version="1" comment="java-17-openjdk-devel is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935561" version="1" comment="java-17-openjdk-headless is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935562" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935563" version="1" comment="java-17-openjdk-jmods is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935564" version="1" comment="java-17-openjdk-src is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935565" version="1" comment="libebml-devel is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935566" version="1" comment="libebml5 is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935567" version="1" comment="libBasicUsageEnvironment2 is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935568" version="1" comment="libUsageEnvironment3 is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935569" version="1" comment="libgroupsock30 is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935570" version="1" comment="libliveMedia112 is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935571" version="1" comment="live555 is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935572" version="1" comment="live555-devel is &lt;2023.11.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935573" version="1" comment="tomcat is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935574" version="1" comment="tomcat-admin-webapps is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935575" version="1" comment="tomcat-docs-webapp is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935576" version="1" comment="tomcat-el-3_0-api is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935577" version="1" comment="tomcat-embed is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935578" version="1" comment="tomcat-javadoc is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935579" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935580" version="1" comment="tomcat-jsvc is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935581" version="1" comment="tomcat-lib is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935582" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935583" version="1" comment="tomcat-webapps is &lt;9.0.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935584" version="1" comment="chromedriver is &lt;120.0.6099.224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935585" version="1" comment="chromium is &lt;120.0.6099.224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935586" version="1" comment="erlang is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935587" version="1" comment="erlang-debugger is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935588" version="1" comment="erlang-debugger-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935589" version="1" comment="erlang-dialyzer is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935590" version="1" comment="erlang-dialyzer-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935591" version="1" comment="erlang-diameter is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935592" version="1" comment="erlang-diameter-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935593" version="1" comment="erlang-doc is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935594" version="1" comment="erlang-epmd is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935595" version="1" comment="erlang-et is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935596" version="1" comment="erlang-et-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935597" version="1" comment="erlang-jinterface is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935598" version="1" comment="erlang-jinterface-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935599" version="1" comment="erlang-observer is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935600" version="1" comment="erlang-observer-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935601" version="1" comment="erlang-reltool is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935602" version="1" comment="erlang-reltool-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935603" version="1" comment="erlang-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935604" version="1" comment="erlang-wx is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935605" version="1" comment="erlang-wx-src is &lt;26.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935606" version="1" comment="gnutls is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935607" version="1" comment="libgnutls-dane-devel is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935608" version="1" comment="libgnutls-dane0 is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935609" version="1" comment="libgnutls-devel is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935610" version="1" comment="libgnutls-devel-32bit is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935611" version="1" comment="libgnutls30 is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935612" version="1" comment="libgnutls30-32bit is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935613" version="1" comment="libgnutlsxx-devel is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935614" version="1" comment="libgnutlsxx30 is &lt;3.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935615" version="1" comment="java-21-openjdk is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935616" version="1" comment="java-21-openjdk-demo is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935617" version="1" comment="java-21-openjdk-devel is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935618" version="1" comment="java-21-openjdk-headless is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935619" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935620" version="1" comment="java-21-openjdk-jmods is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935621" version="1" comment="java-21-openjdk-src is &lt;21.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935622" version="1" comment="python310-imagecodecs is &lt;2024.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935623" version="1" comment="python311-imagecodecs is &lt;2024.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935624" version="1" comment="python39-imagecodecs is &lt;2024.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935625" version="1" comment="tomcat10 is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935626" version="1" comment="tomcat10-admin-webapps is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935627" version="1" comment="tomcat10-doc is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935628" version="1" comment="tomcat10-docs-webapp is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935629" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935630" version="1" comment="tomcat10-embed is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935631" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935632" version="1" comment="tomcat10-jsvc is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935633" version="1" comment="tomcat10-lib is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935634" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935635" version="1" comment="tomcat10-webapps is &lt;10.1.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935636" version="1" comment="xorg-x11-server is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935637" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935638" version="1" comment="xorg-x11-server-extra is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935639" version="1" comment="xorg-x11-server-sdk is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935640" version="1" comment="xorg-x11-server-source is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935641" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935642" version="1" comment="xwayland is &lt;23.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935643" version="1" comment="xwayland-devel is &lt;23.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935644" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.26.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935645" version="1" comment="nodejs-electron is &lt;27.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935646" version="1" comment="nodejs-electron-devel is &lt;27.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935647" version="1" comment="nodejs-electron-doc is &lt;27.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935648" version="1" comment="jupyter-lsp is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935649" version="1" comment="python310-jupyter-lsp is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935650" version="1" comment="python311-jupyter-lsp is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935651" version="1" comment="python39-jupyter-lsp is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935652" version="1" comment="java-11-openjdk is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935653" version="1" comment="java-11-openjdk-demo is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935654" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935655" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935656" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935657" version="1" comment="java-11-openjdk-jmods is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935658" version="1" comment="java-11-openjdk-src is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935659" version="1" comment="ungoogled-chromium is &lt;120.0.6099.224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935660" version="1" comment="ungoogled-chromium-chromedriver is &lt;120.0.6099.224-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935661" version="1" comment="golang-github-prometheus-prometheus is &lt;2.48.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935662" version="1" comment="jupyter-jupyterlab is &lt;4.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935663" version="1" comment="python310-jupyterlab is &lt;4.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935664" version="1" comment="python311-jupyterlab is &lt;4.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935665" version="1" comment="python39-jupyterlab is &lt;4.0.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935666" version="1" comment="jupyter-notebook is &lt;7.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935667" version="1" comment="python310-notebook is &lt;7.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935668" version="1" comment="python311-notebook is &lt;7.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935669" version="1" comment="python39-notebook is &lt;7.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935670" version="1" comment="jupyter-panel is &lt;1.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935671" version="1" comment="python310-panel is &lt;1.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935672" version="1" comment="python311-panel is &lt;1.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935673" version="1" comment="python39-panel is &lt;1.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935674" version="1" comment="apache-sshd is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935675" version="1" comment="apache-sshd-javadoc is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935676" version="1" comment="openjfx is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935677" version="1" comment="openjfx-devel is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935678" version="1" comment="python310-Mako is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935679" version="1" comment="python311-Mako is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935680" version="1" comment="python39-Mako is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935681" version="1" comment="python310-Pillow is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935682" version="1" comment="python310-Pillow-tk is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935683" version="1" comment="python311-Pillow is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935684" version="1" comment="python311-Pillow-tk is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935685" version="1" comment="python39-Pillow is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935686" version="1" comment="python39-Pillow-tk is &lt;10.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935687" version="1" comment="rear is &lt;2.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935688" version="1" comment="libzstd-devel is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935689" version="1" comment="libzstd-devel-32bit is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935690" version="1" comment="libzstd-devel-static is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935691" version="1" comment="libzstd1 is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935692" version="1" comment="libzstd1-32bit is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935693" version="1" comment="libzstd1-x86-64-v3 is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935694" version="1" comment="zstd is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935695" version="1" comment="zstd-gzip is &lt;1.5.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935696" version="1" comment="atril is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935697" version="1" comment="atril-backends is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935698" version="1" comment="atril-devel is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935699" version="1" comment="atril-doc is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935700" version="1" comment="atril-lang is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935701" version="1" comment="atril-thumbnailer is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935702" version="1" comment="caja-extension-atril is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935703" version="1" comment="libatrildocument3 is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935704" version="1" comment="libatrilview3 is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935705" version="1" comment="typelib-1_0-AtrilDocument-1_5_0 is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935706" version="1" comment="typelib-1_0-AtrilView-1_5_0 is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935707" version="1" comment="etcd is &lt;3.5.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935708" version="1" comment="etcdctl is &lt;3.5.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935709" version="1" comment="etcdutl is &lt;3.5.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935710" version="1" comment="pam is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935711" version="1" comment="pam-32bit is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935712" version="1" comment="pam-devel is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935713" version="1" comment="pam-devel-32bit is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935714" version="1" comment="MozillaThunderbird is &lt;115.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935715" version="1" comment="MozillaThunderbird-translations-common is &lt;115.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935716" version="1" comment="MozillaThunderbird-translations-other is &lt;115.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935717" version="1" comment="coreutils is &lt;9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935718" version="1" comment="coreutils-doc is &lt;9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935719" version="1" comment="coreutils-lang is &lt;9.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935720" version="1" comment="libmspack-devel is &lt;0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935721" version="1" comment="libmspack0 is &lt;0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935722" version="1" comment="libmspack0-32bit is &lt;0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935723" version="1" comment="mspack-examples is &lt;0.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935724" version="1" comment="coredns is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935725" version="1" comment="coredns-extras is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935726" version="1" comment="grpc-devel is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935727" version="1" comment="grpc-source is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935728" version="1" comment="libgrpc++1_60 is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935729" version="1" comment="libgrpc1_60 is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935730" version="1" comment="libgrpc37 is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935731" version="1" comment="libupb37 is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935732" version="1" comment="upb-devel is &lt;1.60.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935733" version="1" comment="mlocate is &lt;0.26-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935734" version="1" comment="mlocate-lang is &lt;0.26-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935735" version="1" comment="libruby3_3-3_3 is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935736" version="1" comment="ruby3.3 is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935737" version="1" comment="ruby3.3-devel is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935738" version="1" comment="ruby3.3-devel-extra is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935739" version="1" comment="ruby3.3-doc is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935740" version="1" comment="ruby3.3-doc-ri is &lt;3.3.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935741" version="1" comment="sevctl is &lt;0.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935742" version="1" comment="libnss_slurm2 is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935743" version="1" comment="libpmi0 is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935744" version="1" comment="libslurm40 is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935745" version="1" comment="perl-slurm is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935746" version="1" comment="slurm is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935747" version="1" comment="slurm-auth-none is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935748" version="1" comment="slurm-config is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935749" version="1" comment="slurm-config-man is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935750" version="1" comment="slurm-cray is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935751" version="1" comment="slurm-devel is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935752" version="1" comment="slurm-doc is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935753" version="1" comment="slurm-lua is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935754" version="1" comment="slurm-munge is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935755" version="1" comment="slurm-node is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935756" version="1" comment="slurm-openlava is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935757" version="1" comment="slurm-pam_slurm is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935758" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935759" version="1" comment="slurm-plugins is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935760" version="1" comment="slurm-rest is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935761" version="1" comment="slurm-seff is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935762" version="1" comment="slurm-sjstat is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935763" version="1" comment="slurm-slurmdbd is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935764" version="1" comment="slurm-sql is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935765" version="1" comment="slurm-sview is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935766" version="1" comment="slurm-testsuite is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935767" version="1" comment="slurm-torque is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935768" version="1" comment="slurm-webdoc is &lt;23.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935769" version="1" comment="MozillaFirefox is &lt;122.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935770" version="1" comment="MozillaFirefox-branding-upstream is &lt;122.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935771" version="1" comment="MozillaFirefox-devel is &lt;122.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935772" version="1" comment="MozillaFirefox-translations-common is &lt;122.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935773" version="1" comment="MozillaFirefox-translations-other is &lt;122.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935774" version="1" comment="libtiff-devel is &lt;4.6.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935775" version="1" comment="libtiff-devel-32bit is &lt;4.6.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935776" version="1" comment="libtiff6 is &lt;4.6.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935777" version="1" comment="libtiff6-32bit is &lt;4.6.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935778" version="1" comment="tiff is &lt;4.6.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935779" version="1" comment="tinyssh is &lt;20240101-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935780" version="1" comment="ghostscript is &lt;10.02.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935781" version="1" comment="ghostscript-devel is &lt;10.02.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935782" version="1" comment="ghostscript-x11 is &lt;10.02.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935783" version="1" comment="python3-salt is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935784" version="1" comment="salt is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935785" version="1" comment="salt-api is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935786" version="1" comment="salt-bash-completion is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935787" version="1" comment="salt-cloud is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935788" version="1" comment="salt-doc is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935789" version="1" comment="salt-fish-completion is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935790" version="1" comment="salt-master is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935791" version="1" comment="salt-minion is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935792" version="1" comment="salt-proxy is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935793" version="1" comment="salt-ssh is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935794" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935795" version="1" comment="salt-syndic is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935796" version="1" comment="salt-tests is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935797" version="1" comment="salt-transactional-update is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935798" version="1" comment="salt-zsh-completion is &lt;3006.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935799" version="1" comment="squid is &lt;6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935800" version="1" comment="libxreaderdocument3 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935801" version="1" comment="libxreaderview3 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935802" version="1" comment="typelib-1_0-XreaderDocument-1_5 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935803" version="1" comment="typelib-1_0-XreaderView-1_5 is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935804" version="1" comment="xreader is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935805" version="1" comment="xreader-devel is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935806" version="1" comment="xreader-lang is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935807" version="1" comment="xreader-plugin-comicsdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935808" version="1" comment="xreader-plugin-djvudocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935809" version="1" comment="xreader-plugin-dvidocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935810" version="1" comment="xreader-plugin-epubdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935811" version="1" comment="xreader-plugin-pdfdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935812" version="1" comment="xreader-plugin-pixbufdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935813" version="1" comment="xreader-plugin-psdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935814" version="1" comment="xreader-plugin-tiffdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935815" version="1" comment="xreader-plugin-xpsdocument is &lt;4.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935816" version="1" comment="libopenssl-3-devel is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935817" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935818" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935819" version="1" comment="libopenssl3 is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935820" version="1" comment="libopenssl3-32bit is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935821" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935822" version="1" comment="openssl-3 is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935823" version="1" comment="openssl-3-doc is &lt;3.1.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935824" version="1" comment="python310-grpcio is &lt;1.60.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935825" version="1" comment="python311-grpcio is &lt;1.60.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935826" version="1" comment="python39-grpcio is &lt;1.60.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935827" version="1" comment="python3-onionshare is &lt;2.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935828" version="1" comment="ansible-core is &lt;2.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935829" version="1" comment="ansible-test is &lt;2.16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935830" version="1" comment="curl is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935831" version="1" comment="libcurl-devel is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935832" version="1" comment="libcurl-devel-32bit is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935833" version="1" comment="libcurl4 is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935834" version="1" comment="libcurl4-32bit is &lt;8.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935835" version="1" comment="libssh-config is &lt;0.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935836" version="1" comment="libssh-devel is &lt;0.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935837" version="1" comment="libssh4 is &lt;0.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935838" version="1" comment="libssh4-32bit is &lt;0.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935839" version="1" comment="libeverest is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935840" version="1" comment="libeverest-x86-64-v3 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935841" version="1" comment="libmbedcrypto15 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935842" version="1" comment="libmbedcrypto15-x86-64-v3 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935843" version="1" comment="libmbedtls20 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935844" version="1" comment="libmbedtls20-x86-64-v3 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935845" version="1" comment="libmbedx509-6 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935846" version="1" comment="libmbedx509-6-x86-64-v3 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935847" version="1" comment="libp256m is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935848" version="1" comment="libp256m-x86-64-v3 is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935849" version="1" comment="mbedtls-devel is &lt;3.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935850" version="1" comment="libmbedcrypto7 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935851" version="1" comment="libmbedcrypto7-x86-64-v3 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935852" version="1" comment="libmbedtls14 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935853" version="1" comment="libmbedtls14-x86-64-v3 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935854" version="1" comment="libmbedx509-1 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935855" version="1" comment="libmbedx509-1-x86-64-v3 is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935856" version="1" comment="mbedtls-2-devel is &lt;2.28.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935857" version="1" comment="nodejs-electron is &lt;27.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935858" version="1" comment="nodejs-electron-devel is &lt;27.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935859" version="1" comment="nodejs-electron-doc is &lt;27.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935860" version="1" comment="python310-aiohttp is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935861" version="1" comment="python311-aiohttp is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935862" version="1" comment="python39-aiohttp is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935863" version="1" comment="python310-uamqp is &lt;1.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935864" version="1" comment="python311-uamqp is &lt;1.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935865" version="1" comment="python39-uamqp is &lt;1.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935866" version="1" comment="runc is &lt;1.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905604" version="1" comment="virtiofsd is &lt;1.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935867" version="1" comment="cosign is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935868" version="1" comment="glibc is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935869" version="1" comment="glibc-devel is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935870" version="1" comment="glibc-devel-static is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935871" version="1" comment="glibc-extra is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935872" version="1" comment="glibc-html is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935873" version="1" comment="glibc-i18ndata is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935874" version="1" comment="glibc-info is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935875" version="1" comment="glibc-lang is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935876" version="1" comment="glibc-locale is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935877" version="1" comment="glibc-locale-base is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935878" version="1" comment="glibc-profile is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935879" version="1" comment="libnsl1 is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935880" version="1" comment="nscd is &lt;2.39-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935881" version="1" comment="xen is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935882" version="1" comment="xen-devel is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935883" version="1" comment="xen-doc-html is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935884" version="1" comment="xen-libs is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935885" version="1" comment="xen-tools is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935886" version="1" comment="xen-tools-domU is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935887" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935888" version="1" comment="gstreamer-plugins-bad is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935889" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935890" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935891" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935892" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935893" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935894" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935895" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935896" version="1" comment="gstreamer-transcoder is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935897" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935898" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935899" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935900" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935901" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935902" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935903" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935904" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935905" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935906" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935907" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935908" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935909" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935910" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935911" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935912" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935913" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935914" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935915" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935916" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935917" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935918" version="1" comment="libgstplay-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935919" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935920" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935921" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935922" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935923" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935924" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935925" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935926" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935927" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935928" version="1" comment="libgstva-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935929" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935930" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935931" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935932" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935933" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935934" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935935" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935936" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935937" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935938" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935939" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935940" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935941" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935942" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935943" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935944" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935945" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935946" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935947" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935948" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935949" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935950" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935951" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935952" version="1" comment="python3-salt is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935953" version="1" comment="salt is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935954" version="1" comment="salt-api is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935955" version="1" comment="salt-bash-completion is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935956" version="1" comment="salt-cloud is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935957" version="1" comment="salt-doc is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935958" version="1" comment="salt-fish-completion is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935959" version="1" comment="salt-master is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935960" version="1" comment="salt-minion is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935961" version="1" comment="salt-proxy is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935962" version="1" comment="salt-ssh is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935963" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935964" version="1" comment="salt-syndic is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935965" version="1" comment="salt-tests is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935966" version="1" comment="salt-transactional-update is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935967" version="1" comment="salt-zsh-completion is &lt;3006.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935968" version="1" comment="buildkit is &lt;0.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935969" version="1" comment="rekor is &lt;1.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935970" version="1" comment="cpio is &lt;2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935971" version="1" comment="cpio-lang is &lt;2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935972" version="1" comment="cpio-mt is &lt;2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935973" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935974" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935975" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935976" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935977" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935978" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935979" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935980" version="1" comment="libnetpbm-devel is &lt;11.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935981" version="1" comment="libnetpbm11 is &lt;11.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935982" version="1" comment="libnetpbm11-32bit is &lt;11.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935983" version="1" comment="netpbm is &lt;11.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935984" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935985" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935986" version="1" comment="libopenssl10 is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935987" version="1" comment="libopenssl1_0_0 is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935988" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935989" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935990" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935991" version="1" comment="openssl-1_0_0 is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935992" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935993" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2u-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935994" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935995" version="1" comment="libovn-23_03-0 is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935996" version="1" comment="openvswitch is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935997" version="1" comment="openvswitch-devel is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935998" version="1" comment="openvswitch-doc is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009935999" version="1" comment="openvswitch-ipsec is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936000" version="1" comment="openvswitch-pki is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936001" version="1" comment="openvswitch-test is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936002" version="1" comment="openvswitch-vtep is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936003" version="1" comment="ovn is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936004" version="1" comment="ovn-central is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936005" version="1" comment="ovn-devel is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936006" version="1" comment="ovn-doc is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936007" version="1" comment="ovn-docker is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936008" version="1" comment="ovn-host is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936009" version="1" comment="ovn-vtep is &lt;23.03.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936010" version="1" comment="python3-ovs is &lt;3.1.0-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936011" version="1" comment="libmilter-doc is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936012" version="1" comment="libmilter1_0 is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936013" version="1" comment="rmail is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936014" version="1" comment="sendmail is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936015" version="1" comment="sendmail-devel is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936016" version="1" comment="sendmail-starttls is &lt;8.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936017" version="1" comment="axis is &lt;1.4-307.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936018" version="1" comment="axis-manual is &lt;1.4-307.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936020" version="1" comment="kernel-macros is &lt;6.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936021" version="1" comment="kernel-source is &lt;6.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936022" version="1" comment="kernel-source-vanilla is &lt;6.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936023" version="1" comment="libgit2-1_7 is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936024" version="1" comment="libgit2-devel is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936025" version="1" comment="libgit2-tools is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936026" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936027" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936028" version="1" comment="libopenssl1_1 is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936029" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936030" version="1" comment="openssl-1_1 is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936031" version="1" comment="openssl-1_1-doc is &lt;1.1.1w-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936032" version="1" comment="libopenssl-3-devel is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936033" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936034" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936035" version="1" comment="libopenssl3 is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936036" version="1" comment="libopenssl3-32bit is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936037" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936038" version="1" comment="openssl-3 is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936039" version="1" comment="openssl-3-doc is &lt;3.1.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936040" version="1" comment="python310-python-multipart is &lt;0.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936041" version="1" comment="python311-python-multipart is &lt;0.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936042" version="1" comment="python312-python-multipart is &lt;0.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936043" version="1" comment="python39-python-multipart is &lt;0.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936044" version="1" comment="libsystemd0 is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936045" version="1" comment="libsystemd0-32bit is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936046" version="1" comment="libudev1 is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936047" version="1" comment="libudev1-32bit is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936048" version="1" comment="systemd is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936049" version="1" comment="systemd-32bit is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936050" version="1" comment="systemd-boot is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936051" version="1" comment="systemd-container is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936052" version="1" comment="systemd-coredump is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936053" version="1" comment="systemd-devel is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936054" version="1" comment="systemd-doc is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936055" version="1" comment="systemd-experimental is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936056" version="1" comment="systemd-homed is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936057" version="1" comment="systemd-journal-remote is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936058" version="1" comment="systemd-lang is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936059" version="1" comment="systemd-network is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936060" version="1" comment="systemd-portable is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936061" version="1" comment="systemd-sysvcompat is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936062" version="1" comment="systemd-testsuite is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936063" version="1" comment="udev is &lt;254.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936064" version="1" comment="gsasl is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936065" version="1" comment="gsasl-devel is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936066" version="1" comment="gsasl-lang is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936067" version="1" comment="libgsasl18 is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936068" version="1" comment="pgadmin4 is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936069" version="1" comment="pgadmin4-cloud is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936070" version="1" comment="pgadmin4-desktop is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936071" version="1" comment="pgadmin4-doc is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936072" version="1" comment="pgadmin4-web-uwsgi is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936073" version="1" comment="system-user-pgadmin is &lt;8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936074" version="1" comment="postgresql12 is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936075" version="1" comment="postgresql12-contrib is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936076" version="1" comment="postgresql12-devel is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936077" version="1" comment="postgresql12-docs is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936078" version="1" comment="postgresql12-llvmjit is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936079" version="1" comment="postgresql12-llvmjit-devel is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936080" version="1" comment="postgresql12-plperl is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936081" version="1" comment="postgresql12-plpython is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936082" version="1" comment="postgresql12-pltcl is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936083" version="1" comment="postgresql12-server is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936084" version="1" comment="postgresql12-server-devel is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936085" version="1" comment="postgresql12-test is &lt;12.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936086" version="1" comment="postgresql13 is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936087" version="1" comment="postgresql13-contrib is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936088" version="1" comment="postgresql13-devel is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936089" version="1" comment="postgresql13-docs is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936090" version="1" comment="postgresql13-llvmjit is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936091" version="1" comment="postgresql13-llvmjit-devel is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936092" version="1" comment="postgresql13-plperl is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936093" version="1" comment="postgresql13-plpython is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936094" version="1" comment="postgresql13-pltcl is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936095" version="1" comment="postgresql13-server is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936096" version="1" comment="postgresql13-server-devel is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936097" version="1" comment="postgresql13-test is &lt;13.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936098" version="1" comment="postgresql14 is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936099" version="1" comment="postgresql14-contrib is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936100" version="1" comment="postgresql14-devel is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936101" version="1" comment="postgresql14-docs is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936102" version="1" comment="postgresql14-llvmjit is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936103" version="1" comment="postgresql14-llvmjit-devel is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936104" version="1" comment="postgresql14-plperl is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936105" version="1" comment="postgresql14-plpython is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936106" version="1" comment="postgresql14-pltcl is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936107" version="1" comment="postgresql14-server is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936108" version="1" comment="postgresql14-server-devel is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936109" version="1" comment="postgresql14-test is &lt;14.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936110" version="1" comment="postgresql15 is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936111" version="1" comment="postgresql15-contrib is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936112" version="1" comment="postgresql15-devel is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936113" version="1" comment="postgresql15-docs is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936114" version="1" comment="postgresql15-llvmjit is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936115" version="1" comment="postgresql15-llvmjit-devel is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936116" version="1" comment="postgresql15-plperl is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936117" version="1" comment="postgresql15-plpython is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936118" version="1" comment="postgresql15-pltcl is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936119" version="1" comment="postgresql15-server is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936120" version="1" comment="postgresql15-server-devel is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936121" version="1" comment="postgresql15-test is &lt;15.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936122" version="1" comment="libecpg6 is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936123" version="1" comment="libecpg6-32bit is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936124" version="1" comment="libpq5 is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936125" version="1" comment="libpq5-32bit is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936126" version="1" comment="postgresql16 is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936127" version="1" comment="postgresql16-contrib is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936128" version="1" comment="postgresql16-devel is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936129" version="1" comment="postgresql16-docs is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936130" version="1" comment="postgresql16-llvmjit is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936131" version="1" comment="postgresql16-llvmjit-devel is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936132" version="1" comment="postgresql16-plperl is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936133" version="1" comment="postgresql16-plpython is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936134" version="1" comment="postgresql16-pltcl is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936135" version="1" comment="postgresql16-server is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936136" version="1" comment="postgresql16-server-devel is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936137" version="1" comment="postgresql16-test is &lt;16.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936138" version="1" comment="python310-Django is &lt;4.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936139" version="1" comment="python311-Django is &lt;4.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936140" version="1" comment="python312-Django is &lt;4.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936141" version="1" comment="python39-Django is &lt;4.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936142" version="1" comment="python310-oletools is &lt;0.60.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936143" version="1" comment="python311-oletools is &lt;0.60.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936144" version="1" comment="python312-oletools is &lt;0.60.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936145" version="1" comment="python39-oletools is &lt;0.60.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936146" version="1" comment="libgit2-1_7 is &lt;1.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936147" version="1" comment="libgit2-devel is &lt;1.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936148" version="1" comment="libgit2-tools is &lt;1.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905480" version="1" comment="libxml2-2 is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936149" version="1" comment="libxml2-2-32bit is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936150" version="1" comment="libxml2-devel is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936151" version="1" comment="libxml2-devel-32bit is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936152" version="1" comment="libxml2-doc is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905481" version="1" comment="libxml2-tools is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936153" version="1" comment="java-11-openj9 is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936154" version="1" comment="java-11-openj9-demo is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936155" version="1" comment="java-11-openj9-devel is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936156" version="1" comment="java-11-openj9-headless is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936157" version="1" comment="java-11-openj9-javadoc is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936158" version="1" comment="java-11-openj9-jmods is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936159" version="1" comment="java-11-openj9-src is &lt;11.0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936160" version="1" comment="java-17-openj9 is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936161" version="1" comment="java-17-openj9-demo is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936162" version="1" comment="java-17-openj9-devel is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936163" version="1" comment="java-17-openj9-headless is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936164" version="1" comment="java-17-openj9-javadoc is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936165" version="1" comment="java-17-openj9-jmods is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936166" version="1" comment="java-17-openj9-src is &lt;17.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936167" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936168" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936169" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936170" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936171" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936172" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936173" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936174" version="1" comment="pdns-recursor is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936175" version="1" comment="php-composer2 is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936176" version="1" comment="python310-uamqp is &lt;1.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936177" version="1" comment="python311-uamqp is &lt;1.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936178" version="1" comment="python39-uamqp is &lt;1.6.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936179" version="1" comment="libIex-3_1-30-32bit is &lt;3.1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936180" version="1" comment="libIex-3_2-31 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936181" version="1" comment="libIlmThread-3_1-30-32bit is &lt;3.1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936182" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936183" version="1" comment="libOpenEXR-3_1-30-32bit is &lt;3.1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936184" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936185" version="1" comment="libOpenEXRCore-3_1-30-32bit is &lt;3.1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936186" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936187" version="1" comment="libOpenEXRUtil-3_1-30-32bit is &lt;3.1.11-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936188" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936189" version="1" comment="openexr is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936190" version="1" comment="openexr-devel is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936191" version="1" comment="openexr-doc is &lt;3.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936192" version="1" comment="python310-fastapi is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936193" version="1" comment="python311-fastapi is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936194" version="1" comment="python312-fastapi is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936195" version="1" comment="python39-fastapi is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936196" version="1" comment="hugin is &lt;2023.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936197" version="1" comment="python310-FontTools is &lt;4.47.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936198" version="1" comment="python311-FontTools is &lt;4.47.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936199" version="1" comment="python312-FontTools is &lt;4.47.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936200" version="1" comment="python39-FontTools is &lt;4.47.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936201" version="1" comment="bind is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936202" version="1" comment="bind-doc is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936203" version="1" comment="bind-modules-bdbhpt is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936204" version="1" comment="bind-modules-generic is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936205" version="1" comment="bind-modules-ldap is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936206" version="1" comment="bind-modules-mysql is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936207" version="1" comment="bind-modules-perl is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936208" version="1" comment="bind-modules-sqlite3 is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936209" version="1" comment="bind-utils is &lt;9.18.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936210" version="1" comment="buildkit is &lt;0.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936211" version="1" comment="docker is &lt;24.0.7_ce-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936212" version="1" comment="docker-bash-completion is &lt;24.0.7_ce-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936213" version="1" comment="docker-fish-completion is &lt;24.0.7_ce-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936214" version="1" comment="docker-rootless-extras is &lt;24.0.7_ce-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936215" version="1" comment="docker-zsh-completion is &lt;24.0.7_ce-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936216" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936217" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936218" version="1" comment="libQt5Concurrent-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936219" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936220" version="1" comment="libQt5Concurrent5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936221" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936222" version="1" comment="libQt5Core-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936223" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936224" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936225" version="1" comment="libQt5Core5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936226" version="1" comment="libQt5Core5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936227" version="1" comment="libQt5DBus-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936228" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936229" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936230" version="1" comment="libQt5DBus5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936231" version="1" comment="libQt5DBus5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936232" version="1" comment="libQt5Gui-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936233" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936234" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936235" version="1" comment="libQt5Gui5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936236" version="1" comment="libQt5Gui5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936237" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936238" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936239" version="1" comment="libQt5Network-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936240" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936241" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936242" version="1" comment="libQt5Network5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936243" version="1" comment="libQt5Network5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936244" version="1" comment="libQt5OpenGL-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936245" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936246" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936247" version="1" comment="libQt5OpenGL5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936248" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936249" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936250" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936251" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936252" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936253" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936254" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936255" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936256" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936257" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936258" version="1" comment="libQt5PrintSupport5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936259" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936260" version="1" comment="libQt5Sql-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936261" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936262" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936263" version="1" comment="libQt5Sql5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936264" version="1" comment="libQt5Sql5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936265" version="1" comment="libQt5Sql5-mysql is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936266" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936267" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936268" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936269" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936270" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936271" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936272" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936273" version="1" comment="libQt5Test-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936274" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936275" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936276" version="1" comment="libQt5Test5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936277" version="1" comment="libQt5Test5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936278" version="1" comment="libQt5Widgets-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936279" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936280" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936281" version="1" comment="libQt5Widgets5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936282" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936283" version="1" comment="libQt5Xml-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936284" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936285" version="1" comment="libQt5Xml5 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936286" version="1" comment="libQt5Xml5-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936287" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936288" version="1" comment="libqt5-qtbase-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936289" version="1" comment="libqt5-qtbase-examples is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936290" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936291" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936292" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936293" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.12+kde151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936294" version="1" comment="python310-aiohttp is &lt;3.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936295" version="1" comment="python311-aiohttp is &lt;3.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936296" version="1" comment="python312-aiohttp is &lt;3.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936297" version="1" comment="python39-aiohttp is &lt;3.9.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936298" version="1" comment="tomcat is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936299" version="1" comment="tomcat-admin-webapps is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936300" version="1" comment="tomcat-docs-webapp is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936301" version="1" comment="tomcat-el-3_0-api is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936302" version="1" comment="tomcat-embed is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936303" version="1" comment="tomcat-javadoc is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936304" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936305" version="1" comment="tomcat-jsvc is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936306" version="1" comment="tomcat-lib is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936307" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936308" version="1" comment="tomcat-webapps is &lt;9.0.85-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936309" version="1" comment="tomcat10 is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936310" version="1" comment="tomcat10-admin-webapps is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936311" version="1" comment="tomcat10-doc is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936312" version="1" comment="tomcat10-docs-webapp is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936313" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936314" version="1" comment="tomcat10-embed is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936315" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936316" version="1" comment="tomcat10-jsvc is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936317" version="1" comment="tomcat10-lib is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936318" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936319" version="1" comment="tomcat10-webapps is &lt;10.1.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936320" version="1" comment="wpa_supplicant is &lt;2.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936321" version="1" comment="wpa_supplicant-gui is &lt;2.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936322" version="1" comment="expat is &lt;2.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936323" version="1" comment="libexpat-devel is &lt;2.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936324" version="1" comment="libexpat-devel-32bit is &lt;2.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936325" version="1" comment="libexpat1 is &lt;2.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936326" version="1" comment="libexpat1-32bit is &lt;2.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936328" version="1" comment="kernel-macros is &lt;6.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936329" version="1" comment="kernel-source is &lt;6.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936330" version="1" comment="kernel-source-vanilla is &lt;6.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936331" version="1" comment="corepack20 is &lt;20.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936332" version="1" comment="nodejs20 is &lt;20.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936333" version="1" comment="nodejs20-devel is &lt;20.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936334" version="1" comment="nodejs20-docs is &lt;20.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936335" version="1" comment="npm20 is &lt;20.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936336" version="1" comment="corepack21 is &lt;21.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936337" version="1" comment="nodejs21 is &lt;21.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936338" version="1" comment="nodejs21-devel is &lt;21.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936339" version="1" comment="nodejs21-docs is &lt;21.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936340" version="1" comment="npm21 is &lt;21.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936341" version="1" comment="apache2-mod_auth_openidc is &lt;2.4.15.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936342" version="1" comment="indent is &lt;2.2.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936343" version="1" comment="indent-lang is &lt;2.2.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936344" version="1" comment="nginx is &lt;1.25.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936345" version="1" comment="nginx-source is &lt;1.25.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936346" version="1" comment="apache-commons-compress is &lt;1.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936347" version="1" comment="apache-commons-compress-javadoc is &lt;1.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936348" version="1" comment="dav1d is &lt;1.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936349" version="1" comment="dav1d-devel is &lt;1.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936350" version="1" comment="libdav1d7 is &lt;1.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936351" version="1" comment="libdav1d7-32bit is &lt;1.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936353" version="1" comment="kernel-source-longterm is &lt;6.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936354" version="1" comment="qemu is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936355" version="1" comment="qemu-SLOF is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936356" version="1" comment="qemu-accel-qtest is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936357" version="1" comment="qemu-accel-tcg-x86 is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936358" version="1" comment="qemu-arm is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936359" version="1" comment="qemu-audio-alsa is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936360" version="1" comment="qemu-audio-dbus is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936361" version="1" comment="qemu-audio-jack is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936362" version="1" comment="qemu-audio-oss is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936363" version="1" comment="qemu-audio-pa is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936364" version="1" comment="qemu-audio-pipewire is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936365" version="1" comment="qemu-audio-spice is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936366" version="1" comment="qemu-block-curl is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936367" version="1" comment="qemu-block-dmg is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936368" version="1" comment="qemu-block-gluster is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936369" version="1" comment="qemu-block-iscsi is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936370" version="1" comment="qemu-block-nfs is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936371" version="1" comment="qemu-block-rbd is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936372" version="1" comment="qemu-block-ssh is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936373" version="1" comment="qemu-chardev-baum is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936374" version="1" comment="qemu-chardev-spice is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936375" version="1" comment="qemu-doc is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936376" version="1" comment="qemu-extra is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936377" version="1" comment="qemu-guest-agent is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936378" version="1" comment="qemu-headless is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936379" version="1" comment="qemu-hw-display-qxl is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936380" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936381" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936382" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936383" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936384" version="1" comment="qemu-hw-usb-host is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936385" version="1" comment="qemu-hw-usb-redirect is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936386" version="1" comment="qemu-hw-usb-smartcard is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936387" version="1" comment="qemu-img is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936388" version="1" comment="qemu-ipxe is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936389" version="1" comment="qemu-ivshmem-tools is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936390" version="1" comment="qemu-ksm is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936391" version="1" comment="qemu-lang is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936392" version="1" comment="qemu-microvm is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936393" version="1" comment="qemu-ppc is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936394" version="1" comment="qemu-pr-helper is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936395" version="1" comment="qemu-s390x is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936396" version="1" comment="qemu-seabios is &lt;8.2.11.16.3_3_ga95067eb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936397" version="1" comment="qemu-skiboot is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936398" version="1" comment="qemu-spice is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936399" version="1" comment="qemu-tools is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936400" version="1" comment="qemu-ui-curses is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936401" version="1" comment="qemu-ui-dbus is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936402" version="1" comment="qemu-ui-gtk is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936403" version="1" comment="qemu-ui-opengl is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936404" version="1" comment="qemu-ui-spice-app is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936405" version="1" comment="qemu-ui-spice-core is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936406" version="1" comment="qemu-vgabios is &lt;8.2.11.16.3_3_ga95067eb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936407" version="1" comment="qemu-vhost-user-gpu is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936408" version="1" comment="qemu-x86 is &lt;8.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936409" version="1" comment="libhtp-devel is &lt;0.5.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936410" version="1" comment="libhtp2 is &lt;0.5.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936411" version="1" comment="dnsmasq is &lt;2.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936412" version="1" comment="dnsmasq-utils is &lt;2.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936413" version="1" comment="helm is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936414" version="1" comment="helm-bash-completion is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936415" version="1" comment="helm-fish-completion is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936416" version="1" comment="helm-zsh-completion is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936417" version="1" comment="nodejs-electron is &lt;27.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936418" version="1" comment="nodejs-electron-devel is &lt;27.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936419" version="1" comment="nodejs-electron-doc is &lt;27.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936420" version="1" comment="python310-cryptography is &lt;42.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936421" version="1" comment="python311-cryptography is &lt;42.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936422" version="1" comment="python312-cryptography is &lt;42.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936423" version="1" comment="python39-cryptography is &lt;42.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936424" version="1" comment="MozillaThunderbird is &lt;115.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936425" version="1" comment="MozillaThunderbird-translations-common is &lt;115.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936426" version="1" comment="MozillaThunderbird-translations-other is &lt;115.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936427" version="1" comment="gifsicle is &lt;1.95-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936428" version="1" comment="grafana is &lt;10.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936429" version="1" comment="helm is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936430" version="1" comment="helm-bash-completion is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936431" version="1" comment="helm-fish-completion is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936432" version="1" comment="helm-zsh-completion is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936433" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936434" version="1" comment="kubernetes1.23-client is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936435" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936436" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936437" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936438" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936439" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936440" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936441" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936442" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936443" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936444" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936445" version="1" comment="kubernetes1.24-client is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936446" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936447" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936448" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936449" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936450" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936451" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936452" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936453" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936454" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936455" version="1" comment="kubernetes1.25-apiserver is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936456" version="1" comment="kubernetes1.25-client is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936457" version="1" comment="kubernetes1.25-client-bash-completion is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936458" version="1" comment="kubernetes1.25-client-common is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936459" version="1" comment="kubernetes1.25-client-fish-completion is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936460" version="1" comment="kubernetes1.25-controller-manager is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936461" version="1" comment="kubernetes1.25-kubeadm is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936462" version="1" comment="kubernetes1.25-kubelet is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936463" version="1" comment="kubernetes1.25-kubelet-common is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936464" version="1" comment="kubernetes1.25-proxy is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936465" version="1" comment="kubernetes1.25-scheduler is &lt;1.25.16-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936466" version="1" comment="kubernetes1.26-apiserver is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936467" version="1" comment="kubernetes1.26-client is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936468" version="1" comment="kubernetes1.26-client-bash-completion is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936469" version="1" comment="kubernetes1.26-client-common is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936470" version="1" comment="kubernetes1.26-client-fish-completion is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936471" version="1" comment="kubernetes1.26-controller-manager is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936472" version="1" comment="kubernetes1.26-kubeadm is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936473" version="1" comment="kubernetes1.26-kubelet is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936474" version="1" comment="kubernetes1.26-kubelet-common is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936475" version="1" comment="kubernetes1.26-proxy is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936476" version="1" comment="kubernetes1.26-scheduler is &lt;1.26.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936477" version="1" comment="ruby3.3-rubygem-json_pure is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936478" version="1" comment="ruby3.3-rubygem-puma is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936479" version="1" comment="ruby3.3-rubygem-puma-5 is &lt;5.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936480" version="1" comment="c-ares-devel is &lt;1.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936481" version="1" comment="c-ares-utils is &lt;1.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936482" version="1" comment="libcares2 is &lt;1.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936483" version="1" comment="libcares2-32bit is &lt;1.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936484" version="1" comment="giflib-devel is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936485" version="1" comment="giflib-devel-32bit is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936486" version="1" comment="giflib-progs is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936487" version="1" comment="libgif7 is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936488" version="1" comment="libgif7-32bit is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936489" version="1" comment="jetty-annotations is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936490" version="1" comment="jetty-ant is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936491" version="1" comment="jetty-cdi is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936492" version="1" comment="jetty-client is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936493" version="1" comment="jetty-continuation is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936494" version="1" comment="jetty-deploy is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936495" version="1" comment="jetty-fcgi is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936496" version="1" comment="jetty-http is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936497" version="1" comment="jetty-http-spi is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936498" version="1" comment="jetty-io is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936499" version="1" comment="jetty-jaas is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936500" version="1" comment="jetty-jmx is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936501" version="1" comment="jetty-jndi is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936502" version="1" comment="jetty-jsp is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936503" version="1" comment="jetty-minimal-javadoc is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936504" version="1" comment="jetty-openid is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936505" version="1" comment="jetty-plus is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936506" version="1" comment="jetty-proxy is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936507" version="1" comment="jetty-quickstart is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936508" version="1" comment="jetty-rewrite is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936509" version="1" comment="jetty-security is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936510" version="1" comment="jetty-server is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936511" version="1" comment="jetty-servlet is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936512" version="1" comment="jetty-servlets is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936513" version="1" comment="jetty-start is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936514" version="1" comment="jetty-util is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936515" version="1" comment="jetty-util-ajax is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936516" version="1" comment="jetty-webapp is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936517" version="1" comment="jetty-xml is &lt;9.4.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936518" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936519" version="1" comment="libovn-23_03-0 is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936520" version="1" comment="openvswitch is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936521" version="1" comment="openvswitch-devel is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936522" version="1" comment="openvswitch-doc is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936523" version="1" comment="openvswitch-ipsec is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936524" version="1" comment="openvswitch-pki is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936525" version="1" comment="openvswitch-test is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936526" version="1" comment="openvswitch-vtep is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936527" version="1" comment="ovn is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936528" version="1" comment="ovn-central is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936529" version="1" comment="ovn-devel is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936530" version="1" comment="ovn-doc is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936531" version="1" comment="ovn-docker is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936532" version="1" comment="ovn-host is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936533" version="1" comment="ovn-vtep is &lt;23.03.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936534" version="1" comment="python3-ovs is &lt;3.1.0-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936535" version="1" comment="ruby3.3-rubygem-rack is &lt;3.0.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936536" version="1" comment="ruby3.3-rubygem-rack-2.2 is &lt;2.2.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936537" version="1" comment="MozillaFirefox is &lt;123.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936538" version="1" comment="MozillaFirefox-branding-upstream is &lt;123.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936539" version="1" comment="MozillaFirefox-devel is &lt;123.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936540" version="1" comment="MozillaFirefox-translations-common is &lt;123.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936541" version="1" comment="MozillaFirefox-translations-other is &lt;123.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936542" version="1" comment="python310-uamqp is &lt;1.6.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936543" version="1" comment="python311-uamqp is &lt;1.6.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936544" version="1" comment="python39-uamqp is &lt;1.6.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936545" version="1" comment="dav1d is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936546" version="1" comment="dav1d-devel is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936547" version="1" comment="libdav1d7 is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936548" version="1" comment="libdav1d7-32bit is &lt;1.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936549" version="1" comment="exiv2 is &lt;0.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936550" version="1" comment="exiv2-lang is &lt;0.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936551" version="1" comment="libexiv2-28 is &lt;0.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936552" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936553" version="1" comment="libexiv2-devel is &lt;0.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936554" version="1" comment="libmodsecurity3 is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936555" version="1" comment="modsecurity is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936556" version="1" comment="modsecurity-devel is &lt;3.0.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905497" version="1" comment="opensc is &lt;0.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936557" version="1" comment="postgresql-jdbc is &lt;42.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936558" version="1" comment="postgresql-jdbc-javadoc is &lt;42.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936559" version="1" comment="python310-orjson is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936560" version="1" comment="python311-orjson is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936561" version="1" comment="python312-orjson is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936562" version="1" comment="python39-orjson is &lt;3.9.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936563" version="1" comment="python38 is &lt;3.8.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936564" version="1" comment="python38-curses is &lt;3.8.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936565" version="1" comment="python38-dbm is &lt;3.8.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936566" version="1" comment="python38-idle is &lt;3.8.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936567" version="1" comment="python38-tk is &lt;3.8.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936568" version="1" comment="glade is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936569" version="1" comment="glade-docs is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936570" version="1" comment="glade-lang is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936571" version="1" comment="libgladeui-2-13 is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936572" version="1" comment="libgladeui-2-devel is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936573" version="1" comment="typelib-1_0-Gladeui-2_0 is &lt;3.40.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936574" version="1" comment="nodejs-electron is &lt;28.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936575" version="1" comment="nodejs-electron-devel is &lt;28.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936576" version="1" comment="nodejs-electron-doc is &lt;28.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936577" version="1" comment="python310 is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936578" version="1" comment="python310-32bit is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936579" version="1" comment="python310-curses is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936580" version="1" comment="python310-dbm is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936581" version="1" comment="python310-idle is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936582" version="1" comment="python310-tk is &lt;3.10.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936583" version="1" comment="python311 is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936584" version="1" comment="python311-32bit is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936585" version="1" comment="python311-curses is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936586" version="1" comment="python311-dbm is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936587" version="1" comment="python311-idle is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936588" version="1" comment="python311-tk is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936589" version="1" comment="python311-x86-64-v3 is &lt;3.11.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936590" version="1" comment="python39 is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936591" version="1" comment="python39-32bit is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936592" version="1" comment="python39-curses is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936593" version="1" comment="python39-dbm is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936594" version="1" comment="python39-idle is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936595" version="1" comment="python39-tk is &lt;3.9.18-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936596" version="1" comment="libunbound8 is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936597" version="1" comment="python3-unbound is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936598" version="1" comment="unbound is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936599" version="1" comment="unbound-anchor is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936600" version="1" comment="unbound-devel is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936601" version="1" comment="unbound-munin is &lt;1.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936602" version="1" comment="xmlgraphics-batik is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936603" version="1" comment="xmlgraphics-batik-css is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936604" version="1" comment="xmlgraphics-batik-demo is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936605" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936606" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936607" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936608" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936609" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936610" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936611" version="1" comment="python312 is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936612" version="1" comment="python312-32bit is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936613" version="1" comment="python312-curses is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936614" version="1" comment="python312-dbm is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936615" version="1" comment="python312-idle is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936616" version="1" comment="python312-tk is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936617" version="1" comment="python312-x86-64-v3 is &lt;3.12.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936618" version="1" comment="xen is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936619" version="1" comment="xen-devel is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936620" version="1" comment="xen-doc-html is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936621" version="1" comment="xen-libs is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936622" version="1" comment="xen-tools is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936623" version="1" comment="xen-tools-domU is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936624" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.0_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936625" version="1" comment="libzzip-0-13 is &lt;0.13.72-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936626" version="1" comment="libzzip-0-13-32bit is &lt;0.13.72-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936627" version="1" comment="zziplib-devel is &lt;0.13.72-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936628" version="1" comment="zziplib-devel-32bit is &lt;0.13.72-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936629" version="1" comment="caja-engrampa is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936630" version="1" comment="engrampa is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936631" version="1" comment="engrampa-lang is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936632" version="1" comment="libopenjp2-7 is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936633" version="1" comment="libopenjp2-7-32bit is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936634" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936635" version="1" comment="openjpeg2 is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936636" version="1" comment="openjpeg2-devel is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936637" version="1" comment="openjpeg2-devel-doc is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936638" version="1" comment="python310-Django is &lt;4.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936639" version="1" comment="python311-Django is &lt;4.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936640" version="1" comment="python312-Django is &lt;4.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936641" version="1" comment="python39-Django is &lt;4.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936642" version="1" comment="rabbitmq-java-client is &lt;5.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936643" version="1" comment="rabbitmq-java-client-javadoc is &lt;5.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936644" version="1" comment="tar is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936645" version="1" comment="tar-backup-scripts is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936646" version="1" comment="tar-doc is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936647" version="1" comment="tar-lang is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936648" version="1" comment="tar-rmt is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936649" version="1" comment="tar-tests is &lt;1.35-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936650" version="1" comment="go1.22 is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936651" version="1" comment="go1.22-doc is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936652" version="1" comment="go1.22-libstd is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936653" version="1" comment="go1.22-race is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936654" version="1" comment="MozillaThunderbird is &lt;115.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936655" version="1" comment="MozillaThunderbird-translations-common is &lt;115.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936656" version="1" comment="MozillaThunderbird-translations-other is &lt;115.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936657" version="1" comment="crun is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936658" version="1" comment="fontforge is &lt;20230101-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936659" version="1" comment="fontforge-devel is &lt;20230101-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936660" version="1" comment="fontforge-doc is &lt;20230101-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936661" version="1" comment="go1.21 is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936662" version="1" comment="go1.21-doc is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936663" version="1" comment="go1.21-libstd is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936664" version="1" comment="go1.21-race is &lt;1.21.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936665" version="1" comment="squid is &lt;6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936666" version="1" comment="chromedriver is &lt;121.0.6167.184-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936667" version="1" comment="chromium is &lt;121.0.6167.184-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936668" version="1" comment="libvirt is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936669" version="1" comment="libvirt-client is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936670" version="1" comment="libvirt-client-qemu is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936671" version="1" comment="libvirt-daemon is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936672" version="1" comment="libvirt-daemon-common is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936673" version="1" comment="libvirt-daemon-config-network is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936674" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936675" version="1" comment="libvirt-daemon-driver-interface is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936676" version="1" comment="libvirt-daemon-driver-libxl is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936677" version="1" comment="libvirt-daemon-driver-lxc is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936678" version="1" comment="libvirt-daemon-driver-network is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936679" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936680" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936681" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936682" version="1" comment="libvirt-daemon-driver-secret is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936683" version="1" comment="libvirt-daemon-driver-storage is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936684" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936685" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936686" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936687" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936688" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936689" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936690" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936691" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936692" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936693" version="1" comment="libvirt-daemon-hooks is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936694" version="1" comment="libvirt-daemon-lock is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936695" version="1" comment="libvirt-daemon-log is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936696" version="1" comment="libvirt-daemon-lxc is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936697" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936698" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936699" version="1" comment="libvirt-daemon-proxy is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936700" version="1" comment="libvirt-daemon-qemu is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936701" version="1" comment="libvirt-daemon-xen is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936702" version="1" comment="libvirt-devel is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936703" version="1" comment="libvirt-doc is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936704" version="1" comment="libvirt-libs is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936705" version="1" comment="libvirt-nss is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936706" version="1" comment="wireshark-plugin-libvirt is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936707" version="1" comment="perl-Spreadsheet-ParseXLSX is &lt;0.310.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936708" version="1" comment="graphviz is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936709" version="1" comment="graphviz-devel is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936710" version="1" comment="graphviz-plugins-core is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936711" version="1" comment="libcdt5 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936712" version="1" comment="libcgraph6 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936713" version="1" comment="libgvc6 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936714" version="1" comment="libgvpr2 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936715" version="1" comment="liblab_gamut1 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936716" version="1" comment="libpathplan4 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936717" version="1" comment="libxdot4 is &lt;2.49.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936718" version="1" comment="libunbound8 is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936719" version="1" comment="python3-unbound is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936720" version="1" comment="unbound is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936721" version="1" comment="unbound-anchor is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936722" version="1" comment="unbound-devel is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936723" version="1" comment="unbound-munin is &lt;1.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936724" version="1" comment="clojure is &lt;1.11.2.1446-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936725" version="1" comment="chromedriver is &lt;122.0.6261.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936726" version="1" comment="chromium is &lt;122.0.6261.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936727" version="1" comment="opensc is &lt;0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936728" version="1" comment="opensc-bash-completion is &lt;0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936729" version="1" comment="ungoogled-chromium is &lt;122.0.6261.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936730" version="1" comment="ungoogled-chromium-chromedriver is &lt;122.0.6261.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936732" version="1" comment="kernel-macros is &lt;6.7.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936733" version="1" comment="kernel-source is &lt;6.7.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936734" version="1" comment="kernel-source-vanilla is &lt;6.7.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936735" version="1" comment="python310-rpyc is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936736" version="1" comment="python311-rpyc is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936737" version="1" comment="python312-rpyc is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936738" version="1" comment="python39-rpyc is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936739" version="1" comment="ucode-intel is &lt;20240312-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936740" version="1" comment="Bottles is &lt;51.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936741" version="1" comment="Bottles-lang is &lt;51.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936742" version="1" comment="chromedriver is &lt;122.0.6261.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936743" version="1" comment="chromium is &lt;122.0.6261.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936744" version="1" comment="jsch-agent-proxy-connector-factory is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936745" version="1" comment="jsch-agent-proxy-core is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936746" version="1" comment="jsch-agent-proxy-javadoc is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936747" version="1" comment="jsch-agent-proxy-jsch is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936748" version="1" comment="jsch-agent-proxy-pageant is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936749" version="1" comment="jsch-agent-proxy-sshagent is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936750" version="1" comment="jsch-agent-proxy-usocket-jna is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936751" version="1" comment="jsch-agent-proxy-usocket-nc is &lt;0.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936752" version="1" comment="nodejs-electron is &lt;28.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936753" version="1" comment="nodejs-electron-devel is &lt;28.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936754" version="1" comment="nodejs-electron-doc is &lt;28.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936755" version="1" comment="python310-aiosmtpd is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936756" version="1" comment="python311-aiosmtpd is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936757" version="1" comment="python312-aiosmtpd is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936758" version="1" comment="python39-aiosmtpd is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936759" version="1" comment="libQt6Concurrent6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936760" version="1" comment="libQt6Core6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936761" version="1" comment="libQt6DBus6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936762" version="1" comment="libQt6Gui6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936763" version="1" comment="libQt6Network6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936764" version="1" comment="libQt6OpenGL6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936765" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936766" version="1" comment="libQt6PrintSupport6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936767" version="1" comment="libQt6Sql6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936768" version="1" comment="libQt6Test6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936769" version="1" comment="libQt6Widgets6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936770" version="1" comment="libQt6Xml6 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936771" version="1" comment="qt6-base-common-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936772" version="1" comment="qt6-base-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936773" version="1" comment="qt6-base-examples is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936774" version="1" comment="qt6-base-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936775" version="1" comment="qt6-concurrent-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936776" version="1" comment="qt6-core-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936777" version="1" comment="qt6-core-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936778" version="1" comment="qt6-dbus-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936779" version="1" comment="qt6-dbus-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936780" version="1" comment="qt6-docs-common is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936781" version="1" comment="qt6-exampleicons-devel-static is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936782" version="1" comment="qt6-gui-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936783" version="1" comment="qt6-gui-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936784" version="1" comment="qt6-kmssupport-devel-static is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936785" version="1" comment="qt6-kmssupport-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936786" version="1" comment="qt6-network-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936787" version="1" comment="qt6-network-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936788" version="1" comment="qt6-network-tls is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936789" version="1" comment="qt6-networkinformation-glib is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936790" version="1" comment="qt6-networkinformation-nm is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936791" version="1" comment="qt6-opengl-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936792" version="1" comment="qt6-opengl-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936793" version="1" comment="qt6-openglwidgets-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936794" version="1" comment="qt6-platformsupport-devel-static is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936795" version="1" comment="qt6-platformsupport-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936796" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936797" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936798" version="1" comment="qt6-printsupport-cups is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936799" version="1" comment="qt6-printsupport-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936800" version="1" comment="qt6-printsupport-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936801" version="1" comment="qt6-sql-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936802" version="1" comment="qt6-sql-mysql is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936803" version="1" comment="qt6-sql-postgresql is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936804" version="1" comment="qt6-sql-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936805" version="1" comment="qt6-sql-sqlite is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936806" version="1" comment="qt6-sql-unixODBC is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936807" version="1" comment="qt6-test-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936808" version="1" comment="qt6-test-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936809" version="1" comment="qt6-widgets-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936810" version="1" comment="qt6-widgets-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936811" version="1" comment="qt6-xml-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936812" version="1" comment="qt6-xml-private-devel is &lt;6.6.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936813" version="1" comment="trilead-ssh2 is &lt;217.293.v56de4d4d3515-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936814" version="1" comment="trilead-ssh2-javadoc is &lt;217.293.v56de4d4d3515-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936815" version="1" comment="ungoogled-chromium is &lt;122.0.6261.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936816" version="1" comment="ungoogled-chromium-chromedriver is &lt;122.0.6261.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936817" version="1" comment="cmctl is &lt;1.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936818" version="1" comment="expat is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936819" version="1" comment="libexpat-devel is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936820" version="1" comment="libexpat-devel-32bit is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936821" version="1" comment="libexpat1 is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936822" version="1" comment="libexpat1-32bit is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936823" version="1" comment="python310-python-rapidjson is &lt;1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936824" version="1" comment="python311-python-rapidjson is &lt;1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936825" version="1" comment="python312-python-rapidjson is &lt;1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936826" version="1" comment="python39-python-rapidjson is &lt;1.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936827" version="1" comment="rclone is &lt;1.66.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936828" version="1" comment="rclone-bash-completion is &lt;1.66.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936829" version="1" comment="rclone-zsh-completion is &lt;1.66.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936830" version="1" comment="teleport is &lt;15.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936831" version="1" comment="teleport-tbot is &lt;15.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936832" version="1" comment="teleport-tctl is &lt;15.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936833" version="1" comment="teleport-tsh is &lt;15.1.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936834" version="1" comment="python310-black is &lt;24.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936835" version="1" comment="python311-black is &lt;24.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936836" version="1" comment="python312-black is &lt;24.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936837" version="1" comment="python39-black is &lt;24.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936838" version="1" comment="buildah is &lt;1.35.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936840" version="1" comment="kernel-macros is &lt;6.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936841" version="1" comment="kernel-source is &lt;6.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936842" version="1" comment="kernel-source-vanilla is &lt;6.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936843" version="1" comment="eclipse-contributor-tools is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936844" version="1" comment="eclipse-equinox-osgi is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936845" version="1" comment="eclipse-jdt is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936846" version="1" comment="eclipse-p2-discovery is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936847" version="1" comment="eclipse-pde is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936848" version="1" comment="eclipse-platform is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936849" version="1" comment="eclipse-swt is &lt;4.15-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936850" version="1" comment="eclipse-emf-core is &lt;2.22.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936851" version="1" comment="eclipse-emf-runtime is &lt;2.22.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936852" version="1" comment="eclipse-emf-sdk is &lt;2.22.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936853" version="1" comment="eclipse-emf-xsd is &lt;2.22.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936854" version="1" comment="ini4j is &lt;0.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936855" version="1" comment="ini4j-javadoc is &lt;0.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936856" version="1" comment="MozillaThunderbird is &lt;115.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936857" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936858" version="1" comment="MozillaThunderbird-translations-common is &lt;115.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936859" version="1" comment="MozillaThunderbird-translations-other is &lt;115.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936860" version="1" comment="python38 is &lt;3.8.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936861" version="1" comment="python38-curses is &lt;3.8.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936862" version="1" comment="python38-dbm is &lt;3.8.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936863" version="1" comment="python38-idle is &lt;3.8.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936864" version="1" comment="python38-tk is &lt;3.8.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936865" version="1" comment="apache-commons-configuration2 is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936866" version="1" comment="apache-commons-configuration2-javadoc is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936867" version="1" comment="diffoscope is &lt;261-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936868" version="1" comment="libfreebl3 is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936869" version="1" comment="libfreebl3-32bit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936870" version="1" comment="libsoftokn3 is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936871" version="1" comment="libsoftokn3-32bit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936872" version="1" comment="mozilla-nss is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936873" version="1" comment="mozilla-nss-32bit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936874" version="1" comment="mozilla-nss-certs is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936875" version="1" comment="mozilla-nss-certs-32bit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936876" version="1" comment="mozilla-nss-devel is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936877" version="1" comment="mozilla-nss-sysinit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936878" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936879" version="1" comment="mozilla-nss-tools is &lt;3.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936880" version="1" comment="python311 is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936881" version="1" comment="python311-32bit is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936882" version="1" comment="python311-curses is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936883" version="1" comment="python311-dbm is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936884" version="1" comment="python311-idle is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936885" version="1" comment="python311-tk is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936886" version="1" comment="python311-x86-64-v3 is &lt;3.11.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936887" version="1" comment="MozillaFirefox is &lt;124.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936888" version="1" comment="MozillaFirefox-branding-upstream is &lt;124.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936889" version="1" comment="MozillaFirefox-devel is &lt;124.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936890" version="1" comment="MozillaFirefox-translations-common is &lt;124.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936891" version="1" comment="MozillaFirefox-translations-other is &lt;124.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936892" version="1" comment="libvirt is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936893" version="1" comment="libvirt-client is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936894" version="1" comment="libvirt-client-qemu is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936895" version="1" comment="libvirt-daemon is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936896" version="1" comment="libvirt-daemon-common is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936897" version="1" comment="libvirt-daemon-config-network is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936898" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936899" version="1" comment="libvirt-daemon-driver-interface is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936900" version="1" comment="libvirt-daemon-driver-libxl is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936901" version="1" comment="libvirt-daemon-driver-lxc is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936902" version="1" comment="libvirt-daemon-driver-network is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936903" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936904" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936905" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936906" version="1" comment="libvirt-daemon-driver-secret is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936907" version="1" comment="libvirt-daemon-driver-storage is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936908" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936909" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936910" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936911" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936912" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936913" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936914" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936915" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936916" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936917" version="1" comment="libvirt-daemon-hooks is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936918" version="1" comment="libvirt-daemon-lock is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936919" version="1" comment="libvirt-daemon-log is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936920" version="1" comment="libvirt-daemon-lxc is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936921" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936922" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936923" version="1" comment="libvirt-daemon-proxy is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936924" version="1" comment="libvirt-daemon-qemu is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936925" version="1" comment="libvirt-daemon-xen is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936926" version="1" comment="libvirt-devel is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936927" version="1" comment="libvirt-doc is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936928" version="1" comment="libvirt-libs is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936929" version="1" comment="libvirt-nss is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936930" version="1" comment="wireshark-plugin-libvirt is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936931" version="1" comment="python310-astropy is &lt;6.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936932" version="1" comment="python311-astropy is &lt;6.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936933" version="1" comment="python312-astropy is &lt;6.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936934" version="1" comment="python39-astropy is &lt;6.0.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936935" version="1" comment="python310-jwcrypto is &lt;1.5.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936936" version="1" comment="python311-jwcrypto is &lt;1.5.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936937" version="1" comment="python312-jwcrypto is &lt;1.5.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936938" version="1" comment="python39-jwcrypto is &lt;1.5.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936939" version="1" comment="python310 is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936940" version="1" comment="python310-32bit is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936941" version="1" comment="python310-curses is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936942" version="1" comment="python310-dbm is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936943" version="1" comment="python310-idle is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936944" version="1" comment="python310-tk is &lt;3.10.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936945" version="1" comment="python39 is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936946" version="1" comment="python39-32bit is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936947" version="1" comment="python39-curses is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936948" version="1" comment="python39-dbm is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936949" version="1" comment="python39-idle is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936950" version="1" comment="python39-tk is &lt;3.9.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936951" version="1" comment="xen is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936952" version="1" comment="xen-devel is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936953" version="1" comment="xen-doc-html is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936954" version="1" comment="xen-libs is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936955" version="1" comment="xen-tools is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936956" version="1" comment="xen-tools-domU is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936957" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936958" version="1" comment="python-Scrapy-doc is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936959" version="1" comment="python310-Scrapy is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936960" version="1" comment="python311-Scrapy is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936961" version="1" comment="python312-Scrapy is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936962" version="1" comment="python39-Scrapy is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936963" version="1" comment="libonnx is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936964" version="1" comment="libonnx_proto is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936965" version="1" comment="onnx-backend-test is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936966" version="1" comment="onnx-devel is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936967" version="1" comment="python310-onnx is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936968" version="1" comment="python311-onnx is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936969" version="1" comment="python312-onnx is &lt;1.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936970" version="1" comment="avahi is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936971" version="1" comment="avahi-autoipd is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936972" version="1" comment="avahi-compat-howl-devel is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936973" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936974" version="1" comment="avahi-lang is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936975" version="1" comment="avahi-utils is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936976" version="1" comment="libavahi-client3 is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936977" version="1" comment="libavahi-client3-32bit is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936978" version="1" comment="libavahi-common3 is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936979" version="1" comment="libavahi-common3-32bit is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936980" version="1" comment="libavahi-core7 is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936981" version="1" comment="libavahi-devel is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936982" version="1" comment="libavahi-libevent1 is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936983" version="1" comment="libdns_sd is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936984" version="1" comment="libdns_sd-32bit is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936985" version="1" comment="libhowl0 is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936986" version="1" comment="python310-avahi is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936987" version="1" comment="python311-avahi is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936988" version="1" comment="python312-avahi is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936989" version="1" comment="python39-avahi is &lt;0.8-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936990" version="1" comment="curl is &lt;8.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936991" version="1" comment="libcurl-devel is &lt;8.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936992" version="1" comment="libcurl-devel-32bit is &lt;8.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936993" version="1" comment="libcurl4 is &lt;8.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936994" version="1" comment="libcurl4-32bit is &lt;8.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936995" version="1" comment="gnutls is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936996" version="1" comment="libgnutls-dane-devel is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936997" version="1" comment="libgnutls-dane0 is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936998" version="1" comment="libgnutls-devel is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009936999" version="1" comment="libgnutls-devel-32bit is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937000" version="1" comment="libgnutls-devel-doc is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937001" version="1" comment="libgnutls30 is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937002" version="1" comment="libgnutls30-32bit is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937003" version="1" comment="libgnutlsxx-devel is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937004" version="1" comment="libgnutlsxx30 is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937005" version="1" comment="ovmf is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937006" version="1" comment="ovmf-tools is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937007" version="1" comment="qemu-ovmf-ia32 is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937008" version="1" comment="qemu-ovmf-x86_64 is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937009" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937010" version="1" comment="qemu-uefi-aarch32 is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937011" version="1" comment="qemu-uefi-aarch64 is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937012" version="1" comment="qemu-uefi-riscv64 is &lt;202308-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937013" version="1" comment="libqpid-proton-core10 is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937014" version="1" comment="libqpid-proton-cpp12 is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937015" version="1" comment="libqpid-proton-proactor1 is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937016" version="1" comment="libqpid-proton11 is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937017" version="1" comment="python310-python-qpid-proton is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937018" version="1" comment="python311-python-qpid-proton is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937019" version="1" comment="python312-python-qpid-proton is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937020" version="1" comment="python39-python-qpid-proton is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937021" version="1" comment="qpid-proton-devel is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937022" version="1" comment="qpid-proton-devel-doc is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937023" version="1" comment="qpid-proton-test is &lt;0.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937024" version="1" comment="libwireshark17 is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937025" version="1" comment="libwiretap14 is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937026" version="1" comment="libwsutil15 is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937027" version="1" comment="wireshark is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937028" version="1" comment="wireshark-devel is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937029" version="1" comment="wireshark-ui-qt is &lt;4.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937030" version="1" comment="nodejs-electron is &lt;28.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937031" version="1" comment="nodejs-electron-devel is &lt;28.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937032" version="1" comment="nodejs-electron-doc is &lt;28.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937033" version="1" comment="python310-validators is &lt;0.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937034" version="1" comment="python311-validators is &lt;0.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937035" version="1" comment="python312-validators is &lt;0.24.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937036" version="1" comment="etcd is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937037" version="1" comment="etcdctl is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937038" version="1" comment="etcdutl is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937039" version="1" comment="libmbedcrypto7 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937040" version="1" comment="libmbedcrypto7-x86-64-v3 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937041" version="1" comment="libmbedtls14 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937042" version="1" comment="libmbedtls14-x86-64-v3 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937043" version="1" comment="libmbedx509-1 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937044" version="1" comment="libmbedx509-1-x86-64-v3 is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937045" version="1" comment="mbedtls-2-devel is &lt;2.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937046" version="1" comment="buildah is &lt;1.35.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937047" version="1" comment="freerdp is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937048" version="1" comment="freerdp-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937049" version="1" comment="freerdp-proxy is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937050" version="1" comment="freerdp-proxy-plugins is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937051" version="1" comment="freerdp-sdl is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937052" version="1" comment="freerdp-server is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937053" version="1" comment="freerdp-wayland is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937054" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937055" version="1" comment="libfreerdp3-3 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937056" version="1" comment="librdtk0-0 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937057" version="1" comment="libuwac0-0 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937058" version="1" comment="libwinpr3-3 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937059" version="1" comment="rdtk0-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937060" version="1" comment="uwac0-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937061" version="1" comment="winpr-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937062" version="1" comment="freerdp2-devel is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937063" version="1" comment="freerdp2-proxy is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937064" version="1" comment="freerdp2-server is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937065" version="1" comment="libfreerdp2-2 is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937066" version="1" comment="libwinpr2-2 is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937067" version="1" comment="winpr2-devel is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937069" version="1" comment="kernel-macros is &lt;6.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937070" version="1" comment="kernel-source is &lt;6.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937071" version="1" comment="kernel-source-vanilla is &lt;6.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937072" version="1" comment="libuv-devel is &lt;1.48.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937073" version="1" comment="libuv1 is &lt;1.48.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937074" version="1" comment="libuv1-32bit is &lt;1.48.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937075" version="1" comment="python310-cryptography is &lt;42.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937076" version="1" comment="python311-cryptography is &lt;42.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937077" version="1" comment="python312-cryptography is &lt;42.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937078" version="1" comment="python310-numpy is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937079" version="1" comment="python310-numpy-devel is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937080" version="1" comment="python311-numpy is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937081" version="1" comment="python311-numpy-devel is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937082" version="1" comment="python312-numpy is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937083" version="1" comment="python312-numpy-devel is &lt;1.26.2-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937084" version="1" comment="python310-pyzmq is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937085" version="1" comment="python310-pyzmq-devel is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937086" version="1" comment="python311-pyzmq is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937087" version="1" comment="python311-pyzmq-devel is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937088" version="1" comment="python312-pyzmq is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937089" version="1" comment="python312-pyzmq-devel is &lt;25.1.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937090" version="1" comment="go1.21 is &lt;1.21.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937091" version="1" comment="go1.21-doc is &lt;1.21.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937092" version="1" comment="go1.21-libstd is &lt;1.21.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937093" version="1" comment="go1.21-race is &lt;1.21.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937094" version="1" comment="go1.22 is &lt;1.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937095" version="1" comment="go1.22-doc is &lt;1.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937096" version="1" comment="go1.22-libstd is &lt;1.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937097" version="1" comment="go1.22-race is &lt;1.22.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937098" version="1" comment="kubeseal is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937099" version="1" comment="libnghttp2-14 is &lt;1.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937100" version="1" comment="libnghttp2-14-32bit is &lt;1.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937101" version="1" comment="libnghttp2-devel is &lt;1.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937102" version="1" comment="nghttp2 is &lt;1.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937103" version="1" comment="podman is &lt;5.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937104" version="1" comment="podman-docker is &lt;5.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937105" version="1" comment="podman-remote is &lt;5.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937106" version="1" comment="podmansh is &lt;5.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937107" version="1" comment="python310-Pillow is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937108" version="1" comment="python310-Pillow-tk is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937109" version="1" comment="python311-Pillow is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937110" version="1" comment="python311-Pillow-tk is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937111" version="1" comment="python312-Pillow is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937112" version="1" comment="python312-Pillow-tk is &lt;10.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937113" version="1" comment="xorg-x11-server is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937114" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937115" version="1" comment="xorg-x11-server-extra is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937116" version="1" comment="xorg-x11-server-sdk is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937117" version="1" comment="xorg-x11-server-source is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937118" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937119" version="1" comment="xwayland is &lt;23.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937120" version="1" comment="xwayland-devel is &lt;23.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937121" version="1" comment="system-user-velociraptor is &lt;1.0.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937122" version="1" comment="velociraptor is &lt;0.7.0.4.git74.3426c0a-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937123" version="1" comment="grafana is &lt;10.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937124" version="1" comment="tomcat is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937125" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937126" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937127" version="1" comment="tomcat-el-3_0-api is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937128" version="1" comment="tomcat-embed is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937129" version="1" comment="tomcat-javadoc is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937130" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937131" version="1" comment="tomcat-jsvc is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937132" version="1" comment="tomcat-lib is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937133" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937134" version="1" comment="tomcat-webapps is &lt;9.0.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937135" version="1" comment="tomcat10 is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937136" version="1" comment="tomcat10-admin-webapps is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937137" version="1" comment="tomcat10-doc is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937138" version="1" comment="tomcat10-docs-webapp is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937139" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937140" version="1" comment="tomcat10-embed is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937141" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937142" version="1" comment="tomcat10-jsvc is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937143" version="1" comment="tomcat10-lib is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937144" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937145" version="1" comment="tomcat10-webapps is &lt;10.1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937146" version="1" comment="etcd-for-k8s1.27 is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937147" version="1" comment="etcd-for-k8s1.28 is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937148" version="1" comment="etcd-for-k8s1.29 is &lt;3.5.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937149" version="1" comment="forgejo is &lt;1.21.10+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937150" version="1" comment="forgejo-apparmor is &lt;1.21.10+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937151" version="1" comment="forgejo-selinux is &lt;1.21.10+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937152" version="1" comment="kubernetes1.26-apiserver is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937153" version="1" comment="kubernetes1.26-client is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937154" version="1" comment="kubernetes1.26-client-bash-completion is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937155" version="1" comment="kubernetes1.26-client-common is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937156" version="1" comment="kubernetes1.26-client-fish-completion is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937157" version="1" comment="kubernetes1.26-controller-manager is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937158" version="1" comment="kubernetes1.26-kubeadm is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937159" version="1" comment="kubernetes1.26-kubelet is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937160" version="1" comment="kubernetes1.26-kubelet-common is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937161" version="1" comment="kubernetes1.26-proxy is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937162" version="1" comment="kubernetes1.26-scheduler is &lt;1.26.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937163" version="1" comment="kubernetes1.27-apiserver is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937164" version="1" comment="kubernetes1.27-client is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937165" version="1" comment="kubernetes1.27-client-bash-completion is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937166" version="1" comment="kubernetes1.27-client-common is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937167" version="1" comment="kubernetes1.27-client-fish-completion is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937168" version="1" comment="kubernetes1.27-controller-manager is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937169" version="1" comment="kubernetes1.27-kubeadm is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937170" version="1" comment="kubernetes1.27-kubelet is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937171" version="1" comment="kubernetes1.27-kubelet-common is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937172" version="1" comment="kubernetes1.27-proxy is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937173" version="1" comment="kubernetes1.27-scheduler is &lt;1.27.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937174" version="1" comment="kubernetes1.28-apiserver is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937175" version="1" comment="kubernetes1.28-client is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937176" version="1" comment="kubernetes1.28-client-bash-completion is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937177" version="1" comment="kubernetes1.28-client-common is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937178" version="1" comment="kubernetes1.28-client-fish-completion is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937179" version="1" comment="kubernetes1.28-controller-manager is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937180" version="1" comment="kubernetes1.28-kubeadm is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937181" version="1" comment="kubernetes1.28-kubelet is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937182" version="1" comment="kubernetes1.28-kubelet-common is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937183" version="1" comment="kubernetes1.28-proxy is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937184" version="1" comment="kubernetes1.28-scheduler is &lt;1.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937185" version="1" comment="kubernetes1.29-apiserver is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937186" version="1" comment="kubernetes1.29-client is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937187" version="1" comment="kubernetes1.29-client-bash-completion is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937188" version="1" comment="kubernetes1.29-client-common is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937189" version="1" comment="kubernetes1.29-client-fish-completion is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937190" version="1" comment="kubernetes1.29-controller-manager is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937191" version="1" comment="kubernetes1.29-kubeadm is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937192" version="1" comment="kubernetes1.29-kubelet is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937193" version="1" comment="kubernetes1.29-kubelet-common is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937194" version="1" comment="kubernetes1.29-proxy is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937195" version="1" comment="kubernetes1.29-scheduler is &lt;1.29.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937196" version="1" comment="openssh is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937197" version="1" comment="openssh-cavs is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937198" version="1" comment="openssh-clients is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937199" version="1" comment="openssh-common is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937200" version="1" comment="openssh-fips is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937201" version="1" comment="openssh-helpers is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937202" version="1" comment="openssh-server is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937203" version="1" comment="openssh-server-config-rootlogin is &lt;9.6p1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937204" version="1" comment="pgadmin4 is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937205" version="1" comment="pgadmin4-cloud is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937206" version="1" comment="pgadmin4-desktop is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937207" version="1" comment="pgadmin4-doc is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937208" version="1" comment="pgadmin4-web-uwsgi is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937209" version="1" comment="system-user-pgadmin is &lt;8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937210" version="1" comment="libQt6Concurrent6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937211" version="1" comment="libQt6Core6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937212" version="1" comment="libQt6DBus6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937213" version="1" comment="libQt6Gui6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937214" version="1" comment="libQt6Network6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937215" version="1" comment="libQt6OpenGL6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937216" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937217" version="1" comment="libQt6PrintSupport6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937218" version="1" comment="libQt6Sql6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937219" version="1" comment="libQt6Test6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937220" version="1" comment="libQt6Widgets6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937221" version="1" comment="libQt6Xml6 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937222" version="1" comment="qt6-base-common-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937223" version="1" comment="qt6-base-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937224" version="1" comment="qt6-base-examples is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937225" version="1" comment="qt6-base-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937226" version="1" comment="qt6-concurrent-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937227" version="1" comment="qt6-core-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937228" version="1" comment="qt6-core-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937229" version="1" comment="qt6-dbus-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937230" version="1" comment="qt6-dbus-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937231" version="1" comment="qt6-docs-common is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937232" version="1" comment="qt6-exampleicons-devel-static is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937233" version="1" comment="qt6-gui-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937234" version="1" comment="qt6-gui-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937235" version="1" comment="qt6-kmssupport-devel-static is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937236" version="1" comment="qt6-kmssupport-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937237" version="1" comment="qt6-network-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937238" version="1" comment="qt6-network-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937239" version="1" comment="qt6-network-tls is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937240" version="1" comment="qt6-networkinformation-glib is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937241" version="1" comment="qt6-networkinformation-nm is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937242" version="1" comment="qt6-opengl-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937243" version="1" comment="qt6-opengl-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937244" version="1" comment="qt6-openglwidgets-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937245" version="1" comment="qt6-platformsupport-devel-static is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937246" version="1" comment="qt6-platformsupport-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937247" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937248" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937249" version="1" comment="qt6-printsupport-cups is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937250" version="1" comment="qt6-printsupport-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937251" version="1" comment="qt6-printsupport-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937252" version="1" comment="qt6-sql-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937253" version="1" comment="qt6-sql-mysql is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937254" version="1" comment="qt6-sql-postgresql is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937255" version="1" comment="qt6-sql-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937256" version="1" comment="qt6-sql-sqlite is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937257" version="1" comment="qt6-sql-unixODBC is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937258" version="1" comment="qt6-test-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937259" version="1" comment="qt6-test-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937260" version="1" comment="qt6-widgets-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937261" version="1" comment="qt6-widgets-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937262" version="1" comment="qt6-xml-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937263" version="1" comment="qt6-xml-private-devel is &lt;6.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937264" version="1" comment="kubo is &lt;0.27.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937265" version="1" comment="nodejs-electron is &lt;28.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937266" version="1" comment="nodejs-electron-devel is &lt;28.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937267" version="1" comment="nodejs-electron-doc is &lt;28.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937268" version="1" comment="syncthing is &lt;1.27.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937269" version="1" comment="syncthing-relaysrv is &lt;1.27.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937270" version="1" comment="apache2-mod_auth_mellon is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937271" version="1" comment="apache2-mod_auth_mellon-diagnostics is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937272" version="1" comment="apache2-mod_auth_mellon-doc is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937273" version="1" comment="coredns is &lt;1.11.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937274" version="1" comment="coredns-extras is &lt;1.11.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937275" version="1" comment="nodejs-electron is &lt;28.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937276" version="1" comment="nodejs-electron-devel is &lt;28.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937277" version="1" comment="nodejs-electron-doc is &lt;28.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937278" version="1" comment="corepack20 is &lt;20.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937279" version="1" comment="nodejs20 is &lt;20.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937280" version="1" comment="nodejs20-devel is &lt;20.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937281" version="1" comment="nodejs20-docs is &lt;20.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937282" version="1" comment="npm20 is &lt;20.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937283" version="1" comment="corepack21 is &lt;21.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937284" version="1" comment="nodejs21 is &lt;21.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937285" version="1" comment="nodejs21-devel is &lt;21.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937286" version="1" comment="nodejs21-docs is &lt;21.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937287" version="1" comment="npm21 is &lt;21.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937288" version="1" comment="xen is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937289" version="1" comment="xen-devel is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937290" version="1" comment="xen-doc-html is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937291" version="1" comment="xen-libs is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937292" version="1" comment="xen-tools is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937293" version="1" comment="xen-tools-domU is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937294" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.2_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937295" version="1" comment="python310-yt-dlp is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937296" version="1" comment="python311-yt-dlp is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937297" version="1" comment="python312-yt-dlp is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937298" version="1" comment="yt-dlp is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937299" version="1" comment="yt-dlp-bash-completion is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937300" version="1" comment="yt-dlp-fish-completion is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937301" version="1" comment="yt-dlp-zsh-completion is &lt;2024.04.09-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937302" version="1" comment="nodejs-electron is &lt;28.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937303" version="1" comment="nodejs-electron-devel is &lt;28.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937304" version="1" comment="nodejs-electron-doc is &lt;28.2.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937305" version="1" comment="sngrep is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937306" version="1" comment="aws-nitro-enclaves-binaryblobs-upstream is &lt;1.2.3~git11.d3d77e0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937307" version="1" comment="aws-nitro-enclaves-cli is &lt;1.2.3~git11.d3d77e0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937308" version="1" comment="system-group-ne is &lt;1.2.3~git11.d3d77e0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937310" version="1" comment="kernel-macros is &lt;6.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937311" version="1" comment="kernel-source is &lt;6.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937312" version="1" comment="kernel-source-vanilla is &lt;6.8.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937313" version="1" comment="nodejs-electron is &lt;28.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937314" version="1" comment="nodejs-electron-devel is &lt;28.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937315" version="1" comment="nodejs-electron-doc is &lt;28.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937316" version="1" comment="frr is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937317" version="1" comment="frr-devel is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937318" version="1" comment="libfrr0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937319" version="1" comment="libfrr_pb0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937320" version="1" comment="libfrrcares0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937321" version="1" comment="libfrrfpm_pb0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937322" version="1" comment="libfrrospfapiclient0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937323" version="1" comment="libfrrsnmp0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937324" version="1" comment="libfrrzmq0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937325" version="1" comment="libmlag_pb0 is &lt;8.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937326" version="1" comment="python310-djangorestframework is &lt;3.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937327" version="1" comment="python311-djangorestframework is &lt;3.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937328" version="1" comment="python312-djangorestframework is &lt;3.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937329" version="1" comment="python310-ecdsa is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937330" version="1" comment="python311-ecdsa is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937331" version="1" comment="python312-ecdsa is &lt;0.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937332" version="1" comment="cosign is &lt;2.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937333" version="1" comment="python310-pikepdf is &lt;8.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937334" version="1" comment="python311-pikepdf is &lt;8.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937335" version="1" comment="python312-pikepdf is &lt;8.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937336" version="1" comment="golang-github-v2fly-v2ray-core is &lt;5.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937337" version="1" comment="v2ray-core is &lt;5.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937338" version="1" comment="perl-CryptX is &lt;0.80.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937339" version="1" comment="php8 is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937340" version="1" comment="php8-bcmath is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937341" version="1" comment="php8-bz2 is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937342" version="1" comment="php8-calendar is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937343" version="1" comment="php8-cli is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937344" version="1" comment="php8-ctype is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937345" version="1" comment="php8-curl is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937346" version="1" comment="php8-dba is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937347" version="1" comment="php8-devel is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937348" version="1" comment="php8-dom is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937349" version="1" comment="php8-enchant is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937350" version="1" comment="php8-exif is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937351" version="1" comment="php8-ffi is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937352" version="1" comment="php8-fileinfo is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937353" version="1" comment="php8-ftp is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937354" version="1" comment="php8-gd is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937355" version="1" comment="php8-gettext is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937356" version="1" comment="php8-gmp is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937357" version="1" comment="php8-iconv is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937358" version="1" comment="php8-intl is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937359" version="1" comment="php8-ldap is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937360" version="1" comment="php8-mbstring is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937361" version="1" comment="php8-mysql is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937362" version="1" comment="php8-odbc is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937363" version="1" comment="php8-opcache is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937364" version="1" comment="php8-openssl is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937365" version="1" comment="php8-pcntl is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937366" version="1" comment="php8-pdo is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937367" version="1" comment="php8-pgsql is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937368" version="1" comment="php8-phar is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937369" version="1" comment="php8-posix is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937370" version="1" comment="php8-readline is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937371" version="1" comment="php8-shmop is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937372" version="1" comment="php8-snmp is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937373" version="1" comment="php8-soap is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937374" version="1" comment="php8-sockets is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937375" version="1" comment="php8-sodium is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937376" version="1" comment="php8-sqlite is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937377" version="1" comment="php8-sysvmsg is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937378" version="1" comment="php8-sysvsem is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937379" version="1" comment="php8-sysvshm is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937380" version="1" comment="php8-tidy is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937381" version="1" comment="php8-tokenizer is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937382" version="1" comment="php8-xmlreader is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937383" version="1" comment="php8-xmlwriter is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937384" version="1" comment="php8-xsl is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937385" version="1" comment="php8-zip is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937386" version="1" comment="php8-zlib is &lt;8.3.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937387" version="1" comment="putty is &lt;0.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937388" version="1" comment="python310-pydantic is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937389" version="1" comment="python311-pydantic is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937390" version="1" comment="python312-pydantic is &lt;2.6.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937391" version="1" comment="filezilla is &lt;3.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937392" version="1" comment="filezilla-devel is &lt;3.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937393" version="1" comment="filezilla-lang is &lt;3.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937394" version="1" comment="java-11-openjdk is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937395" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937396" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937397" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937398" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937399" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937400" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937401" version="1" comment="java-17-openjdk is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937402" version="1" comment="java-17-openjdk-demo is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937403" version="1" comment="java-17-openjdk-devel is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937404" version="1" comment="java-17-openjdk-headless is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937405" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937406" version="1" comment="java-17-openjdk-jmods is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937407" version="1" comment="java-17-openjdk-src is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937408" version="1" comment="java-21-openjdk is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937409" version="1" comment="java-21-openjdk-demo is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937410" version="1" comment="java-21-openjdk-devel is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937411" version="1" comment="java-21-openjdk-headless is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937412" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937413" version="1" comment="java-21-openjdk-jmods is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937414" version="1" comment="java-21-openjdk-src is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937415" version="1" comment="python310-idna is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937416" version="1" comment="python311-idna is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937417" version="1" comment="python312-idna is &lt;3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937418" version="1" comment="java-22-openjdk is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937419" version="1" comment="java-22-openjdk-demo is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937420" version="1" comment="java-22-openjdk-devel is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937421" version="1" comment="java-22-openjdk-headless is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937422" version="1" comment="java-22-openjdk-javadoc is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937423" version="1" comment="java-22-openjdk-jmods is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937424" version="1" comment="java-22-openjdk-src is &lt;22.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937425" version="1" comment="qemu is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937426" version="1" comment="qemu-SLOF is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937427" version="1" comment="qemu-accel-qtest is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937428" version="1" comment="qemu-accel-tcg-x86 is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937429" version="1" comment="qemu-arm is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937430" version="1" comment="qemu-audio-alsa is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937431" version="1" comment="qemu-audio-dbus is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937432" version="1" comment="qemu-audio-jack is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937433" version="1" comment="qemu-audio-oss is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937434" version="1" comment="qemu-audio-pa is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937435" version="1" comment="qemu-audio-pipewire is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937436" version="1" comment="qemu-audio-spice is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937437" version="1" comment="qemu-block-curl is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937438" version="1" comment="qemu-block-dmg is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937439" version="1" comment="qemu-block-gluster is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937440" version="1" comment="qemu-block-iscsi is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937441" version="1" comment="qemu-block-nfs is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937442" version="1" comment="qemu-block-rbd is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937443" version="1" comment="qemu-block-ssh is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937444" version="1" comment="qemu-chardev-baum is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937445" version="1" comment="qemu-chardev-spice is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937446" version="1" comment="qemu-doc is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937447" version="1" comment="qemu-extra is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937448" version="1" comment="qemu-guest-agent is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937449" version="1" comment="qemu-headless is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937450" version="1" comment="qemu-hw-display-qxl is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937451" version="1" comment="qemu-hw-display-virtio-gpu is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937452" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937453" version="1" comment="qemu-hw-display-virtio-vga is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937454" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937455" version="1" comment="qemu-hw-usb-host is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937456" version="1" comment="qemu-hw-usb-redirect is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937457" version="1" comment="qemu-hw-usb-smartcard is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937458" version="1" comment="qemu-img is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937459" version="1" comment="qemu-ipxe is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937460" version="1" comment="qemu-ivshmem-tools is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937461" version="1" comment="qemu-ksm is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937462" version="1" comment="qemu-lang is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937463" version="1" comment="qemu-microvm is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937464" version="1" comment="qemu-ppc is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937465" version="1" comment="qemu-pr-helper is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937466" version="1" comment="qemu-s390x is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937467" version="1" comment="qemu-seabios is &lt;8.2.21.16.3_3_ga95067eb-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937468" version="1" comment="qemu-skiboot is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937469" version="1" comment="qemu-spice is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937470" version="1" comment="qemu-tools is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937471" version="1" comment="qemu-ui-curses is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937472" version="1" comment="qemu-ui-dbus is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937473" version="1" comment="qemu-ui-gtk is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937474" version="1" comment="qemu-ui-opengl is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937475" version="1" comment="qemu-ui-spice-app is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937476" version="1" comment="qemu-ui-spice-core is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937477" version="1" comment="qemu-vgabios is &lt;8.2.21.16.3_3_ga95067eb-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937478" version="1" comment="qemu-vhost-user-gpu is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937479" version="1" comment="qemu-x86 is &lt;8.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937480" version="1" comment="glibc is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937481" version="1" comment="glibc-devel is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937482" version="1" comment="glibc-devel-static is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937483" version="1" comment="glibc-extra is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937484" version="1" comment="glibc-html is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937485" version="1" comment="glibc-i18ndata is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937486" version="1" comment="glibc-info is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937487" version="1" comment="glibc-lang is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937488" version="1" comment="glibc-locale is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937489" version="1" comment="glibc-locale-base is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937490" version="1" comment="glibc-profile is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937491" version="1" comment="libnsl1 is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937492" version="1" comment="nscd is &lt;2.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937493" version="1" comment="jasper is &lt;4.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937494" version="1" comment="libjasper-devel is &lt;4.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937495" version="1" comment="libjasper7 is &lt;4.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937496" version="1" comment="libjasper7-32bit is &lt;4.2.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937497" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937498" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937499" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937500" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937501" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937502" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937503" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937504" version="1" comment="kubernetes1.27-apiserver is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937505" version="1" comment="kubernetes1.27-client is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937506" version="1" comment="kubernetes1.27-client-bash-completion is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937507" version="1" comment="kubernetes1.27-client-common is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937508" version="1" comment="kubernetes1.27-client-fish-completion is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937509" version="1" comment="kubernetes1.27-controller-manager is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937510" version="1" comment="kubernetes1.27-kubeadm is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937511" version="1" comment="kubernetes1.27-kubelet is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937512" version="1" comment="kubernetes1.27-kubelet-common is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937513" version="1" comment="kubernetes1.27-proxy is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937514" version="1" comment="kubernetes1.27-scheduler is &lt;1.27.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937515" version="1" comment="kubernetes1.28-apiserver is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937516" version="1" comment="kubernetes1.28-client is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937517" version="1" comment="kubernetes1.28-client-bash-completion is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937518" version="1" comment="kubernetes1.28-client-common is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937519" version="1" comment="kubernetes1.28-client-fish-completion is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937520" version="1" comment="kubernetes1.28-controller-manager is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937521" version="1" comment="kubernetes1.28-kubeadm is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937522" version="1" comment="kubernetes1.28-kubelet is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937523" version="1" comment="kubernetes1.28-kubelet-common is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937524" version="1" comment="kubernetes1.28-proxy is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937525" version="1" comment="kubernetes1.28-scheduler is &lt;1.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937526" version="1" comment="kubernetes1.29-apiserver is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937527" version="1" comment="kubernetes1.29-client is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937528" version="1" comment="kubernetes1.29-client-bash-completion is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937529" version="1" comment="kubernetes1.29-client-common is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937530" version="1" comment="kubernetes1.29-client-fish-completion is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937531" version="1" comment="kubernetes1.29-controller-manager is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937532" version="1" comment="kubernetes1.29-kubeadm is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937533" version="1" comment="kubernetes1.29-kubelet is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937534" version="1" comment="kubernetes1.29-kubelet-common is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937535" version="1" comment="kubernetes1.29-proxy is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937536" version="1" comment="kubernetes1.29-scheduler is &lt;1.29.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937537" version="1" comment="python311 is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937538" version="1" comment="python311-32bit is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937539" version="1" comment="python311-curses is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937540" version="1" comment="python311-dbm is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937541" version="1" comment="python311-idle is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937542" version="1" comment="python311-tk is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937543" version="1" comment="python311-x86-64-v3 is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937544" version="1" comment="MozillaThunderbird is &lt;115.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937545" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937546" version="1" comment="MozillaThunderbird-translations-common is &lt;115.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937547" version="1" comment="MozillaThunderbird-translations-other is &lt;115.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937548" version="1" comment="nodejs-electron is &lt;29.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937549" version="1" comment="nodejs-electron-devel is &lt;29.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937550" version="1" comment="nodejs-electron-doc is &lt;29.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937551" version="1" comment="python310-Beaker is &lt;1.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937552" version="1" comment="python311-Beaker is &lt;1.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937553" version="1" comment="python312-Beaker is &lt;1.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937554" version="1" comment="python310-Django is &lt;4.2.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937555" version="1" comment="python311-Django is &lt;4.2.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937556" version="1" comment="python312-Django is &lt;4.2.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937557" version="1" comment="ffmpeg-5 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937558" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937559" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937560" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937561" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937562" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937563" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937564" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937565" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937566" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937567" version="1" comment="libavcodec59 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937568" version="1" comment="libavcodec59-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937569" version="1" comment="libavdevice59 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937570" version="1" comment="libavdevice59-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937571" version="1" comment="libavfilter8 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937572" version="1" comment="libavfilter8-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937573" version="1" comment="libavformat59 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937574" version="1" comment="libavformat59-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937575" version="1" comment="libavutil57 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937576" version="1" comment="libavutil57-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937577" version="1" comment="libpostproc56 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937578" version="1" comment="libpostproc56-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937579" version="1" comment="libswresample4_ff5 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937580" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937581" version="1" comment="libswscale6 is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937582" version="1" comment="libswscale6-32bit is &lt;5.1.4-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937583" version="1" comment="ffmpeg-7 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937584" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937585" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937586" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937587" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937588" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937589" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937590" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937591" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937592" version="1" comment="libavcodec61 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937593" version="1" comment="libavdevice61 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937594" version="1" comment="libavfilter10 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937595" version="1" comment="libavformat61 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937596" version="1" comment="libavutil59 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937597" version="1" comment="libpostproc58 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937598" version="1" comment="libswresample5 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937599" version="1" comment="libswscale8 is &lt;7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937600" version="1" comment="python-gevent-doc is &lt;24.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937601" version="1" comment="python310-gevent is &lt;24.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937602" version="1" comment="python311-gevent is &lt;24.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937603" version="1" comment="python312-gevent is &lt;24.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937604" version="1" comment="python-gunicorn-doc is &lt;22.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937605" version="1" comment="python310-gunicorn is &lt;22.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937606" version="1" comment="python311-gunicorn is &lt;22.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937607" version="1" comment="python312-gunicorn is &lt;22.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937608" version="1" comment="python312 is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937609" version="1" comment="python312-32bit is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937610" version="1" comment="python312-curses is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937611" version="1" comment="python312-dbm is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937612" version="1" comment="python312-idle is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937613" version="1" comment="python312-tk is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937614" version="1" comment="python312-x86-64-v3 is &lt;3.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937615" version="1" comment="shadowsocks-rust is &lt;1.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937616" version="1" comment="ffmpeg-4 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937617" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937618" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937619" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937620" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937621" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937622" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937623" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937624" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937625" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937626" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937627" version="1" comment="libavcodec58_134 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937628" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937629" version="1" comment="libavdevice58_13 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937630" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937631" version="1" comment="libavfilter7_110 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937632" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937633" version="1" comment="libavformat58_76 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937634" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937635" version="1" comment="libavresample4_0 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937636" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937637" version="1" comment="libavutil56_70 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937638" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937639" version="1" comment="libpostproc55_9 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937640" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937641" version="1" comment="libswresample3_9 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937642" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937643" version="1" comment="libswscale5_9 is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937644" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937645" version="1" comment="ffmpeg-6 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937646" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937647" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937648" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937649" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937650" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937651" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937652" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937653" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937654" version="1" comment="libavcodec60 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937655" version="1" comment="libavcodec60-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937656" version="1" comment="libavdevice60 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937657" version="1" comment="libavdevice60-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937658" version="1" comment="libavfilter9 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937659" version="1" comment="libavfilter9-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937660" version="1" comment="libavformat60 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937661" version="1" comment="libavformat60-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937662" version="1" comment="libavutil58 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937663" version="1" comment="libavutil58-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937664" version="1" comment="libpostproc57 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937665" version="1" comment="libpostproc57-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937666" version="1" comment="libswresample4 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937667" version="1" comment="libswresample4-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937668" version="1" comment="libswscale7 is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937669" version="1" comment="libswscale7-32bit is &lt;6.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937670" version="1" comment="gstreamer-plugins-bad is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937671" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937672" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937673" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937674" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937675" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937676" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937677" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937678" version="1" comment="gstreamer-transcoder is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937679" version="1" comment="gstreamer-transcoder-devel is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937680" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937681" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937682" version="1" comment="libgstanalytics-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937683" version="1" comment="libgstanalytics-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937684" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937685" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937686" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937687" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937688" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937689" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937690" version="1" comment="libgstcodecs-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937691" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937692" version="1" comment="libgstcuda-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937693" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937694" version="1" comment="libgstdxva-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937695" version="1" comment="libgstdxva-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937696" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937697" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937698" version="1" comment="libgstisoff-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937699" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937700" version="1" comment="libgstmpegts-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937701" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937702" version="1" comment="libgstmse-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937703" version="1" comment="libgstmse-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937704" version="1" comment="libgstphotography-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937705" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937706" version="1" comment="libgstplay-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937707" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937708" version="1" comment="libgstplayer-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937709" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937710" version="1" comment="libgstsctp-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937711" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937712" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937713" version="1" comment="libgsttranscoder-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937714" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937715" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937716" version="1" comment="libgstva-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937717" version="1" comment="libgstva-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937718" version="1" comment="libgstvulkan-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937719" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937720" version="1" comment="libgstwayland-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937721" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937722" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937723" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937724" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937725" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937726" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937727" version="1" comment="typelib-1_0-GstAnalytics-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937728" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937729" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937730" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937731" version="1" comment="typelib-1_0-GstDxva-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937732" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937733" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937734" version="1" comment="typelib-1_0-GstMse-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937735" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937736" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937737" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937738" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937739" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937740" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937741" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937742" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.24.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937743" version="1" comment="matrix-synapse is &lt;1.105.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937744" version="1" comment="dcmtk is &lt;3.6.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937745" version="1" comment="dcmtk-devel is &lt;3.6.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937746" version="1" comment="libdcmtk18 is &lt;3.6.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937747" version="1" comment="flatpak is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937748" version="1" comment="flatpak-devel is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937749" version="1" comment="flatpak-remote-flathub is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937750" version="1" comment="flatpak-selinux is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937751" version="1" comment="flatpak-zsh-completion is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937752" version="1" comment="libflatpak0 is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937753" version="1" comment="system-user-flatpak is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937754" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937755" version="1" comment="freerdp is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937756" version="1" comment="freerdp-devel is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937757" version="1" comment="freerdp-proxy is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937758" version="1" comment="freerdp-proxy-plugins is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937759" version="1" comment="freerdp-sdl is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937760" version="1" comment="freerdp-server is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937761" version="1" comment="freerdp-wayland is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937762" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937763" version="1" comment="libfreerdp3-3 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937764" version="1" comment="librdtk0-0 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937765" version="1" comment="libuwac0-0 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937766" version="1" comment="libwinpr3-3 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937767" version="1" comment="rdtk0-devel is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937768" version="1" comment="uwac0-devel is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937769" version="1" comment="winpr-devel is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937770" version="1" comment="pdns-recursor is &lt;5.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937771" version="1" comment="python310-autobahn is &lt;23.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937772" version="1" comment="python311-autobahn is &lt;23.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937773" version="1" comment="python312-autobahn is &lt;23.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937774" version="1" comment="teleport is &lt;15.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937775" version="1" comment="teleport-tbot is &lt;15.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937776" version="1" comment="teleport-tctl is &lt;15.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937777" version="1" comment="teleport-tsh is &lt;15.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937778" version="1" comment="topgrade is &lt;14.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937779" version="1" comment="cmctl is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937780" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937781" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937782" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937783" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937784" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937785" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937786" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937787" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937788" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937789" version="1" comment="MozillaFirefox is &lt;125.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937790" version="1" comment="MozillaFirefox-branding-upstream is &lt;125.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937791" version="1" comment="MozillaFirefox-devel is &lt;125.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937792" version="1" comment="MozillaFirefox-translations-common is &lt;125.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937793" version="1" comment="MozillaFirefox-translations-other is &lt;125.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937794" version="1" comment="ffmpeg-5 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937795" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937796" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937797" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937798" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937799" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937800" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937801" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937802" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937803" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937804" version="1" comment="libavcodec59 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937805" version="1" comment="libavcodec59-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937806" version="1" comment="libavdevice59 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937807" version="1" comment="libavdevice59-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937808" version="1" comment="libavfilter8 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937809" version="1" comment="libavfilter8-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937810" version="1" comment="libavformat59 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937811" version="1" comment="libavformat59-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937812" version="1" comment="libavutil57 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937813" version="1" comment="libavutil57-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937814" version="1" comment="libpostproc56 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937815" version="1" comment="libpostproc56-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937816" version="1" comment="libswresample4_ff5 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937817" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937818" version="1" comment="libswscale6 is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937819" version="1" comment="libswscale6-32bit is &lt;5.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937820" version="1" comment="ffmpeg-6 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937821" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937822" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937823" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937824" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937825" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937826" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937827" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937828" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937829" version="1" comment="libavcodec60 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937830" version="1" comment="libavcodec60-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937831" version="1" comment="libavdevice60 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937832" version="1" comment="libavdevice60-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937833" version="1" comment="libavfilter9 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937834" version="1" comment="libavfilter9-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937835" version="1" comment="libavformat60 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937836" version="1" comment="libavformat60-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937837" version="1" comment="libavutil58 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937838" version="1" comment="libavutil58-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937839" version="1" comment="libpostproc57 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937840" version="1" comment="libpostproc57-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937841" version="1" comment="libswresample4 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937842" version="1" comment="libswresample4-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937843" version="1" comment="libswscale7 is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937844" version="1" comment="libswscale7-32bit is &lt;6.1.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937845" version="1" comment="blosc2-devel is &lt;2.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937846" version="1" comment="libblosc2-3 is &lt;2.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937847" version="1" comment="libblosc2-3-x86-64-v3 is &lt;2.14.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937848" version="1" comment="frr is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937849" version="1" comment="frr-devel is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937850" version="1" comment="libfrr0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937851" version="1" comment="libfrr_pb0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937852" version="1" comment="libfrrcares0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937853" version="1" comment="libfrrfpm_pb0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937854" version="1" comment="libfrrospfapiclient0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937855" version="1" comment="libfrrsnmp0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937856" version="1" comment="libfrrzmq0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937857" version="1" comment="libmlag_pb0 is &lt;8.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937858" version="1" comment="kubetui is &lt;1.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937859" version="1" comment="ffmpeg-4 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937860" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937861" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937862" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937863" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937864" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937865" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937866" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937867" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937868" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937869" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937870" version="1" comment="libavcodec58_134 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937871" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937872" version="1" comment="libavdevice58_13 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937873" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937874" version="1" comment="libavfilter7_110 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937875" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937876" version="1" comment="libavformat58_76 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937877" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937878" version="1" comment="libavresample4_0 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937879" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937880" version="1" comment="libavutil56_70 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937881" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937882" version="1" comment="libpostproc55_9 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937883" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937884" version="1" comment="libswresample3_9 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937885" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937886" version="1" comment="libswscale5_9 is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937887" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937888" version="1" comment="bouncycastle is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937889" version="1" comment="bouncycastle-javadoc is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937890" version="1" comment="bouncycastle-jmail is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937891" version="1" comment="bouncycastle-mail is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937892" version="1" comment="bouncycastle-pg is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937893" version="1" comment="bouncycastle-pkix is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937894" version="1" comment="bouncycastle-tls is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937895" version="1" comment="bouncycastle-util is &lt;1.78.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937896" version="1" comment="hcode is &lt;2.1-680.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937897" version="1" comment="python310-pip is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937898" version="1" comment="python310-pip-wheel is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937899" version="1" comment="python311-pip is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937900" version="1" comment="python311-pip-wheel is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937901" version="1" comment="python312-pip is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937902" version="1" comment="python312-pip-wheel is &lt;24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937903" version="1" comment="tlrc is &lt;1.9.2+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937904" version="1" comment="k9s is &lt;0.32.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937905" version="1" comment="openjfx is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937906" version="1" comment="openjfx-devel is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937907" version="1" comment="python310-distributed is &lt;2024.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937908" version="1" comment="python311-distributed is &lt;2024.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937909" version="1" comment="python312-distributed is &lt;2024.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937910" version="1" comment="krb5 is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937911" version="1" comment="krb5-32bit is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937912" version="1" comment="krb5-client is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937913" version="1" comment="krb5-devel is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937914" version="1" comment="krb5-devel-32bit is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937915" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937916" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937917" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937918" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937919" version="1" comment="krb5-server is &lt;1.21.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937920" version="1" comment="libluajit2-5_1-2 is &lt;2.1.20240314-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937921" version="1" comment="luajit2 is &lt;2.1.20240314-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937922" version="1" comment="luajit2-devel is &lt;2.1.20240314-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937923" version="1" comment="keylime-ima-policy is &lt;0.2.5~0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937924" version="1" comment="rust-keylime is &lt;0.2.5~0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937925" version="1" comment="nodejs-electron is &lt;29.3.2~20240430g19f0abd6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937926" version="1" comment="nodejs-electron-devel is &lt;29.3.2~20240430g19f0abd6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937927" version="1" comment="nodejs-electron-doc is &lt;29.3.2~20240430g19f0abd6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937928" version="1" comment="libQt6Concurrent6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937929" version="1" comment="libQt6Core6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937930" version="1" comment="libQt6DBus6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937931" version="1" comment="libQt6Gui6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937932" version="1" comment="libQt6Network6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937933" version="1" comment="libQt6OpenGL6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937934" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937935" version="1" comment="libQt6PrintSupport6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937936" version="1" comment="libQt6Sql6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937937" version="1" comment="libQt6Test6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937938" version="1" comment="libQt6Widgets6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937939" version="1" comment="libQt6Xml6 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937940" version="1" comment="qt6-base-common-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937941" version="1" comment="qt6-base-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937942" version="1" comment="qt6-base-examples is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937943" version="1" comment="qt6-base-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937944" version="1" comment="qt6-concurrent-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937945" version="1" comment="qt6-core-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937946" version="1" comment="qt6-core-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937947" version="1" comment="qt6-dbus-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937948" version="1" comment="qt6-dbus-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937949" version="1" comment="qt6-docs-common is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937950" version="1" comment="qt6-exampleicons-devel-static is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937951" version="1" comment="qt6-gui-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937952" version="1" comment="qt6-gui-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937953" version="1" comment="qt6-kmssupport-devel-static is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937954" version="1" comment="qt6-kmssupport-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937955" version="1" comment="qt6-network-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937956" version="1" comment="qt6-network-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937957" version="1" comment="qt6-network-tls is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937958" version="1" comment="qt6-networkinformation-glib is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937959" version="1" comment="qt6-networkinformation-nm is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937960" version="1" comment="qt6-opengl-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937961" version="1" comment="qt6-opengl-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937962" version="1" comment="qt6-openglwidgets-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937963" version="1" comment="qt6-platformsupport-devel-static is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937964" version="1" comment="qt6-platformsupport-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937965" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937966" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937967" version="1" comment="qt6-printsupport-cups is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937968" version="1" comment="qt6-printsupport-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937969" version="1" comment="qt6-printsupport-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937970" version="1" comment="qt6-sql-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937971" version="1" comment="qt6-sql-mysql is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937972" version="1" comment="qt6-sql-postgresql is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937973" version="1" comment="qt6-sql-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937974" version="1" comment="qt6-sql-sqlite is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937975" version="1" comment="qt6-sql-unixODBC is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937976" version="1" comment="qt6-test-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937977" version="1" comment="qt6-test-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937978" version="1" comment="qt6-widgets-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937979" version="1" comment="qt6-widgets-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937980" version="1" comment="qt6-xml-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937981" version="1" comment="qt6-xml-private-devel is &lt;6.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937982" version="1" comment="tpm2.0-tools is &lt;5.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937983" version="1" comment="traefik is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937984" version="1" comment="python310-python-jose is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937985" version="1" comment="python310-python-jose-cryptography is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937986" version="1" comment="python311-python-jose is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937987" version="1" comment="python311-python-jose-cryptography is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937988" version="1" comment="python312-python-jose is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937989" version="1" comment="python312-python-jose-cryptography is &lt;3.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937990" version="1" comment="bsdtar is &lt;3.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937991" version="1" comment="libarchive-devel is &lt;3.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937992" version="1" comment="libarchive13 is &lt;3.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937993" version="1" comment="libarchive13-32bit is &lt;3.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937994" version="1" comment="python310-Jinja2 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937995" version="1" comment="python311-Jinja2 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937996" version="1" comment="python312-Jinja2 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937997" version="1" comment="python310-pymongo is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937998" version="1" comment="python311-pymongo is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009937999" version="1" comment="python312-pymongo is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938000" version="1" comment="ssh-audit is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938001" version="1" comment="libtss2-esys0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938002" version="1" comment="libtss2-esys0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938003" version="1" comment="libtss2-fapi-common is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938004" version="1" comment="libtss2-fapi1 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938005" version="1" comment="libtss2-fapi1-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938006" version="1" comment="libtss2-mu0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938007" version="1" comment="libtss2-mu0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938008" version="1" comment="libtss2-policy0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938009" version="1" comment="libtss2-policy0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938010" version="1" comment="libtss2-rc0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938011" version="1" comment="libtss2-rc0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938012" version="1" comment="libtss2-sys1 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938013" version="1" comment="libtss2-sys1-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938014" version="1" comment="libtss2-tcti-cmd0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938015" version="1" comment="libtss2-tcti-cmd0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938016" version="1" comment="libtss2-tcti-device0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938017" version="1" comment="libtss2-tcti-device0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938018" version="1" comment="libtss2-tcti-i2c-helper0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938019" version="1" comment="libtss2-tcti-mssim0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938020" version="1" comment="libtss2-tcti-mssim0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938021" version="1" comment="libtss2-tcti-pcap0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938022" version="1" comment="libtss2-tcti-spi-helper0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938023" version="1" comment="libtss2-tcti-spi-helper0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938024" version="1" comment="libtss2-tcti-spidev0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938025" version="1" comment="libtss2-tcti-swtpm0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938026" version="1" comment="libtss2-tcti-swtpm0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938027" version="1" comment="libtss2-tctildr0 is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938028" version="1" comment="libtss2-tctildr0-32bit is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938029" version="1" comment="tpm2-0-tss is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938030" version="1" comment="tpm2-0-tss-devel is &lt;4.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938031" version="1" comment="ffmpeg-5 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938032" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938033" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938034" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938035" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938036" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938037" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938038" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938039" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938040" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938041" version="1" comment="libavcodec59 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938042" version="1" comment="libavcodec59-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938043" version="1" comment="libavdevice59 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938044" version="1" comment="libavdevice59-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938045" version="1" comment="libavfilter8 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938046" version="1" comment="libavfilter8-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938047" version="1" comment="libavformat59 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938048" version="1" comment="libavformat59-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938049" version="1" comment="libavutil57 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938050" version="1" comment="libavutil57-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938051" version="1" comment="libpostproc56 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938052" version="1" comment="libpostproc56-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938053" version="1" comment="libswresample4_ff5 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938054" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938055" version="1" comment="libswscale6 is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938056" version="1" comment="libswscale6-32bit is &lt;5.1.4-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938057" version="1" comment="glibc is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938058" version="1" comment="glibc-devel is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938059" version="1" comment="glibc-devel-static is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938060" version="1" comment="glibc-extra is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938061" version="1" comment="glibc-html is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938062" version="1" comment="glibc-i18ndata is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938063" version="1" comment="glibc-info is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938064" version="1" comment="glibc-lang is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938065" version="1" comment="glibc-locale is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938066" version="1" comment="glibc-locale-base is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938067" version="1" comment="glibc-profile is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938068" version="1" comment="libnsl1 is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938069" version="1" comment="nscd is &lt;2.39-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938070" version="1" comment="go1.22 is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938071" version="1" comment="go1.22-doc is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938072" version="1" comment="go1.22-libstd is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938073" version="1" comment="go1.22-race is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938074" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938075" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938076" version="1" comment="libopenssl1_1 is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938077" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938078" version="1" comment="openssl-1_1 is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938079" version="1" comment="openssl-1_1-doc is &lt;1.1.1w-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938080" version="1" comment="python310-sqlparse is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938081" version="1" comment="python311-sqlparse is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938082" version="1" comment="python312-sqlparse is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938083" version="1" comment="python-tqdm-bash-completion is &lt;4.66.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938084" version="1" comment="python310-tqdm is &lt;4.66.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938085" version="1" comment="python311-tqdm is &lt;4.66.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938086" version="1" comment="python312-tqdm is &lt;4.66.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938087" version="1" comment="ffmpeg-4 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938088" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938089" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938090" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938091" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938092" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938093" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938094" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938095" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938096" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938097" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938098" version="1" comment="libavcodec58_134 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938099" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938100" version="1" comment="libavdevice58_13 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938101" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938102" version="1" comment="libavfilter7_110 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938103" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938104" version="1" comment="libavformat58_76 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938105" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938106" version="1" comment="libavresample4_0 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938107" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938108" version="1" comment="libavutil56_70 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938109" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938110" version="1" comment="libpostproc55_9 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938111" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938112" version="1" comment="libswresample3_9 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938113" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938114" version="1" comment="libswscale5_9 is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938115" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938116" version="1" comment="go1.21 is &lt;1.21.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938117" version="1" comment="go1.21-doc is &lt;1.21.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938118" version="1" comment="go1.21-libstd is &lt;1.21.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938119" version="1" comment="go1.21-race is &lt;1.21.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938120" version="1" comment="libopenssl-3-devel is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938121" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938122" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938123" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938124" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938125" version="1" comment="libopenssl3 is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938126" version="1" comment="libopenssl3-32bit is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938127" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938128" version="1" comment="openssl-3 is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938129" version="1" comment="openssl-3-doc is &lt;3.1.4-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938130" version="1" comment="tinyproxy is &lt;1.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938131" version="1" comment="libunbound8 is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938132" version="1" comment="python3-unbound is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938133" version="1" comment="unbound is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938134" version="1" comment="unbound-anchor is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938135" version="1" comment="unbound-devel is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938136" version="1" comment="unbound-munin is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938137" version="1" comment="nodejs-electron is &lt;29.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938138" version="1" comment="nodejs-electron-devel is &lt;29.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938139" version="1" comment="nodejs-electron-doc is &lt;29.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938140" version="1" comment="postgresql14 is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938141" version="1" comment="postgresql14-contrib is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938142" version="1" comment="postgresql14-devel is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938143" version="1" comment="postgresql14-docs is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938144" version="1" comment="postgresql14-llvmjit is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938145" version="1" comment="postgresql14-llvmjit-devel is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938146" version="1" comment="postgresql14-plperl is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938147" version="1" comment="postgresql14-plpython is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938148" version="1" comment="postgresql14-pltcl is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938149" version="1" comment="postgresql14-server is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938150" version="1" comment="postgresql14-server-devel is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938151" version="1" comment="postgresql14-test is &lt;14.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938152" version="1" comment="postgresql15 is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938153" version="1" comment="postgresql15-contrib is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938154" version="1" comment="postgresql15-devel is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938155" version="1" comment="postgresql15-docs is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938156" version="1" comment="postgresql15-llvmjit is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938157" version="1" comment="postgresql15-llvmjit-devel is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938158" version="1" comment="postgresql15-plperl is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938159" version="1" comment="postgresql15-plpython is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938160" version="1" comment="postgresql15-pltcl is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938161" version="1" comment="postgresql15-server is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938162" version="1" comment="postgresql15-server-devel is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938163" version="1" comment="postgresql15-test is &lt;15.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938164" version="1" comment="libvirt is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938165" version="1" comment="libvirt-client is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938166" version="1" comment="libvirt-client-qemu is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938167" version="1" comment="libvirt-daemon is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938168" version="1" comment="libvirt-daemon-common is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938169" version="1" comment="libvirt-daemon-config-network is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938170" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938171" version="1" comment="libvirt-daemon-driver-interface is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938172" version="1" comment="libvirt-daemon-driver-libxl is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938173" version="1" comment="libvirt-daemon-driver-lxc is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938174" version="1" comment="libvirt-daemon-driver-network is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938175" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938176" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938177" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938178" version="1" comment="libvirt-daemon-driver-secret is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938179" version="1" comment="libvirt-daemon-driver-storage is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938180" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938181" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938182" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938183" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938184" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938185" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938186" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938187" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938188" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938189" version="1" comment="libvirt-daemon-hooks is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938190" version="1" comment="libvirt-daemon-lock is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938191" version="1" comment="libvirt-daemon-log is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938192" version="1" comment="libvirt-daemon-lxc is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938193" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938194" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938195" version="1" comment="libvirt-daemon-proxy is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938196" version="1" comment="libvirt-daemon-qemu is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938197" version="1" comment="libvirt-daemon-xen is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938198" version="1" comment="libvirt-devel is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938199" version="1" comment="libvirt-doc is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938200" version="1" comment="libvirt-libs is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938201" version="1" comment="libvirt-nss is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938202" version="1" comment="wireshark-plugin-libvirt is &lt;10.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938203" version="1" comment="ovmf is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938204" version="1" comment="ovmf-tools is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938205" version="1" comment="qemu-ovmf-ia32 is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938206" version="1" comment="qemu-ovmf-x86_64 is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938207" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938208" version="1" comment="qemu-uefi-aarch32 is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938209" version="1" comment="qemu-uefi-aarch64 is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938210" version="1" comment="qemu-uefi-riscv64 is &lt;202308-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938211" version="1" comment="libecpg6 is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938212" version="1" comment="libecpg6-32bit is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938213" version="1" comment="libpq5 is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938214" version="1" comment="libpq5-32bit is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938215" version="1" comment="postgresql16 is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938216" version="1" comment="postgresql16-contrib is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938217" version="1" comment="postgresql16-devel is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938218" version="1" comment="postgresql16-docs is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938219" version="1" comment="postgresql16-llvmjit is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938220" version="1" comment="postgresql16-llvmjit-devel is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938221" version="1" comment="postgresql16-plperl is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938222" version="1" comment="postgresql16-plpython is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938223" version="1" comment="postgresql16-pltcl is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938224" version="1" comment="postgresql16-server is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938225" version="1" comment="postgresql16-server-devel is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938226" version="1" comment="postgresql16-test is &lt;16.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938227" version="1" comment="apptainer is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938228" version="1" comment="apptainer-leap is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938229" version="1" comment="apptainer-sle15_5 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938230" version="1" comment="apptainer-sle15_6 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938231" version="1" comment="buildah is &lt;1.35.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938232" version="1" comment="chromedriver is &lt;124.0.6367.201-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938233" version="1" comment="chromium is &lt;124.0.6367.201-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938234" version="1" comment="gnu-recutils is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938235" version="1" comment="gnu-recutils-devel is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938236" version="1" comment="gnu-recutils-lang is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938237" version="1" comment="librec1 is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938238" version="1" comment="readrec0 is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938239" version="1" comment="testrec0 is &lt;1.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938240" version="1" comment="python is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938241" version="1" comment="python-curses is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938242" version="1" comment="python-demo is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938243" version="1" comment="python-gdbm is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938244" version="1" comment="python-idle is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938245" version="1" comment="python-tk is &lt;2.7.18-46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938246" version="1" comment="ruby3.3-rubygem-grpc is &lt;1.63.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938247" version="1" comment="liburiparser1 is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938248" version="1" comment="uriparser is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938249" version="1" comment="uriparser-devel is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938250" version="1" comment="uriparser-doc is &lt;0.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938251" version="1" comment="dnsdist is &lt;1.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938253" version="1" comment="kernel-macros is &lt;6.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938254" version="1" comment="kernel-source is &lt;6.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938255" version="1" comment="kernel-source-vanilla is &lt;6.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938256" version="1" comment="podman is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938257" version="1" comment="podman-docker is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938258" version="1" comment="podman-remote is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938259" version="1" comment="podmansh is &lt;5.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938260" version="1" comment="sccache is &lt;0.8.0~3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938261" version="1" comment="cacti is &lt;1.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938262" version="1" comment="containerized-data-importer-api is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938263" version="1" comment="containerized-data-importer-cloner is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938264" version="1" comment="containerized-data-importer-controller is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938265" version="1" comment="containerized-data-importer-importer is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938266" version="1" comment="containerized-data-importer-manifests is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938267" version="1" comment="containerized-data-importer-operator is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938268" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938269" version="1" comment="containerized-data-importer-uploadserver is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938270" version="1" comment="obs-service-cdi_containers_meta is &lt;1.59.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938271" version="1" comment="iperf is &lt;3.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938272" version="1" comment="iperf-devel is &lt;3.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938273" version="1" comment="libiperf0 is &lt;3.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938274" version="1" comment="python310-aiohttp is &lt;3.9.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938275" version="1" comment="python311-aiohttp is &lt;3.9.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938276" version="1" comment="python312-aiohttp is &lt;3.9.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938277" version="1" comment="cargo1.77 is &lt;1.77.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938278" version="1" comment="rust1.77 is &lt;1.77.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938279" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938280" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938281" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938282" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938283" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938284" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938285" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938286" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938287" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938288" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938289" version="1" comment="git is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938290" version="1" comment="git-arch is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938291" version="1" comment="git-core is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938292" version="1" comment="git-credential-libsecret is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938293" version="1" comment="git-cvs is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938294" version="1" comment="git-daemon is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938295" version="1" comment="git-doc is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938296" version="1" comment="git-email is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938297" version="1" comment="git-gui is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938298" version="1" comment="git-p4 is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938299" version="1" comment="git-svn is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938300" version="1" comment="git-web is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938301" version="1" comment="gitk is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938302" version="1" comment="perl-Git is &lt;2.45.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938303" version="1" comment="git-cliff is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938304" version="1" comment="git-cliff-bash-completion is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938305" version="1" comment="git-cliff-fish-completion is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938306" version="1" comment="git-cliff-zsh-completion is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938307" version="1" comment="gio-branding-upstream is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938308" version="1" comment="glib2-devel is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938309" version="1" comment="glib2-devel-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938310" version="1" comment="glib2-devel-static is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938311" version="1" comment="glib2-lang is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938312" version="1" comment="glib2-tests-devel is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938313" version="1" comment="glib2-tools is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938314" version="1" comment="glib2-tools-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938315" version="1" comment="libgio-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938316" version="1" comment="libgio-2_0-0-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938317" version="1" comment="libgirepository-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938318" version="1" comment="libglib-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938319" version="1" comment="libglib-2_0-0-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938320" version="1" comment="libgmodule-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938321" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938322" version="1" comment="libgobject-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938323" version="1" comment="libgobject-2_0-0-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938324" version="1" comment="libgthread-2_0-0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938325" version="1" comment="libgthread-2_0-0-32bit is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938326" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938327" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938328" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938329" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938330" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938331" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.80.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938332" version="1" comment="libxml2-2 is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938333" version="1" comment="libxml2-2-32bit is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938334" version="1" comment="libxml2-devel is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938335" version="1" comment="libxml2-devel-32bit is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938336" version="1" comment="libxml2-doc is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938337" version="1" comment="libxml2-tools is &lt;2.12.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938338" version="1" comment="nodejs-electron is &lt;29.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938339" version="1" comment="nodejs-electron-devel is &lt;29.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938340" version="1" comment="nodejs-electron-doc is &lt;29.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938341" version="1" comment="perl-Email-MIME is &lt;1.954.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938342" version="1" comment="ucode-intel is &lt;20240514-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938343" version="1" comment="warewulf4 is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938344" version="1" comment="warewulf4-man is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938345" version="1" comment="warewulf4-overlay is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938346" version="1" comment="warewulf4-overlay-slurm is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938347" version="1" comment="chromedriver is &lt;124.0.6367.207-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938348" version="1" comment="chromium is &lt;124.0.6367.207-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938349" version="1" comment="python310-pywbem is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938350" version="1" comment="python311-pywbem is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938351" version="1" comment="python312-pywbem is &lt;1.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938352" version="1" comment="libwireshark17 is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938353" version="1" comment="libwiretap14 is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938354" version="1" comment="libwsutil15 is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938355" version="1" comment="wireshark is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938356" version="1" comment="wireshark-devel is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938357" version="1" comment="wireshark-ui-qt is &lt;4.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938358" version="1" comment="gitui is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938359" version="1" comment="MozillaFirefox is &lt;126.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938360" version="1" comment="MozillaFirefox-branding-upstream is &lt;126.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938361" version="1" comment="MozillaFirefox-devel is &lt;126.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938362" version="1" comment="MozillaFirefox-translations-common is &lt;126.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938363" version="1" comment="MozillaFirefox-translations-other is &lt;126.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938364" version="1" comment="MozillaThunderbird is &lt;115.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938365" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938366" version="1" comment="MozillaThunderbird-translations-common is &lt;115.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938367" version="1" comment="MozillaThunderbird-translations-other is &lt;115.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938368" version="1" comment="chromedriver is &lt;125.0.6422.60-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938369" version="1" comment="chromium is &lt;125.0.6422.60-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938370" version="1" comment="python is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938371" version="1" comment="python-curses is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938372" version="1" comment="python-demo is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938373" version="1" comment="python-gdbm is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938374" version="1" comment="python-idle is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938375" version="1" comment="python-tk is &lt;2.7.18-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938376" version="1" comment="python310-aiosmtpd is &lt;1.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938377" version="1" comment="python311-aiosmtpd is &lt;1.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938378" version="1" comment="python312-aiosmtpd is &lt;1.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938379" version="1" comment="xdg-desktop-portal is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938380" version="1" comment="xdg-desktop-portal-devel is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938381" version="1" comment="xdg-desktop-portal-lang is &lt;1.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938382" version="1" comment="bpftrace is &lt;0.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938383" version="1" comment="bpftrace-tools is &lt;0.20.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938384" version="1" comment="gitoxide is &lt;0.36.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938385" version="1" comment="chromedriver is &lt;125.0.6422.76-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938386" version="1" comment="chromium is &lt;125.0.6422.76-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938387" version="1" comment="containerd is &lt;1.7.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938388" version="1" comment="containerd-ctr is &lt;1.7.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938389" version="1" comment="containerd-devel is &lt;1.7.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938390" version="1" comment="forgejo is &lt;7.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938391" version="1" comment="forgejo-apparmor is &lt;7.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938392" version="1" comment="forgejo-selinux is &lt;7.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938393" version="1" comment="glibc is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938394" version="1" comment="glibc-devel is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938395" version="1" comment="glibc-devel-static is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938396" version="1" comment="glibc-extra is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938397" version="1" comment="glibc-html is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938398" version="1" comment="glibc-i18ndata is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938399" version="1" comment="glibc-info is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938400" version="1" comment="glibc-lang is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938401" version="1" comment="glibc-locale is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938402" version="1" comment="glibc-locale-base is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938403" version="1" comment="glibc-profile is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938404" version="1" comment="libnsl1 is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938405" version="1" comment="nscd is &lt;2.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938406" version="1" comment="libopenssl-3-devel is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938407" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938408" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938409" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938410" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938411" version="1" comment="libopenssl3 is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938412" version="1" comment="libopenssl3-32bit is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938413" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938414" version="1" comment="openssl-3 is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938415" version="1" comment="openssl-3-doc is &lt;3.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938416" version="1" comment="python310-PyMySQL is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938417" version="1" comment="python311-PyMySQL is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938418" version="1" comment="python312-PyMySQL is &lt;1.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938419" version="1" comment="freerdp2-devel is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938420" version="1" comment="freerdp2-proxy is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938421" version="1" comment="freerdp2-server is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938422" version="1" comment="libfreerdp2-2 is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938423" version="1" comment="libwinpr2-2 is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938424" version="1" comment="winpr2-devel is &lt;2.11.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938425" version="1" comment="java-11-openj9 is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938426" version="1" comment="java-11-openj9-demo is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938427" version="1" comment="java-11-openj9-devel is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938428" version="1" comment="java-11-openj9-headless is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938429" version="1" comment="java-11-openj9-javadoc is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938430" version="1" comment="java-11-openj9-jmods is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938431" version="1" comment="java-11-openj9-src is &lt;11.0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938432" version="1" comment="java-17-openj9 is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938433" version="1" comment="java-17-openj9-demo is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938434" version="1" comment="java-17-openj9-devel is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938435" version="1" comment="java-17-openj9-headless is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938436" version="1" comment="java-17-openj9-javadoc is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938437" version="1" comment="java-17-openj9-jmods is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938438" version="1" comment="java-17-openj9-src is &lt;17.0.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938439" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938440" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938441" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938442" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938443" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938444" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938445" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.412-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938446" version="1" comment="java-21-openj9 is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938447" version="1" comment="java-21-openj9-demo is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938448" version="1" comment="java-21-openj9-devel is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938449" version="1" comment="java-21-openj9-headless is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938450" version="1" comment="java-21-openj9-javadoc is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938451" version="1" comment="java-21-openj9-jmods is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938452" version="1" comment="java-21-openj9-src is &lt;21.0.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938453" version="1" comment="python310-requests is &lt;2.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938454" version="1" comment="python311-requests is &lt;2.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938455" version="1" comment="python312-requests is &lt;2.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938456" version="1" comment="traefik is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938457" version="1" comment="libQt5Pdf5 is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938458" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938459" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938460" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938461" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938462" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938463" version="1" comment="libqt5-qtwebengine is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938464" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938465" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938466" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938467" version="1" comment="gnome-remote-desktop is &lt;46.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938468" version="1" comment="gnome-remote-desktop-lang is &lt;46.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938469" version="1" comment="libQt6NetworkAuth6 is &lt;6.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938470" version="1" comment="qt6-networkauth-devel is &lt;6.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938471" version="1" comment="qt6-networkauth-examples is &lt;6.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938472" version="1" comment="qt6-networkauth-private-devel is &lt;6.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938473" version="1" comment="chromedriver is &lt;125.0.6422.112-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938474" version="1" comment="chromium is &lt;125.0.6422.112-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938475" version="1" comment="gstreamer-plugins-base is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938476" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938477" version="1" comment="gstreamer-plugins-base-devel is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938478" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938479" version="1" comment="gstreamer-plugins-base-lang is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938480" version="1" comment="libgstallocators-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938481" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938482" version="1" comment="libgstapp-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938483" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938484" version="1" comment="libgstaudio-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938485" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938486" version="1" comment="libgstfft-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938487" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938488" version="1" comment="libgstgl-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938489" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938490" version="1" comment="libgstpbutils-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938491" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938492" version="1" comment="libgstriff-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938493" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938494" version="1" comment="libgstrtp-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938495" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938496" version="1" comment="libgstrtsp-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938497" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938498" version="1" comment="libgstsdp-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938499" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938500" version="1" comment="libgsttag-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938501" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938502" version="1" comment="libgstvideo-1_0-0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938503" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938504" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938505" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938506" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938507" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938508" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938509" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938510" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938511" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938512" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938513" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938514" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938515" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938516" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938517" version="1" comment="libQt5NetworkAuth5 is &lt;5.15.13+kde1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938518" version="1" comment="libqt5-qtnetworkauth-devel is &lt;5.15.13+kde1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938519" version="1" comment="libqt5-qtnetworkauth-examples is &lt;5.15.13+kde1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938520" version="1" comment="libqt5-qtnetworkauth-private-headers-devel is &lt;5.15.13+kde1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938521" version="1" comment="jupyter-plotly is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938522" version="1" comment="python310-plotly is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938523" version="1" comment="python310-plotly-jupyter is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938524" version="1" comment="python311-plotly is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938525" version="1" comment="python311-plotly-jupyter is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938526" version="1" comment="python312-plotly is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938527" version="1" comment="python312-plotly-jupyter is &lt;5.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938528" version="1" comment="squid is &lt;6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938529" version="1" comment="cargo-audit-advisory-db is &lt;20240528-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938530" version="1" comment="ffmpeg-5 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938531" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938532" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938533" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938534" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938535" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938536" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938537" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938538" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938539" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938540" version="1" comment="libavcodec59 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938541" version="1" comment="libavcodec59-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938542" version="1" comment="libavdevice59 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938543" version="1" comment="libavdevice59-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938544" version="1" comment="libavfilter8 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938545" version="1" comment="libavfilter8-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938546" version="1" comment="libavformat59 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938547" version="1" comment="libavformat59-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938548" version="1" comment="libavutil57 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938549" version="1" comment="libavutil57-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938550" version="1" comment="libpostproc56 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938551" version="1" comment="libpostproc56-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938552" version="1" comment="libswresample4_ff5 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938553" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938554" version="1" comment="libswscale6 is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938555" version="1" comment="libswscale6-32bit is &lt;5.1.4-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938556" version="1" comment="minidlna is &lt;1.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938557" version="1" comment="system-user-velociraptor is &lt;1.0.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938558" version="1" comment="velociraptor is &lt;0.7.0.4.git74.3426c0a-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938559" version="1" comment="chromedriver is &lt;125.0.6422.141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938560" version="1" comment="chromium is &lt;125.0.6422.141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938561" version="1" comment="caddy is &lt;2.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938562" version="1" comment="gitleaks is &lt;8.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938563" version="1" comment="libhtp-devel is &lt;0.5.48-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938564" version="1" comment="libhtp2 is &lt;0.5.48-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938565" version="1" comment="liblzma5 is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938566" version="1" comment="liblzma5-32bit is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938567" version="1" comment="liblzma5-x86-64-v3 is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938568" version="1" comment="xz is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938569" version="1" comment="xz-devel is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938570" version="1" comment="xz-devel-32bit is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938571" version="1" comment="xz-lang is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938572" version="1" comment="plasma6-session is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938573" version="1" comment="plasma6-session-x11 is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938574" version="1" comment="plasma6-workspace is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938575" version="1" comment="plasma6-workspace-devel is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938576" version="1" comment="plasma6-workspace-lang is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938577" version="1" comment="plasma6-workspace-libs is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938578" version="1" comment="sddm-qt6-branding-openSUSE is &lt;6.0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938579" version="1" comment="skopeo is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938580" version="1" comment="skopeo-bash-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938581" version="1" comment="skopeo-fish-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938582" version="1" comment="skopeo-zsh-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938583" version="1" comment="go1.22 is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938584" version="1" comment="go1.22-doc is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938585" version="1" comment="go1.22-libstd is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938586" version="1" comment="go1.22-race is &lt;1.22.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938587" version="1" comment="cJSON-devel is &lt;1.7.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938588" version="1" comment="libcjson1 is &lt;1.7.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938589" version="1" comment="freerdp2 is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938590" version="1" comment="freerdp2-devel is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938591" version="1" comment="freerdp2-proxy is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938592" version="1" comment="freerdp2-server is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938593" version="1" comment="libfreerdp2-2 is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938594" version="1" comment="libwinpr2-2 is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938595" version="1" comment="winpr2-devel is &lt;2.11.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938596" version="1" comment="go1.21 is &lt;1.21.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938597" version="1" comment="go1.21-doc is &lt;1.21.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938598" version="1" comment="go1.21-libstd is &lt;1.21.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938599" version="1" comment="go1.21-race is &lt;1.21.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938600" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.90.07-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938601" version="1" comment="corepack21 is &lt;21.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938602" version="1" comment="nodejs21 is &lt;21.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938603" version="1" comment="nodejs21-devel is &lt;21.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938604" version="1" comment="nodejs21-docs is &lt;21.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938605" version="1" comment="npm21 is &lt;21.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938606" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;550.90.07-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938607" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.90.07_k6.9.3_1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938608" version="1" comment="WPEWebDriver is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938609" version="1" comment="libWPEWebInspectorResources is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938610" version="1" comment="libWPEWebKit-2_0-1 is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938611" version="1" comment="wpewebkit-2_0-injected-bundles is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938612" version="1" comment="wpewebkit-devel is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938613" version="1" comment="wpewebkit-minibrowser is &lt;2.44.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938614" version="1" comment="python310-openpyxl is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938615" version="1" comment="python311-openpyxl is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938616" version="1" comment="python312-openpyxl is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938617" version="1" comment="python310-setuptools is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938618" version="1" comment="python310-setuptools-wheel is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938619" version="1" comment="python311-setuptools is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938620" version="1" comment="python311-setuptools-wheel is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938621" version="1" comment="python312-setuptools is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938622" version="1" comment="python312-setuptools-wheel is &lt;70.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938623" version="1" comment="trivy is &lt;0.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938624" version="1" comment="dnsmasq is &lt;2.90-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938625" version="1" comment="dnsmasq-utils is &lt;2.90-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938626" version="1" comment="okteto is &lt;2.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938627" version="1" comment="php8 is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938628" version="1" comment="php8-bcmath is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938629" version="1" comment="php8-bz2 is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938630" version="1" comment="php8-calendar is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938631" version="1" comment="php8-cli is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938632" version="1" comment="php8-ctype is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938633" version="1" comment="php8-curl is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938634" version="1" comment="php8-dba is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938635" version="1" comment="php8-devel is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938636" version="1" comment="php8-dom is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938637" version="1" comment="php8-enchant is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938638" version="1" comment="php8-exif is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938639" version="1" comment="php8-ffi is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938640" version="1" comment="php8-fileinfo is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938641" version="1" comment="php8-ftp is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938642" version="1" comment="php8-gd is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938643" version="1" comment="php8-gettext is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938644" version="1" comment="php8-gmp is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938645" version="1" comment="php8-iconv is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938646" version="1" comment="php8-intl is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938647" version="1" comment="php8-ldap is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938648" version="1" comment="php8-mbstring is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938649" version="1" comment="php8-mysql is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938650" version="1" comment="php8-odbc is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938651" version="1" comment="php8-opcache is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938652" version="1" comment="php8-openssl is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938653" version="1" comment="php8-pcntl is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938654" version="1" comment="php8-pdo is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938655" version="1" comment="php8-pgsql is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938656" version="1" comment="php8-phar is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938657" version="1" comment="php8-posix is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938658" version="1" comment="php8-readline is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938659" version="1" comment="php8-shmop is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938660" version="1" comment="php8-snmp is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938661" version="1" comment="php8-soap is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938662" version="1" comment="php8-sockets is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938663" version="1" comment="php8-sodium is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938664" version="1" comment="php8-sqlite is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938665" version="1" comment="php8-sysvmsg is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938666" version="1" comment="php8-sysvsem is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938667" version="1" comment="php8-sysvshm is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938668" version="1" comment="php8-tidy is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938669" version="1" comment="php8-tokenizer is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938670" version="1" comment="php8-xmlreader is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938671" version="1" comment="php8-xmlwriter is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938672" version="1" comment="php8-xsl is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938673" version="1" comment="php8-zip is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938674" version="1" comment="php8-zlib is &lt;8.3.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938675" version="1" comment="nano is &lt;8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938676" version="1" comment="nano-lang is &lt;8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938677" version="1" comment="python310-Authlib is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938678" version="1" comment="python311-Authlib is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938679" version="1" comment="python312-Authlib is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938680" version="1" comment="python310-social-auth-app-django is &lt;5.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938681" version="1" comment="python311-social-auth-app-django is &lt;5.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938682" version="1" comment="python312-social-auth-app-django is &lt;5.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938683" version="1" comment="python310-w3lib is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938684" version="1" comment="python311-w3lib is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938685" version="1" comment="python312-w3lib is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938686" version="1" comment="frr is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938687" version="1" comment="frr-devel is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938688" version="1" comment="libfrr0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938689" version="1" comment="libfrr_pb0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938690" version="1" comment="libfrrcares0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938691" version="1" comment="libfrrfpm_pb0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938692" version="1" comment="libfrrospfapiclient0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938693" version="1" comment="libfrrsnmp0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938694" version="1" comment="libfrrzmq0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938695" version="1" comment="libmlag_pb0 is &lt;8.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938696" version="1" comment="liboqs-devel is &lt;0.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938697" version="1" comment="liboqs5 is &lt;0.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938698" version="1" comment="php-composer2 is &lt;2.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938699" version="1" comment="cups is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938700" version="1" comment="cups-client is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938701" version="1" comment="cups-config is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938702" version="1" comment="cups-ddk is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938703" version="1" comment="cups-devel is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938704" version="1" comment="cups-devel-32bit is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938705" version="1" comment="libcups2 is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938706" version="1" comment="libcups2-32bit is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938707" version="1" comment="libcupsimage2 is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938708" version="1" comment="libcupsimage2-32bit is &lt;2.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938709" version="1" comment="python310-Werkzeug is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938710" version="1" comment="python311-Werkzeug is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938711" version="1" comment="python312-Werkzeug is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938712" version="1" comment="python310-scikit-learn is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938713" version="1" comment="python311-scikit-learn is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938714" version="1" comment="python312-scikit-learn is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938715" version="1" comment="MozillaFirefox is &lt;127.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938716" version="1" comment="MozillaFirefox-branding-upstream is &lt;127.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938717" version="1" comment="MozillaFirefox-devel is &lt;127.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938718" version="1" comment="MozillaFirefox-translations-common is &lt;127.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938719" version="1" comment="MozillaFirefox-translations-other is &lt;127.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938720" version="1" comment="booth is &lt;1.2+git0.322fea0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938721" version="1" comment="booth-test is &lt;1.2+git0.322fea0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938722" version="1" comment="libntfs-3g-devel is &lt;2022.10.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938723" version="1" comment="libntfs-3g89 is &lt;2022.10.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938724" version="1" comment="ntfs-3g is &lt;2022.10.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938725" version="1" comment="ntfsprogs is &lt;2022.10.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938726" version="1" comment="ntfsprogs-extra is &lt;2022.10.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938727" version="1" comment="python310-eventlet is &lt;0.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938728" version="1" comment="python311-eventlet is &lt;0.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938729" version="1" comment="python312-eventlet is &lt;0.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938730" version="1" comment="teleport is &lt;15.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938731" version="1" comment="teleport-fdpass-teleport is &lt;15.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938732" version="1" comment="teleport-tbot is &lt;15.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938733" version="1" comment="teleport-tctl is &lt;15.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938734" version="1" comment="teleport-tsh is &lt;15.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938735" version="1" comment="MozillaThunderbird is &lt;115.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938736" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938737" version="1" comment="MozillaThunderbird-translations-common is &lt;115.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938738" version="1" comment="MozillaThunderbird-translations-other is &lt;115.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938739" version="1" comment="forgejo is &lt;7.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938740" version="1" comment="forgejo-apparmor is &lt;7.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938741" version="1" comment="forgejo-selinux is &lt;7.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938742" version="1" comment="keylime-config is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938743" version="1" comment="keylime-firewalld is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938744" version="1" comment="keylime-logrotate is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938745" version="1" comment="keylime-registrar is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938746" version="1" comment="keylime-tenant is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938747" version="1" comment="keylime-tpm_cert_store is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938748" version="1" comment="keylime-verifier is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938749" version="1" comment="python310-keylime is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938750" version="1" comment="python311-keylime is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938751" version="1" comment="python312-keylime is &lt;7.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938752" version="1" comment="pgadmin4 is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938753" version="1" comment="pgadmin4-cloud is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938754" version="1" comment="pgadmin4-desktop is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938755" version="1" comment="pgadmin4-doc is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938756" version="1" comment="pgadmin4-web-uwsgi is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938757" version="1" comment="system-user-pgadmin is &lt;8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938758" version="1" comment="rclone is &lt;1.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938759" version="1" comment="rclone-bash-completion is &lt;1.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938760" version="1" comment="rclone-zsh-completion is &lt;1.67.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938761" version="1" comment="oqs-provider is &lt;0.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938762" version="1" comment="python310-urllib3 is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938763" version="1" comment="python311-urllib3 is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938764" version="1" comment="python312-urllib3 is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938765" version="1" comment="wget is &lt;1.24.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938766" version="1" comment="wget-lang is &lt;1.24.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938767" version="1" comment="sngrep is &lt;1.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938768" version="1" comment="kubevirt-container-disk is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938769" version="1" comment="kubevirt-manifests is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938770" version="1" comment="kubevirt-pr-helper-conf is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938771" version="1" comment="kubevirt-tests is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938772" version="1" comment="kubevirt-virt-api is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938773" version="1" comment="kubevirt-virt-controller is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938774" version="1" comment="kubevirt-virt-exportproxy is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938775" version="1" comment="kubevirt-virt-exportserver is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938776" version="1" comment="kubevirt-virt-handler is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938777" version="1" comment="kubevirt-virt-launcher is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938778" version="1" comment="kubevirt-virt-operator is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938779" version="1" comment="kubevirt-virtctl is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938780" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938781" version="1" comment="singularity-ce is &lt;4.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938782" version="1" comment="gnome-settings-daemon is &lt;46.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938783" version="1" comment="gnome-settings-daemon-devel is &lt;46.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938784" version="1" comment="gnome-settings-daemon-lang is &lt;46.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938785" version="1" comment="perl-DBI is &lt;1.643-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938786" version="1" comment="python310-dnspython is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938787" version="1" comment="python311-dnspython is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938788" version="1" comment="python312-dnspython is &lt;2.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938789" version="1" comment="python38 is &lt;3.8.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938790" version="1" comment="python38-curses is &lt;3.8.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938791" version="1" comment="python38-dbm is &lt;3.8.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938792" version="1" comment="python38-idle is &lt;3.8.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938793" version="1" comment="python38-tk is &lt;3.8.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938794" version="1" comment="python39 is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938795" version="1" comment="python39-32bit is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938796" version="1" comment="python39-curses is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938797" version="1" comment="python39-dbm is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938798" version="1" comment="python39-idle is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938799" version="1" comment="python39-tk is &lt;3.9.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938800" version="1" comment="python310-django-allauth is &lt;0.63.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938801" version="1" comment="python311-django-allauth is &lt;0.63.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938802" version="1" comment="python312-django-allauth is &lt;0.63.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938803" version="1" comment="python310 is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938804" version="1" comment="python310-32bit is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938805" version="1" comment="python310-curses is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938806" version="1" comment="python310-dbm is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938807" version="1" comment="python310-idle is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938808" version="1" comment="python310-tk is &lt;3.10.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938809" version="1" comment="ruby3.3-rubygem-actionpack-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938810" version="1" comment="ruby3.3-rubygem-actiontext-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938811" version="1" comment="ruby3.3-rubygem-activerecord-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938812" version="1" comment="ruby3.3-rubygem-activestorage-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938813" version="1" comment="ruby3.3-rubygem-activesupport-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938814" version="1" comment="ruby3.3-rubygem-fluentd is &lt;1.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938815" version="1" comment="ruby3.3-rubygem-http-cookie is &lt;1.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938816" version="1" comment="ruby3.3-rubygem-rails-7.0 is &lt;7.0.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938817" version="1" comment="ruby3.3-rubygem-sprockets-3.7 is &lt;3.7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938818" version="1" comment="traefik2 is &lt;2.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938819" version="1" comment="helmfile is &lt;0.166.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938820" version="1" comment="helmfile-bash-completion is &lt;0.166.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938821" version="1" comment="helmfile-fish-completion is &lt;0.166.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938822" version="1" comment="helmfile-zsh-completion is &lt;0.166.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938823" version="1" comment="python38 is &lt;3.8.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938824" version="1" comment="python38-curses is &lt;3.8.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938825" version="1" comment="python38-dbm is &lt;3.8.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938826" version="1" comment="python38-idle is &lt;3.8.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938827" version="1" comment="python38-tk is &lt;3.8.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938828" version="1" comment="python39 is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938829" version="1" comment="python39-32bit is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938830" version="1" comment="python39-curses is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938831" version="1" comment="python39-dbm is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938832" version="1" comment="python39-idle is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938833" version="1" comment="python39-tk is &lt;3.9.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938834" version="1" comment="squid is &lt;6.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938835" version="1" comment="containerd is &lt;1.7.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938836" version="1" comment="containerd-ctr is &lt;1.7.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938837" version="1" comment="containerd-devel is &lt;1.7.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938838" version="1" comment="python311 is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938839" version="1" comment="python311-32bit is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938840" version="1" comment="python311-curses is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938841" version="1" comment="python311-dbm is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938842" version="1" comment="python311-idle is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938843" version="1" comment="python311-tk is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938844" version="1" comment="python311-x86-64-v3 is &lt;3.11.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938845" version="1" comment="python310 is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938846" version="1" comment="python310-32bit is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938847" version="1" comment="python310-curses is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938848" version="1" comment="python310-dbm is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938849" version="1" comment="python310-idle is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938850" version="1" comment="python310-tk is &lt;3.10.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938851" version="1" comment="nodejs-electron is &lt;29.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938852" version="1" comment="nodejs-electron-devel is &lt;29.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938853" version="1" comment="nodejs-electron-doc is &lt;29.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938854" version="1" comment="fiona-fio is &lt;1.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938855" version="1" comment="python310-Fiona is &lt;1.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938856" version="1" comment="python311-Fiona is &lt;1.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938857" version="1" comment="python312-Fiona is &lt;1.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938858" version="1" comment="python310-Js2Py is &lt;0.74-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938859" version="1" comment="python311-Js2Py is &lt;0.74-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938860" version="1" comment="python312-Js2Py is &lt;0.74-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938861" version="1" comment="clamav is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938862" version="1" comment="clamav-devel is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938863" version="1" comment="clamav-docs-html is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938864" version="1" comment="clamav-milter is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938865" version="1" comment="libclamav12 is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938866" version="1" comment="libclammspack0 is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938867" version="1" comment="libfreshclam3 is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938868" version="1" comment="openssh is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938869" version="1" comment="openssh-cavs is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938870" version="1" comment="openssh-clients is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938871" version="1" comment="openssh-common is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938872" version="1" comment="openssh-fips is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938873" version="1" comment="openssh-helpers is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938874" version="1" comment="openssh-server is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938875" version="1" comment="openssh-server-config-rootlogin is &lt;9.6p1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938876" version="1" comment="python310-PyYAML is &lt;6.0.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938877" version="1" comment="python311-PyYAML is &lt;6.0.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938878" version="1" comment="python312-PyYAML is &lt;6.0.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938879" version="1" comment="ghostscript is &lt;10.03.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938880" version="1" comment="ghostscript-devel is &lt;10.03.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938881" version="1" comment="ghostscript-x11 is &lt;10.03.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938882" version="1" comment="go1.21 is &lt;1.21.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938883" version="1" comment="go1.21-doc is &lt;1.21.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938884" version="1" comment="go1.21-libstd is &lt;1.21.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938885" version="1" comment="go1.21-race is &lt;1.21.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938886" version="1" comment="golang-github-prometheus-prometheus is &lt;2.53.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938887" version="1" comment="libpoppler-cpp1 is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938888" version="1" comment="libpoppler-cpp1-32bit is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938889" version="1" comment="libpoppler-devel is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938890" version="1" comment="libpoppler-glib-devel is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938891" version="1" comment="libpoppler-glib8 is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938892" version="1" comment="libpoppler-glib8-32bit is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938893" version="1" comment="libpoppler139 is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938894" version="1" comment="libpoppler139-32bit is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938895" version="1" comment="poppler-tools is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938896" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;24.07.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938897" version="1" comment="python310-yt-dlp is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938898" version="1" comment="python311-yt-dlp is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938899" version="1" comment="python312-yt-dlp is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938900" version="1" comment="yt-dlp is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938901" version="1" comment="yt-dlp-bash-completion is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938902" version="1" comment="yt-dlp-fish-completion is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938903" version="1" comment="yt-dlp-zsh-completion is &lt;2024.07.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938904" version="1" comment="MozillaThunderbird is &lt;115.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938905" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938906" version="1" comment="MozillaThunderbird-translations-common is &lt;115.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938907" version="1" comment="MozillaThunderbird-translations-other is &lt;115.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938908" version="1" comment="cockpit is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938909" version="1" comment="cockpit-bridge is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938910" version="1" comment="cockpit-devel is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938911" version="1" comment="cockpit-doc is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938912" version="1" comment="cockpit-kdump is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938913" version="1" comment="cockpit-networkmanager is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938914" version="1" comment="cockpit-packagekit is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938915" version="1" comment="cockpit-pcp is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938916" version="1" comment="cockpit-selinux is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938917" version="1" comment="cockpit-storaged is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938918" version="1" comment="cockpit-system is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938919" version="1" comment="cockpit-ws is &lt;320-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938920" version="1" comment="ffmpeg-7 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938921" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938922" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938923" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938924" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938925" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938926" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938927" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938928" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938929" version="1" comment="libavcodec61 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938930" version="1" comment="libavdevice61 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938931" version="1" comment="libavfilter10 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938932" version="1" comment="libavformat61 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938933" version="1" comment="libavutil59 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938934" version="1" comment="libpostproc58 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938935" version="1" comment="libswresample5 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938936" version="1" comment="libswscale8 is &lt;7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938937" version="1" comment="go1.22 is &lt;1.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938938" version="1" comment="go1.22-doc is &lt;1.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938939" version="1" comment="go1.22-libstd is &lt;1.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938940" version="1" comment="go1.22-race is &lt;1.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938941" version="1" comment="gomuks is &lt;0.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938942" version="1" comment="libvpx-devel is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938943" version="1" comment="libvpx9 is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938944" version="1" comment="libvpx9-32bit is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938945" version="1" comment="vpx-tools is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938946" version="1" comment="netty3 is &lt;3.10.6-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938947" version="1" comment="netty3-javadoc is &lt;3.10.6-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938948" version="1" comment="podman is &lt;5.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938949" version="1" comment="podman-docker is &lt;5.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938950" version="1" comment="podman-remote is &lt;5.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938951" version="1" comment="podmansh is &lt;5.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938952" version="1" comment="python310-nltk is &lt;3.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938953" version="1" comment="python311-nltk is &lt;3.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938954" version="1" comment="python312-nltk is &lt;3.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938955" version="1" comment="sops is &lt;3.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938956" version="1" comment="teleport is &lt;15.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938957" version="1" comment="teleport-fdpass-teleport is &lt;15.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938958" version="1" comment="teleport-tbot is &lt;15.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938959" version="1" comment="teleport-tctl is &lt;15.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938960" version="1" comment="teleport-tsh is &lt;15.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938961" version="1" comment="agama-web-ui is &lt;9+52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938962" version="1" comment="forgejo is &lt;7.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938963" version="1" comment="forgejo-apparmor is &lt;7.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938964" version="1" comment="forgejo-selinux is &lt;7.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938965" version="1" comment="kbfs is &lt;6.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938966" version="1" comment="kbfs-git is &lt;6.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938967" version="1" comment="kbfs-tool is &lt;6.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938968" version="1" comment="keybase-client is &lt;6.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938969" version="1" comment="python313 is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938970" version="1" comment="python313-curses is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938971" version="1" comment="python313-dbm is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938972" version="1" comment="python313-idle is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938973" version="1" comment="python313-tk is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938974" version="1" comment="python313-x86-64-v3 is &lt;3.13.0~b3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938975" version="1" comment="rmt-server is &lt;2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938976" version="1" comment="rmt-server-config is &lt;2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938977" version="1" comment="rmt-server-pubcloud is &lt;2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938978" version="1" comment="krb5 is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938979" version="1" comment="krb5-32bit is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938980" version="1" comment="krb5-client is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938981" version="1" comment="krb5-devel is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938982" version="1" comment="krb5-devel-32bit is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938983" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938984" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938985" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938986" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938987" version="1" comment="krb5-server is &lt;1.21.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938988" version="1" comment="libndp is &lt;1.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938989" version="1" comment="libndp-devel is &lt;1.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938990" version="1" comment="libndp0 is &lt;1.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938991" version="1" comment="openssh is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938992" version="1" comment="openssh-cavs is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938993" version="1" comment="openssh-clients is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938994" version="1" comment="openssh-common is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938995" version="1" comment="openssh-fips is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938996" version="1" comment="openssh-helpers is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938997" version="1" comment="openssh-server is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938998" version="1" comment="openssh-server-config-rootlogin is &lt;9.6p1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009938999" version="1" comment="libQt6Concurrent6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939000" version="1" comment="libQt6Core6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939001" version="1" comment="libQt6DBus6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939002" version="1" comment="libQt6Gui6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939003" version="1" comment="libQt6Network6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939004" version="1" comment="libQt6OpenGL6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939005" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939006" version="1" comment="libQt6PrintSupport6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939007" version="1" comment="libQt6Sql6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939008" version="1" comment="libQt6Test6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939009" version="1" comment="libQt6Widgets6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939010" version="1" comment="libQt6Xml6 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939011" version="1" comment="qt6-base-common-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939012" version="1" comment="qt6-base-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939013" version="1" comment="qt6-base-examples is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939014" version="1" comment="qt6-base-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939015" version="1" comment="qt6-concurrent-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939016" version="1" comment="qt6-core-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939017" version="1" comment="qt6-core-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939018" version="1" comment="qt6-dbus-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939019" version="1" comment="qt6-dbus-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939020" version="1" comment="qt6-docs-common is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939021" version="1" comment="qt6-exampleicons-devel-static is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939022" version="1" comment="qt6-gui-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939023" version="1" comment="qt6-gui-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939024" version="1" comment="qt6-kmssupport-devel-static is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939025" version="1" comment="qt6-kmssupport-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939026" version="1" comment="qt6-network-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939027" version="1" comment="qt6-network-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939028" version="1" comment="qt6-network-tls is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939029" version="1" comment="qt6-networkinformation-glib is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939030" version="1" comment="qt6-networkinformation-nm is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939031" version="1" comment="qt6-opengl-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939032" version="1" comment="qt6-opengl-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939033" version="1" comment="qt6-openglwidgets-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939034" version="1" comment="qt6-platformsupport-devel-static is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939035" version="1" comment="qt6-platformsupport-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939036" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939037" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939038" version="1" comment="qt6-printsupport-cups is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939039" version="1" comment="qt6-printsupport-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939040" version="1" comment="qt6-printsupport-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939041" version="1" comment="qt6-sql-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939042" version="1" comment="qt6-sql-mysql is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939043" version="1" comment="qt6-sql-postgresql is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939044" version="1" comment="qt6-sql-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939045" version="1" comment="qt6-sql-sqlite is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939046" version="1" comment="qt6-sql-unixODBC is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939047" version="1" comment="qt6-test-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939048" version="1" comment="qt6-test-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939049" version="1" comment="qt6-widgets-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939050" version="1" comment="qt6-widgets-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939051" version="1" comment="qt6-xml-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939052" version="1" comment="qt6-xml-private-devel is &lt;6.7.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939053" version="1" comment="znc is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939054" version="1" comment="znc-devel is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939055" version="1" comment="znc-lang is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939056" version="1" comment="znc-perl is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939057" version="1" comment="znc-python3 is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939058" version="1" comment="znc-tcl is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939059" version="1" comment="apache2 is &lt;2.4.61-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939060" version="1" comment="emacs is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939061" version="1" comment="emacs-el is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939062" version="1" comment="emacs-eln is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939063" version="1" comment="emacs-info is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939064" version="1" comment="emacs-nox is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939065" version="1" comment="emacs-x11 is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939066" version="1" comment="etags is &lt;29.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939067" version="1" comment="python310-certifi is &lt;2024.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939068" version="1" comment="python311-certifi is &lt;2024.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939069" version="1" comment="python312-certifi is &lt;2024.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939070" version="1" comment="tomcat is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939071" version="1" comment="tomcat-admin-webapps is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939072" version="1" comment="tomcat-docs-webapp is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939073" version="1" comment="tomcat-el-3_0-api is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939074" version="1" comment="tomcat-embed is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939075" version="1" comment="tomcat-javadoc is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939076" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939077" version="1" comment="tomcat-jsvc is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939078" version="1" comment="tomcat-lib is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939079" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939080" version="1" comment="tomcat-webapps is &lt;9.0.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939081" version="1" comment="tomcat10 is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939082" version="1" comment="tomcat10-admin-webapps is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939083" version="1" comment="tomcat10-doc is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939084" version="1" comment="tomcat10-docs-webapp is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939085" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939086" version="1" comment="tomcat10-embed is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939087" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939088" version="1" comment="tomcat10-jsvc is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939089" version="1" comment="tomcat10-lib is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939090" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939091" version="1" comment="tomcat10-webapps is &lt;10.1.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939092" version="1" comment="cadvisor is &lt;0.49.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939093" version="1" comment="chromedriver is &lt;126.0.6478.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939094" version="1" comment="chromium is &lt;126.0.6478.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939095" version="1" comment="global is &lt;6.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939096" version="1" comment="gettext-its-gtk3 is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939097" version="1" comment="gtk3-branding-upstream is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939098" version="1" comment="gtk3-data is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939099" version="1" comment="gtk3-devel is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939100" version="1" comment="gtk3-devel-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939101" version="1" comment="gtk3-devel-doc is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939102" version="1" comment="gtk3-immodule-amharic is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939103" version="1" comment="gtk3-immodule-amharic-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939104" version="1" comment="gtk3-immodule-broadway is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939105" version="1" comment="gtk3-immodule-inuktitut is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939106" version="1" comment="gtk3-immodule-inuktitut-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939107" version="1" comment="gtk3-immodule-multipress is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939108" version="1" comment="gtk3-immodule-multipress-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939109" version="1" comment="gtk3-immodule-thai is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939110" version="1" comment="gtk3-immodule-thai-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939111" version="1" comment="gtk3-immodule-tigrigna is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939112" version="1" comment="gtk3-immodule-tigrigna-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939113" version="1" comment="gtk3-immodule-vietnamese is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939114" version="1" comment="gtk3-immodule-vietnamese-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939115" version="1" comment="gtk3-immodule-xim is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939116" version="1" comment="gtk3-immodule-xim-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939117" version="1" comment="gtk3-lang is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939118" version="1" comment="gtk3-schema is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939119" version="1" comment="gtk3-tools is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939120" version="1" comment="gtk3-tools-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939121" version="1" comment="libgtk-3-0 is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939122" version="1" comment="libgtk-3-0-32bit is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939123" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.24.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939124" version="1" comment="iwd is &lt;2.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939125" version="1" comment="obs-service-download_url is &lt;0.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939126" version="1" comment="python310-Babel is &lt;2.14.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939127" version="1" comment="python311-Babel is &lt;2.14.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939128" version="1" comment="python312-Babel is &lt;2.14.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939129" version="1" comment="python310-CherryPy is &lt;18.9.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939130" version="1" comment="python311-CherryPy is &lt;18.9.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939131" version="1" comment="python312-CherryPy is &lt;18.9.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939132" version="1" comment="python310-Flask-Cors is &lt;4.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939133" version="1" comment="python311-Flask-Cors is &lt;4.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939134" version="1" comment="python312-Flask-Cors is &lt;4.0.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939135" version="1" comment="python-Scrapy-doc is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939136" version="1" comment="python310-Scrapy is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939137" version="1" comment="python311-Scrapy is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939138" version="1" comment="python312-Scrapy is &lt;2.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939139" version="1" comment="python310-XStatic-jquery-ui is &lt;1.13.0.1-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939140" version="1" comment="python311-XStatic-jquery-ui is &lt;1.13.0.1-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939141" version="1" comment="python312-XStatic-jquery-ui is &lt;1.13.0.1-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939142" version="1" comment="python310-asyncpg is &lt;0.29.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939143" version="1" comment="python311-asyncpg is &lt;0.29.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939144" version="1" comment="python312-asyncpg is &lt;0.29.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939145" version="1" comment="python310-bjoern is &lt;3.2.2-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939146" version="1" comment="python311-bjoern is &lt;3.2.2-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939147" version="1" comment="python312-bjoern is &lt;3.2.2-1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939148" version="1" comment="python310-bleach is &lt;6.1.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939149" version="1" comment="python311-bleach is &lt;6.1.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939150" version="1" comment="python312-bleach is &lt;6.1.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939151" version="1" comment="python310-bugzilla is &lt;3.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939152" version="1" comment="python311-bugzilla is &lt;3.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939153" version="1" comment="python312-bugzilla is &lt;3.2.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939154" version="1" comment="python310-colander is &lt;2.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939155" version="1" comment="python311-colander is &lt;2.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939156" version="1" comment="python312-colander is &lt;2.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939157" version="1" comment="python310-django-debug-toolbar is &lt;4.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939158" version="1" comment="python311-django-debug-toolbar is &lt;4.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939159" version="1" comment="python312-django-debug-toolbar is &lt;4.3-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939160" version="1" comment="python310-django-registration is &lt;3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939161" version="1" comment="python311-django-registration is &lt;3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939162" version="1" comment="python312-django-registration is &lt;3.3-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939163" version="1" comment="python310-dulwich is &lt;0.21.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939164" version="1" comment="python311-dulwich is &lt;0.21.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939165" version="1" comment="python312-dulwich is &lt;0.21.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939166" version="1" comment="python310-hpack is &lt;4.0.0-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939167" version="1" comment="python311-hpack is &lt;4.0.0-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939168" version="1" comment="python312-hpack is &lt;4.0.0-2.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939169" version="1" comment="python310-httplib2 is &lt;0.22.0-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939170" version="1" comment="python311-httplib2 is &lt;0.22.0-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939171" version="1" comment="python312-httplib2 is &lt;0.22.0-4.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939172" version="1" comment="python310-impacket is &lt;0.11.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939173" version="1" comment="python311-impacket is &lt;0.11.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939174" version="1" comment="python312-impacket is &lt;0.11.0-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939175" version="1" comment="python310-jupyter-server is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939176" version="1" comment="python310-jupyter-server-test is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939177" version="1" comment="python311-jupyter-server is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939178" version="1" comment="python311-jupyter-server-test is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939179" version="1" comment="python312-jupyter-server is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939180" version="1" comment="python312-jupyter-server-test is &lt;2.13.0-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939181" version="1" comment="python310-kubernetes is &lt;28.1.0-4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939182" version="1" comment="python311-kubernetes is &lt;28.1.0-4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939183" version="1" comment="python312-kubernetes is &lt;28.1.0-4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939184" version="1" comment="python310-logilab-common is &lt;1.11.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939185" version="1" comment="python311-logilab-common is &lt;1.11.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939186" version="1" comment="python312-logilab-common is &lt;1.11.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939187" version="1" comment="python310-markdown2 is &lt;2.4.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939188" version="1" comment="python311-markdown2 is &lt;2.4.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939189" version="1" comment="python312-markdown2 is &lt;2.4.13-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939190" version="1" comment="python-marshmallow-doc is &lt;3.20.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939191" version="1" comment="python310-marshmallow is &lt;3.20.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939192" version="1" comment="python311-marshmallow is &lt;3.20.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939193" version="1" comment="python312-marshmallow is &lt;3.20.2-2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939194" version="1" comment="python310-mistune is &lt;3.0.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939195" version="1" comment="python311-mistune is &lt;3.0.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939196" version="1" comment="python312-mistune is &lt;3.0.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939197" version="1" comment="python310-mysql-connector-python is &lt;8.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939198" version="1" comment="python311-mysql-connector-python is &lt;8.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939199" version="1" comment="python312-mysql-connector-python is &lt;8.2.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939200" version="1" comment="python310-oic is &lt;1.5.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939201" version="1" comment="python311-oic is &lt;1.5.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939202" version="1" comment="python312-oic is &lt;1.5.0-1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939203" version="1" comment="python310-oletools is &lt;0.60.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939204" version="1" comment="python311-oletools is &lt;0.60.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939205" version="1" comment="python312-oletools is &lt;0.60.1-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939206" version="1" comment="python310-openapi-spec-validator is &lt;0.7.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939207" version="1" comment="python311-openapi-spec-validator is &lt;0.7.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939208" version="1" comment="python312-openapi-spec-validator is &lt;0.7.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939209" version="1" comment="python310-py is &lt;1.11.0-6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939210" version="1" comment="python311-py is &lt;1.11.0-6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939211" version="1" comment="python312-py is &lt;1.11.0-6.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939212" version="1" comment="python310-pyOpenSSL is &lt;24.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939213" version="1" comment="python311-pyOpenSSL is &lt;24.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939214" version="1" comment="python312-pyOpenSSL is &lt;24.1.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939215" version="1" comment="python310-pyramid is &lt;2.0.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939216" version="1" comment="python311-pyramid is &lt;2.0.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939217" version="1" comment="python312-pyramid is &lt;2.0.2-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939218" version="1" comment="python310-pysaml2 is &lt;7.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939219" version="1" comment="python311-pysaml2 is &lt;7.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939220" version="1" comment="python312-pysaml2 is &lt;7.4.2-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939221" version="1" comment="python310-python-engineio is &lt;4.3.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939222" version="1" comment="python311-python-engineio is &lt;4.3.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939223" version="1" comment="python312-python-engineio is &lt;4.3.4-3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939224" version="1" comment="python310-python-gnupg is &lt;0.5.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939225" version="1" comment="python311-python-gnupg is &lt;0.5.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939226" version="1" comment="python312-python-gnupg is &lt;0.5.2-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939227" version="1" comment="python310-python3-saml is &lt;1.15.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939228" version="1" comment="python311-python3-saml is &lt;1.15.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939229" version="1" comment="python312-python3-saml is &lt;1.15.0-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939230" version="1" comment="python310-reportlab is &lt;4.0.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939231" version="1" comment="python311-reportlab is &lt;4.0.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939232" version="1" comment="python312-reportlab is &lt;4.0.7-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939233" version="1" comment="python310-rope is &lt;1.12.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939234" version="1" comment="python311-rope is &lt;1.12.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939235" version="1" comment="python312-rope is &lt;1.12.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939236" version="1" comment="python310-rpyc is &lt;6.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939237" version="1" comment="python311-rpyc is &lt;6.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939238" version="1" comment="python312-rpyc is &lt;6.0.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939239" version="1" comment="python310-rsa is &lt;4.9-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009091842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939240" version="1" comment="python311-rsa is &lt;4.9-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009091842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939241" version="1" comment="python312-rsa is &lt;4.9-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009091842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939242" version="1" comment="python310-ruamel.yaml is &lt;0.18.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939243" version="1" comment="python311-ruamel.yaml is &lt;0.18.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939244" version="1" comment="python312-ruamel.yaml is &lt;0.18.6-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939245" version="1" comment="python310-slixmpp is &lt;1.8.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939246" version="1" comment="python311-slixmpp is &lt;1.8.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939247" version="1" comment="python312-slixmpp is &lt;1.8.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939248" version="1" comment="python310-websockets is &lt;12.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939249" version="1" comment="python311-websockets is &lt;12.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939250" version="1" comment="python312-websockets is &lt;12.0-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939251" version="1" comment="python310-zipp is &lt;3.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939252" version="1" comment="python311-zipp is &lt;3.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939253" version="1" comment="python312-zipp is &lt;3.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939254" version="1" comment="ruby3.3-rubygem-globalid is &lt;1.2.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939255" version="1" comment="ruby3.3-rubygem-jquery-rails is &lt;4.6.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939256" version="1" comment="ruby3.3-rubygem-kramdown is &lt;2.4.0-1.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939257" version="1" comment="ruby3.3-rubygem-loofah is &lt;2.22.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939258" version="1" comment="ruby3.3-rubygem-minitar is &lt;0.9-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939259" version="1" comment="ruby3.3-rubygem-multi_xml is &lt;0.6.0-1.27 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939260" version="1" comment="ruby3.3-rubygem-nokogiri is &lt;1.15.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939261" version="1" comment="ruby3.3-rubygem-rails-html-sanitizer is &lt;1.6.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939262" version="1" comment="ruby3.3-rubygem-rubyzip is &lt;2.3.2-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939263" version="1" comment="ruby3.3-rubygem-sprockets is &lt;4.2.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939264" version="1" comment="ruby3.3-rubygem-tzinfo-1.2 is &lt;1.2.11-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939265" version="1" comment="ruby3.3-rubygem-web-console is &lt;4.2.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939266" version="1" comment="ruby3.3-rubygem-websocket-extensions is &lt;0.1.5-1.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939267" version="1" comment="traefik is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939268" version="1" comment="traefik2 is &lt;2.11.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939269" version="1" comment="trivy is &lt;0.53.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939270" version="1" comment="exiv2 is &lt;0.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939271" version="1" comment="exiv2-lang is &lt;0.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939272" version="1" comment="libexiv2-28 is &lt;0.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939273" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939274" version="1" comment="libexiv2-devel is &lt;0.28.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939275" version="1" comment="kubelogin is &lt;0.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939276" version="1" comment="libreoffice is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939277" version="1" comment="libreoffice-base is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939278" version="1" comment="libreoffice-base-drivers-postgresql is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939279" version="1" comment="libreoffice-branding-upstream is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939280" version="1" comment="libreoffice-calc is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939281" version="1" comment="libreoffice-calc-extensions is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939282" version="1" comment="libreoffice-draw is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939283" version="1" comment="libreoffice-filters-optional is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939284" version="1" comment="libreoffice-gdb-pretty-printers is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939285" version="1" comment="libreoffice-glade is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939286" version="1" comment="libreoffice-gnome is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939287" version="1" comment="libreoffice-gtk3 is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939288" version="1" comment="libreoffice-icon-themes is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939289" version="1" comment="libreoffice-impress is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939290" version="1" comment="libreoffice-kdeintegration is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939291" version="1" comment="libreoffice-l10n-af is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939292" version="1" comment="libreoffice-l10n-am is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939293" version="1" comment="libreoffice-l10n-ar is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939294" version="1" comment="libreoffice-l10n-as is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939295" version="1" comment="libreoffice-l10n-ast is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939296" version="1" comment="libreoffice-l10n-be is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939297" version="1" comment="libreoffice-l10n-bg is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939298" version="1" comment="libreoffice-l10n-bn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939299" version="1" comment="libreoffice-l10n-bn_IN is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939300" version="1" comment="libreoffice-l10n-bo is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939301" version="1" comment="libreoffice-l10n-br is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939302" version="1" comment="libreoffice-l10n-brx is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939303" version="1" comment="libreoffice-l10n-bs is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939304" version="1" comment="libreoffice-l10n-ca is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939305" version="1" comment="libreoffice-l10n-ca_valencia is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939306" version="1" comment="libreoffice-l10n-ckb is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939307" version="1" comment="libreoffice-l10n-cs is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939308" version="1" comment="libreoffice-l10n-cy is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939309" version="1" comment="libreoffice-l10n-da is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939310" version="1" comment="libreoffice-l10n-de is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939311" version="1" comment="libreoffice-l10n-dgo is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939312" version="1" comment="libreoffice-l10n-dsb is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939313" version="1" comment="libreoffice-l10n-dz is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939314" version="1" comment="libreoffice-l10n-el is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939315" version="1" comment="libreoffice-l10n-en is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939316" version="1" comment="libreoffice-l10n-en_GB is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939317" version="1" comment="libreoffice-l10n-en_ZA is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939318" version="1" comment="libreoffice-l10n-eo is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939319" version="1" comment="libreoffice-l10n-es is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939320" version="1" comment="libreoffice-l10n-et is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939321" version="1" comment="libreoffice-l10n-eu is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939322" version="1" comment="libreoffice-l10n-fa is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939323" version="1" comment="libreoffice-l10n-fi is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939324" version="1" comment="libreoffice-l10n-fr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939325" version="1" comment="libreoffice-l10n-fur is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939326" version="1" comment="libreoffice-l10n-fy is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939327" version="1" comment="libreoffice-l10n-ga is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939328" version="1" comment="libreoffice-l10n-gd is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939329" version="1" comment="libreoffice-l10n-gl is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939330" version="1" comment="libreoffice-l10n-gu is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939331" version="1" comment="libreoffice-l10n-gug is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939332" version="1" comment="libreoffice-l10n-he is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939333" version="1" comment="libreoffice-l10n-hi is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939334" version="1" comment="libreoffice-l10n-hr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939335" version="1" comment="libreoffice-l10n-hsb is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939336" version="1" comment="libreoffice-l10n-hu is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939337" version="1" comment="libreoffice-l10n-hy is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939338" version="1" comment="libreoffice-l10n-id is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939339" version="1" comment="libreoffice-l10n-is is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939340" version="1" comment="libreoffice-l10n-it is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939341" version="1" comment="libreoffice-l10n-ja is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939342" version="1" comment="libreoffice-l10n-ka is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939343" version="1" comment="libreoffice-l10n-kab is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939344" version="1" comment="libreoffice-l10n-kk is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939345" version="1" comment="libreoffice-l10n-km is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939346" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939347" version="1" comment="libreoffice-l10n-kn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939348" version="1" comment="libreoffice-l10n-ko is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939349" version="1" comment="libreoffice-l10n-kok is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939350" version="1" comment="libreoffice-l10n-ks is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939351" version="1" comment="libreoffice-l10n-lb is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939352" version="1" comment="libreoffice-l10n-lo is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939353" version="1" comment="libreoffice-l10n-lt is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939354" version="1" comment="libreoffice-l10n-lv is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939355" version="1" comment="libreoffice-l10n-mai is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939356" version="1" comment="libreoffice-l10n-mk is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939357" version="1" comment="libreoffice-l10n-ml is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939358" version="1" comment="libreoffice-l10n-mn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939359" version="1" comment="libreoffice-l10n-mni is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939360" version="1" comment="libreoffice-l10n-mr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939361" version="1" comment="libreoffice-l10n-my is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939362" version="1" comment="libreoffice-l10n-nb is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939363" version="1" comment="libreoffice-l10n-ne is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939364" version="1" comment="libreoffice-l10n-nl is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939365" version="1" comment="libreoffice-l10n-nn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939366" version="1" comment="libreoffice-l10n-nr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939367" version="1" comment="libreoffice-l10n-nso is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939368" version="1" comment="libreoffice-l10n-oc is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939369" version="1" comment="libreoffice-l10n-om is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939370" version="1" comment="libreoffice-l10n-or is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939371" version="1" comment="libreoffice-l10n-pa is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939372" version="1" comment="libreoffice-l10n-pl is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939373" version="1" comment="libreoffice-l10n-pt_BR is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939374" version="1" comment="libreoffice-l10n-pt_PT is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939375" version="1" comment="libreoffice-l10n-ro is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939376" version="1" comment="libreoffice-l10n-ru is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939377" version="1" comment="libreoffice-l10n-rw is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939378" version="1" comment="libreoffice-l10n-sa_IN is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939379" version="1" comment="libreoffice-l10n-sat is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939380" version="1" comment="libreoffice-l10n-sd is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939381" version="1" comment="libreoffice-l10n-si is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939382" version="1" comment="libreoffice-l10n-sid is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939383" version="1" comment="libreoffice-l10n-sk is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939384" version="1" comment="libreoffice-l10n-sl is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939385" version="1" comment="libreoffice-l10n-sq is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939386" version="1" comment="libreoffice-l10n-sr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939387" version="1" comment="libreoffice-l10n-ss is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939388" version="1" comment="libreoffice-l10n-st is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939389" version="1" comment="libreoffice-l10n-sv is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939390" version="1" comment="libreoffice-l10n-sw_TZ is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939391" version="1" comment="libreoffice-l10n-szl is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939392" version="1" comment="libreoffice-l10n-ta is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939393" version="1" comment="libreoffice-l10n-te is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939394" version="1" comment="libreoffice-l10n-tg is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939395" version="1" comment="libreoffice-l10n-th is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939396" version="1" comment="libreoffice-l10n-tn is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939397" version="1" comment="libreoffice-l10n-tr is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939398" version="1" comment="libreoffice-l10n-ts is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939399" version="1" comment="libreoffice-l10n-tt is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939400" version="1" comment="libreoffice-l10n-ug is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939401" version="1" comment="libreoffice-l10n-uk is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939402" version="1" comment="libreoffice-l10n-uz is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939403" version="1" comment="libreoffice-l10n-ve is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939404" version="1" comment="libreoffice-l10n-vec is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939405" version="1" comment="libreoffice-l10n-vi is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939406" version="1" comment="libreoffice-l10n-xh is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939407" version="1" comment="libreoffice-l10n-zh_CN is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939408" version="1" comment="libreoffice-l10n-zh_TW is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939409" version="1" comment="libreoffice-l10n-zu is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939410" version="1" comment="libreoffice-librelogo is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939411" version="1" comment="libreoffice-mailmerge is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939412" version="1" comment="libreoffice-math is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939413" version="1" comment="libreoffice-officebean is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939414" version="1" comment="libreoffice-pyuno is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939415" version="1" comment="libreoffice-qt5 is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939416" version="1" comment="libreoffice-qt6 is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939417" version="1" comment="libreoffice-sdk is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939418" version="1" comment="libreoffice-sdk-doc is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939419" version="1" comment="libreoffice-writer is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939420" version="1" comment="libreoffice-writer-extensions is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939421" version="1" comment="libreofficekit is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939422" version="1" comment="libreofficekit-devel is &lt;24.2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939423" version="1" comment="libnetpbm-devel is &lt;11.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939424" version="1" comment="libnetpbm11 is &lt;11.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939425" version="1" comment="libnetpbm11-32bit is &lt;11.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939426" version="1" comment="netpbm is &lt;11.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939427" version="1" comment="Botan-doc is &lt;2.19.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939428" version="1" comment="libbotan-2-19 is &lt;2.19.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939429" version="1" comment="libbotan-devel is &lt;2.19.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939430" version="1" comment="python3-botan is &lt;2.19.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939431" version="1" comment="MozillaThunderbird is &lt;115.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939432" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939433" version="1" comment="MozillaThunderbird-translations-common is &lt;115.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939434" version="1" comment="MozillaThunderbird-translations-other is &lt;115.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939435" version="1" comment="conftest is &lt;0.54.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939436" version="1" comment="conftest-bash-completion is &lt;0.54.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939437" version="1" comment="conftest-fish-completion is &lt;0.54.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939438" version="1" comment="conftest-zsh-completion is &lt;0.54.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939439" version="1" comment="gtk2-branding-upstream is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939440" version="1" comment="gtk2-data is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939441" version="1" comment="gtk2-devel is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939442" version="1" comment="gtk2-devel-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939443" version="1" comment="gtk2-immodule-amharic is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939444" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939445" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939446" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939447" version="1" comment="gtk2-immodule-multipress is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939448" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939449" version="1" comment="gtk2-immodule-thai is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939450" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939451" version="1" comment="gtk2-immodule-tigrigna is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939452" version="1" comment="gtk2-immodule-tigrigna-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939453" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939454" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939455" version="1" comment="gtk2-immodule-xim is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939456" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939457" version="1" comment="gtk2-lang is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939458" version="1" comment="gtk2-tools is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939459" version="1" comment="gtk2-tools-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939460" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939461" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939462" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.33-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939463" version="1" comment="kernel-firmware-all is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939464" version="1" comment="kernel-firmware-amdgpu is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939465" version="1" comment="kernel-firmware-ath10k is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939466" version="1" comment="kernel-firmware-ath11k is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939467" version="1" comment="kernel-firmware-ath12k is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939468" version="1" comment="kernel-firmware-atheros is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939469" version="1" comment="kernel-firmware-bluetooth is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939470" version="1" comment="kernel-firmware-bnx2 is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939471" version="1" comment="kernel-firmware-brcm is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939472" version="1" comment="kernel-firmware-chelsio is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939473" version="1" comment="kernel-firmware-dpaa2 is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939474" version="1" comment="kernel-firmware-i915 is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939475" version="1" comment="kernel-firmware-intel is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939476" version="1" comment="kernel-firmware-iwlwifi is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939477" version="1" comment="kernel-firmware-liquidio is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939478" version="1" comment="kernel-firmware-marvell is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939479" version="1" comment="kernel-firmware-media is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939480" version="1" comment="kernel-firmware-mediatek is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939481" version="1" comment="kernel-firmware-mellanox is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939482" version="1" comment="kernel-firmware-mwifiex is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939483" version="1" comment="kernel-firmware-network is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939484" version="1" comment="kernel-firmware-nfp is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939485" version="1" comment="kernel-firmware-nvidia is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939486" version="1" comment="kernel-firmware-platform is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939487" version="1" comment="kernel-firmware-prestera is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939488" version="1" comment="kernel-firmware-qcom is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939489" version="1" comment="kernel-firmware-qlogic is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939490" version="1" comment="kernel-firmware-radeon is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939491" version="1" comment="kernel-firmware-realtek is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939492" version="1" comment="kernel-firmware-serial is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939493" version="1" comment="kernel-firmware-sound is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939494" version="1" comment="kernel-firmware-ti is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939495" version="1" comment="kernel-firmware-ueagle is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939496" version="1" comment="kernel-firmware-usb-network is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939497" version="1" comment="ucode-amd is &lt;20240712-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939498" version="1" comment="nodejs-electron is &lt;30.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939499" version="1" comment="nodejs-electron-devel is &lt;30.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939500" version="1" comment="nodejs-electron-doc is &lt;30.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939501" version="1" comment="ntpd-rs is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939502" version="1" comment="ntpd-rs-common is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939503" version="1" comment="openCryptoki is &lt;3.23.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939504" version="1" comment="openCryptoki-64bit is &lt;3.23.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939505" version="1" comment="openCryptoki-devel is &lt;3.23.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939506" version="1" comment="exim is &lt;4.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939507" version="1" comment="eximon is &lt;4.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939508" version="1" comment="eximstats-html is &lt;4.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939509" version="1" comment="MozillaFirefox is &lt;128.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939510" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939511" version="1" comment="MozillaFirefox-devel is &lt;128.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939512" version="1" comment="MozillaFirefox-translations-common is &lt;128.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939513" version="1" comment="MozillaFirefox-translations-other is &lt;128.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939514" version="1" comment="istioctl is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939515" version="1" comment="istioctl-bash-completion is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939516" version="1" comment="istioctl-zsh-completion is &lt;1.22.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939517" version="1" comment="ovmf is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939518" version="1" comment="ovmf-tools is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939519" version="1" comment="qemu-ovmf-ia32 is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939520" version="1" comment="qemu-ovmf-x86_64 is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939521" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939522" version="1" comment="qemu-uefi-aarch32 is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939523" version="1" comment="qemu-uefi-aarch64 is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939524" version="1" comment="qemu-uefi-riscv64 is &lt;202402-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939525" version="1" comment="OpenImageIO is &lt;2.5.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939526" version="1" comment="OpenImageIO-devel is &lt;2.5.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939527" version="1" comment="libOpenImageIO2_5 is &lt;2.5.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939528" version="1" comment="libOpenImageIO_Util2_5 is &lt;2.5.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939529" version="1" comment="python3-OpenImageIO is &lt;2.5.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939530" version="1" comment="gnome-extensions is &lt;46.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939531" version="1" comment="gnome-shell is &lt;46.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939532" version="1" comment="gnome-shell-calendar is &lt;46.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939533" version="1" comment="gnome-shell-devel is &lt;46.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939534" version="1" comment="gnome-shell-lang is &lt;46.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939535" version="1" comment="java-17-openjdk is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939536" version="1" comment="java-17-openjdk-demo is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939537" version="1" comment="java-17-openjdk-devel is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939538" version="1" comment="java-17-openjdk-headless is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939539" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939540" version="1" comment="java-17-openjdk-jmods is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939541" version="1" comment="java-17-openjdk-src is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939542" version="1" comment="python310-Django is &lt;5.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939543" version="1" comment="python311-Django is &lt;5.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939544" version="1" comment="python312-Django is &lt;5.0.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939545" version="1" comment="xen is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939546" version="1" comment="xen-devel is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939547" version="1" comment="xen-doc-html is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939548" version="1" comment="xen-libs is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939549" version="1" comment="xen-tools is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939550" version="1" comment="xen-tools-domU is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939551" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.18.2_06-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939552" version="1" comment="chromedriver is &lt;126.0.6478.182-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939553" version="1" comment="chromium is &lt;126.0.6478.182-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939554" version="1" comment="java-11-openjdk is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939555" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939556" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939557" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939558" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939559" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939560" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939561" version="1" comment="java-21-openjdk is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939562" version="1" comment="java-21-openjdk-demo is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939563" version="1" comment="java-21-openjdk-devel is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939564" version="1" comment="java-21-openjdk-headless is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939565" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939566" version="1" comment="java-21-openjdk-jmods is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939567" version="1" comment="java-21-openjdk-src is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939568" version="1" comment="python310-Django4 is &lt;4.2.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939569" version="1" comment="python311-Django4 is &lt;4.2.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939570" version="1" comment="python312-Django4 is &lt;4.2.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939571" version="1" comment="python310-sentry-sdk is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939572" version="1" comment="python311-sentry-sdk is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939573" version="1" comment="python312-sentry-sdk is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939574" version="1" comment="weblate is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939575" version="1" comment="weblate-doc is &lt;5.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939576" version="1" comment="gh is &lt;2.53.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939577" version="1" comment="gh-bash-completion is &lt;2.53.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939578" version="1" comment="gh-fish-completion is &lt;2.53.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939579" version="1" comment="gh-zsh-completion is &lt;2.53.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939580" version="1" comment="git is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939581" version="1" comment="git-arch is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939582" version="1" comment="git-core is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939583" version="1" comment="git-credential-libsecret is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939584" version="1" comment="git-cvs is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939585" version="1" comment="git-daemon is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939586" version="1" comment="git-doc is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939587" version="1" comment="git-email is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939588" version="1" comment="git-gui is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939589" version="1" comment="git-p4 is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939590" version="1" comment="git-svn is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939591" version="1" comment="git-web is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939592" version="1" comment="gitk is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939593" version="1" comment="perl-Git is &lt;2.45.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939594" version="1" comment="java-22-openjdk is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939595" version="1" comment="java-22-openjdk-demo is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939596" version="1" comment="java-22-openjdk-devel is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939597" version="1" comment="java-22-openjdk-headless is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939598" version="1" comment="java-22-openjdk-javadoc is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939599" version="1" comment="java-22-openjdk-jmods is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939600" version="1" comment="java-22-openjdk-src is &lt;22.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939601" version="1" comment="corepack20 is &lt;20.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939602" version="1" comment="nodejs20 is &lt;20.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939603" version="1" comment="nodejs20-devel is &lt;20.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939604" version="1" comment="nodejs20-docs is &lt;20.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939605" version="1" comment="npm20 is &lt;20.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939606" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939607" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939608" version="1" comment="libQt5Concurrent-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939609" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939610" version="1" comment="libQt5Concurrent5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939611" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939612" version="1" comment="libQt5Core-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939613" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939614" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939615" version="1" comment="libQt5Core5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939616" version="1" comment="libQt5Core5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939617" version="1" comment="libQt5DBus-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939618" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939619" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939620" version="1" comment="libQt5DBus5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939621" version="1" comment="libQt5DBus5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939622" version="1" comment="libQt5Gui-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939623" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939624" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939625" version="1" comment="libQt5Gui5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939626" version="1" comment="libQt5Gui5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939627" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939628" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939629" version="1" comment="libQt5Network-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939630" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939631" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939632" version="1" comment="libQt5Network5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939633" version="1" comment="libQt5Network5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939634" version="1" comment="libQt5OpenGL-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939635" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939636" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939637" version="1" comment="libQt5OpenGL5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939638" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939639" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939640" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939641" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939642" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939643" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939644" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939645" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939646" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939647" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939648" version="1" comment="libQt5PrintSupport5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939649" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939650" version="1" comment="libQt5Sql-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939651" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939652" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939653" version="1" comment="libQt5Sql5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939654" version="1" comment="libQt5Sql5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939655" version="1" comment="libQt5Sql5-mysql is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939656" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939657" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939658" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939659" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939660" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939661" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939662" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939663" version="1" comment="libQt5Test-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939664" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939665" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939666" version="1" comment="libQt5Test5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939667" version="1" comment="libQt5Test5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939668" version="1" comment="libQt5Widgets-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939669" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939670" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939671" version="1" comment="libQt5Widgets5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939672" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939673" version="1" comment="libQt5Xml-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939674" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939675" version="1" comment="libQt5Xml5 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939676" version="1" comment="libQt5Xml5-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939677" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939678" version="1" comment="libqt5-qtbase-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939679" version="1" comment="libqt5-qtbase-examples is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939680" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939681" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939682" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939683" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.14+kde143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939684" version="1" comment="liborc-0_4-0 is &lt;0.4.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939685" version="1" comment="liborc-0_4-0-32bit is &lt;0.4.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939686" version="1" comment="orc is &lt;0.4.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939687" version="1" comment="orc-doc is &lt;0.4.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939688" version="1" comment="bind is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939689" version="1" comment="bind-doc is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939690" version="1" comment="bind-modules-bdbhpt is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939691" version="1" comment="bind-modules-generic is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939692" version="1" comment="bind-modules-ldap is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939693" version="1" comment="bind-modules-mysql is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939694" version="1" comment="bind-modules-perl is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939695" version="1" comment="bind-modules-sqlite3 is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939696" version="1" comment="bind-utils is &lt;9.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939697" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;1.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939698" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939699" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939700" version="1" comment="libopenssl1_1 is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939701" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939702" version="1" comment="openssl-1_1 is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939703" version="1" comment="openssl-1_1-doc is &lt;1.1.1w-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939704" version="1" comment="libopenssl-3-devel is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939705" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939706" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939707" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939708" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939709" version="1" comment="libopenssl3 is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939710" version="1" comment="libopenssl3-32bit is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939711" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939712" version="1" comment="openssl-3 is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939713" version="1" comment="openssl-3-doc is &lt;3.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939714" version="1" comment="ffmpeg-5 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939715" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939716" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939717" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939718" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939719" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939720" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939721" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939722" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939723" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939724" version="1" comment="libavcodec59 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939725" version="1" comment="libavcodec59-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939726" version="1" comment="libavdevice59 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939727" version="1" comment="libavdevice59-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939728" version="1" comment="libavfilter8 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939729" version="1" comment="libavfilter8-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939730" version="1" comment="libavformat59 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939731" version="1" comment="libavformat59-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939732" version="1" comment="libavutil57 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939733" version="1" comment="libavutil57-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939734" version="1" comment="libpostproc56 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939735" version="1" comment="libpostproc56-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939736" version="1" comment="libswresample4_ff5 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939737" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939738" version="1" comment="libswscale6 is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939739" version="1" comment="libswscale6-32bit is &lt;5.1.4-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939740" version="1" comment="ffmpeg-7 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939741" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939742" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939743" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939744" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939745" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939746" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939747" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939748" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939749" version="1" comment="libavcodec61 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939750" version="1" comment="libavdevice61 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939751" version="1" comment="libavfilter10 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939752" version="1" comment="libavformat61 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939753" version="1" comment="libavutil59 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939754" version="1" comment="libpostproc58 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939755" version="1" comment="libswresample5 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939756" version="1" comment="libswscale8 is &lt;7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939757" version="1" comment="libwireshark17 is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939758" version="1" comment="libwiretap14 is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939759" version="1" comment="libwsutil15 is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939760" version="1" comment="wireshark is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939761" version="1" comment="wireshark-devel is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939762" version="1" comment="wireshark-ui-qt is &lt;4.2.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939763" version="1" comment="cargo-audit-advisory-db is &lt;20240730-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939764" version="1" comment="curl is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939765" version="1" comment="curl-fish-completion is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939766" version="1" comment="curl-zsh-completion is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939767" version="1" comment="libcurl-devel is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939768" version="1" comment="libcurl-devel-32bit is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939769" version="1" comment="libcurl-devel-doc is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939770" version="1" comment="libcurl4 is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939771" version="1" comment="libcurl4-32bit is &lt;8.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939772" version="1" comment="ffmpeg-6 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939773" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939774" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939775" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939776" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939777" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939778" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939779" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939780" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939781" version="1" comment="libavcodec60 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939782" version="1" comment="libavcodec60-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939783" version="1" comment="libavdevice60 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939784" version="1" comment="libavdevice60-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939785" version="1" comment="libavfilter9 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939786" version="1" comment="libavfilter9-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939787" version="1" comment="libavformat60 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939788" version="1" comment="libavformat60-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939789" version="1" comment="libavutil58 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939790" version="1" comment="libavutil58-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939791" version="1" comment="libpostproc57 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939792" version="1" comment="libpostproc57-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939793" version="1" comment="libswresample4 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939794" version="1" comment="libswresample4-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939795" version="1" comment="libswscale7 is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939796" version="1" comment="libswscale7-32bit is &lt;6.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939797" version="1" comment="389-ds is &lt;3.1.1~git0.aef1668-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939798" version="1" comment="389-ds-devel is &lt;3.1.1~git0.aef1668-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939799" version="1" comment="389-ds-snmp is &lt;3.1.1~git0.aef1668-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939800" version="1" comment="lib389 is &lt;3.1.1~git0.aef1668-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939801" version="1" comment="libsvrcore0 is &lt;3.1.1~git0.aef1668-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939802" version="1" comment="matrix-synapse is &lt;1.112.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939803" version="1" comment="docker is &lt;26.1.5_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939804" version="1" comment="docker-bash-completion is &lt;26.1.5_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939805" version="1" comment="docker-fish-completion is &lt;26.1.5_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939806" version="1" comment="docker-rootless-extras is &lt;26.1.5_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939807" version="1" comment="docker-zsh-completion is &lt;26.1.5_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939808" version="1" comment="espeak-ng is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939809" version="1" comment="espeak-ng-compat is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939810" version="1" comment="espeak-ng-compat-devel is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939811" version="1" comment="espeak-ng-devel is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939812" version="1" comment="espeak-ng-vim is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939813" version="1" comment="libespeak-ng1 is &lt;1.51.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939814" version="1" comment="ffmpeg-4 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939815" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939816" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939817" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939818" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939819" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939820" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939821" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939822" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939823" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939824" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939825" version="1" comment="libavcodec58_134 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939826" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939827" version="1" comment="libavdevice58_13 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939828" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939829" version="1" comment="libavfilter7_110 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939830" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939831" version="1" comment="libavformat58_76 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939832" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939833" version="1" comment="libavresample4_0 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939834" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939835" version="1" comment="libavutil56_70 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939836" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939837" version="1" comment="libpostproc55_9 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939838" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939839" version="1" comment="libswresample3_9 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939840" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939841" version="1" comment="libswscale5_9 is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939842" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939843" version="1" comment="golang-github-prometheus-prometheus is &lt;2.53.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939844" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939845" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939846" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939847" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939848" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939849" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939850" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939851" version="1" comment="klp-build is &lt;0~20240731.edfe0bf-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939852" version="1" comment="nova is &lt;3.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939853" version="1" comment="nova-bash-completion is &lt;3.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939854" version="1" comment="nova-fish-completion is &lt;3.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939855" version="1" comment="nova-zsh-completion is &lt;3.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939856" version="1" comment="python-Twisted-doc is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939857" version="1" comment="python310-Twisted is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939858" version="1" comment="python310-Twisted-all_non_platform is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939859" version="1" comment="python310-Twisted-conch is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939860" version="1" comment="python310-Twisted-conch_nacl is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939861" version="1" comment="python310-Twisted-contextvars is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939862" version="1" comment="python310-Twisted-http2 is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939863" version="1" comment="python310-Twisted-serial is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939864" version="1" comment="python310-Twisted-tls is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939865" version="1" comment="python311-Twisted is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939866" version="1" comment="python311-Twisted-all_non_platform is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939867" version="1" comment="python311-Twisted-conch is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939868" version="1" comment="python311-Twisted-conch_nacl is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939869" version="1" comment="python311-Twisted-contextvars is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939870" version="1" comment="python311-Twisted-http2 is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939871" version="1" comment="python311-Twisted-serial is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939872" version="1" comment="python311-Twisted-tls is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939873" version="1" comment="python312-Twisted is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939874" version="1" comment="python312-Twisted-all_non_platform is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939875" version="1" comment="python312-Twisted-conch is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939876" version="1" comment="python312-Twisted-conch_nacl is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939877" version="1" comment="python312-Twisted-contextvars is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939878" version="1" comment="python312-Twisted-http2 is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939879" version="1" comment="python312-Twisted-serial is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939880" version="1" comment="python312-Twisted-tls is &lt;24.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939881" version="1" comment="trivy is &lt;0.54.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939882" version="1" comment="libneatvnc0 is &lt;0.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939883" version="1" comment="neatvnc-devel is &lt;0.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939884" version="1" comment="patch is &lt;2.7.6-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939885" version="1" comment="libnbd is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939886" version="1" comment="libnbd-bash-completion is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939887" version="1" comment="libnbd-devel is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939888" version="1" comment="libnbd0 is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939889" version="1" comment="nbdfuse is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939890" version="1" comment="python3-libnbd is &lt;1.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939891" version="1" comment="libxml2-2 is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939892" version="1" comment="libxml2-2-32bit is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939893" version="1" comment="libxml2-devel is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939894" version="1" comment="libxml2-devel-32bit is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939895" version="1" comment="libxml2-doc is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939896" version="1" comment="libxml2-tools is &lt;2.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939897" version="1" comment="element-web is &lt;1.11.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939898" version="1" comment="roundcubemail is &lt;1.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939899" version="1" comment="ansible-9 is &lt;9.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939900" version="1" comment="apache2 is &lt;2.4.62-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939901" version="1" comment="db48-doc is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939902" version="1" comment="db48-utils is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939903" version="1" comment="libdb-4_8 is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939904" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939905" version="1" comment="libdb-4_8-devel is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939906" version="1" comment="libdb-4_8-devel-32bit is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939907" version="1" comment="libdb-4_8-x86-64-v3 is &lt;4.8.30-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939908" version="1" comment="python310-Django is &lt;5.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939909" version="1" comment="python311-Django is &lt;5.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939910" version="1" comment="python312-Django is &lt;5.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939911" version="1" comment="python310-Django4 is &lt;4.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939912" version="1" comment="python311-Django4 is &lt;4.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939913" version="1" comment="python312-Django4 is &lt;4.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939914" version="1" comment="python313 is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939915" version="1" comment="python313-curses is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939916" version="1" comment="python313-dbm is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939917" version="1" comment="python313-idle is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939918" version="1" comment="python313-tk is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939919" version="1" comment="python313-x86-64-v3 is &lt;3.13.0~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939920" version="1" comment="MozillaThunderbird is &lt;115.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939921" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939922" version="1" comment="MozillaThunderbird-translations-common is &lt;115.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939923" version="1" comment="MozillaThunderbird-translations-other is &lt;115.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939924" version="1" comment="ansible-core-2.16 is &lt;2.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939925" version="1" comment="ansible-test-2.16 is &lt;2.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939926" version="1" comment="ksh is &lt;93vu-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939927" version="1" comment="ksh-devel is &lt;93vu-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939928" version="1" comment="python39 is &lt;3.9.19-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939929" version="1" comment="python39-curses is &lt;3.9.19-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939930" version="1" comment="python39-dbm is &lt;3.9.19-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939931" version="1" comment="python39-idle is &lt;3.9.19-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939932" version="1" comment="python39-tk is &lt;3.9.19-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939933" version="1" comment="python310 is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939934" version="1" comment="python310-32bit is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939935" version="1" comment="python310-curses is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939936" version="1" comment="python310-dbm is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939937" version="1" comment="python310-idle is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939938" version="1" comment="python310-tk is &lt;3.10.14-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939939" version="1" comment="python311 is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939940" version="1" comment="python311-32bit is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939941" version="1" comment="python311-curses is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939942" version="1" comment="python311-dbm is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939943" version="1" comment="python311-idle is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939944" version="1" comment="python311-tk is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939945" version="1" comment="python311-x86-64-v3 is &lt;3.11.9-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939946" version="1" comment="python38 is &lt;3.8.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939947" version="1" comment="python38-curses is &lt;3.8.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939948" version="1" comment="python38-dbm is &lt;3.8.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939949" version="1" comment="python38-idle is &lt;3.8.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939950" version="1" comment="python38-tk is &lt;3.8.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939951" version="1" comment="traefik is &lt;3.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939952" version="1" comment="traefik2 is &lt;2.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939953" version="1" comment="libzzip-0-13 is &lt;0.13.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939954" version="1" comment="libzzip-0-13-32bit is &lt;0.13.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939955" version="1" comment="zziplib-devel is &lt;0.13.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939956" version="1" comment="zziplib-devel-32bit is &lt;0.13.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939957" version="1" comment="MozillaFirefox is &lt;129.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939958" version="1" comment="MozillaFirefox-branding-upstream is &lt;129.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939959" version="1" comment="MozillaFirefox-devel is &lt;129.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939960" version="1" comment="MozillaFirefox-translations-common is &lt;129.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939961" version="1" comment="MozillaFirefox-translations-other is &lt;129.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939962" version="1" comment="curl is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939963" version="1" comment="curl-fish-completion is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939964" version="1" comment="curl-zsh-completion is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939965" version="1" comment="libcurl-devel is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939966" version="1" comment="libcurl-devel-32bit is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939967" version="1" comment="libcurl-devel-doc is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939968" version="1" comment="libcurl4 is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939969" version="1" comment="libcurl4-32bit is &lt;8.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939970" version="1" comment="java-11-openj9 is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939971" version="1" comment="java-11-openj9-demo is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939972" version="1" comment="java-11-openj9-devel is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939973" version="1" comment="java-11-openj9-headless is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939974" version="1" comment="java-11-openj9-javadoc is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939975" version="1" comment="java-11-openj9-jmods is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939976" version="1" comment="java-11-openj9-src is &lt;11.0.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939977" version="1" comment="java-17-openj9 is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939978" version="1" comment="java-17-openj9-demo is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939979" version="1" comment="java-17-openj9-devel is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939980" version="1" comment="java-17-openj9-headless is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939981" version="1" comment="java-17-openj9-javadoc is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939982" version="1" comment="java-17-openj9-jmods is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939983" version="1" comment="java-17-openj9-src is &lt;17.0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939984" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939985" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939986" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939987" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939988" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939989" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939990" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.422-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939991" version="1" comment="java-21-openj9 is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939992" version="1" comment="java-21-openj9-demo is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939993" version="1" comment="java-21-openj9-devel is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939994" version="1" comment="java-21-openj9-headless is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939995" version="1" comment="java-21-openj9-javadoc is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939996" version="1" comment="java-21-openj9-jmods is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939997" version="1" comment="java-21-openj9-src is &lt;21.0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939998" version="1" comment="kernel-firmware-all is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009939999" version="1" comment="kernel-firmware-amdgpu is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940000" version="1" comment="kernel-firmware-ath10k is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940001" version="1" comment="kernel-firmware-ath11k is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940002" version="1" comment="kernel-firmware-ath12k is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940003" version="1" comment="kernel-firmware-atheros is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940004" version="1" comment="kernel-firmware-bluetooth is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940005" version="1" comment="kernel-firmware-bnx2 is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940006" version="1" comment="kernel-firmware-brcm is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940007" version="1" comment="kernel-firmware-chelsio is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940008" version="1" comment="kernel-firmware-dpaa2 is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940009" version="1" comment="kernel-firmware-i915 is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940010" version="1" comment="kernel-firmware-intel is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940011" version="1" comment="kernel-firmware-iwlwifi is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940012" version="1" comment="kernel-firmware-liquidio is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940013" version="1" comment="kernel-firmware-marvell is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940014" version="1" comment="kernel-firmware-media is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940015" version="1" comment="kernel-firmware-mediatek is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940016" version="1" comment="kernel-firmware-mellanox is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940017" version="1" comment="kernel-firmware-mwifiex is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940018" version="1" comment="kernel-firmware-network is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940019" version="1" comment="kernel-firmware-nfp is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940020" version="1" comment="kernel-firmware-nvidia is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940021" version="1" comment="kernel-firmware-platform is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940022" version="1" comment="kernel-firmware-prestera is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940023" version="1" comment="kernel-firmware-qcom is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940024" version="1" comment="kernel-firmware-qlogic is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940025" version="1" comment="kernel-firmware-radeon is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940026" version="1" comment="kernel-firmware-realtek is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940027" version="1" comment="kernel-firmware-serial is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940028" version="1" comment="kernel-firmware-sound is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940029" version="1" comment="kernel-firmware-ti is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940030" version="1" comment="kernel-firmware-ueagle is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940031" version="1" comment="kernel-firmware-usb-network is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940032" version="1" comment="ucode-amd is &lt;20240809-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940033" version="1" comment="klp-build is &lt;0~20240812.ad9f0e0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940034" version="1" comment="ucode-intel is &lt;20240813-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940035" version="1" comment="bubblewrap is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940036" version="1" comment="bubblewrap-zsh-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940037" version="1" comment="libunbound8 is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940038" version="1" comment="python3-unbound is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940039" version="1" comment="unbound is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940040" version="1" comment="unbound-anchor is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940041" version="1" comment="unbound-devel is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940042" version="1" comment="unbound-munin is &lt;1.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940043" version="1" comment="nginx is &lt;1.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940044" version="1" comment="nginx-source is &lt;1.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940045" version="1" comment="chromedriver is &lt;127.0.6533.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940046" version="1" comment="chromium is &lt;127.0.6533.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940047" version="1" comment="element-desktop is &lt;1.11.73-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940048" version="1" comment="dovecot23 is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940049" version="1" comment="dovecot23-backend-mysql is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940050" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940051" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940052" version="1" comment="dovecot23-devel is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940053" version="1" comment="dovecot23-fts is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940054" version="1" comment="dovecot23-fts-lucene is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940055" version="1" comment="dovecot23-fts-solr is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940056" version="1" comment="dovecot23-fts-squat is &lt;2.3.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940057" version="1" comment="flatpak is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940058" version="1" comment="flatpak-devel is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940059" version="1" comment="flatpak-remote-flathub is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940060" version="1" comment="flatpak-selinux is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940061" version="1" comment="flatpak-zsh-completion is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940062" version="1" comment="libflatpak0 is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940063" version="1" comment="system-user-flatpak is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940064" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.15.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940065" version="1" comment="nodejs-electron is &lt;30.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940066" version="1" comment="nodejs-electron-devel is &lt;30.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940067" version="1" comment="nodejs-electron-doc is &lt;30.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940068" version="1" comment="osc is &lt;1.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940069" version="1" comment="libpodofo-devel is &lt;0.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940070" version="1" comment="libpodofo2 is &lt;0.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940071" version="1" comment="podofo is &lt;0.10.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940072" version="1" comment="python-WebOb-doc is &lt;1.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940073" version="1" comment="python310-WebOb is &lt;1.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940074" version="1" comment="python311-WebOb is &lt;1.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940075" version="1" comment="python312-WebOb is &lt;1.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940076" version="1" comment="python310-aiohttp is &lt;3.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940077" version="1" comment="python311-aiohttp is &lt;3.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940078" version="1" comment="python312-aiohttp is &lt;3.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940079" version="1" comment="libtiff-devel is &lt;4.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940080" version="1" comment="libtiff-devel-32bit is &lt;4.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940081" version="1" comment="libtiff6 is &lt;4.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940082" version="1" comment="libtiff6-32bit is &lt;4.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940083" version="1" comment="tiff is &lt;4.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940084" version="1" comment="velociraptor is &lt;0.7.0.4.git97.675e45f9-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940085" version="1" comment="xen is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940086" version="1" comment="xen-devel is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940087" version="1" comment="xen-doc-html is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940088" version="1" comment="xen-libs is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940089" version="1" comment="xen-tools is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940090" version="1" comment="xen-tools-domU is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940091" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.19.0_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940092" version="1" comment="libvte-2_91-0 is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940093" version="1" comment="typelib-1_0-Vte-2_91 is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940094" version="1" comment="typelib-1_0-Vte-3_91 is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940095" version="1" comment="vte-devel is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940096" version="1" comment="vte-lang is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940097" version="1" comment="vte-tools is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940098" version="1" comment="vte-tools-gtk4 is &lt;0.76.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940099" version="1" comment="chromedriver is &lt;128.0.6613.84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940100" version="1" comment="chromium is &lt;128.0.6613.84-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940101" version="1" comment="frr is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940102" version="1" comment="frr-devel is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940103" version="1" comment="libfrr0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940104" version="1" comment="libfrr_pb0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940105" version="1" comment="libfrrcares0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940106" version="1" comment="libfrrfpm_pb0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940107" version="1" comment="libfrrospfapiclient0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940108" version="1" comment="libfrrsnmp0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940109" version="1" comment="libfrrzmq0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940110" version="1" comment="libmgmt_be_nb0 is &lt;10.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940111" version="1" comment="forgejo-runner is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940112" version="1" comment="forgejo-runner-bash-completion is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940113" version="1" comment="forgejo-runner-fish-completion is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940114" version="1" comment="forgejo-runner-zsh-completion is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940115" version="1" comment="element-desktop is &lt;1.11.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940116" version="1" comment="element-web is &lt;1.11.75-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940117" version="1" comment="ffmpeg-5 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940118" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940119" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940120" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940121" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940122" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940123" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940124" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940125" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940126" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940127" version="1" comment="libavcodec59 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940128" version="1" comment="libavcodec59-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940129" version="1" comment="libavdevice59 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940130" version="1" comment="libavdevice59-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940131" version="1" comment="libavfilter8 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940132" version="1" comment="libavfilter8-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940133" version="1" comment="libavformat59 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940134" version="1" comment="libavformat59-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940135" version="1" comment="libavutil57 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940136" version="1" comment="libavutil57-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940137" version="1" comment="libpostproc56 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940138" version="1" comment="libpostproc56-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940139" version="1" comment="libswresample4_ff5 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940140" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940141" version="1" comment="libswscale6 is &lt;5.1.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940142" version="1" comment="libswscale6-32bit is &lt;5.1.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940143" version="1" comment="perl-App-cpanminus is &lt;1.7047-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940144" version="1" comment="kubernetes1.28-apiserver is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940145" version="1" comment="kubernetes1.28-client is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940146" version="1" comment="kubernetes1.28-client-bash-completion is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940147" version="1" comment="kubernetes1.28-client-common is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940148" version="1" comment="kubernetes1.28-client-fish-completion is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940149" version="1" comment="kubernetes1.28-controller-manager is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940150" version="1" comment="kubernetes1.28-kubeadm is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940151" version="1" comment="kubernetes1.28-kubelet is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940152" version="1" comment="kubernetes1.28-kubelet-common is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940153" version="1" comment="kubernetes1.28-proxy is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940154" version="1" comment="kubernetes1.28-scheduler is &lt;1.28.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940155" version="1" comment="python310-Flask-Cors is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940156" version="1" comment="python311-Flask-Cors is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940157" version="1" comment="python312-Flask-Cors is &lt;4.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940158" version="1" comment="python310-setuptools is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940159" version="1" comment="python310-setuptools-wheel is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940160" version="1" comment="python311-setuptools is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940161" version="1" comment="python311-setuptools-wheel is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940162" version="1" comment="python312-setuptools is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940163" version="1" comment="python312-setuptools-wheel is &lt;72.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940164" version="1" comment="python312 is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940165" version="1" comment="python312-32bit is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940166" version="1" comment="python312-curses is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940167" version="1" comment="python312-dbm is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940168" version="1" comment="python312-idle is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940169" version="1" comment="python312-tk is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940170" version="1" comment="python312-x86-64-v3 is &lt;3.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940171" version="1" comment="python38 is &lt;3.8.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940172" version="1" comment="python38-curses is &lt;3.8.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940173" version="1" comment="python38-dbm is &lt;3.8.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940174" version="1" comment="python38-idle is &lt;3.8.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940175" version="1" comment="python38-tk is &lt;3.8.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940176" version="1" comment="python39 is &lt;3.9.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940177" version="1" comment="python39-curses is &lt;3.9.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940178" version="1" comment="python39-dbm is &lt;3.9.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940179" version="1" comment="python39-idle is &lt;3.9.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940180" version="1" comment="python39-tk is &lt;3.9.19-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940181" version="1" comment="python310 is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940182" version="1" comment="python310-32bit is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940183" version="1" comment="python310-curses is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940184" version="1" comment="python310-dbm is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940185" version="1" comment="python310-idle is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940186" version="1" comment="python310-tk is &lt;3.10.14-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940187" version="1" comment="python311 is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940188" version="1" comment="python311-32bit is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940189" version="1" comment="python311-curses is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940190" version="1" comment="python311-dbm is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940191" version="1" comment="python311-idle is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940192" version="1" comment="python311-tk is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940193" version="1" comment="python311-x86-64-v3 is &lt;3.11.9-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940194" version="1" comment="python312 is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940195" version="1" comment="python312-32bit is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940196" version="1" comment="python312-curses is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940197" version="1" comment="python312-dbm is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940198" version="1" comment="python312-idle is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940199" version="1" comment="python312-tk is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940200" version="1" comment="python312-x86-64-v3 is &lt;3.12.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940201" version="1" comment="python313 is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940202" version="1" comment="python313-curses is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940203" version="1" comment="python313-dbm is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940204" version="1" comment="python313-idle is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940205" version="1" comment="python313-tk is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940206" version="1" comment="python313-x86-64-v3 is &lt;3.13.0~rc1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940207" version="1" comment="libwireshark17 is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940208" version="1" comment="libwiretap14 is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940209" version="1" comment="libwsutil15 is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940210" version="1" comment="wireshark is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940211" version="1" comment="wireshark-devel is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940212" version="1" comment="wireshark-ui-qt is &lt;4.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940213" version="1" comment="chromedriver is &lt;128.0.6613.113-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940214" version="1" comment="chromium is &lt;128.0.6613.113-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941088" version="1" comment="libmbedcrypto7 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941089" version="1" comment="libmbedcrypto7-x86-64-v3 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941090" version="1" comment="libmbedtls14 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941091" version="1" comment="libmbedtls14-x86-64-v3 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941092" version="1" comment="libmbedx509-1 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941093" version="1" comment="libmbedx509-1-x86-64-v3 is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941094" version="1" comment="mbedtls-2-devel is &lt;2.28.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941095" version="1" comment="tcpdump is &lt;4.99.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941096" version="1" comment="389-ds is &lt;3.1.1~git13.a9c7ff9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941097" version="1" comment="389-ds-devel is &lt;3.1.1~git13.a9c7ff9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941098" version="1" comment="389-ds-snmp is &lt;3.1.1~git13.a9c7ff9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941099" version="1" comment="lib389 is &lt;3.1.1~git13.a9c7ff9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941100" version="1" comment="libsvrcore0 is &lt;3.1.1~git13.a9c7ff9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941101" version="1" comment="haproxy is &lt;3.0.4+git0.7a59afa93-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941102" version="1" comment="htmldoc is &lt;1.9.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941103" version="1" comment="libpcap-devel is &lt;1.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941104" version="1" comment="libpcap-devel-32bit is &lt;1.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941105" version="1" comment="libpcap-devel-static is &lt;1.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941106" version="1" comment="libpcap1 is &lt;1.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941107" version="1" comment="libpcap1-32bit is &lt;1.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941108" version="1" comment="python310-Django4 is &lt;4.2.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941109" version="1" comment="python311-Django4 is &lt;4.2.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941110" version="1" comment="python312-Django4 is &lt;4.2.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941111" version="1" comment="python310-numpy1 is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941112" version="1" comment="python310-numpy1-devel is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941113" version="1" comment="python311-numpy1 is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941114" version="1" comment="python311-numpy1-devel is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941115" version="1" comment="python312-numpy1 is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941116" version="1" comment="python312-numpy1-devel is &lt;1.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941117" version="1" comment="runc is &lt;1.2.0~rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941358" version="1" comment="chromedriver is &lt;128.0.6613.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941359" version="1" comment="chromium is &lt;128.0.6613.119-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941360" version="1" comment="klp-build is &lt;0~20240902.c95cc9e-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941361" version="1" comment="libvirt is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941362" version="1" comment="libvirt-client is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941363" version="1" comment="libvirt-client-qemu is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941364" version="1" comment="libvirt-daemon is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941365" version="1" comment="libvirt-daemon-common is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941366" version="1" comment="libvirt-daemon-config-network is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941367" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941368" version="1" comment="libvirt-daemon-driver-libxl is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941369" version="1" comment="libvirt-daemon-driver-lxc is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941370" version="1" comment="libvirt-daemon-driver-network is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941371" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941372" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941373" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941374" version="1" comment="libvirt-daemon-driver-secret is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941375" version="1" comment="libvirt-daemon-driver-storage is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941376" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941377" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941378" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941379" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941380" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941381" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941382" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941383" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941384" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941385" version="1" comment="libvirt-daemon-hooks is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941386" version="1" comment="libvirt-daemon-lock is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941387" version="1" comment="libvirt-daemon-log is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941388" version="1" comment="libvirt-daemon-lxc is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941389" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941390" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941391" version="1" comment="libvirt-daemon-proxy is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941392" version="1" comment="libvirt-daemon-qemu is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941393" version="1" comment="libvirt-daemon-xen is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941394" version="1" comment="libvirt-devel is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941395" version="1" comment="libvirt-doc is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941396" version="1" comment="libvirt-libs is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941397" version="1" comment="libvirt-nss is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941398" version="1" comment="libvirt-ssh-proxy is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941399" version="1" comment="wireshark-plugin-libvirt is &lt;10.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941400" version="1" comment="nqptp is &lt;1.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941401" version="1" comment="libopenssl-3-devel is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941402" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941403" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941404" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941405" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941406" version="1" comment="libopenssl3 is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941407" version="1" comment="libopenssl3-32bit is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941408" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941409" version="1" comment="openssl-3 is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941410" version="1" comment="openssl-3-doc is &lt;3.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941411" version="1" comment="python310-Django is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941412" version="1" comment="python311-Django is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941413" version="1" comment="python312-Django is &lt;5.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941567" version="1" comment="aardvark-dns is &lt;1.12.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941568" version="1" comment="containerd is &lt;1.7.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941569" version="1" comment="containerd-ctr is &lt;1.7.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941570" version="1" comment="containerd-devel is &lt;1.7.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941571" version="1" comment="docker is &lt;26.1.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941572" version="1" comment="docker-bash-completion is &lt;26.1.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941573" version="1" comment="docker-fish-completion is &lt;26.1.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941574" version="1" comment="docker-rootless-extras is &lt;26.1.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941575" version="1" comment="docker-zsh-completion is &lt;26.1.5_ce-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941576" version="1" comment="expat is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941577" version="1" comment="libexpat-devel is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941578" version="1" comment="libexpat-devel-32bit is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941579" version="1" comment="libexpat1 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941580" version="1" comment="libexpat1-32bit is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941581" version="1" comment="go1.22 is &lt;1.22.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941582" version="1" comment="go1.22-doc is &lt;1.22.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941583" version="1" comment="go1.22-libstd is &lt;1.22.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941584" version="1" comment="go1.22-race is &lt;1.22.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941585" version="1" comment="go1.23 is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941586" version="1" comment="go1.23-doc is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941587" version="1" comment="go1.23-libstd is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941588" version="1" comment="go1.23-race is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941937" version="1" comment="MozillaThunderbird is &lt;115.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941938" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;115.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941939" version="1" comment="MozillaThunderbird-translations-common is &lt;115.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941940" version="1" comment="MozillaThunderbird-translations-other is &lt;115.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941941" version="1" comment="python313 is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941942" version="1" comment="python313-curses is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941943" version="1" comment="python313-dbm is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941944" version="1" comment="python313-idle is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941945" version="1" comment="python313-tk is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941946" version="1" comment="python313-x86-64-v3 is &lt;3.13.0~rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941947" version="1" comment="python39 is &lt;3.9.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941948" version="1" comment="python39-curses is &lt;3.9.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941949" version="1" comment="python39-dbm is &lt;3.9.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941950" version="1" comment="python39-idle is &lt;3.9.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941951" version="1" comment="python39-tk is &lt;3.9.19-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941952" version="1" comment="x3270 is &lt;4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942152" version="1" comment="assimp-devel is &lt;5.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942153" version="1" comment="libassimp5 is &lt;5.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942154" version="1" comment="forgejo is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942155" version="1" comment="forgejo-apparmor is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942156" version="1" comment="forgejo-firewalld is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942157" version="1" comment="forgejo-selinux is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942158" version="1" comment="python39 is &lt;3.9.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942159" version="1" comment="python39-curses is &lt;3.9.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942160" version="1" comment="python39-dbm is &lt;3.9.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942161" version="1" comment="python39-idle is &lt;3.9.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942162" version="1" comment="python39-tk is &lt;3.9.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942415" version="1" comment="keepalived is &lt;2.3.1+git59.b6681f98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942545" version="1" comment="curl is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942546" version="1" comment="curl-fish-completion is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942547" version="1" comment="curl-zsh-completion is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942548" version="1" comment="libcurl-devel is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942549" version="1" comment="libcurl-devel-32bit is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942550" version="1" comment="libcurl-devel-doc is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942551" version="1" comment="libcurl4 is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942552" version="1" comment="libcurl4-32bit is &lt;8.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942553" version="1" comment="grype is &lt;0.80.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942554" version="1" comment="grype-bash-completion is &lt;0.80.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942555" version="1" comment="grype-fish-completion is &lt;0.80.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942556" version="1" comment="grype-zsh-completion is &lt;0.80.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942583" version="1" comment="chromedriver is &lt;128.0.6613.137-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942584" version="1" comment="chromium is &lt;128.0.6613.137-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942585" version="1" comment="ovmf is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942586" version="1" comment="ovmf-tools is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942587" version="1" comment="qemu-ovmf-ia32 is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942588" version="1" comment="qemu-ovmf-x86_64 is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942589" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942590" version="1" comment="qemu-uefi-aarch32 is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942591" version="1" comment="qemu-uefi-aarch64 is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942592" version="1" comment="qemu-uefi-riscv64 is &lt;202405-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942593" version="1" comment="ucode-intel is &lt;20240910-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942594" version="1" comment="wpa_supplicant is &lt;2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942595" version="1" comment="wpa_supplicant-gui is &lt;2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942975" version="1" comment="ffmpeg-5 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942976" version="1" comment="ffmpeg-5-libavcodec-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942977" version="1" comment="ffmpeg-5-libavdevice-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942978" version="1" comment="ffmpeg-5-libavfilter-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942979" version="1" comment="ffmpeg-5-libavformat-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942980" version="1" comment="ffmpeg-5-libavutil-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942981" version="1" comment="ffmpeg-5-libpostproc-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942982" version="1" comment="ffmpeg-5-libswresample-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942983" version="1" comment="ffmpeg-5-libswscale-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942984" version="1" comment="ffmpeg-5-private-devel is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942985" version="1" comment="libavcodec59 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942986" version="1" comment="libavcodec59-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942987" version="1" comment="libavdevice59 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942988" version="1" comment="libavdevice59-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942989" version="1" comment="libavfilter8 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942990" version="1" comment="libavfilter8-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942991" version="1" comment="libavformat59 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942992" version="1" comment="libavformat59-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942993" version="1" comment="libavutil57 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942994" version="1" comment="libavutil57-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942995" version="1" comment="libpostproc56 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942996" version="1" comment="libpostproc56-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942997" version="1" comment="libswresample4_ff5 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942998" version="1" comment="libswresample4_ff5-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942999" version="1" comment="libswscale6 is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943000" version="1" comment="libswscale6-32bit is &lt;5.1.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943001" version="1" comment="python38 is &lt;3.8.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943002" version="1" comment="python38-curses is &lt;3.8.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943003" version="1" comment="python38-dbm is &lt;3.8.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943004" version="1" comment="python38-idle is &lt;3.8.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943005" version="1" comment="python38-tk is &lt;3.8.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943006" version="1" comment="libwireshark18 is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943007" version="1" comment="libwiretap15 is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943008" version="1" comment="libwsutil16 is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943009" version="1" comment="wireshark is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943010" version="1" comment="wireshark-devel is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943011" version="1" comment="wireshark-ui-qt is &lt;4.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943332" version="1" comment="assimp-devel is &lt;5.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943333" version="1" comment="libassimp5 is &lt;5.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943334" version="1" comment="ffmpeg-4 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943335" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943336" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943337" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943338" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943339" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943340" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943341" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943342" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943343" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943344" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943345" version="1" comment="libavcodec58_134 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943346" version="1" comment="libavcodec58_134-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943347" version="1" comment="libavdevice58_13 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943348" version="1" comment="libavdevice58_13-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943349" version="1" comment="libavfilter7_110 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943350" version="1" comment="libavfilter7_110-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943351" version="1" comment="libavformat58_76 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943352" version="1" comment="libavformat58_76-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943353" version="1" comment="libavresample4_0 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943354" version="1" comment="libavresample4_0-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943355" version="1" comment="libavutil56_70 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943356" version="1" comment="libavutil56_70-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943357" version="1" comment="libpostproc55_9 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943358" version="1" comment="libpostproc55_9-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943359" version="1" comment="libswresample3_9 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943360" version="1" comment="libswresample3_9-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943361" version="1" comment="libswscale5_9 is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943362" version="1" comment="libswscale5_9-32bit is &lt;4.4.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943363" version="1" comment="ffmpeg-6 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943364" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943365" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943366" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943367" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943368" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943369" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943370" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943371" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943372" version="1" comment="libavcodec60 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943373" version="1" comment="libavcodec60-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943374" version="1" comment="libavdevice60 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943375" version="1" comment="libavdevice60-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943376" version="1" comment="libavfilter9 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943377" version="1" comment="libavfilter9-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943378" version="1" comment="libavformat60 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943379" version="1" comment="libavformat60-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943380" version="1" comment="libavutil58 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943381" version="1" comment="libavutil58-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943382" version="1" comment="libpostproc57 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943383" version="1" comment="libpostproc57-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943384" version="1" comment="libswresample4 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943385" version="1" comment="libswresample4-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943386" version="1" comment="libswscale7 is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943387" version="1" comment="libswscale7-32bit is &lt;6.1.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943388" version="1" comment="python310 is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943389" version="1" comment="python310-32bit is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943390" version="1" comment="python310-curses is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943391" version="1" comment="python310-dbm is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943392" version="1" comment="python310-idle is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943393" version="1" comment="python310-tk is &lt;3.10.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943394" version="1" comment="python311-32bit is &lt;3.11.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943664" version="1" comment="apr-devel is &lt;1.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943665" version="1" comment="libapr1-0 is &lt;1.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943666" version="1" comment="postgresql12 is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943667" version="1" comment="postgresql12-contrib is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943668" version="1" comment="postgresql12-devel is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943669" version="1" comment="postgresql12-docs is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943670" version="1" comment="postgresql12-llvmjit is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943671" version="1" comment="postgresql12-llvmjit-devel is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943672" version="1" comment="postgresql12-plperl is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943673" version="1" comment="postgresql12-plpython is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943674" version="1" comment="postgresql12-pltcl is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943675" version="1" comment="postgresql12-server is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943676" version="1" comment="postgresql12-server-devel is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943677" version="1" comment="postgresql12-test is &lt;12.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943678" version="1" comment="postgresql13 is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943679" version="1" comment="postgresql13-contrib is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943680" version="1" comment="postgresql13-devel is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943681" version="1" comment="postgresql13-docs is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943682" version="1" comment="postgresql13-llvmjit is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943683" version="1" comment="postgresql13-llvmjit-devel is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943684" version="1" comment="postgresql13-plperl is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943685" version="1" comment="postgresql13-plpython is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943686" version="1" comment="postgresql13-pltcl is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943687" version="1" comment="postgresql13-server is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943688" version="1" comment="postgresql13-server-devel is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943689" version="1" comment="postgresql13-test is &lt;13.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943690" version="1" comment="postgresql14 is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943691" version="1" comment="postgresql14-contrib is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943692" version="1" comment="postgresql14-devel is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943693" version="1" comment="postgresql14-docs is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943694" version="1" comment="postgresql14-llvmjit is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943695" version="1" comment="postgresql14-llvmjit-devel is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943696" version="1" comment="postgresql14-plperl is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943697" version="1" comment="postgresql14-plpython is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943698" version="1" comment="postgresql14-pltcl is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943699" version="1" comment="postgresql14-server is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943700" version="1" comment="postgresql14-server-devel is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943701" version="1" comment="postgresql14-test is &lt;14.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943702" version="1" comment="postgresql15 is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943703" version="1" comment="postgresql15-contrib is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943704" version="1" comment="postgresql15-devel is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943705" version="1" comment="postgresql15-docs is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943706" version="1" comment="postgresql15-llvmjit is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943707" version="1" comment="postgresql15-llvmjit-devel is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943708" version="1" comment="postgresql15-plperl is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943709" version="1" comment="postgresql15-plpython is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943710" version="1" comment="postgresql15-pltcl is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943711" version="1" comment="postgresql15-server is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943712" version="1" comment="postgresql15-server-devel is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943713" version="1" comment="postgresql15-test is &lt;15.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943714" version="1" comment="python39 is &lt;3.9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943715" version="1" comment="python39-curses is &lt;3.9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943716" version="1" comment="python39-dbm is &lt;3.9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943717" version="1" comment="python39-idle is &lt;3.9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943718" version="1" comment="python39-tk is &lt;3.9.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944056" version="1" comment="onefetch is &lt;2.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944057" version="1" comment="rage-encryption is &lt;0.10.0+0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944058" version="1" comment="rage-encryption-bash-completion is &lt;0.10.0+0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944059" version="1" comment="rage-encryption-fish-completion is &lt;0.10.0+0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944060" version="1" comment="rage-encryption-zsh-completion is &lt;0.10.0+0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944061" version="1" comment="stgit is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944062" version="1" comment="stgit-bash-completion is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944063" version="1" comment="stgit-emacs is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944064" version="1" comment="stgit-fish-completion is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944065" version="1" comment="stgit-vim-plugin is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944066" version="1" comment="stgit-zsh-completion is &lt;2.4.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944067" version="1" comment="system-user-zabbix is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944068" version="1" comment="zabbix-agent is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944069" version="1" comment="zabbix-java-gateway is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944070" version="1" comment="zabbix-proxy is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944071" version="1" comment="zabbix-proxy-mysql is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944072" version="1" comment="zabbix-proxy-postgresql is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944073" version="1" comment="zabbix-proxy-sqlite is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944074" version="1" comment="zabbix-server is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944075" version="1" comment="zabbix-server-mysql is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944076" version="1" comment="zabbix-server-postgresql is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944077" version="1" comment="zabbix-ui is &lt;6.0.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944078" version="1" comment="chromedriver is &lt;129.0.6668.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944079" version="1" comment="chromium is &lt;129.0.6668.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944096" version="1" comment="MozillaFirefox is &lt;130.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944097" version="1" comment="MozillaFirefox-branding-upstream is &lt;130.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944098" version="1" comment="MozillaFirefox-devel is &lt;130.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944099" version="1" comment="MozillaFirefox-translations-common is &lt;130.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944100" version="1" comment="MozillaFirefox-translations-other is &lt;130.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944101" version="1" comment="cargo-c is &lt;0.10.3~git0.ee7d7ef-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944371" version="1" comment="postgresql16 is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944372" version="1" comment="postgresql16-contrib is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944373" version="1" comment="postgresql16-devel is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944374" version="1" comment="postgresql16-docs is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944375" version="1" comment="postgresql16-llvmjit is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944376" version="1" comment="postgresql16-llvmjit-devel is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944377" version="1" comment="postgresql16-plperl is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944378" version="1" comment="postgresql16-plpython is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944379" version="1" comment="postgresql16-pltcl is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944380" version="1" comment="postgresql16-server is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944381" version="1" comment="postgresql16-server-devel is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944382" version="1" comment="postgresql16-test is &lt;16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944383" version="1" comment="libecpg6 is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944384" version="1" comment="libecpg6-32bit is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944385" version="1" comment="libpq5 is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944386" version="1" comment="libpq5-32bit is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944387" version="1" comment="postgresql17 is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944388" version="1" comment="postgresql17-contrib is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944389" version="1" comment="postgresql17-devel is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944390" version="1" comment="postgresql17-docs is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944391" version="1" comment="postgresql17-llvmjit is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944392" version="1" comment="postgresql17-llvmjit-devel is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944393" version="1" comment="postgresql17-plperl is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944394" version="1" comment="postgresql17-plpython is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944395" version="1" comment="postgresql17-pltcl is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944396" version="1" comment="postgresql17-server is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944397" version="1" comment="postgresql17-server-devel is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944398" version="1" comment="postgresql17-test is &lt;17~rc1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944399" version="1" comment="python310-azure-identity is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944400" version="1" comment="python311-azure-identity is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944401" version="1" comment="python312-azure-identity is &lt;1.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944674" version="1" comment="cargo-audit is &lt;0.20.0~git66.972ac93-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944675" version="1" comment="obs-service-cargo is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944676" version="1" comment="traefik is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944755" version="1" comment="libopenssl-3-devel is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944756" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944757" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944758" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944759" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944760" version="1" comment="libopenssl3 is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944761" version="1" comment="libopenssl3-32bit is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944762" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944763" version="1" comment="openssl-3 is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944764" version="1" comment="openssl-3-doc is &lt;3.1.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944765" version="1" comment="traefik2 is &lt;2.11.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945200" version="1" comment="chromedriver is &lt;129.0.6668.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945201" version="1" comment="chromium is &lt;129.0.6668.70-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945202" version="1" comment="libmozjs-128-0 is &lt;128.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945203" version="1" comment="mozjs128 is &lt;128.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945204" version="1" comment="mozjs128-devel is &lt;128.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945205" version="1" comment="python312 is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945206" version="1" comment="python312-32bit is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945207" version="1" comment="python312-curses is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945208" version="1" comment="python312-dbm is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945209" version="1" comment="python312-idle is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945210" version="1" comment="python312-tk is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945211" version="1" comment="python312-x86-64-v3 is &lt;3.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945212" version="1" comment="json-java is &lt;20240303-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945213" version="1" comment="json-java-javadoc is &lt;20240303-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945214" version="1" comment="maven-archetype is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945215" version="1" comment="maven-archetype-catalog is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945216" version="1" comment="maven-archetype-common is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945217" version="1" comment="maven-archetype-descriptor is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945218" version="1" comment="maven-archetype-javadoc is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945219" version="1" comment="maven-archetype-packaging is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945220" version="1" comment="maven-archetype-plugin is &lt;3.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945221" version="1" comment="OpenIPMI is &lt;2.0.36.4+git.c114912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945222" version="1" comment="OpenIPMI-devel is &lt;2.0.36.4+git.c114912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945223" version="1" comment="OpenIPMI-python3 is &lt;2.0.36.4+git.c114912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945224" version="1" comment="libOpenIPMI0 is &lt;2.0.36.4+git.c114912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945225" version="1" comment="libOpenIPMIui1 is &lt;2.0.36.4+git.c114912-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945226" version="1" comment="argocd-cli is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945227" version="1" comment="argocd-cli-bash-completion is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945228" version="1" comment="argocd-cli-zsh-completion is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945229" version="1" comment="kyverno is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945230" version="1" comment="kyverno-bash-completion is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945231" version="1" comment="kyverno-fish-completion is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945232" version="1" comment="kyverno-zsh-completion is &lt;1.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945233" version="1" comment="php8 is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945234" version="1" comment="php8-bcmath is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945235" version="1" comment="php8-bz2 is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945236" version="1" comment="php8-calendar is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945237" version="1" comment="php8-cli is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945238" version="1" comment="php8-ctype is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945239" version="1" comment="php8-curl is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945240" version="1" comment="php8-dba is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945241" version="1" comment="php8-devel is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945242" version="1" comment="php8-dom is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945243" version="1" comment="php8-enchant is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945244" version="1" comment="php8-exif is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945245" version="1" comment="php8-ffi is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945246" version="1" comment="php8-fileinfo is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945247" version="1" comment="php8-ftp is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945248" version="1" comment="php8-gd is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945249" version="1" comment="php8-gettext is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945250" version="1" comment="php8-gmp is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945251" version="1" comment="php8-iconv is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945252" version="1" comment="php8-intl is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945253" version="1" comment="php8-ldap is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945254" version="1" comment="php8-mbstring is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945255" version="1" comment="php8-mysql is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945256" version="1" comment="php8-odbc is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945257" version="1" comment="php8-opcache is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945258" version="1" comment="php8-openssl is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945259" version="1" comment="php8-pcntl is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945260" version="1" comment="php8-pdo is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945261" version="1" comment="php8-pgsql is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945262" version="1" comment="php8-phar is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945263" version="1" comment="php8-posix is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945264" version="1" comment="php8-readline is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945265" version="1" comment="php8-shmop is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945266" version="1" comment="php8-snmp is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945267" version="1" comment="php8-soap is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945268" version="1" comment="php8-sockets is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945269" version="1" comment="php8-sodium is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945270" version="1" comment="php8-sqlite is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945271" version="1" comment="php8-sysvmsg is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945272" version="1" comment="php8-sysvsem is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945273" version="1" comment="php8-sysvshm is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945274" version="1" comment="php8-tidy is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945275" version="1" comment="php8-tokenizer is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945276" version="1" comment="php8-xmlreader is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945277" version="1" comment="php8-xmlwriter is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945278" version="1" comment="php8-xsl is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945279" version="1" comment="php8-zip is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945280" version="1" comment="php8-zlib is &lt;8.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945384" version="1" comment="xen is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945385" version="1" comment="xen-devel is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945386" version="1" comment="xen-doc-html is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945387" version="1" comment="xen-libs is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945388" version="1" comment="xen-tools is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945389" version="1" comment="xen-tools-domU is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945390" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.19.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945444" version="1" comment="bsdtar is &lt;3.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945445" version="1" comment="libarchive-devel is &lt;3.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945446" version="1" comment="libarchive13 is &lt;3.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945447" version="1" comment="libarchive13-32bit is &lt;3.7.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945448" version="1" comment="libmozjs-115-0 is &lt;115.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945449" version="1" comment="mozjs115 is &lt;115.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945450" version="1" comment="mozjs115-devel is &lt;115.4.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945451" version="1" comment="libmozjs-128-0 is &lt;128.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945452" version="1" comment="mozjs128 is &lt;128.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945453" version="1" comment="mozjs128-devel is &lt;128.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945454" version="1" comment="libmozjs-78-0 is &lt;78.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945455" version="1" comment="mozjs78 is &lt;78.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945456" version="1" comment="mozjs78-devel is &lt;78.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945457" version="1" comment="opensc is &lt;0.25.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945458" version="1" comment="opensc-bash-completion is &lt;0.25.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945786" version="1" comment="chromedriver is &lt;129.0.6668.89-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945787" version="1" comment="chromium is &lt;129.0.6668.89-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945788" version="1" comment="ffmpeg-7 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945789" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945790" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945791" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945792" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945793" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945794" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945795" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945796" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945797" version="1" comment="libavcodec61 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945798" version="1" comment="libavcodec61-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945799" version="1" comment="libavdevice61 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945800" version="1" comment="libavdevice61-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945801" version="1" comment="libavfilter10 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945802" version="1" comment="libavfilter10-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945803" version="1" comment="libavformat61 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945804" version="1" comment="libavformat61-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945805" version="1" comment="libavutil59 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945806" version="1" comment="libavutil59-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945807" version="1" comment="libpostproc58 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945808" version="1" comment="libpostproc58-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945809" version="1" comment="libswresample5 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945810" version="1" comment="libswresample5-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945811" version="1" comment="libswscale8 is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945812" version="1" comment="libswscale8-32bit is &lt;7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945813" version="1" comment="MozillaFirefox is &lt;131.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945814" version="1" comment="MozillaFirefox-branding-upstream is &lt;131.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945815" version="1" comment="MozillaFirefox-devel is &lt;131.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945816" version="1" comment="MozillaFirefox-translations-common is &lt;131.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945817" version="1" comment="MozillaFirefox-translations-other is &lt;131.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945834" version="1" comment="rusty_v8 is &lt;0.106.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946121" version="1" comment="apache-commons-io is &lt;2.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946122" version="1" comment="apache-commons-io-javadoc is &lt;2.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946123" version="1" comment="buildah is &lt;1.37.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946124" version="1" comment="liboath-devel is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946125" version="1" comment="liboath0 is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946126" version="1" comment="libpskc-devel is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946127" version="1" comment="libpskc0 is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946128" version="1" comment="oath-toolkit is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946129" version="1" comment="oath-toolkit-xml is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946130" version="1" comment="pam_oath is &lt;2.6.11.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946131" version="1" comment="podman is &lt;5.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946132" version="1" comment="podman-docker is &lt;5.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946133" version="1" comment="podman-remote is &lt;5.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946134" version="1" comment="podmansh is &lt;5.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946135" version="1" comment="libunbound8 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946136" version="1" comment="python3-unbound is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946137" version="1" comment="unbound is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946138" version="1" comment="unbound-anchor is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946139" version="1" comment="unbound-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946140" version="1" comment="unbound-munin is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946420" version="1" comment="trivy is &lt;0.56.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947277" version="1" comment="MozillaFirefox is &lt;131.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947278" version="1" comment="MozillaFirefox-branding-upstream is &lt;131.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947279" version="1" comment="MozillaFirefox-devel is &lt;131.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947280" version="1" comment="MozillaFirefox-translations-common is &lt;131.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947281" version="1" comment="MozillaFirefox-translations-other is &lt;131.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947282" version="1" comment="MozillaThunderbird is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947283" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947284" version="1" comment="MozillaThunderbird-translations-common is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947285" version="1" comment="MozillaThunderbird-translations-other is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947286" version="1" comment="java-jwt is &lt;4.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947287" version="1" comment="java-jwt-javadoc is &lt;4.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947288" version="1" comment="libwireshark18 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947289" version="1" comment="libwiretap15 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947290" version="1" comment="libwsutil16 is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947291" version="1" comment="wireshark is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947292" version="1" comment="wireshark-devel is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947293" version="1" comment="wireshark-ui-qt is &lt;4.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947297" version="1" comment="libmozjs-128-0 is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947298" version="1" comment="mozjs128 is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947299" version="1" comment="mozjs128-devel is &lt;128.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947300" version="1" comment="xmlgraphics-fop is &lt;2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947403" version="1" comment="etcd-for-k8s1.28 is &lt;3.5.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947404" version="1" comment="etcd-for-k8s1.30 is &lt;3.5.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947405" version="1" comment="libsonivox3 is &lt;3.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947406" version="1" comment="sonivox-devel is &lt;3.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947441" version="1" comment="haproxy is &lt;3.0.5+git0.8e879a52e-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947442" version="1" comment="python310-pytest-html is &lt;4.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947443" version="1" comment="python311-pytest-html is &lt;4.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947444" version="1" comment="python312-pytest-html is &lt;4.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947445" version="1" comment="libnss_slurm2 is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947446" version="1" comment="libpmi0 is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947447" version="1" comment="libslurm41 is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947448" version="1" comment="perl-slurm is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947449" version="1" comment="slurm is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947450" version="1" comment="slurm-auth-none is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947451" version="1" comment="slurm-config is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947452" version="1" comment="slurm-config-man is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947453" version="1" comment="slurm-cray is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947454" version="1" comment="slurm-devel is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947455" version="1" comment="slurm-doc is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947456" version="1" comment="slurm-hdf5 is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947457" version="1" comment="slurm-lua is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947458" version="1" comment="slurm-munge is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947459" version="1" comment="slurm-node is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947460" version="1" comment="slurm-openlava is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947461" version="1" comment="slurm-pam_slurm is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947462" version="1" comment="slurm-plugins is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947463" version="1" comment="slurm-rest is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947464" version="1" comment="slurm-seff is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947465" version="1" comment="slurm-sjstat is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947466" version="1" comment="slurm-slurmdbd is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947467" version="1" comment="slurm-sql is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947468" version="1" comment="slurm-sview is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947469" version="1" comment="slurm-testsuite is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947470" version="1" comment="slurm-torque is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947471" version="1" comment="slurm-webdoc is &lt;24.05.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947817" version="1" comment="buildah is &lt;1.37.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947818" version="1" comment="element-desktop is &lt;1.11.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947819" version="1" comment="element-web is &lt;1.11.81-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947820" version="1" comment="jetty-annotations is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947821" version="1" comment="jetty-ant is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947822" version="1" comment="jetty-cdi is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947823" version="1" comment="jetty-client is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947824" version="1" comment="jetty-continuation is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947825" version="1" comment="jetty-deploy is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947826" version="1" comment="jetty-fcgi is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947827" version="1" comment="jetty-http is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947828" version="1" comment="jetty-http-spi is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947829" version="1" comment="jetty-io is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947830" version="1" comment="jetty-jaas is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947831" version="1" comment="jetty-jmx is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947832" version="1" comment="jetty-jndi is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947833" version="1" comment="jetty-jsp is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947834" version="1" comment="jetty-minimal-javadoc is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947835" version="1" comment="jetty-openid is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947836" version="1" comment="jetty-plus is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947837" version="1" comment="jetty-proxy is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947838" version="1" comment="jetty-quickstart is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947839" version="1" comment="jetty-rewrite is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947840" version="1" comment="jetty-security is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947841" version="1" comment="jetty-server is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947842" version="1" comment="jetty-servlet is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947843" version="1" comment="jetty-servlets is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947844" version="1" comment="jetty-start is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947845" version="1" comment="jetty-util is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947846" version="1" comment="jetty-util-ajax is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947847" version="1" comment="jetty-webapp is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947848" version="1" comment="jetty-xml is &lt;9.4.56-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947849" version="1" comment="podman is &lt;5.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947850" version="1" comment="podman-docker is &lt;5.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947851" version="1" comment="podman-remote is &lt;5.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947852" version="1" comment="podmansh is &lt;5.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948170" version="1" comment="nodejs-electron is &lt;31.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948171" version="1" comment="nodejs-electron-devel is &lt;31.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948172" version="1" comment="nodejs-electron-doc is &lt;31.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948173" version="1" comment="qemu is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948174" version="1" comment="qemu-SLOF is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948175" version="1" comment="qemu-accel-qtest is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948176" version="1" comment="qemu-accel-tcg-x86 is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948177" version="1" comment="qemu-arm is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948178" version="1" comment="qemu-audio-alsa is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948179" version="1" comment="qemu-audio-dbus is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948180" version="1" comment="qemu-audio-jack is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948181" version="1" comment="qemu-audio-oss is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948182" version="1" comment="qemu-audio-pa is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948183" version="1" comment="qemu-audio-pipewire is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948184" version="1" comment="qemu-audio-spice is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948185" version="1" comment="qemu-block-curl is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948186" version="1" comment="qemu-block-dmg is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948187" version="1" comment="qemu-block-gluster is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948188" version="1" comment="qemu-block-iscsi is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948189" version="1" comment="qemu-block-nfs is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948190" version="1" comment="qemu-block-rbd is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948191" version="1" comment="qemu-block-ssh is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948192" version="1" comment="qemu-chardev-baum is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948193" version="1" comment="qemu-chardev-spice is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948194" version="1" comment="qemu-doc is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948195" version="1" comment="qemu-extra is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948196" version="1" comment="qemu-guest-agent is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948197" version="1" comment="qemu-headless is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948198" version="1" comment="qemu-hw-display-qxl is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948199" version="1" comment="qemu-hw-display-virtio-gpu is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948200" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948201" version="1" comment="qemu-hw-display-virtio-vga is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948202" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948203" version="1" comment="qemu-hw-usb-host is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948204" version="1" comment="qemu-hw-usb-redirect is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948205" version="1" comment="qemu-hw-usb-smartcard is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948206" version="1" comment="qemu-img is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948207" version="1" comment="qemu-ipxe is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948208" version="1" comment="qemu-ivshmem-tools is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948209" version="1" comment="qemu-ksm is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948210" version="1" comment="qemu-lang is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948211" version="1" comment="qemu-microvm is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948212" version="1" comment="qemu-ppc is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948213" version="1" comment="qemu-pr-helper is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948214" version="1" comment="qemu-s390x is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948215" version="1" comment="qemu-seabios is &lt;9.1.01.16.3_3_gc13ff2cd-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948216" version="1" comment="qemu-skiboot is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948217" version="1" comment="qemu-spice is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948218" version="1" comment="qemu-tools is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948219" version="1" comment="qemu-ui-curses is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948220" version="1" comment="qemu-ui-dbus is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948221" version="1" comment="qemu-ui-gtk is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948222" version="1" comment="qemu-ui-opengl is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948223" version="1" comment="qemu-ui-spice-app is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948224" version="1" comment="qemu-ui-spice-core is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948225" version="1" comment="qemu-vgabios is &lt;9.1.01.16.3_3_gc13ff2cd-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948226" version="1" comment="qemu-vhost-user-gpu is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948227" version="1" comment="qemu-vmsr-helper is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948228" version="1" comment="qemu-x86 is &lt;9.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948229" version="1" comment="valkey is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948230" version="1" comment="valkey-compat-redis is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948231" version="1" comment="valkey-devel is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948232" version="1" comment="python3-virtualbox is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948233" version="1" comment="virtualbox is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948234" version="1" comment="virtualbox-devel is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948235" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948236" version="1" comment="virtualbox-guest-source is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948237" version="1" comment="virtualbox-guest-tools is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948238" version="1" comment="virtualbox-host-source is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948239" version="1" comment="virtualbox-qt is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948240" version="1" comment="virtualbox-vnc is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948241" version="1" comment="virtualbox-websrv is &lt;7.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948283" version="1" comment="chromedriver is &lt;130.0.6723.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948284" version="1" comment="chromium is &lt;130.0.6723.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948285" version="1" comment="MozillaFirefox is &lt;131.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948286" version="1" comment="MozillaFirefox-branding-upstream is &lt;131.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948287" version="1" comment="MozillaFirefox-devel is &lt;131.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948288" version="1" comment="MozillaFirefox-translations-common is &lt;131.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948289" version="1" comment="MozillaFirefox-translations-other is &lt;131.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948290" version="1" comment="libopenssl-3-devel is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948291" version="1" comment="libopenssl-3-devel-32bit is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948292" version="1" comment="libopenssl-3-fips-provider is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948293" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948294" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948295" version="1" comment="libopenssl3 is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948296" version="1" comment="libopenssl3-32bit is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948297" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948298" version="1" comment="openssl-3 is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948299" version="1" comment="openssl-3-doc is &lt;3.1.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948300" version="1" comment="python310-starlette is &lt;0.41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948301" version="1" comment="python311-starlette is &lt;0.41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948302" version="1" comment="python312-starlette is &lt;0.41.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948317" version="1" comment="buildah is &lt;1.37.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948318" version="1" comment="libeverest is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948319" version="1" comment="libeverest-x86-64-v3 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948320" version="1" comment="libmbedcrypto16 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948321" version="1" comment="libmbedcrypto16-x86-64-v3 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948322" version="1" comment="libmbedtls21 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948323" version="1" comment="libmbedtls21-x86-64-v3 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948324" version="1" comment="libmbedx509-7 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948325" version="1" comment="libmbedx509-7-x86-64-v3 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948326" version="1" comment="libp256m is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948327" version="1" comment="libp256m-x86-64-v3 is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948328" version="1" comment="mbedtls-devel is &lt;3.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948409" version="1" comment="podman is &lt;5.2.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948410" version="1" comment="podman-docker is &lt;5.2.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948411" version="1" comment="podman-remote is &lt;5.2.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948412" version="1" comment="podmansh is &lt;5.2.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948413" version="1" comment="python310-mysql-connector-python is &lt;9.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948414" version="1" comment="python311-mysql-connector-python is &lt;9.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948415" version="1" comment="python312-mysql-connector-python is &lt;9.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948573" version="1" comment="NetworkManager-applet-libreswan is &lt;1.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948574" version="1" comment="NetworkManager-libreswan is &lt;1.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948575" version="1" comment="NetworkManager-libreswan-lang is &lt;1.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948576" version="1" comment="ghostscript is &lt;10.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948577" version="1" comment="ghostscript-devel is &lt;10.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948578" version="1" comment="ghostscript-x11 is &lt;10.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948579" version="1" comment="gitoxide is &lt;0.38.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948580" version="1" comment="nodejs-electron is &lt;31.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948581" version="1" comment="nodejs-electron-devel is &lt;31.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948582" version="1" comment="nodejs-electron-doc is &lt;31.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948583" version="1" comment="python310-virtualenv is &lt;20.26.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948584" version="1" comment="python311-virtualenv is &lt;20.26.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948585" version="1" comment="python312-virtualenv is &lt;20.26.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948586" version="1" comment="python310 is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948587" version="1" comment="python310-32bit is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948588" version="1" comment="python310-curses is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948589" version="1" comment="python310-dbm is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948590" version="1" comment="python310-idle is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948591" version="1" comment="python310-tk is &lt;3.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948592" version="1" comment="python39 is &lt;3.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948593" version="1" comment="python39-curses is &lt;3.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948594" version="1" comment="python39-dbm is &lt;3.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948595" version="1" comment="python39-idle is &lt;3.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948596" version="1" comment="python39-tk is &lt;3.9.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950239" version="1" comment="Botan is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950240" version="1" comment="Botan-doc is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950241" version="1" comment="libbotan-3-6 is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950242" version="1" comment="libbotan-devel is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950243" version="1" comment="python3-botan is &lt;3.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950244" version="1" comment="python313 is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950245" version="1" comment="python313-curses is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950246" version="1" comment="python313-dbm is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950247" version="1" comment="python313-idle is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950248" version="1" comment="python313-tk is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950249" version="1" comment="python313-x86-64-v3 is &lt;3.13.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950250" version="1" comment="grafana is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950251" version="1" comment="java-11-openjdk is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950252" version="1" comment="java-11-openjdk-demo is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950253" version="1" comment="java-11-openjdk-devel is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950254" version="1" comment="java-11-openjdk-headless is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950255" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950256" version="1" comment="java-11-openjdk-jmods is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950257" version="1" comment="java-11-openjdk-src is &lt;11.0.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950258" version="1" comment="python310-pytest-html is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950259" version="1" comment="python311-pytest-html is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950260" version="1" comment="python312-pytest-html is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950261" version="1" comment="python314 is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950262" version="1" comment="python314-curses is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950263" version="1" comment="python314-dbm is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950264" version="1" comment="python314-idle is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950265" version="1" comment="python314-tk is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950266" version="1" comment="python314-x86-64-v3 is &lt;3.14.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950267" version="1" comment="corepack22 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950268" version="1" comment="nodejs22 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950269" version="1" comment="nodejs22-devel is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950270" version="1" comment="nodejs22-docs is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950271" version="1" comment="npm22 is &lt;22.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950272" version="1" comment="openvpn is &lt;2.6.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950273" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950274" version="1" comment="openvpn-devel is &lt;2.6.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950275" version="1" comment="openvpn-down-root-plugin is &lt;2.6.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950276" version="1" comment="python310-Werkzeug is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950277" version="1" comment="python311-Werkzeug is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950278" version="1" comment="python312-Werkzeug is &lt;3.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950279" version="1" comment="MozillaThunderbird is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950280" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950281" version="1" comment="MozillaThunderbird-translations-common is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950282" version="1" comment="MozillaThunderbird-translations-other is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950283" version="1" comment="alloy is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950284" version="1" comment="cargo-audit-advisory-db is &lt;20241030-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950285" version="1" comment="chromedriver is &lt;130.0.6723.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950286" version="1" comment="chromium is &lt;130.0.6723.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950287" version="1" comment="netty is &lt;4.1.114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950288" version="1" comment="netty-javadoc is &lt;4.1.114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950289" version="1" comment="netty-poms is &lt;4.1.114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950290" version="1" comment="xsd is &lt;4.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950291" version="1" comment="xsd-doc is &lt;4.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950384" version="1" comment="gama is &lt;2.31-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950385" version="1" comment="python310-waitress is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950386" version="1" comment="python311-waitress is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950387" version="1" comment="python312-waitress is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950738" version="1" comment="docker-stable is &lt;24.0.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950739" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950740" version="1" comment="docker-stable-buildx is &lt;0.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950741" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950742" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950743" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950744" version="1" comment="govulncheck-vulndb is &lt;0.0.20241030T212825-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950745" version="1" comment="java-17-openjdk is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950746" version="1" comment="java-17-openjdk-demo is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950747" version="1" comment="java-17-openjdk-devel is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950748" version="1" comment="java-17-openjdk-headless is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950749" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950750" version="1" comment="java-17-openjdk-jmods is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950751" version="1" comment="java-17-openjdk-src is &lt;17.0.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950752" version="1" comment="java-23-openjdk is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950753" version="1" comment="java-23-openjdk-demo is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950754" version="1" comment="java-23-openjdk-devel is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950755" version="1" comment="java-23-openjdk-headless is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950756" version="1" comment="java-23-openjdk-javadoc is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950757" version="1" comment="java-23-openjdk-jmods is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950758" version="1" comment="java-23-openjdk-src is &lt;23.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950759" version="1" comment="libnss_slurm2 is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950760" version="1" comment="libpmi0 is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950761" version="1" comment="libslurm41 is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950762" version="1" comment="perl-slurm is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950763" version="1" comment="slurm is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950764" version="1" comment="slurm-auth-none is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950765" version="1" comment="slurm-config is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950766" version="1" comment="slurm-config-man is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950767" version="1" comment="slurm-cray is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950768" version="1" comment="slurm-devel is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950769" version="1" comment="slurm-doc is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950770" version="1" comment="slurm-hdf5 is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950771" version="1" comment="slurm-lua is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950772" version="1" comment="slurm-munge is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950773" version="1" comment="slurm-node is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950774" version="1" comment="slurm-openlava is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950775" version="1" comment="slurm-pam_slurm is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950776" version="1" comment="slurm-plugins is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950777" version="1" comment="slurm-rest is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950778" version="1" comment="slurm-seff is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950779" version="1" comment="slurm-sjstat is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950780" version="1" comment="slurm-slurmdbd is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950781" version="1" comment="slurm-sql is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950782" version="1" comment="slurm-sview is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950783" version="1" comment="slurm-testsuite is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950784" version="1" comment="slurm-torque is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950785" version="1" comment="slurm-webdoc is &lt;24.05.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950786" version="1" comment="chromedriver is &lt;130.0.6723.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950787" version="1" comment="chromium is &lt;130.0.6723.91-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950788" version="1" comment="govulncheck-vulndb is &lt;0.0.20241101T215616-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950789" version="1" comment="java-21-openjdk is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950790" version="1" comment="java-21-openjdk-demo is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950791" version="1" comment="java-21-openjdk-devel is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950792" version="1" comment="java-21-openjdk-headless is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950793" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950794" version="1" comment="java-21-openjdk-jmods is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950795" version="1" comment="java-21-openjdk-src is &lt;21.0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950812" version="1" comment="libmpg123-0 is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950813" version="1" comment="libmpg123-0-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950814" version="1" comment="libout123-0 is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950815" version="1" comment="libout123-0-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950816" version="1" comment="libsyn123-0 is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950817" version="1" comment="libsyn123-0-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950818" version="1" comment="mpg123 is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950819" version="1" comment="mpg123-devel is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950820" version="1" comment="mpg123-devel-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950821" version="1" comment="mpg123-jack is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950822" version="1" comment="mpg123-jack-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950823" version="1" comment="mpg123-openal is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950824" version="1" comment="mpg123-openal-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950825" version="1" comment="mpg123-portaudio is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950826" version="1" comment="mpg123-portaudio-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950827" version="1" comment="mpg123-pulse is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950828" version="1" comment="mpg123-pulse-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950829" version="1" comment="mpg123-sdl is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950830" version="1" comment="mpg123-sdl-32bit is &lt;1.32.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950831" version="1" comment="python311 is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950832" version="1" comment="python311-32bit is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950833" version="1" comment="python311-curses is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950834" version="1" comment="python311-dbm is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950835" version="1" comment="python311-idle is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950836" version="1" comment="python311-tk is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950837" version="1" comment="python311-x86-64-v3 is &lt;3.11.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950838" version="1" comment="python312 is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950839" version="1" comment="python312-32bit is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950840" version="1" comment="python312-curses is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950841" version="1" comment="python312-dbm is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950842" version="1" comment="python312-idle is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950843" version="1" comment="python312-tk is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950844" version="1" comment="python312-x86-64-v3 is &lt;3.12.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950968" version="1" comment="audacity is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950969" version="1" comment="audacity-lang is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950970" version="1" comment="govulncheck-vulndb is &lt;0.0.20241104T154416-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950971" version="1" comment="qbittorrent is &lt;5.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950972" version="1" comment="qbittorrent-nox is &lt;5.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951042" version="1" comment="htmldoc is &lt;1.9.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951043" version="1" comment="libmozjs-128-0 is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951044" version="1" comment="mozjs128 is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951045" version="1" comment="mozjs128-devel is &lt;128.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951046" version="1" comment="pdns-recursor is &lt;5.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951047" version="1" comment="apache2-mod_uwsgi is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951048" version="1" comment="python310-uwsgi-python3 is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951049" version="1" comment="python311-uwsgi-python3 is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951050" version="1" comment="python312-uwsgi-python3 is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951051" version="1" comment="uwsgi is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951052" version="1" comment="uwsgi-emperor_pg is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951053" version="1" comment="uwsgi-emperor_zeromq is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951054" version="1" comment="uwsgi-gevent is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951055" version="1" comment="uwsgi-glusterfs is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951056" version="1" comment="uwsgi-greenlet is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951057" version="1" comment="uwsgi-jvm is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951058" version="1" comment="uwsgi-ldap is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951059" version="1" comment="uwsgi-libffi is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951060" version="1" comment="uwsgi-logzmq is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951061" version="1" comment="uwsgi-lua is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951062" version="1" comment="uwsgi-pam is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951063" version="1" comment="uwsgi-php8 is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951064" version="1" comment="uwsgi-psgi is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951065" version="1" comment="uwsgi-pypy is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951066" version="1" comment="uwsgi-sqlite3 is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951067" version="1" comment="uwsgi-xslt is &lt;2.0.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951190" version="1" comment="grub2 is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951191" version="1" comment="grub2-branding-upstream is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951192" version="1" comment="grub2-common is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951193" version="1" comment="grub2-i386-efi is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951194" version="1" comment="grub2-i386-efi-bls is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951195" version="1" comment="grub2-i386-efi-debug is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951196" version="1" comment="grub2-i386-efi-extras is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951197" version="1" comment="grub2-i386-pc is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951198" version="1" comment="grub2-i386-pc-debug is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951199" version="1" comment="grub2-i386-pc-extras is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951200" version="1" comment="grub2-snapper-plugin is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951201" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951202" version="1" comment="grub2-x86_64-efi is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951203" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951204" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951205" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951206" version="1" comment="grub2-x86_64-xen is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951207" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951208" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951209" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951210" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951211" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951212" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951213" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951214" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.432-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951215" version="1" comment="xorg-x11-server is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951216" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951217" version="1" comment="xorg-x11-server-extra is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951218" version="1" comment="xorg-x11-server-sdk is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951219" version="1" comment="xorg-x11-server-source is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951220" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951221" version="1" comment="xwayland is &lt;24.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951222" version="1" comment="xwayland-devel is &lt;24.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951414" version="1" comment="IPAddress is &lt;5.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951415" version="1" comment="IPAddress-javadoc is &lt;5.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951416" version="1" comment="chromedriver is &lt;130.0.6723.116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951417" version="1" comment="chromium is &lt;130.0.6723.116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951418" version="1" comment="govulncheck-vulndb is &lt;0.0.20241106T172143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951419" version="1" comment="ruby3.3-rubygem-actionmailer-7.0 is &lt;7.0.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951420" version="1" comment="ruby3.3-rubygem-actionpack-7.0 is &lt;7.0.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951421" version="1" comment="ruby3.3-rubygem-actiontext-7.0 is &lt;7.0.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951422" version="1" comment="ruby3.3-rubygem-puma is &lt;6.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951701" version="1" comment="Mesa is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951702" version="1" comment="Mesa-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951703" version="1" comment="Mesa-KHR-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951704" version="1" comment="Mesa-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951705" version="1" comment="Mesa-dri-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951706" version="1" comment="Mesa-libEGL-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951707" version="1" comment="Mesa-libEGL-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951708" version="1" comment="Mesa-libEGL1 is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951709" version="1" comment="Mesa-libEGL1-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951710" version="1" comment="Mesa-libGL-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951711" version="1" comment="Mesa-libGL-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951712" version="1" comment="Mesa-libGL1 is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951713" version="1" comment="Mesa-libGL1-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951714" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951715" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951716" version="1" comment="Mesa-libGLESv2-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951717" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951718" version="1" comment="Mesa-libGLESv3-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951719" version="1" comment="Mesa-libglapi-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951720" version="1" comment="Mesa-libglapi-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951721" version="1" comment="Mesa-libglapi0 is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951722" version="1" comment="Mesa-libglapi0-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951723" version="1" comment="libOSMesa-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951724" version="1" comment="libOSMesa-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951725" version="1" comment="libOSMesa8 is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951726" version="1" comment="libOSMesa8-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951727" version="1" comment="libgbm-devel is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951728" version="1" comment="libgbm-devel-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951729" version="1" comment="libgbm1 is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951730" version="1" comment="libgbm1-32bit is &lt;24.2.6-392.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951731" version="1" comment="curl is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951732" version="1" comment="curl-fish-completion is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951733" version="1" comment="curl-zsh-completion is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951734" version="1" comment="libcurl-devel is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951735" version="1" comment="libcurl-devel-32bit is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951736" version="1" comment="libcurl-devel-doc is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951737" version="1" comment="libcurl4 is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951738" version="1" comment="libcurl4-32bit is &lt;8.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951739" version="1" comment="expat is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951740" version="1" comment="libexpat-devel is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951741" version="1" comment="libexpat-devel-32bit is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951742" version="1" comment="libexpat1 is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951743" version="1" comment="libexpat1-32bit is &lt;2.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951744" version="1" comment="httpcomponents-client is &lt;4.5.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951745" version="1" comment="httpcomponents-client-cache is &lt;4.5.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951746" version="1" comment="httpcomponents-client-javadoc is &lt;4.5.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951747" version="1" comment="ruby3.3-rubygem-rails-7.0 is &lt;7.0.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951748" version="1" comment="xstream is &lt;1.4.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951749" version="1" comment="xstream-benchmark is &lt;1.4.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951750" version="1" comment="xstream-javadoc is &lt;1.4.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951751" version="1" comment="xstream-parent is &lt;1.4.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951823" version="1" comment="coredns is &lt;1.11.3+git129.387f34d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951824" version="1" comment="coredns-extras is &lt;1.11.3+git129.387f34d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951825" version="1" comment="govulncheck-vulndb is &lt;0.0.20241108T172500-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951863" version="1" comment="MozillaFirefox is &lt;132.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951864" version="1" comment="MozillaFirefox-branding-upstream is &lt;132.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951865" version="1" comment="MozillaFirefox-devel is &lt;132.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951866" version="1" comment="MozillaFirefox-translations-common is &lt;132.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951867" version="1" comment="MozillaFirefox-translations-other is &lt;132.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952224" version="1" comment="govulncheck-vulndb is &lt;0.0.20241112T145010-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952225" version="1" comment="jujutsu is &lt;0.23.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952226" version="1" comment="switchboard-plug-bluetooth is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952227" version="1" comment="switchboard-plug-bluetooth-lang is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952228" version="1" comment="gio-branding-upstream is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952229" version="1" comment="glib2-devel is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952230" version="1" comment="glib2-devel-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952231" version="1" comment="glib2-devel-static is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952232" version="1" comment="glib2-lang is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952233" version="1" comment="glib2-tests-devel is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952234" version="1" comment="glib2-tools is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952235" version="1" comment="glib2-tools-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952236" version="1" comment="libgio-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952237" version="1" comment="libgio-2_0-0-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952238" version="1" comment="libgirepository-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952239" version="1" comment="libglib-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952240" version="1" comment="libglib-2_0-0-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952241" version="1" comment="libgmodule-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952242" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952243" version="1" comment="libgobject-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952244" version="1" comment="libgobject-2_0-0-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952245" version="1" comment="libgthread-2_0-0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952246" version="1" comment="libgthread-2_0-0-32bit is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952247" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952248" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952249" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952250" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952251" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952252" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.82.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952253" version="1" comment="libsoup-3_0-0 is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952254" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952255" version="1" comment="libsoup-devel is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952256" version="1" comment="libsoup-devel-32bit is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952257" version="1" comment="libsoup-lang is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952258" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952259" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952260" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952261" version="1" comment="libsoup2-devel is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952262" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952263" version="1" comment="libsoup2-lang is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952264" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952265" version="1" comment="libvirt is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952266" version="1" comment="libvirt-client is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952267" version="1" comment="libvirt-client-qemu is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952268" version="1" comment="libvirt-daemon is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952269" version="1" comment="libvirt-daemon-common is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952270" version="1" comment="libvirt-daemon-config-network is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952271" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952272" version="1" comment="libvirt-daemon-driver-libxl is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952273" version="1" comment="libvirt-daemon-driver-lxc is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952274" version="1" comment="libvirt-daemon-driver-network is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952275" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952276" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952277" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952278" version="1" comment="libvirt-daemon-driver-secret is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952279" version="1" comment="libvirt-daemon-driver-storage is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952280" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952281" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952282" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952283" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952284" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952285" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952286" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952287" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952288" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952289" version="1" comment="libvirt-daemon-hooks is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952290" version="1" comment="libvirt-daemon-lock is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952291" version="1" comment="libvirt-daemon-log is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952292" version="1" comment="libvirt-daemon-lxc is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952293" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952294" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952295" version="1" comment="libvirt-daemon-proxy is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952296" version="1" comment="libvirt-daemon-qemu is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952297" version="1" comment="libvirt-daemon-xen is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952298" version="1" comment="libvirt-devel is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952299" version="1" comment="libvirt-doc is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952300" version="1" comment="libvirt-libs is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952301" version="1" comment="libvirt-nss is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952302" version="1" comment="libvirt-ssh-proxy is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952303" version="1" comment="wireshark-plugin-libvirt is &lt;10.9.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952304" version="1" comment="libnghttp2-14 is &lt;1.64.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952305" version="1" comment="libnghttp2-14-32bit is &lt;1.64.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952306" version="1" comment="libnghttp2-devel is &lt;1.64.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952307" version="1" comment="nghttp2 is &lt;1.64.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952308" version="1" comment="wget is &lt;1.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952309" version="1" comment="wget-lang is &lt;1.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952310" version="1" comment="icinga2 is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952311" version="1" comment="icinga2-bin is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952312" version="1" comment="icinga2-common is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952313" version="1" comment="icinga2-doc is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952314" version="1" comment="icinga2-ido-mysql is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952315" version="1" comment="icinga2-ido-pgsql is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952316" version="1" comment="nano-icinga2 is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952317" version="1" comment="vim-icinga2 is &lt;2.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952318" version="1" comment="nodejs-electron is &lt;31.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952319" version="1" comment="nodejs-electron-devel is &lt;31.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952320" version="1" comment="nodejs-electron-doc is &lt;31.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952321" version="1" comment="rclone is &lt;1.68.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952322" version="1" comment="rclone-bash-completion is &lt;1.68.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952323" version="1" comment="rclone-zsh-completion is &lt;1.68.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952324" version="1" comment="ucode-intel is &lt;20241112-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952397" version="1" comment="MozillaThunderbird is &lt;128.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952398" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952399" version="1" comment="MozillaThunderbird-translations-common is &lt;128.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952400" version="1" comment="MozillaThunderbird-translations-other is &lt;128.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952401" version="1" comment="ansible-core is &lt;2.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952402" version="1" comment="ansible-test is &lt;2.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952403" version="1" comment="ansible-core-2.16 is &lt;2.16.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952404" version="1" comment="ansible-test-2.16 is &lt;2.16.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952406" version="1" comment="kernel-macros is &lt;6.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952407" version="1" comment="kernel-source is &lt;6.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952408" version="1" comment="kernel-source-vanilla is &lt;6.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952409" version="1" comment="postgresql12 is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952410" version="1" comment="postgresql12-contrib is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952411" version="1" comment="postgresql12-devel is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952412" version="1" comment="postgresql12-docs is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952413" version="1" comment="postgresql12-llvmjit is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952414" version="1" comment="postgresql12-llvmjit-devel is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952415" version="1" comment="postgresql12-plperl is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952416" version="1" comment="postgresql12-plpython is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952417" version="1" comment="postgresql12-pltcl is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952418" version="1" comment="postgresql12-server is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952419" version="1" comment="postgresql12-server-devel is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952420" version="1" comment="postgresql12-test is &lt;12.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952421" version="1" comment="postgresql13 is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952422" version="1" comment="postgresql13-contrib is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952423" version="1" comment="postgresql13-devel is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952424" version="1" comment="postgresql13-docs is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952425" version="1" comment="postgresql13-llvmjit is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952426" version="1" comment="postgresql13-llvmjit-devel is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952427" version="1" comment="postgresql13-plperl is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952428" version="1" comment="postgresql13-plpython is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952429" version="1" comment="postgresql13-pltcl is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952430" version="1" comment="postgresql13-server is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952431" version="1" comment="postgresql13-server-devel is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952432" version="1" comment="postgresql13-test is &lt;13.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952433" version="1" comment="postgresql14 is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952434" version="1" comment="postgresql14-contrib is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952435" version="1" comment="postgresql14-devel is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952436" version="1" comment="postgresql14-docs is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952437" version="1" comment="postgresql14-llvmjit is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952438" version="1" comment="postgresql14-llvmjit-devel is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952439" version="1" comment="postgresql14-plperl is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952440" version="1" comment="postgresql14-plpython is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952441" version="1" comment="postgresql14-pltcl is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952442" version="1" comment="postgresql14-server is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952443" version="1" comment="postgresql14-server-devel is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952444" version="1" comment="postgresql14-test is &lt;14.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952445" version="1" comment="postgresql15 is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952446" version="1" comment="postgresql15-contrib is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952447" version="1" comment="postgresql15-devel is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952448" version="1" comment="postgresql15-docs is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952449" version="1" comment="postgresql15-llvmjit is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952450" version="1" comment="postgresql15-llvmjit-devel is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952451" version="1" comment="postgresql15-plperl is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952452" version="1" comment="postgresql15-plpython is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952453" version="1" comment="postgresql15-pltcl is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952454" version="1" comment="postgresql15-server is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952455" version="1" comment="postgresql15-server-devel is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952456" version="1" comment="postgresql15-test is &lt;15.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952457" version="1" comment="postgresql16 is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952458" version="1" comment="postgresql16-contrib is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952459" version="1" comment="postgresql16-devel is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952460" version="1" comment="postgresql16-docs is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952461" version="1" comment="postgresql16-llvmjit is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952462" version="1" comment="postgresql16-llvmjit-devel is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952463" version="1" comment="postgresql16-plperl is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952464" version="1" comment="postgresql16-plpython is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952465" version="1" comment="postgresql16-pltcl is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952466" version="1" comment="postgresql16-server is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952467" version="1" comment="postgresql16-server-devel is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952468" version="1" comment="postgresql16-test is &lt;16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952469" version="1" comment="libecpg6 is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952470" version="1" comment="libecpg6-32bit is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952471" version="1" comment="libpq5 is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952472" version="1" comment="libpq5-32bit is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952473" version="1" comment="postgresql17 is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952474" version="1" comment="postgresql17-contrib is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952475" version="1" comment="postgresql17-devel is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952476" version="1" comment="postgresql17-docs is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952477" version="1" comment="postgresql17-llvmjit is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952478" version="1" comment="postgresql17-llvmjit-devel is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952479" version="1" comment="postgresql17-plperl is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952480" version="1" comment="postgresql17-plpython is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952481" version="1" comment="postgresql17-pltcl is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952482" version="1" comment="postgresql17-server is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952483" version="1" comment="postgresql17-server-devel is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952484" version="1" comment="postgresql17-test is &lt;17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952485" version="1" comment="python310 is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952486" version="1" comment="python310-32bit is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952487" version="1" comment="python310-curses is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952488" version="1" comment="python310-dbm is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952489" version="1" comment="python310-idle is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952490" version="1" comment="python310-tk is &lt;3.10.15-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952491" version="1" comment="python39 is &lt;3.9.20-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952492" version="1" comment="python39-curses is &lt;3.9.20-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952493" version="1" comment="python39-dbm is &lt;3.9.20-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952494" version="1" comment="python39-idle is &lt;3.9.20-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952495" version="1" comment="python39-tk is &lt;3.9.20-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953448" version="1" comment="gh is &lt;2.62.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953449" version="1" comment="gh-bash-completion is &lt;2.62.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953450" version="1" comment="gh-fish-completion is &lt;2.62.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953451" version="1" comment="gh-zsh-completion is &lt;2.62.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953499" version="1" comment="nodejs-electron is &lt;31.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953500" version="1" comment="nodejs-electron-devel is &lt;31.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953501" version="1" comment="nodejs-electron-doc is &lt;31.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953502" version="1" comment="chromedriver is &lt;131.0.6778.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953503" version="1" comment="chromium is &lt;131.0.6778.69-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953504" version="1" comment="cobbler is &lt;3.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953505" version="1" comment="cobbler-tests is &lt;3.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953506" version="1" comment="cobbler-tests-containers is &lt;3.3.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953507" version="1" comment="govulncheck-vulndb is &lt;0.0.20241119T173509-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953998" version="1" comment="dcmtk is &lt;3.6.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953999" version="1" comment="dcmtk-devel is &lt;3.6.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954000" version="1" comment="libdcmtk18 is &lt;3.6.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954001" version="1" comment="govulncheck-vulndb is &lt;0.0.20241120T172248-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954002" version="1" comment="iptraf-ng is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954003" version="1" comment="traefik2 is &lt;2.11.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954026" version="1" comment="chromedriver is &lt;131.0.6778.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954027" version="1" comment="chromium is &lt;131.0.6778.85-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954669" version="1" comment="govulncheck-vulndb is &lt;0.0.20241121T195252-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954670" version="1" comment="opentofu is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954671" version="1" comment="php8 is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954672" version="1" comment="php8-bcmath is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954673" version="1" comment="php8-bz2 is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954674" version="1" comment="php8-calendar is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954675" version="1" comment="php8-cli is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954676" version="1" comment="php8-ctype is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954677" version="1" comment="php8-curl is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954678" version="1" comment="php8-dba is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954679" version="1" comment="php8-devel is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954680" version="1" comment="php8-dom is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954681" version="1" comment="php8-enchant is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954682" version="1" comment="php8-exif is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954683" version="1" comment="php8-ffi is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954684" version="1" comment="php8-fileinfo is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954685" version="1" comment="php8-ftp is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954686" version="1" comment="php8-gd is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954687" version="1" comment="php8-gettext is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954688" version="1" comment="php8-gmp is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954689" version="1" comment="php8-iconv is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954690" version="1" comment="php8-intl is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954691" version="1" comment="php8-ldap is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954692" version="1" comment="php8-mbstring is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954693" version="1" comment="php8-mysql is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954694" version="1" comment="php8-odbc is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954695" version="1" comment="php8-opcache is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954696" version="1" comment="php8-openssl is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954697" version="1" comment="php8-pcntl is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954698" version="1" comment="php8-pdo is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954699" version="1" comment="php8-pgsql is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954700" version="1" comment="php8-phar is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954701" version="1" comment="php8-posix is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954702" version="1" comment="php8-readline is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954703" version="1" comment="php8-shmop is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954704" version="1" comment="php8-snmp is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954705" version="1" comment="php8-soap is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954706" version="1" comment="php8-sockets is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954707" version="1" comment="php8-sodium is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954708" version="1" comment="php8-sqlite is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954709" version="1" comment="php8-sysvmsg is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954710" version="1" comment="php8-sysvsem is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954711" version="1" comment="php8-sysvshm is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954712" version="1" comment="php8-tidy is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954713" version="1" comment="php8-tokenizer is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954714" version="1" comment="php8-xmlreader is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954715" version="1" comment="php8-xmlwriter is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954716" version="1" comment="php8-xsl is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954717" version="1" comment="php8-zip is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954718" version="1" comment="php8-zlib is &lt;8.3.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954719" version="1" comment="traefik is &lt;3.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954720" version="1" comment="libblkid-devel is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954721" version="1" comment="libblkid-devel-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954722" version="1" comment="libblkid-devel-static is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954723" version="1" comment="libblkid1 is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954724" version="1" comment="libblkid1-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954725" version="1" comment="libfdisk-devel is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954726" version="1" comment="libfdisk-devel-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954727" version="1" comment="libfdisk-devel-static is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954728" version="1" comment="libfdisk1 is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954729" version="1" comment="libfdisk1-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954730" version="1" comment="libmount-devel is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954731" version="1" comment="libmount-devel-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954732" version="1" comment="libmount-devel-static is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954733" version="1" comment="libmount1 is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954734" version="1" comment="libmount1-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954735" version="1" comment="libsmartcols-devel is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954736" version="1" comment="libsmartcols-devel-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954737" version="1" comment="libsmartcols-devel-static is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954738" version="1" comment="libsmartcols1 is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954739" version="1" comment="libsmartcols1-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954740" version="1" comment="libuuid-devel is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954741" version="1" comment="libuuid-devel-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954742" version="1" comment="libuuid-devel-static is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954743" version="1" comment="libuuid1 is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954744" version="1" comment="libuuid1-32bit is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954745" version="1" comment="util-linux is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954746" version="1" comment="util-linux-lang is &lt;2.40.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954820" version="1" comment="rclone is &lt;1.68.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954821" version="1" comment="rclone-bash-completion is &lt;1.68.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954822" version="1" comment="rclone-zsh-completion is &lt;1.68.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954823" version="1" comment="tomcat is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954824" version="1" comment="tomcat-admin-webapps is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954825" version="1" comment="tomcat-docs-webapp is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954826" version="1" comment="tomcat-el-3_0-api is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954827" version="1" comment="tomcat-embed is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954828" version="1" comment="tomcat-javadoc is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954829" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954830" version="1" comment="tomcat-jsvc is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954831" version="1" comment="tomcat-lib is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954832" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954833" version="1" comment="tomcat-webapps is &lt;9.0.97-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954834" version="1" comment="tomcat10 is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954835" version="1" comment="tomcat10-admin-webapps is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954836" version="1" comment="tomcat10-doc is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954837" version="1" comment="tomcat10-docs-webapp is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954838" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954839" version="1" comment="tomcat10-embed is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954840" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954841" version="1" comment="tomcat10-jsvc is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954842" version="1" comment="tomcat10-lib is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954843" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954844" version="1" comment="tomcat10-webapps is &lt;10.1.33-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954930" version="1" comment="neomutt is &lt;20241114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954931" version="1" comment="neomutt-contrib is &lt;20241114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954932" version="1" comment="neomutt-doc is &lt;20241114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954933" version="1" comment="neomutt-lang is &lt;20241114-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954934" version="1" comment="python310-tornado6 is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954935" version="1" comment="python311-tornado6 is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954936" version="1" comment="python312-tornado6 is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954937" version="1" comment="python313-tornado6 is &lt;6.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954938" version="1" comment="libwireshark18 is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954939" version="1" comment="libwiretap15 is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954940" version="1" comment="libwsutil16 is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954941" version="1" comment="wireshark is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954942" version="1" comment="wireshark-devel is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954943" version="1" comment="wireshark-ui-qt is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954944" version="1" comment="xen is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954945" version="1" comment="xen-devel is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954946" version="1" comment="xen-doc-html is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954947" version="1" comment="xen-libs is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954948" version="1" comment="xen-tools is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954949" version="1" comment="xen-tools-domU is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954950" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.19.0_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955226" version="1" comment="libjxl-devel is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955227" version="1" comment="libjxl-tools is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955228" version="1" comment="libjxl0_11 is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955229" version="1" comment="libjxl0_11-32bit is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955230" version="1" comment="libjxl0_11-x86-64-v3 is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955231" version="1" comment="libsndfile-devel is &lt;1.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955232" version="1" comment="libsndfile1 is &lt;1.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955233" version="1" comment="libsndfile1-32bit is &lt;1.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955523" version="1" comment="MozillaThunderbird is &lt;128.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955524" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955525" version="1" comment="MozillaThunderbird-translations-common is &lt;128.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955526" version="1" comment="MozillaThunderbird-translations-other is &lt;128.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955653" version="1" comment="gimp is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955654" version="1" comment="gimp-devel is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955655" version="1" comment="gimp-lang is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955656" version="1" comment="gimp-plugin-aa is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955657" version="1" comment="gimp-plugins-python is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955658" version="1" comment="libgimp-2_0-0 is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955659" version="1" comment="libgimpui-2_0-0 is &lt;2.10.38-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955660" version="1" comment="python is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955661" version="1" comment="python-curses is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955662" version="1" comment="python-demo is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955663" version="1" comment="python-gdbm is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955664" version="1" comment="python-idle is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955665" version="1" comment="python-tk is &lt;2.7.18-51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955871" version="1" comment="ansible-10 is &lt;10.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955872" version="1" comment="ansible-core-2.17 is &lt;2.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955873" version="1" comment="ansible-test-2.17 is &lt;2.17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955874" version="1" comment="avahi is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955875" version="1" comment="avahi-autoipd is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955876" version="1" comment="avahi-compat-howl-devel is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955877" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955878" version="1" comment="avahi-lang is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955879" version="1" comment="avahi-utils is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955880" version="1" comment="libavahi-client3 is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955881" version="1" comment="libavahi-client3-32bit is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955882" version="1" comment="libavahi-common3 is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955883" version="1" comment="libavahi-common3-32bit is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955884" version="1" comment="libavahi-core7 is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955885" version="1" comment="libavahi-devel is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955886" version="1" comment="libavahi-libevent1 is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955887" version="1" comment="libdns_sd is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955888" version="1" comment="libdns_sd-32bit is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955889" version="1" comment="libhowl0 is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955890" version="1" comment="python310-avahi is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955891" version="1" comment="python311-avahi is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955892" version="1" comment="python312-avahi is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955893" version="1" comment="python313-avahi is &lt;0.8-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956191" version="1" comment="himmelblau is &lt;0.7.7+git.0.b48d0bb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956192" version="1" comment="himmelblau-sshd-config is &lt;0.7.7+git.0.b48d0bb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956193" version="1" comment="himmelblau-sso is &lt;0.7.7+git.0.b48d0bb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956194" version="1" comment="libnss_himmelblau2 is &lt;0.7.7+git.0.b48d0bb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956195" version="1" comment="pam-himmelblau is &lt;0.7.7+git.0.b48d0bb-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956196" version="1" comment="python310-PyJWT is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956197" version="1" comment="python311-PyJWT is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956198" version="1" comment="python312-PyJWT is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956199" version="1" comment="python313-PyJWT is &lt;2.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956790" version="1" comment="matrix-synapse is &lt;1.120.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956791" version="1" comment="libmozjs-128-0 is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956792" version="1" comment="mozjs128 is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956793" version="1" comment="mozjs128-devel is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956794" version="1" comment="obs-scm-bridge is &lt;0.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956795" version="1" comment="teleport is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956796" version="1" comment="teleport-bash-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956797" version="1" comment="teleport-fdpass-teleport is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956798" version="1" comment="teleport-tbot is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956799" version="1" comment="teleport-tbot-bash-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956800" version="1" comment="teleport-tbot-zsh-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956801" version="1" comment="teleport-tctl is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956802" version="1" comment="teleport-tctl-bash-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956803" version="1" comment="teleport-tctl-zsh-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956804" version="1" comment="teleport-tsh is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956805" version="1" comment="teleport-tsh-bash-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956806" version="1" comment="teleport-tsh-zsh-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956807" version="1" comment="teleport-zsh-completion is &lt;17.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956808" version="1" comment="ansible-core is &lt;2.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956809" version="1" comment="ansible-test is &lt;2.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956810" version="1" comment="ansible-core-2.16 is &lt;2.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956811" version="1" comment="ansible-test-2.16 is &lt;2.16.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956812" version="1" comment="ansible-core-2.17 is &lt;2.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956813" version="1" comment="ansible-test-2.17 is &lt;2.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956814" version="1" comment="libQt5Pdf5 is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956815" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956816" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956817" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956818" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956819" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956820" version="1" comment="libqt5-qtwebengine is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956821" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956822" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956823" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956824" version="1" comment="netty is &lt;4.1.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956825" version="1" comment="netty-bom is &lt;4.1.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956826" version="1" comment="netty-javadoc is &lt;4.1.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956827" version="1" comment="netty-parent is &lt;4.1.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956828" version="1" comment="jupyter-nbclassic is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956829" version="1" comment="python310-nbclassic is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956830" version="1" comment="python311-nbclassic is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956831" version="1" comment="python312-nbclassic is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956832" version="1" comment="python313-nbclassic is &lt;1.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956833" version="1" comment="python310-python-multipart is &lt;0.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956834" version="1" comment="python311-python-multipart is &lt;0.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956835" version="1" comment="python312-python-multipart is &lt;0.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956836" version="1" comment="python313-python-multipart is &lt;0.0.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956998" version="1" comment="chromedriver is &lt;131.0.6778.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956999" version="1" comment="chromium is &lt;131.0.6778.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957000" version="1" comment="jupyter-jupyterlab-latex is &lt;4.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957001" version="1" comment="oras is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957002" version="1" comment="oras-bash-completion is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957003" version="1" comment="oras-fish-completion is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957004" version="1" comment="oras-zsh-completion is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957005" version="1" comment="python310-Flask-Security is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957006" version="1" comment="python311-Flask-Security is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957007" version="1" comment="python312-Flask-Security is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957008" version="1" comment="python313-Flask-Security is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957009" version="1" comment="python310-aiohttp is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957010" version="1" comment="python311-aiohttp is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957011" version="1" comment="python312-aiohttp is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957012" version="1" comment="python313-aiohttp is &lt;3.11.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957013" version="1" comment="python310-django-ckeditor is &lt;6.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957014" version="1" comment="python311-django-ckeditor is &lt;6.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957015" version="1" comment="python312-django-ckeditor is &lt;6.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957016" version="1" comment="python313-django-ckeditor is &lt;6.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957017" version="1" comment="python-furo-doc is &lt;2024.8.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957018" version="1" comment="python310-furo is &lt;2024.8.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957019" version="1" comment="python311-furo is &lt;2024.8.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957020" version="1" comment="python312-furo is &lt;2024.8.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957021" version="1" comment="python313-furo is &lt;2024.8.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957022" version="1" comment="python310-jupyter-ydoc is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957023" version="1" comment="python311-jupyter-ydoc is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957024" version="1" comment="python312-jupyter-ydoc is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957025" version="1" comment="python313-jupyter-ydoc is &lt;3.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957026" version="1" comment="jupyter-nbdime is &lt;7.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957027" version="1" comment="jupyter-nbdime-jupyterlab is &lt;3.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957028" version="1" comment="python310-nbdime is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957029" version="1" comment="python310-nbdime-git is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957030" version="1" comment="python310-nbdime-hg is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957031" version="1" comment="python311-nbdime is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957032" version="1" comment="python311-nbdime-git is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957033" version="1" comment="python311-nbdime-hg is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957034" version="1" comment="python312-nbdime is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957035" version="1" comment="python312-nbdime-git is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957036" version="1" comment="python312-nbdime-hg is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957037" version="1" comment="python313-nbdime is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957038" version="1" comment="python313-nbdime-git is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957039" version="1" comment="python313-nbdime-hg is &lt;4.0.2-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957040" version="1" comment="python310-pytest-html is &lt;4.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957041" version="1" comment="python311-pytest-html is &lt;4.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957042" version="1" comment="python312-pytest-html is &lt;4.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957043" version="1" comment="python313-pytest-html is &lt;4.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957044" version="1" comment="skopeo is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957045" version="1" comment="skopeo-bash-completion is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957046" version="1" comment="skopeo-fish-completion is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957047" version="1" comment="skopeo-zsh-completion is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957137" version="1" comment="pam is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957138" version="1" comment="pam-32bit is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957139" version="1" comment="pam-devel is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957140" version="1" comment="pam-devel-32bit is &lt;1.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957230" version="1" comment="lxd is &lt;5.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957231" version="1" comment="lxd-bash-completion is &lt;5.21.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957232" version="1" comment="python310-Django4 is &lt;4.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957233" version="1" comment="python311-Django4 is &lt;4.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957234" version="1" comment="python312-Django4 is &lt;4.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957235" version="1" comment="python313-Django4 is &lt;4.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957236" version="1" comment="squid is &lt;6.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958021" version="1" comment="govulncheck-vulndb is &lt;0.0.20241209T183251-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958022" version="1" comment="python310-Django is &lt;5.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958023" version="1" comment="python311-Django is &lt;5.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958024" version="1" comment="python312-Django is &lt;5.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958025" version="1" comment="python313-Django is &lt;5.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958026" version="1" comment="radare2 is &lt;5.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958027" version="1" comment="radare2-devel is &lt;5.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958028" version="1" comment="radare2-zsh-completion is &lt;5.9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958029" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958030" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958031" version="1" comment="subversion is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958032" version="1" comment="subversion-bash-completion is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958033" version="1" comment="subversion-devel is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958034" version="1" comment="subversion-perl is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958035" version="1" comment="subversion-python is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958036" version="1" comment="subversion-ruby is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958037" version="1" comment="subversion-server is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958038" version="1" comment="subversion-tools is &lt;1.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958039" version="1" comment="docker-stable is &lt;24.0.9_ce-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958040" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958041" version="1" comment="docker-stable-buildx is &lt;0.19.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958042" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958043" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958044" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958045" version="1" comment="firefox-esr is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958046" version="1" comment="firefox-esr-branding-upstream is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958047" version="1" comment="firefox-esr-translations-common is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958048" version="1" comment="firefox-esr-translations-other is &lt;128.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958049" version="1" comment="teleport is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958050" version="1" comment="teleport-bash-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958051" version="1" comment="teleport-fdpass-teleport is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958052" version="1" comment="teleport-tbot is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958053" version="1" comment="teleport-tbot-bash-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958054" version="1" comment="teleport-tbot-zsh-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958055" version="1" comment="teleport-tctl is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958056" version="1" comment="teleport-tctl-bash-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958057" version="1" comment="teleport-tctl-zsh-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958058" version="1" comment="teleport-tsh is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958059" version="1" comment="teleport-tsh-bash-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958060" version="1" comment="teleport-tsh-zsh-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958061" version="1" comment="teleport-zsh-completion is &lt;17.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958062" version="1" comment="chromedriver is &lt;131.0.6778.139-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958063" version="1" comment="chromium is &lt;131.0.6778.139-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958064" version="1" comment="curl is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958065" version="1" comment="curl-fish-completion is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958066" version="1" comment="curl-zsh-completion is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958067" version="1" comment="libcurl-devel is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958068" version="1" comment="libcurl-devel-32bit is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958069" version="1" comment="libcurl-devel-doc is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958070" version="1" comment="libcurl4 is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958071" version="1" comment="libcurl4-32bit is &lt;8.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958072" version="1" comment="gstreamer is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958073" version="1" comment="gstreamer-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958074" version="1" comment="gstreamer-devel is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958075" version="1" comment="gstreamer-devel-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958076" version="1" comment="gstreamer-lang is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958077" version="1" comment="gstreamer-utils is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958078" version="1" comment="libgstreamer-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958079" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958080" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958081" version="1" comment="typelib-1_0-Gst-1_0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958082" version="1" comment="gstreamer-plugins-base is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958083" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958084" version="1" comment="gstreamer-plugins-base-devel is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958085" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958086" version="1" comment="gstreamer-plugins-base-lang is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958087" version="1" comment="libgstallocators-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958088" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958089" version="1" comment="libgstapp-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958090" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958091" version="1" comment="libgstaudio-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958092" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958093" version="1" comment="libgstfft-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958094" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958095" version="1" comment="libgstgl-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958096" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958097" version="1" comment="libgstpbutils-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958098" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958099" version="1" comment="libgstriff-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958100" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958101" version="1" comment="libgstrtp-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958102" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958103" version="1" comment="libgstrtsp-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958104" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958105" version="1" comment="libgstsdp-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958106" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958107" version="1" comment="libgsttag-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958108" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958109" version="1" comment="libgstvideo-1_0-0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958110" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958111" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958112" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958113" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958114" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958115" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958116" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958117" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958118" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958119" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958120" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958121" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958122" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958123" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958124" version="1" comment="gstreamer-plugins-good is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958125" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958126" version="1" comment="gstreamer-plugins-good-extra is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958127" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958128" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958129" version="1" comment="gstreamer-plugins-good-jack is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958130" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958131" version="1" comment="gstreamer-plugins-good-lang is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958132" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958133" version="1" comment="gstreamer-plugins-good-qtqml6 is &lt;1.24.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958134" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958135" version="1" comment="libheif-aom is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958136" version="1" comment="libheif-dav1d is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958137" version="1" comment="libheif-devel is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958138" version="1" comment="libheif-ffmpeg is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958139" version="1" comment="libheif-jpeg is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958140" version="1" comment="libheif-openjpeg is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958141" version="1" comment="libheif-rav1e is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958142" version="1" comment="libheif-svtenc is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958143" version="1" comment="libheif1 is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958144" version="1" comment="libheif1-32bit is &lt;1.19.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958145" version="1" comment="liboqs-devel is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958146" version="1" comment="liboqs-devel-32bit is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958147" version="1" comment="liboqs7 is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958148" version="1" comment="liboqs7-32bit is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958149" version="1" comment="python312 is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958150" version="1" comment="python312-32bit is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958151" version="1" comment="python312-curses is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958152" version="1" comment="python312-dbm is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958153" version="1" comment="python312-idle is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958154" version="1" comment="python312-tk is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958155" version="1" comment="python312-x86-64-v3 is &lt;3.12.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958156" version="1" comment="socat is &lt;1.8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958157" version="1" comment="socat-extra is &lt;1.8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958238" version="1" comment="MozillaFirefox is &lt;133.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958239" version="1" comment="MozillaFirefox-branding-upstream is &lt;133.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958240" version="1" comment="MozillaFirefox-devel is &lt;133.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958241" version="1" comment="MozillaFirefox-translations-common is &lt;133.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958242" version="1" comment="MozillaFirefox-translations-other is &lt;133.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958243" version="1" comment="MozillaThunderbird is &lt;128.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958244" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958245" version="1" comment="MozillaThunderbird-translations-common is &lt;128.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958246" version="1" comment="MozillaThunderbird-translations-other is &lt;128.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958247" version="1" comment="cloudflared is &lt;2024.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958248" version="1" comment="gstreamer-plugins-good is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958249" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958250" version="1" comment="gstreamer-plugins-good-extra is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958251" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958252" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958253" version="1" comment="gstreamer-plugins-good-jack is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958254" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958255" version="1" comment="gstreamer-plugins-good-lang is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958256" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958257" version="1" comment="gstreamer-plugins-good-qtqml6 is &lt;1.24.10-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958258" version="1" comment="libmozjs-115-0 is &lt;115.15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958259" version="1" comment="mozjs115 is &lt;115.15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958260" version="1" comment="mozjs115-devel is &lt;115.15.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958261" version="1" comment="libmozjs-128-0 is &lt;128.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958262" version="1" comment="mozjs128 is &lt;128.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958263" version="1" comment="mozjs128-devel is &lt;128.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958264" version="1" comment="libmozjs-78-0 is &lt;78.15.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958265" version="1" comment="mozjs78 is &lt;78.15.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958266" version="1" comment="mozjs78-devel is &lt;78.15.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958267" version="1" comment="traefik is &lt;3.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958748" version="1" comment="emacs is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958749" version="1" comment="emacs-el is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958750" version="1" comment="emacs-eln is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958751" version="1" comment="emacs-games is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958752" version="1" comment="emacs-info is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958753" version="1" comment="emacs-nox is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958754" version="1" comment="emacs-x11 is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958755" version="1" comment="etags is &lt;29.4-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958756" version="1" comment="git-bug is &lt;0.8.0+git.1733745604.d499b6e-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958757" version="1" comment="git-bug-bash-completion is &lt;0.8.0+git.1733745604.d499b6e-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958758" version="1" comment="git-bug-fish-completion is &lt;0.8.0+git.1733745604.d499b6e-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958759" version="1" comment="git-bug-zsh-completion is &lt;0.8.0+git.1733745604.d499b6e-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958760" version="1" comment="helm is &lt;3.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958761" version="1" comment="helm-bash-completion is &lt;3.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958762" version="1" comment="helm-fish-completion is &lt;3.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958763" version="1" comment="helm-zsh-completion is &lt;3.16.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958764" version="1" comment="libmozjs-115-0 is &lt;115.15.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958765" version="1" comment="mozjs115 is &lt;115.15.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958766" version="1" comment="mozjs115-devel is &lt;115.15.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958767" version="1" comment="traefik2 is &lt;2.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958768" version="1" comment="clamav is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958769" version="1" comment="clamav-devel is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958770" version="1" comment="clamav-docs-html is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958771" version="1" comment="clamav-milter is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958772" version="1" comment="libclamav12 is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958773" version="1" comment="libclammspack0 is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958774" version="1" comment="libfreshclam3 is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958775" version="1" comment="docker is &lt;27.4.1_ce-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958776" version="1" comment="docker-bash-completion is &lt;27.4.1_ce-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958777" version="1" comment="docker-buildx is &lt;0.19.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958778" version="1" comment="docker-fish-completion is &lt;27.4.1_ce-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958779" version="1" comment="docker-rootless-extras is &lt;27.4.1_ce-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958780" version="1" comment="docker-zsh-completion is &lt;27.4.1_ce-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958781" version="1" comment="docker-stable is &lt;24.0.9_ce-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958782" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958783" version="1" comment="docker-stable-buildx is &lt;0.19.3-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958784" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958785" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958786" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958787" version="1" comment="govulncheck-vulndb is &lt;0.0.20241213T205935-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958788" version="1" comment="libmozjs-128-0 is &lt;128.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958789" version="1" comment="mozjs128 is &lt;128.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958790" version="1" comment="mozjs128-devel is &lt;128.5.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958791" version="1" comment="python310-xhtml2pdf is &lt;0.2.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958792" version="1" comment="python311-xhtml2pdf is &lt;0.2.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958793" version="1" comment="python312-xhtml2pdf is &lt;0.2.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958794" version="1" comment="python313-xhtml2pdf is &lt;0.2.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958795" version="1" comment="tailscale is &lt;1.78.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958796" version="1" comment="tailscale-bash-completion is &lt;1.78.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958797" version="1" comment="tailscale-fish-completion is &lt;1.78.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958798" version="1" comment="tailscale-zsh-completion is &lt;1.78.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958799" version="1" comment="govulncheck-vulndb is &lt;0.0.20241218T202206-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958800" version="1" comment="logcli is &lt;3.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958801" version="1" comment="loki is &lt;3.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958802" version="1" comment="lokitool is &lt;3.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958803" version="1" comment="promtail is &lt;3.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958804" version="1" comment="tuned is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958805" version="1" comment="tuned-gtk is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958806" version="1" comment="tuned-ppd is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958807" version="1" comment="tuned-profiles-atomic is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958808" version="1" comment="tuned-profiles-nfv is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958809" version="1" comment="tuned-profiles-openshift is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958810" version="1" comment="tuned-profiles-oracle is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958811" version="1" comment="tuned-profiles-postgresql is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958812" version="1" comment="tuned-profiles-realtime is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958813" version="1" comment="tuned-profiles-sap is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958814" version="1" comment="tuned-profiles-sap-hana is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958815" version="1" comment="tuned-profiles-spectrumscale is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958816" version="1" comment="tuned-utils is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958817" version="1" comment="tuned-utils-systemtap is &lt;2.24.1.0+git.90c24ee-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958818" version="1" comment="teleport is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958819" version="1" comment="teleport-bash-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958820" version="1" comment="teleport-fdpass-teleport is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958821" version="1" comment="teleport-tbot is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958822" version="1" comment="teleport-tbot-bash-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958823" version="1" comment="teleport-tbot-zsh-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958824" version="1" comment="teleport-tctl is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958825" version="1" comment="teleport-tctl-bash-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958826" version="1" comment="teleport-tctl-zsh-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958827" version="1" comment="teleport-tsh is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958828" version="1" comment="teleport-tsh-bash-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958829" version="1" comment="teleport-tsh-zsh-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958830" version="1" comment="teleport-zsh-completion is &lt;17.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958831" version="1" comment="chromedriver is &lt;131.0.6778.204-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958832" version="1" comment="chromium is &lt;131.0.6778.204-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958833" version="1" comment="govulncheck-vulndb is &lt;0.0.20241220T214820-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958834" version="1" comment="libparaview5_12 is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958835" version="1" comment="paraview is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958836" version="1" comment="paraview-devel is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958837" version="1" comment="paraview-devel-static is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958838" version="1" comment="paraview-plugins is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958839" version="1" comment="python3-paraview is &lt;5.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958948" version="1" comment="assimp-devel is &lt;5.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958949" version="1" comment="libassimp5 is &lt;5.4.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958950" version="1" comment="libQt6Pdf6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958951" version="1" comment="libQt6PdfQuick6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958952" version="1" comment="libQt6PdfWidgets6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958953" version="1" comment="libQt6WebEngineCore6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958954" version="1" comment="libQt6WebEngineQuick6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958955" version="1" comment="libQt6WebEngineWidgets6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958956" version="1" comment="qt6-pdf-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958957" version="1" comment="qt6-pdf-imports is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958958" version="1" comment="qt6-pdf-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958959" version="1" comment="qt6-pdfquick-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958960" version="1" comment="qt6-pdfquick-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958961" version="1" comment="qt6-pdfwidgets-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958962" version="1" comment="qt6-pdfwidgets-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958963" version="1" comment="qt6-webengine is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958964" version="1" comment="qt6-webengine-examples is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958965" version="1" comment="qt6-webengine-imports is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958966" version="1" comment="qt6-webenginecore-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958967" version="1" comment="qt6-webenginecore-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958968" version="1" comment="qt6-webenginequick-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958969" version="1" comment="qt6-webenginequick-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958970" version="1" comment="qt6-webenginewidgets-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958971" version="1" comment="qt6-webenginewidgets-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959048" version="1" comment="sops is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959049" version="1" comment="velero is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959050" version="1" comment="velero-bash-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959051" version="1" comment="velero-fish-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959052" version="1" comment="velero-zsh-completion is &lt;1.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959090" version="1" comment="harfbuzz-devel is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959091" version="1" comment="harfbuzz-tools is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959092" version="1" comment="libharfbuzz-cairo0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959093" version="1" comment="libharfbuzz-cairo0-32bit is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959094" version="1" comment="libharfbuzz-gobject0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959095" version="1" comment="libharfbuzz-gobject0-32bit is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959096" version="1" comment="libharfbuzz-icu0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959097" version="1" comment="libharfbuzz-icu0-32bit is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959098" version="1" comment="libharfbuzz-subset0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959099" version="1" comment="libharfbuzz-subset0-32bit is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959100" version="1" comment="libharfbuzz0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959101" version="1" comment="libharfbuzz0-32bit is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959102" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;10.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959103" version="1" comment="corepack22 is &lt;22.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959104" version="1" comment="nodejs22 is &lt;22.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959105" version="1" comment="nodejs22-devel is &lt;22.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959106" version="1" comment="nodejs22-docs is &lt;22.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959107" version="1" comment="npm22 is &lt;22.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959108" version="1" comment="libpoppler-cpp1 is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959109" version="1" comment="libpoppler-cpp1-32bit is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959110" version="1" comment="libpoppler-devel is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959111" version="1" comment="libpoppler-glib-devel is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959112" version="1" comment="libpoppler-glib8 is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959113" version="1" comment="libpoppler-glib8-32bit is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959114" version="1" comment="libpoppler144 is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959115" version="1" comment="libpoppler144-32bit is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959116" version="1" comment="poppler-tools is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959117" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;24.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959118" version="1" comment="rizin is &lt;0.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959119" version="1" comment="rizin-common is &lt;0.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959120" version="1" comment="rizin-devel is &lt;0.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959228" version="1" comment="apptainer is &lt;1.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959229" version="1" comment="apptainer-leap is &lt;1.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959230" version="1" comment="apptainer-sle15_5 is &lt;1.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959231" version="1" comment="apptainer-sle15_6 is &lt;1.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959232" version="1" comment="apptainer-sle15_7 is &lt;1.3.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959233" version="1" comment="firefox-esr is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959234" version="1" comment="firefox-esr-branding-upstream is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959235" version="1" comment="firefox-esr-translations-common is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959236" version="1" comment="firefox-esr-translations-other is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959237" version="1" comment="libopenjp2-7 is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959238" version="1" comment="libopenjp2-7-32bit is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959239" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959240" version="1" comment="openjpeg2 is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959241" version="1" comment="openjpeg2-devel is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959242" version="1" comment="openjpeg2-devel-doc is &lt;2.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959243" version="1" comment="libruby3_4-3_4 is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959244" version="1" comment="ruby3.4 is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959245" version="1" comment="ruby3.4-devel is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959246" version="1" comment="ruby3.4-devel-extra is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959247" version="1" comment="ruby3.4-doc is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959248" version="1" comment="ruby3.4-doc-ri is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959249" version="1" comment="tomcat is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959250" version="1" comment="tomcat-admin-webapps is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959251" version="1" comment="tomcat-docs-webapp is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959252" version="1" comment="tomcat-el-3_0-api is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959253" version="1" comment="tomcat-embed is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959254" version="1" comment="tomcat-javadoc is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959255" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959256" version="1" comment="tomcat-jsvc is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959257" version="1" comment="tomcat-lib is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959258" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959259" version="1" comment="tomcat-webapps is &lt;9.0.98-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959260" version="1" comment="tomcat10 is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959261" version="1" comment="tomcat10-admin-webapps is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959262" version="1" comment="tomcat10-doc is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959263" version="1" comment="tomcat10-docs-webapp is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959264" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959265" version="1" comment="tomcat10-embed is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959266" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959267" version="1" comment="tomcat10-jsvc is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959268" version="1" comment="tomcat10-lib is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959269" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959270" version="1" comment="tomcat10-webapps is &lt;10.1.34-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959630" version="1" comment="govulncheck-vulndb is &lt;0.0.20250108T191942-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959631" version="1" comment="gstreamer-plugins-base is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959632" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959633" version="1" comment="gstreamer-plugins-base-devel is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959634" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959635" version="1" comment="gstreamer-plugins-base-lang is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959636" version="1" comment="libgstallocators-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959637" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959638" version="1" comment="libgstapp-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959639" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959640" version="1" comment="libgstaudio-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959641" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959642" version="1" comment="libgstfft-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959643" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959644" version="1" comment="libgstgl-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959645" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959646" version="1" comment="libgstpbutils-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959647" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959648" version="1" comment="libgstriff-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959649" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959650" version="1" comment="libgstrtp-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959651" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959652" version="1" comment="libgstrtsp-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959653" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959654" version="1" comment="libgstsdp-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959655" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959656" version="1" comment="libgsttag-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959657" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959658" version="1" comment="libgstvideo-1_0-0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959659" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959660" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959661" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959662" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959663" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959664" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959665" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959666" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959667" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959668" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959669" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959670" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959671" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959672" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959673" version="1" comment="kubo is &lt;0.32.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959674" version="1" comment="logback is &lt;1.2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959675" version="1" comment="logback-access is &lt;1.2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959676" version="1" comment="logback-examples is &lt;1.2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959677" version="1" comment="logback-javadoc is &lt;1.2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959678" version="1" comment="python311-slixmpp is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959679" version="1" comment="python312-slixmpp is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959680" version="1" comment="python313-slixmpp is &lt;1.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960020" version="1" comment="chromedriver is &lt;131.0.6778.264-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960021" version="1" comment="chromium is &lt;131.0.6778.264-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960022" version="1" comment="MozillaFirefox is &lt;134.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960023" version="1" comment="MozillaFirefox-branding-upstream is &lt;134.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960024" version="1" comment="MozillaFirefox-devel is &lt;134.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960025" version="1" comment="MozillaFirefox-translations-common is &lt;134.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960026" version="1" comment="MozillaFirefox-translations-other is &lt;134.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960027" version="1" comment="dpdk is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960028" version="1" comment="dpdk-devel is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960029" version="1" comment="dpdk-devel-static is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960030" version="1" comment="dpdk-doc is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960031" version="1" comment="dpdk-examples is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960032" version="1" comment="dpdk-tools is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960033" version="1" comment="libdpdk-24 is &lt;23.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960034" version="1" comment="frr is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960035" version="1" comment="frr-devel is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960036" version="1" comment="libfrr0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960037" version="1" comment="libfrr_pb0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960038" version="1" comment="libfrrcares0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960039" version="1" comment="libfrrfpm_pb0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960040" version="1" comment="libfrrospfapiclient0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960041" version="1" comment="libfrrsnmp0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960042" version="1" comment="libfrrzmq0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960043" version="1" comment="libmgmt_be_nb0 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960044" version="1" comment="grafana is &lt;11.3.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960045" version="1" comment="operator-sdk is &lt;1.39.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960046" version="1" comment="operator-sdk-bash-completion is &lt;1.39.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960047" version="1" comment="operator-sdk-fish-completion is &lt;1.39.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960048" version="1" comment="operator-sdk-zsh-completion is &lt;1.39.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960049" version="1" comment="perl-Module-ScanDeps is &lt;1.370.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960050" version="1" comment="proftpd is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960051" version="1" comment="proftpd-devel is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960052" version="1" comment="proftpd-doc is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960053" version="1" comment="proftpd-lang is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960054" version="1" comment="proftpd-ldap is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960055" version="1" comment="proftpd-mysql is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960056" version="1" comment="proftpd-pgsql is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960057" version="1" comment="proftpd-radius is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960058" version="1" comment="proftpd-sqlite is &lt;1.3.8c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960059" version="1" comment="python311-mistune is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960060" version="1" comment="python312-mistune is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960061" version="1" comment="python313-mistune is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960062" version="1" comment="valkey is &lt;8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960063" version="1" comment="valkey-compat-redis is &lt;8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960064" version="1" comment="valkey-devel is &lt;8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960065" version="1" comment="yq is &lt;4.44.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960066" version="1" comment="yq-bash-completion is &lt;4.44.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960067" version="1" comment="yq-fish-completion is &lt;4.44.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960068" version="1" comment="yq-zsh-completion is &lt;4.44.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960311" version="1" comment="kepler is &lt;0.7.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960312" version="1" comment="rclone is &lt;1.69.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960313" version="1" comment="rclone-bash-completion is &lt;1.69.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960314" version="1" comment="rclone-zsh-completion is &lt;1.69.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960315" version="1" comment="SDL2_sound-devel is &lt;2.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960316" version="1" comment="libSDL2_sound2 is &lt;2.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960317" version="1" comment="dcmtk is &lt;3.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960318" version="1" comment="dcmtk-devel is &lt;3.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960319" version="1" comment="libdcmtk19 is &lt;3.6.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960320" version="1" comment="govulncheck-vulndb is &lt;0.0.20250109T194159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960321" version="1" comment="python311-Pillow is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960322" version="1" comment="python311-Pillow-tk is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960323" version="1" comment="python312-Pillow is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960324" version="1" comment="python312-Pillow-tk is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960325" version="1" comment="python313-Pillow is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960326" version="1" comment="python313-Pillow-tk is &lt;11.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960327" version="1" comment="libraptor-devel is &lt;2.0.16-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960328" version="1" comment="libraptor2-0 is &lt;2.0.16-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960329" version="1" comment="libraptor2-0-32bit is &lt;2.0.16-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960330" version="1" comment="raptor is &lt;2.0.16-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960331" version="1" comment="python311-translate-toolkit is &lt;3.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960332" version="1" comment="python312-translate-toolkit is &lt;3.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960333" version="1" comment="python313-translate-toolkit is &lt;3.14.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960395" version="1" comment="MozillaThunderbird is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960396" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960397" version="1" comment="MozillaThunderbird-translations-common is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960398" version="1" comment="MozillaThunderbird-translations-other is &lt;128.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960399" version="1" comment="git-lfs is &lt;3.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960400" version="1" comment="pam_u2f is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960401" version="1" comment="python311-Django4 is &lt;4.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960402" version="1" comment="python312-Django4 is &lt;4.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960403" version="1" comment="python313-Django4 is &lt;4.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960718" version="1" comment="git is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960719" version="1" comment="git-arch is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960720" version="1" comment="git-core is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960721" version="1" comment="git-credential-libsecret is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960722" version="1" comment="git-cvs is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960723" version="1" comment="git-daemon is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960724" version="1" comment="git-doc is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960725" version="1" comment="git-email is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960726" version="1" comment="git-gui is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960727" version="1" comment="git-p4 is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960728" version="1" comment="git-svn is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960729" version="1" comment="git-web is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960730" version="1" comment="gitk is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960731" version="1" comment="perl-Git is &lt;2.48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960732" version="1" comment="govulncheck-vulndb is &lt;0.0.20250115T172141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960733" version="1" comment="grafana is &lt;11.3.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960734" version="1" comment="hplip is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960735" version="1" comment="hplip-devel is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960736" version="1" comment="hplip-hpijs is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960737" version="1" comment="hplip-sane is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960738" version="1" comment="hplip-scan-utils is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960739" version="1" comment="hplip-udev-rules is &lt;3.24.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960740" version="1" comment="perl-Compress-Raw-Zlib is &lt;2.213-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960741" version="1" comment="perl-IO-Compress is &lt;2.213.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960742" version="1" comment="amazon-ssm-agent is &lt;3.3.1611.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960743" version="1" comment="chromedriver is &lt;132.0.6834.83-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960744" version="1" comment="chromium is &lt;132.0.6834.83-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960745" version="1" comment="golang-github-prometheus-prometheus is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960746" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;550.144.03-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960747" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.144.03_k6.12.9_1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960748" version="1" comment="python311-Django is &lt;5.1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960749" version="1" comment="python312-Django is &lt;5.1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960750" version="1" comment="python313-Django is &lt;5.1.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960751" version="1" comment="velociraptor is &lt;0.7.0.4.git142.862ef23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960758" version="1" comment="python311-httpx is &lt;0.28.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960759" version="1" comment="python312-httpx is &lt;0.28.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960760" version="1" comment="python313-httpx is &lt;0.28.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960761" version="1" comment="rsync is &lt;3.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961045" version="1" comment="helmfile is &lt;0.170.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961046" version="1" comment="helmfile-bash-completion is &lt;0.170.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961047" version="1" comment="helmfile-fish-completion is &lt;0.170.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961048" version="1" comment="helmfile-zsh-completion is &lt;0.170.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961049" version="1" comment="nvidia-modprobe is &lt;565.77-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961050" version="1" comment="ruby3.4-rubygem-actioncable-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961051" version="1" comment="ruby3.4-rubygem-actionmailbox-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961052" version="1" comment="ruby3.4-rubygem-actionmailer-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961053" version="1" comment="ruby3.4-rubygem-actionpack-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961054" version="1" comment="ruby3.4-rubygem-actiontext-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961055" version="1" comment="ruby3.4-rubygem-actionview-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961056" version="1" comment="ruby3.4-rubygem-activejob-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961057" version="1" comment="ruby3.4-rubygem-activemodel-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961058" version="1" comment="ruby3.4-rubygem-activerecord-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961059" version="1" comment="ruby3.4-rubygem-activestorage-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961060" version="1" comment="ruby3.4-rubygem-activesupport-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961061" version="1" comment="ruby3.4-rubygem-rails-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961062" version="1" comment="ruby3.4-rubygem-railties-8.0 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961078" version="1" comment="grafana is &lt;11.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961079" version="1" comment="java-17-openjdk is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961080" version="1" comment="java-17-openjdk-demo is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961081" version="1" comment="java-17-openjdk-devel is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961082" version="1" comment="java-17-openjdk-headless is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961083" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961084" version="1" comment="java-17-openjdk-jmods is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961085" version="1" comment="java-17-openjdk-src is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961151" version="1" comment="clamav is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961152" version="1" comment="clamav-devel is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961153" version="1" comment="clamav-docs-html is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961154" version="1" comment="clamav-milter is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961155" version="1" comment="libclamav12 is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961156" version="1" comment="libclammspack0 is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961157" version="1" comment="libfreshclam3 is &lt;1.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961158" version="1" comment="helmfile is &lt;0.170.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961159" version="1" comment="helmfile-bash-completion is &lt;0.170.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961160" version="1" comment="helmfile-fish-completion is &lt;0.170.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961161" version="1" comment="helmfile-zsh-completion is &lt;0.170.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961162" version="1" comment="java-11-openjdk is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961163" version="1" comment="java-11-openjdk-demo is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961164" version="1" comment="java-11-openjdk-devel is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961165" version="1" comment="java-11-openjdk-headless is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961166" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961167" version="1" comment="java-11-openjdk-jmods is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961168" version="1" comment="java-11-openjdk-src is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961169" version="1" comment="java-21-openjdk is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961170" version="1" comment="java-21-openjdk-demo is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961171" version="1" comment="java-21-openjdk-devel is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961172" version="1" comment="java-21-openjdk-headless is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961173" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961174" version="1" comment="java-21-openjdk-jmods is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961175" version="1" comment="java-21-openjdk-src is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961176" version="1" comment="nodejs-electron is &lt;33.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961177" version="1" comment="nodejs-electron-devel is &lt;33.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961178" version="1" comment="nodejs-electron-doc is &lt;33.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961179" version="1" comment="phpMyAdmin is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961180" version="1" comment="phpMyAdmin-apache is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961181" version="1" comment="phpMyAdmin-lang is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961182" version="1" comment="podman is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961183" version="1" comment="podman-docker is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961184" version="1" comment="podman-remote is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961185" version="1" comment="podmansh is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961186" version="1" comment="python311-azure-storage-blob is &lt;12.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961187" version="1" comment="python312-azure-storage-blob is &lt;12.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961188" version="1" comment="python313-azure-storage-blob is &lt;12.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961189" version="1" comment="python313 is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961190" version="1" comment="python313-32bit is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961191" version="1" comment="python313-curses is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961192" version="1" comment="python313-dbm is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961193" version="1" comment="python313-idle is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961194" version="1" comment="python313-tk is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961195" version="1" comment="python313-x86-64-v3 is &lt;3.13.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961196" version="1" comment="libQt6Bluetooth6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961197" version="1" comment="libQt6Nfc6 is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961198" version="1" comment="qt6-connectivity is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961199" version="1" comment="qt6-connectivity-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961200" version="1" comment="qt6-connectivity-examples is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961201" version="1" comment="qt6-connectivity-private-devel is &lt;6.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961978" version="1" comment="go1.24 is &lt;1.24rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961979" version="1" comment="go1.24-doc is &lt;1.24rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961980" version="1" comment="go1.24-libstd is &lt;1.24rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961981" version="1" comment="go1.24-race is &lt;1.24rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961982" version="1" comment="go1.22 is &lt;1.22.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961983" version="1" comment="go1.22-doc is &lt;1.22.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961984" version="1" comment="go1.22-libstd is &lt;1.22.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961985" version="1" comment="go1.22-race is &lt;1.22.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961986" version="1" comment="go1.23 is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961987" version="1" comment="go1.23-doc is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961988" version="1" comment="go1.23-libstd is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961989" version="1" comment="go1.23-race is &lt;1.23.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961990" version="1" comment="libopenssl-3-devel is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961991" version="1" comment="libopenssl-3-devel-32bit is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961992" version="1" comment="libopenssl-3-fips-provider is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961993" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961994" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961995" version="1" comment="libopenssl3 is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961996" version="1" comment="libopenssl3-32bit is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961997" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961998" version="1" comment="openssl-3 is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961999" version="1" comment="openssl-3-doc is &lt;3.2.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962000" version="1" comment="ruby3.4-rubygem-nokogiri is &lt;1.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962001" version="1" comment="chromedriver is &lt;132.0.6834.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962002" version="1" comment="chromium is &lt;132.0.6834.110-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962003" version="1" comment="gstreamer-plugins-good is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962004" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962005" version="1" comment="gstreamer-plugins-good-extra is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962006" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962007" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962008" version="1" comment="gstreamer-plugins-good-jack is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962009" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962010" version="1" comment="gstreamer-plugins-good-lang is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962011" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962012" version="1" comment="gstreamer-plugins-good-qtqml6 is &lt;1.24.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962013" version="1" comment="iperf is &lt;3.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962014" version="1" comment="iperf-devel is &lt;3.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962015" version="1" comment="libiperf0 is &lt;3.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962016" version="1" comment="python311-asteval is &lt;1.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962017" version="1" comment="python312-asteval is &lt;1.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962018" version="1" comment="python313-asteval is &lt;1.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962019" version="1" comment="python311-sentry-sdk is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962020" version="1" comment="python312-sentry-sdk is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962021" version="1" comment="python313-sentry-sdk is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962022" version="1" comment="apache2-mod_security2 is &lt;2.9.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962023" version="1" comment="govulncheck-vulndb is &lt;0.0.20250117T214834-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962025" version="1" comment="kernel-source-longterm is &lt;6.12.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962026" version="1" comment="corepack22 is &lt;22.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962027" version="1" comment="nodejs22 is &lt;22.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962028" version="1" comment="nodejs22-devel is &lt;22.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962029" version="1" comment="nodejs22-docs is &lt;22.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962030" version="1" comment="npm22 is &lt;22.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962031" version="1" comment="openvpn is &lt;2.6.10-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962032" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.10-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962033" version="1" comment="openvpn-devel is &lt;2.6.10-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962034" version="1" comment="openvpn-down-root-plugin is &lt;2.6.10-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962035" version="1" comment="owasp-modsecurity-crs is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962036" version="1" comment="owasp-modsecurity-crs-apache2 is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962343" version="1" comment="fake-gcs-server is &lt;1.52.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962344" version="1" comment="govulncheck-vulndb is &lt;0.0.20250128T150132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962345" version="1" comment="hauler is &lt;1.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962346" version="1" comment="python311-pydantic is &lt;2.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962347" version="1" comment="python312-pydantic is &lt;2.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962348" version="1" comment="python313-pydantic is &lt;2.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962349" version="1" comment="trivy is &lt;0.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962350" version="1" comment="apptainer is &lt;1.3.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962351" version="1" comment="apptainer-leap is &lt;1.3.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962352" version="1" comment="apptainer-sle15_5 is &lt;1.3.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962353" version="1" comment="apptainer-sle15_6 is &lt;1.3.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962354" version="1" comment="apptainer-sle15_7 is &lt;1.3.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962355" version="1" comment="dovecot24 is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962356" version="1" comment="dovecot24-backend-mysql is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962357" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962358" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962359" version="1" comment="dovecot24-devel is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962360" version="1" comment="dovecot24-fts is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962361" version="1" comment="dovecot24-fts-flatcurve is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962362" version="1" comment="dovecot24-fts-solr is &lt;2.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962363" version="1" comment="libQt5Bluetooth5 is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962364" version="1" comment="libQt5Bluetooth5-32bit is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962365" version="1" comment="libQt5Bluetooth5-imports is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962366" version="1" comment="libQt5Nfc5 is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962367" version="1" comment="libQt5Nfc5-32bit is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962368" version="1" comment="libQt5Nfc5-imports is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962369" version="1" comment="libqt5-qtconnectivity-devel is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962370" version="1" comment="libqt5-qtconnectivity-devel-32bit is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962371" version="1" comment="libqt5-qtconnectivity-examples is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962372" version="1" comment="libqt5-qtconnectivity-private-headers-devel is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962373" version="1" comment="libqt5-qtconnectivity-tools is &lt;5.15.16+kde2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962374" version="1" comment="owasp-modsecurity-crs is &lt;4.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962375" version="1" comment="owasp-modsecurity-crs-apache2 is &lt;4.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962376" version="1" comment="python311-ipython is &lt;8.31.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962377" version="1" comment="python312-ipython is &lt;8.31.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962378" version="1" comment="python313-ipython is &lt;8.31.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962379" version="1" comment="bind is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962380" version="1" comment="bind-doc is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962381" version="1" comment="bind-modules-bdbhpt is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962382" version="1" comment="bind-modules-generic is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962383" version="1" comment="bind-modules-ldap is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962384" version="1" comment="bind-modules-mysql is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962385" version="1" comment="bind-modules-perl is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962386" version="1" comment="bind-modules-sqlite3 is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962387" version="1" comment="bind-utils is &lt;9.20.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962388" version="1" comment="chromedriver is &lt;132.0.6834.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962389" version="1" comment="chromium is &lt;132.0.6834.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962390" version="1" comment="kubelogin is &lt;0.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962941" version="1" comment="rime-schema-all is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962942" version="1" comment="rime-schema-array is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962943" version="1" comment="rime-schema-bopomofo is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962944" version="1" comment="rime-schema-cangjie is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962945" version="1" comment="rime-schema-cantonese is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962946" version="1" comment="rime-schema-combo-pinyin is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962947" version="1" comment="rime-schema-custom is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962948" version="1" comment="rime-schema-default is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962949" version="1" comment="rime-schema-double-pinyin is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962950" version="1" comment="rime-schema-emoji is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962951" version="1" comment="rime-schema-essay is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962952" version="1" comment="rime-schema-essay-simp is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962953" version="1" comment="rime-schema-extra is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962954" version="1" comment="rime-schema-ipa is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962955" version="1" comment="rime-schema-luna-pinyin is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962956" version="1" comment="rime-schema-middle-chinese is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962957" version="1" comment="rime-schema-pinyin-simp is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962958" version="1" comment="rime-schema-prelude is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962959" version="1" comment="rime-schema-quick is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962960" version="1" comment="rime-schema-scj is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962961" version="1" comment="rime-schema-soutzoe is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962962" version="1" comment="rime-schema-stenotype is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962963" version="1" comment="rime-schema-stroke is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962964" version="1" comment="rime-schema-terra-pinyin is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962965" version="1" comment="rime-schema-wubi is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962966" version="1" comment="rime-schema-wugniu is &lt;20230603+git.5fdd2d6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962967" version="1" comment="google-osconfig-agent is &lt;20250115.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962968" version="1" comment="grafana is &lt;11.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962969" version="1" comment="helm is &lt;3.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962970" version="1" comment="helm-bash-completion is &lt;3.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962971" version="1" comment="helm-fish-completion is &lt;3.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962972" version="1" comment="helm-zsh-completion is &lt;3.17.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962973" version="1" comment="cargo-audit-advisory-db is &lt;20250204-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962974" version="1" comment="firefox-esr is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962975" version="1" comment="firefox-esr-branding-upstream is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962976" version="1" comment="firefox-esr-translations-common is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962977" version="1" comment="firefox-esr-translations-other is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962978" version="1" comment="govulncheck-vulndb is &lt;0.0.20250130T185858-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962979" version="1" comment="python311-scikit-learn is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962980" version="1" comment="python312-scikit-learn is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962981" version="1" comment="python313-scikit-learn is &lt;1.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962982" version="1" comment="MozillaFirefox is &lt;135.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962983" version="1" comment="MozillaFirefox-branding-upstream is &lt;135.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962984" version="1" comment="MozillaFirefox-devel is &lt;135.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962985" version="1" comment="MozillaFirefox-translations-common is &lt;135.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962986" version="1" comment="MozillaFirefox-translations-other is &lt;135.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962987" version="1" comment="MozillaThunderbird is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962988" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962989" version="1" comment="MozillaThunderbird-translations-common is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962990" version="1" comment="MozillaThunderbird-translations-other is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962991" version="1" comment="govulncheck-vulndb is &lt;0.0.20250204T220613-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962992" version="1" comment="python311-cbor2 is &lt;5.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962993" version="1" comment="python312-cbor2 is &lt;5.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962994" version="1" comment="python313-cbor2 is &lt;5.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962995" version="1" comment="weechat is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962996" version="1" comment="weechat-devel is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962997" version="1" comment="weechat-lang is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962998" version="1" comment="weechat-lua is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962999" version="1" comment="weechat-perl is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963000" version="1" comment="weechat-python is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963001" version="1" comment="weechat-ruby is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963002" version="1" comment="weechat-spell is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963003" version="1" comment="weechat-tcl is &lt;4.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963004" version="1" comment="go1.24 is &lt;1.24rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963005" version="1" comment="go1.24-doc is &lt;1.24rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963006" version="1" comment="go1.24-libstd is &lt;1.24rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963007" version="1" comment="go1.24-race is &lt;1.24rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963008" version="1" comment="krb5 is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963009" version="1" comment="krb5-32bit is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963010" version="1" comment="krb5-client is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963011" version="1" comment="krb5-devel is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963012" version="1" comment="krb5-devel-32bit is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963013" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963014" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963015" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963016" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963017" version="1" comment="krb5-server is &lt;1.21.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963018" version="1" comment="nginx is &lt;1.27.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963019" version="1" comment="nginx-source is &lt;1.27.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963020" version="1" comment="pam_pkcs11 is &lt;0.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963021" version="1" comment="pam_pkcs11-devel-doc is &lt;0.6.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963022" version="1" comment="python311-cryptography is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963023" version="1" comment="python312-cryptography is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963024" version="1" comment="python313-cryptography is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963025" version="1" comment="python311-cryptography-vectors is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963026" version="1" comment="python312-cryptography-vectors is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963027" version="1" comment="python313-cryptography-vectors is &lt;44.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963028" version="1" comment="ruby3.4-rubygem-http-cookie is &lt;1.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963029" version="1" comment="chromedriver is &lt;133.0.6943.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963030" version="1" comment="chromium is &lt;133.0.6943.53-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963031" version="1" comment="python311-numba is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963032" version="1" comment="python311-numba-devel is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963033" version="1" comment="python312-numba is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963034" version="1" comment="python312-numba-devel is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963035" version="1" comment="python313-numba is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963036" version="1" comment="python313-numba-devel is &lt;0.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963037" version="1" comment="flannel is &lt;0.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963038" version="1" comment="flannel-k8s-yaml is &lt;0.26.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963039" version="1" comment="go1.22 is &lt;1.22.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963040" version="1" comment="go1.22-doc is &lt;1.22.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963041" version="1" comment="go1.22-libstd is &lt;1.22.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963042" version="1" comment="go1.22-race is &lt;1.22.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963043" version="1" comment="go1.23 is &lt;1.23.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963044" version="1" comment="go1.23-doc is &lt;1.23.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963045" version="1" comment="go1.23-libstd is &lt;1.23.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963046" version="1" comment="go1.23-race is &lt;1.23.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963047" version="1" comment="java-11-openj9 is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963048" version="1" comment="java-11-openj9-demo is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963049" version="1" comment="java-11-openj9-devel is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963050" version="1" comment="java-11-openj9-headless is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963051" version="1" comment="java-11-openj9-javadoc is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963052" version="1" comment="java-11-openj9-jmods is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963053" version="1" comment="java-11-openj9-src is &lt;11.0.26.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963054" version="1" comment="java-17-openj9 is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963055" version="1" comment="java-17-openj9-demo is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963056" version="1" comment="java-17-openj9-devel is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963057" version="1" comment="java-17-openj9-headless is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963058" version="1" comment="java-17-openj9-javadoc is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963059" version="1" comment="java-17-openj9-jmods is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963060" version="1" comment="java-17-openj9-src is &lt;17.0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963061" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963062" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963063" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963064" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963065" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963066" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963067" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.442-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963068" version="1" comment="python311 is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963069" version="1" comment="python311-32bit is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963070" version="1" comment="python311-curses is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963071" version="1" comment="python311-dbm is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963072" version="1" comment="python311-idle is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963073" version="1" comment="python311-tk is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963074" version="1" comment="python311-x86-64-v3 is &lt;3.11.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963075" version="1" comment="python39 is &lt;3.9.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963076" version="1" comment="python39-curses is &lt;3.9.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963077" version="1" comment="python39-dbm is &lt;3.9.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963078" version="1" comment="python39-idle is &lt;3.9.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963079" version="1" comment="python39-tk is &lt;3.9.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963080" version="1" comment="rime-schema-all is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963081" version="1" comment="rime-schema-array is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963082" version="1" comment="rime-schema-bopomofo is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963083" version="1" comment="rime-schema-cangjie is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963084" version="1" comment="rime-schema-cantonese is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963085" version="1" comment="rime-schema-combo-pinyin is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963086" version="1" comment="rime-schema-custom is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963087" version="1" comment="rime-schema-default is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963088" version="1" comment="rime-schema-double-pinyin is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963089" version="1" comment="rime-schema-emoji is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963090" version="1" comment="rime-schema-essay is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963091" version="1" comment="rime-schema-essay-simp is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963092" version="1" comment="rime-schema-extra is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963093" version="1" comment="rime-schema-ipa is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963094" version="1" comment="rime-schema-luna-pinyin is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963095" version="1" comment="rime-schema-middle-chinese is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963096" version="1" comment="rime-schema-pinyin-simp is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963097" version="1" comment="rime-schema-prelude is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963098" version="1" comment="rime-schema-quick is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963099" version="1" comment="rime-schema-scj is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963100" version="1" comment="rime-schema-soutzoe is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963101" version="1" comment="rime-schema-stenotype is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963102" version="1" comment="rime-schema-stroke is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963103" version="1" comment="rime-schema-terra-pinyin is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963104" version="1" comment="rime-schema-wubi is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963105" version="1" comment="rime-schema-wugniu is &lt;20230603+git.5fdd2d6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963106" version="1" comment="fq is &lt;0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963107" version="1" comment="govulncheck-vulndb is &lt;0.0.20250207T224745-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963108" version="1" comment="java-21-openj9 is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963109" version="1" comment="java-21-openj9-demo is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963110" version="1" comment="java-21-openj9-devel is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963111" version="1" comment="java-21-openj9-headless is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963112" version="1" comment="java-21-openj9-javadoc is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963113" version="1" comment="java-21-openj9-jmods is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963114" version="1" comment="java-21-openj9-src is &lt;21.0.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963115" version="1" comment="libtasn1-6 is &lt;4.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963116" version="1" comment="libtasn1-6-32bit is &lt;4.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963117" version="1" comment="libtasn1-devel is &lt;4.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963118" version="1" comment="libtasn1-devel-32bit is &lt;4.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963119" version="1" comment="libtasn1-tools is &lt;4.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963120" version="1" comment="libopenvswitch-3_3-0 is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963121" version="1" comment="libovn-24_03-0 is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963122" version="1" comment="openvswitch is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963123" version="1" comment="openvswitch-devel is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963124" version="1" comment="openvswitch-doc is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963125" version="1" comment="openvswitch-ipsec is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963126" version="1" comment="openvswitch-pki is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963127" version="1" comment="openvswitch-test is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963128" version="1" comment="openvswitch-vtep is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963129" version="1" comment="ovn is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963130" version="1" comment="ovn-central is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963131" version="1" comment="ovn-devel is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963132" version="1" comment="ovn-doc is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963133" version="1" comment="ovn-docker is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963134" version="1" comment="ovn-host is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963135" version="1" comment="ovn-vtep is &lt;24.03.5-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963136" version="1" comment="python3-ovs is &lt;3.3.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963137" version="1" comment="python310 is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963138" version="1" comment="python310-32bit is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963139" version="1" comment="python310-curses is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963140" version="1" comment="python310-dbm is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963141" version="1" comment="python310-idle is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963142" version="1" comment="python310-tk is &lt;3.10.16-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963143" version="1" comment="python312 is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963144" version="1" comment="python312-32bit is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963145" version="1" comment="python312-curses is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963146" version="1" comment="python312-dbm is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963147" version="1" comment="python312-idle is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963148" version="1" comment="python312-tk is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963149" version="1" comment="python312-x86-64-v3 is &lt;3.12.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963150" version="1" comment="python313 is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963151" version="1" comment="python313-32bit is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963152" version="1" comment="python313-curses is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963153" version="1" comment="python313-dbm is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963154" version="1" comment="python313-idle is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963155" version="1" comment="python313-tk is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963156" version="1" comment="python313-x86-64-v3 is &lt;3.13.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963157" version="1" comment="python314 is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963158" version="1" comment="python314-curses is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963159" version="1" comment="python314-dbm is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963160" version="1" comment="python314-idle is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963161" version="1" comment="python314-tk is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963162" version="1" comment="python314-x86-64-v3 is &lt;3.14.0~a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963639" version="1" comment="python312-mitmproxy is &lt;11.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963640" version="1" comment="python313-mitmproxy is &lt;11.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963641" version="1" comment="crun is &lt;1.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963642" version="1" comment="libmozjs-128-0 is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963643" version="1" comment="mozjs128 is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963644" version="1" comment="mozjs128-devel is &lt;128.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963645" version="1" comment="netty is &lt;4.1.118-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963646" version="1" comment="netty-bom is &lt;4.1.118-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963647" version="1" comment="netty-javadoc is &lt;4.1.118-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963648" version="1" comment="netty-parent is &lt;4.1.118-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963649" version="1" comment="libngtcp2-16 is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963650" version="1" comment="libngtcp2-devel is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963651" version="1" comment="libngtcp2_crypto_gnutls8 is &lt;1.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964604" version="1" comment="emacs is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964605" version="1" comment="emacs-el is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964606" version="1" comment="emacs-eln is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964607" version="1" comment="emacs-games is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964608" version="1" comment="emacs-info is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964609" version="1" comment="emacs-nox is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964610" version="1" comment="emacs-x11 is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964611" version="1" comment="etags is &lt;29.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964612" version="1" comment="grafana is &lt;11.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964613" version="1" comment="kernel-firmware-amdgpu is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964614" version="1" comment="kernel-firmware-ath10k is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964615" version="1" comment="kernel-firmware-ath11k is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964616" version="1" comment="kernel-firmware-ath12k is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964617" version="1" comment="kernel-firmware-atheros is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964618" version="1" comment="kernel-firmware-bluetooth is &lt;20250208-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964619" version="1" comment="kernel-firmware-bnx2 is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964620" version="1" comment="kernel-firmware-brcm is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964621" version="1" comment="kernel-firmware-chelsio is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964622" version="1" comment="kernel-firmware-dpaa2 is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964623" version="1" comment="kernel-firmware-i915 is &lt;20250210-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964624" version="1" comment="kernel-firmware-intel is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964625" version="1" comment="kernel-firmware-iwlwifi is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964626" version="1" comment="kernel-firmware-liquidio is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964627" version="1" comment="kernel-firmware-marvell is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964628" version="1" comment="kernel-firmware-media is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964629" version="1" comment="kernel-firmware-mediatek is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964630" version="1" comment="kernel-firmware-mellanox is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964631" version="1" comment="kernel-firmware-mwifiex is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964632" version="1" comment="kernel-firmware-network is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964633" version="1" comment="kernel-firmware-nfp is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964634" version="1" comment="kernel-firmware-nvidia is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964635" version="1" comment="kernel-firmware-platform is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964636" version="1" comment="kernel-firmware-prestera is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964637" version="1" comment="kernel-firmware-qcom is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964638" version="1" comment="kernel-firmware-qlogic is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964639" version="1" comment="kernel-firmware-radeon is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964640" version="1" comment="kernel-firmware-realtek is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964641" version="1" comment="kernel-firmware-serial is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964642" version="1" comment="kernel-firmware-sound is &lt;20250210-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964643" version="1" comment="kernel-firmware-ti is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964644" version="1" comment="kernel-firmware-ueagle is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964645" version="1" comment="kernel-firmware-usb-network is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964646" version="1" comment="libopenssl-3-devel is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964647" version="1" comment="libopenssl-3-devel-32bit is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964648" version="1" comment="libopenssl-3-fips-provider is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964649" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964650" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964651" version="1" comment="libopenssl3 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964652" version="1" comment="libopenssl3-32bit is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964653" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964654" version="1" comment="openssl-3 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964655" version="1" comment="openssl-3-doc is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964656" version="1" comment="ucode-intel is &lt;20250211-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964657" version="1" comment="kernel-firmware-all is &lt;20250206-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964658" version="1" comment="postgresql13 is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964659" version="1" comment="postgresql13-contrib is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964660" version="1" comment="postgresql13-devel is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964661" version="1" comment="postgresql13-docs is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964662" version="1" comment="postgresql13-llvmjit is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964663" version="1" comment="postgresql13-llvmjit-devel is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964664" version="1" comment="postgresql13-plperl is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964665" version="1" comment="postgresql13-plpython is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964666" version="1" comment="postgresql13-pltcl is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964667" version="1" comment="postgresql13-server is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964668" version="1" comment="postgresql13-server-devel is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964669" version="1" comment="postgresql13-test is &lt;13.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964670" version="1" comment="postgresql14 is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964671" version="1" comment="postgresql14-contrib is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964672" version="1" comment="postgresql14-devel is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964673" version="1" comment="postgresql14-docs is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964674" version="1" comment="postgresql14-llvmjit is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964675" version="1" comment="postgresql14-llvmjit-devel is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964676" version="1" comment="postgresql14-plperl is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964677" version="1" comment="postgresql14-plpython is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964678" version="1" comment="postgresql14-pltcl is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964679" version="1" comment="postgresql14-server is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964680" version="1" comment="postgresql14-server-devel is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964681" version="1" comment="postgresql14-test is &lt;14.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964682" version="1" comment="postgresql15 is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964683" version="1" comment="postgresql15-contrib is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964684" version="1" comment="postgresql15-devel is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964685" version="1" comment="postgresql15-docs is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964686" version="1" comment="postgresql15-llvmjit is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964687" version="1" comment="postgresql15-llvmjit-devel is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964688" version="1" comment="postgresql15-plperl is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964689" version="1" comment="postgresql15-plpython is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964690" version="1" comment="postgresql15-pltcl is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964691" version="1" comment="postgresql15-server is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964692" version="1" comment="postgresql15-server-devel is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964693" version="1" comment="postgresql15-test is &lt;15.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964694" version="1" comment="postgresql16 is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964695" version="1" comment="postgresql16-contrib is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964696" version="1" comment="postgresql16-devel is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964697" version="1" comment="postgresql16-docs is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964698" version="1" comment="postgresql16-llvmjit is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964699" version="1" comment="postgresql16-llvmjit-devel is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964700" version="1" comment="postgresql16-plperl is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964701" version="1" comment="postgresql16-plpython is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964702" version="1" comment="postgresql16-pltcl is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964703" version="1" comment="postgresql16-server is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964704" version="1" comment="postgresql16-server-devel is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964705" version="1" comment="postgresql16-test is &lt;16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964706" version="1" comment="curl is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964707" version="1" comment="curl-fish-completion is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964708" version="1" comment="curl-zsh-completion is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964709" version="1" comment="libcurl-devel is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964710" version="1" comment="libcurl-devel-32bit is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964711" version="1" comment="libcurl-devel-doc is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964712" version="1" comment="libcurl4 is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964713" version="1" comment="libcurl4-32bit is &lt;8.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964714" version="1" comment="libecpg6 is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964715" version="1" comment="libecpg6-32bit is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964716" version="1" comment="libpq5 is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964717" version="1" comment="libpq5-32bit is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964718" version="1" comment="postgresql17 is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964719" version="1" comment="postgresql17-contrib is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964720" version="1" comment="postgresql17-devel is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964721" version="1" comment="postgresql17-docs is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964722" version="1" comment="postgresql17-llvmjit is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964723" version="1" comment="postgresql17-llvmjit-devel is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964724" version="1" comment="postgresql17-plperl is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964725" version="1" comment="postgresql17-plpython is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964726" version="1" comment="postgresql17-pltcl is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964727" version="1" comment="postgresql17-server is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964728" version="1" comment="postgresql17-server-devel is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964729" version="1" comment="postgresql17-test is &lt;17.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964730" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964731" version="1" comment="chromedriver is &lt;133.0.6943.98-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964732" version="1" comment="chromium is &lt;133.0.6943.98-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964733" version="1" comment="keylime-config is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964734" version="1" comment="keylime-firewalld is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964735" version="1" comment="keylime-logrotate is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964736" version="1" comment="keylime-registrar is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964737" version="1" comment="keylime-tenant is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964738" version="1" comment="keylime-tpm_cert_store is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964739" version="1" comment="keylime-verifier is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964740" version="1" comment="python311-keylime is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964741" version="1" comment="python312-keylime is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964742" version="1" comment="python313-keylime is &lt;7.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964743" version="1" comment="obs-service-cargo is &lt;4.5.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964744" version="1" comment="google-osconfig-agent is &lt;20250115.01-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964745" version="1" comment="kubernetes1.29-apiserver is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964746" version="1" comment="kubernetes1.29-client is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964747" version="1" comment="kubernetes1.29-client-bash-completion is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964748" version="1" comment="kubernetes1.29-client-common is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964749" version="1" comment="kubernetes1.29-client-fish-completion is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964750" version="1" comment="kubernetes1.29-controller-manager is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964751" version="1" comment="kubernetes1.29-kubeadm is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964752" version="1" comment="kubernetes1.29-kubelet is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964753" version="1" comment="kubernetes1.29-kubelet-common is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964754" version="1" comment="kubernetes1.29-proxy is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964755" version="1" comment="kubernetes1.29-scheduler is &lt;1.29.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964756" version="1" comment="kubernetes1.30-apiserver is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964757" version="1" comment="kubernetes1.30-client is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964758" version="1" comment="kubernetes1.30-client-bash-completion is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964759" version="1" comment="kubernetes1.30-client-common is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964760" version="1" comment="kubernetes1.30-client-fish-completion is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964761" version="1" comment="kubernetes1.30-controller-manager is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964762" version="1" comment="kubernetes1.30-kubeadm is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964763" version="1" comment="kubernetes1.30-kubelet is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964764" version="1" comment="kubernetes1.30-kubelet-common is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964765" version="1" comment="kubernetes1.30-proxy is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964766" version="1" comment="kubernetes1.30-scheduler is &lt;1.30.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964767" version="1" comment="kubernetes1.31-apiserver is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964768" version="1" comment="kubernetes1.31-client is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964769" version="1" comment="kubernetes1.31-client-bash-completion is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964770" version="1" comment="kubernetes1.31-client-common is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964771" version="1" comment="kubernetes1.31-client-fish-completion is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964772" version="1" comment="kubernetes1.31-controller-manager is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964773" version="1" comment="kubernetes1.31-kubeadm is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964774" version="1" comment="kubernetes1.31-kubelet is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964775" version="1" comment="kubernetes1.31-kubelet-common is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964776" version="1" comment="kubernetes1.31-proxy is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964777" version="1" comment="kubernetes1.31-scheduler is &lt;1.31.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964778" version="1" comment="kubernetes1.32-apiserver is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964779" version="1" comment="kubernetes1.32-client is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964780" version="1" comment="kubernetes1.32-client-bash-completion is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964781" version="1" comment="kubernetes1.32-client-common is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964782" version="1" comment="kubernetes1.32-client-fish-completion is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964783" version="1" comment="kubernetes1.32-controller-manager is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964784" version="1" comment="kubernetes1.32-kubeadm is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964785" version="1" comment="kubernetes1.32-kubelet is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964786" version="1" comment="kubernetes1.32-kubelet-common is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964787" version="1" comment="kubernetes1.32-proxy is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964788" version="1" comment="kubernetes1.32-scheduler is &lt;1.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964789" version="1" comment="openssh is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964790" version="1" comment="openssh-cavs is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964791" version="1" comment="openssh-clients is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964792" version="1" comment="openssh-common is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964793" version="1" comment="openssh-fips is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964794" version="1" comment="openssh-helpers is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964795" version="1" comment="openssh-server is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964796" version="1" comment="openssh-server-config-rootlogin is &lt;9.9p2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964797" version="1" comment="ruby3.4-rubygem-grpc is &lt;1.70.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964921" version="1" comment="grub2 is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964922" version="1" comment="grub2-branding-upstream is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964923" version="1" comment="grub2-common is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964924" version="1" comment="grub2-i386-efi is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964925" version="1" comment="grub2-i386-efi-bls is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964926" version="1" comment="grub2-i386-efi-debug is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964927" version="1" comment="grub2-i386-efi-extras is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964928" version="1" comment="grub2-i386-pc is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964929" version="1" comment="grub2-i386-pc-debug is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964930" version="1" comment="grub2-i386-pc-extras is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964931" version="1" comment="grub2-snapper-plugin is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964932" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964933" version="1" comment="grub2-x86_64-efi is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964934" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964935" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964936" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964937" version="1" comment="grub2-x86_64-xen is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964938" version="1" comment="grub2-x86_64-xen-debug is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964939" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965246" version="1" comment="dcmtk is &lt;3.6.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965247" version="1" comment="dcmtk-devel is &lt;3.6.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965248" version="1" comment="libdcmtk19 is &lt;3.6.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965249" version="1" comment="java-23-openjdk is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965250" version="1" comment="java-23-openjdk-demo is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965251" version="1" comment="java-23-openjdk-devel is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965252" version="1" comment="java-23-openjdk-headless is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965253" version="1" comment="java-23-openjdk-javadoc is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965254" version="1" comment="java-23-openjdk-jmods is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965255" version="1" comment="java-23-openjdk-src is &lt;23.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965256" version="1" comment="luanti is &lt;5.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965257" version="1" comment="luanti-data is &lt;5.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965258" version="1" comment="luanti-lang is &lt;5.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965259" version="1" comment="luantiserver is &lt;5.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965260" version="1" comment="libmariadbd-devel is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965261" version="1" comment="libmariadbd19 is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965262" version="1" comment="mariadb is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965263" version="1" comment="mariadb-bench is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965264" version="1" comment="mariadb-client is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965265" version="1" comment="mariadb-errormessages is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965266" version="1" comment="mariadb-galera is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965267" version="1" comment="mariadb-rpm-macros is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965268" version="1" comment="mariadb-test is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965269" version="1" comment="mariadb-tools is &lt;11.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965270" version="1" comment="proftpd is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965271" version="1" comment="proftpd-devel is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965272" version="1" comment="proftpd-doc is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965273" version="1" comment="proftpd-lang is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965274" version="1" comment="proftpd-ldap is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965275" version="1" comment="proftpd-mysql is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965276" version="1" comment="proftpd-pgsql is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965277" version="1" comment="proftpd-radius is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965278" version="1" comment="proftpd-sqlite is &lt;1.3.8c-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965279" version="1" comment="radare2 is &lt;5.9.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965280" version="1" comment="radare2-devel is &lt;5.9.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965281" version="1" comment="radare2-zsh-completion is &lt;5.9.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965806" version="1" comment="chromedriver is &lt;133.0.6943.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965807" version="1" comment="chromium is &lt;133.0.6943.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965808" version="1" comment="libxml2-2 is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965809" version="1" comment="libxml2-2-32bit is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965810" version="1" comment="libxml2-devel is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965811" version="1" comment="libxml2-devel-32bit is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965812" version="1" comment="libxml2-doc is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965813" version="1" comment="libxml2-tools is &lt;2.13.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965814" version="1" comment="libwireshark18 is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965815" version="1" comment="libwiretap15 is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965816" version="1" comment="libwsutil16 is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965817" version="1" comment="wireshark is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965818" version="1" comment="wireshark-devel is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965819" version="1" comment="wireshark-ui-qt is &lt;4.4.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966275" version="1" comment="libprotobuf-lite28_3_0 is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966276" version="1" comment="libprotobuf-lite28_3_0-32bit is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966277" version="1" comment="libprotobuf28_3_0 is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966278" version="1" comment="libprotobuf28_3_0-32bit is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966279" version="1" comment="libprotoc28_3_0 is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966280" version="1" comment="libprotoc28_3_0-32bit is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966281" version="1" comment="libutf8_range-28_3_0 is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966282" version="1" comment="libutf8_range-28_3_0-32bit is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966283" version="1" comment="protobuf-devel is &lt;28.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966326" version="1" comment="ffmpeg-4 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966327" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966328" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966329" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966330" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966331" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966332" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966333" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966334" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966335" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966336" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966337" version="1" comment="libavcodec58_134 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966338" version="1" comment="libavcodec58_134-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966339" version="1" comment="libavdevice58_13 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966340" version="1" comment="libavdevice58_13-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966341" version="1" comment="libavfilter7_110 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966342" version="1" comment="libavfilter7_110-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966343" version="1" comment="libavformat58_76 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966344" version="1" comment="libavformat58_76-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966345" version="1" comment="libavresample4_0 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966346" version="1" comment="libavresample4_0-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966347" version="1" comment="libavutil56_70 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966348" version="1" comment="libavutil56_70-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966349" version="1" comment="libpostproc55_9 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966350" version="1" comment="libpostproc55_9-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966351" version="1" comment="libswresample3_9 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966352" version="1" comment="libswresample3_9-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966353" version="1" comment="libswscale5_9 is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966354" version="1" comment="libswscale5_9-32bit is &lt;4.4.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966355" version="1" comment="ffmpeg-7 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966356" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966357" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966358" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966359" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966360" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966361" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966362" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966363" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966364" version="1" comment="libavcodec61 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966365" version="1" comment="libavcodec61-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966366" version="1" comment="libavdevice61 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966367" version="1" comment="libavdevice61-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966368" version="1" comment="libavfilter10 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966369" version="1" comment="libavfilter10-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966370" version="1" comment="libavformat61 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966371" version="1" comment="libavformat61-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966372" version="1" comment="libavutil59 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966373" version="1" comment="libavutil59-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966374" version="1" comment="libpostproc58 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966375" version="1" comment="libpostproc58-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966376" version="1" comment="libswresample5 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966377" version="1" comment="libswresample5-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966378" version="1" comment="libswscale8 is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966379" version="1" comment="libswscale8-32bit is &lt;7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966380" version="1" comment="gnutls is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966381" version="1" comment="libgnutls-dane-devel is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966382" version="1" comment="libgnutls-dane0 is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966383" version="1" comment="libgnutls-devel is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966384" version="1" comment="libgnutls-devel-32bit is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966385" version="1" comment="libgnutls-devel-doc is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966386" version="1" comment="libgnutls30 is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966387" version="1" comment="libgnutls30-32bit is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966388" version="1" comment="libgnutlsxx-devel is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966389" version="1" comment="libgnutlsxx30 is &lt;3.8.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966390" version="1" comment="libiniparser-devel is &lt;4.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966391" version="1" comment="libiniparser4 is &lt;4.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966607" version="1" comment="libX11-6 is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966608" version="1" comment="libX11-6-32bit is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966609" version="1" comment="libX11-data is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966610" version="1" comment="libX11-devel is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966611" version="1" comment="libX11-devel-32bit is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966612" version="1" comment="libX11-devel-doc is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966613" version="1" comment="libX11-xcb1 is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966614" version="1" comment="libX11-xcb1-32bit is &lt;1.8.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966615" version="1" comment="libxkbfile-devel is &lt;1.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966616" version="1" comment="libxkbfile-devel-32bit is &lt;1.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966617" version="1" comment="libxkbfile1 is &lt;1.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966618" version="1" comment="libxkbfile1-32bit is &lt;1.1.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966619" version="1" comment="teleport is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966620" version="1" comment="teleport-bash-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966621" version="1" comment="teleport-fdpass-teleport is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966622" version="1" comment="teleport-tbot is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966623" version="1" comment="teleport-tbot-bash-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966624" version="1" comment="teleport-tbot-zsh-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966625" version="1" comment="teleport-tctl is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966626" version="1" comment="teleport-tctl-bash-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966627" version="1" comment="teleport-tctl-zsh-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966628" version="1" comment="teleport-tsh is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966629" version="1" comment="teleport-tsh-bash-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966630" version="1" comment="teleport-tsh-zsh-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966631" version="1" comment="teleport-zsh-completion is &lt;17.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966632" version="1" comment="trivy is &lt;0.59.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966633" version="1" comment="xorg-x11-server is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966634" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966635" version="1" comment="xorg-x11-server-extra is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966636" version="1" comment="xorg-x11-server-sdk is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966637" version="1" comment="xorg-x11-server-source is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966638" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966639" version="1" comment="xwayland is &lt;24.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966640" version="1" comment="xwayland-devel is &lt;24.1.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966655" version="1" comment="govulncheck-vulndb is &lt;0.0.20250226T025151-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966656" version="1" comment="bsdtar is &lt;3.7.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966657" version="1" comment="libarchive-devel is &lt;3.7.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966658" version="1" comment="libarchive13 is &lt;3.7.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966659" version="1" comment="libarchive13-32bit is &lt;3.7.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966660" version="1" comment="python311-jupyter-server is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966661" version="1" comment="python311-jupyter-server-test is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966662" version="1" comment="python312-jupyter-server is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966663" version="1" comment="python312-jupyter-server-test is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966664" version="1" comment="python313-jupyter-server is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966665" version="1" comment="python313-jupyter-server-test is &lt;2.14.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966929" version="1" comment="phpMyAdmin is &lt;5.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966930" version="1" comment="phpMyAdmin-apache is &lt;5.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966931" version="1" comment="phpMyAdmin-lang is &lt;5.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966932" version="1" comment="python311-spotipy is &lt;2.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966933" version="1" comment="python312-spotipy is &lt;2.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966934" version="1" comment="python313-spotipy is &lt;2.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966935" version="1" comment="nodejs-electron is &lt;33.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966936" version="1" comment="nodejs-electron-devel is &lt;33.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966937" version="1" comment="nodejs-electron-doc is &lt;33.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966938" version="1" comment="ffmpeg-4 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966939" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966940" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966941" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966942" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966943" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966944" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966945" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966946" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966947" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966948" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966949" version="1" comment="libavcodec58_134 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966950" version="1" comment="libavcodec58_134-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966951" version="1" comment="libavdevice58_13 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966952" version="1" comment="libavdevice58_13-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966953" version="1" comment="libavfilter7_110 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966954" version="1" comment="libavfilter7_110-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966955" version="1" comment="libavformat58_76 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966956" version="1" comment="libavformat58_76-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966957" version="1" comment="libavresample4_0 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966958" version="1" comment="libavresample4_0-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966959" version="1" comment="libavutil56_70 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966960" version="1" comment="libavutil56_70-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966961" version="1" comment="libpostproc55_9 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966962" version="1" comment="libpostproc55_9-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966963" version="1" comment="libswresample3_9 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966964" version="1" comment="libswresample3_9-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966965" version="1" comment="libswscale5_9 is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966966" version="1" comment="libswscale5_9-32bit is &lt;4.4.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966967" version="1" comment="ffmpeg-7 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966968" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966969" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966970" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966971" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966972" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966973" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966974" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966975" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966976" version="1" comment="libavcodec61 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966977" version="1" comment="libavcodec61-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966978" version="1" comment="libavdevice61 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966979" version="1" comment="libavdevice61-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966980" version="1" comment="libavfilter10 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966981" version="1" comment="libavfilter10-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966982" version="1" comment="libavformat61 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966983" version="1" comment="libavformat61-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966984" version="1" comment="libavutil59 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966985" version="1" comment="libavutil59-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966986" version="1" comment="libpostproc58 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966987" version="1" comment="libpostproc58-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966988" version="1" comment="libswresample5 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966989" version="1" comment="libswresample5-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966990" version="1" comment="libswscale8 is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966991" version="1" comment="libswscale8-32bit is &lt;7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966992" version="1" comment="glibc is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966993" version="1" comment="glibc-devel is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966994" version="1" comment="glibc-devel-static is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966995" version="1" comment="glibc-extra is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966996" version="1" comment="glibc-gconv-modules-extra is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966997" version="1" comment="glibc-html is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966998" version="1" comment="glibc-i18ndata is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966999" version="1" comment="glibc-info is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967000" version="1" comment="glibc-lang is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967001" version="1" comment="glibc-locale is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967002" version="1" comment="glibc-locale-base is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967003" version="1" comment="glibc-profile is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967004" version="1" comment="libnsl1 is &lt;2.41-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967144" version="1" comment="firefox-esr is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967145" version="1" comment="firefox-esr-branding-upstream is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967146" version="1" comment="firefox-esr-translations-common is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967147" version="1" comment="firefox-esr-translations-other is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967422" version="1" comment="MozillaThunderbird is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967423" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967424" version="1" comment="MozillaThunderbird-translations-common is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967425" version="1" comment="MozillaThunderbird-translations-other is &lt;128.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967426" version="1" comment="chromedriver is &lt;134.0.6998.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967427" version="1" comment="chromium is &lt;134.0.6998.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967428" version="1" comment="go1.23 is &lt;1.23.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967429" version="1" comment="go1.23-doc is &lt;1.23.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967430" version="1" comment="go1.23-libstd is &lt;1.23.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967431" version="1" comment="go1.23-race is &lt;1.23.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967432" version="1" comment="go1.24 is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967433" version="1" comment="go1.24-doc is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967434" version="1" comment="go1.24-libstd is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967435" version="1" comment="go1.24-race is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967436" version="1" comment="grype is &lt;0.88.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967437" version="1" comment="grype-bash-completion is &lt;0.88.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967438" version="1" comment="grype-fish-completion is &lt;0.88.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967439" version="1" comment="grype-zsh-completion is &lt;0.88.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967440" version="1" comment="python311-GitPython is &lt;3.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967441" version="1" comment="python312-GitPython is &lt;3.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967442" version="1" comment="python313-GitPython is &lt;3.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967443" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967444" version="1" comment="xen is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967445" version="1" comment="xen-devel is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967446" version="1" comment="xen-doc-html is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967447" version="1" comment="xen-libs is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967448" version="1" comment="xen-tools is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967449" version="1" comment="xen-tools-domU is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967450" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.0_08-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967453" version="1" comment="MozillaFirefox is &lt;136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967454" version="1" comment="MozillaFirefox-branding-upstream is &lt;136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967455" version="1" comment="MozillaFirefox-devel is &lt;136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967456" version="1" comment="MozillaFirefox-translations-common is &lt;136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967457" version="1" comment="MozillaFirefox-translations-other is &lt;136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967458" version="1" comment="less is &lt;668-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967459" version="1" comment="teleport is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967460" version="1" comment="teleport-bash-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967461" version="1" comment="teleport-fdpass-teleport is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967462" version="1" comment="teleport-tbot is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967463" version="1" comment="teleport-tbot-bash-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967464" version="1" comment="teleport-tbot-zsh-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967465" version="1" comment="teleport-tctl is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967466" version="1" comment="teleport-tctl-bash-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967467" version="1" comment="teleport-tctl-zsh-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967468" version="1" comment="teleport-tsh is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967469" version="1" comment="teleport-tsh-bash-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967470" version="1" comment="teleport-tsh-zsh-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967471" version="1" comment="teleport-zsh-completion is &lt;17.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967542" version="1" comment="gerbera is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967543" version="1" comment="gerbera-apache is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967544" version="1" comment="gerbera-nginx is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967545" version="1" comment="grafana is &lt;11.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967546" version="1" comment="libtinyxml2-10 is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967547" version="1" comment="tinyxml2-devel is &lt;10.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967830" version="1" comment="amazon-ssm-agent is &lt;3.3.1957.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967831" version="1" comment="fake-gcs-server is &lt;1.52.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967832" version="1" comment="google-guest-agent is &lt;20250116.00-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967833" version="1" comment="google-osconfig-agent is &lt;20250115.01-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967834" version="1" comment="podman is &lt;5.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967835" version="1" comment="podman-docker is &lt;5.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967836" version="1" comment="podman-remote is &lt;5.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967837" version="1" comment="podmansh is &lt;5.4.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967838" version="1" comment="python311 is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967839" version="1" comment="python311-32bit is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967840" version="1" comment="python311-curses is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967841" version="1" comment="python311-dbm is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967842" version="1" comment="python311-idle is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967843" version="1" comment="python311-tk is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967844" version="1" comment="python311-x86-64-v3 is &lt;3.11.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967845" version="1" comment="python312 is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967846" version="1" comment="python312-32bit is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967847" version="1" comment="python312-curses is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967848" version="1" comment="python312-dbm is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967849" version="1" comment="python312-idle is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967850" version="1" comment="python312-tk is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967851" version="1" comment="python312-x86-64-v3 is &lt;3.12.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967852" version="1" comment="restic is &lt;0.17.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967853" version="1" comment="restic-bash-completion is &lt;0.17.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967854" version="1" comment="restic-zsh-completion is &lt;0.17.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967855" version="1" comment="ruby3.4-rubygem-rack is &lt;3.1.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967856" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967903" version="1" comment="distrobuilder is &lt;3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967904" version="1" comment="dool is &lt;1.3.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967905" version="1" comment="erlang is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967906" version="1" comment="erlang-debugger is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967907" version="1" comment="erlang-debugger-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967908" version="1" comment="erlang-dialyzer is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967909" version="1" comment="erlang-dialyzer-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967910" version="1" comment="erlang-diameter is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967911" version="1" comment="erlang-diameter-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967912" version="1" comment="erlang-doc is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967913" version="1" comment="erlang-epmd is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967914" version="1" comment="erlang-et is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967915" version="1" comment="erlang-et-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967916" version="1" comment="erlang-jinterface is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967917" version="1" comment="erlang-jinterface-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967918" version="1" comment="erlang-observer is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967919" version="1" comment="erlang-observer-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967920" version="1" comment="erlang-reltool is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967921" version="1" comment="erlang-reltool-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967922" version="1" comment="erlang-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967923" version="1" comment="erlang-wx is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967924" version="1" comment="erlang-wx-src is &lt;27.2.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967925" version="1" comment="ffmpeg-4 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967926" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967927" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967928" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967929" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967930" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967931" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967932" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967933" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967934" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967935" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967936" version="1" comment="libavcodec58_134 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967937" version="1" comment="libavcodec58_134-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967938" version="1" comment="libavdevice58_13 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967939" version="1" comment="libavdevice58_13-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967940" version="1" comment="libavfilter7_110 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967941" version="1" comment="libavfilter7_110-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967942" version="1" comment="libavformat58_76 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967943" version="1" comment="libavformat58_76-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967944" version="1" comment="libavresample4_0 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967945" version="1" comment="libavresample4_0-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967946" version="1" comment="libavutil56_70 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967947" version="1" comment="libavutil56_70-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967948" version="1" comment="libpostproc55_9 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967949" version="1" comment="libpostproc55_9-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967950" version="1" comment="libswresample3_9 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967951" version="1" comment="libswresample3_9-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967952" version="1" comment="libswscale5_9 is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967953" version="1" comment="libswscale5_9-32bit is &lt;4.4.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967954" version="1" comment="forgejo-runner is &lt;6.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967955" version="1" comment="forgejo-runner-bash-completion is &lt;6.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967956" version="1" comment="forgejo-runner-fish-completion is &lt;6.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967957" version="1" comment="forgejo-runner-zsh-completion is &lt;6.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967958" version="1" comment="bsdtar is &lt;3.7.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967959" version="1" comment="libarchive-devel is &lt;3.7.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967960" version="1" comment="libarchive13 is &lt;3.7.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967961" version="1" comment="libarchive13-32bit is &lt;3.7.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967962" version="1" comment="nebula is &lt;1.9.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967963" version="1" comment="nebula-cert is &lt;1.9.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967964" version="1" comment="nodejs-electron is &lt;33.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967965" version="1" comment="nodejs-electron-devel is &lt;33.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967966" version="1" comment="nodejs-electron-doc is &lt;33.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967967" version="1" comment="python313 is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967968" version="1" comment="python313-32bit is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967969" version="1" comment="python313-curses is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967970" version="1" comment="python313-dbm is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967971" version="1" comment="python313-idle is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967972" version="1" comment="python313-tk is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967973" version="1" comment="python313-x86-64-v3 is &lt;3.13.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967974" version="1" comment="stalld is &lt;1.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967975" version="1" comment="tailscale is &lt;1.80.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967976" version="1" comment="tailscale-bash-completion is &lt;1.80.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967977" version="1" comment="tailscale-fish-completion is &lt;1.80.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967978" version="1" comment="tailscale-zsh-completion is &lt;1.80.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968113" version="1" comment="chromedriver is &lt;134.0.6998.88-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968114" version="1" comment="chromium is &lt;134.0.6998.88-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968115" version="1" comment="govulncheck-vulndb is &lt;0.0.20250312T181707-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968116" version="1" comment="hostapd is &lt;2.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968117" version="1" comment="libzvbi-chains0 is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968118" version="1" comment="libzvbi-chains0-32bit is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968119" version="1" comment="libzvbi0 is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968120" version="1" comment="libzvbi0-32bit is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968121" version="1" comment="zvbi is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968122" version="1" comment="zvbi-devel is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968123" version="1" comment="zvbi-devel-32bit is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968124" version="1" comment="zvbi-lang is &lt;0.2.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968668" version="1" comment="ed25519-java is &lt;0.3.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968669" version="1" comment="ed25519-java-javadoc is &lt;0.3.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968670" version="1" comment="govulncheck-vulndb is &lt;0.0.20250313T170021-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968671" version="1" comment="libexslt0 is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968672" version="1" comment="libxslt-devel is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968673" version="1" comment="libxslt-devel-32bit is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968674" version="1" comment="libxslt-tools is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968675" version="1" comment="libxslt1 is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968676" version="1" comment="libxslt1-32bit is &lt;1.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968677" version="1" comment="php8 is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968678" version="1" comment="php8-bcmath is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968679" version="1" comment="php8-bz2 is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968680" version="1" comment="php8-calendar is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968681" version="1" comment="php8-cli is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968682" version="1" comment="php8-ctype is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968683" version="1" comment="php8-curl is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968684" version="1" comment="php8-dba is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968685" version="1" comment="php8-devel is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968686" version="1" comment="php8-dom is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968687" version="1" comment="php8-enchant is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968688" version="1" comment="php8-exif is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968689" version="1" comment="php8-ffi is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968690" version="1" comment="php8-fileinfo is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968691" version="1" comment="php8-ftp is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968692" version="1" comment="php8-gd is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968693" version="1" comment="php8-gettext is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968694" version="1" comment="php8-gmp is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968695" version="1" comment="php8-iconv is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968696" version="1" comment="php8-intl is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968697" version="1" comment="php8-ldap is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968698" version="1" comment="php8-mbstring is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968699" version="1" comment="php8-mysql is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968700" version="1" comment="php8-odbc is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968701" version="1" comment="php8-opcache is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968702" version="1" comment="php8-openssl is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968703" version="1" comment="php8-pcntl is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968704" version="1" comment="php8-pdo is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968705" version="1" comment="php8-pgsql is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968706" version="1" comment="php8-phar is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968707" version="1" comment="php8-posix is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968708" version="1" comment="php8-readline is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968709" version="1" comment="php8-shmop is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968710" version="1" comment="php8-snmp is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968711" version="1" comment="php8-soap is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968712" version="1" comment="php8-sockets is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968713" version="1" comment="php8-sodium is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968714" version="1" comment="php8-sqlite is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968715" version="1" comment="php8-sysvmsg is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968716" version="1" comment="php8-sysvsem is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968717" version="1" comment="php8-sysvshm is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968718" version="1" comment="php8-tidy is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968719" version="1" comment="php8-tokenizer is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968720" version="1" comment="php8-xmlreader is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968721" version="1" comment="php8-xmlwriter is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968722" version="1" comment="php8-xsl is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968723" version="1" comment="php8-zip is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968724" version="1" comment="php8-zlib is &lt;8.3.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968725" version="1" comment="tomcat is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968726" version="1" comment="tomcat-admin-webapps is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968727" version="1" comment="tomcat-docs-webapp is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968728" version="1" comment="tomcat-el-3_0-api is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968729" version="1" comment="tomcat-embed is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968730" version="1" comment="tomcat-javadoc is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968731" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968732" version="1" comment="tomcat-jsvc is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968733" version="1" comment="tomcat-lib is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968734" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968735" version="1" comment="tomcat-webapps is &lt;9.0.99-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968736" version="1" comment="tomcat10 is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968737" version="1" comment="tomcat10-admin-webapps is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968738" version="1" comment="tomcat10-doc is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968739" version="1" comment="tomcat10-docs-webapp is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968740" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968741" version="1" comment="tomcat10-embed is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968742" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968743" version="1" comment="tomcat10-jsvc is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968744" version="1" comment="tomcat10-lib is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968745" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968746" version="1" comment="tomcat10-webapps is &lt;10.1.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968747" version="1" comment="nethack is &lt;3.4.3-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968748" version="1" comment="wpa_supplicant is &lt;2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968749" version="1" comment="wpa_supplicant-gui is &lt;2.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968750" version="1" comment="copacetic is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968751" version="1" comment="copacetic-bash-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968752" version="1" comment="copacetic-fish-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968753" version="1" comment="copacetic-zsh-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968754" version="1" comment="dcmtk is &lt;3.6.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968755" version="1" comment="dcmtk-devel is &lt;3.6.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968756" version="1" comment="libdcmtk19 is &lt;3.6.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968757" version="1" comment="rime-plum is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968758" version="1" comment="assimp-devel is &lt;5.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968759" version="1" comment="libassimp5 is &lt;5.4.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968760" version="1" comment="cadvisor is &lt;0.52.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968761" version="1" comment="crane is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968762" version="1" comment="crane-bash-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968763" version="1" comment="crane-fish-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968764" version="1" comment="crane-zsh-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968765" version="1" comment="gcrane is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968766" version="1" comment="gcrane-bash-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968767" version="1" comment="gcrane-fish-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968768" version="1" comment="gcrane-zsh-completion is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968769" version="1" comment="go-containerregistry is &lt;0.20.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968770" version="1" comment="helm is &lt;3.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968771" version="1" comment="helm-bash-completion is &lt;3.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968772" version="1" comment="helm-fish-completion is &lt;3.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968773" version="1" comment="helm-zsh-completion is &lt;3.17.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968774" version="1" comment="kured is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968775" version="1" comment="kured-k8s-yaml is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968776" version="1" comment="python311-Django4 is &lt;4.2.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968777" version="1" comment="python312-Django4 is &lt;4.2.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968778" version="1" comment="python313-Django4 is &lt;4.2.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968779" version="1" comment="apptainer is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968780" version="1" comment="apptainer-leap is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968781" version="1" comment="apptainer-sle15_5 is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968782" version="1" comment="apptainer-sle15_6 is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968783" version="1" comment="apptainer-sle15_7 is &lt;1.3.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968784" version="1" comment="govulncheck-vulndb is &lt;0.0.20250318T181448-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968785" version="1" comment="tomcat is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968786" version="1" comment="tomcat-admin-webapps is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968787" version="1" comment="tomcat-docs-webapp is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968788" version="1" comment="tomcat-el-3_0-api is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968789" version="1" comment="tomcat-embed is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968790" version="1" comment="tomcat-javadoc is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968791" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968792" version="1" comment="tomcat-jsvc is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968793" version="1" comment="tomcat-lib is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968794" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968795" version="1" comment="tomcat-webapps is &lt;9.0.102-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968796" version="1" comment="mercurial is &lt;6.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968797" version="1" comment="mercurial-lang is &lt;6.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968798" version="1" comment="mercurial-tests is &lt;6.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968799" version="1" comment="python311-Django is &lt;5.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968800" version="1" comment="python312-Django is &lt;5.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968801" version="1" comment="python313-Django is &lt;5.1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968802" version="1" comment="python311-joblib is &lt;1.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968803" version="1" comment="python312-joblib is &lt;1.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968804" version="1" comment="python313-joblib is &lt;1.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968805" version="1" comment="tomcat10 is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968806" version="1" comment="tomcat10-admin-webapps is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968807" version="1" comment="tomcat10-doc is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968808" version="1" comment="tomcat10-docs-webapp is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968809" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968810" version="1" comment="tomcat10-embed is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968811" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968812" version="1" comment="tomcat10-jsvc is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968813" version="1" comment="tomcat10-lib is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968814" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968815" version="1" comment="tomcat10-webapps is &lt;10.1.39-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968816" version="1" comment="xorg-x11-server is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968817" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968818" version="1" comment="xorg-x11-server-extra is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968819" version="1" comment="xorg-x11-server-sdk is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968820" version="1" comment="xorg-x11-server-source is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968821" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969066" version="1" comment="nodejs-electron is &lt;33.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969067" version="1" comment="nodejs-electron-devel is &lt;33.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969068" version="1" comment="nodejs-electron-doc is &lt;33.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969069" version="1" comment="warewulf4 is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969070" version="1" comment="warewulf4-dracut is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969071" version="1" comment="warewulf4-man is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969072" version="1" comment="warewulf4-overlay is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969073" version="1" comment="warewulf4-overlay-rke2 is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969074" version="1" comment="warewulf4-overlay-slurm is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969075" version="1" comment="warewulf4-reference-doc is &lt;4.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969533" version="1" comment="forgejo is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969534" version="1" comment="forgejo-apparmor is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969535" version="1" comment="forgejo-environment-to-ini is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969536" version="1" comment="forgejo-firewalld is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969537" version="1" comment="forgejo-selinux is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969538" version="1" comment="gitleaks is &lt;8.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969539" version="1" comment="gitleaks-bash-completion is &lt;8.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969540" version="1" comment="gitleaks-fish-completion is &lt;8.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969541" version="1" comment="gitleaks-zsh-completion is &lt;8.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969677" version="1" comment="argocd-cli is &lt;2.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969678" version="1" comment="argocd-cli-bash-completion is &lt;2.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969679" version="1" comment="argocd-cli-zsh-completion is &lt;2.14.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969680" version="1" comment="chromedriver is &lt;134.0.6998.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969681" version="1" comment="chromium is &lt;134.0.6998.117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969682" version="1" comment="docker-stable is &lt;24.0.9_ce-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969683" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969684" version="1" comment="docker-stable-buildx is &lt;0.19.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969685" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969686" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969687" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969688" version="1" comment="kubernetes1.29-apiserver is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969689" version="1" comment="kubernetes1.29-client is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969690" version="1" comment="kubernetes1.29-client-bash-completion is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969691" version="1" comment="kubernetes1.29-client-common is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969692" version="1" comment="kubernetes1.29-client-fish-completion is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969693" version="1" comment="kubernetes1.29-controller-manager is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969694" version="1" comment="kubernetes1.29-kubeadm is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969695" version="1" comment="kubernetes1.29-kubelet is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969696" version="1" comment="kubernetes1.29-kubelet-common is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969697" version="1" comment="kubernetes1.29-proxy is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969698" version="1" comment="kubernetes1.29-scheduler is &lt;1.29.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969699" version="1" comment="kubernetes1.30-apiserver is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969700" version="1" comment="kubernetes1.30-client is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969701" version="1" comment="kubernetes1.30-client-bash-completion is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969702" version="1" comment="kubernetes1.30-client-common is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969703" version="1" comment="kubernetes1.30-client-fish-completion is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969704" version="1" comment="kubernetes1.30-controller-manager is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969705" version="1" comment="kubernetes1.30-kubeadm is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969706" version="1" comment="kubernetes1.30-kubelet is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969707" version="1" comment="kubernetes1.30-kubelet-common is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969708" version="1" comment="kubernetes1.30-proxy is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969709" version="1" comment="kubernetes1.30-scheduler is &lt;1.30.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969710" version="1" comment="kubernetes1.31-apiserver is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969711" version="1" comment="kubernetes1.31-client is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969712" version="1" comment="kubernetes1.31-client-bash-completion is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969713" version="1" comment="kubernetes1.31-client-common is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969714" version="1" comment="kubernetes1.31-client-fish-completion is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969715" version="1" comment="kubernetes1.31-controller-manager is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969716" version="1" comment="kubernetes1.31-kubeadm is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969717" version="1" comment="kubernetes1.31-kubelet is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969718" version="1" comment="kubernetes1.31-kubelet-common is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969719" version="1" comment="kubernetes1.31-proxy is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969720" version="1" comment="kubernetes1.31-scheduler is &lt;1.31.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969721" version="1" comment="kubernetes1.32-apiserver is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969722" version="1" comment="kubernetes1.32-client is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969723" version="1" comment="kubernetes1.32-client-bash-completion is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969724" version="1" comment="kubernetes1.32-client-common is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969725" version="1" comment="kubernetes1.32-client-fish-completion is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969726" version="1" comment="kubernetes1.32-controller-manager is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969727" version="1" comment="kubernetes1.32-kubeadm is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969728" version="1" comment="kubernetes1.32-kubelet is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969729" version="1" comment="kubernetes1.32-kubelet-common is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969730" version="1" comment="kubernetes1.32-proxy is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969731" version="1" comment="kubernetes1.32-scheduler is &lt;1.32.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969732" version="1" comment="libmbedcrypto7 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969733" version="1" comment="libmbedcrypto7-x86-64-v3 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969734" version="1" comment="libmbedtls14 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969735" version="1" comment="libmbedtls14-x86-64-v3 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969736" version="1" comment="libmbedx509-1 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969737" version="1" comment="libmbedx509-1-x86-64-v3 is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969738" version="1" comment="mbedtls-2-devel is &lt;2.28.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970282" version="1" comment="apache-commons-vfs2 is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970283" version="1" comment="apache-commons-vfs2-ant is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970284" version="1" comment="apache-commons-vfs2-examples is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970285" version="1" comment="apache-commons-vfs2-javadoc is &lt;2.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970286" version="1" comment="git-bug is &lt;0.8.0+git.1742269202.0ab94c9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970287" version="1" comment="git-bug-bash-completion is &lt;0.8.0+git.1742269202.0ab94c9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970288" version="1" comment="git-bug-fish-completion is &lt;0.8.0+git.1742269202.0ab94c9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970289" version="1" comment="git-bug-zsh-completion is &lt;0.8.0+git.1742269202.0ab94c9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970290" version="1" comment="icingacli is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970291" version="1" comment="icingaweb2 is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970292" version="1" comment="icingaweb2-common is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970293" version="1" comment="icingaweb2-php-fpm is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970294" version="1" comment="php-icinga is &lt;2.12.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970295" version="1" comment="qubesome is &lt;0.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970348" version="1" comment="corosync is &lt;3.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970349" version="1" comment="corosync-devel is &lt;3.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970350" version="1" comment="corosync-libs is &lt;3.1.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970571" version="1" comment="389-ds is &lt;3.1.2~git55.7fbd4526-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970572" version="1" comment="389-ds-devel is &lt;3.1.2~git55.7fbd4526-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970573" version="1" comment="389-ds-snmp is &lt;3.1.2~git55.7fbd4526-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970574" version="1" comment="lib389 is &lt;3.1.2~git55.7fbd4526-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970575" version="1" comment="libsvrcore0 is &lt;3.1.2~git55.7fbd4526-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970576" version="1" comment="exim is &lt;4.98.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970577" version="1" comment="eximon is &lt;4.98.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970578" version="1" comment="eximstats-html is &lt;4.98.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970579" version="1" comment="ffmpeg-4 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970580" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970581" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970582" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970583" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970584" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970585" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970586" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970587" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970588" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970589" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970590" version="1" comment="libavcodec58_134 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970591" version="1" comment="libavcodec58_134-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970592" version="1" comment="libavdevice58_13 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970593" version="1" comment="libavdevice58_13-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970594" version="1" comment="libavfilter7_110 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970595" version="1" comment="libavfilter7_110-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970596" version="1" comment="libavformat58_76 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970597" version="1" comment="libavformat58_76-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970598" version="1" comment="libavresample4_0 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970599" version="1" comment="libavresample4_0-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970600" version="1" comment="libavutil56_70 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970601" version="1" comment="libavutil56_70-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970602" version="1" comment="libpostproc55_9 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970603" version="1" comment="libpostproc55_9-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970604" version="1" comment="libswresample3_9 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970605" version="1" comment="libswresample3_9-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970606" version="1" comment="libswscale5_9 is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970607" version="1" comment="libswscale5_9-32bit is &lt;4.4.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970608" version="1" comment="govulncheck-vulndb is &lt;0.0.20250327T184518-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970609" version="1" comment="istioctl is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970610" version="1" comment="istioctl-bash-completion is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970611" version="1" comment="istioctl-zsh-completion is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970612" version="1" comment="matrix-synapse is &lt;1.127.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970613" version="1" comment="podman is &lt;5.4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970614" version="1" comment="podman-docker is &lt;5.4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970615" version="1" comment="podman-remote is &lt;5.4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970616" version="1" comment="podmansh is &lt;5.4.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970617" version="1" comment="rke2 is &lt;1.32.3+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970618" version="1" comment="rke2-1.29 is &lt;1.29.15+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970619" version="1" comment="rke2-1.30 is &lt;1.30.11+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970620" version="1" comment="rke2-1.31 is &lt;1.31.7+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970716" version="1" comment="atop is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970717" version="1" comment="atop-daemon is &lt;2.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970718" version="1" comment="libmodsecurity3 is &lt;3.0.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970719" version="1" comment="modsecurity is &lt;3.0.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970720" version="1" comment="modsecurity-devel is &lt;3.0.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970721" version="1" comment="upx is &lt;5.0.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974043" version="1" comment="MozillaFirefox is &lt;136.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974044" version="1" comment="MozillaFirefox-branding-upstream is &lt;136.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974045" version="1" comment="MozillaFirefox-devel is &lt;136.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974046" version="1" comment="MozillaFirefox-translations-common is &lt;136.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974047" version="1" comment="MozillaFirefox-translations-other is &lt;136.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974129" version="1" comment="GraphicsMagick is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974130" version="1" comment="GraphicsMagick-devel is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974131" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974132" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974133" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974134" version="1" comment="libGraphicsMagick3-config is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974135" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974136" version="1" comment="perl-GraphicsMagick is &lt;1.3.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974137" version="1" comment="assimp-devel is &lt;5.4.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974138" version="1" comment="libassimp5 is &lt;5.4.3-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974139" version="1" comment="aws-efs-utils is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974140" version="1" comment="expat is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974141" version="1" comment="libexpat-devel is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974142" version="1" comment="libexpat-devel-32bit is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974143" version="1" comment="libexpat1 is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974144" version="1" comment="libexpat1-32bit is &lt;2.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974145" version="1" comment="ghostscript is &lt;10.05.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974146" version="1" comment="ghostscript-devel is &lt;10.05.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974147" version="1" comment="ghostscript-x11 is &lt;10.05.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974148" version="1" comment="gotosocial is &lt;0.18.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974149" version="1" comment="govulncheck-vulndb is &lt;0.0.20250331T171002-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974150" version="1" comment="headscale is &lt;0.25.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974151" version="1" comment="libtheora-devel is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974152" version="1" comment="libtheora1 is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974153" version="1" comment="libtheora1-32bit is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974154" version="1" comment="libtheoradec2 is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974155" version="1" comment="libtheoradec2-32bit is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974156" version="1" comment="libtheoraenc2 is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974157" version="1" comment="libtheoraenc2-32bit is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974158" version="1" comment="libmozjs-128-0 is &lt;128.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974159" version="1" comment="mozjs128 is &lt;128.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974160" version="1" comment="mozjs128-devel is &lt;128.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974161" version="1" comment="libsaml-devel is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974162" version="1" comment="libsaml13 is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974163" version="1" comment="opensaml-bin is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974164" version="1" comment="opensaml-schemas is &lt;3.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974165" version="1" comment="perl-Data-Entropy is &lt;0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974373" version="1" comment="firefox-esr is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974374" version="1" comment="firefox-esr-branding-upstream is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974375" version="1" comment="firefox-esr-translations-common is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974376" version="1" comment="firefox-esr-translations-other is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974377" version="1" comment="go1.23 is &lt;1.23.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974378" version="1" comment="go1.23-doc is &lt;1.23.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974379" version="1" comment="go1.23-libstd is &lt;1.23.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974380" version="1" comment="go1.23-race is &lt;1.23.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974381" version="1" comment="go1.24 is &lt;1.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974382" version="1" comment="go1.24-doc is &lt;1.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974383" version="1" comment="go1.24-libstd is &lt;1.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974384" version="1" comment="go1.24-race is &lt;1.24.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974385" version="1" comment="gsl is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974386" version="1" comment="gsl-devel is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974387" version="1" comment="gsl-doc is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974388" version="1" comment="gsl-examples is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974389" version="1" comment="libgsl28 is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974390" version="1" comment="libgslcblas0 is &lt;2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974391" version="1" comment="python311-ecdsa is &lt;0.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974392" version="1" comment="python312-ecdsa is &lt;0.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974393" version="1" comment="python313-ecdsa is &lt;0.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974477" version="1" comment="MozillaThunderbird is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974478" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974479" version="1" comment="MozillaThunderbird-translations-common is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974480" version="1" comment="MozillaThunderbird-translations-other is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974481" version="1" comment="chromedriver is &lt;135.0.7049.52-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974482" version="1" comment="chromium is &lt;135.0.7049.52-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974483" version="1" comment="cyradm is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974484" version="1" comment="cyrus-imapd is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974485" version="1" comment="cyrus-imapd-devel is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974486" version="1" comment="cyrus-imapd-snmp is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974487" version="1" comment="cyrus-imapd-snmp-mibs is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974488" version="1" comment="cyrus-imapd-utils is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974489" version="1" comment="libcyrus0 is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974490" version="1" comment="perl-Cyrus-Annotator is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974491" version="1" comment="perl-Cyrus-IMAP is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974492" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;3.8.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974493" version="1" comment="google-guest-agent is &lt;20250327.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974494" version="1" comment="govulncheck-vulndb is &lt;0.0.20250402T160203-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974699" version="1" comment="MozillaFirefox is &lt;137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974700" version="1" comment="MozillaFirefox-branding-upstream is &lt;137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974701" version="1" comment="MozillaFirefox-devel is &lt;137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974702" version="1" comment="MozillaFirefox-translations-common is &lt;137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974703" version="1" comment="MozillaFirefox-translations-other is &lt;137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974704" version="1" comment="apache2-mod_auth_openidc is &lt;2.4.16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974705" version="1" comment="etcd is &lt;3.5.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974706" version="1" comment="etcdctl is &lt;3.5.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974707" version="1" comment="etcdutl is &lt;3.5.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974708" version="1" comment="ffmpeg-7 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974709" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974710" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974711" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974712" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974713" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974714" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974715" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974716" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974717" version="1" comment="libavcodec61 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974718" version="1" comment="libavcodec61-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974719" version="1" comment="libavdevice61 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974720" version="1" comment="libavdevice61-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974721" version="1" comment="libavfilter10 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974722" version="1" comment="libavfilter10-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974723" version="1" comment="libavformat61 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974724" version="1" comment="libavformat61-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974725" version="1" comment="libavutil59 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974726" version="1" comment="libavutil59-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974727" version="1" comment="libpostproc58 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974728" version="1" comment="libpostproc58-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974729" version="1" comment="libswresample5 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974730" version="1" comment="libswresample5-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974731" version="1" comment="libswscale8 is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974732" version="1" comment="libswscale8-32bit is &lt;7.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974733" version="1" comment="libmozjs-128-0 is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974734" version="1" comment="mozjs128 is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974735" version="1" comment="mozjs128-devel is &lt;128.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974736" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974737" version="1" comment="libpoppler-cpp2-32bit is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974738" version="1" comment="libpoppler-devel is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974739" version="1" comment="libpoppler-glib-devel is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974740" version="1" comment="libpoppler-glib8 is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974741" version="1" comment="libpoppler-glib8-32bit is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974742" version="1" comment="libpoppler148 is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974743" version="1" comment="libpoppler148-32bit is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974744" version="1" comment="poppler-tools is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974745" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974849" version="1" comment="c-ares-devel is &lt;1.34.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974850" version="1" comment="c-ares-utils is &lt;1.34.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974851" version="1" comment="libcares2 is &lt;1.34.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974852" version="1" comment="libcares2-32bit is &lt;1.34.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974853" version="1" comment="govulncheck-vulndb is &lt;0.0.20250408T210408-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974854" version="1" comment="openvpn is &lt;2.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974855" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974856" version="1" comment="openvpn-devel is &lt;2.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974857" version="1" comment="openvpn-down-root-plugin is &lt;2.6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974951" version="1" comment="docker-stable is &lt;24.0.9_ce-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974952" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974953" version="1" comment="docker-stable-buildx is &lt;0.22.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974954" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974955" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974956" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974957" version="1" comment="fontforge is &lt;20230101-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974958" version="1" comment="fontforge-devel is &lt;20230101-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974959" version="1" comment="fontforge-doc is &lt;20230101-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974960" version="1" comment="govulncheck-vulndb is &lt;0.0.20250409T170536-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974961" version="1" comment="pgadmin4 is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974962" version="1" comment="pgadmin4-cloud is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974963" version="1" comment="pgadmin4-desktop is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974964" version="1" comment="pgadmin4-doc is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974965" version="1" comment="pgadmin4-web-uwsgi is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974966" version="1" comment="system-user-pgadmin is &lt;9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974967" version="1" comment="liblzma5 is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974968" version="1" comment="liblzma5-32bit is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974969" version="1" comment="liblzma5-x86-64-v3 is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974970" version="1" comment="xz is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974971" version="1" comment="xz-devel is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974972" version="1" comment="xz-devel-32bit is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974973" version="1" comment="xz-lang is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975017" version="1" comment="docker is &lt;27.5.1_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975018" version="1" comment="docker-bash-completion is &lt;27.5.1_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975019" version="1" comment="docker-buildx is &lt;0.22.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975020" version="1" comment="docker-fish-completion is &lt;27.5.1_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975021" version="1" comment="docker-rootless-extras is &lt;27.5.1_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975022" version="1" comment="docker-zsh-completion is &lt;27.5.1_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975023" version="1" comment="python311-Django is &lt;5.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975024" version="1" comment="python312-Django is &lt;5.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975025" version="1" comment="python313-Django is &lt;5.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975026" version="1" comment="python311-PyJWT is &lt;2.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975027" version="1" comment="python312-PyJWT is &lt;2.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975028" version="1" comment="python313-PyJWT is &lt;2.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975383" version="1" comment="cosign is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975384" version="1" comment="cosign-bash-completion is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975385" version="1" comment="cosign-fish-completion is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975386" version="1" comment="cosign-zsh-completion is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975387" version="1" comment="flannel is &lt;0.26.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975388" version="1" comment="flannel-k8s-yaml is &lt;0.26.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975389" version="1" comment="rekor is &lt;1.3.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975390" version="1" comment="libsqlite3-0 is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975391" version="1" comment="libsqlite3-0-32bit is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975392" version="1" comment="libsqlite3-0-x86-64-v3 is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975393" version="1" comment="sqlite3 is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975394" version="1" comment="sqlite3-devel is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975395" version="1" comment="sqlite3-doc is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975396" version="1" comment="sqlite3-tcl is &lt;3.49.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975397" version="1" comment="libvarnishapi3 is &lt;7.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975398" version="1" comment="varnish is &lt;7.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975399" version="1" comment="varnish-devel is &lt;7.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975528" version="1" comment="GraphicsMagick is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975529" version="1" comment="GraphicsMagick-devel is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975530" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975531" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975532" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975533" version="1" comment="libGraphicsMagick3-config is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975534" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975535" version="1" comment="perl-GraphicsMagick is &lt;1.3.45-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975536" version="1" comment="gitoxide is &lt;0.42.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975537" version="1" comment="govulncheck-vulndb is &lt;0.0.20250410T162706-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975538" version="1" comment="hauler is &lt;1.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975539" version="1" comment="oci-cli is &lt;3.54.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975540" version="1" comment="python311-aiohttp is &lt;3.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975541" version="1" comment="python312-aiohttp is &lt;3.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975542" version="1" comment="python313-aiohttp is &lt;3.11.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975543" version="1" comment="python-lxml-doc is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975544" version="1" comment="python311-lxml is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975545" version="1" comment="python311-lxml-devel is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975546" version="1" comment="python312-lxml is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975547" version="1" comment="python312-lxml-devel is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975548" version="1" comment="python313-lxml is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975549" version="1" comment="python313-lxml-devel is &lt;5.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975709" version="1" comment="MozillaThunderbird is &lt;128.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975710" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975711" version="1" comment="MozillaThunderbird-translations-common is &lt;128.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975712" version="1" comment="MozillaThunderbird-translations-other is &lt;128.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975713" version="1" comment="forgejo is &lt;10.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975714" version="1" comment="forgejo-apparmor is &lt;10.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975715" version="1" comment="forgejo-environment-to-ini is &lt;10.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975716" version="1" comment="forgejo-firewalld is &lt;10.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975717" version="1" comment="forgejo-selinux is &lt;10.0.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975718" version="1" comment="libmozjs-115-0 is &lt;115.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975719" version="1" comment="mozjs115 is &lt;115.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975720" version="1" comment="mozjs115-devel is &lt;115.15.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975721" version="1" comment="perl is &lt;5.40.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975722" version="1" comment="perl-32bit is &lt;5.40.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975723" version="1" comment="perl-base is &lt;5.40.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975724" version="1" comment="perl-base-32bit is &lt;5.40.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975725" version="1" comment="perl-doc is &lt;5.40.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975726" version="1" comment="subfinder is &lt;2.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975947" version="1" comment="MozillaFirefox is &lt;137.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975948" version="1" comment="MozillaFirefox-branding-upstream is &lt;137.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975949" version="1" comment="MozillaFirefox-devel is &lt;137.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975950" version="1" comment="MozillaFirefox-translations-common is &lt;137.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975951" version="1" comment="MozillaFirefox-translations-other is &lt;137.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975952" version="1" comment="argocd-cli is &lt;2.14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975953" version="1" comment="argocd-cli-bash-completion is &lt;2.14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975954" version="1" comment="argocd-cli-zsh-completion is &lt;2.14.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975955" version="1" comment="gio-branding-upstream is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975956" version="1" comment="glib2-devel is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975957" version="1" comment="glib2-devel-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975958" version="1" comment="glib2-devel-static is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975959" version="1" comment="glib2-lang is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975960" version="1" comment="glib2-tests-devel is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975961" version="1" comment="glib2-tools is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975962" version="1" comment="glib2-tools-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975963" version="1" comment="libgio-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975964" version="1" comment="libgio-2_0-0-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975965" version="1" comment="libgirepository-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975966" version="1" comment="libglib-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975967" version="1" comment="libglib-2_0-0-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975968" version="1" comment="libgmodule-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975969" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975970" version="1" comment="libgobject-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975971" version="1" comment="libgobject-2_0-0-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975972" version="1" comment="libgthread-2_0-0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975973" version="1" comment="libgthread-2_0-0-32bit is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975974" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975975" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975976" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975977" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975978" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975979" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975980" version="1" comment="govulncheck-vulndb is &lt;0.0.20250416T165455-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975981" version="1" comment="libmozjs-128-0 is &lt;128.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975982" version="1" comment="mozjs128 is &lt;128.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975983" version="1" comment="mozjs128-devel is &lt;128.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975997" version="1" comment="ffmpeg-6 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975998" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975999" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976000" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976001" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976002" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976003" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976004" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976005" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976006" version="1" comment="libavcodec60 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976007" version="1" comment="libavdevice60 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976008" version="1" comment="libavfilter9 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976009" version="1" comment="libavformat60 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976010" version="1" comment="libavutil58 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976011" version="1" comment="libpostproc57 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976012" version="1" comment="libswresample4 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976013" version="1" comment="libswscale7 is &lt;6.1.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976105" version="1" comment="epiphany is &lt;48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976106" version="1" comment="epiphany-branding-upstream is &lt;48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976107" version="1" comment="epiphany-lang is &lt;48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976108" version="1" comment="gnome-shell-search-provider-epiphany is &lt;48.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976109" version="1" comment="ffmpeg-6 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976110" version="1" comment="ffmpeg-6-libavcodec-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976111" version="1" comment="ffmpeg-6-libavdevice-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976112" version="1" comment="ffmpeg-6-libavfilter-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976113" version="1" comment="ffmpeg-6-libavformat-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976114" version="1" comment="ffmpeg-6-libavutil-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976115" version="1" comment="ffmpeg-6-libpostproc-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976116" version="1" comment="ffmpeg-6-libswresample-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976117" version="1" comment="ffmpeg-6-libswscale-devel is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976118" version="1" comment="libavcodec60 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976119" version="1" comment="libavdevice60 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976120" version="1" comment="libavfilter9 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976121" version="1" comment="libavformat60 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976122" version="1" comment="libavutil58 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976123" version="1" comment="libpostproc57 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976124" version="1" comment="libswresample4 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976125" version="1" comment="libswscale7 is &lt;6.1.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976126" version="1" comment="gopass is &lt;1.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976127" version="1" comment="gopass-bash-completion is &lt;1.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976128" version="1" comment="gopass-fish-completion is &lt;1.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976129" version="1" comment="gopass-impersonate-pass is &lt;1.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976130" version="1" comment="gopass-zsh-completion is &lt;1.15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976131" version="1" comment="govulncheck-vulndb is &lt;0.0.20250422T152923-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976132" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976133" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976134" version="1" comment="libsoup-devel is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976135" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976136" version="1" comment="libsoup-lang is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976137" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976138" version="1" comment="mcabber is &lt;1.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976139" version="1" comment="mcabber-devel is &lt;1.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976218" version="1" comment="govulncheck-vulndb is &lt;0.0.20250422T181640-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976219" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976220" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976221" version="1" comment="libsoup2-devel is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976222" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976223" version="1" comment="libsoup2-lang is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976224" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976225" version="1" comment="libxml2-2 is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976226" version="1" comment="libxml2-2-32bit is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976227" version="1" comment="libxml2-devel is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976228" version="1" comment="libxml2-devel-32bit is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976229" version="1" comment="libxml2-doc is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976230" version="1" comment="libxml2-tools is &lt;2.13.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976231" version="1" comment="rollup is &lt;3.29.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976362" version="1" comment="augeas is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976363" version="1" comment="augeas-bash-completion is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976364" version="1" comment="augeas-devel is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976365" version="1" comment="augeas-devel-32bit is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976366" version="1" comment="augeas-lense-tests is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976367" version="1" comment="augeas-lenses is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976368" version="1" comment="libaugeas0 is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976369" version="1" comment="libaugeas0-32bit is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976370" version="1" comment="libfa1 is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976371" version="1" comment="libfa1-32bit is &lt;1.14.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976372" version="1" comment="java-11-openjdk is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976373" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976374" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976375" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976376" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976377" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976378" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976379" version="1" comment="java-17-openjdk is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976380" version="1" comment="java-17-openjdk-demo is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976381" version="1" comment="java-17-openjdk-devel is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976382" version="1" comment="java-17-openjdk-headless is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976383" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976384" version="1" comment="java-17-openjdk-jmods is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976385" version="1" comment="java-17-openjdk-src is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976386" version="1" comment="java-21-openjdk is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976387" version="1" comment="java-21-openjdk-demo is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976388" version="1" comment="java-21-openjdk-devel is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976389" version="1" comment="java-21-openjdk-headless is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976390" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976391" version="1" comment="java-21-openjdk-jmods is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976392" version="1" comment="java-21-openjdk-src is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976393" version="1" comment="libraw-devel is &lt;0.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976394" version="1" comment="libraw-devel-static is &lt;0.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976395" version="1" comment="libraw-tools is &lt;0.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976396" version="1" comment="libraw23 is &lt;0.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976397" version="1" comment="libraw23-32bit is &lt;0.21.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976398" version="1" comment="mysql-connector-java is &lt;9.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976405" version="1" comment="chromedriver is &lt;135.0.7049.95-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976406" version="1" comment="chromium is &lt;135.0.7049.95-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976407" version="1" comment="distrobuilder is &lt;3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976408" version="1" comment="kyverno is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976409" version="1" comment="kyverno-bash-completion is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976410" version="1" comment="kyverno-fish-completion is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976411" version="1" comment="kyverno-zsh-completion is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976412" version="1" comment="opentofu is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976413" version="1" comment="python311-grpcio is &lt;1.69.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976414" version="1" comment="python312-grpcio is &lt;1.69.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976415" version="1" comment="python313-grpcio is &lt;1.69.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976416" version="1" comment="python311-h11 is &lt;0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976417" version="1" comment="python312-h11 is &lt;0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976418" version="1" comment="python313-h11 is &lt;0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976421" version="1" comment="govulncheck-vulndb is &lt;0.0.20250424T181457-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976422" version="1" comment="subfinder is &lt;2.7.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976423" version="1" comment="valkey is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976424" version="1" comment="valkey-compat-redis is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976425" version="1" comment="valkey-devel is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976428" version="1" comment="glow is &lt;2.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976429" version="1" comment="glow-bash-completion is &lt;2.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976430" version="1" comment="glow-fish-completion is &lt;2.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976431" version="1" comment="glow-zsh-completion is &lt;2.1.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976821" version="1" comment="amber-cli is &lt;1.13.1+git20250329.c2e3bb8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976822" version="1" comment="cyradm is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976823" version="1" comment="cyrus-imapd is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976824" version="1" comment="cyrus-imapd-devel is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976825" version="1" comment="cyrus-imapd-snmp is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976826" version="1" comment="cyrus-imapd-snmp-mibs is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976827" version="1" comment="cyrus-imapd-utils is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976828" version="1" comment="libcyrus0 is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976829" version="1" comment="perl-Cyrus-Annotator is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976830" version="1" comment="perl-Cyrus-IMAP is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976831" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;3.8.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976992" version="1" comment="cmctl is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976993" version="1" comment="cmctl-bash-completion is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976994" version="1" comment="cmctl-fish-completion is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976995" version="1" comment="cmctl-zsh-completion is &lt;2.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976996" version="1" comment="firefox-esr is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976997" version="1" comment="firefox-esr-branding-upstream is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976998" version="1" comment="firefox-esr-translations-common is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976999" version="1" comment="firefox-esr-translations-other is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977000" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977001" version="1" comment="MozillaThunderbird is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977002" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977003" version="1" comment="MozillaThunderbird-translations-common is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977004" version="1" comment="MozillaThunderbird-translations-other is &lt;128.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977005" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977006" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977007" version="1" comment="libsoup-devel is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977008" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977009" version="1" comment="libsoup-lang is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977010" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977011" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977012" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977013" version="1" comment="libsoup2-devel is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977014" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977015" version="1" comment="libsoup2-lang is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977016" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977088" version="1" comment="MozillaFirefox is &lt;138.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977089" version="1" comment="MozillaFirefox-branding-upstream is &lt;138.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977090" version="1" comment="MozillaFirefox-devel is &lt;138.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977091" version="1" comment="MozillaFirefox-translations-common is &lt;138.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977092" version="1" comment="MozillaFirefox-translations-other is &lt;138.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977093" version="1" comment="docker is &lt;28.1.1_ce-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977094" version="1" comment="docker-bash-completion is &lt;28.1.1_ce-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977095" version="1" comment="docker-buildx is &lt;0.23.0-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977096" version="1" comment="docker-fish-completion is &lt;28.1.1_ce-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977097" version="1" comment="docker-rootless-extras is &lt;28.1.1_ce-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977098" version="1" comment="docker-zsh-completion is &lt;28.1.1_ce-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977099" version="1" comment="hauler is &lt;1.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977100" version="1" comment="tomcat is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977101" version="1" comment="tomcat-admin-webapps is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977102" version="1" comment="tomcat-docs-webapp is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977103" version="1" comment="tomcat-el-3_0-api is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977104" version="1" comment="tomcat-embed is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977105" version="1" comment="tomcat-javadoc is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977106" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977107" version="1" comment="tomcat-jsvc is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977108" version="1" comment="tomcat-lib is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977109" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977110" version="1" comment="tomcat-webapps is &lt;9.0.104-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977111" version="1" comment="tomcat10 is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977112" version="1" comment="tomcat10-admin-webapps is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977113" version="1" comment="tomcat10-doc is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977114" version="1" comment="tomcat10-docs-webapp is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977115" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977116" version="1" comment="tomcat10-embed is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977117" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977118" version="1" comment="tomcat10-jsvc is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977119" version="1" comment="tomcat10-lib is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977120" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977121" version="1" comment="tomcat10-webapps is &lt;10.1.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977124" version="1" comment="audiofile is &lt;0.3.6-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977125" version="1" comment="audiofile-devel is &lt;0.3.6-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977126" version="1" comment="audiofile-doc is &lt;0.3.6-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977127" version="1" comment="libaudiofile1 is &lt;0.3.6-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977136" version="1" comment="chromedriver is &lt;136.0.7103.59-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977137" version="1" comment="chromium is &lt;136.0.7103.59-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977269" version="1" comment="grafana is &lt;11.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977270" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977271" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977272" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977273" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977274" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977275" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977276" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977277" version="1" comment="rclone is &lt;1.69.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977278" version="1" comment="rclone-bash-completion is &lt;1.69.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977279" version="1" comment="rclone-zsh-completion is &lt;1.69.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977523" version="1" comment="weblate is &lt;5.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981624" version="1" comment="389-ds is &lt;3.1.2~git90.2bc7250be-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981625" version="1" comment="389-ds-devel is &lt;3.1.2~git90.2bc7250be-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981626" version="1" comment="389-ds-snmp is &lt;3.1.2~git90.2bc7250be-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981627" version="1" comment="lib389 is &lt;3.1.2~git90.2bc7250be-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981628" version="1" comment="libsvrcore0 is &lt;3.1.2~git90.2bc7250be-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981629" version="1" comment="cargo-c is &lt;0.10.3~git0.ee7d7ef-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981630" version="1" comment="go1.24 is &lt;1.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981631" version="1" comment="go1.24-doc is &lt;1.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981632" version="1" comment="go1.24-libstd is &lt;1.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981633" version="1" comment="go1.24-race is &lt;1.24.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981634" version="1" comment="govulncheck-vulndb is &lt;0.0.20250506T153719-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981635" version="1" comment="kanidm is &lt;1.6.0~git0.d7ae0f336-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981636" version="1" comment="kanidm-clients is &lt;1.6.0~git0.d7ae0f336-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981637" version="1" comment="kanidm-docs is &lt;1.6.0~git0.d7ae0f336-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981638" version="1" comment="kanidm-server is &lt;1.6.0~git0.d7ae0f336-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981639" version="1" comment="kanidm-unixd-clients is &lt;1.6.0~git0.d7ae0f336-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981640" version="1" comment="rustup is &lt;1.28.1~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981641" version="1" comment="sccache is &lt;0.9.1~22-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981642" version="1" comment="tealdeer is &lt;1.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981643" version="1" comment="tealdeer-bash-completion is &lt;1.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981644" version="1" comment="tealdeer-fish-completion is &lt;1.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981645" version="1" comment="tealdeer-zsh-completion is &lt;1.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981646" version="1" comment="transfig is &lt;3.2.9a-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981647" version="1" comment="wasm-bindgen is &lt;0.2.97~0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981648" version="1" comment="ldap-proxy is &lt;0.1.0~90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981649" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981650" version="1" comment="sequoia-octopus-librnp is &lt;1.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981651" version="1" comment="sslh is &lt;2.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981652" version="1" comment="libevtlog-4_8-0 is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981653" version="1" comment="syslog-ng is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981654" version="1" comment="syslog-ng-bigquery is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981655" version="1" comment="syslog-ng-bpf is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981656" version="1" comment="syslog-ng-cloudauth is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981657" version="1" comment="syslog-ng-devel is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981658" version="1" comment="syslog-ng-geoip is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981659" version="1" comment="syslog-ng-grpc is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981660" version="1" comment="syslog-ng-http is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981661" version="1" comment="syslog-ng-java is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981662" version="1" comment="syslog-ng-loki is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981663" version="1" comment="syslog-ng-mqtt is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981664" version="1" comment="syslog-ng-opentelemetry is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981665" version="1" comment="syslog-ng-python is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981666" version="1" comment="syslog-ng-python-modules is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981667" version="1" comment="syslog-ng-redis is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981668" version="1" comment="syslog-ng-smtp is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981669" version="1" comment="syslog-ng-snmp is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981670" version="1" comment="syslog-ng-sql is &lt;4.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981752" version="1" comment="afterburn is &lt;5.7.0.git103.bae893c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981753" version="1" comment="afterburn-dracut is &lt;5.7.0.git103.bae893c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981754" version="1" comment="bird3 is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981755" version="1" comment="bird3-doc is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981756" version="1" comment="chromedriver is &lt;136.0.7103.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981757" version="1" comment="chromium is &lt;136.0.7103.92-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981758" version="1" comment="libmosquitto1 is &lt;2.0.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981759" version="1" comment="libmosquittopp1 is &lt;2.0.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981760" version="1" comment="mosquitto is &lt;2.0.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981761" version="1" comment="mosquitto-clients is &lt;2.0.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981762" version="1" comment="mosquitto-devel is &lt;2.0.21-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981792" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981793" version="1" comment="dirmngr is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981794" version="1" comment="gpg2 is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981795" version="1" comment="gpg2-lang is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981796" version="1" comment="gpg2-tpm is &lt;2.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981797" version="1" comment="java-11-openj9 is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981798" version="1" comment="java-11-openj9-demo is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981799" version="1" comment="java-11-openj9-devel is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981800" version="1" comment="java-11-openj9-headless is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981801" version="1" comment="java-11-openj9-javadoc is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981802" version="1" comment="java-11-openj9-jmods is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981803" version="1" comment="java-11-openj9-src is &lt;11.0.27.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981804" version="1" comment="java-17-openj9 is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981805" version="1" comment="java-17-openj9-demo is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981806" version="1" comment="java-17-openj9-devel is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981807" version="1" comment="java-17-openj9-headless is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981808" version="1" comment="java-17-openj9-javadoc is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981809" version="1" comment="java-17-openj9-jmods is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981810" version="1" comment="java-17-openj9-src is &lt;17.0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981811" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981812" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981813" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981814" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981815" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981816" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981817" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.452-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981818" version="1" comment="java-21-openj9 is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981819" version="1" comment="java-21-openj9-demo is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981820" version="1" comment="java-21-openj9-devel is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981821" version="1" comment="java-21-openj9-headless is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981822" version="1" comment="java-21-openj9-javadoc is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981823" version="1" comment="java-21-openj9-jmods is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981824" version="1" comment="java-21-openj9-src is &lt;21.0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981825" version="1" comment="libxmp-devel is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981826" version="1" comment="libxmp4 is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981827" version="1" comment="python311-Django4 is &lt;4.2.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981828" version="1" comment="python312-Django4 is &lt;4.2.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981829" version="1" comment="python313-Django4 is &lt;4.2.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981830" version="1" comment="rke2-1.32 is &lt;1.32.4+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981907" version="1" comment="cpp-httplib-devel is &lt;0.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981908" version="1" comment="libcpp-httplib0_20 is &lt;0.20.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981909" version="1" comment="grub2 is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981910" version="1" comment="grub2-branding-upstream is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981911" version="1" comment="grub2-common is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981912" version="1" comment="grub2-i386-efi is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981913" version="1" comment="grub2-i386-efi-bls is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981914" version="1" comment="grub2-i386-efi-debug is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981915" version="1" comment="grub2-i386-efi-extras is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981916" version="1" comment="grub2-i386-pc is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981917" version="1" comment="grub2-i386-pc-debug is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981918" version="1" comment="grub2-i386-pc-extras is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981919" version="1" comment="grub2-snapper-plugin is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981920" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981921" version="1" comment="grub2-x86_64-efi is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981922" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981923" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981924" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981925" version="1" comment="grub2-x86_64-xen is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981926" version="1" comment="grub2-x86_64-xen-debug is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981927" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981929" version="1" comment="kernel-macros is &lt;6.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981930" version="1" comment="kernel-source is &lt;6.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981931" version="1" comment="kernel-source-vanilla is &lt;6.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981932" version="1" comment="python311-Django is &lt;5.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981933" version="1" comment="python312-Django is &lt;5.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981934" version="1" comment="python313-Django is &lt;5.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982052" version="1" comment="nbdkit is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982053" version="1" comment="nbdkit-bash-completion is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982054" version="1" comment="nbdkit-basic-filters is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982055" version="1" comment="nbdkit-basic-plugins is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982056" version="1" comment="nbdkit-bzip2-filter is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982057" version="1" comment="nbdkit-curl-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982058" version="1" comment="nbdkit-devel is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982059" version="1" comment="nbdkit-example-plugins is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982060" version="1" comment="nbdkit-gcs-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982061" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982062" version="1" comment="nbdkit-nbd-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982063" version="1" comment="nbdkit-python-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982064" version="1" comment="nbdkit-server is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982065" version="1" comment="nbdkit-ssh-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982066" version="1" comment="nbdkit-stats-filter is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982067" version="1" comment="nbdkit-tar-filter is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982068" version="1" comment="nbdkit-tmpdisk-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982069" version="1" comment="nbdkit-vddk-plugin is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982070" version="1" comment="nbdkit-xz-filter is &lt;1.42.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982096" version="1" comment="iputils is &lt;20240905-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982097" version="1" comment="libvmtools-devel is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982098" version="1" comment="libvmtools0 is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982099" version="1" comment="open-vm-tools is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982100" version="1" comment="open-vm-tools-containerinfo is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982101" version="1" comment="open-vm-tools-desktop is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982102" version="1" comment="open-vm-tools-salt-minion is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982103" version="1" comment="open-vm-tools-sdmp is &lt;12.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982104" version="1" comment="openssh is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982105" version="1" comment="openssh-cavs is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982106" version="1" comment="openssh-clients is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982107" version="1" comment="openssh-common is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982108" version="1" comment="openssh-helpers is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982109" version="1" comment="openssh-server is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982110" version="1" comment="openssh-server-config-rootlogin is &lt;10.0p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982111" version="1" comment="pnpm is &lt;10.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982112" version="1" comment="pnpm-bash-completion is &lt;10.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982113" version="1" comment="pnpm-fish-completion is &lt;10.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982114" version="1" comment="pnpm-zsh-completion is &lt;10.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982115" version="1" comment="ucode-intel is &lt;20250512-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982286" version="1" comment="python311-cramjam is &lt;2.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982287" version="1" comment="python312-cramjam is &lt;2.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982288" version="1" comment="python313-cramjam is &lt;2.9.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982289" version="1" comment="python311-httptools is &lt;0.6.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982290" version="1" comment="python312-httptools is &lt;0.6.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982291" version="1" comment="python313-httptools is &lt;0.6.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982292" version="1" comment="python311-jwcrypto is &lt;1.5.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982293" version="1" comment="python312-jwcrypto is &lt;1.5.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982294" version="1" comment="python313-jwcrypto is &lt;1.5.6-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982295" version="1" comment="python311-loguru is &lt;0.7.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982296" version="1" comment="python312-loguru is &lt;0.7.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982297" version="1" comment="python313-loguru is &lt;0.7.2-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982298" version="1" comment="python311-mechanize is &lt;0.4.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982299" version="1" comment="python312-mechanize is &lt;0.4.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982300" version="1" comment="python313-mechanize is &lt;0.4.10-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982301" version="1" comment="python311-nltk is &lt;3.9.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982302" version="1" comment="python312-nltk is &lt;3.9.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982303" version="1" comment="python313-nltk is &lt;3.9.1-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982304" version="1" comment="python311-oauthlib is &lt;3.2.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982305" version="1" comment="python312-oauthlib is &lt;3.2.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982306" version="1" comment="python313-oauthlib is &lt;3.2.2-5.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982307" version="1" comment="python311-py7zr is &lt;0.20.8-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982308" version="1" comment="python312-py7zr is &lt;0.20.8-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982309" version="1" comment="python313-py7zr is &lt;0.20.8-2.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982310" version="1" comment="python311-pycapnp is &lt;2.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982311" version="1" comment="python312-pycapnp is &lt;2.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982312" version="1" comment="python313-pycapnp is &lt;2.0.0-2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982313" version="1" comment="python311-pyspnego is &lt;0.11.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982314" version="1" comment="python312-pyspnego is &lt;0.11.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982315" version="1" comment="python313-pyspnego is &lt;0.11.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982316" version="1" comment="python311-pywayland is &lt;0.4.17-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982317" version="1" comment="python312-pywayland is &lt;0.4.17-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982318" version="1" comment="python313-pywayland is &lt;0.4.17-3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982319" version="1" comment="python311-suds is &lt;1.2.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982320" version="1" comment="python312-suds is &lt;1.2.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982321" version="1" comment="python313-suds is &lt;1.2.0-2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982322" version="1" comment="python311-treq is &lt;24.9.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982323" version="1" comment="python312-treq is &lt;24.9.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982324" version="1" comment="python313-treq is &lt;24.9.1-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982325" version="1" comment="python311-ujson is &lt;5.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982326" version="1" comment="python312-ujson is &lt;5.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982327" version="1" comment="python313-ujson is &lt;5.10.0-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982328" version="1" comment="python311-waitress is &lt;3.0.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982329" version="1" comment="python312-waitress is &lt;3.0.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982330" version="1" comment="python313-waitress is &lt;3.0.2-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982331" version="1" comment="ruby3.4-rubygem-actionmailer-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982332" version="1" comment="ruby3.4-rubygem-actionpack-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982333" version="1" comment="ruby3.4-rubygem-actiontext-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982334" version="1" comment="ruby3.4-rubygem-activerecord-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982335" version="1" comment="ruby3.4-rubygem-activestorage-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982336" version="1" comment="ruby3.4-rubygem-activesupport-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982337" version="1" comment="ruby3.4-rubygem-fluentd is &lt;1.17.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982338" version="1" comment="ruby3.4-rubygem-globalid is &lt;1.2.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982339" version="1" comment="ruby3.4-rubygem-jquery-rails is &lt;4.6.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982340" version="1" comment="ruby3.4-rubygem-json_pure is &lt;2.7.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982341" version="1" comment="ruby3.4-rubygem-kramdown is &lt;2.4.0-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982342" version="1" comment="ruby3.4-rubygem-loofah is &lt;2.23.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982343" version="1" comment="ruby3.4-rubygem-minitar is &lt;0.9-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982344" version="1" comment="ruby3.4-rubygem-multi_xml is &lt;0.6.0-1.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982345" version="1" comment="ruby3.4-rubygem-puma is &lt;6.4.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982346" version="1" comment="ruby3.4-rubygem-rails-7.0 is &lt;7.0.8.6-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982347" version="1" comment="ruby3.4-rubygem-rails-html-sanitizer is &lt;1.6.0-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982348" version="1" comment="ruby3.4-rubygem-rubyzip is &lt;2.3.2-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982349" version="1" comment="ruby3.4-rubygem-sprockets is &lt;4.2.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982350" version="1" comment="ruby3.4-rubygem-sprockets-3.7 is &lt;3.7.5-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982351" version="1" comment="ruby3.4-rubygem-web-console is &lt;4.2.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982352" version="1" comment="ruby3.4-rubygem-websocket-extensions is &lt;0.1.5-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982548" version="1" comment="MozillaThunderbird is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982549" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982550" version="1" comment="MozillaThunderbird-translations-common is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982551" version="1" comment="MozillaThunderbird-translations-other is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982552" version="1" comment="dante is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982553" version="1" comment="dante-devel is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982554" version="1" comment="dante-server is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982555" version="1" comment="libsocks0 is &lt;1.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982556" version="1" comment="firefox-esr is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982557" version="1" comment="firefox-esr-branding-upstream is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982558" version="1" comment="firefox-esr-translations-common is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982559" version="1" comment="firefox-esr-translations-other is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982560" version="1" comment="gnuplot is &lt;6.0.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982561" version="1" comment="govulncheck-vulndb is &lt;0.0.20250515T200012-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982562" version="1" comment="grype is &lt;0.92.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982563" version="1" comment="grype-bash-completion is &lt;0.92.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982564" version="1" comment="grype-fish-completion is &lt;0.92.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982565" version="1" comment="grype-zsh-completion is &lt;0.92.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982566" version="1" comment="postgresql13 is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982567" version="1" comment="postgresql13-contrib is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982568" version="1" comment="postgresql13-devel is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982569" version="1" comment="postgresql13-docs is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982570" version="1" comment="postgresql13-llvmjit is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982571" version="1" comment="postgresql13-llvmjit-devel is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982572" version="1" comment="postgresql13-plperl is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982573" version="1" comment="postgresql13-plpython is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982574" version="1" comment="postgresql13-pltcl is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982575" version="1" comment="postgresql13-server is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982576" version="1" comment="postgresql13-server-devel is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982577" version="1" comment="postgresql13-test is &lt;13.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982578" version="1" comment="postgresql14 is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982579" version="1" comment="postgresql14-contrib is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982580" version="1" comment="postgresql14-devel is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982581" version="1" comment="postgresql14-docs is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982582" version="1" comment="postgresql14-llvmjit is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982583" version="1" comment="postgresql14-llvmjit-devel is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982584" version="1" comment="postgresql14-plperl is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982585" version="1" comment="postgresql14-plpython is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982586" version="1" comment="postgresql14-pltcl is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982587" version="1" comment="postgresql14-server is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982588" version="1" comment="postgresql14-server-devel is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982589" version="1" comment="postgresql14-test is &lt;14.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982590" version="1" comment="postgresql15 is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982591" version="1" comment="postgresql15-contrib is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982592" version="1" comment="postgresql15-devel is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982593" version="1" comment="postgresql15-docs is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982594" version="1" comment="postgresql15-llvmjit is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982595" version="1" comment="postgresql15-llvmjit-devel is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982596" version="1" comment="postgresql15-plperl is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982597" version="1" comment="postgresql15-plpython is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982598" version="1" comment="postgresql15-pltcl is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982599" version="1" comment="postgresql15-server is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982600" version="1" comment="postgresql15-server-devel is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982601" version="1" comment="postgresql15-test is &lt;15.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982602" version="1" comment="postgresql16 is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982603" version="1" comment="postgresql16-contrib is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982604" version="1" comment="postgresql16-devel is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982605" version="1" comment="postgresql16-docs is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982606" version="1" comment="postgresql16-llvmjit is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982607" version="1" comment="postgresql16-llvmjit-devel is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982608" version="1" comment="postgresql16-plperl is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982609" version="1" comment="postgresql16-plpython is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982610" version="1" comment="postgresql16-pltcl is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982611" version="1" comment="postgresql16-server is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982612" version="1" comment="postgresql16-server-devel is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982613" version="1" comment="postgresql16-test is &lt;16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982614" version="1" comment="python314 is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982615" version="1" comment="python314-curses is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982616" version="1" comment="python314-dbm is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982617" version="1" comment="python314-idle is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982618" version="1" comment="python314-tk is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982619" version="1" comment="python314-x86-64-v3 is &lt;3.14.0~b1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982620" version="1" comment="xen is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982621" version="1" comment="xen-devel is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982622" version="1" comment="xen-doc-html is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982623" version="1" comment="xen-libs is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982624" version="1" comment="xen-tools is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982625" version="1" comment="xen-tools-domU is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982626" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.0_12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982925" version="1" comment="chromedriver is &lt;136.0.7103.113-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982926" version="1" comment="chromium is &lt;136.0.7103.113-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983048" version="1" comment="govulncheck-vulndb is &lt;0.0.20250520T172319-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983049" version="1" comment="grafana is &lt;11.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983050" version="1" comment="kind is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983051" version="1" comment="kind-bash-completion is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983052" version="1" comment="kind-fish-completion is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983053" version="1" comment="kind-zsh-completion is &lt;0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983054" version="1" comment="kubo is &lt;0.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983084" version="1" comment="MozillaFirefox is &lt;138.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983085" version="1" comment="MozillaFirefox-branding-upstream is &lt;138.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983086" version="1" comment="MozillaFirefox-devel is &lt;138.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983087" version="1" comment="MozillaFirefox-translations-common is &lt;138.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983088" version="1" comment="MozillaFirefox-translations-other is &lt;138.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983089" version="1" comment="MozillaThunderbird is &lt;128.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983090" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983091" version="1" comment="MozillaThunderbird-translations-common is &lt;128.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983092" version="1" comment="MozillaThunderbird-translations-other is &lt;128.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983093" version="1" comment="audiofile is &lt;0.3.6-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983094" version="1" comment="audiofile-devel is &lt;0.3.6-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983095" version="1" comment="audiofile-doc is &lt;0.3.6-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983096" version="1" comment="libaudiofile1 is &lt;0.3.6-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983097" version="1" comment="libecpg6 is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983098" version="1" comment="libecpg6-32bit is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983099" version="1" comment="libpq5 is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983100" version="1" comment="libpq5-32bit is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983101" version="1" comment="postgresql17 is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983102" version="1" comment="postgresql17-contrib is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983103" version="1" comment="postgresql17-devel is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983104" version="1" comment="postgresql17-docs is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983105" version="1" comment="postgresql17-llvmjit is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983106" version="1" comment="postgresql17-llvmjit-devel is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983107" version="1" comment="postgresql17-plperl is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983108" version="1" comment="postgresql17-plpython is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983109" version="1" comment="postgresql17-pltcl is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983110" version="1" comment="postgresql17-server is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983111" version="1" comment="postgresql17-server-devel is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983112" version="1" comment="postgresql17-test is &lt;17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983113" version="1" comment="python311-Flask is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983114" version="1" comment="python311-Flask-doc is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983115" version="1" comment="python312-Flask is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983116" version="1" comment="python312-Flask-doc is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983117" version="1" comment="python313-Flask is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983118" version="1" comment="python313-Flask-doc is &lt;3.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983119" version="1" comment="python311-tornado6 is &lt;6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983120" version="1" comment="python312-tornado6 is &lt;6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983121" version="1" comment="python313-tornado6 is &lt;6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983122" version="1" comment="python313 is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983123" version="1" comment="python313-32bit is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983124" version="1" comment="python313-curses is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983125" version="1" comment="python313-dbm is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983126" version="1" comment="python313-idle is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983127" version="1" comment="python313-tk is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983128" version="1" comment="python313-x86-64-v3 is &lt;3.13.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983129" version="1" comment="transfig is &lt;3.2.9a-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983280" version="1" comment="bind is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983281" version="1" comment="bind-doc is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983282" version="1" comment="bind-modules-bdbhpt is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983283" version="1" comment="bind-modules-generic is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983284" version="1" comment="bind-modules-ldap is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983285" version="1" comment="bind-modules-mysql is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983286" version="1" comment="bind-modules-perl is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983287" version="1" comment="bind-modules-sqlite3 is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983288" version="1" comment="bind-utils is &lt;9.20.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983289" version="1" comment="dnsdist is &lt;1.9.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983290" version="1" comment="gh is &lt;2.73.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983291" version="1" comment="gh-bash-completion is &lt;2.73.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983292" version="1" comment="gh-fish-completion is &lt;2.73.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983293" version="1" comment="gh-zsh-completion is &lt;2.73.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983294" version="1" comment="govulncheck-vulndb is &lt;0.0.20250523T151856-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983295" version="1" comment="jetty-annotations is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983296" version="1" comment="jetty-ant is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983297" version="1" comment="jetty-cdi is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983298" version="1" comment="jetty-client is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983299" version="1" comment="jetty-continuation is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983300" version="1" comment="jetty-deploy is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983301" version="1" comment="jetty-fcgi is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983302" version="1" comment="jetty-http is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983303" version="1" comment="jetty-http-spi is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983304" version="1" comment="jetty-io is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983305" version="1" comment="jetty-jaas is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983306" version="1" comment="jetty-jmx is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983307" version="1" comment="jetty-jndi is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983308" version="1" comment="jetty-jsp is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983309" version="1" comment="jetty-minimal-javadoc is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983310" version="1" comment="jetty-openid is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983311" version="1" comment="jetty-plus is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983312" version="1" comment="jetty-project is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983313" version="1" comment="jetty-proxy is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983314" version="1" comment="jetty-quickstart is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983315" version="1" comment="jetty-rewrite is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983316" version="1" comment="jetty-security is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983317" version="1" comment="jetty-server is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983318" version="1" comment="jetty-servlet is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983319" version="1" comment="jetty-servlets is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983320" version="1" comment="jetty-start is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983321" version="1" comment="jetty-util is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983322" version="1" comment="jetty-util-ajax is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983323" version="1" comment="jetty-webapp is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983324" version="1" comment="jetty-xml is &lt;9.4.57-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983325" version="1" comment="jq is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983326" version="1" comment="libjq-devel is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983327" version="1" comment="libjq1 is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983328" version="1" comment="prometheus-blackbox_exporter is &lt;0.24.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983329" version="1" comment="python312 is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983330" version="1" comment="python312-32bit is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983331" version="1" comment="python312-curses is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983332" version="1" comment="python312-dbm is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983333" version="1" comment="python312-idle is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983334" version="1" comment="python312-tk is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983335" version="1" comment="python312-x86-64-v3 is &lt;3.12.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983336" version="1" comment="screen is &lt;4.9.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983337" version="1" comment="libnss_slurm2 is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983338" version="1" comment="libpmi0 is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983339" version="1" comment="libslurm42 is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983340" version="1" comment="perl-slurm is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983341" version="1" comment="slurm is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983342" version="1" comment="slurm-auth-none is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983343" version="1" comment="slurm-config is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983344" version="1" comment="slurm-config-man is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983345" version="1" comment="slurm-cray is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983346" version="1" comment="slurm-devel is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983347" version="1" comment="slurm-doc is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983348" version="1" comment="slurm-hdf5 is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983349" version="1" comment="slurm-lua is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983350" version="1" comment="slurm-munge is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983351" version="1" comment="slurm-node is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983352" version="1" comment="slurm-openlava is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983353" version="1" comment="slurm-pam_slurm is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983354" version="1" comment="slurm-plugins is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983355" version="1" comment="slurm-rest is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983356" version="1" comment="slurm-seff is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983357" version="1" comment="slurm-sjstat is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983358" version="1" comment="slurm-slurmdbd is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983359" version="1" comment="slurm-sql is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983360" version="1" comment="slurm-sview is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983361" version="1" comment="slurm-testsuite is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983362" version="1" comment="slurm-torque is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983363" version="1" comment="slurm-webdoc is &lt;24.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983364" version="1" comment="umoci is &lt;0.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983365" version="1" comment="libyelp0 is &lt;42.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983366" version="1" comment="yelp is &lt;42.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983367" version="1" comment="yelp-devel is &lt;42.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983368" version="1" comment="yelp-lang is &lt;42.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983369" version="1" comment="yelp-xsl is &lt;42.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983573" version="1" comment="containerd is &lt;1.7.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983574" version="1" comment="containerd-ctr is &lt;1.7.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983575" version="1" comment="containerd-devel is &lt;1.7.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983576" version="1" comment="firefox-esr is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983577" version="1" comment="firefox-esr-branding-upstream is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983578" version="1" comment="firefox-esr-translations-common is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983579" version="1" comment="firefox-esr-translations-other is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983580" version="1" comment="grafana is &lt;11.6.1+security01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983581" version="1" comment="libmozjs-128-0 is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983582" version="1" comment="mozjs128 is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983583" version="1" comment="mozjs128-devel is &lt;128.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983584" version="1" comment="s390-tools is &lt;2.37.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985228" version="1" comment="MozillaThunderbird is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985229" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985230" version="1" comment="MozillaThunderbird-translations-common is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985231" version="1" comment="MozillaThunderbird-translations-other is &lt;128.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985232" version="1" comment="apache-commons-beanutils is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985233" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985234" version="1" comment="curl is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985235" version="1" comment="curl-fish-completion is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985236" version="1" comment="curl-zsh-completion is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985237" version="1" comment="libcurl-devel is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985238" version="1" comment="libcurl-devel-32bit is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985239" version="1" comment="libcurl-devel-doc is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985240" version="1" comment="libcurl4 is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985241" version="1" comment="libcurl4-32bit is &lt;8.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985242" version="1" comment="ffmpeg-7 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985243" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985244" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985245" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985246" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985247" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985248" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985249" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985250" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985251" version="1" comment="libavcodec61 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985252" version="1" comment="libavcodec61-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985253" version="1" comment="libavdevice61 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985254" version="1" comment="libavdevice61-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985255" version="1" comment="libavfilter10 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985256" version="1" comment="libavfilter10-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985257" version="1" comment="libavformat61 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985258" version="1" comment="libavformat61-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985259" version="1" comment="libavutil59 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985260" version="1" comment="libavutil59-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985261" version="1" comment="libpostproc58 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985262" version="1" comment="libpostproc58-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985263" version="1" comment="libswresample5 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985264" version="1" comment="libswresample5-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985265" version="1" comment="libswscale8 is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985266" version="1" comment="libswscale8-32bit is &lt;7.1.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985267" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.28.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985268" version="1" comment="govulncheck-vulndb is &lt;0.0.20250527T204717-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985269" version="1" comment="icinga2 is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985270" version="1" comment="icinga2-bin is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985271" version="1" comment="icinga2-common is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985272" version="1" comment="icinga2-doc is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985273" version="1" comment="icinga2-ido-mysql is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985274" version="1" comment="icinga2-ido-pgsql is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985275" version="1" comment="nano-icinga2 is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985276" version="1" comment="vim-icinga2 is &lt;2.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985277" version="1" comment="kea is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985278" version="1" comment="kea-devel is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985279" version="1" comment="kea-doc is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985280" version="1" comment="kea-hooks is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985281" version="1" comment="libkea-asiodns49 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985282" version="1" comment="libkea-asiolink72 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985283" version="1" comment="libkea-cc68 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985284" version="1" comment="libkea-cfgclient66 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985285" version="1" comment="libkea-cryptolink50 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985286" version="1" comment="libkea-d2srv47 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985287" version="1" comment="libkea-database62 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985288" version="1" comment="libkea-dhcp++92 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985289" version="1" comment="libkea-dhcp_ddns57 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985290" version="1" comment="libkea-dhcpsrv111 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985291" version="1" comment="libkea-dns++57 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985292" version="1" comment="libkea-eval69 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985293" version="1" comment="libkea-exceptions33 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985294" version="1" comment="libkea-hooks100 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985295" version="1" comment="libkea-http72 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985296" version="1" comment="libkea-log61 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985297" version="1" comment="libkea-mysql71 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985298" version="1" comment="libkea-pgsql71 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985299" version="1" comment="libkea-process74 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985300" version="1" comment="libkea-stats41 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985301" version="1" comment="libkea-tcp19 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985302" version="1" comment="libkea-util-io0 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985303" version="1" comment="libkea-util86 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985304" version="1" comment="python3-kea is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985305" version="1" comment="nodejs-electron is &lt;35.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985306" version="1" comment="nodejs-electron-devel is &lt;35.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985307" version="1" comment="nodejs-electron-doc is &lt;35.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985308" version="1" comment="libopenssl-3-devel is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985309" version="1" comment="libopenssl-3-devel-32bit is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985310" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985311" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985312" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985313" version="1" comment="libopenssl3 is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985314" version="1" comment="libopenssl3-32bit is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985315" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985316" version="1" comment="openssl-3 is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985317" version="1" comment="openssl-3-doc is &lt;3.5.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985318" version="1" comment="pluto is &lt;5.21.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985319" version="1" comment="pluto-bash-completion is &lt;5.21.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985320" version="1" comment="pluto-fish-completion is &lt;5.21.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985321" version="1" comment="pluto-zsh-completion is &lt;5.21.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985500" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985501" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985502" version="1" comment="libsoup-devel is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985503" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985504" version="1" comment="libsoup-lang is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985505" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985506" version="1" comment="openbao is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985507" version="1" comment="openbao-agent is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985508" version="1" comment="openbao-cassandra-database-plugin is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985509" version="1" comment="openbao-influxdb-database-plugin is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985510" version="1" comment="openbao-mysql-database-plugin is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985511" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985512" version="1" comment="openbao-postgresql-database-plugin is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985513" version="1" comment="openbao-server is &lt;2.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985514" version="1" comment="perl-Net-Dropbox-API is &lt;1.900.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985515" version="1" comment="govulncheck-vulndb is &lt;0.0.20250529T205903-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985516" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985517" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985518" version="1" comment="libsoup2-devel is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985519" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985520" version="1" comment="libsoup2-lang is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985521" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985752" version="1" comment="python310 is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985753" version="1" comment="python310-32bit is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985754" version="1" comment="python310-curses is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985755" version="1" comment="python310-dbm is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985756" version="1" comment="python310-idle is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985757" version="1" comment="python310-tk is &lt;3.10.17-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985758" version="1" comment="python311 is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985759" version="1" comment="python311-32bit is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985760" version="1" comment="python311-curses is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985761" version="1" comment="python311-dbm is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985762" version="1" comment="python311-idle is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985763" version="1" comment="python311-tk is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985764" version="1" comment="python311-x86-64-v3 is &lt;3.11.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985765" version="1" comment="python39 is &lt;3.9.22-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985766" version="1" comment="python39-curses is &lt;3.9.22-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985767" version="1" comment="python39-dbm is &lt;3.9.22-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985768" version="1" comment="python39-idle is &lt;3.9.22-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985769" version="1" comment="python39-tk is &lt;3.9.22-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985770" version="1" comment="golang-github-teddysun-v2ray-plugin is &lt;5.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985771" version="1" comment="shadowsocks-v2ray-plugin is &lt;5.25.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985772" version="1" comment="sslh is &lt;2.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985773" version="1" comment="golang-github-v2fly-v2ray-core is &lt;5.33.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985774" version="1" comment="v2ray-core is &lt;5.33.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985854" version="1" comment="MozillaFirefox is &lt;139.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985855" version="1" comment="MozillaFirefox-branding-upstream is &lt;139.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985856" version="1" comment="MozillaFirefox-devel is &lt;139.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985857" version="1" comment="MozillaFirefox-translations-common is &lt;139.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985858" version="1" comment="MozillaFirefox-translations-other is &lt;139.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985859" version="1" comment="apache2-mod_security2 is &lt;2.9.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985860" version="1" comment="assimp-devel is &lt;6.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985861" version="1" comment="libassimp5 is &lt;6.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985862" version="1" comment="perl-Crypt-OpenSSL-RSA is &lt;0.350.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985922" version="1" comment="haproxy is &lt;3.2.0+git0.e134140d2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985923" version="1" comment="python311-nh3 is &lt;0.2.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985924" version="1" comment="python312-nh3 is &lt;0.2.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985925" version="1" comment="python313-nh3 is &lt;0.2.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985926" version="1" comment="python311-selenium is &lt;4.25.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985927" version="1" comment="python312-selenium is &lt;4.25.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985928" version="1" comment="python313-selenium is &lt;4.25.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998201" version="1" comment="MozillaFirefox is &lt;139.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998202" version="1" comment="MozillaFirefox-branding-upstream is &lt;139.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998203" version="1" comment="MozillaFirefox-devel is &lt;139.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998204" version="1" comment="MozillaFirefox-translations-common is &lt;139.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998205" version="1" comment="MozillaFirefox-translations-other is &lt;139.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998206" version="1" comment="MozillaThunderbird is &lt;128.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998207" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998208" version="1" comment="MozillaThunderbird-translations-common is &lt;128.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998209" version="1" comment="MozillaThunderbird-translations-other is &lt;128.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998210" version="1" comment="SDL is &lt;1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998211" version="1" comment="SDL2 is &lt;2.32.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998212" version="1" comment="alloy is &lt;1.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998213" version="1" comment="apache-commons-fileupload is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998214" version="1" comment="apache-commons-fileupload-javadoc is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998215" version="1" comment="assimp-devel is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998216" version="1" comment="libassimp6 is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998217" version="1" comment="chromedriver is &lt;138.0.7204.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998218" version="1" comment="chromium is &lt;138.0.7204.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998219" version="1" comment="clamav is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998220" version="1" comment="clamav-devel is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998221" version="1" comment="clamav-docs-html is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998222" version="1" comment="clamav-milter is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998223" version="1" comment="libclamav12 is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998224" version="1" comment="libclammspack0 is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998225" version="1" comment="libfreshclam3 is &lt;1.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998226" version="1" comment="clustershell is &lt;1.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998227" version="1" comment="python3-clustershell is &lt;1.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998228" version="1" comment="curl is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998229" version="1" comment="curl-fish-completion is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998230" version="1" comment="curl-zsh-completion is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998231" version="1" comment="libcurl-devel is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998232" version="1" comment="libcurl-devel-32bit is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998233" version="1" comment="libcurl-devel-doc is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998234" version="1" comment="libcurl4 is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998235" version="1" comment="libcurl4-32bit is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998236" version="1" comment="wcurl is &lt;8.14.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998237" version="1" comment="faad2 is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998238" version="1" comment="faad2-devel is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998239" version="1" comment="libfaad2 is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998240" version="1" comment="libfaad2-32bit is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998241" version="1" comment="libfaad_drm2 is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998242" version="1" comment="libfaad_drm2-32bit is &lt;2.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998243" version="1" comment="ffmpeg-4 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998244" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998245" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998246" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998247" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998248" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998249" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998250" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998251" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998252" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998253" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998254" version="1" comment="libavcodec58_134 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998255" version="1" comment="libavcodec58_134-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998256" version="1" comment="libavdevice58_13 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998257" version="1" comment="libavdevice58_13-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998258" version="1" comment="libavfilter7_110 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998259" version="1" comment="libavfilter7_110-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998260" version="1" comment="libavformat58_76 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998261" version="1" comment="libavformat58_76-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998262" version="1" comment="libavresample4_0 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998263" version="1" comment="libavresample4_0-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998264" version="1" comment="libavutil56_70 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998265" version="1" comment="libavutil56_70-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998266" version="1" comment="libpostproc55_9 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998267" version="1" comment="libpostproc55_9-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998268" version="1" comment="libswresample3_9 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998269" version="1" comment="libswresample3_9-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998270" version="1" comment="libswscale5_9 is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998271" version="1" comment="libswscale5_9-32bit is &lt;4.4.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998272" version="1" comment="firefox-esr is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998273" version="1" comment="firefox-esr-branding-upstream is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998274" version="1" comment="firefox-esr-translations-common is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998275" version="1" comment="firefox-esr-translations-other is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998276" version="1" comment="flake-pilot is &lt;3.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998277" version="1" comment="flake-pilot-firecracker is &lt;3.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998278" version="1" comment="flake-pilot-firecracker-dracut-netstart is &lt;3.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998279" version="1" comment="flake-pilot-firecracker-guestvm-tools is &lt;3.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998280" version="1" comment="flake-pilot-podman is &lt;3.1.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998281" version="1" comment="fractal is &lt;11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998282" version="1" comment="fractal-lang is &lt;11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998283" version="1" comment="gdm is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998284" version="1" comment="gdm-branding-upstream is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998285" version="1" comment="gdm-devel is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998286" version="1" comment="gdm-lang is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998287" version="1" comment="gdm-schema is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998288" version="1" comment="gdm-systemd is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998289" version="1" comment="gdm-xdm-integration is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998290" version="1" comment="gdmflexiserver is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998291" version="1" comment="libgdm1 is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998292" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;48.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998293" version="1" comment="git-lfs is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998294" version="1" comment="gio-branding-upstream is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998295" version="1" comment="glib2-devel is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998296" version="1" comment="glib2-devel-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998297" version="1" comment="glib2-devel-static is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998298" version="1" comment="glib2-lang is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998299" version="1" comment="glib2-tests-devel is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998300" version="1" comment="glib2-tools is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998301" version="1" comment="glib2-tools-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998302" version="1" comment="libgio-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998303" version="1" comment="libgio-2_0-0-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998304" version="1" comment="libgirepository-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998305" version="1" comment="libglib-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998306" version="1" comment="libglib-2_0-0-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998307" version="1" comment="libgmodule-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998308" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998309" version="1" comment="libgobject-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998310" version="1" comment="libgobject-2_0-0-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998311" version="1" comment="libgthread-2_0-0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998312" version="1" comment="libgthread-2_0-0-32bit is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998313" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998314" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998315" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998316" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998317" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998318" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998319" version="1" comment="glibc is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998320" version="1" comment="glibc-devel is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998321" version="1" comment="glibc-devel-static is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998322" version="1" comment="glibc-extra is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998323" version="1" comment="glibc-gconv-modules-extra is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998324" version="1" comment="glibc-html is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998325" version="1" comment="glibc-i18ndata is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998326" version="1" comment="glibc-info is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998327" version="1" comment="glibc-lang is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998328" version="1" comment="glibc-locale is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998329" version="1" comment="glibc-locale-base is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998330" version="1" comment="glibc-profile is &lt;2.41-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998331" version="1" comment="go1.23 is &lt;1.23.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998332" version="1" comment="go1.23-doc is &lt;1.23.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998333" version="1" comment="go1.23-libstd is &lt;1.23.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998334" version="1" comment="go1.23-race is &lt;1.23.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998335" version="1" comment="go1.24 is &lt;1.24.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998336" version="1" comment="go1.24-doc is &lt;1.24.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998337" version="1" comment="go1.24-libstd is &lt;1.24.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998338" version="1" comment="go1.24-race is &lt;1.24.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998339" version="1" comment="govulncheck-vulndb is &lt;0.0.20250612T141001-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998340" version="1" comment="grafana is &lt;11.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998341" version="1" comment="grype is &lt;0.94.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998342" version="1" comment="grype-bash-completion is &lt;0.94.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998343" version="1" comment="grype-fish-completion is &lt;0.94.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998344" version="1" comment="grype-zsh-completion is &lt;0.94.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998345" version="1" comment="helm is &lt;3.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998346" version="1" comment="helm-bash-completion is &lt;3.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998347" version="1" comment="helm-fish-completion is &lt;3.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998348" version="1" comment="helm-zsh-completion is &lt;3.18.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998349" version="1" comment="himmelblau is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998350" version="1" comment="himmelblau-qr-greeter is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998351" version="1" comment="himmelblau-sshd-config is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998352" version="1" comment="himmelblau-sso is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998353" version="1" comment="libnss_himmelblau2 is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998354" version="1" comment="pam-himmelblau is &lt;0.9.17+git.0.4a97692-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998355" version="1" comment="icu is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998356" version="1" comment="libicu-devel is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998357" version="1" comment="libicu-devel-32bit is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998358" version="1" comment="libicu-doc is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998359" version="1" comment="libicu77 is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998360" version="1" comment="libicu77-32bit is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998361" version="1" comment="libicu77-bedata is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998362" version="1" comment="libicu77-ledata is &lt;77.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998363" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998364" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998365" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998366" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998367" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998368" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998369" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.452-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998370" version="1" comment="jgit is &lt;5.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998371" version="1" comment="jgit-javadoc is &lt;5.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998372" version="1" comment="jq is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998373" version="1" comment="libjq-devel is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998374" version="1" comment="libjq1 is &lt;1.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998375" version="1" comment="kubernetes1.30-apiserver is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998376" version="1" comment="kubernetes1.30-client is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998377" version="1" comment="kubernetes1.30-client-bash-completion is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998378" version="1" comment="kubernetes1.30-client-common is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998379" version="1" comment="kubernetes1.30-client-fish-completion is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998380" version="1" comment="kubernetes1.30-controller-manager is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998381" version="1" comment="kubernetes1.30-kubeadm is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998382" version="1" comment="kubernetes1.30-kubelet is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998383" version="1" comment="kubernetes1.30-kubelet-common is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998384" version="1" comment="kubernetes1.30-proxy is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998385" version="1" comment="kubernetes1.30-scheduler is &lt;1.30.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998386" version="1" comment="kubernetes1.31-apiserver is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998387" version="1" comment="kubernetes1.31-client is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998388" version="1" comment="kubernetes1.31-client-bash-completion is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998389" version="1" comment="kubernetes1.31-client-common is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998390" version="1" comment="kubernetes1.31-client-fish-completion is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998391" version="1" comment="kubernetes1.31-controller-manager is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998392" version="1" comment="kubernetes1.31-kubeadm is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998393" version="1" comment="kubernetes1.31-kubelet is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998394" version="1" comment="kubernetes1.31-kubelet-common is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998395" version="1" comment="kubernetes1.31-proxy is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998396" version="1" comment="kubernetes1.31-scheduler is &lt;1.31.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998397" version="1" comment="kubernetes1.32-apiserver is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998398" version="1" comment="kubernetes1.32-client is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998399" version="1" comment="kubernetes1.32-client-bash-completion is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998400" version="1" comment="kubernetes1.32-client-common is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998401" version="1" comment="kubernetes1.32-client-fish-completion is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998402" version="1" comment="kubernetes1.32-controller-manager is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998403" version="1" comment="kubernetes1.32-kubeadm is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998404" version="1" comment="kubernetes1.32-kubelet is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998405" version="1" comment="kubernetes1.32-kubelet-common is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998406" version="1" comment="kubernetes1.32-proxy is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998407" version="1" comment="kubernetes1.32-scheduler is &lt;1.32.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998408" version="1" comment="libbd_btrfs-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998409" version="1" comment="libbd_btrfs3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998410" version="1" comment="libbd_crypto-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998411" version="1" comment="libbd_crypto3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998412" version="1" comment="libbd_dm-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998413" version="1" comment="libbd_dm3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998414" version="1" comment="libbd_fs-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998415" version="1" comment="libbd_fs3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998416" version="1" comment="libbd_loop-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998417" version="1" comment="libbd_loop3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998418" version="1" comment="libbd_lvm-dbus-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998419" version="1" comment="libbd_lvm-dbus3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998420" version="1" comment="libbd_lvm-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998421" version="1" comment="libbd_lvm3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998422" version="1" comment="libbd_mdraid-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998423" version="1" comment="libbd_mdraid3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998424" version="1" comment="libbd_mpath-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998425" version="1" comment="libbd_mpath3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998426" version="1" comment="libbd_nvme-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998427" version="1" comment="libbd_nvme3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998428" version="1" comment="libbd_part-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998429" version="1" comment="libbd_part3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998430" version="1" comment="libbd_swap-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998431" version="1" comment="libbd_swap3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998432" version="1" comment="libbd_utils-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998433" version="1" comment="libbd_utils3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998434" version="1" comment="libblockdev is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998435" version="1" comment="libblockdev-devel is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998436" version="1" comment="libblockdev3 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998437" version="1" comment="python3-libblockdev is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998438" version="1" comment="typelib-1_0-BlockDev-3_0 is &lt;3.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998439" version="1" comment="libetebase-devel is &lt;0.5.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998440" version="1" comment="libetebase0 is &lt;0.5.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998441" version="1" comment="libgcrypt-devel is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998442" version="1" comment="libgcrypt-devel-32bit is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998443" version="1" comment="libgcrypt-devel-x86-64-v3 is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998444" version="1" comment="libgcrypt20 is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998445" version="1" comment="libgcrypt20-32bit is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998446" version="1" comment="libgcrypt20-x86-64-v3 is &lt;1.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998447" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998448" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998449" version="1" comment="libQt5Concurrent-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998450" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998451" version="1" comment="libQt5Concurrent5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998452" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998453" version="1" comment="libQt5Core-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998454" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998455" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998456" version="1" comment="libQt5Core5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998457" version="1" comment="libQt5Core5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998458" version="1" comment="libQt5DBus-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998459" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998460" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998461" version="1" comment="libQt5DBus5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998462" version="1" comment="libQt5DBus5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998463" version="1" comment="libQt5Gui-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998464" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998465" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998466" version="1" comment="libQt5Gui5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998467" version="1" comment="libQt5Gui5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998468" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998469" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998470" version="1" comment="libQt5Network-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998471" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998472" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998473" version="1" comment="libQt5Network5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998474" version="1" comment="libQt5Network5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998475" version="1" comment="libQt5OpenGL-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998476" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998477" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998478" version="1" comment="libQt5OpenGL5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998479" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998480" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998481" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998482" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998483" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998484" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998485" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998486" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998487" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998488" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998489" version="1" comment="libQt5PrintSupport5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998490" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998491" version="1" comment="libQt5Sql-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998492" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998493" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998494" version="1" comment="libQt5Sql5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998495" version="1" comment="libQt5Sql5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998496" version="1" comment="libQt5Sql5-mysql is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998497" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998498" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998499" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998500" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998501" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998502" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998503" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998504" version="1" comment="libQt5Test-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998505" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998506" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998507" version="1" comment="libQt5Test5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998508" version="1" comment="libQt5Test5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998509" version="1" comment="libQt5Widgets-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998510" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998511" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998512" version="1" comment="libQt5Widgets5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998513" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998514" version="1" comment="libQt5Xml-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998515" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998516" version="1" comment="libQt5Xml5 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998517" version="1" comment="libQt5Xml5-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998518" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998519" version="1" comment="libqt5-qtbase-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998520" version="1" comment="libqt5-qtbase-examples is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998521" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998522" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998523" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998524" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.17+kde122-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998525" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998526" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998527" version="1" comment="libsoup-devel is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998528" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998529" version="1" comment="libsoup-lang is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998530" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998531" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998532" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998533" version="1" comment="libsoup2-devel is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998534" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998535" version="1" comment="libsoup2-lang is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998536" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998537" version="1" comment="libssh-config is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998538" version="1" comment="libssh-devel is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998539" version="1" comment="libssh4 is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998540" version="1" comment="libssh4-32bit is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998541" version="1" comment="libtpms-devel is &lt;0.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998542" version="1" comment="libtpms0 is &lt;0.10.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998543" version="1" comment="ggml-devel is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998544" version="1" comment="libggml is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998545" version="1" comment="libggml-base is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998546" version="1" comment="libggml-cpu is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998547" version="1" comment="libggml-opencl is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998548" version="1" comment="libggml-vulkan is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998549" version="1" comment="libllama is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998550" version="1" comment="libmtmd is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998551" version="1" comment="llamacpp is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998552" version="1" comment="llamacpp-devel is &lt;5699-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998553" version="1" comment="mirrorsorcerer is &lt;0.1.3~1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998554" version="1" comment="moarvm is &lt;2025.05-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998555" version="1" comment="moarvm-devel is &lt;2025.05-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998556" version="1" comment="nix is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998557" version="1" comment="nix-bash-completion is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998558" version="1" comment="nix-devel is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998559" version="1" comment="nix-doc is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998560" version="1" comment="nix-fish-completion is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998561" version="1" comment="nix-zsh-completion is &lt;2.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998562" version="1" comment="nodejs-electron is &lt;35.6.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998563" version="1" comment="nodejs-electron-devel is &lt;35.6.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998564" version="1" comment="nodejs-electron-doc is &lt;35.6.0-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998565" version="1" comment="corepack22 is &lt;22.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998566" version="1" comment="nodejs22 is &lt;22.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998567" version="1" comment="nodejs22-devel is &lt;22.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998568" version="1" comment="nodejs22-docs is &lt;22.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998569" version="1" comment="npm22 is &lt;22.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998570" version="1" comment="nova is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998571" version="1" comment="nova-bash-completion is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998572" version="1" comment="nova-fish-completion is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998573" version="1" comment="nova-zsh-completion is &lt;3.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998574" version="1" comment="oci-cli is &lt;3.61.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998575" version="1" comment="opa is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998576" version="1" comment="opa-bash-completion is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998577" version="1" comment="opa-fish-completion is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998578" version="1" comment="opa-zsh-completion is &lt;1.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998579" version="1" comment="openbao is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998580" version="1" comment="openbao-agent is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998581" version="1" comment="openbao-cassandra-database-plugin is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998582" version="1" comment="openbao-influxdb-database-plugin is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998583" version="1" comment="openbao-mysql-database-plugin is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998584" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998585" version="1" comment="openbao-postgresql-database-plugin is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998586" version="1" comment="openbao-server is &lt;2.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998587" version="1" comment="ovmf is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998588" version="1" comment="ovmf-tools is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998589" version="1" comment="qemu-ovmf-ia32 is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998590" version="1" comment="qemu-ovmf-x86_64 is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998591" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998592" version="1" comment="qemu-uefi-aarch32 is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998593" version="1" comment="qemu-uefi-aarch64 is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998594" version="1" comment="qemu-uefi-riscv64 is &lt;202505-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998595" version="1" comment="pam is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998596" version="1" comment="pam-32bit is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998597" version="1" comment="pam-devel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998598" version="1" comment="pam-devel-32bit is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998599" version="1" comment="pam_pkcs11 is &lt;0.6.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998600" version="1" comment="pam_pkcs11-devel-doc is &lt;0.6.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998601" version="1" comment="perl is &lt;5.40.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998602" version="1" comment="perl-32bit is &lt;5.40.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998603" version="1" comment="perl-base is &lt;5.40.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998604" version="1" comment="perl-base-32bit is &lt;5.40.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998605" version="1" comment="perl-doc is &lt;5.40.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998606" version="1" comment="perl-CryptX is &lt;0.87.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998607" version="1" comment="perl-File-Find-Rule is &lt;0.350.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998608" version="1" comment="perl-YAML-LibYAML is &lt;0.904.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998609" version="1" comment="podman is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998610" version="1" comment="podman-docker is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998611" version="1" comment="podman-remote is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998612" version="1" comment="podmansh is &lt;5.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998613" version="1" comment="polaris is &lt;9.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998614" version="1" comment="polaris-bash-completion is &lt;9.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998615" version="1" comment="polaris-fish-completion is &lt;9.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998616" version="1" comment="polaris-zsh-completion is &lt;9.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998617" version="1" comment="postgresql-jdbc is &lt;42.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998618" version="1" comment="postgresql-jdbc-javadoc is &lt;42.7.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998619" version="1" comment="libprotobuf-lite31_1_0 is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998620" version="1" comment="libprotobuf-lite31_1_0-32bit is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998621" version="1" comment="libprotobuf31_1_0 is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998622" version="1" comment="libprotobuf31_1_0-32bit is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998623" version="1" comment="libprotoc31_1_0 is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998624" version="1" comment="libprotoc31_1_0-32bit is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998625" version="1" comment="libutf8_range-31_1_0 is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998626" version="1" comment="libutf8_range-31_1_0-32bit is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998627" version="1" comment="protobuf-devel is &lt;31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998628" version="1" comment="pure-ftpd is &lt;1.0.51-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998629" version="1" comment="python311-Django is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998630" version="1" comment="python312-Django is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998631" version="1" comment="python313-Django is &lt;5.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998632" version="1" comment="python311-Django4 is &lt;4.2.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998633" version="1" comment="python312-Django4 is &lt;4.2.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998634" version="1" comment="python313-Django4 is &lt;4.2.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998635" version="1" comment="jupyter-bqplot-jupyterlab is &lt;0.5.44-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998636" version="1" comment="jupyter-bqplot-notebook is &lt;0.5.44-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998637" version="1" comment="python311-bqplot is &lt;0.12.45-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998638" version="1" comment="python-furo-doc is &lt;2024.8.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998639" version="1" comment="python311-furo is &lt;2024.8.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998640" version="1" comment="python312-furo is &lt;2024.8.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998641" version="1" comment="python313-furo is &lt;2024.8.6-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998642" version="1" comment="jupyter-matplotlib is &lt;0.11.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998643" version="1" comment="jupyter-matplotlib-jupyterlab is &lt;0.11.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998644" version="1" comment="python311-ipympl is &lt;0.9.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998645" version="1" comment="python312-ipympl is &lt;0.9.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998646" version="1" comment="python313-ipympl is &lt;0.9.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998647" version="1" comment="python311-jupyter-core is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998648" version="1" comment="python312-jupyter-core is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998649" version="1" comment="python313-jupyter-core is &lt;5.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998650" version="1" comment="python311-jupyter-ydoc is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998651" version="1" comment="python312-jupyter-ydoc is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998652" version="1" comment="python313-jupyter-ydoc is &lt;3.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998653" version="1" comment="jupyter-jupyterlab-templates is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998654" version="1" comment="python311-jupyterlab-templates is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998655" version="1" comment="python312-jupyterlab-templates is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998656" version="1" comment="python313-jupyterlab-templates is &lt;0.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998657" version="1" comment="jupyter-nbclassic is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998658" version="1" comment="python311-nbclassic is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998659" version="1" comment="python312-nbclassic is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998660" version="1" comment="python313-nbclassic is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998661" version="1" comment="jupyter-nbdime is &lt;7.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998662" version="1" comment="jupyter-nbdime-jupyterlab is &lt;3.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998663" version="1" comment="python311-nbdime is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998664" version="1" comment="python311-nbdime-git is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998665" version="1" comment="python311-nbdime-hg is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998666" version="1" comment="python312-nbdime is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998667" version="1" comment="python312-nbdime-git is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998668" version="1" comment="python312-nbdime-hg is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998669" version="1" comment="python313-nbdime is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998670" version="1" comment="python313-nbdime-git is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998671" version="1" comment="python313-nbdime-hg is &lt;4.0.2-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998672" version="1" comment="jupyter-panel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998673" version="1" comment="python311-panel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998674" version="1" comment="python312-panel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998675" version="1" comment="python313-panel is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998676" version="1" comment="jupyter-plotly is &lt;6.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998677" version="1" comment="python311-plotly is &lt;6.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998678" version="1" comment="python312-plotly is &lt;6.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998679" version="1" comment="python313-plotly is &lt;6.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998680" version="1" comment="python311-pydata-sphinx-theme is &lt;0.16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998681" version="1" comment="python312-pydata-sphinx-theme is &lt;0.16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998682" version="1" comment="python313-pydata-sphinx-theme is &lt;0.16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998683" version="1" comment="python311-pytest-html is &lt;4.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998684" version="1" comment="python312-pytest-html is &lt;4.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998685" version="1" comment="python313-pytest-html is &lt;4.1.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998686" version="1" comment="python311-requests is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998687" version="1" comment="python312-requests is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998688" version="1" comment="python313-requests is &lt;2.32.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998689" version="1" comment="python311-rfc3161-client is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998690" version="1" comment="python312-rfc3161-client is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998691" version="1" comment="python313-rfc3161-client is &lt;1.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998692" version="1" comment="python311-urllib3 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998693" version="1" comment="python312-urllib3 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998694" version="1" comment="python313-urllib3 is &lt;2.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998695" version="1" comment="python311-urllib3_1 is &lt;1.26.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998696" version="1" comment="python312-urllib3_1 is &lt;1.26.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998697" version="1" comment="python313-urllib3_1 is &lt;1.26.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998698" version="1" comment="python310 is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998699" version="1" comment="python310-32bit is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998700" version="1" comment="python310-curses is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998701" version="1" comment="python310-dbm is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998702" version="1" comment="python310-idle is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998703" version="1" comment="python310-tk is &lt;3.10.18-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998704" version="1" comment="python311 is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998705" version="1" comment="python311-32bit is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998706" version="1" comment="python311-curses is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998707" version="1" comment="python311-dbm is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998708" version="1" comment="python311-idle is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998709" version="1" comment="python311-tk is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998710" version="1" comment="python311-x86-64-v3 is &lt;3.11.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998711" version="1" comment="python312 is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998712" version="1" comment="python312-32bit is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998713" version="1" comment="python312-curses is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998714" version="1" comment="python312-dbm is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998715" version="1" comment="python312-idle is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998716" version="1" comment="python312-tk is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998717" version="1" comment="python312-x86-64-v3 is &lt;3.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998718" version="1" comment="python313 is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998719" version="1" comment="python313-32bit is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998720" version="1" comment="python313-curses is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998721" version="1" comment="python313-dbm is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998722" version="1" comment="python313-idle is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998723" version="1" comment="python313-tk is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998724" version="1" comment="python313-x86-64-v3 is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998725" version="1" comment="python314 is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998726" version="1" comment="python314-curses is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998727" version="1" comment="python314-dbm is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998728" version="1" comment="python314-idle is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998729" version="1" comment="python314-tk is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998730" version="1" comment="python314-x86-64-v3 is &lt;3.14.0~b3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998731" version="1" comment="python39 is &lt;3.9.23-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998732" version="1" comment="python39-curses is &lt;3.9.23-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998733" version="1" comment="python39-dbm is &lt;3.9.23-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998734" version="1" comment="python39-idle is &lt;3.9.23-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998735" version="1" comment="python39-tk is &lt;3.9.23-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998736" version="1" comment="erlang-rabbitmq-client is &lt;3.13.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998737" version="1" comment="rabbitmq-server is &lt;3.13.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998738" version="1" comment="rabbitmq-server-bash-completion is &lt;3.13.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998739" version="1" comment="rabbitmq-server-plugins is &lt;3.13.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998740" version="1" comment="rabbitmq-server-zsh-completion is &lt;3.13.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998741" version="1" comment="radare2 is &lt;5.9.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998742" version="1" comment="radare2-devel is &lt;5.9.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998743" version="1" comment="radare2-zsh-completion is &lt;5.9.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998744" version="1" comment="redis is &lt;8.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998745" version="1" comment="keylime-ima-policy is &lt;0.2.7+70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998746" version="1" comment="rust-keylime is &lt;0.2.7+70-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998747" version="1" comment="python311-salt is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998748" version="1" comment="python312-salt is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998749" version="1" comment="python313-salt is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998750" version="1" comment="salt is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998751" version="1" comment="salt-api is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998752" version="1" comment="salt-bash-completion is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998753" version="1" comment="salt-cloud is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998754" version="1" comment="salt-doc is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998755" version="1" comment="salt-fish-completion is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998756" version="1" comment="salt-master is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998757" version="1" comment="salt-minion is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998758" version="1" comment="salt-proxy is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998759" version="1" comment="salt-ssh is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998760" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998761" version="1" comment="salt-syndic is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998762" version="1" comment="salt-transactional-update is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998763" version="1" comment="salt-zsh-completion is &lt;3006.0-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998764" version="1" comment="ctdb is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998765" version="1" comment="ctdb-pcp-pmda is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998766" version="1" comment="ldb-tools is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998767" version="1" comment="libldb-devel is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998768" version="1" comment="libldb2 is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998769" version="1" comment="libldb2-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998770" version="1" comment="python3-ldb is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998771" version="1" comment="python3-ldb-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998772" version="1" comment="samba is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998773" version="1" comment="samba-ad-dc is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998774" version="1" comment="samba-ad-dc-libs is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998775" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998776" version="1" comment="samba-ceph is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998777" version="1" comment="samba-client is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998778" version="1" comment="samba-client-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998779" version="1" comment="samba-client-libs is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998780" version="1" comment="samba-client-libs-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998781" version="1" comment="samba-dcerpc is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998782" version="1" comment="samba-devel is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998783" version="1" comment="samba-devel-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998784" version="1" comment="samba-doc is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998785" version="1" comment="samba-dsdb-modules is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998786" version="1" comment="samba-gpupdate is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998787" version="1" comment="samba-ldb-ldap is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998788" version="1" comment="samba-libs is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998789" version="1" comment="samba-libs-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998790" version="1" comment="samba-libs-python3 is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998791" version="1" comment="samba-libs-python3-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998792" version="1" comment="samba-python3 is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998793" version="1" comment="samba-test is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998794" version="1" comment="samba-tool is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998795" version="1" comment="samba-winbind is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998796" version="1" comment="samba-winbind-libs is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998797" version="1" comment="samba-winbind-libs-32bit is &lt;4.22.2+git.396.c752843dcf4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998798" version="1" comment="libspdlog1_15 is &lt;1.15.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998799" version="1" comment="libspdlog1_15-32bit is &lt;1.15.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998800" version="1" comment="spdlog-devel is &lt;1.15.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998801" version="1" comment="sudo is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998802" version="1" comment="sudo-devel is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998803" version="1" comment="sudo-plugin-python is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998804" version="1" comment="sudo-policy-sudo-auth-self is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998805" version="1" comment="sudo-policy-wheel-auth-self is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998806" version="1" comment="sudo-test is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998807" version="1" comment="system-group-sudo is &lt;1.9.17p1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998808" version="1" comment="libsystemd0 is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998809" version="1" comment="libsystemd0-32bit is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998810" version="1" comment="libudev1 is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998811" version="1" comment="libudev1-32bit is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998812" version="1" comment="systemd is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998813" version="1" comment="systemd-32bit is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998814" version="1" comment="systemd-boot is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998815" version="1" comment="systemd-container is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998816" version="1" comment="systemd-devel is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998817" version="1" comment="systemd-devel-32bit is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998818" version="1" comment="systemd-doc is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998819" version="1" comment="systemd-experimental is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998820" version="1" comment="systemd-homed is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998821" version="1" comment="systemd-journal-remote is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998822" version="1" comment="systemd-lang is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998823" version="1" comment="systemd-networkd is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998824" version="1" comment="systemd-portable is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998825" version="1" comment="systemd-resolved is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998826" version="1" comment="systemd-sysvcompat is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998827" version="1" comment="systemd-testsuite is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998828" version="1" comment="udev is &lt;257.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998829" version="1" comment="teleport is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998830" version="1" comment="teleport-bash-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998831" version="1" comment="teleport-fdpass-teleport is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998832" version="1" comment="teleport-tbot is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998833" version="1" comment="teleport-tbot-bash-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998834" version="1" comment="teleport-tbot-zsh-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998835" version="1" comment="teleport-tctl is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998836" version="1" comment="teleport-tctl-bash-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998837" version="1" comment="teleport-tctl-zsh-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998838" version="1" comment="teleport-tsh is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998839" version="1" comment="teleport-tsh-bash-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998840" version="1" comment="teleport-tsh-zsh-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998841" version="1" comment="teleport-zsh-completion is &lt;17.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998842" version="1" comment="tomcat is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998843" version="1" comment="tomcat-admin-webapps is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998844" version="1" comment="tomcat-docs-webapp is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998845" version="1" comment="tomcat-el-3_0-api is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998846" version="1" comment="tomcat-embed is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998847" version="1" comment="tomcat-javadoc is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998848" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998849" version="1" comment="tomcat-jsvc is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998850" version="1" comment="tomcat-lib is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998851" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998852" version="1" comment="tomcat-webapps is &lt;9.0.106-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998853" version="1" comment="tomcat10 is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998854" version="1" comment="tomcat10-admin-webapps is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998855" version="1" comment="tomcat10-doc is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998856" version="1" comment="tomcat10-docs-webapp is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998857" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998858" version="1" comment="tomcat10-embed is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998859" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998860" version="1" comment="tomcat10-jsvc is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998861" version="1" comment="tomcat10-lib is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998862" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998863" version="1" comment="tomcat10-webapps is &lt;10.1.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998864" version="1" comment="tomcat11 is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998865" version="1" comment="tomcat11-admin-webapps is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998866" version="1" comment="tomcat11-doc is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998867" version="1" comment="tomcat11-docs-webapp is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998868" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998869" version="1" comment="tomcat11-embed is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998870" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998871" version="1" comment="tomcat11-jsvc is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998872" version="1" comment="tomcat11-lib is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998873" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998874" version="1" comment="tomcat11-webapps is &lt;11.0.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998875" version="1" comment="traefik is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998876" version="1" comment="traefik2 is &lt;2.11.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998877" version="1" comment="valkey is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998878" version="1" comment="valkey-compat-redis is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998879" version="1" comment="valkey-devel is &lt;8.1.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998880" version="1" comment="velociraptor is &lt;0.7.0.4.git163.87ee3570-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998881" version="1" comment="libwireshark18 is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998882" version="1" comment="libwiretap15 is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998883" version="1" comment="libwsutil16 is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998884" version="1" comment="wireshark is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998885" version="1" comment="wireshark-devel is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998886" version="1" comment="wireshark-ui-qt is &lt;4.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998887" version="1" comment="libwx_gtk2u_adv-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998888" version="1" comment="libwx_gtk2u_aui-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998889" version="1" comment="libwx_gtk2u_core-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998890" version="1" comment="libwx_gtk2u_gl-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998891" version="1" comment="libwx_gtk2u_html-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998892" version="1" comment="libwx_gtk2u_media-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998893" version="1" comment="libwx_gtk2u_propgrid-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998894" version="1" comment="libwx_gtk2u_qa-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998895" version="1" comment="libwx_gtk2u_ribbon-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998896" version="1" comment="libwx_gtk2u_richtext-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998897" version="1" comment="libwx_gtk2u_stc-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998898" version="1" comment="libwx_gtk2u_xrc-suse16_0_0 is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998899" version="1" comment="wxWidgets-3_2-devel is &lt;3.2.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998900" version="1" comment="xorg-x11-server is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998901" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998902" version="1" comment="xorg-x11-server-extra is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998903" version="1" comment="xorg-x11-server-sdk is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998904" version="1" comment="xorg-x11-server-source is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998905" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.15-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998906" version="1" comment="xwayland is &lt;24.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998907" version="1" comment="xwayland-devel is &lt;24.1.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999003" version="1" comment="MozillaThunderbird is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999004" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999005" version="1" comment="MozillaThunderbird-translations-common is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999006" version="1" comment="MozillaThunderbird-translations-other is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999007" version="1" comment="apache2-mod_security2 is &lt;2.9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999008" version="1" comment="dpkg is &lt;1.22.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999009" version="1" comment="dpkg-devel is &lt;1.22.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999010" version="1" comment="dpkg-lang is &lt;1.22.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999011" version="1" comment="libmozjs-128-0 is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999012" version="1" comment="mozjs128 is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999013" version="1" comment="mozjs128-devel is &lt;128.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999014" version="1" comment="python311-Pillow is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999015" version="1" comment="python311-Pillow-tk is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999016" version="1" comment="python312-Pillow is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999017" version="1" comment="python312-Pillow-tk is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999018" version="1" comment="python313-Pillow is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999019" version="1" comment="python313-Pillow-tk is &lt;11.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999175" version="1" comment="incus is &lt;6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999176" version="1" comment="incus-bash-completion is &lt;6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999177" version="1" comment="incus-fish-completion is &lt;6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999178" version="1" comment="incus-tools is &lt;6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999179" version="1" comment="incus-zsh-completion is &lt;6.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999180" version="1" comment="redis is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999304" version="1" comment="djvulibre is &lt;3.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999305" version="1" comment="djvulibre-doc is &lt;3.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999306" version="1" comment="libdjvulibre-devel is &lt;3.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999307" version="1" comment="libdjvulibre21 is &lt;3.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999308" version="1" comment="avif-tools is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999309" version="1" comment="gdk-pixbuf-loader-libavif is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999310" version="1" comment="libavif-devel is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999311" version="1" comment="libavif16 is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999312" version="1" comment="libavif16-32bit is &lt;1.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999313" version="1" comment="libxml2-2 is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999314" version="1" comment="libxml2-2-32bit is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999315" version="1" comment="libxml2-devel is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999316" version="1" comment="libxml2-devel-32bit is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999317" version="1" comment="libxml2-doc is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999318" version="1" comment="libxml2-tools is &lt;2.13.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999319" version="1" comment="libPocoActiveRecord112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999320" version="1" comment="libPocoCppParser112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999321" version="1" comment="libPocoCrypto112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999322" version="1" comment="libPocoData112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999323" version="1" comment="libPocoDataMySQL112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999324" version="1" comment="libPocoDataODBC112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999325" version="1" comment="libPocoDataPostgreSQL112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999326" version="1" comment="libPocoDataSQLite112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999327" version="1" comment="libPocoEncodings112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999328" version="1" comment="libPocoFoundation112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999329" version="1" comment="libPocoJSON112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999330" version="1" comment="libPocoJWT112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999331" version="1" comment="libPocoMongoDB112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999332" version="1" comment="libPocoNet112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999333" version="1" comment="libPocoNetSSL112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999334" version="1" comment="libPocoPDF112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999335" version="1" comment="libPocoPrometheus112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999336" version="1" comment="libPocoRedis112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999337" version="1" comment="libPocoUtil112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999338" version="1" comment="libPocoXML112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999339" version="1" comment="libPocoZip112 is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999340" version="1" comment="poco-cpspc is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999341" version="1" comment="poco-devel is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999342" version="1" comment="libpoppler-cpp2 is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999343" version="1" comment="libpoppler-cpp2-32bit is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999344" version="1" comment="libpoppler-devel is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999345" version="1" comment="libpoppler-glib-devel is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999346" version="1" comment="libpoppler-glib8 is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999347" version="1" comment="libpoppler-glib8-32bit is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999348" version="1" comment="libpoppler150 is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999349" version="1" comment="libpoppler150-32bit is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999350" version="1" comment="poppler-tools is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999351" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.06.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999352" version="1" comment="python311-pycares is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999353" version="1" comment="python312-pycares is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999354" version="1" comment="python313-pycares is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999508" version="1" comment="MozillaFirefox is &lt;140.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999509" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999510" version="1" comment="MozillaFirefox-devel is &lt;140.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999511" version="1" comment="MozillaFirefox-translations-common is &lt;140.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999512" version="1" comment="MozillaFirefox-translations-other is &lt;140.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999513" version="1" comment="chmlib-devel is &lt;0.40-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999514" version="1" comment="chmlib-examples is &lt;0.40-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999515" version="1" comment="libchm0 is &lt;0.40-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999516" version="1" comment="coreutils is &lt;9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999517" version="1" comment="coreutils-doc is &lt;9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999518" version="1" comment="coreutils-lang is &lt;9.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999519" version="1" comment="go1.23 is &lt;1.23.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999520" version="1" comment="go1.23-doc is &lt;1.23.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999521" version="1" comment="go1.23-libstd is &lt;1.23.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999522" version="1" comment="go1.23-race is &lt;1.23.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999523" version="1" comment="go1.24 is &lt;1.24.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999524" version="1" comment="go1.24-doc is &lt;1.24.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999525" version="1" comment="go1.24-libstd is &lt;1.24.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999526" version="1" comment="go1.24-race is &lt;1.24.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999527" version="1" comment="go1.25 is &lt;1.25rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999528" version="1" comment="go1.25-doc is &lt;1.25rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999529" version="1" comment="go1.25-libstd is &lt;1.25rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999530" version="1" comment="go1.25-race is &lt;1.25rc2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999531" version="1" comment="helm is &lt;3.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999532" version="1" comment="helm-bash-completion is &lt;3.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999533" version="1" comment="helm-fish-completion is &lt;3.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999534" version="1" comment="helm-zsh-completion is &lt;3.18.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999535" version="1" comment="avif-tools is &lt;1.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999536" version="1" comment="gdk-pixbuf-loader-libavif is &lt;1.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999537" version="1" comment="libavif-devel is &lt;1.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999538" version="1" comment="libavif16 is &lt;1.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999539" version="1" comment="libavif16-32bit is &lt;1.3.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999540" version="1" comment="libmruby3_4_0 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999541" version="1" comment="libmruby_core3_4_0 is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999542" version="1" comment="mruby is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999543" version="1" comment="mruby-devel is &lt;3.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999544" version="1" comment="libraptor-devel is &lt;2.0.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999545" version="1" comment="libraptor2-0 is &lt;2.0.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999546" version="1" comment="libraptor2-0-32bit is &lt;2.0.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999547" version="1" comment="raptor is &lt;2.0.16-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006071" version="1" comment="afterburn is &lt;5.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006072" version="1" comment="afterburn-dracut is &lt;5.8.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006073" version="1" comment="cmctl is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006074" version="1" comment="cmctl-bash-completion is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006075" version="1" comment="cmctl-fish-completion is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006076" version="1" comment="cmctl-zsh-completion is &lt;2.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006077" version="1" comment="git is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006078" version="1" comment="git-arch is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006079" version="1" comment="git-core is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006080" version="1" comment="git-credential-libsecret is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006081" version="1" comment="git-cvs is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006082" version="1" comment="git-daemon is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006083" version="1" comment="git-doc is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006084" version="1" comment="git-email is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006085" version="1" comment="git-gui is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006086" version="1" comment="git-p4 is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006087" version="1" comment="git-svn is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006088" version="1" comment="git-web is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006089" version="1" comment="gitk is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006090" version="1" comment="perl-Git is &lt;2.50.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006091" version="1" comment="k9s is &lt;0.50.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006092" version="1" comment="liboqs-devel is &lt;0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006093" version="1" comment="liboqs-devel-32bit is &lt;0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006094" version="1" comment="liboqs8 is &lt;0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006095" version="1" comment="liboqs8-32bit is &lt;0.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006096" version="1" comment="php8 is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006097" version="1" comment="php8-bcmath is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006098" version="1" comment="php8-bz2 is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006099" version="1" comment="php8-calendar is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006100" version="1" comment="php8-cli is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006101" version="1" comment="php8-ctype is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006102" version="1" comment="php8-curl is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006103" version="1" comment="php8-dba is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006104" version="1" comment="php8-devel is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006105" version="1" comment="php8-dom is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006106" version="1" comment="php8-enchant is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006107" version="1" comment="php8-exif is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006108" version="1" comment="php8-ffi is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006109" version="1" comment="php8-fileinfo is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006110" version="1" comment="php8-ftp is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006111" version="1" comment="php8-gd is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006112" version="1" comment="php8-gettext is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006113" version="1" comment="php8-gmp is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006114" version="1" comment="php8-iconv is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006115" version="1" comment="php8-intl is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006116" version="1" comment="php8-ldap is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006117" version="1" comment="php8-mbstring is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006118" version="1" comment="php8-mysql is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006119" version="1" comment="php8-odbc is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006120" version="1" comment="php8-opcache is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006121" version="1" comment="php8-openssl is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006122" version="1" comment="php8-pcntl is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006123" version="1" comment="php8-pdo is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006124" version="1" comment="php8-pgsql is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006125" version="1" comment="php8-phar is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006126" version="1" comment="php8-posix is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006127" version="1" comment="php8-readline is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006128" version="1" comment="php8-shmop is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006129" version="1" comment="php8-snmp is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006130" version="1" comment="php8-soap is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006131" version="1" comment="php8-sockets is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006132" version="1" comment="php8-sodium is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006133" version="1" comment="php8-sqlite is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006134" version="1" comment="php8-sysvmsg is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006135" version="1" comment="php8-sysvsem is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006136" version="1" comment="php8-sysvshm is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006137" version="1" comment="php8-tidy is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006138" version="1" comment="php8-tokenizer is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006139" version="1" comment="php8-xmlreader is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006140" version="1" comment="php8-xmlwriter is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006141" version="1" comment="php8-xsl is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006142" version="1" comment="php8-zip is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006143" version="1" comment="php8-zlib is &lt;8.4.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006144" version="1" comment="trivy is &lt;0.64.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006145" version="1" comment="xen is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006146" version="1" comment="xen-devel is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006147" version="1" comment="xen-doc-html is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006148" version="1" comment="xen-libs is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006149" version="1" comment="xen-tools is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006150" version="1" comment="xen-tools-domU is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006151" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007723" version="1" comment="ggml-devel is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007724" version="1" comment="libggml is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007725" version="1" comment="libggml-base is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007726" version="1" comment="libggml-cpu is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007727" version="1" comment="libggml-opencl is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007728" version="1" comment="libggml-vulkan is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007729" version="1" comment="libllama is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007730" version="1" comment="libmtmd is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007731" version="1" comment="llamacpp is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007732" version="1" comment="llamacpp-devel is &lt;5889-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007733" version="1" comment="mailman3 is &lt;3.3.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007734" version="1" comment="system-user-mailman is &lt;3.3.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007735" version="1" comment="libQt6Concurrent6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007736" version="1" comment="libQt6Core6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007737" version="1" comment="libQt6DBus6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007738" version="1" comment="libQt6Gui6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007739" version="1" comment="libQt6Network6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007740" version="1" comment="libQt6OpenGL6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007741" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007742" version="1" comment="libQt6PrintSupport6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007743" version="1" comment="libQt6Sql6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007744" version="1" comment="libQt6Test6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007745" version="1" comment="libQt6Widgets6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007746" version="1" comment="libQt6Xml6 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007747" version="1" comment="qt6-base-common-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007748" version="1" comment="qt6-base-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007749" version="1" comment="qt6-base-examples is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007750" version="1" comment="qt6-base-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007751" version="1" comment="qt6-concurrent-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007752" version="1" comment="qt6-core-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007753" version="1" comment="qt6-core-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007754" version="1" comment="qt6-dbus-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007755" version="1" comment="qt6-dbus-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007756" version="1" comment="qt6-docs-common is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007757" version="1" comment="qt6-exampleicons-devel-static is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007758" version="1" comment="qt6-gui-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007759" version="1" comment="qt6-gui-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007760" version="1" comment="qt6-kmssupport-devel-static is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007761" version="1" comment="qt6-kmssupport-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007762" version="1" comment="qt6-network-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007763" version="1" comment="qt6-network-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007764" version="1" comment="qt6-network-tls is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007765" version="1" comment="qt6-networkinformation-glib is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007766" version="1" comment="qt6-networkinformation-nm is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007767" version="1" comment="qt6-opengl-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007768" version="1" comment="qt6-opengl-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007769" version="1" comment="qt6-openglwidgets-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007770" version="1" comment="qt6-platformsupport-devel-static is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007771" version="1" comment="qt6-platformsupport-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007772" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007773" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007774" version="1" comment="qt6-printsupport-cups is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007775" version="1" comment="qt6-printsupport-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007776" version="1" comment="qt6-printsupport-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007777" version="1" comment="qt6-sql-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007778" version="1" comment="qt6-sql-mysql is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007779" version="1" comment="qt6-sql-postgresql is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007780" version="1" comment="qt6-sql-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007781" version="1" comment="qt6-sql-sqlite is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007782" version="1" comment="qt6-sql-unixODBC is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007783" version="1" comment="qt6-test-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007784" version="1" comment="qt6-test-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007785" version="1" comment="qt6-widgets-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007786" version="1" comment="qt6-widgets-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007787" version="1" comment="qt6-xml-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007788" version="1" comment="qt6-xml-private-devel is &lt;6.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007789" version="1" comment="keylime-ima-policy is &lt;0.2.7+117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007790" version="1" comment="rust-keylime is &lt;0.2.7+117-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007989" version="1" comment="apache-commons-lang3 is &lt;3.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007990" version="1" comment="apache-commons-lang3-javadoc is &lt;3.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008256" version="1" comment="FastCGI is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008257" version="1" comment="FastCGI-devel is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008258" version="1" comment="libfcgi0 is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008259" version="1" comment="perl-FCGI is &lt;2.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008260" version="1" comment="ImageMagick is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008261" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008262" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008263" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008264" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008265" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008266" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008267" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008268" version="1" comment="libMagick++-devel is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008269" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008270" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008271" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008272" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008273" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008274" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008275" version="1" comment="chromedriver is &lt;138.0.7204.157-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008276" version="1" comment="chromium is &lt;138.0.7204.157-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008277" version="1" comment="fractal is &lt;12.beta+14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008278" version="1" comment="fractal-lang is &lt;12.beta+14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008279" version="1" comment="kubelogin is &lt;0.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008280" version="1" comment="rustup is &lt;1.28.2~0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008663" version="1" comment="bind is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008664" version="1" comment="bind-doc is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008665" version="1" comment="bind-modules-bdbhpt is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008666" version="1" comment="bind-modules-generic is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008667" version="1" comment="bind-modules-ldap is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008668" version="1" comment="bind-modules-mysql is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008669" version="1" comment="bind-modules-perl is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008670" version="1" comment="bind-modules-sqlite3 is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008671" version="1" comment="bind-utils is &lt;9.20.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008672" version="1" comment="cosign is &lt;2.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008673" version="1" comment="cosign-bash-completion is &lt;2.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008674" version="1" comment="cosign-fish-completion is &lt;2.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008675" version="1" comment="cosign-zsh-completion is &lt;2.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008676" version="1" comment="java-11-openjdk is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008677" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008678" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008679" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008680" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008681" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008682" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008683" version="1" comment="java-17-openjdk is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008684" version="1" comment="java-17-openjdk-demo is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008685" version="1" comment="java-17-openjdk-devel is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008686" version="1" comment="java-17-openjdk-headless is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008687" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008688" version="1" comment="java-17-openjdk-jmods is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008689" version="1" comment="java-17-openjdk-src is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008690" version="1" comment="java-24-openjdk is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008691" version="1" comment="java-24-openjdk-demo is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008692" version="1" comment="java-24-openjdk-devel is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008693" version="1" comment="java-24-openjdk-headless is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008694" version="1" comment="java-24-openjdk-javadoc is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008695" version="1" comment="java-24-openjdk-jmods is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008696" version="1" comment="java-24-openjdk-src is &lt;24.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008697" version="1" comment="valkey is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008698" version="1" comment="valkey-compat-redis is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008699" version="1" comment="valkey-devel is &lt;8.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008715" version="1" comment="apache2 is &lt;2.4.64-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008716" version="1" comment="busybox is &lt;1.37.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008717" version="1" comment="busybox-static is &lt;1.37.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008718" version="1" comment="busybox-testsuite is &lt;1.37.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008719" version="1" comment="busybox-warewulf3 is &lt;1.37.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008720" version="1" comment="java-21-openjdk is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008721" version="1" comment="java-21-openjdk-demo is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008722" version="1" comment="java-21-openjdk-devel is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008723" version="1" comment="java-21-openjdk-headless is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008724" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008725" version="1" comment="java-21-openjdk-jmods is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008726" version="1" comment="java-21-openjdk-src is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008727" version="1" comment="libxml2-2 is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008728" version="1" comment="libxml2-2-32bit is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008729" version="1" comment="libxml2-devel is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008730" version="1" comment="libxml2-devel-32bit is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008731" version="1" comment="libxml2-doc is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008732" version="1" comment="libxml2-tools is &lt;2.13.8-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008733" version="1" comment="libexslt0 is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008734" version="1" comment="libxslt-devel is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008735" version="1" comment="libxslt-devel-32bit is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008736" version="1" comment="libxslt-tools is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008737" version="1" comment="libxslt1 is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008738" version="1" comment="libxslt1-32bit is &lt;1.1.43-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008739" version="1" comment="python311 is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008740" version="1" comment="python311-32bit is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008741" version="1" comment="python311-curses is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008742" version="1" comment="python311-dbm is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008743" version="1" comment="python311-idle is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008744" version="1" comment="python311-tk is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008745" version="1" comment="python311-x86-64-v3 is &lt;3.11.13-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008746" version="1" comment="python312 is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008747" version="1" comment="python312-32bit is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008748" version="1" comment="python312-curses is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008749" version="1" comment="python312-dbm is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008750" version="1" comment="python312-idle is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008751" version="1" comment="python312-tk is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008752" version="1" comment="python312-x86-64-v3 is &lt;3.12.11-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008753" version="1" comment="python313 is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008754" version="1" comment="python313-32bit is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008755" version="1" comment="python313-curses is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008756" version="1" comment="python313-dbm is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008757" version="1" comment="python313-idle is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008758" version="1" comment="python313-tk is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008759" version="1" comment="python313-x86-64-v3 is &lt;3.13.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008760" version="1" comment="lemon is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008761" version="1" comment="libsqlite3-0 is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008762" version="1" comment="libsqlite3-0-32bit is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008763" version="1" comment="libsqlite3-0-x86-64-v3 is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008764" version="1" comment="sqlite3 is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008765" version="1" comment="sqlite3-devel is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008766" version="1" comment="sqlite3-doc is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008767" version="1" comment="sqlite3-tcl is &lt;3.50.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008949" version="1" comment="cyradm is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008950" version="1" comment="cyrus-imapd is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008951" version="1" comment="cyrus-imapd-devel is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008952" version="1" comment="cyrus-imapd-snmp is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008953" version="1" comment="cyrus-imapd-snmp-mibs is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008954" version="1" comment="cyrus-imapd-utils is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008955" version="1" comment="libcyrus0 is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008956" version="1" comment="perl-Cyrus-Annotator is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008957" version="1" comment="perl-Cyrus-IMAP is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008958" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;3.8.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008959" version="1" comment="hauler is &lt;1.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010049" version="1" comment="firefox-esr is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010050" version="1" comment="firefox-esr-branding-upstream is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010051" version="1" comment="firefox-esr-translations-common is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010052" version="1" comment="firefox-esr-translations-other is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010053" version="1" comment="grafana is &lt;11.6.3+security01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010054" version="1" comment="jupyter-jupyterlab-templates is &lt;0.5.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010055" version="1" comment="python311-jupyterlab-templates is &lt;0.5.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010056" version="1" comment="python312-jupyterlab-templates is &lt;0.5.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010057" version="1" comment="python313-jupyterlab-templates is &lt;0.5.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010058" version="1" comment="viewvc is &lt;1.3.0~dev20250722-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010114" version="1" comment="chromedriver is &lt;138.0.7204.168-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010115" version="1" comment="chromium is &lt;138.0.7204.168-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010116" version="1" comment="cloud-init is &lt;25.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010117" version="1" comment="cloud-init-config-suse is &lt;25.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010118" version="1" comment="cloud-init-doc is &lt;25.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010119" version="1" comment="grype-db is &lt;0.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010120" version="1" comment="grype-db-bash-completion is &lt;0.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010121" version="1" comment="grype-db-fish-completion is &lt;0.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010122" version="1" comment="grype-db-zsh-completion is &lt;0.35.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010123" version="1" comment="javamail is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010124" version="1" comment="javamail-javadoc is &lt;1.6.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010125" version="1" comment="minio-client is &lt;20250721T052808Z-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010126" version="1" comment="minio-client-as-mc is &lt;20250721T052808Z-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010127" version="1" comment="jupyter-nbdime is &lt;7.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010128" version="1" comment="jupyter-nbdime-jupyterlab is &lt;3.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010129" version="1" comment="python311-nbdime is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010130" version="1" comment="python311-nbdime-git is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010131" version="1" comment="python311-nbdime-hg is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010132" version="1" comment="python312-nbdime is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010133" version="1" comment="python312-nbdime-git is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010134" version="1" comment="python312-nbdime-hg is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010135" version="1" comment="python313-nbdime is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010136" version="1" comment="python313-nbdime-git is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010137" version="1" comment="python313-nbdime-hg is &lt;4.0.2-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010138" version="1" comment="python311-starlette is &lt;0.47.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010139" version="1" comment="python312-starlette is &lt;0.47.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010140" version="1" comment="python313-starlette is &lt;0.47.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010141" version="1" comment="ruby3.4-rubygem-thor is &lt;1.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010461" version="1" comment="MozillaThunderbird is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010462" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010463" version="1" comment="MozillaThunderbird-translations-common is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010464" version="1" comment="MozillaThunderbird-translations-other is &lt;140.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010465" version="1" comment="apache2 is &lt;2.4.65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010466" version="1" comment="perl-Authen-SASL is &lt;2.180.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010467" version="1" comment="MozillaFirefox is &lt;141.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010468" version="1" comment="MozillaFirefox-branding-upstream is &lt;141.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010469" version="1" comment="MozillaFirefox-devel is &lt;141.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010470" version="1" comment="MozillaFirefox-translations-common is &lt;141.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010471" version="1" comment="MozillaFirefox-translations-other is &lt;141.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010472" version="1" comment="libmozjs-128-0 is &lt;128.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010473" version="1" comment="mozjs128 is &lt;128.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010474" version="1" comment="mozjs128-devel is &lt;128.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010475" version="1" comment="rpi-imager is &lt;1.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010476" version="1" comment="forgejo-longterm is &lt;11.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010477" version="1" comment="forgejo-longterm-apparmor is &lt;11.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010478" version="1" comment="forgejo-longterm-environment-to-ini is &lt;11.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010479" version="1" comment="forgejo-longterm-firewalld is &lt;11.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010480" version="1" comment="forgejo-longterm-selinux is &lt;11.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010481" version="1" comment="java-11-openj9 is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010482" version="1" comment="java-11-openj9-demo is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010483" version="1" comment="java-11-openj9-devel is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010484" version="1" comment="java-11-openj9-headless is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010485" version="1" comment="java-11-openj9-javadoc is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010486" version="1" comment="java-11-openj9-jmods is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010487" version="1" comment="java-11-openj9-src is &lt;11.0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010488" version="1" comment="java-17-openj9 is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010489" version="1" comment="java-17-openj9-demo is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010490" version="1" comment="java-17-openj9-devel is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010491" version="1" comment="java-17-openj9-headless is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010492" version="1" comment="java-17-openj9-javadoc is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010493" version="1" comment="java-17-openj9-jmods is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010494" version="1" comment="java-17-openj9-src is &lt;17.0.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010495" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010496" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010497" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010498" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010499" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010500" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010501" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010502" version="1" comment="java-21-openj9 is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010503" version="1" comment="java-21-openj9-demo is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010504" version="1" comment="java-21-openj9-devel is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010505" version="1" comment="java-21-openj9-headless is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010506" version="1" comment="java-21-openj9-javadoc is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010507" version="1" comment="java-21-openj9-jmods is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010508" version="1" comment="java-21-openj9-src is &lt;21.0.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011162" version="1" comment="libsuricata8_0_0 is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011163" version="1" comment="suricata is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011164" version="1" comment="suricata-devel is &lt;8.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011504" version="1" comment="docker is &lt;28.3.3_ce-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011505" version="1" comment="docker-bash-completion is &lt;28.3.3_ce-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011506" version="1" comment="docker-buildx is &lt;0.26.1-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011507" version="1" comment="docker-fish-completion is &lt;28.3.3_ce-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011508" version="1" comment="docker-rootless-extras is &lt;28.3.3_ce-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011509" version="1" comment="docker-zsh-completion is &lt;28.3.3_ce-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011510" version="1" comment="ffmpeg-7 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011511" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011512" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011513" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011514" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011515" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011516" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011517" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011518" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011519" version="1" comment="libavcodec61 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011520" version="1" comment="libavcodec61-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011521" version="1" comment="libavdevice61 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011522" version="1" comment="libavdevice61-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011523" version="1" comment="libavfilter10 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011524" version="1" comment="libavfilter10-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011525" version="1" comment="libavformat61 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011526" version="1" comment="libavformat61-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011527" version="1" comment="libavutil59 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011528" version="1" comment="libavutil59-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011529" version="1" comment="libpostproc58 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011530" version="1" comment="libpostproc58-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011531" version="1" comment="libswresample5 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011532" version="1" comment="libswresample5-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011533" version="1" comment="libswscale8 is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011534" version="1" comment="libswscale8-32bit is &lt;7.1.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011632" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011633" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011634" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011635" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011636" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011637" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011638" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011639" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011640" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011641" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011642" version="1" comment="kwctl is &lt;1.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011822" version="1" comment="chromedriver is &lt;138.0.7204.183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011823" version="1" comment="chromium is &lt;138.0.7204.183-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011895" version="1" comment="grub2 is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011896" version="1" comment="grub2-branding-upstream is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011897" version="1" comment="grub2-common is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011898" version="1" comment="grub2-i386-efi is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011899" version="1" comment="grub2-i386-efi-bls is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011900" version="1" comment="grub2-i386-efi-debug is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011901" version="1" comment="grub2-i386-efi-extras is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011902" version="1" comment="grub2-i386-pc is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011903" version="1" comment="grub2-i386-pc-debug is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011904" version="1" comment="grub2-i386-pc-extras is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011905" version="1" comment="grub2-i386-xen is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011906" version="1" comment="grub2-i386-xen-debug is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011907" version="1" comment="grub2-i386-xen-extras is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011908" version="1" comment="grub2-snapper-plugin is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011909" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011910" version="1" comment="grub2-x86_64-efi is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011911" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011912" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011913" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011914" version="1" comment="grub2-x86_64-xen is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011915" version="1" comment="grub2-x86_64-xen-debug is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011916" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011917" version="1" comment="liblua5_5-5 is &lt;5.5.0~beta1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011918" version="1" comment="lua55 is &lt;5.5.0~beta1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011919" version="1" comment="lua55-devel is &lt;5.5.0~beta1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011920" version="1" comment="lua55-doc is &lt;5.5.0~beta1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011921" version="1" comment="python310 is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011922" version="1" comment="python310-32bit is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011923" version="1" comment="python310-curses is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011924" version="1" comment="python310-dbm is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011925" version="1" comment="python310-idle is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011926" version="1" comment="python310-tk is &lt;3.10.18-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011927" version="1" comment="python314 is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011928" version="1" comment="python314-curses is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011929" version="1" comment="python314-dbm is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011930" version="1" comment="python314-idle is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011931" version="1" comment="python314-tk is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011932" version="1" comment="python314-x86-64-v3 is &lt;3.14.0~rc1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011933" version="1" comment="python39 is &lt;3.9.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011934" version="1" comment="python39-curses is &lt;3.9.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011935" version="1" comment="python39-dbm is &lt;3.9.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011936" version="1" comment="python39-idle is &lt;3.9.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011937" version="1" comment="python39-tk is &lt;3.9.23-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012325" version="1" comment="govulncheck-vulndb is &lt;0.0.20250730T213748-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012326" version="1" comment="kubeshark-cli is &lt;52.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012327" version="1" comment="kubeshark-cli-bash-completion is &lt;52.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012328" version="1" comment="kubeshark-cli-fish-completion is &lt;52.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012329" version="1" comment="kubeshark-cli-zsh-completion is &lt;52.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012330" version="1" comment="python311 is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012331" version="1" comment="python311-32bit is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012332" version="1" comment="python311-curses is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012333" version="1" comment="python311-dbm is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012334" version="1" comment="python311-idle is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012335" version="1" comment="python311-tk is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012336" version="1" comment="python311-x86-64-v3 is &lt;3.11.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012337" version="1" comment="python312 is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012338" version="1" comment="python312-32bit is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012339" version="1" comment="python312-curses is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012340" version="1" comment="python312-dbm is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012341" version="1" comment="python312-idle is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012342" version="1" comment="python312-tk is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012343" version="1" comment="python312-x86-64-v3 is &lt;3.12.11-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012344" version="1" comment="python313 is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012345" version="1" comment="python313-32bit is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012346" version="1" comment="python313-curses is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012347" version="1" comment="python313-dbm is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012348" version="1" comment="python313-idle is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012349" version="1" comment="python313-tk is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012350" version="1" comment="python313-x86-64-v3 is &lt;3.13.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012351" version="1" comment="erlang-rabbitmq-client is &lt;3.13.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012352" version="1" comment="rabbitmq-server is &lt;3.13.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012353" version="1" comment="rabbitmq-server-bash-completion is &lt;3.13.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012354" version="1" comment="rabbitmq-server-plugins is &lt;3.13.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012355" version="1" comment="rabbitmq-server-zsh-completion is &lt;3.13.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012775" version="1" comment="gnutls is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012776" version="1" comment="libgnutls-dane-devel is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012777" version="1" comment="libgnutls-dane0 is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012778" version="1" comment="libgnutls-devel is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012779" version="1" comment="libgnutls-devel-32bit is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012780" version="1" comment="libgnutls-devel-doc is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012781" version="1" comment="libgnutls30 is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012782" version="1" comment="libgnutls30-32bit is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012783" version="1" comment="libgnutlsxx-devel is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012784" version="1" comment="libgnutlsxx30 is &lt;3.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013034" version="1" comment="agama is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013035" version="1" comment="agama-autoinstall is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013036" version="1" comment="agama-cli is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013037" version="1" comment="agama-cli-bash-completion is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013038" version="1" comment="agama-cli-fish-completion is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013039" version="1" comment="agama-cli-zsh-completion is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013040" version="1" comment="agama-openapi is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013041" version="1" comment="agama-scripts is &lt;17+60.68fdb92ec-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013042" version="1" comment="ghostscript is &lt;10.05.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013043" version="1" comment="ghostscript-devel is &lt;10.05.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013044" version="1" comment="ghostscript-x11 is &lt;10.05.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013045" version="1" comment="iperf is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013046" version="1" comment="iperf-devel is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013047" version="1" comment="libiperf0 is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013048" version="1" comment="libIex-3_3-32 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013049" version="1" comment="libIex-3_3-32-32bit is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013050" version="1" comment="libIex-3_3-32-x86-64-v3 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013051" version="1" comment="libIlmThread-3_3-32 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013052" version="1" comment="libIlmThread-3_3-32-32bit is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013053" version="1" comment="libIlmThread-3_3-32-x86-64-v3 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013054" version="1" comment="libOpenEXR-3_3-32 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013055" version="1" comment="libOpenEXR-3_3-32-32bit is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013056" version="1" comment="libOpenEXR-3_3-32-x86-64-v3 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013057" version="1" comment="libOpenEXRCore-3_3-32 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013058" version="1" comment="libOpenEXRCore-3_3-32-32bit is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013059" version="1" comment="libOpenEXRCore-3_3-32-x86-64-v3 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013060" version="1" comment="libOpenEXRUtil-3_3-32 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013061" version="1" comment="libOpenEXRUtil-3_3-32-32bit is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013062" version="1" comment="libOpenEXRUtil-3_3-32-x86-64-v3 is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013063" version="1" comment="openexr is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013064" version="1" comment="openexr-devel is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013065" version="1" comment="openexr-doc is &lt;3.3.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013066" version="1" comment="libpoppler-cpp2 is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013067" version="1" comment="libpoppler-cpp2-32bit is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013068" version="1" comment="libpoppler-devel is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013069" version="1" comment="libpoppler-glib-devel is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013070" version="1" comment="libpoppler-glib8 is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013071" version="1" comment="libpoppler-glib8-32bit is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013072" version="1" comment="libpoppler152 is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013073" version="1" comment="libpoppler152-32bit is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013074" version="1" comment="poppler-tools is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013075" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.08.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013076" version="1" comment="libtiff-devel is &lt;4.7.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013077" version="1" comment="libtiff-devel-32bit is &lt;4.7.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013078" version="1" comment="libtiff6 is &lt;4.7.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013079" version="1" comment="libtiff6-32bit is &lt;4.7.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013080" version="1" comment="tiff is &lt;4.7.0-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013081" version="1" comment="traefik is &lt;3.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013082" version="1" comment="traefik2 is &lt;2.11.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013155" version="1" comment="go1.25 is &lt;1.25rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013156" version="1" comment="go1.25-doc is &lt;1.25rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013157" version="1" comment="go1.25-libstd is &lt;1.25rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013158" version="1" comment="go1.25-race is &lt;1.25rc3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013204" version="1" comment="chromedriver is &lt;139.0.7258.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013205" version="1" comment="chromium is &lt;139.0.7258.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013206" version="1" comment="go1.23 is &lt;1.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013207" version="1" comment="go1.23-doc is &lt;1.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013208" version="1" comment="go1.23-libstd is &lt;1.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013209" version="1" comment="go1.23-race is &lt;1.23.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013210" version="1" comment="go1.24 is &lt;1.24.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013211" version="1" comment="go1.24-doc is &lt;1.24.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013212" version="1" comment="go1.24-libstd is &lt;1.24.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013213" version="1" comment="go1.24-race is &lt;1.24.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013214" version="1" comment="govulncheck-vulndb is &lt;0.0.20250807T150727-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013215" version="1" comment="himmelblau is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013216" version="1" comment="himmelblau-qr-greeter is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013217" version="1" comment="himmelblau-sshd-config is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013218" version="1" comment="himmelblau-sso is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013219" version="1" comment="libnss_himmelblau2 is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013220" version="1" comment="pam-himmelblau is &lt;1.2.0+git.0.6befefc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013221" version="1" comment="keylime-ima-policy is &lt;0.2.7+141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013222" version="1" comment="rust-keylime is &lt;0.2.7+141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013223" version="1" comment="ffmpeg-4 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013224" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013225" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013226" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013227" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013228" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013229" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013230" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013231" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013232" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013233" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013234" version="1" comment="libavcodec58_134 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013235" version="1" comment="libavcodec58_134-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013236" version="1" comment="libavdevice58_13 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013237" version="1" comment="libavdevice58_13-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013238" version="1" comment="libavfilter7_110 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013239" version="1" comment="libavfilter7_110-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013240" version="1" comment="libavformat58_76 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013241" version="1" comment="libavformat58_76-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013242" version="1" comment="libavresample4_0 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013243" version="1" comment="libavresample4_0-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013244" version="1" comment="libavutil56_70 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013245" version="1" comment="libavutil56_70-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013246" version="1" comment="libpostproc55_9 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013247" version="1" comment="libpostproc55_9-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013248" version="1" comment="libswresample3_9 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013249" version="1" comment="libswresample3_9-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013250" version="1" comment="libswscale5_9 is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013251" version="1" comment="libswscale5_9-32bit is &lt;4.4.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013252" version="1" comment="net-tools is &lt;2.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013253" version="1" comment="net-tools-deprecated is &lt;2.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013254" version="1" comment="net-tools-lang is &lt;2.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013255" version="1" comment="python311-uv is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013256" version="1" comment="python311-uv-bash-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013257" version="1" comment="python311-uv-fish-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013258" version="1" comment="python311-uv-zsh-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013259" version="1" comment="python312-uv is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013260" version="1" comment="python312-uv-bash-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013261" version="1" comment="python312-uv-fish-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013262" version="1" comment="python312-uv-zsh-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013263" version="1" comment="python313-uv is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013264" version="1" comment="python313-uv-bash-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013265" version="1" comment="python313-uv-fish-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013266" version="1" comment="python313-uv-zsh-completion is &lt;0.8.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013267" version="1" comment="texmaker is &lt;6.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013268" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;570.172.08-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013269" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;570.172.08_k6.15.8_1-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013270" version="1" comment="nvidia-open-driver-G06-signed-kmp-longterm is &lt;570.172.08_k6.12.41_1-2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013271" version="1" comment="nvidia-open-driver-G06-signed-longterm-devel is &lt;570.172.08-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013336" version="1" comment="gio-branding-upstream is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013337" version="1" comment="glib2-devel is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013338" version="1" comment="glib2-devel-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013339" version="1" comment="glib2-devel-static is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013340" version="1" comment="glib2-lang is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013341" version="1" comment="glib2-tests-devel is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013342" version="1" comment="glib2-tools is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013343" version="1" comment="glib2-tools-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013344" version="1" comment="libgio-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013345" version="1" comment="libgio-2_0-0-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013346" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013347" version="1" comment="libglib-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013348" version="1" comment="libglib-2_0-0-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013349" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013350" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013351" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013352" version="1" comment="libgobject-2_0-0-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013353" version="1" comment="libgthread-2_0-0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013354" version="1" comment="libgthread-2_0-0-32bit is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013355" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013356" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013357" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013358" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013359" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013360" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013614" version="1" comment="framework-inputmodule-control is &lt;0.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013615" version="1" comment="framework-inputmodule-udev-rules is &lt;0.2.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013616" version="1" comment="govulncheck-vulndb is &lt;0.0.20250811T192933-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013617" version="1" comment="libunbound8 is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013618" version="1" comment="python3-unbound is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013619" version="1" comment="unbound is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013620" version="1" comment="unbound-anchor is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013621" version="1" comment="unbound-devel is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013622" version="1" comment="unbound-munin is &lt;1.23.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013877" version="1" comment="matrix-synapse is &lt;1.136.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013878" version="1" comment="qemu is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013879" version="1" comment="qemu-SLOF is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013880" version="1" comment="qemu-accel-qtest is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013881" version="1" comment="qemu-arm is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013882" version="1" comment="qemu-audio-alsa is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013883" version="1" comment="qemu-audio-dbus is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013884" version="1" comment="qemu-audio-jack is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013885" version="1" comment="qemu-audio-oss is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013886" version="1" comment="qemu-audio-pa is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013887" version="1" comment="qemu-audio-pipewire is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013888" version="1" comment="qemu-audio-spice is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013889" version="1" comment="qemu-block-curl is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013890" version="1" comment="qemu-block-dmg is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013891" version="1" comment="qemu-block-gluster is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013892" version="1" comment="qemu-block-iscsi is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013893" version="1" comment="qemu-block-nfs is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013894" version="1" comment="qemu-block-rbd is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013895" version="1" comment="qemu-block-ssh is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013896" version="1" comment="qemu-chardev-baum is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013897" version="1" comment="qemu-chardev-spice is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013898" version="1" comment="qemu-doc is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013899" version="1" comment="qemu-extra is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013900" version="1" comment="qemu-guest-agent is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013901" version="1" comment="qemu-headless is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013902" version="1" comment="qemu-hw-display-qxl is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013903" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013904" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013905" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013906" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013907" version="1" comment="qemu-hw-usb-host is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013908" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013909" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013910" version="1" comment="qemu-img is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013911" version="1" comment="qemu-ipxe is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013912" version="1" comment="qemu-ivshmem-tools is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013913" version="1" comment="qemu-ksm is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013914" version="1" comment="qemu-lang is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013915" version="1" comment="qemu-microvm is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013916" version="1" comment="qemu-ppc is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013917" version="1" comment="qemu-pr-helper is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013918" version="1" comment="qemu-s390x is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013919" version="1" comment="qemu-seabios is &lt;10.0.31.16.3_3_g3d33c746-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013920" version="1" comment="qemu-skiboot is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013921" version="1" comment="qemu-spice is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013922" version="1" comment="qemu-tools is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013923" version="1" comment="qemu-ui-curses is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013924" version="1" comment="qemu-ui-dbus is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013925" version="1" comment="qemu-ui-gtk is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013926" version="1" comment="qemu-ui-opengl is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013927" version="1" comment="qemu-ui-spice-app is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013928" version="1" comment="qemu-ui-spice-core is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013929" version="1" comment="qemu-vgabios is &lt;10.0.31.16.3_3_g3d33c746-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013930" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013931" version="1" comment="qemu-vmsr-helper is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013932" version="1" comment="qemu-x86 is &lt;10.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013933" version="1" comment="rz-pm is &lt;0.3.3+git~14~gcee0d0d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013988" version="1" comment="python311-pypdf is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013989" version="1" comment="python312-pypdf is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013990" version="1" comment="python313-pypdf is &lt;6.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013991" version="1" comment="tomcat is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013992" version="1" comment="tomcat-admin-webapps is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013993" version="1" comment="tomcat-docs-webapp is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013994" version="1" comment="tomcat-el-3_0-api is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013995" version="1" comment="tomcat-embed is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013996" version="1" comment="tomcat-javadoc is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013997" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013998" version="1" comment="tomcat-jsvc is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013999" version="1" comment="tomcat-lib is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014000" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014001" version="1" comment="tomcat-webapps is &lt;9.0.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014002" version="1" comment="tomcat10 is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014003" version="1" comment="tomcat10-admin-webapps is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014004" version="1" comment="tomcat10-doc is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014005" version="1" comment="tomcat10-docs-webapp is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014006" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014007" version="1" comment="tomcat10-embed is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014008" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014009" version="1" comment="tomcat10-jsvc is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014010" version="1" comment="tomcat10-lib is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014011" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014012" version="1" comment="tomcat10-webapps is &lt;10.1.43-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014013" version="1" comment="tomcat11 is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014014" version="1" comment="tomcat11-admin-webapps is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014015" version="1" comment="tomcat11-doc is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014016" version="1" comment="tomcat11-docs-webapp is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014017" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014018" version="1" comment="tomcat11-embed is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014019" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014020" version="1" comment="tomcat11-jsvc is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014021" version="1" comment="tomcat11-lib is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014022" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014023" version="1" comment="tomcat11-webapps is &lt;11.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014131" version="1" comment="chromedriver is &lt;139.0.7258.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014132" version="1" comment="chromium is &lt;139.0.7258.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014133" version="1" comment="framework_tool is &lt;0.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014134" version="1" comment="gstreamer-devtools is &lt;1.26.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014135" version="1" comment="gstreamer-devtools-devel is &lt;1.26.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014136" version="1" comment="libgstvalidate-1_0-0 is &lt;1.26.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014137" version="1" comment="typelib-1_0-GstValidate-1_0 is &lt;1.26.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014138" version="1" comment="gstreamer-plugins-rs is &lt;1.26.5+git11.949807a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014139" version="1" comment="gstreamer-plugins-rs-devel is &lt;1.26.5+git11.949807a4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014140" version="1" comment="jasper is &lt;4.2.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014141" version="1" comment="libjasper-devel is &lt;4.2.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014142" version="1" comment="libjasper7 is &lt;4.2.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014143" version="1" comment="libjasper7-32bit is &lt;4.2.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014144" version="1" comment="lighttpd is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014145" version="1" comment="lighttpd-mod_authn_dbi is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014146" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014147" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014148" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014149" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014150" version="1" comment="lighttpd-mod_deflate is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014151" version="1" comment="lighttpd-mod_gnutls is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014152" version="1" comment="lighttpd-mod_magnet is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014153" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014154" version="1" comment="lighttpd-mod_mbedtls is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014155" version="1" comment="lighttpd-mod_nss is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014156" version="1" comment="lighttpd-mod_openssl is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014157" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014158" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014159" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014160" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014161" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014162" version="1" comment="lighttpd-mod_webdav is &lt;1.4.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014163" version="1" comment="nginx is &lt;1.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014164" version="1" comment="nginx-source is &lt;1.29.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014165" version="1" comment="postgresql13 is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014166" version="1" comment="postgresql13-contrib is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014167" version="1" comment="postgresql13-devel is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014168" version="1" comment="postgresql13-docs is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014169" version="1" comment="postgresql13-llvmjit is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014170" version="1" comment="postgresql13-llvmjit-devel is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014171" version="1" comment="postgresql13-plperl is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014172" version="1" comment="postgresql13-plpython is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014173" version="1" comment="postgresql13-pltcl is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014174" version="1" comment="postgresql13-server is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014175" version="1" comment="postgresql13-server-devel is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014176" version="1" comment="postgresql13-test is &lt;13.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014177" version="1" comment="postgresql14 is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014178" version="1" comment="postgresql14-contrib is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014179" version="1" comment="postgresql14-devel is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014180" version="1" comment="postgresql14-docs is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014181" version="1" comment="postgresql14-llvmjit is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014182" version="1" comment="postgresql14-llvmjit-devel is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014183" version="1" comment="postgresql14-plperl is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014184" version="1" comment="postgresql14-plpython is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014185" version="1" comment="postgresql14-pltcl is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014186" version="1" comment="postgresql14-server is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014187" version="1" comment="postgresql14-server-devel is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014188" version="1" comment="postgresql14-test is &lt;14.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014189" version="1" comment="postgresql15 is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014190" version="1" comment="postgresql15-contrib is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014191" version="1" comment="postgresql15-devel is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014192" version="1" comment="postgresql15-docs is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014193" version="1" comment="postgresql15-llvmjit is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014194" version="1" comment="postgresql15-llvmjit-devel is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014195" version="1" comment="postgresql15-plperl is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014196" version="1" comment="postgresql15-plpython is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014197" version="1" comment="postgresql15-pltcl is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014198" version="1" comment="postgresql15-server is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014199" version="1" comment="postgresql15-server-devel is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014200" version="1" comment="postgresql15-test is &lt;15.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014201" version="1" comment="postgresql16 is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014202" version="1" comment="postgresql16-contrib is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014203" version="1" comment="postgresql16-devel is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014204" version="1" comment="postgresql16-docs is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014205" version="1" comment="postgresql16-llvmjit is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014206" version="1" comment="postgresql16-llvmjit-devel is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014207" version="1" comment="postgresql16-plperl is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014208" version="1" comment="postgresql16-plpython is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014209" version="1" comment="postgresql16-pltcl is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014210" version="1" comment="postgresql16-server is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014211" version="1" comment="postgresql16-server-devel is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014212" version="1" comment="postgresql16-test is &lt;16.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014213" version="1" comment="trivy is &lt;0.65.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014238" version="1" comment="libecpg6 is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014239" version="1" comment="libecpg6-32bit is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014240" version="1" comment="libpq5 is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014241" version="1" comment="libpq5-32bit is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014242" version="1" comment="postgresql17 is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014243" version="1" comment="postgresql17-contrib is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014244" version="1" comment="postgresql17-devel is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014245" version="1" comment="postgresql17-docs is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014246" version="1" comment="postgresql17-llvmjit is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014247" version="1" comment="postgresql17-llvmjit-devel is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014248" version="1" comment="postgresql17-plperl is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014249" version="1" comment="postgresql17-plpython is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014250" version="1" comment="postgresql17-pltcl is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014251" version="1" comment="postgresql17-server is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014252" version="1" comment="postgresql17-server-devel is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014253" version="1" comment="postgresql17-test is &lt;17.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014453" version="1" comment="apache2-mod_security2 is &lt;2.9.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014454" version="1" comment="cairo-devel is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014455" version="1" comment="cairo-devel-32bit is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014456" version="1" comment="cairo-tools is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014457" version="1" comment="libcairo-gobject2 is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014458" version="1" comment="libcairo-gobject2-32bit is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014459" version="1" comment="libcairo-script-interpreter2 is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014460" version="1" comment="libcairo-script-interpreter2-32bit is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014461" version="1" comment="libcairo2 is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014462" version="1" comment="libcairo2-32bit is &lt;1.18.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014463" version="1" comment="cflow is &lt;1.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014464" version="1" comment="glibc is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014465" version="1" comment="glibc-devel is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014466" version="1" comment="glibc-devel-static is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014467" version="1" comment="glibc-extra is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014468" version="1" comment="glibc-gconv-modules-extra is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014469" version="1" comment="glibc-html is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014470" version="1" comment="glibc-i18ndata is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014471" version="1" comment="glibc-info is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014472" version="1" comment="glibc-lang is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014473" version="1" comment="glibc-locale is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014474" version="1" comment="glibc-locale-base is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014475" version="1" comment="glibc-profile is &lt;2.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014476" version="1" comment="openbao is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014477" version="1" comment="openbao-agent is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014478" version="1" comment="openbao-cassandra-database-plugin is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014479" version="1" comment="openbao-influxdb-database-plugin is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014480" version="1" comment="openbao-mysql-database-plugin is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014481" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014482" version="1" comment="openbao-postgresql-database-plugin is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014483" version="1" comment="openbao-server is &lt;2.3.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014652" version="1" comment="aws-efs-utils is &lt;2.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014653" version="1" comment="go-sendxmpp is &lt;0.15.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014654" version="1" comment="docker-machine-driver-kvm2 is &lt;1.36.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014655" version="1" comment="minikube is &lt;1.36.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014656" version="1" comment="minikube-bash-completion is &lt;1.36.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014657" version="1" comment="minikube-fish-completion is &lt;1.36.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014658" version="1" comment="minikube-zsh-completion is &lt;1.36.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014659" version="1" comment="nova is &lt;3.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014660" version="1" comment="nova-bash-completion is &lt;3.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014661" version="1" comment="nova-fish-completion is &lt;3.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014662" version="1" comment="nova-zsh-completion is &lt;3.11.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014663" version="1" comment="pluto is &lt;5.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014664" version="1" comment="pluto-bash-completion is &lt;5.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014665" version="1" comment="pluto-fish-completion is &lt;5.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014666" version="1" comment="pluto-zsh-completion is &lt;5.22.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014667" version="1" comment="polaris is &lt;10.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014668" version="1" comment="polaris-bash-completion is &lt;10.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014669" version="1" comment="polaris-fish-completion is &lt;10.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014670" version="1" comment="polaris-zsh-completion is &lt;10.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014726" version="1" comment="firefox-esr is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014727" version="1" comment="firefox-esr-branding-upstream is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014728" version="1" comment="firefox-esr-translations-common is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014729" version="1" comment="firefox-esr-translations-other is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014730" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014731" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014732" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014733" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014734" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014735" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014736" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014737" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014738" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014739" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014740" version="1" comment="govulncheck-vulndb is &lt;0.0.20250818T190335-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014741" version="1" comment="wicked2nm is &lt;1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014864" version="1" comment="ImageMagick is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014865" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014866" version="1" comment="ImageMagick-devel is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014867" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014868" version="1" comment="ImageMagick-doc is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014869" version="1" comment="ImageMagick-extra is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014870" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014871" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014872" version="1" comment="libMagick++-devel is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014873" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014874" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014875" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014876" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014877" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014878" version="1" comment="perl-PerlMagick is &lt;7.1.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014879" version="1" comment="MozillaThunderbird is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014880" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014881" version="1" comment="MozillaThunderbird-translations-common is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014882" version="1" comment="MozillaThunderbird-translations-other is &lt;140.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014883" version="1" comment="abseil-cpp-devel is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014884" version="1" comment="libabsl_base2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014885" version="1" comment="libabsl_base2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014886" version="1" comment="libabsl_city2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014887" version="1" comment="libabsl_city2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014888" version="1" comment="libabsl_civil_time2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014889" version="1" comment="libabsl_civil_time2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014890" version="1" comment="libabsl_cord2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014891" version="1" comment="libabsl_cord2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014892" version="1" comment="libabsl_cord_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014893" version="1" comment="libabsl_cord_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014894" version="1" comment="libabsl_cordz_functions2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014895" version="1" comment="libabsl_cordz_functions2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014896" version="1" comment="libabsl_cordz_handle2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014897" version="1" comment="libabsl_cordz_handle2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014898" version="1" comment="libabsl_cordz_info2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014899" version="1" comment="libabsl_cordz_info2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014900" version="1" comment="libabsl_cordz_sample_token2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014901" version="1" comment="libabsl_cordz_sample_token2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014902" version="1" comment="libabsl_crc32c2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014903" version="1" comment="libabsl_crc32c2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014904" version="1" comment="libabsl_crc_cord_state2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014905" version="1" comment="libabsl_crc_cord_state2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014906" version="1" comment="libabsl_crc_cpu_detect2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014907" version="1" comment="libabsl_crc_cpu_detect2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014908" version="1" comment="libabsl_crc_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014909" version="1" comment="libabsl_crc_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014910" version="1" comment="libabsl_debugging_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014911" version="1" comment="libabsl_debugging_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014912" version="1" comment="libabsl_decode_rust_punycode2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014913" version="1" comment="libabsl_decode_rust_punycode2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014914" version="1" comment="libabsl_demangle_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014915" version="1" comment="libabsl_demangle_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014916" version="1" comment="libabsl_demangle_rust2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014917" version="1" comment="libabsl_demangle_rust2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014918" version="1" comment="libabsl_die_if_null2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014919" version="1" comment="libabsl_die_if_null2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014920" version="1" comment="libabsl_examine_stack2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014921" version="1" comment="libabsl_examine_stack2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014922" version="1" comment="libabsl_exponential_biased2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014923" version="1" comment="libabsl_exponential_biased2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014924" version="1" comment="libabsl_failure_signal_handler2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014925" version="1" comment="libabsl_failure_signal_handler2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014926" version="1" comment="libabsl_flags_commandlineflag2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014927" version="1" comment="libabsl_flags_commandlineflag2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014928" version="1" comment="libabsl_flags_commandlineflag_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014929" version="1" comment="libabsl_flags_commandlineflag_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014930" version="1" comment="libabsl_flags_config2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014931" version="1" comment="libabsl_flags_config2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014932" version="1" comment="libabsl_flags_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014933" version="1" comment="libabsl_flags_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014934" version="1" comment="libabsl_flags_marshalling2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014935" version="1" comment="libabsl_flags_marshalling2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014936" version="1" comment="libabsl_flags_parse2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014937" version="1" comment="libabsl_flags_parse2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014938" version="1" comment="libabsl_flags_private_handle_accessor2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014939" version="1" comment="libabsl_flags_private_handle_accessor2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014940" version="1" comment="libabsl_flags_program_name2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014941" version="1" comment="libabsl_flags_program_name2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014942" version="1" comment="libabsl_flags_reflection2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014943" version="1" comment="libabsl_flags_reflection2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014944" version="1" comment="libabsl_flags_usage2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014945" version="1" comment="libabsl_flags_usage2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014946" version="1" comment="libabsl_flags_usage_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014947" version="1" comment="libabsl_flags_usage_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014948" version="1" comment="libabsl_graphcycles_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014949" version="1" comment="libabsl_graphcycles_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014950" version="1" comment="libabsl_hash2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014951" version="1" comment="libabsl_hash2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014952" version="1" comment="libabsl_hashtable_profiler2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014953" version="1" comment="libabsl_hashtable_profiler2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014954" version="1" comment="libabsl_hashtablez_sampler2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014955" version="1" comment="libabsl_hashtablez_sampler2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014956" version="1" comment="libabsl_int128-2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014957" version="1" comment="libabsl_int128-2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014958" version="1" comment="libabsl_kernel_timeout_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014959" version="1" comment="libabsl_kernel_timeout_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014960" version="1" comment="libabsl_leak_check2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014961" version="1" comment="libabsl_leak_check2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014962" version="1" comment="libabsl_log_entry2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014963" version="1" comment="libabsl_log_entry2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014964" version="1" comment="libabsl_log_flags2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014965" version="1" comment="libabsl_log_flags2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014966" version="1" comment="libabsl_log_globals2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014967" version="1" comment="libabsl_log_globals2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014968" version="1" comment="libabsl_log_initialize2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014969" version="1" comment="libabsl_log_initialize2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014970" version="1" comment="libabsl_log_internal_check_op2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014971" version="1" comment="libabsl_log_internal_check_op2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014972" version="1" comment="libabsl_log_internal_conditions2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014973" version="1" comment="libabsl_log_internal_conditions2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014974" version="1" comment="libabsl_log_internal_fnmatch2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014975" version="1" comment="libabsl_log_internal_fnmatch2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014976" version="1" comment="libabsl_log_internal_format2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014977" version="1" comment="libabsl_log_internal_format2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014978" version="1" comment="libabsl_log_internal_globals2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014979" version="1" comment="libabsl_log_internal_globals2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014980" version="1" comment="libabsl_log_internal_log_sink_set2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014981" version="1" comment="libabsl_log_internal_log_sink_set2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014982" version="1" comment="libabsl_log_internal_message2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014983" version="1" comment="libabsl_log_internal_message2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014984" version="1" comment="libabsl_log_internal_nullguard2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014985" version="1" comment="libabsl_log_internal_nullguard2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014986" version="1" comment="libabsl_log_internal_proto2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014987" version="1" comment="libabsl_log_internal_proto2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014988" version="1" comment="libabsl_log_internal_structured_proto2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014989" version="1" comment="libabsl_log_internal_structured_proto2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014990" version="1" comment="libabsl_log_severity2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014991" version="1" comment="libabsl_log_severity2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014992" version="1" comment="libabsl_log_sink2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014993" version="1" comment="libabsl_log_sink2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014994" version="1" comment="libabsl_malloc_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014995" version="1" comment="libabsl_malloc_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014996" version="1" comment="libabsl_periodic_sampler2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014997" version="1" comment="libabsl_periodic_sampler2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014998" version="1" comment="libabsl_poison2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014999" version="1" comment="libabsl_poison2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015000" version="1" comment="libabsl_profile_builder2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015001" version="1" comment="libabsl_profile_builder2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015002" version="1" comment="libabsl_random_distributions2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015003" version="1" comment="libabsl_random_distributions2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015004" version="1" comment="libabsl_random_internal_distribution_test_util2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015005" version="1" comment="libabsl_random_internal_distribution_test_util2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015006" version="1" comment="libabsl_random_internal_entropy_pool2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015007" version="1" comment="libabsl_random_internal_entropy_pool2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015008" version="1" comment="libabsl_random_internal_platform2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015009" version="1" comment="libabsl_random_internal_platform2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015010" version="1" comment="libabsl_random_internal_randen2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015011" version="1" comment="libabsl_random_internal_randen2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015012" version="1" comment="libabsl_random_internal_randen_hwaes2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015013" version="1" comment="libabsl_random_internal_randen_hwaes2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015014" version="1" comment="libabsl_random_internal_randen_hwaes_impl2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015015" version="1" comment="libabsl_random_internal_randen_hwaes_impl2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015016" version="1" comment="libabsl_random_internal_randen_slow2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015017" version="1" comment="libabsl_random_internal_randen_slow2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015018" version="1" comment="libabsl_random_internal_seed_material2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015019" version="1" comment="libabsl_random_internal_seed_material2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015020" version="1" comment="libabsl_random_seed_gen_exception2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015021" version="1" comment="libabsl_random_seed_gen_exception2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015022" version="1" comment="libabsl_random_seed_sequences2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015023" version="1" comment="libabsl_random_seed_sequences2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015024" version="1" comment="libabsl_raw_hash_set2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015025" version="1" comment="libabsl_raw_hash_set2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015026" version="1" comment="libabsl_raw_logging_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015027" version="1" comment="libabsl_raw_logging_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015028" version="1" comment="libabsl_scoped_set_env2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015029" version="1" comment="libabsl_scoped_set_env2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015030" version="1" comment="libabsl_spinlock_wait2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015031" version="1" comment="libabsl_spinlock_wait2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015032" version="1" comment="libabsl_stacktrace2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015033" version="1" comment="libabsl_stacktrace2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015034" version="1" comment="libabsl_status2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015035" version="1" comment="libabsl_status2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015036" version="1" comment="libabsl_statusor2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015037" version="1" comment="libabsl_statusor2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015038" version="1" comment="libabsl_str_format_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015039" version="1" comment="libabsl_str_format_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015040" version="1" comment="libabsl_strerror2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015041" version="1" comment="libabsl_strerror2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015042" version="1" comment="libabsl_string_view2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015043" version="1" comment="libabsl_string_view2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015044" version="1" comment="libabsl_strings2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015045" version="1" comment="libabsl_strings2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015046" version="1" comment="libabsl_strings_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015047" version="1" comment="libabsl_strings_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015048" version="1" comment="libabsl_symbolize2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015049" version="1" comment="libabsl_symbolize2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015050" version="1" comment="libabsl_synchronization2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015051" version="1" comment="libabsl_synchronization2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015052" version="1" comment="libabsl_throw_delegate2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015053" version="1" comment="libabsl_throw_delegate2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015054" version="1" comment="libabsl_time2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015055" version="1" comment="libabsl_time2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015056" version="1" comment="libabsl_time_zone2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015057" version="1" comment="libabsl_time_zone2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015058" version="1" comment="libabsl_tracing_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015059" version="1" comment="libabsl_tracing_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015060" version="1" comment="libabsl_utf8_for_code_point2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015061" version="1" comment="libabsl_utf8_for_code_point2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015062" version="1" comment="libabsl_vlog_config_internal2508_0_0 is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015063" version="1" comment="libabsl_vlog_config_internal2508_0_0-32bit is &lt;20250814.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015064" version="1" comment="aide is &lt;0.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015065" version="1" comment="aide-test is &lt;0.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015066" version="1" comment="flake-pilot is &lt;3.1.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015067" version="1" comment="flake-pilot-firecracker is &lt;3.1.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015068" version="1" comment="flake-pilot-firecracker-dracut-netstart is &lt;3.1.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015069" version="1" comment="flake-pilot-firecracker-guestvm-tools is &lt;3.1.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015070" version="1" comment="flake-pilot-podman is &lt;3.1.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015071" version="1" comment="gimp is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015072" version="1" comment="gimp-devel is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015073" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015074" version="1" comment="gimp-lang is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015075" version="1" comment="gimp-plugin-aa is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015076" version="1" comment="gimp-plugin-python3 is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015077" version="1" comment="gimp-vala is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015078" version="1" comment="libgimp-3_0-0 is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015079" version="1" comment="libgimpui-3_0-0 is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015080" version="1" comment="pam is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015081" version="1" comment="pam-32bit is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015082" version="1" comment="pam-devel is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015083" version="1" comment="pam-devel-32bit is &lt;1.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015084" version="1" comment="pdns-recursor is &lt;5.2.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015085" version="1" comment="ruby3.4-rubygem-activerecord-8.0 is &lt;8.0.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015086" version="1" comment="keylime-ima-policy is &lt;0.2.8+12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015087" version="1" comment="rust-keylime is &lt;0.2.8+12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015413" version="1" comment="chromedriver is &lt;139.0.7258.138-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015414" version="1" comment="chromium is &lt;139.0.7258.138-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015415" version="1" comment="jetty-annotations is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015416" version="1" comment="jetty-ant is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015417" version="1" comment="jetty-cdi is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015418" version="1" comment="jetty-client is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015419" version="1" comment="jetty-continuation is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015420" version="1" comment="jetty-deploy is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015421" version="1" comment="jetty-fcgi is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015422" version="1" comment="jetty-http is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015423" version="1" comment="jetty-http-spi is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015424" version="1" comment="jetty-io is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015425" version="1" comment="jetty-jaas is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015426" version="1" comment="jetty-jmx is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015427" version="1" comment="jetty-jndi is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015428" version="1" comment="jetty-jsp is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015429" version="1" comment="jetty-minimal-javadoc is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015430" version="1" comment="jetty-openid is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015431" version="1" comment="jetty-plus is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015432" version="1" comment="jetty-project is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015433" version="1" comment="jetty-proxy is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015434" version="1" comment="jetty-quickstart is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015435" version="1" comment="jetty-rewrite is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015436" version="1" comment="jetty-security is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015437" version="1" comment="jetty-server is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015438" version="1" comment="jetty-servlet is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015439" version="1" comment="jetty-servlets is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015440" version="1" comment="jetty-start is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015441" version="1" comment="jetty-util is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015442" version="1" comment="jetty-util-ajax is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015443" version="1" comment="jetty-webapp is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015444" version="1" comment="jetty-xml is &lt;9.4.58-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015445" version="1" comment="netty is &lt;4.1.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015446" version="1" comment="netty-bom is &lt;4.1.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015447" version="1" comment="netty-javadoc is &lt;4.1.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015448" version="1" comment="netty-parent is &lt;4.1.124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015449" version="1" comment="jupyter-bqplot-jupyterlab is &lt;0.5.46-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015450" version="1" comment="jupyter-bqplot-notebook is &lt;0.5.46-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015451" version="1" comment="python311-bqplot is &lt;0.12.45-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015452" version="1" comment="terragrunt is &lt;0.85.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015453" version="1" comment="terragrunt-bash-completion is &lt;0.85.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015454" version="1" comment="terragrunt-zsh-completion is &lt;0.85.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015455" version="1" comment="libtiff-devel is &lt;4.7.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015456" version="1" comment="libtiff-devel-32bit is &lt;4.7.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015457" version="1" comment="libtiff6 is &lt;4.7.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015458" version="1" comment="libtiff6-32bit is &lt;4.7.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015459" version="1" comment="tiff is &lt;4.7.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015460" version="1" comment="cheat is &lt;4.4.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015461" version="1" comment="tomcat is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015462" version="1" comment="tomcat-admin-webapps is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015463" version="1" comment="tomcat-docs-webapp is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015464" version="1" comment="tomcat-el-3_0-api is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015465" version="1" comment="tomcat-embed is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015466" version="1" comment="tomcat-javadoc is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015467" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015468" version="1" comment="tomcat-jsvc is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015469" version="1" comment="tomcat-lib is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015470" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015471" version="1" comment="tomcat-webapps is &lt;9.0.108-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015472" version="1" comment="tomcat10 is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015473" version="1" comment="tomcat10-admin-webapps is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015474" version="1" comment="tomcat10-doc is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015475" version="1" comment="tomcat10-docs-webapp is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015476" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015477" version="1" comment="tomcat10-embed is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015478" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015479" version="1" comment="tomcat10-jsvc is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015480" version="1" comment="tomcat10-lib is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015481" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015482" version="1" comment="tomcat10-webapps is &lt;10.1.44-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015483" version="1" comment="tomcat11 is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015484" version="1" comment="tomcat11-admin-webapps is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015485" version="1" comment="tomcat11-doc is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015486" version="1" comment="tomcat11-docs-webapp is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015487" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015488" version="1" comment="tomcat11-embed is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015489" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015490" version="1" comment="tomcat11-jsvc is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015491" version="1" comment="tomcat11-lib is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015492" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015493" version="1" comment="tomcat11-webapps is &lt;11.0.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015494" version="1" comment="ucode-intel is &lt;20250812-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015626" version="1" comment="fractal is &lt;12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015627" version="1" comment="fractal-lang is &lt;12.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015628" version="1" comment="matrix-synapse is &lt;1.137.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015629" version="1" comment="libmozjs-128-0 is &lt;128.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015630" version="1" comment="mozjs128 is &lt;128.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015631" version="1" comment="mozjs128-devel is &lt;128.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016083" version="1" comment="perl-Crypt-CBC is &lt;3.70.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016084" version="1" comment="python311-h2 is &lt;4.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016085" version="1" comment="python312-h2 is &lt;4.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016086" version="1" comment="python313-h2 is &lt;4.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016087" version="1" comment="scx is &lt;1.0.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016088" version="1" comment="scx-devel is &lt;1.0.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016188" version="1" comment="ImageMagick is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016189" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016190" version="1" comment="ImageMagick-devel is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016191" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016192" version="1" comment="ImageMagick-doc is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016193" version="1" comment="ImageMagick-extra is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016194" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016195" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016196" version="1" comment="libMagick++-devel is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016197" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016198" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016199" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016200" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016201" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016202" version="1" comment="perl-PerlMagick is &lt;7.1.2.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016203" version="1" comment="kea is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016204" version="1" comment="kea-devel is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016205" version="1" comment="kea-doc is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016206" version="1" comment="kea-hooks is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016207" version="1" comment="libkea-asiodns62 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016208" version="1" comment="libkea-asiolink88 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016209" version="1" comment="libkea-cc82 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016210" version="1" comment="libkea-cfgrpt3 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016211" version="1" comment="libkea-config83 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016212" version="1" comment="libkea-cryptolink64 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016213" version="1" comment="libkea-d2srv63 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016214" version="1" comment="libkea-database76 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016215" version="1" comment="libkea-dhcp109 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016216" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016217" version="1" comment="libkea-dhcpsrv130 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016218" version="1" comment="libkea-dns71 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016219" version="1" comment="libkea-eval84 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016220" version="1" comment="libkea-exceptions45 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016221" version="1" comment="libkea-hooks119 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016222" version="1" comment="libkea-http87 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016223" version="1" comment="libkea-log-interprocess3 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016224" version="1" comment="libkea-log75 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016225" version="1" comment="libkea-mysql88 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016226" version="1" comment="libkea-pgsql88 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016227" version="1" comment="libkea-process90 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016228" version="1" comment="libkea-stats53 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016229" version="1" comment="libkea-tcp33 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016230" version="1" comment="libkea-util-io12 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016231" version="1" comment="libkea-util101 is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016232" version="1" comment="python3-kea is &lt;3.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016673" version="1" comment="chromedriver is &lt;139.0.7258.154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016674" version="1" comment="chromium is &lt;139.0.7258.154-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016675" version="1" comment="libpcre2-16-0 is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016676" version="1" comment="libpcre2-16-0-32bit is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016677" version="1" comment="libpcre2-32-0 is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016678" version="1" comment="libpcre2-32-0-32bit is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016679" version="1" comment="libpcre2-8-0 is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016680" version="1" comment="libpcre2-8-0-32bit is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016681" version="1" comment="libpcre2-posix3 is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016682" version="1" comment="libpcre2-posix3-32bit is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016683" version="1" comment="pcre2-devel is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016684" version="1" comment="pcre2-devel-static is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016685" version="1" comment="pcre2-doc is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016686" version="1" comment="pcre2-tools is &lt;10.46-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016687" version="1" comment="jupyter-nbdime is &lt;7.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016688" version="1" comment="jupyter-nbdime-jupyterlab is &lt;3.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016689" version="1" comment="python311-nbdime is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016690" version="1" comment="python311-nbdime-git is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016691" version="1" comment="python311-nbdime-hg is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016692" version="1" comment="python312-nbdime is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016693" version="1" comment="python312-nbdime-git is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016694" version="1" comment="python312-nbdime-hg is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016695" version="1" comment="python313-nbdime is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016696" version="1" comment="python313-nbdime-git is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016697" version="1" comment="python313-nbdime-hg is &lt;4.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016698" version="1" comment="tailscale is &lt;1.86.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016699" version="1" comment="tailscale-bash-completion is &lt;1.86.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016700" version="1" comment="tailscale-fish-completion is &lt;1.86.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016701" version="1" comment="tailscale-zsh-completion is &lt;1.86.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016811" version="1" comment="dcmtk is &lt;3.6.9-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016812" version="1" comment="dcmtk-devel is &lt;3.6.9-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016813" version="1" comment="libdcmtk19 is &lt;3.6.9-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016814" version="1" comment="kured is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016815" version="1" comment="kured-k8s-yaml is &lt;1.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016816" version="1" comment="jupyter-bqplot-jupyterlab is &lt;0.5.46-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016817" version="1" comment="jupyter-bqplot-notebook is &lt;0.5.46-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016818" version="1" comment="python311-bqplot is &lt;0.12.45-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016819" version="1" comment="python311-eventlet is &lt;0.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016820" version="1" comment="python312-eventlet is &lt;0.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016821" version="1" comment="python313-eventlet is &lt;0.40.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016822" version="1" comment="rekor is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016823" version="1" comment="sbctl is &lt;0.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016824" version="1" comment="traefik2 is &lt;2.11.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016825" version="1" comment="libudisks2-0 is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016826" version="1" comment="libudisks2-0-devel is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016827" version="1" comment="libudisks2-0_btrfs is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016828" version="1" comment="libudisks2-0_lsm is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016829" version="1" comment="libudisks2-0_lvm2 is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016830" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016831" version="1" comment="udisks2 is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016832" version="1" comment="udisks2-bash-completion is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016833" version="1" comment="udisks2-docs is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016834" version="1" comment="udisks2-lang is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016835" version="1" comment="udisks2-zsh-completion is &lt;2.10.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016875" version="1" comment="bpftop is &lt;0.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016876" version="1" comment="libmupen64plus-devel is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016877" version="1" comment="libmupen64plus2 is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016878" version="1" comment="mupen64plus-plugin-audio-sdl is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016879" version="1" comment="mupen64plus-plugin-input-sdl is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016880" version="1" comment="mupen64plus-plugin-rsp-hle is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016881" version="1" comment="mupen64plus-plugin-video-glide64mk2 is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016882" version="1" comment="mupen64plus-plugin-video-rice is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016883" version="1" comment="mupen64plus-ui-console is &lt;2.6.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016884" version="1" comment="python311-uv is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016885" version="1" comment="python311-uv-bash-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016886" version="1" comment="python311-uv-fish-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016887" version="1" comment="python311-uv-zsh-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016888" version="1" comment="python312-uv is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016889" version="1" comment="python312-uv-bash-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016890" version="1" comment="python312-uv-fish-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016891" version="1" comment="python312-uv-zsh-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016892" version="1" comment="python313-uv is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016893" version="1" comment="python313-uv-bash-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016894" version="1" comment="python313-uv-fish-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016895" version="1" comment="python313-uv-zsh-completion is &lt;0.8.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016896" version="1" comment="regclient is &lt;0.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016897" version="1" comment="regclient-bash-completion is &lt;0.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016898" version="1" comment="regclient-fish-completion is &lt;0.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016899" version="1" comment="regclient-zsh-completion is &lt;0.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016943" version="1" comment="MozillaFirefox is &lt;142.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016944" version="1" comment="MozillaFirefox-branding-upstream is &lt;142.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016945" version="1" comment="MozillaFirefox-devel is &lt;142.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016946" version="1" comment="MozillaFirefox-translations-common is &lt;142.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016947" version="1" comment="MozillaFirefox-translations-other is &lt;142.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016948" version="1" comment="himmelblau is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016949" version="1" comment="himmelblau-qr-greeter is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016950" version="1" comment="himmelblau-sshd-config is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016951" version="1" comment="himmelblau-sso is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016952" version="1" comment="libnss_himmelblau2 is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016953" version="1" comment="pam-himmelblau is &lt;1.2.2+git.0.2d04bca-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016954" version="1" comment="python311-maturin is &lt;1.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016955" version="1" comment="python312-maturin is &lt;1.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016956" version="1" comment="python313-maturin is &lt;1.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016957" version="1" comment="python311-ruff is &lt;0.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016958" version="1" comment="python312-ruff is &lt;0.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016959" version="1" comment="python313-ruff is &lt;0.12.11-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017094" version="1" comment="netty is &lt;4.1.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017095" version="1" comment="netty-bom is &lt;4.1.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017096" version="1" comment="netty-javadoc is &lt;4.1.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017097" version="1" comment="netty-parent is &lt;4.1.126-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017098" version="1" comment="libpodofo-0_10-devel is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017099" version="1" comment="libpodofo2 is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017100" version="1" comment="podofo-0_10 is &lt;0.10.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017101" version="1" comment="libwireshark18 is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017102" version="1" comment="libwiretap15 is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017103" version="1" comment="libwsutil16 is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017104" version="1" comment="wireshark is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017105" version="1" comment="wireshark-devel is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017106" version="1" comment="wireshark-ui-qt is &lt;4.4.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017189" version="1" comment="7zip is &lt;25.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017190" version="1" comment="chromedriver is &lt;140.0.7339.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017191" version="1" comment="chromium is &lt;140.0.7339.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017192" version="1" comment="go1.25 is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017193" version="1" comment="go1.25-doc is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017194" version="1" comment="go1.25-libstd is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017195" version="1" comment="go1.25-race is &lt;1.25.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017196" version="1" comment="libsixel-bash-completion is &lt;1.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017197" version="1" comment="libsixel-devel is &lt;1.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017198" version="1" comment="libsixel-utils is &lt;1.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017199" version="1" comment="libsixel-zsh-completion is &lt;1.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017200" version="1" comment="libsixel1 is &lt;1.10.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017201" version="1" comment="python311-Django is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017202" version="1" comment="python312-Django is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017203" version="1" comment="python313-Django is &lt;5.2.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017204" version="1" comment="python311-Django4 is &lt;4.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017205" version="1" comment="python312-Django4 is &lt;4.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017206" version="1" comment="python313-Django4 is &lt;4.2.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017207" version="1" comment="traefik is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017208" version="1" comment="trivy is &lt;0.65.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017213" version="1" comment="libQt5Pdf5 is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017214" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017215" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017216" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017217" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017218" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017219" version="1" comment="libqt5-qtwebengine is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017220" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017221" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017222" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017318" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017319" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017320" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017321" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017322" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017323" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017324" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.462-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017326" version="1" comment="kernel-macros is &lt;6.16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017327" version="1" comment="kernel-source is &lt;6.16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017328" version="1" comment="kernel-source-vanilla is &lt;6.16.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017385" version="1" comment="perl-Cpanel-JSON-XS is &lt;4.400.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017386" version="1" comment="perl-JSON-XS is &lt;4.40.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017387" version="1" comment="python311-deepdiff is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017388" version="1" comment="python312-deepdiff is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017389" version="1" comment="python313-deepdiff is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017390" version="1" comment="warewulf4 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017391" version="1" comment="warewulf4-dracut is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017392" version="1" comment="warewulf4-man is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017393" version="1" comment="warewulf4-overlay is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017394" version="1" comment="warewulf4-overlay-rke2 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017395" version="1" comment="warewulf4-overlay-slurm is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017396" version="1" comment="warewulf4-reference-doc is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017656" version="1" comment="govulncheck-vulndb is &lt;0.0.20250908T141310-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017657" version="1" comment="python311-xmltodict is &lt;0.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017658" version="1" comment="python312-xmltodict is &lt;0.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017659" version="1" comment="python313-xmltodict is &lt;0.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017660" version="1" comment="rustup is &lt;1.28.2~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017661" version="1" comment="libtiff-devel is &lt;4.7.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017662" version="1" comment="libtiff-devel-32bit is &lt;4.7.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017663" version="1" comment="libtiff6 is &lt;4.7.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017664" version="1" comment="libtiff6-32bit is &lt;4.7.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017665" version="1" comment="tiff is &lt;4.7.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017666" version="1" comment="trivy is &lt;0.66.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017815" version="1" comment="ImageMagick is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017816" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017817" version="1" comment="ImageMagick-devel is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017818" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017819" version="1" comment="ImageMagick-doc is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017820" version="1" comment="ImageMagick-extra is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017821" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017822" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017823" version="1" comment="libMagick++-devel is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017824" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017825" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017826" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017827" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017828" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017829" version="1" comment="perl-PerlMagick is &lt;7.1.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017831" version="1" comment="kernel-macros is &lt;6.16.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017832" version="1" comment="kernel-source is &lt;6.16.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017833" version="1" comment="kernel-source-vanilla is &lt;6.16.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017834" version="1" comment="libssh-config is &lt;0.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017835" version="1" comment="libssh-devel is &lt;0.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017836" version="1" comment="libssh4 is &lt;0.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017837" version="1" comment="libssh4-32bit is &lt;0.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017838" version="1" comment="orthanc-gdcm is &lt;1.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017839" version="1" comment="xen is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017840" version="1" comment="xen-devel is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017841" version="1" comment="xen-doc-html is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017842" version="1" comment="xen-libs is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017843" version="1" comment="xen-tools is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017844" version="1" comment="xen-tools-domU is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017845" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.1_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017973" version="1" comment="chromedriver is &lt;140.0.7339.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017974" version="1" comment="chromium is &lt;140.0.7339.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017975" version="1" comment="liblog4cxx-devel is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017976" version="1" comment="liblog4cxx15 is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018018" version="1" comment="cargo-audit is &lt;0.21.2~git0.18e58c2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018019" version="1" comment="cargo-c is &lt;0.10.3~git0.ee7d7ef-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018020" version="1" comment="cargo-packaging is &lt;1.3.0+0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018022" version="1" comment="kernel-macros is &lt;6.16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018023" version="1" comment="kernel-source is &lt;6.16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018024" version="1" comment="kernel-source-vanilla is &lt;6.16.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018185" version="1" comment="watchexec is &lt;2.3.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018311" version="1" comment="firefox-esr is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018312" version="1" comment="firefox-esr-branding-upstream is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018313" version="1" comment="firefox-esr-translations-common is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018314" version="1" comment="firefox-esr-translations-other is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018315" version="1" comment="tkimg is &lt;2.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018316" version="1" comment="tkimg-devel is &lt;2.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018408" version="1" comment="autogen is &lt;5.18.16-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018409" version="1" comment="autoopts is &lt;5.18.16-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018410" version="1" comment="libopts25 is &lt;5.18.16-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018411" version="1" comment="element-desktop is &lt;1.11.112-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018412" version="1" comment="element-web is &lt;1.11.112-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018636" version="1" comment="MozillaThunderbird is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018637" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018638" version="1" comment="MozillaThunderbird-translations-common is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018639" version="1" comment="MozillaThunderbird-translations-other is &lt;140.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018640" version="1" comment="coredns is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018641" version="1" comment="coredns-extras is &lt;1.12.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018642" version="1" comment="cups is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018643" version="1" comment="cups-client is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018644" version="1" comment="cups-config is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018645" version="1" comment="cups-ddk is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018646" version="1" comment="cups-devel is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018647" version="1" comment="cups-devel-32bit is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018648" version="1" comment="libcups2 is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018649" version="1" comment="libcups2-32bit is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018650" version="1" comment="libcupsimage2 is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018651" version="1" comment="libcupsimage2-32bit is &lt;2.4.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018652" version="1" comment="cups-filters is &lt;1.28.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018653" version="1" comment="cups-filters-devel is &lt;1.28.17-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018654" version="1" comment="govulncheck-vulndb is &lt;0.0.20250917T170349-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018729" version="1" comment="MozillaFirefox is &lt;143.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018730" version="1" comment="MozillaFirefox-branding-upstream is &lt;143.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018731" version="1" comment="MozillaFirefox-devel is &lt;143.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018732" version="1" comment="MozillaFirefox-translations-common is &lt;143.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018733" version="1" comment="MozillaFirefox-translations-other is &lt;143.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018734" version="1" comment="govulncheck-vulndb is &lt;0.0.20250918T182144-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018735" version="1" comment="mybatis is &lt;3.5.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018736" version="1" comment="mybatis-javadoc is &lt;3.5.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018737" version="1" comment="ognl is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018738" version="1" comment="ognl-javadoc is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018756" version="1" comment="rke2-1.33 is &lt;1.33.5+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018807" version="1" comment="tcpreplay is &lt;4.5.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018808" version="1" comment="tor is &lt;0.4.8.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019234" version="1" comment="bird3 is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019235" version="1" comment="bird3-doc is &lt;3.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019236" version="1" comment="expat is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019237" version="1" comment="libexpat-devel is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019238" version="1" comment="libexpat-devel-32bit is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019239" version="1" comment="libexpat1 is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019240" version="1" comment="libexpat1-32bit is &lt;2.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019241" version="1" comment="govulncheck-vulndb is &lt;0.0.20250922T204835-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019387" version="1" comment="avahi is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019388" version="1" comment="avahi-autoipd is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019389" version="1" comment="avahi-compat-howl-devel is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019390" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019391" version="1" comment="avahi-lang is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019392" version="1" comment="avahi-utils is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019393" version="1" comment="libavahi-client3 is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019394" version="1" comment="libavahi-client3-32bit is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019395" version="1" comment="libavahi-common3 is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019396" version="1" comment="libavahi-common3-32bit is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019397" version="1" comment="libavahi-core7 is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019398" version="1" comment="libavahi-devel is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019399" version="1" comment="libavahi-libevent1 is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019400" version="1" comment="libdns_sd is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019401" version="1" comment="libdns_sd-32bit is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019402" version="1" comment="libhowl0 is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019403" version="1" comment="python311-avahi is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019404" version="1" comment="python312-avahi is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019405" version="1" comment="python313-avahi is &lt;0.8-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019447" version="1" comment="govulncheck-vulndb is &lt;0.0.20250924T192141-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019448" version="1" comment="krita is &lt;5.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019449" version="1" comment="krita-devel is &lt;5.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019450" version="1" comment="krita-lang is &lt;5.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019677" version="1" comment="chromedriver is &lt;140.0.7339.207-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019678" version="1" comment="chromium is &lt;140.0.7339.207-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019679" version="1" comment="openbao is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019680" version="1" comment="openbao-agent is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019681" version="1" comment="openbao-cassandra-database-plugin is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019682" version="1" comment="openbao-influxdb-database-plugin is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019683" version="1" comment="openbao-mysql-database-plugin is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019684" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019685" version="1" comment="openbao-postgresql-database-plugin is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019686" version="1" comment="openbao-server is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019687" version="1" comment="postgresql17 is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019688" version="1" comment="postgresql17-contrib is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019689" version="1" comment="postgresql17-devel is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019690" version="1" comment="postgresql17-docs is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019691" version="1" comment="postgresql17-llvmjit is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019692" version="1" comment="postgresql17-llvmjit-devel is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019693" version="1" comment="postgresql17-plperl is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019694" version="1" comment="postgresql17-plpython is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019695" version="1" comment="postgresql17-pltcl is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019696" version="1" comment="postgresql17-server is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019697" version="1" comment="postgresql17-server-devel is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019698" version="1" comment="postgresql17-test is &lt;17.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019699" version="1" comment="traefik2 is &lt;2.11.29-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019700" version="1" comment="tree-sitter-ruby is &lt;0.23.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019701" version="1" comment="tree-sitter-ruby-devel is &lt;0.23.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019861" version="1" comment="cJSON-devel is &lt;1.7.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019862" version="1" comment="libcjson1 is &lt;1.7.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019863" version="1" comment="gimp is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019864" version="1" comment="gimp-devel is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019865" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019866" version="1" comment="gimp-lang is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019867" version="1" comment="gimp-plugin-aa is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019868" version="1" comment="gimp-plugin-python3 is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019869" version="1" comment="gimp-vala is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019870" version="1" comment="libgimp-3_0-0 is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019871" version="1" comment="libgimpui-3_0-0 is &lt;3.0.4-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019873" version="1" comment="kernel-macros is &lt;6.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019874" version="1" comment="kernel-source is &lt;6.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019875" version="1" comment="kernel-source-vanilla is &lt;6.16.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019876" version="1" comment="kubecolor is &lt;0.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019877" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020022" version="1" comment="afterburn is &lt;5.9.0.git21.a73f509-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020023" version="1" comment="afterburn-dracut is &lt;5.9.0.git21.a73f509-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020024" version="1" comment="docker-stable is &lt;24.0.9_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020025" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020026" version="1" comment="docker-stable-buildx is &lt;0.25.0-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020027" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020028" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020029" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020072" version="1" comment="curl is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020073" version="1" comment="curl-fish-completion is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020074" version="1" comment="curl-zsh-completion is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020075" version="1" comment="libcurl-devel is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020076" version="1" comment="libcurl-devel-32bit is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020077" version="1" comment="libcurl-devel-doc is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020078" version="1" comment="libcurl4 is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020079" version="1" comment="libcurl4-32bit is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020080" version="1" comment="wcurl is &lt;8.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020081" version="1" comment="jupyter-jupyterlab is &lt;4.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020082" version="1" comment="python311-jupyterlab is &lt;4.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020083" version="1" comment="python312-jupyterlab is &lt;4.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020084" version="1" comment="python313-jupyterlab is &lt;4.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020085" version="1" comment="libsuricata8_0_1 is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020086" version="1" comment="suricata is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020087" version="1" comment="suricata-devel is &lt;8.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020145" version="1" comment="MozillaFirefox is &lt;143.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020146" version="1" comment="MozillaFirefox-branding-upstream is &lt;143.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020147" version="1" comment="MozillaFirefox-devel is &lt;143.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020148" version="1" comment="MozillaFirefox-translations-common is &lt;143.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020149" version="1" comment="MozillaFirefox-translations-other is &lt;143.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020150" version="1" comment="azure-storage-azcopy is &lt;10.30.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020151" version="1" comment="libvmtools-devel is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020152" version="1" comment="libvmtools0 is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020153" version="1" comment="open-vm-tools is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020154" version="1" comment="open-vm-tools-containerinfo is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020155" version="1" comment="open-vm-tools-desktop is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020156" version="1" comment="open-vm-tools-salt-minion is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020157" version="1" comment="open-vm-tools-sdmp is &lt;13.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020158" version="1" comment="python311-Django4 is &lt;4.2.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020159" version="1" comment="python312-Django4 is &lt;4.2.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020160" version="1" comment="python313-Django4 is &lt;4.2.25-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020178" version="1" comment="logback is &lt;1.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020179" version="1" comment="logback-access is &lt;1.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020180" version="1" comment="logback-examples is &lt;1.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020181" version="1" comment="logback-javadoc is &lt;1.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020182" version="1" comment="python311-Django is &lt;5.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020183" version="1" comment="python312-Django is &lt;5.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020184" version="1" comment="python313-Django is &lt;5.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020185" version="1" comment="haproxy is &lt;3.2.6+git0.81568b2d1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020186" version="1" comment="redis is &lt;8.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020187" version="1" comment="chromedriver is &lt;141.0.7390.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020188" version="1" comment="chromium is &lt;141.0.7390.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020193" version="1" comment="gimp is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020194" version="1" comment="gimp-devel is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020195" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020196" version="1" comment="gimp-lang is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020197" version="1" comment="gimp-plugin-aa is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020198" version="1" comment="gimp-plugin-python3 is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020199" version="1" comment="gimp-vala is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020200" version="1" comment="libgimp-3_0-0 is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020201" version="1" comment="libgimpui-3_0-0 is &lt;3.0.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020292" version="1" comment="matrix-synapse is &lt;1.139.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020293" version="1" comment="valkey is &lt;8.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020294" version="1" comment="valkey-compat-redis is &lt;8.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020295" version="1" comment="valkey-devel is &lt;8.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020335" version="1" comment="ansible-11 is &lt;11.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020336" version="1" comment="digger-cli is &lt;0.6.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020337" version="1" comment="digger-cli-bash-completion is &lt;0.6.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020338" version="1" comment="digger-cli-fish-completion is &lt;0.6.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020339" version="1" comment="digger-cli-zsh-completion is &lt;0.6.127-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020340" version="1" comment="glow is &lt;2.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020341" version="1" comment="glow-bash-completion is &lt;2.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020342" version="1" comment="glow-fish-completion is &lt;2.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020343" version="1" comment="glow-zsh-completion is &lt;2.1.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020344" version="1" comment="go1.24 is &lt;1.24.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020345" version="1" comment="go1.24-doc is &lt;1.24.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020346" version="1" comment="go1.24-libstd is &lt;1.24.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020347" version="1" comment="go1.24-race is &lt;1.24.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020348" version="1" comment="go1.25 is &lt;1.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020349" version="1" comment="go1.25-doc is &lt;1.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020350" version="1" comment="go1.25-libstd is &lt;1.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020351" version="1" comment="go1.25-race is &lt;1.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020352" version="1" comment="grafana is &lt;11.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020353" version="1" comment="libexslt0 is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020354" version="1" comment="libxslt-devel is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020355" version="1" comment="libxslt-devel-32bit is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020356" version="1" comment="libxslt-tools is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020357" version="1" comment="libxslt1 is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020358" version="1" comment="libxslt1-32bit is &lt;1.1.43-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020359" version="1" comment="pgadmin4 is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020360" version="1" comment="pgadmin4-cloud is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020361" version="1" comment="pgadmin4-desktop is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020362" version="1" comment="pgadmin4-doc is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020363" version="1" comment="pgadmin4-web-uwsgi is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020364" version="1" comment="system-user-pgadmin is &lt;9.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020365" version="1" comment="python311-python-socketio is &lt;5.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020366" version="1" comment="python312-python-socketio is &lt;5.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020367" version="1" comment="python313-python-socketio is &lt;5.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020368" version="1" comment="libruby3_4-3_4 is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020369" version="1" comment="ruby3.4 is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020370" version="1" comment="ruby3.4-devel is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020371" version="1" comment="ruby3.4-devel-extra is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020372" version="1" comment="ruby3.4-doc is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020373" version="1" comment="ruby3.4-doc-ri is &lt;3.4.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020374" version="1" comment="weblate is &lt;5.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020487" version="1" comment="distrobuilder is &lt;3.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020488" version="1" comment="forgejo is &lt;12.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020489" version="1" comment="forgejo-apparmor is &lt;12.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020490" version="1" comment="forgejo-environment-to-ini is &lt;12.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020491" version="1" comment="forgejo-firewalld is &lt;12.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020492" version="1" comment="forgejo-selinux is &lt;12.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020493" version="1" comment="forgejo-longterm is &lt;11.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020494" version="1" comment="forgejo-longterm-apparmor is &lt;11.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020495" version="1" comment="forgejo-longterm-environment-to-ini is &lt;11.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020496" version="1" comment="forgejo-longterm-firewalld is &lt;11.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020497" version="1" comment="forgejo-longterm-selinux is &lt;11.0.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020498" version="1" comment="gitea-tea is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020499" version="1" comment="gitea-tea-bash-completion is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020500" version="1" comment="gitea-tea-zsh-completion is &lt;0.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020501" version="1" comment="headscale is &lt;0.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020502" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.19-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020668" version="1" comment="chromedriver is &lt;141.0.7390.65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020669" version="1" comment="chromium is &lt;141.0.7390.65-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020670" version="1" comment="ruby3.4-rubygem-rack-session is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020671" version="1" comment="golang-github-v2fly-v2ray-core is &lt;5.40.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020672" version="1" comment="v2ray-core is &lt;5.40.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020701" version="1" comment="perl-CGI-Simple is &lt;1.282.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020844" version="1" comment="exim is &lt;4.98.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020845" version="1" comment="eximon is &lt;4.98.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020846" version="1" comment="eximstats-html is &lt;4.98.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020847" version="1" comment="libcryptopp-devel is &lt;8.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020848" version="1" comment="libcryptopp8_9_0 is &lt;8.9.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020849" version="1" comment="lsd is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020850" version="1" comment="python311-Authlib is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020851" version="1" comment="python312-Authlib is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020852" version="1" comment="python313-Authlib is &lt;1.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020853" version="1" comment="libQt6Svg6 is &lt;6.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020854" version="1" comment="libQt6SvgWidgets6 is &lt;6.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020855" version="1" comment="qt6-svg-devel is &lt;6.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020856" version="1" comment="qt6-svg-examples is &lt;6.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020857" version="1" comment="qt6-svg-private-devel is &lt;6.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021445" version="1" comment="alloy is &lt;1.11.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021446" version="1" comment="firefox-esr is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021447" version="1" comment="firefox-esr-branding-upstream is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021448" version="1" comment="firefox-esr-translations-common is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021449" version="1" comment="firefox-esr-translations-other is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021450" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021451" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021452" version="1" comment="libsoup-devel is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021453" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021454" version="1" comment="libsoup-lang is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021455" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021456" version="1" comment="python3-gi-docgen is &lt;2025.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021457" version="1" comment="libtiff-devel is &lt;4.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021458" version="1" comment="libtiff-devel-32bit is &lt;4.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021459" version="1" comment="libtiff6 is &lt;4.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021460" version="1" comment="libtiff6-32bit is &lt;4.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021461" version="1" comment="tiff is &lt;4.7.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021462" version="1" comment="libwireshark18 is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021463" version="1" comment="libwiretap15 is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021464" version="1" comment="libwsutil16 is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021465" version="1" comment="wireshark is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021466" version="1" comment="wireshark-devel is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021467" version="1" comment="wireshark-ui-qt is &lt;4.4.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022505" version="1" comment="python311-ldap is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022506" version="1" comment="python312-ldap is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022507" version="1" comment="python313-ldap is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022508" version="1" comment="ansible-core-2.18 is &lt;2.18.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022509" version="1" comment="ansible-test-2.18 is &lt;2.18.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022510" version="1" comment="chromedriver is &lt;141.0.7390.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022511" version="1" comment="chromium is &lt;141.0.7390.107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022512" version="1" comment="ffmpeg-4 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022513" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022514" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022515" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022516" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022517" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022518" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022519" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022520" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022521" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022522" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022523" version="1" comment="libavcodec58_134 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022524" version="1" comment="libavcodec58_134-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022525" version="1" comment="libavdevice58_13 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022526" version="1" comment="libavdevice58_13-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022527" version="1" comment="libavfilter7_110 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022528" version="1" comment="libavfilter7_110-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022529" version="1" comment="libavformat58_76 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022530" version="1" comment="libavformat58_76-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022531" version="1" comment="libavresample4_0 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022532" version="1" comment="libavresample4_0-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022533" version="1" comment="libavutil56_70 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022534" version="1" comment="libavutil56_70-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022535" version="1" comment="libpostproc55_9 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022536" version="1" comment="libpostproc55_9-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022537" version="1" comment="libswresample3_9 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022538" version="1" comment="libswresample3_9-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022539" version="1" comment="libswscale5_9 is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022540" version="1" comment="libswscale5_9-32bit is &lt;4.4.6-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022541" version="1" comment="libexslt0 is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022542" version="1" comment="libxslt-devel is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022543" version="1" comment="libxslt-devel-32bit is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022544" version="1" comment="libxslt-tools is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022545" version="1" comment="libxslt1 is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022546" version="1" comment="libxslt1-32bit is &lt;1.1.43-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022547" version="1" comment="ruby3.4-rubygem-rack-2.2 is &lt;2.2.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022548" version="1" comment="git-lfs is &lt;3.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022549" version="1" comment="icinga2 is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022550" version="1" comment="icinga2-bin is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022551" version="1" comment="icinga2-common is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022552" version="1" comment="icinga2-doc is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022553" version="1" comment="icinga2-ido-mysql is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022554" version="1" comment="icinga2-ido-pgsql is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022555" version="1" comment="nano-icinga2 is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022556" version="1" comment="vim-icinga2 is &lt;2.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022557" version="1" comment="MozillaFirefox is &lt;144.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022558" version="1" comment="MozillaFirefox-branding-upstream is &lt;144.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022559" version="1" comment="MozillaFirefox-devel is &lt;144.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022560" version="1" comment="MozillaFirefox-translations-common is &lt;144.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022561" version="1" comment="MozillaFirefox-translations-other is &lt;144.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022562" version="1" comment="MozillaThunderbird is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022563" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022564" version="1" comment="MozillaThunderbird-translations-common is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022565" version="1" comment="MozillaThunderbird-translations-other is &lt;140.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022566" version="1" comment="ollama is &lt;0.12.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022567" version="1" comment="libpoppler-cpp2 is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022568" version="1" comment="libpoppler-cpp2-32bit is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022569" version="1" comment="libpoppler-devel is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022570" version="1" comment="libpoppler-glib-devel is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022571" version="1" comment="libpoppler-glib8 is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022572" version="1" comment="libpoppler-glib8-32bit is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022573" version="1" comment="libpoppler153 is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022574" version="1" comment="libpoppler153-32bit is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022575" version="1" comment="poppler-tools is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022576" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.09.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022577" version="1" comment="ctdb is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022578" version="1" comment="ctdb-pcp-pmda is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022579" version="1" comment="ldb-tools is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022580" version="1" comment="libldb-devel is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022581" version="1" comment="libldb2 is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022582" version="1" comment="libldb2-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022583" version="1" comment="python3-ldb is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022584" version="1" comment="python3-ldb-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022585" version="1" comment="samba is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022586" version="1" comment="samba-ad-dc is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022587" version="1" comment="samba-ad-dc-libs is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022588" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022589" version="1" comment="samba-ceph is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022590" version="1" comment="samba-client is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022591" version="1" comment="samba-client-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022592" version="1" comment="samba-client-libs is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022593" version="1" comment="samba-client-libs-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022594" version="1" comment="samba-dcerpc is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022595" version="1" comment="samba-devel is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022596" version="1" comment="samba-devel-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022597" version="1" comment="samba-doc is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022598" version="1" comment="samba-dsdb-modules is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022599" version="1" comment="samba-gpupdate is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022600" version="1" comment="samba-ldb-ldap is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022601" version="1" comment="samba-libs is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022602" version="1" comment="samba-libs-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022603" version="1" comment="samba-libs-python3 is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022604" version="1" comment="samba-libs-python3-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022605" version="1" comment="samba-python3 is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022606" version="1" comment="samba-test is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022607" version="1" comment="samba-tool is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022608" version="1" comment="samba-winbind is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022609" version="1" comment="samba-winbind-libs is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022610" version="1" comment="samba-winbind-libs-32bit is &lt;4.22.5+git.431.dc5a539f124-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022769" version="1" comment="ImageMagick is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022770" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022771" version="1" comment="ImageMagick-devel is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022772" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022773" version="1" comment="ImageMagick-doc is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022774" version="1" comment="ImageMagick-extra is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022775" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022776" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022777" version="1" comment="libMagick++-devel is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022778" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022779" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022780" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022781" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022782" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022783" version="1" comment="perl-PerlMagick is &lt;7.1.2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022784" version="1" comment="binutils is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022785" version="1" comment="binutils-devel is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022786" version="1" comment="binutils-devel-32bit is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022787" version="1" comment="gprofng is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022788" version="1" comment="libctf-nobfd0 is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022789" version="1" comment="libctf0 is &lt;2.45-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022790" version="1" comment="cargo-audit-advisory-db is &lt;20251021-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022791" version="1" comment="fetchmail is &lt;6.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022792" version="1" comment="fetchmailconf is &lt;6.5.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022793" version="1" comment="git-bug is &lt;0.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022794" version="1" comment="git-bug-bash-completion is &lt;0.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022795" version="1" comment="git-bug-fish-completion is &lt;0.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022796" version="1" comment="git-bug-zsh-completion is &lt;0.10.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022797" version="1" comment="istioctl is &lt;1.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022798" version="1" comment="istioctl-bash-completion is &lt;1.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022799" version="1" comment="istioctl-zsh-completion is &lt;1.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022800" version="1" comment="sccache is &lt;0.12.0~1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023015" version="1" comment="bleachbit is &lt;5.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023016" version="1" comment="bleachbit-lang is &lt;5.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023017" version="1" comment="python311-uv is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023018" version="1" comment="python312-uv is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023019" version="1" comment="python313-uv is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023020" version="1" comment="uv-bash-completion is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023021" version="1" comment="uv-fish-completion is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023022" version="1" comment="uv-zsh-completion is &lt;0.9.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023302" version="1" comment="bind is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023303" version="1" comment="bind-doc is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023304" version="1" comment="bind-modules-bdbhpt is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023305" version="1" comment="bind-modules-generic is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023306" version="1" comment="bind-modules-ldap is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023307" version="1" comment="bind-modules-mysql is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023308" version="1" comment="bind-modules-perl is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023309" version="1" comment="bind-modules-sqlite3 is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023310" version="1" comment="bind-utils is &lt;9.20.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023311" version="1" comment="java-11-openjdk is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023312" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023313" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023314" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023315" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023316" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023317" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023318" version="1" comment="java-17-openjdk is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023319" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023320" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023321" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023322" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023323" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023324" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023325" version="1" comment="micropython is &lt;1.26.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023326" version="1" comment="mpremote is &lt;1.26.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023327" version="1" comment="mpy-tools is &lt;1.26.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023328" version="1" comment="openbao is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023329" version="1" comment="openbao-agent is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023330" version="1" comment="openbao-cassandra-database-plugin is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023331" version="1" comment="openbao-influxdb-database-plugin is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023332" version="1" comment="openbao-mysql-database-plugin is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023333" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023334" version="1" comment="openbao-postgresql-database-plugin is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023335" version="1" comment="openbao-server is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023336" version="1" comment="python311-pypdf is &lt;6.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023337" version="1" comment="python312-pypdf is &lt;6.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023338" version="1" comment="python313-pypdf is &lt;6.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023696" version="1" comment="chromedriver is &lt;141.0.7390.122-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023697" version="1" comment="chromium is &lt;141.0.7390.122-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023698" version="1" comment="govulncheck-vulndb is &lt;0.0.20251023T162509-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023699" version="1" comment="netty is &lt;4.1.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023700" version="1" comment="netty-bom is &lt;4.1.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023701" version="1" comment="netty-javadoc is &lt;4.1.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023702" version="1" comment="netty-parent is &lt;4.1.128-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023703" version="1" comment="libunbound8 is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023704" version="1" comment="python3-unbound is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023705" version="1" comment="unbound is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023706" version="1" comment="unbound-anchor is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023707" version="1" comment="unbound-devel is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023708" version="1" comment="unbound-munin is &lt;1.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023905" version="1" comment="grafana is &lt;11.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023906" version="1" comment="java-21-openjdk is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023907" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023908" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023909" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023910" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023911" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023912" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023914" version="1" comment="kernel-macros is &lt;6.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023915" version="1" comment="kernel-source is &lt;6.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023916" version="1" comment="kernel-source-vanilla is &lt;6.17.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023917" version="1" comment="libluajit-5_1-2 is &lt;2.1.20250826-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023918" version="1" comment="libluajit-5_1-2-32bit is &lt;2.1.20250826-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023919" version="1" comment="luajit is &lt;2.1.20250826-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023920" version="1" comment="luajit-devel is &lt;2.1.20250826-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023921" version="1" comment="xen is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023922" version="1" comment="xen-devel is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023923" version="1" comment="xen-doc-html is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023924" version="1" comment="xen-libs is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023925" version="1" comment="xen-tools is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023926" version="1" comment="xen-tools-domU is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023927" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.1_06-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024091" version="1" comment="java-25-openjdk is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024092" version="1" comment="java-25-openjdk-demo is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024093" version="1" comment="java-25-openjdk-devel is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024094" version="1" comment="java-25-openjdk-headless is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024095" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024096" version="1" comment="java-25-openjdk-jmods is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024097" version="1" comment="java-25-openjdk-src is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024169" version="1" comment="coreboot-utils is &lt;25.09-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024170" version="1" comment="dovecot24 is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024171" version="1" comment="dovecot24-backend-mysql is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024172" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024173" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024174" version="1" comment="dovecot24-devel is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024175" version="1" comment="dovecot24-fts is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024176" version="1" comment="dovecot24-fts-flatcurve is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024177" version="1" comment="dovecot24-fts-solr is &lt;2.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024178" version="1" comment="kea is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024179" version="1" comment="kea-devel is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024180" version="1" comment="kea-doc is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024181" version="1" comment="kea-hooks is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024182" version="1" comment="libkea-asiodns62 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024183" version="1" comment="libkea-asiolink88 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024184" version="1" comment="libkea-cc82 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024185" version="1" comment="libkea-cfgrpt3 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024186" version="1" comment="libkea-config83 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024187" version="1" comment="libkea-cryptolink64 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024188" version="1" comment="libkea-d2srv63 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024189" version="1" comment="libkea-database76 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024190" version="1" comment="libkea-dhcp109 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024191" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024192" version="1" comment="libkea-dhcpsrv131 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024193" version="1" comment="libkea-dns71 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024194" version="1" comment="libkea-eval84 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024195" version="1" comment="libkea-exceptions45 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024196" version="1" comment="libkea-hooks120 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024197" version="1" comment="libkea-http87 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024198" version="1" comment="libkea-log-interprocess3 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024199" version="1" comment="libkea-log75 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024200" version="1" comment="libkea-mysql88 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024201" version="1" comment="libkea-pgsql88 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024202" version="1" comment="libkea-process90 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024203" version="1" comment="libkea-stats53 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024204" version="1" comment="libkea-tcp33 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024205" version="1" comment="libkea-util-io12 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024206" version="1" comment="libkea-util101 is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024207" version="1" comment="python3-kea is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024208" version="1" comment="libmozjs-115-0 is &lt;115.15.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024209" version="1" comment="mozjs115 is &lt;115.15.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024210" version="1" comment="mozjs115-devel is &lt;115.15.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024211" version="1" comment="libmozjs-128-0 is &lt;128.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024212" version="1" comment="mozjs128 is &lt;128.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024213" version="1" comment="mozjs128-devel is &lt;128.14.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024214" version="1" comment="ongres-scram is &lt;3.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024215" version="1" comment="ongres-scram-client is &lt;3.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024216" version="1" comment="ongres-scram-javadoc is &lt;3.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024217" version="1" comment="strongswan is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024218" version="1" comment="strongswan-doc is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024219" version="1" comment="strongswan-fips is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024220" version="1" comment="strongswan-ipsec is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024221" version="1" comment="strongswan-mysql is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024222" version="1" comment="strongswan-nm is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024223" version="1" comment="strongswan-sqlite is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024224" version="1" comment="libtiff-devel is &lt;4.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024225" version="1" comment="libtiff-devel-32bit is &lt;4.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024226" version="1" comment="libtiff6 is &lt;4.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024227" version="1" comment="libtiff6-32bit is &lt;4.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024228" version="1" comment="tiff is &lt;4.7.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024229" version="1" comment="xorg-x11-server is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024230" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024231" version="1" comment="xorg-x11-server-extra is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024232" version="1" comment="xorg-x11-server-sdk is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024233" version="1" comment="xorg-x11-server-source is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024234" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.15-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024235" version="1" comment="xwayland is &lt;24.1.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024236" version="1" comment="xwayland-devel is &lt;24.1.8-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024423" version="1" comment="ImageMagick is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024424" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024425" version="1" comment="ImageMagick-devel is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024426" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024427" version="1" comment="ImageMagick-doc is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024428" version="1" comment="ImageMagick-extra is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024429" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024430" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024431" version="1" comment="libMagick++-devel is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024432" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024433" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024434" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024435" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024436" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024437" version="1" comment="perl-PerlMagick is &lt;7.1.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024438" version="1" comment="MozillaFirefox is &lt;144.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024439" version="1" comment="MozillaFirefox-branding-upstream is &lt;144.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024440" version="1" comment="MozillaFirefox-devel is &lt;144.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024441" version="1" comment="MozillaFirefox-translations-common is &lt;144.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024442" version="1" comment="MozillaFirefox-translations-other is &lt;144.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024443" version="1" comment="chromedriver is &lt;142.0.7444.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024444" version="1" comment="chromium is &lt;142.0.7444.59-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024445" version="1" comment="libmozjs-140-0 is &lt;140.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024446" version="1" comment="mozjs140 is &lt;140.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024447" version="1" comment="mozjs140-devel is &lt;140.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024541" version="1" comment="gomuks is &lt;0.3.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024542" version="1" comment="java-11-openj9 is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024543" version="1" comment="java-11-openj9-demo is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024544" version="1" comment="java-11-openj9-devel is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024545" version="1" comment="java-11-openj9-headless is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024546" version="1" comment="java-11-openj9-javadoc is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024547" version="1" comment="java-11-openj9-jmods is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024548" version="1" comment="java-11-openj9-src is &lt;11.0.29.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024549" version="1" comment="java-17-openj9 is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024550" version="1" comment="java-17-openj9-demo is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024551" version="1" comment="java-17-openj9-devel is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024552" version="1" comment="java-17-openj9-headless is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024553" version="1" comment="java-17-openj9-javadoc is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024554" version="1" comment="java-17-openj9-jmods is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024555" version="1" comment="java-17-openj9-src is &lt;17.0.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024556" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024557" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024558" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024559" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024560" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024561" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024562" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024563" version="1" comment="java-21-openj9 is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024564" version="1" comment="java-21-openj9-demo is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024565" version="1" comment="java-21-openj9-devel is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024566" version="1" comment="java-21-openj9-headless is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024567" version="1" comment="java-21-openj9-javadoc is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024568" version="1" comment="java-21-openj9-jmods is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024569" version="1" comment="java-21-openj9-src is &lt;21.0.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024570" version="1" comment="java-25-openj9 is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024571" version="1" comment="java-25-openj9-demo is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024572" version="1" comment="java-25-openj9-devel is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024573" version="1" comment="java-25-openj9-headless is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024574" version="1" comment="java-25-openj9-javadoc is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024575" version="1" comment="java-25-openj9-jmods is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024576" version="1" comment="java-25-openj9-src is &lt;25.0.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024608" version="1" comment="govulncheck-vulndb is &lt;0.0.20251029T215107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024609" version="1" comment="python311-starlette is &lt;0.49.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024610" version="1" comment="python312-starlette is &lt;0.49.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024611" version="1" comment="python313-starlette is &lt;0.49.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024662" version="1" comment="kumactl is &lt;2.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024663" version="1" comment="kumactl-bash-completion is &lt;2.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024664" version="1" comment="kumactl-fish-completion is &lt;2.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024665" version="1" comment="kumactl-zsh-completion is &lt;2.12.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024666" version="1" comment="redis is &lt;8.2.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025063" version="1" comment="python311-djangorestframework-simplejwt is &lt;5.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025064" version="1" comment="python312-djangorestframework-simplejwt is &lt;5.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025065" version="1" comment="python313-djangorestframework-simplejwt is &lt;5.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025066" version="1" comment="OpenSMTPD is &lt;7.8.0p0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025067" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025068" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025069" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025070" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025071" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025072" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025073" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.472-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025075" version="1" comment="kernel-macros is &lt;6.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025076" version="1" comment="kernel-source is &lt;6.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025077" version="1" comment="kernel-source-vanilla is &lt;6.17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025078" version="1" comment="kubecolor is &lt;0.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025079" version="1" comment="zellij is &lt;0.43.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025080" version="1" comment="zellij-bash-completion is &lt;0.43.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025081" version="1" comment="zellij-fish-completion is &lt;0.43.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025082" version="1" comment="zellij-zsh-completion is &lt;0.43.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025083" version="1" comment="runc is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025084" version="1" comment="erlang is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025085" version="1" comment="erlang-debugger is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025086" version="1" comment="erlang-debugger-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025087" version="1" comment="erlang-dialyzer is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025088" version="1" comment="erlang-dialyzer-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025089" version="1" comment="erlang-diameter is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025090" version="1" comment="erlang-diameter-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025091" version="1" comment="erlang-doc is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025092" version="1" comment="erlang-epmd is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025093" version="1" comment="erlang-et is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025094" version="1" comment="erlang-et-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025095" version="1" comment="erlang-jinterface is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025096" version="1" comment="erlang-jinterface-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025097" version="1" comment="erlang-observer is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025098" version="1" comment="erlang-observer-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025099" version="1" comment="erlang-reltool is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025100" version="1" comment="erlang-reltool-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025101" version="1" comment="erlang-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025102" version="1" comment="erlang-wx is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025103" version="1" comment="erlang-wx-src is &lt;28.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025104" version="1" comment="ghostscript is &lt;10.06.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025105" version="1" comment="ghostscript-devel is &lt;10.06.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025106" version="1" comment="ghostscript-x11 is &lt;10.06.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025107" version="1" comment="python311-Django4 is &lt;4.2.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025108" version="1" comment="python312-Django4 is &lt;4.2.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025109" version="1" comment="python313-Django4 is &lt;4.2.26-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025194" version="1" comment="google-osconfig-agent is &lt;20251028.00-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025195" version="1" comment="govulncheck-vulndb is &lt;0.0.20251105T184115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025196" version="1" comment="opentofu is &lt;1.10.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025197" version="1" comment="python311-Django is &lt;5.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025198" version="1" comment="python312-Django is &lt;5.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025199" version="1" comment="python313-Django is &lt;5.2.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025200" version="1" comment="python315 is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025201" version="1" comment="python315-curses is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025202" version="1" comment="python315-dbm is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025203" version="1" comment="python315-idle is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025204" version="1" comment="python315-profiling is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025205" version="1" comment="python315-tk is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025206" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025207" version="1" comment="libshibsp-lite12 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025208" version="1" comment="libshibsp12 is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025209" version="1" comment="shibboleth-sp is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025210" version="1" comment="shibboleth-sp-devel is &lt;3.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025211" version="1" comment="squid is &lt;7.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025212" version="1" comment="tomcat is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025213" version="1" comment="tomcat-admin-webapps is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025214" version="1" comment="tomcat-docs-webapp is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025215" version="1" comment="tomcat-el-3_0-api is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025216" version="1" comment="tomcat-embed is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025217" version="1" comment="tomcat-javadoc is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025218" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025219" version="1" comment="tomcat-jsvc is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025220" version="1" comment="tomcat-lib is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025221" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025222" version="1" comment="tomcat-webapps is &lt;9.0.111-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025223" version="1" comment="tomcat10 is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025224" version="1" comment="tomcat10-admin-webapps is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025225" version="1" comment="tomcat10-doc is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025226" version="1" comment="tomcat10-docs-webapp is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025227" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025228" version="1" comment="tomcat10-embed is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025229" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025230" version="1" comment="tomcat10-jsvc is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025231" version="1" comment="tomcat10-lib is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025232" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025233" version="1" comment="tomcat10-webapps is &lt;10.1.48-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025234" version="1" comment="tomcat11 is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025235" version="1" comment="tomcat11-admin-webapps is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025236" version="1" comment="tomcat11-doc is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025237" version="1" comment="tomcat11-docs-webapp is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025238" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025239" version="1" comment="tomcat11-embed is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025240" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025241" version="1" comment="tomcat11-jsvc is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025242" version="1" comment="tomcat11-lib is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025243" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025244" version="1" comment="tomcat11-webapps is &lt;11.0.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025245" version="1" comment="xen is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025246" version="1" comment="xen-devel is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025247" version="1" comment="xen-doc-html is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025248" version="1" comment="xen-libs is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025249" version="1" comment="xen-tools is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025250" version="1" comment="xen-tools-domU is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025251" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.20.1_08-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025252" version="1" comment="chromedriver is &lt;142.0.7444.134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025253" version="1" comment="chromium is &lt;142.0.7444.134-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025280" version="1" comment="incus is &lt;6.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025281" version="1" comment="incus-bash-completion is &lt;6.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025282" version="1" comment="incus-fish-completion is &lt;6.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025283" version="1" comment="incus-tools is &lt;6.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025284" version="1" comment="incus-zsh-completion is &lt;6.17-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025487" version="1" comment="hauler is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025488" version="1" comment="regclient is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025489" version="1" comment="regclient-bash-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025490" version="1" comment="regclient-fish-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025491" version="1" comment="regclient-zsh-completion is &lt;0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025492" version="1" comment="trivy is &lt;0.67.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025854" version="1" comment="binutils is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025855" version="1" comment="binutils-devel is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025856" version="1" comment="binutils-devel-32bit is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025857" version="1" comment="gprofng is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025858" version="1" comment="libctf-nobfd0 is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025859" version="1" comment="libctf0 is &lt;2.45-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025860" version="1" comment="containerd is &lt;1.7.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025861" version="1" comment="containerd-ctr is &lt;1.7.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025862" version="1" comment="containerd-devel is &lt;1.7.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025863" version="1" comment="python311-pdfminer.six is &lt;20251107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025864" version="1" comment="python312-pdfminer.six is &lt;20251107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025865" version="1" comment="python313-pdfminer.six is &lt;20251107-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025866" version="1" comment="tcpreplay is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025867" version="1" comment="go-sendxmpp is &lt;0.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025868" version="1" comment="helm is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025869" version="1" comment="helm-bash-completion is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025870" version="1" comment="helm-fish-completion is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025871" version="1" comment="helm-zsh-completion is &lt;3.19.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025872" version="1" comment="python311-Brotli is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025873" version="1" comment="python312-Brotli is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025874" version="1" comment="python313-Brotli is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025875" version="1" comment="python-Scrapy-doc is &lt;2.13.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025876" version="1" comment="python311-Scrapy is &lt;2.13.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025877" version="1" comment="python312-Scrapy is &lt;2.13.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025878" version="1" comment="python313-Scrapy is &lt;2.13.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025879" version="1" comment="weblate is &lt;5.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029349" version="1" comment="starboard is &lt;0.15.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029739" version="1" comment="MozillaFirefox is &lt;145.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029740" version="1" comment="MozillaFirefox-branding-upstream is &lt;145.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029741" version="1" comment="MozillaFirefox-devel is &lt;145.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029742" version="1" comment="MozillaFirefox-translations-common is &lt;145.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029743" version="1" comment="MozillaFirefox-translations-other is &lt;145.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029744" version="1" comment="chromedriver is &lt;142.0.7444.162-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029745" version="1" comment="chromium is &lt;142.0.7444.162-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029746" version="1" comment="teleport is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029747" version="1" comment="teleport-bash-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029748" version="1" comment="teleport-fdpass-teleport is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029749" version="1" comment="teleport-tbot is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029750" version="1" comment="teleport-tbot-bash-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029751" version="1" comment="teleport-tbot-zsh-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029752" version="1" comment="teleport-tctl is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029753" version="1" comment="teleport-tctl-bash-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029754" version="1" comment="teleport-tctl-zsh-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029755" version="1" comment="teleport-tsh is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029756" version="1" comment="teleport-tsh-bash-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029757" version="1" comment="teleport-tsh-zsh-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029758" version="1" comment="teleport-zsh-completion is &lt;17.7.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029788" version="1" comment="MozillaThunderbird is &lt;140.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029789" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029790" version="1" comment="MozillaThunderbird-translations-common is &lt;140.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029791" version="1" comment="MozillaThunderbird-translations-other is &lt;140.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029792" version="1" comment="itextpdf is &lt;5.5.13.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029793" version="1" comment="itextpdf-javadoc is &lt;5.5.13.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029887" version="1" comment="erlang27 is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029888" version="1" comment="erlang27-debugger is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029889" version="1" comment="erlang27-debugger-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029890" version="1" comment="erlang27-dialyzer is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029891" version="1" comment="erlang27-dialyzer-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029892" version="1" comment="erlang27-diameter is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029893" version="1" comment="erlang27-diameter-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029894" version="1" comment="erlang27-doc is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029895" version="1" comment="erlang27-epmd is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029896" version="1" comment="erlang27-et is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029897" version="1" comment="erlang27-et-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029898" version="1" comment="erlang27-jinterface is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029899" version="1" comment="erlang27-jinterface-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029900" version="1" comment="erlang27-observer is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029901" version="1" comment="erlang27-observer-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029902" version="1" comment="erlang27-reltool is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029903" version="1" comment="erlang27-reltool-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029904" version="1" comment="erlang27-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029905" version="1" comment="erlang27-wx is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029906" version="1" comment="erlang27-wx-src is &lt;27.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029907" version="1" comment="libIex-3_4-33 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029908" version="1" comment="libIex-3_4-33-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029909" version="1" comment="libIex-3_4-33-x86-64-v3 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029910" version="1" comment="libIlmThread-3_4-33 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029911" version="1" comment="libIlmThread-3_4-33-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029912" version="1" comment="libIlmThread-3_4-33-x86-64-v3 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029913" version="1" comment="libOpenEXR-3_4-33 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029914" version="1" comment="libOpenEXR-3_4-33-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029915" version="1" comment="libOpenEXR-3_4-33-x86-64-v3 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029916" version="1" comment="libOpenEXRCore-3_4-33 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029917" version="1" comment="libOpenEXRCore-3_4-33-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029918" version="1" comment="libOpenEXRCore-3_4-33-x86-64-v3 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029919" version="1" comment="libOpenEXRUtil-3_4-33 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029920" version="1" comment="libOpenEXRUtil-3_4-33-32bit is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029921" version="1" comment="libOpenEXRUtil-3_4-33-x86-64-v3 is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029922" version="1" comment="openexr is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029923" version="1" comment="openexr-devel is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029924" version="1" comment="openexr-doc is &lt;3.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029925" version="1" comment="python312 is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029926" version="1" comment="python312-32bit is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029927" version="1" comment="python312-curses is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029928" version="1" comment="python312-dbm is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029929" version="1" comment="python312-idle is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029930" version="1" comment="python312-tk is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029931" version="1" comment="python312-x86-64-v3 is &lt;3.12.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029932" version="1" comment="sbctl is &lt;0.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030033" version="1" comment="amazon-ssm-agent is &lt;3.3.3270.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030034" version="1" comment="chromedriver is &lt;142.0.7444.175-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030035" version="1" comment="chromium is &lt;142.0.7444.175-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030036" version="1" comment="libvirt is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030037" version="1" comment="libvirt-client is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030038" version="1" comment="libvirt-client-qemu is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030039" version="1" comment="libvirt-daemon is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030040" version="1" comment="libvirt-daemon-common is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030041" version="1" comment="libvirt-daemon-config-network is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030042" version="1" comment="libvirt-daemon-config-nwfilter is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030043" version="1" comment="libvirt-daemon-driver-libxl is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030044" version="1" comment="libvirt-daemon-driver-lxc is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030045" version="1" comment="libvirt-daemon-driver-network is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030046" version="1" comment="libvirt-daemon-driver-nodedev is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030047" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030048" version="1" comment="libvirt-daemon-driver-qemu is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030049" version="1" comment="libvirt-daemon-driver-secret is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030050" version="1" comment="libvirt-daemon-driver-storage is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030051" version="1" comment="libvirt-daemon-driver-storage-core is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030052" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030053" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030054" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030055" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030056" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030057" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030058" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030059" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030060" version="1" comment="libvirt-daemon-hooks is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030061" version="1" comment="libvirt-daemon-lock is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030062" version="1" comment="libvirt-daemon-log is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030063" version="1" comment="libvirt-daemon-lxc is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030064" version="1" comment="libvirt-daemon-plugin-lockd is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030065" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030066" version="1" comment="libvirt-daemon-proxy is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030067" version="1" comment="libvirt-daemon-qemu is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030068" version="1" comment="libvirt-daemon-xen is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030069" version="1" comment="libvirt-devel is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030070" version="1" comment="libvirt-doc is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030071" version="1" comment="libvirt-libs is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030072" version="1" comment="libvirt-nss is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030073" version="1" comment="libvirt-ssh-proxy is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030074" version="1" comment="wireshark-plugin-libvirt is &lt;11.9.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030075" version="1" comment="libeverest is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030076" version="1" comment="libeverest-x86-64-v3 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030077" version="1" comment="libmbedcrypto16 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030078" version="1" comment="libmbedcrypto16-x86-64-v3 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030079" version="1" comment="libmbedtls21 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030080" version="1" comment="libmbedtls21-x86-64-v3 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030081" version="1" comment="libmbedx509-7 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030082" version="1" comment="libmbedx509-7-x86-64-v3 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030083" version="1" comment="libp256m is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030084" version="1" comment="libp256m-x86-64-v3 is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030085" version="1" comment="mbedtls-devel is &lt;3.6.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030086" version="1" comment="python314 is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030087" version="1" comment="python314-curses is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030088" version="1" comment="python314-dbm is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030089" version="1" comment="python314-idle is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030090" version="1" comment="python314-tk is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030091" version="1" comment="python314-x86-64-v3 is &lt;3.14.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030110" version="1" comment="grub2 is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030111" version="1" comment="grub2-branding-upstream is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030112" version="1" comment="grub2-common is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030113" version="1" comment="grub2-i386-efi is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030114" version="1" comment="grub2-i386-efi-bls is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030115" version="1" comment="grub2-i386-efi-debug is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030116" version="1" comment="grub2-i386-efi-extras is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030117" version="1" comment="grub2-i386-pc is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030118" version="1" comment="grub2-i386-pc-debug is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030119" version="1" comment="grub2-i386-pc-extras is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030120" version="1" comment="grub2-i386-xen is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030121" version="1" comment="grub2-i386-xen-debug is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030122" version="1" comment="grub2-i386-xen-extras is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030123" version="1" comment="grub2-snapper-plugin is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030124" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030125" version="1" comment="grub2-x86_64-efi is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030126" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030127" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030128" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030129" version="1" comment="grub2-x86_64-xen is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030130" version="1" comment="grub2-x86_64-xen-debug is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030131" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030132" version="1" comment="python313 is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030133" version="1" comment="python313-32bit is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030134" version="1" comment="python313-curses is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030135" version="1" comment="python313-dbm is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030136" version="1" comment="python313-idle is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030137" version="1" comment="python313-tk is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030138" version="1" comment="python313-x86-64-v3 is &lt;3.13.9-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030139" version="1" comment="libipa_hbac-devel is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030140" version="1" comment="libipa_hbac0 is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030141" version="1" comment="libnfsidmap-sss is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030142" version="1" comment="libsss_certmap-devel is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030143" version="1" comment="libsss_certmap0 is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030144" version="1" comment="libsss_idmap-devel is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030145" version="1" comment="libsss_idmap0 is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030146" version="1" comment="libsss_nss_idmap-devel is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030147" version="1" comment="libsss_nss_idmap0 is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030148" version="1" comment="python3-ipa_hbac is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030149" version="1" comment="python3-sss-murmur is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030150" version="1" comment="python3-sss_nss_idmap is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030151" version="1" comment="python3-sssd-config is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030152" version="1" comment="sssd is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030153" version="1" comment="sssd-ad is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030154" version="1" comment="sssd-cifs-idmap-plugin is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030155" version="1" comment="sssd-dbus is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030156" version="1" comment="sssd-ipa is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030157" version="1" comment="sssd-kcm is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030158" version="1" comment="sssd-krb5 is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030159" version="1" comment="sssd-krb5-common is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030160" version="1" comment="sssd-ldap is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030161" version="1" comment="sssd-proxy is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030162" version="1" comment="sssd-tools is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030163" version="1" comment="sssd-winbind-idmap is &lt;2.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030619" version="1" comment="act is &lt;0.2.82-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030620" version="1" comment="ansible-12 is &lt;12.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030621" version="1" comment="ansible-core-2.19 is &lt;2.19.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030622" version="1" comment="ansible-test-2.19 is &lt;2.19.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030623" version="1" comment="blender-4.5 is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030624" version="1" comment="blender-4.5-demo is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030625" version="1" comment="blender-4.5-lang is &lt;4.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030626" version="1" comment="blender-5.0 is &lt;5.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030627" version="1" comment="blender-5.0-demo is &lt;5.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030628" version="1" comment="blender-5.0-lang is &lt;5.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030629" version="1" comment="curl is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030630" version="1" comment="curl-fish-completion is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030631" version="1" comment="curl-zsh-completion is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030632" version="1" comment="libcurl-devel is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030633" version="1" comment="libcurl-devel-32bit is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030634" version="1" comment="libcurl-devel-doc is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030635" version="1" comment="libcurl4 is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030636" version="1" comment="libcurl4-32bit is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030637" version="1" comment="wcurl is &lt;8.17.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031396" version="1" comment="fontforge is &lt;20251009-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031397" version="1" comment="fontforge-devel is &lt;20251009-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031398" version="1" comment="fontforge-doc is &lt;20251009-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031399" version="1" comment="libIex-3_4-33 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031400" version="1" comment="libIex-3_4-33-32bit is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031401" version="1" comment="libIex-3_4-33-x86-64-v3 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031402" version="1" comment="libIlmThread-3_4-33 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031403" version="1" comment="libIlmThread-3_4-33-32bit is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031404" version="1" comment="libIlmThread-3_4-33-x86-64-v3 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031405" version="1" comment="libOpenEXR-3_4-33 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031406" version="1" comment="libOpenEXR-3_4-33-32bit is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031407" version="1" comment="libOpenEXR-3_4-33-x86-64-v3 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031408" version="1" comment="libOpenEXRCore-3_4-33 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031409" version="1" comment="libOpenEXRCore-3_4-33-32bit is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031410" version="1" comment="libOpenEXRCore-3_4-33-x86-64-v3 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031411" version="1" comment="libOpenEXRUtil-3_4-33 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031412" version="1" comment="libOpenEXRUtil-3_4-33-32bit is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031413" version="1" comment="libOpenEXRUtil-3_4-33-x86-64-v3 is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031414" version="1" comment="openexr is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031415" version="1" comment="openexr-devel is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031416" version="1" comment="openexr-doc is &lt;3.4.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031417" version="1" comment="python311 is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031418" version="1" comment="python311-32bit is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031419" version="1" comment="python311-curses is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031420" version="1" comment="python311-dbm is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031421" version="1" comment="python311-idle is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031422" version="1" comment="python311-tk is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031423" version="1" comment="python311-x86-64-v3 is &lt;3.11.14-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031424" version="1" comment="rclone is &lt;1.72.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031425" version="1" comment="rclone-bash-completion is &lt;1.72.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031426" version="1" comment="rclone-zsh-completion is &lt;1.72.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031427" version="1" comment="librnp0 is &lt;0.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031428" version="1" comment="rnp is &lt;0.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031429" version="1" comment="rnp-devel is &lt;0.18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031430" version="1" comment="cloudflared is &lt;2025.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031431" version="1" comment="etcd-for-k8s1.32 is &lt;3.5.24-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031432" version="1" comment="gnutls is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031433" version="1" comment="libgnutls-dane-devel is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031434" version="1" comment="libgnutls-dane0 is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031435" version="1" comment="libgnutls-devel is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031436" version="1" comment="libgnutls-devel-32bit is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031437" version="1" comment="libgnutls-devel-doc is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031438" version="1" comment="libgnutls30 is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031439" version="1" comment="libgnutls30-32bit is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031440" version="1" comment="libgnutlsxx-devel is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031441" version="1" comment="libgnutlsxx30 is &lt;3.8.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031442" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031443" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031444" version="1" comment="libsoup-devel is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031445" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031446" version="1" comment="libsoup-lang is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031447" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031448" version="1" comment="openbao is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031449" version="1" comment="openbao-agent is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031450" version="1" comment="openbao-cassandra-database-plugin is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031451" version="1" comment="openbao-influxdb-database-plugin is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031452" version="1" comment="openbao-mysql-database-plugin is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031453" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031454" version="1" comment="openbao-postgresql-database-plugin is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031455" version="1" comment="openbao-server is &lt;2.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031456" version="1" comment="python310 is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031457" version="1" comment="python310-32bit is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031458" version="1" comment="python310-curses is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031459" version="1" comment="python310-dbm is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031460" version="1" comment="python310-idle is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031461" version="1" comment="python310-tk is &lt;3.10.19-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031462" version="1" comment="libwireshark19 is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031463" version="1" comment="libwiretap16 is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031464" version="1" comment="libwsutil17 is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031465" version="1" comment="wireshark is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031466" version="1" comment="wireshark-devel is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031467" version="1" comment="wireshark-ui-qt is &lt;4.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031633" version="1" comment="bash-git-prompt is &lt;2.7.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031634" version="1" comment="git-bug is &lt;0.10.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031635" version="1" comment="git-bug-bash-completion is &lt;0.10.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031636" version="1" comment="git-bug-fish-completion is &lt;0.10.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031637" version="1" comment="git-bug-zsh-completion is &lt;0.10.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031638" version="1" comment="kubevirt-container-disk is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031639" version="1" comment="kubevirt-manifests is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031640" version="1" comment="kubevirt-pr-helper-conf is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031641" version="1" comment="kubevirt-sidecar-shim is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031642" version="1" comment="kubevirt-tests is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031643" version="1" comment="kubevirt-virt-api is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031644" version="1" comment="kubevirt-virt-controller is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031645" version="1" comment="kubevirt-virt-exportproxy is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031646" version="1" comment="kubevirt-virt-exportserver is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031647" version="1" comment="kubevirt-virt-handler is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031648" version="1" comment="kubevirt-virt-launcher is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031649" version="1" comment="kubevirt-virt-operator is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031650" version="1" comment="kubevirt-virtctl is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031651" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031868" version="1" comment="cheat is &lt;4.4.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031869" version="1" comment="netbird is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031870" version="1" comment="netbird-applet is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031871" version="1" comment="netbird-bash-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031872" version="1" comment="netbird-fish-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031873" version="1" comment="netbird-management is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031874" version="1" comment="netbird-management-bash-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031875" version="1" comment="netbird-management-fish-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031876" version="1" comment="netbird-management-zsh-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031877" version="1" comment="netbird-relay is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031878" version="1" comment="netbird-signal is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031879" version="1" comment="netbird-signal-bash-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031880" version="1" comment="netbird-signal-fish-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031881" version="1" comment="netbird-signal-zsh-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031882" version="1" comment="netbird-zsh-completion is &lt;0.60.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031883" version="1" comment="opa is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031884" version="1" comment="opa-bash-completion is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031885" version="1" comment="opa-fish-completion is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031886" version="1" comment="opa-zsh-completion is &lt;1.11.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031887" version="1" comment="python311-pypdf is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031888" version="1" comment="python312-pypdf is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031889" version="1" comment="python313-pypdf is &lt;6.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031890" version="1" comment="python311-spotipy is &lt;2.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031891" version="1" comment="python312-spotipy is &lt;2.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031892" version="1" comment="python313-spotipy is &lt;2.25.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031893" version="1" comment="libwireshark19 is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031894" version="1" comment="libwiretap16 is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031895" version="1" comment="libwsutil17 is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031896" version="1" comment="wireshark is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031897" version="1" comment="wireshark-devel is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031898" version="1" comment="wireshark-ui-qt is &lt;4.6.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032147" version="1" comment="helm3 is &lt;3.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032148" version="1" comment="helm3-bash-completion is &lt;3.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032149" version="1" comment="helm3-fish-completion is &lt;3.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032150" version="1" comment="helm3-zsh-completion is &lt;3.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032151" version="1" comment="libcoap-devel is &lt;4.3.5a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032152" version="1" comment="libcoap-utils is &lt;4.3.5a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032153" version="1" comment="libcoap3-3 is &lt;4.3.5a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032154" version="1" comment="libpng16-16 is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032155" version="1" comment="libpng16-16-32bit is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032156" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032157" version="1" comment="libpng16-compat-devel is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032158" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032159" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032160" version="1" comment="libpng16-devel is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032161" version="1" comment="libpng16-devel-32bit is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032162" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032163" version="1" comment="libpng16-tools is &lt;1.6.51-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032164" version="1" comment="postgresql13 is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032165" version="1" comment="postgresql13-contrib is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032166" version="1" comment="postgresql13-devel is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032167" version="1" comment="postgresql13-docs is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032168" version="1" comment="postgresql13-llvmjit is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032169" version="1" comment="postgresql13-llvmjit-devel is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032170" version="1" comment="postgresql13-plperl is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032171" version="1" comment="postgresql13-plpython is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032172" version="1" comment="postgresql13-pltcl is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032173" version="1" comment="postgresql13-server is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032174" version="1" comment="postgresql13-server-devel is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032175" version="1" comment="postgresql13-test is &lt;13.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032176" version="1" comment="postgresql14 is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032177" version="1" comment="postgresql14-contrib is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032178" version="1" comment="postgresql14-devel is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032179" version="1" comment="postgresql14-docs is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032180" version="1" comment="postgresql14-llvmjit is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032181" version="1" comment="postgresql14-llvmjit-devel is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032182" version="1" comment="postgresql14-plperl is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032183" version="1" comment="postgresql14-plpython is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032184" version="1" comment="postgresql14-pltcl is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032185" version="1" comment="postgresql14-server is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032186" version="1" comment="postgresql14-server-devel is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032187" version="1" comment="postgresql14-test is &lt;14.20-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032188" version="1" comment="postgresql15 is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032189" version="1" comment="postgresql15-contrib is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032190" version="1" comment="postgresql15-devel is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032191" version="1" comment="postgresql15-docs is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032192" version="1" comment="postgresql15-llvmjit is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032193" version="1" comment="postgresql15-llvmjit-devel is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032194" version="1" comment="postgresql15-plperl is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032195" version="1" comment="postgresql15-plpython is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032196" version="1" comment="postgresql15-pltcl is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032197" version="1" comment="postgresql15-server is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032198" version="1" comment="postgresql15-server-devel is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032199" version="1" comment="postgresql15-test is &lt;15.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032200" version="1" comment="postgresql16 is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032201" version="1" comment="postgresql16-contrib is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032202" version="1" comment="postgresql16-devel is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032203" version="1" comment="postgresql16-docs is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032204" version="1" comment="postgresql16-llvmjit is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032205" version="1" comment="postgresql16-llvmjit-devel is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032206" version="1" comment="postgresql16-plperl is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032207" version="1" comment="postgresql16-plpython is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032208" version="1" comment="postgresql16-pltcl is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032209" version="1" comment="postgresql16-server is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032210" version="1" comment="postgresql16-server-devel is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032211" version="1" comment="postgresql16-test is &lt;16.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032212" version="1" comment="postgresql17 is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032213" version="1" comment="postgresql17-contrib is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032214" version="1" comment="postgresql17-devel is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032215" version="1" comment="postgresql17-docs is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032216" version="1" comment="postgresql17-llvmjit is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032217" version="1" comment="postgresql17-llvmjit-devel is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032218" version="1" comment="postgresql17-plperl is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032219" version="1" comment="postgresql17-plpython is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032220" version="1" comment="postgresql17-pltcl is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032221" version="1" comment="postgresql17-server is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032222" version="1" comment="postgresql17-server-devel is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032223" version="1" comment="postgresql17-test is &lt;17.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032224" version="1" comment="python311-salt is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032225" version="1" comment="python312-salt is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032226" version="1" comment="python313-salt is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032227" version="1" comment="salt is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032228" version="1" comment="salt-api is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032229" version="1" comment="salt-bash-completion is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032230" version="1" comment="salt-cloud is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032231" version="1" comment="salt-doc is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032232" version="1" comment="salt-fish-completion is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032233" version="1" comment="salt-master is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032234" version="1" comment="salt-minion is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032235" version="1" comment="salt-proxy is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032236" version="1" comment="salt-ssh is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032237" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032238" version="1" comment="salt-syndic is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032239" version="1" comment="salt-transactional-update is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032240" version="1" comment="salt-zsh-completion is &lt;3006.0-52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032364" version="1" comment="lightdm-kde-greeter is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032365" version="1" comment="lightdm-kde-greeter-branding-upstream is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032366" version="1" comment="lightdm-kde-greeter-lang is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032367" version="1" comment="libecpg6 is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032368" version="1" comment="libecpg6-32bit is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032369" version="1" comment="libpq5 is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032370" version="1" comment="libpq5-32bit is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032371" version="1" comment="postgresql18 is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032372" version="1" comment="postgresql18-contrib is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032373" version="1" comment="postgresql18-devel is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032374" version="1" comment="postgresql18-docs is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032375" version="1" comment="postgresql18-llvmjit is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032376" version="1" comment="postgresql18-llvmjit-devel is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032377" version="1" comment="postgresql18-plperl is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032378" version="1" comment="postgresql18-plpython is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032379" version="1" comment="postgresql18-pltcl is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032380" version="1" comment="postgresql18-server is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032381" version="1" comment="postgresql18-server-devel is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032382" version="1" comment="postgresql18-test is &lt;18.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032383" version="1" comment="python-mistralclient-doc is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032384" version="1" comment="python313-mistralclient is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032385" version="1" comment="python315 is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032386" version="1" comment="python315-curses is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032387" version="1" comment="python315-dbm is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032388" version="1" comment="python315-idle is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032389" version="1" comment="python315-profiling is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032390" version="1" comment="python315-tk is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032391" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032392" version="1" comment="python39 is &lt;3.9.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032393" version="1" comment="python39-curses is &lt;3.9.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032394" version="1" comment="python39-dbm is &lt;3.9.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032395" version="1" comment="python39-idle is &lt;3.9.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032396" version="1" comment="python39-tk is &lt;3.9.24-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032411" version="1" comment="gegl is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032412" version="1" comment="gegl-0_4 is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032413" version="1" comment="gegl-0_4-lang is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032414" version="1" comment="gegl-devel is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032415" version="1" comment="gegl-doc is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032416" version="1" comment="libgegl-0_4-0 is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032417" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.64-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032524" version="1" comment="chromedriver is &lt;143.0.7499.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032525" version="1" comment="chromium is &lt;143.0.7499.40-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032526" version="1" comment="go1.25 is &lt;1.25.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032527" version="1" comment="go1.25-doc is &lt;1.25.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032528" version="1" comment="go1.25-libstd is &lt;1.25.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032529" version="1" comment="go1.25-race is &lt;1.25.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032530" version="1" comment="go1.24 is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032531" version="1" comment="go1.24-doc is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032532" version="1" comment="go1.24-libstd is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032533" version="1" comment="go1.24-race is &lt;1.24.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032534" version="1" comment="libpng12-0 is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032535" version="1" comment="libpng12-0-32bit is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032536" version="1" comment="libpng12-compat-devel is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032537" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032538" version="1" comment="libpng12-devel is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032539" version="1" comment="libpng12-devel-32bit is &lt;1.2.59-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032569" version="1" comment="rhino is &lt;1.7.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032570" version="1" comment="rhino-demo is &lt;1.7.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032571" version="1" comment="rhino-engine is &lt;1.7.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032572" version="1" comment="rhino-javadoc is &lt;1.7.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032573" version="1" comment="rhino-runtime is &lt;1.7.15.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032574" version="1" comment="libwireshark19 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032575" version="1" comment="libwiretap16 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032576" version="1" comment="libwsutil17 is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032577" version="1" comment="wireshark is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032578" version="1" comment="wireshark-devel is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032579" version="1" comment="wireshark-ui-qt is &lt;4.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032625" version="1" comment="kdeconnect-kde is &lt;25.11.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032626" version="1" comment="kdeconnect-kde-lang is &lt;25.11.90-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032627" version="1" comment="libpng16-16 is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032628" version="1" comment="libpng16-16-32bit is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032629" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032630" version="1" comment="libpng16-compat-devel is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032631" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032632" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032633" version="1" comment="libpng16-devel is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032634" version="1" comment="libpng16-devel-32bit is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032635" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032636" version="1" comment="libpng16-tools is &lt;1.6.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032637" version="1" comment="corepack24 is &lt;24.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032638" version="1" comment="nodejs24 is &lt;24.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032639" version="1" comment="nodejs24-devel is &lt;24.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032640" version="1" comment="nodejs24-docs is &lt;24.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032641" version="1" comment="npm24 is &lt;24.11.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032783" version="1" comment="krb5 is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032784" version="1" comment="krb5-32bit is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032785" version="1" comment="krb5-client is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032786" version="1" comment="krb5-devel is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032787" version="1" comment="krb5-devel-32bit is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032788" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032789" version="1" comment="krb5-plugin-preauth-otp is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032790" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032791" version="1" comment="krb5-plugin-preauth-spake is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032792" version="1" comment="krb5-server is &lt;1.22.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032793" version="1" comment="nvidia-open-driver-G07-signed-check is &lt;590.44.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032794" version="1" comment="nvidia-open-driver-G07-signed-default-devel is &lt;590.44.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032795" version="1" comment="nvidia-open-driver-G07-signed-kmp-default is &lt;590.44.01_k6.18.0_2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032796" version="1" comment="nvidia-open-driver-G07-signed-kmp-longterm is &lt;590.44.01_k6.12.61_1-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032797" version="1" comment="nvidia-open-driver-G07-signed-longterm-devel is &lt;590.44.01-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032798" version="1" comment="python311-Django is &lt;5.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032799" version="1" comment="python312-Django is &lt;5.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032800" version="1" comment="python313-Django is &lt;5.2.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032801" version="1" comment="python311-Django4 is &lt;4.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032802" version="1" comment="python312-Django4 is &lt;4.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032803" version="1" comment="python313-Django4 is &lt;4.2.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032804" version="1" comment="regclient is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032805" version="1" comment="regclient-bash-completion is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032806" version="1" comment="regclient-fish-completion is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032807" version="1" comment="regclient-zsh-completion is &lt;0.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032889" version="1" comment="apache2 is &lt;2.4.66-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032890" version="1" comment="firefox-esr is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032891" version="1" comment="firefox-esr-branding-upstream is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032892" version="1" comment="firefox-esr-translations-common is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032893" version="1" comment="firefox-esr-translations-other is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032894" version="1" comment="gio-branding-upstream is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032895" version="1" comment="glib2-devel is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032896" version="1" comment="glib2-devel-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032897" version="1" comment="glib2-devel-static is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032898" version="1" comment="glib2-lang is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032899" version="1" comment="glib2-tests-devel is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032900" version="1" comment="glib2-tools is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032901" version="1" comment="glib2-tools-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032902" version="1" comment="libgio-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032903" version="1" comment="libgio-2_0-0-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032904" version="1" comment="libgirepository-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032905" version="1" comment="libglib-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032906" version="1" comment="libglib-2_0-0-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032907" version="1" comment="libgmodule-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032908" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032909" version="1" comment="libgobject-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032910" version="1" comment="libgobject-2_0-0-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032911" version="1" comment="libgthread-2_0-0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032912" version="1" comment="libgthread-2_0-0-32bit is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032913" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032914" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032915" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032916" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032917" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032918" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.86.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032919" version="1" comment="keylime-config is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032920" version="1" comment="keylime-firewalld is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032921" version="1" comment="keylime-logrotate is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032922" version="1" comment="keylime-registrar is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032923" version="1" comment="keylime-tenant is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032924" version="1" comment="keylime-tpm_cert_store is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032925" version="1" comment="keylime-verifier is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032926" version="1" comment="python311-keylime is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032927" version="1" comment="python312-keylime is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032928" version="1" comment="python313-keylime is &lt;7.13.0+40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032929" version="1" comment="libpoppler-cpp2 is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032930" version="1" comment="libpoppler-cpp2-32bit is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032931" version="1" comment="libpoppler-devel is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032932" version="1" comment="libpoppler-glib-devel is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032933" version="1" comment="libpoppler-glib8 is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032934" version="1" comment="libpoppler-glib8-32bit is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032935" version="1" comment="libpoppler153 is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032936" version="1" comment="libpoppler153-32bit is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032937" version="1" comment="poppler-tools is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032938" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.09.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033197" version="1" comment="MozillaFirefox is &lt;146.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033198" version="1" comment="MozillaFirefox-branding-upstream is &lt;146.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033199" version="1" comment="MozillaFirefox-devel is &lt;146.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033200" version="1" comment="MozillaFirefox-translations-common is &lt;146.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033201" version="1" comment="MozillaFirefox-translations-other is &lt;146.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033202" version="1" comment="MozillaThunderbird is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033203" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033204" version="1" comment="MozillaThunderbird-translations-common is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033205" version="1" comment="MozillaThunderbird-translations-other is &lt;140.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033206" version="1" comment="xkbcomp is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033207" version="1" comment="xkbcomp-devel is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033395" version="1" comment="ImageMagick is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033396" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033397" version="1" comment="ImageMagick-devel is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033398" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033399" version="1" comment="ImageMagick-doc is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033400" version="1" comment="ImageMagick-extra is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033401" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033402" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033403" version="1" comment="libMagick++-devel is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033404" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033405" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033406" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033407" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033408" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033409" version="1" comment="perl-PerlMagick is &lt;7.1.2.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033410" version="1" comment="buildpacks-cli is &lt;0.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033411" version="1" comment="buildpacks-cli-bash-completion is &lt;0.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033412" version="1" comment="buildpacks-cli-fish-completion is &lt;0.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033413" version="1" comment="buildpacks-cli-zsh-completion is &lt;0.39.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033414" version="1" comment="pgadmin4 is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033415" version="1" comment="pgadmin4-cloud is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033416" version="1" comment="pgadmin4-desktop is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033417" version="1" comment="pgadmin4-doc is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033418" version="1" comment="pgadmin4-web-uwsgi is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033419" version="1" comment="system-user-pgadmin is &lt;9.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033420" version="1" comment="libruby4_0-4_0 is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033421" version="1" comment="ruby4.0 is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033422" version="1" comment="ruby4.0-devel is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033423" version="1" comment="ruby4.0-devel-extra is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033424" version="1" comment="ruby4.0-doc is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033425" version="1" comment="ruby4.0-doc-ri is &lt;4.0.0~preview2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033426" version="1" comment="chromedriver is &lt;143.0.7499.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033427" version="1" comment="chromium is &lt;143.0.7499.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033575" version="1" comment="qemu is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033576" version="1" comment="qemu-SLOF is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033577" version="1" comment="qemu-accel-qtest is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033578" version="1" comment="qemu-arm is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033579" version="1" comment="qemu-audio-alsa is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033580" version="1" comment="qemu-audio-dbus is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033581" version="1" comment="qemu-audio-jack is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033582" version="1" comment="qemu-audio-oss is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033583" version="1" comment="qemu-audio-pa is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033584" version="1" comment="qemu-audio-pipewire is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033585" version="1" comment="qemu-audio-spice is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033586" version="1" comment="qemu-block-curl is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033587" version="1" comment="qemu-block-dmg is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033588" version="1" comment="qemu-block-iscsi is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033589" version="1" comment="qemu-block-nfs is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033590" version="1" comment="qemu-block-rbd is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033591" version="1" comment="qemu-block-ssh is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033592" version="1" comment="qemu-chardev-baum is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033593" version="1" comment="qemu-chardev-spice is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033594" version="1" comment="qemu-doc is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033595" version="1" comment="qemu-extra is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033596" version="1" comment="qemu-guest-agent is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033597" version="1" comment="qemu-headless is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033598" version="1" comment="qemu-hw-display-qxl is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033599" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033600" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033601" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033602" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033603" version="1" comment="qemu-hw-usb-host is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033604" version="1" comment="qemu-hw-usb-redirect is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033605" version="1" comment="qemu-hw-usb-smartcard is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033606" version="1" comment="qemu-img is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033607" version="1" comment="qemu-ipxe is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033608" version="1" comment="qemu-ivshmem-tools is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033609" version="1" comment="qemu-ksm is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033610" version="1" comment="qemu-lang is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033611" version="1" comment="qemu-microvm is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033612" version="1" comment="qemu-ppc is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033613" version="1" comment="qemu-pr-helper is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033614" version="1" comment="qemu-s390x is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033615" version="1" comment="qemu-seabios is &lt;10.1.31.17.0_2_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033616" version="1" comment="qemu-skiboot is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033617" version="1" comment="qemu-spice is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033618" version="1" comment="qemu-tools is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033619" version="1" comment="qemu-ui-curses is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033620" version="1" comment="qemu-ui-dbus is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033621" version="1" comment="qemu-ui-gtk is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033622" version="1" comment="qemu-ui-opengl is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033623" version="1" comment="qemu-ui-spice-app is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033624" version="1" comment="qemu-ui-spice-core is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033625" version="1" comment="qemu-vgabios is &lt;10.1.31.17.0_2_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033626" version="1" comment="qemu-vhost-user-gpu is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033627" version="1" comment="qemu-vmsr-helper is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033628" version="1" comment="qemu-x86 is &lt;10.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033629" version="1" comment="strongswan is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033630" version="1" comment="strongswan-doc is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033631" version="1" comment="strongswan-fips is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033632" version="1" comment="strongswan-ipsec is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033633" version="1" comment="strongswan-mysql is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033634" version="1" comment="strongswan-nm is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033635" version="1" comment="strongswan-sqlite is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034196" version="1" comment="clair is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034197" version="1" comment="clairctl is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034198" version="1" comment="netty is &lt;4.1.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034199" version="1" comment="netty-bom is &lt;4.1.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034200" version="1" comment="netty-javadoc is &lt;4.1.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034201" version="1" comment="netty-parent is &lt;4.1.130-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034564" version="1" comment="coredns-for-k8s1.33 is &lt;1.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034565" version="1" comment="coredns-for-k8s1.33-extras is &lt;1.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034566" version="1" comment="coredns-for-k8s1.34 is &lt;1.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034567" version="1" comment="coredns-for-k8s1.34-extras is &lt;1.12.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034568" version="1" comment="rsync is &lt;3.4.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034569" version="1" comment="libruby3_4-3_4 is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034570" version="1" comment="ruby3.4 is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034571" version="1" comment="ruby3.4-devel is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034572" version="1" comment="ruby3.4-devel-extra is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034573" version="1" comment="ruby3.4-doc is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034574" version="1" comment="ruby3.4-doc-ri is &lt;3.4.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034658" version="1" comment="ImageMagick is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034659" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034660" version="1" comment="ImageMagick-devel is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034661" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034662" version="1" comment="ImageMagick-doc is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034663" version="1" comment="ImageMagick-extra is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034664" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034665" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034666" version="1" comment="libMagick++-devel is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034667" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034668" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034669" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034670" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034671" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034672" version="1" comment="perl-PerlMagick is &lt;7.1.2.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034673" version="1" comment="alloy is &lt;1.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034674" version="1" comment="chromedriver is &lt;143.0.7499.146-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034675" version="1" comment="chromium is &lt;143.0.7499.146-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034676" version="1" comment="coredns-for-k8s1.35 is &lt;1.13.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034677" version="1" comment="coredns-for-k8s1.35-extras is &lt;1.13.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034678" version="1" comment="MozillaFirefox is &lt;146.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034679" version="1" comment="MozillaFirefox-branding-upstream is &lt;146.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034680" version="1" comment="MozillaFirefox-devel is &lt;146.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034681" version="1" comment="MozillaFirefox-translations-common is &lt;146.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034682" version="1" comment="MozillaFirefox-translations-other is &lt;146.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034683" version="1" comment="busybox is &lt;1.37.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034684" version="1" comment="busybox-static is &lt;1.37.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034685" version="1" comment="busybox-testsuite is &lt;1.37.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034686" version="1" comment="busybox-warewulf3 is &lt;1.37.0-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034687" version="1" comment="duc is &lt;1.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034689" version="1" comment="kernel-macros is &lt;6.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034690" version="1" comment="kernel-source is &lt;6.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034691" version="1" comment="kernel-source-vanilla is &lt;6.18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034692" version="1" comment="php8 is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034693" version="1" comment="php8-bcmath is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034694" version="1" comment="php8-bz2 is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034695" version="1" comment="php8-calendar is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034696" version="1" comment="php8-cli is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034697" version="1" comment="php8-ctype is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034698" version="1" comment="php8-curl is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034699" version="1" comment="php8-dba is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034700" version="1" comment="php8-devel is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034701" version="1" comment="php8-dom is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034702" version="1" comment="php8-enchant is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034703" version="1" comment="php8-exif is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034704" version="1" comment="php8-ffi is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034705" version="1" comment="php8-fileinfo is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034706" version="1" comment="php8-ftp is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034707" version="1" comment="php8-gd is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034708" version="1" comment="php8-gettext is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034709" version="1" comment="php8-gmp is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034710" version="1" comment="php8-iconv is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034711" version="1" comment="php8-intl is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034712" version="1" comment="php8-ldap is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034713" version="1" comment="php8-mbstring is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034714" version="1" comment="php8-mysql is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034715" version="1" comment="php8-odbc is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034716" version="1" comment="php8-opcache is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034717" version="1" comment="php8-openssl is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034718" version="1" comment="php8-pcntl is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034719" version="1" comment="php8-pdo is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034720" version="1" comment="php8-pgsql is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034721" version="1" comment="php8-phar is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034722" version="1" comment="php8-posix is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034723" version="1" comment="php8-readline is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034724" version="1" comment="php8-shmop is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034725" version="1" comment="php8-snmp is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034726" version="1" comment="php8-soap is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034727" version="1" comment="php8-sockets is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034728" version="1" comment="php8-sodium is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034729" version="1" comment="php8-sqlite is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034730" version="1" comment="php8-sysvmsg is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034731" version="1" comment="php8-sysvsem is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034732" version="1" comment="php8-sysvshm is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034733" version="1" comment="php8-tidy is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034734" version="1" comment="php8-tokenizer is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034735" version="1" comment="php8-xmlreader is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034736" version="1" comment="php8-xmlwriter is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034737" version="1" comment="php8-xsl is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034738" version="1" comment="php8-zip is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034739" version="1" comment="php8-zlib is &lt;8.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034740" version="1" comment="python311-tornado6 is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034741" version="1" comment="python312-tornado6 is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034742" version="1" comment="python313-tornado6 is &lt;6.5.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034921" version="1" comment="python310 is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034922" version="1" comment="python310-32bit is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034923" version="1" comment="python310-curses is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034924" version="1" comment="python310-dbm is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034925" version="1" comment="python310-idle is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034926" version="1" comment="python310-tk is &lt;3.10.19-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034927" version="1" comment="python315 is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034928" version="1" comment="python315-curses is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034929" version="1" comment="python315-dbm is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034930" version="1" comment="python315-idle is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034931" version="1" comment="python315-profiling is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034932" version="1" comment="python315-tk is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034933" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034934" version="1" comment="zk is &lt;0.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035154" version="1" comment="libnbd is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035155" version="1" comment="libnbd-bash-completion is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035156" version="1" comment="libnbd-devel is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035157" version="1" comment="libnbd0 is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035158" version="1" comment="nbdfuse is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035159" version="1" comment="python3-libnbd is &lt;1.24.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035257" version="1" comment="buildah is &lt;1.42.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035258" version="1" comment="cpp-httplib-devel is &lt;0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035259" version="1" comment="libcpp-httplib0_28 is &lt;0.28.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035260" version="1" comment="podman is &lt;5.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035261" version="1" comment="podman-docker is &lt;5.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035262" version="1" comment="podman-remote is &lt;5.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035263" version="1" comment="podmansh is &lt;5.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035264" version="1" comment="python39 is &lt;3.9.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035265" version="1" comment="python39-curses is &lt;3.9.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035266" version="1" comment="python39-dbm is &lt;3.9.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035267" version="1" comment="python39-idle is &lt;3.9.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035268" version="1" comment="python39-tk is &lt;3.9.25-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035442" version="1" comment="anubis is &lt;1.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035443" version="1" comment="python311-openapi-core is &lt;0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035444" version="1" comment="python312-openapi-core is &lt;0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035445" version="1" comment="python313-openapi-core is &lt;0.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035538" version="1" comment="python311 is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035539" version="1" comment="python311-32bit is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035540" version="1" comment="python311-curses is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035541" version="1" comment="python311-dbm is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035542" version="1" comment="python311-idle is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035543" version="1" comment="python311-tk is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035544" version="1" comment="python311-x86-64-v3 is &lt;3.11.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035545" version="1" comment="python312 is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035546" version="1" comment="python312-32bit is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035547" version="1" comment="python312-curses is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035548" version="1" comment="python312-dbm is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035549" version="1" comment="python312-idle is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035550" version="1" comment="python312-tk is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035551" version="1" comment="python312-x86-64-v3 is &lt;3.12.12-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035552" version="1" comment="python313 is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035553" version="1" comment="python313-32bit is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035554" version="1" comment="python313-curses is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035555" version="1" comment="python313-dbm is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035556" version="1" comment="python313-idle is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035557" version="1" comment="python313-tk is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035558" version="1" comment="python313-x86-64-v3 is &lt;3.13.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035559" version="1" comment="trivy is &lt;0.68.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035579" version="1" comment="weblate is &lt;5.14.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035598" version="1" comment="kepler is &lt;0.11.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035599" version="1" comment="gnu-recutils is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035600" version="1" comment="gnu-recutils-devel is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035601" version="1" comment="gnu-recutils-lang is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035602" version="1" comment="librec1 is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035603" version="1" comment="readrec0 is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035604" version="1" comment="testrec0 is &lt;1.9-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035605" version="1" comment="dirmngr is &lt;2.5.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035606" version="1" comment="gpg2 is &lt;2.5.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035607" version="1" comment="gpg2-lang is &lt;2.5.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035608" version="1" comment="gpg2-tpm is &lt;2.5.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035609" version="1" comment="libmatio-devel is &lt;1.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035610" version="1" comment="libmatio13 is &lt;1.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035611" version="1" comment="matio-tools is &lt;1.5.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035676" version="1" comment="python311-marshmallow is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035677" version="1" comment="python312-marshmallow is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035678" version="1" comment="python313-marshmallow is &lt;3.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035681" version="1" comment="fluidsynth is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035682" version="1" comment="fluidsynth-devel is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035683" version="1" comment="libfluidsynth3 is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035684" version="1" comment="libfluidsynth3-32bit is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035685" version="1" comment="python312-Django6 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035686" version="1" comment="python313-Django6 is &lt;6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036171" version="1" comment="dcmtk is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036172" version="1" comment="dcmtk-devel is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036173" version="1" comment="libdcmtk20 is &lt;3.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036424" version="1" comment="c-ares-devel is &lt;1.34.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036425" version="1" comment="c-ares-utils is &lt;1.34.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036426" version="1" comment="libcares2 is &lt;1.34.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036427" version="1" comment="libcares2-32bit is &lt;1.34.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036428" version="1" comment="gpsd is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036429" version="1" comment="gpsd-clients is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036430" version="1" comment="gpsd-devel is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036431" version="1" comment="gpsd-qt6-devel is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036432" version="1" comment="libQgpsmm32 is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036433" version="1" comment="libgps32 is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036434" version="1" comment="python3-gpsd is &lt;3.27.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036435" version="1" comment="log4j is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036436" version="1" comment="log4j-bom is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036437" version="1" comment="log4j-javadoc is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036438" version="1" comment="log4j-jcl is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036439" version="1" comment="log4j-jmx-gui is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036440" version="1" comment="log4j-nosql is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036441" version="1" comment="log4j-slf4j is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036442" version="1" comment="log4j-taglib is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036443" version="1" comment="log4j-web is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036444" version="1" comment="python311-filelock is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036445" version="1" comment="python312-filelock is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036446" version="1" comment="python313-filelock is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036447" version="1" comment="python314 is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036448" version="1" comment="python314-curses is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036449" version="1" comment="python314-dbm is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036450" version="1" comment="python314-idle is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036451" version="1" comment="python314-tk is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036452" version="1" comment="python314-x86-64-v3 is &lt;3.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036549" version="1" comment="ImageMagick is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036550" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036551" version="1" comment="ImageMagick-devel is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036552" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036553" version="1" comment="ImageMagick-doc is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036554" version="1" comment="ImageMagick-extra is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036555" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036556" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036557" version="1" comment="libMagick++-devel is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036558" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036559" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036560" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036561" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036562" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036563" version="1" comment="perl-PerlMagick is &lt;7.1.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036564" version="1" comment="apptainer is &lt;1.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036565" version="1" comment="apptainer-leap is &lt;1.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036566" version="1" comment="apptainer-sle15_7 is &lt;1.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036567" version="1" comment="apptainer-sle16 is &lt;1.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036568" version="1" comment="python311-cbor2 is &lt;5.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036569" version="1" comment="python312-cbor2 is &lt;5.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036570" version="1" comment="python313-cbor2 is &lt;5.8.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036571" version="1" comment="libwget4 is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036572" version="1" comment="wget2 is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036573" version="1" comment="wget2-devel is &lt;2.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036797" version="1" comment="chromedriver is &lt;143.0.7499.192-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036798" version="1" comment="chromium is &lt;143.0.7499.192-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036799" version="1" comment="curl is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036800" version="1" comment="curl-fish-completion is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036801" version="1" comment="curl-zsh-completion is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036802" version="1" comment="libcurl-devel is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036803" version="1" comment="libcurl-devel-32bit is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036804" version="1" comment="libcurl-devel-doc is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036805" version="1" comment="libcurl4 is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036806" version="1" comment="libcurl4-32bit is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036807" version="1" comment="wcurl is &lt;8.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036808" version="1" comment="gimp is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036809" version="1" comment="gimp-devel is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036810" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036811" version="1" comment="gimp-lang is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036812" version="1" comment="gimp-plugin-aa is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036813" version="1" comment="gimp-plugin-python3 is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036814" version="1" comment="gimp-vala is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036815" version="1" comment="libgimp-3_0-0 is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036816" version="1" comment="libgimpui-3_0-0 is &lt;3.0.6-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036817" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036818" version="1" comment="libheif-aom is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036819" version="1" comment="libheif-dav1d is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036820" version="1" comment="libheif-devel is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036821" version="1" comment="libheif-ffmpeg is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036822" version="1" comment="libheif-jpeg is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036823" version="1" comment="libheif-openh264 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036824" version="1" comment="libheif-openjpeg is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036825" version="1" comment="libheif-rav1e is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036826" version="1" comment="libheif-svtenc is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036827" version="1" comment="libheif1 is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036828" version="1" comment="libheif1-32bit is &lt;1.21.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036829" version="1" comment="traefik is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037016" version="1" comment="coredns is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037017" version="1" comment="coredns-extras is &lt;1.14.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037018" version="1" comment="libsodium-devel is &lt;1.0.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037019" version="1" comment="libsodium26 is &lt;1.0.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037020" version="1" comment="libsodium26-32bit is &lt;1.0.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037021" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037022" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037023" version="1" comment="libsoup-devel is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037024" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037025" version="1" comment="libsoup-lang is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037026" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037027" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037028" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037029" version="1" comment="libsoup2-devel is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037030" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037031" version="1" comment="libsoup2-lang is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037032" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037033" version="1" comment="python311-aiohttp is &lt;3.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037034" version="1" comment="python312-aiohttp is &lt;3.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037035" version="1" comment="python313-aiohttp is &lt;3.13.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037036" version="1" comment="python311-urllib3 is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037037" version="1" comment="python312-urllib3 is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037038" version="1" comment="python313-urllib3 is &lt;2.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037242" version="1" comment="ffmpeg-4 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037243" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037244" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037245" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037246" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037247" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037248" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037249" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037250" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037251" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037252" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037253" version="1" comment="libavcodec58_134 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037254" version="1" comment="libavdevice58_13 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037255" version="1" comment="libavfilter7_110 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037256" version="1" comment="libavformat58_76 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037257" version="1" comment="libavresample4_0 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037258" version="1" comment="libavutil56_70 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037259" version="1" comment="libpostproc55_9 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037260" version="1" comment="libswresample3_9 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037261" version="1" comment="libswscale5_9 is &lt;4.4.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037262" version="1" comment="ffmpeg-7 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037263" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037264" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037265" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037266" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037267" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037268" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037269" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037270" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037271" version="1" comment="libavcodec61 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037272" version="1" comment="libavdevice61 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037273" version="1" comment="libavfilter10 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037274" version="1" comment="libavformat61 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037275" version="1" comment="libavutil59 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037276" version="1" comment="libpostproc58 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037277" version="1" comment="libswresample5 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037278" version="1" comment="libswscale8 is &lt;7.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037279" version="1" comment="istioctl is &lt;1.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037280" version="1" comment="istioctl-bash-completion is &lt;1.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037281" version="1" comment="istioctl-zsh-completion is &lt;1.28.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037282" version="1" comment="k6 is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037283" version="1" comment="k6-bash-completion is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037284" version="1" comment="k6-fish-completion is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037285" version="1" comment="k6-zsh-completion is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037286" version="1" comment="kubelogin is &lt;0.2.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037287" version="1" comment="libpcap-devel is &lt;1.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037288" version="1" comment="libpcap-devel-32bit is &lt;1.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037289" version="1" comment="libpcap-devel-static is &lt;1.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037290" version="1" comment="libpcap1 is &lt;1.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037291" version="1" comment="libpcap1-32bit is &lt;1.10.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037292" version="1" comment="libtasn1-6 is &lt;4.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037293" version="1" comment="libtasn1-6-32bit is &lt;4.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037294" version="1" comment="libtasn1-devel is &lt;4.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037295" version="1" comment="libtasn1-devel-32bit is &lt;4.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037296" version="1" comment="libtasn1-tools is &lt;4.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037297" version="1" comment="python311-Authlib is &lt;1.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037298" version="1" comment="python312-Authlib is &lt;1.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037299" version="1" comment="python313-Authlib is &lt;1.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037300" version="1" comment="teleport is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037301" version="1" comment="teleport-bash-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037302" version="1" comment="teleport-fdpass-teleport is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037303" version="1" comment="teleport-tbot is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037304" version="1" comment="teleport-tbot-bash-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037305" version="1" comment="teleport-tbot-zsh-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037306" version="1" comment="teleport-tctl is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037307" version="1" comment="teleport-tctl-bash-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037308" version="1" comment="teleport-tctl-zsh-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037309" version="1" comment="teleport-tsh is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037310" version="1" comment="teleport-tsh-bash-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037311" version="1" comment="teleport-tsh-zsh-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037312" version="1" comment="teleport-zsh-completion is &lt;17.7.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037593" version="1" comment="cockpit-repos is &lt;4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037594" version="1" comment="firefox-esr is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037595" version="1" comment="firefox-esr-branding-upstream is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037596" version="1" comment="firefox-esr-translations-common is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037597" version="1" comment="firefox-esr-translations-other is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037598" version="1" comment="fluidsynth is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037599" version="1" comment="fluidsynth-devel is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037600" version="1" comment="libfluidsynth3 is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037601" version="1" comment="libfluidsynth3-32bit is &lt;2.5.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037603" version="1" comment="kernel-macros is &lt;6.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037604" version="1" comment="kernel-source is &lt;6.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037605" version="1" comment="kernel-source-vanilla is &lt;6.18.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037606" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037607" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037608" version="1" comment="libsoup-devel is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037609" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037610" version="1" comment="libsoup-lang is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037611" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037612" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037613" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037614" version="1" comment="libsoup2-devel is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037615" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037616" version="1" comment="libsoup2-lang is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037617" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037618" version="1" comment="mcphost is &lt;0.32.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037619" version="1" comment="mcphost-bash-completion is &lt;0.32.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037620" version="1" comment="mcphost-fish-completion is &lt;0.32.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037621" version="1" comment="mcphost-zsh-completion is &lt;0.32.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037622" version="1" comment="python311-filelock is &lt;3.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037623" version="1" comment="python312-filelock is &lt;3.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037624" version="1" comment="python313-filelock is &lt;3.20.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037625" version="1" comment="python311-pypdf is &lt;6.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037626" version="1" comment="python312-pypdf is &lt;6.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037627" version="1" comment="python313-pypdf is &lt;6.6.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037628" version="1" comment="liburiparser1 is &lt;1.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037629" version="1" comment="uriparser is &lt;1.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037630" version="1" comment="uriparser-devel is &lt;1.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037631" version="1" comment="uriparser-doc is &lt;1.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037632" version="1" comment="MozillaFirefox is &lt;147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037633" version="1" comment="MozillaFirefox-branding-upstream is &lt;147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037634" version="1" comment="MozillaFirefox-devel is &lt;147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037635" version="1" comment="MozillaFirefox-translations-common is &lt;147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037636" version="1" comment="MozillaFirefox-translations-other is &lt;147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037637" version="1" comment="libcryptopp-devel is &lt;8.9.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037638" version="1" comment="libcryptopp8_9_0 is &lt;8.9.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037639" version="1" comment="openCryptoki is &lt;3.26.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037640" version="1" comment="openCryptoki-64bit is &lt;3.26.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037641" version="1" comment="openCryptoki-devel is &lt;3.26.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037642" version="1" comment="python311-urllib3 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037643" version="1" comment="python312-urllib3 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037644" version="1" comment="python313-urllib3 is &lt;2.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037645" version="1" comment="rke2-1.34 is &lt;1.34.3+rke2r1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037745" version="1" comment="NetworkManager-applet-l2tp is &lt;1.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037746" version="1" comment="NetworkManager-l2tp is &lt;1.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037747" version="1" comment="NetworkManager-l2tp-lang is &lt;1.52.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037748" version="1" comment="avahi is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037749" version="1" comment="avahi-autoipd is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037750" version="1" comment="avahi-compat-howl-devel is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037751" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037752" version="1" comment="avahi-lang is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037753" version="1" comment="avahi-utils is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037754" version="1" comment="libavahi-client3 is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037755" version="1" comment="libavahi-client3-32bit is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037756" version="1" comment="libavahi-common3 is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037757" version="1" comment="libavahi-common3-32bit is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037758" version="1" comment="libavahi-core7 is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037759" version="1" comment="libavahi-devel is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037760" version="1" comment="libavahi-libevent1 is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037761" version="1" comment="libdns_sd is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037762" version="1" comment="libdns_sd-32bit is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037763" version="1" comment="libhowl0 is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037764" version="1" comment="python311-avahi is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037765" version="1" comment="python312-avahi is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037766" version="1" comment="python313-avahi is &lt;0.8-41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037767" version="1" comment="ffmpeg-4 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037768" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037769" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037770" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037771" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037772" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037773" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037774" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037775" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037776" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037777" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037778" version="1" comment="libavcodec58_134 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037779" version="1" comment="libavdevice58_13 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037780" version="1" comment="libavfilter7_110 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037781" version="1" comment="libavformat58_76 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037782" version="1" comment="libavresample4_0 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037783" version="1" comment="libavutil56_70 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037784" version="1" comment="libpostproc55_9 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037785" version="1" comment="libswresample3_9 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037786" version="1" comment="libswscale5_9 is &lt;4.4.6-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037787" version="1" comment="php-composer2 is &lt;2.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037788" version="1" comment="python311-virtualenv is &lt;20.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037789" version="1" comment="python312-virtualenv is &lt;20.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037790" version="1" comment="python313-virtualenv is &lt;20.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037791" version="1" comment="libwireshark19 is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037792" version="1" comment="libwiretap16 is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037793" version="1" comment="libwsutil17 is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037794" version="1" comment="wireshark is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037795" version="1" comment="wireshark-devel is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037796" version="1" comment="wireshark-ui-qt is &lt;4.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037824" version="1" comment="chromedriver is &lt;144.0.7559.59-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037825" version="1" comment="chromium is &lt;144.0.7559.59-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037923" version="1" comment="MozillaThunderbird is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037924" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037925" version="1" comment="MozillaThunderbird-translations-common is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037926" version="1" comment="MozillaThunderbird-translations-other is &lt;140.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037927" version="1" comment="freerdp is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037928" version="1" comment="freerdp-devel is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037929" version="1" comment="freerdp-proxy is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037930" version="1" comment="freerdp-proxy-plugins is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037931" version="1" comment="freerdp-sdl is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037932" version="1" comment="freerdp-server is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037933" version="1" comment="freerdp-wayland is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037934" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037935" version="1" comment="libfreerdp3-3 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037936" version="1" comment="librdtk0-0 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037937" version="1" comment="libuwac0-0 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037938" version="1" comment="libwinpr3-3 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037939" version="1" comment="rdtk0-devel is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037940" version="1" comment="uwac0-devel is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037941" version="1" comment="winpr-devel is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037942" version="1" comment="libpng16-16 is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037943" version="1" comment="libpng16-16-32bit is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037944" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037945" version="1" comment="libpng16-compat-devel is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037946" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037947" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037948" version="1" comment="libpng16-devel is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037949" version="1" comment="libpng16-devel-32bit is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037950" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037951" version="1" comment="libpng16-tools is &lt;1.6.54-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037952" version="1" comment="libsndfile-devel is &lt;1.2.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037953" version="1" comment="libsndfile1 is &lt;1.2.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037954" version="1" comment="libsndfile1-32bit is &lt;1.2.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037955" version="1" comment="corepack24 is &lt;24.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037956" version="1" comment="nodejs24 is &lt;24.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037957" version="1" comment="nodejs24-devel is &lt;24.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037958" version="1" comment="nodejs24-docs is &lt;24.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037959" version="1" comment="npm24 is &lt;24.13.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037960" version="1" comment="go1.24 is &lt;1.24.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037961" version="1" comment="go1.24-doc is &lt;1.24.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037962" version="1" comment="go1.24-libstd is &lt;1.24.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037963" version="1" comment="go1.24-race is &lt;1.24.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037964" version="1" comment="go1.25 is &lt;1.25.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037965" version="1" comment="go1.25-doc is &lt;1.25.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037966" version="1" comment="go1.25-libstd is &lt;1.25.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037967" version="1" comment="go1.25-race is &lt;1.25.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037968" version="1" comment="harfbuzz-devel is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037969" version="1" comment="harfbuzz-tools is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037970" version="1" comment="libharfbuzz-cairo0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037971" version="1" comment="libharfbuzz-cairo0-32bit is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037972" version="1" comment="libharfbuzz-gobject0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037973" version="1" comment="libharfbuzz-gobject0-32bit is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037974" version="1" comment="libharfbuzz-icu0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037975" version="1" comment="libharfbuzz-icu0-32bit is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037976" version="1" comment="libharfbuzz-subset0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037977" version="1" comment="libharfbuzz-subset0-32bit is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037978" version="1" comment="libharfbuzz0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037979" version="1" comment="libharfbuzz0-32bit is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037980" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;12.3.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038166" version="1" comment="gimp is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038167" version="1" comment="gimp-devel is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038168" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038169" version="1" comment="gimp-lang is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038170" version="1" comment="gimp-plugin-aa is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038171" version="1" comment="gimp-plugin-python3 is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038172" version="1" comment="gimp-vala is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038173" version="1" comment="libgimp-3_0-0 is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038174" version="1" comment="libgimpui-3_0-0 is &lt;3.0.6-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038175" version="1" comment="grafana is &lt;11.6.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038176" version="1" comment="hauler is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038177" version="1" comment="heroic-games-launcher is &lt;2.18.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038178" version="1" comment="python-keystonemiddleware-doc is &lt;10.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038179" version="1" comment="python311-keystonemiddleware is &lt;10.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038180" version="1" comment="python312-keystonemiddleware is &lt;10.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038181" version="1" comment="python313-keystonemiddleware is &lt;10.12.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038182" version="1" comment="libraylib550 is &lt;5.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038183" version="1" comment="raylib-devel is &lt;5.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038184" version="1" comment="libblkid-devel is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038185" version="1" comment="libblkid-devel-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038186" version="1" comment="libblkid-devel-static is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038187" version="1" comment="libblkid1 is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038188" version="1" comment="libblkid1-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038189" version="1" comment="libfdisk-devel is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038190" version="1" comment="libfdisk-devel-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038191" version="1" comment="libfdisk-devel-static is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038192" version="1" comment="libfdisk1 is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038193" version="1" comment="libfdisk1-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038194" version="1" comment="libmount-devel is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038195" version="1" comment="libmount-devel-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038196" version="1" comment="libmount-devel-static is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038197" version="1" comment="libmount1 is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038198" version="1" comment="libmount1-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038199" version="1" comment="libsmartcols-devel is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038200" version="1" comment="libsmartcols-devel-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038201" version="1" comment="libsmartcols-devel-static is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038202" version="1" comment="libsmartcols1 is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038203" version="1" comment="libsmartcols1-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038204" version="1" comment="libuuid-devel is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038205" version="1" comment="libuuid-devel-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038206" version="1" comment="libuuid-devel-static is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038207" version="1" comment="libuuid1 is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038208" version="1" comment="libuuid1-32bit is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038209" version="1" comment="util-linux is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038210" version="1" comment="util-linux-lang is &lt;2.41.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038486" version="1" comment="alloy is &lt;1.12.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038487" version="1" comment="corepack22 is &lt;22.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038488" version="1" comment="nodejs22 is &lt;22.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038489" version="1" comment="nodejs22-devel is &lt;22.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038490" version="1" comment="nodejs22-docs is &lt;22.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038491" version="1" comment="npm22 is &lt;22.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038492" version="1" comment="corepack24 is &lt;24.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038493" version="1" comment="nodejs24 is &lt;24.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038494" version="1" comment="nodejs24-devel is &lt;24.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038495" version="1" comment="nodejs24-docs is &lt;24.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038496" version="1" comment="npm24 is &lt;24.13.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038497" version="1" comment="python311-FontTools is &lt;4.61.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038498" version="1" comment="python312-FontTools is &lt;4.61.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038499" version="1" comment="python313-FontTools is &lt;4.61.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038500" version="1" comment="python311-jaraco.context is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038501" version="1" comment="python312-jaraco.context is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038502" version="1" comment="python313-jaraco.context is &lt;6.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038503" version="1" comment="python311-pyasn1 is &lt;0.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038504" version="1" comment="python312-pyasn1 is &lt;0.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038505" version="1" comment="python313-pyasn1 is &lt;0.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038506" version="1" comment="python311-weasyprint is &lt;68.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038507" version="1" comment="python312-weasyprint is &lt;68.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038508" version="1" comment="python313-weasyprint is &lt;68.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039560" version="1" comment="bind is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039561" version="1" comment="bind-doc is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039562" version="1" comment="bind-modules-bdbhpt is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039563" version="1" comment="bind-modules-generic is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039564" version="1" comment="bind-modules-ldap is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039565" version="1" comment="bind-modules-mysql is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039566" version="1" comment="bind-modules-perl is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039567" version="1" comment="bind-modules-sqlite3 is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039568" version="1" comment="bind-utils is &lt;9.20.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039569" version="1" comment="libsubid-devel is &lt;4.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039570" version="1" comment="libsubid5 is &lt;4.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039571" version="1" comment="login_defs is &lt;4.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039572" version="1" comment="shadow is &lt;4.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039573" version="1" comment="shadow-pw-mgmt is &lt;4.19.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039574" version="1" comment="libsuricata8_0_3 is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039575" version="1" comment="suricata is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039576" version="1" comment="suricata-devel is &lt;8.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039577" version="1" comment="vlang is &lt;0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039578" version="1" comment="vlang-examples is &lt;0.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039579" version="1" comment="chromedriver is &lt;144.0.7559.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039580" version="1" comment="chromium is &lt;144.0.7559.96-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039581" version="1" comment="libxml2-16 is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039582" version="1" comment="libxml2-16-32bit is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039583" version="1" comment="libxml2-devel is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039584" version="1" comment="libxml2-devel-32bit is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039585" version="1" comment="libxml2-doc is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039586" version="1" comment="libxml2-tools is &lt;2.14.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039587" version="1" comment="openCryptoki is &lt;3.26.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039588" version="1" comment="openCryptoki-64bit is &lt;3.26.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039589" version="1" comment="openCryptoki-devel is &lt;3.26.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039590" version="1" comment="tdom is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039591" version="1" comment="tdom-devel is &lt;0.9.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040514" version="1" comment="cups is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040515" version="1" comment="cups-client is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040516" version="1" comment="cups-config is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040517" version="1" comment="cups-ddk is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040518" version="1" comment="cups-devel is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040519" version="1" comment="cups-devel-32bit is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040520" version="1" comment="libcups2 is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040521" version="1" comment="libcups2-32bit is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040522" version="1" comment="libcupsimage2 is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040523" version="1" comment="libcupsimage2-32bit is &lt;2.4.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040524" version="1" comment="gio-branding-upstream is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040525" version="1" comment="glib2-devel is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040526" version="1" comment="glib2-devel-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040527" version="1" comment="glib2-devel-static is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040528" version="1" comment="glib2-lang is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040529" version="1" comment="glib2-tests-devel is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040530" version="1" comment="glib2-tools is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040531" version="1" comment="glib2-tools-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040532" version="1" comment="libgio-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040533" version="1" comment="libgio-2_0-0-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040534" version="1" comment="libgirepository-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040535" version="1" comment="libglib-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040536" version="1" comment="libglib-2_0-0-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040537" version="1" comment="libgmodule-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040538" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040539" version="1" comment="libgobject-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040540" version="1" comment="libgobject-2_0-0-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040541" version="1" comment="libgthread-2_0-0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040542" version="1" comment="libgthread-2_0-0-32bit is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040543" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040544" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040545" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040546" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040547" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040548" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.86.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040549" version="1" comment="google-osconfig-agent is &lt;20260119.00-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040550" version="1" comment="java-11-openjdk is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040551" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040552" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040553" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040554" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040555" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040556" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040557" version="1" comment="java-17-openjdk is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040558" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040559" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040560" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040561" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040562" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040563" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040564" version="1" comment="java-21-openjdk is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040565" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040566" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040567" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040568" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040569" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040570" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040571" version="1" comment="libmatio-devel is &lt;1.5.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040572" version="1" comment="libmatio14 is &lt;1.5.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040573" version="1" comment="matio-tools is &lt;1.5.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040574" version="1" comment="libopenjp2-7 is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040575" version="1" comment="libopenjp2-7-32bit is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040576" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040577" version="1" comment="openjpeg2 is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040578" version="1" comment="openjpeg2-devel is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040579" version="1" comment="openjpeg2-devel-doc is &lt;2.5.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040580" version="1" comment="python311-urllib3_1 is &lt;1.26.20-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040581" version="1" comment="python312-urllib3_1 is &lt;1.26.20-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040582" version="1" comment="python313-urllib3_1 is &lt;1.26.20-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040583" version="1" comment="qemu is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040584" version="1" comment="qemu-SLOF is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040585" version="1" comment="qemu-accel-qtest is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040586" version="1" comment="qemu-arm is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040587" version="1" comment="qemu-audio-alsa is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040588" version="1" comment="qemu-audio-dbus is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040589" version="1" comment="qemu-audio-jack is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040590" version="1" comment="qemu-audio-oss is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040591" version="1" comment="qemu-audio-pa is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040592" version="1" comment="qemu-audio-pipewire is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040593" version="1" comment="qemu-audio-sdl is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040594" version="1" comment="qemu-audio-spice is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040595" version="1" comment="qemu-block-curl is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040596" version="1" comment="qemu-block-dmg is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040597" version="1" comment="qemu-block-iscsi is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040598" version="1" comment="qemu-block-nfs is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040599" version="1" comment="qemu-block-rbd is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040600" version="1" comment="qemu-block-ssh is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040601" version="1" comment="qemu-chardev-baum is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040602" version="1" comment="qemu-chardev-spice is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040603" version="1" comment="qemu-doc is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040604" version="1" comment="qemu-extra is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040605" version="1" comment="qemu-guest-agent is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040606" version="1" comment="qemu-headless is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040607" version="1" comment="qemu-hw-display-qxl is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040608" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040609" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040610" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040611" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040612" version="1" comment="qemu-hw-usb-host is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040613" version="1" comment="qemu-hw-usb-redirect is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040614" version="1" comment="qemu-hw-usb-smartcard is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040615" version="1" comment="qemu-img is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040616" version="1" comment="qemu-ipxe is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040617" version="1" comment="qemu-ivshmem-tools is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040618" version="1" comment="qemu-ksm is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040619" version="1" comment="qemu-lang is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040620" version="1" comment="qemu-microvm is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040621" version="1" comment="qemu-ppc is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040622" version="1" comment="qemu-pr-helper is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040623" version="1" comment="qemu-s390x is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040624" version="1" comment="qemu-seabios is &lt;10.2.01.17.0_1_g4f253b9b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040625" version="1" comment="qemu-skiboot is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040626" version="1" comment="qemu-spice is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040627" version="1" comment="qemu-tools is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040628" version="1" comment="qemu-ui-curses is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040629" version="1" comment="qemu-ui-dbus is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040630" version="1" comment="qemu-ui-gtk is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040631" version="1" comment="qemu-ui-opengl is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040632" version="1" comment="qemu-ui-sdl is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040633" version="1" comment="qemu-ui-spice-app is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040634" version="1" comment="qemu-ui-spice-core is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040635" version="1" comment="qemu-vgabios is &lt;10.2.01.17.0_1_g4f253b9b-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040636" version="1" comment="qemu-vhost-user-gpu is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040637" version="1" comment="qemu-vmsr-helper is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040638" version="1" comment="qemu-x86 is &lt;10.2.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040639" version="1" comment="tlp is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040640" version="1" comment="tlp-rdw is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040641" version="1" comment="zli is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040642" version="1" comment="zli-bash-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040643" version="1" comment="zli-fish-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040644" version="1" comment="zli-zsh-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040645" version="1" comment="zot-registry is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040646" version="1" comment="zot-registry-bash-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040647" version="1" comment="zot-registry-fish-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040648" version="1" comment="zot-registry-zsh-completion is &lt;2.1.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040649" version="1" comment="coredns is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040650" version="1" comment="coredns-extras is &lt;1.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040651" version="1" comment="libopencc1_2 is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040652" version="1" comment="opencc is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040653" version="1" comment="opencc-data is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040654" version="1" comment="opencc-devel is &lt;1.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040655" version="1" comment="python311-orjson is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040656" version="1" comment="python312-orjson is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040657" version="1" comment="python313-orjson is &lt;3.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040658" version="1" comment="python311-sigstore is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040659" version="1" comment="python312-sigstore is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040660" version="1" comment="python313-sigstore is &lt;4.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040661" version="1" comment="teleport is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040662" version="1" comment="teleport-bash-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040663" version="1" comment="teleport-fdpass-teleport is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040664" version="1" comment="teleport-tbot is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040665" version="1" comment="teleport-tbot-bash-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040666" version="1" comment="teleport-tbot-zsh-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040667" version="1" comment="teleport-tctl is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040668" version="1" comment="teleport-tctl-bash-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040669" version="1" comment="teleport-tctl-zsh-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040670" version="1" comment="teleport-tsh is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040671" version="1" comment="teleport-tsh-bash-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040672" version="1" comment="teleport-tsh-zsh-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040673" version="1" comment="teleport-zsh-completion is &lt;17.7.14-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040674" version="1" comment="assertj-core is &lt;3.27.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040675" version="1" comment="assertj-core-javadoc is &lt;3.27.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040676" version="1" comment="freerdp is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040677" version="1" comment="freerdp-devel is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040678" version="1" comment="freerdp-proxy is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040679" version="1" comment="freerdp-proxy-plugins is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040680" version="1" comment="freerdp-sdl is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040681" version="1" comment="freerdp-server is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040682" version="1" comment="freerdp-wayland is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040683" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040684" version="1" comment="libfreerdp3-3 is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040685" version="1" comment="librdtk0-0 is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040686" version="1" comment="libuwac0-0 is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040687" version="1" comment="libwinpr3-3 is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040688" version="1" comment="rdtk0-devel is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040689" version="1" comment="uwac0-devel is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040690" version="1" comment="winpr-devel is &lt;3.21.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040691" version="1" comment="java-25-openjdk is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040692" version="1" comment="java-25-openjdk-demo is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040693" version="1" comment="java-25-openjdk-devel is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040694" version="1" comment="java-25-openjdk-headless is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040695" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040696" version="1" comment="java-25-openjdk-jmods is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040697" version="1" comment="java-25-openjdk-src is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040698" version="1" comment="python311-sse-starlette is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040699" version="1" comment="python312-sse-starlette is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040700" version="1" comment="python313-sse-starlette is &lt;3.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040701" version="1" comment="python311-salt is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040702" version="1" comment="python312-salt is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040703" version="1" comment="python313-salt is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040704" version="1" comment="salt is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040705" version="1" comment="salt-api is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040706" version="1" comment="salt-bash-completion is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040707" version="1" comment="salt-cloud is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040708" version="1" comment="salt-doc is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040709" version="1" comment="salt-fish-completion is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040710" version="1" comment="salt-master is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040711" version="1" comment="salt-minion is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040712" version="1" comment="salt-proxy is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040713" version="1" comment="salt-ssh is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040714" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040715" version="1" comment="salt-syndic is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040716" version="1" comment="salt-transactional-update is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040717" version="1" comment="salt-zsh-completion is &lt;3006.0-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041050" version="1" comment="gio-branding-upstream is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041051" version="1" comment="glib2-devel is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041052" version="1" comment="glib2-devel-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041053" version="1" comment="glib2-devel-static is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041054" version="1" comment="glib2-lang is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041055" version="1" comment="glib2-tests-devel is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041056" version="1" comment="glib2-tools is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041057" version="1" comment="glib2-tools-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041058" version="1" comment="libgio-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041059" version="1" comment="libgio-2_0-0-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041060" version="1" comment="libgirepository-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041061" version="1" comment="libglib-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041062" version="1" comment="libglib-2_0-0-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041063" version="1" comment="libgmodule-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041064" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041065" version="1" comment="libgobject-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041066" version="1" comment="libgobject-2_0-0-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041067" version="1" comment="libgthread-2_0-0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041068" version="1" comment="libgthread-2_0-0-32bit is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041069" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041070" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041071" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041072" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041073" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041074" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.86.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041075" version="1" comment="dirmngr is &lt;2.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041076" version="1" comment="gpg2 is &lt;2.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041077" version="1" comment="gpg2-lang is &lt;2.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041078" version="1" comment="gpg2-tpm is &lt;2.5.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041079" version="1" comment="icinga2 is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041080" version="1" comment="icinga2-bin is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041081" version="1" comment="icinga2-common is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041082" version="1" comment="icinga2-doc is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041083" version="1" comment="icinga2-ido-mysql is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041084" version="1" comment="icinga2-ido-pgsql is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041085" version="1" comment="nano-icinga2 is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041086" version="1" comment="vim-icinga2 is &lt;2.15.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041087" version="1" comment="logback is &lt;1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041088" version="1" comment="logback-access is &lt;1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041089" version="1" comment="logback-examples is &lt;1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041090" version="1" comment="logback-javadoc is &lt;1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041091" version="1" comment="python311-djangorestframework is &lt;3.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041092" version="1" comment="python312-djangorestframework is &lt;3.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041093" version="1" comment="python313-djangorestframework is &lt;3.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041094" version="1" comment="python311-pypdf is &lt;6.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041095" version="1" comment="python312-pypdf is &lt;6.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041096" version="1" comment="python313-pypdf is &lt;6.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041097" version="1" comment="python314 is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041098" version="1" comment="python314-curses is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041099" version="1" comment="python314-dbm is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041100" version="1" comment="python314-idle is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041101" version="1" comment="python314-tk is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041102" version="1" comment="python314-x86-64-v3 is &lt;3.14.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041103" version="1" comment="xen is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041104" version="1" comment="xen-devel is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041105" version="1" comment="xen-doc-html is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041106" version="1" comment="xen-libs is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041107" version="1" comment="xen-tools is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041108" version="1" comment="xen-tools-domU is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041109" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.21.0_04-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041110" version="1" comment="ImageMagick is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041111" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041112" version="1" comment="ImageMagick-devel is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041113" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041114" version="1" comment="ImageMagick-doc is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041115" version="1" comment="ImageMagick-extra is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041116" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041117" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041118" version="1" comment="libMagick++-devel is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041119" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041120" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041121" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041122" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041123" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041124" version="1" comment="perl-PerlMagick is &lt;7.1.2.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041125" version="1" comment="MozillaFirefox is &lt;147.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041126" version="1" comment="MozillaFirefox-branding-upstream is &lt;147.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041127" version="1" comment="MozillaFirefox-devel is &lt;147.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041128" version="1" comment="MozillaFirefox-translations-common is &lt;147.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041129" version="1" comment="MozillaFirefox-translations-other is &lt;147.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041130" version="1" comment="chromedriver is &lt;144.0.7559.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041131" version="1" comment="chromium is &lt;144.0.7559.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041132" version="1" comment="fontforge is &lt;20251009-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041133" version="1" comment="fontforge-devel is &lt;20251009-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041134" version="1" comment="fontforge-doc is &lt;20251009-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041135" version="1" comment="freerdp is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041136" version="1" comment="freerdp-devel is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041137" version="1" comment="freerdp-proxy is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041138" version="1" comment="freerdp-proxy-plugins is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041139" version="1" comment="freerdp-sdl is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041140" version="1" comment="freerdp-server is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041141" version="1" comment="freerdp-wayland is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041142" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041143" version="1" comment="libfreerdp3-3 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041144" version="1" comment="librdtk0-0 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041145" version="1" comment="libuwac0-0 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041146" version="1" comment="libwinpr3-3 is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041147" version="1" comment="rdtk0-devel is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041148" version="1" comment="uwac0-devel is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041149" version="1" comment="winpr-devel is &lt;3.21.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041150" version="1" comment="golang-github-prometheus-prometheus is &lt;3.9.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041151" version="1" comment="python311-django-storages is &lt;1.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041152" version="1" comment="python312-django-storages is &lt;1.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041153" version="1" comment="python313-django-storages is &lt;1.14.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041154" version="1" comment="python315 is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041155" version="1" comment="python315-curses is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041156" version="1" comment="python315-dbm is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041157" version="1" comment="python315-idle is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041158" version="1" comment="python315-profiling is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041159" version="1" comment="python315-tk is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041160" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041161" version="1" comment="rekor is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041162" version="1" comment="MozillaThunderbird is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041163" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041164" version="1" comment="MozillaThunderbird-translations-common is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041165" version="1" comment="MozillaThunderbird-translations-other is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041668" version="1" comment="libmlt++-7-7 is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041669" version="1" comment="libmlt-7-7 is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041670" version="1" comment="libmlt-devel is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041671" version="1" comment="libmlt7-data is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041672" version="1" comment="libmlt7-module-qt6 is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041673" version="1" comment="libmlt7-modules is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041674" version="1" comment="melt is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041675" version="1" comment="python3-mlt is &lt;7.36.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041676" version="1" comment="python311-PyNaCl is &lt;1.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041677" version="1" comment="python312-PyNaCl is &lt;1.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041678" version="1" comment="python313-PyNaCl is &lt;1.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041679" version="1" comment="trivy is &lt;0.69.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041955" version="1" comment="freerdp is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041956" version="1" comment="freerdp-devel is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041957" version="1" comment="freerdp-proxy is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041958" version="1" comment="freerdp-proxy-plugins is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041959" version="1" comment="freerdp-sdl is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041960" version="1" comment="freerdp-server is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041961" version="1" comment="freerdp-wayland is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041962" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041963" version="1" comment="libfreerdp3-3 is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041964" version="1" comment="librdtk0-0 is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041965" version="1" comment="libuwac0-0 is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041966" version="1" comment="libwinpr3-3 is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041967" version="1" comment="rdtk0-devel is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041968" version="1" comment="uwac0-devel is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041969" version="1" comment="winpr-devel is &lt;3.22.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041970" version="1" comment="java-11-openj9 is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041971" version="1" comment="java-11-openj9-demo is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041972" version="1" comment="java-11-openj9-devel is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041973" version="1" comment="java-11-openj9-headless is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041974" version="1" comment="java-11-openj9-javadoc is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041975" version="1" comment="java-11-openj9-jmods is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041976" version="1" comment="java-11-openj9-src is &lt;11.0.30.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041977" version="1" comment="java-17-openj9 is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041978" version="1" comment="java-17-openj9-demo is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041979" version="1" comment="java-17-openj9-devel is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041980" version="1" comment="java-17-openj9-headless is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041981" version="1" comment="java-17-openj9-javadoc is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041982" version="1" comment="java-17-openj9-jmods is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041983" version="1" comment="java-17-openj9-src is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041984" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041985" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041986" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041987" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041988" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041989" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041990" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041991" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041992" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041993" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041994" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041995" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041996" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041997" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.482-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041998" version="1" comment="java-21-openj9 is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041999" version="1" comment="java-21-openj9-demo is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042000" version="1" comment="java-21-openj9-devel is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042001" version="1" comment="java-21-openj9-headless is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042002" version="1" comment="java-21-openj9-javadoc is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042003" version="1" comment="java-21-openj9-jmods is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042004" version="1" comment="java-21-openj9-src is &lt;21.0.10.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042005" version="1" comment="java-25-openj9 is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042006" version="1" comment="java-25-openj9-demo is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042007" version="1" comment="java-25-openj9-devel is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042008" version="1" comment="java-25-openj9-headless is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042009" version="1" comment="java-25-openj9-javadoc is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042010" version="1" comment="java-25-openj9-jmods is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042011" version="1" comment="java-25-openj9-src is &lt;25.0.2.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042012" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042013" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042014" version="1" comment="libsoup-devel is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042015" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042016" version="1" comment="libsoup-lang is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042017" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042018" version="1" comment="patch is &lt;2.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042019" version="1" comment="rizin is &lt;0.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042020" version="1" comment="rizin-common is &lt;0.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042021" version="1" comment="rizin-devel is &lt;0.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042022" version="1" comment="traefik is &lt;3.6.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042023" version="1" comment="traefik2 is &lt;2.11.35-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042147" version="1" comment="expat is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042148" version="1" comment="libexpat-devel is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042149" version="1" comment="libexpat-devel-32bit is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042150" version="1" comment="libexpat1 is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042151" version="1" comment="libexpat1-32bit is &lt;2.7.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042152" version="1" comment="python312-Django6 is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042153" version="1" comment="python313-Django6 is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042154" version="1" comment="libpainter0 is &lt;0.9.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042155" version="1" comment="librfxencode0 is &lt;0.9.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042156" version="1" comment="xrdp is &lt;0.9.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042157" version="1" comment="xrdp-devel is &lt;0.9.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042244" version="1" comment="cockpit-machines is &lt;346-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042245" version="1" comment="cockpit-packages is &lt;4.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042246" version="1" comment="cockpit-repos is &lt;4.7-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042247" version="1" comment="cockpit-subscriptions is &lt;14.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042248" version="1" comment="python311-wheel is &lt;0.46.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042249" version="1" comment="python312-wheel is &lt;0.46.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042250" version="1" comment="python313-wheel is &lt;0.46.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042251" version="1" comment="python315 is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042252" version="1" comment="python315-curses is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042253" version="1" comment="python315-dbm is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042254" version="1" comment="python315-idle is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042255" version="1" comment="python315-profiling is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042256" version="1" comment="python315-tk is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042257" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042328" version="1" comment="chromedriver is &lt;144.0.7559.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042329" version="1" comment="chromium is &lt;144.0.7559.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042330" version="1" comment="cockpit is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042331" version="1" comment="cockpit-bridge is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042332" version="1" comment="cockpit-devel is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042333" version="1" comment="cockpit-doc is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042334" version="1" comment="cockpit-firewalld is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042335" version="1" comment="cockpit-kdump is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042336" version="1" comment="cockpit-networkmanager is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042337" version="1" comment="cockpit-packagekit is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042338" version="1" comment="cockpit-selinux is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042339" version="1" comment="cockpit-storaged is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042340" version="1" comment="cockpit-system is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042341" version="1" comment="cockpit-ws is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042342" version="1" comment="cockpit-ws-selinux is &lt;354-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042343" version="1" comment="cockpit-podman is &lt;119.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042344" version="1" comment="micropython is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042345" version="1" comment="mpremote is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042346" version="1" comment="mpy-tools is &lt;1.26.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042347" version="1" comment="libsnmp45 is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042348" version="1" comment="libsnmp45-32bit is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042349" version="1" comment="net-snmp is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042350" version="1" comment="net-snmp-devel is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042351" version="1" comment="net-snmp-devel-32bit is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042352" version="1" comment="perl-SNMP is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042353" version="1" comment="python311-net-snmp is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042354" version="1" comment="python312-net-snmp is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042355" version="1" comment="python313-net-snmp is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042356" version="1" comment="snmp-mibs is &lt;5.9.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042357" version="1" comment="nginx is &lt;1.29.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042358" version="1" comment="nginx-source is &lt;1.29.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042359" version="1" comment="opencloud-server is &lt;5.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042360" version="1" comment="python311-Django is &lt;5.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042361" version="1" comment="python312-Django is &lt;5.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042362" version="1" comment="python313-Django is &lt;5.2.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042363" version="1" comment="python311-azure-core is &lt;1.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042364" version="1" comment="python312-azure-core is &lt;1.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042365" version="1" comment="python313-azure-core is &lt;1.38.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042369" version="1" comment="localsearch is &lt;3.10.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042370" version="1" comment="localsearch-lang is &lt;3.10.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042658" version="1" comment="go1.24 is &lt;1.24.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042659" version="1" comment="go1.24-doc is &lt;1.24.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042660" version="1" comment="go1.24-libstd is &lt;1.24.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042661" version="1" comment="go1.24-race is &lt;1.24.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042662" version="1" comment="go1.25 is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042663" version="1" comment="go1.25-doc is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042664" version="1" comment="go1.25-libstd is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042665" version="1" comment="go1.25-race is &lt;1.25.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042666" version="1" comment="keylime-config is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042667" version="1" comment="keylime-firewalld is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042668" version="1" comment="keylime-logrotate is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042669" version="1" comment="keylime-registrar is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042670" version="1" comment="keylime-tenant is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042671" version="1" comment="keylime-tpm_cert_store is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042672" version="1" comment="keylime-verifier is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042673" version="1" comment="python311-keylime is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042674" version="1" comment="python312-keylime is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042675" version="1" comment="python313-keylime is &lt;7.14.0+0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042676" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042677" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042678" version="1" comment="libsoup2-devel is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042679" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042680" version="1" comment="libsoup2-lang is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042681" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042682" version="1" comment="libxml2-16 is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042683" version="1" comment="libxml2-16-32bit is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042684" version="1" comment="libxml2-devel is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042685" version="1" comment="libxml2-devel-32bit is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042686" version="1" comment="libxml2-doc is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042687" version="1" comment="libxml2-tools is &lt;2.14.5-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042688" version="1" comment="openQA is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042689" version="1" comment="openQA-auto-update is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042690" version="1" comment="openQA-bootstrap is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042691" version="1" comment="openQA-client is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042692" version="1" comment="openQA-common is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042693" version="1" comment="openQA-continuous-update is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042694" version="1" comment="openQA-devel is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042695" version="1" comment="openQA-doc is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042696" version="1" comment="openQA-local-db is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042697" version="1" comment="openQA-mcp is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042698" version="1" comment="openQA-munin is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042699" version="1" comment="openQA-python-scripts is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042700" version="1" comment="openQA-single-instance is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042701" version="1" comment="openQA-single-instance-nginx is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042702" version="1" comment="openQA-worker is &lt;5.1770718745.ce2072d3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042703" version="1" comment="libp11-kit0 is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042704" version="1" comment="libp11-kit0-32bit is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042705" version="1" comment="p11-kit is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042706" version="1" comment="p11-kit-32bit is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042707" version="1" comment="p11-kit-devel is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042708" version="1" comment="p11-kit-nss-trust is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042709" version="1" comment="p11-kit-nss-trust-32bit is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042710" version="1" comment="p11-kit-server is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042711" version="1" comment="p11-kit-tools is &lt;0.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042712" version="1" comment="keylime-ima-policy is &lt;0.2.8+116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042713" version="1" comment="rust-keylime is &lt;0.2.8+116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042714" version="1" comment="lemon is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042715" version="1" comment="libsqlite3-0 is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042716" version="1" comment="libsqlite3-0-32bit is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042717" version="1" comment="libsqlite3-0-x86-64-v3 is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042718" version="1" comment="sqlite3 is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042719" version="1" comment="sqlite3-devel is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042720" version="1" comment="sqlite3-doc is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042721" version="1" comment="sqlite3-tcl is &lt;3.51.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042722" version="1" comment="wicked2nm is &lt;1.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043300" version="1" comment="apptainer is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043301" version="1" comment="apptainer-leap is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043302" version="1" comment="apptainer-sle15_7 is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043303" version="1" comment="apptainer-sle16 is &lt;1.4.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043304" version="1" comment="assimp-devel is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043305" version="1" comment="libassimp6 is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043306" version="1" comment="cargo-audit is &lt;0.22.1~git0.efcde93-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043307" version="1" comment="freerdp2 is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043308" version="1" comment="freerdp2-devel is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043309" version="1" comment="freerdp2-proxy is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043310" version="1" comment="freerdp2-server is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043311" version="1" comment="libfreerdp2-2 is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043312" version="1" comment="libwinpr2-2 is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043313" version="1" comment="winpr2-devel is &lt;2.11.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043314" version="1" comment="gnutls is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043315" version="1" comment="libgnutls-dane-devel is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043316" version="1" comment="libgnutls-dane0 is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043317" version="1" comment="libgnutls-devel is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043318" version="1" comment="libgnutls-devel-32bit is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043319" version="1" comment="libgnutls-devel-doc is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043320" version="1" comment="libgnutls30 is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043321" version="1" comment="libgnutls30-32bit is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043322" version="1" comment="libgnutlsxx-devel is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043323" version="1" comment="libgnutlsxx30 is &lt;3.8.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043324" version="1" comment="libmunge2 is &lt;0.5.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043325" version="1" comment="munge is &lt;0.5.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043326" version="1" comment="munge-devel is &lt;0.5.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043327" version="1" comment="python311-maturin is &lt;1.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043328" version="1" comment="python312-maturin is &lt;1.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043329" version="1" comment="python313-maturin is &lt;1.11.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043330" version="1" comment="rustup is &lt;1.28.2~0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043331" version="1" comment="sccache is &lt;0.13.0~1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043332" version="1" comment="snpguest is &lt;0.10.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043576" version="1" comment="build is &lt;20260202-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043577" version="1" comment="build-initvm-i586 is &lt;20260202-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043578" version="1" comment="build-initvm-x86_64 is &lt;20260202-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043579" version="1" comment="build-mkbaselibs is &lt;20260202-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043580" version="1" comment="build-mkdrpms is &lt;20260202-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043581" version="1" comment="cargo-auditable is &lt;0.7.2~0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043582" version="1" comment="cargo-c is &lt;0.10.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043583" version="1" comment="gnome-remote-desktop is &lt;49.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043584" version="1" comment="gnome-remote-desktop-lang is &lt;49.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043585" version="1" comment="haproxy is &lt;3.3.3+git0.465d8e2fc-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043586" version="1" comment="libpng16-16 is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043587" version="1" comment="libpng16-16-32bit is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043588" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043589" version="1" comment="libpng16-compat-devel is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043590" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043591" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043592" version="1" comment="libpng16-devel is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043593" version="1" comment="libpng16-devel-32bit is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043594" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043595" version="1" comment="libpng16-tools is &lt;1.6.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043596" version="1" comment="libowncloudsync-devel is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043597" version="1" comment="libowncloudsync0 is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043598" version="1" comment="owncloud-client is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043599" version="1" comment="postgresql14 is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043600" version="1" comment="postgresql14-contrib is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043601" version="1" comment="postgresql14-devel is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043602" version="1" comment="postgresql14-docs is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043603" version="1" comment="postgresql14-llvmjit is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043604" version="1" comment="postgresql14-llvmjit-devel is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043605" version="1" comment="postgresql14-plperl is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043606" version="1" comment="postgresql14-plpython is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043607" version="1" comment="postgresql14-pltcl is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043608" version="1" comment="postgresql14-server is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043609" version="1" comment="postgresql14-server-devel is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043610" version="1" comment="postgresql14-test is &lt;14.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043611" version="1" comment="postgresql15 is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043612" version="1" comment="postgresql15-contrib is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043613" version="1" comment="postgresql15-devel is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043614" version="1" comment="postgresql15-docs is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043615" version="1" comment="postgresql15-llvmjit is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043616" version="1" comment="postgresql15-llvmjit-devel is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043617" version="1" comment="postgresql15-plperl is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043618" version="1" comment="postgresql15-plpython is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043619" version="1" comment="postgresql15-pltcl is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043620" version="1" comment="postgresql15-server is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043621" version="1" comment="postgresql15-server-devel is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043622" version="1" comment="postgresql15-test is &lt;15.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043623" version="1" comment="postgresql16 is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043624" version="1" comment="postgresql16-contrib is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043625" version="1" comment="postgresql16-devel is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043626" version="1" comment="postgresql16-docs is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043627" version="1" comment="postgresql16-llvmjit is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043628" version="1" comment="postgresql16-llvmjit-devel is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043629" version="1" comment="postgresql16-plperl is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043630" version="1" comment="postgresql16-plpython is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043631" version="1" comment="postgresql16-pltcl is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043632" version="1" comment="postgresql16-server is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043633" version="1" comment="postgresql16-server-devel is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043634" version="1" comment="postgresql16-test is &lt;16.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043635" version="1" comment="postgresql17 is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043636" version="1" comment="postgresql17-contrib is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043637" version="1" comment="postgresql17-devel is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043638" version="1" comment="postgresql17-docs is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043639" version="1" comment="postgresql17-llvmjit is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043640" version="1" comment="postgresql17-llvmjit-devel is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043641" version="1" comment="postgresql17-plperl is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043642" version="1" comment="postgresql17-plpython is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043643" version="1" comment="postgresql17-pltcl is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043644" version="1" comment="postgresql17-server is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043645" version="1" comment="postgresql17-server-devel is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043646" version="1" comment="postgresql17-test is &lt;17.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043913" version="1" comment="cargo-audit-advisory-db is &lt;20260213-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043914" version="1" comment="gimp is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043915" version="1" comment="gimp-devel is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043916" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043917" version="1" comment="gimp-lang is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043918" version="1" comment="gimp-plugin-aa is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043919" version="1" comment="gimp-plugin-python3 is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043920" version="1" comment="gimp-vala is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043921" version="1" comment="libgimp-3_0-0 is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043922" version="1" comment="libgimpui-3_0-0 is &lt;3.0.8-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043923" version="1" comment="matrix-synapse is &lt;1.147.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043924" version="1" comment="libecpg6 is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043925" version="1" comment="libecpg6-32bit is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043926" version="1" comment="libpq5 is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043927" version="1" comment="libpq5-32bit is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043928" version="1" comment="postgresql18 is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043929" version="1" comment="postgresql18-contrib is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043930" version="1" comment="postgresql18-devel is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043931" version="1" comment="postgresql18-docs is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043932" version="1" comment="postgresql18-llvmjit is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043933" version="1" comment="postgresql18-llvmjit-devel is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043934" version="1" comment="postgresql18-plperl is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043935" version="1" comment="postgresql18-plpython is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043936" version="1" comment="postgresql18-pltcl is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043937" version="1" comment="postgresql18-server is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043938" version="1" comment="postgresql18-server-devel is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043939" version="1" comment="postgresql18-test is &lt;18.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043940" version="1" comment="python311-Pillow is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043941" version="1" comment="python311-Pillow-tk is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043942" version="1" comment="python312-Pillow is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043943" version="1" comment="python312-Pillow-tk is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043944" version="1" comment="python313-Pillow is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043945" version="1" comment="python313-Pillow-tk is &lt;12.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043946" version="1" comment="python311-pymssql is &lt;2.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043947" version="1" comment="python312-pymssql is &lt;2.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043948" version="1" comment="python313-pymssql is &lt;2.3.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043949" version="1" comment="python310 is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043950" version="1" comment="python310-32bit is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043951" version="1" comment="python310-curses is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043952" version="1" comment="python310-dbm is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043953" version="1" comment="python310-idle is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043954" version="1" comment="python310-tk is &lt;3.10.19-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043955" version="1" comment="chromedriver is &lt;145.0.7632.45-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043956" version="1" comment="chromium is &lt;145.0.7632.45-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043957" version="1" comment="himmelblau is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043958" version="1" comment="himmelblau-qr-greeter is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043959" version="1" comment="himmelblau-sshd-config is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043960" version="1" comment="himmelblau-sso is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043961" version="1" comment="libnss_himmelblau2 is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043962" version="1" comment="pam-himmelblau is &lt;2.3.5+git0.9dd526c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043963" version="1" comment="libssh-config is &lt;0.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043964" version="1" comment="libssh-devel is &lt;0.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043965" version="1" comment="libssh4 is &lt;0.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043966" version="1" comment="libssh4-32bit is &lt;0.11.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043967" version="1" comment="openjfx is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043968" version="1" comment="openjfx-devel is &lt;17.0.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043969" version="1" comment="python311-cryptography is &lt;46.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043970" version="1" comment="python312-cryptography is &lt;46.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043971" version="1" comment="python313-cryptography is &lt;46.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043972" version="1" comment="python314 is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043973" version="1" comment="python314-curses is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043974" version="1" comment="python314-dbm is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043975" version="1" comment="python314-idle is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043976" version="1" comment="python314-tk is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043977" version="1" comment="python314-x86-64-v3 is &lt;3.14.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044106" version="1" comment="frr is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044107" version="1" comment="frr-devel is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044108" version="1" comment="libfrr0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044109" version="1" comment="libfrr_pb0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044110" version="1" comment="libfrrcares0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044111" version="1" comment="libfrrfpm_pb0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044112" version="1" comment="libfrrospfapiclient0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044113" version="1" comment="libfrrsnmp0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044114" version="1" comment="libfrrzmq0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044115" version="1" comment="libmgmt_be_nb0 is &lt;10.2.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044116" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044117" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044118" version="1" comment="libsoup-devel is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044119" version="1" comment="libsoup-devel-32bit is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044120" version="1" comment="libsoup-lang is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044121" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044122" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044123" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044124" version="1" comment="libsoup2-devel is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044125" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044126" version="1" comment="libsoup2-lang is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044127" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044128" version="1" comment="python311-pip is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044129" version="1" comment="python311-pip-wheel is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044130" version="1" comment="python312-pip is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044131" version="1" comment="python312-pip-wheel is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044132" version="1" comment="python313-pip is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044133" version="1" comment="python313-pip-wheel is &lt;26.0.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044238" version="1" comment="azure-cli-core is &lt;2.83.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044239" version="1" comment="firefox-esr is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044240" version="1" comment="firefox-esr-branding-upstream is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044241" version="1" comment="firefox-esr-translations-common is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044242" version="1" comment="firefox-esr-translations-other is &lt;140.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044243" version="1" comment="libxml2-16 is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044244" version="1" comment="libxml2-16-32bit is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044245" version="1" comment="libxml2-devel is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044246" version="1" comment="libxml2-devel-32bit is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044247" version="1" comment="libxml2-doc is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044248" version="1" comment="libxml2-tools is &lt;2.14.5-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044249" version="1" comment="mupdf is &lt;1.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044250" version="1" comment="mupdf-devel-static is &lt;1.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044251" version="1" comment="owntone is &lt;29.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044252" version="1" comment="python311-asgiref is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044253" version="1" comment="python312-asgiref is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044254" version="1" comment="python313-asgiref is &lt;3.11.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044255" version="1" comment="traefik is &lt;3.6.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044308" version="1" comment="MozillaThunderbird is &lt;140.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044309" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044310" version="1" comment="MozillaThunderbird-translations-common is &lt;140.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044311" version="1" comment="MozillaThunderbird-translations-other is &lt;140.7.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044312" version="1" comment="dnsdist is &lt;2.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044313" version="1" comment="istioctl is &lt;1.28.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044314" version="1" comment="istioctl-bash-completion is &lt;1.28.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044315" version="1" comment="istioctl-zsh-completion is &lt;1.28.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044316" version="1" comment="python311 is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044317" version="1" comment="python311-32bit is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044318" version="1" comment="python311-curses is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044319" version="1" comment="python311-dbm is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044320" version="1" comment="python311-idle is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044321" version="1" comment="python311-tk is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044322" version="1" comment="python311-x86-64-v3 is &lt;3.11.14-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044323" version="1" comment="python312 is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044324" version="1" comment="python312-32bit is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044325" version="1" comment="python312-curses is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044326" version="1" comment="python312-dbm is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044327" version="1" comment="python312-idle is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044328" version="1" comment="python312-tk is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044329" version="1" comment="python312-x86-64-v3 is &lt;3.12.12-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044330" version="1" comment="python313 is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044331" version="1" comment="python313-32bit is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044332" version="1" comment="python313-curses is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044333" version="1" comment="python313-dbm is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044334" version="1" comment="python313-idle is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044335" version="1" comment="python313-tk is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044336" version="1" comment="python313-x86-64-v3 is &lt;3.13.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044337" version="1" comment="rclone is &lt;1.73.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044338" version="1" comment="rclone-bash-completion is &lt;1.73.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044339" version="1" comment="rclone-zsh-completion is &lt;1.73.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044395" version="1" comment="MozillaFirefox is &lt;147.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044396" version="1" comment="MozillaFirefox-branding-upstream is &lt;147.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044397" version="1" comment="MozillaFirefox-devel is &lt;147.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044398" version="1" comment="MozillaFirefox-translations-common is &lt;147.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044399" version="1" comment="MozillaFirefox-translations-other is &lt;147.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044400" version="1" comment="python311-nltk is &lt;3.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044401" version="1" comment="python312-nltk is &lt;3.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044402" version="1" comment="python313-nltk is &lt;3.9.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044403" version="1" comment="python311-py7zr is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044404" version="1" comment="python312-py7zr is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044405" version="1" comment="python313-py7zr is &lt;1.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044406" version="1" comment="syft is &lt;1.42.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044407" version="1" comment="syft-bash-completion is &lt;1.42.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044408" version="1" comment="syft-fish-completion is &lt;1.42.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044409" version="1" comment="syft-zsh-completion is &lt;1.42.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044410" version="1" comment="ucode-intel is &lt;20260210-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044411" version="1" comment="vexctl is &lt;0.4.1+git78.f951e3a-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044559" version="1" comment="busybox is &lt;1.37.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044560" version="1" comment="busybox-static is &lt;1.37.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044561" version="1" comment="busybox-testsuite is &lt;1.37.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044562" version="1" comment="busybox-warewulf3 is &lt;1.37.0-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044563" version="1" comment="cosign is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044564" version="1" comment="cosign-bash-completion is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044565" version="1" comment="cosign-fish-completion is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044566" version="1" comment="cosign-zsh-completion is &lt;3.0.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044567" version="1" comment="kyverno is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044568" version="1" comment="kyverno-bash-completion is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044569" version="1" comment="kyverno-fish-completion is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044570" version="1" comment="kyverno-zsh-completion is &lt;1.17.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044614" version="1" comment="chromedriver is &lt;145.0.7632.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044615" version="1" comment="chromium is &lt;145.0.7632.109-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044708" version="1" comment="cosign is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044709" version="1" comment="cosign-bash-completion is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044710" version="1" comment="cosign-fish-completion is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044711" version="1" comment="cosign-zsh-completion is &lt;3.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044712" version="1" comment="heroic-games-launcher is &lt;2.20.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044713" version="1" comment="libopenssl-3-devel is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044714" version="1" comment="libopenssl-3-devel-32bit is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044715" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044716" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044717" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044718" version="1" comment="libopenssl3 is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044719" version="1" comment="libopenssl3-32bit is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044720" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044721" version="1" comment="openssl-3 is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044722" version="1" comment="openssl-3-doc is &lt;3.5.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044723" version="1" comment="python311-PyPDF2 is &lt;2.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044724" version="1" comment="python312-PyPDF2 is &lt;2.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044725" version="1" comment="python313-PyPDF2 is &lt;2.11.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044726" version="1" comment="warewulf4 is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044727" version="1" comment="warewulf4-dracut is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044728" version="1" comment="warewulf4-man is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044729" version="1" comment="warewulf4-overlay is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044730" version="1" comment="warewulf4-overlay-rke2 is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044731" version="1" comment="warewulf4-overlay-slurm is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044732" version="1" comment="warewulf4-reference-doc is &lt;4.6.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044733" version="1" comment="weblate is &lt;5.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045060" version="1" comment="cacti is &lt;1.2.30+git231.bca15e70c-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045061" version="1" comment="firefox-esr is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045062" version="1" comment="firefox-esr-branding-upstream is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045063" version="1" comment="firefox-esr-translations-common is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045064" version="1" comment="firefox-esr-translations-other is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045065" version="1" comment="freerdp2 is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045066" version="1" comment="freerdp2-devel is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045067" version="1" comment="freerdp2-proxy is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045068" version="1" comment="freerdp2-server is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045069" version="1" comment="libfreerdp2-2 is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045070" version="1" comment="libwinpr2-2 is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045071" version="1" comment="winpr2-devel is &lt;2.11.7-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045072" version="1" comment="libsignal-protocol-c-devel is &lt;2.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045073" version="1" comment="libsignal-protocol-c2 is &lt;2.3.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045074" version="1" comment="libsoup-3_0-0 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045075" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045076" version="1" comment="libsoup-devel is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045077" version="1" comment="libsoup-devel-32bit is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045078" version="1" comment="libsoup-lang is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045079" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045080" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045081" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045082" version="1" comment="libsoup2-devel is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045083" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045084" version="1" comment="libsoup2-lang is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045085" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045086" version="1" comment="python311-Django4 is &lt;4.2.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045087" version="1" comment="python312-Django4 is &lt;4.2.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045088" version="1" comment="python313-Django4 is &lt;4.2.28-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045256" version="1" comment="MozillaThunderbird is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045257" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045258" version="1" comment="MozillaThunderbird-translations-common is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045259" version="1" comment="MozillaThunderbird-translations-other is &lt;140.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045260" version="1" comment="cmctl is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045261" version="1" comment="cmctl-bash-completion is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045262" version="1" comment="cmctl-fish-completion is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045263" version="1" comment="cmctl-zsh-completion is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045264" version="1" comment="cockpit-machines is &lt;348-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045265" version="1" comment="cockpit-packages is &lt;4.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045266" version="1" comment="cockpit-repos is &lt;4.7-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045267" version="1" comment="cockpit-subscriptions is &lt;14.4-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045268" version="1" comment="cockpit-tukit is &lt;0.1.7~git0.61e54f1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045269" version="1" comment="docker-stable is &lt;24.0.9_ce-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045270" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045271" version="1" comment="docker-stable-buildx is &lt;0.25.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045272" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045273" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045274" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045275" version="1" comment="regclient is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045276" version="1" comment="regclient-bash-completion is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045277" version="1" comment="regclient-fish-completion is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045278" version="1" comment="regclient-zsh-completion is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046035" version="1" comment="MozillaFirefox is &lt;148.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046036" version="1" comment="MozillaFirefox-branding-upstream is &lt;148.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046037" version="1" comment="MozillaFirefox-devel is &lt;148.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046038" version="1" comment="MozillaFirefox-translations-common is &lt;148.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046039" version="1" comment="MozillaFirefox-translations-other is &lt;148.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046040" version="1" comment="busybox is &lt;1.37.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046041" version="1" comment="busybox-static is &lt;1.37.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046042" version="1" comment="busybox-testsuite is &lt;1.37.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046043" version="1" comment="busybox-warewulf3 is &lt;1.37.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046044" version="1" comment="chromedriver is &lt;145.0.7632.116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046045" version="1" comment="chromium is &lt;145.0.7632.116-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046046" version="1" comment="digger-cli is &lt;0.6.143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046047" version="1" comment="digger-cli-bash-completion is &lt;0.6.143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046048" version="1" comment="digger-cli-fish-completion is &lt;0.6.143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046049" version="1" comment="digger-cli-zsh-completion is &lt;0.6.143-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046050" version="1" comment="docker is &lt;29.2.1_ce-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046051" version="1" comment="docker-bash-completion is &lt;29.2.1_ce-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046052" version="1" comment="docker-buildx is &lt;0.31.1-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046053" version="1" comment="docker-fish-completion is &lt;29.2.1_ce-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046054" version="1" comment="docker-rootless-extras is &lt;29.2.1_ce-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046055" version="1" comment="docker-zsh-completion is &lt;29.2.1_ce-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046056" version="1" comment="evolution-data-server is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046057" version="1" comment="evolution-data-server-devel is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046058" version="1" comment="evolution-data-server-lang is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046059" version="1" comment="libcamel-1_2-66 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046060" version="1" comment="libebackend-1_2-11 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046061" version="1" comment="libebook-1_2-21 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046062" version="1" comment="libebook-contacts-1_2-4 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046063" version="1" comment="libecal-2_0-3 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046064" version="1" comment="libedata-book-1_2-27 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046065" version="1" comment="libedata-cal-2_0-2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046066" version="1" comment="libedataserver-1_2-27 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046067" version="1" comment="libedataserverui-1_2-4 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046068" version="1" comment="libedataserverui4-1_0-0 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046069" version="1" comment="typelib-1_0-Camel-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046070" version="1" comment="typelib-1_0-EBackend-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046071" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046072" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046073" version="1" comment="typelib-1_0-ECal-2_0 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046074" version="1" comment="typelib-1_0-EDataBook-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046075" version="1" comment="typelib-1_0-EDataCal-2_0 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046076" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046077" version="1" comment="typelib-1_0-EDataServerUI-1_2 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046078" version="1" comment="typelib-1_0-EDataServerUI4-1_0 is &lt;3.58.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046079" version="1" comment="heroic-games-launcher is &lt;2.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046080" version="1" comment="python311-Flask is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046081" version="1" comment="python311-Flask-doc is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046082" version="1" comment="python312-Flask is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046083" version="1" comment="python312-Flask-doc is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046084" version="1" comment="python313-Flask is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046085" version="1" comment="python313-Flask-doc is &lt;3.1.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046086" version="1" comment="qemu is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046087" version="1" comment="qemu-SLOF is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046088" version="1" comment="qemu-accel-qtest is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046089" version="1" comment="qemu-arm is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046090" version="1" comment="qemu-audio-alsa is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046091" version="1" comment="qemu-audio-dbus is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046092" version="1" comment="qemu-audio-jack is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046093" version="1" comment="qemu-audio-oss is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046094" version="1" comment="qemu-audio-pa is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046095" version="1" comment="qemu-audio-pipewire is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046096" version="1" comment="qemu-audio-sdl is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046097" version="1" comment="qemu-audio-spice is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046098" version="1" comment="qemu-block-curl is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046099" version="1" comment="qemu-block-dmg is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046100" version="1" comment="qemu-block-iscsi is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046101" version="1" comment="qemu-block-nfs is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046102" version="1" comment="qemu-block-rbd is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046103" version="1" comment="qemu-block-ssh is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046104" version="1" comment="qemu-chardev-baum is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046105" version="1" comment="qemu-chardev-spice is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046106" version="1" comment="qemu-doc is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046107" version="1" comment="qemu-extra is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046108" version="1" comment="qemu-guest-agent is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046109" version="1" comment="qemu-headless is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046110" version="1" comment="qemu-hw-display-qxl is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046111" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046112" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046113" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046114" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046115" version="1" comment="qemu-hw-usb-host is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046116" version="1" comment="qemu-hw-usb-redirect is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046117" version="1" comment="qemu-hw-usb-smartcard is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046118" version="1" comment="qemu-img is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046119" version="1" comment="qemu-ipxe is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046120" version="1" comment="qemu-ivshmem-tools is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046121" version="1" comment="qemu-ksm is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046122" version="1" comment="qemu-lang is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046123" version="1" comment="qemu-microvm is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046124" version="1" comment="qemu-ppc is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046125" version="1" comment="qemu-pr-helper is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046126" version="1" comment="qemu-s390x is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046127" version="1" comment="qemu-seabios is &lt;10.2.11.17.0_1_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046128" version="1" comment="qemu-skiboot is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046129" version="1" comment="qemu-spice is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046130" version="1" comment="qemu-tools is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046131" version="1" comment="qemu-ui-curses is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046132" version="1" comment="qemu-ui-dbus is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046133" version="1" comment="qemu-ui-gtk is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046134" version="1" comment="qemu-ui-opengl is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046135" version="1" comment="qemu-ui-sdl is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046136" version="1" comment="qemu-ui-spice-app is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046137" version="1" comment="qemu-ui-spice-core is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046138" version="1" comment="qemu-vgabios is &lt;10.2.11.17.0_1_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046139" version="1" comment="qemu-vhost-user-gpu is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046140" version="1" comment="qemu-vmsr-helper is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046141" version="1" comment="qemu-x86 is &lt;10.2.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046142" version="1" comment="valkey is &lt;9.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046143" version="1" comment="valkey-compat-redis is &lt;9.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046144" version="1" comment="valkey-devel is &lt;9.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046145" version="1" comment="ImageMagick is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046146" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046147" version="1" comment="ImageMagick-devel is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046148" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046149" version="1" comment="ImageMagick-doc is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046150" version="1" comment="ImageMagick-extra is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046151" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046152" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046153" version="1" comment="libMagick++-devel is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046154" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046155" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046156" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046157" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046158" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046159" version="1" comment="perl-PerlMagick is &lt;7.1.2.15-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046160" version="1" comment="cockpit is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046161" version="1" comment="cockpit-bridge is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046162" version="1" comment="cockpit-devel is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046163" version="1" comment="cockpit-doc is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046164" version="1" comment="cockpit-firewalld is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046165" version="1" comment="cockpit-kdump is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046166" version="1" comment="cockpit-networkmanager is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046167" version="1" comment="cockpit-packagekit is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046168" version="1" comment="cockpit-selinux is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046169" version="1" comment="cockpit-storaged is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046170" version="1" comment="cockpit-system is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046171" version="1" comment="cockpit-ws is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046172" version="1" comment="cockpit-ws-selinux is &lt;356-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046173" version="1" comment="cockpit-podman is &lt;120-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046174" version="1" comment="gosec is &lt;2.24.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046175" version="1" comment="libjxl-devel is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046176" version="1" comment="libjxl-tools is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046177" version="1" comment="libjxl0_11 is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046178" version="1" comment="libjxl0_11-32bit is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046179" version="1" comment="libjxl0_11-x86-64-v3 is &lt;0.11.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046180" version="1" comment="libIex-3_4-33 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046181" version="1" comment="libIex-3_4-33-32bit is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046182" version="1" comment="libIex-3_4-33-x86-64-v3 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046183" version="1" comment="libIlmThread-3_4-33 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046184" version="1" comment="libIlmThread-3_4-33-32bit is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046185" version="1" comment="libIlmThread-3_4-33-x86-64-v3 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046186" version="1" comment="libOpenEXR-3_4-33 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046187" version="1" comment="libOpenEXR-3_4-33-32bit is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046188" version="1" comment="libOpenEXR-3_4-33-x86-64-v3 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046189" version="1" comment="libOpenEXRCore-3_4-33 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046190" version="1" comment="libOpenEXRCore-3_4-33-32bit is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046191" version="1" comment="libOpenEXRCore-3_4-33-x86-64-v3 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046192" version="1" comment="libOpenEXRUtil-3_4-33 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046193" version="1" comment="libOpenEXRUtil-3_4-33-32bit is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046194" version="1" comment="libOpenEXRUtil-3_4-33-x86-64-v3 is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046195" version="1" comment="openexr is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046196" version="1" comment="openexr-devel is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046197" version="1" comment="openexr-doc is &lt;3.4.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046198" version="1" comment="libudisks2-0 is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046199" version="1" comment="libudisks2-0-devel is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046200" version="1" comment="libudisks2-0_btrfs is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046201" version="1" comment="libudisks2-0_lsm is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046202" version="1" comment="libudisks2-0_lvm2 is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046203" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046204" version="1" comment="udisks2 is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046205" version="1" comment="udisks2-bash-completion is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046206" version="1" comment="udisks2-docs is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046207" version="1" comment="udisks2-lang is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046208" version="1" comment="udisks2-zsh-completion is &lt;2.11.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046209" version="1" comment="libwireshark19 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046210" version="1" comment="libwiretap16 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046211" version="1" comment="libwsutil17 is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046212" version="1" comment="wireshark is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046213" version="1" comment="wireshark-devel is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046214" version="1" comment="wireshark-ui-qt is &lt;4.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046326" version="1" comment="gvfs is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046327" version="1" comment="gvfs-backend-afc is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046328" version="1" comment="gvfs-backend-goa is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046329" version="1" comment="gvfs-backend-gphoto is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046330" version="1" comment="gvfs-backend-samba is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046331" version="1" comment="gvfs-backends is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046332" version="1" comment="gvfs-fuse is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046333" version="1" comment="gvfs-lang is &lt;1.58.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046334" version="1" comment="libsoup-3_0-0 is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046335" version="1" comment="libsoup-3_0-0-32bit is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046336" version="1" comment="libsoup-devel is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046337" version="1" comment="libsoup-devel-32bit is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046338" version="1" comment="libsoup-lang is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046339" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.6-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046384" version="1" comment="python311-pypdf is &lt;6.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046385" version="1" comment="python313-pypdf is &lt;6.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047433" version="1" comment="ImageMagick is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047434" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047435" version="1" comment="ImageMagick-devel is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047436" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047437" version="1" comment="ImageMagick-doc is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047438" version="1" comment="ImageMagick-extra is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047439" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047440" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047441" version="1" comment="libMagick++-devel is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047442" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047443" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047444" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047445" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047446" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047447" version="1" comment="perl-PerlMagick is &lt;7.1.2.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047448" version="1" comment="c3p0 is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047449" version="1" comment="c3p0-javadoc is &lt;0.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047450" version="1" comment="incus is &lt;6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047451" version="1" comment="incus-bash-completion is &lt;6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047452" version="1" comment="incus-fish-completion is &lt;6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047453" version="1" comment="incus-tools is &lt;6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047454" version="1" comment="incus-zsh-completion is &lt;6.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047455" version="1" comment="mchange-commons is &lt;0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047456" version="1" comment="mchange-commons-javadoc is &lt;0.4.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047457" version="1" comment="python311-Django4 is &lt;4.2.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047458" version="1" comment="python313-Django4 is &lt;4.2.29-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047459" version="1" comment="python313-Django6 is &lt;6.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047460" version="1" comment="python311-PyPDF2 is &lt;2.11.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047461" version="1" comment="python313-PyPDF2 is &lt;2.11.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047462" version="1" comment="python311-pillow-heif is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047463" version="1" comment="python313-pillow-heif is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047464" version="1" comment="ruby4.0-rubygem-rack-2.2 is &lt;2.2.22-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047465" version="1" comment="sdbootutil is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047466" version="1" comment="sdbootutil-bash-completion is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047467" version="1" comment="sdbootutil-dracut-measure-pcr is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047468" version="1" comment="sdbootutil-enroll is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047469" version="1" comment="sdbootutil-jeos-firstboot-enroll is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047470" version="1" comment="sdbootutil-kernel-install is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047471" version="1" comment="sdbootutil-snapper is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047472" version="1" comment="sdbootutil-tukit is &lt;1+git20260303.90d816d-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047473" version="1" comment="libblkid-devel is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047474" version="1" comment="libblkid-devel-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047475" version="1" comment="libblkid-devel-static is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047476" version="1" comment="libblkid1 is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047477" version="1" comment="libblkid1-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047478" version="1" comment="libfdisk-devel is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047479" version="1" comment="libfdisk-devel-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047480" version="1" comment="libfdisk-devel-static is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047481" version="1" comment="libfdisk1 is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047482" version="1" comment="libfdisk1-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047483" version="1" comment="libmount-devel is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047484" version="1" comment="libmount-devel-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047485" version="1" comment="libmount-devel-static is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047486" version="1" comment="libmount1 is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047487" version="1" comment="libmount1-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047488" version="1" comment="libsmartcols-devel is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047489" version="1" comment="libsmartcols-devel-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047490" version="1" comment="libsmartcols-devel-static is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047491" version="1" comment="libsmartcols1 is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047492" version="1" comment="libsmartcols1-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047493" version="1" comment="libuuid-devel is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047494" version="1" comment="libuuid-devel-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047495" version="1" comment="libuuid-devel-static is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047496" version="1" comment="libuuid1 is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047497" version="1" comment="libuuid1-32bit is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047498" version="1" comment="util-linux is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047499" version="1" comment="util-linux-lang is &lt;2.41.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047500" version="1" comment="freetype2-devel is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047501" version="1" comment="freetype2-devel-32bit is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047502" version="1" comment="freetype2-profile-tti35 is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047503" version="1" comment="ftdump is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047504" version="1" comment="libfreetype6 is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047505" version="1" comment="libfreetype6-32bit is &lt;2.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047506" version="1" comment="heroic-games-launcher is &lt;2.20.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047507" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047508" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047509" version="1" comment="libsoup2-devel is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047510" version="1" comment="libsoup2-devel-32bit is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047511" version="1" comment="libsoup2-lang is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047512" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047513" version="1" comment="python311-Django is &lt;5.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047514" version="1" comment="python313-Django is &lt;5.2.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047515" version="1" comment="python311-joserfc is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047516" version="1" comment="python313-joserfc is &lt;1.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047517" version="1" comment="telemetrygen is &lt;0.147.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047687" version="1" comment="NetworkManager-applet-strongswan is &lt;1.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047688" version="1" comment="NetworkManager-strongswan is &lt;1.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047689" version="1" comment="NetworkManager-strongswan-lang is &lt;1.6.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047690" version="1" comment="chromedriver is &lt;145.0.7632.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047691" version="1" comment="chromium is &lt;145.0.7632.159-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047692" version="1" comment="coredns is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047693" version="1" comment="coredns-extras is &lt;1.14.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047694" version="1" comment="exiv2 is &lt;0.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047695" version="1" comment="exiv2-lang is &lt;0.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047696" version="1" comment="libexiv2-28 is &lt;0.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047697" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047698" version="1" comment="libexiv2-devel is &lt;0.28.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047699" version="1" comment="go1.26 is &lt;1.26.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047700" version="1" comment="go1.26-doc is &lt;1.26.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047701" version="1" comment="go1.26-libstd is &lt;1.26.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047702" version="1" comment="go1.26-race is &lt;1.26.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047703" version="1" comment="jetty-annotations is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047704" version="1" comment="jetty-ant is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047705" version="1" comment="jetty-cdi is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047706" version="1" comment="jetty-client is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047707" version="1" comment="jetty-continuation is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047708" version="1" comment="jetty-deploy is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047709" version="1" comment="jetty-fcgi is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047710" version="1" comment="jetty-http is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047711" version="1" comment="jetty-http-spi is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047712" version="1" comment="jetty-io is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047713" version="1" comment="jetty-jaas is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047714" version="1" comment="jetty-jmx is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047715" version="1" comment="jetty-jndi is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047716" version="1" comment="jetty-jsp is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047717" version="1" comment="jetty-minimal-javadoc is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047718" version="1" comment="jetty-openid is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047719" version="1" comment="jetty-plus is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047720" version="1" comment="jetty-project is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047721" version="1" comment="jetty-proxy is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047722" version="1" comment="jetty-quickstart is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047723" version="1" comment="jetty-rewrite is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047724" version="1" comment="jetty-security is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047725" version="1" comment="jetty-server is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047726" version="1" comment="jetty-servlet is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047727" version="1" comment="jetty-servlets is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047728" version="1" comment="jetty-start is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047729" version="1" comment="jetty-util is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047730" version="1" comment="jetty-util-ajax is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047731" version="1" comment="jetty-webapp is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047732" version="1" comment="jetty-xml is &lt;9.4.58-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047733" version="1" comment="kernel-source-longterm is &lt;6.18.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047734" version="1" comment="kubeshark-cli is &lt;53.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047735" version="1" comment="kubeshark-cli-bash-completion is &lt;53.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047736" version="1" comment="kubeshark-cli-fish-completion is &lt;53.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047737" version="1" comment="kubeshark-cli-zsh-completion is &lt;53.1.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047738" version="1" comment="libIex-3_4-33 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047739" version="1" comment="libIex-3_4-33-32bit is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047740" version="1" comment="libIex-3_4-33-x86-64-v3 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047741" version="1" comment="libIlmThread-3_4-33 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047742" version="1" comment="libIlmThread-3_4-33-32bit is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047743" version="1" comment="libIlmThread-3_4-33-x86-64-v3 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047744" version="1" comment="libOpenEXR-3_4-33 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047745" version="1" comment="libOpenEXR-3_4-33-32bit is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047746" version="1" comment="libOpenEXR-3_4-33-x86-64-v3 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047747" version="1" comment="libOpenEXRCore-3_4-33 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047748" version="1" comment="libOpenEXRCore-3_4-33-32bit is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047749" version="1" comment="libOpenEXRCore-3_4-33-x86-64-v3 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047750" version="1" comment="libOpenEXRUtil-3_4-33 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047751" version="1" comment="libOpenEXRUtil-3_4-33-32bit is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047752" version="1" comment="libOpenEXRUtil-3_4-33-x86-64-v3 is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047753" version="1" comment="openexr is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047754" version="1" comment="openexr-devel is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047755" version="1" comment="openexr-doc is &lt;3.4.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047756" version="1" comment="python311-nltk is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047757" version="1" comment="python313-nltk is &lt;3.9.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047758" version="1" comment="tomcat is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047759" version="1" comment="tomcat-admin-webapps is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047760" version="1" comment="tomcat-docs-webapp is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047761" version="1" comment="tomcat-el-3_0-api is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047762" version="1" comment="tomcat-embed is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047763" version="1" comment="tomcat-javadoc is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047764" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047765" version="1" comment="tomcat-jsvc is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047766" version="1" comment="tomcat-lib is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047767" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047768" version="1" comment="tomcat-webapps is &lt;9.0.115-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047769" version="1" comment="tomcat10 is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047770" version="1" comment="tomcat10-admin-webapps is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047771" version="1" comment="tomcat10-doc is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047772" version="1" comment="tomcat10-docs-webapp is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047773" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047774" version="1" comment="tomcat10-embed is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047775" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047776" version="1" comment="tomcat10-jsvc is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047777" version="1" comment="tomcat10-lib is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047778" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047779" version="1" comment="tomcat10-webapps is &lt;10.1.52-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047780" version="1" comment="tomcat11 is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047781" version="1" comment="tomcat11-admin-webapps is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047782" version="1" comment="tomcat11-doc is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047783" version="1" comment="tomcat11-docs-webapp is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047784" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047785" version="1" comment="tomcat11-embed is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047786" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047787" version="1" comment="tomcat11-jsvc is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047788" version="1" comment="tomcat11-lib is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047789" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047790" version="1" comment="tomcat11-webapps is &lt;11.0.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047791" version="1" comment="virtiofsd is &lt;1.13.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047792" version="1" comment="weblate is &lt;5.16.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047798" version="1" comment="go1.25 is &lt;1.25.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047799" version="1" comment="go1.25-doc is &lt;1.25.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047800" version="1" comment="go1.25-libstd is &lt;1.25.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047801" version="1" comment="go1.25-race is &lt;1.25.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047802" version="1" comment="corepack24 is &lt;24.13.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047803" version="1" comment="nodejs24 is &lt;24.13.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047804" version="1" comment="nodejs24-devel is &lt;24.13.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047805" version="1" comment="nodejs24-docs is &lt;24.13.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047806" version="1" comment="npm24 is &lt;24.13.0-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048023" version="1" comment="python311-pymongo is &lt;4.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048024" version="1" comment="python313-pymongo is &lt;4.16.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048025" version="1" comment="rclone is &lt;1.73.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048026" version="1" comment="rclone-bash-completion is &lt;1.73.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048027" version="1" comment="rclone-zsh-completion is &lt;1.73.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048028" version="1" comment="traefik2 is &lt;2.11.40-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048029" version="1" comment="GraphicsMagick is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048030" version="1" comment="GraphicsMagick-devel is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048031" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048032" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048033" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048034" version="1" comment="libGraphicsMagick3-config is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048035" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048036" version="1" comment="perl-GraphicsMagick is &lt;1.3.46-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048037" version="1" comment="ghostty is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048038" version="1" comment="ghostty-bash-completion is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048039" version="1" comment="ghostty-devel is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048040" version="1" comment="ghostty-doc is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048041" version="1" comment="ghostty-fish-completion is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048042" version="1" comment="ghostty-lang is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048043" version="1" comment="ghostty-neovim is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048044" version="1" comment="ghostty-nushell-completion is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048045" version="1" comment="ghostty-vim is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048046" version="1" comment="ghostty-zsh-completion is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048047" version="1" comment="libghostty-vt0 is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048048" version="1" comment="nautilus-extension-ghostty is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048049" version="1" comment="terminfo-ghostty is &lt;1.3.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048050" version="1" comment="grype is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048051" version="1" comment="grype-bash-completion is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048052" version="1" comment="grype-fish-completion is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048053" version="1" comment="grype-zsh-completion is &lt;0.109.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048054" version="1" comment="helm is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048055" version="1" comment="helm-bash-completion is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048056" version="1" comment="helm-fish-completion is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048057" version="1" comment="helm-zsh-completion is &lt;4.1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048058" version="1" comment="helm3 is &lt;3.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048059" version="1" comment="helm3-bash-completion is &lt;3.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048060" version="1" comment="helm3-fish-completion is &lt;3.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048061" version="1" comment="helm3-zsh-completion is &lt;3.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048062" version="1" comment="perl-Compress-Raw-Zlib is &lt;2.222-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048063" version="1" comment="python311-PyPDF2 is &lt;2.11.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048064" version="1" comment="python313-PyPDF2 is &lt;2.11.1-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048065" version="1" comment="python311-lxml_html_clean is &lt;0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048066" version="1" comment="python313-lxml_html_clean is &lt;0.4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048067" version="1" comment="traefik is &lt;3.6.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048766" version="1" comment="MozillaFirefox is &lt;148.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048767" version="1" comment="MozillaFirefox-branding-upstream is &lt;148.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048768" version="1" comment="MozillaFirefox-devel is &lt;148.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048769" version="1" comment="MozillaFirefox-translations-common is &lt;148.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048770" version="1" comment="MozillaFirefox-translations-other is &lt;148.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048771" version="1" comment="clamav is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048772" version="1" comment="clamav-devel is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048773" version="1" comment="clamav-docs-html is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048774" version="1" comment="clamav-milter is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048775" version="1" comment="libclamav12 is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048776" version="1" comment="libclammspack0 is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048777" version="1" comment="libfreshclam4 is &lt;1.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048778" version="1" comment="giflib-devel is &lt;5.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048779" version="1" comment="giflib-devel-32bit is &lt;5.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048780" version="1" comment="giflib-progs is &lt;5.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048781" version="1" comment="libgif7 is &lt;5.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048782" version="1" comment="libgif7-32bit is &lt;5.2.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048783" version="1" comment="heroic-games-launcher is &lt;2.20.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048784" version="1" comment="himmelblau is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048785" version="1" comment="himmelblau-qr-greeter is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048786" version="1" comment="himmelblau-sshd-config is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048787" version="1" comment="himmelblau-sso is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048788" version="1" comment="libnss_himmelblau2 is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048789" version="1" comment="pam-himmelblau is &lt;2.3.8+git0.dec3693-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048790" version="1" comment="kubelogin is &lt;0.2.16-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048791" version="1" comment="mingw32-binutils is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048792" version="1" comment="mingw32-binutils-debug is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048793" version="1" comment="mingw32-binutils-devel is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048794" version="1" comment="mingw64-binutils is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048795" version="1" comment="mingw64-binutils-debug is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048796" version="1" comment="mingw64-binutils-devel is &lt;2.45.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048797" version="1" comment="python311-PyPDF2 is &lt;2.11.1-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048798" version="1" comment="python313-PyPDF2 is &lt;2.11.1-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048799" version="1" comment="python311-multipart is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048800" version="1" comment="python313-multipart is &lt;1.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048801" version="1" comment="python311-pypdf is &lt;6.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048802" version="1" comment="python313-pypdf is &lt;6.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048803" version="1" comment="ruby4.0-rubygem-actioncable-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048804" version="1" comment="ruby4.0-rubygem-actionmailbox-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048805" version="1" comment="ruby4.0-rubygem-actionmailer-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048806" version="1" comment="ruby4.0-rubygem-actionpack-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048807" version="1" comment="ruby4.0-rubygem-actiontext-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048808" version="1" comment="ruby4.0-rubygem-actionview-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048809" version="1" comment="ruby4.0-rubygem-activejob-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048810" version="1" comment="ruby4.0-rubygem-activemodel-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048811" version="1" comment="ruby4.0-rubygem-activerecord-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048812" version="1" comment="ruby4.0-rubygem-activestorage-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048813" version="1" comment="ruby4.0-rubygem-activesupport-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048814" version="1" comment="ruby4.0-rubygem-fluentd is &lt;1.17.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048815" version="1" comment="ruby4.0-rubygem-globalid is &lt;1.2.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048816" version="1" comment="ruby4.0-rubygem-grpc is &lt;1.70.1-1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048817" version="1" comment="ruby4.0-rubygem-http-cookie is &lt;1.0.8-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048818" version="1" comment="ruby4.0-rubygem-jquery-rails is &lt;4.6.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048819" version="1" comment="ruby4.0-rubygem-json_pure is &lt;2.7.6-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048820" version="1" comment="ruby4.0-rubygem-kramdown is &lt;2.4.0-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048821" version="1" comment="ruby4.0-rubygem-loofah is &lt;2.23.1-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048822" version="1" comment="ruby4.0-rubygem-minitar is &lt;0.9-1.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048823" version="1" comment="ruby4.0-rubygem-multi_xml is &lt;0.6.0-1.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048824" version="1" comment="ruby4.0-rubygem-nokogiri is &lt;1.18.9-1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048825" version="1" comment="ruby4.0-rubygem-puma is &lt;6.4.3-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048826" version="1" comment="ruby4.0-rubygem-rack is &lt;3.1.18-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048827" version="1" comment="ruby4.0-rubygem-rack-session is &lt;2.1.1-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048828" version="1" comment="ruby4.0-rubygem-rails-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048829" version="1" comment="ruby4.0-rubygem-rails-html-sanitizer is &lt;1.6.0-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048830" version="1" comment="ruby4.0-rubygem-railties-8.0 is &lt;8.0.3-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048831" version="1" comment="ruby4.0-rubygem-rubyzip is &lt;2.3.2-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048832" version="1" comment="ruby4.0-rubygem-sprockets is &lt;4.2.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048833" version="1" comment="ruby4.0-rubygem-sprockets-3.7 is &lt;3.7.5-1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048834" version="1" comment="ruby4.0-rubygem-thor is &lt;1.4.0-1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048835" version="1" comment="ruby4.0-rubygem-web-console is &lt;4.2.1-1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048836" version="1" comment="ruby4.0-rubygem-websocket-extensions is &lt;0.1.5-1.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048837" version="1" comment="skaffold is &lt;2.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048838" version="1" comment="skaffold-bash-completion is &lt;2.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048839" version="1" comment="skaffold-fish-completion is &lt;2.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048840" version="1" comment="skaffold-zsh-completion is &lt;2.18.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048841" version="1" comment="smb4k is &lt;4.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048842" version="1" comment="smb4k-doc is &lt;4.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048843" version="1" comment="smb4k-lang is &lt;4.0.5-1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048859" version="1" comment="curl is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048860" version="1" comment="curl-fish-completion is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048861" version="1" comment="curl-zsh-completion is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048862" version="1" comment="libcurl-devel is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048863" version="1" comment="libcurl-devel-32bit is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048864" version="1" comment="libcurl-devel-doc is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048865" version="1" comment="libcurl4 is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048866" version="1" comment="libcurl4-32bit is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048867" version="1" comment="wcurl is &lt;8.19.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048868" version="1" comment="python311-black is &lt;26.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048869" version="1" comment="python313-black is &lt;26.3.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048870" version="1" comment="python311-simpleeval is &lt;1.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048871" version="1" comment="python313-simpleeval is &lt;1.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048872" version="1" comment="python311-tornado6 is &lt;6.5.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048873" version="1" comment="python313-tornado6 is &lt;6.5.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048874" version="1" comment="coturn is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048875" version="1" comment="coturn-devel is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048876" version="1" comment="coturn-utils is &lt;4.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048974" version="1" comment="chromedriver is &lt;146.0.7680.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048975" version="1" comment="chromium is &lt;146.0.7680.80-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048976" version="1" comment="python312 is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048977" version="1" comment="python312-curses is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048978" version="1" comment="python312-dbm is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048979" version="1" comment="python312-idle is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048980" version="1" comment="python312-tk is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048981" version="1" comment="python312-x86-64-v3 is &lt;3.12.13-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049221" version="1" comment="ovmf is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049222" version="1" comment="ovmf-tools is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049223" version="1" comment="qemu-ovmf-x86_64 is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049224" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049225" version="1" comment="qemu-uefi-aarch64 is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049226" version="1" comment="qemu-uefi-riscv64 is &lt;202602-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049227" version="1" comment="python311-CairoSVG is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049228" version="1" comment="python313-CairoSVG is &lt;2.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049229" version="1" comment="python311-uv is &lt;0.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049230" version="1" comment="python313-uv is &lt;0.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049231" version="1" comment="uv-bash-completion is &lt;0.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049232" version="1" comment="uv-fish-completion is &lt;0.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049233" version="1" comment="uv-zsh-completion is &lt;0.10.11-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049234" version="1" comment="python311 is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049235" version="1" comment="python311-32bit is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049236" version="1" comment="python311-curses is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049237" version="1" comment="python311-dbm is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049238" version="1" comment="python311-idle is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049239" version="1" comment="python311-tk is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049240" version="1" comment="python311-x86-64-v3 is &lt;3.11.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049241" version="1" comment="cargo1.92 is &lt;1.92.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049242" version="1" comment="rust1.92 is &lt;1.92.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049243" version="1" comment="rust1.92-src is &lt;1.92.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049244" version="1" comment="cargo1.93 is &lt;1.93.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049245" version="1" comment="rust1.93 is &lt;1.93.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049246" version="1" comment="rust1.93-src is &lt;1.93.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049247" version="1" comment="cargo1.94 is &lt;1.94.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049248" version="1" comment="rust1.94 is &lt;1.94.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049249" version="1" comment="rust1.94-src is &lt;1.94.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049250" version="1" comment="traefik is &lt;3.6.10-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049432" version="1" comment="ImageMagick is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049433" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049434" version="1" comment="ImageMagick-devel is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049435" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049436" version="1" comment="ImageMagick-doc is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049437" version="1" comment="ImageMagick-extra is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049438" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049439" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049440" version="1" comment="libMagick++-devel is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049441" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049442" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049443" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049444" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049445" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049446" version="1" comment="perl-PerlMagick is &lt;7.1.2.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049447" version="1" comment="kernel-macros is &lt;6.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049448" version="1" comment="kernel-source is &lt;6.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049449" version="1" comment="kernel-source-vanilla is &lt;6.19.8-1.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049450" version="1" comment="mumble is &lt;1.5.857-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049451" version="1" comment="mumble-server is &lt;1.5.857-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049452" version="1" comment="python311-salt is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049453" version="1" comment="python313-salt is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049454" version="1" comment="salt is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049455" version="1" comment="salt-api is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049456" version="1" comment="salt-bash-completion is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049457" version="1" comment="salt-cloud is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049458" version="1" comment="salt-doc is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049459" version="1" comment="salt-fish-completion is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049460" version="1" comment="salt-master is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049461" version="1" comment="salt-minion is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049462" version="1" comment="salt-proxy is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049463" version="1" comment="salt-ssh is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049464" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049465" version="1" comment="salt-syndic is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049466" version="1" comment="salt-transactional-update is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049467" version="1" comment="salt-zsh-completion is &lt;3006.0-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049468" version="1" comment="tempo-cli is &lt;2.10.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049552" version="1" comment="GraphicsMagick is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049553" version="1" comment="GraphicsMagick-devel is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049554" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049555" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049556" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049557" version="1" comment="libGraphicsMagick3-config is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049558" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049559" version="1" comment="perl-GraphicsMagick is &lt;1.3.46-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049560" version="1" comment="python311-pyOpenSSL is &lt;26.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049561" version="1" comment="python313-pyOpenSSL is &lt;26.0.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049562" version="1" comment="python311-pyasn1 is &lt;0.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049563" version="1" comment="python313-pyasn1 is &lt;0.6.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049564" version="1" comment="python313 is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049565" version="1" comment="python313-32bit is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049566" version="1" comment="python313-curses is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049567" version="1" comment="python313-dbm is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049568" version="1" comment="python313-idle is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049569" version="1" comment="python313-tk is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049570" version="1" comment="python313-x86-64-v3 is &lt;3.13.12-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049571" version="1" comment="qemu is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049572" version="1" comment="qemu-SLOF is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049573" version="1" comment="qemu-accel-qtest is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049574" version="1" comment="qemu-arm is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049575" version="1" comment="qemu-audio-alsa is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049576" version="1" comment="qemu-audio-dbus is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049577" version="1" comment="qemu-audio-jack is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049578" version="1" comment="qemu-audio-oss is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049579" version="1" comment="qemu-audio-pa is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049580" version="1" comment="qemu-audio-pipewire is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049581" version="1" comment="qemu-audio-sdl is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049582" version="1" comment="qemu-audio-spice is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049583" version="1" comment="qemu-block-curl is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049584" version="1" comment="qemu-block-dmg is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049585" version="1" comment="qemu-block-iscsi is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049586" version="1" comment="qemu-block-nfs is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049587" version="1" comment="qemu-block-rbd is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049588" version="1" comment="qemu-block-ssh is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049589" version="1" comment="qemu-chardev-baum is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049590" version="1" comment="qemu-chardev-spice is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049591" version="1" comment="qemu-doc is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049592" version="1" comment="qemu-extra is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049593" version="1" comment="qemu-guest-agent is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049594" version="1" comment="qemu-headless is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049595" version="1" comment="qemu-hw-display-qxl is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049596" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049597" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049598" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049599" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049600" version="1" comment="qemu-hw-usb-host is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049601" version="1" comment="qemu-hw-usb-redirect is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049602" version="1" comment="qemu-hw-usb-smartcard is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049603" version="1" comment="qemu-img is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049604" version="1" comment="qemu-ipxe is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049605" version="1" comment="qemu-ivshmem-tools is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049606" version="1" comment="qemu-ksm is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049607" version="1" comment="qemu-lang is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049608" version="1" comment="qemu-microvm is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049609" version="1" comment="qemu-ppc is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049610" version="1" comment="qemu-pr-helper is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049611" version="1" comment="qemu-s390x is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049612" version="1" comment="qemu-seabios is &lt;10.2.21.17.0_1_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049613" version="1" comment="qemu-skiboot is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049614" version="1" comment="qemu-spice is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049615" version="1" comment="qemu-tools is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049616" version="1" comment="qemu-ui-curses is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049617" version="1" comment="qemu-ui-dbus is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049618" version="1" comment="qemu-ui-gtk is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049619" version="1" comment="qemu-ui-opengl is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049620" version="1" comment="qemu-ui-sdl is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049621" version="1" comment="qemu-ui-spice-app is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049622" version="1" comment="qemu-ui-spice-core is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049623" version="1" comment="qemu-vgabios is &lt;10.2.21.17.0_1_g4f253b9b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049624" version="1" comment="qemu-vhost-user-gpu is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049625" version="1" comment="qemu-vmsr-helper is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049626" version="1" comment="qemu-x86 is &lt;10.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049695" version="1" comment="openbao is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049696" version="1" comment="openbao-agent is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049697" version="1" comment="openbao-cassandra-database-plugin is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049698" version="1" comment="openbao-influxdb-database-plugin is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049699" version="1" comment="openbao-mysql-database-plugin is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049700" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049701" version="1" comment="openbao-postgresql-database-plugin is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049702" version="1" comment="openbao-server is &lt;2.5.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049703" version="1" comment="python311-PyJWT is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049704" version="1" comment="python313-PyJWT is &lt;2.12.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049705" version="1" comment="python311 is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049706" version="1" comment="python311-curses is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049707" version="1" comment="python311-dbm is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049708" version="1" comment="python311-idle is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049709" version="1" comment="python311-tk is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049710" version="1" comment="python311-x86-64-v3 is &lt;3.11.15-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049724" version="1" comment="GraphicsMagick is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049725" version="1" comment="GraphicsMagick-devel is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049726" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049727" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049728" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049729" version="1" comment="libGraphicsMagick3-config is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049730" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049731" version="1" comment="perl-GraphicsMagick is &lt;1.3.46-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049732" version="1" comment="chromedriver is &lt;146.0.7680.153-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049733" version="1" comment="chromium is &lt;146.0.7680.153-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049734" version="1" comment="freeciv is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049735" version="1" comment="freeciv-gtk3 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049736" version="1" comment="freeciv-gtk4 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049737" version="1" comment="freeciv-lang is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049738" version="1" comment="freeciv-qt is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049739" version="1" comment="freeciv-sdl2 is &lt;3.2.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049740" version="1" comment="python311-PyPDF2 is &lt;2.11.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049741" version="1" comment="python313-PyPDF2 is &lt;2.11.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049742" version="1" comment="python311-pypdf is &lt;6.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049743" version="1" comment="python313-pypdf is &lt;6.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049744" version="1" comment="python310 is &lt;3.10.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049745" version="1" comment="python310-curses is &lt;3.10.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049746" version="1" comment="python310-dbm is &lt;3.10.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049747" version="1" comment="python310-idle is &lt;3.10.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049748" version="1" comment="python310-tk is &lt;3.10.20-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049749" version="1" comment="python314 is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049750" version="1" comment="python314-32bit is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049751" version="1" comment="python314-curses is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049752" version="1" comment="python314-dbm is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049753" version="1" comment="python314-idle is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049754" version="1" comment="python314-tk is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049755" version="1" comment="python314-x86-64-v3 is &lt;3.14.3-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049756" version="1" comment="lemon is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049757" version="1" comment="libsqlite3-0 is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049758" version="1" comment="libsqlite3-0-32bit is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049759" version="1" comment="libsqlite3-0-x86-64-v3 is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049760" version="1" comment="sqlite3 is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049761" version="1" comment="sqlite3-devel is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049762" version="1" comment="sqlite3-doc is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049763" version="1" comment="sqlite3-tcl is &lt;3.51.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050030" version="1" comment="azure-storage-azcopy is &lt;10.32.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050031" version="1" comment="freerdp is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050032" version="1" comment="freerdp-devel is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050033" version="1" comment="freerdp-proxy is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050034" version="1" comment="freerdp-proxy-plugins is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050035" version="1" comment="freerdp-sdl is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050036" version="1" comment="freerdp-server is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050037" version="1" comment="freerdp-wayland is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050038" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050039" version="1" comment="libfreerdp3-3 is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050040" version="1" comment="librdtk0-0 is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050041" version="1" comment="libuwac0-0 is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050042" version="1" comment="libwinpr3-3 is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050043" version="1" comment="rdtk0-devel is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050044" version="1" comment="uwac0-devel is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050045" version="1" comment="winpr-devel is &lt;3.24.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050046" version="1" comment="pgvector-devel is &lt;0.8.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050047" version="1" comment="pnpm is &lt;10.32.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050048" version="1" comment="pnpm-bash-completion is &lt;10.32.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050049" version="1" comment="pnpm-fish-completion is &lt;10.32.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050050" version="1" comment="pnpm-zsh-completion is &lt;10.32.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050051" version="1" comment="python311-dynaconf is &lt;3.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050052" version="1" comment="python313-dynaconf is &lt;3.2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050053" version="1" comment="python311-pydicom is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050054" version="1" comment="python313-pydicom is &lt;3.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050289" version="1" comment="firefox-esr is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050290" version="1" comment="firefox-esr-branding-upstream is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050291" version="1" comment="firefox-esr-translations-common is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050292" version="1" comment="firefox-esr-translations-other is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050293" version="1" comment="perl-Crypt-URandom is &lt;0.550.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050294" version="1" comment="glances-common is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050295" version="1" comment="python311-Glances is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050296" version="1" comment="python313-Glances is &lt;4.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050297" version="1" comment="python313-PyMuPDF is &lt;1.27.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050298" version="1" comment="python313-PyMuPDF-devel is &lt;1.27.2.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050299" version="1" comment="python311-deepdiff is &lt;8.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050300" version="1" comment="python313-deepdiff is &lt;8.6.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050301" version="1" comment="python311-jsonpath-ng is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050302" version="1" comment="python313-jsonpath-ng is &lt;1.8.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050303" version="1" comment="rclone is &lt;1.73.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050304" version="1" comment="rclone-bash-completion is &lt;1.73.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050305" version="1" comment="rclone-zsh-completion is &lt;1.73.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050917" version="1" comment="amazon-cloudwatch-agent is &lt;1.300064.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050918" version="1" comment="kea is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050919" version="1" comment="kea-devel is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050920" version="1" comment="kea-doc is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050921" version="1" comment="kea-hooks is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050922" version="1" comment="libkea-asiodns62 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050923" version="1" comment="libkea-asiolink88 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050924" version="1" comment="libkea-cc83 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050925" version="1" comment="libkea-cfgrpt3 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050926" version="1" comment="libkea-config84 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050927" version="1" comment="libkea-cryptolink64 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050928" version="1" comment="libkea-d2srv63 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050929" version="1" comment="libkea-database76 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050930" version="1" comment="libkea-dhcp109 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050931" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050932" version="1" comment="libkea-dhcpsrv131 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050933" version="1" comment="libkea-dns71 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050934" version="1" comment="libkea-eval84 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050935" version="1" comment="libkea-exceptions45 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050936" version="1" comment="libkea-hooks121 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050937" version="1" comment="libkea-http87 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050938" version="1" comment="libkea-log-interprocess3 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050939" version="1" comment="libkea-log75 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050940" version="1" comment="libkea-mysql88 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050941" version="1" comment="libkea-pgsql88 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050942" version="1" comment="libkea-process91 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050943" version="1" comment="libkea-stats53 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050944" version="1" comment="libkea-tcp33 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050945" version="1" comment="libkea-util-io12 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050946" version="1" comment="libkea-util102 is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050947" version="1" comment="python3-kea is &lt;3.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050948" version="1" comment="libtpms-devel is &lt;0.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050949" version="1" comment="libtpms0 is &lt;0.10.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050950" version="1" comment="nginx is &lt;1.29.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050951" version="1" comment="nginx-source is &lt;1.29.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050952" version="1" comment="jupyter-bqplot-jupyterlab is &lt;0.5.46-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050953" version="1" comment="jupyter-bqplot-notebook is &lt;0.5.46-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050954" version="1" comment="python311-bqplot is &lt;0.12.45-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050955" version="1" comment="python311-cbor2 is &lt;5.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050956" version="1" comment="python313-cbor2 is &lt;5.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050957" version="1" comment="python311-intake is &lt;2.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050958" version="1" comment="python313-intake is &lt;2.0.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050959" version="1" comment="jupyter-matplotlib is &lt;0.11.7-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050960" version="1" comment="jupyter-matplotlib-jupyterlab is &lt;0.11.7-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050961" version="1" comment="python311-ipympl is &lt;0.9.7-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050962" version="1" comment="python313-ipympl is &lt;0.9.7-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050963" version="1" comment="python311-jupyter-ydoc is &lt;3.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050964" version="1" comment="python313-jupyter-ydoc is &lt;3.4.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050965" version="1" comment="jupyter-jupyterlab-templates is &lt;0.5.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050966" version="1" comment="python311-jupyterlab-templates is &lt;0.5.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050967" version="1" comment="python313-jupyterlab-templates is &lt;0.5.2-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050968" version="1" comment="python311-lmdb is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050969" version="1" comment="python313-lmdb is &lt;2.1.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050970" version="1" comment="python311-oci-sdk is &lt;2.168.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050971" version="1" comment="python313-oci-sdk is &lt;2.168.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050972" version="1" comment="golang-github-v2fly-v2ray-core is &lt;5.47.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050973" version="1" comment="v2ray-core is &lt;5.47.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051451" version="1" comment="LibVNCServer-devel is &lt;0.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051452" version="1" comment="libvncclient1 is &lt;0.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051453" version="1" comment="libvncserver1 is &lt;0.9.15-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051454" version="1" comment="chromedriver is &lt;146.0.7680.164-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051455" version="1" comment="chromium is &lt;146.0.7680.164-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051456" version="1" comment="cpp-httplib-devel is &lt;0.38.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051457" version="1" comment="libcpp-httplib0_38 is &lt;0.38.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051458" version="1" comment="freeipmi is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051459" version="1" comment="freeipmi-bmc-watchdog is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051460" version="1" comment="freeipmi-devel is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051461" version="1" comment="freeipmi-ipmidetectd is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051462" version="1" comment="freeipmi-ipmiseld is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051463" version="1" comment="libfreeipmi17 is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051464" version="1" comment="libipmiconsole2 is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051465" version="1" comment="libipmidetect0 is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051466" version="1" comment="libipmimonitoring6 is &lt;1.6.17-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051467" version="1" comment="libnghttp2-14 is &lt;1.68.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051468" version="1" comment="libnghttp2-14-32bit is &lt;1.68.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051469" version="1" comment="libnghttp2-devel is &lt;1.68.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051470" version="1" comment="nghttp2 is &lt;1.68.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051471" version="1" comment="nghttp2-doc is &lt;1.68.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051472" version="1" comment="openbao is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051473" version="1" comment="openbao-agent is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051474" version="1" comment="openbao-cassandra-database-plugin is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051475" version="1" comment="openbao-influxdb-database-plugin is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051476" version="1" comment="openbao-mysql-database-plugin is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051477" version="1" comment="openbao-mysql-legacy-database-plugin is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051478" version="1" comment="openbao-postgresql-database-plugin is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051479" version="1" comment="openbao-server is &lt;2.5.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051480" version="1" comment="plexus-utils is &lt;4.0.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051481" version="1" comment="plexus-utils-javadoc is &lt;4.0.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051482" version="1" comment="jupyter-nbclassic is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051483" version="1" comment="python311-nbclassic is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051484" version="1" comment="python313-nbclassic is &lt;1.3.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051485" version="1" comment="strongswan is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051486" version="1" comment="strongswan-doc is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051487" version="1" comment="strongswan-fips is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051488" version="1" comment="strongswan-ipsec is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051489" version="1" comment="strongswan-mysql is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051490" version="1" comment="strongswan-nm is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051491" version="1" comment="strongswan-sqlite is &lt;6.0.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052014" version="1" comment="dovecot24 is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052015" version="1" comment="dovecot24-backend-mysql is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052016" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052017" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052018" version="1" comment="dovecot24-devel is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052019" version="1" comment="dovecot24-fts is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052020" version="1" comment="dovecot24-fts-flatcurve is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052021" version="1" comment="dovecot24-fts-solr is &lt;2.4.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052022" version="1" comment="libsuricata8_0_4 is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052023" version="1" comment="suricata is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052024" version="1" comment="suricata-devel is &lt;8.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052025" version="1" comment="traefik is &lt;3.6.12-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052026" version="1" comment="traefik2 is &lt;2.11.42-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052027" version="1" comment="ImageMagick is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052028" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052029" version="1" comment="ImageMagick-devel is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052030" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052031" version="1" comment="ImageMagick-doc is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052032" version="1" comment="ImageMagick-extra is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052033" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052034" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052035" version="1" comment="libMagick++-devel is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052036" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052037" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052038" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052039" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052040" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052041" version="1" comment="perl-PerlMagick is &lt;7.1.2.18-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052042" version="1" comment="MozillaThunderbird is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052043" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052044" version="1" comment="MozillaThunderbird-translations-common is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052045" version="1" comment="MozillaThunderbird-translations-other is &lt;140.9.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052046" version="1" comment="bind is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052047" version="1" comment="bind-doc is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052048" version="1" comment="bind-modules-bdbhpt is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052049" version="1" comment="bind-modules-generic is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052050" version="1" comment="bind-modules-ldap is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052051" version="1" comment="bind-modules-mysql is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052052" version="1" comment="bind-modules-perl is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052053" version="1" comment="bind-modules-sqlite3 is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052054" version="1" comment="bind-utils is &lt;9.20.21-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052055" version="1" comment="gsl is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052056" version="1" comment="gsl-devel is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052057" version="1" comment="gsl-doc is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052058" version="1" comment="gsl-examples is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052059" version="1" comment="libgsl28 is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052060" version="1" comment="libgslcblas0 is &lt;2.8-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052061" version="1" comment="incus is &lt;6.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052062" version="1" comment="incus-bash-completion is &lt;6.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052063" version="1" comment="incus-fish-completion is &lt;6.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052064" version="1" comment="incus-tools is &lt;6.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052065" version="1" comment="incus-zsh-completion is &lt;6.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052066" version="1" comment="libpng16-16 is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052067" version="1" comment="libpng16-16-32bit is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052068" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052069" version="1" comment="libpng16-compat-devel is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052070" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052071" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052072" version="1" comment="libpng16-devel is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052073" version="1" comment="libpng16-devel-32bit is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052074" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052075" version="1" comment="libpng16-tools is &lt;1.6.56-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052076" version="1" comment="libjavamapscript is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052077" version="1" comment="libmapserver2 is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052078" version="1" comment="mapserver is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052079" version="1" comment="mapserver-devel is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052080" version="1" comment="perl-mapscript is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052081" version="1" comment="php-mapscriptng is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052082" version="1" comment="python311-mapserver is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052083" version="1" comment="python313-mapserver is &lt;8.6.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052084" version="1" comment="libpolkit-agent-1-0 is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052085" version="1" comment="libpolkit-agent-1-0-32bit is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052086" version="1" comment="libpolkit-gobject-1-0 is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052087" version="1" comment="libpolkit-gobject-1-0-32bit is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052088" version="1" comment="pkexec is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052089" version="1" comment="polkit is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052090" version="1" comment="polkit-devel is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052091" version="1" comment="polkit-doc is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052092" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;127-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052093" version="1" comment="python311-cryptography is &lt;46.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052094" version="1" comment="python313-cryptography is &lt;46.0.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052095" version="1" comment="python311-requests is &lt;2.33.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052096" version="1" comment="python313-requests is &lt;2.33.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052097" version="1" comment="tailscale is &lt;1.96.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052098" version="1" comment="tailscale-bash-completion is &lt;1.96.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052099" version="1" comment="tailscale-fish-completion is &lt;1.96.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052100" version="1" comment="tailscale-zsh-completion is &lt;1.96.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052101" version="1" comment="xen is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052102" version="1" comment="xen-devel is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052103" version="1" comment="xen-doc-html is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052104" version="1" comment="xen-libs is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052105" version="1" comment="xen-tools is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052106" version="1" comment="xen-tools-domU is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052107" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.21.1_02-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052108" version="1" comment="MozillaFirefox is &lt;149.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052109" version="1" comment="MozillaFirefox-branding-upstream is &lt;149.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052110" version="1" comment="MozillaFirefox-devel is &lt;149.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052111" version="1" comment="MozillaFirefox-translations-common is &lt;149.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052112" version="1" comment="MozillaFirefox-translations-other is &lt;149.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052113" version="1" comment="freerdp2 is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052114" version="1" comment="freerdp2-devel is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052115" version="1" comment="freerdp2-proxy is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052116" version="1" comment="freerdp2-server is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052117" version="1" comment="libfreerdp2-2 is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052118" version="1" comment="libwinpr2-2 is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052119" version="1" comment="winpr2-devel is &lt;2.11.7-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052120" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052121" version="1" comment="libheif-aom is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052122" version="1" comment="libheif-dav1d is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052123" version="1" comment="libheif-devel is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052124" version="1" comment="libheif-ffmpeg is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052125" version="1" comment="libheif-jpeg is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052126" version="1" comment="libheif-openh264 is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052127" version="1" comment="libheif-openjpeg is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052128" version="1" comment="libheif-rav1e is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052129" version="1" comment="libheif-svtenc is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052130" version="1" comment="libheif1 is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052131" version="1" comment="libheif1-32bit is &lt;1.21.2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052132" version="1" comment="python311-nltk is &lt;3.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052133" version="1" comment="python313-nltk is &lt;3.9.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052296" version="1" comment="heroic-games-launcher is &lt;2.20.1-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052297" version="1" comment="netty is &lt;4.1.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052298" version="1" comment="netty-bom is &lt;4.1.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052299" version="1" comment="netty-javadoc is &lt;4.1.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052300" version="1" comment="netty-parent is &lt;4.1.132-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052301" version="1" comment="python311-pypdf is &lt;6.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052302" version="1" comment="python313-pypdf is &lt;6.9.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052341" version="1" comment="ImageMagick is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052342" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052343" version="1" comment="ImageMagick-devel is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052344" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052345" version="1" comment="ImageMagick-doc is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052346" version="1" comment="ImageMagick-extra is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052347" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052348" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052349" version="1" comment="libMagick++-devel is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052350" version="1" comment="libMagick++-devel-32bit is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052351" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052352" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052353" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052354" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052355" version="1" comment="perl-PerlMagick is &lt;7.1.2.18-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052356" version="1" comment="expat is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052357" version="1" comment="libexpat-devel is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052358" version="1" comment="libexpat-devel-32bit is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052359" version="1" comment="libexpat1 is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052360" version="1" comment="libexpat1-32bit is &lt;2.7.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052361" version="1" comment="ovmf is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052362" version="1" comment="ovmf-tools is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052363" version="1" comment="qemu-ovmf-x86_64 is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052364" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052365" version="1" comment="qemu-uefi-aarch64 is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052366" version="1" comment="qemu-uefi-riscv64 is &lt;202602-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052367" version="1" comment="python311-ecdsa is &lt;0.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052368" version="1" comment="python313-ecdsa is &lt;0.19.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052369" version="1" comment="python315 is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052370" version="1" comment="python315-curses is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052371" version="1" comment="python315-dbm is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052372" version="1" comment="python315-idle is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052373" version="1" comment="python315-profiling is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052374" version="1" comment="python315-tk is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052375" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052376" version="1" comment="libXvnc-devel is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052377" version="1" comment="libXvnc1 is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052378" version="1" comment="tigervnc is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052379" version="1" comment="tigervnc-selinux is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052380" version="1" comment="tigervnc-x11vnc is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052381" version="1" comment="xorg-x11-Xvnc is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052382" version="1" comment="xorg-x11-Xvnc-java is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052383" version="1" comment="xorg-x11-Xvnc-module is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052384" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.16.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052385" version="1" comment="tinyproxy is &lt;1.11.3-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052721" version="1" comment="conftest is &lt;0.67.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052722" version="1" comment="conftest-bash-completion is &lt;0.67.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052723" version="1" comment="conftest-fish-completion is &lt;0.67.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052724" version="1" comment="conftest-zsh-completion is &lt;0.67.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052725" version="1" comment="dnsdist is &lt;2.0.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052726" version="1" comment="ignition is &lt;2.26.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052727" version="1" comment="opensc is &lt;0.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052728" version="1" comment="opensc-bash-completion is &lt;0.27.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052729" version="1" comment="python311-Pygments is &lt;2.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052730" version="1" comment="python313-Pygments is &lt;2.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052731" version="1" comment="python314-Pygments is &lt;2.20.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052732" version="1" comment="python310 is &lt;3.10.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052733" version="1" comment="python310-curses is &lt;3.10.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052734" version="1" comment="python310-dbm is &lt;3.10.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052735" version="1" comment="python310-idle is &lt;3.10.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052736" version="1" comment="python310-tk is &lt;3.10.20-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052737" version="1" comment="python311 is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052738" version="1" comment="python311-32bit is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052739" version="1" comment="python311-curses is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052740" version="1" comment="python311-dbm is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052741" version="1" comment="python311-idle is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052742" version="1" comment="python311-tk is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052743" version="1" comment="python311-x86-64-v3 is &lt;3.11.15-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052744" version="1" comment="python312 is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052745" version="1" comment="python312-curses is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052746" version="1" comment="python312-dbm is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052747" version="1" comment="python312-idle is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052748" version="1" comment="python312-tk is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052749" version="1" comment="python312-x86-64-v3 is &lt;3.12.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052750" version="1" comment="python313 is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052751" version="1" comment="python313-32bit is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052752" version="1" comment="python313-curses is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052753" version="1" comment="python313-dbm is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052754" version="1" comment="python313-idle is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052755" version="1" comment="python313-tk is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052756" version="1" comment="python313-x86-64-v3 is &lt;3.13.12-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052757" version="1" comment="python314 is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052758" version="1" comment="python314-32bit is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052759" version="1" comment="python314-curses is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052760" version="1" comment="python314-dbm is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052761" version="1" comment="python314-idle is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052762" version="1" comment="python314-tk is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052763" version="1" comment="python314-x86-64-v3 is &lt;3.14.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052764" version="1" comment="osslsigncode is &lt;2.13-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052796" version="1" comment="himmelblau is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052797" version="1" comment="himmelblau-qr-greeter is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052798" version="1" comment="himmelblau-sshd-config is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052799" version="1" comment="himmelblau-sso is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052800" version="1" comment="libnss_himmelblau2 is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052801" version="1" comment="pam-himmelblau is &lt;2.3.9+git0.a9fd29b-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052802" version="1" comment="k6 is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052803" version="1" comment="k6-bash-completion is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052804" version="1" comment="k6-fish-completion is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052805" version="1" comment="k6-zsh-completion is &lt;1.7.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052806" version="1" comment="python311-Flask-Cors is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052807" version="1" comment="python313-Flask-Cors is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052808" version="1" comment="python314-Flask-Cors is &lt;6.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052816" version="1" comment="amazon-ssm-agent is &lt;3.3.4121.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052817" version="1" comment="chromedriver is &lt;146.0.7680.177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052818" version="1" comment="chromium is &lt;146.0.7680.177-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052819" version="1" comment="corosync is &lt;3.1.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052820" version="1" comment="corosync-devel is &lt;3.1.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052821" version="1" comment="corosync-libs is &lt;3.1.10-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052822" version="1" comment="libinput-devel is &lt;1.31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052823" version="1" comment="libinput-tools is &lt;1.31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052824" version="1" comment="libinput-udev is &lt;1.31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052825" version="1" comment="libinput10 is &lt;1.31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052826" version="1" comment="libinput10-32bit is &lt;1.31.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052827" version="1" comment="python311-aiohttp is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052828" version="1" comment="python313-aiohttp is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052829" version="1" comment="python314-aiohttp is &lt;3.13.5-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052830" version="1" comment="python311-scitokens is &lt;1.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052831" version="1" comment="python313-scitokens is &lt;1.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052832" version="1" comment="python314-scitokens is &lt;1.8.1-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052833" version="1" comment="liblzma5 is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052834" version="1" comment="liblzma5-32bit is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052835" version="1" comment="liblzma5-x86-64-v3 is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052836" version="1" comment="xz is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052837" version="1" comment="xz-devel is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052838" version="1" comment="xz-devel-32bit is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052839" version="1" comment="xz-lang is &lt;5.8.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052846" version="1" comment="SDL3_image-devel is &lt;3.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052847" version="1" comment="libSDL3_image0 is &lt;3.4.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009218017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053053" version="1" comment="SDL2_image-devel is &lt;2.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053054" version="1" comment="libSDL2_image-2_0-0 is &lt;2.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053055" version="1" comment="libSDL2_image-2_0-0-32bit is &lt;2.8.10-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053056" version="1" comment="ckermit is &lt;9.0.302-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053057" version="1" comment="ckermit-doc is &lt;9.0.302-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053058" version="1" comment="git-cliff is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053059" version="1" comment="git-cliff-bash-completion is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053060" version="1" comment="git-cliff-fish-completion is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053061" version="1" comment="git-cliff-zsh-completion is &lt;2.12.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053062" version="1" comment="heroic-games-launcher is &lt;2.20.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053063" version="1" comment="libeverest is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053064" version="1" comment="libeverest-x86-64-v3 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053065" version="1" comment="libmbedcrypto16 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053066" version="1" comment="libmbedcrypto16-x86-64-v3 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053067" version="1" comment="libmbedtls21 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053068" version="1" comment="libmbedtls21-x86-64-v3 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053069" version="1" comment="libmbedx509-7 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053070" version="1" comment="libmbedx509-7-x86-64-v3 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053071" version="1" comment="libp256m is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053072" version="1" comment="libp256m-x86-64-v3 is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053073" version="1" comment="mbedtls-devel is &lt;3.6.6-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053074" version="1" comment="python311-social-auth-app-django is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053075" version="1" comment="python313-social-auth-app-django is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053076" version="1" comment="python314-social-auth-app-django is &lt;5.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053189" version="1" comment="389-ds is &lt;3.1.4+e2562f589-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053190" version="1" comment="389-ds-devel is &lt;3.1.4+e2562f589-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053191" version="1" comment="389-ds-snmp is &lt;3.1.4+e2562f589-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053192" version="1" comment="lib389 is &lt;3.1.4+e2562f589-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053193" version="1" comment="libsvrcore0 is &lt;3.1.4+e2562f589-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053194" version="1" comment="MozillaThunderbird is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053195" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053196" version="1" comment="MozillaThunderbird-translations-common is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053197" version="1" comment="MozillaThunderbird-translations-other is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053198" version="1" comment="dcmtk is &lt;3.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053199" version="1" comment="dcmtk-devel is &lt;3.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053200" version="1" comment="libdcmtk20 is &lt;3.7.0-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053201" version="1" comment="firefox-esr is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053202" version="1" comment="firefox-esr-branding-upstream is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053203" version="1" comment="firefox-esr-translations-common is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053204" version="1" comment="firefox-esr-translations-other is &lt;140.9.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053205" version="1" comment="corepack24 is &lt;24.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053206" version="1" comment="nodejs24 is &lt;24.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053207" version="1" comment="nodejs24-devel is &lt;24.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053208" version="1" comment="nodejs24-docs is &lt;24.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053209" version="1" comment="npm24 is &lt;24.14.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053210" version="1" comment="libIex-3_4-33 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053211" version="1" comment="libIex-3_4-33-32bit is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053212" version="1" comment="libIex-3_4-33-x86-64-v3 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053213" version="1" comment="libIlmThread-3_4-33 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053214" version="1" comment="libIlmThread-3_4-33-32bit is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053215" version="1" comment="libIlmThread-3_4-33-x86-64-v3 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053216" version="1" comment="libOpenEXR-3_4-33 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053217" version="1" comment="libOpenEXR-3_4-33-32bit is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053218" version="1" comment="libOpenEXR-3_4-33-x86-64-v3 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053219" version="1" comment="libOpenEXRCore-3_4-33 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053220" version="1" comment="libOpenEXRCore-3_4-33-32bit is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053221" version="1" comment="libOpenEXRCore-3_4-33-x86-64-v3 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053222" version="1" comment="libOpenEXRUtil-3_4-33 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053223" version="1" comment="libOpenEXRUtil-3_4-33-32bit is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053224" version="1" comment="libOpenEXRUtil-3_4-33-x86-64-v3 is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053225" version="1" comment="openexr is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053226" version="1" comment="openexr-devel is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053227" version="1" comment="openexr-doc is &lt;3.4.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053228" version="1" comment="jupyter-jupyterlab-templates is &lt;0.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053229" version="1" comment="python311-jupyterlab-templates is &lt;0.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053230" version="1" comment="python313-jupyterlab-templates is &lt;0.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053231" version="1" comment="python314-jupyterlab-templates is &lt;0.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053232" version="1" comment="python311-lupa is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053233" version="1" comment="python313-lupa is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053234" version="1" comment="python314-lupa is &lt;2.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053235" version="1" comment="ruby4.0-rubygem-rack-2.2 is &lt;2.2.23-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053236" version="1" comment="steampipe is &lt;2.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053237" version="1" comment="sudo is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053238" version="1" comment="sudo-devel is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053239" version="1" comment="sudo-plugin-python is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053240" version="1" comment="sudo-policy-sudo-auth-self is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053241" version="1" comment="sudo-policy-wheel-auth-self is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053242" version="1" comment="sudo-test is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053243" version="1" comment="system-group-sudo is &lt;1.9.17p2-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053422" version="1" comment="MozillaFirefox is &lt;149.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053423" version="1" comment="MozillaFirefox-branding-upstream is &lt;149.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053424" version="1" comment="MozillaFirefox-devel is &lt;149.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053425" version="1" comment="MozillaFirefox-translations-common is &lt;149.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053426" version="1" comment="MozillaFirefox-translations-other is &lt;149.0.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053427" version="1" comment="aws-c-event-stream-devel is &lt;0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053428" version="1" comment="libaws-c-event-stream1 is &lt;0.7.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053429" version="1" comment="fontforge is &lt;20251009-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053430" version="1" comment="fontforge-devel is &lt;20251009-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053431" version="1" comment="fontforge-doc is &lt;20251009-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053432" version="1" comment="go1.25 is &lt;1.25.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053433" version="1" comment="go1.25-doc is &lt;1.25.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053434" version="1" comment="go1.25-libstd is &lt;1.25.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053435" version="1" comment="go1.25-race is &lt;1.25.9-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053436" version="1" comment="libprotobuf-lite34_1_0 is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053437" version="1" comment="libprotobuf-lite34_1_0-32bit is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053438" version="1" comment="libprotobuf34_1_0 is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053439" version="1" comment="libprotobuf34_1_0-32bit is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053440" version="1" comment="libprotoc34_1_0 is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053441" version="1" comment="libprotoc34_1_0-32bit is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053442" version="1" comment="libutf8_range-34_1_0 is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053443" version="1" comment="libutf8_range-34_1_0-32bit is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053444" version="1" comment="protobuf-devel is &lt;34.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053445" version="1" comment="python311-Django4 is &lt;4.2.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053446" version="1" comment="python313-Django4 is &lt;4.2.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053447" version="1" comment="python314-Django4 is &lt;4.2.30-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053448" version="1" comment="python313-Django6 is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053449" version="1" comment="python314-Django6 is &lt;6.0.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053450" version="1" comment="python311-Flask-HTTPAuth is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053451" version="1" comment="python313-Flask-HTTPAuth is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053452" version="1" comment="python314-Flask-HTTPAuth is &lt;4.8.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053453" version="1" comment="glances-common is &lt;4.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053454" version="1" comment="python311-Glances is &lt;4.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053455" version="1" comment="python313-Glances is &lt;4.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053456" version="1" comment="python314-Glances is &lt;4.5.3-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053457" version="1" comment="python310 is &lt;3.10.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053458" version="1" comment="python310-curses is &lt;3.10.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053459" version="1" comment="python310-dbm is &lt;3.10.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053460" version="1" comment="python310-idle is &lt;3.10.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053461" version="1" comment="python310-tk is &lt;3.10.20-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053462" version="1" comment="python312 is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053463" version="1" comment="python312-curses is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053464" version="1" comment="python312-dbm is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053465" version="1" comment="python312-idle is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053466" version="1" comment="python312-tk is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053467" version="1" comment="python312-x86-64-v3 is &lt;3.12.13-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053468" version="1" comment="python315 is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053469" version="1" comment="python315-curses is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053470" version="1" comment="python315-dbm is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053471" version="1" comment="python315-idle is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053472" version="1" comment="python315-profiling is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053473" version="1" comment="python315-tk is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053474" version="1" comment="python315-x86-64-v3 is &lt;3.15.0~a8-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056165" version="1" comment="clusterctl is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056166" version="1" comment="clusterctl-bash-completion is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056167" version="1" comment="clusterctl-fish-completion is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056168" version="1" comment="clusterctl-zsh-completion is &lt;1.12.5-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009222651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056169" version="1" comment="crun is &lt;1.27-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009224084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056170" version="1" comment="go1.26 is &lt;1.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056171" version="1" comment="go1.26-doc is &lt;1.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056172" version="1" comment="go1.26-libstd is &lt;1.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056173" version="1" comment="go1.26-race is &lt;1.26.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056174" version="1" comment="helm is &lt;4.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056175" version="1" comment="helm-bash-completion is &lt;4.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056176" version="1" comment="helm-fish-completion is &lt;4.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056177" version="1" comment="helm-zsh-completion is &lt;4.1.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056178" version="1" comment="perl-XML-Parser is &lt;2.570.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056179" version="1" comment="libradcli10 is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056180" version="1" comment="radcli is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056181" version="1" comment="radcli-compat-devel is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056182" version="1" comment="radcli-devel is &lt;1.5.0-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009223634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056183" version="1" comment="tekton-cli is &lt;0.44.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056184" version="1" comment="tekton-cli-bash-completion is &lt;0.44.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056185" version="1" comment="tekton-cli-fish-completion is &lt;0.44.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056186" version="1" comment="tekton-cli-zsh-completion is &lt;0.44.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056236" version="1" comment="chromedriver is &lt;147.0.7727.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056237" version="1" comment="chromium is &lt;147.0.7727.55-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056238" version="1" comment="cockpit is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056239" version="1" comment="cockpit-bridge is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056240" version="1" comment="cockpit-devel is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056241" version="1" comment="cockpit-doc is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056242" version="1" comment="cockpit-firewalld is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056243" version="1" comment="cockpit-kdump is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056244" version="1" comment="cockpit-networkmanager is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056245" version="1" comment="cockpit-packagekit is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056246" version="1" comment="cockpit-selinux is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056247" version="1" comment="cockpit-storaged is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056248" version="1" comment="cockpit-system is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056249" version="1" comment="cockpit-ws is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056250" version="1" comment="cockpit-ws-selinux is &lt;360-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056251" version="1" comment="helm3 is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056252" version="1" comment="helm3-bash-completion is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056253" version="1" comment="helm3-fish-completion is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056254" version="1" comment="helm3-zsh-completion is &lt;3.20.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056255" version="1" comment="libopenssl-3-devel is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056256" version="1" comment="libopenssl-3-devel-32bit is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056257" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056258" version="1" comment="libopenssl-3-fips-provider-32bit is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056259" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056260" version="1" comment="libopenssl3 is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056261" version="1" comment="libopenssl3-32bit is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056262" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056263" version="1" comment="openssl-3 is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056264" version="1" comment="openssl-3-doc is &lt;3.5.3-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056265" version="1" comment="libopenvswitch-3_7-0 is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056266" version="1" comment="libovn-26_03-0 is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056267" version="1" comment="openvswitch is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056268" version="1" comment="openvswitch-devel is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056269" version="1" comment="openvswitch-doc is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056270" version="1" comment="openvswitch-ipsec is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056271" version="1" comment="openvswitch-pki is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056272" version="1" comment="openvswitch-test is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056273" version="1" comment="openvswitch-vtep is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056274" version="1" comment="ovn is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056275" version="1" comment="ovn-br-controller is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056276" version="1" comment="ovn-central is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056277" version="1" comment="ovn-devel is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056278" version="1" comment="ovn-doc is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056279" version="1" comment="ovn-docker is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056280" version="1" comment="ovn-host is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056281" version="1" comment="ovn-vtep is &lt;26.03.0-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056282" version="1" comment="python3-openvswitch is &lt;3.7.1-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056283" version="1" comment="python311-cryptography is &lt;46.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056284" version="1" comment="python313-cryptography is &lt;46.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056285" version="1" comment="python314-cryptography is &lt;46.0.7-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056344" version="1" comment="libcap-devel is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056345" version="1" comment="libcap-progs is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056346" version="1" comment="libcap2 is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056347" version="1" comment="libcap2-32bit is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056348" version="1" comment="libpsx2 is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056349" version="1" comment="libpsx2-32bit is &lt;2.78-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056350" version="1" comment="python311-biopython is &lt;1.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056351" version="1" comment="python313-biopython is &lt;1.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056352" version="1" comment="python314-biopython is &lt;1.87-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056582" version="1" comment="helm is &lt;4.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056583" version="1" comment="helm-bash-completion is &lt;4.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056584" version="1" comment="helm-fish-completion is &lt;4.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056585" version="1" comment="helm-zsh-completion is &lt;4.1.4-2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056586" version="1" comment="oci-cli is &lt;3.76.2-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250383"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-breeze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-sifr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcabber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcabber-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-Ack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyradm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>archivemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-apps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-nsplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen4-cursors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblightdm-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblightdm-qt-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblightdm-qt5-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-LightDM-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-comicsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionview-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionview-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionview-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionview-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionview-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionview-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaria2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-codec-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble-xmpp-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kscreenlocker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kscreenlocker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kscreenlocker-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKScreenLocker5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>remind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_3-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-plugin-conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>percona-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColorHug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-set_version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-doc-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-testsuite-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-doc-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-testsuite-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecryptfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecryptfs1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syzkaller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syzkaller-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-godbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie-anacron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnugk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xzgv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>klogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmp4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-downtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-eventhandlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-extlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-extlib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-extlib-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-extlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-extlib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-extlib-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rails-html-sanitizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rails-html-sanitizer-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rails-html-sanitizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rails-html-sanitizer-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde5-imp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-railties-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-railties-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-railties-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-railties-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-railties-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-railties-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-deploy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton-cpp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-qpid-proton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>charybdis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyramid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_trace1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_trace1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PAR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-system-wide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-24-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpreplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth-campaign-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth-fslayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wesnoth-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspluginwrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-qt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql95-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcriu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-raet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uudeview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpgf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpgf6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib3ds-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib3ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tnftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto38-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl39-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DevIL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdevil-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libib_util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libib_util-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libib_util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munin-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionpack-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionpack-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-actionpack-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionpack-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionpack-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-actionpack-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuchess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2-fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trojita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pngcrush</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-3D</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-postscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-scan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnump3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthunarx-2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler65</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler65-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cecilia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lense-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyter_notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyter_notebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncompress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfcgi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfixadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-18-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkimg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkimg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagstamon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-RedCloth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-RedCloth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-RedCloth-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-RedCloth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-RedCloth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-RedCloth-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-doc-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-rack-testsuite-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-doc-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-rack-testsuite-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade3-catalog-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-1-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-13-14-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-4-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-60-v-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-17-17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rocksndiamonds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edje</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>efl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>efl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>efl-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>efl-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elementary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elementary-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>embryo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment-theme-dark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment-theme-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment-x-dark-icon-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evas-generic-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libector1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedje1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeet1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeeze1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libefl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libefreet1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libefreet_mime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libefreet_trash1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeina1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeldbus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelocation1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelput1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelua1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libembryo1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libemile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libemotion1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeo1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeolian1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libephysics1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libethumb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libethumb_client1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevas1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_5m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_5m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libv8-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomboy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomboy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>timidity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Email-Address</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Signature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-memcachec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-notify-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-pinba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-web-js</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollectdclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollectdclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgme7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgme7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idnkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idnkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idnkit-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-140</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-140-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns162</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns162-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkitlite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkitlite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkitres1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidnkitres1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs141</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs141-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc140</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc140-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg140</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg140-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres141</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres141-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proxychains-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-eyeD3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonosgen-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonosgen-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-mvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-reactive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winfxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_10-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_10-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fossil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-rcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_2-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeimage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreeimage3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreeimageplus3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>froxlor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prosody</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Body</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-smtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-extras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwebkitpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwebkitpart-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-guardtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omhttpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omtcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-hub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-hub-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-hub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-hub-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-hub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-hub-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-hub-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-kyotocabinet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obex-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-jquery-rails-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-jquery-rails-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-jquery-rails-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-jquery-rails-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libathemecore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Load-Conditional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gypsy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sslscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>links</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-libSDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-libvncclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freexl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreexl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbigkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv6hl-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv6hl-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv7hl-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv7hl-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparcv9-gcc5-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj-jar-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gajim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gajim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-nokogiri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-nokogiri-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-nokogiri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-nokogiri-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-dedicated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-facter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-facter-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-hiera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-hiera-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-hiera-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-facter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-facter-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-hiera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-hiera-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-hiera-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-hiera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-plugin-process-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-activesupport-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-activesupport-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-activesupport-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-activesupport-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-activesupport-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-activesupport-doc-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gromacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gromacs-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gromacs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gromacs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gromacs-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgromacs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httrack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httrack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhttrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-puppet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-rubygem-puppet-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-puppet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-rubygem-puppet-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet-master-unicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrcares0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrsnmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrzmq0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlag_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_maxminddb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rawtherapee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-x11vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FlightGear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-KHR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-dnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_sound-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_sound-1_0-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_sound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_sound-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alpine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-email-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arm-trusted-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arm-trusted-firmware-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch-ethercodes-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-spell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aubio-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-libevent1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bchunk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>benji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bison</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bison-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bison-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blosc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblosc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blueman-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-extension-sendto-blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extension-sendto-blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nemo-extension-sendto-blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-sendto-blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-manager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboinc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboinc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>borgbackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>borgbackup-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>borgbackup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>borgbackup-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>borgbackup-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boringssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boringssl-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboringssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pkix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bugzilla-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bugzilla-lang-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkbaselibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkdrpms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c3p0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c3p0-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares-webview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-audit-advisory-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk-module-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk2-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio19-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-grafana-dashboards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-immutable-object-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-k8sevents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-rook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-osd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-prometheus-alerts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-radosgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-top</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephsqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephsqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cfitsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cfitsio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cfitsio-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcfitsio9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgal-demo-examples-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-empty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cinnamon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cinnamon-gschemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cinnamon-gschemas-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-milter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clojure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-amqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-buddyinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-connectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-gps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-logparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-mcelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-modbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-mqtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-openldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-pcie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-procevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-sigrok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-synproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-sysevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-ubi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-uptime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-write_influxdb_udp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-write_stackdriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-write_syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-nmcompat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-hh2serial-gps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-iospm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-pptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-tist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-wireguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qdevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qnetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-testagents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcfg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcfg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmap4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmap4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync_common4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync_common4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpg4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpg4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquorum5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquorum5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsam4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsam4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtotem_pg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtotem_pg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvotequorum8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvotequorum8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o-kubeadm-criconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc10-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx2-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx2-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers2-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers2-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deluge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deluge-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dex-oidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>diffoscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>discount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmarkdown-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmarkdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnscrypt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-20_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dumb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dumb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dumb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdumb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dxflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxflib-3_26_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-scrub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-contributor-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-equinox-osgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jdt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-p2-discovery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-pde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-swt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elinks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcdctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-pst-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-text-highlight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-catalog-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Camel-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBackend-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ECal-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataCal-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServerUI-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-xmp-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>feh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt_ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firejail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firejail-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firejail-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flannel-k8s-yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libct4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsybdb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsybdb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdsodbc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdsodbc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dfu-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdtpmevlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupdplugin1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-FwupdPlugin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GCab-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geary-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_4-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-annex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-annex-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-delta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitolite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>global</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfchangelog0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfrpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfxdr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglusterd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglusterfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-autoar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-gtk-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoar-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoarGtk-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3_0-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeDesktop-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.10-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dirmngr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gptfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gptfdisk-fixparts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gradle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-piechart-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrilo-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlnet-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlpls-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Grl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlNet-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlPls-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-docgenerator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-groovydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-groovysh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-jsr223</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-nio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsoap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsoap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsoap-2_8_117</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttranscoder-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstBadAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCodecs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTranscoder-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkan-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanXCB-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLEGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLX11-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-rtsp-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtspserver-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtspServer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gthumb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gthumb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gthumb-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvncpulse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVncPulse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-testlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUPnP-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haserl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat-plugins-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat-plugins-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hexchat-plugins-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhiredis1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-scan-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_7-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_7-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaxutil7_0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-dict-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecream-clang-wrappers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicecream-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingacli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-HTMLPurifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-JShrink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-Parsedown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-dompdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-lessphp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-zf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-Icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ikiwiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ikiwiki-w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mininews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ioquake3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ioquake3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool-bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>isync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iucode-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-13-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-15-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-16-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-cdi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-continuation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-deploy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-fcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http-spi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jndi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-minimal-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-openid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-rewrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-start</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util-ajax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jgraphx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k3s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kaffeine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kaffeine-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5AuthCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcodecs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconf_update5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-filesharing-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-bt-geiger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-freaklabs-zigbee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-linux-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-linux-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-nrf-51822</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-nrf-52840</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-nrf-mousejack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-nrf-nxp-kw41z</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-rz-killerbee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-sdr-rtl433</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-sdr-rtladsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-sdr-rtlamr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-ti-cc-2531</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-capture-ti-cc2540</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kismet-logtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-spake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-apiserver-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-controller-manager-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-coredns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-coredns-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-etcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-etcd-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-proxy-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-scheduler-minus1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.19-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.20-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.21-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-mp3rtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasem-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ledger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>leptonica-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>leptonica-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblept5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblept5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aom-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libav-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caca-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-caca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcomps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcomps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcomps0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libcomps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libcomps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp8_6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp8_6_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawkey-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf-repo-config-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hawkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libdnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_amdgpu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_amdgpu1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_intel1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_intel1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_nouveau2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_nouveau2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_radeon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_radeon1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetpan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetpan20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgig-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgig10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GTop-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcat-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjcat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjcat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Jcat-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-libmirage-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntlm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntlm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpt123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano13-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-2_0-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-2_0-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plistutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-plist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb100</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb100-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Pdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PdfWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxmpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxmpp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxmpp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxmpp3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ckb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-librelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto46</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto46-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-convert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-3_6_5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SPF_XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspiro-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspiro1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixml11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixml11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp17-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbregistry-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxlsreader8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liferea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liferea-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-emmentaler-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-fonts-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-texgy-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libBasicUsageEnvironment1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libUsageEnvironment3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia97</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblldpctl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_4-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_4-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cgfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxterminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxterminal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmailutils5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-imap4d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-mh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-notify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-pop3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavamapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmapserver2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mapserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mapserver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-mapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>matio-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>matrix-synapse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmcpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendfax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minidlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-machine-driver-kvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minikube</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minikube-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc17-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mkvtoolnix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mkvtoolnix-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mobidict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monero-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monero-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monerod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-breeze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-by_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-cluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dbi-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dbi-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dbi-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-disk_smb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-dummy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-file_age</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-flexlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-fping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-hpjd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-icmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ide_smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ifoperstatus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ifstatus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ircd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-load</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-mrtg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-mrtgtraf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-nt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ntp_peer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ntp_time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-nwstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-overcr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-procs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-real</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-rpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-sensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-smtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-tcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-ups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-uptime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-wave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquitto1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquittopp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-78-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs78</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs78-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mp3gain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libout123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libout123-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsyn123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsyn123-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-jack-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-openal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-openal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-portaudio-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-sdl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>msmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>msmtp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>msmtp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>msmtp-mta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmunge2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmunge2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mybatis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mybatis-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-workbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-theme-exfoliation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-nanopb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nanopb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nanopb-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Nautilus-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-curl-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-example-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-gzip-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-nbd-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-ssh-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-tar-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-tmpdisk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-vddk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-xz-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neovim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neovim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-poms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nemo-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-dolphin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfsidmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>notary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g89</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-dcf77-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpsec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpsec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpsec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_oath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-refresh_patches</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-source_validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-appimage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-obs_scm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-obs_scm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-snapcraft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-tar_scm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oddjob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oddjob-mkhomedir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-mobile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-spectre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-fuse_client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenconnect5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_aruco4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_face4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_highgui4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_imgcodecs4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_objdetect4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_superres4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_videoio4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_videostab4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_ximgproc4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv4-cascades-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_1-30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_1-30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_1-30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_1-30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_1-30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_1-30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_1-30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_1-30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_1-30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openfortivpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjfx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjfx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjfx-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjfx-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjfx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_06-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_client5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server-plugin-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-openwsman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>owntone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-ci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-ev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-loadjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-logcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-milters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-chameleon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-default-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-default-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-pagureio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-srcfpo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-web-apache-httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-web-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-webhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_unix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_unix-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_kwallet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_kwallet-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_kwallet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptmount0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptmount0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_p11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_p11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pan-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>partclone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>partclone-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>password-store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>password-store-dmenu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nutcracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MIME-Charset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chkstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-zypp-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf-m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf-pkg-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platformsh-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pngcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler112-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfixadmin-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postsrsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pound-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-modem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prboom-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-attentionplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-autoreplyplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-birthdayreminderplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-chessplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-cleanerplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-clientswitcherplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-conferenceloggerplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-contentdownloaderplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-enummessagesplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-extendedmenuplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-extendedoptionsplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-gomokugameplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-historykeeperplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-imageplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-imagepreviewplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-jabberdiskplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-juickplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-messagefilterplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-omemoplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-openpgpplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-otrplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-pepchangenotifyplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-qipxstatusesplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-screenshotplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-stopspamplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-storagenotesplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-translateplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-videostatusplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi+-plugins-watcherplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pspp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pspp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pspp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pspp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pspp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gsettings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>HyperKitty-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>HyperKitty-web-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-HyperKitty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bottle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-marshmallow-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-onionshare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymisp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pymisp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pymisp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pymisp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-python-cjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-python-cjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-cjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-sleekxmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-sleekxmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-sleekxmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tqdm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-qtest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-tcg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-baum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-smartcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ivshmem-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-skiboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqore6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qore-misc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf-htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qutebrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-c-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ripgrep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ripgrep-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ripgrep-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ripgrep-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rkhunter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librnp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpmbuild9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmdevtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-ossl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_7-2_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_0-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actioncable-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actioncable-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actioncable-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actioncable-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionmailbox-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionmailbox-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionmailer-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionmailer-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionmailer-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionmailer-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionpack-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionpack-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionpack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionpack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actiontext-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actiontext-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionview-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionview-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-actionview-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-actionview-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activejob-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activejob-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activejob-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activejob-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activemodel-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activemodel-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activemodel-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activemodel-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activerecord-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activerecord-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activerecord-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activerecord-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activestorage-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activestorage-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activestorage-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activestorage-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activesupport-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activesupport-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-activesupport-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-activesupport-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-archive-tar-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-archive-tar-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-puma-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-puma-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rack-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rack-1_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rack-2.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rack-2.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rails-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rails-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rails-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rails-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-railties-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-railties-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-railties-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-railties-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-sinatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-sinatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls1.53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.53-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.53-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.53-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-gpupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsane1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsane1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-saned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bosh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btcflash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdda2wav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdrecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdrdeflt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdeflt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedc_ecc1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedc_ecc_dec1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfile1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfind4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libparanoia1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librmt-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librmt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librscg1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscg1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscgcmd1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxtermcap1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mkisofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sccs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schismtracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scummvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scummvm-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sha1collisiondetection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshadowsocks-libev2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>signing-party</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcl-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jul-to-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jdk14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slrn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slrn-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solanum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsox3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin-Plugin-iXhash2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin-spamc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqliteodbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqliteodbc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1_4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ssdp-responder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ssh-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storeBackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-plugin-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing-relaysrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevtlog-3_33-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-mqtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-resolve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-portable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teeworlds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telegraf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libptexenc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsynctex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexlua53-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexluajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-albatross-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib2gls-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chklref-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clojure-pamphlet-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cluttex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan-o-mat-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviout-util-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-git-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jfmutil-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ketcindy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-dev-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-light-latex-make-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luajittex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-quiet-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftosrc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2eps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptexenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-extra-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoctk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texluajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texplate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikztosvg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webquiz-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xelatex-dev-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xml2pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpdfopen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-bibtexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-binextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-formatsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-humanities</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langarabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langchinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langczechslovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langeuropean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langfrench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgerman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langitalian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langjapanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langkorean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langpolish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langportuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langspanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-mathscience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-music</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pictures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-plaingeneric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-publishers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extratools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-gust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-infraonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-medium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-12many</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-12many-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-2up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-2up-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ESIEEcv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ESIEEcv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-GS1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-GS1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-HA-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-HA-prosper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEconf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEtran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEtran-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-MemoirChapStyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIstyle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIunits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Tabbing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Tabbing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Type1fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a0poster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a0poster-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a4wide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a4wide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a5comb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a5comb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aaai-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aalok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aalok-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aastex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abbr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abntex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abntex2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abraces-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstract-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstyles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accents-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accessibility-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accsupp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accsupp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-achemso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-achemso-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmconf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acronym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acronym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acroterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acroterm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-active-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-active-conf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialangle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialangle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addliga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addliga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addlines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfathesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adigraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adigraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjmulticol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjmulticol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adobemapping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adrconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adrconv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adtrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-advdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-advdate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aeguill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aeguill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aesupp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aesupp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aesupp-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afparticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afparticle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aguplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aguplus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aiaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aiaa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aichej</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akktex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akshar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akshar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-albatross</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-albatross-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alertmessage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alertmessage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alfaslabone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alfaslabone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alfaslabone-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algobox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algobox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algolrevived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algolrevived-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algolrevived-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithm2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithm2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithmicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithmicx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algpseudocodex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algpseudocodex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algxpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algxpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aligned-overset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aligned-overset-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almendra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almendra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almendra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alnumsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alnumsec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alpha-persian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alpha-persian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alphalph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alphalph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-altfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-altfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ametsoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ametsoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiweb2c-guide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsaddr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsaddr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscdx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscdx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amslatex-primer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsrefs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsrefs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsthdoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-animate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-animate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-annee-scolaire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-annee-scolaire-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-annotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonchap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymous-acm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymous-acm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-answers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-answers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antanilipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antanilipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antomega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antomega-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anufinalexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aobs-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aobs-tikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aomart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aomart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa7-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apacite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apacite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendixnumberbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendixnumberbeamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apprendre-a-programmer-en-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apprends-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apptools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apxproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apxproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-add-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabicfront</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabicfront-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabluatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaeologie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaeologie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archivo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archivo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archivo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arcs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-around-the-bend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraycols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraycols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arrayjobx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arrayjobx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraysort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraysort-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arsclassica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arsclassica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-articleingud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-articleingud-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arvo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arvo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arvo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arydshln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arydshln-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asaetr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asaetr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascelike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascelike-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-chart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asciilist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asciilist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascmac-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askinclude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askinclude-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askmaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asmeconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asmeconf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asmejour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asmejour-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assignment-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assoccnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-association-matrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-association-matrix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-astro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-astro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asyfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-by-example-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-faq-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-manual-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asypictureb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asypictureb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atbegshi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atenddvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atenddvi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atkinson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atkinson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atkinson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atveryend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atveryend-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aucklandthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aucklandthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authoraftertitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authoraftertitle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorarchive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authordate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authordate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf-lua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoaligne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoaligne-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoarea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoarea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autobreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autobreak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autofancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autofancyhdr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-automata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-automata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autonum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autonum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auxhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auxhook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avremu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avremu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axessibility-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-b1encoding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-b1encoding-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-albanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-albanian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-azerbaijani</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-azerbaijani-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-basque-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-belarusian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bosnian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bosnian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-breton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bulgarian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-catalan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-croatian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-czech-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-danish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-dutch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-esperanto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-estonian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-finnish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-friulan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-galician-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-georgian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-greek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hebrew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hungarian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-icelandic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-indonesian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-interlingua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-irish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-italian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-japanese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-kurmanji-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latvian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-macedonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-macedonian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-malay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-malay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-norsk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-occitan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-piedmontese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-polish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-portuges-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romanian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romansh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-russian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-samin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-scottish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbianc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbianc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovenian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-sorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-sorbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-swedish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-thai-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-turkish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-ukrainian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-vietnamese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-welsh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-background</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-background-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-backnaur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-backnaur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bagpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bagpipe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorcsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorcsthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bankstatement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bankstatement-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barcodes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bardiag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bardiag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barracuda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barracuda-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bartel-chess-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bartel-chess-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bashful</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bashful-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basicarith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basicarith-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-book-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-date</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-date-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bath-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bath-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbcard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbding-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm-macros-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bchart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bclogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bclogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-FUBerlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-rl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-rl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-verona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-verona-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer2thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer2thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerappendixnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerappendixnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beameraudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beameraudience-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerauxtheme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerauxtheme-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamercolorthemeowl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamercolorthemeowl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerdarkthemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerdarkthemes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerposter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamersubframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamersubframe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-cuerna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-cuerna-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-detlevcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-detlevcm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-epyt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-epyt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-focus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-focus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-light</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-light-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-metropolis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-metropolis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-npbt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-npbt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-phnompenh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-phnompenh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-pure-minimalistic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-pure-minimalistic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-saintpetersburg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-saintpetersburg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-upenn-bc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-upenn-bc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemejltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenirma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenirma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenord-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bearwear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bearwear-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beaulivre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beaulivre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beebe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begingreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begingreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begriff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begriff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beilstein</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beilstein-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bengali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bengali-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-besjournals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-besjournals-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bestpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bestpapers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-betababel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-betababel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bewerbung</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bewerbung-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bez123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bez123-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bezierplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bezierplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgteubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgteubner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bhcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bhcexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib2gls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib2gls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibarts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibarts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibhtml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-abnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-abnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ajc2020unofficial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ajc2020unofficial-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-anonymous</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-anonymous-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa6-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-archaeology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-archaeology-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-arthistory-bonn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-arthistory-bonn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinarticle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinother-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bwl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bwl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-caspervector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-caspervector-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chicago-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-claves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-claves-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-dw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-dw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-enc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-enc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-fiwi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-fiwi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gb7714-2015</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gb7714-2015-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-german-legal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-german-legal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-historian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-historian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ieee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ieee-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ijsra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-iso690</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-iso690-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-jura2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-jura2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-juradiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-juradiss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-license-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-lni-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-luh-ipw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-luh-ipw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-manuscripts-philology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-manuscripts-philology-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-mla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-mla-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-morenames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-morenames-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-multiple-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-multiple-dm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-musuos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nature-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nejm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nottsclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nottsclassic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-opcit-booktitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-opcit-booktitle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-oxref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-oxref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-philosophy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-philosophy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-phys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-phys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-publist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-publist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-realauthor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-realauthor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-sbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-sbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-science</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-science-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-shortfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-shortfields-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-socialscienceshuberlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-socialscienceshuberlin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-software</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-software-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-source-division</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-source-division-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-subseries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-subseries-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-swiss-legal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-swiss-legal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-trad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-trad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-true-citepages-omit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-true-citepages-omit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-unified</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-unified-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-vancouver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-vancouver-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex2bibitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex2bibitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-lds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-lds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-mouth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-mouth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-parse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-parse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibletext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibletext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexperllibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopicprefix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopicprefix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibunits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-atbegshi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidicontour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidicontour-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidihl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidihl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipagegrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipagegrid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipresentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipresentation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidishadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidishadowtext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigintcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigintcalc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigints-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binarytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binarytree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binomexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binomexp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biochemistry-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biochemistry-colors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biocon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biocon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biolett-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biolett-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitelist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bithesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitpattern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitset-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bizcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bizcard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blacklettert1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blacklettert1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blindtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blindtext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blkarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blkarray-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blochsphere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blochsphere-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-block</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-block-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blockdraw_mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blockdraw_mp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bloques</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bloques-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blowup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blowup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bnumexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bnumexpr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bodegraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bodegraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bohr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bohr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boisik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boisik-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boites-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bold-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bold-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boldtensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boldtensors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraphs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookcover-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookdb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booklet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booklet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookmark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookshelf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookshelf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boolexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boolexpr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bophook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bophook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-borceux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-borceux-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bosisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bosisio-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxhandler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxhandler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpchem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpolynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpolynomial-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-br-lex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-br-lex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bracketkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bracketkey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braids</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braids-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braille</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braille-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braket-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-dissertation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-problemset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-problemset-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakcites-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bredzenie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bredzenie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bropd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bropd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bubblesort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bubblesort-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bullcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bullcntr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-businesscard-qrcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-businesscard-qrcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcalc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcjkjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcjkjatype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdpx-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdpx-beamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdvidriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdvidriver-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxeepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxeepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxenclose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxenclose-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxghost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxghost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaholiday</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaholiday-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjalipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjalipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaprnind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaprnind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjatoucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjatoucs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjscls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxnewfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxnewfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxorigcapt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxorigcapt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpapersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpapersize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpdfver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpdfver-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxtexlogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxtexlogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxwareki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxwareki-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bytefield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bytefield-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c-pascal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c-pascal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c90-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calcage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calcage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calctab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calctab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculator-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-callouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-callouts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calrsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calrsfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cals-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calxxxx-yyyy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calxxxx-yyyy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cancel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cancel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-canoniclayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-canoniclayout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captcont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captcont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captdef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carbohydrates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carbohydrates-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascade-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadia-code</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadia-code-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadia-code-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadilla-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cases-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-casyl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-casyl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfilebetweentags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfilebetweentags-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catcodes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catechis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catechis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catoptions-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-causets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-causets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccaption-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cclicenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cclicenses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd-cover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd-cover-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cdpbundl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cdpbundl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellprops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellprops-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-celtic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-celtic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-censor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-censor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-centeredline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-centeredline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-centerlastline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-centerlastline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cesenaexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cesenaexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-initials-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-lm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelayout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chappg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chappg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chapterfolder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chapterfolder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charissil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charissil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charissil-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chbibref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chbibref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cheatsheet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkend-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chem-journal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chembst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chembst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcompounds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcompounds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcono-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemexec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemformula-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemmacros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemmacros-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemplants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemplants-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemschemex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemschemex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemsec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemstyle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cherokee-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess-problem-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess-problem-diagrams-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessboard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chextras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chextras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chhaya</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chhaya-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago-annote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago-annote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicagoa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chickenize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chickenize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chifoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chifoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-childdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-childdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chinese-jfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chinese-jfm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chkfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chkfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chklref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chklref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chordbars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chordbars-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chordbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chordbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronology-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronosys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronosys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chs-physics-report</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chs-physics-report-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chscite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chscite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-churchslavonic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circ-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circledsteps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circledsteps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuit-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuit-macros-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuitikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuitikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeall-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cje</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cje-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-ko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkpunct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkpunct-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clara-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classicthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classicthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleanthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleanthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clefval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clefval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleveref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleveref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clipboard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clock-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clojure-pamphlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clojure-pamphlet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cloze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cloze-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrdblpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrdblpg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode3e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode3e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrstrip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrstrip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cluttex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cluttex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-mf-extra-bold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmarrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmathbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmathbb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmathbb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmbright-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdstring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdtrack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdtrack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsrb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsrb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmtiup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmtiup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmupint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmupint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmupint-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnbwp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnbwp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntformats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntperchap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codeanatomy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codeanatomy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codedoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codedoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codesection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codesection-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codicefiscaleitaliano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codicefiscaleitaliano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coelacanth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coelacanth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coelacanth-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collcell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collcell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colophon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colophon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-color-edits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-color-edits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colordoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colordoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coloring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coloring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorprofiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorprofiles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorsep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorwav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorwav-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorweb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colourchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colourchange-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combelow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combelow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combinedgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combinedgraphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combofont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combofont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commado-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commedit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comment-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commutative-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commutative-diagrams-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-compactbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-compare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-competences</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-competences-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-complexity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-components-of-TeX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comprehensive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-computational-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-computational-complexity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concepts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concepts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concprog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concrete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concrete-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conditext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conditext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-confproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-confproc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-constants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-constants-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conteq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conteq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-account-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-algorithmic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-algorithmic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-animation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-animation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-annotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-annotation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bnf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-chromato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-chromato-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmscbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmscbf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmttbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmttbf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-construction-plan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-construction-plan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cyrillicnumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cyrillicnumbers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-degrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-degrade-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fancybreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fancybreak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-filter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fullpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fullpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gantt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gnuplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-handlecsv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-handlecsv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-inifile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-inifile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-layout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-letter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-letter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-lettrine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-mathsets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-mathsets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-rst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-rst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simplefonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simplefonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simpleslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simpleslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-title</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-title-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-transliterator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-transliterator-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typearea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typearea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typescripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typescripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-vim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-visualcounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-visualcounter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-continue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-continue-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contour-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contracard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contracard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conv-xkv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conv-xkv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking-units-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cookingsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cookingsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coollist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coollist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolstr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolstr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolthms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolthms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooltooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooltooltips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coordsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coordsys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyedit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyrightbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyrightbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-correctmathalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-correctmathalign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coseoul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coseoul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-counttexruns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-counttexruns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-scaled</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-scaled-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courierten</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courierten-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courierten-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courseoutline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courseoutline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coursepaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coursepaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coverpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coverpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-covington</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-covington-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cprotect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cprotect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cqubeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cqubeamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cquthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cquthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimsonpro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimsonpro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimsonpro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreference</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreference-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreftools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreftools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossword</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossword-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crosswrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crosswrd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryptocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryptocode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csbulletin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csbulletin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-css-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-css-colors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstypo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvmerge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvsimple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvsimple-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan-o-mat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan-o-mat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan_chk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuisine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuisine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuprum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuprum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuprum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currency-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currvita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currvita-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cursolatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curves-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-custom-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-custom-bib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cutwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cutwin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv4tw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv4tw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-old</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyber-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cybercic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cybercic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dancers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashrule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashundergaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashundergaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dataref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dataref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datatool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datatool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dateiliste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dateiliste-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datenumber-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bahasai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bahasai-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-basque-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-breton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bulgarian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-catalan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-croatian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-czech-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-danish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-dutch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-en-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-en-fulltext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-english-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-esperanto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-estonian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-finnish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-galician-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-greek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-hebrew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-icelandic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-irish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-it-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-it-fulltext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-italian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-latin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-lsorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-lsorbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-magyar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-norsk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-polish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-portuges-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-romanian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-russian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-samin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-scottish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-serbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovene-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-spanish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-swedish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-turkish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-ukrainian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-usorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-usorbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-welsh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dblfloatfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dblfloatfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dccpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dccpaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dcpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dcpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ddphonism</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ddphonism-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decimal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decision-table</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decision-table-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decorule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decorule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph-exptl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph-exptl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimseasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimseasy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimset-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimtxt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimtxt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-denisbdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-denisbdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-derivative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-derivative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dhua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dhua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diabetes-logbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diabetes-logbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagmac2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagmac2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagnose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagnose-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dialogl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dialogl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dichokey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dichokey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dickimaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diffcoeff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diffcoeff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-digiconfigs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-digiconfigs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dijkstra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dijkstra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-din1505</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-din1505-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinbrief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinbrief-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dingbat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dingbat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-directory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-directory-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtytalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtytalk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-disser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-disser-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ditaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ditaa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dithesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dk-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dk-bib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dlfltxb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dlfltxb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnaseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnaseq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docbytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docbytex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doclicense</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doclicense-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmfp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmute-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docsurvey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doctools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-documentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-documentation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doipubmed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doipubmed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-domitian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-domitian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-domitian-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dot2texi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dot2texi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotarrow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotlessi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotlessi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotseqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotseqn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dottex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doulossil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doulossil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doulossil-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dowith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dowith-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-download</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-download-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpcircling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpcircling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dprogress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dprogress-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftcopy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftwatermark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dramatist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dramatist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dratex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dratex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawmatrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawmatrix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawstack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droit-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droit-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsptricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsptricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsserif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsserif-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsserif-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtk-bibliography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxdescribe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxdescribe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxtut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ducksay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ducksay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duckuments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duckuments-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duotenzor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duotenzor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvdcoll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvdcoll-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvgloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvgloss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviincl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviout-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipsconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynamicnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynamicnumber-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynblocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynblocks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynkin-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynkin-diagrams-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dyntree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dyntree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-e-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-e-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean13isbn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean13isbn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy-todo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easybook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easybook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfloats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyformat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easylist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyreview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyreview-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebezier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-maths</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-maths-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebsthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecclesiastic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecclesiastic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecgdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecgdraw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecltree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eco-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecobiblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecobiblatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econ-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econ-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econlipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econometrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econometrics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-economic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-economic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecothesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eczar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eczar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eczar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edfnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edfnotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edichokey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edichokey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmargin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ednotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ednotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eemeir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eemeir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-efbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-efbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egameps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egameps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ehhline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ehhline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad-ltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eijkhout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ejpecp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ejpecp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekaia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekaia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekdosis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekdosis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ektype-tanka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ektype-tanka-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ektype-tanka-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elbioimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elbioimp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledform-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elegantpaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elements</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elements-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipsis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elocalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elocalloc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elpres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elpres-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-els-cas-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-els-cas-templates-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elsarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elsarticle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elteikthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elteikthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elvish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elvish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elzcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elzcards-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emarks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedall-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embrac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embrac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emisa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emisa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emoji-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emojicite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emojicite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emptypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emptypage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emulateapj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emulateapj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-encxvlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-encxvlna-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endheads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endheads-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endiagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes-hy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes-hy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotesj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotesj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endofproofwd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endofproofwd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engpron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engpron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engrec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engrec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engtlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engtlc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enigma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enigma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enotez-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-zref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envbig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envbig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envlab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph-keys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph-keys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsdice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsdice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-dvipdfmx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsincl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epslatex-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdfconversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdfconversion-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eq-pin2corr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eq-pin2corr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqexpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnalign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnarray-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnnumwarn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnnumwarn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erdc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-errata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-errata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erw-l3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erw-l3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-es-tex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esami-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esdiff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskdx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskdx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-estcpmm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-estcpmm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etaremune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etaremune-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etbb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etbb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etdipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etexcmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etextools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etsvthor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etsvthor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euclideangeometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euclideangeometry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euflag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euflag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eukdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eukdate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulerpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulerpx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulervm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulervm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-ce-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europasscv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europasscv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europecv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euxm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyhook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everypage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everysel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everysel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyshi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-n-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-randomizechoices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-randomizechoices-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examdesign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examplep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examplep-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-excludeonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-excludeonly-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercise</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercise-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercisebank</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercisebank-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercisepoints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercisepoints-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercises</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercises-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exesheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exesheet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exframe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exp-testopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exp-testopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expdlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expdlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-cs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-def-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-opt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expkv-opt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-export</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-export-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expose-expl3-dunkerque-2019</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expressg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expressg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsheets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extarrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exteps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exteps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extpfeil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extpfeil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extract-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facsimile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facsimile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-factura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-factura-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture-belge-simple-sans-tva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture-belge-simple-sans-tva-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-faktor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-faktor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhandout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhandout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancylabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancylabel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancynum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancynum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancypar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancypar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytabs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytooltips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fascicules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fascicules-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fast-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fast-diagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbithesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcavtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcavtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcltxdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcltxdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcolumn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcolumn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fduthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-featpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-featpost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fei-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fenixpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fenixpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetchcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetchcls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feupphdteses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feupphdteses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fewerfloatpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fewerfloatpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feyn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feyn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmp-auto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmp-auto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ffslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ffslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fgruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fgruler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fibeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fibeamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifinddo-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifinddo-info-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifo-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifo-stack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figchild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figchild-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figflow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figsize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontentsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontentsdef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filedate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filedate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fileinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filemod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filemod-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fink-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firamath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firamath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firamath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firamath-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firamath-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-first-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firstaid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-firstaid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fitbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fitbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fithesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixcmex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixcmex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixfoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixjfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixjfm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixltxhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixltxhyph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixme-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixmetodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixmetodonotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixpdfmag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fiziko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fiziko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fjodor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fjodor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flabels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flacards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flacards-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flagderiv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flagderiv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashcards-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashmovie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashmovie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flipbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flipbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flippdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flippdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-floatrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-floatrow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowchart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowfram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowfram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fltpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fltpoint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fn2end</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fn2end-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnbreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnbreak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncylab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncylab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpct-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnspe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnspe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fntproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fntproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnumprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnumprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foilhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foilhtml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change-xetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome5-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontaxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontaxes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontname-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontsetup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontsize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonttable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotebackref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotebackref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnoterange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnoterange-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnpag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnpag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forarray-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foreign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foreign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forloop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forloop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formation-latex-ul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formation-latex-ul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formlett</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formlett-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forms16be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forms16be-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formular-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouridx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouridx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouriernc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouriernc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragments-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-francais-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-francais-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frankenstein</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frankenstein-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frege-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frenchmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frenchmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frimurer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frimurer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frimurer-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frontespizio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frontespizio-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-froufrou</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-froufrou-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frpseudocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frpseudocode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftc-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftc-notebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftcap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftnxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftnxtra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullblck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullblck-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullminipage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullwidth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-functan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-functan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-calligra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-sueterlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-sueterlin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fvextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fvextra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fwlw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fwlw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-g-brief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-g-brief-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gaceta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gaceta-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-galois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-galois-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gamebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gamebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gammas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gammas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-libre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-libre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-libre-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garamond-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garrigues</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garrigues-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gastex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatech-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatech-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gates-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatherenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatherenum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gauss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gauss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gb4e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gb4e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gbt7714</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gbt7714-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gchords-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gckanbun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gckanbun-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gender-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gene-logic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gene-logic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogytree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentombow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentombow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germkorr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germkorr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geschichtsfrkl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geschichtsfrkl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getfiledate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getfiledate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getitems-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getoptk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getoptk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gettitlestring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gettitlestring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfnotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfnotation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidotclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidotclassic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidotclassic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenicmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenicmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenicmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghsystem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillcm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gincltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gincltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ginpenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ginpenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-git-latexdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-git-latexdiff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitfile-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitfile-info-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitlog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitver-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-globalvals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-globalvals-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glosmathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glosmathtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss-occitan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-danish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-dutch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-english-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-estonian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-finnish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-french-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-german-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-irish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-italian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-magyar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-nynorsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-nynorsk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-polish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-portuges-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-serbian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-slovene-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-spanish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc-enhance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc-enhance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmiflink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmiflink-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnuplottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnuplottex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gobble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gobble-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gothic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gothic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gotoh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gotoh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grabbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grabbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradientframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradientframe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradstudentresume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradstudentresume-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grafcet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grafcet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grant-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graph35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graph35-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-pln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-pln-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicx-psmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicx-psmin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxpsd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphpaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grayhints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grayhints-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-fontenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-fontenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-inputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-inputenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greekdates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greekdates-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektonoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektonoi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greenpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greenpoint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grffile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grffile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfpaste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfpaste-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid-system-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridpapers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridset-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grundgesetze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grundgesetze-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsemthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsemthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrcrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrcrd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrlib-largetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrlib-largetrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gudea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gudea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gudea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guide-to-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitarchordschemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitarchordschemes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitartabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitartabs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitlogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitlogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustlib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gzt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gzt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-h2020proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-h2020proposal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hackthefootline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hackthefootline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hagenberg-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hagenberg-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-halloweenmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-halloweenmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-happy4th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-har2nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-har2nat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji-extra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-haranoaji-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hardwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hardwrap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harmony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harmony-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harnon-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harnon-cv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harpoon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harpoon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harveyballs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harveyballs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hatching</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hatching-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hausarbeit-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hausarbeit-jura-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-havannah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-havannah-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-he-she</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-he-she-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hecthese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hecthese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helmholtz-ellis-ji-notation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helmholtz-ellis-ji-notation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helmholtz-ellis-ji-notation-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep-paper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepnames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepnames-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepparticles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepparticles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepunits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-here</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-here-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hexgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hexgame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hf-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hf-tikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfoldsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfoldsty-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hhtensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hhtensor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-highlightlatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-highlightlatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hindawi-latex-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hindmadurai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hindmadurai-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hindmadurai-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-histogr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-histogr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-historische-zeitschrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-historische-zeitschrift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hithesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitreport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitreport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitszbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitszbeamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitszthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitszthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hmtrump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hmtrump-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hmtrump-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobete-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobsub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobsub-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hologo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hologo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hook-pre-commit-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hopatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hopatch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-horoscop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-horoscop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hpsdiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hpsdiss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrefhide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrefhide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrlatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrlatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hu-berlin-bundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hu-berlin-bundle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hulipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hulipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hustthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hustthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvarabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvarabic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvqrurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvqrurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hycolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hycolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdestopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdestopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdvips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypernat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypernat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-afrikaans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ancientgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-arabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-armenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-coptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ethiopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-farsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-greek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-hungarian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-macedonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-mongolian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-norwegian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-sanskrit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-spanish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-uppersorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyplain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibarra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibarra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibarra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibycus-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibycus-babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icsv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icsv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-identkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-identkey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxcmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxlayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxlayout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ieeepes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ieeepes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ietfbibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iffont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iffont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmslide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifnextok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifnextok-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifptex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifsym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifthenx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifthenx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxptex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijmart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijqc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijqc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijsra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-image-gallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-image-gallery-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imakeidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imakeidx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impnattypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impnattypo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imsproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imsproc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imtekda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imtekda-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-incgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-incgraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-includernw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-includernw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-indextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-indextools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-infwarerr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-infwarerr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inkpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inkpaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inline-images</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inline-images-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinebib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinedef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinedef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-innerscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-innerscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputenx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputenx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputtrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputtrc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inriafonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inriafonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inriafonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-insbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-insbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-install-latex-guide-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intcalc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interactiveworkbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interactiveworkbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interchar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interchar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interfaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interfaces-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interpreter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intro-scientific</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inversepath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inversepath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice-class</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice-class-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iodhbwm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iodhbwm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ionumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ionumbers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iopart-num</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iopart-num-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-is-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-is-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iscram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iscram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso10303</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso10303-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isomath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isomath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isonums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isonums-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isorot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isorot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isotope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isotope-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-issuulinks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-issuulinks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-istgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-istgame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-itnumpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-itnumpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwhdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwhdp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jablantile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jablantile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jacow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jacow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jamtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jamtimes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf-uptex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jbact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jfmutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jfmutil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jigsaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jigsaw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jkmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jkmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlabels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq-deluxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq-deluxe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmlr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jneurosci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jneurosci-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jnuexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jnuexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-josefin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-josefin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-josefin-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jpsj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jpsj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-js-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-js-misc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jsclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jsclasses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jslectureplanner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jslectureplanner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jumplines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jumplines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jupynotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jupynotex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jura-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juraabbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juraabbrev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurabib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurabib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juramisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juramisc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurarsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurarsp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jvlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jvlisting-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kalendarium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kalendarium-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kanaparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kanaparser-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kantlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kantlipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh-map-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaughmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaughmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kblocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kblocks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kdgdocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kdgdocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerntest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerntest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ketcindy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ketcindy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keycommand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyreader-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keystroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keystroke-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyval2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyval2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyvaltable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyvaltable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kixfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kixfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kluwer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kluwer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knittingpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knittingpattern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knowledge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knowledge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-errata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-moderncvclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-moderncvclassic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-sfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-sfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv-rg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv-rg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-oblivoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-oblivoir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-plain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-otf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksfh_nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksp-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksp-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ktv-texdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ktv-texdata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ku-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ku-template-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurdishlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurdishlipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvdefinekeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvdefinekeys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvoptions-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvsetkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvsetkeys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2picfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3backend-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels4easylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels4easylist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labelschanged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labelschanged-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labyrinth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labyrinth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ladder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ladder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda-lists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda-lists-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci-avm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci-avm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lapdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lapdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpackage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-amsmath-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-amsmath-dev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-base-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-base-dev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-brochure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-course</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc-ptr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-firstaid-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-firstaid-dev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-graphics-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-graphics-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-graphics-dev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-make</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-make-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-refsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tools-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tools-dev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-uni8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-uni8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-veryshortguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-via-exemplos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-web-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4musicians</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbangla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbangla-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-esmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-ptbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcolors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcolors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcourse-rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdemo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdemo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileinfo-pkgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileinfo-pkgs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexgit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latino-sine-flexione</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latino-sine-flexione-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layaureo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layaureo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layouts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lazylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lazylist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lccaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lccaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcyw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcyw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leading-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leadsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leadsheets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leaflet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leaflet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lebhart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lebhart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lecturer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lecturer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lectures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lectures-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lectureslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lectureslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ledmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftidx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leipzig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leipzig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lengthconvert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lengthconvert-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letltxmacro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letltxmacro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letterspacing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letterswitharrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letterswitharrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-levy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-levy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lewis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lewis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexend-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexend-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexikon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexikon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lfb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhelp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinegc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinegc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librarian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librefranklin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librefranklin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librefranklin-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lie-hasse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lie-hasse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-light-latex-make</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-light-latex-make-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limecv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ling-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ling-macros-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguisticspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguisticspro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguisticspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lion-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lion-msc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lisp-on-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lisp-on-tex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listingsutf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listingsutf8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listlbls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listlbls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listliketab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listliketab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lithuanian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-liturg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-liturg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lkproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lkproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-llncsconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-llncsconf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lmake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lmake-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lni-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-locality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-locality-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-localloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-localloc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logical-markup-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logical-markup-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicpuzzle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicpuzzle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logpap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logpap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logreq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longdivision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longdivision-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longnamefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longnamefilelist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-loops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-loops-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpform-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lplfitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lplfitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lroundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lroundrect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lsc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-korean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-mongol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-persian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-ukr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstaddons-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstbayes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstbayes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstfiracode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstfiracode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lt3graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lt3graph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltablex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltb2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltb2bib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxcmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxdockit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxdockit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxguidex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxguidex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxkeys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxnew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxnew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-check-hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-check-hyphen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-physical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-physical-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-typo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-typo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-uca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-uca-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-ul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-ul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-uni-algos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-uni-algos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-visual-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-visual-debug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabibentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabibentry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabidi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahyphenrules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahyphenrules-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaimageembed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaimageembed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luainputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luainputenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaintro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luajittex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luakeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luakeys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-truncate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-truncate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamesh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamesh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamplib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luapackageloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luapackageloader-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaprogtable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaprogtable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luarandom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luarandom-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luasseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luasseq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexja-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatextra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatodonotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luavlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luavlna-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ly1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ly1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lyluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lyluatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macros2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macros2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macroswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macroswap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mafr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mafr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magaz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magaz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magicnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magicnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailmerge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebarcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebarcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecirc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecookbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeglos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maker-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makerobust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makerobust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeshape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeshape-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mandi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mandi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manuscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manuscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manyind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manyind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marathi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marathi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marcellus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marcellus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marcellus-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-margbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-margbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-markdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-markdown-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matapli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matapli-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3mem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-math-into-latex-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathalpha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathalpha-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathastext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathastext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcommand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcomp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdots-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfam256</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfam256-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfixs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfixs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathlig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpartir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpartir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpunctspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpunctspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maths-symbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matlab-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matlab-prettifier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matrix-skeleton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matrix-skeleton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mattens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mattens-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maybemath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maybemath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcaption-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mceinleger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mceinleger-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcf2graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcf2graph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mciteplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mciteplus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcmthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcmthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdframed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdframed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdputu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdputu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media4svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media4svg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media9-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-medstarbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-medstarbeamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-meetingmins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-meetingmins-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-membranecomputing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-membranecomputing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memexsupp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memexsupp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memory-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memorygraphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memorygraphs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mendex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mendex-doc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mensa-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mensa-tex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mentis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mentis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menucard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menucard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menukeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menukeys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mercatormap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mercatormap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-beginners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metago-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metanorma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metanorma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaobj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-colorbrewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-colorbrewer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metastr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metastr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metauml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metauml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-method</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-method-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metrix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfirstuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfirstuc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic4ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic4ode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mftinc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mftinc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mgltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mgltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhchem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhequ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhequ-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mi-solns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mi-solns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midnight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midnight-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miller-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milsymb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milsymb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mindflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mindflow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minibox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minibox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minidocument-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minifp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minimalist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minimalist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minipage-marginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minipage-marginpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miniplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miniplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minorrevision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minorrevision-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minutes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minutes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mismath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mismath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpattern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mla-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mla-paper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlacls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlacls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mleftright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mleftright-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlmodern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlmodern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlmodern-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mluexercise</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mluexercise-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modeles-factures-belges-assocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modeles-factures-belges-assocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderncv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderncv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modernposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modernposter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderntimeline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderntimeline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modiagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modroman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modroman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modular-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modulus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modulus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mongolian-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mongolian-babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-monofill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-monofill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moodle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreenum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morefloats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morehype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morehype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moresize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moresize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreverb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morewrites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morewrites-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morisawa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morisawa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-movie15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-movie15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mp3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mp3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpattern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpcolornames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpcolornames-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpgraphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpman-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpostinl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpostinl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mslapa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mslapa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msu-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mtgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mtgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mucproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mucproc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mugsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mugsthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multenum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiaudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiaudience-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicolrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicolrule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multidef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multienv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multienv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiexpand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multilang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multilang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiobjective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiobjective-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-munich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-munich-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musical-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musicography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musicography-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musikui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musikui-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixguit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixguit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musuos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mversion-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwcls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mweights</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mweights-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mycv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mycv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatexformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatexformat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mynsfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mynsfc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-na-box</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-na-box-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-na-position</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-na-position-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nameauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nameauth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namedef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namedef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namespc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namespc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanicolle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanicolle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natded-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nature-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navigator-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navydocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navydocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncclatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncclatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nddiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nddiss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ndsu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ndsu-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nestquot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-neuralnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-neuralnetwork-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nevelok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nevelok-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcomputermodern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcomputermodern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcomputermodern-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newenviron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newenviron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newlfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newlfm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newsletr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newsletr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newspaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newspaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newvbtm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newvbtm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newverbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newverbs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nextpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nfssext-cfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nfssext-cfr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicefilelist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicematrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicematrix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicetext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nidanfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nidanfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nih</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nih-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nihbiosketch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nihbiosketch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimsticks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimsticks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-njurepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-njurepo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nkarta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nkarta-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nl-interval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nl-interval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nlctdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nlctdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nmbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nmbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nnext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nnext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noconflict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noconflict-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nodetree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nodetree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noindentafter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noindentafter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noitcrul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noitcrul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nolbreaks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nolbreaks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomencl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomencl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomentbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomentbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonumonpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonumonpart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nopageno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nopageno-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-normalcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-normalcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nostarch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nostarch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes2bib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notespages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notespages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notestex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notestex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notex-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-emoji-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-emoji-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notomath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notomath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notomath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nowidow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nowidow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-npp-for-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nrc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nuc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nucleardata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nucleardata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberedblock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberedblock-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberpt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numerica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numerica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numericplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numericplots-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numname-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numnameru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numnameru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numspell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nunito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nunito-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nunito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nwejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nwejm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-objectz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-objectz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obnov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obnov-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocg-p</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocg-p-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octave-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octavo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octavo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-odsfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-odsfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ofs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ogham</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ogham-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldlatin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldlatin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstyle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-olsak-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-olsak-misc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onedown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onedown-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onlyamsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onlyamsmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onrannual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onrannual-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opcit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opcit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oplotsymbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oplotsymbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opteng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opteng-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optidef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optional-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-options</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-options-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orcidlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orcidlink-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ordinalpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ordinalpt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orientation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orientation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orkhun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orkhun-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oscola</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oscola-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oswald</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oswald-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oswald-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ot-tableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ot-tableau-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othello</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othello-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othelloboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othelloboard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-otibet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-otibet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oubraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oubraces-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oup-authoring-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oup-authoring-template-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outerhbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outliner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outliner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlining</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlining-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlays</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlays-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pacioli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pacioli-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagenote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagenote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagerange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagerange-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagesel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagesel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pageslts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pageslts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papercdcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papercdcase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papermas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papermas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papertex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papertex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paracol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paracol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parades</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parades-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paresse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paresse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parnotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parrun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parrun-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parsa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parselines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parselines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cours</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cours-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-crosswords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-crosswords-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-tableur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-tableur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patchcmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patchcmd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen2-tutorial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-path-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pauldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pauldoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pawpict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pawpict-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pb-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pb-diagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbalance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbalance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbibtex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbibtex-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbsheet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf-trans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf-trans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf14-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfarticle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcolmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcolmk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcomment-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcprot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcprot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfescape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfescape-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflscape-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmanagement-testphase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmanagement-testphase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmarginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmarginpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfoverlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfoverlay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpagediff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpagediff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpc-movie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpc-movie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfprivacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfprivacy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfreview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfreview-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfscreen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfscreen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfslide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfsync-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-quiet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-quiet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftexcmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftosrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfwin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pecha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pecha-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-penrose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-penrose-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perception</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perception-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perfectcut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perfectcut-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-permute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-permute-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-persian-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-persian-bib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petiteannonce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petiteannonce-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-blur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-cmykshadings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-cmykshadings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-pie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-pie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-soroban-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-spectra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlcd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlsd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfgantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfgantt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfkeyx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfkeyx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmolbio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmolbio-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmorepages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmorepages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfopts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament-han</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament-han-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfplots-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phffullpagefigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phffullpagefigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfparen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfparen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfqit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfqit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfquotetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfquotetext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfsvnwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfsvnwatermark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfthm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfthm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philosophersimprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philosophersimprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonenumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonenumbers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonetic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonrule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-photo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-photo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physconst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physconst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physunits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picinpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picinpar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pict2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pict2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictexsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piechartmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piechartmp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinlabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinlabel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinoutikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinoutikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pitex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pitex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pittetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pittetd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pixelart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pixelart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkgloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkgloader-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkuthss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkuthss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plainpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plainpkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plainyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantslabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantslabels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantuml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantuml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plari-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plates-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plautopatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plautopatch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-play</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-play-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plex-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plex-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plimsoll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plimsoll-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plimsoll-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plstmary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plstmary-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plweb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pm-isomath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pm-isomath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmboxdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmboxdraw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmgraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmhanguljamo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmhanguljamo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pnas2009</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poemscol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poemscol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetrytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetrytex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poiretone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poiretone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poiretone-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polexpr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polski-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynom-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynomial-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polytable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polytable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poormanlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poormanlog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postcards-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poster-mac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poster-mac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-fuberlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-fuberlin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-tuliplab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-tuliplab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppr-prv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppr-prv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pracjourn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pracjourn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-practicalreports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-practicalreports-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prelim2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prelim2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prerex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prerex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-present</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-present-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pressrelease</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pressrelease-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prettyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prettyref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preview-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prftree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prftree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-principia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-principia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-printlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-printlen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-probsoln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-probsoln-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-procIAGssymp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-procIAGssymp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-productbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-productbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-profcollege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-profcollege-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-program</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-program-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progress-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progressbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progressbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proof-at-the-end</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proof-at-the-end-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proofread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proofread-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prooftrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prooftrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-properties</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-properties-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proposal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prosper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protocol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protocol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prtec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prtec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-przechlewski-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-przechlewski-book-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2eps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psbao</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psbao-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudocode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfragx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfragx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psgo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psizzl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psizzl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-2dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-2dplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3dplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-abspos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-abspos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-am-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-antiprism</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-antiprism-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-asr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-asr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-barcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-barcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bezier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bspline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bspline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calculate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calculate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calendar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-circ-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-contourplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-contourplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dbicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dbicons-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-diffraction</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-diffraction-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-electricfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-electricfield-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl-translation-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-exa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-exa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-feyn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-feyn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fr3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fractal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fractal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fun-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-func</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-func-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gantt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geometrictools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geometrictools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ghsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ghsb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gr3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-graphicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-graphicx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-infixplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-infixplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-intersect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-intersect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-jtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-jtree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-knot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-knot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-labo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-labo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-layout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lens-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-light3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-light3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lsystem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-magneticfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-magneticfield-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-marble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-marble-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-mirror-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-moire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-moire-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ob3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ob3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optexp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-osci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-osci-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ovl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ovl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdgr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-perspective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-perspective-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-platon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-platon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poker-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poly-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pulley</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pulley-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-qtree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rputover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rputover-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rubans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rubans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-shell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-sigsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-sigsys-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solarsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solarsystem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solides3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solides3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-soroban-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spectra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spinner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-stru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-stru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-thick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-thick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-turtle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-turtle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tvz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tvz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-uml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vectorian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vectorian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vehicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vehicle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-venn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-venn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vowel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vowel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks_calcnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptolemaicastronomy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptolemaicastronomy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptptex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-puyotikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-puyotikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pwebmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pwebmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxchfon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxchfon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxcjkcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxcjkcat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxgreeks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjahyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjahyper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjodel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjodel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpgfmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpgfmark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxrubrica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxrubrica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtatescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtatescale-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtxalfa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtxalfa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxufont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxufont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythonhighlight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythonhighlight-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcircuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcircuit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qobitree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qobitree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qpxqtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qpxqtx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrbill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrbill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsharp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qtree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qualitype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qualitype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qualitype-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quantikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quantikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quantumarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quantumarticle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quicktype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quicktype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quiz2socrative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quiz2socrative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotchap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quoting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quoting-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotmark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-bn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-ur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran-ur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qyxf-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qyxf-book-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-r_und_s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-r_und_s-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ragged2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ragged2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ran_toks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ran_toks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randbild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randbild-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-random</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-random-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomwalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomwalk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randtext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rank-2-roots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rank-2-roots-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rccol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rccol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-multi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcsinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcsinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readablecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readablecv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readarray-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realboxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realboxes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realhats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realhats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realtranspose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realtranspose-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rec-thy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rec-thy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipecard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipecard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rectopma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rectopma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcheck-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refenums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refenums-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reflectgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reflectgraphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refstyle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regexpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regexpatch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-register</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-register-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regstats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regstats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reledmac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relsize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reotex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repeatindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repeatindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repere-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repltext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rerunfilecheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rerunfilecheck-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resphilosophica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resphilosophica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rest-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rest-api-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumecls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumecls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumemac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumemac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-returntogrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-returntogrid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reverxii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revquantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revquantum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4-1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rgltxdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rgltxdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ribbonproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ribbonproofs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rjlparshap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rjlparshap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rlepsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rlepsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmathbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmathbr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustcommand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rojud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rojud-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rojud-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbarpagenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbarpagenumber-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanneg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanneg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romannum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romannum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundrect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rrgtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rrgtrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfso-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rterface-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtkinenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtkinenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtklage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtklage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ruhyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulerbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulerbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulercompass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulercompass-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-runcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-runcode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-russ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-russ-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rutitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rutitlepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rviewport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rviewport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rvwrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rvwrite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryersonsgsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryersonsgsthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryethesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryethesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sa-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sa-tikz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sageep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sageep-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanitize-umlaut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanitize-umlaut-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sankey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sankey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sapthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sapthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sasnrdisplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sasnrdisplay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauterfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauterfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savefnmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savefnmark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savesym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savetrees-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scale-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalebar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalerel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalerel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schedule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schedule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemabloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemabloc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scholax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scholax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scholax-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schooldocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schooldocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schule-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulmathematik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulmathematik-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulschriften</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulschriften-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schwalbe-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schwalbe-chess-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scientific-thesis-cover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scientific-thesis-cover-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sciposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sciposter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sclang-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sclang-prettifier-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scontents-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratchx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratchx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrjrnl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrjrnl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlayer-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlayer-fancyhdr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlttr2copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlttr2copy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scsnowman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scsnowman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdrt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sduthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secdot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbreak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seealso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seealso-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selectp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selectp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selinput-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selnolig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selnolig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic-markup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic-markup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semesterplanner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semesterplanner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semioneside</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semioneside-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semproc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepfootnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepfootnotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seqsplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seqsplit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-apostrophe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-apostrophe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-date-lat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-date-lat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-def-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-def-cyr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-lig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-lig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesamanuel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesamanuel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesstime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesstime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setdeck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setdeck-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sexam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sf298</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sf298-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sffms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sffms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sgame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shade-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadethm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadethm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadowtext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapepar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapepar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shipunov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shipunov-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shobhika</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shobhika-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shobhika-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-short-math-guide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shortmathj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shortmathj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shorttoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shorttoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-show2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-show2e-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showcharinbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showcharinbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showdim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showdim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showhyphens-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showlabels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showtags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showtags-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shtthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shtthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shuffle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shuffle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidecap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidecap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidenotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidenotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-signchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-signchart-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-silence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-silence-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-resume-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-resume-cv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-thesis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-thesis-dissertation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplebnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplebnf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpleinvoice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpleinvoice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplekv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplekv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpleoptics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpleoptics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpler-wick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpler-wick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplewick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplewick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplified-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplivre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplivre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simurgh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simurgh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-siunitx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-siunitx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeldoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeycommand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeyval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skills</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skills-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skrapport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skrapport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skull</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slantsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slantsc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slideshow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smalltableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smalltableof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartdiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartdiagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartunits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snapshot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snotez-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sort-by-letters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sort-by-letters-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soulpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soulpos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soulutf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soulutf8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spacingtricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spacingtricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spalign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spark-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spark-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sparklines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sparklines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spath3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spath3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spectral</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spectral-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spectral-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spectralsequences</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spectralsequences-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spelling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spelling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sphdthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sphdthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splines-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spotcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spreadtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spreadtab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spverbatim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spverbatim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sr-vorl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sr-vorl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srbook-mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srbook-mem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srdp-mathematik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srdp-mathematik-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sseq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sslides-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-standalone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-standalone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stanli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stanli-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-startex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-startex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-startlatex2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistik-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdclsdv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdclsdv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stealcaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stealcaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-steinmetz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-steinmetz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stellenbosch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stellenbosch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-step</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-step-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-step-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stepgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stepgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stepgreek-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stickstoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stickstoo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stickstoo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-otf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix2-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storebox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storecmd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stricttex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stricttex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringstrings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringstrings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-structmech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-struktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-struktex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sttools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stubs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stubs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-studenthandouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-studenthandouts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suanpan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suanpan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdepth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdepth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqnarray-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigmat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigmat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfiles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substances-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substitutefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substitutefont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subsupscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subsupscripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subtext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudoku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudoku-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudokubundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudokubundle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suftesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suftesi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sugconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sugconf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-supertabular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-supertabular-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suppose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suppose-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-susy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-susy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg-inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svgcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svgcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svninfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svninfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swebib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swimgraf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swimgraf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syllogism</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syllogism-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synproof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntaxdi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntaxdi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntrace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synttree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synttree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-systeme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-systeme-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t-angles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t-angles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabfigures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabfigures-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-table-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-table-fct-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableaux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableaux-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablefootnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablefootnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableof-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablestyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablestyles-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablists-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablvar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablvar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabriz-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabriz-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabstackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabstackengine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-ltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularborder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularcalc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularew-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagging-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpair-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-talk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-talk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamefloats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamethebeast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tasks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tasks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcldoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcolorbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcolorbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdclock-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdsfrmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdsfrmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technion-thesis-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technion-thesis-template-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-fenn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-sommer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templatetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templatetools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tengwarscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tengwarscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termlist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termmenu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termmenu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testhyphens-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testidx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetragonos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetragonos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-teubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-teubner-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ewd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ewd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-font-errors-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-label</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-label-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-locale-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-nutshell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-overview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-refs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-virtual-academy-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texapi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texbytopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoctk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoctk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdraw-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikechaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikecover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-cz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlogos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texmate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texmate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texments-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texnegar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texnegar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texplate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texplate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texpower</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texpower-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texproposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texshade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texshade-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textfit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textfit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textglos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textmerg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textmerg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textopo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textopo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textualicomma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textualicomma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texvc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaienum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaienum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaispec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaispec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thalie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thalie-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanodidot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanodidot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanodidot-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanomodern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanomodern-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanomodern-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanooldstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanooldstyle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theanooldstyle-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theatre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theoremref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theoremref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-ekf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-ekf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-gwu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-gwu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-qom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-qom-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-titlepage-fhac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-titlepage-fhac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thinsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thinsp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threadcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threadcol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeddice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeddice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttablex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuaslogos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuaslogos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thucoursework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thucoursework-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticket-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticollege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticollege-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-3dplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-among-us</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-among-us-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bayesnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bayesnet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-cd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dependency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dependency-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dimline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dimline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynhand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynhand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-imagelabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-imagelabels-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-inet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-inet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-kalender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-kalender-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-karnaugh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-karnaugh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-ladder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-ladder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-lake-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-lake-fig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-layers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-layers-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-nef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-nef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-network-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-opm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-opm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-optics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-optics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-page</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-page-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-palattice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-palattice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-planets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-planets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-qtree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-relay-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-sfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-sfc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-timing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-trackschematic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-trackschematic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-truchet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-truchet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzcodeblocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzcodeblocks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzducks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzducks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzinclude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzinclude-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzlings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzlings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmarmots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmarmots-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzorbital</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzorbital-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpackets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpackets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpagenodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpagenodes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpeople</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpeople-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpfeile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpfeile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzposter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzscale-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzsymbols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikztosvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikztosvg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tile-graphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tile-graphic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timbreicmc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timbreicmc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timing-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timing-diagrams-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipfr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlecaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlecaps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlefoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titleref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-berge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-berge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-euclide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-euclide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-fct-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-graph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-orm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-orm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-tab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-tab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlc-article</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlc-article-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlmgrbasics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocbibind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocbibind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocdata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocvsec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocvsec2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todonotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokcycle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokcycle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokenizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toolbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topiclongtable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topiclongtable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toptesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toptesi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totalcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totalcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpslifonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpslifonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tqft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tqft-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tracklang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tracklang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-array-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-arsclassica-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-biblatex-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-chemsym-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-dcolumn-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-ecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-enumitem-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-europecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-filecontents-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-moreverb-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-natbib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-tabbing-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translations-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translator-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-transparent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-transparent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tree-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tree-dvips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-treetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-treetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trfsigns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trfsigns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trigonometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trigonometry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trivfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trivfloat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trsym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-truncate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-truncate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tsemlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tucv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tucv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tuda-ci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tuda-ci-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tudscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tudscr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tufte-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tufte-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat-plain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tui-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian-formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian-formatting-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turkmen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnstile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnstile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnthepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnthepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twemoji-colr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twemoji-colr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twemoji-colr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoinone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoinone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txgreeks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typed-checklist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typed-checklist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeface-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typewriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typewriter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typoaid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typoaid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typogrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typogrid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tzplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tzplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uaclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uaclasses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uafthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uafthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uantwerpendocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uantwerpendocs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uassign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uassign-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucalgmthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucalgmthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucbthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucbthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucdavisthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucdavisthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucsmonograph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucsmonograph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-udesoftec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-udesoftec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uebungsblatt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uebungsblatt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uestcthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uestcthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhhassignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhhassignment-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhrzeit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhrzeit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucredborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucredborder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ukrhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ukrhyph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulthese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulthese-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umbclegislation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umbclegislation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umich-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umich-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umlaute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umlaute-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umoline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umoline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unam-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unam-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamth-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undergradmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underlin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underoverlap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underoverlap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undolabl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undolabl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-ger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-ger-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-lin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-lin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-alphabets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-alphabets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-bidi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unifith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unifith-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uninormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uninormalize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uniquecounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uniquecounter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitconv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitipa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitn-bimrep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitn-bimrep-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-units-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitsdef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-univie-ling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-univie-ling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unizgklasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unizgklasa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unravel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unravel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unswcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unswcover-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uothesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uothesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesistitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesistitlepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upca-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upmethodology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upmethodology-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uppunctlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uppunctlm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upzhkinsoku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upzhkinsoku-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urcls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urwchancal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urwchancal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-usebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-usebib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ushort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ushort-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspatent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspatent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ut-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ut-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utexasthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utexasthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8add-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8mex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utfsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utfsym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwmslide-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vancouver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vancouver-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variablelm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variablelm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variations-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varisize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varisize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varsfromjobname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varsfromjobname-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vaucanson-g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vaucanson-g-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vcell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vcell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vdmlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vdmlisting-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venndiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venndiagram-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbasef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbasef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimcopy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbdef-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbments-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verifica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verifica-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verifiche</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verifiche-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-version-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versions-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versonotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vertbars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vertbars-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vgrid-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vhistory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vhistory-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualpstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualtikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vmargin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vocaltract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vocaltract-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-volumes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-volumes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-voss-mathcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vruler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vtable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vtable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vwcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vwcol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallcalendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallcalendar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallpaper-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warning-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warpcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warpcol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webquiz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webquiz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widetable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widows-and-orphans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widows-and-orphans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-williams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-williams-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-willowtreebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-willowtreebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-windycity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-windycity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-withargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-withargs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-witharrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-witharrows-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordlike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordlike-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-worksheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-worksheet-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsemclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsemclassic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsuipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsuipa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wtref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wtref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xargs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xassoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xassoccnt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xbmks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xbmks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcjk2uni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcjk2uni-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcntperchap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-material</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-material-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-solarized</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-solarized-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcomment-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcookybooky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcookybooky-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcpdftips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcpdftips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xduthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xebaposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xebaposter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xechangebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xechangebar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyrmongolian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyrmongolian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xelatex-dev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xellipsis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian-hm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian-hm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xespotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xespotcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-devanagari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-devanagari-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xevlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xevlna-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfakebold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfakebold-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xgreek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xhfill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xhfill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xii-lat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkcdcolors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkcdcolors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xlop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xlop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltabular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltabular-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xml2pmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmpincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmpincl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmuthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xnewcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xnewcommand-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xoptarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xoptarg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpatch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpdfopen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpeek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpeek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpiano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpiano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpicture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpinyin-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xprintlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xprintlen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpunctuate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpunctuate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xq-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsavebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsavebox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xskak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xskak-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtuthesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xwatermark-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xyling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xyling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xymtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xymtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xytree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yafoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yafoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yagusylo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yagusylo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yaletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yaletter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yannisgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yannisgr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yathesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yax-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yazd-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yazd-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ycbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ycbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ydoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-york-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-york-thesis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-youngtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-youngtab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yquant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yquant-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ytableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ytableau-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zbmath-review-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zbmath-review-template-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zebra-goodies</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zebra-goodies-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zed-csp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zed-csp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhlineskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhlineskip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhlipsum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics-uptex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhnumber-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhspacing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhspacing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ziffer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ziffer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zlmtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zlmtt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zootaxa-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zootaxa-bst-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwgetfdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwgetfdate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwpagelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwpagelayout-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafbfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafbfont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafont-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjatype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zztex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zztex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthrift-0_14_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthrift-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthrift_c_glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthriftnb-0_14_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthriftz-0_14_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-thrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-thrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-thrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-thrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyobjloader2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyobjloader-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-cmd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-cmd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-mssim0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-mssim0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-pcap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-swtpm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-swtpm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>translate-toolkit-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>translate-toolkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agrep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtre5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tre-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libucl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_bcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_vdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_zram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-ufraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ufraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ufraw-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulfius2_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ulfius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>umoci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodbc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodbc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunshield0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unshield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unshield-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uranium-firmware-lulzbot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbredirhost1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbredirparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbredir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbredir-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-emperor_pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-emperor_zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-greenlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-jvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-logzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-psgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-pypy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-xslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vagrant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vagrant-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vagrant-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vagrant-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vagrant-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>veyon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-test-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-vdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weblate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weblate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-spell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libWildMidi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wildmidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wildmidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wp-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxapian-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxapian30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxapian30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xapian-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xapian-core-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xapian-core-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alevtd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tv-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xawtv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdm-xsession</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-xendomains-wait-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-css</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-rasterizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-squiggle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-svgpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-ttf2svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-lite10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyara-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyara8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-buildtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-samba-provision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubico-piv-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubikey-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-java-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-phpfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-electron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero-plugin-for-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Scrapy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autobuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopendkim11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepute1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libut1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvbr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miltertest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opendkim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opendkim-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-suds-community</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-suds-community</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-suds-community</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-cbor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-smile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-binary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-binary-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.7-rubygem-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.0-rubygem-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdkafka-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdkafka1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfbgraph-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfbgraph-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfbgraph-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GFBGraph-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-nbdime-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-nbdime-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-nbdime-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>barrier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzapojit-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzapojit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Zpj-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero-plugin-for-microsoft-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janus-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janus-gateway-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-custom-parser-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-scripting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.22-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chainsaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logfactor5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-access</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libZXing1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libZXing1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zxing-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcm43xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-security-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cblas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cblas-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cblas-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcblas3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>greetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-unixd-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_1-30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sccache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuigreet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-json4s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librav1e0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librav1e0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rav1e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rav1e-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spotifyd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-watchman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>watchman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zram-generator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs17-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-container-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-handler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-launcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-kubevirt_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-warewulf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-distributed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-distributed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-agent-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-agent-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-gobject-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-cpanminus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tpm_cert_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_1-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsphinxclient-0_0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsphinxclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sphinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>element-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>element-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-RandomAccess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Image-ExifTool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-fluentd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kate-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kate-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-catalog-libgda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-6_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-6_0_0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-postgres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-sqlcipher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-6_0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-report</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-report-6_0-6_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-ui-6_0-6_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-ui-6_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-ui-6_0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-xslt-6_0-6_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gda-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdaui-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openscad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actioncable-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actionmailbox-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actionmailer-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actionpack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actiontext-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actionview-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activejob-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activemodel-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activerecord-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activestorage-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activesupport-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-puma-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-rails-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-railties-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qtox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mujs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mujs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-cycles-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shapelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbguard1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cfengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cfengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpromises-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpromises3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seatd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seatd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcron-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Concurrent6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Core6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6DBus6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Gui6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Network6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGL6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGLWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PrintSupport6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Sql6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Test6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Widgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Xml6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-docs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-openglwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_17-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-actionpack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fscrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-fscrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activestorage-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcdutl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>juliaup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>macchina</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tealdeer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>treefetch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscreen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firecracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pleaser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-binaryblobs-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-group-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-handler-glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-handler-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-handler-zbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abcm2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto47</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto47-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl50</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl50-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parsec-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newsboat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newsboat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubeseal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Pdf6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PdfQuick6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PdfWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineCore6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineQuick6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfquick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfquick-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfwidgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginecore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginecore-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginequick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginequick-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginewidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginewidgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-bosco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-classads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-classads-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-credmon-oauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-credmon-vault</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-kbdd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-procd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htcondor-vm-gahp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicondor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-condor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>itextpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>itextpdf-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl_433</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl_433-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spyder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spyder-dicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spyder-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spyder-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plantuml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plantuml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-18-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nekohtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nekohtml-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nekohtml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby3_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby_core3_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-sinatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-client0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-21_09-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pijul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-electron-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gerbv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gerbv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgerbv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>racket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>racket-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>racket-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-bdbhpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librecad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librecad-parts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libautotrace3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodsecurity3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodsecurity3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modsecurity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modsecurity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>starboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caddy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchafa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-win-reg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-appliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-typelib-Guestfs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librttopo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librttopo1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-c1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_ttf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_ttf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-M2Crypto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cereal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyenv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyenv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyenv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-tpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>loki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>promtail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-OSTree-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activerecord-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-control-center</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-control-center-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-control-center-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-tzinfo-1.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-node_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>EternalTerminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-static-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetestserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phoronix-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postorius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postorius-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postorius-web-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsasl-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsasl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cherrytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cherrytree-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-5-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec59-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice59-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat59-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-color-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colorhug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler124</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler124-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enlightenment-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-autoload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jettison</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jettison-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-rack-2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-text-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-compose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexslt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-102-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs102</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs102-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libheif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlbeans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlbeans-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenImageIO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenImageIO-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenImageIO2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenImageIO_Util2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-OpenImageIO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-electron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs19-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs19-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel5_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel5_3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-resize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-sshd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-sshd-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-19-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-19-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-eln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capnproto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcapnp-0_10_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcapnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproc2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvcompat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasn1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhcrypto4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdb9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimbase1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimedit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimntlm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhx509-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5clnt7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5srv8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkafs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkrb5-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libroken18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwind0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-puma-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp6_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.65</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.65</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrel-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traefik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wasm-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtree-sitter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tree-sitter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tree-sitter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbxml2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wbxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-plugin-appdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-appdata-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-efs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ciscoconfparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ciscoconfparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ciscoconfparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-globalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binwalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k9s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pluto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pluto-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pluto-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pluto-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-ha_cluster_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cilium-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssntlmssp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssntlmssp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby3_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby_core3_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_2-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdavix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitwarden</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsdist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-fcitx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-m17n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-scim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-sdl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-uim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlterm-wnn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>peazip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>peazip-kf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-go_modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-osconfig-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot3-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot3-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot3-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>godot3-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adplugdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadplug2_3_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-actionpack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-activerecord-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-activesupport-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-activesupport-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-markdown-it-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-markdown-it-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-markdown-it-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-markdown-it-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hotspot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-rack-2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.1-rubygem-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liba2ps1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopusfile0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opusfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-remote-flathub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmark0_30_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-d-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dino-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-6-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec60-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice60-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat60-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stellarium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-oci-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-oci-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-oci-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-oci-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>melange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>melange-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>melange-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>melange-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yang-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clone-master-clean-up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz-ng2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-3_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-23_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tealdeer-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tealdeer-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tealdeer-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-ima-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jameica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jameica-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jameica-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-postgres_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-activestorage-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nemo-extension-warpinator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warpinator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warpinator-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>restic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>restic-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>restic-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-blackbox_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>editorconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeditorconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeditorconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-SQLAlchemy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-SQLAlchemy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-SQLAlchemy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-velociraptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velociraptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velociraptor-kafka-humio-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rekor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Svg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6SvgWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcmtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcmtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcmtk17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-ja-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-ko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibcop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-ms-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citation-style-language-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-digestif-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luafindfont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optexcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagelayout-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texaccents-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlogfilter-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlogsieve-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upmendex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpsx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpsx2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ungoogled-chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ungoogled-chromium-chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>watchexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-agama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-exampleicons-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-config-rootlogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>renderdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>renderdoc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubescape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-jmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsharpyuv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsharpyuv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-containerinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gifsicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pipreqs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pipreqs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pipreqs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty-shell-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty-terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghc-pandoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghc-pandoc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghc-pandoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghc-pandoc-prof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttranscoder-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-CudaGst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCuda-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlay-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tenant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keybase-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hoard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-lusitaniae-apache_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensuse-welcome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensuse-welcome-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>commons-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>commons-compiler-jdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janino-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-cmarkgfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cmarkgfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cmarkgfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>indent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>indent-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-xml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-csv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-properties</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-toml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-text-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-fluentd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-globalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-puma-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-tzinfo-1.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>owasp-modsecurity-crs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>owasp-modsecurity-crs-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-115-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs115</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs115-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmca_common_dstore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-mca-params</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-plugin-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-PIE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit0-devel-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit0-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc12-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-PIE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-m2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-m2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit0-devel-gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2cor18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2cor18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2iso18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2iso18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2log18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2log18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2min18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2min18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2pim18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2pim18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonobuoy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonobuoy-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonobuoy-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonobuoy-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gevent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-limited</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-secure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-websafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlt-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlt-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdlt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mpmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mpmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mpmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools-scriptlets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_aruco408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_face408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_gapi408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_highgui408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_imgcodecs408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_objdetect408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_optflow408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_superres408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_videoio408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_videostab408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv_ximgproc408</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libassimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kustomize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kustomize-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kustomize-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kustomize-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erofs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeverest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeverest-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto15-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls20-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-6-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp256m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp256m-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuxguitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugin-ext-sensors-rrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>picard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>picard-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwloc15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-unearth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-unearth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-unearth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tbot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-boot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-homed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grpc-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc++1_59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc1_59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupb36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-asyncssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-asyncssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-asyncssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtommath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtommath-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtommath1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtommath1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyarrow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyarrow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyarrow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.2-rubygem-rails-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-el-5_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsp-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-servlet-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-pr-helper-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbig2dec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbig2dec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2dec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-riscv64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-azure-storage-queue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-azure-storage-queue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-azure-storage-queue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mistune2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mistune2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mistune2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-geopandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-geopandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-geopandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcasgen-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uima-pear-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uimaj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uimaj-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avif-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libavif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-compression</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-computation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-excel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-feather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-fss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-output_formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-parquet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-performance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-spss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-sql-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pandas-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-compression</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-computation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-excel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-feather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-fss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-output_formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-parquet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-performance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-spss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-sql-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pandas-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-compression</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-computation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-excel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-feather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-fss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-output_formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-parquet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-performance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-spss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-sql-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pandas-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotcut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotcut-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-documentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-policy-sudo-auth-self</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-policy-wheel-auth-self</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-group-sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pydrive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pydrive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pydrive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-MechanicalSoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-MechanicalSoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-MechanicalSoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-aom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-rav1e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-svtenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Nautilus-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-app-launcher-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-applications-menu-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-brightness-controller-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-clockworks-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-countdown-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-dropby-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-extras-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-extras-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-fuzzyclock-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-hotcorners-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-kangaroo-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-keyboard-autoswitch-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-network-manager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-previews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-quickchar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-quicknote-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-recentlyused-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-rotation-lock-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-showtime-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-takeabreak-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-visualspace-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-wallstreet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-weathershow-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-window-shuffler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-workspace-stopwatch-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>budgie-workspace-wallpaper-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bandit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyxml0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-zbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zbar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppcheck-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp8_9_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-reader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-reader-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdeepin-pdfium1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cJSON-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjson1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-compressor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-compressor-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblog4cxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblog4cxx15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Spreadsheet-ParseExcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Flask-Security-Too</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask-Security-Too</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Flask-Security-Too</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzipios2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zipios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zipios-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>micropython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pycryptodome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycryptodome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pycryptodome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pycryptodomex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycryptodomex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pycryptodomex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miner-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuev3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Spreadsheet-ParseXLSX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libBasicUsageEnvironment2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-imagecodecs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-imagecodecs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-imagecodecs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-alertmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-lsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jupyter-lsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyter-lsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-jupyter-lsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd-gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atril-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-extension-atril</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatrildocument3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatrilview3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AtrilDocument-1_5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AtrilView-1_5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc++1_60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc1_60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupb37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlocate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mlocate-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_3-3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sevctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxreaderdocument3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxreaderview3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-XreaderDocument-1_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-XreaderView-1_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-comicsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-epubdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-pixbufdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xreader-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-onionshare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-uamqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uamqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-uamqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtiofsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnsl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-starttls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsasl18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-pgadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-oletools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-fastapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-fastapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-fastapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-fastapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs21-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs21-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdav1d7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdav1d7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-longterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhtp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-puma-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-rack-2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgladeui-2-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgladeui-2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gladeui-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-engrampa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>engrampa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>engrampa-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-java-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-java-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgraph6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvc6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblab_gamut1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpathplan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxdot4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Bottles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Bottles-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-connector-factory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-pageant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-sshagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-jna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-nc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-aiosmtpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-aiosmtpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-aiosmtpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-aiosmtpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-rapidjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-rapidjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-rapidjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-rapidjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-xsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ini4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ini4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-openpgp-librnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-astropy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-astropy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-astropy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-astropy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonnx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonnx_proto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>onnx-backend-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>onnx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-onnx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-onnx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-onnx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton-core10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton-cpp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton-proactor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpid-proton11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-server-proxy3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdtk0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdtk0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.29-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sngrep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pikepdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-v2fly-v2ray-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v2ray-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CryptX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-22-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample4_ff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample4_ff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gunicorn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstanalytics-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstanalytics-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstdxva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstdxva-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmse-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAnalytics-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstDxva-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcmtk18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>topgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blosc2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblosc2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblosc2-3-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubetui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tlrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-distributed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-distributed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-distributed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluajit2-5_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-jose-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-jose-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-jose-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-i2c-helper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-spi-helper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-spi-helper0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-spidev0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-leap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle15_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle15_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-recutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-recutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-recutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readrec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testrec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-cloner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-importer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-cdi_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.77</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.77</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgirepository-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GIRepository-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLibUnix-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GModule-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GObject-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gio-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Email-MIME</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitoxide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6NetworkAuth6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5NetworkAuth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-plotly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-plotly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-plotly-jupyter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-plotly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-plotly-jupyter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-plotly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-plotly-jupyter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitleaks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-session-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-workspace-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma6-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-qt6-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia-gspx-G06</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WPEWebDriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libWPEWebInspectorResources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libWPEWebKit-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpewebkit-2_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpewebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpewebkit-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-openpyxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-social-auth-app-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-social-auth-app-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-social-auth-app-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-w3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-fdpass-teleport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oqs-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-django-allauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-actionpack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-actiontext-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-activerecord-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-activestorage-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-activesupport-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-fluentd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-rails-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traefik2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fiona-fio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Fiona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Fiona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Fiona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Js2Py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Js2Py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Js2Py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclammspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler139</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler139-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gomuks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-web-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cadvisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-its-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-broadway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-download_url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-bjoern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-colander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-django-debug-toolbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-impacket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-marshmallow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-oic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-openapi-spec-validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyramid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-gnupg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-zipp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-zipp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-zipp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-globalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-tzinfo-1.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubelogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kdeintegration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conftest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conftest-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conftest-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conftest-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath12k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpd-rs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpd-rs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>istioctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>istioctl-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>istioctl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenImageIO2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenImageIO_Util2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Django4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Django4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Django4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libespeak-ng1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>klp-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nova-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nova-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nova-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneatvnc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neatvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core-2.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test-2.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-WebOb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-WebOb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-WebOb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-WebOb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte-2_91-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Vte-2_91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Vte-3_91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-tools-gtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmgmt_be_nb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-runner-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-runner-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-runner-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numpy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-numpy1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numpy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numpy1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numpy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numpy1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-ssh-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nqptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>onefetch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit-vim-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stgit-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-azure-identity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-azure-identity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-azure-identity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-128-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-java-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-catalog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-descriptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archetype-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenIPMI0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenIPMIui1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argocd-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argocd-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argocd-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kyverno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kyverno-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kyverno-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kyverno-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec61-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice61-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat61-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil59-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rusty_v8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-jwt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-jwt-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-fop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsonivox3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonivox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-pytest-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pytest-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pytest-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm41</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vmsr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-compat-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto16-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls21-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-7-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-3-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alloy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>govulncheck-vulndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-23-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi-bls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-bls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPAddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPAddress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.3-rubygem-actionmailer-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jujutsu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>switchboard-plug-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>switchboard-plug-bluetooth-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests-containers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptraf-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opentofu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core-2.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test-2.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sshd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_himmelblau2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-scm-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tbot-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tbot-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tctl-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tctl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tsh-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-tsh-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teleport-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-nbclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-nbclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nbclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nbclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nbclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-jupyterlab-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oras-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oras-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oras-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-django-ckeditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-ckeditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-django-ckeditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-django-ckeditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-furo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-furo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-furo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-furo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-furo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-jupyter-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyter-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyter-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyter-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-nbdime-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-nbdime-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nbdime-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nbdime-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nbdime-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nbdime-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nbdime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nbdime-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nbdime-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pytest-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Django4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-esr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-esr-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-esr-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-esr-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloudflared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-xhtml2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-xhtml2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-xhtml2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-xhtml2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lokitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-ppd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-nfv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-openshift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-realtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-sap-hana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-spectrumscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils-systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libparaview5_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>paraview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>paraview-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>paraview-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>paraview-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-paraview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-cairo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-cairo0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler144</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler144-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rizin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rizin-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rizin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle15_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_4-3_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>operator-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>operator-sdk-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>operator-sdk-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>operator-sdk-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-ScanDeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kepler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2_sound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_sound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcmtk19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-translate-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-lfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-udev-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Raw-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-modprobe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actioncable-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionmailbox-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionmailer-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionpack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actiontext-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionview-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activejob-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activemodel-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activerecord-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activestorage-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activesupport-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rails-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-railties-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Bluetooth6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Nfc6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-asteval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-asteval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-asteval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fake-gcs-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hauler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts-flatcurve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-array</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-bopomofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-cangjie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-cantonese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-combo-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-custom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-double-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-essay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-essay-simp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-luna-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-middle-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-pinyin-simp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-prelude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-quick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-scj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-soutzoe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-stenotype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-stroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-terra-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-wubi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-schema-wugniu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cbor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-cbor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cbor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-numba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-numba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-3_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-24_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libngtcp2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libngtcp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libngtcp2_crypto_gnutls8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rack-2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.30-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.31-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.32-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luanti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luanti-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luanti-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luantiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite28_3_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf28_3_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc28_3_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-28_3_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyter-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyter-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-spotipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-spotipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-spotipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gerbera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gerbera-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gerbera-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyxml2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>distrobuilder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nebula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nebula-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi-chains0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi-chains0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed25519-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed25519-java-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nethack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>copacetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>copacetic-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>copacetic-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>copacetic-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rime-plum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crane-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crane-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crane-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcrane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcrane-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcrane-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcrane-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-containerregistry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kured</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kured-k8s-yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay-rke2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-reference-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-environment-to-ini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitleaks-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitleaks-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitleaks-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qubesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atop-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gotosocial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>headscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheoradec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheoradec2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheoraenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheoraenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Data-Entropy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsl28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgslcblas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcyrus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-Annotator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler148</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler148-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subfinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gopass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gopass-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gopass-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gopass-impersonate-pass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gopass-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rollup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfa1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfa1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-h11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-h11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-h11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glow-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glow-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glow-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amber-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmctl-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmctl-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmctl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wasm-bindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldap-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sequoia-octopus-librnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sslh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevtlog-4_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-bigquery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-bpf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-cloudauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-loki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-opentelemetry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng-python-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp-httplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpp-httplib0_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-bzip2-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-gcs-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-linuxdisk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-stats-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cramjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-loguru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mechanize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-py7zr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pycapnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyspnego</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pywayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionmailer-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actionpack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-actiontext-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activerecord-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activestorage-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-activesupport-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-fluentd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-globalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rails-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dante</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dante-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dante-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsocks0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kind-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kind-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kind-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-project</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm42</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiodns49</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiolink72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc68</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cfgclient66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cryptolink50</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-d2srv47</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-database62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp++92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp_ddns57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv111</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dns++57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-eval69</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-exceptions33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks100</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-http72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-mysql71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-pgsql71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process74</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-stats41</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-tcp19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util-io0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-cassandra-database-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-influxdb-database-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-mysql-database-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-mysql-legacy-database-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-postgresql-database-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openbao-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Dropbox-API</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-teddysun-v2ray-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-v2ray-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Crypt-OpenSSL-RSA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-nh3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-nh3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nh3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-selenium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-selenium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-selenium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libassimp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clustershell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-clustershell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>faad2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>faad2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaad2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaad2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaad_drm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaad_drm2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker-dracut-netstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker-guestvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fractal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fractal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-xdm-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-qr-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jgit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_btrfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_btrfs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_crypto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_crypto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_dm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_dm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_fs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_loop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_loop3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-dbus3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mdraid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mdraid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mpath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mpath3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_nvme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_nvme3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_part-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_part3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_swap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_swap3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_utils3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-BlockDev-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetebase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetebase0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ggml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libggml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libggml-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libggml-cpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libggml-opencl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libggml-vulkan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libllama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmtmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llamacpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llamacpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mirrorsorcerer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moarvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moarvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nix-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opa-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opa-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opa-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polaris</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polaris-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polaris-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polaris-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite31_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite31_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf31_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf31_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc31_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc31_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-31_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-31_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-bqplot-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-bqplot-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-bqplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-matplotlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-matplotlib-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ipympl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ipympl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ipympl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyter-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyter-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyter-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-jupyterlab-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jupyterlab-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyterlab-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyterlab-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-plotly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pydata-sphinx-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pydata-sphinx-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pydata-sphinx-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rfc3161-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-rfc3161-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-rfc3161-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspdlog1_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspdlog1_15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spdlog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-networkd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-el-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsp-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-servlet-6_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_adv-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_aui-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_core-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_gl-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_html-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_media-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_propgrid-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_qa-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_ribbon-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_richtext-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_stc-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwx_gtk2u_xrc-suse16_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wxWidgets-3_2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>incus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>incus-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>incus-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>incus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>incus-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoActiveRecord112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoCppParser112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoCrypto112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoData112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoDataMySQL112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoDataODBC112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoDataPostgreSQL112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoDataSQLite112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoEncodings112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoFoundation112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoJSON112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoJWT112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoMongoDB112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoNet112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoNetSSL112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoPDF112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoPrometheus112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoRedis112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoUtil112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoXML112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libPocoZip112</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poco-cpspc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler150</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler150-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pycares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pycares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chmlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chmlib-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby3_4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmruby_core3_4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-24-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-db-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-db-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grype-db-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minio-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minio-client-as-mc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-thor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Authen-SASL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpi-imager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-longterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-longterm-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-longterm-environment-to-ini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-longterm-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forgejo-longterm-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsuricata8_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suricata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suricata-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-xen-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-xen-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua55-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua55-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubeshark-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubeshark-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubeshark-cli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubeshark-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-autoinstall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-cli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-openapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_3-32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_3-32-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_3-32-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_3-32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_3-32-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_3-32-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_3-32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_3-32-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_3-32-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_3-32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_3-32-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_3-32-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_3-32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_3-32-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_3-32-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler152</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler152-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-uv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-uv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-uv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-uv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-uv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texmaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-longterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-longterm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>framework-inputmodule-control</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>framework-inputmodule-udev-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rz-pm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pypdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pypdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pypdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>framework_tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvalidate-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstValidate-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-rs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-rs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_deflate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mbedtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-sendxmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minikube-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minikube-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked2nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abseil-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_base2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_base2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_city2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_city2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_civil_time2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_civil_time2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cord2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cord2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cord_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cord_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_functions2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_functions2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_handle2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_handle2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_info2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_info2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_sample_token2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_cordz_sample_token2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc32c2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc32c2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_cord_state2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_cord_state2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_cpu_detect2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_cpu_detect2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_crc_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_debugging_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_debugging_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_decode_rust_punycode2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_decode_rust_punycode2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_demangle_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_demangle_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_demangle_rust2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_demangle_rust2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_die_if_null2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_die_if_null2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_examine_stack2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_examine_stack2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_exponential_biased2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_exponential_biased2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_failure_signal_handler2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_failure_signal_handler2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_commandlineflag2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_commandlineflag2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_commandlineflag_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_commandlineflag_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_config2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_config2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_marshalling2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_marshalling2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_parse2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_parse2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_private_handle_accessor2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_private_handle_accessor2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_program_name2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_program_name2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_reflection2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_reflection2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_usage2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_usage2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_usage_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_flags_usage_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_graphcycles_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_graphcycles_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hash2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hash2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hashtable_profiler2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hashtable_profiler2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hashtablez_sampler2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_hashtablez_sampler2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_int128-2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_int128-2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_kernel_timeout_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_kernel_timeout_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_leak_check2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_leak_check2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_entry2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_entry2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_flags2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_flags2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_globals2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_globals2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_initialize2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_initialize2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_check_op2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_check_op2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_conditions2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_conditions2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_fnmatch2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_fnmatch2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_format2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_format2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_globals2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_globals2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_log_sink_set2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_log_sink_set2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_message2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_message2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_nullguard2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_nullguard2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_proto2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_proto2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_structured_proto2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_internal_structured_proto2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_severity2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_severity2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_sink2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_log_sink2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_malloc_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_malloc_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_periodic_sampler2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_periodic_sampler2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_poison2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_poison2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_profile_builder2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_profile_builder2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_distributions2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_distributions2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_distribution_test_util2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_distribution_test_util2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_entropy_pool2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_entropy_pool2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_platform2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_platform2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_hwaes2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_hwaes2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_hwaes_impl2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_hwaes_impl2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_slow2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_randen_slow2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_seed_material2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_internal_seed_material2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_seed_gen_exception2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_seed_gen_exception2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_seed_sequences2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_random_seed_sequences2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_raw_hash_set2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_raw_hash_set2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_raw_logging_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_raw_logging_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_scoped_set_env2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_scoped_set_env2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_spinlock_wait2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_spinlock_wait2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_stacktrace2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_stacktrace2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_status2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_status2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_statusor2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_statusor2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_str_format_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_str_format_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strerror2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strerror2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_string_view2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_string_view2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strings2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strings2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strings_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_strings_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_symbolize2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_symbolize2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_synchronization2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_synchronization2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_throw_delegate2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_throw_delegate2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_time2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_time2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_time_zone2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_time_zone2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_tracing_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_tracing_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_utf8_for_code_point2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_utf8_for_code_point2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_vlog_config_internal2508_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl_vlog_config_internal2508_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-extension-goat-excercises</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terragrunt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terragrunt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terragrunt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Crypt-CBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-h2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-h2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-h2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiodns62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiolink88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc82</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cfgrpt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cryptolink64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-d2srv63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-database76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp109</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp_ddns68</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv130</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dns71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-eval84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-exceptions45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks119</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-http87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log-interprocess3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log75</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-mysql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-pgsql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-stats53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-tcp33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util-io12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util101</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmupen64plus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmupen64plus2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-plugin-audio-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-plugin-input-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-plugin-rsp-hle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-plugin-video-glide64mk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-plugin-video-rice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupen64plus-ui-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regclient-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regclient-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regclient-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ruff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ruff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ruff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo-0_10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsixel-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsixel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsixel-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsixel-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsixel1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cpanel-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-deepdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-deepdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-deepdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-xmltodict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-xmltodict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-xmltodict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autogen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopts25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ognl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ognl-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krita-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krita-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tree-sitter-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tree-sitter-ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsuricata8_0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>azure-storage-azcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>digger-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>digger-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>digger-cli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>digger-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-socketio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-python-socketio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-socketio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-rubygem-rack-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gi-docgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core-2.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test-2.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ollama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler153</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler153-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bleachbit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bleachbit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpremote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluajit-5_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluajit-5_1-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreboot-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv131</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks120</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-140-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs140</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs140-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kumactl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kumactl-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kumactl-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kumactl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-djangorestframework-simplejwt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-djangorestframework-simplejwt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-djangorestframework-simplejwt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenSMTPD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zellij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zellij-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zellij-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zellij-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-profiling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python315-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pdfminer.six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pdfminer.six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pdfminer.six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Scrapy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang27-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_4-33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_4-33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_4-33-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_4-33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_4-33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_4-33-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_4-33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_4-33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_4-33-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_4-33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_4-33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_4-33-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_4-33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_4-33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_4-33-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-cifs-idmap-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>act</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core-2.19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test-2.19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-4.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-4.5-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-4.5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-5.0-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-5.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd-for-k8s1.32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-git-prompt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-sidecar-shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-management-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-management-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-management-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-signal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-signal-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-signal-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-signal-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netbird-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm3-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm3-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm3-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcoap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcoap-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcoap3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-kde-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-kde-greeter-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-kde-greeter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mistralclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mistralclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs24-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G07-signed-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G07-signed-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G07-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G07-signed-kmp-longterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G07-signed-longterm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildpacks-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildpacks-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildpacks-cli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildpacks-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby4_0-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clairctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.33-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.34-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-for-k8s1.35-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>duc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpp-httplib0_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>anubis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-openapi-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-openapi-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-openapi-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfluidsynth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfluidsynth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-Django6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Django6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcmtk20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-qt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQgpsmm32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgps32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-jmx-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-nosql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-filelock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-filelock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-filelock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwget4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-openh264</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k6-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k6-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>k6-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-repos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcphost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcphost-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcphost-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcphost-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rke2-1.34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-l2tp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heroic-games-launcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraylib550</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raylib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jaraco.context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-jaraco.context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jaraco.context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-weasyprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-weasyprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-weasyprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-pw-mgmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsuricata8_0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlang-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tlp-rdw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zot-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zot-registry-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zot-registry-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zot-registry-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencc1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sigstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-sigstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-sigstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sse-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-sse-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-sse-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-storages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-django-storages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-django-storages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt++-7-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt-7-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt7-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt7-module-qt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlt7-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>melt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mlt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyNaCl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-PyNaCl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyNaCl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-machines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-subscriptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencloud-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>localsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>localsearch-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-auto-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-continuous-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-local-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-mcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-python-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-single-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-single-instance-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snpguest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-i586</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-auditable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libowncloudsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libowncloudsync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>owncloud-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pymssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-pymssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pymssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>azure-cli-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-asgiref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-asgiref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-asgiref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syft-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syft-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syft-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vexctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyPDF2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python312-PyPDF2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyPDF2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsignal-protocol-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsignal-protocol-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-tukit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui4-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServerUI4-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gosec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-gphoto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mchange-commons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mchange-commons-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pillow-heif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pillow-heif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rack-2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-dracut-measure-pcr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-enroll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-jeos-firstboot-enroll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-kernel-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-snapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sdbootutil-tukit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-joserfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-joserfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telemetrygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-strongswan-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-neovim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-nushell-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostty-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libghostty-vt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extension-ghostty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-ghostty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lxml_html_clean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml_html_clean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actioncable-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actionmailbox-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actionmailer-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actionpack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actiontext-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-actionview-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-activejob-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-activemodel-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-activerecord-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-activestorage-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-activesupport-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-fluentd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-globalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-grpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-http-cookie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-minitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rack-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rails-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-railties-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-rubyzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-sprockets-3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-thor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-web-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby4.0-rubygem-websocket-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skaffold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skaffold-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skaffold-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skaffold-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smb4k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smb4k-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smb4k-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-simpleeval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-simpleeval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.92-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.93-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.94-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tempo-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-gtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-sdl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgvector-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dynaconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dynaconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pydicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pydicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Crypt-URandom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glances-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Glances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Glances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyMuPDF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyMuPDF-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jsonpath-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jsonpath-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-cloudwatch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks121</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util102</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-intake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-intake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-oci-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpp-httplib0_38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeipmi-bmc-watchdog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeipmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeipmi-ipmidetectd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeipmi-ipmiseld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreeipmi17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipmiconsole2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipmidetect0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipmimonitoring6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsuricata8_0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mapscriptng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-mapserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mapserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osslsigncode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-scitokens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-scitokens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-scitokens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL3_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL3_image0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ckermit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ckermit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-social-auth-app-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-social-auth-app-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-jupyterlab-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lupa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lupa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-lupa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>steampipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-c-event-stream-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaws-c-event-stream1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite34_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite34_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf34_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf34_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc34_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc34_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-34_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-34_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Django4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Django6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Flask-HTTPAuth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask-HTTPAuth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Flask-HTTPAuth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-Glances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clusterctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clusterctl-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clusterctl-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clusterctl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradcli10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radcli-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radcli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tekton-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tekton-cli-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tekton-cli-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tekton-cli-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-3_7-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-26_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-br-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-biopython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-biopython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python314-biopython</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-277.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20210101-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.18-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15_02-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.18-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.86.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-157.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.10-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.10_k4.8.13_1-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.33-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-73.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.22-6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10.1-73.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.17-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.6.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5b-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.6-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.g50-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:50.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-75.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.16-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.14-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.3-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-266.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.8h-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.15-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.1.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2+git20160915.106a00d-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.00-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.26-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4.3-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.8.13_1-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:s20160308-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-37.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.155.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.45-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-65.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-65.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-3.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009096127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.94-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.26-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.22-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-786.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-786.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4.14-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.4-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-4.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.000033-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:481-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.56-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.29-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.041-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.16-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.34-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.34+git.1470736983.963ba71-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.23-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.34-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-257.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.29-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.03.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.16-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.011-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.130-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.22-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.24+git.1480563949.e67fcd4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.06-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.43-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-1.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-125.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8-24.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.92-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.108-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.35-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8c-140.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2~rc1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.38-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.14-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.3.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.20-257.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.12-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.19-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.2-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.51.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20151004-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5+svn.2173-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.84.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.88+-103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1.32609-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009082363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.43-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1_r8-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8rel.2-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.25-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.07-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-243.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19-19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.09-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.92-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-103.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.10-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.25-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3.P1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.49.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20160315-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-282.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.72-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.1-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-1.112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-171.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-89.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.23.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.37-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.b6-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009081531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.171-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.5-326.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-16.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-1025.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.36-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.24.0-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.908-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-185.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.81-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.4-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.28-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-23.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.10.3P4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:804.033-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.38.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.41-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.23.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-183.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15+git20161104.b6f251a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.29.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.8.5-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0128-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.917.703_b45dbdb-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.59-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.31-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.78-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.070-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.68-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.46.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2h-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-270.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1+r240125-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.115-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-726.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18p1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.07-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11+git.20130926-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-27.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.9-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.167-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.02-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.4-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.48.22-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.79.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.59-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10~git0.21dd2802c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.3.11-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.36-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.2-287.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.16-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12+hg695-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-94.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.55-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.24-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.23-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.49-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.48-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.11-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.21q-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.9-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.10-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-302.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.20-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.61-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.18.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.17-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200921-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.68-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210902-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.5.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.36-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210802-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.6.45+g8fda9838398-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93.0.4577.82-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.13-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3.855-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1.336+git.5639a3af-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5+git70.64010f57-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1+20210913.d7356663-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.1+git1893-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.9-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0+git.1600444747.83b3644-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.28.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.P1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:183-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.28-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74.3-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.8-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.8_k5.13.13_1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.6-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.185-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13~0.20190723-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.94.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0+git.1627556580.31443c15-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.21-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.55.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.66-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.23-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.21-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.38.2-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.30-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20210903-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.13-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.17-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.15-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.15-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.7-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.21-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.117-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:30.1.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4+git0.acb1d0bea-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.36-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.3-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.21-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.0.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.25-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.3-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:69.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20200202.3-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36+git.20210720-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18.238.gb7adc1d-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.5.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.33-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.8.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.43-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.06.0.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3+k3s1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.18-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.86.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210901-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021_08_R1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.86.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.2-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.5-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.4-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.13-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.20-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.100-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.13-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.17-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210626-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.63.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.107-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210528-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7.0-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-188.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.09-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.73-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.20-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.59-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.37-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.17-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2+20201203.def947e-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde222-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4+git20180804.fff99cd-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5.2-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.7-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1+7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.19-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.01-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200505-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.10-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.28.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.08.23-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.42-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0~dev.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-24.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.9-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61.0.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.11-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.69.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33.1+git.20210630T163736.f2afae55e9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20180726-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.14-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.66-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.05-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210205-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.93.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.60-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.23-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.92-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.6.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.8.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.9+git.1625238904.d59f20e-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.28.1632141620.a8837d3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.5-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.7.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8_k5.14.6_1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.59-69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.7-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.174.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202105-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0+20210816.c6a4f6e6c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.146-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.17-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.37-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.34.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.050-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.643-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.012.2-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.448-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.52-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1550_20210901-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1550_20210901.1550-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.21-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.118-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.13-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009081595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1um-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.32-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-277.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6e-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1548+0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.6.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.22-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.7.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1.1-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.3.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.49.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.19-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.24-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.19-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.148-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.2.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.59-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.74-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.10-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:57.4.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.62.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0rc1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.15-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.55.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1+git20210924.ad0cf53-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2106.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-9.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.2-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-149.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.6+git.182.2205d5224e3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.32-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.9-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.09.01-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02~a10-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009081969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.2-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.30-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.11-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-215.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0~ch448-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4.2-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-71.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.05-71.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.39-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9998-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.1594640766.b42009b-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.7p2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.17-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.33.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.54-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210614_1.10.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.10-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0beta3-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30357-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27321-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12688-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn28038-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57878-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57089-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58378-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn3006-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29036-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57890-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52909-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18790-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45266-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57273-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16219-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17794-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15543-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25623-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38300-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52631-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37223-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn51944-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48871-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34112-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30408-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45927-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50528-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46996-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48478-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24061-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23866-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58136-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53554-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17399-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37645-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24759-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29031-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8329-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44515-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58535-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29050-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18336-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25860-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14752-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14758-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25997-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13663-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34971-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54732-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37813-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56984-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44835-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49033-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32101-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46894-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53999-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54358-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30983-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42296-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42300-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16420-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25012-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32150-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10937-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27025-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56352-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31696-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn26126-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15093-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41465-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29005-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32346-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34647-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43292-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50281-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37750-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38769-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23500-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23661-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23406-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14428-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8457-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33688-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18674-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30534-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37026-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53804-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10843-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37537-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14387-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52858-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41779-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49140-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn40690-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25962-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16181-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn39165-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009218999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29348-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13364-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52800-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32405-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn7838-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29333-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44206-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29335-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34996-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31638-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32919-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55172-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53577-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55933-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29688-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38710-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn21215-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37771-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13013-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45011-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15506-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12782-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn47948-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29741-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33155-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24062-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43596-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53444-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6898-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55132-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25648-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23262-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6897-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50419-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46165-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49312-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52917-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34398-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56569-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58437-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56352-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54074-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58253-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57089-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56623-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56575-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56215-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56196-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54191-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58290-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58626-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57491-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn55706-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54139-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn55129-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58754-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57757-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54141-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57048-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58593-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57862-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58124-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57759-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn50293-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57878-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58759-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn56496-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54455-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn57312-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn58543-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.185.svn54495-52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn55076-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.000.958svn50999-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.22svn44822-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.21svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8bsvn51065-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7esvn25918-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3asvn54080-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.36svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17022-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.14svn19603-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.22bsvn54071-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.84psvn52964-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20943-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4svn17020-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52470-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn57728-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.3.1svn58057-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn41157-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55471-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.7svn49248-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn58761-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.0svn56119-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32089-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn51497-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.3svn55777-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.25svn18835-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn53052-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.13csvn57479-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.75svn56946-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5svn57447-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.47svn54758-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn20498-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn51376-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54080-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn58559-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn50912-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn49326-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.42svn26048-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29349-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7.1svn49862-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54157-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56291-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51787-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn46817-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51618-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20538-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn58253-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn35900-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6bsvn17156-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34016-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.2svn26055-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5isvn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn56277-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn57416-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn38055-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57452-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn52204-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.052svn56864-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.2svn44846-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn42428-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56125-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn56006-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.0svn47290-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.000svn44497-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.1svn42221-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56035-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn35065-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn50316-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn53087-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.3.2svn36030-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.113svn55403-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn29630-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2xsvn51532-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.20.6svn55378-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46110-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.04svn29208-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn28980-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45662-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn21855-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56514-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22930-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.14svn30646-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56583-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn55988-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52824-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn17049-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55121-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn51631-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.16svn35032-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.1svn55250-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.001.003svn24266-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn21933-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.08svn18651-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn26053-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17050-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn32662-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.24svn56102-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.4svn54080-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.34svn53406-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn23350-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.10svn58121-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.03svn54080-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54080-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn47510-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2csvn53718-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn46317-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57179-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.02svn19306-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn28400-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.1svn56673-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44662-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn37709-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51474-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.17svn25711-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.1svn38299-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30042-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.1.0svn58764-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4.5svn57090-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38005-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.2svn57283-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42880-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0_beta3svn33894-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42675-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56997-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn18125-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn31576-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45656-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn38741-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57213-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.76svn50084-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn40201-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn29129-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20536-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn29989-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2bsvn49060-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn53411-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn54725-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn56730-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.26svn57833-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.15svn57598-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn25243-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20431-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn38497-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56759-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.20svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1csvn17512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.70svn58569-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn33490-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.19svn53051-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn56922-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57624-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn42099-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn57959-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.11svn53108-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51323-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18948-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41853-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55889-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52564-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51757-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn56596-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn54779-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn56966-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn43337-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn54049-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn19717-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.11svn36084-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32377-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58211-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn53173-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn35373-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn57349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn57105-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.1csvn58155-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21271-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.56svn58684-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0dsvn57005-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn44197-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0fsvn30256-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn49022-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn38174-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn30257-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2gsvn31902-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2psvn30259-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3lsvn35198-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1asvn30261-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3ssvn57642-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.8jsvn56827-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3rsvn44495-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4tsvn30265-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn38064-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3ssvn57643-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5lsvn56607-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn39861-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.3csvn30270-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn45864-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.13svn57978-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn56904-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3hsvn30273-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5csvn49701-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn51551-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0msvn43235-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn30276-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn30277-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4.04svn55232-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57733-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn30279-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5svn38173-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn46681-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn39587-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0msvn43234-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0isvn30281-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn39608-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30282-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2lsvn30283-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2ssvn57644-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2lsvn30285-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn30286-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3msvn57376-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn30288-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0gsvn30289-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0asvn53140-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0asvn53139-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1asvn30292-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2nsvn57666-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0isvn57646-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0psvn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3esvn57647-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn30564-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn51560-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4esvn56674-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn39246-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn38372-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.34svn57349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn42428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2.1svn56915-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.02svn34393-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.3svn48834-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4.0svn46626-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.2svn38857-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4asvn22013-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38479-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.10svn53683-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20619-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.93svn25597-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn35460-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.016svn19490-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.076svn57080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.051svn55475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn32924-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn26477-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn57925-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19440-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn17186-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17224-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn17187-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn33143-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.3svn43928-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn39364-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.62svn58537-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02bsvn38159-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4bsvn58513-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn39180-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn27539-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.0svn55732-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn23427-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02asvn56087-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn40105-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.1svn55117-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn23510-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn55441-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42161-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn39048-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41404-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8.1svn56967-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn49867-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn43031-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39100-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.0svn56934-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45877-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29937-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn21977-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn20765-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn56180-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn54826-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58503-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58697-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn36294-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn56193-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18651-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20031-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.004svn32215-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45662-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38708-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn46374-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn56998-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn51398-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn27401-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn39041-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn55811-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.16svn57273-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.03svn50677-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.2svn31607-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.16svn57272-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn49179-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn54401-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6.2svn48548-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.9.14svn56208-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.8.5svn56209-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn53281-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn46637-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn57924-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1asvn40323-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3.3svn54015-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn26556-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.5svn56837-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44685-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1zsvn57904-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn58715-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.1svn43723-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn42649-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44627-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn57979-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn45876-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0xsvn58753-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.002svn56939-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.21svn56790-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn19787-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3esvn58716-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn41634-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn54561-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn56133-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.23svn56502-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn58437-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn49935-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn32180-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.2svn53344-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn42445-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1svn43049-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn37081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24097-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3dsvn57262-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.0svn49839-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn41596-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.0svn48983-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn57513-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.8csvn56493-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn55643-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.21svn56392-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7.1asvn45865-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn56853-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn48945-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn45858-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn47839-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2_3svn57366-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4.2svn45379-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.0svn43330-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2asvn58661-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn58169-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.0svn44653-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn55290-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn55339-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn54030-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn55626-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3.3svn53138-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn21923-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn25526-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn25527-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn22054-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.2svn45196-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17116-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.99dsvn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.71svn52851-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn57137-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52851-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.36.3svn55193-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn35154-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn34631-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1csvn37795-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn34632-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn35267-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34633-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn38248-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn53172-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29803-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn41777-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42217-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn25779-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn57388-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn39073-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53837-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56026-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn25039-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.07svn36406-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn38388-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17209-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn22490-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn46213-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.51svn57949-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2dsvn49643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn20047-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32235-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn17076-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21670-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn36605-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3svn57326-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn37536-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46480-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7bsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.29svn56885-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn55475-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.61803398svn53402-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.61803svn21907-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn21948-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.14svn17830-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02dsvn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn17062-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21047-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16989-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54827-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.30svn28031-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn45120-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44939-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17129-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20655-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17127-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.11svn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.5svn50991-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21014-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.40svn29901-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44371-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98ksvn56422-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn35383-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28363-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56070-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn55064-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25185-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn51299-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn56528-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56431-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn41813-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2asvn43219-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn30559-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn40213-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn53606-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn57025-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn43369-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3bsvn45291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn52509-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn57625-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2bsvn44173-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn48606-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn56491-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5asvn57755-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn47230-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn51286-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn56821-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn18337-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55907-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn26313-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34991-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.90svn27725-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn35973-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn33041-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.001.000svn24302-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44899-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17125-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4.2svn43003-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20.21asvn57282-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn32508-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17353-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56771-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn39000-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56753-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn35002-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn55759-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57478-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8.2svn25144-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn54682-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn53084-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn21476-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r0.2svn38859-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn49061-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.7hsvn35069-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn57139-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn16666-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02.3svn58602-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2csvn23443-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54686-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn56636-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn34452-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17121-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.36dsvn46613-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn57599-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8.1svn50374-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn39797-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.22svn49168-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn50971-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56644-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn44960-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn36728-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn36195-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6csvn46919-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn16094-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4.0svn56338-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0.1svn57756-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1bsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.1svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn55920-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17120-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn45069-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn52022-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38300-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn17146-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.5svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn17119-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21632-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6asvn58014-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.16svn57206-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn53437-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.11asvn56983-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn57490-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.8svn52863-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn46723-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12asvn46972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0msvn31096-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21046-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn20582-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.15svn53302-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn56833-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn19440-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn45081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn27118-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn57508-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52567-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn57325-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn57312-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn49543-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn57758-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn27473-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1.2svn52649-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7.6svn52851-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn20060-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn47577-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn49569-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51000-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn37934-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn26700-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.9999svn28552-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1svn42751-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53382-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.9.5svn57308-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.3svn58757-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.5svn36428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn45975-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47407-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn46721-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2asvn43444-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.8.4svn36951-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20201206.0svn57081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn58081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.8.4svn41119-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.8.4svn52851-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1asvn53671-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.6svn48041-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.19svn55218-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.0svn51472-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn55985-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21.4svn47525-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn47747-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn52082-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn55763-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47511-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn51136-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51137-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53537-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn53698-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57963-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn28250-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.0svn58661-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0jsvn57640-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn24378-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56414-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.8.1svn21107-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn39273-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28910-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57866-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17964-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.03svn58506-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18787-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn54706-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn39728-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54735-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32550-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.15svn55265-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2.0svn45677-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn34668-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn37572-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.066svn58717-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4_alphasvn51627-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn17630-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51502-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34481-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn29803-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.005svn54736-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn56291-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4bsvn56291-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0csvn46358-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47913-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56707-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18270-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3csvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn41042-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58434-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20181105svn49086-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn13293-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn50585-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn22155-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0esvn53545-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn31490-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.22svn21741-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.99fsvn18462-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7asvn19361-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.2svn27198-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn51348-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54891-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn18259-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r0.11asvn38875-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn50116-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.8svn41927-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn55526-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54265-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47573-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.81asvn45322-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.13.0svn55667-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.25fsvn44847-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.5_r1svn29020-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17219-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17218-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18791-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn55387-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn29349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn37868-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58167-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47085-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55718-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54215-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51306-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56073-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23171-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58082-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn49449-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.14svn18950-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.0svn50217-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43558-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.30svn49252-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9bsvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.46svn53403-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn35929-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.35svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn29062-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn37928-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn24829-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.601svn54696-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44131-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn23862-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.23svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00asvn27576-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn35058-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24940-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55436-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn58589-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0esvn21209-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.50svn55643-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29803-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10.2svn55424-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55879-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47861-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn55271-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn16896-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.40svn55920-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41553-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54433-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.mar._2021svn58353-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.2lsvn57844-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn23371-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58354-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn41986-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51857-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.21svn51010-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.31svn38672-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38514-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn51578-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36304-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1dsvn52145-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.1svn44129-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2csvn26313-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5.6svn58583-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn34453-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49909-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn48990-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7dsvn56478-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24139-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.16svn20745-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2.15svn57402-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.55svn45255-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.33svn24729-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn34577-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49271-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn46776-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn37659-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.915svn18651-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47350-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53559-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45692-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54191-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn38599-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.14svn23425-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn29579-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0hsvn58150-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn42883-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.32svn52663-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn57033-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn27974-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn18951-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.60svn36650-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.7svn58590-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn46287-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn47064-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52647-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47031-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47032-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36682-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47033-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47034-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47355-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36705-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn52479-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47356-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47565-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn47047-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn56393-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47631-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn53125-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47533-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47534-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47501-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47632-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn54779-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn37146-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47748-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47749-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48266-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48267-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48456-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48457-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn56394-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn49345-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn49346-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52101-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.0svn52893-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52281-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52282-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn45785-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36700-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52331-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn47552-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52375-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52553-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn28983-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn57522-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0.0svn30206-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn52009-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn57349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23374-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.3svn57094-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn55230-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48599-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn58212-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.34svn31771-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn45991-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn23974-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn39589-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn49544-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16549-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.1svn56664-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98svn55890-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn24035-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54810-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn37656-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn19387-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28946-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28501-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17192-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32925-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20031-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn53244-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn55661-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19441-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn27918-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.32svn42428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20520-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.0svn43417-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn48932-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn34295-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17337-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn17194-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24927-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34294-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3.0svn58350-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2dsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn25741-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57362-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34474-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34521-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56594-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48634-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn55286-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn29752-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn26237-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01asvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51476-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn17195-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.111svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn56407-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r0.32svn38860-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52257-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn46011-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.7.2svn47680-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54994-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17196-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.16svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn44854-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn57099-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2esvn35866-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.0svn44471-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28582-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.4svn38157-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn39802-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn19232-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.97svn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn34724-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.08hsvn56696-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2021_01svn58212-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009219999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.1svn52851-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn51652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn49504-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.08svn51663-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn38375-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5asvn56800-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn52271-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20741-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn18728-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29103-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56373-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn57972-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52851-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn29349-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn44515-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58645-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.17svn57972-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn13293-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn57972-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.3svn38726-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2bsvn35193-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1415926535897932svn58758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.11svn52027-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20851-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57514-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.99svn19440-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32677-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.24esvn58762-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn56291-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn57204-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4.0svn44543-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn32661-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38352-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54721-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52168-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29466-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.1svn57544-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn25033-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn38172-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn41617-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn29349-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39233-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn54191-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.2svn58390-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39396-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32639-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn48007-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn24928-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn57716-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn25231-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6bsvn21540-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01ysvn56223-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.17svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn27599-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn35829-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1esvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn33236-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02asvn20617-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54676-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58414-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.0svn56728-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn49594-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn58721-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn56070-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn21758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.005_bsvn19705-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn38114-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.24.12svn45418-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.11svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.30svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.09svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn52398-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39025-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn55418-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn42712-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn58015-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn54317-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3svn56999-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn55928-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.60svn51894-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24504-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn51177-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn54865-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9asvn57814-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn42023-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3.0svn57013-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1svn55678-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn55131-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23483-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn18064-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28469-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34957-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn34087-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn57090-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn43750-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1dsvn34486-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53319-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn47703-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55643-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2svn16558-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn28571-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29802-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10csvn57130-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.9svn51423-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn21472-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn56615-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn17210-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20513-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5esvn54857-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54851-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.11svn57186-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7.4svn21461-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2014svn35575-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn29349-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19440-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.5svn53472-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.61svn18703-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.28svn48684-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn53546-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn57815-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22931-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn32257-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn43278-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20678-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn20641-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn45511-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn45215-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.115svn58722-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.45svn56703-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn42428-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn55414-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.97svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn47639-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn21385-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn52342-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2dsvn52240-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18115-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98svn29235-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0asvn56658-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37236-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn22426-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn17335-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn32098-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.051svn56390-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn36354-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn41784-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn53171-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1415926svn20694-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.09csvn55156-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5ksvn56554-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn21906-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48186-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.8svn54897-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1hsvn19795-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn55265-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn42428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1svn43735-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn22191-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0bsvn25714-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56829-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57641-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4_subrfixsvn17265-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn35675-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn56694-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn57489-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.00svn57001-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn58023-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.4svn42755-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn49662-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.101svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn33398-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn55265-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.1svn26313-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17262-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn35417-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn50448-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.3svn49590-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn55188-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55916-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn53911-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.1bsvn44499-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn57247-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn56693-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn57246-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1bsvn56633-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn27206-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54451-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21ksvn52227-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn48977-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.0svn54400-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.41svn19859-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn16243-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9asvn52117-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4asvn17263-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21328-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.00svn56948-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.2svn43865-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn49004-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1bsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn18304-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46411-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0.1svn57672-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21912-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46736-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn49801-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9csvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36263-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn41549-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.7svn57488-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn37889-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn29264-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.16svn55728-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2msvn21340-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.05svn55627-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn32796-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn38074-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24500-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn57428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn26722-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7esvn56216-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.8svn35346-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.10.1svn55960-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn24730-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43812-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn45245-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn30962-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0bsvn58058-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.1svn55777-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.08svn17259-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn30223-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38895-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn37628-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56854-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.8svn53146-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn33288-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn26313-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.3svn28943-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19388-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn58759-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21462-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn18784-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn52142-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn52208-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29529-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8asvn56479-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.81asvn28421-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn47444-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2.1svn24329-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn21719-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.3svn55437-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.4svn56672-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02asvn50732-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0jsvn58440-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn50088-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.51svn54483-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn38770-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51825-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn17131-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn47113-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1asvn21631-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn25832-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.5svn49591-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.2svn30168-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.3svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53207-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17272-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1bsvn19440-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn19667-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn25768-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn25584-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn56782-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3dsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3bsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3svn36572-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.17svn35291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn56594-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.07svn53912-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.30svn25003-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.34svn20710-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52090-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25607-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn57508-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn45360-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20638-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn29173-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn21855-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21326-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2015.2svn40403-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2016.1svn40404-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.6.3.2svn48145-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.13.0svn54517-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0esvn55920-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn23608-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn17859-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.933svn53562-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43546-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53228-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58747-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn56350-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.2svn54994-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.009svn57553-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.1svn58508-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7isvn56594-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6csvn44799-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.7svn17115-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.5bsvn23330-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20161201svn42621-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn27034-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1dsvn57618-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn52910-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn27819-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.5svn57398-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55688-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2020.10svn56714-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn21480-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn51305-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56025-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.00svn32214-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn54090-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29646-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1dsvn49719-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.003svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn26313-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18312-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.96svn26789-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn38922-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24559-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.000_2016_initial_releasesvn42157-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn27417-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn56847-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn56704-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4asvn24054-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn57248-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn56088-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn50043-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn17275-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn25434-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn34545-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn24684-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn26018-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn26019-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn26030-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn49947-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0.3svn50415-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24714-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56403-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn55166-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52820-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37677-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn58505-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn19886-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn52209-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32934-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19216-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn57157-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn58754-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36464-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25112-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn55978-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.1svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56665-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.9svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5esvn42428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn42121-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn16189-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39365-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.11svn50589-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn23567-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn53170-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.9svn37156-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn19469-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn19440-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn28484-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.001.001svn52778-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn52570-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn18651-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18651-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.8csvn53822-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn19878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32068-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn52311-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24980-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.0svn54732-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn51928-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn34049-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.7svn38913-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.betasvn38932-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56810-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn49962-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn55920-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.2svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn52593-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.46svn54402-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn35665-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn35685-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn49928-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.45svn54688-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn42873-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55189-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn36064-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51211-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.993svn21292-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.97svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21691-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.996svn24287-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98svn24288-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.73svn29803-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29349-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.5svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28628-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn56291-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54512-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2lsvn57616-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49869-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44764-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn51052-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn21387-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38832-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.5svn22509-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.5svn56852-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn47522-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46360-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56514-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41448-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58539-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56823-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn56931-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn32630-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn57341-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn58661-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.94svn31517-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49052-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn56851-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn51612-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28327-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn39419-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.0.0svn58331-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53024-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn52756-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn17354-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn32981-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.2svn58723-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn53762-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn54512-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn35859-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn34439-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.4svn56291-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.19.2svn52851-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn49527-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32484-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn49062-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57359-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45712-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn32258-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn54512-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48102-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0_alpha.4svn55741-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn57765-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38428-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46494-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn27671-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56798-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn52602-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn48255-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.0svn43962-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn13293-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn43280-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20120101svn25019-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20120102svn25020-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210130svn57574-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210130svn57573-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn21396-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn26543-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21327-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.5svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32003-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn23818-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.0svn56070-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn36348-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn41359-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn56181-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn55213-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn57045-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn35722-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn35723-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.2svn46054-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.0svn54758-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16135-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.092svn51362-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn34733-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.15svn29349-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.61svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58392-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn57757-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57360-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn42635-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0betasvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.11svn53362-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn58357-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn54381-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn55643-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2svn30002-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn44983-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn54512-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn44474-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn27036-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52810-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.14svn53048-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn41378-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn56106-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn56021-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0fsvn22255-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.23svn18020-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn57580-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56848-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn42547-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn55643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.19svn58411-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn46051-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01asvn52993-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn53584-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn56253-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.03svn53197-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2dsvn17357-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn48147-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0bsvn17358-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.7.00ksvn58024-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.9svn57004-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58619-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58609-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54568-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58630-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58685-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn58609-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5svn58652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.8gsvn58652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn58652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0bsvn58609-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn58609-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn58652-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3csvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57387-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55820-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.5svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.0svn49018-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2csvn54554-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4dsvn25821-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0svn17359-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn41332-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn38823-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.47svn20727-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn47544-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn23379-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4asvn45533-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn52626-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24868-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0dsvn56594-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1asvn25819-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn46153-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29613-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn30958-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44886-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17347-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0jsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3esvn42287-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38547-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2020svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn50227-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.2svn54683-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn17667-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn36500-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.0svn47557-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.121svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1betasvn24099-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.1svn38931-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn53023-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22018-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn57672-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn52986-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn28019-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn34299-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2021.2.1svn57590-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53168-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57213-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn36312-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn21474-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn27232-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn50265-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.0svn58743-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5th_editionsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48359-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn49749-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46364-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.2svn57773-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.3svn33457-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52032-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn47700-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.03svn52623-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn45801-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.28svn16613-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn57811-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.1svn27654-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17362-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn45509-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn23711-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn25742-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn49848-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.50svn37552-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.995bsvn19611-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16364-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn50870-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.13svn57186-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn20408-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7b8svn57826-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.26svn56932-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.30svn52717-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1svn55044-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1asvn49111-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn47109-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19440-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24858-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58472-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.0svn58329-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.21svn52718-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.28svn56395-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45751-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn17346-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56867-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57152-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.2svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16211-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56608-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn57095-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn37553-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.2svn53954-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn56715-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.3svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.52svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn24638-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48744-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48052-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8asvn51727-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21338-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44131-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn36989-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn57617-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24498-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.11svn56271-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.32svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20191225.0svn58661-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1415svn18042-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn52160-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn50828-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5bsvn28195-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn17992-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.2svn23698-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn54677-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21606-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18488-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn50782-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17205-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn58724-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58682-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57963-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn58470-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn25025-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.33svn58585-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47523-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn26137-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn57721-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.2svn49064-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.1svn58436-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.1asvn38630-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.2svn38558-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.0svn38727-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58622-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.33svn55643-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.35svn58435-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn24825-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.2svn39080-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.05.34svn27369-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn45935-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47518-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.995bsvn19612-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn53193-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.5svn56361-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.14svn56609-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.18svn53166-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.50svn19601-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn39597-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8.5.7svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn31315-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn25218-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58509-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55426-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57789-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58296-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.13svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51124-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn46040-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn33454-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54070-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44394-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45756-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31402-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn27764-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58476-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1svn55846-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn23806-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34481-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2msvn36680-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20201001_pl4svn57354-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210501_pre_release_0svn56791-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210501_pre_release_2svn57982-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57981-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40612-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2svn25505-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57311-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0ksvn57981-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28888-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn54010-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn29235-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4.2svn57349-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55475-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn15878-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.63svn53131-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn45076-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210501_pre_release_1svn57982-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn49729-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn55228-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.6svn53248-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn29349-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn57213-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn57275-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.29svn49249-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0.2svn54389-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0.1svn49759-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0.10svn35999-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0.10svn36000-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2svn55475-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0jsvn58151-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.13svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn35702-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.00svn36866-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1asvn49888-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn53525-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.1svn39026-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1svn55265-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.3.1.1svn55540-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.22svn26760-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.3svn29349-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn54811-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.9.1svn58595-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.4.70bsvn57213-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.2.1svn55643-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.6svn53109-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.2svn53485-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.3svn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2svn19087-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.6dsvn42428-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0asvn17691-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn46432-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.3svn16549-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn52851-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.3svn31474-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.1svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.3svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.6svn52275-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.1asvn56878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn58503-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn23916-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0.5svn53642-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1svn58393-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.19.4svn41811-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1betasvn56182-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.3svn52450-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0asvn55064-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.6svn53022-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn54266-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn53709-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.002svn54722-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.23svn54560-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn21750-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.1.0.70svn57564-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0csvn17364-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.1asvn36026-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn21818-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.5gsvn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn31795-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.0svn23638-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.5.3.0svn54583-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.01svn44616-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.02svn55064-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.7.040svn57948-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.28svn57398-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn57754-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.2.2svn56861-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn27789-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn19880-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn56018-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn39375-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn56003-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn54512-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.007svn19409-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn53653-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2.0svn56513-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2.4svn56473-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.2svn44863-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1.8svn54329-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.9svn21523-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.4.41svn57866-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn42268-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.4.3svn30815-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.1svn41304-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.30svn55415-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.3svn58123-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.0svn38722-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.2svn29349-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.2svn17373-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.8dsvn55265-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.67svn29349-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.5svn53097-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.03svn34893-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.63svn51923-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2svn16134-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn46039-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.1svn20021-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.1.0svn55117-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.005svn58637-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.959svn36915-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn25552-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.7svn58061-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn56019-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2svn20422-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn56496-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn24499-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn33254-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.2.5svn34491-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.08svn57457-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.6svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn53003-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.07svn45678-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.2.0svn55117-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn39028-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn34302-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.2svn27889-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.3svn30704-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn36918-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.8svn20843-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.9svn31077-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.0.0.7svn21322-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.0svn39804-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.6.02svn56036-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.4.27svn55643-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.1.3svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.6.4svn58309-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.5.05svn39323-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.5.01fr_0svn23332-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.3.0csvn55643-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.6.2svn57038-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn36207-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn58468-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.4.26svn15878-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.5.01svn31296-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.svn55643-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.187.5.01.0svn55643-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.20svn55643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn35050-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.32svn55643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.20svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.00svn55643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48160-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1csvn49503-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.9svn45913-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn34923-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.74dsvn17533-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn43746-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn56421-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2dsvn21869-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.04svn38663-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn50992-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn57521-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.3csvn28332-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21927-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn21586-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1asvn24897-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.0svn56414-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7asvn47527-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.3svn56306-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.32svn58744-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn56414-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.2svn58745-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn55206-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn57349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1asvn55777-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn25193-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.17svn57829-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56200-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn50788-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1bsvn25882-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.973svn20491-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn35490-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn57463-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn30473-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30474-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn56541-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48469-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.73svn57277-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn55475-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.20.7svn58279-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.17svn57443-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn54779-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56113-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn49419-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37877-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58702-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn41456-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn52663-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20210319.0svn58542-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn58085-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn20747-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn53825-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1isvn58087-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1nsvn57183-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.895svn57836-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn32354-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47848-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0fsvn51252-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.63csvn52851-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4asvn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn31498-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn24694-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn52983-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57373-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009220999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3gsvn58563-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn41012-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1esvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.85svn49311-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn46702-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52851-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.6svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44823-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn52811-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn28973-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7.5svn49720-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54684-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45777-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn36110-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49874-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.2svn58760-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56016-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48281-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn55064-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4bsvn48383-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.9.0svn56414-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2asvn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn58635-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn29845-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn35773-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.43svn36270-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44131-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21129-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn52305-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3wsvn52840-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn53044-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1fsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.31svn31639-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn34301-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn53519-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn49547-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn53035-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54244-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.2svn39864-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.003svn52663-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46754-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn37763-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2bsvn42773-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn31957-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.26svn58725-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn34323-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn17582-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn46155-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.62svn58756-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn18173-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn31648-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.3.1svn57333-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9bsvn31075-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn20298-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn28399-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05.4svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn57528-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.15svn58025-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38828-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn31878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn55918-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48664-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.7osvn58666-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn30452-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn49631-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn50268-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45997-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.994svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn55643-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.1svn57172-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn56060-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56365-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.71828182svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn18611-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn49774-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.0svn55010-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.93svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48753-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn56246-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.56svn37105-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.6svn49923-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn17485-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18489-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn52323-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05asvn58661-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn57018-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.06svn45803-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn42428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.002svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46036-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn28444-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn17745-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2svn41676-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52662-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn38224-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn49651-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8csvn58394-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn17484-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn18789-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41610-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn54361-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2asvn30914-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn43752-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.96svn32559-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58395-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17483-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.62svn48196-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32165-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn44855-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32069-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8fsvn42186-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn56949-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.004svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn26313-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn29725-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn33700-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn56878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn53021-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6asvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn57458-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn57186-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn56927-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn35521-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn55729-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn18651-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn50010-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.0svn57496-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03.1svn47269-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn55518-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2svn56303-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn56886-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn29803-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44142-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47599-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn28140-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.ivu.04.092svn29349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn57683-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn24479-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn37927-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r0.83svn38815-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn17513-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3asvn22126-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49531-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46946-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn26473-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.34svn29349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn39729-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.20svn23252-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn29776-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.004svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn49559-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57347-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.17.06svn44453-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57473-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.16svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.51svn49578-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn46106-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1+svn17967-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn43445-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn56991-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21775-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn38035-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn30939-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn56366-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn40637-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.42svn18302-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56291-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn45943-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9bsvn49065-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn58396-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn54758-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53596-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn47472-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.2svn21649-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.31svn57353-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37762-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40307-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1dsvn24857-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23861-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn29370-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.75svn44352-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53520-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3csvn30021-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.6svn26807-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56751-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn21392-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn41996-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn45130-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn55559-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn24741-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn58026-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55881-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.03ysvn56224-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn29558-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.19svn38100-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.8.31bsvn20668-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn32693-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21819-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn41413-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn41643-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5.3svn51810-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2017.2svn45107-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46639-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3dsvn29601-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn27323-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn31500-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn39029-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn18704-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.02svn57801-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29331-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1lsvn52906-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.9.4svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.51svn58212-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.414svn56845-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.642svn58748-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.053svn56527-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.056svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn47382-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn23996-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn58256-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43640-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7asvn28527-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1csvn36086-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44671-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.13svn58667-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r0.67svn38914-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48295-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54191-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.013svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn55877-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn50492-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn16437-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn58328-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.07svn53768-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn37984-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0svn56575-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30140-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn56742-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.2svn35709-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn26786-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.5svn57263-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn16549-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn17598-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn22114-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18128-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37675-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r11svn40125-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn42428-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0msvn52231-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.1svn41906-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn45396-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42361-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20191119_unicode12svn53968-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18129-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn58726-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.52svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn24066-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30991-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98svn51389-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01asvn29027-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1esvn56959-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54252-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.33svn27609-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.203svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn22256-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47307-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn33109-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51640-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn57759-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.2svn31729-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18130-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44895-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.39svn27498-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn56912-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn57429-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn54392-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56291-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19389-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn33355-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn28803-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.50svn57531-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25689-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20852-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20969-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45674-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn38449-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16991-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24876-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28668-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn42872-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn17932-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn57213-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.may_2019svn54080-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn33046-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn52525-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.20svn42927-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn17474-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn54512-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn44951-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn27331-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn58515-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn50941-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2bsvn18131-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn39030-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.3svn58432-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn15878-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn57390-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn54328-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57253-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn44889-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn23714-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45777-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21833-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn58661-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54254-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18360-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.94svn21095-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn25192-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn45601-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.12svn57866-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56079-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53889-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24947-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.002svn42617-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47621-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0isvn44487-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn16915-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn56105-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2fsvn39164-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0lsvn34521-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn23667-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn19230-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.35svn49560-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40042-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn43021-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32859-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0.1svn56621-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3bsvn51720-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn54840-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn21475-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0hsvn58358-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn55859-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn32313-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn32263-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn39542-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42428-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn41379-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn57972-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16490-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.05svn22045-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn16005-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21629-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1lsvn54512-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn57161-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40986-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn24807-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn24830-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn32809-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn17583-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51127-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn53521-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn52912-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4asvn49047-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7asvn18735-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.40svn55435-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.15svn53082-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.03svn56991-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.32svn46617-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn53047-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.95csvn58511-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn23492-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn57923-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn37946-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5tsvn58212-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.0svn57735-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48245-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn45985-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn50100-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn42428-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20373-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57973-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn49169-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.33svn55777-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.16svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn31016-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.3svn50338-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.00svn57166-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn31990-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn57508-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn48861-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn54080-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn52162-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn37297-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0001svn25915-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn39165-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r36svn31934-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1.8bsvn57240-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn54512-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52635-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn55342-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn32269-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.0svn58467-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1.1svn55342-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn55342-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn52662-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1svn26093-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21svn35152-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn54770-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1asvn56615-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn55326-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54191-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.17svn54080-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18651-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41857-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41858-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41859-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn45084-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41869-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41870-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn41871-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn36396-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn45356-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn56954-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn51933-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56468-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.2svn43963-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18739-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn58727-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn28590-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.0svn58728-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21574-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn57349-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4bsvn56504-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn21943-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24965-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn54867-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn19440-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21894-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn24769-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn55966-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24731-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.618svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn57508-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn26032-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn56061-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.0svn47486-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.0svn58729-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.09asvn58661-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1d1svn45145-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn19848-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn15878-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.141592653svn57963-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28424-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4asvn27765-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52783-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29803-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.1svn55214-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57729-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn49557-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9nsvn57731-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56005-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.07asvn47562-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn56605-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.3svn30353-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5csvn31088-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.07svn56868-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn53046-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.4svn54378-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.94asvn57672-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.2svn39249-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn16287-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1415926svn56082-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn53129-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.1svn39921-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56070-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.5svn53633-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.4svn44213-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.101svn20075-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.52svn58444-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.19svn44832-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.6svn55837-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.05svn52080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55920-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21641-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn18305-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn58730-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02asvn52922-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn47963-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.13csvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4nsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.3svn52312-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.00svn57000-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2011svn30447-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2.1svn50048-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn35147-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.12.3svn56708-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn54080-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn57902-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn19847-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.05svn44783-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51771-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21893-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn20886-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98svn58710-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3.14svn44214-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn19519-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0b_4svn33822-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51194-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn50938-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7_svn_8641svn52221-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40538-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn33033-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41633-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn25562-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn51919-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23552-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.68svn53559-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55013-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.3svn52582-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.04svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn26243-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.17svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.35svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn57434-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.9.3svn54694-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn17257-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.06svn56758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn19591-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn46643-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn41980-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn22138-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn18734-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.18svn45096-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn41981-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.62svn40685-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn49817-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.47svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06asvn49422-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.17svn55289-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.07svn37377-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn48230-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.98_betasvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn46579-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.16svn17556-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.03svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.14svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.75svn56474-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.2svn19296-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.06svn45289-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn48781-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn45109-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11asvn54376-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn17909-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.95svn55439-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.22asvn35832-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.06svn46273-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn45319-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.34svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn21717-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn33210-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn20946-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn16033-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.04svn39077-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.95svn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn49556-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.16svn49780-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn50925-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.65svn49425-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn32997-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn49223-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.42asvn54687-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.22svn54514-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.15svn58293-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.0svn57977-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn41999-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.82svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.07bsvn54963-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2fsvn56622-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn45875-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn39585-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn16538-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.92svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03asvn53482-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.63svn35062-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn45316-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44724-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn23464-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn56070-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn21667-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.31svn24391-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.13svn45097-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.34asvn49520-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.13svn38613-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn49542-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn16369-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10svn54518-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn43272-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.02svn52261-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn23451-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.83svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn28801-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn45320-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn49316-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn25228-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.20svn56172-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5esvn46393-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.01asvn58731-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.89asvn53763-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn34363-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42857-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56487-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20201227.0svn57239-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46940-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57128-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20200520.0svn58632-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn30171-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn50810-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn19440-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn27388-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn27389-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.003svn24649-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn29725-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn57254-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.6.2svn58478-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1bsvn44756-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7esvn56537-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn47266-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21838-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7bsvn57950-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn55006-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn30212-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn57445-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3dsvn58168-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn43009-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn53733-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10svn57190-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21svn27064-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43191-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.17svn52174-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6.0svn48400-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45797-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn56190-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.51svn36065-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.1901.1401svn49722-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1bsvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.6svn54911-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.1svn56862-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56020-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn42183-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn52276-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56926-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1csvn32818-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.81svn57601-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn57602-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn54191-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21svn57597-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1.0svn56319-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3isvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn57638-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn42629-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57520-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn54723-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn45281-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn49513-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48515-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2csvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1asvn56291-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.11svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn57433-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn42467-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn52865-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3dsvn56594-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56623-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.7svn58732-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37026-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19980-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.1svn29128-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn53164-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn44131-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2csvn40612-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0esvn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn20318-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn19979-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2fsvn58668-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn54485-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0hsvn25050-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.37.2svn58763-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22050-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn30707-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn34924-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn24305-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.19.06svn51363-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56433-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn54841-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.35svn50935-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn57068-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.1svn54815-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn48485-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24976-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn43505-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2esvn56591-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0asvn56589-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1ssvn56590-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn53858-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn31137-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19082-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn57173-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn54080-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn15878-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn49877-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45818-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn56895-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0fsvn25005-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36236-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.008_v7_scsvn19537-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20087-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0bsvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn51688-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn18292-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn18740-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn29675-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn39796-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn27322-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1fsvn41923-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn37965-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn30084-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20003-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.0svn46791-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn21081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn54251-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn50984-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn32392-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56594-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25209-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn51073-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn23739-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn19614-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.3svn50119-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.36svn33945-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7asvn32815-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn53292-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn58661-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2.1svn55475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn17997-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53628-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn51356-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn48365-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.95svn45963-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn13293-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn31565-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn40525-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn42809-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05asvn42633-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn51805-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn58212-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn58020-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.030svn58733-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55838-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.2svn56683-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn58359-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4svn35730-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn53305-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.0.2svn47923-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.18svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn35087-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn53504-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.41svn50073-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.18svn56258-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44906-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn27223-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn44965-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn27810-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.1svn58746-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3asvn56733-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2dsvn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.8svn54678-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.1svn41401-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20208-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53657-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20180-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn37749-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1dsvn50339-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn43595-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20185-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn53098-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.302svn38721-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.463svn56863-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53607-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn56841-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.62svn34011-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.41svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn37568-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.45svn56530-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3csvn41732-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn20186-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23799-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23446-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23734-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53127-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn36613-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn49750-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn40613-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.7asvn24881-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.2svn33042-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn40088-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn46628-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn41653-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn20209-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.15svn30959-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn22212-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53350-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20312-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn26522-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn30708-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn42428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1bsvn41991-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52334-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn50555-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn46126-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.0svn54407-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn28918-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3ssvn57414-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5csvn39787-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn41322-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn20336-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.2svn57740-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6fsvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00asvn54524-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn39707-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5bsvn27028-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43057-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43058-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn56761-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn29260-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6asvn35537-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45673-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn54915-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.1svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn39074-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20620-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58414-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01bsvn31719-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn22136-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8csvn58714-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.3svn46259-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20031-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.52svn22781-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5dsvn56950-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.2svn57922-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn24652-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn30560-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.0svn56734-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5asvn52411-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.12ksvn52412-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn51907-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.11svn25007-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn20333-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3bsvn42781-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn20311-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn39592-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.14svn56735-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5asvn57147-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.5svn18136-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn51494-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn27128-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn16215-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn56495-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn52663-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn53163-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.2svn50815-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.7svn54512-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn54892-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn54512-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56840-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42225-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.05svn51005-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn42821-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn57842-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57296-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.2svn50072-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.41svn30715-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn34374-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.25svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn55933-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.17svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2csvn39766-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn22408-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn50147-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn39529-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45818-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn38710-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9.0svn58734-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn31585-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32293-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.01svn53843-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn53915-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn56291-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0svn54512-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn19982-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn35718-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56809-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn20306-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn23961-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn52212-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn20334-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn46925-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn46434-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.11asvn36696-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.5svn57307-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0b1svn57074-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn50489-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.034svn57193-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.3svn54512-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.12svn58735-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.2svn57448-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22027-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.2svn24431-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2betasvn56320-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12svn52982-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.24svn57097-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47859-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3c_0_g7d3fc5bsvn47931-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn56774-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn19440-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn43516-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn56291-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn51480-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1csvn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20308-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1.5svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn56977-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.14svn29349-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2asvn40989-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.4svn32066-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn16117-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn16080-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51273-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.2svn57650-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58752-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009221999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn51909-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1gsvn53658-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn58736-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19440-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.02ksvn57010-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn32199-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.43svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4dsvn56291-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1862svn56291-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7.4svn17554-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn50019-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9.18svn57213-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25446-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54267-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54074-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.2svn56685-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4.2svn16252-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.34svn55015-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn47870-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn25202-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn41849-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42413-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1csvn32804-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4bsvn48815-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn34495-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58742-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54744-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0esvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.07_gsvn31855-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5svn17255-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn51543-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51729-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.10svn46848-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.9svn56615-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn17885-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10svn34368-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn28908-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0.1svn52064-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn42138-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.80svn57954-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.42svn27345-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.77svn31731-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn20484-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn57835-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.40svn22018-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.42svn56610-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn33043-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn49889-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.06svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34495-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn39596-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1svn34594-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51481-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn22514-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn47111-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn18923-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn37700-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn38928-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn52213-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn49732-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.4svn57684-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.141592653svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn18314-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.501svn48058-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41264-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn40533-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16372-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48500-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn58471-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn41403-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.8svn57349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34177-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3csvn56878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58348-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.04svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1.1svn49013-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn49362-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn56466-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn29752-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn55064-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.3svn58477-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6.0svn54557-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.v2r3svn51030-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.40svn54246-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn28553-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.1svn57911-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58055-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54496-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58648-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58572-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58221-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58579-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58653-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58581-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58649-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58426-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54594-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54490-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58646-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55777-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn54526-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1svn19083-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1esvn57692-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2svn50985-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn53676-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.3svn56083-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn29349-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn43151-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn46559-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.18svn45678-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn52092-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5svn20591-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn30788-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn44192-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.01svn20677-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn23796-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn56441-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48474-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46844-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn20770-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn44140-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2021.03.01svn58019-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.10bsvn51789-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn45363-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn57207-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7.0svn54287-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.42svn49124-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn39669-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.72svn56070-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn28754-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20675-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17383-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn34206-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn51347-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6svn56435-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn16549-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.17svn48625-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0qsvn33134-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn16736-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.7.2.2svn58750-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4dsvn42280-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36306-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25087-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn56820-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn38295-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn57444-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9fsvn49201-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn35805-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn51915-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn56615-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn51490-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4fsvn52890-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn47026-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46555-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55288-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9svn46660-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn55920-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn51884-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.1svn32769-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.3svn43466-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn42039-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn43442-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.2svn55002-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn26108-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn51355-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn49424-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7fsvn56291-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn57300-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn50020-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.13svn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn55713-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn28715-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn58469-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10svn57843-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn36439-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn55827-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn43978-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn25777-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn32732-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.6svn30637-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.10csvn49975-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2.0svn58737-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55325-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn49740-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn35058-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31491-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42882-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn22005-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn38646-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn36170-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19457-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn43497-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn18729-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.13svn52413-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1dsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.06csvn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn57485-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.43csvn55265-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3csvn55031-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn57484-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.4svn54512-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.12csvn54940-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.17svn51431-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn26096-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56221-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5ksvn20085-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.04svn55852-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3jsvn53364-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn33146-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.142svn17746-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.3svn56166-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn58254-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.1svn32260-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56514-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19084-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.2svn54758-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.0svn48182-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.4.06svn56276-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn56214-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn21178-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.00svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6svn42428-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn44455-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn55707-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24344-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.15asvn57508-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23804-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24345-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24754-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24196-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23840-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24010-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23957-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25105-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn24228-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.10asvn57461-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.12csvn56052-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn52981-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.91svn21751-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn28176-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn43006-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3bsvn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn18732-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn18921-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn23440-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn20680-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.13asvn58661-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.06lsvn58713-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.5.2svn37649-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.24svn56942-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.25svn51373-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.9svn27253-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1.0svn36298-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn58561-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn17748-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3asvn29803-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5.1svn55675-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17024-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn15878-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn21839-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn43327-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21820-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn49731-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn27046-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17134-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.31svn29349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn46641-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0.7svn37623-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.7svn44238-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.21svn24994-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn58558-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.12.12svn57349-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn58669-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn38459-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn52527-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn51690-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn40772-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.03svn38907-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4svn58029-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn35853-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.0svn52698-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7.1svn57866-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.0svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.0svn36371-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn16791-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44026-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2csvn39570-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn29974-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.25svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21081-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53365-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn26313-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.3svn52972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2016_6_8svn41348-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.20svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.11svn17476-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn19085-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.001.002svn18651-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn51207-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn33625-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn43639-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57286-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.0.1_r1svn29019-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn18261-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0lsvn36681-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56291-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn31541-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn31409-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54236-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn42482-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.14svn56768-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8qsvn56594-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn51968-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn57257-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn53162-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn22357-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn55060-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn58749-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45581-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.9bsvn42428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn51984-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn33860-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.13svn56913-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51647-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2hsvn52822-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn29476-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5.6svn25355-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn19700-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.1svn54512-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22511-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.20200406svn54758-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn42334-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn26059-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56832-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54045-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn47354-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn49903-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0bsvn48602-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.4svn32528-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn55777-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn21701-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0asvn25969-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn32261-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.04svn42456-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn27744-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.1svn58661-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn48648-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn55291-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.3svn56729-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn27354-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.6.13svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn23431-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn55423-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1.2svn46611-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn32262-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn44154-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.92svn24104-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn55191-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56905-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.17.1svn55475-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn47952-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.005svn19444-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn21922-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.13svn33197-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.06svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn17177-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn23670-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn56625-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.1svn57766-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.4bsvn34017-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn21920-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.55svn21921-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn55777-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn49429-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn32457-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6.1svn30080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn38647-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn39799-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.65svn54080-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.2svn30579-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1svn25629-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn32954-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn26039-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3svn21598-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn51126-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn36254-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn42428-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3.1svn45568-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.01svn22028-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0csvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn21439-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.5svn53533-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.001.002svn53534-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.5svn57972-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25813-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.2svn50694-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn53409-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0dsvn58172-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn54866-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57577-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3.1svn52641-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.6csvn58120-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22459-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0bsvn22338-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.7svn46165-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2bsvn15878-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48423-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn22048-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn31532-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn25469-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.0svn55558-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.8svn55876-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn53448-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.216svn58755-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.16383.99998svn53486-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54958-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn54080-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.12svn41044-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn42289-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn41809-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn20031-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn36435-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn50449-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.prot2.5svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.00svn39694-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn54338-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.51svn42046-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn54080-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.8.6svn56711-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn29660-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn54308-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn53160-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn35756-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57186-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.0svn47546-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.23.1svn55194-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1asvn56272-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn51908-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn58212-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn57972-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.5svn34296-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.4.2svn55475-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17055-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.1svn28847-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45845-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.1svn58633-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn56291-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn43864-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.08svn55654-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.05svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.0.1svn46662-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.01svn22575-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4.0svn38929-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45804-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn45805-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.28svn56295-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4dsvn58738-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.302svn55730-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.1svn54512-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn57006-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.28svn56910-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2esvn56855-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn56594-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8svn57186-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.2svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4.1svn56614-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn54563-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.86svn53998-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn27442-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn37604-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2asvn28770-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.9svn56709-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn35928-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn26641-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn35211-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.16svn54097-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.20csvn57619-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn51432-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.83svn49946-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.3fsvn23347-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn47049-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.981svn30466-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.09asvn57265-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5.2dsvn28090-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.5.06svn32182-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.8.9svn31859-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.5svn15878-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn48568-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn29803-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn42830-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn22613-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0.7svn58683-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.03svn54080-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.3svn51725-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn46201-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.6alphasvn56291-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4svn50755-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn36013-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.6svn54377-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn40207-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.3.6svn23348-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.1svn56500-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn34398-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.4svn58712-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.3svn27430-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn31835-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn58543-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.8.0svn51554-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn17258-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0esvn51142-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2.0svn54994-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.r206svn22207-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn40728-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.8svn54960-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.svn41145-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.1svn32279-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.02svn51368-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.0svn50619-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.2.32svn56611-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.4dsvn53965-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.2svn28539-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.1.2svn53884-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.0.0.7svn53500-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.186.17.7svn55862-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.36-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0rc8+git.20210821-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2a-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.00-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0_git201402282055-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210608-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.9-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.96-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9.34_5f9c029d1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19.1-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.3408-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.26-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.16-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20180125-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.17-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.66-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.107-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3+20201113-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.1_01-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1-16.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.13-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.15-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:368-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.32-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.73.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.49-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.72-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:94.0.4606.71-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.24-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:94.0.4606.81-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5+svn.2173-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.69-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:94.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0_01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.2+git.193.a4d6307f1fd-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.11_ce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.6.463+g22e7612f9ad-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.73-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.33-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:96.0.4664.110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180314-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.52-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.20211110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.64-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220105-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0~alpha7~git0.c8468199-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.3~git1.0a74fef5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.15~git0.6b6d2f7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20211029-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1~git0.cce1b08-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.1+0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1~git5.8612dbb-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:96.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.4063-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:97.0.4692.71-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde268-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.72-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.55.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.92-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210626-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:97.0.4692.99-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.64-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.57.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.32-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.37-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.50-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.120-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0_04-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7045-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.34-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.39-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.12.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5+git.328.f1f29505d84-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:98.0.4758.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.4286-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde294-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:97.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:98.0.4758.102-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1.0+git.f5b0599a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.120-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.4456-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4+git0.e55ab4208-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde294-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.51-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2.0+git.9044aa99-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1m-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:98.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.37-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6~git0.c21ce78-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git0.5b3eac1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0~git0.625c965-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1+0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.3~0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.15~git0.6b6d2f7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.1~git0.ce9627c-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0_06-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0~git2.841ef94-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.74-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1n-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.39-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0~alpha7~git0.c8468199-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009222999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14~git25.e6431d959-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220323-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.84-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.5.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1~git4.b7f891097-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.60-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.75-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0_08-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.13.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.88-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.17.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.38-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.28.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.127-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.14_ce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220420-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2022.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1260.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.17.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.20220416-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.22.noko2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.83.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.14_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.09.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.1_k5.17.4_1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:101.0.4951.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.4877-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.34-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.17.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~beta.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2204.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:101.0.4951.64-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.83.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.08.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220510-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2022.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0~rc3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220516-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0b1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-645.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.30-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220429-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.0.5005.61-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1~git22.faef73366-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.5.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:101.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.25-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.68-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1o-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.0.5005.115-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.53-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1p-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.61.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0032-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1q-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.114-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.48-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.134-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.36-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.42-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0032-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.84.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1_02-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1_06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.20220624-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.05.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1+git.1658128747.6bd05c9a4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4+git.297.1497eb221ed-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.5112.79-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0224-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.5112.101-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.13.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.85.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.93-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.14-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.09-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+20220724.dce51f9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.5195.102-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.66-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0453-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.49+3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.5195.127-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1599_20220912-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0rc2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0453-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.63.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0500-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.09.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.6+kde177-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.25-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7_k5.19.10_1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.32-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0626-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.5249.91-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.67-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.30-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.P1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.5249.119-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2+git.1665512451.0eef939-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.96-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.37-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1+git.270.17afe7cb6b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2+57+suse.cf3c1e9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.86.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2+git.273.a55a83528b9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.87-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.06.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20221102-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-646.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.06.0.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:375-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3+git.279.ff9bb8a298-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0+44-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.121-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202211-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.71-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.94-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.3.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.0_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.124-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.18-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.87.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4+git.300.305b22bfce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.30.1672298042.141cd65-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.20-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:109.0.5414.74-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.25-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.65.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.3.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0+0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20180125-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:109.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.20220816-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.55-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12p2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:109.0.5414.119-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.0_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3a-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.913-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.11.58+g38d6afd3b78-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.150.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:608-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:113-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:110.0.5481.77-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3+git0.1065b1000-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1t-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1+git.1676027782.ad3c0e9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230214-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.0_04-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:43.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:110.0.5481.177-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0pre.7~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0~rc1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.88.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.76-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1367-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:110.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2~git0.4ccc639-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230221.00-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230222.00-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~beta.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1392-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:111.0.5563.64-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.56-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.23.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.23_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.59.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.13p3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde183-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1~1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230214-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0~0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:111.0.5563.110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.96.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1t-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.1+git.298.4ccf830b2a4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1430-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.0_06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.55-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:111.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1t-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.5615.49-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.8.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.43-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.56.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0~dev20230104-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0~alpha11~git0.d3a2a6b-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2~0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1~18-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0+git.1681457715.54484b7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.5615.121-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.5615.165-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.30-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.89-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.30-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1504-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0a7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2304.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.46-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.7.5~git78.2bef6fc-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:113.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:113.0.5672.92-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.33-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9+kde8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1538-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.5-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0beta3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn27321-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn12688-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn28038-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn65877-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn57089-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66084-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn3006-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29036-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66003-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn52909-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn18790-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn62210-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn45266-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn65257-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66402-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66478-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn16219-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn17794-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn15543-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25623-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn38300-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn52631-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn64151-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37223-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn51944-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn48871-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66562-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn30408-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn45927-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn50528-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn46996-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn48478-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn24061-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn23866-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn53554-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn17399-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37645-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn65210-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn24759-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29031-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn8329-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn44515-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66547-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29050-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn18336-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25860-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn14752-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn14758-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25997-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn13663-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn34971-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn54732-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37813-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn56984-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn44835-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn49033-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn32101-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn46894-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn54358-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn53999-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn30983-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn42296-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn42300-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn16420-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25012-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn32150-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn10937-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn27025-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn56352-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn31696-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn26126-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn15093-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn41465-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29005-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn32346-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn61207-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66511-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn34647-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn43292-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37750-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn38769-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn23500-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn23661-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn23406-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn14428-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn8457-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn33688-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn18674-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn30534-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37026-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn53804-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn59817-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn65625-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn10843-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37537-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn14387-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn52858-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn41779-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn49140-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn40690-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25962-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn16181-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn39165-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009223999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29348-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn13364-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66079-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn32405-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn7838-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29333-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn44206-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29335-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn34996-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn31638-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn32919-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn64356-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn53577-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn55933-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29688-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn38710-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn21215-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn37771-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn64447-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn13013-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn45011-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn15506-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn12782-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn47948-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn29741-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn33155-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn24062-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn61780-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn61328-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn43596-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn53444-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn6898-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn55132-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn50281-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn25648-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn52800-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn66382-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn23262-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn6897-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn50419-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn46165-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn49312-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.20230311.svn34398-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:113.0.5672.126-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.69-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.28-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.51-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4+git.1682509819.1ff135ea-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.75-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9+kde154-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1u-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~beta.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.90-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3p1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.106-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.133-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:32.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.10+kde129-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.74-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.198-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.17-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0b3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.086-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.56.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.85.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0b4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5.5907-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.36-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2_3_gd478f380-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5790.98-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.55.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3p2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1u-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.5+git.313.c8e274c7852-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.56.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2_3_gd478f380-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.17-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1v-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5790.170-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230731-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.17-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5790.102-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.71.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_06-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:v.1.4.2~0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230731-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2+git0.61a0f576a-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9+git.35.4b9444a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.68-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.27-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20230121-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.96-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.07.06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.32.1689011721.5d45ce2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.180000-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.9-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.2-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.140-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.28-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.21-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.02.01-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.25-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.179-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.34.1693646983.2a2ae77-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.25-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.16-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.187-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.7.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:384-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1w-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.56.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0rc3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.72.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.43-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.5938.132-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.93.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.36-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.96.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.8.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.5938.149-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0.1909-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231007-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.11+kde134-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.5993.70-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.31-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12~rc1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12~rc1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.53-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.82-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.1+git.312.c912b3d2ef6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.96.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.57.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.36-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.2+git.322.7e9201cef5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.58-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:254.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.5993.117-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.11+kde138-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.11+kde6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.82-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.73-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.47-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.14.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.123-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.159-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.11.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1w-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8+20230721.002171b-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202308-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.27.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.11+kde138-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.199-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231128-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.38.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.15p2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.57.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.70-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3p2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.90-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:121.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.23-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231219-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.97.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5.6924-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.56.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.2-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.12+kde147-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.660.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.65.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.40-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.4+git.339.acf1ccaa020-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120.0.6099.216-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.290.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.11.30-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.85-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120.0.6099.224-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:122.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240101-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.02.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0_06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2u-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-307.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1w-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:254.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.109.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.47.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.12+kde151-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.85-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.18-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.15.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.11.16.3_3_ga95067eb-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.46-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.90-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:123.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.18-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0_06-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.72-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230101-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:121.0.6167.184-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.310.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.49.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2.1446-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:122.0.6261.111-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:51.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:122.0.6261.128-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:217.293.v56de4d4d3515-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:261-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.98-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:124.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.1_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202308-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.61.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git74.3426c0a-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6p1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.2_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.04.09-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3~git11.d3d77e0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.21.16.3_3_ga95067eb-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.105.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.6.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.78.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-680.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.20240314-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5~0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.3.2~20240430g19f0abd6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1w-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.66.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202308-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:124.0.6367.201-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.63.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0~3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.77.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.80.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.954.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:124.0.6367.207-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:126.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.60-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.76-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.112-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.13+kde1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240528-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git74.3426c0a-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.141-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.18.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.48-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k6.9.3_1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:70.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.90-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:127.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2+git0.322fea0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.67.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.643-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.19-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.63.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.166.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.19-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.03.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.07.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.07.01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:320-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9+52-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0~b3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009224999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6p1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.61-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.91-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.49.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:126.0.6478.126-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.43-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.9.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0.1-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.1.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009091842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.53.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240712-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:30.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.23.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.98-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202402-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.13.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.2_06-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:126.0.6478.182-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.14+kde143-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.39-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1w-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240730-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1~git0.aef1668-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.112.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0~20240731.edfe0bf-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.73-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0~rc1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93vu-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.19-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.78-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240809-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0~20240812.ad9f0e0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240813-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:127.0.6533.119-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.21.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:30.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git97.675e45f9-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.0_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.84-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.75-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7047-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:72.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.19-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0~rc1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.113-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1~git13.a9c7ff9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4+git0.7a59afa93-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.18-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0~rc3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.119-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0~20240902.c95cc9e-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0~rc2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1+git59.b6681f98-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.137-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202405-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0+0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.33-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.58-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3~git0.ee7d7ef-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17~rc1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0~git66.972ac93-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.70-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240303-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.4+git.c114912-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.0_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.15.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.89-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.106.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.11.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5+git0.8e879a52e-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.05.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.81-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.56-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.01.16.3_3_gc13ff2cd-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.58-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.04.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.26.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0~a1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241030-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.69-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.114-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241030T212825-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.05.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.91-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241101T215616-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241104T154416-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.18-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.116-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241106T172143-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.6-392.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3+git129.387f34d-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241108T172500-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:132.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241112T145010-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.82.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.68.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241112-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.11.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.69-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241119T173509-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241120T172248-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.85-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241121T195252-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.68.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.97-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.33-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241114-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.0_06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.38-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.7+git.0.b48d0bb-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.120.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.115-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.108-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.8.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.21.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241209T183251-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.139-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:133.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.15.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.15.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0+git.1733745604.d499b6e-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.15.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.4.1_ce-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.3-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241213T205935-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.16-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.78.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241218T202206-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.0+git.90c24ee-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.204-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241220T214820-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.98-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.34-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250108T191942-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.264-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:134.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.370.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.44.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.69.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250109T194159-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.16-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250115T172141-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.213-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.213.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1611.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:132.0.6834.83-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.144.03-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.144.03_k6.12.9_1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git142.862ef23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.170.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:565.77-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.170.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.26.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:33.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.24.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24rc2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:132.0.6834.110-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250117T214834-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250128T150132-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.58.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.16+kde2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.31.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:132.0.6834.159-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230603+git.5fdd2d6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250115.01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250204-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250130T185858-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:135.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250204T220613-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24rc3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:44.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:133.0.6943.53-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.61.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.442-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230603+git.5fdd2d6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250207T224745-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.03.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.16-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0~a4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.118-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250206-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250208-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250210-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:133.0.6943.98-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250115.01-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9p2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.70.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8c-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:133.0.6943.126-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.2.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.59.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250226T025151-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:33.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:134.0.6998.35-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.88.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.44-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.0_08-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:136.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:668-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.3.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1957.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250116.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250115.01-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:33.4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:134.0.6998.88-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250312T181707-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.44-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250313T170021-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.99-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.35-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250318T181448-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.102-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.39-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:33.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:134.0.6998.117-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0+git.1742269202.0ab94c9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~git55.7fbd4526-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.98.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250327T184518-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.127.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.3+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.15+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.11+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.7+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:136.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.45-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.05.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250331T171002-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:135.0.7049.52-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250327.01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250402T160203-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:137.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250408T210408-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230101-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250409T170536-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.5.1_ce-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.49.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.45-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250410T162706-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.54.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.15.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:137.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250416T165455-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:48.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250422T152923-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250422T181640-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:135.0.7049.95-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.69.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250424T181457-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1+git20250329.c2e3bb8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.1.1_ce-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.104-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.40-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:136.0.7103.59-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.69.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~git90.2bc7250be-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3~git0.ee7d7ef-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250506T153719-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0~git0.d7ae0f336-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.1~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1~22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.9a-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.97~0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0~90-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.0.git103.bae893c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:136.0.7103.92-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.4+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240905-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0p2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250512-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.8-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.17-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.9.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250515T200012-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.92.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0~b1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.0_12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:136.0.7103.113-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250520T172319-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.9a-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.73.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250523T151856-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.57-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.1+security01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250527T204717-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.21.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250529T205903-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.17-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.25.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.33.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.350.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0+git0.e134140d2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.17-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.11.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0.7204.96-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.12.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:48.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250612T141001-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.94.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.17+git.0.4a97692-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.17+kde122-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5699-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3~1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.05-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.6.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.61.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202505-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.87.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.904.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.7.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.51-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.44-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.45-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.8.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.18-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0~b3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.23-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7+70-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.2+git.396.c752843dcf4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.17p1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:257.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.106-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.42-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git163.87ee3570-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.15-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.06.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25rc2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.50.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.64.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.1_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5889-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7+117-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0.7204.157-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.beta+14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.2~0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.64-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.50.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.3+security01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0~dev20250722-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0.7204.168-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250721T052808Z-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.47.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.65-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.180.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3.3_ce-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:138.0.7204.183-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.0~beta1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.18-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0~rc1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.23-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250730T213748-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17+60.68fdb92ec-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.05.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.08.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25rc3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.7258.66-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250807T150727-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0+git.0.6befefc-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7+141-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:570.172.08-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:570.172.08_k6.15.8_1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:570.172.08_k6.12.41_1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250811T192933-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.136.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31.16.3_3_g3d33c746-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3+git~14~gcee0d0d-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.107-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.43-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.7258.127-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5+git11.949807a4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250818T190335-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250814.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.7258.138-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.58-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.124-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.46-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.45-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.85.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.108-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.44-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250812-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.137.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.70.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:139.0.7258.154-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.46-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.86.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.46-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.45-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2+git.0.2d04bca-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.126-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.0.7339.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.400.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.40.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250908T141310-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.2~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.1_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.0.7339.127-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.2~git0.18e58c2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3~git0.ee7d7ef-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0+0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.16-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.112-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.17-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250917T170349-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250918T182144-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.5+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250922T204835-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250924T192141-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.0.7339.207-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.29-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.0.git21.a73f509-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.30.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6+git0.81568b2d1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.139.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.11.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.127-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.65-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.282.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.98.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.107-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.09.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251021-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0~1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.122-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20251023T162509-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.128-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.20250826-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.1_06-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.09-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.15.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.59-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20251029T215107-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.8.0p0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.06.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.26-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251028.00-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20251105T184115-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.48-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.1_08-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.134-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251107-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.162-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.13.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3270.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.175-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.82-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.72.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.24-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.19-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.51-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.24-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.64-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.40-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.59-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.15.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.11.90-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.52-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590.44.01-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590.44.01_k6.18.0_2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590.44.01_k6.12.61_1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.66-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0+40-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.09.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.39.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0~preview2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.109-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.31.17.0_2_g4f253b9b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.130-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.146-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.19-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.68.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.27.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.192-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.18.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:147.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.3+rke2r1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.36.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.59-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.54-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.61.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.96-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260119.00-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.30-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.20-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.01.17.0_1_g4f253b9b-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.27.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0_04-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:147.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.109-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.36.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.69.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.35-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.27-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:346-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.132-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:354-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.5.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.14.0+0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1770718745.ce2072d3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+116-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.51.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.1~git0.efcde93-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.2~0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0~1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260202-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2~0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:49.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3+git0.465d8e2fc-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.55-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260213-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.147.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.19-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.45-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5+git0.9dd526c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.0.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.83.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.14-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.73.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:147.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260210-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1+git78.f951e3a-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.109-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.30+git231.bca15e70c-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.28-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:348-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.7~git0.61e54f1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:148.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.116-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.143-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:29.2.1_ce-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.58.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.11.17.0_1_g4f253b9b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.15-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:356-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.29-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.22-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1+git20260303.90d816d-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.147.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.159-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.58-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.18.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:53.1.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.52-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.73.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.40-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.46-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.222-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:148.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8+git0.dec3693-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.70.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.80-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202602-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.92.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.93.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.19.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.857-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.46-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21.17.0_1_g4f253b9b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.46-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.153-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.51.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.550.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.2.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.73.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.300064.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.46-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.45-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.7-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.168.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.47.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.164-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.68.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.42-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.21-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.56-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:127-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.0.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.96.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.1_02-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:149.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.132-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.18-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202602-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.9+git0.a9fd29b-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4121.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.177-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.302-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4+e2562f589-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.17p2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:149.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:34.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.30-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.20-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0~a8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.570.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:147.0.7727.55-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:360-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.03.0-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:46.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.87-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.76.2-1.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
